blob: 16a93f443deadd4ea02d46965b868036d08bc11f [file] [log] [blame]
// Copyright (c) 2006-2008 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "chrome/browser/profile.h"
#include "base/command_line.h"
#include "base/file_path.h"
#include "base/file_util.h"
#include "base/path_service.h"
#include "base/scoped_ptr.h"
#include "base/string_util.h"
#include "chrome/browser/bookmarks/bookmark_model.h"
#include "chrome/browser/browser_list.h"
#include "chrome/browser/browser_process.h"
#include "chrome/browser/browser_theme_provider.h"
#include "chrome/browser/download/download_manager.h"
#include "chrome/browser/extensions/extension_process_manager.h"
#include "chrome/browser/extensions/extensions_service.h"
#include "chrome/browser/extensions/user_script_master.h"
#include "chrome/browser/history/history.h"
#include "chrome/browser/in_process_webkit/webkit_context.h"
#include "chrome/browser/net/chrome_url_request_context.h"
#include "chrome/browser/password_manager/password_store_default.h"
#include "chrome/browser/privacy_blacklist/blacklist.h"
#include "chrome/browser/profile_manager.h"
#include "chrome/browser/renderer_host/render_process_host.h"
#include "chrome/browser/search_engines/template_url_fetcher.h"
#include "chrome/browser/search_engines/template_url_model.h"
#include "chrome/browser/sessions/session_service.h"
#include "chrome/browser/sessions/tab_restore_service.h"
#include "chrome/browser/spellchecker.h"
#include "chrome/browser/ssl/ssl_host_state.h"
#include "chrome/browser/thumbnail_store.h"
#include "chrome/browser/visitedlink_master.h"
#include "chrome/browser/visitedlink_event_listener.h"
#include "chrome/browser/webdata/web_data_service.h"
#include "chrome/common/chrome_constants.h"
#include "chrome/common/chrome_paths.h"
#include "chrome/common/chrome_switches.h"
#include "chrome/common/extensions/extension_error_reporter.h"
#include "chrome/common/net/cookie_monster_sqlite.h"
#include "chrome/common/notification_service.h"
#include "chrome/common/pref_names.h"
#include "chrome/common/render_messages.h"
#include "grit/locale_settings.h"
#include "net/base/force_tls_state.h"
#if defined(OS_LINUX)
#include "chrome/browser/gtk/gtk_theme_provider.h"
#endif
using base::Time;
using base::TimeDelta;
namespace {
// Delay, in milliseconds, before we explicitly create the SessionService.
static const int kCreateSessionServiceDelayMS = 500;
enum ContextType {
kNormalContext,
kMediaContext
};
// Gets the cache parameters from the command line. |type| is the type of
// request context that we need, |cache_path| will be set to the user provided
// path, or will not be touched if there is not an argument. |max_size| will
// be the user provided value or zero by default.
void GetCacheParameters(ContextType type, FilePath* cache_path,
int* max_size) {
DCHECK(cache_path);
DCHECK(max_size);
// Override the cache location if specified by the user.
std::wstring user_path(CommandLine::ForCurrentProcess()->GetSwitchValue(
switches::kDiskCacheDir));
if (!user_path.empty()) {
*cache_path = FilePath::FromWStringHack(user_path);
}
const wchar_t* arg = kNormalContext == type ? switches::kDiskCacheSize :
switches::kMediaCacheSize;
std::string value =
WideToASCII(CommandLine::ForCurrentProcess()->GetSwitchValue(arg));
// By default we let the cache determine the right size.
*max_size = 0;
if (!StringToInt(value, max_size)) {
*max_size = 0;
} else if (max_size < 0) {
*max_size = 0;
}
}
} // namespace
// A pointer to the request context for the default profile. See comments on
// Profile::GetDefaultRequestContext.
URLRequestContext* Profile::default_request_context_;
static void CleanupRequestContext(ChromeURLRequestContext* context) {
if (context) {
context->CleanupOnUIThread();
// Clean up request context on IO thread.
g_browser_process->io_thread()->message_loop()->ReleaseSoon(FROM_HERE,
context);
}
}
// static
void Profile::RegisterUserPrefs(PrefService* prefs) {
prefs->RegisterBooleanPref(prefs::kSearchSuggestEnabled, true);
prefs->RegisterBooleanPref(prefs::kSessionExitedCleanly, true);
prefs->RegisterBooleanPref(prefs::kSafeBrowsingEnabled, true);
// TODO(estade): IDS_SPELLCHECK_DICTIONARY should be an ASCII string.
