mirror of
https://github.com/ezyang/htmlpurifier.git
synced 2025-07-31 03:10:09 +02:00
- Fixed lots of bugs
- Defined new directive %Core.EscapeInvalidChildren, for previously commented out functionality - Removed convenience configuration generation: you *have* to pass it unless you're interfacing with HTMLPurifier - Homogenized function parameters even when only a few of them are used - Rewrote unit tests that expected previous behavior - Introduced configuration object to ChildDef tests git-svn-id: http://htmlpurifier.org/svnroot/htmlpurifier/trunk@243 48356398-32a2-884e-a903-53898d9a118a
This commit is contained in:
@@ -7,6 +7,7 @@ require_once 'HTMLPurifier/Generator.php';
|
||||
class HTMLPurifier_ChildDefTest extends UnitTestCase
|
||||
{
|
||||
|
||||
var $def;
|
||||
var $lex;
|
||||
var $gen;
|
||||
|
||||
@@ -16,21 +17,24 @@ class HTMLPurifier_ChildDefTest extends UnitTestCase
|
||||
parent::UnitTestCase();
|
||||
}
|
||||
|
||||
function assertSeries($inputs, $expect, $def, $context = array()) {
|
||||
function assertSeries($inputs, $expect, $config, $context = array()) {
|
||||
foreach ($inputs as $i => $input) {
|
||||
$tokens = $this->lex->tokenizeHTML($input);
|
||||
|
||||
if (isset($context[$i])) {
|
||||
$result = $def->validateChildren($tokens, $context[$i]);
|
||||
} else {
|
||||
$result = $def->validateChildren($tokens);
|
||||
if (!isset($context[$i])) {
|
||||
$context[$i] = null;
|
||||
}
|
||||
if (!isset($config[$i])) {
|
||||
$config[$i] = HTMLPurifier_Config::createDefault();
|
||||
}
|
||||
|
||||
$result = $this->def->validateChildren($tokens, $config[$i], $context[$i]);
|
||||
|
||||
if (is_bool($expect[$i])) {
|
||||
$this->assertIdentical($expect[$i], $result);
|
||||
$this->assertIdentical($expect[$i], $result, "Test $i: %s");
|
||||
} else {
|
||||
$result_html = $this->gen->generateFromTokens($result);
|
||||
$this->assertEqual($expect[$i], $result_html, "Test $i: %s");
|
||||
$this->assertIdentical($expect[$i], $result_html, "Test $i: %s");
|
||||
paintIf($result_html, $result_html != $expect[$i]);
|
||||
}
|
||||
}
|
||||
@@ -39,9 +43,11 @@ class HTMLPurifier_ChildDefTest extends UnitTestCase
|
||||
function test_custom() {
|
||||
|
||||
// the table definition
|
||||
$def = new HTMLPurifier_ChildDef_Custom(
|
||||
$this->def = new HTMLPurifier_ChildDef_Custom(
|
||||
'(caption?, (col*|colgroup*), thead?, tfoot?, (tbody+|tr+))');
|
||||
|
||||
$inputs = $expect = $config = array();
|
||||
|
||||
$inputs[0] = '';
|
||||
$expect[0] = false;
|
||||
|
||||
@@ -58,7 +64,7 @@ class HTMLPurifier_ChildDefTest extends UnitTestCase
|
||||
$inputs[3] = '<col></col><col></col><col></col><tr></tr>';
|
||||
$expect[3] = true;
|
||||
|
||||
$this->assertSeries($inputs, $expect, $def);
|
||||
$this->assertSeries($inputs, $expect, $config);
|
||||
|
||||
}
|
||||
|
||||
@@ -82,7 +88,8 @@ class HTMLPurifier_ChildDefTest extends UnitTestCase
|
||||
|
||||
function test_required_pcdata_forbidden() {
|
||||
|
||||
$def = new HTMLPurifier_ChildDef_Required('dt | dd');
|
||||
$this->def = new HTMLPurifier_ChildDef_Required('dt | dd');
|
||||
