Source code

Revision control

Copy as Markdown

Other Tools

"use strict";
/* exported createHttpServer, cleanupDir, clearCache, optionalPermissionsPromptHandler, promiseConsoleOutput,
promiseQuotaManagerServiceReset, promiseQuotaManagerServiceClear,
runWithPrefs, testEnv, withHandlingUserInput, resetHandlingUserInput,
assertPersistentListeners, promiseExtensionEvent, assertHasPersistedScriptsCachedFlag,
assertIsPersistedScriptsCachedFlag,
setup_crash_reporter_override_and_cleaner, crashFrame, crashExtensionBackground,
makeRkvDatabaseDir
*/
var { AppConstants } = ChromeUtils.importESModule(
);
var { XPCOMUtils } = ChromeUtils.importESModule(
);
var {
clearInterval,
clearTimeout,
setInterval,
setIntervalWithTarget,
setTimeout,
setTimeoutWithTarget,
} = ChromeUtils.importESModule("resource://gre/modules/Timer.sys.mjs");
var { AddonTestUtils, MockAsyncShutdown } = ChromeUtils.importESModule(
);
ChromeUtils.defineESModuleGetters(this, {
ExtensionTestUtils:
});
PromiseTestUtils.allowMatchingRejectionsGlobally(
/Message manager disconnected/
);
// Persistent Listener test functionality
const { assertPersistentListeners } = ExtensionTestUtils.testAssertions;
// https_first automatically upgrades http to https, but the tests are not
// designed to expect that. And it is not easy to change that because
// nsHttpServer does not support https (bug 1742061). So disable https_first.
Services.prefs.setBoolPref("dom.security.https_first", false);
// These values may be changed in later head files and tested in check_remote
// below.
Services.prefs.setBoolPref("extensions.webextensions.remote", false);
const testEnv = {
expectRemote: false,
};
add_setup(function check_remote() {
Assert.equal(
WebExtensionPolicy.useRemoteWebExtensions,
testEnv.expectRemote,
"useRemoteWebExtensions matches"
);
Assert.equal(
WebExtensionPolicy.isExtensionProcess,
!testEnv.expectRemote,
"testing from extension process"
);
});
ExtensionTestUtils.init(this);
var createHttpServer = (...args) => {
AddonTestUtils.maybeInit(this);
return AddonTestUtils.createHttpServer(...args);
};
async function makeRkvDatabaseDir(name, { mockCorrupted = false } = {}) {
const databaseDir = PathUtils.join(PathUtils.profileDir, name);
await IOUtils.makeDirectory(databaseDir);
if (mockCorrupted) {
// Mock a corrupted db.
await IOUtils.write(
PathUtils.join(databaseDir, "data.safe.bin"),
new Uint8Array([0x00, 0x00, 0x00, 0x00])
);
}
return databaseDir;
}
// Some tests load non-moz-extension:-URLs in their extension document. When
// extensions run in-process (extensions.webextensions.remote set to false),
// that fails.
// To avoid skip-if on the whole file, use this:
//
// add_task(async function test_description_here() {
// // Comment explaining why.
// allow_unsafe_parent_loads_when_extensions_not_remote();
// ...
// revert_allow_unsafe_parent_loads_when_extensions_not_remote();
// });
var private_upl_cleanup_handlers = [];
function allow_unsafe_parent_loads_when_extensions_not_remote() {
if (WebExtensionPolicy.useRemoteWebExtensions) {
// We should only allow remote iframes in the main process.
return;
}
if (!Cu.isInAutomation) {
// isInAutomation is false by default in xpcshell (bug 1598804). Flip pref.
Services.prefs.setBoolPref(
"security.turn_off_all_security_so_that_viruses_can_take_over_this_computer",
true
);
private_upl_cleanup_handlers.push(() => {
Services.prefs.setBoolPref(
"security.turn_off_all_security_so_that_viruses_can_take_over_this_computer",
false
);
});
// Sanity check: Fail immediately if setting the above pref does somehow
// not flip the isInAutomation flag.
if (!Cu.isInAutomation) {
// This condition is unexpected, because it is enforced at:
throw new Error("Failed to set isInAutomation to true");
}
}
// Note: The following pref requires the isInAutomation flag to be set.
