forked from mirrors/gecko-dev
With this patch we skip the isSecureContext check for pdf.js principals. This fixes the bug, but has the side-effect that we will show secure, non-HTTPS contexts as insecure. Differential Revision: https://phabricator.services.mozilla.com/D108969
735 lines
20 KiB
JavaScript
735 lines
20 KiB
JavaScript
/*
|
|
* Test the identity mode UI for a variety of page types
|
|
*/
|
|
|
|
"use strict";
|
|
|
|
const DUMMY = "browser/browser/base/content/test/siteIdentity/dummy_page.html";
|
|
const INSECURE_ICON_PREF = "security.insecure_connection_icon.enabled";
|
|
const INSECURE_TEXT_PREF = "security.insecure_connection_text.enabled";
|
|
const INSECURE_PBMODE_ICON_PREF =
|
|
"security.insecure_connection_icon.pbmode.enabled";
|
|
|
|
function loadNewTab(url) {
|
|
return BrowserTestUtils.openNewForegroundTab(gBrowser, url, true);
|
|
}
|
|
|
|
function getIdentityMode(aWindow = window) {
|
|
return aWindow.document.getElementById("identity-box").className;
|
|
}
|
|
|
|
function getConnectionState() {
|
|
// Prevents items that are being lazy loaded causing issues
|
|
document.getElementById("identity-icon-box").click();
|
|
gIdentityHandler.refreshIdentityPopup();
|
|
return document.getElementById("identity-popup").getAttribute("connection");
|
|
}
|
|
|
|
function getSecurityConnectionBG() {
|
|
// Get the background image of the security connection.
|
|
document.getElementById("identity-icon-box").click();
|
|
gIdentityHandler.refreshIdentityPopup();
|
|
return gBrowser.ownerGlobal
|
|
.getComputedStyle(
|
|
document
|
|
.getElementById("identity-popup-mainView")
|
|
.getElementsByClassName("identity-popup-security-connection")[0]
|
|
)
|
|
.getPropertyValue("background-image");
|
|
}
|
|
|
|
function getReaderModeURL() {
|
|
// Gets the reader mode URL from "identity-popup mainView panel header span"
|
|
document.getElementById("identity-icon-box").click();
|
|
gIdentityHandler.refreshIdentityPopup();
|
|
return document.getElementById("identity-popup-mainView-panel-header-span")
|
|
.innerHTML;
|
|
}
|
|
|
|
// This test is slow on Linux debug e10s
|
|
requestLongerTimeout(2);
|
|
|
|
async function webpageTest(secureCheck) {
|
|
await SpecialPowers.pushPrefEnv({ set: [[INSECURE_ICON_PREF, secureCheck]] });
|
|
let oldTab = await loadNewTab("about:robots");
|
|
|
|
let newTab = await loadNewTab("http://example.com/" + DUMMY);
|
|
if (secureCheck) {
|
|
is(getIdentityMode(), "notSecure", "Identity should be not secure");
|
|
} else {
|
|
is(getIdentityMode(), "unknownIdentity", "Identity should be unknown");
|
|
}
|
|
|
|
gBrowser.selectedTab = oldTab;
|
|
is(getIdentityMode(), "localResource", "Identity should be localResource");
|
|
|
|
gBrowser.selectedTab = newTab;
|
|
if (secureCheck) {
|
|
is(getIdentityMode(), "notSecure", "Identity should be not secure");
|
|
} else {
|
|
is(getIdentityMode(), "unknownIdentity", "Identity should be unknown");
|
|
}
|
|
|
|
gBrowser.removeTab(newTab);
|
|
gBrowser.removeTab(oldTab);
|
|
await SpecialPowers.popPrefEnv();
|
|
}
|
|
|
|
add_task(async function test_webpage() {
|
|
await webpageTest(false);
|
|
