2005-02-06 06:44:48 +00:00
|
|
|
|
<?php
|
|
|
|
|
|
/**
|
2006-01-07 08:50:07 +00:00
|
|
|
|
* XHTML sanitizer for MediaWiki
|
2005-02-06 06:44:48 +00:00
|
|
|
|
*
|
|
|
|
|
|
* Copyright (C) 2002-2005 Brion Vibber <brion@pobox.com> et al
|
|
|
|
|
|
* http://www.mediawiki.org/
|
|
|
|
|
|
*
|
|
|
|
|
|
* This program is free software; you can redistribute it and/or modify
|
|
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
2006-01-07 13:09:30 +00:00
|
|
|
|
* the Free Software Foundation; either version 2 of the License, or
|
2005-02-06 06:44:48 +00:00
|
|
|
|
* (at your option) any later version.
|
|
|
|
|
|
*
|
|
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
|
|
*
|
|
|
|
|
|
* You should have received a copy of the GNU General Public License along
|
|
|
|
|
|
* with this program; if not, write to the Free Software Foundation, Inc.,
|
2006-04-05 07:43:17 +00:00
|
|
|
|
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
|
2005-02-06 06:44:48 +00:00
|
|
|
|
* http://www.gnu.org/copyleft/gpl.html
|
|
|
|
|
|
*
|
|
|
|
|
|
* @package MediaWiki
|
2005-04-12 01:29:21 +00:00
|
|
|
|
* @subpackage Parser
|
2005-02-06 06:44:48 +00:00
|
|
|
|
*/
|
|
|
|
|
|
|
2005-05-31 11:54:36 +00:00
|
|
|
|
/**
|
|
|
|
|
|
* Regular expression to match various types of character references in
|
|
|
|
|
|
* Sanitizer::normalizeCharReferences and Sanitizer::decodeCharReferences
|
|
|
|
|
|
*/
|
|
|
|
|
|
define( 'MW_CHAR_REFS_REGEX',
|
|
|
|
|
|
'/&([A-Za-z0-9]+);
|
|
|
|
|
|
|&\#([0-9]+);
|
|
|
|
|
|
|&\#x([0-9A-Za-z]+);
|
|
|
|
|
|
|&\#X([0-9A-Za-z]+);
|
|
|
|
|
|
|(&)/x' );
|
|
|
|
|
|
|
2005-06-03 08:12:48 +00:00
|
|
|
|
/**
|
|
|
|
|
|
* Regular expression to match HTML/XML attribute pairs within a tag.
|
|
|
|
|
|
* Allows some... latitude.
|
|
|
|
|
|
* Used in Sanitizer::fixTagAttributes and Sanitizer::decodeTagAttributes
|
|
|
|
|
|
*/
|
2006-01-07 13:09:30 +00:00
|
|
|
|
$attrib = '[A-Za-z0-9]';
|
2005-06-03 08:12:48 +00:00
|
|
|
|
$space = '[\x09\x0a\x0d\x20]';
|
|
|
|
|
|
define( 'MW_ATTRIBS_REGEX',
|
|
|
|
|
|
"/(?:^|$space)($attrib+)
|
|
|
|
|
|
($space*=$space*
|
|
|
|
|
|
(?:
|
|
|
|
|
|
# The attribute value: quoted or alone
|
|
|
|
|
|
\"([^<\"]*)\"
|
|
|
|
|
|
| '([^<']*)'
|
|
|
|
|
|
| ([a-zA-Z0-9!#$%&()*,\\-.\\/:;<>?@[\\]^_`{|}~]+)
|
|
|
|
|
|
| (\#[0-9a-fA-F]+) # Technically wrong, but lots of
|
|
|
|
|
|
# colors are specified like this.
|
|
|
|
|
|
# We'll be normalizing it.
|
|
|
|
|
|
)
|
|
|
|
|
|
)?(?=$space|\$)/sx" );
|
|
|
|
|
|
|
2005-05-31 11:54:36 +00:00
|
|
|
|
/**
|
|
|
|
|
|
* List of all named character entities defined in HTML 4.01
|
|
|
|
|
|
* http://www.w3.org/TR/html4/sgml/entities.html
|
2006-04-24 19:22:18 +00:00
|
|
|
|
* @private
|
2005-05-31 11:54:36 +00:00
|
|
|
|
*/
|
|
|
|
|
|
global $wgHtmlEntities;
|
|
|
|
|
|
$wgHtmlEntities = array(
|
|
|
|
|
|
'Aacute' => 193,
|
|
|
|
|
|
'aacute' => 225,
|
|
|
|
|
|
'Acirc' => 194,
|
|
|
|
|
|
'acirc' => 226,
|
|
|
|
|
|
'acute' => 180,
|
|
|
|
|
|
'AElig' => 198,
|
|
|
|
|
|
'aelig' => 230,
|
|
|
|
|
|
'Agrave' => 192,
|
|
|
|
|
|
'agrave' => 224,
|
|
|
|
|
|
'alefsym' => 8501,
|
|
|
|
|
|
'Alpha' => 913,
|
|
|
|
|
|
'alpha' => 945,
|
|
|
|
|
|
'amp' => 38,
|
|
|
|
|
|
'and' => 8743,
|
|
|
|
|
|
'ang' => 8736,
|
|
|
|
|
|
'Aring' => 197,
|
|
|
|
|
|
'aring' => 229,
|
|
|
|
|
|
'asymp' => 8776,
|
|
|
|
|
|
'Atilde' => 195,
|
|
|
|
|
|
'atilde' => 227,
|
|
|
|
|
|
'Auml' => 196,
|
|
|
|
|
|
'auml' => 228,
|
|
|
|
|
|
'bdquo' => 8222,
|
|
|
|
|
|
'Beta' => 914,
|
|
|
|
|
|
'beta' => 946,
|
|
|
|
|
|
'brvbar' => 166,
|
|
|
|
|
|
'bull' => 8226,
|
|
|
|
|
|
'cap' => 8745,
|
|
|
|
|
|
'Ccedil' => 199,
|
|
|
|
|
|
'ccedil' => 231,
|
|
|
|
|
|
'cedil' => 184,
|
|
|
|
|
|
'cent' => 162,
|
|
|
|
|
|
'Chi' => 935,
|
|
|
|
|
|
'chi' => 967,
|
|
|
|
|
|
'circ' => 710,
|
|
|
|
|
|
'clubs' => 9827,
|
|
|
|
|
|
'cong' => 8773,
|
|
|
|
|
|
'copy' => 169,
|
|
|
|
|
|
'crarr' => 8629,
|
|
|
|
|
|
'cup' => 8746,
|
|
|
|
|
|
'curren' => 164,
|
|
|
|
|
|
'dagger' => 8224,
|
|
|
|
|
|
'Dagger' => 8225,
|
|
|
|
|
|
'darr' => 8595,
|
|
|
|
|
|
'dArr' => 8659,
|
|
|
|
|
|
'deg' => 176,
|
|
|
|
|
|
'Delta' => 916,
|
|
|
|
|
|
'delta' => 948,
|
|
|
|
|
|
'diams' => 9830,
|
|
|
|
|
|
'divide' => 247,
|
|
|
|
|
|
'Eacute' => 201,
|
|
|
|
|
|
'eacute' => 233,
|
|
|
|
|
|
'Ecirc' => 202,
|
|
|
|
|
|
'ecirc' => 234,
|
|
|
|
|
|
'Egrave' => 200,
|
|
|
|
|
|
'egrave' => 232,
|
|
|
|
|
|
'empty' => 8709,
|
|
|
|
|
|
'emsp' => 8195,
|
|
|
|
|
|
'ensp' => 8194,
|
|
|
|
|
|
'Epsilon' => 917,
|
|
|
|
|
|
'epsilon' => 949,
|
|
|
|
|
|
'equiv' => 8801,
|
|
|
|
|
|
'Eta' => 919,
|
|
|
|
|
|
'eta' => 951,
|
|
|
|
|
|
'ETH' => 208,
|
|
|
|
|
|
'eth' => 240,
|
|
|
|
|
|
'Euml' => 203,
|
|
|
|
|
|
'euml' => 235,
|
|
|
|
|
|
'euro' => 8364,
|
|
|
|
|
|
'exist' => 8707,
|
|
|
|
|
|
'fnof' => 402,
|
|
|
|
|
|
'forall' => 8704,
|
|
|
|
|
|
'frac12' => 189,
|
|
|
|
|
|
'frac14' => 188,
|
|
|
|
|
|
'frac34' => 190,
|
|
|
|
|
|
'frasl' => 8260,
|
|
|
|
|
|
'Gamma' => 915,
|
|
|
|
|
|
'gamma' => 947,
|
|
|
|
|
|
'ge' => 8805,
|
|
|
|
|
|
'gt' => 62,
|
|
|
|
|
|
'harr' => 8596,
|
|
|
|
|
|
'hArr' => 8660,
|
|
|
|
|
|
'hearts' => 9829,
|
|
|
|
|
|
'hellip' => 8230,
|
|
|
|
|
|
'Iacute' => 205,
|
|
|
|
|
|
'iacute' => 237,
|
|
|
|
|
|
'Icirc' => 206,
|
|
|
|
|
|
'icirc' => 238,
|
|
|
|
|
|
'iexcl' => 161,
|
|
|
|
|
|
'Igrave' => 204,
|
|
|
|
|
|
'igrave' => 236,
|
|
|
|
|
|
'image' => 8465,
|
|
|
|
|
|
'infin' => 8734,
|
|
|
|
|
|
'int' => 8747,
|
|
|
|
|
|
'Iota' => 921,
|
|
|
|
|
|
'iota' => 953,
|
|
|
|
|
|
'iquest' => 191,
|
|
|
|
|
|
'isin' => 8712,
|
|
|
|
|
|
'Iuml' => 207,
|
|
|
|
|
|
'iuml' => 239,
|
|
|
|
|
|
'Kappa' => 922,
|
|
|
|
|
|
'kappa' => 954,
|
|
|
|
|
|
'Lambda' => 923,
|
|
|
|
|
|
'lambda' => 955,
|
|
|
|
|
|
'lang' => 9001,
|
|
|
|
|
|
'laquo' => 171,
|
|
|
|
