Gracefully email obfuscation for Plone
GEO stands for “Gracefully E-mail Obfuscation”. This package implements the solution exposed in this post of List Apart web site authored by Roel Van Gils:
collective.geotransform uses plone.transformchain to transform the response output from Zope before it reaches your browser. It searches for all “mailto:” occurences inside the response and transform them into encoded harmless links. It also searches for plain email addresses (without links) inside the response and transform them into encrypted spans. This codification is done via a simple base64 encoding, but enough to fool a spam robot.
This is the form of the encoded mailto link:
<a rel=”nofollow” href=”geomailto:dmljdG9yLmZlcm5hbmRlejJAdXBjbmV0LmVz”>Link text</a>
While this is the form of the encoded span for plain email address:
Authenticated responses are NOT affected by this transform. Only anonymous responses are modified.
Tested only in Plone 4 although is possible that it would run in Plone 3.
- Accessibility form and validators
- Do not obfuscate mails inside textarea or value=”” attribute (#15) [laulaz]
- Add metadata.xml into profile. [bsuttor]
- Decode utf8 if accent in mail [bsuttor]
- Add upgradestep for import new metadata.xml [bsuttor]
- Obfuscate plain text mails (#8) [laulaz]
- Avoid touching mailto tags content (#4) [laulaz]
- Avoid trying to transform non-HTML requests [laulaz]
- Handle links with subject and / or body (#1) [laulaz]
- Fix check for anonymous (#2) and for portal url (#3) [laulaz]
- Fix getSite location [laulaz]
- Add tests [laulaz]
- Add buildout and bootstrap [laulaz]
- Fix check for anonymous [pbauer]
- Fixed broken uploaded file to pypi
- Initial release