https://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=40831

David Cook <[email protected]> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |[email protected]

--- Comment #1 from David Cook <[email protected]> ---
This is an interesting idea! 

In theory, we could use Javascript for this. For instance:

<script>
let parser = new DOMParser();
let doc = parser.parseFromString('cool beans','text/html');
console.log(doc.documentElement.textContent);
let doc2 = parser.parseFromString('<b>awesome</b>','text/html');
console.log(doc2.documentElement.textContent);
</script>

The output should be like this:
"cool beans"
"awesome"

If you compare the output strings against the input strings, the first one
should be identical while the second one won't match, which indicates that
there was HTML that was parsed in the string.

--

Maybe there's better ways of doing it, but that way jumped out to me. A person
could try to use regex but I think that would be a nightmare.

Of course, if the string didn't contain HTML but there was something that was
interpreted as HTML but wasn't HTML then you could get a false positive...

So it would be important to be able to bypass the warning for sure.

-- 
You are receiving this mail because:
You are watching all bug changes.
You are the assignee for the bug.
_______________________________________________
Koha-bugs mailing list
[email protected]
https://lists.koha-community.org/cgi-bin/mailman/listinfo/koha-bugs
website : http://www.koha-community.org/
git : http://git.koha-community.org/
bugs : http://bugs.koha-community.org/

Reply via email to