aboutsummaryrefslogtreecommitdiffhomepage
path: root/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema
diff options
context:
space:
mode:
authorNicolas LÅ“uillet <nicolas.loeuillet@gmail.com>2014-02-21 15:43:14 +0100
committerNicolas LÅ“uillet <nicolas.loeuillet@gmail.com>2014-02-21 15:43:14 +0100
commitd4949327efa15b492cab1bef3fe074290a328a17 (patch)
treee89e0322bb1f1b06d663fd10fdded21bac867e5d /inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema
parentc9bd17a1007bb78e5de0775efca01df0fb515031 (diff)
downloadwallabag-d4949327efa15b492cab1bef3fe074290a328a17.tar.gz
wallabag-d4949327efa15b492cab1bef3fe074290a328a17.tar.zst
wallabag-d4949327efa15b492cab1bef3fe074290a328a17.zip
[add] HTML Purifier added to clean code
Diffstat (limited to 'inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema')
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.AllowedClasses.txt8
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.AllowedFrameTargets.txt12
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.AllowedRel.txt9
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.AllowedRev.txt9
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.ClassUseCDATA.txt19
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.DefaultImageAlt.txt11
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.DefaultInvalidImage.txt9
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.DefaultInvalidImageAlt.txt8
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.DefaultTextDir.txt10
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.EnableID.txt16
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.ForbiddenClasses.txt8
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.IDBlacklist.txt5
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.IDBlacklistRegexp.txt9
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.IDPrefix.txt12
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.IDPrefixLocal.txt14
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/AutoFormat.AutoParagraph.txt31
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/AutoFormat.Custom.txt12
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/AutoFormat.DisplayLinkURI.txt11
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/AutoFormat.Linkify.txt12
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/AutoFormat.PurifierLinkify.DocURL.txt12
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/AutoFormat.PurifierLinkify.txt12
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/AutoFormat.RemoveEmpty.RemoveNbsp.Exceptions.txt11
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/AutoFormat.RemoveEmpty.RemoveNbsp.txt15
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/AutoFormat.RemoveEmpty.txt46
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/AutoFormat.RemoveSpansWithoutAttributes.txt11
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/CSS.AllowImportant.txt8
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/CSS.AllowTricky.txt11
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/CSS.AllowedFonts.txt12
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/CSS.AllowedProperties.txt18
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/CSS.DefinitionRev.txt11
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/CSS.ForbiddenProperties.txt13
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/CSS.MaxImgLength.txt16
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/CSS.Proprietary.txt10
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/CSS.Trusted.txt9
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Cache.DefinitionImpl.txt14
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Cache.SerializerPath.txt13
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Cache.SerializerPermissions.txt11
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.AggressivelyFixLt.txt18
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.AllowHostnameUnderscore.txt16
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.CollectErrors.txt12
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.ColorKeywords.txt29
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.ConvertDocumentToFragment.txt14
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.DirectLexLineNumberSyncInterval.txt17
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.DisableExcludes.txt14
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.EnableIDNA.txt9
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.Encoding.txt15
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.EscapeInvalidChildren.txt12
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.EscapeInvalidTags.txt7
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.EscapeNonASCIICharacters.txt13
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.HiddenElements.txt19
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.Language.txt10
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.LexerImpl.txt34
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.MaintainLineNumbers.txt16
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.NormalizeNewlines.txt11
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.RemoveInvalidImg.txt12
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.RemoveProcessingInstructions.txt11
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.RemoveScriptContents.txt12
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Filter.Custom.txt11
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Filter.ExtractStyleBlocks.Escaping.txt14
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Filter.ExtractStyleBlocks.Scope.txt29
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Filter.ExtractStyleBlocks.TidyImpl.txt16
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Filter.ExtractStyleBlocks.txt74
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Filter.YouTube.txt16
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.Allowed.txt25
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.AllowedAttributes.txt19
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.AllowedComments.txt10
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.AllowedCommentsRegexp.txt15
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.AllowedElements.txt23
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.AllowedModules.txt20
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.Attr.Name.UseCDATA.txt11
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.BlockWrapper.txt18
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.CoreModules.txt23
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.CustomDoctype.txt9
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.DefinitionID.txt33
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.DefinitionRev.txt16
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.Doctype.txt11
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.FlashAllowFullScreen.txt11
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.ForbiddenAttributes.txt21
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.ForbiddenElements.txt20
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.MaxImgLength.txt14
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.Nofollow.txt7
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.Parent.txt12
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.Proprietary.txt12
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.SafeEmbed.txt13
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.SafeIframe.txt13
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.SafeObject.txt13
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.SafeScripting.txt10
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.Strict.txt9
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.TargetBlank.txt8
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.TidyAdd.txt8
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.TidyLevel.txt24
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.TidyRemove.txt8
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.Trusted.txt9
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.XHTML.txt11
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Output.CommentScriptContents.txt10
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Output.FixInnerHTML.txt15
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Output.FlashCompat.txt11
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Output.Newline.txt13
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Output.SortAttr.txt14
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Output.TidyFormat.txt25
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Test.ForceNoIconv.txt7
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.AllowedSchemes.txt17
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.Base.txt17
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.DefaultScheme.txt10
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.DefinitionID.txt11
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.DefinitionRev.txt11
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.Disable.txt14
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.DisableExternal.txt11
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.DisableExternalResources.txt13
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.DisableResources.txt15
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.Host.txt19
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.HostBlacklist.txt9
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.MakeAbsolute.txt13
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.Munge.txt83
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.MungeResources.txt17
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.MungeSecretKey.txt30
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.OverrideAllowedSchemes.txt9
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.SafeIframeRegexp.txt22
-rw-r--r--inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/info.ini3
119 files changed, 1814 insertions, 0 deletions
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.AllowedClasses.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.AllowedClasses.txt
new file mode 100644
index 00000000..4a42382e
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.AllowedClasses.txt
@@ -0,0 +1,8 @@
1Attr.AllowedClasses
2TYPE: lookup/null
3VERSION: 4.0.0
4DEFAULT: null
5--DESCRIPTION--
6List of allowed class values in the class attribute. By default, this is null,
7which means all classes are allowed.
8--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.AllowedFrameTargets.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.AllowedFrameTargets.txt
new file mode 100644
index 00000000..b033eb51
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.AllowedFrameTargets.txt
@@ -0,0 +1,12 @@
1Attr.AllowedFrameTargets
2TYPE: lookup
3DEFAULT: array()
4--DESCRIPTION--
5Lookup table of all allowed link frame targets. Some commonly used link
6targets include _blank, _self, _parent and _top. Values should be
7lowercase, as validation will be done in a case-sensitive manner despite
8W3C's recommendation. XHTML 1.0 Strict does not permit the target attribute
9so this directive will have no effect in that doctype. XHTML 1.1 does not
10enable the Target module by default, you will have to manually enable it
11(see the module documentation for more details.)
12--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.AllowedRel.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.AllowedRel.txt
new file mode 100644
index 00000000..ed72a9d5
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.AllowedRel.txt
@@ -0,0 +1,9 @@
1Attr.AllowedRel
2TYPE: lookup
3VERSION: 1.6.0
4DEFAULT: array()
5--DESCRIPTION--
6List of allowed forward document relationships in the rel attribute. Common
7values may be nofollow or print. By default, this is empty, meaning that no
8document relationships are allowed.
9--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.AllowedRev.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.AllowedRev.txt
new file mode 100644
index 00000000..1ae672d0
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.AllowedRev.txt
@@ -0,0 +1,9 @@
1Attr.AllowedRev
2TYPE: lookup
3VERSION: 1.6.0
4DEFAULT: array()
5--DESCRIPTION--
6List of allowed reverse document relationships in the rev attribute. This
7attribute is a bit of an edge-case; if you don't know what it is for, stay
8away.
9--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.ClassUseCDATA.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.ClassUseCDATA.txt
new file mode 100644
index 00000000..119a9d2c
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.ClassUseCDATA.txt
@@ -0,0 +1,19 @@
1Attr.ClassUseCDATA
2TYPE: bool/null
3DEFAULT: null
4VERSION: 4.0.0
5--DESCRIPTION--
6If null, class will auto-detect the doctype and, if matching XHTML 1.1 or
7XHTML 2.0, will use the restrictive NMTOKENS specification of class. Otherwise,
8it will use a relaxed CDATA definition. If true, the relaxed CDATA definition
9is forced; if false, the NMTOKENS definition is forced. To get behavior
10of HTML Purifier prior to 4.0.0, set this directive to false.
11
12Some rational behind the auto-detection:
13in previous versions of HTML Purifier, it was assumed that the form of
14class was NMTOKENS, as specified by the XHTML Modularization (representing
15XHTML 1.1 and XHTML 2.0). The DTDs for HTML 4.01 and XHTML 1.0, however
16specify class as CDATA. HTML 5 effectively defines it as CDATA, but
17with the additional constraint that each name should be unique (this is not
18explicitly outlined in previous specifications).
19--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.DefaultImageAlt.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.DefaultImageAlt.txt
new file mode 100644
index 00000000..80b1431c
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.DefaultImageAlt.txt
@@ -0,0 +1,11 @@
1Attr.DefaultImageAlt
2TYPE: string/null
3DEFAULT: null
4VERSION: 3.2.0
5--DESCRIPTION--
6This is the content of the alt tag of an image if the user had not
7previously specified an alt attribute. This applies to all images without
8a valid alt attribute, as opposed to %Attr.DefaultInvalidImageAlt, which
9only applies to invalid images, and overrides in the case of an invalid image.
10Default behavior with null is to use the basename of the src tag for the alt.
11--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.DefaultInvalidImage.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.DefaultInvalidImage.txt
new file mode 100644
index 00000000..c51000d1
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.DefaultInvalidImage.txt
@@ -0,0 +1,9 @@
1Attr.DefaultInvalidImage
2TYPE: string
3DEFAULT: ''
4--DESCRIPTION--
5This is the default image an img tag will be pointed to if it does not have
6a valid src attribute. In future versions, we may allow the image tag to
7be removed completely, but due to design issues, this is not possible right
8now.
9--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.DefaultInvalidImageAlt.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.DefaultInvalidImageAlt.txt
new file mode 100644
index 00000000..c1ec4b03
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.DefaultInvalidImageAlt.txt
@@ -0,0 +1,8 @@
1Attr.DefaultInvalidImageAlt
2TYPE: string
3DEFAULT: 'Invalid image'
4--DESCRIPTION--
5This is the content of the alt tag of an invalid image if the user had not
6previously specified an alt attribute. It has no effect when the image is
7valid but there was no alt attribute present.
8--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.DefaultTextDir.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.DefaultTextDir.txt
new file mode 100644
index 00000000..f57dcc40
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.DefaultTextDir.txt
@@ -0,0 +1,10 @@
1Attr.DefaultTextDir
2TYPE: string
3DEFAULT: 'ltr'
4--DESCRIPTION--
5Defines the default text direction (ltr or rtl) of the document being
6parsed. This generally is the same as the value of the dir attribute in
7HTML, or ltr if that is not specified.
8--ALLOWED--
9'ltr', 'rtl'
10--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.EnableID.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.EnableID.txt
new file mode 100644
index 00000000..9b93a557
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.EnableID.txt
@@ -0,0 +1,16 @@
1Attr.EnableID
2TYPE: bool
3DEFAULT: false
4VERSION: 1.2.0
5--DESCRIPTION--
6Allows the ID attribute in HTML. This is disabled by default due to the
7fact that without proper configuration user input can easily break the
8validation of a webpage by specifying an ID that is already on the
9surrounding HTML. If you don't mind throwing caution to the wind, enable
10this directive, but I strongly recommend you also consider blacklisting IDs
11you use (%Attr.IDBlacklist) or prefixing all user supplied IDs
12(%Attr.IDPrefix). When set to true HTML Purifier reverts to the behavior of
13pre-1.2.0 versions.
