|
1 // ---------------------------------------------------------------------------- |
|
2 // Tests installing an add-on from a local file with whitelisting disabled. |
|
3 // This should be blocked by the whitelist check. |
|
4 function test() { |
|
5 Harness.installBlockedCallback = allow_blocked; |
|
6 Harness.installsCompletedCallback = finish_test; |
|
7 Harness.setup(); |
|
8 |
|
9 // Disable file request whitelisting, installing by file referrer should be blocked. |
|
10 Services.prefs.setBoolPref("xpinstall.whitelist.fileRequest", false); |
|
11 |
|
12 var cr = Components.classes["@mozilla.org/chrome/chrome-registry;1"] |
|
13 .getService(Components.interfaces.nsIChromeRegistry); |
|
14 |
|
15 var chromeroot = extractChromeRoot(gTestPath); |
|
16 try { |
|
17 var xpipath = cr.convertChromeURL(makeURI(chromeroot)).spec; |
|
18 } catch (ex) { |
|
19 var xpipath = chromeroot; //scenario where we are running from a .jar and already extracted |
|
20 } |
|
21 var triggers = encodeURIComponent(JSON.stringify({ |
|
22 "Unsigned XPI": TESTROOT + "unsigned.xpi" |
|
23 })); |
|
24 gBrowser.selectedTab = gBrowser.addTab(); |
|
25 gBrowser.loadURI(xpipath + "installtrigger.html?" + triggers); |
|
26 } |
|
27 |
|
28 function allow_blocked(installInfo) { |
|
29 ok(true, "Seen blocked"); |
|
30 return false; |
|
31 } |
|
32 |
|
33 function finish_test(count) { |
|
34 is(count, 0, "No add-ons should have been installed"); |
|
35 |
|
36 Services.prefs.clearUserPref("xpinstall.whitelist.fileRequest"); |
|
37 |
|
38 gBrowser.removeCurrentTab(); |
|
39 Harness.finish(); |
|
40 } |