diff options
| author | Igor Minar | 2013-08-08 10:22:32 -0700 | 
|---|---|---|
| committer | Igor Minar | 2013-08-08 10:22:32 -0700 | 
| commit | 0bf0570505e41be266beaa1ccd0266aaed0c3cfb (patch) | |
| tree | 01fca51e1e588fe5b658fb314f210a97fb66a0ca /test | |
| parent | 3ab579a2a6a9b21d3b43014f08f6c60bbad265a2 (diff) | |
| download | angular.js-0bf0570505e41be266beaa1ccd0266aaed0c3cfb.tar.bz2 | |
docs(minErr): rename sce/isecrurl to sce/insecurl
Diffstat (limited to 'test')
| -rwxr-xr-x | test/ng/compileSpec.js | 8 | ||||
| -rw-r--r-- | test/ng/directive/booleanAttrsSpec.js | 2 | ||||
| -rw-r--r-- | test/ng/directive/ngSrcSpec.js | 6 | ||||
| -rw-r--r-- | test/ng/sceSpecs.js | 14 | ||||
| -rw-r--r-- | test/ngRoute/routeSpec.js | 2 | 
5 files changed, 16 insertions, 16 deletions
| diff --git a/test/ng/compileSpec.js b/test/ng/compileSpec.js index 5dfad4be..25d2db35 100755 --- a/test/ng/compileSpec.js +++ b/test/ng/compileSpec.js @@ -748,7 +748,7 @@ describe('$compile', function() {                expect(function() {                  $templateCache.put('http://example.com/should-not-load.html', 'Should not load even if in cache.');                  $compile('<div class="crossDomainTemplate"></div>')($rootScope); -              }).toThrow('[$sce:isecrurl] Blocked loading resource from url not allowed by $sceDelegate policy.  URL: http://example.com/should-not-load.html'); +              }).toThrow('[$sce:insecurl] Blocked loading resource from url not allowed by $sceDelegate policy.  URL: http://example.com/should-not-load.html');          }));          it('should load cross domain templates when trusted', inject( @@ -3063,7 +3063,7 @@ describe('$compile', function() {        element = $compile('<iframe src="{{testUrl}}"></iframe>')($rootScope);        $rootScope.testUrl = "http://a.different.domain.example.com";        expect(function() { $rootScope.$apply() }).toThrow( -          "[$interpolate:interr] Can't interpolate: {{testUrl}}\nError: [$sce:isecrurl] Blocked " + +          "[$interpolate:interr] Can't interpolate: {{testUrl}}\nError: [$sce:insecurl] Blocked " +            "loading resource from url not allowed by $sceDelegate policy.  URL: " +            "http://a.different.domain.example.com");      })); @@ -3072,7 +3072,7 @@ describe('$compile', function() {        element = $compile('<iframe src="{{testUrl}}"></iframe>')($rootScope);        $rootScope.testUrl = "javascript:alert(1);";        expect(function() { $rootScope.$apply() }).toThrow( -          "[$interpolate:interr] Can't interpolate: {{testUrl}}\nError: [$sce:isecrurl] Blocked " + +          "[$interpolate:interr] Can't interpolate: {{testUrl}}\nError: [$sce:insecurl] Blocked " +            "loading resource from url not allowed by $sceDelegate policy.  URL: " +            "javascript:alert(1);");      })); @@ -3081,7 +3081,7 @@ describe('$compile', function() {        element = $compile('<iframe src="{{testUrl}}"></iframe>')($rootScope);        $rootScope.testUrl = $sce.trustAsUrl("javascript:doTrustedStuff()");        expect($rootScope.$apply).toThrow( -          "[$interpolate:interr] Can't interpolate: {{testUrl}}\nError: [$sce:isecrurl] Blocked " + +          "[$interpolate:interr] Can't interpolate: {{testUrl}}\nError: [$sce:insecurl] Blocked " +            "loading resource from url not allowed by $sceDelegate policy.  URL: javascript:doTrustedStuff()");      })); diff --git a/test/ng/directive/booleanAttrsSpec.js b/test/ng/directive/booleanAttrsSpec.js index 93e8cc20..0b0c290d 100644 --- a/test/ng/directive/booleanAttrsSpec.js +++ b/test/ng/directive/booleanAttrsSpec.js @@ -163,7 +163,7 @@ describe('ngSrc', function() {        });        element.attr('src');      }).toThrow( -            "[$interpolate:interr] Can't interpolate: {{id}}\nError: [$sce:isecrurl] Blocked " + +            "[$interpolate:interr] Can't interpolate: {{id}}\nError: [$sce:insecurl] Blocked " +                  "loading resource from url not allowed by $sceDelegate policy.  URL: http://somewhere");    })); diff --git a/test/ng/directive/ngSrcSpec.js b/test/ng/directive/ngSrcSpec.js index 23ace7ee..2fb99eab 100644 --- a/test/ng/directive/ngSrcSpec.js +++ b/test/ng/directive/ngSrcSpec.js @@ -27,7 +27,7 @@ describe('ngSrc', function() {        element = $compile('<iframe ng-src="{{testUrl}}"></iframe>')($rootScope);        $rootScope.testUrl = "http://a.different.domain.example.com";        expect(function() { $rootScope.$apply() }).toThrow( -          "[$interpolate:interr] Can't interpolate: {{testUrl}}\nError: [$sce:isecrurl] Blocked " + +          "[$interpolate:interr] Can't interpolate: {{testUrl}}\nError: [$sce:insecurl] Blocked " +            "loading resource from url not allowed by $sceDelegate policy.  URL: " +            "http://a.different.domain.example.com");      })); @@ -36,7 +36,7 @@ describe('ngSrc', function() {        element = $compile('<iframe ng-src="{{testUrl}}"></iframe>')($rootScope);        $rootScope.testUrl = "javascript:alert(1);";        expect(function() { $rootScope.