summaryrefslogtreecommitdiffstats
path: root/toolkit/mozapps/extensions/test/xpcshell
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-28 14:29:10 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-28 14:29:10 +0000
commit2aa4a82499d4becd2284cdb482213d541b8804dd (patch)
treeb80bf8bf13c3766139fbacc530efd0dd9d54394c /toolkit/mozapps/extensions/test/xpcshell
parentInitial commit. (diff)
downloadfirefox-upstream.tar.xz
firefox-upstream.zip
Adding upstream version 86.0.1.upstream/86.0.1upstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'toolkit/mozapps/extensions/test/xpcshell')
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/.eslintrc.js24
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/blocklistchange/addon_change.xml31
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/blocklistchange/addon_update1.json102
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/blocklistchange/addon_update2.json102
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/blocklistchange/addon_update3.json102
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/blocklistchange/app_update.xml62
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/blocklistchange/blocklist_update1.xml3
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/blocklistchange/blocklist_update2.xml26
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/blocklistchange/manual_update.xml27
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/bug455906_block.xml18
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/bug455906_empty.xml7
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/bug455906_start.xml30
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/bug455906_warn.xml33
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/corrupt.xpi1
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/corruptfile.xpibin0 -> 633 bytes
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/empty.xpibin0 -> 197 bytes
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/mlbf-blocked1-unblocked2.binbin0 -> 32 bytes
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/pluginInfoURL_block.xml45
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/productaddons/bad.txt1
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/productaddons/bad.xml3
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/productaddons/bad2.xml3
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/productaddons/empty.xml5
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/productaddons/good.xml11
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/productaddons/missing.xml3
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/productaddons/unsigned.xpibin0 -> 452 bytes
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/signing_checks/langpack_signed.xpibin0 -> 4452 bytes
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/signing_checks/langpack_unsigned.xpibin0 -> 413 bytes
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/signing_checks/long.xpibin0 -> 4761 bytes
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/signing_checks/privileged.xpibin0 -> 4659 bytes
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/signing_checks/signed1.xpibin0 -> 4702 bytes
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/signing_checks/signed2.xpibin0 -> 4697 bytes
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/signing_checks/unsigned.xpibin0 -> 528 bytes
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/test_AddonRepository_cache.json134
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/test_AddonRepository_empty.json7
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/test_AddonRepository_fail.json1
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/test_AddonRepository_getAddonsByIDs.json117
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/test_backgroundupdate.json46
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/test_blocklist_metadata_filters_1.xml21
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/test_blocklist_prefs_1.xml28
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/test_bug393285.xml30
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/test_bug449027_app-extensions.json336
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/test_bug449027_app-plugins.json336
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/test_bug449027_app.xml333
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/test_bug449027_toolkit-extensions.json154
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/test_bug449027_toolkit-plugins.json155
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/test_bug449027_toolkit.xml208
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/test_bug468528.xml15
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/test_bug514327_1.xml17
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/test_bug514327_2.xml10
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/test_bug514327_3_empty.xml4
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/test_bug514327_3_outdated_1.xml13
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/test_bug514327_3_outdated_2.xml13
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/test_bug655254.json17
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/test_corrupt.json30
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/test_delay_updates_complete.json11
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/test_delay_updates_complete_legacy.json18
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/test_delay_updates_defer.json11
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/test_delay_updates_defer_legacy.json18
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/test_delay_updates_ignore.json11
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/test_delay_updates_ignore_legacy.json18
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/test_gfxBlacklist.json352
-rwxr-xr-xtoolkit/mozapps/extensions/test/xpcshell/data/test_gfxBlacklist_AllOS.json837
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/test_gfxBlacklist_OSVersion.json28
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/test_install_addons.json31
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/test_install_compat.json27
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/test_no_update.json7
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/test_overrideblocklist/ancient.xml8
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/test_overrideblocklist/new.xml8
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/test_overrideblocklist/old.xml8
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/test_pluginBlocklistCtp.xml26
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/test_pluginBlocklistCtpUndo.xml10
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/test_softblocked1.xml9
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/test_update.json137
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/test_update_addons.json14
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/test_update_compat.json28
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/test_updatecheck.json269
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/unsigned.xpibin0 -> 463 bytes
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/data/webext-implicit-id.xpibin0 -> 4182 bytes
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/head_addons.js1350
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/head_compat.js49
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/head_sideload.js81
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/head_system_addons.js469
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/head_unpack.js3
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/head.js51
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_addonBlockURL.js56
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_appversion.js293
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_clients.js233
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_gfx.js113
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_metadata_filters.js116
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_mlbf.js219
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_mlbf_dump.js97
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_mlbf_fetch.js207
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_mlbf_stashes.js252
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_mlbf_telemetry.js184
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_mlbf_update.js75
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_osabi.js286
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_prefs.js106
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_regexp_split.js229
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_severities.js504
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_targetapp_filter.js395
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_telemetry.js124
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklistchange.js1317
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklistchange_v2.js21
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_Device.js74
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_DriverNew.js68
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_Equal_DriverNew.js106
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_Equal_DriverOld.js69
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_Equal_OK.js69
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_GTE_DriverOld.js69
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_GTE_OK.js69
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_No_Comparison.js70
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_OK.js70
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_OS.js68
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_OSVersion_match.js71
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_OSVersion_mismatch_DriverVersion.js71
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_OSVersion_mismatch_OSVersion.js72
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_Vendor.js69
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_Version.js165
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_prefs.js125
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_softblocked.js61
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/xpcshell.ini66
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_AbuseReporter.js903
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_AddonRepository.js316
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_AddonRepository_cache.js711
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_AddonRepository_langpacks.js135
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_AddonRepository_paging.js91
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_ProductAddonChecker.js292
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_XPIStates.js132
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_XPIcancel.js70
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_addonStartup.js97
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_addon_manager_telemetry_events.js788
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_amo_stats_telemetry.js102
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_aom_startup.js187
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_bad_json.js39
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_badschema.js237
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_bug587088.js195
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_builtin_location.js153
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_cacheflush.js86
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_childprocess.js20
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_cookies.js102
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_corrupt.js210
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_crash_annotation_quoting.js25
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_db_path.js69
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_delay_update_webextension.js392
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_dependencies.js140
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_dictionary_webextension.js198
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_distribution.js115
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_duplicateplugins.js160
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_embedderDisabled.js128
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_error.js78
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_ext_management.js213
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_filepointer.js327
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_general.js59
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_getInstallSourceFromHost.js42
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_gmpProvider.js507
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_harness.js13
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_hidden.js58
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_install.js1050
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_install_cancel.js92
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_install_icons.js62
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_isDebuggable.js21
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_isReady.js71
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_locale.js103
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_moved_extension_metadata.js173
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_no_addons.js81
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_nodisable_hidden.js99
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_onPropertyChanged_appDisabled.js55
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_permissions.js199
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_permissions_prefs.js103
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_pluginchange.js242
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_pref_properties.js221
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_provider_markSafe.js43
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_provider_shutdown.js100
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_provider_unsafe_access_shutdown.js65
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_provider_unsafe_access_startup.js59
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_proxies.js225
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_recommendations.js336
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_registerchrome.js88
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_registry.js166
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_reinstall_disabled_addon.js213
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_reload.js188
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_safemode.js90
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_schema_change.js160
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_seen.js283
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_shutdown.js133
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_shutdown_barriers.js71
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_shutdown_early.js61
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_sideload_scopes.js180
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_sideloads.js117
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_sideloads_after_rebuild.js137
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_signed_inject.js429
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_signed_install.js280
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_signed_langpack.js60
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_signed_long.js23
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_signed_updatepref.js131
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_signed_verify.js110
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_startup.js648
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_startup_enable.js47
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_startup_scan.js125
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_strictcompatibility.js152
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_syncGUID.js117
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_system_allowed.js54
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_system_delay_update.js485
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_system_profile_location.js208
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_system_repository.js68
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_system_reset.js535
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_system_update_blank.js117
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_system_update_checkSizeHash.js181
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_system_update_custom.js431
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_system_update_empty.js141
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_system_update_enterprisepolicy.js84
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_system_update_fail.js180
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_system_update_newset.js165
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_system_update_overlapping.js180
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_system_update_uninstall_check.js56
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_system_update_upgrades.js165
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_system_upgrades.js415
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_systemaddomstartupprefs.js55
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_temporary.js774
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_trash_directory.js39
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_types.js67
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_undouninstall.js584
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_update.js852
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_updateCancel.js139
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_update_compatmode.js112
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_update_ignorecompat.js100
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_update_noSystemAddonUpdate.js42
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_update_strictcompat.js216
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_update_theme.js121
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_update_webextensions.js206
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_updatecheck.js146
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_updatecheck_errors.js52
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_updatecheck_json.js379
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_updateid.js80
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_upgrade.js208
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_upgrade_incompatible.js76
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_webextension.js513
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_webextension_events.js95
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_webextension_icons.js212
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_webextension_install.js665
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_webextension_install_syntax_error.js42
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_webextension_langpack.js573
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_webextension_paths.js47
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/test_webextension_theme.js365
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/xpcshell-unpack.ini13
-rw-r--r--toolkit/mozapps/extensions/test/xpcshell/xpcshell.ini194
246 files changed, 38043 insertions, 0 deletions
diff --git a/toolkit/mozapps/extensions/test/xpcshell/.eslintrc.js b/toolkit/mozapps/extensions/test/xpcshell/.eslintrc.js
new file mode 100644
index 0000000000..8e3971b385
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/.eslintrc.js
@@ -0,0 +1,24 @@
+"use strict";
+
+module.exports = {
+ rules: {
+ "no-unused-vars": [
+ "error",
+ { args: "none", varsIgnorePattern: "^end_test$" },
+ ],
+ },
+ overrides: [
+ {
+ files: "head*.js",
+ rules: {
+ "no-unused-vars": [
+ "error",
+ {
+ args: "none",
+ vars: "local",
+ },
+ ],
+ },
+ },
+ ],
+};
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/blocklistchange/addon_change.xml b/toolkit/mozapps/extensions/test/xpcshell/data/blocklistchange/addon_change.xml
new file mode 100644
index 0000000000..a229a653a1
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/blocklistchange/addon_change.xml
@@ -0,0 +1,31 @@
+<?xml version="1.0" encoding="UTF-8"?>
+
+<blocklist xmlns="http://www.mozilla.org/2006/addons-blocklist">
+ <emItems>
+ <emItem id="softblock1@tests.mozilla.org">
+ <versionRange severity="1" minVersion="2" maxVersion="3"/>
+ </emItem>
+ <emItem id="softblock2@tests.mozilla.org">
+ <versionRange severity="1" minVersion="2" maxVersion="3"/>
+ </emItem>
+ <emItem id="softblock3@tests.mozilla.org">
+ <versionRange severity="1" minVersion="2" maxVersion="3"/>
+ </emItem>
+ <emItem id="softblock4@tests.mozilla.org">
+ <versionRange severity="1" minVersion="2" maxVersion="3"/>
+ </emItem>
+ <emItem id="softblock5@tests.mozilla.org">
+ <versionRange severity="1" minVersion="2" maxVersion="3"/>
+ </emItem>
+ <emItem id="hardblock@tests.mozilla.org">
+ <versionRange minVersion="2" maxVersion="3"/>
+ </emItem>
+ <!-- Two RegExp matches, so test flags work - first shouldn't match. -->
+ <emItem id="/^RegExp/">
+ <versionRange severity="1" minVersion="2" maxVersion="3"/>
+ </emItem>
+ <emItem id="/^RegExp/i">
+ <versionRange severity="2" minVersion="2" maxVersion="3"/>
+ </emItem>
+ </emItems>
+</blocklist>
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/blocklistchange/addon_update1.json b/toolkit/mozapps/extensions/test/xpcshell/data/blocklistchange/addon_update1.json
new file mode 100644
index 0000000000..07931aec62
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/blocklistchange/addon_update1.json
@@ -0,0 +1,102 @@
+{
+ "addons": {
+ "softblock1@tests.mozilla.org": {
+ "updates": [
+ {
+ "applications": {
+ "gecko": {
+ "strict_min_version": "0",
+ "advisory_max_version": "*"
+ }
+ },
+ "version": "2",
+ "update_link": "http://example.com/addons/blocklist_soft1_2.xpi"
+ }
+ ]
+ },
+ "softblock3@tests.mozilla.org": {
+ "updates": [
+ {
+ "applications": {
+ "gecko": {
+ "strict_min_version": "0",
+ "advisory_max_version": "*"
+ }
+ },
+ "version": "2",
+ "update_link": "http://example.com/addons/blocklist_soft3_2.xpi"
+ }
+ ]
+ },
+ "softblock5@tests.mozilla.org": {
+ "updates": [
+ {
+ "applications": {
+ "gecko": {
+ "strict_min_version": "0",
+ "advisory_max_version": "*"
+ }
+ },
+ "version": "2",
+ "update_link": "http://example.com/addons/blocklist_soft5_2.xpi"
+ }
+ ]
+ },
+ "softblock4@tests.mozilla.org": {
+ "updates": [
+ {
+ "applications": {
+ "gecko": {
+ "strict_min_version": "0",
+ "advisory_max_version": "*"
+ }
+ },
+ "version": "2",
+ "update_link": "http://example.com/addons/blocklist_soft4_2.xpi"
+ }
+ ]
+ },
+ "softblock2@tests.mozilla.org": {
+ "updates": [
+ {
+ "applications": {
+ "gecko": {
+ "strict_min_version": "0",
+ "advisory_max_version": "*"
+ }
+ },
+ "version": "2",
+ "update_link": "http://example.com/addons/blocklist_soft2_2.xpi"
+ }
+ ]
+ },
+ "regexpblock@tests.mozilla.org": {
+ "updates": [
+ {
+ "applications": {
+ "gecko": {
+ "strict_min_version": "0",
+ "advisory_max_version": "*"
+ }
+ },
+ "version": "2",
+ "update_link": "http://example.com/addons/blocklist_regexp1_2.xpi"
+ }
+ ]
+ },
+ "hardblock@tests.mozilla.org": {
+ "updates": [
+ {
+ "applications": {
+ "gecko": {
+ "strict_min_version": "0",
+ "advisory_max_version": "*"
+ }
+ },
+ "version": "2",
+ "update_link": "http://example.com/addons/blocklist_hard1_2.xpi"
+ }
+ ]
+ }
+ }
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/blocklistchange/addon_update2.json b/toolkit/mozapps/extensions/test/xpcshell/data/blocklistchange/addon_update2.json
new file mode 100644
index 0000000000..cc9c38e4b1
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/blocklistchange/addon_update2.json
@@ -0,0 +1,102 @@
+{
+ "addons": {
+ "softblock1@tests.mozilla.org": {
+ "updates": [
+ {
+ "applications": {
+ "gecko": {
+ "strict_min_version": "0",
+ "advisory_max_version": "*"
+ }
+ },
+ "version": "3",
+ "update_link": "http://example.com/addons/blocklist_soft1_3.xpi"
+ }
+ ]
+ },
+ "softblock3@tests.mozilla.org": {
+ "updates": [
+ {
+ "applications": {
+ "gecko": {
+ "strict_min_version": "0",
+ "advisory_max_version": "*"
+ }
+ },
+ "version": "3",
+ "update_link": "http://example.com/addons/blocklist_soft3_3.xpi"
+ }
+ ]
+ },
+ "regexpblock@tests.mozilla.org": {
+ "updates": [
+ {
+ "applications": {
+ "gecko": {
+ "strict_min_version": "0",
+ "advisory_max_version": "*"
+ }
+ },
+ "version": "3",
+ "update_link": "http://example.com/addons/blocklist_regexp1_3.xpi"
+ }
+ ]
+ },
+ "hardblock@tests.mozilla.org": {
+ "updates": [
+ {
+ "applications": {
+ "gecko": {
+ "strict_min_version": "0",
+ "advisory_max_version": "*"
+ }
+ },
+ "version": "3",
+ "update_link": "http://example.com/addons/blocklist_hard1_3.xpi"
+ }
+ ]
+ },
+ "softblock5@tests.mozilla.org": {
+ "updates": [
+ {
+ "applications": {
+ "gecko": {
+ "strict_min_version": "0",
+ "advisory_max_version": "*"
+ }
+ },
+ "version": "3",
+ "update_link": "http://example.com/addons/blocklist_soft5_3.xpi"
+ }
+ ]
+ },
+ "softblock4@tests.mozilla.org": {
+ "updates": [
+ {
+ "applications": {
+ "gecko": {
+ "strict_min_version": "0",
+ "advisory_max_version": "*"
+ }
+ },
+ "version": "3",
+ "update_link": "http://example.com/addons/blocklist_soft4_3.xpi"
+ }
+ ]
+ },
+ "softblock2@tests.mozilla.org": {
+ "updates": [
+ {
+ "applications": {
+ "gecko": {
+ "strict_min_version": "0",
+ "advisory_max_version": "*"
+ }
+ },
+ "version": "3",
+ "update_link": "http://example.com/addons/blocklist_soft2_3.xpi"
+ }
+ ]
+ }
+ }
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/blocklistchange/addon_update3.json b/toolkit/mozapps/extensions/test/xpcshell/data/blocklistchange/addon_update3.json
new file mode 100644
index 0000000000..d60db0f036
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/blocklistchange/addon_update3.json
@@ -0,0 +1,102 @@
+{
+ "addons": {
+ "regexpblock@tests.mozilla.org": {
+ "updates": [
+ {
+ "applications": {
+ "gecko": {
+ "strict_min_version": "0",
+ "advisory_max_version": "*"
+ }
+ },
+ "version": "4",
+ "update_link": "http://example.com/addons/blocklist_regexp_1.xpi"
+ }
+ ]
+ },
+ "hardblock@tests.mozilla.org": {
+ "updates": [
+ {
+ "applications": {
+ "gecko": {
+ "strict_min_version": "0",
+ "advisory_max_version": "*"
+ }
+ },
+ "version": "4",
+ "update_link": "http://example.com/addons/blocklist_hard_1.xpi"
+ }
+ ]
+ },
+ "softblock5@tests.mozilla.org": {
+ "updates": [
+ {
+ "applications": {
+ "gecko": {
+ "strict_min_version": "0",
+ "advisory_max_version": "*"
+ }
+ },
+ "version": "4",
+ "update_link": "http://example.com/addons/blocklist_soft5_1.xpi"
+ }
+ ]
+ },
+ "softblock4@tests.mozilla.org": {
+ "updates": [
+ {
+ "applications": {
+ "gecko": {
+ "strict_min_version": "0",
+ "advisory_max_version": "*"
+ }
+ },
+ "version": "4",
+ "update_link": "http://example.com/addons/blocklist_soft4_1.xpi"
+ }
+ ]
+ },
+ "softblock3@tests.mozilla.org": {
+ "updates": [
+ {
+ "applications": {
+ "gecko": {
+ "strict_min_version": "0",
+ "advisory_max_version": "*"
+ }
+ },
+ "version": "4",
+ "update_link": "http://example.com/addons/blocklist_soft3_1.xpi"
+ }
+ ]
+ },
+ "softblock2@tests.mozilla.org": {
+ "updates": [
+ {
+ "applications": {
+ "gecko": {
+ "strict_min_version": "0",
+ "advisory_max_version": "*"
+ }
+ },
+ "version": "4",
+ "update_link": "http://example.com/addons/blocklist_soft2_1.xpi"
+ }
+ ]
+ },
+ "softblock1@tests.mozilla.org": {
+ "updates": [
+ {
+ "applications": {
+ "gecko": {
+ "strict_min_version": "0",
+ "advisory_max_version": "*"
+ }
+ },
+ "version": "4",
+ "update_link": "http://example.com/addons/blocklist_soft1_1.xpi"
+ }
+ ]
+ }
+ }
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/blocklistchange/app_update.xml b/toolkit/mozapps/extensions/test/xpcshell/data/blocklistchange/app_update.xml
new file mode 100644
index 0000000000..85a66fe555
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/blocklistchange/app_update.xml
@@ -0,0 +1,62 @@
+<?xml version="1.0" encoding="UTF-8"?>
+
+<blocklist xmlns="http://www.mozilla.org/2006/addons-blocklist">
+ <emItems>
+ <emItem id="softblock1@tests.mozilla.org">
+ <versionRange severity="1">
+ <targetApplication id="xpcshell@tests.mozilla.org">
+ <versionRange minVersion="2" maxVersion="2.*"/>
+ </targetApplication>
+ </versionRange>
+ </emItem>
+ <emItem id="softblock2@tests.mozilla.org">
+ <versionRange severity="1">
+ <targetApplication id="xpcshell@tests.mozilla.org">
+ <versionRange minVersion="2" maxVersion="2.*"/>
+ </targetApplication>
+ </versionRange>
+ </emItem>
+ <emItem id="softblock3@tests.mozilla.org">
+ <versionRange severity="1">
+ <targetApplication id="xpcshell@tests.mozilla.org">
+ <versionRange minVersion="2" maxVersion="2.*"/>
+ </targetApplication>
+ </versionRange>
+ </emItem>
+ <emItem id="softblock4@tests.mozilla.org">
+ <versionRange severity="1">
+ <targetApplication id="xpcshell@tests.mozilla.org">
+ <versionRange minVersion="2" maxVersion="2.*"/>
+ </targetApplication>
+ </versionRange>
+ </emItem>
+ <emItem id="softblock5@tests.mozilla.org">
+ <versionRange severity="1">
+ <targetApplication id="xpcshell@tests.mozilla.org">
+ <versionRange minVersion="2" maxVersion="2.*"/>
+ </targetApplication>
+ </versionRange>
+ </emItem>
+ <emItem id="hardblock@tests.mozilla.org">
+ <versionRange>
+ <targetApplication id="xpcshell@tests.mozilla.org">
+ <versionRange minVersion="2" maxVersion="2.*"/>
+ </targetApplication>
+ </versionRange>
+ </emItem>
+ <emItem id="/^RegExp/">
+ <versionRange severity="1">
+ <targetApplication id="xpcshell@tests.mozilla.org">
+ <versionRange minVersion="2" maxVersion="2.*"/>
+ </targetApplication>
+ </versionRange>
+ </emItem>
+ <emItem id="/^RegExp/i">
+ <versionRange>
+ <targetApplication id="xpcshell@tests.mozilla.org">
+ <versionRange minVersion="2" maxVersion="2.*"/>
+ </targetApplication>
+ </versionRange>
+ </emItem>
+ </emItems>
+</blocklist>
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/blocklistchange/blocklist_update1.xml b/toolkit/mozapps/extensions/test/xpcshell/data/blocklistchange/blocklist_update1.xml
new file mode 100644
index 0000000000..87011cd398
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/blocklistchange/blocklist_update1.xml
@@ -0,0 +1,3 @@
+<?xml version="1.0" encoding="UTF-8"?>
+
+<blocklist xmlns="http://www.mozilla.org/2006/addons-blocklist"/>
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/blocklistchange/blocklist_update2.xml b/toolkit/mozapps/extensions/test/xpcshell/data/blocklistchange/blocklist_update2.xml
new file mode 100644
index 0000000000..867a34255b
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/blocklistchange/blocklist_update2.xml
@@ -0,0 +1,26 @@
+<?xml version="1.0" encoding="UTF-8"?>
+
+<blocklist xmlns="http://www.mozilla.org/2006/addons-blocklist">
+ <emItems>
+ <emItem id="softblock1@tests.mozilla.org">
+ <versionRange severity="1"/>
+ </emItem>
+ <emItem id="softblock2@tests.mozilla.org">
+ <versionRange severity="1"/>
+ </emItem>
+ <emItem id="softblock3@tests.mozilla.org">
+ <versionRange severity="1"/>
+ </emItem>
+ <emItem id="softblock4@tests.mozilla.org">
+ <versionRange severity="1"/>
+ </emItem>
+ <emItem id="softblock5@tests.mozilla.org">
+ <versionRange severity="1"/>
+ </emItem>
+ <emItem id="hardblock@tests.mozilla.org"/>
+ <emItem id="/^RegExp/">
+ <versionRange severity="1"/>
+ </emItem>
+ <emItem id="/^RegExp/i"/>
+ </emItems>
+</blocklist>
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/blocklistchange/manual_update.xml b/toolkit/mozapps/extensions/test/xpcshell/data/blocklistchange/manual_update.xml
new file mode 100644
index 0000000000..df9276525b
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/blocklistchange/manual_update.xml
@@ -0,0 +1,27 @@
+<?xml version="1.0" encoding="UTF-8"?>
+
+<blocklist xmlns="http://www.mozilla.org/2006/addons-blocklist">
+ <emItems>
+ <emItem id="softblock1@tests.mozilla.org">
+ <versionRange severity="1" minVersion="1" maxVersion="2"/>
+ </emItem>
+ <emItem id="softblock2@tests.mozilla.org">
+ <versionRange severity="1" minVersion="1" maxVersion="2"/>
+ </emItem>
+ <emItem id="softblock3@tests.mozilla.org">
+ <versionRange severity="1" minVersion="1" maxVersion="2"/>
+ </emItem>
+ <emItem id="softblock4@tests.mozilla.org">
+ <versionRange severity="1" minVersion="1" maxVersion="2"/>
+ </emItem>
+ <emItem id="softblock5@tests.mozilla.org">
+ <versionRange severity="1" minVersion="1" maxVersion="2"/>
+ </emItem>
+ <emItem id="hardblock@tests.mozilla.org">
+ <versionRange minVersion="1" maxVersion="2"/>
+ </emItem>
+ <emItem id="/^RegExp/i">
+ <versionRange minVersion="1" maxVersion="2"/>
+ </emItem>
+ </emItems>
+</blocklist>
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/bug455906_block.xml b/toolkit/mozapps/extensions/test/xpcshell/data/bug455906_block.xml
new file mode 100644
index 0000000000..1f673ef2fb
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/bug455906_block.xml
@@ -0,0 +1,18 @@
+<?xml version="1.0" encoding="UTF-8"?>
+
+<blocklist xmlns="http://www.mozilla.org/2006/addons-blocklist">
+ <emItems>
+ <emItem id="test_bug455906_1@tests.mozilla.org" blockID="test_bug455906_1@tests.mozilla.org"/>
+ <emItem id="test_bug455906_2@tests.mozilla.org" blockID="test_bug455906_2@tests.mozilla.org"/>
+ <emItem id="test_bug455906_3@tests.mozilla.org" blockID="test_bug455906_3@tests.mozilla.org"/>
+ <emItem id="test_bug455906_4@tests.mozilla.org" blockID="test_bug455906_4@tests.mozilla.org"/>
+ <emItem id="test_bug455906_5@tests.mozilla.org" blockID="test_bug455906_5@tests.mozilla.org"/>
+ <emItem id="test_bug455906_6@tests.mozilla.org" blockID="test_bug455906_6@tests.mozilla.org"/>
+ <emItem id="test_bug455906_7@tests.mozilla.org" blockID="test_bug455906_7@tests.mozilla.org"/>
+ </emItems>
+ <pluginItems>
+ <pluginItem blockID="test_bug455906_plugin">
+ <match name="name" exp="^test_bug455906"/>
+ </pluginItem>
+ </pluginItems>
+</blocklist>
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/bug455906_empty.xml b/toolkit/mozapps/extensions/test/xpcshell/data/bug455906_empty.xml
new file mode 100644
index 0000000000..88d22f281f
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/bug455906_empty.xml
@@ -0,0 +1,7 @@
+<?xml version="1.0" encoding="UTF-8"?>
+
+<blocklist xmlns="http://www.mozilla.org/2006/addons-blocklist">
+ <emItems>
+ <emItem id="dummy_bug455906_2@tests.mozilla.org"/>
+ </emItems>
+</blocklist>
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/bug455906_start.xml b/toolkit/mozapps/extensions/test/xpcshell/data/bug455906_start.xml
new file mode 100644
index 0000000000..daba6f4c1c
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/bug455906_start.xml
@@ -0,0 +1,30 @@
+<?xml version="1.0" encoding="UTF-8"?>
+
+<blocklist xmlns="http://www.mozilla.org/2006/addons-blocklist">
+ <emItems>
+ <emItem id="test_bug455906_4@tests.mozilla.org">
+ <versionRange severity="-1"/>
+ </emItem>
+ <emItem id="test_bug455906_5@tests.mozilla.org">
+ <versionRange severity="1"/>
+ </emItem>
+ <emItem id="test_bug455906_6@tests.mozilla.org">
+ <versionRange severity="2"/>
+ </emItem>
+ <emItem id="dummy_bug455906_1@tests.mozilla.org"/>
+ </emItems>
+ <pluginItems>
+ <pluginItem>
+ <match name="name" exp="^test_bug455906_4$"/>
+ <versionRange severity="0"/>
+ </pluginItem>
+ <pluginItem>
+ <match name="name" exp="^test_bug455906_5$"/>
+ <versionRange severity="1"/>
+ </pluginItem>
+ <pluginItem>
+ <match name="name" exp="^test_bug455906_6$"/>
+ <versionRange severity="2"/>
+ </pluginItem>
+ </pluginItems>
+</blocklist>
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/bug455906_warn.xml b/toolkit/mozapps/extensions/test/xpcshell/data/bug455906_warn.xml
new file mode 100644
index 0000000000..232fd0d079
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/bug455906_warn.xml
@@ -0,0 +1,33 @@
+<?xml version="1.0" encoding="UTF-8"?>
+
+<blocklist xmlns="http://www.mozilla.org/2006/addons-blocklist">
+ <emItems>
+ <emItem id="test_bug455906_1@tests.mozilla.org">
+ <versionRange severity="-1"/>
+ </emItem>
+ <emItem id="test_bug455906_2@tests.mozilla.org">
+ <versionRange severity="-1"/>
+ </emItem>
+ <emItem id="test_bug455906_3@tests.mozilla.org">
+ <versionRange severity="-1"/>
+ </emItem>
+ <emItem id="test_bug455906_4@tests.mozilla.org">
+ <versionRange severity="-1"/>
+ </emItem>
+ <emItem id="test_bug455906_5@tests.mozilla.org">
+ <versionRange severity="-1"/>
+ </emItem>
+ <emItem id="test_bug455906_6@tests.mozilla.org">
+ <versionRange severity="-1"/>
+ </emItem>
+ <emItem id="test_bug455906_7@tests.mozilla.org">
+ <versionRange severity="-1"/>
+ </emItem>
+ </emItems>
+ <pluginItems>
+ <pluginItem>
+ <match name="name" exp="^test_bug455906"/>
+ <versionRange severity="-1"/>
+ </pluginItem>
+ </pluginItems>
+</blocklist>
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/corrupt.xpi b/toolkit/mozapps/extensions/test/xpcshell/data/corrupt.xpi
new file mode 100644
index 0000000000..35d7bd5e5d
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/corrupt.xpi
@@ -0,0 +1 @@
+This is a corrupt zip file
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/corruptfile.xpi b/toolkit/mozapps/extensions/test/xpcshell/data/corruptfile.xpi
new file mode 100644
index 0000000000..0c30989aa5
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/corruptfile.xpi
Binary files differ
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/empty.xpi b/toolkit/mozapps/extensions/test/xpcshell/data/empty.xpi
new file mode 100644
index 0000000000..74ed2b8174
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/empty.xpi
Binary files differ
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/mlbf-blocked1-unblocked2.bin b/toolkit/mozapps/extensions/test/xpcshell/data/mlbf-blocked1-unblocked2.bin
new file mode 100644
index 0000000000..fe8e08fa68
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/mlbf-blocked1-unblocked2.bin
Binary files differ
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/pluginInfoURL_block.xml b/toolkit/mozapps/extensions/test/xpcshell/data/pluginInfoURL_block.xml
new file mode 100644
index 0000000000..75e252a46b
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/pluginInfoURL_block.xml
@@ -0,0 +1,45 @@
+<?xml version="1.0" encoding="UTF-8"?>
+
+<blocklist xmlns="http://www.mozilla.org/2006/addons-blocklist">
+ <emItems>
+ </emItems>
+ <pluginItems>
+ <pluginItem blockID="test_plugin_wInfoURL">
+ <match name="name" exp="^test_with_infoURL"/>
+ <match name="version" exp="^5"/>
+ <versionRange>
+ <targetApplication id="xpcshell@tests.mozilla.org">
+ <versionRange minVersion="1" maxVersion="*"/>
+ </targetApplication>
+ </versionRange>
+ <infoURL>http://test.url.com/</infoURL>
+ </pluginItem>
+ <pluginItem blockID="test_plugin_wAltInfoURL">
+ <match name="name" exp="^test_with_altInfoURL"/>
+ <match name="version" exp="^5"/>
+ <versionRange>
+ <targetApplication id="xpcshell@tests.mozilla.org">
+ <versionRange minVersion="1" maxVersion="*"/>
+ </targetApplication>
+ </versionRange>
+ <infoURL>http://alt.test.url.com/</infoURL>
+ </pluginItem>
+ <pluginItem blockID="test_plugin_noInfoURL">
+ <match name="name" exp="^test_no_infoURL"/>
+ <versionRange>
+ <targetApplication id="xpcshell@tests.mozilla.org">
+ <versionRange minVersion="1" maxVersion="*"/>
+ </targetApplication>
+ </versionRange>
+ </pluginItem>
+ <pluginItem blockID="test_plugin_newVersion">
+ <match name="name" exp="^test_newVersion"/>
+ <infoURL>http://test.url2.com/</infoURL>
+ <versionRange minVersion="1" maxVersion="2">
+ <targetApplication id="xpcshell@tests.mozilla.org">
+ <versionRange minVersion="1" maxVersion="*"/>
+ </targetApplication>
+ </versionRange>
+ </pluginItem>
+ </pluginItems>
+</blocklist>
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/productaddons/bad.txt b/toolkit/mozapps/extensions/test/xpcshell/data/productaddons/bad.txt
new file mode 100644
index 0000000000..f17f98b15b
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/productaddons/bad.txt
@@ -0,0 +1 @@
+Not an xml file! \ No newline at end of file
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/productaddons/bad.xml b/toolkit/mozapps/extensions/test/xpcshell/data/productaddons/bad.xml
new file mode 100644
index 0000000000..0e3d415c44
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/productaddons/bad.xml
@@ -0,0 +1,3 @@
+<?xml version="1.0" encoding="UTF-8"?>
+
+<foobar></barfoo> \ No newline at end of file
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/productaddons/bad2.xml b/toolkit/mozapps/extensions/test/xpcshell/data/productaddons/bad2.xml
new file mode 100644
index 0000000000..55ad1c7d55
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/productaddons/bad2.xml
@@ -0,0 +1,3 @@
+<?xml version="1.0" encoding="UTF-8"?>
+
+<test></test>
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/productaddons/empty.xml b/toolkit/mozapps/extensions/test/xpcshell/data/productaddons/empty.xml
new file mode 100644
index 0000000000..42cb20bd01
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/productaddons/empty.xml
@@ -0,0 +1,5 @@
+<?xml version="1.0" encoding="UTF-8"?>
+
+<updates>
+ <addons></addons>
+</updates>
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/productaddons/good.xml b/toolkit/mozapps/extensions/test/xpcshell/data/productaddons/good.xml
new file mode 100644
index 0000000000..e1da86fa54
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/productaddons/good.xml
@@ -0,0 +1,11 @@
+<?xml version="1.0" encoding="UTF-8"?>
+
+<updates>
+ <addons>
+ <addon id="test1" URL="http://example.com/test1.xpi"/>
+ <addon id="test2" URL="http://example.com/test2.xpi" hashFunction="md5" hashValue="djhfgsjdhf"/>
+ <addon id="test3" URL="http://example.com/test3.xpi" version="1.0" size="45"/>
+ <addon id="test4"/>
+ <addon URL="http://example.com/test5.xpi"/>
+ </addons>
+</updates>
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/productaddons/missing.xml b/toolkit/mozapps/extensions/test/xpcshell/data/productaddons/missing.xml
new file mode 100644
index 0000000000..8c9501478e
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/productaddons/missing.xml
@@ -0,0 +1,3 @@
+<?xml version="1.0" encoding="UTF-8"?>
+
+<updates></updates>
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/productaddons/unsigned.xpi b/toolkit/mozapps/extensions/test/xpcshell/data/productaddons/unsigned.xpi
new file mode 100644
index 0000000000..51b00475a9
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/productaddons/unsigned.xpi
Binary files differ
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/signing_checks/langpack_signed.xpi b/toolkit/mozapps/extensions/test/xpcshell/data/signing_checks/langpack_signed.xpi
new file mode 100644
index 0000000000..f60d00348e
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/signing_checks/langpack_signed.xpi
Binary files differ
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/signing_checks/langpack_unsigned.xpi b/toolkit/mozapps/extensions/test/xpcshell/data/signing_checks/langpack_unsigned.xpi
new file mode 100644
index 0000000000..89de7f4409
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/signing_checks/langpack_unsigned.xpi
Binary files differ
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/signing_checks/long.xpi b/toolkit/mozapps/extensions/test/xpcshell/data/signing_checks/long.xpi
new file mode 100644
index 0000000000..f95f3df91e
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/signing_checks/long.xpi
Binary files differ
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/signing_checks/privileged.xpi b/toolkit/mozapps/extensions/test/xpcshell/data/signing_checks/privileged.xpi
new file mode 100644
index 0000000000..c22acaacd2
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/signing_checks/privileged.xpi
Binary files differ
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/signing_checks/signed1.xpi b/toolkit/mozapps/extensions/test/xpcshell/data/signing_checks/signed1.xpi
new file mode 100644
index 0000000000..e2ba7d6fd8
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/signing_checks/signed1.xpi
Binary files differ
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/signing_checks/signed2.xpi b/toolkit/mozapps/extensions/test/xpcshell/data/signing_checks/signed2.xpi
new file mode 100644
index 0000000000..ccb20796f2
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/signing_checks/signed2.xpi
Binary files differ
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/signing_checks/unsigned.xpi b/toolkit/mozapps/extensions/test/xpcshell/data/signing_checks/unsigned.xpi
new file mode 100644
index 0000000000..9e10be5db3
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/signing_checks/unsigned.xpi
Binary files differ
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/test_AddonRepository_cache.json b/toolkit/mozapps/extensions/test/xpcshell/data/test_AddonRepository_cache.json
new file mode 100644
index 0000000000..1be2be912c
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/test_AddonRepository_cache.json
@@ -0,0 +1,134 @@
+{
+ "page_size": 25,
+ "page_count": 1,
+ "count": 4,
+ "next": null,
+ "previous": null,
+ "results": [
+ {
+ "name": "Repo Add-on 1",
+ "type": "extension",
+ "guid": "test_AddonRepository_1@tests.mozilla.org",
+ "current_version": {
+ "version": "2.1",
+ "files": [
+ {
+ "platform": "all",
+ "size": 9,
+ "url": "http://example.com/repo/1/install.xpi"
+ }
+ ]
+ },
+ "authors": [
+ {
+ "name": "Repo Add-on 1 - Creator",
+ "url": "http://example.com/repo/1/creator.html"
+ },
+ {
+ "name": "Repo Add-on 1 - First Developer",
+ "url": "http://example.com/repo/1/firstDeveloper.html"
+ },
+ {
+ "name": "Repo Add-on 1 - Second Developer",
+ "url": "http://example.com/repo/1/secondDeveloper.html"
+ }
+ ],
+ "summary": "Repo Add-on 1 - Description<br>Second line",
+ "description": "<p>Repo Add-on 1 - Full Description &amp; some extra</p>",
+ "icons": {
+ "32": "http://example.com/repo/1/icon.png"
+ },
+ "ratings": {
+ "count": 1234,
+ "text_count": 1111,
+ "average": 1
+ },
+ "homepage": "http://example.com/repo/1/homepage.html",
+ "support_url": "http://example.com/repo/1/support.html",
+ "contributions_url": "http://example.com/repo/1/meetDevelopers.html",
+ "ratings_url": "http://example.com/repo/1/review.html",
+ "weekly_downloads": 3331,
+ "last_updated": "1970-01-01T00:00:09Z"
+ },
+ {
+ "name": "Repo Add-on 2",
+ "type": "theme",
+ "guid": "test_AddonRepository_2@tests.mozilla.org",
+ "current_version": {
+ "version": "2.2",
+ "files": [
+ {
+ "platform": "all",
+ "size": 9,
+ "url": "http://example.com/repo/2/install.xpi"
+ }
+ ]
+ },
+ "authors": [
+ {
+ "name": "Repo Add-on 2 - Creator",
+ "url": "http://example.com/repo/2/creator.html"
+ },
+ {
+ "name": "Repo Add-on 2 - First Developer",
+ "url": "http://example.com/repo/2/firstDeveloper.html"
+ },
+ {
+ "name": "Repo Add-on 2 - Second Developer",
+ "url": "http://example.com/repo/2/secondDeveloper.html"
+ }
+ ],
+ "summary": "Repo Add-on 2 - Description",
+ "description": "Repo Add-on 2 - Full Description",
+ "icons": {
+ "32": "http://example.com/repo/2/icon.png"
+ },
+ "previews": [
+ {
+ "image_url": "http://example.com/repo/2/firstFull.png",
+ "thumbnail_url": "http://example.com/repo/2/firstThumbnail.png",
+ "caption": "Repo Add-on 2 - First Caption"
+ },
+ {
+ "image_url": "http://example.com/repo/2/secondFull.png",
+ "thumbnail_url": "http://example.com/repo/2/secondThumbnail.png",
+ "caption": "Repo Add-on 2 - Second Caption"
+ }
+ ],
+ "ratings": {
+ "count": 2223,
+ "text_count": 1112,
+ "average": 2
+ },
+ "homepage": "http://example.com/repo/2/homepage.html",
+ "support_url": "http://example.com/repo/2/support.html",
+ "contributions_url": "http://example.com/repo/2/meetDevelopers.html",
+ "ratings_url": "http://example.com/repo/2/review.html",
+ "weekly_downloads": 3332,
+ "last_updated": "1970-01-01T00:00:09Z"
+ },
+ {
+ "name": "Repo Add-on 3",
+ "type": "theme",
+ "guid": "test_AddonRepository_3@tests.mozilla.org",
+ "current_version": {
+ "version": "2.3"
+ },
+ "icons": {
+ "32": "http://example.com/repo/3/icon.png"
+ },
+ "previews": [
+ {
+ "image_url": "http://example.com/repo/3/firstFull.png",
+ "thumbnail_url": "http://example.com/repo/3/firstThumbnail.png",
+ "caption": "Repo Add-on 3 - First Caption"
+ },
+ {
+ "image_url": "http://example.com/repo/3/secondFull.png",
+ "thumbnail_url": "http://example.com/repo/3/secondThumbnail.png",
+ "caption": "Repo Add-on 3 - Second Caption"
+ }
+ ]
+ }
+ ]
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/test_AddonRepository_empty.json b/toolkit/mozapps/extensions/test/xpcshell/data/test_AddonRepository_empty.json
new file mode 100644
index 0000000000..64fac5dc8b
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/test_AddonRepository_empty.json
@@ -0,0 +1,7 @@
+{
+ "page_size": 25,
+ "count": 0,
+ "next": null,
+ "previous": null,
+ "results": []
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/test_AddonRepository_fail.json b/toolkit/mozapps/extensions/test/xpcshell/data/test_AddonRepository_fail.json
new file mode 100644
index 0000000000..d29d525a81
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/test_AddonRepository_fail.json
@@ -0,0 +1 @@
+this should yield a json parse error
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/test_AddonRepository_getAddonsByIDs.json b/toolkit/mozapps/extensions/test/xpcshell/data/test_AddonRepository_getAddonsByIDs.json
new file mode 100644
index 0000000000..13850331f6
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/test_AddonRepository_getAddonsByIDs.json
@@ -0,0 +1,117 @@
+{
+ "page_size": 25,
+ "page_count": 1,
+ "count": 4,
+ "next": null,
+ "previous": null,
+ "results": [
+ {
+ "name": "PASS",
+ "type": "extension",
+ "guid": "test1@tests.mozilla.org",
+ "current_version": {
+ "version": "1.1",
+ "files": [
+ {
+ "platform": "all",
+ "url": "http://example.com/addons/test_AddonRepository_2.xpi",
+ "size": 5555
+ }
+ ]
+ },
+ "authors": [
+ {
+ "name": "Test Creator 1",
+ "url": "http://example.com/creator1.html"
+ },
+ {
+ "name": "Test Developer 1",
+ "url": "http://example.com/developer1.html"
+ }
+ ],
+ "summary": "Test Summary 1",
+ "description": "Test Description 1",
+ "icons": {
+ "32": "http://example.com/icon1.png"
+ },
+ "previews": [
+ {
+ "caption": "Caption 1 - 1",
+ "image_size": [400, 300],
+ "image_url": "http://example.com/full1-1.png",
+ "thumbnail_size": [200, 150],
+ "thumbnail_url": "http://example.com/thumbnail1-1.png"
+ },
+ {
+ "caption": "Caption 2 - 1",
+ "image_url": "http://example.com/full2-1.png",
+ "thumbnail_url": "http://example.com/thumbnail2-1.png"
+ }
+ ],
+ "ratings": {
+ "count": 1234,
+ "text_count": 1111,
+ "average": 4
+ },
+ "ratings_url": "http://example.com/review1.html",
+ "support_url": "http://example.com/support1.html",
+ "contributions_url": "http://example.com/contribution1.html",
+ "weekly_downloads": 3333,
+ "last_updated": "2010-02-01T14:04:05Z"
+ },
+ {
+ "name": "PASS",
+ "type": "extension",
+ "guid": "test2@tests.mozilla.org",
+ "current_version": {
+ "version": "2.0",
+ "files": [
+ {
+ "platform": "XPCShell",
+ "url": "http://example.com/addons/bleah.xpi",
+ "size": 1000
+ }
+ ]
+ }
+ },
+ {
+ "name": "FAIL",
+ "type": "extension",
+ "guid": "notRequested@tests.mozilla.org",
+ "current_version": {
+ "version": "1.3",
+ "files": [
+ {
+ "platform": "all",
+ "url": "http://example.com/test3.xpi"
+ }
+ ]
+ },
+ "authors": [
+ {
+ "name": "Test Creator 3"
+ }
+ ],
+ "summary": "Add-on with a guid that wasn't requested should be ignored."
+ },
+ {
+ "name": "PASS",
+ "type": "theme",
+ "guid": "test_AddonRepository_1@tests.mozilla.org",
+ "current_version": {
+ "version": "1.4",
+ "files": [
+ {
+ "platform": "UNKNOWN1",
+ "url": "http://example.com/test4.xpi"
+ },
+ {
+ "platform": "UNKNOWN2",
+ "url": "http://example.com/test4.xpi"
+ }
+ ]
+ }
+ }
+ ]
+}
+
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/test_backgroundupdate.json b/toolkit/mozapps/extensions/test/xpcshell/data/test_backgroundupdate.json
new file mode 100644
index 0000000000..b83e0b04ba
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/test_backgroundupdate.json
@@ -0,0 +1,46 @@
+{
+ "addons": {
+ "addon2@tests.mozilla.org": {
+ "updates": [
+ {
+ "applications": {
+ "gecko": {
+ "strict_min_version": "1",
+ "advisory_max_version": "1"
+ }
+ },
+ "version": "2",
+ "update_link": "http://example.com/broken.xpi"
+ }
+ ]
+ },
+ "addon3@tests.mozilla.org": {
+ "updates": [
+ {
+ "applications": {
+ "gecko": {
+ "strict_min_version": "1",
+ "advisory_max_version": "1"
+ }
+ },
+ "version": "2",
+ "update_link": "http://example.com/broken.xpi"
+ }
+ ]
+ },
+ "addon1@tests.mozilla.org": {
+ "updates": [
+ {
+ "applications": {
+ "gecko": {
+ "strict_min_version": "1",
+ "advisory_max_version": "1"
+ }
+ },
+ "version": "2",
+ "update_link": "http://example.com/broken.xpi"
+ }
+ ]
+ }
+ }
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/test_blocklist_metadata_filters_1.xml b/toolkit/mozapps/extensions/test/xpcshell/data/test_blocklist_metadata_filters_1.xml
new file mode 100644
index 0000000000..b092418bbb
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/test_blocklist_metadata_filters_1.xml
@@ -0,0 +1,21 @@
+<?xml version="1.0" encoding="UTF-8"?>
+
+<blocklist xmlns="http://www.mozilla.org/2006/addons-blocklist">
+ <emItems>
+ <emItem name="/^Mozilla Corp\.$/">
+ <versionRange severity="1">
+ <targetApplication id="xpcshell@tests.mozilla.org">
+ <versionRange minVersion="1" maxVersion="2.*"/>
+ </targetApplication>
+ </versionRange>
+ </emItem>
+ <emItem id="/block2/" name="/^Moz/"
+ homepageURL="/\.dangerous\.com/" updateURL="/\.dangerous\.com/">
+ <versionRange severity="3">
+ <targetApplication id="xpcshell@tests.mozilla.org">
+ <versionRange minVersion="1" maxVersion="2.*"/>
+ </targetApplication>
+ </versionRange>
+ </emItem>
+ </emItems>
+</blocklist>
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/test_blocklist_prefs_1.xml b/toolkit/mozapps/extensions/test/xpcshell/data/test_blocklist_prefs_1.xml
new file mode 100644
index 0000000000..41df457b05
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/test_blocklist_prefs_1.xml
@@ -0,0 +1,28 @@
+<?xml version="1.0" encoding="UTF-8"?>
+
+<blocklist xmlns="http://www.mozilla.org/2006/addons-blocklist">
+ <emItems>
+ <emItem id="block1@tests.mozilla.org">
+ <prefs>
+ <pref>test.blocklist.pref1</pref>
+ <pref>test.blocklist.pref2</pref>
+ </prefs>
+ <versionRange severity="1">
+ <targetApplication id="xpcshell@tests.mozilla.org">
+ <versionRange minVersion="1" maxVersion="2.*"/>
+ </targetApplication>
+ </versionRange>
+ </emItem>
+ <emItem id="block2@tests.mozilla.org">
+ <prefs>
+ <pref>test.blocklist.pref3</pref>
+ <pref>test.blocklist.pref4</pref>
+ </prefs>
+ <versionRange severity="3">
+ <targetApplication id="xpcshell@tests.mozilla.org">
+ <versionRange minVersion="1" maxVersion="2.*"/>
+ </targetApplication>
+ </versionRange>
+ </emItem>
+ </emItems>
+</blocklist>
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/test_bug393285.xml b/toolkit/mozapps/extensions/test/xpcshell/data/test_bug393285.xml
new file mode 100644
index 0000000000..1767b4332f
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/test_bug393285.xml
@@ -0,0 +1,30 @@
+<?xml version="1.0" encoding="UTF-8"?>
+
+<blocklist xmlns="http://www.mozilla.org/2006/addons-blocklist">
+ <emItems>
+ <emItem id="test_bug393285_2@tests.mozilla.org"/>
+ <emItem id="test_bug393285_3a@tests.mozilla.org">
+ <versionRange minVersion="1.0" maxVersion="1.0"/>
+ </emItem>
+ <emItem id="test_bug393285_3b@tests.mozilla.org">
+ <versionRange minVersion="1.0" maxVersion="1.0"/>
+ </emItem>
+ <emItem id="test_bug393285_4@tests.mozilla.org">
+ <versionRange minVersion="1.0" maxVersion="1.0">
+ <targetApplication id="xpcshell@tests.mozilla.org">
+ <versionRange minVersion="1.0" maxVersion="1.0"/>
+ </targetApplication>
+ </versionRange>
+ </emItem>
+ <emItem id="test_bug393285_5@tests.mozilla.org" os="Darwin"/>
+ <emItem id="test_bug393285_6@tests.mozilla.org" os="XPCShell"/>
+ <emItem id="test_bug393285_7@tests.mozilla.org" os="Darwin,XPCShell,WINNT"/>
+ <emItem id="test_bug393285_8@tests.mozilla.org" xpcomabi="x86-msvc"/>
+ <emItem id="test_bug393285_9@tests.mozilla.org" xpcomabi="noarch-spidermonkey"/>
+ <emItem id="test_bug393285_10@tests.mozilla.org" xpcomabi="ppc-gcc3,noarch-spidermonkey,x86-msvc"/>
+ <emItem id="test_bug393285_11@tests.mozilla.org" os="Darwin" xpcomabi="ppc-gcc3,x86-msvc"/>
+ <emItem id="test_bug393285_12@tests.mozilla.org" os="Darwin" xpcomabi="ppc-gcc3,noarch-spidermonkey,x86-msvc"/>
+ <emItem id="test_bug393285_13@tests.mozilla.org" os="XPCShell" xpcomabi="ppc-gcc3,x86-msvc"/>
+ <emItem id="test_bug393285_14@tests.mozilla.org" os="XPCShell,WINNT" xpcomabi="ppc-gcc3,x86-msvc,noarch-spidermonkey"/>
+ </emItems>
+</blocklist>
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/test_bug449027_app-extensions.json b/toolkit/mozapps/extensions/test/xpcshell/data/test_bug449027_app-extensions.json
new file mode 100644
index 0000000000..c11b41f4ae
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/test_bug449027_app-extensions.json
@@ -0,0 +1,336 @@
+[
+ {
+ "_comment": "Always blocked",
+ "guid": "test_bug449027_2@tests.mozilla.org",
+ "versionRange": []
+ },
+ {
+ "_comment": "Always blocked",
+ "guid": "test_bug449027_3@tests.mozilla.org",
+ "versionRange": [
+ {}
+ ]
+ },
+ {
+ "_comment": "Not blocked since neither version range matches",
+ "guid": "test_bug449027_4@tests.mozilla.org",
+ "versionRange": [
+ {
+ "minVersion": "6"
+ },
+ {
+ "maxVersion": "4"
+ }
+ ]
+ },
+ {
+ "_comment": "Invalid version range, should not block",
+ "guid": "test_bug449027_5@tests.mozilla.org",
+ "versionRange": [
+ {
+ "maxVersion": "4",
+ "minVersion": "6"
+ }
+ ]
+ },
+ {
+ "_comment": "Should block all of these",
+ "guid": "test_bug449027_6@tests.mozilla.org",
+ "versionRange": [
+ {
+ "maxVersion": "8",
+ "minVersion": "7"
+ },
+ {
+ "maxVersion": "6",
+ "minVersion": "5"
+ },
+ {
+ "maxVersion": "4"
+ }
+ ]
+ },
+ {
+ "guid": "test_bug449027_7@tests.mozilla.org",
+ "versionRange": [
+ {
+ "maxVersion": "4"
+ },
+ {
+ "maxVersion": "5",
+ "minVersion": "4"
+ },
+ {
+ "maxVersion": "7",
+ "minVersion": "6"
+ }
+ ]
+ },
+ {
+ "guid": "test_bug449027_8@tests.mozilla.org",
+ "versionRange": [
+ {
+ "maxVersion": "2",
+ "minVersion": "2"
+ },
+ {
+ "maxVersion": "6",
+ "minVersion": "4"
+ },
+ {
+ "maxVersion": "8",
+ "minVersion": "7"
+ }
+ ]
+ },
+ {
+ "guid": "test_bug449027_9@tests.mozilla.org",
+ "versionRange": [
+ {
+ "minVersion": "4"
+ }
+ ]
+ },
+ {
+ "guid": "test_bug449027_10@tests.mozilla.org",
+ "versionRange": [
+ {
+ "minVersion": "5"
+ }
+ ]
+ },
+ {
+ "guid": "test_bug449027_11@tests.mozilla.org",
+ "versionRange": [
+ {
+ "maxVersion": "6"
+ }
+ ]
+ },
+ {
+ "guid": "test_bug449027_12@tests.mozilla.org",
+ "versionRange": [
+ {
+ "maxVersion": "5"
+ }
+ ]
+ },
+ {
+ "_comment": "This should block all versions for any application",
+ "guid": "test_bug449027_13@tests.mozilla.org",
+ "versionRange": [
+ {
+ "targetApplication": [
+ {}
+ ]
+ }
+ ]
+ },
+ {
+ "_comment": "Shouldn't block",
+ "guid": "test_bug449027_14@tests.mozilla.org",
+ "versionRange": [
+ {
+ "targetApplication": [
+ {
+ "guid": "foo@bar.com"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "_comment": "Should block for any version of the app",
+ "guid": "test_bug449027_15@tests.mozilla.org",
+ "versionRange": [
+ {
+ "targetApplication": [
+ {
+ "guid": "xpcshell@tests.mozilla.org"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "_comment": "Should still block",
+ "guid": "test_bug449027_16@tests.mozilla.org",
+ "versionRange": [
+ {
+ "targetApplication": [
+ {
+ "guid": "xpcshell@tests.mozilla.org"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "_comment": "Not blocked since neither version range matches",
+ "guid": "test_bug449027_17@tests.mozilla.org",
+ "versionRange": [
+ {
+ "targetApplication": [
+ {
+ "guid": "xpcshell@tests.mozilla.org",
+ "minVersion": "4"
+ },
+ {
+ "guid": "xpcshell@tests.mozilla.org",
+ "maxVersion": "2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "_comment": "Invalid version range, should not block",
+ "guid": "test_bug449027_18@tests.mozilla.org",
+ "versionRange": [
+ {
+ "targetApplication": [
+ {
+ "guid": "xpcshell@tests.mozilla.org",
+ "maxVersion": "4",
+ "minVersion": "6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "_comment": "Should block all of these",
+ "guid": "test_bug449027_19@tests.mozilla.org",
+ "versionRange": [
+ {
+ "targetApplication": [
+ {
+ "guid": "foo@bar.com"
+ },
+ {
+ "guid": "xpcshell@tests.mozilla.org",
+ "maxVersion": "6",
+ "minVersion": "5"
+ },
+ {
+ "guid": "xpcshell@tests.mozilla.org",
+ "maxVersion": "4",
+ "minVersion": "3"
+ },
+ {
+ "guid": "xpcshell@tests.mozilla.org",
+ "maxVersion": "2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "guid": "test_bug449027_20@tests.mozilla.org",
+ "versionRange": [
+ {
+ "targetApplication": [
+ {
+ "guid": "xpcshell@tests.mozilla.org",
+ "maxVersion": "2"
+ },
+ {
+ "guid": "xpcshell@tests.mozilla.org",
+ "maxVersion": "3",
+ "minVersion": "2"
+ },
+ {
+ "guid": "xpcshell@tests.mozilla.org",
+ "maxVersion": "5",
+ "minVersion": "4"
+ },
+ {
+ "guid": "foo@bar.com"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "guid": "test_bug449027_21@tests.mozilla.org",
+ "versionRange": [
+ {
+ "targetApplication": [
+ {
+ "guid": "xpcshell@tests.mozilla.org",
+ "maxVersion": "1",
+ "minVersion": "1"
+ },
+ {
+ "guid": "xpcshell@tests.mozilla.org",
+ "maxVersion": "4",
+ "minVersion": "2"
+ },
+ {
+ "guid": "xpcshell@tests.mozilla.org",
+ "maxVersion": "6",
+ "minVersion": "5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "guid": "test_bug449027_22@tests.mozilla.org",
+ "versionRange": [
+ {
+ "targetApplication": [
+ {
+ "guid": "foo@bar.com"
+ },
+ {
+ "guid": "xpcshell@tests.mozilla.org",
+ "minVersion": "3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "guid": "test_bug449027_23@tests.mozilla.org",
+ "versionRange": [
+ {
+ "targetApplication": [
+ {
+ "guid": "xpcshell@tests.mozilla.org",
+ "minVersion": "2"
+ },
+ {
+ "guid": "foo@bar.com"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "guid": "test_bug449027_24@tests.mozilla.org",
+ "versionRange": [
+ {
+ "targetApplication": [
+ {
+ "guid": "xpcshell@tests.mozilla.org",
+ "maxVersion": "3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "guid": "test_bug449027_25@tests.mozilla.org",
+ "versionRange": [
+ {
+ "targetApplication": [
+ {
+ "guid": "xpcshell@tests.mozilla.org",
+ "maxVersion": "4"
+ }
+ ]
+ }
+ ]
+ }
+] \ No newline at end of file
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/test_bug449027_app-plugins.json b/toolkit/mozapps/extensions/test/xpcshell/data/test_bug449027_app-plugins.json
new file mode 100644
index 0000000000..45ab8f6c52
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/test_bug449027_app-plugins.json
@@ -0,0 +1,336 @@
+[
+ {
+ "_comment": "Always blocked",
+ "matchName": "^test_bug449027_2$",
+ "versionRange": []
+ },
+ {
+ "_comment": "Always blocked",
+ "matchName": "^test_bug449027_3$",
+ "versionRange": [
+ {}
+ ]
+ },
+ {
+ "_comment": "Not blocked since neither version range matches",
+ "matchName": "^test_bug449027_4$",
+ "versionRange": [
+ {
+ "minVersion": "6"
+ },
+ {
+ "maxVersion": "4"
+ }
+ ]
+ },
+ {
+ "_comment": "Invalid version range, should not block",
+ "matchName": "^test_bug449027_5$",
+ "versionRange": [
+ {
+ "maxVersion": "4",
+ "minVersion": "6"
+ }
+ ]
+ },
+ {
+ "_comment": "Should block all of these",
+ "matchName": "^test_bug449027_6$",
+ "versionRange": [
+ {
+ "maxVersion": "8",
+ "minVersion": "7"
+ },
+ {
+ "maxVersion": "6",
+ "minVersion": "5"
+ },
+ {
+ "maxVersion": "4"
+ }
+ ]
+ },
+ {
+ "matchName": "^test_bug449027_7$",
+ "versionRange": [
+ {
+ "maxVersion": "4"
+ },
+ {
+ "maxVersion": "5",
+ "minVersion": "4"
+ },
+ {
+ "maxVersion": "7",
+ "minVersion": "6"
+ }
+ ]
+ },
+ {
+ "matchName": "^test_bug449027_8$",
+ "versionRange": [
+ {
+ "maxVersion": "2",
+ "minVersion": "2"
+ },
+ {
+ "maxVersion": "6",
+ "minVersion": "4"
+ },
+ {
+ "maxVersion": "8",
+ "minVersion": "7"
+ }
+ ]
+ },
+ {
+ "matchName": "^test_bug449027_9$",
+ "versionRange": [
+ {
+ "minVersion": "4"
+ }
+ ]
+ },
+ {
+ "matchName": "^test_bug449027_10$",
+ "versionRange": [
+ {
+ "minVersion": "5"
+ }
+ ]
+ },
+ {
+ "matchName": "^test_bug449027_11$",
+ "versionRange": [
+ {
+ "maxVersion": "6"
+ }
+ ]
+ },
+ {
+ "matchName": "^test_bug449027_12$",
+ "versionRange": [
+ {
+ "maxVersion": "5"
+ }
+ ]
+ },
+ {
+ "_comment": "This should block all versions for any application",
+ "matchName": "^test_bug449027_13$",
+ "versionRange": [
+ {
+ "targetApplication": [
+ {}
+ ]
+ }
+ ]
+ },
+ {
+ "_comment": "Shouldn't block",
+ "matchName": "^test_bug449027_14$",
+ "versionRange": [
+ {
+ "targetApplication": [
+ {
+ "guid": "foo@bar.com"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "_comment": "Should block for any version of the app",
+ "matchName": "^test_bug449027_15$",
+ "versionRange": [
+ {
+ "targetApplication": [
+ {
+ "guid": "xpcshell@tests.mozilla.org"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "_comment": "Should still block",
+ "matchName": "^test_bug449027_16$",
+ "versionRange": [
+ {
+ "targetApplication": [
+ {
+ "guid": "xpcshell@tests.mozilla.org"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "_comment": "Not blocked since neither version range matches",
+ "matchName": "^test_bug449027_17$",
+ "versionRange": [
+ {
+ "targetApplication": [
+ {
+ "guid": "xpcshell@tests.mozilla.org",
+ "minVersion": "4"
+ },
+ {
+ "guid": "xpcshell@tests.mozilla.org",
+ "maxVersion": "2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "_comment": "Invalid version range, should not block",
+ "matchName": "^test_bug449027_18$",
+ "versionRange": [
+ {
+ "targetApplication": [
+ {
+ "guid": "xpcshell@tests.mozilla.org",
+ "maxVersion": "4",
+ "minVersion": "6"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "_comment": "Should block all of these",
+ "matchName": "^test_bug449027_19$",
+ "versionRange": [
+ {
+ "targetApplication": [
+ {
+ "guid": "foo@bar.com"
+ },
+ {
+ "guid": "xpcshell@tests.mozilla.org",
+ "maxVersion": "6",
+ "minVersion": "5"
+ },
+ {
+ "guid": "xpcshell@tests.mozilla.org",
+ "maxVersion": "4",
+ "minVersion": "3"
+ },
+ {
+ "guid": "xpcshell@tests.mozilla.org",
+ "maxVersion": "2"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "matchName": "^test_bug449027_20$",
+ "versionRange": [
+ {
+ "targetApplication": [
+ {
+ "guid": "xpcshell@tests.mozilla.org",
+ "maxVersion": "2"
+ },
+ {
+ "guid": "xpcshell@tests.mozilla.org",
+ "maxVersion": "3",
+ "minVersion": "2"
+ },
+ {
+ "guid": "xpcshell@tests.mozilla.org",
+ "maxVersion": "5",
+ "minVersion": "4"
+ },
+ {
+ "guid": "foo@bar.com"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "matchName": "^test_bug449027_21$",
+ "versionRange": [
+ {
+ "targetApplication": [
+ {
+ "guid": "xpcshell@tests.mozilla.org",
+ "maxVersion": "1",
+ "minVersion": "1"
+ },
+ {
+ "guid": "xpcshell@tests.mozilla.org",
+ "maxVersion": "4",
+ "minVersion": "2"
+ },
+ {
+ "guid": "xpcshell@tests.mozilla.org",
+ "maxVersion": "6",
+ "minVersion": "5"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "matchName": "^test_bug449027_22$",
+ "versionRange": [
+ {
+ "targetApplication": [
+ {
+ "guid": "foo@bar.com"
+ },
+ {
+ "guid": "xpcshell@tests.mozilla.org",
+ "minVersion": "3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "matchName": "^test_bug449027_23$",
+ "versionRange": [
+ {
+ "targetApplication": [
+ {
+ "guid": "xpcshell@tests.mozilla.org",
+ "minVersion": "2"
+ },
+ {
+ "guid": "foo@bar.com"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "matchName": "^test_bug449027_24$",
+ "versionRange": [
+ {
+ "targetApplication": [
+ {
+ "guid": "xpcshell@tests.mozilla.org",
+ "maxVersion": "3"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "matchName": "^test_bug449027_25$",
+ "versionRange": [
+ {
+ "targetApplication": [
+ {
+ "guid": "xpcshell@tests.mozilla.org",
+ "maxVersion": "4"
+ }
+ ]
+ }
+ ]
+ }
+] \ No newline at end of file
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/test_bug449027_app.xml b/toolkit/mozapps/extensions/test/xpcshell/data/test_bug449027_app.xml
new file mode 100644
index 0000000000..f12ca1fa6d
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/test_bug449027_app.xml
@@ -0,0 +1,333 @@
+<?xml version="1.0" encoding="UTF-8"?>
+
+<blocklist xmlns="http://www.mozilla.org/2006/addons-blocklist">
+ <emItems>
+ <!-- All extensions are version 5 and tests run against appVersion 3 -->
+
+ <!-- Test 1 not listed, should never get blocked -->
+ <!-- Always blocked -->
+ <emItem id="test_bug449027_2@tests.mozilla.org"/>
+ <!-- Always blocked -->
+ <emItem id="test_bug449027_3@tests.mozilla.org">
+ <versionRange/>
+ </emItem>
+ <!-- Not blocked since neither version range matches -->
+ <emItem id="test_bug449027_4@tests.mozilla.org">
+ <versionRange minVersion="6"/>
+ <versionRange maxVersion="4"/>
+ </emItem>
+ <!-- Invalid version range, should not block -->
+ <emItem id="test_bug449027_5@tests.mozilla.org">
+ <versionRange minVersion="6" maxVersion="4"/>
+ </emItem>
+ <!-- Should block all of these -->
+ <emItem id="test_bug449027_6@tests.mozilla.org">
+ <versionRange minVersion="7" maxVersion="8"/>
+ <versionRange minVersion="5" maxVersion="6"/>
+ <versionRange maxVersion="4"/>
+ </emItem>
+ <emItem id="test_bug449027_7@tests.mozilla.org">
+ <versionRange maxVersion="4"/>
+ <versionRange minVersion="4" maxVersion="5"/>
+ <versionRange minVersion="6" maxVersion="7"/>
+ </emItem>
+ <emItem id="test_bug449027_8@tests.mozilla.org">
+ <versionRange minVersion="2" maxVersion="2"/>
+ <versionRange minVersion="4" maxVersion="6"/>
+ <versionRange minVersion="7" maxVersion="8"/>
+ </emItem>
+ <emItem id="test_bug449027_9@tests.mozilla.org">
+ <versionRange minVersion="4"/>
+ </emItem>
+ <emItem id="test_bug449027_10@tests.mozilla.org">
+ <versionRange minVersion="5"/>
+ </emItem>
+ <emItem id="test_bug449027_11@tests.mozilla.org">
+ <versionRange maxVersion="6"/>
+ </emItem>
+ <emItem id="test_bug449027_12@tests.mozilla.org">
+ <versionRange maxVersion="5"/>
+ </emItem>
+
+ <!-- This should block all versions for any application -->
+ <emItem id="test_bug449027_13@tests.mozilla.org">
+ <versionRange>
+ <targetApplication/>
+ </versionRange>
+ </emItem>
+ <!-- Shouldn't block -->
+ <emItem id="test_bug449027_14@tests.mozilla.org">
+ <versionRange>
+ <targetApplication id="foo@bar.com"/>
+ </versionRange>
+ </emItem>
+ <!-- Should block for any version of the app -->
+ <emItem id="test_bug449027_15@tests.mozilla.org">
+ <versionRange>
+ <targetApplication id="xpcshell@tests.mozilla.org"/>
+ </versionRange>
+ </emItem>
+ <!-- Should still block -->
+ <emItem id="test_bug449027_16@tests.mozilla.org">
+ <versionRange>
+ <targetApplication id="xpcshell@tests.mozilla.org">
+ <versionRange/>
+ </targetApplication>
+ </versionRange>
+ </emItem>
+ <!-- Not blocked since neither version range matches -->
+ <emItem id="test_bug449027_17@tests.mozilla.org">
+ <versionRange>
+ <targetApplication id="xpcshell@tests.mozilla.org">
+ <versionRange minVersion="4"/>
+ <versionRange maxVersion="2"/>
+ </targetApplication>
+ </versionRange>
+ </emItem>
+ <!-- Invalid version range, should not block -->
+ <emItem id="test_bug449027_18@tests.mozilla.org">
+ <versionRange>
+ <targetApplication id="xpcshell@tests.mozilla.org">
+ <versionRange minVersion="6" maxVersion="4"/>
+ </targetApplication>
+ </versionRange>
+ </emItem>
+ <!-- Should block all of these -->
+ <emItem id="test_bug449027_19@tests.mozilla.org">
+ <versionRange>
+ <targetApplication id="foo@bar.com"/>
+ <targetApplication id="xpcshell@tests.mozilla.org">
+ <versionRange minVersion="5" maxVersion="6"/>
+ <versionRange minVersion="3" maxVersion="4"/>
+ <versionRange maxVersion="2"/>
+ </targetApplication>
+ </versionRange>
+ </emItem>
+ <emItem id="test_bug449027_20@tests.mozilla.org">
+ <versionRange>
+ <targetApplication id="xpcshell@tests.mozilla.org">
+ <versionRange maxVersion="2"/>
+ <versionRange minVersion="2" maxVersion="3"/>
+ <versionRange minVersion="4" maxVersion="5"/>
+ </targetApplication>
+ <targetApplication id="foo@bar.com"/>
+ </versionRange>
+ </emItem>
+ <emItem id="test_bug449027_21@tests.mozilla.org">
+ <versionRange>
+ <targetApplication id="xpcshell@tests.mozilla.org">
+ <versionRange minVersion="1" maxVersion="1"/>
+ <versionRange minVersion="2" maxVersion="4"/>
+ <versionRange minVersion="5" maxVersion="6"/>
+ </targetApplication>
+ </versionRange>
+ </emItem>
+ <emItem id="test_bug449027_22@tests.mozilla.org">
+ <versionRange>
+ <targetApplication id="foo@bar.com"/>
+ <targetApplication id="xpcshell@tests.mozilla.org">
+ <versionRange minVersion="3"/>
+ </targetApplication>
+ </versionRange>
+ </emItem>
+ <emItem id="test_bug449027_23@tests.mozilla.org">
+ <versionRange>
+ <targetApplication id="xpcshell@tests.mozilla.org">
+ <versionRange minVersion="2"/>
+ </targetApplication>
+ <targetApplication id="foo@bar.com"/>
+ </versionRange>
+ </emItem>
+ <emItem id="test_bug449027_24@tests.mozilla.org">
+ <versionRange>
+ <targetApplication id="xpcshell@tests.mozilla.org">
+ <versionRange maxVersion="3"/>
+ </targetApplication>
+ </versionRange>
+ </emItem>
+ <emItem id="test_bug449027_25@tests.mozilla.org">
+ <versionRange>
+ <targetApplication id="xpcshell@tests.mozilla.org">
+ <versionRange maxVersion="4"/>
+ </targetApplication>
+ </versionRange>
+ </emItem>
+ </emItems>
+ <pluginItems>
+ <!-- All plugins are version 5 and tests run against appVersion 3 -->
+
+ <!-- Test 1 not listed, should never get blocked -->
+ <!-- Always blocked -->
+ <pluginItem>
+ <match name="name" exp="^test_bug449027_2$"/>
+ </pluginItem>
+ <!-- Always blocked -->
+ <pluginItem>
+ <match name="name" exp="^test_bug449027_3$"/>
+ <versionRange/>
+ </pluginItem>
+ <!-- Not blocked since neither version range matches -->
+ <pluginItem>
+ <match name="name" exp="^test_bug449027_4$"/>
+ <versionRange minVersion="6"/>
+ <versionRange maxVersion="4"/>
+ </pluginItem>
+ <!-- Invalid version range, should not block -->
+ <pluginItem>
+ <match name="name" exp="^test_bug449027_5$"/>
+ <versionRange minVersion="6" maxVersion="4"/>
+ </pluginItem>
+ <!-- Should block all of these -->
+ <pluginItem>
+ <match name="name" exp="^test_bug449027_6$"/>
+ <versionRange minVersion="7" maxVersion="8"/>
+ <versionRange minVersion="5" maxVersion="6"/>
+ <versionRange maxVersion="4"/>
+ </pluginItem>
+ <pluginItem>
+ <match name="name" exp="^test_bug449027_7$"/>
+ <versionRange maxVersion="4"/>
+ <versionRange minVersion="4" maxVersion="5"/>
+ <versionRange minVersion="6" maxVersion="7"/>
+ </pluginItem>
+ <pluginItem>
+ <match name="name" exp="^test_bug449027_8$"/>
+ <versionRange minVersion="2" maxVersion="2"/>
+ <versionRange minVersion="4" maxVersion="6"/>
+ <versionRange minVersion="7" maxVersion="8"/>
+ </pluginItem>
+ <pluginItem>
+ <match name="name" exp="^test_bug449027_9$"/>
+ <versionRange minVersion="4"/>
+ </pluginItem>
+ <pluginItem>
+ <match name="name" exp="^test_bug449027_10$"/>
+ <versionRange minVersion="5"/>
+ </pluginItem>
+ <pluginItem>
+ <match name="name" exp="^test_bug449027_11$"/>
+ <versionRange maxVersion="6"/>
+ </pluginItem>
+ <pluginItem>
+ <match name="name" exp="^test_bug449027_12$"/>
+ <versionRange maxVersion="5"/>
+ </pluginItem>
+
+ <!-- This should block all versions for any application -->
+ <pluginItem>
+ <match name="name" exp="^test_bug449027_13$"/>
+ <versionRange>
+ <targetApplication/>
+ </versionRange>
+ </pluginItem>
+ <!-- Shouldn't block -->
+ <pluginItem>
+ <match name="name" exp="^test_bug449027_14$"/>
+ <versionRange>
+ <targetApplication id="foo@bar.com"/>
+ </versionRange>
+ </pluginItem>
+ <!-- Should block for any version of the app -->
+ <pluginItem>
+ <match name="name" exp="^test_bug449027_15$"/>
+ <versionRange>
+ <targetApplication id="xpcshell@tests.mozilla.org"/>
+ </versionRange>
+ </pluginItem>
+ <!-- Should still block -->
+ <pluginItem>
+ <match name="name" exp="^test_bug449027_16$"/>
+ <versionRange>
+ <targetApplication id="xpcshell@tests.mozilla.org">
+ <versionRange/>
+ </targetApplication>
+ </versionRange>
+ </pluginItem>
+ <!-- Not blocked since neither version range matches -->
+ <pluginItem>
+ <match name="name" exp="^test_bug449027_17$"/>
+ <versionRange>
+ <targetApplication id="xpcshell@tests.mozilla.org">
+ <versionRange minVersion="4"/>
+ <versionRange maxVersion="2"/>
+ </targetApplication>
+ </versionRange>
+ </pluginItem>
+ <!-- Invalid version range, should not block -->
+ <pluginItem>
+ <match name="name" exp="^test_bug449027_18$"/>
+ <versionRange>
+ <targetApplication id="xpcshell@tests.mozilla.org">
+ <versionRange minVersion="6" maxVersion="4"/>
+ </targetApplication>
+ </versionRange>
+ </pluginItem>
+ <!-- Should block all of these -->
+ <pluginItem>
+ <match name="name" exp="^test_bug449027_19$"/>
+ <versionRange>
+ <targetApplication id="foo@bar.com"/>
+ <targetApplication id="xpcshell@tests.mozilla.org">
+ <versionRange minVersion="5" maxVersion="6"/>
+ <versionRange minVersion="3" maxVersion="4"/>
+ <versionRange maxVersion="2"/>
+ </targetApplication>
+ </versionRange>
+ </pluginItem>
+ <pluginItem>
+ <match name="name" exp="^test_bug449027_20$"/>
+ <versionRange>
+ <targetApplication id="xpcshell@tests.mozilla.org">
+ <versionRange maxVersion="2"/>
+ <versionRange minVersion="2" maxVersion="3"/>
+ <versionRange minVersion="4" maxVersion="5"/>
+ </targetApplication>
+ <targetApplication id="foo@bar.com"/>
+ </versionRange>
+ </pluginItem>
+ <pluginItem>
+ <match name="name" exp="^test_bug449027_21$"/>
+ <versionRange>
+ <targetApplication id="xpcshell@tests.mozilla.org">
+ <versionRange minVersion="1" maxVersion="1"/>
+ <versionRange minVersion="2" maxVersion="4"/>
+ <versionRange minVersion="5" maxVersion="6"/>
+ </targetApplication>
+ </versionRange>
+ </pluginItem>
+ <pluginItem>
+ <match name="name" exp="^test_bug449027_22$"/>
+ <versionRange>
+ <targetApplication id="foo@bar.com"/>
+ <targetApplication id="xpcshell@tests.mozilla.org">
+ <versionRange minVersion="3"/>
+ </targetApplication>
+ </versionRange>
+ </pluginItem>
+ <pluginItem>
+ <match name="name" exp="^test_bug449027_23$"/>
+ <versionRange>
+ <targetApplication id="xpcshell@tests.mozilla.org">
+ <versionRange minVersion="2"/>
+ </targetApplication>
+ <targetApplication id="foo@bar.com"/>
+ </versionRange>
+ </pluginItem>
+ <pluginItem>
+ <match name="name" exp="^test_bug449027_24$"/>
+ <versionRange>
+ <targetApplication id="xpcshell@tests.mozilla.org">
+ <versionRange maxVersion="3"/>
+ </targetApplication>
+ </versionRange>
+ </pluginItem>
+ <pluginItem>
+ <match name="name" exp="^test_bug449027_25$"/>
+ <versionRange>
+ <targetApplication id="xpcshell@tests.mozilla.org">
+ <versionRange maxVersion="4"/>
+ </targetApplication>
+ </versionRange>
+ </pluginItem>
+ </pluginItems>
+</blocklist>
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/test_bug449027_toolkit-extensions.json b/toolkit/mozapps/extensions/test/xpcshell/data/test_bug449027_toolkit-extensions.json
new file mode 100644
index 0000000000..704a84ace9
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/test_bug449027_toolkit-extensions.json
@@ -0,0 +1,154 @@
+[
+ {
+ "_general_comment": "All extensions are version 5 and tests run against toolkitVersion 8",
+ "_general_comment2": "Test 1-14 not listed, should never get blocked",
+
+ "_comment": "Should block for any version of the app",
+ "guid": "test_bug449027_15@tests.mozilla.org",
+ "versionRange": [{
+ "targetApplication": [{"guid": "toolkit@mozilla.org"}]
+ }]
+ },
+ {
+ "_comment": "Should still block",
+ "guid": "test_bug449027_16@tests.mozilla.org",
+ "versionRange": [{
+ "targetApplication": [{"guid": "toolkit@mozilla.org"}]
+ }]
+ },
+ {
+ "_comment": "Not blocked since neither version range matches",
+ "guid": "test_bug449027_17@tests.mozilla.org",
+ "versionRange": [{
+ "targetApplication": [{
+ "minVersion": "9",
+ "guid": "toolkit@mozilla.org"
+ },{
+ "maxVersion": "7",
+ "guid": "toolkit@mozilla.org"
+ }]
+ }]
+ },
+ {
+ "_comment": "Invalid version range, should not block",
+ "guid": "test_bug449027_18@tests.mozilla.org",
+ "versionRange": [{
+ "targetApplication": [{
+ "minVersion": "11",
+ "maxVersion": "9",
+ "guid": "toolkit@mozilla.org"
+ }]
+ }]
+ },
+ {
+ "_comment": "Should block all of the following",
+ "guid": "test_bug449027_19@tests.mozilla.org",
+ "versionRange": [{
+ "targetApplication": [
+ {
+ "guid": "foo@bar.com"
+ },
+ {
+ "guid": "toolkit@mozilla.org",
+ "minVersion": "10",
+ "maxVersion": "11"
+ },
+ {
+ "minVersion": "8",
+ "maxVersion": "9"
+ },
+ {
+ "maxVersion": "7"
+ }
+ ]
+ }]
+ },
+ {
+ "guid": "test_bug449027_20@tests.mozilla.org",
+ "versionRange": [{
+ "targetApplication": [
+ {
+ "guid": "toolkit@mozilla.org",
+ "maxVersion": "7"
+ },
+ {
+ "guid": "toolkit@mozilla.org",
+ "minVersion": "7",
+ "maxVersion": "8"
+ },
+ {
+ "guid": "toolkit@mozilla.org",
+ "minVersion": "9",
+ "maxVersion": "10"
+ },
+ {
+ "guid": "foo@bar.com"
+ }
+ ]
+ }]
+ },
+ {
+ "guid": "test_bug449027_21@tests.mozilla.org",
+ "versionRange": [{
+ "targetApplication": [
+ {
+ "guid": "toolkit@mozilla.org",
+ "minVersion": "6",
+ "maxVersion": "6"
+ },
+ {
+ "guid": "toolkit@mozilla.org",
+ "minVersion": "7",
+ "maxVersion": "9"
+ },
+ {
+ "guid": "toolkit@mozilla.org",
+ "minVersion": "10",
+ "maxVersion": "11"
+ }
+ ]
+ }]
+ },
+ {
+ "guid": "test_bug449027_22@tests.mozilla.org",
+ "versionRange": [{
+ "targetApplication": [{
+ "guid": "foo@bar.com"
+ },
+ {
+ "guid": "toolkit@mozilla.org",
+ "minVersion": "8"
+ }]
+ }]
+ },
+ {
+ "guid": "test_bug449027_23@tests.mozilla.org",
+ "versionRange": [{
+ "targetApplication": [{
+ "guid": "toolkit@mozilla.org",
+ "minVersion": "7"
+ },
+ {
+ "guid": "foo@bar.com"
+ }]
+ }]
+ },
+ {
+ "guid": "test_bug449027_24@tests.mozilla.org",
+ "versionRange": [{
+ "targetApplication": [{
+ "maxVersion": "8",
+ "guid": "toolkit@mozilla.org"
+ }]
+ }]
+ },
+ {
+ "guid": "test_bug449027_25@tests.mozilla.org",
+ "versionRange": [{
+ "targetApplication": [{
+ "guid": "toolkit@mozilla.org",
+ "maxVersion": "9"
+ }]
+ }]
+ }
+]
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/test_bug449027_toolkit-plugins.json b/toolkit/mozapps/extensions/test/xpcshell/data/test_bug449027_toolkit-plugins.json
new file mode 100644
index 0000000000..a186315102
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/test_bug449027_toolkit-plugins.json
@@ -0,0 +1,155 @@
+[
+ {
+ "_general_comment": "All plugins are version 5 and tests run against appVersion 3",
+ "_general_comment2": "Test 1-14 not listed, should never get blocked",
+
+ "_comment": "Should block for any version of the app",
+ "matchName": "^test_bug449027_15$",
+ "versionRange": [{
+ "targetApplication": [{"guid": "toolkit@mozilla.org"}]
+ }]
+ },
+ {
+ "_comment": "Should still block",
+ "matchName": "^test_bug449027_16$",
+ "versionRange": [{
+ "targetApplication": [{"guid": "toolkit@mozilla.org"}]
+ }]
+ },
+ {
+ "_comment": "Not blocked since neither version range matches",
+ "matchName": "^test_bug449027_17$",
+ "versionRange": [{
+ "targetApplication": [{
+ "minVersion": "9",
+ "guid": "toolkit@mozilla.org"
+ },{
+ "maxVersion": "7",
+ "guid": "toolkit@mozilla.org"
+ }]
+ }]
+ },
+ {
+ "_comment": "Invalid version range, should not block",
+ "matchName": "^test_bug449027_18$",
+ "versionRange": [{
+ "targetApplication": [{
+ "minVersion": "11",
+ "maxVersion": "9",
+ "guid": "toolkit@mozilla.org"
+ }]
+ }]
+ },
+ {
+ "_comment": "Should block all of the following",
+ "matchName": "^test_bug449027_19$",
+ "versionRange": [{
+ "targetApplication": [
+ {
+ "guid": "foo@bar.com"
+ },
+ {
+ "guid": "toolkit@mozilla.org",
+ "minVersion": "10",
+ "maxVersion": "11"
+ },
+ {
+ "minVersion": "8",
+ "maxVersion": "9"
+ },
+ {
+ "maxVersion": "7"
+ }
+ ]
+ }]
+ },
+ {
+ "matchName": "^test_bug449027_20$",
+ "versionRange": [{
+ "targetApplication": [
+ {
+ "guid": "toolkit@mozilla.org",
+ "maxVersion": "7"
+ },
+ {
+ "guid": "toolkit@mozilla.org",
+ "minVersion": "7",
+ "maxVersion": "8"
+ },
+ {
+ "guid": "toolkit@mozilla.org",
+ "minVersion": "9",
+ "maxVersion": "10"
+ },
+ {
+ "guid": "foo@bar.com"
+ }
+ ]
+ }]
+ },
+ {
+ "matchName": "^test_bug449027_21$",
+ "versionRange": [{
+ "targetApplication": [
+ {
+ "guid": "toolkit@mozilla.org",
+ "minVersion": "6",
+ "maxVersion": "6"
+ },
+ {
+ "guid": "toolkit@mozilla.org",
+ "minVersion": "7",
+ "maxVersion": "9"
+ },
+ {
+ "guid": "toolkit@mozilla.org",
+ "minVersion": "10",
+ "maxVersion": "11"
+ }
+ ]
+ }]
+ },
+ {
+ "matchName": "^test_bug449027_22$",
+ "versionRange": [{
+ "targetApplication": [{
+ "guid": "foo@bar.com"
+ },
+ {
+ "guid": "toolkit@mozilla.org",
+ "minVersion": "8"
+ }]
+ }]
+ },
+ {
+ "matchName": "^test_bug449027_23$",
+ "versionRange": [{
+ "targetApplication": [{
+ "guid": "toolkit@mozilla.org",
+ "minVersion": "7"
+ },
+ {
+ "guid": "foo@bar.com"
+ }]
+ }]
+ },
+ {
+ "matchName": "^test_bug449027_24$",
+ "versionRange": [{
+ "targetApplication": [{
+ "maxVersion": "8",
+ "guid": "toolkit@mozilla.org"
+ }]
+ }]
+ },
+ {
+ "matchName": "^test_bug449027_25$",
+ "versionRange": [{
+ "targetApplication": [{
+ "guid": "toolkit@mozilla.org",
+ "maxVersion": "9"
+ }]
+ }]
+ }
+]
+
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/test_bug449027_toolkit.xml b/toolkit/mozapps/extensions/test/xpcshell/data/test_bug449027_toolkit.xml
new file mode 100644
index 0000000000..ad8ec5ed9d
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/test_bug449027_toolkit.xml
@@ -0,0 +1,208 @@
+<?xml version="1.0" encoding="UTF-8"?>
+
+<blocklist xmlns="http://www.mozilla.org/2006/addons-blocklist">
+ <emItems>
+ <!-- All extensions are version 5 and tests run against toolkitVersion 8 -->
+
+ <!-- Test 1-14 not listed, should never get blocked -->
+
+ <!-- Should block for any version of the app -->
+ <emItem id="test_bug449027_15@tests.mozilla.org">
+ <versionRange>
+ <targetApplication id="toolkit@mozilla.org"/>
+ </versionRange>
+ </emItem>
+ <!-- Should still block -->
+ <emItem id="test_bug449027_16@tests.mozilla.org">
+ <versionRange>
+ <targetApplication id="toolkit@mozilla.org">
+ <versionRange/>
+ </targetApplication>
+ </versionRange>
+ </emItem>
+ <!-- Not blocked since neither version range matches -->
+ <emItem id="test_bug449027_17@tests.mozilla.org">
+ <versionRange>
+ <targetApplication id="toolkit@mozilla.org">
+ <versionRange minVersion="9"/>
+ <versionRange maxVersion="7"/>
+ </targetApplication>
+ </versionRange>
+ </emItem>
+ <!-- Invalid version range, should not block -->
+ <emItem id="test_bug449027_18@tests.mozilla.org">
+ <versionRange>
+ <targetApplication id="toolkit@mozilla.org">
+ <versionRange minVersion="11" maxVersion="9"/>
+ </targetApplication>
+ </versionRange>
+ </emItem>
+ <!-- Should block all of these -->
+ <emItem id="test_bug449027_19@tests.mozilla.org">
+ <versionRange>
+ <targetApplication id="foo@bar.com"/>
+ <targetApplication id="toolkit@mozilla.org">
+ <versionRange minVersion="10" maxVersion="11"/>
+ <versionRange minVersion="8" maxVersion="9"/>
+ <versionRange maxVersion="7"/>
+ </targetApplication>
+ </versionRange>
+ </emItem>
+ <emItem id="test_bug449027_20@tests.mozilla.org">
+ <versionRange>
+ <targetApplication id="toolkit@mozilla.org">
+ <versionRange maxVersion="7"/>
+ <versionRange minVersion="7" maxVersion="8"/>
+ <versionRange minVersion="9" maxVersion="10"/>
+ </targetApplication>
+ <targetApplication id="foo@bar.com"/>
+ </versionRange>
+ </emItem>
+ <emItem id="test_bug449027_21@tests.mozilla.org">
+ <versionRange>
+ <targetApplication id="toolkit@mozilla.org">
+ <versionRange minVersion="6" maxVersion="6"/>
+ <versionRange minVersion="7" maxVersion="9"/>
+ <versionRange minVersion="10" maxVersion="11"/>
+ </targetApplication>
+ </versionRange>
+ </emItem>
+ <emItem id="test_bug449027_22@tests.mozilla.org">
+ <versionRange>
+ <targetApplication id="foo@bar.com"/>
+ <targetApplication id="toolkit@mozilla.org">
+ <versionRange minVersion="8"/>
+ </targetApplication>
+ </versionRange>
+ </emItem>
+ <emItem id="test_bug449027_23@tests.mozilla.org">
+ <versionRange>
+ <targetApplication id="toolkit@mozilla.org">
+ <versionRange minVersion="7"/>
+ </targetApplication>
+ <targetApplication id="foo@bar.com"/>
+ </versionRange>
+ </emItem>
+ <emItem id="test_bug449027_24@tests.mozilla.org">
+ <versionRange>
+ <targetApplication id="toolkit@mozilla.org">
+ <versionRange maxVersion="8"/>
+ </targetApplication>
+ </versionRange>
+ </emItem>
+ <emItem id="test_bug449027_25@tests.mozilla.org">
+ <versionRange>
+ <targetApplication id="toolkit@mozilla.org">
+ <versionRange maxVersion="9"/>
+ </targetApplication>
+ </versionRange>
+ </emItem>
+ </emItems>
+ <pluginItems>
+ <!-- All plugins are version 5 and tests run against appVersion 3 -->
+
+ <!-- Test 1-14 not listed, should never get blocked -->
+ <!-- Should block for any version of the app -->
+ <pluginItem>
+ <match name="name" exp="^test_bug449027_15$"/>
+ <versionRange>
+ <targetApplication id="toolkit@mozilla.org"/>
+ </versionRange>
+ </pluginItem>
+ <!-- Should still block -->
+ <pluginItem>
+ <match name="name" exp="^test_bug449027_16$"/>
+ <versionRange>
+ <targetApplication id="toolkit@mozilla.org">
+ <versionRange/>
+ </targetApplication>
+ </versionRange>
+ </pluginItem>
+ <!-- Not blocked since neither version range matches -->
+ <pluginItem>
+ <match name="name" exp="^test_bug449027_17$"/>
+ <versionRange>
+ <targetApplication id="toolkit@mozilla.org">
+ <versionRange minVersion="9"/>
+ <versionRange maxVersion="7"/>
+ </targetApplication>
+ </versionRange>
+ </pluginItem>
+ <!-- Invalid version range, should not block -->
+ <pluginItem>
+ <match name="name" exp="^test_bug449027_18$"/>
+ <versionRange>
+ <targetApplication id="toolkit@mozilla.org">
+ <versionRange minVersion="11" maxVersion="9"/>
+ </targetApplication>
+ </versionRange>
+ </pluginItem>
+ <!-- Should block all of these -->
+ <pluginItem>
+ <match name="name" exp="^test_bug449027_19$"/>
+ <versionRange>
+ <targetApplication id="foo@bar.com"/>
+ <targetApplication id="toolkit@mozilla.org">
+ <versionRange minVersion="10" maxVersion="11"/>
+ <versionRange minVersion="8" maxVersion="9"/>
+ <versionRange maxVersion="7"/>
+ </targetApplication>
+ </versionRange>
+ </pluginItem>
+ <pluginItem>
+ <match name="name" exp="^test_bug449027_20$"/>
+ <versionRange>
+ <targetApplication id="toolkit@mozilla.org">
+ <versionRange maxVersion="7"/>
+ <versionRange minVersion="7" maxVersion="8"/>
+ <versionRange minVersion="9" maxVersion="10"/>
+ </targetApplication>
+ <targetApplication id="foo@bar.com"/>
+ </versionRange>
+ </pluginItem>
+ <pluginItem>
+ <match name="name" exp="^test_bug449027_21$"/>
+ <versionRange>
+ <targetApplication id="toolkit@mozilla.org">
+ <versionRange minVersion="6" maxVersion="6"/>
+ <versionRange minVersion="7" maxVersion="9"/>
+ <versionRange minVersion="10" maxVersion="11"/>
+ </targetApplication>
+ </versionRange>
+ </pluginItem>
+ <pluginItem>
+ <match name="name" exp="^test_bug449027_22$"/>
+ <versionRange>
+ <targetApplication id="foo@bar.com"/>
+ <targetApplication id="toolkit@mozilla.org">
+ <versionRange minVersion="8"/>
+ </targetApplication>
+ </versionRange>
+ </pluginItem>
+ <pluginItem>
+ <match name="name" exp="^test_bug449027_23$"/>
+ <versionRange>
+ <targetApplication id="toolkit@mozilla.org">
+ <versionRange minVersion="7"/>
+ </targetApplication>
+ <targetApplication id="foo@bar.com"/>
+ </versionRange>
+ </pluginItem>
+ <pluginItem>
+ <match name="name" exp="^test_bug449027_24$"/>
+ <versionRange>
+ <targetApplication id="toolkit@mozilla.org">
+ <versionRange maxVersion="8"/>
+ </targetApplication>
+ </versionRange>
+ </pluginItem>
+ <pluginItem>
+ <match name="name" exp="^test_bug449027_25$"/>
+ <versionRange>
+ <targetApplication id="toolkit@mozilla.org">
+ <versionRange maxVersion="9"/>
+ </targetApplication>
+ </versionRange>
+ </pluginItem>
+ </pluginItems>
+</blocklist>
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/test_bug468528.xml b/toolkit/mozapps/extensions/test/xpcshell/data/test_bug468528.xml
new file mode 100644
index 0000000000..85f0da57ce
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/test_bug468528.xml
@@ -0,0 +1,15 @@
+<?xml version="1.0" encoding="UTF-8"?>
+
+<blocklist xmlns="http://www.mozilla.org/2006/addons-blocklist">
+ <pluginItems>
+ <pluginItem>
+ <match name="name" exp="^test_bug468528_1"/>
+ </pluginItem>
+ <pluginItem>
+ <match name="name" exp="^test_bug468528_2["/>
+ </pluginItem>
+ <pluginItem>
+ <match name="name" exp="^test_bug468528_3"/>
+ </pluginItem>
+ </pluginItems>
+</blocklist>
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/test_bug514327_1.xml b/toolkit/mozapps/extensions/test/xpcshell/data/test_bug514327_1.xml
new file mode 100644
index 0000000000..c4cc2fe37a
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/test_bug514327_1.xml
@@ -0,0 +1,17 @@
+<?xml version="1.0" encoding="UTF-8"?>
+
+<blocklist xmlns="http://www.mozilla.org/2006/addons-blocklist">
+ <pluginItems>
+ <pluginItem>
+ <match name="name" exp="^test_bug514327_1"/>
+ </pluginItem>
+ <pluginItem>
+ <match name="name" exp="^test_bug514327_2"/>
+ <versionRange severity="0"/>
+ </pluginItem>
+ <pluginItem>
+ <match name="name" exp="^test_bug514327_3"/>
+ <versionRange severity="0"/>
+ </pluginItem>
+ </pluginItems>
+</blocklist>
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/test_bug514327_2.xml b/toolkit/mozapps/extensions/test/xpcshell/data/test_bug514327_2.xml
new file mode 100644
index 0000000000..cc0a0c69df
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/test_bug514327_2.xml
@@ -0,0 +1,10 @@
+<?xml version="1.0" encoding="UTF-8"?>
+
+<blocklist xmlns="http://www.mozilla.org/2006/addons-blocklist">
+ <pluginItems>
+ <pluginItem>
+ <match name="name" exp="Test Plug-in"/>
+ <versionRange severity="0"/>
+ </pluginItem>
+ </pluginItems>
+</blocklist>
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/test_bug514327_3_empty.xml b/toolkit/mozapps/extensions/test/xpcshell/data/test_bug514327_3_empty.xml
new file mode 100644
index 0000000000..0261794f8a
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/test_bug514327_3_empty.xml
@@ -0,0 +1,4 @@
+<?xml version="1.0" encoding="UTF-8"?>
+
+<blocklist xmlns="http://www.mozilla.org/2006/addons-blocklist">
+</blocklist>
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/test_bug514327_3_outdated_1.xml b/toolkit/mozapps/extensions/test/xpcshell/data/test_bug514327_3_outdated_1.xml
new file mode 100644
index 0000000000..d651f87996
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/test_bug514327_3_outdated_1.xml
@@ -0,0 +1,13 @@
+<?xml version="1.0" encoding="UTF-8"?>
+
+<blocklist xmlns="http://www.mozilla.org/2006/addons-blocklist">
+ <pluginItems>
+ <pluginItem>
+ <match name="name" exp="test_bug514327_1"/>
+ </pluginItem>
+ <pluginItem>
+ <match name="name" exp="test_bug514327_outdated"/>
+ <versionRange severity="0"/>
+ </pluginItem>
+ </pluginItems>
+</blocklist>
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/test_bug514327_3_outdated_2.xml b/toolkit/mozapps/extensions/test/xpcshell/data/test_bug514327_3_outdated_2.xml
new file mode 100644
index 0000000000..208444681e
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/test_bug514327_3_outdated_2.xml
@@ -0,0 +1,13 @@
+<?xml version="1.0" encoding="UTF-8"?>
+
+<blocklist xmlns="http://www.mozilla.org/2006/addons-blocklist">
+ <pluginItems>
+ <pluginItem>
+ <match name="name" exp="test_bug514327_2"/>
+ </pluginItem>
+ <pluginItem>
+ <match name="name" exp="test_bug514327_outdated"/>
+ <versionRange severity="0"/>
+ </pluginItem>
+ </pluginItems>
+</blocklist>
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/test_bug655254.json b/toolkit/mozapps/extensions/test/xpcshell/data/test_bug655254.json
new file mode 100644
index 0000000000..3b1dd81dab
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/test_bug655254.json
@@ -0,0 +1,17 @@
+{
+ "addons": {
+ "addon1@tests.mozilla.org": {
+ "updates": [
+ {
+ "applications": {
+ "gecko": {
+ "strict_min_version": "1",
+ "advisory_max_version": "2"
+ }
+ },
+ "version": "1"
+ }
+ ]
+ }
+ }
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/test_corrupt.json b/toolkit/mozapps/extensions/test/xpcshell/data/test_corrupt.json
new file mode 100644
index 0000000000..7cb48d4798
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/test_corrupt.json
@@ -0,0 +1,30 @@
+{
+ "addons": {
+ "addon3@tests.mozilla.org": {
+ "updates": [
+ {
+ "applications": {
+ "gecko": {
+ "strict_min_version": "1",
+ "advisory_max_version": "2"
+ }
+ },
+ "version": "1.0"
+ }
+ ]
+ },
+ "addon4@tests.mozilla.org": {
+ "updates": [
+ {
+ "applications": {
+ "gecko": {
+ "strict_min_version": "1",
+ "advisory_max_version": "2"
+ }
+ },
+ "version": "1.0"
+ }
+ ]
+ }
+ }
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/test_delay_updates_complete.json b/toolkit/mozapps/extensions/test/xpcshell/data/test_delay_updates_complete.json
new file mode 100644
index 0000000000..72619d825c
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/test_delay_updates_complete.json
@@ -0,0 +1,11 @@
+{
+ "addons": {
+ "test_delay_update_complete_webext@tests.mozilla.org": {
+ "updates": [
+ { "version": "2.0",
+ "update_link": "http://example.com/addons/test_delay_update_complete_webextension_v2.xpi"
+ }
+ ]
+ }
+ }
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/test_delay_updates_complete_legacy.json b/toolkit/mozapps/extensions/test/xpcshell/data/test_delay_updates_complete_legacy.json
new file mode 100644
index 0000000000..125d1b1a91
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/test_delay_updates_complete_legacy.json
@@ -0,0 +1,18 @@
+{
+ "addons": {
+ "test_delay_update_complete@tests.mozilla.org": {
+ "updates": [
+ {
+ "applications": {
+ "gecko": {
+ "strict_min_version": "1",
+ "advisory_max_version": "1"
+ }
+ },
+ "version": "2.0",
+ "update_link": "http://example.com/addons/test_delay_update_complete_v2.xpi"
+ }
+ ]
+ }
+ }
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/test_delay_updates_defer.json b/toolkit/mozapps/extensions/test/xpcshell/data/test_delay_updates_defer.json
new file mode 100644
index 0000000000..b03d635e47
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/test_delay_updates_defer.json
@@ -0,0 +1,11 @@
+{
+ "addons": {
+ "test_delay_update_defer_webext@tests.mozilla.org": {
+ "updates": [
+ { "version": "2.0",
+ "update_link": "http://example.com/addons/test_delay_update_defer_webextension_v2.xpi"
+ }
+ ]
+ }
+ }
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/test_delay_updates_defer_legacy.json b/toolkit/mozapps/extensions/test/xpcshell/data/test_delay_updates_defer_legacy.json
new file mode 100644
index 0000000000..d434fe2e17
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/test_delay_updates_defer_legacy.json
@@ -0,0 +1,18 @@
+{
+ "addons": {
+ "test_delay_update_defer@tests.mozilla.org": {
+ "updates": [
+ {
+ "applications": {
+ "gecko": {
+ "strict_min_version": "1",
+ "advisory_max_version": "1"
+ }
+ },
+ "version": "2.0",
+ "update_link": "http://example.com/addons/test_delay_update_defer_v2.xpi"
+ }
+ ]
+ }
+ }
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/test_delay_updates_ignore.json b/toolkit/mozapps/extensions/test/xpcshell/data/test_delay_updates_ignore.json
new file mode 100644
index 0000000000..4b2e527960
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/test_delay_updates_ignore.json
@@ -0,0 +1,11 @@
+{
+ "addons": {
+ "test_delay_update_ignore_webext@tests.mozilla.org": {
+ "updates": [
+ { "version": "2.0",
+ "update_link": "http://example.com/addons/test_delay_update_ignore_webextension_v2.xpi"
+ }
+ ]
+ }
+ }
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/test_delay_updates_ignore_legacy.json b/toolkit/mozapps/extensions/test/xpcshell/data/test_delay_updates_ignore_legacy.json
new file mode 100644
index 0000000000..bc46fab8fd
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/test_delay_updates_ignore_legacy.json
@@ -0,0 +1,18 @@
+{
+ "addons": {
+ "test_delay_update_ignore@tests.mozilla.org": {
+ "updates": [
+ {
+ "applications": {
+ "gecko": {
+ "strict_min_version": "1",
+ "advisory_max_version": "1"
+ }
+ },
+ "version": "2.0",
+ "update_link": "http://example.com/addons/test_delay_update_ignore_v2.xpi"
+ }
+ ]
+ }
+ }
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/test_gfxBlacklist.json b/toolkit/mozapps/extensions/test/xpcshell/data/test_gfxBlacklist.json
new file mode 100644
index 0000000000..6efc854849
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/test_gfxBlacklist.json
@@ -0,0 +1,352 @@
+[
+ {
+ "blockID": "g35",
+ "os": "WINNT 6.1",
+ "vendor": "0xabcd",
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " DIRECT2D ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION ",
+ "driverVersion": " 8.52.322.2202 ",
+ "driverVersionComparator": " LESS_THAN "
+ },
+ {
+ "os": "WINNT 6.0",
+ "vendor": "0xdcba",
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " DIRECT3D_9_LAYERS ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION ",
+ "driverVersion": " 8.52.322.2202 ",
+ "driverVersionComparator": " LESS_THAN "
+ },
+ {
+ "blockID": "g36",
+ "os": "WINNT 6.1",
+ "vendor": "0xabab",
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " DIRECT2D ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION ",
+ "driverVersion": " 8.52.322.2202 ",
+ "driverVersionComparator": " GREATER_THAN_OR_EQUAL "
+ },
+ {
+ "os": "WINNT 6.1",
+ "vendor": "0xdcdc",
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " DIRECT2D ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION ",
+ "driverVersion": " 8.52.322.1111 ",
+ "driverVersionComparator": " EQUAL "
+ },
+ {
+ "os": "Darwin 13",
+ "vendor": "0xabcd",
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " DIRECT2D ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+ {
+ "os": "Linux",
+ "vendor": "0xabcd",
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " DIRECT2D ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+ {
+ "os": "Android",
+ "vendor": "abcd",
+ "devices": [
+ "wxyz",
+ "asdf",
+ "erty"
+ ],
+ "feature": " DIRECT2D ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION ",
+ "driverVersion": " 5 ",
+ "driverVersionComparator": " LESS_THAN_OR_EQUAL "
+ },
+ {
+ "os": "Android",
+ "vendor": "dcdc",
+ "devices": [
+ "uiop",
+ "vbnm",
+ "hjkl"
+ ],
+ "feature": " DIRECT2D ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION ",
+ "driverVersion": " 5 ",
+ "driverVersionComparator": " EQUAL "
+ },
+ {
+ "os": "Android",
+ "vendor": "abab",
+ "devices": [
+ "ghjk",
+ "cvbn"
+ ],
+ "feature": " DIRECT2D ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION ",
+ "driverVersion": " 7 ",
+ "driverVersionComparator": " GREATER_THAN_OR_EQUAL "
+ },
+ {
+ "os": "WINNT 6.1",
+ "vendor": "0xabcd",
+ "devices": [
+ "0x6666"
+ ],
+ "feature": " DIRECT2D ",
+ "featureStatus": " BLOCKED_DEVICE "
+ },
+ {
+ "os": "Darwin 13",
+ "vendor": "0xabcd",
+ "devices": [
+ "0x6666"
+ ],
+ "feature": " DIRECT2D ",
+ "featureStatus": " BLOCKED_DEVICE "
+ },
+ {
+ "os": "Linux",
+ "vendor": "0xabcd",
+ "devices": [
+ "0x6666"
+ ],
+ "feature": " DIRECT2D ",
+ "featureStatus": " BLOCKED_DEVICE "
+ },
+ {
+ "os": "Android",
+ "vendor": "0xabcd",
+ "devices": [
+ "0x6666"
+ ],
+ "feature": " DIRECT2D ",
+ "featureStatus": " BLOCKED_DEVICE "
+ },
+ {
+ "os": "WINNT 6.1",
+ "vendor": "0xabcd",
+ "devices": [
+ "0x6666"
+ ],
+ "feature": " WEBRENDER ",
+ "featureStatus": " BLOCKED_DEVICE "
+ },
+ {
+ "os": "Darwin 13",
+ "vendor": "0xabcd",
+ "devices": [
+ "0x6666"
+ ],
+ "feature": " WEBRENDER ",
+ "featureStatus": " BLOCKED_DEVICE "
+ },
+ {
+ "os": "Linux",
+ "vendor": "0xabcd",
+ "devices": [
+ "0x6666"
+ ],
+ "feature": " WEBRENDER ",
+ "featureStatus": " BLOCKED_DEVICE "
+ },
+ {
+ "os": "Android",
+ "vendor": "0xabcd",
+ "devices": [
+ "0x6666"
+ ],
+ "feature": " WEBRENDER ",
+ "featureStatus": " BLOCKED_DEVICE "
+ },
+
+ {
+ "os": "All",
+ "vendor": "0xdcdc",
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " DIRECT3D_11_LAYERS ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION ",
+ "driverVersion": " 8.52.322.1112 ",
+ "driverVersionMax": " 8.52.323.1000 ",
+ "driverVersionComparator": " BETWEEN_EXCLUSIVE "
+ },
+
+ {
+ "os": "All",
+ "vendor": "0xdcdc",
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " OPENGL_LAYERS ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION ",
+ "driverVersion": " 8.50.322.1000 ",
+ "driverVersionMax": " 8.52.322.1112 ",
+ "driverVersionComparator": " BETWEEN_EXCLUSIVE "
+ },
+
+ {
+ "os": "All",
+ "vendor": "0xdcdc",
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " DIRECT3D_11_ANGLE ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION ",
+ "driverVersion": " 8.52.322.1000 ",
+ "driverVersionMax": " 9.52.322.1000 ",
+ "driverVersionComparator": " BETWEEN_EXCLUSIVE "
+ },
+
+ {
+ "os": "All",
+ "vendor": "0xdcdc",
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " HARDWARE_VIDEO_DECODING ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION ",
+ "driverVersion": " 7.82.322.1000 ",
+ "driverVersionMax": " 9.25.322.1001 ",
+ "driverVersionComparator": " BETWEEN_INCLUSIVE "
+ },
+
+ {
+ "os": "All",
+ "vendor": "0xdcdc",
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " WEBRTC_HW_ACCELERATION_H264 ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION ",
+ "driverVersion": " 8.52.322.1112 ",
+ "driverVersionMax": " 9.52.322.1300 ",
+ "driverVersionComparator": " BETWEEN_INCLUSIVE "
+ },
+
+ {
+ "os": "All",
+ "vendor": "0xdcdc",
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " WEBRTC_HW_ACCELERATION_DECODE ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION ",
+ "driverVersion": " 8.52.322.1000 ",
+ "driverVersionMax": " 8.52.322.1112 ",
+ "driverVersionComparator": " BETWEEN_INCLUSIVE "
+ },
+
+ {
+ "os": "All",
+ "vendor": "0xdcdc",
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " WEBRTC_HW_ACCELERATION_ENCODE ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION ",
+ "driverVersion": " 8.52.322.1112 ",
+ "driverVersionMax": " 8.52.322.1200 ",
+ "driverVersionComparator": " BETWEEN_INCLUSIVE_START "
+ },
+ {
+ "os": "All",
+ "vendor": "0xdcdc",
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " WEBGL_MSAA ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION ",
+ "driverVersion": " 8.52.322.1000 ",
+ "driverVersionMax": " 8.52.322.1200 ",
+ "driverVersionComparator": " BETWEEN_INCLUSIVE_START "
+ },
+
+ {
+ "os": "All",
+ "vendor": "0xdcdc",
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " WEBGL_ANGLE ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION ",
+ "driverVersion": " 8.52.322.1000 ",
+ "driverVersionMax": " 8.52.322.1112 ",
+ "driverVersionComparator": " BETWEEN_INCLUSIVE_START "
+ },
+
+ {
+ "os": "All",
+ "vendor": "0xdcdc",
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " WEBGL2 ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION ",
+ "driverVersion": " 8.52.322.1000 ",
+ "driverVersionMax": " 8.52.322.1112 ",
+ "driverVersionComparator": " BETWEEN_INCLUSIVE_START "
+ },
+
+ {
+ "os": "All",
+ "vendor": "0xdcdc",
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " CANVAS2D_ACCELERATION ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION ",
+ "driverVersion": " 8.52.322.1000 ",
+ "driverVersionMax": " 9.52.322.1000 ",
+ "driverVersionComparator": " BETWEEN_EXCLUSIVE "
+ }
+]
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/test_gfxBlacklist_AllOS.json b/toolkit/mozapps/extensions/test/xpcshell/data/test_gfxBlacklist_AllOS.json
new file mode 100755
index 0000000000..7072736127
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/test_gfxBlacklist_AllOS.json
@@ -0,0 +1,837 @@
+[
+ {
+ "blockID": "g1",
+ "os": "All",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "15.0", "maxVersion": "15.0"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " DIRECT2D ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "blockID": "g2",
+ "os": "All",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "15.0", "maxVersion": "22.0a1"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " DIRECT3D_9_LAYERS ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "All",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "16.0a1"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " DIRECT3D_10_LAYERS",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "All",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "16.0a1", "maxVersion": "22.0"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " DIRECT3D_10_1_LAYERS ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "All",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "12.0", "maxVersion": "16.0"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " OPENGL_LAYERS ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "blockID": "g11",
+ "os": "All",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "14.0b2", "maxVersion": "15.0"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " WEBGL_OPENGL ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "All",
+ "vendor": "0xabcd",
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " WEBGL_ANGLE ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "All",
+ "vendor": "0xabcd",
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " WEBGL2 ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "All",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "12.0", "maxVersion": "16.0"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " WEBGL_MSAA ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "All",
+ "vendor": "0xabcd",
+ "versionRange": {"maxVersion": "13.0"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " STAGEFRIGHT ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "All",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "42.0", "maxVersion": "13.0b2"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " WEBRTC_HW_ACCELERATION_H264 ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "All",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "42.0", "maxVersion": "13.0b2"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " WEBRTC_HW_ACCELERATION_ENCODE ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "All",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "42.0", "maxVersion": "13.0b2"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " WEBRTC_HW_ACCELERATION_DECODE ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "All",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "17.2a2", "maxVersion": "15.0"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " DIRECT3D_11_LAYERS ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "All",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "15.0", "maxVersion": "13.2"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " HARDWARE_VIDEO_DECODING ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "All",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "10.5", "maxVersion": "13.0"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " DIRECT3D_11_ANGLE ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "blockID": "g1",
+ "os": "Darwin 13",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "15.0", "maxVersion": "15.0"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " DIRECT2D ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "blockID": "g2",
+ "os": "Darwin 13",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "15.0", "maxVersion": "22.0a1"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " DIRECT3D_9_LAYERS ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "Darwin 13",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "16.0a1"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " DIRECT3D_10_LAYERS",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "Darwin 13",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "16.0a1", "maxVersion": "22.0"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " DIRECT3D_10_1_LAYERS ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "Darwin 13",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "12.0", "maxVersion": "16.0"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " OPENGL_LAYERS ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "blockID": "g11",
+ "os": "Darwin 13",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "14.0b2", "maxVersion": "15.0"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " WEBGL_OPENGL ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "Darwin 13",
+ "vendor": "0xabcd",
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " WEBGL_ANGLE ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "Darwin 13",
+ "vendor": "0xabcd",
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " WEBGL2 ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "Darwin 13",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "12.0", "maxVersion": "16.0"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " WEBGL_MSAA ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "Darwin 13",
+ "vendor": "0xabcd",
+ "versionRange": {"maxVersion": "13.0"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " STAGEFRIGHT ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "Darwin 13",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "42.0", "maxVersion": "13.0b2"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " WEBRTC_HW_ACCELERATION_H264 ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "Darwin 13",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "42.0", "maxVersion": "13.0b2"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " WEBRTC_HW_ACCELERATION_ENCODE ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "Darwin 13",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "42.0", "maxVersion": "13.0b2"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " WEBRTC_HW_ACCELERATION_DECODE ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "Darwin 13",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "17.2a2", "maxVersion": "15.0"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " DIRECT3D_11_LAYERS ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "Darwin 13",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "15.0", "maxVersion": "13.2"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " HARDWARE_VIDEO_DECODING ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "Darwin 13",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "10.5", "maxVersion": "13.0"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " DIRECT3D_11_ANGLE ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "blockID": "g1",
+ "os": "Linux",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "15.0", "maxVersion": "15.0"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " DIRECT2D ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "blockID": "g2",
+ "os": "Linux",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "15.0", "maxVersion": "22.0a1"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " DIRECT3D_9_LAYERS ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "Linux",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "16.0a1"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " DIRECT3D_10_LAYERS",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "Linux",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "16.0a1", "maxVersion": "22.0"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " DIRECT3D_10_1_LAYERS ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "Linux",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "12.0", "maxVersion": "16.0"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " OPENGL_LAYERS ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "blockID": "g11",
+ "os": "Linux",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "14.0b2", "maxVersion": "15.0"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " WEBGL_OPENGL ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "Linux",
+ "vendor": "0xabcd",
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " WEBGL_ANGLE ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "Linux",
+ "vendor": "0xabcd",
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " WEBGL2 ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "Linux",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "12.0", "maxVersion": "16.0"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " WEBGL_MSAA ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "Linux",
+ "vendor": "0xabcd",
+ "versionRange": {"maxVersion": "13.0"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " STAGEFRIGHT ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "Linux",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "42.0", "maxVersion": "13.0b2"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " WEBRTC_HW_ACCELERATION_H264 ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "Linux",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "42.0", "maxVersion": "13.0b2"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " WEBRTC_HW_ACCELERATION_ENCODE ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "Linux",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "42.0", "maxVersion": "13.0b2"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " WEBRTC_HW_ACCELERATION_DECODE ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "Linux",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "17.2a2", "maxVersion": "15.0"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " DIRECT3D_11_LAYERS ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "Linux",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "15.0", "maxVersion": "13.2"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " HARDWARE_VIDEO_DECODING ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "Linux",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "10.5", "maxVersion": "13.0"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " DIRECT3D_11_ANGLE ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "blockID": "g1",
+ "os": "Android",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "15.0", "maxVersion": "15.0"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " DIRECT2D ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "blockID": "g2",
+ "os": "Android",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "15.0", "maxVersion": "22.0a1"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " DIRECT3D_9_LAYERS ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "Android",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "16.0a1"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " DIRECT3D_10_LAYERS",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "Android",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "16.0a1", "maxVersion": "22.0"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " DIRECT3D_10_1_LAYERS ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "Android",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "12.0", "maxVersion": "16.0"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " OPENGL_LAYERS ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "blockID": "g11",
+ "os": "Android",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "14.0b2", "maxVersion": "15.0"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " WEBGL_OPENGL ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "Android",
+ "vendor": "0xabcd",
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " WEBGL_ANGLE ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "Android",
+ "vendor": "0xabcd",
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " WEBGL2 ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "Android",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "12.0", "maxVersion": "16.0"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " WEBGL_MSAA ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "Android",
+ "vendor": "0xabcd",
+ "versionRange": {"maxVersion": "13.0"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " STAGEFRIGHT ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "Android",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "42.0", "maxVersion": "13.0b2"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " WEBRTC_HW_ACCELERATION_H264 ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "Android",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "42.0", "maxVersion": "13.0b2"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " WEBRTC_HW_ACCELERATION_ENCODE ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "Android",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "42.0", "maxVersion": "13.0b2"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " WEBRTC_HW_ACCELERATION_DECODE ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "Android",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "17.2a2", "maxVersion": "15.0"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " DIRECT3D_11_LAYERS ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "Android",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "15.0", "maxVersion": "13.2"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " HARDWARE_VIDEO_DECODING ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ },
+
+ {
+ "os": "Android",
+ "vendor": "0xabcd",
+ "versionRange": {"minVersion": "10.5", "maxVersion": "13.0"},
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " DIRECT3D_11_ANGLE ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION "
+ }
+]
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/test_gfxBlacklist_OSVersion.json b/toolkit/mozapps/extensions/test/xpcshell/data/test_gfxBlacklist_OSVersion.json
new file mode 100644
index 0000000000..fa4f03dc32
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/test_gfxBlacklist_OSVersion.json
@@ -0,0 +1,28 @@
+[
+ {
+ "os": "WINNT 6.2",
+ "vendor": "0xabcd",
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " DIRECT2D ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION ",
+ "driverVersion": " 8.52.322.2202 ",
+ "driverVersionComparator": " LESS_THAN "
+ },
+ {
+ "os": "Darwin 13",
+ "vendor": "0xabcd",
+ "devices": [
+ "0x2783",
+ "0x1234",
+ "0x2782"
+ ],
+ "feature": " OPENGL_LAYERS ",
+ "featureStatus": " BLOCKED_DRIVER_VERSION ",
+ "driverVersion": " 8.52.322.2202 ",
+ "driverVersionComparator": " LESS_THAN "
+ }
+]
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/test_install_addons.json b/toolkit/mozapps/extensions/test/xpcshell/data/test_install_addons.json
new file mode 100644
index 0000000000..cb1f2f4fae
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/test_install_addons.json
@@ -0,0 +1,31 @@
+{
+ "page_size": 25,
+ "page_count": 1,
+ "count": 1,
+ "next": null,
+ "previous": null,
+ "results": [
+ {
+ "name": "Real Test 2",
+ "type": "extension",
+ "guid": "addon2@tests.mozilla.org",
+ "current_version": {
+ "version": "1.0",
+ "files": [
+ {
+ "size": 2,
+ "url": "http://example.com/browser/toolkit/mozapps/extensions/test/browser/addons/browser_install1_2.xpi"
+ }
+ ]
+ },
+ "authors": [
+ {
+ "name": "Test Creator",
+ "url": "http://example.com/creator.html"
+ }
+ ],
+ "summary": "Repository summary",
+ "description": "Repository description"
+ }
+ ]
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/test_install_compat.json b/toolkit/mozapps/extensions/test/xpcshell/data/test_install_compat.json
new file mode 100644
index 0000000000..a068197648
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/test_install_compat.json
@@ -0,0 +1,27 @@
+{
+ "page_size": 25,
+ "page_count": 1,
+ "count": 1,
+ "next": null,
+ "previous": null,
+ "results": [
+ {
+ "addon_guid": "addon6@tests.mozilla.org",
+ "name": "Addon Test 6",
+ "version_ranges": [
+ {
+ "addon_min_version": "1.0",
+ "addon_max_version": "1.0",
+ "applications": [
+ {
+ "name": "XPCShell",
+ "guid": "xpcshell@tests.mozilla.org",
+ "min_version": "1.0",
+ "max_version": "1.0"
+ }
+ ]
+ }
+ ]
+ }
+ ]
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/test_no_update.json b/toolkit/mozapps/extensions/test/xpcshell/data/test_no_update.json
new file mode 100644
index 0000000000..2773c7f98f
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/test_no_update.json
@@ -0,0 +1,7 @@
+{
+ "addons": {
+ "test_no_update_webext@tests.mozilla.org": {
+ "updates": []
+ }
+ }
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/test_overrideblocklist/ancient.xml b/toolkit/mozapps/extensions/test/xpcshell/data/test_overrideblocklist/ancient.xml
new file mode 100644
index 0000000000..699257f87e
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/test_overrideblocklist/ancient.xml
@@ -0,0 +1,8 @@
+<?xml version="1.0"?>
+<blocklist xmlns="http://www.mozilla.org/2006/addons-blocklist">
+ <emItems>
+ <emItem blockID="i454" id="ancient@tests.mozilla.org">
+ <versionRange minVersion="0" maxVersion="*" severity="3"/>
+ </emItem>
+ </emItems>
+</blocklist>
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/test_overrideblocklist/new.xml b/toolkit/mozapps/extensions/test/xpcshell/data/test_overrideblocklist/new.xml
new file mode 100644
index 0000000000..8cbfb5d6a0
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/test_overrideblocklist/new.xml
@@ -0,0 +1,8 @@
+<?xml version="1.0"?>
+<blocklist xmlns="http://www.mozilla.org/2006/addons-blocklist" lastupdate="1396046918000">
+ <emItems>
+ <emItem blockID="i454" id="new@tests.mozilla.org">
+ <versionRange minVersion="0" maxVersion="*" severity="3"/>
+ </emItem>
+ </emItems>
+</blocklist>
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/test_overrideblocklist/old.xml b/toolkit/mozapps/extensions/test/xpcshell/data/test_overrideblocklist/old.xml
new file mode 100644
index 0000000000..75bd6e934c
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/test_overrideblocklist/old.xml
@@ -0,0 +1,8 @@
+<?xml version="1.0"?>
+<blocklist xmlns="http://www.mozilla.org/2006/addons-blocklist" lastupdate="1296046918000">
+ <emItems>
+ <emItem blockID="i454" id="old@tests.mozilla.org">
+ <versionRange minVersion="0" maxVersion="*" severity="3"/>
+ </emItem>
+ </emItems>
+</blocklist>
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/test_pluginBlocklistCtp.xml b/toolkit/mozapps/extensions/test/xpcshell/data/test_pluginBlocklistCtp.xml
new file mode 100644
index 0000000000..d3564aebdb
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/test_pluginBlocklistCtp.xml
@@ -0,0 +1,26 @@
+<?xml version="1.0" encoding="UTF-8"?>
+
+<blocklist xmlns="http://www.mozilla.org/2006/addons-blocklist">
+ <pluginItems>
+ <pluginItem>
+ <match name="name" exp="^test_plugin_0"/>
+ <versionRange minVersion="0" maxVersion="*" severity="0" vulnerabilitystatus="0"/>
+ </pluginItem>
+ <pluginItem>
+ <match name="name" exp="^test_plugin_1"/>
+ <versionRange minVersion="0" maxVersion="*" severity="0" vulnerabilitystatus="1"/>
+ </pluginItem>
+ <pluginItem>
+ <match name="name" exp="^test_plugin_2"/>
+ <versionRange minVersion="0" maxVersion="*" severity="0" vulnerabilitystatus="2"/>
+ </pluginItem>
+ <pluginItem>
+ <match name="name" exp="^test_plugin_3"/>
+ <versionRange minVersion="0" maxVersion="*" vulnerabilitystatus="2"/>
+ </pluginItem>
+ <pluginItem>
+ <match name="name" exp="^test_plugin_4"/>
+ <versionRange minVersion="0" maxVersion="*" severity="1" vulnerabilitystatus="2"/>
+ </pluginItem>
+ </pluginItems>
+</blocklist>
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/test_pluginBlocklistCtpUndo.xml b/toolkit/mozapps/extensions/test/xpcshell/data/test_pluginBlocklistCtpUndo.xml
new file mode 100644
index 0000000000..7cd8496b36
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/test_pluginBlocklistCtpUndo.xml
@@ -0,0 +1,10 @@
+<?xml version="1.0" encoding="UTF-8"?>
+
+<blocklist xmlns="http://www.mozilla.org/2006/addons-blocklist">
+ <pluginItems>
+ <pluginItem>
+ <match name="name" exp="^Test Plug-in"/>
+ <versionRange minVersion="0" maxVersion="*" severity="0" vulnerabilitystatus="2"/>
+ </pluginItem>
+ </pluginItems>
+</blocklist>
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/test_softblocked1.xml b/toolkit/mozapps/extensions/test/xpcshell/data/test_softblocked1.xml
new file mode 100644
index 0000000000..a1d18470c8
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/test_softblocked1.xml
@@ -0,0 +1,9 @@
+<?xml version="1.0" encoding="UTF-8"?>
+
+<blocklist xmlns="http://www.mozilla.org/2006/addons-blocklist">
+ <emItems>
+ <emItem id="softblock1@tests.mozilla.org">
+ <versionRange severity="1"/>
+ </emItem>
+ </emItems>
+</blocklist>
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/test_update.json b/toolkit/mozapps/extensions/test/xpcshell/data/test_update.json
new file mode 100644
index 0000000000..9e3483d520
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/test_update.json
@@ -0,0 +1,137 @@
+{
+ "addons": {
+ "addon1@tests.mozilla.org": {
+ "updates": [
+ {
+ "version": "1.0",
+ "applications": {
+ "gecko": {
+ "strict_min_version": "1",
+ "strict_min_version": "1"
+ }
+ }
+ },
+ {
+ "version": "1.0",
+ "applications": {
+ "gecko": {
+ "strict_min_version": "2",
+ "strict_min_version": "2"
+ }
+ }
+ },
+ {
+ "version": "2.0",
+ "update_link": "http://example.com/addons/test_update.xpi",
+ "update_info_url": "http://example.com/updateInfo.xhtml",
+ "applications": {
+ "gecko": {
+ "strict_min_version": "1",
+ "strict_min_version": "1"
+ }
+ }
+ }
+ ]
+ },
+
+ "addon2@tests.mozilla.org": {
+ "updates": [
+ {
+ "version": "1.0",
+ "applications": {
+ "gecko": {
+ "strict_min_version": "0",
+ "advisory_max_version": "1"
+ }
+ }
+ }
+ ]
+ },
+
+ "addon2@tests.mozilla.org": {
+ "updates": [
+ {
+ "version": "1.0",
+ "applications": {
+ "gecko": {
+ "strict_min_version": "0",
+ "advisory_max_version": "1"
+ }
+ }
+ }
+ ]
+ },
+
+ "addon3@tests.mozilla.org": {
+ "updates": [
+ {
+ "version": "1.0",
+ "applications": {
+ "gecko": {
+ "strict_min_version": "3",
+ "advisory_max_version": "3"
+ }
+ }
+ }
+ ]
+ },
+
+ "addon4@tests.mozilla.org": {
+ "updates": [
+ {
+ "version": "5.0",
+ "applications": {
+ "gecko": {
+ "strict_min_version": "0",
+ "advisory_max_version": "0"
+ }
+ }
+ }
+ ]
+ },
+
+ "addon7@tests.mozilla.org": {
+ "updates": [
+ {
+ "version": "1.0",
+ "applications": {
+ "gecko": {
+ "strict_min_version": "0",
+ "advisory_max_version": "1"
+ }
+ }
+ }
+ ]
+ },
+
+ "addon8@tests.mozilla.org": {
+ "updates": [
+ {
+ "version": "2.0",
+ "update_link": "http://example.com/addons/test_update8.xpi",
+ "applications": {
+ "gecko": {
+ "strict_min_version": "1",
+ "advisory_max_version": "1"
+ }
+ }
+ }
+ ]
+ },
+
+ "addon12@tests.mozilla.org": {
+ "updates": [
+ {
+ "version": "2.0",
+ "update_link": "http://example.com/addons/test_update12.xpi",
+ "applications": {
+ "gecko": {
+ "strict_min_version": "1",
+ "advisory_max_version": "1"
+ }
+ }
+ }
+ ]
+ }
+ }
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/test_update_addons.json b/toolkit/mozapps/extensions/test/xpcshell/data/test_update_addons.json
new file mode 100644
index 0000000000..3bcbc022e0
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/test_update_addons.json
@@ -0,0 +1,14 @@
+{
+ "page_size": 25,
+ "page_count": 1,
+ "count": 1,
+ "next": null,
+ "previous": null,
+ "results": [
+ {
+ "name": "Ttest Addon 9",
+ "type": "extension",
+ "guid": "addon9@tests.mozilla.org"
+ }
+ ]
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/test_update_compat.json b/toolkit/mozapps/extensions/test/xpcshell/data/test_update_compat.json
new file mode 100644
index 0000000000..9721d3466a
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/test_update_compat.json
@@ -0,0 +1,28 @@
+{
+ "page_size": 25,
+ "page_count": 1,
+ "count": 1,
+ "next": null,
+ "previous": null,
+ "results": [
+ {
+ "addon_guid": "addon9@tests.mozilla.org",
+ "name": "Test Addon 9",
+ "version_ranges": [
+ {
+ "addon_min_version": "4",
+ "addon_max_version": "4",
+ "applications": [
+ {
+ "name": "XPCShell",
+ "id": "XPCShell",
+ "guid": "xpcshell@tests.mozilla.org",
+ "min_version": "1",
+ "max_version": "1"
+ }
+ ]
+ }
+ ]
+ }
+ ]
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/test_updatecheck.json b/toolkit/mozapps/extensions/test/xpcshell/data/test_updatecheck.json
new file mode 100644
index 0000000000..f61bfeacd3
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/test_updatecheck.json
@@ -0,0 +1,269 @@
+{
+ "addons": {
+ "updatecheck1@tests.mozilla.org": {
+ "updates": [
+ {
+ "version": "1.0",
+ "update_link": "https://example.com/addons/test1.xpi",
+ "applications": {
+ "gecko": {
+ "strict_min_version": "1",
+ "strict_max_version": "1"
+ }
+ }
+ },
+ {
+ "_comment_": "This update is incompatible and so should not be considered a valid update",
+ "version": "2.0",
+ "update_link": "https://example.com/addons/test2.xpi",
+ "applications": {
+ "gecko": {
+ "strict_min_version": "2",
+ "strict_max_version": "2"
+ }
+ }
+ },
+ {
+ "version": "3.0",
+ "update_link": "https://example.com/addons/test3.xpi",
+ "applications": {
+ "gecko": {
+ "strict_min_version": "1",
+ "strict_max_version": "1"
+ }
+ }
+ },
+ {
+ "version": "2.0",
+ "update_link": "https://example.com/addons/test2.xpi",
+ "applications": {
+ "gecko": {
+ "strict_min_version": "1",
+ "strict_max_version": "2"
+ }
+ }
+ },
+ {
+ "_comment_": "This update is incompatible and so should not be considered a valid update",
+ "version": "4.0",
+ "update_link": "https://example.com/addons/test4.xpi",
+ "applications": {
+ "gecko": {
+ "strict_min_version": "2",
+ "strict_max_version": "2"
+ }
+ }
+ }
+ ]
+ },
+
+ "test_bug378216_8@tests.mozilla.org": {
+ "_comment_": "The updateLink will be ignored since it is not secure and there is no updateHash.",
+
+ "updates": [
+ {
+ "version": "2.0",
+ "update_link": "http://example.com/broken.xpi",
+ "applications": {
+ "gecko": {
+ "strict_min_version": "1",
+ "strict_max_version": "1"
+ }
+ }
+ }
+ ]
+ },
+
+ "test_bug378216_9@tests.mozilla.org": {
+ "_comment_": "The updateLink will used since there is an updateHash to verify it.",
+
+ "updates": [
+ {
+ "version": "2.0",
+ "update_link": "http://example.com/broken.xpi",
+ "update_hash": "sha256:78fc1d2887eda35b4ad2e3a0b60120ca271ce6e6",
+ "applications": {
+ "gecko": {
+ "strict_min_version": "1",
+ "strict_max_version": "1"
+ }
+ }
+ }
+ ]
+ },
+
+ "test_bug378216_10@tests.mozilla.org": {
+ "_comment_": "The updateLink will used since it is a secure URL.",
+
+ "updates": [
+ {
+ "version": "2.0",
+ "update_link": "https://example.com/broken.xpi",
+ "applications": {
+ "gecko": {
+ "strict_min_version": "1",
+ "strict_max_version": "1"
+ }
+ }
+ }
+ ]
+ },
+
+ "test_bug378216_11@tests.mozilla.org": {
+ "_comment_": "The updateLink will used since it is a secure URL.",
+
+ "updates": [
+ {
+ "version": "2.0",
+ "update_link": "https://example.com/broken.xpi",
+ "applications": {
+ "gecko": {
+ "strict_min_version": "1",
+ "strict_max_version": "1"
+ }
+ }
+ }
+ ]
+ },
+
+ "test_bug378216_12@tests.mozilla.org": {
+ "_comment_": "The updateLink will not be used since the updateHash verifying it is not strong enough.",
+
+ "updates": [
+ {
+ "version": "2.0",
+ "update_link": "http://example.com/broken.xpi",
+ "update_hash": "sha1:78fc1d2887eda35b4ad2e3a0b60120ca271ce6e6",
+ "applications": {
+ "gecko": {
+ "strict_min_version": "1",
+ "strict_max_version": "1"
+ }
+ }
+ }
+ ]
+ },
+
+ "test_bug378216_13@tests.mozilla.org": {
+ "_comment_": "An update with a weak hash. The updateLink will used since it is a secure URL.",
+
+ "updates": [
+ {
+ "version": "2.0",
+ "update_link": "https://example.com/broken.xpi",
+ "update_hash": "sha1:78fc1d2887eda35b4ad2e3a0b60120ca271ce6e6",
+ "applications": {
+ "gecko": {
+ "strict_min_version": "1",
+ "strict_max_version": "1"
+ }
+ }
+ }
+ ]
+ },
+
+ "_comment_": "There should be no information present for test_bug378216_14",
+
+ "test_bug378216_15@tests.mozilla.org": {
+ "_comment_": "Invalid update JSON",
+
+ "updates": "foo"
+ },
+
+ "ignore-compat@tests.mozilla.org": {
+ "_comment_": "Various updates available - one is not compatible, but compatibility checking is disabled",
+
+ "updates": [
+ {
+ "version": "1.0",
+ "update_link": "https://example.com/addons/test1.xpi",
+ "applications": {
+ "gecko": {
+ "strict_min_version": "0.1",
+ "advisory_max_version": "0.2"
+ }
+ }
+ },
+ {
+ "version": "2.0",
+ "update_link": "https://example.com/addons/test2.xpi",
+ "applications": {
+ "gecko": {
+ "strict_min_version": "0.5",
+ "advisory_max_version": "0.6"
+ }
+ }
+ },
+ {
+ "_comment_": "Update for future app versions - should never be compatible",
+ "version": "3.0",
+ "update_link": "https://example.com/addons/test3.xpi",
+ "applications": {
+ "gecko": {
+ "strict_min_version": "2",
+ "advisory_max_version": "3"
+ }
+ }
+ }
+ ]
+ },
+
+ "compat-override@tests.mozilla.org": {
+ "_comment_": "Various updates available - one is not compatible, but compatibility checking is disabled",
+
+ "updates": [
+ {
+ "_comment_": "Has compatibility override, but it doesn't match this app version",
+ "version": "1.0",
+ "update_link": "https://example.com/addons/test1.xpi",
+ "applications": {
+ "gecko": {
+ "strict_min_version": "0.1",
+ "advisory_max_version": "0.2"
+ }
+ }
+ },
+ {
+ "_comment_": "Has compatibility override, so is incompaible",
+ "version": "2.0",
+ "update_link": "https://example.com/addons/test2.xpi",
+ "applications": {
+ "gecko": {
+ "strict_min_version": "0.5",
+ "advisory_max_version": "0.6"
+ }
+ }
+ },
+ {
+ "_comment_": "Update for future app versions - should never be compatible",
+ "version": "3.0",
+ "update_link": "https://example.com/addons/test3.xpi",
+ "applications": {
+ "gecko": {
+ "strict_min_version": "2",
+ "advisory_max_version": "3"
+ }
+ }
+ }
+ ]
+ },
+
+ "compat-strict-optin@tests.mozilla.org": {
+ "_comment_": "Opt-in to strict compatibility checking",
+
+ "updates": [
+ {
+ "version": "1.0",
+ "update_link": "https://example.com/addons/test1.xpi",
+ "_comment_": "strictCompatibility: true",
+ "applications": {
+ "gecko": {
+ "strict_min_version": "0.1",
+ "strict_max_version": "0.2"
+ }
+ }
+ }
+ ]
+ }
+ }
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/unsigned.xpi b/toolkit/mozapps/extensions/test/xpcshell/data/unsigned.xpi
new file mode 100644
index 0000000000..12a13f139b
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/unsigned.xpi
Binary files differ
diff --git a/toolkit/mozapps/extensions/test/xpcshell/data/webext-implicit-id.xpi b/toolkit/mozapps/extensions/test/xpcshell/data/webext-implicit-id.xpi
new file mode 100644
index 0000000000..6b4abaa691
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/data/webext-implicit-id.xpi
Binary files differ
diff --git a/toolkit/mozapps/extensions/test/xpcshell/head_addons.js b/toolkit/mozapps/extensions/test/xpcshell/head_addons.js
new file mode 100644
index 0000000000..70cfa3bf6f
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/head_addons.js
@@ -0,0 +1,1350 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+/* eslint no-unused-vars: ["error", {vars: "local", args: "none"}] */
+
+if (!_TEST_FILE[0].includes("toolkit/mozapps/extensions/test/xpcshell/")) {
+ ok(
+ false,
+ "head_addons.js may not be loaded by tests outside of " +
+ "the add-on manager component."
+ );
+}
+
+const PREF_EM_CHECK_UPDATE_SECURITY = "extensions.checkUpdateSecurity";
+const PREF_EM_STRICT_COMPATIBILITY = "extensions.strictCompatibility";
+const PREF_GETADDONS_BYIDS = "extensions.getAddons.get.url";
+const PREF_XPI_SIGNATURES_REQUIRED = "xpinstall.signatures.required";
+
+const PREF_DISABLE_SECURITY =
+ "security.turn_off_all_security_so_that_" +
+ "viruses_can_take_over_this_computer";
+
+// Maximum error in file modification times. Some file systems don't store
+// modification times exactly. As long as we are closer than this then it
+// still passes.
+const MAX_TIME_DIFFERENCE = 3000;
+
+// Time to reset file modified time relative to Date.now() so we can test that
+// times are modified (10 hours old).
+const MAKE_FILE_OLD_DIFFERENCE = 10 * 3600 * 1000;
+
+var { AppConstants } = ChromeUtils.import(
+ "resource://gre/modules/AppConstants.jsm"
+);
+var { FileUtils } = ChromeUtils.import("resource://gre/modules/FileUtils.jsm");
+var { NetUtil } = ChromeUtils.import("resource://gre/modules/NetUtil.jsm");
+var { Services } = ChromeUtils.import("resource://gre/modules/Services.jsm");
+var { XPCOMUtils } = ChromeUtils.import(
+ "resource://gre/modules/XPCOMUtils.jsm"
+);
+var { AddonRepository } = ChromeUtils.import(
+ "resource://gre/modules/addons/AddonRepository.jsm"
+);
+var { OS, require } = ChromeUtils.import("resource://gre/modules/osfile.jsm");
+
+var { AddonTestUtils, MockAsyncShutdown } = ChromeUtils.import(
+ "resource://testing-common/AddonTestUtils.jsm"
+);
+
+ChromeUtils.defineModuleGetter(
+ this,
+ "Blocklist",
+ "resource://gre/modules/Blocklist.jsm"
+);
+ChromeUtils.defineModuleGetter(
+ this,
+ "Extension",
+ "resource://gre/modules/Extension.jsm"
+);
+ChromeUtils.defineModuleGetter(
+ this,
+ "ExtensionTestUtils",
+ "resource://testing-common/ExtensionXPCShellUtils.jsm"
+);
+ChromeUtils.defineModuleGetter(
+ this,
+ "ExtensionTestCommon",
+ "resource://testing-common/ExtensionTestCommon.jsm"
+);
+ChromeUtils.defineModuleGetter(
+ this,
+ "HttpServer",
+ "resource://testing-common/httpd.js"
+);
+ChromeUtils.defineModuleGetter(
+ this,
+ "MockRegistrar",
+ "resource://testing-common/MockRegistrar.jsm"
+);
+ChromeUtils.defineModuleGetter(
+ this,
+ "MockRegistry",
+ "resource://testing-common/MockRegistry.jsm"
+);
+ChromeUtils.defineModuleGetter(
+ this,
+ "PromiseTestUtils",
+ "resource://testing-common/PromiseTestUtils.jsm"
+);
+ChromeUtils.defineModuleGetter(
+ this,
+ "RemoteSettings",
+ "resource://services-settings/remote-settings.js"
+);
+ChromeUtils.defineModuleGetter(
+ this,
+ "TestUtils",
+ "resource://testing-common/TestUtils.jsm"
+);
+ChromeUtils.defineModuleGetter(
+ this,
+ "setTimeout",
+ "resource://gre/modules/Timer.jsm"
+);
+
+XPCOMUtils.defineLazyServiceGetter(
+ this,
+ "aomStartup",
+ "@mozilla.org/addons/addon-manager-startup;1",
+ "amIAddonManagerStartup"
+);
+
+const {
+ createAppInfo,
+ createHttpServer,
+ createTempWebExtensionFile,
+ getFileForAddon,
+ manuallyInstall,
+ manuallyUninstall,
+ overrideBuiltIns,
+ promiseAddonEvent,
+ promiseCompleteAllInstalls,
+ promiseCompleteInstall,
+ promiseConsoleOutput,
+ promiseFindAddonUpdates,
+ promiseInstallAllFiles,
+ promiseInstallFile,
+ promiseRestartManager,
+ promiseSetExtensionModifiedTime,
+ promiseShutdownManager,
+ promiseStartupManager,
+ promiseWebExtensionStartup,
+ promiseWriteProxyFileToDir,
+ registerDirectory,
+ setExtensionModifiedTime,
+ writeFilesToZip,
+} = AddonTestUtils;
+
+// WebExtension wrapper for ease of testing
+ExtensionTestUtils.init(this);
+
+AddonTestUtils.init(this);
+AddonTestUtils.overrideCertDB();
+
+XPCOMUtils.defineLazyGetter(
+ this,
+ "BOOTSTRAP_REASONS",
+ () => AddonManagerPrivate.BOOTSTRAP_REASONS
+);
+
+function getReasonName(reason) {
+ for (let key of Object.keys(BOOTSTRAP_REASONS)) {
+ if (BOOTSTRAP_REASONS[key] == reason) {
+ return key;
+ }
+ }
+ throw new Error("This shouldn't happen.");
+}
+
+Object.defineProperty(this, "gAppInfo", {
+ get() {
+ return AddonTestUtils.appInfo;
+ },
+});
+
+Object.defineProperty(this, "gAddonStartup", {
+ get() {
+ return AddonTestUtils.addonStartup.clone();
+ },
+});
+
+Object.defineProperty(this, "gInternalManager", {
+ get() {
+ return AddonTestUtils.addonIntegrationService.QueryInterface(
+ Ci.nsITimerCallback
+ );
+ },
+});
+
+Object.defineProperty(this, "gProfD", {
+ get() {
+ return AddonTestUtils.profileDir.clone();
+ },
+});
+
+Object.defineProperty(this, "gTmpD", {
+ get() {
+ return AddonTestUtils.tempDir.clone();
+ },
+});
+
+Object.defineProperty(this, "gUseRealCertChecks", {
+ get() {
+ return AddonTestUtils.useRealCertChecks;
+ },
+ set(val) {
+ return (AddonTestUtils.useRealCertChecks = val);
+ },
+});
+
+Object.defineProperty(this, "TEST_UNPACKED", {
+ get() {
+ return AddonTestUtils.testUnpacked;
+ },
+ set(val) {
+ return (AddonTestUtils.testUnpacked = val);
+ },
+});
+
+// We need some internal bits of AddonManager
+var AMscope = ChromeUtils.import(
+ "resource://gre/modules/AddonManager.jsm",
+ null
+);
+var { AddonManager, AddonManagerInternal, AddonManagerPrivate } = AMscope;
+
+const promiseAddonByID = AddonManager.getAddonByID;
+const promiseAddonsByIDs = AddonManager.getAddonsByIDs;
+
+var gPort = null;
+
+var BootstrapMonitor = {
+ started: new Map(),
+ stopped: new Map(),
+ installed: new Map(),
+ uninstalled: new Map(),
+
+ init() {
+ this.onEvent = this.onEvent.bind(this);
+
+ AddonTestUtils.on("addon-manager-shutdown", this.onEvent);
+ AddonTestUtils.on("bootstrap-method", this.onEvent);
+ },
+
+ shutdownCheck() {
+ equal(
+ this.started.size,
+ 0,
+ "Should have no add-ons that were started but not shutdown"
+ );
+ },
+
+ onEvent(msg, data) {
+ switch (msg) {
+ case "addon-manager-shutdown":
+ this.shutdownCheck();
+ break;
+ case "bootstrap-method":
+ this.onBootstrapMethod(data.method, data.params, data.reason);
+ break;
+ }
+ },
+
+ onBootstrapMethod(method, params, reason) {
+ let { id } = params;
+
+ info(
+ `Bootstrap method ${method} ${reason} for ${params.id} version ${params.version}`
+ );
+
+ if (method !== "install") {
+ this.checkInstalled(id);
+ }
+
+ switch (method) {
+ case "install":
+ this.checkNotInstalled(id);
+ this.installed.set(id, { reason, params });
+ this.uninstalled.delete(id);
+ break;
+ case "startup":
+ this.checkNotStarted(id);
+ this.started.set(id, { reason, params });
+ this.stopped.delete(id);
+ break;
+ case "shutdown":
+ this.checkMatches("shutdown", "startup", params, this.started.get(id));
+ this.checkStarted(id);
+ this.stopped.set(id, { reason, params });
+ this.started.delete(id);
+ break;
+ case "uninstall":
+ this.checkMatches(
+ "uninstall",
+ "install",
+ params,
+ this.installed.get(id)
+ );
+ this.uninstalled.set(id, { reason, params });
+ this.installed.delete(id);
+ break;
+ case "update":
+ this.checkMatches("update", "install", params, this.installed.get(id));
+ this.installed.set(id, { reason, params, method });
+ break;
+ }
+ },
+
+ clear(id) {
+ this.installed.delete(id);
+ this.started.delete(id);
+ this.stopped.delete(id);
+ this.uninstalled.delete(id);
+ },
+
+ checkMatches(method, lastMethod, params, { params: lastParams } = {}) {
+ ok(
+ lastParams,
+ `Expecting matching ${lastMethod} call for add-on ${params.id} ${method} call`
+ );
+
+ if (method == "update") {
+ equal(
+ params.oldVersion,
+ lastParams.version,
+ "params.oldVersion should match last call"
+ );
+ } else {
+ equal(
+ params.version,
+ lastParams.version,
+ "params.version should match last call"
+ );
+ }
+
+ if (method !== "update" && method !== "uninstall") {
+ equal(
+ params.resourceURI.spec,
+ lastParams.resourceURI.spec,
+ `params.resourceURI should match last call`
+ );
+
+ ok(
+ params.resourceURI.equals(lastParams.resourceURI),
+ `params.resourceURI should match: "${params.resourceURI.spec}" == "${lastParams.resourceURI.spec}"`
+ );
+ }
+ },
+
+ checkStarted(id, version = undefined) {
+ let started = this.started.get(id);
+ ok(started, `Should have seen startup method call for ${id}`);
+
+ if (version !== undefined) {
+ equal(started.params.version, version, "Expected version number");
+ }
+ return started;
+ },
+
+ checkNotStarted(id) {
+ ok(
+ !this.started.has(id),
+ `Should not have seen startup method call for ${id}`
+ );
+ },
+
+ checkInstalled(id, version = undefined) {
+ const installed = this.installed.get(id);
+ ok(installed, `Should have seen install call for ${id}`);
+
+ if (version !== undefined) {
+ equal(installed.params.version, version, "Expected version number");
+ }
+
+ return installed;
+ },
+
+ checkUpdated(id, version = undefined) {
+ const installed = this.installed.get(id);
+ equal(installed.method, "update", `Should have seen update call for ${id}`);
+
+ if (version !== undefined) {
+ equal(installed.params.version, version, "Expected version number");
+ }
+
+ return installed;
+ },
+
+ checkNotInstalled(id) {
+ ok(
+ !this.installed.has(id),
+ `Should not have seen install method call for ${id}`
+ );
+ },
+};
+
+function isNightlyChannel() {
+ var channel = Services.prefs.getCharPref("app.update.channel", "default");
+
+ return (
+ channel != "aurora" &&
+ channel != "beta" &&
+ channel != "release" &&
+ channel != "esr"
+ );
+}
+
+async function restartWithLocales(locales) {
+ Services.locale.requestedLocales = locales;
+ await promiseRestartManager();
+}
+
+function delay(msec) {
+ return new Promise(resolve => {
+ setTimeout(resolve, msec);
+ });
+}
+
+/**
+ * Returns a map of Addon objects for installed add-ons with the given
+ * IDs. The returned map contains a key for the ID of each add-on that
+ * is found. IDs for add-ons which do not exist are not present in the
+ * map.
+ *
+ * @param {sequence<string>} ids
+ * The list of add-on IDs to get.
+ * @returns {Promise<string, Addon>}
+ * Map of add-ons that were found.
+ */
+async function getAddons(ids) {
+ let addons = new Map();
+ for (let addon of await AddonManager.getAddonsByIDs(ids)) {
+ if (addon) {
+ addons.set(addon.id, addon);
+ }
+ }
+ return addons;
+}
+
+/**
+ * Checks that the given add-on has the given expected properties.
+ *
+ * @param {string} id
+ * The id of the add-on.
+ * @param {Addon?} addon
+ * The add-on object, or null if the add-on does not exist.
+ * @param {object?} expected
+ * An object containing the expected values for properties of the
+ * add-on, or null if the add-on is expected not to exist.
+ */
+function checkAddon(id, addon, expected) {
+ info(`Checking state of addon ${id}`);
+
+ if (expected === null) {
+ ok(!addon, `Addon ${id} should not exist`);
+ } else {
+ ok(addon, `Addon ${id} should exist`);
+ for (let [key, value] of Object.entries(expected)) {
+ if (value instanceof Ci.nsIURI) {
+ equal(
+ addon[key] && addon[key].spec,
+ value.spec,
+ `Expected value of addon.${key}`
+ );
+ } else {
+ deepEqual(addon[key], value, `Expected value of addon.${key}`);
+ }
+ }
+ }
+}
+
+/**
+ * Tests that an add-on does appear in the crash report annotations, if
+ * crash reporting is enabled. The test will fail if the add-on is not in the
+ * annotation.
