From 5e64f81550744c24b022e3e69a01ba1896735a34 Mon Sep 17 00:00:00 2001 From: Pierre-Yves Chibon Date: Aug 26 2015 09:48:41 +0000 Subject: Input that are cleaned via the noJS filter are safe to be displayed This avoid double encoding to HTML. noJS has a finite list of HTML tags allowed and everything else will be escape. If we do not say the content is safe, the output of the noJS will itself be escaped as well by jinja2. Thus the sign '<' will be escaped as '<' by noJS and then by jinja2 making it appear as '<' instead of making is appear like '<'. Fixes https://pagure.io/pagure/issue/336 --- diff --git a/pagure/templates/issue.html b/pagure/templates/issue.html index 31e7810..cf13032 100644 --- a/pagure/templates/issue.html +++ b/pagure/templates/issue.html @@ -37,7 +37,7 @@

#{{ issueid }} {{ - issue.title | noJS }} + issue.title | noJS | safe }} {% if authenticated and (repo_admin or g.fas_user.username == issue.user.username) %} - diff --git a/pagure/templates/issues.html b/pagure/templates/issues.html index 3606036..ee0a33b 100644 --- a/pagure/templates/issues.html +++ b/pagure/templates/issues.html @@ -84,7 +84,7 @@ - {{ issue.title | noJS }} + {{ issue.title | noJS | safe }} diff --git a/pagure/templates/pull_request.html b/pagure/templates/pull_request.html index d79b5f0..099e185 100644 --- a/pagure/templates/pull_request.html +++ b/pagure/templates/pull_request.html @@ -26,7 +26,7 @@ {% if pull_request %}
-

Title: {{ pull_request.title | noJS }}

+

Title: {{ pull_request.title | noJS | safe }}