toolkit/mozapps/extensions/test/xpcshell/data/test_updatecheck.rdf

Wed, 31 Dec 2014 06:09:35 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:09:35 +0100
changeset 0
6474c204b198
permissions
-rw-r--r--

Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.

     1 <?xml version="1.0" encoding="UTF-8"?>
     3 <RDF xmlns="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
     4      xmlns:RDF="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
     5      xmlns:em="http://www.mozilla.org/2004/em-rdf#">
     7   <Description about="urn:mozilla:extension:updatecheck1@tests.mozilla.org">
     8     <em:updates>
     9       <Seq>
    10         <li>
    11           <Description>
    12             <em:version>1.0</em:version>
    13             <em:targetApplication>
    14               <Description>
    15                 <em:id>xpcshell@tests.mozilla.org</em:id>
    16                 <em:minVersion>1</em:minVersion>
    17                 <em:maxVersion>1</em:maxVersion>
    18                 <em:updateLink>https://localhost:4444/addons/test1.xpi</em:updateLink>
    19               </Description>
    20             </em:targetApplication>
    21           </Description>
    22         </li>
    23         <!-- This update is incompatible and so should not be considered a valid
    24              update -->
    25         <li>
    26           <Description>
    27             <em:version>2.0</em:version>
    28             <em:targetApplication>
    29               <Description>
    30                 <em:id>xpcshell@tests.mozilla.org</em:id>
    31                 <em:minVersion>2</em:minVersion>
    32                 <em:maxVersion>2</em:maxVersion>
    33                 <em:updateLink>https://localhost:4444/addons/test2.xpi</em:updateLink>
    34               </Description>
    35             </em:targetApplication>
    36           </Description>
    37         </li>
    38         <li>
    39           <Description>
    40             <em:version>3.0</em:version>
    41             <em:targetApplication>
    42               <Description>
    43                 <em:id>xpcshell@tests.mozilla.org</em:id>
    44                 <em:minVersion>1</em:minVersion>
    45                 <em:maxVersion>1</em:maxVersion>
    46                 <em:updateLink>https://localhost:4444/addons/test3.xpi</em:updateLink>
    47               </Description>
    48             </em:targetApplication>
    49           </Description>
    50         </li>
    51         <li>
    52           <Description>
    53             <em:version>2.0</em:version>
    54             <em:targetApplication>
    55               <Description>
    56                 <em:id>xpcshell@tests.mozilla.org</em:id>
    57                 <em:minVersion>1</em:minVersion>
    58                 <em:maxVersion>2</em:maxVersion>
    59                 <em:updateLink>https://localhost:4444/addons/test2.xpi</em:updateLink>
    60               </Description>
    61             </em:targetApplication>
    62           </Description>
    63         </li>
    64         <!-- This update is incompatible and so should not be considered a valid
    65              update -->
    66         <li>
    67           <Description>
    68             <em:version>4.0</em:version>
    69             <em:targetApplication>
    70               <Description>
    71                 <em:id>xpcshell@tests.mozilla.org</em:id>
    72                 <em:minVersion>2</em:minVersion>
    73                 <em:maxVersion>2</em:maxVersion>
    74                 <em:updateLink>https://localhost:4444/addons/test4.xpi</em:updateLink>
    75               </Description>
    76             </em:targetApplication>
    77           </Description>
    78         </li>
    79       </Seq>
    80     </em:updates>
    81   </Description>
    83   <!-- An update with no signature which will fail if retrieved with an update
