-
-
Save bogdanRada/fec2b3035f83e7d615573f369009ddba to your computer and use it in GitHub Desktop.
view-source:resource:///modules/BrowserGlue.jsm
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/* This Source Code Form is subject to the terms of the Mozilla Public | |
* License, v. 2.0. If a copy of the MPL was not distributed with this | |
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */ | |
var EXPORTED_SYMBOLS = ["BrowserGlue", "ContentPermissionPrompt"]; | |
const XULNS = "http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul"; | |
const { XPCOMUtils } = ChromeUtils.import( | |
"resource://gre/modules/XPCOMUtils.jsm" | |
); | |
const { Services } = ChromeUtils.import("resource://gre/modules/Services.jsm"); | |
const { AppConstants } = ChromeUtils.import( | |
"resource://gre/modules/AppConstants.jsm" | |
); | |
ChromeUtils.defineModuleGetter( | |
this, | |
"ActorManagerParent", | |
"resource://gre/modules/ActorManagerParent.jsm" | |
); | |
ChromeUtils.defineModuleGetter( | |
this, | |
"CustomizableUI", | |
"resource:///modules/CustomizableUI.jsm" | |
); | |
XPCOMUtils.defineLazyServiceGetter( | |
this, | |
"PushService", | |
"@mozilla.org/push/Service;1", | |
"nsIPushService" | |
); | |
const PREF_PDFJS_ENABLED_CACHE_STATE = "pdfjs.enabledCache.state"; | |
/** | |
* Fission-compatible JSWindowActor implementations. | |
* Detailed documentation of these is in dom/docs/Fission.rst, | |
* available at https://firefox-source-docs.mozilla.org/dom/Fission.html#jswindowactor | |
*/ | |
let ACTORS = { | |
AboutLogins: { | |
parent: { | |
moduleURI: "resource:///actors/AboutLoginsParent.jsm", | |
}, | |
child: { | |
moduleURI: "resource:///actors/AboutLoginsChild.jsm", | |
events: { | |
AboutLoginsCopyLoginDetail: { wantUntrusted: true }, | |
AboutLoginsCreateLogin: { wantUntrusted: true }, | |
AboutLoginsDeleteLogin: { wantUntrusted: true }, | |
AboutLoginsDismissBreachAlert: { wantUntrusted: true }, | |
AboutLoginsHideFooter: { wantUntrusted: true }, | |
AboutLoginsImport: { wantUntrusted: true }, | |
AboutLoginsInit: { wantUntrusted: true }, | |
AboutLoginsGetHelp: { wantUntrusted: true }, | |
AboutLoginsOpenMobileAndroid: { wantUntrusted: true }, | |
AboutLoginsOpenMobileIos: { wantUntrusted: true }, | |
AboutLoginsOpenPreferences: { wantUntrusted: true }, | |
AboutLoginsOpenSite: { wantUntrusted: true }, | |
AboutLoginsRecordTelemetryEvent: { wantUntrusted: true }, | |
AboutLoginsSortChanged: { wantUntrusted: true }, | |
AboutLoginsSyncEnable: { wantUntrusted: true }, | |
AboutLoginsSyncOptions: { wantUntrusted: true }, | |
AboutLoginsUpdateLogin: { wantUntrusted: true }, | |
}, | |
}, | |
matches: ["about:logins", "about:logins?*"], | |
}, | |
BlockedSite: { | |
parent: { | |
moduleURI: "resource:///actors/BlockedSiteParent.jsm", | |
}, | |
child: { | |
moduleURI: "resource:///actors/BlockedSiteChild.jsm", | |
events: { | |
AboutBlockedLoaded: { wantUntrusted: true }, | |
click: {}, | |
}, | |
}, | |
matches: ["about:blocked?*"], | |
allFrames: true, | |
}, | |
BrowserTab: { | |
parent: { | |
moduleURI: "resource:///actors/BrowserTabParent.jsm", | |
}, | |
child: { | |
moduleURI: "resource:///actors/BrowserTabChild.jsm", | |
events: { | |
DOMWindowCreated: {}, | |
MozAfterPaint: {}, | |
"MozDOMPointerLock:Entered": {}, | |
"MozDOMPointerLock:Exited": {}, | |
}, | |
}, | |
}, | |
ClickHandler: { | |
parent: { | |
moduleURI: "resource:///actors/ClickHandlerParent.jsm", | |
}, | |
child: { | |
moduleURI: "resource:///actors/ClickHandlerChild.jsm", | |
events: { | |
click: { capture: true, mozSystemGroup: true }, | |
auxclick: { capture: true, mozSystemGroup: true }, | |
}, | |
}, | |
allFrames: true, | |
}, | |
// Collects description and icon information from meta tags. | |
ContentMeta: { | |
parent: { | |
moduleURI: "resource:///actors/ContentMetaParent.jsm", | |
}, | |
child: { | |
moduleURI: "resource:///actors/ContentMetaChild.jsm", | |
events: { | |
DOMMetaAdded: {}, | |
}, | |
}, | |
}, | |
ContextMenu: { | |
parent: { | |
moduleURI: "resource:///actors/ContextMenuParent.jsm", | |
}, | |
child: { | |
moduleURI: "resource:///actors/ContextMenuChild.jsm", | |
events: { | |
contextmenu: { mozSystemGroup: true }, | |
}, | |
}, | |
allFrames: true, | |
}, | |
DOMFullscreen: { | |
parent: { | |
moduleURI: "resource:///actors/DOMFullscreenParent.jsm", | |
}, | |
child: { | |
moduleURI: "resource:///actors/DOMFullscreenChild.jsm", | |
group: "browsers", | |
events: { | |
"MozDOMFullscreen:Request": {}, | |
"MozDOMFullscreen:Entered": {}, | |
"MozDOMFullscreen:NewOrigin": {}, | |
"MozDOMFullscreen:Exit": {}, | |
"MozDOMFullscreen:Exited": {}, | |
}, | |
}, | |
allFrames: true, | |
}, | |
FormValidation: { | |
parent: { | |
moduleURI: "resource:///actors/FormValidationParent.jsm", | |
}, | |
child: { | |
moduleURI: "resource:///actors/FormValidationChild.jsm", | |
events: { | |
MozInvalidForm: {}, | |
}, | |
}, | |
allFrames: true, | |
}, | |
LightweightTheme: { | |
child: { | |
moduleURI: "resource:///actors/LightweightThemeChild.jsm", | |
events: { | |
pageshow: { mozSystemGroup: true }, | |
}, | |
}, | |
includeChrome: true, | |
allFrames: true, | |
matches: [ | |
"about:home", | |
"about:newtab", | |
"about:welcome", | |
"chrome://browser/content/syncedtabs/sidebar.xhtml", | |
"chrome://browser/content/places/historySidebar.xhtml", | |
"chrome://browser/content/places/bookmarksSidebar.xhtml", | |
], | |
}, | |
LinkHandler: { | |
parent: { | |
moduleURI: "resource:///actors/LinkHandlerParent.jsm", | |
}, | |
child: { | |
moduleURI: "resource:///actors/LinkHandlerChild.jsm", | |
events: { | |
DOMHeadElementParsed: {}, | |
DOMLinkAdded: {}, | |
DOMLinkChanged: {}, | |
pageshow: {}, | |
pagehide: {}, | |
}, | |
}, | |
}, | |
NetError: { | |
parent: { | |
moduleURI: "resource:///actors/NetErrorParent.jsm", | |
}, | |
child: { | |
moduleURI: "resource:///actors/NetErrorChild.jsm", | |
events: { | |
DOMWindowCreated: {}, | |
click: {}, | |
}, | |
}, | |
matches: ["about:certerror?*", "about:neterror?*"], | |
allFrames: true, | |
}, | |
PageInfo: { | |
child: { | |
moduleURI: "resource:///actors/PageInfoChild.jsm", | |
}, | |
allFrames: true, | |
}, | |
PageStyle: { | |
parent: { | |
moduleURI: "resource:///actors/PageStyleParent.jsm", | |
}, | |
child: { | |
moduleURI: "resource:///actors/PageStyleChild.jsm", | |
events: { | |
pageshow: {}, | |
}, | |
}, | |
// Only matching web pages, as opposed to internal about:, chrome: or | |
// resource: pages. See https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/WebExtensions/Match_patterns | |
matches: ["*://*/*"], | |
allFrames: true, | |
}, | |
Plugin: { | |
parent: { | |
moduleURI: "resource:///actors/PluginParent.jsm", | |
}, | |
child: { | |
moduleURI: "resource:///actors/PluginChild.jsm", | |
events: { | |
PluginBindingAttached: { capture: true, wantUntrusted: true }, | |
PluginCrashed: { capture: true }, | |
PluginOutdated: { capture: true }, | |
PluginInstantiated: { capture: true }, | |
PluginRemoved: { capture: true }, | |
HiddenPlugin: { capture: true }, | |
}, | |
observers: ["decoder-doctor-notification"], | |
}, | |
allFrames: true, | |
}, | |
Prompt: { | |
parent: { | |
moduleURI: "resource:///actors/PromptParent.jsm", | |
}, | |
allFrames: true, | |
}, | |
ShieldFrame: { | |
parent: { | |
moduleURI: "resource://normandy-content/ShieldFrameParent.jsm", | |
}, | |
child: { | |
moduleURI: "resource://normandy-content/ShieldFrameChild.jsm", | |
events: { | |
pageshow: {}, | |
pagehide: {}, | |
ShieldPageEvent: { wantUntrusted: true }, | |
}, | |
}, | |
matches: ["about:studies"], | |
}, | |
SwitchDocumentDirection: { | |
child: { | |
moduleURI: "resource:///actors/SwitchDocumentDirectionChild.jsm", | |
}, | |
allFrames: true, | |
}, | |
SiteSpecificBrowser: { | |
parent: { | |
moduleURI: "resource:///actors/SiteSpecificBrowserParent.jsm", | |
}, | |
child: { | |
moduleURI: "resource:///actors/SiteSpecificBrowserChild.jsm", | |
}, | |
allFrames: true, | |
}, | |
UITour: { | |
parent: { | |
moduleURI: "resource:///modules/UITourParent.jsm", | |
}, | |
child: { | |
moduleURI: "resource:///modules/UITourChild.jsm", | |
events: { | |
mozUITour: { wantUntrusted: true }, | |
}, | |
}, | |
}, | |
WebRTC: { | |
parent: { | |
moduleURI: "resource:///actors/WebRTCParent.jsm", | |
}, | |
child: { | |
moduleURI: "resource:///actors/WebRTCChild.jsm", | |
}, | |
allFrames: true, | |
}, | |
}; | |
let LEGACY_ACTORS = { | |
AboutReader: { | |
child: { | |
module: "resource:///actors/AboutReaderChild.jsm", | |
group: "browsers", | |
events: { | |
AboutReaderContentLoaded: { wantUntrusted: true }, | |
DOMContentLoaded: {}, | |
pageshow: { mozSystemGroup: true }, | |
pagehide: { mozSystemGroup: true }, | |
}, | |
messages: ["Reader:ToggleReaderMode", "Reader:PushState"], | |
}, | |
}, | |
ContentSearch: { | |
child: { | |
module: "resource:///actors/ContentSearchChild.jsm", | |
group: "browsers", | |
matches: [ | |
"about:home", | |
"about:newtab", | |
"about:welcome", | |
"about:privatebrowsing", | |
"chrome://mochitests/content/*", | |
], | |
events: { | |
ContentSearchClient: { capture: true, wantUntrusted: true }, | |
}, | |
messages: ["ContentSearch"], | |
}, | |
}, | |
OfflineApps: { | |
child: { | |
module: "resource:///actors/OfflineAppsChild.jsm", | |
events: { | |
MozApplicationManifest: {}, | |
}, | |
messages: ["OfflineApps:StartFetching"], | |
}, | |
}, | |
SearchTelemetry: { | |
child: { | |
module: "resource:///actors/SearchTelemetryChild.jsm", | |
events: { | |
DOMContentLoaded: {}, | |
pageshow: { mozSystemGroup: true }, | |
}, | |
}, | |
}, | |
URIFixup: { | |
child: { | |
module: "resource:///actors/URIFixupChild.jsm", | |
group: "browsers", | |
observers: ["keyword-uri-fixup"], | |
}, | |
}, | |
}; | |
(function earlyBlankFirstPaint() { | |
if ( | |
AppConstants.platform == "macosx" || | |
!Services.prefs.getBoolPref("browser.startup.blankWindow", false) | |
) { | |
return; | |
} | |
// Until bug 1450626 and bug 1488384 are fixed, skip the blank window when | |
// using a non-default theme. | |
if ( | |
Services.prefs.getCharPref( | |
"extensions.activeThemeID", | |
"default-theme@mozilla.org" | |
) != "default-theme@mozilla.org" | |
) { | |
return; | |
} | |
let store = Services.xulStore; | |
let getValue = attr => | |
store.getValue(AppConstants.BROWSER_CHROME_URL, "main-window", attr); | |
let width = getValue("width"); | |
let height = getValue("height"); | |
// The clean profile case isn't handled yet. Return early for now. | |
if (!width || !height) { | |
return; | |
} | |
let browserWindowFeatures = | |
"chrome,all,dialog=no,extrachrome,menubar,resizable,scrollbars,status," + | |
"location,toolbar,personalbar"; | |
let win = Services.ww.openWindow( | |
null, | |
"about:blank", | |
null, | |
browserWindowFeatures, | |
null | |
); | |
// Hide the titlebar if the actual browser window will draw in it. | |
let hiddenTitlebar = Services.prefs.getBoolPref( | |
"browser.tabs.drawInTitlebar", | |
win.matchMedia("(-moz-gtk-csd-hide-titlebar-by-default)").matches | |
); | |
if (hiddenTitlebar) { | |
win.windowUtils.setChromeMargin(0, 2, 2, 2); | |
} | |
let docElt = win.document.documentElement; | |
docElt.setAttribute("screenX", getValue("screenX")); | |
docElt.setAttribute("screenY", getValue("screenY")); | |
// The sizemode="maximized" attribute needs to be set before first paint. | |
let sizemode = getValue("sizemode"); | |
if (sizemode == "maximized") { | |
docElt.setAttribute("sizemode", sizemode); | |
// Set the size to use when the user leaves the maximized mode. | |
// The persisted size is the outer size, but the height/width | |
// attributes set the inner size. | |
let appWin = win.docShell.treeOwner | |
.QueryInterface(Ci.nsIInterfaceRequestor) | |
.getInterface(Ci.nsIAppWindow); | |
height -= appWin.outerToInnerHeightDifferenceInCSSPixels; | |
width -= appWin.outerToInnerWidthDifferenceInCSSPixels; | |
docElt.setAttribute("height", height); | |
docElt.setAttribute("width", width); | |
} else { | |
// Setting the size of the window in the features string instead of here | |
// causes the window to grow by the size of the titlebar. | |
win.resizeTo(width, height); | |
} | |
// Set this before showing the window so that graphics code can use it to | |
// decide to skip some expensive code paths (eg. starting the GPU process). | |
docElt.setAttribute("windowtype", "navigator:blank"); | |
// The window becomes visible after OnStopRequest, so make this happen now. | |
win.stop(); | |
let { TelemetryTimestamps } = ChromeUtils.import( | |
"resource://gre/modules/TelemetryTimestamps.jsm" | |
); | |
TelemetryTimestamps.add("blankWindowShown"); | |
})(); | |
XPCOMUtils.defineLazyGetter( | |
this, | |
"WeaveService", | |
() => Cc["@mozilla.org/weave/service;1"].getService().wrappedJSObject | |
); | |
// lazy module getters | |
XPCOMUtils.defineLazyModuleGetters(this, { | |
AboutPrivateBrowsingHandler: | |
"resource:///modules/aboutpages/AboutPrivateBrowsingHandler.jsm", | |
AboutProtectionsHandler: | |
"resource:///modules/aboutpages/AboutProtectionsHandler.jsm", | |
AddonManager: "resource://gre/modules/AddonManager.jsm", | |
AppMenuNotifications: "resource://gre/modules/AppMenuNotifications.jsm", | |
