head	1.13;
access;
symbols
	pkgsrc-2026Q1:1.12.0.12
	pkgsrc-2026Q1-base:1.12
	pkgsrc-2025Q4:1.12.0.10
	pkgsrc-2025Q4-base:1.12
	pkgsrc-2025Q3:1.12.0.8
	pkgsrc-2025Q3-base:1.12
	pkgsrc-2025Q2:1.12.0.6
	pkgsrc-2025Q2-base:1.12
	pkgsrc-2025Q1:1.12.0.4
	pkgsrc-2025Q1-base:1.12
	pkgsrc-2024Q4:1.12.0.2
	pkgsrc-2024Q4-base:1.12
	pkgsrc-2024Q3:1.10.0.12
	pkgsrc-2024Q3-base:1.10
	pkgsrc-2024Q2:1.10.0.10
	pkgsrc-2024Q2-base:1.10
	pkgsrc-2024Q1:1.10.0.8
	pkgsrc-2024Q1-base:1.10
	pkgsrc-2023Q4:1.10.0.6
	pkgsrc-2023Q4-base:1.10
	pkgsrc-2023Q3:1.10.0.4
	pkgsrc-2023Q3-base:1.10
	pkgsrc-2023Q2:1.10.0.2
	pkgsrc-2023Q2-base:1.10
	pkgsrc-2023Q1:1.9.0.2
	pkgsrc-2023Q1-base:1.9
	pkgsrc-2022Q4:1.7.0.6
	pkgsrc-2022Q4-base:1.7
	pkgsrc-2022Q3:1.7.0.4
	pkgsrc-2022Q3-base:1.7
	pkgsrc-2022Q2:1.7.0.2
	pkgsrc-2022Q2-base:1.7
	pkgsrc-2022Q1:1.6.0.4
	pkgsrc-2022Q1-base:1.6
	pkgsrc-2021Q4:1.6.0.2
	pkgsrc-2021Q4-base:1.6
	pkgsrc-2021Q3:1.4.0.2
	pkgsrc-2021Q3-base:1.4
	pkgsrc-2021Q2:1.3.0.12
	pkgsrc-2021Q2-base:1.3
	pkgsrc-2021Q1:1.3.0.10
	pkgsrc-2021Q1-base:1.3
	pkgsrc-2020Q4:1.3.0.8
	pkgsrc-2020Q4-base:1.3
	pkgsrc-2020Q3:1.3.0.6
	pkgsrc-2020Q3-base:1.3
	pkgsrc-2020Q2:1.3.0.4
	pkgsrc-2020Q2-base:1.3
	pkgsrc-2020Q1:1.3.0.2
	pkgsrc-2020Q1-base:1.3
	pkgsrc-2019Q4:1.2.0.18
	pkgsrc-2019Q4-base:1.2
	pkgsrc-2019Q3:1.2.0.14
	pkgsrc-2019Q3-base:1.2
	pkgsrc-2019Q2:1.2.0.12
	pkgsrc-2019Q2-base:1.2
	pkgsrc-2019Q1:1.2.0.10
	pkgsrc-2019Q1-base:1.2
	pkgsrc-2018Q4:1.2.0.8
	pkgsrc-2018Q4-base:1.2
	pkgsrc-2018Q3:1.2.0.6
	pkgsrc-2018Q3-base:1.2
	pkgsrc-2018Q2:1.2.0.4
	pkgsrc-2018Q2-base:1.2
	pkgsrc-2018Q1:1.2.0.2
	pkgsrc-2018Q1-base:1.2
	pkgsrc-2017Q4:1.1.0.8
	pkgsrc-2017Q4-base:1.1
	pkgsrc-2017Q3:1.1.0.6
	pkgsrc-2017Q3-base:1.1
	pkgsrc-2017Q2:1.1.0.2
	pkgsrc-2017Q2-base:1.1;
locks; strict;
comment	@# @;


1.13
date	2026.04.12.15.33.30;	author taca;	state Exp;
branches;
next	1.12;
commitid	jqVkYydDPoMasGBG;

