angular-gem 1.2.21 → 1.2.22

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,647 @@
1
+ /**
2
+ * @license AngularJS v1.2.22
3
+ * (c) 2010-2014 Google, Inc. http://angularjs.org
4
+ * License: MIT
5
+ */
6
+ (function(window, angular, undefined) {'use strict';
7
+
8
+ var $sanitizeMinErr = angular.$$minErr('$sanitize');
9
+
10
+ /**
11
+ * @ngdoc module
12
+ * @name ngSanitize
13
+ * @description
14
+ *
15
+ * # ngSanitize
16
+ *
17
+ * The `ngSanitize` module provides functionality to sanitize HTML.
18
+ *
19
+ *
20
+ * <div doc-module-components="ngSanitize"></div>
21
+ *
22
+ * See {@link ngSanitize.$sanitize `$sanitize`} for usage.
23
+ */
24
+
25
+ /*
26
+ * HTML Parser By Misko Hevery (misko@hevery.com)
27
+ * based on: HTML Parser By John Resig (ejohn.org)
28
+ * Original code by Erik Arvidsson, Mozilla Public License
29
+ * http://erik.eae.net/simplehtmlparser/simplehtmlparser.js
30
+ *
31
+ * // Use like so:
32
+ * htmlParser(htmlString, {
33
+ * start: function(tag, attrs, unary) {},
34
+ * end: function(tag) {},
35
+ * chars: function(text) {},
36
+ * comment: function(text) {}
37
+ * });
38
+ *
39
+ */
40
+
41
+
42
+ /**
43
+ * @ngdoc service
44
+ * @name $sanitize
45
+ * @kind function
46
+ *
47
+ * @description
48
+ * The input is sanitized by parsing the html into tokens. All safe tokens (from a whitelist) are
49
+ * then serialized back to properly escaped html string. This means that no unsafe input can make
50
+ * it into the returned string, however, since our parser is more strict than a typical browser
51
+ * parser, it's possible that some obscure input, which would be recognized as valid HTML by a
52
+ * browser, won't make it through the sanitizer.
53
+ * The whitelist is configured using the functions `aHrefSanitizationWhitelist` and
54
+ * `imgSrcSanitizationWhitelist` of {@link ng.$compileProvider `$compileProvider`}.
55
+ *
56
+ * @param {string} html Html input.
57
+ * @returns {string} Sanitized html.
58
+ *
59
+ * @example
60
+ <example module="sanitizeExample" deps="angular-sanitize.js">
61
+ <file name="index.html">
62
+ <script>
63
+ angular.module('sanitizeExample', ['ngSanitize'])
64
+ .controller('ExampleController', ['$scope', '$sce', function($scope, $sce) {
65
+ $scope.snippet =
66
+ '<p style="color:blue">an html\n' +
67
+ '<em onmouseover="this.textContent=\'PWN3D!\'">click here</em>\n' +
68
+ 'snippet</p>';
69
+ $scope.deliberatelyTrustDangerousSnippet = function() {
70
+ return $sce.trustAsHtml($scope.snippet);
71
+ };
72
+ }]);
73
+ </script>
74
+ <div ng-controller="ExampleController">
75
+ Snippet: <textarea ng-model="snippet" cols="60" rows="3"></textarea>
76
+ <table>
77
+ <tr>
78
+ <td>Directive</td>
79
+ <td>How</td>
80
+ <td>Source</td>
81
+ <td>Rendered</td>
82
+ </tr>
83
+ <tr id="bind-html-with-sanitize">
84
+ <td>ng-bind-html</td>
85
+ <td>Automatically uses $sanitize</td>
86
+ <td><pre>&lt;div ng-bind-html="snippet"&gt;<br/>&lt;/div&gt;</pre></td>
87
+ <td><div ng-bind-html="snippet"></div></td>
88
+ </tr>
89
+ <tr id="bind-html-with-trust">
90
+ <td>ng-bind-html</td>
91
+ <td>Bypass $sanitize by explicitly trusting the dangerous value</td>
92
+ <td>
93
+ <pre>&lt;div ng-bind-html="deliberatelyTrustDangerousSnippet()"&gt;
94
+ &lt;/div&gt;</pre>
95
+ </td>
96
+ <td><div ng-bind-html="deliberatelyTrustDangerousSnippet()"></div></td>
97
+ </tr>
98
+ <tr id="bind-default">
99
+ <td>ng-bind</td>
100
+ <td>Automatically escapes</td>
101
+ <td><pre>&lt;div ng-bind="snippet"&gt;<br/>&lt;/div&gt;</pre></td>
102
+ <td><div ng-bind="snippet"></div></td>
103
+ </tr>
104
+ </table>
105
+ </div>
106
+ </file>
107
+ <file name="protractor.js" type="protractor">
108
+ it('should sanitize the html snippet by default', function() {
109
+ expect(element(by.css('#bind-html-with-sanitize div')).getInnerHtml()).
