зеркало из https://github.com/mozilla/gecko-dev.git
1799 строки
53 KiB
C++
1799 строки
53 KiB
C++
/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
#include "nsAppRunner.h"
|
|
#include "nsToolkitCompsCID.h"
|
|
#include "nsXREDirProvider.h"
|
|
#include "mozilla/AddonManagerStartup.h"
|
|
|
|
#include "jsapi.h"
|
|
#include "xpcpublic.h"
|
|
|
|
#include "nsIAddonInterposition.h"
|
|
#include "nsIAppStartup.h"
|
|
#include "nsIDirectoryEnumerator.h"
|
|
#include "nsIFile.h"
|
|
#include "nsIObserver.h"
|
|
#include "nsIObserverService.h"
|
|
#include "nsISimpleEnumerator.h"
|
|
#include "nsIToolkitChromeRegistry.h"
|
|
#include "nsIToolkitProfileService.h"
|
|
#include "nsIXULRuntime.h"
|
|
|
|
#include "nsAppDirectoryServiceDefs.h"
|
|
#include "nsDirectoryServiceDefs.h"
|
|
#include "nsDirectoryServiceUtils.h"
|
|
#include "nsXULAppAPI.h"
|
|
#include "nsCategoryManagerUtils.h"
|
|
|
|
#include "nsDependentString.h"
|
|
#include "nsCOMArray.h"
|
|
#include "nsArrayEnumerator.h"
|
|
#include "nsEnumeratorUtils.h"
|
|
#include "nsReadableUtils.h"
|
|
|
|
#include "SpecialSystemDirectory.h"
|
|
|
|
#include "mozilla/dom/ScriptSettings.h"
|
|
|
|
#include "mozilla/AutoRestore.h"
|
|
#include "mozilla/Services.h"
|
|
#include "mozilla/Omnijar.h"
|
|
#include "mozilla/Preferences.h"
|
|
#include "mozilla/Telemetry.h"
|
|
|
|
#include <stdlib.h>
|
|
|
|
#ifdef XP_WIN
|
|
#include "city.h"
|
|
#include <windows.h>
|
|
#include <shlobj.h>
|
|
#endif
|
|
#ifdef XP_MACOSX
|
|
#include "nsILocalFileMac.h"
|
|
// for chflags()
|
|
#include <sys/stat.h>
|
|
#include <unistd.h>
|
|
#endif
|
|
#ifdef XP_UNIX
|
|
#include <ctype.h>
|
|
#endif
|
|
#ifdef XP_IOS
|
|
#include "UIKitDirProvider.h"
|
|
#endif
|
|
|
|
#if defined(MOZ_CONTENT_SANDBOX)
|
|
#include "mozilla/SandboxSettings.h"
|
|
#if (defined(XP_WIN) || defined(XP_MACOSX))
|
|
#include "nsIUUIDGenerator.h"
|
|
#include "mozilla/Unused.h"
|
|
#if defined(XP_WIN)
|
|
#include "WinUtils.h"
|
|
#endif
|
|
#endif
|
|
#endif
|
|
|
|
#if defined(XP_MACOSX)
|
|
#define APP_REGISTRY_NAME "Application Registry"
|
|
#elif defined(XP_WIN)
|
|
#define APP_REGISTRY_NAME "registry.dat"
|
|
#else
|
|
#define APP_REGISTRY_NAME "appreg"
|
|
#endif
|
|
|
|
#define PREF_OVERRIDE_DIRNAME "preferences"
|
|
|
|
#if (defined(XP_WIN) || defined(XP_MACOSX)) && defined(MOZ_CONTENT_SANDBOX)
|
|
static already_AddRefed<nsIFile> GetContentProcessSandboxTempDir();
|
|
static nsresult DeleteDirIfExists(nsIFile *dir);
|
|
static bool IsContentSandboxDisabled();
|
|
static const char* GetContentProcessTempBaseDirKey();
|
|
static already_AddRefed<nsIFile> CreateContentProcessSandboxTempDir();
|
|
#endif
|
|
|
|
nsXREDirProvider* gDirServiceProvider = nullptr;
|
|
|
|
nsXREDirProvider::nsXREDirProvider() :
|
|
mProfileNotified(false)
|
|
{
|
|
gDirServiceProvider = this;
|
|
}
|
|
|
|
nsXREDirProvider::~nsXREDirProvider()
|
|
{
|
|
gDirServiceProvider = nullptr;
|
|
}
|
|
|
|
nsXREDirProvider*
|
|
nsXREDirProvider::GetSingleton()
|
|
{
|
|
return gDirServiceProvider;
|
|
}
|
|
|
|
nsresult
|
|
nsXREDirProvider::Initialize(nsIFile *aXULAppDir,
|
|
nsIFile *aGREDir,
|
|
nsIDirectoryServiceProvider* aAppProvider)
|
|
{
|
|
NS_ENSURE_ARG(aXULAppDir);
|
|
NS_ENSURE_ARG(aGREDir);
|
|
|
|
mAppProvider = aAppProvider;
|
|
mXULAppDir = aXULAppDir;
|
|
mGREDir = aGREDir;
|
|
#if defined(XP_WIN) && defined(MOZ_CONTENT_SANDBOX)
|
|
// The GRE directory can be used in sandbox rules, so we need to make sure
|
|
// it doesn't contain any junction points or symlinks or the sandbox will
|
|
// reject those rules.
|
|
if (!mozilla::widget::WinUtils::ResolveJunctionPointsAndSymLinks(mGREDir)) {
|
|
NS_WARNING("Failed to resolve GRE Dir.");
|
|
}
|
|
// If the mXULAppDir is different it lives below the mGREDir. To avoid
|
|
// confusion resolve that as well even though we don't need it for sandbox
|
|
// rules. Some tests rely on this for example.
|
|
if (!mozilla::widget::WinUtils::ResolveJunctionPointsAndSymLinks(mXULAppDir)) {
|
|
NS_WARNING("Failed to resolve XUL App Dir.");
|
|
}
|
|
#endif
|
|
mGREDir->Clone(getter_AddRefs(mGREBinDir));
|
|
#ifdef XP_MACOSX
|
|
mGREBinDir->SetNativeLeafName(NS_LITERAL_CSTRING("MacOS"));
|
|
#endif
|
|
|
|
if (!mProfileDir) {
|
|
nsCOMPtr<nsIDirectoryServiceProvider> app(do_QueryInterface(mAppProvider));
|
|
if (app) {
|
|
bool per = false;
|
|
app->GetFile(NS_APP_USER_PROFILE_50_DIR, &per, getter_AddRefs(mProfileDir));
|
|
NS_ASSERTION(per, "NS_APP_USER_PROFILE_50_DIR must be persistent!");
|
|
NS_ASSERTION(mProfileDir, "NS_APP_USER_PROFILE_50_DIR not defined! This shouldn't happen!");
|
|
}
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
nsresult
|
|
nsXREDirProvider::SetProfile(nsIFile* aDir, nsIFile* aLocalDir)
|
|
{
|
|
NS_ASSERTION(aDir && aLocalDir, "We don't support no-profile apps yet!");
|
|
|
|
nsresult rv;
|
|
|
|
rv = EnsureDirectoryExists(aDir);
|
|
if (NS_FAILED(rv))
|
|
return rv;
|
|
|
|
rv = EnsureDirectoryExists(aLocalDir);
|
|
if (NS_FAILED(rv))
|
|
return rv;
|
|
|
|
#ifdef XP_MACOSX
|
|
bool same;
|
|
if (NS_SUCCEEDED(aDir->Equals(aLocalDir, &same)) && !same) {
|
|
// Ensure that the cache directory is not indexed by Spotlight
|
|
// (bug 718910). At least on OS X, the cache directory (under
|
|
// ~/Library/Caches/) is always the "local" user profile
|
|
// directory. This is confusing, since *both* user profile
|
|
// directories are "local" (they both exist under the user's
|
|
// home directory). But this usage dates back at least as far
|
|
// as the patch for bug 291033, where "local" seems to mean
|
|
// "suitable for temporary storage". Don't hide the cache
|
|
// directory if by some chance it and the "non-local" profile
|
|
// directory are the same -- there are bad side effects from
|
|
// hiding a profile directory under /Library/Application Support/
|
|
// (see bug 801883).
|
|
nsAutoCString cacheDir;
|
|
if (NS_SUCCEEDED(aLocalDir->GetNativePath(cacheDir))) {
|
|
if (chflags(cacheDir.get(), UF_HIDDEN)) {
|
|
NS_WARNING("Failed to set Cache directory to HIDDEN.");
|
|
}
|
|
}
|
|
}
|
|
#endif
|
|
|
|
mProfileDir = aDir;
|
|
mProfileLocalDir = aLocalDir;
|
|
#if defined(XP_WIN) && defined(MOZ_CONTENT_SANDBOX)
|
|
// The profile directory can be used in sandbox rules, so we need to make sure
|
|
// it doesn't contain any junction points or symlinks or the sandbox will
|
|
// reject those rules.