+ * @param aId
+ * The ID of the add-on
+ * @param aVersion
+ * The version of the add-on
+ */
+function do_check_in_crash_annotation(aId, aVersion) {
+ if (!AppConstants.MOZ_CRASHREPORTER) {
+ return;
+ }
+
+ if (!("Add-ons" in gAppInfo.annotations)) {
+ Assert.ok(false, "Cannot find Add-ons entry in crash annotations");
+ return;
+ }
+
+ let addons = gAppInfo.annotations["Add-ons"].split(",");
+ Assert.ok(
+ addons.includes(
+ `${encodeURIComponent(aId)}:${encodeURIComponent(aVersion)}`
+ )
+ );
+}
+
+/**
+ * Tests that an add-on does not appear in the crash report annotations, if
+ * crash reporting is enabled. The test will fail if the add-on is in the
+ * annotation.
+ * @param aId
+ * The ID of the add-on
+ * @param aVersion
+ * The version of the add-on
+ */
+function do_check_not_in_crash_annotation(aId, aVersion) {
+ if (!AppConstants.MOZ_CRASHREPORTER) {
+ return;
+ }
+
+ if (!("Add-ons" in gAppInfo.annotations)) {
+ Assert.ok(true);
+ return;
+ }
+
+ let addons = gAppInfo.annotations["Add-ons"].split(",");
+ Assert.ok(
+ !addons.includes(
+ `${encodeURIComponent(aId)}:${encodeURIComponent(aVersion)}`
+ )
+ );
+}
+
+function do_get_file_hash(aFile, aAlgorithm) {
+ if (!aAlgorithm) {
+ aAlgorithm = "sha1";
+ }
+
+ let crypto = Cc["@mozilla.org/security/hash;1"].createInstance(
+ Ci.nsICryptoHash
+ );
+ crypto.initWithString(aAlgorithm);
+ let fis = Cc["@mozilla.org/network/file-input-stream;1"].createInstance(
+ Ci.nsIFileInputStream
+ );
+ fis.init(aFile, -1, -1, false);
+ crypto.updateFromStream(fis, aFile.fileSize);
+
+ // return the two-digit hexadecimal code for a byte
+ let toHexString = charCode => ("0" + charCode.toString(16)).slice(-2);
+
+ let binary = crypto.finish(false);
+ let hash = Array.from(binary, c => toHexString(c.charCodeAt(0)));
+ return aAlgorithm + ":" + hash.join("");
+}
+
+/**
+ * Returns an extension uri spec
+ *
+ * @param aProfileDir
+ * The extension install directory
+ * @return a uri spec pointing to the root of the extension
+ */
+function do_get_addon_root_uri(aProfileDir, aId) {
+ let path = aProfileDir.clone();
+ path.append(aId);
+ if (!path.exists()) {
+ path.leafName += ".xpi";
+ return "jar:" + Services.io.newFileURI(path).spec + "!/";
+ }
+ return Services.io.newFileURI(path).spec;
+}
+
+function do_get_expected_addon_name(aId) {
+ if (TEST_UNPACKED) {
+ return aId;
+ }
+ return aId + ".xpi";
+}
+
+/**
+ * Returns the file containing the add-on. For packed add-ons, this is
+ * an XPI file. For unpacked add-ons, it is the add-on's root directory.
+ *
+ * @param {Addon} addon
+ * @returns {nsIFile}
+ */
+function getAddonFile(addon) {
+ let uri = addon.getResourceURI("");
+ if (uri instanceof Ci.nsIJARURI) {
+ uri = uri.JARFile;
+ }
+ return uri.QueryInterface(Ci.nsIFileURL).file;
+}
+
+/**
+ * Check that an array of actual add-ons is the same as an array of
+ * expected add-ons.
+ *
+ * @param aActualAddons
+ * The array of actual add-ons to check.
+ * @param aExpectedAddons
+ * The array of expected add-ons to check against.
+ * @param aProperties
+ * An array of properties to check.
+ */
+function do_check_addons(aActualAddons, aExpectedAddons, aProperties) {
+ Assert.notEqual(aActualAddons, null);
+ Assert.equal(aActualAddons.length, aExpectedAddons.length);
+ for (let i = 0; i < aActualAddons.length; i++) {
+ do_check_addon(aActualAddons[i], aExpectedAddons[i], aProperties);
+ }
+}
+
+/**
+ * Check that the actual add-on is the same as the expected add-on.
+ *
+ * @param aActualAddon
+ * The actual add-on to check.
+ * @param aExpectedAddon
+ * The expected add-on to check against.
+ * @param aProperties
+ * An array of properties to check.
+ */
+function do_check_addon(aActualAddon, aExpectedAddon, aProperties) {
+ Assert.notEqual(aActualAddon, null);
+
+ aProperties.forEach(function(aProperty) {
+ let actualValue = aActualAddon[aProperty];
+ let expectedValue = aExpectedAddon[aProperty];
+
+ // Check that all undefined expected properties are null on actual add-on
+ if (!(aProperty in aExpectedAddon)) {
+ if (actualValue !== undefined && actualValue !== null) {
+ do_throw(
+ "Unexpected defined/non-null property for add-on " +
+ aExpectedAddon.id +
+ " (addon[" +
+ aProperty +
+ "] = " +
+ actualValue.toSource() +
+ ")"
+ );
+ }
+
+ return;
+ } else if (expectedValue && !actualValue) {
+ do_throw(
+ "Missing property for add-on " +
+ aExpectedAddon.id +
+ ": expected addon[" +
+ aProperty +
+ "] = " +
+ expectedValue
+ );
+ return;
+ }
+
+ switch (aProperty) {
+ case "creator":
+ do_check_author(actualValue, expectedValue);
+ break;
+
+ case "developers":
+ Assert.equal(actualValue.length, expectedValue.length);
+ for (let i = 0; i < actualValue.length; i++) {
+ do_check_author(actualValue[i], expectedValue[i]);
+ }
+ break;
+
+ case "screenshots":
+ Assert.equal(actualValue.length, expectedValue.length);
+ for (let i = 0; i < actualValue.length; i++) {
+ do_check_screenshot(actualValue[i], expectedValue[i]);
+ }
+ break;
+
+ case "sourceURI":
+ Assert.equal(actualValue.spec, expectedValue);
+ break;
+
+ case "updateDate":
+ Assert.equal(actualValue.getTime(), expectedValue.getTime());
+ break;
+
+ case "compatibilityOverrides":
+ Assert.equal(actualValue.length, expectedValue.length);
+ for (let i = 0; i < actualValue.length; i++) {
+ do_check_compatibilityoverride(actualValue[i], expectedValue[i]);
+ }
+ break;
+
+ case "icons":
+ do_check_icons(actualValue, expectedValue);
+ break;
+
+ default:
+ if (actualValue !== expectedValue) {
+ do_throw(
+ "Failed for " +
+ aProperty +
+ " for add-on " +
+ aExpectedAddon.id +
+ " (" +
+ actualValue +
+ " === " +
+ expectedValue +
+ ")"
+ );
+ }
+ }
+ });
+}
+
+/**
+ * Check that the actual author is the same as the expected author.
+ *
+ * @param aActual
+ * The actual author to check.
+ * @param aExpected
+ * The expected author to check against.
+ */
+function do_check_author(aActual, aExpected) {
+ Assert.equal(aActual.toString(), aExpected.name);
+ Assert.equal(aActual.name, aExpected.name);
+ Assert.equal(aActual.url, aExpected.url);
+}
+
+/**
+ * Check that the actual screenshot is the same as the expected screenshot.
+ *
+ * @param aActual
+ * The actual screenshot to check.
+ * @param aExpected
+ * The expected screenshot to check against.
+ */
+function do_check_screenshot(aActual, aExpected) {
+ Assert.equal(aActual.toString(), aExpected.url);
+ Assert.equal(aActual.url, aExpected.url);
+ Assert.equal(aActual.width, aExpected.width);
+ Assert.equal(aActual.height, aExpected.height);
+ Assert.equal(aActual.thumbnailURL, aExpected.thumbnailURL);
+ Assert.equal(aActual.thumbnailWidth, aExpected.thumbnailWidth);
+ Assert.equal(aActual.thumbnailHeight, aExpected.thumbnailHeight);
+ Assert.equal(aActual.caption, aExpected.caption);
+}
+
+/**
+ * Check that the actual compatibility override is the same as the expected
+ * compatibility override.
+ *
+ * @param aAction
+ * The actual compatibility override to check.
+ * @param aExpected
+ * The expected compatibility override to check against.
+ */
+function do_check_compatibilityoverride(aActual, aExpected) {
+ Assert.equal(aActual.type, aExpected.type);
+ Assert.equal(aActual.minVersion, aExpected.minVersion);
+ Assert.equal(aActual.maxVersion, aExpected.maxVersion);
+ Assert.equal(aActual.appID, aExpected.appID);
+ Assert.equal(aActual.appMinVersion, aExpected.appMinVersion);
+ Assert.equal(aActual.appMaxVersion, aExpected.appMaxVersion);
+}
+
+function do_check_icons(aActual, aExpected) {
+ for (var size in aExpected) {
+ Assert.equal(aActual[size], aExpected[size]);
+ }
+}
+
+function isThemeInAddonsList(aDir, aId) {
+ return AddonTestUtils.addonsList.hasTheme(aDir, aId);
+}
+
+function isExtensionInBootstrappedList(aDir, aId) {
+ return AddonTestUtils.addonsList.hasExtension(aDir, aId);
+}
+
+/**
+ * Writes a manifest.json manifest into an extension using the properties passed
+ * in a JS object.
+ *
+ * @param aManifest
+ * The data to write
+ * @param aDir
+ * The install directory to add the extension to
+ * @param aId
+ * An optional string to override the default installation aId
+ * @return A file pointing to where the extension was installed
+ */
+function promiseWriteWebManifestForExtension(
+ aData,
+ aDir,
+ aId = aData.applications.gecko.id
+) {
+ let files = {
+ "manifest.json": JSON.stringify(aData),
+ };
+ return AddonTestUtils.promiseWriteFilesToExtension(aDir.path, aId, files);
+}
+
+function hasFlag(aBits, aFlag) {
+ return (aBits & aFlag) != 0;
+}
+
+class EventChecker {
+ constructor(options) {
+ this.expectedEvents = options.addonEvents || {};
+ this.expectedInstalls = options.installEvents || null;
+ this.ignorePlugins = options.ignorePlugins || false;
+
+ this.finished = new Promise(resolve => {
+ this.resolveFinished = resolve;
+ });
+
+ AddonManager.addAddonListener(this);
+ if (this.expectedInstalls) {
+ AddonManager.addInstallListener(this);
+ }
+ }
+
+ cleanup() {
+ AddonManager.removeAddonListener(this);
+ if (this.expectedInstalls) {
+ AddonManager.removeInstallListener(this);
+ }
+ }
+
+ checkValue(prop, value, flagName) {
+ if (Array.isArray(flagName)) {
+ let names = flagName.map(name => `AddonManager.${name}`);
+
+ Assert.ok(
+ flagName.map(name => AddonManager[name]).includes(value),
+ `${prop} value \`${value}\` should be one of [${names.join(", ")}`
+ );
+ } else {
+ Assert.equal(
+ value,
+ AddonManager[flagName],
+ `${prop} should have value AddonManager.${flagName}`
+ );
+ }
+ }
+
+ checkFlag(prop, value, flagName) {
+ Assert.equal(
+ value & AddonManager[flagName],
+ AddonManager[flagName],
+ `${prop} should have flag AddonManager.${flagName}`
+ );
+ }
+
+ checkNoFlag(prop, value, flagName) {
+ Assert.ok(
+ !(value & AddonManager[flagName]),
+ `${prop} should not have flag AddonManager.${flagName}`
+ );
+ }
+
+ checkComplete() {
+ if (this.expectedInstalls && this.expectedInstalls.length) {
+ return;
+ }
+
+ if (Object.values(this.expectedEvents).some(events => events.length)) {
+ return;
+ }
+
+ info("Test complete");
+ this.cleanup();
+ this.resolveFinished();
+ }
+
+ ensureComplete() {
+ this.cleanup();
+
+ for (let [id, events] of Object.entries(this.expectedEvents)) {
+ Assert.equal(
+ events.length,
+ 0,
+ `Should have no remaining events for ${id}`
+ );
+ }
+ if (this.expectedInstalls) {
+ Assert.deepEqual(
+ this.expectedInstalls,
+ [],
+ "Should have no remaining install events"
+ );
+ }
+ }
+
+ // Add-on listener events
+ getExpectedEvent(aId) {
+ if (!(aId in this.expectedEvents)) {
+ return null;
+ }
+
+ let events = this.expectedEvents[aId];
+ Assert.ok(!!events.length, `Should be expecting events for ${aId}`);
+
+ return events.shift();
+ }
+
+ checkAddonEvent(event, addon, details = {}) {
+ info(`Got event "${event}" for add-on ${addon.id}`);
+
+ if ("requiresRestart" in details) {
+ Assert.equal(
+ details.requiresRestart,
+ false,
+ "requiresRestart should always be false"
+ );
+ }
+
+ let expected = this.getExpectedEvent(addon.id);
+ if (!expected) {
+ return undefined;
+ }
+
+ Assert.equal(
+ expected.event,
+ event,
+ `Expecting event "${expected.event}" got "${event}"`
+ );
+
+ for (let prop of ["properties"]) {
+ if (prop in expected) {
+ Assert.deepEqual(
+ expected[prop],
+ details[prop],
+ `Expected value for ${prop}`
+ );
+ }
+ }
+
+ this.checkComplete();
+
+ if ("returnValue" in expected) {
+ return expected.returnValue;
+ }
+ return undefined;
+ }
+
+ onPropertyChanged(addon, properties) {
+ return this.checkAddonEvent("onPropertyChanged", addon, { properties });
+ }
+
+ onEnabling(addon, requiresRestart) {
+ let result = this.checkAddonEvent("onEnabling", addon, { requiresRestart });
+
+ this.checkNoFlag("addon.permissions", addon.permissions, "PERM_CAN_ENABLE");
+
+ return result;
+ }
+
+ onEnabled(addon) {
+ let result = this.checkAddonEvent("onEnabled", addon);
+
+ this.checkNoFlag("addon.permissions", addon.permissions, "PERM_CAN_ENABLE");
+
+ return result;
+ }
+
+ onDisabling(addon, requiresRestart) {
+ let result = this.checkAddonEvent("onDisabling", addon, {
+ requiresRestart,
+ });
+
+ this.checkNoFlag(
+ "addon.permissions",
+ addon.permissions,
+ "PERM_CAN_DISABLE"
+ );
+ return result;
+ }
+
+ onDisabled(addon) {
+ let result = this.checkAddonEvent("onDisabled", addon);
+
+ this.checkNoFlag(
+ "addon.permissions",
+ addon.permissions,
+ "PERM_CAN_DISABLE"
+ );
+
+ return result;
+ }
+
+ onInstalling(addon, requiresRestart) {
+ return this.checkAddonEvent("onInstalling", addon, { requiresRestart });
+ }
+
+ onInstalled(addon) {
+ return this.checkAddonEvent("onInstalled", addon);
+ }
+
+ onUninstalling(addon, requiresRestart) {
+ return this.checkAddonEvent("onUninstalling", addon);
+ }
+
+ onUninstalled(addon) {
+ return this.checkAddonEvent("onUninstalled", addon);
+ }
+
+ onOperationCancelled(addon) {
+ return this.checkAddonEvent("onOperationCancelled", addon);
+ }
+
+ // Install listener events.
+ checkInstall(event, install, details = {}) {
+ // Lazy initialization of the plugin host means we can get spurious
+ // install events for plugins. If we're not looking for plugin
+ // installs, ignore them completely. If we *are* looking for plugin
+ // installs, the onus is on the individual test to ensure it waits
+ // for the plugin host to have done its initial work.
+ if (this.ignorePlugins && install.type == "plugin") {
+ info(`Ignoring install event for plugin ${install.id}`);
+ return undefined;
+ }
+ info(`Got install event "${event}"`);
+
+ let expected = this.expectedInstalls.shift();
+ Assert.ok(expected, "Should be expecting install event");
+
+ Assert.equal(
+ expected.event,
+ event,
+ "Should be expecting onExternalInstall event"
+ );
+
+ if ("state" in details) {
+ this.checkValue("install.state", install.state, details.state);
+ }
+
+ this.checkComplete();
+
+ if ("callback" in expected) {
+ expected.callback(install);
+ }
+
+ if ("returnValue" in expected) {
+ return expected.returnValue;
+ }
+ return undefined;
+ }
+
+ onNewInstall(install) {
+ let result = this.checkInstall("onNewInstall", install, {
+ state: ["STATE_DOWNLOADED", "STATE_DOWNLOAD_FAILED", "STATE_AVAILABLE"],
+ });
+
+ if (install.state != AddonManager.STATE_DOWNLOAD_FAILED) {
+ Assert.equal(install.error, 0, "Should have no error");
+ } else {
+ Assert.notEqual(install.error, 0, "Should have error");
+ }
+
+ return result;
+ }
+
+ onDownloadStarted(install) {
+ return this.checkInstall("onDownloadStarted", install, {
+ state: "STATE_DOWNLOADING",
+ error: 0,
+ });
+ }
+
+ onDownloadEnded(install) {
+ return this.checkInstall("onDownloadEnded", install, {
+ state: "STATE_DOWNLOADED",
+ error: 0,
+ });
+ }
+
+ onDownloadFailed(install) {
+ return this.checkInstall("onDownloadFailed", install, {
+ state: "STATE_FAILED",
+ });
+ }
+
+ onDownloadCancelled(install) {
+ return this.checkInstall("onDownloadCancelled", install, {
+ state: "STATE_CANCELLED",
+ error: 0,
+ });
+ }
+
+ onInstallStarted(install) {
+ return this.checkInstall("onInstallStarted", install, {
+ state: "STATE_INSTALLING",
+ error: 0,
+ });
+ }
+
+ onInstallEnded(install, newAddon) {
+ return this.checkInstall("onInstallEnded", install, {
+ state: "STATE_INSTALLED",
+ error: 0,
+ });
+ }
+
+ onInstallFailed(install) {
+ return this.checkInstall("onInstallFailed", install, {
+ state: "STATE_FAILED",
+ });
+ }
+
+ onInstallCancelled(install) {
+ // If the install was cancelled by a listener returning false from
+ // onInstallStarted, then the state will revert to STATE_DOWNLOADED.
+ return this.checkInstall("onInstallCancelled", install, {
+ state: ["STATE_CANCELED", "STATE_DOWNLOADED"],
+ error: 0,
+ });
+ }
+
+ onExternalInstall(addon, existingAddon, requiresRestart) {
+ if (this.ignorePlugins && addon.type == "plugin") {
+ info(`Ignoring install event for plugin ${addon.id}`);
+ return undefined;
+ }
+ let expected = this.expectedInstalls.shift();
+ Assert.ok(expected, "Should be expecting install event");
+
+ Assert.equal(
+ expected.event,
+ "onExternalInstall",
+ "Should be expecting onExternalInstall event"
+ );
+ Assert.ok(!requiresRestart, "Should never require restart");
+
+ this.checkComplete();
+ if ("returnValue" in expected) {
+ return expected.returnValue;
+ }
+ return undefined;
+ }
+}
+
+/**
+ * Run the giving callback function, and expect the given set of add-on
+ * and install listener events to be emitted, and returns a promise
+ * which resolves when they have all been observed.
+ *
+ * If `callback` returns a promise, all events are expected to be
+ * observed by the time the promise resolves. If not, simply waits for
+ * all events to be observed before resolving the returned promise.
+ *
+ * @param {object} details
+ * @param {function} callback
+ * @returns {Promise}
+ */
+/* exported expectEvents */
+async function expectEvents(details, callback) {
+ let checker = new EventChecker(details);
+
+ try {
+ let result = callback();
+
+ if (
+ result &&
+ typeof result === "object" &&
+ typeof result.then === "function"
+ ) {
+ result = await result;
+ checker.ensureComplete();
+ } else {
+ await checker.finished;
+ }
+
+ return result;
+ } catch (e) {
+ do_throw(e);
+ return undefined;
+ }
+}
+
+const EXTENSIONS_DB = "extensions.json";
+var gExtensionsJSON = gProfD.clone();
+gExtensionsJSON.append(EXTENSIONS_DB);
+
+async function promiseInstallWebExtension(aData) {
+ let addonFile = createTempWebExtensionFile(aData);
+
+ let { addon } = await promiseInstallFile(addonFile);
+ return addon;
+}
+
+// By default use strict compatibility
+Services.prefs.setBoolPref("extensions.strictCompatibility", true);
+
+// Ensure signature checks are enabled by default
+Services.prefs.setBoolPref(PREF_XPI_SIGNATURES_REQUIRED, true);
+
+Services.prefs.setBoolPref("extensions.experiments.enabled", true);
+
+// Copies blocklistFile (an nsIFile) to gProfD/blocklist.xml.
+function copyBlocklistToProfile(blocklistFile) {
+ var dest = gProfD.clone();
+ dest.append("blocklist.xml");
+ if (dest.exists()) {
+ dest.remove(false);
+ }
+ blocklistFile.copyTo(gProfD, "blocklist.xml");
+ dest.lastModifiedTime = Date.now();
+}
+
+async function mockGfxBlocklistItemsFromDisk(path) {
+ Cu.importGlobalProperties(["fetch"]);
+ let response = await fetch(Services.io.newFileURI(do_get_file(path)).spec);
+ let json = await response.json();
+ return mockGfxBlocklistItems(json);
+}
+
+async function mockGfxBlocklistItems(items) {
+ const { generateUUID } = Cc["@mozilla.org/uuid-generator;1"].getService(
+ Ci.nsIUUIDGenerator
+ );
+ let bsPass = ChromeUtils.import("resource://gre/modules/Blocklist.jsm", null);
+ const client = RemoteSettings(
+ Services.prefs.getCharPref("services.blocklist.gfx.collection"),
+ { bucketNamePref: "services.blocklist.bucket" }
+ );
+ const records = items.map(item => {
+ if (item.id && item.last_modified) {
+ return item;
+ }
+ return {
+ id: generateUUID()
+ .toString()
+ .replace(/[{}]/g, ""),
+ last_modified: Date.now(),
+ ...item,
+ };
+ });
+ const collectionTimestamp = Math.max(...records.map(r => r.last_modified));
+ await client.db.importChanges({}, collectionTimestamp, records, {
+ clear: true,
+ });
+ let rv = await bsPass.GfxBlocklistRS.checkForEntries();
+ return rv;
+}
+
+/**
+ * Change the schema version of the JSON extensions database
+ */
+async function changeXPIDBVersion(aNewVersion) {
+ let json = await loadJSON(gExtensionsJSON.path);
+ json.schemaVersion = aNewVersion;
+ await saveJSON(json, gExtensionsJSON.path);
+}
+
+/**
+ * Load a file into a string
+ */
+async function loadFile(aFile) {
+ let buffer = await OS.File.read(aFile);
+ return new TextDecoder().decode(buffer);
+}
+
+/**
+ * Raw load of a JSON file
+ */
+async function loadJSON(aFile) {
+ let data = await loadFile(aFile);
+ info("Loaded JSON file " + aFile);
+ return JSON.parse(data);
+}
+
+/**
+ * Raw save of a JSON blob to file
+ */
+async function saveJSON(aData, aFile) {
+ info("Starting to save JSON file " + aFile);
+ await OS.File.writeAtomic(
+ aFile,
+ new TextEncoder().encode(JSON.stringify(aData, null, 2))
+ );
+ info("Done saving JSON file " + aFile);
+}
+
+XPCOMUtils.defineLazyServiceGetter(
+ this,
+ "pluginHost",
+ "@mozilla.org/plugin/host;1",
+ "nsIPluginHost"
+);
+
+class MockPluginTag {
+ constructor(opts, enabledState = Ci.nsIPluginTag.STATE_ENABLED) {
+ this.pluginTag = pluginHost.createFakePlugin({
+ handlerURI: "resource://fake-plugin/${Math.random()}.xhtml",
+ mimeEntries: [{ type: "application/x-fake-plugin" }],
+ fileName: `${opts.name}.so`,
+ ...opts,
+ });
+ this.pluginTag.enabledState = enabledState;
+
+ this.name = opts.name;
+ this.version = opts.version;
+ }
+ async isBlocklisted() {
+ let state = await Blocklist.getPluginBlocklistState(this.pluginTag);
+ return state == Services.blocklist.STATE_BLOCKED;
+ }
+ get disabled() {
+ return this.pluginTag.enabledState == Ci.nsIPluginTag.STATE_DISABLED;
+ }
+ set disabled(val) {
+ this.enabledState =
+ Ci.nsIPluginTag[val ? "STATE_DISABLED" : "STATE_ENABLED"];
+ }
+ get enabledState() {
+ return this.pluginTag.enabledState;
+ }
+ set enabledState(val) {
+ this.pluginTag.enabledState = val;
+ }
+}
+
+function mockPluginHost(plugins) {
+ let PluginHost = {
+ getPluginTags() {
+ return plugins.map(p => p.pluginTag);
+ },
+
+ QueryInterface: ChromeUtils.generateQI(["nsIPluginHost"]),
+ };
+
+ MockRegistrar.register("@mozilla.org/plugin/host;1", PluginHost);
+}
+
+async function setInitialState(addon, initialState) {
+ if (initialState.userDisabled) {
+ await addon.disable();
+ } else if (initialState.userDisabled === false) {
+ await addon.enable();
+ }
+}
+
+async function setupBuiltinExtension(extensionData, location = "ext-test") {
+ let xpi = await AddonTestUtils.createTempWebExtensionFile(extensionData);
+
+ // The built-in location requires a resource: URL that maps to a
+ // jar: or file: URL. This would typically be something bundled
+ // into omni.ja but for testing we just use a temp file.
+ let base = Services.io.newURI(`jar:file:${xpi.path}!/`);
+ let resProto = Services.io
+ .getProtocolHandler("resource")
+ .QueryInterface(Ci.nsIResProtocolHandler);
+ resProto.setSubstitution(location, base);
+}
+
+async function installBuiltinExtension(extensionData, waitForStartup = true) {
+ await setupBuiltinExtension(extensionData);
+
+ let id = extensionData.manifest.applications.gecko.id;
+ let wrapper = ExtensionTestUtils.expectExtension(id);
+ await AddonManager.installBuiltinAddon("resource://ext-test/");
+ if (waitForStartup) {
+ await wrapper.awaitStartup();
+ }
+ return wrapper;
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/head_compat.js b/toolkit/mozapps/extensions/test/xpcshell/head_compat.js
new file mode 100644
index 0000000000..70e084d307
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/head_compat.js
@@ -0,0 +1,49 @@
+//
+// This file provides helpers for tests of addons that use strictCompatibility.
+// Since WebExtensions cannot opt out of strictCompatibility, we add a
+// simple extension loader that lets tests directly set AddonInternal
+// properties (including strictCompatibility)
+//
+
+/* import-globals-from head_addons.js */
+
+const MANIFEST = "compat_manifest.json";
+
+AddonManager.addExternalExtensionLoader({
+ name: "compat-test",
+ manifestFile: MANIFEST,
+ async loadManifest(pkg) {
+ // XPIDatabase.jsm gets unloaded in AddonTestUtils when the
+ // addon manager is restarted. Work around that by just importing
+ // it every time we need to create an AddonInternal.
+ const { AddonInternal } = ChromeUtils.import(
+ "resource://gre/modules/addons/XPIDatabase.jsm"
+ );
+ let addon = new AddonInternal();
+ let manifest = JSON.parse(await pkg.readString(MANIFEST));
+ Object.assign(addon, manifest);
+ return addon;
+ },
+ loadScope(addon, file) {
+ return {
+ install() {},
+ uninstall() {},
+ startup() {},
+ shutdonw() {},
+ };
+ },
+});
+
+const DEFAULTS = {
+ defaultLocale: {},
+ locales: [],
+ targetPlatforms: [],
+ type: "extension",
+ version: "1.0",
+};
+
+function createAddon(manifest) {
+ return AddonTestUtils.createTempXPIFile({
+ [MANIFEST]: Object.assign({}, DEFAULTS, manifest),
+ });
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/head_sideload.js b/toolkit/mozapps/extensions/test/xpcshell/head_sideload.js
new file mode 100644
index 0000000000..00a0bc67ad
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/head_sideload.js
@@ -0,0 +1,81 @@
+// Any copyright is dedicated to the Public Domain.
+// http://creativecommons.org/publicdomain/zero/1.0/
+
+/* import-globals-from head_addons.js */
+
+Services.prefs.setBoolPref(
+ "security.turn_off_all_security_so_that_viruses_can_take_over_this_computer",
+ true
+);
+
+// Enable all scopes.
+Services.prefs.setIntPref("extensions.enabledScopes", AddonManager.SCOPE_ALL);
+// Setting this to all enables the same behavior as before disabling sideloading.
+// We reset this later after doing some legacy sideloading.
+Services.prefs.setIntPref("extensions.sideloadScopes", AddonManager.SCOPE_ALL);
+// AddonTestUtils sets this to zero, we need the default value.
+Services.prefs.clearUserPref("extensions.autoDisableScopes");
+
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1.9.2");
+
+function getID(n) {
+ return `${n}@tests.mozilla.org`;
+}
+function initialVersion(n) {
+ return `${n}.0`;
+}
+
+// Setup some common extension locations, one in each scope.
+
+// SCOPE_SYSTEM
+const globalDir = gProfD.clone();
+globalDir.append("app-system-share");
+globalDir.append(gAppInfo.ID);
+registerDirectory("XRESysSExtPD", globalDir.parent);
+
+// SCOPE_USER
+const userDir = gProfD.clone();
+userDir.append("app-system-user");
+userDir.append(gAppInfo.ID);
+registerDirectory("XREUSysExt", userDir.parent);
+
+// SCOPE_APPLICATION
+const addonAppDir = gProfD.clone();
+addonAppDir.append("app-global");
+addonAppDir.append("extensions");
+registerDirectory("XREAddonAppDir", addonAppDir.parent);
+
+// SCOPE_PROFILE
+const profileDir = gProfD.clone();
+profileDir.append("extensions");
+
+const scopeDirectories = {
+ global: globalDir,
+ user: userDir,
+ app: addonAppDir,
+ profile: profileDir,
+};
+
+const scopeToDir = new Map([
+ [AddonManager.SCOPE_SYSTEM, globalDir],
+ [AddonManager.SCOPE_USER, userDir],
+ [AddonManager.SCOPE_APPLICATION, addonAppDir],
+ [AddonManager.SCOPE_PROFILE, profileDir],
+]);
+
+async function createWebExtension(id, version, dir) {
+ let xpi = AddonTestUtils.createTempWebExtensionFile({
+ manifest: {
+ version,
+ applications: { gecko: { id } },
+ },
+ });
+ await AddonTestUtils.manuallyInstall(xpi, dir);
+}
+
+function check_startup_changes(aType, aIds) {
+ let changes = AddonManager.getStartupChanges(aType);
+ changes = changes.filter(aEl => /@tests.mozilla.org$/.test(aEl));
+
+ Assert.deepEqual([...aIds].sort(), changes.sort());
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/head_system_addons.js b/toolkit/mozapps/extensions/test/xpcshell/head_system_addons.js
new file mode 100644
index 0000000000..23ec219023
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/head_system_addons.js
@@ -0,0 +1,469 @@
+/* import-globals-from head_addons.js */
+
+const PREF_SYSTEM_ADDON_SET = "extensions.systemAddonSet";
+const PREF_SYSTEM_ADDON_UPDATE_URL = "extensions.systemAddon.update.url";
+const PREF_SYSTEM_ADDON_UPDATE_ENABLED =
+ "extensions.systemAddon.update.enabled";
+
+// See bug 1507255
+Services.prefs.setBoolPref("media.gmp-manager.updateEnabled", true);
+
+function root(server) {
+ let { primaryScheme, primaryHost, primaryPort } = server.identity;
+ return `${primaryScheme}://${primaryHost}:${primaryPort}/data`;
+}
+
+XPCOMUtils.defineLazyGetter(this, "testserver", () => {
+ let server = new HttpServer();
+ server.start();
+ Services.prefs.setCharPref(
+ PREF_SYSTEM_ADDON_UPDATE_URL,
+ `${root(server)}/update.xml`
+ );
+ return server;
+});
+
+async function serveSystemUpdate(xml, perform_update) {
+ testserver.registerPathHandler("/data/update.xml", (request, response) => {
+ response.write(xml);
+ });
+
+ try {
+ await perform_update();
+ } finally {
+ testserver.registerPathHandler("/data/update.xml", null);
+ }
+}
+
+// Runs an update check making it use the passed in xml string. Uses the direct
+// call to the update function so we get rejections on failure.
+async function installSystemAddons(xml, waitIDs = []) {
+ info("Triggering system add-on update check.");
+
+ await serveSystemUpdate(
+ xml,
+ async function() {
+ let { XPIProvider } = ChromeUtils.import(
+ "resource://gre/modules/addons/XPIProvider.jsm"
+ );
+ await Promise.all([
+ XPIProvider.updateSystemAddons(),
+ ...waitIDs.map(id => promiseWebExtensionStartup(id)),
+ ]);
+ },
+ testserver
+ );
+}
+
+// Runs a full add-on update check which will in some cases do a system add-on
+// update check. Always succeeds.
+async function updateAllSystemAddons(xml) {
+ info("Triggering full add-on update check.");
+
+ await serveSystemUpdate(
+ xml,
+ function() {
+ return new Promise(resolve => {
+ Services.obs.addObserver(function observer() {
+ Services.obs.removeObserver(
+ observer,
+ "addons-background-update-complete"
+ );
+
+ resolve();
+ }, "addons-background-update-complete");
+
+ // Trigger the background update timer handler
+ gInternalManager.notify(null);
+ });
+ },
+ testserver
+ );
+}
+
+// Builds an update.xml file for an update check based on the data passed.
+function buildSystemAddonUpdates(addons) {
+ let xml = `<?xml version="1.0" encoding="UTF-8"?>\n\n<updates>\n`;
+ if (addons) {
+ xml += ` <addons>\n`;
+ for (let addon of addons) {
+ if (addon.xpi) {
+ testserver.registerFile(`/data/${addon.path}`, addon.xpi);
+ }
+
+ xml += ` <addon id="${addon.id}" URL="${root(testserver)}/${
+ addon.path
+ }" version="${addon.version}"`;
+ if (addon.hashFunction) {
+ xml += ` hashFunction="${addon.hashFunction}"`;
+ }
+ if (addon.hashValue) {
+ xml += ` hashValue="${addon.hashValue}"`;
+ }
+ xml += `/>\n`;
+ }
+ xml += ` </addons>\n`;
+ }
+ xml += `</updates>\n`;
+
+ return xml;
+}
+
+let _systemXPIs = new Map();
+function getSystemAddonXPI(num, version) {
+ let key = `${num}:${version}`;
+ if (!_systemXPIs.has(key)) {
+ _systemXPIs.set(
+ key,
+ AddonTestUtils.createTempWebExtensionFile({
+ manifest: {
+ name: `System Add-on ${num}`,
+ version,
+ applications: {
+ gecko: {
+ id: `system${num}@tests.mozilla.org`,
+ },
+ },
+ },
+ })
+ );
+ }
+ return _systemXPIs.get(key);
+}
+
+async function initSystemAddonDirs() {
+ let hiddenSystemAddonDir = FileUtils.getDir(
+ "ProfD",
+ ["sysfeatures", "hidden"],
+ true
+ );
+ let system1_1 = await getSystemAddonXPI(1, "1.0");
+ system1_1.copyTo(hiddenSystemAddonDir, "system1@tests.mozilla.org.xpi");
+
+ let system2_1 = await getSystemAddonXPI(2, "1.0");
+ system2_1.copyTo(hiddenSystemAddonDir, "system2@tests.mozilla.org.xpi");
+
+ let prefilledSystemAddonDir = FileUtils.getDir(
+ "ProfD",
+ ["sysfeatures", "prefilled"],
+ true
+ );
+ let system2_2 = await getSystemAddonXPI(2, "2.0");
+ system2_2.copyTo(prefilledSystemAddonDir, "system2@tests.mozilla.org.xpi");
+ let system3_2 = await getSystemAddonXPI(3, "2.0");
+ system3_2.copyTo(prefilledSystemAddonDir, "system3@tests.mozilla.org.xpi");
+}
+
+/**
+ * Returns current system add-on update directory (stored in pref).
+ */
+function getCurrentSystemAddonUpdatesDir() {
+ const updatesDir = FileUtils.getDir("ProfD", ["features"], false);
+ let dir = updatesDir.clone();
+ let set = JSON.parse(Services.prefs.getCharPref(PREF_SYSTEM_ADDON_SET));
+ dir.append(set.directory);
+ return dir;
+}
+
+/**
+ * Removes all files from system add-on update directory.
+ */
+function clearSystemAddonUpdatesDir() {
+ const updatesDir = FileUtils.getDir("ProfD", ["features"], false);
+ // Delete any existing directories
+ if (updatesDir.exists()) {
+ updatesDir.remove(true);
+ }
+
+ Services.prefs.clearUserPref(PREF_SYSTEM_ADDON_SET);
+}
+
+registerCleanupFunction(() => {
+ clearSystemAddonUpdatesDir();
+});
+
+/**
+ * Installs a known set of add-ons into the system add-on update directory.
+ */
+async function buildPrefilledUpdatesDir() {
+ clearSystemAddonUpdatesDir();
+
+ // Build the test set
+ let dir = FileUtils.getDir("ProfD", ["features", "prefilled"], true);
+
+ let xpi = await getSystemAddonXPI(2, "2.0");
+ xpi.copyTo(dir, "system2@tests.mozilla.org.xpi");
+
+ xpi = await getSystemAddonXPI(3, "2.0");
+ xpi.copyTo(dir, "system3@tests.mozilla.org.xpi");
+
+ // Mark these in the past so the startup file scan notices when files have changed properly
+ FileUtils.getFile("ProfD", [
+ "features",
+ "prefilled",
+ "system2@tests.mozilla.org.xpi",
+ ]).lastModifiedTime -= 10000;
+ FileUtils.getFile("ProfD", [
+ "features",
+ "prefilled",
+ "system3@tests.mozilla.org.xpi",
+ ]).lastModifiedTime -= 10000;
+
+ Services.prefs.setCharPref(
+ PREF_SYSTEM_ADDON_SET,
+ JSON.stringify({
+ schema: 1,
+ directory: dir.leafName,
+ addons: {
+ "system2@tests.mozilla.org": {
+ version: "2.0",
+ },
+ "system3@tests.mozilla.org": {
+ version: "2.0",
+ },
+ },
+ })
+ );
+}
+
+/**
+ * Check currently installed ssystem add-ons against a set of conditions.
+ *
+ * @param {Array<Object>} conditions - an array of objects of the form { isUpgrade: false, version: null}
+ * @param {nsIFile} distroDir - the system add-on distribution directory (the "features" dir in the app directory)
+ */
+async function checkInstalledSystemAddons(conditions, distroDir) {
+ for (let i = 0; i < conditions.length; i++) {
+ let condition = conditions[i];
+ let id = "system" + (i + 1) + "@tests.mozilla.org";
+ let addon = await promiseAddonByID(id);
+
+ if (!("isUpgrade" in condition) || !("version" in condition)) {
+ throw Error("condition must contain isUpgrade and version");
+ }
+ let isUpgrade = conditions[i].isUpgrade;
+ let version = conditions[i].version;
+
+ let expectedDir = isUpgrade ? getCurrentSystemAddonUpdatesDir() : distroDir;
+
+ if (version) {
+ info(`Checking state of add-on ${id}, expecting version ${version}`);
+
+ // Add-on should be installed
+ Assert.notEqual(addon, null);
+ Assert.equal(addon.version, version);
+ Assert.ok(addon.isActive);
+ Assert.ok(!addon.foreignInstall);
+ Assert.ok(addon.hidden);
+ Assert.ok(addon.isSystem);
+
+ // Verify the add-ons file is in the right place
+ let file = expectedDir.clone();
+ file.append(id + ".xpi");
+ Assert.ok(file.exists());
+ Assert.ok(file.isFile());
+
+ let uri = addon.getResourceURI();
+ if (uri instanceof Ci.nsIJARURI) {
+ uri = uri.JARFile;
+ }
+
+ Assert.ok(uri instanceof Ci.nsIFileURL);
+ Assert.equal(uri.file.path, file.path);
+
+ if (isUpgrade) {
+ Assert.equal(addon.signedState, AddonManager.SIGNEDSTATE_SYSTEM);
+ }
+ } else {
+ info(`Checking state of add-on ${id}, expecting it to be missing`);
+
+ if (isUpgrade) {
+ // Add-on should not be installed
+ Assert.equal(addon, null);
+ }
+ }
+ }
+}
+
+/**
+ * Returns all system add-on updates directories.
+ */
+async function getSystemAddonDirectories() {
+ const updatesDir = FileUtils.getDir("ProfD", ["features"], false);
+ let subdirs = [];
+
+ if (await OS.File.exists(updatesDir.path)) {
+ let iterator = new OS.File.DirectoryIterator(updatesDir.path);
+ await iterator.forEach(entry => {
+ if (entry.isDir) {
+ subdirs.push(entry);
+ }
+ });
+ iterator.close();
+ }
+
+ return subdirs;
+}
+
+/**
+ * Sets up initial system add-on update conditions.
+ *
+ * @param {Object<function, Array<Object>} setup - an object containing a setup function and an array of objects
+ * of the form {isUpgrade: false, version: null}
+ *
+ * @param {nsIFile} distroDir - the system add-on distribution directory (the "features" dir in the app directory)
+ */
+async function setupSystemAddonConditions(setup, distroDir) {
+ info("Clearing existing database.");
+ Services.prefs.clearUserPref(PREF_SYSTEM_ADDON_SET);
+ distroDir.leafName = "empty";
+
+ let updateList = [];
+ await overrideBuiltIns({ system: updateList });
+ await promiseStartupManager();
+ await promiseShutdownManager();
+
+ info("Setting up conditions.");
+ await setup.setup();
+
+ if (distroDir) {
+ if (distroDir.path.endsWith("hidden")) {
+ updateList = ["system1@tests.mozilla.org", "system2@tests.mozilla.org"];
+ } else if (distroDir.path.endsWith("prefilled")) {
+ updateList = ["system2@tests.mozilla.org", "system3@tests.mozilla.org"];
+ }
+ }
+ await overrideBuiltIns({ system: updateList });
+
+ let startupPromises = setup.initialState.map((item, i) =>
+ item.version
+ ? promiseWebExtensionStartup(`system${i + 1}@tests.mozilla.org`)
+ : null
+ );
+ await Promise.all([promiseStartupManager(), ...startupPromises]);
+
+ // Make sure the initial state is correct
+ info("Checking initial state.");
+ await checkInstalledSystemAddons(setup.initialState, distroDir);
+}
+
+/**
+ * Verify state of system add-ons after installation.
+ *
+ * @param {Array<Object>} initialState - an array of objects of the form {isUpgrade: false, version: null}
+ * @param {Array<Object>} finalState - an array of objects of the form {isUpgrade: false, version: null}
+ * @param {Boolean} alreadyUpgraded - whether a restartless upgrade has already been performed.
+ * @param {nsIFile} distroDir - the system add-on distribution directory (the "features" dir in the app directory)
+ */
+async function verifySystemAddonState(
+ initialState,
+ finalState = undefined,
+ alreadyUpgraded = false,
+ distroDir
+) {
+ let expectedDirs = 0;
+
+ // If the initial state was using the profile set then that directory will
+ // still exist.
+
+ if (initialState.some(a => a.isUpgrade)) {
+ expectedDirs++;
+ }
+
+ if (finalState == undefined) {
+ finalState = initialState;
+ } else if (finalState.some(a => a.isUpgrade)) {
+ // If the new state is using the profile then that directory will exist.
+ expectedDirs++;
+ }
+
+ // Since upgrades are restartless now, the previous update dir hasn't been removed.
+ if (alreadyUpgraded) {
+ expectedDirs++;
+ }
+
+ info("Checking final state.");
+
+ let dirs = await getSystemAddonDirectories();
+ Assert.equal(dirs.length, expectedDirs);
+
+ await checkInstalledSystemAddons(...finalState, distroDir);
+
+ // Check that the new state is active after a restart
+ await promiseShutdownManager();
+
+ let updateList = [];
+
+ if (distroDir) {
+ if (distroDir.path.endsWith("hidden")) {
+ updateList = ["system1@tests.mozilla.org", "system2@tests.mozilla.org"];
+ } else if (distroDir.path.endsWith("prefilled")) {
+ updateList = ["system2@tests.mozilla.org", "system3@tests.mozilla.org"];
+ }
+ }
+ await overrideBuiltIns({ system: updateList });
+ await promiseStartupManager();
+ await checkInstalledSystemAddons(finalState, distroDir);
+}
+
+/**
+ * Run system add-on tests and compare the results against a set of expected conditions.
+ *
+ * @param {String} setupName - name of the current setup conditions.
+ * @param {Object<function, Array<Object>} setup - Defines the set of initial conditions to run each test against. Each should
+ * define the following properties:
+ * setup: A task to setup the profile into the initial state.
+ * initialState: The initial expected system add-on state after setup has run.
+ * @param {Array<Object>} test - The test to run. Each test must define an updateList or test. The following
+ * properties are used:
+ * updateList: The set of add-ons the server should respond with.
+ * test: A function to run to perform the update check (replaces
+ * updateList)
+ * fails: An optional property, if true the update check is expected to
+ * fail.
+ * finalState: An optional property, the expected final state of system add-ons,
+ * if missing the test condition's initialState is used.
+ * @param {nsIFile} distroDir - the system add-on distribution directory (the "features" dir in the app directory)
+ */
+
+async function execSystemAddonTest(setupName, setup, test, distroDir) {
+ await setupSystemAddonConditions(setup, distroDir);
+
+ try {
+ if ("test" in test) {
+ await test.test();
+ } else {
+ let xml = buildSystemAddonUpdates(test.updateList);
+ let ids = (test.updateList || []).map(item => item.id);
+ await installSystemAddons(xml, ids);
+ }
+
+ if (test.fails) {
+ do_throw("Expected this test to fail");
+ }
+ } catch (e) {
+ if (!test.fails) {
+ do_throw(e);
+ }
+ }
+
+ // some tests have a different expected combination of default
+ // and updated add-ons.
+ if (test.finalState && setupName in test.finalState) {
+ await verifySystemAddonState(
+ setup.initialState,
+ test.finalState[setupName],
+ false,
+ distroDir
+ );
+ } else {
+ await verifySystemAddonState(
+ setup.initialState,
+ undefined,
+ false,
+ distroDir
+ );
+ }
+
+ await promiseShutdownManager();
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/head_unpack.js b/toolkit/mozapps/extensions/test/xpcshell/head_unpack.js
new file mode 100644
index 0000000000..909dc1da2f
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/head_unpack.js
@@ -0,0 +1,3 @@
+/* globals Services, TEST_UNPACKED: true */
+/* exported TEST_UNPACKED */
+TEST_UNPACKED = true;
diff --git a/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/head.js b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/head.js
new file mode 100644
index 0000000000..28c84b2ec2
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/head.js
@@ -0,0 +1,51 @@
+// Appease eslint.
+/* import-globals-from ../head_addons.js */
+
+const { ComponentUtils } = ChromeUtils.import(
+ "resource://gre/modules/ComponentUtils.jsm"
+);
+
+const MLBF_RECORD = {
+ id: "A blocklist entry that refers to a MLBF file",
+ last_modified: 1,
+ attachment: {
+ size: 32,
+ hash: "6af648a5d6ce6dbee99b0aab1780d24d204977a6606ad670d5372ef22fac1052",
+ filename: "does-not-matter.bin",
+ },
+ attachment_type: "bloomfilter-base",
+ generation_time: 1577833200000,
+};
+
+async function load_mlbf_record_as_blob() {
+ const url = Services.io.newFileURI(
+ do_get_file("../data/mlbf-blocked1-unblocked2.bin")
+ ).spec;
+ Cu.importGlobalProperties(["fetch"]);
+ return (await fetch(url)).blob();
+}
+
+function getExtensionBlocklistMLBF() {
+ // ExtensionBlocklist.Blocklist is an ExtensionBlocklistMLBF if the useMLBF
+ // pref is set to true.
+ // An alternative way to obtain ExtensionBlocklistMLBF is by importing the
+ // global of Blocklist.jsm and reading ExtensionBlocklistMLBF off it, but
+ // to avoid using the deprecated ChromeUtils.import(.., null), bug 1524027
+ // needs to be fixed first. So let's use Blocklist.ExtensionBlocklist.
+ const ExtensionBlocklistMLBF = Blocklist.ExtensionBlocklist;
+ Assert.ok(
+ Services.prefs.getBoolPref("extensions.blocklist.useMLBF", false),
+ "blocklist.useMLBF should be true"
+ );
+ return ExtensionBlocklistMLBF;
+}
+
+async function toggleStashPref(val, callbackAfterPrefChange = () => {}) {
+ const ExtensionBlocklistMLBF = getExtensionBlocklistMLBF();
+ Assert.ok(!ExtensionBlocklistMLBF._updatePromise, "no pending update");
+ Services.prefs.setBoolPref("extensions.blocklist.useMLBF.stashes", val);
+ callbackAfterPrefChange();
+ // A pref observer should trigger an update.
+ Assert.ok(ExtensionBlocklistMLBF._updatePromise, "update pending");
+ await Blocklist.ExtensionBlocklist._updatePromise;
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_addonBlockURL.js b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_addonBlockURL.js
new file mode 100644
index 0000000000..cb6882a79b
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_addonBlockURL.js
@@ -0,0 +1,56 @@
+/* Any copyright is dedicated to the Public Domain.
+ * https://creativecommons.org/publicdomain/zero/1.0/ */
+
+"use strict";
+
+// useMLBF=true case is covered by test_blocklist_mlbf.js
+Services.prefs.setBoolPref("extensions.blocklist.useMLBF", false);
+
+const BLOCKLIST_DATA = [
+ {
+ id: "foo",
+ guid: "myfoo",
+ versionRange: [
+ {
+ severity: "3",
+ },
+ ],
+ },
+ {
+ blockID: "bar",
+ // we'll get a uuid as an `id` property from loadBlocklistRawData
+ guid: "mybar",
+ versionRange: [
+ {
+ severity: "3",
+ },
+ ],
+ },
+];
+
+const BASE_BLOCKLIST_INFOURL = Services.prefs.getStringPref(
+ "extensions.blocklist.detailsURL"
+);
+
+/*
+ * Check that add-on blocklist URLs are correctly exposed
+ * based on either blockID or id properties on the entries
+ * in remote settings.
+ */
+add_task(async function blocklistURL_check() {
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1");
+ await promiseStartupManager();
+ await AddonTestUtils.loadBlocklistRawData({ extensions: BLOCKLIST_DATA });
+
+ let entry = await Blocklist.getAddonBlocklistEntry({
+ id: "myfoo",
+ version: "1.0",
+ });
+ Assert.equal(entry.url, BASE_BLOCKLIST_INFOURL + "foo.html");
+
+ entry = await Blocklist.getAddonBlocklistEntry({
+ id: "mybar",
+ version: "1.0",
+ });
+ Assert.equal(entry.url, BASE_BLOCKLIST_INFOURL + "bar.html");
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_appversion.js b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_appversion.js
new file mode 100644
index 0000000000..3e2fc66959
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_appversion.js
@@ -0,0 +1,293 @@
+/* This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/.
+ */
+
+// useMLBF=true does not offer special support for filtering by application ID.
+// The same functionality is offered through filter_expression, which is tested
+// by services/settings/test/unit/test_remote_settings_jexl_filters.js and
+// test_blocklistchange.js.
+Services.prefs.setBoolPref("extensions.blocklist.useMLBF", false);
+
+var ADDONS = [
+ {
+ id: "test_bug449027_1@tests.mozilla.org",
+ name: "Bug 449027 Addon Test 1",
+ version: "5",
+ start: false,
+ appBlocks: false,
+ toolkitBlocks: false,
+ },
+ {
+ id: "test_bug449027_2@tests.mozilla.org",
+ name: "Bug 449027 Addon Test 2",
+ version: "5",
+ start: false,
+ appBlocks: true,
+ toolkitBlocks: false,
+ },
+ {
+ id: "test_bug449027_3@tests.mozilla.org",
+ name: "Bug 449027 Addon Test 3",
+ version: "5",
+ start: false,
+ appBlocks: true,
+ toolkitBlocks: false,
+ },
+ {
+ id: "test_bug449027_4@tests.mozilla.org",
+ name: "Bug 449027 Addon Test 4",
+ version: "5",
+ start: false,
+ appBlocks: false,
+ toolkitBlocks: false,
+ },
+ {
+ id: "test_bug449027_5@tests.mozilla.org",
+ name: "Bug 449027 Addon Test 5",
+ version: "5",
+ start: false,
+ appBlocks: false,
+ toolkitBlocks: false,
+ },
+ {
+ id: "test_bug449027_6@tests.mozilla.org",
+ name: "Bug 449027 Addon Test 6",
+ version: "5",
+ start: false,
+ appBlocks: true,
+ toolkitBlocks: false,
+ },
+ {
+ id: "test_bug449027_7@tests.mozilla.org",
+ name: "Bug 449027 Addon Test 7",
+ version: "5",
+ start: false,
+ appBlocks: true,
+ toolkitBlocks: false,
+ },
+ {
+ id: "test_bug449027_8@tests.mozilla.org",
+ name: "Bug 449027 Addon Test 8",
+ version: "5",
+ start: false,
+ appBlocks: true,
+ toolkitBlocks: false,
+ },
+ {
+ id: "test_bug449027_9@tests.mozilla.org",
+ name: "Bug 449027 Addon Test 9",
+ version: "5",
+ start: false,
+ appBlocks: true,
+ toolkitBlocks: false,
+ },
+ {
+ id: "test_bug449027_10@tests.mozilla.org",
+ name: "Bug 449027 Addon Test 10",
+ version: "5",
+ start: false,
+ appBlocks: true,
+ toolkitBlocks: false,
+ },
+ {
+ id: "test_bug449027_11@tests.mozilla.org",
+ name: "Bug 449027 Addon Test 11",
+ version: "5",
+ start: false,
+ appBlocks: true,
+ toolkitBlocks: false,
+ },
+ {
+ id: "test_bug449027_12@tests.mozilla.org",
+ name: "Bug 449027 Addon Test 12",
+ version: "5",
+ start: false,
+ appBlocks: true,
+ toolkitBlocks: false,
+ },
+ {
+ id: "test_bug449027_13@tests.mozilla.org",
+ name: "Bug 449027 Addon Test 13",
+ version: "5",
+ start: false,
+ appBlocks: true,
+ toolkitBlocks: false,
+ },
+ {
+ id: "test_bug449027_14@tests.mozilla.org",
+ name: "Bug 449027 Addon Test 14",
+ version: "5",
+ start: false,
+ appBlocks: false,
+ toolkitBlocks: false,
+ },
+ {
+ id: "test_bug449027_15@tests.mozilla.org",
+ name: "Bug 449027 Addon Test 15",
+ version: "5",
+ start: false,
+ appBlocks: true,
+ toolkitBlocks: true,
+ },
+ {
+ id: "test_bug449027_16@tests.mozilla.org",
+ name: "Bug 449027 Addon Test 16",
+ version: "5",
+ start: false,
+ appBlocks: true,
+ toolkitBlocks: true,
+ },
+ {
+ id: "test_bug449027_17@tests.mozilla.org",
+ name: "Bug 449027 Addon Test 17",
+ version: "5",
+ start: false,
+ appBlocks: false,
+ toolkitBlocks: false,
+ },
+ {
+ id: "test_bug449027_18@tests.mozilla.org",
+ name: "Bug 449027 Addon Test 18",
+ version: "5",
+ start: false,
+ appBlocks: false,
+ toolkitBlocks: false,
+ },
+ {
+ id: "test_bug449027_19@tests.mozilla.org",
+ name: "Bug 449027 Addon Test 19",
+ version: "5",
+ start: false,
+ appBlocks: true,
+ toolkitBlocks: true,
+ },
+ {
+ id: "test_bug449027_20@tests.mozilla.org",
+ name: "Bug 449027 Addon Test 20",
+ version: "5",
+ start: false,
+ appBlocks: true,
+ toolkitBlocks: true,
+ },
+ {
+ id: "test_bug449027_21@tests.mozilla.org",
+ name: "Bug 449027 Addon Test 21",
+ version: "5",
+ start: false,
+ appBlocks: true,
+ toolkitBlocks: true,
+ },
+ {
+ id: "test_bug449027_22@tests.mozilla.org",
+ name: "Bug 449027 Addon Test 22",
+ version: "5",
+ start: false,
+ appBlocks: true,
+ toolkitBlocks: true,
+ },
+ {
+ id: "test_bug449027_23@tests.mozilla.org",
+ name: "Bug 449027 Addon Test 23",
+ version: "5",
+ start: false,
+ appBlocks: true,
+ toolkitBlocks: true,
+ },
+ {
+ id: "test_bug449027_24@tests.mozilla.org",
+ name: "Bug 449027 Addon Test 24",
+ version: "5",
+ start: false,
+ appBlocks: true,
+ toolkitBlocks: true,
+ },
+ {
+ id: "test_bug449027_25@tests.mozilla.org",
+ name: "Bug 449027 Addon Test 25",
+ version: "5",
+ start: false,
+ appBlocks: true,
+ toolkitBlocks: true,
+ },
+];
+
+function createAddon(addon) {
+ return promiseInstallWebExtension({
+ manifest: {
+ name: addon.name,
+ version: addon.version,
+ applications: { gecko: { id: addon.id } },
+ },
+ });
+}
+
+/**
+ * Checks that items are blocklisted correctly according to the current test.
+ * If a lastTest is provided checks that the notification dialog got passed
+ * the newly blocked items compared to the previous test.
+ */
+async function checkState(test, lastTest, callback) {
+ let addons = await AddonManager.getAddonsByIDs(ADDONS.map(a => a.id));
+
+ const bls = Ci.nsIBlocklistService;
+
+ await TestUtils.waitForCondition(() =>
+ ADDONS.every(
+ (addon, i) =>
+ addon[test] == (addons[i].blocklistState == bls.STATE_BLOCKED)
+ )
+ ).catch(() => {
+ /* ignore exceptions; the following test will fail anyway. */
+ });
+
+ for (let [i, addon] of ADDONS.entries()) {
+ var blocked =
+ addons[i].blocklistState == Ci.nsIBlocklistService.STATE_BLOCKED;
+ equal(
+ blocked,
+ addon[test],
+ `Blocklist state should match expected for extension ${addon.id}, test ${test}`
+ );
+ }
+}
+
+add_task(async function test() {
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "3", "8");
+ await promiseStartupManager();
+
+ for (let addon of ADDONS) {
+ await createAddon(addon);
+ }
+
+ let addons = await AddonManager.getAddonsByIDs(ADDONS.map(a => a.id));
+ for (var i = 0; i < ADDONS.length; i++) {
+ ok(addons[i], `Addon ${i + 1} should have been correctly installed`);
+ }
+
+ await checkState("start");
+});
+
+/**
+ * Load the toolkit based blocks
+ */
+add_task(async function test_pt2() {
+ await AddonTestUtils.loadBlocklistData(
+ do_get_file("../data/"),
+ "test_bug449027_toolkit"
+ );
+
+ await checkState("toolkitBlocks", "start");
+});
+
+/**
+ * Load the application based blocks
+ */
+add_task(async function test_pt3() {
+ await AddonTestUtils.loadBlocklistData(
+ do_get_file("../data/"),
+ "test_bug449027_app"
+ );
+
+ await checkState("appBlocks", "toolkitBlocks");
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_clients.js b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_clients.js
new file mode 100644
index 0000000000..3c03724ebb
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_clients.js
@@ -0,0 +1,233 @@
+const BlocklistGlobal = ChromeUtils.import(
+ "resource://gre/modules/Blocklist.jsm",
+ null
+);
+const { Utils: RemoteSettingsUtils } = ChromeUtils.import(
+ "resource://services-settings/Utils.jsm"
+);
+
+const IS_ANDROID = AppConstants.platform == "android";
+
+let gBlocklistClients;
+
+async function clear_state() {
+ for (let { client } of gBlocklistClients) {
+ // Remove last server times.
+ Services.prefs.clearUserPref(client.lastCheckTimePref);
+
+ // Clear local DB.
+ await client.db.clear();
+ }
+}
+
+add_task(async function setup() {
+ AddonTestUtils.createAppInfo(
+ "XPCShell",
+ "xpcshell@tests.mozilla.org",
+ "1",
+ ""
+ );
+
+ // This will initialize the remote settings clients for blocklists.
+ BlocklistGlobal.ExtensionBlocklistRS.ensureInitialized();
+ BlocklistGlobal.PluginBlocklistRS.ensureInitialized();
+ BlocklistGlobal.GfxBlocklistRS._ensureInitialized();
+
+ gBlocklistClients = [
+ {
+ client: BlocklistGlobal.ExtensionBlocklistRS._client,
+ testData: ["i808", "i720", "i539"],
+ },
+ {
+ client: BlocklistGlobal.PluginBlocklistRS._client,
+ testData: ["p1044", "p32", "p28"],
+ },
+ {
+ client: BlocklistGlobal.GfxBlocklistRS._client,
+ testData: ["g204", "g200", "g36"],
+ },
+ ];
+
+ await promiseStartupManager();
+});
+
+add_task(
+ async function test_initial_dump_is_loaded_as_synced_when_collection_is_empty() {
+ for (let { client } of gBlocklistClients) {
+ if (
+ IS_ANDROID &&
+ client.collectionName !=
+ BlocklistGlobal.ExtensionBlocklistRS._client.collectionName
+ ) {
+ // On Android we don't ship the dumps of plugins and gfx.
+ continue;
+ }
+ Assert.ok(
+ await RemoteSettingsUtils.hasLocalDump(
+ client.bucketName,
+ client.collectionName
+ )
+ );
+ }
+ }
+);
+add_task(clear_state);
+
+add_task(async function test_data_is_filtered_for_target() {
+ const initial = [
+ {
+ guid: "foo",
+ matchName: "foo",
+ versionRange: [
+ {
+ targetApplication: [],
+ maxVersion: "*",
+ minVersion: "0",
+ severity: "1",
+ },
+ ],
+ },
+ ];
+ const noMatchingTarget = [
+ {
+ guid: "foo",
+ matchName: "foo",
+ versionRange: [
+ {
+ targetApplication: [{ guid: "Foo" }],
+ maxVersion: "*",
+ minVersion: "0",
+ severity: "3",
+ },
+ ],
+ },
+ {
+ guid: "foo",
+ matchName: "foo",
+ versionRange: [
+ {
+ targetApplication: [{ guid: "XPCShell", maxVersion: "0.1" }],
+ maxVersion: "*",
+ minVersion: "0",
+ severity: "1",
+ },
+ ],
+ },
+ ];
+ const oneMatch = [
+ {
+ guid: "foo",
+ matchName: "foo",
+ versionRange: [
+ {
+ targetApplication: [
+ {
+ guid: "XPCShell",
+ },
+ ],
+ },
+ ],
+ },
+ ];
+
+ const records = initial.concat(noMatchingTarget).concat(oneMatch);
+
+ for (let { client } of gBlocklistClients) {
+ // Initialize the collection with some data
+ for (const record of records) {
+ await client.db.create(record);
+ }
+
+ const internalData = await client.db.list();
+ Assert.equal(internalData.length, records.length);
+ let filtered = await client.get({ syncIfEmpty: false });
+ Assert.equal(filtered.length, 2); // only two matches.
+ }
+});
+add_task(clear_state);
+
+add_task(
+ async function test_entries_are_filtered_when_jexl_filter_expression_is_present() {
+ const records = [
+ {
+ guid: "foo",
+ matchName: "foo",
+ willMatch: true,
+ },
+ {
+ guid: "foo",
+ matchName: "foo",
+ willMatch: true,
+ filter_expression: null,
+ },
+ {
+ guid: "foo",
+ matchName: "foo",
+ willMatch: true,
+ filter_expression: "1 == 1",
+ },
+ {
+ guid: "foo",
+ matchName: "foo",
+ willMatch: false,
+ filter_expression: "1 == 2",
+ },
+ {
+ guid: "foo",
+ matchName: "foo",
+ willMatch: true,
+ filter_expression: "1 == 1",
+ versionRange: [
+ {
+ targetApplication: [
+ {
+ guid: "some-guid",
+ },
+ ],
+ },
+ ],
+ },
+ {
+ guid: "foo",
+ matchName: "foo",
+ willMatch: false, // jexl prevails over versionRange.
+ filter_expression: "1 == 2",
+ versionRange: [
+ {
+ targetApplication: [
+ {
+ guid: "xpcshell@tests.mozilla.org",
+ minVersion: "0",
+ maxVersion: "*",
+ },
+ ],
+ },
+ ],
+ },
+ ];
+ for (let { client } of gBlocklistClients) {
+ for (const record of records) {
+ await client.db.create(record);
+ }
+ await client.db.importChanges({}, 42); // Prevent from loading JSON dump.
+ const list = await client.get({ syncIfEmpty: false });
+ equal(list.length, 4);
+ ok(list.every(e => e.willMatch));
+ }
+ }
+);
+add_task(clear_state);
+
+add_task(async function test_bucketname_changes_when_bucket_pref_changes() {
+ for (const { client } of gBlocklistClients) {
+ equal(client.bucketName, "blocklists");
+ }
+
+ Services.prefs.setCharPref("services.blocklist.bucket", "blocklists-preview");
+
+ for (const { client } of gBlocklistClients) {
+ equal(client.bucketName, "blocklists-preview", client.identifier);
+ }
+ Services.prefs.clearUserPref("services.blocklist.bucket");
+});
+add_task(clear_state);
diff --git a/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_gfx.js b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_gfx.js
new file mode 100644
index 0000000000..6e6c3105a0
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_gfx.js
@@ -0,0 +1,113 @@
+const EVENT_NAME = "blocklist-data-gfxItems";
+
+const SAMPLE_GFX_RECORD = {
+ driverVersionComparator: "LESS_THAN_OR_EQUAL",
+ driverVersion: "8.17.12.5896",
+ vendor: "0x10de",
+ blockID: "g36",
+ feature: "DIRECT3D_9_LAYERS",
+ devices: ["0x0a6c", "geforce"],
+ featureStatus: "BLOCKED_DRIVER_VERSION",
+ last_modified: 1458035931837,
+ os: "WINNT 6.1",
+ id: "3f947f16-37c2-4e96-d356-78b26363729b",
+ versionRange: { minVersion: 0, maxVersion: "*" },
+};
+
+add_task(async function test_sends_serialized_data() {
+ const expected =
+ "blockID:g36\tdevices:0x0a6c,geforce\tdriverVersion:8.17.12.5896\t" +
+ "driverVersionComparator:LESS_THAN_OR_EQUAL\tfeature:DIRECT3D_9_LAYERS\t" +
+ "featureStatus:BLOCKED_DRIVER_VERSION\tos:WINNT 6.1\tvendor:0x10de\t" +
+ "versionRange:0,*";
+ let received;
+ const observe = (subject, topic, data) => {
+ received = data;
+ };
+ Services.obs.addObserver(observe, EVENT_NAME);
+ await mockGfxBlocklistItems([SAMPLE_GFX_RECORD]);
+ Services.obs.removeObserver(observe, EVENT_NAME);
+
+ equal(received, expected);
+});
+
+add_task(async function test_parsing_skips_devices_with_comma() {
+ let clonedItem = Cu.cloneInto(SAMPLE_GFX_RECORD, this);
+ clonedItem.devices[0] = "0x2,582";
+ let rv = await mockGfxBlocklistItems([clonedItem]);
+ equal(rv[0].devices.length, 1);
+ equal(rv[0].devices[0], "geforce");
+});
+
+add_task(async function test_empty_values_are_ignored() {
+ let received;
+ const observe = (subject, topic, data) => {
+ received = data;
+ };
+ Services.obs.addObserver(observe, EVENT_NAME);
+ let clonedItem = Cu.cloneInto(SAMPLE_GFX_RECORD, this);
+ clonedItem.os = "";
+ await mockGfxBlocklistItems([clonedItem]);
+ ok(!received.includes("os"), "Shouldn't send empty values");
+ Services.obs.removeObserver(observe, EVENT_NAME);
+});
+
+add_task(async function test_empty_devices_are_ignored() {
+ let received;
+ const observe = (subject, topic, data) => {
+ received = data;
+ };
+ Services.obs.addObserver(observe, EVENT_NAME);
+ let clonedItem = Cu.cloneInto(SAMPLE_GFX_RECORD, this);
+ clonedItem.devices = [];
+ await mockGfxBlocklistItems([clonedItem]);
+ ok(!received.includes("devices"), "Shouldn't send empty values");
+ Services.obs.removeObserver(observe, EVENT_NAME);
+});
+
+add_task(async function test_version_range_default_values() {
+ const kTests = [
+ {
+ input: { minVersion: "13.0b2", maxVersion: "42.0" },
+ output: { minVersion: "13.0b2", maxVersion: "42.0" },
+ },
+ {
+ input: { maxVersion: "2.0" },
+ output: { minVersion: "0", maxVersion: "2.0" },
+ },
+ {
+ input: { minVersion: "1.0" },
+ output: { minVersion: "1.0", maxVersion: "*" },
+ },
+ {
+ input: { minVersion: " " },
+ output: { minVersion: "0", maxVersion: "*" },
+ },
+ {
+ input: {},
+ output: { minVersion: "0", maxVersion: "*" },
+ },
+ ];
+ for (let test of kTests) {
+ let parsedEntries = await mockGfxBlocklistItems([
+ { versionRange: test.input },
+ ]);
+ equal(parsedEntries[0].versionRange.minVersion, test.output.minVersion);
+ equal(parsedEntries[0].versionRange.maxVersion, test.output.maxVersion);
+ }
+});
+
+add_task(async function test_blockid_attribute() {
+ const kTests = [
+ { blockID: "g60", vendor: " 0x10de " },
+ { feature: " DIRECT3D_9_LAYERS " },
+ ];
+ for (let test of kTests) {
+ let [rv] = await mockGfxBlocklistItems([test]);
+ if (test.blockID) {
+ equal(rv.blockID, test.blockID);
+ } else {
+ ok(!rv.hasOwnProperty("blockID"), "not expecting a blockID");
+ }
+ }
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_metadata_filters.js b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_metadata_filters.js
new file mode 100644
index 0000000000..3423864f7e
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_metadata_filters.js
@@ -0,0 +1,116 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// Tests blocking of extensions by ID, name, creator, homepageURL, updateURL
+// and RegExps for each. See bug 897735.
+
+// useMLBF=true only supports blocking by version+ID, not by other fields.
+Services.prefs.setBoolPref("extensions.blocklist.useMLBF", false);
+
+const BLOCKLIST_DATA = {
+ extensions: [
+ {
+ guid: null,
+ name: "/^Mozilla Corp\\.$/",
+ versionRange: [
+ {
+ severity: "1",
+ targetApplication: [
+ {
+ guid: "xpcshell@tests.mozilla.org",
+ maxVersion: "2.*",
+ minVersion: "1",
+ },
+ ],
+ },
+ ],
+ },
+ {
+ guid: "/block2/",
+ name: "/^Moz/",
+ homepageURL: "/\\.dangerous\\.com/",
+ updateURL: "/\\.dangerous\\.com/",
+ versionRange: [
+ {
+ severity: "3",
+ targetApplication: [
+ {
+ guid: "xpcshell@tests.mozilla.org",
+ maxVersion: "2.*",
+ minVersion: "1",
+ },
+ ],
+ },
+ ],
+ },
+ ],
+};
+
+add_task(async function setup() {
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1");
+
+ await promiseStartupManager();
+
+ // Should get blocked by name
+ await promiseInstallWebExtension({
+ manifest: {
+ name: "Mozilla Corp.",
+ version: "1.0",
+ applications: { gecko: { id: "block1@tests.mozilla.org" } },
+ },
+ });
+
+ // Should get blocked by all the attributes.
+ await promiseInstallWebExtension({
+ manifest: {
+ name: "Moz-addon",
+ version: "1.0",
+ homepage_url: "https://www.extension.dangerous.com/",
+ applications: {
+ gecko: {
+ id: "block2@tests.mozilla.org",
+ update_url: "https://www.extension.dangerous.com/update.json",
+ },
+ },
+ },
+ });
+
+ // Fails to get blocked because of a different ID even though other
+ // attributes match against a blocklist entry.
+ await promiseInstallWebExtension({
+ manifest: {
+ name: "Moz-addon",
+ version: "1.0",
+ homepage_url: "https://www.extension.dangerous.com/",
+ applications: {
+ gecko: {
+ id: "block3@tests.mozilla.org",
+ update_url: "https://www.extension.dangerous.com/update.json",
+ },
+ },
+ },
+ });
+
+ let [a1, a2, a3] = await AddonManager.getAddonsByIDs([
+ "block1@tests.mozilla.org",
+ "block2@tests.mozilla.org",
+ "block3@tests.mozilla.org",
+ ]);
+ Assert.equal(a1.blocklistState, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+ Assert.equal(a2.blocklistState, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+ Assert.equal(a3.blocklistState, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+});
+
+add_task(async function test_blocks() {
+ await AddonTestUtils.loadBlocklistRawData(BLOCKLIST_DATA);
+
+ let [a1, a2, a3] = await AddonManager.getAddonsByIDs([
+ "block1@tests.mozilla.org",
+ "block2@tests.mozilla.org",
+ "block3@tests.mozilla.org",
+ ]);
+ Assert.equal(a1.blocklistState, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ Assert.equal(a2.blocklistState, Ci.nsIBlocklistService.STATE_BLOCKED);
+ Assert.equal(a3.blocklistState, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_mlbf.js b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_mlbf.js
new file mode 100644
index 0000000000..ab46777ef0
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_mlbf.js
@@ -0,0 +1,219 @@
+/* Any copyright is dedicated to the Public Domain.
+ * https://creativecommons.org/publicdomain/zero/1.0/ */
+
+"use strict";
+
+Services.prefs.setBoolPref("extensions.blocklist.useMLBF", true);
+
+const ExtensionBlocklistMLBF = getExtensionBlocklistMLBF();
+
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1");
+AddonTestUtils.useRealCertChecks = true;
+
+// A real, signed XPI for use in the test.
+const SIGNED_ADDON_XPI_FILE = do_get_file("../data/webext-implicit-id.xpi");
+const SIGNED_ADDON_ID = "webext_implicit_id@tests.mozilla.org";
+const SIGNED_ADDON_VERSION = "1.0";
+const SIGNED_ADDON_KEY = `${SIGNED_ADDON_ID}:${SIGNED_ADDON_VERSION}`;
+const SIGNED_ADDON_SIGN_TIME = 1459980789000; // notBefore of certificate.
+
+function mockMLBF({ blocked = [], notblocked = [], generationTime }) {
+ // Mock _fetchMLBF to be able to have a deterministic cascade filter.
+ ExtensionBlocklistMLBF._fetchMLBF = async () => {
+ return {
+ cascadeFilter: {
+ has(blockKey) {
+ if (blocked.includes(blockKey)) {
+ return true;
+ }
+ if (notblocked.includes(blockKey)) {
+ return false;
+ }
+ throw new Error(`Block entry must explicitly be listed: ${blockKey}`);
+ },
+ },
+ generationTime,
+ };
+ };
+}
+
+add_task(async function setup() {
+ await promiseStartupManager();
+ mockMLBF({});
+ await AddonTestUtils.loadBlocklistRawData({
+ extensionsMLBF: [MLBF_RECORD],
+ });
+});
+
+// Checks: Initially unblocked, then blocked, then unblocked again.
+add_task(async function signed_xpi_initially_unblocked() {
+ mockMLBF({
+ blocked: [],
+ notblocked: [SIGNED_ADDON_KEY],
+ generationTime: SIGNED_ADDON_SIGN_TIME + 1,
+ });
+ await ExtensionBlocklistMLBF._onUpdate();
+
+ await promiseInstallFile(SIGNED_ADDON_XPI_FILE);
+
+ let addon = await promiseAddonByID(SIGNED_ADDON_ID);
+ Assert.equal(addon.blocklistState, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+
+ mockMLBF({
+ blocked: [SIGNED_ADDON_KEY],
+ notblocked: [],
+ generationTime: SIGNED_ADDON_SIGN_TIME + 1,
+ });
+ await ExtensionBlocklistMLBF._onUpdate();
+ Assert.equal(addon.blocklistState, Ci.nsIBlocklistService.STATE_BLOCKED);
+ Assert.deepEqual(
+ await Blocklist.getAddonBlocklistEntry(addon),
+ {
+ state: Ci.nsIBlocklistService.STATE_BLOCKED,
+ url:
+ "https://addons.mozilla.org/en-US/xpcshell/blocked-addon/webext_implicit_id@tests.mozilla.org/1.0/",
+ },
+ "Blocked addon should have blocked entry"
+ );
+
+ mockMLBF({
+ blocked: [SIGNED_ADDON_KEY],
+ notblocked: [],
+ // MLBF generationTime is older, so "blocked" entry should not apply.
+ generationTime: SIGNED_ADDON_SIGN_TIME - 1,
+ });
+ await ExtensionBlocklistMLBF._onUpdate();
+ Assert.equal(addon.blocklistState, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+
+ await addon.uninstall();
+});
+
+// Checks: Initially blocked on install, then unblocked.
+add_task(async function signed_xpi_blocked_on_install() {
+ mockMLBF({
+ blocked: [SIGNED_ADDON_KEY],
+ notblocked: [],
+ generationTime: SIGNED_ADDON_SIGN_TIME + 1,
+ });
+ await ExtensionBlocklistMLBF._onUpdate();
+
+ await promiseInstallFile(SIGNED_ADDON_XPI_FILE);
+ let addon = await promiseAddonByID(SIGNED_ADDON_ID);
+ Assert.equal(addon.blocklistState, Ci.nsIBlocklistService.STATE_BLOCKED);
+ Assert.ok(addon.appDisabled, "Blocked add-on is disabled on install");
+
+ mockMLBF({
+ blocked: [],
+ notblocked: [SIGNED_ADDON_KEY],
+ generationTime: SIGNED_ADDON_SIGN_TIME - 1,
+ });
+ await ExtensionBlocklistMLBF._onUpdate();
+ Assert.equal(addon.blocklistState, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+ Assert.ok(!addon.appDisabled, "Re-enabled after unblock");
+
+ await addon.uninstall();
+});
+
+// An unsigned add-on cannot be blocked.
+add_task(async function unsigned_not_blocked() {
+ const UNSIGNED_ADDON_ID = "not-signed@tests.mozilla.org";
+ const UNSIGNED_ADDON_VERSION = "1.0";
+ const UNSIGNED_ADDON_KEY = `${UNSIGNED_ADDON_ID}:${UNSIGNED_ADDON_VERSION}`;
+ mockMLBF({
+ blocked: [UNSIGNED_ADDON_KEY],
+ notblocked: [],
+ generationTime: SIGNED_ADDON_SIGN_TIME + 1,
+ });
+ await ExtensionBlocklistMLBF._onUpdate();
+
+ let unsignedAddonFile = createTempWebExtensionFile({
+ manifest: {
+ version: UNSIGNED_ADDON_VERSION,
+ applications: { gecko: { id: UNSIGNED_ADDON_ID } },
+ },
+ });
+
+ // Unsigned add-ons can generally only be loaded as a temporary install.
+ let [addon] = await Promise.all([
+ AddonManager.installTemporaryAddon(unsignedAddonFile),
+ promiseWebExtensionStartup(UNSIGNED_ADDON_ID),
+ ]);
+ Assert.equal(addon.signedState, AddonManager.SIGNEDSTATE_MISSING);
+ Assert.equal(addon.signedDate, null);
+ Assert.equal(addon.blocklistState, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+ Assert.equal(
+ await Blocklist.getAddonBlocklistState(addon),
+ Ci.nsIBlocklistService.STATE_NOT_BLOCKED,
+ "Unsigned temporary add-on is not blocked"
+ );
+ await addon.uninstall();
+});
+
+// To make sure that unsigned_not_blocked did not trivially pass, we also check
+// that add-ons can actually be blocked when installed as a temporary add-on.
+add_task(async function signed_temporary() {
+ mockMLBF({
+ blocked: [SIGNED_ADDON_KEY],
+ notblocked: [],
+ generationTime: SIGNED_ADDON_SIGN_TIME + 1,
+ });
+ await ExtensionBlocklistMLBF._onUpdate();
+
+ await Assert.rejects(
+ AddonManager.installTemporaryAddon(SIGNED_ADDON_XPI_FILE),
+ /Add-on webext_implicit_id@tests.mozilla.org is not compatible with application version/,
+ "Blocklisted add-on cannot be installed"
+ );
+});
+
+// A privileged add-on cannot be blocked by the MLBF.
+// It can still be blocked by a stash, which is tested in
+// privileged_addon_blocked_by_stash in test_blocklist_mlbf_stashes.js.
+add_task(async function privileged_xpi_not_blocked() {
+ mockMLBF({
+ blocked: ["test@tests.mozilla.org:2.0"],
+ notblocked: [],
+ generationTime: 1546297200000, // 1 jan 2019 = after the cert's notBefore
+ });
+ await ExtensionBlocklistMLBF._onUpdate();
+
+ await promiseInstallFile(
+ do_get_file("../data/signing_checks/privileged.xpi")
+ );
+ let addon = await promiseAddonByID("test@tests.mozilla.org");
+ Assert.equal(addon.signedState, AddonManager.SIGNEDSTATE_PRIVILEGED);
+ Assert.equal(addon.blocklistState, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+ await addon.uninstall();
+});
+
+// Langpacks cannot be blocked via the MLBF on Nightly.
+// It can still be blocked by a stash, which is tested in
+// langpack_blocked_by_stash in test_blocklist_mlbf_stashes.js.
+add_task(async function langpack_not_blocked_on_Nightly() {
+ mockMLBF({
+ blocked: ["langpack-klingon@firefox.mozilla.org:1.0"],
+ notblocked: [],
+ generationTime: 1546297200000, // 1 jan 2019 = after the cert's notBefore
+ });
+ await ExtensionBlocklistMLBF._onUpdate();
+
+ await promiseInstallFile(
+ do_get_file("../data/signing_checks/langpack_signed.xpi")
+ );
+ let addon = await promiseAddonByID("langpack-klingon@firefox.mozilla.org");
+ Assert.equal(addon.signedState, AddonManager.SIGNEDSTATE_SIGNED);
+ if (AppConstants.NIGHTLY_BUILD) {
+ // Langpacks built for Nightly are currently signed by releng and not
+ // submitted to AMO, so we have to ignore the blocks of the MLBF.
+ Assert.equal(
+ addon.blocklistState,
+ Ci.nsIBlocklistService.STATE_NOT_BLOCKED,
+ "Langpacks cannot be blocked via the MLBF"
+ );
+ } else {
+ // On non-Nightly, langpacks are submitted through AMO so we will enforce
+ // the MLBF blocklist for them.
+ Assert.equal(addon.blocklistState, Ci.nsIBlocklistService.STATE_BLOCKED);
+ }
+ await addon.uninstall();
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_mlbf_dump.js b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_mlbf_dump.js
new file mode 100644
index 0000000000..8ac64f2e88
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_mlbf_dump.js
@@ -0,0 +1,97 @@
+/* Any copyright is dedicated to the Public Domain.
+ * https://creativecommons.org/publicdomain/zero/1.0/ */
+
+"use strict";
+
+/**
+ * @fileOverview Verifies that the MLBF dump of the addons blocklist is
+ * correctly registered.
+ */
+
+Services.prefs.setBoolPref("extensions.blocklist.useMLBF", true);
+Services.prefs.setBoolPref("extensions.blocklist.useMLBF.stashes", true);
+
+const ExtensionBlocklistMLBF = getExtensionBlocklistMLBF();
+
+// A known blocked version from bug 1626602.
+const blockedAddon = {
+ id: "{6f62927a-e380-401a-8c9e-c485b7d87f0d}",
+ version: "9.2.0",
+ // The following date is the date of the first checked in MLBF. Any MLBF
+ // generated in the future should be generated after this date, to be useful.
+ signedDate: new Date(1588098908496), // 2020-04-28 (dummy date)
+ signedState: AddonManager.SIGNEDSTATE_SIGNED,
+};
+
+// A known add-on that is not blocked, as of writing. It is likely not going
+// to be blocked because it does not have any executable code.
+const nonBlockedAddon = {
+ id: "disable-ctrl-q-and-cmd-q@robwu.nl",
+ version: "1",
+ signedDate: new Date(1482430349000), // 2016-12-22 (actual signing time).
+ signedState: AddonManager.SIGNEDSTATE_SIGNED,
+};
+
+async function sha256(arrayBuffer) {
+ Cu.importGlobalProperties(["crypto"]);
+ let hash = await crypto.subtle.digest("SHA-256", arrayBuffer);
+ const toHex = b => b.toString(16).padStart(2, "0");
+ return Array.from(new Uint8Array(hash), toHex).join("");
+}
+
+add_task(async function verify_dump_first_run() {
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1");
+
+ // Tapping into the internals of ExtensionBlocklistMLBF._fetchMLBF to observe
+ // MLBF request details.
+ const observed = [];
+
+ ExtensionBlocklistMLBF.ensureInitialized();
+ // Despite being called "download", this does not actually access the network
+ // when there is a valid dump.
+ const originalImpl = ExtensionBlocklistMLBF._client.attachments.download;
+ ExtensionBlocklistMLBF._client.attachments.download = function(record) {
+ let downloadPromise = originalImpl.apply(this, arguments);
+ observed.push({ inputRecord: record, downloadPromise });
+ return downloadPromise;
+ };
+
+ Assert.equal(
+ await Blocklist.getAddonBlocklistState(blockedAddon),
+ Ci.nsIBlocklistService.STATE_BLOCKED,
+ "A add-on that is known to be on the blocklist should be blocked"
+ );
+ Assert.equal(
+ await Blocklist.getAddonBlocklistState(nonBlockedAddon),
+ Ci.nsIBlocklistService.STATE_NOT_BLOCKED,
+ "A known non-blocked add-on should not be blocked"
+ );
+
+ Assert.equal(observed.length, 1, "expected number of MLBF download requests");
+
+ const { inputRecord, downloadPromise } = observed[0];
+
+ Assert.ok(inputRecord, "addons-bloomfilters collection dump exists");
+
+ const downloadResult = await downloadPromise;
+
+ // Verify that the "download" result really originates from the local dump.
+ // "dump_match" means that the record exists in the collection and that an
+ // attachment was found.
+ //
+ // If this fails:
+ // - "dump_fallback" means that the MLBF attachment is out of sync with the
+ // collection data.
+ // - undefined could mean that the implementation of Attachments.jsm changed.
+ Assert.equal(
+ downloadResult._source,
+ "dump_match",
+ "MLBF attachment should match the RemoteSettings collection"
+ );
+
+ Assert.equal(
+ await sha256(downloadResult.buffer),
+ inputRecord.attachment.hash,
+ "The content of the attachment should actually matches the record"
+ );
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_mlbf_fetch.js b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_mlbf_fetch.js
new file mode 100644
index 0000000000..1ba51c99a3
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_mlbf_fetch.js
@@ -0,0 +1,207 @@
+/* Any copyright is dedicated to the Public Domain.
+ * https://creativecommons.org/publicdomain/zero/1.0/ */
+
+"use strict";
+
+/**
+ * @fileOverview Tests the MLBF and RemoteSettings synchronization logic.
+ */
+
+Services.prefs.setBoolPref("extensions.blocklist.useMLBF", true);
+
+const { Downloader } = ChromeUtils.import(
+ "resource://services-settings/Attachments.jsm"
+);
+
+const ExtensionBlocklistMLBF = getExtensionBlocklistMLBF();
+
+// This test needs to interact with the RemoteSettings client.
+ExtensionBlocklistMLBF.ensureInitialized();
+
+add_task(async function fetch_invalid_mlbf_record() {
+ let invalidRecord = {
+ attachment: { size: 1, hash: "definitely not valid" },
+ generation_time: 1,
+ };
+
+ // _fetchMLBF(invalidRecord) may succeed if there is a MLBF dump packaged with
+ // the application. This test intentionally hides the actual path to get
+ // deterministic results. To check whether the dump is correctly registered,
+ // run test_blocklist_mlbf_dump.js
+
+ // Forget about the packaged attachment.
+ Downloader._RESOURCE_BASE_URL = "invalid://bogus";
+ // NetworkError is expected here. The JSON.parse error could be triggered via
+ // _baseAttachmentsURL < downloadAsBytes < download < download < _fetchMLBF if
+ // the request to services.settings.server (http://localhost/dummy-kinto/v1)
+ // is fulfilled (but with invalid JSON). That request is not expected to be
+ // fulfilled in the first place, but that is not a concern of this test.
+ // This test passes if _fetchMLBF() rejects when given an invalid record.
+ await Assert.rejects(
+ ExtensionBlocklistMLBF._fetchMLBF(invalidRecord),
+ /NetworkError|SyntaxError: JSON\.parse/,
+ "record not found when there is no packaged MLBF"
+ );
+});
+
+// Other tests can mock _testMLBF, so let's verify that it works as expected.
+add_task(async function fetch_valid_mlbf() {
+ await ExtensionBlocklistMLBF._client.db.saveAttachment(
+ ExtensionBlocklistMLBF.RS_ATTACHMENT_ID,
+ { record: MLBF_RECORD, blob: await load_mlbf_record_as_blob() }
+ );
+
+ const result = await ExtensionBlocklistMLBF._fetchMLBF(MLBF_RECORD);
+ Assert.equal(result.cascadeHash, MLBF_RECORD.attachment.hash, "hash OK");
+ Assert.equal(result.generationTime, MLBF_RECORD.generation_time, "time OK");
+ Assert.ok(result.cascadeFilter.has("@blocked:1"), "item blocked");
+ Assert.ok(!result.cascadeFilter.has("@unblocked:2"), "item not blocked");
+
+ const result2 = await ExtensionBlocklistMLBF._fetchMLBF({
+ attachment: { size: 1, hash: "invalid" },
+ generation_time: Date.now(),
+ });
+ Assert.equal(
+ result2.cascadeHash,
+ MLBF_RECORD.attachment.hash,
+ "The cached MLBF should be used when the attachment is invalid"
+ );
+
+ // The attachment is kept in the database for use by the next test task.
+});
+
+// Test that results of the public API are consistent with the MLBF file.
+add_task(async function public_api_uses_mlbf() {
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1");
+ await promiseStartupManager();
+
+ const blockedAddon = {
+ id: "@blocked",
+ version: "1",
+ signedDate: new Date(0), // a date in the past, before MLBF's generationTime.
+ signedState: AddonManager.SIGNEDSTATE_SIGNED,
+ };
+ const nonBlockedAddon = {
+ id: "@unblocked",
+ version: "2",
+ signedDate: new Date(0), // a date in the past, before MLBF's generationTime.
+ signedState: AddonManager.SIGNEDSTATE_SIGNED,
+ };
+
+ await AddonTestUtils.loadBlocklistRawData({ extensionsMLBF: [MLBF_RECORD] });
+
+ Assert.deepEqual(
+ await Blocklist.getAddonBlocklistEntry(blockedAddon),
+ {
+ state: Ci.nsIBlocklistService.STATE_BLOCKED,
+ url:
+ "https://addons.mozilla.org/en-US/xpcshell/blocked-addon/@blocked/1/",
+ },
+ "Blocked addon should have blocked entry"
+ );
+
+ Assert.deepEqual(
+ await Blocklist.getAddonBlocklistEntry(nonBlockedAddon),
+ null,
+ "Non-blocked addon should not be blocked"
+ );
+
+ Assert.equal(
+ await Blocklist.getAddonBlocklistState(blockedAddon),
+ Ci.nsIBlocklistService.STATE_BLOCKED,
+ "Blocked entry should have blocked state"
+ );
+
+ Assert.equal(
+ await Blocklist.getAddonBlocklistState(nonBlockedAddon),
+ Ci.nsIBlocklistService.STATE_NOT_BLOCKED,
+ "Non-blocked entry should have unblocked state"
+ );
+
+ // Note: Blocklist collection and attachment carries over to the next test.
+});
+
+// Verifies that the metadata (time of validity) of an updated MLBF record is
+// correctly used, even if the MLBF itself has not changed.
+add_task(async function fetch_updated_mlbf_same_hash() {
+ const recordUpdate = {
+ ...MLBF_RECORD,
+ generation_time: MLBF_RECORD.generation_time + 1,
+ };
+ const blockedAddonUpdate = {
+ id: "@blocked",
+ version: "1",
+ signedDate: new Date(recordUpdate.generation_time),
+ signedState: AddonManager.SIGNEDSTATE_SIGNED,
+ };
+
+ // The blocklist already includes "@blocked:1", but the last specified
+ // generation time is MLBF_RECORD.generation_time. So the addon cannot be
+ // blocked, because the block decision could be a false positive.
+ Assert.equal(
+ await Blocklist.getAddonBlocklistState(blockedAddonUpdate),
+ Ci.nsIBlocklistService.STATE_NOT_BLOCKED,
+ "Add-on not blocked before blocklist update"
+ );
+
+ await AddonTestUtils.loadBlocklistRawData({ extensionsMLBF: [recordUpdate] });
+ // The MLBF is now known to apply to |blockedAddonUpdate|.
+
+ Assert.equal(
+ await Blocklist.getAddonBlocklistState(blockedAddonUpdate),
+ Ci.nsIBlocklistService.STATE_BLOCKED,
+ "Add-on blocked after update"
+ );
+
+ // Note: Blocklist collection and attachment carries over to the next test.
+});
+
+// Checks the remaining cases of database corruption that haven't been handled
+// before.
+add_task(async function handle_database_corruption() {
+ const blockedAddon = {
+ id: "@blocked",
+ version: "1",
+ signedDate: new Date(0), // a date in the past, before MLBF's generationTime.
+ signedState: AddonManager.SIGNEDSTATE_SIGNED,
+ };
+ async function checkBlocklistWorks() {
+ Assert.equal(
+ await Blocklist.getAddonBlocklistState(blockedAddon),
+ Ci.nsIBlocklistService.STATE_BLOCKED,
+ "Add-on should be blocked by the blocklist"
+ );
+ }
+
+ // In the fetch_invalid_mlbf_record we checked that a cached / packaged MLBF
+ // attachment is used as a fallback when the record is invalid. Here we also
+ // check that there is a fallback when there is no record at all.
+
+ // Include a dummy record in the list, to prevent RemoteSettings from
+ // importing a JSON dump with unexpected records.
+ await AddonTestUtils.loadBlocklistRawData({ extensionsMLBF: [{}] });
+ // When the collection is empty, the last known MLBF should be used anyway.
+ await checkBlocklistWorks();
+
+ // Now we also remove the cached file...
+ await ExtensionBlocklistMLBF._client.db.saveAttachment(
+ ExtensionBlocklistMLBF.RS_ATTACHMENT_ID,
+ null
+ );
+ // Deleting the file shouldn't cause issues because the MLBF is loaded once
+ // and then kept in memory.
+ await checkBlocklistWorks();
+
+ // Force an update while we don't have any blocklist data nor cache.
+ await ExtensionBlocklistMLBF._onUpdate();
+ // As a fallback, continue to use the in-memory version of the blocklist.
+ await checkBlocklistWorks();
+
+ // Memory gone, e.g. after a browser restart.
+ delete ExtensionBlocklistMLBF._mlbfData;
+ Assert.equal(
+ await Blocklist.getAddonBlocklistState(blockedAddon),
+ Ci.nsIBlocklistService.STATE_NOT_BLOCKED,
+ "Blocklist can't work if all blocklist data is gone"
+ );
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_mlbf_stashes.js b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_mlbf_stashes.js
new file mode 100644
index 0000000000..39042fba56
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_mlbf_stashes.js
@@ -0,0 +1,252 @@
+/* Any copyright is dedicated to the Public Domain.
+ * https://creativecommons.org/publicdomain/zero/1.0/ */
+
+"use strict";
+
+Services.prefs.setBoolPref("extensions.blocklist.useMLBF", true);
+Services.prefs.setBoolPref("extensions.blocklist.useMLBF.stashes", true);
+
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1");
+
+const ExtensionBlocklistMLBF = getExtensionBlocklistMLBF();
+const MLBF_LOAD_ATTEMPTS = [];
+ExtensionBlocklistMLBF._fetchMLBF = async record => {
+ MLBF_LOAD_ATTEMPTS.push(record);
+ return {
+ generationTime: 0,
+ cascadeFilter: {
+ has(blockKey) {
+ if (blockKey === "@onlyblockedbymlbf:1") {
+ return true;
+ }
+ throw new Error("bloom filter should not be used in this test");
+ },
+ },
+ };
+};
+
+async function checkBlockState(addonId, version, expectBlocked) {
+ let addon = {
+ id: addonId,
+ version,
+ // Note: signedDate is missing, so the MLBF does not apply
+ // and we will effectively only test stashing.
+ };
+ let state = await Blocklist.getAddonBlocklistState(addon);
+ if (expectBlocked) {
+ Assert.equal(state, Ci.nsIBlocklistService.STATE_BLOCKED);
+ } else {
+ Assert.equal(state, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+ }
+}
+
+add_task(async function setup() {
+ await promiseStartupManager();
+});
+
+// Tests that add-ons can be blocked / unblocked via the stash.
+add_task(async function basic_stash() {
+ await AddonTestUtils.loadBlocklistRawData({
+ extensionsMLBF: [
+ {
+ stash_time: 0,
+ stash: {
+ blocked: ["@blocked:1"],
+ unblocked: ["@notblocked:2"],
+ },
+ },
+ ],
+ });
+ await checkBlockState("@blocked", "1", true);
+ await checkBlockState("@notblocked", "2", false);
+ // Not in stash (but unsigned, so shouldn't reach MLBF):
+ await checkBlockState("@blocked", "2", false);
+
+ Assert.equal(
+ await Blocklist.getAddonBlocklistState({
+ id: "@onlyblockedbymlbf",
+ version: "1",
+ signedDate: new Date(0), // = the MLBF's generationTime.
+ signedState: AddonManager.SIGNEDSTATE_SIGNED,
+ }),
+ Ci.nsIBlocklistService.STATE_BLOCKED,
+ "falls through to MLBF if entry is not found in stash"
+ );
+
+ Assert.deepEqual(MLBF_LOAD_ATTEMPTS, [null], "MLBF attachment not found");
+});
+
+// To complement the privileged_xpi_not_blocked in test_blocklist_mlbf.js,
+// verify that privileged add-ons can still be blocked through stashes.
+add_task(async function privileged_addon_blocked_by_stash() {
+ const system_addon = {
+ id: "@blocked",
+ version: "1",
+ signedDate: new Date(0), // = the MLBF's generationTime.
+ signedState: AddonManager.SIGNEDSTATE_PRIVILEGED,
+ };
+ Assert.equal(
+ await Blocklist.getAddonBlocklistState(system_addon),
+ Ci.nsIBlocklistService.STATE_BLOCKED,
+ "Privileged add-ons can still be blocked by a stash"
+ );
+
+ system_addon.signedState = AddonManager.SIGNEDSTATE_SYSTEM;
+ Assert.equal(
+ await Blocklist.getAddonBlocklistState(system_addon),
+ Ci.nsIBlocklistService.STATE_BLOCKED,
+ "Privileged system add-ons can still be blocked by a stash"
+ );
+
+ // For comparison, when an add-on is only blocked by a MLBF, the block
+ // decision is ignored.
+ system_addon.id = "@onlyblockedbymlbf";
+ Assert.equal(
+ await Blocklist.getAddonBlocklistState(system_addon),
+ Ci.nsIBlocklistService.STATE_NOT_BLOCKED,
+ "Privileged add-ons cannot be blocked via a MLBF"
+ );
+ // (note that we haven't checked that SIGNEDSTATE_PRIVILEGED is not blocked
+ // via the MLBF, but that is already covered by test_blocklist_mlbf.js ).
+});
+
+// To complement langpack_not_blocked_on_Nightly in test_blocklist_mlbf.js,
+// verify that langpacks can still be blocked through stashes.
+add_task(async function langpack_blocked_by_stash() {
+ const langpack_addon = {
+ id: "@blocked",
+ type: "locale",
+ version: "1",
+ signedDate: new Date(0), // = the MLBF's generationTime.
+ signedState: AddonManager.SIGNEDSTATE_SIGNED,
+ };
+ Assert.equal(
+ await Blocklist.getAddonBlocklistState(langpack_addon),
+ Ci.nsIBlocklistService.STATE_BLOCKED,
+ "Langpack add-ons can still be blocked by a stash"
+ );
+
+ // For comparison, when an add-on is only blocked by a MLBF, the block
+ // decision is ignored on Nightly (but blocked on non-Nightly).
+ langpack_addon.id = "@onlyblockedbymlbf";
+ if (AppConstants.NIGHTLY_BUILD) {
+ Assert.equal(
+ await Blocklist.getAddonBlocklistState(langpack_addon),
+ Ci.nsIBlocklistService.STATE_NOT_BLOCKED,
+ "Langpack add-ons cannot be blocked via a MLBF on Nightly"
+ );
+ } else {
+ Assert.equal(
+ await Blocklist.getAddonBlocklistState(langpack_addon),
+ Ci.nsIBlocklistService.STATE_BLOCKED,
+ "Langpack add-ons can be blocked via a MLBF on non-Nightly"
+ );
+ }
+});
+
+// Tests that invalid stash entries are ignored.
+add_task(async function invalid_stashes() {
+ await AddonTestUtils.loadBlocklistRawData({
+ extensionsMLBF: [
+ {},
+ { stash: null },
+ { stash: 1 },
+ { stash: {} },
+ { stash: { blocked: ["@broken:1", "@okid:1"] } },
+ { stash: { unblocked: ["@broken:2"] } },
+ // The only correct entry:
+ { stash: { blocked: ["@okid:2"], unblocked: ["@okid:1"] } },
+ { stash: { blocked: ["@broken:1", "@okid:1"] } },
+ { stash: { unblocked: ["@broken:2", "@okid:2"] } },
+ ],
+ });
+ // The valid stash entry should be applied:
+ await checkBlockState("@okid", "1", false);
+ await checkBlockState("@okid", "2", true);
+ // Entries from invalid stashes should be ignored:
+ await checkBlockState("@broken", "1", false);
+ await checkBlockState("@broken", "2", false);
+});
+
+// Blocklist stashes should be processed in the reverse chronological order.
+add_task(async function stash_time_order() {
+ await AddonTestUtils.loadBlocklistRawData({
+ extensionsMLBF: [
+ // "@a:1" and "@a:2" are blocked at time 1, but unblocked later.
+ { stash_time: 2, stash: { blocked: [], unblocked: ["@a:1"] } },
+ { stash_time: 1, stash: { blocked: ["@a:1", "@a:2"], unblocked: [] } },
+ { stash_time: 3, stash: { blocked: [], unblocked: ["@a:2"] } },
+
+ // "@b:1" and "@b:2" are unblocked at time 4, but blocked later.
+ { stash_time: 5, stash: { blocked: ["@b:1"], unblocked: [] } },
+ { stash_time: 4, stash: { blocked: [], unblocked: ["@b:1", "@b:2"] } },
+ { stash_time: 6, stash: { blocked: ["@b:2"], unblocked: [] } },
+ ],
+ });
+ await checkBlockState("@a", "1", false);
+ await checkBlockState("@a", "2", false);
+
+ await checkBlockState("@b", "1", true);
+ await checkBlockState("@b", "2", true);
+});
+
+// Tests that the correct records+attachment are chosen depending on the pref.
+add_task(async function mlbf_attachment_type_and_stash_is_correct() {
+ MLBF_LOAD_ATTEMPTS.length = 0;
+ const records = [
+ { stash_time: 0, stash: { blocked: ["@blocked:1"], unblocked: [] } },
+ { attachment_type: "bloomfilter-base", attachment: {}, generation_time: 0 },
+ { attachment_type: "bloomfilter-full", attachment: {}, generation_time: 1 },
+ ];
+ await AddonTestUtils.loadBlocklistRawData({ extensionsMLBF: records });
+ // Check that the pref works.
+ await checkBlockState("@blocked", "1", true);
+ await toggleStashPref(false);
+ await checkBlockState("@blocked", "1", false);
+ await toggleStashPref(true);
+ await checkBlockState("@blocked", "1", true);
+
+ Assert.deepEqual(
+ MLBF_LOAD_ATTEMPTS.map(r => r?.attachment_type),
+ [
+ // Initial load with pref true
+ "bloomfilter-base",
+ // Pref off.
+ "bloomfilter-full",
+ // Pref on again.
+ "bloomfilter-base",
+ ],
+ "Expected attempts to load MLBF as part of update"
+ );
+});
+
+// When stashes are disabled, "bloomfilter-full" may be used (as seen in the
+// previous test, mlbf_attachment_type_and_stash_is_correct). With stashes
+// enabled, "bloomfilter-full" should be ignored, however.
+add_task(async function mlbf_bloomfilter_full_ignored() {
+ MLBF_LOAD_ATTEMPTS.length = 0;
+
+ await AddonTestUtils.loadBlocklistRawData({
+ extensionsMLBF: [{ attachment_type: "bloomfilter-full", attachment: {} }],
+ });
+
+ // When stashes are enabled, only bloomfilter-base records should be used.
+ // Since there are no such records, we shouldn't find anything.
+ Assert.deepEqual(MLBF_LOAD_ATTEMPTS, [null], "no matching MLBFs found");
+});
+
+// Tests that the most recent MLBF is downloaded.
+add_task(async function mlbf_generation_time_recent() {
+ MLBF_LOAD_ATTEMPTS.length = 0;
+ const records = [
+ { attachment_type: "bloomfilter-base", attachment: {}, generation_time: 2 },
+ { attachment_type: "bloomfilter-base", attachment: {}, generation_time: 3 },
+ { attachment_type: "bloomfilter-base", attachment: {}, generation_time: 1 },
+ ];
+ await AddonTestUtils.loadBlocklistRawData({ extensionsMLBF: records });
+ Assert.equal(
+ MLBF_LOAD_ATTEMPTS[0].generation_time,
+ 3,
+ "expected to load most recent MLBF"
+ );
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_mlbf_telemetry.js b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_mlbf_telemetry.js
new file mode 100644
index 0000000000..32d7f01f19
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_mlbf_telemetry.js
@@ -0,0 +1,184 @@
+/* Any copyright is dedicated to the Public Domain.
+ * https://creativecommons.org/publicdomain/zero/1.0/ */
+
+"use strict";
+
+Services.prefs.setBoolPref("extensions.blocklist.useMLBF", true);
+Services.prefs.setBoolPref("extensions.blocklist.useMLBF.stashes", true);
+
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1");
+
+const { Downloader } = ChromeUtils.import(
+ "resource://services-settings/Attachments.jsm"
+);
+
+const { TelemetryController } = ChromeUtils.import(
+ "resource://gre/modules/TelemetryController.jsm"
+);
+const { TelemetryTestUtils } = ChromeUtils.import(
+ "resource://testing-common/TelemetryTestUtils.jsm"
+);
+
+const OLDEST_STASH = { stash: { blocked: [], unblocked: [] }, stash_time: 2e6 };
+const NEWEST_STASH = { stash: { blocked: [], unblocked: [] }, stash_time: 5e6 };
+const RECORDS_WITH_STASHES_AND_MLBF = [MLBF_RECORD, OLDEST_STASH, NEWEST_STASH];
+
+const ExtensionBlocklistMLBF = getExtensionBlocklistMLBF();
+
+function assertTelemetryScalars(expectedScalars) {
+ let scalars = TelemetryTestUtils.getProcessScalars("parent");
+
+ for (const scalarName of Object.keys(expectedScalars || {})) {
+ equal(
+ scalars[scalarName],
+ expectedScalars[scalarName],
+ `Got the expected value for ${scalarName} scalar`
+ );
+ }
+}
+
+function toUTC(time) {
+ return new Date(time).toUTCString();
+}
+
+add_task(async function setup() {
+ await TelemetryController.testSetup();
+ await promiseStartupManager();
+
+ // Disable the packaged record and attachment to make sure that the test
+ // will not fall back to the packaged attachments.
+ Downloader._RESOURCE_BASE_URL = "invalid://bogus";
+});
+
+add_task(async function test_initialization() {
+ ExtensionBlocklistMLBF.ensureInitialized();
+ assertTelemetryScalars({
+ "blocklist.mlbf_enabled": true,
+ "blocklist.mlbf_stashes": true,
+ // In other parts of this test, this value is not checked any more.
+ // test_blocklist_telemetry.js already checks lastModified_rs_addons_mlbf.
+ "blocklist.lastModified_rs_addons_mlbf": undefined,
+ "blocklist.mlbf_generation_time": undefined,
+ "blocklist.mlbf_stash_time_oldest": undefined,
+ "blocklist.mlbf_stash_time_newest": undefined,
+ });
+});
+
+// Test what happens if there is no blocklist data at all.
+add_task(async function test_without_mlbf() {
+ // Add one (invalid) value to the blocklist, to prevent the RemoteSettings
+ // client from importing the JSON dump (which could potentially cause the
+ // test to fail due to the unexpected imported records).
+ await AddonTestUtils.loadBlocklistRawData({ extensionsMLBF: [{}] });
+ assertTelemetryScalars({
+ "blocklist.mlbf_enabled": true,
+ "blocklist.mlbf_stashes": true,
+ "blocklist.mlbf_generation_time": "Missing Date",
+ "blocklist.mlbf_stash_time_oldest": "Missing Date",
+ "blocklist.mlbf_stash_time_newest": "Missing Date",
+ });
+});
+
+// Test the telemetry that would be recorded in the common case.
+add_task(async function test_common_good_case_with_stashes() {
+ // The exact content of the attachment does not matter in this test, as long
+ // as the data is valid.
+ await ExtensionBlocklistMLBF._client.db.saveAttachment(
+ ExtensionBlocklistMLBF.RS_ATTACHMENT_ID,
+ { record: MLBF_RECORD, blob: await load_mlbf_record_as_blob() }
+ );
+ await AddonTestUtils.loadBlocklistRawData({
+ extensionsMLBF: RECORDS_WITH_STASHES_AND_MLBF,
+ });
+ assertTelemetryScalars({
+ "blocklist.mlbf_enabled": true,
+ "blocklist.mlbf_stashes": true,
+ "blocklist.mlbf_generation_time": toUTC(MLBF_RECORD.generation_time),
+ "blocklist.mlbf_stash_time_oldest": toUTC(OLDEST_STASH.stash_time),
+ "blocklist.mlbf_stash_time_newest": toUTC(NEWEST_STASH.stash_time),
+ });
+
+ // The records and cached attachment carries over to the next tests.
+});
+
+add_task(async function test_toggle_stash_pref() {
+ // The previous test had imported RECORDS_WITH_STASHES_AND_MLBF.
+ // Verify that toggling the pref causes those stashes to be ignored.
+ await toggleStashPref(false, () => {
+ // Telemetry should be updated immediately after setting the pref.
+ assertTelemetryScalars({
+ "blocklist.mlbf_enabled": true,
+ "blocklist.mlbf_stashes": false,
+ });
+ });
+ assertTelemetryScalars({
+ "blocklist.mlbf_enabled": true,
+ "blocklist.mlbf_stashes": false,
+ "blocklist.mlbf_generation_time": toUTC(MLBF_RECORD.generation_time),
+ "blocklist.mlbf_stash_time_oldest": "Missing Date",
+ "blocklist.mlbf_stash_time_newest": "Missing Date",
+ });
+
+ await toggleStashPref(true, () => {
+ // Telemetry should be updated immediately after setting the pref.
+ assertTelemetryScalars({
+ "blocklist.mlbf_enabled": true,
+ "blocklist.mlbf_stashes": true,
+ });
+ });
+ assertTelemetryScalars({
+ "blocklist.mlbf_enabled": true,
+ "blocklist.mlbf_stashes": true,
+ "blocklist.mlbf_generation_time": toUTC(MLBF_RECORD.generation_time),
+ "blocklist.mlbf_stash_time_oldest": toUTC(OLDEST_STASH.stash_time),
+ "blocklist.mlbf_stash_time_newest": toUTC(NEWEST_STASH.stash_time),
+ });
+});
+
+// Test what happens when there are no stashes in the collection itself.
+add_task(async function test_without_stashes() {
+ await AddonTestUtils.loadBlocklistRawData({ extensionsMLBF: [MLBF_RECORD] });
+ assertTelemetryScalars({
+ "blocklist.mlbf_enabled": true,
+ "blocklist.mlbf_stashes": true,
+ "blocklist.mlbf_generation_time": toUTC(MLBF_RECORD.generation_time),
+ "blocklist.mlbf_stash_time_oldest": "Missing Date",
+ "blocklist.mlbf_stash_time_newest": "Missing Date",
+ });
+});
+
+// Test that the mlbf_enabled and mlbf_stashes scalars are updated in response
+// to preference changes.
+add_task(async function test_toggle_preferences() {
+ // Disable the blocklist, to prevent the v2 blocklist from initializing.
+ // We only care about scalar updates in response to preference changes.
+ Services.prefs.setBoolPref("extensions.blocklist.enabled", false);
+ // Sanity check: scalars haven't changed.
+ assertTelemetryScalars({
+ "blocklist.mlbf_enabled": true,
+ "blocklist.mlbf_stashes": true,
+ "blocklist.mlbf_generation_time": toUTC(MLBF_RECORD.generation_time),
+ });
+
+ Services.prefs.setBoolPref("extensions.blocklist.useMLBF.stashes", false);
+ assertTelemetryScalars({
+ "blocklist.mlbf_enabled": true,
+ "blocklist.mlbf_stashes": false,
+ "blocklist.mlbf_generation_time": toUTC(MLBF_RECORD.generation_time),
+ });
+
+ Services.prefs.setBoolPref("extensions.blocklist.useMLBF", false);
+ assertTelemetryScalars({
+ "blocklist.mlbf_enabled": false,
+ "blocklist.mlbf_stashes": false,
+ "blocklist.mlbf_generation_time": toUTC(MLBF_RECORD.generation_time),
+ });
+
+ Services.prefs.setBoolPref("extensions.blocklist.useMLBF.stashes", true);
+ assertTelemetryScalars({
+ "blocklist.mlbf_enabled": false,
+ // The mlbf_stashes scalar is only updated when useMLBF is true.
+ "blocklist.mlbf_stashes": false,
+ "blocklist.mlbf_generation_time": toUTC(MLBF_RECORD.generation_time),
+ });
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_mlbf_update.js b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_mlbf_update.js
new file mode 100644
index 0000000000..8ab7610da4
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_mlbf_update.js
@@ -0,0 +1,75 @@
+/* Any copyright is dedicated to the Public Domain.
+ * https://creativecommons.org/publicdomain/zero/1.0/ */
+
+"use strict";
+
+/**
+ * @fileOverview Checks that the MLBF updating logic works reasonably.
+ */
+
+Services.prefs.setBoolPref("extensions.blocklist.useMLBF", true);
+const ExtensionBlocklistMLBF = getExtensionBlocklistMLBF();
+
+// This test needs to interact with the RemoteSettings client.
+ExtensionBlocklistMLBF.ensureInitialized();
+
+// Multiple internal calls to update should be coalesced and end up with the
+// MLBF attachment from the last update call.
+add_task(async function collapse_multiple_pending_update_requests() {
+ const observed = [];
+
+ // The first step of starting an update is to read from the RemoteSettings
+ // collection. When a non-forced update is requested while another update is
+ // pending, the non-forced update should return/await the previous call
+ // instead of starting a new read/fetch from the RemoteSettings collection.
+ // Add a spy to the RemoteSettings client, so we can verify that the number
+ // of RemoteSettings accesses matches with what we expect.
+ const originalClientGet = ExtensionBlocklistMLBF._client.get;
+ const spyClientGet = (tag, returnValue) => {
+ ExtensionBlocklistMLBF._client.get = async function() {
+ // Record the method call.
+ observed.push(tag);
+ // Clone a valid record and tag it so we can identify it below.
+ let dummyRecord = JSON.parse(JSON.stringify(MLBF_RECORD));
+ dummyRecord.tagged = tag;
+ return [dummyRecord];
+ };
+ };
+
+ // Another significant part of updating is fetching the MLBF attachment.
+ // Add a spy too, so we can check which attachment is being requested.
+ const originalFetchMLBF = ExtensionBlocklistMLBF._fetchMLBF;
+ ExtensionBlocklistMLBF._fetchMLBF = async function(record) {
+ observed.push(`fetchMLBF:${record.tagged}`);
+ throw new Error(`Deliberately ignoring call to MLBF:${record.tagged}`);
+ };
+
+ spyClientGet("initial"); // Very first call = read RS.
+ let update1 = ExtensionBlocklistMLBF._updateMLBF(false);
+ spyClientGet("unexpected update2"); // Non-forced update = reuse update1.
+ let update2 = ExtensionBlocklistMLBF._updateMLBF(false);
+ spyClientGet("forced1"); // forceUpdate=true = supersede previous update.
+ let forcedUpdate1 = ExtensionBlocklistMLBF._updateMLBF(true);
+ spyClientGet("forced2"); // forceUpdate=true = supersede previous update.
+ let forcedUpdate2 = ExtensionBlocklistMLBF._updateMLBF(true);
+
+ let res = await Promise.all([update1, update2, forcedUpdate1, forcedUpdate2]);
+
+ Assert.equal(observed.length, 4, "expected number of observed events");
+ Assert.equal(observed[0], "initial", "First update should request records");
+ Assert.equal(observed[1], "forced1", "Forced update supersedes initial");
+ Assert.equal(observed[2], "forced2", "Forced update supersedes forced1");
+ // We call the _updateMLBF methods immediately after each other. Every update
+ // request starts with an asynchronous operation (looking up the RS records),
+ // so the implementation should return early for all update requests except
+ // for the last one. So we should only observe a fetch for the last request.
+ Assert.equal(observed[3], "fetchMLBF:forced2", "expected fetch result");
+
+ // All update requests should end up with the same result.
+ Assert.equal(res[0], res[1], "update1 == update2");
+ Assert.equal(res[1], res[2], "update2 == forcedUpdate1");
+ Assert.equal(res[2], res[3], "forcedUpdate1 == forcedUpdate2");
+
+ ExtensionBlocklistMLBF._client.get = originalClientGet;
+ ExtensionBlocklistMLBF._fetchMLBF = originalFetchMLBF;
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_osabi.js b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_osabi.js
new file mode 100644
index 0000000000..4e681d0b89
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_osabi.js
@@ -0,0 +1,286 @@
+/* This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/.
+ */
+
+// useMLBF=true only supports blocking by version+ID, not by OS/ABI.
+Services.prefs.setBoolPref("extensions.blocklist.useMLBF", false);
+
+const profileDir = gProfD.clone();
+profileDir.append("extensions");
+
+const ADDONS = [
+ {
+ id: "test_bug393285_1@tests.mozilla.org",
+ name: "extension 1",
+ version: "1.0",
+
+ // No info in blocklist, shouldn't be blocked
+ notBlocklisted: [
+ ["1", "1.9"],
+ [null, null],
+ ],
+ },
+ {
+ id: "test_bug393285_2@tests.mozilla.org",
+ name: "extension 2",
+ version: "1.0",
+
+ // Should always be blocked
+ blocklisted: [
+ ["1", "1.9"],
+ [null, null],
+ ],
+ },
+ {
+ id: "test_bug393285_3a@tests.mozilla.org",
+ name: "extension 3a",
+ version: "1.0",
+
+ // Only version 1 should be blocked
+ blocklisted: [
+ ["1", "1.9"],
+ [null, null],
+ ],
+ },
+ {
+ id: "test_bug393285_3b@tests.mozilla.org",
+ name: "extension 3b",
+ version: "2.0",
+
+ // Only version 1 should be blocked
+ notBlocklisted: [["1", "1.9"]],
+ },
+ {
+ id: "test_bug393285_4@tests.mozilla.org",
+ name: "extension 4",
+ version: "1.0",
+
+ // Should be blocked for app version 1
+ blocklisted: [
+ ["1", "1.9"],
+ [null, null],
+ ],
+ notBlocklisted: [["2", "1.9"]],
+ },
+ {
+ id: "test_bug393285_5@tests.mozilla.org",
+ name: "extension 5",
+ version: "1.0",
+
+ // Not blocklisted because we are a different OS
+ notBlocklisted: [["2", "1.9"]],
+ },
+ {
+ id: "test_bug393285_6@tests.mozilla.org",
+ name: "extension 6",
+ version: "1.0",
+
+ // Blocklisted based on OS
+ blocklisted: [["2", "1.9"]],
+ },
+ {
+ id: "test_bug393285_7@tests.mozilla.org",
+ name: "extension 7",
+ version: "1.0",
+
+ // Blocklisted based on OS
+ blocklisted: [["2", "1.9"]],
+ },
+ {
+ id: "test_bug393285_8@tests.mozilla.org",
+ name: "extension 8",
+ version: "1.0",
+
+ // Not blocklisted because we are a different ABI
+ notBlocklisted: [["2", "1.9"]],
+ },
+ {
+ id: "test_bug393285_9@tests.mozilla.org",
+ name: "extension 9",
+ version: "1.0",
+
+ // Blocklisted based on ABI
+ blocklisted: [["2", "1.9"]],
+ },
+ {
+ id: "test_bug393285_10@tests.mozilla.org",
+ name: "extension 10",
+ version: "1.0",
+
+ // Blocklisted based on ABI
+ blocklisted: [["2", "1.9"]],
+ },
+ {
+ id: "test_bug393285_11@tests.mozilla.org",
+ name: "extension 11",
+ version: "1.0",
+
+ // Doesn't match both os and abi so not blocked
+ notBlocklisted: [["2", "1.9"]],
+ },
+ {
+ id: "test_bug393285_12@tests.mozilla.org",
+ name: "extension 12",
+ version: "1.0",
+
+ // Doesn't match both os and abi so not blocked
+ notBlocklisted: [["2", "1.9"]],
+ },
+ {
+ id: "test_bug393285_13@tests.mozilla.org",
+ name: "extension 13",
+ version: "1.0",
+
+ // Doesn't match both os and abi so not blocked
+ notBlocklisted: [["2", "1.9"]],
+ },
+ {
+ id: "test_bug393285_14@tests.mozilla.org",
+ name: "extension 14",
+ version: "1.0",
+
+ // Matches both os and abi so blocked
+ blocklisted: [["2", "1.9"]],
+ },
+];
+
+const ADDON_IDS = ADDONS.map(a => a.id);
+
+const BLOCKLIST_DATA = [
+ {
+ guid: "test_bug393285_2@tests.mozilla.org",
+ versionRange: [],
+ },
+ {
+ guid: "test_bug393285_3a@tests.mozilla.org",
+ versionRange: [{ maxVersion: "1.0", minVersion: "1.0" }],
+ },
+ {
+ guid: "test_bug393285_3b@tests.mozilla.org",
+ versionRange: [{ maxVersion: "1.0", minVersion: "1.0" }],
+ },
+ {
+ guid: "test_bug393285_4@tests.mozilla.org",
+ versionRange: [
+ {
+ maxVersion: "1.0",
+ minVersion: "1.0",
+ targetApplication: [
+ {
+ guid: "xpcshell@tests.mozilla.org",
+ maxVersion: "1.0",
+ minVersion: "1.0",
+ },
+ ],
+ },
+ ],
+ },
+ {
+ guid: "test_bug393285_5@tests.mozilla.org",
+ os: "Darwin",
+ versionRange: [],
+ },
+ {
+ guid: "test_bug393285_6@tests.mozilla.org",
+ os: "XPCShell",
+ versionRange: [],
+ },
+ {
+ guid: "test_bug393285_7@tests.mozilla.org",
+ os: "Darwin,XPCShell,WINNT",
+ versionRange: [],
+ },
+ {
+ guid: "test_bug393285_8@tests.mozilla.org",
+ xpcomabi: "x86-msvc",
+ versionRange: [],
+ },
+ {
+ guid: "test_bug393285_9@tests.mozilla.org",
+ xpcomabi: "noarch-spidermonkey",
+ versionRange: [],
+ },
+ {
+ guid: "test_bug393285_10@tests.mozilla.org",
+ xpcomabi: "ppc-gcc3,noarch-spidermonkey,x86-msvc",
+ versionRange: [],
+ },
+ {
+ guid: "test_bug393285_11@tests.mozilla.org",
+ os: "Darwin",
+ xpcomabi: "ppc-gcc3,x86-msvc",
+ versionRange: [],
+ },
+ {
+ guid: "test_bug393285_12@tests.mozilla.org",
+ os: "Darwin",
+ xpcomabi: "ppc-gcc3,noarch-spidermonkey,x86-msvc",
+ versionRange: [],
+ },
+ {
+ guid: "test_bug393285_13@tests.mozilla.org",
+ os: "XPCShell",
+ xpcomabi: "ppc-gcc3,x86-msvc",
+ versionRange: [],
+ },
+ {
+ guid: "test_bug393285_14@tests.mozilla.org",
+ os: "XPCShell,WINNT",
+ xpcomabi: "ppc-gcc3,x86-msvc,noarch-spidermonkey",
+ versionRange: [],
+ },
+];
+
+add_task(async function setup() {
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1.9");
+ await promiseStartupManager();
+
+ for (let addon of ADDONS) {
+ await promiseInstallWebExtension({
+ manifest: {
+ name: addon.name,
+ version: addon.version,
+ applications: { gecko: { id: addon.id } },
+ },
+ });
+ }
+
+ let addons = await getAddons(ADDON_IDS);
+ for (let id of ADDON_IDS) {
+ equal(
+ addons.get(id).blocklistState,
+ Ci.nsIBlocklistService.STATE_NOT_BLOCKED,
+ `Add-on ${id} should not initially be blocked`
+ );
+ }
+});
+
+add_task(async function test_1() {
+ await AddonTestUtils.loadBlocklistRawData({ extensions: BLOCKLIST_DATA });
+
+ let addons = await getAddons(ADDON_IDS);
+ async function isBlocklisted(addon, appVer, toolkitVer) {
+ let state = await Blocklist.getAddonBlocklistState(
+ addon,
+ appVer,
+ toolkitVer
+ );
+ return state != Services.blocklist.STATE_NOT_BLOCKED;
+ }
+ for (let addon of ADDONS) {
+ let { id } = addon;
+ for (let blocklisted of addon.blocklisted || []) {
+ ok(
+ await isBlocklisted(addons.get(id), ...blocklisted),
+ `Add-on ${id} should be blocklisted in app/platform version ${blocklisted}`
+ );
+ }
+ for (let notBlocklisted of addon.notBlocklisted || []) {
+ ok(
+ !(await isBlocklisted(addons.get(id), ...notBlocklisted)),
+ `Add-on ${id} should not be blocklisted in app/platform version ${notBlocklisted}`
+ );
+ }
+ }
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_prefs.js b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_prefs.js
new file mode 100644
index 0000000000..ddd5799d4d
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_prefs.js
@@ -0,0 +1,106 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// Tests resetting of preferences in blocklist entry when an add-on is blocked.
+// See bug 802434.
+
+// useMLBF=true only supports blocking, not resetting prefs, since extensions
+// cannot set arbitrary prefs any more after the removal of legacy addons.
+Services.prefs.setBoolPref("extensions.blocklist.useMLBF", false);
+
+const BLOCKLIST_DATA = [
+ {
+ guid: "block1@tests.mozilla.org",
+ versionRange: [
+ {
+ severity: "1",
+ targetApplication: [
+ {
+ guid: "xpcshell@tests.mozilla.org",
+ maxVersion: "2.*",
+ minVersion: "1",
+ },
+ ],
+ },
+ ],
+ prefs: ["test.blocklist.pref1", "test.blocklist.pref2"],
+ },
+ {
+ guid: "block2@tests.mozilla.org",
+ versionRange: [
+ {
+ severity: "3",
+ targetApplication: [
+ {
+ guid: "xpcshell@tests.mozilla.org",
+ maxVersion: "2.*",
+ minVersion: "1",
+ },
+ ],
+ },
+ ],
+ prefs: ["test.blocklist.pref3", "test.blocklist.pref4"],
+ },
+];
+
+add_task(async function setup() {
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1");
+
+ await promiseStartupManager();
+
+ // Add 2 extensions
+ await promiseInstallWebExtension({
+ manifest: {
+ name: "Blocked add-on-1 with to-be-reset prefs",
+ version: "1.0",
+ applications: { gecko: { id: "block1@tests.mozilla.org" } },
+ },
+ });
+ await promiseInstallWebExtension({
+ manifest: {
+ name: "Blocked add-on-2 with to-be-reset prefs",
+ version: "1.0",
+ applications: { gecko: { id: "block2@tests.mozilla.org" } },
+ },
+ });
+
+ // Pre-set the preferences that we expect to get reset.
+ Services.prefs.setIntPref("test.blocklist.pref1", 15);
+ Services.prefs.setIntPref("test.blocklist.pref2", 15);
+ Services.prefs.setBoolPref("test.blocklist.pref3", true);
+ Services.prefs.setBoolPref("test.blocklist.pref4", true);
+
+ // Before blocklist is loaded.
+ let [a1, a2] = await AddonManager.getAddonsByIDs([
+ "block1@tests.mozilla.org",
+ "block2@tests.mozilla.org",
+ ]);
+ Assert.equal(a1.blocklistState, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+ Assert.equal(a2.blocklistState, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+
+ Assert.equal(Services.prefs.getIntPref("test.blocklist.pref1"), 15);
+ Assert.equal(Services.prefs.getIntPref("test.blocklist.pref2"), 15);
+ Assert.equal(Services.prefs.getBoolPref("test.blocklist.pref3"), true);
+ Assert.equal(Services.prefs.getBoolPref("test.blocklist.pref4"), true);
+});
+
+add_task(async function test_blocks() {
+ await AddonTestUtils.loadBlocklistRawData({ extensions: BLOCKLIST_DATA });
+
+ // Blocklist changes should have applied and the prefs must be reset.
+ let [a1, a2] = await AddonManager.getAddonsByIDs([
+ "block1@tests.mozilla.org",
+ "block2@tests.mozilla.org",
+ ]);
+ Assert.notEqual(a1, null);
+ Assert.equal(a1.blocklistState, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ Assert.notEqual(a2, null);
+ Assert.equal(a2.blocklistState, Ci.nsIBlocklistService.STATE_BLOCKED);
+
+ // All these prefs must be reset to defaults.
+ Assert.equal(Services.prefs.prefHasUserValue("test.blocklist.pref1"), false);
+ Assert.equal(Services.prefs.prefHasUserValue("test.blocklist.pref2"), false);
+ Assert.equal(Services.prefs.prefHasUserValue("test.blocklist.pref3"), false);
+ Assert.equal(Services.prefs.prefHasUserValue("test.blocklist.pref4"), false);
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_regexp_split.js b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_regexp_split.js
new file mode 100644
index 0000000000..f516462c9f
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_regexp_split.js
@@ -0,0 +1,229 @@
+/* Any copyright is dedicated to the Public Domain.
+http://creativecommons.org/publicdomain/zero/1.0/ */
+
+"use strict";
+
+// useMLBF=true only supports blocking by version+ID, not by regexp.
+Services.prefs.setBoolPref("extensions.blocklist.useMLBF", false);
+
+const BLOCKLIST_DATA = [
+ {
+ guid: "/^abcd.*/",
+ versionRange: [],
+ expectedType: "RegExp",
+ },
+ {
+ guid: "test@example.com",
+ versionRange: [],
+ expectedType: "string",
+ },
+ {
+ guid: "/^((a)|(b)|(c))$/",
+ versionRange: [],
+ expectedType: "Set",
+ },
+ {
+ guid: "/^((a@b)|(\\{6d9ddd6e-c6ee-46de-ab56-ce9080372b3\\})|(c@d.com))$/",
+ versionRange: [],
+ expectedType: "Set",
+ },
+ // The same as the above, but with escape sequences that disqualify it from
+ // being treated as a set (and a different guid)
+ {
+ guid:
+ "/^((s@t)|(\\{6d9eee6e-c6ee-46de-ab56-ce9080372b3\\})|(c@d\\w.com))$/",
+ versionRange: [],
+ expectedType: "RegExp",
+ },
+ // Also the same, but with other magical regex characters.
+ // (and a different guid)
+ {
+ guid:
+ "/^((u@v)|(\\{6d9fff6e*-c6ee-46de-ab56-ce9080372b3\\})|(c@dee?.com))$/",
+ versionRange: [],
+ expectedType: "RegExp",
+ },
+];
+
+/**
+ * Verify that both IDs being OR'd in a regex work,
+ * and that other regular expressions continue being
+ * used as regular expressions.
+ */
+add_task(async function test_check_matching_works() {
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1.9");
+ await promiseStartupManager();
+ await AddonTestUtils.loadBlocklistRawData({
+ extensions: BLOCKLIST_DATA,
+ });
+
+ let blocklistGlobal = ChromeUtils.import(
+ "resource://gre/modules/Blocklist.jsm",
+ null
+ );
+ let parsedEntries = blocklistGlobal.ExtensionBlocklistRS._entries;
+
+ // Unfortunately, the parsed entries aren't in the same order as the original.
+ function strForTypeOf(val) {
+ if (typeof val == "string") {
+ return "string";
+ }
+ if (val) {
+ return val.constructor.name;
+ }
+ return "other";
+ }
+ for (let type of ["Set", "RegExp", "string"]) {
+ let numberParsed = parsedEntries.filter(parsedEntry => {
+ return type == strForTypeOf(parsedEntry.matches.id);
+ }).length;
+ let expected = BLOCKLIST_DATA.filter(entry => {
+ return type == entry.expectedType;
+ }).length;
+ Assert.equal(
+ numberParsed,
+ expected,
+ type + " should have expected number of entries"
+ );
+ }
+ // Shouldn't block everything.
+ Assert.ok(
+ !(await Blocklist.getAddonBlocklistEntry({ id: "nonsense", version: "1" }))
+ );
+ // Should block IDs starting with abcd
+ Assert.ok(
+ await Blocklist.getAddonBlocklistEntry({ id: "abcde", version: "1" })
+ );
+ // Should block the literal string listed
+ Assert.ok(
+ await Blocklist.getAddonBlocklistEntry({
+ id: "test@example.com",
+ version: "1",
+ })
+ );
+ // Should block the IDs in (a)|(b)|(c)
+ Assert.ok(await Blocklist.getAddonBlocklistEntry({ id: "a", version: "1" }));
+ Assert.ok(await Blocklist.getAddonBlocklistEntry({ id: "b", version: "1" }));
+ Assert.ok(await Blocklist.getAddonBlocklistEntry({ id: "c", version: "1" }));
+ // Should block all the items processed to a set:
+ Assert.ok(
+ await Blocklist.getAddonBlocklistEntry({ id: "a@b", version: "1" })
+ );
+ Assert.ok(
+ await Blocklist.getAddonBlocklistEntry({
+ id: "{6d9ddd6e-c6ee-46de-ab56-ce9080372b3}",
+ version: "1",
+ })
+ );
+ Assert.ok(
+ await Blocklist.getAddonBlocklistEntry({ id: "c@d.com", version: "1" })
+ );
+ // Should block items that remained a regex:
+ Assert.ok(
+ await Blocklist.getAddonBlocklistEntry({ id: "s@t", version: "1" })
+ );
+ Assert.ok(
+ await Blocklist.getAddonBlocklistEntry({
+ id: "{6d9eee6e-c6ee-46de-ab56-ce9080372b3}",
+ version: "1",
+ })
+ );
+ Assert.ok(
+ await Blocklist.getAddonBlocklistEntry({ id: "c@dx.com", version: "1" })
+ );
+
+ Assert.ok(
+ await Blocklist.getAddonBlocklistEntry({ id: "u@v", version: "1" })
+ );
+ Assert.ok(
+ await Blocklist.getAddonBlocklistEntry({
+ id: "{6d9fff6eeeeeeee-c6ee-46de-ab56-ce9080372b3}",
+ version: "1",
+ })
+ );
+ Assert.ok(
+ await Blocklist.getAddonBlocklistEntry({ id: "c@dee.com", version: "1" })
+ );
+});
+
+// We should be checking all properties, not just the first one we come across.
+add_task(async function check_all_properties() {
+ await AddonTestUtils.loadBlocklistRawData({
+ extensions: [
+ {
+ guid: "literal@string.com",
+ creator: "Foo",
+ versionRange: [],
+ },
+ {
+ guid: "/regex.*@regex\\.com/",
+ creator: "Foo",
+ versionRange: [],
+ },
+ {
+ guid:
+ "/^((set@set\\.com)|(anotherset@set\\.com)|(reallyenoughsetsalready@set\\.com))$/",
+ creator: "Foo",
+ versionRange: [],
+ },
+ ],
+ });
+
+ let { Blocklist } = ChromeUtils.import(
+ "resource://gre/modules/Blocklist.jsm"
+ );
+ // Check 'wrong' creator doesn't match.
+ Assert.ok(
+ !(await Blocklist.getAddonBlocklistEntry({
+ id: "literal@string.com",
+ version: "1",
+ creator: { name: "Bar" },
+ }))
+ );
+ Assert.ok(
+ !(await Blocklist.getAddonBlocklistEntry({
+ id: "regexaaaaa@regex.com",
+ version: "1",
+ creator: { name: "Bar" },
+ }))
+ );
+ Assert.ok(
+ !(await Blocklist.getAddonBlocklistEntry({
+ id: "set@set.com",
+ version: "1",
+ creator: { name: "Bar" },
+ }))
+ );
+
+ // Check 'wrong' ID doesn't match.
+ Assert.ok(
+ !(await Blocklist.getAddonBlocklistEntry({
+ id: "someotherid@foo.com",
+ version: "1",
+ creator: { name: "Foo" },
+ }))
+ );
+
+ // Check items matching all filters do match
+ Assert.ok(
+ await Blocklist.getAddonBlocklistEntry({
+ id: "literal@string.com",
+ version: "1",
+ creator: { name: "Foo" },
+ })
+ );
+ Assert.ok(
+ await Blocklist.getAddonBlocklistEntry({
+ id: "regexaaaaa@regex.com",
+ version: "1",
+ creator: { name: "Foo" },
+ })
+ );
+ Assert.ok(
+ await Blocklist.getAddonBlocklistEntry({
+ id: "set@set.com",
+ version: "1",
+ creator: { name: "Foo" },
+ })
+ );
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_severities.js b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_severities.js
new file mode 100644
index 0000000000..710d92fa73
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_severities.js
@@ -0,0 +1,504 @@
+/* This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/.
+ */
+
+// useMLBF=true only supports one type of severity (hard block). The value of
+// appDisabled in the extension blocklist is checked in test_blocklist_mlbf.js.
+Services.prefs.setBoolPref("extensions.blocklist.useMLBF", false);
+
+const URI_EXTENSION_BLOCKLIST_DIALOG =
+ "chrome://mozapps/content/extensions/blocklist.xhtml";
+
+// Workaround for Bug 658720 - URL formatter can leak during xpcshell tests
+const PREF_BLOCKLIST_ITEM_URL = "extensions.blocklist.itemURL";
+Services.prefs.setCharPref(
+ PREF_BLOCKLIST_ITEM_URL,
+ "http://example.com/blocklist/%blockID%"
+);
+
+async function getAddonBlocklistURL(addon) {
+ let entry = await Blocklist.getAddonBlocklistEntry(addon);
+ return entry && entry.url;
+}
+
+var ADDONS = [
+ {
+ // Tests how the blocklist affects a disabled add-on
+ id: "test_bug455906_1@tests.mozilla.org",
+ name: "Bug 455906 Addon Test 1",
+ version: "5",
+ appVersion: "3",
+ },
+ {
+ // Tests how the blocklist affects an enabled add-on
+ id: "test_bug455906_2@tests.mozilla.org",
+ name: "Bug 455906 Addon Test 2",
+ version: "5",
+ appVersion: "3",
+ },
+ {
+ // Tests how the blocklist affects an enabled add-on, to be disabled by the notification
+ id: "test_bug455906_3@tests.mozilla.org",
+ name: "Bug 455906 Addon Test 3",
+ version: "5",
+ appVersion: "3",
+ },
+ {
+ // Tests how the blocklist affects a disabled add-on that was already warned about
+ id: "test_bug455906_4@tests.mozilla.org",
+ name: "Bug 455906 Addon Test 4",
+ version: "5",
+ appVersion: "3",
+ },
+ {
+ // Tests how the blocklist affects an enabled add-on that was already warned about
+ id: "test_bug455906_5@tests.mozilla.org",
+ name: "Bug 455906 Addon Test 5",
+ version: "5",
+ appVersion: "3",
+ },
+ {
+ // Tests how the blocklist affects an already blocked add-on
+ id: "test_bug455906_6@tests.mozilla.org",
+ name: "Bug 455906 Addon Test 6",
+ version: "5",
+ appVersion: "3",
+ },
+ {
+ // Tests how the blocklist affects an incompatible add-on
+ id: "test_bug455906_7@tests.mozilla.org",
+ name: "Bug 455906 Addon Test 7",
+ version: "5",
+ appVersion: "2",
+ },
+ {
+ // Spare add-on used to ensure we get a notification when switching lists
+ id: "dummy_bug455906_1@tests.mozilla.org",
+ name: "Dummy Addon 1",
+ version: "5",
+ appVersion: "3",
+ },
+ {
+ // Spare add-on used to ensure we get a notification when switching lists
+ id: "dummy_bug455906_2@tests.mozilla.org",
+ name: "Dummy Addon 2",
+ version: "5",
+ appVersion: "3",
+ },
+];
+
+var gNotificationCheck = null;
+
+// Don't need the full interface, attempts to call other methods will just
+// throw which is just fine
+var WindowWatcher = {
+ openWindow(parent, url, name, features, windowArguments) {
+ // Should be called to list the newly blocklisted items
+ equal(url, URI_EXTENSION_BLOCKLIST_DIALOG);
+
+ if (gNotificationCheck) {
+ gNotificationCheck(windowArguments.wrappedJSObject);
+ }
+
+ // run the code after the blocklist is closed
+ Services.obs.notifyObservers(null, "addon-blocklist-closed");
+ },
+
+ QueryInterface: ChromeUtils.generateQI(["nsIWindowWatcher"]),
+};
+
+MockRegistrar.register(
+ "@mozilla.org/embedcomp/window-watcher;1",
+ WindowWatcher
+);
+
+function createAddon(addon) {
+ return promiseInstallWebExtension({
+ manifest: {
+ name: addon.name,
+ version: addon.version,
+ applications: {
+ gecko: {
+ id: addon.id,
+ strict_min_version: addon.appVersion,
+ strict_max_version: addon.appVersion,
+ },
+ },
+ },
+ });
+}
+
+const BLOCKLIST_DATA = {
+ start: {
+ // Block 4-6 and a dummy:
+ extensions: [
+ {
+ guid: "test_bug455906_4@tests.mozilla.org",
+ versionRange: [{ severity: "-1" }],
+ },
+ {
+ guid: "test_bug455906_5@tests.mozilla.org",
+ versionRange: [{ severity: "1" }],
+ },
+ {
+ guid: "test_bug455906_6@tests.mozilla.org",
+ versionRange: [{ severity: "2" }],
+ },
+ {
+ guid: "dummy_bug455906_1@tests.mozilla.org",
+ versionRange: [],
+ },
+ ],
+ },
+ warn: {
+ // warn for all test add-ons:
+ extensions: ADDONS.filter(a => a.id.startsWith("test_")).map(a => ({
+ guid: a.id,
+ versionRange: [{ severity: "-1" }],
+ })),
+ },
+ block: {
+ // block all test add-ons:
+ extensions: ADDONS.filter(a => a.id.startsWith("test_")).map(a => ({
+ guid: a.id,
+ blockID: a.id,
+ versionRange: [],
+ })),
+ },
+ empty: {
+ // Block a dummy so there's a change:
+ extensions: [
+ {
+ guid: "dummy_bug455906_2@tests.mozilla.org",
+ versionRange: [],
+ },
+ ],
+ },
+};
+
+async function loadBlocklist(id, callback) {
+ gNotificationCheck = callback;
+
+ await AddonTestUtils.loadBlocklistRawData(BLOCKLIST_DATA[id]);
+}
+
+function create_blocklistURL(blockID) {
+ let url = Services.urlFormatter.formatURLPref(PREF_BLOCKLIST_ITEM_URL);
+ url = url.replace(/%blockID%/g, blockID);
+ return url;
+}
+
+// Before every main test this is the state the add-ons are meant to be in
+async function checkInitialState() {
+ let addons = await AddonManager.getAddonsByIDs(ADDONS.map(a => a.id));
+
+ checkAddonState(addons[0], {
+ userDisabled: true,
+ softDisabled: false,
+ appDisabled: false,
+ });
+ checkAddonState(addons[1], {
+ userDisabled: false,
+ softDisabled: false,
+ appDisabled: false,
+ });
+ checkAddonState(addons[2], {
+ userDisabled: false,
+ softDisabled: false,
+ appDisabled: false,
+ });
+ checkAddonState(addons[3], {
+ userDisabled: true,
+ softDisabled: true,
+ appDisabled: false,
+ });
+ checkAddonState(addons[4], {
+ userDisabled: false,
+ softDisabled: false,
+ appDisabled: false,
+ });
+ checkAddonState(addons[5], {
+ userDisabled: false,
+ softDisabled: false,
+ appDisabled: true,
+ });
+ checkAddonState(addons[6], {
+ userDisabled: false,
+ softDisabled: false,
+ appDisabled: true,
+ });
+}
+
+function checkAddonState(addon, state) {
+ return checkAddon(addon.id, addon, state);
+}
+
+add_task(async function setup() {
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "3", "3");
+
+ await promiseStartupManager();
+
+ // Load the initial blocklist into the profile to check add-ons start in the
+ // right state.
+ await AddonTestUtils.loadBlocklistRawData(BLOCKLIST_DATA.start);
+
+ for (let addon of ADDONS) {
+ await createAddon(addon);
+ }
+});
+
+add_task(async function test_1() {
+ // Tests the add-ons were installed and the initial blocklist applied as expected
+
+ let addons = await AddonManager.getAddonsByIDs(ADDONS.map(a => a.id));
+ for (var i = 0; i < ADDONS.length; i++) {
+ ok(addons[i], `Addon ${i + 1} should be installed correctly`);
+ }
+
+ checkAddonState(addons[0], {
+ userDisabled: false,
+ softDisabled: false,
+ appDisabled: false,
+ });
+ checkAddonState(addons[1], {
+ userDisabled: false,
+ softDisabled: false,
+ appDisabled: false,
+ });
+ checkAddonState(addons[2], {
+ userDisabled: false,
+ softDisabled: false,
+ appDisabled: false,
+ });
+
+ // Warn add-ons should be soft disabled automatically
+ checkAddonState(addons[3], {
+ userDisabled: true,
+ softDisabled: true,
+ appDisabled: false,
+ });
+ checkAddonState(addons[4], {
+ userDisabled: true,
+ softDisabled: true,
+ appDisabled: false,
+ });
+
+ // Blocked and incompatible should be app disabled only
+ checkAddonState(addons[5], {
+ userDisabled: false,
+ softDisabled: false,
+ appDisabled: true,
+ });
+ checkAddonState(addons[6], {
+ userDisabled: false,
+ softDisabled: false,
+ appDisabled: true,
+ });
+
+ // Put the add-ons into the base state
+ await addons[0].disable();
+ await addons[4].enable();
+
+ await promiseRestartManager();
+ await checkInitialState();
+
+ await loadBlocklist("warn", args => {
+ dump("Checking notification pt 2\n");
+ // This test is artificial, we don't notify for add-ons anymore, see
+ // https://bugzilla.mozilla.org/show_bug.cgi?id=1257565#c111 . Cleaning this up
+ // should happen but this patchset is too huge as it is so I'm deferring it.
+ equal(args.list.length, 2);
+ });
+
+ await promiseRestartManager();
+ dump("Checking results pt 2\n");
+
+ addons = await AddonManager.getAddonsByIDs(ADDONS.map(a => a.id));
+
+ info("Should have disabled this add-on as requested");
+ checkAddonState(addons[2], {
+ userDisabled: true,
+ softDisabled: true,
+ appDisabled: false,
+ });
+
+ info("The blocked add-on should have changed to soft disabled");
+ checkAddonState(addons[5], {
+ userDisabled: true,
+ softDisabled: true,
+ appDisabled: false,
+ });
+ checkAddonState(addons[6], {
+ userDisabled: true,
+ softDisabled: true,
+ appDisabled: true,
+ });
+
+ info("These should have been unchanged");
+ checkAddonState(addons[0], {
+ userDisabled: true,
+ softDisabled: false,
+ appDisabled: false,
+ });
+ // XXXgijs this is supposed to be not user disabled or soft disabled, but because we don't show
+ // the dialog, it's disabled anyway. Comment out this assertion for now...
+ // checkAddonState(addons[1], {userDisabled: false, softDisabled: false, appDisabled: false});
+ checkAddonState(addons[3], {
+ userDisabled: true,
+ softDisabled: true,
+ appDisabled: false,
+ });
+ checkAddonState(addons[4], {
+ userDisabled: false,
+ softDisabled: false,
+ appDisabled: false,
+ });
+
+ // Back to starting state
+ await addons[2].enable();
+ await addons[5].enable();
+
+ await promiseRestartManager();
+ await loadBlocklist("start");
+});
+
+add_task(async function test_pt3() {
+ await promiseRestartManager();
+ await checkInitialState();
+
+ await loadBlocklist("block", args => {
+ dump("Checking notification pt 3\n");
+ equal(args.list.length, 3);
+ });
+
+ await promiseRestartManager();
+ dump("Checking results pt 3\n");
+
+ let addons = await AddonManager.getAddonsByIDs(ADDONS.map(a => a.id));
+
+ // All should have gained the blocklist state, user disabled as previously
+ checkAddonState(addons[0], {
+ userDisabled: true,
+ softDisabled: false,
+ appDisabled: true,
+ });
+ checkAddonState(addons[1], {
+ userDisabled: false,
+ softDisabled: false,
+ appDisabled: true,
+ });
+ checkAddonState(addons[2], {
+ userDisabled: false,
+ softDisabled: false,
+ appDisabled: true,
+ });
+ checkAddonState(addons[4], {
+ userDisabled: false,
+ softDisabled: false,
+ appDisabled: true,
+ });
+
+ // Should have gained the blocklist state but no longer be soft disabled
+ checkAddonState(addons[3], {
+ userDisabled: false,
+ softDisabled: false,
+ appDisabled: true,
+ });
+
+ // Check blockIDs are correct
+ equal(
+ await getAddonBlocklistURL(addons[0]),
+ create_blocklistURL(addons[0].id)
+ );
+ equal(
+ await getAddonBlocklistURL(addons[1]),
+ create_blocklistURL(addons[1].id)
+ );
+ equal(
+ await getAddonBlocklistURL(addons[2]),
+ create_blocklistURL(addons[2].id)
+ );
+ equal(
+ await getAddonBlocklistURL(addons[3]),
+ create_blocklistURL(addons[3].id)
+ );
+ equal(
+ await getAddonBlocklistURL(addons[4]),
+ create_blocklistURL(addons[4].id)
+ );
+
+ // Shouldn't be changed
+ checkAddonState(addons[5], {
+ userDisabled: false,
+ softDisabled: false,
+ appDisabled: true,
+ });
+ checkAddonState(addons[6], {
+ userDisabled: false,
+ softDisabled: false,
+ appDisabled: true,
+ });
+
+ // Back to starting state
+ await loadBlocklist("start");
+});
+
+add_task(async function test_pt4() {
+ let addon = await AddonManager.getAddonByID(ADDONS[4].id);
+ await addon.enable();
+
+ await promiseRestartManager();
+ await checkInitialState();
+
+ await loadBlocklist("empty", args => {
+ dump("Checking notification pt 4\n");
+ // See note in other callback - we no longer notify for non-blocked add-ons.
+ ok(false, "Should not get a notification as there are no blocked addons.");
+ });
+
+ await promiseRestartManager();
+ dump("Checking results pt 4\n");
+
+ let addons = await AddonManager.getAddonsByIDs(ADDONS.map(a => a.id));
+ // This should have become unblocked
+ checkAddonState(addons[5], {
+ userDisabled: false,
+ softDisabled: false,
+ appDisabled: false,
+ });
+
+ // Should get re-enabled
+ checkAddonState(addons[3], {
+ userDisabled: false,
+ softDisabled: false,
+ appDisabled: false,
+ });
+
+ // No change for anything else
+ checkAddonState(addons[0], {
+ userDisabled: true,
+ softDisabled: false,
+ appDisabled: false,
+ });
+ checkAddonState(addons[1], {
+ userDisabled: false,
+ softDisabled: false,
+ appDisabled: false,
+ });
+ checkAddonState(addons[2], {
+ userDisabled: false,
+ softDisabled: false,
+ appDisabled: false,
+ });
+ checkAddonState(addons[4], {
+ userDisabled: false,
+ softDisabled: false,
+ appDisabled: false,
+ });
+ checkAddonState(addons[6], {
+ userDisabled: false,
+ softDisabled: false,
+ appDisabled: true,
+ });
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_targetapp_filter.js b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_targetapp_filter.js
new file mode 100644
index 0000000000..2e28ac37c0
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_targetapp_filter.js
@@ -0,0 +1,395 @@
+const BlocklistGlobal = ChromeUtils.import(
+ "resource://gre/modules/Blocklist.jsm",
+ null
+);
+const { RemoteSettings } = ChromeUtils.import(
+ "resource://services-settings/remote-settings.js"
+);
+
+const APP_ID = "xpcshell@tests.mozilla.org";
+const TOOLKIT_ID = "toolkit@mozilla.org";
+
+let client;
+
+async function clear_state() {
+ // Clear local DB.
+ await client.db.clear();
+}
+
+async function createRecords(records) {
+ const withId = records.map((record, i) => ({
+ id: `record-${i}`,
+ ...record,
+ }));
+ return client.db.importChanges({}, 42, withId);
+}
+
+function run_test() {
+ AddonTestUtils.createAppInfo(
+ "xpcshell@tests.mozilla.org",
+ "XPCShell",
+ "58",
+ ""
+ );
+ // This will initialize the remote settings clients for blocklists,
+ // with their specific options etc.
+ BlocklistGlobal.PluginBlocklistRS.ensureInitialized();
+ // Obtain one of the instantiated client for our tests.
