408 lines
14 KiB
Python
408 lines
14 KiB
Python
"""HTML utilities suitable for global use."""
|
|
|
|
import html
|
|
import json
|
|
import re
|
|
from html.parser import HTMLParser
|
|
from urllib.parse import (
|
|
parse_qsl, quote, unquote, urlencode, urlsplit, urlunsplit,
|
|
)
|
|
|
|
from django.utils.encoding import punycode
|
|
from django.utils.functional import Promise, keep_lazy, keep_lazy_text
|
|
from django.utils.http import RFC3986_GENDELIMS, RFC3986_SUBDELIMS
|
|
from django.utils.regex_helper import _lazy_re_compile
|
|
from django.utils.safestring import SafeData, SafeString, mark_safe
|
|
from django.utils.text import normalize_newlines
|
|
|
|
|
|
@keep_lazy(str, SafeString)
|
|
def escape(text):
|
|
"""
|
|
Return the given text with ampersands, quotes and angle brackets encoded
|
|
for use in HTML.
|
|
|
|
Always escape input, even if it's already escaped and marked as such.
|
|
This may result in double-escaping. If this is a concern, use
|
|
conditional_escape() instead.
|
|
"""
|
|
return mark_safe(html.escape(str(text)))
|
|
|
|
|
|
_js_escapes = {
|
|
ord('\\'): '\\u005C',
|
|
ord('\''): '\\u0027',
|
|
ord('"'): '\\u0022',
|
|
ord('>'): '\\u003E',
|
|
ord('<'): '\\u003C',
|
|
ord('&'): '\\u0026',
|
|
ord('='): '\\u003D',
|
|
ord('-'): '\\u002D',
|
|
ord(';'): '\\u003B',
|
|
ord('`'): '\\u0060',
|
|
ord('\u2028'): '\\u2028',
|
|
ord('\u2029'): '\\u2029'
|
|
}
|
|
|
|
# Escape every ASCII character with a value less than 32.
|
|
_js_escapes.update((ord('%c' % z), '\\u%04X' % z) for z in range(32))
|
|
|
|
|
|
@keep_lazy(str, SafeString)
|
|
def escapejs(value):
|
|
"""Hex encode characters for use in JavaScript strings."""
|
|
return mark_safe(str(value).translate(_js_escapes))
|
|
|
|
|
|
_json_script_escapes = {
|
|
ord('>'): '\\u003E',
|
|
ord('<'): '\\u003C',
|
|
ord('&'): '\\u0026',
|
|
}
|
|
|
|
|
|
def json_script(value, element_id=None):
|
|
"""
|
|
Escape all the HTML/XML special characters with their unicode escapes, so
|
|
value is safe to be output anywhere except for inside a tag attribute. Wrap
|
|
the escaped JSON in a script tag.
|
|
"""
|
|
from django.core.serializers.json import DjangoJSONEncoder
|
|
json_str = json.dumps(value, cls=DjangoJSONEncoder).translate(_json_script_escapes)
|
|
if element_id:
|
|
template = '<script id="{}" type="application/json">{}</script>'
|
|
args = (element_id, mark_safe(json_str))
|
|
else:
|
|
template = '<script type="application/json">{}</script>'
|
|
args = (mark_safe(json_str),)
|
|
return format_html(template, *args)
|
|
|
|
|
|
def conditional_escape(text):
|
|
"""
|
|
Similar to escape(), except that it doesn't operate on pre-escaped strings.
|
|
|
|
This function relies on the __html__ convention used both by Django's
|
|
SafeData class and by third-party libraries like markupsafe.
|
|
"""
|
|
if isinstance(text, Promise):
|
|
text = str(text)
|
|
if hasattr(text, '__html__'):
|
|
return text.__html__()
|
|
else:
|
|
return escape(text)
|
|
|
|
|
|
def format_html(format_string, *args, **kwargs):
|
|
"""
|
|
Similar to str.format, but pass all arguments through conditional_escape(),
|
|
and call mark_safe() on the result. This function should be used instead
|
|
of str.format or % interpolation to build up small HTML fragments.
