summaryrefslogtreecommitdiffstats
path: root/browser/base/content/sanitize.js
diff options
context:
space:
mode:
authorwolfbeast <mcwerewolf@gmail.com>2018-06-04 13:17:38 +0200
committerwolfbeast <mcwerewolf@gmail.com>2018-06-04 13:17:38 +0200
commita1be17c1cea81ebb1e8b131a662c698d78f3f7f2 (patch)
treea92f7de513be600cc07bac458183e9af40e00c06 /browser/base/content/sanitize.js
parentbf11fdd304898ac675e39b01b280d39550e419d0 (diff)
downloadUXP-a1be17c1cea81ebb1e8b131a662c698d78f3f7f2.tar
UXP-a1be17c1cea81ebb1e8b131a662c698d78f3f7f2.tar.gz
UXP-a1be17c1cea81ebb1e8b131a662c698d78f3f7f2.tar.lz
UXP-a1be17c1cea81ebb1e8b131a662c698d78f3f7f2.tar.xz
UXP-a1be17c1cea81ebb1e8b131a662c698d78f3f7f2.zip
Issue #303 Part 1: Move basilisk files from /browser to /application/basilisk
Diffstat (limited to 'browser/base/content/sanitize.js')
-rw-r--r--browser/base/content/sanitize.js910
1 files changed, 0 insertions, 910 deletions
diff --git a/browser/base/content/sanitize.js b/browser/base/content/sanitize.js
deleted file mode 100644
index 841376580..000000000
--- a/browser/base/content/sanitize.js
+++ /dev/null
@@ -1,910 +0,0 @@
-// -*- indent-tabs-mode: nil; js-indent-level: 2 -*-
-/* This Source Code Form is subject to the terms of the Mozilla Public
- * License, v. 2.0. If a copy of the MPL was not distributed with this
- * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
-
-Components.utils.import("resource://gre/modules/XPCOMUtils.jsm");
-Components.utils.import("resource://gre/modules/Services.jsm");
-XPCOMUtils.defineLazyModuleGetter(this, "AppConstants",
- "resource://gre/modules/AppConstants.jsm");
-XPCOMUtils.defineLazyModuleGetter(this, "PlacesUtils",
- "resource://gre/modules/PlacesUtils.jsm");
-XPCOMUtils.defineLazyModuleGetter(this, "FormHistory",
- "resource://gre/modules/FormHistory.jsm");
-XPCOMUtils.defineLazyModuleGetter(this, "Downloads",
- "resource://gre/modules/Downloads.jsm");
-XPCOMUtils.defineLazyModuleGetter(this, "Promise",
- "resource://gre/modules/Promise.jsm");
-XPCOMUtils.defineLazyModuleGetter(this, "Task",
- "resource://gre/modules/Task.jsm");
-XPCOMUtils.defineLazyModuleGetter(this, "DownloadsCommon",
- "resource:///modules/DownloadsCommon.jsm");
-XPCOMUtils.defineLazyModuleGetter(this, "TelemetryStopwatch",
- "resource://gre/modules/TelemetryStopwatch.jsm");
-XPCOMUtils.defineLazyModuleGetter(this, "console",
- "resource://gre/modules/Console.jsm");
-XPCOMUtils.defineLazyModuleGetter(this, "Preferences",
- "resource://gre/modules/Preferences.jsm");
-XPCOMUtils.defineLazyModuleGetter(this, "setTimeout",
- "resource://gre/modules/Timer.jsm");
-
-
-XPCOMUtils.defineLazyServiceGetter(this, "serviceWorkerManager",
- "@mozilla.org/serviceworkers/manager;1",
- "nsIServiceWorkerManager");
-XPCOMUtils.defineLazyServiceGetter(this, "quotaManagerService",
- "@mozilla.org/dom/quota-manager-service;1",
- "nsIQuotaManagerService");
-
-var {classes: Cc, interfaces: Ci, results: Cr} = Components;
-
-/**
- * A number of iterations after which to yield time back
- * to the system.
- */
-const YIELD_PERIOD = 10;
-
-function Sanitizer() {
-}
-Sanitizer.prototype = {
- // warning to the caller: this one may raise an exception (e.g. bug #265028)
- clearItem: function (aItemName)
- {
- this.items[aItemName].clear();
- },
-
- prefDomain: "",
-
- getNameFromPreference: function (aPreferenceName)
- {
- return aPreferenceName.substr(this.prefDomain.length);
- },
-
- /**
- * Deletes privacy sensitive data in a batch, according to user preferences.