// When unset, the pref is ignored, and tests would encounter bug 1724099.
if (!Services.prefs.getBoolPref("security.allow_unsafe_parent_loads")) {
info("Setting pref security.allow_unsafe_parent_loads to true");
Services.prefs.setBoolPref("security.allow_unsafe_parent_loads", true);
private_upl_cleanup_handlers.push(() => {
info("Reverting pref security.allow_unsafe_parent_loads to false");
Services.prefs.setBoolPref("security.allow_unsafe_parent_loads", false);
});
}
registerCleanupFunction(
// eslint-disable-next-line no-use-before-define
revert_allow_unsafe_parent_loads_when_extensions_not_remote
);
}
function revert_allow_unsafe_parent_loads_when_extensions_not_remote() {
for (let revert of private_upl_cleanup_handlers.splice(0)) {
revert();
}
}
/**
* Clears the HTTP and content image caches.
*/
function clearCache() {
Services.cache2.clear();
let imageCache = Cc["@mozilla.org/image/tools;1"]
.getService(Ci.imgITools)
.getImgCacheForDocument(null);
imageCache.clearCache(false);
}
var promiseConsoleOutput = async function (task) {
const DONE = `=== console listener ${Math.random()} done ===`;
let listener;
let messages = [];
let awaitListener = new Promise(resolve => {
listener = msg => {
if (msg == DONE) {
resolve();
} else {
void (msg instanceof Ci.nsIConsoleMessage);
void (msg instanceof Ci.nsIScriptError);
messages.push(msg);
}
};
});
Services.console.registerListener(listener);
try {
let result = await task();
Services.console.logStringMessage(DONE);
await awaitListener;
return { messages, result };
} finally {
Services.console.unregisterListener(listener);
}
};
// Attempt to remove a directory. If the Windows OS is still using the
// file sometimes remove() will fail. So try repeatedly until we can
// remove it or we give up.
function cleanupDir(dir) {
let count = 0;
return new Promise((resolve, reject) => {
function tryToRemoveDir() {
count += 1;
try {
dir.remove(true);
} catch (e) {
// ignore
}
if (!dir.exists()) {
return resolve();
}
if (count >= 25) {
return reject(`Failed to cleanup directory: ${dir}`);
}
setTimeout(tryToRemoveDir, 100);
}
tryToRemoveDir();
});
}
// Run a test with the specified preferences and then restores their initial values
// right after the test function run (whether it passes or fails).
async function runWithPrefs(prefsToSet, testFn) {
const setPrefs = prefs => {
for (let [pref, value] of prefs) {
if (value === undefined) {
// Clear any pref that didn't have a user value.
info(`Clearing pref "${pref}"`);
Services.prefs.clearUserPref(pref);
continue;
}
info(`Setting pref "${pref}": ${value}`);
switch (typeof value) {
case "boolean":
Services.prefs.setBoolPref(pref, value);
break;
case "number":
Services.prefs.setIntPref(pref, value);
break;
case "string":
Services.prefs.setStringPref(pref, value);
break;
default:
throw new Error("runWithPrefs doesn't support this pref type yet");
}
}
};
const getPrefs = prefs => {
return prefs.map(([pref, value]) => {
info(`Getting initial pref value for "${pref}"`);
if (!Services.prefs.prefHasUserValue(pref)) {
// Check if the pref doesn't have a user value.
return [pref, undefined];
}
switch (typeof value) {
case "boolean":
return [pref, Services.prefs.getBoolPref(pref)];
case "number":
return [pref, Services.prefs.getIntPref(pref)];
case "string":
return [pref, Services.prefs.getStringPref(pref)];
default:
throw new Error("runWithPrefs doesn't support this pref type yet");
}
});
};
let initialPrefsValues = [];
try {
initialPrefsValues = getPrefs(prefsToSet);
setPrefs(prefsToSet);
await testFn();
} finally {
info("Restoring initial preferences values on exit");
setPrefs(initialPrefsValues);
}
}
// "Handling User Input" test helpers.
