feat: sanitize HTML in footer
moved sanitize function into a separate file including some simple tests closes #91
This commit is contained in:
committed by
Bastian
parent
5a5928f2dd
commit
e0113c446d
@@ -6,6 +6,7 @@ import { assetUrl, getItemPageNames, isMobileViewport } from "../../config";
|
||||
import { Item } from "../../model";
|
||||
import "./footer.scss";
|
||||
import { useMessages } from "../../context/MessagesContext";
|
||||
import { sanitize } from "../../sanitize";
|
||||
|
||||
interface Props {
|
||||
items: Item[];
|
||||
@@ -34,7 +35,7 @@ const Footer: React.FC<Props> = ({ items, pageName }) => {
|
||||
/>
|
||||
}
|
||||
>
|
||||
<span className="footnote">{footerFootnote}</span>
|
||||
<div className="footnote" dangerouslySetInnerHTML={sanitize(footerFootnote)}></div>
|
||||
</Branding>
|
||||
)}
|
||||
|
||||
|
||||
@@ -1,23 +1,16 @@
|
||||
import React from "react";
|
||||
import sanitizeHtml from 'sanitize-html';
|
||||
import HeroHeadline from "../HeroHeadline/HeroHeadline";
|
||||
import Fadeable from "../Fadeable/Fadeable";
|
||||
import SetTitle from "../SetTitle";
|
||||
import { radarName } from "../../config";
|
||||
import { useMessages } from "../../context/MessagesContext";
|
||||
import { sanitize } from "../../sanitize";
|
||||
|
||||
interface Props {
|
||||
leaving: boolean;
|
||||
onLeave: () => void;
|
||||
}
|
||||
|
||||
const sanitize = (dirty: string, options: sanitizeHtml.IOptions = {}) => ({
|
||||
__html: sanitizeHtml(
|
||||
dirty,
|
||||
options
|
||||
)
|
||||
});
|
||||
|
||||
const PageHelp: React.FC<Props> = ({ leaving, onLeave }) => {
|
||||
const { pageHelp } = useMessages();
|
||||
|
||||
@@ -34,12 +27,7 @@ const PageHelp: React.FC<Props> = ({ leaving, onLeave }) => {
|
||||
<h3>{headline}</h3>
|
||||
{values.map((element, index) => {
|
||||
return (
|
||||
<p key={index} dangerouslySetInnerHTML={sanitize(element, {
|
||||
allowedTags: ['b', 'i', 'em', 'strong', 'a', 'ul', 'ol', 'li'],
|
||||
allowedAttributes: {
|
||||
'a': ['href', 'target']
|
||||
},
|
||||
})}></p>
|
||||
<p key={index} dangerouslySetInnerHTML={sanitize(element)}></p>
|
||||
)
|
||||
})
|
||||
}
|
||||
@@ -50,7 +38,7 @@ const PageHelp: React.FC<Props> = ({ leaving, onLeave }) => {
|
||||
<ul>
|
||||
{quadrants.map(({ name, description }) => (
|
||||
<li key={name}>
|
||||
<strong>{name}:</strong> <span dangerouslySetInnerHTML={sanitize(description)}></span>
|
||||
<strong>{name}:</strong> <span dangerouslySetInnerHTML={sanitize(description, {})}></span>
|
||||
</li>
|
||||
))}
|
||||
</ul>
|
||||
@@ -59,7 +47,7 @@ const PageHelp: React.FC<Props> = ({ leaving, onLeave }) => {
|
||||
<ul>
|
||||
{rings.map(({ name, description }) => (
|
||||
<li key={name}>
|
||||
<strong>{name}:</strong> <span dangerouslySetInnerHTML={sanitize(description)}></span>
|
||||
<strong>{name}:</strong> <span dangerouslySetInnerHTML={sanitize(description, {})}></span>
|
||||
</li>
|
||||
))}
|
||||
</ul>
|
||||
|
||||
20
src/sanitize.test.tsx
Normal file
20
src/sanitize.test.tsx
Normal file
@@ -0,0 +1,20 @@
|
||||
import { sanitize } from "./sanitize";
|
||||
|
||||
describe("sanitize", () => {
|
||||
it("should sanitize the string input to HTML output", () => {
|
||||
let res = sanitize('foo');
|
||||
expect(res.__html).toEqual("foo");
|
||||
res = sanitize('<a href="https://example.org">Example.org</a>');
|
||||
expect(res.__html).toEqual("<a href=\"https://example.org\">Example.org</a>");
|
||||
});
|
||||
it("should not sanitize not allowed tags", () => {
|
||||
let res = sanitize('Before <iframe src="https://example.org"></iframe> After');
|
||||
expect(res.__html).toEqual("Before After");
|
||||
});
|
||||
it("should accept options for rendering", () => {
|
||||
let res = sanitize('<a href="https://example.org" target="_blank">Example.org</a>', { allowedAttributes: { a: ['href']}});
|
||||
expect(res.__html).toEqual("<a href=\"https://example.org\">Example.org</a>");
|
||||
});
|
||||
});
|
||||
|
||||
|
||||
15
src/sanitize.ts
Normal file
15
src/sanitize.ts
Normal file
@@ -0,0 +1,15 @@
|
||||
import sanitizeHtml from 'sanitize-html';
|
||||
|
||||
const defaultSanitizeOptions = {
|
||||
allowedTags: ['b', 'i', 'em', 'strong', 'a', 'ul', 'ol', 'li'],
|
||||
allowedAttributes: {
|
||||
'a': ['href', 'target']
|
||||
}
|
||||
}
|
||||
|
||||
export const sanitize = (dirty: string, options: sanitizeHtml.IOptions = defaultSanitizeOptions) => ({
|
||||
__html: sanitizeHtml(
|
||||
dirty,
|
||||
options
|
||||
)
|
||||
});
|
||||
Reference in New Issue
Block a user