selenium-webdriver
Version:
The official WebDriver JavaScript bindings from the Selenium project
1 lines • 36.8 kB
HTML
<meta charset="UTF-8"><meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"><meta http-equiv="Content-Language" content="en"><meta http-equiv="X-UA-Compatible" content="IE=edge"><title>safeurl.js</title><link href="../../../../dossier.css" rel="stylesheet" type="text/css"><header><div><form><div><input type="search" placeholder="Search" tabindex="1"></div></form></div></header><main><article class="srcfile"><h1>lib/goog/html/safeurl.js</h1><div><table><tr><td><a id="l1"></a><a href="#l1">1</a><td>// Copyright 2013 The Closure Library Authors. All Rights Reserved.<tr><td><a id="l2"></a><a href="#l2">2</a><td>//<tr><td><a id="l3"></a><a href="#l3">3</a><td>// Licensed under the Apache License, Version 2.0 (the "License");<tr><td><a id="l4"></a><a href="#l4">4</a><td>// you may not use this file except in compliance with the License.<tr><td><a id="l5"></a><a href="#l5">5</a><td>// You may obtain a copy of the License at<tr><td><a id="l6"></a><a href="#l6">6</a><td>//<tr><td><a id="l7"></a><a href="#l7">7</a><td>// http://www.apache.org/licenses/LICENSE-2.0<tr><td><a id="l8"></a><a href="#l8">8</a><td>//<tr><td><a id="l9"></a><a href="#l9">9</a><td>// Unless required by applicable law or agreed to in writing, software<tr><td><a id="l10"></a><a href="#l10">10</a><td>// distributed under the License is distributed on an "AS-IS" BASIS,<tr><td><a id="l11"></a><a href="#l11">11</a><td>// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.<tr><td><a id="l12"></a><a href="#l12">12</a><td>// See the License for the specific language governing permissions and<tr><td><a id="l13"></a><a href="#l13">13</a><td>// limitations under the License.<tr><td><a id="l14"></a><a href="#l14">14</a><td><tr><td><a id="l15"></a><a href="#l15">15</a><td>/**<tr><td><a id="l16"></a><a href="#l16">16</a><td> * @fileoverview The SafeUrl type and its builders.<tr><td><a id="l17"></a><a href="#l17">17</a><td> *<tr><td><a id="l18"></a><a href="#l18">18</a><td> * TODO(xtof): Link to document stating type contract.<tr><td><a id="l19"></a><a href="#l19">19</a><td> */<tr><td><a id="l20"></a><a href="#l20">20</a><td><tr><td><a id="l21"></a><a href="#l21">21</a><td>goog.provide('goog.html.SafeUrl');<tr><td><a id="l22"></a><a href="#l22">22</a><td><tr><td><a id="l23"></a><a href="#l23">23</a><td>goog.require('goog.asserts');<tr><td><a id="l24"></a><a href="#l24">24</a><td>goog.require('goog.fs.url');<tr><td><a id="l25"></a><a href="#l25">25</a><td>goog.require('goog.i18n.bidi.Dir');<tr><td><a id="l26"></a><a href="#l26">26</a><td>goog.require('goog.i18n.bidi.DirectionalString');<tr><td><a id="l27"></a><a href="#l27">27</a><td>goog.require('goog.string.Const');<tr><td><a id="l28"></a><a href="#l28">28</a><td>goog.require('goog.string.TypedString');<tr><td><a id="l29"></a><a href="#l29">29</a><td><tr><td><a id="l30"></a><a href="#l30">30</a><td><tr><td><a id="l31"></a><a href="#l31">31</a><td><tr><td><a id="l32"></a><a href="#l32">32</a><td>/**<tr><td><a id="l33"></a><a href="#l33">33</a><td> * A string that is safe to use in URL context in DOM APIs and HTML documents.<tr><td><a id="l34"></a><a href="#l34">34</a><td> *<tr><td><a id="l35"></a><a href="#l35">35</a><td> * A SafeUrl is a string-like object that carries the security type contract<tr><td><a id="l36"></a><a href="#l36">36</a><td> * that its value as a string will not cause untrusted script execution<tr><td><a id="l37"></a><a href="#l37">37</a><td> * when evaluated as a hyperlink URL in a browser.<tr><td><a id="l38"></a><a href="#l38">38</a><td> *<tr><td><a id="l39"></a><a href="#l39">39</a><td> * Values of this type are guaranteed to be safe to use in URL/hyperlink<tr><td><a id="l40"></a><a href="#l40">40</a><td> * contexts, such as, assignment to URL-valued DOM properties, or<tr><td><a id="l41"></a><a href="#l41">41</a><td> * interpolation into a HTML template in URL context (e.g., inside a href<tr><td><a id="l42"></a><a href="#l42">42</a><td> * attribute), in the sense that the use will not result in a<tr><td><a id="l43"></a><a href="#l43">43</a><td> * Cross-Site-Scripting vulnerability.<tr><td><a id="l44"></a><a href="#l44">44</a><td> *<tr><td><a id="l45"></a><a href="#l45">45</a><td> * Note that, as documented in {@code goog.html.SafeUrl.unwrap}, this type's<tr><td><a id="l46"></a><a href="#l46">46</a><td> * contract does not guarantee that instances are safe to interpolate into HTML<tr><td><a id="l47"></a><a href="#l47">47</a><td> * without appropriate escaping.