annotate mod_firewall/scripts/spam-strip-xhtml.pfw @ 5367:93d445b26063

mod_http_oauth2: Validate redirect URI depending on application type Per https://openid.net/specs/openid-connect-registration-1_0.html require that web applications use https:// and native applications must use either http://localhost or a custom (non-https) URI. Previous requirement that hostname matches that of client_uri is kept for web applications.
author Kim Alvefur <zash@zash.se>
date Tue, 25 Apr 2023 19:49:41 +0200
parents f20dd383093a
children
Ignore whitespace changes - Everywhere: Within whitespace: At end of lines:
rev   line source
2572
f20dd383093a mod_firewall: Add spam-strip-xhtml.pfw
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
1 # Strip XHTML-IM from messages received from strangers
f20dd383093a mod_firewall: Add spam-strip-xhtml.pfw
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
2
f20dd383093a mod_firewall: Add spam-strip-xhtml.pfw
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
3 ::user/spam_check_message_custom
f20dd383093a mod_firewall: Add spam-strip-xhtml.pfw
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
4
f20dd383093a mod_firewall: Add spam-strip-xhtml.pfw
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
5 STRIP=html http://jabber.org/protocol/xhtml-im