1
0
mirror of https://github.com/ezyang/htmlpurifier.git synced 2025-08-08 23:26:39 +02:00

Implement HTMLT tests, and migrate HTMLPurifierTest to this format.

HTMLT tests are a compact and easy-to-use way of making assertPurification
type tests. They take the format of:

--INI--
Ns.Directive = "directive value"
--HTML--
Input HTML
--EXPECT--
Expected HTML

Expect more features and migration to be coming soon.

Signed-off-by: Edward Z. Yang <edwardzyang@thewritingpot.com>
This commit is contained in:
Edward Z. Yang
2008-07-05 02:34:19 -04:00
parent 334ffac5b4
commit e05bd77344
28 changed files with 208 additions and 187 deletions

View File

@@ -0,0 +1,31 @@
<?php
class HTMLPurifier_HTMLT extends HTMLPurifier_Harness
{
protected $path;
public function __construct($path) {
$this->path = $path;
parent::__construct($path);
}
public function testHtmlt() {
$parser = new HTMLPurifier_StringHashParser();
$hash = $parser->parseFile($this->path); // assume parser normalizes to "\n"
if (isset($hash['SKIPIF'])) {
if (eval($hash['SKIPIF'])) return;
}
$this->config->set('Output', 'Newline', "\n");
if (isset($hash['INI'])) {
// there should be a more efficient way than writing another
// ini file every time... probably means building a parser for
// ini (check out the yaml implementation we saw somewhere else)
$ini_file = $this->path . '.ini';
file_put_contents($ini_file, $hash['INI']);
$this->config->loadIni($ini_file);
}
$expect = isset($hash['EXPECT']) ? $hash['EXPECT'] : $hash['HTML'];
$this->assertPurification(rtrim($hash['HTML']), rtrim($expect));
if (isset($hash['INI'])) unlink($ini_file);
}
}

View File

@@ -0,0 +1,7 @@
--INI--
HTML.AllowedElements = b,i,p,a
HTML.AllowedAttributes = a.href,*.id
--HTML--
<p>Par.</p>
<p>Para<a href="http://google.com/">gr</a>aph</p>
Text<b>Bol<i>d</i></b>

View File

@@ -0,0 +1,7 @@
--INI--
HTML.AllowedElements = b,i,p,a
HTML.AllowedAttributes = a.href,*.id
--HTML--
<span>Not allowed</span><a class="mef" id="foobar">Remove id too!</a>
--EXPECT--
Not allowed<a>Remove id too!</a>

View File

@@ -0,0 +1,4 @@
--HTML--
<b>basic</b>
--EXPECT--
<b>basic</b>

View File

@@ -0,0 +1,5 @@
--INI--
HTML.ForbiddenElements = b
HTML.ForbiddenAttributes = a@href
--HTML--
<p>foo</p>

View File

@@ -0,0 +1,7 @@
--INI--
HTML.ForbiddenElements = b
HTML.ForbiddenAttributes = a@href
--HTML--
<b>Foo<a href="bar">bar</a></b>
--EXPECT--
Foo<a>bar</a>

View File

@@ -0,0 +1,4 @@
--INI--
CSS.AllowedProperties = color,background-color
--HTML--
<div style="color:#f00;background-color:#ded;">red</div>

View File

@@ -0,0 +1,6 @@
--INI--
CSS.AllowedProperties = color,background-color
--HTML--
<div style="color:#f00;border:1px solid #000">red</div>
--EXPECT--
<div style="color:#f00;">red</div>

View File

@@ -0,0 +1,5 @@
--INI--
URI.Disable = true
--HTML--
<img src="foobar" />
--EXPECT--

View File

@@ -0,0 +1,6 @@
--INI--
--HTML--
--EXPECT--

View File

@@ -0,0 +1,4 @@
--HTML--
<span id="moon">foobar</span>
--EXPECT--
<span>foobar</span>

View File

@@ -0,0 +1,5 @@
--INI--
Attr.EnableID = true
--HTML--
<span id="moon">foobar</span>
<img id="folly" src="folly.png" alt="Omigosh!" />

View File

@@ -0,0 +1,10 @@
--INI--
URI.Munge = "/redirect?s=%s&t=%t&r=%r&n=%n&m=%m&p=%p"
URI.MungeSecretKey = "foo"
URI.MungeResources = true
--HTML--
<a href="http://example.com">Link</a>
<img src="http://example.com" style="background-image:url(http://example.com);" alt="example.com" />
--EXPECT--
<a href="/redirect?s=http%3A%2F%2Fexample.com&amp;t=c15354f3953dfec262c55b1403067e0d045a3059&amp;r=&amp;n=a&amp;m=href&amp;p=">Link</a>
<img src="/redirect?s=http%3A%2F%2Fexample.com&amp;t=c15354f3953dfec262c55b1403067e0d045a3059&amp;r=1&amp;n=img&amp;m=src&amp;p=" style="background-image:url(/redirect?s=http%3A%2F%2Fexample.com&amp;t=c15354f3953dfec262c55b1403067e0d045a3059&amp;r=1&amp;n=img&amp;m=style&amp;p=background-image);" alt="example.com" />

View File

@@ -0,0 +1,5 @@
--INI--
Attr.EnableID = true
HTML.Doctype = "XHTML 1.0 Strict"
--HTML--
<a name="asdf"></a>