|
|
'larr' => 8592,
|
|
|
|
|
|
'lArr' => 8656,
|
|
|
|
|
|
'lceil' => 8968,
|
|
|
|
|
|
'ldquo' => 8220,
|
|
|
|
|
|
'le' => 8804,
|
|
|
|
|
|
'lfloor' => 8970,
|
|
|
|
|
|
'lowast' => 8727,
|
|
|
|
|
|
'loz' => 9674,
|
|
|
|
|
|
'lrm' => 8206,
|
|
|
|
|
|
'lsaquo' => 8249,
|
|
|
|
|
|
'lsquo' => 8216,
|
|
|
|
|
|
'lt' => 60,
|
|
|
|
|
|
'macr' => 175,
|
|
|
|
|
|
'mdash' => 8212,
|
|
|
|
|
|
'micro' => 181,
|
|
|
|
|
|
'middot' => 183,
|
|
|
|
|
|
'minus' => 8722,
|
|
|
|
|
|
'Mu' => 924,
|
|
|
|
|
|
'mu' => 956,
|
|
|
|
|
|
'nabla' => 8711,
|
|
|
|
|
|
'nbsp' => 160,
|
|
|
|
|
|
'ndash' => 8211,
|
|
|
|
|
|
'ne' => 8800,
|
|
|
|
|
|
'ni' => 8715,
|
|
|
|
|
|
'not' => 172,
|
|
|
|
|
|
'notin' => 8713,
|
|
|
|
|
|
'nsub' => 8836,
|
|
|
|
|
|
'Ntilde' => 209,
|
|
|
|
|
|
'ntilde' => 241,
|
|
|
|
|
|
'Nu' => 925,
|
|
|
|
|
|
'nu' => 957,
|
|
|
|
|
|
'Oacute' => 211,
|
|
|
|
|
|
'oacute' => 243,
|
|
|
|
|
|
'Ocirc' => 212,
|
|
|
|
|
|
'ocirc' => 244,
|
|
|
|
|
|
'OElig' => 338,
|
|
|
|
|
|
'oelig' => 339,
|
|
|
|
|
|
'Ograve' => 210,
|
|
|
|
|
|
'ograve' => 242,
|
|
|
|
|
|
'oline' => 8254,
|
|
|
|
|
|
'Omega' => 937,
|
|
|
|
|
|
'omega' => 969,
|
|
|
|
|
|
'Omicron' => 927,
|
|
|
|
|
|
'omicron' => 959,
|
|
|
|
|
|
'oplus' => 8853,
|
|
|
|
|
|
'or' => 8744,
|
|
|
|
|
|
'ordf' => 170,
|
|
|
|
|
|
'ordm' => 186,
|
|
|
|
|
|
'Oslash' => 216,
|
|
|
|
|
|
'oslash' => 248,
|
|
|
|
|
|
'Otilde' => 213,
|
|
|
|
|
|
'otilde' => 245,
|
|
|
|
|
|
'otimes' => 8855,
|
|
|
|
|
|
'Ouml' => 214,
|
|
|
|
|
|
'ouml' => 246,
|
|
|
|
|
|
'para' => 182,
|
|
|
|
|
|
'part' => 8706,
|
|
|
|
|
|
'permil' => 8240,
|
|
|
|
|
|
'perp' => 8869,
|
|
|
|
|
|
'Phi' => 934,
|
|
|
|
|
|
'phi' => 966,
|
|
|
|
|
|
'Pi' => 928,
|
|
|
|
|
|
'pi' => 960,
|
|
|
|
|
|
'piv' => 982,
|
|
|
|
|
|
'plusmn' => 177,
|
|
|
|
|
|
'pound' => 163,
|
|
|
|
|
|
'prime' => 8242,
|
|
|
|
|
|
'Prime' => 8243,
|
|
|
|
|
|
'prod' => 8719,
|
|
|
|
|
|
'prop' => 8733,
|
|
|
|
|
|
'Psi' => 936,
|
|
|
|
|
|
'psi' => 968,
|
|
|
|
|
|
'quot' => 34,
|
|
|
|
|
|
'radic' => 8730,
|
|
|
|
|
|
'rang' => 9002,
|
|
|
|
|
|
'raquo' => 187,
|
|
|
|
|
|
'rarr' => 8594,
|
|
|
|
|
|
'rArr' => 8658,
|
|
|
|
|
|
'rceil' => 8969,
|
|
|
|
|
|
'rdquo' => 8221,
|
|
|
|
|
|
'real' => 8476,
|
|
|
|
|
|
'reg' => 174,
|
|
|
|
|
|
'rfloor' => 8971,
|
|
|
|
|
|
'Rho' => 929,
|
|
|
|
|
|
'rho' => 961,
|
|
|
|
|
|
'rlm' => 8207,
|
|
|
|
|
|
'rsaquo' => 8250,
|
|
|
|
|
|
'rsquo' => 8217,
|
|
|
|
|
|
'sbquo' => 8218,
|
|
|
|
|
|
'Scaron' => 352,
|
|
|
|
|
|
'scaron' => 353,
|
|
|
|
|
|
'sdot' => 8901,
|
|
|
|
|
|
'sect' => 167,
|
|
|
|
|
|
'shy' => 173,
|
|
|
|
|
|
'Sigma' => 931,
|
|
|
|
|
|
'sigma' => 963,
|
|
|
|
|
|
'sigmaf' => 962,
|
|
|
|
|
|
'sim' => 8764,
|
|
|
|
|
|
'spades' => 9824,
|
|
|
|
|
|
'sub' => 8834,
|
|
|
|
|
|
'sube' => 8838,
|
|
|
|
|
|
'sum' => 8721,
|
|
|
|
|
|
'sup' => 8835,
|
|
|
|
|
|
'sup1' => 185,
|
|
|
|
|
|
'sup2' => 178,
|
|
|
|
|
|
'sup3' => 179,
|
|
|
|
|
|
'supe' => 8839,
|
|
|
|
|
|
'szlig' => 223,
|
|
|
|
|
|
'Tau' => 932,
|
|
|
|
|
|
'tau' => 964,
|
|
|
|
|
|
'there4' => 8756,
|
|
|
|
|
|
'Theta' => 920,
|
|
|
|
|
|
'theta' => 952,
|
|
|
|
|
|
'thetasym' => 977,
|
|
|
|
|
|
'thinsp' => 8201,
|
|
|
|
|
|
'THORN' => 222,
|
|
|
|
|
|
'thorn' => 254,
|
|
|
|
|
|
'tilde' => 732,
|
|
|
|
|
|
'times' => 215,
|
|
|
|
|
|
'trade' => 8482,
|
|
|
|
|
|
'Uacute' => 218,
|
|
|
|
|
|
'uacute' => 250,
|
|
|
|
|
|
'uarr' => 8593,
|
|
|
|
|
|
'uArr' => 8657,
|
|
|
|
|
|
'Ucirc' => 219,
|
|
|
|
|
|
'ucirc' => 251,
|
|
|
|
|
|
'Ugrave' => 217,
|
|
|
|
|
|
'ugrave' => 249,
|
|
|
|
|
|
'uml' => 168,
|
|
|
|
|
|
'upsih' => 978,
|
|
|
|
|
|
'Upsilon' => 933,
|
|
|
|
|
|
'upsilon' => 965,
|
|
|
|
|
|
'Uuml' => 220,
|
|
|
|
|
|
'uuml' => 252,
|
|
|
|
|
|
'weierp' => 8472,
|
|
|
|
|
|
'Xi' => 926,
|
|
|
|
|
|
'xi' => 958,
|
|
|
|
|
|
'Yacute' => 221,
|
|
|
|
|
|
'yacute' => 253,
|
|
|
|
|
|
'yen' => 165,
|
|
|
|
|
|
'Yuml' => 376,
|
|
|
|
|
|
'yuml' => 255,
|
|
|
|
|
|
'Zeta' => 918,
|
|
|
|
|
|
'zeta' => 950,
|
|
|
|
|
|
'zwj' => 8205,
|
|
|
|
|
|
'zwnj' => 8204 );
|
|
|
|
|
|
|
2005-07-05 21:22:25 +00:00
|
|
|
|
/** @package MediaWiki */
|
2005-02-06 06:44:48 +00:00
|
|
|
|
class Sanitizer {
|
|
|
|
|
|
/**
|
|
|
|
|
|
* Cleans up HTML, removes dangerous tags and attributes, and
|
|
|
|
|
|
* removes HTML comments
|
2006-04-24 19:22:18 +00:00
|
|
|
|
* @private
|
2005-04-01 23:24:26 +00:00
|
|
|
|
* @param string $text
|
2005-06-06 01:46:03 +00:00
|
|
|
|
* @param callback $processCallback to do any variable or parameter replacements in HTML attribute values
|
|
|
|
|
|
* @param array $args for the processing callback
|
2005-04-01 23:24:26 +00:00
|
|
|
|
* @return string
|
2005-02-06 06:44:48 +00:00
|
|
|
|
*/
|
2006-07-10 15:41:30 +00:00
|
|
|
|
static function removeHTMLtags( $text, $processCallback = null, $args = array() ) {
|
2005-02-06 06:44:48 +00:00
|
|
|
|
global $wgUseTidy, $wgUserHtml;
|
|
|
|
|
|
$fname = 'Parser::removeHTMLtags';
|
|
|
|
|
|
wfProfileIn( $fname );
|
|
|
|
|
|
|
|
|
|
|
|
if( $wgUserHtml ) {
|
|
|
|
|
|
$htmlpairs = array( # Tags that must be closed
|
|
|
|
|
|
'b', 'del', 'i', 'ins', 'u', 'font', 'big', 'small', 'sub', 'sup', 'h1',
|
|
|
|
|
|
'h2', 'h3', 'h4', 'h5', 'h6', 'cite', 'code', 'em', 's',
|
|
|
|
|
|
'strike', 'strong', 'tt', 'var', 'div', 'center',
|
|
|
|
|
|
'blockquote', 'ol', 'ul', 'dl', 'table', 'caption', 'pre',
|
2006-05-01 10:53:59 +00:00
|
|
|
|
'ruby', 'rt' , 'rb' , 'rp', 'p', 'span', 'u'
|
2005-02-06 06:44:48 +00:00
|
|
|
|
);
|
|
|
|
|
|
$htmlsingle = array(
|
|
|
|
|
|
'br', 'hr', 'li', 'dt', 'dd'
|
|
|
|
|
|
);
|
2005-06-06 03:04:12 +00:00
|
|
|
|
$htmlsingleonly = array( # Elements that cannot have close tags
|
|
|
|
|
|
'br', 'hr'
|
|
|
|
|
|
);
|
2005-02-06 06:44:48 +00:00
|
|
|
|
$htmlnest = array( # Tags that can be nested--??