AsyncShutdown: "resource://gre/modules/AsyncShutdown.jsm", | |
Blocklist: "resource://gre/modules/Blocklist.jsm", | |
BookmarkHTMLUtils: "resource://gre/modules/BookmarkHTMLUtils.jsm", | |
BookmarkJSONUtils: "resource://gre/modules/BookmarkJSONUtils.jsm", | |
BrowserUsageTelemetry: "resource:///modules/BrowserUsageTelemetry.jsm", | |
BrowserUtils: "resource://gre/modules/BrowserUtils.jsm", | |
BrowserWindowTracker: "resource:///modules/BrowserWindowTracker.jsm", | |
ContextualIdentityService: | |
"resource://gre/modules/ContextualIdentityService.jsm", | |
Corroborate: "resource://gre/modules/Corroborate.jsm", | |
Discovery: "resource:///modules/Discovery.jsm", | |
ExtensionsUI: "resource:///modules/ExtensionsUI.jsm", | |
FirefoxMonitor: "resource:///modules/FirefoxMonitor.jsm", | |
FxAccounts: "resource://gre/modules/FxAccounts.jsm", | |
HomePage: "resource:///modules/HomePage.jsm", | |
Integration: "resource://gre/modules/Integration.jsm", | |
LoginBreaches: "resource:///modules/LoginBreaches.jsm", | |
LiveBookmarkMigrator: "resource:///modules/LiveBookmarkMigrator.jsm", | |
NewTabUtils: "resource://gre/modules/NewTabUtils.jsm", | |
Normandy: "resource://normandy/Normandy.jsm", | |
ObjectUtils: "resource://gre/modules/ObjectUtils.jsm", | |
OS: "resource://gre/modules/osfile.jsm", | |
PageActions: "resource:///modules/PageActions.jsm", | |
PageThumbs: "resource://gre/modules/PageThumbs.jsm", | |
PdfJs: "resource://pdf.js/PdfJs.jsm", | |
PermissionUI: "resource:///modules/PermissionUI.jsm", | |
PlacesBackups: "resource://gre/modules/PlacesBackups.jsm", | |
PlacesUtils: "resource://gre/modules/PlacesUtils.jsm", | |
PluralForm: "resource://gre/modules/PluralForm.jsm", | |
PrivateBrowsingUtils: "resource://gre/modules/PrivateBrowsingUtils.jsm", | |
ProcessHangMonitor: "resource:///modules/ProcessHangMonitor.jsm", | |
PublicSuffixList: "resource://gre/modules/netwerk-dns/PublicSuffixList.jsm", | |
RemoteSettings: "resource://services-settings/remote-settings.js", | |
RemoteSecuritySettings: | |
"resource://gre/modules/psm/RemoteSecuritySettings.jsm", | |
RFPHelper: "resource://gre/modules/RFPHelper.jsm", | |
SafeBrowsing: "resource://gre/modules/SafeBrowsing.jsm", | |
Sanitizer: "resource:///modules/Sanitizer.jsm", | |
SaveToPocket: "chrome://pocket/content/SaveToPocket.jsm", | |
SearchTelemetry: "resource:///modules/SearchTelemetry.jsm", | |
SessionStartup: "resource:///modules/sessionstore/SessionStartup.jsm", | |
SessionStore: "resource:///modules/sessionstore/SessionStore.jsm", | |
ShellService: "resource:///modules/ShellService.jsm", | |
TabCrashHandler: "resource:///modules/ContentCrashHandlers.jsm", | |
TabUnloader: "resource:///modules/TabUnloader.jsm", | |
UIState: "resource://services-sync/UIState.jsm", | |
WebChannel: "resource://gre/modules/WebChannel.jsm", | |
WindowsRegistry: "resource://gre/modules/WindowsRegistry.jsm", | |
}); | |
// eslint-disable-next-line no-unused-vars | |
XPCOMUtils.defineLazyModuleGetters(this, { | |
AboutLoginsParent: "resource:///modules/AboutLoginsParent.jsm", | |
AsyncPrefs: "resource://gre/modules/AsyncPrefs.jsm", | |
PluginManager: "resource:///actors/PluginParent.jsm", | |
ReaderParent: "resource:///modules/ReaderParent.jsm", | |
}); | |
/** | |
* IF YOU ADD OR REMOVE FROM THIS LIST, PLEASE UPDATE THE LIST ABOVE AS WELL. | |
* XXX Bug 1325373 is for making eslint detect these automatically. | |
*/ | |
let initializedModules = {}; | |
[ | |
[ | |
"ContentPrefServiceParent", | |
"resource://gre/modules/ContentPrefServiceParent.jsm", | |
"alwaysInit", | |
], | |
["ContentSearch", "resource:///modules/ContentSearch.jsm", "init"], | |
["UpdateListener", "resource://gre/modules/UpdateListener.jsm", "init"], | |
].forEach(([name, resource, init]) => { | |
XPCOMUtils.defineLazyGetter(this, name, () => { | |
ChromeUtils.import(resource, initializedModules); | |
initializedModules[name][init](); | |
return initializedModules[name]; | |
}); | |
}); | |
if (AppConstants.MOZ_CRASHREPORTER) { | |
XPCOMUtils.defineLazyModuleGetters(this, { | |
UnsubmittedCrashHandler: "resource:///modules/ContentCrashHandlers.jsm", | |
}); | |
} | |
XPCOMUtils.defineLazyGetter(this, "gBrandBundle", function() { | |
return Services.strings.createBundle( | |
"chrome://branding/locale/brand.properties" | |
); | |
}); | |
XPCOMUtils.defineLazyGetter(this, "gBrowserBundle", function() { | |
return Services.strings.createBundle( | |
"chrome://browser/locale/browser.properties" | |
); | |
}); | |
XPCOMUtils.defineLazyGetter(this, "gTabbrowserBundle", function() { | |
return Services.strings.createBundle( | |
"chrome://browser/locale/tabbrowser.properties" | |
); | |
}); | |
const global = this; | |
const listeners = { | |
observers: { | |
"update-staged": ["UpdateListener"], | |
"update-downloaded": ["UpdateListener"], | |
"update-available": ["UpdateListener"], | |
"update-error": ["UpdateListener"], | |
"gmp-plugin-crash": ["PluginManager"], | |
"plugin-crashed": ["PluginManager"], | |
}, | |
ppmm: { | |
// PLEASE KEEP THIS LIST IN SYNC WITH THE LISTENERS ADDED IN ContentPrefServiceParent.init | |
"ContentPrefs:FunctionCall": ["ContentPrefServiceParent"], | |
"ContentPrefs:AddObserverForName": ["ContentPrefServiceParent"], | |
"ContentPrefs:RemoveObserverForName": ["ContentPrefServiceParent"], | |
// PLEASE KEEP THIS LIST IN SYNC WITH THE LISTENERS ADDED IN ContentPrefServiceParent.init | |
// PLEASE KEEP THIS LIST IN SYNC WITH THE LISTENERS ADDED IN AsyncPrefs.init | |
"AsyncPrefs:SetPref": ["AsyncPrefs"], | |
"AsyncPrefs:ResetPref": ["AsyncPrefs"], | |
// PLEASE KEEP THIS LIST IN SYNC WITH THE LISTENERS ADDED IN AsyncPrefs.init | |
}, | |
mm: { | |
"AboutLogins:CreateLogin": ["AboutLoginsParent"], | |
"AboutLogins:DeleteLogin": ["AboutLoginsParent"], | |
"AboutLogins:DismissBreachAlert": ["AboutLoginsParent"], | |
"AboutLogins:HideFooter": ["AboutLoginsParent"], | |
"AboutLogins:Import": ["AboutLoginsParent"], | |
"AboutLogins:MasterPasswordRequest": ["AboutLoginsParent"], | |
"AboutLogins:OpenFAQ": ["AboutLoginsParent"], | |
"AboutLogins:GetHelp": ["AboutLoginsParent"], | |
"AboutLogins:OpenPreferences": ["AboutLoginsParent"], | |
"AboutLogins:OpenMobileAndroid": ["AboutLoginsParent"], | |
"AboutLogins:OpenMobileIos": ["AboutLoginsParent"], | |
"AboutLogins:OpenSite": ["AboutLoginsParent"], | |
"AboutLogins:SortChanged": ["AboutLoginsParent"], | |
"AboutLogins:Subscribe": ["AboutLoginsParent"], | |
"AboutLogins:SyncEnable": ["AboutLoginsParent"], | |
"AboutLogins:SyncOptions": ["AboutLoginsParent"], | |
"AboutLogins:UpdateLogin": ["AboutLoginsParent"], | |
ContentSearch: ["ContentSearch"], | |
"Reader:FaviconRequest": ["ReaderParent"], | |
"Reader:UpdateReaderButton": ["ReaderParent"], | |
}, | |
observe(subject, topic, data) { | |
for (let module of this.observers[topic]) { | |
try { | |
global[module].observe(subject, topic, data); | |
} catch (e) { | |
Cu.reportError(e); | |
} | |
} | |
}, | |
receiveMessage(modules, data) { | |
let val; | |
for (let module of modules[data.name]) { | |
try { | |
val = global[module].receiveMessage(data) || val; | |
} catch (e) { | |
Cu.reportError(e); | |
} | |
} | |
return val; | |
}, | |
init() { | |
for (let observer of Object.keys(this.observers)) { | |
Services.obs.addObserver(this, observer); | |
} | |
let receiveMessageMM = this.receiveMessage.bind(this, this.mm); | |
for (let message of Object.keys(this.mm)) { | |
Services.mm.addMessageListener(message, receiveMessageMM); | |
} | |
let receiveMessagePPMM = this.receiveMessage.bind(this, this.ppmm); | |
for (let message of Object.keys(this.ppmm)) { | |
Services.ppmm.addMessageListener(message, receiveMessagePPMM); | |
} | |
}, | |
}; | |
// Seconds of idle before trying to create a bookmarks backup. | |
const BOOKMARKS_BACKUP_IDLE_TIME_SEC = 8 * 60; | |
// Minimum interval between backups. We try to not create more than one backup | |
// per interval. | |
const BOOKMARKS_BACKUP_MIN_INTERVAL_DAYS = 1; | |
// Maximum interval between backups. If the last backup is older than these | |
// days we will try to create a new one more aggressively. | |
const BOOKMARKS_BACKUP_MAX_INTERVAL_DAYS = 3; | |
// Seconds of idle time before the late idle tasks will be scheduled. | |
const LATE_TASKS_IDLE_TIME_SEC = 20; | |
// Time after we stop tracking startup crashes. | |
const STARTUP_CRASHES_END_DELAY_MS = 30 * 1000; | |
/* | |
* OS X has the concept of zero-window sessions and therefore ignores the | |
* browser-lastwindow-close-* topics. | |
*/ | |
const OBSERVE_LASTWINDOW_CLOSE_TOPICS = AppConstants.platform != "macosx"; | |
function BrowserGlue() { | |
XPCOMUtils.defineLazyServiceGetter( | |
this, | |
"_idleService", | |
"@mozilla.org/widget/idleservice;1", | |
"nsIIdleService" | |
); | |
XPCOMUtils.defineLazyGetter(this, "_distributionCustomizer", function() { | |
const { DistributionCustomizer } = ChromeUtils.import( | |
"resource:///modules/distribution.js" | |
); | |
return new DistributionCustomizer(); | |
}); | |
XPCOMUtils.defineLazyServiceGetter( | |
this, | |
"AlertsService", | |
"@mozilla.org/alerts-service;1", | |
"nsIAlertsService" | |
); | |
this._init(); | |
} | |
BrowserGlue.prototype = { | |
_saveSession: false, | |
_migrationImportsDefaultBookmarks: false, | |
_placesBrowserInitComplete: false, | |
_isNewProfile: undefined, | |
_setPrefToSaveSession: function BG__setPrefToSaveSession(aForce) { | |
if (!this._saveSession && !aForce) { | |
return; | |
} | |
if (!PrivateBrowsingUtils.permanentPrivateBrowsing) { | |
Services.prefs.setBoolPref( | |
"browser.sessionstore.resume_session_once", | |
true | |
); | |
} | |
// This method can be called via [NSApplication terminate:] on Mac, which | |
// ends up causing prefs not to be flushed to disk, so we need to do that | |
// explicitly here. See bug 497652. | |
Services.prefs.savePrefFile(null); | |
}, | |
_setSyncAutoconnectDelay: function BG__setSyncAutoconnectDelay() { | |
// Assume that a non-zero value for services.sync.autoconnectDelay should override | |
if (Services.prefs.prefHasUserValue("services.sync.autoconnectDelay")) { | |
let prefDelay = Services.prefs.getIntPref( | |
"services.sync.autoconnectDelay" | |
); | |
if (prefDelay > 0) { | |
return; | |
} | |
} | |
// delays are in seconds | |
const MAX_DELAY = 300; | |
let delay = 3; | |
for (let win of Services.wm.getEnumerator("navigator:browser")) { | |
// browser windows without a gBrowser almost certainly means we are | |
// shutting down, so instead of just ignoring that window we abort. | |
if (win.closed || !win.gBrowser) { | |
return; | |
} | |
delay += win.gBrowser.tabs.length; | |
} | |
delay = delay <= MAX_DELAY ? delay : MAX_DELAY; | |
const { Weave } = ChromeUtils.import("resource://services-sync/main.js"); | |
Weave.Service.scheduler.delayedAutoConnect(delay); | |
}, | |
// nsIObserver implementation | |
observe: async function BG_observe(subject, topic, data) { | |
switch (topic) { | |
case "notifications-open-settings": | |
this._openPreferences("privacy-permissions"); | |
break; | |
case "final-ui-startup": | |
this._beforeUIStartup(); | |
break; | |
case "browser-delayed-startup-finished": | |
this._onFirstWindowLoaded(subject); | |
Services.obs.removeObserver(this, "browser-delayed-startup-finished"); | |
break; | |
case "sessionstore-windows-restored": | |
this._onWindowsRestored(); | |
break; | |
case "browser:purge-session-history": | |
// reset the console service's error buffer | |
Services.console.logStringMessage(null); // clear the console (in case it's open) | |
Services.console.reset(); | |
break; | |
case "restart-in-safe-mode": | |
this._onSafeModeRestart(); | |
break; | |
case "quit-application-requested": | |
this._onQuitRequest(subject, data); | |
break; | |
case "quit-application-granted": | |
this._onQuitApplicationGranted(); | |
break; | |
case "browser-lastwindow-close-requested": | |
if (OBSERVE_LASTWINDOW_CLOSE_TOPICS) { | |
// The application is not actually quitting, but the last full browser | |
// window is about to be closed. | |
this._onQuitRequest(subject, "lastwindow"); | |
} | |
break; | |
case "browser-lastwindow-close-granted": | |
if (OBSERVE_LASTWINDOW_CLOSE_TOPICS) { | |
this._setPrefToSaveSession(); | |
} | |
break; | |
case "weave:service:ready": | |
this._setSyncAutoconnectDelay(); | |
break; | |
case "fxaccounts:onverified": | |
this._onThisDeviceConnected(); | |
break; | |
case "fxaccounts:device_connected": | |
this._onDeviceConnected(data); | |
break; | |
case "fxaccounts:verify_login": | |
this._onVerifyLoginNotification(JSON.parse(data)); | |
break; | |
case "fxaccounts:device_disconnected": | |
data = JSON.parse(data); | |
if (data.isLocalDevice) { | |
this._onDeviceDisconnected(); | |
} | |
break; | |
case "fxaccounts:commands:open-uri": | |
case "weave:engine:clients:display-uris": | |
this._onDisplaySyncURIs(subject); | |
break; | |
case "session-save": | |
this._setPrefToSaveSession(true); | |
subject.QueryInterface(Ci.nsISupportsPRBool); | |
subject.data = true; | |
break; | |
case "places-init-complete": | |
Services.obs.removeObserver(this, "places-init-complete"); | |
if (!this._migrationImportsDefaultBookmarks) { | |
this._initPlaces(false); | |
} | |
break; | |
case "idle": | |
this._backupBookmarks(); | |
