| // Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "chrome/browser/profile.h" |
| |
| #include "base/command_line.h" |
| #include "base/file_path.h" |
| #include "base/file_util.h" |
| #include "base/path_service.h" |
| #include "base/scoped_ptr.h" |
| #include "base/string_util.h" |
| #include "chrome/browser/bookmarks/bookmark_model.h" |
| #include "chrome/browser/browser_list.h" |
| #include "chrome/browser/browser_process.h" |
| #include "chrome/browser/browser_theme_provider.h" |
| #include "chrome/browser/download/download_manager.h" |
| #include "chrome/browser/extensions/extension_process_manager.h" |
| #include "chrome/browser/extensions/extensions_service.h" |
| #include "chrome/browser/extensions/user_script_master.h" |
| #include "chrome/browser/history/history.h" |
| #include "chrome/browser/in_process_webkit/webkit_context.h" |
| #include "chrome/browser/net/chrome_url_request_context.h" |
| #include "chrome/browser/password_manager/password_store_default.h" |
| #include "chrome/browser/privacy_blacklist/blacklist.h" |
| #include "chrome/browser/profile_manager.h" |
| #include "chrome/browser/renderer_host/render_process_host.h" |
| #include "chrome/browser/search_engines/template_url_fetcher.h" |
| #include "chrome/browser/search_engines/template_url_model.h" |
| #include "chrome/browser/sessions/session_service.h" |
| #include "chrome/browser/sessions/tab_restore_service.h" |
| #include "chrome/browser/spellchecker.h" |
| #include "chrome/browser/ssl/ssl_host_state.h" |
| #include "chrome/browser/thumbnail_store.h" |
| #include "chrome/browser/visitedlink_master.h" |
| #include "chrome/browser/visitedlink_event_listener.h" |
| #include "chrome/browser/webdata/web_data_service.h" |
| #include "chrome/common/chrome_constants.h" |
| #include "chrome/common/chrome_paths.h" |
| #include "chrome/common/chrome_switches.h" |
| #include "chrome/common/extensions/extension_error_reporter.h" |
| #include "chrome/common/net/cookie_monster_sqlite.h" |
| #include "chrome/common/notification_service.h" |
| #include "chrome/common/pref_names.h" |
| #include "chrome/common/render_messages.h" |
| #include "grit/locale_settings.h" |
| #include "net/base/force_tls_state.h" |
| |
| #if defined(OS_LINUX) |
| #include "chrome/browser/gtk/gtk_theme_provider.h" |
| #endif |
| |
| using base::Time; |
| using base::TimeDelta; |
| |
| namespace { |
| |
| // Delay, in milliseconds, before we explicitly create the SessionService. |
| static const int kCreateSessionServiceDelayMS = 500; |
| |
| enum ContextType { |
| kNormalContext, |
| kMediaContext |
| }; |
| |
| // Gets the cache parameters from the command line. |type| is the type of |
| // request context that we need, |cache_path| will be set to the user provided |
| // path, or will not be touched if there is not an argument. |max_size| will |
| // be the user provided value or zero by default. |
| void GetCacheParameters(ContextType type, FilePath* cache_path, |
| int* max_size) { |
| DCHECK(cache_path); |
| DCHECK(max_size); |
| |
| // Override the cache location if specified by the user. |
| std::wstring user_path(CommandLine::ForCurrentProcess()->GetSwitchValue( |
| switches::kDiskCacheDir)); |
| |
| if (!user_path.empty()) { |
| *cache_path = FilePath::FromWStringHack(user_path); |
| } |
| |
| const wchar_t* arg = kNormalContext == type ? switches::kDiskCacheSize : |
| switches::kMediaCacheSize; |
| std::string value = |
| WideToASCII(CommandLine::ForCurrentProcess()->GetSwitchValue(arg)); |
| |
| // By default we let the cache determine the right size. |
| *max_size = 0; |
| if (!StringToInt(value, max_size)) { |
| *max_size = 0; |
| } else if (max_size < 0) { |
| *max_size = 0; |
| } |
| } |
| |
| } // namespace |
| |
| // A pointer to the request context for the default profile. See comments on |
| // Profile::GetDefaultRequestContext. |
| URLRequestContext* Profile::default_request_context_; |
| |
| static void CleanupRequestContext(ChromeURLRequestContext* context) { |
| if (context) { |
| context->CleanupOnUIThread(); |
| |
| // Clean up request context on IO thread. |
| g_browser_process->io_thread()->message_loop()->ReleaseSoon(FROM_HERE, |
| context); |
| } |
| } |
| |
| // static |
| void Profile::RegisterUserPrefs(PrefService* prefs) { |
| prefs->RegisterBooleanPref(prefs::kSearchSuggestEnabled, true); |
| prefs->RegisterBooleanPref(prefs::kSessionExitedCleanly, true); |
| prefs->RegisterBooleanPref(prefs::kSafeBrowsingEnabled, true); |
| // TODO(estade): IDS_SPELLCHECK_DICTIONARY should be an ASCII string. |
| prefs->RegisterLocalizedStringPref(prefs::kSpellCheckDictionary, |
| IDS_SPELLCHECK_DICTIONARY); |
| prefs->RegisterBooleanPref(prefs::kEnableSpellCheck, true); |
