/* This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ import { AppConstants } from "resource://gre/modules/AppConstants.sys.mjs"; import { XPCOMUtils } from "resource://gre/modules/XPCOMUtils.sys.mjs"; const lazy = {}; ChromeUtils.defineESModuleGetters(lazy, { AboutNewTab: "resource:///modules/AboutNewTab.sys.mjs", AWToolbarButton: "resource:///modules/aboutwelcome/AWToolbarUtils.sys.mjs", ASRouter: "resource:///modules/asrouter/ASRouter.sys.mjs", ASRouterDefaultConfig: "resource:///modules/asrouter/ASRouterDefaultConfig.sys.mjs", ASRouterNewTabHook: "resource:///modules/asrouter/ASRouterNewTabHook.sys.mjs", ActorManagerParent: "resource://gre/modules/ActorManagerParent.sys.mjs", AddonManager: "resource://gre/modules/AddonManager.sys.mjs", AppMenuNotifications: "resource://gre/modules/AppMenuNotifications.sys.mjs", AsyncShutdown: "resource://gre/modules/AsyncShutdown.sys.mjs", BackupService: "resource:///modules/backup/BackupService.sys.mjs", Blocklist: "resource://gre/modules/Blocklist.sys.mjs", BookmarkHTMLUtils: "resource://gre/modules/BookmarkHTMLUtils.sys.mjs", BookmarkJSONUtils: "resource://gre/modules/BookmarkJSONUtils.sys.mjs", BrowserSearchTelemetry: "resource:///modules/BrowserSearchTelemetry.sys.mjs", BrowserUIUtils: "resource:///modules/BrowserUIUtils.sys.mjs", BrowserUsageTelemetry: "resource:///modules/BrowserUsageTelemetry.sys.mjs", BrowserWindowTracker: "resource:///modules/BrowserWindowTracker.sys.mjs", BuiltInThemes: "resource:///modules/BuiltInThemes.sys.mjs", ContextualIdentityService: "resource://gre/modules/ContextualIdentityService.sys.mjs", Corroborate: "resource://gre/modules/Corroborate.sys.mjs", DAPTelemetrySender: "resource://gre/modules/DAPTelemetrySender.sys.mjs", DeferredTask: "resource://gre/modules/DeferredTask.sys.mjs", Discovery: "resource:///modules/Discovery.sys.mjs", DoHController: "resource:///modules/DoHController.sys.mjs", DownloadsViewableInternally: "resource:///modules/DownloadsViewableInternally.sys.mjs", E10SUtils: "resource://gre/modules/E10SUtils.sys.mjs", ExtensionsUI: "resource:///modules/ExtensionsUI.sys.mjs", FeatureGate: "resource://featuregates/FeatureGate.sys.mjs", FirefoxBridgeExtensionUtils: "resource:///modules/FirefoxBridgeExtensionUtils.sys.mjs", FxAccounts: "resource://gre/modules/FxAccounts.sys.mjs", HomePage: "resource:///modules/HomePage.sys.mjs", Integration: "resource://gre/modules/Integration.sys.mjs", Interactions: "resource:///modules/Interactions.sys.mjs", LoginBreaches: "resource:///modules/LoginBreaches.sys.mjs", MigrationUtils: "resource:///modules/MigrationUtils.sys.mjs", NetUtil: "resource://gre/modules/NetUtil.sys.mjs", NewTabUtils: "resource://gre/modules/NewTabUtils.sys.mjs", NimbusFeatures: "resource://nimbus/ExperimentAPI.sys.mjs", Normandy: "resource://normandy/Normandy.sys.mjs", OnboardingMessageProvider: "resource:///modules/asrouter/OnboardingMessageProvider.sys.mjs", OsEnvironment: "resource://gre/modules/OsEnvironment.sys.mjs", PageActions: "resource:///modules/PageActions.sys.mjs", PageDataService: "resource:///modules/pagedata/PageDataService.sys.mjs", PageThumbs: "resource://gre/modules/PageThumbs.sys.mjs", PdfJs: "resource://pdf.js/PdfJs.sys.mjs", PermissionUI: "resource:///modules/PermissionUI.sys.mjs", PlacesBackups: "resource://gre/modules/PlacesBackups.sys.mjs", PlacesDBUtils: "resource://gre/modules/PlacesDBUtils.sys.mjs", PlacesUIUtils: "resource:///modules/PlacesUIUtils.sys.mjs", PlacesUtils: "resource://gre/modules/PlacesUtils.sys.mjs", // PluginManager is used by listeners object below. // eslint-disable-next-line mozilla/valid-lazy PluginManager: "resource:///actors/PluginParent.sys.mjs", PrivateBrowsingUtils: "resource://gre/modules/PrivateBrowsingUtils.sys.mjs", ProcessHangMonitor: "resource:///modules/ProcessHangMonitor.sys.mjs", PublicSuffixList: "resource://gre/modules/netwerk-dns/PublicSuffixList.sys.mjs", QuickSuggest: "resource:///modules/QuickSuggest.sys.mjs", RFPHelper: "resource://gre/modules/RFPHelper.sys.mjs", RemoteSecuritySettings: "resource://gre/modules/psm/RemoteSecuritySettings.sys.mjs", RemoteSettings: "resource://services-settings/remote-settings.sys.mjs", ResetPBMPanel: "resource:///modules/ResetPBMPanel.sys.mjs", SafeBrowsing: "resource://gre/modules/SafeBrowsing.sys.mjs", Sanitizer: "resource:///modules/Sanitizer.sys.mjs", SaveToPocket: "chrome://pocket/content/SaveToPocket.sys.mjs", ScreenshotsUtils: "resource:///modules/ScreenshotsUtils.sys.mjs", SearchSERPDomainToCategoriesMap: "resource:///modules/SearchSERPTelemetry.sys.mjs", SearchSERPTelemetry: "resource:///modules/SearchSERPTelemetry.sys.mjs", SessionStartup: "resource:///modules/sessionstore/SessionStartup.sys.mjs", SessionStore: "resource:///modules/sessionstore/SessionStore.sys.mjs", ShellService: "resource:///modules/ShellService.sys.mjs", ShortcutUtils: "resource://gre/modules/ShortcutUtils.sys.mjs", ShoppingUtils: "resource:///modules/ShoppingUtils.sys.mjs", SpecialMessageActions: "resource://messaging-system/lib/SpecialMessageActions.sys.mjs", TRRRacer: "resource:///modules/TRRPerformance.sys.mjs", TabCrashHandler: "resource:///modules/ContentCrashHandlers.sys.mjs", TabUnloader: "resource:///modules/TabUnloader.sys.mjs", TelemetryUtils: "resource://gre/modules/TelemetryUtils.sys.mjs", UIState: "resource://services-sync/UIState.sys.mjs", UrlbarPrefs: "resource:///modules/UrlbarPrefs.sys.mjs", WebChannel: "resource://gre/modules/WebChannel.sys.mjs", WindowsLaunchOnLogin: "resource://gre/modules/WindowsLaunchOnLogin.sys.mjs", WindowsRegistry: "resource://gre/modules/WindowsRegistry.sys.mjs", WindowsGPOParser: "resource://gre/modules/policies/WindowsGPOParser.sys.mjs", clearTimeout: "resource://gre/modules/Timer.sys.mjs", setTimeout: "resource://gre/modules/Timer.sys.mjs", }); if (AppConstants.MOZ_UPDATER) { ChromeUtils.defineESModuleGetters(lazy, { UpdateListener: "resource://gre/modules/UpdateListener.sys.mjs", }); } if (AppConstants.MOZ_UPDATE_AGENT) { ChromeUtils.defineESModuleGetters(lazy, { BackgroundUpdate: "resource://gre/modules/BackgroundUpdate.sys.mjs", }); } // PluginManager is used in the listeners object below. XPCOMUtils.defineLazyServiceGetters(lazy, { BrowserHandler: ["@mozilla.org/browser/clh;1", "nsIBrowserHandler"], PushService: ["@mozilla.org/push/Service;1", "nsIPushService"], }); ChromeUtils.defineLazyGetter( lazy, "accountsL10n", () => new Localization( ["browser/accounts.ftl", "toolkit/branding/accounts.ftl"], true ) ); if (AppConstants.ENABLE_WEBDRIVER) { XPCOMUtils.defineLazyServiceGetter( lazy, "Marionette", "@mozilla.org/remote/marionette;1", "nsIMarionette" ); XPCOMUtils.defineLazyServiceGetter( lazy, "RemoteAgent", "@mozilla.org/remote/agent;1", "nsIRemoteAgent" ); } else { lazy.Marionette = { running: false }; lazy.RemoteAgent = { running: false }; } const PREF_PDFJS_ISDEFAULT_CACHE_STATE = "pdfjs.enabledCache.state"; const PRIVATE_BROWSING_BINARY = "private_browsing.exe"; // Index of Private Browsing icon in private_browsing.exe // Must line up with IDI_PBICON_PB_PB_EXE in nsNativeAppSupportWin.h. const PRIVATE_BROWSING_EXE_ICON_INDEX = 1; const PREF_PRIVATE_BROWSING_SHORTCUT_CREATED = "browser.privacySegmentation.createdShortcut"; // Whether this launch was initiated by the OS. A launch-on-login will contain // the "os-autostart" flag in the initial launch command line. let gThisInstanceIsLaunchOnLogin = false; // Whether this launch was initiated by a taskbar tab shortcut. A launch from // a taskbar tab shortcut will contain the "taskbar-tab" flag. let gThisInstanceIsTaskbarTab = false; /** * Fission-compatible JSProcess implementations. * Each actor options object takes the form of a ProcessActorOptions dictionary. * Detailed documentation of these options is in dom/docs/ipc/jsactors.rst, * available at https://firefox-source-docs.mozilla.org/dom/ipc/jsactors.html */ let JSPROCESSACTORS = { // Miscellaneous stuff that needs to be initialized per process. BrowserProcess: { child: { esModuleURI: "resource:///actors/BrowserProcessChild.sys.mjs", observers: [ // WebRTC related notifications. They are here to avoid loading WebRTC // components when not needed. "getUserMedia:request", "recording-device-stopped", "PeerConnection:request", "recording-device-events", "recording-window-ended", ], }, }, RefreshBlockerObserver: { child: { esModuleURI: "resource:///actors/RefreshBlockerChild.sys.mjs", observers: [ "webnavigation-create", "chrome-webnavigation-create", "webnavigation-destroy", "chrome-webnavigation-destroy", ], }, enablePreference: "accessibility.blockautorefresh", onPreferenceChanged: (prefName, prevValue, isEnabled) => { lazy.BrowserWindowTracker.orderedWindows.forEach(win => { for (let browser of win.gBrowser.browsers) { try { browser.sendMessageToActor( "PreferenceChanged", { isEnabled }, "RefreshBlocker", "all" ); } catch (ex) {} } }); }, }, }; /** * Fission-compatible JSWindowActor implementations. * Detailed documentation of these options is in dom/docs/ipc/jsactors.rst, * available at https://firefox-source-docs.mozilla.org/dom/ipc/jsactors.html */ let JSWINDOWACTORS = { AboutLogins: { parent: { esModuleURI: "resource:///actors/AboutLoginsParent.sys.mjs", }, child: { esModuleURI: "resource:///actors/AboutLoginsChild.sys.mjs", events: { AboutLoginsCopyLoginDetail: { wantUntrusted: true }, AboutLoginsCreateLogin: { wantUntrusted: true }, AboutLoginsDeleteLogin: { wantUntrusted: true }, AboutLoginsDismissBreachAlert: { wantUntrusted: true }, AboutLoginsImportFromBrowser: { wantUntrusted: true }, AboutLoginsImportFromFile: { wantUntrusted: true }, AboutLoginsImportReportInit: { wantUntrusted: true }, AboutLoginsImportReportReady: { wantUntrusted: true }, AboutLoginsInit: { wantUntrusted: true }, AboutLoginsGetHelp: { wantUntrusted: true }, AboutLoginsOpenPreferences: { wantUntrusted: true }, AboutLoginsOpenSite: { wantUntrusted: true }, AboutLoginsRecordTelemetryEvent: { wantUntrusted: true }, AboutLoginsRemoveAllLogins: { wantUntrusted: true }, AboutLoginsSortChanged: { wantUntrusted: true }, AboutLoginsSyncEnable: { wantUntrusted: true }, AboutLoginsSyncOptions: { wantUntrusted: true }, AboutLoginsUpdateLogin: { wantUntrusted: true }, AboutLoginsExportPasswords: { wantUntrusted: true }, }, }, matches: ["about:logins", "about:logins?*", "about:loginsimportreport"], allFrames: true, remoteTypes: ["privilegedabout"], }, AboutMessagePreview: { parent: { esModuleURI: "resource:///actors/AboutMessagePreviewParent.sys.mjs", }, child: { esModuleURI: "resource:///actors/AboutMessagePreviewChild.sys.mjs", events: { DOMDocElementInserted: { capture: true }, }, }, matches: ["about:messagepreview", "about:messagepreview?*"], }, AboutNewTab: { parent: { esModuleURI: "resource:///actors/AboutNewTabParent.sys.mjs", }, child: { esModuleURI: "resource:///actors/AboutNewTabChild.sys.mjs", events: { DOMDocElementInserted: {}, DOMContentLoaded: {}, load: { capture: true }, unload: { capture: true }, pageshow: {}, visibilitychange: {}, }, }, // The wildcard on about:newtab is for the # parameter // that is used for the newtab devtools. The wildcard for about:home // is similar, and also allows for falling back to loading the // about:home document dynamically if an attempt is made to load // about:home?jscache from the AboutHomeStartupCache as a top-level // load. matches: ["about:home*", "about:welcome", "about:newtab*"], remoteTypes: ["privilegedabout"], }, AboutPocket: { parent: { esModuleURI: "resource:///actors/AboutPocketParent.sys.mjs", }, child: { esModuleURI: "resource:///actors/AboutPocketChild.sys.mjs", events: { DOMDocElementInserted: { capture: true }, }, }, remoteTypes: ["privilegedabout"], matches: [ "about:pocket-saved*", "about:pocket-signup*", "about:pocket-home*", "about:pocket-style-guide*", ], }, AboutPrivateBrowsing: { parent: { esModuleURI: "resource:///actors/AboutPrivateBrowsingParent.sys.mjs", }, child: { esModuleURI: "resource:///actors/AboutPrivateBrowsingChild.sys.mjs", events: { DOMDocElementInserted: { capture: true }, }, }, matches: ["about:privatebrowsing*"], }, AboutProtections: { parent: { esModuleURI: "resource:///actors/AboutProtectionsParent.sys.mjs", }, child: { esModuleURI: "resource:///actors/AboutProtectionsChild.sys.mjs", events: { DOMDocElementInserted: { capture: true }, }, }, matches: ["about:protections", "about:protections?*"], }, AboutReader: { parent: { esModuleURI: "resource:///actors/AboutReaderParent.sys.mjs", }, child: { esModuleURI: "resource:///actors/AboutReaderChild.sys.mjs", events: { DOMContentLoaded: {}, pageshow: { mozSystemGroup: true }, // Don't try to create the actor if only the pagehide event fires. // This can happen with the initial about:blank documents. pagehide: { mozSystemGroup: true, createActor: false }, }, }, messageManagerGroups: ["browsers"], }, AboutTabCrashed: { parent: { esModuleURI: "resource:///actors/AboutTabCrashedParent.sys.mjs", }, child: { esModuleURI: "resource:///actors/AboutTabCrashedChild.sys.mjs", events: { DOMDocElementInserted: { capture: true }, }, }, matches: ["about:tabcrashed*"], }, AboutWelcomeShopping: { parent: { esModuleURI: "resource:///actors/AboutWelcomeParent.sys.mjs", }, child: { esModuleURI: "resource:///actors/AboutWelcomeChild.sys.mjs", events: { Update: {}, }, }, matches: ["about:shoppingsidebar"], remoteTypes: ["privilegedabout"], }, AboutWelcome: { parent: { esModuleURI: "resource:///actors/AboutWelcomeParent.sys.mjs", }, child: { esModuleURI: "resource:///actors/AboutWelcomeChild.sys.mjs", events: { // This is added so the actor instantiates immediately and makes // methods available to the page js on load. DOMDocElementInserted: {}, }, }, matches: ["about:welcome"], remoteTypes: ["privilegedabout"], // See Bug 1618306 // Remove this preference check when we turn on separate about:welcome for all users. enablePreference: "browser.aboutwelcome.enabled", }, BlockedSite: { parent: { esModuleURI: "resource:///actors/BlockedSiteParent.sys.mjs", }, child: { esModuleURI: "resource:///actors/BlockedSiteChild.sys.mjs", events: { AboutBlockedLoaded: { wantUntrusted: true }, click: {}, }, }, matches: ["about:blocked?*"], allFrames: true, }, BrowserTab: { child: { esModuleURI: "resource:///actors/BrowserTabChild.sys.mjs", }, messageManagerGroups: ["browsers"], }, ClickHandler: { parent: { esModuleURI: "resource:///actors/ClickHandlerParent.sys.mjs", }, child: { esModuleURI: "resource:///actors/ClickHandlerChild.sys.mjs", events: { chromelinkclick: { capture: true, mozSystemGroup: true }, }, }, allFrames: true, }, /* Note: this uses the same JSMs as ClickHandler, but because it * relies on "normal" click events anywhere on the page (not just * links) and is expensive, and only does something for the * small group of people who have the feature enabled, it is its * own actor which is only registered if the pref is enabled. */ MiddleMousePasteHandler: { parent: { esModuleURI: "resource:///actors/ClickHandlerParent.sys.mjs", }, child: { esModuleURI: "resource:///actors/ClickHandlerChild.sys.mjs", events: { auxclick: { capture: true, mozSystemGroup: true }, }, }, enablePreference: "middlemouse.contentLoadURL", allFrames: true, }, ContentSearch: { parent: { esModuleURI: "resource:///actors/ContentSearchParent.sys.mjs", }, child: { esModuleURI: "resource:///actors/ContentSearchChild.sys.mjs", events: { ContentSearchClient: { capture: true, wantUntrusted: true }, }, }, matches: [ "about:home", "about:welcome", "about:newtab", "about:privatebrowsing", "about:test-about-content-search-ui", ], remoteTypes: ["privilegedabout"], }, ContextMenu: { parent: { esModuleURI: "resource:///actors/ContextMenuParent.sys.mjs", }, child: { esModuleURI: "resource:///actors/ContextMenuChild.sys.mjs", events: { contextmenu: { mozSystemGroup: true }, }, }, allFrames: true, }, DecoderDoctor: { parent: { esModuleURI: "resource:///actors/DecoderDoctorParent.sys.mjs", }, child: { esModuleURI: "resource:///actors/DecoderDoctorChild.sys.mjs", observers: ["decoder-doctor-notification"], }, messageManagerGroups: ["browsers"], allFrames: true, }, DOMFullscreen: { parent: { esModuleURI: "resource:///actors/DOMFullscreenParent.sys.mjs", }, child: { esModuleURI: "resource:///actors/DOMFullscreenChild.sys.mjs", events: { "MozDOMFullscreen:Request": {}, "MozDOMFullscreen:Entered": {}, "MozDOMFullscreen:NewOrigin": {}, "MozDOMFullscreen:Exit": {}, "MozDOMFullscreen:Exited": {}, }, }, messageManagerGroups: ["browsers"], allFrames: true, }, EncryptedMedia: { parent: { esModuleURI: "resource:///actors/EncryptedMediaParent.sys.mjs", }, child: { esModuleURI: "resource:///actors/EncryptedMediaChild.sys.mjs", observers: ["mediakeys-request"], }, messageManagerGroups: ["browsers"], allFrames: true, }, FormValidation: { parent: { esModuleURI: "resource:///actors/FormValidationParent.sys.mjs", }, child: { esModuleURI: "resource:///actors/FormValidationChild.sys.mjs", events: { MozInvalidForm: {}, // Listening to ‘pageshow’ event is only relevant if an invalid form // popup was open, so don't create the actor when fired. pageshow: { createActor: false }, }, }, allFrames: true, }, LightweightTheme: { child: { esModuleURI: "resource:///actors/LightweightThemeChild.sys.mjs", events: { pageshow: { mozSystemGroup: true }, DOMContentLoaded: {}, }, }, includeChrome: true, allFrames: true, matches: [ "about:asrouter", "about:home", "about:newtab", "about:welcome", "chrome://browser/content/syncedtabs/sidebar.xhtml", "chrome://browser/content/places/historySidebar.xhtml", "chrome://browser/content/places/bookmarksSidebar.xhtml", "about:firefoxview", ], }, LinkHandler: { parent: { esModuleURI: "resource:///actors/LinkHandlerParent.sys.mjs", }, child: { esModuleURI: "resource:///actors/LinkHandlerChild.sys.mjs", events: { DOMHeadElementParsed: {}, DOMLinkAdded: {}, DOMLinkChanged: {}, pageshow: {}, // The `pagehide` event is only used to clean up state which will not be // present if the actor hasn't been created. pagehide: { createActor: false }, }, }, messageManagerGroups: ["browsers"], }, PageInfo: { child: { esModuleURI: "resource:///actors/PageInfoChild.sys.mjs", }, allFrames: true, }, PageStyle: { parent: { esModuleURI: "resource:///actors/PageStyleParent.sys.mjs", }, child: { esModuleURI: "resource:///actors/PageStyleChild.sys.mjs", events: { pageshow: { createActor: false }, }, }, messageManagerGroups: ["browsers"], allFrames: true, }, Pdfjs: { parent: { esModuleURI: "resource://pdf.js/PdfjsParent.sys.mjs", }, child: { esModuleURI: "resource://pdf.js/PdfjsChild.sys.mjs", }, allFrames: true, }, // GMP crash reporting Plugin: { parent: { esModuleURI: "resource:///actors/PluginParent.sys.mjs", }, child: { esModuleURI: "resource:///actors/PluginChild.sys.mjs", events: { PluginCrashed: { capture: true }, }, }, allFrames: true, }, PointerLock: { parent: { esModuleURI: "resource:///actors/PointerLockParent.sys.mjs", }, child: { esModuleURI: "resource:///actors/PointerLockChild.sys.mjs", events: { "MozDOMPointerLock:Entered": {}, "MozDOMPointerLock:Exited": {}, }, }, messageManagerGroups: ["browsers"], allFrames: true, }, Profiles: { parent: { esModuleURI: "resource:///actors/ProfilesParent.sys.mjs", }, child: { esModuleURI: "resource:///actors/ProfilesChild.sys.mjs", }, matches: ["about:profilemanager"], enablePreference: "browser.profiles.enabled", }, Prompt: { parent: { esModuleURI: "resource:///actors/PromptParent.sys.mjs", }, includeChrome: true, allFrames: true, }, RefreshBlocker: { parent: { esModuleURI: "resource:///actors/RefreshBlockerParent.sys.mjs", }, child: { esModuleURI: "resource:///actors/RefreshBlockerChild.sys.mjs", }, messageManagerGroups: ["browsers"], enablePreference: "accessibility.blockautorefresh", }, ScreenshotsComponent: { parent: { esModuleURI: "resource:///modules/ScreenshotsUtils.sys.mjs", }, child: { esModuleURI: "resource:///actors/ScreenshotsComponentChild.sys.mjs", events: { "Screenshots:Close": {}, "Screenshots:Copy": {}, "Screenshots:Download": {}, "Screenshots:HidePanel": {}, "Screenshots:OverlaySelection": {}, "Screenshots:RecordEvent": {}, "Screenshots:ShowPanel": {}, }, }, enablePreference: "screenshots.browser.component.enabled", }, ScreenshotsHelper: { parent: { esModuleURI: "resource:///modules/ScreenshotsUtils.sys.mjs", }, child: { esModuleURI: "resource:///modules/ScreenshotsHelperChild.sys.mjs", }, allFrames: true, enablePreference: "screenshots.browser.component.enabled", }, SearchSERPTelemetry: { parent: { esModuleURI: "resource:///actors/SearchSERPTelemetryParent.sys.mjs", }, child: { esModuleURI: "resource:///actors/SearchSERPTelemetryChild.sys.mjs", events: { DOMContentLoaded: {}, pageshow: { mozSystemGroup: true }, // The 'pagehide' event is only used to clean up state, and should not // force actor creation. pagehide: { createActor: false }, load: { mozSystemGroup: true, capture: true }, }, }, matches: ["https://*/*"], }, ShieldFrame: { parent: { esModuleURI: "resource://normandy-content/ShieldFrameParent.sys.mjs", }, child: { esModuleURI: "resource://normandy-content/ShieldFrameChild.sys.mjs", events: { pageshow: {}, pagehide: {}, ShieldPageEvent: { wantUntrusted: true }, }, }, matches: ["about:studies*"], }, ShoppingSidebar: { parent: { esModuleURI: "resource:///actors/ShoppingSidebarParent.sys.mjs", }, child: { esModuleURI: "resource:///actors/ShoppingSidebarChild.sys.mjs", events: { ContentReady: { wantUntrusted: true }, PolledRequestMade: { wantUntrusted: true }, // This is added so the actor instantiates immediately and makes // methods available to the page js on load. DOMDocElementInserted: {}, ReportProductAvailable: { wantUntrusted: true }, AdClicked: { wantUntrusted: true }, AdImpression: { wantUntrusted: true }, DisableShopping: { wantUntrusted: true }, }, }, matches: ["about:shoppingsidebar"], remoteTypes: ["privilegedabout"], }, SpeechDispatcher: { parent: { esModuleURI: "resource:///actors/SpeechDispatcherParent.sys.mjs", }, child: { esModuleURI: "resource:///actors/SpeechDispatcherChild.sys.mjs", observers: ["chrome-synth-voices-error"], }, messageManagerGroups: ["browsers"], allFrames: true, }, ASRouter: { parent: { esModuleURI: "resource:///actors/ASRouterParent.sys.mjs", }, child: { esModuleURI: "resource:///actors/ASRouterChild.sys.mjs", events: { // This is added so the actor instantiates immediately and makes // methods available to the page js on load. DOMDocElementInserted: {}, }, }, matches: [ "about:asrouter*", "about:home*", "about:newtab*", "about:welcome*", "about:privatebrowsing*", ], remoteTypes: ["privilegedabout"], }, SwitchDocumentDirection: { child: { esModuleURI: "resource:///actors/SwitchDocumentDirectionChild.sys.mjs", }, allFrames: true, }, UITour: { parent: { esModuleURI: "resource:///modules/UITourParent.sys.mjs", }, child: { esModuleURI: "resource:///modules/UITourChild.sys.mjs", events: { mozUITour: { wantUntrusted: true }, }, }, messageManagerGroups: ["browsers"], }, WebRTC: { parent: { esModuleURI: "resource:///actors/WebRTCParent.sys.mjs", }, child: { esModuleURI: "resource:///actors/WebRTCChild.sys.mjs", }, allFrames: true, }, }; ChromeUtils.defineLazyGetter( lazy, "WeaveService", () => Cc["@mozilla.org/weave/service;1"].getService().wrappedJSObject ); if (AppConstants.MOZ_CRASHREPORTER) { ChromeUtils.defineESModuleGetters(lazy, { UnsubmittedCrashHandler: "resource:///modules/ContentCrashHandlers.sys.mjs", }); } ChromeUtils.defineLazyGetter(lazy, "gBrandBundle", function () { return Services.strings.createBundle( "chrome://branding/locale/brand.properties" ); }); ChromeUtils.defineLazyGetter(lazy, "gBrowserBundle", function () { return Services.strings.createBundle( "chrome://browser/locale/browser.properties" ); }); ChromeUtils.defineLazyGetter(lazy, "log", () => { let { ConsoleAPI } = ChromeUtils.importESModule( "resource://gre/modules/Console.sys.mjs" ); let consoleOptions = { // tip: set maxLogLevel to "debug" and use lazy.log.debug() to create // detailed messages during development. See LOG_LEVELS in Console.sys.mjs // for details. maxLogLevel: "error", maxLogLevelPref: "browser.policies.loglevel", prefix: "BrowserGlue.sys.mjs", }; return new ConsoleAPI(consoleOptions); }); const listeners = { observers: { "gmp-plugin-crash": ["PluginManager"], "plugin-crashed": ["PluginManager"], }, observe(subject, topic, data) { for (let module of this.observers[topic]) { try { lazy[module].observe(subject, topic, data); } catch (e) { console.error(e); } } }, init() { for (let observer of Object.keys(this.observers)) { Services.obs.addObserver(this, observer); } }, }; if (AppConstants.MOZ_UPDATER) { listeners.observers["update-downloading"] = ["UpdateListener"]; listeners.observers["update-staged"] = ["UpdateListener"]; listeners.observers["update-downloaded"] = ["UpdateListener"]; listeners.observers["update-available"] = ["UpdateListener"]; listeners.observers["update-error"] = ["UpdateListener"]; listeners.observers["update-swap"] = ["UpdateListener"]; } // Seconds of idle before trying to create a bookmarks backup. const BOOKMARKS_BACKUP_IDLE_TIME_SEC = 8 * 60; // Minimum interval between backups. We try to not create more than one backup // per interval. const BOOKMARKS_BACKUP_MIN_INTERVAL_DAYS = 1; // Seconds of idle time before the late idle tasks will be scheduled. const LATE_TASKS_IDLE_TIME_SEC = 20; // Time after we stop tracking startup crashes. const STARTUP_CRASHES_END_DELAY_MS = 30 * 1000; /* * OS X has the concept of zero-window sessions and therefore ignores the * browser-lastwindow-close-* topics. */ const OBSERVE_LASTWINDOW_CLOSE_TOPICS = AppConstants.platform != "macosx"; export let BrowserInitState = {}; BrowserInitState.startupIdleTaskPromise = new Promise(resolve => { BrowserInitState._resolveStartupIdleTask = resolve; }); export function BrowserGlue() { XPCOMUtils.defineLazyServiceGetter( this, "_userIdleService", "@mozilla.org/widget/useridleservice;1", "nsIUserIdleService" ); ChromeUtils.defineLazyGetter(this, "_distributionCustomizer", function () { const { DistributionCustomizer } = ChromeUtils.importESModule( "resource:///modules/distribution.sys.mjs" ); return new DistributionCustomizer(); }); XPCOMUtils.defineLazyServiceGetter( this, "AlertsService", "@mozilla.org/alerts-service;1", "nsIAlertsService" ); this._init(); } function WindowsRegPoliciesGetter(wrk, root, regLocation) { wrk.open(root, regLocation, wrk.ACCESS_READ); let policies; if (wrk.hasChild("Mozilla\\" + Services.appinfo.name)) { policies = lazy.WindowsGPOParser.readPolicies(wrk, policies); } wrk.close(); return policies; } function isPrivateBrowsingAllowedInRegistry() { // If there is an attempt to open Private Browsing before // EnterprisePolicies are initialized the Windows registry // can be checked to determine if it is enabled if (Services.policies.status > Ci.nsIEnterprisePolicies.UNINITIALIZED) { // Yield to policies engine if initialized let privateAllowed = Services.policies.isAllowed("privatebrowsing"); lazy.log.debug( `Yield to initialized policies engine: Private Browsing Allowed = ${privateAllowed}` ); return privateAllowed; } if (AppConstants.platform !== "win") { // Not using Windows so no registry, return true lazy.log.debug( "AppConstants.platform is not 'win': Private Browsing allowed" ); return true; } // If all other checks fail only then do we check registry let wrk = Cc["@mozilla.org/windows-registry-key;1"].createInstance( Ci.nsIWindowsRegKey ); let regLocation = "SOFTWARE\\Policies"; let userPolicies, machinePolicies; // Only check HKEY_LOCAL_MACHINE if not in testing if (!Cu.isInAutomation) { machinePolicies = WindowsRegPoliciesGetter( wrk, wrk.ROOT_KEY_LOCAL_MACHINE, regLocation ); } // Check machine policies before checking user policies // HKEY_LOCAL_MACHINE supersedes HKEY_CURRENT_USER so only check // HKEY_CURRENT_USER if the registry key is not present in // HKEY_LOCAL_MACHINE at all if (machinePolicies && "DisablePrivateBrowsing" in machinePolicies) { lazy.log.debug( `DisablePrivateBrowsing in HKEY_LOCAL_MACHINE is ${machinePolicies.DisablePrivateBrowsing}` ); return !(machinePolicies.DisablePrivateBrowsing === 1); } userPolicies = WindowsRegPoliciesGetter( wrk, wrk.ROOT_KEY_CURRENT_USER, regLocation ); if (userPolicies && "DisablePrivateBrowsing" in userPolicies) { lazy.log.debug( `DisablePrivateBrowsing in HKEY_CURRENT_USER is ${userPolicies.DisablePrivateBrowsing}` ); return !(userPolicies.DisablePrivateBrowsing === 1); } // Private browsing allowed if no registry entry exists lazy.log.debug( "No DisablePrivateBrowsing registry entry: Private Browsing allowed" ); return true; } BrowserGlue.prototype = { _saveSession: false, _migrationImportsDefaultBookmarks: false, _placesBrowserInitComplete: false, _isNewProfile: undefined, _defaultCookieBehaviorAtStartup: null, _setPrefToSaveSession: function BG__setPrefToSaveSession(aForce) { if (!this._saveSession && !aForce) { return; } if (!lazy.PrivateBrowsingUtils.permanentPrivateBrowsing) { Services.prefs.setBoolPref( "browser.sessionstore.resume_session_once", true ); } // This method can be called via [NSApplication terminate:] on Mac, which // ends up causing prefs not to be flushed to disk, so we need to do that // explicitly here. See bug 497652. Services.prefs.savePrefFile(null); }, // nsIObserver implementation observe: async function BG_observe(subject, topic, data) { switch (topic) { case "notifications-open-settings": this._openPreferences("privacy-permissions"); break; case "final-ui-startup": this._beforeUIStartup(); break; case "browser-delayed-startup-finished": this._onFirstWindowLoaded(subject); Services.obs.removeObserver(this, "browser-delayed-startup-finished"); break; case "sessionstore-windows-restored": this._onWindowsRestored(); break; case "browser:purge-session-history": // reset the console service's error buffer Services.console.logStringMessage(null); // clear the console (in case it's open) Services.console.reset(); break; case "restart-in-safe-mode": this._onSafeModeRestart(subject); break; case "quit-application-requested": this._onQuitRequest(subject, data); break; case "quit-application-granted": this._onQuitApplicationGranted(); break; case "browser-lastwindow-close-requested": if (OBSERVE_LASTWINDOW_CLOSE_TOPICS) { // The application is not actually quitting, but the last full browser // window is about to be closed. this._onQuitRequest(subject, "lastwindow"); } break; case "browser-lastwindow-close-granted": if (OBSERVE_LASTWINDOW_CLOSE_TOPICS) { this._setPrefToSaveSession(); } break; case "fxaccounts:onverified": this._onThisDeviceConnected(); break; case "fxaccounts:device_connected": this._onDeviceConnected(data); break; case "fxaccounts:verify_login": this._onVerifyLoginNotification(JSON.parse(data)); break; case "fxaccounts:device_disconnected": data = JSON.parse(data); if (data.isLocalDevice) { this._onDeviceDisconnected(); } break; case "fxaccounts:commands:open-uri": this._onDisplaySyncURIs(subject); break; case "session-save": this._setPrefToSaveSession(true); subject.QueryInterface(Ci.nsISupportsPRBool); subject.data = true; break; case "places-init-complete": Services.obs.removeObserver(this, "places-init-complete"); if (!this._migrationImportsDefaultBookmarks) { this._initPlaces(false); } break; case "idle": this._backupBookmarks(); break; case "distribution-customization-complete": Services.obs.removeObserver( this, "distribution-customization-complete" ); // Customization has finished, we don't need the customizer anymore. delete this._distributionCustomizer; break; case "browser-glue-test": // used by tests if (data == "force-ui-migration") { this._migrateUI(); } else if (data == "force-distribution-customization") { this._distributionCustomizer.applyCustomizations(); // To apply distribution bookmarks use "places-init-complete". } else if (data == "test-force-places-init") { this._placesInitialized = false; this._initPlaces(false); } else if (data == "mock-alerts-service") { Object.defineProperty(this, "AlertsService", { value: subject.wrappedJSObject, }); } else if (data == "places-browser-init-complete") { if (this._placesBrowserInitComplete) { Services.obs.notifyObservers(null, "places-browser-init-complete"); } } else if (data == "add-breaches-sync-handler") { this._addBreachesSyncHandler(); } break; case "initial-migration-will-import-default-bookmarks": this._migrationImportsDefaultBookmarks = true; break; case "initial-migration-did-import-default-bookmarks": this._initPlaces(true); break; case "handle-xul-text-link": let linkHandled = subject.QueryInterface(Ci.nsISupportsPRBool); if (!linkHandled.data) { let win = lazy.BrowserWindowTracker.getTopWindow(); if (win) { data = JSON.parse(data); let where = win.whereToOpenLink(data); // Preserve legacy behavior of non-modifier left-clicks // opening in a new selected tab. if (where == "current") { where = "tab"; } win.openTrustedLinkIn(data.href, where); linkHandled.data = true; } } break; case "profile-before-change": // Any component depending on Places should be finalized in // _onPlacesShutdown. Any component that doesn't need to act after // the UI has gone should be finalized in _onQuitApplicationGranted. this._dispose(); break; case "keyword-search": // This notification is broadcast by the docshell when it "fixes up" a // URI that it's been asked to load into a keyword search. let engine = null; try { engine = Services.search.getEngineByName( subject.QueryInterface(Ci.nsISupportsString).data ); } catch (ex) { console.error(ex); } let win = lazy.BrowserWindowTracker.getTopWindow(); lazy.BrowserSearchTelemetry.recordSearch( win.gBrowser.selectedBrowser, engine, "urlbar" ); break; case "xpi-signature-changed": let disabledAddons = JSON.parse(data).disabled; let addons = await lazy.AddonManager.getAddonsByIDs(disabledAddons); if (addons.some(addon => addon)) { this._notifyUnsignedAddonsDisabled(); } break; case "sync-ui-state:update": this._updateFxaBadges(lazy.BrowserWindowTracker.getTopWindow()); break; case "handlersvc-store-initialized": // Initialize PdfJs when running in-process and remote. This only // happens once since PdfJs registers global hooks. If the PdfJs // extension is installed the init method below will be overridden // leaving initialization to the extension. // parent only: configure default prefs, set up pref observers, register // pdf content handler, and initializes parent side message manager // shim for privileged api access. lazy.PdfJs.init(this._isNewProfile); // Allow certain viewable internally types to be opened from downloads. lazy.DownloadsViewableInternally.register(); break; case "app-startup": this._earlyBlankFirstPaint(subject); gThisInstanceIsTaskbarTab = subject.handleFlag("taskbar-tab", false); gThisInstanceIsLaunchOnLogin = subject.handleFlag( "os-autostart", false ); let launchOnLoginPref = "browser.startup.windowsLaunchOnLogin.enabled"; let profileSvc = Cc[ "@mozilla.org/toolkit/profile-service;1" ].getService(Ci.nsIToolkitProfileService); if ( AppConstants.platform == "win" && !profileSvc.startWithLastProfile ) { // If we don't start with last profile, the user // likely sees the profile selector on launch. if (Services.prefs.getBoolPref(launchOnLoginPref)) { Services.telemetry.setEventRecordingEnabled( "launch_on_login", true ); Services.telemetry.recordEvent( "launch_on_login", "last_profile_disable", "startup" ); } Services.prefs.setBoolPref(launchOnLoginPref, false); // Only remove registry key, not shortcut here as we can assume // if a user manually created a shortcut they want this behavior. await lazy.WindowsLaunchOnLogin.removeLaunchOnLoginRegistryKey(); } break; } }, // initialization (called on application startup) _init: function BG__init() { let os = Services.obs; [ "notifications-open-settings", "final-ui-startup", "browser-delayed-startup-finished", "sessionstore-windows-restored", "browser:purge-session-history", "quit-application-requested", "quit-application-granted", "fxaccounts:onverified", "fxaccounts:device_connected", "fxaccounts:verify_login", "fxaccounts:device_disconnected", "fxaccounts:commands:open-uri", "session-save", "places-init-complete", "distribution-customization-complete", "handle-xul-text-link", "profile-before-change", "keyword-search", "restart-in-safe-mode", "xpi-signature-changed", "sync-ui-state:update", "handlersvc-store-initialized", ].forEach(topic => os.addObserver(this, topic, true)); if (OBSERVE_LASTWINDOW_CLOSE_TOPICS) { os.addObserver(this, "browser-lastwindow-close-requested", true); os.addObserver(this, "browser-lastwindow-close-granted", true); } lazy.ActorManagerParent.addJSProcessActors(JSPROCESSACTORS); lazy.ActorManagerParent.addJSWindowActors(JSWINDOWACTORS); this._firstWindowReady = new Promise( resolve => (this._firstWindowLoaded = resolve) ); }, // cleanup (called on application shutdown) _dispose: function BG__dispose() { // AboutHomeStartupCache might write to the cache during // quit-application-granted, so we defer uninitialization // until here. AboutHomeStartupCache.uninit(); if (this._bookmarksBackupIdleTime) { this._userIdleService.removeIdleObserver( this, this._bookmarksBackupIdleTime ); this._bookmarksBackupIdleTime = null; } if (this._lateTasksIdleObserver) { this._userIdleService.removeIdleObserver( this._lateTasksIdleObserver, LATE_TASKS_IDLE_TIME_SEC ); delete this._lateTasksIdleObserver; } if (this._gmpInstallManager) { this._gmpInstallManager.uninit(); delete this._gmpInstallManager; } Services.prefs.removeObserver( "privacy.trackingprotection", this._matchCBCategory ); Services.prefs.removeObserver( "network.cookie.cookieBehavior", this._matchCBCategory ); Services.prefs.removeObserver( "network.cookie.cookieBehavior.pbmode", this._matchCBCategory ); Services.prefs.removeObserver( "network.http.referer.disallowCrossSiteRelaxingDefault", this._matchCBCategory ); Services.prefs.removeObserver( "network.http.referer.disallowCrossSiteRelaxingDefault.top_navigation", this._matchCBCategory ); Services.prefs.removeObserver( "privacy.partition.network_state.ocsp_cache", this._matchCBCategory ); Services.prefs.removeObserver( "privacy.query_stripping.enabled", this._matchCBCategory ); Services.prefs.removeObserver( "privacy.query_stripping.enabled.pbmode", this._matchCBCategory ); Services.prefs.removeObserver( "privacy.fingerprintingProtection", this._matchCBCategory ); Services.prefs.removeObserver( "privacy.fingerprintingProtection.pbmode", this._matchCBCategory ); Services.prefs.removeObserver( ContentBlockingCategoriesPrefs.PREF_CB_CATEGORY, this._updateCBCategory ); Services.prefs.removeObserver( "privacy.trackingprotection", this._setPrefExpectations ); Services.prefs.removeObserver( "browser.contentblocking.features.strict", this._setPrefExpectationsAndUpdate ); }, // runs on startup, before the first command line handler is invoked // (i.e. before the first window is opened) _beforeUIStartup: function BG__beforeUIStartup() { lazy.SessionStartup.init(); // check if we're in safe mode if (Services.appinfo.inSafeMode) { Services.ww.openWindow( null, "chrome://browser/content/safeMode.xhtml", "_blank", "chrome,centerscreen,modal,resizable=no", null ); } // apply distribution customizations this._distributionCustomizer.applyCustomizations(); // handle any UI migration this._migrateUI(); if (!Services.prefs.prefHasUserValue(PREF_PDFJS_ISDEFAULT_CACHE_STATE)) { lazy.PdfJs.checkIsDefault(this._isNewProfile); } listeners.init(); lazy.SessionStore.init(); lazy.BuiltInThemes.maybeInstallActiveBuiltInTheme(); if (AppConstants.MOZ_NORMANDY) { lazy.Normandy.init(); } lazy.SaveToPocket.init(); lazy.ResetPBMPanel.init(); AboutHomeStartupCache.init(); Services.obs.notifyObservers(null, "browser-ui-startup-complete"); }, _checkForOldBuildUpdates() { // check for update if our build is old if ( AppConstants.MOZ_UPDATER && Services.prefs.getBoolPref("app.update.checkInstallTime") ) { let buildID = Services.appinfo.appBuildID; let today = new Date().getTime(); /* eslint-disable no-multi-spaces */ let buildDate = new Date( buildID.slice(0, 4), // year buildID.slice(4, 6) - 1, // months are zero-based. buildID.slice(6, 8), // day buildID.slice(8, 10), // hour buildID.slice(10, 12), // min buildID.slice(12, 14) ) // ms .getTime(); /* eslint-enable no-multi-spaces */ const millisecondsIn24Hours = 86400000; let acceptableAge = Services.prefs.getIntPref("app.update.checkInstallTime.days") * millisecondsIn24Hours; if (buildDate + acceptableAge < today) { Cc["@mozilla.org/updates/update-service;1"] .getService(Ci.nsIApplicationUpdateService) .checkForBackgroundUpdates(); } } }, async _onSafeModeRestart(window) { // prompt the user to confirm let productName = lazy.gBrandBundle.GetStringFromName("brandShortName"); let strings = lazy.gBrowserBundle; let promptTitle = strings.formatStringFromName( "troubleshootModeRestartPromptTitle", [productName] ); let promptMessage = strings.GetStringFromName( "troubleshootModeRestartPromptMessage" ); let restartText = strings.GetStringFromName( "troubleshootModeRestartButton" ); let buttonFlags = Services.prompt.BUTTON_POS_0 * Services.prompt.BUTTON_TITLE_IS_STRING + Services.prompt.BUTTON_POS_1 * Services.prompt.BUTTON_TITLE_CANCEL + Services.prompt.BUTTON_POS_0_DEFAULT; let rv = await Services.prompt.asyncConfirmEx( window.browsingContext, Ci.nsIPrompt.MODAL_TYPE_INTERNAL_WINDOW, promptTitle, promptMessage, buttonFlags, restartText, null, null, null, {} ); if (rv.get("buttonNumClicked") != 0) { return; } let cancelQuit = Cc["@mozilla.org/supports-PRBool;1"].createInstance( Ci.nsISupportsPRBool ); Services.obs.notifyObservers( cancelQuit, "quit-application-requested", "restart" ); if (!cancelQuit.data) { Services.startup.restartInSafeMode(Ci.nsIAppStartup.eAttemptQuit); } }, /** * Show a notification bar offering a reset. * * @param reason * String of either "unused" or "uninstall", specifying the reason * why a profile reset is offered. */ _resetProfileNotification(reason) { let win = lazy.BrowserWindowTracker.getTopWindow(); if (!win) { return; } const { ResetProfile } = ChromeUtils.importESModule( "resource://gre/modules/ResetProfile.sys.mjs" ); if (!ResetProfile.resetSupported()) { return; } let productName = lazy.gBrandBundle.GetStringFromName("brandShortName"); let resetBundle = Services.strings.createBundle( "chrome://global/locale/resetProfile.properties" ); let message; if (reason == "unused") { message = resetBundle.formatStringFromName("resetUnusedProfile.message", [ productName, ]); } else if (reason == "uninstall") { message = resetBundle.formatStringFromName("resetUninstalled.message", [ productName, ]); } else { throw new Error( `Unknown reason (${reason}) given to _resetProfileNotification.