1.12
date	2024.12.13.16.28.41;	author taca;	state Exp;
branches;
next	1.11;
commitid	lHZtqTc8l9OElmBF;

1.11
date	2024.12.11.14.42.38;	author taca;	state Exp;
branches;
next	1.10;
commitid	nMBt74mBNh9gP5BF;

1.10
date	2023.05.28.01.51.44;	author taca;	state Exp;
branches;
next	1.9;
commitid	7RQBK74i2icNEFqE;

1.9
date	2023.01.21.14.14.29;	author taca;	state Exp;
branches;
next	1.8;
commitid	UNkw2tFAPfSxQpaE;

1.8
date	2023.01.03.15.19.13;	author taca;	state Exp;
branches;
next	1.7;
commitid	xtnm1uS8GnIMM68E;

1.7
date	2022.06.12.12.20.11;	author taca;	state Exp;
branches
	1.7.6.1;
next	1.6;
commitid	EItPBKlkRvgUnKHD;

1.6
date	2021.10.26.11.31.03;	author nia;	state Exp;
branches;
next	1.5;
commitid	Gv0TNLbuylhFsjeD;

1.5
date	2021.10.07.15.08.46;	author nia;	state Exp;
branches;
next	1.4;
commitid	kEwAbZZbki9jhTbD;

1.4
date	2021.08.30.15.38.02;	author taca;	state Exp;
branches;
next	1.3;
commitid	X89cmkGecqhKF07D;

1.3
date	2020.03.20.17.54.27;	author taca;	state Exp;
branches;
next	1.2;
commitid	giB6Jr7nns0aoa1C;

1.2
date	2018.03.23.14.06.32;	author taca;	state Exp;
branches;
next	1.1;
commitid	pvZCz2e9Dgr0xAvA;

1.1
date	2017.04.19.06.48.13;	author minskim;	state Exp;
branches;
next	;
commitid	msjefHcDVufyY6Oz;

1.7.6.1
date	2023.01.15.19.57.02;	author bsiegert;	state Exp;
branches;
next	;
commitid	2wyFXygPraacWF9E;


desc
@@


1.13
log
@www/ruby-rails-html-sanitizer: update to 1.7.0

1.7.0 (2026-02-24)

* Add Rails::HTML::Sanitizer.allowed_uri? which delegates to
  Loofah::HTML5::Scrub.allowed_uri?, allowing the Rails framework to check
  URI safety without a direct dependency on Loofah.

  The minimum Loofah dependency is now ~> 2.25.

  Mike Dalessio @@flavorjones
@
text
@$NetBSD: distinfo,v 1.12 2024/12/13 16:28:41 taca Exp $

BLAKE2s (rails-html-sanitizer-1.7.0.gem) = c646eac714c6a0345b604cc90709fbe39b1fc3a2ca364be765fff22aa4bfb2d6
SHA512 (rails-html-sanitizer-1.7.0.gem) = dae6e187f96fa0a1f2406f53596fdfc260e52d64ce5d452f2a617a3db9856e43dd7a11f749bd8b494356d0404ddff5775706927d89e116d430b9215bef4f4a06
Size (rails-html-sanitizer-1.7.0.gem) = 26112 bytes
@


1.12
log
@www/ruby-rails-html-sanitizer: update to 1.6.2

1.6.2 / 2024-12-12

* PermitScrubber fully supports frozen "allowed tags".

  1.6.1 introduced safety checks that may remove unsafe tags from the
  allowed list, which introduced a regression for applications passing a
  frozen array of allowed tags. Tags and attributes are now properly copied
  when they are passed to the scrubber.

  Fixes #195.

  Mike Dalessio
@
text
@d1 1
a1 1
$NetBSD: distinfo,v 1.11 2024/12/11 14:42:38 taca Exp $
d3 3
a5 3
BLAKE2s (rails-html-sanitizer-1.6.2.gem) = 729e01327f782462ec205fe3e688df0e9b663b4877e744e8442fe2f53e9a8d58
SHA512 (rails-html-sanitizer-1.6.2.gem) = 5e2e477a91ea496522fd881610028c539ca6cb280399e912703bbd86387bef72392dfa27fe9cf30e1a64831e57ee0f221ca2ac05cadda14255884bbb516996ec
Size (rails-html-sanitizer-1.6.2.gem) = 25600 bytes
@


1.11
log
@www/ruby-rails-html-sanitizer: update to 1.6.1

1.6.1 (2024-12-02)

This is a performance and security release which addresses several possible
XSS vulnerabilities.

