1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
|
// ----------------------------------------------------------------------------
// Test whether an install fails when authentication is required and bad
// credentials are given
// This verifies bug 312473
function test() {
// This test depends on InstallTrigger.install availability.
setInstallTriggerPrefs();
// Turn off the authentication dialog blocking for this test.
Services.prefs.setBoolPref(
"network.auth.non-web-content-triggered-resources-http-auth-allow",
true
);
requestLongerTimeout(2);
Harness.authenticationCallback = get_auth_info;
Harness.downloadFailedCallback = download_failed;
Harness.installEndedCallback = install_ended;
Harness.installsCompletedCallback = finish_test;
Harness.setup();
PermissionTestUtils.add(
"http://example.com/",
"install",
Services.perms.ALLOW_ACTION
);
var triggers = encodeURIComponent(
JSON.stringify({
"Unsigned XPI":
TESTROOT + "authRedirect.sjs?" + TESTROOT + "amosigned.xpi",
})
);
gBrowser.selectedTab = BrowserTestUtils.addTab(gBrowser);
BrowserTestUtils.startLoadingURIString(
gBrowser,
TESTROOT + "installtrigger.html?" + triggers
);
}
function get_auth_info() {
return ["baduser", "badpass"];
}
function download_failed(install) {
is(
install.error,
AddonManager.ERROR_NETWORK_FAILURE,
"Install should have failed"
);
}
function install_ended(install, addon) {
ok(false, "Add-on should not have installed");
return addon.uninstall();
}
function finish_test(count) {
is(count, 0, "No add-ons should have been installed");
var authMgr = Cc["@mozilla.org/network/http-auth-manager;1"].getService(
Ci.nsIHttpAuthManager
);
authMgr.clearAll();
PermissionTestUtils.remove("http://example.com", "install");
Services.prefs.clearUserPref(
"network.auth.non-web-content-triggered-resources-http-auth-allow"
);
gBrowser.removeCurrentTab();
Harness.finish();
}
|