break; | |
case "distribution-customization-complete": | |
Services.obs.removeObserver( | |
this, | |
"distribution-customization-complete" | |
); | |
// Customization has finished, we don't need the customizer anymore. | |
delete this._distributionCustomizer; | |
break; | |
case "browser-glue-test": // used by tests | |
if (data == "force-ui-migration") { | |
this._migrateUI(); | |
} else if (data == "force-distribution-customization") { | |
this._distributionCustomizer.applyCustomizations(); | |
// To apply distribution bookmarks use "places-init-complete". | |
} else if (data == "force-places-init") { | |
this._initPlaces(false); | |
} else if (data == "mock-alerts-service") { | |
Object.defineProperty(this, "AlertsService", { | |
value: subject.wrappedJSObject, | |
}); | |
} else if (data == "places-browser-init-complete") { | |
if (this._placesBrowserInitComplete) { | |
Services.obs.notifyObservers(null, "places-browser-init-complete"); | |
} | |
} else if (data == "migrateMatchBucketsPrefForUI66") { | |
this._migrateMatchBucketsPrefForUI66().then(() => { | |
Services.obs.notifyObservers( | |
null, | |
"browser-glue-test", | |
"migrateMatchBucketsPrefForUI66-done" | |
); | |
}); | |
} else if (data == "add-breaches-sync-handler") { | |
this._addBreachesSyncHandler(); | |
} | |
break; | |
case "initial-migration-will-import-default-bookmarks": | |
this._migrationImportsDefaultBookmarks = true; | |
break; | |
case "initial-migration-did-import-default-bookmarks": | |
this._initPlaces(true); | |
break; | |
case "handle-xul-text-link": | |
let linkHandled = subject.QueryInterface(Ci.nsISupportsPRBool); | |
if (!linkHandled.data) { | |
let win = BrowserWindowTracker.getTopWindow(); | |
if (win) { | |
data = JSON.parse(data); | |
let where = win.whereToOpenLink(data); | |
// Preserve legacy behavior of non-modifier left-clicks | |
// opening in a new selected tab. | |
if (where == "current") { | |
where = "tab"; | |
} | |
win.openTrustedLinkIn(data.href, where); | |
linkHandled.data = true; | |
} | |
} | |
break; | |
case "profile-before-change": | |
// Any component depending on Places should be finalized in | |
// _onPlacesShutdown. Any component that doesn't need to act after | |
// the UI has gone should be finalized in _onQuitApplicationGranted. | |
this._dispose(); | |
break; | |
case "keyword-search": | |
// This notification is broadcast by the docshell when it "fixes up" a | |
// URI that it's been asked to load into a keyword search. | |
let engine = null; | |
try { | |
engine = subject.QueryInterface(Ci.nsISearchEngine); | |
} catch (ex) { | |
Cu.reportError(ex); | |
} | |
let win = BrowserWindowTracker.getTopWindow(); | |
win.BrowserSearch.recordSearchInTelemetry(engine, "urlbar"); | |
break; | |
case "browser-search-engine-modified": | |
// Ensure we cleanup the hiddenOneOffs pref when removing | |
// an engine, and that newly added engines are visible. | |
if (data == "engine-added" || data == "engine-removed") { | |
let engineName = subject.QueryInterface(Ci.nsISearchEngine).name; | |
let pref = Services.prefs.getStringPref( | |
"browser.search.hiddenOneOffs" | |
); | |
let hiddenList = pref ? pref.split(",") : []; | |
hiddenList = hiddenList.filter(x => x !== engineName); | |
Services.prefs.setStringPref( | |
"browser.search.hiddenOneOffs", | |
hiddenList.join(",") | |
); | |
} | |
break; | |
case "flash-plugin-hang": | |
this._handleFlashHang(); | |
break; | |
case "xpi-signature-changed": | |
let disabledAddons = JSON.parse(data).disabled; | |
let addons = await AddonManager.getAddonsByIDs(disabledAddons); | |
if (addons.some(addon => addon)) { | |
this._notifyUnsignedAddonsDisabled(); | |
} | |
break; | |
case "sync-ui-state:update": | |
this._updateFxaBadges(); | |
break; | |
case "handlersvc-store-initialized": | |
// Initialize PdfJs when running in-process and remote. This only | |
// happens once since PdfJs registers global hooks. If the PdfJs | |
// extension is installed the init method below will be overridden | |
// leaving initialization to the extension. | |
// parent only: configure default prefs, set up pref observers, register | |
// pdf content handler, and initializes parent side message manager | |
// shim for privileged api access. | |
PdfJs.init(this._isNewProfile); | |
break; | |
case "shield-init-complete": | |
this._shieldInitComplete = true; | |
break; | |
} | |
}, | |
// initialization (called on application startup) | |
_init: function BG__init() { | |
let os = Services.obs; | |
os.addObserver(this, "notifications-open-settings"); | |
os.addObserver(this, "final-ui-startup"); | |
os.addObserver(this, "browser-delayed-startup-finished"); | |
os.addObserver(this, "sessionstore-windows-restored"); | |
os.addObserver(this, "browser:purge-session-history"); | |
os.addObserver(this, "quit-application-requested"); | |
os.addObserver(this, "quit-application-granted"); | |
if (OBSERVE_LASTWINDOW_CLOSE_TOPICS) { | |
os.addObserver(this, "browser-lastwindow-close-requested"); | |
os.addObserver(this, "browser-lastwindow-close-granted"); | |
} | |
os.addObserver(this, "weave:service:ready"); | |
os.addObserver(this, "fxaccounts:onverified"); | |
os.addObserver(this, "fxaccounts:device_connected"); | |
os.addObserver(this, "fxaccounts:verify_login"); | |
os.addObserver(this, "fxaccounts:device_disconnected"); | |
os.addObserver(this, "fxaccounts:commands:open-uri"); | |
os.addObserver(this, "weave:engine:clients:display-uris"); | |
os.addObserver(this, "session-save"); | |
os.addObserver(this, "places-init-complete"); | |
os.addObserver(this, "distribution-customization-complete"); | |
os.addObserver(this, "handle-xul-text-link"); | |
os.addObserver(this, "profile-before-change"); | |
os.addObserver(this, "keyword-search"); | |
os.addObserver(this, "browser-search-engine-modified"); | |
os.addObserver(this, "restart-in-safe-mode"); | |
os.addObserver(this, "flash-plugin-hang"); | |
os.addObserver(this, "xpi-signature-changed"); | |
os.addObserver(this, "sync-ui-state:update"); | |
os.addObserver(this, "handlersvc-store-initialized"); | |
os.addObserver(this, "shield-init-complete"); | |
ActorManagerParent.addActors(ACTORS); | |
ActorManagerParent.addLegacyActors(LEGACY_ACTORS); | |
ActorManagerParent.flush(); | |
this._flashHangCount = 0; | |
this._firstWindowReady = new Promise( | |
resolve => (this._firstWindowLoaded = resolve) | |
); | |
if (AppConstants.platform == "win") { | |
JawsScreenReaderVersionCheck.init(); | |
} | |
}, | |
// cleanup (called on application shutdown) | |
_dispose: function BG__dispose() { | |
let os = Services.obs; | |
os.removeObserver(this, "notifications-open-settings"); | |
os.removeObserver(this, "final-ui-startup"); | |
os.removeObserver(this, "sessionstore-windows-restored"); | |
os.removeObserver(this, "browser:purge-session-history"); | |
os.removeObserver(this, "quit-application-requested"); | |
os.removeObserver(this, "quit-application-granted"); | |
os.removeObserver(this, "restart-in-safe-mode"); | |
if (OBSERVE_LASTWINDOW_CLOSE_TOPICS) { | |
os.removeObserver(this, "browser-lastwindow-close-requested"); | |
os.removeObserver(this, "browser-lastwindow-close-granted"); | |
} | |
os.removeObserver(this, "weave:service:ready"); | |
os.removeObserver(this, "fxaccounts:onverified"); | |
os.removeObserver(this, "fxaccounts:device_connected"); | |
os.removeObserver(this, "fxaccounts:verify_login"); | |
os.removeObserver(this, "fxaccounts:device_disconnected"); | |
os.removeObserver(this, "fxaccounts:commands:open-uri"); | |
os.removeObserver(this, "weave:engine:clients:display-uris"); | |
os.removeObserver(this, "session-save"); | |
if (this._bookmarksBackupIdleTime) { | |
this._idleService.removeIdleObserver(this, this._bookmarksBackupIdleTime); | |
delete this._bookmarksBackupIdleTime; | |
} | |
if (this._lateTasksIdleObserver) { | |
this._idleService.removeIdleObserver( | |
this._lateTasksIdleObserver, | |
LATE_TASKS_IDLE_TIME_SEC | |
); | |
delete this._lateTasksIdleObserver; | |
} | |
if (this._gmpInstallManager) { | |
this._gmpInstallManager.uninit(); | |
delete this._gmpInstallManager; | |
} | |
try { | |
os.removeObserver(this, "places-init-complete"); | |
} catch (ex) { | |
/* Could have been removed already */ | |
} | |
os.removeObserver(this, "handle-xul-text-link"); | |
os.removeObserver(this, "profile-before-change"); | |
os.removeObserver(this, "keyword-search"); | |
os.removeObserver(this, "browser-search-engine-modified"); | |
os.removeObserver(this, "flash-plugin-hang"); | |
os.removeObserver(this, "xpi-signature-changed"); | |
os.removeObserver(this, "sync-ui-state:update"); | |
os.removeObserver(this, "shield-init-complete"); | |
Services.prefs.removeObserver( | |
"privacy.trackingprotection", | |
this._matchCBCategory | |
); | |
Services.prefs.removeObserver( | |
"network.cookie.cookieBehavior", | |
this._matchCBCategory | |
); | |
Services.prefs.removeObserver( | |
ContentBlockingCategoriesPrefs.PREF_CB_CATEGORY, | |
this._updateCBCategory | |
); | |
Services.prefs.removeObserver( | |
"privacy.trackingprotection", | |
this._setPrefExpectations | |
); | |
Services.prefs.removeObserver( | |
"browser.contentblocking.features.strict", | |
this._setPrefExpectationsAndUpdate | |
); | |
}, | |
// runs on startup, before the first command line handler is invoked | |
// (i.e. before the first window is opened) | |
_beforeUIStartup: function BG__beforeUIStartup() { | |
SessionStartup.init(); | |
// check if we're in safe mode | |
if (Services.appinfo.inSafeMode) { | |
Services.ww.openWindow( | |
null, | |
"chrome://browser/content/safeMode.xhtml", | |
"_blank", | |
"chrome,centerscreen,modal,resizable=no", | |
null | |
); | |
} | |
// apply distribution customizations | |
this._distributionCustomizer.applyCustomizations(); | |
// handle any UI migration | |
this._migrateUI(); | |
if (Services.prefs.prefHasUserValue(PREF_PDFJS_ENABLED_CACHE_STATE)) { | |
Services.ppmm.sharedData.set( | |
"pdfjs.enabled", | |
Services.prefs.getBoolPref(PREF_PDFJS_ENABLED_CACHE_STATE) | |
); | |
} else { | |
PdfJs.earlyInit(this._isNewProfile); | |
} | |
listeners.init(); | |
SessionStore.init(); | |
AddonManager.maybeInstallBuiltinAddon( | |
"firefox-compact-light@mozilla.org", | |
"1.0", | |
"resource:///modules/themes/light/" | |
); | |
AddonManager.maybeInstallBuiltinAddon( | |
"firefox-compact-dark@mozilla.org", | |
"1.0", | |
"resource:///modules/themes/dark/" | |
); | |
if (AppConstants.MOZ_NORMANDY) { | |
Normandy.init(); | |
} | |
SaveToPocket.init(); | |
Services.obs.notifyObservers(null, "browser-ui-startup-complete"); | |
}, | |
_checkForOldBuildUpdates() { | |
// check for update if our build is old | |
if ( | |
AppConstants.MOZ_UPDATER && | |
Services.prefs.getBoolPref("app.update.checkInstallTime") | |
) { | |
let buildID = Services.appinfo.appBuildID; | |
let today = new Date().getTime(); | |
/* eslint-disable no-multi-spaces */ | |
let buildDate = new Date( | |
buildID.slice(0, 4), // year | |
buildID.slice(4, 6) - 1, // months are zero-based. | |
buildID.slice(6, 8), // day | |
buildID.slice(8, 10), // hour | |
buildID.slice(10, 12), // min | |
buildID.slice(12, 14) | |
) // ms | |
.getTime(); | |
/* eslint-enable no-multi-spaces */ | |
const millisecondsIn24Hours = 86400000; | |
let acceptableAge = | |
Services.prefs.getIntPref("app.update.checkInstallTime.days") * | |
millisecondsIn24Hours; | |
if (buildDate + acceptableAge < today) { | |
Cc["@mozilla.org/updates/update-service;1"] | |
.getService(Ci.nsIApplicationUpdateService) | |
.checkForBackgroundUpdates(); | |
} | |
} | |
}, | |
_onSafeModeRestart: function BG_onSafeModeRestart() { | |
// prompt the user to confirm | |
let strings = gBrowserBundle; | |
let promptTitle = strings.GetStringFromName("safeModeRestartPromptTitle"); | |
let promptMessage = strings.GetStringFromName( | |
"safeModeRestartPromptMessage" | |
); | |
let restartText = strings.GetStringFromName("safeModeRestartButton"); | |
let buttonFlags = | |
Services.prompt.BUTTON_POS_0 * Services.prompt.BUTTON_TITLE_IS_STRING + | |
Services.prompt.BUTTON_POS_1 * Services.prompt.BUTTON_TITLE_CANCEL + | |
Services.prompt.BUTTON_POS_0_DEFAULT; | |
let rv = Services.prompt.confirmEx( | |
null, | |
promptTitle, | |
promptMessage, | |
buttonFlags, | |
restartText, | |
null, | |
null, | |
null, | |
{} | |
); | |
if (rv != 0) { | |
return; | |
} | |
let cancelQuit = Cc["@mozilla.org/supports-PRBool;1"].createInstance( | |
Ci.nsISupportsPRBool | |
); | |
Services.obs.notifyObservers( | |
cancelQuit, | |
"quit-application-requested", | |
"restart" | |
); | |
if (!cancelQuit.data) { | |
Services.startup.restartInSafeMode(Ci.nsIAppStartup.eAttemptQuit); | |
} | |
}, | |
_trackSlowStartup() { | |
if ( | |
Services.startup.interrupted || | |
Services.prefs.getBoolPref("browser.slowStartup.notificationDisabled") | |
) { | |
return; | |
} | |
let currentTime = Math.round(Cu.now()); | |
let averageTime = 0; | |
let samples = 0; | |
try { | |
averageTime = Services.prefs.getIntPref( | |
"browser.slowStartup.averageTime" | |
); | |
samples = Services.prefs.getIntPref("browser.slowStartup.samples"); | |
} catch (e) {} | |
let totalTime = averageTime * samples + currentTime; | |
samples++; | |