|
|
if (!mozilla::widget::WinUtils::ResolveJunctionPointsAndSymLinks(mProfileDir)) {
|
|
NS_WARNING("Failed to resolve Profile Dir.");
|
|
}
|
|
#endif
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMPL_QUERY_INTERFACE(nsXREDirProvider,
|
|
nsIDirectoryServiceProvider,
|
|
nsIDirectoryServiceProvider2,
|
|
nsIProfileStartup)
|
|
|
|
NS_IMETHODIMP_(MozExternalRefCountType)
|
|
nsXREDirProvider::AddRef()
|
|
{
|
|
return 1;
|
|
}
|
|
|
|
NS_IMETHODIMP_(MozExternalRefCountType)
|
|
nsXREDirProvider::Release()
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
nsresult
|
|
nsXREDirProvider::GetUserProfilesRootDir(nsIFile** aResult,
|
|
const nsACString* aProfileName,
|
|
const nsACString* aAppName,
|
|
const nsACString* aVendorName)
|
|
{
|
|
nsCOMPtr<nsIFile> file;
|
|
nsresult rv = GetUserDataDirectory(getter_AddRefs(file),
|
|
false,
|
|
aProfileName, aAppName, aVendorName);
|
|
|
|
if (NS_SUCCEEDED(rv)) {
|
|
#if !defined(XP_UNIX) || defined(XP_MACOSX)
|
|
rv = file->AppendNative(NS_LITERAL_CSTRING("Profiles"));
|
|
#endif
|
|
// We must create the profile directory here if it does not exist.
|
|
nsresult tmp = EnsureDirectoryExists(file);
|
|
if (NS_FAILED(tmp)) {
|
|
rv = tmp;
|
|
}
|
|
}
|
|
file.swap(*aResult);
|
|
return rv;
|
|
}
|
|
|
|
nsresult
|
|
nsXREDirProvider::GetUserProfilesLocalDir(nsIFile** aResult,
|
|
const nsACString* aProfileName,
|
|
const nsACString* aAppName,
|
|
const nsACString* aVendorName)
|
|
{
|
|
nsCOMPtr<nsIFile> file;
|
|
nsresult rv = GetUserDataDirectory(getter_AddRefs(file),
|
|
true,
|
|
aProfileName, aAppName, aVendorName);
|
|
|
|
if (NS_SUCCEEDED(rv)) {
|
|
#if !defined(XP_UNIX) || defined(XP_MACOSX)
|
|
rv = file->AppendNative(NS_LITERAL_CSTRING("Profiles"));
|
|
#endif
|
|
// We must create the profile directory here if it does not exist.
|
|
nsresult tmp = EnsureDirectoryExists(file);
|
|
if (NS_FAILED(tmp)) {
|
|
rv = tmp;
|
|
}
|
|
}
|
|
file.swap(*aResult);
|
|
return NS_OK;
|
|
}
|
|
|
|
#if defined(XP_UNIX) || defined(XP_MACOSX)
|
|
/**
|
|
* Get the directory that is the parent of the system-wide directories
|
|
* for extensions and native manifests.
|
|
*
|
|
* On OSX this is /Library/Application Support/Mozilla
|
|
* On Linux this is /usr/{lib,lib64}/mozilla
|
|
* (for 32- and 64-bit systems respsectively)
|
|
*/
|
|
static nsresult
|
|
GetSystemParentDirectory(nsIFile** aFile)
|
|
{
|
|
nsresult rv;
|
|
nsCOMPtr<nsIFile> localDir;
|
|
#if defined(XP_MACOSX)
|
|
rv = GetOSXFolderType(kOnSystemDisk, kApplicationSupportFolderType, getter_AddRefs(localDir));
|
|
if (NS_SUCCEEDED(rv)) {
|
|
rv = localDir->AppendNative(NS_LITERAL_CSTRING("Mozilla"));
|
|
}
|
|
#else
|
|
NS_NAMED_LITERAL_CSTRING(dirname,
|
|
#ifdef HAVE_USR_LIB64_DIR
|
|
"/usr/lib64/mozilla"
|
|
#elif defined(__OpenBSD__) || defined(__FreeBSD__)
|
|
"/usr/local/lib/mozilla"
|
|
#else
|
|
"/usr/lib/mozilla"
|
|
#endif
|
|
);
|
|
rv = NS_NewNativeLocalFile(dirname, false, getter_AddRefs(localDir));
|
|
#endif
|
|
|
|
if (NS_SUCCEEDED(rv)) {
|
|
localDir.forget(aFile);
|
|
}
|
|
return rv;
|
|
}
|
|
#endif
|
|
|
|
NS_IMETHODIMP
|
|
nsXREDirProvider::GetFile(const char* aProperty, bool* aPersistent,
|
|
nsIFile** aFile)
|
|
{
|
|
nsresult rv;
|
|
|
|
bool gettingProfile = false;
|
|
|
|
if (!strcmp(aProperty, NS_APP_USER_PROFILE_LOCAL_50_DIR)) {
|
|
// If XRE_NotifyProfile hasn't been called, don't fall through to
|
|
// mAppProvider on the profile keys.
|
|
if (!mProfileNotified)
|
|
return NS_ERROR_FAILURE;
|
|
|
|
if (mProfileLocalDir)
|
|
return mProfileLocalDir->Clone(aFile);
|
|
|
|
if (mAppProvider)
|
|
return mAppProvider->GetFile(aProperty, aPersistent, aFile);
|
|
|
|
// This falls through to the case below
|
|
gettingProfile = true;
|
|
}
|
|
if (!strcmp(aProperty, NS_APP_USER_PROFILE_50_DIR) || gettingProfile) {
|
|
if (!mProfileNotified)
|
|
return NS_ERROR_FAILURE;
|
|
|
|
if (mProfileDir)
|
|
return mProfileDir->Clone(aFile);
|
|
|
|
if (mAppProvider)
|
|
return mAppProvider->GetFile(aProperty, aPersistent, aFile);
|
|
|
|
// If we don't succeed here, bail early so that we aren't reentrant
|
|
// through the "GetProfileDir" call below.
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
|
|
if (mAppProvider) {
|
|
rv = mAppProvider->GetFile(aProperty, aPersistent, aFile);
|
|
if (NS_SUCCEEDED(rv) && *aFile)
|
|
return rv;
|
|
}
|
|
|
|
*aPersistent = true;
|
|
|
|
if (!strcmp(aProperty, NS_GRE_DIR)) {
|
|
return mGREDir->Clone(aFile);
|
|
}
|
|
else if (!strcmp(aProperty, NS_GRE_BIN_DIR)) {
|
|
return mGREBinDir->Clone(aFile);
|
|
}
|
|
else if (!strcmp(aProperty, NS_OS_CURRENT_PROCESS_DIR) ||
|
|
!strcmp(aProperty, NS_APP_INSTALL_CLEANUP_DIR)) {
|
|
return GetAppDir()->Clone(aFile);
|
|
}
|
|
|
|
rv = NS_ERROR_FAILURE;
|
|
nsCOMPtr<nsIFile> file;
|
|
|
|
if (!strcmp(aProperty, NS_APP_PREF_DEFAULTS_50_DIR))
|
|
{
|
|
// return the GRE default prefs directory here, and the app default prefs
|
|
// directory (if applicable) in NS_APP_PREFS_DEFAULTS_DIR_LIST.
|
|
rv = mGREDir->Clone(getter_AddRefs(file));
|
|
if (NS_SUCCEEDED(rv)) {
|
|
rv = file->AppendNative(NS_LITERAL_CSTRING("defaults"));
|
|
if (NS_SUCCEEDED(rv))
|
|
rv = file->AppendNative(NS_LITERAL_CSTRING("pref"));
|
|
}
|
|
}
|
|
else if (!strcmp(aProperty, NS_APP_APPLICATION_REGISTRY_DIR) ||
|
|
!strcmp(aProperty, XRE_USER_APP_DATA_DIR)) {
|
|
rv = GetUserAppDataDirectory(getter_AddRefs(file));
|
|
}
|
|
#if defined(XP_UNIX) || defined(XP_MACOSX)
|
|
else if (!strcmp(aProperty, XRE_SYS_NATIVE_MANIFESTS)) {
|
|
nsCOMPtr<nsIFile> localDir;
|
|
|
|
rv = ::GetSystemParentDirectory(getter_AddRefs(localDir));
|
|
if (NS_SUCCEEDED(rv)) {
|
|
localDir.swap(file);
|
|
}
|
|
}
|
|
else if (!strcmp(aProperty, XRE_USER_NATIVE_MANIFESTS)) {
|
|
nsCOMPtr<nsIFile> localDir;
|
|
rv = GetUserDataDirectoryHome(getter_AddRefs(localDir), false);
|
|
if (NS_SUCCEEDED(rv)) {
|
|
#if defined(XP_MACOSX)
|
|
rv = localDir->AppendNative(NS_LITERAL_CSTRING("Mozilla"));
|
|
#else
|
|
rv = localDir->AppendNative(NS_LITERAL_CSTRING(".mozilla"));
|
|
#endif
|
|
}
|
|
if (NS_SUCCEEDED(rv)) {
|
|
localDir.swap(file);
|
|
}
|
|
}
|
|
#endif
|
|
else if (!strcmp(aProperty, XRE_UPDATE_ROOT_DIR)) {
|
|
rv = GetUpdateRootDir(getter_AddRefs(file));
|
|
}
|
|
else if (!strcmp(aProperty, NS_APP_APPLICATION_REGISTRY_FILE)) {
|
|
rv = GetUserAppDataDirectory(getter_AddRefs(file));
|
|
if (NS_SUCCEEDED(rv))
|
|
rv = file->AppendNative(NS_LITERAL_CSTRING(APP_REGISTRY_NAME));
|
|
}
|
|
else if (!strcmp(aProperty, NS_APP_USER_PROFILES_ROOT_DIR)) {
|
|
rv = GetUserProfilesRootDir(getter_AddRefs(file), nullptr, nullptr, nullptr);
|
|
}
|
|
else if (!strcmp(aProperty, NS_APP_USER_PROFILES_LOCAL_ROOT_DIR)) {
|
|
rv = GetUserProfilesLocalDir(getter_AddRefs(file), nullptr, nullptr, nullptr);
|
|
}
|
|
else if (!strcmp(aProperty, XRE_EXECUTABLE_FILE)) {
|
|
nsCOMPtr<nsIFile> lf;
|
|
rv = XRE_GetBinaryPath(getter_AddRefs(lf));
|
|
if (NS_SUCCEEDED(rv))
|
|
file = lf;
|
|
}
|
|
|
|
else if (!strcmp(aProperty, NS_APP_PROFILE_DIR_STARTUP) && mProfileDir) {
|
|
return mProfileDir->Clone(aFile);
|
|
}
|
|
else if (!strcmp(aProperty, NS_APP_PROFILE_LOCAL_DIR_STARTUP)) {
