I tried to keep the behavior as close to what was there previously as possible, but I'm not convinced it's doing the best thing in all cases. Ideally, we'd just follow the HTML5 parsing spec here.
60 lines
1.9 KiB
Plaintext
60 lines
1.9 KiB
Plaintext
name: xss-sanitize
|
|
version: 0.3.5.4
|
|
license: BSD3
|
|
license-file: LICENSE
|
|
author: Greg Weber <greg@gregweber.info>
|
|
maintainer: Greg Weber <greg@gregweber.info>
|
|
synopsis: sanitize untrusted HTML to prevent XSS attacks
|
|
description: run untrusted HTML through Text.HTML.SanitizeXSS.sanitizeXSS to prevent XSS attacks. see README.md <http://github.com/yesodweb/haskell-xss-sanitize> for more details
|
|
|
|
category: Web
|
|
stability: Stable
|
|
cabal-version: >= 1.8
|
|
build-type: Simple
|
|
homepage: http://github.com/yesodweb/haskell-xss-sanitize
|
|
extra-source-files: README.md
|
|
|
|
flag network-uri
|
|
description: Get Network.URI from the network-uri package
|
|
default: True
|
|
|
|
library
|
|
build-depends: base == 4.*, containers
|
|
, tagsoup >= 0.12.2 && < 1
|
|
, utf8-string >= 0.3 && < 1
|
|
, css-text >= 0.1.1 && < 0.2
|
|
, text >= 0.11 && < 2
|
|
, attoparsec >= 0.10.0.3 && < 1
|
|
|
|
if flag(network-uri)
|
|
build-depends: network-uri >= 2.6
|
|
else
|
|
build-depends: network < 2.6
|
|
|
|
exposed-modules: Text.HTML.SanitizeXSS
|
|
other-modules: Text.HTML.SanitizeXSS.Css
|
|
ghc-options: -Wall
|
|
|
|
test-suite test
|
|
type: exitcode-stdio-1.0
|
|
main-is: test/main.hs
|
|
cpp-options: -DTEST
|
|
build-depends: base == 4.* , containers
|
|
, tagsoup >= 0.12.2 && < 1
|
|
, utf8-string >= 0.3 && < 1
|
|
, css-text >= 0.1.1 && < 0.2
|
|
, text >= 0.11 && < 2
|
|
, attoparsec >= 0.10.0.3 && < 1
|
|
, hspec >= 1.3
|
|
, HUnit >= 1.2
|
|
|
|
if flag(network-uri)
|
|
build-depends: network-uri >= 2.6
|
|
else
|
|
build-depends: network < 2.6
|
|
|
|
|
|
source-repository head
|
|
type: git
|
|
location: http://github.com/yesodweb/haskell-xss-sanitize.git
|