Add security vulnerability notice.
[htmlpurifier-web.git] / demo.php
blob97211ddf19972a56956bea665d34b4d7d61a2aa1
1 <?php
3 // major TODO: hook into some sort of templating system that utilizes
4 // XHTML Compiler to process the template (cacheable, of course), before
5 // passing it along to this script
7 // using _REQUEST because we accept GET and POST requests
9 function getFormMethod() {
10 return (isset($_REQUEST['post'])) ? 'post' : 'get';
12 function escapeHTML($html) {
13 return htmlspecialchars(
14 HTMLPurifier_Encoder::cleanUTF8($html), ENT_COMPAT, 'UTF-8');
16 function isLocal() {
17 static $name = false;
18 if (!$name) {
19 if (file_exists($dir = 'xhtml-compiler/conf/name.txt')) {
20 $name = trim(file_get_contents($dir));
21 } elseif (file_exists('xhtml-compiler/local.txt')) {
22 $name = 'EZYANG';
25 return $name == 'EZYANG' || $name == 'EZYANG2';
28 if (empty($_REQUEST['experimental'])) {
29 require_once 'live/library/HTMLPurifier.auto.php';
30 } elseif (!isLocal()) {
31 require_once 'dev/library/HTMLPurifier.auto.php';
32 } else {
33 require_once '../htmlpurifier/library/HTMLPurifier.auto.php';
35 require_once 'HTMLPurifier/Printer/ConfigForm.php';
37 $allowed_lite = array(
38 'Core.CollectErrors',
39 'URI.DisableExternalResources',
40 'URI.Munge',
41 'HTML.TidyLevel',
42 'HTML.Doctype',
43 'HTML.Allowed',
44 'CSS',
45 'AutoFormat',
46 '-AutoFormat.Custom',
47 '-AutoFormat.PurifierLinkify',
50 $config = HTMLPurifier_Config::loadArrayFromForm($_REQUEST, 'filter', $allowed_lite);
51 $purifier = new HTMLPurifier($config);
53 if (!empty($_REQUEST['strict'])) {
54 // backwards-compatibility
55 $config->set('HTML', 'Strict', true);
57 if (!empty($_REQUEST['experimental'])) {
58 require_once 'HTMLPurifier/Lexer/PH5P.php';
59 $config->set('Core', 'LexerImpl', 'PH5P');
62 if (file_exists('demo.custom.php') && isLocal()) include 'demo.custom.php';
64 $definition = $config->getHTMLDefinition();
65 $doctype = $definition->doctype;
67 if ($doctype->xml && stripos($_SERVER["HTTP_ACCEPT"], 'application/xhtml+xml') !== false && !isset($_REQUEST['debug'])) {
68 $type = 'application/xhtml+xml';
69 } else {
70 $type = 'text/html';
72 header("Content-type:$type;charset=UTF-8");
74 // prevent PHP versions with shorttags from barfing
75 if ($doctype->xml) {
76 echo '<?xml version="1.0" encoding="UTF-8" ?>' . PHP_EOL;
79 if (!empty($doctype->dtdPublic) && !empty($doctype->dtdSystem)) {
80 echo '<!DOCTYPE html PUBLIC "'.$doctype->dtdPublic.'" "'.$doctype->dtdSystem.'">' . PHP_EOL;
83 if ($doctype->xml) {
84 echo '<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">' . PHP_EOL;
85 $END = ' /';
86 } else {
87 echo '<html lang="en">' . PHP_EOL;
88 $END = '';
91 ?><head>
92 <title>HTML Purifier Live Demo</title>
93 <!-- make sure all empty elements that are not generated are
94 appropriately ended -->
95 <meta name="author" content="Edward Z. Yang"<?php echo $END; ?>>
96 <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"<?php echo $END; ?>>
97 <link rel="icon" href="favicon.ico" type="image/x-icon"<?php echo $END; ?>>
98 <link rel="shortcut icon" href="favicon.ico" type="image/x-icon"<?php echo $END; ?>>
99 <link rel="stylesheet" href="common.css" type="text/css"<?php echo $END; ?>>
100 <link rel="stylesheet" href="demo.css" type="text/css"<?php echo $END; ?>>
101 <link rel="stylesheet" href="live/library/HTMLPurifier/Printer/ConfigForm.css" type="text/css"<?php echo $END; ?>>
102 <script defer="defer" type="text/javascript" src="live/library/HTMLPurifier/Printer/ConfigForm.js"></script>
103 </head>
104 <body>
