2019-06-16 19:46:36 +00:00
|
|
|
|
# frozen_string_literal: true
|
|
|
|
|
|
|
|
|
|
require 'rails_helper'
|
|
|
|
|
|
|
|
|
|
describe Sanitize::Config do
|
2020-05-28 10:47:40 +00:00
|
|
|
|
shared_examples 'common HTML sanitization' do
|
2019-06-19 14:19:32 +00:00
|
|
|
|
it 'keeps h1' do
|
|
|
|
|
expect(Sanitize.fragment('<h1>Foo</h1>', subject)).to eq '<h1>Foo</h1>'
|
2019-06-16 19:46:36 +00:00
|
|
|
|
end
|
|
|
|
|
|
2019-06-19 14:19:32 +00:00
|
|
|
|
it 'keeps ul' do
|
|
|
|
|
expect(Sanitize.fragment('<p>Check out:</p><ul><li>Foo</li><li>Bar</li></ul>', subject)).to eq '<p>Check out:</p><ul><li>Foo</li><li>Bar</li></ul>'
|
2019-06-16 19:46:36 +00:00
|
|
|
|
end
|
2020-02-08 20:22:38 +00:00
|
|
|
|
|
2020-06-30 22:06:22 +00:00
|
|
|
|
it 'keeps start and reversed attributes of ol' do
|
|
|
|
|
expect(Sanitize.fragment('<p>Check out:</p><ol start="3" reversed=""><li>Foo</li><li>Bar</li></ol>', subject)).to eq '<p>Check out:</p><ol start="3" reversed=""><li>Foo</li><li>Bar</li></ol>'
|
|
|
|
|
end
|
|
|
|
|
|
2020-02-08 20:22:38 +00:00
|
|
|
|
it 'removes a without href' do
|
|
|
|
|
expect(Sanitize.fragment('<a>Test</a>', subject)).to eq 'Test'
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it 'removes a without href and only keeps text content' do
|
|
|
|
|
expect(Sanitize.fragment('<a><span class="invisible">foo&</span><span>Test</span></a>', subject)).to eq 'foo&Test'
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it 'removes a with unsupported scheme in href' do
|
|
|
|
|
expect(Sanitize.fragment('<a href="foo://bar">Test</a>', subject)).to eq 'Test'
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it 'keeps a with href' do
|
2020-03-22 15:59:29 +00:00
|
|
|
|
expect(Sanitize.fragment('<a href="http://example.com">Test</a>', subject)).to eq '<a href="http://example.com" rel="nofollow noopener noreferrer" target="_blank">Test</a>'
|
|
|
|
|
end
|
|
|
|
|
|
2020-05-28 10:47:40 +00:00
|
|
|
|
it 'removes a with unparsable href' do
|
|
|
|
|
expect(Sanitize.fragment('<a href=" https://google.fr">Test</a>', subject)).to eq 'Test'
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it 'keeps a with supported scheme and no host' do
|
|
|
|
|
expect(Sanitize.fragment('<a href="dweb:/a/foo">Test</a>', subject)).to eq '<a href="dweb:/a/foo" rel="nofollow noopener noreferrer" target="_blank">Test</a>'
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
describe '::MASTODON_STRICT' do
|
|
|
|
|
subject { Sanitize::Config::MASTODON_STRICT }
|
|
|
|
|
|
|
|
|
|
it_behaves_like 'common HTML sanitization'
|
|
|
|
|
|
2020-03-22 15:59:29 +00:00
|
|
|
|
it 'keeps a with href and rel tag' do
|
2020-03-22 16:56:49 +00:00
|
|
|
|
expect(Sanitize.fragment('<a href="http://example.com" rel="tag">Test</a>', subject)).to eq '<a href="http://example.com" rel="tag nofollow noopener noreferrer" target="_blank">Test</a>'
|
|
|
|
|
end
|
2020-05-28 10:47:40 +00:00
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
describe '::MASTODON_STRICT with outgoing toots' do
|
|
|
|
|
subject { Sanitize::Config::MASTODON_STRICT.merge(outgoing: true) }
|
|
|
|
|
|
|
|
|
|
around do |example|
|
|
|
|
|
original_web_domain = Rails.configuration.x.web_domain
|
|
|
|
|
example.run
|
|
|
|
|
Rails.configuration.x.web_domain = original_web_domain
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it_behaves_like 'common HTML sanitization'
|
2020-03-22 16:56:49 +00:00
|
|
|
|
|
|
|
|
|
it 'keeps a with href and rel tag, not adding to rel if url is local' do
|
|
|
|
|
Rails.configuration.x.web_domain = 'domain.test'
|
2020-05-28 10:47:40 +00:00
|
|
|
|
expect(Sanitize.fragment('<a href="http://domain.test/tags/foo" rel="tag">Test</a>', subject)).to eq '<a href="http://domain.test/tags/foo" rel="tag" target="_blank">Test</a>'
|
2020-02-08 20:22:38 +00:00
|
|
|
|
end
|
2019-06-16 19:46:36 +00:00
|
|
|
|
end
|
|
|
|
|
end
|