14--ALIASES--
15HTML.EnableAttrID
16--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.ForbiddenClasses.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.ForbiddenClasses.txt
new file mode 100644
index 00000000..fed8954c
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.ForbiddenClasses.txt
@@ -0,0 +1,8 @@
1Attr.ForbiddenClasses
2TYPE: lookup
3VERSION: 4.0.0
4DEFAULT: array()
5--DESCRIPTION--
6List of forbidden class values in the class attribute. By default, this is
7empty, which means that no classes are forbidden. See also %Attr.AllowedClasses.
8--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.IDBlacklist.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.IDBlacklist.txt
new file mode 100644
index 00000000..52168bb5
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.IDBlacklist.txt
@@ -0,0 +1,5 @@
1Attr.IDBlacklist
2TYPE: list
3DEFAULT: array()
4DESCRIPTION: Array of IDs not allowed in the document.
5--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.IDBlacklistRegexp.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.IDBlacklistRegexp.txt
new file mode 100644
index 00000000..7b850430
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.IDBlacklistRegexp.txt
@@ -0,0 +1,9 @@
1Attr.IDBlacklistRegexp
2TYPE: string/null
3VERSION: 1.6.0
4DEFAULT: NULL
5--DESCRIPTION--
6PCRE regular expression to be matched against all IDs. If the expression is
7matches, the ID is rejected. Use this with care: may cause significant
8degradation. ID matching is done after all other validation.
9--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.IDPrefix.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.IDPrefix.txt
new file mode 100644
index 00000000..57813827
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.IDPrefix.txt
@@ -0,0 +1,12 @@
1Attr.IDPrefix
2TYPE: string
3VERSION: 1.2.0
4DEFAULT: ''
5--DESCRIPTION--
6String to prefix to IDs. If you have no idea what IDs your pages may use,
7you may opt to simply add a prefix to all user-submitted ID attributes so
8that they are still usable, but will not conflict with core page IDs.
9Example: setting the directive to 'user_' will result in a user submitted
10'foo' to become 'user_foo' Be sure to set %HTML.EnableAttrID to true
11before using this.
12--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.IDPrefixLocal.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.IDPrefixLocal.txt
new file mode 100644
index 00000000..f91fcd60
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Attr.IDPrefixLocal.txt
@@ -0,0 +1,14 @@
1Attr.IDPrefixLocal
2TYPE: string
3VERSION: 1.2.0
4DEFAULT: ''
5--DESCRIPTION--
6Temporary prefix for IDs used in conjunction with %Attr.IDPrefix. If you
7need to allow multiple sets of user content on web page, you may need to
8have a seperate prefix that changes with each iteration. This way,
9seperately submitted user content displayed on the same page doesn't
10clobber each other. Ideal values are unique identifiers for the content it
11represents (i.e. the id of the row in the database). Be sure to add a
12seperator (like an underscore) at the end. Warning: this directive will
13not work unless %Attr.IDPrefix is set to a non-empty value!
14--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/AutoFormat.AutoParagraph.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/AutoFormat.AutoParagraph.txt
new file mode 100644
index 00000000..2d7f94e0
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/AutoFormat.AutoParagraph.txt
@@ -0,0 +1,31 @@
1AutoFormat.AutoParagraph
2TYPE: bool
3VERSION: 2.0.1
4DEFAULT: false
5--DESCRIPTION--
6
7<p>
8 This directive turns on auto-paragraphing, where double newlines are
9 converted in to paragraphs whenever possible. Auto-paragraphing:
10</p>
11<ul>
12 <li>Always applies to inline elements or text in the root node,</li>
13 <li>Applies to inline elements or text with double newlines in nodes
14 that allow paragraph tags,</li>
15 <li>Applies to double newlines in paragraph tags</li>
16</ul>
17<p>
18 <code>p</code> tags must be allowed for this directive to take effect.
19 We do not use <code>br</code> tags for paragraphing, as that is
20 semantically incorrect.
21</p>
22<p>
23 To prevent auto-paragraphing as a content-producer, refrain from using
24 double-newlines except to specify a new paragraph or in contexts where
25 it has special meaning (whitespace usually has no meaning except in
26 tags like <code>pre</code>, so this should not be difficult.) To prevent
27 the paragraphing of inline text adjacent to block elements, wrap them
28 in <code>div</code> tags (the behavior is slightly different outside of
29 the root node.)
30</p>
31--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/AutoFormat.Custom.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/AutoFormat.Custom.txt
new file mode 100644
index 00000000..2eb1974f
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/AutoFormat.Custom.txt
@@ -0,0 +1,12 @@
1AutoFormat.Custom
2TYPE: list
3VERSION: 2.0.1
4DEFAULT: array()
5--DESCRIPTION--
6
7<p>
8 This directive can be used to add custom auto-format injectors.
9 Specify an array of injector names (class name minus the prefix)
10 or concrete implementations. Injector class must exist.
11</p>
12--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/AutoFormat.DisplayLinkURI.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/AutoFormat.DisplayLinkURI.txt
new file mode 100644
index 00000000..c955de7f
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/AutoFormat.DisplayLinkURI.txt
@@ -0,0 +1,11 @@
1AutoFormat.DisplayLinkURI
2TYPE: bool
3VERSION: 3.2.0
4DEFAULT: false
5--DESCRIPTION--
6<p>
7 This directive turns on the in-text display of URIs in &lt;a&gt; tags, and disables
8 those links. For example, <a href="http://example.com">example</a> becomes
9 example (<a>http://example.com</a>).
10</p>
11--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/AutoFormat.Linkify.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/AutoFormat.Linkify.txt
new file mode 100644
index 00000000..328b2b2b
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/AutoFormat.Linkify.txt
@@ -0,0 +1,12 @@
1AutoFormat.Linkify
2TYPE: bool
3VERSION: 2.0.1
4DEFAULT: false
5--DESCRIPTION--
6
7<p>
8 This directive turns on linkification, auto-linking http, ftp and
9 https URLs. <code>a</code> tags with the <code>href</code> attribute
10 must be allowed.
11</p>
12--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/AutoFormat.PurifierLinkify.DocURL.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/AutoFormat.PurifierLinkify.DocURL.txt
new file mode 100644
index 00000000..d0532b6b
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/AutoFormat.PurifierLinkify.DocURL.txt
@@ -0,0 +1,12 @@
1AutoFormat.PurifierLinkify.DocURL
2TYPE: string
3VERSION: 2.0.1
4DEFAULT: '#%s'
5ALIASES: AutoFormatParam.PurifierLinkifyDocURL
6--DESCRIPTION--
7<p>
8 Location of configuration documentation to link to, let %s substitute
9 into the configuration's namespace and directive names sans the percent
10 sign.
11</p>
12--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/AutoFormat.PurifierLinkify.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/AutoFormat.PurifierLinkify.txt
new file mode 100644
index 00000000..f3ab259a
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/AutoFormat.PurifierLinkify.txt
@@ -0,0 +1,12 @@
1AutoFormat.PurifierLinkify
2TYPE: bool
3VERSION: 2.0.1
4DEFAULT: false
5--DESCRIPTION--
6
7<p>
8 Internal auto-formatter that converts configuration directives in
9 syntax <a>%Namespace.Directive</a> to links. <code>a</code> tags
10 with the <code>href</code> attribute must be allowed.
11</p>
12--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/AutoFormat.RemoveEmpty.RemoveNbsp.Exceptions.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/AutoFormat.RemoveEmpty.RemoveNbsp.Exceptions.txt
new file mode 100644
index 00000000..219d04ac
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/AutoFormat.RemoveEmpty.RemoveNbsp.Exceptions.txt
@@ -0,0 +1,11 @@
1AutoFormat.RemoveEmpty.RemoveNbsp.Exceptions
2TYPE: lookup
3VERSION: 4.0.0
4DEFAULT: array('td' => true, 'th' => true)
5--DESCRIPTION--
6<p>
7 When %AutoFormat.RemoveEmpty and %AutoFormat.RemoveEmpty.RemoveNbsp
8 are enabled, this directive defines what HTML elements should not be
9 removede if they have only a non-breaking space in them.
10</p>
11--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/AutoFormat.RemoveEmpty.RemoveNbsp.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/AutoFormat.RemoveEmpty.RemoveNbsp.txt
new file mode 100644
index 00000000..5f355d66
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/AutoFormat.RemoveEmpty.RemoveNbsp.txt
@@ -0,0 +1,15 @@
1AutoFormat.RemoveEmpty.RemoveNbsp
2TYPE: bool
3VERSION: 4.0.0
4DEFAULT: false
5--DESCRIPTION--
6<p>
7 When enabled, HTML Purifier will treat any elements that contain only
8 non-breaking spaces as well as regular whitespace as empty, and remove
9 them when %AutoForamt.RemoveEmpty is enabled.
10</p>
11<p>
12 See %AutoFormat.RemoveEmpty.RemoveNbsp.Exceptions for a list of elements
13 that don't have this behavior applied to them.
14</p>
15--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/AutoFormat.RemoveEmpty.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/AutoFormat.RemoveEmpty.txt
new file mode 100644
index 00000000..6b5a7a5c
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/AutoFormat.RemoveEmpty.txt
@@ -0,0 +1,46 @@
1AutoFormat.RemoveEmpty
2TYPE: bool
3VERSION: 3.2.0
4DEFAULT: false
5--DESCRIPTION--
6<p>
7 When enabled, HTML Purifier will attempt to remove empty elements that
8 contribute no semantic information to the document. The following types
9 of nodes will be removed:
10</p>
11<ul><li>
12 Tags with no attributes and no content, and that are not empty
13 elements (remove <code>&lt;a&gt;&lt;/a&gt;</code> but not
14 <code>&lt;br /&gt;</code>), and
15 </li>
16 <li>
17 Tags with no content, except for:<ul>
18 <li>The <code>colgroup</code> element, or</li>
19 <li>
20 Elements with the <code>id</code> or <code>name</code> attribute,
21 when those attributes are permitted on those elements.
22 </li>
23 </ul></li>
24</ul>
25<p>
26 Please be very careful when using this functionality; while it may not
27 seem that empty elements contain useful information, they can alter the
28 layout of a document given appropriate styling. This directive is most
29 useful when you are processing machine-generated HTML, please avoid using
30 it on regular user HTML.
31</p>
32<p>
33 Elements that contain only whitespace will be treated as empty. Non-breaking
34 spaces, however, do not count as whitespace. See
35 %AutoFormat.RemoveEmpty.RemoveNbsp for alternate behavior.
36</p>
37<p>
38 This algorithm is not perfect; you may still notice some empty tags,
39 particularly if a node had elements, but those elements were later removed
40 because they were not permitted in that context, or tags that, after
41 being auto-closed by another tag, where empty. This is for safety reasons
42 to prevent clever code from breaking validation. The general rule of thumb:
43 if a tag looked empty on the way in, it will get removed; if HTML Purifier
44 made it empty, it will stay.
45</p>
46--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/AutoFormat.RemoveSpansWithoutAttributes.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/AutoFormat.RemoveSpansWithoutAttributes.txt
new file mode 100644
index 00000000..a448770e
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/AutoFormat.RemoveSpansWithoutAttributes.txt
@@ -0,0 +1,11 @@
1AutoFormat.RemoveSpansWithoutAttributes
2TYPE: bool
3VERSION: 4.0.1
4DEFAULT: false
5--DESCRIPTION--
6<p>
7 This directive causes <code>span</code> tags without any attributes
8 to be removed. It will also remove spans that had all attributes
9 removed during processing.
