diff options
| author | Igor Minar | 2013-08-08 10:22:32 -0700 | 
|---|---|---|
| committer | Igor Minar | 2013-08-08 10:22:32 -0700 | 
| commit | 0bf0570505e41be266beaa1ccd0266aaed0c3cfb (patch) | |
| tree | 01fca51e1e588fe5b658fb314f210a97fb66a0ca /test/ng/sceSpecs.js | |
| parent | 3ab579a2a6a9b21d3b43014f08f6c60bbad265a2 (diff) | |
| download | angular.js-0bf0570505e41be266beaa1ccd0266aaed0c3cfb.tar.bz2 | |
docs(minErr): rename sce/isecrurl to sce/insecurl
Diffstat (limited to 'test/ng/sceSpecs.js')
| -rw-r--r-- | test/ng/sceSpecs.js | 14 | 
1 files changed, 7 insertions, 7 deletions
| diff --git a/test/ng/sceSpecs.js b/test/ng/sceSpecs.js index 6157fc17..9be794fb 100644 --- a/test/ng/sceSpecs.js +++ b/test/ng/sceSpecs.js @@ -280,7 +280,7 @@ describe('SCE', function() {          blackList: []        }, function($sce) {          expect(function() { $sce.getTrustedResourceUrl('#'); }).toThrow( -          '[$sce:isecrurl] Blocked loading resource from url not allowed by $sceDelegate policy.  URL: #'); +          '[$sce:insecurl] Blocked loading resource from url not allowed by $sceDelegate policy.  URL: #');      }));      it('should match against normalized urls', runTest( @@ -289,7 +289,7 @@ describe('SCE', function() {          blackList: []        }, function($sce) {          expect(function() { $sce.getTrustedResourceUrl('foo'); }).toThrow( -          '[$sce:isecrurl] Blocked loading resource from url not allowed by $sceDelegate policy.  URL: foo'); +          '[$sce:insecurl] Blocked loading resource from url not allowed by $sceDelegate policy.  URL: foo');      }));      it('should support custom regex', runTest( @@ -299,7 +299,7 @@ describe('SCE', function() {        }, function($sce) {          expect($sce.getTrustedResourceUrl('http://example.com/foo')).toEqual('http://example.com/foo');          expect(function() { $sce.getTrustedResourceUrl('https://example.com/foo'); }).toThrow( -          '[$sce:isecrurl] Blocked loading resource from url not allowed by $sceDelegate policy.  URL: https://example.com/foo'); +          '[$sce:insecurl] Blocked loading resource from url not allowed by $sceDelegate policy.  URL: https://example.com/foo');      }));      it('should support the special string "self" in whitelist', runTest( @@ -316,7 +316,7 @@ describe('SCE', function() {          blackList: ['self']        }, function($sce) {          expect(function() { $sce.getTrustedResourceUrl('foo'); }).toThrow( -          '[$sce:isecrurl] Blocked loading resource from url not allowed by $sceDelegate policy.  URL: foo'); +          '[$sce:insecurl] Blocked loading resource from url not allowed by $sceDelegate policy.  URL: foo');      }));      it('should have blacklist override the whitelist', runTest( @@ -325,7 +325,7 @@ describe('SCE', function() {          blackList: ['self']        }, function($sce) {          expect(function() { $sce.getTrustedResourceUrl('foo'); }).toThrow( -          '[$sce:isecrurl] Blocked loading resource from url not allowed by $sceDelegate policy.  URL: foo'); +          '[$sce:insecurl] Blocked loading resource from url not allowed by $sceDelegate policy.  URL: foo');      }));      it('should support multiple items in both lists', runTest( @@ -337,9 +337,9 @@ describe('SCE', function() {          expect($sce.getTrustedResourceUrl('http://example.com/1')).toEqual('http://example.com/1');          expect($sce.getTrustedResourceUrl('http://example.com/2')).toEqual('http://example.com/2');          expect(function() { $sce.getTrustedResourceUrl('http://example.com/3'); }).toThrow( -          '[$sce:isecrurl] Blocked loading resource from url not allowed by $sceDelegate policy.  URL: http://example.com/3'); +          '[$sce:insecurl] Blocked loading resource from url not allowed by $sceDelegate policy.  URL: http://example.com/3');          expect(function() { $sce.getTrustedResourceUrl('open_redirect'); }).toThrow( -          '[$sce:isecrurl] Blocked loading resource from url not allowed by $sceDelegate policy.  URL: open_redirect'); +          '[$sce:insecurl] Blocked loading resource from url not allowed by $sceDelegate policy.  URL: open_redirect');      }));    }); | 
