mirror of
https://github.com/ezyang/htmlpurifier.git
synced 2025-08-08 23:26:39 +02:00
Implement HTMLT tests, and migrate HTMLPurifierTest to this format.
HTMLT tests are a compact and easy-to-use way of making assertPurification type tests. They take the format of: --INI-- Ns.Directive = "directive value" --HTML-- Input HTML --EXPECT-- Expected HTML Expect more features and migration to be coming soon. Signed-off-by: Edward Z. Yang <edwardzyang@thewritingpot.com>
This commit is contained in:
31
tests/HTMLPurifier/HTMLT.php
Normal file
31
tests/HTMLPurifier/HTMLT.php
Normal file
@@ -0,0 +1,31 @@
|
||||
<?php
|
||||
|
||||
class HTMLPurifier_HTMLT extends HTMLPurifier_Harness
|
||||
{
|
||||
protected $path;
|
||||
|
||||
public function __construct($path) {
|
||||
$this->path = $path;
|
||||
parent::__construct($path);
|
||||
}
|
||||
|
||||
public function testHtmlt() {
|
||||
$parser = new HTMLPurifier_StringHashParser();
|
||||
$hash = $parser->parseFile($this->path); // assume parser normalizes to "\n"
|
||||
if (isset($hash['SKIPIF'])) {
|
||||
if (eval($hash['SKIPIF'])) return;
|
||||
}
|
||||
$this->config->set('Output', 'Newline', "\n");
|
||||
if (isset($hash['INI'])) {
|
||||
// there should be a more efficient way than writing another
|
||||
// ini file every time... probably means building a parser for
|
||||
// ini (check out the yaml implementation we saw somewhere else)
|
||||
$ini_file = $this->path . '.ini';
|
||||
file_put_contents($ini_file, $hash['INI']);
|
||||
$this->config->loadIni($ini_file);
|
||||
}
|
||||
$expect = isset($hash['EXPECT']) ? $hash['EXPECT'] : $hash['HTML'];
|
||||
$this->assertPurification(rtrim($hash['HTML']), rtrim($expect));
|
||||
if (isset($hash['INI'])) unlink($ini_file);
|
||||
}
|
||||
}
|
7
tests/HTMLPurifier/HTMLT/allowed-preserve.htmlt
Normal file
7
tests/HTMLPurifier/HTMLT/allowed-preserve.htmlt
Normal file
@@ -0,0 +1,7 @@
|
||||
--INI--
|
||||
HTML.AllowedElements = b,i,p,a
|
||||
HTML.AllowedAttributes = a.href,*.id
|
||||
--HTML--
|
||||
<p>Par.</p>
|
||||
<p>Para<a href="http://google.com/">gr</a>aph</p>
|
||||
Text<b>Bol<i>d</i></b>
|
7
tests/HTMLPurifier/HTMLT/allowed-remove.htmlt
Normal file
7
tests/HTMLPurifier/HTMLT/allowed-remove.htmlt
Normal file
@@ -0,0 +1,7 @@
|
||||
--INI--
|
||||
HTML.AllowedElements = b,i,p,a
|
||||
HTML.AllowedAttributes = a.href,*.id
|
||||
--HTML--
|
||||
<span>Not allowed</span><a class="mef" id="foobar">Remove id too!</a>
|
||||
--EXPECT--
|
||||
Not allowed<a>Remove id too!</a>
|
4
tests/HTMLPurifier/HTMLT/basic.htmlt
Normal file
4
tests/HTMLPurifier/HTMLT/basic.htmlt
Normal file
@@ -0,0 +1,4 @@
|
||||
--HTML--
|
||||
<b>basic</b>
|
||||
--EXPECT--
|
||||
<b>basic</b>
|
5
tests/HTMLPurifier/HTMLT/blacklist-preserve.htmlt
Normal file
5
tests/HTMLPurifier/HTMLT/blacklist-preserve.htmlt
Normal file
@@ -0,0 +1,5 @@
|
||||
--INI--
|
||||
HTML.ForbiddenElements = b
|
||||
HTML.ForbiddenAttributes = a@href
|
||||
--HTML--
|
||||
<p>foo</p>
|
7
tests/HTMLPurifier/HTMLT/blacklist-remove.htmlt
Normal file
7
tests/HTMLPurifier/HTMLT/blacklist-remove.htmlt
Normal file