|
|
if (mProfileLocalDir)
|
|
return mProfileLocalDir->Clone(aFile);
|
|
|
|
if (mProfileDir)
|
|
return mProfileDir->Clone(aFile);
|
|
|
|
if (mAppProvider)
|
|
return mAppProvider->GetFile(NS_APP_PROFILE_DIR_STARTUP, aPersistent,
|
|
aFile);
|
|
}
|
|
#if defined(XP_UNIX) || defined(XP_MACOSX)
|
|
else if (!strcmp(aProperty, XRE_SYS_LOCAL_EXTENSION_PARENT_DIR)) {
|
|
#ifdef ENABLE_SYSTEM_EXTENSION_DIRS
|
|
return GetSystemExtensionsDirectory(aFile);
|
|
#else
|
|
return NS_ERROR_FAILURE;
|
|
#endif
|
|
}
|
|
#endif
|
|
#if defined(XP_UNIX) && !defined(XP_MACOSX)
|
|
else if (!strcmp(aProperty, XRE_SYS_SHARE_EXTENSION_PARENT_DIR)) {
|
|
#ifdef ENABLE_SYSTEM_EXTENSION_DIRS
|
|
#if defined(__OpenBSD__) || defined(__FreeBSD__)
|
|
static const char *const sysLExtDir = "/usr/local/share/mozilla/extensions";
|
|
#else
|
|
static const char *const sysLExtDir = "/usr/share/mozilla/extensions";
|
|
#endif
|
|
return NS_NewNativeLocalFile(nsDependentCString(sysLExtDir),
|
|
false, aFile);
|
|
#else
|
|
return NS_ERROR_FAILURE;
|
|
#endif
|
|
}
|
|
#endif
|
|
else if (!strcmp(aProperty, XRE_USER_SYS_EXTENSION_DIR)) {
|
|
#ifdef ENABLE_SYSTEM_EXTENSION_DIRS
|
|
return GetSysUserExtensionsDirectory(aFile);
|
|
#else
|
|
return NS_ERROR_FAILURE;
|
|
#endif
|
|
}
|
|
else if (!strcmp(aProperty, XRE_USER_SYS_EXTENSION_DEV_DIR)) {
|
|
return GetSysUserExtensionsDevDirectory(aFile);
|
|
}
|
|
else if (!strcmp(aProperty, XRE_APP_DISTRIBUTION_DIR)) {
|
|
bool persistent = false;
|
|
rv = GetFile(NS_GRE_DIR, &persistent, getter_AddRefs(file));
|
|
if (NS_SUCCEEDED(rv))
|
|
rv = file->AppendNative(NS_LITERAL_CSTRING("distribution"));
|
|
}
|
|
else if (!strcmp(aProperty, XRE_APP_FEATURES_DIR)) {
|
|
rv = GetAppDir()->Clone(getter_AddRefs(file));
|
|
if (NS_SUCCEEDED(rv))
|
|
rv = file->AppendNative(NS_LITERAL_CSTRING("features"));
|
|
}
|
|
else if (!strcmp(aProperty, XRE_ADDON_APP_DIR)) {
|
|
nsCOMPtr<nsIDirectoryServiceProvider> dirsvc(do_GetService("@mozilla.org/file/directory_service;1", &rv));
|
|
if (NS_FAILED(rv))
|
|
return rv;
|
|
bool unused;
|
|
rv = dirsvc->GetFile("XCurProcD", &unused, getter_AddRefs(file));
|
|
}
|
|
#if (defined(XP_WIN) || defined(XP_MACOSX)) && defined(MOZ_CONTENT_SANDBOX)
|
|
else if (!strcmp(aProperty, NS_APP_CONTENT_PROCESS_TEMP_DIR)) {
|
|
if (!mContentTempDir && NS_FAILED((rv = LoadContentProcessTempDir()))) {
|
|
return rv;
|
|
}
|
|
rv = mContentTempDir->Clone(getter_AddRefs(file));
|
|
}
|
|
#endif // defined(XP_WIN) && defined(MOZ_CONTENT_SANDBOX)
|
|
else if (NS_SUCCEEDED(GetProfileStartupDir(getter_AddRefs(file)))) {
|
|
// We need to allow component, xpt, and chrome registration to
|
|
// occur prior to the profile-after-change notification.
|
|
if (!strcmp(aProperty, NS_APP_USER_CHROME_DIR)) {
|
|
rv = file->AppendNative(NS_LITERAL_CSTRING("chrome"));
|
|
}
|
|
}
|
|
|
|
if (NS_SUCCEEDED(rv) && file) {
|
|
file.forget(aFile);
|
|
return NS_OK;
|
|
}
|
|
|
|
bool ensureFilePermissions = false;
|
|
|
|
if (NS_SUCCEEDED(GetProfileDir(getter_AddRefs(file)))) {
|
|
if (!strcmp(aProperty, NS_APP_PREFS_50_DIR)) {
|
|
rv = NS_OK;
|
|
}
|
|
else if (!strcmp(aProperty, NS_APP_PREFS_50_FILE)) {
|
|
rv = file->AppendNative(NS_LITERAL_CSTRING("prefs.js"));
|
|
}
|
|
else if (!strcmp(aProperty, NS_LOCALSTORE_UNSAFE_FILE)) {
|
|
rv = file->AppendNative(NS_LITERAL_CSTRING("localstore.rdf"));
|
|
}
|
|
else if (!strcmp(aProperty, NS_APP_LOCALSTORE_50_FILE)) {
|
|
if (gSafeMode) {
|
|
rv = file->AppendNative(NS_LITERAL_CSTRING("localstore-safe.rdf"));
|
|
file->Remove(false);
|
|
}
|
|
else {
|
|
rv = file->AppendNative(NS_LITERAL_CSTRING("localstore.rdf"));
|
|
ensureFilePermissions = true;
|
|
}
|
|
}
|
|
else if (!strcmp(aProperty, NS_APP_PREFS_OVERRIDE_DIR)) {
|
|
rv = mProfileDir->Clone(getter_AddRefs(file));
|
|
nsresult tmp = file->AppendNative(NS_LITERAL_CSTRING(PREF_OVERRIDE_DIRNAME));
|
|
if (NS_FAILED(tmp)) {
|
|
rv = tmp;
|
|
}
|
|
tmp = EnsureDirectoryExists(file);
|
|
if (NS_FAILED(tmp)) {
|
|
rv = tmp;
|
|
}
|
|
}
|
|
}
|
|
if (NS_FAILED(rv) || !file)
|
|
return NS_ERROR_FAILURE;
|
|
|
|
if (ensureFilePermissions) {
|
|
bool fileToEnsureExists;
|
|
bool isWritable;
|
|
if (NS_SUCCEEDED(file->Exists(&fileToEnsureExists)) && fileToEnsureExists
|
|
&& NS_SUCCEEDED(file->IsWritable(&isWritable)) && !isWritable) {
|
|
uint32_t permissions;
|
|
if (NS_SUCCEEDED(file->GetPermissions(&permissions))) {
|
|
rv = file->SetPermissions(permissions | 0600);
|
|
NS_ASSERTION(NS_SUCCEEDED(rv), "failed to ensure file permissions");
|
|
}
|
|
}
|
|
}
|
|
|
|
file.forget(aFile);
|
|
return NS_OK;
|
|
}
|
|
|
|
static void
|
|
LoadDirIntoArray(nsIFile* dir,
|
|
const char *const *aAppendList,
|
|
nsCOMArray<nsIFile>& aDirectories)
|
|
{
|
|
if (!dir)
|
|
return;
|
|
|
|
nsCOMPtr<nsIFile> subdir;
|
|
dir->Clone(getter_AddRefs(subdir));
|
|
if (!subdir)
|
|
return;
|
|
|
|
for (const char *const *a = aAppendList; *a; ++a) {
|
|
subdir->AppendNative(nsDependentCString(*a));
|
|
}
|
|
|
|
bool exists;
|
|
if (NS_SUCCEEDED(subdir->Exists(&exists)) && exists) {
|
|
aDirectories.AppendObject(subdir);
|
|
}
|
|
}
|
|
|
|
static void
|
|
LoadDirsIntoArray(const nsCOMArray<nsIFile>& aSourceDirs,
|
|
const char *const* aAppendList,
|
|
nsCOMArray<nsIFile>& aDirectories)
|
|
{
|
|
nsCOMPtr<nsIFile> appended;
|
|
bool exists;
|
|
|
|
for (int32_t i = 0; i < aSourceDirs.Count(); ++i) {
|
|
aSourceDirs[i]->Clone(getter_AddRefs(appended));
|
|
if (!appended)
|
|
continue;
|
|
|
|
nsAutoCString leaf;
|
|
appended->GetNativeLeafName(leaf);
|
|
if (!Substring(leaf, leaf.Length() - 4).EqualsLiteral(".xpi")) {
|
|
LoadDirIntoArray(appended,
|
|
aAppendList,
|
|
aDirectories);
|
|
}
|
|
else if (NS_SUCCEEDED(appended->Exists(&exists)) && exists)
|
|
aDirectories.AppendObject(appended);
|
|
}
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsXREDirProvider::GetFiles(const char* aProperty, nsISimpleEnumerator** aResult)
|
|
{
|
|
nsresult rv;
|
|
|
|
nsCOMPtr<nsISimpleEnumerator> appEnum;
|
|
nsCOMPtr<nsIDirectoryServiceProvider2>
|
|
appP2(do_QueryInterface(mAppProvider));
|
|
if (appP2) {
|
|
rv = appP2->GetFiles(aProperty, getter_AddRefs(appEnum));
|
|
if (NS_FAILED(rv)) {
|
|
appEnum = nullptr;
|
|
}
|
|
else if (rv != NS_SUCCESS_AGGREGATE_RESULT) {
|
|
appEnum.forget(aResult);
|
|
return NS_OK;
|
|
}
|
|
}
|
|
|
|
nsCOMPtr<nsISimpleEnumerator> xreEnum;
|
|
rv = GetFilesInternal(aProperty, getter_AddRefs(xreEnum));
|
|
if (NS_FAILED(rv)) {
|
|
if (appEnum) {
|
|
appEnum.forget(aResult);
|
|
return NS_SUCCESS_AGGREGATE_RESULT;
|
|
}
|
|
|
|
return rv;
|
|
}
|
|
|
|
rv = NS_NewUnionEnumerator(aResult, appEnum, xreEnum);
|
|
if (NS_FAILED(rv))
|
|
return rv;
|
|
|
|
return NS_SUCCESS_AGGREGATE_RESULT;
|
|
}
|
|
|
|
#if (defined(XP_WIN) || defined(XP_MACOSX)) && defined(MOZ_CONTENT_SANDBOX)
|
|
|
|
static const char*
|
|
GetContentProcessTempBaseDirKey()
|
|
{
|
|
#if defined(XP_WIN)
|
|
return NS_WIN_LOW_INTEGRITY_TEMP_BASE;
|
|
#else
|
|
return NS_OS_TEMP_DIR;
|
|
#endif
|
|
}
|
|
|
|
//
|
|
// Sets mContentTempDir so that it refers to the appropriate temp dir.
