a
    mDfU                  	   @   s   d dl mZ d dlZd dlZd dlmZ d dlmZ d dlmZ e	dZ
ddgdgdgd	Ze	d
Zddd eed deddeddD Zede d ejZdZG dd deZG dd dZdd ZG dd dejZdS )    )chainN)unescape)html5lib_shim)
parse_shim)aabbracronymb
blockquotecodeemiliolstrongulhreftitle)r   r   r   )httphttpsmailto c                 C   s   g | ]}t |qS  )chr).0cr   r   ]/nfs/NAS7/SABIOD/METHODE/ermites/ermites_venv/lib/python3.9/site-packages/bleach/sanitizer.py
<listcomp>*       r   	                []?c                   @   s   e Zd ZdS )NoCssSanitizerWarningN)__name__
__module____qualname__r   r   r   r   r'   5   s   r'   c                   @   s0   e Zd ZdZeeeddddfddZdd ZdS )	Cleanera  Cleaner for cleaning HTML fragments of malicious content

    This cleaner is a security-focused function whose sole purpose is to remove
    malicious content from a string such that it can be displayed as content in
    a web page.

    To use::

        from bleach.sanitizer import Cleaner

        cleaner = Cleaner()

        for text in all_the_yucky_things:
            sanitized = cleaner.clean(text)

    .. Note::

       This cleaner is not designed to use to transform content to be used in
       non-web-page contexts.

    .. Warning::

       This cleaner is not thread-safe--the html parser has internal state.
       Create a separate cleaner per thread!


    FTNc           
      C   s   || _ || _|| _|| _|| _|p$g | _|| _tj| j | jddd| _	t
d| _tjddddddd| _|du rg }t|tr|}n4t|trg }| D ]}	t|	ttfr||	 qd|v rtjd	td
 dS )a:  Initializes a Cleaner

        :arg set tags: set of allowed tags; defaults to
            ``bleach.sanitizer.ALLOWED_TAGS``

        :arg dict attributes: allowed attributes; can be a callable, list or dict;
            defaults to ``bleach.sanitizer.ALLOWED_ATTRIBUTES``

        :arg list protocols: allowed list of protocols for links; defaults
            to ``bleach.sanitizer.ALLOWED_PROTOCOLS``

        :arg bool strip: whether or not to strip disallowed elements

        :arg bool strip_comments: whether or not to strip HTML comments

        :arg list filters: list of html5lib Filter classes to pass streamed content through

            .. seealso:: http://html5lib.readthedocs.io/en/latest/movingparts.html#filters

            .. Warning::

               Using filters changes the output of ``bleach.Cleaner.clean``.
               Make sure the way the filters change the output are secure.

        :arg CSSSanitizer css_sanitizer: instance with a "sanitize_css" method for
            sanitizing style attribute values and style text; defaults to None

        F)tagsstripZconsume_entitiesnamespaceHTMLElementsetreealwaysT)quote_attr_valuesomit_optional_tagsescape_lt_in_attrsresolve_entitiessanitizealphabetical_attributesNstylez7'style' attribute specified, but css_sanitizer not set.)category)r,   
attributes	protocolsr-   strip_commentsfilterscss_sanitizerr   ZBleachHTMLParserparsergetTreeWalkerwalkerZBleachHTMLSerializer
serializer
isinstancelistdictvaluestupleextendwarningswarnr'   )
selfr,   r9   r:   r-   r;   r<   r=   Zattributes_valuesrE   r   r   r   __init__V   sH    &


zCleaner.__init__c              	   C   s   t |ts&d|jjdd }t||s.dS | j|}t| || j	| j
| j| j| j| jd}| jD ]}||d}qh| j|S )zCleans text and returns sanitized result as unicode

        :arg str text: text to be cleaned

        :returns: sanitized text as unicode

        :raises TypeError: if ``text`` is not a text type

        zargument cannot be of z type, zmust be of text typer   )sourceallowed_tagsr9   strip_disallowed_tagsstrip_html_commentsr=   allowed_protocols)rL   )rB   str	__class__r(   	TypeErrorr>   parseFragmentBleachSanitizerFilterr@   r,   r9   r-   r;   r=   r:   r<   rA   render)rJ   textmessagedomfilteredZfilter_classr   r   r   clean   s*    


zCleaner.clean)	r(   r)   r*   __doc__ALLOWED_TAGSALLOWED_ATTRIBUTESALLOWED_PROTOCOLSrK   r[   r   r   r   r   r+   9   s   
Ur+   c                    sL   t  r S t tr& fdd}|S t tr@ fdd}|S tddS )a0  Generates attribute filter function for the given attributes value

