output_safety.rb 4.9 KB
Newer Older
1
require 'erb'
2
require 'active_support/core_ext/kernel/singleton_class'
3 4 5

class ERB
  module Util
6
    HTML_ESCAPE = { '&' => '&amp;',  '>' => '&gt;',   '<' => '&lt;', '"' => '&quot;' }
7 8 9 10 11
    JSON_ESCAPE = { '&' => '\u0026', '>' => '\u003E', '<' => '\u003C' }

    # A utility method for escaping HTML tag characters.
    # This method is also aliased as <tt>h</tt>.
    #
A
Akira Matsuda 已提交
12
    # In your ERB templates, use this method to escape any unsafe content. For example:
13 14 15 16 17 18 19 20 21 22
    #   <%=h @person.name %>
    #
    # ==== Example:
    #   puts html_escape("is a > 0 & a < 10?")
    #   # => is a &gt; 0 &amp; a &lt; 10?
    def html_escape(s)
      s = s.to_s
      if s.html_safe?
        s
      else
23
        s.to_s.gsub(/&/, "&amp;").gsub(/\"/, "&quot;").gsub(/>/, "&gt;").gsub(/</, "&lt;").html_safe
24 25 26
      end
    end

R
R.T. Lechow 已提交
27
    # Aliasing twice issues a warning "discarding old...". Remove first to avoid it.
28
    remove_method(:h)
29 30 31 32
    alias h html_escape

    module_function :h

33 34 35
    singleton_class.send(:remove_method, :html_escape)
    module_function :html_escape

36 37
    # A utility method for escaping HTML entities in JSON strings
    # using \uXXXX JavaScript escape sequences for string literals:
38
    #
39 40
    #   json_escape("is a > 0 & a < 10?")
    #   # => is a \u003E 0 \u0026 a \u003C 10?
41
    #
42 43
    # Note that after this operation is performed the output is not
    # valid JSON. In particular double quotes are removed:
44
    #
45
    #   json_escape('{"name":"john","created_at":"2010-04-28T01:39:31Z","id":1}')
46 47
    #   # => {name:john,created_at:2010-04-28T01:39:31Z,id:1}
    #
48 49 50 51 52
    # This method is also aliased as +j+, and available as a helper
    # in Rails templates:
    #
    #   <%=j @person.to_json %>
    #
53
    def json_escape(s)
54 55
      result = s.to_s.gsub(/[&"><]/) { |special| JSON_ESCAPE[special] }
      s.html_safe? ? result.html_safe : result
56 57 58 59 60 61 62 63
    end

    alias j json_escape
    module_function :j
    module_function :json_escape
  end
end

64 65 66 67 68 69
class Object
  def html_safe?
    false
  end
end

70
class Numeric
71 72 73 74 75
  def html_safe?
    true
  end
end

76 77
module ActiveSupport #:nodoc:
  class SafeBuffer < String
78 79
    UNSAFE_STRING_METHODS = ["capitalize", "chomp", "chop", "delete", "downcase", "gsub", "lstrip", "next", "reverse", "rstrip", "slice", "squeeze", "strip", "sub", "succ", "swapcase", "tr", "tr_s", "upcase"].freeze
    UNAVAILABLE_STRING_METHODS = []
80

81 82 83 84 85 86 87 88 89
    alias_method :original_concat, :concat
    private :original_concat

    class SafeConcatError < StandardError
      def initialize
        super "Could not concatenate to the buffer because it is not html safe."
      end
    end

90 91 92 93 94 95
    def[](*args)
      new_safe_buffer = super
      new_safe_buffer.instance_eval { @dirty = false }
      new_safe_buffer
    end

96 97 98 99
    def safe_concat(value)
      raise SafeConcatError if dirty?
      original_concat(value)
    end
100

101 102 103 104 105 106 107 108 109 110
    def initialize(*)
      @dirty = false
      super
    end

    def initialize_copy(other)
      super
      @dirty = other.dirty?
    end

111
    def concat(value)
112
      if dirty? || value.html_safe?
113 114 115 116 117
        super(value)
      else
        super(ERB::Util.h(value))
      end
    end
118
    alias << concat
J
Joshua Peek 已提交
119

120 121 122 123 124
    def +(other)
      dup.concat(other)
    end

    def html_safe?
125
      !dirty?
126
    end
J
Joshua Peek 已提交
127

128 129 130
    def to_s
      self
    end
131

132 133 134 135
    def to_param
      to_str
    end

136 137 138 139 140 141 142
    def encode_with(coder)
      coder.represent_scalar nil, to_str
    end

    def to_yaml(*args)
      return super() if defined?(YAML::ENGINE) && !YAML::ENGINE.syck?
      to_str.to_yaml(*args)
143
    end
144

145
    UNSAFE_STRING_METHODS.each do |unsafe_method|
146
      class_eval <<-EOT, __FILE__, __LINE__
147
        def #{unsafe_method}(*args, &block)       # def capitalize(*args, &block)
V
Vijay Dev 已提交
148 149 150
          to_str.#{unsafe_method}(*args, &block)  #   to_str.gsub(*args, &block)
        end                                       # end

151
        def #{unsafe_method}!(*args)              # def capitalize!(*args)
V
Vijay Dev 已提交
152 153 154
          @dirty = true                           #   @dirty = true
          super                                   #   super
        end                                       # end
155 156
      EOT
    end
157

158 159
    UNAVAILABLE_STRING_METHODS.each do |unavailable_method|
      class_eval <<-EOT, __FILE__, __LINE__
160
        # def gsub(*args)
161
        #   raise NoMethodError, "gsub cannot be used with a safe string. You should use object.to_str.gsub"
162 163
        # end
        def #{unavailable_method}(*args)
164
          raise NoMethodError, "#{unavailable_method} cannot be used with a safe string. You should use object.to_str.#{unavailable_method}"
165 166 167
        end

        # def gsub!(*args)
168
        #   raise NoMethodError, "gsub! cannot be used with a safe string. You should use object.to_str.gsub!"
169 170
        # end
        def #{unavailable_method}!(*args)
171
          raise NoMethodError, "#{unavailable_method}! cannot be used with a safe string. You should use object.to_str.#{unavailable_method}!"
172
        end
173 174 175
      EOT
    end

176 177 178 179 180
    protected

    def dirty?
      @dirty
    end
181
  end
182
end
J
Joshua Peek 已提交
183

184 185 186 187
class String
  def html_safe
    ActiveSupport::SafeBuffer.new(self)
  end
188
end