diff options
author | Matt A. Tobin <email@mattatobin.com> | 2018-02-03 06:00:38 -0500 |
---|---|---|
committer | Matt A. Tobin <email@mattatobin.com> | 2018-02-03 06:00:38 -0500 |
commit | 8148615da179fdd60f19018e13b4e94b95609cc6 (patch) | |
tree | 771fccdd99fa3adf35fdd2c81d8197b415a89b91 /browser/base/content/test/general/browser_bug906190.js | |
parent | 494802c1be7888025b95260d23db187467d2b9dd (diff) | |
download | UXP-8148615da179fdd60f19018e13b4e94b95609cc6.tar UXP-8148615da179fdd60f19018e13b4e94b95609cc6.tar.gz UXP-8148615da179fdd60f19018e13b4e94b95609cc6.tar.lz UXP-8148615da179fdd60f19018e13b4e94b95609cc6.tar.xz UXP-8148615da179fdd60f19018e13b4e94b95609cc6.zip |
Remove browser tests - Part 1: The Tests (except for experiments)
Diffstat (limited to 'browser/base/content/test/general/browser_bug906190.js')
-rw-r--r-- | browser/base/content/test/general/browser_bug906190.js | 240 |
1 files changed, 0 insertions, 240 deletions
diff --git a/browser/base/content/test/general/browser_bug906190.js b/browser/base/content/test/general/browser_bug906190.js deleted file mode 100644 index 613f50efd..000000000 --- a/browser/base/content/test/general/browser_bug906190.js +++ /dev/null @@ -1,240 +0,0 @@ -/* Any copyright is dedicated to the Public Domain. - * http://creativecommons.org/publicdomain/zero/1.0/ */ - -/* - * Tests the persistence of the "disable protection" option for Mixed Content - * Blocker in child tabs (bug 906190). - */ - -requestLongerTimeout(2); - -// We use the different urls for testing same origin checks before allowing -// mixed content on child tabs. -const gHttpTestRoot1 = "https://test1.example.com/browser/browser/base/content/test/general/"; -const gHttpTestRoot2 = "https://test2.example.com/browser/browser/base/content/test/general/"; - -/** - * For all tests, we load the pages over HTTPS and test both: - * - |CTRL+CLICK| - * - |RIGHT CLICK -> OPEN LINK IN TAB| - */ -function* doTest(parentTabSpec, childTabSpec, testTaskFn, waitForMetaRefresh) { - yield BrowserTestUtils.withNewTab({ - gBrowser, - url: parentTabSpec, - }, function* (browser) { - // As a sanity check, test that active content has been blocked as expected. - yield assertMixedContentBlockingState(gBrowser, { - activeLoaded: false, activeBlocked: true, passiveLoaded: false, - }); - - // Disable the Mixed Content Blocker for the page, which reloads it. - let promiseReloaded = BrowserTestUtils.browserLoaded(browser); - gIdentityHandler.disableMixedContentProtection(); - yield promiseReloaded; - - // Wait for the script in the page to update the contents of the test div. - let testDiv = content.document.getElementById('mctestdiv'); - yield promiseWaitForCondition( - () => testDiv.innerHTML == "Mixed Content Blocker disabled"); - - // Add the link for the child tab to the page. - let mainDiv = content.document.createElement("div"); - mainDiv.innerHTML = - '<p><a id="linkToOpenInNewTab" href="' + childTabSpec + '">Link</a></p>'; - content.document.body.appendChild(mainDiv); - - // Execute the test in the child tabs with the two methods to open it. - for (let openFn of [simulateCtrlClick, simulateContextMenuOpenInTab]) { - let promiseTabLoaded = waitForSomeTabToLoad(); - openFn(browser); - yield promiseTabLoaded; - gBrowser.selectTabAtIndex(2); - - if (waitForMetaRefresh) { - yield waitForSomeTabToLoad(); - } - - yield testTaskFn(); - - gBrowser.removeCurrentTab(); - } - }); -} - -function simulateCtrlClick(browser) { - BrowserTestUtils.synthesizeMouseAtCenter("#linkToOpenInNewTab", - { ctrlKey: true, metaKey: true }, - browser); -} - -function simulateContextMenuOpenInTab(browser) { - BrowserTestUtils.waitForEvent(document, "popupshown", false, event => { - // These are operations that must be executed synchronously with the event. - document.getElementById("context-openlinkintab").doCommand(); - event.target.hidePopup(); - return true; - }); - BrowserTestUtils.synthesizeMouseAtCenter("#linkToOpenInNewTab", - { type: "contextmenu", button: 2 }, - browser); -} - -// Waits for a load event somewhere in the browser but ignore events coming -// from <xul:browser>s without a tab assigned. That are most likely browsers -// that preload the new tab page. -function waitForSomeTabToLoad() { - return new Promise(resolve => { - gBrowser.addEventListener("load", function onLoad(event) { - let tab = gBrowser._getTabForContentWindow(event.target.defaultView.top); - if (tab) { - gBrowser.removeEventListener("load", onLoad, true); - resolve(); - } - }, true); - }); -} - -/** - * Ensure the Mixed Content Blocker is enabled. - */ -add_task(function* test_initialize() { - yield new Promise(resolve => SpecialPowers.pushPrefEnv({ - "set": [["security.mixed_content.block_active_content", true]], - }, resolve)); -}); - -/** - * 1. - Load a html page which has mixed content - * - Doorhanger to disable protection appears - we disable it - * - Load a subpage from the same origin in a new tab simulating a click - * - Doorhanger should >> NOT << appear anymore! - */ -add_task(function* test_same_origin() { - yield doTest(gHttpTestRoot1 + "file_bug906190_1.html", - gHttpTestRoot1 + "file_bug906190_2.html", function* () { - // The doorhanger should appear but activeBlocked should be >> NOT << true, - // because our decision of disabling the mixed content blocker is persistent - // across tabs. - yield assertMixedContentBlockingState(gBrowser, { - activeLoaded: true, activeBlocked: false, passiveLoaded: false, - }); - - is(content.document.getElementById('mctestdiv').innerHTML, - "Mixed Content Blocker disabled", "OK: Executed mixed script"); - }); -}); - -/** - * 2. - Load a html page which has mixed content - * - Doorhanger to disable protection appears - we disable it - * - Load a new page from a different origin in a new tab simulating a click - * - Doorhanger >> SHOULD << appear again! - */ -add_task(function* test_different_origin() { - yield doTest(gHttpTestRoot1 + "file_bug906190_2.html", - gHttpTestRoot2 + "file_bug906190_2.html", function* () { - // The doorhanger should appear and activeBlocked should be >> TRUE <<, - // because our decision of disabling the mixed content blocker should only - // persist if pages are from the same domain. - yield assertMixedContentBlockingState(gBrowser, { - activeLoaded: false, activeBlocked: true, passiveLoaded: false, - }); - - is(content.document.getElementById('mctestdiv').innerHTML, - "Mixed Content Blocker enabled", "OK: Blocked mixed script"); - }); -}); - -/** - * 3. - Load a html page which has mixed content - * - Doorhanger to disable protection appears - we disable it - * - Load a new page from the same origin in a new tab simulating a click - * - Redirect to another page from the same origin using meta-refresh - * - Doorhanger should >> NOT << appear again! - */ -add_task(function* test_same_origin_metarefresh_same_origin() { - // file_bug906190_3_4.html redirects to page test1.example.com/* using meta-refresh - yield doTest(gHttpTestRoot1 + "file_bug906190_1.html", - gHttpTestRoot1 + "file_bug906190_3_4.html", function* () { - // The doorhanger should appear but activeBlocked should be >> NOT << true! - yield assertMixedContentBlockingState(gBrowser, { - activeLoaded: true, activeBlocked: false, passiveLoaded: false, - }); - - is(content.document.getElementById('mctestdiv').innerHTML, - "Mixed Content Blocker disabled", "OK: Executed mixed script"); - }, true); -}); - -/** - * 4. - Load a html page which has mixed content - * - Doorhanger to disable protection appears - we disable it - * - Load a new page from the same origin in a new tab simulating a click - * - Redirect to another page from a different origin using meta-refresh - * - Doorhanger >> SHOULD << appear again! - */ -add_task(function* test_same_origin_metarefresh_different_origin() { - yield doTest(gHttpTestRoot2 + "file_bug906190_1.html", - gHttpTestRoot2 + "file_bug906190_3_4.html", function* () { - // The doorhanger should appear and activeBlocked should be >> TRUE <<. - yield assertMixedContentBlockingState(gBrowser, { - activeLoaded: false, activeBlocked: true, passiveLoaded: false, - }); - - is(content.document.getElementById('mctestdiv').innerHTML, - "Mixed Content Blocker enabled", "OK: Blocked mixed script"); - }, true); -}); - -/** - * 5. - Load a html page which has mixed content - * - Doorhanger to disable protection appears - we disable it - * - Load a new page from the same origin in a new tab simulating a click - * - Redirect to another page from the same origin using 302 redirect - */ -add_task(function* test_same_origin_302redirect_same_origin() { - // the sjs files returns a 302 redirect- note, same origins - yield doTest(gHttpTestRoot1 + "file_bug906190_1.html", - gHttpTestRoot1 + "file_bug906190.sjs", function* () { - // The doorhanger should appear but activeBlocked should be >> NOT << true. - // Currently it is >> TRUE << - see follow up bug 914860 - ok(!gIdentityHandler._identityBox.classList.contains("mixedActiveBlocked"), - "OK: Mixed Content is NOT being blocked"); - - is(content.document.getElementById('mctestdiv').innerHTML, - "Mixed Content Blocker disabled", "OK: Executed mixed script"); - }); -}); - -/** - * 6. - Load a html page which has mixed content - * - Doorhanger to disable protection appears - we disable it - * - Load a new page from the same origin in a new tab simulating a click - * - Redirect to another page from a different origin using 302 redirect - */ -add_task(function* test_same_origin_302redirect_different_origin() { - // the sjs files returns a 302 redirect - note, different origins - yield doTest(gHttpTestRoot2 + "file_bug906190_1.html", - gHttpTestRoot2 + "file_bug906190.sjs", function* () { - // The doorhanger should appear and activeBlocked should be >> TRUE <<. - yield assertMixedContentBlockingState(gBrowser, { - activeLoaded: false, activeBlocked: true, passiveLoaded: false, - }); - - is(content.document.getElementById('mctestdiv').innerHTML, - "Mixed Content Blocker enabled", "OK: Blocked mixed script"); - }); -}); - -/** - * 7. - Test memory leak issue on redirection error. See Bug 1269426. - */ -add_task(function* test_bad_redirection() { - // the sjs files returns a 302 redirect - note, different origins - yield doTest(gHttpTestRoot2 + "file_bug906190_1.html", - gHttpTestRoot2 + "file_bug906190.sjs?bad-redirection=1", function* () { - // Nothing to do. Just see if memory leak is reported in the end. - ok(true, "Nothing to do"); - }); -}); |