/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ /* This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ #include "nsAppRunner.h" #include "nsXREDirProvider.h" #ifndef ANDROID # include "commonupdatedir.h" #endif #include "jsapi.h" #include "xpcpublic.h" #include "prprf.h" #include "nsIAppStartup.h" #include "nsIFile.h" #include "nsIObserver.h" #include "nsIObserverService.h" #include "nsISimpleEnumerator.h" #include "nsIToolkitProfileService.h" #include "nsIXULRuntime.h" #include "commonupdatedir.h" #include "nsAppDirectoryServiceDefs.h" #include "nsDirectoryServiceDefs.h" #include "nsDirectoryServiceUtils.h" #include "nsXULAppAPI.h" #include "nsCategoryManagerUtils.h" #include "nsDependentString.h" #include "nsCOMArray.h" #include "nsArrayEnumerator.h" #include "nsEnumeratorUtils.h" #include "nsReadableUtils.h" #include "SpecialSystemDirectory.h" #include "mozilla/dom/ScriptSettings.h" #include "mozilla/AppShutdown.h" #include "mozilla/AutoRestore.h" #ifdef MOZ_BACKGROUNDTASKS # include "mozilla/BackgroundTasks.h" #endif #include "mozilla/Components.h" #include "mozilla/Services.h" #include "mozilla/Omnijar.h" #include "mozilla/Preferences.h" #include "mozilla/ProfilerLabels.h" #include "mozilla/Telemetry.h" #include "mozilla/XREAppData.h" #include "nsPrintfCString.h" #ifdef MOZ_THUNDERBIRD # include "nsIPK11TokenDB.h" # include "nsIPK11Token.h" #endif #include #ifdef XP_WIN # include # include # include "WinUtils.h" #endif #ifdef XP_MACOSX # include "nsILocalFileMac.h" // for chflags() # include # include #endif #ifdef XP_UNIX # include #endif #ifdef XP_IOS # include "UIKitDirProvider.h" #endif #if defined(MOZ_CONTENT_TEMP_DIR) # include "mozilla/SandboxSettings.h" # include "nsID.h" # include "mozilla/Unused.h" #endif #if defined(XP_MACOSX) # define APP_REGISTRY_NAME "Application Registry" #elif defined(XP_WIN) # define APP_REGISTRY_NAME "registry.dat" #else # define APP_REGISTRY_NAME "appreg" #endif #define PREF_OVERRIDE_DIRNAME "preferences" #if defined(MOZ_CONTENT_TEMP_DIR) static already_AddRefed GetProcessSandboxTempDir( GeckoProcessType type); static nsresult DeleteDirIfExists(nsIFile* dir); static bool IsContentSandboxDisabled(); static const char* GetProcessTempBaseDirKey(); static already_AddRefed CreateProcessSandboxTempDir( GeckoProcessType procType); #endif nsXREDirProvider* gDirServiceProvider = nullptr; nsIFile* gDataDirHomeLocal = nullptr; nsIFile* gDataDirHome = nullptr; nsCOMPtr gDataDirProfileLocal = nullptr; nsCOMPtr gDataDirProfile = nullptr; // These are required to allow nsXREDirProvider to be usable in xpcshell tests. // where gAppData is null. #if defined(XP_MACOSX) || defined(XP_UNIX) static const char* GetAppName() { if (gAppData) { return gAppData->name; } return nullptr; } #endif #ifdef XP_MACOSX static const char* GetAppVendor() { if (gAppData) { return gAppData->vendor; } return nullptr; } #endif nsXREDirProvider::nsXREDirProvider() { gDirServiceProvider = this; } nsXREDirProvider::~nsXREDirProvider() { gDirServiceProvider = nullptr; gDataDirHomeLocal = nullptr; gDataDirHome = nullptr; } already_AddRefed nsXREDirProvider::GetSingleton() { if (!gDirServiceProvider) { new nsXREDirProvider(); // This sets gDirServiceProvider } return do_AddRef(gDirServiceProvider); } nsresult nsXREDirProvider::Initialize(nsIFile* aXULAppDir, nsIFile* aGREDir) { NS_ENSURE_ARG(aXULAppDir); NS_ENSURE_ARG(aGREDir); mXULAppDir = aXULAppDir; mGREDir = aGREDir; nsCOMPtr binaryPath; nsresult rv = XRE_GetBinaryPath(getter_AddRefs(binaryPath)); NS_ENSURE_SUCCESS(rv, rv); return binaryPath->GetParent(getter_AddRefs(mGREBinDir)); } nsresult nsXREDirProvider::SetProfile(nsIFile* aDir, nsIFile* aLocalDir) { MOZ_ASSERT(aDir && aLocalDir, "We don't support no-profile apps!"); MOZ_ASSERT(!mProfileDir && !mProfileLocalDir, "You may only set the profile directories once"); nsresult rv = EnsureDirectoryExists(aDir); NS_ENSURE_SUCCESS(rv, rv); rv = EnsureDirectoryExists(aLocalDir); NS_ENSURE_SUCCESS(rv, rv); #ifndef XP_WIN nsAutoCString profilePath; rv = aDir->GetNativePath(profilePath); NS_ENSURE_SUCCESS(rv, rv); nsAutoCString localProfilePath; rv = aLocalDir->GetNativePath(localProfilePath); NS_ENSURE_SUCCESS(rv, rv); if (!mozilla::IsUtf8(profilePath) || !mozilla::IsUtf8(localProfilePath)) { PR_fprintf( PR_STDERR, "Error: The profile path is not valid UTF-8. Unable to continue.\n"); return NS_ERROR_FAILURE; } #endif #ifdef XP_MACOSX bool same; if (NS_SUCCEEDED(aDir->Equals(aLocalDir, &same)) && !same) { // Ensure that the cache directory is not indexed by Spotlight // (bug 718910). At least on OS X, the cache directory (under // ~/Library/Caches/) is always the "local" user profile // directory. This is confusing, since *both* user profile // directories are "local" (they both exist under the user's // home directory). But this usage dates back at least as far // as the patch for bug 291033, where "local" seems to mean // "suitable for temporary storage". Don't hide the cache // directory if by some chance it and the "non-local" profile // directory are the same -- there are bad side effects from // hiding a profile directory under /Library/Application Support/ // (see bug 801883). nsAutoCString cacheDir; if (NS_SUCCEEDED(aLocalDir->GetNativePath(cacheDir))) { if (chflags(cacheDir.get(), UF_HIDDEN)) { NS_WARNING("Failed