` ); } let buttons = [ { label: resetBundle.formatStringFromName( "refreshProfile.resetButton.label", [productName] ), accessKey: resetBundle.GetStringFromName( "refreshProfile.resetButton.accesskey" ), callback() { ResetProfile.openConfirmationDialog(win); }, }, ]; win.gNotificationBox.appendNotification( "reset-profile-notification", { label: message, image: "chrome://global/skin/icons/question-64.png", priority: win.gNotificationBox.PRIORITY_INFO_LOW, }, buttons ); }, _notifyUnsignedAddonsDisabled() { let win = lazy.BrowserWindowTracker.getTopWindow(); if (!win) { return; } let message = win.gNavigatorBundle.getString( "unsignedAddonsDisabled.message" ); let buttons = [ { label: win.gNavigatorBundle.getString( "unsignedAddonsDisabled.learnMore.label" ), accessKey: win.gNavigatorBundle.getString( "unsignedAddonsDisabled.learnMore.accesskey" ), callback() { win.BrowserOpenAddonsMgr("addons://list/extension?unsigned=true"); }, }, ]; win.gNotificationBox.appendNotification( "unsigned-addons-disabled", { label: message, priority: win.gNotificationBox.PRIORITY_WARNING_MEDIUM, }, buttons ); }, _earlyBlankFirstPaint(cmdLine) { let startTime = Cu.now(); if ( AppConstants.platform == "macosx" || Services.startup.wasSilentlyStarted || !Services.prefs.getBoolPref("browser.startup.blankWindow", false) ) { return; } // Until bug 1450626 and bug 1488384 are fixed, skip the blank window when // using a non-default theme. if ( !Services.startup.showedPreXULSkeletonUI && Services.prefs.getCharPref( "extensions.activeThemeID", "default-theme@mozilla.org" ) != "default-theme@mozilla.org" ) { return; } let store = Services.xulStore; let getValue = attr => store.getValue(AppConstants.BROWSER_CHROME_URL, "main-window", attr); let width = getValue("width"); let height = getValue("height"); // The clean profile case isn't handled yet. Return early for now. if (!width || !height) { return; } let browserWindowFeatures = "chrome,all,dialog=no,extrachrome,menubar,resizable,scrollbars,status," + "location,toolbar,personalbar"; // This needs to be set when opening the window to ensure that the AppUserModelID // is set correctly on Windows. Without it, initial launches with `-private-window` // will show up under the regular Firefox taskbar icon first, and then switch // to the Private Browsing icon shortly thereafter. if (cmdLine.findFlag("private-window", false) != -1) { if (isPrivateBrowsingAllowedInRegistry()) { browserWindowFeatures += ",private"; } } let win = Services.ww.openWindow( null, "about:blank", null, browserWindowFeatures, null ); // Hide the titlebar if the actual browser window will draw in it. let hiddenTitlebar = Services.appinfo.drawInTitlebar; if (hiddenTitlebar) { win.windowUtils.setChromeMargin(0, 2, 2, 2); } let docElt = win.document.documentElement; docElt.setAttribute("screenX", getValue("screenX")); docElt.setAttribute("screenY", getValue("screenY")); // The sizemode="maximized" attribute needs to be set before first paint. let sizemode = getValue("sizemode"); if (sizemode == "maximized") { docElt.setAttribute("sizemode", sizemode); // Set the size to use when the user leaves the maximized mode. // The persisted size is the outer size, but the height/width // attributes set the inner size. let appWin = win.docShell.treeOwner .QueryInterface(Ci.nsIInterfaceRequestor) .getInterface(Ci.nsIAppWindow); height -= appWin.outerToInnerHeightDifferenceInCSSPixels; width -= appWin.outerToInnerWidthDifferenceInCSSPixels; docElt.setAttribute("height", height); docElt.setAttribute("width", width); } else { // Setting the size of the window in the features string instead of here // causes the window to grow by the size of the titlebar. win.resizeTo(width, height); } // Set this before showing the window so that graphics code can use it to // decide to skip some expensive code paths (eg. starting the GPU process). docElt.setAttribute("windowtype", "navigator:blank"); // The window becomes visible after OnStopRequest, so make this happen now. win.stop(); ChromeUtils.addProfilerMarker("earlyBlankFirstPaint", startTime); win.openTime = Cu.now(); let { TelemetryTimestamps } = ChromeUtils.importESModule( "resource://gre/modules/TelemetryTimestamps.sys.mjs" ); TelemetryTimestamps.add("blankWindowShown"); }, _firstWindowTelemetry(aWindow) { let scaling = aWindow.devicePixelRatio * 100; try { Services.telemetry.getHistogramById("DISPLAY_SCALING").add(scaling); } catch (ex) {} }, _collectStartupConditionsTelemetry() { let nowSeconds = Math.round(Date.now() / 1000); // Don't include cases where we don't have the pref. This rules out the first install // as well as the first run of a build since this was introduced. These could by some // definitions be referred to as "cold" startups, but probably not since we likely // just wrote many of the files we use to disk. This way we should approximate a lower // bound to the number of cold startups rather than an upper bound. let lastCheckSeconds = Services.prefs.getIntPref( "browser.startup.lastColdStartupCheck", nowSeconds ); Services.prefs.setIntPref( "browser.startup.lastColdStartupCheck", nowSeconds ); try { let secondsSinceLastOSRestart = Services.startup.secondsSinceLastOSRestart; let isColdStartup = nowSeconds - secondsSinceLastOSRestart > lastCheckSeconds; Services.telemetry.scalarSet("startup.is_cold", isColdStartup); Services.telemetry.scalarSet( "startup.seconds_since_last_os_restart", secondsSinceLastOSRestart ); } catch (ex) { console.error(ex); } }, // the first browser window has finished initializing _onFirstWindowLoaded: function BG__onFirstWindowLoaded(aWindow) { lazy.AboutNewTab.init(); lazy.TabCrashHandler.init(); lazy.ProcessHangMonitor.init(); lazy.UrlbarPrefs.updateFirefoxSuggestScenario(); // A channel for "remote troubleshooting" code... let channel = new lazy.WebChannel( "remote-troubleshooting", "remote-troubleshooting" ); channel.listen((id, data, target) => { if (data.command == "request") { let { Troubleshoot } = ChromeUtils.importESModule( "resource://gre/modules/Troubleshoot.sys.mjs" ); Troubleshoot.snapshot().then(snapshotData => { // for privacy we remove crash IDs and all preferences (but bug 1091944 // exists to expose prefs once we are confident of privacy implications) delete snapshotData.crashes; delete snapshotData.modifiedPreferences; delete snapshotData.printingPreferences; channel.send(snapshotData, target); }); } }); // Offer to reset a user's profile if it hasn't been used for 60 days. const OFFER_PROFILE_RESET_INTERVAL_MS = 60 * 24 * 60 * 60 * 1000; let lastUse = Services.appinfo.replacedLockTime; let disableResetPrompt = Services.prefs.getBoolPref( "browser.disableResetPrompt", false ); if ( !disableResetPrompt && lastUse && Date.now() - lastUse >= OFFER_PROFILE_RESET_INTERVAL_MS ) { this._resetProfileNotification("unused"); } else if (AppConstants.platform == "win" && !disableResetPrompt) { // Check if we were just re-installed and offer Firefox Reset let updateChannel; try { updateChannel = ChromeUtils.importESModule( "resource://gre/modules/UpdateUtils.sys.mjs" ).UpdateUtils.UpdateChannel; } catch (ex) {} if (updateChannel) { let uninstalledValue = lazy.WindowsRegistry.readRegKey( Ci.nsIWindowsRegKey.ROOT_KEY_CURRENT_USER, "Software\\Mozilla\\Firefox", `Uninstalled-${updateChannel}` ); let removalSuccessful = lazy.WindowsRegistry.removeRegKey( Ci.nsIWindowsRegKey.ROOT_KEY_CURRENT_USER, "Software\\Mozilla\\Firefox", `Uninstalled-${updateChannel}` ); if (removalSuccessful && uninstalledValue == "True") { this._resetProfileNotification("uninstall"); } } } this._checkForOldBuildUpdates(); // Check if Sync is configured if (Services.prefs.prefHasUserValue("services.sync.username")) { lazy.WeaveService.init(); } lazy.PageThumbs.init(); lazy.NewTabUtils.init(); Services.telemetry.setEventRecordingEnabled( "security.ui.protections", true ); Services.telemetry.setEventRecordingEnabled("security.doh.neterror", true); lazy.PageActions.init(); lazy.DoHController.init(); this._firstWindowTelemetry(aWindow); this._firstWindowLoaded(); this._collectStartupConditionsTelemetry(); // Set the default favicon size for UI views that use the page-icon protocol. lazy.PlacesUtils.favicons.setDefaultIconURIPreferredSize( 16 * aWindow.devicePixelRatio ); this._setPrefExpectationsAndUpdate(); this._matchCBCategory(); // This observes the entire privacy.trackingprotection.* pref tree. Services.prefs.addObserver( "privacy.trackingprotection", this._matchCBCategory ); Services.prefs.addObserver( "network.cookie.cookieBehavior", this._matchCBCategory ); Services.prefs.addObserver( "network.cookie.cookieBehavior.pbmode", this._matchCBCategory ); Services.prefs.addObserver( "network.http.referer.disallowCrossSiteRelaxingDefault", this._matchCBCategory ); Services.prefs.addObserver( "network.http.referer.disallowCrossSiteRelaxingDefault.top_navigation", this._matchCBCategory ); Services.prefs.addObserver( "privacy.partition.network_state.ocsp_cache", this._matchCBCategory ); Services.prefs.addObserver( "privacy.query_stripping.enabled", this._matchCBCategory ); Services.prefs.addObserver( "privacy.query_stripping.enabled.pbmode", this._matchCBCategory ); Services.prefs.addObserver( "privacy.fingerprintingProtection", this._matchCBCategory ); Services.prefs.addObserver( "privacy.fingerprintingProtection.pbmode", this._matchCBCategory ); Services.prefs.addObserver( ContentBlockingCategoriesPrefs.PREF_CB_CATEGORY, this._updateCBCategory ); Services.prefs.addObserver( "media.autoplay.default", this._updateAutoplayPref ); Services.prefs.addObserver( "privacy.trackingprotection", this._setPrefExpectations ); Services.prefs.addObserver( "browser.contentblocking.features.strict", this._setPrefExpectationsAndUpdate ); }, _updateAutoplayPref() { const blocked = Services.prefs.getIntPref("media.autoplay.default", 1); const telemetry = Services.telemetry.getHistogramById( "AUTOPLAY_DEFAULT_SETTING_CHANGE" ); const labels = { 0: "allow", 1: "blockAudible", 5: "blockAll" }; if (blocked in labels) { telemetry.add(labels[blocked]); } }, _setPrefExpectations() { ContentBlockingCategoriesPrefs.setPrefExpectations(); }, _setPrefExpectationsAndUpdate() { ContentBlockingCategoriesPrefs.setPrefExpectations(); ContentBlockingCategoriesPrefs.updateCBCategory(); }, _matchCBCategory() { ContentBlockingCategoriesPrefs.matchCBCategory(); }, _updateCBCategory() { ContentBlockingCategoriesPrefs.updateCBCategory(); }, _recordContentBlockingTelemetry() { Services.telemetry.setEventRecordingEnabled( "security.ui.protectionspopup", Services.prefs.getBoolPref( "security.protectionspopup.recordEventTelemetry" ) ); Services.telemetry.setEventRecordingEnabled( "security.ui.app_menu", Services.prefs.getBoolPref("security.app_menu.recordEventTelemetry") ); let tpEnabled = Services.prefs.getBoolPref( "privacy.trackingprotection.enabled" ); Services.telemetry .getHistogramById("TRACKING_PROTECTION_ENABLED") .add(tpEnabled); let tpPBDisabled = Services.prefs.getBoolPref( "privacy.trackingprotection.pbmode.enabled" ); Services.telemetry .getHistogramById("TRACKING_PROTECTION_PBM_DISABLED") .add(!tpPBDisabled); let cookieBehavior = Services.prefs.getIntPref( "network.cookie.cookieBehavior" ); Services.telemetry.getHistogramById("COOKIE_BEHAVIOR").add(cookieBehavior); let fpEnabled = Services.prefs.getBoolPref( "privacy.trackingprotection.fingerprinting.enabled" ); let cmEnabled = Services.prefs.getBoolPref( "privacy.trackingprotection.cryptomining.enabled" ); let categoryPref; switch ( Services.prefs.getStringPref("browser.contentblocking.category", null) ) { case "standard": categoryPref = 0; break; case "strict": categoryPref = 1; break; case "custom": categoryPref = 2; break; default: // Any other value is unsupported. categoryPref = 3; break; } Services.telemetry.scalarSet( "contentblocking.fingerprinting_blocking_enabled", fpEnabled ); Services.telemetry.scalarSet( "contentblocking.cryptomining_blocking_enabled", cmEnabled ); Services.telemetry.scalarSet("contentblocking.category", categoryPref); }, _recordDataSanitizationPrefs() { Services.telemetry.scalarSet( "datasanitization.privacy_sanitize_sanitizeOnShutdown", Services.prefs.getBoolPref("privacy.sanitize.sanitizeOnShutdown") ); Services.telemetry.scalarSet( "datasanitization.privacy_clearOnShutdown_cookies", Services.prefs.getBoolPref("privacy.clearOnShutdown.cookies") ); Services.telemetry.scalarSet( "datasanitization.privacy_clearOnShutdown_history", Services.prefs.getBoolPref("privacy.clearOnShutdown.history") ); Services.telemetry.scalarSet( "datasanitization.privacy_clearOnShutdown_formdata", Services.prefs.getBoolPref("privacy.clearOnShutdown.formdata") ); Services.telemetry.scalarSet( "datasanitization.privacy_clearOnShutdown_downloads", Services.prefs.getBoolPref("privacy.clearOnShutdown.downloads") ); Services.telemetry.scalarSet( "datasanitization.privacy_clearOnShutdown_cache", Services.prefs.getBoolPref("privacy.clearOnShutdown.cache") ); Services.telemetry.scalarSet( "datasanitization.privacy_clearOnShutdown_sessions", Services.prefs.getBoolPref("privacy.clearOnShutdown.sessions") ); Services.telemetry.scalarSet( "datasanitization.privacy_clearOnShutdown_offlineApps", Services.prefs.getBoolPref("privacy.clearOnShutdown.offlineApps") ); Services.telemetry.scalarSet( "datasanitization.privacy_clearOnShutdown_siteSettings", Services.prefs.getBoolPref("privacy.clearOnShutdown.siteSettings") ); Services.telemetry.scalarSet( "datasanitization.privacy_clearOnShutdown_openWindows", Services.prefs.getBoolPref("privacy.clearOnShutdown.openWindows") ); let exceptions = 0; for (let permission of Services.perms.all) { // We consider just permissions set for http, https and file URLs. if ( permission.type == "cookie" && permission.capability == Ci.nsICookiePermission.ACCESS_SESSION && ["http", "https", "file"].some(scheme => permission.principal.schemeIs(scheme) ) ) { exceptions++; } } Services.telemetry.scalarSet( "datasanitization.session_permission_exceptions", exceptions ); }, /** * Application shutdown handler. */ _onQuitApplicationGranted() { let tasks = [ // This pref must be set here because SessionStore will use its value // on quit-application. () => this._setPrefToSaveSession(), // Call trackStartupCrashEnd here in case the delayed call on startup hasn't // yet occurred (see trackStartupCrashEnd caller in browser.js). () => Services.startup.trackStartupCrashEnd(), () => { if (this._bookmarksBackupIdleTime) { this._userIdleService.removeIdleObserver( this, this._bookmarksBackupIdleTime ); this._bookmarksBackupIdleTime = null; } }, () => lazy.BrowserUsageTelemetry.uninit(), () => lazy.SearchSERPTelemetry.uninit(), () => lazy.SearchSERPDomainToCategoriesMap.uninit(), () => lazy.Interactions.uninit(), () => lazy.PageDataService.uninit(), () => lazy.PageThumbs.uninit(), () => lazy.NewTabUtils.uninit(), () => lazy.Normandy.uninit(), () => lazy.RFPHelper.uninit(), () => lazy.ShoppingUtils.uninit(), () => lazy.ASRouterNewTabHook.destroy(), () => { if (AppConstants.MOZ_UPDATER) { lazy.UpdateListener.reset(); } }, () => { // bug 1839426 - The FOG service needs to be instantiated reliably so it // can perform at-shutdown tasks later in shutdown. Services.fog; }, ]; for (let task of tasks) { try { task(); } catch (ex) { console.error(`Error during quit-application-granted: ${ex}`); if (Cu.isInAutomation) { // This usually happens after the test harness is done collecting // test errors, thus we can't easily add a failure to it. The only // noticeable solution we have is crashing. Cc["@mozilla.org/xpcom/debug;1"] .getService(Ci.nsIDebug2) .abort(ex.filename, ex.lineNumber); } } } }, // Set up a listener to enable/disable the screenshots extension // based on its preference. _monitorScreenshotsPref() { const SCREENSHOTS_PREF = "extensions.screenshots.disabled"; const COMPONENT_PREF = "screenshots.browser.component.enabled"; const ID = "screenshots@mozilla.org"; const _checkScreenshotsPref = async () => { let screenshotsDisabled = Services.prefs.getBoolPref( SCREENSHOTS_PREF, false ); let componentEnabled = Services.prefs.getBoolPref(COMPONENT_PREF, true); let screenshotsAddon = await lazy.AddonManager.getAddonByID(ID); if (screenshotsDisabled) { if (componentEnabled) { lazy.ScreenshotsUtils.uninitialize(); } else if (screenshotsAddon?.isActive) { await screenshotsAddon.disable({ allowSystemAddons: true }); } } else if (componentEnabled) { lazy.ScreenshotsUtils.initialize(); if (screenshotsAddon?.isActive) { await screenshotsAddon.disable({ allowSystemAddons: true }); } } else { try { await screenshotsAddon.enable({ allowSystemAddons: true }); } catch (ex) { console.error(`Error trying to enable screenshots extension: ${ex}`); } lazy.ScreenshotsUtils.uninitialize(); } }; Services.prefs.addObserver(SCREENSHOTS_PREF, _checkScreenshotsPref); Services.prefs.addObserver(COMPONENT_PREF, _checkScreenshotsPref); _checkScreenshotsPref(); }, _monitorWebcompatReporterPref() { const PREF = "extensions.webcompat-reporter.enabled"; const ID = "webcompat-reporter@mozilla.org"; Services.prefs.addObserver(PREF, async () => { let addon = await lazy.AddonManager.getAddonByID(ID); if (!addon) { return; } let enabled = Services.prefs.getBoolPref(PREF, false); if (enabled && !addon.isActive) { await addon.enable({ allowSystemAddons: true }); } else if (!enabled && addon.isActive) { await addon.disable({ allowSystemAddons: true }); } }); }, async _setupSearchDetection() { // There is no pref for this add-on because it shouldn't be disabled. const ID = "addons-search-detection@mozilla.com"; let addon = await lazy.AddonManager.getAddonByID(ID); // first time install of addon and install on firefox update addon = (await lazy.AddonManager.maybeInstallBuiltinAddon( ID, "2.0.0", "resource://builtin-addons/search-detection/" )) || addon; if (!addon.isActive) { addon.enable(); } }, _monitorHTTPSOnlyPref() { const PREF_ENABLED = "dom.security.https_only_mode"; const PREF_WAS_ENABLED = "dom.security.https_only_mode_ever_enabled"; const _checkHTTPSOnlyPref = async () => { const enabled = Services.prefs.getBoolPref(PREF_ENABLED, false); const was_enabled = Services.prefs.getBoolPref(PREF_WAS_ENABLED, false); let value = 0; if (enabled) { value = 1; Services.prefs.setBoolPref(PREF_WAS_ENABLED, true); } else if (was_enabled) { value = 2; } Services.telemetry.scalarSet("security.https_only_mode_enabled", value); }; Services.prefs.addObserver(PREF_ENABLED, _checkHTTPSOnlyPref); _checkHTTPSOnlyPref(); const PREF_PBM_WAS_ENABLED = "dom.security.https_only_mode_ever_enabled_pbm"; const PREF_PBM_ENABLED = "dom.security.https_only_mode_pbm"; const _checkHTTPSOnlyPBMPref = async () => { const enabledPBM = Services.prefs.getBoolPref(PREF_PBM_ENABLED, false); const was_enabledPBM = Services.prefs.getBoolPref( PREF_PBM_WAS_ENABLED, false ); let valuePBM = 0; if (enabledPBM) { valuePBM = 1; Services.prefs.setBoolPref(PREF_PBM_WAS_ENABLED, true); } else if (was_enabledPBM) { valuePBM = 2; } Services.telemetry.scalarSet( "security.https_only_mode_enabled_pbm", valuePBM ); }; Services.prefs.addObserver(PREF_PBM_ENABLED, _checkHTTPSOnlyPBMPref); _checkHTTPSOnlyPBMPref(); }, _monitorIonPref() { const PREF_ION_ID = "toolkit.telemetry.pioneerId"; const _checkIonPref = async () => { for (let win of Services.wm.getEnumerator("navigator:browser")) { win.document.getElementById("ion-button").hidden = !Services.prefs.getStringPref(PREF_ION_ID, null); } }; const windowListener = { onOpenWindow(xulWindow) { const win = xulWindow.docShell.domWindow; win.addEventListener("load", () => { const ionButton = win.document.getElementById("ion-button"); if (ionButton) { ionButton.hidden = !Services.prefs.getStringPref(PREF_ION_ID, null); } }); }, onCloseWindow() {}, }; Services.prefs.addObserver(PREF_ION_ID, _checkIonPref); Services.wm.addListener(windowListener); _checkIonPref(); }, _monitorIonStudies() { const STUDY_ADDON_COLLECTION_KEY = "pioneer-study-addons-v1"; const PREF_ION_NEW_STUDIES_AVAILABLE = "toolkit.telemetry.pioneer-new-studies-available"; const _badgeIcon = async () => { for (let win of Services.wm.getEnumerator("navigator:browser")) { win.document .getElementById("ion-button") .querySelector(".toolbarbutton-badge") .classList.add("feature-callout"); } }; const windowListener = { onOpenWindow(xulWindow) { const win = xulWindow.docShell.domWindow; win.addEventListener("load", () => { const ionButton = win.document.getElementById("ion-button"); if (ionButton) { const badge = ionButton.querySelector(".toolbarbutton-badge"); if ( Services.prefs.getBoolPref(PREF_ION_NEW_STUDIES_AVAILABLE, false) ) { badge.classList.add("feature-callout"); } else { badge.classList.remove("feature-callout"); } } }); }, onCloseWindow() {}, }; // Update all open windows if the pref changes. Services.prefs.addObserver(PREF_ION_NEW_STUDIES_AVAILABLE, _badgeIcon); // Badge any currently-open windows. if (Services.prefs.getBoolPref(PREF_ION_NEW_STUDIES_AVAILABLE, false)) { _badgeIcon(); } lazy.RemoteSettings(STUDY_ADDON_COLLECTION_KEY).on("sync", async event => { Services.prefs.setBoolPref(PREF_ION_NEW_STUDIES_AVAILABLE, true); }); // When a new window opens, check if we need to badge the icon. Services.wm.addListener(windowListener); }, _monitorGPCPref() { const FEATURE_PREF_ENABLED = "privacy.globalprivacycontrol.enabled"; const FUNCTIONALITY_PREF_ENABLED = "privacy.globalprivacycontrol.functionality.enabled"; const PREF_WAS_ENABLED = "privacy.globalprivacycontrol.was_ever_enabled"; const _checkGPCPref = async () => { const feature_enabled = Services.prefs.getBoolPref( FEATURE_PREF_ENABLED, false ); const functionality_enabled = Services.prefs.getBoolPref( FUNCTIONALITY_PREF_ENABLED, false ); const was_enabled = Services.prefs.getBoolPref(PREF_WAS_ENABLED, false); let value = 0; if (feature_enabled && functionality_enabled) { value = 1; Services.prefs.setBoolPref(PREF_WAS_ENABLED, true); } else if (was_enabled) { value = 2; } Services.telemetry.scalarSet( "security.global_privacy_control_enabled", value ); }; Services.prefs.addObserver(FEATURE_PREF_ENABLED, _checkGPCPref); Services.prefs.addObserver(FUNCTIONALITY_PREF_ENABLED, _checkGPCPref); _checkGPCPref(); }, // All initial windows have opened. _onWindowsRestored: function BG__onWindowsRestored() { if (this._windowsWereRestored) { return; } this._windowsWereRestored = true; lazy.BrowserUsageTelemetry.init(); lazy.SearchSERPTelemetry.init(); lazy.Interactions.init(); lazy.PageDataService.init(); lazy.ExtensionsUI.init(); let signingRequired; if (AppConstants.MOZ_REQUIRE_SIGNING) { signingRequired = true; } else { signingRequired = Services.prefs.getBoolPref( "xpinstall.signatures.required" ); } if (signingRequired) { let disabledAddons = lazy.AddonManager.getStartupChanges( lazy.AddonManager.STARTUP_CHANGE_DISABLED ); lazy.AddonManager.getAddonsByIDs(disabledAddons).then(addons => { for (let addon of addons) { if (addon.signedState <= lazy.AddonManager.SIGNEDSTATE_MISSING) { this._notifyUnsignedAddonsDisabled(); break; } } }); } if (AppConstants.MOZ_CRASHREPORTER) { lazy.UnsubmittedCrashHandler.init(); lazy.UnsubmittedCrashHandler.scheduleCheckForUnsubmittedCrashReports(); lazy.FeatureGate.annotateCrashReporter(); lazy.FeatureGate.observePrefChangesForCrashReportAnnotation(); } if (AppConstants.ASAN_REPORTER) { var { AsanReporter } = ChromeUtils.importESModule( "resource://gre/modules/AsanReporter.sys.mjs" ); AsanReporter.init(); } lazy.Sanitizer.onStartup(); this._maybeShowRestoreSessionInfoBar(); this._scheduleStartupIdleTasks(); this._lateTasksIdleObserver = (idleService, topic, data) => { if (topic == "idle") { idleService.removeIdleObserver( this._lateTasksIdleObserver, LATE_TASKS_IDLE_TIME_SEC ); delete this._lateTasksIdleObserver; this._scheduleBestEffortUserIdleTasks(); } }; this._userIdleService.addIdleObserver( this._lateTasksIdleObserver, LATE_TASKS_IDLE_TIME_SEC ); this._monitorWebcompatReporterPref(); this._monitorHTTPSOnlyPref(); this._monitorIonPref(); this._monitorIonStudies(); this._setupSearchDetection(); this._monitorGPCPref(); // Loading the MigrationUtils module does the work of registering the // migration wizard JSWindowActor pair. In case nothing else has done // this yet, load the MigrationUtils so that the wizard is ready to be // used. lazy.MigrationUtils; }, /** * Use this function as an entry point to schedule tasks that * need to run only once after startup, and can be scheduled * by using an idle callback. * * The functions scheduled here will fire from idle callbacks * once every window has finished being restored by session * restore, and it's guaranteed that they will run before * the equivalent per-window idle tasks * (from _schedulePerWindowIdleTasks in browser.js). * * If you have something that can wait even further than the * per-window initialization, and is okay with not being run in some * sessions, please schedule them using * _scheduleBestEffortUserIdleTasks. * Don't be fooled by thinking that the use of the timeout parameter * will delay your function: it will just ensure that it potentially * happens _earlier_ than expected (when the timeout limit has been reached), * but it will not make it happen later (and out of order) compared * to the other ones scheduled together. */ _scheduleStartupIdleTasks() { const idleTasks = [ // It's important that SafeBrowsing is initialized reasonably // early, so we use a maximum timeout for it. { name: "SafeBrowsing.init", task: () => { lazy.SafeBrowsing.init(); }, timeout: 5000, }, { name: "ContextualIdentityService.load", task: async () => { await lazy.ContextualIdentityService.load(); lazy.Discovery.update(); }, }, { name: "PlacesUIUtils.unblockToolbars", task: () => { // We postponed loading bookmarks toolbar content until startup // has finished, so we can start loading it now: lazy.PlacesUIUtils.unblockToolbars(); }, }, { name: "PlacesDBUtils.telemetry", condition: lazy.TelemetryUtils.isTelemetryEnabled, task: () => { lazy.PlacesDBUtils.telemetry().catch(console.error); }, }, // Begin listening for incoming push messages. { name: "PushService.ensureReady", task: () => { try { lazy.PushService.wrappedJSObject.ensureReady(); } catch (ex) { // NS_ERROR_NOT_AVAILABLE will get thrown for the PushService // getter if the PushService is disabled. if (ex.result != Cr.NS_ERROR_NOT_AVAILABLE) { throw ex; } } }, }, { name: "BrowserGlue._recordContentBlockingTelemetry", task: () => { this._recordContentBlockingTelemetry(); }, }, { name: "BrowserGlue._recordDataSanitizationPrefs", task: () => { this._recordDataSanitizationPrefs(); }, }, { name: "enableCertErrorUITelemetry", task: () => { let enableCertErrorUITelemetry = Services.prefs.getBoolPref( "security.certerrors.recordEventTelemetry", true ); Services.telemetry.setEventRecordingEnabled( "security.ui.certerror", enableCertErrorUITelemetry ); Services.telemetry.setEventRecordingEnabled( "security.ui.tlserror", enableCertErrorUITelemetry ); }, }, // Load the Login Manager data from disk off the main thread, some time // after startup. If the data is required before this runs, for example // because a restored page contains a password field, it will be loaded on // the main thread, and this initialization request will be ignored. { name: "Services.logins", task: () => { try { Services.logins; } catch (ex) { console.error(ex); } }, timeout: 3000, }, // Add breach alerts pref observer reasonably early so the pref flip works { name: "_addBreachAlertsPrefObserver", task: () => { this._addBreachAlertsPrefObserver(); }, }, // Report pinning status and the type of shortcut used to launch { name: "pinningStatusTelemetry", condition: AppConstants.platform == "win", task: async () => { let shellService = Cc[ "@mozilla.org/browser/shell-service;1" ].getService(Ci.nsIWindowsShellService); let winTaskbar = Cc["@mozilla.org/windows-taskbar;1"].getService( Ci.nsIWinTaskbar ); try { Services.telemetry.scalarSet( "os.environment.is_taskbar_pinned", await shellService.isCurrentAppPinnedToTaskbarAsync( winTaskbar.defaultGroupId ) ); Services.telemetry.scalarSet( "os.environment.is_taskbar_pinned_private", await shellService.isCurrentAppPinnedToTaskbarAsync( winTaskbar.defaultPrivateGroupId ) ); } catch (ex) { console.error(ex); } let classification; let shortcut; try { shortcut = Services.appinfo.processStartupShortcut; classification = shellService.classifyShortcut(shortcut); } catch (ex) { console.error(ex); } if (!classification) { if (gThisInstanceIsLaunchOnLogin) { classification = "Autostart"; } else if (shortcut) { classification = "OtherShortcut"; } else { classification = "Other"; } } // Because of how taskbar tabs work, it may be classifed as a taskbar // shortcut, in which case we want to overwrite it. if (gThisInstanceIsTaskbarTab) { classification = "TaskbarTab"; } Services.telemetry.scalarSet( "os.environment.launch_method", classification ); }, }, { name: "firefoxBridgeNativeMessaging", condition: (AppConstants.platform == "macosx" || AppConstants.platform == "win") && Services.prefs.getBoolPref("browser.firefoxbridge.enabled", false), task: async () => { await lazy.FirefoxBridgeExtensionUtils.ensureRegistered(); }, }, // Ensure a Private Browsing Shortcut exists. This is needed in case // a user tries to use Windows functionality to pin our Private Browsing // mode icon to the Taskbar (eg: the "Pin to Taskbar" context menu item). // This is also created by the installer, but it's possible that a user // has removed it, or is running out of a zip build. The consequences of not // having a Shortcut for this are that regular Firefox will be pinned instead // of the Private Browsing version -- so it's quite important we do our best // to make sure one is available. // See https://bugzilla.mozilla.org/show_bug.cgi?id=1762994 for additional // background. { name: "ensurePrivateBrowsingShortcutExists", condition: AppConstants.platform == "win" && // Pref'ed off until Private Browsing window separation is enabled by default // to avoid a situation where a user pins the Private Browsing shortcut to // the Taskbar, which will end up launching into a different Taskbar icon. lazy.NimbusFeatures.majorRelease2022.getVariable( "feltPrivacyWindowSeparation" ) && // We don't want a shortcut if it's been disabled, eg: by enterprise policy. lazy.PrivateBrowsingUtils.enabled && // Private Browsing shortcuts for packaged builds come with the package, // if they exist at all. We shouldn't try to create our own. !Services.sysinfo.getProperty("hasWinPackageId") && // If we've ever done this successfully before, don't try again. The // user may have deleted the shortcut, and we don't want to force it // on them. !Services.prefs.getBoolPref( PREF_PRIVATE_BROWSING_SHORTCUT_CREATED, false ), task: async () => { let shellService = Cc[ "@mozilla.org/browser/shell-service;1" ].getService(Ci.nsIWindowsShellService); let winTaskbar = Cc["@mozilla.org/windows-taskbar;1"].getService( Ci.nsIWinTaskbar ); if ( !(await shellService.hasMatchingShortcut( winTaskbar.defaultPrivateGroupId, true )) ) { let appdir = Services.dirsvc.get("GreD", Ci.nsIFile); let exe = appdir.clone(); exe.append(PRIVATE_BROWSING_BINARY); let strings = new Localization( ["branding/brand.ftl", "browser/browser.ftl"], true ); let [desc] = await strings.formatValues([ "private-browsing-shortcut-text-2", ]); await shellService.createShortcut( exe, [], desc, exe, // The code we're calling indexes from 0 instead of 1 PRIVATE_BROWSING_EXE_ICON_INDEX - 1, winTaskbar.defaultPrivateGroupId, "Programs", desc + ".lnk", appdir ); } // We always set this as long as no exception has been thrown. This // ensure that it is `true` both if we created one because it didn't // exist, or if it already existed (most likely because it was created // by the installer). This avoids the need to call `hasMatchingShortcut` // again, which necessarily does pointless I/O. Services.prefs.setBoolPref( PREF_PRIVATE_BROWSING_SHORTCUT_CREATED, true ); }, }, // Report whether Firefox is the default handler for various files types, // in particular, ".pdf". { name: "IsDefaultHandlerForPDF", condition: AppConstants.platform == "win", task: () => { Services.telemetry.keyedScalarSet( "os.environment.is_default_handler", ".pdf", lazy.ShellService.isDefaultHandlerFor(".pdf") ); }, }, // Install built-in themes. We already installed the active built-in // theme, if any, before UI startup. { name: "BuiltInThemes.ensureBuiltInThemes", task: async () => { await lazy.BuiltInThemes.ensureBuiltInThemes(); }, }, { name: "WinTaskbarJumpList.startup", condition: AppConstants.platform == "win", task: () => { // For Windows 7, initialize the jump list module. const WINTASKBAR_CONTRACTID = "@mozilla.org/windows-taskbar;1"; if ( WINTASKBAR_CONTRACTID in Cc && Cc[WINTASKBAR_CONTRACTID].getService(Ci.nsIWinTaskbar).available ) { const { WinTaskbarJumpList } = ChromeUtils.importESModule( "resource:///modules/WindowsJumpLists.sys.mjs" ); WinTaskbarJumpList.startup(); } }, }, // Report macOS Dock status { name: "MacDockSupport.isAppInDock", condition: AppConstants.platform == "macosx", task: () => { try { Services.telemetry.scalarSet( "os.environment.is_kept_in_dock", Cc["@mozilla.org/widget/macdocksupport;1"].getService( Ci.nsIMacDockSupport ).isAppInDock ); } catch (ex) { console.error(ex); } }, }, { name: "BrowserGlue._maybeShowDefaultBrowserPrompt", task: () => { this._maybeShowDefaultBrowserPrompt(); }, }, { name: "BrowserGlue._monitorScreenshotsPref", task: () => { this._monitorScreenshotsPref(); }, }, { name: "trackStartupCrashEndSetTimeout", task: () => { lazy.setTimeout(function () { Services.tm.idleDispatchToMainThread( Services.startup.trackStartupCrashEnd ); }, STARTUP_CRASHES_END_DELAY_MS); }, }, { name: "handlerService.asyncInit", task: () => { let handlerService = Cc[ "@mozilla.org/uriloader/handler-service;1" ].getService(Ci.nsIHandlerService); handlerService.asyncInit(); }, }, { name: "RFPHelper.init", task: () => { lazy.RFPHelper.init(); }, }, { name: "Blocklist.loadBlocklistAsync", task: () => { lazy.Blocklist.loadBlocklistAsync(); }, }, { name: "TabUnloader.init", task: () => { lazy.TabUnloader.init(); }, }, // Run TRR performance measurements for DoH. { name: "doh-rollout.trrRacer.run", task: () => { let enabledPref = "doh-rollout.trrRace.enabled"; let completePref = "doh-rollout.trrRace.complete"; if (Services.prefs.getBoolPref(enabledPref, false)) { if (!Services.prefs.getBoolPref(completePref, false)) { new lazy.TRRRacer().run(() => { Services.prefs.setBoolPref(completePref, true); }); } } else { Services.prefs.addObserver(enabledPref, function observer() { if (Services.prefs.getBoolPref(enabledPref, false)) { Services.prefs.removeObserver(enabledPref, observer); if (!Services.prefs.getBoolPref(completePref, false)) { new lazy.TRRRacer().run(() => { Services.prefs.setBoolPref(completePref, true); }); } } }); } }, }, // FOG doesn't need to be initialized _too_ early because it has a // pre-init buffer. { name: "initializeFOG", task: () => { Services.fog.initializeFOG(); // Register Glean to listen for experiment updates releated to the // "gleanInternalSdk" feature defined in the t/c/nimbus/FeatureManifest.yaml // This feature is intended for internal Glean use only. For features wishing // to set a remote metric configuration, please use the "glean" feature for // the purpose of setting the data-control-plane features via Server Knobs. lazy.NimbusFeatures.gleanInternalSdk.onUpdate(() => { let cfg = lazy.NimbusFeatures.gleanInternalSdk.getVariable( "gleanMetricConfiguration" ); Services.fog.setMetricsFeatureConfig(JSON.stringify(cfg)); }); // Register Glean to listen for experiment updates releated to the // "glean" feature defined in the t/c/nimbus/FeatureManifest.yaml lazy.NimbusFeatures.glean.onUpdate(() => { let cfg = lazy.NimbusFeatures.glean.getVariable( "gleanMetricConfiguration" ); Services.fog.setMetricsFeatureConfig(JSON.stringify(cfg)); }); }, }, // Add the import button if this is the first startup. { name: "PlacesUIUtils.ImportButton", task: async () => { // First check if we've already added the import button, in which // case we should check for events indicating we can remove it. if ( Services.prefs.getBoolPref( "browser.bookmarks.addedImportButton", false ) ) { lazy.PlacesUIUtils.removeImportButtonWhenImportSucceeds(); return; } // Otherwise, check if this is a new profile where we need to add it. // `maybeAddImportButton` will call // `removeImportButtonWhenImportSucceeds`itself if/when it adds the // button. Doing things in this order avoids listening for removal // more than once. if ( this._isNewProfile && // Not in automation: the button changes CUI state, breaking tests !Cu.isInAutomation ) { await lazy.PlacesUIUtils.maybeAddImportButton(); } }, }, // Add the setup button if this is the first startup { name: "AWToolbarButton.SetupButton", task: async () => { if ( // Not in automation: the button changes CUI state, // breaking tests. Check this first, so that the module // doesn't load if it doesn't have to. !Cu.isInAutomation && lazy.AWToolbarButton.hasToolbarButtonEnabled ) { await lazy.AWToolbarButton.maybeAddSetupButton(); } }, }, { name: "ASRouterNewTabHook.createInstance", task: () => { lazy.ASRouterNewTabHook.createInstance(lazy.ASRouterDefaultConfig()); }, }, { name: "BackgroundUpdate", condition: AppConstants.MOZ_UPDATE_AGENT, task: async () => { // Never in automation! This is close to // `UpdateService.disabledForTesting`, but without creating the // service, which can perform a good deal of I/O in order to log its // state. Since this is in the startup path, we avoid all of that. let disabledForTesting = (Cu.isInAutomation || lazy.Marionette.running || lazy.RemoteAgent.running) && Services.prefs.getBoolPref("app.update.disabledForTesting", false); if (!disabledForTesting) { try { await lazy.BackgroundUpdate.scheduleFirefoxMessagingSystemTargetingSnapshotting(); } catch (e) { console.error( "There was an error scheduling Firefox Messaging System targeting snapshotting: ", e ); } await lazy.BackgroundUpdate.maybeScheduleBackgroundUpdateTask(); } }, }, // Login detection service is used in fission to identify high value sites. { name: "LoginDetection.init", task: () => { let loginDetection = Cc[ "@mozilla.org/login-detection-service;1" ].createInstance(Ci.nsILoginDetectionService); loginDetection.init(); }, }, { name: "BrowserGlue._collectTelemetryPiPEnabled", task: () => { this._collectTelemetryPiPEnabled(); }, }, // Schedule a sync (if enabled) after we've loaded { name: "WeaveService", task: async () => { if (lazy.WeaveService.enabled) { await lazy.WeaveService.whenLoaded(); lazy.WeaveService.Weave.Service.scheduler.autoConnect(); } }, }, { name: "unblock-untrusted-modules-thread", condition: AppConstants.platform == "win", task: () => { Services.obs.notifyObservers( null, "unblock-untrusted-modules-thread" ); }, }, { name: "UpdateListener.maybeShowUnsupportedNotification", condition: AppConstants.MOZ_UPDATER, task: () => { lazy.UpdateListener.maybeShowUnsupportedNotification(); }, }, { name: "QuickSuggest.init", task: () => { lazy.QuickSuggest.init(); }, }, { name: "DAPTelemetrySender.startup", condition: lazy.TelemetryUtils.isTelemetryEnabled && lazy.NimbusFeatures.dapTelemetry.getVariable("enabled"), task: () => { lazy.DAPTelemetrySender.startup(); }, }, { name: "ShoppingUtils.init", task: () => { lazy.ShoppingUtils.init(); }, }, { // Starts the JSOracle process for ORB JavaScript validation, if it hasn't started already. name: "start-orb-javascript-oracle", task: () => { ChromeUtils.ensureJSOracleStarted(); }, }, { name: "SearchSERPDomainToCategoriesMap.init", task: () => { lazy.SearchSERPDomainToCategoriesMap.init().catch(console.error); }, }, { name: "BackupService initialization", condition: Services.prefs.getBoolPref("browser.backup.enabled", false), task: () => { lazy.BackupService.init(); }, }, { name: "browser-startup-idle-tasks-finished", task: () => { // Use idleDispatch a second time to run this after the per-window // idle tasks. ChromeUtils.idleDispatch(() => { Services.obs.notifyObservers( null, "browser-startup-idle-tasks-finished" ); BrowserInitState._resolveStartupIdleTask(); }); }, }, // Do NOT add anything after idle tasks finished. ]; for (let task of idleTasks) { if ("condition" in task && !task.condition) { continue; } ChromeUtils.idleDispatch( () => { if (!Services.startup.shuttingDown) { let startTime = Cu.now(); try { task.task(); } catch (ex) { console.error(ex); } finally { ChromeUtils.addProfilerMarker( "startupIdleTask", startTime, task.name ); } } }, task.timeout ? { timeout: task.timeout } : undefined ); } }, /** * Use this function as an entry point to schedule tasks that we hope * to run once per session, at any arbitrary point in time, and which we * are okay with sometimes not running at all. * * This function will be called from an idle observer. Check the value of * LATE_TASKS_IDLE_TIME_SEC to see the current value for this idle * observer. * * Note: this function may never be called if the user is never idle for the * requisite time (LATE_TASKS_IDLE_TIME_SEC). Be certain before adding * something here that it's okay that it never be run. */ _scheduleBestEffortUserIdleTasks() { const idleTasks = [ function primaryPasswordTelemetry() { // Telemetry for primary-password - we do this after a delay as it // can cause IO if NSS/PSM has not already initialized. let tokenDB = Cc["@mozilla.org/security/pk11tokendb;1"].getService( Ci.nsIPK11TokenDB ); let token = tokenDB.getInternalKeyToken(); let mpEnabled = token.hasPassword; if (mpEnabled) { Services.telemetry .getHistogramById("MASTER_PASSWORD_ENABLED") .add(mpEnabled); } }, function GMPInstallManagerSimpleCheckAndInstall() { let { GMPInstallManager } = ChromeUtils.importESModule( "resource://gre/modules/GMPInstallManager.sys.mjs" ); this._gmpInstallManager = new GMPInstallManager(); // We don't really care about the results, if someone is interested they // can check the log. this._gmpInstallManager.simpleCheckAndInstall().catch(() => {}); }.bind(this), function RemoteSettingsInit() { lazy.RemoteSettings.init(); this._addBreachesSyncHandler(); }.bind(this), function PublicSuffixListInit() { lazy.PublicSuffixList.init(); }, function RemoteSecuritySettingsInit() { lazy.RemoteSecuritySettings.init(); }, function CorroborateInit() { if (Services.prefs.getBoolPref("corroborator.enabled", false)) { lazy.Corroborate.init().catch(console.error); } }, function BrowserUsageTelemetryReportProfileCount() { lazy.BrowserUsageTelemetry.reportProfileCount(); }, function reportAllowedAppSources() { lazy.OsEnvironment.reportAllowedAppSources(); }, function searchBackgroundChecks() { Services.search.runBackgroundChecks(); }, function reportInstallationTelemetry() { lazy.BrowserUsageTelemetry.reportInstallationTelemetry(); }, ]; for (let task of idleTasks) { ChromeUtils.idleDispatch(async () => { if (!Services.startup.shuttingDown) { let startTime = Cu.now(); try { await task(); } catch (ex) { console.error(ex); } finally { ChromeUtils.addProfilerMarker( "startupLateIdleTask", startTime, task.name ); } } }); } }, _addBreachesSyncHandler() { if ( Services.prefs.getBoolPref( "signon.management.page.breach-alerts.enabled", false ) ) { lazy .RemoteSettings(lazy.LoginBreaches.REMOTE_SETTINGS_COLLECTION) .on("sync", async event => { await lazy.LoginBreaches.update(event.data.current); }); } }, _addBreachAlertsPrefObserver() { const BREACH_ALERTS_PREF = "signon.management.page.breach-alerts.enabled"; const clearVulnerablePasswordsIfBreachAlertsDisabled = async function () { if (!Services.prefs.getBoolPref(BREACH_ALERTS_PREF)) { await lazy.LoginBreaches.clearAllPotentiallyVulnerablePasswords(); } }; clearVulnerablePasswordsIfBreachAlertsDisabled(); Services.prefs.addObserver( BREACH_ALERTS_PREF, clearVulnerablePasswordsIfBreachAlertsDisabled ); }, _quitSource: "unknown", _registerQuitSource(source) { this._quitSource = source; }, _onQuitRequest: function BG__onQuitRequest(aCancelQuit, aQuitType) { // If user has already dismissed quit request, then do nothing if (aCancelQuit instanceof Ci.nsISupportsPRBool && aCancelQuit.data) { return; } // There are several cases where we won't show a dialog here: // 1. There is only 1 tab open in 1 window // 2. browser.warnOnQuit == false // 3. The browser is currently in Private Browsing mode // 4. The browser will be restarted. // 5. The user has automatic session restore enabled and // browser.sessionstore.warnOnQuit is not set to true. // 6. The user doesn't have automatic session restore enabled // and browser.tabs.warnOnClose is not set to true. // // Otherwise, we will show the "closing multiple tabs" dialog. // // aQuitType == "lastwindow" is overloaded. "lastwindow" is used to indicate // "the last window is closing but we're not quitting (a non-browser window is open)" // and also "we're quitting by closing the last window". if (aQuitType == "restart" || aQuitType == "os-restart") { return; } // browser.warnOnQuit is a hidden global boolean to override all quit prompts. if (!Services.prefs.getBoolPref("browser.warnOnQuit")) { return; } let windowcount = 0; let pagecount = 0; let pinnedcount = 0; for (let win of lazy.BrowserWindowTracker.orderedWindows) { if (win.closed) { continue; } windowcount++; let tabbrowser = win.gBrowser; if (tabbrowser) { pinnedcount += tabbrowser._numPinnedTabs; pagecount += tabbrowser.visibleTabs.length - tabbrowser._numPinnedTabs; } } // No windows open so no need for a warning. if (!windowcount) { return; } // browser.warnOnQuitShortcut is checked when quitting using the shortcut key. // The warning will appear even when only one window/tab is open. For other // methods of quitting, the warning only appears when there is more than one // window or tab open. let shouldWarnForShortcut = this._quitSource == "shortcut" && Services.prefs.getBoolPref("browser.warnOnQuitShortcut"); let shouldWarnForTabs = pagecount >= 2 && Services.prefs.getBoolPref("browser.tabs.warnOnClose"); if (!shouldWarnForTabs && !shouldWarnForShortcut) { return; } if (!aQuitType) { aQuitType = "quit"; } let win = lazy.BrowserWindowTracker.getTopWindow(); // Our