prefs->RegisterLocalizedStringPref(prefs::kSpellCheckDictionary,
IDS_SPELLCHECK_DICTIONARY);
prefs->RegisterBooleanPref(prefs::kEnableSpellCheck, true);
prefs->RegisterBooleanPref(prefs::kEnableAutoSpellCorrect, true);
prefs->RegisterBooleanPref(prefs::kEnableUserScripts, false);
#if defined(OS_LINUX)
prefs->RegisterBooleanPref(prefs::kUsesSystemTheme, false);
#endif
prefs->RegisterStringPref(prefs::kCurrentThemeID, L"");
prefs->RegisterDictionaryPref(prefs::kCurrentThemeImages);
prefs->RegisterDictionaryPref(prefs::kCurrentThemeColors);
prefs->RegisterDictionaryPref(prefs::kCurrentThemeTints);
prefs->RegisterDictionaryPref(prefs::kCurrentThemeDisplayProperties);
prefs->RegisterBooleanPref(prefs::kEnableExtensions, false);
}
// static
Profile* Profile::CreateProfile(const FilePath& path) {
return new ProfileImpl(path);
}
// static
URLRequestContext* Profile::GetDefaultRequestContext() {
return default_request_context_;
}
#if defined(OS_LINUX)
// Temporarily disabled while we figure some stuff out.
// http://code.google.com/p/chromium/issues/detail?id=12351
// #include "chrome/browser/password_manager/password_store_gnome.h"
// #include "chrome/browser/password_manager/password_store_kwallet.h"
#elif defined(OS_WIN)
#include "chrome/browser/password_manager/password_store_win.h"
#elif defined(OS_MACOSX)
#include "chrome/browser/keychain_mac.h"
#include "chrome/browser/password_manager/login_database_mac.h"
#include "chrome/browser/password_manager/password_store_mac.h"
#endif
////////////////////////////////////////////////////////////////////////////////
//
// OffTheRecordProfileImpl is a profile subclass that wraps an existing profile
// to make it suitable for the off the record mode.
//
////////////////////////////////////////////////////////////////////////////////
class OffTheRecordProfileImpl : public Profile,
public NotificationObserver {
public:
explicit OffTheRecordProfileImpl(Profile* real_profile)
: profile_(real_profile),
extensions_request_context_(NULL),
start_time_(Time::Now()) {
request_context_ = ChromeURLRequestContext::CreateOffTheRecord(this);
request_context_->AddRef();
// Register for browser close notifications so we can detect when the last
// off-the-record window is closed, in which case we can clean our states
// (cookies, downloads...).
registrar_.Add(this, NotificationType::BROWSER_CLOSED,
NotificationService::AllSources());
}
virtual ~OffTheRecordProfileImpl() {
CleanupRequestContext(request_context_);
CleanupRequestContext(extensions_request_context_);
}
virtual FilePath GetPath() { return profile_->GetPath(); }
virtual bool IsOffTheRecord() {
return true;
}
virtual Profile* GetOffTheRecordProfile() {
return this;
}
virtual void DestroyOffTheRecordProfile() {
// Suicide is bad!
NOTREACHED();
}
virtual Profile* GetOriginalProfile() {
return profile_;
}
virtual VisitedLinkMaster* GetVisitedLinkMaster() {
// We don't provide access to the VisitedLinkMaster when we're OffTheRecord
// because we don't want to leak the sites that the user has visited before.
return NULL;
}
virtual ExtensionsService* GetExtensionsService() {
return NULL;
}
virtual UserScriptMaster* GetUserScriptMaster() {
return profile_->GetUserScriptMaster();
}
virtual ExtensionProcessManager* GetExtensionProcessManager() {
return NULL;
}
virtual SSLHostState* GetSSLHostState() {
if (!ssl_host_state_.get())
ssl_host_state_.reset(new SSLHostState());
DCHECK(ssl_host_state_->CalledOnValidThread());
return ssl_host_state_.get();
}
virtual net::ForceTLSState* GetForceTLSState() {
if (!force_tls_state_.get())
force_tls_state_.reset(new net::ForceTLSState());
return force_tls_state_.get();
}
virtual HistoryService* GetHistoryService(ServiceAccessType sat) {
if (sat == EXPLICIT_ACCESS) {
return profile_->GetHistoryService(sat);
} else {
NOTREACHED() << "This profile is OffTheRecord";
return NULL;
}
}
virtual WebDataService* GetWebDataService(ServiceAccessType sat) {
if (sat == EXPLICIT_ACCESS) {
return profile_->GetWebDataService(sat);
} else {
NOTREACHED() << "This profile is OffTheRecord";
return NULL;
}
}
virtual PasswordStore* GetPasswordStore(ServiceAccessType sat) {
if (sat == EXPLICIT_ACCESS) {
return profile_->GetPasswordStore(sat);
} else {
NOTREACHED() << "This profile is OffTheRecord";
return NULL;
}
}
virtual PrefService* GetPrefs() {
return profile_->GetPrefs();
}
virtual TemplateURLModel* GetTemplateURLModel() {
return profile_->GetTemplateURLModel();
}
virtual TemplateURLFetcher* GetTemplateURLFetcher() {
return profile_->GetTemplateURLFetcher();
}
virtual DownloadManager* GetDownloadManager() {
if (!download_manager_.get()) {
scoped_refptr<DownloadManager> dlm(new DownloadManager);
dlm->Init(this);
download_manager_.swap(dlm);
}
return download_manager_.get();
}
virtual bool HasCreatedDownloadManager() const {
return (download_manager_.get() != NULL);
}
virtual void InitThemes() {
GetOriginalProfile()->InitThemes();
}
virtual void SetTheme(Extension* extension) {
GetOriginalProfile()->SetTheme(extension);
}
virtual void SetNativeTheme() {
GetOriginalProfile()->SetNativeTheme();
}
virtual void ClearTheme() {
GetOriginalProfile()->ClearTheme();
}
virtual ThemeProvider* GetThemeProvider() {
return GetOriginalProfile()->GetThemeProvider();
}
virtual URLRequestContext* GetRequestContext() {
return request_context_;
}
virtual URLRequestContext* GetRequestContextForMedia() {
// In OTR mode, media request context is the same as the original one.