10</p>
11--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/CSS.AllowImportant.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/CSS.AllowImportant.txt
new file mode 100644
index 00000000..8096eb01
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/CSS.AllowImportant.txt
@@ -0,0 +1,8 @@
1CSS.AllowImportant
2TYPE: bool
3DEFAULT: false
4VERSION: 3.1.0
5--DESCRIPTION--
6This parameter determines whether or not !important cascade modifiers should
7be allowed in user CSS. If false, !important will stripped.
8--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/CSS.AllowTricky.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/CSS.AllowTricky.txt
new file mode 100644
index 00000000..9d34debc
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/CSS.AllowTricky.txt
@@ -0,0 +1,11 @@
1CSS.AllowTricky
2TYPE: bool
3DEFAULT: false
4VERSION: 3.1.0
5--DESCRIPTION--
6This parameter determines whether or not to allow "tricky" CSS properties and
7values. Tricky CSS properties/values can drastically modify page layout or
8be used for deceptive practices but do not directly constitute a security risk.
9For example, <code>display:none;</code> is considered a tricky property that
10will only be allowed if this directive is set to true.
11--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/CSS.AllowedFonts.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/CSS.AllowedFonts.txt
new file mode 100644
index 00000000..7c2b5476
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/CSS.AllowedFonts.txt
@@ -0,0 +1,12 @@
1CSS.AllowedFonts
2TYPE: lookup/null
3VERSION: 4.3.0
4DEFAULT: NULL
5--DESCRIPTION--
6<p>
7 Allows you to manually specify a set of allowed fonts. If
8 <code>NULL</code>, all fonts are allowed. This directive
9 affects generic names (serif, sans-serif, monospace, cursive,
10 fantasy) as well as specific font families.
11</p>
12--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/CSS.AllowedProperties.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/CSS.AllowedProperties.txt
new file mode 100644
index 00000000..f1ba513c
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/CSS.AllowedProperties.txt
@@ -0,0 +1,18 @@
1CSS.AllowedProperties
2TYPE: lookup/null
3VERSION: 3.1.0
4DEFAULT: NULL
5--DESCRIPTION--
6
7<p>
8 If HTML Purifier's style attributes set is unsatisfactory for your needs,
9 you can overload it with your own list of tags to allow. Note that this
10 method is subtractive: it does its job by taking away from HTML Purifier
11 usual feature set, so you cannot add an attribute that HTML Purifier never
12 supported in the first place.
13</p>
14<p>
15 <strong>Warning:</strong> If another directive conflicts with the
16 elements here, <em>that</em> directive will win and override.
17</p>
18--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/CSS.DefinitionRev.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/CSS.DefinitionRev.txt
new file mode 100644
index 00000000..96b41082
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/CSS.DefinitionRev.txt
@@ -0,0 +1,11 @@
1CSS.DefinitionRev
2TYPE: int
3VERSION: 2.0.0
4DEFAULT: 1
5--DESCRIPTION--
6
7<p>
8 Revision identifier for your custom definition. See
9 %HTML.DefinitionRev for details.
10</p>
11--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/CSS.ForbiddenProperties.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/CSS.ForbiddenProperties.txt
new file mode 100644
index 00000000..923e8e99
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/CSS.ForbiddenProperties.txt
@@ -0,0 +1,13 @@
1CSS.ForbiddenProperties
2TYPE: lookup
3VERSION: 4.2.0
4DEFAULT: array()
5--DESCRIPTION--
6<p>
7 This is the logical inverse of %CSS.AllowedProperties, and it will
8 override that directive or any other directive. If possible,
9 %CSS.AllowedProperties is recommended over this directive,
10 because it can sometimes be difficult to tell whether or not you've
11 forbidden all of the CSS properties you truly would like to disallow.
12</p>
13--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/CSS.MaxImgLength.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/CSS.MaxImgLength.txt
new file mode 100644
index 00000000..3808581e
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/CSS.MaxImgLength.txt
@@ -0,0 +1,16 @@
1CSS.MaxImgLength
2TYPE: string/null
3DEFAULT: '1200px'
4VERSION: 3.1.1
5--DESCRIPTION--
6<p>
7 This parameter sets the maximum allowed length on <code>img</code> tags,
8 effectively the <code>width</code> and <code>height</code> properties.
9 Only absolute units of measurement (in, pt, pc, mm, cm) and pixels (px) are allowed. This is
10 in place to prevent imagecrash attacks, disable with null at your own risk.
11 This directive is similar to %HTML.MaxImgLength, and both should be
12 concurrently edited, although there are
13 subtle differences in the input format (the CSS max is a number with
14 a unit).
15</p>
16--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/CSS.Proprietary.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/CSS.Proprietary.txt
new file mode 100644
index 00000000..8a26f228
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/CSS.Proprietary.txt
@@ -0,0 +1,10 @@
1CSS.Proprietary
2TYPE: bool
3VERSION: 3.0.0
4DEFAULT: false
5--DESCRIPTION--
6
7<p>
8 Whether or not to allow safe, proprietary CSS values.
9</p>
10--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/CSS.Trusted.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/CSS.Trusted.txt
new file mode 100644
index 00000000..917ec42b
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/CSS.Trusted.txt
@@ -0,0 +1,9 @@
1CSS.Trusted
2TYPE: bool
3VERSION: 4.2.1
4DEFAULT: false
5--DESCRIPTION--
6Indicates whether or not the user's CSS input is trusted or not. If the
7input is trusted, a more expansive set of allowed properties. See
8also %HTML.Trusted.
9--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Cache.DefinitionImpl.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Cache.DefinitionImpl.txt
new file mode 100644
index 00000000..afc6a87a
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Cache.DefinitionImpl.txt
@@ -0,0 +1,14 @@
1Cache.DefinitionImpl
2TYPE: string/null
3VERSION: 2.0.0
4DEFAULT: 'Serializer'
5--DESCRIPTION--
6
7This directive defines which method to use when caching definitions,
8the complex data-type that makes HTML Purifier tick. Set to null
9to disable caching (not recommended, as you will see a definite
10performance degradation).
11
12--ALIASES--
13Core.DefinitionCache
14--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Cache.SerializerPath.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Cache.SerializerPath.txt
new file mode 100644
index 00000000..668f248a
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Cache.SerializerPath.txt
@@ -0,0 +1,13 @@
1Cache.SerializerPath
2TYPE: string/null
3VERSION: 2.0.0
4DEFAULT: NULL
5--DESCRIPTION--
6
7<p>
8 Absolute path with no trailing slash to store serialized definitions in.
9 Default is within the
10 HTML Purifier library inside DefinitionCache/Serializer. This
11 path must be writable by the webserver.
12</p>
13--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Cache.SerializerPermissions.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Cache.SerializerPermissions.txt
new file mode 100644
index 00000000..9c27b0ac
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Cache.SerializerPermissions.txt
@@ -0,0 +1,11 @@
1Cache.SerializerPermissions
2TYPE: int
3VERSION: 4.3.0
4DEFAULT: 0755
5--DESCRIPTION--
6
7<p>
8 Directory permissions of the files and directories created inside
9 the DefinitionCache/Serializer or other custom serializer path.
10</p>
11--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.AggressivelyFixLt.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.AggressivelyFixLt.txt
new file mode 100644
index 00000000..e0fa378e
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.AggressivelyFixLt.txt
@@ -0,0 +1,18 @@
1Core.AggressivelyFixLt
2TYPE: bool
3VERSION: 2.1.0
4DEFAULT: true
5--DESCRIPTION--
6<p>
7 This directive enables aggressive pre-filter fixes HTML Purifier can
8 perform in order to ensure that open angled-brackets do not get killed
9 during parsing stage. Enabling this will result in two preg_replace_callback
10 calls and at least two preg_replace calls for every HTML document parsed;
11 if your users make very well-formed HTML, you can set this directive false.
12 This has no effect when DirectLex is used.
13</p>
14<p>
15 <strong>Notice:</strong> This directive's default turned from false to true
16 in HTML Purifier 3.2.0.
17</p>
18--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.AllowHostnameUnderscore.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.AllowHostnameUnderscore.txt
new file mode 100644
index 00000000..405d36f1
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.AllowHostnameUnderscore.txt
@@ -0,0 +1,16 @@
1Core.AllowHostnameUnderscore
2TYPE: bool
3VERSION: 4.6.0
4DEFAULT: false
5--DESCRIPTION--
6<p>
7 By RFC 1123, underscores are not permitted in host names.
8 (This is in contrast to the specification for DNS, RFC
9 2181, which allows underscores.)
10 However, most browsers do the right thing when faced with
11 an underscore in the host name, and so some poorly written
12 websites are written with the expectation this should work.
13 Setting this parameter to true relaxes our allowed character
14 check so that underscores are permitted.
15</p>
16--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.CollectErrors.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.CollectErrors.txt
new file mode 100644
index 00000000..c6ea0699
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.CollectErrors.txt
@@ -0,0 +1,12 @@
1Core.CollectErrors
2TYPE: bool
3VERSION: 2.0.0
4DEFAULT: false
5--DESCRIPTION--
6
7Whether or not to collect errors found while filtering the document. This
8is a useful way to give feedback to your users. <strong>Warning:</strong>
9Currently this feature is very patchy and experimental, with lots of
10possible error messages not yet implemented. It will not cause any
11problems, but it may not help your users either.
12--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.ColorKeywords.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.ColorKeywords.txt
new file mode 100644
index 00000000..f7823982
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.ColorKeywords.txt
@@ -0,0 +1,29 @@
1Core.ColorKeywords
2TYPE: hash
3VERSION: 2.0.0
4--DEFAULT--
5array (
6 'maroon' => '#800000',
7 'red' => '#FF0000',
8 'orange' => '#FFA500',
9 'yellow' => '#FFFF00',
10 'olive' => '#808000',
11 'purple' => '#800080',
12 'fuchsia' => '#FF00FF',
13 'white' => '#FFFFFF',
14 'lime' => '#00FF00',
15 'green' => '#008000',
16 'navy' => '#000080',
17 'blue' => '#0000FF',
18 'aqua' => '#00FFFF',
19 'teal' => '#008080',
20 'black' => '#000000',
21 'silver' => '#C0C0C0',
22 'gray' => '#808080',
23)
24--DESCRIPTION--
25
26Lookup array of color names to six digit hexadecimal number corresponding
27to color, with preceding hash mark. Used when parsing colors. The lookup
28is done in a case-insensitive manner.
29--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.ConvertDocumentToFragment.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.ConvertDocumentToFragment.txt
new file mode 100644
index 00000000..656d3783
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.ConvertDocumentToFragment.txt
@@ -0,0 +1,14 @@
1Core.ConvertDocumentToFragment
2TYPE: bool
3DEFAULT: true
4--DESCRIPTION--
5
6This parameter determines whether or not the filter should convert
7input that is a full document with html and body tags to a fragment
8of just the contents of a body tag. This parameter is simply something
9HTML Purifier can do during an edge-case: for most inputs, this
10processing is not necessary.