| prefs->RegisterBooleanPref(prefs::kEnableAutoSpellCorrect, true); |
| prefs->RegisterBooleanPref(prefs::kEnableUserScripts, false); |
| #if defined(OS_LINUX) |
| prefs->RegisterBooleanPref(prefs::kUsesSystemTheme, false); |
| #endif |
| prefs->RegisterStringPref(prefs::kCurrentThemeID, L""); |
| prefs->RegisterDictionaryPref(prefs::kCurrentThemeImages); |
| prefs->RegisterDictionaryPref(prefs::kCurrentThemeColors); |
| prefs->RegisterDictionaryPref(prefs::kCurrentThemeTints); |
| prefs->RegisterDictionaryPref(prefs::kCurrentThemeDisplayProperties); |
| prefs->RegisterBooleanPref(prefs::kEnableExtensions, false); |
| } |
| |
| // static |
| Profile* Profile::CreateProfile(const FilePath& path) { |
| return new ProfileImpl(path); |
| } |
| |
| // static |
| URLRequestContext* Profile::GetDefaultRequestContext() { |
| return default_request_context_; |
| } |
| |
| #if defined(OS_LINUX) |
| // Temporarily disabled while we figure some stuff out. |
| // http://code.google.com/p/chromium/issues/detail?id=12351 |
| // #include "chrome/browser/password_manager/password_store_gnome.h" |
| // #include "chrome/browser/password_manager/password_store_kwallet.h" |
| #elif defined(OS_WIN) |
| #include "chrome/browser/password_manager/password_store_win.h" |
| #elif defined(OS_MACOSX) |
| #include "chrome/browser/keychain_mac.h" |
| #include "chrome/browser/password_manager/login_database_mac.h" |
| #include "chrome/browser/password_manager/password_store_mac.h" |
| #endif |
| |
| //////////////////////////////////////////////////////////////////////////////// |
| // |
| // OffTheRecordProfileImpl is a profile subclass that wraps an existing profile |
| // to make it suitable for the off the record mode. |
| // |
| //////////////////////////////////////////////////////////////////////////////// |
| class OffTheRecordProfileImpl : public Profile, |
| public NotificationObserver { |
| public: |
| explicit OffTheRecordProfileImpl(Profile* real_profile) |
| : profile_(real_profile), |
| extensions_request_context_(NULL), |
| start_time_(Time::Now()) { |
| request_context_ = ChromeURLRequestContext::CreateOffTheRecord(this); |
| request_context_->AddRef(); |
| |
| // Register for browser close notifications so we can detect when the last |
| // off-the-record window is closed, in which case we can clean our states |
| // (cookies, downloads...). |
| registrar_.Add(this, NotificationType::BROWSER_CLOSED, |
| NotificationService::AllSources()); |
| } |
| |
| virtual ~OffTheRecordProfileImpl() { |
| CleanupRequestContext(request_context_); |
| CleanupRequestContext(extensions_request_context_); |
| } |
| |
| virtual FilePath GetPath() { return profile_->GetPath(); } |
| |
| virtual bool IsOffTheRecord() { |
| return true; |
| } |
| |
| virtual Profile* GetOffTheRecordProfile() { |
| return this; |
| } |
| |
| virtual void DestroyOffTheRecordProfile() { |
| // Suicide is bad! |
| NOTREACHED(); |
| } |
| |
| virtual Profile* GetOriginalProfile() { |
| return profile_; |
| } |
| |
| virtual VisitedLinkMaster* GetVisitedLinkMaster() { |
| // We don't provide access to the VisitedLinkMaster when we're OffTheRecord |
| // because we don't want to leak the sites that the user has visited before. |
| return NULL; |
| } |
| |
| virtual ExtensionsService* GetExtensionsService() { |
| return NULL; |
| } |
| |
| virtual UserScriptMaster* GetUserScriptMaster() { |
| return profile_->GetUserScriptMaster(); |
| } |
| |
| virtual ExtensionProcessManager* GetExtensionProcessManager() { |
| return NULL; |
| } |
| |
| virtual SSLHostState* GetSSLHostState() { |
| if (!ssl_host_state_.get()) |
| ssl_host_state_.reset(new SSLHostState()); |
| |
| DCHECK(ssl_host_state_->CalledOnValidThread()); |
| return ssl_host_state_.get(); |
| } |
| |
| virtual net::ForceTLSState* GetForceTLSState() { |
| if (!force_tls_state_.get()) |
| force_tls_state_.reset(new net::ForceTLSState()); |
| |
| return force_tls_state_.get(); |
| } |
| |
| virtual HistoryService* GetHistoryService(ServiceAccessType sat) { |
| if (sat == EXPLICIT_ACCESS) { |
| return profile_->GetHistoryService(sat); |
| } else { |
| NOTREACHED() << "This profile is OffTheRecord"; |
| return NULL; |
| } |
| } |
| |
| virtual WebDataService* GetWebDataService(ServiceAccessType sat) { |
| if (sat == EXPLICIT_ACCESS) { |
| return profile_->GetWebDataService(sat); |
| } else { |
| NOTREACHED() << "This profile is OffTheRecord"; |
| return NULL; |
| } |
| } |
| |
| virtual PasswordStore* GetPasswordStore(ServiceAccessType sat) { |
| if (sat == EXPLICIT_ACCESS) { |
| return profile_->GetPasswordStore(sat); |
| } else { |
| NOTREACHED() << "This profile is OffTheRecord"; |
| return NULL; |
| } |
| } |
| |
| virtual PrefService* GetPrefs() { |
| return profile_->GetPrefs(); |
| } |
| |