105 <div id="logo"></div>
106 <div id="header"><a href=".">HTML Purifier</a></div>
107 <?php
108 if (file_exists('navigation.frag')) {
109 readfile('navigation.frag');
110 } else { ?>
111 <div><strong>Please navigate to <a href="navigation.html">navigation.html</a> to regenerate menu</strong></div>
112 <?php }
114 <h1 id="title">Live Demo</h1>
115 <div id="alt-content">
116 <?php
118 if (!empty($_REQUEST['html'])) { // start result
120 if (strlen($_REQUEST['html']) > 50000) {
122 <p>Request exceeds maximum allowed text size of 50kb.</p>
123 <?php
124 } else { // start main processing
126 $html = get_magic_quotes_gpc() ? stripslashes($_REQUEST['html']) : $_REQUEST['html'];
127 $pure_html = $purifier->purify($html);
130 <p>Here is your purified HTML:</p>
131 <div id="output">
132 <?php if(getFormMethod() == 'get') {
133 // calculate image
134 $img = false;
135 if ($doctype->name == 'HTML 4.01 Transitional' || $doctype->name == 'HTML 4.01 Strict') {
136 $img = 'http://www.w3.org/Icons/valid-html401';
137 } elseif ($doctype->name == 'XHTML 1.0 Transitional' || $doctype->name == 'XHTML 1.0 Strict') {
138 $img = 'http://www.w3.org/Icons/valid-xhtml10';
139 } elseif ($doctype->name == 'XHTML 1.1') {
140 $img = 'http://www.w3.org/Icons/valid-xhtml11';
143 <div id="w3c-validator">
144 <a href="http://validator.w3.org/check?uri=referer" title="Valid <?php echo escapeHTML($doctype->name); ?>">
145 <?php if ($img) { ?>
146 <img
147 src="<?php echo escapeHTML($img); ?>" height="31" width="88"
148 alt="Valid <?php echo escapeHTML($doctype->name); ?>"<?php echo $END; ?>>
149 <?php } else { ?>
150 Valid <?php echo escapeHTML($doctype->name); ?>
151 <?php } ?>
152 </a>
153 </div>
154 <?php } ?>
155 <?php
157 echo $pure_html;
160 <div class="clear"></div>
161 </div>
162 <?php if ($config->get('Core', 'CollectErrors')) {
163 $e = $purifier->context->get('ErrorCollector');
164 $class = $e->getRaw() ? 'fail' : 'pass';
166 <p>Here are errors that occurred during purification:</p>
167 <div id="errors" class="<?php echo $class ?>">
168 <?php
169 echo $e->getHTMLFormatted($config);
171 </div>
172 <?php } ?>
173 <p>Here is the source code of the purified HTML:</p>
174 <pre id="source"><?php echo escapeHTML($pure_html); ?></pre>
175 <?php
176 if (getFormMethod() == 'post') { // start POST validation notice
178 <p>If you would like to validate the code with
179 <a href="http://validator.w3.org/#validate-by-input">W3C's
180 validator</a>, copy and paste the <em>entire</em> demo page's source.</p>
181 <?php
182 } // end POST validation notice
184 } // end main processing
186 // end result
187 } else {
190 <p>Welcome to the live demo. Enter some HTML and see how HTML Purifier
191 will filter it.</p>
192 <?php
197 <form id="filter" action="demo.php<?php
198 echo '?' . getFormMethod();
199 if (isset($_REQUEST['profile']) || isset($_REQUEST['XDEBUG_PROFILE'])) {
200 echo '&amp;XDEBUG_PROFILE=1';
201 } ?>" method="<?php echo getFormMethod(); ?>">
202 <fieldset>
203 <legend>HTML Purifier Input (<?php echo getFormMethod(); ?>)</legend>
205 <?php
206 $form_printer = new HTMLPurifier_Printer_ConfigForm('filter', 'http://htmlpurifier.org/live/configdoc/plain.html#%s', 14);
207 echo $form_printer->render($config, $allowed_lite, false);
210 <div id="textarea">
211 <textarea name="html" cols="60" rows="15"><?php
212 if (isset($html)) echo escapeHTML($html);
213 ?></textarea>
214 </div>
217 By default, HTML Purifier may remove some of your spacing or
218 indentation. Turn on CollectErrors or experimental features in
219 order to fully preserve whitespace.