11
12--ALIASES--
13Core.AcceptFullDocuments
14--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.DirectLexLineNumberSyncInterval.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.DirectLexLineNumberSyncInterval.txt
new file mode 100644
index 00000000..2f54e462
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.DirectLexLineNumberSyncInterval.txt
@@ -0,0 +1,17 @@
1Core.DirectLexLineNumberSyncInterval
2TYPE: int
3VERSION: 2.0.0
4DEFAULT: 0
5--DESCRIPTION--
6
7<p>
8 Specifies the number of tokens the DirectLex line number tracking
9 implementations should process before attempting to resyncronize the
10 current line count by manually counting all previous new-lines. When
11 at 0, this functionality is disabled. Lower values will decrease
12 performance, and this is only strictly necessary if the counting
13 algorithm is buggy (in which case you should report it as a bug).
14 This has no effect when %Core.MaintainLineNumbers is disabled or DirectLex is
15 not being used.
16</p>
17--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.DisableExcludes.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.DisableExcludes.txt
new file mode 100644
index 00000000..3c63c923
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.DisableExcludes.txt
@@ -0,0 +1,14 @@
1Core.DisableExcludes
2TYPE: bool
3DEFAULT: false
4VERSION: 4.5.0
5--DESCRIPTION--
6<p>
7 This directive disables SGML-style exclusions, e.g. the exclusion of
8 <code>&lt;object&gt;</code> in any descendant of a
9 <code>&lt;pre&gt;</code> tag. Disabling excludes will allow some
10 invalid documents to pass through HTML Purifier, but HTML Purifier
11 will also be less likely to accidentally remove large documents during
12 processing.
13</p>
14--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.EnableIDNA.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.EnableIDNA.txt
new file mode 100644
index 00000000..7f498e7e
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.EnableIDNA.txt
@@ -0,0 +1,9 @@
1Core.EnableIDNA
2TYPE: bool
3DEFAULT: false
4VERSION: 4.4.0
5--DESCRIPTION--
6Allows international domain names in URLs. This configuration option
7requires the PEAR Net_IDNA2 module to be installed. It operates by
8punycoding any internationalized host names for maximum portability.
9--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.Encoding.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.Encoding.txt
new file mode 100644
index 00000000..89e2ae34
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.Encoding.txt
@@ -0,0 +1,15 @@
1Core.Encoding
2TYPE: istring
3DEFAULT: 'utf-8'
4--DESCRIPTION--
5If for some reason you are unable to convert all webpages to UTF-8, you can
6use this directive as a stop-gap compatibility change to let HTML Purifier
7deal with non UTF-8 input. This technique has notable deficiencies:
8absolutely no characters outside of the selected character encoding will be
9preserved, not even the ones that have been ampersand escaped (this is due
10to a UTF-8 specific <em>feature</em> that automatically resolves all
11entities), making it pretty useless for anything except the most I18N-blind
12applications, although %Core.EscapeNonASCIICharacters offers fixes this
13trouble with another tradeoff. This directive only accepts ISO-8859-1 if
14iconv is not enabled.
15--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.EscapeInvalidChildren.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.EscapeInvalidChildren.txt
new file mode 100644
index 00000000..1cc3fcda
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.EscapeInvalidChildren.txt
@@ -0,0 +1,12 @@
1Core.EscapeInvalidChildren
2TYPE: bool
3DEFAULT: false
4--DESCRIPTION--
5<p><strong>Warning:</strong> this configuration option is no longer does anything as of 4.6.0.</p>
6
7<p>When true, a child is found that is not allowed in the context of the
8parent element will be transformed into text as if it were ASCII. When
9false, that element and all internal tags will be dropped, though text will
10be preserved. There is no option for dropping the element but preserving
11child nodes.</p>
12--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.EscapeInvalidTags.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.EscapeInvalidTags.txt
new file mode 100644
index 00000000..299775fa
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.EscapeInvalidTags.txt
@@ -0,0 +1,7 @@
1Core.EscapeInvalidTags
2TYPE: bool
3DEFAULT: false
4--DESCRIPTION--
5When true, invalid tags will be written back to the document as plain text.
6Otherwise, they are silently dropped.
7--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.EscapeNonASCIICharacters.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.EscapeNonASCIICharacters.txt
new file mode 100644
index 00000000..f50db2f9
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.EscapeNonASCIICharacters.txt
@@ -0,0 +1,13 @@
1Core.EscapeNonASCIICharacters
2TYPE: bool
3VERSION: 1.4.0
4DEFAULT: false
5--DESCRIPTION--
6This directive overcomes a deficiency in %Core.Encoding by blindly
7converting all non-ASCII characters into decimal numeric entities before
8converting it to its native encoding. This means that even characters that
9can be expressed in the non-UTF-8 encoding will be entity-ized, which can
10be a real downer for encodings like Big5. It also assumes that the ASCII
11repetoire is available, although this is the case for almost all encodings.
12Anyway, use UTF-8!
13--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.HiddenElements.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.HiddenElements.txt
new file mode 100644
index 00000000..c337e47f
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.HiddenElements.txt
@@ -0,0 +1,19 @@
1Core.HiddenElements
2TYPE: lookup
3--DEFAULT--
4array (
5 'script' => true,
6 'style' => true,
7)
8--DESCRIPTION--
9
10<p>
11 This directive is a lookup array of elements which should have their
12 contents removed when they are not allowed by the HTML definition.
13 For example, the contents of a <code>script</code> tag are not
14 normally shown in a document, so if script tags are to be removed,
15 their contents should be removed to. This is opposed to a <code>b</code>
16 tag, which defines some presentational changes but does not hide its
17 contents.
18</p>
19--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.Language.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.Language.txt
new file mode 100644
index 00000000..ed1f39b5
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.Language.txt
@@ -0,0 +1,10 @@
1Core.Language
2TYPE: string
3VERSION: 2.0.0
4DEFAULT: 'en'
5--DESCRIPTION--
6
7ISO 639 language code for localizable things in HTML Purifier to use,
8which is mainly error reporting. There is currently only an English (en)
9translation, so this directive is currently useless.
10--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.LexerImpl.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.LexerImpl.txt
new file mode 100644
index 00000000..e11c0152
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.LexerImpl.txt
@@ -0,0 +1,34 @@
1Core.LexerImpl
2TYPE: mixed/null
3VERSION: 2.0.0
4DEFAULT: NULL
5--DESCRIPTION--
6
7<p>
8 This parameter determines what lexer implementation can be used. The
9 valid values are:
10</p>
11<dl>
12 <dt><em>null</em></dt>
13 <dd>
14 Recommended, the lexer implementation will be auto-detected based on
15 your PHP-version and configuration.
16 </dd>
17 <dt><em>string</em> lexer identifier</dt>
18 <dd>
19 This is a slim way of manually overridding the implementation.
20 Currently recognized values are: DOMLex (the default PHP5
21implementation)
22 and DirectLex (the default PHP4 implementation). Only use this if
23 you know what you are doing: usually, the auto-detection will
24 manage things for cases you aren't even aware of.
25 </dd>
26 <dt><em>object</em> lexer instance</dt>
27 <dd>
28 Super-advanced: you can specify your own, custom, implementation that
29 implements the interface defined by <code>HTMLPurifier_Lexer</code>.
30 I may remove this option simply because I don't expect anyone
31 to use it.
32 </dd>
33</dl>
34--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.MaintainLineNumbers.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.MaintainLineNumbers.txt
new file mode 100644
index 00000000..838f10f6
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.MaintainLineNumbers.txt
@@ -0,0 +1,16 @@
1Core.MaintainLineNumbers
2TYPE: bool/null
3VERSION: 2.0.0
4DEFAULT: NULL
5--DESCRIPTION--
6
7<p>
8 If true, HTML Purifier will add line number information to all tokens.
9 This is useful when error reporting is turned on, but can result in
10 significant performance degradation and should not be used when
11 unnecessary. This directive must be used with the DirectLex lexer,
12 as the DOMLex lexer does not (yet) support this functionality.
13 If the value is null, an appropriate value will be selected based
14 on other configuration.
15</p>
16--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.NormalizeNewlines.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.NormalizeNewlines.txt
new file mode 100644
index 00000000..94a88600
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.NormalizeNewlines.txt
@@ -0,0 +1,11 @@
1Core.NormalizeNewlines
2TYPE: bool
3VERSION: 4.2.0
4DEFAULT: true
5--DESCRIPTION--
6<p>
7 Whether or not to normalize newlines to the operating
8 system default. When <code>false</code>, HTML Purifier
9 will attempt to preserve mixed newline files.
10</p>
11--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.RemoveInvalidImg.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.RemoveInvalidImg.txt
new file mode 100644
index 00000000..704ac56c
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.RemoveInvalidImg.txt
@@ -0,0 +1,12 @@
1Core.RemoveInvalidImg
2TYPE: bool
3DEFAULT: true
4VERSION: 1.3.0
5--DESCRIPTION--
6
7<p>
8 This directive enables pre-emptive URI checking in <code>img</code>
9 tags, as the attribute validation strategy is not authorized to
10 remove elements from the document. Revert to pre-1.3.0 behavior by setting to false.
11</p>
12--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.RemoveProcessingInstructions.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.RemoveProcessingInstructions.txt
new file mode 100644
index 00000000..ed6f1342
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.RemoveProcessingInstructions.txt
@@ -0,0 +1,11 @@
1Core.RemoveProcessingInstructions
2TYPE: bool
3VERSION: 4.2.0
4DEFAULT: false
5--DESCRIPTION--
6Instead of escaping processing instructions in the form <code>&lt;? ...
7?&gt;</code>, remove it out-right. This may be useful if the HTML
8you are validating contains XML processing instruction gunk, however,
9it can also be user-unfriendly for people attempting to post PHP
10snippets.
11--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.RemoveScriptContents.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.RemoveScriptContents.txt
new file mode 100644
index 00000000..efbe994c
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Core.RemoveScriptContents.txt
@@ -0,0 +1,12 @@
1Core.RemoveScriptContents
2TYPE: bool/null
3DEFAULT: NULL
4VERSION: 2.0.0
5DEPRECATED-VERSION: 2.1.0
6DEPRECATED-USE: Core.HiddenElements
7--DESCRIPTION--
8<p>
9 This directive enables HTML Purifier to remove not only script tags
10 but all of their contents.
11</p>
12--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Filter.Custom.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Filter.Custom.txt
new file mode 100644
index 00000000..861ae66c
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Filter.Custom.txt
@@ -0,0 +1,11 @@
1Filter.Custom
2TYPE: list
3VERSION: 3.1.0
4DEFAULT: array()
5--DESCRIPTION--
6<p>
7 This directive can be used to add custom filters; it is nearly the
8 equivalent of the now deprecated <code>HTMLPurifier-&gt;addFilter()</code>
9 method. Specify an array of concrete implementations.
10</p>
11--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Filter.ExtractStyleBlocks.Escaping.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Filter.ExtractStyleBlocks.Escaping.txt
new file mode 100644
index 00000000..69602635
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Filter.ExtractStyleBlocks.Escaping.txt
@@ -0,0 +1,14 @@
1Filter.ExtractStyleBlocks.Escaping
2TYPE: bool
3VERSION: 3.0.0
4DEFAULT: true
5ALIASES: Filter.ExtractStyleBlocksEscaping, FilterParam.ExtractStyleBlocksEscaping
6--DESCRIPTION--
7
8<p>
9 Whether or not to escape the dangerous characters &lt;, &gt; and &amp;
10 as \3C, \3E and \26, respectively. This is can be safely set to false
11 if the contents of StyleBlocks will be placed in an external stylesheet,
12 where there is no risk of it being interpreted as HTML.