110
+ toBe('<p>an html\n<em>click here</em>\nsnippet</p>');
111
+ });
112
+
113
+ it('should inline raw snippet if bound to a trusted value', function() {
114
+ expect(element(by.css('#bind-html-with-trust div')).getInnerHtml()).
115
+ toBe("<p style=\"color:blue\">an html\n" +
116
+ "<em onmouseover=\"this.textContent='PWN3D!'\">click here</em>\n" +
117
+ "snippet</p>");
118
+ });
119
+
120
+ it('should escape snippet without any filter', function() {
121
+ expect(element(by.css('#bind-default div')).getInnerHtml()).
122
+ toBe("&lt;p style=\"color:blue\"&gt;an html\n" +
123
+ "&lt;em onmouseover=\"this.textContent='PWN3D!'\"&gt;click here&lt;/em&gt;\n" +
124
+ "snippet&lt;/p&gt;");
125
+ });
126
+
127
+ it('should update', function() {
128
+ element(by.model('snippet')).clear();
129
+ element(by.model('snippet')).sendKeys('new <b onclick="alert(1)">text</b>');
130
+ expect(element(by.css('#bind-html-with-sanitize div')).getInnerHtml()).
131
+ toBe('new <b>text</b>');
132
+ expect(element(by.css('#bind-html-with-trust div')).getInnerHtml()).toBe(
133
+ 'new <b onclick="alert(1)">text</b>');
134
+ expect(element(by.css('#bind-default div')).getInnerHtml()).toBe(
135
+ "new &lt;b onclick=\"alert(1)\"&gt;text&lt;/b&gt;");
136
+ });
137
+ </file>
138
+ </example>
139
+ */
140
+ function $SanitizeProvider() {
141
+ this.$get = ['$$sanitizeUri', function($$sanitizeUri) {
142
+ return function(html) {
143
+ var buf = [];
144
+ htmlParser(html, htmlSanitizeWriter(buf, function(uri, isImage) {
145
+ return !/^unsafe/.test($$sanitizeUri(uri, isImage));
146
+ }));
147
+ return buf.join('');
148
+ };
149
+ }];
150
+ }
151
+
152
+ function sanitizeText(chars) {
153
+ var buf = [];
154
+ var writer = htmlSanitizeWriter(buf, angular.noop);
155
+ writer.chars(chars);
156
+ return buf.join('');
157
+ }
158
+
159
+
160
+ // Regular Expressions for parsing tags and attributes
161
+ var START_TAG_REGEXP =
162
+ /^<((?:[a-zA-Z])[\w:-]*)((?:\s+[\w:-]+(?:\s*=\s*(?:(?:"[^"]*")|(?:'[^']*')|[^>\s]+))?)*)\s*(\/?)\s*(>?)/,
163
+ END_TAG_REGEXP = /^<\/\s*([\w:-]+)[^>]*>/,
164
+ ATTR_REGEXP = /([\w:-]+)(?:\s*=\s*(?:(?:"((?:[^"])*)")|(?:'((?:[^'])*)')|([^>\s]+)))?/g,
165
+ BEGIN_TAG_REGEXP = /^</,
166
+ BEGING_END_TAGE_REGEXP = /^<\//,
167
+ COMMENT_REGEXP = /<!--(.*?)-->/g,
168
+ DOCTYPE_REGEXP = /<!DOCTYPE([^>]*?)>/i,
169
+ CDATA_REGEXP = /<!\[CDATA\[(.*?)]]>/g,
170
+ SURROGATE_PAIR_REGEXP = /[\uD800-\uDBFF][\uDC00-\uDFFF]/g,
171
+ // Match everything outside of normal chars and " (quote character)
172
+ NON_ALPHANUMERIC_REGEXP = /([^\#-~| |!])/g;
173
+
174
+
175
+ // Good source of info about elements and attributes
176
+ // http://dev.w3.org/html5/spec/Overview.html#semantics
177
+ // http://simon.html5.org/html-elements
178
+
179
+ // Safe Void Elements - HTML5
180
+ // http://dev.w3.org/html5/spec/Overview.html#void-elements
