Commit 21196194015176edd4061a3b1381222b8daae818
Committed by
Antonio Terceiro
1 parent
2b38e038
Exists in
master
and in
29 other branches
ActionItem1176: (again) Links in WYSIWYG keep changing & to & in each edition
Showing
3 changed files
with
34 additions
and
17 deletions
Show diff stats
app/views/shared/tiny_mce.rhtml
... | ... | @@ -24,7 +24,7 @@ tinyMCE.init({ |
24 | 24 | apply_source_formatting : true, |
25 | 25 | content_css: '/stylesheets/tinymce.css', |
26 | 26 | language: <%= tinymce_language.inspect %>, |
27 | - cleanup_callback : "customCleanup" | |
27 | + entity_encoding: 'raw' | |
28 | 28 | }); |
29 | 29 | |
30 | 30 | function convertWord(type, content) { |
... | ... | @@ -43,16 +43,4 @@ function convertWord(type, content) { |
43 | 43 | return content; |
44 | 44 | } |
45 | 45 | |
46 | -function customCleanup(type, value) { | |
47 | - switch (type) { | |
48 | - case "get_from_editor": | |
49 | - value = value.replace(/&amp;/g,"&"); | |
50 | - break; | |
51 | - case "insert_to_editor": | |
52 | - value = value.replace(/&amp;/g,"&"); | |
53 | - break; | |
54 | - } | |
55 | - return value; | |
56 | -} | |
57 | - | |
58 | 46 | </script> | ... | ... |
test/unit/tiny_mce_article_test.rb
... | ... | @@ -4,7 +4,9 @@ class TinyMceArticleTest < Test::Unit::TestCase |
4 | 4 | |
5 | 5 | def setup |
6 | 6 | Article.rebuild_index |
7 | + @profile = create_user('zezinho').person | |
7 | 8 | end |
9 | + attr_reader :profile | |
8 | 10 | |
9 | 11 | # this test can be removed when we get real tests for TinyMceArticle |
10 | 12 | should 'be an article' do |
... | ... | @@ -20,16 +22,21 @@ class TinyMceArticleTest < Test::Unit::TestCase |
20 | 22 | end |
21 | 23 | |
22 | 24 | should 'be found when searching for articles by query' do |
23 | - ze = create_user('zezinho').person | |
24 | - tma = TinyMceArticle.create!(:name => 'test tinymce article', :body => '---', :profile => ze) | |
25 | + tma = TinyMceArticle.create!(:name => 'test tinymce article', :body => '---', :profile => profile) | |
25 | 26 | assert_includes TinyMceArticle.find_by_contents('article'), tma |
26 | 27 | assert_includes Article.find_by_contents('article'), tma |
27 | 28 | end |
28 | 29 | |
29 | 30 | should 'not sanitize target attribute' do |
30 | - ze = create_user('zezinho').person | |
31 | - article = TinyMceArticle.create!(:name => 'open link in new window', :body => "open <a href='www.invalid.com' target='_blank'>link</a> in new window", :profile => ze) | |
31 | + article = TinyMceArticle.create!(:name => 'open link in new window', :body => "open <a href='www.invalid.com' target='_blank'>link</a> in new window", :profile => profile) | |
32 | 32 | assert_tag_in_string article.body, :tag => 'a', :attributes => {:target => '_blank'} |
33 | 33 | end |
34 | 34 | |
35 | + should 'not translate & to amp; over times' do | |
36 | + article = TinyMceArticle.create!(:name => 'link', :body => "<a href='www.invalid.com?param1=value¶m2=value'>link</a>", :profile => profile) | |
37 | + assert article.save | |
38 | + assert_no_match /&amp;/, article.body | |
39 | + assert_match /&/, article.body | |
40 | + end | |
41 | + | |
35 | 42 | end | ... | ... |
vendor/plugins/white_list_sanitizer_unescape_before_reescape/init.rb
0 → 100644
... | ... | @@ -0,0 +1,22 @@ |
1 | +# monkey patch to fix WhiteListSanitizer bug | |
2 | +# http://apidock.com/rails/HTML/WhiteListSanitizer/process_attributes_for | |
3 | +# | |
4 | +# this was solved in rails 2.2.1, then remove this patch when upgrade to it | |
5 | + | |
6 | +HTML::WhiteListSanitizer.module_eval do | |
7 | + # unescape before reescape to avoid: | |
8 | + # & -> & -> &amp; -> &amp;amp; -> &amp;amp;amp; -> etc | |
9 | + protected | |
10 | + def process_attributes_for(node, options) | |
11 | + return unless node.attributes | |
12 | + node.attributes.keys.each do |attr_name| | |
13 | + value = node.attributes[attr_name].to_s | |
14 | + | |
15 | + if !options[:attributes].include?(attr_name) || contains_bad_protocols?(attr_name, value) | |
16 | + node.attributes.delete(attr_name) | |
17 | + else | |
18 | + node.attributes[attr_name] = attr_name == 'style' ? sanitize_css(value) : CGI::escapeHTML(CGI::unescapeHTML(value)) | |
19 | + end | |
20 | + end | |
21 | + end | |
22 | +end | ... | ... |