blob: 92e128693818c64e5c4fefa1a5d13f17dc462ffd [file] [log] [blame]
[email protected]e7e46732012-01-05 11:45:551// Copyright (c) 2012 The Chromium Authors. All rights reserved.
license.botbf09a502008-08-24 00:55:552// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
initial.commit09911bf2008-07-26 23:55:294
[email protected]a4ff9eae2011-08-01 19:58:165#include "chrome/test/base/testing_profile.h"
initial.commit09911bf2008-07-26 23:55:296
[email protected]a42b5592009-09-03 16:52:237#include "build/build_config.h"
[email protected]dbbad7a2010-08-13 18:18:368
9#include "base/base_paths.h"
[email protected]e3e43d92010-02-26 22:02:3810#include "base/command_line.h"
[email protected]dbbad7a2010-08-13 18:18:3611#include "base/file_util.h"
[email protected]83a7d2eb2010-05-03 21:46:1912#include "base/message_loop_proxy.h"
[email protected]dbbad7a2010-08-13 18:18:3613#include "base/path_service.h"
[email protected]03b9b4e2012-10-22 20:01:5214#include "base/prefs/testing_pref_store.h"
[email protected]8e937c1e2012-06-28 22:57:3015#include "base/run_loop.h"
[email protected]3ea1b182013-02-08 22:38:4116#include "base/strings/string_number_conversions.h"
[email protected]dbbad7a2010-08-13 18:18:3617#include "chrome/browser/autocomplete/autocomplete_classifier.h"
[email protected]a9afddb2009-02-12 17:49:4218#include "chrome/browser/bookmarks/bookmark_model.h"
[email protected]f61f4782012-06-08 21:54:2119#include "chrome/browser/bookmarks/bookmark_model_factory.h"
[email protected]1459fb62011-05-25 19:03:2720#include "chrome/browser/browser_process.h"
[email protected]9d01a6a2010-11-30 12:03:3321#include "chrome/browser/content_settings/host_content_settings_map.h"
[email protected]2f69b382011-02-19 00:34:2522#include "chrome/browser/extensions/extension_service.h"
[email protected]19eb80152011-02-26 00:28:4323#include "chrome/browser/extensions/extension_special_storage_policy.h"
[email protected]31d8f5f22012-04-02 15:22:0824#include "chrome/browser/extensions/extension_system.h"
25#include "chrome/browser/extensions/extension_system_factory.h"
26#include "chrome/browser/extensions/test_extension_system.h"
[email protected]ee2ed42c2011-04-28 22:19:1427#include "chrome/browser/favicon/favicon_service.h"
[email protected]f3d2b312012-08-23 22:27:5928#include "chrome/browser/favicon/favicon_service_factory.h"
[email protected]c476e632011-06-23 11:18:0429#include "chrome/browser/geolocation/chrome_geolocation_permission_context.h"
[email protected]b2cf4522012-10-23 00:11:5730#include "chrome/browser/geolocation/chrome_geolocation_permission_context_factory.h"
[email protected]075ae732009-02-11 23:58:3131#include "chrome/browser/history/history_backend.h"
[email protected]d891f522013-02-08 03:24:4132#include "chrome/browser/history/history_db_task.h"
[email protected]6a2c09f2013-01-25 04:50:0733#include "chrome/browser/history/history_service.h"
[email protected]f61f4782012-06-08 21:54:2134#include "chrome/browser/history/history_service_factory.h"
[email protected]572f40c9b2012-07-06 20:35:3335#include "chrome/browser/history/shortcuts_backend.h"
36#include "chrome/browser/history/shortcuts_backend_factory.h"
[email protected]dbbad7a2010-08-13 18:18:3637#include "chrome/browser/history/top_sites.h"
[email protected]6f96cbcb2011-11-04 02:26:0738#include "chrome/browser/net/proxy_service_factory.h"
[email protected]dbbad7a2010-08-13 18:18:3639#include "chrome/browser/notifications/desktop_notification_service.h"
[email protected]dcb72d52011-04-13 12:36:5340#include "chrome/browser/notifications/desktop_notification_service_factory.h"
[email protected]37858e52010-08-26 00:22:0241#include "chrome/browser/prefs/browser_prefs.h"
[email protected]c753f142013-02-10 13:14:0442#include "chrome/browser/prefs/pref_service_syncable.h"
[email protected]4850a7f2011-03-08 23:36:5943#include "chrome/browser/prerender/prerender_manager.h"
[email protected]5cdcd152011-03-31 22:48:5244#include "chrome/browser/profiles/profile_dependency_manager.h"
[email protected]27ddfed22012-10-30 23:22:4345#include "chrome/browser/profiles/storage_partition_descriptor.h"
[email protected]16bd088b2012-04-03 08:12:1246#include "chrome/browser/search_engines/template_url_fetcher_factory.h"
[email protected]c52b2892012-03-07 11:01:0247#include "chrome/browser/speech/chrome_speech_recognition_preferences.h"
[email protected]810ffba2012-06-12 01:07:4848#include "chrome/browser/webdata/web_data_service.h"
[email protected]d07edd42012-05-14 23:49:4649#include "chrome/browser/webdata/web_data_service_factory.h"
[email protected]a9afddb2009-02-12 17:49:4250#include "chrome/common/chrome_constants.h"
[email protected]432115822011-07-10 15:52:2751#include "chrome/common/chrome_notification_types.h"
[email protected]9e33d7e2011-09-30 16:43:5452#include "chrome/common/chrome_switches.h"
[email protected]dbbad7a2010-08-13 18:18:3653#include "chrome/common/url_constants.h"
[email protected]7bc60682011-07-29 20:55:5954#include "chrome/test/base/bookmark_load_observer.h"
[email protected]18a15ca82012-08-30 00:28:1655#include "chrome/test/base/history_index_restore_observer.h"
[email protected]7688968a2013-02-12 21:45:1356#include "chrome/test/base/testing_pref_service_syncable.h"
[email protected]af44e7fb2011-07-29 18:32:3257#include "chrome/test/base/ui_test_utils.h"
[email protected]75fee372013-03-06 00:42:4458#include "components/user_prefs/user_prefs.h"
[email protected]c38831a12011-10-28 12:44:4959#include "content/public/browser/browser_thread.h"
[email protected]ad50def52011-10-19 23:17:0760#include "content/public/browser/notification_service.h"
