mirror of
https://github.com/mozilla/gecko-dev.git
synced 2024-11-24 05:11:16 +00:00
Backed out changeset 7cacd26eab2e (bug 1525624) for devtools failures on browser_webconsole_navigate_to_parse_error.js. CLOSED TREE
This commit is contained in:
parent
e9e0b9f490
commit
88a6695b18
@ -569,6 +569,3 @@ webconsole.input.selector.tooltip=Select evaluation context
|
||||
webconsole.group.cookieSameSiteLaxByDefaultEnabled2=Some cookies are misusing the “SameSite“ attribute, so it won’t work as expected
|
||||
# LOCALIZATION NOTE (webconsole.group.cookieSameSiteLaxByDefaultDisabled2): do not translate 'SameSite'.
|
||||
webconsole.group.cookieSameSiteLaxByDefaultDisabled2=Some cookies are misusing the recommended “SameSite“ attribute
|
||||
|
||||
# LOCALIZATION NOTE (webconsole.group.csp): Do not translate "Content Security Policy".
|
||||
webconsole.group.csp=Content Security Policy warnings
|
||||
|
@ -158,8 +158,6 @@ support-files =
|
||||
test-trackingprotection-securityerrors.html
|
||||
test-trackingprotection-securityerrors-thirdpartyonly.html
|
||||
test-warning-groups.html
|
||||
test-warning-group-csp.html
|
||||
test-warning-group-csp.html^headers^
|
||||
test-websocket.html
|
||||
test-websocket.js
|
||||
test-worker-promise-error.html
|
||||
@ -428,7 +426,6 @@ tags = trackingprotection
|
||||
[browser_webconsole_warning_group_storage_isolation.js]
|
||||
skip-if = true # Bug 1765369
|
||||
[browser_webconsole_warning_group_cookies.js]
|
||||
[browser_webconsole_warning_group_csp.js]
|
||||
[browser_webconsole_warning_groups_filtering.js]
|
||||
[browser_webconsole_warning_group_multiples.js]
|
||||
[browser_webconsole_warning_groups_outside_console_group.js]
|
||||
|
@ -1,29 +0,0 @@
|
||||
/* Any copyright is dedicated to the Public Domain.
|
||||
* http://creativecommons.org/publicdomain/zero/1.0/ */
|
||||
|
||||
// Load a page that generates multiple CSP parser warnings.
|
||||
|
||||
"use strict";
|
||||
|
||||
const TEST_FILE =
|
||||
"browser/devtools/client/webconsole/test/browser/test-warning-group-csp.html";
|
||||
|
||||
add_task(async function testCSPGroup() {
|
||||
const GROUP_LABEL = "Content Security Policy warnings";
|
||||
|
||||
const hud = await openNewTabAndConsole("https://example.org/" + TEST_FILE);
|
||||
|
||||
info("Checking for warning group");
|
||||
await checkConsoleOutputForWarningGroup(hud, [`▶︎⚠ ${GROUP_LABEL} 4`]);
|
||||
|
||||
info("Expand the warning group");
|
||||
const node = findWarningMessage(hud, GROUP_LABEL);
|
||||
node.querySelector(".arrow").click();
|
||||
await checkConsoleOutputForWarningGroup(hud, [
|
||||
`▼︎⚠ ${GROUP_LABEL} 4`,
|
||||
`| Ignoring “http:” within script-src: ‘strict-dynamic’ specified`,
|
||||
`| Ignoring “https:” within script-src: ‘strict-dynamic’ specified`,
|
||||
`| Ignoring “'unsafe-inline'” within script-src: ‘strict-dynamic’ specified`,
|
||||
`| Keyword ‘strict-dynamic’ within “script-src” with no valid nonce or hash might block all scripts from loading`,
|
||||
]);
|
||||
});
|
@ -1,11 +0,0 @@
|
||||
<!DOCTYPE html>
|
||||
<html>
|
||||
<head>
|
||||
<meta charset="utf-8">
|
||||
<title>CSP warning group</title>
|
||||
</head>
|
||||
<body>
|
||||
<h1>Look at the Content-Security-Policy header</h1>
|
||||
<pre>Content-Security-Policy: script-src 'strict-dynamic' http: https: 'unsafe-inline';</pre>
|
||||
</body>
|
||||
</html>
|
@ -1 +0,0 @@
|
||||
Content-Security-Policy: script-src 'strict-dynamic' http: https: 'unsafe-inline';
|
@ -654,10 +654,6 @@ function getWarningGroupLabel(firstMessage) {
|
||||
return l10n.getStr("webconsole.group.cookieSameSiteLaxByDefaultDisabled2");
|
||||
}
|
||||
|
||||
if (isCSPMessage(firstMessage)) {
|
||||
return l10n.getStr("webconsole.group.csp");
|
||||
}
|
||||
|
||||
return "";
|
||||
}
|
||||
|
||||
@ -737,10 +733,6 @@ function getWarningGroupType(message) {
|
||||
return MESSAGE_TYPE.COOKIE_SAMESITE_GROUP;
|
||||
}
|
||||
|
||||
if (isCSPMessage(message)) {
|
||||
return MESSAGE_TYPE.CSP_GROUP;
|
||||
}
|
||||
|
||||
return null;
|
||||
}
|
||||
|
||||
@ -821,16 +813,6 @@ function isCookieSameSiteMessage(message) {
|
||||
return category == "cookieSameSite";
|
||||
}
|
||||
|
||||
/**
|
||||
* Returns true if the message is a Content Security Policy (CSP) message.
|
||||
* @param {ConsoleMessage} message
|
||||
* @returns {Boolean}
|
||||
*/
|
||||
function isCSPMessage(message) {
|
||||
const { category } = message;
|
||||
return typeof category == "string" && category.startsWith("CSP_");
|
||||
}
|
||||
|
||||
function getDescriptorValue(descriptor) {
|
||||
if (!descriptor) {
|
||||
return descriptor;
|
||||
|
Loading…
Reference in New Issue
Block a user