summaryrefslogtreecommitdiffstats
path: root/extensions/permissions/test/unit/test_permmanager_getAllForPrincipal.js
blob: b8cfe265495e9ffff5bbfbb0a8ed515e09dfe40c (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
/* Any copyright is dedicated to the Public Domain.
   http://creativecommons.org/publicdomain/zero/1.0/ */

function check_enumerator(principal, permissions) {
  let perms = Services.perms.getAllForPrincipal(principal);
  for (let [type, capability] of permissions) {
    let perm = perms.shift();
    Assert.ok(perm != null);
    Assert.equal(perm.type, type);
    Assert.equal(perm.capability, capability);
    Assert.equal(perm.expireType, Services.perms.EXPIRE_NEVER);
  }
  Assert.ok(!perms.length);
}

function run_test() {
  let pm = Services.perms;

  let principal = Services.scriptSecurityManager.createContentPrincipalFromOrigin(
    "http://example.com"
  );
  let subPrincipal = Services.scriptSecurityManager.createContentPrincipalFromOrigin(
    "http://sub.example.com"
  );

  check_enumerator(principal, []);

  pm.addFromPrincipal(principal, "test/getallforuri", pm.ALLOW_ACTION);
  check_enumerator(principal, [["test/getallforuri", pm.ALLOW_ACTION]]);

  // check that uris are matched exactly
  check_enumerator(subPrincipal, []);

  pm.addFromPrincipal(subPrincipal, "test/getallforuri", pm.PROMPT_ACTION);
  pm.addFromPrincipal(subPrincipal, "test/getallforuri2", pm.DENY_ACTION);

  check_enumerator(subPrincipal, [
    ["test/getallforuri", pm.PROMPT_ACTION],
    ["test/getallforuri2", pm.DENY_ACTION],
  ]);

  // check that the original uri list has not changed
  check_enumerator(principal, [["test/getallforuri", pm.ALLOW_ACTION]]);

  // check that UNKNOWN_ACTION permissions are ignored
  pm.addFromPrincipal(principal, "test/getallforuri2", pm.UNKNOWN_ACTION);
  pm.addFromPrincipal(principal, "test/getallforuri3", pm.DENY_ACTION);

  check_enumerator(principal, [
    ["test/getallforuri", pm.ALLOW_ACTION],
    ["test/getallforuri3", pm.DENY_ACTION],
  ]);

  // check that permission updates are reflected
  pm.addFromPrincipal(principal, "test/getallforuri", pm.PROMPT_ACTION);

  check_enumerator(principal, [
    ["test/getallforuri", pm.PROMPT_ACTION],
    ["test/getallforuri3", pm.DENY_ACTION],
  ]);

  // check that permission removals are reflected
  pm.removeFromPrincipal(principal, "test/getallforuri");

  check_enumerator(principal, [["test/getallforuri3", pm.DENY_ACTION]]);

  pm.removeAll();
  check_enumerator(principal, []);
  check_enumerator(subPrincipal, []);
}