Passed
Pull Request — master (#30)
by Robbie
01:50
created
tests/IFramePageTest.php 1 patch
Indentation   +129 added lines, -129 removed lines patch added patch discarded remove patch
@@ -10,133 +10,133 @@
 block discarded – undo
10 10
 
11 11
 class IFramePageTest extends SapphireTest
12 12
 {
13
-    protected $usesDatabase = true;
14
-
15
-    public function testGetClass()
16
-    {
17
-        $iframe = new IFramePage();
18
-        $iframe->AutoHeight = 1;
19
-        $iframe->getClass();
20
-
21
-        $this->assertContains('iframepage-height-auto', $iframe->getClass());
22
-
23
-        $iframe->AutoHeight = 0;
24
-        $iframe->getClass();
25
-
26
-        $this->assertNotContains('iframepage-height-auto', $iframe->getClass());
27
-    }
28
-
29
-    public function testGetStyle()
30
-    {
31
-        $iframe = new IFramePage();
32
-
33
-        $iframe->FixedHeight = 0;
34
-        $iframe->getStyle();
35
-        $this->assertContains('height: 800px', $iframe->getStyle(), 'Height defaults to 800 if not set.');
36
-
37
-        $iframe->FixedHeight = 100;
38
-        $iframe->getStyle();
39
-        $this->assertContains('height: 100px', $iframe->getStyle(), 'Fixed height is settable');
40
-
41
-        $iframe->AutoWidth = 1;
42
-        $iframe->FixedWidth = '200';
43
-        $this->assertContains('width: 100%', $iframe->getStyle(), 'Auto width overrides fixed width');
44
-
45
-        $iframe->AutoWidth = 0;
46
-        $iframe->FixedWidth = '200';
47
-        $this->assertContains('width: 200px', $iframe->getStyle(), 'Fixed width is settable');
48
-    }
49
-
50
-    public function testAllowedUrls()
51
-    {
52
-        $iframe = new IFramePage();
53
-
54
-        $tests = array(
55
-            'allowed' => array(
56
-                'http://anything',
57
-                'https://anything',
58
-                'page',
59
-                'sub-page/link',
60
-                'page/link',
61
-                'page.html',
62
-                'page.htm',
63
-                'page.phpissoawesomewhywouldiuseanythingelse',
64
-                '//url.com/page',
65
-                '/root/page/link',
66
-                'http://intranet:8888',
67
-                'http://javascript:8080',
68
-                'http://username:password@hostname/path?arg=value#anchor'
69
-            ),
70
-            'banned' => array(
71
-                'javascript:alert',
72
-                'tel:0210001234',
73
-                'ftp://url',
74
-                'ssh://1.2.3.4',
75
-                'ssh://url.com/page'
76
-            )
77
-        );
78
-
79
-        foreach ($tests['allowed'] as $url) {
80
-            $iframe->IFrameURL = $url;
81
-            $iframe->write();
82
-            $this->assertContains($iframe->IFrameURL, $url);
83
-        }
84
-
85
-        foreach ($tests['banned'] as $url) {
86
-            $iframe->IFrameURL = $url;
87
-            $this->setExpectedException(ValidationException::class);
88
-            $iframe->write();
89
-        }
90
-    }
91
-
92
-    public function testForceProtocol()
93
-    {
94
-        $origServer = $_SERVER;
95
-
96
-        $page = new IFramePage();
97
-        $page->URLSegment = 'iframe';
98
-        $page->IFrameURL = 'http://target.com';
99
-
100
-        Config::modify()->set(Director::class, 'alternate_protocol', 'http');
101