<tr><td><a id="l48"></a><a href="#l48">48</a><td> *<tr><td><a id="l49"></a><a href="#l49">49</a><td> * Note also that this type's contract does not imply any guarantees regarding<tr><td><a id="l50"></a><a href="#l50">50</a><td> * the resource the URL refers to. In particular, SafeUrls are <b>not</b><tr><td><a id="l51"></a><a href="#l51">51</a><td> * safe to use in a context where the referred-to resource is interpreted as<tr><td><a id="l52"></a><a href="#l52">52</a><td> * trusted code, e.g., as the src of a script tag.<tr><td><a id="l53"></a><a href="#l53">53</a><td> *<tr><td><a id="l54"></a><a href="#l54">54</a><td> * Instances of this type must be created via the factory methods<tr><td><a id="l55"></a><a href="#l55">55</a><td> * ({@code goog.html.SafeUrl.fromConstant}, {@code goog.html.SafeUrl.sanitize}),<tr><td><a id="l56"></a><a href="#l56">56</a><td> * etc and not by invoking its constructor. The constructor intentionally<tr><td><a id="l57"></a><a href="#l57">57</a><td> * takes no parameters and the type is immutable; hence only a default instance<tr><td><a id="l58"></a><a href="#l58">58</a><td> * corresponding to the empty string can be obtained via constructor invocation.<tr><td><a id="l59"></a><a href="#l59">59</a><td> *<tr><td><a id="l60"></a><a href="#l60">60</a><td> * @see goog.html.SafeUrl#fromConstant<tr><td><a id="l61"></a><a href="#l61">61</a><td> * @see goog.html.SafeUrl#from<tr><td><a id="l62"></a><a href="#l62">62</a><td> * @see goog.html.SafeUrl#sanitize<tr><td><a id="l63"></a><a href="#l63">63</a><td> * @constructor<tr><td><a id="l64"></a><a href="#l64">64</a><td> * @final<tr><td><a id="l65"></a><a href="#l65">65</a><td> * @struct<tr><td><a id="l66"></a><a href="#l66">66</a><td> * @implements {goog.i18n.bidi.DirectionalString}<tr><td><a id="l67"></a><a href="#l67">67</a><td> * @implements {goog.string.TypedString}<tr><td><a id="l68"></a><a href="#l68">68</a><td> */<tr><td><a id="l69"></a><a href="#l69">69</a><td>goog.html.SafeUrl = function() {<tr><td><a id="l70"></a><a href="#l70">70</a><td> /**<tr><td><a id="l71"></a><a href="#l71">71</a><td> * The contained value of this SafeUrl. The field has a purposely ugly<tr><td><a id="l72"></a><a href="#l72">72</a><td> * name to make (non-compiled) code that attempts to directly access this<tr><td><a id="l73"></a><a href="#l73">73</a><td> * field stand out.<tr><td><a id="l74"></a><a href="#l74">74</a><td> * @private {string}<tr><td><a id="l75"></a><a href="#l75">75</a><td> */<tr><td><a id="l76"></a><a href="#l76">76</a><td> this.privateDoNotAccessOrElseSafeHtmlWrappedValue_ = '';<tr><td><a id="l77"></a><a href="#l77">77</a><td><tr><td><a id="l78"></a><a href="#l78">78</a><td> /**<tr><td><a id="l79"></a><a href="#l79">79</a><td> * A type marker used to implement additional run-time type checking.<tr><td><a id="l80"></a><a href="#l80">80</a><td> * @see goog.html.SafeUrl#unwrap<tr><td><a id="l81"></a><a href="#l81">81</a><td> * @const<tr><td><a id="l82"></a><a href="#l82">82</a><td> * @private<tr><td><a id="l83"></a><a href="#l83">83</a><td> */<tr><td><a id="l84"></a><a href="#l84">84</a><td> this.SAFE_URL_TYPE_MARKER_GOOG_HTML_SECURITY_PRIVATE_ =<tr><td><a id="l85"></a><a href="#l85">85</a><td> goog.html.SafeUrl.TYPE_MARKER_GOOG_HTML_SECURITY_PRIVATE_;<tr><td><a id="l86"></a><a href="#l86">86</a><td>};<tr><td><a id="l87"></a><a href="#l87">87</a><td><tr><td><a id="l88"></a><a href="#l88">88</a><td><tr><td><a id="l89"></a><a href="#l89">89</a><td>/**<tr><td><a id="l90"></a><a href="#l90">90</a><td> * The innocuous string generated by goog.html.SafeUrl.sanitize when passed<tr><td><a id="l91"></a><a href="#l91">91</a><td> * an unsafe URL.<tr><td><a id="l92"></a><a href="#l92">92</a><td> *<tr><td><a id="l93"></a><a href="#l93">93</a><td> * about:invalid is registered in<tr><td><a id="l94"></a><a href="#l94">94</a><td> * http://www.w3.org/TR/css3-values/#about-invalid.<tr><td><a id="l95"></a><a href="#l95">95</a><td> * http://tools.ietf.org/html/rfc6694#section-2.2.1 permits about URLs to<tr><td><a id="l96"></a><a href="#l96">96</a><td> * contain a fragment, which is not to be considered when determining if an<tr><td><a id="l97"></a><a href="#l97">97</a><td> * about URL is well-known.