averageTime = totalTime / samples; | |
if ( | |
samples >= Services.prefs.getIntPref("browser.slowStartup.maxSamples") | |
) { | |
if ( | |
averageTime > | |
Services.prefs.getIntPref("browser.slowStartup.timeThreshold") | |
) { | |
this._calculateProfileAgeInDays().then( | |
this._showSlowStartupNotification, | |
null | |
); | |
} | |
averageTime = 0; | |
samples = 0; | |
} | |
Services.prefs.setIntPref("browser.slowStartup.averageTime", averageTime); | |
Services.prefs.setIntPref("browser.slowStartup.samples", samples); | |
}, | |
async _calculateProfileAgeInDays() { | |
let ProfileAge = ChromeUtils.import( | |
"resource://gre/modules/ProfileAge.jsm", | |
{} | |
).ProfileAge; | |
let profileAge = await ProfileAge(); | |
let creationDate = await profileAge.created; | |
let resetDate = await profileAge.reset; | |
// if the profile was reset, consider the | |
// reset date for its age. | |
let profileDate = resetDate || creationDate; | |
const ONE_DAY = 24 * 60 * 60 * 1000; | |
return (Date.now() - profileDate) / ONE_DAY; | |
}, | |
_showSlowStartupNotification(profileAge) { | |
if (profileAge < 90) { | |
// 3 months | |
return; | |
} | |
let win = BrowserWindowTracker.getTopWindow(); | |
if (!win) { | |
return; | |
} | |
let productName = gBrandBundle.GetStringFromName("brandFullName"); | |
let message = win.gNavigatorBundle.getFormattedString( | |
"slowStartup.message", | |
[productName] | |
); | |
let buttons = [ | |
{ | |
label: win.gNavigatorBundle.getString("slowStartup.helpButton.label"), | |
accessKey: win.gNavigatorBundle.getString( | |
"slowStartup.helpButton.accesskey" | |
), | |
callback() { | |
win.openTrustedLinkIn( | |
"https://support.mozilla.org/kb/reset-firefox-easily-fix-most-problems", | |
"tab" | |
); | |
}, | |
}, | |
{ | |
label: win.gNavigatorBundle.getString( | |
"slowStartup.disableNotificationButton.label" | |
), | |
accessKey: win.gNavigatorBundle.getString( | |
"slowStartup.disableNotificationButton.accesskey" | |
), | |
callback() { | |
Services.prefs.setBoolPref( | |
"browser.slowStartup.notificationDisabled", | |
true | |
); | |
}, | |
}, | |
]; | |
win.gNotificationBox.appendNotification( | |
message, | |
"slow-startup", | |
"chrome://browser/skin/slowStartup-16.png", | |
win.gNotificationBox.PRIORITY_INFO_LOW, | |
buttons | |
); | |
}, | |
/** | |
* Show a notification bar offering a reset. | |
* | |
* @param reason | |
* String of either "unused" or "uninstall", specifying the reason | |
* why a profile reset is offered. | |
*/ | |
_resetProfileNotification(reason) { | |
let win = BrowserWindowTracker.getTopWindow(); | |
if (!win) { | |
return; | |
} | |
const { ResetProfile } = ChromeUtils.import( | |
"resource://gre/modules/ResetProfile.jsm" | |
); | |
if (!ResetProfile.resetSupported()) { | |
return; | |
} | |
let productName = gBrandBundle.GetStringFromName("brandShortName"); | |
let resetBundle = Services.strings.createBundle( | |
"chrome://global/locale/resetProfile.properties" | |
); | |
let message; | |
if (reason == "unused") { | |
message = resetBundle.formatStringFromName("resetUnusedProfile.message", [ | |
productName, | |
]); | |
} else if (reason == "uninstall") { | |
message = resetBundle.formatStringFromName("resetUninstalled.message", [ | |
productName, | |
]); | |
} else { | |
throw new Error( | |
`Unknown reason (${reason}) given to _resetProfileNotification.` | |
); | |
} | |
let buttons = [ | |
{ | |
label: resetBundle.formatStringFromName( | |
"refreshProfile.resetButton.label", | |
[productName] | |
), | |
accessKey: resetBundle.GetStringFromName( | |
"refreshProfile.resetButton.accesskey" | |
), | |
callback() { | |
ResetProfile.openConfirmationDialog(win); | |
}, | |
}, | |
]; | |
win.gNotificationBox.appendNotification( | |
message, | |
"reset-profile-notification", | |
"chrome://global/skin/icons/question-16.png", | |
win.gNotificationBox.PRIORITY_INFO_LOW, | |
buttons | |
); | |
}, | |
_notifyUnsignedAddonsDisabled() { | |
let win = BrowserWindowTracker.getTopWindow(); | |
if (!win) { | |
return; | |
} | |
let message = win.gNavigatorBundle.getString( | |
"unsignedAddonsDisabled.message" | |
); | |
let buttons = [ | |
{ | |
label: win.gNavigatorBundle.getString( | |
"unsignedAddonsDisabled.learnMore.label" | |
), | |
accessKey: win.gNavigatorBundle.getString( | |
"unsignedAddonsDisabled.learnMore.accesskey" | |
), | |
callback() { | |
win.BrowserOpenAddonsMgr("addons://list/extension?unsigned=true"); | |
}, | |
}, | |
]; | |
win.gHighPriorityNotificationBox.appendNotification( | |
message, | |
"unsigned-addons-disabled", | |
"", | |
win.gHighPriorityNotificationBox.PRIORITY_WARNING_MEDIUM, | |
buttons | |
); | |
}, | |
_firstWindowTelemetry(aWindow) { | |
let scaling = aWindow.devicePixelRatio * 100; | |
try { | |
Services.telemetry.getHistogramById("DISPLAY_SCALING").add(scaling); | |
} catch (ex) {} | |
}, | |
_collectStartupConditionsTelemetry() { | |
let nowSeconds = Math.round(Date.now() / 1000); | |
// Don't include cases where we don't have the pref. This rules out the first install | |
// as well as the first run of a build since this was introduced. These could by some | |
// definitions be referred to as "cold" startups, but probably not since we likely | |
// just wrote many of the files we use to disk. This way we should approximate a lower | |
// bound to the number of cold startups rather than an upper bound. | |
let lastCheckSeconds = Services.prefs.getIntPref( | |
"browser.startup.lastColdStartupCheck", | |
nowSeconds | |
); | |
Services.prefs.setIntPref( | |
"browser.startup.lastColdStartupCheck", | |
nowSeconds | |
); | |
try { | |
let secondsSinceLastOSRestart = | |
Services.startup.secondsSinceLastOSRestart; | |
let isColdStartup = | |
nowSeconds - secondsSinceLastOSRestart > lastCheckSeconds; | |
Services.telemetry.scalarSet("startup.is_cold", isColdStartup); | |
} catch (ex) { | |
Cu.reportError(ex); | |
} | |
}, | |
// the first browser window has finished initializing | |
_onFirstWindowLoaded: function BG__onFirstWindowLoaded(aWindow) { | |
TabCrashHandler.init(); | |
ProcessHangMonitor.init(); | |
// A channel for "remote troubleshooting" code... | |
let channel = new WebChannel( | |
"remote-troubleshooting", | |
"remote-troubleshooting" | |
); | |
channel.listen((id, data, target) => { | |
if (data.command == "request") { | |
let { Troubleshoot } = ChromeUtils.import( | |
"resource://gre/modules/Troubleshoot.jsm" | |
); | |
Troubleshoot.snapshot(snapshotData => { | |
// for privacy we remove crash IDs and all preferences (but bug 1091944 | |
// exists to expose prefs once we are confident of privacy implications) | |
delete snapshotData.crashes; | |
delete snapshotData.modifiedPreferences; | |
channel.send(snapshotData, target); | |
}); | |
} | |
}); | |
this._trackSlowStartup(); | |
// Offer to reset a user's profile if it hasn't been used for 60 days. | |
const OFFER_PROFILE_RESET_INTERVAL_MS = 60 * 24 * 60 * 60 * 1000; | |
let lastUse = Services.appinfo.replacedLockTime; | |
let disableResetPrompt = Services.prefs.getBoolPref( | |
"browser.disableResetPrompt", | |
false | |
); | |
if ( | |
!disableResetPrompt && | |
lastUse && | |
Date.now() - lastUse >= OFFER_PROFILE_RESET_INTERVAL_MS | |
) { | |
this._resetProfileNotification("unused"); | |
} else if (AppConstants.platform == "win" && !disableResetPrompt) { | |
// Check if we were just re-installed and offer Firefox Reset | |
let updateChannel; | |
try { | |
updateChannel = ChromeUtils.import( | |
"resource://gre/modules/UpdateUtils.jsm", | |
{} | |
).UpdateUtils.UpdateChannel; | |
} catch (ex) {} | |
if (updateChannel) { | |
let uninstalledValue = WindowsRegistry.readRegKey( | |
Ci.nsIWindowsRegKey.ROOT_KEY_CURRENT_USER, | |
"Software\\Mozilla\\Firefox", | |
`Uninstalled-${updateChannel}` | |
); | |
let removalSuccessful = WindowsRegistry.removeRegKey( | |
Ci.nsIWindowsRegKey.ROOT_KEY_CURRENT_USER, | |
"Software\\Mozilla\\Firefox", | |
`Uninstalled-${updateChannel}` | |
); | |
if (removalSuccessful && uninstalledValue == "True") { | |
this._resetProfileNotification("uninstall"); | |
} | |
} | |
} | |
this._checkForOldBuildUpdates(); | |
// Check if Sync is configured | |
if (Services.prefs.prefHasUserValue("services.sync.username")) { | |
WeaveService.init(); | |
} | |
PageThumbs.init(); | |
NewTabUtils.init(); | |
AboutPrivateBrowsingHandler.init(); | |
AboutProtectionsHandler.init(); | |
PageActions.init(); | |
this._firstWindowTelemetry(aWindow); | |
this._firstWindowLoaded(); | |
this._collectStartupConditionsTelemetry(); | |
// Set the default favicon size for UI views that use the page-icon protocol. | |
PlacesUtils.favicons.setDefaultIconURIPreferredSize( | |
16 * aWindow.devicePixelRatio | |
); | |
this._setPrefExpectationsAndUpdate(); | |
this._matchCBCategory(); | |
// This observes the entire privacy.trackingprotection.* pref tree. | |
Services.prefs.addObserver( | |
"privacy.trackingprotection", | |
this._matchCBCategory | |
); | |
Services.prefs.addObserver( | |
"network.cookie.cookieBehavior", | |
this._matchCBCategory | |
); | |
Services.prefs.addObserver( | |
ContentBlockingCategoriesPrefs.PREF_CB_CATEGORY, | |
this._updateCBCategory | |
); | |
Services.prefs.addObserver( | |
"media.autoplay.default", | |
this._updateAutoplayPref | |
); | |
Services.prefs.addObserver( | |
"privacy.trackingprotection", | |
this._setPrefExpectations | |
); | |
Services.prefs.addObserver( | |
"browser.contentblocking.features.strict", | |
this._setPrefExpectationsAndUpdate | |
); | |
}, | |
_updateAutoplayPref() { | |
const blocked = Services.prefs.getIntPref("media.autoplay.default", 1); | |
const telemetry = Services.telemetry.getHistogramById( | |
"AUTOPLAY_DEFAULT_SETTING_CHANGE" | |
); | |
const labels = { 0: "allow", 1: "blockAudible", 5: "blockAll" }; | |
if (blocked in labels) { | |
telemetry.add(labels[blocked]); | |
} | |
}, | |
_setPrefExpectations() { | |
ContentBlockingCategoriesPrefs.setPrefExpectations(); | |
}, | |
_setPrefExpectationsAndUpdate() { | |
ContentBlockingCategoriesPrefs.setPrefExpectations(); | |
ContentBlockingCategoriesPrefs.updateCBCategory(); | |
}, | |
_matchCBCategory() { | |
ContentBlockingCategoriesPrefs.matchCBCategory(); | |
}, | |
_updateCBCategory() { | |
ContentBlockingCategoriesPrefs.updateCBCategory(); | |
}, | |
_recordContentBlockingTelemetry() { | |
Services.telemetry.setEventRecordingEnabled( | |
"security.ui.protectionspopup", | |
Services.prefs.getBoolPref( | |
"security.protectionspopup.recordEventTelemetry" | |
) | |
); | |
Services.telemetry.setEventRecordingEnabled( | |
"security.ui.app_menu", | |
Services.prefs.getBoolPref("security.app_menu.recordEventTelemetry") | |
); | |
let tpEnabled = Services.prefs.getBoolPref( | |
"privacy.trackingprotection.enabled" | |
); | |
Services.telemetry | |
.getHistogramById("TRACKING_PROTECTION_ENABLED") | |
.add(tpEnabled); | |
let tpPBDisabled = Services.prefs.getBoolPref( | |
"privacy.trackingprotection.pbmode.enabled" | |
); | |
Services.telemetry | |
.getHistogramById("TRACKING_PROTECTION_PBM_DISABLED") | |
.add(!tpPBDisabled); | |
let cookieBehavior = Services.prefs.getIntPref( | |
"network.cookie.cookieBehavior" | |
); | |
Services.telemetry.getHistogramById("COOKIE_BEHAVIOR").add(cookieBehavior); | |
let fpEnabled = Services.prefs.getBoolPref( | |
"privacy.trackingprotection.fingerprinting.enabled" | |
); | |
let cmEnabled = Services.prefs.getBoolPref( | |
"privacy.trackingprotection.cryptomining.enabled" | |
); | |
let categoryPref; | |
switch ( | |
Services.prefs.getStringPref("browser.contentblocking.category", null) | |
) { | |
case "standard": | |
categoryPref = 0; | |
break; | |
case "strict": | |
categoryPref = 1; | |
break; | |
case "custom": | |
categoryPref = 2; | |
break; | |
default: | |
// Any other value is unsupported. | |
categoryPref = 3; | |
break; | |
} | |
Services.telemetry.scalarSet( | |
"contentblocking.fingerprinting_blocking_enabled", | |
fpEnabled | |
); | |
Services.telemetry.scalarSet( | |
"contentblocking.cryptomining_blocking_enabled", | |
cmEnabled | |
); | |
Services.telemetry.scalarSet("contentblocking.category", categoryPref); | |
}, | |
_recordDataSanitizationPrefs() { | |
Services.telemetry.scalarSet( | |
"datasanitization.network_cookie_lifetimePolicy", | |
Services.prefs.getIntPref("network.cookie.lifetimePolicy") | |
); | |
Services.telemetry.scalarSet( | |
"datasanitization.privacy_sanitize_sanitizeOnShutdown", | |
Services.prefs.getBoolPref("privacy.sanitize.sanitizeOnShutdown") | |
); | |
Services.telemetry.scalarSet( | |
"datasanitization.privacy_clearOnShutdown_cookies", | |
Services.prefs.getBoolPref("privacy.clearOnShutdown.cookies") | |
); | |
Services.telemetry.scalarSet( | |
"datasanitization.privacy_clearOnShutdown_history", | |
Services.prefs.getBoolPref("privacy.clearOnShutdown.history") | |
); | |
Services.telemetry.scalarSet( | |
"datasanitization.privacy_clearOnShutdown_formdata", | |
Services.prefs.getBoolPref("privacy.clearOnShutdown.formdata") | |
); | |
Services.telemetry.scalarSet( | |
"datasanitization.privacy_clearOnShutdown_downloads", | |
Services.prefs.getBoolPref("privacy.clearOnShutdown.downloads") | |
); | |
Services.telemetry.scalarSet( | |
"datasanitization.privacy_clearOnShutdown_cache", | |