prompt for quitting is most important, so replace others. win.gDialogBox.replaceDialogIfOpen(); let titleId, buttonLabelId; if (windowcount > 1) { // More than 1 window. Compose our own message. titleId = { id: "tabbrowser-confirm-close-windows-title", args: { windowCount: windowcount }, }; buttonLabelId = "tabbrowser-confirm-close-windows-button"; } else if (shouldWarnForShortcut) { titleId = "tabbrowser-confirm-close-tabs-with-key-title"; buttonLabelId = "tabbrowser-confirm-close-tabs-with-key-button"; } else { titleId = { id: "tabbrowser-confirm-close-tabs-title", args: { tabCount: pagecount }, }; buttonLabelId = "tabbrowser-confirm-close-tabs-button"; } // The checkbox label is different depending on whether the shortcut // was used to quit or not. let checkboxLabelId; if (shouldWarnForShortcut) { const quitKeyElement = win.document.getElementById("key_quitApplication"); const quitKey = lazy.ShortcutUtils.prettifyShortcut(quitKeyElement); checkboxLabelId = { id: "tabbrowser-confirm-close-tabs-with-key-checkbox", args: { quitKey }, }; } else { checkboxLabelId = "tabbrowser-confirm-close-tabs-checkbox"; } const [title, buttonLabel, checkboxLabel] = win.gBrowser.tabLocalization.formatMessagesSync([ titleId, buttonLabelId, checkboxLabelId, ]); let warnOnClose = { value: true }; let flags = Services.prompt.BUTTON_TITLE_IS_STRING * Services.prompt.BUTTON_POS_0 + Services.prompt.BUTTON_TITLE_CANCEL * Services.prompt.BUTTON_POS_1; // buttonPressed will be 0 for closing, 1 for cancel (don't close/quit) let buttonPressed = Services.prompt.confirmEx( win, title.value, null, flags, buttonLabel.value, null, null, checkboxLabel.value, warnOnClose ); Services.telemetry.setEventRecordingEnabled("close_tab_warning", true); let warnCheckbox = warnOnClose.value ? "checked" : "unchecked"; let sessionWillBeRestored = Services.prefs.getIntPref("browser.startup.page") == 3 || Services.prefs.getBoolPref("browser.sessionstore.resume_session_once"); Services.telemetry.recordEvent( "close_tab_warning", "shown", "application", null, { source: this._quitSource, button: buttonPressed == 0 ? "close" : "cancel", warn_checkbox: warnCheckbox, closing_wins: "" + windowcount, closing_tabs: "" + (pagecount + pinnedcount), will_restore: sessionWillBeRestored ? "yes" : "no", } ); // If the user has unticked the box, and has confirmed closing, stop showing // the warning. if (buttonPressed == 0 && !warnOnClose.value) { if (shouldWarnForShortcut) { Services.prefs.setBoolPref("browser.warnOnQuitShortcut", false); } else { Services.prefs.setBoolPref("browser.tabs.warnOnClose", false); } } this._quitSource = "unknown"; aCancelQuit.data = buttonPressed != 0; }, /** * Initialize Places * - imports the bookmarks html file if bookmarks database is empty, try to * restore bookmarks from a JSON backup if the backend indicates that the * database was corrupt. * * These prefs can be set up by the frontend: * * WARNING: setting these preferences to true will overwite existing bookmarks * * - browser.places.importBookmarksHTML * Set to true will import the bookmarks.html file from the profile folder. * - browser.bookmarks.restore_default_bookmarks * Set to true by safe-mode dialog to indicate we must restore default * bookmarks. */ _initPlaces: function BG__initPlaces(aInitialMigrationPerformed) { if (this._placesInitialized) { throw new Error("Cannot initialize Places more than once"); } this._placesInitialized = true; // We must instantiate the history service since it will tell us if we // need to import or restore bookmarks due to first-run, corruption or // forced migration (due to a major schema change). // If the database is corrupt or has been newly created we should // import bookmarks. let dbStatus = lazy.PlacesUtils.history.databaseStatus; // Show a notification with a "more info" link for a locked places.sqlite. if (dbStatus == lazy.PlacesUtils.history.DATABASE_STATUS_LOCKED) { // Note: initPlaces should always happen when the first window is ready, // in any case, better safe than sorry. this._firstWindowReady.then(() => { this._showPlacesLockedNotificationBox(); this._placesBrowserInitComplete = true; Services.obs.notifyObservers(null, "places-browser-init-complete"); }); return; } let importBookmarks = !aInitialMigrationPerformed && (dbStatus == lazy.PlacesUtils.history.DATABASE_STATUS_CREATE || dbStatus == lazy.PlacesUtils.history.DATABASE_STATUS_CORRUPT); // Check if user or an extension has required to import bookmarks.html let importBookmarksHTML = false; try { importBookmarksHTML = Services.prefs.getBoolPref( "browser.places.importBookmarksHTML" ); if (importBookmarksHTML) { importBookmarks = true; } } catch (ex) {} // Support legacy bookmarks.html format for apps that depend on that format. let autoExportHTML = Services.prefs.getBoolPref( "browser.bookmarks.autoExportHTML", false ); // Do not export. if (autoExportHTML) { // Sqlite.sys.mjs and Places shutdown happen at profile-before-change, thus, // to be on the safe side, this should run earlier. lazy.AsyncShutdown.profileChangeTeardown.addBlocker( "Places: export bookmarks.html", () => lazy.BookmarkHTMLUtils.exportToFile( lazy.BookmarkHTMLUtils.defaultPath ) ); } (async () => { // Check if Safe Mode or the user has required to restore bookmarks from // default profile's bookmarks.html let restoreDefaultBookmarks = false; try { restoreDefaultBookmarks = Services.prefs.getBoolPref( "browser.bookmarks.restore_default_bookmarks" ); if (restoreDefaultBookmarks) { // Ensure that we already have a bookmarks backup for today. await this._backupBookmarks(); importBookmarks = true; } } catch (ex) {} // If the user did not require to restore default bookmarks, or import // from bookmarks.html, we will try to restore from JSON if (importBookmarks && !restoreDefaultBookmarks && !importBookmarksHTML) { // get latest JSON backup let lastBackupFile = await lazy.PlacesBackups.getMostRecentBackup(); if (lastBackupFile) { // restore from JSON backup await lazy.BookmarkJSONUtils.importFromFile(lastBackupFile, { replace: true, source: lazy.PlacesUtils.bookmarks.SOURCES.RESTORE_ON_STARTUP, }); importBookmarks = false; } else { // We have created a new database but we don't have any backup available importBookmarks = true; if (await IOUtils.exists(lazy.BookmarkHTMLUtils.defaultPath)) { // If bookmarks.html is available in current profile import it... importBookmarksHTML = true; } else { // ...otherwise we will restore defaults restoreDefaultBookmarks = true; } } } // Import default bookmarks when necessary. // Otherwise, if any kind of import runs, default bookmarks creation should be // delayed till the import operations has finished. Not doing so would // cause them to be overwritten by the newly imported bookmarks. if (!importBookmarks) { // Now apply distribution customized bookmarks. // This should always run after Places initialization. try { await this._distributionCustomizer.applyBookmarks(); } catch (e) { console.error(e); } } else { // An import operation is about to run. let bookmarksUrl = null; if (restoreDefaultBookmarks) { // User wants to restore the default set of bookmarks shipped with the // browser, those that new profiles start with. bookmarksUrl = "chrome://browser/content/default-bookmarks.html"; } else if (await IOUtils.exists(lazy.BookmarkHTMLUtils.defaultPath)) { bookmarksUrl = PathUtils.toFileURI( lazy.BookmarkHTMLUtils.defaultPath ); } if (bookmarksUrl) { // Import from bookmarks.html file. try { if ( Services.policies.isAllowed("defaultBookmarks") && // Default bookmarks are imported after startup, and they may // influence the outcome of tests, thus it's possible to use // this test-only pref to skip the import. !( Cu.isInAutomation && Services.prefs.getBoolPref( "browser.bookmarks.testing.skipDefaultBookmarksImport", false ) ) ) { await lazy.BookmarkHTMLUtils.importFromURL(bookmarksUrl, { replace: true, source: lazy.PlacesUtils.bookmarks.SOURCES.RESTORE_ON_STARTUP, }); } } catch (e) { console.error("Bookmarks.html file could be corrupt. ", e); } try { // Now apply distribution customized bookmarks. // This should always run after Places initialization. await this._distributionCustomizer.applyBookmarks(); } catch (e) { console.error(e); } } else { console.error(new Error("Unable to find bookmarks.html file.")); } // Reset preferences, so we won't try to import again at next run if (importBookmarksHTML) { Services.prefs.setBoolPref( "browser.places.importBookmarksHTML", false ); } if (restoreDefaultBookmarks) { Services.prefs.setBoolPref( "browser.bookmarks.restore_default_bookmarks", false ); } } // Initialize bookmark archiving on idle. // If the last backup has been created before the last browser session, // and is days old, be more aggressive with the idle timer. let idleTime = BOOKMARKS_BACKUP_IDLE_TIME_SEC; if (!(await lazy.PlacesBackups.hasRecentBackup())) { idleTime /= 2; } this._userIdleService.addIdleObserver(this, idleTime); this._bookmarksBackupIdleTime = idleTime; if (this._isNewProfile) { // New profiles may have existing bookmarks (imported from another browser or // copied into the profile) and we want to show the bookmark toolbar for them // in some cases. await lazy.PlacesUIUtils.maybeToggleBookmarkToolbarVisibility(); } })() .catch(ex => { console.error(ex); }) .then(() => { // NB: deliberately after the catch so that we always do this, even if // we threw halfway through initializing in the Task above. this._placesBrowserInitComplete = true; Services.obs.notifyObservers(null, "places-browser-init-complete"); }); }, /** * If a backup for today doesn't exist, this creates one. */ _backupBookmarks: function BG__backupBookmarks() { return (async function () { let lastBackupFile = await lazy.PlacesBackups.getMostRecentBackup(); // Should backup bookmarks if there are no backups or the maximum // interval between backups elapsed. if ( !lastBackupFile || new Date() - lazy.PlacesBackups.getDateForFile(lastBackupFile) > BOOKMARKS_BACKUP_MIN_INTERVAL_DAYS * 86400000 ) { let maxBackups = Services.prefs.getIntPref( "browser.bookmarks.max_backups" ); await lazy.PlacesBackups.create(maxBackups); } })(); }, /** * Show the notificationBox for a locked places database. */ _showPlacesLockedNotificationBox: async function BG__showPlacesLockedNotificationBox() { var win = lazy.BrowserWindowTracker.getTopWindow(); var buttons = [{ supportPage: "places-locked" }]; var notifyBox = win.gBrowser.getNotificationBox(); var notification = await notifyBox.appendNotification( "places-locked", { label: { "l10n-id": "places-locked-prompt" }, priority: win.gNotificationBox.PRIORITY_CRITICAL_MEDIUM, }, buttons ); notification.persistence = -1; // Until user closes it }, _onThisDeviceConnected() { const [title, body] = lazy.accountsL10n.formatValuesSync([ "account-connection-title", "account-connection-connected", ]); let clickCallback = (subject, topic, data) => { if (topic != "alertclickcallback") { return; } this._openPreferences("sync"); }; this.AlertsService.showAlertNotification( null, title, body, true, null, clickCallback ); }, _migrateXULStoreForDocument(fromURL, toURL) { Array.from(Services.xulStore.getIDsEnumerator(fromURL)).forEach(id => { Array.from(Services.xulStore.getAttributeEnumerator(fromURL, id)).forEach( attr => { let value = Services.xulStore.getValue(fromURL, id, attr); Services.xulStore.setValue(toURL, id, attr, value); } ); }); }, _migrateHashedKeysForXULStoreForDocument(docUrl) { Array.from(Services.xulStore.getIDsEnumerator(docUrl)) .filter(id => id.startsWith("place:")) .forEach(id => { Services.xulStore.removeValue(docUrl, id, "open"); let hashedId = lazy.PlacesUIUtils.obfuscateUrlForXulStore(id); Services.xulStore.setValue(docUrl, hashedId, "open", "true"); }); }, // eslint-disable-next-line complexity _migrateUI() { // Use an increasing number to keep track of the current migration state. // Completely unrelated to the current Firefox release number. const UI_VERSION = 143; const BROWSER_DOCURL = AppConstants.BROWSER_CHROME_URL; if (!Services.prefs.prefHasUserValue("browser.migration.version")) { // This is a new profile, nothing to migrate. Services.prefs.setIntPref("browser.migration.version", UI_VERSION); this._isNewProfile = true; if (AppConstants.platform == "win") { // Ensure that the Firefox Bridge protocols are registered for the new profile. // No-op if they are registered for the user or the local machine already. lazy.FirefoxBridgeExtensionUtils.maybeRegisterFirefoxBridgeProtocols(); } return; } this._isNewProfile = false; let currentUIVersion = Services.prefs.getIntPref( "browser.migration.version" ); if (currentUIVersion >= UI_VERSION) { return; } let xulStore = Services.xulStore; if (currentUIVersion < 90) { this._migrateXULStoreForDocument( "chrome://browser/content/places/historySidebar.xul", "chrome://browser/content/places/historySidebar.xhtml" ); this._migrateXULStoreForDocument( "chrome://browser/content/places/places.xul", "chrome://browser/content/places/places.xhtml" ); this._migrateXULStoreForDocument( "chrome://browser/content/places/bookmarksSidebar.xul", "chrome://browser/content/places/bookmarksSidebar.xhtml" ); } // Clear socks proxy values if they were shared from http, to prevent // websocket breakage after bug 1577862 (see bug 969282). if ( currentUIVersion < 91 && Services.prefs.getBoolPref("network.proxy.share_proxy_settings", false) && Services.prefs.getIntPref("network.proxy.type", 0) == 1 ) { let httpProxy = Services.prefs.getCharPref("network.proxy.http", ""); let httpPort = Services.prefs.getIntPref("network.proxy.http_port", 0); let socksProxy = Services.prefs.getCharPref("network.proxy.socks", ""); let socksPort = Services.prefs.getIntPref("network.proxy.socks_port", 0); if (httpProxy && httpProxy == socksProxy && httpPort == socksPort) { Services.prefs.setCharPref( "network.proxy.socks", Services.prefs.getCharPref("network.proxy.backup.socks", "") ); Services.prefs.setIntPref( "network.proxy.socks_port", Services.prefs.getIntPref("network.proxy.backup.socks_port", 0) ); } } if (currentUIVersion < 92) { // privacy.userContext.longPressBehavior pref was renamed and changed to a boolean let longpress = Services.prefs.getIntPref( "privacy.userContext.longPressBehavior", 0 ); if (longpress == 1) { Services.prefs.setBoolPref( "privacy.userContext.newTabContainerOnLeftClick.enabled", true ); } } if (currentUIVersion < 93) { // The Gecko Profiler Addon is now an internal component. Remove the old // addon, and enable the new UI. function enableProfilerButton(wasAddonActive) { // Enable the feature pref. This will add it to the customization palette, // but not to the the navbar. Services.prefs.setBoolPref( "devtools.performance.popup.feature-flag", true ); if (wasAddonActive) { const { ProfilerMenuButton } = ChromeUtils.importESModule( "resource://devtools/client/performance-new/popup/menu-button.sys.mjs" ); if (!ProfilerMenuButton.isInNavbar()) { // The profiler menu button is not enabled. Turn it on now. const win = lazy.BrowserWindowTracker.getTopWindow(); if (win && win.document) { ProfilerMenuButton.addToNavbar(win.document); } } } } let addonPromise; try { addonPromise = lazy.AddonManager.getAddonByID( "geckoprofiler@mozilla.com" ); } catch (error) { console.error( "Could not access the AddonManager to upgrade the profile. This is most " + "likely because the upgrader is being run from an xpcshell test where " + "the AddonManager is not initialized." ); } Promise.resolve(addonPromise).then(addon => { if (!addon) { // Either the addon wasn't installed, or the call to getAddonByID failed. return; } // Remove the old addon. const wasAddonActive = addon.isActive; addon .uninstall() .catch(console.error) .then(() => enableProfilerButton(wasAddonActive)) .catch(console.error); }, console.error); } // Clear unused socks proxy backup values - see bug 1625773. if (currentUIVersion < 94) { let backup = Services.prefs.getCharPref("network.proxy.backup.socks", ""); let backupPort = Services.prefs.getIntPref( "network.proxy.backup.socks_port", 0 ); let socksProxy = Services.prefs.getCharPref("network.proxy.socks", ""); let socksPort = Services.prefs.getIntPref("network.proxy.socks_port", 0); if (backup == socksProxy) { Services.prefs.clearUserPref("network.proxy.backup.socks"); } if (backupPort == socksPort) { Services.prefs.clearUserPref("network.proxy.backup.socks_port"); } } if (currentUIVersion < 95) { const oldPrefName = "media.autoplay.enabled.user-gestures-needed"; const oldPrefValue = Services.prefs.getBoolPref(oldPrefName, true); const newPrefValue = oldPrefValue ? 0 : 1; Services.prefs.setIntPref("media.autoplay.blocking_policy", newPrefValue); Services.prefs.clearUserPref(oldPrefName); } if (currentUIVersion < 96) { const oldPrefName = "browser.urlbar.openViewOnFocus"; const oldPrefValue = Services.prefs.getBoolPref(oldPrefName, true); Services.prefs.setBoolPref( "browser.urlbar.suggest.topsites", oldPrefValue ); Services.prefs.clearUserPref(oldPrefName); } if (currentUIVersion < 97) { let userCustomizedWheelMax = Services.prefs.prefHasUserValue( "general.smoothScroll.mouseWheel.durationMaxMS" ); let userCustomizedWheelMin = Services.prefs.prefHasUserValue( "general.smoothScroll.mouseWheel.durationMinMS" ); if (!userCustomizedWheelMin && !userCustomizedWheelMax) { // If the user has an existing profile but hasn't customized the wheel // animation duration, they will now get the new default values. This // condition used to set a migrationPercent pref to 0, so that users // upgrading an older profile would gradually have their wheel animation // speed migrated to the new values. However, that "gradual migration" // was phased out by FF 86, so we don't need to set that pref anymore. } else if (userCustomizedWheelMin && !userCustomizedWheelMax) { // If they customized just one of the two, save the old value for the // other one as well, because the two values go hand-in-hand and we // don't want to move just one to a new value and leave the other one // at a customized value. In both of these cases, we leave the "migration // complete" percentage at 100, because they have customized this and // don't need any further migration. Services.prefs.setIntPref( "general.smoothScroll.mouseWheel.durationMaxMS", 400 ); } else if (!userCustomizedWheelMin && userCustomizedWheelMax) { // Same as above case, but for the other pref. Services.prefs.setIntPref( "general.smoothScroll.mouseWheel.durationMinMS", 200 ); } else { // The last remaining case is if they customized both values, in which // case also don't need to do anything; the user's customized values // will be retained and respected. } } if (currentUIVersion < 98) { Services.prefs.clearUserPref("browser.search.cohort"); } if (currentUIVersion < 99) { Services.prefs.clearUserPref("security.tls.version.enable-deprecated"); } if (currentUIVersion < 102) { // In Firefox 83, we moved to a dynamic button, so it needs to be removed // from default placement. This is done early enough that it doesn't // impact adding new managed bookmarks. const { CustomizableUI } = ChromeUtils.importESModule( "resource:///modules/CustomizableUI.sys.mjs" ); CustomizableUI.removeWidgetFromArea("managed-bookmarks"); } // We have to rerun these because we had to use 102 on beta. // They were 101 and 102 before. if (currentUIVersion < 103) { // Set a pref if the bookmarks toolbar was already visible, // so we can keep it visible when navigating away from newtab let bookmarksToolbarWasVisible = Services.xulStore.getValue( BROWSER_DOCURL, "PersonalToolbar", "collapsed" ) == "false"; if (bookmarksToolbarWasVisible) { // Migrate the user to the "always visible" value. See firefox.js for // the other possible states. Services.prefs.setCharPref( "browser.toolbars.bookmarks.visibility", "always" ); } Services.xulStore.removeValue( BROWSER_DOCURL, "PersonalToolbar", "collapsed" ); Services.prefs.clearUserPref( "browser.livebookmarks.migrationAttemptsLeft" ); } // For existing profiles, continue putting bookmarks in the // "other bookmarks" folder. if (currentUIVersion < 104) { Services.prefs.setCharPref( "browser.bookmarks.defaultLocation", "unfiled" ); } // Renamed and flipped the logic of a pref to make its purpose more clear. if (currentUIVersion < 105) { const oldPrefName = "browser.urlbar.imeCompositionClosesPanel"; const oldPrefValue = Services.prefs.getBoolPref(oldPrefName, true); Services.prefs.setBoolPref( "browser.urlbar.keepPanelOpenDuringImeComposition", !oldPrefValue ); Services.prefs.clearUserPref(oldPrefName); } // Initialize the new browser.urlbar.showSuggestionsBeforeGeneral pref. if (currentUIVersion < 106) { lazy.UrlbarPrefs.initializeShowSearchSuggestionsFirstPref(); } if (currentUIVersion < 107) { // Migrate old http URIs for mailto handlers to their https equivalents. // The handler service will do this. We need to wait with migrating // until the handler service has started up, so just set a pref here. const kPref = "browser.handlers.migrations"; // We might have set up another migration further up. Create an array, // and drop empty strings resulting from the `split`: let migrations = Services.prefs .getCharPref(kPref, "") .split(",") .filter(x => !!x); migrations.push("secure-mail"); Services.prefs.setCharPref(kPref, migrations.join(",")); } if (currentUIVersion < 108) { // Migrate old ctrlTab pref to new ctrlTab pref let defaultValue = false; let oldPrefName = "browser.ctrlTab.recentlyUsedOrder"; let oldPrefDefault = true; // Use old pref value if the user used Ctrl+Tab before, elsewise use new default value if (Services.prefs.getBoolPref("browser.engagement.ctrlTab.has-used")) { let newPrefValue = Services.prefs.getBoolPref( oldPrefName, oldPrefDefault ); Services.prefs.setBoolPref( "browser.ctrlTab.sortByRecentlyUsed", newPrefValue ); } else { Services.prefs.setBoolPref( "browser.ctrlTab.sortByRecentlyUsed", defaultValue ); } } if (currentUIVersion < 109) { // Migrate old pref to new pref if ( Services.prefs.prefHasUserValue("signon.recipes.remoteRecipesEnabled") ) { // Fetch the previous value of signon.recipes.remoteRecipesEnabled and assign it to signon.recipes.remoteRecipes.enabled. Services.prefs.setBoolPref( "signon.recipes.remoteRecipes.enabled", Services.prefs.getBoolPref( "signon.recipes.remoteRecipesEnabled", true ) ); //Then clear user pref Services.prefs.clearUserPref("signon.recipes.remoteRecipesEnabled"); } } if (currentUIVersion < 120) { // Migrate old titlebar bool pref to new int-based one. const oldPref = "browser.tabs.drawInTitlebar"; const newPref = "browser.tabs.inTitlebar"; if (Services.prefs.prefHasUserValue(oldPref)) { // We may have int prefs for builds between bug 1736518 and bug 1739539. const oldPrefType = Services.prefs.getPrefType(oldPref); if (oldPrefType == Services.prefs.PREF_BOOL) { Services.prefs.setIntPref( newPref, Services.prefs.getBoolPref(oldPref) ? 