+ client = RemoteSettings("plugins", { bucketName: "blocklists" });
+
+ run_next_test();
+}
+
+add_task(async function test_supports_filter_expressions() {
+ await createRecords([
+ {
+ matchName: "Adobe Flex",
+ filter_expression: 'env.appinfo.ID == "xpcshell@tests.mozilla.org"',
+ },
+ {
+ matchName: "Adobe Flex",
+ filter_expression: "1 == 2",
+ },
+ ]);
+
+ const list = await client.get();
+ equal(list.length, 1);
+});
+add_task(clear_state);
+
+add_task(async function test_returns_all_without_target() {
+ await createRecords([
+ {
+ matchName: "Adobe Flex",
+ },
+ {
+ matchName: "foopydoo",
+ versionRange: [],
+ },
+ {
+ matchName: "PDF reader",
+ versionRange: [
+ {
+ severity: 0,
+ vulnerabilityStatus: 1,
+ targetApplication: [],
+ },
+ ],
+ },
+ {
+ matchName:
+ "Java(\\(TM\\))? Plug-in 11\\.(7[6-9]|[8-9]\\d|1([0-6]\\d|70))(\\.\\d+)?([^\\d\\._]|$)",
+ versionRange: [
+ {
+ severity: 0,
+ vulnerabilityStatus: 1,
+ },
+ ],
+ matchFilename: "libnpjp2\\.so",
+ },
+ {
+ matchName: "foopydoo",
+ versionRange: [
+ {
+ targetApplication: [],
+ maxVersion: "1",
+ minVersion: "0",
+ severity: "1",
+ },
+ ],
+ },
+ ]);
+
+ const list = await client.get();
+ equal(list.length, 5);
+});
+add_task(clear_state);
+
+add_task(async function test_returns_without_guid_or_with_matching_guid() {
+ await createRecords([
+ {
+ willMatch: true,
+ matchName: "foopydoo",
+ versionRange: [
+ {
+ targetApplication: [{}],
+ },
+ ],
+ },
+ {
+ willMatch: false,
+ matchName: "foopydoo",
+ versionRange: [
+ {
+ targetApplication: [
+ {
+ guid: "some-guid",
+ },
+ ],
+ },
+ ],
+ },
+ {
+ willMatch: true,
+ matchName: "foopydoo",
+ versionRange: [
+ {
+ targetApplication: [
+ {
+ guid: APP_ID,
+ },
+ ],
+ },
+ ],
+ },
+ {
+ willMatch: true,
+ matchName: "foopydoo",
+ versionRange: [
+ {
+ targetApplication: [
+ {
+ guid: TOOLKIT_ID,
+ },
+ ],
+ },
+ ],
+ },
+ ]);
+
+ const list = await client.get();
+ info(JSON.stringify(list, null, 2));
+ equal(list.length, 3);
+ ok(list.every(e => e.willMatch));
+});
+add_task(clear_state);
+
+add_task(
+ async function test_returns_without_app_version_or_with_matching_version() {
+ await createRecords([
+ {
+ willMatch: true,
+ matchName: "foopydoo",
+ versionRange: [
+ {
+ targetApplication: [
+ {
+ guid: APP_ID,
+ },
+ ],
+ },
+ ],
+ },
+ {
+ willMatch: true,
+ matchName: "foopydoo",
+ versionRange: [
+ {
+ targetApplication: [
+ {
+ guid: APP_ID,
+ minVersion: "0",
+ },
+ ],
+ },
+ ],
+ },
+ {
+ willMatch: true,
+ matchName: "foopydoo",
+ versionRange: [
+ {
+ targetApplication: [
+ {
+ guid: APP_ID,
+ minVersion: "0",
+ maxVersion: "9999",
+ },
+ ],
+ },
+ ],
+ },
+ {
+ willMatch: false,
+ matchName: "foopydoo",
+ versionRange: [
+ {
+ targetApplication: [
+ {
+ guid: APP_ID,
+ minVersion: "0",
+ maxVersion: "1",
+ },
+ ],
+ },
+ ],
+ },
+ {
+ willMatch: true,
+ matchName: "foopydoo",
+ versionRange: [
+ {
+ targetApplication: [
+ {
+ guid: TOOLKIT_ID,
+ minVersion: "0",
+ },
+ ],
+ },
+ ],
+ },
+ {
+ willMatch: true,
+ matchName: "foopydoo",
+ versionRange: [
+ {
+ targetApplication: [
+ {
+ guid: TOOLKIT_ID,
+ minVersion: "0",
+ maxVersion: "9999",
+ },
+ ],
+ },
+ ],
+ // We can't test the false case with maxVersion for toolkit, because the toolkit version
+ // is 0 in xpcshell.
+ },
+ ]);
+
+ const list = await client.get();
+ equal(list.length, 5);
+ ok(list.every(e => e.willMatch));
+ }
+);
+add_task(clear_state);
+
+add_task(async function test_multiple_version_and_target_applications() {
+ await createRecords([
+ {
+ willMatch: true,
+ matchName: "foopydoo",
+ versionRange: [
+ {
+ targetApplication: [
+ {
+ guid: "other-guid",
+ },
+ ],
+ },
+ {
+ targetApplication: [
+ {
+ guid: APP_ID,
+ minVersion: "0",
+ maxVersion: "*",
+ },
+ ],
+ },
+ ],
+ },
+ {
+ willMatch: true,
+ matchName: "foopydoo",
+ versionRange: [
+ {
+ targetApplication: [
+ {
+ guid: "other-guid",
+ },
+ ],
+ },
+ {
+ targetApplication: [
+ {
+ guid: APP_ID,
+ minVersion: "0",
+ },
+ ],
+ },
+ ],
+ },
+ {
+ willMatch: false,
+ matchName: "foopydoo",
+ versionRange: [
+ {
+ targetApplication: [
+ {
+ guid: APP_ID,
+ maxVersion: "57.*",
+ },
+ ],
+ },
+ {
+ targetApplication: [
+ {
+ guid: APP_ID,
+ maxVersion: "56.*",
+ },
+ {
+ guid: APP_ID,
+ maxVersion: "57.*",
+ },
+ ],
+ },
+ ],
+ },
+ ]);
+
+ const list = await client.get();
+ equal(list.length, 2);
+ ok(list.every(e => e.willMatch));
+});
+add_task(clear_state);
+
+add_task(async function test_complex_version() {
+ await createRecords([
+ {
+ willMatch: false,
+ matchName: "foopydoo",
+ versionRange: [
+ {
+ targetApplication: [
+ {
+ guid: APP_ID,
+ maxVersion: "57.*",
+ },
+ ],
+ },
+ ],
+ },
+ {
+ willMatch: true,
+ matchName: "foopydoo",
+ versionRange: [
+ {
+ targetApplication: [
+ {
+ guid: APP_ID,
+ maxVersion: "9999.*",
+ },
+ ],
+ },
+ ],
+ },
+ {
+ willMatch: true,
+ matchName: "foopydoo",
+ versionRange: [
+ {
+ targetApplication: [
+ {
+ guid: APP_ID,
+ minVersion: "19.0a1",
+ },
+ ],
+ },
+ ],
+ },
+ ]);
+
+ const list = await client.get();
+ equal(list.length, 2);
+});
+add_task(clear_state);
diff --git a/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_telemetry.js b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_telemetry.js
new file mode 100644
index 0000000000..6e15eee910
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklist_telemetry.js
@@ -0,0 +1,124 @@
+/* Any copyright is dedicated to the Public Domain.
+http://creativecommons.org/publicdomain/zero/1.0/ */
+
+"use strict";
+
+AddonTestUtils.init(this);
+AddonTestUtils.createAppInfo(
+ "xpcshell@tests.mozilla.org",
+ "XPCShell",
+ "1",
+ "49"
+);
+
+const { TelemetryController } = ChromeUtils.import(
+ "resource://gre/modules/TelemetryController.jsm"
+);
+const { TelemetryTestUtils } = ChromeUtils.import(
+ "resource://testing-common/TelemetryTestUtils.jsm"
+);
+
+function assertTelemetryScalars(expectedScalars) {
+ let scalars = TelemetryTestUtils.getProcessScalars("parent");
+
+ for (const scalarName of Object.keys(expectedScalars || {})) {
+ equal(
+ scalars[scalarName],
+ expectedScalars[scalarName],
+ `Got the expected value for ${scalarName} scalar`
+ );
+ }
+}
+
+add_task(async function test_setup() {
+ // Ensure that the telemetry scalar definitions are loaded and the
+ // AddonManager initialized.
+ await TelemetryController.testSetup();
+ await AddonTestUtils.promiseStartupManager();
+});
+
+add_task(async function test_blocklist_lastModified_rs_scalars() {
+ const now = Date.now();
+
+ const lastEntryTimes = {
+ addons: now - 5000,
+ addons_mlbf: now - 4000,
+ plugins: now - 3000,
+ };
+
+ const lastEntryTimesUTC = {};
+ const toUTC = t => new Date(t).toUTCString();
+ for (const key of Object.keys(lastEntryTimes)) {
+ lastEntryTimesUTC[key] = toUTC(lastEntryTimes[key]);
+ }
+
+ const {
+ BlocklistTelemetry,
+ ExtensionBlocklistRS,
+ ExtensionBlocklistMLBF,
+ PluginBlocklistRS,
+ } = ChromeUtils.import("resource://gre/modules/Blocklist.jsm", null);
+
+ // Return a promise resolved when the recordRSBlocklistLastModified method
+ // has been called (by temporarily replacing the method with a function that
+ // calls the real method and then resolve the promise).
+ function promiseScalarRecorded() {
+ return new Promise(resolve => {
+ let origFn = BlocklistTelemetry.recordRSBlocklistLastModified;
+ BlocklistTelemetry.recordRSBlocklistLastModified = async (...args) => {
+ BlocklistTelemetry.recordRSBlocklistLastModified = origFn;
+ let res = await origFn.apply(BlocklistTelemetry, args);
+ resolve();
+ return res;
+ };
+ });
+ }
+
+ async function fakeRemoteSettingsSync(rsClient, lastModified) {
+ await rsClient.db.importChanges({}, lastModified);
+ await rsClient.emit("sync");
+ }
+
+ info("Test RS plugins blocklist lastModified scalar");
+
+ await PluginBlocklistRS.ensureInitialized();
+ await Promise.all([
+ promiseScalarRecorded(),
+ fakeRemoteSettingsSync(PluginBlocklistRS._client, lastEntryTimes.plugins),
+ ]);
+
+ assertTelemetryScalars({
+ "blocklist.lastModified_rs_addons": undefined,
+ "blocklist.lastModified_rs_addons_mlbf": undefined,
+ "blocklist.lastModified_rs_plugins": lastEntryTimesUTC.plugins,
+ });
+
+ info("Test RS addon blocklist lastModified scalar");
+
+ await ExtensionBlocklistRS.ensureInitialized();
+ await Promise.all([
+ promiseScalarRecorded(),
+ fakeRemoteSettingsSync(ExtensionBlocklistRS._client, lastEntryTimes.addons),
+ ]);
+
+ assertTelemetryScalars({
+ "blocklist.lastModified_rs_addons": lastEntryTimesUTC.addons,
+ "blocklist.lastModified_rs_addons_mlbf": undefined,
+ "blocklist.lastModified_rs_plugins": lastEntryTimesUTC.plugins,
+ });
+
+ await ExtensionBlocklistMLBF.ensureInitialized();
+ await Promise.all([
+ promiseScalarRecorded(),
+ fakeRemoteSettingsSync(
+ ExtensionBlocklistMLBF._client,
+ lastEntryTimes.addons_mlbf
+ ),
+ ]);
+
+ assertTelemetryScalars({
+ "blocklist.lastModified_rs_addons": lastEntryTimesUTC.addons,
+ "blocklist.lastModified_rs_addons_mlbf": lastEntryTimesUTC.addons_mlbf,
+ "blocklist.lastModified_rs_plugins": lastEntryTimesUTC.plugins,
+ });
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklistchange.js b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklistchange.js
new file mode 100644
index 0000000000..4f46fb2053
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklistchange.js
@@ -0,0 +1,1317 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// Checks that changes that cause an add-on to become unblocked or blocked have
+// the right effect
+
+// The tests follow a mostly common pattern. First they start with the add-ons
+// unblocked, then they make a change that causes the add-ons to become blocked
+// then they make a similar change that keeps the add-ons blocked then they make
+// a change that unblocks the add-ons. Some tests skip the initial part and
+// start with add-ons detected as blocked.
+
+// softblock1 is enabled/disabled by the blocklist changes so its softDisabled
+// property should always match its userDisabled property
+
+// softblock2 gets manually enabled then disabled after it becomes blocked so
+// its softDisabled property should never become true after that
+
+// softblock3 does the same as softblock2 however it remains disabled
+
+// softblock4 is disabled while unblocked and so should never have softDisabled
+// set to true and stay userDisabled. This add-on is not used in tests that
+// start with add-ons blocked as it would be identical to softblock3
+
+const URI_EXTENSION_BLOCKLIST_DIALOG =
+ "chrome://mozapps/content/extensions/blocklist.xhtml";
+
+// Allow insecure updates
+Services.prefs.setBoolPref("extensions.checkUpdateSecurity", false);
+
+Services.prefs.setBoolPref("extensions.webextPermissionPrompts", false);
+
+// TODO bug 1649896: Create new test file for MLBF-specific tests.
+const useMLBF = Services.prefs.getBoolPref(
+ "extensions.blocklist.useMLBF",
+ false
+);
+
+var testserver = createHttpServer({ hosts: ["example.com"] });
+// Needed for updates:
+testserver.registerDirectory("/data/", do_get_file("../data"));
+
+const XPIS = {};
+
+const ADDON_IDS = [
+ "softblock1@tests.mozilla.org",
+ "softblock2@tests.mozilla.org",
+ "softblock3@tests.mozilla.org",
+ "softblock4@tests.mozilla.org",
+ "hardblock@tests.mozilla.org",
+ "regexpblock@tests.mozilla.org",
+];
+
+const BLOCK_APP = [
+ {
+ guid: "xpcshell@tests.mozilla.org",
+ maxVersion: "2.*",
+ minVersion: "2",
+ },
+];
+// JEXL filter expression that matches BLOCK_APP.
+const BLOCK_APP_FILTER_EXPRESSION = `env.appinfo.ID == "xpcshell@tests.mozilla.org" && env.appinfo.version >= "2" && env.appinfo.version < "3"`;
+
+function softBlockApp(id) {
+ return {
+ guid: `${id}@tests.mozilla.org`,
+ versionRange: [
+ {
+ severity: "1",
+ targetApplication: BLOCK_APP,
+ },
+ ],
+ };
+}
+
+function softBlockAddonChange(id) {
+ return {
+ guid: `${id}@tests.mozilla.org`,
+ versionRange: [
+ {
+ severity: "1",
+ minVersion: "2",
+ maxVersion: "3",
+ },
+ ],
+ };
+}
+
+function softBlockUpdate2(id) {
+ return {
+ guid: `${id}@tests.mozilla.org`,
+ versionRange: [{ severity: "1" }],
+ };
+}
+
+function softBlockManual(id) {
+ return {
+ guid: `${id}@tests.mozilla.org`,
+ versionRange: [
+ {
+ maxVersion: "2",
+ minVersion: "1",
+ severity: "1",
+ },
+ ],
+ };
+}
+
+const BLOCKLIST_DATA = {
+ empty_blocklist: [],
+ app_update: [
+ softBlockApp("softblock1"),
+ softBlockApp("softblock2"),
+ softBlockApp("softblock3"),
+ softBlockApp("softblock4"),
+ softBlockApp("softblock5"),
+ {
+ guid: "hardblock@tests.mozilla.org",
+ versionRange: [
+ {
+ targetApplication: BLOCK_APP,
+ },
+ ],
+ },
+ {
+ guid: "/^RegExp/",
+ versionRange: [
+ {
+ severity: "1",
+ targetApplication: BLOCK_APP,
+ },
+ ],
+ },
+ {
+ guid: "/^RegExp/i",
+ versionRange: [
+ {
+ targetApplication: BLOCK_APP,
+ },
+ ],
+ },
+ ],
+ addon_change: [
+ softBlockAddonChange("softblock1"),
+ softBlockAddonChange("softblock2"),
+ softBlockAddonChange("softblock3"),
+ softBlockAddonChange("softblock4"),
+ softBlockAddonChange("softblock5"),
+ {
+ guid: "hardblock@tests.mozilla.org",
+ versionRange: [
+ {
+ maxVersion: "3",
+ minVersion: "2",
+ },
+ ],
+ },
+ {
+ _comment:
+ "Two RegExp matches, so test flags work - first shouldn't match.",
+ guid: "/^RegExp/",
+ versionRange: [
+ {
+ maxVersion: "3",
+ minVersion: "2",
+ severity: "1",
+ },
+ ],
+ },
+ {
+ guid: "/^RegExp/i",
+ versionRange: [
+ {
+ maxVersion: "3",
+ minVersion: "2",
+ severity: "2",
+ },
+ ],
+ },
+ ],
+ blocklist_update2: [
+ softBlockUpdate2("softblock1"),
+ softBlockUpdate2("softblock2"),
+ softBlockUpdate2("softblock3"),
+ softBlockUpdate2("softblock4"),
+ softBlockUpdate2("softblock5"),
+ {
+ guid: "hardblock@tests.mozilla.org",
+ versionRange: [],
+ },
+ {
+ guid: "/^RegExp/",
+ versionRange: [{ severity: "1" }],
+ },
+ {
+ guid: "/^RegExp/i",
+ versionRange: [],
+ },
+ ],
+ manual_update: [
+ softBlockManual("softblock1"),
+ softBlockManual("softblock2"),
+ softBlockManual("softblock3"),
+ softBlockManual("softblock4"),
+ softBlockManual("softblock5"),
+ {
+ guid: "hardblock@tests.mozilla.org",
+ versionRange: [
+ {
+ maxVersion: "2",
+ minVersion: "1",
+ },
+ ],
+ },
+ {
+ guid: "/^RegExp/i",
+ versionRange: [
+ {
+ maxVersion: "2",
+ minVersion: "1",
+ },
+ ],
+ },
+ ],
+};
+
+// Blocklist v3 (useMLBF) only supports hard blocks by guid+version. Version
+// ranges, regexps and soft blocks are not supported. So adjust expectations to
+// ensure that the test passes even if useMLBF=true, by:
+// - soft blocks are converted to hard blocks.
+// - hard blocks are accepted as-is.
+// - regexps blocks are converted to hard blocks.
+// - Version ranges are expanded to cover all known versions.
+if (useMLBF) {
+ Assert.ok(Services.prefs.getBoolPref("extensions.blocklist.useMLBF.stashes"));
+ for (let [key, blocks] of Object.entries(BLOCKLIST_DATA)) {
+ BLOCKLIST_DATA[key] = [];
+ for (let block of blocks) {
+ let { guid } = block;
+ if (guid.includes("RegExp")) {
+ guid = "regexpblock@tests.mozilla.org";
+ } else if (!guid.startsWith("soft") && !guid.startsWith("hard")) {
+ throw new Error(`Unexpected mock addon ID: ${guid}`);
+ }
+
+ const { minVersion = "1", maxVersion = "3", targetApplication } =
+ block.versionRange?.[0] || {};
+
+ for (let v = minVersion; v <= maxVersion; ++v) {
+ BLOCKLIST_DATA[key].push({
+ // Assume that IF targetApplication is set, that it is BLOCK_APP.
+ filter_expression: targetApplication && BLOCK_APP_FILTER_EXPRESSION,
+ stash: {
+ // XPI files use version `${v}.0`, update manifests use `${v}`.
+ blocked: [`${guid}:${v}.0`, `${guid}:${v}`],
+ unblocked: [],
+ },
+ });
+ }
+ }
+ }
+}
+
+// XXXgijs: according to https://bugzilla.mozilla.org/show_bug.cgi?id=1257565#c111
+// this code and the related code in Blocklist.jsm (specific to XML blocklist) is
+// dead code and can be removed. See https://bugzilla.mozilla.org/show_bug.cgi?id=1549550 .
+//
+// Don't need the full interface, attempts to call other methods will just
+// throw which is just fine
+var WindowWatcher = {
+ openWindow(parent, url, name, features, openArgs) {
+ // Should be called to list the newly blocklisted items
+ Assert.equal(url, URI_EXTENSION_BLOCKLIST_DIALOG);
+
+ // Simulate auto-disabling any softblocks
+ var list = openArgs.wrappedJSObject.list;
+ list.forEach(function(aItem) {
+ if (!aItem.blocked) {
+ aItem.disable = true;
+ }
+ });
+
+ // run the code after the blocklist is closed
+ Services.obs.notifyObservers(null, "addon-blocklist-closed");
+ },
+
+ QueryInterface: ChromeUtils.generateQI(["nsIWindowWatcher"]),
+};
+
+MockRegistrar.register(
+ "@mozilla.org/embedcomp/window-watcher;1",
+ WindowWatcher
+);
+
+var InstallConfirm = {
+ confirm(aWindow, aUrl, aInstalls) {
+ aInstalls.forEach(function(aInstall) {
+ aInstall.install();
+ });
+ },
+
+ QueryInterface: ChromeUtils.generateQI(["amIWebInstallPrompt"]),
+};
+
+var InstallConfirmFactory = {
+ createInstance: function createInstance(outer, iid) {
+ if (outer != null) {
+ throw Components.Exception("", Cr.NS_ERROR_NO_AGGREGATION);
+ }
+ return InstallConfirm.QueryInterface(iid);
+ },
+};
+
+var registrar = Components.manager.QueryInterface(Ci.nsIComponentRegistrar);
+registrar.registerFactory(
+ Components.ID("{f0863905-4dde-42e2-991c-2dc8209bc9ca}"),
+ "Fake Install Prompt",
+ "@mozilla.org/addons/web-install-prompt;1",
+ InstallConfirmFactory
+);
+
+function Pload_blocklist(aId) {
+ return AddonTestUtils.loadBlocklistRawData({
+ [useMLBF ? "extensionsMLBF" : "extensions"]: BLOCKLIST_DATA[aId],
+ });
+}
+
+// Does a background update check for add-ons and returns a promise that
+// resolves when any started installs complete
+function Pbackground_update() {
+ return new Promise((resolve, reject) => {
+ let installCount = 0;
+ let backgroundCheckCompleted = false;
+
+ AddonManager.addInstallListener({
+ onNewInstall(aInstall) {
+ installCount++;
+ },
+
+ onInstallEnded(aInstall) {
+ installCount--;
+ // Wait until all started installs have completed
+ if (installCount) {
+ return;
+ }
+
+ AddonManager.removeInstallListener(this);
+
+ // If the background check hasn't yet completed then let that call the
+ // callback when it is done
+ if (!backgroundCheckCompleted) {
+ return;
+ }
+
+ resolve();
+ },
+ });
+
+ Services.obs.addObserver(function observer() {
+ Services.obs.removeObserver(
+ observer,
+ "addons-background-update-complete"
+ );
+ backgroundCheckCompleted = true;
+
+ // If any new installs have started then we'll call the callback once they
+ // are completed
+ if (installCount) {
+ return;
+ }
+
+ resolve();
+ }, "addons-background-update-complete");
+
+ AddonManagerPrivate.backgroundUpdateCheck();
+ });
+}
+
+// Manually updates the test add-ons to the given version
+function Pmanual_update(aVersion) {
+ const names = ["soft1", "soft2", "soft3", "soft4", "hard", "regexp"];
+ return Promise.all(
+ names.map(async name => {
+ let url = `http://example.com/addons/blocklist_${name}_${aVersion}.xpi`;
+ let install = await AddonManager.getInstallForURL(url);
+
+ // installAddonFromAOM() does more checking than install.install().
+ // In particular, it will refuse to install an incompatible addon.
+
+ return new Promise(resolve => {
+ install.addListener({
+ onDownloadCancelled: resolve,
+ onInstallEnded: resolve,
+ });
+
+ AddonManager.installAddonFromAOM(null, null, install);
+ });
+ })
+ );
+}
+
+// Checks that an add-ons properties match expected values
+function check_addon(
+ aAddon,
+ aExpectedVersion,
+ aExpectedUserDisabled,
+ aExpectedSoftDisabled,
+ aExpectedState
+) {
+ if (useMLBF) {
+ if (aAddon.id.startsWith("soft")) {
+ if (aExpectedState === Ci.nsIBlocklistService.STATE_SOFTBLOCKED) {
+ // The whole test file assumes that an add-on is "user-disabled" after
+ // an explicit disable(), or after a soft block (without enable()).
+ // With useMLBF, soft blocks are not supported, so the "user-disabled"
+ // state matches the usual behavior of "userDisabled" (=disable()).
+ aExpectedUserDisabled = aAddon.userDisabled;
+ aExpectedSoftDisabled = false;
+ aExpectedState = Ci.nsIBlocklistService.STATE_BLOCKED;
+ }
+ }
+ }
+
+ Assert.notEqual(aAddon, null);
+ info(
+ "Testing " +
+ aAddon.id +
+ " version " +
+ aAddon.version +
+ " user " +
+ aAddon.userDisabled +
+ " soft " +
+ aAddon.softDisabled +
+ " perms " +
+ aAddon.permissions
+ );
+
+ Assert.equal(aAddon.version, aExpectedVersion);
+ Assert.equal(aAddon.blocklistState, aExpectedState);
+ Assert.equal(aAddon.userDisabled, aExpectedUserDisabled);
+ Assert.equal(aAddon.softDisabled, aExpectedSoftDisabled);
+ if (aAddon.softDisabled) {
+ Assert.ok(aAddon.userDisabled);
+ }
+
+ if (aExpectedState == Ci.nsIBlocklistService.STATE_BLOCKED) {
+ info("blocked, PERM_CAN_ENABLE " + aAddon.id);
+ Assert.ok(!hasFlag(aAddon.permissions, AddonManager.PERM_CAN_ENABLE));
+ info("blocked, PERM_CAN_DISABLE " + aAddon.id);
+ Assert.ok(!hasFlag(aAddon.permissions, AddonManager.PERM_CAN_DISABLE));
+ } else if (aAddon.userDisabled) {
+ info("userDisabled, PERM_CAN_ENABLE " + aAddon.id);
+ Assert.ok(hasFlag(aAddon.permissions, AddonManager.PERM_CAN_ENABLE));
+ info("userDisabled, PERM_CAN_DISABLE " + aAddon.id);
+ Assert.ok(!hasFlag(aAddon.permissions, AddonManager.PERM_CAN_DISABLE));
+ } else {
+ info("other, PERM_CAN_ENABLE " + aAddon.id);
+ Assert.ok(!hasFlag(aAddon.permissions, AddonManager.PERM_CAN_ENABLE));
+ if (aAddon.type != "theme") {
+ info("other, PERM_CAN_DISABLE " + aAddon.id);
+ Assert.ok(hasFlag(aAddon.permissions, AddonManager.PERM_CAN_DISABLE));
+ }
+ }
+ Assert.equal(
+ aAddon.appDisabled,
+ aExpectedState == Ci.nsIBlocklistService.STATE_BLOCKED
+ );
+
+ let willBeActive = aAddon.isActive;
+ if (hasFlag(aAddon.pendingOperations, AddonManager.PENDING_DISABLE)) {
+ willBeActive = false;
+ } else if (hasFlag(aAddon.pendingOperations, AddonManager.PENDING_ENABLE)) {
+ willBeActive = true;
+ }
+
+ if (
+ aExpectedUserDisabled ||
+ aExpectedState == Ci.nsIBlocklistService.STATE_BLOCKED
+ ) {
+ Assert.ok(!willBeActive);
+ } else {
+ Assert.ok(willBeActive);
+ }
+}
+
+async function promiseRestartManagerWithAppChange(version) {
+ await promiseShutdownManager();
+ await promiseStartupManagerWithAppChange(version);
+}
+
+async function promiseStartupManagerWithAppChange(version) {
+ if (version) {
+ AddonTestUtils.appInfo.version = version;
+ }
+ if (useMLBF) {
+ // The old ExtensionBlocklist enforced the app version/ID part of the block
+ // when the blocklist entry is checked.
+ // The new ExtensionBlocklist (with useMLBF=true) does not separately check
+ // the app version/ID, but the underlying data source (Remote Settings)
+ // does offer the ability to filter entries with `filter_expression`.
+ // Force a reload to ensure that the BLOCK_APP_FILTER_EXPRESSION filter in
+ // this test file is checked again against the new version.
+ await Blocklist.ExtensionBlocklist._updateMLBF();
+ }
+ await promiseStartupManager();
+}
+
+add_task(async function setup() {
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1");
+ if (useMLBF) {
+ const { ClientEnvironmentBase } = ChromeUtils.import(
+ "resource://gre/modules/components-utils/ClientEnvironment.jsm"
+ );
+ Object.defineProperty(ClientEnvironmentBase, "appinfo", {
+ configurable: true,
+ get() {
+ return gAppInfo;
+ },
+ });
+ }
+
+ // pattern used to map ids like softblock1 to soft1
+ let pattern = /^(soft|hard|regexp)block([1-9]*)@/;
+ for (let id of ADDON_IDS) {
+ for (let version of [1, 2, 3]) {
+ let match = id.match(pattern);
+ let name = `blocklist_${match[1]}${match[2]}_${version}`;
+
+ XPIS[name] = createTempWebExtensionFile({
+ manifest: {
+ name: "Test",
+ version: `${version}.0`,
+ applications: {
+ gecko: {
+ id,
+ update_url: `http://example.com/data/blocklistchange/addon_update${version}.json`,
+ },
+ },
+ },
+ });
+
+ testserver.registerFile(`/addons/${name}.xpi`, XPIS[name]);
+ }
+ }
+
+ await promiseStartupManager();
+
+ await promiseInstallFile(XPIS.blocklist_soft1_1);
+ await promiseInstallFile(XPIS.blocklist_soft2_1);
+ await promiseInstallFile(XPIS.blocklist_soft3_1);
+ await promiseInstallFile(XPIS.blocklist_soft4_1);
+ await promiseInstallFile(XPIS.blocklist_hard_1);
+ await promiseInstallFile(XPIS.blocklist_regexp_1);
+
+ let s4 = await promiseAddonByID("softblock4@tests.mozilla.org");
+ await s4.disable();
+});
+
+// Starts with add-ons unblocked and then switches application versions to
+// change add-ons to blocked and back
+add_task(async function run_app_update_test() {
+ await Pload_blocklist("app_update");
+ await promiseRestartManager();
+
+ let [s1, s2, s3, s4, h, r] = await promiseAddonsByIDs(ADDON_IDS);
+
+ check_addon(
+ s1,
+ "1.0",
+ false,
+ false,
+ Ci.nsIBlocklistService.STATE_NOT_BLOCKED
+ );
+ check_addon(
+ s2,
+ "1.0",
+ false,
+ false,
+ Ci.nsIBlocklistService.STATE_NOT_BLOCKED
+ );
+ check_addon(
+ s3,
+ "1.0",
+ false,
+ false,
+ Ci.nsIBlocklistService.STATE_NOT_BLOCKED
+ );
+ check_addon(s4, "1.0", true, false, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+ check_addon(h, "1.0", false, false, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+ check_addon(r, "1.0", false, false, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+});
+
+add_task(async function app_update_step_2() {
+ await promiseRestartManagerWithAppChange("2");
+
+ let [s1, s2, s3, s4, h, r] = await promiseAddonsByIDs(ADDON_IDS);
+
+ check_addon(s1, "1.0", true, true, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ check_addon(s2, "1.0", true, true, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ check_addon(s3, "1.0", true, true, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ check_addon(s4, "1.0", true, false, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ check_addon(h, "1.0", false, false, Ci.nsIBlocklistService.STATE_BLOCKED);
+ check_addon(r, "1.0", false, false, Ci.nsIBlocklistService.STATE_BLOCKED);
+
+ await s2.enable();
+ await s2.disable();
+ check_addon(s2, "1.0", true, false, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ await s3.enable();
+ check_addon(
+ s3,
+ "1.0",
+ false,
+ false,
+ Ci.nsIBlocklistService.STATE_SOFTBLOCKED
+ );
+});
+
+add_task(async function app_update_step_3() {
+ await promiseRestartManager();
+
+ await promiseRestartManagerWithAppChange("2.5");
+
+ let [s1, s2, s3, s4, h, r] = await promiseAddonsByIDs(ADDON_IDS);
+
+ check_addon(s1, "1.0", true, true, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ check_addon(s2, "1.0", true, false, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ check_addon(
+ s3,
+ "1.0",
+ false,
+ false,
+ Ci.nsIBlocklistService.STATE_SOFTBLOCKED
+ );
+ check_addon(s4, "1.0", true, false, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ check_addon(h, "1.0", false, false, Ci.nsIBlocklistService.STATE_BLOCKED);
+ check_addon(r, "1.0", false, false, Ci.nsIBlocklistService.STATE_BLOCKED);
+});
+
+add_task(async function app_update_step_4() {
+ await promiseRestartManagerWithAppChange("1");
+
+ let [s1, s2, s3, s4, h, r] = await promiseAddonsByIDs(ADDON_IDS);
+
+ check_addon(
+ s1,
+ "1.0",
+ false,
+ false,
+ Ci.nsIBlocklistService.STATE_NOT_BLOCKED
+ );
+ check_addon(s2, "1.0", true, false, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+ check_addon(
+ s3,
+ "1.0",
+ false,
+ false,
+ Ci.nsIBlocklistService.STATE_NOT_BLOCKED
+ );
+ check_addon(s4, "1.0", true, false, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+ check_addon(h, "1.0", false, false, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+ check_addon(r, "1.0", false, false, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+
+ await s1.enable();
+ await s2.enable();
+});
+
+// Starts with add-ons unblocked and then switches application versions to
+// change add-ons to blocked and back. A DB schema change is faked to force a
+// rebuild when the application version changes
+add_task(async function run_app_update_schema_test() {
+ await promiseRestartManager();
+
+ let [s1, s2, s3, s4, h, r] = await promiseAddonsByIDs(ADDON_IDS);
+
+ check_addon(
+ s1,
+ "1.0",
+ false,
+ false,
+ Ci.nsIBlocklistService.STATE_NOT_BLOCKED
+ );
+ check_addon(
+ s2,
+ "1.0",
+ false,
+ false,
+ Ci.nsIBlocklistService.STATE_NOT_BLOCKED
+ );
+ check_addon(
+ s3,
+ "1.0",
+ false,
+ false,
+ Ci.nsIBlocklistService.STATE_NOT_BLOCKED
+ );
+ check_addon(s4, "1.0", true, false, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+ check_addon(h, "1.0", false, false, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+ check_addon(r, "1.0", false, false, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+});
+
+add_task(async function update_schema_2() {
+ await promiseShutdownManager();
+
+ await changeXPIDBVersion(100);
+ gAppInfo.version = "2";
+ await promiseStartupManagerWithAppChange();
+
+ let [s1, s2, s3, s4, h, r] = await promiseAddonsByIDs(ADDON_IDS);
+
+ check_addon(s1, "1.0", true, true, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ check_addon(s2, "1.0", true, true, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ check_addon(s3, "1.0", true, true, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ check_addon(s4, "1.0", true, false, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ check_addon(h, "1.0", false, false, Ci.nsIBlocklistService.STATE_BLOCKED);
+ check_addon(r, "1.0", false, false, Ci.nsIBlocklistService.STATE_BLOCKED);
+
+ await s2.enable();
+ await s2.disable();
+ check_addon(s2, "1.0", true, false, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ await s3.enable();
+ check_addon(
+ s3,
+ "1.0",
+ false,
+ false,
+ Ci.nsIBlocklistService.STATE_SOFTBLOCKED
+ );
+});
+
+add_task(async function update_schema_3() {
+ await promiseRestartManager();
+
+ await promiseShutdownManager();
+ await changeXPIDBVersion(100);
+ gAppInfo.version = "2.5";
+ await promiseStartupManagerWithAppChange();
+
+ let [s1, s2, s3, s4, h, r] = await promiseAddonsByIDs(ADDON_IDS);
+
+ check_addon(s1, "1.0", true, true, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ check_addon(s2, "1.0", true, false, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ check_addon(
+ s3,
+ "1.0",
+ false,
+ false,
+ Ci.nsIBlocklistService.STATE_SOFTBLOCKED
+ );
+ check_addon(s4, "1.0", true, false, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ check_addon(h, "1.0", false, false, Ci.nsIBlocklistService.STATE_BLOCKED);
+ check_addon(r, "1.0", false, false, Ci.nsIBlocklistService.STATE_BLOCKED);
+});
+
+add_task(async function update_schema_4() {
+ await promiseShutdownManager();
+
+ await changeXPIDBVersion(100);
+ await promiseStartupManager();
+
+ let [s1, s2, s3, s4, h, r] = await promiseAddonsByIDs(ADDON_IDS);
+
+ check_addon(s1, "1.0", true, true, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ check_addon(s2, "1.0", true, false, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ check_addon(
+ s3,
+ "1.0",
+ false,
+ false,
+ Ci.nsIBlocklistService.STATE_SOFTBLOCKED
+ );
+ check_addon(s4, "1.0", true, false, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ check_addon(h, "1.0", false, false, Ci.nsIBlocklistService.STATE_BLOCKED);
+ check_addon(r, "1.0", false, false, Ci.nsIBlocklistService.STATE_BLOCKED);
+});
+
+add_task(async function update_schema_5() {
+ await promiseShutdownManager();
+
+ await changeXPIDBVersion(100);
+ gAppInfo.version = "1";
+ await promiseStartupManagerWithAppChange();
+
+ let [s1, s2, s3, s4, h, r] = await promiseAddonsByIDs(ADDON_IDS);
+
+ check_addon(
+ s1,
+ "1.0",
+ false,
+ false,
+ Ci.nsIBlocklistService.STATE_NOT_BLOCKED
+ );
+ check_addon(s2, "1.0", true, false, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+ check_addon(
+ s3,
+ "1.0",
+ false,
+ false,
+ Ci.nsIBlocklistService.STATE_NOT_BLOCKED
+ );
+ check_addon(s4, "1.0", true, false, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+ check_addon(h, "1.0", false, false, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+ check_addon(r, "1.0", false, false, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+
+ await s1.enable();
+ await s2.enable();
+});
+
+// Starts with add-ons unblocked and then loads new blocklists to change add-ons
+// to blocked and back again.
+add_task(async function run_blocklist_update_test() {
+ await Pload_blocklist("empty_blocklist");
+ await promiseRestartManager();
+
+ let [s1, s2, s3, s4, h, r] = await promiseAddonsByIDs(ADDON_IDS);
+
+ check_addon(
+ s1,
+ "1.0",
+ false,
+ false,
+ Ci.nsIBlocklistService.STATE_NOT_BLOCKED
+ );
+ check_addon(
+ s2,
+ "1.0",
+ false,
+ false,
+ Ci.nsIBlocklistService.STATE_NOT_BLOCKED
+ );
+ check_addon(
+ s3,
+ "1.0",
+ false,
+ false,
+ Ci.nsIBlocklistService.STATE_NOT_BLOCKED
+ );
+ check_addon(s4, "1.0", true, false, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+ check_addon(h, "1.0", false, false, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+ check_addon(r, "1.0", false, false, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+
+ await Pload_blocklist("blocklist_update2");
+ await promiseRestartManager();
+
+ [s1, s2, s3, s4, h, r] = await promiseAddonsByIDs(ADDON_IDS);
+
+ check_addon(s1, "1.0", true, true, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ check_addon(s2, "1.0", true, true, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ check_addon(s3, "1.0", true, true, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ check_addon(s4, "1.0", true, false, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ check_addon(h, "1.0", false, false, Ci.nsIBlocklistService.STATE_BLOCKED);
+ check_addon(r, "1.0", false, false, Ci.nsIBlocklistService.STATE_BLOCKED);
+
+ await s2.enable();
+ await s2.disable();
+ check_addon(s2, "1.0", true, false, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ await s3.enable();
+ check_addon(
+ s3,
+ "1.0",
+ false,
+ false,
+ Ci.nsIBlocklistService.STATE_SOFTBLOCKED
+ );
+
+ await promiseRestartManager();
+
+ await Pload_blocklist("blocklist_update2");
+ await promiseRestartManager();
+
+ [s1, s2, s3, s4, h, r] = await promiseAddonsByIDs(ADDON_IDS);
+
+ check_addon(s1, "1.0", true, true, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ check_addon(s2, "1.0", true, false, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ check_addon(
+ s3,
+ "1.0",
+ false,
+ false,
+ Ci.nsIBlocklistService.STATE_SOFTBLOCKED
+ );
+ check_addon(s4, "1.0", true, false, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ check_addon(h, "1.0", false, false, Ci.nsIBlocklistService.STATE_BLOCKED);
+ check_addon(r, "1.0", false, false, Ci.nsIBlocklistService.STATE_BLOCKED);
+
+ await Pload_blocklist("empty_blocklist");
+ await promiseRestartManager();
+
+ [s1, s2, s3, s4, h, r] = await promiseAddonsByIDs(ADDON_IDS);
+
+ check_addon(
+ s1,
+ "1.0",
+ false,
+ false,
+ Ci.nsIBlocklistService.STATE_NOT_BLOCKED
+ );
+ check_addon(s2, "1.0", true, false, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+ check_addon(
+ s3,
+ "1.0",
+ false,
+ false,
+ Ci.nsIBlocklistService.STATE_NOT_BLOCKED
+ );
+ check_addon(s4, "1.0", true, false, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+ check_addon(h, "1.0", false, false, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+ check_addon(r, "1.0", false, false, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+
+ await s1.enable();
+ await s2.enable();
+});
+
+// Starts with add-ons unblocked and then new versions are installed outside of
+// the app to change them to blocked and back again.
+add_task(async function run_addon_change_test() {
+ await Pload_blocklist("addon_change");
+ await promiseRestartManager();
+
+ let [s1, s2, s3, s4, h, r] = await promiseAddonsByIDs(ADDON_IDS);
+
+ check_addon(
+ s1,
+ "1.0",
+ false,
+ false,
+ Ci.nsIBlocklistService.STATE_NOT_BLOCKED
+ );
+ check_addon(
+ s2,
+ "1.0",
+ false,
+ false,
+ Ci.nsIBlocklistService.STATE_NOT_BLOCKED
+ );
+ check_addon(
+ s3,
+ "1.0",
+ false,
+ false,
+ Ci.nsIBlocklistService.STATE_NOT_BLOCKED
+ );
+ check_addon(s4, "1.0", true, false, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+ check_addon(h, "1.0", false, false, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+ check_addon(r, "1.0", false, false, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+});
+
+add_task(async function run_addon_change_2() {
+ await promiseInstallFile(XPIS.blocklist_soft1_2);
+ await promiseInstallFile(XPIS.blocklist_soft2_2);
+ await promiseInstallFile(XPIS.blocklist_soft3_2);
+ await promiseInstallFile(XPIS.blocklist_soft4_2);
+ await promiseInstallFile(XPIS.blocklist_hard_2);
+ await promiseInstallFile(XPIS.blocklist_regexp_2);
+
+ let [s1, s2, s3, s4, h, r] = await promiseAddonsByIDs(ADDON_IDS);
+
+ check_addon(s1, "2.0", true, true, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ check_addon(s2, "2.0", true, true, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ check_addon(s3, "2.0", true, true, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ check_addon(s4, "2.0", true, false, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ check_addon(h, "2.0", false, false, Ci.nsIBlocklistService.STATE_BLOCKED);
+ check_addon(r, "2.0", false, false, Ci.nsIBlocklistService.STATE_BLOCKED);
+
+ await s2.enable();
+ await s2.disable();
+ check_addon(s2, "2.0", true, false, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ await s3.enable();
+ check_addon(
+ s3,
+ "2.0",
+ false,
+ false,
+ Ci.nsIBlocklistService.STATE_SOFTBLOCKED
+ );
+});
+
+add_task(async function run_addon_change_3() {
+ await promiseInstallFile(XPIS.blocklist_soft1_3);
+ await promiseInstallFile(XPIS.blocklist_soft2_3);
+ await promiseInstallFile(XPIS.blocklist_soft3_3);
+ await promiseInstallFile(XPIS.blocklist_soft4_3);
+ await promiseInstallFile(XPIS.blocklist_hard_3);
+ await promiseInstallFile(XPIS.blocklist_regexp_3);
+
+ let [s1, s2, s3, s4, h, r] = await promiseAddonsByIDs(ADDON_IDS);
+
+ check_addon(s1, "3.0", true, true, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ check_addon(s2, "3.0", true, false, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ check_addon(
+ s3,
+ "3.0",
+ false,
+ false,
+ Ci.nsIBlocklistService.STATE_SOFTBLOCKED
+ );
+ check_addon(s4, "3.0", true, false, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ check_addon(h, "3.0", false, false, Ci.nsIBlocklistService.STATE_BLOCKED);
+ check_addon(r, "3.0", false, false, Ci.nsIBlocklistService.STATE_BLOCKED);
+});
+
+add_task(async function run_addon_change_4() {
+ await promiseInstallFile(XPIS.blocklist_soft1_1);
+ await promiseInstallFile(XPIS.blocklist_soft2_1);
+ await promiseInstallFile(XPIS.blocklist_soft3_1);
+ await promiseInstallFile(XPIS.blocklist_soft4_1);
+ await promiseInstallFile(XPIS.blocklist_hard_1);
+ await promiseInstallFile(XPIS.blocklist_regexp_1);
+
+ let [s1, s2, s3, s4, h, r] = await promiseAddonsByIDs(ADDON_IDS);
+
+ check_addon(
+ s1,
+ "1.0",
+ false,
+ false,
+ Ci.nsIBlocklistService.STATE_NOT_BLOCKED
+ );
+ check_addon(s2, "1.0", true, false, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+ check_addon(
+ s3,
+ "1.0",
+ false,
+ false,
+ Ci.nsIBlocklistService.STATE_NOT_BLOCKED
+ );
+ check_addon(s4, "1.0", true, false, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+ check_addon(h, "1.0", false, false, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+ check_addon(r, "1.0", false, false, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+
+ await s1.enable();
+ await s2.enable();
+});
+
+// Add-ons are initially unblocked then attempts to upgrade to blocked versions
+// in the background which should fail
+add_task(async function run_background_update_test() {
+ await promiseRestartManager();
+
+ let [s1, s2, s3, s4, h, r] = await promiseAddonsByIDs(ADDON_IDS);
+
+ check_addon(
+ s1,
+ "1.0",
+ false,
+ false,
+ Ci.nsIBlocklistService.STATE_NOT_BLOCKED
+ );
+ check_addon(
+ s2,
+ "1.0",
+ false,
+ false,
+ Ci.nsIBlocklistService.STATE_NOT_BLOCKED
+ );
+ check_addon(
+ s3,
+ "1.0",
+ false,
+ false,
+ Ci.nsIBlocklistService.STATE_NOT_BLOCKED
+ );
+ check_addon(s4, "1.0", true, false, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+ check_addon(h, "1.0", false, false, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+ check_addon(r, "1.0", false, false, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+
+ await Pbackground_update();
+ await promiseRestartManager();
+
+ [s1, s2, s3, s4, h, r] = await promiseAddonsByIDs(ADDON_IDS);
+
+ check_addon(
+ s1,
+ "1.0",
+ false,
+ false,
+ Ci.nsIBlocklistService.STATE_NOT_BLOCKED
+ );
+ check_addon(
+ s2,
+ "1.0",
+ false,
+ false,
+ Ci.nsIBlocklistService.STATE_NOT_BLOCKED
+ );
+ check_addon(
+ s3,
+ "1.0",
+ false,
+ false,
+ Ci.nsIBlocklistService.STATE_NOT_BLOCKED
+ );
+ check_addon(s4, "1.0", true, false, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+ check_addon(h, "1.0", false, false, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+ check_addon(r, "1.0", false, false, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+});
+
+// Starts with add-ons blocked and then new versions are detected and installed
+// automatically for unblocked versions.
+add_task(async function run_background_update_2_test() {
+ await promiseInstallFile(XPIS.blocklist_soft1_3);
+ await promiseInstallFile(XPIS.blocklist_soft2_3);
+ await promiseInstallFile(XPIS.blocklist_soft3_3);
+ await promiseInstallFile(XPIS.blocklist_soft4_3);
+ await promiseInstallFile(XPIS.blocklist_hard_3);
+ await promiseInstallFile(XPIS.blocklist_regexp_3);
+
+ let [s1, s2, s3, s4, h, r] = await promiseAddonsByIDs(ADDON_IDS);
+
+ check_addon(s1, "3.0", true, true, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ check_addon(s2, "3.0", true, true, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ check_addon(s3, "3.0", true, true, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ check_addon(h, "3.0", false, false, Ci.nsIBlocklistService.STATE_BLOCKED);
+ check_addon(r, "3.0", false, false, Ci.nsIBlocklistService.STATE_BLOCKED);
+
+ await s2.enable();
+ await s2.disable();
+ check_addon(s2, "3.0", true, false, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ await s3.enable();
+ check_addon(
+ s3,
+ "3.0",
+ false,
+ false,
+ Ci.nsIBlocklistService.STATE_SOFTBLOCKED
+ );
+
+ await Pbackground_update();
+
+ [s1, s2, s3, s4, h, r] = await promiseAddonsByIDs(ADDON_IDS);
+
+ check_addon(
+ s1,
+ "1.0",
+ false,
+ false,
+ Ci.nsIBlocklistService.STATE_NOT_BLOCKED
+ );
+ check_addon(s2, "1.0", true, false, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+ check_addon(
+ s3,
+ "1.0",
+ false,
+ false,
+ Ci.nsIBlocklistService.STATE_NOT_BLOCKED
+ );
+ check_addon(h, "1.0", false, false, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+ check_addon(r, "1.0", false, false, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+
+ await s1.enable();
+ await s2.enable();
+ await s4.disable();
+});
+
+// Starts with add-ons blocked and then simulates the user upgrading them to
+// unblocked versions.
+add_task(async function run_manual_update_test() {
+ await Pload_blocklist("manual_update");
+
+ let [s1, s2, s3, s4, h, r] = await promiseAddonsByIDs(ADDON_IDS);
+
+ check_addon(s1, "1.0", true, true, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ check_addon(s2, "1.0", true, true, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ check_addon(s3, "1.0", true, true, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ check_addon(s4, "1.0", true, false, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ check_addon(h, "1.0", false, false, Ci.nsIBlocklistService.STATE_BLOCKED);
+ check_addon(r, "1.0", false, false, Ci.nsIBlocklistService.STATE_BLOCKED);
+
+ await s2.enable();
+ await s2.disable();
+ check_addon(s2, "1.0", true, false, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ await s3.enable();
+ check_addon(
+ s3,
+ "1.0",
+ false,
+ false,
+ Ci.nsIBlocklistService.STATE_SOFTBLOCKED
+ );
+
+ await Pmanual_update("2");
+
+ [s1, s2, s3, s4, h, r] = await promiseAddonsByIDs(ADDON_IDS);
+
+ // With useMLBF, s1/s2/s3 are hard blocks, so they cannot update.
+ const sv2 = useMLBF ? "1.0" : "2.0";
+ check_addon(s1, sv2, true, true, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ check_addon(s2, sv2, true, false, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ check_addon(s3, sv2, false, false, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ check_addon(s4, sv2, true, false, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ // Can't manually update to a hardblocked add-on
+ check_addon(h, "1.0", false, false, Ci.nsIBlocklistService.STATE_BLOCKED);
+ check_addon(r, "1.0", false, false, Ci.nsIBlocklistService.STATE_BLOCKED);
+
+ await Pmanual_update("3");
+
+ [s1, s2, s3, s4, h, r] = await promiseAddonsByIDs(ADDON_IDS);
+
+ check_addon(
+ s1,
+ "3.0",
+ false,
+ false,
+ Ci.nsIBlocklistService.STATE_NOT_BLOCKED
+ );
+ check_addon(s2, "3.0", true, false, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+ check_addon(
+ s3,
+ "3.0",
+ false,
+ false,
+ Ci.nsIBlocklistService.STATE_NOT_BLOCKED
+ );
+ check_addon(s4, "3.0", true, false, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+ check_addon(h, "3.0", false, false, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+ check_addon(r, "3.0", false, false, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+});
+
+// Starts with add-ons blocked and then new versions are installed outside of
+// the app to change them to unblocked.
+add_task(async function run_manual_update_2_test() {
+ let addons = await promiseAddonsByIDs(ADDON_IDS);
+ await Promise.all(addons.map(addon => addon.uninstall()));
+
+ await promiseInstallFile(XPIS.blocklist_soft1_1);
+ await promiseInstallFile(XPIS.blocklist_soft2_1);
+ await promiseInstallFile(XPIS.blocklist_soft3_1);
+ await promiseInstallFile(XPIS.blocklist_soft4_1);
+ await promiseInstallFile(XPIS.blocklist_hard_1);
+ await promiseInstallFile(XPIS.blocklist_regexp_1);
+
+ let [s1, s2, s3, s4, h, r] = await promiseAddonsByIDs(ADDON_IDS);
+
+ check_addon(s1, "1.0", true, true, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ check_addon(s2, "1.0", true, true, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ check_addon(s3, "1.0", true, true, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ check_addon(h, "1.0", false, false, Ci.nsIBlocklistService.STATE_BLOCKED);
+ check_addon(r, "1.0", false, false, Ci.nsIBlocklistService.STATE_BLOCKED);
+
+ await s2.enable();
+ await s2.disable();
+ check_addon(s2, "1.0", true, false, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ await s3.enable();
+ check_addon(
+ s3,
+ "1.0",
+ false,
+ false,
+ Ci.nsIBlocklistService.STATE_SOFTBLOCKED
+ );
+
+ await Pmanual_update("2");
+
+ [s1, s2, s3, s4, h, r] = await promiseAddonsByIDs(ADDON_IDS);
+
+ // With useMLBF, s1/s2/s3 are hard blocks, so they cannot update.
+ const sv2 = useMLBF ? "1.0" : "2.0";
+ check_addon(s1, sv2, true, true, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ check_addon(s2, sv2, true, false, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ check_addon(s3, sv2, false, false, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ // Can't manually update to a hardblocked add-on
+ check_addon(h, "1.0", false, false, Ci.nsIBlocklistService.STATE_BLOCKED);
+ check_addon(r, "1.0", false, false, Ci.nsIBlocklistService.STATE_BLOCKED);
+
+ await Pmanual_update("3");
+
+ [s1, s2, s3, s4, h, r] = await promiseAddonsByIDs(ADDON_IDS);
+
+ check_addon(
+ s1,
+ "3.0",
+ false,
+ false,
+ Ci.nsIBlocklistService.STATE_NOT_BLOCKED
+ );
+ check_addon(s2, "3.0", true, false, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+ check_addon(
+ s3,
+ "3.0",
+ false,
+ false,
+ Ci.nsIBlocklistService.STATE_NOT_BLOCKED
+ );
+ check_addon(h, "3.0", false, false, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+ check_addon(r, "3.0", false, false, Ci.nsIBlocklistService.STATE_NOT_BLOCKED);
+
+ await s1.enable();
+ await s2.enable();
+ await s4.disable();
+});
+
+// Uses the API to install blocked add-ons from the local filesystem
+add_task(async function run_local_install_test() {
+ let addons = await promiseAddonsByIDs(ADDON_IDS);
+ await Promise.all(addons.map(addon => addon.uninstall()));
+
+ await promiseInstallAllFiles([
+ XPIS.blocklist_soft1_1,
+ XPIS.blocklist_soft2_1,
+ XPIS.blocklist_soft3_1,
+ XPIS.blocklist_soft4_1,
+ XPIS.blocklist_hard_1,
+ XPIS.blocklist_regexp_1,
+ ]);
+
+ let installs = await AddonManager.getAllInstalls();
+ // Should have finished all installs without needing to restart
+ Assert.equal(installs.length, 0);
+
+ let [s1, s2, s3 /* s4 */, , h, r] = await promiseAddonsByIDs(ADDON_IDS);
+
+ check_addon(s1, "1.0", true, true, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ check_addon(s2, "1.0", true, true, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ check_addon(s3, "1.0", true, true, Ci.nsIBlocklistService.STATE_SOFTBLOCKED);
+ check_addon(h, "1.0", false, false, Ci.nsIBlocklistService.STATE_BLOCKED);
+ check_addon(r, "1.0", false, false, Ci.nsIBlocklistService.STATE_BLOCKED);
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklistchange_v2.js b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklistchange_v2.js
new file mode 100644
index 0000000000..562365830b
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_blocklistchange_v2.js
@@ -0,0 +1,21 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// useMLBF=true doesn't support soft blocks, regexps or version ranges.
+// Flip the useMLBF preference to make sure that the test_blocklistchange.js
+// test works with and without this pref (blocklist v2 and blocklist v3).
+//
+// This is a bit of a hack and to be replaced with a new file in bug 1649906.
+Services.prefs.setBoolPref(
+ "extensions.blocklist.useMLBF",
+ !Services.prefs.getBoolPref("extensions.blocklist.useMLBF")
+);
+
+// The test requires stashes to be enabled.
+Services.prefs.setBoolPref("extensions.blocklist.useMLBF.stashes", true);
+
+Services.scriptloader.loadSubScript(
+ Services.io.newFileURI(do_get_file("test_blocklistchange.js")).spec,
+ this
+);
diff --git a/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_Device.js b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_Device.js
new file mode 100644
index 0000000000..f16a7ddeae
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_Device.js
@@ -0,0 +1,74 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// Test whether a machine which differs only on device ID, but otherwise
+// exactly matches the blacklist entry, is not blocked.
+// Uses test_gfxBlacklist.json
+
+// Performs the initial setup
+async function run_test() {
+ var gfxInfo = Cc["@mozilla.org/gfx/info;1"].getService(Ci.nsIGfxInfo);
+
+ // We can't do anything if we can't spoof the stuff we need.
+ if (!(gfxInfo instanceof Ci.nsIGfxInfoDebug)) {
+ do_test_finished();
+ return;
+ }
+
+ gfxInfo.QueryInterface(Ci.nsIGfxInfoDebug);
+ gfxInfo.fireTestProcess();
+
+ // Set the vendor/device ID, etc, to match the test file.
+ switch (Services.appinfo.OS) {
+ case "WINNT":
+ gfxInfo.spoofVendorID("0xabcd");
+ gfxInfo.spoofDeviceID("0x9876");
+ gfxInfo.spoofDriverVersion("8.52.322.2201");
+ // Windows 7
+ gfxInfo.spoofOSVersion(0x60001);
+ break;
+ case "Linux":
+ gfxInfo.spoofVendorID("0xabcd");
+ gfxInfo.spoofDeviceID("0x9876");
+ break;
+ case "Darwin":
+ gfxInfo.spoofVendorID("0xabcd");
+ gfxInfo.spoofDeviceID("0x9876");
+ gfxInfo.spoofOSVersion(0xa0900);
+ break;
+ case "Android":
+ gfxInfo.spoofVendorID("abcd");
+ gfxInfo.spoofDeviceID("aabb");
+ gfxInfo.spoofDriverVersion("5");
+ break;
+ }
+
+ do_test_pending();
+
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "3", "8");
+ await promiseStartupManager();
+
+ function checkBlacklist() {
+ var status = gfxInfo.getFeatureStatus(Ci.nsIGfxInfo.FEATURE_DIRECT2D);
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_STATUS_OK);
+
+ status = gfxInfo.getFeatureStatus(Ci.nsIGfxInfo.FEATURE_DIRECT3D_9_LAYERS);
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_STATUS_OK);
+
+ status = gfxInfo.getFeatureStatus(
+ Ci.nsIGfxInfo.FEATURE_CANVAS2D_ACCELERATION
+ );
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_STATUS_OK);
+
+ do_test_finished();
+ }
+
+ Services.obs.addObserver(function(aSubject, aTopic, aData) {
+ // If we wait until after we go through the event loop, gfxInfo is sure to
+ // have processed the gfxItems event.
+ executeSoon(checkBlacklist);
+ }, "blocklist-data-gfxItems");
+
+ mockGfxBlocklistItemsFromDisk("../data/test_gfxBlacklist.json");
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_DriverNew.js b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_DriverNew.js
new file mode 100644
index 0000000000..dfa8a6dea1
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_DriverNew.js
@@ -0,0 +1,68 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// Test whether a new-enough driver bypasses the blacklist, even if the rest of
+// the attributes match the blacklist entry.
+// Uses test_gfxBlacklist.json
+
+// Performs the initial setup
+async function run_test() {
+ var gfxInfo = Cc["@mozilla.org/gfx/info;1"].getService(Ci.nsIGfxInfo);
+
+ // We can't do anything if we can't spoof the stuff we need.
+ if (!(gfxInfo instanceof Ci.nsIGfxInfoDebug)) {
+ do_test_finished();
+ return;
+ }
+
+ gfxInfo.QueryInterface(Ci.nsIGfxInfoDebug);
+ gfxInfo.fireTestProcess();
+
+ // Set the vendor/device ID, etc, to match the test file.
+ switch (Services.appinfo.OS) {
+ case "WINNT":
+ gfxInfo.spoofVendorID("0xabcd");
+ gfxInfo.spoofDeviceID("0x1234");
+ gfxInfo.spoofDriverVersion("8.52.322.2202");
+ // Windows 7
+ gfxInfo.spoofOSVersion(0x60001);
+ break;
+ case "Linux":
+ // We don't support driver versions on Linux.
+ do_test_finished();
+ return;
+ case "Darwin":
+ // We don't support driver versions on Darwin.
+ do_test_finished();
+ return;
+ case "Android":
+ gfxInfo.spoofVendorID("abcd");
+ gfxInfo.spoofDeviceID("wxyz");
+ gfxInfo.spoofDriverVersion("6");
+ break;
+ }
+
+ do_test_pending();
+
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "3", "8");
+ await promiseStartupManager();
+
+ function checkBlacklist() {
+ var status = gfxInfo.getFeatureStatus(Ci.nsIGfxInfo.FEATURE_DIRECT2D);
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_STATUS_OK);
+
+ status = gfxInfo.getFeatureStatus(Ci.nsIGfxInfo.FEATURE_DIRECT3D_9_LAYERS);
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_STATUS_OK);
+
+ do_test_finished();
+ }
+
+ Services.obs.addObserver(function(aSubject, aTopic, aData) {
+ // If we wait until after we go through the event loop, gfxInfo is sure to
+ // have processed the gfxItems event.
+ executeSoon(checkBlacklist);
+ }, "blocklist-data-gfxItems");
+
+ mockGfxBlocklistItemsFromDisk("../data/test_gfxBlacklist.json");
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_Equal_DriverNew.js b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_Equal_DriverNew.js
new file mode 100644
index 0000000000..6eeab69dec
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_Equal_DriverNew.js
@@ -0,0 +1,106 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// Test whether a machine which is newer than the equal
+// blacklist entry is allowed.
+// Uses test_gfxBlacklist.json
+
+// Performs the initial setup
+async function run_test() {
+ var gfxInfo = Cc["@mozilla.org/gfx/info;1"].getService(Ci.nsIGfxInfo);
+
+ // We can't do anything if we can't spoof the stuff we need.
+ if (!(gfxInfo instanceof Ci.nsIGfxInfoDebug)) {
+ do_test_finished();
+ return;
+ }
+
+ gfxInfo.QueryInterface(Ci.nsIGfxInfoDebug);
+ gfxInfo.fireTestProcess();
+
+ // Set the vendor/device ID, etc, to match the test file.
+ switch (Services.appinfo.OS) {
+ case "WINNT":
+ gfxInfo.spoofVendorID("0xdcdc");
+ gfxInfo.spoofDeviceID("0x1234");
+ gfxInfo.spoofDriverVersion("8.52.322.1112");
+ // Windows 7
+ gfxInfo.spoofOSVersion(0x60001);
+ break;
+ case "Linux":
+ // We don't support driver versions on Linux.
+ do_test_finished();
+ return;
+ case "Darwin":
+ // We don't support driver versions on OS X.
+ do_test_finished();
+ return;
+ case "Android":
+ gfxInfo.spoofVendorID("dcdc");
+ gfxInfo.spoofDeviceID("uiop");
+ gfxInfo.spoofDriverVersion("6");
+ break;
+ }
+
+ do_test_pending();
+
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "15.0", "8");
+ await promiseStartupManager();
+
+ function checkBlacklist() {
+ var status = gfxInfo.getFeatureStatus(Ci.nsIGfxInfo.FEATURE_DIRECT2D);
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_STATUS_OK);
+
+ // Make sure unrelated features aren't affected
+ status = gfxInfo.getFeatureStatus(Ci.nsIGfxInfo.FEATURE_DIRECT3D_9_LAYERS);
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_STATUS_OK);
+
+ status = gfxInfo.getFeatureStatus(Ci.nsIGfxInfo.FEATURE_DIRECT3D_11_LAYERS);
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_STATUS_OK);
+
+ status = gfxInfo.getFeatureStatus(Ci.nsIGfxInfo.FEATURE_OPENGL_LAYERS);
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_STATUS_OK);
+
+ status = gfxInfo.getFeatureStatus(Ci.nsIGfxInfo.FEATURE_DIRECT3D_11_ANGLE);
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_BLOCKED_DRIVER_VERSION);
+
+ status = gfxInfo.getFeatureStatus(
+ Ci.nsIGfxInfo.FEATURE_HARDWARE_VIDEO_DECODING
+ );
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_BLOCKED_DRIVER_VERSION);
+
+ status = gfxInfo.getFeatureStatus(
+ Ci.nsIGfxInfo.FEATURE_WEBRTC_HW_ACCELERATION_H264
+ );
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_BLOCKED_DRIVER_VERSION);
+
+ status = gfxInfo.getFeatureStatus(
+ Ci.nsIGfxInfo.FEATURE_WEBRTC_HW_ACCELERATION_DECODE
+ );
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_BLOCKED_DRIVER_VERSION);
+
+ status = gfxInfo.getFeatureStatus(
+ Ci.nsIGfxInfo.FEATURE_WEBRTC_HW_ACCELERATION_ENCODE
+ );
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_BLOCKED_DRIVER_VERSION);
+
+ status = gfxInfo.getFeatureStatus(Ci.nsIGfxInfo.FEATURE_WEBGL_ANGLE);
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_STATUS_OK);
+
+ status = gfxInfo.getFeatureStatus(
+ Ci.nsIGfxInfo.FEATURE_CANVAS2D_ACCELERATION
+ );
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_BLOCKED_DRIVER_VERSION);
+
+ do_test_finished();
+ }
+
+ Services.obs.addObserver(function(aSubject, aTopic, aData) {
+ // If we wait until after we go through the event loop, gfxInfo is sure to
+ // have processed the gfxItems event.
+ executeSoon(checkBlacklist);
+ }, "blocklist-data-gfxItems");
+
+ mockGfxBlocklistItemsFromDisk("../data/test_gfxBlacklist.json");
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_Equal_DriverOld.js b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_Equal_DriverOld.js
new file mode 100644
index 0000000000..328d6e90bb
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_Equal_DriverOld.js
@@ -0,0 +1,69 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// Test whether a machine which is older than the equal
+// blacklist entry is correctly allowed.
+// Uses test_gfxBlacklist.json
+
+// Performs the initial setup
+async function run_test() {
+ var gfxInfo = Cc["@mozilla.org/gfx/info;1"].getService(Ci.nsIGfxInfo);
+
+ // We can't do anything if we can't spoof the stuff we need.
+ if (!(gfxInfo instanceof Ci.nsIGfxInfoDebug)) {
+ do_test_finished();
+ return;
+ }
+
+ gfxInfo.QueryInterface(Ci.nsIGfxInfoDebug);
+ gfxInfo.fireTestProcess();
+
+ // Set the vendor/device ID, etc, to match the test file.
+ switch (Services.appinfo.OS) {
+ case "WINNT":
+ gfxInfo.spoofVendorID("0xdcdc");
+ gfxInfo.spoofDeviceID("0x1234");
+ gfxInfo.spoofDriverVersion("8.52.322.1110");
+ // Windows 7
+ gfxInfo.spoofOSVersion(0x60001);
+ break;
+ case "Linux":
+ // We don't support driver versions on Linux.
+ do_test_finished();
+ return;
+ case "Darwin":
+ // We don't support driver versions on Darwin.
+ do_test_finished();
+ return;
+ case "Android":
+ gfxInfo.spoofVendorID("dcdc");
+ gfxInfo.spoofDeviceID("uiop");
+ gfxInfo.spoofDriverVersion("4");
+ break;
+ }
+
+ do_test_pending();
+
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "3", "8");
+ await promiseStartupManager();
+
+ function checkBlacklist() {
+ var status = gfxInfo.getFeatureStatus(Ci.nsIGfxInfo.FEATURE_DIRECT2D);
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_STATUS_OK);
+
+ // Make sure unrelated features aren't affected
+ status = gfxInfo.getFeatureStatus(Ci.nsIGfxInfo.FEATURE_DIRECT3D_9_LAYERS);
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_STATUS_OK);
+
+ do_test_finished();
+ }
+
+ Services.obs.addObserver(function(aSubject, aTopic, aData) {
+ // If we wait until after we go through the event loop, gfxInfo is sure to
+ // have processed the gfxItems event.
+ executeSoon(checkBlacklist);
+ }, "blocklist-data-gfxItems");
+
+ mockGfxBlocklistItemsFromDisk("../data/test_gfxBlacklist.json");
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_Equal_OK.js b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_Equal_OK.js
new file mode 100644
index 0000000000..908bd8604e
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_Equal_OK.js
@@ -0,0 +1,69 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// Test whether a machine which exactly matches the equal
+// blacklist entry is successfully blocked.
+// Uses test_gfxBlacklist.json
+
+// Performs the initial setup
+async function run_test() {
+ var gfxInfo = Cc["@mozilla.org/gfx/info;1"].getService(Ci.nsIGfxInfo);
+
+ // We can't do anything if we can't spoof the stuff we need.
+ if (!(gfxInfo instanceof Ci.nsIGfxInfoDebug)) {
+ do_test_finished();
+ return;
+ }
+
+ gfxInfo.QueryInterface(Ci.nsIGfxInfoDebug);
+ gfxInfo.fireTestProcess();
+
+ // Set the vendor/device ID, etc, to match the test file.
+ switch (Services.appinfo.OS) {
+ case "WINNT":
+ gfxInfo.spoofVendorID("0xdcdc");
+ gfxInfo.spoofDeviceID("0x1234");
+ gfxInfo.spoofDriverVersion("8.52.322.1111");
+ // Windows 7
+ gfxInfo.spoofOSVersion(0x60001);
+ break;
+ case "Linux":
+ // We don't support driver versions on Linux.
+ do_test_finished();
+ return;
+ case "Darwin":
+ // We don't support driver versions on Darwin.
+ do_test_finished();
+ return;
+ case "Android":
+ gfxInfo.spoofVendorID("dcdc");
+ gfxInfo.spoofDeviceID("uiop");
+ gfxInfo.spoofDriverVersion("5");
+ break;
+ }
+
+ do_test_pending();
+
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "3", "8");
+ await promiseStartupManager();
+
+ function checkBlacklist() {
+ var status = gfxInfo.getFeatureStatus(Ci.nsIGfxInfo.FEATURE_DIRECT2D);
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_BLOCKED_DRIVER_VERSION);
+
+ // Make sure unrelated features aren't affected
+ status = gfxInfo.getFeatureStatus(Ci.nsIGfxInfo.FEATURE_DIRECT3D_9_LAYERS);
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_STATUS_OK);
+
+ do_test_finished();
+ }
+
+ Services.obs.addObserver(function(aSubject, aTopic, aData) {
+ // If we wait until after we go through the event loop, gfxInfo is sure to
+ // have processed the gfxItems event.
+ executeSoon(checkBlacklist);
+ }, "blocklist-data-gfxItems");
+
+ mockGfxBlocklistItemsFromDisk("../data/test_gfxBlacklist.json");
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_GTE_DriverOld.js b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_GTE_DriverOld.js
new file mode 100644
index 0000000000..3f9c119c3f
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_GTE_DriverOld.js
@@ -0,0 +1,69 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// Test whether a machine which is lower than the greater-than-or-equal
+// blacklist entry is allowed.
+// Uses test_gfxBlacklist.json
+
+// Performs the initial setup
+async function run_test() {
+ var gfxInfo = Cc["@mozilla.org/gfx/info;1"].getService(Ci.nsIGfxInfo);
+
+ // We can't do anything if we can't spoof the stuff we need.
+ if (!(gfxInfo instanceof Ci.nsIGfxInfoDebug)) {
+ do_test_finished();
+ return;
+ }
+
+ gfxInfo.QueryInterface(Ci.nsIGfxInfoDebug);
+ gfxInfo.fireTestProcess();
+
+ // Set the vendor/device ID, etc, to match the test file.
+ switch (Services.appinfo.OS) {
+ case "WINNT":
+ gfxInfo.spoofVendorID("0xabab");
+ gfxInfo.spoofDeviceID("0x1234");
+ gfxInfo.spoofDriverVersion("8.52.322.2201");
+ // Windows 7
+ gfxInfo.spoofOSVersion(0x60001);
+ break;
+ case "Linux":
+ // We don't support driver versions on Linux.
+ do_test_finished();
+ return;
+ case "Darwin":
+ // We don't support driver versions on Darwin.
+ do_test_finished();
+ return;
+ case "Android":
+ gfxInfo.spoofVendorID("abab");
+ gfxInfo.spoofDeviceID("ghjk");
+ gfxInfo.spoofDriverVersion("6");
+ break;
+ }
+
+ do_test_pending();
+
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "3", "8");
+ await promiseStartupManager();
+
+ function checkBlacklist() {
+ var status = gfxInfo.getFeatureStatus(Ci.nsIGfxInfo.FEATURE_DIRECT2D);
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_STATUS_OK);
+
+ // Make sure unrelated features aren't affected
+ status = gfxInfo.getFeatureStatus(Ci.nsIGfxInfo.FEATURE_DIRECT3D_9_LAYERS);
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_STATUS_OK);
+
+ do_test_finished();
+ }
+
+ Services.obs.addObserver(function(aSubject, aTopic, aData) {
+ // If we wait until after we go through the event loop, gfxInfo is sure to
+ // have processed the gfxItems event.
+ executeSoon(checkBlacklist);
+ }, "blocklist-data-gfxItems");
+
+ mockGfxBlocklistItemsFromDisk("../data/test_gfxBlacklist.json");
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_GTE_OK.js b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_GTE_OK.js
new file mode 100644
index 0000000000..9cd7a961ed
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_GTE_OK.js
@@ -0,0 +1,69 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// Test whether a machine which exactly matches the greater-than-or-equal
+// blacklist entry is successfully blocked.
+// Uses test_gfxBlacklist.json
+
+// Performs the initial setup
+async function run_test() {
+ var gfxInfo = Cc["@mozilla.org/gfx/info;1"].getService(Ci.nsIGfxInfo);
+
+ // We can't do anything if we can't spoof the stuff we need.
+ if (!(gfxInfo instanceof Ci.nsIGfxInfoDebug)) {
+ do_test_finished();
+ return;
+ }
+
+ gfxInfo.QueryInterface(Ci.nsIGfxInfoDebug);
+ gfxInfo.fireTestProcess();
+
+ // Set the vendor/device ID, etc, to match the test file.
+ switch (Services.appinfo.OS) {
+ case "WINNT":
+ gfxInfo.spoofVendorID("0xabab");
+ gfxInfo.spoofDeviceID("0x1234");
+ gfxInfo.spoofDriverVersion("8.52.322.2202");
+ // Windows 7
+ gfxInfo.spoofOSVersion(0x60001);
+ break;
+ case "Linux":
+ // We don't support driver versions on Linux.
+ do_test_finished();
+ return;
+ case "Darwin":
+ // We don't support driver versions on Darwin.
+ do_test_finished();
+ return;
+ case "Android":
+ gfxInfo.spoofVendorID("abab");
+ gfxInfo.spoofDeviceID("ghjk");
+ gfxInfo.spoofDriverVersion("7");
+ break;
+ }
+
+ do_test_pending();
+
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "3", "8");
+ await promiseStartupManager();
+
+ function checkBlacklist() {
+ var status = gfxInfo.getFeatureStatus(Ci.nsIGfxInfo.FEATURE_DIRECT2D);
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_BLOCKED_DRIVER_VERSION);
+
+ // Make sure unrelated features aren't affected
+ status = gfxInfo.getFeatureStatus(Ci.nsIGfxInfo.FEATURE_DIRECT3D_9_LAYERS);
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_STATUS_OK);
+
+ do_test_finished();
+ }
+
+ Services.obs.addObserver(function(aSubject, aTopic, aData) {
+ // If we wait until after we go through the event loop, gfxInfo is sure to
+ // have processed the gfxItems event.
+ executeSoon(checkBlacklist);
+ }, "blocklist-data-gfxItems");
+
+ mockGfxBlocklistItemsFromDisk("../data/test_gfxBlacklist.json");
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_No_Comparison.js b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_No_Comparison.js
new file mode 100644
index 0000000000..84e79f66d5
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_No_Comparison.js
@@ -0,0 +1,70 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// Test whether a machine which exactly matches the blacklist entry is
+// successfully blocked.
+// Uses test_gfxBlacklist.json
+
+// Performs the initial setup
+async function run_test() {
+ var gfxInfo = Cc["@mozilla.org/gfx/info;1"].getService(Ci.nsIGfxInfo);
+
+ // We can't do anything if we can't spoof the stuff we need.
+ if (!(gfxInfo instanceof Ci.nsIGfxInfoDebug)) {
+ do_test_finished();
+ return;
+ }
+
+ gfxInfo.QueryInterface(Ci.nsIGfxInfoDebug);
+ gfxInfo.fireTestProcess();
+
+ gfxInfo.spoofVendorID("0xabcd");
+ gfxInfo.spoofDeviceID("0x6666");
+
+ // Spoof the OS version so it matches the test file.
+ switch (Services.appinfo.OS) {
+ case "WINNT":
+ // Windows 7
+ gfxInfo.spoofOSVersion(0x60001);
+ break;
+ case "Linux":
+ break;
+ case "Darwin":
+ gfxInfo.spoofOSVersion(0xa0900);
+ break;
+ case "Android":
+ break;
+ }
+
+ do_test_pending();
+
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "3", "8");
+ await promiseStartupManager();
+
+ function checkBlacklist() {
+ var driverVersion = gfxInfo.adapterDriverVersion;
+ if (driverVersion) {
+ var status = gfxInfo.getFeatureStatus(Ci.nsIGfxInfo.FEATURE_DIRECT2D);
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_BLOCKED_DEVICE);
+
+ status = gfxInfo.getFeatureStatus(Ci.nsIGfxInfo.FEATURE_WEBRENDER);
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_BLOCKED_DEVICE);
+
+ // Make sure unrelated features aren't affected
+ status = gfxInfo.getFeatureStatus(
+ Ci.nsIGfxInfo.FEATURE_DIRECT3D_9_LAYERS
+ );
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_STATUS_OK);
+ }
+ do_test_finished();
+ }
+
+ Services.obs.addObserver(function(aSubject, aTopic, aData) {
+ // If we wait until after we go through the event loop, gfxInfo is sure to
+ // have processed the gfxItems event.
+ executeSoon(checkBlacklist);
+ }, "blocklist-data-gfxItems");
+
+ mockGfxBlocklistItemsFromDisk("../data/test_gfxBlacklist.json");
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_OK.js b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_OK.js
new file mode 100644
index 0000000000..32cc25ca83
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_OK.js
@@ -0,0 +1,70 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// Test whether a machine which exactly matches the blacklist entry is
+// successfully blocked.
+// Uses test_gfxBlacklist.json
+
+// Performs the initial setup
+async function run_test() {
+ var gfxInfo = Cc["@mozilla.org/gfx/info;1"].getService(Ci.nsIGfxInfo);
+
+ // We can't do anything if we can't spoof the stuff we need.
+ if (!(gfxInfo instanceof Ci.nsIGfxInfoDebug)) {
+ do_test_finished();
+ return;
+ }
+
+ gfxInfo.QueryInterface(Ci.nsIGfxInfoDebug);
+ gfxInfo.fireTestProcess();
+
+ // Set the vendor/device ID, etc, to match the test file.
+ switch (Services.appinfo.OS) {
+ case "WINNT":
+ gfxInfo.spoofVendorID("0xabcd");
+ gfxInfo.spoofDeviceID("0x1234");
+ gfxInfo.spoofDriverVersion("8.52.322.2201");
+ // Windows 7
+ gfxInfo.spoofOSVersion(0x60001);
+ break;
+ case "Linux":
+ gfxInfo.spoofVendorID("0xabcd");
+ gfxInfo.spoofDeviceID("0x1234");
+ break;
+ case "Darwin":
+ gfxInfo.spoofVendorID("0xabcd");
+ gfxInfo.spoofDeviceID("0x1234");
+ gfxInfo.spoofOSVersion(0xa0900);
+ break;
+ case "Android":
+ gfxInfo.spoofVendorID("abcd");
+ gfxInfo.spoofDeviceID("asdf");
+ gfxInfo.spoofDriverVersion("5");
+ break;
+ }
+
+ do_test_pending();
+
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "3", "8");
+ await promiseStartupManager();
+
+ function checkBlacklist() {
+ var status = gfxInfo.getFeatureStatus(Ci.nsIGfxInfo.FEATURE_DIRECT2D);
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_BLOCKED_DRIVER_VERSION);
+
+ // Make sure unrelated features aren't affected
+ status = gfxInfo.getFeatureStatus(Ci.nsIGfxInfo.FEATURE_DIRECT3D_9_LAYERS);
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_STATUS_OK);
+
+ do_test_finished();
+ }
+
+ Services.obs.addObserver(function(aSubject, aTopic, aData) {
+ // If we wait until after we go through the event loop, gfxInfo is sure to
+ // have processed the gfxItems event.
+ executeSoon(checkBlacklist);
+ }, "blocklist-data-gfxItems");
+
+ mockGfxBlocklistItemsFromDisk("../data/test_gfxBlacklist.json");
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_OS.js b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_OS.js
new file mode 100644
index 0000000000..0e82025eea
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_OS.js
@@ -0,0 +1,68 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// Test whether a machine which differs only on OS version, but otherwise
+// exactly matches the blacklist entry, is not blocked.
+// Uses test_gfxBlacklist.json
+
+// Performs the initial setup
+async function run_test() {
+ var gfxInfo = Cc["@mozilla.org/gfx/info;1"].getService(Ci.nsIGfxInfo);
+
+ // We can't do anything if we can't spoof the stuff we need.
+ if (!(gfxInfo instanceof Ci.nsIGfxInfoDebug)) {
+ do_test_finished();
+ return;
+ }
+
+ gfxInfo.QueryInterface(Ci.nsIGfxInfoDebug);
+
+ // Set the vendor/device ID, etc, to match the test file.
+ switch (Services.appinfo.OS) {
+ case "WINNT":
+ gfxInfo.spoofVendorID("0xabcd");
+ gfxInfo.spoofDeviceID("0x1234");
+ gfxInfo.spoofDriverVersion("8.52.322.2201");
+ // Windows Vista
+ gfxInfo.spoofOSVersion(0x60000);
+ break;
+ case "Linux":
+ // We don't have any OS versions on Linux, just "Linux".
+ do_test_finished();
+ return;
+ case "Darwin":
+ gfxInfo.spoofVendorID("0xabcd");
+ gfxInfo.spoofDeviceID("0x1234");
+ gfxInfo.spoofOSVersion(0xa0800);
+ break;
+ case "Android":
+ // On Android, the driver version is used as the OS version (because
+ // there's so many of them).
+ do_test_finished();
+ return;
+ }
+
+ do_test_pending();
+
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "3", "8");
+ await promiseStartupManager();
+
+ function checkBlacklist() {
+ var status = gfxInfo.getFeatureStatus(Ci.nsIGfxInfo.FEATURE_DIRECT2D);
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_STATUS_OK);
+
+ status = gfxInfo.getFeatureStatus(Ci.nsIGfxInfo.FEATURE_DIRECT3D_9_LAYERS);
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_STATUS_OK);
+
+ do_test_finished();
+ }
+
+ Services.obs.addObserver(function(aSubject, aTopic, aData) {
+ // If we wait until after we go through the event loop, gfxInfo is sure to
+ // have processed the gfxItems event.
+ executeSoon(checkBlacklist);
+ }, "blocklist-data-gfxItems");
+
+ mockGfxBlocklistItemsFromDisk("../data/test_gfxBlacklist.json");
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_OSVersion_match.js b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_OSVersion_match.js
new file mode 100644
index 0000000000..e5932a3a39
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_OSVersion_match.js
@@ -0,0 +1,71 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// Test whether new OS versions are matched properly.
+// Uses test_gfxBlacklist_OSVersion.json
+
+// Performs the initial setup
+async function run_test() {
+ var gfxInfo = Cc["@mozilla.org/gfx/info;1"].getService(Ci.nsIGfxInfo);
+
+ // We can't do anything if we can't spoof the stuff we need.
+ if (!(gfxInfo instanceof Ci.nsIGfxInfoDebug)) {
+ do_test_finished();
+ return;
+ }
+
+ gfxInfo.QueryInterface(Ci.nsIGfxInfoDebug);
+ gfxInfo.fireTestProcess();
+
+ // Set the vendor/device ID, etc, to match the test file.
+ gfxInfo.spoofDriverVersion("8.52.322.2201");
+ gfxInfo.spoofVendorID("0xabcd");
+ gfxInfo.spoofDeviceID("0x1234");
+
+ // Spoof the version of the OS appropriately to test the test file.
+ switch (Services.appinfo.OS) {
+ case "WINNT":
+ // Windows 8
+ gfxInfo.spoofOSVersion(0x60002);
+ break;
+ case "Linux":
+ // We don't have any OS versions on Linux, just "Linux".
+ do_test_finished();
+ return;
+ case "Darwin":
+ // Mountain Lion
+ gfxInfo.spoofOSVersion(0xa0900);
+ break;
+ case "Android":
+ // On Android, the driver version is used as the OS version (because
+ // there's so many of them).
+ do_test_finished();
+ return;
+ }
+
+ do_test_pending();
+
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "3", "8");
+ await promiseStartupManager();
+
+ function checkBlacklist() {
+ if (Services.appinfo.OS == "WINNT") {
+ var status = gfxInfo.getFeatureStatus(Ci.nsIGfxInfo.FEATURE_DIRECT2D);
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_BLOCKED_DRIVER_VERSION);
+ } else if (Services.appinfo.OS == "Darwin") {
+ status = gfxInfo.getFeatureStatus(Ci.nsIGfxInfo.FEATURE_OPENGL_LAYERS);
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_BLOCKED_DRIVER_VERSION);
+ }
+
+ do_test_finished();
+ }
+
+ Services.obs.addObserver(function(aSubject, aTopic, aData) {
+ // If we wait until after we go through the event loop, gfxInfo is sure to
+ // have processed the gfxItems event.
+ executeSoon(checkBlacklist);
+ }, "blocklist-data-gfxItems");
+
+ mockGfxBlocklistItemsFromDisk("../data/test_gfxBlacklist_OSVersion.json");
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_OSVersion_mismatch_DriverVersion.js b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_OSVersion_mismatch_DriverVersion.js
new file mode 100644
index 0000000000..404fb1264c
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_OSVersion_mismatch_DriverVersion.js
@@ -0,0 +1,71 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// Test whether blocklists specifying new OSes correctly don't block if driver
+// versions are appropriately up-to-date.
+// Uses test_gfxBlacklist_OSVersion.json
+
+// Performs the initial setup
+async function run_test() {
+ var gfxInfo = Cc["@mozilla.org/gfx/info;1"].getService(Ci.nsIGfxInfo);
+
+ // We can't do anything if we can't spoof the stuff we need.
+ if (!(gfxInfo instanceof Ci.nsIGfxInfoDebug)) {
+ do_test_finished();
+ return;
+ }
+
+ gfxInfo.QueryInterface(Ci.nsIGfxInfoDebug);
+ gfxInfo.fireTestProcess();
+
+ // Set the vendor/device ID, etc, to match the test file.
+ gfxInfo.spoofDriverVersion("8.52.322.2202");
+ gfxInfo.spoofVendorID("0xabcd");
+ gfxInfo.spoofDeviceID("0x1234");
+
+ // Spoof the version of the OS appropriately to test the test file.
+ switch (Services.appinfo.OS) {
+ case "WINNT":
+ // Windows 8
+ gfxInfo.spoofOSVersion(0x60002);
+ break;
+ case "Linux":
+ // We don't have any OS versions on Linux, just "Linux".
+ do_test_finished();
+ return;
+ case "Darwin":
+ gfxInfo.spoofOSVersion(0xa0800);
+ break;
+ case "Android":
+ // On Android, the driver version is used as the OS version (because
+ // there's so many of them).
+ do_test_finished();
+ return;
+ }
+
+ do_test_pending();
+
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "3", "8");
+ await promiseStartupManager();
+
+ function checkBlacklist() {
+ if (Services.appinfo.OS == "WINNT") {
+ var status = gfxInfo.getFeatureStatus(Ci.nsIGfxInfo.FEATURE_DIRECT2D);
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_STATUS_OK);
+ } else if (Services.appinfo.OS == "Darwin") {
+ status = gfxInfo.getFeatureStatus(Ci.nsIGfxInfo.FEATURE_OPENGL_LAYERS);
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_STATUS_OK);
+ }
+
+ do_test_finished();
+ }
+
+ Services.obs.addObserver(function(aSubject, aTopic, aData) {
+ // If we wait until after we go through the event loop, gfxInfo is sure to
+ // have processed the gfxItems event.
+ executeSoon(checkBlacklist);
+ }, "blocklist-data-gfxItems");
+
+ mockGfxBlocklistItemsFromDisk("../data/test_gfxBlacklist_OSVersion.json");
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_OSVersion_mismatch_OSVersion.js b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_OSVersion_mismatch_OSVersion.js
new file mode 100644
index 0000000000..93a49cd5b9
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_OSVersion_mismatch_OSVersion.js
@@ -0,0 +1,72 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// Test whether old OS versions are not matched when the blacklist contains
+// only new OS versions.
+// Uses test_gfxBlacklist_OSVersion.json
+
+// Performs the initial setup
+async function run_test() {
+ var gfxInfo = Cc["@mozilla.org/gfx/info;1"].getService(Ci.nsIGfxInfo);
+
+ // We can't do anything if we can't spoof the stuff we need.
+ if (!(gfxInfo instanceof Ci.nsIGfxInfoDebug)) {
+ do_test_finished();
+ return;
+ }
+
+ gfxInfo.QueryInterface(Ci.nsIGfxInfoDebug);
+ gfxInfo.fireTestProcess();
+
+ // Set the vendor/device ID, etc, to match the test file.
+ gfxInfo.spoofDriverVersion("8.52.322.2201");
+ gfxInfo.spoofVendorID("0xabcd");
+ gfxInfo.spoofDeviceID("0x1234");
+
+ // Spoof the version of the OS appropriately to test the test file.
+ switch (Services.appinfo.OS) {
+ case "WINNT":
+ // Windows 7
+ gfxInfo.spoofOSVersion(0x60001);
+ break;
+ case "Linux":
+ // We don't have any OS versions on Linux, just "Linux".
+ do_test_finished();
+ return;
+ case "Darwin":
+ // Lion
+ gfxInfo.spoofOSVersion(0xa0800);
+ break;
+ case "Android":
+ // On Android, the driver version is used as the OS version (because
+ // there's so many of them).
+ do_test_finished();
+ return;
+ }
+
+ do_test_pending();
+
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "3", "8");
+ await promiseStartupManager();
+
+ function checkBlacklist() {
+ if (Services.appinfo.OS == "WINNT") {
+ var status = gfxInfo.getFeatureStatus(Ci.nsIGfxInfo.FEATURE_DIRECT2D);
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_STATUS_OK);
+ } else if (Services.appinfo.OS == "Darwin") {
+ status = gfxInfo.getFeatureStatus(Ci.nsIGfxInfo.FEATURE_OPENGL_LAYERS);
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_STATUS_OK);
+ }
+
+ do_test_finished();
+ }
+
+ Services.obs.addObserver(function(aSubject, aTopic, aData) {
+ // If we wait until after we go through the event loop, gfxInfo is sure to
+ // have processed the gfxItems event.
+ executeSoon(checkBlacklist);
+ }, "blocklist-data-gfxItems");
+
+ mockGfxBlocklistItemsFromDisk("../data/test_gfxBlacklist_OSVersion.json");
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_Vendor.js b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_Vendor.js
new file mode 100644
index 0000000000..134500865b
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_Vendor.js
@@ -0,0 +1,69 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// Test whether a machine which differs only on vendor, but otherwise
+// exactly matches the blacklist entry, is not blocked.
+// Uses test_gfxBlacklist.json
+
+// Performs the initial setup
+async function run_test() {
+ var gfxInfo = Cc["@mozilla.org/gfx/info;1"].getService(Ci.nsIGfxInfo);
+
+ // We can't do anything if we can't spoof the stuff we need.
+ if (!(gfxInfo instanceof Ci.nsIGfxInfoDebug)) {
+ do_test_finished();
+ return;
+ }
+
+ gfxInfo.QueryInterface(Ci.nsIGfxInfoDebug);
+ gfxInfo.fireTestProcess();
+
+ // Set the vendor/device ID, etc, to match the test file.
+ switch (Services.appinfo.OS) {
+ case "WINNT":
+ gfxInfo.spoofVendorID("0xdcba");
+ gfxInfo.spoofDeviceID("0x1234");
+ gfxInfo.spoofDriverVersion("8.52.322.2201");
+ // Windows 7
+ gfxInfo.spoofOSVersion(0x60001);
+ break;
+ case "Linux":
+ gfxInfo.spoofVendorID("0xdcba");
+ gfxInfo.spoofDeviceID("0x1234");
+ break;
+ case "Darwin":
+ gfxInfo.spoofVendorID("0xdcba");
+ gfxInfo.spoofDeviceID("0x1234");
+ gfxInfo.spoofOSVersion(0xa0900);
+ break;
+ case "Android":
+ gfxInfo.spoofVendorID("dcba");
+ gfxInfo.spoofDeviceID("asdf");
+ gfxInfo.spoofDriverVersion("5");
+ break;
+ }
+
+ do_test_pending();
+
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "3", "8");
+ await promiseStartupManager();
+
+ function checkBlacklist() {
+ var status = gfxInfo.getFeatureStatus(Ci.nsIGfxInfo.FEATURE_DIRECT2D);
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_STATUS_OK);
+
+ status = gfxInfo.getFeatureStatus(Ci.nsIGfxInfo.FEATURE_DIRECT3D_9_LAYERS);
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_STATUS_OK);
+
+ do_test_finished();
+ }
+
+ Services.obs.addObserver(function(aSubject, aTopic, aData) {
+ // If we wait until after we go through the event loop, gfxInfo is sure to
+ // have processed the gfxItems event.
+ executeSoon(checkBlacklist);
+ }, "blocklist-data-gfxItems");
+
+ mockGfxBlocklistItemsFromDisk("../data/test_gfxBlacklist.json");
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_Version.js b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_Version.js
new file mode 100644
index 0000000000..2a3783e817
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_Version.js
@@ -0,0 +1,165 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// Test whether a machine which exactly matches the blocklist entry is
+// successfully blocked.
+// Uses test_gfxBlacklist_AllOS.json
+
+// Performs the initial setup
+async function run_test() {
+ var gfxInfo = Cc["@mozilla.org/gfx/info;1"].getService(Ci.nsIGfxInfo);
+
+ // We can't do anything if we can't spoof the stuff we need.
+ if (!(gfxInfo instanceof Ci.nsIGfxInfoDebug)) {
+ do_test_finished();
+ return;
+ }
+
+ gfxInfo.QueryInterface(Ci.nsIGfxInfoDebug);
+ gfxInfo.fireTestProcess();
+
+ // Set the vendor/device ID, etc, to match the test file.
+ switch (Services.appinfo.OS) {
+ case "WINNT":
+ gfxInfo.spoofVendorID("0xabcd");
+ gfxInfo.spoofDeviceID("0x1234");
+ gfxInfo.spoofDriverVersion("8.52.322.2201");
+ // Windows 7
+ gfxInfo.spoofOSVersion(0x60001);
+ break;
+ case "Linux":
+ gfxInfo.spoofVendorID("0xabcd");
+ gfxInfo.spoofDeviceID("0x1234");
+ break;
+ case "Darwin":
+ gfxInfo.spoofVendorID("0xabcd");
+ gfxInfo.spoofDeviceID("0x1234");
+ gfxInfo.spoofOSVersion(0xa0900);
+ break;
+ case "Android":
+ gfxInfo.spoofVendorID("abcd");
+ gfxInfo.spoofDeviceID("asdf");
+ gfxInfo.spoofDriverVersion("5");
+ break;
+ }
+
+ do_test_pending();
+
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "15.0", "8");
+ await promiseStartupManager();
+
+ function checkBlocklist() {
+ var failureId = {};
+ var status;
+
+ status = gfxInfo.getFeatureStatus(
+ Ci.nsIGfxInfo.FEATURE_DIRECT2D,
+ failureId
+ );
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_BLOCKED_DRIVER_VERSION);
+ Assert.equal(failureId.value, "FEATURE_FAILURE_DL_BLOCKLIST_g1");
+
+ status = gfxInfo.getFeatureStatus(
+ Ci.nsIGfxInfo.FEATURE_DIRECT3D_9_LAYERS,
+ failureId
+ );
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_BLOCKED_DRIVER_VERSION);
+ Assert.equal(failureId.value, "FEATURE_FAILURE_DL_BLOCKLIST_g2");
+
+ status = gfxInfo.getFeatureStatus(
+ Ci.nsIGfxInfo.FEATURE_DIRECT3D_10_LAYERS,
+ failureId
+ );
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_STATUS_OK);
+ Assert.equal(failureId.value, "");
+
+ status = gfxInfo.getFeatureStatus(
+ Ci.nsIGfxInfo.FEATURE_DIRECT3D_10_1_LAYERS,
+ failureId
+ );
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_STATUS_OK);
+ Assert.equal(failureId.value, "");
+
+ // These four pass on Linux independent of the blocklist XML file as the
+ // try machines don't have support.
+ status = gfxInfo.getFeatureStatus(Ci.nsIGfxInfo.FEATURE_OPENGL_LAYERS);
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_BLOCKED_DRIVER_VERSION);
+
+ status = gfxInfo.getFeatureStatus(
+ Ci.nsIGfxInfo.FEATURE_WEBGL_OPENGL,
+ failureId
+ );
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_BLOCKED_DRIVER_VERSION);
+ Assert.equal(failureId.value, "FEATURE_FAILURE_DL_BLOCKLIST_g11");
+
+ status = gfxInfo.getFeatureStatus(
+ Ci.nsIGfxInfo.FEATURE_WEBGL_ANGLE,
+ failureId
+ );
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_BLOCKED_DRIVER_VERSION);
+ Assert.equal(failureId.value, "FEATURE_FAILURE_DL_BLOCKLIST_NO_ID");
+
+ status = gfxInfo.getFeatureStatus(Ci.nsIGfxInfo.FEATURE_WEBGL2, failureId);
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_BLOCKED_DRIVER_VERSION);
+ Assert.equal(failureId.value, "FEATURE_FAILURE_DL_BLOCKLIST_NO_ID");
+
+ status = gfxInfo.getFeatureStatus(
+ Ci.nsIGfxInfo.FEATURE_STAGEFRIGHT,
+ failureId
+ );
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_STATUS_OK);
+
+ status = gfxInfo.getFeatureStatus(
+ Ci.nsIGfxInfo.FEATURE_WEBRTC_HW_ACCELERATION_H264,
+ failureId
+ );
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_STATUS_OK);
+
+ status = gfxInfo.getFeatureStatus(
+ Ci.nsIGfxInfo.FEATURE_WEBRTC_HW_ACCELERATION_ENCODE,
+ failureId
+ );
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_STATUS_OK);
+
+ status = gfxInfo.getFeatureStatus(
+ Ci.nsIGfxInfo.FEATURE_WEBRTC_HW_ACCELERATION_DECODE,
+ failureId
+ );
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_STATUS_OK);
+
+ status = gfxInfo.getFeatureStatus(
+ Ci.nsIGfxInfo.FEATURE_DIRECT3D_11_LAYERS,
+ failureId
+ );
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_STATUS_OK);
+
+ status = gfxInfo.getFeatureStatus(
+ Ci.nsIGfxInfo.FEATURE_HARDWARE_VIDEO_DECODING,
+ failureId
+ );
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_STATUS_OK);
+
+ status = gfxInfo.getFeatureStatus(
+ Ci.nsIGfxInfo.FEATURE_DIRECT3D_11_ANGLE,
+ failureId
+ );
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_STATUS_OK);
+
+ status = gfxInfo.getFeatureStatus(
+ Ci.nsIGfxInfo.FEATURE_DX_INTEROP2,
+ failureId
+ );
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_STATUS_OK);
+
+ do_test_finished();
+ }
+
+ Services.obs.addObserver(function(aSubject, aTopic, aData) {
+ // If we wait until after we go through the event loop, gfxInfo is sure to
+ // have processed the gfxItems event.
+ executeSoon(checkBlocklist);
+ }, "blocklist-data-gfxItems");
+
+ mockGfxBlocklistItemsFromDisk("../data/test_gfxBlacklist_AllOS.json");
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_prefs.js b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_prefs.js
new file mode 100644
index 0000000000..e0400a1afb
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_gfxBlacklist_prefs.js
@@ -0,0 +1,125 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// Test whether the blacklist successfully adds and removes the prefs that store
+// its decisions when the remote blacklist is changed.
+// Uses test_gfxBlacklist.json and test_gfxBlacklist2.json
+
+// Performs the initial setup
+async function run_test() {
+ try {
+ var gfxInfo = Cc["@mozilla.org/gfx/info;1"].getService(Ci.nsIGfxInfo);
+ } catch (e) {
+ do_test_finished();
+ return;
+ }
+
+ // We can't do anything if we can't spoof the stuff we need.
+ if (!(gfxInfo instanceof Ci.nsIGfxInfoDebug)) {
+ do_test_finished();
+ return;
+ }
+
+ gfxInfo.QueryInterface(Ci.nsIGfxInfoDebug);
+ gfxInfo.fireTestProcess();
+
+ // Set the vendor/device ID, etc, to match the test file.
+ switch (Services.appinfo.OS) {
+ case "WINNT":
+ gfxInfo.spoofVendorID("0xabcd");
+ gfxInfo.spoofDeviceID("0x1234");
+ gfxInfo.spoofDriverVersion("8.52.322.2201");
+ // Windows 7
+ gfxInfo.spoofOSVersion(0x60001);
+ break;
+ case "Linux":
+ gfxInfo.spoofVendorID("0xabcd");
+ gfxInfo.spoofDeviceID("0x1234");
+ break;
+ case "Darwin":
+ gfxInfo.spoofVendorID("0xabcd");
+ gfxInfo.spoofDeviceID("0x1234");
+ gfxInfo.spoofOSVersion(0xa0900);
+ break;
+ case "Android":
+ gfxInfo.spoofVendorID("abcd");
+ gfxInfo.spoofDeviceID("asdf");
+ gfxInfo.spoofDriverVersion("5");
+ break;
+ }
+
+ do_test_pending();
+
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "3", "8");
+ await promiseStartupManager();
+
+ function blacklistAdded(aSubject, aTopic, aData) {
+ // If we wait until after we go through the event loop, gfxInfo is sure to
+ // have processed the gfxItems event.
+ executeSoon(ensureBlacklistSet);
+ }
+ function ensureBlacklistSet() {
+ var status = gfxInfo.getFeatureStatus(Ci.nsIGfxInfo.FEATURE_DIRECT2D);
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_BLOCKED_DRIVER_VERSION);
+
+ // Make sure unrelated features aren't affected
+ status = gfxInfo.getFeatureStatus(Ci.nsIGfxInfo.FEATURE_DIRECT3D_9_LAYERS);
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_STATUS_OK);
+
+ Assert.equal(
+ Services.prefs.getIntPref("gfx.blacklist.direct2d"),
+ Ci.nsIGfxInfo.FEATURE_BLOCKED_DRIVER_VERSION
+ );
+
+ Services.obs.removeObserver(blacklistAdded, "blocklist-data-gfxItems");
+ Services.obs.addObserver(blacklistRemoved, "blocklist-data-gfxItems");
+ mockGfxBlocklistItems([
+ {
+ os: "WINNT 6.1",
+ vendor: "0xabcd",
+ devices: ["0x2783", "0x2782"],
+ feature: " DIRECT2D ",
+ featureStatus: " BLOCKED_DRIVER_VERSION ",
+ driverVersion: " 8.52.322.2202 ",
+ driverVersionComparator: " LESS_THAN ",
+ },
+ {
+ os: "WINNT 6.0",
+ vendor: "0xdcba",
+ devices: ["0x2783", "0x1234", "0x2782"],
+ feature: " DIRECT3D_9_LAYERS ",
+ featureStatus: " BLOCKED_DRIVER_VERSION ",
+ driverVersion: " 8.52.322.2202 ",
+ driverVersionComparator: " LESS_THAN ",
+ },
+ ]);
+ }
+
+ function blacklistRemoved(aSubject, aTopic, aData) {
+ // If we wait until after we go through the event loop, gfxInfo is sure to
+ // have processed the gfxItems event.
+ executeSoon(ensureBlacklistUnset);
+ }
+ function ensureBlacklistUnset() {
+ var status = gfxInfo.getFeatureStatus(Ci.nsIGfxInfo.FEATURE_DIRECT2D);
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_STATUS_OK);
+
+ // Make sure unrelated features aren't affected
+ status = gfxInfo.getFeatureStatus(Ci.nsIGfxInfo.FEATURE_DIRECT3D_9_LAYERS);
+ Assert.equal(status, Ci.nsIGfxInfo.FEATURE_STATUS_OK);
+
+ var exists = false;
+ try {
+ Services.prefs.getIntPref("gfx.blacklist.direct2d");
+ exists = true;
+ } catch (e) {}
+
+ Assert.ok(!exists);
+
+ do_test_finished();
+ }
+
+ Services.obs.addObserver(blacklistAdded, "blocklist-data-gfxItems");
+ mockGfxBlocklistItemsFromDisk("../data/test_gfxBlacklist.json");
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_softblocked.js b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_softblocked.js
new file mode 100644
index 0000000000..bcd27e2f80
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/test_softblocked.js
@@ -0,0 +1,61 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// useMLBF=true only supports hard blocks, not soft blocks.
+Services.prefs.setBoolPref("extensions.blocklist.useMLBF", false);
+
+// Tests that an appDisabled add-on that becomes softBlocked remains disabled
+// when becoming appEnabled
+add_task(async function test_softblock() {
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1");
+ await promiseStartupManager();
+
+ await promiseInstallWebExtension({
+ manifest: {
+ name: "Softblocked add-on",
+ version: "1.0",
+ applications: {
+ gecko: {
+ id: "softblock1@tests.mozilla.org",
+ strict_min_version: "2",
+ strict_max_version: "3",
+ },
+ },
+ },
+ });
+ let s1 = await promiseAddonByID("softblock1@tests.mozilla.org");
+
+ // Make sure to mark it as previously enabled.
+ await s1.enable();
+
+ Assert.ok(!s1.softDisabled);
+ Assert.ok(s1.appDisabled);
+ Assert.ok(!s1.isActive);
+
+ await AddonTestUtils.loadBlocklistRawData({
+ extensions: [
+ {
+ guid: "softblock1@tests.mozilla.org",
+ versionRange: [
+ {
+ severity: "1",
+ },
+ ],
+ },
+ ],
+ });
+
+ Assert.ok(s1.softDisabled);
+ Assert.ok(s1.appDisabled);
+ Assert.ok(!s1.isActive);
+
+ AddonTestUtils.appInfo.platformVersion = "2";
+ await promiseRestartManager("2");
+
+ s1 = await promiseAddonByID("softblock1@tests.mozilla.org");
+
+ Assert.ok(s1.softDisabled);
+ Assert.ok(!s1.appDisabled);
+ Assert.ok(!s1.isActive);
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/xpcshell.ini b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/xpcshell.ini
new file mode 100644
index 0000000000..592998f257
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/rs-blocklist/xpcshell.ini
@@ -0,0 +1,66 @@
+[DEFAULT]
+skip-if = toolkit == 'android'
+tags = addons blocklist
+head = head.js ../head_addons.js
+firefox-appdir = browser
+support-files =
+ ../data/**
+
+[test_blocklist_addonBlockURL.js]
+[test_blocklist_appversion.js]
+# Bug 676992: test consistently hangs on Android
+skip-if = os == "android"
+[test_blocklist_clients.js]
+tags = remote-settings
+[test_blocklist_gfx.js]
+[test_blocklist_metadata_filters.js]
+# Bug 676992: test consistently hangs on Android
+skip-if = os == "android"
+[test_blocklist_mlbf.js]
+[test_blocklist_mlbf_dump.js]
+skip-if = os == "android" # bug 1639050
+[test_blocklist_mlbf_fetch.js]
+[test_blocklist_mlbf_stashes.js]
+[test_blocklist_mlbf_telemetry.js]
+# Data irrelevant to Thunderbird. Bug 1641400.
+skip-if = appname == "thunderbird"
+[test_blocklist_mlbf_update.js]
+[test_blocklist_osabi.js]
+# Bug 676992: test consistently hangs on Android
+skip-if = os == "android"
+[test_blocklist_prefs.js]
+[test_blocklist_regexp_split.js]
+[test_blocklist_severities.js]
+# Bug 676992: test consistently hangs on Android
+skip-if = os == "android"
+[test_blocklist_targetapp_filter.js]
+tags = remote-settings
+[test_blocklist_telemetry.js]
+tags = remote-settings
+# Data irrelevant to Thunderbird. Bug 1641400.
+skip-if = appname == "thunderbird"
+[test_blocklistchange.js]
+# Times out during parallel runs on desktop
+requesttimeoutfactor = 2
+[test_blocklistchange_v2.js]
+# Times out during parallel runs on desktop
+requesttimeoutfactor = 2
+[test_gfxBlacklist_Device.js]
+[test_gfxBlacklist_DriverNew.js]
+[test_gfxBlacklist_Equal_DriverNew.js]
+[test_gfxBlacklist_Equal_DriverOld.js]
+[test_gfxBlacklist_Equal_OK.js]
+[test_gfxBlacklist_GTE_DriverOld.js]
+[test_gfxBlacklist_GTE_OK.js]
+[test_gfxBlacklist_No_Comparison.js]
+[test_gfxBlacklist_OK.js]
+[test_gfxBlacklist_OS.js]
+[test_gfxBlacklist_OSVersion_match.js]
+[test_gfxBlacklist_OSVersion_mismatch_DriverVersion.js]
+[test_gfxBlacklist_OSVersion_mismatch_OSVersion.js]
+[test_gfxBlacklist_Vendor.js]
+[test_gfxBlacklist_Version.js]
+[test_gfxBlacklist_prefs.js]
+# Bug 1248787 - consistently fails
+skip-if = true
+[test_softblocked.js]
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_AbuseReporter.js b/toolkit/mozapps/extensions/test/xpcshell/test_AbuseReporter.js
new file mode 100644
index 0000000000..b1a9bf0a5a
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_AbuseReporter.js
@@ -0,0 +1,903 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+const { AbuseReporter, AbuseReportError } = ChromeUtils.import(
+ "resource://gre/modules/AbuseReporter.jsm"
+);
+
+const { ClientID } = ChromeUtils.import("resource://gre/modules/ClientID.jsm");
+const { TelemetryController } = ChromeUtils.import(
+ "resource://gre/modules/TelemetryController.jsm"
+);
+const { TelemetryTestUtils } = ChromeUtils.import(
+ "resource://testing-common/TelemetryTestUtils.jsm"
+);
+const { L10nRegistry, FileSource } = ChromeUtils.import(
+ "resource://gre/modules/L10nRegistry.jsm"
+);
+
+const APPNAME = "XPCShell";
+const APPVERSION = "1";
+const ADDON_ID = "test-addon@tests.mozilla.org";
+const ADDON_ID2 = "test-addon2@tests.mozilla.org";
+const FAKE_INSTALL_INFO = {
+ source: "fake-Install:Source",
+ method: "fake:install method",
+};
+const PREF_REQUIRED_LOCALE = "intl.locale.requested";
+const REPORT_OPTIONS = { reportEntryPoint: "menu" };
+const TELEMETRY_EVENTS_FILTERS = {
+ category: "addonsManager",
+ method: "report",
+};
+
+const FAKE_AMO_DETAILS = {
+ name: {
+ "en-US": "fake name",
+ "it-IT": "fake it-IT name",
+ },
+ current_version: { version: "1.0" },
+ type: "extension",
+ is_recommended: true,
+};
+
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "49");
+
+const server = createHttpServer({ hosts: ["test.addons.org"] });
+
+// Mock abuse report API endpoint.
+let apiRequestHandler;
+server.registerPathHandler("/api/report/", (request, response) => {
+ const stream = request.bodyInputStream;
+ const buffer = NetUtil.readInputStream(stream, stream.available());
+ const data = new TextDecoder().decode(buffer);
+ apiRequestHandler({ data, request, response });
+});
+
+// Mock addon details API endpoint.
+const amoAddonDetailsMap = new Map();
+server.registerPrefixHandler("/api/addons/addon/", (request, response) => {
+ const addonId = request.path.split("/").pop();
+ if (!amoAddonDetailsMap.has(addonId)) {
+ response.setStatusLine(request.httpVersion, 404, "Not Found");
+ response.write(JSON.stringify({ detail: "Not found." }));
+ } else {
+ response.setStatusLine(request.httpVersion, 200, "Success");
+ response.write(JSON.stringify(amoAddonDetailsMap.get(addonId)));
+ }
+});
+
+function getProperties(obj, propNames) {
+ return propNames.reduce((acc, el) => {
+ acc[el] = obj[el];
+ return acc;
+ }, {});
+}
+
+function handleSubmitRequest({ request, response }) {
+ response.setStatusLine(request.httpVersion, 200, "OK");
+ response.setHeader("Content-Type", "application/json", false);
+ response.write("{}");
+}
+
+function clearAbuseReportState() {
+ // Clear the timestamp of the last submission.
+ AbuseReporter._lastReportTimestamp = null;
+}
+
+async function installTestExtension(overrideOptions = {}) {
+ const extOptions = {
+ manifest: {
+ applications: { gecko: { id: ADDON_ID } },
+ name: "Test Extension",
+ },
+ useAddonManager: "permanent",
+ amInstallTelemetryInfo: FAKE_INSTALL_INFO,
+ ...overrideOptions,
+ };
+
+ const extension = ExtensionTestUtils.loadExtension(extOptions);
+ await extension.startup();
+
+ const addon = await AddonManager.getAddonByID(ADDON_ID);
+
+ return { extension, addon };
+}
+
+async function assertRejectsAbuseReportError(promise, errorType, errorInfo) {
+ let error;
+
+ await Assert.rejects(
+ promise,
+ err => {
+ // Log the actual error to make investigating test failures easier.
+ Cu.reportError(err);
+ error = err;
+ return err instanceof AbuseReportError;
+ },
+ `Got an AbuseReportError`
+ );
+
+ equal(error.errorType, errorType, "Got the expected errorType");
+ equal(error.errorInfo, errorInfo, "Got the expected errorInfo");
+ ok(
+ error.message.includes(errorType),
+ "errorType should be included in the error message"
+ );
+ if (errorInfo) {
+ ok(
+ error.message.includes(errorInfo),
+ "errorInfo should be included in the error message"
+ );
+ }
+}
+
+async function assertBaseReportData({ reportData, addon }) {
+ // Report properties related to addon metadata.
+ equal(reportData.addon, ADDON_ID, "Got expected 'addon'");
+ equal(
+ reportData.addon_version,
+ addon.version,
+ "Got expected 'addon_version'"
+ );
+ equal(
+ reportData.install_date,
+ addon.installDate.toISOString(),
+ "Got expected 'install_date' in ISO format"
+ );
+ equal(
+ reportData.addon_install_origin,
+ addon.sourceURI.spec,
+ "Got expected 'addon_install_origin'"
+ );
+ equal(
+ reportData.addon_install_source,
+ "fake_install_source",
+ "Got expected 'addon_install_source'"
+ );
+ equal(
+ reportData.addon_install_method,
+ "fake_install_method",
+ "Got expected 'addon_install_method'"
+ );
+ equal(
+ reportData.addon_signature,
+ "privileged",
+ "Got expected 'addon_signature'"
+ );
+
+ // Report properties related to the environment.
+ equal(
+ reportData.client_id,
+ await ClientID.getClientIdHash(),
+ "Got the expected 'client_id'"
+ );
+ equal(reportData.app, APPNAME.toLowerCase(), "Got expected 'app'");
+ equal(reportData.appversion, APPVERSION, "Got expected 'appversion'");
+ equal(
+ reportData.lang,
+ Services.locale.appLocaleAsBCP47,
+ "Got expected 'lang'"
+ );
+ equal(
+ reportData.operating_system,
+ AppConstants.platform,
+ "Got expected 'operating_system'"
+ );
+ equal(
+ reportData.operating_system_version,
+ Services.sysinfo.getProperty("version"),
+ "Got expected 'operating_system_version'"
+ );
+}
+
+add_task(async function test_setup() {
+ Services.prefs.setCharPref(
+ "extensions.abuseReport.url",
+ "http://test.addons.org/api/report/"
+ );
+
+ Services.prefs.setCharPref(
+ "extensions.abuseReport.amoDetailsURL",
+ "http://test.addons.org/api/addons/addon"
+ );
+
+ await promiseStartupManager();
+ // Telemetry test setup needed to ensure that the builtin events are defined
+ // and they can be collected and verified.
+ await TelemetryController.testSetup();
+
+ // This is actually only needed on Android, because it does not properly support unified telemetry
+ // and so, if not enabled explicitly here, it would make these tests to fail when running on a
+ // non-Nightly build.
+ const oldCanRecordBase = Services.telemetry.canRecordBase;
+ Services.telemetry.canRecordBase = true;
+ registerCleanupFunction(() => {
+ Services.telemetry.canRecordBase = oldCanRecordBase;
+ });
+
+ // Register a fake it-IT locale (used to test localized AMO details in some
+ // of the test case defined in this test file).
+ L10nRegistry.registerSources([
+ new FileSource(
+ "mock",
+ ["it-IT", "fr-FR"],
+ "resource://fake/locales/{locale}"
+ ),
+ ]);
+});
+
+add_task(async function test_addon_report_data() {
+ info("Verify report property for a privileged extension");
+ const { addon, extension } = await installTestExtension();
+ const data = await AbuseReporter.getReportData(addon);
+ await assertBaseReportData({ reportData: data, addon });
+ await extension.unload();
+
+ info("Verify 'addon_signature' report property for non privileged extension");
+ AddonTestUtils.usePrivilegedSignatures = false;
+ const { addon: addon2, extension: extension2 } = await installTestExtension();
+ const data2 = await AbuseReporter.getReportData(addon2);
+ equal(
+ data2.addon_signature,
+ "signed",
+ "Got expected 'addon_signature' for non privileged extension"
+ );
+ await extension2.unload();
+
+ info("Verify 'addon_install_method' report property on temporary install");
+ const { addon: addon3, extension: extension3 } = await installTestExtension({
+ useAddonManager: "temporary",
+ });
+ const data3 = await AbuseReporter.getReportData(addon3);
+ equal(
+ data3.addon_install_source,
+ "temporary_addon",
+ "Got expected 'addon_install_method' on temporary install"
+ );
+ await extension3.unload();
+});
+
+add_task(async function test_report_on_not_installed_addon() {
+ Services.telemetry.clearEvents();
+
+ // Make sure that the AMO addons details API endpoint is going to
+ // return a 404 status for the not installed addon.
+ amoAddonDetailsMap.delete(ADDON_ID);
+
+ await assertRejectsAbuseReportError(
+ AbuseReporter.createAbuseReport(ADDON_ID, REPORT_OPTIONS),
+ "ERROR_ADDON_NOTFOUND"
+ );
+
+ TelemetryTestUtils.assertEvents(
+ [
+ {
+ object: REPORT_OPTIONS.reportEntryPoint,
+ value: ADDON_ID,
+ extra: { error_type: "ERROR_AMODETAILS_NOTFOUND" },
+ },
+ {
+ object: REPORT_OPTIONS.reportEntryPoint,
+ value: ADDON_ID,
+ extra: { error_type: "ERROR_ADDON_NOTFOUND" },
+ },
+ ],
+ TELEMETRY_EVENTS_FILTERS
+ );
+
+ Services.telemetry.clearEvents();
+});
+
+// This tests verifies how the addon installTelemetryInfo values are being
+// normalized into the addon_install_source and addon_install_method
+// expected by the API endpoint.
+add_task(async function test_normalized_addon_install_source_and_method() {
+ async function assertAddonInstallMethod(amInstallTelemetryInfo, expected) {
+ const { addon, extension } = await installTestExtension({
+ amInstallTelemetryInfo,
+ });
+ const {
+ addon_install_method,
+ addon_install_source,
+ addon_install_source_url,
+ } = await AbuseReporter.getReportData(addon);
+
+ Assert.deepEqual(
+ {
+ addon_install_method,
+ addon_install_source,
+ addon_install_source_url,
+ },
+ {
+ addon_install_method: expected.method,
+ addon_install_source: expected.source,
+ addon_install_source_url: expected.sourceURL,
+ },
+ `Got the expected report data for ${JSON.stringify(
+ amInstallTelemetryInfo
+ )}`
+ );
+ await extension.unload();
+ }
+
+ // Array of testcases: the `test` property contains the installTelemetryInfo value
+ // and the `expect` contains the expected normalized values.
+ const TEST_CASES = [
+ // Explicitly verify normalized values on missing telemetry info.
+ {
+ test: null,
+ expect: { source: null, method: null },
+ },
+
+ // Verify expected normalized values for some common install telemetry info.
+ {
+ test: { source: "about:addons", method: "drag-and-drop" },
+ expect: { source: "about_addons", method: "drag_and_drop" },
+ },
+ {
+ test: { source: "amo", method: "amWebAPI" },
+ expect: { source: "amo", method: "amwebapi" },
+ },
+ {
+ test: { source: "app-profile", method: "sideload" },
+ expect: { source: "app_profile", method: "sideload" },
+ },
+ {
+ test: { source: "distribution" },
+ expect: { source: "distribution", method: null },
+ },
+ {
+ test: {
+ method: "installTrigger",
+ source: "test-host",
+ sourceURL: "http://host.triggered.install/example?test=1",
+ },
+ expect: {
+ method: "installtrigger",
+ source: "test_host",
+ sourceURL: "http://host.triggered.install/example?test=1",
+ },
+ },
+ {
+ test: {
+ method: "link",
+ source: "unknown",
+ sourceURL: "https://another.host/installExtension?name=ext1",
+ },
+ expect: {
+ method: "link",
+ source: "unknown",
+ sourceURL: "https://another.host/installExtension?name=ext1",
+ },
+ },
+ ];
+
+ for (const { expect, test } of TEST_CASES) {
+ await assertAddonInstallMethod(test, expect);
+ }
+});
+
+add_task(async function test_report_create_and_submit() {
+ Services.telemetry.clearEvents();
+
+ // Override the test api server request handler, to be able to
+ // intercept the submittions to the test api server.
+ let reportSubmitted;
+ apiRequestHandler = ({ data, request, response }) => {
+ reportSubmitted = JSON.parse(data);
+ handleSubmitRequest({ request, response });
+ };
+
+ const { addon, extension } = await installTestExtension();
+
+ const reportEntryPoint = "menu";
+ const report = await AbuseReporter.createAbuseReport(ADDON_ID, {
+ reportEntryPoint,
+ });
+
+ equal(report.addon, addon, "Got the expected addon property");
+ equal(
+ report.reportEntryPoint,
+ reportEntryPoint,
+ "Got the expected reportEntryPoint"
+ );
+
+ const baseReportData = await AbuseReporter.getReportData(addon);
+ const reportProperties = {
+ message: "test message",
+ reason: "test-reason",
+ };
+
+ info("Submitting report");
+ report.setMessage(reportProperties.message);
+ report.setReason(reportProperties.reason);
+ await report.submit();
+
+ const expectedEntries = Object.entries({
+ report_entry_point: reportEntryPoint,
+ ...baseReportData,
+ ...reportProperties,
+ });
+
+ for (const [expectedKey, expectedValue] of expectedEntries) {
+ equal(
+ reportSubmitted[expectedKey],
+ expectedValue,
+ `Got the expected submitted value for "${expectedKey}"`
+ );
+ }
+
+ TelemetryTestUtils.assertEvents(
+ [
+ {
+ object: reportEntryPoint,
+ value: ADDON_ID,
+ extra: { addon_type: "extension" },
+ },
+ ],
+ TELEMETRY_EVENTS_FILTERS
+ );
+
+ await extension.unload();
+});
+
+add_task(async function test_error_recent_submit() {
+ Services.telemetry.clearEvents();
+ clearAbuseReportState();
+
+ let reportSubmitted;
+ apiRequestHandler = ({ data, request, response }) => {
+ reportSubmitted = JSON.parse(data);
+ handleSubmitRequest({ request, response });
+ };
+
+ const { extension } = await installTestExtension();
+ const report = await AbuseReporter.createAbuseReport(ADDON_ID, {
+ reportEntryPoint: "uninstall",
+ });
+
+ const { extension: extension2 } = await installTestExtension({
+ manifest: {
+ applications: { gecko: { id: ADDON_ID2 } },
+ name: "Test Extension2",
+ },
+ });
+ const report2 = await AbuseReporter.createAbuseReport(
+ ADDON_ID2,
+ REPORT_OPTIONS
+ );
+
+ // Submit the two reports in fast sequence.
+ report.setReason("reason1");
+ report2.setReason("reason2");
+ await report.submit();
+ await assertRejectsAbuseReportError(report2.submit(), "ERROR_RECENT_SUBMIT");
+ equal(
+ reportSubmitted.reason,
+ "reason1",
+ "Server only received the data from the first submission"
+ );
+
+ TelemetryTestUtils.assertEvents(
+ [
+ {
+ object: "uninstall",
+ value: ADDON_ID,
+ extra: { addon_type: "extension" },
+ },
+ {
+ object: REPORT_OPTIONS.reportEntryPoint,
+ value: ADDON_ID2,
+ extra: {
+ addon_type: "extension",
+ error_type: "ERROR_RECENT_SUBMIT",
+ },
+ },
+ ],
+ TELEMETRY_EVENTS_FILTERS
+ );
+
+ await extension.unload();
+ await extension2.unload();
+});
+
+add_task(async function test_submission_server_error() {
+ const { extension } = await installTestExtension();
+
+ async function testErrorCode({
+ responseStatus,
+ responseText = "",
+ expectedErrorType,
+ expectedErrorInfo,
+ expectRequest = true,
+ }) {
+ info(
+ `Test expected AbuseReportError on response status "${responseStatus}"`
+ );
+ Services.telemetry.clearEvents();
+ clearAbuseReportState();
+
+ let requestReceived = false;
+ apiRequestHandler = ({ request, response }) => {
+ requestReceived = true;
+ response.setStatusLine(request.httpVersion, responseStatus, "Error");
+ response.write(responseText);
+ };
+
+ const report = await AbuseReporter.createAbuseReport(
+ ADDON_ID,
+ REPORT_OPTIONS
+ );
+ report.setReason("a-reason");
+ const promiseSubmit = report.submit();
+ if (typeof expectedErrorType === "string") {
+ // Assert a specific AbuseReportError errorType.
+ await assertRejectsAbuseReportError(
+ promiseSubmit,
+ expectedErrorType,
+ expectedErrorInfo
+ );
+ } else {
+ // Assert on a given Error class.
+ await Assert.rejects(promiseSubmit, expectedErrorType);
+ }
+ equal(
+ requestReceived,
+ expectRequest,
+ `${expectRequest ? "" : "Not "}received a request as expected`
+ );
+
+ TelemetryTestUtils.assertEvents(
+ [
+ {
+ object: REPORT_OPTIONS.reportEntryPoint,
+ value: ADDON_ID,
+ extra: {
+ addon_type: "extension",
+ error_type:
+ typeof expectedErrorType === "string"
+ ? expectedErrorType
+ : "ERROR_UNKNOWN",
+ },
+ },
+ ],
+ TELEMETRY_EVENTS_FILTERS
+ );
+ }
+
+ await testErrorCode({
+ responseStatus: 500,
+ responseText: "A server error",
+ expectedErrorType: "ERROR_SERVER",
+ expectedErrorInfo: JSON.stringify({
+ status: 500,
+ responseText: "A server error",
+ }),
+ });
+ await testErrorCode({
+ responseStatus: 404,
+ responseText: "Not found error",
+ expectedErrorType: "ERROR_CLIENT",
+ expectedErrorInfo: JSON.stringify({
+ status: 404,
+ responseText: "Not found error",
+ }),
+ });
+ // Test response with unexpected status code.
+ await testErrorCode({
+ responseStatus: 604,
+ responseText: "An unexpected status code",
+ expectedErrorType: "ERROR_UNKNOWN",
+ expectedErrorInfo: JSON.stringify({
+ status: 604,
+ responseText: "An unexpected status code",
+ }),
+ });
+ // Test response status 200 with invalid json data.
+ await testErrorCode({
+ responseStatus: 200,
+ expectedErrorType: /SyntaxError: JSON.parse/,
+ });
+
+ // Test on invalid url.
+ Services.prefs.setCharPref(
+ "extensions.abuseReport.url",
+ "invalid-protocol://abuse-report"
+ );
+ await testErrorCode({
+ expectedErrorType: "ERROR_NETWORK",
+ expectRequest: false,
+ });
+
+ await extension.unload();
+});
+
+add_task(async function set_test_abusereport_url() {
+ Services.prefs.setCharPref(
+ "extensions.abuseReport.url",
+ "http://test.addons.org/api/report/"
+ );
+});
+
+add_task(async function test_submission_aborting() {
+ Services.telemetry.clearEvents();
+ clearAbuseReportState();
+
+ const { extension } = await installTestExtension();
+
+ // override the api request handler with one that is never going to reply.
+ let receivedRequestsCount = 0;
+ let resolvePendingResponses;
+ const waitToReply = new Promise(
+ resolve => (resolvePendingResponses = resolve)
+ );
+
+ const onRequestReceived = new Promise(resolve => {
+ apiRequestHandler = ({ request, response }) => {
+ response.processAsync();
+ response.setStatusLine(request.httpVersion, 200, "OK");
+ receivedRequestsCount++;
+ resolve();
+
+ // Keep the request pending until resolvePendingResponses have been
+ // called.
+ waitToReply.then(() => {
+ response.finish();
+ });
+ };
+ });
+
+ const report = await AbuseReporter.createAbuseReport(
+ ADDON_ID,
+ REPORT_OPTIONS
+ );
+ report.setReason("a-reason");
+ const promiseResult = report.submit();
+
+ await onRequestReceived;
+
+ ok(receivedRequestsCount > 0, "Got the expected number of requests");
+ ok(
+ (await Promise.race([promiseResult, Promise.resolve("pending")])) ===
+ "pending",
+ "Submission fetch request should still be pending"
+ );
+
+ report.abort();
+
+ await assertRejectsAbuseReportError(promiseResult, "ERROR_ABORTED_SUBMIT");
+
+ TelemetryTestUtils.assertEvents(
+ [
+ {
+ object: REPORT_OPTIONS.reportEntryPoint,
+ value: ADDON_ID,
+ extra: { addon_type: "extension", error_type: "ERROR_ABORTED_SUBMIT" },
+ },
+ ],
+ TELEMETRY_EVENTS_FILTERS
+ );
+
+ await extension.unload();
+
+ // Unblock pending requests on the server request handler side, so that the
+ // test file can shutdown (otherwise the test run will be stuck after this
+ // task completed).
+ resolvePendingResponses();
+});
+
+add_task(async function test_truncated_string_properties() {
+ const generateString = len => new Array(len).fill("a").join("");
+
+ const LONG_STRINGS_ADDON_ID = "addon-with-long-strings-props@mochi.test";
+ const { extension } = await installTestExtension({
+ manifest: {
+ name: generateString(400),
+ description: generateString(400),
+ applications: { gecko: { id: LONG_STRINGS_ADDON_ID } },
+ },
+ });
+
+ // Override the test api server request handler, to be able to
+ // intercept the properties actually submitted.
+ let reportSubmitted;
+ apiRequestHandler = ({ data, request, response }) => {
+ reportSubmitted = JSON.parse(data);
+ handleSubmitRequest({ request, response });
+ };
+
+ const report = await AbuseReporter.createAbuseReport(
+ LONG_STRINGS_ADDON_ID,
+ REPORT_OPTIONS
+ );
+
+ report.setMessage("fake-message");
+ report.setReason("fake-reason");
+ await report.submit();
+
+ const expected = {
+ addon_name: generateString(255),
+ addon_summary: generateString(255),
+ };
+
+ Assert.deepEqual(
+ {
+ addon_name: reportSubmitted.addon_name,
+ addon_summary: reportSubmitted.addon_summary,
+ },
+ expected,
+ "Got the long strings truncated as expected"
+ );
+
+ await extension.unload();
+});
+
+add_task(async function test_report_recommended() {
+ const NON_RECOMMENDED_ADDON_ID = "non-recommended-addon@mochi.test";
+ const RECOMMENDED_ADDON_ID = "recommended-addon@mochi.test";
+
+ const now = Date.now();
+ const not_before = new Date(now - 3600000).toISOString();
+ const not_after = new Date(now + 3600000).toISOString();
+
+ const { extension: nonRecommended } = await installTestExtension({
+ manifest: {
+ name: "Fake non recommended addon",
+ applications: { gecko: { id: NON_RECOMMENDED_ADDON_ID } },
+ },
+ });
+
+ const { extension: recommended } = await installTestExtension({
+ manifest: {
+ name: "Fake recommended addon",
+ applications: { gecko: { id: RECOMMENDED_ADDON_ID } },
+ },
+ files: {
+ "mozilla-recommendation.json": {
+ addon_id: RECOMMENDED_ADDON_ID,
+ states: ["recommended"],
+ validity: { not_before, not_after },
+ },
+ },
+ });
+
+ // Override the test api server request handler, to be able to
+ // intercept the properties actually submitted.
+ let reportSubmitted;
+ apiRequestHandler = ({ data, request, response }) => {
+ reportSubmitted = JSON.parse(data);
+ handleSubmitRequest({ request, response });
+ };
+
+ async function checkReportedSignature(addonId, expectedAddonSignature) {
+ clearAbuseReportState();
+ const report = await AbuseReporter.createAbuseReport(
+ addonId,
+ REPORT_OPTIONS
+ );
+ report.setMessage("fake-message");
+ report.setReason("fake-reason");
+ await report.submit();
+ equal(
+ reportSubmitted.addon_signature,
+ expectedAddonSignature,
+ `Got the expected addon_signature for ${addonId}`
+ );
+ }
+
+ await checkReportedSignature(NON_RECOMMENDED_ADDON_ID, "signed");
+ await checkReportedSignature(RECOMMENDED_ADDON_ID, "curated");
+
+ await nonRecommended.unload();
+ await recommended.unload();
+});
+
+add_task(async function test_query_amo_details() {
+ async function assertReportOnAMODetails({
+ addonId,
+ addonType = "extension",
+ expectedReport,
+ } = {}) {
+ // Clear last report timestamp and any telemetry event recorded so far.
+ clearAbuseReportState();
+ Services.telemetry.clearEvents();
+
+ const report = await AbuseReporter.createAbuseReport(addonId, {
+ reportEntryPoint: "menu",
+ });
+
+ let reportSubmitted;
+ apiRequestHandler = ({ data, request, response }) => {
+ reportSubmitted = JSON.parse(data);
+ handleSubmitRequest({ request, response });
+ };
+
+ report.setMessage("fake message");
+ report.setReason("reason1");
+ await report.submit();
+
+ Assert.deepEqual(
+ expectedReport,
+ getProperties(reportSubmitted, Object.keys(expectedReport)),
+ "Got the expected report properties"
+ );
+
+ // Telemetry recorded for the successfully submitted report.
+ TelemetryTestUtils.assertEvents(
+ [
+ {
+ object: "menu",
+ value: addonId,
+ extra: { addon_type: FAKE_AMO_DETAILS.type },
+ },
+ ],
+ TELEMETRY_EVENTS_FILTERS
+ );
+
+ clearAbuseReportState();
+ }
+
+ // Add the expected AMO addons details.
+ const addonId = "not-installed-addon@mochi.test";
+ amoAddonDetailsMap.set(addonId, FAKE_AMO_DETAILS);
+
+ // Test on the default en-US locale.
+ Services.prefs.setCharPref(PREF_REQUIRED_LOCALE, "en-US");
+ let locale = Services.locale.appLocaleAsBCP47;
+ equal(locale, "en-US", "Got the expected app locale set");
+
+ let expectedReport = {
+ addon: addonId,
+ addon_name: FAKE_AMO_DETAILS.name[locale],
+ addon_version: FAKE_AMO_DETAILS.current_version.version,
+ addon_install_source: "not_installed",
+ addon_install_method: null,
+ addon_signature: "curated",
+ };
+
+ await assertReportOnAMODetails({ addonId, expectedReport });
+
+ // Test with a non-default locale also available in the AMO details.
+ Services.prefs.setCharPref(PREF_REQUIRED_LOCALE, "it-IT");
+ locale = Services.locale.appLocaleAsBCP47;
+ equal(locale, "it-IT", "Got the expected app locale set");
+
+ expectedReport = {
+ ...expectedReport,
+ addon_name: FAKE_AMO_DETAILS.name[locale],
+ };
+ await assertReportOnAMODetails({ addonId, expectedReport });
+
+ // Test with a non-default locale not available in the AMO details.
+ Services.prefs.setCharPref(PREF_REQUIRED_LOCALE, "fr-FR");
+ locale = Services.locale.appLocaleAsBCP47;
+ equal(locale, "fr-FR", "Got the expected app locale set");
+
+ expectedReport = {
+ ...expectedReport,
+ // Fallbacks on en-US for non available locales.
+ addon_name: FAKE_AMO_DETAILS.name["en-US"],
+ };
+ await assertReportOnAMODetails({ addonId, expectedReport });
+
+ Services.prefs.clearUserPref(PREF_REQUIRED_LOCALE);
+
+ amoAddonDetailsMap.clear();
+});
+
+add_task(async function test_statictheme_normalized_into_type_theme() {
+ const themeId = "not-installed-statictheme@mochi.test";
+ amoAddonDetailsMap.set(themeId, {
+ ...FAKE_AMO_DETAILS,
+ type: "statictheme",
+ });
+
+ const report = await AbuseReporter.createAbuseReport(themeId, REPORT_OPTIONS);
+
+ equal(report.addon.id, themeId, "Got a report for the expected theme id");
+ equal(report.addon.type, "theme", "Got the expected addon type");
+
+ amoAddonDetailsMap.clear();
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_AddonRepository.js b/toolkit/mozapps/extensions/test/xpcshell/test_AddonRepository.js
new file mode 100644
index 0000000000..d063e0556e
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_AddonRepository.js
@@ -0,0 +1,316 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// Tests AddonRepository.jsm
+
+var gServer = createHttpServer({ hosts: ["example.com"] });
+
+const PREF_GETADDONS_BROWSEADDONS = "extensions.getAddons.browseAddons";
+const PREF_GETADDONS_BROWSESEARCHRESULTS =
+ "extensions.getAddons.search.browseURL";
+
+const BASE_URL = "http://example.com";
+const DEFAULT_URL = "about:blank";
+
+const ADDONS = [
+ {
+ manifest: {
+ name: "XPI Add-on 1",
+ version: "1.1",
+ applications: {
+ gecko: { id: "test_AddonRepository_1@tests.mozilla.org" },
+ },
+ },
+ },
+ {
+ manifest: {
+ name: "XPI Add-on 2",
+ version: "1.2",
+ theme: {},
+ applications: {
+ gecko: { id: "test_AddonRepository_2@tests.mozilla.org" },
+ },
+ },
+ },
+ {
+ manifest: {
+ name: "XPI Add-on 3",
+ version: "1.3",
+ theme: {},
+ applications: {
+ gecko: { id: "test_AddonRepository_3@tests.mozilla.org" },
+ },
+ },
+ },
+];
+
+// Path to source URI of installing add-on
+const INSTALL_URL2 = "/addons/test_AddonRepository_2.xpi";
+// Path to source URI of non-active add-on (state = STATE_AVAILABLE)
+const INSTALL_URL3 = "/addons/test_AddonRepository_3.xpi";
+
+// Properties of an individual add-on that should be checked
+// Note: name is checked separately
+var ADDON_PROPERTIES = [
+ "id",
+ "type",
+ "version",
+ "creator",
+ "developers",
+ "description",
+ "fullDescription",
+ "iconURL",
+ "icons",
+ "screenshots",
+ "supportURL",
+ "contributionURL",
+ "averageRating",
+ "reviewCount",
+ "reviewURL",
+ "weeklyDownloads",
+ "dailyUsers",
+ "sourceURI",
+ "updateDate",
+];
+
+// Results of getAddonsByIDs
+var GET_RESULTS = [
+ {
+ id: "test1@tests.mozilla.org",
+ type: "extension",
+ version: "1.1",
+ creator: {
+ name: "Test Creator 1",
+ url: BASE_URL + "/creator1.html",
+ },
+ developers: [
+ {
+ name: "Test Developer 1",
+ url: BASE_URL + "/developer1.html",
+ },
+ ],
+ description: "Test Summary 1",
+ fullDescription: "Test Description 1",
+ iconURL: BASE_URL + "/icon1.png",
+ icons: { "32": BASE_URL + "/icon1.png" },
+ screenshots: [
+ {
+ url: BASE_URL + "/full1-1.png",
+ width: 400,
+ height: 300,
+ thumbnailURL: BASE_URL + "/thumbnail1-1.png",
+ thumbnailWidth: 200,
+ thumbnailHeight: 150,
+ caption: "Caption 1 - 1",
+ },
+ {
+ url: BASE_URL + "/full2-1.png",
+ thumbnailURL: BASE_URL + "/thumbnail2-1.png",
+ caption: "Caption 2 - 1",
+ },
+ ],
+ supportURL: BASE_URL + "/support1.html",
+ contributionURL: BASE_URL + "/contribution1.html",
+ averageRating: 4,
+ reviewCount: 1111,
+ reviewURL: BASE_URL + "/review1.html",
+ weeklyDownloads: 3333,
+ sourceURI: BASE_URL + INSTALL_URL2,
+ updateDate: new Date(1265033045000),
+ },
+ {
+ id: "test2@tests.mozilla.org",
+ type: "extension",
+ version: "2.0",
+ icons: {},
+ sourceURI: "http://example.com/addons/bleah.xpi",
+ },
+ {
+ id: "test_AddonRepository_1@tests.mozilla.org",
+ type: "theme",
+ version: "1.4",
+ icons: {},
+ },
+];
+
+// Values for testing AddonRepository.getAddonsByIDs()
+var GET_TEST = {
+ preference: PREF_GETADDONS_BYIDS,
+ preferenceValue: BASE_URL + "/%OS%/%VERSION%/%IDS%",
+ failedIDs: ["test1@tests.mozilla.org"],
+ failedURL: "/XPCShell/1/test1%40tests.mozilla.org",
+ successfulIDs: [
+ "test1@tests.mozilla.org",
+ "test2@tests.mozilla.org",
+ "{00000000-1111-2222-3333-444444444444}",
+ "test_AddonRepository_1@tests.mozilla.org",
+ ],
+ successfulURL:
+ "/XPCShell/1/test1%40tests.mozilla.org%2C" +
+ "test2%40tests.mozilla.org%2C" +
+ "%7B00000000-1111-2222-3333-444444444444%7D%2C" +
+ "test_AddonRepository_1%40tests.mozilla.org",
+ successfulRTAURL:
+ "/XPCShell/1/rta%3AdGVzdDFAdGVzdHMubW96aWxsYS5vcmc%2C" +
+ "test2%40tests.mozilla.org%2C" +
+ "%7B00000000-1111-2222-3333-444444444444%7D%2C" +
+ "test_AddonRepository_1%40tests.mozilla.org",
+};
+
+// Test that actual results and expected results are equal
+function check_results(aActualAddons, aExpectedAddons) {
+ do_check_addons(aActualAddons, aExpectedAddons, ADDON_PROPERTIES);
+
+ // Additional tests
+ aActualAddons.forEach(function check_each_addon(aActualAddon) {
+ // Separately check name so better messages are output when test fails
+ if (aActualAddon.name == "FAIL") {
+ do_throw(aActualAddon.id + " - " + aActualAddon.description);
+ }
+ if (aActualAddon.name != "PASS") {
+ do_throw(aActualAddon.id + " - invalid add-on name " + aActualAddon.name);
+ }
+ });
+}
+
+add_task(async function setup() {
+ // Setup for test
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1.9");
+
+ let xpis = ADDONS.map(addon => createTempWebExtensionFile(addon));
+
+ // Register other add-on XPI files
+ gServer.registerFile(INSTALL_URL2, xpis[1]);
+ gServer.registerFile(INSTALL_URL3, xpis[2]);
+
+ // Register files used to test search failure
+ gServer.registerFile(
+ GET_TEST.failedURL,
+ do_get_file("data/test_AddonRepository_fail.json")
+ );
+
+ // Register files used to test search success
+ gServer.registerFile(
+ GET_TEST.successfulURL,
+ do_get_file("data/test_AddonRepository_getAddonsByIDs.json")
+ );
+ // Register file for RTA test
+ gServer.registerFile(
+ GET_TEST.successfulRTAURL,
+ do_get_file("data/test_AddonRepository_getAddonsByIDs.json")
+ );
+
+ await promiseStartupManager();
+
+ // Install an add-on so can check that it isn't returned in the results
+ await promiseInstallFile(xpis[0]);
+ await promiseRestartManager();
+
+ // Create an active AddonInstall so can check that it isn't returned in the results
+ let install = await AddonManager.getInstallForURL(BASE_URL + INSTALL_URL2);
+ let promise = promiseCompleteInstall(install);
+ registerCleanupFunction(() => promise);
+
+ // Create a non-active AddonInstall so can check that it is returned in the results
+ await AddonManager.getInstallForURL(BASE_URL + INSTALL_URL3);
+});
+
+// Tests homepageURL and getSearchURL()
+add_task(async function test_1() {
+ function check_urls(aPreference, aGetURL, aTests) {
+ aTests.forEach(function(aTest) {
+ Services.prefs.setCharPref(aPreference, aTest.preferenceValue);
+ Assert.equal(aGetURL(aTest), aTest.expectedURL);
+ });
+ }
+
+ var urlTests = [
+ {
+ preferenceValue: BASE_URL,
+ expectedURL: BASE_URL,
+ },
+ {
+ preferenceValue: BASE_URL + "/%OS%/%VERSION%",
+ expectedURL: BASE_URL + "/XPCShell/1",
+ },
+ ];
+
+ // Extra tests for AddonRepository.getSearchURL();
+ var searchURLTests = [
+ {
+ searchTerms: "test",
+ preferenceValue: BASE_URL + "/search?q=%TERMS%",
+ expectedURL: BASE_URL + "/search?q=test",
+ },
+ {
+ searchTerms: "test search",
+ preferenceValue: BASE_URL + "/%TERMS%",
+ expectedURL: BASE_URL + "/test%20search",
+ },
+ {
+ searchTerms: 'odd=search:with&weird"characters',
+ preferenceValue: BASE_URL + "/%TERMS%",
+ expectedURL: BASE_URL + "/odd%3Dsearch%3Awith%26weird%22characters",
+ },
+ ];
+
+ // Setup tests for homepageURL and getSearchURL()
+ var tests = [
+ {
+ initiallyUndefined: true,
+ preference: PREF_GETADDONS_BROWSEADDONS,
+ urlTests,
+ getURL: () => AddonRepository.homepageURL,
+ },
+ {
+ initiallyUndefined: false,
+ preference: PREF_GETADDONS_BROWSESEARCHRESULTS,
+ urlTests: urlTests.concat(searchURLTests),
+ getURL: function getSearchURL(aTest) {
+ var searchTerms =
+ aTest && aTest.searchTerms ? aTest.searchTerms : "unused terms";
+ return AddonRepository.getSearchURL(searchTerms);
+ },
+ },
+ ];
+
+ tests.forEach(function url_test(aTest) {
+ if (aTest.initiallyUndefined) {
+ // Preference is not defined by default
+ Assert.equal(
+ Services.prefs.getPrefType(aTest.preference),
+ Services.prefs.PREF_INVALID
+ );
+ Assert.equal(aTest.getURL(), DEFAULT_URL);
+ }
+
+ check_urls(aTest.preference, aTest.getURL, aTest.urlTests);
+ });
+});
+
+// Tests failure of AddonRepository.getAddonsByIDs()
+add_task(async function test_getAddonsByID_fails() {
+ Services.prefs.setCharPref(GET_TEST.preference, GET_TEST.preferenceValue);
+
+ await Assert.rejects(
+ AddonRepository.getAddonsByIDs(GET_TEST.failedIDs),
+ /Error: GET.*?failed/
+ );
+});
+
+// Tests success of AddonRepository.getAddonsByIDs()
+add_task(async function test_getAddonsByID_succeeds() {
+ let result = await AddonRepository.getAddonsByIDs(GET_TEST.successfulIDs);
+
+ check_results(result, GET_RESULTS);
+});
+
+// Tests success of AddonRepository.getAddonsByIDs() with rta ID.
+add_task(async function test_getAddonsByID_rta() {
+ let id = `rta:${btoa(GET_TEST.successfulIDs[0])}`.slice(0, -1);
+ GET_TEST.successfulIDs[0] = id;
+ let result = await AddonRepository.getAddonsByIDs(GET_TEST.successfulIDs);
+
+ check_results(result, GET_RESULTS);
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_AddonRepository_cache.js b/toolkit/mozapps/extensions/test/xpcshell/test_AddonRepository_cache.js
new file mode 100644
index 0000000000..2b71d6bd7d
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_AddonRepository_cache.js
@@ -0,0 +1,711 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// Tests caching in AddonRepository.jsm
+
+var gServer;
+
+const HOST = "example.com";
+const BASE_URL = "http://example.com";
+
+const PREF_GETADDONS_CACHE_ENABLED = "extensions.getAddons.cache.enabled";
+const PREF_GETADDONS_CACHE_TYPES = "extensions.getAddons.cache.types";
+const GETADDONS_RESULTS = BASE_URL + "/data/test_AddonRepository_cache.json";
+const EMPTY_RESULT = BASE_URL + "/data/test_AddonRepository_empty.json";
+const FAILED_RESULT = BASE_URL + "/data/test_AddonRepository_fail.json";
+
+const FILE_DATABASE = "addons.json";
+
+const ADDONS = [
+ {
+ manifest: {
+ name: "XPI Add-on 1",
+ version: "1.1",
+
+ description: "XPI Add-on 1 - Description",
+ developer: {
+ name: "XPI Add-on 1 - Author",
+ },
+
+ homepage_url: "http://example.com/xpi/1/homepage.html",
+ icons: {
+ 32: "icon.png",
+ },
+
+ options_ui: {
+ page: "options.html",
+ },
+
+ applications: {
+ gecko: { id: "test_AddonRepository_1@tests.mozilla.org" },
+ },
+ },
+ },
+ {
+ manifest: {
+ name: "XPI Add-on 2",
+ version: "1.2",
+ theme: {},
+ applications: {
+ gecko: { id: "test_AddonRepository_2@tests.mozilla.org" },
+ },
+ },
+ },
+ {
+ manifest: {
+ name: "XPI Add-on 3",
+ version: "1.3",
+ icons: {
+ 32: "icon.png",
+ },
+ theme: {},
+ applications: {
+ gecko: { id: "test_AddonRepository_3@tests.mozilla.org" },
+ },
+ },
+ files: {
+ "preview.png": "",
+ },
+ },
+];
+
+const ADDON_IDS = ADDONS.map(addon => addon.manifest.applications.gecko.id);
+const ADDON_FILES = ADDONS.map(addon =>
+ AddonTestUtils.createTempWebExtensionFile(addon)
+);
+
+const PREF_ADDON0_CACHE_ENABLED =
+ "extensions." + ADDON_IDS[0] + ".getAddons.cache.enabled";
+const PREF_ADDON1_CACHE_ENABLED =
+ "extensions." + ADDON_IDS[1] + ".getAddons.cache.enabled";
+
+// Properties of an individual add-on that should be checked
+// Note: updateDate is checked separately
+const ADDON_PROPERTIES = [
+ "id",
+ "type",
+ "name",
+ "version",
+ "developers",
+ "description",
+ "fullDescription",
+ "icons",
+ "screenshots",
+ "homepageURL",
+ "supportURL",
+ "optionsURL",
+ "averageRating",
+ "reviewCount",
+ "reviewURL",
+ "weeklyDownloads",
+ "sourceURI",
+];
+
+// The updateDate property is annoying to test for XPI add-ons.