* The dependency on Nokogiri is updated to v1.15.7 or >=1.16.8.

  This change addresses CVE-2024-53985 (GHSA-w8gc-x259-rc7x).

  Mike Dalessio

* Disallowed tags will be pruned when they appear in foreign content
  (i.e. SVG or MathML content), regardless of the prune: option
  value. Previously, disallowed tags were "stripped" unless the gem was
  configured with the prune: true option.

  The CVEs addressed by this change are:

        - CVE-2024-53986 (GHSA-638j-pmjw-jq48)
        - CVE-2024-53987 (GHSA-2x5m-9ch4-qgrr)

  Mike Dalessio

* The tags "noscript", "mglyph", and "malignmark" will not be allowed, even
  if explicitly added to the allowlist. If applications try to allow any of
  these tags, a warning is emitted and the tags are removed from the
  allow-list.

  The CVEs addressed by this change are:

        - CVE-2024-53988 (GHSA-cfjx-w229-hgx5)
        - CVE-2024-53989 (GHSA-rxv5-gxqc-xx8g)

  Please note that we may restore support for allowing "noscript" in a
  future release. We do not expect to ever allow "mglyph" or "malignmark",
  though, especially since browser support is minimal for these tags.

  Mike Dalessio

* Improve performance by eliminating needless operations on attributes that
  are being removed. #188

  Mike Dalessio
@
text
@d1 1
a1 1
$NetBSD: distinfo,v 1.10 2023/05/28 01:51:44 taca Exp $
d3 3
a5 3
BLAKE2s (rails-html-sanitizer-1.6.1.gem) = 753d6d24643056e06c60b8e2048d8458a02c047c35ff09b066d514614e89f75e
SHA512 (rails-html-sanitizer-1.6.1.gem) = 97b7fb6fc2a420173ff4619e6b58df6d283df77f115d4ebd15e29ba0ab412734565e975bf27c0b46477615eeae3a17ba539f7ea60fa162cb4133acd55db292d5
Size (rails-html-sanitizer-1.6.1.gem) = 25600 bytes
@


1.10
log
@www/ruby-rails-html-sanitizer: update to 1.6.0

1.6.0 (2023-05-26)

* Dependencies have been updated:

	- Loofah ~>2.21 and Nokogiri ~>1.14 for HTML5 parser support
	- As a result, required Ruby version is now >= 2.7.0

* Security updates will continue to be made on the 1.5.x release branch as
  long as Rails 6.1 (which supports Ruby 2.5) is still in security support.

  Mike Dalessio


* HTML5 standards-compliant sanitizers are now available on platforms
  supported by Nokogiri::HTML5. These are available as:

	- Rails::HTML5::FullSanitizer
	- Rails::HTML5::LinkSanitizer
	- Rails::HTML5::SafeListSanitizer

  And a new "vendor" is provided at Rails::HTML5::Sanitizer that can be used
  in a future version of Rails.

  Note that for symmetry Rails::HTML4::Sanitizer is also added, though its
  behavior is identical to the vendor class methods on
  Rails::HTML::Sanitizer.

  Users may call Rails::HTML::Sanitizer.best_supported_vendor to get back
  the HTML5 vendor if it's supported, else the legacy HTML4 vendor.

  Mike Dalessio

* Module namespaces have changed, but backwards compatibility is provided by
  aliases.

  The library defines three additional modules:

	- Rails::HTML for general functionality (replacing Rails::Html)
	- Rails::HTML4 containing sanitizers that parse content as HTML4
	- Rails::HTML5 containing sanitizers that parse content as HTML5

  The following aliases are maintained for backwards compatibility:

	- Rails::Html points to Rails::HTML
	- Rails::HTML::FullSanitizer points to Rails::HTML4::FullSanitizer
	- Rails::HTML::LinkSanitizer points to Rails::HTML4::LinkSanitizer
	- Rails::HTML::SafeListSanitizer points to Rails::HTML4::SafeListSanitizer

  Mike Dalessio

* LinkSanitizer always returns UTF-8 encoded strings. SafeListSanitizer and
  FullSanitizer already ensured this encoding.