|
|
// If the sandbox is enabled, NS_APP_CONTENT_PROCESS_TEMP_DIR, otherwise
|
|
// NS_OS_TEMP_DIR is used.
|
|
//
|
|
nsresult
|
|
nsXREDirProvider::LoadContentProcessTempDir()
|
|
{
|
|
// The parent is responsible for creating the sandbox temp dir.
|
|
if (XRE_IsParentProcess()) {
|
|
mContentProcessSandboxTempDir = CreateContentProcessSandboxTempDir();
|
|
mContentTempDir = mContentProcessSandboxTempDir;
|
|
} else {
|
|
mContentTempDir = GetContentProcessSandboxTempDir();
|
|
}
|
|
|
|
if (!mContentTempDir) {
|
|
nsresult rv = NS_GetSpecialDirectory(NS_OS_TEMP_DIR,
|
|
getter_AddRefs(mContentTempDir));
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
return rv;
|
|
}
|
|
}
|
|
|
|
#if defined(XP_WIN)
|
|
// The content temp dir can be used in sandbox rules, so we need to make sure
|
|
// it doesn't contain any junction points or symlinks or the sandbox will
|
|
// reject those rules.
|
|
if (!mozilla::widget::WinUtils::ResolveJunctionPointsAndSymLinks(mContentTempDir)) {
|
|
NS_WARNING("Failed to resolve Content Temp Dir.");
|
|
}
|
|
#endif
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
static bool
|
|
IsContentSandboxDisabled()
|
|
{
|
|
return !BrowserTabsRemoteAutostart() || (!IsContentSandboxEnabled());
|
|
}
|
|
|
|
//
|
|
// If a content process sandbox temp dir is to be used, returns an nsIFile
|
|
// for the directory. Returns null if the content sandbox is disabled or
|
|
// an error occurs.
|
|
//
|
|
static already_AddRefed<nsIFile>
|
|
GetContentProcessSandboxTempDir()
|
|
{
|
|
if (IsContentSandboxDisabled()) {
|
|
return nullptr;
|
|
}
|
|
|
|
nsCOMPtr<nsIFile> localFile;
|
|
|
|
nsresult rv = NS_GetSpecialDirectory(GetContentProcessTempBaseDirKey(),
|
|
getter_AddRefs(localFile));
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
return nullptr;
|
|
}
|
|
|
|
nsAutoString tempDirSuffix;
|
|
rv = Preferences::GetString("security.sandbox.content.tempDirSuffix",
|
|
tempDirSuffix);
|
|
if (NS_WARN_IF(NS_FAILED(rv)) || tempDirSuffix.IsEmpty()) {
|
|
return nullptr;
|
|
}
|
|
|
|
rv = localFile->Append(NS_LITERAL_STRING("Temp-") + tempDirSuffix);
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
return nullptr;
|
|
}
|
|
|
|
return localFile.forget();
|
|
}
|
|
|
|
//
|
|
// Create a temporary directory for use from sandboxed content processes.
|
|
// Only called in the parent. The path is derived from a UUID stored in a
|
|
// pref which is available to content processes. Returns null if the
|
|
// content sandbox is disabled or if an error occurs.
|
|
//
|
|
static already_AddRefed<nsIFile>
|
|
CreateContentProcessSandboxTempDir()
|
|
{
|
|
if (IsContentSandboxDisabled()) {
|
|
return nullptr;
|
|
}
|
|
|
|
// Get (and create if blank) temp directory suffix pref.
|
|
nsresult rv;
|
|
nsAutoString tempDirSuffix;
|
|
Preferences::GetString("security.sandbox.content.tempDirSuffix",
|
|
tempDirSuffix);
|
|
if (tempDirSuffix.IsEmpty()) {
|
|
nsCOMPtr<nsIUUIDGenerator> uuidgen =
|
|
do_GetService("@mozilla.org/uuid-generator;1", &rv);
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
return nullptr;
|
|
}
|
|
|
|
nsID uuid;
|
|
rv = uuidgen->GenerateUUIDInPlace(&uuid);
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
return nullptr;
|
|
}
|
|
|
|
char uuidChars[NSID_LENGTH];
|
|
uuid.ToProvidedString(uuidChars);
|
|
tempDirSuffix.AssignASCII(uuidChars);
|
|
|
|
// Save the pref
|
|
rv = Preferences::SetCString("security.sandbox.content.tempDirSuffix",
|
|
uuidChars);
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
// If we fail to save the pref we don't want to create the temp dir,
|
|
// because we won't be able to clean it up later.
|
|
return nullptr;
|
|
}
|
|
|
|
nsCOMPtr<nsIPrefService> prefsvc = Preferences::GetService();
|
|
if (!prefsvc || NS_FAILED((rv = prefsvc->SavePrefFile(nullptr)))) {
|
|
// Again, if we fail to save the pref file we might not be able to clean
|
|
// up the temp directory, so don't create one. Note that in the case
|
|
// the preference values allows an off main thread save, the successful
|
|
// return from the call doesn't mean we actually saved the file. See
|
|
// bug 1364496 for details.
|
|
NS_WARNING("Failed to save pref file, cannot create temp dir.");
|
|
return nullptr;
|
|
}
|
|
}
|
|
|
|
nsCOMPtr<nsIFile> sandboxTempDir = GetContentProcessSandboxTempDir();
|
|
if (!sandboxTempDir) {
|
|
NS_WARNING("Failed to determine sandbox temp dir path.");
|
|
return nullptr;
|
|
}
|
|
|
|
// Remove the directory. It may exist due to a previous crash.
|
|
if (NS_FAILED(DeleteDirIfExists(sandboxTempDir))) {
|
|
NS_WARNING("Failed to reset sandbox temp dir.");
|
|
return nullptr;
|
|
}
|
|
|
|
// Create the directory
|
|
rv = sandboxTempDir->Create(nsIFile::DIRECTORY_TYPE, 0700);
|
|
if (NS_FAILED(rv)) {
|
|
NS_WARNING("Failed to create sandbox temp dir.");
|
|
return nullptr;
|
|
}
|
|
|
|
return sandboxTempDir.forget();
|
|
}
|
|
|
|
static nsresult
|
|
DeleteDirIfExists(nsIFile* dir)
|
|
{
|
|
if (dir) {
|
|
// Don't return an error if the directory doesn't exist.
|
|
// Windows Remove() returns NS_ERROR_FILE_NOT_FOUND while
|
|
// OS X returns NS_ERROR_FILE_TARGET_DOES_NOT_EXIST.