13</p>
14--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Filter.ExtractStyleBlocks.Scope.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Filter.ExtractStyleBlocks.Scope.txt
new file mode 100644
index 00000000..baa81ae0
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Filter.ExtractStyleBlocks.Scope.txt
@@ -0,0 +1,29 @@
1Filter.ExtractStyleBlocks.Scope
2TYPE: string/null
3VERSION: 3.0.0
4DEFAULT: NULL
5ALIASES: Filter.ExtractStyleBlocksScope, FilterParam.ExtractStyleBlocksScope
6--DESCRIPTION--
7
8<p>
9 If you would like users to be able to define external stylesheets, but
10 only allow them to specify CSS declarations for a specific node and
11 prevent them from fiddling with other elements, use this directive.
12 It accepts any valid CSS selector, and will prepend this to any
13 CSS declaration extracted from the document. For example, if this
14 directive is set to <code>#user-content</code> and a user uses the
15 selector <code>a:hover</code>, the final selector will be
16 <code>#user-content a:hover</code>.
17</p>
18<p>
19 The comma shorthand may be used; consider the above example, with
20 <code>#user-content, #user-content2</code>, the final selector will
21 be <code>#user-content a:hover, #user-content2 a:hover</code>.
22</p>
23<p>
24 <strong>Warning:</strong> It is possible for users to bypass this measure
25 using a naughty + selector. This is a bug in CSS Tidy 1.3, not HTML
26 Purifier, and I am working to get it fixed. Until then, HTML Purifier
27 performs a basic check to prevent this.
28</p>
29--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Filter.ExtractStyleBlocks.TidyImpl.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Filter.ExtractStyleBlocks.TidyImpl.txt
new file mode 100644
index 00000000..3b701891
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Filter.ExtractStyleBlocks.TidyImpl.txt
@@ -0,0 +1,16 @@
1Filter.ExtractStyleBlocks.TidyImpl
2TYPE: mixed/null
3VERSION: 3.1.0
4DEFAULT: NULL
5ALIASES: FilterParam.ExtractStyleBlocksTidyImpl
6--DESCRIPTION--
7<p>
8 If left NULL, HTML Purifier will attempt to instantiate a <code>csstidy</code>
9 class to use for internal cleaning. This will usually be good enough.
10</p>
11<p>
12 However, for trusted user input, you can set this to <code>false</code> to
13 disable cleaning. In addition, you can supply your own concrete implementation
14 of Tidy's interface to use, although I don't know why you'd want to do that.
15</p>
16--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Filter.ExtractStyleBlocks.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Filter.ExtractStyleBlocks.txt
new file mode 100644
index 00000000..be0177d4
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Filter.ExtractStyleBlocks.txt
@@ -0,0 +1,74 @@
1Filter.ExtractStyleBlocks
2TYPE: bool
3VERSION: 3.1.0
4DEFAULT: false
5EXTERNAL: CSSTidy
6--DESCRIPTION--
7<p>
8 This directive turns on the style block extraction filter, which removes
9 <code>style</code> blocks from input HTML, cleans them up with CSSTidy,
10 and places them in the <code>StyleBlocks</code> context variable, for further
11 use by you, usually to be placed in an external stylesheet, or a
12 <code>style</code> block in the <code>head</code> of your document.
13</p>
14<p>
15 Sample usage:
16</p>
17<pre><![CDATA[
18<?php
19 header('Content-type: text/html; charset=utf-8');
20 echo '<?xml version="1.0" encoding="UTF-8"?>';
21?>
22<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
23 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
24<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
25<head>
26 <title>Filter.ExtractStyleBlocks</title>
27<?php
28 require_once '/path/to/library/HTMLPurifier.auto.php';
29 require_once '/path/to/csstidy.class.php';
30
31 $dirty = '<style>body {color:#F00;}</style> Some text';
32
33 $config = HTMLPurifier_Config::createDefault();
34 $config->set('Filter', 'ExtractStyleBlocks', true);
35 $purifier = new HTMLPurifier($config);
36
37 $html = $purifier->purify($dirty);
38
39 // This implementation writes the stylesheets to the styles/ directory.
40 // You can also echo the styles inside the document, but it's a bit
41 // more difficult to make sure they get interpreted properly by
42 // browsers; try the usual CSS armoring techniques.
43 $styles = $purifier->context->get('StyleBlocks');
44 $dir = 'styles/';
45 if (!is_dir($dir)) mkdir($dir);
46 $hash = sha1($_GET['html']);
47 foreach ($styles as $i => $style) {
48 file_put_contents($name = $dir . $hash . "_$i");
49 echo '<link rel="stylesheet" type="text/css" href="'.$name.'" />';
50 }
51?>
52</head>
53<body>
54 <div>
55 <?php echo $html; ?>
56 </div>
57</b]]><![CDATA[ody>
58</html>
59]]></pre>
60<p>
61 <strong>Warning:</strong> It is possible for a user to mount an
62 imagecrash attack using this CSS. Counter-measures are difficult;
63 it is not simply enough to limit the range of CSS lengths (using
64 relative lengths with many nesting levels allows for large values
65 to be attained without actually specifying them in the stylesheet),
66 and the flexible nature of selectors makes it difficult to selectively
67 disable lengths on image tags (HTML Purifier, however, does disable
68 CSS width and height in inline styling). There are probably two effective
69 counter measures: an explicit width and height set to auto in all
70 images in your document (unlikely) or the disabling of width and
71 height (somewhat reasonable). Whether or not these measures should be
72 used is left to the reader.
73</p>
74--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Filter.YouTube.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Filter.YouTube.txt
new file mode 100644
index 00000000..88221866
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Filter.YouTube.txt
@@ -0,0 +1,16 @@
1Filter.YouTube
2TYPE: bool
3VERSION: 3.1.0
4DEFAULT: false
5--DESCRIPTION--
6<p>
7 <strong>Warning:</strong> Deprecated in favor of %HTML.SafeObject and
8 %Output.FlashCompat (turn both on to allow YouTube videos and other
9 Flash content).
10</p>
11<p>
12 This directive enables YouTube video embedding in HTML Purifier. Check
13 <a href="http://htmlpurifier.org/docs/enduser-youtube.html">this document
14 on embedding videos</a> for more information on what this filter does.
15</p>
16--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.Allowed.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.Allowed.txt
new file mode 100644
index 00000000..afd48a0d
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.Allowed.txt
@@ -0,0 +1,25 @@
1HTML.Allowed
2TYPE: itext/null
3VERSION: 2.0.0
4DEFAULT: NULL
5--DESCRIPTION--
6
7<p>
8 This is a preferred convenience directive that combines
9 %HTML.AllowedElements and %HTML.AllowedAttributes.
10 Specify elements and attributes that are allowed using:
11 <code>element1[attr1|attr2],element2...</code>. For example,
12 if you would like to only allow paragraphs and links, specify
13 <code>a[href],p</code>. You can specify attributes that apply
14 to all elements using an asterisk, e.g. <code>*[lang]</code>.
15 You can also use newlines instead of commas to separate elements.
16</p>
17<p>
18 <strong>Warning</strong>:
19 All of the constraints on the component directives are still enforced.
20 The syntax is a <em>subset</em> of TinyMCE's <code>valid_elements</code>
21 whitelist: directly copy-pasting it here will probably result in
22 broken whitelists. If %HTML.AllowedElements or %HTML.AllowedAttributes
23 are set, this directive has no effect.
24</p>
25--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.AllowedAttributes.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.AllowedAttributes.txt
new file mode 100644
index 00000000..0e6ec54f
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.AllowedAttributes.txt
@@ -0,0 +1,19 @@
1HTML.AllowedAttributes
2TYPE: lookup/null
3VERSION: 1.3.0
4DEFAULT: NULL
5--DESCRIPTION--
6
7<p>
8 If HTML Purifier's attribute set is unsatisfactory, overload it!
9 The syntax is "tag.attr" or "*.attr" for the global attributes
10 (style, id, class, dir, lang, xml:lang).
11</p>
12<p>
13 <strong>Warning:</strong> If another directive conflicts with the
14 elements here, <em>that</em> directive will win and override. For
15 example, %HTML.EnableAttrID will take precedence over *.id in this
16 directive. You must set that directive to true before you can use
17 IDs at all.
18</p>
19--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.AllowedComments.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.AllowedComments.txt
new file mode 100644
index 00000000..8440bc39
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.AllowedComments.txt
@@ -0,0 +1,10 @@
1HTML.AllowedComments
2TYPE: lookup
3VERSION: 4.4.0
4DEFAULT: array()
5--DESCRIPTION--
6A whitelist which indicates what explicit comment bodies should be
7allowed, modulo leading and trailing whitespace. See also %HTML.AllowedCommentsRegexp
8(these directives are union'ed together, so a comment is considered
9valid if any directive deems it valid.)
10--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.AllowedCommentsRegexp.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.AllowedCommentsRegexp.txt
new file mode 100644
index 00000000..b1e65beb
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.AllowedCommentsRegexp.txt
@@ -0,0 +1,15 @@
1HTML.AllowedCommentsRegexp
2TYPE: string/null
3VERSION: 4.4.0
4DEFAULT: NULL
5--DESCRIPTION--
6A regexp, which if it matches the body of a comment, indicates that
7it should be allowed. Trailing and leading spaces are removed prior
8to running this regular expression.
9<strong>Warning:</strong> Make sure you specify
10correct anchor metacharacters <code>^regex$</code>, otherwise you may accept
11comments that you did not mean to! In particular, the regex <code>/foo|bar/</code>
12is probably not sufficiently strict, since it also allows <code>foobar</code>.
13See also %HTML.AllowedComments (these directives are union'ed together,
14so a comment is considered valid if any directive deems it valid.)
15--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.AllowedElements.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.AllowedElements.txt
new file mode 100644
index 00000000..ca3c13dd
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.AllowedElements.txt
@@ -0,0 +1,23 @@
1HTML.AllowedElements
2TYPE: lookup/null
3VERSION: 1.3.0
4DEFAULT: NULL
5--DESCRIPTION--
6<p>
7 If HTML Purifier's tag set is unsatisfactory for your needs, you can
8 overload it with your own list of tags to allow. If you change
9 this, you probably also want to change %HTML.AllowedAttributes; see
10 also %HTML.Allowed which lets you set allowed elements and
11 attributes at the same time.
12</p>
13<p>
14 If you attempt to allow an element that HTML Purifier does not know
15 about, HTML Purifier will raise an error. You will need to manually
16 tell HTML Purifier about this element by using the
17 <a href="http://htmlpurifier.org/docs/enduser-customize.html">advanced customization features.</a>
18</p>
19<p>
20 <strong>Warning:</strong> If another directive conflicts with the
21 elements here, <em>that</em> directive will win and override.
22</p>
23--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.AllowedModules.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.AllowedModules.txt
new file mode 100644
index 00000000..e373791a
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.AllowedModules.txt
@@ -0,0 +1,20 @@
1HTML.AllowedModules
2TYPE: lookup/null
3VERSION: 2.0.0
4DEFAULT: NULL
5--DESCRIPTION--
6
7<p>
8 A doctype comes with a set of usual modules to use. Without having
9 to mucking about with the doctypes, you can quickly activate or
10 disable these modules by specifying which modules you wish to allow
11 with this directive. This is most useful for unit testing specific
12 modules, although end users may find it useful for their own ends.
13</p>
14<p>
15 If you specify a module that does not exist, the manager will silently
16 fail to use it, so be careful! User-defined modules are not affected
17 by this directive. Modules defined in %HTML.CoreModules are not
18 affected by this directive.