return request_context_;
}
URLRequestContext* GetRequestContextForExtensions() {
if (!extensions_request_context_) {
extensions_request_context_ =
ChromeURLRequestContext::CreateOffTheRecordForExtensions(this);
extensions_request_context_->AddRef();
DCHECK(extensions_request_context_->cookie_store());
}
return extensions_request_context_;
}
virtual Blacklist* GetBlacklist() {
return GetOriginalProfile()->GetBlacklist();
}
virtual SessionService* GetSessionService() {
// Don't save any sessions when off the record.
return NULL;
}
virtual void ShutdownSessionService() {
// We don't allow a session service, nothing to do.
}
virtual bool HasSessionService() const {
// We never have a session service.
return false;
}
virtual std::wstring GetName() {
return profile_->GetName();
}
virtual void SetName(const std::wstring& name) {
profile_->SetName(name);
}
virtual std::wstring GetID() {
return profile_->GetID();
}
virtual void SetID(const std::wstring& id) {
profile_->SetID(id);
}
virtual bool DidLastSessionExitCleanly() {
return profile_->DidLastSessionExitCleanly();
}
virtual BookmarkModel* GetBookmarkModel() {
return profile_->GetBookmarkModel();
}
#ifdef CHROME_PERSONALIZATION
virtual ProfilePersonalization* GetProfilePersonalization() {
return profile_->GetProfilePersonalization();
}
#endif
virtual bool IsSameProfile(Profile* profile) {
if (profile == static_cast<Profile*>(this))
return true;
return profile == profile_;
}
virtual Time GetStartTime() const {
return start_time_;
}
virtual TabRestoreService* GetTabRestoreService() {
return NULL;
}
virtual void ResetTabRestoreService() {
}
virtual void ReinitializeSpellChecker() {
profile_->ReinitializeSpellChecker();
}
virtual SpellChecker* GetSpellChecker() {
return profile_->GetSpellChecker();
}
virtual WebKitContext* GetWebKitContext() {
if (!webkit_context_.get())
webkit_context_ = new WebKitContext(GetPath(), true);
DCHECK(webkit_context_.get());
return webkit_context_.get();
}
virtual ThumbnailStore* GetThumbnailStore() {
return NULL;
}
virtual void MarkAsCleanShutdown() {
}
virtual void InitExtensions() {
NOTREACHED();
}
virtual void InitWebResources() {
NOTREACHED();
}
virtual void ExitedOffTheRecordMode() {
// Drop our download manager so we forget about all the downloads made
// in off-the-record mode.
download_manager_ = NULL;
}
virtual void Observe(NotificationType type,
const NotificationSource& source,
const NotificationDetails& details) {
DCHECK_EQ(NotificationType::BROWSER_CLOSED, type.value);
// We are only interested in OTR browser closing.
if (Source<Browser>(source)->profile() != this)
return;
// Let's check if we still have an Off The Record window opened.
// Note that we check against 1 as this notification is sent before the
// browser window is actually removed from the list.
if (BrowserList::GetBrowserCount(this) <= 1)
ExitedOffTheRecordMode();
}
private:
NotificationRegistrar registrar_;
// The real underlying profile.
Profile* profile_;
// The context to use for requests made from this OTR session.