let extensionHandlers = new WeakSet();
function handlingUserInputFrameScript() {
/* globals content */
// eslint-disable-next-line no-shadow
const { MessageChannel } = ChromeUtils.importESModule(
);
let handle;
MessageChannel.addListener(this, "ExtensionTest:HandleUserInput", {
receiveMessage({ data }) {
if (data) {
handle = content.windowUtils.setHandlingUserInput(true);
} else if (handle) {
handle.destruct();
handle = null;
}
},
});
}
// If you use withHandlingUserInput then restart the addon manager,
// you need to reset this before using withHandlingUserInput again.
function resetHandlingUserInput() {
extensionHandlers = new WeakSet();
}
async function withHandlingUserInput(extension, fn) {
let { messageManager } = extension.extension.groupFrameLoader;
if (!extensionHandlers.has(extension)) {
messageManager.loadFrameScript(
`data:,(${encodeURI(handlingUserInputFrameScript)}).call(this)`,
false,
true
);
extensionHandlers.add(extension);
}
await MessageChannel.sendMessage(
messageManager,
"ExtensionTest:HandleUserInput",
true
);
await fn();
await MessageChannel.sendMessage(
messageManager,
"ExtensionTest:HandleUserInput",
false
);
}
// QuotaManagerService test helpers.
function promiseQuotaManagerServiceReset() {
info("Calling QuotaManagerService.reset to enforce new test storage limits");
return new Promise(resolve => {
Services.qms.reset().callback = resolve;
});
}
function promiseQuotaManagerServiceClear() {
info(
"Calling QuotaManagerService.clear to empty the test data and refresh test storage limits"
);
return new Promise(resolve => {
Services.qms.clear().callback = resolve;
});
}
// Optional Permission prompt handling
const optionalPermissionsPromptHandler = {
sawPrompt: false,
acceptPrompt: false,
init() {
Services.prefs.setBoolPref(
"extensions.webextOptionalPermissionPrompts",
true
);
Services.obs.addObserver(this, "webextension-optional-permission-prompt");
registerCleanupFunction(() => {
Services.obs.removeObserver(
this,
"webextension-optional-permission-prompt"
);
Services.prefs.clearUserPref(
"extensions.webextOptionalPermissionPrompts"
);
});
},
observe(subject, topic) {
if (topic == "webextension-optional-permission-prompt") {
this.sawPrompt = true;
let { resolve } = subject.wrappedJSObject;
resolve(this.acceptPrompt);
}
},
};
function promiseExtensionEvent(wrapper, event) {
return new Promise(resolve => {
wrapper.extension.once(event, (...args) => resolve(args));
});
}
async function assertHasPersistedScriptsCachedFlag(ext) {
const { StartupCache } = ExtensionParent;
const allCachedGeneral = StartupCache._data.get("general");
equal(
allCachedGeneral
.get(ext.id)
?.get(ext.version)
?.get("scripting")
?.has("hasPersistedScripts"),
true,
"Expect the StartupCache to include hasPersistedScripts flag"
);
}
async function assertIsPersistentScriptsCachedFlag(ext, expectedValue) {
const { StartupCache } = ExtensionParent;
const allCachedGeneral = StartupCache._data.get("general");
equal(
allCachedGeneral
.get(ext.id)
?.get(ext.version)
?.get("scripting")
?.get("hasPersistedScripts"),
expectedValue,
"Expected cached value set on hasPersistedScripts flag"
);
}
function setup_crash_reporter_override_and_cleaner() {
const crashIds = [];
// Override CrashService.sys.mjs to intercept crash dumps, for two reasons:
//
// - The standard CrashService.sys.mjs implementation uses nsICrashReporter
// through Services.appinfo. Because appinfo has been overridden with an
// incomplete implementation, a promise rejection is triggered when a
//
// - We want to intercept the generated crash dumps for expected crashes and
// remove them, to prevent the xpcshell test runner from misinterpreting
// them as "CRASH" failures.
