548 lines
18 KiB
JavaScript
548 lines
18 KiB
JavaScript
"use strict";
|
|
/* exported createHttpServer, cleanupDir, clearCache, optionalPermissionsPromptHandler, promiseConsoleOutput,
|
|
promiseQuotaManagerServiceReset, promiseQuotaManagerServiceClear,
|
|
runWithPrefs, testEnv, withHandlingUserInput, resetHandlingUserInput,
|
|
assertPersistentListeners, promiseExtensionEvent, assertHasPersistedScriptsCachedFlag,
|
|
assertIsPersistedScriptsCachedFlag,
|
|
setup_crash_reporter_override_and_cleaner, crashFrame, crashExtensionBackground,
|
|
makeRkvDatabaseDir
|
|
*/
|
|
|
|
var { AppConstants } = ChromeUtils.importESModule(
|
|
"resource://gre/modules/AppConstants.sys.mjs"
|
|
);
|
|
var { XPCOMUtils } = ChromeUtils.importESModule(
|
|
"resource://gre/modules/XPCOMUtils.sys.mjs"
|
|
);
|
|
var {
|
|
clearInterval,
|
|
clearTimeout,
|
|
setInterval,
|
|
setIntervalWithTarget,
|
|
setTimeout,
|
|
setTimeoutWithTarget,
|
|
} = ChromeUtils.importESModule("resource://gre/modules/Timer.sys.mjs");
|
|
var { AddonTestUtils, MockAsyncShutdown } = ChromeUtils.importESModule(
|
|
"resource://testing-common/AddonTestUtils.sys.mjs"
|
|
);
|
|
|
|
ChromeUtils.defineESModuleGetters(this, {
|
|
ContentTask: "resource://testing-common/ContentTask.sys.mjs",
|
|
Extension: "resource://gre/modules/Extension.sys.mjs",
|
|
ExtensionData: "resource://gre/modules/Extension.sys.mjs",
|
|
ExtensionParent: "resource://gre/modules/ExtensionParent.sys.mjs",
|
|
ExtensionTestUtils:
|
|
"resource://testing-common/ExtensionXPCShellUtils.sys.mjs",
|
|
FileUtils: "resource://gre/modules/FileUtils.sys.mjs",
|
|
Management: "resource://gre/modules/Extension.sys.mjs",
|
|
MessageChannel: "resource://testing-common/MessageChannel.sys.mjs",
|
|
MockRegistrar: "resource://testing-common/MockRegistrar.sys.mjs",
|
|
NetUtil: "resource://gre/modules/NetUtil.sys.mjs",
|
|
PromiseTestUtils: "resource://testing-common/PromiseTestUtils.sys.mjs",
|
|
Schemas: "resource://gre/modules/Schemas.sys.mjs",
|
|
TestUtils: "resource://testing-common/TestUtils.sys.mjs",
|
|
});
|
|
|
|
PromiseTestUtils.allowMatchingRejectionsGlobally(
|
|
/Message manager disconnected/
|
|
);
|
|
|
|
// Persistent Listener test functionality
|
|
const { assertPersistentListeners } = ExtensionTestUtils.testAssertions;
|
|
|
|
// https_first automatically upgrades http to https, but the tests are not
|
|
// designed to expect that. And it is not easy to change that because
|
|
// nsHttpServer does not support https (bug 1742061). So disable https_first.
|
|
Services.prefs.setBoolPref("dom.security.https_first", false);
|
|
|
|
// These values may be changed in later head files and tested in check_remote
|
|
// below.