| virtual TemplateURLModel* GetTemplateURLModel() { |
| return profile_->GetTemplateURLModel(); |
| } |
| |
| virtual TemplateURLFetcher* GetTemplateURLFetcher() { |
| return profile_->GetTemplateURLFetcher(); |
| } |
| |
| virtual DownloadManager* GetDownloadManager() { |
| if (!download_manager_.get()) { |
| scoped_refptr<DownloadManager> dlm(new DownloadManager); |
| dlm->Init(this); |
| download_manager_.swap(dlm); |
| } |
| return download_manager_.get(); |
| } |
| |
| virtual bool HasCreatedDownloadManager() const { |
| return (download_manager_.get() != NULL); |
| } |
| |
| virtual void InitThemes() { |
| GetOriginalProfile()->InitThemes(); |
| } |
| |
| virtual void SetTheme(Extension* extension) { |
| GetOriginalProfile()->SetTheme(extension); |
| } |
| |
| virtual void SetNativeTheme() { |
| GetOriginalProfile()->SetNativeTheme(); |
| } |
| |
| virtual void ClearTheme() { |
| GetOriginalProfile()->ClearTheme(); |
| } |
| |
| virtual ThemeProvider* GetThemeProvider() { |
| return GetOriginalProfile()->GetThemeProvider(); |
| } |
| |
| virtual URLRequestContext* GetRequestContext() { |
| return request_context_; |
| } |
| |
| virtual URLRequestContext* GetRequestContextForMedia() { |
| // In OTR mode, media request context is the same as the original one. |
| return request_context_; |
| } |
| |
| URLRequestContext* GetRequestContextForExtensions() { |
| if (!extensions_request_context_) { |
| extensions_request_context_ = |
| ChromeURLRequestContext::CreateOffTheRecordForExtensions(this); |
| extensions_request_context_->AddRef(); |
| |
| DCHECK(extensions_request_context_->cookie_store()); |
| } |
| |
| return extensions_request_context_; |
| } |
| |
| virtual Blacklist* GetBlacklist() { |
| return GetOriginalProfile()->GetBlacklist(); |
| } |
| |
| virtual SessionService* GetSessionService() { |
| // Don't save any sessions when off the record. |
| return NULL; |
| } |
| |
| virtual void ShutdownSessionService() { |
| // We don't allow a session service, nothing to do. |
| } |
| |
| virtual bool HasSessionService() const { |
| // We never have a session service. |
| return false; |
| } |
| |
| virtual std::wstring GetName() { |
| return profile_->GetName(); |
| } |
| |
| virtual void SetName(const std::wstring& name) { |
| profile_->SetName(name); |
| } |
| |
| virtual std::wstring GetID() { |
| return profile_->GetID(); |
| } |
| |
| virtual void SetID(const std::wstring& id) { |
| profile_->SetID(id); |
| } |
| |
| virtual bool DidLastSessionExitCleanly() { |
| return profile_->DidLastSessionExitCleanly(); |
| } |
| |
| virtual BookmarkModel* GetBookmarkModel() { |
| return profile_->GetBookmarkModel(); |
| } |
| |
| #ifdef CHROME_PERSONALIZATION |
| virtual ProfilePersonalization* GetProfilePersonalization() { |
| return profile_->GetProfilePersonalization(); |
| } |
| #endif |
| |
| virtual bool IsSameProfile(Profile* profile) { |
| if (profile == static_cast<Profile*>(this)) |
| return true; |
| return profile == profile_; |
| } |
| |
| virtual Time GetStartTime() const { |
| return start_time_; |
| } |
| |
| virtual TabRestoreService* GetTabRestoreService() { |
| return NULL; |
| } |
| |
| virtual void ResetTabRestoreService() { |
| } |
| |
| virtual void ReinitializeSpellChecker() { |
| profile_->ReinitializeSpellChecker(); |
| } |
| |
| virtual SpellChecker* GetSpellChecker() { |
| return profile_->GetSpellChecker(); |
| } |
| |
| virtual WebKitContext* GetWebKitContext() { |
| if (!webkit_context_.get()) |
| webkit_context_ = new WebKitContext(GetPath(), true); |
| DCHECK(webkit_context_.get()); |
| return webkit_context_.get(); |
| } |
| |
| virtual ThumbnailStore* GetThumbnailStore() { |
| return NULL; |
| } |
| |
| virtual void MarkAsCleanShutdown() { |
| } |
| |
| virtual void InitExtensions() { |
| NOTREACHED(); |
| } |
| |
| virtual void InitWebResources() { |
| NOTREACHED(); |
| } |
| |
| virtual void ExitedOffTheRecordMode() { |
| // Drop our download manager so we forget about all the downloads made |
| // in off-the-record mode. |
| download_manager_ = NULL; |
| } |
| |
| virtual void Observe(NotificationType type, |
| const NotificationSource& source, |
| const NotificationDetails& details) { |
| DCHECK_EQ(NotificationType::BROWSER_CLOSED, type.value); |
| // We are only interested in OTR browser closing. |
| if (Source<Browser>(source)->profile() != this) |
| return; |
| |
| // Let's check if we still have an Off The Record window opened. |
| // Note that we check against 1 as this notification is sent before the |
| // browser window is actually removed from the list. |
| if (BrowserList::GetBrowserCount(this) <= 1) |
| ExitedOffTheRecordMode(); |
| } |
| |
| private: |
| NotificationRegistrar registrar_; |
| |
| // The real underlying profile. |
