diff options
Diffstat (limited to 'toolkit/content/tests/unit')
-rw-r--r-- | toolkit/content/tests/unit/.eslintrc.js | 7 | ||||
-rw-r--r-- | toolkit/content/tests/unit/test_contentAreaUtils.js | 80 | ||||
-rw-r--r-- | toolkit/content/tests/unit/xpcshell.ini | 5 |
3 files changed, 0 insertions, 92 deletions
diff --git a/toolkit/content/tests/unit/.eslintrc.js b/toolkit/content/tests/unit/.eslintrc.js deleted file mode 100644 index fee088c17..000000000 --- a/toolkit/content/tests/unit/.eslintrc.js +++ /dev/null @@ -1,7 +0,0 @@ -"use strict"; - -module.exports = { - "extends": [ - "../../../../testing/xpcshell/xpcshell.eslintrc.js" - ] -}; diff --git a/toolkit/content/tests/unit/test_contentAreaUtils.js b/toolkit/content/tests/unit/test_contentAreaUtils.js deleted file mode 100644 index 970e779ce..000000000 --- a/toolkit/content/tests/unit/test_contentAreaUtils.js +++ /dev/null @@ -1,80 +0,0 @@ -/* -*- indent-tabs-mode: nil; js-indent-level: 2 -*- */ -/* This Source Code Form is subject to the terms of the Mozilla Public - * License, v. 2.0. If a copy of the MPL was not distributed with this - * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ - -var Ci = Components.interfaces; -var Cc = Components.classes; -var Cr = Components.results; - -function loadUtilsScript() { - var loader = Cc["@mozilla.org/moz/jssubscript-loader;1"]. - getService(Ci.mozIJSSubScriptLoader); - loader.loadSubScript("chrome://global/content/contentAreaUtils.js"); -} - -function test_urlSecurityCheck() { - var nullPrincipal = Cc["@mozilla.org/nullprincipal;1"]. - createInstance(Ci.nsIPrincipal); - - const HTTP_URI = "http://www.mozilla.org/"; - const CHROME_URI = "chrome://browser/content/browser.xul"; - const DISALLOW_INHERIT_PRINCIPAL = - Ci.nsIScriptSecurityManager.DISALLOW_INHERIT_PRINCIPAL; - - try { - urlSecurityCheck(makeURI(HTTP_URI), nullPrincipal, - DISALLOW_INHERIT_PRINCIPAL); - } - catch (ex) { - do_throw("urlSecurityCheck should not throw when linking to a http uri with a null principal"); - } - - // urlSecurityCheck also supports passing the url as a string - try { - urlSecurityCheck(HTTP_URI, nullPrincipal, - DISALLOW_INHERIT_PRINCIPAL); - } - catch (ex) { - do_throw("urlSecurityCheck failed to handle the http URI as a string (uri spec)"); - } - - let shouldThrow = true; - try { - urlSecurityCheck(CHROME_URI, nullPrincipal, - DISALLOW_INHERIT_PRINCIPAL); - } - catch (ex) { - shouldThrow = false; - } - if (shouldThrow) - do_throw("urlSecurityCheck should throw when linking to a chrome uri with a null principal"); -} - -function test_stringBundle() { - // This test verifies that the elements that can be used as file picker title - // keys in the save* functions are actually present in the string bundle. - // These keys are part of the contentAreaUtils.js public API. - var validFilePickerTitleKeys = [ - "SaveImageTitle", - "SaveVideoTitle", - "SaveAudioTitle", - "SaveLinkTitle", - ]; - - for (let filePickerTitleKey of validFilePickerTitleKeys) { - // Just check that the string exists - try { - ContentAreaUtils.stringBundle.GetStringFromName(filePickerTitleKey); - } catch (e) { - do_throw("Error accessing file picker title key: " + filePickerTitleKey); - } - } -} - -function run_test() -{ - loadUtilsScript(); - test_urlSecurityCheck(); - test_stringBundle(); -} diff --git a/toolkit/content/tests/unit/xpcshell.ini b/toolkit/content/tests/unit/xpcshell.ini deleted file mode 100644 index 33a0383bd..000000000 --- a/toolkit/content/tests/unit/xpcshell.ini +++ /dev/null @@ -1,5 +0,0 @@ -[DEFAULT] -head = -tail = - -[test_contentAreaUtils.js] |