$apply() }).toThrow( -          "[$interpolate:interr] Can't interpolate: {{testUrl}}\nError: [$sce:isecrurl] Blocked " + +          "[$interpolate:interr] Can't interpolate: {{testUrl}}\nError: [$sce:insecurl] Blocked " +            "loading resource from url not allowed by $sceDelegate policy.  URL: " +            "javascript:alert(1);");      })); @@ -45,7 +45,7 @@ describe('ngSrc', function() {        element = $compile('<iframe ng-src="{{testUrl}}"></iframe>')($rootScope);        $rootScope.testUrl = $sce.trustAsUrl("javascript:doTrustedStuff()");        expect($rootScope.$apply).toThrow( -          "[$interpolate:interr] Can't interpolate: {{testUrl}}\nError: [$sce:isecrurl] Blocked " + +          "[$interpolate:interr] Can't interpolate: {{testUrl}}\nError: [$sce:insecurl] Blocked " +            "loading resource from url not allowed by $sceDelegate policy.  URL: " +            "javascript:doTrustedStuff()");      })); diff --git a/test/ng/sceSpecs.js b/test/ng/sceSpecs.js index 6157fc17..9be794fb 100644 --- a/test/ng/sceSpecs.js +++ b/test/ng/sceSpecs.js @@ -280,7 +280,7 @@ describe('SCE', function() {          blackList: []        }, function($sce) {          expect(function() { $sce.getTrustedResourceUrl('#'); }).toThrow( -          '[$sce:isecrurl] Blocked loading resource from url not allowed by $sceDelegate policy.  URL: #'); +          '[$sce:insecurl] Blocked loading resource from url not allowed by $sceDelegate policy.  URL: #');      }));      it('should match against normalized urls', runTest( @@ -289,7 +289,7 @@ describe('SCE', function() {          blackList: []        }, function($sce) {          expect(function() { $sce.getTrustedResourceUrl('foo'); }).toThrow( -          '[$sce:isecrurl] Blocked loading resource from url not allowed by $sceDelegate policy.  URL: foo'); +          '[$sce:insecurl] Blocked loading resource from url not allowed by $sceDelegate policy.  URL: foo');      }));      it('should support custom regex', runTest( @@ -299,7 +299,7 @@ describe('SCE', function() {        }, function($sce) {          expect($sce.getTrustedResourceUrl('http://example.com/foo')).toEqual('http://example.com/foo');          expect(function() { $sce.getTrustedResourceUrl('https://example.com/foo'); }).toThrow( -          '[$sce:isecrurl] Blocked loading resource from url not allowed by $sceDelegate policy.  URL: https://example.com/foo'); +          '[$sce:insecurl] Blocked loading resource from url not allowed by $sceDelegate policy.  URL: https://example.com/foo');      }));      it('should support the special string "self" in whitelist', runTest( @@ -316,7 +316,7 @@ describe('SCE', function() {          blackList: ['self']        }, function($sce) {          expect(function() { $sce.getTrustedResourceUrl('foo'); }).toThrow( -          '[$sce:isecrurl] Blocked loading resource from url not allowed by $sceDelegate policy.  URL: foo'); +          '[$sce:insecurl] Blocked loading resource from url not allowed by $sceDelegate policy.  URL: foo');      }));      it('should have blacklist override the whitelist', runTest( @@ -325,7 +325,7 @@ describe('SCE', function() {          blackList: ['self']        }, function($sce) {          expect(function() { $sce.getTrustedResourceUrl('foo'); }).toThrow( -          '[$sce:isecrurl] Blocked loading resource from url not allowed by $sceDelegate policy.  URL: foo'); +          '[$sce:insecurl] Blocked loading resource from url not allowed by $sceDelegate policy.  URL: foo');      }));      it('should support multiple items in both lists', runTest( @@ -337,9 +337,9 @@ describe('SCE', function() {          expect($sce.getTrustedResourceUrl('http://example.com/1')).toEqual('http://example.com/1');          expect($sce.getTrustedResourceUrl('http://example.com/2')).toEqual('http://example.com/2');          expect(function() { $sce.getTrustedResourceUrl('http://example.com/3'); }).toThrow( -          '[$sce:isecrurl] Blocked loading resource from url not allowed by $sceDelegate policy.  URL: http://example.com/3'); +          '[$sce:insecurl] Blocked loading resource from url not allowed by $sceDelegate policy.  URL: http://example.com/3');          expect(function() { $sce.getTrustedResourceUrl('open_redirect'); }).toThrow( -          '[$sce:isecrurl] Blocked loading resource from url not allowed by $sceDelegate policy.  URL: open_redirect'); +          '[$sce:insecurl] Blocked loading resource from url not allowed by $sceDelegate policy.  URL: open_redirect');      }));    }); diff --git a/test/ngRoute/routeSpec.js b/test/ngRoute/routeSpec.js index 13d149a1..29c2b798 100644 --- a/test/ngRoute/routeSpec.js +++ b/test/ngRoute/routeSpec.js @@ -520,7 +520,7 @@ describe('$route', function() {          $location.path('/foo');          expect(function() {            $rootScope.$digest(); -        }).toThrow('[$sce:isecrurl] Blocked loading resource from url not allowed by $sceDelegate policy.  URL: http://example.com/foo.html'); +        }).toThrow('[$sce:insecurl] Blocked loading resource from url not allowed by $sceDelegate policy.  URL: http://example.com/foo.html');        });      }); | 
