|
|
|
@ -115,6 +115,22 @@ RSpec.describe Formatter do |
|
|
|
|
end |
|
|
|
|
end |
|
|
|
|
|
|
|
|
|
context 'given a URL in quotation marks' do |
|
|
|
|
let(:text) { '"https://example.com/"' } |
|
|
|
|
|
|
|
|
|
it 'does not match the quotation marks' do |
|
|
|
|
is_expected.to include 'href="https://example.com/"' |
|
|
|
|
end |
|
|
|
|
end |
|
|
|
|
|
|
|
|
|
context 'given a URL in angle brackets' do |
|
|
|
|
let(:text) { '<https://example.com/>' } |
|
|
|
|
|
|
|
|
|
it 'does not match the angle brackets' do |
|
|
|
|
is_expected.to include 'href="https://example.com/"' |
|
|
|
|
end |
|
|
|
|
end |
|
|
|
|
|
|
|
|
|
context 'given a URL with Japanese path string' do |
|
|
|
|
let(:text) { 'https://ja.wikipedia.org/wiki/日本' } |
|
|
|
|
|
|
|
|
@ -131,6 +147,22 @@ RSpec.describe Formatter do |
|
|
|
|
end |
|
|
|
|
end |
|
|
|
|
|
|
|
|
|
context 'given a URL with a full-width space' do |
|
|
|
|
let(:text) { 'https://example.com/ abc123' } |
|
|
|
|
|
|
|
|
|
it 'does not match the full-width space' do |
|
|
|
|
is_expected.to include 'href="https://example.com/"' |
|
|
|
|
end |
|
|
|
|
end |
|
|
|
|
|
|
|
|
|
context 'given a URL in Japanese quotation marks' do |
|
|
|
|
let(:text) { '「[https://example.org/」' } |
|
|
|
|
|
|
|
|
|
it 'does not match the quotation marks' do |
|
|
|
|
is_expected.to include 'href="https://example.org/"' |
|
|
|
|
end |
|
|
|
|
end |
|
|
|
|
|
|
|
|
|
context 'given a URL with Simplified Chinese path string' do |
|
|
|
|
let(:text) { 'https://baike.baidu.com/item/中华人民共和国' } |
|
|
|
|
|
|
|
|
@ -150,7 +182,11 @@ RSpec.describe Formatter do |
|
|
|
|
context 'given a URL containing unsafe code (XSS attack, visible part)' do |
|
|
|
|
let(:text) { %q{http://example.com/b<del>b</del>} } |
|
|
|
|
|
|
|
|
|
it 'escapes the HTML in the URL' do |
|
|
|
|
it 'does not include the HTML in the URL' do |
|
|
|
|
is_expected.to include '"http://example.com/b"' |
|
|
|
|
end |
|
|
|
|
|
|
|
|
|
it 'escapes the HTML' do |
|
|
|
|
is_expected.to include '<del>b</del>' |
|
|
|
|
end |
|
|
|
|
end |
|
|
|
@ -158,7 +194,11 @@ RSpec.describe Formatter do |
|
|
|
|
context 'given a URL containing unsafe code (XSS attack, invisible part)' do |
|
|
|
|
let(:text) { %q{http://example.com/blahblahblahblah/a<script>alert("Hello")</script>} } |
|
|
|
|
|
|
|
|
|
it 'escapes the HTML in the URL' do |
|
|
|
|
it 'does not include the HTML in the URL' do |
|
|
|
|
is_expected.to include '"http://example.com/blahblahblahblah/a"' |
|
|
|
|
end |
|
|
|
|
|
|
|
|
|
it 'escapes the HTML' do |
|
|
|
|
is_expected.to include '<script>alert("Hello")</script>' |
|
|
|
|
end |
|
|
|
|
end |
|
|
|
|