| Left: | ||
| Right: |
| LEFT | RIGHT |
|---|---|
| 1 # This file is part of Adblock Plus <https://adblockplus.org/>, | 1 # This file is part of Adblock Plus <https://adblockplus.org/>, |
| 2 # Copyright (C) 2006-present eyeo GmbH | 2 # Copyright (C) 2006-present eyeo GmbH |
| 3 # | 3 # |
| 4 # Adblock Plus is free software: you can redistribute it and/or modify | 4 # Adblock Plus is free software: you can redistribute it and/or modify |
| 5 # it under the terms of the GNU General Public License version 3 as | 5 # it under the terms of the GNU General Public License version 3 as |
| 6 # published by the Free Software Foundation. | 6 # published by the Free Software Foundation. |
| 7 # | 7 # |
| 8 # Adblock Plus is distributed in the hope that it will be useful, | 8 # Adblock Plus is distributed in the hope that it will be useful, |
| 9 # but WITHOUT ANY WARRANTY; without even the implied warranty of | 9 # but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 10 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | 10 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
| (...skipping 49 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 60 }, | 60 }, |
| 61 '@@http://bla$~script,~other,sitekey=foo|bar': { | 61 '@@http://bla$~script,~other,sitekey=foo|bar': { |
| 62 'selector': {'type': ST.URL_PATTERN, 'value': 'http://bla'}, | 62 'selector': {'type': ST.URL_PATTERN, 'value': 'http://bla'}, |
| 63 'action': FA.ALLOW, | 63 'action': FA.ALLOW, |
| 64 'options': [ | 64 'options': [ |
| 65 (OPT.SCRIPT, False), | 65 (OPT.SCRIPT, False), |
| 66 (OPT.OTHER, False), | 66 (OPT.OTHER, False), |
| 67 (OPT.SITEKEY, ['foo', 'bar']), | 67 (OPT.SITEKEY, ['foo', 'bar']), |
| 68 ], | 68 ], |
| 69 }, | 69 }, |
| 70 "||foo.com^$csp=script-src 'self' * 'unsafe-inline'": { | 70 "||foo.com^$csp=script-src 'self' * 'unsafe-inline',script,sitekey=foo," + |
| 71 'other,match-case,domain=foo.com': { | |
| 71 'selector': {'type': ST.URL_PATTERN, 'value': '||foo.com^'}, | 72 'selector': {'type': ST.URL_PATTERN, 'value': '||foo.com^'}, |
| 72 'action': FA.BLOCK, | 73 'action': FA.BLOCK, |
| 73 'options': [ | 74 'options': [ |
| 74 (OPT.CSP, "script-src 'self' * 'unsafe-inline'"), | 75 (OPT.CSP, "script-src 'self' * 'unsafe-inline'"), |
| 75 ], | 76 ('script', True), |
| 76 }, | 77 ('sitekey', ['foo']), |
| 77 'bla$match-case,csp=first csp,script,other,domain=foo.com,sitekey=foo': { | 78 ('other', True), |
|
Vasily Kuznetsov
2018/06/08 16:41:48
It seems like this test does more or less the sane
rhowell
2018/06/12 21:13:18
Done.
| |
| 78 'selector': {'type': ST.URL_PATTERN, 'value': 'bla'}, | |
| 79 'action': FA.BLOCK, | |
| 80 'options': [ | |
| 81 ('match-case', True), | 79 ('match-case', True), |
| 82 ('csp', 'first csp'), | |
| 83 ('script', True), | |
| 84 ('other', True), | |
| 85 ('domain', [('foo.com', True)]), | 80 ('domain', [('foo.com', True)]), |
| 86 ('sitekey', ['foo']), | |
| 87 ], | |
| 88 }, | |
| 89 'bla$~match-case,~csp=csp,~script,~other,~third-party,domain=~bar.com': { | |
| 90 'selector': {'type': ST.URL_PATTERN, 'value': 'bla'}, | |
| 91 'action': FA.BLOCK, | |
| 92 'options': [ | |
| 93 ('match-case', False), | |
| 94 ('csp=csp', False), | |
|
Vasily Kuznetsov
2018/06/08 16:41:48
Hm, I think this should be ('csp', False). I guess
rhowell
2018/06/12 21:13:18
Done.
| |
| 95 ('script', False), | |
| 96 ('other', False), | |
| 97 ('third-party', False), | |
| 98 ('domain', [('bar.com', False)]), | |
| 99 ], | 81 ], |
| 100 }, | 82 }, |
| 101 '@@bla$script,other,domain=foo.com|~bar.foo.com,csp=c s p': { | 83 '@@bla$script,other,domain=foo.com|~bar.foo.com,csp=c s p': { |
|
Vasily Kuznetsov
2018/06/08 16:41:48
This one adds testing, of a CSP option in an excep
rhowell
2018/06/12 21:13:18
I already combined the first two csp tests, so now
| |
| 102 'selector': {'type': ST.URL_PATTERN, 'value': 'bla'}, | 84 'selector': {'type': ST.URL_PATTERN, 'value': 'bla'}, |
| 103 'action': FA.ALLOW, | 85 'action': FA.ALLOW, |
| 104 'options': [ | 86 'options': [ |
| 105 ('script', True), | 87 ('script', True), |
| 106 ('other', True), | 88 ('other', True), |
| 107 ('domain', [('foo.com', True), ('bar.foo.com', False)]), | 89 ('domain', [('foo.com', True), ('bar.foo.com', False)]), |
| 108 ('csp', 'c s p'), | 90 ('csp', 'c s p'), |
| 109 ], | 91 ], |
| 110 }, | 92 }, |
| 111 # Element hiding filters and exceptions. | 93 # Element hiding filters and exceptions. |
| (...skipping 87 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 199 def test_exception_timing(): | 181 def test_exception_timing(): |
| 200 result = parse_filterlist(['! good line', '%bad line%']) | 182 result = parse_filterlist(['! good line', '%bad line%']) |
| 201 assert next(result) == Comment('good line') | 183 assert next(result) == Comment('good line') |
| 202 with pytest.raises(ParseError): | 184 with pytest.raises(ParseError): |
| 203 next(result) | 185 next(result) |
| 204 | 186 |
| 205 | 187 |
| 206 def test_parse_line_bytes(): | 188 def test_parse_line_bytes(): |
| 207 line = parse_line(b'! \xc3\xbc') | 189 line = parse_line(b'! \xc3\xbc') |
| 208 assert line.text == '\xfc' | 190 assert line.text == '\xfc' |
| LEFT | RIGHT |