tor-browser

The Tor Browser
git clone https://git.dasho.dev/tor-browser.git
Log | Files | Refs | README | LICENSE

commit 6888db40e3c0ef46b26f7b90e4813f2b9c6143ff
parent 9620bda9723daf144bdcbff6c2973f99886b96a0
Author: Jared Wein <jwein@mozilla.com>
Date:   Wed,  7 Jan 2026 22:29:39 +0000

Bug 2007365 - Allow ipp-vpn permissions to cross between private and non-private windows r=ckerschb,fchasen,permissions-reviewers,timhuang

Differential Revision: https://phabricator.services.mozilla.com/D278041

Diffstat:
Mextensions/permissions/PermissionManager.cpp | 4++--
Mextensions/permissions/test/unit/test_permmanager_oa_strip.js | 2+-
2 files changed, 3 insertions(+), 3 deletions(-)

diff --git a/extensions/permissions/PermissionManager.cpp b/extensions/permissions/PermissionManager.cpp @@ -158,8 +158,8 @@ bool IsPreloadPermission(const nsACString& aType) { // This is because perms are sent to the content process in bulk by perm key. // Non-preloaded, but OA stripped permissions would not be accessible by sites // in private browsing / non-default user context. -static constexpr std::array<nsLiteralCString, 2> kStripOAPermissions = { - {"cookie"_ns, "https-only-load-insecure"_ns}}; +static constexpr std::array<nsLiteralCString, 3> kStripOAPermissions = { + {"cookie"_ns, "https-only-load-insecure"_ns, "ipp-vpn"_ns}}; bool IsOAForceStripPermission(const nsACString& aType) { if (aType.IsEmpty()) { diff --git a/extensions/permissions/test/unit/test_permmanager_oa_strip.js b/extensions/permissions/test/unit/test_permmanager_oa_strip.js @@ -8,7 +8,7 @@ const TEST_PERMISSION3 = "test/oastrip3"; // List of permissions which are not isolated by private browsing or user context // as per array kStripOAPermissions in PermissionManager.cpp -const STRIPPED_PERMS = ["cookie", "https-only-load-insecure"]; +const STRIPPED_PERMS = ["cookie", "https-only-load-insecure", "ipp-vpn"]; let principal = Services.scriptSecurityManager.createContentPrincipal( TEST_URI,