await webpageTest(true);
|
|
});
|
|
|
|
async function webpageTestTextWarning(secureCheck) {
|
|
await SpecialPowers.pushPrefEnv({ set: [[INSECURE_TEXT_PREF, secureCheck]] });
|
|
let oldTab = await loadNewTab("about:robots");
|
|
|
|
let newTab = await loadNewTab("http://example.com/" + DUMMY);
|
|
if (secureCheck) {
|
|
is(
|
|
getIdentityMode(),
|
|
"notSecure notSecureText",
|
|
"Identity should have not secure text"
|
|
);
|
|
} else {
|
|
is(getIdentityMode(), "notSecure", "Identity should be not secure");
|
|
}
|
|
|
|
gBrowser.selectedTab = oldTab;
|
|
is(getIdentityMode(), "localResource", "Identity should be localResource");
|
|
|
|
gBrowser.selectedTab = newTab;
|
|
if (secureCheck) {
|
|
is(
|
|
getIdentityMode(),
|
|
"notSecure notSecureText",
|
|
"Identity should have not secure text"
|
|
);
|
|
} else {
|
|
is(getIdentityMode(), "notSecure", "Identity should be not secure");
|
|
}
|
|
|
|
gBrowser.removeTab(newTab);
|
|
gBrowser.removeTab(oldTab);
|
|
await SpecialPowers.popPrefEnv();
|
|
}
|
|
|
|
add_task(async function test_webpage_text_warning() {
|
|
await webpageTestTextWarning(false);
|
|
await webpageTestTextWarning(true);
|
|
});
|
|
|
|
async function webpageTestTextWarningCombined(secureCheck) {
|
|
await SpecialPowers.pushPrefEnv({
|
|
set: [
|
|
[INSECURE_TEXT_PREF, secureCheck],
|
|
[INSECURE_ICON_PREF, secureCheck],
|
|
],
|
|
});
|
|
let oldTab = await loadNewTab("about:robots");
|
|
|
|
let newTab = await loadNewTab("http://example.com/" + DUMMY);
|
|
if (secureCheck) {
|
|
is(
|
|
getIdentityMode(),
|
|
"notSecure notSecureText",
|
|
"Identity should be not secure"
|
|
);
|
|
} else {
|
|
is(getIdentityMode(), "unknownIdentity", "Identity should be unknown");
|
|
}
|
|
|
|
gBrowser.selectedTab = oldTab;
|
|
is(getIdentityMode(), "unknownIdentity", "Identity should be unknown");
|
|
|
|
gBrowser.selectedTab = newTab;
|
|
if (secureCheck) {
|
|
is(
|
|
getIdentityMode(),
|
|
"notSecure notSecureText",
|
|
"Identity should be not secure"
|
|
);
|
|
} else {
|
|
is(getIdentityMode(), "unknownIdentity", "Identity should be unknown");
|
|
}
|
|
|
|
gBrowser.removeTab(newTab);
|
|
gBrowser.removeTab(oldTab);
|
|
await SpecialPowers.popPrefEnv();
|
|
}
|
|
|
|
add_task(async function test_webpage_text_warning_combined() {
|
|
await webpageTestTextWarning(false);
|
|
await webpageTestTextWarning(true);
|
|
});
|
|
|
|
async function blankPageTest(secureCheck) {
|
|
let oldTab = await loadNewTab("about:robots");
|
|
await SpecialPowers.pushPrefEnv({ set: [[INSECURE_ICON_PREF, secureCheck]] });
|
|
|
|
let newTab = await loadNewTab("about:blank");
|
|
is(
|
|
gURLBar.getAttribute("pageproxystate"),
|
|
"invalid",
|
|
"pageproxystate should be invalid"
|
|
);
|
|
|
|
gBrowser.selectedTab = oldTab;
|
|
is(
|
|
gURLBar.getAttribute("pageproxystate"),
|
|
"valid",
|
|
"pageproxystate should be valid"
|
|
);
|
|
is(getIdentityMode(), "localResource", "Identity should be localResource");
|
|
|
|
gBrowser.selectedTab = newTab;
|
|
is(
|
|
gURLBar.getAttribute("pageproxystate"),
|
|
"invalid",
|
|
"pageproxystate should be invalid"
|
|
);
|
|
|
|
gBrowser.removeTab(newTab);
|
|