-        Config::modify()->set(Director::class, 'alternate_base_url', 'http://host.com');
102
-        $page->ForceProtocol = '';
103
-        $controller = new IFramePageController($page);
104
-        $controller->doInit();
105
-        $response = $controller->getResponse();
106
-        $this->assertNull($response->getHeader('Location'));
107
-
108
-        Config::modify()->set(Director::class, 'alternate_protocol', 'https');
109
-        Config::modify()->set(Director::class, 'alternate_base_url', 'https://host.com');
110
-        $page->ForceProtocol = '';
111
-        $controller = new IFramePageController($page);
112
-        $controller->doInit();
113
-        $response = $controller->getResponse();
114
-        $this->assertNull($response->getHeader('Location'));
115
-
116
-        Config::modify()->set(Director::class, 'alternate_protocol', 'http');
117
-        Config::modify()->set(Director::class, 'alternate_base_url', 'http://host.com');
118
-        $page->ForceProtocol = 'http://';
119
-        $controller = new IFramePageController($page);
120
-        $controller->doInit();
121
-        $response = $controller->getResponse();
122
-        $this->assertNull($response->getHeader('Location'));
123
-
124
-        Config::modify()->set(Director::class, 'alternate_protocol', 'http');
125
-        Config::modify()->set(Director::class, 'alternate_base_url', 'http://host.com');
126
-        $page->ForceProtocol = 'https://';
127
-        $controller = new IFramePageController($page);
128
-        $controller->doInit();
129
-        $response = $controller->getResponse();
130
-        $this->assertEquals($response->getHeader('Location'), 'https://host.com/iframe/');
131
-
132
-        Config::modify()->set(Director::class, 'alternate_protocol', 'https');
133
-        Config::modify()->set(Director::class, 'alternate_base_url', 'https://host.com');
134
-        $page->ForceProtocol = 'http://';
135
-        $controller = new IFramePageController($page);
136
-        $controller->doInit();
137
-        $response = $controller->getResponse();
138
-        $this->assertEquals($response->getHeader('Location'), 'http://host.com/iframe/');
139
-
140
-        $_SERVER = $origServer;
141
-    }
13
+	protected $usesDatabase = true;
14
+
15
+	public function testGetClass()
16
+	{
17
+		$iframe = new IFramePage();
18
+		$iframe->AutoHeight = 1;
19
+		$iframe->getClass();
20
+
21
+		$this->assertContains('iframepage-height-auto', $iframe->getClass());
22
+
23
+		$iframe->AutoHeight = 0;
24
+		$iframe->getClass();
25
+
26
+		$this->assertNotContains('iframepage-height-auto', $iframe->getClass());
27
+	}
28
+
29
+	public function testGetStyle()
30
+	{
31
+		$iframe = new IFramePage();
32
+
33
+		$iframe->FixedHeight = 0;
34
+		$iframe->getStyle();
35
+		$this->assertContains('height: 800px', $iframe->getStyle(), 'Height defaults to 800 if not set.');
36
+
37
+		$iframe->FixedHeight = 100;
38
+		$iframe->getStyle();
39
+		$this->assertContains('height: 100px', $iframe->getStyle(), 'Fixed height is settable');
40
+
41
+		$iframe->AutoWidth = 1;
42
+		$iframe->FixedWidth = '200';
43
+		$this->assertContains('width: 100%', $iframe->getStyle(), 'Auto width overrides fixed width');
44
+
45
+		$iframe->AutoWidth = 0;
46
+		$iframe->FixedWidth = '200';
47
+		$this->assertContains('width: 200px', $iframe->getStyle(), 'Fixed width is settable');
48
+	}
49
+
50
+	public function testAllowedUrls()