|
|
nsresult rv = dir->Remove(/* aRecursive */ true);
|
|
if (NS_FAILED(rv) && rv != NS_ERROR_FILE_NOT_FOUND &&
|
|
rv != NS_ERROR_FILE_TARGET_DOES_NOT_EXIST) {
|
|
return rv;
|
|
}
|
|
}
|
|
return NS_OK;
|
|
}
|
|
|
|
#endif // (defined(XP_WIN) || defined(XP_MACOSX)) &&
|
|
// defined(MOZ_CONTENT_SANDBOX)
|
|
|
|
static const char *const kAppendPrefDir[] = { "defaults", "preferences", nullptr };
|
|
|
|
#ifdef DEBUG_bsmedberg
|
|
static void
|
|
DumpFileArray(const char *key,
|
|
nsCOMArray<nsIFile> dirs)
|
|
{
|
|
fprintf(stderr, "nsXREDirProvider::GetFilesInternal(%s)\n", key);
|
|
|
|
nsAutoCString path;
|
|
for (int32_t i = 0; i < dirs.Count(); ++i) {
|
|
dirs[i]->GetNativePath(path);
|
|
fprintf(stderr, " %s\n", path.get());
|
|
}
|
|
}
|
|
#endif // DEBUG_bsmedberg
|
|
|
|
nsresult
|
|
nsXREDirProvider::GetFilesInternal(const char* aProperty,
|
|
nsISimpleEnumerator** aResult)
|
|
{
|
|
nsresult rv = NS_OK;
|
|
*aResult = nullptr;
|
|
|
|
if (!strcmp(aProperty, XRE_EXTENSIONS_DIR_LIST)) {
|
|
nsCOMArray<nsIFile> directories;
|
|
|
|
static const char *const kAppendNothing[] = { nullptr };
|
|
|
|
LoadDirsIntoArray(mAppBundleDirectories,
|
|
kAppendNothing, directories);
|
|
LoadDirsIntoArray(AddonManagerStartup::GetSingleton().ExtensionPaths(),
|
|
kAppendNothing, directories);
|
|
|
|
rv = NS_NewArrayEnumerator(aResult, directories);
|
|
}
|
|
else if (!strcmp(aProperty, NS_APP_PREFS_DEFAULTS_DIR_LIST)) {
|
|
nsCOMArray<nsIFile> directories;
|
|
|
|
LoadDirIntoArray(mXULAppDir, kAppendPrefDir, directories);
|
|
LoadDirsIntoArray(mAppBundleDirectories,
|
|
kAppendPrefDir, directories);
|
|
|
|
rv = NS_NewArrayEnumerator(aResult, directories);
|
|
}
|
|
else if (!strcmp(aProperty, NS_APP_CHROME_DIR_LIST)) {
|
|
// NS_APP_CHROME_DIR_LIST is only used to get default (native) icons
|
|
// for OS window decoration.
|
|
|
|
static const char *const kAppendChromeDir[] = { "chrome", nullptr };
|
|
nsCOMArray<nsIFile> directories;
|
|
LoadDirIntoArray(mXULAppDir,
|
|
kAppendChromeDir,
|
|
directories);
|
|
LoadDirsIntoArray(mAppBundleDirectories,
|
|
kAppendChromeDir,
|
|
directories);
|
|
LoadDirsIntoArray(AddonManagerStartup::GetSingleton().ExtensionPaths(),
|
|
kAppendChromeDir,
|
|
directories);
|
|
|
|
rv = NS_NewArrayEnumerator(aResult, directories);
|
|
}
|
|
else if (!strcmp(aProperty, NS_APP_PLUGINS_DIR_LIST)) {
|
|
nsCOMArray<nsIFile> directories;
|
|
|
|
if (mozilla::Preferences::GetBool("plugins.load_appdir_plugins", false)) {
|
|
nsCOMPtr<nsIFile> appdir;
|
|
rv = XRE_GetBinaryPath(getter_AddRefs(appdir));
|
|
if (NS_SUCCEEDED(rv)) {
|
|
appdir->SetNativeLeafName(NS_LITERAL_CSTRING("plugins"));
|
|
directories.AppendObject(appdir);
|
|
}
|
|
}
|
|
|
|
static const char *const kAppendPlugins[] = { "plugins", nullptr };
|
|
|
|
// The root dirserviceprovider does quite a bit for us: we're mainly
|
|
// interested in xulapp and extension-provided plugins.
|
|
LoadDirsIntoArray(mAppBundleDirectories,
|
|
kAppendPlugins,
|
|
directories);
|
|
LoadDirsIntoArray(AddonManagerStartup::GetSingleton().ExtensionPaths(),
|
|
kAppendPlugins,
|
|
directories);
|
|
|
|
if (mProfileDir) {
|
|
nsCOMArray<nsIFile> profileDir;
|
|
profileDir.AppendObject(mProfileDir);
|
|
LoadDirsIntoArray(profileDir,
|
|
kAppendPlugins,
|
|
directories);
|
|
}
|
|
|
|
rv = NS_NewArrayEnumerator(aResult, directories);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
rv = NS_SUCCESS_AGGREGATE_RESULT;
|
|
}
|
|
else
|
|
rv = NS_ERROR_FAILURE;
|
|
|
|
return rv;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsXREDirProvider::GetDirectory(nsIFile* *aResult)
|
|
{
|
|
NS_ENSURE_TRUE(mProfileDir, NS_ERROR_NOT_INITIALIZED);
|
|
|
|
return mProfileDir->Clone(aResult);
|
|
}
|
|
|
|
void
|
|
nsXREDirProvider::InitializeUserPrefs()
|
|
{
|
|
if (!mPrefsInitialized) {
|
|
// Temporarily set mProfileNotified to true so that the preference service
|
|
// can access the profile directory during initialization. Afterwards, clear
|
|
// it so that no other code can inadvertently access it until we get to
|
|
// profile-do-change.
|
|
AutoRestore<bool> ar(mProfileNotified);
|
|
mProfileNotified = true;
|
|
|
|
mozilla::Preferences::InitializeUserPrefs();
|
|
mPrefsInitialized = true;
|
|
}
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsXREDirProvider::DoStartup()
|
|
{
|
|
nsresult rv;
|
|
|
|
if (!mProfileNotified) {
|
|
nsCOMPtr<nsIObserverService> obsSvc =
|
|
mozilla::services::GetObserverService();
|
|
if (!obsSvc) return NS_ERROR_FAILURE;
|
|
|
|
mProfileNotified = true;
|
|
|
|
/*
|
|
Make sure we've setup prefs before profile-do-change to be able to use
|
|
them to track crashes and because we want to begin crash tracking before
|
|
other code run from this notification since they may cause crashes.
|
|
*/
|
|
MOZ_ASSERT(mPrefsInitialized);
|
|
|
|
bool safeModeNecessary = false;
|
|
nsCOMPtr<nsIAppStartup> appStartup (do_GetService(NS_APPSTARTUP_CONTRACTID));
|
|
if (appStartup) {
|
|
rv = appStartup->TrackStartupCrashBegin(&safeModeNecessary);
|
|
if (NS_FAILED(rv) && rv != NS_ERROR_NOT_AVAILABLE)
|
|
NS_WARNING("Error while beginning startup crash tracking");
|
|
|
|
if (!gSafeMode && safeModeNecessary) {
|
|
appStartup->RestartInSafeMode(nsIAppStartup::eForceQuit);
|
|
return NS_OK;
|
|
}
|
|
}
|
|
|
|
static const char16_t kStartup[] = {'s','t','a','r','t','u','p','\0'};
|
|
obsSvc->NotifyObservers(nullptr, "profile-do-change", kStartup);
|
|
|
|
// Init the Extension Manager
|
|
nsCOMPtr<nsIObserver> em = do_GetService("@mozilla.org/addons/integration;1");
|
|
if (em) {
|
|
em->Observe(nullptr, "addons-startup", nullptr);
|
|
} else {
|
|
NS_WARNING("Failed to create Addons Manager.");
|
|
}
|
|
|
|
obsSvc->NotifyObservers(nullptr, "profile-after-change", kStartup);
|
|
|
|
// Any component that has registered for the profile-after-change category
|
|
// should also be created at this time.
|
|
(void)NS_CreateServicesFromCategory("profile-after-change", nullptr,
|
|
"profile-after-change");
|
|
|
|
if (gSafeMode && safeModeNecessary) {
|
|
static const char16_t kCrashed[] = {'c','r','a','s','h','e','d','\0'};
|
|
obsSvc->NotifyObservers(nullptr, "safemode-forced", kCrashed);
|
|
}
|
|
|
|
// 1 = Regular mode, 2 = Safe mode, 3 = Safe mode forced
|
|
int mode = 1;
|
|
if (gSafeMode) {
|
|
if (safeModeNecessary)
|
|
mode = 3;
|
|
else
|
|
mode = 2;
|
|
}
|
|
mozilla::Telemetry::Accumulate(mozilla::Telemetry::SAFE_MODE_USAGE, mode);
|
|
|
|
// Telemetry about number of profiles.
|
|
nsCOMPtr<nsIToolkitProfileService> profileService =
|
|
do_GetService("@mozilla.org/toolkit/profile-service;1");
|
|
if (profileService) {
|
|
nsCOMPtr<nsISimpleEnumerator> profiles;
|
|
rv = profileService->GetProfiles(getter_AddRefs(profiles));
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
return rv;
|
|
}
|
|
|
|
uint32_t count = 0;
|
|
nsCOMPtr<nsISupports> profile;
|
|
while (NS_SUCCEEDED(profiles->GetNext(getter_AddRefs(profile)))) {
|
|
++count;
|
|
}
|
|
|
|
mozilla::Telemetry::Accumulate(mozilla::Telemetry::NUMBER_OF_PROFILES,
|
|
count);
|
|
}
|
|
|
|
obsSvc->NotifyObservers(nullptr, "profile-initial-state", nullptr);
|
|
|
|
#if (defined(XP_WIN) || defined(XP_MACOSX)) && defined(MOZ_CONTENT_SANDBOX)
|
|
// Makes sure the content temp dir has been loaded if it hasn't been
|
|
// already. In the parent this ensures it has been created before we attempt
|
|
// to start any content processes.
