mirror of
https://github.com/mozilla/gecko-dev.git
synced 2025-11-12 22:28:59 +02:00
--HG-- rename : toolkit/components/url-classifier/tests/mochitest/evilWorker.js => toolkit/components/url-classifier/tests/mochitest/unwantedWorker.js extra : rebase_source : efe09564160fb2fcb1adb5f6599183f053268c40
48 lines
1.5 KiB
HTML
48 lines
1.5 KiB
HTML
<html>
|
|
<head>
|
|
<title></title>
|
|
|
|
<script type="text/javascript">
|
|
|
|
var scriptItem = "untouched";
|
|
|
|
function checkLoads() {
|
|
// Make sure the javascript did not load.
|
|
window.parent.is(scriptItem, "untouched", "Should not load bad javascript");
|
|
|
|
// Make sure the css did not load.
|
|
var elt = document.getElementById("styleCheck");
|
|
var style = document.defaultView.getComputedStyle(elt, "");
|
|
window.parent.isnot(style.visibility, "hidden", "Should not load bad css");
|
|
|
|
// Call parent.loadTestFrame again to test classification metadata in HTTP
|
|
// cache entries.
|
|
if (window.parent.firstLoad) {
|
|
window.parent.info("Reloading from cache...");
|
|
window.parent.firstLoad = false;
|
|
window.parent.loadTestFrame();
|
|
return;
|
|
}
|
|
|
|
// End (parent) test.
|
|
window.parent.SimpleTest.finish();
|
|
}
|
|
|
|
</script>
|
|
|
|
<!-- Try loading from a malware javascript URI -->
|
|
<script type="text/javascript" src="http://malware.example.com/tests/toolkit/components/url-classifier/tests/mochitest/evil.js"></script>
|
|
|
|
<!-- Try loading from an uwanted software css URI -->
|
|
<link rel="stylesheet" type="text/css" href="http://unwanted.example.com/tests/toolkit/components/url-classifier/tests/mochitest/evil.css"></link>
|
|
|
|
<!-- XXX How is this part of the test supposed to work (= be checked)? -->
|
|
<!-- Try loading a marked-as-malware css through an @import from a clean URI -->
|
|
<link rel="stylesheet" type="text/css" href="import.css"></link>
|
|
</head>
|
|
|
|
<body onload="checkLoads()">
|
|
The following should not be hidden:
|
|
<div id="styleCheck">STYLE TEST</div>
|
|
</body>
|
|
</html>
|