|
|
|
|
|
|
'table', 'tr', 'td', 'th', 'div', 'blockquote', 'ol', 'ul',
|
|
|
|
|
|
'dl', 'font', 'big', 'small', 'sub', 'sup', 'span'
|
|
|
|
|
|
);
|
|
|
|
|
|
$tabletags = array( # Can only appear inside table
|
2006-05-02 18:34:28 +00:00
|
|
|
|
'td', 'th', 'tr',
|
2005-02-06 06:44:48 +00:00
|
|
|
|
);
|
2006-05-02 18:34:28 +00:00
|
|
|
|
$htmllist = array( # Tags used by list
|
|
|
|
|
|
'ul','ol',
|
|
|
|
|
|
);
|
|
|
|
|
|
$listtags = array( # Tags that can appear in a list
|
|
|
|
|
|
'li',
|
|
|
|
|
|
);
|
|
|
|
|
|
|
2005-02-06 06:44:48 +00:00
|
|
|
|
} else {
|
|
|
|
|
|
$htmlpairs = array();
|
|
|
|
|
|
$htmlsingle = array();
|
|
|
|
|
|
$htmlnest = array();
|
|
|
|
|
|
$tabletags = array();
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2006-06-03 00:01:01 +00:00
|
|
|
|
$htmlsingleallowed = array_merge( $htmlsingle, $tabletags );
|
|
|
|
|
|
$htmlelements = array_merge( $htmlsingle, $htmlpairs, $htmlnest );
|
2005-02-06 06:44:48 +00:00
|
|
|
|
|
|
|
|
|
|
# Remove HTML comments
|
|
|
|
|
|
$text = Sanitizer::removeHTMLcomments( $text );
|
|
|
|
|
|
$bits = explode( '<', $text );
|
|
|
|
|
|
$text = array_shift( $bits );
|
|
|
|
|
|
if(!$wgUseTidy) {
|
|
|
|
|
|
$tagstack = array(); $tablestack = array();
|
|
|
|
|
|
foreach ( $bits as $x ) {
|
|
|
|
|
|
$prev = error_reporting( E_ALL & ~( E_NOTICE | E_WARNING ) );
|
2005-06-06 03:04:12 +00:00
|
|
|
|
preg_match( '/^(\\/?)(\\w+)([^>]*?)(\\/{0,1}>)([^<]*)$/',
|
2005-02-06 06:44:48 +00:00
|
|
|
|
$x, $regs );
|
|
|
|
|
|
list( $qbar, $slash, $t, $params, $brace, $rest ) = $regs;
|
|
|
|
|
|
error_reporting( $prev );
|
|
|
|
|
|
|
|
|
|
|
|
$badtag = 0 ;
|
|
|
|
|
|
if ( in_array( $t = strtolower( $t ), $htmlelements ) ) {
|
|
|
|
|
|
# Check our stack
|
|
|
|
|
|
if ( $slash ) {
|
|
|
|
|
|
# Closing a tag...
|
2005-06-06 03:04:12 +00:00
|
|
|
|
if( in_array( $t, $htmlsingleonly ) ) {
|
|
|
|
|
|
$badtag = 1;
|
2006-01-07 04:57:38 +00:00
|
|
|
|
} elseif ( ( $ot = @array_pop( $tagstack ) ) != $t ) {
|
2006-06-03 00:01:01 +00:00
|
|
|
|
if ( in_array($ot, $htmlsingleallowed) ) {
|
|
|
|
|
|
# Pop all elements with an optional close tag
|
|
|
|
|
|
# and see if we find a match below them
|
|
|
|
|
|
$optstack = array();
|
|
|
|
|
|
array_push ($optstack, $ot);
|
|
|
|
|
|
while ( ( ( $ot = @array_pop( $tagstack ) ) != $t ) &&
|
|
|
|
|
|
in_array($ot, $htmlsingleallowed) ) {
|
|
|
|
|
|
array_push ($optstack, $ot);
|
|
|
|
|
|
}
|
|
|
|
|
|
if ( $t != $ot ) {
|
|
|
|
|
|
# No match. Push the optinal elements back again
|
|
|
|
|
|
$badtag = 1;
|
|
|
|
|
|
while ( $ot = @array_pop( $optstack ) ) {
|
|
|
|
|
|
array_push( $tagstack, $ot );
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
} else {
|
|
|
|
|
|
@array_push( $tagstack, $ot );
|
|
|
|
|
|
# <li> can be nested in <ul> or <ol>, skip those cases:
|
|
|
|
|
|
if(!(in_array($ot, $htmllist) && in_array($t, $listtags) )) {
|
|
|
|
|
|
$badtag = 1;
|
|
|
|
|
|
}
|
2006-05-02 18:34:28 +00:00
|
|
|
|
}
|
2005-02-06 06:44:48 +00:00
|
|
|
|
} else {
|
|
|
|
|
|
if ( $t == 'table' ) {
|
|
|
|
|
|
$tagstack = array_pop( $tablestack );
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
2006-06-01 04:35:19 +00:00
|
|
|
|
$newparams = '';
|
2005-02-06 06:44:48 +00:00
|
|
|
|
} else {
|
|
|
|
|
|
# Keep track for later
|
|
|
|
|
|
if ( in_array( $t, $tabletags ) &&
|
|
|
|
|
|
! in_array( 'table', $tagstack ) ) {
|
|
|
|
|
|
$badtag = 1;
|
|
|
|
|
|
} else if ( in_array( $t, $tagstack ) &&
|
|
|
|
|
|
! in_array ( $t , $htmlnest ) ) {
|
|
|
|
|
|
$badtag = 1 ;
|
2006-04-30 11:50:36 +00:00
|
|
|
|
# Is it a self closed htmlpair ? (bug 5487)
|
|
|
|
|
|
} else if( $brace == '/>' &&
|
|
|
|
|
|
in_array($t, $htmlpairs) ) {
|
|
|
|
|
|
$badtag = 1;
|
2005-06-06 03:04:12 +00:00
|
|
|
|
} elseif( in_array( $t, $htmlsingleonly ) ) {
|
|
|
|
|
|
# Hack to force empty tag for uncloseable elements
|
|
|
|
|
|
$brace = '/>';
|
2006-04-24 19:25:14 +00:00
|
|
|
|
} else if( in_array( $t, $htmlsingle ) ) {
|
|
|
|
|
|
# Hack to not close $htmlsingle tags
|
|
|
|
|
|
$brace = NULL;
|
2006-01-07 04:57:38 +00:00
|
|
|
|
} else {
|
2005-02-06 06:44:48 +00:00
|
|
|
|
if ( $t == 'table' ) {
|
|
|
|
|
|
array_push( $tablestack, $tagstack );
|
|
|
|
|
|
$tagstack = array();
|
|
|
|
|
|
}
|
|
|
|
|
|
array_push( $tagstack, $t );
