Source code
Revision control
Copy as Markdown
Other Tools
Test Info: Warnings
- This test gets skipped with pattern: os == 'android'
- Manifest: toolkit/components/cleardata/tests/unit/xpcshell.toml
/* Any copyright is dedicated to the Public Domain.
/**
* Tests for permissions
*/
"use strict";
// Test that only the storageAccessAPI gets removed.
add_task(async function test_removing_storage_permission() {
const principal = Services.scriptSecurityManager.createContentPrincipal(
uri,
{}
);
Services.perms.addFromPrincipal(
principal,
"storageAccessAPI",
Services.perms.ALLOW_ACTION
);
Services.perms.addFromPrincipal(
principal,
"cookie",
Services.perms.ALLOW_ACTION
);
Assert.equal(
Services.perms.testExactPermissionFromPrincipal(
principal,
"storageAccessAPI"
),
Services.perms.ALLOW_ACTION,
"There is a storageAccessAPI permission set"
);
await new Promise(aResolve => {
Services.clearData.deleteData(
Ci.nsIClearDataService.CLEAR_STORAGE_ACCESS,
value => {
Assert.equal(value, 0);
aResolve();
}
);
});
Assert.equal(
Services.perms.testExactPermissionFromPrincipal(
principal,
"storageAccessAPI"
),
Services.perms.UNKNOWN_ACTION,
"the storageAccessAPI permission has been removed"
);
Assert.equal(
Services.perms.testExactPermissionFromPrincipal(principal, "cookie"),
Services.perms.ALLOW_ACTION,
"the cookie permission has not been removed"
);
await new Promise(aResolve => {
Services.clearData.deleteData(
Ci.nsIClearDataService.CLEAR_PERMISSIONS,
() => aResolve()
);
});
});
// Test that the storageAccessAPI gets removed from a particular principal
add_task(async function test_removing_storage_permission_from_principal() {
const principal = Services.scriptSecurityManager.createContentPrincipal(
uri,
{}
);
const anotherPrincipal =
Services.scriptSecurityManager.createContentPrincipal(anotherUri, {});
Services.perms.addFromPrincipal(
principal,
"storageAccessAPI",
Services.perms.ALLOW_ACTION
);
Services.perms.addFromPrincipal(
anotherPrincipal,
"storageAccessAPI",
Services.perms.ALLOW_ACTION
);
Assert.equal(
Services.perms.testExactPermissionFromPrincipal(
principal,
"storageAccessAPI"
),
Services.perms.ALLOW_ACTION,
"storageAccessAPI permission has been added to the first principal"
);
Assert.equal(
Services.perms.testExactPermissionFromPrincipal(
anotherPrincipal,
"storageAccessAPI"
),
Services.perms.ALLOW_ACTION,
"storageAccessAPI permission has been added to the second principal"
);
await new Promise(aResolve => {
Services.clearData.deleteDataFromPrincipal(
principal,
true /* user request */,
Ci.nsIClearDataService.CLEAR_STORAGE_ACCESS,
value => {
Assert.equal(value, 0);
aResolve();
}
);
});
Assert.equal(
Services.perms.testExactPermissionFromPrincipal(
principal,
"storageAccessAPI"
),
Services.perms.UNKNOWN_ACTION,
"storageAccessAPI permission has been removed from the first principal"
);
Assert.equal(
Services.perms.testExactPermissionFromPrincipal(
anotherPrincipal,
"storageAccessAPI"
),
Services.perms.ALLOW_ACTION,
"storageAccessAPI permission has not been removed from the second principal"
);
await new Promise(aResolve => {
Services.clearData.deleteData(
Ci.nsIClearDataService.CLEAR_PERMISSIONS,
() => aResolve()
);
});
});
// Test that the storageAccessAPI gets removed from a base domain.