+// However, since we only care about whether the repository value vs. the
+// XPI value is used, we can just test if the property value matches
+// the repository value
+const REPOSITORY_UPDATEDATE = 9;
+
+// Get the URI of a subfile locating directly in the folder of
+// the add-on corresponding to the specified id
+function get_subfile_uri(aId, aFilename) {
+ let file = gProfD.clone();
+ file.append("extensions");
+ return do_get_addon_root_uri(file, aId) + aFilename;
+}
+
+// Expected repository add-ons
+const REPOSITORY_ADDONS = [
+ {
+ id: ADDON_IDS[0],
+ type: "extension",
+ name: "Repo Add-on 1",
+ version: "2.1",
+ developers: [
+ {
+ name: "Repo Add-on 1 - First Developer",
+ url: BASE_URL + "/repo/1/firstDeveloper.html",
+ },
+ {
+ name: "Repo Add-on 1 - Second Developer",
+ url: BASE_URL + "/repo/1/secondDeveloper.html",
+ },
+ ],
+ description: "Repo Add-on 1 - Description\nSecond line",
+ fullDescription: "Repo Add-on 1 - Full Description & some extra",
+ icons: { "32": BASE_URL + "/repo/1/icon.png" },
+ homepageURL: BASE_URL + "/repo/1/homepage.html",
+ supportURL: BASE_URL + "/repo/1/support.html",
+ averageRating: 1,
+ reviewCount: 1111,
+ reviewURL: BASE_URL + "/repo/1/review.html",
+ weeklyDownloads: 3331,
+ sourceURI: BASE_URL + "/repo/1/install.xpi",
+ },
+ {
+ id: ADDON_IDS[1],
+ type: "theme",
+ name: "Repo Add-on 2",
+ version: "2.2",
+ developers: [
+ {
+ name: "Repo Add-on 2 - First Developer",
+ url: BASE_URL + "/repo/2/firstDeveloper.html",
+ },
+ {
+ name: "Repo Add-on 2 - Second Developer",
+ url: BASE_URL + "/repo/2/secondDeveloper.html",
+ },
+ ],
+ description: "Repo Add-on 2 - Description",
+ fullDescription: "Repo Add-on 2 - Full Description",
+ icons: { "32": BASE_URL + "/repo/2/icon.png" },
+ screenshots: [
+ {
+ url: BASE_URL + "/repo/2/firstFull.png",
+ thumbnailURL: BASE_URL + "/repo/2/firstThumbnail.png",
+ caption: "Repo Add-on 2 - First Caption",
+ },
+ {
+ url: BASE_URL + "/repo/2/secondFull.png",
+ thumbnailURL: BASE_URL + "/repo/2/secondThumbnail.png",
+ caption: "Repo Add-on 2 - Second Caption",
+ },
+ ],
+ homepageURL: BASE_URL + "/repo/2/homepage.html",
+ supportURL: BASE_URL + "/repo/2/support.html",
+ averageRating: 2,
+ reviewCount: 1112,
+ reviewURL: BASE_URL + "/repo/2/review.html",
+ weeklyDownloads: 3332,
+ sourceURI: BASE_URL + "/repo/2/install.xpi",
+ },
+ {
+ id: ADDON_IDS[2],
+ type: "theme",
+ name: "Repo Add-on 3",
+ version: "2.3",
+ icons: { "32": BASE_URL + "/repo/3/icon.png" },
+ screenshots: [
+ {
+ url: BASE_URL + "/repo/3/firstFull.png",
+ thumbnailURL: BASE_URL + "/repo/3/firstThumbnail.png",
+ caption: "Repo Add-on 3 - First Caption",
+ },
+ {
+ url: BASE_URL + "/repo/3/secondFull.png",
+ thumbnailURL: BASE_URL + "/repo/3/secondThumbnail.png",
+ caption: "Repo Add-on 3 - Second Caption",
+ },
+ ],
+ },
+];
+
+function extensionURL(id, path) {
+ return WebExtensionPolicy.getByID(id).getURL(path);
+}
+
+// Expected add-ons when not using cache
+const WITHOUT_CACHE = [
+ {
+ id: ADDON_IDS[0],
+ type: "extension",
+ name: "XPI Add-on 1",
+ version: "1.1",
+ authors: [{ name: "XPI Add-on 1 - Author" }],
+ description: "XPI Add-on 1 - Description",
+ get icons() {
+ return { "32": get_subfile_uri(ADDON_IDS[0], "icon.png") };
+ },
+ homepageURL: `${BASE_URL}/xpi/1/homepage.html`,
+ get optionsURL() {
+ return extensionURL(ADDON_IDS[0], "options.html");
+ },
+ sourceURI: NetUtil.newURI(ADDON_FILES[0]).spec,
+ },
+ {
+ id: ADDON_IDS[1],
+ type: "theme",
+ name: "XPI Add-on 2",
+ version: "1.2",
+ sourceURI: NetUtil.newURI(ADDON_FILES[1]).spec,
+ icons: {},
+ },
+ {
+ id: ADDON_IDS[2],
+ type: "theme",
+ name: "XPI Add-on 3",
+ version: "1.3",
+ get icons() {
+ return { "32": get_subfile_uri(ADDON_IDS[2], "icon.png") };
+ },
+ screenshots: [
+ {
+ get url() {
+ return get_subfile_uri(ADDON_IDS[2], "preview.png");
+ },
+ },
+ ],
+ sourceURI: NetUtil.newURI(ADDON_FILES[2]).spec,
+ },
+];
+
+// Expected add-ons when using cache
+const WITH_CACHE = [
+ {
+ id: ADDON_IDS[0],
+ type: "extension",
+ name: "XPI Add-on 1",
+ version: "1.1",
+ developers: [
+ {
+ name: "Repo Add-on 1 - First Developer",
+ url: BASE_URL + "/repo/1/firstDeveloper.html",
+ },
+ {
+ name: "Repo Add-on 1 - Second Developer",
+ url: BASE_URL + "/repo/1/secondDeveloper.html",
+ },
+ ],
+ description: "XPI Add-on 1 - Description",
+ fullDescription: "Repo Add-on 1 - Full Description & some extra",
+ get icons() {
+ return { "32": get_subfile_uri(ADDON_IDS[0], "icon.png") };
+ },
+ homepageURL: BASE_URL + "/xpi/1/homepage.html",
+ supportURL: BASE_URL + "/repo/1/support.html",
+ get optionsURL() {
+ return extensionURL(ADDON_IDS[0], "options.html");
+ },
+ averageRating: 1,
+ reviewCount: 1111,
+ reviewURL: BASE_URL + "/repo/1/review.html",
+ weeklyDownloads: 3331,
+ sourceURI: NetUtil.newURI(ADDON_FILES[0]).spec,
+ },
+ {
+ id: ADDON_IDS[1],
+ type: "theme",
+ name: "XPI Add-on 2",
+ version: "1.2",
+ developers: [
+ {
+ name: "Repo Add-on 2 - First Developer",
+ url: BASE_URL + "/repo/2/firstDeveloper.html",
+ },
+ {
+ name: "Repo Add-on 2 - Second Developer",
+ url: BASE_URL + "/repo/2/secondDeveloper.html",
+ },
+ ],
+ description: "Repo Add-on 2 - Description",
+ fullDescription: "Repo Add-on 2 - Full Description",
+ icons: { "32": BASE_URL + "/repo/2/icon.png" },
+ screenshots: [
+ {
+ url: BASE_URL + "/repo/2/firstFull.png",
+ thumbnailURL: BASE_URL + "/repo/2/firstThumbnail.png",
+ caption: "Repo Add-on 2 - First Caption",
+ },
+ {
+ url: BASE_URL + "/repo/2/secondFull.png",
+ thumbnailURL: BASE_URL + "/repo/2/secondThumbnail.png",
+ caption: "Repo Add-on 2 - Second Caption",
+ },
+ ],
+ homepageURL: BASE_URL + "/repo/2/homepage.html",
+ supportURL: BASE_URL + "/repo/2/support.html",
+ averageRating: 2,
+ reviewCount: 1112,
+ reviewURL: BASE_URL + "/repo/2/review.html",
+ weeklyDownloads: 3332,
+ sourceURI: NetUtil.newURI(ADDON_FILES[1]).spec,
+ },
+ {
+ id: ADDON_IDS[2],
+ type: "theme",
+ name: "XPI Add-on 3",
+ version: "1.3",
+ get iconURL() {
+ return get_subfile_uri(ADDON_IDS[2], "icon.png");
+ },
+ get icons() {
+ return { "32": get_subfile_uri(ADDON_IDS[2], "icon.png") };
+ },
+ screenshots: [
+ {
+ url: BASE_URL + "/repo/3/firstFull.png",
+ thumbnailURL: BASE_URL + "/repo/3/firstThumbnail.png",
+ caption: "Repo Add-on 3 - First Caption",
+ },
+ {
+ url: BASE_URL + "/repo/3/secondFull.png",
+ thumbnailURL: BASE_URL + "/repo/3/secondThumbnail.png",
+ caption: "Repo Add-on 3 - Second Caption",
+ },
+ ],
+ sourceURI: NetUtil.newURI(ADDON_FILES[2]).spec,
+ },
+];
+
+// Expected add-ons when using cache
+const WITH_EXTENSION_CACHE = [
+ {
+ id: ADDON_IDS[0],
+ type: "extension",
+ name: "XPI Add-on 1",
+ version: "1.1",
+ developers: [
+ {
+ name: "Repo Add-on 1 - First Developer",
+ url: BASE_URL + "/repo/1/firstDeveloper.html",
+ },
+ {
+ name: "Repo Add-on 1 - Second Developer",
+ url: BASE_URL + "/repo/1/secondDeveloper.html",
+ },
+ ],
+ description: "XPI Add-on 1 - Description",
+ fullDescription: "Repo Add-on 1 - Full Description & some extra",
+ get icons() {
+ return { "32": get_subfile_uri(ADDON_IDS[0], "icon.png") };
+ },
+ homepageURL: BASE_URL + "/xpi/1/homepage.html",
+ supportURL: BASE_URL + "/repo/1/support.html",
+ get optionsURL() {
+ return extensionURL(ADDON_IDS[0], "options.html");
+ },
+ averageRating: 1,
+ reviewCount: 1111,
+ reviewURL: BASE_URL + "/repo/1/review.html",
+ weeklyDownloads: 3331,
+ sourceURI: NetUtil.newURI(ADDON_FILES[0]).spec,
+ },
+ {
+ id: ADDON_IDS[1],
+ type: "theme",
+ name: "XPI Add-on 2",
+ version: "1.2",
+ sourceURI: NetUtil.newURI(ADDON_FILES[1]).spec,
+ icons: {},
+ },
+ {
+ id: ADDON_IDS[2],
+ type: "theme",
+ name: "XPI Add-on 3",
+ version: "1.3",
+ get iconURL() {
+ return get_subfile_uri(ADDON_IDS[2], "icon.png");
+ },
+ get icons() {
+ return { "32": get_subfile_uri(ADDON_IDS[2], "icon.png") };
+ },
+ screenshots: [
+ {
+ get url() {
+ return get_subfile_uri(ADDON_IDS[2], "preview.png");
+ },
+ },
+ ],
+ sourceURI: NetUtil.newURI(ADDON_FILES[2]).spec,
+ },
+];
+
+var gDBFile = gProfD.clone();
+gDBFile.append(FILE_DATABASE);
+
+/*
+ * Check the actual add-on results against the expected add-on results
+ *
+ * @param aActualAddons
+ * The array of actual add-ons to check
+ * @param aExpectedAddons
+ * The array of expected add-ons to check against
+ * @param aFromRepository
+ * An optional boolean representing if the add-ons are from
+ * the repository
+ */
+function check_results(aActualAddons, aExpectedAddons, aFromRepository) {
+ aFromRepository = !!aFromRepository;
+
+ do_check_addons(aActualAddons, aExpectedAddons, ADDON_PROPERTIES);
+
+ // Separately test updateDate (it should only be equal to the
+ // REPOSITORY values if it is from the repository)
+ aActualAddons.forEach(function(aActualAddon) {
+ if (aActualAddon.updateDate) {
+ let time = aActualAddon.updateDate.getTime();
+ Assert.equal(time === 1000 * REPOSITORY_UPDATEDATE, aFromRepository);
+ }
+ });
+}
+
+/*
+ * Check the add-ons in the cache. This function also tests
+ * AddonRepository.getCachedAddonByID()
+ *
+ * @param aExpectedToFind
+ * An array of booleans representing which REPOSITORY_ADDONS are
+ * expected to be found in the cache
+ * @param aExpectedImmediately
+ * A boolean representing if results from the cache are expected
+ * immediately. Results are not immediate if the cache has not been
+ * initialized yet.
+ * @return Promise{null}
+ * Resolves once the checks are complete
+ */
+function check_cache(aExpectedToFind, aExpectedImmediately) {
+ Assert.equal(aExpectedToFind.length, REPOSITORY_ADDONS.length);
+
+ let lookups = [];
+
+ for (let i = 0; i < REPOSITORY_ADDONS.length; i++) {
+ lookups.push(
+ new Promise((resolve, reject) => {
+ let immediatelyFound = true;
+ let expected = aExpectedToFind[i] ? REPOSITORY_ADDONS[i] : null;
+ // can't Promise-wrap this because we're also testing whether the callback is
+ // sync or async
+ AddonRepository.getCachedAddonByID(REPOSITORY_ADDONS[i].id, function(
+ aAddon
+ ) {
+ Assert.equal(immediatelyFound, aExpectedImmediately);
+ if (expected == null) {
+ Assert.equal(aAddon, null);
+ } else {
+ check_results([aAddon], [expected], true);
+ }
+ resolve();
+ });
+ immediatelyFound = false;
+ })
+ );
+ }
+ return Promise.all(lookups);
+}
+
+/*
+ * Task to check an initialized cache by checking the cache, then restarting the
+ * manager, and checking the cache. This checks that the cache is consistent
+ * across manager restarts.
+ *
+ * @param aExpectedToFind
+ * An array of booleans representing which REPOSITORY_ADDONS are
+ * expected to be found in the cache
+ */
+async function check_initialized_cache(aExpectedToFind) {
+ await check_cache(aExpectedToFind, true);
+ await promiseRestartManager();
+
+ // If cache is disabled, then expect results immediately
+ let cacheEnabled = Services.prefs.getBoolPref(PREF_GETADDONS_CACHE_ENABLED);
+ await check_cache(aExpectedToFind, !cacheEnabled);
+}
+
+add_task(async function setup() {
+ // Setup for test
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1.9");
+
+ await promiseStartupManager();
+
+ // Install XPI add-ons
+ await promiseInstallAllFiles(ADDON_FILES);
+ await promiseRestartManager();
+
+ gServer = AddonTestUtils.createHttpServer({ hosts: [HOST] });
+ gServer.registerDirectory("/data/", do_get_file("data"));
+});
+
+// Tests AddonRepository.cacheEnabled
+add_task(async function run_test_1() {
+ Services.prefs.setBoolPref(PREF_GETADDONS_CACHE_ENABLED, false);
+ Assert.ok(!AddonRepository.cacheEnabled);
+ Services.prefs.setBoolPref(PREF_GETADDONS_CACHE_ENABLED, true);
+ Assert.ok(AddonRepository.cacheEnabled);
+});
+
+// Tests that the cache and database begin as empty
+add_task(async function run_test_2() {
+ Assert.ok(!gDBFile.exists());
+ await check_cache([false, false, false], false);
+ await AddonRepository.flush();
+});
+
+// Tests repopulateCache when the search fails
+add_task(async function run_test_3() {
+ Assert.ok(gDBFile.exists());
+ Services.prefs.setBoolPref(PREF_GETADDONS_CACHE_ENABLED, true);
+ Services.prefs.setCharPref(PREF_GETADDONS_BYIDS, FAILED_RESULT);
+
+ await AddonRepository.backgroundUpdateCheck();
+ await check_initialized_cache([false, false, false]);
+});
+
+// Tests repopulateCache when search returns no results
+add_task(async function run_test_4() {
+ Services.prefs.setCharPref(PREF_GETADDONS_BYIDS, EMPTY_RESULT);
+
+ await AddonRepository.backgroundUpdateCheck();
+ await check_initialized_cache([false, false, false]);
+});
+
+// Tests repopulateCache when search returns results
+add_task(async function run_test_5() {
+ Services.prefs.setCharPref(PREF_GETADDONS_BYIDS, GETADDONS_RESULTS);
+
+ await AddonRepository.backgroundUpdateCheck();
+ await check_initialized_cache([true, true, true]);
+});
+
+// Tests repopulateCache when caching is disabled for a single add-on
+add_task(async function run_test_5_1() {
+ Services.prefs.setBoolPref(PREF_ADDON0_CACHE_ENABLED, false);
+
+ await AddonRepository.backgroundUpdateCheck();
+
+ // Reset pref for next test
+ Services.prefs.setBoolPref(PREF_ADDON0_CACHE_ENABLED, true);
+
+ await check_initialized_cache([false, true, true]);
+});
+
+// Tests repopulateCache when caching is disabled
+add_task(async function run_test_6() {
+ Assert.ok(gDBFile.exists());
+ Services.prefs.setBoolPref(PREF_GETADDONS_CACHE_ENABLED, false);
+
+ await AddonRepository.backgroundUpdateCheck();
+ // Database should have been deleted
+ Assert.ok(!gDBFile.exists());
+
+ Services.prefs.setBoolPref(PREF_GETADDONS_CACHE_ENABLED, true);
+ await check_cache([false, false, false], false);
+ await AddonRepository.flush();
+});
+
+// Tests cacheAddons when the search fails
+add_task(async function run_test_7() {
+ Assert.ok(gDBFile.exists());
+ Services.prefs.setCharPref(PREF_GETADDONS_BYIDS, FAILED_RESULT);
+
+ await AddonRepository.cacheAddons(ADDON_IDS);
+ await check_initialized_cache([false, false, false]);
+});
+
+// Tests cacheAddons when the search returns no results
+add_task(async function run_test_8() {
+ Services.prefs.setCharPref(PREF_GETADDONS_BYIDS, EMPTY_RESULT);
+
+ await AddonRepository.cacheAddons(ADDON_IDS);
+ await check_initialized_cache([false, false, false]);
+});
+
+// Tests cacheAddons for a single add-on when search returns results
+add_task(async function run_test_9() {
+ Services.prefs.setCharPref(PREF_GETADDONS_BYIDS, GETADDONS_RESULTS);
+
+ await AddonRepository.cacheAddons([ADDON_IDS[0]]);
+ await check_initialized_cache([true, false, false]);
+});
+
+// Tests cacheAddons when caching is disabled for a single add-on
+add_task(async function run_test_9_1() {
+ Services.prefs.setBoolPref(PREF_ADDON1_CACHE_ENABLED, false);
+
+ await AddonRepository.cacheAddons(ADDON_IDS);
+
+ // Reset pref for next test
+ Services.prefs.setBoolPref(PREF_ADDON1_CACHE_ENABLED, true);
+
+ await check_initialized_cache([true, false, true]);
+});
+
+// Tests cacheAddons for multiple add-ons, some already in the cache,
+add_task(async function run_test_10() {
+ await AddonRepository.cacheAddons(ADDON_IDS);
+ await check_initialized_cache([true, true, true]);
+});
+
+// Tests cacheAddons when caching is disabled
+add_task(async function run_test_11() {
+ Assert.ok(gDBFile.exists());
+ Services.prefs.setBoolPref(PREF_GETADDONS_CACHE_ENABLED, false);
+
+ await AddonRepository.cacheAddons(ADDON_IDS);
+ Assert.ok(gDBFile.exists());
+
+ Services.prefs.setBoolPref(PREF_GETADDONS_CACHE_ENABLED, true);
+ await check_initialized_cache([true, true, true]);
+});
+
+// Tests that XPI add-ons do not use any of the repository properties if
+// caching is disabled, even if there are repository properties available
+add_task(async function run_test_12() {
+ Assert.ok(gDBFile.exists());
+ Services.prefs.setBoolPref(PREF_GETADDONS_CACHE_ENABLED, false);
+ Services.prefs.setCharPref(PREF_GETADDONS_BYIDS, GETADDONS_RESULTS);
+
+ let addons = await promiseAddonsByIDs(ADDON_IDS);
+ check_results(addons, WITHOUT_CACHE);
+});
+
+// Tests that a background update with caching disabled deletes the add-ons
+// database, and that XPI add-ons still do not use any of repository properties
+add_task(async function run_test_13() {
+ Assert.ok(gDBFile.exists());
+ Services.prefs.setCharPref(PREF_GETADDONS_BYIDS, EMPTY_RESULT);
+
+ await AddonManagerInternal.backgroundUpdateCheck();
+ // Database should have been deleted
+ Assert.ok(!gDBFile.exists());
+
+ let aAddons = await promiseAddonsByIDs(ADDON_IDS);
+ check_results(aAddons, WITHOUT_CACHE);
+});
+
+// Tests that the XPI add-ons have the correct properties if caching is
+// enabled but has no information
+add_task(async function run_test_14() {
+ Services.prefs.setBoolPref(PREF_GETADDONS_CACHE_ENABLED, true);
+
+ await AddonManagerInternal.backgroundUpdateCheck();
+ await AddonRepository.flush();
+ Assert.ok(gDBFile.exists());
+
+ let aAddons = await promiseAddonsByIDs(ADDON_IDS);
+ check_results(aAddons, WITHOUT_CACHE);
+});
+
+// Tests that the XPI add-ons correctly use the repository properties when
+// caching is enabled and the repository information is available
+add_task(async function run_test_15() {
+ Services.prefs.setCharPref(PREF_GETADDONS_BYIDS, GETADDONS_RESULTS);
+
+ await AddonManagerInternal.backgroundUpdateCheck();
+ let aAddons = await promiseAddonsByIDs(ADDON_IDS);
+ check_results(aAddons, WITH_CACHE);
+});
+
+// Tests that restarting the manager does not change the checked properties
+// on the XPI add-ons (repository properties still exist and are still properly
+// used)
+add_task(async function run_test_16() {
+ await promiseRestartManager();
+
+ let aAddons = await promiseAddonsByIDs(ADDON_IDS);
+ check_results(aAddons, WITH_CACHE);
+});
+
+// Tests that setting a list of types to cache works
+add_task(async function run_test_17() {
+ Services.prefs.setCharPref(
+ PREF_GETADDONS_CACHE_TYPES,
+ "foo,bar,extension,baz"
+ );
+
+ await AddonManagerInternal.backgroundUpdateCheck();
+ let aAddons = await promiseAddonsByIDs(ADDON_IDS);
+ check_results(aAddons, WITH_EXTENSION_CACHE);
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_AddonRepository_langpacks.js b/toolkit/mozapps/extensions/test/xpcshell/test_AddonRepository_langpacks.js
new file mode 100644
index 0000000000..e84ce4ea30
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_AddonRepository_langpacks.js
@@ -0,0 +1,135 @@
+const PREF_GET_LANGPACKS = "extensions.getAddons.langpacks.url";
+
+let server = AddonTestUtils.createHttpServer({ hosts: ["example.com"] });
+Services.prefs.setStringPref(
+ PREF_GET_LANGPACKS,
+ "http://example.com/langpacks.json"
+);
+
+add_task(async function test_getlangpacks() {
+ function setData(data) {
+ if (typeof data != "string") {
+ data = JSON.stringify(data);
+ }
+
+ server.registerPathHandler("/langpacks.json", (request, response) => {
+ response.setHeader("content-type", "application/json");
+ response.write(data);
+ });
+ }
+
+ const EXPECTED = [
+ {
+ target_locale: "kl",
+ url: "http://example.com/langpack1.xpi",
+ hash: "sha256:0123456789abcdef",
+ },
+ {
+ target_locale: "fo",
+ url: "http://example.com/langpack2.xpi",
+ hash: "sha256:fedcba9876543210",
+ },
+ ];
+
+ setData({
+ results: [
+ // A simple entry
+ {
+ target_locale: EXPECTED[0].target_locale,
+ current_compatible_version: {
+ files: [
+ {
+ platform: "all",
+ url: EXPECTED[0].url,
+ hash: EXPECTED[0].hash,
+ },
+ ],
+ },
+ },
+
+ // An entry with multiple supported platforms
+ {
+ target_locale: EXPECTED[1].target_locale,
+ current_compatible_version: {
+ files: [
+ {
+ platform: "somethingelse",
+ url: "http://example.com/bogus.xpi",
+ hash: "sha256:abcd",
+ },
+ {
+ platform: Services.appinfo.OS.toLowerCase(),
+ url: EXPECTED[1].url,
+ hash: EXPECTED[1].hash,
+ },
+ ],
+ },
+ },
+
+ // An entry with no matching platform
+ {
+ target_locale: "bla",
+ current_compatible_version: {
+ files: [
+ {
+ platform: "unsupportedplatform",
+ url: "http://example.com/bogus2.xpi",
+ hash: "sha256:1234",
+ },
+ ],
+ },
+ },
+ ],
+ });
+
+ let result = await AddonRepository.getAvailableLangpacks();
+ equal(result.length, 2, "Got 2 results");
+
+ deepEqual(result[0], EXPECTED[0], "Got expected result for simple entry");
+ deepEqual(
+ result[1],
+ EXPECTED[1],
+ "Got expected result for multi-platform entry"
+ );
+
+ setData("not valid json");
+ await Assert.rejects(
+ AddonRepository.getAvailableLangpacks(),
+ /SyntaxError/,
+ "Got parse error on invalid JSON"
+ );
+});
+
+// Tests that cookies are not sent with langpack requests.
+add_task(async function test_cookies() {
+ let lastRequest = null;
+ server.registerPathHandler("/langpacks.json", (request, response) => {
+ lastRequest = request;
+ response.write(JSON.stringify({ results: [] }));
+ });
+
+ const COOKIE = "test";
+ let expiration = Date.now() / 1000 + 60 * 60;
+ Services.cookies.add(
+ "example.com",
+ "/",
+ COOKIE,
+ "testing",
+ false,
+ false,
+ false,
+ expiration,
+ {},
+ Ci.nsICookie.SAMESITE_NONE,
+ Ci.nsICookie.SCHEME_HTTP
+ );
+
+ await AddonRepository.getAvailableLangpacks();
+
+ notEqual(lastRequest, null, "Received langpack request");
+ equal(
+ lastRequest.hasHeader("Cookie"),
+ false,
+ "Langpack request has no cookies"
+ );
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_AddonRepository_paging.js b/toolkit/mozapps/extensions/test/xpcshell/test_AddonRepository_paging.js
new file mode 100644
index 0000000000..6be53cd5c5
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_AddonRepository_paging.js
@@ -0,0 +1,91 @@
+// Test that AMO api results that are returned in muliple pages are
+// properly handled.
+add_task(async function test_paged_api() {
+ const MAX_ADDON = 3;
+
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "2");
+
+ let testserver = createHttpServer();
+ const PORT = testserver.identity.primaryPort;
+
+ const EMPTY_RESPONSE = {
+ next: null,
+ results: [],
+ };
+
+ function name(n) {
+ return `Addon ${n}`;
+ }
+ function id(n) {
+ return `test${n}@tests.mozilla.org`;
+ }
+ function summary(n) {
+ return `Summary for addon ${n}`;
+ }
+ function description(n) {
+ return `Description for addon ${n}`;
+ }
+
+ testserver.registerPathHandler("/empty", (request, response) => {
+ response.setHeader("content-type", "application/json");
+ response.write(JSON.stringify(EMPTY_RESPONSE));
+ });
+
+ testserver.registerPrefixHandler("/addons/", (request, response) => {
+ let [page] = /\d+/.exec(request.path);
+ page = page ? parseInt(page, 10) : 0;
+ page = Math.min(page, MAX_ADDON);
+
+ let result = {
+ next:
+ page == MAX_ADDON
+ ? null
+ : `http://localhost:${PORT}/addons/${page + 1}`,
+ results: [
+ {
+ name: name(page),
+ type: "extension",
+ guid: id(page),
+ summary: summary(page),
+ description: description(page),
+ },
+ ],
+ };
+
+ response.setHeader("content-type", "application/json");
+ response.write(JSON.stringify(result));
+ });
+
+ Services.prefs.setCharPref(
+ PREF_GETADDONS_BYIDS,
+ `http://localhost:${PORT}/addons/0`
+ );
+
+ await promiseStartupManager();
+
+ for (let i = 0; i <= MAX_ADDON; i++) {
+ await promiseInstallWebExtension({
+ manifest: {
+ applications: { gecko: { id: id(i) } },
+ },
+ });
+ }
+
+ await AddonManagerInternal.backgroundUpdateCheck();
+
+ let ids = [];
+ for (let i = 0; i <= MAX_ADDON; i++) {
+ ids.push(id(i));
+ }
+ let addons = await AddonRepository.getAddonsByIDs(ids);
+
+ equal(addons.length, MAX_ADDON + 1);
+ for (let i = 0; i <= MAX_ADDON; i++) {
+ equal(addons[i].name, name(i));
+ equal(addons[i].id, id(i));
+ equal(addons[i].description, summary(i));
+ equal(addons[i].fullDescription, description(i));
+ }
+
+ await promiseShutdownManager();
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_ProductAddonChecker.js b/toolkit/mozapps/extensions/test/xpcshell/test_ProductAddonChecker.js
new file mode 100644
index 0000000000..59197018e0
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_ProductAddonChecker.js
@@ -0,0 +1,292 @@
+"use strict";
+
+const { ProductAddonChecker } = ChromeUtils.import(
+ "resource://gre/modules/addons/ProductAddonChecker.jsm"
+);
+
+const LocalFile = new Components.Constructor(
+ "@mozilla.org/file/local;1",
+ Ci.nsIFile,
+ "initWithPath"
+);
+
+Services.prefs.setBoolPref("media.gmp-manager.updateEnabled", true);
+
+var testserver = new HttpServer();
+testserver.registerDirectory("/data/", do_get_file("data/productaddons"));
+testserver.start();
+var root =
+ testserver.identity.primaryScheme +
+ "://" +
+ testserver.identity.primaryHost +
+ ":" +
+ testserver.identity.primaryPort +
+ "/data/";
+
+/**
+ * Compares binary data of 2 arrays and returns true if they are the same
+ *
+ * @param arr1 The first array to compare
+ * @param arr2 The second array to compare
+ */
+function compareBinaryData(arr1, arr2) {
+ Assert.equal(arr1.length, arr2.length);
+ for (let i = 0; i < arr1.length; i++) {
+ if (arr1[i] != arr2[i]) {
+ info(
+ "Data differs at index " +
+ i +
+ ", arr1: " +
+ arr1[i] +
+ ", arr2: " +
+ arr2[i]
+ );
+ return false;
+ }
+ }
+ return true;
+}
+
+/**
+ * Reads a file's data and returns it
+ *
+ * @param file The file to read the data from
+ * @return array of bytes for the data in the file.
+ */
+function getBinaryFileData(file) {
+ let fileStream = Cc[
+ "@mozilla.org/network/file-input-stream;1"
+ ].createInstance(Ci.nsIFileInputStream);
+ // Open as RD_ONLY with default permissions.
+ fileStream.init(file, FileUtils.MODE_RDONLY, FileUtils.PERMS_FILE, 0);
+
+ let stream = Cc["@mozilla.org/binaryinputstream;1"].createInstance(
+ Ci.nsIBinaryInputStream
+ );
+ stream.setInputStream(fileStream);
+ let bytes = stream.readByteArray(stream.available());
+ fileStream.close();
+ return bytes;
+}
+
+/**
+ * Compares binary data of 2 files and returns true if they are the same
+ *
+ * @param file1 The first file to compare
+ * @param file2 The second file to compare
+ */
+function compareFiles(file1, file2) {
+ return compareBinaryData(getBinaryFileData(file1), getBinaryFileData(file2));
+}
+
+add_task(async function test_404() {
+ await Assert.rejects(
+ ProductAddonChecker.getProductAddonList(root + "404.xml"),
+ /got node name: html/
+ );
+});
+
+add_task(async function test_not_xml() {
+ await Assert.rejects(
+ ProductAddonChecker.getProductAddonList(root + "bad.txt"),
+ /got node name: parsererror/
+ );
+});
+
+add_task(async function test_invalid_xml() {
+ await Assert.rejects(
+ ProductAddonChecker.getProductAddonList(root + "bad.xml"),
+ /got node name: parsererror/
+ );
+});
+
+add_task(async function test_wrong_xml() {
+ await Assert.rejects(
+ ProductAddonChecker.getProductAddonList(root + "bad2.xml"),
+ /got node name: test/
+ );
+});
+
+add_task(async function test_missing() {
+ let addons = await ProductAddonChecker.getProductAddonList(
+ root + "missing.xml"
+ );
+ Assert.equal(addons, null);
+});
+
+add_task(async function test_empty() {
+ let res = await ProductAddonChecker.getProductAddonList(root + "empty.xml");
+ Assert.ok(Array.isArray(res.addons));
+ Assert.equal(res.addons.length, 0);
+});
+
+add_task(async function test_good_xml() {
+ let res = await ProductAddonChecker.getProductAddonList(root + "good.xml");
+ Assert.ok(Array.isArray(res.addons));
+
+ // There are three valid entries in the XML
+ Assert.equal(res.addons.length, 5);
+
+ let addon = res.addons[0];
+ Assert.equal(addon.id, "test1");
+ Assert.equal(addon.URL, "http://example.com/test1.xpi");
+ Assert.equal(addon.hashFunction, undefined);
+ Assert.equal(addon.hashValue, undefined);
+ Assert.equal(addon.version, undefined);
+ Assert.equal(addon.size, undefined);
+
+ addon = res.addons[1];
+ Assert.equal(addon.id, "test2");
+ Assert.equal(addon.URL, "http://example.com/test2.xpi");
+ Assert.equal(addon.hashFunction, "md5");
+ Assert.equal(addon.hashValue, "djhfgsjdhf");
+ Assert.equal(addon.version, undefined);
+ Assert.equal(addon.size, undefined);
+
+ addon = res.addons[2];
+ Assert.equal(addon.id, "test3");
+ Assert.equal(addon.URL, "http://example.com/test3.xpi");
+ Assert.equal(addon.hashFunction, undefined);
+ Assert.equal(addon.hashValue, undefined);
+ Assert.equal(addon.version, "1.0");
+ Assert.equal(addon.size, 45);
+
+ addon = res.addons[3];
+ Assert.equal(addon.id, "test4");
+ Assert.equal(addon.URL, undefined);
+ Assert.equal(addon.hashFunction, undefined);
+ Assert.equal(addon.hashValue, undefined);
+ Assert.equal(addon.version, undefined);
+ Assert.equal(addon.size, undefined);
+
+ addon = res.addons[4];
+ Assert.equal(addon.id, undefined);
+ Assert.equal(addon.URL, "http://example.com/test5.xpi");
+ Assert.equal(addon.hashFunction, undefined);
+ Assert.equal(addon.hashValue, undefined);
+ Assert.equal(addon.version, undefined);
+ Assert.equal(addon.size, undefined);
+});
+
+add_task(async function test_download_nourl() {
+ try {
+ let path = await ProductAddonChecker.downloadAddon({});
+
+ await OS.File.remove(path);
+ do_throw("Should not have downloaded a file with a missing url");
+ } catch (e) {
+ Assert.ok(
+ true,
+ "Should have thrown when downloading a file with a missing url."
+ );
+ }
+});
+
+add_task(async function test_download_missing() {
+ try {
+ let path = await ProductAddonChecker.downloadAddon({
+ URL: root + "nofile.xpi",
+ });
+
+ await OS.File.remove(path);
+ do_throw("Should not have downloaded a missing file");
+ } catch (e) {
+ Assert.ok(true, "Should have thrown when downloading a missing file.");
+ }
+});
+
+add_task(async function test_download_noverify() {
+ let path = await ProductAddonChecker.downloadAddon({
+ URL: root + "unsigned.xpi",
+ });
+
+ let stat = await OS.File.stat(path);
+ Assert.ok(!stat.isDir);
+ Assert.equal(stat.size, 452);
+
+ Assert.ok(
+ compareFiles(
+ do_get_file("data/productaddons/unsigned.xpi"),
+ new LocalFile(path)
+ )
+ );
+
+ await OS.File.remove(path);
+});
+
+add_task(async function test_download_badsize() {
+ try {
+ let path = await ProductAddonChecker.downloadAddon({
+ URL: root + "unsigned.xpi",
+ size: 400,
+ });
+
+ await OS.File.remove(path);
+ do_throw("Should not have downloaded a file with a bad size");
+ } catch (e) {
+ Assert.ok(
+ true,
+ "Should have thrown when downloading a file with a bad size."
+ );
+ }
+});
+
+add_task(async function test_download_badhashfn() {
+ try {
+ let path = await ProductAddonChecker.downloadAddon({
+ URL: root + "unsigned.xpi",
+ hashFunction: "sha2567",
+ hashValue:
+ "9b9abf7ddfc1a6d7ffc7e0247481dcc202363e4445ad3494fb22036f1698c7f3",
+ });
+
+ await OS.File.remove(path);
+ do_throw("Should not have downloaded a file with a bad hash function");
+ } catch (e) {
+ Assert.ok(
+ true,
+ "Should have thrown when downloading a file with a bad hash function."
+ );
+ }
+});
+
+add_task(async function test_download_badhash() {
+ try {
+ let path = await ProductAddonChecker.downloadAddon({
+ URL: root + "unsigned.xpi",
+ hashFunction: "sha256",
+ hashValue:
+ "8b9abf7ddfc1a6d7ffc7e0247481dcc202363e4445ad3494fb22036f1698c7f3",
+ });
+
+ await OS.File.remove(path);
+ do_throw("Should not have downloaded a file with a bad hash");
+ } catch (e) {
+ Assert.ok(
+ true,
+ "Should have thrown when downloading a file with a bad hash."
+ );
+ }
+});
+
+add_task(async function test_download_works() {
+ let path = await ProductAddonChecker.downloadAddon({
+ URL: root + "unsigned.xpi",
+ size: 452,
+ hashFunction: "sha256",
+ hashValue:
+ "9b9abf7ddfc1a6d7ffc7e0247481dcc202363e4445ad3494fb22036f1698c7f3",
+ });
+
+ let stat = await OS.File.stat(path);
+ Assert.ok(!stat.isDir);
+
+ Assert.ok(
+ compareFiles(
+ do_get_file("data/productaddons/unsigned.xpi"),
+ new LocalFile(path)
+ )
+ );
+
+ await OS.File.remove(path);
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_XPIStates.js b/toolkit/mozapps/extensions/test/xpcshell/test_XPIStates.js
new file mode 100644
index 0000000000..020d51b3b6
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_XPIStates.js
@@ -0,0 +1,132 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// Test that we only check manifest age for disabled extensions
+
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1.9.2");
+
+const profileDir = gProfD.clone();
+profileDir.append("extensions");
+
+add_task(async function setup() {
+ await promiseStartupManager();
+ registerCleanupFunction(promiseShutdownManager);
+
+ await promiseInstallWebExtension({
+ manifest: {
+ applications: { gecko: { id: "enabled@tests.mozilla.org" } },
+ },
+ });
+ await promiseInstallWebExtension({
+ manifest: {
+ applications: { gecko: { id: "disabled@tests.mozilla.org" } },
+ },
+ });
+
+ let addon = await promiseAddonByID("disabled@tests.mozilla.org");
+ notEqual(addon, null);
+ await addon.disable();
+});
+
+// Keep track of the last time stamp we've used, so that we can keep moving
+// it forward (if we touch two different files in the same add-on with the same
+// timestamp we may not consider the change significant)
+var lastTimestamp = Date.now();
+
+/*
+ * Helper function to touch a file and then test whether we detect the change.
+ * @param XS The XPIState object.
+ * @param aPath File path to touch.
+ * @param aChange True if we should notice the change, False if we shouldn't.
+ */
+function checkChange(XS, aPath, aChange) {
+ Assert.ok(aPath.exists());
+ lastTimestamp += 10000;
+ info("Touching file " + aPath.path + " with " + lastTimestamp);
+ aPath.lastModifiedTime = lastTimestamp;
+ Assert.equal(XS.scanForChanges(), aChange);
+ // Save the pref so we don't detect this change again
+ XS.save();
+}
+
+// Get a reference to the XPIState (loaded by startupManager) so we can unit test it.
+function getXS() {
+ let XPI = ChromeUtils.import(
+ "resource://gre/modules/addons/XPIProvider.jsm",
+ null
+ );
+ return XPI.XPIStates;
+}
+
+async function getXSJSON() {
+ await AddonTestUtils.loadAddonsList(true);
+
+ return aomStartup.readStartupData();
+}
+
+add_task(async function detect_touches() {
+ let XS = getXS();
+
+ // Should be no changes detected here, because everything should start out up-to-date.
+ Assert.ok(!XS.scanForChanges());
+
+ let states = XS.getLocation("app-profile");
+
+ // State should correctly reflect enabled/disabled
+
+ let state = states.get("enabled@tests.mozilla.org");
+ Assert.notEqual(state, null, "Found xpi state for enabled extension");
+ Assert.ok(state.enabled, "enabled extension has correct xpi state");
+
+ state = states.get("disabled@tests.mozilla.org");
+ Assert.notEqual(state, null, "Found xpi state for disabled extension");
+ Assert.ok(!state.enabled, "disabled extension has correct xpi state");
+
+ // Touch various files and make sure the change is detected.
+
+ // We notice that a packed XPI is touched for an enabled add-on.
+ let peFile = profileDir.clone();
+ peFile.append("enabled@tests.mozilla.org.xpi");
+ checkChange(XS, peFile, true);
+
+ // We should notice the packed XPI change for a disabled add-on too.
+ let pdFile = profileDir.clone();
+ pdFile.append("disabled@tests.mozilla.org.xpi");
+ checkChange(XS, pdFile, true);
+});
+
+/*
+ * Uninstalling extensions should immediately remove them from XPIStates.
+ */
+add_task(async function uninstall_bootstrap() {
+ let pe = await promiseAddonByID("enabled@tests.mozilla.org");
+ await pe.uninstall();
+
+ let xpiState = await getXSJSON();
+ Assert.equal(
+ false,
+ "enabled@tests.mozilla.org" in xpiState["app-profile"].addons
+ );
+});
+
+/*
+ * Installing an extension should immediately add it to XPIState
+ */
+add_task(async function install_bootstrap() {
+ const ID = "addon@tests.mozilla.org";
+ let XS = getXS();
+
+ await promiseInstallWebExtension({
+ manifest: {
+ applications: { gecko: { id: ID } },
+ },
+ });
+ let addon = await promiseAddonByID(ID);
+
+ let xState = XS.getAddon("app-profile", ID);
+ Assert.ok(!!xState);
+ Assert.ok(xState.enabled);
+ Assert.equal(xState.mtime, addon.updateDate.getTime());
+ await addon.uninstall();
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_XPIcancel.js b/toolkit/mozapps/extensions/test/xpcshell/test_XPIcancel.js
new file mode 100644
index 0000000000..8910d959f0
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_XPIcancel.js
@@ -0,0 +1,70 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// Test the cancellable doing/done/cancelAll API in XPIProvider
+
+const { XPIInstall } = ChromeUtils.import(
+ "resource://gre/modules/addons/XPIInstall.jsm"
+);
+
+function run_test() {
+ // Check that cancelling with nothing in progress doesn't blow up
+ XPIInstall.cancelAll();
+
+ // Check that a basic object gets cancelled
+ let getsCancelled = {
+ isCancelled: false,
+ cancel() {
+ if (this.isCancelled) {
+ do_throw("Already cancelled");
+ }
+ this.isCancelled = true;
+ },
+ };
+ XPIInstall.doing(getsCancelled);
+ XPIInstall.cancelAll();
+ Assert.ok(getsCancelled.isCancelled);
+
+ // Check that if we complete a cancellable, it doesn't get cancelled
+ let doesntGetCancelled = {
+ cancel: () => do_throw("This should not have been cancelled"),
+ };
+ XPIInstall.doing(doesntGetCancelled);
+ Assert.ok(XPIInstall.done(doesntGetCancelled));
+ XPIInstall.cancelAll();
+
+ // A cancellable that adds a cancellable
+ getsCancelled.isCancelled = false;
+ let addsAnother = {
+ isCancelled: false,
+ cancel() {
+ if (this.isCancelled) {
+ do_throw("Already cancelled");
+ }
+ this.isCancelled = true;
+ XPIInstall.doing(getsCancelled);
+ },
+ };
+ XPIInstall.doing(addsAnother);
+ XPIInstall.cancelAll();
+ Assert.ok(addsAnother.isCancelled);
+ Assert.ok(getsCancelled.isCancelled);
+
+ // A cancellable that removes another. This assumes that Set() iterates in the
+ // order that members were added
+ let removesAnother = {
+ isCancelled: false,
+ cancel() {
+ if (this.isCancelled) {
+ do_throw("Already cancelled");
+ }
+ this.isCancelled = true;
+ XPIInstall.done(doesntGetCancelled);
+ },
+ };
+ XPIInstall.doing(removesAnother);
+ XPIInstall.doing(doesntGetCancelled);
+ XPIInstall.cancelAll();
+ Assert.ok(removesAnother.isCancelled);
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_addonStartup.js b/toolkit/mozapps/extensions/test/xpcshell/test_addonStartup.js
new file mode 100644
index 0000000000..888a1cfde1
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_addonStartup.js
@@ -0,0 +1,97 @@
+"use strict";
+
+add_task(async function test_XPIStates_invalid_paths() {
+ let { path } = gAddonStartup;
+
+ let startupDatasets = [
+ {
+ "app-profile": {
+ addons: {
+ "xpcshell-something-or-other@mozilla.org": {
+ bootstrapped: true,
+ dependencies: [],
+ enabled: true,
+ hasEmbeddedWebExtension: false,
+ lastModifiedTime: 1,
+ path: "xpcshell-something-or-other@mozilla.org",
+ version: "0.0.0",
+ },
+ },
+ checkStartupModifications: true,
+ path: "/home/xpcshell/.mozilla/firefox/default/extensions",
+ },
+ },
+ {
+ "app-profile": {
+ addons: {
+ "xpcshell-something-or-other@mozilla.org": {
+ bootstrapped: true,
+ dependencies: [],
+ enabled: true,
+ hasEmbeddedWebExtension: false,
+ lastModifiedTime: 1,
+ path: "xpcshell-something-or-other@mozilla.org",
+ version: "0.0.0",
+ },
+ },
+ checkStartupModifications: true,
+ path:
+ "c:\\Users\\XpcShell\\Application Data\\Mozilla Firefox\\Profiles\\meh",
+ },
+ },
+ {
+ "app-profile": {
+ addons: {
+ "xpcshell-something-or-other@mozilla.org": {
+ bootstrapped: true,
+ dependencies: [],
+ enabled: true,
+ hasEmbeddedWebExtension: false,
+ lastModifiedTime: 1,
+ path: "/home/xpcshell/my-extensions/something-or-other",
+ version: "0.0.0",
+ },
+ },
+ checkStartupModifications: true,
+ path: "/home/xpcshell/.mozilla/firefox/default/extensions",
+ },
+ },
+ {
+ "app-profile": {
+ addons: {
+ "xpcshell-something-or-other@mozilla.org": {
+ bootstrapped: true,
+ dependencies: [],
+ enabled: true,
+ hasEmbeddedWebExtension: false,
+ lastModifiedTime: 1,
+ path: "c:\\Users\\XpcShell\\my-extensions\\something-or-other",
+ version: "0.0.0",
+ },
+ },
+ checkStartupModifications: true,
+ path:
+ "c:\\Users\\XpcShell\\Application Data\\Mozilla Firefox\\Profiles\\meh",
+ },
+ },
+ ];
+
+ for (let startupData of startupDatasets) {
+ let data = new TextEncoder().encode(JSON.stringify(startupData));
+
+ await OS.File.writeAtomic(path, data, { compression: "lz4" });
+
+ try {
+ let result = aomStartup.readStartupData();
+ info(`readStartupData() returned ${JSON.stringify(result)}`);
+ } catch (e) {
+ // We don't care if this throws, only that it doesn't crash.
+ info(`readStartupData() threw: ${e}`);
+ equal(
+ e.result,
+ Cr.NS_ERROR_FILE_UNRECOGNIZED_PATH,
+ "Got expected error code"
+ );
+ }
+ }
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_addon_manager_telemetry_events.js b/toolkit/mozapps/extensions/test/xpcshell/test_addon_manager_telemetry_events.js
new file mode 100644
index 0000000000..e1584c4868
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_addon_manager_telemetry_events.js
@@ -0,0 +1,788 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+const { TelemetryController } = ChromeUtils.import(
+ "resource://gre/modules/TelemetryController.jsm"
+);
+const { AMTelemetry } = ChromeUtils.import(
+ "resource://gre/modules/AddonManager.jsm"
+);
+
+// We don't have an easy way to serve update manifests from a secure URL.
+Services.prefs.setBoolPref(PREF_EM_CHECK_UPDATE_SECURITY, false);
+
+const EVENT_CATEGORY = "addonsManager";
+const EVENT_METHODS_INSTALL = ["install", "update"];
+const EVENT_METHODS_MANAGE = ["disable", "enable", "uninstall"];
+const EVENT_METHODS = [...EVENT_METHODS_INSTALL, ...EVENT_METHODS_MANAGE];
+
+const FAKE_INSTALL_TELEMETRY_INFO = {
+ source: "fake-install-source",
+ method: "fake-install-method",
+};
+
+function getTelemetryEvents(includeMethods = EVENT_METHODS) {
+ const snapshot = Services.telemetry.snapshotEvents(
+ Ci.nsITelemetry.DATASET_PRERELEASE_CHANNELS,
+ true
+ );
+
+ ok(
+ snapshot.parent && !!snapshot.parent.length,
+ "Got parent telemetry events in the snapshot"
+ );
+
+ return snapshot.parent
+ .filter(([timestamp, category, method]) => {
+ const includeMethod = includeMethods
+ ? includeMethods.includes(method)
+ : true;
+
+ return category === EVENT_CATEGORY && includeMethod;
+ })
+ .map(event => {
+ return {
+ method: event[2],
+ object: event[3],
+ value: event[4],
+ extra: event[5],
+ };
+ });
+}
+
+function assertNoTelemetryEvents() {
+ const snapshot = Services.telemetry.snapshotEvents(
+ Ci.nsITelemetry.DATASET_PRERELEASE_CHANNELS,
+ true
+ );
+
+ if (!snapshot.parent || snapshot.parent.length === 0) {
+ ok(true, "Got no parent telemetry events as expected");
+ return;
+ }
+
+ let filteredEvents = snapshot.parent.filter(
+ ([timestamp, category, method]) => {
+ return category === EVENT_CATEGORY;
+ }
+ );
+
+ Assert.deepEqual(filteredEvents, [], "Got no AMTelemetry events as expected");
+}
+
+add_task(async function setup() {
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1.9.2");
+
+ // Thunderbird doesn't have one or more of the probes used in this test.
+ // Ensure the data is collected anyway.
+ Services.prefs.setBoolPref(
+ "toolkit.telemetry.testing.overrideProductsCheck",
+ true
+ );
+
+ // Telemetry test setup needed to ensure that the builtin events are defined
+ // and they can be collected and verified.
+ await TelemetryController.testSetup();
+
+ await promiseStartupManager();
+});
+
+// Test the basic install and management flows.
+add_task(async function test_basic_telemetry_events() {
+ const EXTENSION_ID = "basic@test.extension";
+
+ const manifest = {
+ applications: { gecko: { id: EXTENSION_ID } },
+ };
+
+ let extension = ExtensionTestUtils.loadExtension({
+ manifest,
+ useAddonManager: "permanent",
+ amInstallTelemetryInfo: FAKE_INSTALL_TELEMETRY_INFO,
+ });
+
+ await extension.startup();
+
+ const addon = await promiseAddonByID(EXTENSION_ID);
+
+ info("Disabling the extension");
+ await addon.disable();
+
+ info("Set pending uninstall on the extension");
+ const onceAddonUninstalling = promiseAddonEvent("onUninstalling");
+ addon.uninstall(true);
+ await onceAddonUninstalling;
+
+ info("Cancel pending uninstall");
+ const oncePendingUninstallCancelled = promiseAddonEvent(
+ "onOperationCancelled"
+ );
+ addon.cancelUninstall();
+ await oncePendingUninstallCancelled;
+
+ info("Re-enabling the extension");
+ const onceAddonStarted = promiseWebExtensionStartup(EXTENSION_ID);
+ const onceAddonEnabled = promiseAddonEvent("onEnabled");
+ addon.enable();
+ await Promise.all([onceAddonEnabled, onceAddonStarted]);
+
+ await extension.unload();
+
+ let amEvents = getTelemetryEvents();
+
+ const amMethods = amEvents.map(evt => evt.method);
+ const expectedMethods = [
+ // These two install methods are related to the steps "started" and "completed".
+ "install",
+ "install",
+ // Sequence of disable and enable (pending uninstall and undo uninstall are not going to
+ // record any telemetry events).
+ "disable",
+ "enable",
+ // The final "uninstall" when the test extension is unloaded.
+ "uninstall",
+ ];
+ Assert.deepEqual(
+ amMethods,
+ expectedMethods,
+ "Got the addonsManager telemetry events in the expected order"
+ );
+
+ const installEvents = amEvents.filter(evt => evt.method === "install");
+ const expectedInstallEvents = [
+ {
+ method: "install",
+ object: "extension",
+ value: "1",
+ extra: {
+ addon_id: "basic@test.extension",
+ step: "started",
+ ...FAKE_INSTALL_TELEMETRY_INFO,
+ },
+ },
+ {
+ method: "install",
+ object: "extension",
+ value: "1",
+ extra: {
+ addon_id: "basic@test.extension",
+ step: "completed",
+ ...FAKE_INSTALL_TELEMETRY_INFO,
+ },
+ },
+ ];
+ Assert.deepEqual(
+ installEvents,
+ expectedInstallEvents,
+ "Got the expected addonsManager.install events"
+ );
+
+ const manageEvents = amEvents.filter(evt =>
+ EVENT_METHODS_MANAGE.includes(evt.method)
+ );
+ const expectedExtra = FAKE_INSTALL_TELEMETRY_INFO;
+ const expectedManageEvents = [
+ {
+ method: "disable",
+ object: "extension",
+ value: "basic@test.extension",
+ extra: expectedExtra,
+ },
+ {
+ method: "enable",
+ object: "extension",
+ value: "basic@test.extension",
+ extra: expectedExtra,
+ },
+ {
+ method: "uninstall",
+ object: "extension",
+ value: "basic@test.extension",
+ extra: expectedExtra,
+ },
+ ];
+ Assert.deepEqual(
+ manageEvents,
+ expectedManageEvents,
+ "Got the expected addonsManager.manage events"
+ );
+
+ // Verify that on every install flow, the value of the addonsManager.install Telemetry events
+ // is being incremented.
+
+ extension = ExtensionTestUtils.loadExtension({
+ manifest,
+ useAddonManager: "permanent",
+ amInstallTelemetryInfo: FAKE_INSTALL_TELEMETRY_INFO,
+ });
+
+ await extension.startup();
+ await extension.unload();
+
+ const eventsFromNewInstall = getTelemetryEvents();
+ equal(
+ eventsFromNewInstall.length,
+ 3,
+ "Got the expected number of addonsManager install events"
+ );
+
+ const eventValues = eventsFromNewInstall
+ .filter(evt => evt.method === "install")
+ .map(evt => evt.value);
+ const expectedValues = ["2", "2"];
+ Assert.deepEqual(eventValues, expectedValues, "Got the expected install id");
+});
+
+add_task(async function test_update_telemetry_events() {
+ const EXTENSION_ID = "basic@test.extension";
+
+ const testserver = AddonTestUtils.createHttpServer({
+ hosts: ["example.com"],
+ });
+
+ const updateUrl = `http://example.com/updates.json`;
+
+ const testAddon = AddonTestUtils.createTempWebExtensionFile({
+ manifest: {
+ version: "1.0",
+ applications: {
+ gecko: {
+ id: EXTENSION_ID,
+ update_url: updateUrl,
+ },
+ },
+ },
+ });
+
+ const testUserRequestedUpdate = AddonTestUtils.createTempWebExtensionFile({
+ manifest: {
+ version: "2.0",
+ applications: {
+ gecko: {
+ id: EXTENSION_ID,
+ update_url: updateUrl,
+ },
+ },
+ },
+ });
+ const testAppRequestedUpdate = AddonTestUtils.createTempWebExtensionFile({
+ manifest: {
+ version: "2.1",
+ applications: {
+ gecko: {
+ id: EXTENSION_ID,
+ update_url: updateUrl,
+ },
+ },
+ },
+ });
+
+ testserver.registerFile(
+ `/addons/${EXTENSION_ID}-2.0.xpi`,
+ testUserRequestedUpdate
+ );
+ testserver.registerFile(
+ `/addons/${EXTENSION_ID}-2.1.xpi`,
+ testAppRequestedUpdate
+ );
+
+ let updates = [
+ {
+ version: "2.0",
+ update_link: `http://example.com/addons/${EXTENSION_ID}-2.0.xpi`,
+ applications: {
+ gecko: {
+ strict_min_version: "1",
+ },
+ },
+ },
+ ];
+
+ testserver.registerPathHandler("/updates.json", (request, response) => {
+ response.write(`{
+ "addons": {
+ "${EXTENSION_ID}": {
+ "updates": ${JSON.stringify(updates)}
+ }
+ }
+ }`);
+ });
+
+ await promiseInstallFile(testAddon, false, FAKE_INSTALL_TELEMETRY_INFO);
+
+ let addon = await AddonManager.getAddonByID(EXTENSION_ID);
+
+ // User requested update.
+ await promiseFindAddonUpdates(addon, AddonManager.UPDATE_WHEN_USER_REQUESTED);
+ let installs = await AddonManager.getAllInstalls();
+ await promiseCompleteAllInstalls(installs);
+
+ updates = [
+ {
+ version: "2.1",
+ update_link: `http://example.com/addons/${EXTENSION_ID}-2.1.xpi`,
+ applications: {
+ gecko: {
+ strict_min_version: "1",
+ },
+ },
+ },
+ ];
+
+ // App requested update.
+ await promiseFindAddonUpdates(
+ addon,
+ AddonManager.UPDATE_WHEN_PERIODIC_UPDATE
+ );
+ let installs2 = await AddonManager.getAllInstalls();
+ await promiseCompleteAllInstalls(installs2);
+
+ updates = [
+ {
+ version: "2.1.1",
+ update_link: `http://example.com/addons/${EXTENSION_ID}-2.1.1-network-failure.xpi`,
+ applications: {
+ gecko: {
+ strict_min_version: "1",
+ },
+ },
+ },
+ ];
+
+ // Update which fails to download.
+ await promiseFindAddonUpdates(
+ addon,
+ AddonManager.UPDATE_WHEN_PERIODIC_UPDATE
+ );
+ let installs3 = await AddonManager.getAllInstalls();
+ await promiseCompleteAllInstalls(installs3);
+
+ let amEvents = getTelemetryEvents();
+
+ const installEvents = amEvents
+ .filter(evt => evt.method === "install")
+ .map(evt => {
+ delete evt.value;
+ return evt;
+ });
+
+ const addon_id = "basic@test.extension";
+ const object = "extension";
+
+ Assert.deepEqual(
+ installEvents,
+ [
+ {
+ method: "install",
+ object,
+ extra: { addon_id, step: "started", ...FAKE_INSTALL_TELEMETRY_INFO },
+ },
+ {
+ method: "install",
+ object,
+ extra: { addon_id, step: "completed", ...FAKE_INSTALL_TELEMETRY_INFO },
+ },
+ ],
+ "Got the expected addonsManager.install events"
+ );
+
+ const updateEvents = amEvents
+ .filter(evt => evt.method === "update")
+ .map(evt => {
+ delete evt.value;
+ return evt;
+ });
+
+ const method = "update";
+ const baseExtra = FAKE_INSTALL_TELEMETRY_INFO;
+
+ const expectedUpdateEvents = [
+ // User-requested update to the 2.1 version.
+ {
+ method,
+ object,
+ extra: { ...baseExtra, addon_id, step: "started", updated_from: "user" },
+ },
+ {
+ method,
+ object,
+ extra: {
+ ...baseExtra,
+ addon_id,
+ step: "download_started",
+ updated_from: "user",
+ },
+ },
+ {
+ method,
+ object,
+ extra: {
+ ...baseExtra,
+ addon_id,
+ step: "download_completed",
+ updated_from: "user",
+ },
+ },
+ {
+ method,
+ object,
+ extra: {
+ ...baseExtra,
+ addon_id,
+ step: "completed",
+ updated_from: "user",
+ },
+ },
+ // App-requested update to the 2.1 version.
+ {
+ method,
+ object,
+ extra: { ...baseExtra, addon_id, step: "started", updated_from: "app" },
+ },
+ {
+ method,
+ object,
+ extra: {
+ ...baseExtra,
+ addon_id,
+ step: "download_started",
+ updated_from: "app",
+ },
+ },
+ {
+ method,
+ object,
+ extra: {
+ ...baseExtra,
+ addon_id,
+ step: "download_completed",
+ updated_from: "app",
+ },
+ },
+ {
+ method,
+ object,
+ extra: { ...baseExtra, addon_id, step: "completed", updated_from: "app" },
+ },
+ // Broken update to the 2.1.1 version (on ERROR_NETWORK_FAILURE).
+ {
+ method,
+ object,
+ extra: { ...baseExtra, addon_id, step: "started", updated_from: "app" },
+ },
+ {
+ method,
+ object,
+ extra: {
+ ...baseExtra,
+ addon_id,
+ step: "download_started",
+ updated_from: "app",
+ },
+ },
+ {
+ method,
+ object,
+ extra: {
+ ...baseExtra,
+ addon_id,
+ error: "ERROR_NETWORK_FAILURE",
+ step: "download_failed",
+ updated_from: "app",
+ },
+ },
+ ];
+
+ for (let i = 0; i < updateEvents.length; i++) {
+ if (
+ ["download_completed", "download_failed"].includes(
+ updateEvents[i].extra.step
+ )
+ ) {
+ const download_time = parseInt(updateEvents[i].extra.download_time, 10);
+ ok(
+ !isNaN(download_time) && download_time > 0,
+ `Got a download_time extra in ${updateEvents[i].extra.step} events: ${download_time}`
+ );
+
+ delete updateEvents[i].extra.download_time;
+ }
+
+ Assert.deepEqual(
+ updateEvents[i],
+ expectedUpdateEvents[i],
+ "Got the expected addonsManager.update events"
+ );
+ }
+
+ equal(
+ updateEvents.length,
+ expectedUpdateEvents.length,
+ "Got the expected number of addonsManager.update events"
+ );
+
+ await addon.uninstall();
+
+ // Clear any AMTelemetry events related to the uninstalled extensions.
+ getTelemetryEvents();
+});
+
+add_task(async function test_no_telemetry_events_on_internal_sources() {
+ assertNoTelemetryEvents();
+
+ const INTERNAL_EXTENSION_ID = "internal@test.extension";
+
+ // Install an extension which has internal as its installation source,
+ // and expect it to do not appear in the collected telemetry events.
+ let internalExtension = ExtensionTestUtils.loadExtension({
+ manifest: {
+ applications: { gecko: { id: INTERNAL_EXTENSION_ID } },
+ },
+ useAddonManager: "permanent",
+ amInstallTelemetryInfo: { source: "internal" },
+ });
+
+ await internalExtension.startup();
+
+ const internalAddon = await promiseAddonByID(INTERNAL_EXTENSION_ID);
+
+ info("Disabling the internal extension");
+ const onceInternalAddonDisabled = promiseAddonEvent("onDisabled");
+ internalAddon.disable();
+ await onceInternalAddonDisabled;
+
+ info("Re-enabling the internal extension");
+ const onceInternalAddonStarted = promiseWebExtensionStartup(
+ INTERNAL_EXTENSION_ID
+ );
+ const onceInternalAddonEnabled = promiseAddonEvent("onEnabled");
+ internalAddon.enable();
+ await Promise.all([onceInternalAddonEnabled, onceInternalAddonStarted]);
+
+ await internalExtension.unload();
+
+ assertNoTelemetryEvents();
+});
+
+add_task(async function test_collect_attribution_data_for_amo() {
+ assertNoTelemetryEvents();
+
+ // We pass the `source` value to `amInstallTelemetryInfo` in this test so the
+ // host could be anything in this variable below. Whether to collect
+ // attribution data for AMO is determined by the `source` value, not this
+ // host.
+ const url = "https://addons.mozilla.org/";
+ const addonId = "{28374a9a-676c-5640-bfa7-865cd4686ead}";
+ // This is the SHA256 hash of the `addonId` above.
+ const expectedHashedAddonId =
+ "cf815c9f45c249473d630705f89e64d359737a106a375bbb83be71e6d52dc234";
+
+ for (const { source, sourceURL, expectNoEvent, expectedAmoAttribution } of [
+ // Basic test.
+ {
+ source: "amo",
+ sourceURL: `${url}?utm_content=utm-content-value`,
+ expectedAmoAttribution: {
+ utm_content: "utm-content-value",
+ },
+ },
+ // No UTM parameters will produce an event without any attribution data.
+ {
+ source: "amo",
+ sourceURL: url,
+ expectedAmoAttribution: {},
+ },
+ // Invalid source URLs will produce an event without any attribution data.
+ {
+ source: "amo",
+ sourceURL: "invalid-url",
+ expectedAmoAttribution: {},
+ },
+ // No source URL.
+ {
+ source: "amo",
+ sourceURL: null,
+ expectedAmoAttribution: {},
+ },
+ {
+ source: "amo",
+ sourceURL: undefined,
+ expectedAmoAttribution: {},
+ },
+ // Ignore unsupported/bogus UTM parameters.
+ {
+ source: "amo",
+ sourceURL: [
+ `${url}?utm_content=utm-content-value`,
+ "utm_foo=invalid",
+ "utm_campaign=some-campaign",
+ "utm_term=invalid-too",
+ ].join("&"),
+ expectedAmoAttribution: {
+ utm_campaign: "some-campaign",
+ utm_content: "utm-content-value",
+ },
+ },
+ {
+ source: "amo",
+ sourceURL: `${url}?foo=bar&q=azerty`,
+ expectedAmoAttribution: {},
+ },
+ // Long values are truncated.
+ {
+ source: "amo",
+ sourceURL: `${url}?utm_medium=${"a".repeat(100)}`,
+ expectedAmoAttribution: {
+ utm_medium: "a".repeat(40),
+ },
+ },
+ // Only collect the first value if the parameter is passed more than once.
+ {
+ source: "amo",
+ sourceURL: `${url}?utm_source=first-source&utm_source=second-source`,
+ expectedAmoAttribution: {
+ utm_source: "first-source",
+ },
+ },
+ // When source is "disco", we don't collect the UTM parameters.
+ {
+ source: "disco",
+ sourceURL: `${url}?utm_content=utm-content-value`,
+ expectedAmoAttribution: {},
+ },
+ // When source is neither "amo" nor "disco", we don't collect anything.
+ {
+ source: "link",
+ sourceURL: `${url}?utm_content=utm-content-value`,
+ expectNoEvent: true,
+ },
+ {
+ source: null,
+ sourceURL: `${url}?utm_content=utm-content-value`,
+ expectNoEvent: true,
+ },
+ {
+ source: undefined,
+ sourceURL: `${url}?utm_content=utm-content-value`,
+ expectNoEvent: true,
+ },
+ ]) {
+ const extDefinition = {
+ useAddonManager: "permanent",
+ manifest: {
+ version: "1.0",
+ applications: { gecko: { id: addonId } },
+ },
+ amInstallTelemetryInfo: {
+ ...FAKE_INSTALL_TELEMETRY_INFO,
+ sourceURL,
+ source,
+ },
+ };
+ let extension = ExtensionTestUtils.loadExtension(extDefinition);
+
+ await extension.startup();
+
+ const installStatsEvents = getTelemetryEvents(["install_stats"]);
+
+ if (expectNoEvent === true) {
+ Assert.equal(
+ installStatsEvents.length,
+ 0,
+ "no install_stats event should be recorded"
+ );
+ } else {
+ Assert.equal(
+ installStatsEvents.length,
+ 1,
+ "only one install_stats event should be recorded"
+ );
+
+ const installStatsEvent = installStatsEvents[0];
+
+ Assert.deepEqual(installStatsEvent, {
+ method: "install_stats",
+ object: "extension",
+ value: expectedHashedAddonId,
+ extra: {
+ addon_id: addonId,
+ ...expectedAmoAttribution,
+ },
+ });
+ }
+
+ await extension.upgrade({
+ ...extDefinition,
+ manifest: {
+ ...extDefinition.manifest,
+ version: "2.0",
+ },
+ });
+
+ Assert.deepEqual(
+ getTelemetryEvents(["install_stats"]),
+ [],
+ "no install_stats event should be recorded on addon updates"
+ );
+
+ await extension.unload();
+ }
+
+ getTelemetryEvents();
+});
+
+add_task(async function test_collect_attribution_data_for_amo_with_long_id() {
+ assertNoTelemetryEvents();
+
+ // We pass the `source` value to `installTelemetryInfo` in this test so the
+ // host could be anything in this variable below. Whether to collect
+ // attribution data for AMO is determined by the `source` value, not this
+ // host.
+ const url = "https://addons.mozilla.org/";
+ const addonId = `@${"a".repeat(90)}`;
+ // This is the SHA256 hash of the `addonId` above.
+ const expectedHashedAddonId =
+ "964d902353fc1c127228b66ec8a174c340cb2e02dbb550c6000fb1cd3ca2f489";
+
+ const installTelemetryInfo = {
+ ...FAKE_INSTALL_TELEMETRY_INFO,
+ sourceURL: `${url}?utm_content=utm-content-value`,
+ source: "amo",
+ };
+
+ // We call `recordInstallStatsEvent()` directly because using an add-on ID
+ // longer than 64 chars causes signing issues in tests (because of the
+ // differences between the fake CertDB injected by
+ // `AddonTestUtils.overrideCertDB()` and the real one).
+ const fakeAddonInstall = {
+ addon: { id: addonId },
+ type: "extension",
+ installTelemetryInfo,
+ hashedAddonId: expectedHashedAddonId,
+ };
+ AMTelemetry.recordInstallStatsEvent(fakeAddonInstall);
+
+ const installStatsEvents = getTelemetryEvents(["install_stats"]);
+ Assert.equal(
+ installStatsEvents.length,
+ 1,
+ "only one install_stats event should be recorded"
+ );
+
+ const installStatsEvent = installStatsEvents[0];
+
+ Assert.deepEqual(installStatsEvent, {
+ method: "install_stats",
+ object: "extension",
+ value: expectedHashedAddonId,
+ extra: {
+ addon_id: AMTelemetry.getTrimmedString(addonId),
+ utm_content: "utm-content-value",
+ },
+ });
+});
+
+add_task(async function teardown() {
+ await TelemetryController.testShutdown();
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_amo_stats_telemetry.js b/toolkit/mozapps/extensions/test/xpcshell/test_amo_stats_telemetry.js
new file mode 100644
index 0000000000..da94006c55
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_amo_stats_telemetry.js
@@ -0,0 +1,102 @@
+/* Any copyright is dedicated to the Public Domain.
+http://creativecommons.org/publicdomain/zero/1.0/ */
+
+"use strict";
+
+const { TelemetryController } = ChromeUtils.import(
+ "resource://gre/modules/TelemetryController.jsm"
+);
+
+AddonTestUtils.init(this);
+AddonTestUtils.overrideCertDB();
+AddonTestUtils.createAppInfo(
+ "xpcshell@tests.mozilla.org",
+ "XPCShell",
+ "1",
+ "42"
+);
+
+add_task(async function setup() {
+ // We need to set this pref to `true` in order to collect add-ons Telemetry
+ // data (which is considered extended data and disabled in CI).
+ const overridePreReleasePref = "toolkit.telemetry.testing.overridePreRelease";
+ let oldOverrideValue = Services.prefs.getBoolPref(
+ overridePreReleasePref,
+ false
+ );
+ Services.prefs.setBoolPref(overridePreReleasePref, true);
+ registerCleanupFunction(() => {
+ Services.prefs.setBoolPref(overridePreReleasePref, oldOverrideValue);
+ });
+
+ await TelemetryController.testSetup();
+ await AddonTestUtils.promiseStartupManager();
+});
+
+add_task(async function test_ping_payload_and_environment() {
+ const extensions = [
+ {
+ id: "addons-telemetry@test-extension-1",
+ name: "some extension 1",
+ version: "1.2.3",
+ },
+ {
+ id: "addons-telemetry@test-extension-2",
+ name: "some extension 2",
+ version: "0.1",
+ },
+ ];
+
+ // Install some extensions.
+ const installedExtensions = [];
+ for (const { id, name, version } of extensions) {
+ const extension = ExtensionTestUtils.loadExtension({
+ manifest: {
+ name,
+ version,
+ applications: { gecko: { id } },
+ },
+ useAddonManager: "permanent",
+ });
+ installedExtensions.push(extension);
+
+ await extension.startup();
+ }
+
+ const { payload, environment } = TelemetryController.getCurrentPingData();
+
+ // Important: `payload.info.addons` is being used for AMO usage stats.
+ Assert.ok("addons" in payload.info, "payload.info.addons is defined");
+ Assert.equal(
+ payload.info.addons,
+ extensions
+ .map(({ id, version }) => `${encodeURIComponent(id)}:${version}`)
+ .join(",")
+ );
+ Assert.ok(
+ "XPI" in payload.addonDetails,
+ "payload.addonDetails.XPI is defined"
+ );
+ for (const { id, name } of extensions) {
+ Assert.ok(id in payload.addonDetails.XPI);
+ Assert.equal(payload.addonDetails.XPI[id].name, name);
+ }
+
+ const { addons } = environment;
+ Assert.ok(
+ "activeAddons" in addons,
+ "environment.addons.activeAddons is defined"
+ );
+ Assert.ok("theme" in addons, "environment.addons.theme is defined");
+ for (const { id } of extensions) {
+ Assert.ok(id in environment.addons.activeAddons);
+ }
+
+ for (const extension of installedExtensions) {
+ await extension.unload();
+ }
+});
+
+add_task(async function cleanup() {
+ await TelemetryController.testShutdown();
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_aom_startup.js b/toolkit/mozapps/extensions/test/xpcshell/test_aom_startup.js
new file mode 100644
index 0000000000..92a4ab1c03
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_aom_startup.js
@@ -0,0 +1,187 @@
+"use strict";
+
+const { JSONFile } = ChromeUtils.import("resource://gre/modules/JSONFile.jsm");
+
+const aomStartup = Cc["@mozilla.org/addons/addon-manager-startup;1"].getService(
+ Ci.amIAddonManagerStartup
+);
+
+const gProfDir = do_get_profile();
+
+Services.prefs.setIntPref(
+ "extensions.enabledScopes",
+ AddonManager.SCOPE_PROFILE | AddonManager.SCOPE_APPLICATION
+);
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "42.0", "42.0");
+
+const DUMMY_ID = "@dummy";
+const DUMMY_ADDONS = {
+ addons: {
+ "@dummy": {
+ lastModifiedTime: 1337,
+ rootURI: "resource:///modules/themes/dummy/",
+ version: "1",
+ },
+ },
+};
+
+const TEST_ADDON_ID = "@test-theme";
+const TEST_THEME = {
+ lastModifiedTime: 1337,
+ rootURI: "resource:///modules/themes/test/",
+ version: "1",
+};
+
+const TEST_ADDONS = {
+ addons: {
+ "@test-theme": TEST_THEME,
+ },
+};
+
+// Utility to write out various addonStartup.json files.
+async function writeAOMStartupData(data) {
+ let jsonFile = new JSONFile({
+ path: OS.Path.join(gProfDir.path, "addonStartup.json.lz4"),
+ compression: "lz4",
+ });
+ jsonFile.data = data;
+ await jsonFile._save();
+ return aomStartup.readStartupData();
+}
+
+// This tests that any buitin removed from the build will
+// get removed from the state data.
+add_task(async function test_startup_missing_builtin() {
+ let startupData = await writeAOMStartupData({
+ "app-builtin": DUMMY_ADDONS,
+ });
+ Assert.ok(
+ !!startupData["app-builtin"].addons[DUMMY_ID],
+ "non-existant addon is in startup data"
+ );
+
+ await AddonTestUtils.promiseStartupManager();
+ await AddonTestUtils.promiseShutdownManager();
+
+ // This data is flushed on shutdown, so we check it after shutdown.
+ startupData = aomStartup.readStartupData();
+ Assert.equal(
+ startupData["app-builtin"].addons[DUMMY_ID],
+ undefined,
+ "non-existant addon is removed from startup data"
+ );
+});
+
+// This test verifies that a builtin installed prior to the
+// second scan is not overwritten by old state data during
+// the scan.
+add_task(async function test_startup_default_theme_moved() {
+ let startupData = await writeAOMStartupData({
+ "app-profile": DUMMY_ADDONS,
+ "app-builtin": TEST_ADDONS,
+ });
+ Assert.ok(
+ !!startupData["app-profile"].addons[DUMMY_ID],
+ "non-existant addon is in startup data"
+ );
+ Assert.ok(
+ !!startupData["app-builtin"].addons[TEST_ADDON_ID],
+ "test addon is in startup data"
+ );
+
+ let themeDef = {
+ manifest: {
+ applications: { gecko: { id: TEST_ADDON_ID } },
+ version: "1.1",
+ theme: {},
+ },
+ };
+
+ await setupBuiltinExtension(themeDef, "second-loc");
+ await AddonTestUtils.promiseStartupManager("44");
+ await AddonManager.maybeInstallBuiltinAddon(
+ TEST_ADDON_ID,
+ "1.1",
+ "resource://second-loc/"
+ );
+ await AddonManagerPrivate.getNewSideloads();
+
+ let addon = await AddonManager.getAddonByID(TEST_ADDON_ID);
+ Assert.ok(!addon.foreignInstall, "addon was not marked as a foreign install");
+ Assert.equal(addon.version, "1.1", "addon version is correct");
+
+ await AddonTestUtils.promiseShutdownManager();
+
+ // This data is flushed on shutdown, so we check it after shutdown.
+ startupData = aomStartup.readStartupData();
+ Assert.equal(
+ startupData["app-builtin"].addons[TEST_ADDON_ID].version,
+ "1.1",
+ "startup data is correct in cache"
+ );
+ Assert.equal(
+ startupData["app-builtin"].addons[DUMMY_ID],
+ undefined,
+ "non-existant addon is removed from startup data"
+ );
+});
+
+// This test verifies that a builtin addon being updated
+// is not marked as a foreignInstall.
+add_task(async function test_startup_builtin_not_foreign() {
+ let startupData = await writeAOMStartupData({
+ "app-profile": DUMMY_ADDONS,
+ "app-builtin": {
+ addons: {
+ "@test-theme": {
+ ...TEST_THEME,
+ rootURI: "resource://second-loc/",
+ },
+ },
+ },
+ });
+ Assert.ok(
+ !!startupData["app-profile"].addons[DUMMY_ID],
+ "non-existant addon is in startup data"
+ );
+ Assert.ok(
+ !!startupData["app-builtin"].addons[TEST_ADDON_ID],
+ "test addon is in startup data"
+ );
+
+ let themeDef = {
+ manifest: {
+ applications: { gecko: { id: TEST_ADDON_ID } },
+ version: "1.1",
+ theme: {},
+ },
+ };
+
+ await setupBuiltinExtension(themeDef, "second-loc");
+ await AddonTestUtils.promiseStartupManager("43");
+ await AddonManager.maybeInstallBuiltinAddon(
+ TEST_ADDON_ID,
+ "1.1",
+ "resource://second-loc/"
+ );
+ await AddonManagerPrivate.getNewSideloads();
+
+ let addon = await AddonManager.getAddonByID(TEST_ADDON_ID);
+ Assert.ok(!addon.foreignInstall, "addon was not marked as a foreign install");
+ Assert.equal(addon.version, "1.1", "addon version is correct");
+
+ await AddonTestUtils.promiseShutdownManager();
+
+ // This data is flushed on shutdown, so we check it after shutdown.
+ startupData = aomStartup.readStartupData();
+ Assert.equal(
+ startupData["app-builtin"].addons[TEST_ADDON_ID].version,
+ "1.1",
+ "startup data is correct in cache"
+ );
+ Assert.equal(
+ startupData["app-builtin"].addons[DUMMY_ID],
+ undefined,
+ "non-existant addon is removed from startup data"
+ );
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_bad_json.js b/toolkit/mozapps/extensions/test/xpcshell/test_bad_json.js
new file mode 100644
index 0000000000..f8a473de7f
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_bad_json.js
@@ -0,0 +1,39 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// Tests that we rebuild the database correctly if it contains
+// JSON data that parses correctly but doesn't contain required fields
+
+add_task(async function() {
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1.9.2");
+
+ await promiseStartupManager();
+
+ const ID = "addon@tests.mozilla.org";
+ await promiseInstallWebExtension({
+ manifest: {
+ version: "2.0",
+ applications: { gecko: { id: ID } },
+ },
+ });
+
+ await promiseShutdownManager();
+
+ // First startup/shutdown finished
+ // Replace the JSON store with something bogus
+ await saveJSON({ not: "what we expect to find" }, gExtensionsJSON.path);
+
+ await promiseStartupManager();
+ // Retrieve an addon to force the database to rebuild
+ let addon = await AddonManager.getAddonByID(ID);
+
+ Assert.equal(addon.id, ID);
+
+ await promiseShutdownManager();
+
+ // Make sure our JSON database has schemaVersion and our installed extension
+ let data = await loadJSON(gExtensionsJSON.path);
+ Assert.ok("schemaVersion" in data);
+ Assert.equal(data.addons[0].id, ID);
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_badschema.js b/toolkit/mozapps/extensions/test/xpcshell/test_badschema.js
new file mode 100644
index 0000000000..70720ceace
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_badschema.js
@@ -0,0 +1,237 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// Checks that we rebuild something sensible from a database with a bad schema
+
+var testserver = AddonTestUtils.createHttpServer({ hosts: ["example.com"] });
+
+// register files with server
+testserver.registerDirectory("/data/", do_get_file("data"));
+
+// The test extension uses an insecure update url.
+Services.prefs.setBoolPref(PREF_EM_CHECK_UPDATE_SECURITY, false);
+
+const ADDONS = {
+ "addon1@tests.mozilla.org": {
+ manifest: {
+ name: "Test 1",
+ applications: {
+ gecko: {
+ id: "addon1@tests.mozilla.org",
+ strict_min_version: "2",
+ strict_max_version: "2",
+ },
+ },
+ },
+ desiredValues: {
+ isActive: true,
+ userDisabled: false,
+ appDisabled: false,
+ pendingOperations: 0,
+ },
+ },
+
+ "addon2@tests.mozilla.org": {
+ manifest: {
+ name: "Test 2",
+ version: "1.0",
+ applications: {
+ gecko: {
+ id: "addon2@tests.mozilla.org",
+ },
+ },
+ },
+ initialState: {
+ userDisabled: true,
+ },
+ desiredValues: {
+ isActive: false,
+ userDisabled: true,
+ appDisabled: false,
+ pendingOperations: 0,
+ },
+ },
+
+ "addon3@tests.mozilla.org": {
+ manifest: {
+ name: "Test 3",
+ version: "1.0",
+ applications: {
+ gecko: {
+ id: "addon3@tests.mozilla.org",
+ update_url: "http://example.com/data/test_corrupt.json",
+ strict_min_version: "1",
+ strict_max_version: "1",
+ },
+ },
+ },
+ findUpdates: true,
+ desiredValues: {
+ isActive: true,
+ userDisabled: false,
+ appDisabled: false,
+ pendingOperations: 0,
+ },
+ },
+
+ "addon4@tests.mozilla.org": {
+ manifest: {
+ name: "Test 4",
+ version: "1.0",
+ applications: {
+ gecko: {
+ id: "addon4@tests.mozilla.org",
+ update_url: "http://example.com/data/test_corrupt.json",
+ strict_min_version: "1",
+ strict_max_version: "1",
+ },
+ },
+ },
+ initialState: {
+ userDisabled: true,
+ },
+ findUpdates: true,
+ desiredValues: {
+ isActive: false,
+ userDisabled: true,
+ appDisabled: false,
+ pendingOperations: 0,
+ },
+ },
+
+ "addon5@tests.mozilla.org": {
+ manifest: {
+ name: "Test 5",
+ version: "1.0",
+ applications: {
+ gecko: {
+ id: "addon5@tests.mozilla.org",
+ strict_min_version: "1",
+ strict_max_version: "1",
+ },
+ },
+ },
+ desiredValues: {
+ isActive: false,
+ userDisabled: false,
+ appDisabled: true,
+ pendingOperations: 0,
+ },
+ },
+
+ "theme1@tests.mozilla.org": {
+ manifest: {
+ manifest_version: 2,
+ name: "Theme 1",
+ version: "1.0",
+ theme: { images: { theme_frame: "example.png" } },
+ applications: {
+ gecko: {
+ id: "theme1@tests.mozilla.org",
+ },
+ },
+ },
+ desiredValues: {
+ isActive: false,
+ userDisabled: true,
+ appDisabled: false,
+ pendingOperations: 0,
+ },
+ },
+
+ "theme2@tests.mozilla.org": {
+ manifest: {
+ manifest_version: 2,
+ name: "Theme 2",
+ version: "1.0",
+ theme: { images: { theme_frame: "example.png" } },
+ applications: {
+ gecko: {
+ id: "theme2@tests.mozilla.org",
+ },
+ },
+ },
+ initialState: {
+ userDisabled: false,
+ },
+ desiredValues: {
+ isActive: true,
+ userDisabled: false,
+ appDisabled: false,
+ pendingOperations: 0,
+ },
+ },
+};
+
+const IDS = Object.keys(ADDONS);
+
+function promiseUpdates(addon) {
+ return new Promise(resolve => {
+ addon.findUpdates(
+ { onUpdateFinished: resolve },
+ AddonManager.UPDATE_WHEN_PERIODIC_UPDATE
+ );
+ });
+}
+
+add_task(async function setup() {
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "2", "2");
+
+ for (let addon of Object.values(ADDONS)) {
+ let webext = createTempWebExtensionFile({ manifest: addon.manifest });
+ await AddonTestUtils.manuallyInstall(webext);
+ }
+
+ await promiseStartupManager();
+
+ let addons = await getAddons(IDS);
+ for (let [id, addon] of Object.entries(ADDONS)) {
+ if (addon.initialState) {
+ await setInitialState(addons.get(id), addon.initialState);
+ }
+ if (addon.findUpdates) {
+ await promiseUpdates(addons.get(id));
+ }
+ }
+});
+
+add_task(async function test_after_restart() {
+ await promiseRestartManager();
+
+ info("Test add-on state after restart");
+ let addons = await getAddons(IDS);
+ for (let [id, addon] of Object.entries(ADDONS)) {
+ checkAddon(id, addons.get(id), addon.desiredValues);
+ }
+
+ await promiseShutdownManager();
+});
+
+add_task(async function test_after_schema_version_change() {
+ // After restarting the database won't be open so we can alter
+ // the schema
+ await changeXPIDBVersion(100);
+
+ await promiseStartupManager();
+
+ info("Test add-on state after schema version change");
+ let addons = await getAddons(IDS);
+ for (let [id, addon] of Object.entries(ADDONS)) {
+ checkAddon(id, addons.get(id), addon.desiredValues);
+ }
+
+ await promiseShutdownManager();
+});
+
+add_task(async function test_after_second_restart() {
+ await promiseStartupManager();
+
+ info("Test add-on state after second restart");
+ let addons = await getAddons(IDS);
+ for (let [id, addon] of Object.entries(ADDONS)) {
+ checkAddon(id, addons.get(id), addon.desiredValues);
+ }
+
+ await promiseShutdownManager();
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_bug587088.js b/toolkit/mozapps/extensions/test/xpcshell/test_bug587088.js
new file mode 100644
index 0000000000..86fc4edbc9
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_bug587088.js
@@ -0,0 +1,195 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// This test is currently dead code.
+/* eslint-disable */
+
+// Tests that trying to upgrade or uninstall an extension that has a file locked
+// will roll back the upgrade or uninstall and retry at the next restart
+
+const profileDir = gProfD.clone();
+profileDir.append("extensions");
+
+const ADDONS = [
+ {
+ "install.rdf": {
+ "id": "addon1@tests.mozilla.org",
+ "version": "1.0",
+ "name": "Bug 587088 Test",
+ "targetApplications": [
+ {
+ "id": "xpcshell@tests.mozilla.org",
+ "minVersion": "1",
+ "maxVersion": "1"
+ }
+ ]
+ },
+ "testfile": "",
+ "testfile1": "",
+ },
+
+ {
+ "install.rdf": {
+ "id": "addon1@tests.mozilla.org",
+ "version": "2.0",
+ "name": "Bug 587088 Test",
+ "targetApplications": [
+ {
+ "id": "xpcshell@tests.mozilla.org",
+ "minVersion": "1",
+ "maxVersion": "1"
+ }
+ ]
+ },
+ "testfile": "",
+ "testfile2": "",
+ },
+];
+
+add_task(async function setup() {
+ // This is only an issue on windows.
+ if (!("nsIWindowsRegKey" in Ci))
+ return;
+
+ do_test_pending();
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1.9.2");
+});
+
+function check_addon(aAddon, aVersion) {
+ Assert.notEqual(aAddon, null);
+ Assert.equal(aAddon.version, aVersion);
+ Assert.ok(aAddon.isActive);
+ Assert.ok(isExtensionInAddonsList(profileDir, aAddon.id));
+
+ Assert.ok(aAddon.hasResource("testfile"));
+ if (aVersion == "1.0") {
+ Assert.ok(aAddon.hasResource("testfile1"));
+ Assert.ok(!aAddon.hasResource("testfile2"));
+ } else {
+ Assert.ok(!aAddon.hasResource("testfile1"));
+ Assert.ok(aAddon.hasResource("testfile2"));
+ }
+
+ Assert.equal(aAddon.pendingOperations, AddonManager.PENDING_NONE);
+}
+
+function check_addon_upgrading(aAddon) {
+ Assert.notEqual(aAddon, null);
+ Assert.equal(aAddon.version, "1.0");
+ Assert.ok(aAddon.isActive);
+ Assert.ok(isExtensionInAddonsList(profileDir, aAddon.id));
+
+ Assert.ok(aAddon.hasResource("testfile"));
+ Assert.ok(aAddon.hasResource("testfile1"));
+ Assert.ok(!aAddon.hasResource("testfile2"));
+
+ Assert.equal(aAddon.pendingOperations, AddonManager.PENDING_UPGRADE);
+
+ Assert.equal(aAddon.pendingUpgrade.version, "2.0");
+}
+
+function check_addon_uninstalling(aAddon, aAfterRestart) {
+ Assert.notEqual(aAddon, null);
+ Assert.equal(aAddon.version, "1.0");
+
+ if (aAfterRestart) {
+ Assert.ok(!aAddon.isActive);
+ Assert.ok(!isExtensionInAddonsList(profileDir, aAddon.id));
+ } else {
+ Assert.ok(aAddon.isActive);
+ Assert.ok(isExtensionInAddonsList(profileDir, aAddon.id));
+ }
+
+ Assert.ok(aAddon.hasResource("testfile"));
+ Assert.ok(aAddon.hasResource("testfile1"));
+ Assert.ok(!aAddon.hasResource("testfile2"));
+
+ Assert.equal(aAddon.pendingOperations, AddonManager.PENDING_UNINSTALL);
+}
+
+add_task(async function test_1() {
+ await AddonTestUtils.promiseInstallXPI(ADDONS[0]);
+
+ await promiseRestartManager();
+
+ let a1 = await AddonManager.getAddonByID("addon1@tests.mozilla.org");
+ check_addon(a1, "1.0");
+
+ // Lock either install.rdf for unpacked add-ons or the xpi for packed add-ons.
+ let uri = a1.getResourceURI("install.rdf");
+ if (uri instanceof Ci.nsIJARURI)
+ uri = uri.JARFile;
+
+ let fstream = Cc["@mozilla.org/network/file-input-stream;1"].
+ createInstance(Ci.nsIFileInputStream);
+ fstream.init(uri.QueryInterface(Ci.nsIFileURL).file, -1, 0, 0);
+
+ await AddonTestUtils.promiseInstallXPI(ADDONS[1]);
+
+ check_addon_upgrading(a1);
+
+ await promiseRestartManager();
+
+ let a1_2 = await AddonManager.getAddonByID("addon1@tests.mozilla.org");
+ check_addon_upgrading(a1_2);
+
+ await promiseRestartManager();
+
+ let a1_3 = await AddonManager.getAddonByID("addon1@tests.mozilla.org");
+ check_addon_upgrading(a1_3);
+
+ fstream.close();
+
+ await promiseRestartManager();
+
+ let a1_4 = await AddonManager.getAddonByID("addon1@tests.mozilla.org");
+ check_addon(a1_4, "2.0");
+
+ await a1_4.uninstall();
+});
+
+// Test that a failed uninstall gets rolled back
+add_task(async function test_2() {
+ await promiseRestartManager();
+
+ await AddonTestUtils.promiseInstallXPI(ADDONS[0]);
+ await promiseRestartManager();
+
+ let a1 = await AddonManager.getAddonByID("addon1@tests.mozilla.org");
+ check_addon(a1, "1.0");
+
+ // Lock either install.rdf for unpacked add-ons or the xpi for packed add-ons.
+ let uri = a1.getResourceURI("install.rdf");
+ if (uri instanceof Ci.nsIJARURI)
+ uri = uri.JARFile;
+
+ let fstream = Cc["@mozilla.org/network/file-input-stream;1"].
+ createInstance(Ci.nsIFileInputStream);
+ fstream.init(uri.QueryInterface(Ci.nsIFileURL).file, -1, 0, 0);
+
+ await a1.uninstall();
+
+ check_addon_uninstalling(a1);
+
+ await promiseRestartManager();
+
+ let a1_2 = await AddonManager.getAddonByID("addon1@tests.mozilla.org");
+ check_addon_uninstalling(a1_2, true);
+
+ await promiseRestartManager();
+
+ let a1_3 = await AddonManager.getAddonByID("addon1@tests.mozilla.org");
+ check_addon_uninstalling(a1_3, true);
+
+ fstream.close();
+
+ await promiseRestartManager();
+
+ let a1_4 = await AddonManager.getAddonByID("addon1@tests.mozilla.org");
+ Assert.equal(a1_4, null);
+ var dir = profileDir.clone();
+ dir.append(do_get_expected_addon_name("addon1@tests.mozilla.org"));
+ Assert.ok(!dir.exists());
+ Assert.ok(!isExtensionInAddonsList(profileDir, "addon1@tests.mozilla.org"));
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_builtin_location.js b/toolkit/mozapps/extensions/test/xpcshell/test_builtin_location.js
new file mode 100644
index 0000000000..d7fe6534a3
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_builtin_location.js
@@ -0,0 +1,153 @@
+"use strict";
+
+/* globals browser */
+let scopes = AddonManager.SCOPE_PROFILE | AddonManager.SCOPE_APPLICATION;
+Services.prefs.setIntPref("extensions.enabledScopes", scopes);
+Services.prefs.setBoolPref(
+ "extensions.webextensions.background-delayed-startup",
+ false
+);
+
+AddonTestUtils.createAppInfo(
+ "xpcshell@tests.mozilla.org",
+ "XPCShell",
+ "1",
+ "1"
+);
+
+async function getWrapper(id, hidden) {
+ let wrapper = await installBuiltinExtension({
+ manifest: {
+ applications: { gecko: { id } },
+ hidden,
+ },
+ background() {
+ browser.test.sendMessage("started");
+ },
+ });
+ await wrapper.awaitMessage("started");
+ return wrapper;
+}
+
+// Tests installing an extension from the built-in location.
+add_task(async function test_builtin_location() {
+ let id = "builtin@tests.mozilla.org";
+ await AddonTestUtils.promiseStartupManager();
+ let wrapper = await getWrapper(id);
+
+ let addon = await promiseAddonByID(id);
+ notEqual(addon, null, "Addon is installed");
+ ok(addon.isActive, "Addon is active");
+ ok(addon.isPrivileged, "Addon is privileged");
+ ok(wrapper.extension.isAppProvided, "Addon is app provided");
+ ok(!addon.hidden, "Addon is not hidden");
+
+ // Built-in extensions are not checked against the blocklist,
+ // so we shouldn't have loaded it.
+ ok(!Services.blocklist.isLoaded, "Blocklist hasn't been loaded");
+
+ // After a restart, the extension should start up normally.
+ await promiseRestartManager();
+ await wrapper.awaitStartup();
+ await wrapper.awaitMessage("started");
+ ok(true, "Extension in built-in location ran after restart");
+
+ addon = await promiseAddonByID(id);
+ notEqual(addon, null, "Addon is installed");
+ ok(addon.isActive, "Addon is active");
+
+ // After a restart that causes a database rebuild, it should still work
+ await promiseRestartManager("2");
+ await wrapper.awaitStartup();
+ await wrapper.awaitMessage("started");
+ ok(true, "Extension in built-in location ran after restart");
+
+ addon = await promiseAddonByID(id);
+ notEqual(addon, null, "Addon is installed");
+ ok(addon.isActive, "Addon is active");
+
+ // After a restart that changes the schema version, it should still work
+ await promiseShutdownManager();
+ Services.prefs.setIntPref("extensions.databaseSchema", 0);
+ await promiseStartupManager();
+
+ await wrapper.awaitStartup();
+ await wrapper.awaitMessage("started");
+ ok(true, "Extension in built-in location ran after restart");
+
+ addon = await promiseAddonByID(id);
+ notEqual(addon, null, "Addon is installed");
+ ok(addon.isActive, "Addon is active");
+
+ await wrapper.unload();
+
+ addon = await promiseAddonByID(id);
+ equal(addon, null, "Addon is gone after uninstall");
+ await AddonTestUtils.promiseShutdownManager();
+});
+
+// Tests installing a hidden extension from the built-in location.
+add_task(async function test_builtin_location_hidden() {
+ let id = "hidden@tests.mozilla.org";
+ await AddonTestUtils.promiseStartupManager();
+ let wrapper = await getWrapper(id, true);
+
+ let addon = await promiseAddonByID(id);
+ notEqual(addon, null, "Addon is installed");
+ ok(addon.isActive, "Addon is active");
+ ok(addon.isPrivileged, "Addon is privileged");
+ ok(wrapper.extension.isAppProvided, "Addon is app provided");
+ ok(addon.hidden, "Addon is hidden");
+
+ await wrapper.unload();
+ await AddonTestUtils.promiseShutdownManager();
+});
+
+// Tests updates to builtin extensions
+add_task(async function test_builtin_update() {
+ let id = "bleah@tests.mozilla.org";
+ await AddonTestUtils.promiseStartupManager();
+
+ let wrapper = await installBuiltinExtension({
+ manifest: {
+ applications: { gecko: { id } },
+ version: "1.0",
+ },
+ background() {
+ browser.test.sendMessage("started");
+ },
+ });
+ await wrapper.awaitMessage("started");
+
+ await AddonTestUtils.promiseShutdownManager();
+
+ // Change the built-in
+ await setupBuiltinExtension({
+ manifest: {
+ applications: { gecko: { id } },
+ version: "2.0",
+ },
+ background() {
+ browser.test.sendMessage("started");
+ },
+ });
+
+ let updateReason;
+ AddonTestUtils.on("bootstrap-method", (method, params, reason) => {
+ updateReason = reason;
+ });
+
+ // Re-start, with a new app version
+ await AddonTestUtils.promiseStartupManager("3");
+
+ await wrapper.awaitMessage("started");
+
+ equal(
+ updateReason,
+ BOOTSTRAP_REASONS.ADODN_UPGRADE,
+ "Builtin addon's bootstrap update() method was called at startup"
+ );
+
+ await wrapper.unload();
+ await AddonTestUtils.promiseShutdownManager();
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_cacheflush.js b/toolkit/mozapps/extensions/test/xpcshell/test_cacheflush.js
new file mode 100644
index 0000000000..f2e3cb7fbf
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_cacheflush.js
@@ -0,0 +1,86 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// This verifies that flushing the zipreader cache happens when appropriate
+
+var gExpectedFile = null;
+var gCacheFlushCount = 0;
+
+var CacheFlushObserver = {
+ observe(aSubject, aTopic, aData) {
+ if (aTopic != "flush-cache-entry") {
+ return;
+ }
+
+ // Ignore flushes from the fake cert DB or extension-process-script
+ if (aData == "cert-override" || aSubject == null) {
+ return;
+ }
+
+ if (!gExpectedFile) {
+ return;
+ }
+ ok(aSubject instanceof Ci.nsIFile);
+ equal(aSubject.path, gExpectedFile.path);
+ gCacheFlushCount++;
+ },
+};
+
+add_task(async function setup() {
+ Services.obs.addObserver(CacheFlushObserver, "flush-cache-entry");
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "2");
+
+ await promiseStartupManager();
+});
+
+// Tests that the cache is flushed when installing a restartless add-on
+add_task(async function test_flush_restartless_install() {
+ let xpi = await createTempWebExtensionFile({
+ manifest: {
+ name: "Cache Flush Test",
+ version: "2.0",
+ applications: { gecko: { id: "addon2@tests.mozilla.org" } },
+ },
+ });
+
+ let install = await AddonManager.getInstallForFile(xpi);
+
+ await new Promise(resolve => {
+ install.addListener({
+ onInstallStarted() {
+ // We should flush the staged XPI when completing the install
+ gExpectedFile = gProfD.clone();
+ gExpectedFile.append("extensions");
+ gExpectedFile.append("staged");
+ gExpectedFile.append("addon2@tests.mozilla.org.xpi");
+ },
+
+ onInstallEnded() {
+ equal(gCacheFlushCount, 1);
+ gExpectedFile = null;
+ gCacheFlushCount = 0;
+
+ resolve();
+ },
+ });
+
+ install.install();
+ });
+});
+
+// Tests that the cache is flushed when uninstalling a restartless add-on
+add_task(async function test_flush_uninstall() {
+ let addon = await AddonManager.getAddonByID("addon2@tests.mozilla.org");
+
+ // We should flush the installed XPI when uninstalling
+ gExpectedFile = gProfD.clone();
+ gExpectedFile.append("extensions");
+ gExpectedFile.append("addon2@tests.mozilla.org.xpi");
+
+ await addon.uninstall();
+
+ ok(gCacheFlushCount >= 1);
+ gExpectedFile = null;
+ gCacheFlushCount = 0;
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_childprocess.js b/toolkit/mozapps/extensions/test/xpcshell/test_childprocess.js
new file mode 100644
index 0000000000..52d25b613f
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_childprocess.js
@@ -0,0 +1,20 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// This verifies that the AddonManager refuses to load in child processes.
+
+function run_test() {
+ // Already loaded the module by head_addons.js. Need to unload this again, so
+ // that overriding the app-info and re-importing the module works.
+ Cu.unload("resource://gre/modules/AddonManager.jsm");
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1.9.2");
+ gAppInfo.processType = Ci.nsIXULRuntime.PROCESS_TYPE_CONTENT;
+ try {
+ ChromeUtils.import("resource://gre/modules/AddonManager.jsm");
+ do_throw("AddonManager should have refused to load");
+ } catch (ex) {
+ info(ex.message);
+ Assert.ok(!!ex.message);
+ }
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_cookies.js b/toolkit/mozapps/extensions/test/xpcshell/test_cookies.js
new file mode 100644
index 0000000000..fc001bc701
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_cookies.js
@@ -0,0 +1,102 @@
+"use strict";
+
+let server = createHttpServer({ hosts: ["example.com"] });
+
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "45", "45");
+
+Services.prefs.setBoolPref("extensions.getAddons.cache.enabled", true);
+Services.prefs.setBoolPref(PREF_EM_CHECK_UPDATE_SECURITY, false);
+
+// Tests that cookies are not sent with background requests.
+add_task(async function test_cookies() {
+ const ID = "bg-cookies@tests.mozilla.org";
+
+ // Add a new handler to the test web server for the given file path.
+ // The handler appends the incoming requests to `results` and replies
+ // with the provided body.
+ function makeHandler(path, results, body) {
+ server.registerPathHandler(path, (request, response) => {
+ results.push(request);
+ response.write(body);
+ });
+ }
+
+ let gets = [];
+ makeHandler("/get", gets, JSON.stringify({ results: [] }));
+ Services.prefs.setCharPref(PREF_GETADDONS_BYIDS, "http://example.com/get");
+
+ let updates = [];
+ makeHandler(
+ "/update",
+ updates,
+ JSON.stringify({
+ addons: {
+ [ID]: {
+ updates: [
+ {
+ version: "2.0",
+ update_link: "http://example.com/update.xpi",
+ applications: {
+ gecko: {},
+ },
+ },
+ ],
+ },
+ },
+ })
+ );
+
+ let xpiFetches = [];
+ makeHandler("/update.xpi", xpiFetches, "");
+
+ const COOKIE = "test";
+ // cookies.add() takes a time in seconds
+ let expiration = Date.now() / 1000 + 60 * 60;
+ Services.cookies.add(
+ "example.com",
+ "/",
+ COOKIE,
+ "testing",
+ false,
+ false,
+ false,
+ expiration,
+ {},
+ Ci.nsICookie.SAMESITE_NONE,
+ Ci.nsICookie.SCHEME_HTTP
+ );
+
+ await promiseStartupManager();
+
+ let addon = await promiseInstallWebExtension({
+ manifest: {
+ version: "1.0",
+ applications: {
+ gecko: {
+ id: ID,
+ update_url: "http://example.com/update",
+ },
+ },
+ },
+ });
+
+ equal(gets.length, 1, "Saw one addon metadata request");
+ equal(gets[0].hasHeader("Cookie"), false, "Metadata request has no cookies");
+
+ await Promise.all([
+ AddonTestUtils.promiseInstallEvent("onDownloadFailed"),
+ AddonManagerPrivate.backgroundUpdateCheck(),
+ ]);
+
+ equal(updates.length, 1, "Saw one update check request");
+ equal(updates[0].hasHeader("Cookie"), false, "Update request has no cookies");
+
+ equal(xpiFetches.length, 1, "Saw one request for updated xpi");
+ equal(
+ xpiFetches[0].hasHeader("Cookie"),
+ false,
+ "Request for updated XPI has no cookies"
+ );
+
+ await addon.uninstall();
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_corrupt.js b/toolkit/mozapps/extensions/test/xpcshell/test_corrupt.js
new file mode 100644
index 0000000000..f31a64b01b
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_corrupt.js
@@ -0,0 +1,210 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// Checks that we rebuild something sensible from a corrupt database
+
+// Create and configure the HTTP server.
+var testserver = createHttpServer({ hosts: ["example.com"] });
+
+// register files with server
+testserver.registerDirectory("/data/", do_get_file("data"));
+
+// The test extension uses an insecure update url.
+Services.prefs.setBoolPref(PREF_EM_CHECK_UPDATE_SECURITY, false);
+
+const ADDONS = {
+ // Will get a compatibility update and stay enabled
+ "addon3@tests.mozilla.org": {
+ manifest: {
+ name: "Test 3",
+ applications: {
+ gecko: {
+ id: "addon3@tests.mozilla.org",
+ update_url: "http://example.com/data/test_corrupt.json",
+ },
+ },
+ },
+ findUpdates: true,
+ desiredState: {
+ isActive: true,
+ userDisabled: false,
+ appDisabled: false,
+ pendingOperations: 0,
+ },
+ },
+
+ // Will get a compatibility update and be enabled
+ "addon4@tests.mozilla.org": {
+ manifest: {
+ name: "Test 4",
+ applications: {
+ gecko: {
+ id: "addon4@tests.mozilla.org",
+ update_url: "http://example.com/data/test_corrupt.json",
+ },
+ },
+ },
+ initialState: {
+ userDisabled: true,
+ },
+ findUpdates: true,
+ desiredState: {
+ isActive: false,
+ userDisabled: true,
+ appDisabled: false,
+ pendingOperations: 0,
+ },
+ },
+
+ "addon5@tests.mozilla.org": {
+ manifest: {
+ name: "Test 5",
+ applications: { gecko: { id: "addon5@tests.mozilla.org" } },
+ },
+ desiredState: {
+ isActive: true,
+ userDisabled: false,
+ appDisabled: false,
+ pendingOperations: 0,
+ },
+ },
+
+ "addon7@tests.mozilla.org": {
+ manifest: {
+ name: "Test 7",
+ applications: { gecko: { id: "addon7@tests.mozilla.org" } },
+ },
+ initialState: {
+ userDisabled: true,
+ },
+ desiredState: {
+ isActive: false,
+ userDisabled: true,
+ appDisabled: false,
+ pendingOperations: 0,
+ },
+ },
+
+ // The default theme
+ "theme1@tests.mozilla.org": {
+ manifest: {
+ manifest_version: 2,
+ name: "Theme 1",
+ version: "1.0",
+ theme: { images: { theme_frame: "example.png" } },
+ applications: {
+ gecko: {
+ id: "theme1@tests.mozilla.org",
+ },
+ },
+ },
+ desiredState: {
+ isActive: false,
+ userDisabled: true,
+ appDisabled: false,
+ pendingOperations: 0,
+ },
+ },
+
+ "theme2@tests.mozilla.org": {
+ manifest: {
+ manifest_version: 2,
+ name: "Theme 2",
+ version: "1.0",
+ theme: { images: { theme_frame: "example.png" } },
+ applications: {
+ gecko: {
+ id: "theme2@tests.mozilla.org",
+ },
+ },
+ },
+ initialState: {
+ userDisabled: false,
+ },
+ desiredState: {
+ isActive: true,
+ userDisabled: false,
+ appDisabled: false,
+ pendingOperations: 0,
+ },
+ },
+};
+
+const IDS = Object.keys(ADDONS);
+
+function promiseUpdates(addon) {
+ return new Promise(resolve => {
+ addon.findUpdates(
+ { onUpdateFinished: resolve },
+ AddonManager.UPDATE_WHEN_PERIODIC_UPDATE
+ );
+ });
+}
+
+add_task(async function setup() {
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "2", "2");
+
+ for (let addon of Object.values(ADDONS)) {
+ let webext = createTempWebExtensionFile({ manifest: addon.manifest });
+ await AddonTestUtils.manuallyInstall(webext);
+ }
+
+ await promiseStartupManager();
+
+ let addons = await getAddons(IDS);
+ for (let [id, addon] of Object.entries(ADDONS)) {
+ if (addon.initialState) {
+ await setInitialState(addons.get(id), addon.initialState);
+ }
+ if (addon.findUpdates) {
+ await promiseUpdates(addons.get(id));
+ }
+ }
+});
+
+add_task(async function test_after_restart() {
+ await promiseRestartManager();
+
+ info("Test add-on state after restart");
+ let addons = await getAddons(IDS);
+ for (let [id, addon] of Object.entries(ADDONS)) {
+ checkAddon(id, addons.get(id), addon.desiredState);
+ }
+
+ await promiseShutdownManager();
+});
+
+add_task(async function test_after_corruption() {
+ // Shutdown and replace the database with a corrupt file (a directory
+ // serves this purpose). On startup the add-ons manager won't rebuild
+ // because there is a file there still.
+ gExtensionsJSON.remove(true);
+ gExtensionsJSON.create(Ci.nsIFile.DIRECTORY_TYPE, FileUtils.PERMS_DIRECTORY);
+
+ await promiseStartupManager();
+
+ Services.obs.notifyObservers(null, "sessionstore-windows-restored");
+ await AddonManagerPrivate.databaseReady;
+
+ // Accessing the add-ons should open and recover the database
+ info("Test add-on state after corruption");
+ let addons = await getAddons(IDS);
+ for (let [id, addon] of Object.entries(ADDONS)) {
+ checkAddon(id, addons.get(id), addon.desiredState);
+ }
+
+ await Assert.rejects(promiseShutdownManager(), OS.File.Error);
+});
+
+add_task(async function test_after_second_restart() {
+ await promiseStartupManager();
+
+ info("Test add-on state after second restart");
+ let addons = await getAddons(IDS);
+ for (let [id, addon] of Object.entries(ADDONS)) {
+ checkAddon(id, addons.get(id), addon.desiredState);
+ }
+
+ await Assert.rejects(promiseShutdownManager(), OS.File.Error);
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_crash_annotation_quoting.js b/toolkit/mozapps/extensions/test/xpcshell/test_crash_annotation_quoting.js
new file mode 100644
index 0000000000..242e9cf055
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_crash_annotation_quoting.js
@@ -0,0 +1,25 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// This verifies that strange characters in an add-on version don't break the
+// crash annotation.
+
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1.9.2");
+
+add_task(async function run_test() {
+ await promiseStartupManager();
+
+ let n = 1;
+ for (let version in ["1,0", "1:0"]) {
+ let id = `addon${n++}@tests.mozilla.org`;
+ await promiseInstallWebExtension({
+ manifest: {
+ version,
+ applications: { gecko: { id } },
+ },
+ });
+
+ do_check_in_crash_annotation(id, version);
+ }
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_db_path.js b/toolkit/mozapps/extensions/test/xpcshell/test_db_path.js
new file mode 100644
index 0000000000..520c90a4d4
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_db_path.js
@@ -0,0 +1,69 @@
+const { AddonTestUtils } = ChromeUtils.import(
+ "resource://testing-common/AddonTestUtils.jsm"
+);
+const { OS } = ChromeUtils.import("resource://gre/modules/osfile.jsm");
+
+const DEFAULT_THEME_ID = "default-theme@mozilla.org";
+
+let global = this;
+
+// Test that paths in the extensions database are stored properly
+// if they include non-ascii characters (see bug 1428234 for an example of
+// a past bug with such paths)
+add_task(async function test_non_ascii_path() {
+ let env = Cc["@mozilla.org/process/environment;1"].getService(
+ Ci.nsIEnvironment
+ );
+ const PROFILE_VAR = "XPCSHELL_TEST_PROFILE_DIR";
+ let profileDir = OS.Path.join(
+ env.get(PROFILE_VAR),
+ "\u00ce \u00e5m \u00f1\u00f8t \u00e5s\u00e7ii"
+ );
+ env.set(PROFILE_VAR, profileDir);
+
+ AddonTestUtils.init(global);
+ AddonTestUtils.overrideCertDB();
+ AddonTestUtils.createAppInfo(
+ "xpcshell@tests.mozilla.org",
+ "XPCShell",
+ "1",
+ "1"
+ );
+
+ const ID1 = "profile1@tests.mozilla.org";
+ let xpi1 = await AddonTestUtils.createTempWebExtensionFile({
+ id: ID1,
+ manifest: {
+ applications: { gecko: { id: ID1 } },
+ },
+ });
+
+ const ID2 = "profile2@tests.mozilla.org";
+ let xpi2 = await AddonTestUtils.createTempWebExtensionFile({
+ id: ID2,
+ manifest: {
+ applications: { gecko: { id: ID2 } },
+ },
+ });
+
+ await AddonTestUtils.manuallyInstall(xpi1);
+ await AddonTestUtils.promiseStartupManager();
+ await AddonTestUtils.promiseInstallFile(xpi2);
+ await AddonTestUtils.promiseShutdownManager();
+
+ let dbfile = OS.Path.join(profileDir, "extensions.json");
+ let raw = new TextDecoder().decode(await OS.File.read(dbfile));
+ let data = JSON.parse(raw);
+
+ let addons = data.addons.filter(a => a.id !== DEFAULT_THEME_ID);
+ Assert.ok(Array.isArray(addons), "extensions.json has addons array");
+ Assert.equal(2, addons.length, "extensions.json has 2 addons");
+ Assert.ok(
+ addons[0].path.startsWith(profileDir),
+ "path property for sideloaded extension has the proper profile directory"
+ );
+ Assert.ok(
+ addons[1].path.startsWith(profileDir),
+ "path property for extension installed at runtime has the proper profile directory"
+ );
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_delay_update_webextension.js b/toolkit/mozapps/extensions/test/xpcshell/test_delay_update_webextension.js
new file mode 100644
index 0000000000..8f3706d913
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_delay_update_webextension.js
@@ -0,0 +1,392 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// This verifies that delaying an update works for WebExtensions.
+
+// The test extension uses an insecure update url.
+Services.prefs.setBoolPref(PREF_EM_CHECK_UPDATE_SECURITY, false);
+
+if (AppConstants.platform == "win" && AppConstants.DEBUG) {
+ // Shutdown timing is flaky in this test, and remote extensions
+ // sometimes wind up leaving the XPI locked at the point when we try
+ // to remove it.
+ Services.prefs.setBoolPref("extensions.webextensions.remote", false);
+}
+
+PromiseTestUtils.allowMatchingRejectionsGlobally(
+ /Message manager disconnected/
+);
+
+/* globals browser*/
+
+const profileDir = gProfD.clone();
+profileDir.append("extensions");
+const stageDir = profileDir.clone();
+stageDir.append("staged");
+
+const IGNORE_ID = "test_delay_update_ignore_webext@tests.mozilla.org";
+const COMPLETE_ID = "test_delay_update_complete_webext@tests.mozilla.org";
+const DEFER_ID = "test_delay_update_defer_webext@tests.mozilla.org";
+const NOUPDATE_ID = "test_no_update_webext@tests.mozilla.org";
+
+// Create and configure the HTTP server.
+var testserver = AddonTestUtils.createHttpServer({ hosts: ["example.com"] });
+testserver.registerDirectory("/data/", do_get_file("data"));
+
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "42", "42");
+BootstrapMonitor.init();
+
+const ADDONS = {
+ test_delay_update_complete_webextension_v2: {
+ "manifest.json": {
+ manifest_version: 2,
+ name: "Delay Upgrade",
+ version: "2.0",
+ applications: {
+ gecko: { id: COMPLETE_ID },
+ },
+ },
+ },
+ test_delay_update_defer_webextension_v2: {
+ "manifest.json": {
+ manifest_version: 2,
+ name: "Delay Upgrade",
+ version: "2.0",
+ applications: {
+ gecko: { id: DEFER_ID },
+ },
+ },
+ },
+ test_delay_update_ignore_webextension_v2: {
+ "manifest.json": {
+ manifest_version: 2,
+ name: "Delay Upgrade",
+ version: "2.0",
+ applications: {
+ gecko: { id: IGNORE_ID },
+ },
+ },
+ },
+};
+
+const XPIS = {};
+for (let [name, files] of Object.entries(ADDONS)) {
+ XPIS[name] = AddonTestUtils.createTempXPIFile(files);
+ testserver.registerFile(`/addons/${name}.xpi`, XPIS[name]);
+}
+
+// add-on registers upgrade listener, and ignores update.
+add_task(async function delay_updates_ignore() {
+ await promiseStartupManager();
+
+ let extension = ExtensionTestUtils.loadExtension(
+ {
+ useAddonManager: "permanent",
+ manifest: {
+ version: "1.0",
+ applications: {
+ gecko: {
+ id: IGNORE_ID,
+ update_url: `http://example.com/data/test_delay_updates_ignore.json`,
+ },
+ },
+ },
+ background() {
+ browser.runtime.onUpdateAvailable.addListener(details => {
+ if (details) {
+ if (details.version) {
+ // This should be the version of the pending update.
+ browser.test.assertEq("2.0", details.version, "correct version");
+ browser.test.notifyPass("delay");
+ }
+ } else {
+ browser.test.fail("no details object passed");
+ }
+ });
+ browser.test.sendMessage("ready");
+ },
+ },
+ IGNORE_ID
+ );
+
+ await Promise.all([extension.startup(), extension.awaitMessage("ready")]);
+ BootstrapMonitor.checkInstalled(IGNORE_ID, "1.0");
+
+ let addon = await promiseAddonByID(IGNORE_ID);
+ Assert.notEqual(addon, null);
+ Assert.equal(addon.version, "1.0");
+ Assert.equal(addon.name, "Generated extension");
+ Assert.ok(addon.isCompatible);
+ Assert.ok(!addon.appDisabled);
+ Assert.ok(addon.isActive);
+ Assert.equal(addon.type, "extension");
+
+ let update = await promiseFindAddonUpdates(addon);
+ let install = update.updateAvailable;
+
+ await promiseCompleteAllInstalls([install]);
+
+ Assert.equal(install.state, AddonManager.STATE_POSTPONED);
+ BootstrapMonitor.checkInstalled(IGNORE_ID, "1.0");
+
+ // addon upgrade has been delayed
+ let addon_postponed = await promiseAddonByID(IGNORE_ID);
+ Assert.notEqual(addon_postponed, null);
+ Assert.equal(addon_postponed.version, "1.0");
+ Assert.equal(addon_postponed.name, "Generated extension");
+ Assert.ok(addon_postponed.isCompatible);
+ Assert.ok(!addon_postponed.appDisabled);
+ Assert.ok(addon_postponed.isActive);
+ Assert.equal(addon_postponed.type, "extension");
+
+ await extension.awaitFinish("delay");
+
+ // restarting allows upgrade to proceed
+ await promiseRestartManager();
+
+ let addon_upgraded = await promiseAddonByID(IGNORE_ID);
+ await extension.awaitStartup();
+ BootstrapMonitor.checkUpdated(IGNORE_ID, "2.0");
+
+ Assert.notEqual(addon_upgraded, null);
+ Assert.equal(addon_upgraded.version, "2.0");
+ Assert.equal(addon_upgraded.name, "Delay Upgrade");
+ Assert.ok(addon_upgraded.isCompatible);
+ Assert.ok(!addon_upgraded.appDisabled);
+ Assert.ok(addon_upgraded.isActive);
+ Assert.equal(addon_upgraded.type, "extension");
+
+ await extension.unload();
+ await promiseShutdownManager();
+});
+
+// add-on registers upgrade listener, and allows update.
+add_task(async function delay_updates_complete() {
+ await promiseStartupManager();
+
+ let extension = ExtensionTestUtils.loadExtension(
+ {
+ useAddonManager: "permanent",
+ manifest: {
+ version: "1.0",
+ applications: {
+ gecko: {
+ id: COMPLETE_ID,
+ update_url: `http://example.com/data/test_delay_updates_complete.json`,
+ },
+ },
+ },
+ background() {
+ browser.runtime.onUpdateAvailable.addListener(details => {
+ browser.test.notifyPass("reload");
+ browser.runtime.reload();
+ });
+ browser.test.sendMessage("ready");
+ },
+ },
+ COMPLETE_ID
+ );
+
+ await Promise.all([extension.startup(), extension.awaitMessage("ready")]);
+
+ let addon = await promiseAddonByID(COMPLETE_ID);
+ Assert.notEqual(addon, null);
+ Assert.equal(addon.version, "1.0");
+ Assert.equal(addon.name, "Generated extension");
+ Assert.ok(addon.isCompatible);
+ Assert.ok(!addon.appDisabled);
+ Assert.ok(addon.isActive);
+ Assert.equal(addon.type, "extension");
+
+ let update = await promiseFindAddonUpdates(addon);
+ let install = update.updateAvailable;
+
+ let promiseInstalled = promiseAddonEvent("onInstalled");
+ await promiseCompleteAllInstalls([install]);
+
+ await extension.awaitFinish("reload");
+
+ // addon upgrade has been allowed
+ let [addon_allowed] = await promiseInstalled;
+ await extension.awaitStartup();
+
+ Assert.notEqual(addon_allowed, null);
+ Assert.equal(addon_allowed.version, "2.0");
+ Assert.equal(addon_allowed.name, "Delay Upgrade");
+ Assert.ok(addon_allowed.isCompatible);
+ Assert.ok(!addon_allowed.appDisabled);
+ Assert.ok(addon_allowed.isActive);
+ Assert.equal(addon_allowed.type, "extension");
+
+ await new Promise(executeSoon);
+
+ if (stageDir.exists()) {
+ do_throw(
+ "Staging directory should not exist for formerly-postponed extension"
+ );
+ }
+
+ await extension.unload();
+ await promiseShutdownManager();
+});
+
+// add-on registers upgrade listener, initially defers update then allows upgrade
+add_task(async function delay_updates_defer() {
+ await promiseStartupManager();
+
+ let extension = ExtensionTestUtils.loadExtension(
+ {
+ useAddonManager: "permanent",
+ manifest: {
+ version: "1.0",
+ applications: {
+ gecko: {
+ id: DEFER_ID,
+ update_url: `http://example.com/data/test_delay_updates_defer.json`,
+ },
+ },
+ },
+ background() {
+ browser.runtime.onUpdateAvailable.addListener(details => {
+ // Upgrade will only proceed when "allow" message received.
+ browser.test.onMessage.addListener(msg => {
+ if (msg == "allow") {
+ browser.test.notifyPass("allowed");
+ browser.runtime.reload();
+ } else {
+ browser.test.fail(`wrong message: ${msg}`);
+ }
+ });
+ browser.test.sendMessage("truly ready");
+ });
+ browser.test.sendMessage("ready");
+ },
+ },
+ DEFER_ID
+ );
+
+ await Promise.all([extension.startup(), extension.awaitMessage("ready")]);
+
+ let addon = await promiseAddonByID(DEFER_ID);
+ Assert.notEqual(addon, null);
+ Assert.equal(addon.version, "1.0");
+ Assert.equal(addon.name, "Generated extension");
+ Assert.ok(addon.isCompatible);
+ Assert.ok(!addon.appDisabled);
+ Assert.ok(addon.isActive);
+ Assert.equal(addon.type, "extension");
+
+ let update = await promiseFindAddonUpdates(addon);
+ let install = update.updateAvailable;
+
+ let promiseInstalled = promiseAddonEvent("onInstalled");
+ await promiseCompleteAllInstalls([install]);
+
+ Assert.equal(install.state, AddonManager.STATE_POSTPONED);
+
+ // upgrade is initially postponed
+ let addon_postponed = await promiseAddonByID(DEFER_ID);
+ Assert.notEqual(addon_postponed, null);
+ Assert.equal(addon_postponed.version, "1.0");
+ Assert.equal(addon_postponed.name, "Generated extension");
+ Assert.ok(addon_postponed.isCompatible);
+ Assert.ok(!addon_postponed.appDisabled);
+ Assert.ok(addon_postponed.isActive);
+ Assert.equal(addon_postponed.type, "extension");
+
+ // add-on will not allow upgrade until message is received
+ await extension.awaitMessage("truly ready");
+ extension.sendMessage("allow");
+ await extension.awaitFinish("allowed");
+
+ // addon upgrade has been allowed
+ let [addon_allowed] = await promiseInstalled;
+ await extension.awaitStartup();
+
+ Assert.notEqual(addon_allowed, null);
+ Assert.equal(addon_allowed.version, "2.0");
+ Assert.equal(addon_allowed.name, "Delay Upgrade");
+ Assert.ok(addon_allowed.isCompatible);
+ Assert.ok(!addon_allowed.appDisabled);
+ Assert.ok(addon_allowed.isActive);
+ Assert.equal(addon_allowed.type, "extension");
+
+ await promiseRestartManager();
+
+ // restart changes nothing
+ addon_allowed = await promiseAddonByID(DEFER_ID);
+ await extension.awaitStartup();
+
+ Assert.notEqual(addon_allowed, null);
+ Assert.equal(addon_allowed.version, "2.0");
+ Assert.equal(addon_allowed.name, "Delay Upgrade");
+ Assert.ok(addon_allowed.isCompatible);
+ Assert.ok(!addon_allowed.appDisabled);
+ Assert.ok(addon_allowed.isActive);
+ Assert.equal(addon_allowed.type, "extension");
+
+ await extension.unload();
+ await promiseShutdownManager();
+});
+
+// browser.runtime.reload() without a pending upgrade should just reload.
+add_task(async function runtime_reload() {
+ await promiseStartupManager();
+
+ let extension = ExtensionTestUtils.loadExtension(
+ {
+ useAddonManager: "permanent",
+ manifest: {
+ version: "1.0",
+ applications: {
+ gecko: {
+ id: NOUPDATE_ID,
+ update_url: `http://example.com/data/test_no_update.json`,
+ },
+ },
+ },
+ background() {
+ browser.test.onMessage.addListener(msg => {
+ if (msg == "reload") {
+ browser.runtime.reload();
+ } else {
+ browser.test.fail(`wrong message: ${msg}`);
+ }
+ });
+ browser.test.sendMessage("ready");
+ },
+ },
+ NOUPDATE_ID
+ );
+
+ await Promise.all([extension.startup(), extension.awaitMessage("ready")]);
+
+ let addon = await promiseAddonByID(NOUPDATE_ID);
+ Assert.notEqual(addon, null);
+ Assert.equal(addon.version, "1.0");
+ Assert.equal(addon.name, "Generated extension");
+ Assert.ok(addon.isCompatible);
+ Assert.ok(!addon.appDisabled);
+ Assert.ok(addon.isActive);
+ Assert.equal(addon.type, "extension");
+
+ await promiseFindAddonUpdates(addon);
+
+ extension.sendMessage("reload");
+ // Wait for extension to restart, to make sure reload works.
+ await AddonTestUtils.promiseWebExtensionStartup(NOUPDATE_ID);
+ await extension.awaitMessage("ready");
+
+ addon = await promiseAddonByID(NOUPDATE_ID);
+ Assert.notEqual(addon, null);
+ Assert.equal(addon.version, "1.0");
+ Assert.equal(addon.name, "Generated extension");
+ Assert.ok(addon.isCompatible);
+ Assert.ok(!addon.appDisabled);
+ Assert.ok(addon.isActive);
+ Assert.equal(addon.type, "extension");
+
+ await extension.unload();
+ await promiseShutdownManager();
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_dependencies.js b/toolkit/mozapps/extensions/test/xpcshell/test_dependencies.js
new file mode 100644
index 0000000000..eeadcf696c
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_dependencies.js
@@ -0,0 +1,140 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+const profileDir = gProfD.clone();
+profileDir.append("extensions");
+
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1");
+
+const ADDONS = [
+ {
+ id: "addon1@experiments.addons.mozilla.org",
+ dependencies: ["experiments.addon2"],
+ },
+ {
+ id: "addon2@experiments.addons.mozilla.org",
+ dependencies: ["experiments.addon3"],
+ },
+ {
+ id: "addon3@experiments.addons.mozilla.org",
+ },
+ {
+ id: "addon4@experiments.addons.mozilla.org",
+ },
+ {
+ id: "addon5@experiments.addons.mozilla.org",
+ dependencies: ["experiments.addon2"],
+ },
+];
+
+let addonFiles = [];
+
+let events = [];
+
+function promiseAddonStartup(id) {
+ return new Promise(resolve => {
+ const onBootstrapMethod = (event, { method, params }) => {
+ if (method == "startup" && params.id == id) {
+ AddonTestUtils.off("bootstrap-method", onBootstrapMethod);
+ resolve();
+ }
+ };
+
+ AddonTestUtils.on("bootstrap-method", onBootstrapMethod);
+ });
+}
+
+add_task(async function setup() {
+ await promiseStartupManager();
+
+ const onBootstrapMethod = (event, { method, params }) => {
+ if (method == "startup" || method == "shutdown") {
+ events.push([method, params.id]);
+ }
+ };
+
+ AddonTestUtils.on("bootstrap-method", onBootstrapMethod);
+ registerCleanupFunction(() => {
+ AddonTestUtils.off("bootstrap-method", onBootstrapMethod);
+ });
+
+ for (let addon of ADDONS) {
+ let manifest = {
+ applications: { gecko: { id: addon.id } },
+ permissions: addon.dependencies,
+ };
+
+ addonFiles.push(await createTempWebExtensionFile({ manifest }));
+ }
+});
+
+add_task(async function() {
+ deepEqual(events, [], "Should have no events");
+
+ await promiseInstallFile(addonFiles[3]);
+
+ deepEqual(events, [["startup", ADDONS[3].id]]);
+
+ events.length = 0;
+
+ await promiseInstallFile(addonFiles[0]);
+ deepEqual(events, [], "Should have no events");
+
+ await promiseInstallFile(addonFiles[1]);
+ deepEqual(events, [], "Should have no events");
+
+ await Promise.all([
+ promiseInstallFile(addonFiles[2]),
+ promiseAddonStartup(ADDONS[0].id),
+ ]);
+
+ deepEqual(events, [
+ ["startup", ADDONS[2].id],
+ ["startup", ADDONS[1].id],
+ ["startup", ADDONS[0].id],
+ ]);
+
+ events.length = 0;
+
+ await Promise.all([
+ promiseInstallFile(addonFiles[2]),
+ promiseAddonStartup(ADDONS[0].id),
+ ]);
+
+ deepEqual(events, [
+ ["shutdown", ADDONS[0].id],
+ ["shutdown", ADDONS[1].id],
+ ["shutdown", ADDONS[2].id],
+
+ ["startup", ADDONS[2].id],
+ ["startup", ADDONS[1].id],
+ ["startup", ADDONS[0].id],
+ ]);
+
+ events.length = 0;
+
+ await promiseInstallFile(addonFiles[4]);
+
+ deepEqual(events, [["startup", ADDONS[4].id]]);
+
+ events.length = 0;
+
+ await promiseRestartManager();
+
+ deepEqual(events, [
+ ["shutdown", ADDONS[4].id],
+ ["shutdown", ADDONS[3].id],
+ ["shutdown", ADDONS[0].id],
+ ["shutdown", ADDONS[1].id],
+ ["shutdown", ADDONS[2].id],
+
+ ["startup", ADDONS[2].id],
+ ["startup", ADDONS[1].id],
+ ["startup", ADDONS[0].id],
+ ["startup", ADDONS[3].id],
+ ["startup", ADDONS[4].id],
+ ]);
+
+ await promiseShutdownManager();
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_dictionary_webextension.js b/toolkit/mozapps/extensions/test/xpcshell/test_dictionary_webextension.js
new file mode 100644
index 0000000000..49b1944e45
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_dictionary_webextension.js
@@ -0,0 +1,198 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+"use strict";
+
+XPCOMUtils.defineLazyServiceGetter(
+ this,
+ "spellCheck",
+ "@mozilla.org/spellchecker/engine;1",
+ "mozISpellCheckingEngine"
+);
+
+add_task(async function setup() {
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "61", "61");
+
+ // Initialize the URLPreloader so that we can load the built-in
+ // add-ons list, which contains the list of built-in dictionaries.
+ AddonTestUtils.initializeURLPreloader();
+
+ await promiseStartupManager();
+
+ // Starts collecting the Addon Manager Telemetry events.
+ AddonTestUtils.hookAMTelemetryEvents();
+});
+
+add_task(async function test_validation() {
+ await Assert.rejects(
+ promiseInstallWebExtension({
+ manifest: {
+ applications: {
+ gecko: { id: "en-US-no-dic@dictionaries.mozilla.org" },
+ },
+ dictionaries: {
+ "en-US": "en-US.dic",
+ },
+ },
+ }),
+ /Expected file to be downloaded for install/
+ );
+
+ await Assert.rejects(
+ promiseInstallWebExtension({
+ manifest: {
+ applications: {
+ gecko: { id: "en-US-no-aff@dictionaries.mozilla.org" },
+ },
+ dictionaries: {
+ "en-US": "en-US.dic",
+ },
+ },
+
+ files: {
+ "en-US.dic": "",
+ },
+ }),
+ /Expected file to be downloaded for install/
+ );
+
+ let addon = await promiseInstallWebExtension({
+ manifest: {
+ applications: { gecko: { id: "en-US-1@dictionaries.mozilla.org" } },
+ dictionaries: {
+ "en-US": "en-US.dic",
+ },
+ },
+
+ files: {
+ "en-US.dic": "",
+ "en-US.aff": "",
+ },
+ });
+
+ let addon2 = await promiseInstallWebExtension({
+ manifest: {
+ applications: { gecko: { id: "en-US-2@dictionaries.mozilla.org" } },
+ dictionaries: {
+ "en-US": "dictionaries/en-US.dic",
+ },
+ },
+
+ files: {
+ "dictionaries/en-US.dic": "",
+ "dictionaries/en-US.aff": "",
+ },
+ });
+
+ await addon.uninstall();
+ await addon2.uninstall();
+
+ let amEvents = AddonTestUtils.getAMTelemetryEvents();
+
+ let amInstallEvents = amEvents
+ .filter(evt => evt.method === "install")
+ .map(evt => {
+ const { object, extra } = evt;
+ return { object, extra };
+ });
+
+ Assert.deepEqual(
+ amInstallEvents.filter(evt => evt.object === "unknown"),
+ [
+ {
+ object: "unknown",
+ extra: { step: "started", error: "ERROR_CORRUPT_FILE" },
+ },
+ {
+ object: "unknown",
+ extra: { step: "started", error: "ERROR_CORRUPT_FILE" },
+ },
+ ],
+ "Got the expected install telemetry events for the corrupted dictionaries"
+ );
+
+ Assert.deepEqual(
+ amInstallEvents.filter(evt => evt.extra.addon_id === addon.id),
+ [
+ { object: "dictionary", extra: { step: "started", addon_id: addon.id } },
+ {
+ object: "dictionary",
+ extra: { step: "completed", addon_id: addon.id },
+ },
+ ],
+ "Got the expected install telemetry events for the first installed dictionary"
+ );
+
+ Assert.deepEqual(
+ amInstallEvents.filter(evt => evt.extra.addon_id === addon2.id),
+ [
+ { object: "dictionary", extra: { step: "started", addon_id: addon2.id } },
+ {
+ object: "dictionary",
+ extra: { step: "completed", addon_id: addon2.id },
+ },
+ ],
+ "Got the expected install telemetry events for the second installed dictionary"
+ );
+
+ let amUninstallEvents = amEvents
+ .filter(evt => evt.method === "uninstall")
+ .map(evt => {
+ const { object, value } = evt;
+ return { object, value };
+ });
+
+ Assert.deepEqual(
+ amUninstallEvents,
+ [
+ { object: "dictionary", value: addon.id },
+ { object: "dictionary", value: addon2.id },
+ ],
+ "Got the expected uninstall telemetry events"
+ );
+});
+
+const WORD = "Flehgragh";
+
+add_task(async function test_registration() {
+ spellCheck.dictionary = "en-US";
+
+ ok(!spellCheck.check(WORD), "Word should not pass check before add-on loads");
+
+ let addon = await promiseInstallWebExtension({
+ manifest: {
+ applications: { gecko: { id: "en-US@dictionaries.mozilla.org" } },
+ dictionaries: {
+ "en-US": "en-US.dic",
+ },
+ },
+
+ files: {
+ "en-US.dic": `2\n${WORD}\nnativ/A\n`,
+ "en-US.aff": `
+SFX A Y 1
+SFX A 0 en [^elr]
+ `,
+ },
+ });
+
+ ok(
+ spellCheck.check(WORD),
+ "Word should pass check while add-on load is loaded"
+ );
+ ok(spellCheck.check("nativen"), "Words should have correct affixes");
+
+ await addon.uninstall();
+
+ await new Promise(executeSoon);
+
+ ok(
+ !spellCheck.check(WORD),
+ "Word should not pass check after add-on unloads"
+ );
+});
+
+add_task(function teardown_telemetry_events() {
+ // Ignore any additional telemetry events collected in this file.
+ AddonTestUtils.getAMTelemetryEvents();
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_distribution.js b/toolkit/mozapps/extensions/test/xpcshell/test_distribution.js
new file mode 100644
index 0000000000..17d94f8d94
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_distribution.js
@@ -0,0 +1,115 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// This verifies that add-ons distributed with the application get installed
+// correctly
+
+// Allow distributed add-ons to install
+Services.prefs.setBoolPref("extensions.installDistroAddons", true);
+
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1.9.2");
+
+const profileDir = gProfD.clone();
+profileDir.append("extensions");
+const distroDir = gProfD.clone();
+distroDir.append("distribution");
+distroDir.append("extensions");
+registerDirectory("XREAppDist", distroDir.parent);
+
+async function setOldModificationTime() {
+ // Make sure the installed extension has an old modification time so any
+ // changes will be detected
+ await promiseShutdownManager();
+ let extension = gProfD.clone();
+ extension.append("extensions");
+ extension.append(`${ID}.xpi`);
+ setExtensionModifiedTime(extension, Date.now() - MAKE_FILE_OLD_DIFFERENCE);
+ await promiseStartupManager();
+}
+
+const ID = "addon@tests.mozilla.org";
+
+async function writeDistroAddon(version) {
+ let xpi = await createTempWebExtensionFile({
+ manifest: {
+ version,
+ applications: { gecko: { id: ID } },
+ },
+ });
+ xpi.copyTo(distroDir, `${ID}.xpi`);
+}
+
+// Tests that on the first startup the add-on gets installed
+add_task(async function run_test_1() {
+ await writeDistroAddon("1.0");
+ await promiseStartupManager();
+
+ let a1 = await AddonManager.getAddonByID(ID);
+ Assert.notEqual(a1, null);
+ Assert.equal(a1.version, "1.0");
+ Assert.ok(a1.isActive);
+ Assert.equal(a1.scope, AddonManager.SCOPE_PROFILE);
+ Assert.ok(!a1.foreignInstall);
+});
+
+// Tests that starting with a newer version in the distribution dir doesn't
+// install it yet
+add_task(async function run_test_2() {
+ await setOldModificationTime();
+
+ await writeDistroAddon("2.0");
+ await promiseRestartManager();
+
+ let a1 = await AddonManager.getAddonByID(ID);
+ Assert.notEqual(a1, null);
+ Assert.equal(a1.version, "1.0");
+ Assert.ok(a1.isActive);
+ Assert.equal(a1.scope, AddonManager.SCOPE_PROFILE);
+});
+
+// Test that an app upgrade installs the newer version
+add_task(async function run_test_3() {
+ await promiseRestartManager("2");
+
+ let a1 = await AddonManager.getAddonByID(ID);
+ Assert.notEqual(a1, null);
+ Assert.equal(a1.version, "2.0");
+ Assert.ok(a1.isActive);
+ Assert.equal(a1.scope, AddonManager.SCOPE_PROFILE);
+ Assert.ok(!a1.foreignInstall);
+});
+
+// Test that an app upgrade doesn't downgrade the extension
+add_task(async function run_test_4() {
+ await setOldModificationTime();
+
+ await writeDistroAddon("1.0");
+ await promiseRestartManager("3");
+
+ let a1 = await AddonManager.getAddonByID(ID);
+ Assert.notEqual(a1, null);
+ Assert.equal(a1.version, "2.0");
+ Assert.ok(a1.isActive);
+ Assert.equal(a1.scope, AddonManager.SCOPE_PROFILE);
+});
+
+// Tests that after uninstalling a restart doesn't re-install the extension
+add_task(async function run_test_5() {
+ let a1 = await AddonManager.getAddonByID(ID);
+ await a1.uninstall();
+
+ await promiseRestartManager();
+
+ let a1_2 = await AddonManager.getAddonByID(ID);
+ Assert.equal(a1_2, null);
+});
+
+// Tests that upgrading the application still doesn't re-install the uninstalled
+// extension
+add_task(async function run_test_6() {
+ await promiseRestartManager("4");
+
+ let a1 = await AddonManager.getAddonByID(ID);
+ Assert.equal(a1, null);
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_duplicateplugins.js b/toolkit/mozapps/extensions/test/xpcshell/test_duplicateplugins.js
new file mode 100644
index 0000000000..41f070e2d8
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_duplicateplugins.js
@@ -0,0 +1,160 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// This verifies that duplicate plugins are coalesced and maintain their ID
+// across restarts.
+
+class MockPlugin extends MockPluginTag {
+ constructor(opts) {
+ super(opts, opts.enabledState);
+ this.blocklisted = opts.blocklisted;
+ }
+}
+
+var PLUGINS = [
+ {
+ name: "Duplicate Plugin 1",
+ description: "A duplicate plugin",
+ version: "1",
+ blocklisted: false,
+ enabledState: Ci.nsIPluginTag.STATE_ENABLED,
+ filename: "/home/mozilla/.plugins/dupplugin1.so",
+ },
+ {
+ name: "Duplicate Plugin 1",
+ description: "A duplicate plugin",
+ version: "1",
+ blocklisted: false,
+ enabledState: Ci.nsIPluginTag.STATE_ENABLED,
+ filename: "/usr/lib/plugins/dupplugin1.so",
+ },
+ {
+ name: "Duplicate Plugin 2",
+ description: "Another duplicate plugin",
+ version: "1",
+ blocklisted: false,
+ enabledState: Ci.nsIPluginTag.STATE_ENABLED,
+ filename: "/home/mozilla/.plugins/dupplugin2.so",
+ },
+ {
+ name: "Duplicate Plugin 2",
+ description: "Another duplicate plugin",
+ version: "1",
+ blocklisted: false,
+ enabledState: Ci.nsIPluginTag.STATE_ENABLED,
+ filename: "/usr/lib/plugins/dupplugin2.so",
+ },
+ {
+ name: "Non-duplicate Plugin", // 3
+ description: "Not a duplicate plugin",
+ version: "1",
+ blocklisted: false,
+ enabledState: Ci.nsIPluginTag.STATE_ENABLED,
+ filename: "/home/mozilla/.plugins/dupplugin3.so",
+ },
+ {
+ name: "Non-duplicate Plugin", // 4
+ description: "Not a duplicate because the descriptions are different",
+ version: "1",
+ blocklisted: false,
+ enabledState: Ci.nsIPluginTag.STATE_ENABLED,
+ filename: "/usr/lib/plugins/dupplugin4.so",
+ },
+ {
+ name: "Another Non-duplicate Plugin", // 5
+ description: "Not a duplicate plugin",
+ version: "1",
+ blocklisted: false,
+ enabledState: Ci.nsIPluginTag.STATE_ENABLED,
+ filename: "/home/mozilla/.plugins/dupplugin5.so",
+ },
+].map(opts => new MockPlugin(opts));
+
+mockPluginHost(PLUGINS);
+
+var gPluginIDs = [null, null, null, null, null];
+
+async function run_test() {
+ do_test_pending();
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1.9.2");
+ Services.prefs.setBoolPref("media.gmp-provider.enabled", false);
+
+ await promiseStartupManager();
+
+ run_test_1();
+}
+
+function found_plugin(aNum, aId) {
+ if (gPluginIDs[aNum]) {
+ do_throw("Found duplicate of plugin " + aNum);
+ }
+ gPluginIDs[aNum] = aId;
+}
+
+// Test that the plugins were coalesced and all appear in the returned list
+async function run_test_1() {
+ let aAddons = await AddonManager.getAddonsByTypes(["plugin"]);
+ Assert.equal(aAddons.length, 5);
+ aAddons.forEach(function(aAddon) {
+ if (aAddon.name == "Duplicate Plugin 1") {
+ found_plugin(0, aAddon.id);
+ Assert.equal(aAddon.description, "A duplicate plugin");
+ } else if (aAddon.name == "Duplicate Plugin 2") {
+ found_plugin(1, aAddon.id);
+ Assert.equal(aAddon.description, "Another duplicate plugin");
+ } else if (aAddon.name == "Another Non-duplicate Plugin") {
+ found_plugin(5, aAddon.id);
+ Assert.equal(aAddon.description, "Not a duplicate plugin");
+ } else if (aAddon.name == "Non-duplicate Plugin") {
+ if (aAddon.description == "Not a duplicate plugin") {
+ found_plugin(3, aAddon.id);
+ } else if (
+ aAddon.description ==
+ "Not a duplicate because the descriptions are different"
+ ) {
+ found_plugin(4, aAddon.id);
+ } else {
+ do_throw(
+ "Found unexpected plugin with description " + aAddon.description
+ );
+ }
+ } else {
+ do_throw("Found unexpected plugin " + aAddon.name);
+ }
+ });
+
+ run_test_2();
+}
+
+// Test that disabling a coalesced plugin disables all its tags
+async function run_test_2() {
+ let p = await AddonManager.getAddonByID(gPluginIDs[0]);
+ Assert.ok(!p.userDisabled);
+ await p.disable();
+ Assert.ok(PLUGINS[0].disabled);
+ Assert.ok(PLUGINS[1].disabled);
+
+ executeSoon(run_test_3);
+}
+
+// Test that IDs persist across restart
+async function run_test_3() {
+ await promiseRestartManager();
+
+ let p = await AddonManager.getAddonByID(gPluginIDs[0]);
+ Assert.notEqual(p, null);
+ Assert.equal(p.name, "Duplicate Plugin 1");
+ Assert.equal(p.description, "A duplicate plugin");
+
+ // Reorder the plugins and restart again
+ [PLUGINS[0], PLUGINS[1]] = [PLUGINS[1], PLUGINS[0]];
+ await promiseRestartManager();
+
+ let p_2 = await AddonManager.getAddonByID(gPluginIDs[0]);
+ Assert.notEqual(p_2, null);
+ Assert.equal(p_2.name, "Duplicate Plugin 1");
+ Assert.equal(p_2.description, "A duplicate plugin");
+
+ executeSoon(do_test_finished);
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_embedderDisabled.js b/toolkit/mozapps/extensions/test/xpcshell/test_embedderDisabled.js
new file mode 100644
index 0000000000..91e14f2115
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_embedderDisabled.js
@@ -0,0 +1,128 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+const ADDON_ID = "embedder-disabled@tests.mozilla.org";
+const PREF_IS_EMBEDDED = "extensions.isembedded";
+
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "49");
+
+// Setting PREF_DISABLE_SECURITY tells the policy engine that we are in testing
+// mode and enables restarting the policy engine without restarting the browser.
+registerCleanupFunction(() => {
+ Services.prefs.clearUserPref(PREF_DISABLE_SECURITY);
+ Services.prefs.clearUserPref(PREF_IS_EMBEDDED);
+});
+
+async function installExtension() {
+ return promiseInstallWebExtension({
+ manifest: {
+ applications: { gecko: { id: ADDON_ID } },
+ },
+ });
+}
+
+add_task(async function test_setup() {
+ Services.prefs.setBoolPref(PREF_DISABLE_SECURITY, true);
+ await promiseStartupManager();
+});
+
+add_task(async function embedder_disabled_while_not_embedding() {
+ const addon = await installExtension();
+ let exceptionThrown = false;
+ try {
+ await addon.setEmbedderDisabled(true);
+ } catch (exception) {
+ exceptionThrown = true;
+ }
+
+ equal(exceptionThrown, true);
+
+ // Verify that the addon is not affected
+ equal(addon.isActive, true);
+ equal(addon.embedderDisabled, undefined);
+
+ await addon.uninstall();
+});
+
+add_task(async function unset_embedder_disabled_while_not_embedding() {
+ Services.prefs.setBoolPref(PREF_IS_EMBEDDED, true);
+
+ const addon = await installExtension();
+ await addon.setEmbedderDisabled(true);
+
+ // Verify the addon is not active anymore
+ equal(addon.isActive, false);
+ equal(addon.embedderDisabled, true);
+
+ Services.prefs.setBoolPref(PREF_IS_EMBEDDED, false);
+
+ // Verify that embedder disabled cannot be read if not embedding
+ equal(addon.embedderDisabled, undefined);
+
+ await addon.disable();
+ await addon.enable();
+
+ // Verify that embedder disabled can be removed
+ equal(addon.isActive, true);
+ equal(addon.embedderDisabled, undefined);
+
+ await addon.uninstall();
+});
+
+add_task(async function embedder_disabled_while_embedding() {
+ Services.prefs.setBoolPref(PREF_IS_EMBEDDED, true);
+
+ const addon = await installExtension();
+ await addon.setEmbedderDisabled(true);
+
+ // Verify the addon is not active anymore
+ equal(addon.embedderDisabled, true);
+ equal(addon.isActive, false);
+
+ await addon.setEmbedderDisabled(false);
+
+ // Verify that the addon is now enabled again
+ equal(addon.isActive, true);
+ equal(addon.embedderDisabled, false);
+ await addon.uninstall();
+
+ Services.prefs.setBoolPref(PREF_IS_EMBEDDED, false);
+});
+
+add_task(async function embedder_disabled_while_user_disabled() {
+ Services.prefs.setBoolPref(PREF_IS_EMBEDDED, true);
+
+ const addon = await installExtension();
+ await addon.disable();
+
+ // Verify that the addon is userDisabled
+ equal(addon.isActive, false);
+ equal(addon.userDisabled, true);
+ equal(addon.embedderDisabled, false);
+
+ await addon.setEmbedderDisabled(true);
+
+ // Verify that the addon can be userDisabled and embedderDisabled
+ equal(addon.isActive, false);
+ equal(addon.userDisabled, true);
+ equal(addon.embedderDisabled, true);
+
+ await addon.setEmbedderDisabled(false);
+
+ // Verify that unsetting embedderDisabled doesn't enable the addon
+ equal(addon.isActive, false);
+ equal(addon.userDisabled, true);
+ equal(addon.embedderDisabled, false);
+
+ await addon.enable();
+
+ // Verify that the addon can be enabled after unsetting userDisabled
+ equal(addon.isActive, true);
+ equal(addon.userDisabled, false);
+ equal(addon.embedderDisabled, false);
+
+ await addon.uninstall();
+
+ Services.prefs.setBoolPref(PREF_IS_EMBEDDED, false);
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_error.js b/toolkit/mozapps/extensions/test/xpcshell/test_error.js
new file mode 100644
index 0000000000..d079557f81
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_error.js
@@ -0,0 +1,78 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// Tests that various error conditions are handled correctly
+
+add_task(async function setup() {
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1.9.2");
+
+ await promiseStartupManager();
+});
+
+// Checks that a local file validates ok
+add_task(async function run_test_1() {
+ let xpi = await createTempWebExtensionFile({});
+ let install = await AddonManager.getInstallForFile(xpi);
+ Assert.notEqual(install, null);
+ Assert.equal(install.state, AddonManager.STATE_DOWNLOADED);
+ Assert.equal(install.error, 0);
+
+ install.cancel();
+});
+
+// Checks that a corrupt file shows an error
+add_task(async function run_test_2() {
+ let xpi = AddonTestUtils.allocTempXPIFile();
+ await OS.File.writeAtomic(
+ xpi.path,
+ new TextEncoder().encode("this is not a zip file")
+ );
+
+ let install = await AddonManager.getInstallForFile(xpi);
+ Assert.notEqual(install, null);
+ Assert.equal(install.state, AddonManager.STATE_DOWNLOAD_FAILED);
+ Assert.equal(install.error, AddonManager.ERROR_CORRUPT_FILE);
+});
+
+// Checks that an empty file shows an error
+add_task(async function run_test_3() {
+ let xpi = await AddonTestUtils.createTempXPIFile({});
+ let install = await AddonManager.getInstallForFile(xpi);
+ Assert.notEqual(install, null);
+ Assert.equal(install.state, AddonManager.STATE_DOWNLOAD_FAILED);
+ Assert.equal(install.error, AddonManager.ERROR_CORRUPT_FILE);
+});
+
+// Checks that a file that doesn't match its hash shows an error
+add_task(async function run_test_4() {
+ let xpi = await createTempWebExtensionFile({});
+ let url = Services.io.newFileURI(xpi).spec;
+ let install = await AddonManager.getInstallForURL(url, { hash: "sha1:foo" });
+ Assert.notEqual(install, null);
+ Assert.equal(install.state, AddonManager.STATE_DOWNLOAD_FAILED);
+ Assert.equal(install.error, AddonManager.ERROR_INCORRECT_HASH);
+});
+
+// Checks that a file that doesn't exist shows an error
+add_task(async function run_test_5() {
+ let file = do_get_file("data");
+ file.append("missing.xpi");
+ let install = await AddonManager.getInstallForFile(file);
+ Assert.notEqual(install, null);
+ Assert.equal(install.state, AddonManager.STATE_DOWNLOAD_FAILED);
+ Assert.equal(install.error, AddonManager.ERROR_NETWORK_FAILURE);
+});
+
+// Checks that an add-on with an illegal ID shows an error
+add_task(async function run_test_6() {
+ let xpi = await createTempWebExtensionFile({
+ manifest: {
+ applications: { gecko: { id: "invalid" } },
+ },
+ });
+ let install = await AddonManager.getInstallForFile(xpi);
+ Assert.notEqual(install, null);
+ Assert.equal(install.state, AddonManager.STATE_DOWNLOAD_FAILED);
+ Assert.equal(install.error, AddonManager.ERROR_CORRUPT_FILE);
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_ext_management.js b/toolkit/mozapps/extensions/test/xpcshell/test_ext_management.js
new file mode 100644
index 0000000000..bb2aae4ec6
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_ext_management.js
@@ -0,0 +1,213 @@
+"use strict";
+
+add_task(async function setup() {
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "48", "48");
+ await promiseStartupManager();
+});
+
+/* eslint-disable no-undef */
+// Shared background function for getSelf tests
+function backgroundGetSelf() {
+ browser.management.getSelf().then(
+ extInfo => {
+ let url = browser.extension.getURL("*");
+ extInfo.hostPermissions = extInfo.hostPermissions.filter(i => i != url);
+ extInfo.url = browser.extension.getURL("");
+ browser.test.sendMessage("management-getSelf", extInfo);
+ },
+ error => {
+ browser.test.notifyFail(`getSelf rejected with error: ${error}`);
+ }
+ );
+}
+/* eslint-enable no-undef */
+
+add_task(async function test_management_get_self_complete() {
+ const id = "get_self_test_complete@tests.mozilla.com";
+ const permissions = ["management", "cookies"];
+ const hostPermissions = ["*://example.org/*", "https://foo.example.org/*"];
+
+ let manifest = {
+ applications: {
+ gecko: {
+ id,
+ update_url: "https://updates.mozilla.com/",
+ },
+ },
+ name: "test extension name",
+ short_name: "test extension short name",
+ description: "test extension description",
+ version: "1.0",
+ homepage_url: "http://www.example.com/",
+ options_ui: {
+ page: "get_self_options.html",
+ },
+ icons: {
+ "16": "icons/icon-16.png",
+ "48": "icons/icon-48.png",
+ },
+ permissions: [...permissions, ...hostPermissions],
+ };
+
+ let extension = ExtensionTestUtils.loadExtension({
+ manifest,
+ background: backgroundGetSelf,
+ useAddonManager: "temporary",
+ });
+ await extension.startup();
+ let extInfo = await extension.awaitMessage("management-getSelf");
+
+ equal(extInfo.id, id, "getSelf returned the expected id");
+ equal(
+ extInfo.installType,
+ "development",
+ "getSelf returned the expected installType"
+ );
+ for (let prop of ["name", "description", "version"]) {
+ equal(
+ extInfo[prop],
+ manifest[prop],
+ `getSelf returned the expected ${prop}`
+ );
+ }
+ equal(
+ extInfo.shortName,
+ manifest.short_name,
+ "getSelf returned the expected shortName"
+ );
+ equal(
+ extInfo.mayDisable,
+ true,
+ "getSelf returned the expected value for mayDisable"
+ );
+ equal(
+ extInfo.enabled,
+ true,
+ "getSelf returned the expected value for enabled"
+ );
+ equal(
+ extInfo.homepageUrl,
+ manifest.homepage_url,
+ "getSelf returned the expected homepageUrl"
+ );
+ equal(
+ extInfo.updateUrl,
+ manifest.applications.gecko.update_url,
+ "getSelf returned the expected updateUrl"
+ );
+ ok(
+ extInfo.optionsUrl.endsWith(manifest.options_ui.page),
+ "getSelf returned the expected optionsUrl"
+ );
+ for (let [index, size] of Object.keys(manifest.icons)
+ .sort()
+ .entries()) {
+ let iconUrl = `${extInfo.url}${manifest.icons[size]}`;
+ equal(
+ extInfo.icons[index].size,
+ +size,
+ "getSelf returned the expected icon size"
+ );
+ equal(
+ extInfo.icons[index].url,
+ iconUrl,
+ "getSelf returned the expected icon url"
+ );
+ }
+ deepEqual(
+ extInfo.permissions.sort(),
+ permissions.sort(),
+ "getSelf returned the expected permissions"
+ );
+ deepEqual(
+ extInfo.hostPermissions.sort(),
+ hostPermissions.sort(),
+ "getSelf returned the expected hostPermissions"
+ );
+ equal(
+ extInfo.installType,
+ "development",
+ "getSelf returned the expected installType"
+ );
+ await extension.unload();
+});
+
+add_task(async function test_management_get_self_minimal() {
+ const id = "get_self_test_minimal@tests.mozilla.com";
+
+ let manifest = {
+ applications: {
+ gecko: {
+ id,
+ },
+ },
+ name: "test extension name",
+ version: "1.0",
+ };
+
+ let extension = ExtensionTestUtils.loadExtension({
+ manifest,
+ background: backgroundGetSelf,
+ useAddonManager: "temporary",
+ });
+ await extension.startup();
+ let extInfo = await extension.awaitMessage("management-getSelf");
+
+ equal(extInfo.id, id, "getSelf returned the expected id");
+ equal(
+ extInfo.installType,
+ "development",
+ "getSelf returned the expected installType"
+ );
+ for (let prop of ["name", "version"]) {
+ equal(
+ extInfo[prop],
+ manifest[prop],
+ `getSelf returned the expected ${prop}`
+ );
+ }
+ for (let prop of ["shortName", "description", "optionsUrl"]) {
+ equal(extInfo[prop], "", `getSelf returned the expected ${prop}`);
+ }
+ for (let prop of ["homepageUrl", " updateUrl", "icons"]) {
+ equal(
+ Reflect.getOwnPropertyDescriptor(extInfo, prop),
+ undefined,
+ `getSelf did not return a ${prop} property`
+ );
+ }
+ for (let prop of ["permissions", "hostPermissions"]) {
+ deepEqual(extInfo[prop], [], `getSelf returned the expected ${prop}`);
+ }
+ await extension.unload();
+});
+
+add_task(async function test_management_get_self_permanent() {
+ const id = "get_self_test_permanent@tests.mozilla.com";
+
+ let manifest = {
+ applications: {
+ gecko: {
+ id,
+ },
+ },
+ name: "test extension name",
+ version: "1.0",
+ };
+
+ let extension = ExtensionTestUtils.loadExtension({
+ manifest,
+ background: backgroundGetSelf,
+ useAddonManager: "permanent",
+ });
+ await extension.startup();
+ let extInfo = await extension.awaitMessage("management-getSelf");
+
+ equal(extInfo.id, id, "getSelf returned the expected id");
+ equal(
+ extInfo.installType,
+ "normal",
+ "getSelf returned the expected installType"
+ );
+ await extension.unload();
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_filepointer.js b/toolkit/mozapps/extensions/test/xpcshell/test_filepointer.js
new file mode 100644
index 0000000000..bcb5d5833a
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_filepointer.js
@@ -0,0 +1,327 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// Tests that various operations with file pointers work and do not affect the
+// source files
+
+const ID1 = "addon1@tests.mozilla.org";
+const ID2 = "addon2@tests.mozilla.org";
+
+const profileDir = gProfD.clone();
+profileDir.append("extensions");
+profileDir.create(Ci.nsIFile.DIRECTORY_TYPE, 0o755);
+
+const sourceDir = gProfD.clone();
+sourceDir.append("source");
+
+function promiseWriteWebExtension(path, data) {
+ let files = ExtensionTestCommon.generateFiles(data);
+ return AddonTestUtils.promiseWriteFilesToDir(path, files);
+}
+
+function promiseWritePointer(aId, aName) {
+ let path = OS.Path.join(profileDir.path, aName || aId);
+
+ let target = OS.Path.join(sourceDir.path, do_get_expected_addon_name(aId));
+
+ return OS.File.writeAtomic(path, new TextEncoder().encode(target));
+}
+
+function promiseWriteRelativePointer(aId, aName) {
+ let path = OS.Path.join(profileDir.path, aName || aId);
+
+ let absTarget = sourceDir.clone();
+ absTarget.append(do_get_expected_addon_name(aId));
+
+ let relTarget = absTarget.getRelativeDescriptor(profileDir);
+
+ return OS.File.writeAtomic(path, new TextEncoder().encode(relTarget));
+}
+
+add_task(async function setup() {
+ ok(TEST_UNPACKED, "Pointer files only work with unpacked directories");
+
+ // Unpacked extensions are never signed, so this can only run with
+ // signature checks disabled.
