Mypal68/toolkit/components/extensions/test/xpcshell/test_ext_incognito.js
2023-10-06 19:15:29 +03:00

193 lines
5.7 KiB
JavaScript

"use strict";
const { AddonManager } = ChromeUtils.import(
"resource://gre/modules/AddonManager.jsm"
);
AddonTestUtils.init(this);
AddonTestUtils.overrideCertDB();
AddonTestUtils.createAppInfo(
"xpcshell@tests.mozilla.org",
"XPCShell",
"1",
"42"
);
AddonTestUtils.usePrivilegedSignatures = false;
async function runIncognitoTest(
extensionData,
privateBrowsingAllowed,
allowPrivateBrowsingByDefault
) {
Services.prefs.setBoolPref(
"extensions.allowPrivateBrowsingByDefault",
allowPrivateBrowsingByDefault
);
let wrapper = ExtensionTestUtils.loadExtension(extensionData);
await wrapper.startup();
let { extension } = wrapper;
if (!allowPrivateBrowsingByDefault) {
// Check the permission if we're not allowPrivateBrowsingByDefault.
equal(
extension.permissions.has("internal:privateBrowsingAllowed"),
privateBrowsingAllowed,
"privateBrowsingAllowed in serialized extension"
);
}
equal(
extension.privateBrowsingAllowed,
privateBrowsingAllowed,
"privateBrowsingAllowed in extension"
);
equal(
extension.policy.privateBrowsingAllowed,
privateBrowsingAllowed,
"privateBrowsingAllowed on policy"
);
await wrapper.unload();
Services.prefs.clearUserPref("extensions.allowPrivateBrowsingByDefault");
}
add_task(async function test_extension_incognito_spanning() {
await runIncognitoTest({}, false, false);
await runIncognitoTest({}, true, true);
});
// Test that when we are restricted, we can override the restriction for tests.
add_task(async function test_extension_incognito_override_spanning() {
let extensionData = {
incognitoOverride: "spanning",
};
await runIncognitoTest(extensionData, true, false);
});
// This tests that a privileged extension will always have private browsing.
add_task(async function test_extension_incognito_privileged() {
let extensionData = {
isPrivileged: true,
};
await runIncognitoTest(extensionData, true, true);
await runIncognitoTest(extensionData, true, false);
});
// We only test spanning upgrades since that is the only allowed
// incognito type prior to feature being turned on.
add_task(async function test_extension_incognito_spanning_grandfathered() {
await AddonTestUtils.promiseStartupManager();
Services.prefs.setBoolPref("extensions.allowPrivateBrowsingByDefault", true);
Services.prefs.setBoolPref("extensions.incognito.migrated", false);
// This extension gets disabled before the "upgrade", it should not
// get grandfathered permissions.
const disabledAddonId = "disabled-ext@mozilla.com";
let disabledWrapper = ExtensionTestUtils.loadExtension({
manifest: {
applications: { gecko: { id: disabledAddonId } },
incognito: "spanning",
},
useAddonManager: "permanent",
});
await disabledWrapper.startup();
let disabledPolicy = WebExtensionPolicy.getByID(disabledAddonId);
// Verify policy settings.
equal(
disabledPolicy.permissions.includes("internal:privateBrowsingAllowed"),
false,
"privateBrowsingAllowed is not in permissions for disabled addon"
);
equal(
disabledPolicy.privateBrowsingAllowed,
true,
"privateBrowsingAllowed in disabled addon"
);
let disabledAddon = await AddonManager.getAddonByID(disabledAddonId);
await disabledAddon.disable();
// This extension gets grandfathered permissions for private browsing.
let addonId = "grandfathered@mozilla.com";
let wrapper = ExtensionTestUtils.loadExtension({
manifest: {
applications: { gecko: { id: addonId } },
incognito: "spanning",
},
useAddonManager: "permanent",
});
await wrapper.startup();
let policy = WebExtensionPolicy.getByID(addonId);
// Verify policy settings.
equal(
policy.permissions.includes("internal:privateBrowsingAllowed"),
false,
"privateBrowsingAllowed is not in permissions"
);
equal(
policy.privateBrowsingAllowed,
true,
"privateBrowsingAllowed in extension"
);
// Turn on incognito support and update the browser.
Services.prefs.setBoolPref("extensions.allowPrivateBrowsingByDefault", false);
// Disable the addonsManager telemetry event category, to ensure that it will
// be enabled automatically during the AddonManager/XPIProvider startup and
// the telemetry event recorded (See Bug 1540112 for a rationale).
Services.telemetry.setEventRecordingEnabled("addonsManager", false);
await AddonTestUtils.promiseRestartManager("2");
await wrapper.awaitStartup();
// Did it upgrade?
ok(
Services.prefs.getBoolPref("extensions.incognito.migrated", false),
"pref marked as migrated"
);
// Verify policy settings.
policy = WebExtensionPolicy.getByID(addonId);
ok(
policy.permissions.includes("internal:privateBrowsingAllowed"),
"privateBrowsingAllowed is in permissions"
);
equal(
policy.privateBrowsingAllowed,
true,
"privateBrowsingAllowed in extension"
);
// Verify the disabled addon did not get permissions.
disabledAddon = await AddonManager.getAddonByID(disabledAddonId);
await disabledAddon.enable();
disabledPolicy = WebExtensionPolicy.getByID(disabledAddonId);
// Verify policy settings.
equal(
disabledPolicy.permissions.includes("internal:privateBrowsingAllowed"),
false,
"privateBrowsingAllowed is not in permissions for disabled addon"
);
equal(
disabledPolicy.privateBrowsingAllowed,
false,
"privateBrowsingAllowed in disabled addon"
);
await wrapper.unload();
await disabledWrapper.unload();
Services.prefs.clearUserPref("extensions.allowPrivateBrowsingByDefault");
Services.prefs.clearUserPref("extensions.incognito.migrated");
const expectedEvents = [
{
method: "action",
object: "appUpgrade",
value: "on",
extra: { addonId, action: "privateBrowsingAllowed" },
},
];
});