  Mike Dalessio

* SafeListSanitizer allows time tag and lang attribute by default.

  Mike Dalessio

* The constant Rails::Html::XPATHS_TO_REMOVE has been removed. It's not
  necessary with the existing sanitizers, and should have been a private
  constant all along anyway.

  Mike Dalessio
@
text
@d1 1
a1 1
$NetBSD: distinfo,v 1.9 2023/01/21 14:14:29 taca Exp $
d3 3
a5 3
BLAKE2s (rails-html-sanitizer-1.6.0.gem) = 136b4a5dc933f2d4d5e5e5fefb1365cc93c055af7dbe7a2c030423eac3a08ffb
SHA512 (rails-html-sanitizer-1.6.0.gem) = 265c093872b43794be02a8b1d2574be8270762b46c2b0d930159d3b41e06b897ed8b6edf3b219e0e71591fa5f7d38107ed8d332cebd3dfe4c37c6d06b7b5fa12
Size (rails-html-sanitizer-1.6.0.gem) = 23552 bytes
@


1.9
log
@www/ruby-rails-html-sanitizer: update to 1.5.0

1.5.0 (2023-01-20)

* SafeListSanitizer, PermitScrubber, and TargetScrubber now all support
  pruning of unsafe tags.

  By default, unsafe tags are still stripped, but this behavior can be
  changed to prune the element and its children from the document by
  passing prune: true to any of these classes' constructors.

  @@seyerian
@
text
@d1 1
a1 1
$NetBSD: distinfo,v 1.8 2023/01/03 15:19:13 taca Exp $
d3 3
a5 3
BLAKE2s (rails-html-sanitizer-1.5.0.gem) = a5743d25a526c25baf3249bfcf9d1f9e955998e26efdcaa47230a147889c4cb6
SHA512 (rails-html-sanitizer-1.5.0.gem) = 533a203d34b0f77b70258fc1b610caf1d4910da48224b136774d094ee8fa74b5cd9f3b1719118334489a41d743b97592539935b05b07770cd745e03634422214
Size (rails-html-sanitizer-1.5.0.gem) = 19456 bytes
@


1.8
log
@www/ruby-rails-html-sanitizer: update to 1.4.4

1.4.4 (2022-12-13)

* Address inefficient regular expression complexity with certain
  configurations of Rails::Html::Sanitizer.

  Fixes CVE-2022-23517. See GHSA-5x79-w82f-gw8w for more information.

  Mike Dalessio

* Address improper sanitization of data URIs.

  Fixes CVE-2022-23518 and #135. See GHSA-mcvf-2q2m-x72m for more information.

  Mike Dalessio

* Address possible XSS vulnerability with certain configurations of
  Rails::Html::Sanitizer.

  Fixes CVE-2022-23520. See GHSA-rrfc-7g8p-99q8 for more information.

  Mike Dalessio

* Address possible XSS vulnerability with certain configurations of
  Rails::Html::Sanitizer.

  Fixes CVE-2022-23519. See GHSA-9h9g-93gc-623h for more information.

  Mike Dalessio
@
text
@d1 1
a1 1
$NetBSD: distinfo,v 1.7 2022/06/12 12:20:11 taca Exp $
d3 3
a5 3
BLAKE2s (rails-html-sanitizer-1.4.4.gem) = 36684c6c71abd83aa775f2d14d6ca7e24ac934bf3ca657f06981824b32ce9bf0
SHA512 (rails-html-sanitizer-1.4.4.gem) = 9a6671334967078f744296ca273a8b44c0071d04c841fe626333bbb62c252b6688b5559079a47cda540f06bd35c924ede8d9ef092c775dfab55e2673137fc05b
Size (rails-html-sanitizer-1.4.4.gem) = 18432 bytes
@


1.7
log
@www/ruby-rails-html-sanitizer: update to 1.4.3

1.4.3 (2022-06-09)

* Address a possible XSS vulnerability with certain configurations of
  Rails::Html::Sanitizer.

