commit 6888db40e3c0ef46b26f7b90e4813f2b9c6143ff
parent 9620bda9723daf144bdcbff6c2973f99886b96a0
Author: Jared Wein <jwein@mozilla.com>
Date: Wed, 7 Jan 2026 22:29:39 +0000
Bug 2007365 - Allow ipp-vpn permissions to cross between private and non-private windows r=ckerschb,fchasen,permissions-reviewers,timhuang
Differential Revision: https://phabricator.services.mozilla.com/D278041
Diffstat:
2 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/extensions/permissions/PermissionManager.cpp b/extensions/permissions/PermissionManager.cpp
@@ -158,8 +158,8 @@ bool IsPreloadPermission(const nsACString& aType) {
// This is because perms are sent to the content process in bulk by perm key.
// Non-preloaded, but OA stripped permissions would not be accessible by sites
// in private browsing / non-default user context.
-static constexpr std::array<nsLiteralCString, 2> kStripOAPermissions = {
- {"cookie"_ns, "https-only-load-insecure"_ns}};
+static constexpr std::array<nsLiteralCString, 3> kStripOAPermissions = {
+ {"cookie"_ns, "https-only-load-insecure"_ns, "ipp-vpn"_ns}};
bool IsOAForceStripPermission(const nsACString& aType) {
if (aType.IsEmpty()) {
diff --git a/extensions/permissions/test/unit/test_permmanager_oa_strip.js b/extensions/permissions/test/unit/test_permmanager_oa_strip.js
@@ -8,7 +8,7 @@ const TEST_PERMISSION3 = "test/oastrip3";
// List of permissions which are not isolated by private browsing or user context
// as per array kStripOAPermissions in PermissionManager.cpp
-const STRIPPED_PERMS = ["cookie", "https-only-load-insecure"];
+const STRIPPED_PERMS = ["cookie", "https-only-load-insecure", "ipp-vpn"];
let principal = Services.scriptSecurityManager.createContentPrincipal(
TEST_URI,