ChromeURLRequestContext* request_context_;
ChromeURLRequestContext* extensions_request_context_;
// The download manager that only stores downloaded items in memory.
scoped_refptr<DownloadManager> download_manager_;
scoped_refptr<BrowserThemeProvider> theme_provider_;
// Use a special WebKit context for OTR browsing.
scoped_refptr<WebKitContext> webkit_context_;
// We don't want SSLHostState from the OTR profile to leak back to the main
// profile because then the main profile would learn some of the host names
// the user visited while OTR.
scoped_ptr<SSLHostState> ssl_host_state_;
// The ForceTLSState that only stores enabled sites in memory.
scoped_ptr<net::ForceTLSState> force_tls_state_;
// Time we were started.
Time start_time_;
DISALLOW_EVIL_CONSTRUCTORS(OffTheRecordProfileImpl);
};
ProfileImpl::ProfileImpl(const FilePath& path)
: path_(path),
visited_link_event_listener_(new VisitedLinkEventListener()),
request_context_(NULL),
media_request_context_(NULL),
extensions_request_context_(NULL),
blacklist_(NULL),
history_service_created_(false),
created_web_data_service_(false),
created_password_store_(false),
created_download_manager_(false),
created_theme_provider_(false),
start_time_(Time::Now()),
spellchecker_(NULL),
shutdown_session_service_(false) {
DCHECK(!path.empty()) << "Using an empty path will attempt to write " <<
"profile files to the root directory!";
create_session_service_timer_.Start(
TimeDelta::FromMilliseconds(kCreateSessionServiceDelayMS), this,
&ProfileImpl::EnsureSessionServiceCreated);
extension_process_manager_.reset(new ExtensionProcessManager(this));
PrefService* prefs = GetPrefs();
prefs->AddPrefObserver(prefs::kSpellCheckDictionary, this);
prefs->AddPrefObserver(prefs::kEnableSpellCheck, this);
prefs->AddPrefObserver(prefs::kEnableAutoSpellCorrect, this);
#ifdef CHROME_PERSONALIZATION
if (!CommandLine::ForCurrentProcess()->HasSwitch(switches::kDisableP13n))
personalization_.reset(Personalization::CreateProfilePersonalization(this));
#endif
if (CommandLine::ForCurrentProcess()->
HasSwitch(switches::kPrivacyBlacklist)) {
std::wstring option = CommandLine::ForCurrentProcess()->GetSwitchValue(
switches::kPrivacyBlacklist);
#if defined(OS_POSIX)
FilePath path(WideToUTF8(option));
#else
FilePath path(option);
#endif
blacklist_ = new Blacklist(path);
}
// Listen for theme installation.
registrar_.Add(this, NotificationType::THEME_INSTALLED,
NotificationService::AllSources());
}
void ProfileImpl::InitExtensions() {
if (user_script_master_ || extensions_service_)
return; // Already initialized.
const CommandLine* command_line = CommandLine::ForCurrentProcess();
PrefService* prefs = GetPrefs();
bool user_scripts_enabled =
command_line->HasSwitch(switches::kEnableUserScripts) ||
prefs->GetBoolean(prefs::kEnableUserScripts);
FilePath script_dir;
if (user_scripts_enabled) {
if (command_line->HasSwitch(switches::kUserScriptsDir)) {
std::wstring path_string =
command_line->GetSwitchValue(switches::kUserScriptsDir);
script_dir = FilePath::FromWStringHack(path_string);
} else {
script_dir = GetPath();
script_dir = script_dir.Append(chrome::kUserScriptsDirname);
}
}
ExtensionErrorReporter::Init(true); // allow noisy errors.
user_script_master_ = new UserScriptMaster(
g_browser_process->file_thread()->message_loop(),
script_dir);
extensions_service_ = new ExtensionsService(
this,
CommandLine::ForCurrentProcess(),
GetPrefs(),
GetPath().AppendASCII(ExtensionsService::kInstallDirectoryName),
MessageLoop::current(),
g_browser_process->file_thread()->message_loop(),
true);
extensions_service_->Init();
}
void ProfileImpl::InitWebResources() {
web_resource_service_ = new WebResourceService(
this,
g_browser_process->file_thread()->message_loop());
web_resource_service_->StartAfterDelay();
}
ProfileImpl::~ProfileImpl() {
tab_restore_service_ = NULL;
StopCreateSessionServiceTimer();
// TemplateURLModel schedules a task on the WebDataService from its
// destructor. Delete it first to ensure the task gets scheduled before we
// shut down the database.
template_url_model_.reset();
// The download manager queries the history system and should be deleted
// before the history is shutdown so it can properly cancel all requests.
download_manager_ = NULL;
// The theme provider provides bitmaps to whoever wants them.
theme_provider_ = NULL;
// Remove pref observers.
