mirror of
https://github.com/mozilla/gecko-dev.git
synced 2024-11-30 16:22:00 +00:00
668022e33b
Differential Revision: https://phabricator.services.mozilla.com/D117726
662 lines
21 KiB
JavaScript
662 lines
21 KiB
JavaScript
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this file,
|
|
* You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
"use strict";
|
|
|
|
const { XPCOMUtils } = ChromeUtils.import(
|
|
"resource://gre/modules/XPCOMUtils.jsm"
|
|
);
|
|
const { Services } = ChromeUtils.import("resource://gre/modules/Services.jsm");
|
|
|
|
var EXPORTED_SYMBOLS = ["SiteDataManager"];
|
|
|
|
XPCOMUtils.defineLazyGetter(this, "gStringBundle", function() {
|
|
return Services.strings.createBundle(
|
|
"chrome://browser/locale/siteData.properties"
|
|
);
|
|
});
|
|
|
|
XPCOMUtils.defineLazyGetter(this, "gBrandBundle", function() {
|
|
return Services.strings.createBundle(
|
|
"chrome://branding/locale/brand.properties"
|
|
);
|
|
});
|
|
|
|
var SiteDataManager = {
|
|
// A Map of sites and their disk usage according to Quota Manager.
|
|
// Key is base domain (group sites based on base domain across scheme, port,
|
|
// origin attributes) or host if the entry does not have a base domain.
|
|
// Value is one object holding:
|
|
// - baseDomainOrHost: Same as key.
|
|
// - principals: instances of nsIPrincipal (only when the site has
|
|
// quota storage).
|
|
// - persisted: the persistent-storage status.
|
|
// - quotaUsage: the usage of indexedDB and localStorage.
|
|
// - containersData: a map containing cookiesBlocked,lastAccessed and quotaUsage by userContextID.
|
|
_sites: new Map(),
|
|
|
|
_getCacheSizeObserver: null,
|
|
|
|
_getCacheSizePromise: null,
|
|
|
|
_getQuotaUsagePromise: null,
|
|
|
|
_quotaUsageRequest: null,
|
|
|
|
/**
|
|
* Retrieve the latest site data and store it in SiteDataManager.
|
|
*
|
|
* Updating site data is a *very* expensive operation. This method exists so that
|
|
* consumers can manually decide when to update, most methods on SiteDataManager
|
|
* will not trigger updates automatically.
|
|
*
|
|
* It is *highly discouraged* to await on this function to finish before showing UI.
|
|
* Either trigger the update some time before the data is needed or use the
|
|
* entryUpdatedCallback parameter to update the UI async.
|
|
*
|
|
* @param {entryUpdatedCallback} a function to be called whenever a site is added or
|
|
* updated. This can be used to e.g. fill a UI that lists sites without
|
|
* blocking on the entire update to finish.
|
|
* @returns a Promise that resolves when updating is done.
|
|
**/
|
|
async updateSites(entryUpdatedCallback) {
|
|
Services.obs.notifyObservers(null, "sitedatamanager:updating-sites");
|
|
// Clear old data and requests first
|
|
this._sites.clear();
|
|
this._getAllCookies(entryUpdatedCallback);
|
|
await this._getQuotaUsage(entryUpdatedCallback);
|
|
Services.obs.notifyObservers(null, "sitedatamanager:sites-updated");
|
|
},
|
|
|
|
/**
|
|
* Get the base domain of a host on a best-effort basis.
|
|
* @param {string} host - Host to convert.
|
|
* @returns {string} Computed base domain. If the base domain cannot be
|
|
* determined, because the host is an IP address or does not have enough
|
|
* domain levels we will return the original host. This includes the empty
|
|
* string.
|
|
* @throws {Error} Throws for unexpected conversion errors from eTLD service.
|
|
*/
|
|
getBaseDomainFromHost(host) {
|
|
let result = host;
|
|
try {
|
|
result = Services.eTLD.getBaseDomainFromHost(host);
|
|
} catch (e) {
|
|
if (
|
|
e.result == Cr.NS_ERROR_HOST_IS_IP_ADDRESS ||
|
|
e.result == Cr.NS_ERROR_INSUFFICIENT_DOMAIN_LEVELS
|
|
) {
|
|
// For these 2 expected errors, just take the host as the result.
