From 26a029d407be480d791972afb5975cf62c9360a6 Mon Sep 17 00:00:00 2001 From: Daniel Baumann Date: Fri, 19 Apr 2024 02:47:55 +0200 Subject: Adding upstream version 124.0.1. Signed-off-by: Daniel Baumann --- .../test/siteIdentity/browser_bug1045809.js | 105 +++++++++++++++++++++ 1 file changed, 105 insertions(+) create mode 100644 browser/base/content/test/siteIdentity/browser_bug1045809.js (limited to 'browser/base/content/test/siteIdentity/browser_bug1045809.js') diff --git a/browser/base/content/test/siteIdentity/browser_bug1045809.js b/browser/base/content/test/siteIdentity/browser_bug1045809.js new file mode 100644 index 0000000000..b39d669d0b --- /dev/null +++ b/browser/base/content/test/siteIdentity/browser_bug1045809.js @@ -0,0 +1,105 @@ +// Test that the Mixed Content Doorhanger Action to re-enable protection works + +const PREF_ACTIVE = "security.mixed_content.block_active_content"; +const PREF_INSECURE = "security.insecure_connection_icon.enabled"; +const TEST_URL = + getRootDirectory(gTestPath).replace( + "chrome://mochitests/content", + "https://example.com" + ) + "file_bug1045809_1.html"; + +var origBlockActive; + +add_task(async function () { + registerCleanupFunction(function () { + Services.prefs.setBoolPref(PREF_ACTIVE, origBlockActive); + gBrowser.removeCurrentTab(); + }); + + // Store original preferences so we can restore settings after testing + origBlockActive = Services.prefs.getBoolPref(PREF_ACTIVE); + + // Make sure mixed content blocking is on + Services.prefs.setBoolPref(PREF_ACTIVE, true); + + let tab = (gBrowser.selectedTab = BrowserTestUtils.addTab(gBrowser)); + + // Check with insecure lock disabled + await SpecialPowers.pushPrefEnv({ set: [[PREF_INSECURE, false]] }); + await runTests(tab); + + // Check with insecure lock disabled + await SpecialPowers.pushPrefEnv({ set: [[PREF_INSECURE, true]] }); + await runTests(tab); +}); + +async function runTests(tab) { + // Test 1: mixed content must be blocked + await promiseTabLoadEvent(tab, TEST_URL); + await test1(gBrowser.getBrowserForTab(tab)); + + await promiseTabLoadEvent(tab); + // Test 2: mixed content must NOT be blocked + await test2(gBrowser.getBrowserForTab(tab)); + + // Test 3: mixed content must be blocked again + await promiseTabLoadEvent(tab); + await test3(gBrowser.getBrowserForTab(tab)); +} + +async function test1(gTestBrowser) { + await assertMixedContentBlockingState(gTestBrowser, { + activeLoaded: false, + activeBlocked: true, + passiveLoaded: false, + }); + + await SpecialPowers.spawn(gTestBrowser, [], function () { + let iframe = content.document.getElementsByTagName("iframe")[0]; + + SpecialPowers.spawn(iframe, [], () => { + let container = content.document.getElementById("mixedContentContainer"); + is(container, null, "Mixed Content is NOT to be found in Test1"); + }); + }); + + // Disable Mixed Content Protection for the page (and reload) + gIdentityHandler.disableMixedContentProtection(); +} + +async function test2(gTestBrowser) { + await assertMixedContentBlockingState(gTestBrowser, { + activeLoaded: true, + activeBlocked: false, + passiveLoaded: false, + }); + + await SpecialPowers.spawn(gTestBrowser, [], function () { + let iframe = content.document.getElementsByTagName("iframe")[0]; + + SpecialPowers.spawn(iframe, [], () => { + let container = content.document.getElementById("mixedContentContainer"); + isnot(container, null, "Mixed Content is to be found in Test2"); + }); + }); + + // Re-enable Mixed Content Protection for the page (and reload) + gIdentityHandler.enableMixedContentProtection(); +} + +async function test3(gTestBrowser) { + await assertMixedContentBlockingState(gTestBrowser, { + activeLoaded: false, + activeBlocked: true, + passiveLoaded: false, + }); + + await SpecialPowers.spawn(gTestBrowser, [], function () { + let iframe = content.document.getElementsByTagName("iframe")[0]; + + SpecialPowers.spawn(iframe, [], () => { + let container = content.document.getElementById("mixedContentContainer"); + is(container, null, "Mixed Content is NOT to be found in Test3"); + }); + }); +} -- cgit v1.2.3