gBrowser.removeTab(oldTab);
|
|
await SpecialPowers.popPrefEnv();
|
|
}
|
|
|
|
add_task(async function test_blank() {
|
|
await blankPageTest(true);
|
|
await blankPageTest(false);
|
|
});
|
|
|
|
async function secureTest(secureCheck) {
|
|
let oldTab = await loadNewTab("about:robots");
|
|
await SpecialPowers.pushPrefEnv({ set: [[INSECURE_ICON_PREF, secureCheck]] });
|
|
|
|
let newTab = await loadNewTab("https://example.com/" + DUMMY);
|
|
is(getIdentityMode(), "verifiedDomain", "Identity should be verified");
|
|
|
|
gBrowser.selectedTab = oldTab;
|
|
is(getIdentityMode(), "localResource", "Identity should be localResource");
|
|
|
|
gBrowser.selectedTab = newTab;
|
|
is(getIdentityMode(), "verifiedDomain", "Identity should be verified");
|
|
|
|
gBrowser.removeTab(newTab);
|
|
gBrowser.removeTab(oldTab);
|
|
|
|
await SpecialPowers.popPrefEnv();
|
|
}
|
|
|
|
add_task(async function test_secure_enabled() {
|
|
await secureTest(true);
|
|
await secureTest(false);
|
|
});
|
|
|
|
async function viewSourceTest() {
|
|
let sourceTab = await loadNewTab("view-source:https://example.com/" + DUMMY);
|
|
|
|
gBrowser.selectedTab = sourceTab;
|
|
is(
|
|
getIdentityMode(),
|
|
"verifiedDomain",
|
|
"Identity should be verified while viewing source"
|
|
);
|
|
|
|
gBrowser.removeTab(sourceTab);
|
|
}
|
|
|
|
add_task(async function test_viewSource() {
|
|
await viewSourceTest();
|
|
});
|
|
|
|
async function insecureTest(secureCheck) {
|
|
let oldTab = await loadNewTab("about:robots");
|
|
await SpecialPowers.pushPrefEnv({ set: [[INSECURE_ICON_PREF, secureCheck]] });
|
|
|
|
let newTab = await loadNewTab("http://example.com/" + DUMMY);
|
|
if (secureCheck) {
|
|
is(getIdentityMode(), "notSecure", "Identity should be not secure");
|
|
is(
|
|
document.getElementById("identity-icon").getAttribute("tooltiptext"),
|
|
gNavigatorBundle.getString("identity.notSecure.tooltip"),
|
|
"The insecure lock icon has a correct tooltip text."
|
|
);
|
|
} else {
|
|
is(getIdentityMode(), "unknownIdentity", "Identity should be unknown");
|
|
}
|
|
|
|
gBrowser.selectedTab = oldTab;
|
|
is(getIdentityMode(), "localResource", "Identity should be localResource");
|
|
|
|
gBrowser.selectedTab = newTab;
|
|
if (secureCheck) {
|
|
is(getIdentityMode(), "notSecure", "Identity should be not secure");
|
|
is(
|
|
document.getElementById("identity-icon").getAttribute("tooltiptext"),
|
|
gNavigatorBundle.getString("identity.notSecure.tooltip"),
|
|
"The insecure lock icon has a correct tooltip text."
|
|
);
|
|
} else {
|
|
is(getIdentityMode(), "unknownIdentity", "Identity should be unknown");
|
|
}
|
|
|
|
gBrowser.removeTab(newTab);
|
|
gBrowser.removeTab(oldTab);
|
|
|
|
await SpecialPowers.popPrefEnv();
|
|
}
|
|
|
|
add_task(async function test_insecure() {
|
|
await insecureTest(true);
|
|
await insecureTest(false);
|
|
});
|
|
|
|
async function addonsTest(secureCheck) {
|
|
let oldTab = await loadNewTab("about:robots");
|
|
await SpecialPowers.pushPrefEnv({ set: [[INSECURE_ICON_PREF, secureCheck]] });
|
|
|
|
let newTab = await loadNewTab("about:addons");
|
|
is(getIdentityMode(), "chromeUI", "Identity should be chrome");
