forked from mirrors/gecko-dev
# ignore-this-changeset Differential Revision: https://phabricator.services.mozilla.com/D36041 --HG-- extra : source : 96b3895a3b2aa2fcb064c85ec5857b7216884556
36 lines
1.1 KiB
JavaScript
36 lines
1.1 KiB
JavaScript
/*
|
|
* Any copyright is dedicated to the Public Domain.
|
|
* http://creativecommons.org/publicdomain/zero/1.0/
|
|
*
|
|
* Test for Bug 1182551 -
|
|
*
|
|
* This test has a top level HTTP page with an HTTPS iframe. The HTTPS iframe
|
|
* includes an HTTP image. We check that the top level security state is
|
|
* STATE_IS_INSECURE. The mixed content from the iframe shouldn't "upgrade"
|
|
* the HTTP top level page to broken HTTPS.
|
|
*/
|
|
|
|
const TEST_URL =
|
|
getRootDirectory(gTestPath).replace(
|
|
"chrome://mochitests/content",
|
|
"http://example.com"
|
|
) + "file_mixedContentFramesOnHttp.html";
|
|
|
|
add_task(async function() {
|
|
await SpecialPowers.pushPrefEnv({
|
|
set: [
|
|
["security.mixed_content.block_active_content", true],
|
|
["security.mixed_content.block_display_content", false],
|
|
["security.mixed_content.upgrade_display_content", false],
|
|
],
|
|
});
|
|
|
|
await BrowserTestUtils.withNewTab(TEST_URL, async function(browser) {
|
|
isSecurityState(browser, "insecure");
|
|
await assertMixedContentBlockingState(browser, {
|
|
activeLoaded: false,
|
|
activeBlocked: false,
|
|
passiveLoaded: true,
|
|
});
|
|
});
|
|
});
|