Completed
Push — master ( fdb9d0...a28df1 )
by Daniel
13s
created
tests/IFramePageTest.php 1 patch
Indentation   +129 added lines, -129 removed lines patch added patch discarded remove patch
@@ -10,133 +10,133 @@
 block discarded – undo
10 10
 
11 11
 class IFramePageTest extends SapphireTest
12 12
 {
13
-    protected $usesDatabase = true;
14
-
15
-    public function testGetClass()
16
-    {
17
-        $iframe = new IFramePage();
18
-        $iframe->AutoHeight = 1;
19
-        $iframe->getClass();
20
-
21
-        $this->assertContains('iframepage-height-auto', $iframe->getClass());
22
-
23
-        $iframe->AutoHeight = 0;
24
-        $iframe->getClass();
25
-
26
-        $this->assertNotContains('iframepage-height-auto', $iframe->getClass());
27
-    }
28
-
29
-    public function testGetStyle()
30
-    {
31
-        $iframe = new IFramePage();
32
-
33
-        $iframe->FixedHeight = 0;
34
-        $iframe->getStyle();
35
-        $this->assertContains('height: 800px', $iframe->getStyle(), 'Height defaults to 800 if not set.');
36
-
37
-        $iframe->FixedHeight = 100;
38
-        $iframe->getStyle();
39
-        $this->assertContains('height: 100px', $iframe->getStyle(), 'Fixed height is settable');
40
-
41
-        $iframe->AutoWidth = 1;
42
-        $iframe->FixedWidth = '200';
43
-        $this->assertContains('width: 100%', $iframe->getStyle(), 'Auto width overrides fixed width');
44
-
45
-        $iframe->AutoWidth = 0;
46
-        $iframe->FixedWidth = '200';
47
-        $this->assertContains('width: 200px', $iframe->getStyle(), 'Fixed width is settable');
48
-    }
49
-
50
-    public function testAllowedUrls()
51
-    {
52
-        $iframe = new IFramePage();
53
-
54
-        $tests = array(
55
-            'allowed' => array(
56
-                'http://anything',
57
-                'https://anything',
58
-                'page',
59
-                'sub-page/link',
60
-                'page/link',
61
-                'page.html',
62
-                'page.htm',
63
-                'page.phpissoawesomewhywouldiuseanythingelse',
64
-                '//url.com/page',
65
-                '/root/page/link',
66
-                'http://intranet:8888',
67
-                'http://javascript:8080',
68
-                'http://username:password@hostname/path?arg=value#anchor'
69
-            ),
70
-            'banned' => array(
71
-                'javascript:alert',
72
-                'tel:0210001234',
73
-                'ftp://url',
74
-                'ssh://1.2.3.4',
75
-                'ssh://url.com/page'
76
-            )
77
-        );
78
-
79
-        foreach ($tests['allowed'] as $url) {
80
-            $iframe->IFrameURL = $url;
81
-            $iframe->write();
82
-            $this->assertContains($iframe->IFrameURL, $url);
83
-        }
84
-
85
-        foreach ($tests['banned'] as $url) {
86
-            $iframe->IFrameURL = $url;
87
-            $this->setExpectedException(ValidationException::class);
88
-            $iframe->write();
89
-        }
90
-    }
91
-
92
-    public function testForceProtocol()
93
-    {
94
-        $origServer = $_SERVER;
95
-
96
-        $page = new IFramePage();
97
-        $page->URLSegment = 'iframe';
98
-        $page->IFrameURL = 'http://target.com';
99
-
100
-        Config::modify()->set(Director::class, 'alternate_protocol', 'http');
101
