summaryrefslogtreecommitdiffstats
path: root/security/manager/ssl/tests/unit/xpcshell.toml
diff options
context:
space:
mode:
Diffstat (limited to 'security/manager/ssl/tests/unit/xpcshell.toml')
-rw-r--r--security/manager/ssl/tests/unit/xpcshell.toml361
1 files changed, 361 insertions, 0 deletions
diff --git a/security/manager/ssl/tests/unit/xpcshell.toml b/security/manager/ssl/tests/unit/xpcshell.toml
new file mode 100644
index 0000000000..6cfab1a043
--- /dev/null
+++ b/security/manager/ssl/tests/unit/xpcshell.toml
@@ -0,0 +1,361 @@
+[DEFAULT]
+head = "head_psm.js"
+tags = "psm condprof"
+firefox-appdir = "browser"
+skip-if = ["os == 'win' && msix"] # https://bugzilla.mozilla.org/show_bug.cgi?id=1809477
+support-files = [
+ "corrupted_crlite_helper.js",
+ "bad_certs/**",
+ "ocsp_certs/**",
+ "test_baseline_requirements/**",
+ "test_broken_fips/**",
+ "test_cert_eku/**",
+ "test_cert_embedded_null/**",
+ "test_cert_keyUsage/**",
+ "test_cert_overrides_read_only/**",
+ "test_cert_sha1/**",
+ "test_cert_signatures/**",
+ "test_cert_storage_direct/**",
+ "test_cert_storage_preexisting/**",
+ "test_cert_storage_preexisting_crlite/**",
+ "test_cert_trust/**",
+ "test_cert_utf8/**",
+ "test_cert_version/**",
+ "test_certDB_import/**",
+ "test_content_signing/**",
+ "test_crlite_filters/**",
+ "test_crlite_preexisting/**",
+ "test_crlite_corrupted/**",
+ "test_ct/**",
+ "test_delegated_credentials/**",
+ "test_encrypted_client_hello/**",
+ "test_ev_certs/**",
+ "test_faulty_server/**",
+ "test_intermediate_basic_usage_constraints/**",
+ "test_intermediate_preloads/**",
+ "test_keysize/**",
+ "test_keysize_ev/**",
+ "test_missing_intermediate/**",
+ "test_name_constraints/**",
+ "test_ocsp_url/**",
+ "test_onecrl/**",
+ "test_sanctions/**",
+ "test_sdr_preexisting/**",
+ "test_sdr_preexisting_with_password/**",
+ "test_self_signed_certs/**",
+ "test_signed_apps/**",
+ "test_validity/**",
+ "tlsserver/**",
+]
+
+["test_add_preexisting_cert.js"]
+
+["test_allow_all_cert_errors.js"]
+run-sequentially = "hardcoded ports"
+
+["test_baseline_requirements_subject_common_name.js"]
+
+["test_blocklist_onecrl.js"]
+# Skip signature tests for Thunderbird (Bug 1341983).
+skip-if = ["appname == 'thunderbird'"]
+tags = "remote-settings blocklist psm"
+
+["test_broken_fips.js"]
+# FIPS has never been a thing on Android, so the workaround doesn't
+# exist on that platform.
+# FIPS still works on Linux, so this test doesn't make any sense there.
+# FIPS still works on Windows, but running the test to ensure that it does not
+# break with a non-ASCII profile path.
