aboutsummaryrefslogtreecommitdiffstats
path: root/test/ng/parseSpec.js
diff options
context:
space:
mode:
authorBrian Nenninger2014-01-02 00:42:59 -0500
committerIgor Minar2014-01-03 14:33:54 -0800
commit3b1a4fe0c83c7898ecd7261ab4213998ee7be0ec (patch)
treeeb4505add3b03825acb170fccc6be24b457c1e8d /test/ng/parseSpec.js
parent9569778f2f5d155ddc9188537e9fb36faaf9dbf1 (diff)
downloadangular.js-3b1a4fe0c83c7898ecd7261ab4213998ee7be0ec.tar.bz2
fix($parse): fix CSP nested property evaluation, and issue that prevented its tests from failing
cspSafeGetterFn incorrectly returned undefined if any of its key parameters were undefined. This wasn't caught by the $parse unit tests because of a timing problem where $ParseProvider was reading the CSP flag before the tests manually set it, so the CSP property evaluation tests never ran. Add test that verifies evaluation of nested properties of multiple lengths. Closes #5591 Closes #5592
Diffstat (limited to 'test/ng/parseSpec.js')
-rw-r--r--test/ng/parseSpec.js63
1 files changed, 58 insertions, 5 deletions
diff --git a/test/ng/parseSpec.js b/test/ng/parseSpec.js
index 4599c033..7d4642d1 100644
--- a/test/ng/parseSpec.js
+++ b/test/ng/parseSpec.js
@@ -204,13 +204,24 @@ describe('parser', function() {
describe('csp: ' + cspEnabled + ", unwrapPromises: " + unwrapPromisesEnabled, function() {
- beforeEach(module(function ($parseProvider) {
+ var originalSecurityPolicy;
+
+
+ beforeEach(function() {
+ originalSecurityPolicy = window.document.securityPolicy;
+ window.document.securityPolicy = {isActive : cspEnabled};
+ });
+
+ afterEach(function() {
+ window.document.securityPolicy = originalSecurityPolicy;
+ });
+
+ beforeEach(module(function ($parseProvider, $provide) {
$parseProvider.unwrapPromises(unwrapPromisesEnabled);
}));
- beforeEach(inject(function ($rootScope, $sniffer) {
+ beforeEach(inject(function ($rootScope) {
scope = $rootScope;
- $sniffer.csp = cspEnabled;
}));
it('should parse expressions', function() {
@@ -344,6 +355,25 @@ describe('parser', function() {
expect(scope.$eval("a.b.c.d.e.f.g.h.i.j.k.l.m.n", scope)).toBe('nooo!');
});
+ forEach([2, 3, 4, 5, 6, 7, 8, 9, 10, 20, 42, 99], function(pathLength) {
+ it('should resolve nested paths of length ' + pathLength, function() {
+ // Create a nested object {x2: {x3: {x4: ... {x[n]: 42} ... }}}.
+ var obj = 42;
+ for (var i = pathLength; i >= 2; i--) {
+ var newObj = {};
+ newObj['x' + i] = obj;
+ obj = newObj;
+ }
+ // Assign to x1 and build path 'x1.x2.x3. ... .x[n]' to access the final value.
+ scope.x1 = obj;
+ var path = 'x1';
+ for (var i = 2; i <= pathLength; i++) {
+ path += '.x' + i;
+ }
+ expect(scope.$eval(path)).toBe(42);
+ });
+ });
+
it('should be forgiving', function() {
scope.a = {b: 23};
expect(scope.$eval('b')).toBeUndefined();
@@ -1069,6 +1099,17 @@ describe('parser', function() {
var $log;
var PROMISE_WARNING_REGEXP = /\[\$parse\] Promise found in the expression `[^`]+`. Automatic unwrapping of promises in Angular expressions is deprecated\./;
+ var originalSecurityPolicy;
+
+
+ beforeEach(function() {
+ originalSecurityPolicy = window.document.securityPolicy;
+ window.document.securityPolicy = {isActive : cspEnabled};
+ });
+
+ afterEach(function() {
+ window.document.securityPolicy = originalSecurityPolicy;
+ });
beforeEach(module(function($parseProvider) {
$parseProvider.unwrapPromises(true);
@@ -1142,15 +1183,27 @@ describe('parser', function() {
describe('csp ' + cspEnabled, function() {
+ var originalSecurityPolicy;
+
+
+ beforeEach(function() {
+ originalSecurityPolicy = window.document.securityPolicy;
+ window.document.securityPolicy = {isActive : cspEnabled};
+ });
+
+ afterEach(function() {
+ window.document.securityPolicy = originalSecurityPolicy;
+ });
+
+
beforeEach(module(function($parseProvider) {
$parseProvider.unwrapPromises(true);
$parseProvider.logPromiseWarnings(false);
}));
- beforeEach(inject(function($rootScope, $sniffer, $q) {
+ beforeEach(inject(function($rootScope, $q) {
scope = $rootScope;
- $sniffer.csp = cspEnabled;
q = $q;
deferred = q.defer();