parser/xml/test/unit/test_sanitizer.js

Wed, 31 Dec 2014 13:27:57 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 13:27:57 +0100
branch
TOR_BUG_3246
changeset 6
8bccb770b82d
permissions
-rw-r--r--

Ignore runtime configuration files generated during quality assurance.

     1 function run_test() {
     2   var Ci = Components.interfaces;
     3   var Cc = Components.classes;
     5   // vectors by the html5security project (https://code.google.com/p/html5security/ & Creative Commons 3.0 BY), see CC-BY-LICENSE for the full license
     6   load("results.js");   // gives us a `vectors' array
     8   var ParserUtils =  Cc["@mozilla.org/parserutils;1"].getService(Ci.nsIParserUtils);
     9   var sanitizeFlags = ParserUtils.SanitizerCidEmbedsOnly|ParserUtils.SanitizerDropForms|ParserUtils.SanitizerDropNonCSSPresentation;
    10   // flags according to 
    11   // http://mxr.mozilla.org/comm-central/source/mailnews/mime/src/mimemoz2.cpp#2218
    12   // and default settings
    15   for (var item in vectors) {
    16     var evil = vectors[item].data;
    17     var sanitized = vectors[item].sanitized;
    18     var out = ParserUtils.sanitize(evil, sanitizeFlags);
    19     do_check_eq(sanitized, out);
    20   }
    21 }

mercurial