|
|
"""
|
|
args_safe = map(conditional_escape, args)
|
|
kwargs_safe = {k: conditional_escape(v) for (k, v) in kwargs.items()}
|
|
return mark_safe(format_string.format(*args_safe, **kwargs_safe))
|
|
|
|
|
|
def format_html_join(sep, format_string, args_generator):
|
|
"""
|
|
A wrapper of format_html, for the common case of a group of arguments that
|
|
need to be formatted using the same format string, and then joined using
|
|
'sep'. 'sep' is also passed through conditional_escape.
|
|
|
|
'args_generator' should be an iterator that returns the sequence of 'args'
|
|
that will be passed to format_html.
|
|
|
|
Example:
|
|
|
|
format_html_join('\n', "<li>{} {}</li>", ((u.first_name, u.last_name)
|
|
for u in users))
|
|
"""
|
|
return mark_safe(conditional_escape(sep).join(
|
|
format_html(format_string, *args)
|
|
for args in args_generator
|
|
))
|
|
|
|
|
|
@keep_lazy_text
|
|
def linebreaks(value, autoescape=False):
|
|
"""Convert newlines into <p> and <br>s."""
|
|
value = normalize_newlines(value)
|
|
paras = re.split('\n{2,}', str(value))
|
|
if autoescape:
|
|
paras = ['<p>%s</p>' % escape(p).replace('\n', '<br>') for p in paras]
|
|
else:
|
|
paras = ['<p>%s</p>' % p.replace('\n', '<br>') for p in paras]
|
|
return '\n\n'.join(paras)
|
|
|
|
|
|
class MLStripper(HTMLParser):
|
|
def __init__(self):
|
|
super().__init__(convert_charrefs=False)
|
|
self.reset()
|
|
self.fed = []
|
|
|
|
def handle_data(self, d):
|
|
self.fed.append(d)
|
|
|
|
def handle_entityref(self, name):
|
|
self.fed.append('&%s;' % name)
|
|
|
|
def handle_charref(self, name):
|
|
self.fed.append('&#%s;' % name)
|
|
|
|
def get_data(self):
|
|
return ''.join(self.fed)
|
|
|
|
|
|
def _strip_once(value):
|
|
"""
|
|
Internal tag stripping utility used by strip_tags.
|
|
"""
|
|
s = MLStripper()
|
|
s.feed(value)
|
|
s.close()
|
|
return s.get_data()
|
|
|
|
|
|
@keep_lazy_text
|
|
def strip_tags(value):
|
|
"""Return the given HTML with all tags stripped."""
|
|
# Note: in typical case this loop executes _strip_once once. Loop condition
|
|
# is redundant, but helps to reduce number of executions of _strip_once.
|
|
value = str(value)
|
|
while '<' in value and '>' in value:
|
|
new_value = _strip_once(value)
|
|
if value.count('<') == new_value.count('<'):
|
|
# _strip_once wasn't able to detect more tags.
|
|
break
|
|
value = new_value
|
|
return value
|
|
|
|
|
|
@keep_lazy_text
|
|
def strip_spaces_between_tags(value):
|
|
"""Return the given HTML with spaces between tags removed."""
|
|
return re.sub(r'>\s+<', '><', str(value))
|
|
|
|
|
|
def smart_urlquote(url):
|
|
"""Quote a URL if it isn't already quoted."""
|
|
def unquote_quote(segment):
|
|
segment = unquote(segment)
|
|
# Tilde is part of RFC3986 Unreserved Characters
|
|
# https://tools.ietf.org/html/rfc3986#section-2.3
|
|
# See also https://bugs.python.org/issue16285
|
|
return quote(segment, safe=RFC3986_SUBDELIMS + RFC3986_GENDELIMS + '~')
|
|
|
|
# Handle IDN before quoting.
|
|
try:
|
|
scheme, netloc, path, query, fragment = urlsplit(url)
|
|
except ValueError:
|
|
# invalid IPv6 URL (normally square brackets in hostname part).
|
|
return unquote_quote(url)
|
|
|
|
try:
|
|
netloc = punycode(netloc) # IDN -> ACE
|
|
except UnicodeError: # invalid domain part
|
|
return unquote_quote(url)
|
|
|
|
if query:
