| // Copyright (c) 2010 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "chrome/browser/profile_impl.h" |
| |
| #include "app/resource_bundle.h" |
| #include "base/command_line.h" |
| #include "base/environment.h" |
| #include "base/file_path.h" |
| #include "base/file_util.h" |
| #include "base/histogram.h" |
| #include "base/path_service.h" |
| #include "base/scoped_ptr.h" |
| #include "base/string_number_conversions.h" |
| #include "base/string_util.h" |
| #include "chrome/browser/appcache/chrome_appcache_service.h" |
| #include "chrome/browser/autocomplete/autocomplete_classifier.h" |
| #include "chrome/browser/autofill/personal_data_manager.h" |
| #include "chrome/browser/background_contents_service.h" |
| #include "chrome/browser/background_mode_manager.h" |
| #include "chrome/browser/bookmarks/bookmark_model.h" |
| #include "chrome/browser/browser_list.h" |
| #include "chrome/browser/browser_process.h" |
| #include "chrome/browser/chrome_blob_storage_context.h" |
| #include "chrome/browser/chrome_thread.h" |
| #include "chrome/browser/dom_ui/ntp_resource_cache.h" |
| #include "chrome/browser/download/download_manager.h" |
| #include "chrome/browser/extensions/extension_devtools_manager.h" |
| #include "chrome/browser/extensions/extension_error_reporter.h" |
| #include "chrome/browser/extensions/extension_message_service.h" |
| #include "chrome/browser/extensions/extension_process_manager.h" |
| #include "chrome/browser/extensions/extensions_service.h" |
| #include "chrome/browser/extensions/user_script_master.h" |
| #include "chrome/browser/favicon_service.h" |
| #include "chrome/browser/file_system/file_system_host_context.h" |
| #include "chrome/browser/find_bar_state.h" |
| #include "chrome/browser/geolocation/geolocation_content_settings_map.h" |
| #include "chrome/browser/geolocation/geolocation_permission_context.h" |
| #include "chrome/browser/history/history.h" |
| #include "chrome/browser/history/top_sites.h" |
| #include "chrome/browser/host_content_settings_map.h" |
| #include "chrome/browser/host_zoom_map.h" |
| #include "chrome/browser/in_process_webkit/webkit_context.h" |
| #include "chrome/browser/net/chrome_url_request_context.h" |
| #include "chrome/browser/net/gaia/token_service.h" |
| #include "chrome/browser/net/ssl_config_service_manager.h" |
| #include "chrome/browser/notifications/desktop_notification_service.h" |
| #include "chrome/browser/password_manager/password_store_default.h" |
| #include "chrome/browser/prefs/browser_prefs.h" |
| #include "chrome/browser/prefs/pref_value_store.h" |
| #include "chrome/browser/printing/cloud_print/cloud_print_proxy_service.h" |
| #include "chrome/browser/profile_manager.h" |
| #include "chrome/browser/renderer_host/render_process_host.h" |
| #include "chrome/browser/search_engines/template_url_fetcher.h" |
| #include "chrome/browser/search_engines/template_url_model.h" |
| #include "chrome/browser/sessions/session_service.h" |
| #include "chrome/browser/sessions/tab_restore_service.h" |
| #include "chrome/browser/spellcheck_host.h" |
| #include "chrome/browser/ssl/ssl_host_state.h" |
| #include "chrome/browser/status_icons/status_tray.h" |
| #include "chrome/browser/sync/profile_sync_factory_impl.h" |
| #include "chrome/browser/sync/profile_sync_service.h" |
| #include "chrome/browser/tabs/pinned_tab_service.h" |
| #include "chrome/browser/themes/browser_theme_provider.h" |
| #include "chrome/browser/transport_security_persister.h" |
| #include "chrome/browser/user_style_sheet_watcher.h" |
| #include "chrome/browser/visitedlink_event_listener.h" |