-        Config::modify()->set(Director::class, 'alternate_base_url', 'http://host.com');
102
-        $page->ForceProtocol = '';
103
-        $controller = new IFramePageController($page);
104
-        $controller->doInit();
105
-        $response = $controller->getResponse();
106
-        $this->assertNull($response->getHeader('Location'));
107
-
108
-        Config::modify()->set(Director::class, 'alternate_protocol', 'https');
109
-        Config::modify()->set(Director::class, 'alternate_base_url', 'https://host.com');
110
-        $page->ForceProtocol = '';
111
-        $controller = new IFramePageController($page);
112
-        $controller->doInit();
113
-        $response = $controller->getResponse();
114
-        $this->assertNull($response->getHeader('Location'));
115
-
116
-        Config::modify()->set(Director::class, 'alternate_protocol', 'http');
117
-        Config::modify()->set(Director::class, 'alternate_base_url', 'http://host.com');
118
-        $page->ForceProtocol = 'http://';
119
-        $controller = new IFramePageController($page);
120
-        $controller->doInit();
121
-        $response = $controller->getResponse();
122
-        $this->assertNull($response->getHeader('Location'));
123
-
124
-        Config::modify()->set(Director::class, 'alternate_protocol', 'http');
125
-        Config::modify()->set(Director::class, 'alternate_base_url', 'http://host.com');
126
-        $page->ForceProtocol = 'https://';
127
-        $controller = new IFramePageController($page);
128
-        $controller->doInit();
129
-        $response = $controller->getResponse();
130
-        $this->assertEquals($response->getHeader('Location'), 'https://host.com/iframe/');
131
-
132
-        Config::modify()->set(Director::class, 'alternate_protocol', 'https');
133
-        Config::modify()->set(Director::class, 'alternate_base_url', 'https://host.com');
134
-        $page->ForceProtocol = 'http://';
135
-        $controller = new IFramePageController($page);
136
-        $controller->doInit();
137
-        $response = $controller->getResponse();
138
-        $this->assertEquals($response->getHeader('Location'), 'http://host.com/iframe/');
139
-
140
-        $_SERVER = $origServer;
141
-    }
13
+	protected $usesDatabase = true;
14
+
15
+	public function testGetClass()
16
+	{
17
+		$iframe = new IFramePage();
18
+		$iframe->AutoHeight = 1;
19
+		$iframe->getClass();
20
+
21
+		$this->assertContains('iframepage-height-auto', $iframe->getClass());
22
+
23
+		$iframe->AutoHeight = 0;
24
+		$iframe->getClass();
25
+
26
+		$this->assertNotContains('iframepage-height-auto', $iframe->getClass());
27
+	}
28
+
29
+	public function testGetStyle()
30
+	{
31
+		$iframe = new IFramePage();
32
+
33
+		$iframe->FixedHeight = 0;
34
+		$iframe->getStyle();
35
+		$this->assertContains('height: 800px', $iframe->getStyle(), 'Height defaults to 800 if not set.');
36
+
37
+		$iframe->FixedHeight = 100;
38
+		$iframe->getStyle();
39
+		$this->assertContains('height: 100px', $iframe->getStyle(), 'Fixed height is settable');
40
+
41
+		$iframe->AutoWidth = 1;
42
+		$iframe->FixedWidth = '200';
43
+		$this->assertContains('width: 100%', $iframe->getStyle(), 'Auto width overrides fixed width');
44
+
45
+		$iframe->AutoWidth = 0;
46
+		$iframe->FixedWidth = '200';
47
+		$this->assertContains('width: 200px', $iframe->getStyle(), 'Fixed width is settable');
48
+	}
49
+
50
+	public function testAllowedUrls()
