1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
|
AntiTracking.runTest(
"Test whether we receive any persistent permissions in normal windows",
// Blocking callback
async _ => {
// Nothing to do here!
},
// Non blocking callback
async _ => {
try {
// We load the test script in the parent process to check permissions.
let chromeScript = SpecialPowers.loadChromeScript(_ => {
/* eslint-env mozilla/chrome-script */
addMessageListener("go", _ => {
function ok(what, msg) {
sendAsyncMessage("ok", { what: !!what, msg });
}
function is(a, b, msg) {
ok(a === b, msg);
}
// We should use the principal of the TEST_DOMAIN since the storage
// permission is saved under it.
let principal =
Services.scriptSecurityManager.createContentPrincipalFromOrigin(
"http://example.net/"
);
for (let perm of Services.perms.getAllForPrincipal(principal)) {
// Ignore permissions other than storage access
if (!perm.type.startsWith("3rdPartyStorage^")) {
continue;
}
is(
perm.expireType,
Services.perms.EXPIRE_TIME,
"Permission must expire at a specific time"
);
ok(perm.expireTime > 0, "Permission must have a expiry time");
}
sendAsyncMessage("done");
});
});
chromeScript.addMessageListener("ok", obj => {
ok(obj.what, obj.msg);
});
await new Promise(resolve => {
chromeScript.addMessageListener("done", _ => {
chromeScript.destroy();
resolve();
});
chromeScript.sendAsyncMessage("go");
});
// We check the permission in tracking processes for non-Fission mode. In
// Fission mode, the permission won't be synced to the tracking process,
// so we don't check it.
if (!SpecialPowers.useRemoteSubframes) {
let Services = SpecialPowers.Services;
let principal =
Services.scriptSecurityManager.createContentPrincipalFromOrigin(
"http://example.net/"
);
for (let perm of Services.perms.getAllForPrincipal(principal)) {
// Ignore permissions other than storage access
if (!perm.type.startsWith("3rdPartyStorage^")) {
continue;
}
is(
perm.expireType,
Services.perms.EXPIRE_TIME,
"Permission must expire at a specific time"
);
ok(perm.expireTime > 0, "Permission must have a expiry time");
}
}
} catch (e) {
alert(e);
}
},
// Cleanup callback
async _ => {
await new Promise(resolve => {
Services.clearData.deleteData(Ci.nsIClearDataService.CLEAR_ALL, value =>
resolve()
);
});
},
[
[
"privacy.partition.always_partition_third_party_non_cookie_storage",
false,
],
], // extra prefs
true, // run the window.open() test
true, // run the user interaction test
0, // don't expect blocking notifications
false
); // run in normal windows
|