|
|
|
|
|
|
}
|
2005-06-06 01:46:03 +00:00
|
|
|
|
|
|
|
|
|
|
# Replace any variables or template parameters with
|
|
|
|
|
|
# plaintext results.
|
|
|
|
|
|
if( is_callable( $processCallback ) ) {
|
|
|
|
|
|
call_user_func_array( $processCallback, array( &$params, $args ) );
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2005-02-06 06:44:48 +00:00
|
|
|
|
# Strip non-approved attributes from the tag
|
2005-02-06 12:46:31 +00:00
|
|
|
|
$newparams = Sanitizer::fixTagAttributes( $params, $t );
|
2005-02-06 06:44:48 +00:00
|
|
|
|
}
|
|
|
|
|
|
if ( ! $badtag ) {
|
|
|
|
|
|
$rest = str_replace( '>', '>', $rest );
|
2005-06-06 03:04:12 +00:00
|
|
|
|
$close = ( $brace == '/>' ) ? ' /' : '';
|
|
|
|
|
|
$text .= "<$slash$t$newparams$close>$rest";
|
2005-02-06 06:44:48 +00:00
|
|
|
|
continue;
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
$text .= '<' . str_replace( '>', '>', $x);
|
|
|
|
|
|
}
|
|
|
|
|
|
# Close off any remaining tags
|
|
|
|
|
|
while ( is_array( $tagstack ) && ($t = array_pop( $tagstack )) ) {
|
|
|
|
|
|
$text .= "</$t>\n";
|
|
|
|
|
|
if ( $t == 'table' ) { $tagstack = array_pop( $tablestack ); }
|
|
|
|
|
|
}
|
|
|
|
|
|
} else {
|
|
|
|
|
|
# this might be possible using tidy itself
|
|
|
|
|
|
foreach ( $bits as $x ) {
|
2005-06-06 03:04:12 +00:00
|
|
|
|
preg_match( '/^(\\/?)(\\w+)([^>]*?)(\\/{0,1}>)([^<]*)$/',
|
2005-02-06 06:44:48 +00:00
|
|
|
|
$x, $regs );
|
|
|
|
|
|
@list( $qbar, $slash, $t, $params, $brace, $rest ) = $regs;
|
|
|
|
|
|
if ( in_array( $t = strtolower( $t ), $htmlelements ) ) {
|
2005-06-06 01:46:03 +00:00
|
|
|
|
if( is_callable( $processCallback ) ) {
|
|
|
|
|
|
call_user_func_array( $processCallback, array( &$params, $args ) );
|
|
|
|
|
|
}
|
2005-02-06 12:46:31 +00:00
|
|
|
|
$newparams = Sanitizer::fixTagAttributes( $params, $t );
|
2005-02-06 06:44:48 +00:00
|
|
|
|
$rest = str_replace( '>', '>', $rest );
|
2005-02-06 12:46:31 +00:00
|
|
|
|
$text .= "<$slash$t$newparams$brace$rest";
|
2005-02-06 06:44:48 +00:00
|
|
|
|
} else {
|
|
|
|
|
|
$text .= '<' . str_replace( '>', '>', $x);
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
wfProfileOut( $fname );
|
|
|
|
|
|
return $text;
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
|
* Remove '<!--', '-->', and everything between.
|
|
|
|
|
|
* To avoid leaving blank lines, when a comment is both preceded
|
|
|
|
|
|
* and followed by a newline (ignoring spaces), trim leading and
|
|
|
|
|
|
* trailing spaces and one of the newlines.
|
2006-01-07 13:09:30 +00:00
|
|
|
|
*
|
2006-04-24 19:22:18 +00:00
|
|
|
|
* @private
|
2005-04-01 23:24:26 +00:00
|
|
|
|
* @param string $text
|
|
|
|
|
|
* @return string
|
2005-02-06 06:44:48 +00:00
|
|
|
|
*/
|
2006-07-10 15:41:30 +00:00
|
|
|
|
static function removeHTMLcomments( $text ) {
|
2005-02-06 06:44:48 +00:00
|
|
|
|
$fname='Parser::removeHTMLcomments';
|
|
|
|
|
|
wfProfileIn( $fname );
|
|
|
|
|
|
while (($start = strpos($text, '<!--')) !== false) {
|
|
|
|
|
|
$end = strpos($text, '-->', $start + 4);
|
|
|
|
|
|
if ($end === false) {
|
|
|
|
|
|
# Unterminated comment; bail out
|
|
|
|
|
|
break;
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
$end += 3;
|
|
|
|
|
|
|
|
|
|
|
|
# Trim space and newline if the comment is both
|
|
|
|
|
|
# preceded and followed by a newline
|
|
|
|
|
|
$spaceStart = max($start - 1, 0);
|
|
|
|
|
|
$spaceLen = $end - $spaceStart;
|
|
|
|
|
|
while (substr($text, $spaceStart, 1) === ' ' && $spaceStart > 0) {
|
|
|
|
|
|
$spaceStart--;
|
|
|
|
|
|
$spaceLen++;
|
|
|
|
|
|
}
|
|
|
|
|
|
while (substr($text, $spaceStart + $spaceLen, 1) === ' ')
|
|
|
|
|
|
$spaceLen++;
|
|
|
|
|
|
if (substr($text, $spaceStart, 1) === "\n" and substr($text, $spaceStart + $spaceLen, 1) === "\n") {
|
|
|
|
|
|
# Remove the comment, leading and trailing
|
|
|
|
|
|
# spaces, and leave only one newline.
|
|
|
|
|
|
$text = substr_replace($text, "\n", $spaceStart, $spaceLen + 1);
|
|
|
|
|
|
}
|
|
|
|
|
|
else {
|
|
|
|
|
|
# Remove just the comment.
|
|
|
|
|
|
$text = substr_replace($text, '', $start, $end - $start);
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
wfProfileOut( $fname );
|
|
|
|
|
|
return $text;
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
2006-06-06 22:56:38 +00:00
|
|
|
|
* Take an array of attribute names and values and normalize or discard
|
|
|
|
|
|
* illegal values for the given element type.
|
2005-02-06 12:46:31 +00:00
|
|
|
|
*
|
|
|
|
|
|
* - Discards attributes not on a whitelist for the given element
|
|
|
|
|
|
* - Unsafe style attributes are discarded
|
|
|
|
|
|
*
|
2006-06-06 22:56:38 +00:00
|
|
|
|
* @param array $attribs
|
2005-02-06 12:46:31 +00:00
|
|
|
|
* @param string $element
|
2006-06-06 22:56:38 +00:00
|
|
|
|
* @return array
|
2005-02-06 12:46:31 +00:00
|
|
|
|
*
|
|
|
|
|
|
* @todo Check for legal values where the DTD limits things.
|
|
|
|
|
|
* @todo Check for unique id attribute :P
|
|
|
|
|
|
*/
|
2006-07-10 15:41:30 +00:00
|
|
|
|
static function validateTagAttributes( $attribs, $element ) {
|
2005-02-06 12:46:31 +00:00
|
|
|
|
$whitelist = array_flip( Sanitizer::attributeWhitelist( $element ) );
|
2006-06-06 22:56:38 +00:00
|
|
|
|
$out = array();
|
|
|
|
|
|
foreach( $attribs as $attribute => $value ) {
|
2005-02-06 12:46:31 +00:00
|
|
|
|
if( !isset( $whitelist[$attribute] ) ) {
|
|
|
|
|
|
continue;
|
|
|
|
|
|
}
|
|
|
|
|
|
# Strip javascript "expression" from stylesheets.
|
|
|
|
|
|
# http://msdn.microsoft.com/workshop/author/dhtml/overview/recalc.asp
|
2005-10-06 02:38:26 +00:00
|
|
|
|
if( $attribute == 'style' ) {
|
2006-07-02 22:45:16 +00:00
|
|
|
|
$value = Sanitizer::checkCss( $value );
|
|
|
|
|
|
if( $value === false ) {
|
2005-10-06 02:38:26 +00:00
|
|
|
|
# haxx0r
|
|
|
|
|
|
continue;
|
|
|
|
|
|
}
|
2005-02-06 12:46:31 +00:00
|
|
|
|
}
|
2006-01-07 08:50:07 +00:00
|
|
|
|
|
|
|
|
|
|
if ( $attribute === 'id' )
|
|
|
|
|
|
$value = Sanitizer::escapeId( $value );
|
2006-01-07 13:31:29 +00:00
|
|
|
|
|
2006-06-06 22:56:38 +00:00
|
|
|
|
// If this attribute was previously set, override it.
|
|
|
|
|
|
// Output should only have one attribute of each name.
|
|
|
|
|
|
$out[$attribute] = $value;
|
|
|
|
|
|
}
|
|
|
|
|
|
return $out;
|
|
|
|
|
|
}
|
2006-07-02 22:45:16 +00:00
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
|
* Pick apart some CSS and check it for forbidden or unsafe structures.
|
|
|
|
|
|
* Returns a sanitized string, or false if it was just too evil.
|
|
|
|
|
|
*
|
|
|
|
|
|
* Currently URL references, 'expression', 'tps' are forbidden.
|
|
|
|
|
|
*
|
|
|
|
|
|
* @param string $value
|
|
|
|
|
|
* @return mixed
|
|
|
|
|
|
*/
|
|
|
|
|
|
static function checkCss( $value ) {
|
|
|
|
|
|
$stripped = Sanitizer::decodeCharReferences( $value );
|
|
|
|
|
|
|
|
|
|
|
|
// Remove any comments; IE gets token splitting wrong
|
|
|
|
|
|
$stripped = preg_replace( '!/\\*.*?\\*/!S', ' ', $stripped );
|
|
|
|
|
|
$value = $stripped;
|
|
|
|
|
|
|
|
|
|
|
|
// ... and continue checks
|
|
|
|
|
|
$stripped = preg_replace( '!\\\\([0-9A-Fa-f]{1,6})[ \\n\\r\\t\\f]?!e',
|
|
|
|
|
|
'codepointToUtf8(hexdec("$1"))', $stripped );
|
|
|
|
|
|
$stripped = str_replace( '\\', '', $stripped );
|
|
|
|
|
|
if( preg_match( '/(expression|tps*:\/\/|url\\s*\().*/is',
|
|
|
|
|
|
$stripped ) ) {
|
|
|
|
|
|
# haxx0r
|
|
|
|
|
|
return false;
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
return $value;
|
|
|
|
|
|
}
|
2006-06-06 22:56:38 +00:00
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
|
* Take a tag soup fragment listing an HTML element's attributes
|
|
|
|
|
|
* and normalize it to well-formed XML, discarding unwanted attributes.
|
|
|
|
|
|
* Output is safe for further wikitext processing, with escaping of
|
|
|
|
|
|
* values that could trigger problems.