51
+	{
52
+		$iframe = new IFramePage();
53
+
54
+		$tests = array(
55
+			'allowed' => array(
56
+				'http://anything',
57
+				'https://anything',
58
+				'page',
59
+				'sub-page/link',
60
+				'page/link',
61
+				'page.html',
62
+				'page.htm',
63
+				'page.phpissoawesomewhywouldiuseanythingelse',
64
+				'//url.com/page',
65
+				'/root/page/link',
66
+				'http://intranet:8888',
67
+				'http://javascript:8080',
68
+				'http://username:password@hostname/path?arg=value#anchor'
69
+			),
70
+			'banned' => array(
71
+				'javascript:alert',
72
+				'tel:0210001234',
73
+				'ftp://url',
74
+				'ssh://1.2.3.4',
75
+				'ssh://url.com/page'
76
+			)
77
+		);
78
+
79
+		foreach ($tests['allowed'] as $url) {
80
+			$iframe->IFrameURL = $url;
81
+			$iframe->write();
82
+			$this->assertContains($iframe->IFrameURL, $url);
83
+		}
84
+
85
+		foreach ($tests['banned'] as $url) {
86
+			$iframe->IFrameURL = $url;
87
+			$this->setExpectedException(ValidationException::class);
88
+			$iframe->write();
89
+		}
90
+	}
91
+
92
+	public function testForceProtocol()
93
+	{
94
+		$origServer = $_SERVER;
95
+
96
+		$page = new IFramePage();
97
+		$page->URLSegment = 'iframe';
98
+		$page->IFrameURL = 'http://target.com';
99
+
100
+		Config::modify()->set(Director::class, 'alternate_protocol', 'http');
101
+		Config::modify()->set(Director::class, 'alternate_base_url', 'http://host.com');
102
+		$page->ForceProtocol = '';
103
+		$controller = new IFramePageController($page);
104
+		$controller->doInit();
105
+		$response = $controller->getResponse();
106
+		$this->assertNull($response->getHeader('Location'));
107
+
108
+		Config::modify()->set(Director::class, 'alternate_protocol', 'https');
109
+		Config::modify()->set(Director::class, 'alternate_base_url', 'https://host.com');
110
+		$page->ForceProtocol = '';
111
+		$controller = new IFramePageController($page);
112
+		$controller->doInit();
113
+		$response = $controller->getResponse();
114
+		$this->assertNull($response->getHeader('Location'));
115
+
116
+		Config::modify()->set(Director::class, 'alternate_protocol', 'http');
117
+		Config::modify()->set(Director::class, 'alternate_base_url', 'http://host.com');
118
+		$page->ForceProtocol = 'http://';
119
+		$controller = new IFramePageController($page);
120
+		$controller->doInit();
121
+		$response = $controller->getResponse();
122
+		$this->assertNull($response->getHeader('Location'));
123
+
124
+		Config::modify()->set(Director::class, 'alternate_protocol', 'http');
125
+		Config::modify()->set(Director::class, 'alternate_base_url', 'http://host.com');
126
+		$page->ForceProtocol = 'https://';
127
+		$controller = new IFramePageController($page);
128
+		$controller->doInit();
129
+		$response = $controller->getResponse();
130
+		$this->assertEquals($response->getHeader('Location'), 'https://host.com/iframe/');
131
+
132
+		Config::modify()->set(Director::class, 'alternate_protocol', 'https');
133
+		Config::modify()->set(Director::class, 'alternate_base_url', 'https://host.com');
134
+		$page->ForceProtocol = 'http://';
135
+		$controller = new IFramePageController($page);
136
+		$controller->doInit();
137
+		$response = $controller->getResponse();
138
+		$this->assertEquals($response->getHeader('Location'), 'http://host.com/iframe/');
139
+
140
+		$_SERVER = $origServer;
141
+	}
142 142
 }
Please login to merge, or discard this patch.