  Prevent the combination of `select` and `style` as allowed tags in
  SafeListSanitizer.

  Fixes CVE-2022-32209

  *Mike Dalessio*
@
text
@d1 1
a1 1
$NetBSD: distinfo,v 1.6 2021/10/26 11:31:03 nia Exp $
d3 3
a5 3
BLAKE2s (rails-html-sanitizer-1.4.3.gem) = 110fc5e7b2557d3a8bb7d2424b072e62f7bb9d4dd6d5d6625c4033250a25626a
SHA512 (rails-html-sanitizer-1.4.3.gem) = ead339d8ed5aefa737298d886a0db3c353254cfa57bdee7d2011f596ed2871dcad3bd16561728da2447e239fcaa908256bb6436493462bca6310a17a3812ffd9
Size (rails-html-sanitizer-1.4.3.gem) = 17920 bytes
@


1.7.6.1
log
@Pullup ticket #6722 - requested by taca
www/ruby-rails-html-sanitizer: security fix

Revisions pulled up:
- www/ruby-rails-html-sanitizer/Makefile                        1.6
- www/ruby-rails-html-sanitizer/distinfo                        1.8

---
   Module Name:	pkgsrc
   Committed By:	taca
   Date:		Tue Jan  3 15:19:14 UTC 2023

   Modified Files:
   	pkgsrc/www/ruby-rails-html-sanitizer: Makefile distinfo

   Log Message:
   www/ruby-rails-html-sanitizer: update to 1.4.4

   1.4.4 (2022-12-13)

   * Address inefficient regular expression complexity with certain
     configurations of Rails::Html::Sanitizer.

     Fixes CVE-2022-23517. See GHSA-5x79-w82f-gw8w for more information.

     Mike Dalessio

   * Address improper sanitization of data URIs.

     Fixes CVE-2022-23518 and #135. See GHSA-mcvf-2q2m-x72m for more information.

     Mike Dalessio

   * Address possible XSS vulnerability with certain configurations of
     Rails::Html::Sanitizer.

     Fixes CVE-2022-23520. See GHSA-rrfc-7g8p-99q8 for more information.

     Mike Dalessio

   * Address possible XSS vulnerability with certain configurations of
     Rails::Html::Sanitizer.

     Fixes CVE-2022-23519. See GHSA-9h9g-93gc-623h for more information.

     Mike Dalessio
@
text
@d1 1
a1 1
$NetBSD$
d3 3
a5 3
BLAKE2s (rails-html-sanitizer-1.4.4.gem) = 36684c6c71abd83aa775f2d14d6ca7e24ac934bf3ca657f06981824b32ce9bf0
SHA512 (rails-html-sanitizer-1.4.4.gem) = 9a6671334967078f744296ca273a8b44c0071d04c841fe626333bbb62c252b6688b5559079a47cda540f06bd35c924ede8d9ef092c775dfab55e2673137fc05b
Size (rails-html-sanitizer-1.4.4.gem) = 18432 bytes
@


