blob: 76f073e998051eac576ee2733e61edfe422ac1f2 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
|
/* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
"use strict";
// The purpose of this test is to create an empty site security service state
// file and see that the site security service doesn't fail when reading it.
function run_test() {
let profileDir = do_get_profile();
let stateFile = profileDir.clone();
stateFile.append(SSS_STATE_FILE_NAME);
// Assuming we're working with a clean slate, the file shouldn't exist
// until we create it.
ok(!stateFile.exists());
stateFile.create(Ci.nsIFile.NORMAL_FILE_TYPE, 0x1a4); // 0x1a4 == 0o644
ok(stateFile.exists());
// Initialize nsISiteSecurityService after do_get_profile() so it
// can read the state file.
let siteSecurityService = Cc["@mozilla.org/ssservice;1"].getService(
Ci.nsISiteSecurityService
);
notEqual(siteSecurityService, null);
// nsISiteSecurityService.isSecureURI blocks until the backing file has been read.
// nonexistent.example.com should never be an HSTS host
ok(
!siteSecurityService.isSecureURI(
Services.io.newURI("https://nonexistent.example.com")
)
);
ok(
siteSecurityService.isSecureURI(
Services.io.newURI("https://includesubdomains.preloaded.test")
)
);
// notexpired.example.com is an HSTS host in a different test - we
// want to make sure that test hasn't interfered with this one.
ok(
!siteSecurityService.isSecureURI(
Services.io.newURI("https://notexpired.example.com")
)
);
}
|