1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
|
/* Any copyright is dedicated to the Public Domain.
http://creativecommons.org/publicdomain/zero/1.0/ */
// Test private browsing mode.
"use strict";
function make_channel(url) {
return NetUtil.newChannel({
uri: url,
loadUsingSystemPrincipal: true,
}).QueryInterface(Ci.nsIHttpChannel);
}
function getCookieStringFromPrivateDocument(uriSpec) {
return CookieXPCShellUtils.getCookieStringFromDocument(uriSpec, {
privateBrowsing: true,
});
}
add_task(async () => {
// Set up a profile.
do_get_profile();
// We don't want to have CookieJarSettings blocking this test.
Services.prefs.setBoolPref(
"network.cookieJarSettings.unblocked_for_testing",
true
);
// Test with cookies enabled.
Services.prefs.setIntPref("network.cookie.cookieBehavior", 0);
Services.prefs.setBoolPref("dom.security.https_first", false);
// Test with https-first-mode disabled in PBM
Services.prefs.setBoolPref("dom.security.https_first_pbm", false);
CookieXPCShellUtils.createServer({ hosts: ["foo.com", "bar.com"] });
// We need to keep a private-browsing window active, otherwise the
// 'last-pb-context-exited' notification will be dispatched.
const privateBrowsingHolder = await CookieXPCShellUtils.loadContentPage(
"http://bar.com/",
{ privateBrowsing: true }
);
// Create URIs pointing to foo.com and bar.com.
let uri1 = NetUtil.newURI("http://foo.com/foo.html");
let uri2 = NetUtil.newURI("http://bar.com/bar.html");
// Set a cookie for host 1.
Services.cookies.setCookieStringFromHttp(
uri1,
"oh=hai; max-age=1000",
make_channel(uri1.spec)
);
Assert.equal(Services.cookies.countCookiesFromHost(uri1.host), 1);
// Enter private browsing mode, set a cookie for host 2, and check the counts.
var chan1 = make_channel(uri1.spec);
chan1.QueryInterface(Ci.nsIPrivateBrowsingChannel);
chan1.setPrivate(true);
var chan2 = make_channel(uri2.spec);
chan2.QueryInterface(Ci.nsIPrivateBrowsingChannel);
chan2.setPrivate(true);
Services.cookies.setCookieStringFromHttp(uri2, "oh=hai; max-age=1000", chan2);
Assert.equal(await getCookieStringFromPrivateDocument(uri1.spec), "");
Assert.equal(await getCookieStringFromPrivateDocument(uri2.spec), "oh=hai");
// Remove cookies and check counts.
Services.obs.notifyObservers(null, "last-pb-context-exited");
Assert.equal(await getCookieStringFromPrivateDocument(uri1.spec), "");
Assert.equal(await getCookieStringFromPrivateDocument(uri2.spec), "");
Services.cookies.setCookieStringFromHttp(uri2, "oh=hai; max-age=1000", chan2);
Assert.equal(await getCookieStringFromPrivateDocument(uri2.spec), "oh=hai");
// Leave private browsing mode and check counts.
Services.obs.notifyObservers(null, "last-pb-context-exited");
Assert.equal(Services.cookies.countCookiesFromHost(uri1.host), 1);
Assert.equal(Services.cookies.countCookiesFromHost(uri2.host), 0);
// Fake a profile change.
await promise_close_profile();
do_load_profile();
// Check that the right cookie persisted.
Assert.equal(Services.cookies.countCookiesFromHost(uri1.host), 1);
Assert.equal(Services.cookies.countCookiesFromHost(uri2.host), 0);
// Enter private browsing mode, set a cookie for host 2, and check the counts.
Assert.equal(await getCookieStringFromPrivateDocument(uri1.spec), "");
Assert.equal(await getCookieStringFromPrivateDocument(uri2.spec), "");
Services.cookies.setCookieStringFromHttp(uri2, "oh=hai; max-age=1000", chan2);
Assert.equal(await getCookieStringFromPrivateDocument(uri2.spec), "oh=hai");
// on android fission the privateBrowsingHolder prevents
// the cookies on the content process from being updated
// Let's release the last PB window.
await privateBrowsingHolder.close();
// Fake a profile change.
await promise_close_profile();
do_load_profile();
// keep the private browsing window open again
const privateBrowsingHolder2 = await CookieXPCShellUtils.loadContentPage(
"http://bar.com/",
{ privateBrowsing: true }
);
// We're still in private browsing mode, but should have a new session.
// Check counts.
Assert.equal(await getCookieStringFromPrivateDocument(uri1.spec), "");
Assert.equal(await getCookieStringFromPrivateDocument(uri2.spec), "");
// Leave private browsing mode and check counts.
Services.obs.notifyObservers(null, "last-pb-context-exited");
Assert.equal(Services.cookies.countCookiesFromHost(uri1.host), 1);
Assert.equal(Services.cookies.countCookiesFromHost(uri2.host), 0);
// Enter private browsing mode.
// Fake a profile change, but wait for async read completion.
await promise_close_profile();
await promise_load_profile();
// We're still in private browsing mode, but should have a new session.
// Check counts.
Assert.equal(await getCookieStringFromPrivateDocument(uri1.spec), "");
Assert.equal(await getCookieStringFromPrivateDocument(uri2.spec), "");
// Leave private browsing mode and check counts.
Services.obs.notifyObservers(null, "last-pb-context-exited");
Assert.equal(Services.cookies.countCookiesFromHost(uri1.host), 1);
Assert.equal(Services.cookies.countCookiesFromHost(uri2.host), 0);
// Let's release the last PB window.
await privateBrowsingHolder2.close();
Services.prefs.clearUserPref("dom.security.https_first");
});
|