diff options
author | 2021-07-26 20:25:54 +0200 | |
---|---|---|
committer | 2021-07-26 20:25:54 +0200 | |
commit | ad0e26dc04008feec8de0603c88fbd63f87c18ec (patch) | |
tree | fb8402a9d881b6480eba0a2402f05f7b39f7435c /internal/text/sanitize.go | |
parent | add trusted proxy for parsing client IPs (#115) (diff) | |
download | gotosocial-ad0e26dc04008feec8de0603c88fbd63f87c18ec.tar.xz |
Markdown Statuses (#116)
* parse markdown statuses if desired
* add some preliminary docs for writing posts
Diffstat (limited to 'internal/text/sanitize.go')
-rw-r--r-- | internal/text/sanitize.go | 50 |
1 files changed, 50 insertions, 0 deletions
diff --git a/internal/text/sanitize.go b/internal/text/sanitize.go new file mode 100644 index 000000000..aac9d8aab --- /dev/null +++ b/internal/text/sanitize.go @@ -0,0 +1,50 @@ +/* + GoToSocial + Copyright (C) 2021 GoToSocial Authors admin@gotosocial.org + + This program is free software: you can redistribute it and/or modify + it under the terms of the GNU Affero General Public License as published by + the Free Software Foundation, either version 3 of the License, or + (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU Affero General Public License for more details. + + You should have received a copy of the GNU Affero General Public License + along with this program. If not, see <http://www.gnu.org/licenses/>. +*/ + +package text + +import ( + "github.com/microcosm-cc/bluemonday" +) + +// '[A]llows a broad selection of HTML elements and attributes that are safe for user generated content. +// Note that this policy does not allow iframes, object, embed, styles, script, etc. +// An example usage scenario would be blog post bodies where a variety of formatting is expected along with the potential for TABLEs and IMGs.' +// +// Source: https://github.com/microcosm-cc/bluemonday#usage +var regular *bluemonday.Policy = bluemonday.UGCPolicy(). + RequireNoReferrerOnLinks(true). + RequireNoFollowOnLinks(true). + RequireCrossOriginAnonymous(true) + +// '[C]an be thought of as equivalent to stripping all HTML elements and their attributes as it has nothing on its allowlist. +// An example usage scenario would be blog post titles where HTML tags are not expected at all +// and if they are then the elements and the content of the elements should be stripped. This is a very strict policy.' +// +// Source: https://github.com/microcosm-cc/bluemonday#usage +var strict *bluemonday.Policy = bluemonday.StrictPolicy() + +// SanitizeHTML cleans up HTML in the given string, allowing through only safe HTML elements. +func SanitizeHTML(in string) string { + return regular.Sanitize(in) +} + +// RemoveHTML removes all HTML from the given string. +func RemoveHTML(in string) string { + return strict.Sanitize(in) +} |