diff --git a/html_sanitizer.rst b/html_sanitizer.rst
index 17096db913f..07ba9b567de 100644
--- a/html_sanitizer.rst
+++ b/html_sanitizer.rst
@@ -793,17 +793,17 @@ URLs of ```` elements:
->sanitizer('app.post_sanitizer')
// if `true`, all URLs using the `http://` scheme will be converted to
// use the `https://` scheme instead. `http` still needs to be
- // allowed in `allowedLinkSchemes`
+ // allowed in `allowLinkSchemes`
->forceHttpsUrls(true)
// specifies the allowed URL schemes. If the URL has a different scheme, the
// attribute will be dropped
- ->allowedLinkSchemes(['http', 'https', 'mailto'])
+ ->allowLinkSchemes(['http', 'https', 'mailto'])
// specifies the allowed hosts, the attribute will be dropped if the
// URL contains a different host. Subdomains are allowed: e.g. the following
// config would also allow 'www.symfony.com', 'live.symfony.com', etc.
- ->allowedLinkHosts(['symfony.com'])
+ ->allowLinkHosts(['symfony.com'])
// whether to allow relative links (i.e. URLs without scheme and host)
->allowRelativeLinks(true)
@@ -819,16 +819,16 @@ URLs of ```` elements:
(new HtmlSanitizerConfig())
// if `true`, all URLs using the `http://` scheme will be converted to
// use the `https://` scheme instead. `http` still needs to be
- // allowed in `allowedLinkSchemes`
+ // allowed in `allowLinkSchemes`
->forceHttpsUrls()
// specifies the allowed URL schemes. If the URL has a different scheme, the
// attribute will be dropped
- ->allowedLinkSchemes(['http', 'https', 'mailto'])
+ ->allowLinkSchemes(['http', 'https', 'mailto'])
// specifies the allowed hosts, the attribute will be dropped if the
// URL contains a different host which is not a subdomain of the allowed host
- ->allowedLinkHosts(['symfony.com']) // Also allows any subdomain (i.e. www.symfony.com)
+ ->allowLinkHosts(['symfony.com']) // Also allows any subdomain (i.e. www.symfony.com)
// whether to allow relative links (i.e. URLs without scheme and host)
->allowRelativeLinks()
@@ -913,16 +913,16 @@ the HTML sanitizer: ``src``, ``href``, ``lowsrc``, ``background`` and ``ping``.
->sanitizer('app.post_sanitizer')
// if `true`, all URLs using the `http://` scheme will be converted to
// use the `https://` scheme instead. `http` still needs to be
- // allowed in `allowedMediaSchemes`
+ // allowed in `allowMediaSchemes`
->forceHttpsUrls(true)
// specifies the allowed URL schemes. If the URL has a different scheme, the
// attribute will be dropped
- ->allowedMediaSchemes(['http', 'https', 'mailto'])
+ ->allowMediaSchemes(['http', 'https', 'mailto'])
// specifies the allowed hosts, the attribute will be dropped if the URL
// contains a different host which is not a subdomain of the allowed host
- ->allowedMediaHosts(['symfony.com']) // Also allows any subdomain (i.e. www.symfony.com)
+ ->allowMediaHosts(['symfony.com']) // Also allows any subdomain (i.e. www.symfony.com)
// whether to allow relative URLs (i.e. URLs without scheme and host)
->allowRelativeMedias(true)
@@ -938,16 +938,16 @@ the HTML sanitizer: ``src``, ``href``, ``lowsrc``, ``background`` and ``ping``.
(new HtmlSanitizerConfig())
// if `true`, all URLs using the `http://` scheme will be converted to
// use the `https://` scheme instead. `http` still needs to be
- // allowed in `allowedMediaSchemes`
+ // allowed in `allowMediaSchemes`
->forceHttpsUrls()
// specifies the allowed URL schemes. If the URL has a different scheme, the
// attribute will be dropped
- ->allowedMediaSchemes(['http', 'https', 'mailto'])
+ ->allowMediaSchemes(['http', 'https', 'mailto'])
// specifies the allowed hosts, the attribute will be dropped if the URL
// contains a different host which is not a subdomain of the allowed host
- ->allowedMediaHosts(['symfony.com']) // Also allows any subdomain (i.e. www.symfony.com)
+ ->allowMediaHosts(['symfony.com']) // Also allows any subdomain (i.e. www.symfony.com)
// whether to allow relative URLs (i.e. URLs without scheme and host)
->allowRelativeMedias()