Services.prefs.getBoolPref("privacy.clearOnShutdown.cache") | |
); | |
Services.telemetry.scalarSet( | |
"datasanitization.privacy_clearOnShutdown_sessions", | |
Services.prefs.getBoolPref("privacy.clearOnShutdown.sessions") | |
); | |
Services.telemetry.scalarSet( | |
"datasanitization.privacy_clearOnShutdown_offlineApps", | |
Services.prefs.getBoolPref("privacy.clearOnShutdown.offlineApps") | |
); | |
Services.telemetry.scalarSet( | |
"datasanitization.privacy_clearOnShutdown_siteSettings", | |
Services.prefs.getBoolPref("privacy.clearOnShutdown.siteSettings") | |
); | |
Services.telemetry.scalarSet( | |
"datasanitization.privacy_clearOnShutdown_openWindows", | |
Services.prefs.getBoolPref("privacy.clearOnShutdown.openWindows") | |
); | |
let exceptions = 0; | |
for (let permission of Services.perms.all) { | |
let uri = permission.principal.URI; | |
// We consider just permissions set for http, https and file URLs. | |
if ( | |
permission.type == "cookie" && | |
permission.capability == Ci.nsICookiePermission.ACCESS_SESSION && | |
(uri.scheme == "http" || uri.scheme == "https" || uri.scheme == "file") | |
) { | |
exceptions++; | |
} | |
} | |
Services.telemetry.scalarSet( | |
"datasanitization.session_permission_exceptions", | |
exceptions | |
); | |
}, | |
_sendMediaTelemetry() { | |
let win = Services.wm.getMostRecentWindow("navigator:browser"); | |
if (win) { | |
let v = win.document.createElementNS( | |
"http://www.w3.org/1999/xhtml", | |
"video" | |
); | |
v.reportCanPlayTelemetry(); | |
} | |
}, | |
/** | |
* Application shutdown handler. | |
*/ | |
_onQuitApplicationGranted() { | |
// This pref must be set here because SessionStore will use its value | |
// on quit-application. | |
this._setPrefToSaveSession(); | |
// Call trackStartupCrashEnd here in case the delayed call on startup hasn't | |
// yet occurred (see trackStartupCrashEnd caller in browser.js). | |
try { | |
Services.startup.trackStartupCrashEnd(); | |
} catch (e) { | |
Cu.reportError( | |
"Could not end startup crash tracking in quit-application-granted: " + e | |
); | |
} | |
if (this._bookmarksBackupIdleTime) { | |
this._idleService.removeIdleObserver(this, this._bookmarksBackupIdleTime); | |
delete this._bookmarksBackupIdleTime; | |
} | |
for (let mod of Object.values(initializedModules)) { | |
if (mod.uninit) { | |
mod.uninit(); | |
} | |
} | |
BrowserUsageTelemetry.uninit(); | |
SearchTelemetry.uninit(); | |
PageThumbs.uninit(); | |
NewTabUtils.uninit(); | |
AboutPrivateBrowsingHandler.uninit(); | |
AboutProtectionsHandler.uninit(); | |
Normandy.uninit(); | |
RFPHelper.uninit(); | |
}, | |
// Set up a listener to enable/disable the screenshots extension | |
// based on its preference. | |
_monitorScreenshotsPref() { | |
const PREF = "extensions.screenshots.disabled"; | |
const ID = "screenshots@mozilla.org"; | |
const _checkScreenshotsPref = async () => { | |
let addon = await AddonManager.getAddonByID(ID); | |
let disabled = Services.prefs.getBoolPref(PREF, false); | |
if (disabled) { | |
await addon.disable({ allowSystemAddons: true }); | |
} else { | |
await addon.enable({ allowSystemAddons: true }); | |
} | |
}; | |
Services.prefs.addObserver(PREF, _checkScreenshotsPref); | |
_checkScreenshotsPref(); | |
}, | |
_monitorWebcompatReporterPref() { | |
const PREF = "extensions.webcompat-reporter.enabled"; | |
const ID = "webcompat-reporter@mozilla.org"; | |
Services.prefs.addObserver(PREF, async () => { | |
let addon = await AddonManager.getAddonByID(ID); | |
let enabled = Services.prefs.getBoolPref(PREF, false); | |
if (enabled && !addon.isActive) { | |
await addon.enable({ allowSystemAddons: true }); | |
} else if (!enabled && addon.isActive) { | |
await addon.disable({ allowSystemAddons: true }); | |
} | |
}); | |
}, | |
_showNewInstallModal() { | |
// Allow other observers of the same topic to run while we open the dialog. | |
Services.tm.dispatchToMainThread(() => { | |
let win = BrowserWindowTracker.getTopWindow(); | |
let stack = win.gBrowser.getPanel().querySelector(".browserStack"); | |
let mask = win.document.createElementNS(XULNS, "box"); | |
mask.setAttribute("id", "content-mask"); | |
stack.appendChild(mask); | |
Services.ww.openWindow( | |
win, | |
"chrome://browser/content/newInstall.xhtml", | |
"_blank", | |
"chrome,modal,resizable=no,centerscreen", | |
null | |
); | |
mask.remove(); | |
}); | |
}, | |
// All initial windows have opened. | |
_onWindowsRestored: function BG__onWindowsRestored() { | |
if (this._windowsWereRestored) { | |
return; | |
} | |
this._windowsWereRestored = true; | |
BrowserUsageTelemetry.init(); | |
SearchTelemetry.init(); | |
ExtensionsUI.init(); | |
let signingRequired; | |
if (AppConstants.MOZ_REQUIRE_SIGNING) { | |
signingRequired = true; | |
} else { | |
signingRequired = Services.prefs.getBoolPref( | |
"xpinstall.signatures.required" | |
); | |
} | |
if (signingRequired) { | |
let disabledAddons = AddonManager.getStartupChanges( | |
AddonManager.STARTUP_CHANGE_DISABLED | |
); | |
AddonManager.getAddonsByIDs(disabledAddons).then(addons => { | |
for (let addon of addons) { | |
if (addon.signedState <= AddonManager.SIGNEDSTATE_MISSING) { | |
this._notifyUnsignedAddonsDisabled(); | |
break; | |
} | |
} | |
}); | |
} | |
if (AppConstants.MOZ_CRASHREPORTER) { | |
UnsubmittedCrashHandler.init(); | |
UnsubmittedCrashHandler.scheduleCheckForUnsubmittedCrashReports(); | |
} | |
if (AppConstants.ASAN_REPORTER) { | |
var { AsanReporter } = ChromeUtils.import( | |
"resource:///modules/AsanReporter.jsm" | |
); | |
AsanReporter.init(); | |
} | |
Sanitizer.onStartup(); | |
this._scheduleStartupIdleTasks(); | |
this._lateTasksIdleObserver = (idleService, topic, data) => { | |
if (topic == "idle") { | |
idleService.removeIdleObserver( | |
this._lateTasksIdleObserver, | |
LATE_TASKS_IDLE_TIME_SEC | |
); | |
delete this._lateTasksIdleObserver; | |
this._scheduleArbitrarilyLateIdleTasks(); | |
} | |
}; | |
this._idleService.addIdleObserver( | |
this._lateTasksIdleObserver, | |
LATE_TASKS_IDLE_TIME_SEC | |
); | |
this._monitorScreenshotsPref(); | |
this._monitorWebcompatReporterPref(); | |
let pService = Cc["@mozilla.org/toolkit/profile-service;1"].getService( | |
Ci.nsIToolkitProfileService | |
); | |
if (pService.createdAlternateProfile) { | |
this._showNewInstallModal(); | |
} | |
FirefoxMonitor.init(); | |
}, | |
/** | |
* Use this function as an entry point to schedule tasks that | |
* need to run only once after startup, and can be scheduled | |
* by using an idle callback. | |
* | |
* The functions scheduled here will fire from idle callbacks | |
* once every window has finished being restored by session | |
* restore, and it's guaranteed that they will run before | |
* the equivalent per-window idle tasks | |
* (from _schedulePerWindowIdleTasks in browser.js). | |
* | |
* If you have something that can wait even further than the | |
* per-window initialization, please schedule them using | |
* _scheduleArbitrarilyLateIdleTasks. | |
* Don't be fooled by thinking that the use of the timeout parameter | |
* will delay your function: it will just ensure that it potentially | |
* happens _earlier_ than expected (when the timeout limit has been reached), | |
* but it will not make it happen later (and out of order) compared | |
* to the other ones scheduled together. | |
*/ | |
_scheduleStartupIdleTasks() { | |
const idleTasks = [ | |
// It's important that SafeBrowsing is initialized reasonably | |
// early, so we use a maximum timeout for it. | |
{ | |
task: () => { | |
SafeBrowsing.init(); | |
}, | |
timeout: 5000, | |
}, | |
{ | |
task: async () => { | |
await ContextualIdentityService.load(); | |
Discovery.update(); | |
}, | |
}, | |
// Begin listening for incoming push messages. | |
{ | |
task: () => { | |
try { | |
PushService.wrappedJSObject.ensureReady(); | |
} catch (ex) { | |
// NS_ERROR_NOT_AVAILABLE will get thrown for the PushService | |
// getter if the PushService is disabled. | |
if (ex.result != Cr.NS_ERROR_NOT_AVAILABLE) { | |
throw ex; | |
} | |
} | |
}, | |
}, | |
{ | |
task: () => { | |
this._recordContentBlockingTelemetry(); | |
}, | |
}, | |
{ | |
task: () => { | |
this._recordDataSanitizationPrefs(); | |
}, | |
}, | |
{ | |
task: () => { | |
let siteSpecific = Services.prefs.getBoolPref( | |
"browser.zoom.siteSpecific", | |
false | |
); | |
Services.telemetry.scalarSet("a11y.sitezoom", siteSpecific); | |
}, | |
}, | |
// Load the Login Manager data from disk off the main thread, some time | |
// after startup. If the data is required before this runs, for example | |
// because a restored page contains a password field, it will be loaded on | |
// the main thread, and this initialization request will be ignored. | |
{ | |
task: () => { | |
try { | |
Services.logins; | |
} catch (ex) { | |
Cu.reportError(ex); | |
} | |
}, | |
timeout: 3000, | |
}, | |
// Add breach alerts pref observer reasonably early so the pref flip works | |
{ | |
task: () => { | |
this._addBreachAlertsPrefObserver(); | |
}, | |
}, | |
{ | |
condition: AppConstants.platform == "win", | |
task: () => { | |
// For Windows 7, initialize the jump list module. | |
const WINTASKBAR_CONTRACTID = "@mozilla.org/windows-taskbar;1"; | |
if ( | |
WINTASKBAR_CONTRACTID in Cc && | |
Cc[WINTASKBAR_CONTRACTID].getService(Ci.nsIWinTaskbar).available | |
) { | |
let temp = {}; | |
ChromeUtils.import( | |
"resource:///modules/WindowsJumpLists.jsm", | |
temp | |
); | |
temp.WinTaskbarJumpList.startup(); | |
} | |
}, | |
}, | |
{ | |
task: () => { | |
this._checkForDefaultBrowser(); | |
}, | |
}, | |
{ | |
task: () => { | |
let { setTimeout } = ChromeUtils.import( | |
"resource://gre/modules/Timer.jsm" | |
); | |
setTimeout(function() { | |
Services.tm.idleDispatchToMainThread( | |
Services.startup.trackStartupCrashEnd | |
); | |
}, STARTUP_CRASHES_END_DELAY_MS); | |
}, | |
}, | |
{ | |
task: () => { | |
let handlerService = Cc[ | |
"@mozilla.org/uriloader/handler-service;1" | |
].getService(Ci.nsIHandlerService); | |
handlerService.asyncInit(); | |
}, | |
}, | |
{ | |
condition: AppConstants.platform == "win", | |
task: () => { | |
JawsScreenReaderVersionCheck.onWindowsRestored(); | |
}, | |
}, | |
{ | |
task: () => { | |
RFPHelper.init(); | |
}, | |
}, | |
{ | |
task: () => { | |
Blocklist.loadBlocklistAsync(); | |
}, | |
}, | |
{ | |
condition: | |
Services.prefs.getIntPref( | |
"browser.livebookmarks.migrationAttemptsLeft", | |
0 | |
) > 0, | |
task: () => { | |
LiveBookmarkMigrator.migrate().catch(Cu.reportError); | |
}, | |
}, | |
{ | |
task: () => { | |
TabUnloader.init(); | |
}, | |
}, | |
{ | |
condition: Services.prefs.getBoolPref("corroborator.enabled", false), | |
task: () => { | |
Corroborate.init().catch(Cu.reportError); | |
}, | |
}, | |
// request startup of Chromium remote debugging protocol | |
// (observer will only be notified when --remote-debugger is passed) | |
{ | |
condition: AppConstants.ENABLE_REMOTE_AGENT, | |
task: () => { | |
Services.obs.notifyObservers(null, "remote-startup-requested"); | |
}, | |
}, | |
// Marionette needs to be initialized as very last step | |
{ | |
task: () => { | |
Services.obs.notifyObservers(null, "marionette-startup-requested"); | |
}, | |
}, | |
]; | |
for (let task of idleTasks) { | |
if ("condition" in task && !task.condition) { | |
continue; | |
} | |
ChromeUtils.idleDispatch( | |
() => { | |
if (!Services.startup.shuttingDown) { | |
Services.profiler.AddMarker("startupIdleTask"); | |
try { | |
task.task(); | |
} catch (ex) { | |
Cu.reportError(ex); | |
} | |
} | |
}, | |
task.timeout ? { timeout: task.timeout } : undefined | |
); | |
} | |
}, | |
/** | |
* Use this function as an entry point to schedule tasks that need | |
* to run once per session, at any arbitrary point in time. | |
* This function will be called from an idle observer. Check the value of | |
* LATE_TASKS_IDLE_TIME_SEC to see the current value for this idle | |
* observer. | |
* | |
* Note: this function may never be called if the user is never idle for the | |
* full length of the period of time specified. But given a reasonably low | |
* value, this is unlikely. | |
*/ | |
_scheduleArbitrarilyLateIdleTasks() { | |
const idleTasks = [ | |
() => { | |
this._sendMediaTelemetry(); | |
}, | |
() => { | |
// Telemetry for master-password - we do this after a delay as it | |
// can cause IO if NSS/PSM has not already initialized. | |
let tokenDB = Cc["@mozilla.org/security/pk11tokendb;1"].getService( | |
Ci.nsIPK11TokenDB | |
); | |
let token = tokenDB.getInternalKeyToken(); | |
let mpEnabled = token.hasPassword; | |
if (mpEnabled) { | |
Services.telemetry | |
.getHistogramById("MASTER_PASSWORD_ENABLED") | |
.add(mpEnabled); | |
} | |
}, | |
() => { | |
let obj = {}; | |
ChromeUtils.import("resource://gre/modules/GMPInstallManager.jsm", obj); | |
this._gmpInstallManager = new obj.GMPInstallManager(); | |
// We don't really care about the results, if someone is interested they | |
// can check the log. | |
this._gmpInstallManager.simpleCheckAndInstall().catch(() => {}); | |
}, | |
() => { | |
RemoteSettings.init(); | |
this._addBreachesSyncHandler(); | |
}, | |
() => { | |
PublicSuffixList.init(); | |
}, | |
() => { | |
RemoteSecuritySettings.init(); | |
}, | |
]; | |
