// -*- Mode: Java; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- /* This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ Components.utils.import("resource://gre/modules/XPCOMUtils.jsm"); XPCOMUtils.defineLazyModuleGetter(this, "PlacesUtils", "resource://gre/modules/PlacesUtils.jsm"); function Sanitizer() {} Sanitizer.prototype = { // warning to the caller: this one may raise an exception (e.g. bug #265028) clearItem: function (aItemName) { if (this.items[aItemName].canClear) this.items[aItemName].clear(); }, canClearItem: function (aItemName) { return this.items[aItemName].canClear; }, _prefDomain: "privacy.item.", getNameFromPreference: function (aPreferenceName) { return aPreferenceName.substr(this._prefDomain.length); }, /** * Deletes privacy sensitive data in a batch, according to user preferences * * @returns null if everything's fine; an object in the form * { itemName: error, ... } on (partial) failure */ sanitize: function () { var branch = Services.prefs.getBranch(this._prefDomain); var errors = null; for (var itemName in this.items) { var item = this.items[itemName]; if ("clear" in item && item.canClear && branch.getBoolPref(itemName)) { // Some of these clear() may raise exceptions (see bug #265028) // to sanitize as much as possible, we catch and store them, // rather than fail fast. // Callers should check returned errors and give user feedback // about items that could not be sanitized try { item.clear(); } catch(er) { if (!errors) errors = {}; errors[itemName] = er; dump("Error sanitizing " + itemName + ": " + er + "\n"); } } } return errors; }, items: { // Clear Sync account before passwords so that Sync still has access to the // credentials to clean up device-specific records on the server. Also // disable it before wiping history so we don't accidentally sync that. syncAccount: { clear: function () { WeaveGlue.disconnect(); }, get canClear() { return (Weave.Status.checkSetup() != Weave.CLIENT_NOT_CONFIGURED); } }, cache: { clear: function () { var cacheService = Cc["@mozilla.org/network/cache-service;1"].getService(Ci.nsICacheService); try { cacheService.evictEntries(Ci.nsICache.STORE_ANYWHERE); } catch(er) {} let imageCache = Cc["@mozilla.org/image/cache;1"].getService(Ci.imgICache); try { imageCache.clearCache(false); // true=chrome, false=content } catch(er) {} }, get canClear() { return true; } }, cookies: { clear: function () { var cookieMgr = Cc["@mozilla.org/cookiemanager;1"].getService(Ci.nsICookieManager); cookieMgr.removeAll(); // clear any network geolocation provider sessions try { var branch = Services.prefs.getBranch("geo.wifi.access_token."); branch.deleteBranch(""); branch = Services.prefs.getBranch("geo.request.remember."); branch.deleteBranch(""); } catch (e) {dump(e);} }, get canClear() { return true; } }, siteSettings: { clear: function () { // Clear site-specific permissions like "Allow this site to open popups" Services.perms.removeAll(); // Clear site-specific settings like page-zoom level var cps = Cc["@mozilla.org/content-pref/service;1"].getService(Ci.nsIContentPrefService2); cps.removeAllDomains(null); // Clear "Never remember passwords for this site", which is not handled by // the permission manager var pwmgr = Cc["@mozilla.org/login-manager;1"].getService(Ci.nsILoginManager); var hosts = pwmgr.getAllDisabledHosts({}) for each (var host in hosts) { pwmgr.setLoginSavingEnabled(host, true); } }, get canClear() { return true; } }, offlineApps: { clear: function () { var cacheService = Cc["@mozilla.org/network/cache-service;1"].getService(Ci.nsICacheService); try { cacheService.evictEntries(Ci.nsICache.STORE_OFFLINE); } catch(er) {} }, get canClear() { return true; } }, history: { clear: function () { PlacesUtils.history.removeAllPages(); try { Services.obs.notifyObservers(null, "browser:purge-session-history", ""); } catch (e) { } // Clear last URL of the Open Web Location dialog try { Services.prefs.clearUserPref("general.open_location.last_url"); } catch (e) { } }, get canClear() { // bug 347231: Always allow clearing history due to dependencies on // the browser:purge-session-history notification. (like error console) return true; } }, formdata: { clear: function () { //Clear undo history of all searchBars var windows = Services.wm.getEnumerator("navigator:browser"); while (windows.hasMoreElements()) { var searchBar = windows.getNext().document.getElementById("searchbar"); if (searchBar) { searchBar.value = ""; searchBar.textbox.editor.transactionManager.clear(); } } var formHistory = Cc["@mozilla.org/satchel/form-history;1"].getService(Ci.nsIFormHistory2); formHistory.removeAllEntries(); }, get canClear() { var formHistory = Cc["@mozilla.org/satchel/form-history;1"].getService(Ci.nsIFormHistory2); return formHistory.hasEntries; } }, downloads: { clear: function () { var dlMgr = Cc["@mozilla.org/download-manager;1"].getService(Ci.nsIDownloadManager); dlMgr.cleanUp(); }, get canClear() { var dlMgr = Cc["@mozilla.org/download-manager;1"].getService(Ci.nsIDownloadManager); return dlMgr.canCleanUp; } }, passwords: { clear: function () { var pwmgr = Cc["@mozilla.org/login-manager;1"].getService(Ci.nsILoginManager); pwmgr.removeAllLogins(); }, get canClear() { var pwmgr = Cc["@mozilla.org/login-manager;1"].getService(Ci.nsILoginManager); var count = pwmgr.countLogins("", "", ""); // count all logins return (count > 0); } }, sessions: { clear: function () { // clear all auth tokens var sdr = Cc["@mozilla.org/security/sdr;1"].getService(Ci.nsISecretDecoderRing); sdr.logoutAndTeardown(); // clear plain HTTP auth sessions var authMgr = Cc['@mozilla.org/network/http-auth-manager;1'].getService(Ci.nsIHttpAuthManager); authMgr.clearAll(); }, get canClear() { return true; } } } }; // "Static" members Sanitizer.prefDomain = "privacy.sanitize."; Sanitizer.prefShutdown = "sanitizeOnShutdown"; Sanitizer.prefDidShutdown = "didShutdownSanitize"; Sanitizer._prefs = null; Sanitizer.__defineGetter__("prefs", function() { return Sanitizer._prefs ? Sanitizer._prefs : Sanitizer._prefs = Cc["@mozilla.org/preferences-service;1"] .getService(Ci.nsIPrefService) .getBranch(Sanitizer.prefDomain); }); /** * Deletes privacy sensitive data in a batch, optionally showing the * sanitize UI, according to user preferences * * @returns null if everything's fine * an object in the form { itemName: error, ... } on (partial) failure */ Sanitizer.sanitize = function() { return new Sanitizer().sanitize(); }; Sanitizer.onStartup = function() { // we check for unclean exit with pending sanitization Sanitizer._checkAndSanitize(); }; Sanitizer.onShutdown = function() { // we check if sanitization is needed and perform it Sanitizer._checkAndSanitize(); }; // this is called on startup and shutdown, to perform pending sanitizations Sanitizer._checkAndSanitize = function() { const prefs = Sanitizer.prefs; if (prefs.getBoolPref(Sanitizer.prefShutdown) && !prefs.prefHasUserValue(Sanitizer.prefDidShutdown)) { // this is a shutdown or a startup after an unclean exit Sanitizer.sanitize() || // sanitize() returns null on full success prefs.setBoolPref(Sanitizer.prefDidShutdown, true); } };