|
|
Services.prefs.setBoolPref("extensions.webextensions.remote", false);
|
|
const testEnv = {
|
|
expectRemote: false,
|
|
};
|
|
|
|
add_setup(function check_remote() {
|
|
Assert.equal(
|
|
WebExtensionPolicy.useRemoteWebExtensions,
|
|
testEnv.expectRemote,
|
|
"useRemoteWebExtensions matches"
|
|
);
|
|
Assert.equal(
|
|
WebExtensionPolicy.isExtensionProcess,
|
|
!testEnv.expectRemote,
|
|
"testing from extension process"
|
|
);
|
|
});
|
|
|
|
ExtensionTestUtils.init(this);
|
|
|
|
var createHttpServer = (...args) => {
|
|
AddonTestUtils.maybeInit(this);
|
|
return AddonTestUtils.createHttpServer(...args);
|
|
};
|
|
|
|
async function makeRkvDatabaseDir(name, { mockCorrupted = false } = {}) {
|
|
const databaseDir = PathUtils.join(PathUtils.profileDir, name);
|
|
await IOUtils.makeDirectory(databaseDir);
|
|
if (mockCorrupted) {
|
|
// Mock a corrupted db.
|
|
await IOUtils.write(
|
|
PathUtils.join(databaseDir, "data.safe.bin"),
|
|
new Uint8Array([0x00, 0x00, 0x00, 0x00])
|
|
);
|
|
}
|
|
return databaseDir;
|
|
}
|
|
|
|
// Some tests load non-moz-extension:-URLs in their extension document. When
|
|
// extensions run in-process (extensions.webextensions.remote set to false),
|
|
// that fails.
|
|
// For details, see: https://bugzilla.mozilla.org/show_bug.cgi?id=1724099
|
|
// To avoid skip-if on the whole file, use this:
|
|
//
|
|
// add_task(async function test_description_here() {
|
|
// // Comment explaining why.
|
|
// allow_unsafe_parent_loads_when_extensions_not_remote();
|
|
// ...
|
|
// revert_allow_unsafe_parent_loads_when_extensions_not_remote();
|
|
// });
|
|
var private_upl_cleanup_handlers = [];
|
|
function allow_unsafe_parent_loads_when_extensions_not_remote() {
|
|
if (WebExtensionPolicy.useRemoteWebExtensions) {
|
|
// We should only allow remote iframes in the main process.
|
|
return;
|
|
}
|
|
if (!Cu.isInAutomation) {
|
|
// isInAutomation is false by default in xpcshell (bug 1598804). Flip pref.
|
|
Services.prefs.setBoolPref(
|
|
"security.turn_off_all_security_so_that_viruses_can_take_over_this_computer",
|
|
true
|
|
);
|
|
private_upl_cleanup_handlers.push(() => {
|
|
Services.prefs.setBoolPref(
|
|
"security.turn_off_all_security_so_that_viruses_can_take_over_this_computer",
|
|
false
|
|
);
|
|
});
|
|
// Sanity check: Fail immediately if setting the above pref does somehow
|
|
// not flip the isInAutomation flag.
|
|
if (!Cu.isInAutomation) {
|
|
// This condition is unexpected, because it is enforced at:
|
|
// https://searchfox.org/mozilla-central/rev/ea65de7c/js/xpconnect/src/xpcpublic.h#753-759
|
|
throw new Error("Failed to set isInAutomation to true");
|
|
}
|
|
}
|
|
// Note: The following pref requires the isInAutomation flag to be set.
|
|
// When unset, the pref is ignored, and tests would encounter bug 1724099.
|
|
if (!Services.prefs.getBoolPref("security.allow_unsafe_parent_loads")) {
|
|
info("Setting pref security.allow_unsafe_parent_loads to true");
|
|
Services.prefs.setBoolPref("security.allow_unsafe_parent_loads", true);
|
|
private_upl_cleanup_handlers.push(() => {
|
|
info("Reverting pref security.allow_unsafe_parent_loads to false");
|
|
Services.prefs.setBoolPref("security.allow_unsafe_parent_loads", false);
|
|
});
|
|
}
|
|
|
|
registerCleanupFunction(
|
|
// eslint-disable-next-line no-use-before-define
|
|
revert_allow_unsafe_parent_loads_when_extensions_not_remote
|
|
);
|
|
}
|
|
|
|
function revert_allow_unsafe_parent_loads_when_extensions_not_remote() {
|
|
for (let revert of private_upl_cleanup_handlers.splice(0)) {
|
|
revert();
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Clears the HTTP and content image caches.
