3 Commits

Author SHA1 Message Date
Maxim Vladimirskiy
a8c7e6a972 Merge pull request #226 from mailgun/maxim/develop
PIP-1562: Remove max tags limit [python3]
2022-01-06 15:24:57 +03:00
Maxim Vladimirskiy
b30c375c5b Expose extract_from_html_tree 2022-01-06 15:16:43 +03:00
Maxim Vladimirskiy
cec5acf58f Remove max tags limit 2022-01-06 14:18:11 +03:00
5 changed files with 27 additions and 86 deletions

View File

@@ -29,7 +29,7 @@ class InstallCommand(install):
setup(name='talon', setup(name='talon',
version='1.4.10', version='1.5.0',
description=("Mailgun library " description=("Mailgun library "
"to extract message quotations and signatures."), "to extract message quotations and signatures."),
long_description=open("README.rst").read(), long_description=open("README.rst").read(),

View File

@@ -193,9 +193,6 @@ RE_PARENTHESIS_LINK = re.compile("\(https?://")
SPLITTER_MAX_LINES = 6 SPLITTER_MAX_LINES = 6
MAX_LINES_COUNT = 1000 MAX_LINES_COUNT = 1000
# an extensive research shows that exceeding this limit
# leads to excessive processing time
MAX_HTML_LEN = 2794202
QUOT_PATTERN = re.compile('^>+ ?') QUOT_PATTERN = re.compile('^>+ ?')
NO_QUOT_LINE = re.compile('^[^>].*[\S].*') NO_QUOT_LINE = re.compile('^[^>].*[\S].*')
@@ -421,25 +418,31 @@ def extract_from_html(msg_body):
Returns a unicode string. Returns a unicode string.
""" """
msg_body_bytes = msg_body
if isinstance(msg_body, six.text_type): if isinstance(msg_body, six.text_type):
msg_body = msg_body.encode('utf8') msg_body_bytes = msg_body.encode('utf8')
elif not isinstance(msg_body, bytes):
msg_body = msg_body.encode('ascii')
result = _extract_from_html(msg_body) if msg_body_bytes.strip() == b'':
if isinstance(result, bytes): return msg_body
result = result.decode('utf8')
msg_body_bytes = msg_body_bytes.replace(b'\r\n', b'\n')
# Cut out xml and doctype tags to avoid conflict with unicode decoding.
msg_body_bytes = re.sub(br"\<\?xml.+\?\>|\<\!DOCTYPE.+]\>", b"", msg_body_bytes)
html_tree = html_document_fromstring(msg_body_bytes)
if html_tree is None:
return msg_body
result = extract_from_html_tree(html_tree)
if not result:
return msg_body
return result return result
def _extract_from_html(msg_body): def extract_from_html_tree(html_tree):
""" """
Extract not quoted message from provided html message body Extract not quoted message from provided parsed html tree using tags and
using tags and plain text algorithm. plain text algorithm.
Cut out first some encoding html tags such as xml and doctype
for avoiding conflict with unicode decoding
Cut out the 'blockquote', 'gmail_quote' tags. Cut out the 'blockquote', 'gmail_quote' tags.
Cut Microsoft quotations. Cut Microsoft quotations.
@@ -452,18 +455,6 @@ def _extract_from_html(msg_body):
then checking deleted checkpoints, then checking deleted checkpoints,
then deleting necessary tags. then deleting necessary tags.
""" """
if msg_body.strip() == b'':
return msg_body
msg_body = msg_body.replace(b'\r\n', b'\n')
msg_body = re.sub(br"\<\?xml.+\?\>|\<\!DOCTYPE.+]\>", "", msg_body)
html_tree = html_document_fromstring(msg_body)
if html_tree is None:
return msg_body
cut_quotations = (html_quotations.cut_gmail_quote(html_tree) or cut_quotations = (html_quotations.cut_gmail_quote(html_tree) or
html_quotations.cut_zimbra_quote(html_tree) or html_quotations.cut_zimbra_quote(html_tree) or
html_quotations.cut_blockquote(html_tree) or html_quotations.cut_blockquote(html_tree) or
@@ -481,7 +472,7 @@ def _extract_from_html(msg_body):
# Don't process too long messages # Don't process too long messages
if len(lines) > MAX_LINES_COUNT: if len(lines) > MAX_LINES_COUNT:
return msg_body return None
# Collect checkpoints on each line # Collect checkpoints on each line
line_checkpoints = [ line_checkpoints = [
@@ -500,7 +491,7 @@ def _extract_from_html(msg_body):
lines_were_deleted, first_deleted, last_deleted = return_flags lines_were_deleted, first_deleted, last_deleted = return_flags
if not lines_were_deleted and not cut_quotations: if not lines_were_deleted and not cut_quotations:
return msg_body return None
if lines_were_deleted: if lines_were_deleted:
#collect checkpoints from deleted lines #collect checkpoints from deleted lines
@@ -514,7 +505,7 @@ def _extract_from_html(msg_body):
) )
if _readable_text_empty(html_tree_copy): if _readable_text_empty(html_tree_copy):
return msg_body return None
# NOTE: We remove_namespaces() because we are using an HTML5 Parser, HTML # NOTE: We remove_namespaces() because we are using an HTML5 Parser, HTML
# parsers do not recognize namespaces in HTML tags. As such the rendered # parsers do not recognize namespaces in HTML tags. As such the rendered
@@ -540,7 +531,11 @@ def _extract_from_html(msg_body):
# of replacing data outside the <tag> which might be essential to # of replacing data outside the <tag> which might be essential to
# the customer. # the customer.
remove_namespaces(html_tree_copy) remove_namespaces(html_tree_copy)
return html.tostring(html_tree_copy) s = html.tostring(html_tree_copy)
if not s:
return None
return s.decode('utf-8')
def remove_namespaces(root): def remove_namespaces(root):

