Source code

Revision control

Copy as Markdown

Other Tools

Test Info: Warnings

// We're using custom message passing so don't have access to Assert.foo
// everywhere. Disable the linter:
/* eslint-disable mozilla/no-comparison-or-assignment-inside-ok */
AntiTracking.runTest(
"Test whether we receive any persistent permissions in normal windows",
// Blocking callback
async _ => {
// Nothing to do here!
},
// Non blocking callback
async _ => {
try {
// We load the test script in the parent process to check permissions.
let chromeScript = SpecialPowers.loadChromeScript(_ => {
/* eslint-env mozilla/chrome-script */
addMessageListener("go", _ => {
function ok(what, msg) {
sendAsyncMessage("ok", { what: !!what, msg });
}
function is(a, b, msg) {
ok(a === b, msg);
}
// We should use the principal of the TEST_DOMAIN since the storage
// permission is saved under it.
let principal =
Services.scriptSecurityManager.createContentPrincipalFromOrigin(
);
for (let perm of Services.perms.getAllForPrincipal(principal)) {
// Ignore permissions other than storage access
if (
!perm.type.startsWith("3rdPartyStorage^") &&
!perm.type.startsWith("3rdPartyFrameStorage^")
) {
continue;
}
is(
perm.expireType,
Services.perms.EXPIRE_TIME,
"Permission must expire at a specific time"
);
ok(perm.expireTime > 0, "Permission must have a expiry time");
}
sendAsyncMessage("done");
});
});
chromeScript.addMessageListener("ok", obj => {
ok(obj.what, obj.msg);
});
await new Promise(resolve => {
chromeScript.addMessageListener("done", _ => {
chromeScript.destroy();
resolve();
});
chromeScript.sendAsyncMessage("go");
});
// We check the permission in tracking processes for non-Fission mode. In
// Fission mode, the permission won't be synced to the tracking process,
// so we don't check it.
if (!SpecialPowers.useRemoteSubframes) {
let Services = SpecialPowers.Services;
let principal =
Services.scriptSecurityManager.createContentPrincipalFromOrigin(
);
for (let perm of Services.perms.getAllForPrincipal(principal)) {
// Ignore permissions other than storage access
if (
!perm.type.startsWith("3rdPartyStorage^") &&
!perm.type.startsWith("3rdPartyFrameStorage^")
) {
continue;
}
is(
perm.expireType,
Services.perms.EXPIRE_TIME,
"Permission must expire at a specific time"
);
ok(perm.expireTime > 0, "Permission must have a expiry time");
}
}
} catch (e) {
alert(e);
}
},
// Cleanup callback
async _ => {
await new Promise(resolve => {
Services.clearData.deleteData(Ci.nsIClearDataService.CLEAR_ALL, () =>
resolve()
);
});
},
[["privacy.partition.always_partition_third_party_non_cookie_storage", true]], // extra prefs
true, // run the window.open() test
true, // run the user interaction test
[
// expected blocking notifications
Ci.nsIWebProgressListener.STATE_COOKIES_BLOCKED_TRACKER,
Ci.nsIWebProgressListener.STATE_COOKIES_BLOCKED_ALL,
],
false
); // run in normal windows