| #include "chrome/browser/visitedlink_master.h" |
| #include "chrome/browser/web_resource/web_resource_service.h" |
| #include "chrome/browser/webdata/web_data_service.h" |
| #include "chrome/common/chrome_constants.h" |
| #include "chrome/common/chrome_paths.h" |
| #include "chrome/common/chrome_switches.h" |
| #include "chrome/common/json_pref_store.h" |
| #include "chrome/common/notification_service.h" |
| #include "chrome/common/pref_names.h" |
| #include "chrome/common/render_messages.h" |
| #include "grit/browser_resources.h" |
| #include "grit/locale_settings.h" |
| #include "net/base/transport_security_state.h" |
| #include "webkit/database/database_tracker.h" |
| |
| #if defined(TOOLKIT_USES_GTK) |
| #include "chrome/browser/gtk/gtk_theme_provider.h" |
| #endif |
| |
| #if defined(OS_WIN) |
| #include "chrome/browser/password_manager/password_store_win.h" |
| #elif defined(OS_MACOSX) |
| #include "chrome/browser/keychain_mac.h" |
| #include "chrome/browser/password_manager/password_store_mac.h" |
| #elif defined(OS_CHROMEOS) |
| #include "chrome/browser/chromeos/proxy_config_service_impl.h" |
| #elif defined(OS_POSIX) && !defined(OS_CHROMEOS) |
| #include "base/xdg_util.h" |
| #if defined(USE_GNOME_KEYRING) |
| #include "chrome/browser/password_manager/native_backend_gnome_x.h" |
| #endif |
| #include "chrome/browser/password_manager/native_backend_kwallet_x.h" |
| #include "chrome/browser/password_manager/password_store_x.h" |
| #endif |
| |
| #if defined(OS_CHROMEOS) |
| #include "chrome/browser/chromeos/preferences.h" |
| #endif |
| |
| using base::Time; |
| using base::TimeDelta; |
| |
| namespace { |
| |
| void CleanupRequestContext(ChromeURLRequestContextGetter* context) { |
| if (context) |
| context->CleanupOnUIThread(); |
| } |
| |
| // Delay, in milliseconds, before we explicitly create the SessionService. |
| static const int kCreateSessionServiceDelayMS = 500; |
| |
| enum ContextType { |
| kNormalContext, |
| kMediaContext |
| }; |
| |
| // Gets the cache parameters from the command line. |type| is the type of |
| // request context that we need, |cache_path| will be set to the user provided |
| // path, or will not be touched if there is not an argument. |max_size| will |
| // be the user provided value or zero by default. |
| void GetCacheParameters(ContextType type, FilePath* cache_path, |
| int* max_size) { |
| DCHECK(cache_path); |
| DCHECK(max_size); |
| |
| // Override the cache location if specified by the user. |
| if (CommandLine::ForCurrentProcess()->HasSwitch(switches::kDiskCacheDir)) { |
| *cache_path = CommandLine::ForCurrentProcess()->GetSwitchValuePath( |
| switches::kDiskCacheDir); |
| } |
| |
| const char* arg = kNormalContext == type ? switches::kDiskCacheSize : |
| switches::kMediaCacheSize; |
| std::string value = |
| CommandLine::ForCurrentProcess()->GetSwitchValueASCII(arg); |
| |
| // By default we let the cache determine the right size. |
| *max_size = 0; |
| if (!base::StringToInt(value, max_size)) { |
| *max_size = 0; |
| } else if (max_size < 0) { |
| *max_size = 0; |
| } |
| } |
| |
| FilePath GetCachePath(const FilePath& base) { |
| return base.Append(chrome::kCacheDirname); |
| } |
| |
| FilePath GetMediaCachePath(const FilePath& base) { |
| return base.Append(chrome::kMediaCacheDirname); |
| } |
| |
| bool HasACacheSubdir(const FilePath &dir) { |
| return file_util::PathExists(GetCachePath(dir)) || |
| file_util::PathExists(GetMediaCachePath(dir)); |
| } |
| |
| void PostExtensionLoadedToContextGetter(ChromeURLRequestContextGetter* getter, |
| Extension* extension) { |
| if (!getter) |
| return; |