for (let task of idleTasks) { | |
ChromeUtils.idleDispatch(() => { | |
if (!Services.startup.shuttingDown) { | |
Services.profiler.AddMarker("startupLateIdleTask"); | |
try { | |
task(); | |
} catch (ex) { | |
Cu.reportError(ex); | |
} | |
} | |
}); | |
} | |
}, | |
_addBreachesSyncHandler() { | |
if ( | |
Services.prefs.getBoolPref( | |
"signon.management.page.breach-alerts.enabled", | |
false | |
) | |
) { | |
RemoteSettings(LoginBreaches.REMOTE_SETTINGS_COLLECTION).on( | |
"sync", | |
async event => { | |
await LoginBreaches.update(event.data.current); | |
} | |
); | |
} | |
}, | |
_addBreachAlertsPrefObserver() { | |
const BREACH_ALERTS_PREF = "signon.management.page.breach-alerts.enabled"; | |
const clearVulnerablePasswordsIfBreachAlertsDisabled = async function() { | |
if (!Services.prefs.getBoolPref(BREACH_ALERTS_PREF)) { | |
await LoginBreaches.clearAllPotentiallyVulnerablePasswords(); | |
} | |
}; | |
clearVulnerablePasswordsIfBreachAlertsDisabled(); | |
Services.prefs.addObserver( | |
BREACH_ALERTS_PREF, | |
clearVulnerablePasswordsIfBreachAlertsDisabled | |
); | |
}, | |
_onQuitRequest: function BG__onQuitRequest(aCancelQuit, aQuitType) { | |
// If user has already dismissed quit request, then do nothing | |
if (aCancelQuit instanceof Ci.nsISupportsPRBool && aCancelQuit.data) { | |
return; | |
} | |
// There are several cases where we won't show a dialog here: | |
// 1. There is only 1 tab open in 1 window | |
// 2. browser.warnOnQuit == false | |
// 3. The browser is currently in Private Browsing mode | |
// 4. The browser will be restarted. | |
// 5. The user has automatic session restore enabled and | |
// browser.sessionstore.warnOnQuit is not set to true. | |
// 6. The user doesn't have automatic session restore enabled | |
// and browser.tabs.warnOnClose is not set to true. | |
// | |
// Otherwise, we will show the "closing multiple tabs" dialog. | |
// | |
// aQuitType == "lastwindow" is overloaded. "lastwindow" is used to indicate | |
// "the last window is closing but we're not quitting (a non-browser window is open)" | |
// and also "we're quitting by closing the last window". | |
if (aQuitType == "restart" || aQuitType == "os-restart") { | |
return; | |
} | |
var windowcount = 0; | |
var pagecount = 0; | |
for (let win of BrowserWindowTracker.orderedWindows) { | |
if (win.closed) { | |
continue; | |
} | |
windowcount++; | |
let tabbrowser = win.gBrowser; | |
if (tabbrowser) { | |
pagecount += | |
tabbrowser.browsers.length - | |
tabbrowser._numPinnedTabs - | |
tabbrowser._removingTabs.length; | |
} | |
} | |
if (pagecount < 2) { | |
return; | |
} | |
if (!aQuitType) { | |
aQuitType = "quit"; | |
} | |
// browser.warnOnQuit is a hidden global boolean to override all quit prompts | |
if (!Services.prefs.getBoolPref("browser.warnOnQuit")) { | |
return; | |
} | |
// If we're going to automatically restore the session, only warn if the user asked for that. | |
let sessionWillBeRestored = | |
Services.prefs.getIntPref("browser.startup.page") == 3 || | |
Services.prefs.getBoolPref("browser.sessionstore.resume_session_once"); | |
// In the sessionWillBeRestored case, we only check the sessionstore-specific pref: | |
if (sessionWillBeRestored) { | |
if ( | |
!Services.prefs.getBoolPref("browser.sessionstore.warnOnQuit", false) | |
) { | |
return; | |
} | |
// Otherwise, we check browser.tabs.warnOnClose | |
} else if (!Services.prefs.getBoolPref("browser.tabs.warnOnClose")) { | |
return; | |
} | |
let win = BrowserWindowTracker.getTopWindow(); | |
let warningMessage; | |
// More than 1 window. Compose our own message. | |
if (windowcount > 1) { | |
let tabSubstring = gTabbrowserBundle.GetStringFromName( | |
"tabs.closeWarningMultipleWindowsTabSnippet" | |
); | |
tabSubstring = PluralForm.get(pagecount, tabSubstring).replace( | |
/#1/, | |
pagecount | |
); | |
let stringID = sessionWillBeRestored | |
? "tabs.closeWarningMultipleWindowsSessionRestore2" | |
: "tabs.closeWarningMultipleWindows"; | |
let windowString = gTabbrowserBundle.GetStringFromName(stringID); | |
windowString = PluralForm.get(windowcount, windowString).replace( | |
/#1/, | |
windowcount | |
); | |
warningMessage = windowString.replace(/%(?:1\$)?S/i, tabSubstring); | |
} else { | |
let stringID = sessionWillBeRestored | |
? "tabs.closeWarningMultipleSessionRestore2" | |
: "tabs.closeWarningMultiple"; | |
warningMessage = gTabbrowserBundle.GetStringFromName(stringID); | |
warningMessage = PluralForm.get(pagecount, warningMessage).replace( | |
"#1", | |
pagecount | |
); | |
} | |
let warnOnClose = { value: true }; | |
let titleId = | |
AppConstants.platform == "win" | |
? "tabs.closeAndQuitTitleTabsWin" | |
: "tabs.closeAndQuitTitleTabs"; | |
let flags = | |
Services.prompt.BUTTON_TITLE_IS_STRING * Services.prompt.BUTTON_POS_0 + | |
Services.prompt.BUTTON_TITLE_CANCEL * Services.prompt.BUTTON_POS_1; | |
// Only display the checkbox in the non-sessionrestore case. | |
let checkboxLabel = !sessionWillBeRestored | |
? gTabbrowserBundle.GetStringFromName("tabs.closeWarningPromptMe") | |
: null; | |
// buttonPressed will be 0 for closing, 1 for cancel (don't close/quit) | |
let buttonPressed = Services.prompt.confirmEx( | |
win, | |
gTabbrowserBundle.GetStringFromName(titleId), | |
warningMessage, | |
flags, | |
gTabbrowserBundle.GetStringFromName("tabs.closeButtonMultiple"), | |
null, | |
null, | |
checkboxLabel, | |
warnOnClose | |
); | |
// If the user has unticked the box, and has confirmed closing, stop showing | |
// the warning. | |
if (!sessionWillBeRestored && buttonPressed == 0 && !warnOnClose.value) { | |
Services.prefs.setBoolPref("browser.tabs.warnOnClose", false); | |
} | |
aCancelQuit.data = buttonPressed != 0; | |
}, | |
/** | |
* Initialize Places | |
* - imports the bookmarks html file if bookmarks database is empty, try to | |
* restore bookmarks from a JSON backup if the backend indicates that the | |
* database was corrupt. | |
* | |
* These prefs can be set up by the frontend: | |
* | |
* WARNING: setting these preferences to true will overwite existing bookmarks | |
* | |
* - browser.places.importBookmarksHTML | |
* Set to true will import the bookmarks.html file from the profile folder. | |
* - browser.bookmarks.restore_default_bookmarks | |
* Set to true by safe-mode dialog to indicate we must restore default | |
* bookmarks. | |
*/ | |
_initPlaces: function BG__initPlaces(aInitialMigrationPerformed) { | |
// We must instantiate the history service since it will tell us if we | |
// need to import or restore bookmarks due to first-run, corruption or | |
// forced migration (due to a major schema change). | |
// If the database is corrupt or has been newly created we should | |
// import bookmarks. | |
let dbStatus = PlacesUtils.history.databaseStatus; | |
// Show a notification with a "more info" link for a locked places.sqlite. | |
if (dbStatus == PlacesUtils.history.DATABASE_STATUS_LOCKED) { | |
// Note: initPlaces should always happen when the first window is ready, | |
// in any case, better safe than sorry. | |
this._firstWindowReady.then(() => { | |
this._showPlacesLockedNotificationBox(); | |
this._placesBrowserInitComplete = true; | |
Services.obs.notifyObservers(null, "places-browser-init-complete"); | |
}); | |
return; | |
} | |
let importBookmarks = | |
!aInitialMigrationPerformed && | |
(dbStatus == PlacesUtils.history.DATABASE_STATUS_CREATE || | |
dbStatus == PlacesUtils.history.DATABASE_STATUS_CORRUPT); | |
// Check if user or an extension has required to import bookmarks.html | |
let importBookmarksHTML = false; | |
try { | |
importBookmarksHTML = Services.prefs.getBoolPref( | |
"browser.places.importBookmarksHTML" | |
); | |
if (importBookmarksHTML) { | |
importBookmarks = true; | |
} | |
} catch (ex) {} | |
// Support legacy bookmarks.html format for apps that depend on that format. | |
let autoExportHTML = Services.prefs.getBoolPref( | |
"browser.bookmarks.autoExportHTML", | |
false | |
); // Do not export. | |
if (autoExportHTML) { | |
// Sqlite.jsm and Places shutdown happen at profile-before-change, thus, | |
// to be on the safe side, this should run earlier. | |
AsyncShutdown.profileChangeTeardown.addBlocker( | |
"Places: export bookmarks.html", | |
() => BookmarkHTMLUtils.exportToFile(BookmarkHTMLUtils.defaultPath) | |
); | |
} | |
(async () => { | |
// Check if Safe Mode or the user has required to restore bookmarks from | |
// default profile's bookmarks.html | |
let restoreDefaultBookmarks = false; | |
try { | |
restoreDefaultBookmarks = Services.prefs.getBoolPref( | |
"browser.bookmarks.restore_default_bookmarks" | |
); | |
if (restoreDefaultBookmarks) { | |
// Ensure that we already have a bookmarks backup for today. | |
await this._backupBookmarks(); | |
importBookmarks = true; | |
} | |
} catch (ex) {} | |
// This may be reused later, check for "=== undefined" to see if it has | |
// been populated already. | |
let lastBackupFile; | |
// If the user did not require to restore default bookmarks, or import | |
// from bookmarks.html, we will try to restore from JSON | |
if (importBookmarks && !restoreDefaultBookmarks && !importBookmarksHTML) { | |
// get latest JSON backup | |
lastBackupFile = await PlacesBackups.getMostRecentBackup(); | |
if (lastBackupFile) { | |
// restore from JSON backup | |
await BookmarkJSONUtils.importFromFile(lastBackupFile, { | |
replace: true, | |
source: PlacesUtils.bookmarks.SOURCES.RESTORE_ON_STARTUP, | |
}); | |
importBookmarks = false; | |
} else { | |
// We have created a new database but we don't have any backup available | |
importBookmarks = true; | |
if (await OS.File.exists(BookmarkHTMLUtils.defaultPath)) { | |
// If bookmarks.html is available in current profile import it... | |
importBookmarksHTML = true; | |
} else { | |
// ...otherwise we will restore defaults | |
restoreDefaultBookmarks = true; | |
} | |
} | |
} | |
// Import default bookmarks when necessary. | |
// Otherwise, if any kind of import runs, default bookmarks creation should be | |
// delayed till the import operations has finished. Not doing so would | |
// cause them to be overwritten by the newly imported bookmarks. | |
if (!importBookmarks) { | |
// Now apply distribution customized bookmarks. | |
// This should always run after Places initialization. | |
try { | |
await this._distributionCustomizer.applyBookmarks(); | |
} catch (e) { | |
Cu.reportError(e); | |
} | |
} else { | |
// An import operation is about to run. | |
let bookmarksUrl = null; | |
if (restoreDefaultBookmarks) { | |
// User wants to restore bookmarks.html file from default profile folder | |
bookmarksUrl = "chrome://browser/locale/bookmarks.html"; | |
} else if (await OS.File.exists(BookmarkHTMLUtils.defaultPath)) { | |
bookmarksUrl = OS.Path.toFileURI(BookmarkHTMLUtils.defaultPath); | |
} | |
if (bookmarksUrl) { | |
// Import from bookmarks.html file. | |
try { | |
if (Services.policies.isAllowed("defaultBookmarks")) { | |
await BookmarkHTMLUtils.importFromURL(bookmarksUrl, { | |
replace: true, | |
source: PlacesUtils.bookmarks.SOURCES.RESTORE_ON_STARTUP, | |
}); | |
} | |
} catch (e) { | |
Cu.reportError("Bookmarks.html file could be corrupt. " + e); | |
} | |
try { | |
// Now apply distribution customized bookmarks. | |
// This should always run after Places initialization. | |
await this._distributionCustomizer.applyBookmarks(); | |
} catch (e) { | |
Cu.reportError(e); | |
} | |
} else { | |
Cu.reportError(new Error("Unable to find bookmarks.html file.")); | |
} | |
// Reset preferences, so we won't try to import again at next run | |
if (importBookmarksHTML) { | |
Services.prefs.setBoolPref( | |
"browser.places.importBookmarksHTML", | |
false | |
); | |
} | |
if (restoreDefaultBookmarks) { | |
Services.prefs.setBoolPref( | |
"browser.bookmarks.restore_default_bookmarks", | |
false | |
); | |
} | |
} | |
// Initialize bookmark archiving on idle. | |
if (!this._bookmarksBackupIdleTime) { | |
this._bookmarksBackupIdleTime = BOOKMARKS_BACKUP_IDLE_TIME_SEC; | |
// If there is no backup, or the last bookmarks backup is too old, use | |
// a more aggressive idle observer. | |
if (lastBackupFile === undefined) { | |
lastBackupFile = await PlacesBackups.getMostRecentBackup(); | |
} | |
if (!lastBackupFile) { | |
this._bookmarksBackupIdleTime /= 2; | |
} else { | |
let lastBackupTime = PlacesBackups.getDateForFile(lastBackupFile); | |
let profileLastUse = Services.appinfo.replacedLockTime || Date.now(); | |
// If there is a backup after the last profile usage date it's fine, | |
// regardless its age. Otherwise check how old is the last | |
// available backup compared to that session. | |
if (profileLastUse > lastBackupTime) { | |
let backupAge = Math.round( | |
(profileLastUse - lastBackupTime) / 86400000 | |
); | |
// Report the age of the last available backup. | |
try { | |
Services.telemetry | |
.getHistogramById("PLACES_BACKUPS_DAYSFROMLAST") | |
.add(backupAge); | |
} catch (ex) { | |
Cu.reportError(new Error("Unable to report telemetry.")); | |
} | |
if (backupAge > BOOKMARKS_BACKUP_MAX_INTERVAL_DAYS) { | |
this._bookmarksBackupIdleTime /= 2; | |
} | |
} | |
} | |
this._idleService.addIdleObserver(this, this._bookmarksBackupIdleTime); | |
} | |
if (this._isNewProfile) { | |
