refactor: rename SanitizationService to Sanitizer and DomSanitizationService to DomSanitizer (#11085)
BREAKING CHANGE: Previously inconsistently named APIs SanitizationService and DomSanitizationService were renamed to Sanitizer and DomSanitizer
This commit is contained in:

committed by
Victor Berchet

parent
b867764b0d
commit
811962b2bb
@ -37,4 +37,4 @@ export * from './src/animation/metadata';
|
||||
export {AnimationTransitionEvent} from './src/animation/animation_transition_event';
|
||||
export {AnimationPlayer} from './src/animation/animation_player';
|
||||
|
||||
export {SanitizationService, SecurityContext} from './src/security';
|
||||
export {Sanitizer, SecurityContext} from './src/security';
|
||||
|
@ -15,18 +15,18 @@ import {BaseException} from '../facade/exceptions';
|
||||
import {isBlank, isPresent, looseIdentical} from '../facade/lang';
|
||||
import {ViewEncapsulation} from '../metadata/view';
|
||||
import {RenderComponentType, Renderer, RootRenderer} from '../render/api';
|
||||
import {SanitizationService} from '../security';
|
||||
import {Sanitizer} from '../security';
|
||||
import {AppElement} from './element';
|
||||
import {ExpressionChangedAfterItHasBeenCheckedException} from './exceptions';
|
||||
|
||||
@Injectable()
|
||||
export class ViewUtils {
|
||||
sanitizer: SanitizationService;
|
||||
sanitizer: Sanitizer;
|
||||
private _nextCompTypeId: number = 0;
|
||||
|
||||
constructor(
|
||||
private _renderer: RootRenderer, @Inject(APP_ID) private _appId: string,
|
||||
sanitizer: SanitizationService) {
|
||||
sanitizer: Sanitizer) {
|
||||
this.sanitizer = sanitizer;
|
||||
}
|
||||
|
||||
|
@ -11,7 +11,7 @@
|
||||
* like `innerHTML` that could cause Cross Site Scripting (XSS) security bugs when improperly
|
||||
* handled.
|
||||
*
|
||||
* See DomSanitizationService for more details on security in Angular applications.
|
||||
* See DomSanitizer for more details on security in Angular applications.
|
||||
*
|
||||
* @stable
|
||||
*/
|
||||
@ -25,10 +25,10 @@ export enum SecurityContext {
|
||||
}
|
||||
|
||||
/**
|
||||
* SanitizationService is used by the views to sanitize potentially dangerous values.
|
||||
* Sanitizer is used by the views to sanitize potentially dangerous values.
|
||||
*
|
||||
* @stable
|
||||
*/
|
||||
export abstract class SanitizationService {
|
||||
export abstract class Sanitizer {
|
||||
abstract sanitize(context: SecurityContext, value: string): string;
|
||||
}
|
||||
|
@ -10,7 +10,7 @@ import {Component} from '@angular/core/src/metadata';
|
||||
import {TestBed, getTestBed} from '@angular/core/testing';
|
||||
import {afterEach, beforeEach, beforeEachProviders, ddescribe, describe, expect, inject, it} from '@angular/core/testing/testing_internal';
|
||||
import {getDOM} from '@angular/platform-browser/src/dom/dom_adapter';
|
||||
import {DomSanitizationService} from '@angular/platform-browser/src/security/dom_sanitization_service';
|
||||
import {DomSanitizer} from '@angular/platform-browser/src/security/dom_sanitization_service';
|
||||
|
||||
export function main() {
|
||||
describe('jit', () => { declareTests({useJit: true}); });
|
||||
@ -59,7 +59,7 @@ function declareTests({useJit}: {useJit: boolean}) {
|
||||
const template = `<a [href]="ctxProp">Link Title</a>`;
|
||||
TestBed.overrideComponent(SecuredComponent, {set: {template}});
|
||||
const fixture = TestBed.createComponent(SecuredComponent);
|
||||
const sanitizer: DomSanitizationService = getTestBed().get(DomSanitizationService);
|
||||
const sanitizer: DomSanitizer = getTestBed().get(DomSanitizer);
|
||||
|
||||
let e = fixture.debugElement.children[0].nativeElement;
|
||||
let ci = fixture.debugElement.componentInstance;
|
||||
@ -73,7 +73,7 @@ function declareTests({useJit}: {useJit: boolean}) {
|
||||
const template = `<a [href]="ctxProp">Link Title</a>`;
|
||||
TestBed.overrideComponent(SecuredComponent, {set: {template}});
|
||||
const fixture = TestBed.createComponent(SecuredComponent);
|
||||
const sanitizer: DomSanitizationService = getTestBed().get(DomSanitizationService);
|
||||
const sanitizer: DomSanitizer = getTestBed().get(DomSanitizer);
|
||||
|
||||
let trusted = sanitizer.bypassSecurityTrustScript('javascript:alert(1)');
|
||||
let ci = fixture.debugElement.componentInstance;
|
||||
@ -85,7 +85,7 @@ function declareTests({useJit}: {useJit: boolean}) {
|
||||
const template = `<a href="/foo/{{ctxProp}}">Link Title</a>`;
|
||||
TestBed.overrideComponent(SecuredComponent, {set: {template}});
|
||||
const fixture = TestBed.createComponent(SecuredComponent);
|
||||
const sanitizer: DomSanitizationService = getTestBed().get(DomSanitizationService);
|
||||
const sanitizer: DomSanitizer = getTestBed().get(DomSanitizer);
|
||||
|
||||
let e = fixture.debugElement.children[0].nativeElement;
|
||||
let trusted = sanitizer.bypassSecurityTrustUrl('bar/baz');
|
||||
|
Reference in New Issue
Block a user