Pass | the registerProtocolHandler method should exist on the navigator object | Asserts runPass | assert_idl_attribute(object "[object Navigator]", "registerProtocolHandler")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:16:3) |
|
Pass | the unregisterProtocolHandler method should exist on the navigator object | Asserts runPass | assert_idl_attribute(object "[object Navigator]", "unregisterProtocolHandler")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:20:3) |
|
Pass | registerProtocolHandler: Valid URL "%s" should work. | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: Valid URL "%s" should work. | Asserts runNo asserts ran |
Pass | registerProtocolHandler: Valid URL "foo/%s" should work. | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: Valid URL "foo/%s" should work. | Asserts runNo asserts ran |
Pass | registerProtocolHandler: Valid URL "%shttps://wpt.live/html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html" should work. | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: Valid URL "%shttps://wpt.live/html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html" should work. | Asserts runNo asserts ran |
Pass | registerProtocolHandler: Valid URL "h%sttps://wpt.live/html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html" should work. | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: Valid URL "h%sttps://wpt.live/html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html" should work. | Asserts runNo asserts ran |
Pass | registerProtocolHandler: Valid URL "https:%s//wpt.live/html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html" should work. | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: Valid URL "https:%s//wpt.live/html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html" should work. | Asserts runNo asserts ran |
Pass | registerProtocolHandler: Valid URL "https://wpt.live/html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html/%s" should work. | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: Valid URL "https://wpt.live/html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html/%s" should work. | Asserts runNo asserts ran |
Pass | registerProtocolHandler: Valid URL "https://wpt.live/html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html#%s" should work. | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: Valid URL "https://wpt.live/html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html#%s" should work. | Asserts runNo asserts ran |
Pass | registerProtocolHandler: Valid URL "https://wpt.live/html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html?foo=%s" should work. | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: Valid URL "https://wpt.live/html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html?foo=%s" should work. | Asserts runNo asserts ran |
Pass | registerProtocolHandler: Valid URL "https://wpt.live/html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html?foo=%s&bar" should work. | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: Valid URL "https://wpt.live/html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html?foo=%s&bar" should work. | Asserts runNo asserts ran |
Pass | registerProtocolHandler: Valid URL "https://wpt.live/html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html/%s/bar/baz/" should work. | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: Valid URL "https://wpt.live/html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html/%s/bar/baz/" should work. | Asserts runNo asserts ran |
Pass | registerProtocolHandler: Valid URL "https://wpt.live/html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html/%s/bar/baz/?foo=1337&bar#baz" should work. | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: Valid URL "https://wpt.live/html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html/%s/bar/baz/?foo=1337&bar#baz" should work. | Asserts runNo asserts ran |
Pass | registerProtocolHandler: Valid URL "https://wpt.live/html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html/%s/foo/%s/" should work. | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: Valid URL "https://wpt.live/html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html/%s/foo/%s/" should work. | Asserts runNo asserts ran |
Pass | registerProtocolHandler: Invalid URL "" should throw (but after scheme) | Asserts runPass | assert_throws_dom("SYNTAX_ERR", function "() => { navigator.registerProtocolHandler('mailto', url, 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:64:5) | Pass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler('x', url, 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:65:5) |
|
Pass | unregisterProtocolHandler: Invalid URL "" should throw (but after scheme) | Asserts runPass | assert_throws_dom("SYNTAX_ERR", function "() => { navigator.unregisterProtocolHandler('mailto', url); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:69:5) | Pass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler('x', url, 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:70:5) |
|
Pass | registerProtocolHandler: Invalid URL "%S" should throw (but after scheme) | Asserts runPass | assert_throws_dom("SYNTAX_ERR", function "() => { navigator.registerProtocolHandler('mailto', url, 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:64:5) | Pass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler('x', url, 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:65:5) |
|
Pass | unregisterProtocolHandler: Invalid URL "%S" should throw (but after scheme) | Asserts runPass | assert_throws_dom("SYNTAX_ERR", function "() => { navigator.unregisterProtocolHandler('mailto', url); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:69:5) | Pass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler('x', url, 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:70:5) |
|
Pass | registerProtocolHandler: Invalid URL "http://%s.com" should throw (but after scheme) | Asserts runPass | assert_throws_dom("SYNTAX_ERR", function "() => { navigator.registerProtocolHandler('mailto', url, 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:64:5) | Pass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler('x', url, 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:65:5) |
|
Pass | unregisterProtocolHandler: Invalid URL "http://%s.com" should throw (but after scheme) | Asserts runPass | assert_throws_dom("SYNTAX_ERR", function "() => { navigator.unregisterProtocolHandler('mailto', url); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:69:5) | Pass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler('x', url, 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:70:5) |
|