| // Callee takes ownership of new ExtensionInfo struct. |
| ChromeThread::PostTask( |
| ChromeThread::IO, FROM_HERE, |
| NewRunnableMethod(getter, |
| &ChromeURLRequestContextGetter::OnNewExtensions, |
| extension->id(), |
| new ChromeURLRequestContext::ExtensionInfo( |
| extension->name(), |
| extension->path(), |
| extension->default_locale(), |
| extension->incognito_split_mode(), |
| extension->web_extent(), |
| extension->GetEffectiveHostPermissions(), |
| extension->api_permissions()))); |
| } |
| |
| void PostExtensionUnloadedToContextGetter(ChromeURLRequestContextGetter* getter, |
| Extension* extension) { |
| if (!getter) |
| return; |
| ChromeThread::PostTask( |
| ChromeThread::IO, FROM_HERE, |
| NewRunnableMethod(getter, |
| &ChromeURLRequestContextGetter::OnUnloadedExtension, |
| extension->id())); |
| } |
| |
| // Returns true if the default apps should be loaded (so that the app panel is |
| // not empty). |
| bool IncludeDefaultApps() { |
| #if defined(OS_CHROMEOS) && defined(GOOGLE_CHROME_BUILD) |
| return true; |
| #endif |
| return false; |
| } |
| |
| // Simple task to log the size of the current profile. |
| class ProfileSizeTask : public Task { |
| public: |
| explicit ProfileSizeTask(const FilePath& path) : path_(path) {} |
| virtual ~ProfileSizeTask() {} |
| |
| virtual void Run(); |
| private: |
| FilePath path_; |
| }; |
| |
| void ProfileSizeTask::Run() { |
| int64 size = file_util::ComputeFilesSize(path_, FILE_PATH_LITERAL("*")); |
| int size_MB = static_cast<int>(size / (1024 * 1024)); |
| UMA_HISTOGRAM_COUNTS_10000("Profile.TotalSize", size_MB); |
| |
| size = file_util::ComputeFilesSize(path_, FILE_PATH_LITERAL("History")); |
| size_MB = static_cast<int>(size / (1024 * 1024)); |
| UMA_HISTOGRAM_COUNTS_10000("Profile.HistorySize", size_MB); |
| |
| size = file_util::ComputeFilesSize(path_, FILE_PATH_LITERAL("History*")); |
| size_MB = static_cast<int>(size / (1024 * 1024)); |
| UMA_HISTOGRAM_COUNTS_10000("Profile.TotalHistorySize", size_MB); |
| |
| size = file_util::ComputeFilesSize(path_, FILE_PATH_LITERAL("Cookies")); |
| size_MB = static_cast<int>(size / (1024 * 1024)); |
| UMA_HISTOGRAM_COUNTS_10000("Profile.CookiesSize", size_MB); |
| |
| size = file_util::ComputeFilesSize(path_, FILE_PATH_LITERAL("Bookmarks")); |
| size_MB = static_cast<int>(size / (1024 * 1024)); |
| UMA_HISTOGRAM_COUNTS_10000("Profile.BookmarksSize", size_MB); |
| |
| size = file_util::ComputeFilesSize(path_, FILE_PATH_LITERAL("Favicons")); |
| size_MB = static_cast<int>(size / (1024 * 1024)); |
| UMA_HISTOGRAM_COUNTS_10000("Profile.FaviconsSize", size_MB); |
| |
| size = file_util::ComputeFilesSize(path_, FILE_PATH_LITERAL("Top Sites")); |
| size_MB = static_cast<int>(size / (1024 * 1024)); |
| UMA_HISTOGRAM_COUNTS_10000("Profile.TopSitesSize", size_MB); |
| |
| size = file_util::ComputeFilesSize(path_, FILE_PATH_LITERAL("Visited Links")); |
| size_MB = static_cast<int>(size / (1024 * 1024)); |
| UMA_HISTOGRAM_COUNTS_10000("Profile.VisitedLinksSize", size_MB); |
| |
| size = file_util::ComputeFilesSize(path_, FILE_PATH_LITERAL("Web Data")); |
| size_MB = static_cast<int>(size / (1024 * 1024)); |
| UMA_HISTOGRAM_COUNTS_10000("Profile.WebDataSize", size_MB); |
| |
| size = file_util::ComputeFilesSize(path_, FILE_PATH_LITERAL("Extension*")); |
| size_MB = static_cast<int>(size / (1024 * 1024)); |
| UMA_HISTOGRAM_COUNTS_10000("Profile.ExtensionSize", size_MB); |
| } |
| |
| } // namespace |
| |
| // static |
| Profile* Profile::CreateProfile(const FilePath& path) { |
| return new ProfileImpl(path); |
| } |
| |
| ProfileImpl::ProfileImpl(const FilePath& path) |
