-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathunsafe-html_test.ts
98 lines (80 loc) · 3.28 KB
/
unsafe-html_test.ts
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
/**
* @license
* Copyright (c) 2017 The Polymer Project Authors. All rights reserved.
* This code may only be used under the BSD style license found at
* http://polymer.github.io/LICENSE.txt
* The complete set of authors may be found at
* http://polymer.github.io/AUTHORS.txt
* The complete set of contributors may be found at
* http://polymer.github.io/CONTRIBUTORS.txt
* Code distributed by Google as part of the polymer project is also
* subject to an additional IP rights grant found at
* http://polymer.github.io/PATENTS.txt
*/
import {unsafeHTML} from '../../directives/unsafe-html.js';
import {render} from '../../lib/render.js';
import {html} from '../../lit-html.js';
import {stripExpressionMarkers} from '../test-utils/strip-markers.js';
const assert = chai.assert;
// tslint:disable:no-any OK in test code.
suite('unsafeHTML', () => {
let container: HTMLElement;
setup(() => {
container = document.createElement('div');
});
test('renders HTML', () => {
render(
html`<div>before${unsafeHTML('<span>inner</span>after')}</div>`,
container);
assert.equal(
stripExpressionMarkers(container.innerHTML),
'<div>before<span>inner</span>after</div>');
});
test('dirty checks primitive values', () => {
const value = 'aaa';
const t = () => html`<div>${unsafeHTML(value)}</div>`;
// Initial render
render(t(), container);
assert.equal(stripExpressionMarkers(container.innerHTML), '<div>aaa</div>');
// Modify instance directly. Since lit-html doesn't dirty check against
// actual DOM, but again previous part values, this modification should
// persist through the next render if dirty checking works.
const text = container.querySelector('div')!.childNodes[1] as Text;
text.textContent = 'bbb';
assert.equal(stripExpressionMarkers(container.innerHTML), '<div>bbb</div>');
// Re-render with the same value
render(t(), container);
assert.equal(stripExpressionMarkers(container.innerHTML), '<div>bbb</div>');
const text2 = container.querySelector('div')!.childNodes[1] as Text;
assert.strictEqual(text, text2);
});
test('does not dirty check complex values', () => {
const value = ['aaa'];
const t = () => html`<div>${unsafeHTML(value)}</div>`;
// Initial render
render(t(), container);
assert.equal(stripExpressionMarkers(container.innerHTML), '<div>aaa</div>');
// Re-render with the same value, but a different deep property
value[0] = 'bbb';
render(t(), container);
assert.equal(stripExpressionMarkers(container.innerHTML), '<div>bbb</div>');
});
test('renders after other values', () => {
const value = '<span></span>';
const primitive = 'aaa';
const t = (content: any) => html`<div>${content}</div>`;
// Initial unsafeHTML render
render(t(unsafeHTML(value)), container);
assert.equal(
stripExpressionMarkers(container.innerHTML),
'<div><span></span></div>');
// Re-render with a non-unsafeHTML value
render(t(primitive), container);
assert.equal(stripExpressionMarkers(container.innerHTML), '<div>aaa</div>');
// Re-render with unsafeHTML again
render(t(unsafeHTML(value)), container);
assert.equal(
stripExpressionMarkers(container.innerHTML),
'<div><span></span></div>');
});
});