add_task(async function test_removing_storage_permission_from_base_domainl() {
const principal = Services.scriptSecurityManager.createContentPrincipal(
uri,
{}
);
const principalSub = Services.scriptSecurityManager.createContentPrincipal(
uriSub,
{}
);
const anotherPrincipal =
Services.scriptSecurityManager.createContentPrincipal(anotherUri, {});
Services.perms.addFromPrincipal(
principal,
"storageAccessAPI",
Services.perms.ALLOW_ACTION
);
Services.perms.addFromPrincipal(
principalSub,
"storageAccessAPI",
Services.perms.ALLOW_ACTION
);
Services.perms.addFromPrincipal(
anotherPrincipal,
"storageAccessAPI",
Services.perms.ALLOW_ACTION
);
Assert.equal(
Services.perms.testExactPermissionFromPrincipal(
principal,
"storageAccessAPI"
),
Services.perms.ALLOW_ACTION,
"storageAccessAPI permission has been added to the first principal"
);
Assert.equal(
Services.perms.testExactPermissionFromPrincipal(
principalSub,
"storageAccessAPI"
),
Services.perms.ALLOW_ACTION,
"storageAccessAPI permission has been added to the subdomain principal"
);
Assert.equal(
Services.perms.testExactPermissionFromPrincipal(
anotherPrincipal,
"storageAccessAPI"
),
Services.perms.ALLOW_ACTION,
"storageAccessAPI permission has been added to the second principal"
);
await new Promise(aResolve => {
Services.clearData.deleteDataFromSite(
"example.net",
{},
true /* user request */,
Ci.nsIClearDataService.CLEAR_STORAGE_ACCESS,
value => {
Assert.equal(value, 0);
aResolve();
}
);
});
Assert.equal(
Services.perms.testExactPermissionFromPrincipal(
principal,
"storageAccessAPI"
),
Services.perms.UNKNOWN_ACTION,
"storageAccessAPI permission has been removed from the first principal"
);
Assert.equal(
Services.perms.testExactPermissionFromPrincipal(
principalSub,
"storageAccessAPI"
),
Services.perms.UNKNOWN_ACTION,
"storageAccessAPI permission has been removed from the sub domain principal"
);
Assert.equal(
Services.perms.testExactPermissionFromPrincipal(
anotherPrincipal,
"storageAccessAPI"
),
Services.perms.ALLOW_ACTION,
"storageAccessAPI permission has not been removed from the second principal"
);
await new Promise(aResolve => {
Services.clearData.deleteData(
Ci.nsIClearDataService.CLEAR_PERMISSIONS,
() => aResolve()
);
});
});
// Tests the deleteUserInteractionForClearingHistory function.
add_task(async function test_deleteUserInteractionForClearingHistory() {
// These should be retained.
PermissionTestUtils.add(
"storageAccessAPI",
Services.perms.ALLOW_ACTION
);
PermissionTestUtils.add(
"storageAccessAPI",
Services.perms.ALLOW_ACTION
);
PermissionTestUtils.add(
"storageAccessAPI",
Services.perms.ALLOW_ACTION
);
// These should be removed.
PermissionTestUtils.add(
"storageAccessAPI",
Services.perms.ALLOW_ACTION
);
PermissionTestUtils.add(
"storageAccessAPI",
Services.perms.ALLOW_ACTION
);
PermissionTestUtils.add(
"storageAccessAPI",
Services.perms.ALLOW_ACTION
);
let principalWithStorage =
Services.scriptSecurityManager.createContentPrincipalFromOrigin(
);
await new Promise(resolve => {
return Services.clearData.deleteUserInteractionForClearingHistory(
[principalWithStorage],
0,
resolve
);
});
Assert.equal(
PermissionTestUtils.testExactPermission(
"storageAccessAPI"
),
Services.perms.UNKNOWN_ACTION
);
Assert.equal(
PermissionTestUtils.testExactPermission(
"storageAccessAPI"
),
Services.perms.UNKNOWN_ACTION
);
Assert.equal(
PermissionTestUtils.testExactPermission(
"storageAccessAPI"
),
Services.perms.UNKNOWN_ACTION
);
Assert.equal(
PermissionTestUtils.testExactPermission(
"storageAccessAPI"
),
Services.perms.ALLOW_ACTION
);
Assert.equal(
PermissionTestUtils.testExactPermission(
"storageAccessAPI"
),
Services.perms.ALLOW_ACTION
);
Assert.equal(
PermissionTestUtils.testExactPermission(
"storageAccessAPI"
),
Services.perms.ALLOW_ACTION
);
// This permission is set earlier than the timestamp and should be retained.
PermissionTestUtils.add(
"storageAccessAPI",
Services.perms.ALLOW_ACTION
);
// Add some time in between taking the snapshot of the timestamp
// to avoid flakyness.
await new Promise(c => do_timeout(100, c));
let timestamp = Date.now();
await new Promise(c => do_timeout(100, c));
// This permission is set later than the timestamp and should be removed.
PermissionTestUtils.add(
"storageAccessAPI",
Services.perms.ALLOW_ACTION
);
await new Promise(resolve => {
return Services.clearData.deleteUserInteractionForClearingHistory(
[principalWithStorage],
// ClearDataService takes PRTime (microseconds)
timestamp * 1000,
resolve
);
});
Assert.equal(
PermissionTestUtils.testExactPermission(
"storageAccessAPI"
),
Services.perms.UNKNOWN_ACTION
);
Assert.equal(
PermissionTestUtils.testExactPermission(
"storageAccessAPI"
),
Services.perms.ALLOW_ACTION
);
Assert.equal(
PermissionTestUtils.testExactPermission(
"storageAccessAPI"
),
Services.perms.ALLOW_ACTION
);
await new Promise(aResolve => {
Services.clearData.deleteData(
Ci.nsIClearDataService.CLEAR_PERMISSIONS,
() => aResolve()
);
});
});