|
|
# Separately unquoting key/value, so as to not mix querystring separators
|
|
# included in query values. See #22267.
|
|
query_parts = [(unquote(q[0]), unquote(q[1]))
|
|
for q in parse_qsl(query, keep_blank_values=True)]
|
|
# urlencode will take care of quoting
|
|
query = urlencode(query_parts)
|
|
|
|
path = unquote_quote(path)
|
|
fragment = unquote_quote(fragment)
|
|
|
|
return urlunsplit((scheme, netloc, path, query, fragment))
|
|
|
|
|
|
class Urlizer:
|
|
"""
|
|
Convert any URLs in text into clickable links.
|
|
|
|
Work on http://, https://, www. links, and also on links ending in one of
|
|
the original seven gTLDs (.com, .edu, .gov, .int, .mil, .net, and .org).
|
|
Links can have trailing punctuation (periods, commas, close-parens) and
|
|
leading punctuation (opening parens) and it'll still do the right thing.
|
|
"""
|
|
trailing_punctuation_chars = '.,:;!'
|
|
wrapping_punctuation = [('(', ')'), ('[', ']')]
|
|
|
|
simple_url_re = _lazy_re_compile(r'^https?://\[?\w', re.IGNORECASE)
|
|
simple_url_2_re = _lazy_re_compile(
|
|
r'^www\.|^(?!http)\w[^@]+\.(com|edu|gov|int|mil|net|org)($|/.*)$',
|
|
re.IGNORECASE
|
|
)
|
|
word_split_re = _lazy_re_compile(r'''([\s<>"']+)''')
|
|
|
|
mailto_template = 'mailto:{local}@{domain}'
|
|
url_template = '<a href="{href}"{attrs}>{url}</a>'
|
|
|
|
def __call__(self, text, trim_url_limit=None, nofollow=False, autoescape=False):
|
|
"""
|
|
If trim_url_limit is not None, truncate the URLs in the link text
|
|
longer than this limit to trim_url_limit - 1 characters and append an
|
|
ellipsis.
|
|
|
|
If nofollow is True, give the links a rel="nofollow" attribute.
|
|
|
|
If autoescape is True, autoescape the link text and URLs.
|
|
"""
|
|
safe_input = isinstance(text, SafeData)
|
|
|
|
words = self.word_split_re.split(str(text))
|
|
return ''.join([
|
|
self.handle_word(
|
|
word,
|
|
safe_input=safe_input,
|
|
trim_url_limit=trim_url_limit,
|
|
nofollow=nofollow,
|
|
autoescape=autoescape,
|
|
) for word in words
|
|
])
|
|
|
|
def handle_word(
|
|
self, word, *, safe_input, trim_url_limit=None, nofollow=False, autoescape=False,
|
|
):
|
|
if '.' in word or '@' in word or ':' in word:
|
|
# lead: Punctuation trimmed from the beginning of the word.
|
|
# middle: State of the word.
|
|
# trail: Punctuation trimmed from the end of the word.
|
|
lead, middle, trail = self.trim_punctuation(word)
|
|
# Make URL we want to point to.
|
|
url = None
|
|
nofollow_attr = ' rel="nofollow"' if nofollow else ''
|
|
if self.simple_url_re.match(middle):
|
|
url = smart_urlquote(html.unescape(middle))
|
|
elif self.simple_url_2_re.match(middle):
|
|
url = smart_urlquote('http://%s' % html.unescape(middle))
|
|
elif ':' not in middle and self.is_email_simple(middle):
|
|
local, domain = middle.rsplit('@', 1)
|
|
try:
|
|
domain = punycode(domain)
|
|
except UnicodeError:
|
|
return word
|
|
url = self.mailto_template.format(local=local, domain=domain)
|
|
nofollow_attr = ''
