2011-09-09 07:18:20 +10:00
|
|
|
// Copyright 2011 The Go Authors. All rights reserved.
|
|
|
|
|
// Use of this source code is governed by a BSD-style
|
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
|
2011-11-08 15:38:47 -08:00
|
|
|
package template
|
2011-09-09 07:18:20 +10:00
|
|
|
|
|
|
|
|
import (
|
|
|
|
|
"bytes"
|
|
|
|
|
"fmt"
|
|
|
|
|
"unicode"
|
2011-11-08 15:38:47 -08:00
|
|
|
"unicode/utf8"
|
2011-09-09 07:18:20 +10:00
|
|
|
)
|
|
|
|
|
|
2013-07-23 11:59:49 +10:00
|
|
|
// endsWithCSSKeyword reports whether b ends with an ident that
|
2011-09-09 07:18:20 +10:00
|
|
|
// case-insensitively matches the lower-case kw.
|
|
|
|
|
func endsWithCSSKeyword(b []byte, kw string) bool {
|
|
|
|
|
i := len(b) - len(kw)
|
|
|
|
|
if i < 0 {
|
|
|
|
|
// Too short.
|
|
|
|
|
return false
|
|
|
|
|
}
|
|
|
|
|
if i != 0 {
|
|
|
|
|
r, _ := utf8.DecodeLastRune(b[:i])
|
|
|
|
|
if isCSSNmchar(r) {
|
|
|
|
|
// Too long.
|
|
|
|
|
return false
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
// Many CSS keywords, such as "!important" can have characters encoded,
|
|
|
|
|
// but the URI production does not allow that according to
|
2018-06-01 17:29:59 -03:00
|
|
|
// https://www.w3.org/TR/css3-syntax/#TOK-URI
|
2011-09-09 07:18:20 +10:00
|
|
|
// This does not attempt to recognize encoded keywords. For example,
|
|
|
|
|
// given "\75\72\6c" and "url" this return false.
|
|
|
|
|
return string(bytes.ToLower(b[i:])) == kw
|
|
|
|
|
}
|
|
|
|
|
|
2013-07-23 11:59:49 +10:00
|
|
|
// isCSSNmchar reports whether rune is allowed anywhere in a CSS identifier.
|
2011-10-25 22:22:26 -07:00
|
|
|
func isCSSNmchar(r rune) bool {
|
2011-09-09 07:18:20 +10:00
|
|
|
// Based on the CSS3 nmchar production but ignores multi-rune escape
|
|
|
|
|
// sequences.
|
2018-06-01 17:29:59 -03:00
|
|
|
// https://www.w3.org/TR/css3-syntax/#SUBTOK-nmchar
|
2011-10-25 22:22:26 -07:00
|
|
|
return 'a' <= r && r <= 'z' ||
|
|
|
|
|
'A' <= r && r <= 'Z' ||
|
|
|
|
|
'0' <= r && r <= '9' ||
|
|
|
|
|
r == '-' ||
|
|
|
|
|
r == '_' ||
|
2011-09-09 07:18:20 +10:00
|
|
|
// Non-ASCII cases below.
|
2011-10-25 22:22:26 -07:00
|
|
|
0x80 <= r && r <= 0xd7ff ||
|
|
|
|
|
0xe000 <= r && r <= 0xfffd ||
|
|
|
|
|
0x10000 <= r && r <= 0x10ffff
|
2011-09-09 07:18:20 +10:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// decodeCSS decodes CSS3 escapes given a sequence of stringchars.
|
|
|
|
|
// If there is no change, it returns the input, otherwise it returns a slice
|
|
|
|
|
// backed by a new array.
|
2018-06-01 17:29:59 -03:00
|
|
|
// https://www.w3.org/TR/css3-syntax/#SUBTOK-stringchar defines stringchar.