let mockClassId = MockRegistrar.register("@mozilla.org/crashservice;1", {
addCrash(processType, crashType, id) {
// The files are ready to be removed now. We however postpone cleanup
// until the end of the test, to minimize noise during the test, and to
// ensure that the cleanup completes fully.
crashIds.push(id);
},
QueryInterface: ChromeUtils.generateQI(["nsICrashService"]),
});
registerCleanupFunction(async () => {
MockRegistrar.unregister(mockClassId);
// Cannot use Services.appinfo because createAppInfo overrides it.
// eslint-disable-next-line mozilla/use-services
const appinfo = Cc["@mozilla.org/toolkit/crash-reporter;1"].getService(
Ci.nsICrashReporter
);
info(`Observed ${crashIds.length} crash dump(s).`);
let deletedCount = 0;
for (let id of crashIds) {
info(`Checking whether dumpID ${id} should be removed`);
let minidumpFile = appinfo.getMinidumpForID(id);
let extraFile = appinfo.getExtraFileForID(id);
let extra;
try {
extra = await IOUtils.readJSON(extraFile.path);
} catch (e) {
info(`Cannot parse crash metadata from ${extraFile.path} :: ${e}\n`);
continue;
}
// The "BrowserTestUtils:CrashFrame" handler annotates the crash
// report before triggering a crash.
if (extra.TestKey !== "CrashFrame") {
info(`Keeping ${minidumpFile.path}; we did not trigger the crash`);
continue;
}
info(`Deleting minidump ${minidumpFile.path} and ${extraFile.path}`);
minidumpFile.remove(false);
extraFile.remove(false);
++deletedCount;
}
info(`Removed ${deletedCount} crash dumps out of ${crashIds.length}`);
});
}
// Crashes a <browser>'s remote process.
// Based on BrowserTestUtils.crashFrame.
function crashFrame(browser) {
if (!browser.isRemoteBrowser) {
// The browser should be remote, or the test runner would be killed.
throw new Error("<browser> must be remote");
}
const { BrowserTestUtils } = ChromeUtils.importESModule(
);
// Trigger crash by sending a message to BrowserTestUtils actor.
BrowserTestUtils.sendAsyncMessage(
browser.browsingContext,
"BrowserTestUtils:CrashFrame",
{}
);
}
/**
* Crash background page of browser and wait for the crash to have been
* detected and processed by ext-backgroundPage.js.
*
* @param {ExtensionWrapper} extension
* @param {XULElement} [bgBrowser] - The background browser. Optional, but must
* be set if the background's ProxyContextParent has not been initialized yet.
*/
async function crashExtensionBackground(extension, bgBrowser) {
bgBrowser ??= extension.extension.backgroundContext.xulBrowser;
let byeProm = promiseExtensionEvent(extension, "shutdown-background-script");
if (WebExtensionPolicy.useRemoteWebExtensions) {
info("Killing background page through process crash.");
crashFrame(bgBrowser);
} else {
// If extensions are not running in out-of-process mode, then the
// non-remote process should not be killed (or the test runner dies).
// Remove <browser> instead, to simulate the immediate disconnection
// of the message manager (that would happen if the process crashed).
info("Closing background page by destroying <browser>.");
if (extension.extension.backgroundState === "running") {
// TODO bug 1844217: remove this whole if-block When close() is hooked up
// to setBgStateStopped. It currently is not, and browser destruction is
// currently not detected by the implementation.
let messageManager = bgBrowser.messageManager;
TestUtils.topicObserved(
"message-manager-close",
subject => subject === messageManager
).then(() => {
Management.emit("extension-process-crash", { childID: 1337 });
});
}
bgBrowser.remove();
}
info("Waiting for crash to be detected by the internals");
await byeProm;
}