|
|
if (!mContentTempDir) {
|
|
mozilla::Unused << NS_WARN_IF(NS_FAILED(LoadContentProcessTempDir()));
|
|
}
|
|
#endif
|
|
}
|
|
return NS_OK;
|
|
}
|
|
|
|
void
|
|
nsXREDirProvider::DoShutdown()
|
|
{
|
|
AUTO_PROFILER_LABEL("nsXREDirProvider::DoShutdown", OTHER);
|
|
|
|
if (mProfileNotified) {
|
|
nsCOMPtr<nsIObserverService> obsSvc =
|
|
mozilla::services::GetObserverService();
|
|
NS_ASSERTION(obsSvc, "No observer service?");
|
|
if (obsSvc) {
|
|
static const char16_t kShutdownPersist[] = u"shutdown-persist";
|
|
obsSvc->NotifyObservers(nullptr, "profile-change-net-teardown", kShutdownPersist);
|
|
obsSvc->NotifyObservers(nullptr, "profile-change-teardown", kShutdownPersist);
|
|
|
|
#ifdef DEBUG
|
|
// Not having this causes large intermittent leaks. See bug 1340425.
|
|
if (JSContext* cx = dom::danger::GetJSContext()) {
|
|
JS_GC(cx);
|
|
}
|
|
#endif
|
|
|
|
obsSvc->NotifyObservers(nullptr, "profile-before-change", kShutdownPersist);
|
|
obsSvc->NotifyObservers(nullptr, "profile-before-change-qm", kShutdownPersist);
|
|
obsSvc->NotifyObservers(nullptr, "profile-before-change-telemetry", kShutdownPersist);
|
|
}
|
|
mProfileNotified = false;
|
|
}
|
|
|
|
#if (defined(XP_WIN) || defined(XP_MACOSX)) && defined(MOZ_CONTENT_SANDBOX)
|
|
if (XRE_IsParentProcess()) {
|
|
Unused << DeleteDirIfExists(mContentProcessSandboxTempDir);
|
|
}
|
|
#endif
|
|
}
|
|
|
|
#ifdef XP_WIN
|
|
static nsresult
|
|
GetShellFolderPath(KNOWNFOLDERID folder, nsAString& _retval)
|
|
{
|
|
DWORD flags = KF_FLAG_SIMPLE_IDLIST | KF_FLAG_DONT_VERIFY | KF_FLAG_NO_ALIAS;
|
|
PWSTR path = nullptr;
|
|
|
|
if (!SUCCEEDED(SHGetKnownFolderPath(folder, flags, NULL, &path))) {
|
|
return NS_ERROR_NOT_AVAILABLE;
|
|
}
|
|
|
|
_retval = nsDependentString(path);
|
|
CoTaskMemFree(path);
|
|
return NS_OK;
|
|
}
|
|
|
|
/**
|
|
* Provides a fallback for getting the path to APPDATA or LOCALAPPDATA by
|
|
* querying the registry when the call to SHGetSpecialFolderLocation or
|
|
* SHGetPathFromIDListW is unable to provide these paths (Bug 513958).
|
|
*/
|
|
static nsresult
|
|
GetRegWindowsAppDataFolder(bool aLocal, nsAString& _retval)
|
|
{
|
|
HKEY key;
|
|
LPCWSTR keyName =
|
|
L"Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Shell Folders";
|
|
DWORD res = ::RegOpenKeyExW(HKEY_CURRENT_USER, keyName, 0, KEY_READ,
|
|
&key);
|
|
if (res != ERROR_SUCCESS) {
|
|
_retval.SetLength(0);
|
|
return NS_ERROR_NOT_AVAILABLE;
|
|
}
|
|
|
|
DWORD type, size;
|
|
res = RegQueryValueExW(key, (aLocal ? L"Local AppData" : L"AppData"),
|
|
nullptr, &type, nullptr, &size);
|
|
// The call to RegQueryValueExW must succeed, the type must be REG_SZ, the
|
|
// buffer size must not equal 0, and the buffer size be a multiple of 2.
|
|
if (res != ERROR_SUCCESS || type != REG_SZ || size == 0 || size % 2 != 0) {
|
|
::RegCloseKey(key);
|
|
_retval.SetLength(0);
|
|
return NS_ERROR_NOT_AVAILABLE;
|
|
}
|
|
|
|
// |size| may or may not include room for the terminating null character
|
|
DWORD resultLen = size / 2;
|
|
|
|
if (!_retval.SetLength(resultLen, mozilla::fallible)) {
|
|
::RegCloseKey(key);
|
|
_retval.SetLength(0);
|
|
return NS_ERROR_NOT_AVAILABLE;
|
|
}
|
|
|
|
nsAString::iterator begin;
|
|
_retval.BeginWriting(begin);
|
|
|
|
res = RegQueryValueExW(key, (aLocal ? L"Local AppData" : L"AppData"),
|
|
nullptr, nullptr, (LPBYTE) begin.get(), &size);
|
|
::RegCloseKey(key);
|
|
if (res != ERROR_SUCCESS) {
|
|
_retval.SetLength(0);
|
|
return NS_ERROR_NOT_AVAILABLE;
|
|
}
|
|
|
|
if (!_retval.CharAt(resultLen - 1)) {
|
|
// It was already null terminated.
|
|
_retval.Truncate(resultLen - 1);
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
static bool
|
|
GetCachedHash(HKEY rootKey, const nsAString ®Path, const nsAString &path,
|
|
nsAString &cachedHash)
|
|
{
|
|
HKEY baseKey;
|
|
if (RegOpenKeyExW(rootKey, reinterpret_cast<const wchar_t*>(regPath.BeginReading()), 0, KEY_READ, &baseKey) !=
|
|
ERROR_SUCCESS) {
|
|
return false;
|
|
}
|
|
|
|
wchar_t cachedHashRaw[512];
|
|
DWORD bufferSize = sizeof(cachedHashRaw);
|
|
LONG result = RegQueryValueExW(baseKey, reinterpret_cast<const wchar_t*>(path.BeginReading()), 0, nullptr,
|
|
(LPBYTE)cachedHashRaw, &bufferSize);
|
|
RegCloseKey(baseKey);
|
|
if (result == ERROR_SUCCESS) {
|
|
cachedHash.Assign(cachedHashRaw);
|
|
}
|
|
return ERROR_SUCCESS == result;
|
|
}
|
|
|
|
#endif
|
|
|
|
nsresult
|
|
nsXREDirProvider::GetUpdateRootDir(nsIFile* *aResult)
|
|
{
|
|
nsCOMPtr<nsIFile> updRoot;
|
|
nsCOMPtr<nsIFile> appFile;
|
|
bool per = false;
|
|
nsresult rv = GetFile(XRE_EXECUTABLE_FILE, &per, getter_AddRefs(appFile));
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
rv = appFile->GetParent(getter_AddRefs(updRoot));
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
#ifdef XP_MACOSX
|
|
nsCOMPtr<nsIFile> appRootDirFile;
|
|
nsCOMPtr<nsIFile> localDir;
|
|
nsAutoString appDirPath;
|
|
if (NS_FAILED(appFile->GetParent(getter_AddRefs(appRootDirFile))) ||
|
|
NS_FAILED(appRootDirFile->GetPath(appDirPath)) ||
|
|
NS_FAILED(GetUserDataDirectoryHome(getter_AddRefs(localDir), true))) {
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
|
|
int32_t dotIndex = appDirPath.RFind(".app");
|
|
if (dotIndex == kNotFound) {
|
|
dotIndex = appDirPath.Length();
|
|
}
|
|
appDirPath = Substring(appDirPath, 1, dotIndex - 1);
|
|
|
|
bool hasVendor = gAppData->vendor && strlen(gAppData->vendor) != 0;
|
|
if (hasVendor || gAppData->name) {
|
|
if (NS_FAILED(localDir->AppendNative(nsDependentCString(hasVendor ?
|
|
gAppData->vendor :
|
|
gAppData->name)))) {
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
} else if (NS_FAILED(localDir->AppendNative(NS_LITERAL_CSTRING("Mozilla")))) {
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
|
|
if (NS_FAILED(localDir->Append(NS_LITERAL_STRING("updates"))) ||
|
|
NS_FAILED(localDir->AppendRelativePath(appDirPath))) {
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
|
|
localDir.forget(aResult);
|
|
return NS_OK;
|
|
|
|
#elif XP_WIN
|
|
nsAutoString pathHash;
|
|
bool pathHashResult = false;
|
|
bool hasVendor = gAppData->vendor && strlen(gAppData->vendor) != 0;
|
|
|
|
nsAutoString appDirPath;
|
|
if (SUCCEEDED(updRoot->GetPath(appDirPath))) {
|
|
|
|
// Figure out where we should check for a cached hash value. If the
|
|
// application doesn't have the nsXREAppData vendor value defined check
|
|
// under SOFTWARE\Mozilla.
|
|
wchar_t regPath[1024] = { L'\0' };
|
|
swprintf_s(regPath, mozilla::ArrayLength(regPath), L"SOFTWARE\\%S\\%S\\TaskBarIDs",
|
|
(hasVendor ? gAppData->vendor : "Mozilla"), MOZ_APP_BASENAME);
|
|
|
|
// If we pre-computed the hash, grab it from the registry.
|
|
pathHashResult = GetCachedHash(HKEY_LOCAL_MACHINE,
|
|
nsDependentString(regPath), appDirPath,
|
|
pathHash);
|
|
if (!pathHashResult) {
|
|
pathHashResult = GetCachedHash(HKEY_CURRENT_USER,
|
|
nsDependentString(regPath), appDirPath,
|
|
pathHash);
|
|
}
|
|
}
|
|
|
|
if (!pathHashResult) {
|
|
// This should only happen when the installer isn't used (e.g. zip builds).