- * Returns a promise which is resolved if no errors occurred. If an error
- * occurs, a message is reported to the console and all other items are still
- * cleared before the promise is finally rejected.
- *
- * @param [optional] itemsToClear
- * Array of items to be cleared. if specified only those
- * items get cleared, irrespectively of the preference settings.
- * @param [optional] options
- * Object whose properties are options for this sanitization.
- * TODO (bug 1167238) document options here.
- */
- sanitize: Task.async(function*(itemsToClear = null, options = {}) {
- let progress = options.progress || {};
- let promise = this._sanitize(itemsToClear, progress);
-
- // Depending on preferences, the sanitizer may perform asynchronous
- // work before it starts cleaning up the Places database (e.g. closing
- // windows). We need to make sure that the connection to that database
- // hasn't been closed by the time we use it.
- // Though, if this is a sanitize on shutdown, we already have a blocker.
- if (!progress.isShutdown) {
- let shutdownClient = Cc["@mozilla.org/browser/nav-history-service;1"]
- .getService(Ci.nsPIPlacesDatabase)
- .shutdownClient
- .jsclient;
- shutdownClient.addBlocker("sanitize.js: Sanitize",
- promise,
- {
- fetchState: () => ({ progress })
- }
- );
- }
-
- try {
- yield promise;
- } finally {
- Services.obs.notifyObservers(null, "sanitizer-sanitization-complete", "");
- }
- }),
-
- _sanitize: Task.async(function*(aItemsToClear, progress = {}) {
- let seenError = false;
- let itemsToClear;
- if (Array.isArray(aItemsToClear)) {
- // Shallow copy the array, as we are going to modify
- // it in place later.
- itemsToClear = [...aItemsToClear];
- } else {
- let branch = Services.prefs.getBranch(this.prefDomain);
- itemsToClear = Object.keys(this.items).filter(itemName => {
- try {
- return branch.getBoolPref(itemName);
- } catch (ex) {
- return false;
- }
- });
- }
-
- // Store the list of items to clear, in case we are killed before we
- // get a chance to complete.
- Preferences.set(Sanitizer.PREF_SANITIZE_IN_PROGRESS,
- JSON.stringify(itemsToClear));
-
- // Store the list of items to clear, for debugging/forensics purposes
- for (let k of itemsToClear) {
- progress[k] = "ready";
- }
-
- // Ensure open windows get cleared first, if they're in our list, so that they don't stick
- // around in the recently closed windows list, and so we can cancel the whole thing
- // if the user selects to keep a window open from a beforeunload prompt.
- let openWindowsIndex = itemsToClear.indexOf("openWindows");
- if (openWindowsIndex != -1) {
- itemsToClear.splice(openWindowsIndex, 1);
- yield this.items.openWindows.clear();
- progress.openWindows = "cleared";
- }
-
- // Cache the range of times to clear
- let range = null;
- // If we ignore timespan, clear everything,
- // otherwise, pick a range.
- if (!this.ignoreTimespan) {
- range = this.range || Sanitizer.getClearRange();
- }
-
- // For performance reasons we start all the clear tasks at once, then wait
- // for their promises later.
- // Some of the clear() calls may raise exceptions (for example bug 265028),
- // we catch and store them, but continue to sanitize as much as possible.
- // Callers should check returned errors and give user feedback
- // about items that could not be sanitized
- let refObj = {};
- TelemetryStopwatch.start("FX_SANITIZE_TOTAL", refObj);
-
- let annotateError = (name, ex) => {
- progress[name] = "failed";
- seenError = true;
- console.error("Error sanitizing " + name, ex);
- };
-
- // Array of objects in form { name, promise }.
- // `name` is the item's name and `promise` may be a promise, if the
- // sanitization is asynchronous, or the function return value, otherwise.
- let handles = [];
- for (let itemName of itemsToClear) {
- // Workaround for bug 449811.
- let name = itemName;
- let item = this.items[name];
- try {
- // Catch errors here, so later we can just loop through these.
- handles.push({ name,
- promise: item.clear(range)
- .then(() => progress[name] = "cleared",
- ex => annotateError(name, ex))
- });
- } catch (ex) {
- annotateError(name, ex);
- }
- }
- for (let handle of handles) {
- progress[handle.name] = "blocking";
- yield handle.promise;
- }
-
- // Sanitization is complete.
