blob: dc2e0db29a91d036cc24d1e6851bf66a0f4a283d (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
|
const Cu = Components.utils;
function run_test() {
// Make a content sandbox with an Xrayable object.
// NB: We use an nsEP here so that we can have access to Components, but still
// have Xray behavior from this scope.
var contentSB = new Cu.Sandbox(['http://www.google.com'],
{ wantGlobalProperties: ["XMLHttpRequest"], wantComponents: true });
// Make an XHR in the content sandbox.
Cu.evalInSandbox('xhr = new XMLHttpRequest();', contentSB);
// Make sure that waivers can be set as Xray expandos.
var xhr = contentSB.xhr;
do_check_true(Cu.isXrayWrapper(xhr));
xhr.unwaivedExpando = xhr;
do_check_true(Cu.isXrayWrapper(xhr.unwaivedExpando));
var waived = xhr.wrappedJSObject;
do_check_true(!Cu.isXrayWrapper(waived));
xhr.waivedExpando = waived;
do_check_true(!Cu.isXrayWrapper(xhr.waivedExpando));
// Try the same thing for getters/setters, even though that's kind of
// contrived.
Cu.evalInSandbox('function f() {}', contentSB);
var f = contentSB.f;
var fWaiver = Cu.waiveXrays(f);
do_check_true(f != fWaiver);
do_check_true(Cu.unwaiveXrays(fWaiver) === f);
Object.defineProperty(xhr, 'waivedAccessors', {get: fWaiver, set: fWaiver});
var desc = Object.getOwnPropertyDescriptor(xhr, 'waivedAccessors');
do_check_true(desc.get === fWaiver);
do_check_true(desc.set === fWaiver);
// Make sure we correctly handle same-compartment security wrappers.
var unwaivedC = contentSB.Components;
do_check_true(Cu.isXrayWrapper(unwaivedC));
var waivedC = unwaivedC.wrappedJSObject;
do_check_true(waivedC && unwaivedC && (waivedC != unwaivedC));
xhr.waivedC = waivedC;
do_check_true(xhr.waivedC === waivedC);
do_check_true(Cu.unwaiveXrays(xhr.waivedC) === unwaivedC);
}
|