|
|
uint64_t hash = CityHash64(static_cast<const char *>(appDirPath.get()),
|
|
appDirPath.Length() * sizeof(nsAutoString::char_type));
|
|
pathHash.AppendInt((int)(hash >> 32), 16);
|
|
pathHash.AppendInt((int)hash, 16);
|
|
// The installer implementation writes the registry values that were checked
|
|
// in the previous block for this value in uppercase and since it is an
|
|
// option to have a case sensitive file system on Windows this value must
|
|
// also be in uppercase.
|
|
ToUpperCase(pathHash);
|
|
}
|
|
|
|
// As a last ditch effort, get the local app data directory and if a vendor
|
|
// name exists append it. If only a product name exists, append it. If neither
|
|
// exist fallback to old handling. We don't use the product name on purpose
|
|
// because we want a shared update directory for different apps run from the
|
|
// same path.
|
|
nsCOMPtr<nsIFile> localDir;
|
|
if ((hasVendor || gAppData->name) &&
|
|
NS_SUCCEEDED(GetUserDataDirectoryHome(getter_AddRefs(localDir), true)) &&
|
|
NS_SUCCEEDED(localDir->AppendNative(nsDependentCString(hasVendor ?
|
|
gAppData->vendor : gAppData->name))) &&
|
|
NS_SUCCEEDED(localDir->Append(NS_LITERAL_STRING("updates"))) &&
|
|
NS_SUCCEEDED(localDir->Append(pathHash))) {
|
|
localDir.forget(aResult);
|
|
return NS_OK;
|
|
}
|
|
|
|
nsAutoString appPath;
|
|
rv = updRoot->GetPath(appPath);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
// AppDir may be a short path. Convert to long path to make sure
|
|
// the consistency of the update folder location
|
|
nsString longPath;
|
|
wchar_t* buf;
|
|
|
|
uint32_t bufLength = longPath.GetMutableData(&buf, MAXPATHLEN);
|
|
NS_ENSURE_TRUE(bufLength >= MAXPATHLEN, NS_ERROR_OUT_OF_MEMORY);
|
|
|
|
DWORD len = GetLongPathNameW(appPath.get(), buf, bufLength);
|
|
|
|
// Failing GetLongPathName() is not fatal.
|
|
if (len <= 0 || len >= bufLength)
|
|
longPath.Assign(appPath);
|
|
else
|
|
longPath.SetLength(len);
|
|
|
|
// Use <UserLocalDataDir>\updates\<relative path to app dir from
|
|
// Program Files> if app dir is under Program Files to avoid the
|
|
// folder virtualization mess on Windows Vista
|
|
nsAutoString programFiles;
|
|
rv = GetShellFolderPath(FOLDERID_ProgramFiles, programFiles);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
programFiles.Append('\\');
|
|
uint32_t programFilesLen = programFiles.Length();
|
|
|
|
nsAutoString programName;
|
|
if (_wcsnicmp(programFiles.get(), longPath.get(), programFilesLen) == 0) {
|
|
programName = Substring(longPath, programFilesLen);
|
|
} else {
|
|
// We need the update root directory to live outside of the installation
|
|
// directory, because otherwise the updater writing the log file can cause
|
|
// the directory to be locked, which prevents it from being replaced after
|
|
// background updates.
|
|
programName.AssignASCII(MOZ_APP_NAME);
|
|
}
|
|
|
|
rv = GetUserLocalDataDirectory(getter_AddRefs(updRoot));
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
rv = updRoot->AppendRelativePath(programName);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
#endif // XP_WIN
|
|
updRoot.forget(aResult);
|
|
return NS_OK;
|
|
}
|
|
|
|
nsresult
|
|
nsXREDirProvider::GetProfileStartupDir(nsIFile* *aResult)
|
|
{
|
|
if (mProfileDir)
|
|
return mProfileDir->Clone(aResult);
|
|
|
|
if (mAppProvider) {
|
|
nsCOMPtr<nsIFile> needsclone;
|
|
bool dummy;
|
|
nsresult rv = mAppProvider->GetFile(NS_APP_PROFILE_DIR_STARTUP,
|
|
&dummy,
|
|
getter_AddRefs(needsclone));
|
|
if (NS_SUCCEEDED(rv))
|
|
return needsclone->Clone(aResult);
|
|
}
|
|
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
|
|
nsresult
|
|
nsXREDirProvider::GetProfileDir(nsIFile* *aResult)
|
|
{
|
|
if (mProfileDir) {
|
|
if (!mProfileNotified)
|
|
return NS_ERROR_FAILURE;
|
|
|
|
return mProfileDir->Clone(aResult);
|
|
}
|
|
|
|
if (mAppProvider) {
|
|
nsCOMPtr<nsIFile> needsclone;
|
|
bool dummy;
|
|
nsresult rv = mAppProvider->GetFile(NS_APP_USER_PROFILE_50_DIR,
|
|
&dummy,
|
|
getter_AddRefs(needsclone));
|
|
if (NS_SUCCEEDED(rv))
|
|
return needsclone->Clone(aResult);
|
|
}
|
|
|
|
return NS_GetSpecialDirectory(NS_APP_USER_PROFILE_50_DIR, aResult);
|
|
}
|
|
|
|
nsresult
|
|
nsXREDirProvider::GetUserDataDirectoryHome(nsIFile** aFile, bool aLocal)
|
|
{
|
|
// Copied from nsAppFileLocationProvider (more or less)
|
|
nsresult rv;
|
|
nsCOMPtr<nsIFile> localDir;
|
|
|
|
#if defined(XP_MACOSX)
|
|
FSRef fsRef;
|
|
OSType folderType;
|
|
if (aLocal) {
|
|
folderType = kCachedDataFolderType;
|
|
} else {
|
|
#ifdef MOZ_THUNDERBIRD
|
|
folderType = kDomainLibraryFolderType;
|
|
#else
|
|
folderType = kApplicationSupportFolderType;
|
|
#endif
|
|
}
|
|
OSErr err = ::FSFindFolder(kUserDomain, folderType, kCreateFolder, &fsRef);
|
|
NS_ENSURE_FALSE(err, NS_ERROR_FAILURE);
|
|
|
|
rv = NS_NewNativeLocalFile(EmptyCString(), true, getter_AddRefs(localDir));
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
nsCOMPtr<nsILocalFileMac> dirFileMac = do_QueryInterface(localDir);
|
|
NS_ENSURE_TRUE(dirFileMac, NS_ERROR_UNEXPECTED);
|
|
|
|
rv = dirFileMac->InitWithFSRef(&fsRef);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
localDir = do_QueryInterface(dirFileMac, &rv);
|
|
#elif defined(XP_IOS)
|
|
nsAutoCString userDir;
|
|
if (GetUIKitDirectory(aLocal, userDir)) {
|
|
rv = NS_NewNativeLocalFile(userDir, true, getter_AddRefs(localDir));
|
|
} else {
|
|
rv = NS_ERROR_FAILURE;
|
|
}
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
#elif defined(XP_WIN)
|
|
nsString path;
|
|
if (aLocal) {
|
|
rv = GetShellFolderPath(FOLDERID_LocalAppData, path);
|
|
if (NS_FAILED(rv))
|
|
rv = GetRegWindowsAppDataFolder(aLocal, path);
|
|
}
|
|
if (!aLocal || NS_FAILED(rv)) {
|
|
rv = GetShellFolderPath(FOLDERID_RoamingAppData, path);
|
|
if (NS_FAILED(rv)) {
|
|
if (!aLocal)
|
|
rv = GetRegWindowsAppDataFolder(aLocal, path);
|
|
}
|
|
}
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
rv = NS_NewLocalFile(path, true, getter_AddRefs(localDir));
|
|
#elif defined(XP_UNIX)
|
|
const char* homeDir = getenv("HOME");
|
|
if (!homeDir || !*homeDir)
|
|
return NS_ERROR_FAILURE;
|
|
|
|
#ifdef ANDROID /* We want (ProfD == ProfLD) on Android. */
|
|
aLocal = false;
|
|
#endif
|
|
|
|
if (aLocal) {
|
|
// If $XDG_CACHE_HOME is defined use it, otherwise use $HOME/.cache.
