U
    O eU                  	   @   s   d dl mZ d dlZd dlZd dlmZ d dlmZ d dlmZ e	dZ
ddgdgdgd	Ze	d
Zddd eed deddeddD Zede d ejZdZG dd deZG dd dZdd ZG dd dejZdS )    )chainN)unescape)html5lib_shim)
parse_shim)aabbracronymbZ
blockquotecodeZemiZliZolZstrongZulhreftitle)r   r   r   )httphttpsZmailto c                 C   s   g | ]}t |qS  )chr).0cr   r   /lib/python3.8/site-packages/bleach/sanitizer.py
<listcomp>*   s     r   	                []?c                   @   s   e Zd ZdS )NoCssSanitizerWarningN)__name__
__module____qualname__r   r   r   r   r   5   s   r   c                   @   s0   e Zd ZdZeeeddddfddZdd ZdS )	Cleanera  Cleaner for cleaning HTML fragments of malicious content

    This cleaner is a security-focused function whose sole purpose is to remove
    malicious content from a string such that it can be displayed as content in
    a web page.

    To use::

        from bleach.sanitizer import Cleaner

        cleaner = Cleaner()

        for text in all_the_yucky_things:
            sanitized = cleaner.clean(text)

    .. Note::

       This cleaner is not designed to use to transform content to be used in
       non-web-page contexts.

    .. Warning::

       This cleaner is not thread-safe--the html parser has internal state.
       Create a separate cleaner per thread!


    FTNc           
      C   s   || _ || _|| _|| _|| _|p$g | _|| _tj| j | jddd| _	t
d| _tjddddddd| _|dkrg }t|tr|}n4t|trg }| D ]}	t|	ttfr||	 qd|krtjd	td
 dS )a:  Initializes a Cleaner

        :arg set tags: set of allowed tags; defaults to
            ``bleach.sanitizer.ALLOWED_TAGS``

        :arg dict attributes: allowed attributes; can be a callable, list or dict;
            defaults to ``bleach.sanitizer.ALLOWED_ATTRIBUTES``

        :arg list protocols: allowed list of protocols for links; defaults
            to ``bleach.sanitizer.ALLOWED_PROTOCOLS``

        :arg bool strip: whether or not to strip disallowed elements

        :arg bool strip_comments: whether or not to strip HTML comments

        :arg list filters: list of html5lib Filter classes to pass streamed content through

            .. seealso:: http://html5lib.readthedocs.io/en/latest/movingparts.html#filters

            .. Warning::

               Using filters changes the output of ``bleach.Cleaner.clean``.
               Make sure the way the filters change the output are secure.

        :arg CSSSanitizer css_sanitizer: instance with a "sanitize_css" method for
            sanitizing style attribute values and style text; defaults to None

        F)tagsstripZconsume_entitiesZnamespaceHTMLElementsZetreealwaysT)Zquote_attr_valuesZomit_optional_tagsZescape_lt_in_attrsZresolve_entitiesZsanitizeZalphabetical_attributesNstylez7'style' attribute specified, but css_sanitizer not set.)category)r$   
attributes	protocolsr%   strip_commentsfilterscss_sanitizerr   ZBleachHTMLParserparserZgetTreeWalkerwalkerZBleachHTMLSerializer
serializer
isinstancelistdictvaluestupleextendwarningswarnr   )
selfr$   r)   r*   r%   r+   r,   r-   Zattributes_valuesr4   r   r   r   __init__V   sH    &


zCleaner.__init__c              	   C   s   t |ts&d|jjdd }t||s.dS | j|}t| || j	| j
| j| j| j| jd}| jD ]}||d}qh| j|S )zCleans text and returns sanitized result as unicode

        :arg str text: text to be cleaned

        :returns: sanitized text as unicode

        :raises TypeError: if ``text`` is not a text type

        zargument cannot be of z type, zmust be of text typer   )sourceallowed_tagsr)   strip_disallowed_tagsstrip_html_commentsr-   allowed_protocols)r;   )r1   str	__class__r    	TypeErrorr.   ZparseFragmentBleachSanitizerFilterr/   r$   r)   r%   r+   r-   r*   r,   r0   Zrender)r9   textmessageZdomZfilteredZfilter_classr   r   r   clean   s*    


zCleaner.clean)	r    r!   r"   __doc__ALLOWED_TAGSALLOWED_ATTRIBUTESALLOWED_PROTOCOLSr:   rF   r   r   r   r   r#   9   s   
Ur#   c                    sL   t  r S t tr& fdd}|S t tr@ fdd}|S tddS )a0  Generates attribute filter function for the given attributes value

