From 78195fc53c14e81937a0e11b77b8af21f4869989 Mon Sep 17 00:00:00 2001
From: Daniel Firth <dan.firth@homotopic.tech>
Date: Fri, 30 Dec 2022 22:56:22 +0000
Subject: [PATCH] xss-sanitize: init at 0.3.7.1

---
 horizon.dhall         |  1 +
 initial-packages.nix  |  2 ++
 pkgs/xss-sanitize.nix | 54 +++++++++++++++++++++++++++++++++++++++++++
 3 files changed, 57 insertions(+)
 create mode 100644 pkgs/xss-sanitize.nix

diff --git a/horizon.dhall b/horizon.dhall
index 74f6275e..5a9d565b 100644
--- a/horizon.dhall
+++ b/horizon.dhall
@@ -971,6 +971,7 @@ let packages =
       , xml = H.callHackage "xml" "1.3.14"
       , xmonad-contrib = H.callHackage "xmonad-contrib" "0.17.1"
       , xmonad = H.callHackage "xmonad" "0.17.1"
+      , xss-sanitize = H.callHackage "xss-sanitize" "0.3.7.1"
       , yaml = H.callHackage "yaml" "0.11.8.0"
       , zip-archive = H.callHackage "zip-archive" "0.4.2.2"
       , zlib = H.callHackage "zlib" "0.6.3.0"
diff --git a/initial-packages.nix b/initial-packages.nix
index bc09724c..20894b1e 100644
--- a/initial-packages.nix
+++ b/initial-packages.nix
@@ -1589,6 +1589,8 @@ self: with pkgs.haskell.lib; {
 
   xmonad-contrib = self.callPackage (./pkgs/xmonad-contrib.nix) { };
 
+  xss-sanitize = self.callPackage (./pkgs/xss-sanitize.nix) { };
+
   yaml = self.callPackage (./pkgs/yaml.nix) { };
 
   zip-archive = self.callPackage (./pkgs/zip-archive.nix) { };
diff --git a/pkgs/xss-sanitize.nix b/pkgs/xss-sanitize.nix
new file mode 100644
index 00000000..dd798fa8
--- /dev/null
+++ b/pkgs/xss-sanitize.nix
@@ -0,0 +1,54 @@
+{ mkDerivation
+, HUnit
+, attoparsec
+, base
+, containers
+, css-text
+, hspec
+, lib
+, network-uri
+, tagsoup
+, text
+, utf8-string
+}:
+mkDerivation {
+  pname = "xss-sanitize";
+  version = "0.3.7.1";
+  sha256 = "303c15935f0e54dd0ef1b3665d307e4e74e2a3e9f8d4612a2133ac8a04f4b5d2";
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
+  libraryHaskellDepends = [
+    attoparsec
+    base
+    containers
+    css-text
+    network-uri
+    tagsoup
+    text
+    utf8-string
+  ];
+  testHaskellDepends = [
+    attoparsec
+    base
+    containers
+    css-text
+    hspec
+    HUnit
+    network-uri
+    tagsoup
+    text
+    utf8-string
+  ];
+  enableLibraryProfiling = true;
+  enableExecutableProfiling = true;
+  doHaddock = false;
+  jailbreak = true;
+  doCheck = false;
+  doBenchmark = false;
+  hyperlinkSource = false;
+  homepage = "https://github.com/yesodweb/haskell-xss-sanitize#readme";
+  description = "sanitize untrusted HTML to prevent XSS attacks";
+  license = lib.licenses.bsd2;
+  broken = false;
+}
-- 
GitLab