| Profile* profile_; |
| |
| // The context to use for requests made from this OTR session. |
| ChromeURLRequestContext* request_context_; |
| |
| ChromeURLRequestContext* extensions_request_context_; |
| |
| // The download manager that only stores downloaded items in memory. |
| scoped_refptr<DownloadManager> download_manager_; |
| |
| scoped_refptr<BrowserThemeProvider> theme_provider_; |
| |
| // Use a special WebKit context for OTR browsing. |
| scoped_refptr<WebKitContext> webkit_context_; |
| |
| // We don't want SSLHostState from the OTR profile to leak back to the main |
| // profile because then the main profile would learn some of the host names |
| // the user visited while OTR. |
| scoped_ptr<SSLHostState> ssl_host_state_; |
| |
| // The ForceTLSState that only stores enabled sites in memory. |
| scoped_ptr<net::ForceTLSState> force_tls_state_; |
| |
| // Time we were started. |
| Time start_time_; |
| |
| DISALLOW_EVIL_CONSTRUCTORS(OffTheRecordProfileImpl); |
| }; |
| |
| ProfileImpl::ProfileImpl(const FilePath& path) |
| : path_(path), |
| visited_link_event_listener_(new VisitedLinkEventListener()), |
| request_context_(NULL), |
| media_request_context_(NULL), |
| extensions_request_context_(NULL), |
| blacklist_(NULL), |
| history_service_created_(false), |
| created_web_data_service_(false), |
| created_password_store_(false), |
| created_download_manager_(false), |
| created_theme_provider_(false), |
| start_time_(Time::Now()), |
| spellchecker_(NULL), |
| shutdown_session_service_(false) { |
| DCHECK(!path.empty()) << "Using an empty path will attempt to write " << |
| "profile files to the root directory!"; |
| create_session_service_timer_.Start( |
| TimeDelta::FromMilliseconds(kCreateSessionServiceDelayMS), this, |
| &ProfileImpl::EnsureSessionServiceCreated); |
| |
| extension_process_manager_.reset(new ExtensionProcessManager(this)); |
| |
| PrefService* prefs = GetPrefs(); |
| prefs->AddPrefObserver(prefs::kSpellCheckDictionary, this); |
| prefs->AddPrefObserver(prefs::kEnableSpellCheck, this); |
| prefs->AddPrefObserver(prefs::kEnableAutoSpellCorrect, this); |
| |
| #ifdef CHROME_PERSONALIZATION |
| if (!CommandLine::ForCurrentProcess()->HasSwitch(switches::kDisableP13n)) |
| personalization_.reset(Personalization::CreateProfilePersonalization(this)); |
| #endif |
| |
| if (CommandLine::ForCurrentProcess()-> |
| HasSwitch(switches::kPrivacyBlacklist)) { |
| std::wstring option = CommandLine::ForCurrentProcess()->GetSwitchValue( |
| switches::kPrivacyBlacklist); |
| #if defined(OS_POSIX) |
| FilePath path(WideToUTF8(option)); |
| #else |
| FilePath path(option); |
| #endif |
| blacklist_ = new Blacklist(path); |
| } |
| |
| // Listen for theme installation. |
| registrar_.Add(this, NotificationType::THEME_INSTALLED, |
| NotificationService::AllSources()); |
| } |
| |
| void ProfileImpl::InitExtensions() { |
| if (user_script_master_ || extensions_service_) |
| return; // Already initialized. |
| |
| const CommandLine* command_line = CommandLine::ForCurrentProcess(); |
| PrefService* prefs = GetPrefs(); |
| bool user_scripts_enabled = |
| command_line->HasSwitch(switches::kEnableUserScripts) || |
| prefs->GetBoolean(prefs::kEnableUserScripts); |
| |
| FilePath script_dir; |
| if (user_scripts_enabled) { |
| if (command_line->HasSwitch(switches::kUserScriptsDir)) { |
| std::wstring path_string = |
| command_line->GetSwitchValue(switches::kUserScriptsDir); |
| script_dir = FilePath::FromWStringHack(path_string); |
| } else { |
| script_dir = GetPath(); |
| script_dir = script_dir.Append(chrome::kUserScriptsDirname); |
| } |
| } |
| |
| ExtensionErrorReporter::Init(true); // allow noisy errors. |
| user_script_master_ = new UserScriptMaster( |
| g_browser_process->file_thread()->message_loop(), |
| script_dir); |
| extensions_service_ = new ExtensionsService( |
| this, |
| CommandLine::ForCurrentProcess(), |
| GetPrefs(), |
| GetPath().AppendASCII(ExtensionsService::kInstallDirectoryName), |
| MessageLoop::current(), |
| g_browser_process->file_thread()->message_loop(), |
| true); |
| |
| extensions_service_->Init(); |
| } |
| |
| void ProfileImpl::InitWebResources() { |
| web_resource_service_ = new WebResourceService( |
| this, |
| g_browser_process->file_thread()->message_loop()); |
| |
| web_resource_service_->StartAfterDelay(); |
| } |
| |
| ProfileImpl::~ProfileImpl() { |
| tab_restore_service_ = NULL; |
| |
| StopCreateSessionServiceTimer(); |
| // TemplateURLModel schedules a task on the WebDataService from its |
| // destructor. Delete it first to ensure the task gets scheduled before we |
| // shut down the database. |
| template_url_model_.reset(); |
| |
| // The download manager queries the history system and should be deleted |
