mirror of
				https://github.com/go-gitea/gitea.git
				synced 2025-10-26 12:27:06 +00:00 
			
		
		
		
	Allow render HTML with css/js external links (#19017)
* Allow render HTML with css/js external links * Fix bug because of filename escape chars * Fix lint * Update docs about new configuration item * Fix bug of render HTML in sub directory * Add CSP head for displaying iframe in rendering file * Fix test * Apply suggestions from code review Co-authored-by: delvh <dev.lh@web.de> * Some improvements * some improvement * revert change in SanitizerDisabled of external renderer * Add sandbox for iframe and support allow-scripts and allow-same-origin * refactor * fix * fix lint * fine tune * use single option RENDER_CONTENT_MODE, use sandbox=allow-scripts * fine tune CSP * Apply suggestions from code review Co-authored-by: wxiaoguang <wxiaoguang@gmail.com> Co-authored-by: delvh <dev.lh@web.de> Co-authored-by: wxiaoguang <wxiaoguang@gmail.com>
This commit is contained in:
		@@ -29,9 +29,6 @@ func (Renderer) Name() string {
 | 
			
		||||
	return "csv"
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// NeedPostProcess implements markup.Renderer
 | 
			
		||||
func (Renderer) NeedPostProcess() bool { return false }
 | 
			
		||||
 | 
			
		||||
// Extensions implements markup.Renderer
 | 
			
		||||
func (Renderer) Extensions() []string {
 | 
			
		||||
	return []string{".csv", ".tsv"}
 | 
			
		||||
@@ -46,11 +43,6 @@ func (Renderer) SanitizerRules() []setting.MarkupSanitizerRule {
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// SanitizerDisabled disabled sanitize if return true
 | 
			
		||||
func (Renderer) SanitizerDisabled() bool {
 | 
			
		||||
	return false
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func writeField(w io.Writer, element, class, field string) error {
 | 
			
		||||
	if _, err := io.WriteString(w, "<"); err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user