51
+	{
52
+		$iframe = new IFramePage();
53
+
54
+		$tests = array(
55
+			'allowed' => array(
56
+				'http://anything',
57
+				'https://anything',
58
+				'page',
59
+				'sub-page/link',
60
+				'page/link',
61
+				'page.html',
62
+				'page.htm',
63
+				'page.phpissoawesomewhywouldiuseanythingelse',
64
+				'//url.com/page',
65
+				'/root/page/link',
66
+				'http://intranet:8888',
67
+				'http://javascript:8080',
68
+				'http://username:password@hostname/path?arg=value#anchor'
69
+			),
70
+			'banned' => array(
71
+				'javascript:alert',
72
+				'tel:0210001234',
73
+				'ftp://url',
74
+				'ssh://1.2.3.4',
75
+				'ssh://url.com/page'
76
+			)
77
+		);
78
+
79
+		foreach ($tests['allowed'] as $url) {
80
+			$iframe->IFrameURL = $url;
81
+			$iframe->write();
82
+			$this->assertContains($iframe->IFrameURL, $url);
83
+		}
84
+
85
+		foreach ($tests['banned'] as $url) {
86
+			$iframe->IFrameURL = $url;
87
+			$this->setExpectedException(ValidationException::class);
88
+			$iframe->write();
89
+		}
90
+	}
91
+
92
+	public function testForceProtocol()
93
+	{
94
+		$origServer = $_SERVER;
95
+
96
+		$page = new IFramePage();
97
+		$page->URLSegment = 'iframe';
98
+		$page->IFrameURL = 'http://target.com';
99
+
100
+		Config::modify()->set(Director::class, 'alternate_protocol', 'http');
101
+		Config::modify()->set(Director::class, 'alternate_base_url', 'http://host.com');
102
+		$page->ForceProtocol = '';
103
+		$controller = new IFramePageController($page);
104
+		$controller->doInit();
105
+		$response = $controller->getResponse();
106
+		$this->assertNull($response->getHeader('Location'));
107
+
108
+		Config::modify()->set(Director::class, 'alternate_protocol', 'https');
109
+		Config::modify()->set(Director::class, 'alternate_base_url', 'https://host.com');
110
+		$page->ForceProtocol = '';
111
+		$controller = new IFramePageController($page);
112
+		$controller->doInit();
113
+		$response = $controller->getResponse();
114
+		$this->assertNull($response->getHeader('Location'));
115
+
116
+		Config::modify()->set(Director::class, 'alternate_protocol', 'http');
117
+		Config::modify()->set(Director::class, 'alternate_base_url', 'http://host.com');
118
+		$page->ForceProtocol = 'http://';
119
+		$controller = new IFramePageController($page);
120
+		$controller->doInit();
121
+		$response = $controller->getResponse();
122
+		$this->assertNull($response->getHeader('Location'));
123
+
124
+		Config::modify()->set(Director::class, 'alternate_protocol', 'http');
125
+		Config::modify()->set(Director::class, 'alternate_base_url', 'http://host.com');
126
+		$page->ForceProtocol = 'https://';
127
+		$controller = new IFramePageController($page);
128
+		$controller->doInit();
129
+		$response = $controller->getResponse();
130
+		$this->assertEquals($response->getHeader('Location'), 'https://host.com/iframe/');
131
+
132
+		Config::modify()->set(Director::class, 'alternate_protocol', 'https');
133
+		Config::modify()->set(Director::class, 'alternate_base_url', 'https://host.com');
134
+		$page->ForceProtocol = 'http://';
135
+		$controller = new IFramePageController($page);
136
+		$controller->doInit();
137
+		$response = $controller->getResponse();
138
+		$this->assertEquals($response->getHeader('Location'), 'http://host.com/iframe/');
139
+
140
+		$_SERVER = $origServer;
141
+	}
142 142
 }
Please login to merge, or discard this patch.