|
|
*/
|
|
function clearCache() {
|
|
Services.cache2.clear();
|
|
|
|
let imageCache = Cc["@mozilla.org/image/tools;1"]
|
|
.getService(Ci.imgITools)
|
|
.getImgCacheForDocument(null);
|
|
imageCache.clearCache(false);
|
|
}
|
|
|
|
var promiseConsoleOutput = async function (task) {
|
|
const DONE = `=== console listener ${Math.random()} done ===`;
|
|
|
|
let listener;
|
|
let messages = [];
|
|
let awaitListener = new Promise(resolve => {
|
|
listener = msg => {
|
|
if (msg == DONE) {
|
|
resolve();
|
|
} else {
|
|
void (msg instanceof Ci.nsIConsoleMessage);
|
|
void (msg instanceof Ci.nsIScriptError);
|
|
messages.push(msg);
|
|
}
|
|
};
|
|
});
|
|
|
|
Services.console.registerListener(listener);
|
|
try {
|
|
let result = await task();
|
|
|
|
Services.console.logStringMessage(DONE);
|
|
await awaitListener;
|
|
|
|
return { messages, result };
|
|
} finally {
|
|
Services.console.unregisterListener(listener);
|
|
}
|
|
};
|
|
|
|
// Attempt to remove a directory. If the Windows OS is still using the
|
|
// file sometimes remove() will fail. So try repeatedly until we can
|
|
// remove it or we give up.
|
|
function cleanupDir(dir) {
|
|
let count = 0;
|
|
return new Promise((resolve, reject) => {
|
|
function tryToRemoveDir() {
|
|
count += 1;
|
|
try {
|
|
dir.remove(true);
|
|
} catch (e) {
|
|
// ignore
|
|
}
|
|
if (!dir.exists()) {
|
|
return resolve();
|
|
}
|
|
if (count >= 25) {
|
|
return reject(`Failed to cleanup directory: ${dir}`);
|
|
}
|
|
setTimeout(tryToRemoveDir, 100);
|
|
}
|
|
tryToRemoveDir();
|
|
});
|
|
}
|
|
|
|
// Run a test with the specified preferences and then restores their initial values
|
|
// right after the test function run (whether it passes or fails).
|
|
async function runWithPrefs(prefsToSet, testFn) {
|
|
const setPrefs = prefs => {
|
|
for (let [pref, value] of prefs) {
|
|
if (value === undefined) {
|
|
// Clear any pref that didn't have a user value.
|
|
info(`Clearing pref "${pref}"`);
|
|
Services.prefs.clearUserPref(pref);
|
|
continue;
|
|
}
|
|
|
|
info(`Setting pref "${pref}": ${value}`);
|
|
switch (typeof value) {
|
|
case "boolean":
|
|
Services.prefs.setBoolPref(pref, value);
|
|
break;
|
|
case "number":
|
|
Services.prefs.setIntPref(pref, value);
|
|
break;
|
|
case "string":
|
|
Services.prefs.setStringPref(pref, value);
|
|
break;
|
|
default:
|
|
throw new Error("runWithPrefs doesn't support this pref type yet");
|
|
}
|
|
}
|
|
};
|
|
|
|
const getPrefs = prefs => {
|
|
return prefs.map(([pref, value]) => {
|
|
info(`Getting initial pref value for "${pref}"`);
|
|
if (!Services.prefs.prefHasUserValue(pref)) {
|
|
// Check if the pref doesn't have a user value.
