mirror of
https://github.com/mozilla/gecko-dev.git
synced 2025-11-09 04:39:03 +02:00
190 lines
4.7 KiB
JavaScript
190 lines
4.7 KiB
JavaScript
/* Any copyright is dedicated to the Public Domain.
|
|
* http://creativecommons.org/publicdomain/zero/1.0/ */
|
|
|
|
const { Sanitizer } = ChromeUtils.import("resource:///modules/Sanitizer.jsm");
|
|
const { SiteDataTestUtils } = ChromeUtils.import(
|
|
"resource://testing-common/SiteDataTestUtils.jsm"
|
|
);
|
|
const { PermissionTestUtils } = ChromeUtils.import(
|
|
"resource://testing-common/PermissionTestUtils.jsm"
|
|
);
|
|
|
|
const oneHour = 3600000000;
|
|
|
|
add_task(async function sanitizeWithExceptionsOnShutdown() {
|
|
info(
|
|
"Test that cookies that are marked as allowed from the user do not get \
|
|
cleared when cleaning on shutdown is done"
|
|
);
|
|
|
|
await SpecialPowers.pushPrefEnv({
|
|
set: [
|
|
["browser.sanitizer.loglevel", "All"],
|
|
["privacy.sanitize.sanitizeOnShutdown", true],
|
|
],
|
|
});
|
|
|
|
// Clean up before start
|
|
await new Promise(resolve => {
|
|
Services.clearData.deleteData(Ci.nsIClearDataService.CLEAR_ALL, resolve);
|
|
});
|
|
|
|
let originALLOW = "https://mozilla.org";
|
|
PermissionTestUtils.add(
|
|
originALLOW,
|
|
"cookie",
|
|
Ci.nsICookiePermission.ACCESS_ALLOW
|
|
);
|
|
|
|
let originDENY = "https://example123.com";
|
|
PermissionTestUtils.add(
|
|
originDENY,
|
|
"cookie",
|
|
Ci.nsICookiePermission.ACCESS_DENY
|
|
);
|
|
|
|
SiteDataTestUtils.addToCookies({ origin: originALLOW });
|
|
ok(
|
|
SiteDataTestUtils.hasCookies(originALLOW),
|
|
"We have cookies for " + originALLOW
|
|
);
|
|
|
|
SiteDataTestUtils.addToCookies({ origin: originDENY });
|
|
ok(
|
|
SiteDataTestUtils.hasCookies(originDENY),
|
|
"We have cookies for " + originDENY
|
|
);
|
|
|
|
await Sanitizer.runSanitizeOnShutdown();
|
|
|
|
ok(
|
|
SiteDataTestUtils.hasCookies(originALLOW),
|
|
"We should have cookies for " + originALLOW
|
|
);
|
|
|
|
ok(
|
|
!SiteDataTestUtils.hasCookies(originDENY),
|
|
"We should not have cookies for " + originDENY
|
|
);
|
|
});
|
|
|
|
add_task(async function sanitizeNoExceptionsInTimeRange() {
|
|
info(
|
|
"Test that no exceptions are made when not clearing on shutdown, e.g. clearing within a range"
|
|
);
|
|
|
|
// Clean up before start
|
|
await new Promise(resolve => {
|
|
Services.clearData.deleteData(Ci.nsIClearDataService.CLEAR_ALL, resolve);
|
|
});
|
|
|
|
let originALLOW = "https://mozilla.org";
|
|
PermissionTestUtils.add(
|
|
originALLOW,
|
|
"cookie",
|
|
Ci.nsICookiePermission.ACCESS_ALLOW
|
|
);
|
|
|
|
let originDENY = "https://bar123.com";
|
|
PermissionTestUtils.add(
|
|
originDENY,
|
|
"cookie",
|
|
Ci.nsICookiePermission.ACCESS_DENY
|
|
);
|
|
|
|
SiteDataTestUtils.addToCookies({ origin: originALLOW });
|
|
ok(
|
|
SiteDataTestUtils.hasCookies(originALLOW),
|
|
"We have cookies for " + originALLOW
|
|
);
|
|
|
|
SiteDataTestUtils.addToCookies({ origin: originDENY });
|
|
ok(
|
|
SiteDataTestUtils.hasCookies(originDENY),
|
|
"We have cookies for " + originDENY
|
|
);
|
|
|
|
let to = Date.now() * 1000;
|
|
let from = to - oneHour;
|
|
await Sanitizer.sanitize(["cookies"], { range: [from, to] });
|
|
|
|
ok(
|
|
!SiteDataTestUtils.hasCookies(originALLOW),
|
|
"We should not have cookies for " + originALLOW
|
|
);
|
|
|
|
ok(
|
|
!SiteDataTestUtils.hasCookies(originDENY),
|
|
"We should not have cookies for " + originDENY
|
|
);
|
|
});
|
|
|
|
add_task(async function sanitizeWithExceptionsOnStartup() {
|
|
info(
|
|
"Test that cookies that are marked as allowed from the user do not get \
|
|
cleared when cleaning on startup is done, for example after a crash"
|
|
);
|
|
|
|
await SpecialPowers.pushPrefEnv({
|
|
set: [
|
|
["browser.sanitizer.loglevel", "All"],
|
|
["privacy.sanitize.sanitizeOnShutdown", true],
|
|
],
|
|
});
|
|
|
|
// Clean up before start
|
|
await new Promise(resolve => {
|
|
Services.clearData.deleteData(Ci.nsIClearDataService.CLEAR_ALL, resolve);
|
|
});
|
|
|
|
let originALLOW = "https://mozilla.org";
|
|
PermissionTestUtils.add(
|
|
originALLOW,
|
|
"cookie",
|
|
Ci.nsICookiePermission.ACCESS_ALLOW
|
|
);
|
|
|
|
let originDENY = "https://example123.com";
|
|
PermissionTestUtils.add(
|
|
originDENY,
|
|
"cookie",
|
|
Ci.nsICookiePermission.ACCESS_DENY
|
|
);
|
|
|
|
SiteDataTestUtils.addToCookies({ origin: originALLOW });
|
|
ok(
|
|
SiteDataTestUtils.hasCookies(originALLOW),
|
|
"We have cookies for " + originALLOW
|
|
);
|
|
|
|
SiteDataTestUtils.addToCookies({ origin: originDENY });
|
|
ok(
|
|
SiteDataTestUtils.hasCookies(originDENY),
|
|
"We have cookies for " + originDENY
|
|
);
|
|
|
|
let pendingSanitizations = [
|
|
{
|
|
id: "shutdown",
|
|
itemsToClear: ["cookies"],
|
|
options: {},
|
|
},
|
|
];
|
|
Services.prefs.setBoolPref(Sanitizer.PREF_SANITIZE_ON_SHUTDOWN, true);
|
|
Services.prefs.setStringPref(
|
|
Sanitizer.PREF_PENDING_SANITIZATIONS,
|
|
JSON.stringify(pendingSanitizations)
|
|
);
|
|
|
|
await Sanitizer.onStartup();
|
|
|
|
ok(
|
|
SiteDataTestUtils.hasCookies(originALLOW),
|
|
"We should have cookies for " + originALLOW
|
|
);
|
|
|
|
ok(
|
|
!SiteDataTestUtils.hasCookies(originDENY),
|
|
"We should not have cookies for " + originDENY
|
|
);
|
|
});
|