summaryrefslogtreecommitdiffstats
path: root/devtools/client/webconsole/test/browser_webconsole_view_source.js
blob: a81b58acc18273d2ecefd7d69b44fb2e1076122c (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
/* -*- indent-tabs-mode: nil; js-indent-level: 2 -*- */
/* vim: set ft=javascript ts=2 et sw=2 tw=80: */
/* Any copyright is dedicated to the Public Domain.
 * http://creativecommons.org/publicdomain/zero/1.0/ */

// Tests that source URLs in the Web Console can be clicked to display the
// standard View Source window. As JS exceptions and console.log() messages always
// have their locations opened in Debugger, we need to test a security message in
// order to have it opened in the standard View Source window.

"use strict";

const TEST_URI = "https://example.com/browser/devtools/client/webconsole/" +
                 "test/test-mixedcontent-securityerrors.html";

add_task(function* () {
  yield actuallyTest();
});

add_task(function* () {
  Services.prefs.setBoolPref("devtools.debugger.new-debugger-frontend", false);
  yield actuallyTest();
  Services.prefs.clearUserPref("devtools.debugger.new-debugger-frontend");
});

var actuallyTest = Task.async(function*() {
  yield loadTab(TEST_URI);
  let hud = yield openConsole(null);
  info("console opened");

  let [result] = yield waitForMessages({
    webconsole: hud,
    messages: [{
      text: "Blocked loading mixed active content",
      category: CATEGORY_SECURITY,
      severity: SEVERITY_ERROR,
    }],
  });

  let msg = [...result.matched][0];
  ok(msg, "error message");
  let locationNode = msg.querySelector(".message-location .frame-link-filename");
  ok(locationNode, "location node");

  let onTabOpen = waitForTab();

  EventUtils.sendMouseEvent({ type: "click" }, locationNode);

  let tab = yield onTabOpen;
  ok(true, "the view source tab was opened in response to clicking the location node");
  gBrowser.removeTab(tab);
});