Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 // tests third party cookie blocking using a favicon load directly from chrome.
2 // in this case, the docshell of the channel is chrome, not content; thus
3 // the cookie should be considered third party.
5 function test() {
6 waitForExplicitFinish();
8 Services.prefs.setIntPref("network.cookie.cookieBehavior", 1);
10 Services.obs.addObserver(function (theSubject, theTopic, theData) {
11 var uri = theSubject.QueryInterface(Components.interfaces.nsIURI);
12 var domain = uri.host;
14 if (domain == "example.org") {
15 ok(true, "foreign favicon cookie was blocked");
17 Services.prefs.setIntPref("network.cookie.cookieBehavior", 0);
19 Services.obs.removeObserver(arguments.callee, "cookie-rejected");
21 finish();
22 }
23 }, "cookie-rejected", false);
25 // kick off a favicon load
26 gBrowser.setIcon(gBrowser.selectedTab, "http://example.org/tests/extensions/cookie/test/damonbowling.jpg");
27 }