toolkit/mozapps/extensions/test/xpinstall/browser_signed_tampered.js

Wed, 31 Dec 2014 06:09:35 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:09:35 +0100
changeset 0
6474c204b198
permissions
-rw-r--r--

Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.

michael@0 1 // ----------------------------------------------------------------------------
michael@0 2 // Tests installing a signed add-on that has been tampered with after signing.
michael@0 3 function test() {
michael@0 4 Harness.installConfirmCallback = confirm_install;
michael@0 5 Harness.downloadFailedCallback = download_failed;
michael@0 6 Harness.installsCompletedCallback = finish_test;
michael@0 7 Harness.setup();
michael@0 8
michael@0 9 var pm = Services.perms;
michael@0 10 pm.add(makeURI("http://example.com/"), "install", pm.ALLOW_ACTION);
michael@0 11
michael@0 12 var triggers = encodeURIComponent(JSON.stringify({
michael@0 13 "Tampered Signed XPI": TESTROOT + "signed-tampered.xpi"
michael@0 14 }));
michael@0 15 gBrowser.selectedTab = gBrowser.addTab();
michael@0 16 gBrowser.loadURI(TESTROOT + "installtrigger.html?" + triggers);
michael@0 17 }
michael@0 18
michael@0 19 function confirm_install(window) {
michael@0 20 ok(false, "Should not offer to install");
michael@0 21 }
michael@0 22
michael@0 23 function download_failed(install) {
michael@0 24 is(install.error, AddonManager.ERROR_CORRUPT_FILE, "Install should fail");
michael@0 25 }
michael@0 26
michael@0 27 function finish_test(count) {
michael@0 28 is(count, 0, "No add-ons should have been installed");
michael@0 29 Services.perms.remove("example.com", "install");
michael@0 30
michael@0 31 gBrowser.removeCurrentTab();
michael@0 32 Harness.finish();
michael@0 33 }

mercurial