    84        key. The updateLink will also be ignored since it is not secure and there
    85        is no updateHash. -->
    86   <RDF:Description about="urn:mozilla:extension:test_bug378216_5@tests.mozilla.org">
    87     <em:updates>
    88       <RDF:Seq>
    89         <RDF:li>
    90           <RDF:Description>
    91             <em:version>2.0</em:version>
    92             <em:targetApplication>
    93               <RDF:Description>
    94                 <em:id>xpcshell@tests.mozilla.org</em:id>
    95                 <em:minVersion>1</em:minVersion>
    96                 <em:maxVersion>1</em:maxVersion>
    97                 <em:updateLink>http://localhost:4444/broken.xpi</em:updateLink>
    98               </RDF:Description>
    99             </em:targetApplication>
   100           </RDF:Description>
   101         </RDF:li>
   102       </RDF:Seq>
   103     </em:updates>
   104   </RDF:Description>
   106   <!-- An update with a broken signature which will fail if retrieved with an
   107        update key. The updateLink will also be ignored since it is not secure
   108        and there is no updateHash. -->
   109   <RDF:Description about="urn:mozilla:extension:test_bug378216_7@tests.mozilla.org">
   110     <em:updates>
   111       <RDF:Seq>
   112         <RDF:li>
   113           <RDF:Description>
   114             <em:version>2.0</em:version>
   115             <em:targetApplication>
   116               <RDF:Description>
   117                 <em:id>xpcshell@tests.mozilla.org</em:id>
   118                 <em:minVersion>1</em:minVersion>
   119                 <em:maxVersion>2</em:maxVersion>
   120                 <em:updateLink>http://localhost:4444/broken.xpi</em:updateLink>
   121               </RDF:Description>
   122             </em:targetApplication>
   123           </RDF:Description>
   124         </RDF:li>
   125       </RDF:Seq>
   126     </em:updates>
   127     <em:signature>MIGTMA0GCSqGSIb3DQEBBQUAA4GBAMO1O2gwSCCth1GwYMgscfaNakpN40PJfOWt
   128                   ub2HVdg8+OXMciF8d/9eVWm8eH/IxuxyZlmRZTs3O5tv9eWAY5uBCtqDf1WgTsGk
   129                   jrgZow1fITkZI7w0//C8eKdMLAtGueGfNs2IlTd5P/0KH/hf1rPc1wUqEqKCd4+L
   130                   BcVq13ad</em:signature>
   131   </RDF:Description>
   133   <!-- An update with a valid signature. The updateLink will be ignored since it
   134        is not secure and there is no updateHash. -->
   135   <RDF:Description about="urn:mozilla:extension:test_bug378216_8@tests.mozilla.org">
   136     <em:updates>
   137       <RDF:Seq>
   138         <RDF:li>
   139           <RDF:Description>
   140             <em:version>2.0</em:version>
   141             <em:targetApplication>
   142               <RDF:Description>
   143                 <em:id>xpcshell@tests.mozilla.org</em:id>
   144                 <em:minVersion>1</em:minVersion>
   145                 <em:maxVersion>1</em:maxVersion>
   146                 <em:updateLink>http://localhost:4444/broken.xpi</em:updateLink>
   147               </RDF:Description>
   148             </em:targetApplication>
   149           </RDF:Description>
   150         </RDF:li>
   151       </RDF:Seq>
   152     </em:updates>
   153     <em:signature>MIGTMA0GCSqGSIb3DQEBBQUAA4GBAMH/33P/bn148mVkAB8i5X8c4LhY52E+MPUT
   154                   yKHGpowZnRLgL2O0dfpm+rljOBfKi51322PFrsc6VIFml6x4Lrb5foxSyB0Vs9pb
   155                   SEDFWUKquOQvceQ9iEx5Pe0VzrmUZgcQxd8ksSunWL4wJaBZ/evE5amFC6sw3pv/
   156                   fjt8p3GN</em:signature>
   157   </RDF:Description>
   159   <!-- An update with a valid signature. The updateLink will used since there is
   160        an updateHash to verify it. -->
   161   <RDF:Description about="urn:mozilla:extension:test_bug378216_9@tests.mozilla.org">
   162     <em:updates>
   163       <RDF:Seq>
   164         <RDF:li>
   165           <RDF:Description>
   166             <em:version>2.0</em:version>
   167             <em:targetApplication>
