js/xpconnect/tests/chrome/test_bug996069.xul

Sat, 03 Jan 2015 20:18:00 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Sat, 03 Jan 2015 20:18:00 +0100
branch
TOR_BUG_3246
changeset 7
129ffea94266
permissions
-rw-r--r--

Conditionally enable double key logic according to:
private browsing mode or privacy.thirdparty.isolate preference and
implement in GetCookieStringCommon and FindCookie where it counts...
With some reservations of how to convince FindCookie users to test
condition and pass a nullptr when disabling double key logic.

michael@0 1 <?xml version="1.0"?>
michael@0 2 <?xml-stylesheet type="text/css" href="chrome://global/skin"?>
michael@0 3 <?xml-stylesheet type="text/css" href="chrome://mochikit/content/tests/SimpleTest/test.css"?>
michael@0 4 <!--
michael@0 5 https://bugzilla.mozilla.org/show_bug.cgi?id=996069
michael@0 6 -->
michael@0 7 <window title="Mozilla Bug 996069"
michael@0 8 xmlns="http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul">
michael@0 9 <script type="application/javascript" src="chrome://mochikit/content/tests/SimpleTest/SimpleTest.js"/>
michael@0 10
michael@0 11 <!-- test results are displayed in the html:body -->
michael@0 12 <body xmlns="http://www.w3.org/1999/xhtml">
michael@0 13 <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=996069"
michael@0 14 target="_blank">Mozilla Bug 996069</a>
michael@0 15 </body>
michael@0 16
michael@0 17 <!-- test code goes here -->
michael@0 18 <script type="application/javascript">
michael@0 19 <![CDATA[
michael@0 20 const Cu = Components.utils;
michael@0 21 /** Test for Bug 996069 **/
michael@0 22 SimpleTest.waitForExplicitFinish();
michael@0 23
michael@0 24 function loaded() {
michael@0 25 var ifr = document.getElementById("ifr").contentWindow;
michael@0 26 var sb = new Cu.Sandbox([ifr],
michael@0 27 { sandboxPrototype: ifr });
michael@0 28
michael@0 29 ifr.wrappedJSObject.finishTest = function() {
michael@0 30 // If we got here we did not hit the NS_ReleaseAssert...
michael@0 31 ok(true, "nsExpandedPrincipal should not be inherited by content windows");
michael@0 32
michael@0 33 // But let's be sure that the new window does not have nsEP
michael@0 34 newWin.wrappedJSObject.obj = Cu.evalInSandbox("var obj = { foo: 'bar' }; obj", sb);
michael@0 35 try {
michael@0 36 newWin.eval("obj.foo");
michael@0 37 ok(false, "newWin should not have access to object from a scope with nsExpandedPrincipal");
michael@0 38 } catch (e) {
michael@0 39 ok(/Permission denied/.exec(e.message), "newWin should not have access to object from a scope with nsExpandedPrincipal");
michael@0 40 }
michael@0 41 newWin.close();
michael@0 42 SimpleTest.finish();
michael@0 43 };
michael@0 44
michael@0 45 var newWin = Cu.evalInSandbox(
michael@0 46 "window.open('http://example.org/chrome/js/xpconnect/tests/chrome/file_bug996069.html');",
michael@0 47 sb);
michael@0 48 }
michael@0 49
michael@0 50 ]]>
michael@0 51 </script>
michael@0 52 <iframe id="ifr" onload="loaded();" type="content" src="http://example.org/chrome/js/xpconnect/tests/chrome/file_bug996069.html" />
michael@0 53 </window>

mercurial