mirror of
https://github.com/ezyang/htmlpurifier.git
synced 2024-12-22 08:21:52 +00:00
fd384129bf
Prior to this commit, the name attribute was unilaterally removed, except for Strict doctypes or a heavy TidyLevel, when it was converted to an id attribute. As name is actually permitted in both HTML 4.01 Strict and XHTML 1.0 Strict, although deprecated, the more sensible default behavior is to allow it unless TidyLevel is heavy. Our implementation is slightly stricter than the specs, as name attributes are treated as first class IDs, disallowing <a name="foo" id="foo"> or duplicate names. The former should be treated as a special case, but that will be a separate commit. Signed-off-by: Edward Z. Yang <edwardzyang@thewritingpot.com>
237 lines
9.3 KiB
PHP
237 lines
9.3 KiB
PHP
<?php
|
|
|
|
class HTMLPurifierTest extends HTMLPurifier_Harness
|
|
{
|
|
protected $purifier;
|
|
|
|
function testNull() {
|
|
$this->assertPurification("Null byte\0", "Null byte");
|
|
}
|
|
|
|
function testStrict() {
|
|
$this->config->set('HTML', 'Strict', true);
|
|
|
|
$this->assertPurification(
|
|
'<u>Illegal underline</u>',
|
|
'<span style="text-decoration:underline;">Illegal underline</span>'
|
|
);
|
|
|
|
$this->assertPurification(
|
|
'<blockquote>Illegal contents</blockquote>',
|
|
'<blockquote><p>Illegal contents</p></blockquote>'
|
|
);
|
|
|
|
}
|
|
|
|
function testDifferentAllowedElements() {
|
|
|
|
$this->config->set('HTML', 'AllowedElements', array('b', 'i', 'p', 'a'));
|
|
$this->config->set('HTML', 'AllowedAttributes', array('a.href', '*.id'));
|
|
|
|
$this->assertPurification(
|
|
'<p>Par.</p><p>Para<a href="http://google.com/">gr</a>aph</p>Text<b>Bol<i>d</i></b>'
|
|
);
|
|
|
|
$this->assertPurification(
|
|
'<span>Not allowed</span><a class="mef" id="foobar">Foobar</a>',
|
|
'Not allowed<a>Foobar</a>' // no ID!!!
|
|
);
|
|
|
|
}
|
|
|
|
function testBlacklistElements() {
|
|
$this->config->set('HTML', 'ForbiddenElements', array('b'));
|
|
$this->config->set('HTML', 'ForbiddenAttributes', array('a@href'));
|
|
|
|
$this->assertPurification(
|
|
'<p>Par.</p>'
|
|
);
|
|
$this->assertPurification(
|
|
'<b>Pa<a href="foo">r</a>.</b>',
|
|
'Pa<a>r</a>.'
|
|
);
|
|
|
|
}
|
|
|
|
function testDifferentAllowedCSSProperties() {
|
|
|
|
$this->config->set('CSS', 'AllowedProperties', array('color', 'background-color'));
|
|
|
|
$this->assertPurification(
|
|
'<div style="color:#f00;background-color:#ded;">red</div>'
|
|
);
|
|
|
|
$this->assertPurification(
|
|
'<div style="color:#f00;border:1px solid #000">red</div>',
|
|
'<div style="color:#f00;">red</div>'
|
|
);
|
|
|
|
}
|
|
|
|
function testDisableURI() {
|
|
|
|
$this->config->set('URI', 'Disable', true);
|
|
|
|
$this->assertPurification(
|
|
'<img src="foobar"/>',
|
|
''
|
|
);
|
|
|
|
}
|
|
|
|
function test_purifyArray() {
|
|
|
|
$this->assertIdentical(
|
|
$this->purifier->purifyArray(
|
|
array('Good', '<b>Sketchy', 'foo' => '<script>bad</script>')
|
|
),
|
|
array('Good', '<b>Sketchy</b>', 'foo' => '')
|
|
);
|
|
|
|
$this->assertIsA($this->purifier->context, 'array');
|
|
|
|
}
|
|
|
|
function testAttrIDDisabledByDefault() {