   168               <RDF:Description>
   169                 <em:id>xpcshell@tests.mozilla.org</em:id>
   170                 <em:minVersion>1</em:minVersion>
   171                 <em:maxVersion>1</em:maxVersion>
   172                 <em:updateLink>http://localhost:4444/broken.xpi</em:updateLink>
   173                 <em:updateHash>sha1:78fc1d2887eda35b4ad2e3a0b60120ca271ce6e6</em:updateHash>
   174               </RDF:Description>
   175             </em:targetApplication>
   176           </RDF:Description>
   177         </RDF:li>
   178       </RDF:Seq>
   179     </em:updates>
   180     <em:signature>MIGTMA0GCSqGSIb3DQEBBQUAA4GBAJ5Dv3Zd7/j5dLchCw9iO/cxPq8oOhOYD2M+
   181                   jUKvmHCyTBRIEaJrE4N7yVbRYk++ERIfyVepLivsVi4pBmF7JTdw0NaKUA0LiOoT
   182                   mRL8I7s5NPjCiiNcdqbncWyiZwIj1w1nkbWGTlH/gEjRW/LbvT4JAuec8yNFDa4S
   183                   X8mOMf7k</em:signature>
   184   </RDF:Description>
   186   <!-- An update with a valid signature. The updateLink will used since it is
   187        a secure URL. -->
   188   <RDF:Description about="urn:mozilla:extension:test_bug378216_10@tests.mozilla.org">
   189     <em:updates>
   190       <RDF:Seq>
   191         <RDF:li>
   192           <RDF:Description>
   193             <em:version>2.0</em:version>
   194             <em:targetApplication>
   195               <RDF:Description>
   196                 <em:id>xpcshell@tests.mozilla.org</em:id>
   197                 <em:minVersion>1</em:minVersion>
   198                 <em:maxVersion>1</em:maxVersion>
   199                 <em:updateLink>https://localhost:4444/broken.xpi</em:updateLink>
   200               </RDF:Description>
   201             </em:targetApplication>
   202           </RDF:Description>
   203         </RDF:li>
   204       </RDF:Seq>
   205     </em:updates>
   206     <em:signature>MIGTMA0GCSqGSIb3DQEBBQUAA4GBAGvf7XqqoTl5WofrNq55E7W+UttOEDXLB3Oi
   207                   XDiXe0i6njlozilseaUo1hgfQhhzN9gkyetP5tGBVcLRrVyliKpJmD6ABCVGW1lS
   208                   qS+SEw7gDHyHkvwKMyWKedpRGChqLYnnf+Y+CX3MWLZLkwPXMKdTYgN3Rx0lEnJk
   209                   37LSEMKE</em:signature>
   210   </RDF:Description>
   212   <!-- An update with a valid signature. The updateLink will used since it is
   213        a secure URL. -->
   214   <RDF:Description about="urn:mozilla:extension:test_bug378216_11@tests.mozilla.org">
   215     <em:updates>
   216       <RDF:Seq>
   217         <RDF:li>
   218           <RDF:Description>
   219             <em:version>2.0</em:version>
   220             <em:targetApplication>
   221               <RDF:Description>
   222                 <em:id>xpcshell@tests.mozilla.org</em:id>
   223                 <em:minVersion>1</em:minVersion>
   224                 <em:maxVersion>1</em:maxVersion>
   225                 <em:updateLink>https://localhost:4444/broken.xpi</em:updateLink>
   226                 <em:updateHash>sha1:78fc1d2887eda35b4ad2e3a0b60120ca271ce6e6</em:updateHash>
   227               </RDF:Description>
   228             </em:targetApplication>
   229           </RDF:Description>
   230         </RDF:li>
   231       </RDF:Seq>
   232     </em:updates>
   233     <em:signature>MIGTMA0GCSqGSIb3DQEBBQUAA4GBACMX/KReOGSJ8CMGRroH1v3Gjv/Qs/pqH+Ow
   234                   o+hCKWLUKx7hpJgVJkXXdAHW0U88NXlp1S2H0WqA7I/CdmNXJSPzzV/J4z1dZgXh
   235                   JbW6mqNb0pj6nIe7g8OLzSxDgBmO4DUP5DAmnmqciJLWQzN7OdbcwrWz6xPN5kZF
   236                   A90eF5zy</em:signature>
   237   </RDF:Description>
   239   <!-- An update with a valid signature. The updateLink will used since the
   240        updateHash verifying it is not strong enough. -->
   241   <RDF:Description about="urn:mozilla:extension:test_bug378216_12@tests.mozilla.org">
   242     <em:updates>
   243       <RDF:Seq>
   244         <RDF:li>
   245           <RDF:Description>
   246             <em:version>2.0</em:version>
   247             <em:targetApplication>