to set Cache directory to HIDDEN."); } } } #endif mProfileDir = aDir; mProfileLocalDir = aLocalDir; return NS_OK; } NS_IMPL_QUERY_INTERFACE(nsXREDirProvider, nsIDirectoryServiceProvider, nsIDirectoryServiceProvider2, nsIXREDirProvider, nsIProfileStartup) NS_IMETHODIMP_(MozExternalRefCountType) nsXREDirProvider::AddRef() { return 1; } NS_IMETHODIMP_(MozExternalRefCountType) nsXREDirProvider::Release() { return 0; } nsresult nsXREDirProvider::GetUserProfilesRootDir(nsIFile** aResult) { nsCOMPtr file; nsresult rv = GetUserDataDirectory(getter_AddRefs(file), false); if (NS_SUCCEEDED(rv)) { #if !defined(XP_UNIX) || defined(XP_MACOSX) rv = file->AppendNative("Profiles"_ns); #endif // We must create the profile directory here if it does not exist. nsresult tmp = EnsureDirectoryExists(file); if (NS_FAILED(tmp)) { rv = tmp; } } file.swap(*aResult); return rv; } nsresult nsXREDirProvider::GetUserProfilesLocalDir(nsIFile** aResult) { nsCOMPtr file; nsresult rv = GetUserDataDirectory(getter_AddRefs(file), true); if (NS_SUCCEEDED(rv)) { #if !defined(XP_UNIX) || defined(XP_MACOSX) rv = file->AppendNative("Profiles"_ns); #endif // We must create the profile directory here if it does not exist. nsresult tmp = EnsureDirectoryExists(file); if (NS_FAILED(tmp)) { rv = tmp; } } file.swap(*aResult); return NS_OK; } #ifdef MOZ_BACKGROUNDTASKS nsresult nsXREDirProvider::GetBackgroundTasksProfilesRootDir( nsIFile** aResult) { nsCOMPtr file; nsresult rv = GetUserDataDirectory(getter_AddRefs(file), false); if (NS_SUCCEEDED(rv)) { # if !defined(XP_UNIX) || defined(XP_MACOSX) // Sibling to regular user "Profiles" directory. rv = file->AppendNative("Background Tasks Profiles"_ns); # endif // We must create the directory here if it does not exist. nsresult tmp = EnsureDirectoryExists(file); if (NS_FAILED(tmp)) { rv = tmp; } } file.swap(*aResult); return rv; } #endif #if defined(XP_UNIX) || defined(XP_MACOSX) /** * Get the directory that is the parent of the system-wide directories * for extensions and native manifests. * * On OSX this is /Library/Application Support/Mozilla * On Linux this is /usr/{lib,lib64}/mozilla * (for 32- and 64-bit systems respsectively) */ static nsresult GetSystemParentDirectory(nsIFile** aFile) { nsresult rv; nsCOMPtr localDir; # if defined(XP_MACOSX) rv = GetOSXFolderType(kOnSystemDisk, kApplicationSupportFolderType, getter_AddRefs(localDir)); if (NS_SUCCEEDED(rv)) { rv = localDir->AppendNative("Mozilla"_ns); } # else constexpr auto dirname = # ifdef HAVE_USR_LIB64_DIR "/usr/lib64/mozilla"_ns # elif defined(__OpenBSD__) || defined(__FreeBSD__) "/usr/local/lib/mozilla"_ns # else "/usr/lib/mozilla"_ns # endif ; rv = NS_NewNativeLocalFile(dirname, false, getter_AddRefs(localDir)); # endif if (NS_SUCCEEDED(rv)) { localDir.forget(aFile); } return rv; } #endif NS_IMETHODIMP nsXREDirProvider::GetFile(const char* aProperty, bool* aPersistent, nsIFile** aFile) { *aPersistent = true; nsresult rv = NS_ERROR_FAILURE; nsCOMPtr file; if (!strcmp(aProperty, NS_APP_USER_PROFILE_LOCAL_50_DIR) || !strcmp(aProperty, NS_APP_PROFILE_LOCAL_DIR_STARTUP)) { if (mProfileLocalDir) { rv = mProfileLocalDir->Clone(getter_AddRefs(file)); } else { // Profile directories are only set up in the parent process. // We don't expect every caller to check if they are in the right process, // so fail immediately to avoid warning spam. NS_WARNING_ASSERTION(!XRE_IsParentProcess(), "tried to get profile in parent too early"); return NS_ERROR_FAILURE; } } else if (!strcmp(aProperty, NS_APP_USER_PROFILE_50_DIR) || !strcmp(aProperty, NS_APP_PROFILE_DIR_STARTUP)) { if (mProfileDir) { rv = mProfileDir->Clone(getter_AddRefs(file)); } else { // Profile directories are only set up in the parent process. // We don't expect every caller to check if they are in the right process, // so fail immediately to avoid warning spam. NS_WARNING_ASSERTION(!XRE_IsParentProcess(), "tried to get profile in parent too early"); return NS_ERROR_FAILURE; } } else if (!strcmp(aProperty, NS_GRE_DIR)) { // On Android, internal files are inside the APK, a zip file, so this // folder doesn't really make sense. #if !defined(MOZ_WIDGET_ANDROID) rv = mGREDir->Clone(getter_AddRefs(file)); #endif // !defined(MOZ_WIDGET_ANDROID) } else if (!strcmp(aProperty, NS_GRE_BIN_DIR)) { rv = mGREBinDir->Clone(getter_AddRefs(file)); } else if (!strcmp(aProperty, NS_OS_CURRENT_PROCESS_DIR) || !strcmp(aProperty, NS_APP_INSTALL_CLEANUP_DIR)) { rv = GetAppDir()->Clone(getter_AddRefs(file)); } else if (!strcmp(aProperty, NS_APP_PREF_DEFAULTS_50_DIR)) { // Same as NS_GRE_DIR #if !defined(MOZ_WIDGET_ANDROID) // return the GRE default prefs directory here, and the app default prefs // directory (if applicable) in NS_APP_PREFS_DEFAULTS_DIR_LIST. rv = mGREDir->Clone(getter_AddRefs(file)); NS_ENSURE_SUCCESS(rv, rv); rv = file->AppendNative("defaults"_ns); NS_ENSURE_SUCCESS(rv, rv); rv = file->AppendNative("pref"_ns); #endif // !defined(MOZ_WIDGET_ANDROID) } else if (!strcmp(aProperty, NS_APP_APPLICATION_REGISTRY_DIR) || !strcmp(aProperty, XRE_USER_APP_DATA_DIR)) { rv = GetUserAppDataDirectory(getter_AddRefs(file)); } #if defined(XP_UNIX) || defined(XP_MACOSX) else if (!strcmp(aProperty, XRE_SYS_NATIVE_MANIFESTS)) { rv = ::GetSystemParentDirectory(getter_AddRefs(file)); } else if (!strcmp(aProperty, XRE_USER_NATIVE_MANIFESTS)) { rv = GetUserDataDirectoryHome(getter_AddRefs(file), false); NS_ENSURE_SUCCESS(rv, rv); # if defined(XP_MACOSX) rv = file->AppendNative("Mozilla"_ns); # else // defined(XP_MACOSX) rv = file->AppendNative(".mozilla"_ns); # endif // defined(XP_MACOSX) } #endif // defined(XP_UNIX) || defined(XP_MACOSX) else if (!strcmp(aProperty, XRE_UPDATE_ROOT_DIR)) { rv = GetUpdateRootDir(getter_AddRefs(file)); } else if (!strcmp(aProperty, XRE_OLD_UPDATE_ROOT_DIR)) { rv = GetUpdateRootDir(getter_AddRefs(file), true); } else if (!strcmp(aProperty, NS_APP_APPLICATION_REGISTRY_FILE)) { rv = GetUserAppDataDirectory(getter_AddRefs(file)); NS_ENSURE_SUCCESS(rv, rv); rv = file->AppendNative(nsLiteralCString(APP_REGISTRY_NAME)); } else if (!strcmp(aProperty, NS_APP_USER_PROFILES_ROOT_DIR)) { rv = GetUserProfilesRootDir(getter_AddRefs(file)); } else if (!strcmp(aProperty, NS_APP_USER_PROFILES_LOCAL_ROOT_DIR)) { rv = GetUserProfilesLocalDir(getter_AddRefs(file)); } else if (!strcmp(aProperty, XRE_EXECUTABLE_FILE)) { rv = XRE_GetBinaryPath(getter_AddRefs(file)); } #if defined(XP_UNIX) || defined(XP_MACOSX) else if (!strcmp(aProperty, XRE_SYS_LOCAL_EXTENSION_PARENT_DIR)) { # ifdef ENABLE_SYSTEM_EXTENSION_DIRS rv = GetSystemExtensionsDirectory(getter_AddRefs(file)); # endif } #endif // defined(XP_UNIX) || defined(XP_MACOSX) #if defined(XP_UNIX) && !defined(XP_MACOSX) else if (!strcmp(aProperty, XRE_SYS_SHARE_EXTENSION_PARENT_DIR)) { # ifdef ENABLE_SYSTEM_EXTENSION_DIRS # if defined(__OpenBSD__) || defined(__FreeBSD__) static const char* const sysLExtDir = "/usr/local/share/mozilla/extensions"; # else static const char* const sysLExtDir = "/usr/share/mozilla/extensions"; # endif rv = NS_NewNativeLocalFile(nsDependentCString(sysLExtDir), false, getter_AddRefs(file)); # endif } #endif // defined(XP_UNIX) && !defined(XP_MACOSX) else if (!strcmp(aProperty, XRE_USER_SYS_EXTENSION_DIR)) { #ifdef ENABLE_SYSTEM_EXTENSION_DIRS rv = GetSysUserExtensionsDirectory(getter_AddRefs(file)); #endif } else if (!strcmp(aProperty, XRE_USER_RUNTIME_DIR)) { #if defined(XP_UNIX) nsPrintfCString path("/run/user/%d/%s/", getuid(), GetAppName()); ToLowerCase(path); rv = NS_NewNativeLocalFile(path, false, getter_AddRefs(file)); #endif } else if (!strcmp(aProperty, XRE_APP_DISTRIBUTION_DIR)) { bool persistent = false; rv = GetFile(NS_GRE_DIR, &persistent, getter_AddRefs(file)); NS_ENSURE_SUCCESS(rv, rv); rv = file->AppendNative("distribution"_ns); } else if (!strcmp(aProperty, XRE_APP_FEATURES_DIR)) { rv = GetAppDir()->Clone(getter_AddRefs(file)); NS_ENSURE_SUCCESS(rv, rv); rv = file->AppendNative("features"_ns); } else if (!strcmp(aProperty, XRE_ADDON_APP_DIR)) { nsCOMPtr dirsvc( do_GetService("@mozilla.org/file/directory_service;1", &rv)); NS_ENSURE_SUCCESS(rv, rv); bool unused; rv = dirsvc->GetFile("XCurProcD", &unused, getter_AddRefs(file)); } #if defined(MOZ_CONTENT_TEMP_DIR) else if (!strcmp(aProperty, NS_APP_CONTENT_PROCESS_TEMP_DIR)) { if (!mContentTempDir) { rv = LoadContentProcessTempDir(); NS_ENSURE_SUCCESS(rv, rv); } rv = mContentTempDir->Clone(getter_AddRefs(file)); } #endif // defined(MOZ_CONTENT_TEMP_DIR) else if (!strcmp(aProperty, NS_APP_USER_CHROME_DIR)) { // We need to allow component, xpt, and chrome registration to // occur prior to the profile-after-change notification. rv = GetProfileStartupDir(getter_AddRefs(file)); NS_ENSURE_SUCCESS(rv, rv); rv = file->AppendNative("chrome"_ns); } else if (!strcmp(aProperty, NS_APP_PREFS_50_DIR)) { rv = GetProfileDir(getter_AddRefs(file)); } else if (!strcmp(aProperty, NS_APP_PREFS_50_FILE)) { rv = GetProfileDir(getter_AddRefs(file)); NS_ENSURE_SUCCESS(rv, rv); rv = file->AppendNative("prefs.js"_ns); } else if (!strcmp(aProperty, NS_APP_PREFS_OVERRIDE_DIR)) { rv = GetProfileDir(getter_AddRefs(file)); NS_ENSURE_SUCCESS(rv, rv); rv = file->AppendNative(nsLiteralCString(PREF_OVERRIDE_DIRNAME)); NS_ENSURE_SUCCESS(rv, rv); rv = EnsureDirectoryExists(file); } else { // We don't know anything about this property. Fail without warning, because // otherwise we'll get too much warning spam due to // nsDirectoryService::Get() trying everything it gets with every provider. return NS_ERROR_FAILURE; } NS_ENSURE_SUCCESS(rv, rv); NS_ENSURE_TRUE(file, NS_ERROR_FAILURE); file.forget(aFile); return NS_OK; } static void LoadDirIntoArray(nsIFile* dir, const char* const* aAppendList, nsCOMArray& aDirectories) { if (!dir) return; nsCOMPtr subdir; dir->Clone(getter_AddRefs(subdir)); if (!subdir) return; for (const char* const* a = aAppendList; *a; ++a) { subdir->AppendNative(nsDependentCString(*a)); } bool exists; if (NS_SUCCEEDED(subdir->Exists(&exists)) && exists) { aDirectories.AppendObject(subdir); } } #if defined(MOZ_CONTENT_TEMP_DIR) static const char* GetProcessTempBaseDirKey() { return NS_OS_TEMP_DIR; } // // Sets mContentTempDir so that it refers to the appropriate temp dir. // If the sandbox is enabled, NS_APP_CONTENT_PROCESS_TEMP_DIR, otherwise // NS_OS_TEMP_DIR is used. // nsresult nsXREDirProvider::LoadContentProcessTempDir() { // The parent is responsible for creating the sandbox temp dir. if (XRE_IsParentProcess()) { mContentProcessSandboxTempDir = CreateProcessSandboxTempDir(GeckoProcessType_Content); mContentTempDir = mContentProcessSandboxTempDir; } else { mContentTempDir = !IsContentSandboxDisabled() ? GetProcessSandboxTempDir(GeckoProcessType_Content) : nullptr; } if (!mContentTempDir) { nsresult rv = NS_GetSpecialDirectory(NS_OS_TEMP_DIR, getter_AddRefs(mContentTempDir)); if (NS_WARN_IF(NS_FAILED(rv))) { return rv; } } return NS_OK; } static bool IsContentSandboxDisabled() { return !mozilla::BrowserTabsRemoteAutostart() || (!mozilla::IsContentSandboxEnabled()); } // // If a process sandbox temp dir is to be used, returns an nsIFile // for the directory. Returns null if an error occurs. // static already_AddRefed GetProcessSandboxTempDir( GeckoProcessType type) { nsCOMPtr localFile; nsresult rv = NS_GetSpecialDirectory(GetProcessTempBaseDirKey(), getter_AddRefs(localFile)); if (NS_WARN_IF(NS_FAILED(rv))) { return nullptr; } MOZ_ASSERT(type == GeckoProcessType_Content); const char* prefKey = "security.sandbox.content.tempDirSuffix"; nsAutoString tempDirSuffix; rv = mozilla::Preferences::GetString(prefKey, tempDirSuffix); if (NS_WARN_IF(NS_FAILED(rv)) || tempDirSuffix.IsEmpty()) { return nullptr; } rv = localFile->Append(u"Temp-"_ns + tempDirSuffix); if (NS_WARN_IF(NS_FAILED(rv))) { return nullptr; } return localFile.forget(); } // // Create a temporary directory for use from sandboxed processes. // Only called in the parent. The path is derived from a UUID stored in a // pref which is available to content processes. Returns null // if the content sandbox is disabled or if an error occurs. // static already_AddRefed CreateProcessSandboxTempDir( GeckoProcessType procType) { if ((procType == GeckoProcessType_Content) && IsContentSandboxDisabled()) { return nullptr; } MOZ_ASSERT(procType == GeckoProcessType_Content); // Get (and create if blank) temp directory suffix pref. const char* pref = "security.sandbox.content.tempDirSuffix"; nsresult rv; nsAutoString tempDirSuffix; mozilla::Preferences::GetString(pref, tempDirSuffix); if (tempDirSuffix.IsEmpty()) { nsID uuid; rv = nsID::GenerateUUIDInPlace(uuid); if (NS_WARN_IF(NS_FAILED(rv))) { return nullptr; } char uuidChars[NSID_LENGTH]; uuid.ToProvidedString(uuidChars); tempDirSuffix.AssignASCII(uuidChars, NSID_LENGTH); # ifdef XP_UNIX // Braces in a path are somewhat annoying to deal with // and pretty alien on Unix tempDirSuffix.StripChars(u"{}"); # endif // Save the pref rv = mozilla::Preferences::SetString(pref, tempDirSuffix); if (NS_WARN_IF(NS_FAILED(rv))) { // If we fail to save the pref we don't want to create the temp dir, // because we won't be able to clean it up later. return nullptr; } nsCOMPtr prefsvc = mozilla::Preferences::GetService(); if (!prefsvc || NS_FAILED((rv = prefsvc->SavePrefFile(nullptr)))) { // Again, if we fail to save the pref file we might not be able to clean // up the temp directory, so don't create one. Note that in the case // the preference values allows an off main thread save, the successful // return from the call doesn't mean we actually saved the file. See // bug 1364496 for details. NS_WARNING("Failed to save pref file, cannot create temp dir."); return nullptr; } } nsCOMPtr sandboxTempDir = GetProcessSandboxTempDir(procType); if (!sandboxTempDir) { NS_WARNING("Failed to determine sandbox temp dir path."); return nullptr; } // Remove the directory. It may exist due to a previous crash. if (NS_FAILED(DeleteDirIfExists(sandboxTempDir))) { NS_WARNING("Failed to reset sandbox temp dir."); return nullptr; } // Create the directory rv = sandboxTempDir->Create(nsIFile::DIRECTORY_TYPE, 0700); if (NS_FAILED(rv)) { NS_WARNING("Failed to create sandbox temp dir."); return nullptr; } return sandboxTempDir.forget(); } static nsresult DeleteDirIfExists(nsIFile* dir) { if (dir) { // Don't return an error if the directory doesn't exist. nsresult rv = dir->Remove(/* aRecursive */ true); if (NS_FAILED(rv) && rv != NS_ERROR_FILE_NOT_FOUND) { return rv; } } return NS_OK; } #endif // defined(MOZ_CONTENT_TEMP_DIR) static const char* const kAppendPrefDir[] = {"defaults", "preferences", nullptr}; #ifdef MOZ_BACKGROUNDTASKS static const char* const kAppendBackgroundTasksPrefDir[] = { "defaults", "backgroundtasks", nullptr}; #endif NS_IMETHODIMP nsXREDirProvider::GetFiles(const char* aProperty, nsISimpleEnumerator** aResult) { nsresult rv = NS_ERROR_FAILURE; *aResult = nullptr; if (!strcmp(aProperty, NS_APP_PREFS_DEFAULTS_DIR_LIST)) { nsCOMArray directories; LoadDirIntoArray(mXULAppDir, kAppendPrefDir, directories); #ifdef MOZ_BACKGROUNDTASKS if (mozilla::BackgroundTasks::IsBackgroundTaskMode()) { LoadDirIntoArray(mGREDir, kAppendBackgroundTasksPrefDir, directories); LoadDirIntoArray(mXULAppDir, kAppendBackgroundTasksPrefDir, directories); } #endif rv = NS_NewArrayEnumerator(aResult, directories, NS_GET_IID(nsIFile)); } else if (!strcmp(aProperty, NS_APP_CHROME_DIR_LIST)) { // NS_APP_CHROME_DIR_LIST is only used to get default (native) icons // for OS window decoration. static const char* const kAppendChromeDir[] = {"chrome", nullptr}; nsCOMArray directories; LoadDirIntoArray(mXULAppDir, kAppendChromeDir, directories); rv = NS_NewArrayEnumerator(aResult, directories, NS_GET_IID(nsIFile)); } NS_ENSURE_SUCCESS(rv, rv); return NS_SUCCESS_AGGREGATE_RESULT; } NS_IMETHODIMP nsXREDirProvider::GetDirectory(nsIFile** aResult) { NS_ENSURE_TRUE(mProfileDir, NS_ERROR_NOT_INITIALIZED); return mProfileDir->Clone(aResult); } void nsXREDirProvider::InitializeUserPrefs() { if (!mPrefsInitialized) { mozilla::Preferences::InitializeUserPrefs(); } } void