|
|
|
|
$this->assertPurification(
|
|
'<span id="moon">foobar</span>',
|
|
'<span>foobar</span>'
|
|
);
|
|
|
|
}
|
|
|
|
function testEnableAttrID() {
|
|
$this->config->set('Attr', 'EnableID', true);
|
|
$this->assertPurification('<span id="moon">foobar</span>');
|
|
$this->assertPurification('<img id="folly" src="folly.png" alt="Omigosh!" />');
|
|
}
|
|
|
|
function testScript() {
|
|
$this->config->set('HTML', 'Trusted', true);
|
|
|
|
$ideal = '<script type="text/javascript"><!--//--><![CDATA[//><!--
|
|
alert("<This is compatible with XHTML>");
|
|
//--><!]]></script>';
|
|
|
|
$this->assertPurification($ideal);
|
|
|
|
$this->assertPurification(
|
|
'<script type="text/javascript"><![CDATA[
|
|
alert("<This is compatible with XHTML>");
|
|
]]></script>',
|
|
$ideal
|
|
);
|
|
|
|
$this->assertPurification(
|
|
'<script type="text/javascript">alert("<This is compatible with XHTML>");</script>',
|
|
$ideal
|
|
);
|
|
|
|
$this->assertPurification(
|
|
'<script type="text/javascript"><!--
|
|
alert("<This is compatible with XHTML>");
|
|
//--></script>',
|
|
$ideal
|
|
);
|
|
|
|
$this->assertPurification(
|
|
'<script type="text/javascript"><![CDATA[
|
|
alert("<This is compatible with XHTML>");
|
|
//]]></script>',
|
|
$ideal
|
|
);
|
|
}
|
|
|
|
function testGetInstance() {
|
|
$purifier = HTMLPurifier::getInstance();
|
|
$purifier2 = HTMLPurifier::getInstance();
|
|
$this->assertReference($purifier, $purifier2);
|
|
}
|
|
|
|
function testMakeAbsolute() {
|
|
$this->config->set('URI', 'Base', 'http://example.com/bar/baz.php');
|
|
$this->config->set('URI', 'MakeAbsolute', true);
|
|
$this->assertPurification(
|
|
'<a href="foo.txt">Foobar</a>',
|
|
'<a href="http://example.com/bar/foo.txt">Foobar</a>'
|
|
);
|
|
}
|
|
|
|
function test_addFilter_deprecated() {
|
|
$this->expectError('HTMLPurifier->addFilter() is deprecated, use configuration directives in the Filter namespace or Filter.Custom');
|
|
generate_mock_once('HTMLPurifier_Filter');
|
|
$this->purifier->addFilter($mock = new HTMLPurifier_FilterMock());
|
|
$mock->expectOnce('preFilter');
|
|
$mock->expectOnce('postFilter');
|
|
$this->purifier->purify('foo');
|
|
}
|
|
|
|
function test_shiftJis() {
|
|
if (!function_exists('iconv')) return;
|
|
$this->config->set('Core', 'Encoding', 'Shift_JIS');
|
|
$this->config->set('Core', 'EscapeNonASCIICharacters', true);
|
|
$this->assertPurification(
|
|
"<b style=\"font-family:'¥';\">111</b>"
|
|
);
|
|
}
|
|
|
|
function test_shiftJisWorstCase() {
|
|
if (!function_exists('iconv')) return;
|
|
$this->config->set('Core', 'Encoding', 'Shift_JIS');
|
|
$this->assertPurification( // Notice how Yen disappears
|
|
"<b style=\"font-family:'¥';\">111</b>",
|
|
"<b style=\"font-family:'';\">111</b>"
|
|
);
|
|
}
|
|
|
|
function test_secureMunge() {
|
|
$this->config->set('URI', 'Munge', '/redirect.php?url=%s&check=%t');
|
|
$this->config->set('URI', 'MungeSecretKey', 'foo');
|
|
$this->assertPurification(
|
|
'<a href="http://localhost">foo</a><img src="http://localhost" alt="local" />',
|
|
'<a href="/redirect.php?url=http%3A%2F%2Flocalhost&check=8e8223ae8fac24561104180ea549c21fbd111be7">foo</a><img src="http://localhost" alt="local" />'
