37 lines
1.2 KiB
JavaScript
37 lines
1.2 KiB
JavaScript
/*
|
|
* Any copyright is dedicated to the Public Domain.
|
|
* http://creativecommons.org/publicdomain/zero/1.0/
|
|
*
|
|
* Test for Bug 1182551 -
|
|
*
|
|
* This test has a top level HTTP page with an HTTPS iframe. The HTTPS iframe
|
|
* includes an HTTP image. We check that the top level security state is
|
|
* STATE_IS_INSECURE. The mixed content from the iframe shouldn't "upgrade"
|
|
* the HTTP top level page to broken HTTPS.
|
|
*/
|
|
|
|
const TEST_URL =
|
|
getRootDirectory(gTestPath).replace(
|
|
"chrome://mochitests/content",
|
|
// eslint-disable-next-line @microsoft/sdl/no-insecure-url
|
|
"http://example.com"
|
|
) + "file_mixedContentFramesOnHttp.html";
|
|
|
|
add_task(async function () {
|
|
await SpecialPowers.pushPrefEnv({
|
|
set: [
|
|
["security.mixed_content.block_active_content", true],
|
|
["security.mixed_content.block_display_content", false],
|
|
["security.mixed_content.upgrade_display_content", false],
|
|
],
|
|
});
|
|
|
|
await BrowserTestUtils.withNewTab(TEST_URL, async function (browser) {
|
|
isSecurityState(browser, "insecure");
|
|
await assertMixedContentBlockingState(browser, {
|
|
activeLoaded: false,
|
|
activeBlocked: false,
|
|
passiveLoaded: true,
|
|
});
|
|
});
|
|
});
|