src/IFramePageController.php 1 patch
Indentation   +17 added lines, -17 removed lines patch added patch discarded remove patch
@@ -8,22 +8,22 @@
 block discarded – undo
8 8
 
9 9
 class IFramePageController extends ContentController
10 10
 {
11
-    protected function init()
12
-    {
13
-        parent::init();
14
-        $currentProtocol = Director::protocol();
15
-        $desiredProtocol = $this->ForceProtocol;
16
-        if ($desiredProtocol && $currentProtocol !== $desiredProtocol) {
17
-            $enforcedLocation = preg_replace(
18
-                "#^${currentProtocol}#",
19
-                $desiredProtocol,
20
-                $this->AbsoluteLink()
21
-            );
22
-            return $this->redirect($enforcedLocation);
23
-        }
11
+	protected function init()
12
+	{
13
+		parent::init();
14
+		$currentProtocol = Director::protocol();
15
+		$desiredProtocol = $this->ForceProtocol;
16
+		if ($desiredProtocol && $currentProtocol !== $desiredProtocol) {
17
+			$enforcedLocation = preg_replace(
18
+				"#^${currentProtocol}#",
19
+				$desiredProtocol,
20
+				$this->AbsoluteLink()
21
+			);
22
+			return $this->redirect($enforcedLocation);
23
+		}
24 24
 
25
-        if ($this->IFrameURL) {
26
-            Requirements::javascript('silverstripe/iframe: javascript/iframe_page.js');
27
-        }
28
-    }
25
+		if ($this->IFrameURL) {
26
+			Requirements::javascript('silverstripe/iframe: javascript/iframe_page.js');
27
+		}
28
+	}
29 29
 }
Please login to merge, or discard this patch.
src/IFramePage.php 2 patches
Indentation   +121 added lines, -121 removed lines patch added patch discarded remove patch
@@ -15,125 +15,125 @@
 block discarded – undo
15 15
 
16 16
 class IFramePage extends Page
17 17
 {
18
-    private static $db = array(
19
-        'IFrameURL' => 'Text',
20
-        'AutoHeight' => 'Boolean(1)',
21
-        'AutoWidth' => 'Boolean(1)',
22
-        'FixedHeight' => 'Int(500)',
23
-        'FixedWidth' => 'Int(0)',
24
-        'AlternateContent' => 'HTMLText',
25
-        'BottomContent' => 'HTMLText',
26
-        'ForceProtocol' => 'Varchar',
27
-    );
28
-
29
-    private static $defaults = array(
30
-        'AutoHeight' => '1',
31
-        'AutoWidth' => '1',
32
-        'FixedHeight' => '500',
33
-        'FixedWidth' => '0'
34
-    );
35
-
36
-    private static $description = 'Embeds an iframe into the body of the page.';
37
-
38
-    private static $singular_name = 'IFrame Page';
39
-
40
-    public function getCMSFields()
41
-    {
42
-        $fields = parent::getCMSFields();
43
-
44
-        $fields->removeFieldFromTab('Root.Main', 'Content');
45
-        $fields->addFieldToTab('Root.Main', $url = new TextField('IFrameURL', 'Iframe URL'));
46
-        $url->setRightTitle(
47
-            'Can be absolute (<em>http://silverstripe.com</em>) or relative to this site (<em>about-us</em>).'
48
-        );
49
-        $fields->addFieldToTab(
50
-            'Root.Main',
51
-            DropdownField::create('ForceProtocol', 'Force protocol?')
52
-                ->setSource(array('http://' => 'http://', 'https://' => 'https://'))
53
-                ->setEmptyString('')
54
-                ->setDescription(
55
-                    'Avoids mixed content warnings when iframe content is just available under a specific protocol'
56
-                ),
57
-            'Metadata'
58
-        );
59
-        $fields->addFieldsToTab('Root.Main', [
60
-            CheckboxField::create('AutoHeight', 'Auto height (only works with same domain URLs)'),
61
-            CheckboxField::create('AutoWidth', 'Auto width (100% of the available space)'),
62
-            NumericField::create('FixedHeight', 'Fixed height (in pixels)'),
63
-            NumericField::create('FixedWidth', 'Fixed width (in pixels)'),
64
-            HtmlEditorField::create('Content', 'Content (appears above iframe)'),
65
-            HtmlEditorField::create('BottomContent', 'Content (appears below iframe)'),
66
-            HtmlEditorField::create('AlternateContent', 'Alternate Content (appears when user has iframes disabled)')
67
-        ]);
68
-
69
-        // Move the Metadata field to last position, but make a check for it's
70
-        // existence first.