|
|
// - NS_ERROR_HOST_IS_IP_ADDRESS: the host is in ipv4/ipv6.
|
|
// - NS_ERROR_INSUFFICIENT_DOMAIN_LEVELS: not enough domain parts to extract.
|
|
result = host;
|
|
} else {
|
|
throw e;
|
|
}
|
|
}
|
|
return result;
|
|
},
|
|
|
|
_getOrInsertSite(baseDomainOrHost) {
|
|
let site = this._sites.get(baseDomainOrHost);
|
|
if (!site) {
|
|
site = {
|
|
baseDomainOrHost,
|
|
cookies: [],
|
|
persisted: false,
|
|
quotaUsage: 0,
|
|
lastAccessed: 0,
|
|
principals: [],
|
|
};
|
|
this._sites.set(baseDomainOrHost, site);
|
|
}
|
|
return site;
|
|
},
|
|
|
|
_getOrInsertContainersData(site, userContextId) {
|
|
if (!site.containersData) {
|
|
site.containersData = new Map();
|
|
}
|
|
|
|
let containerData = site.containersData.get(userContextId);
|
|
if (!containerData) {
|
|
containerData = {
|
|
cookiesBlocked: 0,
|
|
lastAccessed: new Date(0),
|
|
quotaUsage: 0,
|
|
};
|
|
site.containersData.set(userContextId, containerData);
|
|
}
|
|
return containerData;
|
|
},
|
|
|
|
/**
|
|
* Retrieves the amount of space currently used by disk cache.
|
|
*
|
|
* You can use DownloadUtils.convertByteUnits to convert this to
|
|
* a user-understandable size/unit combination.
|
|
*
|
|
* @returns a Promise that resolves with the cache size on disk in bytes.
|
|
*/
|
|
getCacheSize() {
|
|
if (this._getCacheSizePromise) {
|
|
return this._getCacheSizePromise;
|
|
}
|
|
|
|
this._getCacheSizePromise = new Promise((resolve, reject) => {
|
|
// Needs to root the observer since cache service keeps only a weak reference.
|
|
this._getCacheSizeObserver = {
|
|
onNetworkCacheDiskConsumption: consumption => {
|
|
resolve(consumption);
|
|
this._getCacheSizePromise = null;
|
|
this._getCacheSizeObserver = null;
|
|
},
|
|
|
|
QueryInterface: ChromeUtils.generateQI([
|
|
"nsICacheStorageConsumptionObserver",
|
|
"nsISupportsWeakReference",
|
|
]),
|
|
};
|
|
|
|
try {
|
|
Services.cache2.asyncGetDiskConsumption(this._getCacheSizeObserver);
|
|
} catch (e) {
|
|
reject(e);
|
|
this._getCacheSizePromise = null;
|
|
this._getCacheSizeObserver = null;
|
|
}
|
|
});
|
|
|
|
return this._getCacheSizePromise;
|
|
},
|
|
|
|
_getQuotaUsage(entryUpdatedCallback) {
|
|
this._cancelGetQuotaUsage();
|
|
this._getQuotaUsagePromise = new Promise(resolve => {
|
|
let onUsageResult = request => {
|
|
if (request.resultCode == Cr.NS_OK) {
|
|
let items = request.result;
|
|
for (let item of items) {
|
|
if (!item.persisted && item.usage <= 0) {
|
|
// An non-persistent-storage site with 0 byte quota usage is redundant for us so skip it.
|
|
continue;
|
|
}
|
|
let principal = Services.scriptSecurityManager.createContentPrincipalFromOrigin(
|
|
item.origin
|
|
);
|
|
if (principal.schemeIs("http") || principal.schemeIs("https")) {
|
|
// Group dom storage by first party. If an entry is partitioned
|
|
// the first party site will be in the partitionKey, instead of
|
|
// the principal baseDomain.
|
|
let pkBaseDomain;
|
|
try {
|
|
pkBaseDomain = ChromeUtils.getBaseDomainFromPartitionKey(
|
|
principal.originAttributes.partitionKey
|
|
);
|
|
} catch (e) {
|
|
Cu.reportError(e);
|
|
}
|
|
let site = this._getOrInsertSite(
|
|
pkBaseDomain || principal.baseDomain
|
|
);
|
|
// Assume 3 sites:
|
|
// - Site A (not persisted): https://www.foo.com
|
|
// - Site B (not persisted): https://www.foo.com^userContextId=2
|
|
// - Site C (persisted): https://www.foo.com:1234
|
|
// Although only C is persisted, grouping by base domain, as a
|
|
// result, we still mark as persisted here under this base
|
|
// domain group.
