summaryrefslogtreecommitdiffstats
path: root/toolkit/content/tests/unit
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-19 01:47:29 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-19 01:47:29 +0000
commit0ebf5bdf043a27fd3dfb7f92e0cb63d88954c44d (patch)
treea31f07c9bcca9d56ce61e9a1ffd30ef350d513aa /toolkit/content/tests/unit
parentInitial commit. (diff)
downloadfirefox-esr-0ebf5bdf043a27fd3dfb7f92e0cb63d88954c44d.tar.xz
firefox-esr-0ebf5bdf043a27fd3dfb7f92e0cb63d88954c44d.zip
Adding upstream version 115.8.0esr.upstream/115.8.0esr
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'toolkit/content/tests/unit')
-rw-r--r--toolkit/content/tests/unit/test_contentAreaUtils.js80
-rw-r--r--toolkit/content/tests/unit/xpcshell.ini4
2 files changed, 84 insertions, 0 deletions
diff --git a/toolkit/content/tests/unit/test_contentAreaUtils.js b/toolkit/content/tests/unit/test_contentAreaUtils.js
new file mode 100644
index 0000000000..6ea83db251
--- /dev/null
+++ b/toolkit/content/tests/unit/test_contentAreaUtils.js
@@ -0,0 +1,80 @@
+/* -*- indent-tabs-mode: nil; js-indent-level: 2 -*- */
+/* This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
+
+function loadUtilsScript() {
+ /* import-globals-from ../../contentAreaUtils.js */
+ Services.scriptloader.loadSubScript(
+ "chrome://global/content/contentAreaUtils.js"
+ );
+}
+
+function test_urlSecurityCheck() {
+ var nullPrincipal = Services.scriptSecurityManager.createNullPrincipal({});
+
+ const HTTP_URI = "http://www.mozilla.org/";
+ const CHROME_URI = "chrome://browser/content/browser.xhtml";
+ const DISALLOW_INHERIT_PRINCIPAL =
+ Ci.nsIScriptSecurityManager.DISALLOW_INHERIT_PRINCIPAL;
+
+ try {
+ urlSecurityCheck(
+ makeURI(HTTP_URI),
+ nullPrincipal,
+ DISALLOW_INHERIT_PRINCIPAL
+ );
+ } catch (ex) {
+ do_throw(
+ "urlSecurityCheck should not throw when linking to a http uri with a null principal"
+ );
+ }
+
+ // urlSecurityCheck also supports passing the url as a string
+ try {
+ urlSecurityCheck(HTTP_URI, nullPrincipal, DISALLOW_INHERIT_PRINCIPAL);
+ } catch (ex) {
+ do_throw(
+ "urlSecurityCheck failed to handle the http URI as a string (uri spec)"
+ );
+ }
+
+ let shouldThrow = true;
+ try {
+ urlSecurityCheck(CHROME_URI, nullPrincipal, DISALLOW_INHERIT_PRINCIPAL);
+ } catch (ex) {
+ shouldThrow = false;
+ }
+ if (shouldThrow) {
+ do_throw(
+ "urlSecurityCheck should throw when linking to a chrome uri with a null principal"
+ );
+ }
+}
+
+function test_stringBundle() {
+ // This test verifies that the elements that can be used as file picker title
+ // keys in the save* functions are actually present in the string bundle.
+ // These keys are part of the contentAreaUtils.js public API.
+ var validFilePickerTitleKeys = [
+ "SaveImageTitle",
+ "SaveVideoTitle",
+ "SaveAudioTitle",
+ "SaveLinkTitle",
+ ];
+
+ for (let filePickerTitleKey of validFilePickerTitleKeys) {
+ // Just check that the string exists
+ try {
+ ContentAreaUtils.stringBundle.GetStringFromName(filePickerTitleKey);
+ } catch (e) {
+ do_throw("Error accessing file picker title key: " + filePickerTitleKey);
+ }
+ }
+}
+
+function run_test() {
+ loadUtilsScript();
+ test_urlSecurityCheck();
+ test_stringBundle();
+}
diff --git a/toolkit/content/tests/unit/xpcshell.ini b/toolkit/content/tests/unit/xpcshell.ini
new file mode 100644
index 0000000000..52d5df56f9
--- /dev/null
+++ b/toolkit/content/tests/unit/xpcshell.ini
@@ -0,0 +1,4 @@
+[DEFAULT]
+head =
+
+[test_contentAreaUtils.js]