PrefService* prefs = GetPrefs();
prefs->RemovePrefObserver(prefs::kSpellCheckDictionary, this);
prefs->RemovePrefObserver(prefs::kEnableSpellCheck, this);
prefs->RemovePrefObserver(prefs::kEnableAutoSpellCorrect, this);
#ifdef CHROME_PERSONALIZATION
personalization_.reset();
#endif
// Both HistoryService and WebDataService maintain threads for background
// processing. Its possible each thread still has tasks on it that have
// increased the ref count of the service. In such a situation, when we
// decrement the refcount, it won't be 0, and the threads/databases aren't
// properly shut down. By explicitly calling Cleanup/Shutdown we ensure the
// databases are properly closed.
if (web_data_service_.get())
web_data_service_->Shutdown();
if (history_service_.get())
history_service_->Cleanup();
// The I/O thread may be NULL during testing.
base::Thread* io_thread = g_browser_process->io_thread();
if (spellchecker_) {
// The spellchecker must be deleted on the I/O thread. During testing, we
// don't have an I/O thread.
if (io_thread)
io_thread->message_loop()->ReleaseSoon(FROM_HERE, spellchecker_);
else
spellchecker_->Release();
}
if (default_request_context_ == request_context_)
default_request_context_ = NULL;
CleanupRequestContext(request_context_);
CleanupRequestContext(media_request_context_);
CleanupRequestContext(extensions_request_context_);
// When the request contexts are gone, the blacklist wont be needed anymore.
delete blacklist_;
blacklist_ = 0;
// HistoryService may call into the BookmarkModel, as such we need to
// delete HistoryService before the BookmarkModel. The destructor for
// HistoryService will join with HistoryService's backend thread so that
// by the time the destructor has finished we're sure it will no longer call
// into the BookmarkModel.
history_service_ = NULL;
bookmark_bar_model_.reset();
MarkAsCleanShutdown();
}
FilePath ProfileImpl::GetPath() {
return path_;
}
bool ProfileImpl::IsOffTheRecord() {
return false;
}
Profile* ProfileImpl::GetOffTheRecordProfile() {
if (!off_the_record_profile_.get()) {
scoped_ptr<OffTheRecordProfileImpl> p(new OffTheRecordProfileImpl(this));
off_the_record_profile_.swap(p);
}
return off_the_record_profile_.get();
}
void ProfileImpl::DestroyOffTheRecordProfile() {
off_the_record_profile_.reset();
}
Profile* ProfileImpl::GetOriginalProfile() {
return this;
}
VisitedLinkMaster* ProfileImpl::GetVisitedLinkMaster() {
if (!visited_link_master_.get()) {
scoped_ptr<VisitedLinkMaster> visited_links(
new VisitedLinkMaster(g_browser_process->file_thread(),
visited_link_event_listener_.get(), this));
if (!visited_links->Init())
return NULL;
visited_link_master_.swap(visited_links);
}
return visited_link_master_.get();
}
ExtensionsService* ProfileImpl::GetExtensionsService() {
return extensions_service_.get();
}
UserScriptMaster* ProfileImpl::GetUserScriptMaster() {
return user_script_master_.get();
}
ExtensionProcessManager* ProfileImpl::GetExtensionProcessManager() {
return extension_process_manager_.get();
}
SSLHostState* ProfileImpl::GetSSLHostState() {
if (!ssl_host_state_.get())
ssl_host_state_.reset(new SSLHostState());
DCHECK(ssl_host_state_->CalledOnValidThread());
return ssl_host_state_.get();
}
net::ForceTLSState* ProfileImpl::GetForceTLSState() {
if (!force_tls_state_.get())
force_tls_state_.reset(new net::ForceTLSState());
return force_tls_state_.get();
}
PrefService* ProfileImpl::GetPrefs() {
if (!prefs_.get()) {
prefs_.reset(new PrefService(GetPrefFilePath(),
g_browser_process->file_thread()));
// The Profile class and ProfileManager class may read some prefs so
// register known prefs as soon as possible.