19</p>
20--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.Attr.Name.UseCDATA.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.Attr.Name.UseCDATA.txt
new file mode 100644
index 00000000..75d680ee
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.Attr.Name.UseCDATA.txt
@@ -0,0 +1,11 @@
1HTML.Attr.Name.UseCDATA
2TYPE: bool
3DEFAULT: false
4VERSION: 4.0.0
5--DESCRIPTION--
6The W3C specification DTD defines the name attribute to be CDATA, not ID, due
7to limitations of DTD. In certain documents, this relaxed behavior is desired,
8whether it is to specify duplicate names, or to specify names that would be
9illegal IDs (for example, names that begin with a digit.) Set this configuration
10directive to true to use the relaxed parsing rules.
11--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.BlockWrapper.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.BlockWrapper.txt
new file mode 100644
index 00000000..f32b802c
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.BlockWrapper.txt
@@ -0,0 +1,18 @@
1HTML.BlockWrapper
2TYPE: string
3VERSION: 1.3.0
4DEFAULT: 'p'
5--DESCRIPTION--
6
7<p>
8 String name of element to wrap inline elements that are inside a block
9 context. This only occurs in the children of blockquote in strict mode.
10</p>
11<p>
12 Example: by default value,
13 <code>&lt;blockquote&gt;Foo&lt;/blockquote&gt;</code> would become
14 <code>&lt;blockquote&gt;&lt;p&gt;Foo&lt;/p&gt;&lt;/blockquote&gt;</code>.
15 The <code>&lt;p&gt;</code> tags can be replaced with whatever you desire,
16 as long as it is a block level element.
17</p>
18--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.CoreModules.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.CoreModules.txt
new file mode 100644
index 00000000..fc8e4020
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.CoreModules.txt
@@ -0,0 +1,23 @@
1HTML.CoreModules
2TYPE: lookup
3VERSION: 2.0.0
4--DEFAULT--
5array (
6 'Structure' => true,
7 'Text' => true,
8 'Hypertext' => true,
9 'List' => true,
10 'NonXMLCommonAttributes' => true,
11 'XMLCommonAttributes' => true,
12 'CommonAttributes' => true,
13)
14--DESCRIPTION--
15
16<p>
17 Certain modularized doctypes (XHTML, namely), have certain modules
18 that must be included for the doctype to be an conforming document
19 type: put those modules here. By default, XHTML's core modules
20 are used. You can set this to a blank array to disable core module
21 protection, but this is not recommended.
22</p>
23--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.CustomDoctype.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.CustomDoctype.txt
new file mode 100644
index 00000000..a2bde5dc
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.CustomDoctype.txt
@@ -0,0 +1,9 @@
1HTML.CustomDoctype
2TYPE: string/null
3VERSION: 2.0.1
4DEFAULT: NULL
5--DESCRIPTION--
6
7A custom doctype for power-users who defined there own document
8type. This directive only applies when %HTML.Doctype is blank.
9--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.DefinitionID.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.DefinitionID.txt
new file mode 100644
index 00000000..f5433e3f
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.DefinitionID.txt
@@ -0,0 +1,33 @@
1HTML.DefinitionID
2TYPE: string/null
3DEFAULT: NULL
4VERSION: 2.0.0
5--DESCRIPTION--
6
7<p>
8 Unique identifier for a custom-built HTML definition. If you edit
9 the raw version of the HTMLDefinition, introducing changes that the
10 configuration object does not reflect, you must specify this variable.
11 If you change your custom edits, you should change this directive, or
12 clear your cache. Example:
13</p>
14<pre>
15$config = HTMLPurifier_Config::createDefault();
16$config->set('HTML', 'DefinitionID', '1');
17$def = $config->getHTMLDefinition();
18$def->addAttribute('a', 'tabindex', 'Number');
19</pre>
20<p>
21 In the above example, the configuration is still at the defaults, but
22 using the advanced API, an extra attribute has been added. The
23 configuration object normally has no way of knowing that this change
24 has taken place, so it needs an extra directive: %HTML.DefinitionID.
25 If someone else attempts to use the default configuration, these two
26 pieces of code will not clobber each other in the cache, since one has
27 an extra directive attached to it.
28</p>
29<p>
30 You <em>must</em> specify a value to this directive to use the
31 advanced API features.
32</p>
33--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.DefinitionRev.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.DefinitionRev.txt
new file mode 100644
index 00000000..0bb5a718
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.DefinitionRev.txt
@@ -0,0 +1,16 @@
1HTML.DefinitionRev
2TYPE: int
3VERSION: 2.0.0
4DEFAULT: 1
5--DESCRIPTION--
6
7<p>
8 Revision identifier for your custom definition specified in
9 %HTML.DefinitionID. This serves the same purpose: uniquely identifying
10 your custom definition, but this one does so in a chronological
11 context: revision 3 is more up-to-date then revision 2. Thus, when
12 this gets incremented, the cache handling is smart enough to clean
13 up any older revisions of your definition as well as flush the
14 cache.
15</p>
16--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.Doctype.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.Doctype.txt
new file mode 100644
index 00000000..a6969b99
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.Doctype.txt
@@ -0,0 +1,11 @@
1HTML.Doctype
2TYPE: string/null
3DEFAULT: NULL
4--DESCRIPTION--
5Doctype to use during filtering. Technically speaking this is not actually
6a doctype (as it does not identify a corresponding DTD), but we are using
7this name for sake of simplicity. When non-blank, this will override any
8older directives like %HTML.XHTML or %HTML.Strict.
9--ALLOWED--
10'HTML 4.01 Transitional', 'HTML 4.01 Strict', 'XHTML 1.0 Transitional', 'XHTML 1.0 Strict', 'XHTML 1.1'
11--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.FlashAllowFullScreen.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.FlashAllowFullScreen.txt
new file mode 100644
index 00000000..08d641f9
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.FlashAllowFullScreen.txt
@@ -0,0 +1,11 @@
1HTML.FlashAllowFullScreen
2TYPE: bool
3VERSION: 4.2.0
4DEFAULT: false
5--DESCRIPTION--
6<p>
7 Whether or not to permit embedded Flash content from
8 %HTML.SafeObject to expand to the full screen. Corresponds to
9 the <code>allowFullScreen</code> parameter.
10</p>
11--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.ForbiddenAttributes.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.ForbiddenAttributes.txt
new file mode 100644
index 00000000..2b8df97c
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.ForbiddenAttributes.txt
@@ -0,0 +1,21 @@
1HTML.ForbiddenAttributes
2TYPE: lookup
3VERSION: 3.1.0
4DEFAULT: array()
5--DESCRIPTION--
6<p>
7 While this directive is similar to %HTML.AllowedAttributes, for
8 forwards-compatibility with XML, this attribute has a different syntax. Instead of
9 <code>tag.attr</code>, use <code>tag@attr</code>. To disallow <code>href</code>
10 attributes in <code>a</code> tags, set this directive to
11 <code>a@href</code>. You can also disallow an attribute globally with
12 <code>attr</code> or <code>*@attr</code> (either syntax is fine; the latter
13 is provided for consistency with %HTML.AllowedAttributes).
14</p>
15<p>
16 <strong>Warning:</strong> This directive complements %HTML.ForbiddenElements,
17 accordingly, check
18 out that directive for a discussion of why you
19 should think twice before using this directive.
20</p>
21--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.ForbiddenElements.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.ForbiddenElements.txt
new file mode 100644
index 00000000..40466c46
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.ForbiddenElements.txt
@@ -0,0 +1,20 @@
1HTML.ForbiddenElements
2TYPE: lookup
3VERSION: 3.1.0
4DEFAULT: array()
5--DESCRIPTION--
6<p>
7 This was, perhaps, the most requested feature ever in HTML
8 Purifier. Please don't abuse it! This is the logical inverse of
9 %HTML.AllowedElements, and it will override that directive, or any
10 other directive.
11</p>
12<p>
13 If possible, %HTML.Allowed is recommended over this directive, because it
14 can sometimes be difficult to tell whether or not you've forbidden all of
15 the behavior you would like to disallow. If you forbid <code>img</code>
16 with the expectation of preventing images on your site, you'll be in for
17 a nasty surprise when people start using the <code>background-image</code>
18 CSS property.
19</p>
20--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.MaxImgLength.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.MaxImgLength.txt
new file mode 100644
index 00000000..31974795
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.MaxImgLength.txt
@@ -0,0 +1,14 @@
1HTML.MaxImgLength
2TYPE: int/null
3DEFAULT: 1200
4VERSION: 3.1.1
5--DESCRIPTION--
6<p>
7 This directive controls the maximum number of pixels in the width and
8 height attributes in <code>img</code> tags. This is
9 in place to prevent imagecrash attacks, disable with null at your own risk.
10 This directive is similar to %CSS.MaxImgLength, and both should be
11 concurrently edited, although there are
12 subtle differences in the input format (the HTML max is an integer).
13</p>
14--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.Nofollow.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.Nofollow.txt
new file mode 100644
index 00000000..7aa35635
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.Nofollow.txt
@@ -0,0 +1,7 @@
1HTML.Nofollow
2TYPE: bool
3VERSION: 4.3.0
4DEFAULT: FALSE
5--DESCRIPTION--
6If enabled, nofollow rel attributes are added to all outgoing links.
7--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.Parent.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.Parent.txt
new file mode 100644
index 00000000..2d2fbd11
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.Parent.txt
@@ -0,0 +1,12 @@
1HTML.Parent
2TYPE: string
3VERSION: 1.3.0
4DEFAULT: 'div'
5--DESCRIPTION--
6
7<p>
8 String name of element that HTML fragment passed to library will be
9 inserted in. An interesting variation would be using span as the
10 parent element, meaning that only inline tags would be allowed.
11</p>
12--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.Proprietary.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.Proprietary.txt
new file mode 100644
index 00000000..b3c45e19
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.Proprietary.txt
@@ -0,0 +1,12 @@
1HTML.Proprietary
2TYPE: bool
3VERSION: 3.1.0
4DEFAULT: false
5--DESCRIPTION--
6<p>
7 Whether or not to allow proprietary elements and attributes in your
8 documents, as per <code>HTMLPurifier_HTMLModule_Proprietary</code>.
9 <strong>Warning:</strong> This can cause your documents to stop
10 validating!
11</p>
12--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.SafeEmbed.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.SafeEmbed.txt
new file mode 100644
index 00000000..556fa674
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.SafeEmbed.txt
@@ -0,0 +1,13 @@
1HTML.SafeEmbed
2TYPE: bool
3VERSION: 3.1.1
4DEFAULT: false
5--DESCRIPTION--
6<p>
7 Whether or not to permit embed tags in documents, with a number of extra
8 security features added to prevent script execution. This is similar to
9 what websites like MySpace do to embed tags. Embed is a proprietary
10 element and will cause your website to stop validating; you should
11 see if you can use %Output.FlashCompat with %HTML.SafeObject instead
12 first.</p>
13--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.SafeIframe.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.SafeIframe.txt
new file mode 100644
index 00000000..295a8cf6
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.SafeIframe.txt
@@ -0,0 +1,13 @@
1HTML.SafeIframe
2TYPE: bool
3VERSION: 4.4.0
4DEFAULT: false
5--DESCRIPTION--
6<p>
7 Whether or not to permit iframe tags in untrusted documents. This
8 directive must be accompanied by a whitelist of permitted iframes,
9 such as %URI.SafeIframeRegexp, otherwise it will fatally error.
10 This directive has no effect on strict doctypes, as iframes are not
11 valid.