    The attributes value can take one of several shapes. This returns a filter
    function appropriate to the attributes value. One nice thing about this is
    that there's less if/then shenanigans in the ``allow_token`` method.

    c                    s`   |  kr0 |  }t |r$|| ||S ||kr0dS d kr\ d }t |rT|| ||S ||kS dS )NT*F)callable)tagattrvalueZattr_valr)   r   r   _attr_filter   s    z.attribute_filter_factory.<locals>._attr_filterc                    s   | kS Nr   )rM   rN   rO   rP   r   r   rQ      s    z3attributes needs to be a callable, a list or a dictN)rL   r1   r3   r2   
ValueError)r)   rQ   r   rP   r   attribute_filter_factory   s    

rT   c                	   @   sr   e Zd ZdZeeeejej	ej
dddf	ddZdd Zd	d
 Zdd Zdd Zdd Zdd Zdd Zdd ZdS )rC   zmhtml5lib Filter that sanitizes text

    This filter can be used anywhere html5lib filters can be used.

    FTNc                 C   sT   t j| | t|| _t|| _t|| _|| _|	| _	|| _
|| _|
| _|| _dS )a_  Creates a BleachSanitizerFilter instance

        :arg source: html5lib TreeWalker stream as an html5lib TreeWalker

        :arg set allowed_tags: set of allowed tags; defaults to
            ``bleach.sanitizer.ALLOWED_TAGS``

        :arg dict attributes: allowed attributes; can be a callable, list or dict;
            defaults to ``bleach.sanitizer.ALLOWED_ATTRIBUTES``

        :arg list allowed_protocols: allowed list of protocols for links; defaults
            to ``bleach.sanitizer.ALLOWED_PROTOCOLS``

        :arg attr_val_is_uri: set of attributes that have URI values

        :arg svg_attr_val_allows_ref: set of SVG attributes that can have
            references

        :arg svg_allow_local_href: set of SVG elements that can have local
            hrefs

        :arg bool strip_disallowed_tags: whether or not to strip disallowed
            tags

        :arg bool strip_html_comments: whether or not to strip HTML comments

        :arg CSSSanitizer css_sanitizer: instance with a "sanitize_css" method for
            sanitizing style attribute values and style text; defaults to None

        N)r   Filterr:   	frozensetr<   r?   rT   attr_filterr=   r>   attr_val_is_urisvg_attr_val_allows_refr-   svg_allow_local_href)r9   r;   r<   r)   r?   rX   rY   rZ   r=   r>   r-   r   r   r   r:     s    0


zBleachSanitizerFilter.__init__c                 c   s:   |D ]0}|  |}|sqt|tr.|E d H  q|V  qd S rR   )sanitize_tokenr1   r2   )r9   token_iteratortokenretr   r   r   sanitize_streamA  s    

z%BleachSanitizerFilter.sanitize_streamc                 c   s   g }|D ]f}|rP|d dkr*| | qqhddd |D dd}g }|V  n|d dkrh| | q|V  qddd |D dd}|V  dS )	z/Merge consecutive Characters tokens in a streamtype
Charactersr   c                 S   s   g | ]}|d  qS datar   r   Z
char_tokenr   r   r   r   [  s     z:BleachSanitizerFilter.merge_characters.<locals>.<listcomp>)rc   r`   c                 S   s   g | ]}|d  qS rb   r   rd   r   r   r   r   i  s     N)appendjoin)r9   r\   Zcharacters_bufferr]   Z	new_tokenr   r   r   merge_charactersM  s*    

z&BleachSanitizerFilter.merge_charactersc                 C   s   |  | tj| S rR   )rg   r_   r   rU   __iter__)r9   r   r   r   rh   n  s    zBleachSanitizerFilter.__iter__c                 C   s   |d }|dkr>|d | j kr(| |S | jr2dS | |S nJ|dkrr| jsltj|d ddd	d
|d< |S dS n|dkr| |S |S dS )a  Sanitize a token either by HTML-encoding or dropping.

        Unlike sanitizer.Filter, allowed_attributes can be a dict of {'tag':
        ['attribute', 'pairs'], 'tag': callable}.