$inputs = $expect = $config = array();
|
||||
|
||||
$inputs[0] = '';
|
||||
$expect[0] = false;
|
||||
@@ -105,21 +112,31 @@ class HTMLPurifier_ChildDefTest extends UnitTestCase
|
||||
$inputs[5] = "\t ";
|
||||
$expect[5] = false;
|
||||
|
||||
$this->assertSeries($inputs, $expect, $def);
|
||||
$this->assertSeries($inputs, $expect, $config);
|
||||
|
||||
}
|
||||
|
||||
function test_required_pcdata_allowed() {
|
||||
$def = new HTMLPurifier_ChildDef_Required('#PCDATA | b');
|
||||
$this->def = new HTMLPurifier_ChildDef_Required('#PCDATA | b');
|
||||
|
||||
$inputs = $expect = $config = array();
|
||||
|
||||
$inputs[0] = '<b>Bold text</b><img />';
|
||||
$expect[0] = '<b>Bold text</b><img />';
|
||||
$expect[0] = '<b>Bold text</b>';
|
||||
|
||||
$this->assertSeries($inputs, $expect, $def);
|
||||
// with child escaping on
|
||||
$inputs[1] = '<b>Bold text</b><img />';
|
||||
$expect[1] = '<b>Bold text</b><img />';
|
||||
$config[1] = HTMLPurifier_Config::createDefault();
|
||||
$config[1]->set('Core', 'EscapeInvalidChildren', true);
|
||||
|
||||
$this->assertSeries($inputs, $expect, $config);
|
||||
}
|
||||
|
||||
function test_optional() {
|
||||
$def = new HTMLPurifier_ChildDef_Optional('b | i');
|
||||
$this->def = new HTMLPurifier_ChildDef_Optional('b | i');
|
||||
|
||||
$inputs = $expect = $config = array();
|
||||
|
||||
$inputs[0] = '<b>Bold text</b><img />';
|
||||
$expect[0] = '<b>Bold text</b>';
|
||||
@@ -127,16 +144,19 @@ class HTMLPurifier_ChildDefTest extends UnitTestCase
|
||||
$inputs[1] = 'Not allowed text';
|
||||
$expect[1] = '';
|
||||
|
||||
$this->assertSeries($inputs, $expect, $def);
|
||||
$this->assertSeries($inputs, $expect, $config);
|
||||
}
|
||||
|
||||
function test_chameleon() {
|
||||
|
||||
$def = new HTMLPurifier_ChildDef_Chameleon(
|
||||
$this->def = new HTMLPurifier_ChildDef_Chameleon(
|
||||
'b | i', // allowed only when in inline context
|
||||
'b | i | div' // allowed only when in block context
|
||||
);
|
||||
|
||||
$inputs = $expect = $config = array();
|
||||
$context = array();
|
||||
|
||||
$inputs[0] = '<b>Allowed.</b>';
|
||||
$expect[0] = true;
|
||||
$context[0] = 'inline';
|
||||
@@ -149,7 +169,7 @@ class HTMLPurifier_ChildDefTest extends UnitTestCase
|
||||
$expect[2] = true;
|
||||
$context[2] = 'block';
|
||||
|
||||
$this->assertSeries($inputs, $expect, $def, $context);
|
||||
$this->assertSeries($inputs, $expect, $config, $context);
|
||||
|
||||
}
|
||||
|
||||
|
@@ -12,6 +12,10 @@ class HTMLPurifier_Strategy_CoreTest
|
||||
|
||||
$inputs = array();
|
||||
$expect = array();
|
||||
$config = array();
|
||||
|
||||
$config_escape = HTMLPurifier_Config::createDefault();
|
||||
$config_escape->set('Core', 'EscapeInvalidChildren', true);
|
||||
|
||||
$inputs[0] = '';
|
||||
$expect[0] = '';
|
||||
@@ -19,19 +23,17 @@ class HTMLPurifier_Strategy_CoreTest
|
||||
$inputs[1] = '<b>Make well formed.';
|
||||
$expect[1] = '<b>Make well formed.</b>';
|
||||
|
||||
// behavior may change
|
||||
$inputs[2] = '<b><div>Fix nesting.</div></b>';
|
||||
$expect[2] = '<b><div>Fix nesting.</div></b>';
|
||||
$expect[2] = '<b></b>';
|
||||
|
||||