Pass | registerProtocolHandler: Invalid URL "http://%s.example.com" should throw (but after scheme) | Asserts runPass | assert_throws_dom("SYNTAX_ERR", function "() => { navigator.registerProtocolHandler('mailto', url, 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:64:5) | Pass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler('x', url, 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:65:5) |
|
Pass | unregisterProtocolHandler: Invalid URL "http://%s.example.com" should throw (but after scheme) | Asserts runPass | assert_throws_dom("SYNTAX_ERR", function "() => { navigator.unregisterProtocolHandler('mailto', url); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:69:5) | Pass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler('x', url, 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:70:5) |
|
Pass | registerProtocolHandler: Invalid URL "https://%swpt.live/html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html" should throw (but after scheme) | Asserts runPass | assert_throws_dom("SYNTAX_ERR", function "() => { navigator.registerProtocolHandler('mailto', url, 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:64:5) | Pass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler('x', url, 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:65:5) |
|
Pass | unregisterProtocolHandler: Invalid URL "https://%swpt.live/html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html" should throw (but after scheme) | Asserts runPass | assert_throws_dom("SYNTAX_ERR", function "() => { navigator.unregisterProtocolHandler('mailto', url); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:69:5) | Pass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler('x', url, 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:70:5) |
|
Fail | registerProtocolHandler: Invalid URL "%shttps://wpt.live/html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html" should throw (but after scheme) | assert_throws_dom: function "() => { navigator.registerProtocolHandler('mailto', url, 'foo'); }" did not throw at Test.<anonymous> (https://wpt.live/html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:64:5)
at Test.step (https://wpt.live/resources/testharness.js:2642:25)
at test (https://wpt.live/resources/testharness.js:633:30)
at https://wpt.live/html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:63:3 Asserts runFail | assert_throws_dom("SYNTAX_ERR", function "() => { navigator.registerProtocolHandler('mailto', url, 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:64:5) |
|
Fail | unregisterProtocolHandler: Invalid URL "%shttps://wpt.live/html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html" should throw (but after scheme) | assert_throws_dom: function "() => { navigator.unregisterProtocolHandler('mailto', url); }" did not throw at Test.<anonymous> (https://wpt.live/html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:69:5)
at Test.step (https://wpt.live/resources/testharness.js:2642:25)
at test (https://wpt.live/resources/testharness.js:633:30)
at https://wpt.live/html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:68:3 Asserts runFail | assert_throws_dom("SYNTAX_ERR", function "() => { navigator.unregisterProtocolHandler('mailto', url); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:69:5) |
|
Pass | registerProtocolHandler: Invalid URL "https://wpt.live/html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html" should throw (but after scheme) | Asserts runPass | assert_throws_dom("SYNTAX_ERR", function "() => { navigator.registerProtocolHandler('mailto', url, 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:64:5) | Pass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler('x', url, 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:65:5) |
|
Pass | unregisterProtocolHandler: Invalid URL "https://wpt.live/html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html" should throw (but after scheme) | Asserts runPass | assert_throws_dom("SYNTAX_ERR", function "() => { navigator.unregisterProtocolHandler('mailto', url); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:69:5) | Pass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler('x', url, 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:70:5) |
|
Pass | registerProtocolHandler: Invalid URL "https://wpt.live/html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html/%" should throw (but after scheme) | Asserts runPass | assert_throws_dom("SYNTAX_ERR", function "() => { navigator.registerProtocolHandler('mailto', url, 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:64:5) | Pass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler('x', url, 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:65:5) |
|
Pass | unregisterProtocolHandler: Invalid URL "https://wpt.live/html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html/%" should throw (but after scheme) | Asserts runPass | assert_throws_dom("SYNTAX_ERR", function "() => { navigator.unregisterProtocolHandler('mailto', url); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:69:5) | Pass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler('x', url, 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:70:5) |
|
Pass | registerProtocolHandler: Invalid URL "https://wpt.live/html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html/%a" should throw (but after scheme) | Asserts runPass | assert_throws_dom("SYNTAX_ERR", function "() => { navigator.registerProtocolHandler('mailto', url, 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:64:5) | Pass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler('x', url, 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:65:5) |
|
Pass | unregisterProtocolHandler: Invalid URL "https://wpt.live/html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html/%a" should throw (but after scheme) | Asserts runPass | assert_throws_dom("SYNTAX_ERR", function "() => { navigator.unregisterProtocolHandler('mailto', url); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:69:5) | Pass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler('x', url, 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:70:5) |
|
Pass | registerProtocolHandler: Invalid URL "http://example.com" should throw (but after scheme) | Asserts runPass | assert_throws_dom("SYNTAX_ERR", function "() => { navigator.registerProtocolHandler('mailto', url, 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:64:5) | Pass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler('x', url, 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:65:5) |
|
Pass | unregisterProtocolHandler: Invalid URL "http://example.com" should throw (but after scheme) | Asserts runPass | assert_throws_dom("SYNTAX_ERR", function "() => { navigator.unregisterProtocolHandler('mailto', url); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:69:5) | Pass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler('x', url, 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:70:5) |