|
|
|
|
|
|
*
|
|
|
|
|
|
* - Normalizes attribute names to lowercase
|
|
|
|
|
|
* - Discards attributes not on a whitelist for the given element
|
|
|
|
|
|
* - Turns broken or invalid entities into plaintext
|
|
|
|
|
|
* - Double-quotes all attribute values
|
|
|
|
|
|
* - Attributes without values are given the name as attribute
|
|
|
|
|
|
* - Double attributes are discarded
|
|
|
|
|
|
* - Unsafe style attributes are discarded
|
|
|
|
|
|
* - Prepends space if there are attributes.
|
|
|
|
|
|
*
|
|
|
|
|
|
* @param string $text
|
|
|
|
|
|
* @param string $element
|
|
|
|
|
|
* @return string
|
|
|
|
|
|
*/
|
2006-07-10 15:41:30 +00:00
|
|
|
|
static function fixTagAttributes( $text, $element ) {
|
2006-06-06 22:56:38 +00:00
|
|
|
|
if( trim( $text ) == '' ) {
|
|
|
|
|
|
return '';
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
$stripped = Sanitizer::validateTagAttributes(
|
|
|
|
|
|
Sanitizer::decodeTagAttributes( $text ), $element );
|
|
|
|
|
|
|
|
|
|
|
|
$attribs = array();
|
|
|
|
|
|
foreach( $stripped as $attribute => $value ) {
|
|
|
|
|
|
$encAttribute = htmlspecialchars( $attribute );
|
2006-06-09 21:21:00 +00:00
|
|
|
|
$encValue = Sanitizer::safeEncodeAttribute( $value );
|
2006-06-06 22:56:38 +00:00
|
|
|
|
|
|
|
|
|
|
$attribs[] = "$encAttribute=\"$encValue\"";
|
2005-02-06 12:46:31 +00:00
|
|
|
|
}
|
2006-01-07 08:50:07 +00:00
|
|
|
|
return count( $attribs ) ? ' ' . implode( ' ', $attribs ) : '';
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2006-06-09 21:21:00 +00:00
|
|
|
|
/**
|
|
|
|
|
|
* Encode an attribute value for HTML output.
|
|
|
|
|
|
* @param $text
|
|
|
|
|
|
* @return HTML-encoded text fragment
|
|
|
|
|
|
*/
|
2006-07-10 15:41:30 +00:00
|
|
|
|
static function encodeAttribute( $text ) {
|
2006-06-09 21:21:00 +00:00
|
|
|
|
$encValue = htmlspecialchars( $text );
|
|
|
|
|
|
|
|
|
|
|
|
// Whitespace is normalized during attribute decoding,
|
|
|
|
|
|
// so if we've been passed non-spaces we must encode them
|
|
|
|
|
|
// ahead of time or they won't be preserved.
|
|
|
|
|
|
$encValue = strtr( $encValue, array(
|
|
|
|
|
|
"\n" => ' ',
|
|
|
|
|
|
"\r" => ' ',
|
|
|
|
|
|
"\t" => '	',
|
|
|
|
|
|
) );
|
|
|
|
|
|
|
|
|
|
|
|
return $encValue;
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
|
* Encode an attribute value for HTML tags, with extra armoring
|
|
|
|
|
|
* against further wiki processing.
|
|
|
|
|
|
* @param $text
|
|
|
|
|
|
* @return HTML-encoded text fragment
|
|
|
|
|
|
*/
|
2006-07-10 15:41:30 +00:00
|
|
|
|
static function safeEncodeAttribute( $text ) {
|
2006-06-09 21:21:00 +00:00
|
|
|
|
$encValue = Sanitizer::encodeAttribute( $text );
|
|
|
|
|
|
|
|
|
|
|
|
# Templates and links may be expanded in later parsing,
|
|
|
|
|
|
# creating invalid or dangerous output. Suppress this.
|
|
|
|
|
|
$encValue = strtr( $encValue, array(
|
|
|
|
|
|
'<' => '<', // This should never happen,
|
|
|
|
|
|
'>' => '>', // we've received invalid input
|
|
|
|
|
|
'"' => '"', // which should have been escaped.
|
|
|
|
|
|
'{' => '{',
|
|
|
|
|
|
'[' => '[',
|
|
|
|
|
|
"''" => '''',
|
|
|
|
|
|
'ISBN' => 'ISBN',
|
|
|
|
|
|
'RFC' => 'RFC',
|
|
|
|
|
|
'PMID' => 'PMID',
|
|
|
|
|
|
'|' => '|',
|
|
|
|
|
|
'__' => '__',
|
|
|
|
|
|
) );
|
|
|
|
|
|
|
|
|
|
|
|
# Stupid hack
|
|
|
|
|
|
$encValue = preg_replace_callback(
|
|
|
|
|
|
'/(' . wfUrlProtocols() . ')/',
|
|
|
|
|
|
array( 'Sanitizer', 'armorLinksCallback' ),
|
|
|
|
|
|
$encValue );
|
|
|
|
|
|
return $encValue;
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2006-01-07 08:50:07 +00:00
|
|
|
|
/**
|
|
|
|
|
|
* Given a value escape it so that it can be used in an id attribute and
|
|
|
|
|
|
* return it, this does not validate the value however (see first link)
|
|
|
|
|
|
*
|
|
|
|
|
|
* @link http://www.w3.org/TR/html401/types.html#type-name Valid characters
|
|
|
|
|
|
* in the id and
|
|
|
|
|
|
* name attributes
|
|
|
|
|
|
* @link http://www.w3.org/TR/html401/struct/links.html#h-12.2.3 Anchors with the id attribute
|
|
|
|
|
|
*
|
|
|
|
|
|
* @bug 4461
|
|
|
|
|
|
*
|
|
|
|
|
|
* @static
|
|
|
|
|
|
*
|
|
|
|
|
|
* @param string $id
|
|
|
|
|
|
* @return string
|
|
|
|
|
|
*/
|
2006-07-10 15:41:30 +00:00
|
|
|
|
static function escapeId( $id ) {
|
2006-01-07 08:50:07 +00:00
|
|
|
|
static $replace = array(
|
|
|
|
|
|
'%3A' => ':',
|
|
|
|
|
|
'%' => '.'
|
|
|
|
|
|
);
|
2006-01-07 13:31:29 +00:00
|
|
|
|
|
2006-01-07 08:50:07 +00:00
|
|
|
|
$id = urlencode( Sanitizer::decodeCharReferences( strtr( $id, ' ', '_' ) ) );
|
|
|
|
|
|
|
|
|
|
|
|
return str_replace( array_keys( $replace ), array_values( $replace ), $id );
|
2005-02-06 12:46:31 +00:00
|
|
|
|
}
|
2006-01-07 13:31:29 +00:00
|
|
|
|
|
2005-08-23 21:49:48 +00:00
|
|
|
|
/**
|
|
|
|
|
|
* Regex replace callback for armoring links against further processing.
|
|
|
|
|
|
* @param array $matches
|
|
|
|
|
|
* @return string
|
2006-04-24 19:22:18 +00:00
|
|
|
|
* @private
|
2005-08-23 21:49:48 +00:00
|
|
|
|
*/
|
2006-07-10 15:41:30 +00:00
|
|
|
|
private static function armorLinksCallback( $matches ) {
|
2005-08-23 21:49:48 +00:00
|
|
|
|
return str_replace( ':', ':', $matches[1] );
|
|
|
|
|
|
}
|
2006-01-07 13:31:29 +00:00
|
|
|
|
|
2005-06-03 08:12:48 +00:00
|
|
|
|
/**
|
|
|
|
|
|
* Return an associative array of attribute names and values from
|
|
|
|
|
|
* a partial tag string. Attribute names are forces to lowercase,
|
|
|
|
|
|
* character references are decoded to UTF-8 text.
|
|
|
|
|
|
*
|
|
|
|
|
|
* @param string
|
|
|
|
|
|
* @return array
|
|
|
|
|
|
*/
|
2006-07-10 15:41:30 +00:00
|
|
|
|
static function decodeTagAttributes( $text ) {
|
2005-06-03 08:12:48 +00:00
|
|
|
|
$attribs = array();
|
2006-01-07 13:31:29 +00:00
|
|
|
|
|
2005-06-03 08:12:48 +00:00
|
|
|
|
if( trim( $text ) == '' ) {
|
|
|
|
|
|
return $attribs;
|
|
|
|
|
|
}
|
2005-12-04 20:43:42 +00:00
|
|
|
|
|
2006-01-07 13:31:29 +00:00
|
|
|
|
$pairs = array();
|
2005-06-03 08:12:48 +00:00
|
|
|
|
if( !preg_match_all(
|
|
|
|
|
|
MW_ATTRIBS_REGEX,
|
|
|
|
|
|
$text,
|
|
|
|
|
|
$pairs,
|
|
|
|
|
|
PREG_SET_ORDER ) ) {
|
|
|
|
|
|
return $attribs;
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
foreach( $pairs as $set ) {
|
|
|
|
|
|
$attribute = strtolower( $set[1] );
|
|
|
|
|
|
$value = Sanitizer::getTagAttributeCallback( $set );
|
2006-06-09 21:21:00 +00:00
|
|
|
|
|
|
|
|
|
|
// Normalize whitespace
|
|
|
|
|
|
$value = preg_replace( '/[\t\r\n ]+/', ' ', $value );
|
|
|
|
|
|
$value = trim( $value );
|
|
|
|
|
|
|
|
|
|
|
|
// Decode character references
|
2005-06-03 08:12:48 +00:00
|
|
|
|
$attribs[$attribute] = Sanitizer::decodeCharReferences( $value );
|
|
|
|
|
|
}
|
|
|
|
|
|
return $attribs;
|
|
|
|
|
|
}
|
2006-01-07 13:31:29 +00:00
|
|
|
|
|
2005-06-03 08:12:48 +00:00
|
|
|
|
/**
|
|
|
|
|
|
* Pick the appropriate attribute value from a match set from the
|
|
|
|
|
|
* MW_ATTRIBS_REGEX matches.