181
+ var voidElements = makeMap("area,br,col,hr,img,wbr");
182
+
183
+ // Elements that you can, intentionally, leave open (and which close themselves)
184
+ // http://dev.w3.org/html5/spec/Overview.html#optional-tags
185
+ var optionalEndTagBlockElements = makeMap("colgroup,dd,dt,li,p,tbody,td,tfoot,th,thead,tr"),
186
+ optionalEndTagInlineElements = makeMap("rp,rt"),
187
+ optionalEndTagElements = angular.extend({},
188
+ optionalEndTagInlineElements,
189
+ optionalEndTagBlockElements);
190
+
191
+ // Safe Block Elements - HTML5
192
+ var blockElements = angular.extend({}, optionalEndTagBlockElements, makeMap("address,article," +
193
+ "aside,blockquote,caption,center,del,dir,div,dl,figure,figcaption,footer,h1,h2,h3,h4,h5," +
194
+ "h6,header,hgroup,hr,ins,map,menu,nav,ol,pre,script,section,table,ul"));
195
+
196
+ // Inline Elements - HTML5
197
+ var inlineElements = angular.extend({}, optionalEndTagInlineElements, makeMap("a,abbr,acronym,b," +
198
+ "bdi,bdo,big,br,cite,code,del,dfn,em,font,i,img,ins,kbd,label,map,mark,q,ruby,rp,rt,s," +
199
+ "samp,small,span,strike,strong,sub,sup,time,tt,u,var"));
200
+
201
+
202
+ // Special Elements (can contain anything)
203
+ var specialElements = makeMap("script,style");
204
+
205
+ var validElements = angular.extend({},
206
+ voidElements,
207
+ blockElements,
208
+ inlineElements,
209
+ optionalEndTagElements);
210
+
211
+ //Attributes that have href and hence need to be sanitized
212
+ var uriAttrs = makeMap("background,cite,href,longdesc,src,usemap");
213
+ var validAttrs = angular.extend({}, uriAttrs, makeMap(
214
+ 'abbr,align,alt,axis,bgcolor,border,cellpadding,cellspacing,class,clear,'+
215
+ 'color,cols,colspan,compact,coords,dir,face,headers,height,hreflang,hspace,'+
216
+ 'ismap,lang,language,nohref,nowrap,rel,rev,rows,rowspan,rules,'+
217
+ 'scope,scrolling,shape,size,span,start,summary,target,title,type,'+
218
+ 'valign,value,vspace,width'));
219
+
220
+ function makeMap(str) {
221
+ var obj = {}, items = str.split(','), i;
222
+ for (i = 0; i < items.length; i++) obj[items[i]] = true;
223
+ return obj;
224
+ }
225
+
226
+
227
+ /**
228
+ * @example
229
+ * htmlParser(htmlString, {
230
+ * start: function(tag, attrs, unary) {},
231
+ * end: function(tag) {},
232
+ * chars: function(text) {},
233
+ * comment: function(text) {}
234
+ * });
235
+ *
236
+ * @param {string} html string
237
+ * @param {object} handler
238
+ */
239
+ function htmlParser( html, handler ) {
240
+ if (typeof html !== 'string') {
241
+ if (html === null || typeof html === 'undefined') {
242
+ html = '';
243
+ } else {
244
+ html = '' + html;
245
+ }
246
+ }
247
+ var index, chars, match, stack = [], last = html, text;
248
+ stack.last = function() { return stack[ stack.length - 1 ]; };
249
+
250
+ while ( html ) {
251
+ text = '';
252
+ chars = true;