|
2011-09-09 07:18:20 +10:00
|
|
|
func decodeCSS(s []byte) []byte {
|
|
|
|
|
i := bytes.IndexByte(s, '\\')
|
|
|
|
|
if i == -1 {
|
|
|
|
|
return s
|
|
|
|
|
}
|
|
|
|
|
// The UTF-8 sequence for a codepoint is never longer than 1 + the
|
|
|
|
|
// number hex digits need to represent that codepoint, so len(s) is an
|
|
|
|
|
// upper bound on the output length.
|
|
|
|
|
b := make([]byte, 0, len(s))
|
|
|
|
|
for len(s) != 0 {
|
|
|
|
|
i := bytes.IndexByte(s, '\\')
|
|
|
|
|
if i == -1 {
|
|
|
|
|
i = len(s)
|
|
|
|
|
}
|
|
|
|
|
b, s = append(b, s[:i]...), s[i:]
|
|
|
|
|
if len(s) < 2 {
|
|
|
|
|
break
|
|
|
|
|
}
|
2018-06-01 17:29:59 -03:00
|
|
|
// https://www.w3.org/TR/css3-syntax/#SUBTOK-escape
|
2011-09-09 07:18:20 +10:00
|
|
|
// escape ::= unicode | '\' [#x20-#x7E#x80-#xD7FF#xE000-#xFFFD#x10000-#x10FFFF]
|
|
|
|
|
if isHex(s[1]) {
|
2018-06-01 17:29:59 -03:00
|
|
|
// https://www.w3.org/TR/css3-syntax/#SUBTOK-unicode
|
2011-09-09 07:18:20 +10:00
|
|
|
// unicode ::= '\' [0-9a-fA-F]{1,6} wc?
|
|
|
|
|
j := 2
|
|
|
|
|
for j < len(s) && j < 7 && isHex(s[j]) {
|
|
|
|
|
j++
|
|
|
|
|
}
|
2011-10-25 22:22:26 -07:00
|
|
|
r := hexDecode(s[1:j])
|
|
|
|
|
if r > unicode.MaxRune {
|
|
|
|
|
r, j = r/16, j-1
|
2011-09-09 07:18:20 +10:00
|
|
|
}
|
2011-10-25 22:22:26 -07:00
|
|
|
n := utf8.EncodeRune(b[len(b):cap(b)], r)
|
2011-09-09 07:18:20 +10:00
|
|
|
// The optional space at the end allows a hex
|
|
|
|
|
// sequence to be followed by a literal hex.
|
|
|
|
|
// string(decodeCSS([]byte(`\A B`))) == "\nB"
|
|
|
|
|
b, s = b[:len(b)+n], skipCSSSpace(s[j:])
|
|
|
|
|
} else {
|
|
|
|
|
// `\\` decodes to `\` and `\"` to `"`.
|
|
|
|
|
_, n := utf8.DecodeRune(s[1:])
|
|
|
|
|
b, s = append(b, s[1:1+n]...), s[1+n:]
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return b
|
|
|
|
|
}
|
|
|
|
|
|
2013-08-07 09:35:06 +10:00
|
|
|
// isHex reports whether the given character is a hex digit.
|
2011-09-09 07:18:20 +10:00
|
|
|
func isHex(c byte) bool {
|
|
|
|
|
return '0' <= c && c <= '9' || 'a' <= c && c <= 'f' || 'A' <= c && c <= 'F'
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// hexDecode decodes a short hex digit sequence: "10" -> 16.
|
2011-10-25 22:22:26 -07:00
|
|
|
func hexDecode(s []byte) rune {
|
2011-12-08 22:08:03 -05:00
|
|
|
n := '\x00'
|
2011-09-09 07:18:20 +10:00
|
|
|
for _, c := range s {
|
|
|
|
|
n <<= 4
|
|
|
|
|
switch {
|
|
|
|
|
case '0' <= c && c <= '9':
|
2011-10-25 22:22:26 -07:00
|
|
|
n |= rune(c - '0')
|
2011-09-09 07:18:20 +10:00
|
|
|
case 'a' <= c && c <= 'f':
|
2011-10-25 22:22:26 -07:00
|
|
|
n |= rune(c-'a') + 10
|
2011-09-09 07:18:20 +10:00
|
|
|
case 'A' <= c && c <= 'F':
|
2011-10-25 22:22:26 -07:00
|
|
|
n |= rune(c-'A') + 10
|
2011-09-09 07:18:20 +10:00
|
|
|
default:
|
|
|
|
|
panic(fmt.Sprintf("Bad hex digit in %q", s))
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return n
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// skipCSSSpace returns a suffix of c, skipping over a single space.