   248               <RDF:Description>
   249                 <em:id>xpcshell@tests.mozilla.org</em:id>
   250                 <em:minVersion>1</em:minVersion>
   251                 <em:maxVersion>1</em:maxVersion>
   252                 <em:updateLink>http://localhost:4444/broken.xpi</em:updateLink>
   253                 <em:updateHash>md2:78fc1d2887eda35b4ad2e3a0b60120ca271ce6e6</em:updateHash>
   254               </RDF:Description>
   255             </em:targetApplication>
   256           </RDF:Description>
   257         </RDF:li>
   258       </RDF:Seq>
   259     </em:updates>
   260     <em:signature>MIGTMA0GCSqGSIb3DQEBBQUAA4GBAJRfcFvHIWxVyycCw8IjNmEhabc2uqA1zQwp
   261                   5oKh3Y23hwIsQ6xy68Wtjte1NEYFRt5fWkbMXj9YQj6LpVbzBKiGATcrq6MycZKK
   262                   o5N22cWbrKKRweJezTyN4eLfQg21pG7r8mdfS0bIA28ZVFtQOmORejoUesEouCGy
   263                   eKYk9nS2</em:signature>
   264   </RDF:Description>
   266   <!-- An update with a valid signature. The updateLink will used since it is
   267        a secure URL. -->
   268   <RDF:Description about="urn:mozilla:extension:test_bug378216_13@tests.mozilla.org">
   269     <em:updates>
   270       <RDF:Seq>
   271         <RDF:li>
   272           <RDF:Description>
   273             <em:version>2.0</em:version>
   274             <em:targetApplication>
   275               <RDF:Description>
   276                 <em:id>xpcshell@tests.mozilla.org</em:id>
   277                 <em:minVersion>1</em:minVersion>
   278                 <em:maxVersion>1</em:maxVersion>
   279                 <em:updateLink>https://localhost:4444/broken.xpi</em:updateLink>
   280                 <em:updateHash>md2:78fc1d2887eda35b4ad2e3a0b60120ca271ce6e6</em:updateHash>
   281               </RDF:Description>
   282             </em:targetApplication>
   283           </RDF:Description>
   284         </RDF:li>
   285       </RDF:Seq>
   286     </em:updates>
   287     <em:signature>MIGTMA0GCSqGSIb3DQEBBQUAA4GBALQKwzLFr/VOw3gJvv/LCh3/PWDd9FqmFnX+
   288                   hJjBmCaUDtG7CXn1i0h8ed8IeRHpLLT7FCzVwU3bH9BUjdm8wc3ObtlNbd8go01a
   289                   CoXz50r3rYPcYz4WS+7/+lvrUqsuWd9Wj+q0NeCPiNaaro6/AolE2Qf5JFRL3lxY
   290                   lsKWAnVO</em:signature>
   291   </RDF:Description>
   293   <!-- There should be no information present for test_bug378216_14 -->
   295   <!-- Invalid update RDF -->
   296   <RDF:Description about="urn:mozilla:extension:test_bug378216_15@tests.mozilla.org">
   297     <em:updates>Foo</em:updates>
   298   </RDF:Description>
   300   <!-- Various updates available - one is not compatible, but compatibility checking is disabled -->
   301   <Description about="urn:mozilla:extension:ignore-compat@tests.mozilla.org">
   302     <em:updates>
   303       <Seq>
   304         <li>
   305           <Description>
   306             <em:version>1.0</em:version>
   307             <em:targetApplication>
   308               <Description>
   309                 <em:id>xpcshell@tests.mozilla.org</em:id>
   310                 <em:minVersion>0.1</em:minVersion>
   311                 <em:maxVersion>0.2</em:maxVersion>
   312                 <em:updateLink>https://localhost:4444/addons/test1.xpi</em:updateLink>
   313               </Description>
   314             </em:targetApplication>
   315           </Description>
   316         </li>
   317         <li>
   318           <Description>
   319             <em:version>2.0</em:version>
   320             <em:targetApplication>
   321               <Description>
   322                 <em:id>xpcshell@tests.mozilla.org</em:id>
   323                 <em:minVersion>0.5</em:minVersion>
   324                 <em:maxVersion>0.6</em:maxVersion>
   325                 <em:updateLink>https://localhost:4444/addons/test2.xpi</em:updateLink>
   326               </Description>
   327             </em:targetApplication>
   328           </Description>
   329         </li>
