mirror of
https://github.com/mozilla/gecko-dev.git
synced 2024-10-31 22:25:30 +00:00
4ca15feade
Also set network.disable.ipc.security to true and leave it that way. This prevents security errors in the tests which happen when we pop the pref. --HG-- extra : rebase_source : 95f7ca7c3b71cdc0e3e6fd1cfb663a5653f3ab6f
50 lines
1.5 KiB
JavaScript
50 lines
1.5 KiB
JavaScript
/* Any copyright is dedicated to the public domain.
|
|
http://creativecommons.org/publicdomain/zero/1.0/ */
|
|
|
|
// Bug 763694 - Test that <iframe mozbrowser> delivers proper
|
|
// mozbrowsersecuritychange events.
|
|
|
|
"use strict";
|
|
SimpleTest.waitForExplicitFinish();
|
|
browserElementTestHelpers.setEnabledPref(true);
|
|
browserElementTestHelpers.addPermission();
|
|
|
|
function runTest() {
|
|
var iframe = document.createElement('iframe');
|
|
SpecialPowers.wrap(iframe).mozbrowser = true;
|
|
|
|
var lastSecurityState;
|
|
iframe.addEventListener('mozbrowsersecuritychange', function(e) {
|
|
lastSecurityState = e.detail;
|
|
});
|
|
|
|
var filepath = 'tests/dom/browser-element/mochitest/file_browserElement_SecurityChange.html';
|
|
|
|
var count = 0;
|
|
iframe.addEventListener('mozbrowserloadend', function(e) {
|
|
count++;
|
|
var nextURL;
|
|
switch (count) {
|
|
case 1:
|
|
is(lastSecurityState.state, 'secure');
|
|
is(lastSecurityState.extendedValidation, false);
|
|
iframe.src = "http://example.com/" + filepath;
|
|
break;
|
|
case 2:
|
|
is(lastSecurityState.state, 'insecure');
|
|
is(lastSecurityState.extendedValidation, false);
|
|
iframe.src = 'https://example.com:443/' + filepath + '?broken';
|
|
break;
|
|
case 3:
|
|
is(lastSecurityState.state, 'broken');
|
|
is(lastSecurityState.extendedValidation, false);
|
|
SimpleTest.finish();
|
|
}
|
|
});
|
|
|
|
iframe.src = "https://example.com/" + filepath;
|
|
document.body.appendChild(iframe);
|
|
}
|
|
|
|
addEventListener('testready', runTest);
|