+ Services.prefs.setBoolPref(PREF_XPI_SIGNATURES_REQUIRED, false);
+
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1");
+});
+
+// Tests that installing a new add-on by pointer works
+add_task(async function test_new_pointer_install() {
+ let target = OS.Path.join(sourceDir.path, ID1);
+ await promiseWriteWebExtension(target, {
+ manifest: {
+ version: "1.0",
+ applications: { gecko: { id: ID1 } },
+ },
+ });
+ await promiseWritePointer(ID1);
+ await promiseStartupManager();
+
+ let addon = await AddonManager.getAddonByID(ID1);
+ notEqual(addon, null);
+ equal(addon.version, "1.0");
+
+ let file = getAddonFile(addon);
+ equal(file.parent.path, sourceDir.path);
+
+ let rootUri = do_get_addon_root_uri(sourceDir, ID1);
+ let uri = addon.getResourceURI();
+ equal(uri.spec, rootUri);
+
+ // Check that upgrade is disabled for addons installed by file-pointers.
+ equal(addon.permissions & AddonManager.PERM_CAN_UPGRADE, 0);
+});
+
+// Tests that installing the addon from some other source doesn't clobber
+// the original sources
+add_task(async function test_addon_over_pointer() {
+ let xpi = AddonTestUtils.createTempWebExtensionFile({
+ manifest: {
+ version: "2.0",
+ applications: { gecko: { id: ID1 } },
+ },
+ });
+
+ let install = await AddonManager.getInstallForFile(
+ xpi,
+ "application/x-xpinstall"
+ );
+ await install.install();
+
+ let addon = await AddonManager.getAddonByID(ID1);
+ notEqual(addon, null);
+ equal(addon.version, "2.0");
+
+ let url = addon.getResourceURI();
+ if (url instanceof Ci.nsIJARURI) {
+ url = url.JARFile;
+ }
+ let { file } = url.QueryInterface(Ci.nsIFileURL);
+ equal(file.parent.path, profileDir.path);
+
+ let rootUri = do_get_addon_root_uri(profileDir, ID1);
+ let uri = addon.getResourceURI();
+ equal(uri.spec, rootUri);
+
+ let source = sourceDir.clone();
+ source.append(ID1);
+ ok(source.exists());
+
+ await addon.uninstall();
+});
+
+// Tests that uninstalling doesn't clobber the original sources
+add_task(async function test_uninstall_pointer() {
+ await promiseWritePointer(ID1);
+ await promiseRestartManager();
+
+ let addon = await AddonManager.getAddonByID(ID1);
+ notEqual(addon, null);
+ equal(addon.version, "1.0");
+
+ await addon.uninstall();
+
+ let source = sourceDir.clone();
+ source.append(ID1);
+ ok(source.exists());
+});
+
+// Tests that misnaming a pointer doesn't clobber the sources
+add_task(async function test_bad_pointer() {
+ await promiseWritePointer(ID2, ID1);
+
+ let [a1, a2] = await AddonManager.getAddonsByIDs([ID1, ID2]);
+ equal(a1, null);
+ equal(a2, null);
+
+ let source = sourceDir.clone();
+ source.append(ID1);
+ ok(source.exists());
+
+ let pointer = profileDir.clone();
+ pointer.append(ID2);
+ ok(!pointer.exists());
+});
+
+// Tests that changing the ID of an existing add-on doesn't clobber the sources
+add_task(async function test_bad_pointer_id() {
+ let dir = sourceDir.clone();
+ dir.append(ID1);
+
+ // Make sure the modification time changes enough to be detected.
+ setExtensionModifiedTime(dir, dir.lastModifiedTime - 5000);
+ await promiseWritePointer(ID1);
+ await promiseRestartManager();
+
+ let addon = await AddonManager.getAddonByID(ID1);
+ notEqual(addon, null);
+ equal(addon.version, "1.0");
+
+ await promiseWriteWebExtension(dir.path, {
+ manifest: {
+ version: "1.0",
+ applications: { gecko: { id: ID2 } },
+ },
+ });
+ setExtensionModifiedTime(dir, dir.lastModifiedTime - 5000);
+
+ await promiseRestartManager();
+
+ let [a1, a2] = await AddonManager.getAddonsByIDs([ID1, ID2]);
+ equal(a1, null);
+ equal(a2, null);
+
+ let source = sourceDir.clone();
+ source.append(ID1);
+ ok(source.exists());
+
+ let pointer = profileDir.clone();
+ pointer.append(ID1);
+ ok(!pointer.exists());
+});
+
+// Removing the pointer file should uninstall the add-on
+add_task(async function test_remove_pointer() {
+ let dir = sourceDir.clone();
+ dir.append(ID1);
+
+ await promiseWriteWebExtension(dir.path, {
+ manifest: {
+ version: "1.0",
+ applications: { gecko: { id: ID1 } },
+ },
+ });
+
+ setExtensionModifiedTime(dir, dir.lastModifiedTime - 5000);
+ await promiseWritePointer(ID1);
+
+ await promiseRestartManager();
+
+ let addon = await AddonManager.getAddonByID(ID1);
+ notEqual(addon, null);
+ equal(addon.version, "1.0");
+
+ let pointer = profileDir.clone();
+ pointer.append(ID1);
+ pointer.remove(false);
+
+ await promiseRestartManager();
+
+ addon = await AddonManager.getAddonByID(ID1);
+ equal(addon, null);
+});
+
+// Removing the pointer file and replacing it with a directory should work
+add_task(async function test_replace_pointer() {
+ await promiseWritePointer(ID1);
+ await promiseRestartManager();
+
+ let addon = await AddonManager.getAddonByID(ID1);
+ notEqual(addon, null);
+ equal(addon.version, "1.0");
+
+ let pointer = profileDir.clone();
+ pointer.append(ID1);
+ pointer.remove(false);
+
+ await promiseWriteWebExtension(OS.Path.join(profileDir.path, ID1), {
+ manifest: {
+ version: "2.0",
+ applications: { gecko: { id: ID1 } },
+ },
+ });
+
+ await promiseRestartManager();
+
+ addon = await AddonManager.getAddonByID(ID1);
+ notEqual(addon, null);
+ equal(addon.version, "2.0");
+
+ await addon.uninstall();
+});
+
+// Changes to the source files should be detected
+add_task(async function test_change_pointer_sources() {
+ await promiseWritePointer(ID1);
+ await promiseRestartManager();
+
+ let addon = await AddonManager.getAddonByID(ID1);
+ notEqual(addon, null);
+ equal(addon.version, "1.0");
+
+ let dir = sourceDir.clone();
+ dir.append(ID1);
+ await promiseWriteWebExtension(dir.path, {
+ manifest: {
+ version: "2.0",
+ applications: { gecko: { id: ID1 } },
+ },
+ });
+ setExtensionModifiedTime(dir, dir.lastModifiedTime - 5000);
+
+ await promiseRestartManager();
+
+ addon = await AddonManager.getAddonByID(ID1);
+ notEqual(addon, null);
+ equal(addon.version, "2.0");
+
+ await addon.uninstall();
+});
+
+// Removing the add-on the pointer file points at should uninstall the add-on
+add_task(async function test_remove_pointer_target() {
+ let target = OS.Path.join(sourceDir.path, ID1);
+ await promiseWriteWebExtension(target, {
+ manifest: {
+ version: "1.0",
+ applications: { gecko: { id: ID1 } },
+ },
+ });
+ await promiseWritePointer(ID1);
+ await promiseRestartManager();
+
+ let addon = await AddonManager.getAddonByID(ID1);
+ notEqual(addon, null);
+ equal(addon.version, "1.0");
+
+ await OS.File.removeDir(target);
+
+ await promiseRestartManager();
+
+ addon = await AddonManager.getAddonByID(ID1);
+ equal(addon, null);
+
+ let pointer = profileDir.clone();
+ pointer.append(ID1);
+ ok(!pointer.exists());
+});
+
+// Tests that installing a new add-on by pointer with a relative path works
+add_task(async function test_new_relative_pointer() {
+ let target = OS.Path.join(sourceDir.path, ID1);
+ await promiseWriteWebExtension(target, {
+ manifest: {
+ version: "1.0",
+ applications: { gecko: { id: ID1 } },
+ },
+ });
+ await promiseWriteRelativePointer(ID1);
+ await promiseRestartManager();
+
+ let addon = await AddonManager.getAddonByID(ID1);
+ equal(addon.version, "1.0");
+
+ let { file } = addon.getResourceURI().QueryInterface(Ci.nsIFileURL);
+ equal(file.parent.path, sourceDir.path);
+
+ let rootUri = do_get_addon_root_uri(sourceDir, ID1);
+ let uri = addon.getResourceURI();
+ equal(uri.spec, rootUri);
+
+ // Check that upgrade is disabled for addons installed by file-pointers.
+ equal(addon.permissions & AddonManager.PERM_CAN_UPGRADE, 0);
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_general.js b/toolkit/mozapps/extensions/test/xpcshell/test_general.js
new file mode 100644
index 0000000000..19d6ae4fb6
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_general.js
@@ -0,0 +1,59 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// This just verifies that the EM can actually startup and shutdown a few times
+// without any errors
+
+// We have to look up how many add-ons are present since there will be plugins
+// etc. detected
+var gCount;
+
+async function run_test() {
+ do_test_pending();
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1.9.2");
+ // Otherwise the plugins get initialized async and throw off our
+ // counting.
+ Services.prefs.setBoolPref("plugin.load_flash_only", false);
+ // plugin.load_flash_only is only respected if xpc::IsInAutomation is true.
+ // This is not the case by default in xpcshell tests, unless the following
+ // pref is also set. Fixing this generically is bug 1598804
+ Services.prefs.setBoolPref(
+ "security.turn_off_all_security_so_that_viruses_can_take_over_this_computer",
+ true
+ );
+
+ await promiseStartupManager();
+ let list = await AddonManager.getAddonsByTypes(null);
+ gCount = list.length;
+
+ executeSoon(run_test_1);
+}
+
+async function run_test_1() {
+ await promiseRestartManager();
+
+ let addons = await AddonManager.getAddonsByTypes(null);
+ Assert.equal(gCount, addons.length);
+
+ executeSoon(run_test_2);
+}
+
+async function run_test_2() {
+ await promiseShutdownManager();
+
+ await promiseStartupManager();
+
+ let addons = await AddonManager.getAddonsByTypes(null);
+ Assert.equal(gCount, addons.length);
+
+ executeSoon(run_test_3);
+}
+
+async function run_test_3() {
+ await promiseRestartManager();
+
+ let addons = await AddonManager.getAddonsByTypes(null);
+ Assert.equal(gCount, addons.length);
+ do_test_finished();
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_getInstallSourceFromHost.js b/toolkit/mozapps/extensions/test/xpcshell/test_getInstallSourceFromHost.js
new file mode 100644
index 0000000000..e1124ed022
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_getInstallSourceFromHost.js
@@ -0,0 +1,42 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+add_task(function test_getInstallSourceFromHost_helpers() {
+ const sourceHostTestCases = [
+ {
+ host: "addons.allizom.org",
+ installSourceFromHost: "test-host",
+ },
+ {
+ host: "addons.mozilla.org",
+ installSourceFromHost: "amo",
+ },
+ {
+ host: "discovery.addons.mozilla.org",
+ installSourceFromHost: "disco",
+ },
+ {
+ host: "about:blank",
+ installSourceFromHost: "unknown",
+ },
+ {
+ host: "fake-extension-uuid",
+ installSourceFromHost: "unknown",
+ },
+ {
+ host: null,
+ installSourceFromHost: "unknown",
+ },
+ ];
+
+ for (let testCase of sourceHostTestCases) {
+ let { host, installSourceFromHost } = testCase;
+
+ equal(
+ AddonManager.getInstallSourceFromHost(host),
+ installSourceFromHost,
+ `Got the expected result from getInstallFromHost for host ${host}`
+ );
+ }
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_gmpProvider.js b/toolkit/mozapps/extensions/test/xpcshell/test_gmpProvider.js
new file mode 100644
index 0000000000..5a970f54a8
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_gmpProvider.js
@@ -0,0 +1,507 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/ */
+
+"use strict";
+
+var GMPScope = ChromeUtils.import(
+ "resource://gre/modules/addons/GMPProvider.jsm",
+ null
+);
+const { UpdateUtils } = ChromeUtils.import(
+ "resource://gre/modules/UpdateUtils.jsm"
+);
+
+XPCOMUtils.defineLazyGetter(this, "pluginsBundle", () =>
+ Services.strings.createBundle("chrome://global/locale/plugins.properties")
+);
+
+var gMockAddons = new Map();
+var gMockEmeAddons = new Map();
+
+for (let plugin of GMPScope.GMP_PLUGINS) {
+ let mockAddon = Object.freeze({
+ id: plugin.id,
+ isValid: true,
+ isInstalled: false,
+ nameId: plugin.name,
+ descriptionId: plugin.description,
+ missingKey: plugin.missingKey,
+ missingFilesKey: plugin.missingFilesKey,
+ });
+ gMockAddons.set(mockAddon.id, mockAddon);
+ if (
+ mockAddon.id == "gmp-widevinecdm" ||
+ mockAddon.id.indexOf("gmp-eme-") == 0
+ ) {
+ gMockEmeAddons.set(mockAddon.id, mockAddon);
+ }
+}
+
+var gInstalledAddonId = "";
+var gPrefs = Services.prefs;
+var gGetKey = GMPScope.GMPPrefs.getPrefKey;
+
+function MockGMPInstallManager() {}
+
+MockGMPInstallManager.prototype = {
+ checkForAddons: () =>
+ Promise.resolve({
+ usedFallback: true,
+ addons: [...gMockAddons.values()],
+ }),
+
+ installAddon: addon => {
+ gInstalledAddonId = addon.id;
+ return Promise.resolve();
+ },
+};
+
+add_task(async function setup() {
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1.9.2");
+
+ // The GMPProvider does not register until the first content process
+ // is launched, so we simulate that by firing this notification.
+ Services.obs.notifyObservers(null, "ipc:first-content-process-created");
+
+ await promiseStartupManager();
+
+ gPrefs.setBoolPref(GMPScope.GMPPrefs.KEY_LOGGING_DUMP, true);
+ gPrefs.setIntPref(GMPScope.GMPPrefs.KEY_LOGGING_LEVEL, 0);
+ gPrefs.setBoolPref(GMPScope.GMPPrefs.KEY_EME_ENABLED, true);
+ for (let addon of gMockAddons.values()) {
+ gPrefs.setBoolPref(
+ gGetKey(GMPScope.GMPPrefs.KEY_PLUGIN_VISIBLE, addon.id),
+ true
+ );
+ gPrefs.setBoolPref(
+ gGetKey(GMPScope.GMPPrefs.KEY_PLUGIN_FORCE_SUPPORTED, addon.id),
+ true
+ );
+ }
+});
+
+add_task(async function init() {
+ await GMPScope.GMPProvider.shutdown();
+ GMPScope.GMPProvider.startup();
+});
+
+add_task(async function test_notInstalled() {
+ for (let addon of gMockAddons.values()) {
+ gPrefs.setCharPref(
+ gGetKey(GMPScope.GMPPrefs.KEY_PLUGIN_VERSION, addon.id),
+ ""
+ );
+ gPrefs.setBoolPref(
+ gGetKey(GMPScope.GMPPrefs.KEY_PLUGIN_ENABLED, addon.id),
+ false
+ );
+ }
+
+ let addons = await promiseAddonsByIDs([...gMockAddons.keys()]);
+ Assert.equal(addons.length, gMockAddons.size);
+
+ for (let addon of addons) {
+ Assert.ok(!addon.isInstalled);
+ Assert.equal(addon.type, "plugin");
+ Assert.equal(addon.version, "");
+
+ let mockAddon = gMockAddons.get(addon.id);
+
+ Assert.notEqual(mockAddon, null);
+ let name = pluginsBundle.GetStringFromName(mockAddon.nameId);
+ Assert.equal(addon.name, name);
+ let description = pluginsBundle.GetStringFromName(mockAddon.descriptionId);
+ Assert.equal(addon.description, description);
+
+ Assert.ok(!addon.isActive);
+ Assert.ok(!addon.appDisabled);
+ Assert.ok(addon.userDisabled);
+
+ Assert.equal(
+ addon.blocklistState,
+ Ci.nsIBlocklistService.STATE_NOT_BLOCKED
+ );
+ Assert.equal(addon.scope, AddonManager.SCOPE_APPLICATION);
+ Assert.equal(addon.pendingOperations, AddonManager.PENDING_NONE);
+ Assert.equal(addon.operationsRequiringRestart, AddonManager.PENDING_NONE);
+
+ Assert.equal(
+ addon.permissions,
+ AddonManager.PERM_CAN_UPGRADE | AddonManager.PERM_CAN_ENABLE
+ );
+
+ Assert.equal(addon.updateDate, null);
+
+ Assert.ok(addon.isCompatible);
+ Assert.ok(addon.isPlatformCompatible);
+ Assert.ok(addon.providesUpdatesSecurely);
+ Assert.ok(!addon.foreignInstall);
+
+ let mimetypes = addon.pluginMimeTypes;
+ Assert.ok(mimetypes);
+ Assert.equal(mimetypes.length, 0);
+ let libraries = addon.pluginLibraries;
+ Assert.ok(libraries);
+ Assert.equal(libraries.length, 0);
+ Assert.equal(addon.pluginFullpath, "");
+ }
+});
+
+add_task(async function test_installed() {
+ const TEST_DATE = new Date(2013, 0, 1, 12);
+ const TEST_VERSION = "1.2.3.4";
+ const TEST_TIME_SEC = Math.round(TEST_DATE.getTime() / 1000);
+
+ let addons = await promiseAddonsByIDs([...gMockAddons.keys()]);
+ Assert.equal(addons.length, gMockAddons.size);
+
+ for (let addon of addons) {
+ let mockAddon = gMockAddons.get(addon.id);
+ Assert.notEqual(mockAddon, null);
+
+ let file = Services.dirsvc.get("ProfD", Ci.nsIFile);
+ file.append(addon.id);
+ file.append(TEST_VERSION);
+ gPrefs.setBoolPref(
+ gGetKey(GMPScope.GMPPrefs.KEY_PLUGIN_ENABLED, mockAddon.id),
+ false
+ );
+ gPrefs.setIntPref(
+ gGetKey(GMPScope.GMPPrefs.KEY_PLUGIN_LAST_UPDATE, mockAddon.id),
+ TEST_TIME_SEC
+ );
+ gPrefs.setCharPref(
+ gGetKey(GMPScope.GMPPrefs.KEY_PLUGIN_VERSION, mockAddon.id),
+ TEST_VERSION
+ );
+
+ Assert.ok(addon.isInstalled);
+ Assert.equal(addon.type, "plugin");
+ Assert.ok(!addon.isActive);
+ Assert.ok(!addon.appDisabled);
+ Assert.ok(addon.userDisabled);
+
+ let name = pluginsBundle.GetStringFromName(mockAddon.nameId);
+ Assert.equal(addon.name, name);
+ Assert.equal(addon.version, TEST_VERSION);
+
+ Assert.equal(
+ addon.permissions,
+ AddonManager.PERM_CAN_UPGRADE | AddonManager.PERM_CAN_ENABLE
+ );
+
+ Assert.equal(addon.updateDate.getTime(), TEST_TIME_SEC * 1000);
+
+ let mimetypes = addon.pluginMimeTypes;
+ Assert.ok(mimetypes);
+ Assert.equal(mimetypes.length, 0);
+ let libraries = addon.pluginLibraries;
+ Assert.ok(libraries);
+ Assert.equal(libraries.length, 1);
+ Assert.equal(libraries[0], TEST_VERSION);
+ let fullpath = addon.pluginFullpath;
+ Assert.equal(fullpath.length, 1);
+ Assert.equal(fullpath[0], file.path);
+ }
+});
+
+add_task(async function test_enable() {
+ let addons = await promiseAddonsByIDs([...gMockAddons.keys()]);
+ Assert.equal(addons.length, gMockAddons.size);
+
+ for (let addon of addons) {
+ gPrefs.setBoolPref(
+ gGetKey(GMPScope.GMPPrefs.KEY_PLUGIN_ENABLED, addon.id),
+ true
+ );
+
+ Assert.ok(addon.isActive);
+ Assert.ok(!addon.appDisabled);
+ Assert.ok(!addon.userDisabled);
+
+ Assert.equal(
+ addon.permissions,
+ AddonManager.PERM_CAN_UPGRADE | AddonManager.PERM_CAN_DISABLE
+ );
+ }
+});
+
+add_task(async function test_globalEmeDisabled() {
+ let addons = await promiseAddonsByIDs([...gMockEmeAddons.keys()]);
+ Assert.equal(addons.length, gMockEmeAddons.size);
+
+ gPrefs.setBoolPref(GMPScope.GMPPrefs.KEY_EME_ENABLED, false);
+ await GMPScope.GMPProvider.shutdown();
+ GMPScope.GMPProvider.startup();
+ for (let addon of addons) {
+ Assert.ok(!addon.isActive);
+ Assert.ok(addon.appDisabled);
+ Assert.ok(!addon.userDisabled);
+
+ Assert.equal(addon.permissions, 0);
+ }
+ gPrefs.setBoolPref(GMPScope.GMPPrefs.KEY_EME_ENABLED, true);
+ await GMPScope.GMPProvider.shutdown();
+ GMPScope.GMPProvider.startup();
+});
+
+add_task(async function test_autoUpdatePrefPersistance() {
+ let addons = await promiseAddonsByIDs([...gMockAddons.keys()]);
+ Assert.equal(addons.length, gMockAddons.size);
+
+ for (let addon of addons) {
+ let autoupdateKey = gGetKey(
+ GMPScope.GMPPrefs.KEY_PLUGIN_AUTOUPDATE,
+ addon.id
+ );
+ gPrefs.clearUserPref(autoupdateKey);
+
+ addon.applyBackgroundUpdates = AddonManager.AUTOUPDATE_DISABLE;
+ Assert.ok(!gPrefs.getBoolPref(autoupdateKey));
+
+ addon.applyBackgroundUpdates = AddonManager.AUTOUPDATE_ENABLE;
+ Assert.equal(addon.applyBackgroundUpdates, AddonManager.AUTOUPDATE_ENABLE);
+ Assert.ok(gPrefs.getBoolPref(autoupdateKey));
+
+ addon.applyBackgroundUpdates = AddonManager.AUTOUPDATE_DEFAULT;
+ Assert.ok(!gPrefs.prefHasUserValue(autoupdateKey));
+ }
+});
+
+function createMockPluginFilesIfNeeded(aFile, aPluginId) {
+ function createFile(aFileName) {
+ let f = aFile.clone();
+ f.append(aFileName);
+ if (!f.exists()) {
+ f.create(Ci.nsIFile.NORMAL_FILE_TYPE, FileUtils.PERMS_FILE);
+ }
+ }
+
+ let id = aPluginId.substring(4);
+ let libName = AppConstants.DLL_PREFIX + id + AppConstants.DLL_SUFFIX;
+
+ createFile(libName);
+ if (aPluginId == "gmp-widevinecdm") {
+ createFile("manifest.json");
+ } else {
+ createFile(id + ".info");
+ }
+ if (aPluginId == "gmp-eme-adobe") {
+ createFile(id + ".voucher");
+ }
+}
+
+// Array.includes() is only in Nightly channel, so polyfill so we don't fail
+// on other branches.
+if (![].includes) {
+ Array.prototype.includes = function(element) {
+ return Object(this).includes(element);
+ };
+}
+
+add_task(async function test_pluginRegistration() {
+ const TEST_VERSION = "1.2.3.4";
+
+ let profD = do_get_profile();
+ for (let addon of gMockAddons.values()) {
+ let file = profD.clone();
+ file.append(addon.id);
+ file.append(TEST_VERSION);
+
+ let addedPaths = [];
+ let removedPaths = [];
+ let clearPaths = () => {
+ addedPaths = [];
+ removedPaths = [];
+ };
+
+ let MockGMPService = {
+ addPluginDirectory: path => {
+ if (!addedPaths.includes(path)) {
+ addedPaths.push(path);
+ }
+ },
+ removePluginDirectory: path => {
+ if (!removedPaths.includes(path)) {
+ removedPaths.push(path);
+ }
+ },
+ removeAndDeletePluginDirectory: path => {
+ if (!removedPaths.includes(path)) {
+ removedPaths.push(path);
+ }
+ },
+ };
+ GMPScope.gmpService = MockGMPService;
+
+ gPrefs.setBoolPref(
+ gGetKey(GMPScope.GMPPrefs.KEY_PLUGIN_ENABLED, addon.id),
+ true
+ );
+
+ // Test that plugin registration fails if the plugin dynamic library and
+ // info files are not present.
+ gPrefs.setCharPref(
+ gGetKey(GMPScope.GMPPrefs.KEY_PLUGIN_VERSION, addon.id),
+ TEST_VERSION
+ );
+ clearPaths();
+ await promiseRestartManager();
+ Assert.equal(addedPaths.indexOf(file.path), -1);
+ Assert.deepEqual(removedPaths, [file.path]);
+
+ // Create dummy GMP library/info files, and test that plugin registration
+ // succeeds during startup, now that we've added GMP info/lib files.
+ createMockPluginFilesIfNeeded(file, addon.id);
+
+ gPrefs.setCharPref(
+ gGetKey(GMPScope.GMPPrefs.KEY_PLUGIN_VERSION, addon.id),
+ TEST_VERSION
+ );
+ clearPaths();
+ await promiseRestartManager();
+ Assert.notEqual(addedPaths.indexOf(file.path), -1);
+ Assert.deepEqual(removedPaths, []);
+
+ // Setting the ABI to something invalid should cause plugin to be removed at startup.
+ clearPaths();
+ gPrefs.setCharPref(
+ gGetKey(GMPScope.GMPPrefs.KEY_PLUGIN_ABI, addon.id),
+ "invalid-ABI"
+ );
+ await promiseRestartManager();
+ Assert.equal(addedPaths.indexOf(file.path), -1);
+ Assert.deepEqual(removedPaths, [file.path]);
+
+ // Setting the ABI to expected ABI should cause registration at startup.
+ clearPaths();
+ gPrefs.setCharPref(
+ gGetKey(GMPScope.GMPPrefs.KEY_PLUGIN_VERSION, addon.id),
+ TEST_VERSION
+ );
+ gPrefs.setCharPref(
+ gGetKey(GMPScope.GMPPrefs.KEY_PLUGIN_ABI, addon.id),
+ UpdateUtils.ABI
+ );
+ await promiseRestartManager();
+ Assert.notEqual(addedPaths.indexOf(file.path), -1);
+ Assert.deepEqual(removedPaths, []);
+
+ // Check that clearing the version doesn't trigger registration.
+ clearPaths();
+ gPrefs.clearUserPref(
+ gGetKey(GMPScope.GMPPrefs.KEY_PLUGIN_VERSION, addon.id)
+ );
+ Assert.deepEqual(addedPaths, []);
+ Assert.deepEqual(removedPaths, [file.path]);
+
+ // Restarting with no version set should not trigger registration.
+ clearPaths();
+ await promiseRestartManager();
+ Assert.equal(addedPaths.indexOf(file.path), -1);
+ Assert.equal(removedPaths.indexOf(file.path), -1);
+
+ // Changing the pref mid-session should cause unregistration and registration.
+ gPrefs.setCharPref(
+ gGetKey(GMPScope.GMPPrefs.KEY_PLUGIN_VERSION, addon.id),
+ TEST_VERSION
+ );
+ clearPaths();
+ const TEST_VERSION_2 = "5.6.7.8";
+ let file2 = Services.dirsvc.get("ProfD", Ci.nsIFile);
+ file2.append(addon.id);
+ file2.append(TEST_VERSION_2);
+ gPrefs.setCharPref(
+ gGetKey(GMPScope.GMPPrefs.KEY_PLUGIN_VERSION, addon.id),
+ TEST_VERSION_2
+ );
+ Assert.deepEqual(addedPaths, [file2.path]);
+ Assert.deepEqual(removedPaths, [file.path]);
+
+ // Disabling the plugin should cause unregistration.
+ gPrefs.setCharPref(
+ gGetKey(GMPScope.GMPPrefs.KEY_PLUGIN_VERSION, addon.id),
+ TEST_VERSION
+ );
+ clearPaths();
+ gPrefs.setBoolPref(
+ gGetKey(GMPScope.GMPPrefs.KEY_PLUGIN_ENABLED, addon.id),
+ false
+ );
+ Assert.deepEqual(addedPaths, []);
+ Assert.deepEqual(removedPaths, [file.path]);
+
+ // Restarting with the plugin disabled should not cause registration.
+ clearPaths();
+ await promiseRestartManager();
+ Assert.equal(addedPaths.indexOf(file.path), -1);
+ Assert.equal(removedPaths.indexOf(file.path), -1);
+
+ // Re-enabling the plugin should cause registration.
+ clearPaths();
+ gPrefs.setBoolPref(
+ gGetKey(GMPScope.GMPPrefs.KEY_PLUGIN_ENABLED, addon.id),
+ true
+ );
+ Assert.deepEqual(addedPaths, [file.path]);
+ Assert.deepEqual(removedPaths, []);
+ GMPScope = ChromeUtils.import(
+ "resource://gre/modules/addons/GMPProvider.jsm",
+ null
+ );
+ }
+});
+
+add_task(async function test_periodicUpdate() {
+ Object.defineProperty(GMPScope, "GMPInstallManager", {
+ value: MockGMPInstallManager,
+ writable: true,
+ enumerable: true,
+ configurable: true,
+ });
+
+ let addons = await promiseAddonsByIDs([...gMockAddons.keys()]);
+ Assert.equal(addons.length, gMockAddons.size);
+
+ for (let addon of addons) {
+ gPrefs.clearUserPref(
+ gGetKey(GMPScope.GMPPrefs.KEY_PLUGIN_AUTOUPDATE, addon.id)
+ );
+
+ addon.applyBackgroundUpdates = AddonManager.AUTOUPDATE_DISABLE;
+ gPrefs.setIntPref(GMPScope.GMPPrefs.KEY_UPDATE_LAST_CHECK, 0);
+ let result = await addon.findUpdates(
+ {},
+ AddonManager.UPDATE_WHEN_PERIODIC_UPDATE
+ );
+ Assert.strictEqual(result, false);
+
+ addon.applyBackgroundUpdates = AddonManager.AUTOUPDATE_ENABLE;
+ gPrefs.setIntPref(
+ GMPScope.GMPPrefs.KEY_UPDATE_LAST_CHECK,
+ Date.now() / 1000 - 60
+ );
+ result = await addon.findUpdates(
+ {},
+ AddonManager.UPDATE_WHEN_PERIODIC_UPDATE
+ );
+ Assert.strictEqual(result, false);
+
+ gPrefs.setIntPref(
+ GMPScope.GMPPrefs.KEY_UPDATE_LAST_CHECK,
+ Date.now() / 1000 - 2 * GMPScope.SEC_IN_A_DAY
+ );
+ gInstalledAddonId = "";
+ result = await addon.findUpdates(
+ {},
+ AddonManager.UPDATE_WHEN_PERIODIC_UPDATE
+ );
+ Assert.strictEqual(result, true);
+ Assert.equal(gInstalledAddonId, addon.id);
+ }
+
+ GMPScope = ChromeUtils.import(
+ "resource://gre/modules/addons/GMPProvider.jsm",
+ null
+ );
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_harness.js b/toolkit/mozapps/extensions/test/xpcshell/test_harness.js
new file mode 100644
index 0000000000..8be3cdcf22
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_harness.js
@@ -0,0 +1,13 @@
+"use strict";
+
+// Test that the test harness is sane.
+
+// Test that the temporary directory is actually overridden in the
+// directory service.
+add_task(async function test_TmpD_override() {
+ equal(
+ FileUtils.getDir("TmpD", []).path,
+ AddonTestUtils.tempDir.path,
+ "Should get the correct temporary directory from the directory service"
+ );
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_hidden.js b/toolkit/mozapps/extensions/test/xpcshell/test_hidden.js
new file mode 100644
index 0000000000..f9e8ddd295
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_hidden.js
@@ -0,0 +1,58 @@
+add_task(async function test_hidden() {
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "2");
+ AddonTestUtils.usePrivilegedSignatures = id => id.startsWith("privileged");
+
+ await promiseStartupManager();
+
+ let xpi1 = createTempWebExtensionFile({
+ manifest: {
+ applications: {
+ gecko: {
+ id: "privileged@tests.mozilla.org",
+ },
+ },
+
+ name: "Hidden Extension",
+ hidden: true,
+ },
+ });
+
+ let xpi2 = createTempWebExtensionFile({
+ manifest: {
+ applications: {
+ gecko: {
+ id: "unprivileged@tests.mozilla.org",
+ },
+ },
+
+ name: "Non-Hidden Extension",
+ hidden: true,
+ },
+ });
+
+ await promiseInstallAllFiles([xpi1, xpi2]);
+
+ let [addon1, addon2] = await promiseAddonsByIDs([
+ "privileged@tests.mozilla.org",
+ "unprivileged@tests.mozilla.org",
+ ]);
+
+ ok(addon1.isPrivileged, "Privileged is privileged");
+ ok(addon1.hidden, "Privileged extension should be hidden");
+ ok(!addon2.isPrivileged, "Unprivileged extension is not privileged");
+ ok(!addon2.hidden, "Unprivileged extension should not be hidden");
+
+ await promiseRestartManager();
+
+ [addon1, addon2] = await promiseAddonsByIDs([
+ "privileged@tests.mozilla.org",
+ "unprivileged@tests.mozilla.org",
+ ]);
+
+ ok(addon1.isPrivileged, "Privileged is privileged");
+ ok(addon1.hidden, "Privileged extension should be hidden");
+ ok(!addon2.isPrivileged, "Unprivileged extension is not privileged");
+ ok(!addon2.hidden, "Unprivileged extension should not be hidden");
+
+ await promiseShutdownManager();
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_install.js b/toolkit/mozapps/extensions/test/xpcshell/test_install.js
new file mode 100644
index 0000000000..540c5f585c
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_install.js
@@ -0,0 +1,1050 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+var testserver = createHttpServer({ hosts: ["example.com"] });
+var gInstallDate;
+
+const ADDONS = {
+ test_install1: {
+ manifest: {
+ name: "Test 1",
+ version: "1.0",
+ applications: { gecko: { id: "addon1@tests.mozilla.org" } },
+ },
+ },
+ test_install2_1: {
+ manifest: {
+ name: "Test 2",
+ version: "2.0",
+ applications: { gecko: { id: "addon2@tests.mozilla.org" } },
+ },
+ },
+ test_install2_2: {
+ manifest: {
+ name: "Test 2",
+ version: "3.0",
+ applications: { gecko: { id: "addon2@tests.mozilla.org" } },
+ },
+ },
+ test_install3: {
+ manifest: {
+ name: "Test 3",
+ version: "1.0",
+ applications: {
+ gecko: {
+ id: "addon3@tests.mozilla.org",
+ strict_min_version: "0",
+ strict_max_version: "0",
+ update_url: "http://example.com/update.json",
+ },
+ },
+ },
+ },
+};
+
+const XPIS = {};
+
+// The test extension uses an insecure update url.
+Services.prefs.setBoolPref(PREF_EM_CHECK_UPDATE_SECURITY, false);
+Services.prefs.setBoolPref(PREF_EM_STRICT_COMPATIBILITY, false);
+
+const profileDir = gProfD.clone();
+profileDir.append("extensions");
+
+const UPDATE_JSON = {
+ addons: {
+ "addon3@tests.mozilla.org": {
+ updates: [
+ {
+ version: "1.0",
+ applications: {
+ gecko: {
+ strict_min_version: "0",
+ strict_max_version: "2",
+ },
+ },
+ },
+ ],
+ },
+ },
+};
+
+const GETADDONS_JSON = {
+ page_size: 25,
+ page_count: 1,
+ count: 1,
+ next: null,
+ previous: null,
+ results: [
+ {
+ name: "Test 2",
+ type: "extension",
+ guid: "addon2@tests.mozilla.org",
+ current_version: {
+ version: "1.0",
+ files: [
+ {
+ size: 2,
+ url: "http://example.com/test_install2_1.xpi",
+ },
+ ],
+ },
+ authors: [
+ {
+ name: "Test Creator",
+ url: "http://example.com/creator.html",
+ },
+ ],
+ summary: "Repository summary",
+ description: "Repository description",
+ },
+ ],
+};
+
+function checkInstall(install, expected) {
+ for (let [key, value] of Object.entries(expected)) {
+ if (value instanceof Ci.nsIURI) {
+ equal(
+ install[key] && install[key].spec,
+ value.spec,
+ `Expected value of install.${key}`
+ );
+ } else {
+ deepEqual(install[key], value, `Expected value of install.${key}`);
+ }
+ }
+}
+
+add_task(async function setup() {
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1.9.2");
+
+ for (let [name, data] of Object.entries(ADDONS)) {
+ XPIS[name] = AddonTestUtils.createTempWebExtensionFile(data);
+ testserver.registerFile(`/addons/${name}.xpi`, XPIS[name]);
+ }
+
+ await promiseStartupManager();
+
+ // Create and configure the HTTP server.
+ AddonTestUtils.registerJSON(testserver, "/update.json", UPDATE_JSON);
+ testserver.registerDirectory("/data/", do_get_file("data"));
+ testserver.registerPathHandler("/redirect", function(aRequest, aResponse) {
+ aResponse.setStatusLine(null, 301, "Moved Permanently");
+ let url = aRequest.host + ":" + aRequest.port + aRequest.queryString;
+ aResponse.setHeader("Location", "http://" + url);
+ });
+ gPort = testserver.identity.primaryPort;
+});
+
+// Checks that an install from a local file proceeds as expected
+add_task(async function test_install_file() {
+ let [, install] = await Promise.all([
+ AddonTestUtils.promiseInstallEvent("onNewInstall"),
+ AddonManager.getInstallForFile(XPIS.test_install1),
+ ]);
+
+ let uri = Services.io.newFileURI(XPIS.test_install1);
+ checkInstall(install, {
+ type: "extension",
+ version: "1.0",
+ name: "Test 1",
+ state: AddonManager.STATE_DOWNLOADED,
+ sourceURI: uri,
+ });
+
+ let { addon } = install;
+ checkAddon("addon1@tests.mozilla.org", addon, {
+ install,
+ sourceURI: uri,
+ });
+ notEqual(addon.syncGUID, null);
+ equal(
+ addon.getResourceURI("manifest.json").spec,
+ `jar:${uri.spec}!/manifest.json`
+ );
+
+ let activeInstalls = await AddonManager.getAllInstalls();
+ equal(activeInstalls.length, 1);
+ equal(activeInstalls[0], install);
+
+ let fooInstalls = await AddonManager.getInstallsByTypes(["foo"]);
+ equal(fooInstalls.length, 0);
+
+ let extensionInstalls = await AddonManager.getInstallsByTypes(["extension"]);
+ equal(extensionInstalls.length, 1);
+ equal(extensionInstalls[0], install);
+
+ await expectEvents(
+ {
+ addonEvents: {
+ "addon1@tests.mozilla.org": [
+ { event: "onInstalling" },
+ { event: "onInstalled" },
+ ],
+ },
+ },
+ () => install.install()
+ );
+
+ addon = await AddonManager.getAddonByID("addon1@tests.mozilla.org");
+ ok(addon);
+
+ ok(!hasFlag(addon.permissions, AddonManager.PERM_CAN_ENABLE));
+ ok(hasFlag(addon.permissions, AddonManager.PERM_CAN_DISABLE));
+
+ let updateDate = Date.now();
+
+ await promiseRestartManager();
+
+ activeInstalls = await AddonManager.getAllInstalls();
+ equal(activeInstalls, 0);
+
+ let a1 = await AddonManager.getAddonByID("addon1@tests.mozilla.org");
+ let uri2 = do_get_addon_root_uri(profileDir, "addon1@tests.mozilla.org");
+
+ checkAddon("addon1@tests.mozilla.org", a1, {
+ type: "extension",
+ version: "1.0",
+ name: "Test 1",
+ foreignInstall: false,
+ sourceURI: Services.io.newFileURI(XPIS.test_install1),
+ });
+
+ notEqual(a1.syncGUID, null);
+ ok(a1.syncGUID.length >= 9);
+
+ ok(isExtensionInBootstrappedList(profileDir, a1.id));
+ ok(XPIS.test_install1.exists());
+ do_check_in_crash_annotation(a1.id, a1.version);
+
+ let difference = a1.installDate.getTime() - updateDate;
+ if (Math.abs(difference) > MAX_TIME_DIFFERENCE) {
+ do_throw("Add-on install time was out by " + difference + "ms");
+ }
+
+ difference = a1.updateDate.getTime() - updateDate;
+ if (Math.abs(difference) > MAX_TIME_DIFFERENCE) {
+ do_throw("Add-on update time was out by " + difference + "ms");
+ }
+
+ equal(a1.getResourceURI("manifest.json").spec, uri2 + "manifest.json");
+
+ // Ensure that extension bundle (or icon if unpacked) has updated
+ // lastModifiedDate.
+ let testFile = getAddonFile(a1);
+ ok(testFile.exists());
+ difference = testFile.lastModifiedTime - Date.now();
+ ok(Math.abs(difference) < MAX_TIME_DIFFERENCE);
+
+ await a1.uninstall();
+ let { id, version } = a1;
+ await promiseRestartManager();
+ do_check_not_in_crash_annotation(id, version);
+});
+
+// Tests that an install from a url downloads.
+add_task(async function test_install_url() {
+ let url = "http://example.com/addons/test_install2_1.xpi";
+ let install = await AddonManager.getInstallForURL(url, {
+ name: "Test 2",
+ version: "1.0",
+ });
+ checkInstall(install, {
+ version: "1.0",
+ name: "Test 2",
+ state: AddonManager.STATE_AVAILABLE,
+ sourceURI: Services.io.newURI(url),
+ });
+
+ let activeInstalls = await AddonManager.getAllInstalls();
+ equal(activeInstalls.length, 1);
+ equal(activeInstalls[0], install);
+
+ await expectEvents(
+ {
+ installEvents: [
+ { event: "onDownloadStarted" },
+ { event: "onDownloadEnded", returnValue: false },
+ ],
+ },
+ () => {
+ install.install();
+ }
+ );
+
+ checkInstall(install, {
+ version: "2.0",
+ name: "Test 2",
+ state: AddonManager.STATE_DOWNLOADED,
+ });
+ equal(install.addon.install, install);
+
+ await expectEvents(
+ {
+ addonEvents: {
+ "addon2@tests.mozilla.org": [
+ { event: "onInstalling" },
+ { event: "onInstalled" },
+ ],
+ },
+ installEvents: [
+ { event: "onInstallStarted" },
+ { event: "onInstallEnded" },
+ ],
+ },
+ () => install.install()
+ );
+
+ let updateDate = Date.now();
+
+ await promiseRestartManager();
+
+ let installs = await AddonManager.getAllInstalls();
+ equal(installs, 0);
+
+ let a2 = await AddonManager.getAddonByID("addon2@tests.mozilla.org");
+ checkAddon("addon2@tests.mozilla.org", a2, {
+ type: "extension",
+ version: "2.0",
+ name: "Test 2",
+ sourceURI: Services.io.newURI(url),
+ });
+ notEqual(a2.syncGUID, null);
+
+ ok(isExtensionInBootstrappedList(profileDir, a2.id));
+ ok(XPIS.test_install2_1.exists());
+ do_check_in_crash_annotation(a2.id, a2.version);
+
+ let difference = a2.installDate.getTime() - updateDate;
+ Assert.lessOrEqual(
+ Math.abs(difference),
+ MAX_TIME_DIFFERENCE,
+ "Add-on install time was correct"
+ );
+
+ difference = a2.updateDate.getTime() - updateDate;
+ Assert.lessOrEqual(
+ Math.abs(difference),
+ MAX_TIME_DIFFERENCE,
+ "Add-on update time was correct"
+ );
+
+ gInstallDate = a2.installDate;
+});
+
+// Tests that installing a new version of an existing add-on works
+add_task(async function test_install_new_version() {
+ let url = "http://example.com/addons/test_install2_2.xpi";
+ let [, install] = await Promise.all([
+ AddonTestUtils.promiseInstallEvent("onNewInstall"),
+ AddonManager.getInstallForURL(url, {
+ name: "Test 2",
+ version: "3.0",
+ }),
+ ]);
+
+ checkInstall(install, {
+ version: "3.0",
+ name: "Test 2",
+ state: AddonManager.STATE_AVAILABLE,
+ existingAddon: null,
+ });
+
+ let activeInstalls = await AddonManager.getAllInstalls();
+ equal(activeInstalls.length, 1);
+ equal(activeInstalls[0], install);
+
+ await expectEvents(
+ {
+ installEvents: [
+ { event: "onDownloadStarted" },
+ { event: "onDownloadEnded", returnValue: false },
+ ],
+ },
+ () => {
+ install.install();
+ }
+ );
+
+ checkInstall(install, {
+ version: "3.0",
+ name: "Test 2",
+ state: AddonManager.STATE_DOWNLOADED,
+ existingAddon: await AddonManager.getAddonByID("addon2@tests.mozilla.org"),
+ });
+
+ equal(install.addon.install, install);
+
+ // Installation will continue when there is nothing returned.
+ await expectEvents(
+ {
+ addonEvents: {
+ "addon2@tests.mozilla.org": [
+ { event: "onInstalling" },
+ { event: "onInstalled" },
+ ],
+ },
+ installEvents: [
+ { event: "onInstallStarted" },
+ { event: "onInstallEnded" },
+ ],
+ },
+ () => install.install()
+ );
+
+ await promiseRestartManager();
+
+ let installs2 = await AddonManager.getInstallsByTypes(null);
+ equal(installs2.length, 0);
+
+ let a2 = await AddonManager.getAddonByID("addon2@tests.mozilla.org");
+ checkAddon("addon2@tests.mozilla.org", a2, {
+ type: "extension",
+ version: "3.0",
+ name: "Test 2",
+ isActive: true,
+ foreignInstall: false,
+ sourceURI: Services.io.newURI(url),
+ installDate: gInstallDate,
+ });
+
+ ok(isExtensionInBootstrappedList(profileDir, a2.id));
+ ok(XPIS.test_install2_2.exists());
+ do_check_in_crash_annotation(a2.id, a2.version);
+
+ // Update date should be later (or the same if this test is too fast)
+ ok(a2.installDate <= a2.updateDate);
+
+ await a2.uninstall();
+});
+
+// Tests that an install that requires a compatibility update works
+add_task(async function test_install_compat_update() {
+ let url = "http://example.com/addons/test_install3.xpi";
+ let [, install] = await Promise.all([
+ AddonTestUtils.promiseInstallEvent("onNewInstall"),
+ await AddonManager.getInstallForURL(url, {
+ name: "Test 3",
+ version: "1.0",
+ }),
+ ]);
+
+ checkInstall(install, {
+ version: "1.0",
+ name: "Test 3",
+ state: AddonManager.STATE_AVAILABLE,
+ });
+
+ let activeInstalls = await AddonManager.getInstallsByTypes(null);
+ equal(activeInstalls.length, 1);
+ equal(activeInstalls[0], install);
+
+ await expectEvents(
+ {
+ installEvents: [
+ { event: "onDownloadStarted" },
+ { event: "onDownloadEnded", returnValue: false },
+ ],
+ },
+ () => {
+ install.install();
+ }
+ );
+
+ checkInstall(install, {
+ version: "1.0",
+ name: "Test 3",
+ state: AddonManager.STATE_DOWNLOADED,
+ existingAddon: null,
+ });
+ checkAddon("addon3@tests.mozilla.org", install.addon, {
+ appDisabled: false,
+ });
+
+ // Continue the install
+ await expectEvents(
+ {
+ addonEvents: {
+ "addon3@tests.mozilla.org": [
+ { event: "onInstalling" },
+ { event: "onInstalled" },
+ ],
+ },
+ installEvents: [
+ { event: "onInstallStarted" },
+ { event: "onInstallEnded" },
+ ],
+ },
+ () => install.install()
+ );
+
+ await promiseRestartManager();
+
+ let installs = await AddonManager.getAllInstalls();
+ equal(installs, 0);
+
+ let a3 = await AddonManager.getAddonByID("addon3@tests.mozilla.org");
+ checkAddon("addon3@tests.mozilla.org", a3, {
+ type: "extension",
+ version: "1.0",
+ name: "Test 3",
+ isActive: true,
+ appDisabled: false,
+ });
+ notEqual(a3.syncGUID, null);
+
+ ok(isExtensionInBootstrappedList(profileDir, a3.id));
+
+ ok(XPIS.test_install3.exists());
+ await a3.uninstall();
+});
+
+add_task(async function test_compat_update_local() {
+ let [, install] = await Promise.all([
+ AddonTestUtils.promiseInstallEvent("onNewInstall"),
+ AddonManager.getInstallForFile(XPIS.test_install3),
+ ]);
+ ok(install.addon.isCompatible);
+
+ await expectEvents(
+ {
+ addonEvents: {
+ "addon3@tests.mozilla.org": [
+ { event: "onInstalling" },
+ { event: "onInstalled" },
+ ],
+ },
+ installEvents: [
+ { event: "onInstallStarted" },
+ { event: "onInstallEnded" },
+ ],
+ },
+ () => install.install()
+ );
+
+ await promiseRestartManager();
+
+ let a3 = await AddonManager.getAddonByID("addon3@tests.mozilla.org");
+ checkAddon("addon3@tests.mozilla.org", a3, {
+ type: "extension",
+ version: "1.0",
+ name: "Test 3",
+ isActive: true,
+ appDisabled: false,
+ });
+ notEqual(a3.syncGUID, null);
+
+ ok(isExtensionInBootstrappedList(profileDir, a3.id));
+
+ ok(XPIS.test_install3.exists());
+ await a3.uninstall();
+});
+
+// Test that after cancelling a download it is removed from the active installs
+add_task(async function test_cancel() {
+ let url = "http://example.com/addons/test_install3.xpi";
+ let [, install] = await Promise.all([
+ AddonTestUtils.promiseInstallEvent("onNewInstall"),
+ AddonManager.getInstallForURL(url, {
+ name: "Test 3",
+ version: "1.0",
+ }),
+ ]);
+
+ checkInstall(install, {
+ version: "1.0",
+ name: "Test 3",
+ state: AddonManager.STATE_AVAILABLE,
+ });
+
+ let activeInstalls = await AddonManager.getInstallsByTypes(null);
+ equal(activeInstalls.length, 1);
+ equal(activeInstalls[0], install);
+
+ let promise;
+ function cancel() {
+ promise = expectEvents(
+ {
+ installEvents: [{ event: "onDownloadCancelled" }],
+ },
+ () => {
+ install.cancel();
+ }
+ );
+ }
+
+ await expectEvents(
+ {
+ installEvents: [
+ { event: "onDownloadStarted" },
+ { event: "onDownloadEnded", callback: cancel },
+ ],
+ },
+ () => {
+ install.install();
+ }
+ );
+
+ await promise;
+
+ let file = install.file;
+
+ // Allow the file removal to complete
+ activeInstalls = await AddonManager.getAllInstalls();
+ equal(activeInstalls.length, 0);
+ ok(!file.exists());
+});
+
+// Check that cancelling the install from onDownloadStarted actually cancels it
+add_task(async function test_cancel_onDownloadStarted() {
+ let url = "http://example.com/addons/test_install2_1.xpi";
+ let [, install] = await Promise.all([
+ AddonTestUtils.promiseInstallEvent("onNewInstall"),
+ AddonManager.getInstallForURL(url),
+ ]);
+
+ equal(install.file, null);
+
+ install.addListener({
+ onDownloadStarted() {
+ install.removeListener(this);
+ executeSoon(() => install.cancel());
+ },
+ });
+
+ let promise = AddonTestUtils.promiseInstallEvent("onDownloadCancelled");
+ install.install();
+ await promise;
+
+ // Wait another tick to see if it continues downloading.
+ // The listener only really tests if we give it time to see progress, the
+ // file check isn't ideal either
+ install.addListener({
+ onDownloadProgress() {
+ do_throw("Download should not have continued");
+ },
+ onDownloadEnded() {
+ do_throw("Download should not have continued");
+ },
+ });
+
+ let file = install.file;
+ await Promise.resolve();
+ ok(!file.exists());
+});
+
+// Checks that cancelling the install from onDownloadEnded actually cancels it
+add_task(async function test_cancel_onDownloadEnded() {
+ let url = "http://example.com/addons/test_install2_1.xpi";
+ let [, install] = await Promise.all([
+ AddonTestUtils.promiseInstallEvent("onNewInstall"),
+ AddonManager.getInstallForURL(url),
+ ]);
+
+ equal(install.file, null);
+
+ let promise;
+ function cancel() {
+ promise = expectEvents(
+ {
+ installEvents: [{ event: "onDownloadCancelled" }],
+ },
+ async () => {
+ install.cancel();
+ }
+ );
+ }
+
+ await expectEvents(
+ {
+ installEvents: [
+ { event: "onDownloadStarted" },
+ { event: "onDownloadEnded", callback: cancel },
+ ],
+ },
+ () => {
+ install.install();
+ }
+ );
+
+ await promise;
+
+ install.addListener({
+ onInstallStarted() {
+ do_throw("Install should not have continued");
+ },
+ });
+});
+
+// Verify that the userDisabled value carries over to the upgrade by default
+add_task(async function test_userDisabled_update() {
+ let url = "http://example.com/addons/test_install2_1.xpi";
+ let [, install] = await Promise.all([
+ AddonTestUtils.promiseInstallEvent("onNewInstall"),
+ AddonManager.getInstallForURL(url),
+ ]);
+
+ await install.install();
+
+ ok(!install.addon.userDisabled);
+ await install.addon.disable();
+
+ let addon = await AddonManager.getAddonByID("addon2@tests.mozilla.org");
+ checkAddon("addon2@tests.mozilla.org", addon, {
+ userDisabled: true,
+ isActive: false,
+ });
+
+ url = "http://example.com/addons/test_install2_2.xpi";
+ install = await AddonManager.getInstallForURL(url);
+ await install.install();
+
+ checkAddon("addon2@tests.mozilla.org", install.addon, {
+ userDisabled: true,
+ isActive: false,
+ });
+
+ await promiseRestartManager();
+
+ addon = await AddonManager.getAddonByID("addon2@tests.mozilla.org");
+ checkAddon("addon2@tests.mozilla.org", addon, {
+ userDisabled: true,
+ isActive: false,
+ });
+
+ await addon.uninstall();
+});
+
+// Verify that changing the userDisabled value before onInstallEnded works
+add_task(async function test_userDisabled() {
+ let url = "http://example.com/addons/test_install2_1.xpi";
+ let install = await AddonManager.getInstallForURL(url);
+ await install.install();
+
+ ok(!install.addon.userDisabled);
+
+ let addon = await AddonManager.getAddonByID("addon2@tests.mozilla.org");
+ checkAddon("addon2@tests.mozilla.org", addon, {
+ userDisabled: false,
+ isActive: true,
+ });
+
+ url = "http://example.com/addons/test_install2_2.xpi";
+ install = await AddonManager.getInstallForURL(url);
+
+ install.addListener({
+ onInstallStarted() {
+ ok(!install.addon.userDisabled);
+ install.addon.disable();
+ },
+ });
+
+ await install.install();
+
+ addon = await AddonManager.getAddonByID("addon2@tests.mozilla.org");
+ checkAddon("addon2@tests.mozilla.org", addon, {
+ userDisabled: true,
+ isActive: false,
+ });
+
+ await addon.uninstall();
+});
+
+// Checks that metadata is not stored if the pref is set to false
+add_task(async function test_18_1() {
+ AddonTestUtils.registerJSON(testserver, "/getaddons.json", GETADDONS_JSON);
+ Services.prefs.setCharPref(
+ PREF_GETADDONS_BYIDS,
+ "http://example.com/getaddons.json"
+ );
+
+ Services.prefs.setBoolPref("extensions.getAddons.cache.enabled", true);
+ Services.prefs.setBoolPref(
+ "extensions.addon2@tests.mozilla.org.getAddons.cache.enabled",
+ false
+ );
+
+ let url = "http://example.com/addons/test_install2_1.xpi";
+ let install = await AddonManager.getInstallForURL(url);
+ await install.install();
+
+ notEqual(install.addon.fullDescription, "Repository description");
+
+ await promiseRestartManager();
+
+ let addon = await AddonManager.getAddonByID("addon2@tests.mozilla.org");
+ notEqual(addon.fullDescription, "Repository description");
+
+ await addon.uninstall();
+});
+
+// Checks that metadata is downloaded for new installs and is visible before and
+// after restart
+add_task(async function test_metadata() {
+ Services.prefs.setBoolPref(
+ "extensions.addon2@tests.mozilla.org.getAddons.cache.enabled",
+ true
+ );
+
+ let url = "http://example.com/addons/test_install2_1.xpi";
+ let install = await AddonManager.getInstallForURL(url);
+ await install.install();
+
+ equal(install.addon.fullDescription, "Repository description");
+
+ await promiseRestartManager();
+
+ let addon = await AddonManager.getAddonByID("addon2@tests.mozilla.org");
+ equal(addon.fullDescription, "Repository description");
+
+ await addon.uninstall();
+});
+
+// Do the same again to make sure it works when the data is already in the cache
+add_task(async function test_metadata_again() {
+ let url = "http://example.com/addons/test_install2_1.xpi";
+ let install = await AddonManager.getInstallForURL(url);
+ await install.install();
+
+ equal(install.addon.fullDescription, "Repository description");
+
+ await promiseRestartManager();
+
+ let addon = await AddonManager.getAddonByID("addon2@tests.mozilla.org");
+ equal(addon.fullDescription, "Repository description");
+
+ await addon.uninstall();
+});
+
+// Tests that an install can be restarted after being cancelled
+add_task(async function test_restart() {
+ let url = "http://example.com/addons/test_install1.xpi";
+ let install = await AddonManager.getInstallForURL(url);
+ equal(install.state, AddonManager.STATE_AVAILABLE);
+
+ install.addListener({
+ onDownloadEnded() {
+ install.removeListener(this);
+ install.cancel();
+ },
+ });
+
+ try {
+ await install.install();
+ ok(false, "Install should not have succeeded");
+ } catch (err) {}
+
+ let promise = expectEvents(
+ {
+ addonEvents: {
+ "addon1@tests.mozilla.org": [
+ { event: "onInstalling" },
+ { event: "onInstalled" },
+ ],
+ },
+ installEvents: [
+ { event: "onDownloadStarted" },
+ { event: "onDownloadEnded" },
+ { event: "onInstallStarted" },
+ { event: "onInstallEnded" },
+ ],
+ },
+ () => {
+ install.install();
+ }
+ );
+
+ await Promise.all([
+ promise,
+ promiseWebExtensionStartup("addon1@tests.mozilla.org"),
+ ]);
+
+ await install.addon.uninstall();
+});
+
+// Tests that an install can be restarted after being cancelled when a hash
+// was provided
+add_task(async function test_restart_hash() {
+ let url = "http://example.com/addons/test_install1.xpi";
+ let install = await AddonManager.getInstallForURL(url, {
+ hash: do_get_file_hash(XPIS.test_install1),
+ });
+ equal(install.state, AddonManager.STATE_AVAILABLE);
+
+ install.addListener({
+ onDownloadEnded() {
+ install.removeListener(this);
+ install.cancel();
+ },
+ });
+
+ try {
+ await install.install();
+ ok(false, "Install should not have succeeded");
+ } catch (err) {}
+
+ let promise = expectEvents(
+ {
+ addonEvents: {
+ "addon1@tests.mozilla.org": [
+ { event: "onInstalling" },
+ { event: "onInstalled" },
+ ],
+ },
+ installEvents: [
+ { event: "onDownloadStarted" },
+ { event: "onDownloadEnded" },
+ { event: "onInstallStarted" },
+ { event: "onInstallEnded" },
+ ],
+ },
+ () => {
+ install.install();
+ }
+ );
+
+ await Promise.all([
+ promise,
+ promiseWebExtensionStartup("addon1@tests.mozilla.org"),
+ ]);
+
+ await install.addon.uninstall();
+});
+
+// Tests that an install with a bad hash can be restarted after it fails, though
+// it will only fail again
+add_task(async function test_restart_badhash() {
+ let url = "http://example.com/addons/test_install1.xpi";
+ let install = await AddonManager.getInstallForURL(url, { hash: "sha1:foo" });
+ equal(install.state, AddonManager.STATE_AVAILABLE);
+
+ install.addListener({
+ onDownloadEnded() {
+ install.removeListener(this);
+ install.cancel();
+ },
+ });
+
+ try {
+ await install.install();
+ ok(false, "Install should not have succeeded");
+ } catch (err) {}
+
+ try {
+ await install.install();
+ ok(false, "Install should not have succeeded");
+ } catch (err) {
+ ok(true, "Resumed install should have failed");
+ }
+});
+
+// Tests that installs with a hash for a local file work
+add_task(async function test_local_hash() {
+ let url = Services.io.newFileURI(XPIS.test_install1).spec;
+ let install = await AddonManager.getInstallForURL(url, {
+ hash: do_get_file_hash(XPIS.test_install1),
+ });
+
+ checkInstall(install, {
+ state: AddonManager.STATE_DOWNLOADED,
+ error: 0,
+ });
+
+ install.cancel();
+});
+
+// Test that an install cannot be canceled after the install is completed.
+add_task(async function test_cancel_completed() {
+ let url = "http://example.com/addons/test_install1.xpi";
+ let install = await AddonManager.getInstallForURL(url);
+
+ let cancelPromise = new Promise((resolve, reject) => {
+ install.addListener({
+ onInstallEnded() {
+ try {
+ install.cancel();
+ reject("Cancel should fail.");
+ } catch (e) {
+ resolve();
+ }
+ },
+ });
+ });
+
+ install.install();
+ await cancelPromise;
+
+ equal(install.state, AddonManager.STATE_INSTALLED);
+});
+
+// Test that an install may be canceled after a redirect.
+add_task(async function test_cancel_redirect() {
+ let url = "http://example.com/redirect?/addons/test_install1.xpi";
+ let install = await AddonManager.getInstallForURL(url);
+
+ install.addListener({
+ onDownloadProgress() {
+ install.cancel();
+ },
+ });
+
+ let promise = AddonTestUtils.promiseInstallEvent("onDownloadCancelled");
+
+ install.install();
+ await promise;
+
+ equal(install.state, AddonManager.STATE_CANCELLED);
+});
+
+// Tests that an install can be restarted during onDownloadCancelled after being
+// cancelled in mid-download
+add_task(async function test_restart2() {
+ let url = "http://example.com/addons/test_install1.xpi";
+ let install = await AddonManager.getInstallForURL(url);
+
+ equal(install.state, AddonManager.STATE_AVAILABLE);
+
+ install.addListener({
+ onDownloadProgress() {
+ install.removeListener(this);
+ install.cancel();
+ },
+ });
+
+ let promise = AddonTestUtils.promiseInstallEvent("onDownloadCancelled");
+ install.install();
+ await promise;
+
+ equal(install.state, AddonManager.STATE_CANCELLED);
+
+ promise = expectEvents(
+ {
+ addonEvents: {
+ "addon1@tests.mozilla.org": [
+ { event: "onInstalling" },
+ { event: "onInstalled" },
+ ],
+ },
+ installEvents: [
+ { event: "onDownloadStarted" },
+ { event: "onDownloadEnded" },
+ { event: "onInstallStarted" },
+ { event: "onInstallEnded" },
+ ],
+ },
+ () => {
+ let file = install.file;
+ install.install();
+ notEqual(file.path, install.file.path);
+ ok(!file.exists());
+ }
+ );
+
+ await Promise.all([
+ promise,
+ promiseWebExtensionStartup("addon1@tests.mozilla.org"),
+ ]);
+
+ await install.addon.uninstall();
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_install_cancel.js b/toolkit/mozapps/extensions/test/xpcshell/test_install_cancel.js
new file mode 100644
index 0000000000..cc96c3e25a
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_install_cancel.js
@@ -0,0 +1,92 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+"use strict";
+
+var testserver = createHttpServer({ hosts: ["example.com"] });
+
+AddonTestUtils.createAppInfo(
+ "xpcshell@tests.mozilla.org",
+ "XPCShell",
+ "1",
+ "1.9.2"
+);
+
+class TestListener {
+ constructor(listener) {
+ this.listener = listener;
+ }
+
+ onDataAvailable(...args) {
+ this.origListener.onDataAvailable(...args);
+ }
+
+ onStartRequest(request) {
+ this.origListener.onStartRequest(request);
+ }
+
+ onStopRequest(request, status) {
+ if (this.listener.onStopRequest) {
+ this.listener.onStopRequest(request, status);
+ }
+ this.origListener.onStopRequest(request, status);
+ }
+}
+
+function startListener(listener) {
+ let observer = {
+ observe(subject, topic, data) {
+ let channel = subject.QueryInterface(Ci.nsIHttpChannel);
+ if (channel.URI.spec === "http://example.com/addons/test.xpi") {
+ let channelListener = new TestListener(listener);
+ channelListener.origListener = subject
+ .QueryInterface(Ci.nsITraceableChannel)
+ .setNewListener(channelListener);
+ Services.obs.removeObserver(observer, "http-on-modify-request");
+ }
+ },
+ };
+ Services.obs.addObserver(observer, "http-on-modify-request");
+}
+
+add_task(async function setup() {
+ let xpi = AddonTestUtils.createTempWebExtensionFile({
+ manifest: {
+ name: "Test",
+ version: "1.0",
+ applications: { gecko: { id: "cancel@test" } },
+ },
+ });
+ testserver.registerFile(`/addons/test.xpi`, xpi);
+ await AddonTestUtils.promiseStartupManager();
+});
+
+// This test checks that canceling an install after the download is completed fails
+// and throws an exception as expected
+add_task(async function test_install_cancelled() {
+ let url = "http://example.com/addons/test.xpi";
+ let install = await AddonManager.getInstallForURL(url, {
+ name: "Test",
+ version: "1.0",
+ });
+
+ let cancelInstall = new Promise(resolve => {
+ startListener({
+ onStopRequest() {
+ resolve(Promise.resolve().then(() => install.cancel()));
+ },
+ });
+ });
+
+ await install.install().then(() => {
+ ok(true, "install succeeded");
+ });
+
+ await cancelInstall
+ .then(() => {
+ ok(false, "cancel should not succeed");
+ })
+ .catch(e => {
+ ok(!!e, "cancel threw an exception");
+ });
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_install_icons.js b/toolkit/mozapps/extensions/test/xpcshell/test_install_icons.js
new file mode 100644
index 0000000000..69f1387e25
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_install_icons.js
@@ -0,0 +1,62 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// use httpserver to find an available port
+var gServer = new HttpServer();
+gServer.start(-1);
+gPort = gServer.identity.primaryPort;
+
+var addon_url = "http://localhost:" + gPort + "/test.xpi";
+var icon32_url = "http://localhost:" + gPort + "/icon.png";
+var icon64_url = "http://localhost:" + gPort + "/icon64.png";
+
+async function run_test() {
+ do_test_pending();
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1.9.2");
+ await promiseStartupManager();
+
+ test_1();
+}
+
+async function test_1() {
+ let aInstall = await AddonManager.getInstallForURL(addon_url);
+ Assert.equal(aInstall.iconURL, null);
+ Assert.notEqual(aInstall.icons, null);
+ Assert.equal(aInstall.icons[32], undefined);
+ Assert.equal(aInstall.icons[64], undefined);
+ test_2();
+}
+
+async function test_2() {
+ let aInstall = await AddonManager.getInstallForURL(addon_url, {
+ icons: icon32_url,
+ });
+ Assert.equal(aInstall.iconURL, icon32_url);
+ Assert.notEqual(aInstall.icons, null);
+ Assert.equal(aInstall.icons[32], icon32_url);
+ Assert.equal(aInstall.icons[64], undefined);
+ test_3();
+}
+
+async function test_3() {
+ let aInstall = await AddonManager.getInstallForURL(addon_url, {
+ icons: { "32": icon32_url },
+ });
+ Assert.equal(aInstall.iconURL, icon32_url);
+ Assert.notEqual(aInstall.icons, null);
+ Assert.equal(aInstall.icons[32], icon32_url);
+ Assert.equal(aInstall.icons[64], undefined);
+ test_4();
+}
+
+async function test_4() {
+ let aInstall = await AddonManager.getInstallForURL(addon_url, {
+ icons: { "32": icon32_url, "64": icon64_url },
+ });
+ Assert.equal(aInstall.iconURL, icon32_url);
+ Assert.notEqual(aInstall.icons, null);
+ Assert.equal(aInstall.icons[32], icon32_url);
+ Assert.equal(aInstall.icons[64], icon64_url);
+ executeSoon(do_test_finished);
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_isDebuggable.js b/toolkit/mozapps/extensions/test/xpcshell/test_isDebuggable.js
new file mode 100644
index 0000000000..cfa9b6e3b4
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_isDebuggable.js
@@ -0,0 +1,21 @@
+/* This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/.
+ */
+
+var ID = "debuggable@tests.mozilla.org";
+
+add_task(async function() {
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "2", "2");
+
+ await promiseStartupManager();
+
+ await promiseInstallWebExtension({
+ manifest: {
+ applications: { gecko: { id: ID } },
+ },
+ });
+
+ let addon = await AddonManager.getAddonByID(ID);
+ Assert.equal(addon.isDebuggable, true);
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_isReady.js b/toolkit/mozapps/extensions/test/xpcshell/test_isReady.js
new file mode 100644
index 0000000000..0bd1aa61ce
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_isReady.js
@@ -0,0 +1,71 @@
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1.9.2");
+
+add_task(async function() {
+ equal(AddonManager.isReady, false, "isReady should be false before startup");
+
+ let gotStartupEvent = false;
+ let gotShutdownEvent = false;
+ let listener = {
+ onStartup() {
+ gotStartupEvent = true;
+ },
+ onShutdown() {
+ gotShutdownEvent = true;
+ },
+ };
+ AddonManager.addManagerListener(listener);
+
+ info("Starting manager...");
+ await promiseStartupManager();
+ equal(AddonManager.isReady, true, "isReady should be true after startup");
+ equal(
+ gotStartupEvent,
+ true,
+ "Should have seen onStartup event after startup"
+ );
+ equal(
+ gotShutdownEvent,
+ false,
+ "Should not have seen onShutdown event before shutdown"
+ );
+
+ gotStartupEvent = false;
+ gotShutdownEvent = false;
+
+ info("Shutting down manager...");
+ await promiseShutdownManager();
+
+ equal(AddonManager.isReady, false, "isReady should be false after shutdown");
+ equal(
+ gotStartupEvent,
+ false,
+ "Should not have seen onStartup event after shutdown"
+ );
+ equal(
+ gotShutdownEvent,
+ true,
+ "Should have seen onShutdown event after shutdown"
+ );
+
+ AddonManager.addManagerListener(listener);
+ gotStartupEvent = false;
+ gotShutdownEvent = false;
+
+ info("Starting manager again...");
+ await promiseStartupManager();
+ equal(
+ AddonManager.isReady,
+ true,
+ "isReady should be true after repeat startup"
+ );
+ equal(
+ gotStartupEvent,
+ true,
+ "Should have seen onStartup event after repeat startup"
+ );
+ equal(
+ gotShutdownEvent,
+ false,
+ "Should not have seen onShutdown event before shutdown, following repeat startup"
+ );
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_locale.js b/toolkit/mozapps/extensions/test/xpcshell/test_locale.js
new file mode 100644
index 0000000000..4d6836c1e1
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_locale.js
@@ -0,0 +1,103 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+add_task(async function setup() {
+ // Setup for test
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1.9.2");
+ await promiseStartupManager();
+});
+
+// Tests that the localized properties are visible before installation
+add_task(async function test_1() {
+ await restartWithLocales(["fr-FR"]);
+
+ let xpi = AddonTestUtils.createTempWebExtensionFile({
+ manifest: {
+ name: "__MSG_name__",
+ description: "__MSG_description__",
+ default_locale: "en",
+
+ applications: {
+ gecko: {
+ id: "addon1@tests.mozilla.org",
+ },
+ },
+ },
+
+ files: {
+ "_locales/en/messages.json": {
+ name: {
+ message: "Fallback Name",
+ description: "name",
+ },
+ description: {
+ message: "Fallback Description",
+ description: "description",
+ },
+ },
+ "_locales/fr_FR/messages.json": {
+ name: {
+ message: "fr-FR Name",
+ description: "name",
+ },
+ description: {
+ message: "fr-FR Description",
+ description: "description",
+ },
+ },
+ "_locales/de-DE/messages.json": {
+ name: {
+ message: "de-DE Name",
+ description: "name",
+ },
+ },
+ },
+ });
+
+ let install = await AddonManager.getInstallForFile(xpi);
+ Assert.equal(install.addon.name, "fr-FR Name");
+ Assert.equal(install.addon.description, "fr-FR Description");
+ await install.install();
+});
+
+// Tests that the localized properties are visible after installation
+add_task(async function test_2() {
+ let addon = await AddonManager.getAddonByID("addon1@tests.mozilla.org");
+ Assert.notEqual(addon, null);
+
+ Assert.equal(addon.name, "fr-FR Name");
+ Assert.equal(addon.description, "fr-FR Description");
+
+ await addon.disable();
+});
+
+// Test that the localized properties are still there when disabled.
+add_task(async function test_3() {
+ let addon = await AddonManager.getAddonByID("addon1@tests.mozilla.org");
+ Assert.notEqual(addon, null);
+ Assert.equal(addon.name, "fr-FR Name");
+});
+
+// Test that changing locale works
+add_task(async function test_5() {
+ await restartWithLocales(["de-DE"]);
+
+ let addon = await AddonManager.getAddonByID("addon1@tests.mozilla.org");
+ Assert.notEqual(addon, null);
+
+ Assert.equal(addon.name, "de-DE Name");
+ Assert.equal(addon.description, "Fallback Description");
+});
+
+// Test that missing locales use the fallbacks
+add_task(async function test_6() {
+ await restartWithLocales(["nl-NL"]);
+
+ let addon = await AddonManager.getAddonByID("addon1@tests.mozilla.org");
+ Assert.notEqual(addon, null);
+
+ Assert.equal(addon.name, "Fallback Name");
+ Assert.equal(addon.description, "Fallback Description");
+
+ await addon.enable();
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_moved_extension_metadata.js b/toolkit/mozapps/extensions/test/xpcshell/test_moved_extension_metadata.js
new file mode 100644
index 0000000000..b018652464
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_moved_extension_metadata.js
@@ -0,0 +1,173 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// This test is disabled but is being kept around so it can eventualy
+// be modernized and re-enabled. But is uses obsolete test helpers that
+// fail lint, so just skip linting it for now.
+/* eslint-disable */
+
+// This verifies that moving an extension in the filesystem without any other
+// change still keeps updated compatibility information
+
+// The test extension uses an insecure update url.
+Services.prefs.setBoolPref("extensions.checkUpdateSecurity", false);
+// Enable loading extensions from the user and system scopes
+Services.prefs.setIntPref("extensions.enabledScopes",
+ AddonManager.SCOPE_PROFILE + AddonManager.SCOPE_USER);
+
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "2", "1.9.2");
+
+var testserver = AddonTestUtils.createHttpServer({hosts: ["example.com"]});
+testserver.registerDirectory("/data/", do_get_file("data"));
+
+var userDir = gProfD.clone();
+userDir.append("extensions2");
+userDir.append(gAppInfo.ID);
+
+var dirProvider = {
+ getFile(aProp, aPersistent) {
+ aPersistent.value = false;
+ if (aProp == "XREUSysExt")
+ return userDir.parent;
+ return null;
+ },
+
+ QueryInterface: ChromeUtils.generateQI(["nsIDirectoryServiceProvider"]),
+};
+Services.dirsvc.registerProvider(dirProvider);
+
+var addon1 = {
+ id: "addon1@tests.mozilla.org",
+ version: "1.0",
+ name: "Test 1",
+ bootstrap: true,
+ updateURL: "http://example.com/data/test_bug655254.json",
+ targetApplications: [{
+ id: "xpcshell@tests.mozilla.org",
+ minVersion: "1",
+ maxVersion: "1",
+ }],
+};
+
+const ADDONS = [
+ {
+ "install.rdf": {
+ id: "addon2@tests.mozilla.org",
+ name: "Test 2",
+
+ targetApplications: [{
+ id: "xpcshell@tests.mozilla.org",
+ minVersion: "2",
+ maxVersion: "2"}],
+ },
+ "bootstrap.js": `
+ /* exported startup, shutdown */
+ ChromeUtils.import("resource://gre/modules/Services.jsm");
+
+ function startup(data, reason) {
+ Services.prefs.setIntPref("bootstraptest.active_version", 1);
+ }
+
+ function shutdown(data, reason) {
+ Services.prefs.setIntPref("bootstraptest.active_version", 0);
+ }
+ `,
+ },
+];
+
+const XPIS = ADDONS.map(addon => AddonTestUtils.createTempXPIFile(addon));
+
+add_task(async function test_1() {
+ var time = Date.now();
+ var dir = await promiseWriteInstallRDFForExtension(addon1, userDir);
+ setExtensionModifiedTime(dir, time);
+
+ await manuallyInstall(XPIS[0], userDir, "addon2@tests.mozilla.org");
+
+ await promiseStartupManager();
+
+ let [a1, a2] = await AddonManager.getAddonsByIDs(["addon1@tests.mozilla.org",
+ "addon2@tests.mozilla.org"]);
+ Assert.notEqual(a1, null);
+ Assert.ok(a1.appDisabled);
+ Assert.ok(!a1.isActive);
+ Assert.ok(!isExtensionInBootstrappedList(userDir, a1.id));
+
+ Assert.notEqual(a2, null);
+ Assert.ok(!a2.appDisabled);
+ Assert.ok(a2.isActive);
+ Assert.ok(isExtensionInBootstrappedList(userDir, a2.id));
+ Assert.equal(Services.prefs.getIntPref("bootstraptest.active_version"), 1);
+
+ await AddonTestUtils.promiseFindAddonUpdates(a1, AddonManager.UPDATE_WHEN_USER_REQUESTED);
+
+ await promiseRestartManager();
+
+ let a1_2 = await AddonManager.getAddonByID("addon1@tests.mozilla.org");
+ Assert.notEqual(a1_2, null);
+ Assert.ok(!a1_2.appDisabled);
+ Assert.ok(a1_2.isActive);
+ Assert.ok(isExtensionInBootstrappedList(userDir, a1_2.id));
+
+ await promiseShutdownManager();
+
+ Assert.equal(Services.prefs.getIntPref("bootstraptest.active_version"), 0);
+
+ userDir.parent.moveTo(gProfD, "extensions3");
+ userDir = gProfD.clone();
+ userDir.append("extensions3");
+ userDir.append(gAppInfo.ID);
+ Assert.ok(userDir.exists());
+
+ await promiseStartupManager();
+
+ let [a1_3, a2_3] = await AddonManager.getAddonsByIDs(["addon1@tests.mozilla.org",
+ "addon2@tests.mozilla.org"]);
+ Assert.notEqual(a1_3, null);
+ Assert.ok(!a1_3.appDisabled);
+ Assert.ok(a1_3.isActive);
+ Assert.ok(isExtensionInBootstrappedList(userDir, a1_3.id));
+
+ Assert.notEqual(a2_3, null);
+ Assert.ok(!a2_3.appDisabled);
+ Assert.ok(a2_3.isActive);
+ Assert.ok(isExtensionInBootstrappedList(userDir, a2_3.id));
+ Assert.equal(Services.prefs.getIntPref("bootstraptest.active_version"), 1);
+});
+
+// Set up the profile
+add_task(async function test_2() {
+ let a2 = await AddonManager.getAddonByID("addon2@tests.mozilla.org");
+ Assert.notEqual(a2, null);
+ Assert.ok(!a2.appDisabled);
+ Assert.ok(a2.isActive);
+ Assert.ok(isExtensionInBootstrappedList(userDir, a2.id));
+ Assert.equal(Services.prefs.getIntPref("bootstraptest.active_version"), 1);
+
+ await a2.disable();
+ Assert.equal(Services.prefs.getIntPref("bootstraptest.active_version"), 0);
+
+ await promiseShutdownManager();
+
+ userDir.parent.moveTo(gProfD, "extensions4");
+ userDir = gProfD.clone();
+ userDir.append("extensions4");
+ userDir.append(gAppInfo.ID);
+ Assert.ok(userDir.exists());
+
+ await promiseStartupManager();
+
+ let [a1_2, a2_2] = await AddonManager.getAddonsByIDs(["addon1@tests.mozilla.org",
+ "addon2@tests.mozilla.org"]);
+ Assert.notEqual(a1_2, null);
+ Assert.ok(!a1_2.appDisabled);
+ Assert.ok(a1_2.isActive);
+ Assert.ok(isExtensionInBootstrappedList(userDir, a1_2.id));
+
+ Assert.notEqual(a2_2, null);
+ Assert.ok(a2_2.userDisabled);
+ Assert.ok(!a2_2.isActive);
+ Assert.ok(!isExtensionInBootstrappedList(userDir, a2_2.id));
+ Assert.equal(Services.prefs.getIntPref("bootstraptest.active_version"), 0);
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_no_addons.js b/toolkit/mozapps/extensions/test/xpcshell/test_no_addons.js
new file mode 100644
index 0000000000..9c641c87fd
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_no_addons.js
@@ -0,0 +1,81 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// Test startup and restart when no add-ons are installed
+// bug 944006
+
+// Load XPI Provider to get schema version ID
+var XPIScope = ChromeUtils.import(
+ "resource://gre/modules/addons/XPIProvider.jsm",
+ null
+);
+const { DB_SCHEMA } = XPIScope.XPIInternal;
+
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1.9.2");
+
+// Test for a preference to either exist with a specified value, or not exist at all
+function checkPending() {
+ try {
+ Assert.ok(!Services.prefs.getBoolPref("extensions.pendingOperations"));
+ } catch (e) {
+ // OK
+ }
+}
+
+// Make sure all our extension state is empty/nonexistent
+function check_empty_state() {
+ Assert.equal(
+ Services.prefs.getIntPref("extensions.databaseSchema"),
+ DB_SCHEMA
+ );
+ checkPending();
+}
+
+// After first run with no add-ons, we expect:
+// no extensions.json is created
+// no extensions.ini
+// database schema version preference is set
+// bootstrap add-ons preference is not found
+// add-on directory state preference is an empty array
+// no pending operations
+add_task(async function first_run() {
+ await promiseStartupManager();
+ check_empty_state();
+ await true;
+});
+
+// Now do something that causes a DB load, and re-check
+async function trigger_db_load() {
+ let addonList = await AddonManager.getAddonsByTypes(["extension"]);
+
+ Assert.equal(addonList.length, 0);
+ check_empty_state();
+
+ await true;
+}
+add_task(trigger_db_load);
+
+// Now restart the manager and check again
+add_task(async function restart_and_recheck() {
+ await promiseRestartManager();
+ check_empty_state();
+ await true;
+});
+
+// and reload the DB again
+add_task(trigger_db_load);
+
+// When we start up with no DB and an old database schema, we should update the
+// schema number but not create a database
+add_task(async function upgrade_schema_version() {
+ await promiseShutdownManager();
+ Services.prefs.setIntPref("extensions.databaseSchema", 1);
+
+ await promiseStartupManager();
+ Assert.equal(
+ Services.prefs.getIntPref("extensions.databaseSchema"),
+ DB_SCHEMA
+ );
+ check_empty_state();
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_nodisable_hidden.js b/toolkit/mozapps/extensions/test/xpcshell/test_nodisable_hidden.js
new file mode 100644
index 0000000000..e76d70f587
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_nodisable_hidden.js
@@ -0,0 +1,99 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// This test verifies that hidden add-ons cannot be user disabled.
+
+// for system add-ons
+const distroDir = FileUtils.getDir("ProfD", ["sysfeatures"], true);
+registerDirectory("XREAppFeat", distroDir);
+
+const NORMAL_ID = "normal@tests.mozilla.org";
+const SYSTEM_ID = "system@tests.mozilla.org";
+
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "42");
+
+// normal add-ons can be user disabled.
+add_task(async function() {
+ await promiseStartupManager();
+
+ await promiseInstallWebExtension({
+ manifest: {
+ name: "Test disabling hidden add-ons, non-hidden add-on case.",
+ version: "1.0",
+ applications: { gecko: { id: NORMAL_ID } },
+ },
+ });
+
+ let addon = await promiseAddonByID(NORMAL_ID);
+ Assert.notEqual(addon, null);
+ Assert.equal(addon.version, "1.0");
+ Assert.equal(
+ addon.name,
+ "Test disabling hidden add-ons, non-hidden add-on case."
+ );
+ Assert.ok(addon.isCompatible);
+ Assert.ok(!addon.appDisabled);
+ Assert.ok(!addon.userDisabled);
+ Assert.ok(addon.isActive);
+ Assert.equal(addon.type, "extension");
+
+ // normal add-ons can be disabled by the user.
+ await addon.disable();
+
+ Assert.notEqual(addon, null);
+ Assert.equal(addon.version, "1.0");
+ Assert.equal(
+ addon.name,
+ "Test disabling hidden add-ons, non-hidden add-on case."
+ );
+ Assert.ok(addon.isCompatible);
+ Assert.ok(!addon.appDisabled);
+ Assert.ok(addon.userDisabled);
+ Assert.ok(!addon.isActive);
+ Assert.equal(addon.type, "extension");
+
+ await addon.uninstall();
+
+ await promiseShutdownManager();
+});
+
+// system add-ons can never be user disabled.
+add_task(async function() {
+ let xpi = createTempWebExtensionFile({
+ manifest: {
+ name: "Test disabling hidden add-ons, hidden system add-on case.",
+ version: "1.0",
+ applications: { gecko: { id: SYSTEM_ID } },
+ },
+ });
+ xpi.copyTo(distroDir, `${SYSTEM_ID}.xpi`);
+ await overrideBuiltIns({ system: [SYSTEM_ID] });
+
+ await promiseStartupManager();
+
+ let addon = await promiseAddonByID(SYSTEM_ID);
+ Assert.notEqual(addon, null);
+ Assert.equal(addon.version, "1.0");
+ Assert.equal(
+ addon.name,
+ "Test disabling hidden add-ons, hidden system add-on case."
+ );
+ Assert.ok(addon.isCompatible);
+ Assert.ok(!addon.appDisabled);
+ Assert.ok(!addon.userDisabled);
+ Assert.ok(addon.isActive);
+ Assert.equal(addon.type, "extension");
+
+ // system add-ons cannot be disabled by the user.
+ await Assert.rejects(
+ addon.disable(),
+ err => err.message == `Cannot disable system add-on ${SYSTEM_ID}`,
+ "disable() on a hidden add-on should fail"
+ );
+
+ Assert.ok(!addon.userDisabled);
+ Assert.ok(addon.isActive);
+
+ await promiseShutdownManager();
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_onPropertyChanged_appDisabled.js b/toolkit/mozapps/extensions/test/xpcshell/test_onPropertyChanged_appDisabled.js
new file mode 100644
index 0000000000..747e07cce6
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_onPropertyChanged_appDisabled.js
@@ -0,0 +1,55 @@
+/* Any copyright is dedicated to the Public Domain.
+ http://creativecommons.org/publicdomain/zero/1.0/ */
+
+// turn on Cu.isInAutomation
+Services.prefs.setBoolPref(PREF_DISABLE_SECURITY, true);
+
+const ID = "addon1@tests.mozilla.org";
+add_task(async function run_test() {
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1.9.2");
+
+ let xpi = createAddon({
+ id: ID,
+ targetApplications: [
+ {
+ id: "xpcshell@tests.mozilla.org",
+ minVersion: "0.1",
+ maxVersion: "0.2",
+ },
+ ],
+ });
+ await manuallyInstall(xpi, AddonTestUtils.profileExtensions, ID);
+
+ AddonManager.strictCompatibility = false;
+ await promiseStartupManager();
+
+ let addon = await AddonManager.getAddonByID(ID);
+ Assert.notEqual(addon, null);
+ await addon.disable();
+
+ Assert.ok(addon.userDisabled);
+ Assert.ok(!addon.isActive);
+ Assert.ok(!addon.appDisabled);
+
+ let promise = promiseAddonEvent("onPropertyChanged");
+ AddonManager.strictCompatibility = true;
+ let [, properties] = await promise;
+
+ Assert.deepEqual(
+ properties,
+ ["appDisabled"],
+ "Got onPropertyChanged for appDisabled"
+ );
+ Assert.ok(addon.appDisabled);
+
+ promise = promiseAddonEvent("onPropertyChanged");
+ AddonManager.strictCompatibility = false;
+ [, properties] = await promise;
+
+ Assert.deepEqual(
+ properties,
+ ["appDisabled"],
+ "Got onPropertyChanged for appDisabled"
+ );
+ Assert.ok(!addon.appDisabled);
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_permissions.js b/toolkit/mozapps/extensions/test/xpcshell/test_permissions.js
new file mode 100644
index 0000000000..c542a5c656
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_permissions.js
@@ -0,0 +1,199 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// Checks that permissions set in preferences are correctly imported but can
+// be removed by the user.
+
+const { PermissionTestUtils } = ChromeUtils.import(
+ "resource://testing-common/PermissionTestUtils.jsm"
+);
+
+const XPI_MIMETYPE = "application/x-xpinstall";
+
+function newPrincipal(uri) {
+ return Services.scriptSecurityManager.createContentPrincipal(
+ NetUtil.newURI(uri),
+ {}
+ );
+}
+
+add_task(async function setup() {
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "2", "2");
+
+ Services.prefs.setCharPref(
+ "xpinstall.whitelist.add",
+ "https://test1.com,https://test2.com"
+ );
+ Services.prefs.setCharPref(
+ "xpinstall.whitelist.add.36",
+ "https://test3.com,https://www.test4.com"
+ );
+ Services.prefs.setCharPref(
+ "xpinstall.whitelist.add.test5",
+ "https://test5.com"
+ );
+
+ PermissionTestUtils.add(
+ "https://www.test9.com",
+ "install",
+ Ci.nsIPermissionManager.ALLOW_ACTION
+ );
+
+ await promiseStartupManager();
+
+ Assert.ok(
+ !AddonManager.isInstallAllowed(
+ XPI_MIMETYPE,
+ newPrincipal("http://test1.com")
+ )
+ );
+ Assert.ok(
+ AddonManager.isInstallAllowed(
+ XPI_MIMETYPE,
+ newPrincipal("https://test1.com")
+ )
+ );
+ Assert.ok(
+ AddonManager.isInstallAllowed(
+ XPI_MIMETYPE,
+ newPrincipal("https://www.test2.com")
+ )
+ );
+ Assert.ok(
+ AddonManager.isInstallAllowed(
+ XPI_MIMETYPE,
+ newPrincipal("https://test3.com")
+ )
+ );
+ Assert.ok(
+ !AddonManager.isInstallAllowed(
+ XPI_MIMETYPE,
+ newPrincipal("https://test4.com")
+ )
+ );
+ Assert.ok(
+ AddonManager.isInstallAllowed(
+ XPI_MIMETYPE,
+ newPrincipal("https://www.test4.com")
+ )
+ );
+ Assert.ok(
+ !AddonManager.isInstallAllowed(
+ XPI_MIMETYPE,
+ newPrincipal("http://www.test5.com")
+ )
+ );
+ Assert.ok(
+ AddonManager.isInstallAllowed(
+ XPI_MIMETYPE,
+ newPrincipal("https://www.test5.com")
+ )
+ );
+
+ Assert.ok(
+ !AddonManager.isInstallAllowed(
+ XPI_MIMETYPE,
+ newPrincipal("http://www.test6.com")
+ )
+ );
+ Assert.ok(
+ !AddonManager.isInstallAllowed(
+ XPI_MIMETYPE,
+ newPrincipal("https://www.test6.com")
+ )
+ );
+ Assert.ok(
+ !AddonManager.isInstallAllowed(
+ XPI_MIMETYPE,
+ newPrincipal("https://test7.com")
+ )
+ );
+ Assert.ok(
+ !AddonManager.isInstallAllowed(
+ XPI_MIMETYPE,
+ newPrincipal("https://www.test8.com")
+ )
+ );
+
+ // This should remain unaffected
+ Assert.ok(
+ !AddonManager.isInstallAllowed(
+ XPI_MIMETYPE,
+ newPrincipal("http://www.test9.com")
+ )
+ );
+ Assert.ok(
+ AddonManager.isInstallAllowed(
+ XPI_MIMETYPE,
+ newPrincipal("https://www.test9.com")
+ )
+ );
+
+ Services.perms.removeAll();
+
+ Assert.ok(
+ !AddonManager.isInstallAllowed(
+ XPI_MIMETYPE,
+ newPrincipal("https://test1.com")
+ )
+ );
+ Assert.ok(
+ !AddonManager.isInstallAllowed(
+ XPI_MIMETYPE,
+ newPrincipal("https://www.test2.com")
+ )
+ );
+ Assert.ok(
+ !AddonManager.isInstallAllowed(
+ XPI_MIMETYPE,
+ newPrincipal("https://test3.com")
+ )
+ );
+ Assert.ok(
+ !AddonManager.isInstallAllowed(
+ XPI_MIMETYPE,
+ newPrincipal("https://www.test4.com")
+ )
+ );
+ Assert.ok(
+ !AddonManager.isInstallAllowed(
+ XPI_MIMETYPE,
+ newPrincipal("https://www.test5.com")
+ )
+ );
+
+ // Upgrade the application and verify that the permissions are still not there
+ await promiseRestartManager("2");
+
+ Assert.ok(
+ !AddonManager.isInstallAllowed(
+ XPI_MIMETYPE,
+ newPrincipal("https://test1.com")
+ )
+ );
+ Assert.ok(
+ !AddonManager.isInstallAllowed(
+ XPI_MIMETYPE,
+ newPrincipal("https://www.test2.com")
+ )
+ );
+ Assert.ok(
+ !AddonManager.isInstallAllowed(
+ XPI_MIMETYPE,
+ newPrincipal("https://test3.com")
+ )
+ );
+ Assert.ok(
+ !AddonManager.isInstallAllowed(
+ XPI_MIMETYPE,
+ newPrincipal("https://www.test4.com")
+ )
+ );
+ Assert.ok(
+ !AddonManager.isInstallAllowed(
+ XPI_MIMETYPE,
+ newPrincipal("https://www.test5.com")
+ )
+ );
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_permissions_prefs.js b/toolkit/mozapps/extensions/test/xpcshell/test_permissions_prefs.js
new file mode 100644
index 0000000000..f764a9a2ea
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_permissions_prefs.js
@@ -0,0 +1,103 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// Tests that xpinstall.[whitelist|blacklist].add preferences are emptied when
+// converted into permissions.
+
+const PREF_XPI_WHITELIST_PERMISSIONS = "xpinstall.whitelist.add";
+const PREF_XPI_BLACKLIST_PERMISSIONS = "xpinstall.blacklist.add";
+
+function newPrincipal(uri) {
+ return Services.scriptSecurityManager.createContentPrincipal(
+ NetUtil.newURI(uri),
+ {}
+ );
+}
+
+function do_check_permission_prefs(preferences) {
+ // Check preferences were emptied
+ for (let pref of preferences) {
+ try {
+ Assert.equal(Services.prefs.getCharPref(pref), "");
+ } catch (e) {
+ // Successfully emptied
+ }
+ }
+}
+
+function clear_imported_preferences_cache() {
+ let scope = ChromeUtils.import(
+ "resource://gre/modules/PermissionsUtils.jsm",
+ null
+ );
+ scope.gImportedPrefBranches.clear();
+}
+
+add_task(async function setup() {
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1.9");
+
+ // Create own preferences to test
+ Services.prefs.setCharPref("xpinstall.whitelist.add.EMPTY", "");
+ Services.prefs.setCharPref(
+ "xpinstall.whitelist.add.TEST",
+ "http://whitelist.example.com"
+ );
+ Services.prefs.setCharPref("xpinstall.blacklist.add.EMPTY", "");
+ Services.prefs.setCharPref(
+ "xpinstall.blacklist.add.TEST",
+ "http://blacklist.example.com"
+ );
+
+ // Get list of preferences to check
+ var whitelistPreferences = Services.prefs.getChildList(
+ PREF_XPI_WHITELIST_PERMISSIONS
+ );
+ var blacklistPreferences = Services.prefs.getChildList(
+ PREF_XPI_BLACKLIST_PERMISSIONS
+ );
+ var preferences = whitelistPreferences.concat(blacklistPreferences);
+
+ await promiseStartupManager();
+
+ // Permissions are imported lazily - act as thought we're checking an install,
+ // to trigger on-deman importing of the permissions.
+ AddonManager.isInstallAllowed(
+ "application/x-xpinstall",
+ newPrincipal("http://example.com/file.xpi")
+ );
+ do_check_permission_prefs(preferences);
+
+ // Import can also be triggered by an observer notification by any other area
+ // of code, such as a permissions management UI.
+
+ // First, request to flush all permissions
+ clear_imported_preferences_cache();
+ Services.prefs.setCharPref(
+ "xpinstall.whitelist.add.TEST2",
+ "https://whitelist2.example.com"
+ );
+ Services.obs.notifyObservers(null, "flush-pending-permissions", "install");
+ do_check_permission_prefs(preferences);
+
+ // Then, request to flush just install permissions
+ clear_imported_preferences_cache();
+ Services.prefs.setCharPref(
+ "xpinstall.whitelist.add.TEST3",
+ "https://whitelist3.example.com"
+ );
+ Services.obs.notifyObservers(null, "flush-pending-permissions");
+ do_check_permission_prefs(preferences);
+
+ // And a request to flush some other permissions sholdn't flush install permissions
+ clear_imported_preferences_cache();
+ Services.prefs.setCharPref(
+ "xpinstall.whitelist.add.TEST4",
+ "https://whitelist4.example.com"
+ );
+ Services.obs.notifyObservers(null, "flush-pending-permissions", "lolcats");
+ Assert.equal(
+ Services.prefs.getCharPref("xpinstall.whitelist.add.TEST4"),
+ "https://whitelist4.example.com"
+ );
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_pluginchange.js b/toolkit/mozapps/extensions/test/xpcshell/test_pluginchange.js
new file mode 100644
index 0000000000..645922219e
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_pluginchange.js
@@ -0,0 +1,242 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+const LIST_UPDATED_TOPIC = "plugins-list-updated";
+
+class PluginTag extends MockPluginTag {
+ constructor(name, description) {
+ super({ name, description, version: "1.0" });
+ this.description = description;
+ }
+}
+
+const PLUGINS = [
+ // A standalone plugin
+ new PluginTag("Java", "A mock Java plugin"),
+
+ // A plugin made up of two plugin files
+ new PluginTag("Flash", "A mock Flash plugin"),
+ new PluginTag("Flash", "A mock Flash plugin"),
+];
+
+mockPluginHost(PLUGINS);
+
+// This verifies that when the list of plugins changes the add-ons manager
+// correctly updates
+async function run_test() {
+ do_test_pending();
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1.9.2");
+
+ Services.prefs.setBoolPref("media.gmp-provider.enabled", false);
+
+ await promiseStartupManager();
+
+ run_test_1();
+}
+
+function end_test() {
+ executeSoon(do_test_finished);
+}
+
+function sortAddons(addons) {
+ addons.sort(function(a, b) {
+ return a.name.localeCompare(b.name);
+ });
+}
+
+// Basic check that the mock object works
+async function run_test_1() {
+ let addons = await AddonManager.getAddonsByTypes(["plugin"]);
+ sortAddons(addons);
+
+ Assert.equal(addons.length, 2);
+
+ Assert.equal(addons[0].name, "Flash");
+ Assert.ok(!addons[0].userDisabled);
+ Assert.equal(addons[1].name, "Java");
+ Assert.ok(!addons[1].userDisabled);
+
+ run_test_2();
+}
+
+// No change to the list should not trigger any events or changes in the API
+async function run_test_2() {
+ // Reorder the list a bit
+ let tag = PLUGINS[0];
+ PLUGINS[0] = PLUGINS[2];
+ PLUGINS[2] = PLUGINS[1];
+ PLUGINS[1] = tag;
+
+ Services.obs.notifyObservers(null, LIST_UPDATED_TOPIC);
+
+ let addons = await AddonManager.getAddonsByTypes(["plugin"]);
+ sortAddons(addons);
+
+ Assert.equal(addons.length, 2);
+
+ Assert.equal(addons[0].name, "Flash");
+ Assert.ok(!addons[0].userDisabled);
+ Assert.equal(addons[1].name, "Java");
+ Assert.ok(!addons[1].userDisabled);
+
+ run_test_3();
+}
+
+// Tests that a newly detected plugin shows up in the API and sends out events
+async function run_test_3() {
+ let tag = new PluginTag("Quicktime", "A mock Quicktime plugin");
+ PLUGINS.push(tag);
+ let id = tag.name + tag.description;
+
+ await expectEvents(
+ {
+ addonEvents: {
+ [id]: [{ event: "onInstalling" }, { event: "onInstalled" }],
+ },
+ installEvents: [{ event: "onExternalInstall" }],
+ },
+ async () => {
+ Services.obs.notifyObservers(null, LIST_UPDATED_TOPIC);
+ }
+ );
+
+ let addons = await AddonManager.getAddonsByTypes(["plugin"]);
+ sortAddons(addons);
+
+ Assert.equal(addons.length, 3);
+
+ Assert.equal(addons[0].name, "Flash");
+ Assert.ok(!addons[0].userDisabled);
+ Assert.equal(addons[1].name, "Java");
+ Assert.ok(!addons[1].userDisabled);
+ Assert.equal(addons[2].name, "Quicktime");
+ Assert.ok(!addons[2].userDisabled);
+
+ run_test_4();
+}
+
+// Tests that a removed plugin disappears from in the API and sends out events
+async function run_test_4() {
+ let tag = PLUGINS.splice(1, 1)[0];
+ let id = tag.name + tag.description;
+
+ await expectEvents(
+ {
+ addonEvents: {
+ [id]: [{ event: "onUninstalling" }, { event: "onUninstalled" }],
+ },
+ },
+ async () => {
+ Services.obs.notifyObservers(null, LIST_UPDATED_TOPIC);
+ }
+ );
+
+ let addons = await AddonManager.getAddonsByTypes(["plugin"]);
+ sortAddons(addons);
+
+ Assert.equal(addons.length, 2);
+
+ Assert.equal(addons[0].name, "Flash");
+ Assert.ok(!addons[0].userDisabled);
+ Assert.equal(addons[1].name, "Quicktime");
+ Assert.ok(!addons[1].userDisabled);
+
+ run_test_5();
+}
+
+// Removing part of the flash plugin should have no effect
+async function run_test_5() {
+ PLUGINS.splice(0, 1);
+
+ Services.obs.notifyObservers(null, LIST_UPDATED_TOPIC);
+
+ let addons = await AddonManager.getAddonsByTypes(["plugin"]);
+ sortAddons(addons);
+
+ Assert.equal(addons.length, 2);
+
+ Assert.equal(addons[0].name, "Flash");
+ Assert.ok(!addons[0].userDisabled);
+ Assert.equal(addons[1].name, "Quicktime");
+ Assert.ok(!addons[1].userDisabled);
+
+ run_test_6();
+}
+
+// Replacing flash should be detected
+async function run_test_6() {
+ let oldTag = PLUGINS.splice(0, 1)[0];
+ let newTag = new PluginTag("Flash 2", "A new crash-free Flash!");
+ newTag.disabled = true;
+ PLUGINS.push(newTag);
+
+ await expectEvents(
+ {
+ addonEvents: {
+ [oldTag.name + oldTag.description]: [
+ { event: "onUninstalling" },
+ { event: "onUninstalled" },
+ ],
+ [newTag.name + newTag.description]: [
+ { event: "onInstalling" },
+ { event: "onInstalled" },
+ ],
+ },
+ installEvents: [{ event: "onExternalInstall" }],
+ },
+ async () => {
+ Services.obs.notifyObservers(null, LIST_UPDATED_TOPIC);
+ }
+ );
+
+ let addons = await AddonManager.getAddonsByTypes(["plugin"]);
+ sortAddons(addons);
+
+ Assert.equal(addons.length, 2);
+
+ Assert.equal(addons[0].name, "Flash 2");
+ Assert.ok(addons[0].userDisabled);
+ Assert.equal(addons[1].name, "Quicktime");
+ Assert.ok(!addons[1].userDisabled);
+
+ run_test_7();
+}
+
+// If new tags are detected and the disabled state changes then we should send
+// out appropriate notifications
+async function run_test_7() {
+ PLUGINS[0] = new PluginTag("Quicktime", "A mock Quicktime plugin");
+ PLUGINS[0].disabled = true;
+ PLUGINS[1] = new PluginTag("Flash 2", "A new crash-free Flash!");
+
+ await expectEvents(
+ {
+ addonEvents: {
+ [PLUGINS[0].name + PLUGINS[0].description]: [
+ { event: "onDisabling" },
+ { event: "onDisabled" },
+ ],
+ [PLUGINS[1].name + PLUGINS[1].description]: [
+ { event: "onEnabling" },
+ { event: "onEnabled" },
+ ],
+ },
+ },
+ async () => {
+ Services.obs.notifyObservers(null, LIST_UPDATED_TOPIC);
+ }
+ );
+
+ let addons = await AddonManager.getAddonsByTypes(["plugin"]);
+ sortAddons(addons);
+
+ Assert.equal(addons.length, 2);
+
+ Assert.equal(addons[0].name, "Flash 2");
+ Assert.ok(!addons[0].userDisabled);
+ Assert.equal(addons[1].name, "Quicktime");
+ Assert.ok(addons[1].userDisabled);
+
+ end_test();
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_pref_properties.js b/toolkit/mozapps/extensions/test/xpcshell/test_pref_properties.js
new file mode 100644
index 0000000000..6a0597372f
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_pref_properties.js
@@ -0,0 +1,221 @@
+/* Any copyright is dedicated to the Public Domain.
+ http://creativecommons.org/publicdomain/zero/1.0/ */
+
+// Tests the preference-related properties of AddonManager
+// eg: AddonManager.checkCompatibility, AddonManager.updateEnabled, etc
+
+var gManagerEventsListener = {
+ seenEvents: [],
+ init() {
+ let events = [
+ "onCompatibilityModeChanged",
+ "onCheckUpdateSecurityChanged",
+ "onUpdateModeChanged",
+ ];
+ events.forEach(function(aEvent) {
+ this[aEvent] = function() {
+ info("Saw event " + aEvent);
+ this.seenEvents.push(aEvent);
+ };
+ }, this);
+ AddonManager.addManagerListener(this);
+ // Try to add twice, to test that the second time silently fails.
+ AddonManager.addManagerListener(this);
+ },
+ shutdown() {
+ AddonManager.removeManagerListener(this);
+ },
+ expect(aEvents) {
+ this.expectedEvents = aEvents;
+ },
+ checkExpected() {
+ info("Checking expected events...");
+ while (this.expectedEvents.length) {
+ let event = this.expectedEvents.pop();
+ info("Looking for expected event " + event);
+ let matchingEvents = this.seenEvents.filter(function(aSeenEvent) {
+ return aSeenEvent == event;
+ });
+ Assert.equal(matchingEvents.length, 1);
+ }
+ this.seenEvents = [];
+ },
+};
+
+add_task(async function setup() {
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1.9.2");
+
+ Services.prefs.setBoolPref("extensions.update.enabled", true);
+ Services.prefs.setBoolPref("extensions.update.autoUpdateDefault", true);
+ Services.prefs.setBoolPref("extensions.strictCompatibility", true);
+ Services.prefs.setBoolPref("extensions.checkUpdatesecurity", true);
+
+ await promiseStartupManager();
+ gManagerEventsListener.init();
+
+ // AddonManager.updateEnabled
+ gManagerEventsListener.expect(["onUpdateModeChanged"]);
+ AddonManager.updateEnabled = false;
+ gManagerEventsListener.checkExpected();
+ Assert.ok(!AddonManager.updateEnabled);
+ Assert.ok(!Services.prefs.getBoolPref("extensions.update.enabled"));
+
+ gManagerEventsListener.expect([]);
+ AddonManager.updateEnabled = false;
+ gManagerEventsListener.checkExpected();
+ Assert.ok(!AddonManager.updateEnabled);
+ Assert.ok(!Services.prefs.getBoolPref("extensions.update.enabled"));
+
+ gManagerEventsListener.expect(["onUpdateModeChanged"]);
+ AddonManager.updateEnabled = true;
+ gManagerEventsListener.checkExpected();
+ Assert.ok(AddonManager.updateEnabled);
+ Assert.ok(Services.prefs.getBoolPref("extensions.update.enabled"));
+
+ gManagerEventsListener.expect([]);
+ AddonManager.updateEnabled = true;
+ gManagerEventsListener.checkExpected();
+ Assert.ok(AddonManager.updateEnabled);
+ Assert.ok(Services.prefs.getBoolPref("extensions.update.enabled"));
+
+ // AddonManager.autoUpdateDefault
+ gManagerEventsListener.expect(["onUpdateModeChanged"]);
+ AddonManager.autoUpdateDefault = false;
+ gManagerEventsListener.checkExpected();
+ Assert.ok(!AddonManager.autoUpdateDefault);
+ Assert.ok(!Services.prefs.getBoolPref("extensions.update.autoUpdateDefault"));
+
+ gManagerEventsListener.expect([]);
+ AddonManager.autoUpdateDefault = false;
+ gManagerEventsListener.checkExpected();
+ Assert.ok(!AddonManager.autoUpdateDefault);
+ Assert.ok(!Services.prefs.getBoolPref("extensions.update.autoUpdateDefault"));
+
+ gManagerEventsListener.expect(["onUpdateModeChanged"]);
+ AddonManager.autoUpdateDefault = true;
+ gManagerEventsListener.checkExpected();
+ Assert.ok(AddonManager.autoUpdateDefault);
+ Assert.ok(Services.prefs.getBoolPref("extensions.update.autoUpdateDefault"));
+
+ gManagerEventsListener.expect([]);
+ AddonManager.autoUpdateDefault = true;
+ gManagerEventsListener.checkExpected();
+ Assert.ok(AddonManager.autoUpdateDefault);
+ Assert.ok(Services.prefs.getBoolPref("extensions.update.autoUpdateDefault"));
+
+ // AddonManager.strictCompatibility
+ gManagerEventsListener.expect(["onCompatibilityModeChanged"]);
+ AddonManager.strictCompatibility = false;
+ gManagerEventsListener.checkExpected();
+ Assert.ok(!AddonManager.strictCompatibility);
+ Assert.ok(!Services.prefs.getBoolPref("extensions.strictCompatibility"));
+
+ gManagerEventsListener.expect([]);
+ AddonManager.strictCompatibility = false;
+ gManagerEventsListener.checkExpected();
+ Assert.ok(!AddonManager.strictCompatibility);
+ Assert.ok(!Services.prefs.getBoolPref("extensions.strictCompatibility"));
+
+ gManagerEventsListener.expect(["onCompatibilityModeChanged"]);
+ AddonManager.strictCompatibility = true;
+ gManagerEventsListener.checkExpected();
+ Assert.ok(AddonManager.strictCompatibility);
+ Assert.ok(Services.prefs.getBoolPref("extensions.strictCompatibility"));
+
+ gManagerEventsListener.expect([]);
+ AddonManager.strictCompatibility = true;
+ gManagerEventsListener.checkExpected();
+ Assert.ok(AddonManager.strictCompatibility);
+ Assert.ok(Services.prefs.getBoolPref("extensions.strictCompatibility"));
+
+ // AddonManager.checkCompatibility
+ if (isNightlyChannel()) {
+ var version = "nightly";
+ } else {
+ version = Services.appinfo.version.replace(
+ /^([^\.]+\.[0-9]+[a-z]*).*/gi,
+ "$1"
+ );
+ }
+ const COMPATIBILITY_PREF = "extensions.checkCompatibility." + version;
+
+ gManagerEventsListener.expect(["onCompatibilityModeChanged"]);
+ AddonManager.checkCompatibility = false;
+ gManagerEventsListener.checkExpected();
+ Assert.ok(!AddonManager.checkCompatibility);
+ Assert.ok(!Services.prefs.getBoolPref(COMPATIBILITY_PREF));
+
+ gManagerEventsListener.expect([]);
+ AddonManager.checkCompatibility = false;
+ gManagerEventsListener.checkExpected();
+ Assert.ok(!AddonManager.checkCompatibility);
+ Assert.ok(!Services.prefs.getBoolPref(COMPATIBILITY_PREF));
+
+ gManagerEventsListener.expect(["onCompatibilityModeChanged"]);
+ AddonManager.checkCompatibility = true;
+ gManagerEventsListener.checkExpected();
+ Assert.ok(AddonManager.checkCompatibility);
+ Assert.ok(!Services.prefs.prefHasUserValue(COMPATIBILITY_PREF));
+
+ gManagerEventsListener.expect([]);
+ AddonManager.checkCompatibility = true;
+ gManagerEventsListener.checkExpected();
+ Assert.ok(AddonManager.checkCompatibility);
+ Assert.ok(!Services.prefs.prefHasUserValue(COMPATIBILITY_PREF));
+
+ // AddonManager.checkUpdateSecurity
+ gManagerEventsListener.expect(["onCheckUpdateSecurityChanged"]);
+ AddonManager.checkUpdateSecurity = false;
+ gManagerEventsListener.checkExpected();
+ Assert.ok(!AddonManager.checkUpdateSecurity);
+ if (AddonManager.checkUpdateSecurityDefault) {
+ Assert.ok(!Services.prefs.getBoolPref("extensions.checkUpdateSecurity"));
+ } else {
+ Assert.ok(
+ !Services.prefs.prefHasUserValue("extensions.checkUpdateSecurity")
+ );
+ }
+
+ gManagerEventsListener.expect([]);
+ AddonManager.checkUpdateSecurity = false;
+ gManagerEventsListener.checkExpected();
+ Assert.ok(!AddonManager.checkUpdateSecurity);
+ if (AddonManager.checkUpdateSecurityDefault) {
+ Assert.ok(!Services.prefs.getBoolPref("extensions.checkUpdateSecurity"));
+ } else {
+ Assert.ok(
+ !Services.prefs.prefHasUserValue("extensions.checkUpdateSecurity")
+ );
+ }
+
+ gManagerEventsListener.expect(["onCheckUpdateSecurityChanged"]);
+ AddonManager.checkUpdateSecurity = true;
+ gManagerEventsListener.checkExpected();
+ Assert.ok(AddonManager.checkUpdateSecurity);
+ if (!AddonManager.checkUpdateSecurityDefault) {
+ Assert.ok(Services.prefs.getBoolPref("extensions.checkUpdateSecurity"));
+ } else {
+ Assert.ok(
+ !Services.prefs.prefHasUserValue("extensions.checkUpdateSecurity")
+ );
+ }
+
+ gManagerEventsListener.expect([]);
+ AddonManager.checkUpdateSecurity = true;
+ gManagerEventsListener.checkExpected();
+ Assert.ok(AddonManager.checkUpdateSecurity);
+ if (!AddonManager.checkUpdateSecurityDefault) {
+ Assert.ok(Services.prefs.getBoolPref("extensions.checkUpdateSecurity"));
+ } else {
+ Assert.ok(
+ !Services.prefs.prefHasUserValue("extensions.checkUpdateSecurity")
+ );
+ }
+
+ gManagerEventsListener.shutdown();
+
+ // After removing the listener, ensure we get no further events.
+ gManagerEventsListener.expect([]);
+ AddonManager.updateEnabled = false;
+ gManagerEventsListener.checkExpected();
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_provider_markSafe.js b/toolkit/mozapps/extensions/test/xpcshell/test_provider_markSafe.js
new file mode 100644
index 0000000000..e8062a2caf
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_provider_markSafe.js
@@ -0,0 +1,43 @@
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1.9.2");
+
+function mockAddonProvider(name) {
+ let mockProvider = {
+ markSafe: false,
+ apiAccessed: false,
+
+ startup() {
+ if (this.markSafe) {
+ AddonManagerPrivate.markProviderSafe(this);
+ }
+
+ AddonManager.isInstallEnabled("made-up-mimetype");
+ },
+ supportsMimetype(mimetype) {
+ this.apiAccessed = true;
+ return false;
+ },
+
+ get name() {
+ return name;
+ },
+ };
+
+ return mockProvider;
+}
+
+add_task(async function testMarkSafe() {
+ info("Starting with provider normally");
+ let provider = mockAddonProvider("Mock1");
+ AddonManagerPrivate.registerProvider(provider);
+ await promiseStartupManager();
+ ok(!provider.apiAccessed, "Provider API should not have been accessed");
+ AddonManagerPrivate.unregisterProvider(provider);
+ await promiseShutdownManager();
+
+ info("Starting with provider that marks itself safe");
+ provider.apiAccessed = false;
+ provider.markSafe = true;
+ AddonManagerPrivate.registerProvider(provider);
+ await promiseStartupManager();
+ ok(provider.apiAccessed, "Provider API should have been accessed");
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_provider_shutdown.js b/toolkit/mozapps/extensions/test/xpcshell/test_provider_shutdown.js
new file mode 100644
index 0000000000..4a6a0e271a
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_provider_shutdown.js
@@ -0,0 +1,100 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// Verify that we report shutdown status for Addon Manager providers
+// and AddonRepository correctly.
+
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1.9.2");
+
+// Make a mock AddonRepository that just lets us hang shutdown.
+// Needs two promises - one to let us know that AM has called shutdown,
+// and one for us to let AM know that shutdown is done.
+function mockAddonProvider(aName) {
+ let mockProvider = {
+ donePromise: null,
+ doneResolve: null,
+ doneReject: null,
+ shutdownPromise: null,
+ shutdownResolve: null,
+
+ get name() {
+ return aName;
+ },
+
+ shutdown() {
+ this.shutdownResolve();
+ return this.donePromise;
+ },
+ };
+ mockProvider.donePromise = new Promise((resolve, reject) => {
+ mockProvider.doneResolve = resolve;
+ mockProvider.doneReject = reject;
+ });
+ mockProvider.shutdownPromise = new Promise((resolve, reject) => {
+ mockProvider.shutdownResolve = resolve;
+ });
+ return mockProvider;
+}
+
+// Helper to find a particular shutdown blocker's status in the JSON blob
+function findInStatus(aStatus, aName) {
+ for (let { name, state } of aStatus.state) {
+ if (name == aName) {
+ return state;
+ }
+ }
+ return null;
+}
+
+/*
+ * Make sure we report correctly when an add-on provider or AddonRepository block shutdown
+ */
+add_task(async function blockRepoShutdown() {
+ // Reach into the AddonManager scope and inject our mock AddonRepository
+ // the mock provider behaves enough like AddonRepository for the purpose of this test
+ let mockRepo = mockAddonProvider("Mock repo");
+ // Trigger the lazy getter so that we can assign a new value to it:
+ void AMscope.AddonRepository;
+ AMscope.AddonRepository = mockRepo;
+
+ let mockProvider = mockAddonProvider("Mock provider");
+
+ await promiseStartupManager();
+ AddonManagerPrivate.registerProvider(mockProvider);
+
+ let {
+ fetchState,
+ } = MockAsyncShutdown.profileBeforeChange.blockers[0].options;
+
+ // Start shutting the manager down
+ let managerDown = promiseShutdownManager();
+
+ // Wait for manager to call provider shutdown.
+ await mockProvider.shutdownPromise;
+ // check AsyncShutdown state
+ let status = fetchState();
+ equal(findInStatus(status[1], "Mock provider"), "(none)");
+ equal(status[2].name, "AddonRepository: async shutdown");
+ equal(status[2].state, "pending");
+ // let the provider finish
+ mockProvider.doneResolve();
+
+ // Wait for manager to call repo shutdown and start waiting for it
+ await mockRepo.shutdownPromise;
+ // Check the shutdown state
+ status = fetchState();
+ equal(status[1].name, "AddonManager: Waiting for providers to shut down.");
+ equal(status[1].state, "Complete");
+ equal(status[2].name, "AddonRepository: async shutdown");
+ equal(status[2].state, "in progress");
+
+ // Now finish our shutdown, and wait for the manager to wrap up
+ mockRepo.doneResolve();
+ await managerDown;
+
+ // Check the shutdown state again
+ status = fetchState();
+ equal(status[0].name, "AddonRepository: async shutdown");
+ equal(status[0].state, "done");
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_provider_unsafe_access_shutdown.js b/toolkit/mozapps/extensions/test/xpcshell/test_provider_unsafe_access_shutdown.js
new file mode 100644
index 0000000000..383c7a6426
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_provider_unsafe_access_shutdown.js
@@ -0,0 +1,65 @@
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1.9.2");
+
+var shutdownOrder = [];
+
+function mockAddonProvider(name) {
+ let mockProvider = {
+ hasShutdown: false,
+ unsafeAccess: false,
+
+ shutdownCallback: null,
+
+ startup() {},
+ shutdown() {
+ this.hasShutdown = true;
+ shutdownOrder.push(this.name);
+ if (this.shutdownCallback) {
+ return this.shutdownCallback();
+ }
+ return undefined;
+ },
+ getAddonByID(id, callback) {
+ if (this.hasShutdown) {
+ this.unsafeAccess = true;
+ }
+ callback(null);
+ },
+
+ get name() {
+ return name;
+ },
+ };
+
+ return mockProvider;
+}
+
+add_task(async function unsafeProviderShutdown() {
+ let firstProvider = mockAddonProvider("Mock1");
+ AddonManagerPrivate.registerProvider(firstProvider);
+ let secondProvider = mockAddonProvider("Mock2");
+ AddonManagerPrivate.registerProvider(secondProvider);
+
+ await promiseStartupManager();
+
+ let shutdownPromise = null;
+ await new Promise(resolve => {
+ secondProvider.shutdownCallback = function() {
+ return AddonManager.getAddonByID("does-not-exist").then(() => {
+ resolve();
+ });
+ };
+
+ shutdownPromise = promiseShutdownManager();
+ });
+ await shutdownPromise;
+
+ equal(
+ shutdownOrder.join(","),
+ ["Mock1", "Mock2"].join(","),
+ "Mock providers should have shutdown in expected order"
+ );
+ ok(
+ !firstProvider.unsafeAccess,
+ "First registered mock provider should not have been accessed unsafely"
+ );
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_provider_unsafe_access_startup.js b/toolkit/mozapps/extensions/test/xpcshell/test_provider_unsafe_access_startup.js
new file mode 100644
index 0000000000..b8fee1e6e5
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_provider_unsafe_access_startup.js
@@ -0,0 +1,59 @@
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1.9.2");
+
+var startupOrder = [];
+
+function mockAddonProvider(name) {
+ let mockProvider = {
+ hasStarted: false,
+ unsafeAccess: false,
+
+ startupCallback: null,
+
+ startup() {
+ this.hasStarted = true;
+ startupOrder.push(this.name);
+ if (this.startupCallback) {
+ this.startupCallback();
+ }
+ },
+ getAddonByID(id, callback) {
+ if (!this.hasStarted) {
+ this.unsafeAccess = true;
+ }
+ callback(null);
+ },
+
+ get name() {
+ return name;
+ },
+ };
+
+ return mockProvider;
+}
+
+add_task(async function unsafeProviderStartup() {
+ let secondProvider = null;
+
+ await new Promise(resolve => {
+ let firstProvider = mockAddonProvider("Mock1");
+ firstProvider.startupCallback = function() {
+ resolve(AddonManager.getAddonByID("does-not-exist"));
+ };
+ AddonManagerPrivate.registerProvider(firstProvider);
+
+ secondProvider = mockAddonProvider("Mock2");
+ AddonManagerPrivate.registerProvider(secondProvider);
+
+ promiseStartupManager();
+ });
+
+ equal(
+ startupOrder.join(","),
+ ["Mock1", "Mock2"].join(","),
+ "Mock providers should have hasStarted in expected order"
+ );
+ ok(
+ !secondProvider.unsafeAccess,
+ "Second registered mock provider should not have been accessed unsafely"
+ );
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_proxies.js b/toolkit/mozapps/extensions/test/xpcshell/test_proxies.js
new file mode 100644
index 0000000000..e2a73c413a
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_proxies.js
@@ -0,0 +1,225 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// Tests the semantics of extension proxy files and symlinks
+
+var ADDONS = [
+ {
+ id: "proxy1@tests.mozilla.org",
+ dirId: "proxy1@tests.mozilla.com",
+ type: "proxy",
+ },
+ {
+ id: "proxy2@tests.mozilla.org",
+ type: "proxy",
+ },
+ {
+ id: "symlink1@tests.mozilla.org",
+ dirId: "symlink1@tests.mozilla.com",
+ type: "symlink",
+ },
+ {
+ id: "symlink2@tests.mozilla.org",
+ type: "symlink",
+ },
+];
+
+const gHaveSymlinks = AppConstants.platform != "win";
+
+function createSymlink(aSource, aDest) {
+ if (aSource instanceof Ci.nsIFile) {
+ aSource = aSource.path;
+ }
+ if (aDest instanceof Ci.nsIFile) {
+ aDest = aDest.path;
+ }
+
+ return OS.File.unixSymLink(aSource, aDest);
+}
+
+function promiseWriteFile(aFile, aData) {
+ if (!aFile.parent.exists()) {
+ aFile.parent.create(Ci.nsIFile.DIRECTORY_TYPE, 0o755);
+ }
+
+ return OS.File.writeAtomic(aFile.path, new TextEncoder().encode(aData));
+}
+
+function checkAddonsExist() {
+ for (let addon of ADDONS) {
+ let file = addon.directory.clone();
+ file.append("manifest.json");
+ Assert.ok(file.exists());
+ }
+}
+
+const profileDir = gProfD.clone();
+profileDir.append("extensions");
+
+function run_test() {
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "2", "2");
+
+ // Unpacked extensions are never signed, so this can only run with
+ // signature checks disabled.
+ Services.prefs.setBoolPref(PREF_XPI_SIGNATURES_REQUIRED, false);
+
+ add_task(run_proxy_tests);
+
+ if (gHaveSymlinks) {
+ add_task(run_symlink_tests);
+ }
+
+ run_next_test();
+}
+
+async function run_proxy_tests() {
+ if (!gHaveSymlinks) {
+ ADDONS = ADDONS.filter(a => a.type != "symlink");
+ }
+
+ for (let addon of ADDONS) {
+ addon.directory = gTmpD.clone();
+ addon.directory.append(addon.id);
+
+ addon.proxyFile = profileDir.clone();
+ addon.proxyFile.append(addon.dirId || addon.id);
+
+ let files = ExtensionTestCommon.generateFiles({
+ manifest: {
+ name: addon.id,
+ applications: { gecko: { id: addon.id } },
+ },
+ });
+ let path = OS.Path.join(gTmpD.path, addon.id);
+ await AddonTestUtils.promiseWriteFilesToDir(path, files);
+
+ if (addon.type == "proxy") {
+ await promiseWriteFile(addon.proxyFile, addon.directory.path);
+ } else if (addon.type == "symlink") {
+ await createSymlink(addon.directory, addon.proxyFile);
+ }
+ }
+
+ await promiseStartupManager();
+
+ // Check that all add-ons original sources still exist after invalid
+ // add-ons have been removed at startup.
+ checkAddonsExist();
+
+ let addons = await AddonManager.getAddonsByIDs(ADDONS.map(addon => addon.id));
+ try {
+ for (let [i, addon] of addons.entries()) {
+ // Ensure that valid proxied add-ons were installed properly on
+ // platforms that support the installation method.
+ print(
+ ADDONS[i].id,
+ ADDONS[i].dirId,
+ ADDONS[i].dirId != null,
+ ADDONS[i].type == "symlink"
+ );
+ Assert.equal(addon == null, ADDONS[i].dirId != null);
+
+ if (addon != null) {
+ let fixURL = url => {
+ if (AppConstants.platform == "macosx") {
+ return url.replace(RegExp(`^file:///private/`), "file:///");
+ }
+ return url;
+ };
+
+ // Check that proxied add-ons do not have upgrade permissions.
+ Assert.equal(addon.permissions & AddonManager.PERM_CAN_UPGRADE, 0);
+
+ // Check that getResourceURI points to the right place.
+ Assert.equal(
+ Services.io.newFileURI(ADDONS[i].directory).spec,
+ fixURL(addon.getResourceURI().spec),
+ `Base resource URL resolves as expected`
+ );
+
+ let file = ADDONS[i].directory.clone();
+ file.append("manifest.json");
+
+ Assert.equal(
+ Services.io.newFileURI(file).spec,
+ fixURL(addon.getResourceURI("manifest.json").spec),
+ `Resource URLs resolve as expected`
+ );
+
+ await addon.uninstall();
+ }
+ }
+
+ // Check that original sources still exist after explicit uninstall.
+ await promiseRestartManager();
+ checkAddonsExist();
+
+ await promiseShutdownManager();
+
+ // Check that all of the proxy files have been removed and remove
+ // the original targets.
+ for (let addon of ADDONS) {
+ equal(
+ addon.proxyFile.exists(),
+ addon.dirId != null,
+ `Proxy file ${addon.proxyFile.path} should exist?`
+ );
+ addon.directory.remove(true);
+ try {
+ addon.proxyFile.remove(false);
+ } catch (e) {}
+ }
+ } catch (e) {
+ do_throw(e);
+ }
+}
+
+// Check that symlinks are not followed out of a directory tree
+// when deleting an add-on.
+async function run_symlink_tests() {
+ const ID = "unpacked@test.mozilla.org";
+
+ let tempDirectory = gTmpD.clone();
+ tempDirectory.append(ID);
+
+ let tempFile = tempDirectory.clone();
+ tempFile.append("test.txt");
+ tempFile.create(Ci.nsIFile.NORMAL_FILE_TYPE, 0o644);
+
+ let addonDirectory = profileDir.clone();
+ addonDirectory.append(ID);
+
+ let files = ExtensionTestCommon.generateFiles({
+ manifest: { applications: { gecko: { id: ID } } },
+ });
+ await AddonTestUtils.promiseWriteFilesToDir(addonDirectory.path, files);
+
+ let symlink = addonDirectory.clone();
+ symlink.append(tempDirectory.leafName);
+ await createSymlink(tempDirectory, symlink);
+
+ // Make sure that the symlink was created properly.
+ let file = symlink.clone();
+ file.append(tempFile.leafName);
+ file.normalize();
+ Assert.equal(file.path.replace(/^\/private\//, "/"), tempFile.path);
+
+ await promiseStartupManager();
+
+ let addon = await AddonManager.getAddonByID(ID);
+ Assert.notEqual(addon, null);
+
+ await addon.uninstall();
+
+ await promiseRestartManager();
+ await promiseShutdownManager();
+
+ // Check that the install directory is gone.
+ Assert.ok(!addonDirectory.exists());
+
+ // Check that the temp file is not gone.
+ Assert.ok(tempFile.exists());
+
+ tempDirectory.remove(true);
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_recommendations.js b/toolkit/mozapps/extensions/test/xpcshell/test_recommendations.js
new file mode 100644
index 0000000000..eb80ad204c
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_recommendations.js
@@ -0,0 +1,336 @@
+/* Any copyright is dedicated to the Public Domain.
+http://creativecommons.org/publicdomain/zero/1.0/ */
+
+"use strict";
+
+const { XPIInstall } = ChromeUtils.import(
+ "resource://gre/modules/addons/XPIInstall.jsm"
+);
+
+AddonTestUtils.init(this);
+AddonTestUtils.overrideCertDB();
+
+const testStartTime = Date.now();
+const not_before = new Date(testStartTime - 3600000).toISOString();
+const not_after = new Date(testStartTime + 3600000).toISOString();
+const RECOMMENDATION_FILE_NAME = "mozilla-recommendation.json";
+
+function createFileWithRecommendations(id, recommendation) {
+ let files = {};
+ if (recommendation) {
+ files[RECOMMENDATION_FILE_NAME] = recommendation;
+ }
+ return AddonTestUtils.createTempWebExtensionFile({
+ manifest: {
+ applications: { gecko: { id } },
+ },
+ files,
+ });
+}
+
+async function installAddonWithRecommendations(id, recommendation) {
+ let xpi = createFileWithRecommendations(id, recommendation);
+ let install = await AddonTestUtils.promiseInstallFile(xpi);
+ return install.addon;
+}
+
+function checkRecommended(addon, recommended = true) {
+ equal(
+ addon.isRecommended,
+ recommended,
+ "The add-on isRecommended state is correct"
+ );
+ equal(
+ addon.recommendationStates.includes("recommended"),
+ recommended,
+ "The add-on recommendationStates is correct"
+ );
+}
+
+add_task(async function setup() {
+ await ExtensionTestUtils.startAddonManager();
+});
+
+add_task(async function text_no_file() {
+ const id = "no-recommendations-file@test.web.extension";
+ let addon = await installAddonWithRecommendations(id, null);
+
+ checkRecommended(addon, false);
+
+ await addon.uninstall();
+});
+
+add_task(async function text_malformed_file() {
+ const id = "no-recommendations-file@test.web.extension";
+ let addon = await installAddonWithRecommendations(id, "This is not JSON");
+
+ checkRecommended(addon, false);
+
+ await addon.uninstall();
+});
+
+add_task(async function test_valid_recommendation_file() {
+ const id = "recommended@test.web.extension";
+ let addon = await installAddonWithRecommendations(id, {
+ addon_id: id,
+ states: ["recommended"],
+ validity: { not_before, not_after },
+ });
+
+ checkRecommended(addon);
+
+ await addon.uninstall();
+});
+
+add_task(async function test_multiple_valid_recommendation_file() {
+ const id = "recommended@test.web.extension";
+ let addon = await installAddonWithRecommendations(id, {
+ addon_id: id,
+ states: ["recommended", "something"],
+ validity: { not_before, not_after },
+ });
+
+ checkRecommended(addon);
+ ok(
+ addon.recommendationStates.includes("something"),
+ "The add-on recommendationStates contains something"
+ );
+
+ await addon.uninstall();
+});
+
+add_task(async function test_unsigned() {
+ // Don't override the certificate, so that the test add-on is unsigned.
+ AddonTestUtils.useRealCertChecks = true;
+ // Allow unsigned add-on to be installed.
+ Services.prefs.setBoolPref("xpinstall.signatures.required", false);
+
+ const id = "unsigned@test.web.extension";
+ let addon = await installAddonWithRecommendations(id, {
+ addon_id: id,
+ states: ["recommended"],
+ validity: { not_before, not_after },
+ });
+
+ checkRecommended(addon, false);
+
+ await addon.uninstall();
+ AddonTestUtils.useRealCertChecks = false;
+ Services.prefs.setBoolPref("xpinstall.signatures.required", true);
+});
+
+add_task(async function test_temporary() {
+ const id = "temporary@test.web.extension";
+ let xpi = createFileWithRecommendations(id, {
+ addon_id: id,
+ states: ["recommended"],
+ validity: { not_before, not_after },
+ });
+ let addon = await XPIInstall.installTemporaryAddon(xpi);
+
+ checkRecommended(addon, false);
+
+ await addon.uninstall();
+});
+
+// Tests that unpacked temporary add-ons are not recommended.
+add_task(async function test_temporary_directory() {
+ const id = "temporary-dir@test.web.extension";
+ let files = ExtensionTestCommon.generateFiles({
+ manifest: {
+ applications: { gecko: { id } },
+ },
+ files: {
+ [RECOMMENDATION_FILE_NAME]: {
+ addon_id: id,
+ states: ["recommended"],
+ validity: { not_before, not_after },
+ },
+ },
+ });
+ let extDir = await AddonTestUtils.promiseWriteFilesToExtension(
+ gTmpD.path,
+ id,
+ files,
+ true
+ );
+
+ let addon = await XPIInstall.installTemporaryAddon(extDir);
+
+ checkRecommended(addon, false);
+
+ await addon.uninstall();
+ extDir.remove(true);
+});
+
+add_task(async function test_builtin() {
+ const id = "builtin@test.web.extension";
+ let extension = await installBuiltinExtension({
+ manifest: {
+ applications: { gecko: { id } },
+ },
+ background: `browser.test.sendMessage("started");`,
+ files: {
+ [RECOMMENDATION_FILE_NAME]: {
+ addon_id: id,
+ states: ["recommended"],
+ validity: { not_before, not_after },
+ },
+ },
+ });
+ await extension.awaitMessage("started");
+
+ checkRecommended(extension.addon, false);
+
+ await extension.unload();
+});
+
+add_task(async function test_theme() {
+ const id = "theme@test.web.extension";
+ let xpi = AddonTestUtils.createTempWebExtensionFile({
+ manifest: {
+ applications: { gecko: { id } },
+ theme: {},
+ },
+ files: {
+ [RECOMMENDATION_FILE_NAME]: {
+ addon_id: id,
+ states: ["recommended"],
+ validity: { not_before, not_after },
+ },
+ },
+ });
+ let { addon } = await AddonTestUtils.promiseInstallFile(xpi);
+
+ checkRecommended(addon, false);
+
+ await addon.uninstall();
+});
+
+add_task(async function test_not_recommended() {
+ const id = "not-recommended@test.web.extension";
+ let addon = await installAddonWithRecommendations(id, {
+ addon_id: id,
+ states: ["something"],
+ validity: { not_before, not_after },
+ });
+
+ checkRecommended(addon, false);
+ ok(
+ addon.recommendationStates.includes("something"),
+ "The add-on recommendationStates contains something"
+ );
+
+ await addon.uninstall();
+});
+
+add_task(async function test_id_missing() {
+ const id = "no-id@test.web.extension";
+ let addon = await installAddonWithRecommendations(id, {
+ states: ["recommended"],
+ validity: { not_before, not_after },
+ });
+
+ checkRecommended(addon, false);
+
+ await addon.uninstall();
+});
+
+add_task(async function test_expired() {
+ const id = "expired@test.web.extension";
+ let addon = await installAddonWithRecommendations(id, {
+ addon_id: id,
+ states: ["recommended", "something"],
+ validity: { not_before, not_after: not_before },
+ });
+
+ checkRecommended(addon, false);
+ ok(
+ !addon.recommendationStates.length,
+ "The add-on recommendationStates does not contain anything"
+ );
+
+ await addon.uninstall();
+});
+
+add_task(async function test_not_valid_yet() {
+ const id = "expired@test.web.extension";
+ let addon = await installAddonWithRecommendations(id, {
+ addon_id: id,
+ states: ["recommended"],
+ validity: { not_before: not_after, not_after },
+ });
+
+ checkRecommended(addon, false);
+
+ await addon.uninstall();
+});
+
+add_task(async function test_states_missing() {
+ const id = "states-missing@test.web.extension";
+ let addon = await installAddonWithRecommendations(id, {
+ addon_id: id,
+ validity: { not_before, not_after },
+ });
+
+ checkRecommended(addon, false);
+
+ await addon.uninstall();
+});
+
+add_task(async function test_validity_missing() {
+ const id = "validity-missing@test.web.extension";
+ let addon = await installAddonWithRecommendations(id, {
+ addon_id: id,
+ states: ["recommended"],
+ });
+
+ checkRecommended(addon, false);
+
+ await addon.uninstall();
+});
+
+add_task(async function test_not_before_missing() {
+ const id = "not-before-missing@test.web.extension";
+ let addon = await installAddonWithRecommendations(id, {
+ addon_id: id,
+ states: ["recommended"],
+ validity: { not_after },
+ });
+
+ checkRecommended(addon, false);
+
+ await addon.uninstall();
+});
+
+add_task(async function test_bad_states() {
+ const id = "bad-states@test.web.extension";
+ let addon = await installAddonWithRecommendations(id, {
+ addon_id: id,
+ states: { recommended: true },
+ validity: { not_before, not_after },
+ });
+
+ checkRecommended(addon, false);
+
+ await addon.uninstall();
+});
+
+add_task(async function test_recommendation_persist_restart() {
+ const id = "persisted-recommendation@test.web.extension";
+ let addon = await installAddonWithRecommendations(id, {
+ addon_id: id,
+ states: ["recommended"],
+ validity: { not_before, not_after },
+ });
+
+ checkRecommended(addon);
+
+ await AddonTestUtils.promiseRestartManager();
+
+ addon = await AddonManager.getAddonByID(id);
+
+ checkRecommended(addon);
+
+ await addon.uninstall();
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_registerchrome.js b/toolkit/mozapps/extensions/test/xpcshell/test_registerchrome.js
new file mode 100644
index 0000000000..22e7986334
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_registerchrome.js
@@ -0,0 +1,88 @@
+"use strict";
+
+function getFileURI(path) {
+ let file = do_get_file(".");
+ file.append(path);
+ return Services.io.newFileURI(file);
+}
+
+add_task(async function() {
+ const registry = Cc["@mozilla.org/chrome/chrome-registry;1"].getService(
+ Ci.nsIChromeRegistry
+ );
+
+ let file1 = getFileURI("file1");
+ let file2 = getFileURI("file2");
+
+ let uri1 = getFileURI("chrome.manifest");
+ let uri2 = getFileURI("manifest.json");
+
+ let overrideURL = Services.io.newURI("chrome://global/content/foo");
+ let contentURL = Services.io.newURI("chrome://test/content/foo");
+ let localeURL = Services.io.newURI("chrome://global/locale/foo");
+
+ let origOverrideURL = registry.convertChromeURL(overrideURL);
+ let origLocaleURL = registry.convertChromeURL(localeURL);
+
+ let entry1 = aomStartup.registerChrome(uri1, [
+ ["override", "chrome://global/content/foo", file1.spec],
+ ["content", "test", file2.spec + "/"],
+ ["locale", "global", "en-US", file2.spec + "/"],
+ ]);
+
+ let entry2 = aomStartup.registerChrome(uri2, [
+ ["override", "chrome://global/content/foo", file2.spec],
+ ["content", "test", file1.spec + "/"],
+ ["locale", "global", "en-US", file1.spec + "/"],
+ ]);
+
+ // Initially, the second entry should override the first.
+ equal(registry.convertChromeURL(overrideURL).spec, file2.spec);
+ let file = file1.spec + "/foo";
+ equal(registry.convertChromeURL(contentURL).spec, file);
+ equal(registry.convertChromeURL(localeURL).spec, file);
+
+ // After destroying the second entry, the first entry should now take
+ // precedence.
+ entry2.destruct();
+ equal(registry.convertChromeURL(overrideURL).spec, file1.spec);
+ file = file2.spec + "/foo";
+ equal(registry.convertChromeURL(contentURL).spec, file);
+ equal(registry.convertChromeURL(localeURL).spec, file);
+
+ // After dropping the reference to the first entry and allowing it to
+ // be GCed, we should be back to the original entries.
+ entry1 = null; // eslint-disable-line no-unused-vars
+ Cu.forceGC();
+ Cu.forceCC();
+ equal(registry.convertChromeURL(overrideURL).spec, origOverrideURL.spec);
+ equal(registry.convertChromeURL(localeURL).spec, origLocaleURL.spec);
+ Assert.throws(
+ () => registry.convertChromeURL(contentURL),
+ e => e.result == Cr.NS_ERROR_FILE_NOT_FOUND,
+ "chrome://test/ should no longer be registered"
+ );
+});
+
+add_task(async function() {
+ const INVALID_VALUES = [
+ {},
+ "foo",
+ ["foo"],
+ [{}],
+ [[]],
+ [["locale", "global"]],
+ [["locale", "global", "en", "foo", "foo"]],
+ [["override", "en"]],
+ [["override", "en", "US", "OR"]],
+ ];
+
+ let uri = getFileURI("chrome.manifest");
+ for (let arg of INVALID_VALUES) {
+ Assert.throws(
+ () => aomStartup.registerChrome(uri, arg),
+ e => e.result == Cr.NS_ERROR_INVALID_ARG,
+ `Arg ${uneval(arg)} should throw`
+ );
+ }
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_registry.js b/toolkit/mozapps/extensions/test/xpcshell/test_registry.js
new file mode 100644
index 0000000000..c241a18e0a
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_registry.js
@@ -0,0 +1,166 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// Make Cu.isInAutomation true.
+Services.prefs.setBoolPref(
+ "security.turn_off_all_security_so_that_viruses_can_take_over_this_computer",
+ true
+);
+
+// Tests that extensions installed through the registry work as expected
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1.9.2");
+
+// Enable loading extensions from the user and system scopes
+Services.prefs.setIntPref(
+ "extensions.enabledScopes",
+ AddonManager.SCOPE_PROFILE +
+ AddonManager.SCOPE_USER +
+ AddonManager.SCOPE_SYSTEM
+);
+
+Services.prefs.setIntPref("extensions.sideloadScopes", AddonManager.SCOPE_ALL);
+
+const ID1 = "addon1@tests.mozilla.org";
+const ID2 = "addon2@tests.mozilla.org";
+let xpi1, xpi2;
+
+let registry;
+
+add_task(async function setup() {
+ xpi1 = await createTempWebExtensionFile({
+ manifest: { applications: { gecko: { id: ID1 } } },
+ });
+
+ xpi2 = await createTempWebExtensionFile({
+ manifest: { applications: { gecko: { id: ID2 } } },
+ });
+
+ registry = new MockRegistry();
+ registerCleanupFunction(() => {
+ registry.shutdown();
+ });
+});
+
+// Tests whether basic registry install works
+add_task(async function test_1() {
+ registry.setValue(
+ Ci.nsIWindowsRegKey.ROOT_KEY_LOCAL_MACHINE,
+ "SOFTWARE\\Mozilla\\XPCShell\\Extensions",
+ ID1,
+ xpi1.path
+ );
+ registry.setValue(
+ Ci.nsIWindowsRegKey.ROOT_KEY_CURRENT_USER,
+ "SOFTWARE\\Mozilla\\XPCShell\\Extensions",
+ ID2,
+ xpi2.path
+ );
+
+ await promiseStartupManager();
+
+ let [a1, a2] = await AddonManager.getAddonsByIDs([ID1, ID2]);
+ notEqual(a1, null);
+ ok(a1.isActive);
+ ok(!hasFlag(a1.permissions, AddonManager.PERM_CAN_UNINSTALL));
+ equal(a1.scope, AddonManager.SCOPE_SYSTEM);
+
+ notEqual(a2, null);
+ ok(a2.isActive);
+ ok(!hasFlag(a2.permissions, AddonManager.PERM_CAN_UNINSTALL));
+ equal(a2.scope, AddonManager.SCOPE_USER);
+});
+
+// Tests whether uninstalling from the registry works
+add_task(async function test_2() {
+ registry.setValue(
+ Ci.nsIWindowsRegKey.ROOT_KEY_LOCAL_MACHINE,
+ "SOFTWARE\\Mozilla\\XPCShell\\Extensions",
+ ID1,
+ null
+ );
+ registry.setValue(
+ Ci.nsIWindowsRegKey.ROOT_KEY_CURRENT_USER,
+ "SOFTWARE\\Mozilla\\XPCShell\\Extensions",
+ ID2,
+ null
+ );
+
+ await promiseRestartManager();
+
+ let [a1, a2] = await AddonManager.getAddonsByIDs([ID1, ID2]);
+ equal(a1, null);
+ equal(a2, null);
+});
+
+// Checks that the ID in the registry must match that in the install manifest
+add_task(async function test_3() {
+ registry.setValue(
+ Ci.nsIWindowsRegKey.ROOT_KEY_LOCAL_MACHINE,
+ "SOFTWARE\\Mozilla\\XPCShell\\Extensions",
+ ID1,
+ xpi2.path
+ );
+ registry.setValue(
+ Ci.nsIWindowsRegKey.ROOT_KEY_CURRENT_USER,
+ "SOFTWARE\\Mozilla\\XPCShell\\Extensions",
+ ID2,
+ xpi1.path
+ );
+
+ await promiseRestartManager();
+
+ let [a1, a2] = await AddonManager.getAddonsByIDs([ID1, ID2]);
+ equal(a1, null);
+ equal(a2, null);
+});
+
+// Tests whether an extension's ID can change without its directory changing
+add_task(async function test_4() {
+ // Restarting with bad items in the registry should not force an EM restart
+ await promiseRestartManager();
+
+ registry.setValue(
+ Ci.nsIWindowsRegKey.ROOT_KEY_LOCAL_MACHINE,
+ "SOFTWARE\\Mozilla\\XPCShell\\Extensions",
+ ID1,
+ null
+ );
+ registry.setValue(
+ Ci.nsIWindowsRegKey.ROOT_KEY_CURRENT_USER,
+ "SOFTWARE\\Mozilla\\XPCShell\\Extensions",
+ ID2,
+ null
+ );
+
+ await promiseRestartManager();
+
+ registry.setValue(
+ Ci.nsIWindowsRegKey.ROOT_KEY_LOCAL_MACHINE,
+ "SOFTWARE\\Mozilla\\XPCShell\\Extensions",
+ ID1,
+ xpi1.path
+ );
+
+ await promiseShutdownManager();
+
+ registry.setValue(
+ Ci.nsIWindowsRegKey.ROOT_KEY_LOCAL_MACHINE,
+ "SOFTWARE\\Mozilla\\XPCShell\\Extensions",
+ ID1,
+ null
+ );
+ registry.setValue(
+ Ci.nsIWindowsRegKey.ROOT_KEY_CURRENT_USER,
+ "SOFTWARE\\Mozilla\\XPCShell\\Extensions",
+ ID2,
+ xpi1.path
+ );
+ xpi2.copyTo(xpi1.parent, xpi1.leafName);
+
+ await promiseStartupManager();
+
+ let [a1, a2] = await AddonManager.getAddonsByIDs([ID1, ID2]);
+ equal(a1, null);
+ notEqual(a2, null);
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_reinstall_disabled_addon.js b/toolkit/mozapps/extensions/test/xpcshell/test_reinstall_disabled_addon.js
new file mode 100644
index 0000000000..0361d9b03e
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_reinstall_disabled_addon.js
@@ -0,0 +1,213 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+const ID = "test_addon@tests.mozilla.org";
+
+const ADDONS = {
+ test_install1_1: {
+ name: "Test 1 Addon",
+ description: "Test 1 addon description",
+ manifest_version: 2,
+ version: "1.0",
+ applications: {
+ gecko: {
+ id: ID,
+ },
+ },
+ },
+ test_install1_2: {
+ name: "Test 1 Addon",
+ description: "Test 1 addon description",
+ manifest_version: 2,
+ version: "2.0",
+ applications: {
+ gecko: {
+ id: ID,
+ },
+ },
+ },
+};
+
+add_task(async function setup() {
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1.9.2");
+ await promiseStartupManager();
+});
+
+// User intentionally reinstalls existing disabled addon of the same version.
