From ad0e26dc04008feec8de0603c88fbd63f87c18ec Mon Sep 17 00:00:00 2001 From: Tobi Smethurst <31960611+tsmethurst@users.noreply.github.com> Date: Mon, 26 Jul 2021 20:25:54 +0200 Subject: Markdown Statuses (#116) * parse markdown statuses if desired * add some preliminary docs for writing posts --- internal/util/sanitize.go | 50 ----------------------------------------------- 1 file changed, 50 deletions(-) delete mode 100644 internal/util/sanitize.go (limited to 'internal/util/sanitize.go') diff --git a/internal/util/sanitize.go b/internal/util/sanitize.go deleted file mode 100644 index ac1f4c651..000000000 --- a/internal/util/sanitize.go +++ /dev/null @@ -1,50 +0,0 @@ -/* - GoToSocial - Copyright (C) 2021 GoToSocial Authors admin@gotosocial.org - - This program is free software: you can redistribute it and/or modify - it under the terms of the GNU Affero General Public License as published by - the Free Software Foundation, either version 3 of the License, or - (at your option) any later version. - - This program is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - GNU Affero General Public License for more details. - - You should have received a copy of the GNU Affero General Public License - along with this program. If not, see . -*/ - -package util - -import ( - "github.com/microcosm-cc/bluemonday" -) - -// '[A]llows a broad selection of HTML elements and attributes that are safe for user generated content. -// Note that this policy does not allow iframes, object, embed, styles, script, etc. -// An example usage scenario would be blog post bodies where a variety of formatting is expected along with the potential for TABLEs and IMGs.' -// -// Source: https://github.com/microcosm-cc/bluemonday#usage -var regular *bluemonday.Policy = bluemonday.UGCPolicy(). - RequireNoReferrerOnLinks(true). - RequireNoFollowOnLinks(true). - RequireCrossOriginAnonymous(true) - -// '[C]an be thought of as equivalent to stripping all HTML elements and their attributes as it has nothing on its allowlist. -// An example usage scenario would be blog post titles where HTML tags are not expected at all -// and if they are then the elements and the content of the elements should be stripped. This is a very strict policy.' -// -// Source: https://github.com/microcosm-cc/bluemonday#usage -var strict *bluemonday.Policy = bluemonday.StrictPolicy() - -// SanitizeHTML cleans up HTML in the given string, allowing through only safe HTML elements. -func SanitizeHTML(in string) string { - return regular.Sanitize(in) -} - -// RemoveHTML removes all HTML from the given string. -func RemoveHTML(in string) string { - return strict.Sanitize(in) -} -- cgit v1.2.3