1 : 0 ); } else { Services.prefs.setIntPref( newPref, Services.prefs.getIntPref(oldPref) ); } Services.prefs.clearUserPref(oldPref); } } if (currentUIVersion < 121) { // Migrate stored uris and convert them to use hashed keys this._migrateHashedKeysForXULStoreForDocument(BROWSER_DOCURL); this._migrateHashedKeysForXULStoreForDocument( "chrome://browser/content/places/bookmarksSidebar.xhtml" ); this._migrateHashedKeysForXULStoreForDocument( "chrome://browser/content/places/historySidebar.xhtml" ); } if (currentUIVersion < 122) { // Migrate xdg-desktop-portal pref from old to new prefs. try { const oldPref = "widget.use-xdg-desktop-portal"; if (Services.prefs.getBoolPref(oldPref)) { Services.prefs.setIntPref( "widget.use-xdg-desktop-portal.file-picker", 1 ); Services.prefs.setIntPref( "widget.use-xdg-desktop-portal.mime-handler", 1 ); } Services.prefs.clearUserPref(oldPref); } catch (ex) {} } // Bug 1745248: Due to multiple backouts, do not use UI Version 123 // as this version is most likely set for the Nightly channel if (currentUIVersion < 124) { // Migrate "extensions.formautofill.available" and // "extensions.formautofill.creditCards.available" from old to new prefs const oldFormAutofillModule = "extensions.formautofill.available"; const oldCreditCardsAvailable = "extensions.formautofill.creditCards.available"; const newCreditCardsAvailable = "extensions.formautofill.creditCards.supported"; const newAddressesAvailable = "extensions.formautofill.addresses.supported"; if (Services.prefs.prefHasUserValue(oldFormAutofillModule)) { let moduleAvailability = Services.prefs.getCharPref( oldFormAutofillModule ); if (moduleAvailability == "on") { Services.prefs.setCharPref(newAddressesAvailable, moduleAvailability); Services.prefs.setCharPref( newCreditCardsAvailable, Services.prefs.getBoolPref(oldCreditCardsAvailable) ? "on" : "off" ); } if (moduleAvailability == "off") { Services.prefs.setCharPref( newCreditCardsAvailable, moduleAvailability ); Services.prefs.setCharPref(newAddressesAvailable, moduleAvailability); } } // after migrating, clear old prefs so we can remove them later. Services.prefs.clearUserPref(oldFormAutofillModule); Services.prefs.clearUserPref(oldCreditCardsAvailable); } if (currentUIVersion < 125) { // Bug 1756243 - Clear PiP cached coordinates since we changed their // coordinate space. const PIP_PLAYER_URI = "chrome://global/content/pictureinpicture/player.xhtml"; try { for (let value of ["left", "top", "width", "height"]) { Services.xulStore.removeValue( PIP_PLAYER_URI, "picture-in-picture", value ); } } catch (ex) { console.error("Failed to clear XULStore PiP values: ", ex); } } function migrateXULAttributeToStyle(url, id, attr) { try { let value = Services.xulStore.getValue(url, id, attr); if (value) { Services.xulStore.setValue(url, id, "style", `${attr}: ${value}px;`); } } catch (ex) { console.error(`Error migrating ${id}'s ${attr} value: `, ex); } } // Bug 1792748 used version 129 with a buggy variant of the sidebar width // migration. This version is already in use in the nightly channel, so it // shouldn't be used. // Bug 1793366: migrate sidebar persisted attribute from width to style. if (currentUIVersion < 130) { migrateXULAttributeToStyle(BROWSER_DOCURL, "sidebar-box", "width"); } // Migration 131 was moved to 133 to allow for an uplift. if (currentUIVersion < 132) { // These attributes are no longer persisted, thus remove them from xulstore. for (let url of [ "chrome://browser/content/places/bookmarkProperties.xhtml", "chrome://browser/content/places/bookmarkProperties2.xhtml", ]) { for (let attr of ["width", "screenX", "screenY"]) { xulStore.removeValue(url, "bookmarkproperties", attr); } } } if (currentUIVersion < 133) { xulStore.removeValue(BROWSER_DOCURL, "urlbar-container", "width"); } // Migration 134 was removed because it was no longer necessary. if (currentUIVersion < 135 && AppConstants.platform == "linux") { // Avoid changing titlebar setting for users that used to had it off. try { if (!Services.prefs.prefHasUserValue("browser.tabs.inTitlebar")) { let de = Services.appinfo.desktopEnvironment; let oldDefault = de.includes("gnome") || de.includes("pantheon"); if (!oldDefault) { Services.prefs.setIntPref("browser.tabs.inTitlebar", 0); } } } catch (e) { console.error("Error migrating tabsInTitlebar setting", e); } } if (currentUIVersion < 136) { migrateXULAttributeToStyle( "chrome://browser/content/places/places.xhtml", "placesList", "width" ); } if (currentUIVersion < 137) { // The default value for enabling smooth scrolls is now false if the // user prefers reduced motion. If the value was previously set, do // not reset it, but if it was not explicitly set preserve the old // default value. if ( !Services.prefs.prefHasUserValue("general.smoothScroll") && Services.appinfo.prefersReducedMotion ) { Services.prefs.setBoolPref("general.smoothScroll", true); } } if (currentUIVersion < 138) { // Bug 1757297: Change scheme of all existing 'https-only-load-insecure' // permissions with https scheme to http scheme. try { Services.perms .getAllByTypes(["https-only-load-insecure"]) .filter(permission => permission.principal.schemeIs("https")) .forEach(permission => { const capability = permission.capability; const uri = permission.principal.URI.mutate() .setScheme("http") .finalize(); const principal = Services.scriptSecurityManager.createContentPrincipal(uri, {}); Services.perms.removePermission(permission); Services.perms.addFromPrincipal( principal, "https-only-load-insecure", capability ); }); } catch (e) { console.error("Error migrating https-only-load-insecure permission", e); } } if (currentUIVersion < 139) { // Reset the default permissions to ALLOW_ACTION to rollback issues for // affected users, see Bug 1579517 // originInfo in the format [origin, type] [ ["https://www.mozilla.org", "uitour"], ["https://support.mozilla.org", "uitour"], ["about:home", "uitour"], ["about:newtab", "uitour"], ["https://addons.mozilla.org", "install"], ["https://support.mozilla.org", "remote-troubleshooting"], ["about:welcome", "autoplay-media"], ].forEach(originInfo => { // Reset permission on the condition that it is set to // UNKNOWN_ACTION, we want to prevent resetting user // manipulated permissions if ( Services.perms.UNKNOWN_ACTION == Services.perms.testPermissionFromPrincipal( Services.scriptSecurityManager.createContentPrincipalFromOrigin( originInfo[0] ), originInfo[1] ) ) { // Adding permissions which have default values does not create // new permissions, but rather remove the UNKNOWN_ACTION permission // overrides. User's not affected by Bug 1579517 will not be affected by this addition. Services.perms.addFromPrincipal( Services.scriptSecurityManager.createContentPrincipalFromOrigin( originInfo[0] ), originInfo[1], Services.perms.ALLOW_ACTION ); } }); } if (currentUIVersion < 140) { // Remove browser.fixup.alternate.enabled pref in Bug 1850902. Services.prefs.clearUserPref("browser.fixup.alternate.enabled"); } if (currentUIVersion < 141) { for (const filename of ["signons.sqlite", "signons.sqlite.corrupt"]) { const filePath = PathUtils.join(PathUtils.profileDir, filename); IOUtils.remove(filePath, { ignoreAbsent: true }).catch(console.error); } } if (currentUIVersion < 142) { // Bug 1860392 - Remove incorrectly persisted theming values from sidebar style. try { let value = xulStore.getValue(BROWSER_DOCURL, "sidebar-box", "style"); if (value) { // Remove custom properties. value = value .split(";") .filter(v => !v.trim().startsWith("--")) .join(";"); xulStore.setValue(BROWSER_DOCURL, "sidebar-box", "style", value); } } catch (ex) { console.error(ex); } } if (currentUIVersion < 143) { if (AppConstants.platform == "win") { // In Firefox 122, we enabled the firefox and firefox-private protocols. // We switched over to using firefox-bridge and firefox-private-bridge, // but we want to clean up the use of the other protocols. lazy.FirefoxBridgeExtensionUtils.maybeDeleteBridgeProtocolRegistryEntries(); // Register the new firefox bridge related protocols now lazy.FirefoxBridgeExtensionUtils.maybeRegisterFirefoxBridgeProtocols(); // Clean up the old user prefs from FX 122 Services.prefs.clearUserPref( "network.protocol-handler.external.firefox" ); Services.prefs.clearUserPref( "network.protocol-handler.external.firefox-private" ); Services.prefs.clearUserPref("browser.shell.customProtocolsRegistered"); } } // Update the migration version. Services.prefs.setIntPref("browser.migration.version", UI_VERSION); }, async _showUpgradeDialog() { const data = await lazy.OnboardingMessageProvider.getUpgradeMessage(); const { gBrowser } = lazy.BrowserWindowTracker.getTopWindow(); // We'll be adding a new tab open the tab-modal dialog in. let tab; const upgradeTabsProgressListener = { onLocationChange(aBrowser) { if (aBrowser === tab.linkedBrowser) { lazy.setTimeout(() => { // We're now far enough along in the load that we no longer have to // worry about a call to onLocationChange triggering SubDialog.abort, // so display the dialog const config = { type: "SHOW_SPOTLIGHT", data, }; lazy.SpecialMessageActions.handleAction(config, tab.linkedBrowser); gBrowser.removeTabsProgressListener(upgradeTabsProgressListener); }, 0); } }, }; // Make sure we're ready to show the dialog once onLocationChange gets // called. gBrowser.addTabsProgressListener(upgradeTabsProgressListener); tab = gBrowser.addTrustedTab("about:home", { relatedToCurrent: true, }); gBrowser.selectedTab = tab; }, async _showAboutWelcomeModal() { const { gBrowser } = lazy.BrowserWindowTracker.getTopWindow(); const data = await lazy.NimbusFeatures.aboutwelcome.getAllVariables(); const config = { type: "SHOW_SPOTLIGHT", data: { content: { template: "multistage", id: data?.id || "ABOUT_WELCOME_MODAL", backdrop: data?.backdrop, screens: data?.screens, UTMTerm: data?.UTMTerm, }, }, }; lazy.SpecialMessageActions.handleAction(config, gBrowser); }, async _maybeShowDefaultBrowserPrompt() { // Highest priority is about:welcome window modal experiment // Second highest priority is the upgrade dialog, which can include a "primary // browser" request and is limited in various ways, e.g., major upgrades. if ( lazy.BrowserHandler.firstRunProfile && lazy.NimbusFeatures.aboutwelcome.getVariable("showModal") ) { this._showAboutWelcomeModal(); return; } const dialogVersion = 106; const dialogVersionPref = "browser.startup.upgradeDialog.version"; const dialogReason = await (async () => { if (!lazy.BrowserHandler.majorUpgrade) { return "not-major"; } const lastVersion = Services.prefs.getIntPref(dialogVersionPref, 0); if (lastVersion > dialogVersion) { return "newer-shown"; } if (lastVersion === dialogVersion) { return "already-shown"; } // Check the default branch as enterprise policies can set prefs there. const defaultPrefs = Services.prefs.getDefaultBranch(""); if ( !defaultPrefs.getBoolPref( "browser.messaging-system.whatsNewPanel.enabled", true ) ) { return "no-whatsNew"; } if (!defaultPrefs.getBoolPref("browser.aboutwelcome.enabled", true)) { return "no-welcome"; } if (!Services.policies.isAllowed("postUpdateCustomPage")) { return "disallow-postUpdate"; } const useMROnboarding = lazy.NimbusFeatures.majorRelease2022.getVariable("onboarding"); const showUpgradeDialog = useMROnboarding ?? lazy.NimbusFeatures.upgradeDialog.getVariable("enabled"); return showUpgradeDialog ? "" : "disabled"; })(); // Record why the dialog is showing or not. Services.telemetry.setEventRecordingEnabled("upgrade_dialog", true); Services.telemetry.recordEvent( "upgrade_dialog", "trigger", "reason", dialogReason || "satisfied" ); // Show the upgrade dialog if allowed and remember the version. if (!dialogReason) { Services.prefs.setIntPref(dialogVersionPref, dialogVersion); this._showUpgradeDialog(); return; } const willPrompt = await DefaultBrowserCheck.willCheckDefaultBrowser( /* isStartupCheck */ true ); if (willPrompt) { let win = lazy.BrowserWindowTracker.getTopWindow(); DefaultBrowserCheck.prompt(win); } else if (await lazy.QuickSuggest.maybeShowOnboardingDialog()) { return; } await lazy.ASRouter.waitForInitialized; lazy.ASRouter.sendTriggerMessage({ browser: lazy.BrowserWindowTracker.getTopWindow()?.gBrowser.selectedBrowser, // triggerId and triggerContext id: "defaultBrowserCheck", context: { willShowDefaultPrompt: willPrompt, source: "startup" }, }); }, /** * Only show the infobar when canRestoreLastSession and the pref value == 1 */ async _maybeShowRestoreSessionInfoBar() { let count = Services.prefs.getIntPref( "browser.startup.couldRestoreSession.count", 0 ); if (count < 0 || count >= 2) { return; } if (count == 0) { // We don't show the infobar right after the update which establishes this pref // Increment the counter so we can consider it next time Services.prefs.setIntPref( "browser.startup.couldRestoreSession.count", ++count ); return; } const win = lazy.BrowserWindowTracker.getTopWindow(); // We've restarted at least once; we will show the notification if possible. // We can't do that if there's no session to restore, or this is a private window. if ( !lazy.SessionStore.canRestoreLastSession || lazy.PrivateBrowsingUtils.isWindowPrivate(win) ) { return; } Services.prefs.setIntPref( "browser.startup.couldRestoreSession.count", ++count ); const messageFragment = win.document.createDocumentFragment(); const message = win.document.createElement("span"); const icon = win.document.createElement("img"); icon.src = "chrome://browser/skin/menu.svg"; icon.setAttribute("data-l10n-name", "icon"); icon.className = "inline-icon"; message.appendChild(icon); messageFragment.appendChild(message); win.document.l10n.setAttributes( message, "restore-session-startup-suggestion-message" ); const buttons = [ { "l10n-id": "restore-session-startup-suggestion-button", primary: true, callback: () => { win.PanelUI.selectAndMarkItem([ "appMenu-history-button", "appMenu-restoreSession", ]); }, }, ]; const notifyBox = win.gBrowser.getNotificationBox(); const notification = await notifyBox.appendNotification( "startup-restore-session-suggestion", { label: messageFragment, priority: notifyBox.PRIORITY_INFO_MEDIUM, }, buttons ); // Don't allow it to be immediately hidden: notification.timeout = Date.now() + 3000; }, /** * Open preferences even if there are no open windows. */ _openPreferences(...args) { let chromeWindow = lazy.BrowserWindowTracker.getTopWindow(); if (chromeWindow) { chromeWindow.openPreferences(...args); return; } if (Services.appShell.hiddenDOMWindow.openPreferences) { Services.appShell.hiddenDOMWindow.openPreferences(...args); } }, _openURLInNewWindow(url) { let urlString = Cc["@mozilla.org/supports-string;1"].createInstance( Ci.nsISupportsString ); urlString.data = url; return new Promise(resolve => { let win = Services.ww.openWindow( null, AppConstants.BROWSER_CHROME_URL, "_blank", "chrome,all,dialog=no", urlString ); win.addEventListener( "load", () => { resolve(win); }, { once: true } ); }); }, /** * Called as an observer when Sync's "display URIs" notification is fired. * * We open the received URIs in background tabs. */ async _onDisplaySyncURIs(data) { try { // The payload is wrapped weirdly because of how Sync does notifications. const URIs = data.wrappedJSObject.object; // win can be null, but it's ok, we'll assign it later in openTab() let win = lazy.BrowserWindowTracker.getTopWindow({ private: false }); const openTab = async URI => { let tab; if (!win) { win = await this._openURLInNewWindow(URI.uri); let tabs = win.gBrowser.tabs; tab = tabs[tabs.length - 1]; } else { tab = win.gBrowser.addWebTab(URI.uri); } tab.attention = true; return tab; }; const firstTab = await openTab(URIs[0]); await Promise.all(URIs.slice(1).map(URI => openTab(URI))); const deviceName = URIs[0].sender && URIs[0].sender.name; let titleL10nId, body; if (URIs.length == 1) { // Due to bug 1305895, tabs from iOS may not have device information, so // we have separate strings to handle those cases. (See Also // unnamedTabsArrivingNotificationNoDevice.body below) titleL10nId = deviceName ? { id: "account-single-tab-arriving-from-device-title", args: { deviceName }, } : { id: "account-single-tab-arriving-title" }; // Use the page URL as the body. We strip the fragment and query (after // the `?` and `#` respectively) to reduce size, and also format it the // same way that the url bar would. let url = URIs[0].uri.replace(/([?#]).*$/, "$1"); const wasTruncated = url.length < URIs[0].uri.length; url = lazy.BrowserUIUtils.trimURL(url); if (wasTruncated) { body = await lazy.accountsL10n.formatValue( "account-single-tab-arriving-truncated-url", { url } ); } else { body = url; } } else { titleL10nId = { id: "account-multiple-tabs-arriving-title" }; const allKnownSender = URIs.every(URI => URI.sender != null); const allSameDevice = allKnownSender && URIs.every(URI => URI.sender.id == URIs[0].sender.id); let bodyL10nId; if (allSameDevice) { bodyL10nId = deviceName ? "account-multiple-tabs-arriving-from-single-device" : "account-multiple-tabs-arriving-from-unknown-device"; } else { bodyL10nId = "account-multiple-tabs-arriving-from-multiple-devices"; } body = await lazy.accountsL10n.formatValue(bodyL10nId, { deviceName, tabCount: URIs.length, }); } const title = await lazy.accountsL10n.formatValue(titleL10nId); const clickCallback = (obsSubject, obsTopic, obsData) => { if (obsTopic == "alertclickcallback") { win.gBrowser.selectedTab = firstTab; } }; // Specify an icon because on Windows no icon is shown at the moment let imageURL; if (AppConstants.platform == "win") { imageURL = "chrome://branding/content/icon64.png"; } this.AlertsService.showAlertNotification( imageURL, title, body, true, null, clickCallback ); } catch (ex) { console.error("Error displaying tab(s) received by Sync: ", ex); } }, async _onVerifyLoginNotification({ body, title, url }) { let tab; let imageURL; if (AppConstants.platform == "win") { imageURL = "chrome://branding/content/icon64.png"; } let win = lazy.BrowserWindowTracker.getTopWindow({ private: false }); if (!win) { win = await this._openURLInNewWindow(url); let tabs = win.gBrowser.tabs; tab = tabs[tabs.length - 1]; } else { tab = win.gBrowser.addWebTab(url); } tab.attention = true; let clickCallback = (subject, topic, data) => { if (topic != "alertclickcallback") { return; } win.gBrowser.selectedTab = tab; }; try { this.AlertsService.showAlertNotification( imageURL, title, body, true, null, clickCallback ); } catch (ex) { console.error("Error notifying of a verify login event: ", ex); } }, _onDeviceConnected(deviceName) { const [title, body] = lazy.accountsL10n.formatValuesSync([ { id: "account-connection-title" }, deviceName ? { id: "account-connection-connected-with", args: { deviceName } } : { id: "account-connection-connected-with-noname" }, ]); let clickCallback = async (subject, topic, data) => { if (topic != "alertclickcallback") { return; } let url = await lazy.FxAccounts.config.promiseManageDevicesURI( "device-connected-notification" ); let win = lazy.BrowserWindowTracker.getTopWindow({ private: false }); if (!win) { this._openURLInNewWindow(url); } else { win.gBrowser.addWebTab(url); } }; try { this.AlertsService.showAlertNotification( null, title, body, true, null, clickCallback ); } catch (ex) { console.error("Error notifying of a new Sync device: ", ex); } }, _onDeviceDisconnected() { const [title, body] = lazy.accountsL10n.formatValuesSync([ "account-connection-title", "account-connection-disconnected", ]); let clickCallback = (subject, topic, data) => { if (topic != "alertclickcallback") { return; } this._openPreferences("sync"); }; this.AlertsService.showAlertNotification( null, title, body, true, null, clickCallback ); }, _updateFxaBadges(win) { let fxaButton = win.document.getElementById("fxa-toolbar-menu-button"); let badge = fxaButton?.querySelector(".toolbarbutton-badge"); let state = lazy.UIState.get(); if ( state.status == lazy.UIState.STATUS_LOGIN_FAILED || state.status == lazy.UIState.STATUS_NOT_VERIFIED ) { // If the fxa toolbar button is in the toolbox, we display the notification // on the fxa button instead of the app menu. let navToolbox = win.document.getElementById("navigator-toolbox"); let isFxAButtonShown = navToolbox.contains(fxaButton); if (isFxAButtonShown) { state.status == lazy.UIState.STATUS_LOGIN_FAILED ? fxaButton?.setAttribute("badge-status", state.status) : badge?.classList.add("feature-callout"); } else { lazy.AppMenuNotifications.showBadgeOnlyNotification( "fxa-needs-authentication" ); } } else { fxaButton?.removeAttribute("badge-status"); badge?.classList.remove("feature-callout"); lazy.AppMenuNotifications.removeNotification("fxa-needs-authentication"); } }, _collectTelemetryPiPEnabled() { Services.telemetry.setEventRecordingEnabled( "pictureinpicture.settings", true ); Services.telemetry.setEventRecordingEnabled("pictureinpicture", true); const TOGGLE_ENABLED_PREF = "media.videocontrols.picture-in-picture.video-toggle.enabled"; const observe = (subject, topic, data) => { const enabled = Services.prefs.getBoolPref(TOGGLE_ENABLED_PREF, false); Services.telemetry.scalarSet("pictureinpicture.toggle_enabled", enabled); // Record events when preferences change if (topic === "nsPref:changed") { if (enabled) { Services.telemetry.recordEvent( "pictureinpicture.settings", "enable", "settings" ); } } }; Services.prefs.addObserver(TOGGLE_ENABLED_PREF, observe); observe(); }, QueryInterface: ChromeUtils.generateQI([ "nsIObserver", "nsISupportsWeakReference", ]), }; var ContentBlockingCategoriesPrefs = { PREF_CB_CATEGORY: "browser.contentblocking.category", PREF_STRICT_DEF: "browser.contentblocking.features.strict", switchingCategory: false, setPrefExpectations() { // The prefs inside CATEGORY_PREFS are initial values. // If the pref remains null, then it will expect the default value. // The "standard" category is defined as expecting all 5 default values. this.CATEGORY_PREFS = { strict: { "network.cookie.cookieBehavior": null, "network.cookie.cookieBehavior.pbmode": null, "privacy.trackingprotection.pbmode.enabled": null, "privacy.trackingprotection.enabled": null, "privacy.trackingprotection.socialtracking.enabled": null, "privacy.trackingprotection.fingerprinting.enabled": null, "privacy.trackingprotection.cryptomining.enabled": null, "privacy.trackingprotection.emailtracking.enabled": null, "privacy.trackingprotection.emailtracking.pbmode.enabled": null, "privacy.annotate_channels.strict_list.enabled": null, "network.http.referer.disallowCrossSiteRelaxingDefault": null, "network.http.referer.disallowCrossSiteRelaxingDefault.top_navigation": null, "privacy.partition.network_state.ocsp_cache": null, "privacy.query_stripping.enabled": null, "privacy.query_stripping.enabled.pbmode": null, "privacy.fingerprintingProtection": null, "privacy.fingerprintingProtection.pbmode": null, }, standard: { "network.cookie.cookieBehavior": null, "network.cookie.cookieBehavior.pbmode": null, "privacy.trackingprotection.pbmode.enabled": null, "privacy.trackingprotection.enabled": null, "privacy.trackingprotection.socialtracking.enabled": null, "privacy.trackingprotection.fingerprinting.enabled": null, "privacy.trackingprotection.cryptomining.enabled": null, "privacy.trackingprotection.emailtracking.enabled": null, "privacy.trackingprotection.emailtracking.pbmode.enabled": null, "privacy.annotate_channels.strict_list.enabled": null, "network.http.referer.disallowCrossSiteRelaxingDefault": null, "network.http.referer.disallowCrossSiteRelaxingDefault.top_navigation": null, "privacy.partition.network_state.ocsp_cache": null, "privacy.query_stripping.enabled": null, "privacy.query_stripping.enabled.pbmode": null, "privacy.fingerprintingProtection": null, "privacy.fingerprintingProtection.pbmode": null, }, }; let type = "strict"; let rulesArray = Services.prefs .getStringPref(this.PREF_STRICT_DEF) .split(","); for (let item of rulesArray) { switch (item) { case "tp": this.CATEGORY_PREFS[type][ "privacy.trackingprotection.enabled" ] = true; break; case "-tp": this.CATEGORY_PREFS[type][ "privacy.trackingprotection.enabled" ] = false; break; case "tpPrivate": this.CATEGORY_PREFS[type][ "privacy.trackingprotection.pbmode.enabled" ] = true; break; case "-tpPrivate": this.CATEGORY_PREFS[type][ "privacy.trackingprotection.pbmode.enabled" ] = false; break; case "fp": this.CATEGORY_PREFS[type][ "privacy.trackingprotection.fingerprinting.enabled" ] = true; break; case "-fp": this.CATEGORY_PREFS[type][ "privacy.trackingprotection.fingerprinting.enabled" ] = false; break; case "cm": this.CATEGORY_PREFS[type][ "privacy.trackingprotection.cryptomining.enabled" ] = true; break; case "-cm": this.CATEGORY_PREFS[type][ "privacy.trackingprotection.cryptomining.enabled" ] = false; break; case "stp": this.CATEGORY_PREFS[type][ "privacy.trackingprotection.socialtracking.enabled" ] = true; break; case "-stp": this.CATEGORY_PREFS[type][ "privacy.trackingprotection.socialtracking.enabled" ] = false; break; case "emailTP": this.CATEGORY_PREFS[type][ "privacy.trackingprotection.emailtracking.enabled" ] = true; break; case "-emailTP": this.CATEGORY_PREFS[type][ "privacy.trackingprotection.emailtracking.enabled" ] = false; break; case "emailTPPrivate": this.CATEGORY_PREFS[type][ "privacy.trackingprotection.emailtracking.pbmode.enabled" ] = true; break; case "-emailTPPrivate": this.CATEGORY_PREFS[type][ "privacy.trackingprotection.emailtracking.pbmode.enabled" ] = false; break; case "lvl2": this.CATEGORY_PREFS[type][ "privacy.annotate_channels.strict_list.enabled" ] = true; break; case "-lvl2": this.CATEGORY_PREFS[type][ "privacy.annotate_channels.strict_list.enabled" ] = false; break; case "rp": this.CATEGORY_PREFS[type][ "network.http.referer.disallowCrossSiteRelaxingDefault" ] = true; break; case "-rp": this.CATEGORY_PREFS[type][ "network.http.referer.disallowCrossSiteRelaxingDefault" ] = false; break; case "rpTop": this.CATEGORY_PREFS[type][ "network.http.referer.disallowCrossSiteRelaxingDefault.top_navigation" ] = true; break; case "-rpTop": this.CATEGORY_PREFS[type][ "network.http.referer.disallowCrossSiteRelaxingDefault.top_navigation" ] = false; break; case "ocsp": this.CATEGORY_PREFS[type][ "privacy.partition.network_state.ocsp_cache" ] = true; break; case "-ocsp": this.CATEGORY_PREFS[type][ "privacy.partition.network_state.ocsp_cache" ] = false; break; case "qps": this.CATEGORY_PREFS[type]["privacy.query_stripping.enabled"] = true; break; case "-qps": this.CATEGORY_PREFS[type]["privacy.query_stripping.enabled"] = false; break; case "qpsPBM": this.CATEGORY_PREFS[type][ "privacy.query_stripping.enabled.pbmode" ] = true; break; case "-qpsPBM": this.CATEGORY_PREFS[type][ "privacy.query_stripping.enabled.pbmode" ] = false; break; case "fpp": this.CATEGORY_PREFS[type]["privacy.fingerprintingProtection"] = true; break; case "-fpp": this.CATEGORY_PREFS[type]["privacy.fingerprintingProtection"] = false; break; case "fppPrivate": this.CATEGORY_PREFS[type][ "privacy.fingerprintingProtection.pbmode" ] = true; break; case "-fppPrivate": this.CATEGORY_PREFS[type][ "privacy.fingerprintingProtection.pbmode" ] = false; break; case "cookieBehavior0": this.CATEGORY_PREFS[type]["network.cookie.cookieBehavior"] = Ci.nsICookieService.BEHAVIOR_ACCEPT; break; case "cookieBehavior1": this.CATEGORY_PREFS[type]["network.cookie.cookieBehavior"] = Ci.nsICookieService.BEHAVIOR_REJECT_FOREIGN; break; case "cookieBehavior2": this.CATEGORY_PREFS[type]["network.cookie.cookieBehavior"] = Ci.nsICookieService.BEHAVIOR_REJECT; break; case "cookieBehavior3": this.CATEGORY_PREFS[type]["network.cookie.cookieBehavior"] = Ci.nsICookieService.BEHAVIOR_LIMIT_FOREIGN; break; case "cookieBehavior4": this.CATEGORY_PREFS[type]["network.cookie.cookieBehavior"] = Ci.nsICookieService.BEHAVIOR_REJECT_TRACKER; break; case "cookieBehavior5": this.CATEGORY_PREFS[type]["network.cookie.cookieBehavior"] = Ci.nsICookieService.BEHAVIOR_REJECT_TRACKER_AND_PARTITION_FOREIGN; break; case "cookieBehaviorPBM0": this.CATEGORY_PREFS[type]["network.cookie.cookieBehavior.pbmode"] = Ci.nsICookieService.BEHAVIOR_ACCEPT; break; case "cookieBehaviorPBM1": this.CATEGORY_PREFS[type]["network.cookie.cookieBehavior.pbmode"] = Ci.nsICookieService.BEHAVIOR_REJECT_FOREIGN; break; case "cookieBehaviorPBM2": this.CATEGORY_PREFS[type]["network.cookie.cookieBehavior.pbmode"] = Ci.nsICookieService.BEHAVIOR_REJECT; break; case "cookieBehaviorPBM3": this.CATEGORY_PREFS[type]["network.cookie.cookieBehavior.pbmode"] = Ci.nsICookieService.BEHAVIOR_LIMIT_FOREIGN; break; case "cookieBehaviorPBM4": this.CATEGORY_PREFS[type]["network.cookie.cookieBehavior.pbmode"] = Ci.nsICookieService.BEHAVIOR_REJECT_TRACKER; break; case "cookieBehaviorPBM5": this.CATEGORY_PREFS[type]["network.cookie.cookieBehavior.pbmode"] = Ci.nsICookieService.BEHAVIOR_REJECT_TRACKER_AND_PARTITION_FOREIGN; break; default: console.error(`Error: Unknown rule observed ${item}`); } } }, /** * Checks if CB prefs match perfectly with one of our pre-defined categories. */ prefsMatch(category) { // The category pref must be either unset, or match. if ( Services.prefs.prefHasUserValue(this.PREF_CB_CATEGORY) && Services.prefs.getStringPref(this.PREF_CB_CATEGORY) != category ) { return false; } for (let pref in this.CATEGORY_PREFS[category]) { let value = this.CATEGORY_PREFS[category][pref]; if (value == null) { if (Services.prefs.prefHasUserValue(pref)) { return false; } } else { let prefType = Services.prefs.getPrefType(pref); if ( (prefType == Services.prefs.PREF_BOOL && Services.prefs.getBoolPref(pref) != value) || (prefType == Services.prefs.PREF_INT && Services.prefs.getIntPref(pref) != value) || (prefType == Services.prefs.PREF_STRING && Services.prefs.getStringPref(pref) != value) ) { return false; } } } return true; }, matchCBCategory() { if (this.switchingCategory) { return; } // If PREF_CB_CATEGORY is not set match users to a Content Blocking category. Check if prefs fit // perfectly into strict or standard, otherwise match with custom. If PREF_CB_CATEGORY has previously been set, // a change of one of these prefs necessarily puts us in "custom". if (this.prefsMatch("standard")) { Services.prefs.setStringPref(this.PREF_CB_CATEGORY, "standard"); } else if (this.prefsMatch("strict")) { Services.prefs.setStringPref(this.PREF_CB_CATEGORY, "strict"); } else { Services.prefs.setStringPref(this.PREF_CB_CATEGORY, "custom"); } // If there is a custom policy which changes a related pref, then put the user in custom so // they still have access to other content blocking prefs, and to keep our default definitions // from changing. let policy = Services.policies.getActivePolicies(); if (policy && (policy.EnableTrackingProtection || policy.Cookies)) { Services.prefs.setStringPref(this.PREF_CB_CATEGORY, "custom"); } }, updateCBCategory() { if ( this.switchingCategory || !Services.prefs.prefHasUserValue(this.PREF_CB_CATEGORY) ) { return; } // Turn on switchingCategory flag, to ensure that when the individual prefs that change as a result // of the category change do not trigger yet another category change. this.switchingCategory = true; let value = Services.prefs.getStringPref(this.PREF_CB_CATEGORY); this.setPrefsToCategory(value); this.switchingCategory = false; }, /** * Sets all user-exposed content blocking preferences to values that match the selected category. */ setPrefsToCategory(category) { // Leave prefs as they were if we are switching to "custom" category. if (category == "custom") { return; } for (let pref in this.CATEGORY_PREFS[category]) { let value = this.CATEGORY_PREFS[category][pref]; if (!Services.prefs.prefIsLocked(pref)) { if (value == null) { Services.prefs.clearUserPref(pref); } else { switch (Services.prefs.getPrefType(pref)) { case Services.prefs.PREF_BOOL: Services.prefs.setBoolPref(pref, value); break; case Services.prefs.PREF_INT: Services.prefs.setIntPref(pref, value); break; case Services.prefs.PREF_STRING: Services.prefs.setStringPref(pref, value); break; } } } } }, }; /** * ContentPermissionIntegration is responsible for showing the user * simple permission prompts when content requests additional * capabilities. * * While there are some built-in permission prompts, createPermissionPrompt * can also be overridden by system add-ons or tests to provide new ones. * * This override ability is provided by Integration.sys.mjs. See * PermissionUI.sys.mjs for an example of how to provide a new prompt * from an add-on. */ const ContentPermissionIntegration = { /** * Creates a PermissionPrompt for a given permission type and * nsIContentPermissionRequest. * * @param {string} type * The type of the permission request from content. This normally * matches the "type" field of an nsIContentPermissionType, but it * can be something else if the permission does not use the * nsIContentPermissionRequest model. Note that this type might also * be different from the permission key used in the permissions * database. * Example: "geolocation" * @param {nsIContentPermissionRequest} request * The request for a permission from content. * @return {PermissionPrompt} (see PermissionUI.sys.mjs), * or undefined if the type cannot be handled. */ createPermissionPrompt(type, request) { switch (type) { case "geolocation": { return new lazy.PermissionUI.GeolocationPermissionPrompt(request); } case "xr": { return new lazy.PermissionUI.XRPermissionPrompt(request); } case "desktop-notification": { return new lazy.PermissionUI.DesktopNotificationPermissionPrompt( request ); } case "persistent-storage": { return new lazy.PermissionUI.PersistentStoragePermissionPrompt(request); } case "midi": { return new lazy.PermissionUI.MIDIPermissionPrompt(request); } case "storage-access": { return new lazy.PermissionUI.StorageAccessPermissionPrompt(request); } } return undefined; }, }; export function ContentPermissionPrompt() {} ContentPermissionPrompt.prototype = { classID: Components.ID("{d8903bf6-68d5-4e97-bcd1-e4d3012f721a}"), QueryInterface: ChromeUtils.generateQI(["nsIContentPermissionPrompt"]), /** * This implementation of nsIContentPermissionPrompt.prompt ensures * that there's only one nsIContentPermissionType in the request, * and that it's of type nsIContentPermissionType. Failing to * satisfy either of these conditions will result in this method * throwing NS_ERRORs. If the combined ContentPermissionIntegration * cannot construct a prompt for this particular request, an * NS_ERROR_FAILURE will be thrown. * * Any time an error is thrown, the nsIContentPermissionRequest is * cancelled automatically. * * @param {nsIContentPermissionRequest} request * The request that we're to show a prompt for. */ prompt(request) { if (request.element && request.element.fxrPermissionPrompt) { // For Firefox Reality on Desktop, switch to a different mechanism to // prompt the user since fewer permissions are available and since many // UI dependencies are not availabe. request.element.fxrPermissionPrompt(request); return; } let type; try { // Only allow exactly one permission request here. let types = request.types.QueryInterface(Ci.nsIArray); if (types.length != 1) { throw Components.Exception( "Expected an nsIContentPermissionRequest with only 1 type.", Cr.NS_ERROR_UNEXPECTED ); } type = types.queryElementAt(0, Ci.nsIContentPermissionType).type; let combinedIntegration = lazy.Integration.contentPermission.getCombined( ContentPermissionIntegration ); let permissionPrompt = combinedIntegration.createPermissionPrompt( type, request ); if (!permissionPrompt) { throw Components.Exception( `Failed to handle permission of type ${type}`, Cr.NS_ERROR_FAILURE ); } permissionPrompt.prompt(); } catch (ex) { console.error(ex); request.cancel(); throw ex; } let schemeHistogram = Services.telemetry.getKeyedHistogramById( "PERMISSION_REQUEST_ORIGIN_SCHEME" ); let scheme = 0; try { if (request.principal.schemeIs("http")) { scheme = 1; } else if (request.principal.schemeIs("https")) { scheme = 2; } } catch (ex) { // If the request principal is not available at this point, // the request has likely been cancelled before being shown to the // user. We shouldn't record this request. if (ex.result != Cr.NS_ERROR_FAILURE) { console.error(ex); } return; } schemeHistogram.add(type, scheme); let userInputHistogram = Services.telemetry.getKeyedHistogramById( "PERMISSION_REQUEST_HANDLING_USER_INPUT" ); userInputHistogram.add( type, request.hasValidTransientUserGestureActivation ); }, }; export var DefaultBrowserCheck = { async prompt(win) { const shellService = win.getShellService(); const needPin = await shellService.doesAppNeedPin(); win.MozXULElement.insertFTLIfNeeded("branding/brand.ftl"); win.MozXULElement.insertFTLIfNeeded( "browser/defaultBrowserNotification.ftl" ); // Resolve the translations for the prompt elements and return only the // string values const pinMessage = AppConstants.platform == "macosx" ? "default-browser-prompt-message-pin-mac" : "default-browser-prompt-message-pin"; let [promptTitle, promptMessage, askLabel, yesButton, notNowButton] = ( await win.document.l10n.formatMessages([ { id: needPin ? "default-browser-prompt-title-pin" : "default-browser-prompt-title-alt", }, { id: needPin ? pinMessage : "default-browser-prompt-message-alt", }, { id: "default-browser-prompt-checkbox-not-again-label" }, { id: needPin ? "default-browser-prompt-button-primary-pin" : "default-browser-prompt-button-primary-alt", }, { id: "default-browser-prompt-button-secondary" }, ]) ).map(({ value }) => value); let ps = Services.prompt; let buttonFlags = ps.BUTTON_TITLE_IS_STRING * ps.BUTTON_POS_0 + ps.BUTTON_TITLE_IS_STRING * ps.BUTTON_POS_1 + ps.BUTTON_POS_0_DEFAULT; let rv = await ps.asyncConfirmEx( win.browsingContext, ps.MODAL_TYPE_INTERNAL_WINDOW, promptTitle, promptMessage, buttonFlags, yesButton, notNowButton, null, askLabel, false, // checkbox state { headerIconURL: "chrome://branding/content/icon32.png" } ); let buttonNumClicked = rv.get("buttonNumClicked"); let checkboxState = rv.get("checked"); if (buttonNumClicked == 0) { try { await shellService.setAsDefault(); } catch (e) { this.log.error("Failed to set the default browser", e); } shellService.pinToTaskbar(); } if (checkboxState) { shellService.shouldCheckDefaultBrowser = false; } try { let resultEnum = buttonNumClicked * 2 + !checkboxState; Services.telemetry .getHistogramById("BROWSER_SET_DEFAULT_RESULT") .add(resultEnum); } catch (ex) { /* Don't break if Telemetry is acting up. */ } }, /** * Checks if the default browser check prompt will be shown. * @param {boolean} isStartupCheck * If true, prefs will be set and telemetry will be recorded. * @returns {boolean} True if the default browser check prompt will be shown. */ async willCheckDefaultBrowser(isStartupCheck) { let win = lazy.BrowserWindowTracker.getTopWindow(); let shellService = win.getShellService(); // Perform default browser checking. if (!shellService) { return false; } let shouldCheck = !AppConstants.DEBUG && shellService.shouldCheckDefaultBrowser; // Even if we shouldn't check the default browser, we still continue when // isStartupCheck = true to set prefs and telemetry. if (!shouldCheck && !isStartupCheck) { return false; } // Skip the "Set Default Browser" check during first-run or after the // browser has been run a few times. const skipDefaultBrowserCheck = Services.prefs.getBoolPref( "browser.shell.skipDefaultBrowserCheckOnFirstRun" ) && !Services.prefs.getBoolPref( "browser.shell.didSkipDefaultBrowserCheckOnFirstRun" ); let promptCount = Services.prefs.getIntPref( "browser.shell.defaultBrowserCheckCount", 0 ); // If SessionStartup's state is not initialized, checking sessionType will set // its internal state to "do not restore". await lazy.SessionStartup.onceInitialized; let willRecoverSession = lazy.SessionStartup.sessionType == lazy.SessionStartup.RECOVER_SESSION; // Don't show the prompt if we're already the default browser. let isDefault = false; let isDefaultError = false; try { isDefault = shellService.isDefaultBrowser(isStartupCheck, false); } catch (ex) { isDefaultError = true; } if (isDefault && isStartupCheck) { let now = Math.floor(Date.now() / 1000).toString(); Services.prefs.setCharPref( "browser.shell.mostRecentDateSetAsDefault", now ); } let willPrompt = shouldCheck && !isDefault && !willRecoverSession; if (willPrompt) { if (skipDefaultBrowserCheck) { if (isStartupCheck) { Services.prefs.setBoolPref( "browser.shell.didSkipDefaultBrowserCheckOnFirstRun", true ); } willPrompt = false; } else { promptCount++; if (isStartupCheck) { Services.prefs.setIntPref( "browser.shell.defaultBrowserCheckCount", promptCount ); } if (!AppConstants.RELEASE_OR_BETA && promptCount > 3) { willPrompt = false; } } } if (isStartupCheck) { try { // Report default browser status on startup to telemetry // so we can track whether we are the default. Services.telemetry .getHistogramById("BROWSER_IS_USER_DEFAULT") .add(isDefault); Services.telemetry .getHistogramById("BROWSER_IS_USER_DEFAULT_ERROR") .add(isDefaultError); Services.telemetry .getHistogramById("BROWSER_SET_DEFAULT_ALWAYS_CHECK") .add(shouldCheck); Services.telemetry .getHistogramById("BROWSER_SET_DEFAULT_DIALOG_PROMPT_RAWCOUNT") .add(promptCount); } catch (ex) { /* Don't break the default prompt if telemetry is broken. */ } } return willPrompt; }, }; /** * AboutHomeStartupCache is responsible for reading and writing the * initial about:home document from the HTTP cache as a startup * performance optimization. It only works when the "privileged about * content process" is enabled and when ENABLED_PREF is set to true. * * See https://firefox-source-docs.mozilla.org/browser/components/newtab/docs/v2-system-addon/about_home_startup_cache.html * for further details. */ export var AboutHomeStartupCache = { ABOUT_HOME_URI_STRING: "about:home", SCRIPT_EXTENSION: "script", ENABLED_PREF: "browser.startup.homepage.abouthome_cache.enabled", PRELOADED_NEWTAB_PREF: "browser.newtab.preload", LOG_LEVEL_PREF: "browser.startup.homepage.abouthome_cache.loglevel", // It's possible that the layout of about:home will change such that // we want to invalidate any pre-existing caches. We do this by setting // this meta key in the nsICacheEntry for the page. // // The version is currently set to the build ID, meaning that the cache // is invalidated after every upgrade (like the main startup cache). CACHE_VERSION_META_KEY: "version", LOG_NAME: "AboutHomeStartupCache", // These messages are used to request the "privileged about content process" // to create the cached document, and then to receive that document. CACHE_REQUEST_MESSAGE: "AboutHomeStartupCache:CacheRequest", CACHE_RESPONSE_MESSAGE: "AboutHomeStartupCache:CacheResponse", CACHE_USAGE_RESULT_MESSAGE: "AboutHomeStartupCache:UsageResult", // When a "privileged about content process" is launched, this message is // sent to give it some nsIInputStream's for the about:home document they // should load. SEND_STREAMS_MESSAGE: "AboutHomeStartupCache:InputStreams", // This time in ms is used to debounce messages that are broadcast to // all about:newtab's, or the preloaded about:newtab. We use those // messages as a signal that it's likely time to refresh the cache. CACHE_DEBOUNCE_RATE_MS: 5000, // This is how long we'll block the AsyncShutdown while waiting for // the cache to write. If we fail to write within that time, we will // allow the shutdown to proceed. SHUTDOWN_CACHE_WRITE_TIMEOUT_MS: 1000, // The following values are as possible values for the // browser.startup.abouthome_cache_result scalar. Keep these in sync with the // scalar definition in Scalars.yaml. See setDeferredResult for more // information. CACHE_RESULT_SCALARS: { UNSET: 0, DOES_NOT_EXIST: 1, CORRUPT_PAGE: 2, CORRUPT_SCRIPT: 3, INVALIDATED: 4, LATE: 5, VALID_AND_USED: 6, DISABLED: 