From fae3db5baa0223cc5a24780d3de440367fe28bbf Mon Sep 17 00:00:00 2001 From: joey Date: Tue, 25 Apr 2006 03:20:04 +0000 Subject: oops --- doc/news/sanitization.html | 7 ------- doc/news/sanitization.mdwn | 7 +++++++ 2 files changed, 7 insertions(+), 7 deletions(-) delete mode 100644 doc/news/sanitization.html create mode 100644 doc/news/sanitization.mdwn (limited to 'doc/news') diff --git a/doc/news/sanitization.html b/doc/news/sanitization.html deleted file mode 100644 index 6ce254157..000000000 --- a/doc/news/sanitization.html +++ /dev/null @@ -1,7 +0,0 @@ -ikiwiki's main outstanding security hole, lack of [[HtmlSanitization]] has -now been addressed. ikiwiki now sanitizes html by default. - -If only trusted parties can edit your wiki's content, then you might want -to turn this sanitization back off to allow use of potentially dangerous -tags. To do so, pass --no-sanitize or set "sanitize => 0," in your -[[ikiwiki.setup]]. diff --git a/doc/news/sanitization.mdwn b/doc/news/sanitization.mdwn new file mode 100644 index 000000000..6ce254157 --- /dev/null +++ b/doc/news/sanitization.mdwn @@ -0,0 +1,7 @@ +ikiwiki's main outstanding security hole, lack of [[HtmlSanitization]] has +now been addressed. ikiwiki now sanitizes html by default. + +If only trusted parties can edit your wiki's content, then you might want +to turn this sanitization back off to allow use of potentially dangerous +tags. To do so, pass --no-sanitize or set "sanitize => 0," in your +[[ikiwiki.setup]]. -- cgit v1.2.3