History for stripHTML
??changed:
-
"stripHTML" Proposal
Example of implementation
<dtml-var userobject fmt=filtertags>
Goals
o Allow malicious HTML code to be filtered out of text that is input
by untrusted users.
Proposed Changes
Add to DTML Documents and Methods a processing step which recognizes
SGML tags with a 'filtertags' attribute. Parse and replace these tags
with filtered versions of the text. The level of filering should be
possible to specify, say, at high levels it removes everything that is
normally parsed as a tag, lower levels allow things like URL links and
lists/formatting, but not image tags and the script tag.
It would probably be smart to subclass a SGML-parser-class from the
python sources when implementing.
Result
It would be possible to achieve a higher level of security when dealing
with untrusted users. And to preserve own HTML structure intact.
Other
I know this has been discussed, but never saw anything concrete come
out of those discussions. Mail me at mailto:[email protected]
if there already is a simple way to achieve this.
<i>Current Solution:
Yes there is an easy way to achieve this using
_.getitem("foo") which is shorthand for
_.getitem("foo",0). This inserts the object contents
and and automagically turns the HTML delimiters into harmless entities.
This will also turn off server-side rendering of the DTML code too.
--[Caseman]</i>