nsXREDirProvider::FinishInitializingUserPrefs() { if (!mPrefsInitialized) { mozilla::Preferences::FinishInitializingUserPrefs(); mPrefsInitialized = true; } } NS_IMETHODIMP nsXREDirProvider::DoStartup() { nsresult rv; if (!mAppStarted) { nsCOMPtr obsSvc = mozilla::services::GetObserverService(); if (!obsSvc) return NS_ERROR_FAILURE; mAppStarted = true; /* Make sure we've setup prefs before profile-do-change to be able to use them to track crashes and because we want to begin crash tracking before other code run from this notification since they may cause crashes. */ MOZ_ASSERT(mPrefsInitialized); bool safeModeNecessary = false; nsCOMPtr appStartup( mozilla::components::AppStartup::Service()); if (appStartup) { rv = appStartup->TrackStartupCrashBegin(&safeModeNecessary); if (NS_FAILED(rv) && rv != NS_ERROR_NOT_AVAILABLE) NS_WARNING("Error while beginning startup crash tracking"); if (!gSafeMode && safeModeNecessary) { appStartup->RestartInSafeMode(nsIAppStartup::eForceQuit); return NS_OK; } } static const char16_t kStartup[] = {'s', 't', 'a', 'r', 't', 'u', 'p', '\0'}; obsSvc->NotifyObservers(nullptr, "profile-do-change", kStartup); // Initialize the Enterprise Policies service in the parent process // In the content process it's loaded on demand when needed if (XRE_IsParentProcess()) { nsCOMPtr policies( do_GetService("@mozilla.org/enterprisepolicies;1")); if (policies) { policies->Observe(nullptr, "policies-startup", nullptr); } } #ifdef MOZ_THUNDERBIRD bool bgtaskMode = false; # ifdef MOZ_BACKGROUNDTASKS bgtaskMode = mozilla::BackgroundTasks::IsBackgroundTaskMode(); # endif if (!bgtaskMode && mozilla::Preferences::GetBool( "security.prompt_for_master_password_on_startup", false)) { // Prompt for the master password prior to opening application windows, // to avoid the race that triggers multiple prompts (see bug 177175). // We use this code until we have a better solution, possibly as // described in bug 177175 comment 384. nsCOMPtr db = do_GetService("@mozilla.org/security/pk11tokendb;1"); if (db) { nsCOMPtr token; if (NS_SUCCEEDED(db->GetInternalKeyToken(getter_AddRefs(token)))) { mozilla::Unused << token->Login(false); } } else { NS_WARNING("Failed to get nsIPK11TokenDB service."); } } #endif bool initExtensionManager = #ifdef MOZ_BACKGROUNDTASKS !mozilla::BackgroundTasks::IsBackgroundTaskMode(); #else true; #endif if (initExtensionManager) { // Init the Extension Manager nsCOMPtr em = do_GetService("@mozilla.org/addons/integration;1"); if (em) { em->Observe(nullptr, "addons-startup", nullptr); } else { NS_WARNING("Failed to create Addons Manager."); } } obsSvc->NotifyObservers(nullptr, "profile-after-change", kStartup); // Any component that has registered for the profile-after-change category // should also be created at this time. (void)NS_CreateServicesFromCategory("profile-after-change", nullptr, "profile-after-change"); if (gSafeMode && safeModeNecessary) { static const char16_t kCrashed[] = {'c', 'r', 'a', 's', 'h', 'e', 'd', '\0'}; obsSvc->NotifyObservers(nullptr, "safemode-forced", kCrashed); } // 1 = Regular mode, 2 = Safe mode, 3 = Safe mode forced int mode = 1; if (gSafeMode) { if (safeModeNecessary) mode = 3; else mode = 2; } mozilla::Telemetry::Accumulate(mozilla::Telemetry::SAFE_MODE_USAGE, mode); obsSvc->NotifyObservers(nullptr, "profile-initial-state", nullptr); #if defined(MOZ_CONTENT_TEMP_DIR) // Makes sure the content temp dir has been loaded if it hasn't been // already. In the parent this ensures it has been created before we attempt // to start any content processes. if (!mContentTempDir) { mozilla::Unused << NS_WARN_IF(NS_FAILED(LoadContentProcessTempDir())); } #endif } return NS_OK; } void nsXREDirProvider::DoShutdown() { AUTO_PROFILER_LABEL("nsXREDirProvider::DoShutdown", OTHER); if (mAppStarted) { mozilla::AppShutdown::AdvanceShutdownPhase( mozilla::ShutdownPhase::AppShutdownNetTeardown, nullptr); mozilla::AppShutdown::AdvanceShutdownPhase( mozilla::ShutdownPhase::AppShutdownTeardown, nullptr); #ifdef DEBUG // Not having this causes large intermittent leaks. See bug 1340425. if (JSContext* cx = mozilla::dom::danger::GetJSContext()) { JS_GC(cx); } #endif mozilla::AppShutdown::AdvanceShutdownPhase( mozilla::ShutdownPhase::AppShutdown, nullptr); mozilla::AppShutdown::AdvanceShutdownPhase( mozilla::ShutdownPhase::AppShutdownQM, nullptr); mozilla::AppShutdown::AdvanceShutdownPhase( mozilla::ShutdownPhase::AppShutdownTelemetry, nullptr); mAppStarted = false; } gDataDirProfileLocal = nullptr; gDataDirProfile = nullptr; #if defined(MOZ_CONTENT_TEMP_DIR) if (XRE_IsParentProcess()) { mozilla::Unused << DeleteDirIfExists(mContentProcessSandboxTempDir); } #endif } #ifdef XP_WIN static nsresult GetShellFolderPath(KNOWNFOLDERID folder, nsAString& _retval) { DWORD flags = KF_FLAG_SIMPLE_IDLIST | KF_FLAG_DONT_VERIFY | KF_FLAG_NO_ALIAS; PWSTR path = nullptr; if (!SUCCEEDED(SHGetKnownFolderPath(folder, flags, NULL, &path))) { return NS_ERROR_NOT_AVAILABLE; } _retval = nsDependentString(path); CoTaskMemFree(path); return NS_OK; } /** * Provides a fallback for getting the path to APPDATA or LOCALAPPDATA by * querying the registry when the call to SHGetSpecialFolderLocation or * SHGetPathFromIDListW is unable to provide these paths (Bug 513958). */ static nsresult GetRegWindowsAppDataFolder(bool