|
|
return [pref, undefined];
|
|
}
|
|
switch (typeof value) {
|
|
case "boolean":
|
|
return [pref, Services.prefs.getBoolPref(pref)];
|
|
case "number":
|
|
return [pref, Services.prefs.getIntPref(pref)];
|
|
case "string":
|
|
return [pref, Services.prefs.getStringPref(pref)];
|
|
default:
|
|
throw new Error("runWithPrefs doesn't support this pref type yet");
|
|
}
|
|
});
|
|
};
|
|
|
|
let initialPrefsValues = [];
|
|
|
|
try {
|
|
initialPrefsValues = getPrefs(prefsToSet);
|
|
|
|
setPrefs(prefsToSet);
|
|
|
|
await testFn();
|
|
} finally {
|
|
info("Restoring initial preferences values on exit");
|
|
setPrefs(initialPrefsValues);
|
|
}
|
|
}
|
|
|
|
// "Handling User Input" test helpers.
|
|
|
|
let extensionHandlers = new WeakSet();
|
|
|
|
function handlingUserInputFrameScript() {
|
|
/* globals content */
|
|
// eslint-disable-next-line no-shadow
|
|
const { MessageChannel } = ChromeUtils.importESModule(
|
|
"resource://testing-common/MessageChannel.sys.mjs"
|
|
);
|
|
|
|
let handle;
|
|
MessageChannel.addListener(this, "ExtensionTest:HandleUserInput", {
|
|
receiveMessage({ data }) {
|
|
if (data) {
|
|
handle = content.windowUtils.setHandlingUserInput(true);
|
|
} else if (handle) {
|
|
handle.destruct();
|
|
handle = null;
|
|
}
|
|
},
|
|
});
|
|
}
|
|
|
|
// If you use withHandlingUserInput then restart the addon manager,
|
|
// you need to reset this before using withHandlingUserInput again.
|
|
function resetHandlingUserInput() {
|
|
extensionHandlers = new WeakSet();
|
|
}
|
|
|
|
async function withHandlingUserInput(extension, fn) {
|
|
let { messageManager } = extension.extension.groupFrameLoader;
|
|
|
|
if (!extensionHandlers.has(extension)) {
|
|
messageManager.loadFrameScript(
|
|
`data:,(${encodeURI(handlingUserInputFrameScript)}).call(this)`,
|
|
false,
|
|
true
|
|
);
|
|
extensionHandlers.add(extension);
|
|
}
|
|
|
|
await MessageChannel.sendMessage(
|
|
messageManager,
|
|
"ExtensionTest:HandleUserInput",
|
|
true
|
|
);
|
|
await fn();
|
|
await MessageChannel.sendMessage(
|
|
messageManager,
|
|
"ExtensionTest:HandleUserInput",
|
|
false
|
|
);
|
|
}
|
|
|
|
// QuotaManagerService test helpers.
|
|
|
|
function promiseQuotaManagerServiceReset() {
|
|
info("Calling QuotaManagerService.reset to enforce new test storage limits");
|
|
return new Promise(resolve => {
|
|
Services.qms.reset().callback = resolve;
|
|
});
|
|
}
|
|
|
|
function promiseQuotaManagerServiceClear() {
|
|
info(
|
|
"Calling QuotaManagerService.clear to empty the test data and refresh test storage limits"
|
|
);
|
|
return new Promise(resolve => {
|
|
Services.qms.clear().callback = resolve;
|
|
});
|
|
}
|
|
|
|
// Optional Permission prompt handling
|
|
const optionalPermissionsPromptHandler = {
|
|
sawPrompt: false,
|
|
acceptPrompt: false,
|
|
|
|
init() {
|
|
Services.prefs.setBoolPref(
|
|
"extensions.webextOptionalPermissionPrompts",
|
|
true
|
|
);
|
|
Services.obs.addObserver(this, "webextension-optional-permission-prompt");
|
|
registerCleanupFunction(() => {
|
|