[email protected]fb29e6cf2012-07-12 21:27:2061#include "content/public/browser/render_process_host.h"
[email protected]885c0e92012-11-13 20:27:4262#include "content/public/browser/storage_partition.h"
[email protected]08a932d52012-06-03 21:42:1263#include "content/public/test/mock_resource_context.h"
[email protected]a7fe9112012-07-20 02:34:4564#include "content/public/test/test_utils.h"
[email protected]885c0e92012-11-13 20:27:4265#include "extensions/common/constants.h"
[email protected]aa84a7e2012-03-15 21:29:0666#include "net/cookies/cookie_monster.h"
[email protected]812b3a32010-01-08 05:36:0467#include "net/url_request/url_request_context.h"
[email protected]abe2c032011-03-31 18:49:3468#include "net/url_request/url_request_context_getter.h"
[email protected]d2db0292011-01-26 20:23:4469#include "net/url_request/url_request_test_util.h"
[email protected]4772b072010-03-30 17:45:4670#include "testing/gmock/include/gmock/gmock.h"
[email protected]248ce192011-02-10 15:26:3471
[email protected]21d3a882012-05-31 14:41:5572#if defined(ENABLE_CONFIGURATION_POLICY)
73#include "chrome/browser/policy/policy_service_impl.h"
74#else
75#include "chrome/browser/policy/policy_service_stub.h"
76#endif // defined(ENABLE_CONFIGURATION_POLICY)
77
[email protected]6f96cbcb2011-11-04 02:26:0778#if defined(OS_CHROMEOS)
79#include "chrome/browser/chromeos/proxy_config_service_impl.h"
80#endif // defined(OS_CHROMEOS)
81
[email protected]e1acf6f2008-10-27 20:43:3382using base::Time;
[email protected]631bb742011-11-02 11:29:3983using content::BrowserThread;
[email protected]b441a8492012-06-06 14:55:5784using content::DownloadManagerDelegate;
[email protected]3c887412010-04-19 20:30:2385using testing::NiceMock;
[email protected]4772b072010-03-30 17:45:4686using testing::Return;
[email protected]e1acf6f2008-10-27 20:43:3387
[email protected]d364c652008-08-29 19:46:5688namespace {
89
[email protected]0bfc29a2009-04-27 16:15:4490// Task used to make sure history has finished processing a request. Intended
91// for use with BlockUntilHistoryProcessesPendingRequests.
92
[email protected]d891f522013-02-08 03:24:4193class QuittingHistoryDBTask : public history::HistoryDBTask {
[email protected]0bfc29a2009-04-27 16:15:4494 public:
95 QuittingHistoryDBTask() {}
96
97 virtual bool RunOnDBThread(history::HistoryBackend* backend,
[email protected]be9826e62013-02-07 02:00:5898 history::HistoryDatabase* db) OVERRIDE {
[email protected]0bfc29a2009-04-27 16:15:4499 return true;
100 }
101
[email protected]be9826e62013-02-07 02:00:58102 virtual void DoneRunOnMainThread() OVERRIDE {
[email protected]0bfc29a2009-04-27 16:15:44103 MessageLoop::current()->Quit();
104 }
105
106 private:
[email protected]be9826e62013-02-07 02:00:58107 virtual ~QuittingHistoryDBTask() {}
[email protected]7991a232009-11-06 01:55:48108
[email protected]0bfc29a2009-04-27 16:15:44109 DISALLOW_COPY_AND_ASSIGN(QuittingHistoryDBTask);
110};
111
[email protected]aeb53f02011-01-15 00:21:34112class TestExtensionURLRequestContext : public net::URLRequestContext {
[email protected]c10da4b02010-03-25 14:38:32113 public:
114 TestExtensionURLRequestContext() {
115 net::CookieMonster* cookie_monster = new net::CookieMonster(NULL, NULL);
[email protected]885c0e92012-11-13 20:27:42116 const char* schemes[] = {extensions::kExtensionScheme};
[email protected]c10da4b02010-03-25 14:38:32117 cookie_monster->SetCookieableSchemes(schemes, 1);
[email protected]f6c21cb2011-02-16 19:45:41118 set_cookie_store(cookie_monster);
[email protected]c10da4b02010-03-25 14:38:32119 }
[email protected]7b2720b2012-04-25 16:59:11120
[email protected]7b2720b2012-04-25 16:59:11121 virtual ~TestExtensionURLRequestContext() {}
[email protected]c10da4b02010-03-25 14:38:32122};
123
[email protected]abe2c032011-03-31 18:49:34124class TestExtensionURLRequestContextGetter
125 : public net::URLRequestContextGetter {
[email protected]c10da4b02010-03-25 14:38:32126 public:
[email protected]be9826e62013-02-07 02:00:58127 virtual net::URLRequestContext* GetURLRequestContext() OVERRIDE {
[email protected]ef2bf422012-05-11 03:27:09128 if (!context_.get())
129 context_.reset(new TestExtensionURLRequestContext());
[email protected]c10da4b02010-03-25 14:38:32130 return context_.get();
131 }
[email protected]4969b0122012-06-16 01:58:28132 virtual scoped_refptr<base::SingleThreadTaskRunner>
133 GetNetworkTaskRunner() const OVERRIDE {
[email protected]0c7d74f2010-10-11 11:55:26134 return BrowserThread::GetMessageLoopProxyForThread(BrowserThread::IO);
[email protected]83a7d2eb2010-05-03 21:46:19135 }
[email protected]c10da4b02010-03-25 14:38:32136
[email protected]13ed17f82012-04-06 02:27:18137 protected:
138 virtual ~TestExtensionURLRequestContextGetter() {}
139
[email protected]c10da4b02010-03-25 14:38:32140 private:
[email protected]ef2bf422012-05-11 03:27:09141 scoped_ptr<net::URLRequestContext> context_;
[email protected]c10da4b02010-03-25 14:38:32142};
143
[email protected]abc77242012-03-16 04:32:31144ProfileKeyedService* CreateTestDesktopNotificationService(Profile* profile) {
[email protected]29cebbd2012-06-06 21:43:42145#if defined(ENABLE_NOTIFICATIONS)
[email protected]dcb72d52011-04-13 12:36:53146 return new DesktopNotificationService(profile, NULL);
[email protected]29cebbd2012-06-06 21:43:42147#else
148 return NULL;
149#endif
[email protected]dcb72d52011-04-13 12:36:53150}
151
[email protected]d364c652008-08-29 19:46:56152} // namespace
153
[email protected]89dbb1772012-07-17 13:47:25154// static
155#if defined(OS_CHROMEOS)
156// Must be kept in sync with
157// ChromeBrowserMainPartsChromeos::PreEarlyInitialization.