- TelemetryStopwatch.finish("FX_SANITIZE_TOTAL", refObj);
- // Reset the inProgress preference since we were not killed during
- // sanitization.
- Preferences.reset(Sanitizer.PREF_SANITIZE_IN_PROGRESS);
- progress = {};
- if (seenError) {
- throw new Error("Error sanitizing");
- }
- }),
-
- // Time span only makes sense in certain cases. Consumers who want
- // to only clear some private data can opt in by setting this to false,
- // and can optionally specify a specific range. If timespan is not ignored,
- // and range is not set, sanitize() will use the value of the timespan
- // pref to determine a range
- ignoreTimespan : true,
- range : null,
-
- items: {
- cache: {
- clear: Task.async(function* (range) {
- let seenException;
- let refObj = {};
- TelemetryStopwatch.start("FX_SANITIZE_CACHE", refObj);
-
- try {
- // Cache doesn't consult timespan, nor does it have the
- // facility for timespan-based eviction. Wipe it.
- let cache = Cc["@mozilla.org/netwerk/cache-storage-service;1"]
- .getService(Ci.nsICacheStorageService);
- cache.clear();
- } catch (ex) {
- seenException = ex;
- }
-
- try {
- let imageCache = Cc["@mozilla.org/image/tools;1"]
- .getService(Ci.imgITools)
- .getImgCacheForDocument(null);
- imageCache.clearCache(false); // true=chrome, false=content
- } catch (ex) {
- seenException = ex;
- }
-
- TelemetryStopwatch.finish("FX_SANITIZE_CACHE", refObj);
- if (seenException) {
- throw seenException;
- }
- })
- },
-
- cookies: {
- clear: Task.async(function* (range) {
- let seenException;
- let yieldCounter = 0;
- let refObj = {};
-
- // Clear cookies.
- TelemetryStopwatch.start("FX_SANITIZE_COOKIES_2", refObj);
- try {
- let cookieMgr = Components.classes["@mozilla.org/cookiemanager;1"]
- .getService(Ci.nsICookieManager);
- if (range) {
- // Iterate through the cookies and delete any created after our cutoff.
- let cookiesEnum = cookieMgr.enumerator;
- while (cookiesEnum.hasMoreElements()) {
- let cookie = cookiesEnum.getNext().QueryInterface(Ci.nsICookie2);
-
- if (cookie.creationTime > range[0]) {
- // This cookie was created after our cutoff, clear it
- cookieMgr.remove(cookie.host, cookie.name, cookie.path,
- false, cookie.originAttributes);
-
- if (++yieldCounter % YIELD_PERIOD == 0) {
- yield new Promise(resolve => setTimeout(resolve, 0)); // Don't block the main thread too long
- }
- }
- }
- }
- else {
- // Remove everything
- cookieMgr.removeAll();
- yield new Promise(resolve => setTimeout(resolve, 0)); // Don't block the main thread too long
- }
- } catch (ex) {
- seenException = ex;
- } finally {
- TelemetryStopwatch.finish("FX_SANITIZE_COOKIES_2", refObj);
- }
-
- // Clear deviceIds. Done asynchronously (returns before complete).
- try {
- let mediaMgr = Components.classes["@mozilla.org/mediaManagerService;1"]
- .getService(Ci.nsIMediaManagerService);
- mediaMgr.sanitizeDeviceIds(range && range[0]);
- } catch (ex) {
- seenException = ex;
- }
-
- // Clear plugin data.
- // As evidenced in bug 1253204, clearing plugin data can sometimes be
- // very, very long, for mysterious reasons. Unfortunately, this is not
- // something actionable by Mozilla, so crashing here serves no purpose.
- //
- // For this reason, instead of waiting for sanitization to always
- // complete, we introduce a soft timeout. Once this timeout has
- // elapsed, we proceed with the shutdown of Firefox.
- let promiseClearPluginCookies;
- try {
- // We don't want to wait for this operation to complete...
- promiseClearPluginCookies = this.promiseClearPluginCookies(range);
-
- // ... at least, not for more than 10 seconds.
- yield Promise.race([
- promiseClearPluginCookies,
- new Promise(resolve => setTimeout(resolve, 10000 /* 10 seconds */))
- ]);
- } catch (ex) {
- seenException = ex;
- }
-
- // Detach waiting for plugin cookies to be cleared.
