From 192b02906b89fb61efdf60ef553d717a5d3e037f Mon Sep 17 00:00:00 2001
From: Connor Behan If you would like additional security on attachments to avoid"
- _ " this, set this parameter to an alternate URL for your $terms.Bugzilla"
+ _ " this, set this parameter to an alternate URL for your Bugzilla"
_ " that is not the same as urlbase or sslbase."
_ " That is, a different domain name that resolves to this exact"
- _ " same $terms.Bugzilla installation.
Note that if you have set the" _ " cookiedomain" _" parameter, you should set attachment_base to use a" @@ -42,14 +42,14 @@ _ " attachments to accessing only other attachments on the same" _ " ${terms.bug}. Remember, though, that all those possible domain names " _ " (such as 1234.your.domain.com) must point to this same" - _ " $terms.Bugzilla instance.", + _ " Bugzilla instance.", allow_attachment_deletion => "If this option is on, administrators will be able to delete " _ "the content of attachments.", maxattachmentsize => "The maximum size (in kilobytes) of attachments to be stored " _ "in the database. If a file larger than this size is attached " _ - "to ${terms.abug}, $terms.Bugzilla will look at the " _ + "to ${terms.abug}, Bugzilla will look at the " _ "maxlocalattachment parameter " _ "to determine if the file can be stored locally on the web server. " _ "If the file size exceeds both limits, then the attachment is rejected. " _ -- cgit v1.2.3-24-g4f1b