1.6
log
@www: Replace RMD160 checksums with BLAKE2s checksums

All checksums have been double-checked against existing RMD160 and
SHA512 hashes

Not committed (merge conflicts):
www/nghttp2/distinfo

Unfetchable distfiles (almost certainly fetched conditionally...):
./www/nginx-devel/distinfo array-var-nginx-module-0.05.tar.gz
./www/nginx-devel/distinfo echo-nginx-module-0.62.tar.gz
./www/nginx-devel/distinfo encrypted-session-nginx-module-0.08.tar.gz
./www/nginx-devel/distinfo form-input-nginx-module-0.12.tar.gz
./www/nginx-devel/distinfo headers-more-nginx-module-0.33.tar.gz
./www/nginx-devel/distinfo lua-nginx-module-0.10.19.tar.gz
./www/nginx-devel/distinfo naxsi-1.3.tar.gz
./www/nginx-devel/distinfo nginx-dav-ext-module-3.0.0.tar.gz
./www/nginx-devel/distinfo nginx-rtmp-module-1.2.2.tar.gz
./www/nginx-devel/distinfo nginx_http_push_module-1.2.10.tar.gz
./www/nginx-devel/distinfo ngx_cache_purge-2.5.1.tar.gz
./www/nginx-devel/distinfo ngx_devel_kit-0.3.1.tar.gz
./www/nginx-devel/distinfo ngx_http_geoip2_module-3.3.tar.gz
./www/nginx-devel/distinfo njs-0.5.0.tar.gz
./www/nginx-devel/distinfo set-misc-nginx-module-0.32.tar.gz
./www/nginx/distinfo array-var-nginx-module-0.05.tar.gz
./www/nginx/distinfo echo-nginx-module-0.62.tar.gz
./www/nginx/distinfo encrypted-session-nginx-module-0.08.tar.gz
./www/nginx/distinfo form-input-nginx-module-0.12.tar.gz
./www/nginx/distinfo headers-more-nginx-module-0.33.tar.gz
./www/nginx/distinfo lua-nginx-module-0.10.19.tar.gz
./www/nginx/distinfo naxsi-1.3.tar.gz
./www/nginx/distinfo nginx-dav-ext-module-3.0.0.tar.gz
./www/nginx/distinfo nginx-rtmp-module-1.2.2.tar.gz
./www/nginx/distinfo nginx_http_push_module-1.2.10.tar.gz
./www/nginx/distinfo ngx_cache_purge-2.5.1.tar.gz
./www/nginx/distinfo ngx_devel_kit-0.3.1.tar.gz
./www/nginx/distinfo ngx_http_geoip2_module-3.3.tar.gz
./www/nginx/distinfo njs-0.5.0.tar.gz
./www/nginx/distinfo set-misc-nginx-module-0.32.tar.gz
@
text
@d1 1
a1 1
$NetBSD: distinfo,v 1.5 2021/10/07 15:08:46 nia Exp $
d3 3
a5 3
BLAKE2s (rails-html-sanitizer-1.4.2.gem) = 92d5f6e7d93f6f6686931830ff28e64795917a407299db40154cbcee20511364
SHA512 (rails-html-sanitizer-1.4.2.gem) = 9f0872f1000c758918f66a889322d3393ec678604eb3b01fc21bbb861189ec04fcf05f5c9487bd5eeb63ce6d99a80064718c82bfce2daf25c07754979a2ed747
Size (rails-html-sanitizer-1.4.2.gem) = 16896 bytes
@


1.5
log
@www: Remove SHA1 hashes for distfiles
@
text
@d1 1
a1 1
$NetBSD: distinfo,v 1.4 2021/08/30 15:38:02 taca Exp $
d3 1
a3 1
RMD160 (rails-html-sanitizer-1.4.2.gem) = d1024ab6a0111d5b5996bd6dcd12e92c496806a3
@


1.4
log
@www/ruby-rails-html-sanitizer: udpate to 1.4.2

1.4.0 (2021-08-18)

* Processing Instructions are no longer allowed by Rails::Html::PermitScrubber

  Previously, a PI with a name (or "target") matching an allowed tag name
  was not scrubbed. There are no known security issues associated with these
  PIs, but similar to comments it's preferred to omit these nodes when
  possible from sanitized output.

  Fixes #115.

  Mike Dalessio


1.4.1 (2021-08-18)

* Fix regression in v1.4.0 that did not pass comment nodes to the scrubber.

  Some scrubbers will want to override the default behavior and allow
  comments, but v1.4.0 only passed through elements to the scrubber's
  keep_node? method.

  This change once again allows the scrubber to make the decision on comment
  nodes, but still skips other non-elements like processing instructions
  (see #115).

  Mike Dalessio


1.4.2 (2021-08-23)

* Slightly improve performance.

