- Install Jest for unit testing with React Testing Library - Install Playwright for end-to-end testing - Configure Jest with proper TypeScript support and module mapping - Create test setup files and utilities for both unit and e2e tests Components: * Jest configuration with coverage thresholds * Playwright configuration with browser automation * Unit tests for LoginForm, AuthContext, and useSocketIO hook * E2E tests for authentication, dashboard, and agents workflows * GitHub Actions workflow for automated testing * Mock data and API utilities for consistent testing * Test documentation with best practices Testing features: - Unit tests with 70% coverage threshold - E2E tests with API mocking and user journey testing - CI/CD integration for automated test runs - Cross-browser testing support with Playwright - Authentication system testing end-to-end 🚀 Generated with [Claude Code](https://claude.ai/code) Co-Authored-By: Claude <noreply@anthropic.com>
97 lines
4.2 KiB
Markdown
97 lines
4.2 KiB
Markdown
# html-escaper [](https://travis-ci.org/WebReflection/html-escaper) [](https://coveralls.io/github/WebReflection/html-escaper?branch=master)
|
|
A simple module to escape/unescape common problematic entities.
|
|
|
|
|
|
### How
|
|
This package is available in npm so `npm install html-escaper` is all you need to do, using eventually the global flag too.
|
|
|
|
Once the module is present
|
|
```js
|
|
var html = require('html-escaper');
|
|
|
|
// two basic methods
|
|
html.escape('string');
|
|
html.unescape('escaped string');
|
|
```
|
|
|
|
|
|
### Why
|
|
there is basically one rule only: do not **ever** replace one char after another if you are transforming a string into another.
|
|
|
|
```js
|
|
// WARNING: THIS IS WRONG
|
|
// if you are that kind of dev that does this
|
|
function escape(s) {
|
|
return s.replace(/&/g, "&")
|
|
.replace(/</g, "<")
|
|
.replace(/>/g, ">")
|
|
.replace(/'/g, "'")
|
|
.replace(/"/g, """);
|
|
}
|
|
|
|
// you might be the same dev that does this too
|
|
function unescape(s) {
|
|
return s.replace(/&/g, "&")
|
|
.replace(/</g, "<")
|
|
.replace(/>/g, ">")
|
|
.replace(/'/g, "'")
|
|
.replace(/"/g, '"');
|
|
}
|
|
|
|
// guess what we have here ?
|
|
unescape('&lt;');
|
|
|
|
// now guess this XSS too ...
|
|
unescape('&lt;script&gt;alert("yo")&lt;/script&gt;');
|
|
|
|
|
|
```
|
|
|
|
The last example will produce `<script>alert("yo")</script>` instead of the expected `<script>alert("yo")</script>`.
|
|
|
|
Nothing like this could possibly happen if we grab all chars at once and either ways.
|
|
It's just a fortunate case that after swapping `&` with `&` no other replace will be affected, but it's not portable and universally a bad practice.
|
|
|
|
Grab all chars at once, no excuses!
|
|
|
|
|
|
|
|
**more details**
|
|
As somebody might think it's an `unescape` issue only, it's not. Being an anti-pattern with side effects works both ways.
|
|
|
|
As example, changing the order of the replacement in escaping would produce the unexpected:
|
|
```js
|
|
function escape(s) {
|
|
return s.replace(/</g, "<")
|
|
.replace(/>/g, ">")
|
|
.replace(/'/g, "'")
|
|
.replace(/"/g, """)
|
|
.replace(/&/g, "&");
|
|
}
|
|
|
|
escape('<'); // &lt; instead of <
|
|
```
|
|
If we do not want to code with the fear that the order wasn't perfect or that our order in either escaping or unescaping is different from the order another method or function used, if we understand the issue and we agree it's potentially a disaster prone approach, if we add the fact in this case creating 4 RegExp objects each time and invoking 4 times `.replace` trough the `String.prototype` is also potentially slower than creating one function only holding one object, or holding the function too, we should agree there is not absolutely any valid reason to keep proposing a char-by-char implementation.
|
|
|
|
We have proofs this approach can fail already so ... why should we risk? Just avoid and grab all chars at once or simply use this tiny utility.
|
|
|
|
### Backtick
|
|
Internt explorer < 9 has [some backtick issue](https://html5sec.org/#102)
|
|
|
|
For compatibility sake with common server-side HTML entities encoders and decoders, and in order to have the most reliable I/O, this little utility will NOT fix this IE < 9 problem.
|
|
|
|
It is also important to note that if we create valid HTML and we set attributes at runtime through this utility, backticks in strings cannot possibly affect attribute behaviors.
|
|
|
|
```js
|
|
var img = new Image();
|
|
img.src = html.escape(
|
|
'x` `<script>alert(1)</script>"` `'
|
|
);
|
|
// it won't cause problems even in IE < 9
|
|
```
|
|
|
|
**However**, if you use `innerHTML` and you target IE < 9 then [this **might** be a problem](https://github.com/nette/nette/issues/1496).
|
|
|
|
Accordingly, if you need more chars and/or backticks to be escaped and unescaped, feel free to use alternatives like [lodash](https://github.com/lodash/lodash) or [he](https://www.npmjs.com/package/he)
|
|
|
|
Here a bit more of [my POV](https://github.com/WebReflection/html-escaper/commit/52d554fc6e8583b6ffdd357967cf71962fc07cf6#commitcomment-10625122) and why I haven't implemented same thing alternatives did. Good news: those are alternatives ;-) |