- promiseClearPluginCookies.catch(() => {
- // If this exception is raised before the soft timeout, it
- // will appear in `seenException`. Otherwise, it's too late
- // to do anything about it.
- });
-
- if (seenException) {
- throw seenException;
- }
- }),
-
- promiseClearPluginCookies: Task.async(function* (range) {
- const FLAG_CLEAR_ALL = Ci.nsIPluginHost.FLAG_CLEAR_ALL;
- let ph = Cc["@mozilla.org/plugin/host;1"].getService(Ci.nsIPluginHost);
-
- // Determine age range in seconds. (-1 means clear all.) We don't know
- // that range[1] is actually now, so we compute age range based
- // on the lower bound. If range results in a negative age, do nothing.
- let age = range ? (Date.now() / 1000 - range[0] / 1000000) : -1;
- if (!range || age >= 0) {
- let tags = ph.getPluginTags();
- for (let tag of tags) {
- let refObj = {};
- let probe = "";
- if (/\bFlash\b/.test(tag.name)) {
- probe = tag.loaded ? "FX_SANITIZE_LOADED_FLASH"
- : "FX_SANITIZE_UNLOADED_FLASH";
- TelemetryStopwatch.start(probe, refObj);
- }
- try {
- let rv = yield new Promise(resolve =>
- ph.clearSiteData(tag, null, FLAG_CLEAR_ALL, age, resolve)
- );
- // If the plugin doesn't support clearing by age, clear everything.
- if (rv == Components.results.NS_ERROR_PLUGIN_TIME_RANGE_NOT_SUPPORTED) {
- yield new Promise(resolve =>
- ph.clearSiteData(tag, null, FLAG_CLEAR_ALL, -1, resolve)
- );
- }
- if (probe) {
- TelemetryStopwatch.finish(probe, refObj);
- }
- } catch (ex) {
- // Ignore errors from plug-ins
- if (probe) {
- TelemetryStopwatch.cancel(probe, refObj);
- }
- }
- }
- }
- })
- },
-
- offlineApps: {
- clear: Task.async(function* (range) {
- // AppCache
- Components.utils.import("resource:///modules/offlineAppCache.jsm");
- // This doesn't wait for the cleanup to be complete.
- OfflineAppCacheHelper.clear();
-
- // LocalStorage
- Services.obs.notifyObservers(null, "extension:purge-localStorage", null);
-
- // ServiceWorkers
- let serviceWorkers = serviceWorkerManager.getAllRegistrations();
- for (let i = 0; i < serviceWorkers.length; i++) {
- let sw = serviceWorkers.queryElementAt(i, Ci.nsIServiceWorkerRegistrationInfo);
- let host = sw.principal.URI.host;
- serviceWorkerManager.removeAndPropagate(host);
- }
-
- // QuotaManager
- let promises = [];
- yield new Promise(resolve => {
- quotaManagerService.getUsage(request => {
- if (request.resultCode != Cr.NS_OK) {
- // We are probably shutting down. We don't want to propagate the
- // error, rejecting the promise.
- resolve();
- return;
- }
-
- for (let item of request.result) {
- let principal = Services.scriptSecurityManager.createCodebasePrincipalFromOrigin(item.origin);
- let uri = principal.URI;
- if (uri.scheme == "http" || uri.scheme == "https" || uri.scheme == "file") {
- promises.push(new Promise(r => {
- let req = quotaManagerService.clearStoragesForPrincipal(principal, null, true);
- req.callback = () => { r(); };
- }));
- }
- }
- resolve();
- });
- });
-
- yield Promise.all(promises);
- })
- },
-
- history: {
- clear: Task.async(function* (range) {
- let seenException;
- let refObj = {};
- TelemetryStopwatch.start("FX_SANITIZE_HISTORY", refObj);
- try {
- if (range) {
- yield PlacesUtils.history.removeVisitsByFilter({
- beginDate: new Date(range[0] / 1000),
- endDate: new Date(range[1] / 1000)
- });
- } else {
- // Remove everything.