|
Pass | registerProtocolHandler: Invalid URL "http://[v8.:::]//url=%s" should throw (but after scheme) | Asserts runPass | assert_throws_dom("SYNTAX_ERR", function "() => { navigator.registerProtocolHandler('mailto', url, 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:64:5) | Pass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler('x', url, 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:65:5) |
|
Pass | unregisterProtocolHandler: Invalid URL "http://[v8.:::]//url=%s" should throw (but after scheme) | Asserts runPass | assert_throws_dom("SYNTAX_ERR", function "() => { navigator.unregisterProtocolHandler('mailto', url); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:69:5) | Pass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler('x', url, 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:70:5) |
|
Pass | registerProtocolHandler: Invalid URL "https://test:test/" should throw (but after scheme) | Asserts runPass | assert_throws_dom("SYNTAX_ERR", function "() => { navigator.registerProtocolHandler('mailto', url, 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:64:5) | Pass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler('x', url, 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:65:5) |
|
Pass | unregisterProtocolHandler: Invalid URL "https://test:test/" should throw (but after scheme) | Asserts runPass | assert_throws_dom("SYNTAX_ERR", function "() => { navigator.unregisterProtocolHandler('mailto', url); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:69:5) | Pass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler('x', url, 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:70:5) |
|
Pass | registerProtocolHandler: Invalid URL "http://example.com/%s" should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler('mailto', url, 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:86:5) |
|
Pass | unregisterProtocolHandler: Invalid URL "http://example.com/%s" should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler('mailto', url); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:90:5) |
|
Pass | registerProtocolHandler: Invalid URL "https://example.com/%s" should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler('mailto', url, 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:86:5) |
|
Pass | unregisterProtocolHandler: Invalid URL "https://example.com/%s" should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler('mailto', url); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:90:5) |
|
Pass | registerProtocolHandler: Invalid URL "http://foobar.example.com/%s" should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler('mailto', url, 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:86:5) |
|
Pass | unregisterProtocolHandler: Invalid URL "http://foobar.example.com/%s" should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler('mailto', url); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:90:5) |
|
Pass | registerProtocolHandler: Invalid URL "mailto:%s@example.com" should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler('mailto', url, 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:86:5) |
|
Pass | unregisterProtocolHandler: Invalid URL "mailto:%s@example.com" should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler('mailto', url); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:90:5) |
|
Pass | registerProtocolHandler: Invalid URL "mailto:%s" should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler('mailto', url, 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:86:5) |
|
Pass | unregisterProtocolHandler: Invalid URL "mailto:%s" should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler('mailto', url); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:90:5) |
|
Pass | registerProtocolHandler: Invalid URL "chrome://wpt.live/%s" should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler('mailto', url, 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:86:5) |
|
Pass | unregisterProtocolHandler: Invalid URL "chrome://wpt.live/%s" should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler('mailto', url); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:90:5) |
|
Pass | registerProtocolHandler: Invalid URL "foo://wpt.live/%s" should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler('mailto', url, 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:86:5) |
|
Pass | unregisterProtocolHandler: Invalid URL "foo://wpt.live/%s" should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler('mailto', url); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:90:5) |
|
Pass | registerProtocolHandler: Invalid URL "blob: URL" should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler('mailto', url, 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:86:5) |
|
Pass | unregisterProtocolHandler: Invalid URL "blob: URL" should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler('mailto', url); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:90:5) |
|
Pass | registerProtocolHandler: Attempting to override the "about" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "about" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "attachment" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "attachment" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "blob" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "blob" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "chrome" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "chrome" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "cid" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "cid" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "data" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "data" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "file" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "file" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "http" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "http" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "https" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "https" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "javascript" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "javascript" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "livescript" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "livescript" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "mid" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "mid" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "mocha" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "mocha" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "moz-icon" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "moz-icon" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "opera" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "opera" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "operamail" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "operamail" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "res" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "res" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "resource" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "resource" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "shttp" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "shttp" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "tcl" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "tcl" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "vbscript" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "vbscript" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "view-source" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "view-source" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "ws" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "ws" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "wss" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "wss" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "wyciwyg" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "wyciwyg" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "unrecognized" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "unrecognized" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "mаilto" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "mаilto" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "mailto:" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "mailto:" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "mailto://" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "mailto://" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "mailto " protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "mailto " protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "mailtoo" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "mailtoo" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "mailto
" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "mailto
" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "http://" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "http://" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "ssh:/" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "ssh:/" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "magnet:+" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "magnet:+" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "tel:sip" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "tel:sip" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "foo" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "foo" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "fweb+oo" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "fweb+oo" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "web+" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "web+" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "web+1" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "web+1" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "web+namewithid123" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "web+namewithid123" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "web+namewithtrailingspace " protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "web+namewithtrailingspace " protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "web+préfixewithaccent" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "web+préfixewithaccent" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "web+Kelvinsign" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "web+Kelvinsign" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "web+latinsmallletterlongſ" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "web+latinsmallletterlongſ" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "web+dots.are.forbidden" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "web+dots.are.forbidden" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "web+dashes-are-forbidden" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "web+dashes-are-forbidden" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "web+underscores_are_forbidden" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "web+underscores_are_forbidden" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "web+spaces are forbidden" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "web+spaces are forbidden" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "web+non*alpha*are*forbidden" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "web+non*alpha*are*forbidden" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: Attempting to override the "web+digits123areforbidden" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.registerProtocolHandler(scheme, 'https://test:test/', 'foo'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:155:5) |
|
Pass | unregisterProtocolHandler: Attempting to override the "web+digits123areforbidden" protocol should throw SECURITY_ERR. | Asserts runPass | assert_throws_dom("SECURITY_ERR", function "() => { navigator.unregisterProtocolHandler(scheme, 'https://test:test/'); }")
at Test.<anonymous> ( /html/webappapis/system-state-and-capabilities/the-navigator-object/protocol.https.html:159:5) |
|
Pass | registerProtocolHandler: overriding the "bitcoin" protocol should work | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: overriding the "bitcoin" protocol should work | Asserts runNo asserts ran |
Pass | registerProtocolHandler: overriding the "ftp" protocol should work | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: overriding the "ftp" protocol should work | Asserts runNo asserts ran |
Pass | registerProtocolHandler: overriding the "ftps" protocol should work | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: overriding the "ftps" protocol should work | Asserts runNo asserts ran |
Pass | registerProtocolHandler: overriding the "geo" protocol should work | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: overriding the "geo" protocol should work | Asserts runNo asserts ran |
Pass | registerProtocolHandler: overriding the "im" protocol should work | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: overriding the "im" protocol should work | Asserts runNo asserts ran |
Pass | registerProtocolHandler: overriding the "irc" protocol should work | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: overriding the "irc" protocol should work | Asserts runNo asserts ran |
