forked from mirrors/gecko-dev
MozReview-Commit-ID: ETIgVF3zhRu --HG-- extra : rebase_source : e4c59f50584158f4b31527347b10424b56692fa1
28 lines
1.1 KiB
JavaScript
28 lines
1.1 KiB
JavaScript
/*
|
|
* Any copyright is dedicated to the Public Domain.
|
|
* http://creativecommons.org/publicdomain/zero/1.0/
|
|
*
|
|
* Test for Bug 1182551 -
|
|
*
|
|
* This test has a top level HTTP page with an HTTPS iframe. The HTTPS iframe
|
|
* includes an HTTP image. We check that the top level security state is
|
|
* STATE_IS_INSECURE. The mixed content from the iframe shouldn't "upgrade"
|
|
* the HTTP top level page to broken HTTPS.
|
|
*/
|
|
|
|
const TEST_URL = getRootDirectory(gTestPath).replace("chrome://mochitests/content", "http://example.com") + "file_mixedContentFramesOnHttp.html";
|
|
|
|
add_task(async function() {
|
|
await SpecialPowers.pushPrefEnv({
|
|
"set": [
|
|
["security.mixed_content.block_active_content", true],
|
|
["security.mixed_content.block_display_content", false],
|
|
["security.mixed_content.upgrade_display_content", false]
|
|
]});
|
|
|
|
await BrowserTestUtils.withNewTab(TEST_URL, async function(browser) {
|
|
isSecurityState(browser, "insecure");
|
|
await assertMixedContentBlockingState(browser, {activeLoaded: false, activeBlocked: false, passiveLoaded: true});
|
|
});
|
|
});
|
|
|