aLocal, nsAString& _retval) { HKEY key; LPCWSTR keyName = L"Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Shell Folders"; DWORD res = ::RegOpenKeyExW(HKEY_CURRENT_USER, keyName, 0, KEY_READ, &key); if (res != ERROR_SUCCESS) { _retval.SetLength(0); return NS_ERROR_NOT_AVAILABLE; } DWORD type, size; res = RegQueryValueExW(key, (aLocal ? L"Local AppData" : L"AppData"), nullptr, &type, nullptr, &size); // The call to RegQueryValueExW must succeed, the type must be REG_SZ, the // buffer size must not equal 0, and the buffer size be a multiple of 2. if (res != ERROR_SUCCESS || type != REG_SZ || size == 0 || size % 2 != 0) { ::RegCloseKey(key); _retval.SetLength(0); return NS_ERROR_NOT_AVAILABLE; } // |size| may or may not include room for the terminating null character DWORD resultLen = size / 2; if (!_retval.SetLength(resultLen, mozilla::fallible)) { ::RegCloseKey(key); _retval.SetLength(0); return NS_ERROR_NOT_AVAILABLE; } auto begin = _retval.BeginWriting(); res = RegQueryValueExW(key, (aLocal ? L"Local AppData" : L"AppData"), nullptr, nullptr, (LPBYTE)begin, &size); ::RegCloseKey(key); if (res != ERROR_SUCCESS) { _retval.SetLength(0); return NS_ERROR_NOT_AVAILABLE; } if (!_retval.CharAt(resultLen - 1)) { // It was already null terminated. _retval.Truncate(resultLen - 1); } return NS_OK; } #endif static nsresult HashInstallPath(nsAString& aInstallPath, nsAString& aPathHash) { mozilla::UniquePtr hash; bool success = ::GetInstallHash(PromiseFlatString(aInstallPath).get(), hash); if (!success) { return NS_ERROR_FAILURE; } // The hash string is a NS_tchar*, which is wchar* in Windows and char* // elsewhere. #ifdef XP_WIN aPathHash.Assign(hash.get()); #else aPathHash.AssignASCII(hash.get()); #endif return NS_OK; } /** * Gets a hash of the installation directory. */ nsresult nsXREDirProvider::GetInstallHash(nsAString& aPathHash) { nsAutoString stringToHash; #ifdef XP_WIN if (mozilla::widget::WinUtils::HasPackageIdentity()) { // For packages, the install path includes the version number, so it isn't // a stable or consistent identifier for the installation. The package // family name is though, so use that instead of the path. stringToHash = mozilla::widget::WinUtils::GetPackageFamilyName(); } else #endif { nsCOMPtr installDir; nsCOMPtr appFile; bool per = false; nsresult rv = GetFile(XRE_EXECUTABLE_FILE, &per, getter_AddRefs(appFile)); NS_ENSURE_SUCCESS(rv, rv); rv = appFile->GetParent(getter_AddRefs(installDir)); NS_ENSURE_SUCCESS(rv, rv); // It is possible that the path we have is on a case insensitive // filesystem in which case the path may vary depending on how the // application is called. We want to normalize the case somehow. #ifdef XP_WIN // Windows provides a way to get the correct case. if (!mozilla::widget::WinUtils::ResolveJunctionPointsAndSymLinks( installDir)) { NS_WARNING("Failed to resolve install directory."); } #elif defined(MOZ_WIDGET_COCOA) // On OSX roundtripping through an FSRef fixes the case. FSRef ref; nsCOMPtr macFile = do_QueryInterface(installDir); rv = macFile->GetFSRef(&ref); NS_ENSURE_SUCCESS(rv, rv); rv = NS_NewLocalFileWithFSRef(&ref, true, getter_AddRefs(macFile)); NS_ENSURE_SUCCESS(rv, rv); installDir = static_cast(macFile); #endif // On linux XRE_EXECUTABLE_FILE already seems to be set to the correct path. rv = installDir->GetPath(stringToHash); NS_ENSURE_SUCCESS(rv, rv); } // If we somehow failed to get an actual value, hashing an empty string could // potentially cause some serious problems given all the things this hash is // used for. So we don't allow that. if (stringToHash.IsEmpty()) { return NS_ERROR_FAILURE; } return HashInstallPath(stringToHash, aPathHash); } /** * Before bug 1555319 the directory hashed can have had an incorrect case. * Access to that hash is still available through this function. It is needed so * we can migrate users who may have an incorrect hash in profiles.ini. This * support can probably be removed in a few releases time. */ nsresult nsXREDirProvider::GetLegacyInstallHash(nsAString& aPathHash) { nsCOMPtr installDir; nsCOMPtr appFile; bool per = false; nsresult rv = GetFile(XRE_EXECUTABLE_FILE, &per, getter_AddRefs(appFile)); NS_ENSURE_SUCCESS(rv, rv); rv = appFile->GetParent(getter_AddRefs(installDir)); NS_ENSURE_SUCCESS(rv, rv); nsAutoString installPath; rv = installDir->GetPath(installPath); NS_ENSURE_SUCCESS(rv, rv); #ifdef XP_WIN # if defined(MOZ_THUNDERBIRD) || defined(MOZ_SUITE) // Convert a 64-bit install path to what would have been the 32-bit install // path to allow users to migrate their profiles from one to the other. PWSTR pathX86 = nullptr; HRESULT hres = SHGetKnownFolderPath(FOLDERID_ProgramFilesX86, 0, nullptr, &pathX86); if (SUCCEEDED(hres)) { nsDependentString strPathX86(pathX86); if (!StringBeginsWith(installPath, strPathX86, nsCaseInsensitiveStringComparator)) { PWSTR path = nullptr; hres = SHGetKnownFolderPath(FOLDERID_ProgramFiles, 0, nullptr, &path); if (SUCCEEDED(hres)) { if (StringBeginsWith(installPath, nsDependentString(path), nsCaseInsensitiveStringComparator)) { installPath.Replace(0, wcslen(path), strPathX86); } } CoTaskMemFree(path); } } CoTaskMemFree(pathX86); # endif #endif return HashInstallPath(installPath, aPathHash); } nsresult nsXREDirProvider::GetUpdateRootDir(nsIFile** aResult, bool aGetOldLocation) { #ifndef