|
|
|
|
gBrowser.selectedTab = oldTab;
|
|
is(getIdentityMode(), "localResource", "Identity should be localResource");
|
|
|
|
gBrowser.selectedTab = newTab;
|
|
is(getIdentityMode(), "chromeUI", "Identity should be chrome");
|
|
|
|
gBrowser.removeTab(newTab);
|
|
gBrowser.removeTab(oldTab);
|
|
|
|
await SpecialPowers.popPrefEnv();
|
|
}
|
|
|
|
add_task(async function test_addons() {
|
|
await addonsTest(true);
|
|
await addonsTest(false);
|
|
});
|
|
|
|
async function fileTest(secureCheck) {
|
|
let oldTab = await loadNewTab("about:robots");
|
|
await SpecialPowers.pushPrefEnv({ set: [[INSECURE_ICON_PREF, secureCheck]] });
|
|
let fileURI = getTestFilePath("");
|
|
|
|
let newTab = await loadNewTab(fileURI);
|
|
is(getConnectionState(), "file", "Connection should be file");
|
|
|
|
gBrowser.selectedTab = oldTab;
|
|
is(getIdentityMode(), "localResource", "Identity should be localResource");
|
|
|
|
gBrowser.selectedTab = newTab;
|
|
is(getConnectionState(), "file", "Connection should be file");
|
|
|
|
gBrowser.removeTab(newTab);
|
|
gBrowser.removeTab(oldTab);
|
|
|
|
await SpecialPowers.popPrefEnv();
|
|
}
|
|
|
|
add_task(async function test_file() {
|
|
await fileTest(true);
|
|
await fileTest(false);
|
|
});
|
|
|
|
async function resourceUriTest(secureCheck) {
|
|
let oldTab = await loadNewTab("about:robots");
|
|
await SpecialPowers.pushPrefEnv({ set: [[INSECURE_ICON_PREF, secureCheck]] });
|
|
let dataURI = "resource://gre/modules/Services.jsm";
|
|
|
|
let newTab = await loadNewTab(dataURI);
|
|
|
|
is(getConnectionState(), "file", "Connection should be file");
|
|
|
|
gBrowser.selectedTab = oldTab;
|
|
is(
|
|
getIdentityMode(),
|
|
"localResource",
|
|
"Identity should be a local a resource"
|
|
);
|
|
|
|
gBrowser.selectedTab = newTab;
|
|
is(getConnectionState(), "file", "Connection should be file");
|
|
|
|
gBrowser.removeTab(newTab);
|
|
gBrowser.removeTab(oldTab);
|
|
|
|
await SpecialPowers.popPrefEnv();
|
|
}
|
|
|
|
add_task(async function test_resource_uri() {
|
|
await resourceUriTest(true);
|
|
await resourceUriTest(false);
|
|
});
|
|
|
|
async function noCertErrorTest(secureCheck) {
|
|
let oldTab = await loadNewTab("about:robots");
|
|
await SpecialPowers.pushPrefEnv({ set: [[INSECURE_ICON_PREF, secureCheck]] });
|
|
let newTab = BrowserTestUtils.addTab(gBrowser);
|
|
gBrowser.selectedTab = newTab;
|
|
|
|
let promise = BrowserTestUtils.waitForErrorPage(gBrowser.selectedBrowser);
|
|
BrowserTestUtils.loadURI(gBrowser, "https://nocert.example.com/");
|
|
await promise;
|
|
is(
|
|
getIdentityMode(),
|
|
"certErrorPage",
|
|
"Identity should be the cert error page."
|
|
);
|
|
is(
|
|
getConnectionState(),
|
|
"cert-error-page",
|
|
"Connection should be the cert error page."
|
|
);
|
|
|
|
gBrowser.selectedTab = oldTab;
|
|
is(getIdentityMode(), "localResource", "Identity should be localResource");
|
|
|
|
gBrowser.selectedTab = newTab;
|
|
is(
|
|
getIdentityMode(),
|
|
"certErrorPage",
|
|
"Identity should be the cert error page."
|
|
);
|
|
is(
|
|
getConnectionState(),
|
|
"cert-error-page",
|
|
"Connection should be the cert error page."
