forked from mirrors/gecko-dev
MozReview-Commit-ID: 370JbqadhaQ --HG-- extra : rebase_source : 81c5e068292a8b86f263cc81d94764fd906a7e24
27 lines
1,019 B
JavaScript
27 lines
1,019 B
JavaScript
/*
|
|
* Any copyright is dedicated to the Public Domain.
|
|
* http://creativecommons.org/publicdomain/zero/1.0/
|
|
*
|
|
* Test for Bug 1182551 -
|
|
*
|
|
* This test has a top level HTTP page with an HTTPS iframe. The HTTPS iframe
|
|
* includes an HTTP image. We check that the top level security state is
|
|
* STATE_IS_INSECURE. The mixed content from the iframe shouldn't "upgrade"
|
|
* the HTTP top level page to broken HTTPS.
|
|
*/
|
|
|
|
const TEST_URL = getRootDirectory(gTestPath).replace("chrome://mochitests/content", "http://example.com") + "file_mixedContentFramesOnHttp.html";
|
|
|
|
add_task(async function() {
|
|
await SpecialPowers.pushPrefEnv({
|
|
"set": [
|
|
["security.mixed_content.block_active_content", true],
|
|
["security.mixed_content.block_display_content", false]
|
|
]});
|
|
|
|
await BrowserTestUtils.withNewTab(TEST_URL, async function(browser) {
|
|
isSecurityState(browser, "insecure");
|
|
await assertMixedContentBlockingState(browser, {activeLoaded: false, activeBlocked: false, passiveLoaded: true});
|
|
});
|
|
});
|
|
|