253
+
254
+ // Make sure we're not in a script or style element
255
+ if ( !stack.last() || !specialElements[ stack.last() ] ) {
256
+
257
+ // Comment
258
+ if ( html.indexOf("<!--") === 0 ) {
259
+ // comments containing -- are not allowed unless they terminate the comment
260
+ index = html.indexOf("--", 4);
261
+
262
+ if ( index >= 0 && html.lastIndexOf("-->", index) === index) {
263
+ if (handler.comment) handler.comment( html.substring( 4, index ) );
264
+ html = html.substring( index + 3 );
265
+ chars = false;
266
+ }
267
+ // DOCTYPE
268
+ } else if ( DOCTYPE_REGEXP.test(html) ) {
269
+ match = html.match( DOCTYPE_REGEXP );
270
+
271
+ if ( match ) {
272
+ html = html.replace( match[0], '');
273
+ chars = false;
274
+ }
275
+ // end tag
276
+ } else if ( BEGING_END_TAGE_REGEXP.test(html) ) {
277
+ match = html.match( END_TAG_REGEXP );
278
+
279
+ if ( match ) {
280
+ html = html.substring( match[0].length );
281
+ match[0].replace( END_TAG_REGEXP, parseEndTag );
282
+ chars = false;
283
+ }
284
+
285
+ // start tag
286
+ } else if ( BEGIN_TAG_REGEXP.test(html) ) {
287
+ match = html.match( START_TAG_REGEXP );
288
+
289
+ if ( match ) {
290
+ // We only have a valid start-tag if there is a '>'.
291
+ if ( match[4] ) {
292
+ html = html.substring( match[0].length );
293
+ match[0].replace( START_TAG_REGEXP, parseStartTag );
294
+ }
295
+ chars = false;
296
+ } else {
297
+ // no ending tag found --- this piece should be encoded as an entity.
298
+ text += '<';
299
+ html = html.substring(1);
300
+ }
301
+ }
302
+
303
+ if ( chars ) {
304
+ index = html.indexOf("<");
305
+
306
+ text += index < 0 ? html : html.substring( 0, index );
307
+ html = index < 0 ? "" : html.substring( index );
308
+
309
+ if (handler.chars) handler.chars( decodeEntities(text) );
310
+ }
311
+
312
+ } else {
313
+ html = html.replace(new RegExp("(.*)<\\s*\\/\\s*" + stack.last() + "[^>]*>", 'i'),
314
+ function(all, text){
315
+ text = text.replace(COMMENT_REGEXP, "$1").replace(CDATA_REGEXP, "$1");
316
+
317
+ if (handler.chars) handler.chars( decodeEntities(text) );
318
+
319
+ return "";
320
+ });
321
+
322
+ parseEndTag( "", stack.last() );
323
+ }
324
+
325
+ if ( html == last ) {
326
+ throw $sanitizeMinErr('badparse', "The sanitizer was unable to parse the following block " +
327
+ "of html: {0}", html);
328
+ }
329
+ last = html;
330
+ }
331
+
332
+ // Clean up any remaining tags
333
+ parseEndTag();
334
+
335
+ function parseStartTag( tag, tagName, rest, unary ) {
336
+ tagName = angular.lowercase(tagName);
337
+ if ( blockElements[ tagName ] ) {
338
+ while ( stack.last() && inlineElements[ stack.last() ] ) {
339
+ parseEndTag( "", stack.last() );
340
+ }
341
+ }
342
+
343
+ if ( optionalEndTagElements[ tagName ] && stack.last() == tagName ) {
344
+ parseEndTag( "", tagName );
345
+ }
346
+
347