|
|
const char* cacheHome = getenv("XDG_CACHE_HOME");
|
|
if (cacheHome && *cacheHome) {
|
|
rv = NS_NewNativeLocalFile(nsDependentCString(cacheHome), true,
|
|
getter_AddRefs(localDir));
|
|
} else {
|
|
rv = NS_NewNativeLocalFile(nsDependentCString(homeDir), true,
|
|
getter_AddRefs(localDir));
|
|
if (NS_SUCCEEDED(rv))
|
|
rv = localDir->AppendNative(NS_LITERAL_CSTRING(".cache"));
|
|
}
|
|
} else {
|
|
rv = NS_NewNativeLocalFile(nsDependentCString(homeDir), true,
|
|
getter_AddRefs(localDir));
|
|
}
|
|
#else
|
|
#error "Don't know how to get product dir on your platform"
|
|
#endif
|
|
|
|
NS_IF_ADDREF(*aFile = localDir);
|
|
return rv;
|
|
}
|
|
|
|
nsresult
|
|
nsXREDirProvider::GetSysUserExtensionsDirectory(nsIFile** aFile)
|
|
{
|
|
nsCOMPtr<nsIFile> localDir;
|
|
nsresult rv = GetUserDataDirectoryHome(getter_AddRefs(localDir), false);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
rv = AppendSysUserExtensionPath(localDir);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
rv = EnsureDirectoryExists(localDir);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
localDir.forget(aFile);
|
|
return NS_OK;
|
|
}
|
|
|
|
nsresult
|
|
nsXREDirProvider::GetSysUserExtensionsDevDirectory(nsIFile** aFile)
|
|
{
|
|
nsCOMPtr<nsIFile> localDir;
|
|
nsresult rv = GetUserDataDirectoryHome(getter_AddRefs(localDir), false);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
rv = AppendSysUserExtensionsDevPath(localDir);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
rv = EnsureDirectoryExists(localDir);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
localDir.forget(aFile);
|
|
return NS_OK;
|
|
}
|
|
|
|
#if defined(XP_UNIX) || defined(XP_MACOSX)
|
|
nsresult
|
|
nsXREDirProvider::GetSystemExtensionsDirectory(nsIFile** aFile)
|
|
{
|
|
nsresult rv;
|
|
nsCOMPtr<nsIFile> localDir;
|
|
|
|
rv = GetSystemParentDirectory(getter_AddRefs(localDir));
|
|
if (NS_SUCCEEDED(rv)) {
|
|
NS_NAMED_LITERAL_CSTRING(sExtensions,
|
|
#if defined(XP_MACOSX)
|
|
"Extensions"
|
|
#else
|
|
"extensions"
|
|
#endif
|
|
);
|
|
|
|
rv = localDir->AppendNative(sExtensions);
|
|
if (NS_SUCCEEDED(rv)) {
|
|
localDir.forget(aFile);
|
|
}
|
|
}
|
|
return rv;
|
|
}
|
|
#endif
|
|
|
|
nsresult
|
|
nsXREDirProvider::GetUserDataDirectory(nsIFile** aFile, bool aLocal,
|
|
const nsACString* aProfileName,
|
|
const nsACString* aAppName,
|
|
const nsACString* aVendorName)
|
|
{
|
|
nsCOMPtr<nsIFile> localDir;
|
|
nsresult rv = GetUserDataDirectoryHome(getter_AddRefs(localDir), aLocal);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
rv = AppendProfilePath(localDir, aProfileName, aAppName, aVendorName, aLocal);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
#ifdef DEBUG_jungshik
|
|
nsAutoCString cwd;
|
|
localDir->GetNativePath(cwd);
|
|
printf("nsXREDirProvider::GetUserDataDirectory: %s\n", cwd.get());
|
|
#endif
|
|
rv = EnsureDirectoryExists(localDir);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
localDir.forget(aFile);
|
|
return NS_OK;
|
|
}
|
|
|
|
nsresult
|
|
nsXREDirProvider::EnsureDirectoryExists(nsIFile* aDirectory)
|
|
{
|
|
bool exists;
|
|
nsresult rv = aDirectory->Exists(&exists);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
#ifdef DEBUG_jungshik
|
|
if (!exists) {
|
|
nsAutoCString cwd;
|
|
aDirectory->GetNativePath(cwd);
|
|
printf("nsXREDirProvider::EnsureDirectoryExists: %s does not\n", cwd.get());
|
|
}
|
|
#endif
|
|
if (!exists)
|
|
rv = aDirectory->Create(nsIFile::DIRECTORY_TYPE, 0700);
|
|
#ifdef DEBUG_jungshik
|
|
if (NS_FAILED(rv))
|
|
NS_WARNING("nsXREDirProvider::EnsureDirectoryExists: create failed");
|
|
#endif
|
|
|
|
return rv;
|
|
}
|
|
|
|
nsresult
|
|
nsXREDirProvider::AppendSysUserExtensionPath(nsIFile* aFile)
|
|
{
|
|
NS_ASSERTION(aFile, "Null pointer!");
|
|
|
|
nsresult rv;
|
|
|
|
#if defined (XP_MACOSX) || defined(XP_WIN)
|
|
|
|
static const char* const sXR = "Mozilla";
|
|
rv = aFile->AppendNative(nsDependentCString(sXR));
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
static const char* const sExtensions = "Extensions";
|
|
rv = aFile->AppendNative(nsDependentCString(sExtensions));
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
#elif defined(XP_UNIX)
|
|
|
|
static const char* const sXR = ".mozilla";
|
|
rv = aFile->AppendNative(nsDependentCString(sXR));
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
static const char* const sExtensions = "extensions";
|
|
rv = aFile->AppendNative(nsDependentCString(sExtensions));
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
#else
|
|
#error "Don't know how to get XRE user extension path on your platform"
|
|
#endif
|
|
return NS_OK;
|
|
}
|
|
|
|
nsresult
|
|
nsXREDirProvider::AppendSysUserExtensionsDevPath(nsIFile* aFile)
|
|
{
|
|
MOZ_ASSERT(aFile);
|
|
|
|
nsresult rv;
|
|
|
|
#if defined (XP_MACOSX) || defined(XP_WIN)
|
|
|
|
static const char* const sXR = "Mozilla";
|
|
rv = aFile->AppendNative(nsDependentCString(sXR));
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
static const char* const sExtensions = "SystemExtensionsDev";
|
|
rv = aFile->AppendNative(nsDependentCString(sExtensions));
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
#elif defined(XP_UNIX)
|
|
|
|
static const char* const sXR = ".mozilla";
|
|
rv = aFile->AppendNative(nsDependentCString(sXR));
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
static const char* const sExtensions = "systemextensionsdev";
|
|
rv = aFile->AppendNative(nsDependentCString(sExtensions));
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
#else
|
|
#error "Don't know how to get XRE system extension dev path on your platform"
|
|
#endif
|
|
return NS_OK;
|
|
}
|
|
|
|
|
|
nsresult
|
|
nsXREDirProvider::AppendProfilePath(nsIFile* aFile,
|
|
const nsACString* aProfileName,
|
|
const nsACString* aAppName,
|
|
const nsACString* aVendorName,
|
|
bool aLocal)
|
|
{
|
|
NS_ASSERTION(aFile, "Null pointer!");
|
|
|
|
if (!gAppData) {
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
|
|
nsAutoCString profile;
|
|
nsAutoCString appName;
|
|
nsAutoCString vendor;
|
|
if (aProfileName && !aProfileName->IsEmpty()) {
|
|
profile = *aProfileName;
|
|
} else if (aAppName) {
|
|
appName = *aAppName;
|
|
if (aVendorName) {
|
|
vendor = *aVendorName;
|
|
}
|
|
} else if (gAppData->profile) {
|
|
profile = gAppData->profile;
|
|
} else {
|
|
appName = gAppData->name;
|
|
vendor = gAppData->vendor;
|
|
}
|
|
|
|
nsresult rv;
|
|
|
|
#if defined (XP_MACOSX)
|
|
if (!profile.IsEmpty()) {
|
|
rv = AppendProfileString(aFile, profile.get());
|
|
}
|
|
else {
|
|
// Note that MacOS ignores the vendor when creating the profile hierarchy -
|
|
// all application preferences directories live alongside one another in
|
|
// ~/Library/Application Support/
|
|
rv = aFile->AppendNative(appName);
|
|
}
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
#elif defined(XP_WIN)
|
|
if (!profile.IsEmpty()) {
|
|
rv = AppendProfileString(aFile, profile.get());
|
|
}
|
|
else {
|
|
if (!vendor.IsEmpty()) {
|
|
rv = aFile->AppendNative(vendor);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
}
|
|
rv = aFile->AppendNative(appName);
|
|
}
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
#elif defined(ANDROID)
|
|
// The directory used for storing profiles
|
|
// The parent of this directory is set in GetUserDataDirectoryHome
|
|
// XXX: handle gAppData->profile properly
|
|
// XXXsmaug ...and the rest of the profile creation!
|
|
MOZ_ASSERT(!aAppName,
|
|
"Profile creation for external applications is not implemented!");
|
|
rv = aFile->AppendNative(nsDependentCString("mozilla"));
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
#elif defined(XP_UNIX)
|
|
nsAutoCString folder;
|
|
// Make it hidden (by starting with "."), except when local (the
|
|
// profile is already under ~/.cache or XDG_CACHE_HOME).
|
|
if (!aLocal)
|
|
folder.Assign('.');
|
|
|
|
if (!profile.IsEmpty()) {
|
|
// Skip any leading path characters
|
|
const char* profileStart = profile.get();
|
|
while (*profileStart == '/' || *profileStart == '\\')
|
|
profileStart++;
|
|
|
|
// On the off chance that someone wanted their folder to be hidden don't
|
|
// let it become ".."
|
|
if (*profileStart == '.' && !aLocal)
|
|
profileStart++;
|
|
|
|
folder.Append(profileStart);
|
|
ToLowerCase(folder);
|
|
|
|
rv = AppendProfileString(aFile, folder.BeginReading());
|
|
}
|
|
else {
|
|
if (!vendor.IsEmpty()) {
|
|
folder.Append(vendor);
|
|
ToLowerCase(folder);
|
|
|
|
rv = aFile->AppendNative(folder);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
folder.Truncate();
|
|
}
|
|
|
|
folder.Append(appName);
|
|
ToLowerCase(folder);
|
|
|
|
rv = aFile->AppendNative(folder);
|
|
}
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
#else
|
|
#error "Don't know how to get profile path on your platform"
|
|
#endif
|
|
return NS_OK;
|
|
}
|
|
|
|
nsresult
|
|
nsXREDirProvider::AppendProfileString(nsIFile* aFile, const char* aPath)
|
|
{
|
|
NS_ASSERTION(aFile, "Null file!");
|
|
NS_ASSERTION(aPath, "Null path!");
|
|
|
|
nsAutoCString pathDup(aPath);
|
|
|
|
char* path = pathDup.BeginWriting();
|
|
|
|
nsresult rv;
|
|
char* subdir;
|
|
while ((subdir = NS_strtok("/\\", &path))) {
|
|
rv = aFile->AppendNative(nsDependentCString(subdir));
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|