158const char TestingProfile::kTestUserProfileDir[] = "test-user";
159#else
160const char TestingProfile::kTestUserProfileDir[] = "Default";
161#endif
162
[email protected]f25387b2008-08-21 15:20:33163TestingProfile::TestingProfile()
[email protected]ea6f76572008-12-18 00:09:55164 : start_time_(Time::Now()),
[email protected]2fb7dc982010-09-29 12:24:28165 testing_prefs_(NULL),
[email protected]5bb2f522011-03-25 19:04:44166 incognito_(false),
[email protected]074311a2013-02-28 23:14:09167 original_profile_(NULL),
[email protected]5cdcd152011-03-31 22:48:52168 last_session_exited_cleanly_(true),
[email protected]537c1082011-12-02 02:37:17169 profile_dependency_manager_(ProfileDependencyManager::GetInstance()),
170 delegate_(NULL) {
[email protected]5c4c89f2012-08-07 21:09:59171 CreateTempProfileDir();
[email protected]49a25632011-08-31 17:03:48172 profile_path_ = temp_dir_.path();
173
174 Init();
[email protected]537c1082011-12-02 02:37:17175 FinishInit();
[email protected]49a25632011-08-31 17:03:48176}
177
[email protected]152ea302013-02-11 04:08:40178TestingProfile::TestingProfile(const base::FilePath& path)
[email protected]49a25632011-08-31 17:03:48179 : start_time_(Time::Now()),
180 testing_prefs_(NULL),
181 incognito_(false),
[email protected]074311a2013-02-28 23:14:09182 original_profile_(NULL),
[email protected]49a25632011-08-31 17:03:48183 last_session_exited_cleanly_(true),
184 profile_path_(path),
[email protected]537c1082011-12-02 02:37:17185 profile_dependency_manager_(ProfileDependencyManager::GetInstance()),
186 delegate_(NULL) {
[email protected]49a25632011-08-31 17:03:48187 Init();
[email protected]537c1082011-12-02 02:37:17188 FinishInit();
189}
190
[email protected]152ea302013-02-11 04:08:40191TestingProfile::TestingProfile(const base::FilePath& path,
[email protected]537c1082011-12-02 02:37:17192 Delegate* delegate)
193 : start_time_(Time::Now()),
194 testing_prefs_(NULL),
195 incognito_(false),
[email protected]074311a2013-02-28 23:14:09196 original_profile_(NULL),
[email protected]537c1082011-12-02 02:37:17197 last_session_exited_cleanly_(true),
198 profile_path_(path),
199 profile_dependency_manager_(ProfileDependencyManager::GetInstance()),
200 delegate_(delegate) {
201 Init();
202 if (delegate_) {
203 MessageLoop::current()->PostTask(FROM_HERE,
204 base::Bind(&TestingProfile::FinishInit,
205 base::Unretained(this)));
206 } else {
207 FinishInit();
208 }
[email protected]49a25632011-08-31 17:03:48209}
210
[email protected]5c4c89f2012-08-07 21:09:59211TestingProfile::TestingProfile(
[email protected]152ea302013-02-11 04:08:40212 const base::FilePath& path,
[email protected]5c4c89f2012-08-07 21:09:59213 Delegate* delegate,
214 scoped_refptr<ExtensionSpecialStoragePolicy> extension_policy,
[email protected]a0cc9a532013-02-12 02:23:12215 scoped_ptr<PrefServiceSyncable> prefs)
[email protected]5c4c89f2012-08-07 21:09:59216 : start_time_(Time::Now()),
217 prefs_(prefs.release()),
218 testing_prefs_(NULL),
[email protected]a0cc9a532013-02-12 02:23:12219 incognito_(false),
[email protected]074311a2013-02-28 23:14:09220 original_profile_(NULL),
[email protected]5c4c89f2012-08-07 21:09:59221 last_session_exited_cleanly_(true),
222 extension_special_storage_policy_(extension_policy),
[email protected]5c4c89f2012-08-07 21:09:59223 profile_path_(path),
224 profile_dependency_manager_(ProfileDependencyManager::GetInstance()),
225 delegate_(delegate) {
226
227 // If no profile path was supplied, create one.
228 if (profile_path_.empty()) {
229 CreateTempProfileDir();
230 profile_path_ = temp_dir_.path();
231 }
232
233 Init();
234 // If caller supplied a delegate, delay the FinishInit invocation until other
235 // tasks have run.
236 // TODO(atwilson): See if this is still required once we convert the current
237 // users of the constructor that takes a Delegate* param.
238 if (delegate_) {
239 MessageLoop::current()->PostTask(FROM_HERE,
240 base::Bind(&TestingProfile::FinishInit,
241 base::Unretained(this)));
242 } else {
243 FinishInit();
244 }
245}
246
247void TestingProfile::CreateTempProfileDir() {
248 if (!temp_dir_.CreateUniqueTempDir()) {
249 LOG(ERROR) << "Failed to create unique temporary directory.";
250
251 // Fallback logic in case we fail to create unique temporary directory.
[email protected]152ea302013-02-11 04:08:40252 base::FilePath system_tmp_dir;
[email protected]5c4c89f2012-08-07 21:09:59253 bool success = PathService::Get(base::DIR_TEMP, &system_tmp_dir);
254
255 // We're severly screwed if we can't get the system temporary
256 // directory. Die now to avoid writing to the filesystem root
257 // or other bad places.
258 CHECK(success);
259
[email protected]152ea302013-02-11 04:08:40260 base::FilePath fallback_dir(
261 system_tmp_dir.AppendASCII("TestingProfilePath"));
[email protected]5c4c89f2012-08-07 21:09:59262 file_util::Delete(fallback_dir, true);
263 file_util::CreateDirectory(fallback_dir);
264 if (!temp_dir_.Set(fallback_dir)) {
265 // That shouldn't happen, but if it does, try to recover.
266 LOG(ERROR) << "Failed to use a fallback temporary directory.";
267
268 // We're screwed if this fails, see CHECK above.