12</p>
13--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.SafeObject.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.SafeObject.txt
new file mode 100644
index 00000000..07f6e536
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.SafeObject.txt
@@ -0,0 +1,13 @@
1HTML.SafeObject
2TYPE: bool
3VERSION: 3.1.1
4DEFAULT: false
5--DESCRIPTION--
6<p>
7 Whether or not to permit object tags in documents, with a number of extra
8 security features added to prevent script execution. This is similar to
9 what websites like MySpace do to object tags. You should also enable
10 %Output.FlashCompat in order to generate Internet Explorer
11 compatibility code for your object tags.
12</p>
13--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.SafeScripting.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.SafeScripting.txt
new file mode 100644
index 00000000..641b4a8d
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.SafeScripting.txt
@@ -0,0 +1,10 @@
1HTML.SafeScripting
2TYPE: lookup
3VERSION: 4.5.0
4DEFAULT: array()
5--DESCRIPTION--
6<p>
7 Whether or not to permit script tags to external scripts in documents.
8 Inline scripting is not allowed, and the script must match an explicit whitelist.
9</p>
10--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.Strict.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.Strict.txt
new file mode 100644
index 00000000..d99663a5
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.Strict.txt
@@ -0,0 +1,9 @@
1HTML.Strict
2TYPE: bool
3VERSION: 1.3.0
4DEFAULT: false
5DEPRECATED-VERSION: 1.7.0
6DEPRECATED-USE: HTML.Doctype
7--DESCRIPTION--
8Determines whether or not to use Transitional (loose) or Strict rulesets.
9--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.TargetBlank.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.TargetBlank.txt
new file mode 100644
index 00000000..d65f0d04
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.TargetBlank.txt
@@ -0,0 +1,8 @@
1HTML.TargetBlank
2TYPE: bool
3VERSION: 4.4.0
4DEFAULT: FALSE
5--DESCRIPTION--
6If enabled, <code>target=blank</code> attributes are added to all outgoing links.
7(This includes links from an HTTPS version of a page to an HTTP version.)
8--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.TidyAdd.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.TidyAdd.txt
new file mode 100644
index 00000000..602453f6
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.TidyAdd.txt
@@ -0,0 +1,8 @@
1HTML.TidyAdd
2TYPE: lookup
3VERSION: 2.0.0
4DEFAULT: array()
5--DESCRIPTION--
6
7Fixes to add to the default set of Tidy fixes as per your level.
8--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.TidyLevel.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.TidyLevel.txt
new file mode 100644
index 00000000..bf943e8f
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.TidyLevel.txt
@@ -0,0 +1,24 @@
1HTML.TidyLevel
2TYPE: string
3VERSION: 2.0.0
4DEFAULT: 'medium'
5--DESCRIPTION--
6
7<p>General level of cleanliness the Tidy module should enforce.
8There are four allowed values:</p>
9<dl>
10 <dt>none</dt>
11 <dd>No extra tidying should be done</dd>
12 <dt>light</dt>
13 <dd>Only fix elements that would be discarded otherwise due to
14 lack of support in doctype</dd>
15 <dt>medium</dt>
16 <dd>Enforce best practices</dd>
17 <dt>heavy</dt>
18 <dd>Transform all deprecated elements and attributes to standards
19 compliant equivalents</dd>
20</dl>
21
22--ALLOWED--
23'none', 'light', 'medium', 'heavy'
24--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.TidyRemove.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.TidyRemove.txt
new file mode 100644
index 00000000..92cca2a4
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.TidyRemove.txt
@@ -0,0 +1,8 @@
1HTML.TidyRemove
2TYPE: lookup
3VERSION: 2.0.0
4DEFAULT: array()
5--DESCRIPTION--
6
7Fixes to remove from the default set of Tidy fixes as per your level.
8--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.Trusted.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.Trusted.txt
new file mode 100644
index 00000000..bc8e6549
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.Trusted.txt
@@ -0,0 +1,9 @@
1HTML.Trusted
2TYPE: bool
3VERSION: 2.0.0
4DEFAULT: false
5--DESCRIPTION--
6Indicates whether or not the user input is trusted or not. If the input is
7trusted, a more expansive set of allowed tags and attributes will be used.
8See also %CSS.Trusted.
9--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.XHTML.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.XHTML.txt
new file mode 100644
index 00000000..a3c2f42c
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/HTML.XHTML.txt
@@ -0,0 +1,11 @@
1HTML.XHTML
2TYPE: bool
3DEFAULT: true
4VERSION: 1.1.0
5DEPRECATED-VERSION: 1.7.0
6DEPRECATED-USE: HTML.Doctype
7--DESCRIPTION--
8Determines whether or not output is XHTML 1.0 or HTML 4.01 flavor.
9--ALIASES--
10Core.XHTML
11--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Output.CommentScriptContents.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Output.CommentScriptContents.txt
new file mode 100644
index 00000000..2a137047
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Output.CommentScriptContents.txt
@@ -0,0 +1,10 @@
1Output.CommentScriptContents
2TYPE: bool
3VERSION: 2.0.0
4DEFAULT: true
5--DESCRIPTION--
6Determines whether or not HTML Purifier should attempt to fix up the
7contents of script tags for legacy browsers with comments.
8--ALIASES--
9Core.CommentScriptContents
10--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Output.FixInnerHTML.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Output.FixInnerHTML.txt
new file mode 100644
index 00000000..d215ba2d
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Output.FixInnerHTML.txt
@@ -0,0 +1,15 @@
1Output.FixInnerHTML
2TYPE: bool
3VERSION: 4.3.0
4DEFAULT: true
5--DESCRIPTION--
6<p>
7 If true, HTML Purifier will protect against Internet Explorer's
8 mishandling of the <code>innerHTML</code> attribute by appending
9 a space to any attribute that does not contain angled brackets, spaces
10 or quotes, but contains a backtick. This slightly changes the
11 semantics of any given attribute, so if this is unacceptable and
12 you do not use <code>innerHTML</code> on any of your pages, you can
13 turn this directive off.
14</p>
15--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Output.FlashCompat.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Output.FlashCompat.txt
new file mode 100644
index 00000000..e58f91aa
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Output.FlashCompat.txt
@@ -0,0 +1,11 @@
1Output.FlashCompat
2TYPE: bool
3VERSION: 4.1.0
4DEFAULT: false
5--DESCRIPTION--
6<p>
7 If true, HTML Purifier will generate Internet Explorer compatibility
8 code for all object code. This is highly recommended if you enable
9 %HTML.SafeObject.
10</p>
11--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Output.Newline.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Output.Newline.txt
new file mode 100644
index 00000000..4bb90252
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Output.Newline.txt
@@ -0,0 +1,13 @@
1Output.Newline
2TYPE: string/null
3VERSION: 2.0.1
4DEFAULT: NULL
5--DESCRIPTION--
6
7<p>
8 Newline string to format final output with. If left null, HTML Purifier
9 will auto-detect the default newline type of the system and use that;
10 you can manually override it here. Remember, \r\n is Windows, \r
11 is Mac, and \n is Unix.
12</p>
13--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Output.SortAttr.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Output.SortAttr.txt
new file mode 100644
index 00000000..32231065
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Output.SortAttr.txt
@@ -0,0 +1,14 @@
1Output.SortAttr
2TYPE: bool
3VERSION: 3.2.0
4DEFAULT: false
5--DESCRIPTION--
6<p>
7 If true, HTML Purifier will sort attributes by name before writing them back
8 to the document, converting a tag like: <code>&lt;el b="" a="" c="" /&gt;</code>
9 to <code>&lt;el a="" b="" c="" /&gt;</code>. This is a workaround for
10 a bug in FCKeditor which causes it to swap attributes order, adding noise
11 to text diffs. If you're not seeing this bug, chances are, you don't need
12 this directive.
13</p>
14--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Output.TidyFormat.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Output.TidyFormat.txt
new file mode 100644
index 00000000..23dd4d3d
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Output.TidyFormat.txt
@@ -0,0 +1,25 @@
1Output.TidyFormat
2TYPE: bool
3VERSION: 1.1.1
4DEFAULT: false
5--DESCRIPTION--
6<p>
7 Determines whether or not to run Tidy on the final output for pretty
8 formatting reasons, such as indentation and wrap.
9</p>
10<p>
11 This can greatly improve readability for editors who are hand-editing
12 the HTML, but is by no means necessary as HTML Purifier has already
13 fixed all major errors the HTML may have had. Tidy is a non-default
14 extension, and this directive will silently fail if Tidy is not
15 available.
16</p>
17<p>
18 If you are looking to make the overall look of your page's source
19 better, I recommend running Tidy on the entire page rather than just
20 user-content (after all, the indentation relative to the containing
21 blocks will be incorrect).
22</p>
23--ALIASES--
24Core.TidyFormat
25--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Test.ForceNoIconv.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Test.ForceNoIconv.txt
new file mode 100644
index 00000000..d1820cdb
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/Test.ForceNoIconv.txt
@@ -0,0 +1,7 @@
1Test.ForceNoIconv
2TYPE: bool
3DEFAULT: false
4--DESCRIPTION--
5When set to true, HTMLPurifier_Encoder will act as if iconv does not exist
6and use only pure PHP implementations.
7--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.AllowedSchemes.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.AllowedSchemes.txt
new file mode 100644
index 00000000..47714f5d
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.AllowedSchemes.txt
@@ -0,0 +1,17 @@
1URI.AllowedSchemes
2TYPE: lookup
3--DEFAULT--
4array (
5 'http' => true,
6 'https' => true,
7 'mailto' => true,
8 'ftp' => true,
9 'nntp' => true,
10 'news' => true,
11)
12--DESCRIPTION--
13Whitelist that defines the schemes that a URI is allowed to have. This
14prevents XSS attacks from using pseudo-schemes like javascript or mocha.
15There is also support for the <code>data</code> and <code>file</code>
16URI schemes, but they are not enabled by default.
17--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.Base.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.Base.txt
new file mode 100644
index 00000000..ba473080
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.Base.txt
@@ -0,0 +1,17 @@
1URI.Base
2TYPE: string/null
3VERSION: 2.1.0
4DEFAULT: NULL
5--DESCRIPTION--
6
7<p>
8 The base URI is the URI of the document this purified HTML will be
9 inserted into. This information is important if HTML Purifier needs
10 to calculate absolute URIs from relative URIs, such as when %URI.MakeAbsolute
11 is on. You may use a non-absolute URI for this value, but behavior
12 may vary (%URI.MakeAbsolute deals nicely with both absolute and
13 relative paths, but forwards-compatibility is not guaranteed).
14 <strong>Warning:</strong> If set, the scheme on this URI
15 overrides the one specified by %URI.DefaultScheme.
16</p>
17--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.DefaultScheme.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.DefaultScheme.txt
new file mode 100644
index 00000000..0700e0b1
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.DefaultScheme.txt
@@ -0,0 +1,10 @@
1URI.DefaultScheme
2TYPE: string
3DEFAULT: 'http'
4--DESCRIPTION--
5
6<p>
7 Defines through what scheme the output will be served, in order to
8 select the proper object validator when no scheme information is present.
9</p>
10--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.DefinitionID.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.DefinitionID.txt
new file mode 100644
index 00000000..523204c0
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.DefinitionID.txt
@@ -0,0 +1,11 @@
1URI.DefinitionID
2TYPE: string/null
3VERSION: 2.1.0
4DEFAULT: NULL
5--DESCRIPTION--
6
7<p>
8 Unique identifier for a custom-built URI definition. If you want
9 to add custom URIFilters, you must specify this value.
10</p>
11--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.DefinitionRev.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.DefinitionRev.txt
new file mode 100644
index 00000000..a9c07b1a
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.DefinitionRev.txt
@@ -0,0 +1,11 @@
1URI.DefinitionRev
2TYPE: int
3VERSION: 2.1.0
4DEFAULT: 1
5--DESCRIPTION--
6
7<p>
8 Revision identifier for your custom definition. See
9 %HTML.DefinitionRev for details.