<tr><td><a id="l98"></a><a href="#l98">98</a><td> *<tr><td><a id="l99"></a><a href="#l99">99</a><td> * Using about:invalid seems preferable to using a fixed data URL, since<tr><td><a id="l100"></a><a href="#l100">100</a><td> * browsers might choose to not report CSP violations on it, as legitimate<tr><td><a id="l101"></a><a href="#l101">101</a><td> * CSS function calls to attr() can result in this URL being produced. It is<tr><td><a id="l102"></a><a href="#l102">102</a><td> * also a standard URL which matches exactly the semantics we need:<tr><td><a id="l103"></a><a href="#l103">103</a><td> * "The about:invalid URI references a non-existent document with a generic<tr><td><a id="l104"></a><a href="#l104">104</a><td> * error condition. It can be used when a URI is necessary, but the default<tr><td><a id="l105"></a><a href="#l105">105</a><td> * value shouldn't be resolveable as any type of document".<tr><td><a id="l106"></a><a href="#l106">106</a><td> *<tr><td><a id="l107"></a><a href="#l107">107</a><td> * @const {string}<tr><td><a id="l108"></a><a href="#l108">108</a><td> */<tr><td><a id="l109"></a><a href="#l109">109</a><td>goog.html.SafeUrl.INNOCUOUS_STRING = 'about:invalid#zClosurez';<tr><td><a id="l110"></a><a href="#l110">110</a><td><tr><td><a id="l111"></a><a href="#l111">111</a><td><tr><td><a id="l112"></a><a href="#l112">112</a><td>/**<tr><td><a id="l113"></a><a href="#l113">113</a><td> * @override<tr><td><a id="l114"></a><a href="#l114">114</a><td> * @const<tr><td><a id="l115"></a><a href="#l115">115</a><td> */<tr><td><a id="l116"></a><a href="#l116">116</a><td>goog.html.SafeUrl.prototype.implementsGoogStringTypedString = true;<tr><td><a id="l117"></a><a href="#l117">117</a><td><tr><td><a id="l118"></a><a href="#l118">118</a><td><tr><td><a id="l119"></a><a href="#l119">119</a><td>/**<tr><td><a id="l120"></a><a href="#l120">120</a><td> * Returns this SafeUrl's value a string.<tr><td><a id="l121"></a><a href="#l121">121</a><td> *<tr><td><a id="l122"></a><a href="#l122">122</a><td> * IMPORTANT: In code where it is security relevant that an object's type is<tr><td><a id="l123"></a><a href="#l123">123</a><td> * indeed {@code SafeUrl}, use {@code goog.html.SafeUrl.unwrap} instead of this<tr><td><a id="l124"></a><a href="#l124">124</a><td> * method. If in doubt, assume that it's security relevant. In particular, note<tr><td><a id="l125"></a><a href="#l125">125</a><td> * that goog.html functions which return a goog.html type do not guarantee that<tr><td><a id="l126"></a><a href="#l126">126</a><td> * the returned instance is of the right type. For example:<tr><td><a id="l127"></a><a href="#l127">127</a><td> *<tr><td><a id="l128"></a><a href="#l128">128</a><td> * <pre><tr><td><a id="l129"></a><a href="#l129">129</a><td> * var fakeSafeHtml = new String('fake');<tr><td><a id="l130"></a><a href="#l130">130</a><td> * fakeSafeHtml.__proto__ = goog.html.SafeHtml.prototype;<tr><td><a id="l131"></a><a href="#l131">131</a><td> * var newSafeHtml = goog.html.SafeHtml.htmlEscape(fakeSafeHtml);<tr><td><a id="l132"></a><a href="#l132">132</a><td> * // newSafeHtml is just an alias for fakeSafeHtml, it's passed through by<tr><td><a id="l133"></a><a href="#l133">133</a><td> * // goog.html.SafeHtml.htmlEscape() as fakeSafeHtml instanceof<tr><td><a id="l134"></a><a href="#l134">134</a><td> * // goog.html.SafeHtml.<tr><td><a id="l135"></a><a href="#l135">135</a><td> * </pre><tr><td><a id="l136"></a><a href="#l136">136</a><td> *<tr><td><a id="l137"></a><a href="#l137">137</a><td> * IMPORTANT: The guarantees of the SafeUrl type contract only extend to the<tr><td><a id="l138"></a><a href="#l138">138</a><td> * behavior of browsers when interpreting URLs. Values of SafeUrl objects MUST<tr><td><a id="l139"></a><a href="#l139">139</a><td> * be appropriately escaped before embedding in a HTML document. Note that the<tr><td><a id="l140"></a><a href="#l140">140</a><td> * required escaping is context-sensitive (e.g. a different escaping is<tr><td><a id="l141"></a><a href="#l141">141</a><td> * required for embedding a URL in a style property within a style<tr><td><a id="l142"></a><a href="#l142">142</a><td> * attribute, as opposed to embedding in a href attribute).