src/IFramePageController.php 1 patch
Indentation   +17 added lines, -17 removed lines patch added patch discarded remove patch
@@ -8,22 +8,22 @@
 block discarded – undo
8 8
 
9 9
 class IFramePageController extends ContentController
10 10
 {
11
-    protected function init()
12
-    {
13
-        parent::init();
14
-        $currentProtocol = Director::protocol();
15
-        $desiredProtocol = $this->ForceProtocol;
16
-        if ($desiredProtocol && $currentProtocol !== $desiredProtocol) {
17
-            $enforcedLocation = preg_replace(
18
-                "#^${currentProtocol}#",
19
-                $desiredProtocol,
20
-                $this->AbsoluteLink()
21
-            );
22
-            return $this->redirect($enforcedLocation);
23
-        }
11
+	protected function init()
12
+	{
13
+		parent::init();
14
+		$currentProtocol = Director::protocol();
15
+		$desiredProtocol = $this->ForceProtocol;
16
+		if ($desiredProtocol && $currentProtocol !== $desiredProtocol) {
17
+			$enforcedLocation = preg_replace(
18
+				"#^${currentProtocol}#",
19
+				$desiredProtocol,
20
+				$this->AbsoluteLink()
21
+			);
22
+			return $this->redirect($enforcedLocation);
23
+		}
24 24
 
25
-        if ($this->IFrameURL) {
26
-            Requirements::javascript('silverstripe/iframe: javascript/iframe_page.js');
27
-        }
28
-    }
25
+		if ($this->IFrameURL) {
26
+			Requirements::javascript('silverstripe/iframe: javascript/iframe_page.js');
27
+		}
28
+	}
29 29
 }
Please login to merge, or discard this patch.
src/IFramePage.php 2 patches
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -130,7 +130,7 @@
 block discarded – undo
130 130
         $allowed_schemes = array('http', 'https');
131 131
         if ($matches = parse_url($this->IFrameURL)) {
132 132
             if (isset($matches['scheme']) && !in_array($matches['scheme'], $allowed_schemes)) {
133
-                $result->addError(_t(__CLASS__ . '.VALIDATION_BANNEDURLSCHEME', "This URL scheme is not allowed."));
133
+                $result->addError(_t(__CLASS__.'.VALIDATION_BANNEDURLSCHEME', "This URL scheme is not allowed."));
134 134
             }
135 135
         }
136 136
 
Please login to merge, or discard this patch.
Indentation   +123 added lines, -123 removed lines patch added patch discarded remove patch
@@ -15,127 +15,127 @@
 block discarded – undo
15 15
 
16 16
 class IFramePage extends Page
17 17
 {
18
-    private static $db = array(
19
-        'IFrameURL' => 'Text',
20
-        'AutoHeight' => 'Boolean(1)',
21
-        'AutoWidth' => 'Boolean(1)',
22
-        'FixedHeight' => 'Int(500)',
23
-        'FixedWidth' => 'Int(0)',
24
-        'AlternateContent' => 'HTMLText',
25
-        'BottomContent' => 'HTMLText',
26
-        'ForceProtocol' => 'Varchar',
27
-    );
28
-
29
-    private static $defaults = array(
30
-        'AutoHeight' => '1',
31
-        'AutoWidth' => '1',
32
-        'FixedHeight' => '500',
33
-        'FixedWidth' => '0'
34
-    );
35
-
36
-    private static $table_name = 'IFramePage';
37
-
38
-    private static $description = 'Embeds an iframe into the body of the page.';
39
-
40
-    private static $singular_name = 'IFrame Page';
41
-
42
-    public function getCMSFields()
43
-    {
44
-        $fields = parent::getCMSFields();
45
-
46
-        $fields->removeFieldFromTab('Root.Main', 'Content');
47
-        $fields->addFieldToTab('Root.Main', $url = new TextField('IFrameURL', 'Iframe URL'));
48
-        $url->setRightTitle(
49
-            'Can be absolute (<em>http://silverstripe.com</em>) or relative to this site (<em>about-us</em>).'
50
-        );
51
-        $fields->addFieldToTab(
52
-            'Root.Main',
53
-            DropdownField::create('ForceProtocol', 'Force protocol?')
