mirror of https://github.com/gogits/gogs.git
Browse Source
Only expose public APIs for 'Sanitize' and 'SanitizeBytes' to eliminate unintentional modifications to sanitizer policy. Also use 'sync.Once' to make sure multiple calls of 'NewSanitizer' is safe (although should never happen, but this is a better way).pull/4017/merge
Unknwon
8 years ago
6 changed files with 101 additions and 24 deletions
@ -0,0 +1,55 @@
|
||||
// Copyright 2017 The Gogs Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package markup |
||||
|
||||
import ( |
||||
"regexp" |
||||
"sync" |
||||
|
||||
"github.com/microcosm-cc/bluemonday" |
||||
log "gopkg.in/clog.v1" |
||||
|
||||
"github.com/gogits/gogs/modules/setting" |
||||
) |
||||
|
||||
// Sanitizer is a protection wrapper of *bluemonday.Policy which does not allow
|
||||
// any modification to the underlying policies once it's been created.
|
||||
type Sanitizer struct { |
||||
policy *bluemonday.Policy |
||||
init sync.Once |
||||
} |
||||
|
||||
var sanitizer = &Sanitizer{} |
||||
|
||||
// NewSanitizer initializes sanitizer with allowed attributes based on settings.
|
||||
// Multiple calls to this function will only create one instance of Sanitizer during
|
||||
// entire application lifecycle.
|
||||
func NewSanitizer() { |
||||
log.Trace("Markup: sanitizer initialization requested") |
||||
sanitizer.init.Do(func() { |
||||
sanitizer.policy = bluemonday.UGCPolicy() |
||||
// We only want to allow HighlightJS specific classes for code blocks
|
||||
sanitizer.policy.AllowAttrs("class").Matching(regexp.MustCompile(`^language-\w+$`)).OnElements("code") |
||||
|
||||
// Checkboxes
|
||||
sanitizer.policy.AllowAttrs("type").Matching(regexp.MustCompile(`^checkbox$`)).OnElements("input") |
||||
sanitizer.policy.AllowAttrs("checked", "disabled").OnElements("input") |
||||
|
||||
// Custom URL-Schemes
|
||||
sanitizer.policy.AllowURLSchemes(setting.Markdown.CustomURLSchemes...) |
||||
|
||||
log.Trace("Markup: sanitizer initialized") |
||||
}) |
||||
} |
||||
|
||||
// Sanitize takes a string that contains a HTML fragment or document and applies policy whitelist.
|
||||
func Sanitize(s string) string { |
||||
return sanitizer.policy.Sanitize(s) |
||||
} |
||||
|
||||
// SanitizeBytes takes a []byte slice that contains a HTML fragment or document and applies policy whitelist.
|
||||
func SanitizeBytes(b []byte) []byte { |
||||
return sanitizer.policy.SanitizeBytes(b) |
||||
} |
@ -0,0 +1,38 @@
|
||||
// Copyright 2017 The Gogs Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package markup_test |
||||
|
||||
import ( |
||||
"testing" |
||||
|
||||
. "github.com/smartystreets/goconvey/convey" |
||||
|
||||
. "github.com/gogits/gogs/modules/markup" |
||||
) |
||||
|
||||
func Test_Sanitizer(t *testing.T) { |
||||
BuildSanitizer() |
||||
Convey("Sanitize HTML string and bytes", t, func() { |
||||
testCases := []string{ |
||||
// Regular
|
||||
`<a onblur="alert(secret)" href="http://www.google.com">Google</a>`, `<a href="http://www.google.com" rel="nofollow">Google</a>`, |
||||
|
||||
// Code highlighting class
|
||||
`<code class="random string"></code>`, `<code></code>`, |
||||
`<code class="language-random ui tab active menu attached animating sidebar following bar center"></code>`, `<code></code>`, |
||||
`<code class="language-go"></code>`, `<code class="language-go"></code>`, |
||||
|
||||
// Input checkbox
|
||||
`<input type="hidden">`, ``, |
||||
`<input type="checkbox">`, `<input type="checkbox">`, |
||||
`<input checked disabled autofocus>`, `<input checked="" disabled="">`, |
||||
} |
||||
|
||||
for i := 0; i < len(testCases); i += 2 { |
||||
So(Sanitize(testCases[i]), ShouldEqual, testCases[i+1]) |
||||
So(string(SanitizeBytes([]byte(testCases[i]))), ShouldEqual, testCases[i+1]) |
||||
} |
||||
}) |
||||
} |
Loading…
Reference in new issue