XP_WIN // There is no old update location on platforms other than Windows. Windows is // the only platform for which we migrated the update directory. if (aGetOldLocation) { return NS_ERROR_NOT_IMPLEMENTED; } #endif nsCOMPtr updRoot; nsCOMPtr appFile; bool per = false; nsresult rv = GetFile(XRE_EXECUTABLE_FILE, &per, getter_AddRefs(appFile)); NS_ENSURE_SUCCESS(rv, rv); rv = appFile->GetParent(getter_AddRefs(updRoot)); NS_ENSURE_SUCCESS(rv, rv); #ifdef XP_MACOSX nsCOMPtr appRootDirFile; nsCOMPtr localDir; nsAutoString appDirPath; if (NS_FAILED(appFile->GetParent(getter_AddRefs(appRootDirFile))) || NS_FAILED(appRootDirFile->GetPath(appDirPath)) || NS_FAILED(GetUserDataDirectoryHome(getter_AddRefs(localDir), true))) { return NS_ERROR_FAILURE; } int32_t dotIndex = appDirPath.RFind(u".app"); if (dotIndex == kNotFound) { dotIndex = appDirPath.Length(); } appDirPath = Substring(appDirPath, 1, dotIndex - 1); bool hasVendor = GetAppVendor() && strlen(GetAppVendor()) != 0; if (hasVendor || GetAppName()) { if (NS_FAILED(localDir->AppendNative( nsDependentCString(hasVendor ? GetAppVendor() : GetAppName())))) { return NS_ERROR_FAILURE; } } else if (NS_FAILED(localDir->AppendNative("Mozilla"_ns))) { return NS_ERROR_FAILURE; } if (NS_FAILED(localDir->Append(u"updates"_ns)) || NS_FAILED(localDir->AppendRelativePath(appDirPath))) { return NS_ERROR_FAILURE; } localDir.forget(aResult); return NS_OK; #elif XP_WIN nsAutoString installPath; rv = updRoot->GetPath(installPath); NS_ENSURE_SUCCESS(rv, rv); mozilla::UniquePtr updatePath; HRESULT hrv; if (aGetOldLocation) { hrv = GetOldUpdateDirectory(PromiseFlatString(installPath).get(), updatePath); } else { hrv = GetCommonUpdateDirectory(PromiseFlatString(installPath).get(), updatePath); } if (FAILED(hrv)) { return NS_ERROR_FAILURE; } nsAutoString updatePathStr; updatePathStr.Assign(updatePath.get()); updRoot->InitWithPath(updatePathStr); updRoot.forget(aResult); return NS_OK; #else updRoot.forget(aResult); return NS_OK; #endif // XP_WIN } nsresult nsXREDirProvider::GetProfileStartupDir(nsIFile** aResult) { NS_ENSURE_TRUE(mProfileDir, NS_ERROR_FAILURE); return mProfileDir->Clone(aResult); } nsresult nsXREDirProvider::GetProfileDir(nsIFile** aResult) { if (!mProfileDir) { nsresult rv = NS_GetSpecialDirectory(NS_APP_USER_PROFILE_50_DIR, getter_AddRefs(mProfileDir)); NS_ENSURE_SUCCESS(rv, rv); NS_ENSURE_TRUE(mProfileDir, NS_ERROR_FAILURE); } return mProfileDir->Clone(aResult); } NS_IMETHODIMP nsXREDirProvider::SetUserDataDirectory(nsIFile* aFile, bool aLocal) { if (aLocal) { NS_IF_RELEASE(gDataDirHomeLocal); NS_IF_ADDREF(gDataDirHomeLocal = aFile); } else { NS_IF_RELEASE(gDataDirHome); NS_IF_ADDREF(gDataDirHome = aFile); } return NS_OK; } /* static */ nsresult nsXREDirProvider::SetUserDataProfileDirectory(nsCOMPtr& aFile, bool aLocal) { if (aLocal) { gDataDirProfileLocal = aFile; } else { gDataDirProfile = aFile; } return NS_OK; } nsresult nsXREDirProvider::GetUserDataDirectoryHome(nsIFile** aFile, bool aLocal) { // Copied from nsAppFileLocationProvider (more or less) nsresult rv; nsCOMPtr localDir; if (aLocal && gDataDirHomeLocal) { return gDataDirHomeLocal->Clone(aFile); } if (!aLocal && gDataDirHome) { return gDataDirHome->Clone(aFile); } #if defined(XP_MACOSX) FSRef fsRef; OSType folderType; if (aLocal) { folderType = kCachedDataFolderType; } else { # ifdef MOZ_THUNDERBIRD folderType = kDomainLibraryFolderType; # else folderType = kApplicationSupportFolderType; # endif } OSErr err = ::FSFindFolder(kUserDomain, folderType, kCreateFolder, &fsRef); NS_ENSURE_FALSE(err, NS_ERROR_FAILURE); rv = NS_NewNativeLocalFile(""_ns, true, getter_AddRefs(localDir)); NS_ENSURE_SUCCESS(rv, rv); nsCOMPtr dirFileMac = do_QueryInterface(localDir); NS_ENSURE_TRUE(dirFileMac, NS_ERROR_UNEXPECTED); rv = dirFileMac->InitWithFSRef(&fsRef); NS_ENSURE_SUCCESS(rv, rv); localDir = dirFileMac; #elif defined(XP_IOS) nsAutoCString userDir; if (GetUIKitDirectory(aLocal, userDir)) { rv = NS_NewNativeLocalFile(userDir, true, getter_AddRefs(localDir)); } else { rv = NS_ERROR_FAILURE; } NS_ENSURE_SUCCESS(rv, rv); #elif defined(XP_WIN) nsString path; if (aLocal) { rv = GetShellFolderPath(FOLDERID_LocalAppData, path); if (NS_FAILED(rv)) rv = GetRegWindowsAppDataFolder(aLocal, path); } if (!aLocal || NS_FAILED(rv)) { rv = GetShellFolderPath(FOLDERID_RoamingAppData, path); if (NS_FAILED(rv)) { if (!aLocal) rv = GetRegWindowsAppDataFolder(aLocal, path); } } NS_ENSURE_SUCCESS(rv, rv); rv = NS_NewLocalFile(path, true, getter_AddRefs(localDir)); #elif defined(XP_UNIX) const char* homeDir = getenv("HOME"); if (!homeDir || !