| // before the history is shutdown so it can properly cancel all requests. |
| download_manager_ = NULL; |
| |
| // The theme provider provides bitmaps to whoever wants them. |
| theme_provider_ = NULL; |
| |
| // Remove pref observers. |
| PrefService* prefs = GetPrefs(); |
| prefs->RemovePrefObserver(prefs::kSpellCheckDictionary, this); |
| prefs->RemovePrefObserver(prefs::kEnableSpellCheck, this); |
| prefs->RemovePrefObserver(prefs::kEnableAutoSpellCorrect, this); |
| |
| #ifdef CHROME_PERSONALIZATION |
| personalization_.reset(); |
| #endif |
| |
| // Both HistoryService and WebDataService maintain threads for background |
| // processing. Its possible each thread still has tasks on it that have |
| // increased the ref count of the service. In such a situation, when we |
| // decrement the refcount, it won't be 0, and the threads/databases aren't |
| // properly shut down. By explicitly calling Cleanup/Shutdown we ensure the |
| // databases are properly closed. |
| if (web_data_service_.get()) |
| web_data_service_->Shutdown(); |
| |
| if (history_service_.get()) |
| history_service_->Cleanup(); |
| |
| // The I/O thread may be NULL during testing. |
| base::Thread* io_thread = g_browser_process->io_thread(); |
| |
| if (spellchecker_) { |
| // The spellchecker must be deleted on the I/O thread. During testing, we |
| // don't have an I/O thread. |
| if (io_thread) |
| io_thread->message_loop()->ReleaseSoon(FROM_HERE, spellchecker_); |
| else |
| spellchecker_->Release(); |
| } |
| |
| if (default_request_context_ == request_context_) |
| default_request_context_ = NULL; |
| |
| CleanupRequestContext(request_context_); |
| CleanupRequestContext(media_request_context_); |
| CleanupRequestContext(extensions_request_context_); |
| |
| // When the request contexts are gone, the blacklist wont be needed anymore. |
| delete blacklist_; |
| blacklist_ = 0; |
| |
| // HistoryService may call into the BookmarkModel, as such we need to |
| // delete HistoryService before the BookmarkModel. The destructor for |
| // HistoryService will join with HistoryService's backend thread so that |
| // by the time the destructor has finished we're sure it will no longer call |
| // into the BookmarkModel. |
| history_service_ = NULL; |
| bookmark_bar_model_.reset(); |
| |
| MarkAsCleanShutdown(); |
| } |
| |
| FilePath ProfileImpl::GetPath() { |
| return path_; |
| } |
| |
| bool ProfileImpl::IsOffTheRecord() { |
| return false; |
| } |
| |
| Profile* ProfileImpl::GetOffTheRecordProfile() { |
| if (!off_the_record_profile_.get()) { |
| scoped_ptr<OffTheRecordProfileImpl> p(new OffTheRecordProfileImpl(this)); |
| off_the_record_profile_.swap(p); |
| } |
| return off_the_record_profile_.get(); |
| } |
| |
| void ProfileImpl::DestroyOffTheRecordProfile() { |
| off_the_record_profile_.reset(); |
| } |
| |
| Profile* ProfileImpl::GetOriginalProfile() { |
| return this; |
| } |
| |
| VisitedLinkMaster* ProfileImpl::GetVisitedLinkMaster() { |
| if (!visited_link_master_.get()) { |
| scoped_ptr<VisitedLinkMaster> visited_links( |
| new VisitedLinkMaster(g_browser_process->file_thread(), |
| visited_link_event_listener_.get(), this)); |
| if (!visited_links->Init()) |
| return NULL; |
| visited_link_master_.swap(visited_links); |
| } |
| |
| return visited_link_master_.get(); |
| } |
| |
| ExtensionsService* ProfileImpl::GetExtensionsService() { |
| return extensions_service_.get(); |
| } |
| |
| UserScriptMaster* ProfileImpl::GetUserScriptMaster() { |
| return user_script_master_.get(); |
| } |
| |
| ExtensionProcessManager* ProfileImpl::GetExtensionProcessManager() { |
| return extension_process_manager_.get(); |
| } |
| |
| SSLHostState* ProfileImpl::GetSSLHostState() { |
| if (!ssl_host_state_.get()) |
| ssl_host_state_.reset(new SSLHostState()); |
| |
| DCHECK(ssl_host_state_->CalledOnValidThread()); |
| return ssl_host_state_.get(); |
| } |
| |
| net::ForceTLSState* ProfileImpl::GetForceTLSState() { |
| if (!force_tls_state_.get()) |
| force_tls_state_.reset(new net::ForceTLSState()); |
| |
| return force_tls_state_.get(); |
| } |
| |
| PrefService* ProfileImpl::GetPrefs() { |
| if (!prefs_.get()) { |
| prefs_.reset(new PrefService(GetPrefFilePath(), |
| g_browser_process->file_thread())); |
| |
| // The Profile class and ProfileManager class may read some prefs so |
| // register known prefs as soon as possible. |
| Profile::RegisterUserPrefs(prefs_.get()); |
| ProfileManager::RegisterUserPrefs(prefs_.get()); |
| |
| // The last session exited cleanly if there is no pref for |
| // kSessionExitedCleanly or the value for kSessionExitedCleanly is true. |
| last_session_exited_cleanly_ = |
| prefs_->GetBoolean(prefs::kSessionExitedCleanly); |
| // Mark the session as open. |
