File: test_signed_long.js

package info (click to toggle)
firefox 149.0-1
  • links: PTS, VCS
  • area: main
  • in suites: sid
  • size: 4,767,760 kB
  • sloc: cpp: 7,416,064; javascript: 6,752,859; ansic: 3,774,850; python: 1,250,473; xml: 641,578; asm: 439,191; java: 186,617; sh: 56,634; makefile: 18,856; objc: 13,092; perl: 12,763; pascal: 5,960; yacc: 4,583; cs: 3,846; lex: 1,720; ruby: 1,002; php: 436; lisp: 258; awk: 105; sql: 66; sed: 53; csh: 10; exp: 6
file content (24 lines) | stat: -rw-r--r-- 796 bytes parent folder | download | duplicates (4)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
gUseRealCertChecks = true;

const ID = "123456789012345678901234567890123456789012345678901@somewhere.com";

// Tests that signature verification works correctly on an extension with
// an ID that does not fit into a certificate CN field.
add_task(useAMOStageCert(), async function test_long_id() {
  createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1");
  await promiseStartupManager();

  Assert.greater(ID.length, 64, "ID is > 64 characters");

  await promiseInstallFile(do_get_file("data/signing_checks/long.xpi"));
  let addon = await promiseAddonByID(ID);

  Assert.notEqual(addon, null, "Addon install properly");
  Assert.greater(
    addon.signedState,
    AddonManager.SIGNEDSTATE_MISSING,
    "Signature verification worked properly"
  );

  await addon.uninstall();
});