        Here callable is a function with two arguments of attribute name and
        value. It should return true of false.

        Also gives the option to strip tags instead of encoding.

        :arg dict token: token to sanitize

        :returns: token or list of tokens

        r`   )StartTagEndTagEmptyTagnameNCommentrc   z&quot;z&#x27;)"')Zentitiesra   )r<   allow_tokenr=   disallowed_tokenr>   r   escapesanitize_characters)r9   r]   
token_typer   r   r   r[   s  s$    
 

z$BleachSanitizerFilter.sanitize_tokenc                 C   s   | dd}|s|S tt|}||d< d|kr4|S g }t|D ]}|sLqB|drt|}|dk	r|dkr|ddd n|d|d	 |t	|d
 d }|rB|d|d qB|d|d qB|S )a  Handles Characters tokens

        Our overridden tokenizer doesn't do anything with entities. However,
        that means that the serializer will convert all ``&`` in Characters
        tokens to ``&amp;``.

        Since we don't want that, we extract entities here and convert them to
        Entity tokens so the serializer will let them be.

        :arg token: the Characters token to work on

        :returns: a list of tokens

        rc   r   &NZampra   )r`   rc   ZEntity)r`   rl      )
getINVISIBLE_CHARACTERS_REsubINVISIBLE_REPLACEMENT_CHARr   Znext_possible_entity
startswithZmatch_entityre   len)r9   r]   rc   Z
new_tokenspartZentityZ	remainderr   r   r   rs     s.    

z)BleachSanitizerFilter.sanitize_charactersc                 C   s   t |}tdd|}|dd}| }zt|}W n tk
rP   Y dS X |j	rh|j	|kr|S n@|
drv|S d|kr|dd |kr|S d|ksd	|kr|S dS )
zChecks a uri value to see if it's allowed

        :arg value: the uri value to sanitize
        :arg allowed_protocols: list of allowed protocols

        :returns: allowed value or None

        z[`\000-\040\177-\240\s]+r   u   �N#:r   r   r   )r   Zconvert_entitiesrery   replacelowerr   ZurlparserS   Zschemer{   split)r9   rO   r?   Znormalized_uriZparsedr   r   r   sanitize_uri_value  s*    


z(BleachSanitizerFilter.sanitize_uri_valuec           	      C   s   d|kri }|d   D ]\}}|\}}| |d ||s<q|| jkrb| || j}|dkr^q|}|| jkrtddt|}|	 }|sqn|}d|d f| j
kr|dtjd dffkrtd	|rq|d
kr| jr| j|}nd}|||< q||d< |S )z-Handles the case where we're allowing the tagrc   rl   Nzurl\s*\(\s*[^#\s][^)]+?\) )Nr   Zxlinkr   z
^\s*[^#\s])Nr'   r   )itemsrW   rX   r   r?   rY   r   ry   r   r%   rZ   r   Z
namespacessearchr-   Zsanitize_css)	r9   r]   attrsnamespaced_nameval	namespacerl   Z	new_valuenew_valr   r   r   rp     s>    


z!BleachSanitizerFilter.allow_tokenc                 C   s  |d }|dkr&d|d  d|d< n|d r|dks:t g }|d  D ]b\\}}}|rh|sh|| }}|d ksz|tjkr|}ntj|  d| }|d	| d
| d qJd|d  d| d|d< nd|d  d|d< |dr|d d d  d|d< d|d< |d= |S )Nr`   rj   z</rl   >rc   )ri   rk   r   r   z="rn   <r   ZselfClosingz/>ra   )AssertionErrorr   r   prefixesre   rf   rw   )r9   r]   rt   r   nsrl   vr   r   r   r   rq   Z  s(    
 z&BleachSanitizerFilter.disallowed_token)r    r!   r"   rG   rH   rI   rJ   r   rX   rY   rZ   r:   r_   rg   rh   r[   rs   r   rp   rq   r   r   r   r   rC      s&   	
>!+=:ErC   )	itertoolsr   r   r7   Zxml.sax.saxutilsr   Zbleachr   r   rV   rH   rI   rJ   rf   rangeZINVISIBLE_CHARACTERScompileUNICODErx   rz   UserWarningr   r#   rT   ZSanitizerFilterrC   r   r   r   r   <module>   s.   & +