|
|
);
|
|
|
|
gBrowser.removeTab(newTab);
|
|
gBrowser.removeTab(oldTab);
|
|
|
|
await SpecialPowers.popPrefEnv();
|
|
}
|
|
|
|
add_task(async function test_about_net_error_uri() {
|
|
await noCertErrorTest(true);
|
|
await noCertErrorTest(false);
|
|
});
|
|
|
|
add_task(async function httpsOnlyErrorTest() {
|
|
let oldTab = await loadNewTab("about:robots");
|
|
await SpecialPowers.pushPrefEnv({
|
|
set: [["dom.security.https_only_mode", true]],
|
|
});
|
|
let newTab = BrowserTestUtils.addTab(gBrowser);
|
|
gBrowser.selectedTab = newTab;
|
|
|
|
let promise = BrowserTestUtils.waitForErrorPage(gBrowser.selectedBrowser);
|
|
BrowserTestUtils.loadURI(gBrowser, "http://nocert.example.com/");
|
|
await promise;
|
|
is(
|
|
getIdentityMode(),
|
|
"httpsOnlyErrorPage",
|
|
"Identity should be the https-only mode error page."
|
|
);
|
|
is(
|
|
getConnectionState(),
|
|
"https-only-error-page",
|
|
"Connection should be the https-only mode error page."
|
|
);
|
|
|
|
gBrowser.selectedTab = oldTab;
|
|
is(getIdentityMode(), "localResource", "Identity should be localResource");
|
|
|
|
gBrowser.selectedTab = newTab;
|
|
is(
|
|
getIdentityMode(),
|
|
"httpsOnlyErrorPage",
|
|
"Identity should be the https-only mode error page."
|
|
);
|
|
is(
|
|
getConnectionState(),
|
|
"https-only-error-page",
|
|
"Connection should be the https-only mode page."
|
|
);
|
|
|
|
gBrowser.removeTab(newTab);
|
|
gBrowser.removeTab(oldTab);
|
|
|
|
await SpecialPowers.popPrefEnv();
|
|
});
|
|
|
|
async function noCertErrorFromNavigationTest(secureCheck) {
|
|
await SpecialPowers.pushPrefEnv({ set: [[INSECURE_ICON_PREF, secureCheck]] });
|
|
let newTab = await loadNewTab("http://example.com/" + DUMMY);
|
|
|
|
let promise = BrowserTestUtils.waitForErrorPage(gBrowser.selectedBrowser);
|
|
await SpecialPowers.spawn(gBrowser.selectedBrowser, [], function() {
|
|
content.document.getElementById("no-cert").click();
|
|
});
|
|
await promise;
|
|
await SpecialPowers.spawn(gBrowser.selectedBrowser, [], function() {
|
|
is(
|
|
content.window.location.href,
|
|
"https://nocert.example.com/",
|
|
"Should be the cert error URL"
|
|
);
|
|
});
|
|
|
|
is(
|
|
newTab.linkedBrowser.documentURI.spec.startsWith("about:certerror?"),
|
|
true,
|
|
"Should be an about:certerror"
|
|
);
|
|
is(
|
|
getIdentityMode(),
|
|
"certErrorPage",
|
|
"Identity should be the cert error page."
|
|
);
|
|
is(
|
|
getConnectionState(),
|
|
"cert-error-page",
|
|
"Connection should be the cert error page."
|
|
);
|
|
|
|
gBrowser.removeTab(newTab);
|
|
|
|
await SpecialPowers.popPrefEnv();
|
|
}
|
|
|
|
add_task(async function test_about_net_error_uri_from_navigation_tab() {
|
|
await noCertErrorFromNavigationTest(true);
|
|
await noCertErrorFromNavigationTest(false);
|
|
});
|
|
|
|
async function aboutBlockedTest(secureCheck) {
|
|
let url = "http://www.itisatrap.org/firefox/its-an-attack.html";
|
|
let oldTab = await loadNewTab("about:robots");
|
|
await SpecialPowers.pushPrefEnv({
|
|
set: [
|
|
[INSECURE_ICON_PREF, secureCheck],
|
|
["urlclassifier.blockedTable", "moztest-block-simple"],
|
|
],
|
|
});
|
|
let newTab = BrowserTestUtils.addTab(gBrowser);
|
|
gBrowser.selectedTab = newTab;
|
|
|
|