@@ -0,0 +1,7 @@
|
||||
--INI--
|
||||
HTML.ForbiddenElements = b
|
||||
HTML.ForbiddenAttributes = a@href
|
||||
--HTML--
|
||||
<b>Foo<a href="bar">bar</a></b>
|
||||
--EXPECT--
|
||||
Foo<a>bar</a>
|
4
tests/HTMLPurifier/HTMLT/css-allowed-preserve.htmlt
Normal file
4
tests/HTMLPurifier/HTMLT/css-allowed-preserve.htmlt
Normal file
@@ -0,0 +1,4 @@
|
||||
--INI--
|
||||
CSS.AllowedProperties = color,background-color
|
||||
--HTML--
|
||||
<div style="color:#f00;background-color:#ded;">red</div>
|
6
tests/HTMLPurifier/HTMLT/css-allowed-remove.htmlt
Normal file
6
tests/HTMLPurifier/HTMLT/css-allowed-remove.htmlt
Normal file
@@ -0,0 +1,6 @@
|
||||
--INI--
|
||||
CSS.AllowedProperties = color,background-color
|
||||
--HTML--
|
||||
<div style="color:#f00;border:1px solid #000">red</div>
|
||||
--EXPECT--
|
||||
<div style="color:#f00;">red</div>
|
5
tests/HTMLPurifier/HTMLT/disable-uri.htmlt
Normal file
5
tests/HTMLPurifier/HTMLT/disable-uri.htmlt
Normal file
@@ -0,0 +1,5 @@
|
||||
--INI--
|
||||
URI.Disable = true
|
||||
--HTML--
|
||||
<img src="foobar" />
|
||||
--EXPECT--
|
6
tests/HTMLPurifier/HTMLT/empty.htmlt
Normal file
6
tests/HTMLPurifier/HTMLT/empty.htmlt
Normal file
@@ -0,0 +1,6 @@
|
||||
--INI--
|
||||
|
||||
--HTML--
|
||||
|
||||
--EXPECT--
|
||||
|
4
tests/HTMLPurifier/HTMLT/id-default.htmlt
Normal file
4
tests/HTMLPurifier/HTMLT/id-default.htmlt
Normal file
@@ -0,0 +1,4 @@
|
||||
--HTML--
|
||||
<span id="moon">foobar</span>
|
||||
--EXPECT--
|
||||
<span>foobar</span>
|
5
tests/HTMLPurifier/HTMLT/id-enabled.htmlt
Normal file
5
tests/HTMLPurifier/HTMLT/id-enabled.htmlt
Normal file
@@ -0,0 +1,5 @@
|
||||
--INI--
|
||||
Attr.EnableID = true
|
||||
--HTML--
|
||||
<span id="moon">foobar</span>
|
||||
<img id="folly" src="folly.png" alt="Omigosh!" />
|
10
tests/HTMLPurifier/HTMLT/munge-extra.htmlt
Normal file
10
tests/HTMLPurifier/HTMLT/munge-extra.htmlt
Normal file
@@ -0,0 +1,10 @@
|
||||
--INI--
|
||||
URI.Munge = "/redirect?s=%s&t=%t&r=%r&n=%n&m=%m&p=%p"
|
||||
URI.MungeSecretKey = "foo"
|
||||
URI.MungeResources = true
|
||||
--HTML--
|
||||
<a href="http://example.com">Link</a>
|
||||
<img src="http://example.com" style="background-image:url(http://example.com);" alt="example.com" />
|
||||
--EXPECT--
|
||||
<a href="/redirect?s=http%3A%2F%2Fexample.com&t=c15354f3953dfec262c55b1403067e0d045a3059&r=&n=a&m=href&p=">Link</a>
|
||||
<img src="/redirect?s=http%3A%2F%2Fexample.com&t=c15354f3953dfec262c55b1403067e0d045a3059&r=1&n=img&m=src&p=" style="background-image:url(/redirect?s=http%3A%2F%2Fexample.com&t=c15354f3953dfec262c55b1403067e0d045a3059&r=1&n=img&m=style&p=background-image);" alt="example.com" />
|
5
tests/HTMLPurifier/HTMLT/name.htmlt
Normal file
5
tests/HTMLPurifier/HTMLT/name.htmlt
Normal file
@@ -0,0 +1,5 @@
|
||||
--INI--
|
||||
Attr.EnableID = true
|
||||
HTML.Doctype = "XHTML 1.0 Strict"
|
||||
--HTML--
|
||||
<a name="asdf"></a>
|
9
tests/HTMLPurifier/HTMLT/safe-object-embed-munge.htmlt
Normal file
9
tests/HTMLPurifier/HTMLT/safe-object-embed-munge.htmlt
Normal file
@@ -0,0 +1,9 @@
|
||||
--INI--
|
||||
HTML.SafeObject = true