  Assuming elements are more common than comments, make one less method call
  per node.
@
text
@d1 1
a1 1
$NetBSD: distinfo,v 1.3 2020/03/20 17:54:27 taca Exp $
a2 1
SHA1 (rails-html-sanitizer-1.4.2.gem) = a8017ee65b75b61b1d487585eec4bd48b4191ac5
@


1.3
log
@www/ruby-rails-html-sanitizer: update to 1.3.0

Update ruby-rails-html-sanitizer to 1.3.0.


## 1.3.0

* Address deprecations in Loofah 2.3.0.

  *Josh Goodall*

## 1.2.0

* Remove needless `white_list_sanitizer` deprecation.

  By deprecating this, we were forcing Rails 5.2 to be updated or spew
  deprecations that users could do nothing about.

  That's pointless and I'm sorry for adding that!

  Now there's no deprecation warning and Rails 5.2 works out of the box, while
  Rails 6 can use the updated naming.

  *Kasper Timm Hansen*

## 1.1.0

* Add `safe_list_sanitizer` and deprecate `white_list_sanitizer` to be removed
  in 1.2.0. https://github.com/rails/rails-html-sanitizer/pull/87

  *Juanito Fatas*

* Remove `href` from LinkScrubber's `tags` as it's not an element.
  https://github.com/rails/rails-html-sanitizer/pull/92

  *Juanito Fatas*

* Explain that we don't need to bump Loofah here if there's CVEs.
  https://github.com/rails/rails-html-sanitizer/commit/d4d823c617fdd0064956047f7fbf23fff305a69b

  *Kasper Timm Hansen*
@
text
@d1 1
a1 1
$NetBSD: distinfo,v 1.2 2018/03/23 14:06:32 taca Exp $
d3 4
a6 4
SHA1 (rails-html-sanitizer-1.3.0.gem) = 90c3c3d2c2cff685b1308b67ff441e94aae579d0
RMD160 (rails-html-sanitizer-1.3.0.gem) = 73d30b8952a7dadfbb70d6dfb4025292f8103806
SHA512 (rails-html-sanitizer-1.3.0.gem) = 01d67f750ffc6ac857e4dc47b77d66e02acc4488f353af97e2fc367590fe85107b631aaf8b32f61f9e1f375c93e1b24fbf966f738e35483f5174880a0ffe5ddb
Size (rails-html-sanitizer-1.3.0.gem) = 16384 bytes
@


1.2
log
@www/ruby-rails-html-sanitizer: update to 1.0.4

1.0.4 (2018/03/22)

* Fix CVE-2018-3741. (FIx a possible XSS vulnerability)
@
text
@d1 1
a1 1
$NetBSD: distinfo,v 1.1 2017/04/19 06:48:13 minskim Exp $
d3 4
a6 4
SHA1 (rails-html-sanitizer-1.0.4.gem) = c64193a5f8d6ee528e8b6e1628080869f697a4ff
RMD160 (rails-html-sanitizer-1.0.4.gem) = 7ea3688ee865171238870e6dc89c2eed0ceb3c9e
SHA512 (rails-html-sanitizer-1.0.4.gem) = f608f2b642869606fc2c3986298a8ae3e36c676a7eda5e3cce419700961bfed011f8d4a2dcb59e5d32a41f556815ca5f214ec19f8940ce71d1217ba84686b8e1
Size (rails-html-sanitizer-1.0.4.gem) = 15872 bytes
@


1.1
log
@Import ruby-rails-html-sanitizer-1.0.3

HTML sanitization for Rails applications.
@
text
@d1 1
a1 1
$NetBSD: distinfo,v 1.23 2016/03/05 05:27:42 taca Exp $
d3 4
a6 4
SHA1 (rails-html-sanitizer-1.0.3.gem) = 9c84dca57b521ff92fbdceba1de959db539e4c19
RMD160 (rails-html-sanitizer-1.0.3.gem) = 81d7a8213b6a2681d3978535ef45757fee280ee0
SHA512 (rails-html-sanitizer-1.0.3.gem) = 84d91014384773389492d7cde0afcdc7e3324320970788d88861f89395d847d2599d1e645177f5301109194805ffb684f591e287f3e4280117738416655d934a
Size (rails-html-sanitizer-1.0.3.gem) = 15360 bytes
@