|
|
# Make link.
|
|
if url:
|
|
trimmed = self.trim_url(middle, limit=trim_url_limit)
|
|
if autoescape and not safe_input:
|
|
lead, trail = escape(lead), escape(trail)
|
|
trimmed = escape(trimmed)
|
|
middle = self.url_template.format(
|
|
href=escape(url),
|
|
attrs=nofollow_attr,
|
|
url=trimmed,
|
|
)
|
|
return mark_safe(f'{lead}{middle}{trail}')
|
|
else:
|
|
if safe_input:
|
|
return mark_safe(word)
|
|
elif autoescape:
|
|
return escape(word)
|
|
elif safe_input:
|
|
return mark_safe(word)
|
|
elif autoescape:
|
|
return escape(word)
|
|
return word
|
|
|
|
def trim_url(self, x, *, limit):
|
|
if limit is None or len(x) <= limit:
|
|
return x
|
|
return '%s…' % x[:max(0, limit - 1)]
|
|
|
|
def trim_punctuation(self, word):
|
|
"""
|
|
Trim trailing and wrapping punctuation from `word`. Return the items of
|
|
the new state.
|
|
"""
|
|
lead, middle, trail = '', word, ''
|
|
# Continue trimming until middle remains unchanged.
|
|
trimmed_something = True
|
|
while trimmed_something:
|
|
trimmed_something = False
|
|
# Trim wrapping punctuation.
|
|
for opening, closing in self.wrapping_punctuation:
|
|
if middle.startswith(opening):
|
|
middle = middle[len(opening):]
|
|
lead += opening
|
|
trimmed_something = True
|
|
# Keep parentheses at the end only if they're balanced.
|
|
if (
|
|
middle.endswith(closing) and
|
|
middle.count(closing) == middle.count(opening) + 1
|
|
):
|
|
middle = middle[:-len(closing)]
|
|
trail = closing + trail
|
|
trimmed_something = True
|
|
# Trim trailing punctuation (after trimming wrapping punctuation,
|
|
# as encoded entities contain ';'). Unescape entities to avoid
|
|
# breaking them by removing ';'.
|
|
middle_unescaped = html.unescape(middle)
|
|
stripped = middle_unescaped.rstrip(self.trailing_punctuation_chars)
|
|
if middle_unescaped != stripped:
|
|
punctuation_count = len(middle_unescaped) - len(stripped)
|
|
trail = middle[-punctuation_count:] + trail
|
|
middle = middle[:-punctuation_count]
|
|
trimmed_something = True
|
|
return lead, middle, trail
|
|
|
|
@staticmethod
|
|
def is_email_simple(value):
|
|
"""Return True if value looks like an email address."""
|
|
# An @ must be in the middle of the value.
|
|
if '@' not in value or value.startswith('@') or value.endswith('@'):
|
|
return False
|
|
try:
|
|
p1, p2 = value.split('@')
|
|
except ValueError:
|
|
# value contains more than one @.
|
|
return False
|
|
# Dot must be in p2 (e.g. example.com)
|
|
if '.' not in p2 or p2.startswith('.'):
|
|
return False
|
|
return True
|
|
|
|
|
|
urlizer = Urlizer()
|
|
|
|
|
|
@keep_lazy_text
|
|
def urlize(text, trim_url_limit=None, nofollow=False, autoescape=False):
|
|
return urlizer(text, trim_url_limit=trim_url_limit, nofollow=nofollow, autoescape=autoescape)
|
|
|
|
|
|
def avoid_wrapping(value):
|
|
"""
|
|
Avoid text wrapping in the middle of a phrase by adding non-breaking
|
|
spaces where there previously were normal spaces.
|
|
"""
|
|
return value.replace(" ", "\xa0")
|
|
|
|
|
|
def html_safe(klass):
|
|
"""
|
|
A decorator that defines the __html__ method. This helps non-Django
|
|
templates to detect classes whose __str__ methods return SafeString.
|
|
"""
|
|
if '__html__' in klass.__dict__:
|
|
raise ValueError(
|
|
"can't apply @html_safe to %s because it defines "
|
|
"__html__()." % klass.__name__
|
|
)
|
|
if '__str__' not in klass.__dict__:
|
|
raise ValueError(
|
|
"can't apply @html_safe to %s because it doesn't "
|
|
"define __str__()." % klass.__name__
|
|
)
|
|
klass_str = klass.__str__
|
|
klass.__str__ = lambda self: mark_safe(klass_str(self))
|
|
klass.__html__ = lambda self: str(self)
|
|
return klass
|