|
|
if (item.persisted) {
|
|
site.persisted = true;
|
|
}
|
|
if (site.lastAccessed < item.lastAccessed) {
|
|
site.lastAccessed = item.lastAccessed;
|
|
}
|
|
if (Number.isInteger(principal.userContextId)) {
|
|
let containerData = this._getOrInsertContainersData(
|
|
site,
|
|
principal.userContextId
|
|
);
|
|
containerData.quotaUsage = item.usage;
|
|
let itemTime = item.lastAccessed / 1000;
|
|
if (containerData.lastAccessed.getTime() < itemTime) {
|
|
containerData.lastAccessed.setTime(itemTime);
|
|
}
|
|
}
|
|
site.principals.push(principal);
|
|
site.quotaUsage += item.usage;
|
|
if (entryUpdatedCallback) {
|
|
entryUpdatedCallback(principal.baseDomain, site);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
resolve();
|
|
};
|
|
// XXX: The work of integrating localStorage into Quota Manager is in progress.
|
|
// After the bug 742822 and 1286798 landed, localStorage usage will be included.
|
|
// So currently only get indexedDB usage.
|
|
this._quotaUsageRequest = Services.qms.getUsage(onUsageResult);
|
|
});
|
|
return this._getQuotaUsagePromise;
|
|
},
|
|
|
|
_getAllCookies(entryUpdatedCallback) {
|
|
for (let cookie of Services.cookies.cookies) {
|
|
// Group cookies by first party. If a cookie is partitioned the
|
|
// partitionKey will contain the first party site, instead of the host
|
|
// field.
|
|
let pkBaseDomain;
|
|
try {
|
|
pkBaseDomain = ChromeUtils.getBaseDomainFromPartitionKey(
|
|
cookie.originAttributes.partitionKey
|
|
);
|
|
} catch (e) {
|
|
Cu.reportError(e);
|
|
}
|
|
let baseDomainOrHost =
|
|
pkBaseDomain || this.getBaseDomainFromHost(cookie.rawHost);
|
|
let site = this._getOrInsertSite(baseDomainOrHost);
|
|
if (entryUpdatedCallback) {
|
|
entryUpdatedCallback(baseDomainOrHost, site);
|
|
}
|
|
site.cookies.push(cookie);
|
|
if (Number.isInteger(cookie.originAttributes.userContextId)) {
|
|
let containerData = this._getOrInsertContainersData(
|
|
site,
|
|
cookie.originAttributes.userContextId
|
|
);
|
|
containerData.cookiesBlocked += 1;
|
|
let cookieTime = cookie.lastAccessed / 1000;
|
|
if (containerData.lastAccessed.getTime() < cookieTime) {
|
|
containerData.lastAccessed.setTime(cookieTime);
|
|
}
|
|
}
|
|
if (site.lastAccessed < cookie.lastAccessed) {
|
|
site.lastAccessed = cookie.lastAccessed;
|
|
}
|
|
}
|
|
},
|
|
|
|
_cancelGetQuotaUsage() {
|
|
if (this._quotaUsageRequest) {
|
|
this._quotaUsageRequest.cancel();
|
|
this._quotaUsageRequest = null;
|
|
}
|
|
},
|
|
|
|
/**
|
|
* Checks if the site with the provided ASCII host is using any site data at all.
|
|
* This will check for:
|
|
* - Cookies (incl. subdomains)
|
|
* - Quota Usage
|
|
* in that order. This function is meant to be fast, and thus will
|
|
* end searching and return true once the first trace of site data is found.
