mirror of
https://github.com/overleaf/overleaf.git
synced 2024-11-07 20:31:06 -05:00
58cf92620a
[web] scripts/translations: add script for checking html sanitization GitOrigin-RevId: d4b9c9a7eb1ed0ca9202b0cb6e4c33f3e73bd0e4
45 lines
1.3 KiB
JavaScript
45 lines
1.3 KiB
JavaScript
const sanitizeHtml = require('sanitize-html')
|
||
|
||
/**
|
||
* Sanitize a translation string to prevent injection attacks
|
||
*
|
||
* @param {string} input
|
||
* @returns {string}
|
||
*/
|
||
function sanitize(input) {
|
||
// Block Angular XSS
|
||
// Ticket: https://github.com/overleaf/issues/issues/4478
|
||
input = input.replace(/'/g, '’')
|
||
// Use left quote where (likely) appropriate.
|
||
input.replace(/ ’/g, ' ‘')
|
||
|
||
return sanitizeHtml(input, {
|
||
// Allow "replacement" tags (in the format <0>, <1>, <2>, etc) used by
|
||
// react-i18next to allow for HTML insertion via the Trans component.
|
||
// See: https://github.com/overleaf/developer-manual/blob/master/code/translations.md
|
||
// Unfortunately the sanitizeHtml library does not accept regexes or a
|
||
// function for the allowedTags option, so we are limited to a hard-coded
|
||
// number of "replacement" tags.
|
||
allowedTags: ['b', 'strong', 'a', 'code', ...range(10)],
|
||
allowedAttributes: {
|
||
a: ['href', 'class'],
|
||
},
|
||
textFilter(text) {
|
||
return text
|
||
.replace(/\{\{/, '{{')
|
||
.replace(/\}\}/, '}}')
|
||
},
|
||
})
|
||
}
|
||
|
||
/**
|
||
* Generate a range of numbers as strings up to the given size
|
||
*
|
||
* @param {number} size Size of range
|
||
* @returns {string[]}
|
||
*/
|
||
function range(size) {
|
||
return Array.from(Array(size).keys()).map(n => n.toString())
|
||
}
|
||
|
||
module.exports = { sanitize }
|