|
|
|
|
|
func skipCSSSpace(c []byte) []byte {
|
|
|
|
|
if len(c) == 0 {
|
|
|
|
|
return c
|
|
|
|
|
}
|
|
|
|
|
// wc ::= #x9 | #xA | #xC | #xD | #x20
|
|
|
|
|
switch c[0] {
|
|
|
|
|
case '\t', '\n', '\f', ' ':
|
|
|
|
|
return c[1:]
|
|
|
|
|
case '\r':
|
|
|
|
|
// This differs from CSS3's wc production because it contains a
|
|
|
|
|
// probable spec error whereby wc contains all the single byte
|
|
|
|
|
// sequences in nl (newline) but not CRLF.
|
|
|
|
|
if len(c) >= 2 && c[1] == '\n' {
|
|
|
|
|
return c[2:]
|
|
|
|
|
}
|
|
|
|
|
return c[1:]
|
|
|
|
|
}
|
|
|
|
|
return c
|
|
|
|
|
}
|
|
|
|
|
|
2013-07-23 11:59:49 +10:00
|
|
|
// isCSSSpace reports whether b is a CSS space char as defined in wc.
|
2011-10-18 17:01:42 -05:00
|
|
|
func isCSSSpace(b byte) bool {
|
|
|
|
|
switch b {
|
|
|
|
|
case '\t', '\n', '\f', '\r', ' ':
|
|
|
|
|
return true
|
|
|
|
|
}
|
|
|
|
|
return false
|
|
|
|
|
}
|
|
|
|
|
|
2011-09-09 07:18:20 +10:00
|
|
|
// cssEscaper escapes HTML and CSS special characters using \<hex>+ escapes.
|
|
|
|
|
func cssEscaper(args ...interface{}) string {
|
exp/template/html: pre-sanitized content
Not all content is plain text. Sometimes content comes from a trusted
source, such as another template invocation, an HTML tag whitelister,
etc.
Template authors can deal with over-escaping in two ways.
1) They can encapsulate known-safe content via
type HTML, type CSS, type URL, and friends in content.go.
2) If they know that the for a particular action never needs escaping
then they can add |noescape to the pipeline.
{{.KnownSafeContent | noescape}}
which will prevent any escaping directives from being added.
This CL defines string type aliases: HTML, CSS, JS, URI, ...
It then modifies stringify to unpack the content type.
Finally it modifies the escaping functions to use the content type and
decline to escape content that does not require it.
There are minor changes to escapeAction and helpers to treat as
equivalent explicit escaping directives such as "html" and "urlquery"
and the escaping directives defined in the contextual autoescape module
and to recognize the special "noescape" directive.
The html escaping functions are rearranged. Instead of having one
escaping function used in each {{.}} in
{{.}} : <textarea title="{{.}}">{{.}}</textarea>
a slightly different escaping function is used for each.
When {{.}} binds to a pre-sanitized string of HTML
`one < <i>two</i> & two < "3"`
we produces something like
one < <i>two</i> & two < "3" :
<textarea title="one < two & two < "3"">
one < <i>two</i> & two < "3"
</textarea>
Although escaping is not required in <textarea> normally, if the
substring </textarea> is injected, then it breaks, so we normalize
special characters in RCDATA and do the same to preserve attribute
boundaries. We also strip tags since developers never intend
typed HTML injected in an attribute to contain tags escaped, but
do occasionally confuse pre-escaped HTML with HTML from a
tag-whitelister.
