Better Markdown Parser in PHP https://parsedown.org
Go to file
Aidan Woods e7fbbf537b
Add repo specific paths to .gitignore
2018-03-26 18:45:34 +01:00
test Merge pull request #578 from aidantwoods/fix/setext-heading-spaces 2018-03-25 23:08:31 +01:00
.gitattributes Create .gitattributes 2016-06-24 14:18:01 +02:00
.gitignore Add repo specific paths to .gitignore 2018-03-26 18:45:34 +01:00
.travis.yml Travis: Issue build error when Parsedown::version isn't up-to-date 2018-02-28 20:04:45 +01:00
LICENSE.txt Update LICENSE.txt 2018-01-01 14:09:31 +01:00
Parsedown.php Merge pull request #578 from aidantwoods/fix/setext-heading-spaces 2018-03-25 23:08:31 +01:00
README.md Added inline example to README 2018-03-20 16:56:40 +01:00
composer.json Add mbstring dependency to composer.json 2018-02-28 20:42:25 +01:00
phpunit.xml.dist Use PHPUnit\Framework\TestCase instead of PHPUnit_Framework_TestCase 2017-11-11 00:56:03 -02:00

README.md

I also make Caret - a Markdown editor for Mac and PC.

Parsedown

Build Status

Better Markdown Parser in PHP

Demo | Benchmarks | Tests | Documentation

Features

Installation

Include Parsedown.php or install the composer package.

Example

$Parsedown = new Parsedown();

echo $Parsedown->text('Hello _Parsedown_!'); # prints: <p>Hello <em>Parsedown</em>!</p>
// you can also parse inline markdown only
echo $Parsedown->line('Hello _Parsedown_!'); # prints: Hello <em>Parsedown</em>!

More examples in the wiki and in this video tutorial.

Security

Parsedown is capable of escaping user-input within the HTML that it generates. Additionally Parsedown will apply sanitisation to additional scripting vectors (such as scripting link destinations) that are introduced by the markdown syntax itself.

To tell Parsedown that it is processing untrusted user-input, use the following:

$parsedown = new Parsedown;
$parsedown->setSafeMode(true);

If instead, you wish to allow HTML within untrusted user-input, but still want output to be free from XSS it is recommended that you make use of a HTML sanitiser that allows HTML tags to be whitelisted, like HTML Purifier.

In both cases you should strongly consider employing defence-in-depth measures, like deploying a Content-Security-Policy (a browser security feature) so that your page is likely to be safe even if an attacker finds a vulnerability in one of the first lines of defence above.

Security of Parsedown Extensions

Safe mode does not necessarily yield safe results when using extensions to Parsedown. Extensions should be evaluated on their own to determine their specific safety against XSS.

Escaping HTML

⚠️  WARNING: This method isn't safe from XSS!

If you wish to escape HTML in trusted input, you can use the following:

$parsedown = new Parsedown;
$parsedown->setMarkupEscaped(true);

Beware that this still allows users to insert unsafe scripting vectors, such as links like [xss](javascript:alert%281%29).

Questions

How does Parsedown work?

It tries to read Markdown like a human. First, it looks at the lines. Its interested in how the lines start. This helps it recognise blocks. It knows, for example, that if a line starts with a - then perhaps it belongs to a list. Once it recognises the blocks, it continues to the content. As it reads, it watches out for special characters. This helps it recognise inline elements (or inlines).

We call this approach "line based". We believe that Parsedown is the first Markdown parser to use it. Since the release of Parsedown, other developers have used the same approach to develop other Markdown parsers in PHP and in other languages.

Is it compliant with CommonMark?

It passes most of the CommonMark tests. Most of the tests that don't pass deal with cases that are quite uncommon. Still, as CommonMark matures, compliance should improve.

Who uses it?

Laravel Framework, Bolt CMS, Grav CMS, Herbie CMS, Kirby CMS, October CMS, Pico CMS, Statamic CMS, phpDocumentor, RaspberryPi.org, Symfony demo and more.

How can I help?

Use it, star it, share it and if you feel generous, donate.