Sat, 03 Jan 2015 20:18:00 +0100
Conditionally enable double key logic according to:
private browsing mode or privacy.thirdparty.isolate preference and
implement in GetCookieStringCommon and FindCookie where it counts...
With some reservations of how to convince FindCookie users to test
condition and pass a nullptr when disabling double key logic.
michael@0 | 1 | <?xml version="1.0"?> |
michael@0 | 2 | <?xml-stylesheet type="text/css" href="chrome://global/skin"?> |
michael@0 | 3 | <?xml-stylesheet type="text/css" href="chrome://mochikit/content/tests/SimpleTest/test.css"?> |
michael@0 | 4 | <!-- |
michael@0 | 5 | https://bugzilla.mozilla.org/show_bug.cgi?id=996069 |
michael@0 | 6 | --> |
michael@0 | 7 | <window title="Mozilla Bug 996069" |
michael@0 | 8 | xmlns="http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul"> |
michael@0 | 9 | <script type="application/javascript" src="chrome://mochikit/content/tests/SimpleTest/SimpleTest.js"/> |
michael@0 | 10 | |
michael@0 | 11 | <!-- test results are displayed in the html:body --> |
michael@0 | 12 | <body xmlns="http://www.w3.org/1999/xhtml"> |
michael@0 | 13 | <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=996069" |
michael@0 | 14 | target="_blank">Mozilla Bug 996069</a> |
michael@0 | 15 | </body> |
michael@0 | 16 | |
michael@0 | 17 | <!-- test code goes here --> |
michael@0 | 18 | <script type="application/javascript"> |
michael@0 | 19 | <![CDATA[ |
michael@0 | 20 | const Cu = Components.utils; |
michael@0 | 21 | /** Test for Bug 996069 **/ |
michael@0 | 22 | SimpleTest.waitForExplicitFinish(); |
michael@0 | 23 | |
michael@0 | 24 | function loaded() { |
michael@0 | 25 | var ifr = document.getElementById("ifr").contentWindow; |
michael@0 | 26 | var sb = new Cu.Sandbox([ifr], |
michael@0 | 27 | { sandboxPrototype: ifr }); |
michael@0 | 28 | |
michael@0 | 29 | ifr.wrappedJSObject.finishTest = function() { |
michael@0 | 30 | // If we got here we did not hit the NS_ReleaseAssert... |
michael@0 | 31 | ok(true, "nsExpandedPrincipal should not be inherited by content windows"); |
michael@0 | 32 | |
michael@0 | 33 | // But let's be sure that the new window does not have nsEP |
michael@0 | 34 | newWin.wrappedJSObject.obj = Cu.evalInSandbox("var obj = { foo: 'bar' }; obj", sb); |
michael@0 | 35 | try { |
michael@0 | 36 | newWin.eval("obj.foo"); |
michael@0 | 37 | ok(false, "newWin should not have access to object from a scope with nsExpandedPrincipal"); |
michael@0 | 38 | } catch (e) { |
michael@0 | 39 | ok(/Permission denied/.exec(e.message), "newWin should not have access to object from a scope with nsExpandedPrincipal"); |
michael@0 | 40 | } |
michael@0 | 41 | newWin.close(); |
michael@0 | 42 | SimpleTest.finish(); |
michael@0 | 43 | }; |
michael@0 | 44 | |
michael@0 | 45 | var newWin = Cu.evalInSandbox( |
michael@0 | 46 | "window.open('http://example.org/chrome/js/xpconnect/tests/chrome/file_bug996069.html');", |
michael@0 | 47 | sb); |
michael@0 | 48 | } |
michael@0 | 49 | |
michael@0 | 50 | ]]> |
michael@0 | 51 | </script> |
michael@0 | 52 | <iframe id="ifr" onload="loaded();" type="content" src="http://example.org/chrome/js/xpconnect/tests/chrome/file_bug996069.html" /> |
michael@0 | 53 | </window> |