Lean and configurable whitelist-oriented HTML sanitizer
npm install insane> Lean and configurable whitelist-oriented HTML sanitizer
Works well in browsers, as its footprint size is very small _(around ~2kb gzipped)_. API inspired by [sanitize-html][1] _(which is around 100kb gzipped)_.
You would be insane not to use this!
``shell`
npm install insane --save
`js`
insane('foobar', { allowedTags: ['div'] })
// <- 'foo'
Contrary to similar sanitizers, insane drops the whole tree of descendants for elements that aren't allowed tags.
- html can be an arbitrary HTML stringoptions
- are detailed belowstrict
- means that options won't be based off of insane.defaults if set to true
The parser takes into account that some elements can be self-closing. For safety reasons the sanitizer will only accept a valid URL for background, base, cite, href, longdesc, src, and usemap elements. "Valid URL" means that it begins with either #, /, or any of options.allowedSchemes _(followed by :)_.
Sensible defaults are provided. You can override specific options as needed.
#### allowedSchemes
Defaults to ['http', 'https', 'mailto'].
#### allowedTags
An array of tags that you'll allow in the resulting HTML.
###### Example
> Only allow spans, discarding the rest of elements.
`js`
insane('foobar', {
allowedTags: ['span']
});
// <- 'bar'
#### allowedAttributes
An object describing the attributes you'll allow for each individual tag name.
###### Example
> Only allow spans, and only allow those spans to have an id _(discarding the rest of their attributes)_.
`js`
insane('bar', {
allowedTags: ['span'],
allowedAttributes: { span: ['id'] }
});
// <- 'bar'
#### allowedClasses
If 'class' is listed as an allowed attribute, every single class will be allowed. If you don't list 'class' as an allowed attribute, you can provide a class whitelist per tag name.
###### Example
> Only allow spans to have super or bad class names, discarding the rest of them.
`js`
insane('bar', {
allowedTags: ['span'],
allowedClasses: { span: ['super', 'bad'] }
});
// <- 'bar'
#### filter
Takes a function(token) that allows you to do additional validation beyond exact tag name and attribute matching. The token object passed to your filter contains the following properties.
- tag is the lowercase tag name of the elementattrs
- is an object containing _every_ attribute in the element, including those that may not be in the whitelist
If you return a falsy value the element and all of its descendants will not be included in the output. Note that you are allowed to change the attrs, and even add new ones, transforming the output.
###### Example
> Require that elements have an aria-label value.
`js`
function filter (token) {
return token.tag !== 'span' || token.attrs['aria-label'];
}
insane('foobar', {
allowedTags: ['span'],
allowedAttributes: { span: ['aria-label'] },
filter: filter
});
// <- 'foo'
#### transformText
Takes a function(text) that allows you to modify text content in HTML elements. Runs for every piece of text content. The returned value is used instead of the original text contents.
The default configuration is used if you don't provide any. This object is available at insane.defaults. You are free to manipulate the defaults themselves.
`json``
{
"allowedAttributes": {
"a": ["href", "name", "target"],
"iframe": ["allowfullscreen", "frameborder", "src"],
"img": ["src"]
},
"allowedClasses": {},
"allowedSchemes": ["http", "https", "mailto"],
"allowedTags": [
"a", "article", "b", "blockquote", "br", "caption", "code", "del", "details", "div", "em",
"h1", "h2", "h3", "h4", "h5", "h6", "hr", "i", "img", "ins", "kbd", "li", "main", "ol",
"p", "pre", "section", "span", "strike", "strong", "sub", "summary", "sup", "table",
"tbody", "td", "th", "thead", "tr", "u", "ul"
],
"filter": null,
"transformText": null
}
MIT
[1]: https://github.com/punkave/sanitize-html