1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
|
/* Any copyright is dedicated to the Public Domain.
* http://creativecommons.org/publicdomain/zero/1.0/
*/
// Tests that xpinstall.[whitelist|blacklist].add preferences are emptied when
// converted into permissions.
const PREF_XPI_WHITELIST_PERMISSIONS = "xpinstall.whitelist.add";
const PREF_XPI_BLACKLIST_PERMISSIONS = "xpinstall.blacklist.add";
const { PermissionsTestUtils } = ChromeUtils.importESModule(
"resource://gre/modules/PermissionsUtils.sys.mjs"
);
function newPrincipal(uri) {
return Services.scriptSecurityManager.createContentPrincipal(
NetUtil.newURI(uri),
{}
);
}
function do_check_permission_prefs(preferences) {
// Check preferences were emptied
for (let pref of preferences) {
try {
Assert.equal(Services.prefs.getCharPref(pref), "");
} catch (e) {
// Successfully emptied
}
}
}
add_task(async function setup() {
createAppInfo("xpcshell@tests.mozilla.org", "XPCShell", "1", "1.9");
// Create own preferences to test
Services.prefs.setCharPref("xpinstall.whitelist.add.EMPTY", "");
Services.prefs.setCharPref(
"xpinstall.whitelist.add.TEST",
"http://whitelist.example.com"
);
Services.prefs.setCharPref("xpinstall.blacklist.add.EMPTY", "");
Services.prefs.setCharPref(
"xpinstall.blacklist.add.TEST",
"http://blacklist.example.com"
);
// Get list of preferences to check
var whitelistPreferences = Services.prefs.getChildList(
PREF_XPI_WHITELIST_PERMISSIONS
);
var blacklistPreferences = Services.prefs.getChildList(
PREF_XPI_BLACKLIST_PERMISSIONS
);
var preferences = whitelistPreferences.concat(blacklistPreferences);
await promiseStartupManager();
// Permissions are imported lazily - act as thought we're checking an install,
// to trigger on-deman importing of the permissions.
AddonManager.isInstallAllowed(
"application/x-xpinstall",
newPrincipal("http://example.com/file.xpi")
);
do_check_permission_prefs(preferences);
// Import can also be triggered by an observer notification by any other area
// of code, such as a permissions management UI.
// First, request to flush all permissions
PermissionsTestUtils.clearImportedPrefBranches();
Services.prefs.setCharPref(
"xpinstall.whitelist.add.TEST2",
"https://whitelist2.example.com"
);
Services.obs.notifyObservers(null, "flush-pending-permissions", "install");
do_check_permission_prefs(preferences);
// Then, request to flush just install permissions
PermissionsTestUtils.clearImportedPrefBranches();
Services.prefs.setCharPref(
"xpinstall.whitelist.add.TEST3",
"https://whitelist3.example.com"
);
Services.obs.notifyObservers(null, "flush-pending-permissions");
do_check_permission_prefs(preferences);
// And a request to flush some other permissions sholdn't flush install permissions
PermissionsTestUtils.clearImportedPrefBranches();
Services.prefs.setCharPref(
"xpinstall.whitelist.add.TEST4",
"https://whitelist4.example.com"
);
Services.obs.notifyObservers(null, "flush-pending-permissions", "lolcats");
Assert.equal(
Services.prefs.getCharPref("xpinstall.whitelist.add.TEST4"),
"https://whitelist4.example.com"
);
});
|