test_escaping.py 971 B

1234567891011121314151617181920212223242526
  1. # Bunch of tests for unsafe/malicious contents escaping
  2. from ..parser import parse
  3. def test_text_is_escaped(request_mock, user, snapshot):
  4. text = '<script>alert("!")</script>'
  5. result = parse(text, request_mock, user, minify=False)
  6. snapshot.assert_match(result["parsed_text"])
  7. def test_inline_code_is_escaped(request_mock, user, snapshot):
  8. text = '`<script>alert("!")</script>`'
  9. result = parse(text, request_mock, user, minify=False)
  10. snapshot.assert_match(result["parsed_text"])
  11. def test_code_in_quote_markdown_is_escaped(request_mock, user, snapshot):
  12. text = '> <script>alert("!")</script>'
  13. result = parse(text, request_mock, user, minify=False)
  14. snapshot.assert_match(result["parsed_text"])
  15. def test_code_in_quote_bbcode_is_escaped(request_mock, user, snapshot):
  16. text = '[quote]<script>alert("!")</script>[/quote]'
  17. result = parse(text, request_mock, user, minify=False)
  18. snapshot.assert_match(result["parsed_text"])