|
|
*
|
|
* @param {String} the ASCII host to check
|
|
* @returns {Boolean} whether the site has any data associated with it
|
|
*/
|
|
async hasSiteData(asciiHost) {
|
|
if (Services.cookies.countCookiesFromHost(asciiHost)) {
|
|
return true;
|
|
}
|
|
|
|
let hasQuota = await new Promise(resolve => {
|
|
Services.qms.getUsage(request => {
|
|
if (request.resultCode != Cr.NS_OK) {
|
|
resolve(false);
|
|
return;
|
|
}
|
|
|
|
for (let item of request.result) {
|
|
if (!item.persisted && item.usage <= 0) {
|
|
continue;
|
|
}
|
|
|
|
let principal = Services.scriptSecurityManager.createContentPrincipalFromOrigin(
|
|
item.origin
|
|
);
|
|
if (principal.asciiHost == asciiHost) {
|
|
resolve(true);
|
|
return;
|
|
}
|
|
}
|
|
|
|
resolve(false);
|
|
});
|
|
});
|
|
|
|
if (hasQuota) {
|
|
return true;
|
|
}
|
|
|
|
return false;
|
|
},
|
|
|
|
getTotalUsage() {
|
|
return this._getQuotaUsagePromise.then(() => {
|
|
let usage = 0;
|
|
for (let site of this._sites.values()) {
|
|
usage += site.quotaUsage;
|
|
}
|
|
return usage;
|
|
});
|
|
},
|
|
|
|
/**
|
|
* Gets all sites that are currently storing site data. Entries are grouped by
|
|
* parent base domain if applicable. For example "foo.example.com",
|
|
* "example.com" and "bar.example.com" will have one entry with the baseDomain
|
|
* "example.com".
|
|
* A base domain entry will represent all data of its storage jar. The storage
|
|
* jar holds all first party data of the domain as well as any third party
|
|
* data partitioned under the domain. Additionally we will add data which
|
|
* belongs to the domain but is part of other domains storage jars . That is
|
|
* data third-party partitioned under other domains.
|
|
* Sites which cannot be associated with a base domain, for example IP hosts,
|
|
* are not grouped.
|
|
*
|
|
* The list is not automatically up-to-date. You need to call
|
|
* {@link updateSites} before you can use this method for the first time (and
|
|
* whenever you want to get an updated set of list.)
|
|
*
|
|
* @returns {Promise} Promise that resolves with the list of all sites.
|
|
*/
|
|
async getSites() {
|
|
await this._getQuotaUsagePromise;
|
|
|
|
return Array.from(this._sites.values()).map(site => ({
|
|
baseDomain: site.baseDomainOrHost,
|
|
cookies: site.cookies,
|
|
usage: site.quotaUsage,
|
|
containersData: site.containersData,
|
|
persisted: site.persisted,
|
|
lastAccessed: new Date(site.lastAccessed / 1000),
|
|
}));
|
|
},
|
|
|
|
/**
|
|
* Get site, which stores data, by base domain or host.
|
|
*
|
|
* The list is not automatically up-to-date. You need to call
|
|
* {@link updateSites} before you can use this method for the first time (and
|
|
* whenever you want to get an updated set of list.)
|
|
*
|
|
* @param {String} baseDomainOrHost - Base domain or host of the site to get.
|
|
*
|
|
* @returns {Promise<Object|null>} Promise that resolves with the site object
|
|
* or null if no site with given base domain or host stores data.
|
|
*/
|
|
async getSite(baseDomainOrHost) {
|
|
let baseDomain = this.getBaseDomainFromHost(baseDomainOrHost);
|
|
|
|
let site = this._sites.get(baseDomain);
|
|
if (!site) {
|
|
return null;
|
|
}
|
|
return {
|
|
baseDomain: site.baseDomainOrHost,
|
|
cookies: site.cookies,
|
|
usage: site.quotaUsage,
|
|
containersData: site.containersData,
|
|
persisted: site.persisted,
|
|
lastAccessed: new Date(site.lastAccessed / 1000),
|
|
};
|
|
},
|
|
|
|
_removePermission(site) {
|
|
let removals = new Set();
|
|
for (let principal of site.principals) {
|
|
let { originNoSuffix } = principal;
|
|
if (removals.has(originNoSuffix)) {
|
|
// In case of encountering
|
|
// - https://www.foo.com
|
|
// - https://www.foo.com^userContextId=2
|
|
// because setting/removing permission is across OAs already so skip the same origin without suffix
|
|
continue;
|
|
}
|
|
removals.add(originNoSuffix);
|
|
Services.perms.removeFromPrincipal(principal, "persistent-storage");
|
|
}
|
|
},
|
|
|
|
_removeQuotaUsage(site) {
|
|
let promises = [];
|
|
let removals = new Set();
|
|
for (let principal of site.principals) {
|
|
let { originNoSuffix } = principal;
|
|
if (removals.has(originNoSuffix)) {
|
|
// In case of encountering
|
|
// - https://www.foo.com
|
|
// - https://www.foo.com^userContextId=2
|
|
// below we have already removed across OAs so skip the same origin without suffix
|
|
continue;
|
|
}
|
|
removals.add(originNoSuffix);
|
|
promises.push(
|
|
new Promise(resolve => {
|
|
// We are clearing *All* across OAs so need to ensure a principal without suffix here,
|
|
// or the call of `clearStoragesForPrincipal` would fail.
