summaryrefslogtreecommitdiffstats
path: root/devtools/client/webconsole/test/browser/browser_webconsole_view_source.js
blob: 6a5a92d5354b07c4e07e247db58ae1d2ef2f9ba0 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
/* Any copyright is dedicated to the Public Domain.
 * http://creativecommons.org/publicdomain/zero/1.0/ */

// Tests that source URLs in the Web Console can be clicked to display the
// standard View Source window. As JS exceptions and console.log() messages always
// have their locations opened in Debugger, we need to test a security message in
// order to have it opened in the standard View Source window.

"use strict";

const TEST_URI =
  "https://example.com/browser/devtools/client/webconsole/" +
  "test/browser/" +
  "test-mixedcontent-securityerrors.html";

add_task(async function () {
  const hud = await openNewTabAndConsole(TEST_URI);
  info("console opened");

  const msg = await waitFor(() =>
    findErrorMessage(hud, "Blocked loading mixed active content")
  );
  ok(msg, "error message");
  const locationNode = msg.querySelector(
    ".message-location .frame-link-filename"
  );
  ok(locationNode, "location node");

  const onTabOpen = BrowserTestUtils.waitForNewTab(gBrowser, null, true);

  locationNode.click();
  await onTabOpen;
  ok(
    true,
    "the view source tab was opened in response to clicking the location node"
  );
});