Profile::RegisterUserPrefs(prefs_.get());
ProfileManager::RegisterUserPrefs(prefs_.get());
// The last session exited cleanly if there is no pref for
// kSessionExitedCleanly or the value for kSessionExitedCleanly is true.
last_session_exited_cleanly_ =
prefs_->GetBoolean(prefs::kSessionExitedCleanly);
// Mark the session as open.
prefs_->SetBoolean(prefs::kSessionExitedCleanly, false);
// Make sure we save to disk that the session has opened.
prefs_->ScheduleSavePersistentPrefs();
}
return prefs_.get();
}
FilePath ProfileImpl::GetPrefFilePath() {
FilePath pref_file_path = path_;
pref_file_path = pref_file_path.Append(chrome::kPreferencesFilename);
return pref_file_path;
}
URLRequestContext* ProfileImpl::GetRequestContext() {
if (!request_context_) {
FilePath cookie_path = GetPath();
cookie_path = cookie_path.Append(chrome::kCookieFilename);
FilePath cache_path = GetPath();
int max_size;
GetCacheParameters(kNormalContext, &cache_path, &max_size);
cache_path = cache_path.Append(chrome::kCacheDirname);
request_context_ = ChromeURLRequestContext::CreateOriginal(
this, cookie_path, cache_path, max_size);
request_context_->AddRef();
// The first request context is always a normal (non-OTR) request context.
// Even when Chromium is started in OTR mode, a normal profile is always
// created first.
if (!default_request_context_) {
default_request_context_ = request_context_;
NotificationService::current()->Notify(
NotificationType::DEFAULT_REQUEST_CONTEXT_AVAILABLE,
NotificationService::AllSources(), NotificationService::NoDetails());
}
DCHECK(request_context_->cookie_store());
}
return request_context_;
}
URLRequestContext* ProfileImpl::GetRequestContextForMedia() {
if (!media_request_context_) {
FilePath cache_path = GetPath();
int max_size;
GetCacheParameters(kMediaContext, &cache_path, &max_size);
cache_path = cache_path.Append(chrome::kMediaCacheDirname);
media_request_context_ = ChromeURLRequestContext::CreateOriginalForMedia(
this, cache_path, max_size);
media_request_context_->AddRef();
DCHECK(media_request_context_->cookie_store());
}
return media_request_context_;
}
URLRequestContext* ProfileImpl::GetRequestContextForExtensions() {
if (!extensions_request_context_) {
FilePath cookie_path = GetPath();
cookie_path = cookie_path.Append(chrome::kExtensionsCookieFilename);
extensions_request_context_ =
ChromeURLRequestContext::CreateOriginalForExtensions(this, cookie_path);
extensions_request_context_->AddRef();
DCHECK(extensions_request_context_->cookie_store());
}
return extensions_request_context_;
}
Blacklist* ProfileImpl::GetBlacklist() {
return blacklist_;
}
HistoryService* ProfileImpl::GetHistoryService(ServiceAccessType sat) {
if (!history_service_created_) {
history_service_created_ = true;
scoped_refptr<HistoryService> history(new HistoryService(this));
if (!history->Init(GetPath(), GetBookmarkModel()))
return NULL;
history_service_.swap(history);
// Send out the notification that the history service was created.
NotificationService::current()->
Notify(NotificationType::HISTORY_CREATED, Source<Profile>(this),
Details<HistoryService>(history_service_.get()));
}
return history_service_.get();
}
TemplateURLModel* ProfileImpl::GetTemplateURLModel() {
if (!template_url_model_.get())
template_url_model_.reset(new TemplateURLModel(this));
return template_url_model_.get();
}
TemplateURLFetcher* ProfileImpl::GetTemplateURLFetcher() {
if (!template_url_fetcher_.get())
template_url_fetcher_.reset(new TemplateURLFetcher(this));
return template_url_fetcher_.get();
}
WebDataService* ProfileImpl::GetWebDataService(ServiceAccessType sat) {
if (!created_web_data_service_)
CreateWebDataService();
return web_data_service_.get();
}
void ProfileImpl::CreateWebDataService() {
DCHECK(!created_web_data_service_ && web_data_service_.get() == NULL);
created_web_data_service_ = true;
scoped_refptr<WebDataService> wds(new WebDataService());
if (!wds->Init(GetPath()))
return;
web_data_service_.swap(wds);
}
PasswordStore* ProfileImpl::GetPasswordStore(ServiceAccessType sat) {
if (!created_password_store_)
CreatePasswordStore();
return password_store_.get();
}
void ProfileImpl::CreatePasswordStore() {
DCHECK(!created_password_store_ && password_store_.get() == NULL);
created_password_store_ = true;
scoped_refptr<PasswordStore> ps;
#if defined(OS_LINUX)
// Temporarily disabled while we figure some stuff out.
