diff options
Diffstat (limited to 'test/ng/sceSpecs.js')
| -rw-r--r-- | test/ng/sceSpecs.js | 14 | 
1 files changed, 7 insertions, 7 deletions
| diff --git a/test/ng/sceSpecs.js b/test/ng/sceSpecs.js index 6157fc17..9be794fb 100644 --- a/test/ng/sceSpecs.js +++ b/test/ng/sceSpecs.js @@ -280,7 +280,7 @@ describe('SCE', function() {          blackList: []        }, function($sce) {          expect(function() { $sce.getTrustedResourceUrl('#'); }).toThrow( -          '[$sce:isecrurl] Blocked loading resource from url not allowed by $sceDelegate policy.  URL: #'); +          '[$sce:insecurl] Blocked loading resource from url not allowed by $sceDelegate policy.  URL: #');      }));      it('should match against normalized urls', runTest( @@ -289,7 +289,7 @@ describe('SCE', function() {          blackList: []        }, function($sce) {          expect(function() { $sce.getTrustedResourceUrl('foo'); }).toThrow( -          '[$sce:isecrurl] Blocked loading resource from url not allowed by $sceDelegate policy.  URL: foo'); +          '[$sce:insecurl] Blocked loading resource from url not allowed by $sceDelegate policy.  URL: foo');      }));      it('should support custom regex', runTest( @@ -299,7 +299,7 @@ describe('SCE', function() {        }, function($sce) {          expect($sce.getTrustedResourceUrl('http://example.com/foo')).toEqual('http://example.com/foo');          expect(function() { $sce.getTrustedResourceUrl('https://example.com/foo'); }).toThrow( -          '[$sce:isecrurl] Blocked loading resource from url not allowed by $sceDelegate policy.  URL: https://example.com/foo'); +          '[$sce:insecurl] Blocked loading resource from url not allowed by $sceDelegate policy.  URL: https://example.com/foo');      }));      it('should support the special string "self" in whitelist', runTest( @@ -316,7 +316,7 @@ describe('SCE', function() {          blackList: ['self']        }, function($sce) {          expect(function() { $sce.getTrustedResourceUrl('foo'); }).toThrow( -          '[$sce:isecrurl] Blocked loading resource from url not allowed by $sceDelegate policy.  URL: foo'); +          '[$sce:insecurl] Blocked loading resource from url not allowed by $sceDelegate policy.  URL: foo');      }));      it('should have blacklist override the whitelist', runTest( @@ -325,7 +325,7 @@ describe('SCE', function() {          blackList: ['self']        }, function($sce) {          expect(function() { $sce.getTrustedResourceUrl('foo'); }).toThrow( -          '[$sce:isecrurl] Blocked loading resource from url not allowed by $sceDelegate policy.  URL: foo'); +          '[$sce:insecurl] Blocked loading resource from url not allowed by $sceDelegate policy.  URL: foo');      }));      it('should support multiple items in both lists', runTest( @@ -337,9 +337,9 @@ describe('SCE', function() {          expect($sce.getTrustedResourceUrl('http://example.com/1')).toEqual('http://example.com/1');          expect($sce.getTrustedResourceUrl('http://example.com/2')).toEqual('http://example.com/2');          expect(function() { $sce.getTrustedResourceUrl('http://example.com/3'); }).toThrow( -          '[$sce:isecrurl] Blocked loading resource from url not allowed by $sceDelegate policy.  URL: http://example.com/3'); +          '[$sce:insecurl] Blocked loading resource from url not allowed by $sceDelegate policy.  URL: http://example.com/3');          expect(function() { $sce.getTrustedResourceUrl('open_redirect'); }).toThrow( -          '[$sce:isecrurl] Blocked loading resource from url not allowed by $sceDelegate policy.  URL: open_redirect'); +          '[$sce:insecurl] Blocked loading resource from url not allowed by $sceDelegate policy.  URL: open_redirect');      }));    }); | 