54
-                ->setSource(array('http://' => 'http://', 'https://' => 'https://'))
55
-                ->setEmptyString('')
56
-                ->setDescription(
57
-                    'Avoids mixed content warnings when iframe content is just available under a specific protocol'
58
-                ),
59
-            'Metadata'
60
-        );
61
-        $fields->addFieldsToTab('Root.Main', [
62
-            CheckboxField::create('AutoHeight', 'Auto height (only works with same domain URLs)'),
63
-            CheckboxField::create('AutoWidth', 'Auto width (100% of the available space)'),
64
-            NumericField::create('FixedHeight', 'Fixed height (in pixels)'),
65
-            NumericField::create('FixedWidth', 'Fixed width (in pixels)'),
66
-            HtmlEditorField::create('Content', 'Content (appears above iframe)'),
67
-            HtmlEditorField::create('BottomContent', 'Content (appears below iframe)'),
68
-            HtmlEditorField::create('AlternateContent', 'Alternate Content (appears when user has iframes disabled)')
69
-        ]);
70
-
71
-        // Move the Metadata field to last position, but make a check for it's
72
-        // existence first.
73
-        //
74
-        // See https://github.com/silverstripe-labs/silverstripe-iframe/issues/18
75
-        $mainTab = $fields->findOrMakeTab('Root.Main');
76
-        $mainTabFields = $mainTab->FieldList();
77
-        $metaDataField = $mainTabFields->fieldByName('Metadata');
78
-        if ($metaDataField) {
79
-            $mainTabFields->removeByName('Metadata');
80
-            $mainTabFields->push($metaDataField);
81
-        }
82
-        return $fields;
83
-    }
84
-
85
-    /**
86
-     * Compute class from the size parameters.
87
-     */
88
-    public function getClass()
89
-    {
90
-        $class = '';
91
-        if ($this->AutoHeight) {
92
-            $class .= 'iframepage-height-auto';
93
-        }
94
-
95
-        return $class;
96
-    }
97
-
98
-    /**
99
-     * Compute style from the size parameters.
100
-     */
101
-    public function getStyle()
102
-    {
103
-        $style = '';
104
-
105
-        // Always add fixed height as a fallback if autosetting or JS fails.
106
-        $height = $this->FixedHeight;
107
-        if (!$height) {
108
-            $height = 800;
109
-        }
110
-        $style .= "height: {$height}px; ";
111
-
112
-        if ($this->AutoWidth) {
113
-            $style .= "width: 100%; ";
114
-        } elseif ($this->FixedWidth) {
115
-            $style .= "width: {$this->FixedWidth}px; ";
116
-        }
117
-
118
-        return $style;
119
-    }
120
-
121
-    /**
122
-     * Ensure that the IFrameURL is a valid url and prevents XSS
123
-     *
124
-     * @throws ValidationException
125
-     * @return ValidationResult
126
-     */
127
-    public function validate()
128
-    {
129
-        $result = parent::validate();
130
-
131
-        //whitelist allowed URL schemes
132
-        $allowed_schemes = array('http', 'https');
133
-        if ($matches = parse_url($this->IFrameURL)) {
134
-            if (isset($matches['scheme']) && !in_array($matches['scheme'], $allowed_schemes)) {
135
-                $result->addError(_t(__CLASS__ . '.VALIDATION_BANNEDURLSCHEME', "This URL scheme is not allowed."));
136
-            }
137
-        }
138
-
139
-        return $result;
140
-    }
18
+	private static $db = array(
19
+		'IFrameURL' => 'Text',
20
+		'AutoHeight' => 'Boolean(1)',
21
+		'AutoWidth' => 'Boolean(1)',
22
+		'FixedHeight' => 'Int(500)',
23
+		'FixedWidth' => 'Int(0)',
24
+		'AlternateContent' => 'HTMLText',
25
+		'BottomContent' => 'HTMLText',
26
+		'ForceProtocol' => 'Varchar',
27
+	);
28
+
29
+	private static $defaults = array(
30
+		'AutoHeight' => '1',
31
+		'AutoWidth' => '1',
32
+		'FixedHeight' => '500',
33
+		'FixedWidth' => '0'
34
+	);
35
+
36
+	private static $table_name = 'IFramePage';
37
+
38
+	private static $description = 'Embeds an iframe into the body of the page.';
39
+
40
+	private static $singular_name = 'IFrame Page';
41
+
42
+	public function getCMSFields()
43
+	{
44
+		$fields = parent::getCMSFields();
45
+
46
+		$fields->removeFieldFromTab('Root.Main', 'Content');
47
+		$fields->addFieldToTab('Root.Main', $url = new TextField('IFrameURL', 'Iframe URL'));
48
+		$url->setRightTitle(
49
+			'Can be absolute (<em>http://silverstripe.com</em>) or relative to this site (<em>about-us</em>).'