+skip-if = [
+ "os == 'android'",
+ "os == 'linux'"
+]
+
+["test_certDB_export_pkcs12.js"]
+
+["test_certDB_export_pkcs12_with_primary_password.js"]
+
+["test_certDB_import.js"]
+# nsCertificateDialogs not available in geckoview, bug 1554276
+skip-if = ["os == 'android' && processor == 'x86_64'"]
+
+["test_certDB_import_pkcs12.js"]
+
+["test_certDB_import_with_primary_password.js"]
+# nsCertificateDialogs not available in geckoview, bug 1554276
+skip-if = ["os == 'android' && processor == 'x86_64'"]
+
+["test_cert_chains.js"]
+run-sequentially = "hardcoded ports"
+
+["test_cert_dbKey.js"]
+
+["test_cert_eku.js"]
+
+["test_cert_embedded_null.js"]
+
+["test_cert_expiration_canary.js"]
+run-if = ["nightly_build"]
+
+["test_cert_keyUsage.js"]
+
+["test_cert_override_read.js"]
+
+["test_cert_overrides.js"]
+run-sequentially = "hardcoded ports"
+
+["test_cert_overrides_read_only.js"]
+run-sequentially = "hardcoded ports"
+
+["test_cert_sha1.js"]
+
+["test_cert_signatures.js"]
+
+["test_cert_storage.js"]
+tags = "addons psm blocklist"
+
+["test_cert_storage_broken_db.js"]
+
+["test_cert_storage_direct.js"]
+
+["test_cert_storage_preexisting.js"]
+
+["test_cert_storage_preexisting_crlite.js"]
+# This test cannot succeed on 32-bit platforms. See bugs 1546361 and 1548956.
+skip-if = ["bits != 64"]
+
+["test_cert_trust.js"]
+
+["test_cert_utf8.js"]
+
+["test_cert_version.js"]
+
+["test_client_auth_remember_service_read.js"]
+skip-if = ["condprof"]
+
+["test_constructX509FromBase64.js"]
+
+["test_content_signing.js"]
+
+["test_crlite_coverage_missing.js"]
+
+["test_crlite_coverage_trunc1.js"]
+
+["test_crlite_coverage_trunc2.js"]
+
+["test_crlite_coverage_trunc3.js"]
+
+["test_crlite_coverage_version.js"]
+
+["test_crlite_enrollment_trunc1.js"]
+
+["test_crlite_enrollment_version.js"]
+
+["test_crlite_filter_corrupted.js"]
+
+["test_crlite_filters.js"]
+tags = "remote-settings psm"
+
+["test_crlite_preexisting.js"]
+
+["test_crlite_stash_corrupted.js"]
+
+["test_ct.js"]
+# Requires hard-coded debug-only data
+skip-if = ["!debug"]
+run-sequentially = "hardcoded ports"
+
+["test_data_storage.js"]
+
+["test_db_format_pref_new.js"]
+# Android always has and always will use the new format, so
+# this test doesn't apply.
+skip-if = [
+ "os == 'android'",
+ "condprof",
+] # Bug 1769154 - as designed
+
+["test_delegated_credentials.js"]
+run-sequentially = "hardcoded ports"
+
+["test_der.js"]
+
+["test_encrypted_client_hello.js"]
+run-sequentially = "hardcoded ports"
+
+["test_encrypted_client_hello_client_only.js"]
+run-sequentially = "hardcoded ports"
+
+["test_enterprise_roots.js"]
+# This feature is implemented for Windows and OS X. However, we don't currently
+# have a way to test it on OS X.
+skip-if = ["os != 'win'"]
+
+["test_ev_certs.js"]
+tags = "blocklist psm"
+run-sequentially = "hardcoded ports"
+
+["test_faulty_server.js"]
+run-sequentially = "hardcoded ports"
+
+["test_forget_about_site_security_headers.js"]
+
+["test_hash_algorithms.js"]
+
+["test_hash_algorithms_wrap.js"]
+# bug 1124289 - run_test_in_child violates the sandbox on android
+skip-if = ["os == 'android'"]
+
+["test_intermediate_basic_usage_constraints.js"]
+
+["test_intermediate_preloads.js"]
+run-sequentially = "hardcoded ports"
+tags = "blocklist psm remote-settings"
+
+["test_keysize.js"]
+
+["test_keysize_ev.js"]
+run-sequentially = "hardcoded ports"
+
+["test_logoutAndTeardown.js"]