- yield PlacesUtils.history.clear();
- }
- } catch (ex) {
- seenException = ex;
- } finally {
- TelemetryStopwatch.finish("FX_SANITIZE_HISTORY", refObj);
- }
-
- try {
- let clearStartingTime = range ? String(range[0]) : "";
- Services.obs.notifyObservers(null, "browser:purge-session-history", clearStartingTime);
- } catch (ex) {
- seenException = ex;
- }
-
- try {
- let predictor = Components.classes["@mozilla.org/network/predictor;1"]
- .getService(Components.interfaces.nsINetworkPredictor);
- predictor.reset();
- } catch (ex) {
- seenException = ex;
- }
-
- if (seenException) {
- throw seenException;
- }
- })
- },
-
- formdata: {
- clear: Task.async(function* (range) {
- let seenException;
- let refObj = {};
- TelemetryStopwatch.start("FX_SANITIZE_FORMDATA", refObj);
- try {
- // Clear undo history of all searchBars
- let windows = Services.wm.getEnumerator("navigator:browser");
- while (windows.hasMoreElements()) {
- let currentWindow = windows.getNext();
- let currentDocument = currentWindow.document;
- let searchBar = currentDocument.getElementById("searchbar");
- if (searchBar)
- searchBar.textbox.reset();
- let tabBrowser = currentWindow.gBrowser;
- if (!tabBrowser) {
- // No tab browser? This means that it's too early during startup (typically,
- // Session Restore hasn't completed yet). Since we don't have find
- // bars at that stage and since Session Restore will not restore
- // find bars further down during startup, we have nothing to clear.
- continue;
- }
- for (let tab of tabBrowser.tabs) {
- if (tabBrowser.isFindBarInitialized(tab))
- tabBrowser.getFindBar(tab).clear();
- }
- // Clear any saved find value
- tabBrowser._lastFindValue = "";
- }
- } catch (ex) {
- seenException = ex;
- }
-
- try {
- let change = { op: "remove" };
- if (range) {
- [ change.firstUsedStart, change.firstUsedEnd ] = range;
- }
- yield new Promise(resolve => {
- FormHistory.update(change, {
- handleError(e) {
- seenException = new Error("Error " + e.result + ": " + e.message);
- },
- handleCompletion() {
- resolve();
- }
- });
- });
- } catch (ex) {
- seenException = ex;
- }
-
- TelemetryStopwatch.finish("FX_SANITIZE_FORMDATA", refObj);
- if (seenException) {
- throw seenException;
- }
- })
- },
-
- downloads: {
- clear: Task.async(function* (range) {
- let refObj = {};
- TelemetryStopwatch.start("FX_SANITIZE_DOWNLOADS", refObj);
- try {
- let filterByTime = null;
- if (range) {
- // Convert microseconds back to milliseconds for date comparisons.
- let rangeBeginMs = range[0] / 1000;
- let rangeEndMs = range[1] / 1000;
- filterByTime = download => download.startTime >= rangeBeginMs &&
- download.startTime <= rangeEndMs;
- }
-
- // Clear all completed/cancelled downloads
- let list = yield Downloads.getList(Downloads.ALL);
- list.removeFinished(filterByTime);
- } finally {
- TelemetryStopwatch.finish("FX_SANITIZE_DOWNLOADS", refObj);
- }
- })
- },
-
- sessions: {
- clear: Task.async(function* (range) {
- let refObj = {};
- TelemetryStopwatch.start("FX_SANITIZE_SESSIONS", refObj);
-
- try {
- // clear all auth tokens
- let sdr = Components.classes["@mozilla.org/security/sdr;1"]
- .getService(Components.interfaces.nsISecretDecoderRing);
- sdr.logoutAndTeardown();
-
- // clear FTP and plain HTTP auth sessions
- Services.obs.notifyObservers(null, "net:clear-active-logins", null);
- } finally {
- TelemetryStopwatch.finish("FX_SANITIZE_SESSIONS", refObj);
- }
- })
- },
-
- siteSettings: {
- clear: Task.async(function* (range) {
- let seenException;
- let refObj = {};
- TelemetryStopwatch.start("FX_SANITIZE_SITESETTINGS", refObj);
-
- let startDateMS = range ? range[0] / 1000 : null;
-
- try {
- // Clear site-specific permissions like "Allow this site to open popups"
- // we ignore the "end" range and hope it is now() - none of the
- // interfaces used here support a true range anyway.
- if (startDateMS == null) {
- Services.perms.removeAll();
- } else {
- Services.perms.removeAllSince(startDateMS);
- }
- } catch (ex) {
- seenException = ex;
- }
-
- try {
- // Clear site-specific settings like page-zoom level
- let cps = Components.classes["@mozilla.org/content-pref/service;1"]
- .getService(Components.interfaces.nsIContentPrefService2);
- if (startDateMS == null) {
- cps.removeAllDomains(null);
- } else {
- cps.removeAllDomainsSince(startDateMS, null);
- }
- } catch (ex) {
- seenException = ex;
- }
-
- try {
- // Clear site security settings - no support for ranges in this
- // interface either, so we clearAll().