    The attributes value can take one of several shapes. This returns a filter
    function appropriate to the attributes value. One nice thing about this is
    that there's less if/then shenanigans in the ``allow_token`` method.

    c                    s`   |  v r0 |  }t |r$|| ||S ||v r0dS d v r\ d }t |rT|| ||S ||v S dS )NT*F)callable)tagattrvalueZattr_valr9   r   r   _attr_filter   s    z.attribute_filter_factory.<locals>._attr_filterc                    s   | v S Nr   )rb   rc   rd   re   r   r   rf      s    z3attributes needs to be a callable, a list or a dictN)ra   rB   rD   rC   
ValueError)r9   rf   r   re   r   attribute_filter_factory   s    

ri   c                	   @   sr   e Zd ZdZeeeejej	ej
dddf	ddZdd Zd	d
 Zdd Zdd Zdd Zdd Zdd Zdd ZdS )rU   zmhtml5lib Filter that sanitizes text

    This filter can be used anywhere html5lib filters can be used.

    FTNc                 C   sT   t j| | t|| _t|| _t|| _|| _|	| _	|| _
|| _|
| _|| _dS )a_  Creates a BleachSanitizerFilter instance

        :arg source: html5lib TreeWalker stream as an html5lib TreeWalker

        :arg set allowed_tags: set of allowed tags; defaults to
            ``bleach.sanitizer.ALLOWED_TAGS``

        :arg dict attributes: allowed attributes; can be a callable, list or dict;
            defaults to ``bleach.sanitizer.ALLOWED_ATTRIBUTES``

        :arg list allowed_protocols: allowed list of protocols for links; defaults
            to ``bleach.sanitizer.ALLOWED_PROTOCOLS``

        :arg attr_val_is_uri: set of attributes that have URI values

        :arg svg_attr_val_allows_ref: set of SVG attributes that can have
            references

        :arg svg_allow_local_href: set of SVG elements that can have local
            hrefs

        :arg bool strip_disallowed_tags: whether or not to strip disallowed
            tags

        :arg bool strip_html_comments: whether or not to strip HTML comments

        :arg CSSSanitizer css_sanitizer: instance with a "sanitize_css" method for
            sanitizing style attribute values and style text; defaults to None

        N)r   FilterrK   	frozensetrM   rP   ri   attr_filterrN   rO   attr_val_is_urisvg_attr_val_allows_refr=   svg_allow_local_href)rJ   rL   rM   r9   rP   rm   rn   ro   rN   rO   r=   r   r   r   rK     s    0


zBleachSanitizerFilter.__init__c                 c   s:   |D ]0}|  |}|sqt|tr.|E d H  q|V  qd S rg   )sanitize_tokenrB   rC   )rJ   token_iteratortokenretr   r   r   sanitize_streamA  s    

z%BleachSanitizerFilter.sanitize_streamc                 c   s   g }|D ]f}|rP|d dkr*| | qqhddd |D dd}g }|V  n|d dkrh| | q|V  qddd |D dd}|V  dS )	z/Merge consecutive Characters tokens in a streamtype
Charactersr   c                 S   s   g | ]}|d  qS datar   r   Z
char_tokenr   r   r   r   [  r   z:BleachSanitizerFilter.merge_characters.<locals>.<listcomp>)rx   ru   c                 S   s   g | ]}|d  qS rw   r   ry   r   r   r   r   i  r   N)appendjoin)rJ   rq   Zcharacters_bufferrr   	new_tokenr   r   r   merge_charactersM  s*    

z&BleachSanitizerFilter.merge_charactersc                 C   s   |  | tj| S rg   )r}   rt   r   rj   __iter__)rJ   r   r   r   r~   n  s    zBleachSanitizerFilter.__iter__c                 C   s   |d }|dv r>|d | j v r(| |S | jr2dS | |S nJ|dkrr| jsltj|d ddd	d
|d< |S dS n|dkr| |S |S dS )a  Sanitize a token either by HTML-encoding or dropping.

