summaryrefslogtreecommitdiff
path: root/dom/browser-element/mochitest/browserElement_SecurityChange.js
blob: 0ef64b3facb29693216434e56e080dda9b346796 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
/* Any copyright is dedicated to the public domain.
   http://creativecommons.org/publicdomain/zero/1.0/ */

// Bug 763694 - Test that <iframe mozbrowser> delivers proper
// mozbrowsersecuritychange events.

"use strict";
SimpleTest.waitForExplicitFinish();
browserElementTestHelpers.setEnabledPref(true);
browserElementTestHelpers.addPermission();

const { Services } = SpecialPowers.Cu.import('resource://gre/modules/Services.jsm');
const { UrlClassifierTestUtils } = SpecialPowers.Cu.import('resource://testing-common/UrlClassifierTestUtils.jsm', {});

function runTest() {
  var iframe = document.createElement('iframe');
  iframe.setAttribute('mozbrowser', 'true');

  var lastSecurityState;
  iframe.addEventListener('mozbrowsersecuritychange', function(e) {
    lastSecurityState = e.detail;
  });

  var filepath = 'tests/dom/browser-element/mochitest/file_browserElement_SecurityChange.html';

  var count = 0;
  iframe.addEventListener('mozbrowserloadend', function(e) {
    count++;
    switch (count) {
    case 1:
      is(lastSecurityState.state, 'secure');
      is(lastSecurityState.extendedValidation, false);
      is(lastSecurityState.trackingContent, false);
      is(lastSecurityState.mixedContent, false);
      iframe.src = "http://example.com/" + filepath;
      break;
    case 2:
      is(lastSecurityState.state, 'insecure');
      is(lastSecurityState.extendedValidation, false);
      is(lastSecurityState.trackingContent, false);
      is(lastSecurityState.mixedContent, false);
      iframe.src = 'https://example.com:443/' + filepath + '?broken';
      break;
    case 3:
      is(lastSecurityState.state, 'broken');
      is(lastSecurityState.extendedValidation, false);
      is(lastSecurityState.trackingContent, false);
      is(lastSecurityState.mixedContent, true);
      iframe.src = "http://example.com/" + filepath + '?tracking';
      break;
    case 4:
      is(lastSecurityState.state, 'insecure');
      is(lastSecurityState.extendedValidation, false);
      // TODO: I'm having trouble getting the tracking protection
      // test changes to be enabled in the child process, so this
      // isn't currently blocked in tests, but it works when
      // manually testing.
      // is(lastSecurityState.trackingContent, true);
      is(lastSecurityState.mixedContent, false);
      SimpleTest.finish();
    }
  });

  iframe.src = "https://example.com/" + filepath;
  document.body.appendChild(iframe);
}

addEventListener('testready', function() {
  SimpleTest.registerCleanupFunction(UrlClassifierTestUtils.cleanupTestTrackers);
  SpecialPowers.pushPrefEnv({"set" : [
    ["privacy.trackingprotection.enabled", true],
    ["privacy.trackingprotection.pbmode.enabled", false],
    ["browser.safebrowsing.phishing.enabled", false],
    ["browser.safebrowsing.malware.enabled", false],
  ]}, () => {
     SimpleTest.registerCleanupFunction(UrlClassifierTestUtils.cleanupTestTrackers);
     UrlClassifierTestUtils.addTestTrackers().then(() => {
       runTest();
     });
  });
});