forked from mirrors/gecko-dev
		
	MozReview-Commit-ID: ETIgVF3zhRu --HG-- extra : rebase_source : e4c59f50584158f4b31527347b10424b56692fa1
		
			
				
	
	
		
			28 lines
		
	
	
	
		
			1.1 KiB
		
	
	
	
		
			JavaScript
		
	
	
	
	
	
			
		
		
	
	
			28 lines
		
	
	
	
		
			1.1 KiB
		
	
	
	
		
			JavaScript
		
	
	
	
	
	
/*
 | 
						|
 * Any copyright is dedicated to the Public Domain.
 | 
						|
 * http://creativecommons.org/publicdomain/zero/1.0/
 | 
						|
 *
 | 
						|
 * Test for Bug 1182551 -
 | 
						|
 *
 | 
						|
 * This test has a top level HTTP page with an HTTPS iframe.  The HTTPS iframe
 | 
						|
 * includes an HTTP image.  We check that the top level security state is
 | 
						|
 * STATE_IS_INSECURE.  The mixed content from the iframe shouldn't "upgrade"
 | 
						|
 * the HTTP top level page to broken HTTPS.
 | 
						|
 */
 | 
						|
 | 
						|
const TEST_URL = getRootDirectory(gTestPath).replace("chrome://mochitests/content", "http://example.com") + "file_mixedContentFramesOnHttp.html";
 | 
						|
 | 
						|
add_task(async function() {
 | 
						|
  await SpecialPowers.pushPrefEnv({
 | 
						|
    "set": [
 | 
						|
      ["security.mixed_content.block_active_content", true],
 | 
						|
      ["security.mixed_content.block_display_content", false],
 | 
						|
      ["security.mixed_content.upgrade_display_content", false]
 | 
						|
    ]});
 | 
						|
 | 
						|
  await BrowserTestUtils.withNewTab(TEST_URL, async function(browser) {
 | 
						|
    isSecurityState(browser, "insecure");
 | 
						|
    await assertMixedContentBlockingState(browser, {activeLoaded: false, activeBlocked: false, passiveLoaded: true});
 | 
						|
  });
 | 
						|
});
 | 
						|
 |