Firefox-Marionette
view release on metacpan or search on metacpan
"requires" : {
"Compress::Zlib" : "0",
"Crypt::PasswdMD5" : "0",
"Cwd" : "0",
"Digest::SHA" : "0",
"File::HomeDir" : "0",
"HTTP::Daemon" : "0",
"HTTP::Response" : "0",
"HTTP::Status" : "0",
"IO::Socket::IP" : "0",
"IO::Socket::SSL" : "0",
"PDF::API2" : "2.036",
"Test::CheckManifest" : "0.9",
"Test::More" : "0",
"Test::Pod" : "1.41",
"Test::Pod::Coverage" : "1.04"
}
},
"configure" : {
"requires" : {
"ExtUtils::MakeMaker" : "0"
build_requires:
Compress::Zlib: '0'
Crypt::PasswdMD5: '0'
Cwd: '0'
Digest::SHA: '0'
File::HomeDir: '0'
HTTP::Daemon: '0'
HTTP::Response: '0'
HTTP::Status: '0'
IO::Socket::IP: '0'
IO::Socket::SSL: '0'
PDF::API2: '2.036'
Test::CheckManifest: '0.9'
Test::More: '0'
Test::Pod: '1.41'
Test::Pod::Coverage: '1.04'
configure_requires:
ExtUtils::MakeMaker: '0'
dynamic_config: 1
generated_by: 'ExtUtils::MakeMaker version 7.76, CPAN::Meta::Converter version 2.150010'
license: perl
Makefile.PL view on Meta::CPAN
BUILD_REQUIRES => {
'Compress::Zlib' => 0,
'Crypt::PasswdMD5' => 0,
'Cwd' => 0,
'Digest::SHA' => 0,
'File::HomeDir' => 0,
'HTTP::Daemon' => 0,
'HTTP::Response' => 0,
'HTTP::Status' => 0,
'IO::Socket::IP' => 0,
'IO::Socket::SSL' => 0,
$] ge '5.010' ? ( 'PDF::API2' => 2.036 ) : (),
(
$OSNAME eq 'cygwin'
? () : ( 'Test::CheckManifest' => 0.9 )
),
'Test::More' => 0,
'Test::Pod::Coverage' => 1.04,
'Test::Pod' => 1.41,
},
PREREQ_PM => {
setup-for-firefox-marionette-build.sh view on Meta::CPAN
Darwin)
for PACKAGE in Archive::Zip \
JSON \
Config::INI \
Crypt::PasswdMD5 \
Crypt::URandom \
File::HomeDir \
Digest::SHA \
HTTP::Daemon \
HTTP::Message \
IO::Socket::SSL \
PDF::API2 \
PerlIO::utf8_strict \
Sub::Exporter \
Sub::Uplevel \
Text::CSV_XS \
Term::ReadKey \
Test::CheckManifest \
Test::Pod \
Test::Pod::Coverage \
Test::Simple \
t/01-marionette.t view on Meta::CPAN
use Cwd();
use Encode();
use Firefox::Marionette();
use Waterfox::Marionette();
use Compress::Zlib();
use IO::Socket::IP();
use Config;
use HTTP::Daemon();
use HTTP::Status();
use HTTP::Response();
use IO::Socket::SSL();
use File::HomeDir();
BEGIN: {
if ( $^O eq 'MSWin32' ) {
require Win32::Process;
}
}
my $segv_detected;
my $at_least_one_success;
my $terminated;
t/01-marionette.t view on Meta::CPAN
chomp $@;
ok((($@) and (not($firefox))), "$class->new() threw an exception when launched with an incorrect path to a binary:$@");
eval {
$firefox = $class->new(binary => $^X);
};
chomp $@;
ok((($@) and (not($firefox))), "$class->new() threw an exception when launched with a path to a non firefox binary:$@");
my $tls_tests_ok;
if ($ENV{RELEASE_TESTING}) {
if (
!IO::Socket::SSL->new(
PeerAddr => 'missing.example.org:443',
SSL_verify_mode => IO::Socket::SSL::SSL_VERIFY_NONE(),
) ) {
if ( IO::Socket::SSL->new(
PeerAddr => 'metacpan.org:443',
SSL_verify_mode => IO::Socket::SSL::SSL_VERIFY_PEER(),
) ) {
diag("TLS/Network seem okay");
$tls_tests_ok = 1;
} else {
diag("TLS/Network are NOT okay:Failed to connect to metacpan.org:$IO::Socket::SSL::SSL_ERROR");
}
} else {
diag("TLS/Network are NOT okay:Successfully connected to missing.example.org");
}
}
my $skip_message;
my $profiles_work = 1;
SKIP: {
if ($ENV{FIREFOX_BINARY}) {
skip("No profile testing when the FIREFOX_BINARY override is used", 6);
t/01-marionette.t view on Meta::CPAN
skip("Skipping network tests", 2);
}
if (grep /^accept_insecure_certs$/, $capabilities->enumerate()) {
ok(!$capabilities->accept_insecure_certs(), "\$capabilities->accept_insecure_certs() is false");
if (($ENV{FIREFOX_HOST}) && ($ENV{FIREFOX_HOST} ne 'localhost')) {
diag("insecure cert test is not supported for remote hosts");
} elsif (($ENV{FIREFOX_HOST}) && ($ENV{FIREFOX_HOST} eq 'localhost') && ($ENV{FIREFOX_PORT})) {
diag("insecure cert test is not supported for remote hosts");
} elsif ((exists $Config::Config{'d_fork'}) && (defined $Config::Config{'d_fork'}) && ($Config::Config{'d_fork'} eq 'define')) {
my $ip_address = '127.0.0.1';
my $daemon = IO::Socket::SSL->new(
LocalAddr => $ip_address,
LocalPort => 0,
Listen => 20,
SSL_cert_file => $ca_cert_handle->filename(),
SSL_key_file => $ca_private_key_handle->filename(),
);
my $url = "https://$ip_address:" . $daemon->sockport();
if (my $pid = fork) {
wait_for_server_on($daemon, $url, $pid);
eval { $firefox->go(URI->new($url)) };
( run in 0.283 second using v1.01-cache-2.11-cpan-fd5d4e115d8 )