269 CHECK(temp_dir_.Set(system_tmp_dir));
270 }
271 }
272}
273
[email protected]49a25632011-08-31 17:03:48274void TestingProfile::Init() {
[email protected]75fee372013-03-06 00:42:44275 if (prefs_.get())
276 components::UserPrefs::Set(this, prefs_.get());
277
[email protected]d41e6572012-05-04 20:49:42278 if (!file_util::PathExists(profile_path_))
279 file_util::CreateDirectory(profile_path_);
280
[email protected]bd306722012-07-11 20:43:59281 extensions::ExtensionSystemFactory::GetInstance()->SetTestingFactory(
282 this, extensions::TestExtensionSystem::Build);
[email protected]31d8f5f22012-04-02 15:22:08283
[email protected]49a25632011-08-31 17:03:48284 profile_dependency_manager_->CreateProfileServices(this, true);
285
[email protected]5fd2e842012-03-01 00:29:11286#if defined(ENABLE_NOTIFICATIONS)
[email protected]dcb72d52011-04-13 12:36:53287 // Install profile keyed service factory hooks for dummy/test services
[email protected]7722653b2011-06-03 17:28:22288 DesktopNotificationServiceFactory::GetInstance()->SetTestingFactory(
289 this, CreateTestDesktopNotificationService);
[email protected]5fd2e842012-03-01 00:29:11290#endif
[email protected]537c1082011-12-02 02:37:17291}
[email protected]12463cd2011-07-19 09:40:20292
[email protected]537c1082011-12-02 02:37:17293void TestingProfile::FinishInit() {
[email protected]080adba92011-12-07 19:00:40294 DCHECK(content::NotificationService::current());
[email protected]ad50def52011-10-19 23:17:07295 content::NotificationService::current()->Notify(
[email protected]12463cd2011-07-19 09:40:20296 chrome::NOTIFICATION_PROFILE_CREATED,
[email protected]6c2381d2011-10-19 02:52:53297 content::Source<Profile>(static_cast<Profile*>(this)),
[email protected]ad50def52011-10-19 23:17:07298 content::NotificationService::NoDetails());
[email protected]537c1082011-12-02 02:37:17299
300 if (delegate_)
[email protected]00b33f802012-03-13 07:46:03301 delegate_->OnProfileCreated(this, true, false);
[email protected]ab23dbe2010-08-12 02:10:46302}
303
[email protected]f25387b2008-08-21 15:20:33304TestingProfile::~TestingProfile() {
[email protected]a7c4c032012-07-27 00:36:32305 MaybeSendDestroyedNotification();
[email protected]5cdcd152011-03-31 22:48:52306
307 profile_dependency_manager_->DestroyProfileServices(this);
308
[email protected]35552dc52011-07-12 09:04:38309 if (host_content_settings_map_)
310 host_content_settings_map_->ShutdownOnUIThread();
311
[email protected]809cc4d2010-10-27 15:22:54312 DestroyTopSites();
[email protected]cdba46992011-06-07 11:51:39313
[email protected]cc5bfd42010-11-24 14:44:02314 if (pref_proxy_config_tracker_.get())
315 pref_proxy_config_tracker_->DetachFromPrefService();
[email protected]f25387b2008-08-21 15:20:33316}
initial.commit09911bf2008-07-26 23:55:29317
[email protected]f3d2b312012-08-23 22:27:59318static ProfileKeyedService* BuildFaviconService(Profile* profile) {
319 return new FaviconService(
320 HistoryServiceFactory::GetForProfileWithoutCreating(profile));
321}
322
[email protected]d2879af2010-02-08 16:02:56323void TestingProfile::CreateFaviconService() {
[email protected]f3d2b312012-08-23 22:27:59324 // It is up to the caller to create the history service if one is needed.
325 FaviconServiceFactory::GetInstance()->SetTestingFactory(
326 this, BuildFaviconService);
[email protected]d2879af2010-02-08 16:02:56327}
328
[email protected]a5894fe2012-11-01 14:40:56329static ProfileKeyedService* BuildHistoryService(Profile* profile) {
[email protected]f61f4782012-06-08 21:54:21330 return new HistoryService(profile);
331}
332
[email protected]d486a0852009-11-02 21:40:00333void TestingProfile::CreateHistoryService(bool delete_file, bool no_db) {
[email protected]809cc4d2010-10-27 15:22:54334 DestroyHistoryService();
[email protected]f25387b2008-08-21 15:20:33335 if (delete_file) {
[email protected]152ea302013-02-11 04:08:40336 base::FilePath path = GetPath();
[email protected]f7011fcb2009-01-28 21:54:32337 path = path.Append(chrome::kHistoryFilename);
[email protected]f25387b2008-08-21 15:20:33338 file_util::Delete(path, false);
339 }
[email protected]7019bb6d2012-08-23 09:09:48340 // This will create and init the history service.
[email protected]f61f4782012-06-08 21:54:21341 HistoryService* history_service = static_cast<HistoryService*>(
342 HistoryServiceFactory::GetInstance()->SetTestingFactoryAndUse(
[email protected]a5894fe2012-11-01 14:40:56343 this, BuildHistoryService));
[email protected]7019bb6d2012-08-23 09:09:48344 if (!history_service->Init(this->GetPath(),
345 BookmarkModelFactory::GetForProfile(this),
346 no_db)) {
[email protected]f61f4782012-06-08 21:54:21347 HistoryServiceFactory::GetInstance()->SetTestingFactoryAndUse(this, NULL);
[email protected]7019bb6d2012-08-23 09:09:48348 }
initial.commit09911bf2008-07-26 23:55:29349}
350
351void TestingProfile::DestroyHistoryService() {
[email protected]a5894fe2012-11-01 14:40:56352 HistoryService* history_service =
[email protected]6c537042012-07-13 00:59:02353 HistoryServiceFactory::GetForProfileWithoutCreating(this);
[email protected]a5894fe2012-11-01 14:40:56354 if (!history_service)
initial.commit09911bf2008-07-26 23:55:29355 return;
356
[email protected]f61f4782012-06-08 21:54:21357 history_service->NotifyRenderProcessHostDestruction(0);
358 history_service->SetOnBackendDestroyTask(MessageLoop::QuitClosure());
359 history_service->Cleanup();
360 HistoryServiceFactory::ShutdownForProfile(this);
initial.commit09911bf2008-07-26 23:55:29361
362 // Wait for the backend class to terminate before deleting the files and
363 // moving to the next test. Note: if this never terminates, somebody is
364 // probably leaking a reference to the history backend, so it never calls
365 // our destroy task.