220 </p>
221 <?php if (getFormMethod() == 'get') { ?>
222 <p><strong>Warning:</strong> GET request method can only hold
223 8129 characters (probably less depending on your browser).
224 If you need to test anything
225 larger than that, try the <a href="?post">POST form</a>.</p>
226 <?php } ?>
227 <div>
228 <input type="submit" value="Submit" name="submit" class="button"<?php echo $END; ?>>
229 Use experimental features: <input type="checkbox" value="1" <?php if(!empty($_REQUEST['experimental'])) {echo 'checked="checked" ';} ?>name="experimental"<?php echo $END; ?>>
230 </div>
231 </fieldset>
232 </form>
233 <p>Try the form in <a href="?get">GET</a> and <a href="?post">POST</a> request
234 flavors (GET is easy to validate with W3C, but POST allows larger inputs).
235 Don't know what to test? Try out these sample filterings:</p>
236 <ul>
237 <li><a href="demo.php?html=%3Cimg+src%3D%22javascript%3Aevil%28%29%3B%22+onload%3D%22evil%28%29%3B%22+%2F%3E">Malicious code removed</a></li>
238 <li><a href="demo.php?html=%3Cb%3EBold&amp;submit=Submit">Missing end tags fixed</a></li>
239 <li><a href="demo.php?html=%3Cb%3EInline+%3Cdel%3Econtext+%3Cdiv%3ENo+block+allowed%3C%2Fdiv%3E%3C%2Fdel%3E%3C%2Fb%3E&amp;submit=Submit">Illegal nesting fixed</a></li>
240 <li><a href="demo.php?html=%3Ccenter%3ECentered%3C%2Fcenter%3E&amp;filter%5BHTML.Doctype%5D=XHTML+1.0+Strict&amp;submit=Submit">Deprecated tags converted</a></li>
241 <li><a href="demo.php?html=%3Cspan+style%3D%22color%3A%23COW%3Bfloat%3Aaround%3Btext-decoration%3Ablink%3B%22%3EText%3C%2Fspan%3E&amp;submit=Submit"><abbr>CSS</abbr> validated</a></li>
242 <li><a href="demo.php?html=%3Ctable%3E%0D%0A++%3Ccaption%3E%0D%0A++++Cool+table%0D%0A++%3C%2Fcaption%3E%0D%0A++%3Ctfoot%3E%0D%0A++++%3Ctr%3E%0D%0A++++++%3Cth%3EI+can+do+so+much%21%3C%2Fth%3E%0D%0A++++%3C%2Ftr%3E%0D%0A++%3C%2Ftfoot%3E%0D%0A++%3Ctr%3E%0D%0A++++%3Ctd+style%3D%22font-size%3A16pt%3B%0D%0A++++++color%3A%23F00%3Bfont-family%3Asans-serif%3B%0D%0A++++++text-align%3Acenter%3B%22%3EWow%3C%2Ftd%3E%0D%0A++%3C%2Ftr%3E%0D%0A%3C%2Ftable%3E&amp;experimental=1&amp;submit=Submit">Rich formatting preserved</a></li>
243 </ul>
244 </div>
245 </body>
246 </html>