10</p>
11--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.Disable.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.Disable.txt
new file mode 100644
index 00000000..b19ca1d5
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.Disable.txt
@@ -0,0 +1,14 @@
1URI.Disable
2TYPE: bool
3VERSION: 1.3.0
4DEFAULT: false
5--DESCRIPTION--
6
7<p>
8 Disables all URIs in all forms. Not sure why you'd want to do that
9 (after all, the Internet's founded on the notion of a hyperlink).
10</p>
11
12--ALIASES--
13Attr.DisableURI
14--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.DisableExternal.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.DisableExternal.txt
new file mode 100644
index 00000000..9132ea4f
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.DisableExternal.txt
@@ -0,0 +1,11 @@
1URI.DisableExternal
2TYPE: bool
3VERSION: 1.2.0
4DEFAULT: false
5--DESCRIPTION--
6Disables links to external websites. This is a highly effective anti-spam
7and anti-pagerank-leech measure, but comes at a hefty price: nolinks or
8images outside of your domain will be allowed. Non-linkified URIs will
9still be preserved. If you want to be able to link to subdomains or use
10absolute URIs, specify %URI.Host for your website.
11--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.DisableExternalResources.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.DisableExternalResources.txt
new file mode 100644
index 00000000..d74bc1e3
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.DisableExternalResources.txt
@@ -0,0 +1,13 @@
1URI.DisableExternalResources
2TYPE: bool
3VERSION: 1.3.0
4DEFAULT: false
5--DESCRIPTION--
6Disables the embedding of external resources, preventing users from
7embedding things like images from other hosts. This prevents access
8tracking (good for email viewers), bandwidth leeching, cross-site request
9forging, goatse.cx posting, and other nasties, but also results in a loss
10of end-user functionality (they can't directly post a pic they posted from
11Flickr anymore). Use it if you don't have a robust user-content moderation
12team.
13--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.DisableResources.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.DisableResources.txt
new file mode 100644
index 00000000..6c106144
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.DisableResources.txt
@@ -0,0 +1,15 @@
1URI.DisableResources
2TYPE: bool
3VERSION: 4.2.0
4DEFAULT: false
5--DESCRIPTION--
6<p>
7 Disables embedding resources, essentially meaning no pictures. You can
8 still link to them though. See %URI.DisableExternalResources for why
9 this might be a good idea.
10</p>
11<p>
12 <em>Note:</em> While this directive has been available since 1.3.0,
13 it didn't actually start doing anything until 4.2.0.
14</p>
15--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.Host.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.Host.txt
new file mode 100644
index 00000000..ba0e6bce
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.Host.txt
@@ -0,0 +1,19 @@
1URI.Host
2TYPE: string/null
3VERSION: 1.2.0
4DEFAULT: NULL
5--DESCRIPTION--
6
7<p>
8 Defines the domain name of the server, so we can determine whether or
9 an absolute URI is from your website or not. Not strictly necessary,
10 as users should be using relative URIs to reference resources on your
11 website. It will, however, let you use absolute URIs to link to
12 subdomains of the domain you post here: i.e. example.com will allow
13 sub.example.com. However, higher up domains will still be excluded:
14 if you set %URI.Host to sub.example.com, example.com will be blocked.
15 <strong>Note:</strong> This directive overrides %URI.Base because
16 a given page may be on a sub-domain, but you wish HTML Purifier to be
17 more relaxed and allow some of the parent domains too.
18</p>
19--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.HostBlacklist.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.HostBlacklist.txt
new file mode 100644
index 00000000..825fef27
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.HostBlacklist.txt
@@ -0,0 +1,9 @@
1URI.HostBlacklist
2TYPE: list
3VERSION: 1.3.0
4DEFAULT: array()
5--DESCRIPTION--
6List of strings that are forbidden in the host of any URI. Use it to kill
7domain names of spam, etc. Note that it will catch anything in the domain,
8so <tt>moo.com</tt> will catch <tt>moo.com.example.com</tt>.
9--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.MakeAbsolute.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.MakeAbsolute.txt
new file mode 100644
index 00000000..eb58c7f1
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.MakeAbsolute.txt
@@ -0,0 +1,13 @@
1URI.MakeAbsolute
2TYPE: bool
3VERSION: 2.1.0
4DEFAULT: false
5--DESCRIPTION--
6
7<p>
8 Converts all URIs into absolute forms. This is useful when the HTML
9 being filtered assumes a specific base path, but will actually be
10 viewed in a different context (and setting an alternate base URI is
11 not possible). %URI.Base must be set for this directive to work.
12</p>
13--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.Munge.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.Munge.txt
new file mode 100644
index 00000000..bedd610d
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.Munge.txt
@@ -0,0 +1,83 @@
1URI.Munge
2TYPE: string/null
3VERSION: 1.3.0
4DEFAULT: NULL
5--DESCRIPTION--
6
7<p>
8 Munges all browsable (usually http, https and ftp)
9 absolute URIs into another URI, usually a URI redirection service.
10 This directive accepts a URI, formatted with a <code>%s</code> where
11 the url-encoded original URI should be inserted (sample:
12 <code>http://www.google.com/url?q=%s</code>).
13</p>
14<p>
15 Uses for this directive:
16</p>
17<ul>
18 <li>
19 Prevent PageRank leaks, while being fairly transparent
20 to users (you may also want to add some client side JavaScript to
21 override the text in the statusbar). <strong>Notice</strong>:
22 Many security experts believe that this form of protection does not deter spam-bots.
23 </li>
24 <li>
25 Redirect users to a splash page telling them they are leaving your
26 website. While this is poor usability practice, it is often mandated
27 in corporate environments.
28 </li>
29</ul>
30<p>
31 Prior to HTML Purifier 3.1.1, this directive also enabled the munging
32 of browsable external resources, which could break things if your redirection
33 script was a splash page or used <code>meta</code> tags. To revert to
34 previous behavior, please use %URI.MungeResources.
35</p>
36<p>
37 You may want to also use %URI.MungeSecretKey along with this directive
38 in order to enforce what URIs your redirector script allows. Open
39 redirector scripts can be a security risk and negatively affect the
40 reputation of your domain name.
41</p>
42<p>
43 Starting with HTML Purifier 3.1.1, there is also these substitutions:
44</p>
45<table>
46 <thead>
47 <tr>
48 <th>Key</th>
49 <th>Description</th>
50 <th>Example <code>&lt;a href=""&gt;</code></th>
51 </tr>
52 </thead>
53 <tbody>
54 <tr>
55 <td>%r</td>
56 <td>1 - The URI embeds a resource<br />(blank) - The URI is merely a link</td>
57 <td></td>
58 </tr>
59 <tr>
60 <td>%n</td>
61 <td>The name of the tag this URI came from</td>
62 <td>a</td>
63 </tr>
64 <tr>
65 <td>%m</td>
66 <td>The name of the attribute this URI came from</td>
67 <td>href</td>
68 </tr>
69 <tr>
70 <td>%p</td>
71 <td>The name of the CSS property this URI came from, or blank if irrelevant</td>
72 <td></td>
73 </tr>
74 </tbody>
75</table>
76<p>
77 Admittedly, these letters are somewhat arbitrary; the only stipulation
78 was that they couldn't be a through f. r is for resource (I would have preferred
79 e, but you take what you can get), n is for name, m
80 was picked because it came after n (and I couldn't use a), p is for
81 property.
82</p>
83--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.MungeResources.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.MungeResources.txt
new file mode 100644
index 00000000..ed4b5b0d
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.MungeResources.txt
@@ -0,0 +1,17 @@
1URI.MungeResources
2TYPE: bool
3VERSION: 3.1.1
4DEFAULT: false
5--DESCRIPTION--
6<p>
7 If true, any URI munging directives like %URI.Munge
8 will also apply to embedded resources, such as <code>&lt;img src=""&gt;</code>.
9 Be careful enabling this directive if you have a redirector script
10 that does not use the <code>Location</code> HTTP header; all of your images
11 and other embedded resources will break.
12</p>
13<p>
14 <strong>Warning:</strong> It is strongly advised you use this in conjunction
15 %URI.MungeSecretKey to mitigate the security risk of an open redirector.
16</p>
17--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.MungeSecretKey.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.MungeSecretKey.txt
new file mode 100644
index 00000000..123b6e26
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.MungeSecretKey.txt
@@ -0,0 +1,30 @@
1URI.MungeSecretKey
2TYPE: string/null
3VERSION: 3.1.1
4DEFAULT: NULL
5--DESCRIPTION--
6<p>
7 This directive enables secure checksum generation along with %URI.Munge.
8 It should be set to a secure key that is not shared with anyone else.
9 The checksum can be placed in the URI using %t. Use of this checksum
10 affords an additional level of protection by allowing a redirector
11 to check if a URI has passed through HTML Purifier with this line:
12</p>
13
14<pre>$checksum === hash_hmac("sha256", $url, $secret_key)</pre>
15
16<p>
17 If the output is TRUE, the redirector script should accept the URI.
18</p>
19
20<p>
21 Please note that it would still be possible for an attacker to procure
22 secure hashes en-mass by abusing your website's Preview feature or the
23 like, but this service affords an additional level of protection
24 that should be combined with website blacklisting.
25</p>
26
27<p>
28 Remember this has no effect if %URI.Munge is not on.
29</p>
30--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.OverrideAllowedSchemes.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.OverrideAllowedSchemes.txt
new file mode 100644
index 00000000..8b387dea
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.OverrideAllowedSchemes.txt
@@ -0,0 +1,9 @@
1URI.OverrideAllowedSchemes
2TYPE: bool
3DEFAULT: true
4--DESCRIPTION--
5If this is set to true (which it is by default), you can override
6%URI.AllowedSchemes by simply registering a HTMLPurifier_URIScheme to the
7registry. If false, you will also have to update that directive in order
8to add more schemes.
9--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.SafeIframeRegexp.txt b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.SafeIframeRegexp.txt
new file mode 100644
index 00000000..7e1f227f
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/URI.SafeIframeRegexp.txt
@@ -0,0 +1,22 @@
1URI.SafeIframeRegexp
2TYPE: string/null
3VERSION: 4.4.0
4DEFAULT: NULL
5--DESCRIPTION--
6<p>
7 A PCRE regular expression that will be matched against an iframe URI. This is
8 a relatively inflexible scheme, but works well enough for the most common
9 use-case of iframes: embedded video. This directive only has an effect if
10 %HTML.SafeIframe is enabled. Here are some example values:
11</p>
12<ul>
13 <li><code>%^http://www.youtube.com/embed/%</code> - Allow YouTube videos</li>
14 <li><code>%^http://player.vimeo.com/video/%</code> - Allow Vimeo videos</li>
15 <li><code>%^http://(www.youtube.com/embed/|player.vimeo.com/video/)%</code> - Allow both</li>
16</ul>
17<p>
18 Note that this directive does not give you enough granularity to, say, disable
19 all <code>autoplay</code> videos. Pipe up on the HTML Purifier forums if this
20 is a capability you want.
21</p>
22--# vim: et sw=4 sts=4
diff --git a/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/info.ini b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/info.ini
new file mode 100644
index 00000000..58e0ce4a
--- /dev/null
+++ b/inc/3rdparty/htmlpurifier/HTMLPurifier/ConfigSchema/schema/info.ini
@@ -0,0 +1,3 @@
1name = "HTML Purifier"
2
3; vim: et sw=4 sts=4