+ unary = voidElements[ tagName ] || !!unary;
348
+
349
+ if ( !unary )
350
+ stack.push( tagName );
351
+
352
+ var attrs = {};
353
+
354
+ rest.replace(ATTR_REGEXP,
355
+ function(match, name, doubleQuotedValue, singleQuotedValue, unquotedValue) {
356
+ var value = doubleQuotedValue
357
+ || singleQuotedValue
358
+ || unquotedValue
359
+ || '';
360
+
361
+ attrs[name] = decodeEntities(value);
362
+ });
363
+ if (handler.start) handler.start( tagName, attrs, unary );
364
+ }
365
+
366
+ function parseEndTag( tag, tagName ) {
367
+ var pos = 0, i;
368
+ tagName = angular.lowercase(tagName);
369
+ if ( tagName )
370
+ // Find the closest opened tag of the same type
371
+ for ( pos = stack.length - 1; pos >= 0; pos-- )
372
+ if ( stack[ pos ] == tagName )
373
+ break;
374
+
375
+ if ( pos >= 0 ) {
376
+ // Close all the open elements, up the stack
377
+ for ( i = stack.length - 1; i >= pos; i-- )
378
+ if (handler.end) handler.end( stack[ i ] );
379
+
380
+ // Remove the open elements from the stack
381
+ stack.length = pos;
382
+ }
383
+ }
384
+ }
385
+
386
+ var hiddenPre=document.createElement("pre");
387
+ var spaceRe = /^(\s*)([\s\S]*?)(\s*)$/;
388
+ /**
389
+ * decodes all entities into regular string
390
+ * @param value
391
+ * @returns {string} A string with decoded entities.
392
+ */
393
+ function decodeEntities(value) {
394
+ if (!value) { return ''; }
395
+
396
+ // Note: IE8 does not preserve spaces at the start/end of innerHTML
397
+ // so we must capture them and reattach them afterward
398
+ var parts = spaceRe.exec(value);
399
+ var spaceBefore = parts[1];
400
+ var spaceAfter = parts[3];
401
+ var content = parts[2];
402
+ if (content) {
403
+ hiddenPre.innerHTML=content.replace(/</g,"&lt;");
404
+ // innerText depends on styling as it doesn't display hidden elements.
405
+ // Therefore, it's better to use textContent not to cause unnecessary
406
+ // reflows. However, IE<9 don't support textContent so the innerText
407
+ // fallback is necessary.
408
+ content = 'textContent' in hiddenPre ?
409
+ hiddenPre.textContent : hiddenPre.innerText;
410
+ }
411
+ return spaceBefore + content + spaceAfter;
412
+ }
413
+
414
+ /**
415
+ * Escapes all potentially dangerous characters, so that the
416
+ * resulting string can be safely inserted into attribute or
417
+ * element text.
418
+ * @param value
419
+ * @returns {string} escaped text
420
+ */
421
+ function encodeEntities(value) {
422
+ return value.
423
+ replace(/&/g, '&amp;').
424
+ replace(SURROGATE_PAIR_REGEXP, function (value) {
425
+ var hi = value.charCodeAt(0);
426
+ var low = value.charCodeAt(1);
427
+ return '&#' + (((hi - 0xD800) * 0x400) + (low - 0xDC00) + 0x10000) + ';';
428
+ }).
429
+ replace(NON_ALPHANUMERIC_REGEXP, function(value){
430
+ return '&#' + value.charCodeAt(0) + ';';
431
+ }).
432
+ replace(/</g, '&lt;').
