mirror of
https://github.com/mozilla/gecko-dev.git
synced 2025-11-06 03:09:18 +02:00
The xpi files signed with AMO staging signatures are: browser_webext_nopermissions.xpi and browser_webext_permissions.xpi while the rest of xpi files included in this patch are unsigned. Locally none of these tests seems to be hitting any failure, but we should double-check it also with a push to try to confirm that is going to be the case also on the build infrastructure. Differential Revision: https://phabricator.services.mozilla.com/D205926
35 lines
1.2 KiB
JavaScript
35 lines
1.2 KiB
JavaScript
"use strict";
|
|
|
|
const INSTALL_PAGE = `${BASE}/file_install_extensions.html`;
|
|
|
|
async function installTrigger(filename) {
|
|
await SpecialPowers.pushPrefEnv({
|
|
set: [
|
|
["extensions.InstallTrigger.enabled", true],
|
|
["extensions.InstallTriggerImpl.enabled", true],
|
|
// Relax the user input requirements while running this test.
|
|
["xpinstall.userActivation.required", false],
|
|
// This test asserts that the extension icon is in the install dialog
|
|
// and so it requires the signature checks to be enabled (otherwise the
|
|
// extension icon is expected to be replaced by a warning icon) and the
|
|
// two test extension used by this test (browser_webext_nopermissions.xpi
|
|
// and browser_webext_permissions.xpi) are signed using AMO stage signatures.
|
|
["xpinstall.signatures.dev-root", true],
|
|
],
|
|
});
|
|
BrowserTestUtils.startLoadingURIString(
|
|
gBrowser.selectedBrowser,
|
|
INSTALL_PAGE
|
|
);
|
|
await BrowserTestUtils.browserLoaded(gBrowser.selectedBrowser);
|
|
|
|
SpecialPowers.spawn(
|
|
gBrowser.selectedBrowser,
|
|
[`${BASE}/${filename}`],
|
|
async function (url) {
|
|
content.wrappedJSObject.installTrigger(url);
|
|
}
|
|
);
|
|
}
|
|
|
|
add_task(() => testInstallMethod(installTrigger, "installAmo"));
|