// http://code.google.com/p/chromium/issues/detail?id=12351
// if (getenv("KDE_FULL_SESSION")) {
// ps = new PasswordStoreKWallet();
// } else {
// ps = new PasswordStoreGnome();
// }
NOTIMPLEMENTED();
#elif defined(OS_WIN)
ps = new PasswordStoreWin(GetWebDataService(Profile::IMPLICIT_ACCESS));
#elif defined(OS_MACOSX)
FilePath login_db_file_path = GetPath();
login_db_file_path = login_db_file_path.Append(chrome::kLoginDataFileName);
LoginDatabaseMac* login_db = new LoginDatabaseMac();
if (!login_db->Init(login_db_file_path)) {
LOG(ERROR) << "Could not initialize login database.";
delete login_db;
return;
}
ps = new PasswordStoreMac(new MacKeychain(), login_db);
#else
NOTIMPLEMENTED();
#endif
if (!ps || !ps->Init()) {
// Try falling back to the default password manager
LOG(WARNING) << "Could not initialise native password manager - "
"falling back to default";
ps = new PasswordStoreDefault(GetWebDataService(Profile::IMPLICIT_ACCESS));
if (!ps->Init())
return;
}
password_store_.swap(ps);
}
DownloadManager* ProfileImpl::GetDownloadManager() {
if (!created_download_manager_) {
scoped_refptr<DownloadManager> dlm(new DownloadManager);
dlm->Init(this);
created_download_manager_ = true;
download_manager_.swap(dlm);
}
return download_manager_.get();
}
bool ProfileImpl::HasCreatedDownloadManager() const {
return created_download_manager_;
}
void ProfileImpl::InitThemes() {
if (!created_theme_provider_) {
#if defined(OS_LINUX) && !defined(TOOLKIT_VIEWS)
scoped_refptr<BrowserThemeProvider> themes(new GtkThemeProvider);
#else
scoped_refptr<BrowserThemeProvider> themes(new BrowserThemeProvider);
#endif
themes->Init(this);
created_theme_provider_ = true;
theme_provider_.swap(themes);
}
}
void ProfileImpl::SetTheme(Extension* extension) {
InitThemes();
theme_provider_.get()->SetTheme(extension);
}
void ProfileImpl::SetNativeTheme() {
InitThemes();
theme_provider_.get()->SetNativeTheme();
}
void ProfileImpl::ClearTheme() {
InitThemes();
theme_provider_.get()->UseDefaultTheme();
}
ThemeProvider* ProfileImpl::GetThemeProvider() {
InitThemes();
return theme_provider_.get();
}
SessionService* ProfileImpl::GetSessionService() {
if (!session_service_.get() && !shutdown_session_service_) {
session_service_ = new SessionService(this);
session_service_->ResetFromCurrentBrowsers();
}
return session_service_.get();
}
void ProfileImpl::ShutdownSessionService() {
if (shutdown_session_service_)
return;
// We're about to exit, force creation of the session service if it hasn't
// been created yet. We do this to ensure session state matches the point in
// time the user exited.
GetSessionService();
shutdown_session_service_ = true;
session_service_ = NULL;
}
bool ProfileImpl::HasSessionService() const {
return (session_service_.get() != NULL);
}
std::wstring ProfileImpl::GetName() {
return GetPrefs()->GetString(prefs::kProfileName);
}
void ProfileImpl::SetName(const std::wstring& name) {
GetPrefs()->SetString(prefs::kProfileName, name);
}
std::wstring ProfileImpl::GetID() {
return GetPrefs()->GetString(prefs::kProfileID);
}
void ProfileImpl::SetID(const std::wstring& id) {
GetPrefs()->SetString(prefs::kProfileID, id);
}
bool ProfileImpl::DidLastSessionExitCleanly() {
// last_session_exited_cleanly_ is set when the preferences are loaded. Force
// it to be set by asking for the prefs.
GetPrefs();
return last_session_exited_cleanly_;
}
BookmarkModel* ProfileImpl::GetBookmarkModel() {
if (!bookmark_bar_model_.get()) {
bookmark_bar_model_.reset(new BookmarkModel(this));
bookmark_bar_model_->Load();
}
return bookmark_bar_model_.get();
}
bool ProfileImpl::IsSameProfile(Profile* profile) {
if (profile == static_cast<Profile*>(this))
return true;
OffTheRecordProfileImpl* otr_profile = off_the_record_profile_.get();
return otr_profile && profile == static_cast<Profile*>(otr_profile);
}
Time ProfileImpl::GetStartTime() const {
return start_time_;
}
TabRestoreService* ProfileImpl::GetTabRestoreService() {
if (!tab_restore_service_.get())
tab_restore_service_ = new TabRestoreService(this);
return tab_restore_service_.get();
}
ThumbnailStore* ProfileImpl::GetThumbnailStore() {
if (!thumbnail_store_.get()) {
thumbnail_store_ = new ThumbnailStore;
thumbnail_store_->Init(GetPath().AppendASCII("Top Thumbnails"), this);
}
return thumbnail_store_.get();
}
void ProfileImpl::ResetTabRestoreService() {
tab_restore_service_ = NULL;
}
// To be run in the IO thread to notify all resource message filters that the
// spellchecker has changed.