|
|
);
|
|
}
|
|
|
|
function test_safeObjectAndEmbed() {
|
|
$this->config->set('HTML', 'SafeObject', true);
|
|
$this->config->set('HTML', 'SafeEmbed', true);
|
|
$this->assertPurification(
|
|
'<object width="425" height="344"><param name="movie" value="http://www.youtube.com/v/Oq3FV_zdyy0&hl=en"></param><embed src="http://www.youtube.com/v/Oq3FV_zdyy0&hl=en" type="application/x-shockwave-flash" width="425" height="344"></embed></object>',
|
|
'<object width="425" height="344" data="http://www.youtube.com/v/Oq3FV_zdyy0&hl=en" type="application/x-shockwave-flash"><param name="allowScriptAccess" value="never" /><param name="allowNetworking" value="internal" /><param name="movie" value="http://www.youtube.com/v/Oq3FV_zdyy0&hl=en" /><embed src="http://www.youtube.com/v/Oq3FV_zdyy0&hl=en" type="application/x-shockwave-flash" width="425" height="344" allowscriptaccess="never" allownetworking="internal" /></object>'
|
|
);
|
|
}
|
|
|
|
function test_safeObjectAndEmbedWithSecureMunge() {
|
|
$this->config->set('HTML', 'SafeObject', true);
|
|
$this->config->set('HTML', 'SafeEmbed', true);
|
|
$this->config->set('URI', 'Munge', '/redirect.php?url=%s&check=%t');
|
|
$this->config->set('URI', 'MungeSecretKey', 'foo');
|
|
$this->assertPurification(
|
|
'<object width="425" height="344"><param name="movie" value="http://www.youtube.com/v/Oq3FV_zdyy0&hl=en"></param><embed src="http://www.youtube.com/v/Oq3FV_zdyy0&hl=en" type="application/x-shockwave-flash" width="425" height="344"></embed></object>',
|
|
'<object width="425" height="344" data="http://www.youtube.com/v/Oq3FV_zdyy0&hl=en" type="application/x-shockwave-flash"><param name="allowScriptAccess" value="never" /><param name="allowNetworking" value="internal" /><param name="movie" value="http://www.youtube.com/v/Oq3FV_zdyy0&hl=en" /><embed src="http://www.youtube.com/v/Oq3FV_zdyy0&hl=en" type="application/x-shockwave-flash" width="425" height="344" allowscriptaccess="never" allownetworking="internal" /></object>'
|
|
);
|
|
}
|
|
|
|
function test_mungeWithExtraParams() {
|
|
$this->config->set('URI', 'Munge', '/redirect?s=%s&t=%t&r=%r&n=%n&m=%m&p=%p');
|
|
$this->config->set('URI', 'MungeSecretKey', 'foo');
|
|
$this->config->set('URI', 'MungeResources', true);
|
|
$this->assertPurification(
|
|
'<a href="http://example.com">Link</a><img src="http://example.com" style="background-image:url(http://example.com);" alt="example.com" />',
|
|
'<a href="/redirect?s=http%3A%2F%2Fexample.com&t=c15354f3953dfec262c55b1403067e0d045a3059&r=&n=a&m=href&p=">Link</a>'.
|
|
'<img src="/redirect?s=http%3A%2F%2Fexample.com&t=c15354f3953dfec262c55b1403067e0d045a3059&r=1&n=img&m=src&p=" '.
|
|
'style="background-image:url(/redirect?s=http%3A%2F%2Fexample.com&t=c15354f3953dfec262c55b1403067e0d045a3059&r=1&n=img&m=style&p=background-image);" alt="example.com" />'
|
|
);
|
|
}
|
|
|
|
function test_name() {
|
|
$this->config->set('Attr', 'EnableID', true);
|
|
$this->config->set('HTML', 'Doctype', 'XHTML 1.0 Strict');
|
|
$this->assertPurification('<a name="asdf"></a>');
|
|
}
|
|
|
|
}
|
|
|