summaryrefslogtreecommitdiffstats
path: root/toolkit/content/tests/unit/test_contentAreaUtils.js
diff options
context:
space:
mode:
Diffstat (limited to 'toolkit/content/tests/unit/test_contentAreaUtils.js')
-rw-r--r--toolkit/content/tests/unit/test_contentAreaUtils.js80
1 files changed, 0 insertions, 80 deletions
diff --git a/toolkit/content/tests/unit/test_contentAreaUtils.js b/toolkit/content/tests/unit/test_contentAreaUtils.js
deleted file mode 100644
index 970e779ce..000000000
--- a/toolkit/content/tests/unit/test_contentAreaUtils.js
+++ /dev/null
@@ -1,80 +0,0 @@
-/* -*- indent-tabs-mode: nil; js-indent-level: 2 -*- */
-/* This Source Code Form is subject to the terms of the Mozilla Public
- * License, v. 2.0. If a copy of the MPL was not distributed with this
- * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
-
-var Ci = Components.interfaces;
-var Cc = Components.classes;
-var Cr = Components.results;
-
-function loadUtilsScript() {
- var loader = Cc["@mozilla.org/moz/jssubscript-loader;1"].
- getService(Ci.mozIJSSubScriptLoader);
- loader.loadSubScript("chrome://global/content/contentAreaUtils.js");
-}
-
-function test_urlSecurityCheck() {
- var nullPrincipal = Cc["@mozilla.org/nullprincipal;1"].
- createInstance(Ci.nsIPrincipal);
-
- const HTTP_URI = "http://www.mozilla.org/";
- const CHROME_URI = "chrome://browser/content/browser.xul";
- const DISALLOW_INHERIT_PRINCIPAL =
- Ci.nsIScriptSecurityManager.DISALLOW_INHERIT_PRINCIPAL;
-
- try {
- urlSecurityCheck(makeURI(HTTP_URI), nullPrincipal,
- DISALLOW_INHERIT_PRINCIPAL);
- }
- catch (ex) {
- do_throw("urlSecurityCheck should not throw when linking to a http uri with a null principal");
- }
-
- // urlSecurityCheck also supports passing the url as a string
- try {
- urlSecurityCheck(HTTP_URI, nullPrincipal,
- DISALLOW_INHERIT_PRINCIPAL);
- }
- catch (ex) {
- do_throw("urlSecurityCheck failed to handle the http URI as a string (uri spec)");
- }
-
- let shouldThrow = true;
- try {
- urlSecurityCheck(CHROME_URI, nullPrincipal,
- DISALLOW_INHERIT_PRINCIPAL);
- }
- catch (ex) {
- shouldThrow = false;
- }
- if (shouldThrow)
- do_throw("urlSecurityCheck should throw when linking to a chrome uri with a null principal");
-}
-
-function test_stringBundle() {
- // This test verifies that the elements that can be used as file picker title
- // keys in the save* functions are actually present in the string bundle.
- // These keys are part of the contentAreaUtils.js public API.
- var validFilePickerTitleKeys = [
- "SaveImageTitle",
- "SaveVideoTitle",
- "SaveAudioTitle",
- "SaveLinkTitle",
- ];
-
- for (let filePickerTitleKey of validFilePickerTitleKeys) {
- // Just check that the string exists
- try {
- ContentAreaUtils.stringBundle.GetStringFromName(filePickerTitleKey);
- } catch (e) {
- do_throw("Error accessing file picker title key: " + filePickerTitleKey);
- }
- }
-}
-
-function run_test()
-{
- loadUtilsScript();
- test_urlSecurityCheck();
- test_stringBundle();
-}