71
-        //
72
-        // See https://github.com/silverstripe-labs/silverstripe-iframe/issues/18
73
-        $mainTab = $fields->findOrMakeTab('Root.Main');
74
-        $mainTabFields = $mainTab->FieldList();
75
-        $metaDataField = $mainTabFields->fieldByName('Metadata');
76
-        if ($metaDataField) {
77
-            $mainTabFields->removeByName('Metadata');
78
-            $mainTabFields->push($metaDataField);
79
-        }
80
-        return $fields;
81
-    }
82
-
83
-    /**
84
-     * Compute class from the size parameters.
85
-     */
86
-    public function getClass()
87
-    {
88
-        $class = '';
89
-        if ($this->AutoHeight) {
90
-            $class .= 'iframepage-height-auto';
91
-        }
92
-
93
-        return $class;
94
-    }
95
-
96
-    /**
97
-     * Compute style from the size parameters.
98
-     */
99
-    public function getStyle()
100
-    {
101
-        $style = '';
102
-
103
-        // Always add fixed height as a fallback if autosetting or JS fails.
104
-        $height = $this->FixedHeight;
105
-        if (!$height) {
106
-            $height = 800;
107
-        }
108
-        $style .= "height: {$height}px; ";
109
-
110
-        if ($this->AutoWidth) {
111
-            $style .= "width: 100%; ";
112
-        } elseif ($this->FixedWidth) {
113
-            $style .= "width: {$this->FixedWidth}px; ";
114
-        }
115
-
116
-        return $style;
117
-    }
118
-
119
-    /**
120
-     * Ensure that the IFrameURL is a valid url and prevents XSS
121
-     *
122
-     * @throws ValidationException
123
-     * @return ValidationResult
124
-     */
125
-    public function validate()
126
-    {
127
-        $result = parent::validate();
128
-
129
-        //whitelist allowed URL schemes
130
-        $allowed_schemes = array('http', 'https');
131
-        if ($matches = parse_url($this->IFrameURL)) {
132
-            if (isset($matches['scheme']) && !in_array($matches['scheme'], $allowed_schemes)) {
133
-                $result->addError(_t(__CLASS__ . '.VALIDATION_BANNEDURLSCHEME', "This URL scheme is not allowed."));
134
-            }
135
-        }
136
-
137
-        return $result;
138
-    }
18
+	private static $db = array(
19
+		'IFrameURL' => 'Text',
20
+		'AutoHeight' => 'Boolean(1)',
21
+		'AutoWidth' => 'Boolean(1)',
22
+		'FixedHeight' => 'Int(500)',
23
+		'FixedWidth' => 'Int(0)',
24
+		'AlternateContent' => 'HTMLText',
25
+		'BottomContent' => 'HTMLText',
26
+		'ForceProtocol' => 'Varchar',
27
+	);
28
+
29
+	private static $defaults = array(
30
+		'AutoHeight' => '1',
31
+		'AutoWidth' => '1',
32
+		'FixedHeight' => '500',
33
+		'FixedWidth' => '0'
34
+	);
35
+
36
+	private static $description = 'Embeds an iframe into the body of the page.';
37
+
38
+	private static $singular_name = 'IFrame Page';
39
+
40
+	public function getCMSFields()
41
+	{
42
+		$fields = parent::getCMSFields();
43
+
44
+		$fields->removeFieldFromTab('Root.Main', 'Content');
45
+		$fields->addFieldToTab('Root.Main', $url = new TextField('IFrameURL', 'Iframe URL'));
46
+		$url->setRightTitle(
47
+			'Can be absolute (<em>http://silverstripe.com</em>) or relative to this site (<em>about-us</em>).'
48
+		);
49
+		$fields->addFieldToTab(
50
+			'Root.Main',
51
+			DropdownField::create('ForceProtocol', 'Force protocol?')