Pass | registerProtocolHandler: overriding the "ircs" protocol should work | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: overriding the "ircs" protocol should work | Asserts runNo asserts ran |
Pass | registerProtocolHandler: overriding the "magnet" protocol should work | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: overriding the "magnet" protocol should work | Asserts runNo asserts ran |
Pass | registerProtocolHandler: overriding the "mailto" protocol should work | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: overriding the "mailto" protocol should work | Asserts runNo asserts ran |
Pass | registerProtocolHandler: overriding the "matrix" protocol should work | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: overriding the "matrix" protocol should work | Asserts runNo asserts ran |
Pass | registerProtocolHandler: overriding the "mms" protocol should work | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: overriding the "mms" protocol should work | Asserts runNo asserts ran |
Pass | registerProtocolHandler: overriding the "news" protocol should work | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: overriding the "news" protocol should work | Asserts runNo asserts ran |
Pass | registerProtocolHandler: overriding the "nntp" protocol should work | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: overriding the "nntp" protocol should work | Asserts runNo asserts ran |
Pass | registerProtocolHandler: overriding the "openpgp4fpr" protocol should work | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: overriding the "openpgp4fpr" protocol should work | Asserts runNo asserts ran |
Pass | registerProtocolHandler: overriding the "sftp" protocol should work | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: overriding the "sftp" protocol should work | Asserts runNo asserts ran |
Pass | registerProtocolHandler: overriding the "sip" protocol should work | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: overriding the "sip" protocol should work | Asserts runNo asserts ran |
Pass | registerProtocolHandler: overriding the "sms" protocol should work | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: overriding the "sms" protocol should work | Asserts runNo asserts ran |
Pass | registerProtocolHandler: overriding the "smsto" protocol should work | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: overriding the "smsto" protocol should work | Asserts runNo asserts ran |
Pass | registerProtocolHandler: overriding the "ssh" protocol should work | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: overriding the "ssh" protocol should work | Asserts runNo asserts ran |
Pass | registerProtocolHandler: overriding the "tel" protocol should work | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: overriding the "tel" protocol should work | Asserts runNo asserts ran |
Pass | registerProtocolHandler: overriding the "urn" protocol should work | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: overriding the "urn" protocol should work | Asserts runNo asserts ran |
Pass | registerProtocolHandler: overriding the "webcal" protocol should work | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: overriding the "webcal" protocol should work | Asserts runNo asserts ran |
Pass | registerProtocolHandler: overriding the "wtai" protocol should work | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: overriding the "wtai" protocol should work | Asserts runNo asserts ran |
Pass | registerProtocolHandler: overriding the "xmpp" protocol should work | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: overriding the "xmpp" protocol should work | Asserts runNo asserts ran |
Pass | registerProtocolHandler: overriding the "BitcoIn" protocol should work | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: overriding the "BitcoIn" protocol should work | Asserts runNo asserts ran |
Pass | registerProtocolHandler: overriding the "Irc" protocol should work | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: overriding the "Irc" protocol should work | Asserts runNo asserts ran |
Pass | registerProtocolHandler: overriding the "MagneT" protocol should work | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: overriding the "MagneT" protocol should work | Asserts runNo asserts ran |
Pass | registerProtocolHandler: overriding the "Matrix" protocol should work | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: overriding the "Matrix" protocol should work | Asserts runNo asserts ran |
Pass | registerProtocolHandler: overriding the "SmsTo" protocol should work | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: overriding the "SmsTo" protocol should work | Asserts runNo asserts ran |
Pass | registerProtocolHandler: overriding the "TEL" protocol should work | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: overriding the "TEL" protocol should work | Asserts runNo asserts ran |
Pass | registerProtocolHandler: overriding the "teL" protocol should work | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: overriding the "teL" protocol should work | Asserts runNo asserts ran |
Pass | registerProtocolHandler: overriding the "WebCAL" protocol should work | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: overriding the "WebCAL" protocol should work | Asserts runNo asserts ran |
Pass | registerProtocolHandler: overriding the "WTAI" protocol should work | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: overriding the "WTAI" protocol should work | Asserts runNo asserts ran |
Pass | registerProtocolHandler: overriding the "web+myprotocol" protocol should work | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: overriding the "web+myprotocol" protocol should work | Asserts runNo asserts ran |
Pass | registerProtocolHandler: overriding the "web+abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ" protocol should work | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: overriding the "web+abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ" protocol should work | Asserts runNo asserts ran |
Pass | registerProtocolHandler: overriding the "web+UpperCasedIsLowercased" protocol should work | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: overriding the "web+UpperCasedIsLowercased" protocol should work | Asserts runNo asserts ran |
Pass | registerProtocolHandler: overriding the "WEB+seeabove" protocol should work | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: overriding the "WEB+seeabove" protocol should work | Asserts runNo asserts ran |
Pass | registerProtocolHandler: overriding the "WeB+SeEaBoVe" protocol should work | Asserts runNo asserts ran |
Pass | unregisterProtocolHandler: overriding the "WeB+SeEaBoVe" protocol should work | Asserts runNo asserts ran |