|
|
|
|
|
|
*
|
|
|
|
|
|
* @param array $set
|
|
|
|
|
|
* @return string
|
2006-04-24 19:22:18 +00:00
|
|
|
|
* @private
|
2005-06-03 08:12:48 +00:00
|
|
|
|
*/
|
2006-07-10 15:41:30 +00:00
|
|
|
|
private static function getTagAttributeCallback( $set ) {
|
2005-06-03 08:12:48 +00:00
|
|
|
|
if( isset( $set[6] ) ) {
|
|
|
|
|
|
# Illegal #XXXXXX color with no quotes.
|
|
|
|
|
|
return $set[6];
|
|
|
|
|
|
} elseif( isset( $set[5] ) ) {
|
|
|
|
|
|
# No quotes.
|
|
|
|
|
|
return $set[5];
|
|
|
|
|
|
} elseif( isset( $set[4] ) ) {
|
|
|
|
|
|
# Single-quoted
|
|
|
|
|
|
return $set[4];
|
|
|
|
|
|
} elseif( isset( $set[3] ) ) {
|
|
|
|
|
|
# Double-quoted
|
|
|
|
|
|
return $set[3];
|
|
|
|
|
|
} elseif( !isset( $set[2] ) ) {
|
|
|
|
|
|
# In XHTML, attributes must have a value.
|
|
|
|
|
|
# For 'reduced' form, return explicitly the attribute name here.
|
|
|
|
|
|
return $set[1];
|
|
|
|
|
|
} else {
|
2006-06-07 06:40:24 +00:00
|
|
|
|
throw new MWException( "Tag conditions not met. This should never happen and is a bug." );
|
2005-06-03 08:12:48 +00:00
|
|
|
|
}
|
|
|
|
|
|
}
|
2006-01-07 13:31:29 +00:00
|
|
|
|
|
2005-02-06 12:46:31 +00:00
|
|
|
|
/**
|
|
|
|
|
|
* Normalize whitespace and character references in an XML source-
|
|
|
|
|
|
* encoded text for an attribute value.
|
|
|
|
|
|
*
|
|
|
|
|
|
* See http://www.w3.org/TR/REC-xml/#AVNormalize for background,
|
|
|
|
|
|
* but note that we're not returning the value, but are returning
|
|
|
|
|
|
* XML source fragments that will be slapped into output.
|
2005-02-06 06:44:48 +00:00
|
|
|
|
*
|
2005-02-06 12:46:31 +00:00
|
|
|
|
* @param string $text
|
|
|
|
|
|
* @return string
|
2006-04-24 19:22:18 +00:00
|
|
|
|
* @private
|
2005-02-06 06:44:48 +00:00
|
|
|
|
*/
|
2006-07-10 15:41:30 +00:00
|
|
|
|
private static function normalizeAttributeValue( $text ) {
|
2005-06-03 08:12:48 +00:00
|
|
|
|
return str_replace( '"', '"',
|
|
|
|
|
|
preg_replace(
|
|
|
|
|
|
'/\r\n|[\x20\x0d\x0a\x09]/',
|
|
|
|
|
|
' ',
|
|
|
|
|
|
Sanitizer::normalizeCharReferences( $text ) ) );
|
2005-02-06 06:44:48 +00:00
|
|
|
|
}
|
2006-01-07 13:31:29 +00:00
|
|
|
|
|
2005-02-06 06:44:48 +00:00
|
|
|
|
/**
|
2005-02-06 12:46:31 +00:00
|
|
|
|
* Ensure that any entities and character references are legal
|
|
|
|
|
|
* for XML and XHTML specifically. Any stray bits will be
|
|
|
|
|
|
* &-escaped to result in a valid text fragment.
|
2005-02-06 06:44:48 +00:00
|
|
|
|
*
|
2005-02-06 12:46:31 +00:00
|
|
|
|
* a. any named char refs must be known in XHTML
|
|
|
|
|
|
* b. any numeric char refs must be legal chars, not invalid or forbidden
|
|
|
|
|
|
* c. use &#x, not &#X
|
|
|
|
|
|
* d. fix or reject non-valid attributes
|
|
|
|
|
|
*
|
|
|
|
|
|
* @param string $text
|
|
|
|
|
|
* @return string
|
2006-04-24 19:22:18 +00:00
|
|
|
|
* @private
|
2005-02-06 06:44:48 +00:00
|
|
|
|
*/
|
2006-07-10 15:41:30 +00:00
|
|
|
|
static function normalizeCharReferences( $text ) {
|
2005-02-06 12:46:31 +00:00
|
|
|
|
return preg_replace_callback(
|
2005-05-31 11:54:36 +00:00
|
|
|
|
MW_CHAR_REFS_REGEX,
|
2005-02-06 12:46:31 +00:00
|
|
|
|
array( 'Sanitizer', 'normalizeCharReferencesCallback' ),
|
|
|
|
|
|
$text );
|
|
|
|
|
|
}
|
2005-04-01 23:24:26 +00:00
|
|
|
|
/**
|
|
|
|
|
|
* @param string $matches
|
|
|
|
|
|
* @return string
|
|
|
|
|
|
*/
|
2006-07-10 15:41:30 +00:00
|
|
|
|
static function normalizeCharReferencesCallback( $matches ) {
|
2005-02-06 12:46:31 +00:00
|
|
|
|
$ret = null;
|
|
|
|
|
|
if( $matches[1] != '' ) {
|
|
|
|
|
|
$ret = Sanitizer::normalizeEntity( $matches[1] );
|
|
|
|
|
|
} elseif( $matches[2] != '' ) {
|
|
|
|
|
|
$ret = Sanitizer::decCharReference( $matches[2] );
|
|
|
|
|
|
} elseif( $matches[3] != '' ) {
|
|
|
|
|
|
$ret = Sanitizer::hexCharReference( $matches[3] );
|
|
|
|
|
|
} elseif( $matches[4] != '' ) {
|
|
|
|
|
|
$ret = Sanitizer::hexCharReference( $matches[4] );
|
2005-02-06 06:44:48 +00:00
|
|
|
|
}
|
2005-02-06 12:46:31 +00:00
|
|
|
|
if( is_null( $ret ) ) {
|
|
|
|
|
|
return htmlspecialchars( $matches[0] );
|
|
|
|
|
|
} else {
|
|
|
|
|
|
return $ret;
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
2006-01-07 13:31:29 +00:00
|
|
|
|
|
2005-02-06 12:46:31 +00:00
|
|
|
|
/**
|
|
|
|
|
|
* If the named entity is defined in the HTML 4.0/XHTML 1.0 DTD,
|
|
|
|
|
|
* return the named entity reference as is. Otherwise, returns
|
|
|
|
|
|
* HTML-escaped text of pseudo-entity source (eg &foo;)
|
|
|
|
|
|
*
|
2005-04-01 23:24:26 +00:00
|
|
|
|
* @param string $name
|
2005-02-06 12:46:31 +00:00
|
|
|
|
* @return string
|
2006-07-10 15:41:30 +00:00
|
|
|
|
* @static
|
2005-02-06 12:46:31 +00:00
|
|
|
|
*/
|
2006-07-10 15:41:30 +00:00
|
|
|
|
static function normalizeEntity( $name ) {
|
2005-05-31 11:54:36 +00:00
|
|
|
|
global $wgHtmlEntities;
|
|
|
|
|
|
if( isset( $wgHtmlEntities[$name] ) ) {
|
2005-02-06 12:46:31 +00:00
|
|
|
|
return "&$name;";
|
|
|
|
|
|
} else {
|
|
|
|
|
|
return "&$name;";
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
2006-01-07 13:31:29 +00:00
|
|
|
|
|
2006-07-10 15:41:30 +00:00
|
|
|
|
static function decCharReference( $codepoint ) {
|
2005-08-16 23:36:16 +00:00
|
|
|
|
$point = intval( $codepoint );
|
2005-02-06 12:46:31 +00:00
|
|
|
|
if( Sanitizer::validateCodepoint( $point ) ) {
|
|
|
|
|
|
return sprintf( '&#%d;', $point );
|
|
|
|
|
|
} else {
|
|
|
|
|
|
return null;
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
2006-01-07 13:31:29 +00:00
|
|
|
|
|
2006-07-10 15:41:30 +00:00
|
|
|
|
static function hexCharReference( $codepoint ) {
|
2005-02-06 12:46:31 +00:00
|
|
|
|
$point = hexdec( $codepoint );
|
|
|
|
|
|
if( Sanitizer::validateCodepoint( $point ) ) {
|
|
|
|
|
|
return sprintf( '&#x%x;', $point );
|
|
|
|
|
|
} else {
|
|
|
|
|
|
return null;
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
2006-01-07 13:31:29 +00:00
|
|
|
|
|
2005-02-06 12:46:31 +00:00
|
|
|
|
/**
|
|
|
|
|
|
* Returns true if a given Unicode codepoint is a valid character in XML.