<tr><td><a id="l143"></a><a href="#l143">143</a><td> *<tr><td><a id="l144"></a><a href="#l144">144</a><td> * @see goog.html.SafeUrl#unwrap<tr><td><a id="l145"></a><a href="#l145">145</a><td> * @override<tr><td><a id="l146"></a><a href="#l146">146</a><td> */<tr><td><a id="l147"></a><a href="#l147">147</a><td>goog.html.SafeUrl.prototype.getTypedStringValue = function() {<tr><td><a id="l148"></a><a href="#l148">148</a><td> return this.privateDoNotAccessOrElseSafeHtmlWrappedValue_;<tr><td><a id="l149"></a><a href="#l149">149</a><td>};<tr><td><a id="l150"></a><a href="#l150">150</a><td><tr><td><a id="l151"></a><a href="#l151">151</a><td><tr><td><a id="l152"></a><a href="#l152">152</a><td>/**<tr><td><a id="l153"></a><a href="#l153">153</a><td> * @override<tr><td><a id="l154"></a><a href="#l154">154</a><td> * @const<tr><td><a id="l155"></a><a href="#l155">155</a><td> */<tr><td><a id="l156"></a><a href="#l156">156</a><td>goog.html.SafeUrl.prototype.implementsGoogI18nBidiDirectionalString = true;<tr><td><a id="l157"></a><a href="#l157">157</a><td><tr><td><a id="l158"></a><a href="#l158">158</a><td><tr><td><a id="l159"></a><a href="#l159">159</a><td>/**<tr><td><a id="l160"></a><a href="#l160">160</a><td> * Returns this URLs directionality, which is always {@code LTR}.<tr><td><a id="l161"></a><a href="#l161">161</a><td> * @override<tr><td><a id="l162"></a><a href="#l162">162</a><td> */<tr><td><a id="l163"></a><a href="#l163">163</a><td>goog.html.SafeUrl.prototype.getDirection = function() {<tr><td><a id="l164"></a><a href="#l164">164</a><td> return goog.i18n.bidi.Dir.LTR;<tr><td><a id="l165"></a><a href="#l165">165</a><td>};<tr><td><a id="l166"></a><a href="#l166">166</a><td><tr><td><a id="l167"></a><a href="#l167">167</a><td><tr><td><a id="l168"></a><a href="#l168">168</a><td>if (goog.DEBUG) {<tr><td><a id="l169"></a><a href="#l169">169</a><td> /**<tr><td><a id="l170"></a><a href="#l170">170</a><td> * Returns a debug string-representation of this value.<tr><td><a id="l171"></a><a href="#l171">171</a><td> *<tr><td><a id="l172"></a><a href="#l172">172</a><td> * To obtain the actual string value wrapped in a SafeUrl, use<tr><td><a id="l173"></a><a href="#l173">173</a><td> * {@code goog.html.SafeUrl.unwrap}.<tr><td><a id="l174"></a><a href="#l174">174</a><td> *<tr><td><a id="l175"></a><a href="#l175">175</a><td> * @see goog.html.SafeUrl#unwrap<tr><td><a id="l176"></a><a href="#l176">176</a><td> * @override<tr><td><a id="l177"></a><a href="#l177">177</a><td> */<tr><td><a id="l178"></a><a href="#l178">178</a><td> goog.html.SafeUrl.prototype.toString = function() {<tr><td><a id="l179"></a><a href="#l179">179</a><td> return 'SafeUrl{' + this.privateDoNotAccessOrElseSafeHtmlWrappedValue_ +<tr><td><a id="l180"></a><a href="#l180">180</a><td> '}';<tr><td><a id="l181"></a><a href="#l181">181</a><td> };<tr><td><a id="l182"></a><a href="#l182">182</a><td>}<tr><td><a id="l183"></a><a href="#l183">183</a><td><tr><td><a id="l184"></a><a href="#l184">184</a><td><tr><td><a id="l185"></a><a href="#l185">185</a><td>/**<tr><td><a id="l186"></a><a href="#l186">186</a><td> * Performs a runtime check that the provided object is indeed a SafeUrl<tr><td><a id="l187"></a><a href="#l187">187</a><td> * object, and returns its value.<tr><td><a id="l188"></a><a href="#l188">188</a><td> *<tr><td><a id="l189"></a><a href="#l189">189</a><td> * IMPORTANT: The guarantees of the SafeUrl type contract only extend to the<tr><td><a id="l190"></a><a href="#l190">190</a><td> * behavior of browsers when interpreting URLs. Values of SafeUrl objects MUST<tr><td><a id="l191"></a><a href="#l191">191</a><td> * be appropriately escaped before embedding in a HTML document. Note that the<tr><td><a id="l192"></a><a href="#l192">192</a><td> * required escaping is context-sensitive (e.g. a different escaping is<tr><td><a id="l193"></a><a href="#l193">193</a><td> * required for embedding a URL in a style property within a style<tr><td><a id="l194"></a><a href="#l194">194</a><td> * attribute, as opposed to embedding in a href attribute).<tr><td><a id="l195"></a><a href="#l195">195</a><td> *<tr><td><a id="l196"></a><a href="#l196">196</a><td> * @param {!goog.html.SafeUrl} safeUrl The object to extract from.<tr><td><a id="l197"></a><a href="#l197">197</a><td> * @return {string} The SafeUrl object's contained string, unless the run-time<tr><td><a id="l198"></a><a href="#l198">198</a><td> * type check fails. In that case, {@code unwrap} returns an innocuous<tr><td><a id="l199"></a><a href="#l199">199</a><td> * string, or, if assertions are enabled, throws<tr><td><a id="l200"></a><a href="#l200">200</a><td> * {@code goog.asserts.AssertionError}.<tr><td><a id="l201"></a><a href="#l201">201</a><td> */<tr><td><a id="l202"></a><a href="#l202">202</a><td>goog.html.SafeUrl.unwrap = function(safeUrl) {<tr><td><a id="l203"></a><a href="#l203">203</a><td> // Perform additional Run-time type-checking to ensure that safeUrl is indeed<tr><td><a id="l204"></a><a href="#l204">204</a><td> // an instance of the expected type. This provides some additional protection<tr><td><a id="l205"></a><a href="#l205">205</a><td> // against security bugs due to application code that disables type checks.