From 39121de4d991bdcf5f202da4d8d81a8ac6c149fc Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Bj=C3=B8rn=20Erik=20Pedersen?= Date: Mon, 21 Oct 2019 10:21:37 +0200 Subject: docs: Replace /docs --- docs/content/en/functions/safeURL.md | 72 ------------------------------------ 1 file changed, 72 deletions(-) delete mode 100644 docs/content/en/functions/safeURL.md (limited to 'docs/content/en/functions/safeURL.md') diff --git a/docs/content/en/functions/safeURL.md b/docs/content/en/functions/safeURL.md deleted file mode 100644 index cb9979cd3..000000000 --- a/docs/content/en/functions/safeURL.md +++ /dev/null @@ -1,72 +0,0 @@ ---- -title: safeURL -description: Declares the provided string as a safe URL or URL substring. -godocref: https://golang.org/pkg/html/template/#HTMLEscape -date: 2017-02-01 -publishdate: 2017-02-01 -lastmod: 2017-02-01 -keywords: [strings,urls] -categories: [functions] -menu: - docs: - parent: "functions" -signature: ["safeURL INPUT"] -workson: [] -hugoversion: -relatedfuncs: [] -deprecated: false -aliases: [] ---- - -`safeURL` declares the provided string as a "safe" URL or URL substring (see [RFC 3986][]). A URL like `javascript:checkThatFormNotEditedBeforeLeavingPage()` from a trusted source should go in the page, but by default dynamic `javascript:` URLs are filtered out since they are a frequently exploited injection vector. - -Without `safeURL`, only the URI schemes `http:`, `https:` and `mailto:` are considered safe by Go templates. If any other URI schemes (e.g., `irc:` and `javascript:`) are detected, the whole URL will be replaced with `#ZgotmplZ`. This is to "defang" any potential attack in the URL by rendering it useless. - -The following examples use a [site `config.toml`][configuration] with the following [menu entry][menus]: - -{{< code file="config.toml" copy="false" >}} -[[menu.main]] - name = "IRC: #golang at freenode" - url = "irc://irc.freenode.net/#golang" -{{< /code >}} - -The following is an example of a sidebar partial that may be used in conjunction with the preceding front matter example: - -{{< code file="layouts/partials/bad-url-sidebar-menu.html" copy="false" >}} - - -{{< /code >}} - -This partial would produce the following HTML output: - -{{< output file="bad-url-sidebar-menu-output.html" >}} - - -{{< /output >}} - -The odd output can be remedied by adding ` | safeURL` to our `.Title` page variable: - -{{< code file="layouts/partials/correct-url-sidebar-menu.html" copy="false" >}} - - -{{< /code >}} - -With the `.URL` page variable piped through `safeURL`, we get the desired output: - -{{< output file="correct-url-sidebar-menu-output.html" >}} - -{{< /output >}} - -[configuration]: /getting-started/configuration/ -[menus]: /content-management/menus/ -[RFC 3986]: http://tools.ietf.org/html/rfc3986 -- cgit v1.2.3