|
|
|
|
|
|
* @param int $codepoint
|
|
|
|
|
|
* @return bool
|
|
|
|
|
|
*/
|
2006-07-10 15:41:30 +00:00
|
|
|
|
private static function validateCodepoint( $codepoint ) {
|
2005-02-06 12:46:31 +00:00
|
|
|
|
return ($codepoint == 0x09)
|
|
|
|
|
|
|| ($codepoint == 0x0a)
|
|
|
|
|
|
|| ($codepoint == 0x0d)
|
|
|
|
|
|
|| ($codepoint >= 0x20 && $codepoint <= 0xd7ff)
|
|
|
|
|
|
|| ($codepoint >= 0xe000 && $codepoint <= 0xfffd)
|
|
|
|
|
|
|| ($codepoint >= 0x10000 && $codepoint <= 0x10ffff);
|
|
|
|
|
|
}
|
2005-02-06 06:44:48 +00:00
|
|
|
|
|
2005-05-31 11:54:36 +00:00
|
|
|
|
/**
|
|
|
|
|
|
* Decode any character references, numeric or named entities,
|
|
|
|
|
|
* in the text and return a UTF-8 string.
|
|
|
|
|
|
*
|
|
|
|
|
|
* @param string $text
|
|
|
|
|
|
* @return string
|
2006-04-24 19:22:18 +00:00
|
|
|
|
* @public
|
2006-07-10 15:08:51 +00:00
|
|
|
|
* @static
|
2005-05-31 11:54:36 +00:00
|
|
|
|
*/
|
2006-07-10 15:08:51 +00:00
|
|
|
|
public static function decodeCharReferences( $text ) {
|
2005-05-31 11:54:36 +00:00
|
|
|
|
return preg_replace_callback(
|
|
|
|
|
|
MW_CHAR_REFS_REGEX,
|
|
|
|
|
|
array( 'Sanitizer', 'decodeCharReferencesCallback' ),
|
|
|
|
|
|
$text );
|
|
|
|
|
|
}
|
2006-01-07 13:31:29 +00:00
|
|
|
|
|
2005-05-31 11:54:36 +00:00
|
|
|
|
/**
|
|
|
|
|
|
* @param string $matches
|
|
|
|
|
|
* @return string
|
|
|
|
|
|
*/
|
2006-07-10 15:08:51 +00:00
|
|
|
|
static function decodeCharReferencesCallback( $matches ) {
|
2005-05-31 11:54:36 +00:00
|
|
|
|
if( $matches[1] != '' ) {
|
|
|
|
|
|
return Sanitizer::decodeEntity( $matches[1] );
|
|
|
|
|
|
} elseif( $matches[2] != '' ) {
|
|
|
|
|
|
return Sanitizer::decodeChar( intval( $matches[2] ) );
|
|
|
|
|
|
} elseif( $matches[3] != '' ) {
|
|
|
|
|
|
return Sanitizer::decodeChar( hexdec( $matches[3] ) );
|
|
|
|
|
|
} elseif( $matches[4] != '' ) {
|
|
|
|
|
|
return Sanitizer::decodeChar( hexdec( $matches[4] ) );
|
|
|
|
|
|
}
|
|
|
|
|
|
# Last case should be an ampersand by itself
|
|
|
|
|
|
return $matches[0];
|
|
|
|
|
|
}
|
2006-01-07 13:31:29 +00:00
|
|
|
|
|
2005-05-31 11:54:36 +00:00
|
|
|
|
/**
|
|
|
|
|
|
* Return UTF-8 string for a codepoint if that is a valid
|
|
|
|
|
|
* character reference, otherwise U+FFFD REPLACEMENT CHARACTER.
|
|
|
|
|
|
* @param int $codepoint
|
|
|
|
|
|
* @return string
|
2006-04-24 19:22:18 +00:00
|
|
|
|
* @private
|
2005-05-31 11:54:36 +00:00
|
|
|
|
*/
|
2006-07-10 15:41:30 +00:00
|
|
|
|
static function decodeChar( $codepoint ) {
|
2005-05-31 11:54:36 +00:00
|
|
|
|
if( Sanitizer::validateCodepoint( $codepoint ) ) {
|
|
|
|
|
|
return codepointToUtf8( $codepoint );
|
|
|
|
|
|
} else {
|
|
|
|
|
|
return UTF8_REPLACEMENT;
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
2006-01-07 13:31:29 +00:00
|
|
|
|
|
2005-05-31 11:54:36 +00:00
|
|
|
|
/**
|
|
|
|
|
|
* If the named entity is defined in the HTML 4.0/XHTML 1.0 DTD,
|
|
|
|
|
|
* return the UTF-8 encoding of that character. Otherwise, returns
|
|
|
|
|
|
* pseudo-entity source (eg &foo;)
|
|
|
|
|
|
*
|
|
|
|
|
|
* @param string $name
|
|
|
|
|
|
* @return string
|
|
|
|
|
|
*/
|
2006-07-10 15:41:30 +00:00
|
|
|
|
static function decodeEntity( $name ) {
|
2005-05-31 11:54:36 +00:00
|
|
|
|
global $wgHtmlEntities;
|
|
|
|
|
|
if( isset( $wgHtmlEntities[$name] ) ) {
|
|
|
|
|
|
return codepointToUtf8( $wgHtmlEntities[$name] );
|
|
|
|
|
|
} else {
|
|
|
|
|
|
return "&$name;";
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
2006-01-07 13:31:29 +00:00
|
|
|
|
|
2005-02-06 12:46:31 +00:00
|
|
|
|
/**
|
|
|
|
|
|
* Fetch the whitelist of acceptable attributes for a given
|
|
|
|
|
|
* element name.
|
|
|
|
|
|
*
|
|
|
|
|
|
* @param string $element
|
|
|
|
|
|
* @return array
|
|
|
|
|
|
*/
|
2006-07-10 15:41:30 +00:00
|
|
|
|
static function attributeWhitelist( $element ) {
|
2005-05-31 10:21:14 +00:00
|
|
|
|
static $list;
|
|
|
|
|
|
if( !isset( $list ) ) {
|
|
|
|
|
|
$list = Sanitizer::setupAttributeWhitelist();
|
|
|
|
|
|
}
|
2005-02-06 12:46:31 +00:00
|
|
|
|
return isset( $list[$element] )
|
|
|
|
|
|
? $list[$element]
|
|
|
|
|
|
: array();
|
|
|
|
|
|
}
|
2006-01-07 13:31:29 +00:00
|
|
|
|
|
2005-02-06 12:46:31 +00:00
|
|
|
|
/**
|
2006-07-10 15:41:30 +00:00
|
|
|
|
* @todo Document it a bit
|
2005-02-06 12:46:31 +00:00
|
|
|
|
* @return array
|
|
|
|
|
|
*/
|
2006-07-10 15:41:30 +00:00
|
|
|
|
static function setupAttributeWhitelist() {
|
2005-02-06 12:46:31 +00:00
|
|
|
|
$common = array( 'id', 'class', 'lang', 'dir', 'title', 'style' );
|
|
|
|
|
|
$block = array_merge( $common, array( 'align' ) );
|
|
|
|
|
|
$tablealign = array( 'align', 'char', 'charoff', 'valign' );
|
|
|
|
|
|
$tablecell = array( 'abbr',
|
|
|
|
|
|
'axis',
|
|
|
|
|
|
'headers',
|
|
|
|
|
|
'scope',
|
|
|
|
|
|
'rowspan',
|
|
|
|
|
|
'colspan',
|
|
|
|
|
|
'nowrap', # deprecated
|
2005-05-12 08:54:23 +00:00
|
|
|
|
'width', # deprecated
|
|
|
|
|
|
'height', # deprecated
|
|
|
|
|
|
'bgcolor' # deprecated
|
2005-02-06 12:46:31 +00:00
|
|
|
|
);
|
2006-01-07 13:31:29 +00:00
|
|
|
|
|
2005-02-06 12:46:31 +00:00
|
|
|
|
# Numbers refer to sections in HTML 4.01 standard describing the element.
|
|
|
|
|
|
# See: http://www.w3.org/TR/html4/
|
|
|
|
|
|
$whitelist = array (
|
|
|
|
|
|
# 7.5.4
|
|
|
|
|
|
'div' => $block,
|
|
|
|
|
|
'center' => $common, # deprecated
|
|
|
|
|
|
'span' => $block, # ??
