mirror of
https://github.com/Feodor2/Mypal68.git
synced 2025-06-18 23:05:40 -04:00
193 lines
5.7 KiB
JavaScript
193 lines
5.7 KiB
JavaScript
"use strict";
|
|
|
|
const { AddonManager } = ChromeUtils.import(
|
|
"resource://gre/modules/AddonManager.jsm"
|
|
);
|
|
|
|
AddonTestUtils.init(this);
|
|
AddonTestUtils.overrideCertDB();
|
|
AddonTestUtils.createAppInfo(
|
|
"xpcshell@tests.mozilla.org",
|
|
"XPCShell",
|
|
"1",
|
|
"42"
|
|
);
|
|
AddonTestUtils.usePrivilegedSignatures = false;
|
|
|
|
async function runIncognitoTest(
|
|
extensionData,
|
|
privateBrowsingAllowed,
|
|
allowPrivateBrowsingByDefault
|
|
) {
|
|
Services.prefs.setBoolPref(
|
|
"extensions.allowPrivateBrowsingByDefault",
|
|
allowPrivateBrowsingByDefault
|
|
);
|
|
|
|
let wrapper = ExtensionTestUtils.loadExtension(extensionData);
|
|
await wrapper.startup();
|
|
let { extension } = wrapper;
|
|
|
|
if (!allowPrivateBrowsingByDefault) {
|
|
// Check the permission if we're not allowPrivateBrowsingByDefault.
|
|
equal(
|
|
extension.permissions.has("internal:privateBrowsingAllowed"),
|
|
privateBrowsingAllowed,
|
|
"privateBrowsingAllowed in serialized extension"
|
|
);
|
|
}
|
|
equal(
|
|
extension.privateBrowsingAllowed,
|
|
privateBrowsingAllowed,
|
|
"privateBrowsingAllowed in extension"
|
|
);
|
|
equal(
|
|
extension.policy.privateBrowsingAllowed,
|
|
privateBrowsingAllowed,
|
|
"privateBrowsingAllowed on policy"
|
|
);
|
|
|
|
await wrapper.unload();
|
|
Services.prefs.clearUserPref("extensions.allowPrivateBrowsingByDefault");
|
|
}
|
|
|
|
add_task(async function test_extension_incognito_spanning() {
|
|
await runIncognitoTest({}, false, false);
|
|
await runIncognitoTest({}, true, true);
|
|
});
|
|
|
|
// Test that when we are restricted, we can override the restriction for tests.
|
|
add_task(async function test_extension_incognito_override_spanning() {
|
|
let extensionData = {
|
|
incognitoOverride: "spanning",
|
|
};
|
|
await runIncognitoTest(extensionData, true, false);
|
|
});
|
|
|
|
// This tests that a privileged extension will always have private browsing.
|
|
add_task(async function test_extension_incognito_privileged() {
|
|
let extensionData = {
|
|
isPrivileged: true,
|
|
};
|
|
await runIncognitoTest(extensionData, true, true);
|
|
await runIncognitoTest(extensionData, true, false);
|
|
});
|
|
|
|
// We only test spanning upgrades since that is the only allowed
|
|
// incognito type prior to feature being turned on.
|
|
add_task(async function test_extension_incognito_spanning_grandfathered() {
|
|
await AddonTestUtils.promiseStartupManager();
|
|
Services.prefs.setBoolPref("extensions.allowPrivateBrowsingByDefault", true);
|
|
Services.prefs.setBoolPref("extensions.incognito.migrated", false);
|
|
|
|
// This extension gets disabled before the "upgrade", it should not
|
|
// get grandfathered permissions.
|
|
const disabledAddonId = "disabled-ext@mozilla.com";
|
|
let disabledWrapper = ExtensionTestUtils.loadExtension({
|
|
manifest: {
|
|
applications: { gecko: { id: disabledAddonId } },
|
|
incognito: "spanning",
|
|
},
|
|
useAddonManager: "permanent",
|
|
});
|
|
await disabledWrapper.startup();
|
|
let disabledPolicy = WebExtensionPolicy.getByID(disabledAddonId);
|
|
|
|
// Verify policy settings.