*homeDir) return NS_ERROR_FAILURE; # ifdef ANDROID /* We want (ProfD == ProfLD) on Android. */ aLocal = false; # endif if (aLocal) { // If $XDG_CACHE_HOME is defined use it, otherwise use $HOME/.cache. const char* cacheHome = getenv("XDG_CACHE_HOME"); if (cacheHome && *cacheHome) { rv = NS_NewNativeLocalFile(nsDependentCString(cacheHome), true, getter_AddRefs(localDir)); } else { rv = NS_NewNativeLocalFile(nsDependentCString(homeDir), true, getter_AddRefs(localDir)); if (NS_SUCCEEDED(rv)) rv = localDir->AppendNative(".cache"_ns); } } else { rv = NS_NewNativeLocalFile(nsDependentCString(homeDir), true, getter_AddRefs(localDir)); } #else # error "Don't know how to get product dir on your platform" #endif NS_IF_ADDREF(*aFile = localDir); return rv; } nsresult nsXREDirProvider::GetSysUserExtensionsDirectory(nsIFile** aFile) { nsCOMPtr localDir; nsresult rv = GetUserDataDirectoryHome(getter_AddRefs(localDir), false); NS_ENSURE_SUCCESS(rv, rv); rv = AppendSysUserExtensionPath(localDir); NS_ENSURE_SUCCESS(rv, rv); rv = EnsureDirectoryExists(localDir); NS_ENSURE_SUCCESS(rv, rv); localDir.forget(aFile); return NS_OK; } #if defined(XP_UNIX) || defined(XP_MACOSX) nsresult nsXREDirProvider::GetSystemExtensionsDirectory(nsIFile** aFile) { nsresult rv; nsCOMPtr localDir; rv = GetSystemParentDirectory(getter_AddRefs(localDir)); if (NS_SUCCEEDED(rv)) { constexpr auto sExtensions = # if defined(XP_MACOSX) "Extensions"_ns # else "extensions"_ns # endif ; rv = localDir->AppendNative(sExtensions); if (NS_SUCCEEDED(rv)) { localDir.forget(aFile); } } return rv; } #endif nsresult nsXREDirProvider::GetUserDataDirectory(nsIFile** aFile, bool aLocal) { nsCOMPtr localDir; if (aLocal && gDataDirProfileLocal) { return gDataDirProfileLocal->Clone(aFile); } if (!aLocal && gDataDirProfile) { return gDataDirProfile->Clone(aFile); } nsresult rv = GetUserDataDirectoryHome(getter_AddRefs(localDir), aLocal); NS_ENSURE_SUCCESS(rv, rv); rv = AppendProfilePath(localDir, aLocal); NS_ENSURE_SUCCESS(rv, rv); rv = EnsureDirectoryExists(localDir); NS_ENSURE_SUCCESS(rv, rv); nsXREDirProvider::SetUserDataProfileDirectory(localDir, aLocal); localDir.forget(aFile); return NS_OK; } nsresult nsXREDirProvider::EnsureDirectoryExists(nsIFile* aDirectory) { nsresult rv = aDirectory->Create(nsIFile::DIRECTORY_TYPE, 0700); if (rv == NS_ERROR_FILE_ALREADY_EXISTS) { rv = NS_OK; } return rv; } nsresult nsXREDirProvider::AppendSysUserExtensionPath(nsIFile* aFile) { NS_ASSERTION(aFile, "Null pointer!"); nsresult rv; #if defined(XP_MACOSX) || defined(XP_WIN) static const char* const sXR = "Mozilla"; rv = aFile->AppendNative(nsDependentCString(sXR)); NS_ENSURE_SUCCESS(rv, rv); static const char* const sExtensions = "Extensions"; rv = aFile->AppendNative(nsDependentCString(sExtensions)); NS_ENSURE_SUCCESS(rv, rv); #elif defined(XP_UNIX) static const char* const sXR = ".mozilla"; rv = aFile->AppendNative(nsDependentCString(sXR)); NS_ENSURE_SUCCESS(rv, rv); static const char* const sExtensions = "extensions"; rv = aFile->AppendNative(nsDependentCString(sExtensions)); NS_ENSURE_SUCCESS(rv, rv); #else # error "Don't know how to get XRE user extension path on your platform" #endif return NS_OK; } nsresult nsXREDirProvider::AppendProfilePath(nsIFile* aFile, bool aLocal) { NS_ASSERTION(aFile, "Null pointer!"); // If there is no XREAppData then there is no information to use to build // the profile path so just do nothing. This should only happen in xpcshell // tests. if (!gAppData) { return NS_OK; } nsAutoCString profile; nsAutoCString appName; nsAutoCString vendor; if (gAppData->profile) { profile = gAppData->profile; } else { appName = gAppData->name; vendor = gAppData->vendor; } nsresult rv = NS_OK; #if defined(XP_MACOSX) if (!profile.IsEmpty()) { rv = AppendProfileString(aFile, profile.get()); } else { // Note that MacOS ignores the vendor when creating the profile hierarchy - // all application preferences directories live alongside one another in // ~/Library/Application Support/ rv = aFile->AppendNative(appName); } NS_ENSURE_SUCCESS(rv, rv); #elif defined(XP_WIN) if (!profile.IsEmpty()) { rv = AppendProfileString(aFile, profile.get()); } else { if (!vendor.IsEmpty()) { rv = aFile->AppendNative(vendor); NS_ENSURE_SUCCESS(rv, rv); } rv = aFile->AppendNative(appName); } NS_ENSURE_SUCCESS(rv, rv); #elif defined(ANDROID) // The directory used for storing profiles // The parent of this directory is set in GetUserDataDirectoryHome // XXX: handle gAppData->profile properly // XXXsmaug ...and the rest of the profile creation! rv = aFile->AppendNative(nsDependentCString("mozilla")); NS_ENSURE_SUCCESS(rv, rv); #elif defined(XP_UNIX) nsAutoCString folder; // Make it hidden (by starting with "."), except when local (the // profile is already under ~/.cache or XDG_CACHE_HOME). if (!aLocal) folder.Assign('.'); if (!profile.IsEmpty()) { // Skip any leading path characters const char* profileStart = profile.get(); while (*profileStart == '/' || *profileStart == '\\') profileStart++; // On the off chance that someone wanted their folder to be hidden don't // let it become ".." if (*profileStart == '.' && !aLocal) profileStart++; folder.Append(profileStart); ToLowerCase(folder); rv = AppendProfileString(aFile, folder.BeginReading()); } else { if (!vendor.IsEmpty()) { folder.Append(vendor); ToLowerCase(folder); rv = aFile->AppendNative(folder); NS_ENSURE_SUCCESS(rv, rv); folder.Truncate(); } // This can be the case in tests. if (!appName.IsEmpty()) { folder.Append(appName); ToLowerCase(folder); rv = aFile->AppendNative(folder); } } NS_ENSURE_SUCCESS(rv, rv); #else # error "Don't know how to get profile path on your platform" #endif return NS_OK; } nsresult nsXREDirProvider::AppendProfileString(nsIFile* aFile, const char* aPath) { NS_ASSERTION(aFile, "Null file!"); NS_ASSERTION(aPath, "Null path!"); nsAutoCString pathDup(aPath); char* path = pathDup.BeginWriting(); nsresult rv; char* subdir; while ((subdir = NS_strtok("/\\", &path))) { rv = aFile->AppendNative(nsDependentCString(subdir)); NS_ENSURE_SUCCESS(rv, rv); } return NS_OK; }