+// No onInstalling nor onInstalled are fired.
+add_task(async function reinstallExistingDisabledAddonSameVersion() {
+ await expectEvents(
+ {
+ ignorePlugins: true,
+ addonEvents: {
+ [ID]: [{ event: "onInstalling" }, { event: "onInstalled" }],
+ },
+ installEvents: [
+ { event: "onNewInstall" },
+ { event: "onInstallStarted" },
+ { event: "onInstallEnded" },
+ ],
+ },
+ async () => {
+ const xpi = AddonTestUtils.createTempWebExtensionFile({
+ manifest: ADDONS.test_install1_1,
+ });
+ let install = await AddonManager.getInstallForFile(xpi);
+ await install.install();
+ }
+ );
+
+ let addon = await promiseAddonByID(ID);
+ notEqual(addon, null);
+ equal(addon.pendingOperations, AddonManager.PENDING_NONE);
+ ok(addon.isActive);
+ ok(!addon.userDisabled);
+
+ await expectEvents(
+ {
+ ignorePlugins: true,
+ addonEvents: {
+ [ID]: [{ event: "onDisabling" }, { event: "onDisabled" }],
+ },
+ },
+ () => addon.disable()
+ );
+
+ addon = await promiseAddonByID(ID);
+ notEqual(addon, null);
+ equal(addon.pendingOperations, AddonManager.PENDING_NONE);
+ ok(!addon.isActive);
+ ok(addon.userDisabled);
+
+ await expectEvents(
+ {
+ ignorePlugins: true,
+ addonEvents: {
+ [ID]: [{ event: "onEnabling" }, { event: "onEnabled" }],
+ },
+ installEvents: [
+ { event: "onNewInstall" },
+ { event: "onInstallStarted" },
+ { event: "onInstallEnded" },
+ ],
+ },
+ async () => {
+ const xpi2 = AddonTestUtils.createTempWebExtensionFile({
+ manifest: ADDONS.test_install1_1,
+ });
+ let install = await AddonManager.getInstallForFile(xpi2);
+ await install.install();
+ }
+ );
+
+ addon = await promiseAddonByID(ID);
+ notEqual(addon, null);
+ equal(addon.pendingOperations, AddonManager.PENDING_NONE);
+ ok(addon.isActive);
+ ok(!addon.userDisabled);
+
+ await expectEvents(
+ {
+ ignorePlugins: true,
+ addonEvents: {
+ [ID]: [{ event: "onUninstalling" }, { event: "onUninstalled" }],
+ },
+ },
+ () => addon.uninstall()
+ );
+
+ addon = await promiseAddonByID(ID);
+ equal(addon, null);
+
+ await promiseRestartManager();
+});
+
+// User intentionally reinstalls existing disabled addon of different version,
+// but addon *still should be disabled*.
+add_task(async function reinstallExistingDisabledAddonDifferentVersion() {
+ await expectEvents(
+ {
+ ignorePlugins: true,
+ addonEvents: {
+ [ID]: [{ event: "onInstalling" }, { event: "onInstalled" }],
+ },
+ installEvents: [
+ { event: "onNewInstall" },
+ { event: "onInstallStarted" },
+ { event: "onInstallEnded" },
+ ],
+ },
+ async () => {
+ const xpi = AddonTestUtils.createTempWebExtensionFile({
+ manifest: ADDONS.test_install1_1,
+ });
+ let install = await AddonManager.getInstallForFile(xpi);
+
+ await install.install();
+ }
+ );
+
+ let addon = await promiseAddonByID(ID);
+ notEqual(addon, null);
+ equal(addon.pendingOperations, AddonManager.PENDING_NONE);
+ ok(addon.isActive);
+ ok(!addon.userDisabled);
+
+ await expectEvents(
+ {
+ ignorePlugins: true,
+ addonEvents: {
+ [ID]: [{ event: "onDisabling" }, { event: "onDisabled" }],
+ },
+ },
+ () => addon.disable()
+ );
+
+ addon = await promiseAddonByID(ID);
+ notEqual(addon, null);
+ equal(addon.pendingOperations, AddonManager.PENDING_NONE);
+ ok(!addon.isActive);
+ ok(addon.userDisabled);
+
+ await expectEvents(
+ {
+ ignorePlugins: true,
+ addonEvents: {
+ [ID]: [{ event: "onInstalling" }, { event: "onInstalled" }],
+ },
+ installEvents: [
+ { event: "onNewInstall" },
+ { event: "onInstallStarted" },
+ { event: "onInstallEnded" },
+ ],
+ },
+ async () => {
+ let xpi2 = AddonTestUtils.createTempWebExtensionFile({
+ manifest: ADDONS.test_install1_2,
+ });
+ let install = await AddonManager.getInstallForFile(xpi2);
+ await install.install();
+ }
+ );
+
+ addon = await promiseAddonByID(ID);
+ notEqual(addon, null);
+ equal(addon.pendingOperations, AddonManager.PENDING_NONE);
+ ok(!addon.isActive);
+ ok(addon.userDisabled);
+ equal(addon.version, "2.0");
+
+ await expectEvents(
+ {
+ ignorePlugins: true,
+ addonEvents: {
+ [ID]: [{ event: "onUninstalling" }, { event: "onUninstalled" }],
+ },
+ },
+ () => addon.uninstall()
+ );
+
+ addon = await promiseAddonByID(ID);
+ equal(addon, null);
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_reload.js b/toolkit/mozapps/extensions/test/xpcshell/test_reload.js
new file mode 100644
index 0000000000..2964011315
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_reload.js
@@ -0,0 +1,188 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "42");
+
+const ID = "webextension1@tests.mozilla.org";
+
+const ADDONS = {
+ webextension_1: {
+ "manifest.json": {
+ name: "Web Extension Name",
+ version: "1.0",
+ manifest_version: 2,
+ applications: {
+ gecko: {
+ id: ID,
+ },
+ },
+ icons: {
+ "48": "icon48.png",
+ "64": "icon64.png",
+ },
+ },
+ "chrome.manifest": "content webex ./\n",
+ },
+};
+
+async function tearDownAddon(addon) {
+ await addon.uninstall();
+ await promiseShutdownManager();
+}
+
+add_task(async function test_reloading_a_temp_addon() {
+ await promiseRestartManager();
+ let xpi = AddonTestUtils.createTempXPIFile(ADDONS.webextension_1);
+ const addon = await AddonManager.installTemporaryAddon(xpi);
+
+ var receivedOnUninstalled = false;
+ var receivedOnUninstalling = false;
+ var receivedOnInstalled = false;
+ var receivedOnInstalling = false;
+
+ const onReload = new Promise(resolve => {
+ const listener = {
+ onUninstalling: addonObj => {
+ if (addonObj.id === ID) {
+ receivedOnUninstalling = true;
+ }
+ },
+ onUninstalled: addonObj => {
+ if (addonObj.id === ID) {
+ receivedOnUninstalled = true;
+ }
+ },
+ onInstalling: addonObj => {
+ receivedOnInstalling = true;
+ equal(addonObj.id, ID);
+ },
+ onInstalled: addonObj => {
+ receivedOnInstalled = true;
+ equal(addonObj.id, ID);
+ // This should be the last event called.
+ AddonManager.removeAddonListener(listener);
+ resolve();
+ },
+ };
+ AddonManager.addAddonListener(listener);
+ });
+
+ await addon.reload();
+ await onReload;
+
+ // Make sure reload() doesn't trigger uninstall events.
+ equal(
+ receivedOnUninstalled,
+ false,
+ "reload should not trigger onUninstalled"
+ );
+ equal(
+ receivedOnUninstalling,
+ false,
+ "reload should not trigger onUninstalling"
+ );
+
+ // Make sure reload() triggers install events, like an upgrade.
+ equal(receivedOnInstalling, true, "reload should trigger onInstalling");
+ equal(receivedOnInstalled, true, "reload should trigger onInstalled");
+
+ await tearDownAddon(addon);
+});
+
+add_task(async function test_can_reload_permanent_addon() {
+ await promiseRestartManager();
+ const { addon } = await AddonTestUtils.promiseInstallXPI(
+ ADDONS.webextension_1
+ );
+
+ let disabledCalled = false;
+ let enabledCalled = false;
+ AddonManager.addAddonListener({
+ onDisabled: aAddon => {
+ Assert.ok(!enabledCalled);
+ disabledCalled = true;
+ },
+ onEnabled: aAddon => {
+ Assert.ok(disabledCalled);
+ enabledCalled = true;
+ },
+ });
+
+ await addon.reload();
+
+ Assert.ok(disabledCalled);
+ Assert.ok(enabledCalled);
+
+ notEqual(addon, null);
+ equal(addon.appDisabled, false);
+ equal(addon.userDisabled, false);
+
+ await tearDownAddon(addon);
+});
+
+add_task(async function test_reload_to_invalid_version_fails() {
+ await promiseRestartManager();
+ let tempdir = gTmpD.clone();
+
+ // The initial version of the add-on will be compatible, and will therefore load
+ const addonId = "invalid_version_cannot_be_reloaded@tests.mozilla.org";
+ let manifest = {
+ name: "invalid_version_cannot_be_reloaded",
+ description: "test invalid_version_cannot_be_reloaded",
+ manifest_version: 2,
+ version: "1.0",
+ applications: {
+ gecko: {
+ id: addonId,
+ },
+ },
+ };
+
+ let addonDir = await promiseWriteWebManifestForExtension(
+ manifest,
+ tempdir,
+ "invalid_version"
+ );
+ await AddonManager.installTemporaryAddon(addonDir);
+
+ let addon = await promiseAddonByID(addonId);
+ notEqual(addon, null);
+ equal(addon.id, addonId);
+ equal(addon.version, "1.0");
+ equal(addon.appDisabled, false);
+ equal(addon.userDisabled, false);
+ addonDir.remove(true);
+
+ // update the manifest to make the add-on version incompatible, so the reload will reject
+ manifest.applications.gecko.strict_min_version = "1";
+ manifest.applications.gecko.strict_max_version = "1";
+ manifest.version = "2.0";
+
+ addonDir = await promiseWriteWebManifestForExtension(
+ manifest,
+ tempdir,
+ "invalid_version",
+ false
+ );
+ let expectedMsg = new RegExp(
+ "Add-on invalid_version_cannot_be_reloaded@tests.mozilla.org is not compatible with application version. " +
+ "add-on minVersion: 1. add-on maxVersion: 1."
+ );
+
+ await Assert.rejects(
+ addon.reload(),
+ expectedMsg,
+ "Reload rejects when application version does not fall between minVersion and maxVersion"
+ );
+
+ let reloadedAddon = await promiseAddonByID(addonId);
+ notEqual(reloadedAddon, null);
+ equal(reloadedAddon.id, addonId);
+ equal(reloadedAddon.version, "1.0");
+ equal(reloadedAddon.appDisabled, false);
+ equal(reloadedAddon.userDisabled, false);
+
+ await tearDownAddon(reloadedAddon);
+ addonDir.remove(true);
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_safemode.js b/toolkit/mozapps/extensions/test/xpcshell/test_safemode.js
new file mode 100644
index 0000000000..4adc68d26c
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_safemode.js
@@ -0,0 +1,90 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// Tests that extensions behave correctly in safe mode
+let scopes = AddonManager.SCOPE_PROFILE | AddonManager.SCOPE_APPLICATION;
+Services.prefs.setIntPref("extensions.enabledScopes", scopes);
+
+const profileDir = gProfD.clone();
+profileDir.append("extensions");
+
+const ID = "addon1@tests.mozilla.org";
+const BUILTIN_ID = "builtin@tests.mozilla.org";
+const VERSION = "1.0";
+
+// Sets up the profile by installing an add-on.
+add_task(async function setup() {
+ AddonTestUtils.createAppInfo(
+ "xpcshell@tests.mozilla.org",
+ "XPCShell",
+ "1",
+ "1.9.2"
+ );
+ gAppInfo.inSafeMode = true;
+
+ await promiseStartupManager();
+
+ let a1 = await AddonManager.getAddonByID(ID);
+ Assert.equal(a1, null);
+ do_check_not_in_crash_annotation(ID, VERSION);
+
+ await promiseInstallWebExtension({
+ manifest: {
+ name: "Test 1",
+ version: VERSION,
+ applications: { gecko: { id: ID } },
+ },
+ });
+ let wrapper = await installBuiltinExtension({
+ manifest: {
+ applications: { gecko: { id: BUILTIN_ID } },
+ },
+ });
+
+ let builtin = await AddonManager.getAddonByID(BUILTIN_ID);
+ Assert.notEqual(builtin, null, "builtin extension is installed");
+
+ await promiseRestartManager();
+
+ a1 = await AddonManager.getAddonByID(ID);
+ Assert.notEqual(a1, null);
+ Assert.ok(!a1.isActive);
+ Assert.ok(!a1.userDisabled);
+ Assert.ok(isExtensionInBootstrappedList(profileDir, ID));
+ Assert.ok(hasFlag(a1.permissions, AddonManager.PERM_CAN_DISABLE));
+ Assert.ok(!hasFlag(a1.permissions, AddonManager.PERM_CAN_ENABLE));
+ do_check_not_in_crash_annotation(ID, VERSION);
+
+ builtin = await AddonManager.getAddonByID(BUILTIN_ID);
+ Assert.notEqual(builtin, null, "builtin extension is installed");
+ Assert.ok(builtin.isActive, "builtin extension is active");
+ await wrapper.unload();
+});
+
+// Disabling an add-on should work
+add_task(async function test_disable() {
+ let a1 = await AddonManager.getAddonByID(ID);
+ Assert.ok(
+ !hasFlag(
+ a1.operationsRequiringRestart,
+ AddonManager.OP_NEEDS_RESTART_DISABLE
+ )
+ );
+ await a1.disable();
+ Assert.ok(!a1.isActive);
+ Assert.ok(!hasFlag(a1.permissions, AddonManager.PERM_CAN_DISABLE));
+ Assert.ok(hasFlag(a1.permissions, AddonManager.PERM_CAN_ENABLE));
+ do_check_not_in_crash_annotation(ID, VERSION);
+});
+
+// Enabling an add-on should happen but not become active.
+add_task(async function test_enable() {
+ let a1 = await AddonManager.getAddonByID("addon1@tests.mozilla.org");
+ await a1.enable();
+ Assert.ok(!a1.isActive);
+ Assert.ok(hasFlag(a1.permissions, AddonManager.PERM_CAN_DISABLE));
+ Assert.ok(!hasFlag(a1.permissions, AddonManager.PERM_CAN_ENABLE));
+
+ do_check_not_in_crash_annotation(ID, VERSION);
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_schema_change.js b/toolkit/mozapps/extensions/test/xpcshell/test_schema_change.js
new file mode 100644
index 0000000000..85c1a03f41
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_schema_change.js
@@ -0,0 +1,160 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+const PREF_DB_SCHEMA = "extensions.databaseSchema";
+const PREF_IS_EMBEDDED = "extensions.isembedded";
+
+registerCleanupFunction(() => {
+ Services.prefs.clearUserPref(PREF_DISABLE_SECURITY);
+ Services.prefs.clearUserPref(PREF_IS_EMBEDDED);
+});
+
+const profileDir = gProfD.clone();
+profileDir.append("extensions");
+
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "49");
+
+add_task(async function test_setup() {
+ Services.prefs.setBoolPref(PREF_DISABLE_SECURITY, true);
+ await promiseStartupManager();
+});
+
+add_task(async function run_tests() {
+ // Fake installTelemetryInfo used in the addon installation,
+ // to verify that they are preserved after the DB is updated
+ // from the addon manifests.
+ const fakeInstallTelemetryInfo = { source: "amo", method: "amWebAPI" };
+
+ const ID = "schema-change@tests.mozilla.org";
+
+ const xpi1 = createTempWebExtensionFile({
+ manifest: {
+ name: "Test Add-on",
+ version: "1.0",
+ applications: { gecko: { id: ID } },
+ },
+ });
+
+ const xpi2 = createTempWebExtensionFile({
+ manifest: {
+ name: "Test Add-on 2",
+ version: "2.0",
+ applications: { gecko: { id: ID } },
+ },
+ });
+
+ let xpiPath = OS.Path.join(profileDir.path, `${ID}.xpi`);
+
+ const TESTS = [
+ {
+ what: "Schema change with no application update reloads metadata.",
+ expectedVersion: "2.0",
+ action() {
+ Services.prefs.setIntPref(PREF_DB_SCHEMA, 0);
+ },
+ },
+ {
+ what:
+ "Application update with no schema change does not reload metadata.",
+ expectedVersion: "1.0",
+ action() {
+ gAppInfo.version = "2";
+ },
+ },
+ {
+ what: "App update and a schema change causes a reload of the manifest.",
+ expectedVersion: "2.0",
+ action() {
+ gAppInfo.version = "3";
+ Services.prefs.setIntPref(PREF_DB_SCHEMA, 0);
+ },
+ },
+ {
+ what: "No schema change, no manifest reload.",
+ expectedVersion: "1.0",
+ action() {},
+ },
+ {
+ what: "Modified timestamp on the XPI causes a reload of the manifest.",
+ expectedVersion: "2.0",
+ async action() {
+ let stat = await IOUtils.stat(xpiPath);
+ let newLastModTime = stat.lastModified + 60 * 1000;
+ await IOUtils.touch(xpiPath, newLastModTime);
+ },
+ },
+ ];
+
+ for (let test of TESTS) {
+ info(test.what);
+ await promiseInstallFile(xpi1, false, fakeInstallTelemetryInfo);
+
+ let addon = await promiseAddonByID(ID);
+ notEqual(addon, null, "Got an addon object as expected");
+ equal(addon.version, "1.0", "Got the expected version");
+ Assert.deepEqual(
+ addon.installTelemetryInfo,
+ fakeInstallTelemetryInfo,
+ "Got the expected installTelemetryInfo after installing the addon"
+ );
+
+ await promiseShutdownManager();
+
+ let fileInfo = await IOUtils.stat(xpiPath);
+
+ xpi2.copyTo(profileDir, `${ID}.xpi`);
+
+ // Make sure the timestamp of the extension is unchanged, so it is not
+ // re-scanned for that reason.
+ await IOUtils.touch(xpiPath, fileInfo.lastModified);
+
+ await test.action();
+
+ await promiseStartupManager();
+
+ addon = await promiseAddonByID(ID);
+ notEqual(addon, null, "Got an addon object as expected");
+ equal(addon.version, test.expectedVersion, "Got the expected version");
+ Assert.deepEqual(
+ addon.installTelemetryInfo,
+ fakeInstallTelemetryInfo,
+ "Got the expected installTelemetryInfo after rebuilding the DB"
+ );
+
+ await addon.uninstall();
+ }
+});
+
+add_task(async function embedder_disabled_stays_disabled() {
+ Services.prefs.setBoolPref(PREF_IS_EMBEDDED, true);
+
+ const ID = "embedder-disabled@tests.mozilla.org";
+
+ await promiseInstallWebExtension({
+ manifest: {
+ name: "Test Add-on",
+ version: "1.0",
+ applications: { gecko: { id: ID } },
+ },
+ });
+
+ let addon = await promiseAddonByID(ID);
+
+ equal(addon.embedderDisabled, false);
+
+ await addon.setEmbedderDisabled(true);
+ equal(addon.embedderDisabled, true);
+
+ await promiseShutdownManager();
+
+ // Change db schema to force reload
+ Services.prefs.setIntPref(PREF_DB_SCHEMA, 0);
+
+ await promiseStartupManager();
+
+ addon = await promiseAddonByID(ID);
+ equal(addon.embedderDisabled, true);
+
+ await addon.uninstall();
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_seen.js b/toolkit/mozapps/extensions/test/xpcshell/test_seen.js
new file mode 100644
index 0000000000..2bc2d8121d
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_seen.js
@@ -0,0 +1,283 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// Make Cu.isInAutomation true.
+Services.prefs.setBoolPref(
+ "security.turn_off_all_security_so_that_viruses_can_take_over_this_computer",
+ true
+);
+
+const ID = "addon@tests.mozilla.org";
+
+let profileDir = gProfD.clone();
+profileDir.append("extensions");
+
+// By default disable add-ons from the profile and the system-wide scope
+const SCOPES = AddonManager.SCOPE_PROFILE | AddonManager.SCOPE_SYSTEM;
+Services.prefs.setIntPref("extensions.enabledScopes", SCOPES);
+Services.prefs.setIntPref("extensions.autoDisableScopes", SCOPES);
+
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1.9.2");
+
+const XPIS = {};
+
+// Installing an add-on through the API should mark it as seen
+add_task(async function() {
+ await promiseStartupManager();
+
+ for (let n of [1, 2]) {
+ XPIS[n] = await createTempWebExtensionFile({
+ manifest: {
+ name: "Test",
+ version: `${n}.0`,
+ applications: { gecko: { id: ID } },
+ },
+ });
+ }
+
+ await promiseInstallFile(XPIS[1]);
+
+ let addon = await promiseAddonByID(ID);
+ Assert.equal(addon.version, "1.0");
+ Assert.ok(!addon.foreignInstall);
+ Assert.ok(addon.seen);
+
+ await promiseRestartManager();
+
+ addon = await promiseAddonByID(ID);
+ Assert.ok(!addon.foreignInstall);
+ Assert.ok(addon.seen);
+
+ // Installing an update should retain that
+ await promiseInstallFile(XPIS[2]);
+
+ addon = await promiseAddonByID(ID);
+ Assert.equal(addon.version, "2.0");
+ Assert.ok(!addon.foreignInstall);
+ Assert.ok(addon.seen);
+
+ await promiseRestartManager();
+
+ addon = await promiseAddonByID(ID);
+ Assert.ok(!addon.foreignInstall);
+ Assert.ok(addon.seen);
+
+ await addon.uninstall();
+
+ await promiseShutdownManager();
+});
+
+// Sideloading an add-on in the systemwide location should mark it as unseen
+add_task(async function() {
+ let savedStartupScanScopes = Services.prefs.getIntPref(
+ "extensions.startupScanScopes"
+ );
+ Services.prefs.setIntPref("extensions.startupScanScopes", 0);
+ Services.prefs.setIntPref(
+ "extensions.sideloadScopes",
+ AddonManager.SCOPE_ALL
+ );
+
+ let systemParentDir = gTmpD.clone();
+ systemParentDir.append("systemwide-extensions");
+ registerDirectory("XRESysSExtPD", systemParentDir.clone());
+ registerCleanupFunction(() => {
+ systemParentDir.remove(true);
+ });
+
+ let systemDir = systemParentDir.clone();
+ systemDir.append(Services.appinfo.ID);
+
+ let path = await manuallyInstall(XPIS[1], systemDir, ID);
+ // Make sure the startup code will detect sideloaded updates
+ setExtensionModifiedTime(path, Date.now() - 10000);
+
+ await promiseStartupManager();
+ await AddonManagerPrivate.getNewSideloads();
+
+ let addon = await promiseAddonByID(ID);
+ Assert.equal(addon.version, "1.0");
+ Assert.ok(addon.foreignInstall);
+ Assert.ok(!addon.seen);
+
+ await promiseRestartManager();
+
+ addon = await promiseAddonByID(ID);
+ Assert.ok(addon.foreignInstall);
+ Assert.ok(!addon.seen);
+
+ await promiseShutdownManager();
+ Services.obs.notifyObservers(path, "flush-cache-entry");
+ path.remove(true);
+
+ Services.prefs.setIntPref(
+ "extensions.startupScanScopes",
+ savedStartupScanScopes
+ );
+ Services.prefs.clearUserPref("extensions.sideloadScopes");
+});
+
+// Sideloading an add-on in the profile should mark it as unseen and it should
+// remain unseen after an update is sideloaded.
+add_task(async function() {
+ let path = await manuallyInstall(XPIS[1], profileDir, ID);
+ // Make sure the startup code will detect sideloaded updates
+ setExtensionModifiedTime(path, Date.now() - 10000);
+
+ await promiseStartupManager();
+
+ let addon = await promiseAddonByID(ID);
+ Assert.equal(addon.version, "1.0");
+ Assert.ok(addon.foreignInstall);
+ Assert.ok(!addon.seen);
+
+ await promiseRestartManager();
+
+ addon = await promiseAddonByID(ID);
+ Assert.ok(addon.foreignInstall);
+ Assert.ok(!addon.seen);
+
+ await promiseShutdownManager();
+
+ // Sideloading an update shouldn't change the state
+ manuallyUninstall(profileDir, ID);
+ await manuallyInstall(XPIS[2], profileDir, ID);
+ setExtensionModifiedTime(path, Date.now());
+
+ await promiseStartupManager();
+
+ addon = await promiseAddonByID(ID);
+ Assert.equal(addon.version, "2.0");
+ Assert.ok(addon.foreignInstall);
+ Assert.ok(!addon.seen);
+
+ await addon.uninstall();
+ await promiseShutdownManager();
+});
+
+// Sideloading an add-on in the profile should mark it as unseen and it should
+// remain unseen after a regular update.
+add_task(async function() {
+ let path = await manuallyInstall(XPIS[1], profileDir, ID);
+ // Make sure the startup code will detect sideloaded updates
+ setExtensionModifiedTime(path, Date.now() - 10000);
+
+ await promiseStartupManager();
+
+ let addon = await promiseAddonByID(ID);
+ Assert.equal(addon.version, "1.0");
+ Assert.ok(addon.foreignInstall);
+ Assert.ok(!addon.seen);
+
+ await promiseRestartManager();
+
+ addon = await promiseAddonByID(ID);
+ Assert.ok(addon.foreignInstall);
+ Assert.ok(!addon.seen);
+
+ // Updating through the API shouldn't change the state
+ let install = await promiseInstallFile(XPIS[2]);
+ Assert.equal(install.state, AddonManager.STATE_INSTALLED);
+ Assert.ok(
+ !hasFlag(install.addon.pendingOperations, AddonManager.PENDING_INSTALL)
+ );
+
+ addon = install.addon;
+ Assert.ok(addon.foreignInstall);
+ Assert.ok(!addon.seen);
+
+ await promiseRestartManager();
+
+ addon = await promiseAddonByID(ID);
+ Assert.equal(addon.version, "2.0");
+ Assert.ok(addon.foreignInstall);
+ Assert.ok(!addon.seen);
+
+ await addon.uninstall();
+ await promiseShutdownManager();
+});
+
+// After a sideloaded addon has been seen, sideloading an update should
+// not reset it to unseen.
+add_task(async function() {
+ let path = await manuallyInstall(XPIS[1], profileDir, ID);
+ // Make sure the startup code will detect sideloaded updates
+ setExtensionModifiedTime(path, Date.now() - 10000);
+
+ await promiseStartupManager();
+
+ let addon = await promiseAddonByID(ID);
+ Assert.equal(addon.version, "1.0");
+ Assert.ok(addon.foreignInstall);
+ Assert.ok(!addon.seen);
+ addon.markAsSeen();
+ Assert.ok(addon.seen);
+
+ await promiseRestartManager();
+
+ addon = await promiseAddonByID(ID);
+ Assert.ok(addon.foreignInstall);
+ Assert.ok(addon.seen);
+
+ await promiseShutdownManager();
+
+ // Sideloading an update shouldn't change the state
+ manuallyUninstall(profileDir, ID);
+ await manuallyInstall(XPIS[2], profileDir, ID);
+ setExtensionModifiedTime(path, Date.now());
+
+ await promiseStartupManager();
+
+ addon = await promiseAddonByID(ID);
+ Assert.equal(addon.version, "2.0");
+ Assert.ok(addon.foreignInstall);
+ Assert.ok(addon.seen);
+
+ await addon.uninstall();
+ await promiseShutdownManager();
+});
+
+// After a sideloaded addon has been seen, manually applying an update should
+// not reset it to unseen.
+add_task(async function() {
+ let path = await manuallyInstall(XPIS[1], profileDir, ID);
+ // Make sure the startup code will detect sideloaded updates
+ setExtensionModifiedTime(path, Date.now() - 10000);
+
+ await promiseStartupManager();
+
+ let addon = await promiseAddonByID(ID);
+ Assert.equal(addon.version, "1.0");
+ Assert.ok(addon.foreignInstall);
+ Assert.ok(!addon.seen);
+ addon.markAsSeen();
+ Assert.ok(addon.seen);
+
+ await promiseRestartManager();
+
+ addon = await promiseAddonByID(ID);
+ Assert.ok(addon.foreignInstall);
+ Assert.ok(addon.seen);
+
+ // Updating through the API shouldn't change the state
+ let install = await promiseInstallFile(XPIS[2]);
+ Assert.equal(install.state, AddonManager.STATE_INSTALLED);
+ Assert.ok(
+ !hasFlag(install.addon.pendingOperations, AddonManager.PENDING_INSTALL)
+ );
+
+ addon = install.addon;
+ Assert.ok(addon.foreignInstall);
+ Assert.ok(addon.seen);
+
+ await promiseRestartManager();
+
+ addon = await promiseAddonByID(ID);
+ Assert.equal(addon.version, "2.0");
+ Assert.ok(addon.foreignInstall);
+ Assert.ok(addon.seen);
+
+ await addon.uninstall();
+ await promiseShutdownManager();
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_shutdown.js b/toolkit/mozapps/extensions/test/xpcshell/test_shutdown.js
new file mode 100644
index 0000000000..7b6ee68bf5
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_shutdown.js
@@ -0,0 +1,133 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// Verify that API functions fail if the Add-ons Manager isn't initialised.
+
+const IGNORE = [
+ "getPreferredIconURL",
+ "escapeAddonURI",
+ "shouldAutoUpdate",
+ "getStartupChanges",
+ "addTypeListener",
+ "removeTypeListener",
+ "addAddonListener",
+ "removeAddonListener",
+ "addInstallListener",
+ "removeInstallListener",
+ "addManagerListener",
+ "removeManagerListener",
+ "addExternalExtensionLoader",
+ "beforeShutdown",
+ "init",
+ "stateToString",
+ "errorToString",
+ "getUpgradeListener",
+ "addUpgradeListener",
+ "removeUpgradeListener",
+ "getInstallSourceFromHost",
+ "getInstallSourceFromPrincipal",
+ "stageLangpacksForAppUpdate",
+];
+
+const IGNORE_PRIVATE = [
+ "AddonAuthor",
+ "AddonScreenshot",
+ "AddonType",
+ "startup",
+ "shutdown",
+ "addonIsActive",
+ "registerProvider",
+ "unregisterProvider",
+ "addStartupChange",
+ "removeStartupChange",
+ "getNewSideloads",
+ "finalShutdown",
+ "recordTimestamp",
+ "recordSimpleMeasure",
+ "recordException",
+ "getSimpleMeasures",
+ "simpleTimer",
+ "setTelemetryDetails",
+ "getTelemetryDetails",
+ "callNoUpdateListeners",
+ "backgroundUpdateTimerHandler",
+ "hasUpgradeListener",
+ "getUpgradeListener",
+ "isDBLoaded",
+ "recordTiming",
+ "BOOTSTRAP_REASONS",
+ "notifyAddonChanged",
+];
+
+async function test_functions() {
+ for (let prop in AddonManager) {
+ if (IGNORE.includes(prop)) {
+ continue;
+ }
+ if (typeof AddonManager[prop] != "function") {
+ continue;
+ }
+
+ let args = [];
+
+ // Getter functions need a callback and in some cases not having one will
+ // throw before checking if the add-ons manager is initialized so pass in
+ // an empty one.
+ if (prop.startsWith("get")) {
+ // For now all getter functions with more than one argument take the
+ // callback in the second argument.
+ if (AddonManager[prop].length > 1) {
+ args.push(undefined, () => {});
+ } else {
+ args.push(() => {});
+ }
+ }
+
+ // Clean this up in bug 1365720
+ if (prop == "getActiveAddons") {
+ args = [];
+ }
+
+ try {
+ info("AddonManager." + prop);
+ await AddonManager[prop](...args);
+ do_throw(prop + " did not throw an exception");
+ } catch (e) {
+ if (e.result != Cr.NS_ERROR_NOT_INITIALIZED) {
+ do_throw(prop + " threw an unexpected exception: " + e);
+ }
+ }
+ }
+
+ for (let prop in AddonManagerPrivate) {
+ if (IGNORE_PRIVATE.includes(prop)) {
+ continue;
+ }
+ if (typeof AddonManagerPrivate[prop] != "function") {
+ continue;
+ }
+
+ try {
+ info("AddonManagerPrivate." + prop);
+ AddonManagerPrivate[prop]();
+ do_throw(prop + " did not throw an exception");
+ } catch (e) {
+ if (e.result != Cr.NS_ERROR_NOT_INITIALIZED) {
+ do_throw(prop + " threw an unexpected exception: " + e);
+ }
+ }
+ }
+}
+
+add_task(async function() {
+ await test_functions();
+ await promiseStartupManager();
+ await promiseShutdownManager();
+ await test_functions();
+});
+
+function run_test() {
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1.9.2");
+ run_next_test();
+}
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_shutdown_barriers.js b/toolkit/mozapps/extensions/test/xpcshell/test_shutdown_barriers.js
new file mode 100644
index 0000000000..e329ec821c
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_shutdown_barriers.js
@@ -0,0 +1,71 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+"use strict";
+
+add_task(async function test_shutdown_barriers() {
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "66");
+
+ await promiseStartupManager();
+
+ const ID = "thing@xpcshell.addons.mozilla.org";
+ const VERSION = "1.42";
+
+ let xpi = await createTempWebExtensionFile({
+ manifest: {
+ applications: { gecko: { id: ID } },
+ version: VERSION,
+ },
+ });
+
+ await AddonManager.installTemporaryAddon(xpi);
+
+ let blockersComplete = 0;
+ AddonManager.beforeShutdown.addBlocker("Before shutdown", async () => {
+ equal(blockersComplete, 0, "No blockers have run yet");
+
+ // Delay a bit to make sure this doesn't succeed because of a timing
+ // fluke.
+ await delay(1000);
+
+ let addon = await AddonManager.getAddonByID(ID);
+ checkAddon(ID, addon, {
+ version: VERSION,
+ userDisabled: false,
+ appDisabled: false,
+ });
+
+ await addon.disable();
+
+ // Delay again for the same reasons.
+ await delay(1000);
+
+ addon = await AddonManager.getAddonByID(ID);
+ checkAddon(ID, addon, {
+ version: VERSION,
+ userDisabled: true,
+ appDisabled: false,
+ });
+
+ blockersComplete++;
+ });
+ AddonManagerPrivate.finalShutdown.addBlocker("Before shutdown", async () => {
+ equal(blockersComplete, 1, "Before shutdown blocker has run");
+
+ // Should probably try to access XPIDatabase here to make sure it
+ // doesn't work correctly, but it's a bit hairy.
+
+ // Delay a bit to make sure this doesn't succeed because of a timing
+ // fluke.
+ await delay(1000);
+
+ blockersComplete++;
+ });
+
+ await promiseShutdownManager();
+ equal(
+ blockersComplete,
+ 2,
+ "Both shutdown blockers ran before manager shutdown completed"
+ );
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_shutdown_early.js b/toolkit/mozapps/extensions/test/xpcshell/test_shutdown_early.js
new file mode 100644
index 0000000000..3e24ad9a94
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_shutdown_early.js
@@ -0,0 +1,61 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+"use strict";
+
+const { TelemetryEnvironment } = ChromeUtils.import(
+ "resource://gre/modules/TelemetryEnvironment.jsm"
+);
+
+// Regression test for bug 1665568: verifies that AddonManager unblocks shutdown
+// when startup is interrupted very early.
+add_task(async function test_shutdown_immediately_after_startup() {
+ // Set as migrated to prevent sync DB load at startup.
+ Services.prefs.setBoolPref("extensions.incognito.migrated", true);
+ Services.prefs.setCharPref("extensions.lastAppVersion", "42");
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "42");
+
+ Cc["@mozilla.org/addons/integration;1"]
+ .getService(Ci.nsIObserver)
+ .observe(null, "addons-startup", null);
+
+ // Above, we have configured the runtime to avoid a forced synchronous load
+ // of the database. Confirm that this is indeed the case.
+ equal(AddonManagerPrivate.isDBLoaded(), false, "DB not loaded synchronously");
+
+ let shutdownCount = 0;
+ AddonManager.beforeShutdown.addBlocker("count", async () => ++shutdownCount);
+
+ let databaseLoaded = false;
+ AddonManagerPrivate.databaseReady.then(() => {
+ databaseLoaded = true;
+ });
+
+ // Accessing TelemetryEnvironment.currentEnvironment triggers initialization
+ // of TelemetryEnvironment / EnvironmentAddonBuilder, which registers a
+ // shutdown blocker.
+ equal(
+ TelemetryEnvironment.currentEnvironment.addons,
+ undefined,
+ "TelemetryEnvironment.currentEnvironment.addons is uninitialized"
+ );
+
+ info("Immediate exit at startup, without quit-application-granted");
+ Services.obs.notifyObservers(null, "profile-before-change");
+ let shutdownPromise = MockAsyncShutdown.profileBeforeChange.trigger();
+ equal(shutdownCount, 1, "AddonManager.beforeShutdown has started");
+
+ // Note: Until now everything ran in the same tick of the event loop.
+
+ // Waiting for AddonManager to have shut down.
+ await shutdownPromise;
+
+ ok(databaseLoaded, "Addon DB loaded for use by TelemetryEnvironment");
+ equal(AddonManagerPrivate.isDBLoaded(), false, "DB unloaded after shutdown");
+
+ Assert.deepEqual(
+ TelemetryEnvironment.currentEnvironment.addons.activeAddons,
+ {},
+ "TelemetryEnvironment.currentEnvironment.addons is initialized"
+ );
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_sideload_scopes.js b/toolkit/mozapps/extensions/test/xpcshell/test_sideload_scopes.js
new file mode 100644
index 0000000000..0d445d4ffb
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_sideload_scopes.js
@@ -0,0 +1,180 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+"use strict";
+
+// We refer to addons that were sideloaded prior to disabling sideloading as legacy. We
+// determine that they are legacy because they are in a SCOPE that is not included
+// in AddonSettings.SCOPES_SIDELOAD.
+//
+// test_startup.js tests the legacy sideloading functionality still works as it should
+// for ESR and some 3rd party distributions, which is to allow sideloading in all scopes.
+//
+// This file tests that locking down the sideload functionality works as we expect it to, which
+// is to allow sideloading only in SCOPE_APPLICATION and SCOPE_PROFILE. We also allow the legacy
+// sideloaded addons to be updated or removed.
+//
+// We first change the sideload scope so we can sideload some addons into locations outside
+// the profile (ie. we create some legacy sideloads). We then reset it to test new sideloads.
+//
+// We expect new sideloads to only work in profile.
+// We expect new sideloads to fail elsewhere.
+// We expect to be able to change/uninstall legacy sideloads.
+
+// IDs for scopes that should sideload when sideloading
+// is not disabled.
+let legacyIDs = [
+ getID(`legacy-global`),
+ getID(`legacy-user`),
+ getID(`legacy-app`),
+ getID(`legacy-profile`),
+];
+
+add_task(async function test_sideloads_legacy() {
+ let IDs = [];
+
+ // Create a "legacy" addon for each scope.
+ for (let [name, dir] of Object.entries(scopeDirectories)) {
+ let id = getID(`legacy-${name}`);
+ IDs.push(id);
+ await createWebExtension(id, initialVersion(name), dir);
+ }
+
+ await promiseStartupManager();
+
+ // SCOPE_APPLICATION will never sideload, so we expect 3 addons.
+ let sideloaded = await AddonManagerPrivate.getNewSideloads();
+ Assert.equal(sideloaded.length, 4, "four sideloaded addons");
+ let sideloadedIds = sideloaded.map(a => a.id);
+ for (let id of legacyIDs) {
+ Assert.ok(sideloadedIds.includes(id), `${id} is sideloaded`);
+ }
+
+ check_startup_changes(AddonManager.STARTUP_CHANGE_INSTALLED, []);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_CHANGED, []);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_UNINSTALLED, []);
+
+ await promiseShutdownManager();
+});
+
+// Test that a sideload install in SCOPE_PROFILE is allowed, all others are
+// disallowed.
+add_task(async function test_sideloads_disabled() {
+ // First, reset our scope pref to disable sideloading. head_sideload.js set this to ALL.
+ Services.prefs.setIntPref(
+ "extensions.sideloadScopes",
+ AddonManager.SCOPE_PROFILE
+ );
+
+ // Create 4 new addons, only one of these, "profile" should
+ // sideload.
+ for (let [name, dir] of Object.entries(scopeDirectories)) {
+ await createWebExtension(getID(name), initialVersion(name), dir);
+ }
+
+ await promiseStartupManager();
+
+ // Test that the "profile" addon has been sideloaded.
+ let sideloaded = await AddonManagerPrivate.getNewSideloads();
+ Assert.equal(sideloaded.length, 1, "one sideloaded addon");
+
+ check_startup_changes(AddonManager.STARTUP_CHANGE_INSTALLED, [
+ getID("profile"),
+ ]);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_CHANGED, []);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_UNINSTALLED, []);
+
+ for (let [name] of Object.entries(scopeDirectories)) {
+ let id = getID(name);
+ let addon = await promiseAddonByID(id);
+ if (name === "profile") {
+ Assert.notEqual(addon, null);
+ Assert.equal(addon.id, id);
+ Assert.ok(addon.foreignInstall);
+ Assert.equal(addon.scope, AddonManager.SCOPE_PROFILE);
+ Assert.ok(addon.userDisabled);
+ Assert.ok(!addon.seen);
+ } else {
+ Assert.equal(addon, null, `addon ${id} is not installed`);
+ }
+ }
+
+ // Test that we still have the 3 legacy addons from the prior test, plus
+ // the new "profile" addon from this test.
+ let extensionAddons = await AddonManager.getAddonsByTypes(["extension"]);
+ Assert.equal(
+ extensionAddons.length,
+ 5,
+ "five addons expected to be installed"
+ );
+ let IDs = extensionAddons.map(ext => ext.id);
+ for (let id of [getID("profile"), ...legacyIDs]) {
+ Assert.ok(IDs.includes(id), `${id} is installed`);
+ }
+
+ await promiseShutdownManager();
+});
+
+add_task(async function test_sideloads_changed() {
+ // Upgrade the manifest version
+ for (let [name, dir] of Object.entries(scopeDirectories)) {
+ let id = getID(name);
+ await createWebExtension(id, `${name}.1`, dir);
+
+ id = getID(`legacy-${name}`);
+ await createWebExtension(id, `${name}.1`, dir);
+ }
+
+ await promiseStartupManager();
+ let addons = await AddonManager.getAddonsByTypes(["extension"]);
+ Assert.equal(addons.length, 5, "addons installed");
+
+ check_startup_changes(AddonManager.STARTUP_CHANGE_INSTALLED, []);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_CHANGED, [
+ getID("profile"),
+ ...legacyIDs,
+ ]);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_UNINSTALLED, []);
+
+ await promiseShutdownManager();
+});
+
+// Remove one just to test the startup changes
+add_task(async function test_sideload_removal() {
+ let id = getID(`legacy-profile`);
+ let file = AddonTestUtils.getFileForAddon(profileDir, id);
+ file.remove(false);
+ Assert.ok(!file.exists());
+
+ await promiseStartupManager();
+
+ check_startup_changes(AddonManager.STARTUP_CHANGE_INSTALLED, []);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_CHANGED, []);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_UNINSTALLED, [id]);
+
+ await promiseShutdownManager();
+});
+
+add_task(async function test_sideload_uninstall() {
+ await promiseStartupManager();
+ let addons = await AddonManager.getAddonsByTypes(["extension"]);
+ Assert.equal(addons.length, 4, "addons installed");
+ for (let addon of addons) {
+ let file = AddonTestUtils.getFileForAddon(
+ scopeToDir.get(addon.scope),
+ addon.id
+ );
+ await addon.uninstall();
+ // Addon file should still exist in non-profile directories.
+ Assert.equal(
+ addon.scope !== AddonManager.SCOPE_PROFILE,
+ file.exists(),
+ `file remains after uninstall for non-profile sideloads, scope ${addon.scope}`
+ );
+ }
+ addons = await AddonManager.getAddonsByTypes(["extension"]);
+ Assert.equal(addons.length, 0, "addons left");
+
+ await promiseShutdownManager();
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_sideloads.js b/toolkit/mozapps/extensions/test/xpcshell/test_sideloads.js
new file mode 100644
index 0000000000..e60364f36f
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_sideloads.js
@@ -0,0 +1,117 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "49");
+
+const ID1 = "addon1@tests.mozilla.org";
+const ID2 = "addon2@tests.mozilla.org";
+const ID3 = "addon3@tests.mozilla.org";
+
+async function createWebExtension(details) {
+ let options = {
+ manifest: {
+ applications: { gecko: { id: details.id } },
+
+ name: details.name,
+
+ permissions: details.permissions,
+ },
+ };
+
+ if (details.iconURL) {
+ options.manifest.icons = { "64": details.iconURL };
+ }
+
+ let xpi = AddonTestUtils.createTempWebExtensionFile(options);
+
+ await AddonTestUtils.manuallyInstall(xpi);
+}
+
+add_task(async function test_sideloading() {
+ Services.prefs.setIntPref("extensions.autoDisableScopes", 15);
+ Services.prefs.setIntPref("extensions.startupScanScopes", 0);
+
+ await createWebExtension({
+ id: ID1,
+ name: "Test 1",
+ userDisabled: true,
+ permissions: ["tabs", "https://*/*"],
+ iconURL: "foo-icon.png",
+ });
+
+ await createWebExtension({
+ id: ID2,
+ name: "Test 2",
+ permissions: ["<all_urls>"],
+ });
+
+ await createWebExtension({
+ id: ID3,
+ name: "Test 3",
+ permissions: ["<all_urls>"],
+ });
+
+ await promiseStartupManager();
+
+ let sideloaded = await AddonManagerPrivate.getNewSideloads();
+
+ sideloaded.sort((a, b) => a.id.localeCompare(b.id));
+
+ deepEqual(
+ sideloaded.map(a => a.id),
+ [ID1, ID2, ID3],
+ "Got the correct sideload add-ons"
+ );
+
+ deepEqual(
+ sideloaded.map(a => a.userDisabled),
+ [true, true, true],
+ "All sideloaded add-ons are disabled"
+ );
+});
+
+add_task(async function test_getNewSideload_on_invalid_extension() {
+ let destDir = AddonTestUtils.profileExtensions.clone();
+
+ let xpi = AddonTestUtils.createTempWebExtensionFile({
+ manifest: {
+ applications: { gecko: { id: "@invalid-extension" } },
+ name: "Invalid Extension",
+ },
+ });
+
+ // Create an invalid sideload by creating a file name that doesn't match the
+ // actual extension id.
+ await OS.File.copy(
+ xpi.path,
+ OS.Path.join(destDir.path, "@wrong-extension-filename.xpi")
+ );
+
+ // Verify that getNewSideloads does not reject or throw when one of the sideloaded extensions
+ // is invalid.
+ const newSideloads = await AddonManagerPrivate.getNewSideloads();
+
+ const sideloadsInfo = newSideloads
+ .sort((a, b) => a.id.localeCompare(b.id))
+ .map(({ id, seen, userDisabled, permissions }) => {
+ return {
+ id,
+ seen,
+ userDisabled,
+ canEnable: Boolean(permissions & AddonManager.PERM_CAN_ENABLE),
+ };
+ });
+
+ const expectedInfo = { seen: false, userDisabled: true, canEnable: true };
+
+ Assert.deepEqual(
+ sideloadsInfo,
+ [
+ { id: ID1, ...expectedInfo },
+ { id: ID2, ...expectedInfo },
+ { id: ID3, ...expectedInfo },
+ ],
+ "Got the expected sideloaded extensions"
+ );
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_sideloads_after_rebuild.js b/toolkit/mozapps/extensions/test/xpcshell/test_sideloads_after_rebuild.js
new file mode 100644
index 0000000000..8b16d1dcd1
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_sideloads_after_rebuild.js
@@ -0,0 +1,137 @@
+// Any copyright is dedicated to the Public Domain.
+// http://creativecommons.org/publicdomain/zero/1.0/
+
+"use strict";
+
+// IDs for scopes that should sideload when sideloading
+// is not disabled.
+let legacyIDs = [
+ getID(`legacy-global`),
+ getID(`legacy-user`),
+ getID(`legacy-app`),
+ getID(`legacy-profile`),
+];
+
+// This tests that, on a rebuild after addonStartup.json and extensions.json
+// are lost, we only sideload from the profile.
+add_task(async function test_sideloads_after_rebuild() {
+ let IDs = [];
+
+ // Create a sideloaded addon for each scope before the restriction is put
+ // in place (by updating the sideloadScopes preference).
+ for (let [name, dir] of Object.entries(scopeDirectories)) {
+ let id = getID(`legacy-${name}`);
+ IDs.push(id);
+ await createWebExtension(id, initialVersion(name), dir);
+ }
+
+ await promiseStartupManager();
+
+ // SCOPE_APPLICATION will never sideload, so we expect 3
+ let sideloaded = await AddonManagerPrivate.getNewSideloads();
+ Assert.equal(sideloaded.length, 4, "four sideloaded addon");
+ let sideloadedIds = sideloaded.map(a => a.id);
+ for (let id of legacyIDs) {
+ Assert.ok(sideloadedIds.includes(id));
+ }
+
+ // After a restart that causes a database rebuild, we should have
+ // the same addons available
+ await promiseShutdownManager();
+ // Reset our scope pref so the scope limitation works.
+ Services.prefs.setIntPref(
+ "extensions.sideloadScopes",
+ AddonManager.SCOPE_PROFILE
+ );
+
+ // Try to sideload from a non-profile directory.
+ await createWebExtension(
+ getID(`sideload-global-1`),
+ initialVersion("sideload-global"),
+ globalDir
+ );
+
+ await promiseStartupManager("2");
+
+ // We should still only have 4 addons.
+ let addons = await AddonManager.getAddonsByTypes(["extension"]);
+ Assert.equal(addons.length, 4, "addons remain installed");
+
+ await promiseShutdownManager();
+
+ // Install a sideload that will not load because it is not in
+ // appStartup.json and is not in a sideloadScope.
+ await createWebExtension(
+ getID(`sideload-global-2`),
+ initialVersion("sideload-global"),
+ globalDir
+ );
+ await createWebExtension(
+ getID(`sideload-app-2`),
+ initialVersion("sideload-global"),
+ globalDir
+ );
+ // Install a sideload that will load. We cannot currently prevent
+ // this situation.
+ await createWebExtension(
+ getID(`sideload-profile`),
+ initialVersion("sideload-profile"),
+ profileDir
+ );
+
+ // Replace the extensions.json with something bogus so we lose our xpidatabase.
+ // On AOM startup, addons are restored with help from XPIState. Existing
+ // sideloads should all remain. One new sideloaded addon should be added from
+ // the profile.
+ await saveJSON({ not: "what we expect to find" }, gExtensionsJSON.path);
+ info(`**** restart AOM and rebuild XPI database`);
+ await promiseStartupManager();
+
+ addons = await AddonManager.getAddonsByTypes(["extension"]);
+ Assert.equal(addons.length, 5, "addons installed");
+
+ await promiseShutdownManager();
+
+ // Install a sideload that will not load.
+ await createWebExtension(
+ getID(`sideload-global-3`),
+ initialVersion("sideload-global"),
+ globalDir
+ );
+ // Install a sideload that will load. We cannot currently prevent
+ // this situation.
+ await createWebExtension(
+ getID(`sideload-profile-2`),
+ initialVersion("sideload-profile"),
+ profileDir
+ );
+
+ // Replace the extensions.json with something bogus so we lose our xpidatabase.
+ await saveJSON({ not: "what we expect to find" }, gExtensionsJSON.path);
+ // Delete our appStartup/XPIState data. Now we should only be able to
+ // restore extensions in the profile.
+ gAddonStartup.remove(true);
+ info(`**** restart AOM and rebuild XPI database`);
+
+ await promiseStartupManager();
+
+ addons = await AddonManager.getAddonsByTypes(["extension"]);
+ Assert.equal(addons.length, 3, "addons installed");
+
+ let [a1, a2, a3] = await promiseAddonsByIDs([
+ getID(`legacy-profile`),
+ getID(`sideload-profile`),
+ getID(`sideload-profile-2`),
+ ]);
+
+ Assert.notEqual(a1, null);
+ Assert.ok(isExtensionInBootstrappedList(profileDir, a1.id));
+
+ Assert.notEqual(a2, null);
+ Assert.ok(isExtensionInBootstrappedList(profileDir, a2.id));
+
+ Assert.notEqual(a3, null);
+ Assert.ok(isExtensionInBootstrappedList(profileDir, a3.id));
+
+ await promiseShutdownManager();
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_signed_inject.js b/toolkit/mozapps/extensions/test/xpcshell/test_signed_inject.js
new file mode 100644
index 0000000000..5a5e73acb4
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_signed_inject.js
@@ -0,0 +1,429 @@
+// Enable signature checks for these tests
+gUseRealCertChecks = true;
+// Disable update security
+Services.prefs.setBoolPref(PREF_EM_CHECK_UPDATE_SECURITY, false);
+
+const DATA = "data/signing_checks/";
+const ADDONS = {
+ bootstrap: {
+ unsigned: "unsigned_bootstrap_2.xpi",
+ badid: "signed_bootstrap_badid_2.xpi",
+ signed: "signed_bootstrap_2.xpi",
+ preliminary: "preliminary_bootstrap_2.xpi",
+ },
+ nonbootstrap: {
+ unsigned: "unsigned_nonbootstrap_2.xpi",
+ badid: "signed_nonbootstrap_badid_2.xpi",
+ signed: "signed_nonbootstrap_2.xpi",
+ },
+};
+const ID = "test@tests.mozilla.org";
+
+const profileDir = gProfD.clone();
+profileDir.append("extensions");
+
+// Deletes a file from the test add-on in the profile
+function breakAddon(file) {
+ if (TEST_UNPACKED) {
+ let f = file.clone();
+ f.append("test.txt");
+ f.remove(true);
+
+ f = file.clone();
+ f.append("install.rdf");
+ f.lastModifiedTime = Date.now();
+ } else {
+ var zipW = Cc["@mozilla.org/zipwriter;1"].createInstance(Ci.nsIZipWriter);
+ zipW.open(file, FileUtils.MODE_RDWR | FileUtils.MODE_APPEND);
+ zipW.removeEntry("test.txt", false);
+ zipW.close();
+ }
+}
+
+function resetPrefs() {
+ Services.prefs.setIntPref("bootstraptest.active_version", -1);
+ Services.prefs.setIntPref("bootstraptest.installed_version", -1);
+ Services.prefs.setIntPref("bootstraptest.startup_reason", -1);
+ Services.prefs.setIntPref("bootstraptest.shutdown_reason", -1);
+ Services.prefs.setIntPref("bootstraptest.install_reason", -1);
+ Services.prefs.setIntPref("bootstraptest.uninstall_reason", -1);
+ Services.prefs.setIntPref("bootstraptest.startup_oldversion", -1);
+ Services.prefs.setIntPref("bootstraptest.shutdown_newversion", -1);
+ Services.prefs.setIntPref("bootstraptest.install_oldversion", -1);
+ Services.prefs.setIntPref("bootstraptest.uninstall_newversion", -1);
+}
+
+function clearCache(file) {
+ if (TEST_UNPACKED) {
+ return;
+ }
+
+ Services.obs.notifyObservers(file, "flush-cache-entry");
+}
+
+function getActiveVersion() {
+ return Services.prefs.getIntPref("bootstraptest.active_version");
+}
+
+add_task(async function setup() {
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "4", "4");
+
+ // Start and stop the manager to initialise everything in the profile before
+ // actual testing
+ await promiseStartupManager();
+ await promiseShutdownManager();
+ resetPrefs();
+});
+
+// Injecting into profile (bootstrap)
+add_task(async function() {
+ let file = await manuallyInstall(
+ do_get_file(DATA + ADDONS.bootstrap.unsigned),
+ profileDir,
+ ID
+ );
+
+ await promiseStartupManager();
+
+ // Currently we leave the sideloaded add-on there but just don't run it
+ let addon = await promiseAddonByID(ID);
+ Assert.notEqual(addon, null);
+ Assert.ok(addon.appDisabled);
+ Assert.ok(!addon.isActive);
+ Assert.equal(addon.signedState, AddonManager.SIGNEDSTATE_MISSING);
+ Assert.equal(getActiveVersion(), -1);
+
+ await addon.uninstall();
+ await promiseShutdownManager();
+ resetPrefs();
+
+ Assert.ok(!file.exists());
+ clearCache(file);
+});
+
+add_task(async function() {
+ let file = await manuallyInstall(
+ do_get_file(DATA + ADDONS.bootstrap.signed),
+ profileDir,
+ ID
+ );
+ breakAddon(file);
+
+ await promiseStartupManager();
+
+ // Currently we leave the sideloaded add-on there but just don't run it
+ let addon = await promiseAddonByID(ID);
+ Assert.notEqual(addon, null);
+ Assert.ok(addon.appDisabled);
+ Assert.ok(!addon.isActive);
+ Assert.equal(addon.signedState, AddonManager.SIGNEDSTATE_BROKEN);
+ Assert.equal(getActiveVersion(), -1);
+
+ await addon.uninstall();
+ await promiseShutdownManager();
+ resetPrefs();
+
+ Assert.ok(!file.exists());
+ clearCache(file);
+});
+
+add_task(async function() {
+ let file = await manuallyInstall(
+ do_get_file(DATA + ADDONS.bootstrap.badid),
+ profileDir,
+ ID
+ );
+
+ await promiseStartupManager();
+
+ // Currently we leave the sideloaded add-on there but just don't run it
+ let addon = await promiseAddonByID(ID);
+ Assert.notEqual(addon, null);
+ Assert.ok(addon.appDisabled);
+ Assert.ok(!addon.isActive);
+ Assert.equal(addon.signedState, AddonManager.SIGNEDSTATE_BROKEN);
+ Assert.equal(getActiveVersion(), -1);
+
+ await addon.uninstall();
+ await promiseShutdownManager();
+ resetPrefs();
+
+ Assert.ok(!file.exists());
+ clearCache(file);
+});
+
+// Installs a signed add-on then modifies it in place breaking its signing
+add_task(async function() {
+ let file = await manuallyInstall(
+ do_get_file(DATA + ADDONS.bootstrap.signed),
+ profileDir,
+ ID
+ );
+
+ // Make it appear to come from the past so when we modify it later it is
+ // detected during startup. Obviously malware can bypass this method of
+ // detection but the periodic scan will catch that
+ await promiseSetExtensionModifiedTime(file.path, Date.now() - 600000);
+
+ await promiseStartupManager();
+ let addon = await promiseAddonByID(ID);
+ Assert.notEqual(addon, null);
+ Assert.ok(!addon.appDisabled);
+ Assert.ok(addon.isActive);
+ Assert.equal(addon.signedState, AddonManager.SIGNEDSTATE_SIGNED);
+ Assert.equal(getActiveVersion(), 2);
+
+ await promiseShutdownManager();
+ Assert.equal(getActiveVersion(), 0);
+
+ clearCache(file);
+ breakAddon(file);
+ resetPrefs();
+
+ await promiseStartupManager();
+
+ addon = await promiseAddonByID(ID);
+ Assert.notEqual(addon, null);
+ Assert.ok(addon.appDisabled);
+ Assert.ok(!addon.isActive);
+ Assert.equal(addon.signedState, AddonManager.SIGNEDSTATE_BROKEN);
+ Assert.equal(getActiveVersion(), -1);
+
+ let ids = AddonManager.getStartupChanges(
+ AddonManager.STARTUP_CHANGE_DISABLED
+ );
+ Assert.equal(ids.length, 1);
+ Assert.equal(ids[0], ID);
+
+ await addon.uninstall();
+ await promiseShutdownManager();
+ resetPrefs();
+
+ Assert.ok(!file.exists());
+ clearCache(file);
+});
+
+// Injecting into profile (non-bootstrap)
+add_task(async function() {
+ let file = await manuallyInstall(
+ do_get_file(DATA + ADDONS.nonbootstrap.unsigned),
+ profileDir,
+ ID
+ );
+
+ await promiseStartupManager();
+
+ // Currently we leave the sideloaded add-on there but just don't run it
+ let addon = await promiseAddonByID(ID);
+ Assert.notEqual(addon, null);
+ Assert.ok(addon.appDisabled);
+ Assert.ok(!addon.isActive);
+ Assert.equal(addon.signedState, AddonManager.SIGNEDSTATE_MISSING);
+
+ await addon.uninstall();
+ await promiseRestartManager();
+ await promiseShutdownManager();
+
+ Assert.ok(!file.exists());
+ clearCache(file);
+});
+
+add_task(async function() {
+ let file = await manuallyInstall(
+ do_get_file(DATA + ADDONS.nonbootstrap.signed),
+ profileDir,
+ ID
+ );
+ breakAddon(file);
+
+ await promiseStartupManager();
+
+ // Currently we leave the sideloaded add-on there but just don't run it
+ let addon = await promiseAddonByID(ID);
+ Assert.notEqual(addon, null);
+ Assert.ok(addon.appDisabled);
+ Assert.ok(!addon.isActive);
+ Assert.equal(addon.signedState, AddonManager.SIGNEDSTATE_BROKEN);
+
+ await addon.uninstall();
+ await promiseRestartManager();
+ await promiseShutdownManager();
+
+ Assert.ok(!file.exists());
+ clearCache(file);
+});
+
+add_task(async function() {
+ let file = await manuallyInstall(
+ do_get_file(DATA + ADDONS.nonbootstrap.badid),
+ profileDir,
+ ID
+ );
+
+ await promiseStartupManager();
+
+ // Currently we leave the sideloaded add-on there but just don't run it
+ let addon = await promiseAddonByID(ID);
+ Assert.notEqual(addon, null);
+ Assert.ok(addon.appDisabled);
+ Assert.ok(!addon.isActive);
+ Assert.equal(addon.signedState, AddonManager.SIGNEDSTATE_BROKEN);
+
+ await addon.uninstall();
+ await promiseRestartManager();
+ await promiseShutdownManager();
+
+ Assert.ok(!file.exists());
+ clearCache(file);
+});
+
+// Installs a signed add-on then modifies it in place breaking its signing
+add_task(async function() {
+ let file = await manuallyInstall(
+ do_get_file(DATA + ADDONS.nonbootstrap.signed),
+ profileDir,
+ ID
+ );
+
+ // Make it appear to come from the past so when we modify it later it is
+ // detected during startup. Obviously malware can bypass this method of
+ // detection but the periodic scan will catch that
+ await promiseSetExtensionModifiedTime(file.path, Date.now() - 60000);
+
+ await promiseStartupManager();
+ let addon = await promiseAddonByID(ID);
+ Assert.notEqual(addon, null);
+ Assert.ok(!addon.appDisabled);
+ Assert.ok(addon.isActive);
+ Assert.equal(addon.signedState, AddonManager.SIGNEDSTATE_SIGNED);
+
+ await promiseShutdownManager();
+
+ clearCache(file);
+ breakAddon(file);
+
+ await promiseStartupManager();
+
+ addon = await promiseAddonByID(ID);
+ Assert.notEqual(addon, null);
+ Assert.ok(addon.appDisabled);
+ Assert.ok(!addon.isActive);
+ Assert.equal(addon.signedState, AddonManager.SIGNEDSTATE_BROKEN);
+
+ let ids = AddonManager.getStartupChanges(
+ AddonManager.STARTUP_CHANGE_DISABLED
+ );
+ Assert.equal(ids.length, 1);
+ Assert.equal(ids[0], ID);
+
+ await addon.uninstall();
+ await promiseRestartManager();
+ await promiseShutdownManager();
+
+ Assert.ok(!file.exists());
+ clearCache(file);
+});
+
+// Stage install then modify before startup (non-bootstrap)
+add_task(async function() {
+ await promiseStartupManager();
+ await promiseInstallAllFiles([
+ do_get_file(DATA + ADDONS.nonbootstrap.signed),
+ ]);
+ await promiseShutdownManager();
+
+ let staged = profileDir.clone();
+ staged.append("staged");
+ staged.append(do_get_expected_addon_name(ID));
+ Assert.ok(staged.exists());
+
+ breakAddon(staged);
+ await promiseStartupManager();
+
+ // Should have refused to install the broken staged version
+ let addon = await promiseAddonByID(ID);
+ Assert.equal(addon, null);
+
+ clearCache(staged);
+
+ await promiseShutdownManager();
+});
+
+// Manufacture staged install (bootstrap)
+add_task(async function() {
+ let stage = profileDir.clone();
+ stage.append("staged");
+
+ let file = await manuallyInstall(
+ do_get_file(DATA + ADDONS.bootstrap.signed),
+ stage,
+ ID
+ );
+ breakAddon(file);
+
+ await promiseStartupManager();
+
+ // Should have refused to install the broken staged version
+ let addon = await promiseAddonByID(ID);
+ Assert.equal(addon, null);
+ Assert.equal(getActiveVersion(), -1);
+
+ Assert.ok(!file.exists());
+ clearCache(file);
+
+ await promiseShutdownManager();
+ resetPrefs();
+});
+
+// Preliminarily-signed sideloaded add-ons should work
+add_task(async function() {
+ let file = await manuallyInstall(
+ do_get_file(DATA + ADDONS.bootstrap.preliminary),
+ profileDir,
+ ID
+ );
+
+ await promiseStartupManager();
+
+ let addon = await promiseAddonByID(ID);
+ Assert.notEqual(addon, null);
+ Assert.ok(!addon.appDisabled);
+ Assert.ok(addon.isActive);
+ Assert.equal(addon.signedState, AddonManager.SIGNEDSTATE_PRELIMINARY);
+ Assert.equal(getActiveVersion(), 2);
+
+ await addon.uninstall();
+ await promiseShutdownManager();
+ resetPrefs();
+
+ Assert.ok(!file.exists());
+ clearCache(file);
+});
+
+// Preliminarily-signed sideloaded add-ons should work via staged install
+add_task(async function() {
+ let stage = profileDir.clone();
+ stage.append("staged");
+
+ let file = await manuallyInstall(
+ do_get_file(DATA + ADDONS.bootstrap.preliminary),
+ stage,
+ ID
+ );
+
+ await promiseStartupManager();
+
+ let addon = await promiseAddonByID(ID);
+ Assert.notEqual(addon, null);
+ Assert.ok(!addon.appDisabled);
+ Assert.ok(addon.isActive);
+ Assert.equal(addon.signedState, AddonManager.SIGNEDSTATE_PRELIMINARY);
+ Assert.equal(getActiveVersion(), 2);
+
+ await addon.uninstall();
+ await promiseShutdownManager();
+ resetPrefs();
+
+ Assert.ok(!file.exists());
+ clearCache(file);
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_signed_install.js b/toolkit/mozapps/extensions/test/xpcshell/test_signed_install.js
new file mode 100644
index 0000000000..06394f4138
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_signed_install.js
@@ -0,0 +1,280 @@
+// Enable signature checks for these tests
+gUseRealCertChecks = true;
+
+const DATA = "data/signing_checks/";
+const ADDONS = {
+ unsigned: "unsigned.xpi",
+ signed1: "signed1.xpi",
+ signed2: "signed2.xpi",
+ privileged: "privileged.xpi",
+
+ // Bug 1509093
+ // sha256Signed: "signed_bootstrap_sha256_1.xpi",
+};
+
+// The ID in signed1.xpi and signed2.xpi
+const ID = "test@somewhere.com";
+const PR_USEC_PER_MSEC = 1000;
+
+let testserver = createHttpServer({ hosts: ["example.com"] });
+
+Services.prefs.setCharPref(
+ "extensions.update.background.url",
+ "http://example.com/update.json"
+);
+Services.prefs.setBoolPref(PREF_EM_CHECK_UPDATE_SECURITY, false);
+
+// Creates an add-on with a broken signature by changing an existing file
+function createBrokenAddonModify(file) {
+ let brokenFile = gTmpD.clone();
+ brokenFile.append("broken.xpi");
+ file.copyTo(brokenFile.parent, brokenFile.leafName);
+
+ var stream = Cc["@mozilla.org/io/string-input-stream;1"].createInstance(
+ Ci.nsIStringInputStream
+ );
+ stream.setData("FOOBAR", -1);
+ var zipW = Cc["@mozilla.org/zipwriter;1"].createInstance(Ci.nsIZipWriter);
+ zipW.open(brokenFile, FileUtils.MODE_RDWR | FileUtils.MODE_APPEND);
+ zipW.removeEntry("test.txt", false);
+ zipW.addEntryStream(
+ "test.txt",
+ new Date() * PR_USEC_PER_MSEC,
+ Ci.nsIZipWriter.COMPRESSION_NONE,
+ stream,
+ false
+ );
+ zipW.close();
+
+ return brokenFile;
+}
+
+// Creates an add-on with a broken signature by adding a new file
+function createBrokenAddonAdd(file) {
+ let brokenFile = gTmpD.clone();
+ brokenFile.append("broken.xpi");
+ file.copyTo(brokenFile.parent, brokenFile.leafName);
+
+ var stream = Cc["@mozilla.org/io/string-input-stream;1"].createInstance(
+ Ci.nsIStringInputStream
+ );
+ stream.setData("FOOBAR", -1);
+ var zipW = Cc["@mozilla.org/zipwriter;1"].createInstance(Ci.nsIZipWriter);
+ zipW.open(brokenFile, FileUtils.MODE_RDWR | FileUtils.MODE_APPEND);
+ zipW.addEntryStream(
+ "test2.txt",
+ new Date() * PR_USEC_PER_MSEC,
+ Ci.nsIZipWriter.COMPRESSION_NONE,
+ stream,
+ false
+ );
+ zipW.close();
+
+ return brokenFile;
+}
+
+// Creates an add-on with a broken signature by removing an existing file
+function createBrokenAddonRemove(file) {
+ let brokenFile = gTmpD.clone();
+ brokenFile.append("broken.xpi");
+ file.copyTo(brokenFile.parent, brokenFile.leafName);
+
+ var stream = Cc["@mozilla.org/io/string-input-stream;1"].createInstance(
+ Ci.nsIStringInputStream
+ );
+ stream.setData("FOOBAR", -1);
+ var zipW = Cc["@mozilla.org/zipwriter;1"].createInstance(Ci.nsIZipWriter);
+ zipW.open(brokenFile, FileUtils.MODE_RDWR | FileUtils.MODE_APPEND);
+ zipW.removeEntry("test.txt", false);
+ zipW.close();
+
+ return brokenFile;
+}
+
+function serveUpdate(filename) {
+ const RESPONSE = {
+ addons: {
+ [ID]: {
+ updates: [
+ {
+ version: "2.0",
+ update_link: `http://example.com/${filename}`,
+ applications: {
+ gecko: {
+ strict_min_version: "4",
+ advisory_max_version: "6",
+ },
+ },
+ },
+ ],
+ },
+ },
+ };
+ AddonTestUtils.registerJSON(testserver, "/update.json", RESPONSE);
+}
+
+async function test_install_broken(file, expectedError) {
+ let install = await AddonManager.getInstallForFile(file);
+ await Assert.rejects(
+ install.install(),
+ /Install failed/,
+ "Install of an improperly signed extension should throw"
+ );
+
+ Assert.equal(install.state, AddonManager.STATE_DOWNLOAD_FAILED);
+ Assert.equal(install.error, expectedError);
+ Assert.equal(install.addon, null);
+}
+
+async function test_install_working(file, expectedSignedState) {
+ let install = await AddonManager.getInstallForFile(file);
+ await install.install();
+
+ Assert.equal(install.state, AddonManager.STATE_INSTALLED);
+ Assert.notEqual(install.addon, null);
+ Assert.equal(install.addon.signedState, expectedSignedState);
+
+ await install.addon.uninstall();
+}
+
+async function test_update_broken(file1, file2, expectedError) {
+ // First install the older version
+ await Promise.all([
+ promiseInstallFile(file1),
+ promiseWebExtensionStartup(ID),
+ ]);
+
+ testserver.registerFile("/" + file2.leafName, file2);
+ serveUpdate(file2.leafName);
+
+ let addon = await promiseAddonByID(ID);
+ let update = await promiseFindAddonUpdates(addon);
+ let install = update.updateAvailable;
+ await Assert.rejects(
+ install.install(),
+ /Install failed/,
+ "Update to an improperly signed extension should throw"
+ );
+
+ Assert.equal(install.state, AddonManager.STATE_DOWNLOAD_FAILED);
+ Assert.equal(install.error, expectedError);
+ Assert.equal(install.addon, null);
+
+ testserver.registerFile("/" + file2.leafName, null);
+ testserver.registerPathHandler("/update.json", null);
+
+ await addon.uninstall();
+}
+
+async function test_update_working(file1, file2, expectedSignedState) {
+ // First install the older version
+ await promiseInstallFile(file1);
+
+ testserver.registerFile("/" + file2.leafName, file2);
+ serveUpdate(file2.leafName);
+
+ let addon = await promiseAddonByID(ID);
+ let update = await promiseFindAddonUpdates(addon);
+ let install = update.updateAvailable;
+ await Promise.all([install.install(), promiseWebExtensionStartup(ID)]);
+
+ Assert.equal(install.state, AddonManager.STATE_INSTALLED);
+ Assert.notEqual(install.addon, null);
+ Assert.equal(install.addon.signedState, expectedSignedState);
+
+ testserver.registerFile("/" + file2.leafName, null);
+ testserver.registerPathHandler("/update.json", null);
+
+ await install.addon.uninstall();
+}
+
+add_task(async function setup() {
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "4", "4");
+ await promiseStartupManager();
+});
+
+// Try to install a broken add-on
+add_task(async function test_install_invalid_modified() {
+ let file = createBrokenAddonModify(do_get_file(DATA + ADDONS.signed1));
+ await test_install_broken(file, AddonManager.ERROR_CORRUPT_FILE);
+ file.remove(true);
+});
+
+add_task(async function test_install_invalid_added() {
+ let file = createBrokenAddonAdd(do_get_file(DATA + ADDONS.signed1));
+ await test_install_broken(file, AddonManager.ERROR_CORRUPT_FILE);
+ file.remove(true);
+});
+
+add_task(async function test_install_invalid_removed() {
+ let file = createBrokenAddonRemove(do_get_file(DATA + ADDONS.signed1));
+ await test_install_broken(file, AddonManager.ERROR_CORRUPT_FILE);
+ file.remove(true);
+});
+
+// Try to install an unsigned add-on
+add_task(async function test_install_invalid_unsigned() {
+ let file = do_get_file(DATA + ADDONS.unsigned);
+ await test_install_broken(file, AddonManager.ERROR_SIGNEDSTATE_REQUIRED);
+});
+
+// Try to install a signed add-on
+add_task(async function test_install_valid() {
+ let file = do_get_file(DATA + ADDONS.signed1);
+ await test_install_working(file, AddonManager.SIGNEDSTATE_SIGNED);
+});
+
+// Try to install an add-on signed with SHA-256
+add_task(async function test_install_valid_sha256() {
+ // Bug 1509093
+ // let file = do_get_file(DATA + ADDONS.sha256Signed);
+ // await test_install_working(file, AddonManager.SIGNEDSTATE_SIGNED);
+});
+
+// Try to install an add-on with the "Mozilla Extensions" OU
+add_task(async function test_install_valid_privileged() {
+ let file = do_get_file(DATA + ADDONS.privileged);
+ await test_install_working(file, AddonManager.SIGNEDSTATE_PRIVILEGED);
+});
+
+// Try to update to a broken add-on
+add_task(async function test_update_invalid_modified() {
+ let file1 = do_get_file(DATA + ADDONS.signed1);
+ let file2 = createBrokenAddonModify(do_get_file(DATA + ADDONS.signed2));
+ await test_update_broken(file1, file2, AddonManager.ERROR_CORRUPT_FILE);
+ file2.remove(true);
+});
+
+add_task(async function test_update_invalid_added() {
+ let file1 = do_get_file(DATA + ADDONS.signed1);
+ let file2 = createBrokenAddonAdd(do_get_file(DATA + ADDONS.signed2));
+ await test_update_broken(file1, file2, AddonManager.ERROR_CORRUPT_FILE);
+ file2.remove(true);
+});
+
+add_task(async function test_update_invalid_removed() {
+ let file1 = do_get_file(DATA + ADDONS.signed1);
+ let file2 = createBrokenAddonRemove(do_get_file(DATA + ADDONS.signed2));
+ await test_update_broken(file1, file2, AddonManager.ERROR_CORRUPT_FILE);
+ file2.remove(true);
+});
+
+// Try to update to an unsigned add-on
+add_task(async function test_update_invalid_unsigned() {
+ let file1 = do_get_file(DATA + ADDONS.signed1);
+ let file2 = do_get_file(DATA + ADDONS.unsigned);
+ await test_update_broken(
+ file1,
+ file2,
+ AddonManager.ERROR_SIGNEDSTATE_REQUIRED
+ );
+});
+
+// Try to update to a signed add-on
+add_task(async function test_update_valid() {
+ let file1 = do_get_file(DATA + ADDONS.signed1);
+ let file2 = do_get_file(DATA + ADDONS.signed2);
+ await test_update_working(file1, file2, AddonManager.SIGNEDSTATE_SIGNED);
+});
+
+add_task(() => promiseShutdownManager());
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_signed_langpack.js b/toolkit/mozapps/extensions/test/xpcshell/test_signed_langpack.js
new file mode 100644
index 0000000000..0ee75845b9
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_signed_langpack.js
@@ -0,0 +1,60 @@
+const PREF_SIGNATURES_GENERAL = "xpinstall.signatures.required";
+const PREF_SIGNATURES_LANGPACKS = "extensions.langpacks.signatures.required";
+
+// Try to install the given XPI file, and assert that the install
+// succeeds. Uninstalls before returning.
+async function installShouldSucceed(file) {
+ let install = await promiseInstallFile(file);
+ Assert.equal(install.state, AddonManager.STATE_INSTALLED);
+ Assert.notEqual(install.addon, null);
+ await install.addon.uninstall();
+}
+
+// Try to install the given XPI file, assert that the install fails
+// due to lack of signing.
+async function installShouldFail(file) {
+ let install;
+ try {
+ install = await AddonManager.getInstallForFile(file);
+ } catch (err) {}
+ Assert.equal(install.state, AddonManager.STATE_DOWNLOAD_FAILED);
+ Assert.equal(install.error, AddonManager.ERROR_SIGNEDSTATE_REQUIRED);
+ Assert.equal(install.addon, null);
+}
+
+// Test that the preference controlling langpack signing works properly
+// (and that the general preference for addon signing does not affect
+// language packs).
+add_task(async function() {
+ AddonTestUtils.useRealCertChecks = true;
+
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1.9");
+ await promiseStartupManager();
+
+ Services.prefs.setBoolPref(PREF_SIGNATURES_GENERAL, true);
+ Services.prefs.setBoolPref(PREF_SIGNATURES_LANGPACKS, true);
+
+ // The signed langpack should always install.
+ let signedXPI = do_get_file("data/signing_checks/langpack_signed.xpi");
+ await installShouldSucceed(signedXPI);
+
+ // With signatures required, unsigned langpack should not install.
+ let unsignedXPI = do_get_file("data/signing_checks/langpack_unsigned.xpi");
+ await installShouldFail(unsignedXPI);
+
+ // Even with the general xpi signing pref off, an unsigned langapck
+ // should not install.
+ Services.prefs.setBoolPref(PREF_SIGNATURES_GENERAL, false);
+ await installShouldFail(unsignedXPI);
+
+ // But with the langpack signing pref off, unsigned langpack should
+ // install only on non-release builds.
+ Services.prefs.setBoolPref(PREF_SIGNATURES_LANGPACKS, false);
+ if (AppConstants.MOZ_REQUIRE_SIGNING) {
+ await installShouldFail(unsignedXPI);
+ } else {
+ await installShouldSucceed(unsignedXPI);
+ }
+
+ await promiseShutdownManager();
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_signed_long.js b/toolkit/mozapps/extensions/test/xpcshell/test_signed_long.js
new file mode 100644
index 0000000000..2aa76e8ff8
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_signed_long.js
@@ -0,0 +1,23 @@
+gUseRealCertChecks = true;
+
+const ID = "123456789012345678901234567890123456789012345678901@somewhere.com";
+
+// Tests that signature verification works correctly on an extension with
+// an ID that does not fit into a certificate CN field.
+add_task(async function test_long_id() {
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1");
+ await promiseStartupManager();
+
+ Assert.greater(ID.length, 64, "ID is > 64 characters");
+
+ await promiseInstallFile(do_get_file("data/signing_checks/long.xpi"));
+ let addon = await promiseAddonByID(ID);
+
+ Assert.notEqual(addon, null, "Addon install properly");
+ Assert.ok(
+ addon.signedState > AddonManager.SIGNEDSTATE_MISSING,
+ "Signature verification worked properly"
+ );
+
+ await addon.uninstall();
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_signed_updatepref.js b/toolkit/mozapps/extensions/test/xpcshell/test_signed_updatepref.js
new file mode 100644
index 0000000000..656f4fdd26
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_signed_updatepref.js
@@ -0,0 +1,131 @@
+// Disable update security
+Services.prefs.setBoolPref(PREF_EM_CHECK_UPDATE_SECURITY, false);
+gUseRealCertChecks = true;
+
+const DATA = "data/signing_checks/";
+const ID = "test@somewhere.com";
+
+let testserver = createHttpServer({ hosts: ["example.com"] });
+
+AddonTestUtils.registerJSON(testserver, "/update.json", {
+ addons: {
+ [ID]: {
+ version: "2.0",
+ applications: {
+ gecko: {
+ strict_min_version: "4",
+ strict_max_version: "6",
+ },
+ },
+ },
+ },
+});
+
+Services.prefs.setCharPref(
+ "extensions.update.background.url",
+ "http://example.com/update.json"
+);
+
+function verifySignatures() {
+ return new Promise(resolve => {
+ let observer = (subject, topic, data) => {
+ Services.obs.removeObserver(observer, "xpi-signature-changed");
+ resolve(JSON.parse(data));
+ };
+ Services.obs.addObserver(observer, "xpi-signature-changed");
+
+ info("Verifying signatures");
+ let XPIscope = ChromeUtils.import(
+ "resource://gre/modules/addons/XPIProvider.jsm",
+ null
+ );
+ XPIscope.XPIDatabase.verifySignatures();
+ });
+}
+
+add_task(async function setup() {
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "4", "4");
+});
+
+// Updating the pref without changing the app version won't disable add-ons
+// immediately but will after a signing check
+add_task(async function() {
+ Services.prefs.setBoolPref(PREF_XPI_SIGNATURES_REQUIRED, false);
+ await promiseStartupManager();
+
+ // Install an unsigned add-on
+ await promiseInstallFile(do_get_file(DATA + "unsigned.xpi"));
+
+ let addon = await promiseAddonByID(ID);
+ Assert.notEqual(addon, null);
+ Assert.ok(!addon.appDisabled);
+ Assert.ok(addon.isActive);
+ Assert.equal(addon.signedState, AddonManager.SIGNEDSTATE_MISSING);
+
+ await promiseShutdownManager();
+
+ Services.prefs.setBoolPref(PREF_XPI_SIGNATURES_REQUIRED, true);
+
+ await promiseStartupManager();
+
+ addon = await promiseAddonByID(ID);
+ Assert.notEqual(addon, null);
+ Assert.ok(!addon.appDisabled);
+ Assert.ok(addon.isActive);
+ Assert.equal(addon.signedState, AddonManager.SIGNEDSTATE_MISSING);
+
+ // Update checks shouldn't affect the add-on
+ await AddonManagerInternal.backgroundUpdateCheck();
+ addon = await promiseAddonByID(ID);
+ Assert.notEqual(addon, null);
+ Assert.ok(!addon.appDisabled);
+ Assert.ok(addon.isActive);
+ Assert.equal(addon.signedState, AddonManager.SIGNEDSTATE_MISSING);
+
+ let changes = await verifySignatures();
+
+ Assert.equal(changes.disabled.length, 1);
+ Assert.equal(changes.disabled[0], ID);
+
+ addon = await promiseAddonByID(ID);
+ Assert.notEqual(addon, null);
+ Assert.ok(addon.appDisabled);
+ Assert.ok(!addon.isActive);
+ Assert.equal(addon.signedState, AddonManager.SIGNEDSTATE_MISSING);
+
+ await addon.uninstall();
+
+ await promiseShutdownManager();
+});
+
+// Updating the pref with changing the app version will disable add-ons
+// immediately
+add_task(async function() {
+ Services.prefs.setBoolPref(PREF_XPI_SIGNATURES_REQUIRED, false);
+ await promiseStartupManager();
+
+ // Install an unsigned add-on
+ await promiseInstallFile(do_get_file(DATA + "unsigned.xpi"));
+
+ let addon = await promiseAddonByID(ID);
+ Assert.notEqual(addon, null);
+ Assert.ok(!addon.appDisabled);
+ Assert.ok(addon.isActive);
+ Assert.equal(addon.signedState, AddonManager.SIGNEDSTATE_MISSING);
+
+ await promiseShutdownManager();
+
+ Services.prefs.setBoolPref(PREF_XPI_SIGNATURES_REQUIRED, true);
+ gAppInfo.version = 5.0;
+ await promiseStartupManager();
+
+ addon = await promiseAddonByID(ID);
+ Assert.notEqual(addon, null);
+ Assert.ok(addon.appDisabled);
+ Assert.ok(!addon.isActive);
+ Assert.equal(addon.signedState, AddonManager.SIGNEDSTATE_MISSING);
+
+ await addon.uninstall();
+
+ await promiseShutdownManager();
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_signed_verify.js b/toolkit/mozapps/extensions/test/xpcshell/test_signed_verify.js
new file mode 100644
index 0000000000..4bbaeaba7c
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_signed_verify.js
@@ -0,0 +1,110 @@
+// Enable signature checks for these tests
+gUseRealCertChecks = true;
+
+const DATA = "data/signing_checks";
+const ID = "test@somewhere.com";
+
+const profileDir = gProfD.clone();
+profileDir.append("extensions");
+
+function verifySignatures() {
+ return new Promise(resolve => {
+ let observer = (subject, topic, data) => {
+ Services.obs.removeObserver(observer, "xpi-signature-changed");
+ resolve(JSON.parse(data));
+ };
+ Services.obs.addObserver(observer, "xpi-signature-changed");
+
+ info("Verifying signatures");
+ let XPIscope = ChromeUtils.import(
+ "resource://gre/modules/addons/XPIProvider.jsm",
+ null
+ );
+ XPIscope.XPIDatabase.verifySignatures();
+ });
+}
+
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "4", "4");
+
+add_task(async function test_no_change() {
+ await promiseStartupManager();
+
+ // Install the first add-on
+ await promiseInstallFile(do_get_file(`${DATA}/signed1.xpi`));
+
+ let addon = await promiseAddonByID(ID);
+ Assert.notEqual(addon, null);
+ Assert.equal(addon.appDisabled, false);
+ Assert.equal(addon.isActive, true);
+ Assert.equal(addon.pendingOperations, AddonManager.PENDING_NONE);
+ Assert.equal(addon.signedState, AddonManager.SIGNEDSTATE_SIGNED);
+
+ // Swap in the files from the next add-on
+ manuallyUninstall(profileDir, ID);
+ await manuallyInstall(do_get_file(`${DATA}/signed2.xpi`), profileDir, ID);
+
+ let listener = {
+ onPropetyChanged(_addon, properties) {
+ Assert.ok(false, `Got unexpected onPropertyChanged for ${_addon.id}`);
+ },
+ };
+
+ AddonManager.addAddonListener(listener);
+
+ // Trigger the check
+ let changes = await verifySignatures();
+ Assert.equal(changes.enabled.length, 0);
+ Assert.equal(changes.disabled.length, 0);
+
+ Assert.equal(addon.appDisabled, false);
+ Assert.equal(addon.isActive, true);
+ Assert.equal(addon.signedState, AddonManager.SIGNEDSTATE_SIGNED);
+
+ await addon.uninstall();
+ AddonManager.removeAddonListener(listener);
+});
+
+add_task(async function test_diable() {
+ // Install the first add-on
+ await promiseInstallFile(do_get_file(`${DATA}/signed1.xpi`));
+
+ let addon = await promiseAddonByID(ID);
+ Assert.notEqual(addon, null);
+ Assert.ok(addon.isActive);
+ Assert.equal(addon.signedState, AddonManager.SIGNEDSTATE_SIGNED);
+
+ // Swap in the files from the next add-on
+ manuallyUninstall(profileDir, ID);
+ await manuallyInstall(do_get_file(`${DATA}/unsigned.xpi`), profileDir, ID);
+
+ let changedProperties = [];
+ let listener = {
+ onPropertyChanged(_, properties) {
+ changedProperties.push(...properties);
+ },
+ };
+ AddonManager.addAddonListener(listener);
+
+ // Trigger the check
+ let [changes] = await Promise.all([
+ verifySignatures(),
+ promiseAddonEvent("onDisabling"),
+ ]);
+
+ Assert.equal(changes.enabled.length, 0);
+ Assert.equal(changes.disabled.length, 1);
+ Assert.equal(changes.disabled[0], ID);
+
+ Assert.deepEqual(
+ changedProperties,
+ ["signedState", "appDisabled"],
+ "Got onPropertyChanged events for signedState and appDisabled"
+ );
+
+ Assert.ok(addon.appDisabled);
+ Assert.ok(!addon.isActive);
+ Assert.equal(addon.signedState, AddonManager.SIGNEDSTATE_MISSING);
+
+ await addon.uninstall();
+ AddonManager.removeAddonListener(listener);
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_startup.js b/toolkit/mozapps/extensions/test/xpcshell/test_startup.js
new file mode 100644
index 0000000000..71cb5742d8
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_startup.js
@@ -0,0 +1,648 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// This verifies startup detection of added/removed/changed items and install
+// location priorities
+
+Services.prefs.setIntPref("extensions.autoDisableScopes", 0);
+
+const ID1 = getID(1);
+const ID2 = getID(2);
+const ID3 = getID(3);
+const ID4 = getID(4);
+
+function createWebExtensionXPI(id, version) {
+ return createTempWebExtensionFile({
+ manifest: {
+ version,
+ applications: { gecko: { id } },
+ },
+ });
+}
+
+// Bug 1554703: Verify that the extensions.lastAppBuildId pref is updated properly
+// to avoid a full scan on second startup in XPIStates.scanForChanges.
+add_task(async function test_scan_app_build_id_updated() {
+ const PREF_EM_LAST_APP_BUILD_ID = "extensions.lastAppBuildId";
+ Assert.equal(
+ Services.prefs.getCharPref(PREF_EM_LAST_APP_BUILD_ID, ""),
+ "",
+ "fresh version with no saved build ID"
+ );
+ Assert.ok(Services.appinfo.appBuildID, "build ID is set before a startup");
+
+ await promiseStartupManager();
+ Assert.equal(
+ Services.prefs.getCharPref(PREF_EM_LAST_APP_BUILD_ID, ""),
+ Services.appinfo.appBuildID,
+ "build ID is correct after a startup"
+ );
+
+ await promiseShutdownManager();
+});
+
+// Try to install all the items into the profile
+add_task(async function test_scan_profile() {
+ await promiseStartupManager();
+
+ let ids = [];
+ for (let n of [1, 2, 3]) {
+ let id = getID(n);
+ ids.push(id);
+ await createWebExtension(id, initialVersion(n), profileDir);
+ }
+
+ await promiseRestartManager();
+ let addons = await AddonManager.getAddonsByTypes(["extension"]);
+ Assert.equal(addons.length, 3, "addons installed");
+
+ check_startup_changes(AddonManager.STARTUP_CHANGE_INSTALLED, ids);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_CHANGED, []);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_UNINSTALLED, []);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_DISABLED, []);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_ENABLED, []);
+
+ info("Checking for " + gAddonStartup.path);
+ Assert.ok(gAddonStartup.exists());
+
+ for (let n of [1, 2, 3]) {
+ let id = getID(n);
+ let addon = await promiseAddonByID(id);
+ Assert.notEqual(addon, null);
+ Assert.equal(addon.id, id);
+ Assert.notEqual(addon.syncGUID, null);
+ Assert.ok(addon.syncGUID.length >= 9);
+ Assert.equal(addon.version, initialVersion(n));
+ Assert.ok(isExtensionInBootstrappedList(profileDir, id));
+ Assert.ok(hasFlag(addon.permissions, AddonManager.PERM_CAN_UNINSTALL));
+ Assert.ok(hasFlag(addon.permissions, AddonManager.PERM_CAN_UPGRADE));
+ do_check_in_crash_annotation(id, initialVersion(n));
+ Assert.equal(addon.scope, AddonManager.SCOPE_PROFILE);
+ Assert.equal(addon.sourceURI, null);
+ Assert.ok(addon.foreignInstall);
+ Assert.ok(!addon.userDisabled);
+ Assert.ok(addon.seen);
+ }
+
+ let extensionAddons = await AddonManager.getAddonsByTypes(["extension"]);
+ Assert.equal(extensionAddons.length, 3);
+
+ await promiseShutdownManager();
+});
+
+// Test that modified items are detected and items in other install locations
+// are ignored
+add_task(async function test_modify() {
+ await createWebExtension(ID1, "1.1", userDir);
+ await createWebExtension(ID2, "2.1", profileDir);
+ await createWebExtension(ID2, "2.2", globalDir);
+ await createWebExtension(ID2, "2.3", userDir);
+
+ await OS.File.remove(OS.Path.join(profileDir.path, `${ID3}.xpi`));
+
+ await promiseStartupManager();
+ let addons = await AddonManager.getAddonsByTypes(["extension"]);
+ Assert.equal(addons.length, 2, "addons installed");
+
+ check_startup_changes(AddonManager.STARTUP_CHANGE_INSTALLED, []);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_CHANGED, [ID2]);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_UNINSTALLED, [ID3]);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_DISABLED, []);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_ENABLED, []);
+
+ Assert.ok(gAddonStartup.exists());
+
+ let [a1, a2, a3] = await AddonManager.getAddonsByIDs([ID1, ID2, ID3]);
+
+ Assert.notEqual(a1, null);
+ Assert.equal(a1.id, ID1);
+ Assert.equal(a1.version, "1.0");
+ Assert.ok(isExtensionInBootstrappedList(profileDir, ID1));
+ Assert.ok(!isExtensionInBootstrappedList(userDir, ID1));
+ Assert.ok(hasFlag(a1.permissions, AddonManager.PERM_CAN_UNINSTALL));
+ Assert.ok(hasFlag(a1.permissions, AddonManager.PERM_CAN_UPGRADE));
+ do_check_in_crash_annotation(ID1, "1.0");
+ Assert.equal(a1.scope, AddonManager.SCOPE_PROFILE);
+ Assert.ok(a1.foreignInstall);
+
+ // The version in the profile should take precedence.
+ const VERSION2 = "2.1";
+ Assert.notEqual(a2, null);
+ Assert.equal(a2.id, ID2);
+ Assert.equal(a2.version, VERSION2);
+ Assert.ok(isExtensionInBootstrappedList(profileDir, ID2));
+ Assert.ok(!isExtensionInBootstrappedList(userDir, ID2));
+ Assert.ok(!isExtensionInBootstrappedList(globalDir, ID2));
+ Assert.ok(hasFlag(a2.permissions, AddonManager.PERM_CAN_UNINSTALL));
+ Assert.ok(hasFlag(a2.permissions, AddonManager.PERM_CAN_UPGRADE));
+ do_check_in_crash_annotation(ID2, VERSION2);
+ Assert.equal(a2.scope, AddonManager.SCOPE_PROFILE);
+ Assert.ok(a2.foreignInstall);
+
+ Assert.equal(a3, null);
+ Assert.ok(!isExtensionInBootstrappedList(profileDir, ID3));
+ do_check_not_in_crash_annotation(ID3, "3.0");
+
+ await promiseShutdownManager();
+});
+
+// Check that removing items from the profile reveals their hidden versions.
+add_task(async function test_reveal() {
+ await OS.File.remove(OS.Path.join(profileDir.path, `${ID1}.xpi`));
+ await OS.File.remove(OS.Path.join(profileDir.path, `${ID2}.xpi`));
+
+ // XPI with wrong name (basename doesn't match the id)
+ let xpi = await createWebExtensionXPI(ID3, "3.0");
+ xpi.copyTo(profileDir, `${ID4}.xpi`);
+
+ await promiseStartupManager();
+ let addons = await AddonManager.getAddonsByTypes(["extension"]);
+ Assert.equal(addons.length, 2, "addons installed");
+
+ check_startup_changes(AddonManager.STARTUP_CHANGE_INSTALLED, []);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_CHANGED, [ID1, ID2]);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_UNINSTALLED, []);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_DISABLED, []);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_ENABLED, []);
+
+ let [a1, a2, a3, a4] = await AddonManager.getAddonsByIDs([
+ ID1,
+ ID2,
+ ID3,
+ ID4,
+ ]);
+
+ // Copy of addon1 in the per-user directory is now revealed.
+ const VERSION1 = "1.1";
+ Assert.notEqual(a1, null);
+ Assert.equal(a1.id, ID1);
+ Assert.equal(a1.version, VERSION1);
+ Assert.ok(!isExtensionInBootstrappedList(profileDir, ID1));
+ Assert.ok(isExtensionInBootstrappedList(userDir, ID1));
+ Assert.ok(!hasFlag(a1.permissions, AddonManager.PERM_CAN_UNINSTALL));
+ Assert.ok(!hasFlag(a1.permissions, AddonManager.PERM_CAN_UPGRADE));
+ do_check_in_crash_annotation(ID1, VERSION1);
+ Assert.equal(a1.scope, AddonManager.SCOPE_USER);
+
+ // Likewise with addon2
+ const VERSION2 = "2.3";
+ Assert.notEqual(a2, null);
+ Assert.equal(a2.id, ID2);
+ Assert.equal(a2.version, VERSION2);
+ Assert.ok(!isExtensionInBootstrappedList(profileDir, ID2));
+ Assert.ok(isExtensionInBootstrappedList(userDir, ID2));
+ Assert.ok(!isExtensionInBootstrappedList(globalDir, ID2));
+ Assert.ok(!hasFlag(a2.permissions, AddonManager.PERM_CAN_UNINSTALL));
+ Assert.ok(!hasFlag(a2.permissions, AddonManager.PERM_CAN_UPGRADE));
+ do_check_in_crash_annotation(ID2, VERSION2);
+ Assert.equal(a2.scope, AddonManager.SCOPE_USER);
+
+ Assert.equal(a3, null);
+ Assert.ok(!isExtensionInBootstrappedList(profileDir, ID3));
+
+ Assert.equal(a4, null);
+ Assert.ok(!isExtensionInBootstrappedList(profileDir, ID4));
+
+ let addon4Exists = await OS.File.exists(
+ OS.Path.join(profileDir.path, `${ID4}.xpi`)
+ );
+ Assert.ok(!addon4Exists, "Misnamed xpi should be removed from profile");
+
+ await promiseShutdownManager();
+});
+
+// Test that disabling an install location works
+add_task(async function test_disable_location() {
+ Services.prefs.setIntPref(
+ "extensions.enabledScopes",
+ AddonManager.SCOPE_SYSTEM
+ );
+
+ await promiseStartupManager();
+ let addons = await AddonManager.getAddonsByTypes(["extension"]);
+ Assert.equal(addons.length, 1, "addons installed");
+
+ check_startup_changes(AddonManager.STARTUP_CHANGE_INSTALLED, []);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_CHANGED, [ID2]);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_UNINSTALLED, [ID1]);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_DISABLED, []);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_ENABLED, []);
+
+ let [a1, a2] = await AddonManager.getAddonsByIDs([ID1, ID2]);
+ Assert.equal(a1, null);
+ Assert.ok(!isExtensionInBootstrappedList(profileDir, ID1));
+ Assert.ok(!isExtensionInBootstrappedList(userDir, ID1));
+
+ // System-wide copy of addon2 is now revealed
+ const VERSION2 = "2.2";
+ Assert.notEqual(a2, null);
+ Assert.equal(a2.id, ID2);
+ Assert.equal(a2.version, VERSION2);
+ Assert.ok(!isExtensionInBootstrappedList(profileDir, ID2));
+ Assert.ok(!isExtensionInBootstrappedList(userDir, ID2));
+ Assert.ok(isExtensionInBootstrappedList(globalDir, ID2));
+ Assert.ok(!hasFlag(a2.permissions, AddonManager.PERM_CAN_UNINSTALL));
+ Assert.ok(!hasFlag(a2.permissions, AddonManager.PERM_CAN_UPGRADE));
+ do_check_in_crash_annotation(ID2, VERSION2);
+ Assert.equal(a2.scope, AddonManager.SCOPE_SYSTEM);
+
+ await promiseShutdownManager();
+});
+
+// Switching disabled locations works
+add_task(async function test_disable_location2() {
+ Services.prefs.setIntPref(
+ "extensions.enabledScopes",
+ AddonManager.SCOPE_USER
+ );
+
+ await promiseStartupManager();
+
+ check_startup_changes(AddonManager.STARTUP_CHANGE_INSTALLED, [ID1]);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_CHANGED, [ID2]);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_UNINSTALLED, []);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_DISABLED, []);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_ENABLED, []);
+
+ let [a1, a2] = await AddonManager.getAddonsByIDs([ID1, ID2]);
+
+ const VERSION1 = "1.1";
+ Assert.notEqual(a1, null);
+ Assert.equal(a1.id, ID1);
+ Assert.equal(a1.version, VERSION1);
+ Assert.ok(!isExtensionInBootstrappedList(profileDir, ID1));
+ Assert.ok(isExtensionInBootstrappedList(userDir, ID1));
+ Assert.ok(!hasFlag(a1.permissions, AddonManager.PERM_CAN_UNINSTALL));
+ Assert.ok(!hasFlag(a1.permissions, AddonManager.PERM_CAN_UPGRADE));
+ do_check_in_crash_annotation(ID1, VERSION1);
+ Assert.equal(a1.scope, AddonManager.SCOPE_USER);
+
+ const VERSION2 = "2.3";
+ Assert.notEqual(a2, null);
+ Assert.equal(a2.id, ID2);
+ Assert.equal(a2.version, VERSION2);
+ Assert.ok(!isExtensionInBootstrappedList(profileDir, ID2));
+ Assert.ok(isExtensionInBootstrappedList(userDir, ID2));
+ Assert.ok(!isExtensionInBootstrappedList(globalDir, ID2));
+ Assert.ok(!hasFlag(a2.permissions, AddonManager.PERM_CAN_UNINSTALL));
+ Assert.ok(!hasFlag(a2.permissions, AddonManager.PERM_CAN_UPGRADE));
+ do_check_in_crash_annotation(ID2, VERSION2);
+ Assert.equal(a2.scope, AddonManager.SCOPE_USER);
+
+ await promiseShutdownManager();
+});
+
+// Resetting the pref makes everything visible again
+add_task(async function test_enable_location() {
+ Services.prefs.clearUserPref("extensions.enabledScopes");
+
+ await promiseStartupManager();
+
+ check_startup_changes(AddonManager.STARTUP_CHANGE_INSTALLED, []);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_CHANGED, []);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_UNINSTALLED, []);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_DISABLED, []);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_ENABLED, []);
+
+ let [a1, a2] = await AddonManager.getAddonsByIDs([ID1, ID2]);
+
+ const VERSION1 = "1.1";
+ Assert.notEqual(a1, null);
+ Assert.equal(a1.id, ID1);
+ Assert.equal(a1.version, VERSION1);
+ Assert.ok(!isExtensionInBootstrappedList(profileDir, ID1));
+ Assert.ok(isExtensionInBootstrappedList(userDir, ID1));
+ Assert.ok(!hasFlag(a1.permissions, AddonManager.PERM_CAN_UNINSTALL));
+ Assert.ok(!hasFlag(a1.permissions, AddonManager.PERM_CAN_UPGRADE));
+ do_check_in_crash_annotation(ID1, VERSION1);
+ Assert.equal(a1.scope, AddonManager.SCOPE_USER);
+
+ const VERSION2 = "2.3";
+ Assert.notEqual(a2, null);
+ Assert.equal(a2.id, ID2);
+ Assert.equal(a2.version, VERSION2);
+ Assert.ok(!isExtensionInBootstrappedList(profileDir, ID2));
+ Assert.ok(isExtensionInBootstrappedList(userDir, ID2));
+ Assert.ok(!isExtensionInBootstrappedList(globalDir, ID2));
+ Assert.ok(!hasFlag(a2.permissions, AddonManager.PERM_CAN_UNINSTALL));
+ Assert.ok(!hasFlag(a2.permissions, AddonManager.PERM_CAN_UPGRADE));
+ do_check_in_crash_annotation(ID2, VERSION2);
+ Assert.equal(a2.scope, AddonManager.SCOPE_USER);
+
+ await promiseShutdownManager();
+});
+
+// Check that items in the profile hide the others again.
+add_task(async function test_profile_hiding() {
+ const VERSION1 = "1.2";
+ await createWebExtension(ID1, VERSION1, profileDir);
+
+ await OS.File.remove(OS.Path.join(userDir.path, `${ID2}.xpi`));
+
+ await promiseStartupManager();
+
+ check_startup_changes(AddonManager.STARTUP_CHANGE_INSTALLED, []);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_CHANGED, [ID1, ID2]);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_UNINSTALLED, []);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_DISABLED, []);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_ENABLED, []);
+
+ let [a1, a2, a3] = await AddonManager.getAddonsByIDs([ID1, ID2, ID3]);
+
+ Assert.notEqual(a1, null);
+ Assert.equal(a1.id, ID1);
+ Assert.equal(a1.version, VERSION1);
+ Assert.ok(isExtensionInBootstrappedList(profileDir, ID1));
+ Assert.ok(!isExtensionInBootstrappedList(userDir, ID1));
+ Assert.ok(hasFlag(a1.permissions, AddonManager.PERM_CAN_UNINSTALL));
+ Assert.ok(hasFlag(a1.permissions, AddonManager.PERM_CAN_UPGRADE));
+ do_check_in_crash_annotation(ID1, VERSION1);
+ Assert.equal(a1.scope, AddonManager.SCOPE_PROFILE);
+
+ const VERSION2 = "2.2";
+ Assert.notEqual(a2, null);
+ Assert.equal(a2.id, ID2);
+ Assert.equal(a2.version, VERSION2);
+ Assert.ok(!isExtensionInBootstrappedList(profileDir, ID2));
+ Assert.ok(!isExtensionInBootstrappedList(userDir, ID2));
+ Assert.ok(isExtensionInBootstrappedList(globalDir, ID2));
+ Assert.ok(!hasFlag(a2.permissions, AddonManager.PERM_CAN_UNINSTALL));
+ Assert.ok(!hasFlag(a2.permissions, AddonManager.PERM_CAN_UPGRADE));
+ do_check_in_crash_annotation(ID2, VERSION2);
+ Assert.equal(a2.scope, AddonManager.SCOPE_SYSTEM);
+
+ Assert.equal(a3, null);
+ Assert.ok(!isExtensionInBootstrappedList(profileDir, ID3));
+
+ await promiseShutdownManager();
+});
+
+// Disabling all locations still leaves the profile working
+add_task(async function test_disable3() {
+ Services.prefs.setIntPref("extensions.enabledScopes", 0);
+
+ await promiseStartupManager();
+
+ check_startup_changes(AddonManager.STARTUP_CHANGE_INSTALLED, []);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_CHANGED, []);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_UNINSTALLED, [
+ "2@tests.mozilla.org",
+ ]);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_DISABLED, []);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_ENABLED, []);
+
+ let [a1, a2] = await AddonManager.getAddonsByIDs([ID1, ID2]);
+
+ const VERSION1 = "1.2";
+ Assert.notEqual(a1, null);
+ Assert.equal(a1.id, ID1);
+ Assert.equal(a1.version, VERSION1);
+ Assert.ok(isExtensionInBootstrappedList(profileDir, ID1));
+ Assert.ok(!isExtensionInBootstrappedList(userDir, ID1));
+ Assert.ok(hasFlag(a1.permissions, AddonManager.PERM_CAN_UNINSTALL));
+ Assert.ok(hasFlag(a1.permissions, AddonManager.PERM_CAN_UPGRADE));
+ do_check_in_crash_annotation(ID1, VERSION1);
+ Assert.equal(a1.scope, AddonManager.SCOPE_PROFILE);
+
+ Assert.equal(a2, null);
+ Assert.ok(!isExtensionInBootstrappedList(profileDir, ID2));
+ Assert.ok(!isExtensionInBootstrappedList(userDir, ID2));
+ Assert.ok(!isExtensionInBootstrappedList(globalDir, ID2));
+
+ await promiseShutdownManager();
+});
+
+// More hiding and revealing
+add_task(async function test_reval() {
+ Services.prefs.clearUserPref("extensions.enabledScopes");
+
+ await OS.File.remove(OS.Path.join(userDir.path, `${ID1}.xpi`));
+ await OS.File.remove(OS.Path.join(globalDir.path, `${ID2}.xpi`));
+
+ const VERSION2 = "2.4";
+ await createWebExtension(ID2, VERSION2, profileDir);
+
+ await promiseStartupManager();
+
+ check_startup_changes(AddonManager.STARTUP_CHANGE_INSTALLED, [
+ "2@tests.mozilla.org",
+ ]);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_CHANGED, []);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_UNINSTALLED, []);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_DISABLED, []);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_ENABLED, []);
+
+ let [a1, a2, a3] = await AddonManager.getAddonsByIDs([ID1, ID2, ID3]);
+
+ Assert.notEqual(a1, null);
+ Assert.equal(a1.id, ID1);
+ Assert.equal(a1.version, "1.2");
+ Assert.ok(isExtensionInBootstrappedList(profileDir, ID1));
+ Assert.ok(!isExtensionInBootstrappedList(userDir, ID1));
+ Assert.ok(hasFlag(a1.permissions, AddonManager.PERM_CAN_UNINSTALL));
+ Assert.ok(hasFlag(a1.permissions, AddonManager.PERM_CAN_UPGRADE));
+ Assert.equal(a1.scope, AddonManager.SCOPE_PROFILE);
+
+ Assert.notEqual(a2, null);
+ Assert.equal(a2.id, ID2);
+ Assert.equal(a2.version, VERSION2);
+ Assert.ok(isExtensionInBootstrappedList(profileDir, ID2));
+ Assert.ok(!isExtensionInBootstrappedList(userDir, ID2));
+ Assert.ok(!isExtensionInBootstrappedList(globalDir, ID2));
+ Assert.ok(hasFlag(a2.permissions, AddonManager.PERM_CAN_UNINSTALL));
+ Assert.ok(hasFlag(a2.permissions, AddonManager.PERM_CAN_UPGRADE));
+ Assert.equal(a2.scope, AddonManager.SCOPE_PROFILE);
+
+ Assert.equal(a3, null);
+ Assert.ok(!isExtensionInBootstrappedList(profileDir, ID3));
+
+ await promiseShutdownManager();
+});
+
+// Checks that a removal from one location and an addition in another location
+// for the same item is handled
+add_task(async function test_move() {
+ await OS.File.remove(OS.Path.join(profileDir.path, `${ID1}.xpi`));
+ const VERSION1 = "1.3";
+ await createWebExtension(ID1, VERSION1, userDir);
+
+ await promiseStartupManager();
+
+ check_startup_changes(AddonManager.STARTUP_CHANGE_INSTALLED, []);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_CHANGED, [ID1]);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_UNINSTALLED, []);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_DISABLED, []);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_ENABLED, []);
+
+ let [a1, a2] = await AddonManager.getAddonsByIDs([ID1, ID2]);
+
+ Assert.notEqual(a1, null);
+ Assert.equal(a1.id, ID1);
+ Assert.equal(a1.version, VERSION1);
+ Assert.ok(!isExtensionInBootstrappedList(profileDir, ID1));
+ Assert.ok(isExtensionInBootstrappedList(userDir, ID1));
+ Assert.ok(!hasFlag(a1.permissions, AddonManager.PERM_CAN_UNINSTALL));
+ Assert.ok(!hasFlag(a1.permissions, AddonManager.PERM_CAN_UPGRADE));
+ Assert.equal(a1.scope, AddonManager.SCOPE_USER);
+
+ const VERSION2 = "2.4";
+ Assert.notEqual(a2, null);
+ Assert.equal(a2.id, ID2);
+ Assert.equal(a2.version, VERSION2);
+ Assert.ok(isExtensionInBootstrappedList(profileDir, ID2));
+ Assert.ok(!isExtensionInBootstrappedList(userDir, ID2));
+ Assert.ok(!isExtensionInBootstrappedList(globalDir, ID2));
+ Assert.ok(hasFlag(a2.permissions, AddonManager.PERM_CAN_UNINSTALL));
+ Assert.ok(hasFlag(a2.permissions, AddonManager.PERM_CAN_UPGRADE));
+ Assert.equal(a2.scope, AddonManager.SCOPE_PROFILE);
+
+ await promiseShutdownManager();
+});
+
+// This should remove any remaining items
+add_task(async function test_remove() {
+ await OS.File.remove(OS.Path.join(userDir.path, `${ID1}.xpi`));
+ await OS.File.remove(OS.Path.join(profileDir.path, `${ID2}.xpi`));
+
+ await promiseStartupManager();
+
+ check_startup_changes(AddonManager.STARTUP_CHANGE_INSTALLED, []);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_CHANGED, []);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_UNINSTALLED, [ID1, ID2]);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_DISABLED, []);
+ check_startup_changes(AddonManager.STARTUP_CHANGE_ENABLED, []);
+
+ let [a1, a2, a3] = await AddonManager.getAddonsByIDs([ID1, ID2, ID3]);
+ Assert.equal(a1, null);
+ Assert.equal(a2, null);
+ Assert.equal(a3, null);
+
+ Assert.ok(!isExtensionInBootstrappedList(profileDir, ID1));
+ Assert.ok(!isExtensionInBootstrappedList(profileDir, ID2));
+ Assert.ok(!isExtensionInBootstrappedList(profileDir, ID3));
+ Assert.ok(!isExtensionInBootstrappedList(profileDir, ID4));
+ Assert.ok(!isExtensionInBootstrappedList(profileDir, ID4));
+ Assert.ok(!isExtensionInBootstrappedList(userDir, ID1));
+ Assert.ok(!isExtensionInBootstrappedList(userDir, ID2));
+ Assert.ok(!isExtensionInBootstrappedList(userDir, ID3));
+ Assert.ok(!isExtensionInBootstrappedList(userDir, ID4));
+ Assert.ok(!isExtensionInBootstrappedList(userDir, ID4));
+ Assert.ok(!isExtensionInBootstrappedList(globalDir, ID1));
+ Assert.ok(!isExtensionInBootstrappedList(globalDir, ID2));
+ Assert.ok(!isExtensionInBootstrappedList(globalDir, ID3));
+ Assert.ok(!isExtensionInBootstrappedList(globalDir, ID4));
+ Assert.ok(!isExtensionInBootstrappedList(globalDir, ID4));
+
+ await promiseShutdownManager();
+});
+
+// Test that auto-disabling for specific scopes works
+add_task(async function test_autoDisable() {
+ Services.prefs.setIntPref(
+ "extensions.autoDisableScopes",
+ AddonManager.SCOPE_USER
+ );
+
+ async function writeAll() {
+ return Promise.all([
+ createWebExtension(ID1, "1.0", profileDir),
+ createWebExtension(ID2, "2.0", userDir),
+ createWebExtension(ID3, "3.0", globalDir),
+ ]);
+ }
+
+ async function removeAll() {
+ return Promise.all([
+ OS.File.remove(OS.Path.join(profileDir.path, `${ID1}.xpi`)),
+ OS.File.remove(OS.Path.join(userDir.path, `${ID2}.xpi`)),
+ OS.File.remove(OS.Path.join(globalDir.path, `${ID3}.xpi`)),
+ ]);
+ }
+
+ await writeAll();
+
+ await promiseStartupManager();
+
+ let [a1, a2, a3] = await AddonManager.getAddonsByIDs([ID1, ID2, ID3]);
+ Assert.notEqual(a1, null);
+ Assert.ok(!a1.userDisabled);
+ Assert.ok(a1.seen);
+ Assert.ok(a1.isActive);
+
+ Assert.notEqual(a2, null);
+ Assert.ok(a2.userDisabled);
+ Assert.ok(!a2.seen);
+ Assert.ok(!a2.isActive);
+
+ Assert.notEqual(a3, null);
+ Assert.ok(!a3.userDisabled);
+ Assert.ok(a3.seen);
+ Assert.ok(a3.isActive);
+
+ await promiseShutdownManager();
+
+ await removeAll();
+
+ await promiseStartupManager();
+ await promiseShutdownManager();
+
+ Services.prefs.setIntPref(
+ "extensions.autoDisableScopes",
+ AddonManager.SCOPE_SYSTEM
+ );
+
+ await writeAll();
+
+ await promiseStartupManager();
+
+ [a1, a2, a3] = await AddonManager.getAddonsByIDs([ID1, ID2, ID3]);
+ Assert.notEqual(a1, null);
+ Assert.ok(!a1.userDisabled);
+ Assert.ok(a1.seen);
+ Assert.ok(a1.isActive);
+
+ Assert.notEqual(a2, null);
+ Assert.ok(!a2.userDisabled);
+ Assert.ok(a2.seen);
+ Assert.ok(a2.isActive);
+
+ Assert.notEqual(a3, null);
+ Assert.ok(a3.userDisabled);
+ Assert.ok(!a3.seen);
+ Assert.ok(!a3.isActive);
+
+ await promiseShutdownManager();
+
+ await removeAll();
+
+ await promiseStartupManager();
+ await promiseShutdownManager();
+
+ Services.prefs.setIntPref(
+ "extensions.autoDisableScopes",
+ AddonManager.SCOPE_USER + AddonManager.SCOPE_SYSTEM
+ );
+
+ await writeAll();
+
+ await promiseStartupManager();
+
+ [a1, a2, a3] = await AddonManager.getAddonsByIDs([ID1, ID2, ID3]);
+ Assert.notEqual(a1, null);
+ Assert.ok(!a1.userDisabled);
+ Assert.ok(a1.seen);
+ Assert.ok(a1.isActive);
+
+ Assert.notEqual(a2, null);
+ Assert.ok(a2.userDisabled);
+ Assert.ok(!a2.seen);
+ Assert.ok(!a2.isActive);
+
+ Assert.notEqual(a3, null);
+ Assert.ok(a3.userDisabled);
+ Assert.ok(!a3.seen);
+ Assert.ok(!a3.isActive);
+
+ await promiseShutdownManager();
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_startup_enable.js b/toolkit/mozapps/extensions/test/xpcshell/test_startup_enable.js
new file mode 100644
index 0000000000..9b36c48ebb
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_startup_enable.js
@@ -0,0 +1,47 @@
+createAppInfo("xpcshell@tessts.mozilla.org", "XPCShell", "1", "1");
+BootstrapMonitor.init();
+
+// Test that enabling an extension during startup generates the
+// proper reason for startup().
+add_task(async function test_startup_enable() {
+ const ID = "compat@tests.mozilla.org";
+
+ await promiseStartupManager();
+
+ await promiseInstallWebExtension({
+ manifest: {
+ applications: {
+ gecko: {
+ id: ID,
+ strict_min_version: "1",
+ strict_max_version: "1",
+ },
+ },
+ },
+ });
+
+ BootstrapMonitor.checkInstalled(ID);
+ BootstrapMonitor.checkStarted(ID);
+ let { reason } = BootstrapMonitor.started.get(ID);
+ equal(
+ reason,
+ BOOTSTRAP_REASONS.ADDON_INSTALL,
+ "Startup reason is ADDON_INSTALL at install"
+ );
+
+ gAppInfo.platformVersion = "2";
+ await promiseRestartManager("2");
+ BootstrapMonitor.checkInstalled(ID);
+ BootstrapMonitor.checkNotStarted(ID);
+
+ gAppInfo.platformVersion = "1";
+ await promiseRestartManager("1");
+ BootstrapMonitor.checkInstalled(ID);
+ BootstrapMonitor.checkStarted(ID);
+ ({ reason } = BootstrapMonitor.started.get(ID));
+ equal(
+ reason,
+ BOOTSTRAP_REASONS.ADDON_ENABLE,
+ "Startup reason is ADDON_ENABLE when re-enabled at startup"
+ );
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_startup_scan.js b/toolkit/mozapps/extensions/test/xpcshell/test_startup_scan.js
new file mode 100644
index 0000000000..67c75cbd17
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_startup_scan.js
@@ -0,0 +1,125 @@
+"use strict";
+
+// Turn off startup scanning.
+Services.prefs.setIntPref("extensions.startupScanScopes", 0);
+
+createAppInfo("xpcshell@tessts.mozilla.org", "XPCShell", "42", "42");
+// Prevent XPIStates.scanForChanges from seeing this as an update and forcing a
+// full scan.
+Services.prefs.setCharPref(
+ "extensions.lastAppBuildId",
+ Services.appinfo.appBuildID
+);
+
+// A small bootstrap calls monitor targeting a single extension (created to avoid introducing a workaround
+// in BootstrapMonitor to be able to test Bug 1664144 fix).
+let Monitor = {
+ extensionId: undefined,
+ collected: [],
+ init() {
+ const bootstrapCallListener = (_evtName, data) => {
+ if (data.params.id == this.extensionId) {
+ this.collected.push(data);
+ }
+ };
+ AddonTestUtils.on("bootstrap-method", bootstrapCallListener);
+ registerCleanupFunction(() => {
+ AddonTestUtils.off("bootstrap-method", bootstrapCallListener);
+ });
+ },
+ startCollecting(extensionId) {
+ this.extensionId = extensionId;
+ },
+ stopCollecting() {
+ this.extensionId = undefined;
+ },
+ getCollected() {
+ const collected = this.collected;
+ this.collected = [];
+ return collected;
+ },
+};
+
+Monitor.init();
+
+// Bug 1664144: Test that during startup scans, updating an addon
+// that has already started is restarted.
+add_task(async function test_startup_sideload_updated() {
+ const ID = "sideload@tests.mozilla.org";
+
+ await createWebExtension(ID, initialVersion("1"), profileDir);
+ await promiseStartupManager();
+
+ // Ensure the sideload is enabled and running.
+ let addon = await promiseAddonByID(ID);
+
+ Monitor.startCollecting(ID);
+ await addon.enable();
+ Monitor.stopCollecting();
+
+ let events = Monitor.getCollected();
+ ok(events.length, "bootstrap methods called");
+ equal(
+ events[0].reason,
+ BOOTSTRAP_REASONS.ADDON_ENABLE,
+ "Startup reason is ADDON_ENABLE at install"
+ );
+
+ await promiseShutdownManager();
+ // Touch the addon on disk before startup.
+ await createWebExtension(ID, initialVersion("1.1"), profileDir);
+ Monitor.startCollecting(ID);
+ await promiseStartupManager();
+ await AddonManagerPrivate.getNewSideloads();
+ Monitor.stopCollecting();
+
+ events = Monitor.getCollected().map(({ method, reason, params }) => {
+ const { version } = params;
+ return { method, reason, version };
+ });
+
+ const updatedVersion = "1.1.0";
+ const expectedUpgradeParams = {
+ reason: BOOTSTRAP_REASONS.ADDON_UPGRADE,
+ version: updatedVersion,
+ };
+
+ const expectedCalls = [
+ {
+ method: "startup",
+ reason: BOOTSTRAP_REASONS.APP_STARTUP,
+ version: "1.0",
+ },
+ // Shutdown call has version 1.1 because the file was already
+ // updated on disk and got the new version as part of the startup.
+ { method: "shutdown", ...expectedUpgradeParams },
+ { method: "update", ...expectedUpgradeParams },
+ { method: "startup", ...expectedUpgradeParams },
+ ];
+
+ for (let i = 0; i < expectedCalls.length; i++) {
+ Assert.deepEqual(
+ events[i],
+ expectedCalls[i],
+ "Got the expected sequence of bootstrap method calls"
+ );
+ }
+
+ equal(
+ events.length,
+ expectedCalls.length,
+ "Got the expected number of bootstrap method calls"
+ );
+
+ // flush addonStartup.json
+ await AddonTestUtils.loadAddonsList(true);
+ // verify startupData is correct
+ let startupData = aomStartup.readStartupData();
+ Assert.equal(
+ startupData["app-profile"].addons[ID].version,
+ updatedVersion,
+ "startup data is correct in cache"
+ );
+
+ await promiseShutdownManager();
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_strictcompatibility.js b/toolkit/mozapps/extensions/test/xpcshell/test_strictcompatibility.js
new file mode 100644
index 0000000000..c33495f034
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_strictcompatibility.js
@@ -0,0 +1,152 @@
+/* Any copyright is dedicated to the Public Domain.
+ http://creativecommons.org/publicdomain/zero/1.0/ */
+
+// Tests AddonManager.strictCompatibility and it's related preference,
+// extensions.strictCompatibility, and the strictCompatibility option in
+// install.rdf
+
+// turn on Cu.isInAutomation
+Services.prefs.setBoolPref(PREF_DISABLE_SECURITY, true);
+
+// The `compatbile` array defines which of the tests below the add-on
+// should be compatible in. It's pretty gross.
+const ADDONS = [
+ // Always compatible
+ {
+ manifest: {
+ id: "addon1@tests.mozilla.org",
+ targetApplications: [
+ {
+ id: "xpcshell@tests.mozilla.org",
+ minVersion: "1",
+ maxVersion: "1",
+ },
+ ],
+ },
+ compatible: {
+ nonStrict: true,
+ strict: true,
+ },
+ },
+
+ // Incompatible in strict compatibility mode
+ {
+ manifest: {
+ id: "addon2@tests.mozilla.org",
+ targetApplications: [
+ {
+ id: "xpcshell@tests.mozilla.org",
+ minVersion: "0.7",
+ maxVersion: "0.8",
+ },
+ ],
+ },
+ compatible: {
+ nonStrict: true,
+ strict: false,
+ },
+ },
+
+ // Opt-in to strict compatibility - always incompatible
+ {
+ manifest: {
+ id: "addon3@tests.mozilla.org",
+ strictCompatibility: true,
+ targetApplications: [
+ {
+ id: "xpcshell@tests.mozilla.org",
+ minVersion: "0.8",
+ maxVersion: "0.9",
+ },
+ ],
+ },
+ compatible: {
+ nonStrict: false,
+ strict: false,
+ },
+ },
+
+ // Addon from the future - would be marked as compatibile-by-default,
+ // but minVersion is higher than the app version
+ {
+ manifest: {
+ id: "addon4@tests.mozilla.org",
+ targetApplications: [
+ {
+ id: "xpcshell@tests.mozilla.org",
+ minVersion: "3",
+ maxVersion: "5",
+ },
+ ],
+ },
+ compatible: {
+ nonStrict: false,
+ strict: false,
+ },
+ },
+
+ // Dictionary - compatible even in strict compatibility mode
+ {
+ manifest: {
+ id: "addon5@tests.mozilla.org",
+ type: "dictionary",
+ targetApplications: [
+ {
+ id: "xpcshell@tests.mozilla.org",
+ minVersion: "0.8",
+ maxVersion: "0.9",
+ },
+ ],
+ },
+ compatible: {
+ nonStrict: true,
+ strict: true,
+ },
+ },
+];
+
+async function checkCompatStatus(strict, index) {
+ info(`Checking compat status for test ${index}\n`);
+
+ equal(AddonManager.strictCompatibility, strict);
+
+ for (let test of ADDONS) {
+ let { id } = test.manifest;
+ let addon = await promiseAddonByID(id);
+ checkAddon(id, addon, {
+ isCompatible: test.compatible[index],
+ appDisabled: !test.compatible[index],
+ });
+ }
+}
+
+add_task(async function setup() {
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1.9.2");
+
+ for (let addon of ADDONS) {
+ let xpi = await createAddon(addon.manifest);
+ await manuallyInstall(
+ xpi,
+ AddonTestUtils.profileExtensions,
+ addon.manifest.id
+ );
+ }
+
+ await promiseStartupManager();
+});
+
+add_task(async function test_1() {
+ info("Test 1");
+ Services.prefs.setBoolPref(PREF_EM_STRICT_COMPATIBILITY, false);
+ await checkCompatStatus(false, "nonStrict");
+ await promiseRestartManager();
+ await checkCompatStatus(false, "nonStrict");
+});
+
+add_task(async function test_2() {
+ info("Test 2");
+ Services.prefs.setBoolPref(PREF_EM_STRICT_COMPATIBILITY, true);
+ await checkCompatStatus(true, "strict");
+ await promiseRestartManager();
+ await checkCompatStatus(true, "strict");
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_syncGUID.js b/toolkit/mozapps/extensions/test/xpcshell/test_syncGUID.js
new file mode 100644
index 0000000000..513ce59e3c
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_syncGUID.js
@@ -0,0 +1,117 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// restartManager() mucks with XPIProvider.jsm importing, so we hack around.
+this.__defineGetter__("XPIProvider", function() {
+ let scope = {};
+ return ChromeUtils.import(
+ "resource://gre/modules/addons/XPIProvider.jsm",
+ scope
+ ).XPIProvider;
+});
+
+const UUID_PATTERN = /^\{[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}\}$/i;
+
+const ADDONS = [
+ {
+ id: "addon1@tests.mozilla.org",
+ name: "Test 1",
+ },
+ {
+ id: "addon2@tests.mozilla.org",
+ name: "Real Test 2",
+ },
+];
+
+let xpis;
+
+add_task(async function setup() {
+ Services.prefs.setBoolPref("extensions.checkUpdateSecurity", false);
+
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1.9");
+ await promiseStartupManager();
+
+ xpis = await Promise.all(
+ ADDONS.map(info =>
+ createTempWebExtensionFile({
+ manifest: {
+ name: info.name,
+ applications: { gecko: { id: info.id } },
+ },
+ })
+ )
+ );
+});
+
+add_task(async function test_getter_and_setter() {
+ await promiseInstallFile(xpis[0]);
+
+ let addon = await AddonManager.getAddonByID(ADDONS[0].id);
+ Assert.notEqual(addon, null);
+ Assert.notEqual(addon.syncGUID, null);
+ Assert.ok(UUID_PATTERN.test(addon.syncGUID));
+
+ let newGUID = "foo";
+
+ addon.syncGUID = newGUID;
+ Assert.equal(newGUID, addon.syncGUID);
+
+ // Verify change made it to DB.
+ let newAddon = await AddonManager.getAddonByID(ADDONS[0].id);
+ Assert.notEqual(newAddon, null);
+ Assert.equal(newGUID, newAddon.syncGUID);
+});
+
+add_task(async function test_fetch_by_guid_unknown_guid() {
+ let addon = await XPIProvider.getAddonBySyncGUID("XXXX");
+ Assert.equal(null, addon);
+});
+
+// Ensure setting an extension to an existing syncGUID results in error.
+add_task(async function test_error_on_duplicate_syncguid_insert() {
+ await promiseInstallAllFiles(xpis);
+
+ let addons = await AddonManager.getAddonsByIDs(ADDONS.map(a => a.id));
+ let initialGUID = addons[1].syncGUID;
+
+ Assert.throws(
+ () => {
+ addons[1].syncGUID = addons[0].syncGUID;
+ },
+ /Addon sync GUID conflict/,
+ "Assigning conflicting sync guids throws"
+ );
+
+ await promiseRestartManager();
+
+ let addon = await AddonManager.getAddonByID(ADDONS[1].id);
+ Assert.equal(initialGUID, addon.syncGUID);
+});
+
+add_task(async function test_fetch_by_guid_known_guid() {
+ let addon = await AddonManager.getAddonByID(ADDONS[0].id);
+ Assert.notEqual(null, addon);
+ Assert.notEqual(null, addon.syncGUID);
+
+ let syncGUID = addon.syncGUID;
+
+ let newAddon = await XPIProvider.getAddonBySyncGUID(syncGUID);
+ Assert.notEqual(null, newAddon);
+ Assert.equal(syncGUID, newAddon.syncGUID);
+});
+
+add_task(async function test_addon_manager_get_by_sync_guid() {
+ let addon = await AddonManager.getAddonByID(ADDONS[0].id);
+ Assert.notEqual(null, addon.syncGUID);
+
+ let syncGUID = addon.syncGUID;
+
+ let newAddon = await AddonManager.getAddonBySyncGUID(syncGUID);
+ Assert.notEqual(null, newAddon);
+ Assert.equal(addon.id, newAddon.id);
+ Assert.equal(syncGUID, newAddon.syncGUID);
+
+ let missing = await AddonManager.getAddonBySyncGUID("DOES_NOT_EXIST");
+ Assert.equal(undefined, missing);
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_system_allowed.js b/toolkit/mozapps/extensions/test/xpcshell/test_system_allowed.js
new file mode 100644
index 0000000000..15e493d86a
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_system_allowed.js
@@ -0,0 +1,54 @@
+// Tests that only allowed built-in system add-ons are loaded on startup.
+
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "0");
+
+// Ensure that only allowed add-ons are loaded.
+add_task(async function test_allowed_addons() {
+ // Build the test set
+ var distroDir = FileUtils.getDir("ProfD", ["sysfeatures"], true);
+ let xpi = await getSystemAddonXPI(1, "1.0");
+ xpi.copyTo(distroDir, "system1@tests.mozilla.org.xpi");
+
+ xpi = await getSystemAddonXPI(2, "1.0");
+ xpi.copyTo(distroDir, "system2@tests.mozilla.org.xpi");
+
+ xpi = await getSystemAddonXPI(3, "1.0");
+ xpi.copyTo(distroDir, "system3@tests.mozilla.org.xpi");
+
+ registerDirectory("XREAppFeat", distroDir);
+
+ // 1 and 2 are allowed, 3 is not.
+ let validAddons = {
+ system: ["system1@tests.mozilla.org", "system2@tests.mozilla.org"],
+ };
+ await overrideBuiltIns(validAddons);
+
+ await promiseStartupManager();
+
+ let addon = await AddonManager.getAddonByID("system1@tests.mozilla.org");
+ notEqual(addon, null);
+
+ addon = await AddonManager.getAddonByID("system2@tests.mozilla.org");
+ notEqual(addon, null);
+
+ addon = await AddonManager.getAddonByID("system3@tests.mozilla.org");
+ Assert.equal(addon, null);
+ equal(addon, null);
+
+ // 3 is now allowed, 1 and 2 are not.
+ validAddons = { system: ["system3@tests.mozilla.org"] };
+ await overrideBuiltIns(validAddons);
+
+ await promiseRestartManager();
+
+ addon = await AddonManager.getAddonByID("system1@tests.mozilla.org");
+ equal(addon, null);
+
+ addon = await AddonManager.getAddonByID("system2@tests.mozilla.org");
+ equal(addon, null);
+
+ addon = await AddonManager.getAddonByID("system3@tests.mozilla.org");
+ notEqual(addon, null);
+
+ await promiseShutdownManager();
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_system_delay_update.js b/toolkit/mozapps/extensions/test/xpcshell/test_system_delay_update.js
new file mode 100644
index 0000000000..f8d5666eda
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_system_delay_update.js
@@ -0,0 +1,485 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// This verifies that delaying a system add-on update works.
+
+PromiseTestUtils.allowMatchingRejectionsGlobally(
+ /Message manager disconnected/
+);
+
+const profileDir = gProfD.clone();
+profileDir.append("extensions");
+
+const IGNORE_ID = "system_delay_ignore@tests.mozilla.org";
+const COMPLETE_ID = "system_delay_complete@tests.mozilla.org";
+const DEFER_ID = "system_delay_defer@tests.mozilla.org";
+const DEFER2_ID = "system_delay_defer2@tests.mozilla.org";
+const DEFER_ALSO_ID = "system_delay_defer_also@tests.mozilla.org";
+const NORMAL_ID = "system1@tests.mozilla.org";
+
+const distroDir = FileUtils.getDir("ProfD", ["sysfeatures"], true);
+registerDirectory("XREAppFeat", distroDir);
+
+registerCleanupFunction(() => {
+ distroDir.remove(true);
+});
+
+AddonTestUtils.usePrivilegedSignatures = id => "system";
+
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "42");
+
+function promiseInstallPostponed(addonID1, addonID2) {
+ return new Promise((resolve, reject) => {
+ let seen = [];
+ let listener = {
+ onInstallFailed: () => {
+ AddonManager.removeInstallListener(listener);
+ reject("extension installation should not have failed");
+ },
+ onInstallEnded: install => {
+ AddonManager.removeInstallListener(listener);
+ reject(
+ `extension installation should not have ended for ${install.addon.id}`
+ );
+ },
+ onInstallPostponed: install => {
+ seen.push(install.addon.id);
+ if (seen.includes(addonID1) && seen.includes(addonID2)) {
+ AddonManager.removeInstallListener(listener);
+ resolve();
+ }
+ },
+ };
+
+ AddonManager.addInstallListener(listener);
+ });
+}
+
+function promiseInstallResumed(addonID1, addonID2) {
+ return new Promise((resolve, reject) => {
+ let seenPostponed = [];
+ let seenEnded = [];
+ let listener = {
+ onInstallFailed: () => {
+ AddonManager.removeInstallListener(listener);
+ reject("extension installation should not have failed");
+ },
+ onInstallEnded: install => {
+ seenEnded.push(install.addon.id);
+ if (
+ seenEnded.includes(addonID1) &&
+ seenEnded.includes(addonID2) &&
+ seenPostponed.includes(addonID1) &&
+ seenPostponed.includes(addonID2)
+ ) {
+ AddonManager.removeInstallListener(listener);
+ resolve();
+ }
+ },
+ onInstallPostponed: install => {
+ seenPostponed.push(install.addon.id);
+ },
+ };
+
+ AddonManager.addInstallListener(listener);
+ });
+}
+
+function promiseInstallDeferred(addonID1, addonID2) {
+ return new Promise((resolve, reject) => {
+ let seenEnded = [];
+ let listener = {
+ onInstallFailed: () => {
+ AddonManager.removeInstallListener(listener);
+ reject("extension installation should not have failed");
+ },
+ onInstallEnded: install => {
+ seenEnded.push(install.addon.id);
+ if (seenEnded.includes(addonID1) && seenEnded.includes(addonID2)) {
+ AddonManager.removeInstallListener(listener);
+ resolve();
+ }
+ },
+ };
+
+ AddonManager.addInstallListener(listener);
+ });
+}
+
+async function checkAddon(addonID, { version }) {
+ let addon = await promiseAddonByID(addonID);
+ Assert.notEqual(addon, null);
+ Assert.equal(addon.version, version);
+ Assert.ok(addon.isCompatible);
+ Assert.ok(!addon.appDisabled);
+ Assert.ok(addon.isActive);
+ Assert.equal(addon.type, "extension");
+}
+
+// Tests below have webextension background scripts inline.
+/* globals browser */
+
+// add-on registers upgrade listener, and ignores update.
+add_task(async function test_addon_upgrade_on_restart() {
+ // discard system addon updates
+ Services.prefs.setCharPref(PREF_SYSTEM_ADDON_SET, "");
+
+ let xpi = await getSystemAddonXPI(1, "1.0");
+ xpi.copyTo(distroDir, `${NORMAL_ID}.xpi`);
+
+ // Version 1.0 of an extension that ignores updates.
+ function background() {
+ browser.runtime.onUpdateAvailable.addListener(() => {
+ browser.test.sendMessage("got-update");
+ });
+ }
+
+ xpi = await createTempWebExtensionFile({
+ background,
+
+ manifest: {
+ version: "1.0",
+ applications: { gecko: { id: IGNORE_ID } },
+ },
+ });
+ xpi.copyTo(distroDir, `${IGNORE_ID}.xpi`);
+
+ // Version 2.0 of the same extension.
+ let xpi2 = await createTempWebExtensionFile({
+ manifest: {
+ version: "2.0",
+ applications: { gecko: { id: IGNORE_ID } },
+ },
+ });
+
+ await overrideBuiltIns({ system: [IGNORE_ID, NORMAL_ID] });
+
+ let extension = ExtensionTestUtils.expectExtension(IGNORE_ID);
+
+ await Promise.all([promiseStartupManager(), extension.awaitStartup()]);
+
+ let updateList = [
+ {
+ id: IGNORE_ID,
+ version: "2.0",
+ path: "system_delay_ignore_2.xpi",
+ xpi: xpi2,
+ },
+ {
+ id: NORMAL_ID,
+ version: "2.0",
+ path: "system1_2.xpi",
+ xpi: await getSystemAddonXPI(1, "2.0"),
+ },
+ ];
+
+ await Promise.all([
+ promiseInstallPostponed(IGNORE_ID, NORMAL_ID),
+ installSystemAddons(buildSystemAddonUpdates(updateList)),
+ extension.awaitMessage("got-update"),
+ ]);
+
+ // addon upgrade has been delayed.
+ await checkAddon(IGNORE_ID, { version: "1.0" });
+ // other addons in the set are delayed as well.
+ await checkAddon(NORMAL_ID, { version: "1.0" });
+
+ // restarting allows upgrades to proceed
+ await Promise.all([promiseRestartManager(), extension.awaitStartup()]);
+
+ await checkAddon(IGNORE_ID, { version: "2.0" });
+ await checkAddon(NORMAL_ID, { version: "2.0" });
+
+ await promiseShutdownManager();
+});
+
+// add-on registers upgrade listener, and allows update.
+add_task(async function test_addon_upgrade_on_reload() {
+ // discard system addon updates
+ Services.prefs.setCharPref(PREF_SYSTEM_ADDON_SET, "");
+
+ let xpi = await getSystemAddonXPI(1, "1.0");
+ xpi.copyTo(distroDir, `${NORMAL_ID}.xpi`);
+
+ // Version 1.0 of an extension that listens for and immediately
+ // applies updates.
+ function background() {
+ browser.runtime.onUpdateAvailable.addListener(function listener() {
+ browser.runtime.onUpdateAvailable.removeListener(listener);
+ browser.test.sendMessage("got-update");
+ browser.runtime.reload();
+ });
+ }
+
+ xpi = await createTempWebExtensionFile({
+ background,
+
+ manifest: {
+ version: "1.0",
+ applications: { gecko: { id: COMPLETE_ID } },
+ },
+ });
+ xpi.copyTo(distroDir, `${COMPLETE_ID}.xpi`);
+
+ // Version 2.0 of the same extension.
+ let xpi2 = await createTempWebExtensionFile({
+ manifest: {
+ version: "2.0",
+ applications: { gecko: { id: COMPLETE_ID } },
+ },
+ });
+
+ await overrideBuiltIns({ system: [COMPLETE_ID, NORMAL_ID] });
+
+ let extension = ExtensionTestUtils.expectExtension(COMPLETE_ID);
+
+ await Promise.all([promiseStartupManager(), extension.awaitStartup()]);
+
+ let updateList = [
+ {
+ id: COMPLETE_ID,
+ version: "2.0",
+ path: "system_delay_complete_2.xpi",
+ xpi: xpi2,
+ },
+ {
+ id: NORMAL_ID,
+ version: "2.0",
+ path: "system1_2.xpi",
+ xpi: await getSystemAddonXPI(1, "2.0"),
+ },
+ ];
+
+ // initial state
+ await checkAddon(COMPLETE_ID, { version: "1.0" });
+ await checkAddon(NORMAL_ID, { version: "1.0" });
+
+ // We should see that the onUpdateListener executed, then see the
+ // update resume.
+ await Promise.all([
+ extension.awaitMessage("got-update"),
+ promiseInstallResumed(COMPLETE_ID, NORMAL_ID),
+ installSystemAddons(buildSystemAddonUpdates(updateList)),
+ ]);
+ await extension.awaitStartup();
+
+ // addon upgrade has been allowed
+ await checkAddon(COMPLETE_ID, { version: "2.0" });
+ // other upgrades in the set are allowed as well
+ await checkAddon(NORMAL_ID, { version: "2.0" });
+
+ // restarting changes nothing
+ await Promise.all([promiseRestartManager(), extension.awaitStartup()]);
+
+ await checkAddon(COMPLETE_ID, { version: "2.0" });
+ await checkAddon(NORMAL_ID, { version: "2.0" });
+
+ await promiseShutdownManager();
+});
+
+function delayBackground() {
+ browser.test.onMessage.addListener(msg => {
+ if (msg !== "reload") {
+ browser.test.fail(`Got unexpected test message: ${msg}`);
+ }
+ browser.runtime.reload();
+ });
+ browser.runtime.onUpdateAvailable.addListener(async function listener() {
+ browser.runtime.onUpdateAvailable.removeListener(listener);
+ browser.test.sendMessage("got-update");
+ });
+}
+
+// Upgrade listener initially defers then proceeds after a pause.
+add_task(async function test_addon_upgrade_after_pause() {
+ // discard system addon updates
+ Services.prefs.setCharPref(PREF_SYSTEM_ADDON_SET, "");
+
+ let xpi = await getSystemAddonXPI(1, "1.0");
+ xpi.copyTo(distroDir, `${NORMAL_ID}.xpi`);
+
+ // Version 1.0 of an extension that delays upgrades.
+ xpi = await createTempWebExtensionFile({
+ background: delayBackground,
+ manifest: {
+ version: "1.0",
+ applications: { gecko: { id: DEFER_ID } },
+ },
+ });
+ xpi.copyTo(distroDir, `${DEFER_ID}.xpi`);
+
+ // Version 2.0 of the same xtension.
+ let xpi2 = await createTempWebExtensionFile({
+ manifest: {
+ version: "2.0",
+ applications: { gecko: { id: DEFER_ID } },
+ },
+ });
+
+ await overrideBuiltIns({ system: [DEFER_ID, NORMAL_ID] });
+
+ let extension = ExtensionTestUtils.expectExtension(DEFER_ID);
+
+ await Promise.all([promiseStartupManager(), extension.awaitStartup()]);
+
+ let updateList = [
+ {
+ id: DEFER_ID,
+ version: "2.0",
+ path: "system_delay_defer_2.xpi",
+ xpi: xpi2,
+ },
+ {
+ id: NORMAL_ID,
+ version: "2.0",
+ path: "system1_2.xpi",
+ xpi: await getSystemAddonXPI(1, "2.0"),
+ },
+ ];
+
+ await Promise.all([
+ promiseInstallPostponed(DEFER_ID, NORMAL_ID),
+ installSystemAddons(buildSystemAddonUpdates(updateList)),
+ extension.awaitMessage("got-update"),
+ ]);
+
+ // upgrade is initially postponed
+ await checkAddon(DEFER_ID, { version: "1.0" });
+ // other addons in the set are postponed as well.
+ await checkAddon(NORMAL_ID, { version: "1.0" });
+
+ let deferred = promiseInstallDeferred(DEFER_ID, NORMAL_ID);
+
+ // Tell the extension to proceed with the update.
+ extension.setRestarting();
+ extension.sendMessage("reload");
+
+ await Promise.all([deferred, extension.awaitStartup()]);
+
+ // addon upgrade has been allowed
+ await checkAddon(DEFER_ID, { version: "2.0" });
+ // other addons in the set are allowed as well.
+ await checkAddon(NORMAL_ID, { version: "2.0" });
+
+ // restarting changes nothing
+ await promiseRestartManager();
+ await extension.awaitStartup();
+
+ await checkAddon(DEFER_ID, { version: "2.0" });
+ await checkAddon(NORMAL_ID, { version: "2.0" });
+
+ await promiseShutdownManager();
+});
+
+// Multiple add-ons register update listeners, initially defers then
+// each unblock in turn.
+add_task(async function test_multiple_addon_upgrade_postpone() {
+ // discard system addon updates.
+ Services.prefs.setCharPref(PREF_SYSTEM_ADDON_SET, "");
+
+ let updateList = [];
+
+ let xpi = await createTempWebExtensionFile({
+ background: delayBackground,
+ manifest: {
+ version: "1.0",
+ applications: { gecko: { id: DEFER2_ID } },
+ },
+ });
+ xpi.copyTo(distroDir, `${DEFER2_ID}.xpi`);
+
+ xpi = await createTempWebExtensionFile({
+ manifest: {
+ version: "2.0",
+ applications: { gecko: { id: DEFER2_ID } },
+ },
+ });
+ updateList.push({
+ id: DEFER2_ID,
+ version: "2.0",
+ path: "system_delay_defer_2.xpi",
+ xpi,
+ });
+
+ xpi = await createTempWebExtensionFile({
+ background: delayBackground,
+ manifest: {
+ version: "1.0",
+ applications: { gecko: { id: DEFER_ALSO_ID } },
+ },
+ });
+ xpi.copyTo(distroDir, `${DEFER_ALSO_ID}.xpi`);
+
+ xpi = await createTempWebExtensionFile({
+ manifest: {
+ version: "2.0",
+ applications: { gecko: { id: DEFER_ALSO_ID } },
+ },
+ });
+ updateList.push({
+ id: DEFER_ALSO_ID,
+ version: "2.0",
+ path: "system_delay_defer_also_2.xpi",
+ xpi,
+ });
+
+ await overrideBuiltIns({ system: [DEFER2_ID, DEFER_ALSO_ID] });
+
+ let extension1 = ExtensionTestUtils.expectExtension(DEFER2_ID);
+ let extension2 = ExtensionTestUtils.expectExtension(DEFER_ALSO_ID);
+
+ await Promise.all([
+ promiseStartupManager(),
+ extension1.awaitStartup(),
+ extension2.awaitStartup(),
+ ]);
+
+ await Promise.all([
+ promiseInstallPostponed(DEFER2_ID, DEFER_ALSO_ID),
+ installSystemAddons(buildSystemAddonUpdates(updateList)),
+ extension1.awaitMessage("got-update"),
+ extension2.awaitMessage("got-update"),
+ ]);
+
+ // upgrade is initially postponed
+ await checkAddon(DEFER2_ID, { version: "1.0" });
+ // other addons in the set are postponed as well.
+ await checkAddon(DEFER_ALSO_ID, { version: "1.0" });
+
+ let deferred = promiseInstallDeferred(DEFER2_ID, DEFER_ALSO_ID);
+
+ // Let one extension request that the update proceed.
+ extension1.setRestarting();
+ extension1.sendMessage("reload");
+
+ // Upgrade blockers still present.
+ await checkAddon(DEFER2_ID, { version: "1.0" });
+ await checkAddon(DEFER_ALSO_ID, { version: "1.0" });
+
+ // Let the second extension allow the update to proceed.
+ extension2.setRestarting();
+ extension2.sendMessage("reload");
+
+ await Promise.all([
+ deferred,
+ extension1.awaitStartup(),
+ extension2.awaitStartup(),
+ ]);
+
+ // addon upgrade has been allowed
+ await checkAddon(DEFER2_ID, { version: "2.0" });
+ await checkAddon(DEFER_ALSO_ID, { version: "2.0" });
+
+ // restarting changes nothing
+ await Promise.all([
+ promiseRestartManager(),
+ extension1.awaitStartup(),
+ extension2.awaitStartup(),
+ ]);
+
+ await checkAddon(DEFER2_ID, { version: "2.0" });
+ await checkAddon(DEFER_ALSO_ID, { version: "2.0" });
+
+ await promiseShutdownManager();
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_system_profile_location.js b/toolkit/mozapps/extensions/test/xpcshell/test_system_profile_location.js
new file mode 100644
index 0000000000..12ab4579ae
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_system_profile_location.js
@@ -0,0 +1,208 @@
+"use strict";
+
+/* globals browser */
+let scopes = AddonManager.SCOPE_PROFILE | AddonManager.SCOPE_APPLICATION;
+Services.prefs.setIntPref("extensions.enabledScopes", scopes);
+Services.prefs.setBoolPref(
+ "extensions.webextensions.background-delayed-startup",
+ false
+);
+
+AddonTestUtils.createAppInfo(
+ "xpcshell@tests.mozilla.org",
+ "XPCShell",
+ "1",
+ "1"
+);
+
+AddonTestUtils.usePrivilegedSignatures = id => id.startsWith("system");
+
+async function promiseInstallSystemProfileExtension(id, hidden) {
+ let xpi = await AddonTestUtils.createTempWebExtensionFile({
+ manifest: {
+ applications: { gecko: { id } },
+ hidden,
+ },
+ background() {
+ browser.test.sendMessage("started");
+ },
+ });
+ let wrapper = ExtensionTestUtils.expectExtension(id);
+
+ const install = await AddonManager.getInstallForURL(`file://${xpi.path}`, {
+ useSystemLocation: true, // KEY_APP_SYSTEM_PROFILE
+ });
+
+ install.install();
+
+ await wrapper.awaitStartup();
+ await wrapper.awaitMessage("started");
+ return wrapper;
+}
+
+async function promiseUninstall(id) {
+ await AddonManager.uninstallSystemProfileAddon(id);
+
+ let addon = await promiseAddonByID(id);
+ equal(addon, null, "Addon is gone after uninstall");
+}
+
+// Tests installing an extension into the app-system-profile location.
+add_task(async function test_system_profile_location() {
+ let id = "system@tests.mozilla.org";
+ await AddonTestUtils.promiseStartupManager();
+ let wrapper = await promiseInstallSystemProfileExtension(id);
+
+ let addon = await promiseAddonByID(id);
+ notEqual(addon, null, "Addon is installed");
+ ok(addon.isActive, "Addon is active");
+ ok(addon.isPrivileged, "Addon is privileged");
+ ok(wrapper.extension.isAppProvided, "Addon is app provided");
+ ok(!addon.hidden, "Addon is not hidden");
+ equal(
+ addon.signedState,
+ AddonManager.SIGNEDSTATE_PRIVILEGED,
+ "Addon is system signed"
+ );
+
+ // After a restart, the extension should start up normally.
