Mercurial > hg > isophonics-drupal-site
diff core/tests/Drupal/Tests/Component/Utility/SafeMarkupTest.php @ 0:4c8ae668cc8c
Initial import (non-working)
author | Chris Cannam |
---|---|
date | Wed, 29 Nov 2017 16:09:58 +0000 |
parents | |
children | 1fec387a4317 |
line wrap: on
line diff
--- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/core/tests/Drupal/Tests/Component/Utility/SafeMarkupTest.php Wed Nov 29 16:09:58 2017 +0000 @@ -0,0 +1,187 @@ +<?php + +/** + * @file + * Contains \Drupal\Tests\Component\Utility\SafeMarkupTest. + */ + +namespace Drupal\Tests\Component\Utility; + +use Drupal\Component\Render\HtmlEscapedText; +use Drupal\Component\Utility\SafeMarkup; +use Drupal\Component\Render\MarkupInterface; +use Drupal\Component\Render\MarkupTrait; +use Drupal\Component\Utility\UrlHelper; +use PHPUnit\Framework\TestCase; + +/** + * Tests marking strings as safe. + * + * @group Utility + * @coversDefaultClass \Drupal\Component\Utility\SafeMarkup + */ +class SafeMarkupTest extends TestCase { + + /** + * {@inheritdoc} + */ + protected function tearDown() { + parent::tearDown(); + + UrlHelper::setAllowedProtocols(['http', 'https']); + } + + /** + * Tests SafeMarkup::isSafe() with different objects. + * + * @covers ::isSafe + */ + public function testIsSafe() { + $safe_string = $this->getMock('\Drupal\Component\Render\MarkupInterface'); + $this->assertTrue(SafeMarkup::isSafe($safe_string)); + $string_object = new SafeMarkupTestString('test'); + $this->assertFalse(SafeMarkup::isSafe($string_object)); + } + + /** + * Tests SafeMarkup::checkPlain(). + * + * @dataProvider providerCheckPlain + * @covers ::checkPlain + * + * @param string $text + * The text to provide to SafeMarkup::checkPlain(). + * @param string $expected + * The expected output from the function. + * @param string $message + * The message to provide as output for the test. + */ + public function testCheckPlain($text, $expected, $message) { + $result = SafeMarkup::checkPlain($text); + $this->assertTrue($result instanceof HtmlEscapedText); + $this->assertEquals($expected, $result, $message); + } + + /** + * Tests Drupal\Component\Render\HtmlEscapedText. + * + * Verifies that the result of SafeMarkup::checkPlain() is the same as using + * HtmlEscapedText directly. + * + * @dataProvider providerCheckPlain + * + * @param string $text + * The text to provide to the HtmlEscapedText constructor. + * @param string $expected + * The expected output from the function. + * @param string $message + * The message to provide as output for the test. + */ + public function testHtmlEscapedText($text, $expected, $message) { + $result = new HtmlEscapedText($text); + $this->assertEquals($expected, $result, $message); + } + + /** + * Data provider for testCheckPlain() and testEscapeString(). + * + * @see testCheckPlain() + */ + public function providerCheckPlain() { + // Checks that invalid multi-byte sequences are escaped. + $tests[] = ["Foo\xC0barbaz", 'Foo�barbaz', 'Escapes invalid sequence "Foo\xC0barbaz"']; + $tests[] = ["\xc2\"", '�"', 'Escapes invalid sequence "\xc2\""']; + $tests[] = ["Fooÿñ", "Fooÿñ", 'Does not escape valid sequence "Fooÿñ"']; + + // Checks that special characters are escaped. + $tests[] = [SafeMarkupTestMarkup::create("<script>"), '<script>', 'Escapes <script> even inside an object that implements MarkupInterface.']; + $tests[] = ["<script>", '<script>', 'Escapes <script>']; + $tests[] = ['<>&"\'', '<>&"'', 'Escapes reserved HTML characters.']; + $tests[] = [SafeMarkupTestMarkup::create('<>&"\''), '<>&"'', 'Escapes reserved HTML characters even inside an object that implements MarkupInterface.']; + + return $tests; + } + + /** + * Tests string formatting with SafeMarkup::format(). + * + * @dataProvider providerFormat + * @covers ::format + * + * @param string $string + * The string to run through SafeMarkup::format(). + * @param string[] $args + * The arguments to pass into SafeMarkup::format(). + * @param string $expected + * The expected result from calling the function. + * @param string $message + * The message to display as output to the test. + * @param bool $expected_is_safe + * Whether the result is expected to be safe for HTML display. + */ + public function testFormat($string, array $args, $expected, $message, $expected_is_safe) { + UrlHelper::setAllowedProtocols(['http', 'https', 'mailto']); + + $result = SafeMarkup::format($string, $args); + $this->assertEquals($expected, (string) $result, $message); + $this->assertEquals($expected_is_safe, $result instanceof MarkupInterface, 'SafeMarkup::format correctly sets the result as safe or not safe.'); + + foreach ($args as $arg) { + $this->assertSame($arg instanceof SafeMarkupTestMarkup, SafeMarkup::isSafe($arg)); + } + } + + /** + * Data provider for testFormat(). + * + * @see testFormat() + */ + public function providerFormat() { + $tests[] = ['Simple text', [], 'Simple text', 'SafeMarkup::format leaves simple text alone.', TRUE]; + $tests[] = ['Escaped text: @value', ['@value' => '<script>'], 'Escaped text: <script>', 'SafeMarkup::format replaces and escapes string.', TRUE]; + $tests[] = ['Escaped text: @value', ['@value' => SafeMarkupTestMarkup::create('<span>Safe HTML</span>')], 'Escaped text: <span>Safe HTML</span>', 'SafeMarkup::format does not escape an already safe string.', TRUE]; + $tests[] = ['Placeholder text: %value', ['%value' => '<script>'], 'Placeholder text: <em class="placeholder"><script></em>', 'SafeMarkup::format replaces, escapes and themes string.', TRUE]; + $tests[] = ['Placeholder text: %value', ['%value' => SafeMarkupTestMarkup::create('<span>Safe HTML</span>')], 'Placeholder text: <em class="placeholder"><span>Safe HTML</span></em>', 'SafeMarkup::format does not escape an already safe string themed as a placeholder.', TRUE]; + + $tests['javascript-protocol-url'] = ['Simple text <a href=":url">giraffe</a>', [':url' => 'javascript://example.com?foo&bar'], 'Simple text <a href="//example.com?foo&bar">giraffe</a>', 'Support for filtering bad protocols', TRUE]; + $tests['external-url'] = ['Simple text <a href=":url">giraffe</a>', [':url' => 'http://example.com?foo&bar'], 'Simple text <a href="http://example.com?foo&bar">giraffe</a>', 'Support for filtering bad protocols', TRUE]; + $tests['relative-url'] = ['Simple text <a href=":url">giraffe</a>', [':url' => '/node/1?foo&bar'], 'Simple text <a href="/node/1?foo&bar">giraffe</a>', 'Support for filtering bad protocols', TRUE]; + $tests['fragment-with-special-chars'] = ['Simple text <a href=":url">giraffe</a>', [':url' => 'http://example.com/#<'], 'Simple text <a href="http://example.com/#&lt;">giraffe</a>', 'Support for filtering bad protocols', TRUE]; + $tests['mailto-protocol'] = ['Hey giraffe <a href=":url">MUUUH</a>', [':url' => 'mailto:test@example.com'], 'Hey giraffe <a href="mailto:test@example.com">MUUUH</a>', '', TRUE]; + $tests['js-with-fromCharCode'] = ['Hey giraffe <a href=":url">MUUUH</a>', [':url' => "javascript:alert(String.fromCharCode(88,83,83))"], 'Hey giraffe <a href="alert(String.fromCharCode(88,83,83))">MUUUH</a>', '', TRUE]; + + // Test some "URL" values that are not RFC 3986 compliant URLs. The result + // of SafeMarkup::format() should still be valid HTML (other than the + // value of the "href" attribute not being a valid URL), and not + // vulnerable to XSS. + $tests['non-url-with-colon'] = ['Hey giraffe <a href=":url">MUUUH</a>', [':url' => "llamas: they are not URLs"], 'Hey giraffe <a href=" they are not URLs">MUUUH</a>', '', TRUE]; + $tests['non-url-with-html'] = ['Hey giraffe <a href=":url">MUUUH</a>', [':url' => "<span>not a url</span>"], 'Hey giraffe <a href="<span>not a url</span>">MUUUH</a>', '', TRUE]; + + // Tests non-standard placeholders that will not replace. + $tests['non-standard-placeholder'] = ['Hey hey', ['risky' => "<script>alert('foo');</script>"], 'Hey hey', '', TRUE]; + return $tests; + } + +} + +class SafeMarkupTestString { + + protected $string; + + public function __construct($string) { + $this->string = $string; + } + + public function __toString() { + return $this->string; + } + +} + +/** + * Marks an object's __toString() method as returning markup. + */ +class SafeMarkupTestMarkup implements MarkupInterface { + use MarkupTrait; + +}