summaryrefslogtreecommitdiffstats
path: root/toolkit/content/tests/unit/test_contentAreaUtils.js
blob: 6ea83db25159a77c2082bbde9166e42b855f5644 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
/* -*- indent-tabs-mode: nil; js-indent-level: 2 -*- */
/* This Source Code Form is subject to the terms of the Mozilla Public
 * License, v. 2.0. If a copy of the MPL was not distributed with this
 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */

function loadUtilsScript() {
  /* import-globals-from ../../contentAreaUtils.js */
  Services.scriptloader.loadSubScript(
    "chrome://global/content/contentAreaUtils.js"
  );
}

function test_urlSecurityCheck() {
  var nullPrincipal = Services.scriptSecurityManager.createNullPrincipal({});

  const HTTP_URI = "http://www.mozilla.org/";
  const CHROME_URI = "chrome://browser/content/browser.xhtml";
  const DISALLOW_INHERIT_PRINCIPAL =
    Ci.nsIScriptSecurityManager.DISALLOW_INHERIT_PRINCIPAL;

  try {
    urlSecurityCheck(
      makeURI(HTTP_URI),
      nullPrincipal,
      DISALLOW_INHERIT_PRINCIPAL
    );
  } catch (ex) {
    do_throw(
      "urlSecurityCheck should not throw when linking to a http uri with a null principal"
    );
  }

  // urlSecurityCheck also supports passing the url as a string
  try {
    urlSecurityCheck(HTTP_URI, nullPrincipal, DISALLOW_INHERIT_PRINCIPAL);
  } catch (ex) {
    do_throw(
      "urlSecurityCheck failed to handle the http URI as a string (uri spec)"
    );
  }

  let shouldThrow = true;
  try {
    urlSecurityCheck(CHROME_URI, nullPrincipal, DISALLOW_INHERIT_PRINCIPAL);
  } catch (ex) {
    shouldThrow = false;
  }
  if (shouldThrow) {
    do_throw(
      "urlSecurityCheck should throw when linking to a chrome uri with a null principal"
    );
  }
}

function test_stringBundle() {
  // This test verifies that the elements that can be used as file picker title
  //  keys in the save* functions are actually present in the string bundle.
  //  These keys are part of the contentAreaUtils.js public API.
  var validFilePickerTitleKeys = [
    "SaveImageTitle",
    "SaveVideoTitle",
    "SaveAudioTitle",
    "SaveLinkTitle",
  ];

  for (let filePickerTitleKey of validFilePickerTitleKeys) {
    // Just check that the string exists
    try {
      ContentAreaUtils.stringBundle.GetStringFromName(filePickerTitleKey);
    } catch (e) {
      do_throw("Error accessing file picker title key: " + filePickerTitleKey);
    }
  }
}

function run_test() {
  loadUtilsScript();
  test_urlSecurityCheck();
  test_stringBundle();
}