+ await promiseRestartManager();
+ await wrapper.awaitStartup();
+ await wrapper.awaitMessage("started");
+ ok(true, "Extension in app-system-profile location ran after restart");
+
+ addon = await promiseAddonByID(id);
+ notEqual(addon, null, "Addon is installed");
+ ok(addon.isActive, "Addon is active");
+
+ // After a restart that causes a database rebuild, it should still work
+ await promiseRestartManager("2");
+ await wrapper.awaitStartup();
+ await wrapper.awaitMessage("started");
+ ok(true, "Extension in app-system-profile location ran after restart");
+
+ addon = await promiseAddonByID(id);
+ notEqual(addon, null, "Addon is installed");
+ ok(addon.isActive, "Addon is active");
+
+ // After a restart that changes the schema version, it should still work
+ await promiseShutdownManager();
+ Services.prefs.setIntPref("extensions.databaseSchema", 0);
+ await promiseStartupManager();
+
+ await wrapper.awaitStartup();
+ await wrapper.awaitMessage("started");
+ ok(true, "Extension in app-system-profile location ran after restart");
+
+ addon = await promiseAddonByID(id);
+ notEqual(addon, null, "Addon is installed");
+ ok(addon.isActive, "Addon is active");
+
+ await promiseUninstall(id);
+
+ await AddonTestUtils.promiseShutdownManager();
+});
+
+// Tests installing a hidden extension in the app-system-profile location.
+add_task(async function test_system_profile_location_hidden() {
+ let id = "system-hidden@tests.mozilla.org";
+ await AddonTestUtils.promiseStartupManager();
+ await promiseInstallSystemProfileExtension(id, true);
+
+ let addon = await promiseAddonByID(id);
+ notEqual(addon, null, "Addon is installed");
+ ok(addon.isActive, "Addon is active");
+ ok(addon.isPrivileged, "Addon is privileged");
+ ok(addon.hidden, "Addon is hidden");
+
+ await promiseUninstall(id);
+
+ await AddonTestUtils.promiseShutdownManager();
+});
+
+add_task(async function test_system_profile_location_installFile() {
+ await AddonTestUtils.promiseStartupManager();
+ let id = "system-fileinstall@test";
+ let xpi = await AddonTestUtils.createTempWebExtensionFile({
+ manifest: {
+ applications: { gecko: { id } },
+ },
+ background() {
+ browser.test.sendMessage("started");
+ },
+ });
+ let wrapper = ExtensionTestUtils.expectExtension(id);
+
+ const install = await AddonManager.getInstallForFile(xpi, null, null, true);
+ install.install();
+
+ await wrapper.awaitStartup();
+ await wrapper.awaitMessage("started");
+
+ await promiseUninstall(id);
+
+ await AddonTestUtils.promiseShutdownManager();
+});
+
+add_task(async function test_system_profile_location_overridden() {
+ await AddonTestUtils.promiseStartupManager();
+ let id = "system-fileinstall@test";
+ let xpi = await AddonTestUtils.createTempWebExtensionFile({
+ manifest: {
+ version: "1.0",
+ applications: { gecko: { id } },
+ },
+ });
+
+ let install = await AddonManager.getInstallForFile(xpi, null, null, true);
+ await install.install();
+
+ let addon = await promiseAddonByID(id);
+ equal(addon.version, "1.0", "Addon is installed");
+
+ // Install a user profile version on top of the system profile location.
+ xpi = await AddonTestUtils.createTempWebExtensionFile({
+ manifest: {
+ version: "2.0",
+ applications: { gecko: { id } },
+ },
+ });
+
+ install = await AddonManager.getInstallForFile(xpi);
+ await install.install();
+
+ addon = await promiseAddonByID(id);
+ equal(addon.version, "2.0", "Addon is upgraded");
+
+ // Uninstall the system profile addon.
+ await AddonManager.uninstallSystemProfileAddon(id);
+
+ addon = await promiseAddonByID(id);
+ equal(addon.version, "2.0", "Addon is still active");
+
+ await addon.uninstall();
+ await AddonTestUtils.promiseShutdownManager();
+});
+
+add_task(async function test_system_profile_location_require_system_cert() {
+ await AddonTestUtils.promiseStartupManager();
+ let id = "fail@test";
+ let xpi = await AddonTestUtils.createTempWebExtensionFile({
+ manifest: {
+ applications: { gecko: { id } },
+ },
+ });
+ const install = await AddonManager.getInstallForURL(`file://${xpi.path}`, {
+ useSystemLocation: true, // KEY_APP_SYSTEM_PROFILE
+ });
+
+ await install.install();
+
+ let addon = await promiseAddonByID(id);
+ ok(!addon.isPrivileged, "Addon is not privileged");
+ ok(!addon.isActive, "Addon is not active");
+ equal(addon.signedState, AddonManager.SIGNEDSTATE_SIGNED, "Addon is signed");
+
+ await addon.uninstall();
+ await AddonTestUtils.promiseShutdownManager();
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_system_repository.js b/toolkit/mozapps/extensions/test/xpcshell/test_system_repository.js
new file mode 100644
index 0000000000..24ddb257cc
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_system_repository.js
@@ -0,0 +1,68 @@
+// Tests that AddonRepository doesn't download results for system add-ons
+
+const PREF_GETADDONS_CACHE_ENABLED = "extensions.getAddons.cache.enabled";
+
+var gServer = new HttpServer();
+gServer.start(-1);
+
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "0");
+
+// Test with a missing features directory
+add_task(async function test_app_addons() {
+ // Build the test set
+ var distroDir = FileUtils.getDir("ProfD", ["sysfeatures"], true);
+ let xpi = await getSystemAddonXPI(1, "1.0");
+ xpi.copyTo(distroDir, "system1@tests.mozilla.org.xpi");
+
+ xpi = await getSystemAddonXPI(2, "1.0");
+ xpi.copyTo(distroDir, "system2@tests.mozilla.org.xpi");
+
+ xpi = await getSystemAddonXPI(3, "1.0");
+ xpi.copyTo(distroDir, "system3@tests.mozilla.org.xpi");
+
+ registerDirectory("XREAppFeat", distroDir);
+
+ Services.prefs.setBoolPref(PREF_GETADDONS_CACHE_ENABLED, true);
+ Services.prefs.setCharPref(
+ PREF_GETADDONS_BYIDS,
+ `http://localhost:${gServer.identity.primaryPort}/get?%IDS%`
+ );
+
+ gServer.registerPathHandler("/get", (request, response) => {
+ do_throw("Unexpected request to server.");
+ });
+
+ await overrideBuiltIns({
+ system: [
+ "system1@tests.mozilla.org",
+ "system2@tests.mozilla.org",
+ "system3@tests.mozilla.org",
+ ],
+ });
+
+ await promiseStartupManager();
+
+ await AddonRepository.cacheAddons([
+ "system1@tests.mozilla.org",
+ "system2@tests.mozilla.org",
+ "system3@tests.mozilla.org",
+ ]);
+
+ let cached = await AddonRepository.getCachedAddonByID(
+ "system1@tests.mozilla.org"
+ );
+ Assert.equal(cached, null);
+
+ cached = await AddonRepository.getCachedAddonByID(
+ "system2@tests.mozilla.org"
+ );
+ Assert.equal(cached, null);
+
+ cached = await AddonRepository.getCachedAddonByID(
+ "system3@tests.mozilla.org"
+ );
+ Assert.equal(cached, null);
+
+ await promiseShutdownManager();
+ await new Promise(resolve => gServer.stop(resolve));
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_system_reset.js b/toolkit/mozapps/extensions/test/xpcshell/test_system_reset.js
new file mode 100644
index 0000000000..fd711094a6
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_system_reset.js
@@ -0,0 +1,535 @@
+// Tests that we reset to the default system add-ons correctly when switching
+// application versions
+
+const updatesDir = FileUtils.getDir("ProfD", ["features"]);
+
+AddonTestUtils.usePrivilegedSignatures = id => "system";
+
+add_task(async function setup() {
+ // Build the test sets
+ let dir = FileUtils.getDir("ProfD", ["sysfeatures", "app1"], true);
+ let xpi = await getSystemAddonXPI(1, "1.0");
+ xpi.copyTo(dir, "system1@tests.mozilla.org.xpi");
+
+ xpi = await getSystemAddonXPI(2, "1.0");
+ xpi.copyTo(dir, "system2@tests.mozilla.org.xpi");
+
+ dir = FileUtils.getDir("ProfD", ["sysfeatures", "app2"], true);
+ xpi = await getSystemAddonXPI(1, "2.0");
+ xpi.copyTo(dir, "system1@tests.mozilla.org.xpi");
+
+ xpi = await getSystemAddonXPI(3, "1.0");
+ xpi.copyTo(dir, "system3@tests.mozilla.org.xpi");
+
+ dir = FileUtils.getDir("ProfD", ["sysfeatures", "app3"], true);
+ xpi = await getSystemAddonXPI(1, "1.0");
+ xpi.copyTo(dir, "system1@tests.mozilla.org.xpi");
+
+ xpi = await getSystemAddonXPI(3, "1.0");
+ xpi.copyTo(dir, "system3@tests.mozilla.org.xpi");
+});
+
+const distroDir = FileUtils.getDir("ProfD", ["sysfeatures", "app0"], true);
+registerDirectory("XREAppFeat", distroDir);
+
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "0");
+
+function makeUUID() {
+ let uuidGen = Cc["@mozilla.org/uuid-generator;1"].getService(
+ Ci.nsIUUIDGenerator
+ );
+ return uuidGen.generateUUID().toString();
+}
+
+async function check_installed(conditions) {
+ for (let i = 0; i < conditions.length; i++) {
+ let condition = conditions[i];
+ let id = "system" + (i + 1) + "@tests.mozilla.org";
+ let addon = await promiseAddonByID(id);
+
+ if (!("isUpgrade" in condition) || !("version" in condition)) {
+ throw Error("condition must contain isUpgrade and version");
+ }
+ let isUpgrade = conditions[i].isUpgrade;
+ let version = conditions[i].version;
+
+ let expectedDir = isUpgrade ? updatesDir : distroDir;
+
+ if (version) {
+ // Add-on should be installed
+ Assert.notEqual(addon, null);
+ Assert.equal(addon.version, version);
+ Assert.ok(addon.isActive);
+ Assert.ok(!addon.foreignInstall);
+ Assert.ok(addon.hidden);
+ Assert.ok(addon.isSystem);
+ Assert.ok(!hasFlag(addon.permissions, AddonManager.PERM_CAN_UPGRADE));
+ if (isUpgrade) {
+ Assert.ok(
+ hasFlag(addon.permissions, AddonManager.PERM_API_CAN_UNINSTALL)
+ );
+ } else {
+ Assert.ok(
+ !hasFlag(addon.permissions, AddonManager.PERM_API_CAN_UNINSTALL)
+ );
+ }
+
+ // Verify the add-ons file is in the right place
+ let file = expectedDir.clone();
+ file.append(id + ".xpi");
+ Assert.ok(file.exists());
+ Assert.ok(file.isFile());
+
+ Assert.equal(getAddonFile(addon).path, file.path);
+
+ if (isUpgrade) {
+ Assert.equal(addon.signedState, AddonManager.SIGNEDSTATE_SYSTEM);
+ }
+ } else if (isUpgrade) {
+ // Add-on should not be installed
+ Assert.equal(addon, null);
+ } else {
+ // Either add-on should not be installed or it shouldn't be active
+ Assert.ok(!addon || !addon.isActive);
+ }
+ }
+}
+
+// Test with a missing features directory
+add_task(async function test_missing_app_dir() {
+ await overrideBuiltIns({
+ system: [
+ "system1@tests.mozilla.org",
+ "system2@tests.mozilla.org",
+ "system3@tests.mozilla.org",
+ "system5@tests.mozilla.org",
+ ],
+ });
+ await promiseStartupManager();
+
+ let conditions = [
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ ];
+
+ await check_installed(conditions);
+
+ Assert.ok(!updatesDir.exists());
+
+ await promiseShutdownManager();
+});
+
+// Add some features in a new version
+add_task(async function test_new_version() {
+ gAppInfo.version = "1";
+ distroDir.leafName = "app1";
+ await overrideBuiltIns({
+ system: [
+ "system1@tests.mozilla.org",
+ "system2@tests.mozilla.org",
+ "system3@tests.mozilla.org",
+ "system5@tests.mozilla.org",
+ ],
+ });
+ await promiseStartupManager();
+
+ let conditions = [
+ { isUpgrade: false, version: "1.0" },
+ { isUpgrade: false, version: "1.0" },
+ { isUpgrade: false, version: null },
+ ];
+
+ await check_installed(conditions);
+
+ Assert.ok(!updatesDir.exists());
+
+ await promiseShutdownManager();
+});
+
+// Another new version swaps one feature and upgrades another
+add_task(async function test_upgrade() {
+ gAppInfo.version = "2";
+ distroDir.leafName = "app2";
+ await overrideBuiltIns({
+ system: [
+ "system1@tests.mozilla.org",
+ "system2@tests.mozilla.org",
+ "system3@tests.mozilla.org",
+ "system5@tests.mozilla.org",
+ ],
+ });
+ await promiseStartupManager();
+
+ let conditions = [
+ { isUpgrade: false, version: "2.0" },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: "1.0" },
+ ];
+
+ await check_installed(conditions);
+
+ Assert.ok(!updatesDir.exists());
+
+ await promiseShutdownManager();
+});
+
+// Downgrade
+add_task(async function test_downgrade() {
+ gAppInfo.version = "1";
+ distroDir.leafName = "app1";
+ await overrideBuiltIns({
+ system: [
+ "system1@tests.mozilla.org",
+ "system2@tests.mozilla.org",
+ "system3@tests.mozilla.org",
+ "system5@tests.mozilla.org",
+ ],
+ });
+ await promiseStartupManager();
+
+ let conditions = [
+ { isUpgrade: false, version: "1.0" },
+ { isUpgrade: false, version: "1.0" },
+ { isUpgrade: false, version: null },
+ ];
+
+ await check_installed(conditions);
+
+ Assert.ok(!updatesDir.exists());
+
+ await promiseShutdownManager();
+});
+
+// Fake a mid-cycle install
+add_task(async function test_updated() {
+ // Create a random dir to install into
+ let dirname = makeUUID();
+ FileUtils.getDir("ProfD", ["features", dirname], true);
+ updatesDir.append(dirname);
+
+ // Copy in the system add-ons
+ let file = await getSystemAddonXPI(2, "2.0");
+ file.copyTo(updatesDir, "system2@tests.mozilla.org.xpi");
+ file = await getSystemAddonXPI(3, "2.0");
+ file.copyTo(updatesDir, "system3@tests.mozilla.org.xpi");
+
+ // Inject it into the system set
+ let addonSet = {
+ schema: 1,
+ directory: updatesDir.leafName,
+ addons: {
+ "system2@tests.mozilla.org": {
+ version: "2.0",
+ },
+ "system3@tests.mozilla.org": {
+ version: "2.0",
+ },
+ },
+ };
+ Services.prefs.setCharPref(PREF_SYSTEM_ADDON_SET, JSON.stringify(addonSet));
+
+ await overrideBuiltIns({
+ system: [
+ "system1@tests.mozilla.org",
+ "system2@tests.mozilla.org",
+ "system3@tests.mozilla.org",
+ "system5@tests.mozilla.org",
+ ],
+ });
+ await promiseStartupManager();
+
+ let conditions = [
+ { isUpgrade: false, version: "1.0" },
+ { isUpgrade: true, version: "2.0" },
+ { isUpgrade: true, version: "2.0" },
+ ];
+
+ await check_installed(conditions);
+
+ await promiseShutdownManager();
+});
+
+// Entering safe mode should disable the updated system add-ons and use the
+// default system add-ons
+add_task(async function safe_mode_disabled() {
+ gAppInfo.inSafeMode = true;
+ await overrideBuiltIns({
+ system: [
+ "system1@tests.mozilla.org",
+ "system2@tests.mozilla.org",
+ "system3@tests.mozilla.org",
+ "system5@tests.mozilla.org",
+ ],
+ });
+ await promiseStartupManager();
+
+ let conditions = [
+ { isUpgrade: false, version: "1.0" },
+ { isUpgrade: false, version: "1.0" },
+ { isUpgrade: false, version: null },
+ ];
+
+ await check_installed(conditions);
+
+ await promiseShutdownManager();
+});
+
+// Leaving safe mode should re-enable the updated system add-ons
+add_task(async function normal_mode_enabled() {
+ gAppInfo.inSafeMode = false;
+ await overrideBuiltIns({
+ system: [
+ "system1@tests.mozilla.org",
+ "system2@tests.mozilla.org",
+ "system3@tests.mozilla.org",
+ "system5@tests.mozilla.org",
+ ],
+ });
+ await promiseStartupManager();
+
+ let conditions = [
+ { isUpgrade: false, version: "1.0" },
+ { isUpgrade: true, version: "2.0" },
+ { isUpgrade: true, version: "2.0" },
+ ];
+
+ await check_installed(conditions);
+
+ await promiseShutdownManager();
+});
+
+// An additional add-on in the directory should be ignored
+add_task(async function test_skips_additional() {
+ // Copy in the system add-ons
+ let file = await getSystemAddonXPI(4, "1.0");
+ file.copyTo(updatesDir, "system4@tests.mozilla.org.xpi");
+
+ await overrideBuiltIns({
+ system: [
+ "system1@tests.mozilla.org",
+ "system2@tests.mozilla.org",
+ "system3@tests.mozilla.org",
+ "system5@tests.mozilla.org",
+ ],
+ });
+ await promiseStartupManager();
+
+ let conditions = [
+ { isUpgrade: false, version: "1.0" },
+ { isUpgrade: true, version: "2.0" },
+ { isUpgrade: true, version: "2.0" },
+ ];
+
+ await check_installed(conditions);
+
+ await promiseShutdownManager();
+});
+
+// Missing add-on should revert to the default set
+add_task(async function test_revert() {
+ manuallyUninstall(updatesDir, "system2@tests.mozilla.org");
+
+ await overrideBuiltIns({
+ system: [
+ "system1@tests.mozilla.org",
+ "system2@tests.mozilla.org",
+ "system3@tests.mozilla.org",
+ "system5@tests.mozilla.org",
+ ],
+ });
+ await promiseStartupManager();
+
+ // With system add-on 2 gone the updated set is now invalid so it reverts to
+ // the default set which is system add-ons 1 and 2.
+ let conditions = [
+ { isUpgrade: false, version: "1.0" },
+ { isUpgrade: false, version: "1.0" },
+ { isUpgrade: false, version: null },
+ ];
+
+ await check_installed(conditions);
+
+ await promiseShutdownManager();
+});
+
+// Putting it back will make the set work again
+add_task(async function test_reuse() {
+ let file = await getSystemAddonXPI(2, "2.0");
+ file.copyTo(updatesDir, "system2@tests.mozilla.org.xpi");
+
+ await overrideBuiltIns({
+ system: [
+ "system1@tests.mozilla.org",
+ "system2@tests.mozilla.org",
+ "system3@tests.mozilla.org",
+ "system5@tests.mozilla.org",
+ ],
+ });
+ await promiseStartupManager();
+
+ let conditions = [
+ { isUpgrade: false, version: "1.0" },
+ { isUpgrade: true, version: "2.0" },
+ { isUpgrade: true, version: "2.0" },
+ ];
+
+ await check_installed(conditions);
+
+ await promiseShutdownManager();
+});
+
+// Making the pref corrupt should revert to the default set
+add_task(async function test_corrupt_pref() {
+ Services.prefs.setCharPref(PREF_SYSTEM_ADDON_SET, "foo");
+
+ await overrideBuiltIns({
+ system: [
+ "system1@tests.mozilla.org",
+ "system2@tests.mozilla.org",
+ "system3@tests.mozilla.org",
+ "system5@tests.mozilla.org",
+ ],
+ });
+ await promiseStartupManager();
+
+ let conditions = [
+ { isUpgrade: false, version: "1.0" },
+ { isUpgrade: false, version: "1.0" },
+ { isUpgrade: false, version: null },
+ ];
+
+ await check_installed(conditions);
+
+ await promiseShutdownManager();
+});
+
+// An add-on with a bad certificate should cause us to use the default set
+add_task(async function test_bad_profile_cert() {
+ let file = await getSystemAddonXPI(1, "1.0");
+ file.copyTo(updatesDir, "system1@tests.mozilla.org.xpi");
+
+ // Inject it into the system set
+ let addonSet = {
+ schema: 1,
+ directory: updatesDir.leafName,
+ addons: {
+ "system1@tests.mozilla.org": {
+ version: "2.0",
+ },
+ "system2@tests.mozilla.org": {
+ version: "1.0",
+ },
+ "system3@tests.mozilla.org": {
+ version: "1.0",
+ },
+ },
+ };
+ Services.prefs.setCharPref(PREF_SYSTEM_ADDON_SET, JSON.stringify(addonSet));
+
+ await overrideBuiltIns({
+ system: [
+ "system1@tests.mozilla.org",
+ "system2@tests.mozilla.org",
+ "system3@tests.mozilla.org",
+ "system5@tests.mozilla.org",
+ ],
+ });
+ await promiseStartupManager();
+
+ let conditions = [
+ { isUpgrade: false, version: "1.0" },
+ { isUpgrade: false, version: "1.0" },
+ { isUpgrade: false, version: null },
+ ];
+
+ await check_installed(conditions);
+
+ await promiseShutdownManager();
+});
+
+// Switching to app defaults that contain a bad certificate should still work
+add_task(async function test_bad_app_cert() {
+ gAppInfo.version = "3";
+ distroDir.leafName = "app3";
+
+ AddonTestUtils.usePrivilegedSignatures = id => {
+ return id === "system1@tests.mozilla.org" ? false : "system";
+ };
+
+ await overrideBuiltIns({
+ system: [
+ "system1@tests.mozilla.org",
+ "system2@tests.mozilla.org",
+ "system3@tests.mozilla.org",
+ "system5@tests.mozilla.org",
+ ],
+ });
+ await promiseStartupManager();
+
+ // Since we updated the app version, the system addon set should be reset as well.
+ let addonSet = Services.prefs.getCharPref(PREF_SYSTEM_ADDON_SET);
+ Assert.equal(addonSet, `{"schema":1,"addons":{}}`);
+
+ // Add-on will still be present
+ let addon = await promiseAddonByID("system1@tests.mozilla.org");
+ Assert.notEqual(addon, null);
+ Assert.equal(addon.signedState, AddonManager.SIGNEDSTATE_NOT_REQUIRED);
+
+ let conditions = [
+ { isUpgrade: false, version: "1.0" },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: "1.0" },
+ ];
+
+ await check_installed(conditions);
+
+ await promiseShutdownManager();
+
+ AddonTestUtils.usePrivilegedSignatures = id => "system";
+});
+
+// A failed upgrade should revert to the default set.
+add_task(async function test_updated_bad_update_set() {
+ // Create a random dir to install into
+ let dirname = makeUUID();
+ FileUtils.getDir("ProfD", ["features", dirname], true);
+ updatesDir.append(dirname);
+
+ // Copy in the system add-ons
+ let file = await getSystemAddonXPI(2, "2.0");
+ file.copyTo(updatesDir, "system2@tests.mozilla.org.xpi");
+ file = await getSystemAddonXPI("failed_update", "1.0");
+ file.copyTo(updatesDir, "system_failed_update@tests.mozilla.org.xpi");
+
+ // Inject it into the system set
+ let addonSet = {
+ schema: 1,
+ directory: updatesDir.leafName,
+ addons: {
+ "system2@tests.mozilla.org": {
+ version: "2.0",
+ },
+ "system_failed_update@tests.mozilla.org": {
+ version: "1.0",
+ },
+ },
+ };
+ Services.prefs.setCharPref(PREF_SYSTEM_ADDON_SET, JSON.stringify(addonSet));
+
+ await overrideBuiltIns({
+ system: [
+ "system1@tests.mozilla.org",
+ "system2@tests.mozilla.org",
+ "system3@tests.mozilla.org",
+ "system5@tests.mozilla.org",
+ ],
+ });
+ await promiseStartupManager();
+
+ let conditions = [{ isUpgrade: false, version: "1.0" }];
+
+ await check_installed(conditions);
+
+ await promiseShutdownManager();
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_system_update_blank.js b/toolkit/mozapps/extensions/test/xpcshell/test_system_update_blank.js
new file mode 100644
index 0000000000..755a4fe5c4
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_system_update_blank.js
@@ -0,0 +1,117 @@
+// Tests that system add-on upgrades work.
+
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "2");
+
+let distroDir = FileUtils.getDir("ProfD", ["sysfeatures", "empty"], true);
+registerDirectory("XREAppFeat", distroDir);
+
+AddonTestUtils.usePrivilegedSignatures = id => "system";
+
+add_task(() => initSystemAddonDirs());
+
+/**
+ * Defines the set of initial conditions to run each test against. Each should
+ * define the following properties:
+ *
+ * setup: A task to setup the profile into the initial state.
+ * initialState: The initial expected system add-on state after setup has run.
+ */
+const TEST_CONDITIONS = {
+ // Runs tests with no updated or default system add-ons initially installed
+ blank: {
+ setup() {
+ clearSystemAddonUpdatesDir();
+ distroDir.leafName = "empty";
+ },
+ initialState: [
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ ],
+ },
+ // Runs tests with default system add-ons installed
+ withAppSet: {
+ setup() {
+ clearSystemAddonUpdatesDir();
+ distroDir.leafName = "prefilled";
+ },
+ initialState: [
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: "2.0" },
+ { isUpgrade: false, version: "2.0" },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ ],
+ },
+
+ // Runs tests with updated system add-ons installed
+ withProfileSet: {
+ async setup() {
+ await buildPrefilledUpdatesDir();
+ distroDir.leafName = "empty";
+ },
+ initialState: [
+ { isUpgrade: false, version: null },
+ { isUpgrade: true, version: "2.0" },
+ { isUpgrade: true, version: "2.0" },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ ],
+ },
+
+ // Runs tests with both default and updated system add-ons installed
+ withBothSets: {
+ async setup() {
+ await buildPrefilledUpdatesDir();
+ distroDir.leafName = "hidden";
+ },
+ initialState: [
+ { isUpgrade: false, version: "1.0" },
+ { isUpgrade: true, version: "2.0" },
+ { isUpgrade: true, version: "2.0" },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ ],
+ },
+};
+
+/**
+ * The tests to run. Each test must define an updateList or test. The following
+ * properties are used:
+ *
+ * updateList: The set of add-ons the server should respond with.
+ * test: A function to run to perform the update check (replaces
+ * updateList)
+ * fails: An optional property, if true the update check is expected to
+ * fail.
+ * finalState: An optional property, the expected final state of system add-ons,
+ * if missing the test condition's initialState is used.
+ */
+const TESTS = {
+ // Test that a blank response does nothing
+ blank: {
+ updateList: null,
+ },
+};
+
+add_task(async function setup() {
+ // Initialise the profile
+ await overrideBuiltIns({ system: [] });
+ await promiseStartupManager();
+ await promiseShutdownManager();
+});
+
+add_task(async function() {
+ for (let setupName of Object.keys(TEST_CONDITIONS)) {
+ for (let testName of Object.keys(TESTS)) {
+ info("Running test " + setupName + " " + testName);
+
+ let setup = TEST_CONDITIONS[setupName];
+ let test = TESTS[testName];
+
+ await execSystemAddonTest(setupName, setup, test, distroDir);
+ }
+ }
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_system_update_checkSizeHash.js b/toolkit/mozapps/extensions/test/xpcshell/test_system_update_checkSizeHash.js
new file mode 100644
index 0000000000..ddc63e54ce
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_system_update_checkSizeHash.js
@@ -0,0 +1,181 @@
+// Tests that system add-on upgrades work.
+
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "2");
+
+let distroDir = FileUtils.getDir("ProfD", ["sysfeatures", "empty"], true);
+registerDirectory("XREAppFeat", distroDir);
+
+AddonTestUtils.usePrivilegedSignatures = id => "system";
+
+/**
+ * Defines the set of initial conditions to run each test against. Each should
+ * define the following properties:
+ *
+ * setup: A task to setup the profile into the initial state.
+ * initialState: The initial expected system add-on state after setup has run.
+ */
+const TEST_CONDITIONS = {
+ // Runs tests with no updated or default system add-ons initially installed
+ blank: {
+ setup() {
+ clearSystemAddonUpdatesDir();
+ distroDir.leafName = "empty";
+ },
+ initialState: [
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ ],
+ },
+ // Runs tests with default system add-ons installed
+ withAppSet: {
+ setup() {
+ clearSystemAddonUpdatesDir();
+ distroDir.leafName = "prefilled";
+ },
+ initialState: [
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: "2.0" },
+ { isUpgrade: false, version: "2.0" },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ ],
+ },
+
+ // Runs tests with updated system add-ons installed
+ withProfileSet: {
+ async setup() {
+ await buildPrefilledUpdatesDir();
+ distroDir.leafName = "empty";
+ },
+ initialState: [
+ { isUpgrade: false, version: null },
+ { isUpgrade: true, version: "2.0" },
+ { isUpgrade: true, version: "2.0" },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ ],
+ },
+
+ // Runs tests with both default and updated system add-ons installed
+ withBothSets: {
+ async setup() {
+ await buildPrefilledUpdatesDir();
+ distroDir.leafName = "hidden";
+ },
+ initialState: [
+ { isUpgrade: false, version: "1.0" },
+ { isUpgrade: true, version: "2.0" },
+ { isUpgrade: true, version: "2.0" },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ ],
+ },
+};
+
+/**
+ * The tests to run. Each test must define an updateList or test. The following
+ * properties are used:
+ *
+ * updateList: The set of add-ons the server should respond with.
+ * test: A function to run to perform the update check (replaces
+ * updateList)
+ * fails: An optional property, if true the update check is expected to
+ * fail.
+ * finalState: An optional property, the expected final state of system add-ons,
+ * if missing the test condition's initialState is used.
+ */
+const TESTS = {
+ // Correct sizes and hashes should work
+ checkSizeHash: {
+ // updateList is populated in setup()
+ updateList: [],
+ finalState: {
+ blank: [
+ { isUpgrade: false, version: null },
+ { isUpgrade: true, version: "3.0" },
+ { isUpgrade: true, version: "3.0" },
+ { isUpgrade: false, version: null },
+ { isUpgrade: true, version: "1.0" },
+ ],
+ withAppSet: [
+ { isUpgrade: false, version: null },
+ { isUpgrade: true, version: "3.0" },
+ { isUpgrade: true, version: "3.0" },
+ { isUpgrade: false, version: null },
+ { isUpgrade: true, version: "1.0" },
+ ],
+ withProfileSet: [
+ { isUpgrade: false, version: null },
+ { isUpgrade: true, version: "3.0" },
+ { isUpgrade: true, version: "3.0" },
+ { isUpgrade: false, version: null },
+ { isUpgrade: true, version: "1.0" },
+ ],
+ withBothSets: [
+ { isUpgrade: false, version: "1.0" },
+ { isUpgrade: true, version: "3.0" },
+ { isUpgrade: true, version: "3.0" },
+ { isUpgrade: false, version: null },
+ { isUpgrade: true, version: "1.0" },
+ ],
+ },
+ },
+};
+
+add_task(async function setup() {
+ await initSystemAddonDirs();
+
+ // Initialise the profile
+ await overrideBuiltIns({ system: [] });
+ await promiseStartupManager();
+ await promiseShutdownManager();
+
+ let list = TESTS.checkSizeHash.updateList;
+ let xpi = await getSystemAddonXPI(2, "3.0");
+ list.push({
+ id: "system2@tests.mozilla.org",
+ version: "3.0",
+ path: "system2_3.xpi",
+ xpi,
+ size: xpi.fileSize,
+ });
+
+ xpi = await getSystemAddonXPI(3, "3.0");
+ let [hashFunction, hashValue] = do_get_file_hash(xpi, "sha1").split(":");
+ list.push({
+ id: "system3@tests.mozilla.org",
+ version: "3.0",
+ path: "system3_3.xpi",
+ xpi,
+ hashFunction,
+ hashValue,
+ });
+
+ xpi = await getSystemAddonXPI(5, "1.0");
+ [hashFunction, hashValue] = do_get_file_hash(xpi, "sha1").split(":");
+ list.push({
+ id: "system5@tests.mozilla.org",
+ version: "1.0",
+ path: "system5_1.xpi",
+ size: xpi.fileSize,
+ xpi,
+ hashFunction,
+ hashValue,
+ });
+});
+
+add_task(async function() {
+ for (let setupName of Object.keys(TEST_CONDITIONS)) {
+ for (let testName of Object.keys(TESTS)) {
+ info("Running test " + setupName + " " + testName);
+
+ let setup = TEST_CONDITIONS[setupName];
+ let test = TESTS[testName];
+
+ await execSystemAddonTest(setupName, setup, test, distroDir);
+ }
+ }
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_system_update_custom.js b/toolkit/mozapps/extensions/test/xpcshell/test_system_update_custom.js
new file mode 100644
index 0000000000..5f7e12ba21
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_system_update_custom.js
@@ -0,0 +1,431 @@
+// Tests that system add-on upgrades work.
+
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "2");
+
+let distroDir = FileUtils.getDir("ProfD", ["sysfeatures", "empty"], true);
+registerDirectory("XREAppFeat", distroDir);
+
+AddonTestUtils.usePrivilegedSignatures = id => "system";
+
+add_task(() => initSystemAddonDirs());
+
+/**
+ * Defines the set of initial conditions to run each test against. Each should
+ * define the following properties:
+ *
+ * setup: A task to setup the profile into the initial state.
+ * initialState: The initial expected system add-on state after setup has run.
+ */
+const TEST_CONDITIONS = {
+ // Runs tests with no updated or default system add-ons initially installed
+ blank: {
+ setup() {
+ clearSystemAddonUpdatesDir();
+ distroDir.leafName = "empty";
+ },
+ initialState: [
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ ],
+ },
+ // Runs tests with default system add-ons installed
+ withAppSet: {
+ setup() {
+ clearSystemAddonUpdatesDir();
+ distroDir.leafName = "prefilled";
+ },
+ initialState: [
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: "2.0" },
+ { isUpgrade: false, version: "2.0" },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ ],
+ },
+
+ // Runs tests with updated system add-ons installed
+ withProfileSet: {
+ async setup() {
+ await buildPrefilledUpdatesDir();
+ distroDir.leafName = "empty";
+ },
+ initialState: [
+ { isUpgrade: false, version: null },
+ { isUpgrade: true, version: "2.0" },
+ { isUpgrade: true, version: "2.0" },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ ],
+ },
+
+ // Runs tests with both default and updated system add-ons installed
+ withBothSets: {
+ async setup() {
+ await buildPrefilledUpdatesDir();
+ distroDir.leafName = "hidden";
+ },
+ initialState: [
+ { isUpgrade: false, version: "1.0" },
+ { isUpgrade: true, version: "2.0" },
+ { isUpgrade: true, version: "2.0" },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ ],
+ },
+};
+
+// Test that the update check is performed as part of the regular add-on update
+// check
+add_task(async function test_addon_update() {
+ Services.prefs.setBoolPref(PREF_SYSTEM_ADDON_UPDATE_ENABLED, true);
+ await setupSystemAddonConditions(TEST_CONDITIONS.blank, distroDir);
+
+ let updateXML = buildSystemAddonUpdates([
+ {
+ id: "system2@tests.mozilla.org",
+ version: "2.0",
+ path: "system2_2.xpi",
+ xpi: await getSystemAddonXPI(2, "2.0"),
+ },
+ {
+ id: "system3@tests.mozilla.org",
+ version: "2.0",
+ path: "system3_2.xpi",
+ xpi: await getSystemAddonXPI(3, "2.0"),
+ },
+ ]);
+ await Promise.all([
+ updateAllSystemAddons(updateXML),
+ promiseWebExtensionStartup("system2@tests.mozilla.org"),
+ promiseWebExtensionStartup("system3@tests.mozilla.org"),
+ ]);
+
+ await verifySystemAddonState(
+ TEST_CONDITIONS.blank.initialState,
+ [
+ { isUpgrade: false, version: null },
+ { isUpgrade: true, version: "2.0" },
+ { isUpgrade: true, version: "2.0" },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ ],
+ false,
+ distroDir
+ );
+
+ await promiseShutdownManager();
+});
+
+// Disabling app updates should block system add-on updates
+add_task(async function test_app_update_disabled() {
+ await setupSystemAddonConditions(TEST_CONDITIONS.blank, distroDir);
+
+ Services.prefs.setBoolPref(PREF_SYSTEM_ADDON_UPDATE_ENABLED, false);
+ let updateXML = buildSystemAddonUpdates([
+ {
+ id: "system2@tests.mozilla.org",
+ version: "2.0",
+ path: "system2_2.xpi",
+ xpi: await getSystemAddonXPI(2, "2.0"),
+ },
+ {
+ id: "system3@tests.mozilla.org",
+ version: "2.0",
+ path: "system3_2.xpi",
+ xpi: await getSystemAddonXPI(3, "2.0"),
+ },
+ ]);
+ await updateAllSystemAddons(updateXML);
+ Services.prefs.clearUserPref(PREF_SYSTEM_ADDON_UPDATE_ENABLED);
+
+ await verifySystemAddonState(
+ TEST_CONDITIONS.blank.initialState,
+ undefined,
+ false,
+ distroDir
+ );
+
+ await promiseShutdownManager();
+});
+
+// Safe mode should block system add-on updates
+add_task(async function test_safe_mode() {
+ gAppInfo.inSafeMode = true;
+
+ await setupSystemAddonConditions(TEST_CONDITIONS.blank, distroDir);
+
+ Services.prefs.setBoolPref(PREF_SYSTEM_ADDON_UPDATE_ENABLED, false);
+ let updateXML = buildSystemAddonUpdates([
+ {
+ id: "system2@tests.mozilla.org",
+ version: "2.0",
+ path: "system2_2.xpi",
+ xpi: await getSystemAddonXPI(2, "2.0"),
+ },
+ {
+ id: "system3@tests.mozilla.org",
+ version: "2.0",
+ path: "system3_2.xpi",
+ xpi: await getSystemAddonXPI(3, "2.0"),
+ },
+ ]);
+ await updateAllSystemAddons(updateXML);
+ Services.prefs.clearUserPref(PREF_SYSTEM_ADDON_UPDATE_ENABLED);
+
+ await verifySystemAddonState(
+ TEST_CONDITIONS.blank.initialState,
+ undefined,
+ false,
+ distroDir
+ );
+
+ await promiseShutdownManager();
+
+ gAppInfo.inSafeMode = false;
+});
+
+// Tests that a set that matches the default set does nothing
+add_task(async function test_match_default() {
+ await setupSystemAddonConditions(TEST_CONDITIONS.withAppSet, distroDir);
+
+ let installXML = buildSystemAddonUpdates([
+ {
+ id: "system2@tests.mozilla.org",
+ version: "2.0",
+ path: "system2_2.xpi",
+ xpi: await getSystemAddonXPI(2, "2.0"),
+ },
+ {
+ id: "system3@tests.mozilla.org",
+ version: "2.0",
+ path: "system3_2.xpi",
+ xpi: await getSystemAddonXPI(3, "2.0"),
+ },
+ ]);
+ await installSystemAddons(installXML);
+
+ // Shouldn't have installed an updated set
+ await verifySystemAddonState(
+ TEST_CONDITIONS.withAppSet.initialState,
+ undefined,
+ false,
+ distroDir
+ );
+
+ await promiseShutdownManager();
+});
+
+// Tests that a set that matches the hidden default set works
+add_task(async function test_match_default_revert() {
+ await setupSystemAddonConditions(TEST_CONDITIONS.withBothSets, distroDir);
+
+ let installXML = buildSystemAddonUpdates([
+ {
+ id: "system1@tests.mozilla.org",
+ version: "1.0",
+ path: "system1_1.xpi",
+ xpi: await getSystemAddonXPI(1, "1.0"),
+ },
+ {
+ id: "system2@tests.mozilla.org",
+ version: "1.0",
+ path: "system2_1.xpi",
+ xpi: await getSystemAddonXPI(2, "1.0"),
+ },
+ ]);
+ await installSystemAddons(installXML);
+
+ // This should revert to the default set instead of installing new versions
+ // into an updated set.
+ await verifySystemAddonState(
+ TEST_CONDITIONS.withBothSets.initialState,
+ [
+ { isUpgrade: false, version: "1.0" },
+ { isUpgrade: false, version: "1.0" },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ ],
+ false,
+ distroDir
+ );
+
+ await promiseShutdownManager();
+});
+
+// Tests that a set that matches the current set works
+add_task(async function test_match_current() {
+ await setupSystemAddonConditions(TEST_CONDITIONS.withBothSets, distroDir);
+
+ let installXML = buildSystemAddonUpdates([
+ {
+ id: "system2@tests.mozilla.org",
+ version: "2.0",
+ path: "system2_2.xpi",
+ xpi: await getSystemAddonXPI(2, "2.0"),
+ },
+ {
+ id: "system3@tests.mozilla.org",
+ version: "2.0",
+ path: "system3_2.xpi",
+ xpi: await getSystemAddonXPI(3, "2.0"),
+ },
+ ]);
+ await installSystemAddons(installXML);
+
+ // This should remain with the current set instead of creating a new copy
+ let set = JSON.parse(Services.prefs.getCharPref(PREF_SYSTEM_ADDON_SET));
+ Assert.equal(set.directory, "prefilled");
+
+ await verifySystemAddonState(
+ TEST_CONDITIONS.withBothSets.initialState,
+ undefined,
+ false,
+ distroDir
+ );
+
+ await promiseShutdownManager();
+});
+
+// Tests that a set with a minor change doesn't re-download existing files
+add_task(async function test_no_download() {
+ await setupSystemAddonConditions(TEST_CONDITIONS.withBothSets, distroDir);
+
+ // The missing file here is unneeded since there is a local version already
+ let installXML = buildSystemAddonUpdates([
+ { id: "system2@tests.mozilla.org", version: "2.0", path: "missing.xpi" },
+ {
+ id: "system4@tests.mozilla.org",
+ version: "1.0",
+ path: "system4_1.xpi",
+ xpi: await getSystemAddonXPI(4, "1.0"),
+ },
+ ]);
+ await Promise.all([
+ installSystemAddons(installXML),
+ promiseWebExtensionStartup("system4@tests.mozilla.org"),
+ ]);
+
+ await verifySystemAddonState(
+ TEST_CONDITIONS.withBothSets.initialState,
+ [
+ { isUpgrade: false, version: "1.0" },
+ { isUpgrade: true, version: "2.0" },
+ { isUpgrade: false, version: null },
+ { isUpgrade: true, version: "1.0" },
+ { isUpgrade: false, version: null },
+ ],
+ false,
+ distroDir
+ );
+
+ await promiseShutdownManager();
+});
+
+// Tests that a second update before a restart works
+add_task(async function test_double_update() {
+ await setupSystemAddonConditions(TEST_CONDITIONS.withAppSet, distroDir);
+
+ let installXML = buildSystemAddonUpdates([
+ {
+ id: "system2@tests.mozilla.org",
+ version: "2.0",
+ path: "system2_2.xpi",
+ xpi: await getSystemAddonXPI(2, "2.0"),
+ },
+ {
+ id: "system3@tests.mozilla.org",
+ version: "1.0",
+ path: "system3_1.xpi",
+ xpi: await getSystemAddonXPI(3, "1.0"),
+ },
+ ]);
+ await Promise.all([
+ installSystemAddons(installXML),
+ promiseWebExtensionStartup("system2@tests.mozilla.org"),
+ promiseWebExtensionStartup("system3@tests.mozilla.org"),
+ ]);
+
+ installXML = buildSystemAddonUpdates([
+ {
+ id: "system3@tests.mozilla.org",
+ version: "2.0",
+ path: "system3_2.xpi",
+ xpi: await getSystemAddonXPI(3, "2.0"),
+ },
+ {
+ id: "system4@tests.mozilla.org",
+ version: "1.0",
+ path: "system4_1.xpi",
+ xpi: await getSystemAddonXPI(4, "1.0"),
+ },
+ ]);
+ await Promise.all([
+ installSystemAddons(installXML),
+ promiseWebExtensionStartup("system3@tests.mozilla.org"),
+ promiseWebExtensionStartup("system4@tests.mozilla.org"),
+ ]);
+
+ await verifySystemAddonState(
+ TEST_CONDITIONS.withAppSet.initialState,
+ [
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: "2.0" },
+ { isUpgrade: true, version: "2.0" },
+ { isUpgrade: true, version: "1.0" },
+ { isUpgrade: false, version: null },
+ ],
+ true,
+ distroDir
+ );
+
+ await promiseShutdownManager();
+});
+
+// A second update after a restart will delete the original unused set
+add_task(async function test_update_purges() {
+ await setupSystemAddonConditions(TEST_CONDITIONS.withBothSets, distroDir);
+
+ let installXML = buildSystemAddonUpdates([
+ {
+ id: "system2@tests.mozilla.org",
+ version: "2.0",
+ path: "system2_2.xpi",
+ xpi: await getSystemAddonXPI(2, "2.0"),
+ },
+ {
+ id: "system3@tests.mozilla.org",
+ version: "1.0",
+ path: "system3_1.xpi",
+ xpi: await getSystemAddonXPI(3, "1.0"),
+ },
+ ]);
+ await Promise.all([
+ installSystemAddons(installXML),
+ promiseWebExtensionStartup("system2@tests.mozilla.org"),
+ promiseWebExtensionStartup("system3@tests.mozilla.org"),
+ ]);
+
+ await verifySystemAddonState(
+ TEST_CONDITIONS.withBothSets.initialState,
+ [
+ { isUpgrade: false, version: "1.0" },
+ { isUpgrade: true, version: "2.0" },
+ { isUpgrade: true, version: "1.0" },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ ],
+ false,
+ distroDir
+ );
+
+ await installSystemAddons(buildSystemAddonUpdates(null));
+
+ let dirs = await getSystemAddonDirectories();
+ Assert.equal(dirs.length, 1);
+
+ await promiseShutdownManager();
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_system_update_empty.js b/toolkit/mozapps/extensions/test/xpcshell/test_system_update_empty.js
new file mode 100644
index 0000000000..d2cf2f1013
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_system_update_empty.js
@@ -0,0 +1,141 @@
+// Tests that system add-on upgrades work.
+
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "2");
+
+let distroDir = FileUtils.getDir("ProfD", ["sysfeatures", "empty"], true);
+registerDirectory("XREAppFeat", distroDir);
+
+AddonTestUtils.usePrivilegedSignatures = id => "system";
+
+add_task(() => initSystemAddonDirs());
+
+/**
+ * Defines the set of initial conditions to run each test against. Each should
+ * define the following properties:
+ *
+ * setup: A task to setup the profile into the initial state.
+ * initialState: The initial expected system add-on state after setup has run.
+ */
+const TEST_CONDITIONS = {
+ // Runs tests with no updated or default system add-ons initially installed
+ blank: {
+ setup() {
+ clearSystemAddonUpdatesDir();
+ distroDir.leafName = "empty";
+ },
+ initialState: [
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ ],
+ },
+ // Runs tests with default system add-ons installed
+ withAppSet: {
+ setup() {
+ clearSystemAddonUpdatesDir();
+ distroDir.leafName = "prefilled";
+ },
+ initialState: [
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: "2.0" },
+ { isUpgrade: false, version: "2.0" },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ ],
+ },
+
+ // Runs tests with updated system add-ons installed
+ withProfileSet: {
+ async setup() {
+ await buildPrefilledUpdatesDir();
+ distroDir.leafName = "empty";
+ },
+ initialState: [
+ { isUpgrade: false, version: null },
+ { isUpgrade: true, version: "2.0" },
+ { isUpgrade: true, version: "2.0" },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ ],
+ },
+
+ // Runs tests with both default and updated system add-ons installed
+ withBothSets: {
+ async setup() {
+ await buildPrefilledUpdatesDir();
+ distroDir.leafName = "hidden";
+ },
+ initialState: [
+ { isUpgrade: false, version: "1.0" },
+ { isUpgrade: true, version: "2.0" },
+ { isUpgrade: true, version: "2.0" },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ ],
+ },
+};
+
+/**
+ * The tests to run. Each test must define an updateList or test. The following
+ * properties are used:
+ *
+ * updateList: The set of add-ons the server should respond with.
+ * test: A function to run to perform the update check (replaces
+ * updateList)
+ * fails: An optional property, if true the update check is expected to
+ * fail.
+ * finalState: An optional property, the expected final state of system add-ons,
+ * if missing the test condition's initialState is used.
+ */
+const TESTS = {
+ // Test that an empty list removes existing updates, leaving defaults.
+ empty: {
+ updateList: [],
+ finalState: {
+ blank: [
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ ],
+ withAppSet: [
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: "2.0" },
+ { isUpgrade: false, version: "2.0" },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ ],
+ withProfileSet: [
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ ],
+ withBothSets: [
+ { isUpgrade: false, version: "1.0" },
+ { isUpgrade: false, version: "1.0" },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ // Set this to `true` to so `verifySystemAddonState()` expects a blank profile dir
+ { isUpgrade: true, version: null },
+ ],
+ },
+ },
+};
+
+add_task(async function() {
+ for (let setupName of Object.keys(TEST_CONDITIONS)) {
+ for (let testName of Object.keys(TESTS)) {
+ info("Running test " + setupName + " " + testName);
+
+ let setup = TEST_CONDITIONS[setupName];
+ let test = TESTS[testName];
+
+ await execSystemAddonTest(setupName, setup, test, distroDir);
+ }
+ }
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_system_update_enterprisepolicy.js b/toolkit/mozapps/extensions/test/xpcshell/test_system_update_enterprisepolicy.js
new file mode 100644
index 0000000000..a4ebf9afc3
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_system_update_enterprisepolicy.js
@@ -0,0 +1,84 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/ */
+"use strict";
+
+// This test verifies that system addon updates are correctly blocked by the
+// DisableSystemAddonUpdate enterprise policy.
+
+const { EnterprisePolicyTesting } = ChromeUtils.import(
+ "resource://testing-common/EnterprisePolicyTesting.jsm"
+);
+
+// Setting PREF_DISABLE_SECURITY tells the policy engine that we are in testing
+// mode and enables restarting the policy engine without restarting the browser.
+Services.prefs.setBoolPref(PREF_DISABLE_SECURITY, true);
+registerCleanupFunction(() => {
+ Services.prefs.clearUserPref(PREF_DISABLE_SECURITY);
+});
+
+Services.policies; // Load policy engine
+
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "2");
+
+let distroDir = FileUtils.getDir("ProfD", ["sysfeatures", "empty"], true);
+registerDirectory("XREAppFeat", distroDir);
+add_task(() => initSystemAddonDirs());
+
+/**
+ * Defines the set of initial conditions to run the test against.
+ *
+ * setup: A task to setup the profile into the initial state.
+ * initialState: The initial expected system add-on state after setup has run.
+ *
+ * These conditions run tests with no updated or default system add-ons
+ * initially installed
+ */
+const TEST_CONDITIONS = {
+ setup() {
+ clearSystemAddonUpdatesDir();
+ distroDir.leafName = "empty";
+ },
+ initialState: [
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ ],
+};
+
+add_task(async function test_update_disabled_by_policy() {
+ await setupSystemAddonConditions(TEST_CONDITIONS, distroDir);
+
+ await EnterprisePolicyTesting.setupPolicyEngineWithJson({
+ policies: {
+ DisableSystemAddonUpdate: true,
+ },
+ });
+
+ await updateAllSystemAddons(
+ buildSystemAddonUpdates([
+ {
+ id: "system2@tests.mozilla.org",
+ version: "2.0",
+ path: "system2_2.xpi",
+ xpi: await getSystemAddonXPI(2, "2.0"),
+ },
+ {
+ id: "system3@tests.mozilla.org",
+ version: "2.0",
+ path: "system3_2.xpi",
+ xpi: await getSystemAddonXPI(3, "2.0"),
+ },
+ ])
+ );
+
+ await verifySystemAddonState(
+ TEST_CONDITIONS.initialState,
+ undefined,
+ false,
+ distroDir
+ );
+
+ await promiseShutdownManager();
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_system_update_fail.js b/toolkit/mozapps/extensions/test/xpcshell/test_system_update_fail.js
new file mode 100644
index 0000000000..1a1d51ce16
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_system_update_fail.js
@@ -0,0 +1,180 @@
+// Tests that system add-on upgrades fail to upgrade in expected cases.
+
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "2");
+
+let distroDir = FileUtils.getDir("ProfD", ["sysfeatures", "empty"], true);
+registerDirectory("XREAppFeat", distroDir);
+add_task(() => initSystemAddonDirs());
+
+/**
+ * Defines the set of initial conditions to run each test against. Each should
+ * define the following properties:
+ *
+ * setup: A task to setup the profile into the initial state.
+ * initialState: The initial expected system add-on state after setup has run.
+ */
+const TEST_CONDITIONS = {
+ // Runs tests with no updated or default system add-ons initially installed
+ blank: {
+ setup() {
+ clearSystemAddonUpdatesDir();
+ distroDir.leafName = "empty";
+ },
+ initialState: [
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ ],
+ },
+ // Runs tests with default system add-ons installed
+ withAppSet: {
+ setup() {
+ clearSystemAddonUpdatesDir();
+ distroDir.leafName = "prefilled";
+ },
+ initialState: [
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: "2.0" },
+ { isUpgrade: false, version: "2.0" },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ ],
+ },
+
+ // Runs tests with updated system add-ons installed
+ withProfileSet: {
+ async setup() {
+ await buildPrefilledUpdatesDir();
+ distroDir.leafName = "empty";
+ },
+ initialState: [
+ { isUpgrade: false, version: null },
+ { isUpgrade: true, version: "2.0" },
+ { isUpgrade: true, version: "2.0" },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ ],
+ },
+
+ // Runs tests with both default and updated system add-ons installed
+ withBothSets: {
+ async setup() {
+ await buildPrefilledUpdatesDir();
+ distroDir.leafName = "hidden";
+ },
+ initialState: [
+ { isUpgrade: false, version: "1.0" },
+ { isUpgrade: true, version: "2.0" },
+ { isUpgrade: true, version: "2.0" },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ ],
+ },
+};
+
+/**
+ * The tests to run. Each test must define an updateList or test. The following
+ * properties are used:
+ *
+ * updateList: The set of add-ons the server should respond with.
+ * test: A function to run to perform the update check (replaces
+ * updateList)
+ * fails: An optional property, if true the update check is expected to
+ * fail.
+ * finalState: An optional property, the expected final state of system add-ons,
+ * if missing the test condition's initialState is used.
+ */
+const TESTS = {
+ // Specifying an incorrect version should stop us updating anything
+ badVersion: {
+ fails: true,
+ updateList: [
+ {
+ id: "system2@tests.mozilla.org",
+ version: "4.0",
+ path: "system2_3.xpi",
+ },
+ {
+ id: "system3@tests.mozilla.org",
+ version: "3.0",
+ path: "system3_3.xpi",
+ },
+ ],
+ },
+
+ // Specifying an invalid size should stop us updating anything
+ badSize: {
+ fails: true,
+ updateList: [
+ {
+ id: "system2@tests.mozilla.org",
+ version: "3.0",
+ path: "system2_3.xpi",
+ size: 2,
+ },
+ {
+ id: "system3@tests.mozilla.org",
+ version: "3.0",
+ path: "system3_3.xpi",
+ },
+ ],
+ },
+
+ // Specifying an incorrect hash should stop us updating anything
+ badHash: {
+ fails: true,
+ updateList: [
+ {
+ id: "system2@tests.mozilla.org",
+ version: "3.0",
+ path: "system2_3.xpi",
+ },
+ {
+ id: "system3@tests.mozilla.org",
+ version: "3.0",
+ path: "system3_3.xpi",
+ hashFunction: "sha1",
+ hashValue: "205a4c49bd513ebd30594e380c19e86bba1f83e2",
+ },
+ ],
+ },
+
+ // A bad certificate should stop updates
+ badCert: {
+ fails: true,
+ updateList: [
+ {
+ id: "system1@tests.mozilla.org",
+ version: "1.0",
+ path: "system1_1_badcert.xpi",
+ },
+ {
+ id: "system3@tests.mozilla.org",
+ version: "1.0",
+ path: "system3_1.xpi",
+ },
+ ],
+ },
+};
+
+add_task(async function setup() {
+ // Initialise the profile
+ await overrideBuiltIns({ system: [] });
+ await promiseStartupManager();
+ await promiseShutdownManager();
+});
+
+add_task(async function() {
+ for (let setupName of Object.keys(TEST_CONDITIONS)) {
+ for (let testName of Object.keys(TESTS)) {
+ info("Running test " + setupName + " " + testName);
+
+ let setup = TEST_CONDITIONS[setupName];
+ let test = TESTS[testName];
+
+ await execSystemAddonTest(setupName, setup, test, distroDir);
+ }
+ }
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_system_update_newset.js b/toolkit/mozapps/extensions/test/xpcshell/test_system_update_newset.js
new file mode 100644
index 0000000000..2e802509f0
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_system_update_newset.js
@@ -0,0 +1,165 @@
+// Tests that system add-on upgrades work.
+
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "2");
+
+let distroDir = FileUtils.getDir("ProfD", ["sysfeatures", "empty"], true);
+registerDirectory("XREAppFeat", distroDir);
+
+AddonTestUtils.usePrivilegedSignatures = id => "system";
+
+add_task(() => initSystemAddonDirs());
+
+/**
+ * Defines the set of initial conditions to run each test against. Each should
+ * define the following properties:
+ *
+ * setup: A task to setup the profile into the initial state.
+ * initialState: The initial expected system add-on state after setup has run.
+ */
+const TEST_CONDITIONS = {
+ // Runs tests with no updated or default system add-ons initially installed
+ blank: {
+ setup() {
+ clearSystemAddonUpdatesDir();
+ distroDir.leafName = "empty";
+ },
+ initialState: [
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ ],
+ },
+ // Runs tests with default system add-ons installed
+ withAppSet: {
+ setup() {
+ clearSystemAddonUpdatesDir();
+ distroDir.leafName = "prefilled";
+ },
+ initialState: [
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: "2.0" },
+ { isUpgrade: false, version: "2.0" },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ ],
+ },
+
+ // Runs tests with updated system add-ons installed
+ withProfileSet: {
+ async setup() {
+ await buildPrefilledUpdatesDir();
+ distroDir.leafName = "empty";
+ },
+ initialState: [
+ { isUpgrade: false, version: null },
+ { isUpgrade: true, version: "2.0" },
+ { isUpgrade: true, version: "2.0" },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ ],
+ },
+
+ // Runs tests with both default and updated system add-ons installed
+ withBothSets: {
+ async setup() {
+ await buildPrefilledUpdatesDir();
+ distroDir.leafName = "hidden";
+ },
+ initialState: [
+ { isUpgrade: false, version: "1.0" },
+ { isUpgrade: true, version: "2.0" },
+ { isUpgrade: true, version: "2.0" },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ ],
+ },
+};
+
+/**
+ * The tests to run. Each test must define an updateList or test. The following
+ * properties are used:
+ *
+ * updateList: The set of add-ons the server should respond with.
+ * test: A function to run to perform the update check (replaces
+ * updateList)
+ * fails: An optional property, if true the update check is expected to
+ * fail.
+ * finalState: An optional property, the expected final state of system add-ons,
+ * if missing the test condition's initialState is used.
+ */
+const TESTS = {
+ // Tests that a new set of system add-ons gets installed
+ newset: {
+ // updateList is populated in setup() below
+ updateList: [],
+ finalState: {
+ blank: [
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ { isUpgrade: true, version: "1.0" },
+ { isUpgrade: true, version: "1.0" },
+ ],
+ withAppSet: [
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: "2.0" },
+ { isUpgrade: false, version: "2.0" },
+ { isUpgrade: true, version: "1.0" },
+ { isUpgrade: true, version: "1.0" },
+ ],
+ withProfileSet: [
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ { isUpgrade: true, version: "1.0" },
+ { isUpgrade: true, version: "1.0" },
+ ],
+ withBothSets: [
+ { isUpgrade: false, version: "1.0" },
+ { isUpgrade: false, version: "1.0" },
+ { isUpgrade: false, version: null },
+ { isUpgrade: true, version: "1.0" },
+ { isUpgrade: true, version: "1.0" },
+ ],
+ },
+ },
+};
+
+add_task(async function setup() {
+ // Initialise the profile
+ await overrideBuiltIns({ system: [] });
+ await promiseStartupManager();
+ await promiseShutdownManager();
+
+ let list = TESTS.newset.updateList;
+ let xpi = await getSystemAddonXPI(4, "1.0");
+ list.push({
+ id: "system4@tests.mozilla.org",
+ version: "1.0",
+ path: "system4_1.xpi",
+ xpi,
+ });
+
+ xpi = await getSystemAddonXPI(5, "1.0");
+ list.push({
+ id: "system5@tests.mozilla.org",
+ version: "1.0",
+ path: "system5_1.xpi",
+ xpi,
+ });
+});
+
+add_task(async function() {
+ for (let setupName of Object.keys(TEST_CONDITIONS)) {
+ for (let testName of Object.keys(TESTS)) {
+ info("Running test " + setupName + " " + testName);
+
+ let setup = TEST_CONDITIONS[setupName];
+ let test = TESTS[testName];
+
+ await execSystemAddonTest(setupName, setup, test, distroDir);
+ }
+ }
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_system_update_overlapping.js b/toolkit/mozapps/extensions/test/xpcshell/test_system_update_overlapping.js
new file mode 100644
index 0000000000..40e423d1f6
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_system_update_overlapping.js
@@ -0,0 +1,180 @@
+// Tests that system add-on upgrades work.
+
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "2");
+
+let distroDir = FileUtils.getDir("ProfD", ["sysfeatures", "empty"], true);
+registerDirectory("XREAppFeat", distroDir);
+add_task(() => initSystemAddonDirs());
+
+AddonTestUtils.usePrivilegedSignatures = id => "system";
+
+/**
+ * Defines the set of initial conditions to run each test against. Each should
+ * define the following properties:
+ *
+ * setup: A task to setup the profile into the initial state.
+ * initialState: The initial expected system add-on state after setup has run.
+ */
+const TEST_CONDITIONS = {
+ // Runs tests with no updated or default system add-ons initially installed
+ blank: {
+ setup() {
+ clearSystemAddonUpdatesDir();
+ distroDir.leafName = "empty";
+ },
+ initialState: [
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ ],
+ },
+ // Runs tests with default system add-ons installed
+ withAppSet: {
+ setup() {
+ clearSystemAddonUpdatesDir();
+ distroDir.leafName = "prefilled";
+ },
+ initialState: [
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: "2.0" },
+ { isUpgrade: false, version: "2.0" },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ ],
+ },
+
+ // Runs tests with updated system add-ons installed
+ withProfileSet: {
+ async setup() {
+ await buildPrefilledUpdatesDir();
+ distroDir.leafName = "empty";
+ },
+ initialState: [
+ { isUpgrade: false, version: null },
+ { isUpgrade: true, version: "2.0" },
+ { isUpgrade: true, version: "2.0" },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ ],
+ },
+
+ // Runs tests with both default and updated system add-ons installed
+ withBothSets: {
+ async setup() {
+ await buildPrefilledUpdatesDir();
+ distroDir.leafName = "hidden";
+ },
+ initialState: [
+ { isUpgrade: false, version: "1.0" },
+ { isUpgrade: true, version: "2.0" },
+ { isUpgrade: true, version: "2.0" },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ ],
+ },
+};
+
+/**
+ * The tests to run. Each test must define an updateList or test. The following
+ * properties are used:
+ *
+ * updateList: The set of add-ons the server should respond with.
+ * test: A function to run to perform the update check (replaces
+ * updateList)
+ * fails: An optional property, if true the update check is expected to
+ * fail.
+ * finalState: An optional property, the expected final state of system add-ons,
+ * if missing the test condition's initialState is used.
+ */
+const TESTS = {
+ // Tests that a set of system add-ons, some new, some existing gets installed
+ overlapping: {
+ // updateList is populated in setup() below
+ updateList: [],
+ finalState: {
+ blank: [
+ { isUpgrade: true, version: "2.0" },
+ { isUpgrade: true, version: "2.0" },
+ { isUpgrade: true, version: "3.0" },
+ { isUpgrade: true, version: "1.0" },
+ { isUpgrade: false, version: null },
+ ],
+ withAppSet: [
+ { isUpgrade: true, version: "2.0" },
+ { isUpgrade: true, version: "2.0" },
+ { isUpgrade: true, version: "3.0" },
+ { isUpgrade: true, version: "1.0" },
+ { isUpgrade: false, version: null },
+ ],
+ withProfileSet: [
+ { isUpgrade: true, version: "2.0" },
+ { isUpgrade: true, version: "2.0" },
+ { isUpgrade: true, version: "3.0" },
+ { isUpgrade: true, version: "1.0" },
+ { isUpgrade: false, version: null },
+ ],
+ withBothSets: [
+ { isUpgrade: true, version: "2.0" },
+ { isUpgrade: true, version: "2.0" },
+ { isUpgrade: true, version: "3.0" },
+ { isUpgrade: true, version: "1.0" },
+ { isUpgrade: false, version: null },
+ ],
+ },
+ },
+};
+
+add_task(async function setup() {
+ // Initialise the profile
+ await overrideBuiltIns({ system: [] });
+ await promiseStartupManager();
+ await promiseShutdownManager();
+
+ let list = TESTS.overlapping.updateList;
+ let xpi = await getSystemAddonXPI(1, "2.0");
+ list.push({
+ id: "system1@tests.mozilla.org",
+ version: "2.0",
+ path: "system1_2.xpi",
+ xpi,
+ });
+
+ xpi = await getSystemAddonXPI(2, "2.0");
+ list.push({
+ id: "system2@tests.mozilla.org",
+ version: "2.0",
+ path: "system2_2.xpi",
+ xpi,
+ });
+
+ xpi = await getSystemAddonXPI(3, "3.0");
+ list.push({
+ id: "system3@tests.mozilla.org",
+ version: "3.0",
+ path: "system3_3.xpi",
+ xpi,
+ });
+
+ xpi = await getSystemAddonXPI(4, "1.0");
+ list.push({
+ id: "system4@tests.mozilla.org",
+ version: "1.0",
+ path: "system4_1.xpi",
+ xpi,
+ });
+});
+
+add_task(async function() {
+ for (let setupName of Object.keys(TEST_CONDITIONS)) {
+ for (let testName of Object.keys(TESTS)) {
+ info("Running test " + setupName + " " + testName);
+
+ let setup = TEST_CONDITIONS[setupName];
+ let test = TESTS[testName];
+
+ await execSystemAddonTest(setupName, setup, test, distroDir);
+ }
+ }
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_system_update_uninstall_check.js b/toolkit/mozapps/extensions/test/xpcshell/test_system_update_uninstall_check.js
new file mode 100644
index 0000000000..38ac3cf6b7
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_system_update_uninstall_check.js
@@ -0,0 +1,56 @@
+// Tests that system add-on doesnt uninstall while update.
+
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "2");
+
+let distroDir = FileUtils.getDir("ProfD", ["sysfeatures", "empty"], true);
+registerDirectory("XREAppFeat", distroDir);
+
+AddonTestUtils.usePrivilegedSignatures = "system";
+
+add_task(() => initSystemAddonDirs());
+
+const initialSetup = {
+ async setup() {
+ await buildPrefilledUpdatesDir();
+ distroDir.leafName = "empty";
+ },
+ initialState: [
+ { isUpgrade: false, version: null },
+ { isUpgrade: true, version: "2.0" },
+ ],
+};
+
+add_task(async function test_systems_update_uninstall_check() {
+ Services.prefs.setBoolPref(PREF_SYSTEM_ADDON_UPDATE_ENABLED, true);
+
+ await setupSystemAddonConditions(initialSetup, distroDir);
+
+ let updateXML = buildSystemAddonUpdates([
+ {
+ id: "system2@tests.mozilla.org",
+ version: "3.0",
+ path: "system2_3.xpi",
+ xpi: await getSystemAddonXPI(2, "3.0"),
+ },
+ ]);
+
+ const listener = (msg, { method, params, reason }) => {
+ if (params.id === "system2@tests.mozilla.org" && method === "uninstall") {
+ Assert.ok(
+ false,
+ "Should not see uninstall call for system2@tests.mozilla.org"
+ );
+ }
+ };
+
+ AddonTestUtils.on("bootstrap-method", listener);
+
+ await Promise.all([
+ updateAllSystemAddons(updateXML),
+ promiseWebExtensionStartup("system2@tests.mozilla.org"),
+ ]);
+
+ AddonTestUtils.off("bootstrap-method", listener);
+
+ await promiseShutdownManager();
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_system_update_upgrades.js b/toolkit/mozapps/extensions/test/xpcshell/test_system_update_upgrades.js
new file mode 100644
index 0000000000..a669a3287c
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_system_update_upgrades.js
@@ -0,0 +1,165 @@
+// Tests that system add-on upgrades work.
+
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "2");
+
+let distroDir = FileUtils.getDir("ProfD", ["sysfeatures", "empty"], true);
+registerDirectory("XREAppFeat", distroDir);
+
+AddonTestUtils.usePrivilegedSignatures = id => "system";
+
+add_task(() => initSystemAddonDirs());
+
+/**
+ * Defines the set of initial conditions to run each test against. Each should
+ * define the following properties:
+ *
+ * setup: A task to setup the profile into the initial state.
+ * initialState: The initial expected system add-on state after setup has run.
+ */
+const TEST_CONDITIONS = {
+ // Runs tests with no updated or default system add-ons initially installed
+ blank: {
+ setup() {
+ clearSystemAddonUpdatesDir();
+ distroDir.leafName = "empty";
+ },
+ initialState: [
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ ],
+ },
+ // Runs tests with default system add-ons installed
+ withAppSet: {
+ setup() {
+ clearSystemAddonUpdatesDir();
+ distroDir.leafName = "prefilled";
+ },
+ initialState: [
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: "2.0" },
+ { isUpgrade: false, version: "2.0" },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ ],
+ },
+
+ // Runs tests with updated system add-ons installed
+ withProfileSet: {
+ async setup() {
+ await buildPrefilledUpdatesDir();
+ distroDir.leafName = "empty";
+ },
+ initialState: [
+ { isUpgrade: false, version: null },
+ { isUpgrade: true, version: "2.0" },
+ { isUpgrade: true, version: "2.0" },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ ],
+ },
+
+ // Runs tests with both default and updated system add-ons installed
+ withBothSets: {
+ async setup() {
+ await buildPrefilledUpdatesDir();
+ distroDir.leafName = "hidden";
+ },
+ initialState: [
+ { isUpgrade: false, version: "1.0" },
+ { isUpgrade: true, version: "2.0" },
+ { isUpgrade: true, version: "2.0" },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ ],
+ },
+};
+
+/**
+ * The tests to run. Each test must define an updateList or test. The following
+ * properties are used:
+ *
+ * updateList: The set of add-ons the server should respond with.
+ * test: A function to run to perform the update check (replaces
+ * updateList)
+ * fails: An optional property, if true the update check is expected to
+ * fail.
+ * finalState: An optional property, the expected final state of system add-ons,
+ * if missing the test condition's initialState is used.
+ */
+const TESTS = {
+ // Tests that an upgraded set of system add-ons gets installed
+ upgrades: {
+ // populated in setup() below
+ updateList: [],
+ finalState: {
+ blank: [
+ { isUpgrade: false, version: null },
+ { isUpgrade: true, version: "3.0" },
+ { isUpgrade: true, version: "3.0" },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ ],
+ withAppSet: [
+ { isUpgrade: false, version: null },
+ { isUpgrade: true, version: "3.0" },
+ { isUpgrade: true, version: "3.0" },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ ],
+ withProfileSet: [
+ { isUpgrade: false, version: null },
+ { isUpgrade: true, version: "3.0" },
+ { isUpgrade: true, version: "3.0" },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ ],
+ withBothSets: [
+ { isUpgrade: false, version: "1.0" },
+ { isUpgrade: true, version: "3.0" },
+ { isUpgrade: true, version: "3.0" },
+ { isUpgrade: false, version: null },
+ { isUpgrade: false, version: null },
+ ],
+ },
+ },
+};
+
+add_task(async function setup() {
+ // Initialise the profile
+ await overrideBuiltIns({ system: [] });
+ await promiseStartupManager();
+ await promiseShutdownManager();
+
+ let list = TESTS.upgrades.updateList;
+ let xpi = await getSystemAddonXPI(2, "3.0");
+ list.push({
+ id: "system2@tests.mozilla.org",
+ version: "3.0",
+ path: "system2_3.xpi",
+ xpi,
+ });
+
+ xpi = await getSystemAddonXPI(3, "3.0");
+ list.push({
+ id: "system3@tests.mozilla.org",
+ version: "3.0",
+ path: "system3_3.xpi",
+ xpi,
+ });
+});
+
+add_task(async function() {
+ for (let setupName of Object.keys(TEST_CONDITIONS)) {
+ for (let testName of Object.keys(TESTS)) {
+ info("Running test " + setupName + " " + testName);
+
+ let setup = TEST_CONDITIONS[setupName];
+ let test = TESTS[testName];
+
+ await execSystemAddonTest(setupName, setup, test, distroDir);
+ }
+ }
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_system_upgrades.js b/toolkit/mozapps/extensions/test/xpcshell/test_system_upgrades.js
new file mode 100644
index 0000000000..e68341b8df
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_system_upgrades.js
@@ -0,0 +1,415 @@
+"use strict";
+
+// Enable SCOPE_APPLICATION for builtin testing. Default in tests is only SCOPE_PROFILE.
+let scopes = AddonManager.SCOPE_PROFILE | AddonManager.SCOPE_APPLICATION;
+Services.prefs.setIntPref("extensions.enabledScopes", scopes);
+
+AddonTestUtils.createAppInfo(
+ "xpcshell@tests.mozilla.org",
+ "XPCShell",
+ "42",
+ "42"
+);
+BootstrapMonitor.init();
+
+// A test directory for default/builtin system addons.
+const systemDefaults = FileUtils.getDir(
+ "ProfD",
+ ["app-system-defaults", "features"],
+ true
+);
+registerDirectory("XREAppFeat", systemDefaults);
+
+AddonTestUtils.usePrivilegedSignatures = id => "system";
+
+const ADDON_ID = "updates@test";
+
+// The test extension uses an insecure update url.
+Services.prefs.setBoolPref("extensions.checkUpdateSecurity", false);
+
+let server = createHttpServer();
+
+server.registerPathHandler("/upgrade.json", (request, response) => {
+ response.setStatusLine(request.httpVersion, 200, "ok");
+ response.write(
+ JSON.stringify({
+ addons: {
+ [ADDON_ID]: {
+ updates: [
+ {
+ version: "4.0",
+ update_link: `http://localhost:${server.identity.primaryPort}/${ADDON_ID}.xpi`,
+ },
+ ],
+ },
+ },
+ })
+ );
+});
+
+function createWebExtensionFile(id, version, update_url) {
+ return AddonTestUtils.createTempWebExtensionFile({
+ manifest: {
+ version,
+ applications: {
+ gecko: { id, update_url },
+ },
+ },
+ });
+}
+
+let xpiUpdate = createWebExtensionFile(ADDON_ID, "4.0");
+
+server.registerFile(`/${ADDON_ID}.xpi`, xpiUpdate);
+
+async function promiseInstallDefaultSystemAddon(id, version) {
+ let xpi = createWebExtensionFile(id, version);
+ await AddonTestUtils.manuallyInstall(xpi, systemDefaults);
+ return xpi;
+}
+
+async function promiseInstallProfileExtension(id, version, update_url) {
+ return promiseInstallWebExtension({
+ manifest: {
+ version,
+ applications: {
+ gecko: { id, update_url },
+ },
+ },
+ });
+}
+
+async function promiseInstallSystemProfileAddon(id, version) {
+ let xpi = createWebExtensionFile(id, version);
+ const install = await AddonManager.getInstallForURL(`file://${xpi.path}`, {
+ useSystemLocation: true, // KEY_APP_SYSTEM_PROFILE
+ });
+
+ return install.install();
+}
+
+async function promiseUpdateSystemAddon(id, version, waitForStartup = true) {
+ let xpi = createWebExtensionFile(id, version);
+ let xml = buildSystemAddonUpdates([
+ {
+ id: ADDON_ID,
+ version,
+ path: xpi.leafName,
+ xpi,
+ },
+ ]);
+ // If we're not expecting a startup we need to wait for install to end.
+ let promises = [];
+ if (!waitForStartup) {
+ promises.push(AddonTestUtils.promiseAddonEvent("onInstalled"));
+ }
+ promises.push(installSystemAddons(xml, waitForStartup ? [ADDON_ID] : []));
+ return Promise.all(promises);
+}
+
+async function promiseClearSystemAddons() {
+ let xml = buildSystemAddonUpdates([]);
+ return installSystemAddons(xml, []);
+}
+
+const builtInOverride = { system: [ADDON_ID] };
+
+async function checkAddon(version, reason, startReason = reason) {
+ let addons = await AddonManager.getAddonsByTypes(["extension"]);
+ Assert.equal(addons.length, 1, "one addon expected to be installed");
+ Assert.equal(addons[0].version, version, `addon ${version} is installed`);
+ Assert.ok(addons[0].isActive, `addon ${version} is active`);
+ Assert.ok(!addons[0].disabled, `addon ${version} is enabled`);
+
+ let installInfo = BootstrapMonitor.checkInstalled(ADDON_ID, version);
+ equal(
+ installInfo.reason,
+ reason,
+ `bootstrap monitor verified install reason for ${version}`
+ );
+ let started = BootstrapMonitor.checkStarted(ADDON_ID, version);
+ equal(
+ started.reason,
+ startReason,
+ `bootstrap monitor verified started reason for ${version}`
+ );
+
+ return addons[0];
+}
+
+/**
+ * This test function starts after a 1.0 version of an addon is installed
+ * either as a builtin ("app-builtin") or as a builtin system addon ("app-system-defaults").
+ *
+ * This tests the precedence chain works as expected through upgrades and
+ * downgrades.
+ *
+ * Upgrade to a system addon in the profile location, "app-system-addons"
+ * Upgrade to a temporary addon
+ * Uninstalling the temporary addon downgrades to the system addon in "app-system-addons".
+ * Upgrade to a system addon in the "app-system-profile" location.
+ * Uninstalling the "app-system-profile" addon downgrades to the one in "app-system-addons".
+ * Upgrade to a user-installed addon
+ * Upgrade the addon in "app-system-addons", verify user-install is still active
+ * Uninstall the addon in "app-system-addons", verify user-install is active
+ * Test that the update_url upgrades the user-install and becomes active
+ * Disable the user-install, verify the disabled addon retains precedence
+ * Uninstall the disabled user-install, verify system addon in "app-system-defaults" is active and enabled
+ * Upgrade the system addon again, then user-install a lower version, verify downgrade happens.
+ * Uninstall user-install, verify upgrade happens when the system addon in "app-system-addons" is activated.
+ */
+async function _test_builtin_addon_override() {
+ /////
+ // Upgrade to a system addon in the profile location, "app-system-addons"
+ /////
+ await promiseUpdateSystemAddon(ADDON_ID, "2.0");
+ await checkAddon("2.0", BOOTSTRAP_REASONS.ADDON_UPGRADE);
+
+ /////
+ // Upgrade to a temporary addon
+ /////
+ let tmpAddon = createWebExtensionFile(ADDON_ID, "2.1");
+ await Promise.all([
+ AddonManager.installTemporaryAddon(tmpAddon),
+ AddonTestUtils.promiseWebExtensionStartup(ADDON_ID),
+ ]);
+ let addon = await checkAddon("2.1", BOOTSTRAP_REASONS.ADDON_UPGRADE);
+
+ /////
+ // Downgrade back to the system addon
+ /////
+ await addon.uninstall();
+ await checkAddon("2.0", BOOTSTRAP_REASONS.ADDON_DOWNGRADE);
+
+ /////
+ // Install then uninstall an system profile addon
+ /////
+ info("Install an System Profile Addon, then uninstall it.");
+ await Promise.all([
+ promiseInstallSystemProfileAddon(ADDON_ID, "2.2"),
+ AddonTestUtils.promiseWebExtensionStartup(ADDON_ID),
+ ]);
+ addon = await checkAddon("2.2", BOOTSTRAP_REASONS.ADDON_UPGRADE);
+ await addon.uninstall();
+ await checkAddon("2.0", BOOTSTRAP_REASONS.ADDON_DOWNGRADE);
+
+ /////
+ // Upgrade to a user-installed addon
+ /////
+ await Promise.all([
+ promiseInstallProfileExtension(
+ ADDON_ID,
+ "3.0",
+ `http://localhost:${server.identity.primaryPort}/upgrade.json`
+ ),
+ AddonTestUtils.promiseWebExtensionStartup(ADDON_ID),
+ ]);
+ await checkAddon("3.0", BOOTSTRAP_REASONS.ADDON_UPGRADE);
+
+ /////
+ // Upgrade the system addon, verify user-install is still active
+ /////
+ await promiseUpdateSystemAddon(ADDON_ID, "2.2", false);
+ await checkAddon("3.0", BOOTSTRAP_REASONS.ADDON_UPGRADE);
+
+ /////
+ // Uninstall the system addon, verify user-install is active
+ /////
+ await Promise.all([
+ promiseClearSystemAddons(),
+ AddonTestUtils.promiseAddonEvent("onUninstalled"),
+ ]);
+ addon = await checkAddon("3.0", BOOTSTRAP_REASONS.ADDON_UPGRADE);
+
+ /////
+ // Test that the update_url upgrades the user-install and becomes active
+ /////
+ let update = await promiseFindAddonUpdates(addon);
+ await promiseCompleteAllInstalls([update.updateAvailable]);
+ await AddonTestUtils.promiseWebExtensionStartup(ADDON_ID);
+ addon = await checkAddon("4.0", BOOTSTRAP_REASONS.ADDON_UPGRADE);
+
+ /////
+ // Disable the user-install, verify the disabled addon retains precedence
+ /////
+ await addon.disable();
+
+ await AddonManager.getAddonByID(ADDON_ID);
+ Assert.ok(!addon.isActive, "4.0 is disabled");
+ Assert.equal(
+ addon.version,
+ "4.0",
+ "version 4.0 is still the visible version"
+ );
+
+ /////
+ // Uninstall the disabled user-install, verify system addon is active and enabled
+ /////
+ await Promise.all([
+ addon.uninstall(),
+ AddonTestUtils.promiseWebExtensionStartup(ADDON_ID),
+ ]);
+ // We've downgraded all the way to 1.0 from a user-installed addon
+ addon = await checkAddon("1.0", BOOTSTRAP_REASONS.ADDON_DOWNGRADE);
+
+ /////
+ // Upgrade the system addon again, then user-install a lower version, verify downgrade happens.
+ /////
+ await promiseUpdateSystemAddon(ADDON_ID, "5.1");
+ addon = await checkAddon("5.1", BOOTSTRAP_REASONS.ADDON_UPGRADE);
+
+ // user-install a lower version, downgrade happens
+ await Promise.all([
+ promiseInstallProfileExtension(ADDON_ID, "5.0"),
+ AddonTestUtils.promiseWebExtensionStartup(ADDON_ID),
+ ]);
+ addon = await checkAddon("5.0", BOOTSTRAP_REASONS.ADDON_DOWNGRADE);
+
+ /////
+ // Uninstall user-install, verify upgrade happens when system addon is activated.
+ /////
+ await Promise.all([
+ addon.uninstall(),
+ AddonTestUtils.promiseWebExtensionStartup(ADDON_ID),
+ ]);
+ // the "system add-on upgrade" is now revealed
+ addon = await checkAddon("5.1", BOOTSTRAP_REASONS.ADDON_UPGRADE);
+
+ await Promise.all([
+ addon.uninstall(),
+ AddonTestUtils.promiseWebExtensionStartup(ADDON_ID),
+ ]);
+ await checkAddon("1.0", BOOTSTRAP_REASONS.ADDON_DOWNGRADE);
+
+ // Downgrading from an installed system addon to a default system
+ // addon also requires the removal of the file on disk, and removing
+ // the addon from the pref.
+ Services.prefs.clearUserPref(PREF_SYSTEM_ADDON_SET);
+}
+
+add_task(async function test_system_addon_upgrades() {
+ await AddonTestUtils.overrideBuiltIns(builtInOverride);
+ await promiseInstallDefaultSystemAddon(ADDON_ID, "1.0");
+ await AddonTestUtils.promiseStartupManager();
+ await checkAddon("1.0", BOOTSTRAP_REASONS.ADDON_INSTALL);
+
+ await _test_builtin_addon_override();
+
+ // cleanup the system addon in the default location
+ await AddonTestUtils.manuallyUninstall(systemDefaults, ADDON_ID);
+ // If we don't restart (to clean up the uninstall above) and we
+ // clear BootstrapMonitor, BootstrapMonitor asserts on the next AOM startup.
+ await AddonTestUtils.promiseRestartManager();
+
+ await AddonTestUtils.promiseShutdownManager();
+ BootstrapMonitor.clear(ADDON_ID);
+});
+
+// Run the test again, but starting from a "builtin" addon location
+add_task(async function test_builtin_addon_upgrades() {
+ builtInOverride.system = [];
+
+ await AddonTestUtils.promiseStartupManager();
+ await Promise.all([
+ installBuiltinExtension({
+ manifest: {
+ version: "1.0",
+ applications: {
+ gecko: { id: ADDON_ID },
+ },
+ },
+ }),
+ AddonTestUtils.promiseWebExtensionStartup(ADDON_ID),
+ ]);
+ await checkAddon("1.0", BOOTSTRAP_REASONS.ADDON_INSTALL);
+
+ await _test_builtin_addon_override();
+
+ let addon = await AddonManager.getAddonByID(ADDON_ID);
+ await addon.uninstall();
+ await AddonTestUtils.promiseShutdownManager();
+ BootstrapMonitor.clear(ADDON_ID);
+});
+
+add_task(async function test_system_addon_precedence() {
+ builtInOverride.system = [ADDON_ID];
+ await AddonTestUtils.overrideBuiltIns(builtInOverride);
+ await promiseInstallDefaultSystemAddon(ADDON_ID, "1.0");
+ await AddonTestUtils.promiseStartupManager();
+ await checkAddon("1.0", BOOTSTRAP_REASONS.ADDON_INSTALL);
+
+ /////
+ // Upgrade to a system addon in the profile location, "app-system-addons"
+ /////
+ await promiseUpdateSystemAddon(ADDON_ID, "2.0");
+ await checkAddon("2.0", BOOTSTRAP_REASONS.ADDON_UPGRADE);
+
+ /////
+ // Builtin system addon is changed, it has precedence because when this
+ // happens we remove all prior system addon upgrades.
+ /////
+ await AddonTestUtils.promiseShutdownManager();
+ await AddonTestUtils.overrideBuiltIns(builtInOverride);
+ await promiseInstallDefaultSystemAddon(ADDON_ID, "1.5");
+ await AddonTestUtils.promiseStartupManager("2");
+ await checkAddon(
+ "1.5",
+ BOOTSTRAP_REASONS.ADDON_DOWNGRADE,
+ BOOTSTRAP_REASONS.APP_STARTUP
+ );
+
+ // cleanup the system addon in the default location
+ await AddonTestUtils.manuallyUninstall(systemDefaults, ADDON_ID);
+ await AddonTestUtils.promiseRestartManager();
+
+ await AddonTestUtils.promiseShutdownManager();
+ BootstrapMonitor.clear(ADDON_ID);
+});
+
+add_task(async function test_builtin_addon_version_precedence() {
+ builtInOverride.system = [];
+
+ await AddonTestUtils.promiseStartupManager();
+ await Promise.all([
+ installBuiltinExtension({
+ manifest: {
+ version: "1.0",
+ applications: {
+ gecko: { id: ADDON_ID },
+ },
+ },
+ }),
+ AddonTestUtils.promiseWebExtensionStartup(ADDON_ID),
+ ]);
+ await checkAddon("1.0", BOOTSTRAP_REASONS.ADDON_INSTALL);
+
+ /////
+ // Upgrade to a system addon in the profile location, "app-system-addons"
+ /////
+ await promiseUpdateSystemAddon(ADDON_ID, "2.0");
+ await checkAddon("2.0", BOOTSTRAP_REASONS.ADDON_UPGRADE);
+
+ /////
+ // Builtin addon is changed, the system addon should still have precedence.
+ /////
+ await Promise.all([
+ installBuiltinExtension(
+ {
+ manifest: {
+ version: "1.5",
+ applications: {
+ gecko: { id: ADDON_ID },
+ },
+ },
+ },
+ false
+ ),
+ AddonTestUtils.promiseAddonEvent("onInstalled"),
+ ]);
+ await checkAddon("2.0", BOOTSTRAP_REASONS.ADDON_UPGRADE);
+
+ let addon = await AddonManager.getAddonByID(ADDON_ID);
+ await addon.uninstall();
+ await AddonTestUtils.promiseShutdownManager();
+ BootstrapMonitor.clear(ADDON_ID);
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_systemaddomstartupprefs.js b/toolkit/mozapps/extensions/test/xpcshell/test_systemaddomstartupprefs.js
new file mode 100644
index 0000000000..8b823b0390
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_systemaddomstartupprefs.js
@@ -0,0 +1,55 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// This verifies that system addon about:config prefs
+// are honored during startup/restarts/upgrades.
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "2");
+
+let distroDir = FileUtils.getDir("ProfD", ["sysfeatures", "empty"], true);
+registerDirectory("XREAppFeat", distroDir);
+
+AddonTestUtils.usePrivilegedSignatures = "system";
+
+add_task(initSystemAddonDirs);
+
+BootstrapMonitor.init();
+
+add_task(async function setup() {
+ let xpi = await getSystemAddonXPI(1, "1.0");
+ await AddonTestUtils.manuallyInstall(xpi, distroDir);
+});
+
+add_task(async function systemAddonPreffedOff() {
+ const id = "system1@tests.mozilla.org";
+ Services.prefs.setBoolPref("extensions.system1.enabled", false);
+
+ await overrideBuiltIns({ system: [id] });
+
+ await promiseStartupManager();
+
+ BootstrapMonitor.checkInstalled(id);
+ BootstrapMonitor.checkNotStarted(id);
+
+ await promiseRestartManager();
+
+ BootstrapMonitor.checkNotStarted(id);
+
+ await promiseShutdownManager(false);
+});
+
+add_task(async function systemAddonPreffedOn() {
+ const id = "system1@tests.mozilla.org";
+ Services.prefs.setBoolPref("extensions.system1.enabled", true);
+
+ await promiseStartupManager("2.0");
+
+ BootstrapMonitor.checkInstalled(id);
+ BootstrapMonitor.checkStarted(id);
+
+ await promiseRestartManager();
+
+ BootstrapMonitor.checkStarted(id);
+
+ await promiseShutdownManager();
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_temporary.js b/toolkit/mozapps/extensions/test/xpcshell/test_temporary.js
new file mode 100644
index 0000000000..4d4188ecd1
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_temporary.js
@@ -0,0 +1,774 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+const ID = "addon@tests.mozilla.org";
+
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "42");
+// Force sync plugin loading to avoid spurious install events from plugins.
+Services.prefs.setBoolPref("plugin.load_flash_only", false);
+// plugin.load_flash_only is only respected if xpc::IsInAutomation is true.
+// This is not the case by default in xpcshell tests, unless the following
+// pref is also set. Fixing this generically is bug 1598804
+Services.prefs.setBoolPref(
+ "security.turn_off_all_security_so_that_viruses_can_take_over_this_computer",
+ true
+);
+
+function waitForBootstrapEvent(expectedEvent, addonId) {
+ return new Promise(resolve => {
+ function listener(msg, { method, params, reason }) {
+ if (params.id === addonId && method === expectedEvent) {
+ resolve({ params, method, reason });
+ AddonTestUtils.off("bootstrap-method", listener);
+ } else {
+ info(`Ignoring bootstrap event: ${method} for ${params.id}`);
+ }
+ }
+ AddonTestUtils.on("bootstrap-method", listener);
+ });
+}
+
+async function checkEvent(promise, { reason, params }) {
+ let event = await promise;
+ info(`Checking bootstrap event ${event.method} for ${event.params.id}`);
+
+ equal(
+ event.reason,
+ reason,
+ `Expected bootstrap reason ${getReasonName(reason)} got ${getReasonName(
+ event.reason
+ )}`
+ );
+
+ for (let [param, value] of Object.entries(params)) {
+ equal(event.params[param], value, `Expected value for params.${param}`);
+ }
+}
+
+BootstrapMonitor.init();
+
+const XPIS = {};
+
+add_task(async function setup() {
+ for (let n of [1, 2]) {
+ XPIS[n] = await createTempWebExtensionFile({
+ manifest: {
+ name: "Test",
+ version: `${n}.0`,
+ applications: { gecko: { id: ID } },
+ },
+ });
+ }
+});
+
+// Install a temporary add-on with no existing add-on present.
+// Restart and make sure it has gone away.
+add_task(async function test_new_temporary() {
+ await promiseStartupManager();
+
+ let extInstallCalled = false;
+ AddonManager.addInstallListener({
+ onExternalInstall: aInstall => {
+ Assert.equal(aInstall.id, ID);
+ Assert.equal(aInstall.version, "1.0");
+ extInstallCalled = true;
+ },
+ });
+
+ let installingCalled = false;
+ let installedCalled = false;
+ AddonManager.addAddonListener({
+ onInstalling: aInstall => {
+ Assert.equal(aInstall.id, ID);
+ Assert.equal(aInstall.version, "1.0");
+ installingCalled = true;
+ },
+ onInstalled: aInstall => {
+ Assert.equal(aInstall.id, ID);
+ Assert.equal(aInstall.version, "1.0");
+ installedCalled = true;
+ },
+ onInstallStarted: aInstall => {
+ do_throw("onInstallStarted called unexpectedly");
+ },
+ });
+
+ await AddonManager.installTemporaryAddon(XPIS[1]);
+
+ Assert.ok(extInstallCalled);
+ Assert.ok(installingCalled);
+ Assert.ok(installedCalled);
+
+ const install = BootstrapMonitor.checkInstalled(ID, "1.0");
+ equal(install.reason, BOOTSTRAP_REASONS.ADDON_INSTALL);
+
+ BootstrapMonitor.checkStarted(ID, "1.0");
+
+ let info = BootstrapMonitor.started.get(ID);
+ Assert.equal(info.reason, BOOTSTRAP_REASONS.ADDON_INSTALL);
+
+ let addon = await promiseAddonByID(ID);
+
+ checkAddon(ID, addon, {
+ version: "1.0",
+ name: "Test",
+ isCompatible: true,
+ appDisabled: false,
+ isActive: true,
+ type: "extension",
+ signedState: AddonManager.SIGNEDSTATE_PRIVILEGED,
+ temporarilyInstalled: true,
+ });
+
+ let onShutdown = waitForBootstrapEvent("shutdown", ID);
+ let onUninstall = waitForBootstrapEvent("uninstall", ID);
+
+ await promiseRestartManager();
+
+ let shutdown = await onShutdown;
+ equal(shutdown.reason, BOOTSTRAP_REASONS.ADDON_UNINSTALL);
+
+ let uninstall = await onUninstall;
+ equal(uninstall.reason, BOOTSTRAP_REASONS.ADDON_UNINSTALL);
+
+ BootstrapMonitor.checkNotInstalled(ID);
+ BootstrapMonitor.checkNotStarted(ID);
+
+ addon = await promiseAddonByID(ID);
+ Assert.equal(addon, null);
+
+ await promiseRestartManager();
+});
+
+// Install a temporary add-on over the top of an existing add-on.
+// Restart and make sure the existing add-on comes back.
+add_task(async function test_replace_temporary() {
+ await promiseInstallFile(XPIS[2]);
+ let addon = await promiseAddonByID(ID);
+
+ BootstrapMonitor.checkInstalled(ID, "2.0");
+ BootstrapMonitor.checkStarted(ID, "2.0");
+
+ checkAddon(ID, addon, {
+ version: "2.0",
+ name: "Test",
+ isCompatible: true,
+ appDisabled: false,
+ isActive: true,
+ type: "extension",
+ signedState: AddonManager.SIGNEDSTATE_PRIVILEGED,
+ temporarilyInstalled: false,
+ });
+
+ let tempdir = gTmpD.clone();
+
+ for (let newversion of ["1.0", "3.0"]) {
+ for (let packed of [false, true]) {
+ // ugh, file locking issues with xpis on windows
+ if (packed && AppConstants.platform == "win") {
+ continue;
+ }
+
+ let files = ExtensionTestCommon.generateFiles({
+ manifest: {
+ name: "Test",
+ version: newversion,
+ applications: { gecko: { id: ID } },
+ },
+ });
+
+ let target = await AddonTestUtils.promiseWriteFilesToExtension(
+ tempdir.path,
+ ID,
+ files,
+ !packed
+ );
+
+ let onShutdown = waitForBootstrapEvent("shutdown", ID);
+ let onUpdate = waitForBootstrapEvent("update", ID);
+ let onStartup = waitForBootstrapEvent("startup", ID);
+
+ await AddonManager.installTemporaryAddon(target);
+
+ let reason =
+ Services.vc.compare(newversion, "2.0") < 0
+ ? BOOTSTRAP_REASONS.ADDON_DOWNGRADE
+ : BOOTSTRAP_REASONS.ADDON_UPGRADE;
+
+ await checkEvent(onShutdown, {
+ reason,
+ params: {
+ version: "2.0",
+ },
+ });
+
+ await checkEvent(onUpdate, {
+ reason,
+ params: {
+ version: newversion,
+ oldVersion: "2.0",
+ },
+ });
+
+ await checkEvent(onStartup, {
+ reason,
+ params: {
+ version: newversion,
+ oldVersion: "2.0",
+ },
+ });
+
+ addon = await promiseAddonByID(ID);
+
+ let signedState = packed
+ ? AddonManager.SIGNEDSTATE_PRIVILEGED
+ : AddonManager.SIGNEDSTATE_UNKNOWN;
+
+ // temporary add-on is installed and started
+ checkAddon(ID, addon, {
+ version: newversion,
+ name: "Test",
+ isCompatible: true,
+ appDisabled: false,
+ isActive: true,
+ type: "extension",
+ signedState,
+ temporarilyInstalled: true,
+ });
+
+ // Now restart, the temporary addon will go away which should
+ // be the opposite action (ie, if the temporary addon was an
+ // upgrade, then removing it is a downgrade and vice versa)
+ reason =
+ reason == BOOTSTRAP_REASONS.ADDON_UPGRADE
+ ? BOOTSTRAP_REASONS.ADDON_DOWNGRADE
+ : BOOTSTRAP_REASONS.ADDON_UPGRADE;
+
+ onShutdown = waitForBootstrapEvent("shutdown", ID);
+ onUpdate = waitForBootstrapEvent("update", ID);
+ onStartup = waitForBootstrapEvent("startup", ID);
+
+ await promiseRestartManager();
+
+ await checkEvent(onShutdown, {
+ reason,
+ params: {
+ version: newversion,
+ },
+ });
+
+ await checkEvent(onUpdate, {
+ reason,
+ params: {
+ version: "2.0",
+ oldVersion: newversion,
+ },
+ });
+
+ await checkEvent(onStartup, {
+ // We don't actually propagate the upgrade/downgrade reason across
+ // the browser restart when a temporary addon is removed. See
+ // bug 1359558 for detailed reasoning.
+ reason: BOOTSTRAP_REASONS.APP_STARTUP,
+ params: {
+ version: "2.0",
+ },
+ });
+
+ BootstrapMonitor.checkInstalled(ID, "2.0");
+ BootstrapMonitor.checkStarted(ID, "2.0");
+
+ addon = await promiseAddonByID(ID);
+
+ // existing add-on is back
+ checkAddon(ID, addon, {
+ version: "2.0",
+ name: "Test",
+ isCompatible: true,
+ appDisabled: false,
+ isActive: true,
+ type: "extension",
+ signedState: AddonManager.SIGNEDSTATE_PRIVILEGED,
+ temporarilyInstalled: false,
+ });
+
+ Services.obs.notifyObservers(target, "flush-cache-entry");
+ target.remove(true);
+ }
+ }
+
+ // remove original add-on
+ await addon.uninstall();
+
+ BootstrapMonitor.checkNotInstalled(ID);
+ BootstrapMonitor.checkNotStarted(ID);
+
+ await promiseRestartManager();
+});
+
+// Test that loading from the same path multiple times work
+add_task(async function test_samefile() {
+ // File locking issues on Windows, ugh
+ if (AppConstants.platform == "win") {
+ return;
+ }
+
+ // test that a webextension works
+ let webext = createTempWebExtensionFile({
+ manifest: {
+ version: "1.0",
+ name: "Test WebExtension 1 (temporary)",
+ applications: {
+ gecko: {
+ id: ID,
+ },
+ },
+ },
+ });
+
+ let addon = await AddonManager.installTemporaryAddon(webext);
+
+ // temporary add-on is installed and started
+ checkAddon(ID, addon, {
+ version: "1.0",
+ name: "Test WebExtension 1 (temporary)",
+ isCompatible: true,
+ appDisabled: false,
+ isActive: true,
+ type: "extension",
+ signedState: AddonManager.SIGNEDSTATE_PRIVILEGED,
+ temporarilyInstalled: true,
+ });
+
+ Services.obs.notifyObservers(webext, "flush-cache-entry");
+ webext.remove(false);
+ webext = createTempWebExtensionFile({
+ manifest: {
+ version: "2.0",
+ name: "Test WebExtension 1 (temporary)",
+ applications: {
+ gecko: {
+ id: ID,
+ },
+ },
+ },
+ });
+
+ addon = await AddonManager.installTemporaryAddon(webext);
+
+ // temporary add-on is installed and started
+ checkAddon(ID, addon, {
+ version: "2.0",
+ name: "Test WebExtension 1 (temporary)",
+ isCompatible: true,
+ appDisabled: false,
+ isActive: true,
+ type: "extension",
+ isWebExtension: true,
+ signedState: AddonManager.SIGNEDSTATE_PRIVILEGED,
+ temporarilyInstalled: true,
+ });
+
+ await addon.uninstall();
+});
+
+// Install a temporary add-on over the top of an existing add-on.
+// Uninstall it and make sure the existing add-on comes back.
+add_task(async function test_replace_permanent() {
+ await promiseInstallWebExtension({
+ manifest: {
+ applications: { gecko: { id: ID } },
+ version: "1.0",
+ name: "Test Bootstrap 1",
+ },
+ });
+
+ BootstrapMonitor.checkInstalled(ID, "1.0");
+ BootstrapMonitor.checkStarted(ID, "1.0");
+
+ let unpacked_addon = gTmpD.clone();
+ unpacked_addon.append(ID);
+
+ let files = ExtensionTestCommon.generateFiles({
+ manifest: {
+ applications: { gecko: { id: ID } },
+ version: "2.0",
+ name: "Test Bootstrap 1 (temporary)",
+ },
+ });
+ await AddonTestUtils.promiseWriteFilesToDir(unpacked_addon.path, files);
+
+ let extInstallCalled = false;
+ AddonManager.addInstallListener({
+ onExternalInstall: aInstall => {
+ Assert.equal(aInstall.id, ID);
+ Assert.equal(aInstall.version, "2.0");
+ extInstallCalled = true;
+ },
+ });
+
+ let installingCalled = false;
+ let installedCalled = false;
+ AddonManager.addAddonListener({
+ onInstalling: aInstall => {
+ Assert.equal(aInstall.id, ID);
+ if (!installingCalled) {
+ Assert.equal(aInstall.version, "2.0");
+ }
+ installingCalled = true;
+ },
+ onInstalled: aInstall => {
+ Assert.equal(aInstall.id, ID);
+ if (!installedCalled) {
+ Assert.equal(aInstall.version, "2.0");
+ }
+ installedCalled = true;
+ },
+ onInstallStarted: aInstall => {
+ do_throw("onInstallStarted called unexpectedly");
+ },
+ });
+
+ let addon = await AddonManager.installTemporaryAddon(unpacked_addon);
+
+ Assert.ok(extInstallCalled);
+ Assert.ok(installingCalled);
+ Assert.ok(installedCalled);
+
+ BootstrapMonitor.checkInstalled(ID);
+ BootstrapMonitor.checkStarted(ID);
+
+ // temporary add-on is installed and started
+ checkAddon(ID, addon, {
+ version: "2.0",
+ name: "Test Bootstrap 1 (temporary)",
+ isCompatible: true,
+ appDisabled: false,
+ isActive: true,
+ type: "extension",
+ signedState: AddonManager.SIGNEDSTATE_UNKNOWN,
+ temporarilyInstalled: true,
+ });
+
+ await addon.uninstall();
+
+ BootstrapMonitor.checkInstalled(ID);
+ BootstrapMonitor.checkStarted(ID);
+
+ addon = await promiseAddonByID(ID);
+
+ // existing add-on is back
+ checkAddon(ID, addon, {
+ version: "1.0",
+ name: "Test Bootstrap 1",
+ isCompatible: true,
+ appDisabled: false,
+ isActive: true,
+ type: "extension",
+ signedState: AddonManager.SIGNEDSTATE_PRIVILEGED,
+ temporarilyInstalled: false,
+ });
+
+ unpacked_addon.remove(true);
+ await addon.uninstall();
+
+ BootstrapMonitor.checkNotInstalled(ID);
+ BootstrapMonitor.checkNotStarted(ID);
+
+ await promiseRestartManager();
+});
+
+// Install a temporary add-on as a version upgrade over the top of an
+// existing temporary add-on.
+add_task(async function test_replace_temporary() {
+ const unpackedAddon = gTmpD.clone();
+ unpackedAddon.append(ID);
+
+ let files = ExtensionTestCommon.generateFiles({
+ manifest: {
+ applications: { gecko: { id: ID } },
+ version: "1.0",
+ },
+ });
+ await AddonTestUtils.promiseWriteFilesToDir(unpackedAddon.path, files);
+
+ await AddonManager.installTemporaryAddon(unpackedAddon);
+
+ // Increment the version number, re-install it, and make sure it
+ // gets marked as an upgrade.
+ files = ExtensionTestCommon.generateFiles({
+ manifest: {
+ applications: { gecko: { id: ID } },
+ version: "2.0",
+ },
+ });
+ await AddonTestUtils.promiseWriteFilesToDir(unpackedAddon.path, files);
+
+ const onShutdown = waitForBootstrapEvent("shutdown", ID);
+ const onUpdate = waitForBootstrapEvent("update", ID);
+ const onStartup = waitForBootstrapEvent("startup", ID);
+ await AddonManager.installTemporaryAddon(unpackedAddon);
+
+ await checkEvent(onShutdown, {
+ reason: BOOTSTRAP_REASONS.ADDON_UPGRADE,
+ params: {
+ version: "1.0",
+ },
+ });
+
+ await checkEvent(onUpdate, {
+ reason: BOOTSTRAP_REASONS.ADDON_UPGRADE,
+ params: {
+ version: "2.0",
+ oldVersion: "1.0",
+ },
+ });
+
+ await checkEvent(onStartup, {
+ reason: BOOTSTRAP_REASONS.ADDON_UPGRADE,
+ params: {
+ version: "2.0",
+ oldVersion: "1.0",
+ },
+ });
+
+ const addon = await promiseAddonByID(ID);
+ await addon.uninstall();
+
+ unpackedAddon.remove(true);
+ await promiseRestartManager();
+});
+
+// Install a temporary add-on as a version downgrade over the top of an
+// existing temporary add-on.
+add_task(async function test_replace_temporary_downgrade() {
+ const unpackedAddon = gTmpD.clone();
+ unpackedAddon.append(ID);
+
+ let files = ExtensionTestCommon.generateFiles({
+ manifest: {
+ applications: { gecko: { id: ID } },
+ version: "1.0",
+ },
+ });
+ await AddonTestUtils.promiseWriteFilesToDir(unpackedAddon.path, files);
+
+ await AddonManager.installTemporaryAddon(unpackedAddon);
+
+ // Decrement the version number, re-install, and make sure
+ // it gets marked as a downgrade.
+ files = ExtensionTestCommon.generateFiles({
+ manifest: {
+ applications: { gecko: { id: ID } },
+ version: "0.8",
+ },
+ });
+ await AddonTestUtils.promiseWriteFilesToDir(unpackedAddon.path, files);
+
+ const onShutdown = waitForBootstrapEvent("shutdown", ID);
+ const onUpdate = waitForBootstrapEvent("update", ID);
+ const onStartup = waitForBootstrapEvent("startup", ID);
+ await AddonManager.installTemporaryAddon(unpackedAddon);
+
+ await checkEvent(onShutdown, {
+ reason: BOOTSTRAP_REASONS.ADDON_DOWNGRADE,
+ params: {
+ version: "1.0",
+ },
+ });
+
+ await checkEvent(onUpdate, {
+ reason: BOOTSTRAP_REASONS.ADDON_DOWNGRADE,
+ params: {
+ oldVersion: "1.0",
+ version: "0.8",
+ },
+ });
+
+ await checkEvent(onStartup, {
+ reason: BOOTSTRAP_REASONS.ADDON_DOWNGRADE,
+ params: {
+ version: "0.8",
+ },
+ });
+
+ const addon = await promiseAddonByID(ID);
+ await addon.uninstall();
+
+ unpackedAddon.remove(true);
+ await promiseRestartManager();
+});
+
+// Installing a temporary add-on over an existing add-on with the same
+// version number should be installed as an upgrade.
+add_task(async function test_replace_same_version() {
+ const unpackedAddon = gTmpD.clone();
+ unpackedAddon.append(ID);
+
+ let files = ExtensionTestCommon.generateFiles({
+ manifest: {
+ applications: { gecko: { id: ID } },
+ version: "1.0",
+ },
+ });
+ await AddonTestUtils.promiseWriteFilesToDir(unpackedAddon.path, files);
+
+ const onInitialInstall = waitForBootstrapEvent("install", ID);
+ const onInitialStartup = waitForBootstrapEvent("startup", ID);
+ await AddonManager.installTemporaryAddon(unpackedAddon);
+
+ await checkEvent(onInitialInstall, {
+ reason: BOOTSTRAP_REASONS.ADDON_INSTALL,
+ params: {
+ version: "1.0",
+ },
+ });
+
+ await checkEvent(onInitialStartup, {
+ reason: BOOTSTRAP_REASONS.ADDON_INSTALL,
+ params: {
+ version: "1.0",
+ },
+ });
+
+ let info = BootstrapMonitor.started.get(ID);
+ Assert.equal(info.reason, BOOTSTRAP_REASONS.ADDON_INSTALL);
+
+ // Install it again.
+ const onShutdown = waitForBootstrapEvent("shutdown", ID);
+ const onUpdate = waitForBootstrapEvent("update", ID);
+ const onStartup = waitForBootstrapEvent("startup", ID);
+ await AddonManager.installTemporaryAddon(unpackedAddon);
+
+ await checkEvent(onShutdown, {
+ reason: BOOTSTRAP_REASONS.ADDON_UPGRADE,
+ params: {
+ version: "1.0",
+ },
+ });
+
+ await checkEvent(onUpdate, {
+ reason: BOOTSTRAP_REASONS.ADDON_UPGRADE,
+ params: {
+ oldVersion: "1.0",
+ version: "1.0",
+ },
+ });
+
+ await checkEvent(onStartup, {
+ reason: BOOTSTRAP_REASONS.ADDON_UPGRADE,
+ params: {
+ version: "1.0",
+ },
+ });
+
+ const addon = await promiseAddonByID(ID);
+ await addon.uninstall();
+
+ unpackedAddon.remove(true);
+ await promiseRestartManager();
+});
+
+// Install a temporary add-on over the top of an existing disabled add-on.
+// After restart, the existing add-on should continue to be installed and disabled.
+add_task(async function test_replace_permanent_disabled() {
+ await promiseInstallFile(XPIS[1]);
+ let addon = await promiseAddonByID(ID);
+
+ BootstrapMonitor.checkInstalled(ID, "1.0");
+ BootstrapMonitor.checkStarted(ID, "1.0");
+
+ await addon.disable();
+
+ BootstrapMonitor.checkInstalled(ID, "1.0");
+ BootstrapMonitor.checkNotStarted(ID);
+
+ let unpacked_addon = gTmpD.clone();
+ unpacked_addon.append(ID);
+
+ let files = ExtensionTestCommon.generateFiles({
+ manifest: {
+ applications: { gecko: { id: ID } },
+ name: "Test",
+ version: "2.0",
+ },
+ });
+ await AddonTestUtils.promiseWriteFilesToDir(unpacked_addon.path, files);
+
+ let extInstallCalled = false;
+ AddonManager.addInstallListener({
+ onExternalInstall: aInstall => {
+ Assert.equal(aInstall.id, ID);
+ Assert.equal(aInstall.version, "2.0");
+ extInstallCalled = true;
+ },
+ });
+
+ let tempAddon = await AddonManager.installTemporaryAddon(unpacked_addon);
+
+ Assert.ok(extInstallCalled);
+
+ BootstrapMonitor.checkInstalled(ID, "2.0");
+ BootstrapMonitor.checkStarted(ID);
+
+ // temporary add-on is installed and started
+ checkAddon(ID, tempAddon, {
+ version: "2.0",
+ name: "Test",
+ isCompatible: true,
+ appDisabled: false,
+ isActive: true,
+ type: "extension",
+ signedState: AddonManager.SIGNEDSTATE_UNKNOWN,
+ temporarilyInstalled: true,
+ });
+
+ await tempAddon.uninstall();
+ unpacked_addon.remove(true);
+
+ await addon.enable();
+ await new Promise(executeSoon);
+ addon = await promiseAddonByID(ID);
+
+ BootstrapMonitor.checkInstalled(ID, "1.0");
+ BootstrapMonitor.checkStarted(ID);
+
+ // existing add-on is back
+ checkAddon(ID, addon, {
+ version: "1.0",
+ name: "Test",
+ isCompatible: true,
+ appDisabled: false,
+ isActive: true,
+ type: "extension",
+ signedState: AddonManager.SIGNEDSTATE_PRIVILEGED,
+ temporarilyInstalled: false,
+ });
+
+ await addon.uninstall();
+
+ BootstrapMonitor.checkNotInstalled(ID);
+ BootstrapMonitor.checkNotStarted(ID);
+
+ await promiseRestartManager();
+});
+
+// Tests that XPIs with a .zip extension work when loaded temporarily.
+add_task(async function test_zip_extension() {
+ let xpi = createTempWebExtensionFile({
+ background() {
+ /* globals browser */
+ browser.test.sendMessage("started", "Hello.");
+ },
+ });
+ xpi.moveTo(null, xpi.leafName.replace(/\.xpi$/, ".zip"));
+
+ let extension = ExtensionTestUtils.loadExtensionXPI(xpi);
+ await extension.startup();
+
+ let msg = await extension.awaitMessage("started");
+ equal(msg, "Hello.", "Got expected background script message");
+
+ await extension.unload();
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_trash_directory.js b/toolkit/mozapps/extensions/test/xpcshell/test_trash_directory.js
new file mode 100644
index 0000000000..2ed3de503e
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_trash_directory.js
@@ -0,0 +1,39 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// Test that an open file inside the trash directory does not cause
+// unrelated installs to break (see bug 1180901 for more background).
+add_task(async function test() {
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1.9.2");
+ await promiseStartupManager();
+
+ let profileDir = OS.Constants.Path.profileDir;
+ let trashDir = OS.Path.join(profileDir, "extensions", "trash");
+ let testFile = OS.Path.join(trashDir, "test.txt");
+
+ await OS.File.makeDir(trashDir, {
+ from: profileDir,
+ ignoreExisting: true,
+ });
+
+ let trashDirExists = await OS.File.exists(trashDir);
+ ok(trashDirExists, "trash directory should have been created");
+
+ let file = await OS.File.open(testFile, { create: true }, { winShare: 0 });
+ let fileExists = await OS.File.exists(testFile);
+ ok(fileExists, "test.txt should have been created in " + trashDir);
+
+ await promiseInstallWebExtension({});
+
+ // The testFile should still exist at this point because we have not
+ // yet closed the file handle and as a result, Windows cannot remove it.
+ fileExists = await OS.File.exists(testFile);
+ ok(fileExists, "test.txt should still exist");
+
+ // Cleanup
+ await promiseShutdownManager();
+ await file.close();
+ await OS.File.remove(testFile);
+ await OS.File.removeDir(trashDir);
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_types.js b/toolkit/mozapps/extensions/test/xpcshell/test_types.js
new file mode 100644
index 0000000000..c4c30a4a58
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_types.js
@@ -0,0 +1,67 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// This verifies that custom types can be defined and undefined
+
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1.9.2");
+
+add_task(async function setup() {
+ await promiseStartupManager();
+
+ Assert.equal(false, "test" in AddonManager.addonTypes);
+ let types = AddonManager.addonTypes;
+
+ // The dumbest provider possible
+ var provider = {};
+
+ var expectedAdd = "test";
+ var expectedRemove = null;
+
+ AddonManager.addTypeListener({
+ onTypeAdded(aType) {
+ Assert.equal(aType.id, expectedAdd);
+ expectedAdd = null;
+ },
+
+ onTypeRemoved(aType) {
+ Assert.equal(aType.id, expectedRemove);
+ expectedRemove = null;
+ },
+ });
+
+ AddonManagerPrivate.registerProvider(provider, [
+ {
+ id: "test",
+ name: "Test",
+ uiPriority: 1,
+ },
+ {
+ id: "t$e%st",
+ name: "Test",
+ uiPriority: 1,
+ },
+ ]);
+
+ Assert.equal(expectedAdd, null);
+
+ Assert.ok("test" in types);
+ Assert.equal(types.test.name, "Test");
+ Assert.equal(false, "t$e%st" in types);
+
+ delete types.test;
+ Assert.ok("test" in types);
+
+ types.foo = "bar";
+ Assert.equal(false, "foo" in types);
+
+ expectedRemove = "test";
+
+ AddonManagerPrivate.unregisterProvider(provider);
+
+ Assert.equal(expectedRemove, null);
+
+ Assert.equal(false, "test" in AddonManager.addonTypes);
+ // The cached reference to addonTypes is live
+ Assert.equal(false, "test" in types);
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_undouninstall.js b/toolkit/mozapps/extensions/test/xpcshell/test_undouninstall.js
new file mode 100644
index 0000000000..5751d0788c
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_undouninstall.js
@@ -0,0 +1,584 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// This verifies that forcing undo for uninstall works
+
+const APP_STARTUP = 1;
+const APP_SHUTDOWN = 2;
+const ADDON_DISABLE = 4;
+const ADDON_INSTALL = 5;
+const ADDON_UNINSTALL = 6;
+const ADDON_UPGRADE = 7;
+
+const ID = "undouninstall1@tests.mozilla.org";
+const INCOMPAT_ID = "incompatible@tests.mozilla.org";
+
+const profileDir = gProfD.clone();
+profileDir.append("extensions");
+
+const ADDONS = {
+ test_undoincompatible: {
+ manifest: {
+ name: "Incompatible Addon",
+ applications: {
+ gecko: {
+ id: "incompatible@tests.mozilla.org",
+ strict_min_version: "2",
+ strict_max_version: "2",
+ },
+ },
+ },
+ },
+ test_undouninstall1: {
+ manifest: {
+ name: "Test Bootstrap 1",
+ applications: {
+ gecko: {
+ id: "undouninstall1@tests.mozilla.org",
+ },
+ },
+ },
+ },
+};
+
+const XPIS = {};
+
+BootstrapMonitor.init();
+
+function getStartupReason(id) {
+ let info = BootstrapMonitor.started.get(id);
+ return info ? info.reason : undefined;
+}
+
+function getShutdownReason(id) {
+ let info = BootstrapMonitor.stopped.get(id);
+ return info ? info.reason : undefined;
+}
+
+function getInstallReason(id) {
+ let info = BootstrapMonitor.installed.get(id);
+ return info ? info.reason : undefined;
+}
+
+function getUninstallReason(id) {
+ let info = BootstrapMonitor.uninstalled.get(id);
+ return info ? info.reason : undefined;
+}
+
+function getShutdownNewVersion(id) {
+ let info = BootstrapMonitor.stopped.get(id);
+ return info ? info.params.newVersion : undefined;
+}
+
+// Sets up the profile by installing an add-on.
+add_task(async function setup() {
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1.9.2");
+
+ await promiseStartupManager();
+ registerCleanupFunction(promiseShutdownManager);
+
+ for (let [name, files] of Object.entries(ADDONS)) {
+ XPIS[name] = await AddonTestUtils.createTempWebExtensionFile(files);
+ }
+});
+
+// Tests that an enabled restartless add-on can be uninstalled and goes away
+// when the uninstall is committed
+add_task(async function uninstallRestartless() {
+ await promiseInstallFile(XPIS.test_undouninstall1);
+
+ let a1 = await promiseAddonByID(ID);
+
+ Assert.notEqual(a1, null);
+ BootstrapMonitor.checkInstalled(ID, "1.0");
+ BootstrapMonitor.checkStarted(ID, "1.0");
+ Assert.equal(getInstallReason(ID), ADDON_INSTALL);
+ Assert.equal(getStartupReason(ID), ADDON_INSTALL);
+ Assert.equal(a1.pendingOperations, AddonManager.PENDING_NONE);
+ Assert.ok(a1.isActive);
+ Assert.ok(!a1.userDisabled);
+
+ await a1.uninstall(true);
+
+ a1 = await promiseAddonByID(ID);
+
+ Assert.notEqual(a1, null);
+ BootstrapMonitor.checkInstalled(ID);
+ BootstrapMonitor.checkNotStarted(ID);
+ Assert.equal(getShutdownReason(ID), ADDON_UNINSTALL);
+ Assert.ok(hasFlag(AddonManager.PENDING_UNINSTALL, a1.pendingOperations));
+ Assert.ok(!a1.isActive);
+ Assert.ok(!a1.userDisabled);
+
+ await a1.uninstall();
+
+ a1 = await promiseAddonByID(ID);
+
+ Assert.equal(a1, null);
+ BootstrapMonitor.checkNotStarted(ID);
+});
+
+// Tests that an enabled restartless add-on can be uninstalled and then cancelled
+add_task(async function cancelUninstallOfRestartless() {
+ await promiseInstallFile(XPIS.test_undouninstall1);
+ let a1 = await promiseAddonByID(ID);
+
+ Assert.notEqual(a1, null);
+ BootstrapMonitor.checkInstalled(ID, "1.0");
+ BootstrapMonitor.checkStarted(ID, "1.0");
+ Assert.equal(getInstallReason(ID), ADDON_INSTALL);
+ Assert.equal(getStartupReason(ID), ADDON_INSTALL);
+ Assert.equal(a1.pendingOperations, AddonManager.PENDING_NONE);
+ Assert.ok(a1.isActive);
+ Assert.ok(!a1.userDisabled);
+
+ await expectEvents(
+ {
+ addonEvents: {
+ "undouninstall1@tests.mozilla.org": [{ event: "onUninstalling" }],
+ },
+ },
+ () => a1.uninstall(true)
+ );
+
+ a1 = await promiseAddonByID("undouninstall1@tests.mozilla.org");
+
+ Assert.notEqual(a1, null);
+ BootstrapMonitor.checkInstalled(ID);
+ BootstrapMonitor.checkNotStarted(ID);
+ Assert.equal(getShutdownReason(ID), ADDON_UNINSTALL);
+ Assert.ok(hasFlag(AddonManager.PENDING_UNINSTALL, a1.pendingOperations));
+ Assert.ok(!a1.isActive);
+ Assert.ok(!a1.userDisabled);
+
+ let promises = [
+ promiseAddonEvent("onOperationCancelled"),
+ promiseWebExtensionStartup(ID),
+ ];
+ a1.cancelUninstall();
+ await Promise.all(promises);
+
+ BootstrapMonitor.checkInstalled(ID, "1.0");
+ BootstrapMonitor.checkStarted(ID, "1.0");
+ Assert.equal(getStartupReason(ID), ADDON_INSTALL);
+ Assert.equal(a1.pendingOperations, AddonManager.PENDING_NONE);
+ Assert.ok(a1.isActive);
+ Assert.ok(!a1.userDisabled);
+
+ await promiseShutdownManager();
+
+ Assert.equal(getShutdownReason(ID), APP_SHUTDOWN);
+ Assert.equal(getShutdownNewVersion(ID), undefined);
+
+ await promiseStartupManager();
+
+ a1 = await promiseAddonByID("undouninstall1@tests.mozilla.org");
+
+ Assert.notEqual(a1, null);
+ BootstrapMonitor.checkStarted(ID, "1.0");
+ Assert.equal(getStartupReason(ID), APP_STARTUP);
+ Assert.equal(a1.pendingOperations, AddonManager.PENDING_NONE);
+ Assert.ok(a1.isActive);
+ Assert.ok(!a1.userDisabled);
+
+ await a1.uninstall();
+});
+
+// Tests that reinstalling an enabled restartless add-on waiting to be
+// uninstalled aborts the uninstall and leaves the add-on enabled
+add_task(async function reinstallAddonAwaitingUninstall() {
+ await promiseInstallFile(XPIS.test_undouninstall1);
+
+ let a1 = await promiseAddonByID("undouninstall1@tests.mozilla.org");
+
+ Assert.notEqual(a1, null);
+ BootstrapMonitor.checkInstalled(ID, "1.0");
+ BootstrapMonitor.checkStarted(ID, "1.0");
+ Assert.equal(getInstallReason(ID), ADDON_INSTALL);
+ Assert.equal(getStartupReason(ID), ADDON_INSTALL);
+ Assert.equal(a1.pendingOperations, AddonManager.PENDING_NONE);
+ Assert.ok(a1.isActive);
+ Assert.ok(!a1.userDisabled);
+
+ await expectEvents(
+ {
+ addonEvents: {
+ "undouninstall1@tests.mozilla.org": [{ event: "onUninstalling" }],
+ },
+ },
+ () => a1.uninstall(true)
+ );
+
+ a1 = await promiseAddonByID("undouninstall1@tests.mozilla.org");
+
+ Assert.notEqual(a1, null);
+ BootstrapMonitor.checkInstalled(ID);
+ BootstrapMonitor.checkNotStarted(ID);
+ Assert.equal(getShutdownReason(ID), ADDON_UNINSTALL);
+ Assert.ok(hasFlag(AddonManager.PENDING_UNINSTALL, a1.pendingOperations));
+ Assert.ok(!a1.isActive);
+ Assert.ok(!a1.userDisabled);
+
+ await expectEvents(
+ {
+ addonEvents: {
+ "undouninstall1@tests.mozilla.org": [
+ { event: "onInstalling" },
+ { event: "onInstalled" },
+ ],
+ },
+ installEvents: [
+ { event: "onNewInstall" },
+ { event: "onInstallStarted" },
+ { event: "onInstallEnded" },
+ ],
+ },
+ () => promiseInstallFile(XPIS.test_undouninstall1)
+ );
+
+ a1 = await promiseAddonByID("undouninstall1@tests.mozilla.org");
+
+ BootstrapMonitor.checkInstalled(ID, "1.0");
+ BootstrapMonitor.checkStarted(ID, "1.0");
+ Assert.equal(getInstallReason(ID), ADDON_UPGRADE);
+ Assert.equal(getStartupReason(ID), ADDON_UPGRADE);
+ Assert.equal(a1.pendingOperations, AddonManager.PENDING_NONE);
+ Assert.ok(a1.isActive);
+ Assert.ok(!a1.userDisabled);
+
+ await promiseShutdownManager();
+
+ Assert.equal(getShutdownReason(ID), APP_SHUTDOWN);
+
+ await promiseStartupManager();
+
+ a1 = await promiseAddonByID("undouninstall1@tests.mozilla.org");
+
+ Assert.notEqual(a1, null);
+ BootstrapMonitor.checkStarted(ID, "1.0");
+ Assert.equal(getStartupReason(ID), APP_STARTUP);
+ Assert.equal(a1.pendingOperations, AddonManager.PENDING_NONE);
+ Assert.ok(a1.isActive);
+ Assert.ok(!a1.userDisabled);
+
+ await a1.uninstall();
+});
+
+// Tests that a disabled restartless add-on can be uninstalled and goes away
+// when the uninstall is committed
+add_task(async function uninstallDisabledRestartless() {
+ await promiseInstallFile(XPIS.test_undouninstall1);
+
+ let a1 = await promiseAddonByID("undouninstall1@tests.mozilla.org");
+
+ Assert.notEqual(a1, null);
+ BootstrapMonitor.checkInstalled(ID, "1.0");
+ BootstrapMonitor.checkStarted(ID, "1.0");
+ Assert.equal(getInstallReason(ID), ADDON_INSTALL);
+ Assert.equal(getStartupReason(ID), ADDON_INSTALL);
+ Assert.equal(a1.pendingOperations, AddonManager.PENDING_NONE);
+ Assert.ok(a1.isActive);
+ Assert.ok(!a1.userDisabled);
+
+ await a1.disable();
+ BootstrapMonitor.checkNotStarted(ID);
+ Assert.equal(getShutdownReason(ID), ADDON_DISABLE);
+ Assert.equal(a1.pendingOperations, AddonManager.PENDING_NONE);
+ Assert.ok(!a1.isActive);
+ Assert.ok(a1.userDisabled);
+
+ await expectEvents(
+ {
+ addonEvents: {
+ "undouninstall1@tests.mozilla.org": [{ event: "onUninstalling" }],
+ },
+ },
+ () => a1.uninstall(true)
+ );
+
+ a1 = await promiseAddonByID("undouninstall1@tests.mozilla.org");
+
+ Assert.notEqual(a1, null);
+ BootstrapMonitor.checkNotStarted(ID);
+ Assert.ok(hasFlag(AddonManager.PENDING_UNINSTALL, a1.pendingOperations));
+ Assert.ok(!a1.isActive);
+ Assert.ok(a1.userDisabled);
+
+ // commit the uninstall
+ await expectEvents(
+ {
+ addonEvents: {
+ "undouninstall1@tests.mozilla.org": [{ event: "onUninstalled" }],
+ },
+ },
+ () => a1.uninstall()
+ );
+
+ a1 = await promiseAddonByID("undouninstall1@tests.mozilla.org");
+
+ Assert.equal(a1, null);
+ BootstrapMonitor.checkNotStarted(ID);
+ BootstrapMonitor.checkNotInstalled(ID);
+ Assert.equal(getUninstallReason(ID), ADDON_UNINSTALL);
+});
+
+// Tests that a disabled restartless add-on can be uninstalled and then cancelled
+add_task(async function cancelUninstallDisabledRestartless() {
+ await expectEvents(
+ {
+ addonEvents: {
+ "undouninstall1@tests.mozilla.org": [
+ { event: "onInstalling" },
+ { event: "onInstalled" },
+ ],
+ },
+ installEvents: [
+ { event: "onNewInstall" },
+ { event: "onInstallStarted" },
+ { event: "onInstallEnded" },
+ ],
+ },
+ () => promiseInstallFile(XPIS.test_undouninstall1)
+ );
+
+ let a1 = await promiseAddonByID("undouninstall1@tests.mozilla.org");
+
+ Assert.notEqual(a1, null);
+ BootstrapMonitor.checkInstalled(ID, "1.0");
+ BootstrapMonitor.checkStarted(ID, "1.0");
+ Assert.equal(getInstallReason(ID), ADDON_INSTALL);
+ Assert.equal(getStartupReason(ID), ADDON_INSTALL);
+ Assert.equal(a1.pendingOperations, AddonManager.PENDING_NONE);
+ Assert.ok(a1.isActive);
+ Assert.ok(!a1.userDisabled);
+
+ await expectEvents(
+ {
+ addonEvents: {
+ "undouninstall1@tests.mozilla.org": [
+ { event: "onDisabling" },
+ { event: "onDisabled" },
+ ],
+ },
+ },
+ () => a1.disable()
+ );
+
+ BootstrapMonitor.checkNotStarted(ID);
+ Assert.equal(getShutdownReason(ID), ADDON_DISABLE);
+ Assert.equal(a1.pendingOperations, AddonManager.PENDING_NONE);
+ Assert.ok(!a1.isActive);
+ Assert.ok(a1.userDisabled);
+
+ await expectEvents(
+ {
+ addonEvents: {
+ "undouninstall1@tests.mozilla.org": [{ event: "onUninstalling" }],
+ },
+ },
+ () => a1.uninstall(true)
+ );
+
+ a1 = await promiseAddonByID("undouninstall1@tests.mozilla.org");
+
+ Assert.notEqual(a1, null);
+ BootstrapMonitor.checkNotStarted(ID);
+ BootstrapMonitor.checkInstalled(ID);
+ Assert.ok(hasFlag(AddonManager.PENDING_UNINSTALL, a1.pendingOperations));
+ Assert.ok(!a1.isActive);
+ Assert.ok(a1.userDisabled);
+
+ await expectEvents(
+ {
+ addonEvents: {
+ "undouninstall1@tests.mozilla.org": [{ event: "onOperationCancelled" }],
+ },
+ },
+ async () => {
+ a1.cancelUninstall();
+ }
+ );
+
+ BootstrapMonitor.checkNotStarted(ID);
+ BootstrapMonitor.checkInstalled(ID);
+ Assert.equal(a1.pendingOperations, AddonManager.PENDING_NONE);
+ Assert.ok(!a1.isActive);
+ Assert.ok(a1.userDisabled);
+
+ await promiseRestartManager();
+
+ a1 = await promiseAddonByID("undouninstall1@tests.mozilla.org");
+
+ Assert.notEqual(a1, null);
+ BootstrapMonitor.checkNotStarted(ID);
+ BootstrapMonitor.checkInstalled(ID);
+ Assert.equal(a1.pendingOperations, AddonManager.PENDING_NONE);
+ Assert.ok(!a1.isActive);
+ Assert.ok(a1.userDisabled);
+
+ await a1.uninstall();
+});
+
+// Tests that reinstalling a disabled restartless add-on waiting to be
+// uninstalled aborts the uninstall and leaves the add-on disabled
+add_task(async function reinstallDisabledAddonAwaitingUninstall() {
+ await promiseInstallFile(XPIS.test_undouninstall1);
+
+ let a1 = await promiseAddonByID("undouninstall1@tests.mozilla.org");
+
+ Assert.notEqual(a1, null);
+ BootstrapMonitor.checkInstalled(ID, "1.0");
+ BootstrapMonitor.checkStarted(ID, "1.0");
+ Assert.equal(getInstallReason(ID), ADDON_INSTALL);
+ Assert.equal(getStartupReason(ID), ADDON_INSTALL);
+ Assert.equal(a1.pendingOperations, AddonManager.PENDING_NONE);
+ Assert.ok(a1.isActive);
+ Assert.ok(!a1.userDisabled);
+
+ await a1.disable();
+ BootstrapMonitor.checkNotStarted(ID);
+ Assert.equal(getShutdownReason(ID), ADDON_DISABLE);
+ Assert.equal(a1.pendingOperations, AddonManager.PENDING_NONE);
+ Assert.ok(!a1.isActive);
+ Assert.ok(a1.userDisabled);
+
+ await expectEvents(
+ {
+ addonEvents: {
+ "undouninstall1@tests.mozilla.org": [{ event: "onUninstalling" }],
+ },
+ },
+ () => a1.uninstall(true)
+ );
+
+ a1 = await promiseAddonByID("undouninstall1@tests.mozilla.org");
+
+ Assert.notEqual(a1, null);
+ BootstrapMonitor.checkNotStarted(ID);
+ Assert.ok(hasFlag(AddonManager.PENDING_UNINSTALL, a1.pendingOperations));
+ Assert.ok(!a1.isActive);
+ Assert.ok(a1.userDisabled);
+
+ await expectEvents(
+ {
+ addonEvents: {
+ "undouninstall1@tests.mozilla.org": [
+ { event: "onInstalling" },
+ { event: "onInstalled" },
+ ],
+ },
+ installEvents: [
+ { event: "onNewInstall" },
+ { event: "onInstallStarted" },
+ { event: "onInstallEnded" },
+ ],
+ },
+ () => promiseInstallFile(XPIS.test_undouninstall1)
+ );
+
+ a1 = await promiseAddonByID("undouninstall1@tests.mozilla.org");
+
+ BootstrapMonitor.checkInstalled(ID, "1.0");
+ BootstrapMonitor.checkNotStarted(ID, "1.0");
+ Assert.equal(getInstallReason(ID), ADDON_UPGRADE);
+ Assert.equal(a1.pendingOperations, AddonManager.PENDING_NONE);
+ Assert.ok(!a1.isActive);
+ Assert.ok(a1.userDisabled);
+
+ await promiseRestartManager();
+
+ a1 = await promiseAddonByID("undouninstall1@tests.mozilla.org");
+
+ Assert.notEqual(a1, null);
+ BootstrapMonitor.checkNotStarted(ID, "1.0");
+ Assert.equal(a1.pendingOperations, AddonManager.PENDING_NONE);
+ Assert.ok(!a1.isActive);
+ Assert.ok(a1.userDisabled);
+
+ await a1.uninstall();
+});
+
+// Test that uninstalling a temporary addon can be canceled
+add_task(async function cancelUninstallTemporary() {
+ await AddonManager.installTemporaryAddon(XPIS.test_undouninstall1);
+
+ let a1 = await promiseAddonByID("undouninstall1@tests.mozilla.org");
+ Assert.notEqual(a1, null);
+ BootstrapMonitor.checkInstalled(ID, "1.0");
+ BootstrapMonitor.checkStarted(ID, "1.0");
+ Assert.equal(getInstallReason(ID), ADDON_INSTALL);
+ Assert.equal(getStartupReason(ID), ADDON_INSTALL);
+ Assert.equal(a1.pendingOperations, AddonManager.PENDING_NONE);
+ Assert.ok(a1.isActive);
+ Assert.ok(!a1.userDisabled);
+
+ await expectEvents(
+ {
+ addonEvents: {
+ "undouninstall1@tests.mozilla.org": [{ event: "onUninstalling" }],
+ },
+ },
+ () => a1.uninstall(true)
+ );
+
+ BootstrapMonitor.checkNotStarted(ID, "1.0");
+ Assert.ok(hasFlag(AddonManager.PENDING_UNINSTALL, a1.pendingOperations));
+
+ let promises = [
+ promiseAddonEvent("onOperationCancelled"),
+ promiseWebExtensionStartup("undouninstall1@tests.mozilla.org"),
+ ];
+ a1.cancelUninstall();
+ await Promise.all(promises);
+
+ a1 = await promiseAddonByID("undouninstall1@tests.mozilla.org");
+
+ Assert.notEqual(a1, null);
+ BootstrapMonitor.checkStarted(ID, "1.0");
+ Assert.equal(a1.pendingOperations, 0);
+
+ await promiseRestartManager();
+});
+
+// Tests that cancelling the uninstall of an incompatible restartless addon
+// does not start the addon
+add_task(async function cancelUninstallIncompatibleRestartless() {
+ await promiseInstallFile(XPIS.test_undoincompatible);
+
+ let a1 = await promiseAddonByID(INCOMPAT_ID);
+ Assert.notEqual(a1, null);
+ BootstrapMonitor.checkNotStarted(INCOMPAT_ID);
+ Assert.ok(!a1.isActive);
+
+ await expectEvents(
+ {
+ addonEvents: {
+ "incompatible@tests.mozilla.org": [{ event: "onUninstalling" }],
+ },
+ },
+ () => a1.uninstall(true)
+ );
+
+ a1 = await promiseAddonByID(INCOMPAT_ID);
+ Assert.notEqual(a1, null);
+ Assert.ok(hasFlag(AddonManager.PENDING_UNINSTALL, a1.pendingOperations));
+ Assert.ok(!a1.isActive);
+
+ await expectEvents(
+ {
+ addonEvents: {
+ "incompatible@tests.mozilla.org": [{ event: "onOperationCancelled" }],
+ },
+ },
+ async () => {
+ a1.cancelUninstall();
+ }
+ );
+
+ a1 = await promiseAddonByID(INCOMPAT_ID);
+ Assert.notEqual(a1, null);
+ BootstrapMonitor.checkNotStarted(INCOMPAT_ID);
+ Assert.equal(a1.pendingOperations, 0);
+ Assert.ok(!a1.isActive);
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_update.js b/toolkit/mozapps/extensions/test/xpcshell/test_update.js
new file mode 100644
index 0000000000..db2f8bd6dc
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_update.js
@@ -0,0 +1,852 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// This verifies that add-on update checks work
+
+// The test extension uses an insecure update url.
+Services.prefs.setBoolPref(PREF_EM_CHECK_UPDATE_SECURITY, false);
+
+const updateFile = "test_update.json";
+
+const profileDir = gProfD.clone();
+profileDir.append("extensions");
+
+const ADDONS = {
+ test_update: {
+ id: "addon1@tests.mozilla.org",
+ version: "2.0",
+ name: "Test 1",
+ },
+ test_update8: {
+ id: "addon8@tests.mozilla.org",
+ version: "2.0",
+ name: "Test 8",
+ },
+ test_update12: {
+ id: "addon12@tests.mozilla.org",
+ version: "2.0",
+ name: "Test 12",
+ },
+ test_install2_1: {
+ id: "addon2@tests.mozilla.org",
+ version: "2.0",
+ name: "Real Test 2",
+ },
+ test_install2_2: {
+ id: "addon2@tests.mozilla.org",
+ version: "3.0",
+ name: "Real Test 3",
+ },
+};
+
+var testserver = createHttpServer({ hosts: ["example.com"] });
+testserver.registerDirectory("/data/", do_get_file("data"));
+
+const XPIS = {};
+
+add_task(async function setup() {
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1");
+
+ Services.locale.requestedLocales = ["fr-FR"];
+
+ for (let [name, info] of Object.entries(ADDONS)) {
+ XPIS[name] = createTempWebExtensionFile({
+ manifest: {
+ name: info.name,
+ version: info.version,
+ applications: { gecko: { id: info.id } },
+ },
+ });
+ testserver.registerFile(`/addons/${name}.xpi`, XPIS[name]);
+ }
+
+ AddonTestUtils.updateReason = AddonManager.UPDATE_WHEN_USER_REQUESTED;
+
+ await promiseStartupManager();
+});
+
+// Verify that an update is available and can be installed.
+add_task(async function test_apply_update() {
+ await promiseInstallWebExtension({
+ manifest: {
+ name: "Test Addon 1",
+ version: "1.0",
+ applications: {
+ gecko: {
+ id: "addon1@tests.mozilla.org",
+ update_url: `http://example.com/data/${updateFile}`,
+ },
+ },
+ },
+ });
+
+ let a1 = await AddonManager.getAddonByID("addon1@tests.mozilla.org");
+ notEqual(a1, null);
+ equal(a1.version, "1.0");
+ equal(a1.applyBackgroundUpdates, AddonManager.AUTOUPDATE_DEFAULT);
+ equal(a1.releaseNotesURI, null);
+ notEqual(a1.syncGUID, null);
+
+ let originalSyncGUID = a1.syncGUID;
+
+ await expectEvents(
+ {
+ ignorePlugins: true,
+ addonEvents: {
+ "addon1@tests.mozilla.org": [
+ {
+ event: "onPropertyChanged",
+ properties: ["applyBackgroundUpdates"],
+ },
+ ],
+ },
+ },
+ async () => {
+ a1.applyBackgroundUpdates = AddonManager.AUTOUPDATE_DISABLE;
+ }
+ );
+
+ a1.applyBackgroundUpdates = AddonManager.AUTOUPDATE_DISABLE;
+
+ let install;
+ await expectEvents(
+ {
+ ignorePlugins: true,
+ installEvents: [{ event: "onNewInstall" }],
+ },
+ async () => {
+ ({
+ updateAvailable: install,
+ } = await AddonTestUtils.promiseFindAddonUpdates(a1));
+ }
+ );
+
+ let installs = await AddonManager.getAllInstalls();
+ equal(installs.length, 1);
+ equal(installs[0], install);
+
+ equal(install.name, a1.name);
+ equal(install.version, "2.0");
+ equal(install.state, AddonManager.STATE_AVAILABLE);
+ equal(install.existingAddon, a1);
+ equal(install.releaseNotesURI.spec, "http://example.com/updateInfo.xhtml");
+
+ // Verify that another update check returns the same AddonInstall
+ let {
+ updateAvailable: install2,
+ } = await AddonTestUtils.promiseFindAddonUpdates(a1);
+
+ installs = await AddonManager.getAllInstalls();
+ equal(installs.length, 1);
+ equal(installs[0], install);
+ equal(install2, install);
+
+ await expectEvents(
+ {
+ ignorePlugins: true,
+ installEvents: [
+ { event: "onDownloadStarted" },
+ { event: "onDownloadEnded", returnValue: false },
+ ],
+ },
+ () => {
+ install.install();
+ }
+ );
+
+ equal(install.state, AddonManager.STATE_DOWNLOADED);
+
+ // Continue installing the update.
+ // Verify that another update check returns no new update
+ let { updateAvailable } = await AddonTestUtils.promiseFindAddonUpdates(
+ install.existingAddon
+ );
+
+ ok(
+ !updateAvailable,
+ "Should find no available updates when one is already downloading"
+ );
+
+ installs = await AddonManager.getAllInstalls();
+ equal(installs.length, 1);
+ equal(installs[0], install);
+
+ await expectEvents(
+ {
+ ignorePlugins: true,
+ addonEvents: {
+ "addon1@tests.mozilla.org": [
+ { event: "onInstalling" },
+ { event: "onInstalled" },
+ ],
+ },
+ installEvents: [
+ { event: "onInstallStarted" },
+ { event: "onInstallEnded" },
+ ],
+ },
+ () => {
+ install.install();
+ }
+ );
+
+ await AddonTestUtils.loadAddonsList(true);
+
+ // Grab the current time so we can check the mtime of the add-on below
+ // without worrying too much about how long other tests take.
+ let startupTime = Date.now();
+
+ ok(isExtensionInBootstrappedList(profileDir, "addon1@tests.mozilla.org"));
+
+ a1 = await AddonManager.getAddonByID("addon1@tests.mozilla.org");
+ notEqual(a1, null);
+ equal(a1.version, "2.0");
+ ok(isExtensionInBootstrappedList(profileDir, a1.id));
+ equal(a1.applyBackgroundUpdates, AddonManager.AUTOUPDATE_DISABLE);
+ equal(a1.releaseNotesURI.spec, "http://example.com/updateInfo.xhtml");
+ notEqual(a1.syncGUID, null);
+ equal(originalSyncGUID, a1.syncGUID);
+
+ // Make sure that the extension lastModifiedTime was updated.
+ let testFile = getAddonFile(a1);
+ let difference = testFile.lastModifiedTime - startupTime;
+ ok(Math.abs(difference) < MAX_TIME_DIFFERENCE);
+
+ await a1.uninstall();
+});
+
+// Check that an update check finds compatibility updates and applies them
+add_task(async function test_compat_update() {
+ await promiseInstallWebExtension({
+ manifest: {
+ name: "Test Addon 2",
+ version: "1.0",
+ applications: {
+ gecko: {
+ id: "addon2@tests.mozilla.org",
+ update_url: "http://example.com/data/" + updateFile,
+ strict_max_version: "0",
+ },
+ },
+ },
+ });
+
+ let a2 = await AddonManager.getAddonByID("addon2@tests.mozilla.org");
+ notEqual(a2, null);
+ ok(a2.isActive);
+ ok(a2.isCompatible);
+ ok(!a2.appDisabled);
+ ok(a2.isCompatibleWith("0", "0"));
+
+ let result = await AddonTestUtils.promiseFindAddonUpdates(a2);
+ ok(result.compatibilityUpdate, "Should have seen a compatibility update");
+ ok(!result.updateAvailable, "Should not have seen a version update");
+
+ ok(a2.isCompatible);
+ ok(!a2.appDisabled);
+ ok(a2.isActive);
+
+ await promiseRestartManager();
+
+ a2 = await AddonManager.getAddonByID("addon2@tests.mozilla.org");
+ notEqual(a2, null);
+ ok(a2.isActive);
+ ok(a2.isCompatible);
+ ok(!a2.appDisabled);
+ await a2.uninstall();
+});
+
+// Checks that we see no compatibility information when there is none.
+add_task(async function test_no_compat() {
+ gAppInfo.platformVersion = "5";
+ await promiseRestartManager("5");
+ await promiseInstallWebExtension({
+ manifest: {
+ name: "Test Addon 3",
+ applications: {
+ gecko: {
+ id: "addon3@tests.mozilla.org",
+ update_url: `http://example.com/data/${updateFile}`,
+ strict_min_version: "5",
+ },
+ },
+ },
+ });
+
+ gAppInfo.platformVersion = "1";
+ await promiseRestartManager("1");
+
+ let a3 = await AddonManager.getAddonByID("addon3@tests.mozilla.org");
+ notEqual(a3, null);
+ ok(!a3.isActive);
+ ok(!a3.isCompatible);
+ ok(a3.appDisabled);
+ ok(a3.isCompatibleWith("5", "5"));
+ ok(!a3.isCompatibleWith("2", "2"));
+
+ let result = await AddonTestUtils.promiseFindAddonUpdates(a3);
+ ok(
+ !result.compatibilityUpdate,
+ "Should not have seen a compatibility update"
+ );
+ ok(!result.updateAvailable, "Should not have seen a version update");
+});
+
+// Checks that compatibility info for future apps are detected but don't make
+// the item compatibile.
+add_task(async function test_future_compat() {
+ let a3 = await AddonManager.getAddonByID("addon3@tests.mozilla.org");
+ notEqual(a3, null);
+ ok(!a3.isActive);
+ ok(!a3.isCompatible);
+ ok(a3.appDisabled);
+ ok(a3.isCompatibleWith("5", "5"));
+ ok(!a3.isCompatibleWith("2", "2"));
+
+ let result = await AddonTestUtils.promiseFindAddonUpdates(
+ a3,
+ undefined,
+ "3.0",
+ "3.0"
+ );
+ ok(result.compatibilityUpdate, "Should have seen a compatibility update");
+ ok(!result.updateAvailable, "Should not have seen a version update");
+
+ ok(!a3.isActive);
+ ok(!a3.isCompatible);
+ ok(a3.appDisabled);
+
+ await promiseRestartManager();
+
+ a3 = await AddonManager.getAddonByID("addon3@tests.mozilla.org");
+ notEqual(a3, null);
+ ok(!a3.isActive);
+ ok(!a3.isCompatible);
+ ok(a3.appDisabled);
+
+ await a3.uninstall();
+});
+
+// Test that background update checks work
+add_task(async function test_background_update() {
+ await promiseInstallWebExtension({
+ manifest: {
+ name: "Test Addon 1",
+ version: "1.0",
+ applications: {
+ gecko: {
+ id: "addon1@tests.mozilla.org",
+ update_url: `http://example.com/data/${updateFile}`,
+ strict_min_version: "1",
+ strict_max_version: "1",
+ },
+ },
+ },
+ });
+
+ function checkInstall(install) {
+ notEqual(install.existingAddon, null);
+ equal(install.existingAddon.id, "addon1@tests.mozilla.org");
+ }
+
+ await expectEvents(
+ {
+ ignorePlugins: true,
+ addonEvents: {
+ "addon1@tests.mozilla.org": [
+ { event: "onInstalling" },
+ { event: "onInstalled" },
+ ],
+ },
+ installEvents: [
+ { event: "onNewInstall" },
+ { event: "onDownloadStarted" },
+ { event: "onDownloadEnded", callback: checkInstall },
+ { event: "onInstallStarted" },
+ { event: "onInstallEnded" },
+ ],
+ },
+ () => {
+ AddonManagerInternal.backgroundUpdateCheck();
+ }
+ );
+
+ let a1 = await AddonManager.getAddonByID("addon1@tests.mozilla.org");
+ notEqual(a1, null);
+ equal(a1.version, "2.0");
+ equal(a1.releaseNotesURI.spec, "http://example.com/updateInfo.xhtml");
+
+ await a1.uninstall();
+});
+
+const PARAMS =
+ "?" +
+ [
+ "req_version=%REQ_VERSION%",
+ "item_id=%ITEM_ID%",
+ "item_version=%ITEM_VERSION%",
+ "item_maxappversion=%ITEM_MAXAPPVERSION%",
+ "item_status=%ITEM_STATUS%",
+ "app_id=%APP_ID%",
+ "app_version=%APP_VERSION%",
+ "current_app_version=%CURRENT_APP_VERSION%",
+ "app_os=%APP_OS%",
+ "app_abi=%APP_ABI%",
+ "app_locale=%APP_LOCALE%",
+ "update_type=%UPDATE_TYPE%",
+ ].join("&");
+
+const PARAM_ADDONS = {
+ "addon1@tests.mozilla.org": {
+ manifest: {
+ name: "Test Addon 1",
+ version: "5.0",
+ applications: {
+ gecko: {
+ id: "addon1@tests.mozilla.org",
+ update_url: `http://example.com/data/param_test.json${PARAMS}`,
+ strict_min_version: "1",
+ strict_max_version: "2",
+ },
+ },
+ },
+ params: {
+ item_version: "5.0",
+ item_maxappversion: "2",
+ item_status: "userEnabled",
+ app_version: "1",
+ update_type: "97",
+ },
+ updateType: [AddonManager.UPDATE_WHEN_USER_REQUESTED],
+ },
+
+ "addon2@tests.mozilla.org": {
+ manifest: {
+ name: "Test Addon 2",
+ version: "67.0.5b1",
+ applications: {
+ gecko: {
+ id: "addon2@tests.mozilla.org",
+ update_url: "http://example.com/data/param_test.json" + PARAMS,
+ strict_min_version: "0",
+ strict_max_version: "3",
+ },
+ },
+ },
+ initialState: {
+ userDisabled: true,
+ },
+ params: {
+ item_version: "67.0.5b1",
+ item_maxappversion: "3",
+ item_status: "userDisabled",
+ app_version: "1",
+ update_type: "49",
+ },
+ updateType: [AddonManager.UPDATE_WHEN_ADDON_INSTALLED],
+ compatOnly: true,
+ },
+
+ "addon3@tests.mozilla.org": {
+ manifest: {
+ name: "Test Addon 3",
+ version: "1.3+",
+ applications: {
+ gecko: {
+ id: "addon3@tests.mozilla.org",
+ update_url: `http://example.com/data/param_test.json${PARAMS}`,
+ },
+ },
+ },
+ params: {
+ item_version: "1.3+",
+ item_status: "userEnabled",
+ app_version: "1",
+ update_type: "112",
+ },
+ updateType: [AddonManager.UPDATE_WHEN_PERIODIC_UPDATE],
+ },
+
+ "addon4@tests.mozilla.org": {
+ manifest: {
+ name: "Test Addon 4",
+ version: "0.5ab6",
+ applications: {
+ gecko: {
+ id: "addon4@tests.mozilla.org",
+ update_url: `http://example.com/data/param_test.json${PARAMS}`,
+ strict_min_version: "1",
+ strict_max_version: "5",
+ },
+ },
+ },
+ params: {
+ item_version: "0.5ab6",
+ item_maxappversion: "5",
+ item_status: "userEnabled",
+ app_version: "2",
+ update_type: "98",
+ },
+ updateType: [AddonManager.UPDATE_WHEN_NEW_APP_DETECTED, "2"],
+ },
+
+ "addon5@tests.mozilla.org": {
+ manifest: {
+ name: "Test Addon 5",
+ version: "1.0",
+ applications: {
+ gecko: {
+ id: "addon5@tests.mozilla.org",
+ update_url: `http://example.com/data/param_test.json${PARAMS}`,
+ strict_min_version: "1",
+ strict_max_version: "1",
+ },
+ },
+ },
+ params: {
+ item_version: "1.0",
+ item_maxappversion: "1",
+ item_status: "userEnabled",
+ app_version: "1",
+ update_type: "35",
+ },
+ updateType: [AddonManager.UPDATE_WHEN_NEW_APP_INSTALLED],
+ compatOnly: true,
+ },
+
+ "addon6@tests.mozilla.org": {
+ manifest: {
+ name: "Test Addon 6",
+ version: "1.0",
+ applications: {
+ gecko: {
+ id: "addon6@tests.mozilla.org",
+ update_url: `http://example.com/data/param_test.json${PARAMS}`,
+ strict_min_version: "1",
+ strict_max_version: "1",
+ },
+ },
+ },
+ params: {
+ item_version: "1.0",
+ item_maxappversion: "1",
+ item_status: "userEnabled",
+ app_version: "1",
+ update_type: "99",
+ },
+ updateType: [AddonManager.UPDATE_WHEN_NEW_APP_INSTALLED],
+ },
+
+ "blocklist1@tests.mozilla.org": {
+ manifest: {
+ name: "Test Addon 1",
+ version: "5.0",
+ applications: {
+ gecko: {
+ id: "blocklist1@tests.mozilla.org",
+ update_url: `http://example.com/data/param_test.json${PARAMS}`,
+ strict_min_version: "1",
+ strict_max_version: "2",
+ },
+ },
+ },
+ params: {
+ item_version: "5.0",
+ item_maxappversion: "2",
+ item_status: "userDisabled,softblocked",
+ app_version: "1",
+ update_type: "97",
+ },
+ updateType: [AddonManager.UPDATE_WHEN_USER_REQUESTED],
+ blocklistState: "STATE_SOFTBLOCKED",
+ },
+
+ "blocklist2@tests.mozilla.org": {
+ manifest: {
+ name: "Test Addon 1",
+ version: "5.0",
+ applications: {
+ gecko: {
+ id: "blocklist2@tests.mozilla.org",
+ update_url: `http://example.com/data/param_test.json${PARAMS}`,
+ strict_min_version: "1",
+ strict_max_version: "2",
+ },
+ },
+ },
+ params: {
+ item_version: "5.0",
+ item_maxappversion: "2",
+ item_status: "userEnabled,blocklisted",
+ app_version: "1",
+ update_type: "97",
+ },
+ updateType: [AddonManager.UPDATE_WHEN_USER_REQUESTED],
+ blocklistState: "STATE_BLOCKED",
+ },
+};
+
+const PARAM_IDS = Object.keys(PARAM_ADDONS);
+
+// Verify the parameter escaping in update urls.