- let sss = Cc["@mozilla.org/ssservice;1"]
- .getService(Ci.nsISiteSecurityService);
- sss.clearAll();
- } catch (ex) {
- seenException = ex;
- }
-
- // Clear all push notification subscriptions
- try {
- yield new Promise((resolve, reject) => {
- let push = Cc["@mozilla.org/push/Service;1"]
- .getService(Ci.nsIPushService);
- push.clearForDomain("*", status => {
- if (Components.isSuccessCode(status)) {
- resolve();
- } else {
- reject(new Error("Error clearing push subscriptions: " +
- status));
- }
- });
- });
- } catch (ex) {
- seenException = ex;
- }
-
- TelemetryStopwatch.finish("FX_SANITIZE_SITESETTINGS", refObj);
- if (seenException) {
- throw seenException;
- }
- })
- },
-
- openWindows: {
- privateStateForNewWindow: "non-private",
- _canCloseWindow: function(aWindow) {
- if (aWindow.CanCloseWindow()) {
- // We already showed PermitUnload for the window, so let's
- // make sure we don't do it again when we actually close the
- // window.
- aWindow.skipNextCanClose = true;
- return true;
- }
- return false;
- },
- _resetAllWindowClosures: function(aWindowList) {
- for (let win of aWindowList) {
- win.skipNextCanClose = false;
- }
- },
- clear: Task.async(function* () {
- // NB: this closes all *browser* windows, not other windows like the library, about window,
- // browser console, etc.
-
- // Keep track of the time in case we get stuck in la-la-land because of onbeforeunload
- // dialogs
- let existingWindow = Services.appShell.hiddenDOMWindow;
- let startDate = existingWindow.performance.now();
-
- // First check if all these windows are OK with being closed:
- let windowEnumerator = Services.wm.getEnumerator("navigator:browser");
- let windowList = [];
- while (windowEnumerator.hasMoreElements()) {
- let someWin = windowEnumerator.getNext();
- windowList.push(someWin);
- // If someone says "no" to a beforeunload prompt, we abort here:
- if (!this._canCloseWindow(someWin)) {
- this._resetAllWindowClosures(windowList);
- throw new Error("Sanitize could not close windows: cancelled by user");
- }
-
- // ...however, beforeunload prompts spin the event loop, and so the code here won't get
- // hit until the prompt has been dismissed. If more than 1 minute has elapsed since we
- // started prompting, stop, because the user might not even remember initiating the
- // 'forget', and the timespans will be all wrong by now anyway:
- if (existingWindow.performance.now() > (startDate + 60 * 1000)) {
- this._resetAllWindowClosures(windowList);
- throw new Error("Sanitize could not close windows: timeout");
- }
- }
-
- // If/once we get here, we should actually be able to close all windows.
-
- let refObj = {};
- TelemetryStopwatch.start("FX_SANITIZE_OPENWINDOWS", refObj);
-
- // First create a new window. We do this first so that on non-mac, we don't
- // accidentally close the app by closing all the windows.
- let handler = Cc["@mozilla.org/browser/clh;1"].getService(Ci.nsIBrowserHandler);
- let defaultArgs = handler.defaultArgs;
- let features = "chrome,all,dialog=no," + this.privateStateForNewWindow;
- let newWindow = existingWindow.openDialog("chrome://browser/content/", "_blank",
- features, defaultArgs);
-
- let onFullScreen = null;
- if (AppConstants.platform == "macosx") {
- onFullScreen = function(e) {
- newWindow.removeEventListener("fullscreen", onFullScreen);
- let docEl = newWindow.document.documentElement;
- let sizemode = docEl.getAttribute("sizemode");
- if (!newWindow.fullScreen && sizemode == "fullscreen") {
- docEl.setAttribute("sizemode", "normal");
- e.preventDefault();
- e.stopPropagation();
- return false;
- }
- return undefined;
- }
- newWindow.addEventListener("fullscreen", onFullScreen);
- }
-
- let promiseReady = new Promise(resolve => {
- // Window creation and destruction is asynchronous. We need to wait
- // until all existing windows are fully closed, and the new window is
- // fully open, before continuing. Otherwise the rest of the sanitizer
- // could run too early (and miss new cookies being set when a page
- // closes) and/or run too late (and not have a fully-formed window yet
- // in existence). See bug 1088137.