|
|
equal(
|
|
disabledPolicy.permissions.includes("internal:privateBrowsingAllowed"),
|
|
false,
|
|
"privateBrowsingAllowed is not in permissions for disabled addon"
|
|
);
|
|
equal(
|
|
disabledPolicy.privateBrowsingAllowed,
|
|
true,
|
|
"privateBrowsingAllowed in disabled addon"
|
|
);
|
|
|
|
let disabledAddon = await AddonManager.getAddonByID(disabledAddonId);
|
|
await disabledAddon.disable();
|
|
|
|
// This extension gets grandfathered permissions for private browsing.
|
|
let addonId = "grandfathered@mozilla.com";
|
|
let wrapper = ExtensionTestUtils.loadExtension({
|
|
manifest: {
|
|
applications: { gecko: { id: addonId } },
|
|
incognito: "spanning",
|
|
},
|
|
useAddonManager: "permanent",
|
|
});
|
|
await wrapper.startup();
|
|
let policy = WebExtensionPolicy.getByID(addonId);
|
|
|
|
// Verify policy settings.
|
|
equal(
|
|
policy.permissions.includes("internal:privateBrowsingAllowed"),
|
|
false,
|
|
"privateBrowsingAllowed is not in permissions"
|
|
);
|
|
equal(
|
|
policy.privateBrowsingAllowed,
|
|
true,
|
|
"privateBrowsingAllowed in extension"
|
|
);
|
|
|
|
// Turn on incognito support and update the browser.
|
|
Services.prefs.setBoolPref("extensions.allowPrivateBrowsingByDefault", false);
|
|
// Disable the addonsManager telemetry event category, to ensure that it will
|
|
// be enabled automatically during the AddonManager/XPIProvider startup and
|
|
// the telemetry event recorded (See Bug 1540112 for a rationale).
|
|
Services.telemetry.setEventRecordingEnabled("addonsManager", false);
|
|
await AddonTestUtils.promiseRestartManager("2");
|
|
await wrapper.awaitStartup();
|
|
|
|
// Did it upgrade?
|
|
ok(
|
|
Services.prefs.getBoolPref("extensions.incognito.migrated", false),
|
|
"pref marked as migrated"
|
|
);
|
|
|
|
// Verify policy settings.
|
|
policy = WebExtensionPolicy.getByID(addonId);
|
|
ok(
|
|
policy.permissions.includes("internal:privateBrowsingAllowed"),
|
|
"privateBrowsingAllowed is in permissions"
|
|
);
|
|
equal(
|
|
policy.privateBrowsingAllowed,
|
|
true,
|
|
"privateBrowsingAllowed in extension"
|
|
);
|
|
|
|
// Verify the disabled addon did not get permissions.
|
|
disabledAddon = await AddonManager.getAddonByID(disabledAddonId);
|
|
await disabledAddon.enable();
|
|
disabledPolicy = WebExtensionPolicy.getByID(disabledAddonId);
|
|
|
|
// Verify policy settings.
|
|
equal(
|
|
disabledPolicy.permissions.includes("internal:privateBrowsingAllowed"),
|
|
false,
|
|
"privateBrowsingAllowed is not in permissions for disabled addon"
|
|
);
|
|
equal(
|
|
disabledPolicy.privateBrowsingAllowed,
|
|
false,
|
|
"privateBrowsingAllowed in disabled addon"
|
|
);
|
|
|
|
await wrapper.unload();
|
|
await disabledWrapper.unload();
|
|
Services.prefs.clearUserPref("extensions.allowPrivateBrowsingByDefault");
|
|
Services.prefs.clearUserPref("extensions.incognito.migrated");
|
|
|
|
const expectedEvents = [
|
|
{
|
|
method: "action",
|
|
object: "appUpgrade",
|
|
value: "on",
|
|
extra: { addonId, action: "privateBrowsingAllowed" },
|
|
},
|
|
];
|
|
});
|