Class HTMLPurifier_HTMLModule_Scripting
XHTML 1.1 Scripting module, defines elements that are used to contain information pertaining to executable scripts or the lack of support for executable scripts.
- HTMLPurifier_HTMLModule
- HTMLPurifier_HTMLModule_Scripting
Located at xoops_trust_path/libs/htmlpurifier/library/HTMLPurifier/HTMLModule/Scripting.php
public
|
addBlankElement(),
addElement(),
addElementToContentSet(),
getChildDef(),
makeLookup(),
mergeInAttrIncludes(),
parseContents()
|
public
string
|
$name | 'Scripting' |
#
Short unique string identifier of the module |
public
array
|
$elements | array('script', 'noscript') |
#
Informally, a list of elements this module changes. Not used in any significant way. |
public
array
|
$content_sets | array('Block' => 'script | noscript', 'Inline' => 'script | noscript') |
#
Associative array of content set names to content set additions. This is commonly used to, say, add an A element to the Inline content set. This corresponds to an internal variable $content_sets and NOT info_content_sets member variable of HTMLDefinition. |
public
boolean
|
$safe | false |
#
Boolean flag whether or not this module is safe. If it is not safe, all of its members are unsafe. Modules are safe by default (this might be slightly dangerous, but it doesn't make much sense to force HTML Purifier, which is based off of safe HTML, to explicitly say, "This is safe," even though there are modules which are "unsafe") |
$attr_collections,
$defines_child_def,
$info,
$info_attr_transform_post,
$info_attr_transform_pre,
$info_injector,
$info_tag_transform
|