View File

@@ -0,0 +1,9 @@
--INI--
HTML.SafeObject = true
HTML.SafeEmbed = true
URI.Munge = "/redirect.php?url=%s&check=%t"
URI.MungeSecretKey = "foo"
--HTML--
<object width="425" height="344"><param name="movie" value="http://www.youtube.com/v/Oq3FV_zdyy0&hl=en"></param><embed src="http://www.youtube.com/v/Oq3FV_zdyy0&hl=en" type="application/x-shockwave-flash" width="425" height="344"></embed></object>
--EXPECT--
<object width="425" height="344" data="http://www.youtube.com/v/Oq3FV_zdyy0&amp;hl=en" type="application/x-shockwave-flash"><param name="allowScriptAccess" value="never" /><param name="allowNetworking" value="internal" /><param name="movie" value="http://www.youtube.com/v/Oq3FV_zdyy0&amp;hl=en" /><embed src="http://www.youtube.com/v/Oq3FV_zdyy0&amp;hl=en" type="application/x-shockwave-flash" width="425" height="344" allowscriptaccess="never" allownetworking="internal" /></object>

View File

@@ -0,0 +1,7 @@
--INI--
HTML.SafeObject = true
HTML.SafeEmbed = true
--HTML--
<object width="425" height="344"><param name="movie" value="http://www.youtube.com/v/Oq3FV_zdyy0&hl=en"></param><embed src="http://www.youtube.com/v/Oq3FV_zdyy0&hl=en" type="application/x-shockwave-flash" width="425" height="344"></embed></object>
--EXPECT--
<object width="425" height="344" data="http://www.youtube.com/v/Oq3FV_zdyy0&amp;hl=en" type="application/x-shockwave-flash"><param name="allowScriptAccess" value="never" /><param name="allowNetworking" value="internal" /><param name="movie" value="http://www.youtube.com/v/Oq3FV_zdyy0&amp;hl=en" /><embed src="http://www.youtube.com/v/Oq3FV_zdyy0&amp;hl=en" type="application/x-shockwave-flash" width="425" height="344" allowscriptaccess="never" allownetworking="internal" /></object>

View File

@@ -0,0 +1,8 @@
--INI--
HTML.Trusted = true
--HTML--
<script type="text/javascript">alert("<This is compatible with XHTML>");</script>
--EXPECT--
<script type="text/javascript"><!--//--><![CDATA[//><!--
alert("<This is compatible with XHTML>");
//--><!]]></script>

View File

@@ -0,0 +1,10 @@
--INI--
HTML.Trusted = true
--HTML--
<script type="text/javascript"><![CDATA[
alert("<This is compatible with XHTML>");
]]></script>
--EXPECT--
<script type="text/javascript"><!--//--><![CDATA[//><!--
alert("<This is compatible with XHTML>");
//--><!]]></script>

View File

@@ -0,0 +1,10 @@
--INI--
HTML.Trusted = true
--HTML--
<script type="text/javascript"><!--
alert("<This is compatible with XHTML>");
//--></script>
--EXPECT--
<script type="text/javascript"><!--//--><![CDATA[//><!--
alert("<This is compatible with XHTML>");
//--><!]]></script>

View File

@@ -0,0 +1,10 @@
--INI--
HTML.Trusted = true
--HTML--
<script type="text/javascript"><![CDATA[
alert("<This is compatible with XHTML>");
//]]></script>
--EXPECT--
<script type="text/javascript"><!--//--><![CDATA[//><!--
alert("<This is compatible with XHTML>");
//--><!]]></script>

View File

@@ -0,0 +1,10 @@
--INI--
HTML.Trusted = true
--HTML--
<script type="text/javascript"><!--//--><![CDATA[//><!--
alert("<This is compatible with XHTML>");
//--><!]]></script>
--EXPECT--
<script type="text/javascript"><!--//--><![CDATA[//><!--
alert("<This is compatible with XHTML>");
//--><!]]></script>

View File

@@ -0,0 +1,9 @@
--INI--
URI.Munge = "/redirect.php?url=%s&check=%t"
URI.MungeSecretKey = "foo"
--HTML--
<a href="http://localhost">foo</a>
<img src="http://localhost" alt="local" />
--EXPECT--
<a href="/redirect.php?url=http%3A%2F%2Flocalhost&amp;check=8e8223ae8fac24561104180ea549c21fbd111be7">foo</a>
<img src="http://localhost" alt="local" />

View File

@@ -0,0 +1,7 @@
--SKIPIF--
if (!function_exists('iconv')) return true;
--INI--
Core.Encoding = "Shift_JIS"
Core.EscapeNonASCIICharacters = true
--HTML--
<b style="font-family:'&#165;';">111</b>

View File

@@ -0,0 +1,8 @@
--SKIPIF--
if (!function_exists('iconv')) return true;
--INI--
Core.Encoding = Shift_JIS
--HTML--
<b style="font-family:'&#165;';">111</b>
--EXPECT--
<b style="font-family:'';">111</b>

View File

@@ -0,0 +1,6 @@
--INI--
HTML.Strict = true
--HTML--
<blockquote>Illegal contents</blockquote>
--EXPECT--
<blockquote><p>Illegal contents</p></blockquote>

View File

@@ -0,0 +1,6 @@
--INI--
HTML.Strict = true
--HTML--
<u>Illegal underline</u>
--EXPECT--
<span style="text-decoration:underline;">Illegal underline</span>