try { | |
// New profiles may have existing bookmarks (imported from another browser or | |
// copied into the profile) and we want to show the bookmark toolbar for them | |
// in some cases. | |
this._maybeToggleBookmarkToolbarVisibility(); | |
} catch (ex) { | |
Cu.reportError(ex); | |
} | |
} | |
})() | |
.catch(ex => { | |
Cu.reportError(ex); | |
}) | |
.then(() => { | |
// NB: deliberately after the catch so that we always do this, even if | |
// we threw halfway through initializing in the Task above. | |
this._placesBrowserInitComplete = true; | |
Services.obs.notifyObservers(null, "places-browser-init-complete"); | |
}); | |
}, | |
/** | |
* If a backup for today doesn't exist, this creates one. | |
*/ | |
_backupBookmarks: function BG__backupBookmarks() { | |
return (async function() { | |
let lastBackupFile = await PlacesBackups.getMostRecentBackup(); | |
// Should backup bookmarks if there are no backups or the maximum | |
// interval between backups elapsed. | |
if ( | |
!lastBackupFile || | |
new Date() - PlacesBackups.getDateForFile(lastBackupFile) > | |
BOOKMARKS_BACKUP_MIN_INTERVAL_DAYS * 86400000 | |
) { | |
let maxBackups = Services.prefs.getIntPref( | |
"browser.bookmarks.max_backups" | |
); | |
await PlacesBackups.create(maxBackups); | |
} | |
})(); | |
}, | |
/** | |
* Show the notificationBox for a locked places database. | |
*/ | |
_showPlacesLockedNotificationBox: function BG__showPlacesLockedNotificationBox() { | |
var applicationName = gBrandBundle.GetStringFromName("brandShortName"); | |
var placesBundle = Services.strings.createBundle( | |
"chrome://browser/locale/places/places.properties" | |
); | |
var title = placesBundle.GetStringFromName("lockPrompt.title"); | |
var text = placesBundle.formatStringFromName("lockPrompt.text", [ | |
applicationName, | |
]); | |
var buttonText = placesBundle.GetStringFromName( | |
"lockPromptInfoButton.label" | |
); | |
var accessKey = placesBundle.GetStringFromName( | |
"lockPromptInfoButton.accessKey" | |
); | |
var helpTopic = "places-locked"; | |
var url = Services.urlFormatter.formatURLPref("app.support.baseURL"); | |
url += helpTopic; | |
var win = BrowserWindowTracker.getTopWindow(); | |
var buttons = [ | |
{ | |
label: buttonText, | |
accessKey, | |
popup: null, | |
callback(aNotificationBar, aButton) { | |
win.openTrustedLinkIn(url, "tab"); | |
}, | |
}, | |
]; | |
var notifyBox = win.gBrowser.getNotificationBox(); | |
var notification = notifyBox.appendNotification( | |
text, | |
title, | |
null, | |
notifyBox.PRIORITY_CRITICAL_MEDIUM, | |
buttons | |
); | |
notification.persistence = -1; // Until user closes it | |
}, | |
_onThisDeviceConnected() { | |
let bundle = Services.strings.createBundle( | |
"chrome://browser/locale/accounts.properties" | |
); | |
let title = bundle.GetStringFromName("deviceConnDisconnTitle"); | |
let body = bundle.GetStringFromName("thisDeviceConnectedBody"); | |
let clickCallback = (subject, topic, data) => { | |
if (topic != "alertclickcallback") { | |
return; | |
} | |
this._openPreferences("sync"); | |
}; | |
this.AlertsService.showAlertNotification( | |
null, | |
title, | |
body, | |
true, | |
null, | |
clickCallback | |
); | |
}, | |
/** | |
* Uncollapses PersonalToolbar if its collapsed status is not | |
* persisted, and user customized it or changed default bookmarks. | |
* | |
* If the user does not have a persisted value for the toolbar's | |
* "collapsed" attribute, try to determine whether it's customized. | |
*/ | |
_maybeToggleBookmarkToolbarVisibility() { | |
const BROWSER_DOCURL = AppConstants.BROWSER_CHROME_URL; | |
const NUM_TOOLBAR_BOOKMARKS_TO_UNHIDE = 3; | |
let xulStore = Services.xulStore; | |
if (!xulStore.hasValue(BROWSER_DOCURL, "PersonalToolbar", "collapsed")) { | |
// We consider the toolbar customized if it has more than NUM_TOOLBAR_BOOKMARKS_TO_UNHIDE | |
// children, or if it has a persisted currentset value. | |
let toolbarIsCustomized = xulStore.hasValue( | |
BROWSER_DOCURL, | |
"PersonalToolbar", | |
"currentset" | |
); | |
let getToolbarFolderCount = () => { | |
let toolbarFolder = PlacesUtils.getFolderContents( | |
PlacesUtils.bookmarks.toolbarGuid | |
).root; | |
let toolbarChildCount = toolbarFolder.childCount; | |
toolbarFolder.containerOpen = false; | |
return toolbarChildCount; | |
}; | |
if ( | |
toolbarIsCustomized || | |
getToolbarFolderCount() > NUM_TOOLBAR_BOOKMARKS_TO_UNHIDE | |
) { | |
CustomizableUI.setToolbarVisibility( | |
CustomizableUI.AREA_BOOKMARKS, | |
true | |
); | |
} | |
} | |
}, | |
_migrateXULStoreForDocument(fromURL, toURL) { | |
Array.from(Services.xulStore.getIDsEnumerator(fromURL)).forEach(id => { | |
Array.from(Services.xulStore.getAttributeEnumerator(fromURL, id)).forEach( | |
attr => { | |
let value = Services.xulStore.getValue(fromURL, id, attr); | |
Services.xulStore.setValue(toURL, id, attr, value); | |
} | |
); | |
}); | |
}, | |
// eslint-disable-next-line complexity | |
_migrateUI: function BG__migrateUI() { | |
// Use an increasing number to keep track of the current migration state. | |
// Completely unrelated to the current Firefox release number. | |
const UI_VERSION = 92; | |
const BROWSER_DOCURL = AppConstants.BROWSER_CHROME_URL; | |
if (!Services.prefs.prefHasUserValue("browser.migration.version")) { | |
// This is a new profile, nothing to migrate. | |
Services.prefs.setIntPref("browser.migration.version", UI_VERSION); | |
this._isNewProfile = true; | |
return; | |
} | |
this._isNewProfile = false; | |
let currentUIVersion = Services.prefs.getIntPref( | |
"browser.migration.version" | |
); | |
if (currentUIVersion >= UI_VERSION) { | |
return; | |
} | |
let xulStore = Services.xulStore; | |
if (currentUIVersion < 52) { | |
// Keep old devtools log persistence behavior after splitting netmonitor and | |
// webconsole prefs (bug 1307881). | |
if (Services.prefs.getBoolPref("devtools.webconsole.persistlog", false)) { | |
Services.prefs.setBoolPref("devtools.netmonitor.persistlog", true); | |
} | |
} | |
// Update user customizations that will interfere with the Safe Browsing V2 | |
// to V4 migration (bug 1395419). | |
if (currentUIVersion < 53) { | |
const MALWARE_PREF = "urlclassifier.malwareTable"; | |
if (Services.prefs.prefHasUserValue(MALWARE_PREF)) { | |
let malwareList = Services.prefs.getCharPref(MALWARE_PREF); | |
if (malwareList.includes("goog-malware-shavar")) { | |
malwareList.replace("goog-malware-shavar", "goog-malware-proto"); | |
Services.prefs.setCharPref(MALWARE_PREF, malwareList); | |
} | |
} | |
} | |
if (currentUIVersion < 55) { | |
Services.prefs.clearUserPref("browser.customizemode.tip0.shown"); | |
} | |
if (currentUIVersion < 56) { | |
// Prior to the end of the Firefox 57 cycle, the sidebarcommand being present | |
// or not was the only thing that distinguished whether the sidebar was open. | |
// Now, the sidebarcommand always indicates the last opened sidebar, and we | |
// correctly persist the checked attribute to indicate whether or not the | |
// sidebar was open. We should set the checked attribute in case it wasn't: | |
if (xulStore.getValue(BROWSER_DOCURL, "sidebar-box", "sidebarcommand")) { | |
xulStore.setValue(BROWSER_DOCURL, "sidebar-box", "checked", "true"); | |
} | |
} | |
if (currentUIVersion < 58) { | |
// With Firefox 57, we are doing a one time reset of the geo prefs due to bug 1413652 | |
Services.prefs.clearUserPref("browser.search.countryCode"); | |
Services.prefs.clearUserPref("browser.search.region"); | |
Services.prefs.clearUserPref("browser.search.isUS"); | |
} | |
if (currentUIVersion < 59) { | |
let searchInitializedPromise = new Promise(resolve => { | |
if (Services.search.isInitialized) { | |
resolve(); | |
} | |
const SEARCH_SERVICE_TOPIC = "browser-search-service"; | |
Services.obs.addObserver(function observer(subject, topic, data) { | |
if (data != "init-complete") { | |
return; | |
} | |
Services.obs.removeObserver(observer, SEARCH_SERVICE_TOPIC); | |
resolve(); | |
}, SEARCH_SERVICE_TOPIC); | |
}); | |
searchInitializedPromise.then(() => { | |
let currentEngine = Services.search.defaultEngine.wrappedJSObject; | |
// Only reset the current engine if it wasn't set by a WebExtension | |
// and it is not one of the default engines. | |
// If the original default is not a default, the user has a weird | |
// configuration probably involving langpacks, it's not worth | |
// attempting to reset their settings. | |
if ( | |
currentEngine._extensionID || | |
currentEngine._isDefault || | |
!Services.search.originalDefaultEngine.wrappedJSObject._isDefault | |
) { | |
return; | |
} | |
if (!currentEngine._loadPath.startsWith("[https]")) { | |
Services.search.resetToOriginalDefaultEngine(); | |
} | |
}); | |
// Migrate the old requested locales prefs to use the new model | |
const SELECTED_LOCALE_PREF = "general.useragent.locale"; | |
const MATCHOS_LOCALE_PREF = "intl.locale.matchOS"; | |
if ( | |
Services.prefs.prefHasUserValue(MATCHOS_LOCALE_PREF) || | |
Services.prefs.prefHasUserValue(SELECTED_LOCALE_PREF) | |
) { | |
if (Services.prefs.getBoolPref(MATCHOS_LOCALE_PREF, false)) { | |
Services.locale.requestedLocales = []; | |
} else { | |
let locale = Services.prefs.getComplexValue( | |
SELECTED_LOCALE_PREF, | |
Ci.nsIPrefLocalizedString | |
); | |
if (locale) { | |
try { | |
Services.locale.requestedLocales = [locale.data]; | |
} catch (e) { | |
/* Don't panic if the value is not a valid locale code. */ | |
} | |
} | |
} | |
Services.prefs.clearUserPref(SELECTED_LOCALE_PREF); | |
Services.prefs.clearUserPref(MATCHOS_LOCALE_PREF); | |
} | |
} | |
if (currentUIVersion < 61) { | |
// Remove persisted toolbarset from navigator toolbox | |
xulStore.removeValue(BROWSER_DOCURL, "navigator-toolbox", "toolbarset"); | |
} | |
if (currentUIVersion < 62) { | |
// Remove iconsize and mode from all the toolbars | |
let toolbars = [ | |
"navigator-toolbox", | |
"nav-bar", | |
"PersonalToolbar", | |
"TabsToolbar", | |
"toolbar-menubar", | |
]; | |
for (let resourceName of ["mode", "iconsize"]) { | |
for (let toolbarId of toolbars) { | |
xulStore.removeValue(BROWSER_DOCURL, toolbarId, resourceName); | |
} | |
} | |
} | |
if (currentUIVersion < 64) { | |
OS.File.remove( | |
OS.Path.join(OS.Constants.Path.profileDir, "directoryLinks.json"), | |
{ ignoreAbsent: true } | |
); | |
} | |
if ( | |
currentUIVersion < 65 && | |
Services.prefs.getCharPref("general.config.filename", "") == | |
"dsengine.cfg" | |
) { | |
let searchInitializedPromise = new Promise(resolve => { | |
if (Services.search.isInitialized) { | |
resolve(); | |
} | |
const SEARCH_SERVICE_TOPIC = "browser-search-service"; | |
Services.obs.addObserver(function observer(subject, topic, data) { | |
if (data != "init-complete") { | |
return; | |
} | |
Services.obs.removeObserver(observer, SEARCH_SERVICE_TOPIC); | |
resolve(); | |
}, SEARCH_SERVICE_TOPIC); | |
}); | |
searchInitializedPromise.then(() => { | |
let engineNames = [ | |
"Bing Search Engine", | |
"Yahoo! Search Engine", | |
"Yandex Search Engine", | |
]; | |
for (let engineName of engineNames) { | |
let engine = Services.search.getEngineByName(engineName); | |
if (engine) { | |
Services.search.removeEngine(engine); | |
} | |
} | |
}); | |
} | |
if (currentUIVersion < 66) { | |
// Set whether search suggestions or history/bookmarks results come first | |
// in the urlbar results, and uninstall a related Shield study. | |
this._migrateMatchBucketsPrefForUI66(); | |
} | |
if (currentUIVersion < 67) { | |
// Migrate devtools firebug theme users to light theme (bug 1378108): | |
if (Services.prefs.getCharPref("devtools.theme") == "firebug") { | |
Services.prefs.setCharPref("devtools.theme", "light"); | |
} | |
} | |
if (currentUIVersion < 68) { | |
// Remove blocklists legacy storage, now relying on IndexedDB. | |
OS.File.remove( | |
OS.Path.join(OS.Constants.Path.profileDir, "kinto.sqlite"), | |
{ ignoreAbsent: true } | |
); | |
} | |
if (currentUIVersion < 69) { | |
// Clear old social prefs from profile (bug 1460675) | |
let socialPrefs = Services.prefs.getBranch("social."); | |
if (socialPrefs) { | |
let socialPrefsArray = socialPrefs.getChildList(""); | |
for (let item of socialPrefsArray) { | |
Services.prefs.clearUserPref("social." + item); | |
} | |
} | |
} | |
if (currentUIVersion < 70) { | |
// Migrate old ctrl-tab pref to new one in existing profiles. (This code | |
// doesn't run at all in new profiles.) | |
Services.prefs.setBoolPref( | |
"browser.ctrlTab.recentlyUsedOrder", | |
Services.prefs.getBoolPref("browser.ctrlTab.previews", false) | |
); | |
Services.prefs.clearUserPref("browser.ctrlTab.previews"); | |
// Remember that we migrated the pref in case we decide to flip it for | |
// these users. | |
Services.prefs.setBoolPref("browser.ctrlTab.migrated", true); | |
} | |
if (currentUIVersion < 71) { | |
// Clear legacy saved prefs for content handlers. | |
let savedContentHandlers = Services.prefs.getChildList( | |
"browser.contentHandlers.types" | |
); | |
for (let savedHandlerPref of savedContentHandlers) { | |
Services.prefs.clearUserPref(savedHandlerPref); | |
} | |
} | |
if (currentUIVersion < 72) { | |
// Migrate performance tool's recording interval value from msec to usec. | |
let pref = "devtools.performance.recording.interval"; | |
