mirror of
https://github.com/mozilla/gecko-dev.git
synced 2025-11-12 06:08:24 +02:00
***
Bug 1514594: Part 3a - Change ChromeUtils.import to return an exports object; not pollute global. r=mccr8
This changes the behavior of ChromeUtils.import() to return an exports object,
rather than a module global, in all cases except when `null` is passed as a
second argument, and changes the default behavior not to pollute the global
scope with the module's exports. Thus, the following code written for the old
model:
ChromeUtils.import("resource://gre/modules/Services.jsm");
is approximately the same as the following, in the new model:
var {Services} = ChromeUtils.import("resource://gre/modules/Services.jsm");
Since the two behaviors are mutually incompatible, this patch will land with a
scripted rewrite to update all existing callers to use the new model rather
than the old.
***
Bug 1514594: Part 3b - Mass rewrite all JS code to use the new ChromeUtils.import API. rs=Gijs
This was done using the followng script:
https://bitbucket.org/kmaglione/m-c-rewrites/src/tip/processors/cu-import-exports.jsm
***
Bug 1514594: Part 3c - Update ESLint plugin for ChromeUtils.import API changes. r=Standard8
Differential Revision: https://phabricator.services.mozilla.com/D16747
***
Bug 1514594: Part 3d - Remove/fix hundreds of duplicate imports from sync tests. r=Gijs
Differential Revision: https://phabricator.services.mozilla.com/D16748
***
Bug 1514594: Part 3e - Remove no-op ChromeUtils.import() calls. r=Gijs
Differential Revision: https://phabricator.services.mozilla.com/D16749
***
Bug 1514594: Part 3f.1 - Cleanup various test corner cases after mass rewrite. r=Gijs
***
Bug 1514594: Part 3f.2 - Cleanup various non-test corner cases after mass rewrite. r=Gijs
Differential Revision: https://phabricator.services.mozilla.com/D16750
--HG--
extra : rebase_source : 359574ee3064c90f33bf36c2ebe3159a24cc8895
extra : histedit_source : b93c8f42808b1599f9122d7842d2c0b3e656a594%2C64a3a4e3359dc889e2ab2b49461bab9e27fc10a7
97 lines
4.2 KiB
JavaScript
97 lines
4.2 KiB
JavaScript
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
// This test makes sure the HTTP authenticated sessions are correctly cleared
|
|
// when entering and leaving the private browsing mode.
|
|
|
|
function run_test() {
|
|
var am = Cc["@mozilla.org/network/http-auth-manager;1"].
|
|
getService(Ci.nsIHttpAuthManager);
|
|
|
|
const kHost1 = "pbtest3.example.com";
|
|
const kHost2 = "pbtest4.example.com";
|
|
const kPort = 80;
|
|
const kHTTP = "http";
|
|
const kBasic = "basic";
|
|
const kRealm = "realm";
|
|
const kDomain = "example.com";
|
|
const kUser = "user";
|
|
const kUser2 = "user2";
|
|
const kPassword = "pass";
|
|
const kPassword2 = "pass2";
|
|
const kEmpty = "";
|
|
|
|
const PRIVATE = true;
|
|
const NOT_PRIVATE = false;
|
|
|
|
try {
|
|
var domain = {value: kEmpty}, user = {value: kEmpty}, pass = {value: kEmpty};
|
|
// simulate a login via HTTP auth outside of the private mode
|
|
am.setAuthIdentity(kHTTP, kHost1, kPort, kBasic, kRealm, kEmpty, kDomain, kUser, kPassword);
|
|
// make sure the recently added auth entry is available outside the private browsing mode
|
|
am.getAuthIdentity(kHTTP, kHost1, kPort, kBasic, kRealm, kEmpty, domain, user, pass, NOT_PRIVATE);
|
|
Assert.equal(domain.value, kDomain);
|
|
Assert.equal(user.value, kUser);
|
|
Assert.equal(pass.value, kPassword);
|
|
|
|
// make sure the added auth entry is no longer accessible in private
|
|
domain = {value: kEmpty}, user = {value: kEmpty}, pass = {value: kEmpty};
|
|
try {
|
|
// should throw
|
|
am.getAuthIdentity(kHTTP, kHost1, kPort, kBasic, kRealm, kEmpty, domain, user, pass, PRIVATE);
|
|
do_throw("Auth entry should not be retrievable after entering the private browsing mode");
|
|
} catch (e) {
|
|
Assert.equal(domain.value, kEmpty);
|
|
Assert.equal(user.value, kEmpty);
|
|
Assert.equal(pass.value, kEmpty);
|
|
}
|
|
|
|
// simulate a login via HTTP auth inside of the private mode
|
|
am.setAuthIdentity(kHTTP, kHost2, kPort, kBasic, kRealm, kEmpty, kDomain, kUser2, kPassword2, PRIVATE);
|
|
// make sure the recently added auth entry is available inside the private browsing mode
|
|
domain = {value: kEmpty}, user = {value: kEmpty}, pass = {value: kEmpty};
|
|
am.getAuthIdentity(kHTTP, kHost2, kPort, kBasic, kRealm, kEmpty, domain, user, pass, PRIVATE);
|
|
Assert.equal(domain.value, kDomain);
|
|
Assert.equal(user.value, kUser2);
|
|
Assert.equal(pass.value, kPassword2);
|
|
|
|
try {
|
|
// make sure the recently added auth entry is not available outside the private browsing mode
|
|
domain = {value: kEmpty}, user = {value: kEmpty}, pass = {value: kEmpty};
|
|
am.getAuthIdentity(kHTTP, kHost2, kPort, kBasic, kRealm, kEmpty, domain, user, pass, NOT_PRIVATE);
|
|
do_throw("Auth entry should not be retrievable outside of private browsing mode");
|
|
} catch (x) {
|
|
Assert.equal(domain.value, kEmpty);
|
|
Assert.equal(user.value, kEmpty);
|
|
Assert.equal(pass.value, kEmpty);
|
|
}
|
|
|
|
// simulate leaving private browsing mode
|
|
Services.obs.notifyObservers(null, "last-pb-context-exited");
|
|
|
|
// make sure the added auth entry is no longer accessible in any privacy state
|
|
domain = {value: kEmpty}, user = {value: kEmpty}, pass = {value: kEmpty};
|
|
try {
|
|
// should throw (not available in public mode)
|
|
am.getAuthIdentity(kHTTP, kHost2, kPort, kBasic, kRealm, kEmpty, domain, user, pass, NOT_PRIVATE);
|
|
do_throw("Auth entry should not be retrievable after exiting the private browsing mode");
|
|
} catch (e) {
|
|
Assert.equal(domain.value, kEmpty);
|
|
Assert.equal(user.value, kEmpty);
|
|
Assert.equal(pass.value, kEmpty);
|
|
}
|
|
try {
|
|
// should throw (no longer available in private mode)
|
|
am.getAuthIdentity(kHTTP, kHost2, kPort, kBasic, kRealm, kEmpty, domain, user, pass, PRIVATE);
|
|
do_throw("Auth entry should not be retrievable in private mode after exiting the private browsing mode");
|
|
} catch (x) {
|
|
Assert.equal(domain.value, kEmpty);
|
|
Assert.equal(user.value, kEmpty);
|
|
Assert.equal(pass.value, kEmpty);
|
|
}
|
|
} catch (e) {
|
|
do_throw("Unexpected exception while testing HTTP auth manager: " + e);
|
|
}
|
|
}
|
|
|