// behavior may change
|
||||
$inputs[3] = '<asdf>Foreign element removal.</asdf>';
|
||||
$expect[3] = '<asdf>Foreign element removal.</asdf>';
|
||||
|
||||
// behavior may change
|
||||
$inputs[4] = '<foo><b><div>All three.</div></b>';
|
||||
$expect[4] = '<foo><b><div>All three.</div></b>';
|
||||
$expect[4] = '<foo><b></b>';
|
||||
|
||||
$this->assertStrategyWorks($strategy, $inputs, $expect);
|
||||
$this->assertStrategyWorks($strategy, $inputs, $expect, $config);
|
||||
}
|
||||
|
||||
}
|
||||
|
@@ -13,6 +13,10 @@ class HTMLPurifier_Strategy_FixNestingTest
|
||||
|
||||
$inputs = array();
|
||||
$expect = array();
|
||||
$config = array();
|
||||
|
||||
$config_escape = HTMLPurifier_Config::createDefault();
|
||||
$config_escape->set('Core', 'EscapeInvalidChildren', true);
|
||||
|
||||
// next id = 4
|
||||
|
||||
@@ -27,7 +31,12 @@ class HTMLPurifier_Strategy_FixNestingTest
|
||||
|
||||
// illegal block in inline, element -> text
|
||||
$inputs[2] = '<b><div>Illegal div.</div></b>';
|
||||
$expect[2] = '<b><div>Illegal div.</div></b>';
|
||||
$expect[2] = '<b></b>';
|
||||
|
||||
// same test with different configuration (fragile)
|
||||
$inputs[13] = '<b><div>Illegal div.</div></b>';
|
||||
$expect[13] = '<b><div>Illegal div.</div></b>';
|
||||
$config[13] = $config_escape;
|
||||
|
||||
// test of empty set that's required, resulting in removal of node
|
||||
$inputs[3] = '<ul></ul>';
|
||||
@@ -63,13 +72,20 @@ class HTMLPurifier_Strategy_FixNestingTest
|
||||
|
||||
// block in inline ins not allowed
|
||||
$inputs[11] = '<span><ins><div>Not allowed!</div></ins></span>';
|
||||
$expect[11] = '<span><ins><div>Not allowed!</div></ins></span>';
|
||||
$expect[11] = '<span><ins></ins></span>';
|
||||
|
||||
// block in inline ins not allowed
|
||||
$inputs[14] = '<span><ins><div>Not allowed!</div></ins></span>';
|
||||
$expect[14] = '<span><ins><div>Not allowed!</div></ins></span>';
|
||||
$config[14] = $config_escape;
|
||||
|
||||
// test exclusions
|
||||
$inputs[12] = '<a><span><a>Not allowed</a></span></a>';
|
||||
$expect[12] = '<a><span></span></a>';
|
||||
|
||||
$this->assertStrategyWorks($strategy, $inputs, $expect);
|
||||
// next test is *15*
|
||||
|
||||
$this->assertStrategyWorks($strategy, $inputs, $expect, $config);
|
||||
}
|
||||
|
||||
}
|
||||
|
@@ -28,11 +28,10 @@ class HTMLPurifier_StrategyHarness extends UnitTestCase
|
||||
function assertStrategyWorks($strategy, $inputs, $expect, $config = array()) {
|
||||
foreach ($inputs as $i => $input) {
|
||||
$tokens = $this->lex->tokenizeHTML($input);
|
||||
if (isset($config[$i])) {
|
||||
$result_tokens = $strategy->execute($tokens, $config[$i]);
|
||||
} else {
|
||||
$result_tokens = $strategy->execute($tokens);
|
||||
if (!isset($config[$i])) {
|
||||
$config[$i] = HTMLPurifier_Config::createDefault();
|
||||
}
|
||||
$result_tokens = $strategy->execute($tokens, $config[$i]);
|
||||
$result = $this->gen->generateFromTokens($result_tokens);
|
||||
$this->assertEqual($expect[$i], $result, "Test $i: %s");
|
||||
paintIf($result, $result != $expect[$i]);
|
||||
|
Reference in New Issue
Block a user