aboutsummaryrefslogtreecommitdiffstats
path: root/actionview/test/template/erb_util_test.rb
diff options
context:
space:
mode:
authorPiotr Sarnacki <drogus@gmail.com>2013-06-20 15:42:49 -0700
committerPiotr Sarnacki <drogus@gmail.com>2013-06-20 15:42:49 -0700
commita29f746398e7b0647885343e7f26d977dd251999 (patch)
tree1e2cd2ee1f8f31812c0acf71350ffe423ca8c5a9 /actionview/test/template/erb_util_test.rb
parent7c69a829a311a31109939cff19b700b36b97d5c4 (diff)
parentd6b1caa8f2011487c08b414605883f1f220d0aaa (diff)
downloadrails-a29f746398e7b0647885343e7f26d977dd251999.tar.gz
rails-a29f746398e7b0647885343e7f26d977dd251999.tar.bz2
rails-a29f746398e7b0647885343e7f26d977dd251999.zip
Merge pull request #11032 from strzalek/extract-actionview
Extract ActionView to separate directory
Diffstat (limited to 'actionview/test/template/erb_util_test.rb')
-rw-r--r--actionview/test/template/erb_util_test.rb60
1 files changed, 60 insertions, 0 deletions
diff --git a/actionview/test/template/erb_util_test.rb b/actionview/test/template/erb_util_test.rb
new file mode 100644
index 0000000000..3e5b029cea
--- /dev/null
+++ b/actionview/test/template/erb_util_test.rb
@@ -0,0 +1,60 @@
+require 'abstract_unit'
+
+class ErbUtilTest < ActiveSupport::TestCase
+ include ERB::Util
+
+ ERB::Util::HTML_ESCAPE.each do |given, expected|
+ define_method "test_html_escape_#{expected.gsub(/\W/, '')}" do
+ assert_equal expected, html_escape(given)
+ end
+ end
+
+ ERB::Util::JSON_ESCAPE.each do |given, expected|
+ define_method "test_json_escape_#{expected.gsub(/\W/, '')}" do
+ assert_equal ERB::Util::JSON_ESCAPE[given], json_escape(given)
+ end
+ end
+
+ def test_json_escape_returns_unsafe_strings_when_passed_unsafe_strings
+ value = json_escape("asdf")
+ assert !value.html_safe?
+ end
+
+ def test_json_escape_returns_safe_strings_when_passed_safe_strings
+ value = json_escape("asdf".html_safe)
+ assert value.html_safe?
+ end
+
+ def test_html_escape_is_html_safe
+ escaped = h("<p>")
+ assert_equal "&lt;p&gt;", escaped
+ assert escaped.html_safe?
+ end
+
+ def test_html_escape_passes_html_escpe_unmodified
+ escaped = h("<p>".html_safe)
+ assert_equal "<p>", escaped
+ assert escaped.html_safe?
+ end
+
+ def test_rest_in_ascii
+ (0..127).to_a.map {|int| int.chr }.each do |chr|
+ next if %('"&<>).include?(chr)
+ assert_equal chr, html_escape(chr)
+ end
+ end
+
+ def test_html_escape_once
+ assert_equal '1 &lt;&gt;&amp;&quot;&#39; 2 &amp; 3', html_escape_once('1 <>&"\' 2 &amp; 3')
+ end
+
+ def test_html_escape_once_returns_unsafe_strings_when_passed_unsafe_strings
+ value = html_escape_once('1 < 2 &amp; 3')
+ assert !value.html_safe?
+ end
+
+ def test_html_escape_once_returns_safe_strings_when_passed_safe_strings
+ value = html_escape_once('1 < 2 &amp; 3'.html_safe)
+ assert value.html_safe?
+ end
+end