ppc64le/linux/: markupsafe-3.0.3+ppc64le1 metadata and description

Simple index

Safely add untrusted strings to HTML/XML markup.

classifiers
  • Development Status :: 5 - Production/Stable
  • Environment :: Web Environment
  • Intended Audience :: Developers
  • Operating System :: OS Independent
  • Programming Language :: Python
  • Topic :: Internet :: WWW/HTTP :: Dynamic Content
  • Topic :: Text Processing :: Markup :: HTML
  • Typing :: Typed
  • Environment :: MetaData :: IBM Python Ecosystem
description_content_type text/markdown
dynamic license-file
license_expression BSD-3-Clause
license_file LICENSE.txt
maintainer_email Pallets <[email protected]>
project_urls
  • Donate, https://palletsprojects.com/donate
  • Documentation, https://markupsafe.palletsprojects.com/
  • Changes, https://markupsafe.palletsprojects.com/page/changes/
  • Source, https://github.com/pallets/markupsafe/
  • Chat, https://discord.gg/pallets
requires_python >=3.9
File Tox results History
markupsafe-3.0.3+ppc64le1-cp310-cp310-manylinux2014_ppc64le.manylinux_2_17_ppc64le.whl
Size
22 KB
Type
Python Wheel
Python
3.10
markupsafe-3.0.3+ppc64le1-cp311-cp311-manylinux2014_ppc64le.manylinux_2_17_ppc64le.whl
Size
24 KB
Type
Python Wheel
Python
3.11
markupsafe-3.0.3+ppc64le1-cp312-cp312-manylinux2014_ppc64le.manylinux_2_17_ppc64le.whl
Size
24 KB
Type
Python Wheel
Python
3.12
markupsafe-3.0.3+ppc64le1-cp313-cp313-manylinux2014_ppc64le.manylinux_2_17_ppc64le.whl
Size
24 KB
Type
Python Wheel
Python
3.13
markupsafe-3.0.3+ppc64le1-cp39-cp39-manylinux2014_ppc64le.manylinux_2_17_ppc64le.whl
Size
22 KB
Type
Python Wheel
Python
3.9

MarkupSafe

MarkupSafe implements a text object that escapes characters so it is safe to use in HTML and XML. Characters that have special meanings are replaced so that they display as the actual characters. This mitigates injection attacks, meaning untrusted user input can safely be displayed on a page.

Examples

>>> from markupsafe import Markup, escape

>>> # escape replaces special characters and wraps in Markup
>>> escape("<script>alert(document.cookie);</script>")
Markup('&lt;script&gt;alert(document.cookie);&lt;/script&gt;')

>>> # wrap in Markup to mark text "safe" and prevent escaping
>>> Markup("<strong>Hello</strong>")
Markup('<strong>hello</strong>')

>>> escape(Markup("<strong>Hello</strong>"))
Markup('<strong>hello</strong>')

>>> # Markup is a str subclass
>>> # methods and operators escape their arguments
>>> template = Markup("Hello <em>{name}</em>")
>>> template.format(name='"World"')
Markup('Hello <em>&#34;World&#34;</em>')

Donate

The Pallets organization develops and supports MarkupSafe and other popular packages. In order to grow the community of contributors and users, and allow the maintainers to devote more time to the projects, please donate today.

Contributing

See our detailed contributing documentation for many ways to contribute, including reporting issues, requesting features, asking or answering questions, and making PRs.

Export Classification Notice

The software hosted on this website consists of publicly available open‑source packages. To the extent U.S. export regulations apply, software that is publicly available as described in 15 C.F.R. §§ 734.7 (for non-encryption software) or 742.15(b) (for encryption software) is not subject to the Export Administration Regulations (EAR). Users are responsible for complying with all applicable export laws and regulations.