|
2006-01-07 13:31:29 +00:00
|
|
|
|
|
2005-02-06 12:46:31 +00:00
|
|
|
|
# 7.5.5
|
|
|
|
|
|
'h1' => $block,
|
|
|
|
|
|
'h2' => $block,
|
|
|
|
|
|
'h3' => $block,
|
|
|
|
|
|
'h4' => $block,
|
|
|
|
|
|
'h5' => $block,
|
|
|
|
|
|
'h6' => $block,
|
2006-01-07 13:31:29 +00:00
|
|
|
|
|
2005-02-06 12:46:31 +00:00
|
|
|
|
# 7.5.6
|
|
|
|
|
|
# address
|
2006-01-07 13:31:29 +00:00
|
|
|
|
|
2005-02-06 12:46:31 +00:00
|
|
|
|
# 8.2.4
|
|
|
|
|
|
# bdo
|
2006-01-07 13:31:29 +00:00
|
|
|
|
|
2005-02-06 12:46:31 +00:00
|
|
|
|
# 9.2.1
|
|
|
|
|
|
'em' => $common,
|
|
|
|
|
|
'strong' => $common,
|
|
|
|
|
|
'cite' => $common,
|
|
|
|
|
|
# dfn
|
|
|
|
|
|
'code' => $common,
|
|
|
|
|
|
# samp
|
|
|
|
|
|
# kbd
|
|
|
|
|
|
'var' => $common,
|
|
|
|
|
|
# abbr
|
|
|
|
|
|
# acronym
|
2006-01-07 13:31:29 +00:00
|
|
|
|
|
2005-02-06 12:46:31 +00:00
|
|
|
|
# 9.2.2
|
|
|
|
|
|
'blockquote' => array_merge( $common, array( 'cite' ) ),
|
|
|
|
|
|
# q
|
2006-01-07 13:31:29 +00:00
|
|
|
|
|
2005-02-06 12:46:31 +00:00
|
|
|
|
# 9.2.3
|
|
|
|
|
|
'sub' => $common,
|
|
|
|
|
|
'sup' => $common,
|
2006-01-07 13:31:29 +00:00
|
|
|
|
|
2005-02-06 12:46:31 +00:00
|
|
|
|
# 9.3.1
|
|
|
|
|
|
'p' => $block,
|
2006-01-07 13:31:29 +00:00
|
|
|
|
|
2005-02-06 12:46:31 +00:00
|
|
|
|
# 9.3.2
|
|
|
|
|
|
'br' => array( 'id', 'class', 'title', 'style', 'clear' ),
|
2006-01-07 13:31:29 +00:00
|
|
|
|
|
2005-02-06 12:46:31 +00:00
|
|
|
|
# 9.3.4
|
|
|
|
|
|
'pre' => array_merge( $common, array( 'width' ) ),
|
2006-01-07 13:31:29 +00:00
|
|
|
|
|
2005-02-06 12:46:31 +00:00
|
|
|
|
# 9.4
|
|
|
|
|
|
'ins' => array_merge( $common, array( 'cite', 'datetime' ) ),
|
|
|
|
|
|
'del' => array_merge( $common, array( 'cite', 'datetime' ) ),
|
2006-01-07 13:31:29 +00:00
|
|
|
|
|
2005-02-06 12:46:31 +00:00
|
|
|
|
# 10.2
|
|
|
|
|
|
'ul' => array_merge( $common, array( 'type' ) ),
|
|
|
|
|
|
'ol' => array_merge( $common, array( 'type', 'start' ) ),
|
|
|
|
|
|
'li' => array_merge( $common, array( 'type', 'value' ) ),
|
2006-01-07 13:31:29 +00:00
|
|
|
|
|
2005-02-06 12:46:31 +00:00
|
|
|
|
# 10.3
|
|
|
|
|
|
'dl' => $common,
|
|
|
|
|
|
'dd' => $common,
|
|
|
|
|
|
'dt' => $common,
|
2006-01-07 13:31:29 +00:00
|
|
|
|
|
2005-02-06 12:46:31 +00:00
|
|
|
|
# 11.2.1
|
|
|
|
|
|
'table' => array_merge( $common,
|
|
|
|
|
|
array( 'summary', 'width', 'border', 'frame',
|
2006-07-10 09:13:50 +00:00
|
|
|
|
'rules', 'cellspacing', 'cellpadding',
|
2006-07-11 16:39:51 +00:00
|
|
|
|
'align', 'bgcolor',
|
2006-07-10 09:13:50 +00:00
|
|
|
|
) ),
|
2006-01-07 13:31:29 +00:00
|
|
|
|
|
2005-02-06 12:46:31 +00:00
|
|
|
|
# 11.2.2
|
|
|
|
|
|
'caption' => array_merge( $common, array( 'align' ) ),
|
2006-01-07 13:31:29 +00:00
|
|
|
|
|
2005-02-06 12:46:31 +00:00
|
|
|
|
# 11.2.3
|
|
|
|
|
|
'thead' => array_merge( $common, $tablealign ),
|
|
|
|
|
|
'tfoot' => array_merge( $common, $tablealign ),
|
|
|
|
|
|
'tbody' => array_merge( $common, $tablealign ),
|
2006-01-07 13:31:29 +00:00
|
|
|
|
|
2005-02-06 12:46:31 +00:00
|
|
|
|
# 11.2.4
|
|
|
|
|
|
'colgroup' => array_merge( $common, array( 'span', 'width' ), $tablealign ),
|
|
|
|
|
|
'col' => array_merge( $common, array( 'span', 'width' ), $tablealign ),
|
2006-01-07 13:31:29 +00:00
|
|
|
|
|
2005-02-06 12:46:31 +00:00
|
|
|
|
# 11.2.5
|
|
|
|
|
|
'tr' => array_merge( $common, array( 'bgcolor' ), $tablealign ),
|
2006-01-07 13:31:29 +00:00
|
|
|
|
|
2005-02-06 12:46:31 +00:00
|
|
|
|
# 11.2.6
|
|
|
|
|
|
'td' => array_merge( $common, $tablecell, $tablealign ),
|
|
|
|
|
|
'th' => array_merge( $common, $tablecell, $tablealign ),
|
2006-01-07 13:31:29 +00:00
|
|
|
|
|
2005-02-06 12:46:31 +00:00
|
|
|
|
# 15.2.1
|
|
|
|
|
|
'tt' => $common,
|
|
|
|
|
|
'b' => $common,
|
|
|
|
|
|
'i' => $common,
|
|
|
|
|
|
'big' => $common,
|
|
|
|
|
|
'small' => $common,
|
|
|
|
|
|
'strike' => $common,
|
|
|
|
|
|
's' => $common,
|
|
|
|
|
|
'u' => $common,
|
2006-01-07 13:31:29 +00:00
|
|
|
|
|
2005-02-06 12:46:31 +00:00
|
|
|
|
# 15.2.2
|
|
|
|
|
|
'font' => array_merge( $common, array( 'size', 'color', 'face' ) ),
|
|
|
|
|
|
# basefont
|
2006-01-07 13:31:29 +00:00
|
|
|
|
|
2005-02-06 12:46:31 +00:00
|
|
|
|
# 15.3
|
|
|
|
|
|
'hr' => array_merge( $common, array( 'noshade', 'size', 'width' ) ),
|
2006-01-07 13:31:29 +00:00
|
|
|
|
|
2005-02-06 16:13:06 +00:00
|
|
|
|
# XHTML Ruby annotation text module, simple ruby only.
|
|
|
|
|
|
# http://www.w3c.org/TR/ruby/
|
|
|
|
|
|
'ruby' => $common,
|
|
|
|
|
|
# rbc
|
|
|
|
|
|
# rtc
|
2005-02-06 12:46:31 +00:00
|
|
|
|
'rb' => $common,
|
2005-02-06 16:13:06 +00:00
|
|
|
|
'rt' => $common, #array_merge( $common, array( 'rbspan' ) ),
|
2005-02-06 12:46:31 +00:00
|
|
|
|
'rp' => $common,
|
|
|
|
|
|
);
|
|
|
|
|
|
return $whitelist;
|
2005-02-06 06:44:48 +00:00
|
|
|
|
}
|
2006-01-07 13:31:29 +00:00
|
|
|
|
|
2005-02-07 03:56:22 +00:00
|
|
|
|
/**
|
|
|
|
|
|
* Take a fragment of (potentially invalid) HTML and return
|
|
|
|
|
|
* a version with any tags removed, encoded suitably for literal
|
|
|
|
|
|
* inclusion in an attribute value.
|
|
|
|
|
|
*
|
|
|
|
|
|
* @param string $text HTML fragment
|
|
|
|
|
|
* @return string
|
|
|
|
|
|
*/
|
2006-07-10 15:41:30 +00:00
|
|
|
|
static function stripAllTags( $text ) {
|
2005-02-07 03:56:22 +00:00
|
|
|
|
# Actual <tags>
|
2006-01-07 08:50:07 +00:00
|
|
|
|
$text = preg_replace( '/ < .*? > /x', '', $text );
|
2006-01-07 13:31:29 +00:00
|
|
|
|
|
2005-02-07 03:56:22 +00:00
|
|
|
|
# Normalize &entities and whitespace
|
|
|
|
|
|
$text = Sanitizer::normalizeAttributeValue( $text );
|
2006-01-07 13:31:29 +00:00
|
|
|
|
|
2005-02-07 03:56:22 +00:00
|
|
|
|
# Will be placed into "double-quoted" attributes,
|
|
|
|
|
|
# make sure remaining bits are safe.
|
|
|
|
|
|
$text = str_replace(
|
|
|
|
|
|
array('<', '>', '"'),
|
|
|
|
|
|
array('<', '>', '"'),
|
|
|
|
|
|
$text );
|
2006-01-07 13:31:29 +00:00
|
|
|
|
|
2005-02-07 03:56:22 +00:00
|
|
|
|
return $text;
|
|
|
|
|
|
}
|
2005-02-06 06:44:48 +00:00
|
|
|
|
|
2006-01-14 17:42:08 +00:00
|
|
|
|
/**
|
|
|
|
|
|
* Hack up a private DOCTYPE with HTML's standard entity declarations.
|
|
|
|
|
|
* PHP 4 seemed to know these if you gave it an HTML doctype, but
|
|
|
|
|
|
* PHP 5.1 doesn't.
|
|
|
|
|
|
*
|
|
|
|
|
|
* Use for passing XHTML fragments to PHP's XML parsing functions
|
|
|
|
|
|
*
|
|
|
|
|
|
* @return string
|
|
|
|
|
|
* @static
|
|
|
|
|
|
*/
|
2006-07-10 15:41:30 +00:00
|
|
|
|
static function hackDocType() {
|
2006-01-14 17:42:08 +00:00
|
|
|
|
global $wgHtmlEntities;
|
|
|
|
|
|
$out = "<!DOCTYPE html [\n";
|
|
|
|
|
|
foreach( $wgHtmlEntities as $entity => $codepoint ) {
|
|
|
|
|
|
$out .= "<!ENTITY $entity \"&#$codepoint;\">";
|
|
|
|
|
|
}
|
|
|
|
|
|
$out .= "]>\n";
|
|
|
|
|
|
return $out;
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2005-02-06 06:44:48 +00:00
|
|
|
|
}
|
|
|
|
|
|
|
2005-04-01 23:24:26 +00:00
|
|
|
|
?>
|