Skip to content
This repository has been archived by the owner on Nov 9, 2017. It is now read-only.

Commit

Permalink
Disable CommonMark preview
Browse files Browse the repository at this point in the history
  • Loading branch information
seanf committed Jun 17, 2015
1 parent c6fb14b commit 527634b
Show file tree
Hide file tree
Showing 4 changed files with 20 additions and 1 deletion.
Expand Up @@ -497,8 +497,11 @@
</ul>
</div>

<ui:remove><!--
Preview disabled due to https://bugzilla.redhat.com/show_bug.cgi?id=1232541
<h:outputScript target="body" library="webjars" name="${commonMarkRenderer.outputScriptName}"/>
<h:outputScript target="body" library="script" name="commonmark-preview.js"/>
--></ui:remove>

<ui:include src="/WEB-INF/layout/delete_confirmation_modal.xhtml">
<ui:param name="entityType" value="#{msgs['jsf.Project']}" />
Expand Down
3 changes: 3 additions & 0 deletions zanata-war/src/main/webapp/edit_home_content.xhtml
Expand Up @@ -41,8 +41,11 @@

</div>

<ui:remove><!--
Preview disabled due to https://bugzilla.redhat.com/show_bug.cgi?id=1232541
<h:outputScript target="body" library="webjars" name="${commonMarkRenderer.outputScriptName}"/>
<h:outputScript target="body" library="script" name="commonmark-preview.js"/>
--></ui:remove>

</h:form>
</ui:define>
Expand Down
Expand Up @@ -4,7 +4,12 @@ $(function() {
var writer = new commonmark.HtmlRenderer();

function mdRender(src) {
return writer.render(reader.parse(src));
// NB Preview disabled due to https://bugzilla.redhat.com/show_bug.cgi?id=1232541
// TODO Run the HTML through a sanitiser like Google Caja JsHtmlSanitizer?
//var unsafeHtml = writer.render(reader.parse(src));
//var safeHtml = sanitizer.sanitize(unsafeHtml);
//return safeHtml;
return '';
}

var $allEditors = $('.js-commonmark__editor');
Expand Down
8 changes: 8 additions & 0 deletions zanata-war/src/test/java/org/zanata/util/HtmlUtilTest.java
Expand Up @@ -31,6 +31,14 @@
*/
public class HtmlUtilTest {

@Test
public void sanitiseLinkAddNoFollow() {
String input = "<p>Untrusted link: <a href=\"http://spam.example.com/\">Click here!</a></p>";
String expected = "<p>Untrusted link: <a href=\"http://spam.example.com/\" rel=\"nofollow\">Click here!</a></p>";
String actual = SANITIZER.sanitize(input);
assertThat(actual).isEqualTo(expected);
}

@Test
public void sanitisePlainText() {
String input = "some text";
Expand Down

0 comments on commit 527634b

Please sign in to comment.