guix-devel
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[PATCH 094/105] gnu: Add ghc-xss-sanitize.


From: Paul van der Walt
Subject: [PATCH 094/105] gnu: Add ghc-xss-sanitize.
Date: Thu, 15 Oct 2015 17:36:07 +0200

* gnu/packages/haskell.scm (ghc-xss-sanitize): New variable.
---
 gnu/packages/haskell.scm | 34 ++++++++++++++++++++++++++++++++++
 1 file changed, 34 insertions(+)

diff --git a/gnu/packages/haskell.scm b/gnu/packages/haskell.scm
index 14dc658..57ae4ef 100644
--- a/gnu/packages/haskell.scm
+++ b/gnu/packages/haskell.scm
@@ -564,6 +564,40 @@ the HaRP extension as well as HSX-style embedded XML 
syntax.")
 you can safely allocate resources.")
     (license bsd-3)))
 
+(define-public ghc-xss-sanitize
+  (package
+    (name "ghc-xss-sanitize")
+    (version "0.3.5.6")
+    (source
+     (origin
+       (method url-fetch)
+       (uri (string-append
+             "http://hackage.haskell.org/package/xss-sanitize/xss-sanitize-";
+             version
+             ".tar.gz"))
+       (sha256
+        (base32
+         "1j2qrn2dbfx01m7zyk9ilgnp9zjwq9mk62b0rdal4zkg4vh212h0"))))
+    (build-system haskell-build-system)
+    (propagated-inputs
+     `(("ghc-tagsoup" ,ghc-tagsoup)
+       ("ghc-utf8-string" ,ghc-utf8-string)
+       ("ghc-css-text" ,ghc-css-text)
+       ("ghc-network-uri" ,ghc-network-uri)))
+    (inputs
+     `(("ghc-text" ,ghc-text)
+       ("ghc-attoparsec" ,ghc-attoparsec)
+       ("ghc-hspec" ,ghc-hspec)
+       ("ghc-hunit" ,ghc-hunit)))
+    (home-page
+     "http://github.com/yesodweb/haskell-xss-sanitize";)
+    (synopsis
+     "Sanitize untrusted HTML to prevent XSS attacks")
+    (description
+     "Run untrusted HTML through Text.HTML.SanitizeXSS.sanitizeXSS to prevent
+XSS attacks.")
+    (license bsd-3)))
+
 (define-public ghc-streaming-commons
   (package
     (name "ghc-streaming-commons")
-- 
2.6.1




reply via email to

[Prev in Thread] Current Thread [Next in Thread]