+add_task(async function test_params() {
+ let blocklistAddons = new Map();
+ for (let [id, options] of Object.entries(PARAM_ADDONS)) {
+ if (options.blocklistState) {
+ blocklistAddons.set(id, Ci.nsIBlocklistService[options.blocklistState]);
+ }
+ }
+ let mockBlocklist = await AddonTestUtils.overrideBlocklist(blocklistAddons);
+
+ for (let [id, options] of Object.entries(PARAM_ADDONS)) {
+ await promiseInstallWebExtension({ manifest: options.manifest });
+
+ if (options.initialState) {
+ let addon = await AddonManager.getAddonByID(id);
+ await setInitialState(addon, options.initialState);
+ }
+ }
+
+ let resultsPromise = new Promise(resolve => {
+ let results = new Map();
+
+ testserver.registerPathHandler("/data/param_test.json", function(
+ request,
+ response
+ ) {
+ let params = new URLSearchParams(request.queryString);
+ let itemId = params.get("item_id");
+ ok(
+ !results.has(itemId),
+ `Should not see a duplicate request for item ${itemId}`
+ );
+
+ results.set(itemId, params);
+
+ if (results.size === PARAM_IDS.length) {
+ resolve(results);
+ }
+
+ request.setStatusLine(null, 500, "Server Error");
+ });
+ });
+
+ let addons = await getAddons(PARAM_IDS);
+ for (let [id, options] of Object.entries(PARAM_ADDONS)) {
+ // Having an onUpdateAvailable callback in the listener automagically adds
+ // UPDATE_TYPE_NEWVERSION to the update type flags in the request.
+ let listener = options.compatOnly ? {} : { onUpdateAvailable() {} };
+
+ addons.get(id).findUpdates(listener, ...options.updateType);
+ }
+
+ let baseParams = {
+ req_version: "2",
+ app_id: "xpcshell@tests.mozilla.org",
+ current_app_version: "1",
+ app_os: "XPCShell",
+ app_abi: "noarch-spidermonkey",
+ app_locale: "fr-FR",
+ };
+
+ let results = await resultsPromise;
+ for (let [id, options] of Object.entries(PARAM_ADDONS)) {
+ info(`Checking update params for ${id}`);
+
+ let expected = Object.assign({}, baseParams, options.params);
+ let params = results.get(id);
+
+ for (let [prop, value] of Object.entries(expected)) {
+ equal(params.get(prop), value, `Expected value for ${prop}`);
+ }
+ }
+
+ for (let [, addon] of await getAddons(PARAM_IDS)) {
+ await addon.uninstall();
+ }
+
+ await mockBlocklist.unregister();
+});
+
+// Tests that if a manifest claims compatibility then the add-on will be
+// seen as compatible regardless of what the update payload says.
+add_task(async function test_manifest_compat() {
+ await promiseInstallWebExtension({
+ manifest: {
+ name: "Test Addon 1",
+ version: "5.0",
+ applications: {
+ gecko: {
+ id: "addon4@tests.mozilla.org",
+ update_url: `http://example.com/data/${updateFile}`,
+ strict_min_version: "0",
+ strict_max_version: "1",
+ },
+ },
+ },
+ });
+
+ let a4 = await AddonManager.getAddonByID("addon4@tests.mozilla.org");
+ ok(a4.isActive, "addon4 is active");
+ ok(a4.isCompatible, "addon4 is compatible");
+
+ // Test that a normal update check won't decrease a targetApplication's
+ // maxVersion but an update check for a new application will.
+ await AddonTestUtils.promiseFindAddonUpdates(
+ a4,
+ AddonManager.UPDATE_WHEN_PERIODIC_UPDATE
+ );
+ ok(a4.isActive, "addon4 is active");
+ ok(a4.isCompatible, "addon4 is compatible");
+
+ await AddonTestUtils.promiseFindAddonUpdates(
+ a4,
+ AddonManager.UPDATE_WHEN_NEW_APP_INSTALLED
+ );
+ ok(!a4.isActive, "addon4 is not active");
+ ok(!a4.isCompatible, "addon4 is not compatible");
+
+ await a4.uninstall();
+});
+
+// Test that the background update check doesn't update an add-on that isn't
+// allowed to update automatically.
+add_task(async function test_no_auto_update() {
+ // Have an add-on there that will be updated so we see some events from it
+ await promiseInstallWebExtension({
+ manifest: {
+ name: "Test Addon 1",
+ version: "1.0",
+ applications: {
+ gecko: {
+ id: "addon1@tests.mozilla.org",
+ update_url: `http://example.com/data/${updateFile}`,
+ },
+ },
+ },
+ });
+
+ await promiseInstallWebExtension({
+ manifest: {
+ name: "Test Addon 8",
+ version: "1.0",
+ applications: {
+ gecko: {
+ id: "addon8@tests.mozilla.org",
+ update_url: `http://example.com/data/${updateFile}`,
+ },
+ },
+ },
+ });
+
+ let a8 = await AddonManager.getAddonByID("addon8@tests.mozilla.org");
+ a8.applyBackgroundUpdates = AddonManager.AUTOUPDATE_DISABLE;
+
+ // The background update check will find updates for both add-ons but only
+ // proceed to install one of them.
+ let listener;
+ await new Promise(resolve => {
+ listener = {
+ onNewInstall(aInstall) {
+ let id = aInstall.existingAddon.id;
+ ok(
+ id == "addon1@tests.mozilla.org" || id == "addon8@tests.mozilla.org",
+ "Saw unexpected onNewInstall for " + id
+ );
+ },
+
+ onDownloadStarted(aInstall) {
+ equal(aInstall.existingAddon.id, "addon1@tests.mozilla.org");
+ },
+
+ onDownloadEnded(aInstall) {
+ equal(aInstall.existingAddon.id, "addon1@tests.mozilla.org");
+ },
+
+ onDownloadFailed(aInstall) {
+ ok(false, "Should not have seen onDownloadFailed event");
+ },
+
+ onDownloadCancelled(aInstall) {
+ ok(false, "Should not have seen onDownloadCancelled event");
+ },
+
+ onInstallStarted(aInstall) {
+ equal(aInstall.existingAddon.id, "addon1@tests.mozilla.org");
+ },
+
+ onInstallEnded(aInstall) {
+ equal(aInstall.existingAddon.id, "addon1@tests.mozilla.org");
+
+ resolve();
+ },
+
+ onInstallFailed(aInstall) {
+ ok(false, "Should not have seen onInstallFailed event");
+ },
+
+ onInstallCancelled(aInstall) {
+ ok(false, "Should not have seen onInstallCancelled event");
+ },
+ };
+ AddonManager.addInstallListener(listener);
+ AddonManagerInternal.backgroundUpdateCheck();
+ });
+ AddonManager.removeInstallListener(listener);
+
+ let a1;
+ [a1, a8] = await AddonManager.getAddonsByIDs([
+ "addon1@tests.mozilla.org",
+ "addon8@tests.mozilla.org",
+ ]);
+ notEqual(a1, null);
+ equal(a1.version, "2.0");
+ await a1.uninstall();
+
+ notEqual(a8, null);
+ equal(a8.version, "1.0");
+ await a8.uninstall();
+});
+
+// Test that the update check returns nothing for addons in locked install
+// locations.
+add_task(async function run_test_locked_install() {
+ const lockedDir = gProfD.clone();
+ lockedDir.append("locked_extensions");
+ registerDirectory("XREAppFeat", lockedDir);
+
+ await promiseShutdownManager();
+
+ let xpi = await createTempWebExtensionFile({
+ manifest: {
+ name: "Test Addon 13",
+ version: "1.0",
+ applications: {
+ gecko: {
+ id: "addon13@tests.mozilla.org",
+ update_url: "http://example.com/data/test_update.json",
+ },
+ },
+ },
+ });
+ xpi.copyTo(lockedDir, "addon13@tests.mozilla.org.xpi");
+
+ let validAddons = { system: ["addon13@tests.mozilla.org"] };
+ await overrideBuiltIns(validAddons);
+
+ await promiseStartupManager();
+
+ let a13 = await AddonManager.getAddonByID("addon13@tests.mozilla.org");
+ notEqual(a13, null);
+
+ let result = await AddonTestUtils.promiseFindAddonUpdates(a13);
+ ok(
+ !result.compatibilityUpdate,
+ "Should not have seen a compatibility update"
+ );
+ ok(!result.updateAvailable, "Should not have seen a version update");
+
+ let installs = await AddonManager.getAllInstalls();
+ equal(installs.length, 0);
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_updateCancel.js b/toolkit/mozapps/extensions/test/xpcshell/test_updateCancel.js
new file mode 100644
index 0000000000..d3ebdcfa49
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_updateCancel.js
@@ -0,0 +1,139 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// Test cancelling add-on update checks while in progress (bug 925389)
+
+// The test extension uses an insecure update url.
+Services.prefs.setBoolPref(PREF_EM_CHECK_UPDATE_SECURITY, false);
+
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1.9.2");
+
+// Install one extension
+// Start download of update check (but delay HTTP response)
+// Cancel update check
+// - ensure we get cancel notification
+// complete HTTP response
+// - ensure no callbacks after cancel
+// - ensure update is gone
+
+// Create an addon update listener containing a promise
+// that resolves when the update is cancelled
+function makeCancelListener() {
+ let resolve, reject;
+ let promise = new Promise((_resolve, _reject) => {
+ resolve = _resolve;
+ reject = _reject;
+ });
+
+ return {
+ onUpdateAvailable(addon, install) {
+ reject("Should not have seen onUpdateAvailable notification");
+ },
+
+ onUpdateFinished(aAddon, aError) {
+ info("onUpdateCheckFinished: " + aAddon.id + " " + aError);
+ resolve(aError);
+ },
+ promise,
+ };
+}
+
+let testserver = createHttpServer({ hosts: ["example.com"] });
+
+// Set up the HTTP server so that we can control when it responds
+let _httpResolve;
+function resetUpdateListener() {
+ return new Promise(resolve => {
+ _httpResolve = resolve;
+ });
+}
+
+testserver.registerPathHandler("/data/test_update.json", (req, resp) => {
+ resp.processAsync();
+ _httpResolve([req, resp]);
+});
+
+const UPDATE_RESPONSE = {
+ addons: {
+ "addon1@tests.mozilla.org": {
+ updates: [
+ {
+ version: "2.0",
+ update_link: "http://example.com/addons/test_update.xpi",
+ applications: {
+ gecko: {
+ strict_min_version: "1",
+ strict_max_version: "1",
+ },
+ },
+ },
+ ],
+ },
+ },
+};
+
+add_task(async function cancel_during_check() {
+ await promiseStartupManager();
+
+ await promiseInstallWebExtension({
+ manifest: {
+ name: "Test Addon 1",
+ version: "1.0",
+ applications: {
+ gecko: {
+ id: "addon1@tests.mozilla.org",
+ update_url: "http://example.com/data/test_update.json",
+ },
+ },
+ },
+ });
+
+ let a1 = await promiseAddonByID("addon1@tests.mozilla.org");
+ Assert.notEqual(a1, null);
+
+ let requestPromise = resetUpdateListener();
+ let listener = makeCancelListener();
+ a1.findUpdates(listener, AddonManager.UPDATE_WHEN_USER_REQUESTED);
+
+ // Wait for the http request to arrive
+ let [, /* request */ response] = await requestPromise;
+
+ // cancelUpdate returns true if there is an update check in progress
+ Assert.ok(a1.cancelUpdate());
+
+ let updateResult = await listener.promise;
+ Assert.equal(AddonManager.UPDATE_STATUS_CANCELLED, updateResult);
+
+ // Now complete the HTTP request
+ response.write(JSON.stringify(UPDATE_RESPONSE));
+ response.finish();
+
+ // trying to cancel again should return false, i.e. nothing to cancel
+ Assert.ok(!a1.cancelUpdate());
+});
+
+// Test that update check is cancelled if the XPI provider shuts down while
+// the update check is in progress
+add_task(async function shutdown_during_check() {
+ // Reset our HTTP listener
+ let requestPromise = resetUpdateListener();
+
+ let a1 = await promiseAddonByID("addon1@tests.mozilla.org");
+ Assert.notEqual(a1, null);
+
+ let listener = makeCancelListener();
+ a1.findUpdates(listener, AddonManager.UPDATE_WHEN_USER_REQUESTED);
+
+ // Wait for the http request to arrive
+ let [, /* request */ response] = await requestPromise;
+
+ await promiseShutdownManager();
+
+ let updateResult = await listener.promise;
+ Assert.equal(AddonManager.UPDATE_STATUS_CANCELLED, updateResult);
+
+ // Now complete the HTTP request
+ response.write(JSON.stringify(UPDATE_RESPONSE));
+ response.finish();
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_update_compatmode.js b/toolkit/mozapps/extensions/test/xpcshell/test_update_compatmode.js
new file mode 100644
index 0000000000..85ec556f95
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_update_compatmode.js
@@ -0,0 +1,112 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// This verifies that add-on update check correctly fills in the
+// %COMPATIBILITY_MODE% token in the update URL.
+
+// The test extension uses an insecure update url.
+Services.prefs.setBoolPref(PREF_EM_CHECK_UPDATE_SECURITY, false);
+
+let testserver = createHttpServer({ hosts: ["example.com"] });
+
+let lastMode;
+testserver.registerPathHandler("/update.json", (request, response) => {
+ let params = new URLSearchParams(request.queryString);
+ lastMode = params.get("mode");
+
+ response.setHeader("content-type", "application/json", true);
+ response.write(JSON.stringify({ addons: {} }));
+});
+
+const ID_NORMAL = "compatmode@tests.mozilla.org";
+const ID_STRICT = "compatmode-strict@tests.mozilla.org";
+
+add_task(async function setup() {
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1.9.2");
+
+ let xpi = await createAddon({
+ id: ID_NORMAL,
+ updateURL: "http://example.com/update.json?mode=%COMPATIBILITY_MODE%",
+ targetApplications: [
+ {
+ id: "xpcshell@tests.mozilla.org",
+ minVersion: "1",
+ maxVersion: "1",
+ },
+ ],
+ });
+ await manuallyInstall(xpi, AddonTestUtils.profileExtensions, ID_NORMAL);
+
+ xpi = await createAddon({
+ id: ID_STRICT,
+ updateURL: "http://example.com/update.json?mode=%COMPATIBILITY_MODE%",
+ strictCompatibility: true,
+ targetApplications: [
+ {
+ id: "xpcshell@tests.mozilla.org",
+ minVersion: "1",
+ maxVersion: "1",
+ },
+ ],
+ });
+ await manuallyInstall(xpi, AddonTestUtils.profileExtensions, ID_STRICT);
+
+ await promiseStartupManager();
+});
+
+// Strict compatibility checking disabled.
+add_task(async function test_strict_disabled() {
+ Services.prefs.setBoolPref(PREF_EM_STRICT_COMPATIBILITY, false);
+ let addon = await AddonManager.getAddonByID(ID_NORMAL);
+ Assert.notEqual(addon, null);
+
+ await promiseFindAddonUpdates(addon, AddonManager.UPDATE_WHEN_USER_REQUESTED);
+ Assert.equal(
+ lastMode,
+ "normal",
+ "COMPATIBIILITY_MODE normal was set correctly"
+ );
+});
+
+// Strict compatibility checking enabled.
+add_task(async function test_strict_enabled() {
+ Services.prefs.setBoolPref(PREF_EM_STRICT_COMPATIBILITY, true);
+ let addon = await AddonManager.getAddonByID(ID_NORMAL);
+ Assert.notEqual(addon, null);
+
+ await promiseFindAddonUpdates(addon, AddonManager.UPDATE_WHEN_USER_REQUESTED);
+ Assert.equal(
+ lastMode,
+ "strict",
+ "COMPATIBILITY_MODE strict was set correctly"
+ );
+});
+
+// Strict compatibility checking opt-in.
+add_task(async function test_strict_optin() {
+ Services.prefs.setBoolPref(PREF_EM_STRICT_COMPATIBILITY, false);
+ let addon = await AddonManager.getAddonByID(ID_STRICT);
+ Assert.notEqual(addon, null);
+
+ await promiseFindAddonUpdates(addon, AddonManager.UPDATE_WHEN_USER_REQUESTED);
+ Assert.equal(
+ lastMode,
+ "normal",
+ "COMPATIBILITY_MODE is normal even for an addon with strictCompatibility"
+ );
+});
+
+// Compatibility checking disabled.
+add_task(async function test_compat_disabled() {
+ AddonManager.checkCompatibility = false;
+ let addon = await AddonManager.getAddonByID(ID_NORMAL);
+ Assert.notEqual(addon, null);
+
+ await promiseFindAddonUpdates(addon, AddonManager.UPDATE_WHEN_USER_REQUESTED);
+ Assert.equal(
+ lastMode,
+ "ignore",
+ "COMPATIBILITY_MODE ignore was set correctly"
+ );
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_update_ignorecompat.js b/toolkit/mozapps/extensions/test/xpcshell/test_update_ignorecompat.js
new file mode 100644
index 0000000000..a0a937798c
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_update_ignorecompat.js
@@ -0,0 +1,100 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// This test is disabled but is being kept around so it can eventualy
+// be modernized and re-enabled. But is uses obsolete test helpers that
+// fail lint, so just skip linting it for now.
+/* eslint-disable */
+
+// This verifies that add-on update checks work correctly when compatibility
+// check is disabled.
+
+const PREF_GETADDONS_CACHE_ENABLED = "extensions.getAddons.cache.enabled";
+
+// The test extension uses an insecure update url.
+Services.prefs.setBoolPref(PREF_EM_CHECK_UPDATE_SECURITY, false);
+Services.prefs.setBoolPref(PREF_EM_STRICT_COMPATIBILITY, false);
+
+var testserver = AddonTestUtils.createHttpServer({hosts: ["example.com"]});
+testserver.registerDirectory("/data/", do_get_file("data"));
+testserver.registerDirectory("/data/", do_get_file("data"));
+
+const profileDir = gProfD.clone();
+profileDir.append("extensions");
+
+
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1");
+
+const updateFile = "test_update.json";
+const appId = "toolkit@mozilla.org";
+
+// Test that the update check correctly observes the
+// extensions.strictCompatibility pref.
+add_test(async function() {
+ await promiseWriteInstallRDFForExtension({
+ id: "addon9@tests.mozilla.org",
+ version: "1.0",
+ updateURL: "http://example.com/data/" + updateFile,
+ targetApplications: [{
+ id: appId,
+ minVersion: "0.1",
+ maxVersion: "0.2",
+ }],
+ name: "Test Addon 9",
+ }, profileDir);
+
+ await promiseRestartManager();
+
+ AddonManager.addInstallListener({
+ onNewInstall(aInstall) {
+ if (aInstall.existingAddon.id != "addon9@tests.mozilla.org")
+ do_throw("Saw unexpected onNewInstall for " + aInstall.existingAddon.id);
+ Assert.equal(aInstall.version, "4.0");
+ },
+ onDownloadFailed(aInstall) {
+ run_next_test();
+ },
+ });
+
+ Services.prefs.setCharPref(PREF_GETADDONS_BYIDS,
+ `http://example.com/data/test_update_addons.json`);
+ Services.prefs.setBoolPref(PREF_GETADDONS_CACHE_ENABLED, true);
+
+ AddonManagerInternal.backgroundUpdateCheck();
+});
+
+// Test that the update check correctly observes when an addon opts-in to
+// strict compatibility checking.
+add_test(async function() {
+ await promiseWriteInstallRDFForExtension({
+ id: "addon11@tests.mozilla.org",
+ version: "1.0",
+ updateURL: "http://example.com/data/" + updateFile,
+ targetApplications: [{
+ id: appId,
+ minVersion: "0.1",
+ maxVersion: "0.2",
+ }],
+ name: "Test Addon 11",
+ }, profileDir);
+
+ await promiseRestartManager();
+
+ let a11 = await AddonManager.getAddonByID("addon11@tests.mozilla.org");
+ Assert.notEqual(a11, null);
+
+ a11.findUpdates({
+ onCompatibilityUpdateAvailable() {
+ do_throw("Should not have seen compatibility information");
+ },
+
+ onUpdateAvailable() {
+ do_throw("Should not have seen an available update");
+ },
+
+ onUpdateFinished() {
+ run_next_test();
+ },
+ }, AddonManager.UPDATE_WHEN_USER_REQUESTED);
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_update_noSystemAddonUpdate.js b/toolkit/mozapps/extensions/test/xpcshell/test_update_noSystemAddonUpdate.js
new file mode 100644
index 0000000000..dad333851e
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_update_noSystemAddonUpdate.js
@@ -0,0 +1,42 @@
+// Tests that system add-on doesnt request update while normal backgroundUpdateCheck
+
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "2");
+
+let distroDir = FileUtils.getDir("ProfD", ["sysfeatures", "empty"], true);
+registerDirectory("XREAppFeat", distroDir);
+
+AddonTestUtils.usePrivilegedSignatures = "system";
+
+add_task(() => initSystemAddonDirs());
+
+const initialSetup = {
+ async setup() {
+ await buildPrefilledUpdatesDir();
+ distroDir.leafName = "empty";
+ },
+ initialState: [
+ { isUpgrade: false, version: null },
+ { isUpgrade: true, version: "2.0" },
+ ],
+};
+
+add_task(async function test_systems_update_uninstall_check() {
+ await setupSystemAddonConditions(initialSetup, distroDir);
+
+ const testserver = createHttpServer({ hosts: ["example.com"] });
+ testserver.registerPathHandler("/update.json", (request, response) => {
+ Assert.ok(
+ !request._queryString.includes("system2@tests.mozilla.org"),
+ "System addon should not request update from normal update process"
+ );
+ });
+
+ Services.prefs.setCharPref(
+ "extensions.update.background.url",
+ "http://example.com/update.json?id=%ITEM_ID%"
+ );
+
+ await AddonManagerInternal.backgroundUpdateCheck();
+
+ await promiseShutdownManager();
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_update_strictcompat.js b/toolkit/mozapps/extensions/test/xpcshell/test_update_strictcompat.js
new file mode 100644
index 0000000000..14192657dd
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_update_strictcompat.js
@@ -0,0 +1,216 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// This verifies that add-on update checks work in conjunction with
+// strict compatibility settings.
+
+const PREF_GETADDONS_CACHE_ENABLED = "extensions.getAddons.cache.enabled";
+
+// The test extension uses an insecure update url.
+Services.prefs.setBoolPref(PREF_EM_CHECK_UPDATE_SECURITY, false);
+Services.prefs.setBoolPref(PREF_EM_STRICT_COMPATIBILITY, false);
+
+const appId = "toolkit@mozilla.org";
+
+testserver = createHttpServer({ hosts: ["example.com"] });
+testserver.registerDirectory("/data/", do_get_file("data"));
+
+add_task(async function setup() {
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1");
+ AddonTestUtils.updateReason = AddonManager.UPDATE_WHEN_USER_REQUESTED;
+
+ Services.prefs.setCharPref(
+ PREF_GETADDONS_BYIDS,
+ "http://example.com/data/test_update_addons.json"
+ );
+ Services.prefs.setBoolPref(PREF_GETADDONS_CACHE_ENABLED, true);
+});
+
+// Test that the update check correctly observes the
+// extensions.strictCompatibility pref.
+add_task(async function test_update_strict() {
+ const ID = "addon9@tests.mozilla.org";
+ let xpi = await createAddon({
+ id: ID,
+ updateURL: "http://example.com/update.json",
+ targetApplications: [
+ {
+ id: "xpcshell@tests.mozilla.org",
+ minVersion: "0.1",
+ maxVersion: "0.2",
+ },
+ ],
+ });
+ await manuallyInstall(xpi, AddonTestUtils.profileExtensions, ID);
+
+ await promiseStartupManager();
+
+ await AddonRepository.backgroundUpdateCheck();
+
+ let UPDATE = {
+ addons: {
+ [ID]: {
+ updates: [
+ {
+ version: "2.0",
+ update_link: "http://example.com/addons/test_update9_2.xpi",
+ applications: {
+ gecko: {
+ strict_min_version: "1",
+ advisory_max_version: "1",
+ },
+ },
+ },
+
+ // Incompatible when strict compatibility is enabled
+ {
+ version: "3.0",
+ update_link: "http://example.com/addons/test_update9_3.xpi",
+ applications: {
+ gecko: {
+ strict_min_version: "0.9",
+ advisory_max_version: "0.9",
+ },
+ },
+ },
+
+ // Addon for future version of app
+ {
+ version: "4.0",
+ update_link: "http://example.com/addons/test_update9_5.xpi",
+ applications: {
+ gecko: {
+ strict_min_version: "5",
+ advisory_max_version: "6",
+ },
+ },
+ },
+ ],
+ },
+ },
+ };
+
+ AddonTestUtils.registerJSON(testserver, "/update.json", UPDATE);
+
+ let addon = await AddonManager.getAddonByID(ID);
+ let { updateAvailable } = await promiseFindAddonUpdates(addon);
+
+ Assert.notEqual(updateAvailable, null, "Got update");
+ Assert.equal(
+ updateAvailable.version,
+ "3.0",
+ "The correct update was selected"
+ );
+ await addon.uninstall();
+
+ await promiseShutdownManager();
+});
+
+// Tests that compatibility updates are applied to addons when the updated
+// compatibility data wouldn't match with strict compatibility enabled.
+add_task(async function test_update_strict2() {
+ const ID = "addon10@tests.mozilla.org";
+ let xpi = createAddon({
+ id: ID,
+ updateURL: "http://example.com/update.json",
+ targetApplications: [
+ {
+ id: appId,
+ minVersion: "0.1",
+ maxVersion: "0.2",
+ },
+ ],
+ });
+ await manuallyInstall(xpi, AddonTestUtils.profileExtensions, ID);
+
+ await promiseStartupManager();
+ await AddonRepository.backgroundUpdateCheck();
+
+ const UPDATE = {
+ addons: {
+ [ID]: {
+ updates: [
+ {
+ version: "1.0",
+ update_link: "http://example.com/addons/test_update10.xpi",
+ applications: {
+ gecko: {
+ strict_min_version: "0.1",
+ advisory_max_version: "0.4",
+ },
+ },
+ },
+ ],
+ },
+ },
+ };
+
+ AddonTestUtils.registerJSON(testserver, "/update.json", UPDATE);
+
+ let addon = await AddonManager.getAddonByID(ID);
+ notEqual(addon, null);
+
+ let result = await promiseFindAddonUpdates(addon);
+ ok(result.compatibilityUpdate, "Should have seen a compatibility update");
+ ok(!result.updateAvailable, "Should not have seen a version update");
+
+ await addon.uninstall();
+ await promiseShutdownManager();
+});
+
+// Test that the update check correctly observes when an addon opts-in to
+// strict compatibility checking.
+add_task(async function test_update_strict_optin() {
+ const ID = "addon11@tests.mozilla.org";
+ let xpi = await createAddon({
+ id: ID,
+ updateURL: "http://example.com/update.json",
+ targetApplications: [
+ {
+ id: appId,
+ minVersion: "0.1",
+ maxVersion: "0.2",
+ },
+ ],
+ });
+ await manuallyInstall(xpi, AddonTestUtils.profileExtensions, ID);
+
+ await promiseStartupManager();
+
+ await AddonRepository.backgroundUpdateCheck();
+
+ const UPDATE = {
+ addons: {
+ [ID]: {
+ updates: [
+ {
+ version: "2.0",
+ update_link: "http://example.com/addons/test_update11.xpi",
+ applications: {
+ gecko: {
+ strict_min_version: "0.1",
+ strict_max_version: "0.2",
+ },
+ },
+ },
+ ],
+ },
+ },
+ };
+
+ AddonTestUtils.registerJSON(testserver, "/update.json", UPDATE);
+
+ let addon = await AddonManager.getAddonByID(ID);
+ notEqual(addon, null);
+
+ let result = await AddonTestUtils.promiseFindAddonUpdates(addon);
+ ok(
+ !result.compatibilityUpdate,
+ "Should not have seen a compatibility update"
+ );
+ ok(!result.updateAvailable, "Should not have seen a version update");
+
+ await addon.uninstall();
+ await promiseShutdownManager();
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_update_theme.js b/toolkit/mozapps/extensions/test/xpcshell/test_update_theme.js
new file mode 100644
index 0000000000..0669dbf221
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_update_theme.js
@@ -0,0 +1,121 @@
+"use strict";
+
+XPCOMUtils.defineLazyGetter(this, "Management", () => {
+ const { ExtensionParent } = ChromeUtils.import(
+ "resource://gre/modules/ExtensionParent.jsm"
+ );
+ return ExtensionParent.apiManager;
+});
+
+add_task(async function setup() {
+ let scopes = AddonManager.SCOPE_PROFILE | AddonManager.SCOPE_APPLICATION;
+ Services.prefs.setIntPref("extensions.enabledScopes", scopes);
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "42.0", "42.0");
+
+ await promiseStartupManager();
+});
+
+// Verify that a theme can be updated without issues.
+add_task(async function test_update_of_disabled_theme() {
+ const id = "theme-only@test";
+ async function installTheme(version) {
+ // Upon installing a theme, it is disabled by default. Because of this,
+ // ExtensionTestUtils.loadExtension cannot be used because it awaits the
+ // startup of a test extension.
+ let xpi = AddonTestUtils.createTempWebExtensionFile({
+ manifest: {
+ applications: { gecko: { id } },
+ version,
+ theme: {},
+ },
+ });
+ let install = await AddonManager.getInstallForFile(xpi);
+ let addon = await install.install();
+ ok(addon.userDisabled, "Theme is expected to be disabled by default");
+ equal(addon.userPermissions, null, "theme has no userPermissions");
+ }
+
+ await installTheme("1.0");
+
+ let updatePromise = new Promise(resolve => {
+ Management.on("update", function listener(name, { id: updatedId }) {
+ Management.off("update", listener);
+ equal(updatedId, id, "expected theme update");
+ resolve();
+ });
+ });
+ await installTheme("2.0");
+ await updatePromise;
+ let addon = await promiseAddonByID(id);
+ equal(addon.version, "2.0", "Theme should be updated");
+ ok(addon.userDisabled, "Theme is still disabled after an update");
+ await addon.uninstall();
+});
+
+add_task(async function test_builtin_location_migration() {
+ const ADDON_ID = "mytheme@mozilla.org";
+
+ let themeDef = {
+ manifest: {
+ applications: { gecko: { id: ADDON_ID } },
+ version: "1.0",
+ theme: {},
+ },
+ };
+
+ await setupBuiltinExtension(themeDef, "first-loc", false);
+ await AddonManager.maybeInstallBuiltinAddon(
+ ADDON_ID,
+ "1.0",
+ "resource://first-loc/"
+ );
+
+ let addon = await AddonManager.getAddonByID(ADDON_ID);
+ await addon.enable();
+ Assert.ok(!addon.userDisabled, "Add-on should be enabled.");
+
+ Assert.equal(
+ Services.prefs.getCharPref("extensions.activeThemeID", ""),
+ ADDON_ID,
+ "Pref should be set."
+ );
+
+ let { addons: activeThemes } = await AddonManager.getActiveAddons(["theme"]);
+ Assert.equal(activeThemes.length, 1, "Should have 1 theme.");
+ Assert.equal(activeThemes[0].id, ADDON_ID, "Should have enabled the theme.");
+
+ // If we restart and update, and install a newer version of the theme,
+ // it should be activated.
+ await promiseShutdownManager();
+
+ // Force schema change and restart
+ Services.prefs.setIntPref("extensions.databaseSchema", 0);
+ await promiseStartupManager();
+
+ // Set up a new version of the builtin add-on.
+ let newDef = { manifest: Object.assign({}, themeDef.manifest) };
+ newDef.manifest.version = "1.1";
+ await setupBuiltinExtension(newDef, "second-loc");
+ await AddonManager.maybeInstallBuiltinAddon(
+ ADDON_ID,
+ "1.1",
+ "resource://second-loc/"
+ );
+
+ let newAddon = await AddonManager.getAddonByID(ADDON_ID);
+ Assert.ok(!newAddon.userDisabled, "Add-on should be enabled.");
+
+ ({ addons: activeThemes } = await AddonManager.getActiveAddons(["theme"]));
+ Assert.equal(activeThemes.length, 1, "Should still have 1 theme.");
+ Assert.equal(
+ activeThemes[0].id,
+ ADDON_ID,
+ "Should still have the theme enabled."
+ );
+ Assert.equal(
+ Services.prefs.getCharPref("extensions.activeThemeID", ""),
+ ADDON_ID,
+ "Pref should still be set."
+ );
+ await promiseShutdownManager();
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_update_webextensions.js b/toolkit/mozapps/extensions/test/xpcshell/test_update_webextensions.js
new file mode 100644
index 0000000000..02155e1196
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_update_webextensions.js
@@ -0,0 +1,206 @@
+"use strict";
+
+// We don't have an easy way to serve update manifests from a secure URL.
+Services.prefs.setBoolPref(PREF_EM_CHECK_UPDATE_SECURITY, false);
+
+var testserver = createHttpServer();
+gPort = testserver.identity.primaryPort;
+
+const uuidGenerator = Cc["@mozilla.org/uuid-generator;1"].getService(
+ Ci.nsIUUIDGenerator
+);
+
+const extensionsDir = gProfD.clone();
+extensionsDir.append("extensions");
+
+const addonsDir = gTmpD.clone();
+addonsDir.append("addons");
+addonsDir.create(Ci.nsIFile.DIRECTORY_TYPE, 0o755);
+
+registerCleanupFunction(() => addonsDir.remove(true));
+
+testserver.registerDirectory("/addons/", addonsDir);
+
+let gUpdateManifests = {};
+
+function mapManifest(aPath, aManifestData) {
+ gUpdateManifests[aPath] = aManifestData;
+ testserver.registerPathHandler(aPath, serveManifest);
+}
+
+function serveManifest(request, response) {
+ let manifest = gUpdateManifests[request.path];
+
+ response.setHeader("Content-Type", manifest.contentType, false);
+ response.write(manifest.data);
+}
+
+async function promiseInstallWebExtension(aData) {
+ let addonFile = createTempWebExtensionFile(aData);
+
+ let { addon } = await promiseInstallFile(addonFile);
+ Services.obs.notifyObservers(addonFile, "flush-cache-entry");
+ return addon;
+}
+
+var checkUpdates = async function(
+ aData,
+ aReason = AddonManager.UPDATE_WHEN_PERIODIC_UPDATE
+) {
+ function provide(obj, path, value) {
+ path = path.split(".");
+ let prop = path.pop();
+
+ for (let key of path) {
+ if (!(key in obj)) {
+ obj[key] = {};
+ }
+ obj = obj[key];
+ }
+
+ if (!(prop in obj)) {
+ obj[prop] = value;
+ }
+ }
+
+ let id = uuidGenerator.generateUUID().number;
+ provide(aData, "addon.id", id);
+ provide(aData, "addon.manifest.applications.gecko.id", id);
+
+ let updatePath = `/updates/${id}.json`.replace(/[{}]/g, "");
+ let updateUrl = `http://localhost:${gPort}${updatePath}`;
+
+ let addonData = { updates: [] };
+ let manifestJSON = {
+ addons: { [id]: addonData },
+ };
+
+ provide(aData, "addon.manifest.applications.gecko.update_url", updateUrl);
+ let awaitInstall = promiseInstallWebExtension(aData.addon);
+
+ for (let version of Object.keys(aData.updates)) {
+ let update = aData.updates[version];
+ update.version = version;
+
+ provide(update, "addon.id", id);
+ provide(update, "addon.manifest.applications.gecko.id", id);
+ let addon = update.addon;
+
+ delete update.addon;
+
+ provide(addon, "manifest.version", version);
+ let file = createTempWebExtensionFile(addon);
+ file.moveTo(addonsDir, `${id}-${version}.xpi`.replace(/[{}]/g, ""));
+
+ let path = `/addons/${file.leafName}`;
+ provide(update, "update_link", `http://localhost:${gPort}${path}`);
+
+ addonData.updates.push(update);
+ }
+
+ mapManifest(updatePath, {
+ data: JSON.stringify(manifestJSON),
+ contentType: "application/json",
+ });
+
+ let addon = await awaitInstall;
+
+ let updates = await promiseFindAddonUpdates(addon, aReason);
+ updates.addon = addon;
+
+ return updates;
+};
+
+add_task(async function setup() {
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "42.0", "42.0");
+
+ await promiseStartupManager();
+ registerCleanupFunction(promiseShutdownManager);
+});
+
+// Check that compatibility updates are applied.
+add_task(async function checkUpdateMetadata() {
+ let update = await checkUpdates({
+ addon: {
+ manifest: {
+ version: "1.0",
+ applications: { gecko: { strict_max_version: "45" } },
+ },
+ },
+ updates: {
+ "1.0": {
+ applications: {
+ gecko: { strict_min_version: "40", strict_max_version: "48" },
+ },
+ },
+ },
+ });
+
+ ok(update.compatibilityUpdate, "have compat update");
+ ok(!update.updateAvailable, "have no add-on update");
+
+ ok(update.addon.isCompatibleWith("40", "40"), "compatible min");
+ ok(update.addon.isCompatibleWith("48", "48"), "compatible max");
+ ok(!update.addon.isCompatibleWith("49", "49"), "not compatible max");
+
+ await update.addon.uninstall();
+});
+
+// Check that updates from web extensions to web extensions succeed.
+add_task(async function checkUpdateToWebExt() {
+ let update = await checkUpdates({
+ addon: { manifest: { version: "1.0" } },
+ updates: {
+ "1.1": {},
+ "1.2": {},
+ "1.3": { applications: { gecko: { strict_min_version: "48" } } },
+ },
+ });
+
+ ok(!update.compatibilityUpdate, "have no compat update");
+ ok(update.updateAvailable, "have add-on update");
+
+ equal(update.addon.version, "1.0", "add-on version");
+
+ await update.updateAvailable.install();
+
+ let addon = await promiseAddonByID(update.addon.id);
+ equal(addon.version, "1.2", "new add-on version");
+
+ await addon.uninstall();
+});
+
+// Check that illegal update URLs are rejected.
+add_task(async function checkIllegalUpdateURL() {
+ const URLS = [
+ "chrome://browser/content/",
+ "data:text/json,...",
+ "javascript:;",
+ "/",
+ ];
+
+ for (let url of URLS) {
+ let { messages } = await promiseConsoleOutput(() => {
+ let addonFile = createTempWebExtensionFile({
+ manifest: { applications: { gecko: { update_url: url } } },
+ });
+
+ return AddonManager.getInstallForFile(addonFile).then(install => {
+ Services.obs.notifyObservers(addonFile, "flush-cache-entry");
+
+ if (!install || install.state != AddonManager.STATE_DOWNLOAD_FAILED) {
+ throw new Error("Unexpected state: " + (install && install.state));
+ }
+ });
+ });
+
+ ok(
+ messages.some(msg =>
+ /Access denied for URL|may not load or link to|is not a valid URL/.test(
+ msg
+ )
+ ),
+ "Got checkLoadURI error"
+ );
+ }
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_updatecheck.js b/toolkit/mozapps/extensions/test/xpcshell/test_updatecheck.js
new file mode 100644
index 0000000000..d269d5eb8d
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_updatecheck.js
@@ -0,0 +1,146 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// This verifies that AddonUpdateChecker works correctly
+
+const { AddonUpdateChecker } = ChromeUtils.import(
+ "resource://gre/modules/addons/AddonUpdateChecker.jsm"
+);
+
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1");
+
+var testserver = AddonTestUtils.createHttpServer({ hosts: ["example.com"] });
+
+testserver.registerDirectory("/data/", do_get_file("data"));
+
+function checkUpdates(aId) {
+ return new Promise((resolve, reject) => {
+ AddonUpdateChecker.checkForUpdates(
+ aId,
+ `http://example.com/data/test_updatecheck.json`,
+ {
+ onUpdateCheckComplete: resolve,
+
+ onUpdateCheckError(status) {
+ let error = new Error("Update check failed with status " + status);
+ error.status = status;
+ reject(error);
+ },
+ }
+ );
+ });
+}
+
+// Test that a basic update check returns the expected available updates
+add_task(async function test_basic_update() {
+ let updates = await checkUpdates("updatecheck1@tests.mozilla.org");
+
+ equal(updates.length, 5);
+ let update = await AddonUpdateChecker.getNewestCompatibleUpdate(updates);
+ notEqual(update, null);
+ equal(update.version, "3.0");
+ update = AddonUpdateChecker.getCompatibilityUpdate(updates, "2");
+ notEqual(update, null);
+ equal(update.version, "2.0");
+ equal(update.targetApplications[0].minVersion, "1");
+ equal(update.targetApplications[0].maxVersion, "2");
+});
+
+/*
+ * Tests that the security checks are applied correctly
+ *
+ * Test updateHash updateLink expected
+ *--------------------------------------------
+ * 4 absent http no update
+ * 5 sha1 http update
+ * 6 absent https update
+ * 7 sha1 https update
+ * 8 md2 http no update
+ * 9 md2 https update
+ */
+
+add_task(async function test_4() {
+ let updates = await checkUpdates("test_bug378216_8@tests.mozilla.org");
+ equal(updates.length, 1);
+ ok(!("updateURL" in updates[0]));
+});
+
+add_task(async function test_5() {
+ let updates = await checkUpdates("test_bug378216_9@tests.mozilla.org");
+ equal(updates.length, 1);
+ equal(updates[0].version, "2.0");
+ ok("updateURL" in updates[0]);
+});
+
+add_task(async function test_6() {
+ let updates = await checkUpdates("test_bug378216_10@tests.mozilla.org");
+ equal(updates.length, 1);
+ equal(updates[0].version, "2.0");
+ ok("updateURL" in updates[0]);
+});
+
+add_task(async function test_7() {
+ let updates = await checkUpdates("test_bug378216_11@tests.mozilla.org");
+ equal(updates.length, 1);
+ equal(updates[0].version, "2.0");
+ ok("updateURL" in updates[0]);
+});
+
+add_task(async function test_8() {
+ let updates = await checkUpdates("test_bug378216_12@tests.mozilla.org");
+ equal(updates.length, 1);
+ ok(!("updateURL" in updates[0]));
+});
+
+add_task(async function test_9() {
+ let updates = await checkUpdates("test_bug378216_13@tests.mozilla.org");
+ equal(updates.length, 1);
+ equal(updates[0].version, "2.0");
+ ok("updateURL" in updates[0]);
+});
+
+add_task(async function test_no_update_data() {
+ let updates = await checkUpdates("test_bug378216_14@tests.mozilla.org");
+ equal(updates.length, 0);
+});
+
+add_task(async function test_invalid_json() {
+ await checkUpdates("test_bug378216_15@tests.mozilla.org")
+ .then(() => {
+ ok(false, "Expected the update check to fail");
+ })
+ .catch(e => {
+ equal(
+ e.status,
+ AddonManager.ERROR_PARSE_ERROR,
+ "expected AddonManager.ERROR_PARSE_ERROR"
+ );
+ });
+});
+
+add_task(async function test_ignore_compat() {
+ let updates = await checkUpdates("ignore-compat@tests.mozilla.org");
+ equal(updates.length, 3);
+ let update = await AddonUpdateChecker.getNewestCompatibleUpdate(
+ updates,
+ null,
+ null,
+ true
+ );
+ notEqual(update, null);
+ equal(update.version, 2);
+});
+
+add_task(async function test_strict_compat() {
+ let updates = await checkUpdates("compat-strict-optin@tests.mozilla.org");
+ equal(updates.length, 1);
+ let update = await AddonUpdateChecker.getNewestCompatibleUpdate(
+ updates,
+ null,
+ null,
+ true,
+ false
+ );
+ equal(update, null);
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_updatecheck_errors.js b/toolkit/mozapps/extensions/test/xpcshell/test_updatecheck_errors.js
new file mode 100644
index 0000000000..dd027cea7c
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_updatecheck_errors.js
@@ -0,0 +1,52 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// This verifies that add-on update check failures are propagated correctly
+
+// The test extension uses an insecure update url.
+Services.prefs.setBoolPref("extensions.checkUpdateSecurity", false);
+
+var testserver;
+
+add_task(async function setup() {
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1.9.2");
+
+ // Create and configure the HTTP server.
+ testserver = createHttpServer({ hosts: ["example.com"] });
+ testserver.registerDirectory("/data/", do_get_file("data"));
+
+ await promiseStartupManager();
+});
+
+// Verify that an update check returns the correct errors.
+add_task(async function() {
+ await promiseInstallWebExtension({
+ manifest: {
+ name: "Test Addon 1",
+ version: "1.0",
+ applications: {
+ gecko: {
+ id: "addon1@tests.mozilla.org",
+ update_url: "http://example.com/data/test_missing.json",
+ },
+ },
+ },
+ });
+
+ let addon = await promiseAddonByID("addon1@tests.mozilla.org");
+ equal(addon.version, "1.0");
+
+ // We're expecting an error, so resolve when the promise is rejected.
+ let update = await promiseFindAddonUpdates(
+ addon,
+ AddonManager.UPDATE_WHEN_USER_REQUESTED
+ ).catch(e => e);
+
+ ok(!update.compatibilityUpdate, "not expecting a compatibility update");
+ ok(!update.updateAvailable, "not expecting a compatibility update");
+
+ equal(update.error, AddonManager.UPDATE_STATUS_DOWNLOAD_ERROR);
+
+ await addon.uninstall();
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_updatecheck_json.js b/toolkit/mozapps/extensions/test/xpcshell/test_updatecheck_json.js
new file mode 100644
index 0000000000..303fbbc696
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_updatecheck_json.js
@@ -0,0 +1,379 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+"use strict";
+
+// This verifies that AddonUpdateChecker works correctly for JSON
+// update manifests, particularly for behavior which does not
+// cleanly overlap with RDF manifests.
+
+const TOOLKIT_ID = "toolkit@mozilla.org";
+const TOOLKIT_MINVERSION = "42.0a1";
+
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "42.0a2", "42.0a2");
+
+const { AddonUpdateChecker } = ChromeUtils.import(
+ "resource://gre/modules/addons/AddonUpdateChecker.jsm"
+);
+
+let testserver = createHttpServer();
+gPort = testserver.identity.primaryPort;
+
+let gUpdateManifests = {};
+
+function mapManifest(aPath, aManifestData) {
+ gUpdateManifests[aPath] = aManifestData;
+ testserver.registerPathHandler(aPath, serveManifest);
+}
+
+function serveManifest(request, response) {
+ let manifest = gUpdateManifests[request.path];
+
+ response.setHeader("Content-Type", manifest.contentType, false);
+ response.write(manifest.data);
+}
+
+const extensionsDir = gProfD.clone();
+extensionsDir.append("extensions");
+
+function checkUpdates(aData) {
+ // Registers JSON update manifest for it with the testing server,
+ // checks for updates, and yields the list of updates on
+ // success.
+
+ let extension = aData.manifestExtension || "json";
+
+ let path = `/updates/${aData.id}.${extension}`;
+ let updateUrl = `http://localhost:${gPort}${path}`;
+
+ let addonData = {};
+ if ("updates" in aData) {
+ addonData.updates = aData.updates;
+ }
+
+ let manifestJSON = {
+ addons: {
+ [aData.id]: addonData,
+ },
+ };
+
+ mapManifest(path.replace(/\?.*/, ""), {
+ data: JSON.stringify(manifestJSON),
+ contentType: aData.contentType || "application/json",
+ });
+
+ return new Promise((resolve, reject) => {
+ AddonUpdateChecker.checkForUpdates(aData.id, updateUrl, {
+ onUpdateCheckComplete: resolve,
+
+ onUpdateCheckError(status) {
+ reject(new Error("Update check failed with status " + status));
+ },
+ });
+ });
+}
+
+add_task(async function test_default_values() {
+ // Checks that the appropriate defaults are used for omitted values.
+
+ await promiseStartupManager();
+
+ let updates = await checkUpdates({
+ id: "updatecheck-defaults@tests.mozilla.org",
+ version: "0.1",
+ updates: [
+ {
+ version: "0.2",
+ },
+ ],
+ });
+
+ equal(updates.length, 1);
+ let update = updates[0];
+
+ equal(update.targetApplications.length, 2);
+ let targetApp = update.targetApplications[0];
+
+ equal(targetApp.id, TOOLKIT_ID);
+ equal(targetApp.minVersion, TOOLKIT_MINVERSION);
+ equal(targetApp.maxVersion, "*");
+
+ equal(update.version, "0.2");
+ equal(update.strictCompatibility, false, "inferred strictConpatibility flag");
+ equal(update.updateURL, null, "updateURL");
+ equal(update.updateHash, null, "updateHash");
+ equal(update.updateInfoURL, null, "updateInfoURL");
+
+ // If there's no applications property, we default to using one
+ // containing "gecko". If there is an applications property, but
+ // it doesn't contain "gecko", the update is skipped.
+ updates = await checkUpdates({
+ id: "updatecheck-defaults@tests.mozilla.org",
+ version: "0.1",
+ updates: [
+ {
+ version: "0.2",
+ applications: { foo: {} },
+ },
+ ],
+ });
+
+ equal(updates.length, 0);
+
+ // Updates property is also optional. No updates, but also no error.
+ updates = await checkUpdates({
+ id: "updatecheck-defaults@tests.mozilla.org",
+ version: "0.1",
+ });
+
+ equal(updates.length, 0);
+});
+
+add_task(async function test_explicit_values() {
+ // Checks that the appropriate explicit values are used when
+ // provided.
+
+ let updates = await checkUpdates({
+ id: "updatecheck-explicit@tests.mozilla.org",
+ version: "0.1",
+ updates: [
+ {
+ version: "0.2",
+ update_link: "https://example.com/foo.xpi",
+ update_hash: "sha256:0",
+ update_info_url: "https://example.com/update_info.html",
+ applications: {
+ gecko: {
+ strict_min_version: "42.0a2.xpcshell",
+ strict_max_version: "43.xpcshell",
+ },
+ },
+ },
+ ],
+ });
+
+ equal(updates.length, 1);
+ let update = updates[0];
+
+ equal(update.targetApplications.length, 2);
+ let targetApp = update.targetApplications[0];
+
+ equal(targetApp.id, TOOLKIT_ID);
+ equal(targetApp.minVersion, "42.0a2.xpcshell");
+ equal(targetApp.maxVersion, "43.xpcshell");
+
+ equal(update.version, "0.2");
+ equal(update.strictCompatibility, true, "inferred strictCompatibility flag");
+ equal(update.updateURL, "https://example.com/foo.xpi", "updateURL");
+ equal(update.updateHash, "sha256:0", "updateHash");
+ equal(
+ update.updateInfoURL,
+ "https://example.com/update_info.html",
+ "updateInfoURL"
+ );
+});
+
+add_task(async function test_secure_hashes() {
+ // Checks that only secure hash functions are accepted for
+ // non-secure update URLs.
+
+ let hashFunctions = ["sha512", "sha256", "sha1", "md5", "md4", "xxx"];
+
+ let updateItems = hashFunctions.map((hash, idx) => ({
+ version: `0.${idx}`,
+ update_link: `http://localhost:${gPort}/updates/${idx}-${hash}.xpi`,
+ update_hash: `${hash}:08ac852190ecd81f40a514ea9299fe9143d9ab5e296b97e73fb2a314de49648a`,
+ }));
+
+ let { messages, result: updates } = await promiseConsoleOutput(() => {
+ return checkUpdates({
+ id: "updatecheck-hashes@tests.mozilla.org",
+ version: "0.1",
+ updates: updateItems,
+ });
+ });
+
+ equal(updates.length, hashFunctions.length);
+
+ updates = updates.filter(update => update.updateHash || update.updateURL);
+ equal(updates.length, 2, "expected number of update hashes were accepted");
+
+ ok(updates[0].updateHash.startsWith("sha512:"), "sha512 hash is present");
+ ok(updates[0].updateURL);
+
+ ok(updates[1].updateHash.startsWith("sha256:"), "sha256 hash is present");
+ ok(updates[1].updateURL);
+
+ messages = messages.filter(msg =>
+ /Update link.*not secure.*strong enough hash \(needs to be sha256 or sha512\)/.test(
+ msg.message
+ )
+ );
+ equal(
+ messages.length,
+ hashFunctions.length - 2,
+ "insecure hashes generated the expected warning"
+ );
+});
+
+add_task(async function test_strict_compat() {
+ // Checks that strict compatibility is enabled for strict max
+ // versions other than "*", but not for advisory max versions.
+ // Also, ensure that strict max versions take precedence over
+ // advisory versions.
+
+ let { messages, result: updates } = await promiseConsoleOutput(() => {
+ return checkUpdates({
+ id: "updatecheck-strict@tests.mozilla.org",
+ version: "0.1",
+ updates: [
+ {
+ version: "0.2",
+ applications: { gecko: { strict_max_version: "*" } },
+ },
+ {
+ version: "0.3",
+ applications: { gecko: { strict_max_version: "43" } },
+ },
+ {
+ version: "0.4",
+ applications: { gecko: { advisory_max_version: "43" } },
+ },
+ {
+ version: "0.5",
+ applications: {
+ gecko: { advisory_max_version: "43", strict_max_version: "44" },
+ },
+ },
+ ],
+ });
+ });
+
+ equal(updates.length, 4, "all update items accepted");
+
+ equal(updates[0].targetApplications[0].maxVersion, "*");
+ equal(updates[0].strictCompatibility, false);
+
+ equal(updates[1].targetApplications[0].maxVersion, "43");
+ equal(updates[1].strictCompatibility, true);
+
+ equal(updates[2].targetApplications[0].maxVersion, "43");
+ equal(updates[2].strictCompatibility, false);
+
+ equal(updates[3].targetApplications[0].maxVersion, "44");
+ equal(updates[3].strictCompatibility, true);
+
+ messages = messages.filter(msg =>
+ /Ignoring 'advisory_max_version'.*'strict_max_version' also present/.test(
+ msg.message
+ )
+ );
+ equal(
+ messages.length,
+ 1,
+ "mix of advisory_max_version and strict_max_version generated the expected warning"
+ );
+});
+
+add_task(async function test_update_url_security() {
+ // Checks that update links to privileged URLs are not accepted.
+
+ let { messages, result: updates } = await promiseConsoleOutput(() => {
+ return checkUpdates({
+ id: "updatecheck-security@tests.mozilla.org",
+ version: "0.1",
+ updates: [
+ {
+ version: "0.2",
+ update_link: "chrome://browser/content/browser.xhtml",
+ update_hash:
+ "sha256:08ac852190ecd81f40a514ea9299fe9143d9ab5e296b97e73fb2a314de49648a",
+ },
+ {
+ version: "0.3",
+ update_link: "http://example.com/update.xpi",
+ update_hash:
+ "sha256:18ac852190ecd81f40a514ea9299fe9143d9ab5e296b97e73fb2a314de49648a",
+ },
+ ],
+ });
+ });
+
+ equal(updates.length, 2, "both updates were processed");
+ equal(updates[0].updateURL, null, "privileged update URL was removed");
+ equal(
+ updates[1].updateURL,
+ "http://example.com/update.xpi",
+ "safe update URL was accepted"
+ );
+
+ messages = messages.filter(msg =>
+ /http:\/\/localhost.*\/updates\/.*may not load or link to chrome:/.test(
+ msg.message
+ )
+ );
+ equal(
+ messages.length,
+ 1,
+ "privileged update URL generated the expected console message"
+ );
+});
+
+add_task(async function test_type_detection() {
+ // Checks that JSON update manifests are detected correctly
+ // regardless of extension or MIME type.
+
+ let tests = [
+ { contentType: "application/json", extension: "json", valid: true },
+ { contentType: "application/json", extension: "php", valid: true },
+ { contentType: "text/plain", extension: "json", valid: true },
+ { contentType: "application/octet-stream", extension: "json", valid: true },
+ { contentType: "text/plain", extension: "json?foo=bar", valid: true },
+ { contentType: "text/plain", extension: "php", valid: true },
+ { contentType: "text/plain", extension: "rdf", valid: true },
+ { contentType: "application/json", extension: "rdf", valid: true },
+ { contentType: "text/xml", extension: "json", valid: true },
+ { contentType: "application/rdf+xml", extension: "json", valid: true },
+ ];
+
+ for (let [i, test] of tests.entries()) {
+ let { messages } = await promiseConsoleOutput(async function() {
+ let id = `updatecheck-typedetection-${i}@tests.mozilla.org`;
+ let updates;
+ try {
+ updates = await checkUpdates({
+ id,
+ version: "0.1",
+ contentType: test.contentType,
+ manifestExtension: test.extension,
+ updates: [{ version: "0.2" }],
+ });
+ } catch (e) {
+ ok(!test.valid, "update manifest correctly detected as RDF");
+ return;
+ }
+
+ ok(test.valid, "update manifest correctly detected as JSON");
+ equal(updates.length, 1, "correct number of updates");
+ equal(updates[0].id, id, "update is for correct extension");
+ });
+
+ if (test.valid) {
+ // Make sure we don't get any XML parsing errors from the
+ // XMLHttpRequest machinery.
+ ok(
+ !messages.some(msg => /not well-formed/.test(msg.message)),
+ "expect XMLHttpRequest not to attempt XML parsing"
+ );
+ }
+
+ messages = messages.filter(msg =>
+ /Update manifest was not valid XML/.test(msg.message)
+ );
+ equal(
+ messages.length,
+ !test.valid,
+ "expected number of XML parsing errors"
+ );
+ }
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_updateid.js b/toolkit/mozapps/extensions/test/xpcshell/test_updateid.js
new file mode 100644
index 0000000000..5249aeb743
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_updateid.js
@@ -0,0 +1,80 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// This verifies that updating an add-on to a new ID does not work.
+
+// The test extension uses an insecure update url.
+Services.prefs.setBoolPref("extensions.checkUpdateSecurity", false);
+
+let testserver = AddonTestUtils.createHttpServer({ hosts: ["example.com"] });
+
+const ID = "updateid@tests.mozilla.org";
+
+// Verify that an update to an add-on with a new ID fails
+add_task(async function test_update_new_id() {
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1");
+ await promiseStartupManager();
+
+ await promiseInstallWebExtension({
+ manifest: {
+ version: "1.0",
+ applications: {
+ gecko: {
+ id: ID,
+ update_url: "http://example.com/update.json",
+ },
+ },
+ },
+ });
+
+ let xpi = await createTempWebExtensionFile({
+ manifest: {
+ version: "2.0",
+ applications: { gecko: { id: "differentid@tests.mozilla.org" } },
+ },
+ });
+
+ testserver.registerFile("/addon.xpi", xpi);
+ AddonTestUtils.registerJSON(testserver, "/update.json", {
+ addons: {
+ [ID]: {
+ updates: [
+ {
+ version: "2.0",
+ update_link: "http://example.com/addon.xpi",
+ applications: {
+ gecko: {
+ strict_min_version: "1",
+ strict_max_version: "10",
+ },
+ },
+ },
+ ],
+ },
+ },
+ });
+
+ let addon = await promiseAddonByID(ID);
+ Assert.notEqual(addon, null);
+ Assert.equal(addon.version, "1.0");
+
+ let update = await promiseFindAddonUpdates(
+ addon,
+ AddonManager.UPDATE_WHEN_USER_REQUESTED
+ );
+ let install = update.updateAvailable;
+ Assert.notEqual(install, null, "Found available update");
+ Assert.equal(install.name, addon.name);
+ Assert.equal(install.version, "2.0");
+ Assert.equal(install.state, AddonManager.STATE_AVAILABLE);
+ Assert.equal(install.existingAddon, addon);
+
+ await Assert.rejects(
+ install.install(),
+ err => install.error == AddonManager.ERROR_INCORRECT_ID,
+ "Upgrade to a different ID fails"
+ );
+
+ await addon.uninstall();
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_upgrade.js b/toolkit/mozapps/extensions/test/xpcshell/test_upgrade.js
new file mode 100644
index 0000000000..577022a240
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_upgrade.js
@@ -0,0 +1,208 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+// Make Cu.isInAutomation true.
+Services.prefs.setBoolPref(
+ "security.turn_off_all_security_so_that_viruses_can_take_over_this_computer",
+ true
+);
+
+// This verifies that app upgrades produce the expected behaviours,
+// with strict compatibility checking disabled.
+
+// turn on Cu.isInAutomation
+Services.prefs.setBoolPref(PREF_DISABLE_SECURITY, true);
+
+Services.prefs.setBoolPref(PREF_EM_STRICT_COMPATIBILITY, false);
+
+// Enable loading extensions from the application scope
+Services.prefs.setIntPref(
+ "extensions.enabledScopes",
+ AddonManager.SCOPE_PROFILE | AddonManager.SCOPE_APPLICATION
+);
+Services.prefs.setIntPref("extensions.sideloadScopes", AddonManager.SCOPE_ALL);
+
+const profileDir = gProfD.clone();
+profileDir.append("extensions");
+
+const globalDir = Services.dirsvc.get("XREAddonAppDir", Ci.nsIFile);
+globalDir.append("extensions");
+
+var gGlobalExisted = globalDir.exists();
+var gInstallTime = Date.now();
+
+const ID1 = "addon1@tests.mozilla.org";
+const ID2 = "addon2@tests.mozilla.org";
+const ID3 = "addon3@tests.mozilla.org";
+const ID4 = "addon4@tests.mozilla.org";
+const PATH4 = OS.Path.join(globalDir.path, `${ID4}.xpi`);
+
+add_task(async function setup() {
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1.9.2");
+
+ // Will be compatible in the first version and incompatible in subsequent versions
+ let xpi = await createAddon({
+ id: ID1,
+ targetApplications: [
+ {
+ id: "xpcshell@tests.mozilla.org",
+ minVersion: "1",
+ maxVersion: "1",
+ },
+ ],
+ targetPlatforms: [{ os: "XPCShell" }, { os: "WINNT_x86" }],
+ });
+ await manuallyInstall(xpi, profileDir, ID1);
+
+ // Works in all tested versions
+ xpi = await createAddon({
+ id: ID2,
+ targetApplications: [
+ {
+ id: "xpcshell@tests.mozilla.org",
+ minVersion: "1",
+ maxVersion: "2",
+ },
+ ],
+ targetPlatforms: [
+ {
+ os: "XPCShell",
+ abi: "noarch-spidermonkey",
+ },
+ ],
+ });
+ await manuallyInstall(xpi, profileDir, ID2);
+
+ // Will be disabled in the first version and enabled in the second.
+ xpi = createAddon({
+ id: ID3,
+ targetApplications: [
+ {
+ id: "xpcshell@tests.mozilla.org",
+ minVersion: "2",
+ maxVersion: "2",
+ },
+ ],
+ });
+ await manuallyInstall(xpi, profileDir, ID3);
+
+ // Will be compatible in both versions but will change version in between
+ xpi = await createAddon({
+ id: ID4,
+ version: "1.0",
+ targetApplications: [
+ {
+ id: "xpcshell@tests.mozilla.org",
+ minVersion: "1",
+ maxVersion: "1",
+ },
+ ],
+ });
+ await manuallyInstall(xpi, globalDir, ID4);
+ await promiseSetExtensionModifiedTime(PATH4, gInstallTime);
+});
+
+registerCleanupFunction(function end_test() {
+ if (!gGlobalExisted) {
+ globalDir.remove(true);
+ } else {
+ globalDir.append(do_get_expected_addon_name(ID4));
+ globalDir.remove(true);
+ }
+});
+
+// Test that the test extensions are all installed
+add_task(async function test_1() {
+ await promiseStartupManager();
+
+ let [a1, a2, a3, a4] = await promiseAddonsByIDs([ID1, ID2, ID3, ID4]);
+ Assert.notEqual(a1, null, "Found extension 1");
+ Assert.equal(a1.isActive, true, "Extension 1 is active");
+
+ Assert.notEqual(a2, null, "Found extension 2");
+ Assert.equal(a2.isActive, true, "Extension 2 is active");
+
+ Assert.notEqual(a3, null, "Found extension 3");
+ Assert.equal(a3.isActive, false, "Extension 3 is not active");
+
+ Assert.notEqual(a4, null);
+ Assert.equal(a4.isActive, true);
+ Assert.equal(a4.version, "1.0");
+});
+
+// Test that upgrading the application doesn't disable now incompatible add-ons
+add_task(async function test_2() {
+ await promiseShutdownManager();
+
+ // Upgrade the extension
+ let xpi = createAddon({
+ id: ID4,
+ version: "2.0",
+ targetApplications: [
+ {
+ id: "xpcshell@tests.mozilla.org",
+ minVersion: "2",
+ maxVersion: "2",
+ },
+ ],
+ });
+ await manuallyInstall(xpi, globalDir, ID4);
+ await promiseSetExtensionModifiedTime(PATH4, gInstallTime);
+
+ await promiseStartupManager("2");
+ let [a1, a2, a3, a4] = await promiseAddonsByIDs([ID1, ID2, ID3, ID4]);
+ Assert.notEqual(a1, null);
+ Assert.ok(isExtensionInBootstrappedList(profileDir, a1.id));
+
+ Assert.notEqual(a2, null);
+ Assert.ok(isExtensionInBootstrappedList(profileDir, a2.id));
+
+ Assert.notEqual(a3, null);
+ Assert.ok(isExtensionInBootstrappedList(profileDir, a3.id));
+
+ Assert.notEqual(a4, null);
+ Assert.ok(isExtensionInBootstrappedList(globalDir, a4.id));
+ Assert.equal(a4.version, "2.0");
+});
+
+// Test that nothing changes when only the build ID changes.
+add_task(async function test_3() {
+ await promiseShutdownManager();
+
+ // Upgrade the extension
+ let xpi = createAddon({
+ id: ID4,
+ version: "3.0",
+ targetApplications: [
+ {
+ id: "xpcshell@tests.mozilla.org",
+ minVersion: "3",
+ maxVersion: "3",
+ },
+ ],
+ });
+ await manuallyInstall(xpi, globalDir, ID4);
+ await promiseSetExtensionModifiedTime(PATH4, gInstallTime);
+
+ // Simulates a simple Build ID change
+ gAddonStartup.remove(true);
+ await promiseStartupManager();
+
+ let [a1, a2, a3, a4] = await promiseAddonsByIDs([ID1, ID2, ID3, ID4]);
+
+ Assert.notEqual(a1, null);
+ Assert.ok(isExtensionInBootstrappedList(profileDir, a1.id));
+
+ Assert.notEqual(a2, null);
+ Assert.ok(isExtensionInBootstrappedList(profileDir, a2.id));
+
+ Assert.notEqual(a3, null);
+ Assert.ok(isExtensionInBootstrappedList(profileDir, a3.id));
+
+ Assert.notEqual(a4, null);
+ Assert.ok(isExtensionInBootstrappedList(globalDir, a4.id));
+ Assert.equal(a4.version, "2.0");
+
+ await promiseShutdownManager();
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_upgrade_incompatible.js b/toolkit/mozapps/extensions/test/xpcshell/test_upgrade_incompatible.js
new file mode 100644
index 0000000000..70e40fa29b
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_upgrade_incompatible.js
@@ -0,0 +1,76 @@
+// turn on Cu.isInAutomation
+Services.prefs.setBoolPref(PREF_DISABLE_SECURITY, true);
+
+// Tests that when an extension manifest that was previously valid becomes
+// unparseable after an application update, the extension becomes
+// disabled. (See bug 1439600 for a concrete example of a situation where
+// this happened).
+add_task(async function test_upgrade_incompatible() {
+ const ID = "incompatible-upgrade@tests.mozilla.org";
+
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1.9.2");
+
+ await promiseStartupManager();
+
+ let file = createTempWebExtensionFile({
+ manifest: {
+ applications: { gecko: { id: ID } },
+ },
+ });
+
+ let { addon } = await promiseInstallFile(file);
+
+ notEqual(addon, null);
+ equal(addon.appDisabled, false);
+
+ await promiseShutdownManager();
+
+ // Create a new, incompatible extension
+ let newfile = createTempWebExtensionFile({
+ manifest: {
+ applications: { gecko: { id: ID } },
+ manifest_version: 1,
+ },
+ });
+
+ // swap the incompatible extension in for the original
+ let path = OS.Path.join(gProfD.path, "extensions", `${ID}.xpi`);
+ let fileInfo = await IOUtils.stat(path);
+ let timestamp = fileInfo.lastModified;
+
+ await IOUtils.move(newfile.path, path);
+ await promiseSetExtensionModifiedTime(path, timestamp);
+ Services.obs.notifyObservers(new FileUtils.File(path), "flush-cache-entry");
+
+ // Restart. With the change to the DB schema we recompute compatibility.
+ // With an unparseable manifest the addon should become disabled.
+ Services.prefs.setIntPref("extensions.databaseSchema", 0);
+ await promiseStartupManager();
+
+ addon = await promiseAddonByID(ID);
+ notEqual(addon, null);
+ equal(addon.appDisabled, true);
+
+ await promiseShutdownManager();
+
+ file = createTempWebExtensionFile({
+ manifest: {
+ applications: { gecko: { id: ID } },
+ },
+ });
+
+ // swap the old extension back in and check that we don't persist the disabled state forever.
+ await IOUtils.move(file.path, path);
+ await promiseSetExtensionModifiedTime(path, timestamp);
+ Services.obs.notifyObservers(new FileUtils.File(path), "flush-cache-entry");
+
+ // Restart. With the change to the DB schema we recompute compatibility.
+ Services.prefs.setIntPref("extensions.databaseSchema", 0);
+ await promiseStartupManager();
+
+ addon = await promiseAddonByID(ID);
+ notEqual(addon, null);
+ equal(addon.appDisabled, false);
+
+ await promiseShutdownManager();
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_webextension.js b/toolkit/mozapps/extensions/test/xpcshell/test_webextension.js
new file mode 100644
index 0000000000..dd4cbce8a5
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_webextension.js
@@ -0,0 +1,513 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+const ID = "webextension1@tests.mozilla.org";
+
+const profileDir = gProfD.clone();
+profileDir.append("extensions");
+
+const ADDONS = {
+ webextension_1: {
+ "manifest.json": {
+ name: "Web Extension Name",
+ version: "1.0",
+ manifest_version: 2,
+ applications: {
+ gecko: {
+ id: "webextension1@tests.mozilla.org",
+ },
+ },
+ icons: {
+ "48": "icon48.png",
+ "64": "icon64.png",
+ },
+ },
+ "chrome.manifest": "content webex ./\n",
+ },
+ webextension_3: {
+ "manifest.json": {
+ name: "Web Extensiøn __MSG_name__",
+ description: "Descriptïon __MSG_desc__ of add-on",
+ version: "1.0",
+ manifest_version: 2,
+ default_locale: "en",
+ applications: {
+ gecko: {
+ id: "webextension3@tests.mozilla.org",
+ },
+ },
+ },
+ "_locales/en/messages.json": {
+ name: {
+ message: "foo ☹",
+ description: "foo",
+ },
+ desc: {
+ message: "bar ☹",
+ description: "bar",
+ },
+ },
+ "_locales/fr/messages.json": {
+ name: {
+ message: "le foo ☺",
+ description: "foo",
+ },
+ desc: {
+ message: "le bar ☺",
+ description: "bar",
+ },
+ },
+ },
+};
+
+let chromeReg = Cc["@mozilla.org/chrome/chrome-registry;1"].getService(
+ Ci.nsIChromeRegistry
+);
+
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "42");
+
+const { GlobalManager } = ChromeUtils.import(
+ "resource://gre/modules/Extension.jsm",
+ null
+);
+
+add_task(async function test_1() {
+ await promiseStartupManager();
+
+ equal(GlobalManager.extensionMap.size, 0);
+
+ let { addon } = await AddonTestUtils.promiseInstallXPI(ADDONS.webextension_1);
+
+ equal(GlobalManager.extensionMap.size, 1);
+ ok(GlobalManager.extensionMap.has(ID));
+
+ Assert.throws(
+ () =>
+ chromeReg.convertChromeURL(
+ Services.io.newURI("chrome://webex/content/webex.xul")
+ ),
+ error => error.result == Cr.NS_ERROR_FILE_NOT_FOUND,
+ "Chrome manifest should not have been registered"
+ );
+
+ let uri = do_get_addon_root_uri(profileDir, ID);
+
+ checkAddon(ID, addon, {
+ version: "1.0",
+ name: "Web Extension Name",
+ isCompatible: true,
+ appDisabled: false,
+ isActive: true,
+ isSystem: false,
+ type: "extension",
+ isWebExtension: true,
+ signedState: AddonManager.SIGNEDSTATE_PRIVILEGED,
+ iconURL: `${uri}icon48.png`,
+ });
+
+ // Should persist through a restart
+ await promiseShutdownManager();
+
+ equal(GlobalManager.extensionMap.size, 0);
+
+ await promiseStartupManager();
+
+ equal(GlobalManager.extensionMap.size, 1);
+ ok(GlobalManager.extensionMap.has(ID));
+
+ addon = await promiseAddonByID(ID);
+
+ uri = do_get_addon_root_uri(profileDir, ID);
+
+ checkAddon(ID, addon, {
+ version: "1.0",
+ name: "Web Extension Name",
+ isCompatible: true,
+ appDisabled: false,
+ isActive: true,
+ isSystem: false,
+ type: "extension",
+ signedState: AddonManager.SIGNEDSTATE_PRIVILEGED,
+ iconURL: `${uri}icon48.png`,
+ });
+
+ await addon.disable();
+
+ equal(GlobalManager.extensionMap.size, 0);
+
+ await addon.enable();
+
+ equal(GlobalManager.extensionMap.size, 1);
+ ok(GlobalManager.extensionMap.has(ID));
+
+ await addon.uninstall();
+
+ equal(GlobalManager.extensionMap.size, 0);
+ Assert.ok(!GlobalManager.extensionMap.has(ID));
+
+ await promiseShutdownManager();
+});
+
+// Writing the manifest direct to the profile should work
+add_task(async function test_2() {
+ await promiseWriteWebManifestForExtension(
+ {
+ name: "Web Extension Name",
+ version: "1.0",
+ manifest_version: 2,
+ applications: {
+ gecko: {
+ id: ID,
+ },
+ },
+ },
+ profileDir
+ );
+
+ await promiseStartupManager();
+
+ let addon = await promiseAddonByID(ID);
+ checkAddon(ID, addon, {
+ version: "1.0",
+ name: "Web Extension Name",
+ isCompatible: true,
+ appDisabled: false,
+ isActive: true,
+ isSystem: false,
+ type: "extension",
+ signedState: AddonManager.SIGNEDSTATE_PRIVILEGED,
+ });
+
+ await addon.uninstall();
+
+ await promiseRestartManager();
+});
+
+add_task(async function test_manifest_localization() {
+ const extensionId = "webextension3@tests.mozilla.org";
+
+ let { addon } = await AddonTestUtils.promiseInstallXPI(ADDONS.webextension_3);
+
+ await addon.disable();
+
+ checkAddon(ID, addon, {
+ name: "Web Extensiøn foo ☹",
+ description: "Descriptïon bar ☹ of add-on",
+ });
+
+ await restartWithLocales(["fr-FR"]);
+
+ addon = await promiseAddonByID(extensionId);
+ checkAddon(ID, addon, {
+ name: "Web Extensiøn le foo ☺",
+ description: "Descriptïon le bar ☺ of add-on",
+ });
+
+ await restartWithLocales(["de"]);
+
+ addon = await promiseAddonByID(extensionId);
+ checkAddon(ID, addon, {
+ name: "Web Extensiøn foo ☹",
+ description: "Descriptïon bar ☹ of add-on",
+ });
+
+ await addon.uninstall();
+});
+
+// Missing version should cause a failure
+add_task(async function test_3() {
+ await promiseWriteWebManifestForExtension(
+ {
+ name: "Web Extension Name",
+ manifest_version: 2,
+ applications: {
+ gecko: {
+ id: ID,
+ },
+ },
+ },
+ profileDir
+ );
+
+ await promiseRestartManager();
+
+ let addon = await promiseAddonByID(ID);
+ Assert.equal(addon, null);
+
+ let file = getFileForAddon(profileDir, ID);
+ Assert.ok(!file.exists());
+
+ await promiseRestartManager();
+});
+
+// Incorrect manifest version should cause a failure
+add_task(async function test_4() {
+ await promiseWriteWebManifestForExtension(
+ {
+ name: "Web Extension Name",
+ version: "1.0",
+ manifest_version: 1,
+ applications: {
+ gecko: {
+ id: ID,
+ },
+ },
+ },
+ profileDir
+ );
+
+ await promiseRestartManager();
+
+ let addon = await promiseAddonByID(ID);
+ Assert.equal(addon, null);
+
+ let file = getFileForAddon(profileDir, ID);
+ Assert.ok(!file.exists());
+
+ await promiseRestartManager();
+});
+
+// Test that the "options_ui" manifest section is processed correctly.
+add_task(async function test_options_ui() {
+ let OPTIONS_RE = /^moz-extension:\/\/[\da-f]{8}-[\da-f]{4}-[\da-f]{4}-[\da-f]{4}-[\da-f]{12}\/options\.html$/;
+
+ const extensionId = "webextension@tests.mozilla.org";
+ let addon = await promiseInstallWebExtension({
+ manifest: {
+ applications: { gecko: { id: extensionId } },
+ options_ui: {
+ page: "options.html",
+ },
+ },
+ });
+
+ checkAddon(extensionId, addon, {
+ optionsType: AddonManager.OPTIONS_TYPE_INLINE_BROWSER,
+ });
+
+ ok(
+ OPTIONS_RE.test(addon.optionsURL),
+ "Addon should have a moz-extension: options URL for /options.html"
+ );
+
+ await addon.uninstall();
+
+ const ID2 = "webextension2@tests.mozilla.org";
+ addon = await promiseInstallWebExtension({
+ manifest: {
+ applications: { gecko: { id: ID2 } },
+ options_ui: {
+ page: "options.html",
+ open_in_tab: true,
+ },
+ },
+ });
+
+ checkAddon(ID2, addon, {
+ optionsType: AddonManager.OPTIONS_TYPE_TAB,
+ });
+
+ ok(
+ OPTIONS_RE.test(addon.optionsURL),
+ "Addon should have a moz-extension: options URL for /options.html"
+ );
+
+ await addon.uninstall();
+});
+
+// Test that experiments permissions add the appropriate dependencies.
+add_task(async function test_experiments_dependencies() {
+ let addon = await promiseInstallWebExtension({
+ manifest: {
+ applications: { gecko: { id: "meh@experiment" } },
+ permissions: ["experiments.meh"],
+ },
+ });
+
+ checkAddon(addon.id, addon, {
+ dependencies: ["meh@experiments.addons.mozilla.org"],
+ // Add-on should be app disabled due to missing dependencies
+ appDisabled: true,
+ });
+
+ await addon.uninstall();
+});
+
+add_task(async function developerShouldOverride() {
+ let addon = await promiseInstallWebExtension({
+ manifest: {
+ default_locale: "en",
+ developer: {
+ name: "__MSG_name__",
+ url: "__MSG_url__",
+ },
+ author: "Will be overridden by developer",
+ homepage_url: "https://will.be.overridden",
+ },
+ files: {
+ "_locales/en/messages.json": `{
+ "name": {
+ "message": "en name"
+ },
+ "url": {
+ "message": "https://example.net/en"
+ }
+ }`,
+ },
+ });
+
+ checkAddon(ID, addon, {
+ creator: "en name",
+ homepageURL: "https://example.net/en",
+ });
+
+ await addon.uninstall();
+});
+
+add_task(async function developerEmpty() {
+ for (let developer of [{}, null, { name: null, url: null }]) {
+ let addon = await promiseInstallWebExtension({
+ manifest: {
+ author: "Some author",
+ developer,
+ homepage_url: "https://example.net",
+ manifest_version: 2,
+ name: "Web Extension Name",
+ version: "1.0",
+ },
+ });
+
+ checkAddon(ID, addon, {
+ creator: "Some author",
+ homepageURL: "https://example.net",
+ });
+
+ await addon.uninstall();
+ }
+});
+
+add_task(async function authorNotString() {
+ ExtensionTestUtils.failOnSchemaWarnings(false);
+ for (let author of [{}, [], 42]) {
+ let addon = await promiseInstallWebExtension({
+ manifest: {
+ author,
+ manifest_version: 2,
+ name: "Web Extension Name",
+ version: "1.0",
+ },
+ });
+
+ checkAddon(ID, addon, {
+ creator: null,
+ });
+
+ await addon.uninstall();
+ }
+ ExtensionTestUtils.failOnSchemaWarnings(true);
+});
+
+add_task(async function testThemeExtension() {
+ let addon = await promiseInstallWebExtension({
+ manifest: {
+ author: "Some author",
+ manifest_version: 2,
+ name: "Web Extension Name",
+ version: "1.0",
+ theme: { images: { theme_frame: "example.png" } },
+ },
+ });
+
+ checkAddon(ID, addon, {
+ creator: "Some author",
+ version: "1.0",
+ name: "Web Extension Name",
+ isCompatible: true,
+ appDisabled: false,
+ isActive: false,
+ userDisabled: true,
+ isSystem: false,
+ type: "theme",
+ isWebExtension: true,
+ signedState: AddonManager.SIGNEDSTATE_PRIVILEGED,
+ });
+
+ await addon.uninstall();
+
+ // Also test one without a proper 'theme' section.
+ ExtensionTestUtils.failOnSchemaWarnings(false);
+ addon = await promiseInstallWebExtension({
+ manifest: {
+ author: "Some author",
+ manifest_version: 2,
+ name: "Web Extension Name",
+ version: "1.0",
+ theme: null,
+ },
+ });
+ ExtensionTestUtils.failOnSchemaWarnings(true);
+
+ checkAddon(ID, addon, {
+ type: "extension",
+ isWebExtension: true,
+ });
+
+ await addon.uninstall();
+});
+
+// Test that we can update from a webextension to a webextension-theme
+add_task(async function test_theme_upgrade() {
+ // First install a regular webextension
+ let addon = await promiseInstallWebExtension({
+ manifest: {
+ version: "1.0",
+ name: "Test WebExtension 1 (temporary)",
+ applications: {
+ gecko: {
+ id: ID,
+ },
+ },
+ },
+ });
+
+ checkAddon(ID, addon, {
+ version: "1.0",
+ name: "Test WebExtension 1 (temporary)",
+ isCompatible: true,
+ appDisabled: false,
+ isActive: true,
+ type: "extension",
+ signedState: AddonManager.SIGNEDSTATE_PRIVILEGED,
+ });
+
+ // Create a webextension theme with the same ID
+ addon = await promiseInstallWebExtension({
+ manifest: {
+ version: "2.0",
+ name: "Test WebExtension 1 (temporary)",
+ applications: {
+ gecko: {
+ id: ID,
+ },
+ },
+ theme: { images: { theme_frame: "example.png" } },
+ },
+ });
+
+ checkAddon(ID, addon, {
+ version: "2.0",
+ name: "Test WebExtension 1 (temporary)",
+ isCompatible: true,
+ appDisabled: false,
+ isActive: true,
+ // This is what we're really interested in:
+ type: "theme",
+ isWebExtension: true,
+ });
+
+ await addon.uninstall();
+
+ addon = await promiseAddonByID(ID);
+ Assert.equal(addon, null);
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_webextension_events.js b/toolkit/mozapps/extensions/test/xpcshell/test_webextension_events.js
new file mode 100644
index 0000000000..25dd73e137
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_webextension_events.js
@@ -0,0 +1,95 @@
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "42");
+
+add_task(async function() {
+ let triggered = {};
+ const { Management } = ChromeUtils.import(
+ "resource://gre/modules/Extension.jsm",
+ null
+ );
+ for (let event of ["install", "uninstall", "update"]) {
+ triggered[event] = false;
+ Management.on(event, () => (triggered[event] = true));
+ }
+
+ async function expectEvents(expected, fn) {
+ let events = Object.keys(expected);
+ for (let event of events) {
+ triggered[event] = false;
+ }
+
+ await fn();
+ await new Promise(executeSoon);
+
+ for (let event of events) {
+ equal(
+ triggered[event],
+ expected[event],
+ `Event ${event} was${expected[event] ? "" : " not"} triggered`
+ );
+ }
+ }
+
+ await promiseStartupManager();
+
+ const id = "webextension@tests.mozilla.org";
+
+ // Install version 1.0, shouldn't see any events
+ await expectEvents({ update: false, uninstall: false }, async () => {
+ await promiseInstallWebExtension({
+ manifest: {
+ version: "1.0",
+ applications: { gecko: { id } },
+ },
+ });
+ });
+
+ // Install version 2.0, we should get an update event but not an uninstall
+ await expectEvents({ update: true, uninstall: false }, async () => {
+ await promiseInstallWebExtension({
+ manifest: {
+ version: "2.0",
+ applications: { gecko: { id } },
+ },
+ });
+ });
+
+ // Install version 3.0 as a temporary addon, we should again get
+ // update but not uninstall
+ let v3 = createTempWebExtensionFile({
+ manifest: {
+ version: "3.0",
+ applications: { gecko: { id } },
+ },
+ });
+
+ await expectEvents({ update: true, uninstall: false }, () =>
+ AddonManager.installTemporaryAddon(v3)
+ );
+
+ // Uninstall the temporary addon, this causes version 2.0 still installed
+ // in the profile to be revealed. Again, this results in an update event.
+ let addon = await promiseAddonByID(id);
+ await expectEvents({ update: true, uninstall: false }, () =>
+ addon.uninstall()
+ );
+
+ // Re-install version 3.0 as a temporary addon
+ await AddonManager.installTemporaryAddon(v3);
+
+ // Now shut down the addons manager, this should cause the temporary
+ // addon to be uninstalled which reveals 2.0 from the profile.
+ await expectEvents({ update: true, uninstall: false }, () =>
+ promiseShutdownManager()
+ );
+
+ // When we start up again we should not see any events
+ await expectEvents({ install: false }, () => promiseStartupManager());
+
+ addon = await promiseAddonByID(id);
+
+ // When we uninstall from the profile, the addon is now gone, we should
+ // get an uninstall events.
+ await expectEvents({ update: false, uninstall: true }, () =>
+ addon.uninstall()
+ );
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_webextension_icons.js b/toolkit/mozapps/extensions/test/xpcshell/test_webextension_icons.js
new file mode 100644
index 0000000000..c466bbf72e
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_webextension_icons.js
@@ -0,0 +1,212 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+
+const ID = "webextension1@tests.mozilla.org";
+
+const profileDir = gProfD.clone();
+profileDir.append("extensions");
+profileDir.create(Ci.nsIFile.DIRECTORY_TYPE, FileUtils.PERMS_DIRECTORY);
+
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "42");
+
+async function testSimpleIconsetParsing(manifest) {
+ await promiseWriteWebManifestForExtension(manifest, profileDir);
+
+ await promiseRestartManager();
+
+ let uri = do_get_addon_root_uri(profileDir, ID);
+
+ let addon = await promiseAddonByID(ID);
+ Assert.notEqual(addon, null);
+
+ function check_icons(addon_copy) {
+ deepEqual(addon_copy.icons, {
+ 16: uri + "icon16.png",
+ 32: uri + "icon32.png",
+ 48: uri + "icon48.png",
+ 64: uri + "icon64.png",
+ });
+
+ // iconURL should map to icons[48]
+ equal(addon.iconURL, uri + "icon48.png");
+
+ // AddonManager gets the correct icon sizes from addon.icons
+ equal(AddonManager.getPreferredIconURL(addon, 1), uri + "icon16.png");
+ equal(AddonManager.getPreferredIconURL(addon, 16), uri + "icon16.png");
+ equal(AddonManager.getPreferredIconURL(addon, 30), uri + "icon32.png");
+ equal(AddonManager.getPreferredIconURL(addon, 48), uri + "icon48.png");
+ equal(AddonManager.getPreferredIconURL(addon, 64), uri + "icon64.png");
+ equal(AddonManager.getPreferredIconURL(addon, 128), uri + "icon64.png");
+ }
+
+ check_icons(addon);
+
+ // check if icons are persisted through a restart
+ await promiseRestartManager();
+
+ addon = await promiseAddonByID(ID);
+ Assert.notEqual(addon, null);
+
+ check_icons(addon);
+
+ await addon.uninstall();
+}
+
+async function testRetinaIconsetParsing(manifest) {
+ await promiseWriteWebManifestForExtension(manifest, profileDir);
+
+ await promiseRestartManager();
+
+ let addon = await promiseAddonByID(ID);
+ Assert.notEqual(addon, null);
+
+ let uri = do_get_addon_root_uri(profileDir, ID);
+
+ // AddonManager displays larger icons for higher pixel density
+ equal(
+ AddonManager.getPreferredIconURL(addon, 32, {
+ devicePixelRatio: 2,
+ }),
+ uri + "icon64.png"
+ );
+
+ equal(
+ AddonManager.getPreferredIconURL(addon, 48, {
+ devicePixelRatio: 2,
+ }),
+ uri + "icon128.png"
+ );
+
+ equal(
+ AddonManager.getPreferredIconURL(addon, 64, {
+ devicePixelRatio: 2,
+ }),
+ uri + "icon128.png"
+ );
+
+ await addon.uninstall();
+}
+
+async function testNoIconsParsing(manifest) {
+ await promiseWriteWebManifestForExtension(manifest, profileDir);
+
+ await promiseRestartManager();
+
+ let addon = await promiseAddonByID(ID);
+ Assert.notEqual(addon, null);
+
+ deepEqual(addon.icons, {});
+
+ equal(addon.iconURL, null);
+
+ equal(AddonManager.getPreferredIconURL(addon, 128), null);
+
+ await addon.uninstall();
+}
+
+// Test simple icon set parsing
+add_task(async function() {
+ await promiseStartupManager();
+ await testSimpleIconsetParsing({
+ name: "Web Extension Name",
+ version: "1.0",
+ manifest_version: 2,
+ applications: {
+ gecko: {
+ id: ID,
+ },
+ },
+ icons: {
+ 16: "icon16.png",
+ 32: "icon32.png",
+ 48: "icon48.png",
+ 64: "icon64.png",
+ },
+ });
+
+ // Now for theme-type extensions too.
+ await testSimpleIconsetParsing({
+ name: "Web Extension Name",
+ version: "1.0",
+ manifest_version: 2,
+ applications: {
+ gecko: {
+ id: ID,
+ },
+ },
+ icons: {
+ 16: "icon16.png",
+ 32: "icon32.png",
+ 48: "icon48.png",
+ 64: "icon64.png",
+ },
+ theme: { images: { theme_frame: "example.png" } },
+ });
+});
+
+// Test AddonManager.getPreferredIconURL for retina screen sizes
+add_task(async function() {
+ await testRetinaIconsetParsing({
+ name: "Web Extension Name",
+ version: "1.0",
+ manifest_version: 2,
+ applications: {
+ gecko: {
+ id: ID,
+ },
+ },
+ icons: {
+ 32: "icon32.png",
+ 48: "icon48.png",
+ 64: "icon64.png",
+ 128: "icon128.png",
+ 256: "icon256.png",
+ },
+ });
+
+ await testRetinaIconsetParsing({
+ name: "Web Extension Name",
+ version: "1.0",
+ manifest_version: 2,
+ applications: {
+ gecko: {
+ id: ID,
+ },
+ },
+ icons: {
+ 32: "icon32.png",
+ 48: "icon48.png",
+ 64: "icon64.png",
+ 128: "icon128.png",
+ 256: "icon256.png",
+ },
+ theme: { images: { theme_frame: "example.png" } },
+ });
+});
+
+// Handles no icons gracefully
+add_task(async function() {
+ await testNoIconsParsing({
+ name: "Web Extension Name",
+ version: "1.0",
+ manifest_version: 2,
+ applications: {
+ gecko: {
+ id: ID,
+ },
+ },
+ });
+
+ await testNoIconsParsing({
+ name: "Web Extension Name",
+ version: "1.0",
+ manifest_version: 2,
+ applications: {
+ gecko: {
+ id: ID,
+ },
+ },
+ theme: { images: { theme_frame: "example.png" } },
+ });
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_webextension_install.js b/toolkit/mozapps/extensions/test/xpcshell/test_webextension_install.js
new file mode 100644
index 0000000000..a6082b3168
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_webextension_install.js
@@ -0,0 +1,665 @@
+let profileDir;
+add_task(async function setup() {
+ profileDir = gProfD.clone();
+ profileDir.append("extensions");
+
+ if (!profileDir.exists()) {
+ profileDir.create(Ci.nsIFile.DIRECTORY_TYPE, FileUtils.PERMS_DIRECTORY);
+ }
+
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1.9.2");
+ await promiseStartupManager();
+});
+
+const IMPLICIT_ID_XPI = "data/webext-implicit-id.xpi";
+const IMPLICIT_ID_ID = "webext_implicit_id@tests.mozilla.org";
+
+// webext-implicit-id.xpi has a minimal manifest with no
+// applications or browser_specific_settings, so its id comes
+// from its signature, which should be the ID constant defined below.
+add_task(async function test_implicit_id() {
+ let addon = await promiseAddonByID(IMPLICIT_ID_ID);
+ equal(addon, null, "Add-on is not installed");
+
+ await promiseInstallFile(do_get_file(IMPLICIT_ID_XPI));
+
+ addon = await promiseAddonByID(IMPLICIT_ID_ID);
+ notEqual(addon, null, "Add-on is installed");
+
+ await addon.uninstall();
+});
+
+// We should also be able to install webext-implicit-id.xpi temporarily
+// and it should look just like the regular install (ie, the ID should
+// come from the signature)
+add_task(async function test_implicit_id_temp() {
+ let addon = await promiseAddonByID(IMPLICIT_ID_ID);
+ equal(addon, null, "Add-on is not installed");
+
+ let xpifile = do_get_file(IMPLICIT_ID_XPI);
+ await AddonManager.installTemporaryAddon(xpifile);
+
+ addon = await promiseAddonByID(IMPLICIT_ID_ID);
+ notEqual(addon, null, "Add-on is installed");
+
+ // The sourceURI of a temporary installed addon should be equal to the
+ // file url of the installed xpi file.
+ equal(
+ addon.sourceURI && addon.sourceURI.spec,
+ Services.io.newFileURI(xpifile).spec,
+ "SourceURI of the add-on has the expected value"
+ );
+
+ await addon.uninstall();
+});
+
+// Test that extension install error attach the detailed error messages to the
+// Error object.
+add_task(async function test_invalid_extension_install_errors() {
+ const manifest = {
+ name: "invalid",
+ applications: {
+ gecko: {
+ id: "invalid@tests.mozilla.org",
+ },
+ },
+ description: "extension with an invalid 'matches' value",
+ manifest_version: 2,
+ content_scripts: [
+ {
+ matches: "*://*.foo.com/*",
+ js: ["content.js"],
+ },
+ ],
+ version: "1.0",
+ };
+
+ const addonDir = await promiseWriteWebManifestForExtension(
+ manifest,
+ gTmpD,
+ "the-addon-sub-dir"
+ );
+
+ await Assert.rejects(
+ AddonManager.installTemporaryAddon(addonDir),
+ err => {
+ return (
+ err.additionalErrors.length == 1 &&
+ err.additionalErrors[0] ==
+ `Reading manifest: Error processing content_scripts.0.matches: ` +
+ `Expected array instead of "*://*.foo.com/*"`
+ );
+ },
+ "Exception has the proper additionalErrors details"
+ );
+
+ Services.obs.notifyObservers(addonDir, "flush-cache-entry");
+ addonDir.remove(true);
+});
+
+// We should be able to temporarily install an unsigned web extension
+// that does not have an ID in its manifest.
+add_task(async function test_unsigned_no_id_temp_install() {
+ AddonTestUtils.useRealCertChecks = true;
+ const manifest = {
+ name: "no ID",
+ description: "extension without an ID",
+ manifest_version: 2,
+ version: "1.0",
+ };
+
+ const addonDir = await promiseWriteWebManifestForExtension(
+ manifest,
+ gTmpD,
+ "the-addon-sub-dir"
+ );
+ const testDate = new Date();
+ const addon = await AddonManager.installTemporaryAddon(addonDir);
+
+ ok(addon.id, "ID should have been auto-generated");
+ ok(
+ Math.abs(addon.installDate - testDate) < 10000,
+ "addon has an expected installDate"
+ );
+ ok(
+ Math.abs(addon.updateDate - testDate) < 10000,
+ "addon has an expected updateDate"
+ );
+
+ // The sourceURI of a temporary installed addon should be equal to the
+ // file url of the installed source dir.
+ equal(
+ addon.sourceURI && addon.sourceURI.spec,
+ Services.io.newFileURI(addonDir).spec,
+ "SourceURI of the add-on has the expected value"
+ );
+
+ // Install the same directory again, as if re-installing or reloading.
+ const secondAddon = await AddonManager.installTemporaryAddon(addonDir);
+ // The IDs should be the same.
+ equal(secondAddon.id, addon.id, "Reinstalled add-on has the expected ID");
+ equal(
+ secondAddon.installDate.valueOf(),
+ addon.installDate.valueOf(),
+ "Reloaded add-on has the expected installDate."
+ );
+
+ await secondAddon.uninstall();
+ Services.obs.notifyObservers(addonDir, "flush-cache-entry");
+ addonDir.remove(true);
+ AddonTestUtils.useRealCertChecks = false;
+});
+
+// We should be able to install two extensions from manifests without IDs
+// at different locations and get two unique extensions.
+add_task(async function test_multiple_no_id_extensions() {
+ AddonTestUtils.useRealCertChecks = true;
+ const manifest = {
+ name: "no ID",
+ description: "extension without an ID",
+ manifest_version: 2,
+ version: "1.0",
+ };
+
+ let extension1 = ExtensionTestUtils.loadExtension({
+ manifest,
+ useAddonManager: "temporary",
+ });
+
+ let extension2 = ExtensionTestUtils.loadExtension({
+ manifest,
+ useAddonManager: "temporary",
+ });
+
+ await Promise.all([extension1.startup(), extension2.startup()]);
+
+ const allAddons = await AddonManager.getAllAddons();
+
+ info(`Found these add-ons: ${allAddons.map(a => a.name).join(", ")}`);
+ const filtered = allAddons.filter(addon => addon.name === manifest.name);
+ // Make sure we have two add-ons by the same name.
+ equal(filtered.length, 2, "Two add-ons are installed with the same name");
+
+ await extension1.unload();
+ await extension2.unload();
+ AddonTestUtils.useRealCertChecks = false;
+});
+
+// Test that we can get the ID from browser_specific_settings
+add_task(async function test_bss_id() {
+ const ID = "webext_bss_id@tests.mozilla.org";
+
+ let manifest = {
+ name: "bss test",
+ description: "test that ID may be in browser_specific_settings",
+ manifest_version: 2,
+ version: "1.0",
+
+ browser_specific_settings: {
+ gecko: {
+ id: ID,
+ },
+ },
+ };
+
+ let addon = await promiseAddonByID(ID);
+ equal(addon, null, "Add-on is not installed");
+
+ let extension = ExtensionTestUtils.loadExtension({
+ manifest,
+ useAddonManager: "temporary",
+ });
+ await extension.startup();
+
+ addon = await promiseAddonByID(ID);
+ notEqual(addon, null, "Add-on is installed");
+
+ await extension.unload();
+});
+
+// Test that if we have IDs in both browser_specific_settings and applications,
+// that we prefer the ID in browser_specific_settings.
+add_task(async function test_two_ids() {
+ const GOOD_ID = "two_ids@tests.mozilla.org";
+ const BAD_ID = "i_am_obsolete@tests.mozilla.org";
+
+ let manifest = {
+ name: "two id test",
+ description:
+ "test a web extension with ids in both applications and browser_specific_settings",
+ manifest_version: 2,
+ version: "1.0",
+
+ applications: {
+ gecko: {
+ id: BAD_ID,
+ },
+ },
+
+ browser_specific_settings: {
+ gecko: {
+ id: GOOD_ID,
+ },
+ },
+ };
+
+ let extension = ExtensionTestUtils.loadExtension({
+ manifest,
+ useAddonManager: "temporary",
+ });
+ await extension.startup();
+
+ let addon = await promiseAddonByID(BAD_ID);
+ equal(addon, null, "Add-on is not found using bad ID");
+ addon = await promiseAddonByID(GOOD_ID);
+ notEqual(addon, null, "Add-on is found using good ID");
+
+ await extension.unload();
+});
+
+// Test that strict_min_version and strict_max_version are enforced for
+// loading temporary extension.
+add_task(async function test_strict_min_max() {
+ // the app version being compared to is 1.9.2
+ const addonId = "strict_min_max@tests.mozilla.org";
+ const MANIFEST = {
+ name: "strict min max test",
+ description: "test strict min and max with temporary loading",
+ manifest_version: 2,
+ version: "1.0",
+ };
+
+ // bad max good min
+ let apps = {
+ applications: {
+ gecko: {
+ id: addonId,
+ strict_min_version: "1",
+ strict_max_version: "1",
+ },
+ },
+ };
+ let testManifest = Object.assign(apps, MANIFEST);
+
+ let extension = ExtensionTestUtils.loadExtension({
+ manifest: testManifest,
+ useAddonManager: "temporary",
+ });
+
+ let expectedMsg = new RegExp(
+ "Add-on strict_min_max@tests.mozilla.org is not compatible with application version. " +
+ "add-on minVersion: 1. add-on maxVersion: 1."
+ );
+ await Assert.rejects(
+ extension.startup(),
+ expectedMsg,
+ "Install rejects when specified maxVersion is not valid"
+ );
+
+ let addon = await promiseAddonByID(addonId);
+ equal(addon, null, "Add-on is not installed");
+
+ // bad min good max
+ apps = {
+ applications: {
+ gecko: {
+ id: addonId,
+ strict_min_version: "2",
+ strict_max_version: "2",
+ },
+ },
+ };
+ testManifest = Object.assign(apps, MANIFEST);
+
+ extension = ExtensionTestUtils.loadExtension({
+ manifest: testManifest,
+ useAddonManager: "temporary",
+ });
+
+ expectedMsg = new RegExp(
+ "Add-on strict_min_max@tests.mozilla.org is not compatible with application version. " +
+ "add-on minVersion: 2. add-on maxVersion: 2."
+ );
+ await Assert.rejects(
+ extension.startup(),
+ expectedMsg,
+ "Install rejects when specified minVersion is not valid"
+ );
+
+ addon = await promiseAddonByID(addonId);
+ equal(addon, null, "Add-on is not installed");
+
+ // bad both
+ apps = {
+ applications: {
+ gecko: {
+ id: addonId,
+ strict_min_version: "2",
+ strict_max_version: "1",
+ },
+ },
+ };
+ testManifest = Object.assign(apps, MANIFEST);
+
+ extension = ExtensionTestUtils.loadExtension({
+ manifest: testManifest,
+ useAddonManager: "temporary",
+ });
+
+ expectedMsg = new RegExp(
+ "Add-on strict_min_max@tests.mozilla.org is not compatible with application version. " +
+ "add-on minVersion: 2. add-on maxVersion: 1."
+ );
+ await Assert.rejects(
+ extension.startup(),
+ expectedMsg,
+ "Install rejects when specified minVersion and maxVersion are not valid"
+ );
+
+ addon = await promiseAddonByID(addonId);
+ equal(addon, null, "Add-on is not installed");
+
+ // bad only min
+ apps = {
+ applications: {
+ gecko: {
+ id: addonId,
+ strict_min_version: "2",
+ },
+ },
+ };
+ testManifest = Object.assign(apps, MANIFEST);
+
+ extension = ExtensionTestUtils.loadExtension({
+ manifest: testManifest,
+ useAddonManager: "temporary",
+ });
+
+ expectedMsg = new RegExp(
+ "Add-on strict_min_max@tests.mozilla.org is not compatible with application version. " +
+ "add-on minVersion: 2."
+ );
+ await Assert.rejects(
+ extension.startup(),
+ expectedMsg,
+ "Install rejects when specified minVersion and maxVersion are not valid"
+ );
+
+ addon = await promiseAddonByID(addonId);
+ equal(addon, null, "Add-on is not installed");
+
+ // bad only max
+ apps = {
+ applications: {
+ gecko: {
+ id: addonId,
+ strict_max_version: "1",
+ },
+ },
+ };
+ testManifest = Object.assign(apps, MANIFEST);
+
+ extension = ExtensionTestUtils.loadExtension({
+ manifest: testManifest,
+ useAddonManager: "temporary",
+ });
+
+ expectedMsg = new RegExp(
+ "Add-on strict_min_max@tests.mozilla.org is not compatible with application version. " +
+ "add-on maxVersion: 1."
+ );
+ await Assert.rejects(
+ extension.startup(),
+ expectedMsg,
+ "Install rejects when specified minVersion and maxVersion are not valid"
+ );
+
+ addon = await promiseAddonByID(addonId);
+ equal(addon, null, "Add-on is not installed");
+
+ // good both
+ apps = {
+ applications: {
+ gecko: {
+ id: addonId,
+ strict_min_version: "1",
+ strict_max_version: "2",
+ },
+ },
+ };
+ testManifest = Object.assign(apps, MANIFEST);
+
+ extension = ExtensionTestUtils.loadExtension({
+ manifest: testManifest,
+ useAddonManager: "temporary",
+ });
+
+ await extension.startup();
+ addon = await promiseAddonByID(addonId);
+
+ notEqual(addon, null, "Add-on is installed");
+ equal(addon.id, addonId, "Installed add-on has the expected ID");
+ await extension.unload();
+
+ // good only min
+ let newId = "strict_min_only@tests.mozilla.org";
+ apps = {
+ applications: {
+ gecko: {
+ id: newId,
+ strict_min_version: "1",
+ },
+ },
+ };
+ testManifest = Object.assign(apps, MANIFEST);
+
+ extension = ExtensionTestUtils.loadExtension({
+ manifest: testManifest,
+ useAddonManager: "temporary",
+ });
+
+ await extension.startup();
+ addon = await promiseAddonByID(newId);
+
+ notEqual(addon, null, "Add-on is installed");
+ equal(addon.id, newId, "Installed add-on has the expected ID");
+
+ await extension.unload();
+
+ // good only max
+ newId = "strict_max_only@tests.mozilla.org";
+ apps = {
+ applications: {
+ gecko: {
+ id: newId,
+ strict_max_version: "2",
+ },
+ },
+ };
+ testManifest = Object.assign(apps, MANIFEST);
+
+ extension = ExtensionTestUtils.loadExtension({
+ manifest: testManifest,
+ useAddonManager: "temporary",
+ });
+
+ await extension.startup();
+ addon = await promiseAddonByID(newId);
+
+ notEqual(addon, null, "Add-on is installed");
+ equal(addon.id, newId, "Installed add-on has the expected ID");
+
+ await extension.unload();
+
+ // * in min will throw an error
+ for (let version of ["0.*", "0.*.0"]) {
+ newId = "strict_min_star@tests.mozilla.org";
+ let minStarApps = {
+ applications: {
+ gecko: {
+ id: newId,
+ strict_min_version: version,
+ },
+ },
+ };
+
+ let minStarTestManifest = Object.assign(minStarApps, MANIFEST);
+
+ let minStarExtension = ExtensionTestUtils.loadExtension({
+ manifest: minStarTestManifest,
+ useAddonManager: "temporary",
+ });
+
+ await Assert.rejects(
+ minStarExtension.startup(),
+ /The use of '\*' in strict_min_version is invalid/,
+ "loading an extension with a * in strict_min_version throws an exception"
+ );
+
+ let minStarAddon = await promiseAddonByID(newId);
+ equal(minStarAddon, null, "Add-on is not installed");
+ }
+
+ // incompatible extension but with compatibility checking off
+ newId = "checkCompatibility@tests.mozilla.org";
+ apps = {
+ applications: {
+ gecko: {
+ id: newId,
+ strict_max_version: "1",
+ },
+ },
+ };
+ testManifest = Object.assign(apps, MANIFEST);
+
+ extension = ExtensionTestUtils.loadExtension({
+ manifest: testManifest,
+ useAddonManager: "temporary",
+ });
+
+ let savedCheckCompatibilityValue = AddonManager.checkCompatibility;
+ AddonManager.checkCompatibility = false;
+ await extension.startup();
+ addon = await promiseAddonByID(newId);
+
+ notEqual(addon, null, "Add-on is installed");
+ equal(addon.id, newId, "Installed add-on has the expected ID");
+
+ await extension.unload();
+ AddonManager.checkCompatibility = savedCheckCompatibilityValue;
+});
+
+// Check permissions prompt
+add_task(async function test_permissions_prompt() {
+ const manifest = {
+ name: "permissions test",
+ description: "permissions test",
+ manifest_version: 2,
+ version: "1.0",
+
+ permissions: ["tabs", "storage", "https://*.example.com/*", "<all_urls>"],
+ };
+
+ let xpi = ExtensionTestCommon.generateXPI({ manifest });
+
+ let install = await AddonManager.getInstallForFile(xpi);
+
+ let perminfo;
+ install.promptHandler = info => {
+ perminfo = info;
+ return Promise.resolve();
+ };
+
+ await install.install();
+
+ notEqual(perminfo, undefined, "Permission handler was invoked");
+ equal(
+ perminfo.existingAddon,
+ null,
+ "Permission info does not include an existing addon"
+ );
+ notEqual(perminfo.addon, null, "Permission info includes the new addon");
+ let perms = perminfo.addon.userPermissions;
+ deepEqual(
+ perms.permissions,
+ ["tabs", "storage"],
+ "API permissions are correct"
+ );
+ deepEqual(
+ perms.origins,
+ ["https://*.example.com/*", "<all_urls>"],
+ "Host permissions are correct"
+ );
+
+ let addon = await promiseAddonByID(perminfo.addon.id);
+ notEqual(addon, null, "Extension was installed");
+
+ await addon.uninstall();
+ await OS.File.remove(xpi.path);
+});
+
+// Check permissions prompt cancellation
+add_task(async function test_permissions_prompt_cancel() {
+ const manifest = {
+ name: "permissions test",
+ description: "permissions test",
+ manifest_version: 2,
+ version: "1.0",
+
+ permissions: ["webRequestBlocking"],
+ };
+
+ let xpi = ExtensionTestCommon.generateXPI({ manifest });
+
+ let install = await AddonManager.getInstallForFile(xpi);
+
+ let perminfo;
+ install.promptHandler = info => {
+ perminfo = info;
+ return Promise.reject();
+ };
+
+ await promiseCompleteInstall(install);
+
+ notEqual(perminfo, undefined, "Permission handler was invoked");
+
+ let addon = await promiseAddonByID(perminfo.addon.id);
+ equal(addon, null, "Extension was not installed");
+
+ await OS.File.remove(xpi.path);
+});
+
+// Test that presence of 'edge' property in 'browser_specific_settings' doesn't prevent installation from completing successfully
+add_task(async function test_non_gecko_bss_install() {
+ const ID = "ms_edge@tests.mozilla.org";
+
+ const manifest = {
+ name: "MS Edge and unknown browser test",
+ description:
+ "extension with bss properties for 'edge', and 'unknown_browser'",
+ manifest_version: 2,
+ version: "1.0",
+ applications: { gecko: { id: ID } },
+ browser_specific_settings: {
+ edge: {
+ browser_action_next_to_addressbar: true,
+ },
+ unknown_browser: {
+ unknown_setting: true,
+ },
+ },
+ };
+
+ const extension = ExtensionTestUtils.loadExtension({
+ manifest,
+ useAddonManager: "temporary",
+ });
+ ExtensionTestUtils.failOnSchemaWarnings(false);
+ await extension.startup();
+ ExtensionTestUtils.failOnSchemaWarnings(true);
+
+ const addon = await promiseAddonByID(ID);
+ notEqual(addon, null, "Add-on is installed");
+
+ await extension.unload();
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_webextension_install_syntax_error.js b/toolkit/mozapps/extensions/test/xpcshell/test_webextension_install_syntax_error.js
new file mode 100644
index 0000000000..73b66376af
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_webextension_install_syntax_error.js
@@ -0,0 +1,42 @@
+const ADDON_ID = "webext-test@tests.mozilla.org";
+
+add_task(async function setup() {
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1");
+ await promiseStartupManager();
+});
+
+add_task(async function install_xpi() {
+ // WebExtension with a JSON syntax error in manifest.json
+ let xpi1 = AddonTestUtils.createTempWebExtensionFile({
+ files: {
+ "manifest.json": String.raw`{
+ "manifest_version: 2,
+ "applications": {"gecko": {"id": "${ADDON_ID}"}},
+ "name": "Temp WebExt with Error",
+ "version": "0.1"
+ }`,
+ },
+ });
+
+ // Valid WebExtension
+ let xpi2 = AddonTestUtils.createTempWebExtensionFile({
+ files: {
+ "manifest.json": String.raw`{
+ "manifest_version": 2,
+ "applications": {"gecko": {"id": "${ADDON_ID}"}},
+ "name": "Temp WebExt without Error",
+ "version": "0.1"
+ }`,
+ },
+ });
+
+ let install1 = await AddonManager.getInstallForFile(xpi1);
+ Assert.equal(install1.state, AddonManager.STATE_DOWNLOAD_FAILED);
+ Assert.equal(install1.error, AddonManager.ERROR_CORRUPT_FILE);
+
+ // Replace xpi1 with xpi2 to have the same filename to reproduce install error
+ xpi2.moveTo(xpi1.parent, xpi1.leafName);
+
+ let install2 = await AddonManager.getInstallForFile(xpi2);
+ Assert.equal(install2.error, 0);
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_webextension_langpack.js b/toolkit/mozapps/extensions/test/xpcshell/test_webextension_langpack.js
new file mode 100644
index 0000000000..9e4aeadf4e
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_webextension_langpack.js
@@ -0,0 +1,573 @@
+/* Any copyright is dedicated to the Public Domain.
+ * http://creativecommons.org/publicdomain/zero/1.0/
+ */
+"use strict";
+
+const { L10nRegistry } = ChromeUtils.import(
+ "resource://gre/modules/L10nRegistry.jsm"
+);
+
+const { ExtensionUtils } = ChromeUtils.import(
+ "resource://gre/modules/ExtensionUtils.jsm"
+);
+
+XPCOMUtils.defineLazyGetter(this, "resourceProtocol", () =>
+ Services.io
+ .getProtocolHandler("resource")
+ .QueryInterface(Ci.nsIResProtocolHandler)
+);
+
+Services.prefs.setBoolPref(PREF_EM_CHECK_UPDATE_SECURITY, false);
+
+const ID = "langpack-und@test.mozilla.org";
+
+const profileDir = gProfD.clone();
+profileDir.append("extensions");
+
+var server = AddonTestUtils.createHttpServer({ hosts: ["example.com"] });
+AddonTestUtils.registerJSON(server, "/test_update_langpack.json", {
+ addons: {
+ "langpack-und@test.mozilla.org": {
+ updates: [
+ {
+ version: "1.0",
+ applications: {
+ gecko: {
+ strict_min_version: "58.0",
+ strict_max_version: "58.*",
+ },
+ },
+ },
+ {
+ version: "2.0",
+ update_link:
+ "http://example.com/addons/langpack-und@test.mozilla.org.xpi",
+ applications: {
+ gecko: {
+ strict_min_version: "60.0",
+ strict_max_version: "60.*",
+ },
+ },
+ },
+ ],
+ },
+ },
+});
+
+function promisePostponeInstall(install) {
+ return new Promise((resolve, reject) => {
+ let listener = {
+ onDownloadEnded: () => {
+ install.postpone();
+ },
+ onInstallFailed: () => {
+ install.removeListener(listener);
+ reject(new Error("extension installation should not have failed"));
+ },
+ onInstallEnded: () => {
+ install.removeListener(listener);
+ reject(
+ new Error(
+ `extension installation should not have ended for ${install.addon.id}`
+ )
+ );
+ },
+ onInstallPostponed: () => {
+ install.removeListener(listener);
+ resolve();
+ },
+ };
+
+ install.addListener(listener);
+ });
+}
+
+createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "58");
+
+const ADDONS = {
+ langpack_1: {
+ "browser/localization/und/browser.ftl":
+ "message-browser = Value from Browser\n",
+ "localization/und/toolkit_test.ftl": "message-id1 = Value 1\n",
+ "chrome/und/locale/und/global/test.properties":
+ "message = Value from .properties\n",
+ "manifest.json": {
+ name: "und Language Pack",
+ version: "1.0",
+ manifest_version: 2,
+ applications: {
+ gecko: {
+ id: ID,
+ strict_min_version: "58.0",
+ strict_max_version: "58.*",
+ update_url: "http://example.com/test_update_langpack.json",
+ },
+ },
+ sources: {
+ browser: {
+ base_path: "browser/",
+ },
+ },
+ langpack_id: "und",
+ languages: {
+ und: {
+ chrome_resources: {
+ global: "chrome/und/locale/und/global/",
+ },
+ version: "20171001190118",
+ },
+ },
+ author: "Mozilla Localization Task Force",
+ description: "Language pack for Testy for und",
+ },
+ },
+};
+
+// clone the extension so we can create an update.
+const langpack_update = JSON.parse(JSON.stringify(ADDONS.langpack_1));
+langpack_update["manifest.json"].version = "2.0";
+langpack_update["manifest.json"].applications.gecko = {
+ id: ID,
+ strict_min_version: "60.0",
+ strict_max_version: "60.*",
+};
+
+let xpi = AddonTestUtils.createTempXPIFile(langpack_update);
+server.registerFile(`/addons/${ID}.xpi`, xpi);
+
+function promiseLangpackStartup() {
+ return new Promise(resolve => {
+ const EVENT = "webextension-langpack-startup";
+ Services.obs.addObserver(function observer() {
+ Services.obs.removeObserver(observer, EVENT);
+ resolve();
+ }, EVENT);
+ });
+}
+
+add_task(async function setup() {
+ Services.prefs.clearUserPref("extensions.startupScanScopes");
+});
+
+/**
+ * This is a basic life-cycle test which verifies that
+ * the language pack registers and unregisters correct
+ * languages at various stages.
+ */
+add_task(async function test_basic_lifecycle() {
+ await promiseStartupManager();
+
+ // Make sure that `und` locale is not installed.
+ equal(
+ L10nRegistry.getAvailableLocales().includes("und"),
+ false,
+ "und not installed"
+ );
+ equal(
+ Services.locale.availableLocales.includes("und"),
+ false,
+ "und not available"
+ );
+
+ let [, { addon }] = await Promise.all([
+ promiseLangpackStartup(),
+ AddonTestUtils.promiseInstallXPI(ADDONS.langpack_1),
+ ]);
+
+ // Now make sure that `und` locale is available.
+ equal(
+ L10nRegistry.getAvailableLocales().includes("und"),
+ true,
+ "und is installed"
+ );
+ equal(
+ Services.locale.availableLocales.includes("und"),
+ true,
+ "und is available"
+ );
+
+ await addon.disable();
+
+ // It is not available after the langpack has been disabled.
+ equal(
+ L10nRegistry.getAvailableLocales().includes("und"),
+ false,
+ "und not installed"
+ );
+ equal(
+ Services.locale.availableLocales.includes("und"),
+ false,
+ "und not available"
+ );
+
+ // This quirky code here allows us to handle a scenario where enabling the
+ // addon is synchronous or asynchronous.
+ await Promise.all([promiseLangpackStartup(), addon.enable()]);
+
+ // After re-enabling it, the `und` locale is available again.
+ equal(
+ L10nRegistry.getAvailableLocales().includes("und"),
+ true,
+ "und is installed"
+ );
+ equal(
+ Services.locale.availableLocales.includes("und"),
+ true,
+ "und is available"
+ );
+
+ await addon.uninstall();
+
+ // After the langpack has been uninstalled, no more `und` in locales.
+ equal(
+ L10nRegistry.getAvailableLocales().includes("und"),
+ false,
+ "und not installed"
+ );
+ equal(
+ Services.locale.availableLocales.includes("und"),
+ false,
+ "und not available"
+ );
+});
+
+/**
+ * This test verifies that registries are able to load and synchronously return
+ * correct strings available in the language pack.
+ */
+add_task(async function test_locale_registries() {
+ let [, { addon }] = await Promise.all([
+ promiseLangpackStartup(),
+ AddonTestUtils.promiseInstallXPI(ADDONS.langpack_1),
+ ]);
+
+ {
+ // Toolkit string
+ let bundles = L10nRegistry.generateBundlesSync(
+ ["und"],
+ ["toolkit_test.ftl"]
+ );
+ let bundle0 = bundles.next().value;
+ ok(bundle0);
+ equal(bundle0.hasMessage("message-id1"), true);
+ }
+
+ {
+ // Browser string
+ let bundles = L10nRegistry.generateBundlesSync(["und"], ["browser.ftl"]);
+ let bundle0 = bundles.next().value;
+ ok(bundle0);
+ equal(bundle0.hasMessage("message-browser"), true);
+ }
+
+ {
+ // Test chrome package
+ let reqLocs = Services.locale.requestedLocales;
+ Services.locale.requestedLocales = ["und"];
+
+ let bundle = Services.strings.createBundle(
+ "chrome://global/locale/test.properties"
+ );
+ let entry = bundle.GetStringFromName("message");
+ equal(entry, "Value from .properties");
+
+ Services.locale.requestedLocales = reqLocs;
+ }
+
+ await addon.uninstall();
+});
+
+/**
+ * This test verifies that registries are able to load and asynchronously return
+ * correct strings available in the language pack.
+ */
+add_task(async function test_locale_registries_async() {
+ let [, { addon }] = await Promise.all([
+ promiseLangpackStartup(),
+ AddonTestUtils.promiseInstallXPI(ADDONS.langpack_1),
+ ]);
+
+ {
+ // Toolkit string
+ let bundles = L10nRegistry.generateBundles(["und"], ["toolkit_test.ftl"]);
+ let bundle0 = (await bundles.next()).value;
+ equal(bundle0.hasMessage("message-id1"), true);
+ }
+
+ {
+ // Browser string
+ let bundles = L10nRegistry.generateBundles(["und"], ["browser.ftl"]);
+ let bundle0 = (await bundles.next()).value;
+ equal(bundle0.hasMessage("message-browser"), true);
+ }
+
+ await addon.uninstall();
+ await promiseShutdownManager();
+});
+
+add_task(async function test_langpack_app_shutdown() {
+ let langpackId = `langpack-und-${AppConstants.MOZ_BUILD_APP.replace(
+ "/",
+ "-"
+ )}`;
+ let check = (yes, msg) => {
+ equal(resourceProtocol.hasSubstitution(langpackId), yes, msg);
+ };
+
+ await promiseStartupManager();
+
+ check(false, "no initial resource substitution");
+
+ await Promise.all([
+ promiseLangpackStartup(),
+ AddonTestUtils.promiseInstallXPI(ADDONS.langpack_1),
+ ]);
+
+ check(true, "langpack resource available after startup");
+
+ await promiseShutdownManager();
+
+ check(true, "langpack resource available after app shutdown");
+
+ await promiseStartupManager();
+
+ let addon = await AddonManager.getAddonByID(ID);
+ await addon.uninstall();
+
+ check(false, "langpack resource removed during shutdown for uninstall");
+
+ await promiseShutdownManager();
+});
+
+add_task(async function test_amazing_disappearing_langpacks() {
+ let check = yes => {
+ equal(
+ L10nRegistry.getAvailableLocales().includes("und"),
+ yes,
+ "check L10nRegistry"
+ );
+ equal(
+ Services.locale.availableLocales.includes("und"),
+ yes,
+ "check availableLocales"
+ );
+ };
+
+ await promiseStartupManager();
+
+ check(false);
+
+ await Promise.all([
+ promiseLangpackStartup(),
+ AddonTestUtils.promiseInstallXPI(ADDONS.langpack_1),
+ ]);
+
+ check(true);
+
+ await promiseShutdownManager();
+
+ check(false);
+
+ await AddonTestUtils.manuallyUninstall(AddonTestUtils.profileExtensions, ID);
+
+ await promiseStartupManager();
+
+ check(false);
+});
+
+/**
+ * This test verifies that language pack will get disabled after app
+ * gets upgraded.
+ */
+add_task(async function test_disable_after_app_update() {
+ let [, { addon }] = await Promise.all([
+ promiseLangpackStartup(),
+ AddonTestUtils.promiseInstallXPI(ADDONS.langpack_1),
+ ]);
+ Assert.ok(addon.isActive);
+
+ await promiseRestartManager("59");
+
+ addon = await promiseAddonByID(ID);
+ Assert.ok(!addon.isActive);
+ Assert.ok(addon.appDisabled);
+
+ await addon.uninstall();
+ await promiseShutdownManager();
+});
+
+/**
+ * This test verifies that a postponed language pack update will be
+ * applied after a restart.
+ */
+add_task(async function test_after_app_update() {
+ await promiseStartupManager("58");
+ let [, { addon }] = await Promise.all([
+ promiseLangpackStartup(),
+ AddonTestUtils.promiseInstallXPI(ADDONS.langpack_1),
+ ]);
+ Assert.ok(addon.isActive);
+
+ await promiseRestartManager("60");
+
+ addon = await promiseAddonByID(ID);
+ Assert.ok(!addon.isActive);
+ Assert.ok(addon.appDisabled);
+ Assert.equal(addon.version, "1.0");
+
+ let update = await promiseFindAddonUpdates(addon);
+ Assert.ok(update.updateAvailable, "update is available");
+ let install = update.updateAvailable;
+ let postponed = promisePostponeInstall(install);
+ install.install();
+ await postponed;
+ Assert.equal(
+ install.state,
+ AddonManager.STATE_POSTPONED,
+ "install postponed"
+ );
+
+ await promiseRestartManager();
+
+ addon = await promiseAddonByID(ID);
+ Assert.ok(addon.isActive);
+ Assert.equal(addon.version, "2.0");
+
+ await addon.uninstall();
+ await promiseShutdownManager();
+});
+
+// Support setting the request locale.
+function promiseLocaleChanged(requestedLocales) {
+ let changed = ExtensionUtils.promiseObserved(
+ "intl:requested-locales-changed"
+ );
+ Services.locale.requestedLocales = requestedLocales;
+ return changed;
+}
+
+/**
+ * This test verifies that an addon update for the next version can be
+ * retrieved and staged for restart.
+ */
+add_task(async function test_staged_langpack_for_app_update() {
+ let originalLocales = Services.locale.requestedLocales;
+
+ await promiseStartupManager("58");
+ let [, { addon }] = await Promise.all([
+ promiseLangpackStartup(),
+ AddonTestUtils.promiseInstallXPI(ADDONS.langpack_1),
+ ]);
+ Assert.ok(addon.isActive);
+ await promiseLocaleChanged(["und"]);
+
+ await AddonManager.stageLangpacksForAppUpdate("60");
+ await promiseRestartManager("60");
+
+ addon = await promiseAddonByID(ID);
+ Assert.ok(addon.isActive);
+ Assert.equal(addon.version, "2.0");
+
+ await addon.uninstall();
+ await promiseShutdownManager();
+
+ Services.locale.requestedLocales = originalLocales;
+});
+
+/**
+ * This test verifies that an addon update for the next version can be
+ * retrieved and staged for restart, but a restart failure falls back.
+ */
+add_task(async function test_staged_langpack_for_app_update_fail() {
+ let originalLocales = Services.locale.requestedLocales;
+
+ await promiseStartupManager("58");
+ let [, { addon }] = await Promise.all([
+ promiseLangpackStartup(),
+ AddonTestUtils.promiseInstallXPI(ADDONS.langpack_1),
+ ]);
+ Assert.ok(addon.isActive);
+ await promiseLocaleChanged(["und"]);
+
+ await AddonManager.stageLangpacksForAppUpdate("60");
+ await promiseRestartManager();
+
+ addon = await promiseAddonByID(ID);
+ Assert.ok(addon.isActive);
+ Assert.equal(addon.version, "1.0");
+
+ await addon.uninstall();
+ await promiseShutdownManager();
+ Services.locale.requestedLocales = originalLocales;
+});
+
+/**
+ * This test verifies that an update restart works when the langpack
+ * cannot be updated.
+ */
+add_task(async function test_staged_langpack_for_app_update_not_found() {
+ let originalLocales = Services.locale.requestedLocales;
+
+ await promiseStartupManager("58");
+ let [, { addon }] = await Promise.all([
+ promiseLangpackStartup(),
+ AddonTestUtils.promiseInstallXPI(ADDONS.langpack_1),
+ ]);
+ Assert.ok(addon.isActive);
+ await promiseLocaleChanged(["und"]);
+
+ await AddonManager.stageLangpacksForAppUpdate("59");
+ await promiseRestartManager("59");
+
+ addon = await promiseAddonByID(ID);
+ Assert.ok(!addon.isActive);
+ Assert.equal(addon.version, "1.0");
+
+ await addon.uninstall();
+ await promiseShutdownManager();
+ Services.locale.requestedLocales = originalLocales;
+});
+
+/**
+ * This test verifies that a compat update with an invalid max_version
+ * will be disabled, at least allowing Firefox to startup without failures.
+ */
+add_task(async function test_staged_langpack_compat_startup() {
+ let originalLocales = Services.locale.requestedLocales;
+
+ await promiseStartupManager("58");
+ let [, { addon }] = await Promise.all([
+ promiseLangpackStartup(),
+ AddonTestUtils.promiseInstallXPI(ADDONS.langpack_1),
+ ]);
+ Assert.ok(addon.isActive);
+ await promiseLocaleChanged(["und"]);
+
+ // Mimick a compatibility update
+ let compatUpdate = {
+ targetApplications: [
+ {
+ id: "toolkit@mozilla.org",
+ minVersion: "58",
+ maxVersion: "*",
+ },
+ ],
+ };
+ addon.__AddonInternal__.applyCompatibilityUpdate(compatUpdate);
+
+ await promiseRestartManager("59");
+
+ addon = await promiseAddonByID(ID);
+ Assert.ok(!addon.isActive, "addon is not active after upgrade");
+ ok(!addon.isCompatible, "compatibility update fixed");
+
+ await promiseRestartManager("58");
+
+ addon = await promiseAddonByID(ID);
+ Assert.ok(addon.isActive, "addon is active after downgrade");
+ ok(addon.isCompatible, "compatibility update fixed");
+
+ await addon.uninstall();
+ await promiseShutdownManager();
+ Services.locale.requestedLocales = originalLocales;
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_webextension_paths.js b/toolkit/mozapps/extensions/test/xpcshell/test_webextension_paths.js
new file mode 100644
index 0000000000..564e9086ac
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_webextension_paths.js
@@ -0,0 +1,47 @@
+let profileDir;
+add_task(async function setup() {
+ profileDir = gProfD.clone();
+ profileDir.append("extensions");
+
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1.9.2");
+ await promiseStartupManager();
+});
+
+// When installing an unpacked addon we derive the ID from the
+// directory name. Make sure that if the directory name is not a valid
+// addon ID that we reject it.
+add_task(async function test_bad_unpacked_path() {
+ let MANIFEST_ID = "webext_bad_path@tests.mozilla.org";
+
+ let manifest = {
+ name: "path test",
+ description: "test of a bad directory name",
+ manifest_version: 2,
+ version: "1.0",
+
+ browser_specific_settings: {
+ gecko: {
+ id: MANIFEST_ID,
+ },
+ },
+ };
+
+ const directories = ["not a valid ID", '"quotes"@tests.mozilla.org'];
+
+ for (let dir of directories) {
+ try {
+ await promiseWriteWebManifestForExtension(manifest, profileDir, dir);
+ } catch (ex) {
+ // This can fail if the underlying filesystem (looking at you windows)
+ // doesn't handle some of the characters in the ID. In that case,
+ // just ignore this test on this platform.
+ continue;
+ }
+ await promiseRestartManager();
+
+ let addon = await promiseAddonByID(dir);
+ Assert.equal(addon, null);
+ addon = await promiseAddonByID(MANIFEST_ID);
+ Assert.equal(addon, null);
+ }
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/test_webextension_theme.js b/toolkit/mozapps/extensions/test/xpcshell/test_webextension_theme.js
new file mode 100644
index 0000000000..0b1b0ee8d9
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/test_webextension_theme.js
@@ -0,0 +1,365 @@
+"use strict";
+
+/**
+ * This file contains test for 'theme' type WebExtension addons. Tests focus mostly
+ * on interoperability between the different theme formats (XUL and LWT) and
+ * Addon Manager integration.
+ *
+ * Coverage may overlap with other tests in this folder.
+ */
+
+const THEME_IDS = [
+ "theme3@tests.mozilla.org",
+ "theme2@personas.mozilla.org", // Unused. Legacy. Evil.
+ "default-theme@mozilla.org",
+];
+const REAL_THEME_IDS = [THEME_IDS[0], THEME_IDS[2]];
+const DEFAULT_THEME = THEME_IDS[2];
+
+const profileDir = gProfD.clone();
+profileDir.append("extensions");
+
+Services.prefs.setIntPref(
+ "extensions.enabledScopes",
+ AddonManager.SCOPE_PROFILE | AddonManager.SCOPE_APPLICATION
+);
+
+// We remember the last/ currently active theme for tracking events.
+var gActiveTheme = null;
+
+add_task(async function setup_to_default_browserish_state() {
+ createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1.9.2");
+
+ await promiseWriteWebManifestForExtension(
+ {
+ author: "Some author",
+ manifest_version: 2,
+ name: "Web Extension Name",
+ version: "1.0",
+ theme: { images: { theme_frame: "example.png" } },
+ applications: {
+ gecko: {
+ id: THEME_IDS[0],
+ },
+ },
+ },
+ profileDir
+ );
+
+ await promiseStartupManager();
+
+ if (AppConstants.MOZ_DEV_EDITION) {
+ // Developer Edition selects the wrong theme by default.
+ let defaultTheme = await AddonManager.getAddonByID(DEFAULT_THEME);
+ await defaultTheme.enable();
+ }
+
+ let [t1, t2, d] = await promiseAddonsByIDs(THEME_IDS);
+ Assert.ok(t1, "Theme addon should exist");
+ Assert.equal(t2, null, "Theme addon is not a thing anymore");
+ Assert.ok(d, "Theme addon should exist");
+
+ await t1.disable();
+ await new Promise(executeSoon);
+ Assert.ok(!t1.isActive, "Theme should be disabled");
+ Assert.ok(d.isActive, "Default theme should be active");
+
+ await promiseRestartManager();
+
+ [t1, t2, d] = await promiseAddonsByIDs(THEME_IDS);
+ Assert.ok(!t1.isActive, "Theme should still be disabled");
+ Assert.ok(d.isActive, "Default theme should still be active");
+
+ gActiveTheme = d.id;
+});
+
+/**
+ * Set the `userDisabled` property of one specific theme and check if the theme
+ * switching works as expected by checking the state of all installed themes.
+ *
+ * @param {String} which ID of the addon to set the `userDisabled` property on
+ * @param {Boolean} disabled Flag value to switch to
+ */
+async function setDisabledStateAndCheck(which, disabled = false) {
+ if (disabled) {
+ Assert.equal(which, gActiveTheme, "Only the active theme can be disabled");
+ }
+
+ let themeToDisable = disabled ? which : gActiveTheme;
+ let themeToEnable = disabled ? DEFAULT_THEME : which;
+
+ let expectedStates = {
+ [themeToDisable]: true,
+ [themeToEnable]: false,
+ };
+ let addonEvents = {
+ [themeToDisable]: [{ event: "onDisabling" }, { event: "onDisabled" }],
+ [themeToEnable]: [{ event: "onEnabling" }, { event: "onEnabled" }],
+ };
+
+ // Set the state of the theme to change.
+ let theme = await promiseAddonByID(which);
+ await expectEvents({ addonEvents }, () => {
+ if (disabled) {
+ theme.disable();
+ } else {
+ theme.enable();
+ }
+ });
+
+ let isDisabled;
+ for (theme of await promiseAddonsByIDs(REAL_THEME_IDS)) {
+ isDisabled = theme.id in expectedStates ? expectedStates[theme.id] : true;
+ Assert.equal(
+ theme.userDisabled,
+ isDisabled,
+ `Theme '${theme.id}' should be ${isDisabled ? "dis" : "en"}abled`
+ );
+ Assert.equal(
+ theme.pendingOperations,
+ AddonManager.PENDING_NONE,
+ "There should be no pending operations when no restart is expected"
+ );
+ Assert.equal(
+ theme.isActive,
+ !isDisabled,
+ `Theme '${theme.id} should be ${isDisabled ? "in" : ""}active`
+ );
+ }
+
+ await promiseRestartManager();
+
+ // All should still be good after a restart of the Addon Manager.
+ for (theme of await promiseAddonsByIDs(REAL_THEME_IDS)) {
+ isDisabled = theme.id in expectedStates ? expectedStates[theme.id] : true;
+ Assert.equal(
+ theme.userDisabled,
+ isDisabled,
+ `Theme '${theme.id}' should be ${isDisabled ? "dis" : "en"}abled`
+ );
+ Assert.equal(
+ theme.isActive,
+ !isDisabled,
+ `Theme '${theme.id}' should be ${isDisabled ? "in" : ""}active`
+ );
+ Assert.equal(
+ theme.pendingOperations,
+ AddonManager.PENDING_NONE,
+ "There should be no pending operations left"
+ );
+ if (!isDisabled) {
+ gActiveTheme = theme.id;
+ }
+ }
+}
+
+add_task(async function test_WebExtension_themes() {
+ // Enable the WebExtension theme.
+ await setDisabledStateAndCheck(THEME_IDS[0]);
+
+ // Disabling WebExtension should revert to the default theme.
+ await setDisabledStateAndCheck(THEME_IDS[0], true);
+
+ // Enable it again.
+ await setDisabledStateAndCheck(THEME_IDS[0]);
+});
+
+add_task(async function test_default_theme() {
+ // Explicitly enable the default theme.
+ await setDisabledStateAndCheck(DEFAULT_THEME);
+
+ // Swith to the WebExtension theme.
+ await setDisabledStateAndCheck(THEME_IDS[0]);
+
+ // Enable it again.
+ await setDisabledStateAndCheck(DEFAULT_THEME);
+});
+
+add_task(async function uninstall_offers_undo() {
+ let defaultTheme = await AddonManager.getAddonByID(DEFAULT_THEME);
+ const ID = THEME_IDS[0];
+ let theme = await promiseAddonByID(ID);
+
+ Assert.ok(theme, "Webextension theme is present");
+
+ async function promiseAddonEvent(event, id) {
+ let [addon] = await AddonTestUtils.promiseAddonEvent(event);
+ if (id) {
+ Assert.equal(addon.id, id, `Got event for expected addon (${event})`);
+ }
+ }
+
+ async function uninstallTheme() {
+ let uninstallingPromise = promiseAddonEvent("onUninstalling", ID);
+ await theme.uninstall(true);
+ await uninstallingPromise;
+
+ Assert.ok(
+ hasFlag(theme.pendingOperations, AddonManager.PENDING_UNINSTALL),
+ "Theme being uninstalled has PENDING_UNINSTALL flag"
+ );
+ }
+
+ async function cancelUninstallTheme() {
+ let cancelPromise = promiseAddonEvent("onOperationCancelled", ID);
+ theme.cancelUninstall();
+ await cancelPromise;
+
+ Assert.equal(
+ theme.pendingOperations,
+ AddonManager.PENDING_NONE,
+ "PENDING_UNINSTALL flag is cleared when uninstall is canceled"
+ );
+ }
+
+ // A theme should still be disabled if the uninstallation of a disabled theme
+ // is undone.
+ Assert.ok(!theme.isActive, "Webextension theme is not active");
+ Assert.ok(defaultTheme.isActive, "Default theme is active");
+ await uninstallTheme();
+ await cancelUninstallTheme();
+ Assert.ok(!theme.isActive, "Webextension theme is still not active");
+ Assert.ok(defaultTheme.isActive, "Default theme is still active");
+
+ // Enable theme, the previously active theme should be disabled.
+ await Promise.all([
+ promiseAddonEvent("onDisabled", DEFAULT_THEME),
+ promiseAddonEvent("onEnabled", ID),
+ theme.enable(),
+ ]);
+ Assert.ok(theme.isActive, "Webextension theme is active after enabling");
+ Assert.ok(!defaultTheme.isActive, "Default theme is not active any more");
+
+ // Uninstall active theme, default theme should become active.
+ await Promise.all([
+ // Note: no listener for onDisabled & ID because the uninstall is pending.
+ promiseAddonEvent("onEnabled", DEFAULT_THEME),
+ uninstallTheme(),
+ ]);
+ Assert.ok(!theme.isActive, "Webextension theme is not active upon uninstall");
+ Assert.ok(defaultTheme.isActive, "Default theme is active again");
+
+ // Undo uninstall, default theme should be deactivated.
+ await Promise.all([
+ // Note: no listener for onEnabled & ID because the uninstall was pending.
+ promiseAddonEvent("onDisabled", DEFAULT_THEME),
+ cancelUninstallTheme(),
+ ]);
+ Assert.ok(theme.isActive, "Webextension theme is active upon undo uninstall");
+ Assert.ok(!defaultTheme.isActive, "Default theme is not active again");
+
+ // Immediately remove the theme. Default theme should be activated.
+ await Promise.all([
+ promiseAddonEvent("onEnabled", DEFAULT_THEME),
+ theme.uninstall(),
+ ]);
+
+ await promiseRestartManager();
+});
+
+// Test that default_locale works with WE themes
+add_task(async function default_locale_themes() {
+ let addon = await promiseInstallWebExtension({
+ manifest: {
+ default_locale: "en",
+ name: "__MSG_name__",
+ description: "__MSG_description__",
+ theme: {
+ colors: {
+ frame: "black",
+ tab_background_text: "white",
+ },
+ },
+ },
+ files: {
+ "_locales/en/messages.json": `{
+ "name": {
+ "message": "the name"
+ },
+ "description": {
+ "message": "the description"
+ }
+ }`,
+ },
+ });
+
+ addon = await promiseAddonByID(addon.id);
+ equal(addon.name, "the name");
+ equal(addon.description, "the description");
+ equal(addon.type, "theme");
+ await addon.uninstall();
+});
+
+add_task(async function test_theme_update() {
+ let addon = await AddonManager.getAddonByID(DEFAULT_THEME);
+ ok(!addon.userDisabled, "default theme is enabled");
+
+ await AddonTestUtils.promiseRestartManager("2");
+
+ addon = await AddonManager.getAddonByID(DEFAULT_THEME);
+ ok(!addon.userDisabled, "default theme is enabled after upgrade");
+});
+
+add_task(async function test_builtin_theme_permissions() {
+ const ADDON_ID = "mytheme@mozilla.org";
+
+ let themeDef = {
+ manifest: {
+ applications: { gecko: { id: ADDON_ID } },
+ version: "1.0",
+ theme: {},
+ },
+ };
+
+ function checkPerms(addon) {
+ // builtin themes enable or disable based on disabled state
+ Assert.equal(
+ addon.userDisabled,
+ hasFlag(addon.permissions, AddonManager.PERM_CAN_ENABLE),
+ "enable permission is correct"
+ );
+ Assert.equal(
+ !addon.userDisabled,
+ hasFlag(addon.permissions, AddonManager.PERM_CAN_DISABLE),
+ "disable permission is correct"
+ );
+ // builtin themes do not get any other permission
+ Assert.ok(
+ !hasFlag(addon.permissions, AddonManager.PERM_CAN_INSTALL),
+ "cannot install by user"
+ );
+ Assert.ok(
+ !hasFlag(addon.permissions, AddonManager.PERM_CAN_UPGRADE),
+ "cannot upgrade"
+ );
+ Assert.ok(
+ !hasFlag(addon.permissions, AddonManager.PERM_CAN_UNINSTALL),
+ "cannot uninstall"
+ );
+ Assert.ok(
+ !hasFlag(
+ addon.permissions,
+ AddonManager.PERM_CAN_CHANGE_PRIVATEBROWSING_ACCESS
+ ),
+ "can change private browsing access"
+ );
+ Assert.ok(
+ hasFlag(addon.permissions, AddonManager.PERM_API_CAN_UNINSTALL),
+ "can uninstall via API"
+ );
+ }
+
+ await setupBuiltinExtension(themeDef, "first-loc", false);
+ await AddonManager.maybeInstallBuiltinAddon(
+ ADDON_ID,
+ "1.0",
+ "resource://first-loc/"
+ );
+
+ let addon = await AddonManager.getAddonByID(ADDON_ID);
+ checkPerms(addon);
+ await addon.enable();
+ checkPerms(addon);
+
+ await addon.uninstall();
+});
diff --git a/toolkit/mozapps/extensions/test/xpcshell/xpcshell-unpack.ini b/toolkit/mozapps/extensions/test/xpcshell/xpcshell-unpack.ini
new file mode 100644
index 0000000000..df6907c076
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/xpcshell-unpack.ini
@@ -0,0 +1,13 @@
+ [DEFAULT]
+head = head_addons.js head_unpack.js
+tail =
+firefox-appdir = browser
+skip-if = toolkit == 'android'
+dupe-manifest =
+tags = addons
+
+[test_webextension_paths.js]
+tags = webextensions
+
+[test_filepointer.js]
+skip-if = !allow_legacy_extensions || require_signing
diff --git a/toolkit/mozapps/extensions/test/xpcshell/xpcshell.ini b/toolkit/mozapps/extensions/test/xpcshell/xpcshell.ini
new file mode 100644
index 0000000000..908c882af3
--- /dev/null
+++ b/toolkit/mozapps/extensions/test/xpcshell/xpcshell.ini
@@ -0,0 +1,194 @@
+[DEFAULT]
+skip-if = toolkit == 'android'
+tags = addons
+head = head_addons.js
+firefox-appdir = browser
+dupe-manifest =
+support-files =
+ data/**
+
+[test_aom_startup.js]
+[test_AbuseReporter.js]
+[test_AddonRepository.js]
+[test_AddonRepository_cache.js]
+[test_AddonRepository_langpacks.js]
+[test_AddonRepository_paging.js]
+[test_ProductAddonChecker.js]
+[test_XPIStates.js]
+[test_XPIcancel.js]
+[test_addon_manager_telemetry_events.js]
+[test_addonStartup.js]
+[test_amo_stats_telemetry.js]
+[test_bad_json.js]
+[test_badschema.js]
+[test_builtin_location.js]
+[test_cacheflush.js]
+[test_childprocess.js]
+[test_cookies.js]
+[test_corrupt.js]
+[test_crash_annotation_quoting.js]
+[test_db_path.js]
+head =
+[test_delay_update_webextension.js]
+tags = webextensions
+[test_dependencies.js]
+[test_dictionary_webextension.js]
+[test_distribution.js]
+[test_duplicateplugins.js]
+run-if = appname == "firefox"
+reason = PluginProvider.jsm is only shipped with desktop Firefox
+[test_embedderDisabled.js]
+[test_error.js]
+# Bug 1508482
+skip-if = os == "win"
+[test_ext_management.js]
+tags = webextensions
+[test_general.js]
+[test_getInstallSourceFromHost.js]
+[test_gmpProvider.js]
+skip-if = appname != "firefox" || (os == "win" && processor == "aarch64") # bug 1536637
+[test_harness.js]
+[test_hidden.js]
+[test_install.js]
+[test_install_cancel.js]
+[test_install_icons.js]
+[test_isDebuggable.js]
+[test_isReady.js]
+[test_locale.js]
+[test_moved_extension_metadata.js]
+skip-if = true
+[test_no_addons.js]
+[test_nodisable_hidden.js]
+[test_onPropertyChanged_appDisabled.js]
+head = head_addons.js head_compat.js
+skip-if = tsan # Times out, bug 1674773
+[test_permissions.js]
+[test_permissions_prefs.js]
+[test_pluginchange.js]
+run-if = appname == "firefox"
+reason = PluginProvider.jsm is only shipped with desktop Firefox
+[test_pref_properties.js]
+[test_provider_markSafe.js]
+[test_provider_shutdown.js]
+[test_provider_unsafe_access_shutdown.js]
+[test_provider_unsafe_access_startup.js]
+[test_proxies.js]
+skip-if = require_signing
+[test_recommendations.js]
+skip-if = require_signing
+[test_registerchrome.js]
+[test_registry.js]
+skip-if = os != 'win'
+[test_reinstall_disabled_addon.js]
+[test_reload.js]
+# There's a problem removing a temp file without manually clearing the cache on Windows
+skip-if = os == "win"
+tags = webextensions
+[test_safemode.js]
+[test_schema_change.js]
+[test_seen.js]
+[test_shutdown.js]
+[test_shutdown_barriers.js]
+[test_shutdown_early.js]
+[test_sideload_scopes.js]
+head = head_addons.js head_sideload.js
+skip-if = os == "linux" # Bug 1613268
+[test_sideloads.js]
+[test_sideloads_after_rebuild.js]
+head = head_addons.js head_sideload.js
+[test_signed_inject.js]
+# Bug 1394122
+skip-if = true
+[test_signed_install.js]
+[test_signed_langpack.js]
+[test_signed_long.js]
+[test_signed_updatepref.js]
+skip-if = require_signing || !allow_legacy_extensions
+[test_signed_verify.js]
+[test_startup.js]
+head = head_addons.js head_sideload.js
+skip-if = os == "linux" # Bug 1613268
+[test_startup_enable.js]
+[test_startup_scan.js]
+head = head_addons.js head_sideload.js
+[test_strictcompatibility.js]
+head = head_addons.js head_compat.js
+[test_syncGUID.js]
+[test_system_allowed.js]
+head = head_addons.js head_system_addons.js
+[test_system_delay_update.js]
+head = head_addons.js head_system_addons.js
+[test_system_profile_location.js]
+[test_system_repository.js]
+head = head_addons.js head_system_addons.js
+[test_system_reset.js]
+head = head_addons.js head_system_addons.js
+[test_system_update_blank.js]
+head = head_addons.js head_system_addons.js
+[test_system_update_checkSizeHash.js]
+head = head_addons.js head_system_addons.js
+[test_system_update_custom.js]
+head = head_addons.js head_system_addons.js
+[test_system_update_empty.js]
+head = head_addons.js head_system_addons.js
+skip-if = true # Failing intermittently due to a race condition in the test, see bug 1348981
+[test_system_update_enterprisepolicy.js]
+head = head_addons.js head_system_addons.js
+[test_system_update_fail.js]
+head = head_addons.js head_system_addons.js
+skip-if = true # Bug 1501879
+[test_system_update_newset.js]
+head = head_addons.js head_system_addons.js
+[test_system_update_overlapping.js]
+head = head_addons.js head_system_addons.js
+[test_system_update_uninstall_check.js]
+head = head_addons.js head_system_addons.js
+[test_system_update_upgrades.js]
+head = head_addons.js head_system_addons.js
+[test_system_upgrades.js]
+head = head_addons.js head_system_addons.js
+[test_temporary.js]
+skip-if = os == "win" # Bug 1469904
+tags = webextensions
+[test_trash_directory.js]
+skip-if = os != "win"
+[test_types.js]
+[test_systemaddomstartupprefs.js]
+head = head_addons.js head_system_addons.js
+[test_undouninstall.js]
+skip-if = os == "win" # Bug 1358846
+[test_update.js]
+[test_updateCancel.js]
+[test_update_compatmode.js]
+head = head_addons.js head_compat.js
+[test_update_ignorecompat.js]
+skip-if = true # Bug 676922 Bug 1437697
+[test_update_noSystemAddonUpdate.js]
+head = head_addons.js head_system_addons.js
+[test_update_strictcompat.js]
+head = head_addons.js head_compat.js
+[test_update_theme.js]
+[test_update_webextensions.js]
+tags = webextensions
+[test_updatecheck.js]
+[test_updatecheck_errors.js]
+[test_updatecheck_json.js]
+[test_updateid.js]
+[test_upgrade.js]
+head = head_addons.js head_compat.js
+run-sequentially = Uses global XCurProcD dir.
+[test_upgrade_incompatible.js]
+[test_webextension.js]
+tags = webextensions
+[test_webextension_events.js]
+tags = webextensions
+[test_webextension_icons.js]
+tags = webextensions
+[test_webextension_install.js]
+tags = webextensions
+[test_webextension_install_syntax_error.js]
+tags = webextensions
+[test_webextension_langpack.js]
+tags = webextensions
+[test_webextension_theme.js]
+tags = webextensions