class NotifySpellcheckerChangeTask : public Task {
public:
NotifySpellcheckerChangeTask(
Profile* profile,
const SpellcheckerReinitializedDetails& spellchecker)
: profile_(profile),
spellchecker_(spellchecker) {
}
private:
void Run(void) {
NotificationService::current()->Notify(
NotificationType::SPELLCHECKER_REINITIALIZED,
Source<Profile>(profile_),
Details<SpellcheckerReinitializedDetails>(&spellchecker_));
}
Profile* profile_;
SpellcheckerReinitializedDetails spellchecker_;
};
void ProfileImpl::InitializeSpellChecker(bool need_to_broadcast) {
// The I/O thread may be NULL during testing.
base::Thread* io_thread = g_browser_process->io_thread();
if (spellchecker_) {
// The spellchecker must be deleted on the I/O thread.
// A dummy variable to aid in logical clarity.
SpellChecker* last_spellchecker = spellchecker_;
if (io_thread)
io_thread->message_loop()->ReleaseSoon(FROM_HERE, last_spellchecker);
else // during testing, we don't have an I/O thread
last_spellchecker->Release();
}
// Retrieve the (perhaps updated recently) dictionary name from preferences.
PrefService* prefs = GetPrefs();
bool enable_spellcheck = prefs->GetBoolean(prefs::kEnableSpellCheck);
if (enable_spellcheck) {
FilePath dict_dir;
PathService::Get(chrome::DIR_APP_DICTIONARIES, &dict_dir);
// Note that, as the object pointed to by previously by spellchecker_
// is being deleted in the io thread, the spellchecker_ can be made to point
// to a new object (RE-initialized) in parallel in this UI thread.
spellchecker_ = new SpellChecker(dict_dir,
WideToASCII(prefs->GetString(prefs::kSpellCheckDictionary)),
GetRequestContext(),
FilePath());
spellchecker_->AddRef(); // Manual refcounting.
} else {
spellchecker_ = NULL;
}
// Set auto spell correct status for spellchecker.
if (spellchecker_) {
spellchecker_->EnableAutoSpellCorrect(
prefs->GetBoolean(prefs::kEnableAutoSpellCorrect));
}
if (need_to_broadcast && io_thread) { // Notify resource message filters.
SpellcheckerReinitializedDetails scoped_spellchecker;
scoped_spellchecker.spellchecker = spellchecker_;
if (io_thread) {
io_thread->message_loop()->PostTask(
FROM_HERE,
new NotifySpellcheckerChangeTask(this, scoped_spellchecker));
}
}
}
void ProfileImpl::ReinitializeSpellChecker() {
InitializeSpellChecker(true);
}
SpellChecker* ProfileImpl::GetSpellChecker() {
if (!spellchecker_) {
// This is where spellchecker gets initialized. Note that this is being
// initialized in the ui_thread. However, this is not a problem as long as
// it is *used* in the io thread.
// TODO(sidchat): One day, change everything so that spellchecker gets
// initialized in the IO thread itself.
InitializeSpellChecker(false);
}
return spellchecker_;
}
WebKitContext* ProfileImpl::GetWebKitContext() {
if (!webkit_context_.get())
webkit_context_ = new WebKitContext(path_, false);
DCHECK(webkit_context_.get());
return webkit_context_.get();
}
void ProfileImpl::MarkAsCleanShutdown() {
if (prefs_.get()) {
// The session cleanly exited, set kSessionExitedCleanly appropriately.
prefs_->SetBoolean(prefs::kSessionExitedCleanly, true);
// NOTE: If you change what thread this writes on, be sure and update
// ChromeFrame::EndSession().
prefs_->SavePersistentPrefs();
}
}
void ProfileImpl::Observe(NotificationType type,
const NotificationSource& source,
const NotificationDetails& details) {
if (NotificationType::PREF_CHANGED == type) {
std::wstring* pref_name_in = Details<std::wstring>(details).ptr();
PrefService* prefs = Source<PrefService>(source).ptr();
DCHECK(pref_name_in && prefs);
if (*pref_name_in == prefs::kSpellCheckDictionary ||
*pref_name_in == prefs::kEnableSpellCheck ||
*pref_name_in == prefs::kEnableAutoSpellCorrect) {
InitializeSpellChecker(true);
}
} else if (NotificationType::THEME_INSTALLED == type) {
Extension* extension = Details<Extension>(details).ptr();
SetTheme(extension);
}
}
void ProfileImpl::StopCreateSessionServiceTimer() {
create_session_service_timer_.Stop();
}
#ifdef CHROME_PERSONALIZATION
ProfilePersonalization* ProfileImpl::GetProfilePersonalization() {
return personalization_.get();
}
#endif