+skip-if = ["socketprocess_networking && os == 'linux' && debug"]
+run-sequentially = "hardcoded ports"
+
+["test_missing_intermediate.js"]
+run-sequentially = "hardcoded ports"
+
+["test_name_constraints.js"]
+
+["test_nonascii_path.js"]
+
+["test_nsCertType.js"]
+run-sequentially = "hardcoded ports"
+
+["test_nsIX509CertValidity.js"]
+
+["test_nsIX509Cert_utf8.js"]
+
+["test_ocsp_caching.js"]
+run-sequentially = "hardcoded ports"
+
+["test_ocsp_enabled_pref.js"]
+run-sequentially = "hardcoded ports"
+
+["test_ocsp_must_staple.js"]
+run-sequentially = "hardcoded ports"
+
+["test_ocsp_no_hsts_upgrade.js"]
+run-sequentially = "hardcoded ports"
+
+["test_ocsp_private_caching.js"]
+run-sequentially = "hardcoded ports"
+skip-if = ["condprof"] # Bug 1769154 - should look into this
+
+["test_ocsp_required.js"]
+run-sequentially = "hardcoded ports"
+
+["test_ocsp_stapling.js"]
+run-sequentially = "hardcoded ports"
+
+["test_ocsp_stapling_expired.js"]
+run-sequentially = "hardcoded ports"
+
+["test_ocsp_stapling_with_intermediate.js"]
+run-sequentially = "hardcoded ports"
+
+["test_ocsp_timeout.js"]
+skip-if = ["(os == 'win' && socketprocess_networking)"]
+run-sequentially = "hardcoded ports"
+
+["test_ocsp_url.js"]
+run-sequentially = "hardcoded ports"
+
+["test_oskeystore.js"]
+skip-if = ["apple_silicon"] # bug 1729538
+
+["test_osreauthenticator.js"]
+# Reauthentication has been implemented on Windows and MacOS, so running this
+# test results in the OS popping up a dialog, which means we can't run it in
+# automation.
+skip-if = [
+ "os == 'win'",
+ "os == 'mac'"
+]
+
+["test_password_prompt.js"]
+
+["test_pinning.js"]
+run-sequentially = "hardcoded ports"
+
+["test_sanctions_symantec_apple_google.js"]
+run-sequentially = "hardcoded ports"
+
+["test_sdr.js"]
+
+["test_sdr_preexisting.js"]
+# Not relevant to Android. See the comment in the test.
+skip-if = ["os == 'android'"]
+
+["test_sdr_preexisting_with_password.js"]
+# Not relevant to Android. See the comment in the test.
+skip-if = ["os == 'android'"]
+
+["test_self_signed_certs.js"]
+
+["test_session_resumption.js"]
+skip-if = ["os == 'win'"] # Bug 1585916
+run-sequentially = "hardcoded ports"
+
+["test_signed_apps.js"]
+
+["test_ssl_status.js"]
+run-sequentially = "hardcoded ports"
+
+["test_sss_eviction.js"]
+skip-if = ["condprof"] # Bug 1769154 - as designed
+
+["test_sss_migration.js"]
+skip-if = ["condprof"] # Bug 1769154 - as designed
+
+["test_sss_originAttributes.js"]
+
+["test_sss_readstate.js"]
+skip-if = ["condprof"] # Bug 1769154 - as designed
+
+["test_sss_readstate_empty.js"]
+skip-if = ["condprof"] # Bug 1769154 - as designed
+
+["test_sss_readstate_garbage.js"]
+skip-if = ["condprof"] # Bug 1769154 - as designed
+
+["test_sss_readstate_huge.js"]
+skip-if = ["condprof"] # Bug 1769154 - as designed
+
+["test_sss_resetState.js"]
+
+["test_sss_sanitizeOnShutdown.js"]
+firefox-appdir = "browser"
+# Sanitization works differently on Android - this doesn't apply.
+# browser/modules/Sanitizer.jsm used by the test isn't available in Thunderbird.
+skip-if = [
+ "os == 'android'",
+ "appname == 'thunderbird'"
+]
+
+["test_sss_savestate.js"]
+skip-if = ["condprof"] # Bug 1769154 - as designed
+
+["test_sts_fqdn.js"]
+
+["test_sts_ipv4_ipv6.js"]
+
+["test_sts_parser.js"]
+
+["test_sts_preloadlist_perwindowpb.js"]
+
+["test_sts_preloadlist_selfdestruct.js"]
+
+["test_validity.js"]
+run-sequentially = "hardcoded ports"
+
+["test_x509.js"]