diff --git a/core/lib/Drupal/Component/Utility/SafeMarkup.php b/core/lib/Drupal/Component/Utility/SafeMarkup.php index 4d492661535d7ffce841b8699a90632b238411c8..af9170d78ef7331242683c05d9be3de68fa9954a 100644 --- a/core/lib/Drupal/Component/Utility/SafeMarkup.php +++ b/core/lib/Drupal/Component/Utility/SafeMarkup.php @@ -138,30 +138,6 @@ public static function escape($string) { return static::isSafe($string) ? $string : static::checkPlain($string); } - /** - * Applies a very permissive XSS/HTML filter for admin-only use. - * - * Note: This method only filters if $string is not marked safe already. - * - * @deprecated as of Drupal 8.0.x, will be removed before Drupal 8.0.0. If the - * string used as part of a @link theme_render render array @endlink use - * #markup to allow the render system to filter automatically. If the result - * is not being used directly in the rendering system (for example, when its - * result is being combined with other strings before rendering), use - * Xss::filterAdmin(). Otherwise, use SafeMarkup::xssFilter() and the tag - * list provided by Xss::getAdminTagList() instead. In the rare instance - * that the caller does not want to filter strings that are marked safe - * already, it needs to check SafeMarkup::isSafe() itself. - * - * @see \Drupal\Component\Utility\SafeMarkup::xssFilter() - * @see \Drupal\Component\Utility\SafeMarkup::isSafe() - * @see \Drupal\Component\Utility\Xss::filterAdmin() - * @see \Drupal\Component\Utility\Xss::getAdminTagList() - */ - public static function checkAdminXss($string) { - return static::isSafe($string) ? $string : static::xssFilter($string, Xss::getAdminTagList()); - } - /** * Filters HTML for XSS vulnerabilities and marks the result as safe. *