require'set'require'cgi'require'active_support/core_ext/class/attribute'moduleHTMLclassSanitizerdefsanitize(text,options={})returntextunlesssanitizeable?(text)tokenize(text,options).joinenddefsanitizeable?(text)!(text.nil?||text.empty?||!text.index("<"))endprotecteddeftokenize(text,options)tokenizer=HTML::Tokenizer.new(text)result=[]whiletoken=tokenizer.nextnode=Node.parse(nil,0,0,token,false)process_nodenode,result,optionsendresultenddefprocess_node(node,result,options)result<<node.to_sendendclassFullSanitizer<Sanitizerdefsanitize(text,options={})result=super# strip any comments, and if they have a newline at the end (ie. line with# only a comment) strip that tooresult=result.gsub(/<!--(.*?)-->[\n]?/m,"")if(result&&result=~/<!--(.*?)-->[\n]?/m)# Recurse - handle all dirty nested tagsresult==text?result:sanitize(result,options)enddefprocess_node(node,result,options)result<<node.to_sifnode.class==HTML::TextendendclassLinkSanitizer<FullSanitizercattr_accessor:included_tags,:instance_writer=>falseself.included_tags=Set.new(%w(a href))defsanitizeable?(text)!(text.nil?||text.empty?||!((text.index("<a")||text.index("<href"))&&text.index(">")))endprotecteddefprocess_node(node,result,options)result<<node.to_sunlessnode.is_a?(HTML::Tag)&&included_tags.include?(node.name)endendclassWhiteListSanitizer<Sanitizer[:protocol_separator,:uri_attributes,:allowed_attributes,:allowed_tags,:allowed_protocols,:bad_tags,:allowed_css_properties,:allowed_css_keywords,:shorthand_css_properties].eachdo|attr|class_attributeattr,:instance_writer=>falseend# A regular expression of the valid characters used to separate protocols like# the ':' in 'http://foo.com'self.protocol_separator=/:|(�*58)|(p)|(�*3a)|(%|%)3A/i# Specifies a Set of HTML attributes that can have URIs.self.uri_attributes=Set.new(%w(href src cite action longdesc xlink:href lowsrc))# Specifies a Set of 'bad' tags that the #sanitize helper will remove completely, as opposed# to just escaping harmless tags like <font>self.bad_tags=Set.new(%w(script))# Specifies the default Set of tags that the #sanitize helper will allow unscathed.self.allowed_tags=Set.new(%w(strong em b i p code pre tt samp kbd var sub
sup dfn cite big small address hr br div span h1 h2 h3 h4 h5 h6 ul ol li dl dt dd abbr
acronym a img blockquote del ins))# Specifies the default Set of html attributes that the #sanitize helper will leave# in the allowed tag.self.allowed_attributes=Set.new(%w(href src width height alt cite datetime title class name xml:lang abbr))# Specifies the default Set of acceptable css properties that #sanitize and #sanitize_css will accept.self.allowed_protocols=Set.new(%w(ed2k ftp http https irc mailto news gopher nntp telnet webcal xmpp callto
feed svn urn aim rsync tag ssh sftp rtsp afs))# Specifies the default Set of acceptable css keywords that #sanitize and #sanitize_css will accept.self.allowed_css_properties=Set.new(%w(azimuth background-color border-bottom-color border-collapse
border-color border-left-color border-right-color border-top-color clear color cursor direction display
elevation float font font-family font-size font-style font-variant font-weight height letter-spacing line-height
overflow pause pause-after pause-before pitch pitch-range richness speak speak-header speak-numeral speak-punctuation
speech-rate stress text-align text-decoration text-indent unicode-bidi vertical-align voice-family volume white-space
width))# Specifies the default Set of acceptable css keywords that #sanitize and #sanitize_css will accept.self.allowed_css_keywords=Set.new(%w(auto aqua black block blue bold both bottom brown center
collapse dashed dotted fuchsia gray green !important italic left lime maroon medium none navy normal
nowrap olive pointer purple red right solid silver teal top transparent underline white yellow))# Specifies the default Set of allowed shorthand css properties for the #sanitize and #sanitize_css helpers.self.shorthand_css_properties=Set.new(%w(background border margin padding))# Sanitizes a block of css code. Used by #sanitize when it comes across a style attributedefsanitize_css(style)# disallow urlsstyle=style.to_s.gsub(/url\s*\(\s*[^\s)]+?\s*\)\s*/,' ')# gauntletifstyle!~/\A([:,;#%.\sa-zA-Z0-9!]|\w-\w|\'[\s\w]+\'|\"[\s\w]+\"|\([\d,\s]+\))*\z/||style!~/\A(\s*[-\w]+\s*:\s*[^:;]*(;|$)\s*)*\z/return''endclean=[]style.scan(/([-\w]+)\s*:\s*([^:;]*)/)do|prop,val|ifallowed_css_properties.include?(prop.downcase)clean<<prop+': '+val+';'elsifshorthand_css_properties.include?(prop.split('-')[0].downcase)unlessval.split().any?do|keyword|!allowed_css_keywords.include?(keyword)&&keyword!~/\A(#[0-9a-f]+|rgb\(\d+%?,\d*%?,?\d*%?\)?|\d{0,2}\.?\d{0,2}(cm|em|ex|in|mm|pc|pt|px|%|,|\))?)\z/endclean<<prop+': '+val+';'endendendclean.join(' ')endprotecteddeftokenize(text,options)options[:parent]=[]options[:attributes]||=allowed_attributesoptions[:tags]||=allowed_tagssuperenddefprocess_node(node,result,options)result<<casenodewhenHTML::Tagifnode.closing==:closeoptions[:parent].shiftelseoptions[:parent].unshiftnode.nameendprocess_attributes_fornode,optionsoptions[:tags].include?(node.name)?node:nilelsebad_tags.include?(options[:parent].first)?nil:node.to_s.gsub(/</,"<")endenddefprocess_attributes_for(node,options)returnunlessnode.attributesnode.attributes.keys.eachdo|attr_name|value=node.attributes[attr_name].to_sif!options[:attributes].include?(attr_name)||contains_bad_protocols?(attr_name,value)node.attributes.delete(attr_name)elsenode.attributes[attr_name]=attr_name=='style'?sanitize_css(value):CGI::escapeHTML(CGI::unescapeHTML(value))endendenddefcontains_bad_protocols?(attr_name,value)uri_attributes.include?(attr_name)&&(value=~/(^[^\/:]*):|(�*58)|(p)|(�*3a)|(%|%)3A/i&&!allowed_protocols.include?(value.split(protocol_separator).first.downcase.strip))endendend