| prefs_->SetBoolean(prefs::kSessionExitedCleanly, false); |
| // Make sure we save to disk that the session has opened. |
| prefs_->ScheduleSavePersistentPrefs(); |
| } |
| |
| return prefs_.get(); |
| } |
| |
| FilePath ProfileImpl::GetPrefFilePath() { |
| FilePath pref_file_path = path_; |
| pref_file_path = pref_file_path.Append(chrome::kPreferencesFilename); |
| return pref_file_path; |
| } |
| |
| URLRequestContext* ProfileImpl::GetRequestContext() { |
| if (!request_context_) { |
| FilePath cookie_path = GetPath(); |
| cookie_path = cookie_path.Append(chrome::kCookieFilename); |
| FilePath cache_path = GetPath(); |
| int max_size; |
| GetCacheParameters(kNormalContext, &cache_path, &max_size); |
| |
| cache_path = cache_path.Append(chrome::kCacheDirname); |
| request_context_ = ChromeURLRequestContext::CreateOriginal( |
| this, cookie_path, cache_path, max_size); |
| request_context_->AddRef(); |
| |
| // The first request context is always a normal (non-OTR) request context. |
| // Even when Chromium is started in OTR mode, a normal profile is always |
| // created first. |
| if (!default_request_context_) { |
| default_request_context_ = request_context_; |
| NotificationService::current()->Notify( |
| NotificationType::DEFAULT_REQUEST_CONTEXT_AVAILABLE, |
| NotificationService::AllSources(), NotificationService::NoDetails()); |
| } |
| |
| DCHECK(request_context_->cookie_store()); |
| } |
| |
| return request_context_; |
| } |
| |
| URLRequestContext* ProfileImpl::GetRequestContextForMedia() { |
| if (!media_request_context_) { |
| FilePath cache_path = GetPath(); |
| int max_size; |
| GetCacheParameters(kMediaContext, &cache_path, &max_size); |
| |
| cache_path = cache_path.Append(chrome::kMediaCacheDirname); |
| media_request_context_ = ChromeURLRequestContext::CreateOriginalForMedia( |
| this, cache_path, max_size); |
| media_request_context_->AddRef(); |
| |
| DCHECK(media_request_context_->cookie_store()); |
| } |
| |
| return media_request_context_; |
| } |
| |
| URLRequestContext* ProfileImpl::GetRequestContextForExtensions() { |
| if (!extensions_request_context_) { |
| FilePath cookie_path = GetPath(); |
| cookie_path = cookie_path.Append(chrome::kExtensionsCookieFilename); |
| |
| extensions_request_context_ = |
| ChromeURLRequestContext::CreateOriginalForExtensions(this, cookie_path); |
| extensions_request_context_->AddRef(); |
| |
| DCHECK(extensions_request_context_->cookie_store()); |
| } |
| |
| return extensions_request_context_; |
| } |
| |
| Blacklist* ProfileImpl::GetBlacklist() { |
| return blacklist_; |
| } |
| |
| HistoryService* ProfileImpl::GetHistoryService(ServiceAccessType sat) { |
| if (!history_service_created_) { |
| history_service_created_ = true; |
| scoped_refptr<HistoryService> history(new HistoryService(this)); |
| if (!history->Init(GetPath(), GetBookmarkModel())) |
| return NULL; |
| history_service_.swap(history); |
| |
| // Send out the notification that the history service was created. |
| NotificationService::current()-> |
| Notify(NotificationType::HISTORY_CREATED, Source<Profile>(this), |
| Details<HistoryService>(history_service_.get())); |
| } |
| return history_service_.get(); |
| } |
| |
| TemplateURLModel* ProfileImpl::GetTemplateURLModel() { |
| if (!template_url_model_.get()) |
| template_url_model_.reset(new TemplateURLModel(this)); |
| return template_url_model_.get(); |
| } |
| |
| TemplateURLFetcher* ProfileImpl::GetTemplateURLFetcher() { |
| if (!template_url_fetcher_.get()) |
| template_url_fetcher_.reset(new TemplateURLFetcher(this)); |
| return template_url_fetcher_.get(); |
| } |
| |
| WebDataService* ProfileImpl::GetWebDataService(ServiceAccessType sat) { |
| if (!created_web_data_service_) |
| CreateWebDataService(); |
| return web_data_service_.get(); |
| } |
| |
| void ProfileImpl::CreateWebDataService() { |
| DCHECK(!created_web_data_service_ && web_data_service_.get() == NULL); |
| created_web_data_service_ = true; |
| scoped_refptr<WebDataService> wds(new WebDataService()); |
| if (!wds->Init(GetPath())) |
| return; |
| web_data_service_.swap(wds); |
| } |
| |
| PasswordStore* ProfileImpl::GetPasswordStore(ServiceAccessType sat) { |
| if (!created_password_store_) |
| CreatePasswordStore(); |
| return password_store_.get(); |
| } |
| |
| void ProfileImpl::CreatePasswordStore() { |
| DCHECK(!created_password_store_ && password_store_.get() == NULL); |
| created_password_store_ = true; |
| scoped_refptr<PasswordStore> ps; |
| #if defined(OS_LINUX) |
| // Temporarily disabled while we figure some stuff out. |
| // http://code.google.com/p/chromium/issues/detail?id=12351 |
| // if (getenv("KDE_FULL_SESSION")) { |
| // ps = new PasswordStoreKWallet(); |
| // } else { |
| // ps = new PasswordStoreGnome(); |
| // } |