Services.obs.removeObserver(
|
|
this,
|
|
"webextension-optional-permission-prompt"
|
|
);
|
|
Services.prefs.clearUserPref(
|
|
"extensions.webextOptionalPermissionPrompts"
|
|
);
|
|
});
|
|
},
|
|
|
|
observe(subject, topic) {
|
|
if (topic == "webextension-optional-permission-prompt") {
|
|
this.sawPrompt = true;
|
|
let { resolve } = subject.wrappedJSObject;
|
|
resolve(this.acceptPrompt);
|
|
}
|
|
},
|
|
};
|
|
|
|
function promiseExtensionEvent(wrapper, event) {
|
|
return new Promise(resolve => {
|
|
wrapper.extension.once(event, (...args) => resolve(args));
|
|
});
|
|
}
|
|
|
|
async function assertHasPersistedScriptsCachedFlag(ext) {
|
|
Assert.notEqual(ext.id, null, "Expect a non-null extension id");
|
|
Assert.notEqual(ext.version, null, "Expect a non-null extension version");
|
|
const { StartupCache } = ExtensionParent;
|
|
const allCachedGeneral = StartupCache._data.get("general");
|
|
equal(
|
|
allCachedGeneral
|
|
.get(ext.id)
|
|
?.get(ext.version)
|
|
?.get("scripting")
|
|
?.has("hasPersistedScripts"),
|
|
true,
|
|
"Expect the StartupCache to include hasPersistedScripts flag"
|
|
);
|
|
}
|
|
|
|
async function assertIsPersistentScriptsCachedFlag(ext, expectedValue) {
|
|
Assert.notEqual(ext.id, null, "Expect a non-null extension id");
|
|
Assert.notEqual(ext.version, null, "Expect a non-null extension version");
|
|
const { StartupCache } = ExtensionParent;
|
|
const allCachedGeneral = StartupCache._data.get("general");
|
|
equal(
|
|
allCachedGeneral
|
|
.get(ext.id)
|
|
?.get(ext.version)
|
|
?.get("scripting")
|
|
?.get("hasPersistedScripts"),
|
|
expectedValue,
|
|
"Expected cached value set on hasPersistedScripts flag"
|
|
);
|
|
}
|
|
|
|
function setup_crash_reporter_override_and_cleaner() {
|
|
const crashIds = [];
|
|
// Override CrashService.sys.mjs to intercept crash dumps, for two reasons:
|
|
//
|
|
// - The standard CrashService.sys.mjs implementation uses nsICrashReporter
|
|
// through Services.appinfo. Because appinfo has been overridden with an
|
|
// incomplete implementation, a promise rejection is triggered when a
|
|
// missing method is called at https://searchfox.org/mozilla-central/rev/c615dc4db129ece5cce6c96eb8cab8c5a3e26ac3/toolkit/components/crashes/CrashService.sys.mjs#183
|
|
//
|
|
// - We want to intercept the generated crash dumps for expected crashes and
|
|
// remove them, to prevent the xpcshell test runner from misinterpreting
|
|
// them as "CRASH" failures.
|
|
let mockClassId = MockRegistrar.register("@mozilla.org/crashservice;1", {
|
|
addCrash(processType, crashType, id) {
|
|
// The files are ready to be removed now. We however postpone cleanup
|
|
// until the end of the test, to minimize noise during the test, and to
|
|
// ensure that the cleanup completes fully.
|
|
crashIds.push(id);
|
|
},
|
|
QueryInterface: ChromeUtils.generateQI(["nsICrashService"]),
|
|
});
|
|
registerCleanupFunction(async () => {
|
|
MockRegistrar.unregister(mockClassId);
|
|
|
|
// Cannot use Services.appinfo because createAppInfo overrides it.
