diff options
Diffstat (limited to 'devtools/client/webconsole/test/browser/browser_webconsole_view_source.js')
-rw-r--r-- | devtools/client/webconsole/test/browser/browser_webconsole_view_source.js | 37 |
1 files changed, 37 insertions, 0 deletions
diff --git a/devtools/client/webconsole/test/browser/browser_webconsole_view_source.js b/devtools/client/webconsole/test/browser/browser_webconsole_view_source.js new file mode 100644 index 0000000000..6a5a92d535 --- /dev/null +++ b/devtools/client/webconsole/test/browser/browser_webconsole_view_source.js @@ -0,0 +1,37 @@ +/* Any copyright is dedicated to the Public Domain. + * http://creativecommons.org/publicdomain/zero/1.0/ */ + +// Tests that source URLs in the Web Console can be clicked to display the +// standard View Source window. As JS exceptions and console.log() messages always +// have their locations opened in Debugger, we need to test a security message in +// order to have it opened in the standard View Source window. + +"use strict"; + +const TEST_URI = + "https://example.com/browser/devtools/client/webconsole/" + + "test/browser/" + + "test-mixedcontent-securityerrors.html"; + +add_task(async function () { + const hud = await openNewTabAndConsole(TEST_URI); + info("console opened"); + + const msg = await waitFor(() => + findErrorMessage(hud, "Blocked loading mixed active content") + ); + ok(msg, "error message"); + const locationNode = msg.querySelector( + ".message-location .frame-link-filename" + ); + ok(locationNode, "location node"); + + const onTabOpen = BrowserTestUtils.waitForNewTab(gBrowser, null, true); + + locationNode.click(); + await onTabOpen; + ok( + true, + "the view source tab was opened in response to clicking the location node" + ); +}); |