- let newWindowOpened = false;
- let onWindowOpened = function(subject, topic, data) {
- if (subject != newWindow)
- return;
-
- Services.obs.removeObserver(onWindowOpened, "browser-delayed-startup-finished");
- if (AppConstants.platform == "macosx") {
- newWindow.removeEventListener("fullscreen", onFullScreen);
- }
- newWindowOpened = true;
- // If we're the last thing to happen, invoke callback.
- if (numWindowsClosing == 0) {
- TelemetryStopwatch.finish("FX_SANITIZE_OPENWINDOWS", refObj);
- resolve();
- }
- }
-
- let numWindowsClosing = windowList.length;
- let onWindowClosed = function() {
- numWindowsClosing--;
- if (numWindowsClosing == 0) {
- Services.obs.removeObserver(onWindowClosed, "xul-window-destroyed");
- // If we're the last thing to happen, invoke callback.
- if (newWindowOpened) {
- TelemetryStopwatch.finish("FX_SANITIZE_OPENWINDOWS", refObj);
- resolve();
- }
- }
- }
- Services.obs.addObserver(onWindowOpened, "browser-delayed-startup-finished", false);
- Services.obs.addObserver(onWindowClosed, "xul-window-destroyed", false);
- });
-
- // Start the process of closing windows
- while (windowList.length) {
- windowList.pop().close();
- }
- newWindow.focus();
- yield promiseReady;
- })
- },
- }
-};
-
-// The preferences branch for the sanitizer.
-Sanitizer.PREF_DOMAIN = "privacy.sanitize.";
-// Whether we should sanitize on shutdown.
-Sanitizer.PREF_SANITIZE_ON_SHUTDOWN = "privacy.sanitize.sanitizeOnShutdown";
-// During a sanitization this is set to a json containing the array of items
-// being sanitized, then cleared once the sanitization is complete.
-// This allows to retry a sanitization on startup in case it was interrupted
-// by a crash.
-Sanitizer.PREF_SANITIZE_IN_PROGRESS = "privacy.sanitize.sanitizeInProgress";
-// Whether the previous shutdown sanitization completed successfully.
-// This is used to detect cases where we were supposed to sanitize on shutdown
-// but due to a crash we were unable to. In such cases there may not be any
-// sanitization in progress, cause we didn't have a chance to start it yet.
-Sanitizer.PREF_SANITIZE_DID_SHUTDOWN = "privacy.sanitize.didShutdownSanitize";
-
-// Time span constants corresponding to values of the privacy.sanitize.timeSpan
-// pref. Used to determine how much history to clear, for various items
-Sanitizer.TIMESPAN_EVERYTHING = 0;
-Sanitizer.TIMESPAN_HOUR = 1;
-Sanitizer.TIMESPAN_2HOURS = 2;
-Sanitizer.TIMESPAN_4HOURS = 3;
-Sanitizer.TIMESPAN_TODAY = 4;
-Sanitizer.TIMESPAN_5MIN = 5;
-Sanitizer.TIMESPAN_24HOURS = 6;
-
-// Return a 2 element array representing the start and end times,
-// in the uSec-since-epoch format that PRTime likes. If we should
-// clear everything, return null. Use ts if it is defined; otherwise
-// use the timeSpan pref.
-Sanitizer.getClearRange = function (ts) {
- if (ts === undefined)
- ts = Sanitizer.prefs.getIntPref("timeSpan");
- if (ts === Sanitizer.TIMESPAN_EVERYTHING)
- return null;
-
- // PRTime is microseconds while JS time is milliseconds
- var endDate = Date.now() * 1000;
- switch (ts) {
- case Sanitizer.TIMESPAN_5MIN :
- var startDate = endDate - 300000000; // 5*60*1000000
- break;
- case Sanitizer.TIMESPAN_HOUR :
- startDate = endDate - 3600000000; // 1*60*60*1000000
- break;
- case Sanitizer.TIMESPAN_2HOURS :
- startDate = endDate - 7200000000; // 2*60*60*1000000
- break;
- case Sanitizer.TIMESPAN_4HOURS :
- startDate = endDate - 14400000000; // 4*60*60*1000000
- break;
- case Sanitizer.TIMESPAN_TODAY :
- var d = new Date(); // Start with today
- d.setHours(0); // zero us back to midnight...
