org.owasp.html.Sanitizers Maven / Gradle / Ivy
// Copyright (c) 2011, Mike Samuel
// All rights reserved.
//
// Redistribution and use in source and binary forms, with or without
// modification, are permitted provided that the following conditions
// are met:
//
// Redistributions of source code must retain the above copyright
// notice, this list of conditions and the following disclaimer.
// Redistributions in binary form must reproduce the above copyright
// notice, this list of conditions and the following disclaimer in the
// documentation and/or other materials provided with the distribution.
// Neither the name of the OWASP nor the names of its contributors may
// be used to endorse or promote products derived from this software
// without specific prior written permission.
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
// "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
// LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
// FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
// COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
// INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
// BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
// LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
// CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
// LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
// ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
// POSSIBILITY OF SUCH DAMAGE.
package org.owasp.html;
/**
* Pre-packaged HTML sanitizer policies.
*
*
* These policies can be used to sanitize content.
*
*
* Sanitizers.FORMATTING.sanitize({@code "Hello, World!"})
*
* and can be chained
*
* PolicyFactory sanitizer = Sanitizers.FORMATTING.and(Sanitizers.BLOCKS);
* System.out.println(sanitizer.sanitize({@code "Hello, World!"}));
*
*
*
* For more fine-grained control over sanitization, use
* {@link HtmlPolicyBuilder}.
*
*
* @author Mike Samuel
*/
public final class Sanitizers {
/**
* Allows common formatting elements including {@code }, {@code }, etc.
*/
public static final PolicyFactory FORMATTING = new HtmlPolicyBuilder()
.allowCommonInlineFormattingElements().toFactory();
/**
* Allows common block elements including <p>
,
* <h1>
, etc.
*/
public static final PolicyFactory BLOCKS = new HtmlPolicyBuilder()
.allowCommonBlockElements().toFactory();
/**
* Allows certain safe CSS properties in {@code style="..."} attributes.
*/
public static final PolicyFactory STYLES = new HtmlPolicyBuilder()
.allowStyling().toFactory();
/**
* Allows HTTP, HTTPS, MAILTO, and relative links.
*/
public static final PolicyFactory LINKS = new HtmlPolicyBuilder()
.allowStandardUrlProtocols().allowElements("a")
.allowAttributes("href").onElements("a").requireRelNofollowOnLinks()
.toFactory();
private static final AttributePolicy INTEGER = new AttributePolicy() {
public String apply(
String elementName, String attributeName, String value) {
int n = value.length();
if (n == 0) { return null; }
for (int i = 0; i < n; ++i) {
char ch = value.charAt(i);
if (ch == '.') {
if (i == 0) { return null; }
return value.substring(0, i); // truncate to integer.
} else if (!('0' <= ch && ch <= '9')) {
return null;
}
}
return value;
}
};
/**
* Allows {@code } elements from HTTP, HTTPS, and relative sources.
*/
public static final PolicyFactory IMAGES = new HtmlPolicyBuilder()
.allowUrlProtocols("http", "https").allowElements("img")
.allowAttributes("alt", "src").onElements("img")
.allowAttributes("border", "height", "width").matching(INTEGER)
.onElements("img")
.toFactory();
private Sanitizers() {
// Uninstantiable.
}
}