<tr><td><a id="l206"></a><a href="#l206">206</a><td> // Specifically, the following checks are performed:<tr><td><a id="l207"></a><a href="#l207">207</a><td> // 1. The object is an instance of the expected type.<tr><td><a id="l208"></a><a href="#l208">208</a><td> // 2. The object is not an instance of a subclass.<tr><td><a id="l209"></a><a href="#l209">209</a><td> // 3. The object carries a type marker for the expected type. "Faking" an<tr><td><a id="l210"></a><a href="#l210">210</a><td> // object requires a reference to the type marker, which has names intended<tr><td><a id="l211"></a><a href="#l211">211</a><td> // to stand out in code reviews.<tr><td><a id="l212"></a><a href="#l212">212</a><td> if (safeUrl instanceof goog.html.SafeUrl &&<tr><td><a id="l213"></a><a href="#l213">213</a><td> safeUrl.constructor === goog.html.SafeUrl &&<tr><td><a id="l214"></a><a href="#l214">214</a><td> safeUrl.SAFE_URL_TYPE_MARKER_GOOG_HTML_SECURITY_PRIVATE_ ===<tr><td><a id="l215"></a><a href="#l215">215</a><td> goog.html.SafeUrl.TYPE_MARKER_GOOG_HTML_SECURITY_PRIVATE_) {<tr><td><a id="l216"></a><a href="#l216">216</a><td> return safeUrl.privateDoNotAccessOrElseSafeHtmlWrappedValue_;<tr><td><a id="l217"></a><a href="#l217">217</a><td> } else {<tr><td><a id="l218"></a><a href="#l218">218</a><td> goog.asserts.fail('expected object of type SafeUrl, got \'' +<tr><td><a id="l219"></a><a href="#l219">219</a><td> safeUrl + '\'');<tr><td><a id="l220"></a><a href="#l220">220</a><td> return 'type_error:SafeUrl';<tr><td><a id="l221"></a><a href="#l221">221</a><td><tr><td><a id="l222"></a><a href="#l222">222</a><td> }<tr><td><a id="l223"></a><a href="#l223">223</a><td>};<tr><td><a id="l224"></a><a href="#l224">224</a><td><tr><td><a id="l225"></a><a href="#l225">225</a><td><tr><td><a id="l226"></a><a href="#l226">226</a><td>/**<tr><td><a id="l227"></a><a href="#l227">227</a><td> * Creates a SafeUrl object from a compile-time constant string.<tr><td><a id="l228"></a><a href="#l228">228</a><td> *<tr><td><a id="l229"></a><a href="#l229">229</a><td> * Compile-time constant strings are inherently program-controlled and hence<tr><td><a id="l230"></a><a href="#l230">230</a><td> * trusted.<tr><td><a id="l231"></a><a href="#l231">231</a><td> *<tr><td><a id="l232"></a><a href="#l232">232</a><td> * @param {!goog.string.Const} url A compile-time-constant string from which to<tr><td><a id="l233"></a><a href="#l233">233</a><td> * create a SafeUrl.<tr><td><a id="l234"></a><a href="#l234">234</a><td> * @return {!goog.html.SafeUrl} A SafeUrl object initialized to {@code url}.<tr><td><a id="l235"></a><a href="#l235">235</a><td> */<tr><td><a id="l236"></a><a href="#l236">236</a><td>goog.html.SafeUrl.fromConstant = function(url) {<tr><td><a id="l237"></a><a href="#l237">237</a><td> return goog.html.SafeUrl.createSafeUrlSecurityPrivateDoNotAccessOrElse(<tr><td><a id="l238"></a><a href="#l238">238</a><td> goog.string.Const.unwrap(url));<tr><td><a id="l239"></a><a href="#l239">239</a><td>};<tr><td><a id="l240"></a><a href="#l240">240</a><td><tr><td><a id="l241"></a><a href="#l241">241</a><td><tr><td><a id="l242"></a><a href="#l242">242</a><td>/**<tr><td><a id="l243"></a><a href="#l243">243</a><td> * A pattern that matches Blob or data types that can have SafeUrls created<tr><td><a id="l244"></a><a href="#l244">244</a><td> * from URL.createObjectURL(blob) or via a data: URI. Only matches image and<tr><td><a id="l245"></a><a href="#l245">245</a><td> * video types, currently.<tr><td><a id="l246"></a><a href="#l246">246</a><td> * @const<tr><td><a id="l247"></a><a href="#l247">247</a><td> * @private<tr><td><a id="l248"></a><a href="#l248">248</a><td> */<tr><td><a id="l249"></a><a href="#l249">249</a><td>goog.html.SAFE_MIME_TYPE_PATTERN_ =<tr><td><a id="l250"></a><a href="#l250">250</a><td> /^(?:image\/(?:bmp|gif|jpeg|jpg|png|tiff|webp)|video\/(?:mpeg|mp4|ogg|webm))$/i;<tr><td><a id="l251"></a><a href="#l251">251</a><td><tr><td><a id="l252"></a><a href="#l252">252</a><td><tr><td><a id="l253"></a><a href="#l253">253</a><td>/**<tr><td><a id="l254"></a><a href="#l254">254</a><td> * Creates a SafeUrl wrapping a blob URL for the given {@code blob}.<tr><td><a id="l255"></a><a href="#l255">255</a><td> *<tr><td><a id="l256"></a><a href="#l256">256</a><td> * The blob URL is created with {@code URL.createObjectURL}. If the MIME type<tr><td><a id="l257"></a><a href="#l257">257</a><td> * for {@code blob} is not of a known safe image or video MIME type, then the<tr><td><a id="l258"></a><a href="#l258">258</a><td> * SafeUrl will wrap {@link #INNOCUOUS_STRING}.