366 MessageLoop::current()->Run();
367
initial.commit09911bf2008-07-26 23:55:29368 // Make sure we don't have any event pending that could disrupt the next
369 // test.
[email protected]1cb1a242011-12-10 18:36:51370 MessageLoop::current()->PostTask(FROM_HERE, MessageLoop::QuitClosure());
initial.commit09911bf2008-07-26 23:55:29371 MessageLoop::current()->Run();
372}
[email protected]4d0cd7ce2008-08-11 16:40:57373
[email protected]809cc4d2010-10-27 15:22:54374void TestingProfile::CreateTopSites() {
375 DestroyTopSites();
376 top_sites_ = new history::TopSites(this);
[email protected]152ea302013-02-11 04:08:40377 base::FilePath file_name = GetPath().Append(chrome::kTopSitesFilename);
[email protected]809cc4d2010-10-27 15:22:54378 top_sites_->Init(file_name);
379}
380
381void TestingProfile::DestroyTopSites() {
382 if (top_sites_.get()) {
383 top_sites_->Shutdown();
384 top_sites_ = NULL;
385 // TopSites::Shutdown schedules some tasks (from TopSitesBackend) that need
386 // to be run to properly shutdown. Run all pending tasks now. This is
387 // normally handled by browser_process shutdown.
388 if (MessageLoop::current())
[email protected]d8996a012012-11-19 00:06:08389 MessageLoop::current()->RunUntilIdle();
[email protected]809cc4d2010-10-27 15:22:54390 }
391}
392
[email protected]f61f4782012-06-08 21:54:21393static ProfileKeyedService* BuildBookmarkModel(Profile* profile) {
394 BookmarkModel* bookmark_model = new BookmarkModel(profile);
[email protected]afecfb72013-04-18 17:17:33395 bookmark_model->Load(profile->GetIOTaskRunner());
[email protected]f61f4782012-06-08 21:54:21396 return bookmark_model;
397}
398
399
[email protected]d8e41ed2008-09-11 15:22:32400void TestingProfile::CreateBookmarkModel(bool delete_file) {
[email protected]90ef13132008-08-27 03:27:46401 if (delete_file) {
[email protected]8a39b472013-04-04 17:07:42402 base::FilePath path = GetPath().Append(chrome::kBookmarksFileName);
[email protected]90ef13132008-08-27 03:27:46403 file_util::Delete(path, false);
404 }
[email protected]f61f4782012-06-08 21:54:21405 // This will create a bookmark model.
[email protected]8a39b472013-04-04 17:07:42406 BookmarkModel* bookmark_service = static_cast<BookmarkModel*>(
407 BookmarkModelFactory::GetInstance()->SetTestingFactoryAndUse(
408 this, BuildBookmarkModel));
[email protected]f61f4782012-06-08 21:54:21409
410 HistoryService* history_service =
[email protected]a5894fe2012-11-01 14:40:56411 HistoryServiceFactory::GetForProfileWithoutCreating(this);
[email protected]f61f4782012-06-08 21:54:21412 if (history_service) {
[email protected]8a39b472013-04-04 17:07:42413 history_service->history_backend_->bookmark_service_ = bookmark_service;
[email protected]f61f4782012-06-08 21:54:21414 history_service->history_backend_->expirer_.bookmark_service_ =
415 bookmark_service;
[email protected]90ef13132008-08-27 03:27:46416 }
[email protected]4d0cd7ce2008-08-11 16:40:57417}
[email protected]d2c017a2008-08-13 21:51:45418
[email protected]78f1d9b2013-03-20 09:43:18419static ProfileKeyedService* BuildWebDataService(
[email protected]d07edd42012-05-14 23:49:46420 Profile* profile) {
[email protected]78f1d9b2013-03-20 09:43:18421 return new WebDataServiceWrapper(profile);
[email protected]d07edd42012-05-14 23:49:46422}
[email protected]2609bc12010-01-24 08:32:55423
[email protected]d07edd42012-05-14 23:49:46424void TestingProfile::CreateWebDataService() {
[email protected]a5c65292012-05-25 00:50:01425 WebDataServiceFactory::GetInstance()->SetTestingFactory(
[email protected]d07edd42012-05-14 23:49:46426 this, BuildWebDataService);
[email protected]2609bc12010-01-24 08:32:55427}
428
[email protected]18a15ca82012-08-30 00:28:16429void TestingProfile::BlockUntilHistoryIndexIsRefreshed() {
430 // Only get the history service if it actually exists since the caller of the
431 // test should explicitly call CreateHistoryService to build it.
432 HistoryService* history_service =
433 HistoryServiceFactory::GetForProfileWithoutCreating(this);
434 DCHECK(history_service);
435 history::InMemoryURLIndex* index = history_service->InMemoryIndex();
436 if (!index || index->restored())
437 return;
438 base::RunLoop run_loop;
439 HistoryIndexRestoreObserver observer(
440 content::GetQuitTaskForRunLoop(&run_loop));
441 index->set_restore_cache_observer(&observer);
442 run_loop.Run();
443 index->set_restore_cache_observer(NULL);
444 DCHECK(index->restored());
445}
446
[email protected]120abf132011-09-27 21:38:06447// TODO(phajdan.jr): Doesn't this hang if Top Sites are already loaded?