- d.setMinutes(0);
- d.setSeconds(0);
- startDate = d.valueOf() * 1000; // convert to epoch usec
- break;
- case Sanitizer.TIMESPAN_24HOURS :
- startDate = endDate - 86400000000; // 24*60*60*1000000
- break;
- default:
- throw "Invalid time span for clear private data: " + ts;
- }
- return [startDate, endDate];
-};
-
-Sanitizer._prefs = null;
-Sanitizer.__defineGetter__("prefs", function()
-{
- return Sanitizer._prefs ? Sanitizer._prefs
- : Sanitizer._prefs = Components.classes["@mozilla.org/preferences-service;1"]
- .getService(Components.interfaces.nsIPrefService)
- .getBranch(Sanitizer.PREF_DOMAIN);
-});
-
-// Shows sanitization UI
-Sanitizer.showUI = function(aParentWindow)
-{
- let win = AppConstants.platform == "macosx" ?
- null: // make this an app-modal window on Mac
- aParentWindow;
- Services.ww.openWindow(win,
- "chrome://browser/content/sanitize.xul",
- "Sanitize",
- "chrome,titlebar,dialog,centerscreen,modal",
- null);
-};
-
-/**
- * Deletes privacy sensitive data in a batch, optionally showing the
- * sanitize UI, according to user preferences
- */
-Sanitizer.sanitize = function(aParentWindow)
-{
- Sanitizer.showUI(aParentWindow);
-};
-
-Sanitizer.onStartup = Task.async(function*() {
- // Check if we were interrupted during the last shutdown sanitization.
- let shutownSanitizationWasInterrupted =
- Preferences.get(Sanitizer.PREF_SANITIZE_ON_SHUTDOWN, false) &&
- !Preferences.has(Sanitizer.PREF_SANITIZE_DID_SHUTDOWN);
-
- if (Preferences.has(Sanitizer.PREF_SANITIZE_DID_SHUTDOWN)) {
- // Reset the pref, so that if we crash before having a chance to
- // sanitize on shutdown, we will do at the next startup.
- // Flushing prefs has a cost, so do this only if necessary.
- Preferences.reset(Sanitizer.PREF_SANITIZE_DID_SHUTDOWN);
- Services.prefs.savePrefFile(null);
- }
-
- // Make sure that we are triggered during shutdown.
- let shutdownClient = Cc["@mozilla.org/browser/nav-history-service;1"]
- .getService(Ci.nsPIPlacesDatabase)
- .shutdownClient
- .jsclient;
- // We need to pass to sanitize() (through sanitizeOnShutdown) a state object
- // that tracks the status of the shutdown blocker. This `progress` object
- // will be updated during sanitization and reported with the crash in case of
- // a shutdown timeout.
- // We use the `options` argument to pass the `progress` object to sanitize().
- let progress = { isShutdown: true };
- shutdownClient.addBlocker("sanitize.js: Sanitize on shutdown",
- () => sanitizeOnShutdown({ progress }),
- {
- fetchState: () => ({ progress })
- }
- );
-
- // Check if Firefox crashed during a sanitization.
- let lastInterruptedSanitization = Preferences.get(Sanitizer.PREF_SANITIZE_IN_PROGRESS, "");
- if (lastInterruptedSanitization) {
- let s = new Sanitizer();
- // If the json is invalid this will just throw and reject the Task.
- let itemsToClear = JSON.parse(lastInterruptedSanitization);
- yield s.sanitize(itemsToClear);
- } else if (shutownSanitizationWasInterrupted) {
- // Otherwise, could be we were supposed to sanitize on shutdown but we
- // didn't have a chance, due to an earlier crash.
- // In such a case, just redo a shutdown sanitize now, during startup.
- yield sanitizeOnShutdown();
- }
-});
-
-var sanitizeOnShutdown = Task.async(function*(options = {}) {
- if (!Preferences.get(Sanitizer.PREF_SANITIZE_ON_SHUTDOWN)) {
- return;
- }
- // Need to sanitize upon shutdown
- let s = new Sanitizer();
- s.prefDomain = "privacy.clearOnShutdown.";
- yield s.sanitize(null, options);
- // We didn't crash during shutdown sanitization, so annotate it to avoid
- // sanitizing again on startup.
- Preferences.set(Sanitizer.PREF_SANITIZE_DID_SHUTDOWN, true);
- Services.prefs.savePrefFile(null);
-});