        Unlike sanitizer.Filter, allowed_attributes can be a dict of {'tag':
        ['attribute', 'pairs'], 'tag': callable}.

        Here callable is a function with two arguments of attribute name and
        value. It should return true of false.

        Also gives the option to strip tags instead of encoding.

        :arg dict token: token to sanitize

        :returns: token or list of tokens

        ru   )StartTagEndTagEmptyTagnameNCommentrx   z&quot;z&#x27;)"')entitiesrv   )rM   allow_tokenrN   disallowed_tokenrO   r   escapesanitize_characters)rJ   rr   
token_typer   r   r   rp   s  s"    


z$BleachSanitizerFilter.sanitize_tokenc                 C   s   | dd}|s|S tt|}||d< d|vr4|S g }t|D ]}|sLqB|drt|}|dur|dkr|ddd n|d|d	 |t	|d
 d }|rB|d|d qB|d|d qB|S )a  Handles Characters tokens

        Our overridden tokenizer doesn't do anything with entities. However,
        that means that the serializer will convert all ``&`` in Characters
        tokens to ``&amp;``.

        Since we don't want that, we extract entities here and convert them to
        Entity tokens so the serializer will let them be.

        :arg token: the Characters token to work on

        :returns: a list of tokens

        rx   r   &Namprv   )ru   rx   Entity)ru   r      )
getINVISIBLE_CHARACTERS_REsubINVISIBLE_REPLACEMENT_CHARr   Znext_possible_entity
startswithZmatch_entityrz   len)rJ   rr   rx   Z
new_tokenspartentity	remainderr   r   r   r     s.    

z)BleachSanitizerFilter.sanitize_charactersc                 C   s   t |}tdd|}|dd}| }zt|}W n tyN   Y dS 0 |j	rf|j	|v r|S n@|
drt|S d|v r|dd |v r|S d|v sd	|v r|S dS )
zChecks a uri value to see if it's allowed

        :arg value: the uri value to sanitize
        :arg allowed_protocols: list of allowed protocols

        :returns: allowed value or None

        z[`\000-\040\177-\240\s]+r   u   �N#:r   r   r   )r   Zconvert_entitiesrer   replacelowerr   urlparserh   schemer   split)rJ   rd   rP   Znormalized_uriparsedr   r   r   sanitize_uri_value  s*    


z(BleachSanitizerFilter.sanitize_uri_valuec           	      C   s   d|v ri }|d   D ]\}}|\}}| |d ||s<q|| jv rb| || j}|du r^q|}|| jv rtddt|}|	 }|sqn|}d|d f| j
v r|dtjd dffv rtd	|rq|d
kr| jr| j|}nd}|||< q||d< |S )z-Handles the case where we're allowing the tagrx   r   Nzurl\s*\(\s*[^#\s][^)]+?\) )Nr   xlinkr   z
^\s*[^#\s])Nr7   r   )itemsrl   rm   r   rP   rn   r   r   r   r-   ro   r   
namespacessearchr=   Zsanitize_css)	rJ   rr   attrsnamespaced_nameval	namespacer   	new_valuenew_valr   r   r   r     s>    


z!BleachSanitizerFilter.allow_tokenc                 C   s  |d }|dkr&d|d  d|d< n|d r|dv s:J g }|d   D ]b\\}}}|rh|sh|| }}|d u sz|tjvr|}ntj|  d| }|d	| d
| d qJd|d  d| d|d< nd|d  d|d< |dr|d d d  d|d< d|d< |d= |S )Nru   r   z</r   >rx   )r   r   r   r   z="r   <r   selfClosingz/>rv   )r   r   prefixesrz   r{   r   )rJ   rr   r   r   nsr   vr   r   r   r   r   Z  s(    
 z&BleachSanitizerFilter.disallowed_token)r(   r)   r*   r\   r]   r^   r_   r   rm   rn   ro   rK   rt   r}   r~   rp   r   r   r   r   r   r   r   r   rU      s&   	
>!+=:ErU   )	itertoolsr   r   rH   xml.sax.saxutilsr   Zbleachr   r   rk   r]   r^   r_   r{   rangeZINVISIBLE_CHARACTERScompileUNICODEr   r   UserWarningr'   r+   ri   ZSanitizerFilterrU   r   r   r   r   <module>   s.   & +