|
||||
HTML.SafeEmbed = true
|
||||
URI.Munge = "/redirect.php?url=%s&check=%t"
|
||||
URI.MungeSecretKey = "foo"
|
||||
--HTML--
|
||||
<object width="425" height="344"><param name="movie" value="http://www.youtube.com/v/Oq3FV_zdyy0&hl=en"></param><embed src="http://www.youtube.com/v/Oq3FV_zdyy0&hl=en" type="application/x-shockwave-flash" width="425" height="344"></embed></object>
|
||||
--EXPECT--
|
||||
<object width="425" height="344" data="http://www.youtube.com/v/Oq3FV_zdyy0&hl=en" type="application/x-shockwave-flash"><param name="allowScriptAccess" value="never" /><param name="allowNetworking" value="internal" /><param name="movie" value="http://www.youtube.com/v/Oq3FV_zdyy0&hl=en" /><embed src="http://www.youtube.com/v/Oq3FV_zdyy0&hl=en" type="application/x-shockwave-flash" width="425" height="344" allowscriptaccess="never" allownetworking="internal" /></object>
|
7
tests/HTMLPurifier/HTMLT/safe-object-embed.htmlt
Normal file
7
tests/HTMLPurifier/HTMLT/safe-object-embed.htmlt
Normal file
@@ -0,0 +1,7 @@
|
||||
--INI--
|
||||
HTML.SafeObject = true
|
||||
HTML.SafeEmbed = true
|
||||
--HTML--
|
||||
<object width="425" height="344"><param name="movie" value="http://www.youtube.com/v/Oq3FV_zdyy0&hl=en"></param><embed src="http://www.youtube.com/v/Oq3FV_zdyy0&hl=en" type="application/x-shockwave-flash" width="425" height="344"></embed></object>
|
||||
--EXPECT--
|
||||
<object width="425" height="344" data="http://www.youtube.com/v/Oq3FV_zdyy0&hl=en" type="application/x-shockwave-flash"><param name="allowScriptAccess" value="never" /><param name="allowNetworking" value="internal" /><param name="movie" value="http://www.youtube.com/v/Oq3FV_zdyy0&hl=en" /><embed src="http://www.youtube.com/v/Oq3FV_zdyy0&hl=en" type="application/x-shockwave-flash" width="425" height="344" allowscriptaccess="never" allownetworking="internal" /></object>
|
8
tests/HTMLPurifier/HTMLT/script-bare.htmlt
Normal file
8
tests/HTMLPurifier/HTMLT/script-bare.htmlt
Normal file
@@ -0,0 +1,8 @@
|
||||
--INI--
|
||||
HTML.Trusted = true
|
||||
--HTML--
|
||||
<script type="text/javascript">alert("<This is compatible with XHTML>");</script>
|
||||
--EXPECT--
|
||||
<script type="text/javascript"><!--//--><![CDATA[//><!--
|
||||
alert("<This is compatible with XHTML>");
|
||||
//--><!]]></script>
|
10
tests/HTMLPurifier/HTMLT/script-cdata.htmlt
Normal file
10
tests/HTMLPurifier/HTMLT/script-cdata.htmlt
Normal file
@@ -0,0 +1,10 @@
|
||||
--INI--
|
||||
HTML.Trusted = true
|
||||
--HTML--
|
||||
<script type="text/javascript"><![CDATA[
|
||||
alert("<This is compatible with XHTML>");
|
||||
]]></script>
|
||||
--EXPECT--
|
||||
<script type="text/javascript"><!--//--><![CDATA[//><!--
|
||||
alert("<This is compatible with XHTML>");
|
||||
//--><!]]></script>
|
10
tests/HTMLPurifier/HTMLT/script-comment.htmlt
Normal file
10
tests/HTMLPurifier/HTMLT/script-comment.htmlt
Normal file
@@ -0,0 +1,10 @@
|
||||
--INI--
|
||||
HTML.Trusted = true
|
||||
--HTML--
|
||||
<script type="text/javascript"><!--
|
||||
alert("<This is compatible with XHTML>");
|
||||
//--></script>
|
