toolkit/mozapps/extensions/test/xpinstall/browser_localfile4.js

Wed, 31 Dec 2014 06:09:35 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:09:35 +0100
changeset 0
6474c204b198
permissions
-rw-r--r--

Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.

     1 // ----------------------------------------------------------------------------
     2 // Tests installing an add-on from a local file with whitelisting disabled.
     3 // This should be blocked by the whitelist check.
     4 function test() {
     5   Harness.installBlockedCallback = allow_blocked;
     6   Harness.installsCompletedCallback = finish_test;
     7   Harness.setup();
     9   // Disable file request whitelisting, installing by file referrer should be blocked.
    10   Services.prefs.setBoolPref("xpinstall.whitelist.fileRequest", false);
    12   var cr = Components.classes["@mozilla.org/chrome/chrome-registry;1"]
    13                      .getService(Components.interfaces.nsIChromeRegistry);
    15   var chromeroot = extractChromeRoot(gTestPath);
    16   try {
    17     var xpipath = cr.convertChromeURL(makeURI(chromeroot)).spec;
    18   } catch (ex) {
    19     var xpipath = chromeroot; //scenario where we are running from a .jar and already extracted
    20   }
    21   var triggers = encodeURIComponent(JSON.stringify({
    22     "Unsigned XPI": TESTROOT + "unsigned.xpi"
    23   }));
    24   gBrowser.selectedTab = gBrowser.addTab();
    25   gBrowser.loadURI(xpipath + "installtrigger.html?" + triggers);
    26 }
    28 function allow_blocked(installInfo) {
    29   ok(true, "Seen blocked");
    30   return false;
    31 }
    33 function finish_test(count) {
    34   is(count, 0, "No add-ons should have been installed");
    36   Services.prefs.clearUserPref("xpinstall.whitelist.fileRequest");
    38   gBrowser.removeCurrentTab();
    39   Harness.finish();
    40 }

mercurial