| NOTIMPLEMENTED(); |
| #elif defined(OS_WIN) |
| ps = new PasswordStoreWin(GetWebDataService(Profile::IMPLICIT_ACCESS)); |
| #elif defined(OS_MACOSX) |
| FilePath login_db_file_path = GetPath(); |
| login_db_file_path = login_db_file_path.Append(chrome::kLoginDataFileName); |
| LoginDatabaseMac* login_db = new LoginDatabaseMac(); |
| if (!login_db->Init(login_db_file_path)) { |
| LOG(ERROR) << "Could not initialize login database."; |
| delete login_db; |
| return; |
| } |
| ps = new PasswordStoreMac(new MacKeychain(), login_db); |
| #else |
| NOTIMPLEMENTED(); |
| #endif |
| if (!ps || !ps->Init()) { |
| // Try falling back to the default password manager |
| LOG(WARNING) << "Could not initialise native password manager - " |
| "falling back to default"; |
| ps = new PasswordStoreDefault(GetWebDataService(Profile::IMPLICIT_ACCESS)); |
| if (!ps->Init()) |
| return; |
| } |
| password_store_.swap(ps); |
| } |
| |
| DownloadManager* ProfileImpl::GetDownloadManager() { |
| if (!created_download_manager_) { |
| scoped_refptr<DownloadManager> dlm(new DownloadManager); |
| dlm->Init(this); |
| created_download_manager_ = true; |
| download_manager_.swap(dlm); |
| } |
| return download_manager_.get(); |
| } |
| |
| bool ProfileImpl::HasCreatedDownloadManager() const { |
| return created_download_manager_; |
| } |
| |
| void ProfileImpl::InitThemes() { |
| if (!created_theme_provider_) { |
| #if defined(OS_LINUX) && !defined(TOOLKIT_VIEWS) |
| scoped_refptr<BrowserThemeProvider> themes(new GtkThemeProvider); |
| #else |
| scoped_refptr<BrowserThemeProvider> themes(new BrowserThemeProvider); |
| #endif |
| themes->Init(this); |
| created_theme_provider_ = true; |
| theme_provider_.swap(themes); |
| } |
| } |
| |
| void ProfileImpl::SetTheme(Extension* extension) { |
| InitThemes(); |
| theme_provider_.get()->SetTheme(extension); |
| } |
| |
| void ProfileImpl::SetNativeTheme() { |
| InitThemes(); |
| theme_provider_.get()->SetNativeTheme(); |
| } |
| |
| void ProfileImpl::ClearTheme() { |
| InitThemes(); |
| theme_provider_.get()->UseDefaultTheme(); |
| } |
| |
| ThemeProvider* ProfileImpl::GetThemeProvider() { |
| InitThemes(); |
| return theme_provider_.get(); |
| } |
| |
| SessionService* ProfileImpl::GetSessionService() { |
| if (!session_service_.get() && !shutdown_session_service_) { |
| session_service_ = new SessionService(this); |
| session_service_->ResetFromCurrentBrowsers(); |
| } |
| return session_service_.get(); |
| } |
| |
| void ProfileImpl::ShutdownSessionService() { |
| if (shutdown_session_service_) |
| return; |
| |
| // We're about to exit, force creation of the session service if it hasn't |
| // been created yet. We do this to ensure session state matches the point in |
| // time the user exited. |
| GetSessionService(); |
| shutdown_session_service_ = true; |
| session_service_ = NULL; |
| } |
| |
| bool ProfileImpl::HasSessionService() const { |
| return (session_service_.get() != NULL); |
| } |
| |
| std::wstring ProfileImpl::GetName() { |
| return GetPrefs()->GetString(prefs::kProfileName); |
| } |
| void ProfileImpl::SetName(const std::wstring& name) { |
| GetPrefs()->SetString(prefs::kProfileName, name); |
| } |
| |
| std::wstring ProfileImpl::GetID() { |
| return GetPrefs()->GetString(prefs::kProfileID); |
| } |
| void ProfileImpl::SetID(const std::wstring& id) { |
| GetPrefs()->SetString(prefs::kProfileID, id); |
| } |
| |
| bool ProfileImpl::DidLastSessionExitCleanly() { |
| // last_session_exited_cleanly_ is set when the preferences are loaded. Force |
| // it to be set by asking for the prefs. |
| GetPrefs(); |
| return last_session_exited_cleanly_; |
| } |
| |
| BookmarkModel* ProfileImpl::GetBookmarkModel() { |
| if (!bookmark_bar_model_.get()) { |
| bookmark_bar_model_.reset(new BookmarkModel(this)); |
| bookmark_bar_model_->Load(); |
| } |
| return bookmark_bar_model_.get(); |
| } |
| |
| bool ProfileImpl::IsSameProfile(Profile* profile) { |
| if (profile == static_cast<Profile*>(this)) |
| return true; |
| OffTheRecordProfileImpl* otr_profile = off_the_record_profile_.get(); |
| return otr_profile && profile == static_cast<Profile*>(otr_profile); |
| } |
| |
| Time ProfileImpl::GetStartTime() const { |
| return start_time_; |
| } |
| |
| TabRestoreService* ProfileImpl::GetTabRestoreService() { |
| if (!tab_restore_service_.get()) |
| tab_restore_service_ = new TabRestoreService(this); |
| return tab_restore_service_.get(); |
| } |
| |
| ThumbnailStore* ProfileImpl::GetThumbnailStore() { |
| if (!thumbnail_store_.get()) { |
| thumbnail_store_ = new ThumbnailStore; |
| thumbnail_store_->Init(GetPath().AppendASCII("Top Thumbnails"), this); |
| } |
| return thumbnail_store_.get(); |
| } |
| |
| void ProfileImpl::ResetTabRestoreService() { |