[email protected]809cc4d2010-10-27 15:22:54448void TestingProfile::BlockUntilTopSitesLoaded() {
[email protected]a7fe9112012-07-20 02:34:45449 content::WindowedNotificationObserver top_sites_loaded_observer(
[email protected]120abf132011-09-27 21:38:06450 chrome::NOTIFICATION_TOP_SITES_LOADED,
[email protected]ad50def52011-10-19 23:17:07451 content::NotificationService::AllSources());
[email protected]d7f7f752012-08-08 02:02:55452 if (!HistoryServiceFactory::GetForProfile(this, Profile::EXPLICIT_ACCESS))
[email protected]809cc4d2010-10-27 15:22:54453 GetTopSites()->HistoryLoaded();
[email protected]120abf132011-09-27 21:38:06454 top_sites_loaded_observer.Wait();
[email protected]809cc4d2010-10-27 15:22:54455}
456
[email protected]152ea302013-02-11 04:08:40457base::FilePath TestingProfile::GetPath() {
[email protected]49a25632011-08-31 17:03:48458 return profile_path_;
[email protected]f9dec9482010-08-20 20:42:19459}
460
[email protected]0de615a2012-11-08 04:40:59461scoped_refptr<base::SequencedTaskRunner> TestingProfile::GetIOTaskRunner() {
462 return MessageLoop::current()->message_loop_proxy();
463}
464
[email protected]5b199522012-12-22 17:24:44465TestingPrefServiceSyncable* TestingProfile::GetTestingPrefService() {
[email protected]2fb7dc982010-09-29 12:24:28466 if (!prefs_.get())
467 CreateTestingPrefService();
468 DCHECK(testing_prefs_);
469 return testing_prefs_;
[email protected]dbbad7a2010-08-13 18:18:36470}
471
[email protected]8e5c89a2011-06-07 18:13:33472TestingProfile* TestingProfile::AsTestingProfile() {
473 return this;
474}
475
[email protected]29d70252011-04-28 02:16:58476std::string TestingProfile::GetProfileName() {
477 return std::string("testing_profile");
478}
479
[email protected]27d6e852012-03-02 21:31:32480bool TestingProfile::IsOffTheRecord() const {
[email protected]5bb2f522011-03-25 19:04:44481 return incognito_;
[email protected]fadc607b62011-02-07 17:55:50482}
483
[email protected]93dba942011-02-23 22:45:01484void TestingProfile::SetOffTheRecordProfile(Profile* profile) {
[email protected]5bb2f522011-03-25 19:04:44485 incognito_profile_.reset(profile);
[email protected]93dba942011-02-23 22:45:01486}
487
[email protected]074311a2013-02-28 23:14:09488void TestingProfile::SetOriginalProfile(Profile* profile) {
489 original_profile_ = profile;
490}
491
[email protected]fadc607b62011-02-07 17:55:50492Profile* TestingProfile::GetOffTheRecordProfile() {
[email protected]5bb2f522011-03-25 19:04:44493 return incognito_profile_.get();
[email protected]fadc607b62011-02-07 17:55:50494}
495
496bool TestingProfile::HasOffTheRecordProfile() {
[email protected]5bb2f522011-03-25 19:04:44497 return incognito_profile_.get() != NULL;
[email protected]fadc607b62011-02-07 17:55:50498}
499
500Profile* TestingProfile::GetOriginalProfile() {
[email protected]074311a2013-02-28 23:14:09501 if (original_profile_)
502 return original_profile_;
[email protected]fadc607b62011-02-07 17:55:50503 return this;
504}
505
[email protected]eaa7dd182010-12-14 11:09:00506ExtensionService* TestingProfile::GetExtensionService() {
[email protected]bd306722012-07-11 20:43:59507 return extensions::ExtensionSystem::Get(this)->extension_service();
[email protected]2fb7dc982010-09-29 12:24:28508}
509
[email protected]2261e7b72011-07-12 13:43:55510void TestingProfile::SetExtensionSpecialStoragePolicy(
511 ExtensionSpecialStoragePolicy* extension_special_storage_policy) {
512 extension_special_storage_policy_ = extension_special_storage_policy;
513}
514
[email protected]19eb80152011-02-26 00:28:43515ExtensionSpecialStoragePolicy*
516TestingProfile::GetExtensionSpecialStoragePolicy() {
[email protected]cdba46992011-06-07 11:51:39517 if (!extension_special_storage_policy_.get())
[email protected]7c5048c2011-08-19 17:07:05518 extension_special_storage_policy_ = new ExtensionSpecialStoragePolicy(NULL);
[email protected]cdba46992011-06-07 11:51:39519 return extension_special_storage_policy_.get();
[email protected]19eb80152011-02-26 00:28:43520}
521
[email protected]dbbad7a2010-08-13 18:18:36522net::CookieMonster* TestingProfile::GetCookieMonster() {
523 if (!GetRequestContext())
524 return NULL;
[email protected]277ec262011-03-30 21:09:40525 return GetRequestContext()->GetURLRequestContext()->cookie_store()->
526 GetCookieMonster();
[email protected]dbbad7a2010-08-13 18:18:36527}
528
[email protected]3b19e8e2012-10-17 19:15:49529policy::ManagedModePolicyProvider*
530TestingProfile::GetManagedModePolicyProvider() {
531 return NULL;
532}
533
[email protected]21d3a882012-05-31 14:41:55534policy::PolicyService* TestingProfile::GetPolicyService() {
535 if (!policy_service_.get()) {
536#if defined(ENABLE_CONFIGURATION_POLICY)
537 policy::PolicyServiceImpl::Providers providers;
538 policy_service_.reset(new policy::PolicyServiceImpl(providers));
539#else
540 policy_service_.reset(new policy::PolicyServiceStub());
541#endif
542 }
543 return policy_service_.get();
544}
545
[email protected]2fb7dc982010-09-29 12:24:28546void TestingProfile::CreateTestingPrefService() {
547 DCHECK(!prefs_.get());
[email protected]5b199522012-12-22 17:24:44548 testing_prefs_ = new TestingPrefServiceSyncable();