||||
--EXPECT--
|
||||
<script type="text/javascript"><!--//--><![CDATA[//><!--
|
||||
alert("<This is compatible with XHTML>");
|
||||
//--><!]]></script>
|
10
tests/HTMLPurifier/HTMLT/script-dbl-comment.htmlt
Normal file
10
tests/HTMLPurifier/HTMLT/script-dbl-comment.htmlt
Normal file
@@ -0,0 +1,10 @@
|
||||
--INI--
|
||||
HTML.Trusted = true
|
||||
--HTML--
|
||||
<script type="text/javascript"><![CDATA[
|
||||
alert("<This is compatible with XHTML>");
|
||||
//]]></script>
|
||||
--EXPECT--
|
||||
<script type="text/javascript"><!--//--><![CDATA[//><!--
|
||||
alert("<This is compatible with XHTML>");
|
||||
//--><!]]></script>
|
10
tests/HTMLPurifier/HTMLT/script-ideal.htmlt
Normal file
10
tests/HTMLPurifier/HTMLT/script-ideal.htmlt
Normal file
@@ -0,0 +1,10 @@
|
||||
--INI--
|
||||
HTML.Trusted = true
|
||||
--HTML--
|
||||
<script type="text/javascript"><!--//--><![CDATA[//><!--
|
||||
alert("<This is compatible with XHTML>");
|
||||
//--><!]]></script>
|
||||
--EXPECT--
|
||||
<script type="text/javascript"><!--//--><![CDATA[//><!--
|
||||
alert("<This is compatible with XHTML>");
|
||||
//--><!]]></script>
|
9
tests/HTMLPurifier/HTMLT/secure-munge.htmlt
Normal file
9
tests/HTMLPurifier/HTMLT/secure-munge.htmlt
Normal file
@@ -0,0 +1,9 @@
|
||||
--INI--
|
||||
URI.Munge = "/redirect.php?url=%s&check=%t"
|
||||
URI.MungeSecretKey = "foo"
|
||||
--HTML--
|
||||
<a href="http://localhost">foo</a>
|
||||
<img src="http://localhost" alt="local" />
|
||||
--EXPECT--
|
||||
<a href="/redirect.php?url=http%3A%2F%2Flocalhost&check=8e8223ae8fac24561104180ea549c21fbd111be7">foo</a>
|
||||
<img src="http://localhost" alt="local" />
|
7
tests/HTMLPurifier/HTMLT/shift-jis-preserve-yen.htmlt
Normal file
7
tests/HTMLPurifier/HTMLT/shift-jis-preserve-yen.htmlt
Normal file
@@ -0,0 +1,7 @@
|
||||
--SKIPIF--
|
||||
if (!function_exists('iconv')) return true;
|
||||
--INI--
|
||||
Core.Encoding = "Shift_JIS"
|
||||
Core.EscapeNonASCIICharacters = true
|
||||
--HTML--
|
||||
<b style="font-family:'¥';">111</b>
|
8
tests/HTMLPurifier/HTMLT/shift-jis-remove-yen.htmlt
Normal file
8
tests/HTMLPurifier/HTMLT/shift-jis-remove-yen.htmlt
Normal file
@@ -0,0 +1,8 @@
|
||||
--SKIPIF--
|
||||
if (!function_exists('iconv')) return true;
|
||||
--INI--
|
||||
Core.Encoding = Shift_JIS
|
||||
--HTML--
|
||||
<b style="font-family:'¥';">111</b>
|
||||
--EXPECT--
|
||||
<b style="font-family:'';">111</b>
|
6
tests/HTMLPurifier/HTMLT/strict-blockquote.htmlt
Normal file
6
tests/HTMLPurifier/HTMLT/strict-blockquote.htmlt
Normal file
@@ -0,0 +1,6 @@
|
||||
--INI--
|
||||
HTML.Strict = true
|
||||
--HTML--
|
||||
<blockquote>Illegal contents</blockquote>
|
||||
--EXPECT--
|
||||
<blockquote><p>Illegal contents</p></blockquote>
|
6
tests/HTMLPurifier/HTMLT/strict-underline.htmlt
Normal file
6
tests/HTMLPurifier/HTMLT/strict-underline.htmlt
Normal file
@@ -0,0 +1,6 @@
|
||||
--INI--
|
||||
HTML.Strict = true
|
||||
--HTML--
|
||||
<u>Illegal underline</u>
|
||||
--EXPECT--
|
||||
<span style="text-decoration:underline;">Illegal underline</span>
|
Reference in New Issue
Block a user