| tab_restore_service_ = NULL; |
| } |
| |
| // To be run in the IO thread to notify all resource message filters that the |
| // spellchecker has changed. |
| class NotifySpellcheckerChangeTask : public Task { |
| public: |
| NotifySpellcheckerChangeTask( |
| Profile* profile, |
| const SpellcheckerReinitializedDetails& spellchecker) |
| : profile_(profile), |
| spellchecker_(spellchecker) { |
| } |
| |
| private: |
| void Run(void) { |
| NotificationService::current()->Notify( |
| NotificationType::SPELLCHECKER_REINITIALIZED, |
| Source<Profile>(profile_), |
| Details<SpellcheckerReinitializedDetails>(&spellchecker_)); |
| } |
| |
| Profile* profile_; |
| SpellcheckerReinitializedDetails spellchecker_; |
| }; |
| |
| void ProfileImpl::InitializeSpellChecker(bool need_to_broadcast) { |
| // The I/O thread may be NULL during testing. |
| base::Thread* io_thread = g_browser_process->io_thread(); |
| if (spellchecker_) { |
| // The spellchecker must be deleted on the I/O thread. |
| // A dummy variable to aid in logical clarity. |
| SpellChecker* last_spellchecker = spellchecker_; |
| |
| if (io_thread) |
| io_thread->message_loop()->ReleaseSoon(FROM_HERE, last_spellchecker); |
| else // during testing, we don't have an I/O thread |
| last_spellchecker->Release(); |
| } |
| |
| // Retrieve the (perhaps updated recently) dictionary name from preferences. |
| PrefService* prefs = GetPrefs(); |
| bool enable_spellcheck = prefs->GetBoolean(prefs::kEnableSpellCheck); |
| |
| if (enable_spellcheck) { |
| FilePath dict_dir; |
| PathService::Get(chrome::DIR_APP_DICTIONARIES, &dict_dir); |
| // Note that, as the object pointed to by previously by spellchecker_ |
| // is being deleted in the io thread, the spellchecker_ can be made to point |
| // to a new object (RE-initialized) in parallel in this UI thread. |
| spellchecker_ = new SpellChecker(dict_dir, |
| WideToASCII(prefs->GetString(prefs::kSpellCheckDictionary)), |
| GetRequestContext(), |
| FilePath()); |
| spellchecker_->AddRef(); // Manual refcounting. |
| } else { |
| spellchecker_ = NULL; |
| } |
| |
| // Set auto spell correct status for spellchecker. |
| if (spellchecker_) { |
| spellchecker_->EnableAutoSpellCorrect( |
| prefs->GetBoolean(prefs::kEnableAutoSpellCorrect)); |
| } |
| |
| if (need_to_broadcast && io_thread) { // Notify resource message filters. |
| SpellcheckerReinitializedDetails scoped_spellchecker; |
| scoped_spellchecker.spellchecker = spellchecker_; |
| if (io_thread) { |
| io_thread->message_loop()->PostTask( |
| FROM_HERE, |
| new NotifySpellcheckerChangeTask(this, scoped_spellchecker)); |
| } |
| } |
| } |
| |
| void ProfileImpl::ReinitializeSpellChecker() { |
| InitializeSpellChecker(true); |
| } |
| |
| SpellChecker* ProfileImpl::GetSpellChecker() { |
| if (!spellchecker_) { |
| // This is where spellchecker gets initialized. Note that this is being |
| // initialized in the ui_thread. However, this is not a problem as long as |
| // it is *used* in the io thread. |
| // TODO(sidchat): One day, change everything so that spellchecker gets |
| // initialized in the IO thread itself. |
| InitializeSpellChecker(false); |
| } |
| |
| return spellchecker_; |
| } |
| |
| WebKitContext* ProfileImpl::GetWebKitContext() { |
| if (!webkit_context_.get()) |
| webkit_context_ = new WebKitContext(path_, false); |
| DCHECK(webkit_context_.get()); |
| return webkit_context_.get(); |
| } |
| |
| void ProfileImpl::MarkAsCleanShutdown() { |
| if (prefs_.get()) { |
| // The session cleanly exited, set kSessionExitedCleanly appropriately. |
| prefs_->SetBoolean(prefs::kSessionExitedCleanly, true); |
| |
| // NOTE: If you change what thread this writes on, be sure and update |
| // ChromeFrame::EndSession(). |
| prefs_->SavePersistentPrefs(); |
| } |
| } |
| |
| void ProfileImpl::Observe(NotificationType type, |
| const NotificationSource& source, |
| const NotificationDetails& details) { |
| if (NotificationType::PREF_CHANGED == type) { |
| std::wstring* pref_name_in = Details<std::wstring>(details).ptr(); |
| PrefService* prefs = Source<PrefService>(source).ptr(); |
| DCHECK(pref_name_in && prefs); |
| if (*pref_name_in == prefs::kSpellCheckDictionary || |
| *pref_name_in == prefs::kEnableSpellCheck || |
| *pref_name_in == prefs::kEnableAutoSpellCorrect) { |
| InitializeSpellChecker(true); |
| } |
| } else if (NotificationType::THEME_INSTALLED == type) { |
| Extension* extension = Details<Extension>(details).ptr(); |
| SetTheme(extension); |
| } |
| } |
| |
| void ProfileImpl::StopCreateSessionServiceTimer() { |
| create_session_service_timer_.Stop(); |
| } |
| |
| #ifdef CHROME_PERSONALIZATION |
| ProfilePersonalization* ProfileImpl::GetProfilePersonalization() { |
| return personalization_.get(); |
| } |
| #endif |