Services.prefs.setIntPref( | |
pref, | |
Services.prefs.getIntPref(pref, 1) * 1000 | |
); | |
} | |
if (currentUIVersion < 73) { | |
// Remove blocklist JSON local dumps in profile. | |
OS.File.removeDir( | |
OS.Path.join(OS.Constants.Path.profileDir, "blocklists"), | |
{ ignoreAbsent: true } | |
); | |
OS.File.removeDir( | |
OS.Path.join(OS.Constants.Path.profileDir, "blocklists-preview"), | |
{ ignoreAbsent: true } | |
); | |
for (const filename of ["addons.json", "plugins.json", "gfx.json"]) { | |
// Some old versions used to dump without subfolders. Clean them while we are at it. | |
const path = OS.Path.join( | |
OS.Constants.Path.profileDir, | |
`blocklists-${filename}` | |
); | |
OS.File.remove(path, { ignoreAbsent: true }); | |
} | |
} | |
if (currentUIVersion < 75) { | |
// Ensure we try to migrate any live bookmarks the user might have, trying up to | |
// 5 times. We set this early, and here, to avoid running the migration on | |
// new profile (or, indeed, ever creating the pref there). | |
Services.prefs.setIntPref( | |
"browser.livebookmarks.migrationAttemptsLeft", | |
5 | |
); | |
} | |
if (currentUIVersion < 76) { | |
// Clear old onboarding prefs from profile (bug 1462415) | |
let onboardingPrefs = Services.prefs.getBranch("browser.onboarding."); | |
if (onboardingPrefs) { | |
let onboardingPrefsArray = onboardingPrefs.getChildList(""); | |
for (let item of onboardingPrefsArray) { | |
Services.prefs.clearUserPref("browser.onboarding." + item); | |
} | |
} | |
} | |
if (currentUIVersion < 77) { | |
// Remove currentset from all the toolbars | |
let toolbars = [ | |
"nav-bar", | |
"PersonalToolbar", | |
"TabsToolbar", | |
"toolbar-menubar", | |
]; | |
for (let toolbarId of toolbars) { | |
xulStore.removeValue(BROWSER_DOCURL, toolbarId, "currentset"); | |
} | |
} | |
if (currentUIVersion < 78) { | |
Services.prefs.clearUserPref("browser.search.region"); | |
} | |
if (currentUIVersion < 79) { | |
// The handler app service will read this. We need to wait with migrating | |
// until the handler service has started up, so just set a pref here. | |
Services.prefs.setCharPref("browser.handlers.migrations", "30boxes"); | |
} | |
if (currentUIVersion < 80) { | |
let hosts = Services.prefs.getCharPref("network.proxy.no_proxies_on"); | |
// remove "localhost" and "127.0.0.1" from the no_proxies_on list | |
const kLocalHosts = new Set(["localhost", "127.0.0.1"]); | |
hosts = hosts | |
.split(/[ ,]+/) | |
.filter(host => !kLocalHosts.has(host)) | |
.join(", "); | |
Services.prefs.setCharPref("network.proxy.no_proxies_on", hosts); | |
} | |
if (currentUIVersion < 81) { | |
// Reset homepage pref for users who have it set to a default from before Firefox 4: | |
// <locale>.(start|start2|start3).mozilla.(com|org) | |
if (HomePage.overridden) { | |
const DEFAULT = HomePage.getDefault(); | |
let value = HomePage.get(); | |
let updated = value.replace( | |
/https?:\/\/([\w\-]+\.)?start\d*\.mozilla\.(org|com)[^|]*/gi, | |
DEFAULT | |
); | |
if (updated != value) { | |
if (updated == DEFAULT) { | |
HomePage.reset(); | |
} else { | |
value = updated; | |
HomePage.safeSet(value); | |
} | |
} | |
} | |
} | |
if (currentUIVersion < 82) { | |
this._migrateXULStoreForDocument( | |
"chrome://browser/content/browser.xul", | |
"chrome://browser/content/browser.xhtml" | |
); | |
} | |
if (currentUIVersion < 83) { | |
Services.prefs.clearUserPref("browser.search.reset.status"); | |
} | |
if (currentUIVersion < 84) { | |
// Reset flash "always allow/block" permissions | |
// We keep session and policy permissions, which could both be | |
// the result of enterprise policy settings. "Never/Always allow" | |
// settings for flash were actually time-bound on recent-ish Firefoxen, | |
// so we remove EXPIRE_TIME entries, too. | |
const { EXPIRE_NEVER, EXPIRE_TIME } = Services.perms; | |
let flashPermissions = Services.perms | |
.getAllWithTypePrefix("plugin:flash") | |
.filter( | |
p => | |
p.type == "plugin:flash" && | |
(p.expireType == EXPIRE_NEVER || p.expireType == EXPIRE_TIME) | |
); | |
flashPermissions.forEach(p => Services.perms.removePermission(p)); | |
} | |
// currentUIVersion < 85 is missing due to the following: | |
// Origianlly, Bug #1568900 added currentUIVersion 85 but was targeting FF70 release. | |
// In between it landing in FF70, Bug #1562601 (currentUIVersion 86) landed and | |
// was uplifted to Beta. To make sure the migration doesn't get skipped, the | |
// code block that was at 85 has been moved/bumped to currentUIVersion 87. | |
if (currentUIVersion < 86) { | |
// If the user has set "media.autoplay.allow-muted" to false | |
// migrate that to media.autoplay.default=BLOCKED_ALL. | |
if ( | |
Services.prefs.prefHasUserValue("media.autoplay.allow-muted") && | |
!Services.prefs.getBoolPref("media.autoplay.allow-muted") && | |
!Services.prefs.prefHasUserValue("media.autoplay.default") && | |
Services.prefs.getIntPref("media.autoplay.default") == | |
Ci.nsIAutoplay.BLOCKED | |
) { | |
Services.prefs.setIntPref( | |
"media.autoplay.default", | |
Ci.nsIAutoplay.BLOCKED_ALL | |
); | |
} | |
Services.prefs.clearUserPref("media.autoplay.allow-muted"); | |
} | |
if (currentUIVersion < 87) { | |
const TRACKING_TABLE_PREF = "urlclassifier.trackingTable"; | |
const CUSTOM_BLOCKING_PREF = | |
"browser.contentblocking.customBlockList.preferences.ui.enabled"; | |
// Check if user has set custom tables pref, and show custom block list UI | |
// in the about:preferences#privacy custom panel. | |
if (Services.prefs.prefHasUserValue(TRACKING_TABLE_PREF)) { | |
Services.prefs.setBoolPref(CUSTOM_BLOCKING_PREF, true); | |
} | |
} | |
if (currentUIVersion < 88) { | |
// If the user the has "browser.contentblocking.category = custom", but has | |
// the exact same settings as "standard", move them once to "standard". This is | |
// to reset users who we may have moved accidentally, or moved to get ETP early. | |
let category_prefs = [ | |
"network.cookie.cookieBehavior", | |
"privacy.trackingprotection.pbmode.enabled", | |
"privacy.trackingprotection.enabled", | |
"privacy.trackingprotection.socialtracking.enabled", | |
"privacy.trackingprotection.fingerprinting.enabled", | |
"privacy.trackingprotection.cryptomining.enabled", | |
]; | |
if ( | |
Services.prefs.getStringPref( | |
"browser.contentblocking.category", | |
"standard" | |
) == "custom" | |
) { | |
let shouldMigrate = true; | |
for (let pref of category_prefs) { | |
if (Services.prefs.prefHasUserValue(pref)) { | |
shouldMigrate = false; | |
} | |
} | |
if (shouldMigrate) { | |
Services.prefs.setStringPref( | |
"browser.contentblocking.category", | |
"standard" | |
); | |
} | |
} | |
} | |
if (currentUIVersion < 89) { | |
// This file was renamed in https://bugzilla.mozilla.org/show_bug.cgi?id=1595636. | |
this._migrateXULStoreForDocument( | |
"chrome://devtools/content/framework/toolbox-window.xul", | |
"chrome://devtools/content/framework/toolbox-window.xhtml" | |
); | |
} | |
if (currentUIVersion < 90) { | |
this._migrateXULStoreForDocument( | |
"chrome://browser/content/places/historySidebar.xul", | |
"chrome://browser/content/places/historySidebar.xhtml" | |
); | |
this._migrateXULStoreForDocument( | |
"chrome://browser/content/places/places.xul", | |
"chrome://browser/content/places/places.xhtml" | |
); | |
this._migrateXULStoreForDocument( | |
"chrome://browser/content/places/bookmarksSidebar.xul", | |
"chrome://browser/content/places/bookmarksSidebar.xhtml" | |
); | |
} | |
// Clear socks proxy values if they were shared from http, to prevent | |
// websocket breakage after bug 1577862 (see bug 969282). | |
if ( | |
currentUIVersion < 91 && | |
Services.prefs.getBoolPref("network.proxy.share_proxy_settings", false) && | |
Services.prefs.getIntPref("network.proxy.type", 0) == 1 | |
) { | |
let httpProxy = Services.prefs.getCharPref("network.proxy.http", ""); | |
let httpPort = Services.prefs.getIntPref("network.proxy.http_port", 0); | |
let socksProxy = Services.prefs.getCharPref("network.proxy.socks", ""); | |
let socksPort = Services.prefs.getIntPref("network.proxy.socks_port", 0); | |
if (httpProxy && httpProxy == socksProxy && httpPort == socksPort) { | |
Services.prefs.setCharPref( | |
"network.proxy.socks", | |
Services.prefs.getCharPref("network.proxy.backup.socks", "") | |
); | |
Services.prefs.setIntPref( | |
"network.proxy.socks_port", | |
Services.prefs.getIntPref("network.proxy.backup.socks_port", 0) | |
); | |
} | |
} | |
if (currentUIVersion < 92) { | |
// privacy.userContext.longPressBehavior pref was renamed and changed to a boolean | |
let longpress = Services.prefs.getIntPref( | |
"privacy.userContext.longPressBehavior", | |
0 | |
); | |
if (longpress == 1) { | |
Services.prefs.setBoolPref( | |
"privacy.userContext.newTabContainerOnLeftClick.enabled", | |
true | |
); | |
} | |
} | |
// Update the migration version. | |
Services.prefs.setIntPref("browser.migration.version", UI_VERSION); | |
}, | |
_checkForDefaultBrowser() { | |
// Perform default browser checking. | |
if (!ShellService) { | |
return; | |
} | |
let shouldCheck = | |
!AppConstants.DEBUG && ShellService.shouldCheckDefaultBrowser; | |
const skipDefaultBrowserCheck = | |
Services.prefs.getBoolPref( | |
"browser.shell.skipDefaultBrowserCheckOnFirstRun" | |
) && | |
!Services.prefs.getBoolPref( | |
"browser.shell.didSkipDefaultBrowserCheckOnFirstRun" | |
); | |
const usePromptLimit = !AppConstants.RELEASE_OR_BETA; | |
let promptCount = usePromptLimit | |
? Services.prefs.getIntPref("browser.shell.defaultBrowserCheckCount") | |
: 0; | |
let willRecoverSession = | |
SessionStartup.sessionType == SessionStartup.RECOVER_SESSION; | |
// startup check, check all assoc | |
let isDefault = false; | |
let isDefaultError = false; | |
try { | |
isDefault = ShellService.isDefaultBrowser(true, false); | |
} catch (ex) { | |
isDefaultError = true; | |
} | |
if (isDefault) { | |
let now = Math.floor(Date.now() / 1000).toString(); | |
Services.prefs.setCharPref( | |
"browser.shell.mostRecentDateSetAsDefault", | |
now | |
); | |
} | |
let willPrompt = shouldCheck && !isDefault && !willRecoverSession; | |
// Skip the "Set Default Browser" check during first-run or after the | |
// browser has been run a few times. | |
if (willPrompt) { | |
if (skipDefaultBrowserCheck) { | |
Services.prefs.setBoolPref( | |
"browser.shell.didSkipDefaultBrowserCheckOnFirstRun", | |
true | |
); | |
willPrompt = false; | |
} else { | |
promptCount++; | |
} | |
if (usePromptLimit && promptCount > 3) { | |
willPrompt = false; | |
} | |
} | |
if (usePromptLimit && willPrompt) { | |
Services.prefs.setIntPref( | |
"browser.shell.defaultBrowserCheckCount", | |
promptCount | |
); | |
} | |
try { | |
// Report default browser status on startup to telemetry | |
// so we can track whether we are the default. | |
Services.telemetry | |
.getHistogramById("BROWSER_IS_USER_DEFAULT") | |
.add(isDefault); | |
Services.telemetry | |
.getHistogramById("BROWSER_IS_USER_DEFAULT_ERROR") | |
.add(isDefaultError); | |
Services.telemetry | |
.getHistogramById("BROWSER_SET_DEFAULT_ALWAYS_CHECK") | |
.add(shouldCheck); | |
Services.telemetry | |
.getHistogramById("BROWSER_SET_DEFAULT_DIALOG_PROMPT_RAWCOUNT") | |
.add(promptCount); | |
} catch (ex) { | |
/* Don't break the default prompt if telemetry is broken. */ | |
} | |
if (willPrompt) { | |
DefaultBrowserCheck.prompt(BrowserWindowTracker.getTopWindow()); | |
} | |
}, | |
async _migrateMatchBucketsPrefForUI66() { | |
// This does two related things. | |
// | |
// (1) Profiles created on or after Firefox 57's release date were eligible | |
// for a Shield study that changed the browser.urlbar.matchBuckets pref in | |
// order to show search suggestions above history/bookmarks in the urlbar | |
// popup. This uninstalls that study. (It's actually slightly more | |
// complex. The study set the pref to several possible values, but the | |
// overwhelming number of profiles in the study got search suggestions | |
// first, followed by history/bookmarks.) | |
// | |
// (2) This also ensures that (a) new users see search suggestions above | |
// history/bookmarks, thereby effectively making the study permanent, and | |
// (b) old users (including those in the study) continue to see whatever | |
// they were seeing before. This works together with UnifiedComplete.js. | |
// By default, the browser.urlbar.matchBuckets pref does not exist, and | |
// UnifiedComplete.js internally hardcodes a default value for it. Before | |
// Firefox 60, the hardcoded default was to show history/bookmarks first. | |
// After 60, it's to show search suggestions first. | |
// Wait for Shield init to complete. | |
await new Promise(resolve => { | |
if (this._shieldInitComplete) { | |
resolve(); | |
return; | |
} | |
let topic = "shield-init-complete"; | |
Services.obs.addObserver(function obs() { | |
Services.obs.removeObserver(obs, topic); | |
resolve(); | |
}, topic); | |
}); | |
// Now get the pref's value. If the study is active, the value will have | |
// just been set (on the default branch) as part of Shield's init. The pref | |
// should not exist otherwise (normally). | |
let prefName = "browser.urlbar.matchBuckets"; | |
let prefValue = Services.prefs.getCharPref(prefName, ""); | |