<tr><td><a id="l259"></a><a href="#l259">259</a><td> *<tr><td><a id="l260"></a><a href="#l260">260</a><td> * @see http://www.w3.org/TR/FileAPI/#url<tr><td><a id="l261"></a><a href="#l261">261</a><td> * @param {!Blob} blob<tr><td><a id="l262"></a><a href="#l262">262</a><td> * @return {!goog.html.SafeUrl} The blob URL, or an innocuous string wrapped<tr><td><a id="l263"></a><a href="#l263">263</a><td> * as a SafeUrl.<tr><td><a id="l264"></a><a href="#l264">264</a><td> */<tr><td><a id="l265"></a><a href="#l265">265</a><td>goog.html.SafeUrl.fromBlob = function(blob) {<tr><td><a id="l266"></a><a href="#l266">266</a><td> var url = goog.html.SAFE_MIME_TYPE_PATTERN_.test(blob.type) ?<tr><td><a id="l267"></a><a href="#l267">267</a><td> goog.fs.url.createObjectUrl(blob) : goog.html.SafeUrl.INNOCUOUS_STRING;<tr><td><a id="l268"></a><a href="#l268">268</a><td> return goog.html.SafeUrl.createSafeUrlSecurityPrivateDoNotAccessOrElse(url);<tr><td><a id="l269"></a><a href="#l269">269</a><td>};<tr><td><a id="l270"></a><a href="#l270">270</a><td><tr><td><a id="l271"></a><a href="#l271">271</a><td><tr><td><a id="l272"></a><a href="#l272">272</a><td>/**<tr><td><a id="l273"></a><a href="#l273">273</a><td> * Matches a base-64 data URL, with the first match group being the MIME type.<tr><td><a id="l274"></a><a href="#l274">274</a><td> * @const<tr><td><a id="l275"></a><a href="#l275">275</a><td> * @private<tr><td><a id="l276"></a><a href="#l276">276</a><td> */<tr><td><a id="l277"></a><a href="#l277">277</a><td>goog.html.DATA_URL_PATTERN_ = /^data:([^;,]*);base64,[a-z0-9+\/]+=*$/i;<tr><td><a id="l278"></a><a href="#l278">278</a><td><tr><td><a id="l279"></a><a href="#l279">279</a><td><tr><td><a id="l280"></a><a href="#l280">280</a><td>/**<tr><td><a id="l281"></a><a href="#l281">281</a><td> * Creates a SafeUrl wrapping a data: URL, after validating it matches a<tr><td><a id="l282"></a><a href="#l282">282</a><td> * known-safe image or video MIME type.<tr><td><a id="l283"></a><a href="#l283">283</a><td> *<tr><td><a id="l284"></a><a href="#l284">284</a><td> * @param {string} dataUrl A valid base64 data URL with one of the whitelisted<tr><td><a id="l285"></a><a href="#l285">285</a><td> * image or video MIME types.<tr><td><a id="l286"></a><a href="#l286">286</a><td> * @return {!goog.html.SafeUrl} A matching safe URL, or {@link INNOCUOUS_STRING}<tr><td><a id="l287"></a><a href="#l287">287</a><td> * wrapped as a SafeUrl if it does not pass.<tr><td><a id="l288"></a><a href="#l288">288</a><td> */<tr><td><a id="l289"></a><a href="#l289">289</a><td>goog.html.SafeUrl.fromDataUrl = function(dataUrl) {<tr><td><a id="l290"></a><a href="#l290">290</a><td> // There's a slight risk here that a browser sniffs the content type if it<tr><td><a id="l291"></a><a href="#l291">291</a><td> // doesn't know the MIME type and executes HTML within the data: URL. For this<tr><td><a id="l292"></a><a href="#l292">292</a><td> // to cause XSS it would also have to execute the HTML in the same origin<tr><td><a id="l293"></a><a href="#l293">293</a><td> // of the page with the link. It seems unlikely that both of these will<tr><td><a id="l294"></a><a href="#l294">294</a><td> // happen, particularly in not really old IEs.<tr><td><a id="l295"></a><a href="#l295">295</a><td> var match = dataUrl.match(goog.html.DATA_URL_PATTERN_);<tr><td><a id="l296"></a><a href="#l296">296</a><td> var valid = match && goog.html.SAFE_MIME_TYPE_PATTERN_.test(match[1]);<tr><td><a id="l297"></a><a href="#l297">297</a><td> return goog.html.SafeUrl.createSafeUrlSecurityPrivateDoNotAccessOrElse(<tr><td><a id="l298"></a><a href="#l298">298</a><td> valid ? dataUrl : goog.html.SafeUrl.INNOCUOUS_STRING);<tr><td><a id="l299"></a><a href="#l299">299</a><td>};<tr><td><a id="l300"></a><a href="#l300">300</a><td><tr><td><a id="l301"></a><a href="#l301">301</a><td><tr><td><a id="l302"></a><a href="#l302">302</a><td>/**<tr><td><a id="l303"></a><a href="#l303">303</a><td> * A pattern that recognizes a commonly useful subset of URLs that satisfy<tr><td><a id="l304"></a><a href="#l304">304</a><td> * the SafeUrl contract.