433
+ replace(/>/g, '&gt;');
434
+ }
435
+
436
+ /**
437
+ * create an HTML/XML writer which writes to buffer
438
+ * @param {Array} buf use buf.jain('') to get out sanitized html string
439
+ * @returns {object} in the form of {
440
+ * start: function(tag, attrs, unary) {},
441
+ * end: function(tag) {},
442
+ * chars: function(text) {},
443
+ * comment: function(text) {}
444
+ * }
445
+ */
446
+ function htmlSanitizeWriter(buf, uriValidator){
447
+ var ignore = false;
448
+ var out = angular.bind(buf, buf.push);
449
+ return {
450
+ start: function(tag, attrs, unary){
451
+ tag = angular.lowercase(tag);
452
+ if (!ignore && specialElements[tag]) {
453
+ ignore = tag;
454
+ }
455
+ if (!ignore && validElements[tag] === true) {
456
+ out('<');
457
+ out(tag);
458
+ angular.forEach(attrs, function(value, key){
459
+ var lkey=angular.lowercase(key);
460
+ var isImage = (tag === 'img' && lkey === 'src') || (lkey === 'background');
461
+ if (validAttrs[lkey] === true &&
462
+ (uriAttrs[lkey] !== true || uriValidator(value, isImage))) {
463
+ out(' ');
464
+ out(key);
465
+ out('="');
466
+ out(encodeEntities(value));
467
+ out('"');
468
+ }
469
+ });
470
+ out(unary ? '/>' : '>');
471
+ }
472
+ },
473
+ end: function(tag){
474
+ tag = angular.lowercase(tag);
475
+ if (!ignore && validElements[tag] === true) {
476
+ out('</');
477
+ out(tag);
478
+ out('>');
479
+ }
480
+ if (tag == ignore) {
481
+ ignore = false;
482
+ }
483
+ },
484
+ chars: function(chars){
485
+ if (!ignore) {
486
+ out(encodeEntities(chars));
487
+ }
488
+ }
489
+ };
490
+ }
491
+
492
+
493
+ // define ngSanitize module and register $sanitize service
494
+ angular.module('ngSanitize', []).provider('$sanitize', $SanitizeProvider);
495
+
496
+ /* global sanitizeText: false */
497
+
498
+ /**
499
+ * @ngdoc filter
500
+ * @name linky
501
+ * @kind function
502
+ *
503
+ * @description
504
+ * Finds links in text input and turns them into html links. Supports http/https/ftp/mailto and
505
+ * plain email address links.
506
+ *
507
+ * Requires the {@link ngSanitize `ngSanitize`} module to be installed.
508
+ *
509
+ * @param {string} text Input text.
510
+ * @param {string} target Window (_blank|_self|_parent|_top) or named frame to open links in.
511
+ * @returns {string} Html-linkified text.
512
+ *
513
+ * @usage
514
+ <span ng-bind-html="linky_expression | linky"></span>
515
+ *
516
+ * @example
517
+ <example module="linkyExample" deps="angular-sanitize.js">
518
+ <file name="index.html">
519
+ <script>
520
+ angular.module('linkyExample', ['ngSanitize'])
521
+ .controller('ExampleController', ['$scope', function($scope) {
522
+ $scope.snippet =
523
+ 'Pretty text with some links:\n'+
524
+ 'http://angularjs.org/,\n'+
525
+ 'mailto:us@somewhere.org,\n'+
526
+ 'another@somewhere.org,\n'+
527
+ 'and one more: ftp://127.0.0.1/.';
528
+ $scope.snippetWithTarget = 'http://angularjs.org/';
529
+ }]);
530
+ </script>
531
+ <div ng-controller="ExampleController">
532
+ Snippet: <textarea ng-model="snippet" cols="60" rows="3"></textarea>
533
+ <table>
534
+ <tr>
535
+ <td>Filter</td>
536
+ <td>Source</td>
537
+ <td>Rendered</td>
538
+ </tr>
539
+ <tr id="linky-filter">
540
+ <td>linky filter</td>
541
+ <td>
542
+ <pre>&lt;div ng-bind-html="snippet | linky"&gt;<br>&lt;/div&gt;</pre>
543
+ </td>
544
+ <td>
545
+ <div ng-bind-html="snippet | linky"></div>
546
+ </td>
547
+ </tr>
548
+ <tr id="linky-target">
549
+ <td>linky target</td>
550
+ <td>
551
+ <pre>&lt;div ng-bind-html="snippetWithTarget | linky:'_blank'"&gt;<br>&lt;/div&gt;</pre>
552
+ </td>
553
+ <td>
554
+ <div ng-bind-html="snippetWithTarget | linky:'_blank'"></div>
555
+ </td>
556
+ </tr>
557
+ <tr id="escaped-html">
558
+ <td>no filter</td>
559
+ <td><pre>&lt;div ng-bind="snippet"&gt;<br>&lt;/div&gt;</pre></td>
560
+ <td><div ng-bind="snippet"></div></td>
561
+ </tr>
562
+ </table>
563
+ </file>
564
+ <file name="protractor.js" type="protractor">
565
+ it('should linkify the snippet with urls', function() {
566
+ expect(element(by.id('linky-filter')).element(by.binding('snippet | linky')).getText()).
