| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103 | Metadata-Version: 2.1Name: MarkupSafeVersion: 1.1.1Summary: Safely add untrusted strings to HTML/XML markup.Home-page: https://palletsprojects.com/p/markupsafe/Author: Armin RonacherAuthor-email: armin.ronacher@active-4.comMaintainer: The Pallets TeamMaintainer-email: contact@palletsprojects.comLicense: BSD-3-ClauseProject-URL: Documentation, https://markupsafe.palletsprojects.com/Project-URL: Code, https://github.com/pallets/markupsafeProject-URL: Issue tracker, https://github.com/pallets/markupsafe/issuesPlatform: UNKNOWNClassifier: Development Status :: 5 - Production/StableClassifier: Environment :: Web EnvironmentClassifier: Intended Audience :: DevelopersClassifier: License :: OSI Approved :: BSD LicenseClassifier: Operating System :: OS IndependentClassifier: Programming Language :: PythonClassifier: Programming Language :: Python :: 2Classifier: Programming Language :: Python :: 2.7Classifier: Programming Language :: Python :: 3Classifier: Programming Language :: Python :: 3.4Classifier: Programming Language :: Python :: 3.5Classifier: Programming Language :: Python :: 3.6Classifier: Programming Language :: Python :: 3.7Classifier: Topic :: Internet :: WWW/HTTP :: Dynamic ContentClassifier: Topic :: Software Development :: Libraries :: Python ModulesClassifier: Topic :: Text Processing :: Markup :: HTMLRequires-Python: >=2.7,!=3.0.*,!=3.1.*,!=3.2.*,!=3.3.*MarkupSafe==========MarkupSafe implements a text object that escapes characters so it issafe to use in HTML and XML. Characters that have special meanings arereplaced so that they display as the actual characters. This mitigatesinjection attacks, meaning untrusted user input can safely be displayedon a page.Installing----------Install and update using `pip`_:.. code-block:: text    pip install -U MarkupSafe.. _pip: https://pip.pypa.io/en/stable/quickstart/Examples--------.. code-block:: pycon    >>> from markupsafe import Markup, escape    >>> # escape replaces special characters and wraps in Markup    >>> escape('<script>alert(document.cookie);</script>')    Markup(u'<script>alert(document.cookie);</script>')    >>> # wrap in Markup to mark text "safe" and prevent escaping    >>> Markup('<strong>Hello</strong>')    Markup('<strong>hello</strong>')    >>> escape(Markup('<strong>Hello</strong>'))    Markup('<strong>hello</strong>')    >>> # Markup is a text subclass (str on Python 3, unicode on Python 2)    >>> # methods and operators escape their arguments    >>> template = Markup("Hello <em>%s</em>")    >>> template % '"World"'    Markup('Hello <em>"World"</em>')Donate------The Pallets organization develops and supports MarkupSafe and otherlibraries that use it. In order to grow the community of contributorsand users, and allow the maintainers to devote more time to theprojects, `please donate today`_... _please donate today: https://palletsprojects.com/donateLinks-----*   Website: https://palletsprojects.com/p/markupsafe/*   Documentation: https://markupsafe.palletsprojects.com/*   License: `BSD-3-Clause <https://github.com/pallets/markupsafe/blob/master/LICENSE.rst>`_*   Releases: https://pypi.org/project/MarkupSafe/*   Code: https://github.com/pallets/markupsafe*   Issue tracker: https://github.com/pallets/markupsafe/issues*   Test status:    *   Linux, Mac: https://travis-ci.org/pallets/markupsafe    *   Windows: https://ci.appveyor.com/project/pallets/markupsafe*   Test coverage: https://codecov.io/gh/pallets/markupsafe
 |