View File

@@ -180,9 +180,6 @@ def html_fromstring(s):
if isinstance(s, six.text_type): if isinstance(s, six.text_type):
s = s.encode('utf8') s = s.encode('utf8')
try: try:
if html_too_big(s):
return None
return html5parser.fromstring(s, parser=_html5lib_parser()) return html5parser.fromstring(s, parser=_html5lib_parser())
except Exception: except Exception:
pass pass
@@ -194,9 +191,6 @@ def html_document_fromstring(s):
if isinstance(s, six.text_type): if isinstance(s, six.text_type):
s = s.encode('utf8') s = s.encode('utf8')
try: try:
if html_too_big(s):
return None
return html5parser.document_fromstring(s, parser=_html5lib_parser()) return html5parser.document_fromstring(s, parser=_html5lib_parser())
except Exception: except Exception:
pass pass
@@ -206,12 +200,6 @@ def cssselect(expr, tree):
return CSSSelector(expr)(tree) return CSSSelector(expr)(tree)
def html_too_big(s):
if isinstance(s, six.text_type):
s = s.encode('utf8')
return s.count(b'<') > _MAX_TAGS_COUNT
def _contains_charset_spec(s): def _contains_charset_spec(s):
"""Return True if the first 4KB contain charset spec """Return True if the first 4KB contain charset spec
""" """
@@ -258,7 +246,3 @@ _BLOCKTAGS = ['div', 'p', 'ul', 'li', 'h1', 'h2', 'h3']
_HARDBREAKS = ['br', 'hr', 'tr'] _HARDBREAKS = ['br', 'hr', 'tr']
_RE_EXCESSIVE_NEWLINES = re.compile("\n{2,10}") _RE_EXCESSIVE_NEWLINES = re.compile("\n{2,10}")
# an extensive research shows that exceeding this limit
# might lead to excessive processing time
_MAX_TAGS_COUNT = 419

View File

@@ -391,18 +391,6 @@ def test_gmail_forwarded_msg():
eq_(RE_WHITESPACE.sub('', msg_body), RE_WHITESPACE.sub('', extracted)) eq_(RE_WHITESPACE.sub('', msg_body), RE_WHITESPACE.sub('', extracted))
@patch.object(u, '_MAX_TAGS_COUNT', 4)
def test_too_large_html():
msg_body = 'Reply' \
'<div class="gmail_quote">' \
'<div class="gmail_quote">On 11-Apr-2011, at 6:54 PM, Bob &lt;bob@example.com&gt; wrote:' \
'<div>Test</div>' \
'</div>' \
'</div>'
eq_(RE_WHITESPACE.sub('', msg_body),
RE_WHITESPACE.sub('', quotations.extract_from_html(msg_body)))
def test_readable_html_empty(): def test_readable_html_empty():
msg_body = """ msg_body = """
<blockquote> <blockquote>

View File

@@ -125,39 +125,13 @@ def test_html_fromstring_exception():
eq_(None, u.html_fromstring("<html></html>")) eq_(None, u.html_fromstring("<html></html>"))
@patch.object(u, 'html_too_big', Mock())
@patch.object(u.html5parser, 'fromstring')
def test_html_fromstring_too_big(fromstring):
eq_(None, u.html_fromstring("<html></html>"))
assert_false(fromstring.called)
@patch.object(u.html5parser, 'document_fromstring') @patch.object(u.html5parser, 'document_fromstring')
def test_html_document_fromstring_exception(document_fromstring): def test_html_document_fromstring_exception(document_fromstring):
document_fromstring.side_effect = Exception() document_fromstring.side_effect = Exception()
eq_(None, u.html_document_fromstring("<html></html>")) eq_(None, u.html_document_fromstring("<html></html>"))
@patch.object(u, 'html_too_big', Mock())
@patch.object(u.html5parser, 'document_fromstring')
def test_html_document_fromstring_too_big(document_fromstring):
eq_(None, u.html_document_fromstring("<html></html>"))
assert_false(document_fromstring.called)
@patch.object(u, 'html_fromstring', Mock(return_value=None)) @patch.object(u, 'html_fromstring', Mock(return_value=None))
def test_bad_html_to_text(): def test_bad_html_to_text():
bad_html = "one<br>two<br>three" bad_html = "one<br>two<br>three"
eq_(None, u.html_to_text(bad_html)) eq_(None, u.html_to_text(bad_html))
@patch.object(u, '_MAX_TAGS_COUNT', 3)
def test_html_too_big():
eq_(False, u.html_too_big("<div></div>"))
eq_(True, u.html_too_big("<div><span>Hi</span></div>"))
@patch.object(u, '_MAX_TAGS_COUNT', 3)
def test_html_to_text():
eq_(b"Hello", u.html_to_text("<div>Hello</div>"))
eq_(None, u.html_to_text("<div><span>Hi</span></div>"))