aboutsummaryrefslogtreecommitdiffstats
path: root/src/sanitizer.js
AgeCommit message (Collapse)Author
2011-07-18feat(strict mode): adding strict mode flag to all js filesIgor Minar
the flag must be in all src and test files so that we get the benefit of running in the strict mode even in jstd the following script was used to modify all files: for file in `find src test -name "*.js"`; do echo -e "'use strict';\n" > temp.txt cat $file >> temp.txt mv temp.txt $file done
2011-06-08Proper handling of special attributes in jqliteMisko Hevery
2011-02-04smarter normalization of value on option, and htmlParser fixesMisko Hevery
2011-02-03fixed population of value attribute on optionMisko Hevery
The value attribute must be populated manually, since different browsers default to different value of option when not explicitly defined.
2011-01-24fixed example rendering, add tests for it.Misko Hevery
2011-01-10Rename angular.foreach to angular.forEach to make the api consistent.Igor Minar
camelcase is used for other angular functions and forEach is also used by EcmaScript standard. - rename the internal as well as the external function name - tweak the implementation of the function so that it doesn't clober it self when we extend the angular object with an object that has a forEach property equal to this forEach function Closes #85
2010-12-06fixing closure compiler warningsIgor Minar
2010-12-06fixing lint warnings in older codeIgor Minar
2010-12-03Fix sanitization issues as suggested by evnMisko Hevery
2010-11-29Fixed sanitizationMisko Hevery
* explicitly require full URLs (ftp|https?://...) * list the URI attributes * remove a lot of unneeded attributes
2010-10-26fix closure compile warningsMisko Hevery
2010-10-26create HTML sanitizer to allow inclusion of untrusted HTML in safe manner.Misko Hevery
Sanitization works in two phases: 1) We parse the HTML into sax-like events (start, end, chars). HTML parsing is very complex, and so it may very well be that what most browser consider valid HTML may not pares properly here, but we do best effort. We treat this parser as untrusted. 2) We have safe sanitizeWriter which treats its input (start, end, chars) as untrusted content and escapes everything. It only allows elements in the whitelist and only allows attributes which are whitelisted. Any attribute value must not start with 'javascript:'. This check is performed after escaping for entity (&xAB; etc..) and ignoring any whitespace. - Correct linky filter to use safeHtmlWriter - Correct html filter to use safeHtmlWriter Close #33; Close #34