|
|
principal = Services.scriptSecurityManager.createContentPrincipalFromOrigin(
|
|
originNoSuffix
|
|
);
|
|
let request = this._qms.clearStoragesForPrincipal(
|
|
principal,
|
|
null,
|
|
null,
|
|
true
|
|
);
|
|
request.callback = resolve;
|
|
})
|
|
);
|
|
}
|
|
return Promise.all(promises);
|
|
},
|
|
|
|
_removeCookies(site) {
|
|
for (let cookie of site.cookies) {
|
|
Services.cookies.remove(
|
|
cookie.host,
|
|
cookie.name,
|
|
cookie.path,
|
|
cookie.originAttributes
|
|
);
|
|
}
|
|
site.cookies = [];
|
|
},
|
|
|
|
// Returns a list of permissions from the permission manager that
|
|
// we consider part of "site data and cookies".
|
|
_getDeletablePermissions() {
|
|
let perms = [];
|
|
|
|
for (let permission of Services.perms.all) {
|
|
if (
|
|
permission.type == "persistent-storage" ||
|
|
permission.type == "storage-access"
|
|
) {
|
|
perms.push(permission);
|
|
}
|
|
}
|
|
|
|
return perms;
|
|
},
|
|
|
|
/**
|
|
* Removes all site data for the specified list of domains and hosts.
|
|
* This includes site data of subdomains belonging to the domains or hosts and
|
|
* partitioned storage. Data is cleared per storage jar, which means if we
|
|
* clear "example.com", we will also clear third parties embedded on
|
|
* "example.com". Additionally we will clear all data of "example.com" (as a
|
|
* third party) from other jars.
|
|
*
|
|
* @param {string|string[]} domainsOrHosts - List of domains and hosts or
|
|
* single domain or host to remove.
|
|
* @returns {Promise} Promise that resolves when data is removed and the site
|
|
* data manager has been updated.
|
|
*/
|
|
async remove(domainsOrHosts) {
|
|
if (domainsOrHosts == null) {
|
|
throw new Error("domainsOrHosts is required.");
|
|
}
|
|
// Allow the caller to pass a single base domain or host.
|
|
if (!Array.isArray(domainsOrHosts)) {
|
|
domainsOrHosts = [domainsOrHosts];
|
|
}
|
|
let perms = this._getDeletablePermissions();
|
|
let promises = [];
|
|
for (let domainOrHost of domainsOrHosts) {
|
|
const kFlags =
|
|
Ci.nsIClearDataService.CLEAR_COOKIES |
|
|
Ci.nsIClearDataService.CLEAR_DOM_STORAGES |
|
|
Ci.nsIClearDataService.CLEAR_SECURITY_SETTINGS |
|
|
Ci.nsIClearDataService.CLEAR_EME |
|
|
Ci.nsIClearDataService.CLEAR_ALL_CACHES;
|
|
promises.push(
|
|
new Promise(function(resolve) {
|
|
const { clearData } = Services;
|
|
if (domainOrHost) {
|
|
// First try to clear by base domain for aDomainOrHost. If we can't
|
|
// get a base domain, fall back to clearing by just host.
|
|
try {
|
|
clearData.deleteDataFromBaseDomain(
|
|
domainOrHost,
|
|
true,
|
|
kFlags,
|
|
resolve
|
|
);
|
|
} catch (e) {
|
|
if (
|
|
e.result != Cr.NS_ERROR_HOST_IS_IP_ADDRESS &&
|
|
e.result != Cr.NS_ERROR_INSUFFICIENT_DOMAIN_LEVELS
|
|
) {
|
|
throw e;
|
|
}
|
|
clearData.deleteDataFromHost(domainOrHost, true, kFlags, resolve);
|
|
}
|
|
} else {
|
|
clearData.deleteDataFromLocalFiles(true, kFlags, resolve);
|
|
}
|
|
})
|
|
);
|
|
|
|
for (let perm of perms) {
|
|
// Specialcase local file permissions.