[email protected]2fb7dc982010-09-29 12:24:28549 prefs_.reset(testing_prefs_);
[email protected]75fee372013-03-06 00:42:44550 components::UserPrefs::Set(this, prefs_.get());
[email protected]5879cef2013-03-02 17:02:25551 chrome::RegisterUserPrefs(testing_prefs_->registry());
[email protected]2fb7dc982010-09-29 12:24:28552}
553
[email protected]c753f142013-02-10 13:14:04554PrefService* TestingProfile::GetPrefs() {
[email protected]dbbad7a2010-08-13 18:18:36555 if (!prefs_.get()) {
[email protected]2fb7dc982010-09-29 12:24:28556 CreateTestingPrefService();
[email protected]dbbad7a2010-08-13 18:18:36557 }
558 return prefs_.get();
559}
560
561history::TopSites* TestingProfile::GetTopSites() {
[email protected]809cc4d2010-10-27 15:22:54562 return top_sites_.get();
[email protected]dbbad7a2010-08-13 18:18:36563}
564
[email protected]fadc607b62011-02-07 17:55:50565history::TopSites* TestingProfile::GetTopSitesWithoutCreating() {
566 return top_sites_.get();
567}
568
[email protected]b441a8492012-06-06 14:55:57569DownloadManagerDelegate* TestingProfile::GetDownloadManagerDelegate() {
[email protected]fadc607b62011-02-07 17:55:50570 return NULL;
571}
572
[email protected]abe2c032011-03-31 18:49:34573net::URLRequestContextGetter* TestingProfile::GetRequestContext() {
[email protected]812b3a32010-01-08 05:36:04574 return request_context_.get();
575}
576
[email protected]6bd30072013-02-08 18:17:11577net::URLRequestContextGetter* TestingProfile::CreateRequestContext(
[email protected]672c8c12013-03-07 12:30:06578 content::ProtocolHandlerMap* protocol_handlers) {
[email protected]6bd30072013-02-08 18:17:11579 return request_context_.get();
580}
581
[email protected]da5683db2011-04-23 17:12:21582net::URLRequestContextGetter* TestingProfile::GetRequestContextForRenderProcess(
583 int renderer_child_id) {
[email protected]fb29e6cf2012-07-12 21:27:20584 content::RenderProcessHost* rph = content::RenderProcessHost::FromID(
585 renderer_child_id);
[email protected]1bc28312012-11-08 08:31:53586 return rph->GetStoragePartition()->GetURLRequestContext();
[email protected]d9696672011-03-15 22:45:09587}
588
[email protected]812b3a32010-01-08 05:36:04589void TestingProfile::CreateRequestContext() {
590 if (!request_context_)
[email protected]44738602012-03-02 22:56:01591 request_context_ =
[email protected]2086a3d2012-11-13 17:49:20592 new net::TestURLRequestContextGetter(
[email protected]44738602012-03-02 22:56:01593 BrowserThread::GetMessageLoopProxyForThread(BrowserThread::IO));
[email protected]812b3a32010-01-08 05:36:04594}
595
[email protected]7c893202010-10-07 20:18:02596void TestingProfile::ResetRequestContext() {
[email protected]3931fd82012-03-12 21:18:48597 // Any objects holding live URLFetchers should be deleted before the request
598 // context is shut down.
[email protected]16bd088b2012-04-03 08:12:12599 TemplateURLFetcherFactory::ShutdownForProfile(this);
[email protected]3931fd82012-03-12 21:18:48600
[email protected]7c893202010-10-07 20:18:02601 request_context_ = NULL;
602}
603
[email protected]10705a7b2012-08-21 19:07:08604net::URLRequestContextGetter* TestingProfile::GetMediaRequestContext() {
605 return NULL;
606}
607
608net::URLRequestContextGetter*
609TestingProfile::GetMediaRequestContextForRenderProcess(
610 int renderer_child_id) {
[email protected]fadc607b62011-02-07 17:55:50611 return NULL;
612}
613
[email protected]10eb28162012-09-18 03:04:09614net::URLRequestContextGetter*
615TestingProfile::GetMediaRequestContextForStoragePartition(
[email protected]152ea302013-02-11 04:08:40616 const base::FilePath& partition_path,
[email protected]27ddfed22012-10-30 23:22:43617 bool in_memory) {
[email protected]10eb28162012-09-18 03:04:09618 return NULL;
619}
620
[email protected]abe2c032011-03-31 18:49:34621net::URLRequestContextGetter* TestingProfile::GetRequestContextForExtensions() {
[email protected]c10da4b02010-03-25 14:38:32622 if (!extensions_request_context_)
[email protected]00dea9582012-05-09 15:20:05623 extensions_request_context_ = new TestExtensionURLRequestContextGetter();
[email protected]c10da4b02010-03-25 14:38:32624 return extensions_request_context_.get();
625}
626
[email protected]fadc607b62011-02-07 17:55:50627net::SSLConfigService* TestingProfile::GetSSLConfigService() {
[email protected]dc6655b2012-12-14 05:58:24628 if (!GetRequestContext())
629 return NULL;
630 return GetRequestContext()->GetURLRequestContext()->ssl_config_service();
[email protected]fadc607b62011-02-07 17:55:50631}
632
[email protected]10eb28162012-09-18 03:04:09633net::URLRequestContextGetter*
[email protected]6bd30072013-02-08 18:17:11634TestingProfile::CreateRequestContextForStoragePartition(
[email protected]152ea302013-02-11 04:08:40635 const base::FilePath& partition_path,
[email protected]6bd30072013-02-08 18:17:11636 bool in_memory,
[email protected]672c8c12013-03-07 12:30:06637 content::ProtocolHandlerMap* protocol_handlers) {
[email protected]10eb28162012-09-18 03:04:09638 // We don't test storage partitions here yet, so returning the same dummy
[email protected]d9696672011-03-15 22:45:09639 // context is sufficient for now.