R=golang-dev, nigeltao
CC=golang-dev
https://golang.org/cl/4962067
2011-09-15 08:51:55 -07:00
|
|
|
s, _ := stringify(args...)
|
2011-09-09 07:18:20 +10:00
|
|
|
var b bytes.Buffer
|
2015-05-14 22:36:59 +00:00
|
|
|
r, w, written := rune(0), 0, 0
|
|
|
|
|
for i := 0; i < len(s); i += w {
|
|
|
|
|
// See comment in htmlEscaper.
|
|
|
|
|
r, w = utf8.DecodeRuneInString(s[i:])
|
2011-09-09 07:18:20 +10:00
|
|
|
var repl string
|
2015-05-14 22:36:59 +00:00
|
|
|
switch {
|
|
|
|
|
case int(r) < len(cssReplacementTable) && cssReplacementTable[r] != "":
|
|
|
|
|
repl = cssReplacementTable[r]
|
2011-09-09 07:18:20 +10:00
|
|
|
default:
|
|
|
|
|
continue
|
|
|
|
|
}
|
|
|
|
|
b.WriteString(s[written:i])
|
|
|
|
|
b.WriteString(repl)
|
2015-05-14 22:36:59 +00:00
|
|
|
written = i + w
|
2011-10-18 17:01:42 -05:00
|
|
|
if repl != `\\` && (written == len(s) || isHex(s[written]) || isCSSSpace(s[written])) {
|
2011-09-09 07:18:20 +10:00
|
|
|
b.WriteByte(' ')
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
if written == 0 {
|
|
|
|
|
return s
|
|
|
|
|
}
|
|
|
|
|
b.WriteString(s[written:])
|
|
|
|
|
return b.String()
|
|
|
|
|
}
|
|
|
|
|
|
2015-05-14 22:36:59 +00:00
|
|
|
var cssReplacementTable = []string{
|
|
|
|
|
0: `\0`,
|
|
|
|
|
'\t': `\9`,
|
|
|
|
|
'\n': `\a`,
|
|
|
|
|
'\f': `\c`,
|
|
|
|
|
'\r': `\d`,
|
|
|
|
|
// Encode HTML specials as hex so the output can be embedded
|
|
|
|
|
// in HTML attributes without further encoding.
|
|
|
|
|
'"': `\22`,
|
|
|
|
|
'&': `\26`,
|
|
|
|
|
'\'': `\27`,
|
|
|
|
|
'(': `\28`,
|
|
|
|
|
')': `\29`,
|
|
|
|
|
'+': `\2b`,
|
|
|
|
|
'/': `\2f`,
|
|
|
|
|
':': `\3a`,
|
|
|
|
|
';': `\3b`,
|
|
|
|
|
'<': `\3c`,
|
|
|
|
|
'>': `\3e`,
|
|
|
|
|
'\\': `\\`,
|
|
|
|
|
'{': `\7b`,
|
|
|
|
|
'}': `\7d`,
|
|
|
|
|
}
|
|
|
|
|
|
2011-09-09 07:18:20 +10:00
|
|
|
var expressionBytes = []byte("expression")
|
|
|
|
|
var mozBindingBytes = []byte("mozbinding")
|
|
|
|
|
|
|
|
|
|
// cssValueFilter allows innocuous CSS values in the output including CSS
|
|
|
|
|
// quantities (10px or 25%), ID or class literals (#foo, .bar), keyword values
|
|
|
|
|
// (inherit, blue), and colors (#888).
|
|
|
|
|
// It filters out unsafe values, such as those that affect token boundaries,
|
|
|
|
|
// and anything that might execute scripts.
|
|
|
|
|
func cssValueFilter(args ...interface{}) string {
|
exp/template/html: pre-sanitized content
Not all content is plain text. Sometimes content comes from a trusted
source, such as another template invocation, an HTML tag whitelister,
etc.
Template authors can deal with over-escaping in two ways.