   330         <!-- Update for future app versions - should never be compatible -->
   331         <li>
   332           <Description>
   333             <em:version>3.0</em:version>
   334             <em:targetApplication>
   335               <Description>
   336                 <em:id>xpcshell@tests.mozilla.org</em:id>
   337                 <em:minVersion>2</em:minVersion>
   338                 <em:maxVersion>3</em:maxVersion>
   339                 <em:updateLink>https://localhost:4444/addons/test3.xpi</em:updateLink>
   340               </Description>
   341             </em:targetApplication>
   342           </Description>
   343         </li>
   344       </Seq>
   345     </em:updates>
   346   </Description>
   348   <!-- Various updates available - one is not compatible, but compatibility checking is disabled -->
   349   <Description about="urn:mozilla:extension:compat-override@tests.mozilla.org">
   350     <em:updates>
   351       <Seq>
   352         <!-- Has compatibility override, but it doesn't match this app version -->
   353         <li>
   354           <Description>
   355             <em:version>1.0</em:version>
   356             <em:targetApplication>
   357               <Description>
   358                 <em:id>xpcshell@tests.mozilla.org</em:id>
   359                 <em:minVersion>0.1</em:minVersion>
   360                 <em:maxVersion>0.2</em:maxVersion>
   361                 <em:updateLink>https://localhost:4444/addons/test1.xpi</em:updateLink>
   362               </Description>
   363             </em:targetApplication>
   364           </Description>
   365         </li>
   366         <!-- Has compatibility override, so is incompaible -->
   367         <li>
   368           <Description>
   369             <em:version>2.0</em:version>
   370             <em:targetApplication>
   371               <Description>
   372                 <em:id>xpcshell@tests.mozilla.org</em:id>
   373                 <em:minVersion>0.5</em:minVersion>
   374                 <em:maxVersion>0.6</em:maxVersion>
   375                 <em:updateLink>https://localhost:4444/addons/test2.xpi</em:updateLink>
   376               </Description>
   377             </em:targetApplication>
   378           </Description>
   379         </li>
   380         <!-- Update for future app versions - should never be compatible -->
   381         <li>
   382           <Description>
   383             <em:version>3.0</em:version>
   384             <em:targetApplication>
   385               <Description>
   386                 <em:id>xpcshell@tests.mozilla.org</em:id>
   387                 <em:minVersion>2</em:minVersion>
   388                 <em:maxVersion>3</em:maxVersion>
   389                 <em:updateLink>https://localhost:4444/addons/test3.xpi</em:updateLink>
   390               </Description>
   391             </em:targetApplication>
   392           </Description>
   393         </li>
   394       </Seq>
   395     </em:updates>
   396   </Description>
   398   <!-- Opt-in to strict compatibility checking -->
   399   <Description about="urn:mozilla:extension:compat-strict-optin@tests.mozilla.org">
   400     <em:updates>
   401       <Seq>
   402         <li>
   403           <Description>
   404             <em:version>1.0</em:version>
   405             <em:targetApplication>
   406               <Description>
   407                 <em:id>xpcshell@tests.mozilla.org</em:id>
   408                 <em:minVersion>0.1</em:minVersion>
   409                 <em:maxVersion>0.2</em:maxVersion>
   410                 <em:strictCompatibility>true</em:strictCompatibility>
   411                 <em:updateLink>https://localhost:4444/addons/test1.xpi</em:updateLink>
   412               </Description>
   413             </em:targetApplication>
   414           </Description>
   415         </li>
   416       </Seq>
   417     </em:updates>
   418   </Description>
   419 </RDF>

mercurial