BrowserTestUtils.loadURI(gBrowser.selectedBrowser, url);
|
|
|
|
await BrowserTestUtils.browserLoaded(
|
|
gBrowser.selectedBrowser,
|
|
false,
|
|
url,
|
|
true
|
|
);
|
|
|
|
is(getIdentityMode(), "unknownIdentity", "Identity should be unknown.");
|
|
is(getConnectionState(), "not-secure", "Connection should be not secure.");
|
|
|
|
gBrowser.selectedTab = oldTab;
|
|
is(getIdentityMode(), "localResource", "Identity should be localResource");
|
|
|
|
gBrowser.selectedTab = newTab;
|
|
is(getIdentityMode(), "unknownIdentity", "Identity should be unknown.");
|
|
is(getConnectionState(), "not-secure", "Connection should be not secure.");
|
|
|
|
gBrowser.removeTab(newTab);
|
|
gBrowser.removeTab(oldTab);
|
|
|
|
await SpecialPowers.popPrefEnv();
|
|
}
|
|
|
|
add_task(async function test_about_blocked() {
|
|
await aboutBlockedTest(true);
|
|
await aboutBlockedTest(false);
|
|
});
|
|
|
|
add_task(async function noCertErrorSecurityConnectionBGTest() {
|
|
let tab = BrowserTestUtils.addTab(gBrowser);
|
|
gBrowser.selectedTab = tab;
|
|
let promise = BrowserTestUtils.waitForErrorPage(gBrowser.selectedBrowser);
|
|
BrowserTestUtils.loadURI(gBrowser, "https://nocert.example.com/");
|
|
await promise;
|
|
|
|
is(
|
|
getSecurityConnectionBG(),
|
|
`url("chrome://global/skin/icons/security-warning.svg")`,
|
|
"Security connection should show a warning lock icon."
|
|
);
|
|
|
|
BrowserTestUtils.removeTab(tab);
|
|
});
|
|
|
|
async function aboutUriTest(secureCheck) {
|
|
let oldTab = await loadNewTab("about:robots");
|
|
await SpecialPowers.pushPrefEnv({ set: [[INSECURE_ICON_PREF, secureCheck]] });
|
|
let aboutURI = "about:robots";
|
|
|
|
let newTab = await loadNewTab(aboutURI);
|
|
is(getConnectionState(), "file", "Connection should be file");
|
|
|
|
gBrowser.selectedTab = oldTab;
|
|
is(getIdentityMode(), "localResource", "Identity should be localResource");
|
|
|
|
gBrowser.selectedTab = newTab;
|
|
is(getConnectionState(), "file", "Connection should be file");
|
|
|
|
gBrowser.removeTab(newTab);
|
|
gBrowser.removeTab(oldTab);
|
|
|
|
await SpecialPowers.popPrefEnv();
|
|
}
|
|
|
|
add_task(async function test_about_uri() {
|
|
await aboutUriTest(true);
|
|
await aboutUriTest(false);
|
|
});
|
|
|
|
async function readerUriTest(secureCheck) {
|
|
await SpecialPowers.pushPrefEnv({ set: [[INSECURE_ICON_PREF, secureCheck]] });
|
|
|
|
let newTab = await loadNewTab("about:reader?url=http://example.com");
|
|
gBrowser.selectedTab = newTab;
|
|
let readerURL = getReaderModeURL();
|
|
is(
|
|
readerURL,
|
|
"Site Information for example.com",
|
|
"should be the correct URI in reader mode"
|
|
);
|
|
|
|
gBrowser.removeTab(newTab);
|
|
|
|
await SpecialPowers.popPrefEnv();
|
|
}
|
|
|
|
add_task(async function test_reader_uri() {
|
|
await readerUriTest(true);
|
|
await readerUriTest(false);
|
|
});
|
|
|
|
async function dataUriTest(secureCheck) {
|
|
let oldTab = await loadNewTab("about:robots");
|
|
await SpecialPowers.pushPrefEnv({ set: [[INSECURE_ICON_PREF, secureCheck]] });
|
|
let dataURI = "data:text/html,hi";
|
|
|
|
let newTab = await loadNewTab(dataURI);
|
|
if (secureCheck) {
|
|
is(getIdentityMode(), "notSecure", "Identity should be not secure");
