From 4fb11cd5966461bccc3ed1599b808237be6b0de9 Mon Sep 17 00:00:00 2001 From: "Matt A. Tobin" Date: Sat, 10 Feb 2018 02:49:12 -0500 Subject: Move WebExtensions enabled Add-ons Manager --- .../test/xpinstall/browser_whitelist2.js | 31 ++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 toolkit/mozapps/webextensions/test/xpinstall/browser_whitelist2.js (limited to 'toolkit/mozapps/webextensions/test/xpinstall/browser_whitelist2.js') diff --git a/toolkit/mozapps/webextensions/test/xpinstall/browser_whitelist2.js b/toolkit/mozapps/webextensions/test/xpinstall/browser_whitelist2.js new file mode 100644 index 000000000..fd9e944e8 --- /dev/null +++ b/toolkit/mozapps/webextensions/test/xpinstall/browser_whitelist2.js @@ -0,0 +1,31 @@ +// ---------------------------------------------------------------------------- +// Tests installing an unsigned add-on through an InstallTrigger call in web +// content. This should be blocked by the whitelist check because the source +// is not whitelisted, even though the target is. +function test() { + Harness.installBlockedCallback = allow_blocked; + Harness.installsCompletedCallback = finish_test; + Harness.setup(); + + var pm = Services.perms; + pm.add(makeURI("http://example.org/"), "install", pm.ALLOW_ACTION); + + var triggers = encodeURIComponent(JSON.stringify({ + "Unsigned XPI": TESTROOT2 + "amosigned.xpi" + })); + gBrowser.selectedTab = gBrowser.addTab(); + gBrowser.loadURI(TESTROOT + "installtrigger.html?" + triggers); +} + +function allow_blocked(installInfo) { + is(installInfo.browser, gBrowser.selectedBrowser, "Install should have been triggered by the right browser"); + is(installInfo.originatingURI.spec, gBrowser.currentURI.spec, "Install should have been triggered by the right uri"); + return false; +} + +function finish_test() { + Services.perms.remove(makeURI("http://example.org"), "install"); + + gBrowser.removeCurrentTab(); + Harness.finish(); +} -- cgit v1.2.3