567
+ toBe('Pretty text with some links: http://angularjs.org/, us@somewhere.org, ' +
568
+ 'another@somewhere.org, and one more: ftp://127.0.0.1/.');
569
+ expect(element.all(by.css('#linky-filter a')).count()).toEqual(4);
570
+ });
571
+
572
+ it('should not linkify snippet without the linky filter', function() {
573
+ expect(element(by.id('escaped-html')).element(by.binding('snippet')).getText()).
574
+ toBe('Pretty text with some links: http://angularjs.org/, mailto:us@somewhere.org, ' +
575
+ 'another@somewhere.org, and one more: ftp://127.0.0.1/.');
576
+ expect(element.all(by.css('#escaped-html a')).count()).toEqual(0);
577
+ });
578
+
579
+ it('should update', function() {
580
+ element(by.model('snippet')).clear();
581
+ element(by.model('snippet')).sendKeys('new http://link.');
582
+ expect(element(by.id('linky-filter')).element(by.binding('snippet | linky')).getText()).
583
+ toBe('new http://link.');
584
+ expect(element.all(by.css('#linky-filter a')).count()).toEqual(1);
585
+ expect(element(by.id('escaped-html')).element(by.binding('snippet')).getText())
586
+ .toBe('new http://link.');
587
+ });
588
+
589
+ it('should work with the target property', function() {
590
+ expect(element(by.id('linky-target')).
591
+ element(by.binding("snippetWithTarget | linky:'_blank'")).getText()).
592
+ toBe('http://angularjs.org/');
593
+ expect(element(by.css('#linky-target a')).getAttribute('target')).toEqual('_blank');
594
+ });
595
+ </file>
596
+ </example>
597
+ */
598
+ angular.module('ngSanitize').filter('linky', ['$sanitize', function($sanitize) {
599
+ var LINKY_URL_REGEXP =
600
+ /((ftp|https?):\/\/|(mailto:)?[A-Za-z0-9._%+-]+@)\S*[^\s.;,(){}<>]/,
601
+ MAILTO_REGEXP = /^mailto:/;
602
+
603
+ return function(text, target) {
604
+ if (!text) return text;
605
+ var match;
606
+ var raw = text;
607
+ var html = [];
608
+ var url;
609
+ var i;
610
+ while ((match = raw.match(LINKY_URL_REGEXP))) {
611
+ // We can not end in these as they are sometimes found at the end of the sentence
612
+ url = match[0];
613
+ // if we did not match ftp/http/mailto then assume mailto
614
+ if (match[2] == match[3]) url = 'mailto:' + url;
615
+ i = match.index;
616
+ addText(raw.substr(0, i));
617
+ addLink(url, match[0].replace(MAILTO_REGEXP, ''));
618
+ raw = raw.substring(i + match[0].length);
619
+ }
620
+ addText(raw);
621
+ return $sanitize(html.join(''));
622
+
623
+ function addText(text) {
624
+ if (!text) {
625
+ return;
626
+ }
627
+ html.push(sanitizeText(text));
628
+ }
629
+
630
+ function addLink(url, text) {
631
+ html.push('<a ');
632
+ if (angular.isDefined(target)) {
633
+ html.push('target="');
634
+ html.push(target);
635
+ html.push('" ');
636
+ }
637
+ html.push('href="');
638
+ html.push(url);
639
+ html.push('">');
640
+ addText(text);
641
+ html.push('</a>');
642
+ }
643
+ };
644
+ }]);
645
+
646
+
647
+ })(window, window.angular);