// ---------------------------------------------------------------------------- // Tests installing an unsigned add-on through an InstallTrigger call in web // content. This should be blocked by the whitelist check because the source // is not whitelisted, even though the target is. function test() { Harness.installBlockedCallback = allow_blocked; Harness.installsCompletedCallback = finish_test; Harness.setup(); var pm = Services.perms; pm.add(makeURI("http://example.org/"), "install", pm.ALLOW_ACTION); var triggers = encodeURIComponent(JSON.stringify({ "Unsigned XPI": TESTROOT2 + "unsigned.xpi" })); gBrowser.selectedTab = gBrowser.addTab(); gBrowser.loadURI(TESTROOT + "installtrigger.html?" + triggers); } function allow_blocked(installInfo) { is(installInfo.browser, gBrowser.selectedBrowser, "Install should have been triggered by the right browser"); is(installInfo.originatingURI.spec, gBrowser.currentURI.spec, "Install should have been triggered by the right uri"); return false; } function finish_test() { Services.perms.remove("example.org", "install"); gBrowser.removeCurrentTab(); Harness.finish(); }