640 return GetRequestContext();
641}
642
[email protected]df02aca2012-02-09 21:03:20643content::ResourceContext* TestingProfile::GetResourceContext() {
[email protected]314c3e22012-02-21 03:57:42644 if (!resource_context_.get())
645 resource_context_.reset(new content::MockResourceContext());
646 return resource_context_.get();
[email protected]e89b77d2011-04-15 18:58:10647}
648
[email protected]dbbad7a2010-08-13 18:18:36649HostContentSettingsMap* TestingProfile::GetHostContentSettingsMap() {
[email protected]35552dc52011-07-12 09:04:38650 if (!host_content_settings_map_.get()) {
[email protected]646c29cb62012-06-18 14:31:05651 host_content_settings_map_ = new HostContentSettingsMap(GetPrefs(), false);
[email protected]701550ad2012-09-06 23:43:29652#if defined(ENABLE_EXTENSIONS)
[email protected]646c29cb62012-06-18 14:31:05653 ExtensionService* extension_service = GetExtensionService();
654 if (extension_service)
655 host_content_settings_map_->RegisterExtensionService(extension_service);
[email protected]701550ad2012-09-06 23:43:29656#endif
[email protected]35552dc52011-07-12 09:04:38657 }
[email protected]dbbad7a2010-08-13 18:18:36658 return host_content_settings_map_.get();
659}
660
[email protected]810ddc52012-01-24 01:00:35661content::GeolocationPermissionContext*
[email protected]dbbad7a2010-08-13 18:18:36662TestingProfile::GetGeolocationPermissionContext() {
[email protected]a877a7d2013-01-08 13:40:59663 return ChromeGeolocationPermissionContextFactory::GetForProfile(this);
[email protected]dbbad7a2010-08-13 18:18:36664}
665
[email protected]c52b2892012-03-07 11:01:02666content::SpeechRecognitionPreferences*
667 TestingProfile::GetSpeechRecognitionPreferences() {
[email protected]3297132a2012-02-21 23:27:59668#if defined(ENABLE_INPUT_SPEECH)
[email protected]750e9572012-06-06 15:21:24669 return ChromeSpeechRecognitionPreferences::GetForProfile(this);
[email protected]3297132a2012-02-21 23:27:59670#else
671 return NULL;
672#endif
[email protected]8238dd62011-09-29 15:13:01673}
674
[email protected]fadc607b62011-02-07 17:55:50675std::wstring TestingProfile::GetName() {
676 return std::wstring();
677}
678
679std::wstring TestingProfile::GetID() {
680 return id_;
681}
682
683void TestingProfile::SetID(const std::wstring& id) {
684 id_ = id;
685}
686
[email protected]fadc607b62011-02-07 17:55:50687bool TestingProfile::IsSameProfile(Profile *p) {
688 return this == p;
689}
690
691base::Time TestingProfile::GetStartTime() const {
692 return start_time_;
693}
694
[email protected]152ea302013-02-11 04:08:40695base::FilePath TestingProfile::last_selected_directory() {
[email protected]fadc607b62011-02-07 17:55:50696 return last_selected_directory_;
697}
698
[email protected]152ea302013-02-11 04:08:40699void TestingProfile::set_last_selected_directory(const base::FilePath& path) {
[email protected]fadc607b62011-02-07 17:55:50700 last_selected_directory_ = path;
701}
702
[email protected]cc5bfd42010-11-24 14:44:02703PrefProxyConfigTracker* TestingProfile::GetProxyConfigTracker() {
[email protected]6f96cbcb2011-11-04 02:26:07704 if (!pref_proxy_config_tracker_.get()) {
705 pref_proxy_config_tracker_.reset(
706 ProxyServiceFactory::CreatePrefProxyConfigTracker(GetPrefs()));
707 }
708 return pref_proxy_config_tracker_.get();
[email protected]cc5bfd42010-11-24 14:44:02709}
710
[email protected]0bfc29a2009-04-27 16:15:44711void TestingProfile::BlockUntilHistoryProcessesPendingRequests() {
[email protected]a5894fe2012-11-01 14:40:56712 HistoryService* history_service =
[email protected]6c537042012-07-13 00:59:02713 HistoryServiceFactory::GetForProfile(this, Profile::EXPLICIT_ACCESS);
[email protected]a5894fe2012-11-01 14:40:56714 DCHECK(history_service);
[email protected]0bfc29a2009-04-27 16:15:44715 DCHECK(MessageLoop::current());
716
717 CancelableRequestConsumer consumer;
[email protected]f61f4782012-06-08 21:54:21718 history_service->ScheduleDBTask(new QuittingHistoryDBTask(), &consumer);
[email protected]0bfc29a2009-04-27 16:15:44719 MessageLoop::current()->Run();
720}
[email protected]345a8b72009-09-29 09:11:44721
[email protected]8382d8c2011-09-15 03:43:17722chrome_browser_net::Predictor* TestingProfile::GetNetworkPredictor() {
723 return NULL;
724}
725
[email protected]e0e1fc22012-11-05 20:25:36726void TestingProfile::ClearNetworkingHistorySince(
727 base::Time time,
728 const base::Closure& completion) {
729 if (!completion.is_null()) {
730 BrowserThread::PostTask(BrowserThread::UI, FROM_HERE, completion);
731 }
[email protected]02896a82011-09-21 18:54:32732}
733
[email protected]671f9c62011-10-28 19:22:07734GURL TestingProfile::GetHomePage() {
735 return GURL(chrome::kChromeUINewTabURL);
736}
737
[email protected]c753f142013-02-10 13:14:04738PrefService* TestingProfile::GetOffTheRecordPrefs() {
[email protected]fadc607b62011-02-07 17:55:50739 return NULL;
740}
741
[email protected]36fb2c7c2011-04-04 15:49:08742quota::SpecialStoragePolicy* TestingProfile::GetSpecialStoragePolicy() {
743 return GetExtensionSpecialStoragePolicy();
744}
745
[email protected]1bee6ed2012-03-14 06:46:36746bool TestingProfile::WasCreatedByVersionOrLater(const std::string& version) {
747 return true;
748}
[email protected]ef92e172012-04-25 19:40:41749
[email protected]6c0ca7fc2012-10-05 16:27:22750Profile::ExitType TestingProfile::GetLastSessionExitType() {
751 return last_session_exited_cleanly_ ? EXIT_NORMAL : EXIT_CRASHED;
[email protected]2ca1ea662012-10-04 02:26:36752}
753
[email protected]5c4c89f2012-08-07 21:09:59754TestingProfile::Builder::Builder()
755 : build_called_(false),
[email protected]a0cc9a532013-02-12 02:23:12756 delegate_(NULL) {
[email protected]5c4c89f2012-08-07 21:09:59757}
758
759TestingProfile::Builder::~Builder() {
760}
761
[email protected]152ea302013-02-11 04:08:40762void TestingProfile::Builder::SetPath(const base::FilePath& path) {
[email protected]5c4c89f2012-08-07 21:09:59763 path_ = path;
764}
765
766void TestingProfile::Builder::SetDelegate(Delegate* delegate) {
767 delegate_ = delegate;
768}
769
770void TestingProfile::Builder::SetExtensionSpecialStoragePolicy(
771 scoped_refptr<ExtensionSpecialStoragePolicy> policy) {
772 extension_policy_ = policy;
773}
774
[email protected]5b199522012-12-22 17:24:44775void TestingProfile::Builder::SetPrefService(
776 scoped_ptr<PrefServiceSyncable> prefs) {
[email protected]5c4c89f2012-08-07 21:09:59777 pref_service_ = prefs.Pass();
778}
779
[email protected]5c4c89f2012-08-07 21:09:59780scoped_ptr<TestingProfile> TestingProfile::Builder::Build() {
781 DCHECK(!build_called_);
782 build_called_ = true;
783 return scoped_ptr<TestingProfile>(new TestingProfile(
784 path_,
785 delegate_,
786 extension_policy_,
[email protected]a0cc9a532013-02-12 02:23:12787 pref_service_.Pass()));
[email protected]5c4c89f2012-08-07 21:09:59788}