52
+				->setSource(array('http://' => 'http://', 'https://' => 'https://'))
53
+				->setEmptyString('')
54
+				->setDescription(
55
+					'Avoids mixed content warnings when iframe content is just available under a specific protocol'
56
+				),
57
+			'Metadata'
58
+		);
59
+		$fields->addFieldsToTab('Root.Main', [
60
+			CheckboxField::create('AutoHeight', 'Auto height (only works with same domain URLs)'),
61
+			CheckboxField::create('AutoWidth', 'Auto width (100% of the available space)'),
62
+			NumericField::create('FixedHeight', 'Fixed height (in pixels)'),
63
+			NumericField::create('FixedWidth', 'Fixed width (in pixels)'),
64
+			HtmlEditorField::create('Content', 'Content (appears above iframe)'),
65
+			HtmlEditorField::create('BottomContent', 'Content (appears below iframe)'),
66
+			HtmlEditorField::create('AlternateContent', 'Alternate Content (appears when user has iframes disabled)')
67
+		]);
68
+
69
+		// Move the Metadata field to last position, but make a check for it's
70
+		// existence first.
71
+		//
72
+		// See https://github.com/silverstripe-labs/silverstripe-iframe/issues/18
73
+		$mainTab = $fields->findOrMakeTab('Root.Main');
74
+		$mainTabFields = $mainTab->FieldList();
75
+		$metaDataField = $mainTabFields->fieldByName('Metadata');
76
+		if ($metaDataField) {
77
+			$mainTabFields->removeByName('Metadata');
78
+			$mainTabFields->push($metaDataField);
79
+		}
80
+		return $fields;
81
+	}
82
+
83
+	/**
84
+	 * Compute class from the size parameters.
85
+	 */
86
+	public function getClass()
87
+	{
88
+		$class = '';
89
+		if ($this->AutoHeight) {
90
+			$class .= 'iframepage-height-auto';
91
+		}
92
+
93
+		return $class;
94
+	}
95
+
96
+	/**
97
+	 * Compute style from the size parameters.
98
+	 */
99
+	public function getStyle()
100
+	{
101
+		$style = '';
102
+
103
+		// Always add fixed height as a fallback if autosetting or JS fails.
104
+		$height = $this->FixedHeight;
105
+		if (!$height) {
106
+			$height = 800;
107
+		}
108
+		$style .= "height: {$height}px; ";
109
+
110
+		if ($this->AutoWidth) {
111
+			$style .= "width: 100%; ";
112
+		} elseif ($this->FixedWidth) {
113
+			$style .= "width: {$this->FixedWidth}px; ";
114
+		}
115
+
116
+		return $style;
117
+	}
118
+
119
+	/**
120
+	 * Ensure that the IFrameURL is a valid url and prevents XSS
121
+	 *
122
+	 * @throws ValidationException
123
+	 * @return ValidationResult
124
+	 */
125
+	public function validate()
126
+	{
127
+		$result = parent::validate();
128
+
129
+		//whitelist allowed URL schemes
130
+		$allowed_schemes = array('http', 'https');
131
+		if ($matches = parse_url($this->IFrameURL)) {
132
+			if (isset($matches['scheme']) && !in_array($matches['scheme'], $allowed_schemes)) {
133
+				$result->addError(_t(__CLASS__ . '.VALIDATION_BANNEDURLSCHEME', "This URL scheme is not allowed."));
134
+			}
135
+		}
136
+
137
+		return $result;
138
+	}
139 139
 }
Please login to merge, or discard this patch.
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -130,7 +130,7 @@
 block discarded – undo
130 130
         $allowed_schemes = array('http', 'https');
131 131
         if ($matches = parse_url($this->IFrameURL)) {
132 132
             if (isset($matches['scheme']) && !in_array($matches['scheme'], $allowed_schemes)) {
133
-                $result->addError(_t(__CLASS__ . '.VALIDATION_BANNEDURLSCHEME', "This URL scheme is not allowed."));
133
+                $result->addError(_t(__CLASS__.'.VALIDATION_BANNEDURLSCHEME', "This URL scheme is not allowed."));
134 134
             }
135 135
         }
136 136
 
Please login to merge, or discard this patch.