|
|
} else {
|
|
is(getIdentityMode(), "unknownIdentity", "Identity should be unknown");
|
|
}
|
|
|
|
gBrowser.selectedTab = oldTab;
|
|
is(getIdentityMode(), "localResource", "Identity should be localResource");
|
|
|
|
gBrowser.selectedTab = newTab;
|
|
if (secureCheck) {
|
|
is(getIdentityMode(), "notSecure", "Identity should be not secure");
|
|
} else {
|
|
is(getIdentityMode(), "unknownIdentity", "Identity should be unknown");
|
|
}
|
|
|
|
gBrowser.removeTab(newTab);
|
|
gBrowser.removeTab(oldTab);
|
|
|
|
await SpecialPowers.popPrefEnv();
|
|
}
|
|
|
|
add_task(async function test_data_uri() {
|
|
await dataUriTest(true);
|
|
await dataUriTest(false);
|
|
});
|
|
|
|
async function pbModeTest(prefs, secureCheck) {
|
|
await SpecialPowers.pushPrefEnv({ set: prefs });
|
|
|
|
let privateWin = await BrowserTestUtils.openNewBrowserWindow({
|
|
private: true,
|
|
});
|
|
let oldTab = await BrowserTestUtils.openNewForegroundTab(
|
|
privateWin.gBrowser,
|
|
"about:robots"
|
|
);
|
|
let newTab = await BrowserTestUtils.openNewForegroundTab(
|
|
privateWin.gBrowser,
|
|
"http://example.com/" + DUMMY
|
|
);
|
|
|
|
if (secureCheck) {
|
|
is(
|
|
getIdentityMode(privateWin),
|
|
"notSecure",
|
|
"Identity should be not secure"
|
|
);
|
|
} else {
|
|
is(
|
|
getIdentityMode(privateWin),
|
|
"unknownIdentity",
|
|
"Identity should be unknown"
|
|
);
|
|
}
|
|
|
|
privateWin.gBrowser.selectedTab = oldTab;
|
|
is(
|
|
getIdentityMode(privateWin),
|
|
"localResource",
|
|
"Identity should be localResource"
|
|
);
|
|
|
|
privateWin.gBrowser.selectedTab = newTab;
|
|
if (secureCheck) {
|
|
is(
|
|
getIdentityMode(privateWin),
|
|
"notSecure",
|
|
"Identity should be not secure"
|
|
);
|
|
} else {
|
|
is(
|
|
getIdentityMode(privateWin),
|
|
"unknownIdentity",
|
|
"Identity should be unknown"
|
|
);
|
|
}
|
|
|
|
await BrowserTestUtils.closeWindow(privateWin);
|
|
|
|
await SpecialPowers.popPrefEnv();
|
|
}
|
|
|
|
add_task(async function test_pb_mode() {
|
|
let prefs = [
|
|
[INSECURE_ICON_PREF, true],
|
|
[INSECURE_PBMODE_ICON_PREF, true],
|
|
];
|
|
await pbModeTest(prefs, true);
|
|
prefs = [
|
|
[INSECURE_ICON_PREF, false],
|
|
[INSECURE_PBMODE_ICON_PREF, true],
|
|
];
|
|
await pbModeTest(prefs, true);
|
|
prefs = [
|
|
[INSECURE_ICON_PREF, false],
|
|
[INSECURE_PBMODE_ICON_PREF, false],
|
|
];
|
|
await pbModeTest(prefs, false);
|
|
});
|
|
|
|
/**
|
|
* Tests that sites opened via the PDF viewer have the correct identity state.
|
|
*/
|
|
add_task(async function test_pdf() {
|
|
const PDF_URI_NOSCHEME =
|
|
getRootDirectory(gTestPath).replace(
|
|
"chrome://mochitests/content",
|
|
"example.com"
|
|
) + "file_pdf.pdf";
|
|
|
|
const PDF_URI_SECURE = "https://" + PDF_URI_NOSCHEME;
|
|
const PDF_URI_INSECURE = "http://" + PDF_URI_NOSCHEME;
|
|
|
|
await BrowserTestUtils.withNewTab(PDF_URI_INSECURE, async () => {
|
|
is(
|
|
getIdentityMode(),
|
|
"notSecure",
|
|
"Identity should be notSecure for a PDF served via HTTP."
|
|
);
|
|
});
|
|
await BrowserTestUtils.withNewTab(PDF_URI_SECURE, async () => {
|
|
is(
|
|
getIdentityMode(),
|
|
"verifiedDomain",
|
|
"Identity should be verifiedDomain for a PDF served via HTTPS."
|
|
);
|
|
});
|
|
});
|