summaryrefslogtreecommitdiffstats
path: root/image/test/browser/browser_docshell_type_editor.js
blob: 8ac98924fe3a1388a5a85ba6b0412aab9aa0aab4 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92

"use strict";

const Ci = Components.interfaces;
const SIMPLE_HTML = "data:text/html,<html><head></head><body></body></html>";

// The following URI is *not* accessible to content, hence loading that URI
// from an unprivileged site should be blocked. If docshell is of appType
// APP_TYPE_EDITOR however the load should be allowed.
// >> chrome://devtools/content/framework/dev-edition-promo/dev-edition-logo.png

add_task(function* () {
  info("docshell of appType APP_TYPE_EDITOR can access privileged images.");

  yield BrowserTestUtils.withNewTab({
    gBrowser,
    url: SIMPLE_HTML
  }, function* (browser) {
    yield ContentTask.spawn(browser, null, function* () {
      let rootDocShell = docShell.QueryInterface(Ci.nsIDocShellTreeItem)
                                 .rootTreeItem
                                 .QueryInterface(Ci.nsIInterfaceRequestor)
                                 .getInterface(Ci.nsIDocShell);
      let defaultAppType = rootDocShell.appType;

      rootDocShell.appType = Ci.nsIDocShell.APP_TYPE_EDITOR;

      is(rootDocShell.appType, Ci.nsIDocShell.APP_TYPE_EDITOR,
        "sanity check: appType after update should be type editor");

      return new Promise(resolve => {
        let doc = content.document;
        let image = doc.createElement("img");
        image.onload = function() {
          ok(true, "APP_TYPE_EDITOR is allowed to load privileged image");
          // restore appType of rootDocShell before moving on to the next test
          rootDocShell.appType = defaultAppType;
          resolve();
        }
        image.onerror = function() {
          ok(false, "APP_TYPE_EDITOR is allowed to load privileged image");
          // restore appType of rootDocShell before moving on to the next test
          rootDocShell.appType = defaultAppType;
          resolve();
        }
        doc.body.appendChild(image);
        image.src = "chrome://devtools/content/framework/dev-edition-promo/dev-edition-logo.png";
      });
    });
  });
});

add_task(function* () {
  info("docshell of appType APP_TYPE_UNKNOWN can *not* access privileged images.");

  yield BrowserTestUtils.withNewTab({
    gBrowser,
    url: SIMPLE_HTML
  }, function* (browser) {
    yield ContentTask.spawn(browser, null, function* () {
      let rootDocShell = docShell.QueryInterface(Ci.nsIDocShellTreeItem)
                                 .rootTreeItem
                                 .QueryInterface(Ci.nsIInterfaceRequestor)
                                 .getInterface(Ci.nsIDocShell);
      let defaultAppType = rootDocShell.appType;

      rootDocShell.appType = Ci.nsIDocShell.APP_TYPE_UNKNOWN;

      is(rootDocShell.appType, Ci.nsIDocShell.APP_TYPE_UNKNOWN,
        "sanity check: appType of docshell should be unknown");

      return new Promise(resolve => {
        let doc = content.document;
        let image = doc.createElement("img");
        image.onload = function() {
          ok(false, "APP_TYPE_UNKNOWN is *not* allowed to acces privileged image");
          // restore appType of rootDocShell before moving on to the next test
          rootDocShell.appType = defaultAppType;
          resolve();
        }
        image.onerror = function() {
          ok(true, "APP_TYPE_UNKNOWN is *not* allowed to acces privileged image");
          // restore appType of rootDocShell before moving on to the next test
          rootDocShell.appType = defaultAppType;
          resolve();
        }
        doc.body.appendChild(image);
        image.src = "chrome://devtools/content/framework/dev-edition-promo/dev-edition-logo.png";
      });
    });
  });
});