|
|
// eslint-disable-next-line mozilla/use-services
|
|
const appinfo = Cc["@mozilla.org/toolkit/crash-reporter;1"].getService(
|
|
Ci.nsICrashReporter
|
|
);
|
|
|
|
info(`Observed ${crashIds.length} crash dump(s).`);
|
|
let deletedCount = 0;
|
|
for (let id of crashIds) {
|
|
info(`Checking whether dumpID ${id} should be removed`);
|
|
let minidumpFile = appinfo.getMinidumpForID(id);
|
|
let extraFile = appinfo.getExtraFileForID(id);
|
|
let extra;
|
|
try {
|
|
extra = await IOUtils.readJSON(extraFile.path);
|
|
} catch (e) {
|
|
info(`Cannot parse crash metadata from ${extraFile.path} :: ${e}\n`);
|
|
continue;
|
|
}
|
|
// The "BrowserTestUtils:CrashFrame" handler annotates the crash
|
|
// report before triggering a crash.
|
|
if (extra.TestKey !== "CrashFrame") {
|
|
info(`Keeping ${minidumpFile.path}; we did not trigger the crash`);
|
|
continue;
|
|
}
|
|
info(`Deleting minidump ${minidumpFile.path} and ${extraFile.path}`);
|
|
minidumpFile.remove(false);
|
|
extraFile.remove(false);
|
|
++deletedCount;
|
|
}
|
|
info(`Removed ${deletedCount} crash dumps out of ${crashIds.length}`);
|
|
});
|
|
}
|
|
|
|
// Crashes a <browser>'s remote process.
|
|
// Based on BrowserTestUtils.crashFrame.
|
|
function crashFrame(browser) {
|
|
if (!browser.isRemoteBrowser) {
|
|
// The browser should be remote, or the test runner would be killed.
|
|
throw new Error("<browser> must be remote");
|
|
}
|
|
|
|
const { BrowserTestUtils } = ChromeUtils.importESModule(
|
|
"resource://testing-common/BrowserTestUtils.sys.mjs"
|
|
);
|
|
|
|
// Trigger crash by sending a message to BrowserTestUtils actor.
|
|
BrowserTestUtils.sendAsyncMessage(
|
|
browser.browsingContext,
|
|
"BrowserTestUtils:CrashFrame",
|
|
{}
|
|
);
|
|
}
|
|
|
|
/**
|
|
* Crash background page of browser and wait for the crash to have been
|
|
* detected and processed by ext-backgroundPage.js.
|
|
*
|
|
* @param {ExtensionWrapper} extension
|
|
* @param {XULElement} [bgBrowser] - The background browser. Optional, but must
|
|
* be set if the background's ProxyContextParent has not been initialized yet.
|
|
*/
|
|
async function crashExtensionBackground(extension, bgBrowser) {
|
|
bgBrowser ??= extension.extension.backgroundContext.xulBrowser;
|
|
|
|
let byeProm = promiseExtensionEvent(extension, "shutdown-background-script");
|
|
if (WebExtensionPolicy.useRemoteWebExtensions) {
|
|
info("Killing background page through process crash.");
|
|
crashFrame(bgBrowser);
|
|
} else {
|
|
// If extensions are not running in out-of-process mode, then the
|
|
// non-remote process should not be killed (or the test runner dies).
|
|
// Remove <browser> instead, to simulate the immediate disconnection
|
|
// of the message manager (that would happen if the process crashed).
|
|
info("Closing background page by destroying <browser>.");
|
|
|
|
if (extension.extension.backgroundState === "running") {
|
|
// TODO bug 1844217: remove this whole if-block When close() is hooked up
|
|
// to setBgStateStopped. It currently is not, and browser destruction is
|
|
// currently not detected by the implementation.
|
|
let messageManager = bgBrowser.messageManager;
|
|
TestUtils.topicObserved(
|
|
"message-manager-close",
|
|
subject => subject === messageManager
|
|
).then(() => {
|
|
Management.emit("extension-process-crash", { childID: 1337 });
|
|
});
|
|
}
|
|
bgBrowser.remove();
|
|
}
|
|
|
|
info("Waiting for crash to be detected by the internals");
|
|
await byeProm;
|
|
}
|