1
0
Fork 0
firefox/browser/base/content/test/siteIdentity/browser_mixedContentFramesOnHttp.js
Daniel Baumann 5e9a113729
Adding upstream version 140.0.
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
2025-06-25 09:37:52 +02:00

37 lines
1.2 KiB
JavaScript

/*
* Any copyright is dedicated to the Public Domain.
* http://creativecommons.org/publicdomain/zero/1.0/
*
* Test for Bug 1182551 -
*
* This test has a top level HTTP page with an HTTPS iframe. The HTTPS iframe
* includes an HTTP image. We check that the top level security state is
* STATE_IS_INSECURE. The mixed content from the iframe shouldn't "upgrade"
* the HTTP top level page to broken HTTPS.
*/
const TEST_URL =
getRootDirectory(gTestPath).replace(
"chrome://mochitests/content",
// eslint-disable-next-line @microsoft/sdl/no-insecure-url
"http://example.com"
) + "file_mixedContentFramesOnHttp.html";
add_task(async function () {
await SpecialPowers.pushPrefEnv({
set: [
["security.mixed_content.block_active_content", true],
["security.mixed_content.block_display_content", false],
["security.mixed_content.upgrade_display_content", false],
],
});
await BrowserTestUtils.withNewTab(TEST_URL, async function (browser) {
isSecurityState(browser, "insecure");
await assertMixedContentBlockingState(browser, {
activeLoaded: false,
activeBlocked: false,
passiveLoaded: true,
});
});
});