<tr><td><a id="l305"></a><a href="#l305">305</a><td> *<tr><td><a id="l306"></a><a href="#l306">306</a><td> * This regular expression matches a subset of URLs that will not cause script<tr><td><a id="l307"></a><a href="#l307">307</a><td> * execution if used in URL context within a HTML document. Specifically, this<tr><td><a id="l308"></a><a href="#l308">308</a><td> * regular expression matches if (comment from here on and regex copied from<tr><td><a id="l309"></a><a href="#l309">309</a><td> * Soy's EscapingConventions):<tr><td><a id="l310"></a><a href="#l310">310</a><td> * (1) Either a protocol in a whitelist (http, https, mailto or ftp).<tr><td><a id="l311"></a><a href="#l311">311</a><td> * (2) or no protocol. A protocol must be followed by a colon. The below<tr><td><a id="l312"></a><a href="#l312">312</a><td> * allows that by allowing colons only after one of the characters [/?#].<tr><td><a id="l313"></a><a href="#l313">313</a><td> * A colon after a hash (#) must be in the fragment.<tr><td><a id="l314"></a><a href="#l314">314</a><td> * Otherwise, a colon after a (?) must be in a query.<tr><td><a id="l315"></a><a href="#l315">315</a><td> * Otherwise, a colon after a single solidus (/) must be in a path.<tr><td><a id="l316"></a><a href="#l316">316</a><td> * Otherwise, a colon after a double solidus (//) must be in the authority<tr><td><a id="l317"></a><a href="#l317">317</a><td> * (before port).<tr><td><a id="l318"></a><a href="#l318">318</a><td> *<tr><td><a id="l319"></a><a href="#l319">319</a><td> * The pattern disallows &, used in HTML entity declarations before<tr><td><a id="l320"></a><a href="#l320">320</a><td> * one of the characters in [/?#]. This disallows HTML entities used in the<tr><td><a id="l321"></a><a href="#l321">321</a><td> * protocol name, which should never happen, e.g. "h&#116;tp" for "http".<tr><td><a id="l322"></a><a href="#l322">322</a><td> * It also disallows HTML entities in the first path part of a relative path,<tr><td><a id="l323"></a><a href="#l323">323</a><td> * e.g. "foo&lt;bar/baz". Our existing escaping functions should not produce<tr><td><a id="l324"></a><a href="#l324">324</a><td> * that. More importantly, it disallows masking of a colon,<tr><td><a id="l325"></a><a href="#l325">325</a><td> * e.g. "javascript&#58;...".<tr><td><a id="l326"></a><a href="#l326">326</a><td> *<tr><td><a id="l327"></a><a href="#l327">327</a><td> * @private<tr><td><a id="l328"></a><a href="#l328">328</a><td> * @const {!RegExp}<tr><td><a id="l329"></a><a href="#l329">329</a><td> */<tr><td><a id="l330"></a><a href="#l330">330</a><td>goog.html.SAFE_URL_PATTERN_ =<tr><td><a id="l331"></a><a href="#l331">331</a><td> /^(?:(?:https?|mailto|ftp):|[^&:/?#]*(?:[/?#]|$))/i;<tr><td><a id="l332"></a><a href="#l332">332</a><td><tr><td><a id="l333"></a><a href="#l333">333</a><td><tr><td><a id="l334"></a><a href="#l334">334</a><td>/**<tr><td><a id="l335"></a><a href="#l335">335</a><td> * Creates a SafeUrl object from {@code url}. If {@code url} is a<tr><td><a id="l336"></a><a href="#l336">336</a><td> * goog.html.SafeUrl then it is simply returned. Otherwise the input string is<tr><td><a id="l337"></a><a href="#l337">337</a><td> * validated to match a pattern of commonly used safe URLs. The string is<tr><td><a id="l338"></a><a href="#l338">338</a><td> * converted to UTF-8 and non-whitelisted characters are percent-encoded. The<tr><td><a id="l339"></a><a href="#l339">339</a><td> * string wrapped by the created SafeUrl will thus contain only ASCII printable<tr><td><a id="l340"></a><a href="#l340">340</a><td> * characters.<tr><td><a id="l341"></a><a href="#l341">341</a><td> *<tr><td><a id="l342"></a><a href="#l342">342</a><td> * {@code url} may be a URL with the http, https, mailto or ftp scheme,<tr><td><a id="l343"></a><a href="#l343">343</a><td> * or a relative URL (i.e., a URL without a scheme; specifically, a<tr><td><a id="l344"></a><a href="#l344">344</a><td> * scheme-relative, absolute-path-relative, or path-relative URL).<tr><td><a id="l345"></a><a href="#l345">345</a><td> *<tr><td><a id="l346"></a><a href="#l346">346</a><td> * {@code url} is converted to UTF-8 and non-whitelisted characters are<tr><td><a id="l347"></a><a href="#l347">347</a><td> * percent-encoded. Whitelisted characters are '%' and, from RFC 3986,<tr><td><a id="l348"></a><a href="#l348">348</a><td> * unreserved characters and reserved characters, with the exception of '\'',<tr><td><a id="l349"></a><a href="#l349">349</a><td> * '(' and ')'. This ensures the the SafeUrl contains only ASCII-printable<tr><td><a id="l350"></a><a href="#l350">350</a><td> * characters and reduces the chance of security bugs were it to be<tr><td><a id="l351"></a><a href="#l351">351</a><td> * interpolated into a specific context without the necessary escaping.