7, NOT_LOADING_ABOUTHOME: 8, PRELOADING_DISABLED: 9, }, // This will be set to one of the values of CACHE_RESULT_SCALARS // once it is determined which result best suits what occurred. _cacheDeferredResultScalar: -1, // A reference to the nsICacheEntry to read from and write to. _cacheEntry: null, // These nsIPipe's are sent down to the "privileged about content process" // immediately after the process launches. This allows us to race the loading // of the cache entry in the parent process with the load of the about:home // page in the content process, since we'll connect the InputStream's to // the pipes as soon as the nsICacheEntry is available. // // The page pipe is for the HTML markup for the page. _pagePipe: null, // The script pipe is for the JavaScript that the HTML markup loads // to set its internal state. _scriptPipe: null, _cacheDeferred: null, _enabled: false, _initted: false, _hasWrittenThisSession: false, _finalized: false, _firstPrivilegedProcessCreated: false, init() { if (this._initted) { throw new Error("AboutHomeStartupCache already initted."); } this.setDeferredResult(this.CACHE_RESULT_SCALARS.UNSET); this._enabled = !!lazy.NimbusFeatures.abouthomecache.getVariable("enabled"); if (!this._enabled) { this.recordResult(this.CACHE_RESULT_SCALARS.DISABLED); return; } this.log = console.createInstance({ prefix: this.LOG_NAME, maxLogLevelPref: this.LOG_LEVEL_PREF, }); this.log.trace("Initting."); // If the user is not configured to load about:home at startup, then // let's not bother with the cache - loading it needlessly is more likely // to hinder what we're actually trying to load. let willLoadAboutHome = !lazy.HomePage.overridden && Services.prefs.getIntPref("browser.startup.page") === 1; if (!willLoadAboutHome) { this.log.trace("Not configured to load about:home by default."); this.recordResult(this.CACHE_RESULT_SCALARS.NOT_LOADING_ABOUTHOME); return; } if (!Services.prefs.getBoolPref(this.PRELOADED_NEWTAB_PREF, false)) { this.log.trace("Preloaded about:newtab disabled."); this.recordResult(this.CACHE_RESULT_SCALARS.PRELOADING_DISABLED); return; } Services.obs.addObserver(this, "ipc:content-created"); Services.obs.addObserver(this, "process-type-set"); Services.obs.addObserver(this, "ipc:content-shutdown"); Services.obs.addObserver(this, "intl:app-locales-changed"); this.log.trace("Constructing pipes."); this._pagePipe = this.makePipe(); this._scriptPipe = this.makePipe(); this._cacheEntryPromise = new Promise(resolve => { this._cacheEntryResolver = resolve; }); let lci = Services.loadContextInfo.default; let storage = Services.cache2.diskCacheStorage(lci); try { storage.asyncOpenURI( this.aboutHomeURI, "", Ci.nsICacheStorage.OPEN_PRIORITY, this ); } catch (e) { this.log.error("Failed to open about:home cache entry", e); } this._cacheTask = new lazy.DeferredTask(async () => { await this.cacheNow(); }, this.CACHE_DEBOUNCE_RATE_MS); lazy.AsyncShutdown.quitApplicationGranted.addBlocker( "AboutHomeStartupCache: Writing cache", async () => { await this.onShutdown(); }, () => this._cacheProgress ); this._cacheDeferred = null; this._initted = true; this.log.trace("Initialized."); }, get initted() { return this._initted; }, uninit() { if (!this._enabled) { return; } try { Services.obs.removeObserver(this, "ipc:content-created"); Services.obs.removeObserver(this, "process-type-set"); Services.obs.removeObserver(this, "ipc:content-shutdown"); Services.obs.removeObserver(this, "intl:app-locales-changed"); } catch (e) { // If we failed to initialize and register for these observer // notifications, then attempting to remove them will throw. // It's fine to ignore that case on shutdown. } if (this._cacheTask) { this._cacheTask.disarm(); this._cacheTask = null; } this._pagePipe = null; this._scriptPipe = null; this._initted = false; this._cacheEntry = null; this._hasWrittenThisSession = false; this._cacheEntryPromise = null; this._cacheEntryResolver = null; this._cacheDeferredResultScalar = -1; if (this.log) { this.log.trace("Uninitialized."); this.log = null; } this._procManager = null; this._procManagerID = null; this._appender = null; this._cacheDeferred = null; this._finalized = false; this._firstPrivilegedProcessCreated = false; }, _aboutHomeURI: null, get aboutHomeURI() { if (this._aboutHomeURI) { return this._aboutHomeURI; } this._aboutHomeURI = Services.io.newURI(this.ABOUT_HOME_URI_STRING); return this._aboutHomeURI; }, // For the AsyncShutdown blocker, this is used to populate the progress // value. _cacheProgress: "Not yet begun", /** * Called by the AsyncShutdown blocker on quit-application-granted * to potentially flush the most recent cache to disk. If one was * never written during the session, one is generated and written * before the async function resolves. * * @param withTimeout (boolean) * Whether or not the timeout mechanism should be used. Defaults * to true. * @returns Promise * @resolves boolean * If a cache has never been written, or a cache write is in * progress, resolves true when the cache has been written. Also * resolves to true if a cache didn't need to be written. * * Resolves to false if a cache write unexpectedly timed out. */ async onShutdown(withTimeout = true) { // If we never wrote this session, arm the task so that the next // step can finalize. if (!this._hasWrittenThisSession) { this.log.trace("Never wrote a cache this session. Arming cache task."); this._cacheTask.arm(); } Services.telemetry.scalarSet( "browser.startup.abouthome_cache_shutdownwrite", this._cacheTask.isArmed ); if (this._cacheTask.isArmed) { this.log.trace("Finalizing cache task on shutdown"); this._finalized = true; // To avoid hanging shutdowns, we'll ensure that we wait a maximum of // SHUTDOWN_CACHE_WRITE_TIMEOUT_MS millseconds before giving up. const TIMED_OUT = Symbol(); let timeoutID = 0; let timeoutPromise = new Promise(resolve => { timeoutID = lazy.setTimeout( () => resolve(TIMED_OUT), this.SHUTDOWN_CACHE_WRITE_TIMEOUT_MS ); }); let promises = [this._cacheTask.finalize()]; if (withTimeout) { this.log.trace("Using timeout mechanism."); promises.push(timeoutPromise); } else { this.log.trace("Skipping timeout mechanism."); } let result = await Promise.race(promises); this.log.trace("Done blocking shutdown."); lazy.clearTimeout(timeoutID); if (result === TIMED_OUT) { this.log.error("Timed out getting cache streams. Skipping cache task."); return false; } } this.log.trace("onShutdown is exiting"); return true; }, /** * Called by the _cacheTask DeferredTask to actually do the work of * caching the about:home document. * * @returns Promise * @resolves undefined * Resolves when a fresh version of the cache has been written. */ async cacheNow() { this.log.trace("Caching now."); this._cacheProgress = "Getting cache streams"; let { pageInputStream, scriptInputStream } = await this.requestCache(); if (!pageInputStream || !scriptInputStream) { this.log.trace("Failed to get cache streams."); this._cacheProgress = "Failed to get streams"; return; } this.log.trace("Got cache streams."); this._cacheProgress = "Writing to cache"; try { this.log.trace("Populating cache."); await this.populateCache(pageInputStream, scriptInputStream); } catch (e) { this._cacheProgress = "Failed to populate cache"; this.log.error("Populating the cache failed: ", e); return; } this._cacheProgress = "Done"; this.log.trace("Done writing to cache."); this._hasWrittenThisSession = true; }, /** * Requests the cached document streams from the "privileged about content * process". * * @returns Promise * @resolves Object * Resolves with an Object with the following properties: * * pageInputStream (nsIInputStream) * The page content to write to the cache, or null if request the streams * failed. * * scriptInputStream (nsIInputStream) * The script content to write to the cache, or null if request the streams * failed. */ requestCache() { this.log.trace("Parent is requesting Activity Stream state object."); if (!this._procManager) { this.log.error("requestCache called with no _procManager!"); return { pageInputStream: null, scriptInputStream: null }; } if ( this._procManager.remoteType != lazy.E10SUtils.PRIVILEGEDABOUT_REMOTE_TYPE ) { this.log.error("Somehow got the wrong process type."); return { pageInputStream: null, scriptInputStream: null }; } let state = lazy.AboutNewTab.activityStream.store.getState(); return new Promise(resolve => { this._cacheDeferred = resolve; this.log.trace("Parent is requesting cache streams."); this._procManager.sendAsyncMessage(this.CACHE_REQUEST_MESSAGE, { state }); }); }, /** * Helper function that returns a newly constructed nsIPipe instance. * * @return nsIPipe */ makePipe() { let pipe = Cc["@mozilla.org/pipe;1"].createInstance(Ci.nsIPipe); pipe.init( true /* non-blocking input */, true /* non-blocking output */, 0 /* segment size */, 0 /* max segments */ ); return pipe; }, get pagePipe() { return this._pagePipe; }, get scriptPipe() { return this._scriptPipe; }, /** * Called when the nsICacheEntry has been accessed. If the nsICacheEntry * has content that we want to send down to the "privileged about content * process", then we connect that content to the nsIPipe's that may or * may not have already been sent down to the process. * * In the event that the nsICacheEntry doesn't contain anything usable, * the nsInputStreams on the nsIPipe's are closed. */ connectToPipes() { this.log.trace(`Connecting nsICacheEntry to pipes.`); // If the cache doesn't yet exist, we'll know because the version metadata // won't exist yet. let version; try { this.log.trace(""); version = this._cacheEntry.getMetaDataElement( this.CACHE_VERSION_META_KEY ); } catch (e) { if (e.result == Cr.NS_ERROR_NOT_AVAILABLE) { this.log.debug("Cache meta data does not exist. Closing streams."); this.pagePipe.outputStream.close(); this.scriptPipe.outputStream.close(); this.setDeferredResult(this.CACHE_RESULT_SCALARS.DOES_NOT_EXIST); return; } throw e; } this.log.info("Version retrieved is", version); if (version != Services.appinfo.appBuildID) { this.log.info("Version does not match! Dooming and closing streams.\n"); // This cache is no good - doom it, and prepare for a new one. this.clearCache(); this.pagePipe.outputStream.close(); this.scriptPipe.outputStream.close(); this.setDeferredResult(this.CACHE_RESULT_SCALARS.INVALIDATED); return; } let cachePageInputStream; try { cachePageInputStream = this._cacheEntry.openInputStream(0); } catch (e) { this.log.error("Failed to open main input stream for cache entry", e); this.pagePipe.outputStream.close(); this.scriptPipe.outputStream.close(); this.setDeferredResult(this.CACHE_RESULT_SCALARS.CORRUPT_PAGE); return; } this.log.trace("Connecting page stream to pipe."); lazy.NetUtil.asyncCopy( cachePageInputStream, this.pagePipe.outputStream, () => { this.log.info("Page stream connected to pipe."); } ); let cacheScriptInputStream; try { this.log.trace("Connecting script stream to pipe."); cacheScriptInputStream = this._cacheEntry.openAlternativeInputStream("script"); lazy.NetUtil.asyncCopy( cacheScriptInputStream, this.scriptPipe.outputStream, () => { this.log.info("Script stream connected to pipe."); } ); } catch (e) { if (e.result == Cr.NS_ERROR_NOT_AVAILABLE) { // For some reason, the script was not available. We'll close the pipe // without sending anything into it. The privileged about content process // will notice that there's nothing available in the pipe, and fall back // to dynamically generating the page. this.log.error("Script stream not available! Closing pipe."); this.scriptPipe.outputStream.close(); this.setDeferredResult(this.CACHE_RESULT_SCALARS.CORRUPT_SCRIPT); } else { throw e; } } this.setDeferredResult(this.CACHE_RESULT_SCALARS.VALID_AND_USED); this.log.trace("Streams connected to pipes."); }, /** * Called when we have received a the cache values from the "privileged * about content process". The page and script streams are written to * the nsICacheEntry. * * This writing is asynchronous, and if a write happens to already be * underway when this function is called, that latter call will be * ignored. * * @param pageInputStream (nsIInputStream) * A stream containing the HTML markup to be saved to the cache. * @param scriptInputStream (nsIInputStream) * A stream containing the JS hydration script to be saved to the cache. * @returns Promise * @resolves undefined * When the cache has been successfully written to. * @rejects Error * Rejects with a JS Error if writing any part of the cache happens to * fail. */ async populateCache(pageInputStream, scriptInputStream) { await this.ensureCacheEntry(); await new Promise((resolve, reject) => { // Doom the old cache entry, so we can start writing to a new one. this.log.trace("Populating the cache. Dooming old entry."); this.clearCache(); this.log.trace("Opening the page output stream."); let pageOutputStream; try { pageOutputStream = this._cacheEntry.openOutputStream(0, -1); } catch (e) { reject(e); return; } this.log.info("Writing the page cache."); lazy.NetUtil.asyncCopy(pageInputStream, pageOutputStream, pageResult => { if (!Components.isSuccessCode(pageResult)) { this.log.error("Failed to write page. Result: " + pageResult); reject(new Error(pageResult)); return; } this.log.trace( "Writing the page data is complete. Now opening the " + "script output stream." ); let scriptOutputStream; try { scriptOutputStream = this._cacheEntry.openAlternativeOutputStream( "script", -1 ); } catch (e) { reject(e); return; } this.log.info("Writing the script cache."); lazy.NetUtil.asyncCopy( scriptInputStream, scriptOutputStream, scriptResult => { if (!Components.isSuccessCode(scriptResult)) { this.log.error("Failed to write script. Result: " + scriptResult); reject(new Error(scriptResult)); return; } this.log.trace( "Writing the script cache is done. Setting version." ); try { this._cacheEntry.setMetaDataElement( "version", Services.appinfo.appBuildID ); } catch (e) { this.log.error("Failed to write version."); reject(e); return; } this.log.trace(`Version is set to ${Services.appinfo.appBuildID}.`); this.log.info("Caching of page and script is done."); resolve(); } ); }); }); this.log.trace("populateCache has finished."); }, /** * Returns a Promise that resolves once the nsICacheEntry for the cache * is available to write to and read from. * * @returns Promise * @resolves nsICacheEntry * Once the cache entry has become available. * @rejects String * Rejects with an error message if getting the cache entry is attempted * before the AboutHomeStartupCache component has been initialized. */ ensureCacheEntry() { if (!this._initted) { return Promise.reject( "Cannot ensureCacheEntry - AboutHomeStartupCache is not initted" ); } return this._cacheEntryPromise; }, /** * Clears the contents of the cache. */ clearCache() { this.log.trace("Clearing the cache."); this._cacheEntry = this._cacheEntry.recreate(); this._cacheEntryPromise = new Promise(resolve => { resolve(this._cacheEntry); }); this._hasWrittenThisSession = false; }, /** * Called when a content process is created. If this is the "privileged * about content process", then the cache streams will be sent to it. * * @param childID (Number) * The unique ID for the content process that was created, as passed by * ipc:content-created. * @param procManager (ProcessMessageManager) * The ProcessMessageManager for the created content process. * @param processParent * The nsIDOMProcessParent for the tab. */ onContentProcessCreated(childID, procManager, processParent) { if (procManager.remoteType == lazy.E10SUtils.PRIVILEGEDABOUT_REMOTE_TYPE) { if (this._finalized) { this.log.trace( "Ignoring privileged about content process launch after finalization." ); return; } if (this._firstPrivilegedProcessCreated) { this.log.trace( "Ignoring non-first privileged about content processes." ); return; } this.log.trace( `A privileged about content process is launching with ID ${childID}.` ); this.log.info("Sending input streams down to content process."); let actor = processParent.getActor("BrowserProcess"); actor.sendAsyncMessage(this.SEND_STREAMS_MESSAGE, { pageInputStream: this.pagePipe.inputStream, scriptInputStream: this.scriptPipe.inputStream, }); procManager.addMessageListener(this.CACHE_RESPONSE_MESSAGE, this); procManager.addMessageListener(this.CACHE_USAGE_RESULT_MESSAGE, this); this._procManager = procManager; this._procManagerID = childID; this._firstPrivilegedProcessCreated = true; } }, /** * Called when a content process is destroyed. Either it shut down normally, * or it crashed. If this is the "privileged about content process", then some * internal state is cleared. * * @param childID (Number) * The unique ID for the content process that was created, as passed by * ipc:content-shutdown. */ onContentProcessShutdown(childID) { this.log.info(`Content process shutdown: ${childID}`); if (this._procManagerID == childID) { this.log.info("It was the current privileged about process."); if (this._cacheDeferred) { this.log.error( "A privileged about content process shut down while cache streams " + "were still en route." ); // The crash occurred while we were waiting on cache input streams to // be returned to us. Resolve with null streams instead. this._cacheDeferred({ pageInputStream: null, scriptInputStream: null }); this._cacheDeferred = null; } this._procManager.removeMessageListener( this.CACHE_RESPONSE_MESSAGE, this ); this._procManager.removeMessageListener( this.CACHE_USAGE_RESULT_MESSAGE, this ); this._procManager = null; this._procManagerID = null; } }, /** * Called externally by ActivityStreamMessageChannel anytime * a message is broadcast to all about:newtabs, or sent to the * preloaded about:newtab. This is used to determine if we need * to refresh the cache. */ onPreloadedNewTabMessage() { if (!this._initted || !this._enabled) { return; } if (this._finalized) { this.log.trace("Ignoring preloaded newtab update after finalization."); return; } this.log.trace("Preloaded about:newtab was updated."); this._cacheTask.disarm(); this._cacheTask.arm(); }, /** * Stores the CACHE_RESULT_SCALARS value that most accurately represents * the current notion of how the cache has operated so far. It is stored * temporarily like this because we need to hear from the privileged * about content process to hear whether or not retrieving the cache * actually worked on that end. The success state reported back from * the privileged about content process will be compared against the * deferred result scalar to compute what will be recorded to * Telemetry. * * Note that this value will only be recorded if its value is GREATER * than the currently recorded value. This is because it's possible for * certain functions that record results to re-enter - but we want to record * the _first_ condition that caused the cache to not be read from. * * @param result (Number) * One of the CACHE_RESULT_SCALARS values. If this value is less than * the currently recorded value, it is ignored. */ setDeferredResult(result) { if (this._cacheDeferredResultScalar < result) { this._cacheDeferredResultScalar = result; } }, /** * Records the final result of how the cache operated for the user * during this session to Telemetry. */ recordResult(result) { // Note: this can be called very early on in the lifetime of // AboutHomeStartupCache, so things like this.log might not exist yet. Services.telemetry.scalarSet( "browser.startup.abouthome_cache_result", result ); }, /** * Called when the parent process receives a message from the privileged * about content process saying whether or not reading from the cache * was successful. * * @param success (boolean) * True if reading from the cache succeeded. */ onUsageResult(success) { this.log.trace(`Received usage result. Success = ${success}`); if (success) { if ( this._cacheDeferredResultScalar != this.CACHE_RESULT_SCALARS.VALID_AND_USED ) { this.log.error( "Somehow got a success result despite having never " + "successfully sent down the cache streams" ); this.recordResult(this._cacheDeferredResultScalar); } else { this.recordResult(this.CACHE_RESULT_SCALARS.VALID_AND_USED); } return; } if ( this._cacheDeferredResultScalar == this.CACHE_RESULT_SCALARS.VALID_AND_USED ) { // We failed to read from the cache despite having successfully // sent it down to the content process. We presume then that the // streams just didn't provide any bytes in time. this.recordResult(this.CACHE_RESULT_SCALARS.LATE); } else { // We failed to read the cache, but already knew why. We can // now record that value. this.recordResult(this._cacheDeferredResultScalar); } }, QueryInterface: ChromeUtils.generateQI([ "nsICacheEntryOpenallback", "nsIObserver", ]), /** MessageListener **/ receiveMessage(message) { // Only the privileged about content process can write to the cache. if ( message.target.remoteType != lazy.E10SUtils.PRIVILEGEDABOUT_REMOTE_TYPE ) { this.log.error( "Received a message from a non-privileged content process!" ); return; } switch (message.name) { case this.CACHE_RESPONSE_MESSAGE: { this.log.trace("Parent received cache streams."); if (!this._cacheDeferred) { this.log.error("Parent doesn't have _cacheDeferred set up!"); return; } this._cacheDeferred(message.data); this._cacheDeferred = null; break; } case this.CACHE_USAGE_RESULT_MESSAGE: { this.onUsageResult(message.data.success); break; } } }, /** nsIObserver **/ observe(aSubject, aTopic, aData) { switch (aTopic) { case "intl:app-locales-changed": { this.clearCache(); break; } case "process-type-set": // Intentional fall-through case "ipc:content-created": { let childID = aData; let procManager = aSubject .QueryInterface(Ci.nsIInterfaceRequestor) .getInterface(Ci.nsIMessageSender); let pp = aSubject.QueryInterface(Ci.nsIDOMProcessParent); this.onContentProcessCreated(childID, procManager, pp); break; } case "ipc:content-shutdown": { let childID = aData; this.onContentProcessShutdown(childID); break; } } }, /** nsICacheEntryOpenCallback **/ onCacheEntryCheck(aEntry) { return Ci.nsICacheEntryOpenCallback.ENTRY_WANTED; }, onCacheEntryAvailable(aEntry, aNew, aResult) { this.log.trace("Cache entry is available."); this._cacheEntry = aEntry; this.connectToPipes(); this._cacheEntryResolver(this._cacheEntry); }, };