1) They can encapsulate known-safe content via
type HTML, type CSS, type URL, and friends in content.go.
2) If they know that the for a particular action never needs escaping
then they can add |noescape to the pipeline.
{{.KnownSafeContent | noescape}}
which will prevent any escaping directives from being added.
This CL defines string type aliases: HTML, CSS, JS, URI, ...
It then modifies stringify to unpack the content type.
Finally it modifies the escaping functions to use the content type and
decline to escape content that does not require it.
There are minor changes to escapeAction and helpers to treat as
equivalent explicit escaping directives such as "html" and "urlquery"
and the escaping directives defined in the contextual autoescape module
and to recognize the special "noescape" directive.
The html escaping functions are rearranged. Instead of having one
escaping function used in each {{.}} in
{{.}} : <textarea title="{{.}}">{{.}}</textarea>
a slightly different escaping function is used for each.
When {{.}} binds to a pre-sanitized string of HTML
`one < <i>two</i> & two < "3"`
we produces something like
one < <i>two</i> & two < "3" :
<textarea title="one < two & two < "3"">
one < <i>two</i> & two < "3"
</textarea>
Although escaping is not required in <textarea> normally, if the
substring </textarea> is injected, then it breaks, so we normalize
special characters in RCDATA and do the same to preserve attribute
boundaries. We also strip tags since developers never intend
typed HTML injected in an attribute to contain tags escaped, but
do occasionally confuse pre-escaped HTML with HTML from a
tag-whitelister.
R=golang-dev, nigeltao
CC=golang-dev
https://golang.org/cl/4962067
2011-09-15 08:51:55 -07:00
|
|
|
s, t := stringify(args...)
|
|
|
|
|
if t == contentTypeCSS {
|
|
|
|
|
return s
|
|
|
|
|
}
|
|
|
|
|
b, id := decodeCSS([]byte(s)), make([]byte, 0, 64)
|
2011-09-09 07:18:20 +10:00
|
|
|
|
|
|
|
|
// CSS3 error handling is specified as honoring string boundaries per
|
2018-06-01 17:29:59 -03:00
|
|
|
// https://www.w3.org/TR/css3-syntax/#error-handling :
|
2011-09-09 07:18:20 +10:00
|
|
|
// Malformed declarations. User agents must handle unexpected
|
|
|
|
|
// tokens encountered while parsing a declaration by reading until
|
|
|
|
|
// the end of the declaration, while observing the rules for
|
|
|
|
|
// matching pairs of (), [], {}, "", and '', and correctly handling
|
|
|
|
|
// escapes. For example, a malformed declaration may be missing a
|
|
|
|
|
// property, colon (:) or value.
|
|
|
|
|
// So we need to make sure that values do not have mismatched bracket
|
|
|
|
|
// or quote characters to prevent the browser from restarting parsing
|
|
|
|
|
// inside a string that might embed JavaScript source.
|
exp/template/html: pre-sanitized content
Not all content is plain text. Sometimes content comes from a trusted
source, such as another template invocation, an HTML tag whitelister,
etc.
Template authors can deal with over-escaping in two ways.
1) They can encapsulate known-safe content via
type HTML, type CSS, type URL, and friends in content.go.
2) If they know that the for a particular action never needs escaping
then they can add |noescape to the pipeline.
{{.KnownSafeContent | noescape}}
which will prevent any escaping directives from being added.
This CL defines string type aliases: HTML, CSS, JS, URI, ...
It then modifies stringify to unpack the content type.
Finally it modifies the escaping functions to use the content type and
decline to escape content that does not require it.
There are minor changes to escapeAction and helpers to treat as
equivalent explicit escaping directives such as "html" and "urlquery"
and the escaping directives defined in the contextual autoescape module
and to recognize the special "noescape" directive.
The html escaping functions are rearranged. Instead of having one
escaping function used in each {{.}} in
{{.}} : <textarea title="{{.}}">{{.}}</textarea>
a slightly different escaping function is used for each.
