Bug 1582116 - Use SpecialPowers.spawn for iframe accesses in test_prompt_async. r=sfoster

The `fail-if = fission` will be fixed by bug 1582117 now.

Differential Revision: https://phabricator.services.mozilla.com/D56862

--HG--
extra : moz-landing-system : lando
This commit is contained in:
Matthew Noorenberghe 2019-12-12 23:11:13 +00:00
Родитель 83cbb9fb14
Коммит 0043a257b3
3 изменённых файлов: 9 добавлений и 5 удалений

Просмотреть файл

@ -150,7 +150,7 @@ var TestUtils = {
* @param condition
* A condition function that must return true or false. If the
* condition ever throws, this is also treated as a false. The
* function can be a generator.
* function can be an async function.
* @param interval
* The time interval to poll the condition function. Defaults
* to 100ms.

Просмотреть файл

@ -145,7 +145,7 @@ skip-if = toolkit == 'android' # bug 1535505
[test_prompt.html]
skip-if = os == "linux" || toolkit == 'android' # Tests desktop prompts
[test_prompt_async.html]
fail-if = fission # bug 1582116
fail-if = fission # bug 1582117
skip-if = toolkit == 'android' # Tests desktop prompts
support-files = subtst_prompt_async.html
[test_prompt_http.html]

Просмотреть файл

@ -79,8 +79,10 @@
}
function promiseProxyErrorLoad(frame) {
return TestUtils.waitForCondition(() => {
return SpecialPowers.wrap(frame.contentWindow).document.documentURI.includes("proxyConnectFailure");
return TestUtils.waitForCondition(async function checkForProxyConnectFailure() {
return SpecialPowers.spawn(frame, [], function() {
return this.content.document.documentURI.includes("proxyConnectFailure");
})
}, "Waiting for proxyConnectFailure documentURI");
}
@ -501,7 +503,9 @@
// the unauthenticated content.
let iframe1DocPromise = promiseLoadedContentDoc(iframe1);
SpecialPowers.wrap(iframe1).contentDocument.location.reload();
await SpecialPowers.spawn(iframe1, [], function() {
this.content.document.location.reload();
});
let state = {
msg: "http://example.com is requesting your username and password. WARNING: Your password will not be sent to the website you are currently visiting!",