|
|
if (!domainOrHost) {
|
|
if (perm.principal.schemeIs("file")) {
|
|
Services.perms.removePermission(perm);
|
|
}
|
|
} else if (
|
|
Services.eTLD.hasRootDomain(perm.principal.host, domainOrHost)
|
|
) {
|
|
Services.perms.removePermission(perm);
|
|
}
|
|
}
|
|
}
|
|
|
|
await Promise.all(promises);
|
|
|
|
return this.updateSites();
|
|
},
|
|
|
|
/**
|
|
* In the specified window, shows a prompt for removing all site data or the
|
|
* specified list of base domains or hosts, warning the user that this may log
|
|
* them out of websites.
|
|
*
|
|
* @param {mozIDOMWindowProxy} win - a parent DOM window to host the dialog.
|
|
* @param {string[]} [removals] - an array of base domain or host strings that
|
|
* will be removed.
|
|
* @returns {boolean} whether the user confirmed the prompt.
|
|
*/
|
|
promptSiteDataRemoval(win, removals) {
|
|
if (removals) {
|
|
let args = {
|
|
hosts: removals,
|
|
allowed: false,
|
|
};
|
|
let features = "centerscreen,chrome,modal,resizable=no";
|
|
win.browsingContext.topChromeWindow.openDialog(
|
|
"chrome://browser/content/preferences/dialogs/siteDataRemoveSelected.xhtml",
|
|
"",
|
|
features,
|
|
args
|
|
);
|
|
return args.allowed;
|
|
}
|
|
|
|
let brandName = gBrandBundle.GetStringFromName("brandShortName");
|
|
let flags =
|
|
Services.prompt.BUTTON_TITLE_IS_STRING * Services.prompt.BUTTON_POS_0 +
|
|
Services.prompt.BUTTON_TITLE_CANCEL * Services.prompt.BUTTON_POS_1 +
|
|
Services.prompt.BUTTON_POS_0_DEFAULT;
|
|
let title = gStringBundle.GetStringFromName("clearSiteDataPromptTitle");
|
|
let text = gStringBundle.formatStringFromName("clearSiteDataPromptText", [
|
|
brandName,
|
|
]);
|
|
let btn0Label = gStringBundle.GetStringFromName("clearSiteDataNow");
|
|
|
|
let result = Services.prompt.confirmEx(
|
|
win,
|
|
title,
|
|
text,
|
|
flags,
|
|
btn0Label,
|
|
null,
|
|
null,
|
|
null,
|
|
{}
|
|
);
|
|
return result == 0;
|
|
},
|
|
|
|
/**
|
|
* Clears all site data and cache
|
|
*
|
|
* @returns a Promise that resolves when the data is cleared.
|
|
*/
|
|
async removeAll() {
|
|
await this.removeCache();
|
|
return this.removeSiteData();
|
|
},
|
|
|
|
/**
|
|
* Clears all caches.
|
|
*
|
|
* @returns a Promise that resolves when the data is cleared.
|
|
*/
|
|
removeCache() {
|
|
return new Promise(function(resolve) {
|
|
Services.clearData.deleteData(
|
|
Ci.nsIClearDataService.CLEAR_ALL_CACHES,
|
|
resolve
|
|
);
|
|
});
|
|
},
|
|
|
|
/**
|
|
* Clears all site data, but not cache, because the UI offers
|
|
* that functionality separately.
|
|
*
|
|
* @returns a Promise that resolves when the data is cleared.
|
|
*/
|
|
async removeSiteData() {
|
|
await new Promise(function(resolve) {
|
|
Services.clearData.deleteData(
|
|
Ci.nsIClearDataService.CLEAR_COOKIES |
|
|
Ci.nsIClearDataService.CLEAR_DOM_STORAGES |
|
|
Ci.nsIClearDataService.CLEAR_SECURITY_SETTINGS |
|
|
Ci.nsIClearDataService.CLEAR_EME,
|
|
resolve
|
|
);
|
|
});
|
|
|
|
for (let permission of this._getDeletablePermissions()) {
|
|
Services.perms.removePermission(permission);
|
|
}
|
|
|
|
return this.updateSites();
|
|
},
|
|
};
|