<tr><td><a id="l352"></a><a href="#l352">352</a><td> *<tr><td><a id="l353"></a><a href="#l353">353</a><td> * If {@code url} fails validation or does not UTF-16 decode correctly<tr><td><a id="l354"></a><a href="#l354">354</a><td> * (JavaScript strings are UTF-16 encoded), this function returns a SafeUrl<tr><td><a id="l355"></a><a href="#l355">355</a><td> * object containing an innocuous string, goog.html.SafeUrl.INNOCUOUS_STRING.<tr><td><a id="l356"></a><a href="#l356">356</a><td> *<tr><td><a id="l357"></a><a href="#l357">357</a><td> * @see http://url.spec.whatwg.org/#concept-relative-url<tr><td><a id="l358"></a><a href="#l358">358</a><td> * @param {string|!goog.string.TypedString} url The URL to validate.<tr><td><a id="l359"></a><a href="#l359">359</a><td> * @return {!goog.html.SafeUrl} The validated URL, wrapped as a SafeUrl.<tr><td><a id="l360"></a><a href="#l360">360</a><td> */<tr><td><a id="l361"></a><a href="#l361">361</a><td>goog.html.SafeUrl.sanitize = function(url) {<tr><td><a id="l362"></a><a href="#l362">362</a><td> if (url instanceof goog.html.SafeUrl) {<tr><td><a id="l363"></a><a href="#l363">363</a><td> return url;<tr><td><a id="l364"></a><a href="#l364">364</a><td> }<tr><td><a id="l365"></a><a href="#l365">365</a><td> else if (url.implementsGoogStringTypedString) {<tr><td><a id="l366"></a><a href="#l366">366</a><td> url = url.getTypedStringValue();<tr><td><a id="l367"></a><a href="#l367">367</a><td> } else {<tr><td><a id="l368"></a><a href="#l368">368</a><td> url = String(url);<tr><td><a id="l369"></a><a href="#l369">369</a><td> }<tr><td><a id="l370"></a><a href="#l370">370</a><td> if (!goog.html.SAFE_URL_PATTERN_.test(url)) {<tr><td><a id="l371"></a><a href="#l371">371</a><td> url = goog.html.SafeUrl.INNOCUOUS_STRING;<tr><td><a id="l372"></a><a href="#l372">372</a><td> }<tr><td><a id="l373"></a><a href="#l373">373</a><td> return goog.html.SafeUrl.createSafeUrlSecurityPrivateDoNotAccessOrElse(url);<tr><td><a id="l374"></a><a href="#l374">374</a><td>};<tr><td><a id="l375"></a><a href="#l375">375</a><td><tr><td><a id="l376"></a><a href="#l376">376</a><td><tr><td><a id="l377"></a><a href="#l377">377</a><td>/**<tr><td><a id="l378"></a><a href="#l378">378</a><td> * Type marker for the SafeUrl type, used to implement additional run-time<tr><td><a id="l379"></a><a href="#l379">379</a><td> * type checking.<tr><td><a id="l380"></a><a href="#l380">380</a><td> * @const {!Object}<tr><td><a id="l381"></a><a href="#l381">381</a><td> * @private<tr><td><a id="l382"></a><a href="#l382">382</a><td> */<tr><td><a id="l383"></a><a href="#l383">383</a><td>goog.html.SafeUrl.TYPE_MARKER_GOOG_HTML_SECURITY_PRIVATE_ = {};<tr><td><a id="l384"></a><a href="#l384">384</a><td><tr><td><a id="l385"></a><a href="#l385">385</a><td><tr><td><a id="l386"></a><a href="#l386">386</a><td>/**<tr><td><a id="l387"></a><a href="#l387">387</a><td> * Package-internal utility method to create SafeUrl instances.<tr><td><a id="l388"></a><a href="#l388">388</a><td> *<tr><td><a id="l389"></a><a href="#l389">389</a><td> * @param {string} url The string to initialize the SafeUrl object with.<tr><td><a id="l390"></a><a href="#l390">390</a><td> * @return {!goog.html.SafeUrl} The initialized SafeUrl object.<tr><td><a id="l391"></a><a href="#l391">391</a><td> * @package<tr><td><a id="l392"></a><a href="#l392">392</a><td> */<tr><td><a id="l393"></a><a href="#l393">393</a><td>goog.html.SafeUrl.createSafeUrlSecurityPrivateDoNotAccessOrElse = function(<tr><td><a id="l394"></a><a href="#l394">394</a><td> url) {<tr><td><a id="l395"></a><a href="#l395">395</a><td> var safeUrl = new goog.html.SafeUrl();<tr><td><a id="l396"></a><a href="#l396">396</a><td> safeUrl.privateDoNotAccessOrElseSafeHtmlWrappedValue_ = url;<tr><td><a id="l397"></a><a href="#l397">397</a><td> return safeUrl;<tr><td><a id="l398"></a><a href="#l398">398</a><td>};</table></div></article><nav><h3><a href="../../../../index.html" tabindex="2">Overview</a></h3><div><input type="checkbox" id="nav-modules" checked/><label for="nav-modules"><h3><span class="selectable" tabindex="2">Modules</span></h3></label><div id="nav-modules-view"></div></div><div><input type="checkbox" id="nav-types" checked/><label for="nav-types"><h3><span class="selectable" tabindex="2">Types</span></h3></label><div id="nav-types-view"></div></div><h3><a href="../../../../Changes.html" tabindex="2">Changes</a></h3></nav></main><footer><div><a href="https://github.com/jleyba/js-dossier">Generated by dossier</a></div></footer><script src="../../../../types.js"></script><script src="../../../../dossier.js"></script>