Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 // ----------------------------------------------------------------------------
2 // Tests installing an add-on from a local file with whitelisting disabled.
3 // This should be blocked by the whitelist check.
4 function test() {
5 Harness.installBlockedCallback = allow_blocked;
6 Harness.installsCompletedCallback = finish_test;
7 Harness.setup();
9 // Disable file request whitelisting, installing by file referrer should be blocked.
10 Services.prefs.setBoolPref("xpinstall.whitelist.fileRequest", false);
12 var cr = Components.classes["@mozilla.org/chrome/chrome-registry;1"]
13 .getService(Components.interfaces.nsIChromeRegistry);
15 var chromeroot = extractChromeRoot(gTestPath);
16 try {
17 var xpipath = cr.convertChromeURL(makeURI(chromeroot)).spec;
18 } catch (ex) {
19 var xpipath = chromeroot; //scenario where we are running from a .jar and already extracted
20 }
21 var triggers = encodeURIComponent(JSON.stringify({
22 "Unsigned XPI": TESTROOT + "unsigned.xpi"
23 }));
24 gBrowser.selectedTab = gBrowser.addTab();
25 gBrowser.loadURI(xpipath + "installtrigger.html?" + triggers);
26 }
28 function allow_blocked(installInfo) {
29 ok(true, "Seen blocked");
30 return false;
31 }
33 function finish_test(count) {
34 is(count, 0, "No add-ons should have been installed");
36 Services.prefs.clearUserPref("xpinstall.whitelist.fileRequest");
38 gBrowser.removeCurrentTab();
39 Harness.finish();
40 }