When {{.}} binds to a pre-sanitized string of HTML
`one < <i>two</i> & two < "3"`
we produces something like
one < <i>two</i> & two < "3" :
<textarea title="one < two & two < "3"">
one < <i>two</i> & two < "3"
</textarea>
Although escaping is not required in <textarea> normally, if the
substring </textarea> is injected, then it breaks, so we normalize
special characters in RCDATA and do the same to preserve attribute
boundaries. We also strip tags since developers never intend
typed HTML injected in an attribute to contain tags escaped, but
do occasionally confuse pre-escaped HTML with HTML from a
tag-whitelister.
R=golang-dev, nigeltao
CC=golang-dev
https://golang.org/cl/4962067
2011-09-15 08:51:55 -07:00
|
|
|
for i, c := range b {
|
2011-09-09 07:18:20 +10:00
|
|
|
switch c {
|
|
|
|
|
case 0, '"', '\'', '(', ')', '/', ';', '@', '[', '\\', ']', '`', '{', '}':
|
|
|
|
|
return filterFailsafe
|
|
|
|
|
case '-':
|
|
|
|
|
// Disallow <!-- or -->.
|
|
|
|
|
// -- should not appear in valid identifiers.
|
2011-10-25 22:22:26 -07:00
|
|
|
if i != 0 && b[i-1] == '-' {
|
2011-09-09 07:18:20 +10:00
|
|
|
return filterFailsafe
|
|
|
|
|
}
|
|
|
|
|
default:
|
2016-04-10 08:48:55 +02:00
|
|
|
if c < utf8.RuneSelf && isCSSNmchar(rune(c)) {
|
2011-09-09 07:18:20 +10:00
|
|
|
id = append(id, c)
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
id = bytes.ToLower(id)
|
2016-04-01 03:49:43 +02:00
|
|
|
if bytes.Contains(id, expressionBytes) || bytes.Contains(id, mozBindingBytes) {
|
2011-09-09 07:18:20 +10:00
|
|
|
return filterFailsafe
|
|
|
|
|
}
|
exp/template/html: pre-sanitized content
Not all content is plain text. Sometimes content comes from a trusted
source, such as another template invocation, an HTML tag whitelister,
etc.
Template authors can deal with over-escaping in two ways.
1) They can encapsulate known-safe content via
type HTML, type CSS, type URL, and friends in content.go.
2) If they know that the for a particular action never needs escaping
then they can add |noescape to the pipeline.
{{.KnownSafeContent | noescape}}
which will prevent any escaping directives from being added.
This CL defines string type aliases: HTML, CSS, JS, URI, ...
It then modifies stringify to unpack the content type.
Finally it modifies the escaping functions to use the content type and
decline to escape content that does not require it.
There are minor changes to escapeAction and helpers to treat as
equivalent explicit escaping directives such as "html" and "urlquery"
and the escaping directives defined in the contextual autoescape module
and to recognize the special "noescape" directive.
The html escaping functions are rearranged. Instead of having one
escaping function used in each {{.}} in
{{.}} : <textarea title="{{.}}">{{.}}</textarea>
a slightly different escaping function is used for each.
When {{.}} binds to a pre-sanitized string of HTML
`one < <i>two</i> & two < "3"`
we produces something like
one < <i>two</i> & two < "3" :
<textarea title="one < two & two < "3"">
one < <i>two</i> & two < "3"
</textarea>
Although escaping is not required in <textarea> normally, if the
substring </textarea> is injected, then it breaks, so we normalize
special characters in RCDATA and do the same to preserve attribute
boundaries. We also strip tags since developers never intend
typed HTML injected in an attribute to contain tags escaped, but
do occasionally confuse pre-escaped HTML with HTML from a
tag-whitelister.
R=golang-dev, nigeltao
CC=golang-dev
https://golang.org/cl/4962067
2011-09-15 08:51:55 -07:00
|
|
|
return string(b)
|
2011-09-09 07:18:20 +10:00
|
|
|
}
|