mirror of
https://gitlab.winehq.org/wine/wine-gecko.git
synced 2024-09-13 09:24:08 -07:00
39 lines
1.4 KiB
JavaScript
39 lines
1.4 KiB
JavaScript
// Load in the test harness
|
|
var scriptLoader = Components.classes["@mozilla.org/moz/jssubscript-loader;1"]
|
|
.getService(Components.interfaces.mozIJSSubScriptLoader);
|
|
|
|
var rootDir = getRootDirectory(window.location.href);
|
|
scriptLoader.loadSubScript(rootDir + "harness.js", this);
|
|
|
|
// ----------------------------------------------------------------------------
|
|
// Tests installing an unsigned add-on through an InstallTrigger call in web
|
|
// content. This should be blocked by the whitelist check because the source
|
|
// is not whitelisted, even though the target is.
|
|
function test() {
|
|
Harness.installBlockedCallback = allow_blocked;
|
|
Harness.installsCompletedCallback = finish_test;
|
|
Harness.setup();
|
|
|
|
var pm = Services.perms;
|
|
pm.add(makeURI("http://example.org/"), "install", pm.ALLOW_ACTION);
|
|
|
|
var triggers = encodeURIComponent(JSON.stringify({
|
|
"Unsigned XPI": TESTROOT2 + "unsigned.xpi"
|
|
}));
|
|
gBrowser.selectedTab = gBrowser.addTab();
|
|
gBrowser.loadURI(TESTROOT + "installtrigger.html?" + triggers);
|
|
}
|
|
|
|
function allow_blocked(installInfo) {
|
|
is(installInfo.originatingWindow, gBrowser.contentWindow, "Install should have been triggered by the right window");
|
|
is(installInfo.originatingURI.spec, gBrowser.currentURI.spec, "Install should have been triggered by the right uri");
|
|
return false;
|
|
}
|
|
|
|
function finish_test() {
|
|
Services.perms.remove("example.org", "install");
|
|
|
|
gBrowser.removeCurrentTab();
|
|
Harness.finish();
|
|
}
|