darkghosthunter / larasane
Quickly and easily secure HTML text.
Fund package maintenance!
Ko Fi
paypal.me/darkghosthunter
Requires
- php: ^7.4||^8.0
- ext-mbstring: *
- illuminate/support: 7.*||8.*
- tgalopin/html-sanitizer: ^1.4.0
Requires (Dev)
- orchestra/testbench: ^5.18||^v6.17.0
- phpunit/phpunit: ^9.5.4
This package is auto-updated.
Last update: 2024-11-15 01:47:28 UTC
README
Larasane
Quickly sanitize text into safe-HTML using fluid methods.
Requirements
- PHP 7.4, 8.0 or later.
- Laravel 7.x, 8.x or later.
Installation
Just fire up Composer:
composer require darkghosthunter/larasane
And that's it.
Usage
After you receive the HTML input you want to sanitize, use the Sanitizer
facade to do it.
<?php use DarkGhostHunter\Larasane\Facades\Sanitizer; $input = 'Trust <script src="https://malicio.us/code.js"></script> me!'; echo Sanitizer::input($input)->sanitize($input); // "Trust me!"
The sanitizer has a bunch of fluid methods you can chain to allow or disallow tags and attributes, and links.
By default, Larasane cleans everything except the most basic tags: a
, b
, br
, blockquote
, div
, del
, em
, figcaption
, figure
, h1
, h2
, h3
, h4
, h5
, h6
, i
, p
, q
, small
, span
, strong
, sub
, sup
.
You can enable more tags by enabling each of the included extensions, or create your own.
If you need to strip all tags from a string, use
strip_tags()
instead.
Configuration
Larasane works out of the box to sanitize any tag that is not-basic, but you can configure the defaults by publishing the config file.
php artisan vendor:publish --provider="DarkGhostHunter\Larasane\LarasaneServiceProvider" --tag="config"
You will receive the config/larasane.php
file with the following contents.
<?php return [ 'max_length' => 1000, 'allow_code' => [ 'basic', ], 'security' => [ 'enforced_domains' => null, 'enforce_https' => null, 'image_data' => false, 'allow_mailto' => false, ], 'tags' => [ 'div' => 'class', 'img' => ['src', 'alt', 'title', 'class'], 'a' => ['class', 'target'], 'ul' => 'class', 'ol' => 'class', 'li' => 'class', ] ];
Max Length
return [ 'max_length' => 1000, ];
Inputs to sanitize will be truncated at a max length. You can change this globally, or per sanitization.
$sanitized = Sanitizer::for($input)->maxLength(200);
Code allowed
return [ 'allow_code' => [ 'basic', /* 'list', 'table', 'image', 'code', 'iframe', 'details', 'extra' */ ], ];
The type tags to allow in an HTML input. These are grouped by the name of the extension, and only allows for basic HTML tags by default. You can override the list per-sanitization basis:
$sanitized = Sanitizer::for($input)->allowCode('basic', 'list', 'table');
If you need to accept custom tags, you should create an extension to handle them.
Security
return [ 'security' => [ 'enforce_hosts' => null, 'enforce_https' => null, 'image_data' => false, 'allow_mailto' => false, ], ];
This groups some security features for handling links in <a>
, <img>
and <iframe>
tags. These all can be overridden at runtime.
$input = Sanitizer::for($input) ->hosts('myapp.com') ->enforceHttps(true) ->imageData(true) ->allowMailto(true);
enforce_hosts
You can set here a list of hosts to allow links, like myapp.com
.
If null
, no link protection will be enforced, so will allow links to point anywhere. If the list is empty, links on tags will appear empty.
enforce_https
Enforces HTTPS links, which will transform each link to https
scheme. This is mostly required on <iframe>
.
If null
, it will be only enabled on production environments.
image_data
Allow <img>
to include image data in the source tag. This is sometimes desirable for small icons or images, as the image will be embedded in the HTML code instead of being linked elsewhere.
<img src="data:image/gif;base64,R0lGODlhEAAQAMQAAORHHOVSKudfOu..." />
allow_mailto
The <a>
tags can have mail links. This simply allows or disallows them.
Tags
return [ 'tags' => [ 'div' => 'class', 'img' => ['src', 'alt', 'title', 'class'], 'a' => ['class', 'target'], 'ul' => 'class', 'ol' => 'class', 'li' => 'class', ] ];
This is an array of allowed attributes for each tag that is sanitized. This may be useful for allow styling or disallow problematic attributes on the frontend. This can be overriden at runtime.
$sanitized = Sanitizer::for($input)->tagAttributes('a', 'class', 'target');
Adding Sanitization Extensions
You can create your own tag parsing extensions if you need more functionality apart from the ones included, like parsing custom tags. Once you create your custom extension, you can use extend()
to add it to the Sanitizer builder in your AppServiceProvider
or similar.
use HtmlSanitizer\SanitizerBuilder; use App\Sanitizer\MyExtension; /** * Register the application services. * * @return void */ public function register() { $this->app->extend(SanitizerBuilder::class, function (SanitizerBuilder $builder) { return $builder->registerExtension(new MyExtension()); }); }
License
This package is licenced by the MIT License.