50
+		);
51
+		$fields->addFieldToTab(
52
+			'Root.Main',
53
+			DropdownField::create('ForceProtocol', 'Force protocol?')
54
+				->setSource(array('http://' => 'http://', 'https://' => 'https://'))
55
+				->setEmptyString('')
56
+				->setDescription(
57
+					'Avoids mixed content warnings when iframe content is just available under a specific protocol'
58
+				),
59
+			'Metadata'
60
+		);
61
+		$fields->addFieldsToTab('Root.Main', [
62
+			CheckboxField::create('AutoHeight', 'Auto height (only works with same domain URLs)'),
63
+			CheckboxField::create('AutoWidth', 'Auto width (100% of the available space)'),
64
+			NumericField::create('FixedHeight', 'Fixed height (in pixels)'),
65
+			NumericField::create('FixedWidth', 'Fixed width (in pixels)'),
66
+			HtmlEditorField::create('Content', 'Content (appears above iframe)'),
67
+			HtmlEditorField::create('BottomContent', 'Content (appears below iframe)'),
68
+			HtmlEditorField::create('AlternateContent', 'Alternate Content (appears when user has iframes disabled)')
69
+		]);
70
+
71
+		// Move the Metadata field to last position, but make a check for it's
72
+		// existence first.
73
+		//
74
+		// See https://github.com/silverstripe-labs/silverstripe-iframe/issues/18
75
+		$mainTab = $fields->findOrMakeTab('Root.Main');
76
+		$mainTabFields = $mainTab->FieldList();
77
+		$metaDataField = $mainTabFields->fieldByName('Metadata');
78
+		if ($metaDataField) {
79
+			$mainTabFields->removeByName('Metadata');
80
+			$mainTabFields->push($metaDataField);
81
+		}
82
+		return $fields;
83
+	}
84
+
85
+	/**
86
+	 * Compute class from the size parameters.
87
+	 */
88
+	public function getClass()
89
+	{
90
+		$class = '';
91
+		if ($this->AutoHeight) {
92
+			$class .= 'iframepage-height-auto';
93
+		}
94
+
95
+		return $class;
96
+	}
97
+
98
+	/**
99
+	 * Compute style from the size parameters.
100
+	 */
101
+	public function getStyle()
102
+	{
103
+		$style = '';
104
+
105
+		// Always add fixed height as a fallback if autosetting or JS fails.
106
+		$height = $this->FixedHeight;
107
+		if (!$height) {
108
+			$height = 800;
109
+		}
110
+		$style .= "height: {$height}px; ";
111
+
112
+		if ($this->AutoWidth) {
113
+			$style .= "width: 100%; ";
114
+		} elseif ($this->FixedWidth) {
115
+			$style .= "width: {$this->FixedWidth}px; ";
116
+		}
117
+
118
+		return $style;
119
+	}
120
+
121
+	/**
122
+	 * Ensure that the IFrameURL is a valid url and prevents XSS
123
+	 *
124
+	 * @throws ValidationException
125
+	 * @return ValidationResult
126
+	 */
127
+	public function validate()
128
+	{
129
+		$result = parent::validate();
130
+
131
+		//whitelist allowed URL schemes
132
+		$allowed_schemes = array('http', 'https');
133
+		if ($matches = parse_url($this->IFrameURL)) {
134
+			if (isset($matches['scheme']) && !in_array($matches['scheme'], $allowed_schemes)) {
135
+				$result->addError(_t(__CLASS__ . '.VALIDATION_BANNEDURLSCHEME', "This URL scheme is not allowed."));
136
+			}
137
+		}
138
+
139
+		return $result;
140
+	}
141 141
 }
Please login to merge, or discard this patch.