| : path_(path), |
| visited_link_event_listener_(new VisitedLinkEventListener()), |
| extension_devtools_manager_(NULL), |
| request_context_(NULL), |
| media_request_context_(NULL), |
| extensions_request_context_(NULL), |
| host_content_settings_map_(NULL), |
| host_zoom_map_(NULL), |
| history_service_created_(false), |
| favicon_service_created_(false), |
| created_web_data_service_(false), |
| created_password_store_(false), |
| created_download_manager_(false), |
| created_theme_provider_(false), |
| start_time_(Time::Now()), |
| spellcheck_host_(NULL), |
| spellcheck_host_ready_(false), |
| shutdown_session_service_(false) { |
| DCHECK(!path.empty()) << "Using an empty path will attempt to write " << |
| "profile files to the root directory!"; |
| create_session_service_timer_.Start( |
| TimeDelta::FromMilliseconds(kCreateSessionServiceDelayMS), this, |
| &ProfileImpl::EnsureSessionServiceCreated); |
| |
| PrefService* prefs = GetPrefs(); |
| prefs->AddPrefObserver(prefs::kSpellCheckDictionary, this); |
| prefs->AddPrefObserver(prefs::kEnableSpellCheck, this); |
| prefs->AddPrefObserver(prefs::kEnableAutoSpellCorrect, this); |
| |
| #if defined(OS_MACOSX) |
| // If the profile directory doesn't already have a cache directory and it |
| // is under ~/Library/Application Support, use a suitable cache directory |
| // under ~/Library/Caches. For example, a profile directory of |
| // ~/Library/Application Support/Google/Chrome/MyProfileName that doesn't |
| // have a "Cache" or "MediaCache" subdirectory would use the cache directory |
| // ~/Library/Caches/Google/Chrome/MyProfileName. |
| // |
| // TODO(akalin): Come up with unit tests for this. |
| if (!HasACacheSubdir(path_)) { |
| FilePath app_data_path, user_cache_path; |
| if (PathService::Get(base::DIR_APP_DATA, &app_data_path) && |
| PathService::Get(base::DIR_USER_CACHE, &user_cache_path) && |
| app_data_path.AppendRelativePath(path_, &user_cache_path)) { |
| base_cache_path_ = user_cache_path; |
| } |
| } |
| #elif defined(OS_POSIX) // Posix minus Mac. |
| // See http://standards.freedesktop.org/basedir-spec/basedir-spec-latest.html |
| // for a spec on where cache files go. The net effect for most systems is we |
| // use ~/.cache/chromium/ for Chromium and ~/.cache/google-chrome/ for |
| // official builds. |
| #if defined(GOOGLE_CHROME_BUILD) |
| const char kCacheDir[] = "google-chrome"; |
| #else |
| const char kCacheDir[] = "chromium"; |
| #endif |
| PathService::Get(base::DIR_USER_CACHE, &base_cache_path_); |
| base_cache_path_ = base_cache_path_.Append(kCacheDir); |
| if (!file_util::PathExists(base_cache_path_)) |
| file_util::CreateDirectory(base_cache_path_); |
| #endif |
| if (base_cache_path_.empty()) |
| base_cache_path_ = path_; |
| |
| // Listen for theme installation. |
| registrar_.Add(this, NotificationType::THEME_INSTALLED, |
| NotificationService::AllSources()); |
| |
| // Listen for bookmark model load, to bootstrap the sync service. |
| registrar_.Add(this, NotificationType::BOOKMARK_MODEL_LOADED, |
| Source<Profile>(this)); |
| |
| ssl_config_service_manager_.reset( |
| SSLConfigServiceManager::CreateDefaultManager(this)); |
| |
| #if defined(OS_CHROMEOS) |
| chromeos_preferences_.reset(new chromeos::Preferences(this)); |
| chromeos_preferences_->Init(prefs); |
| #endif |
| |
| pinned_tab_service_.reset(new PinnedTabService(this)); |
| |
| // Initialize the BackgroundModeManager - this has to be done here before |
| // InitExtensions() is called because it relies on receiving notifications |
| // when extensions are loaded. BackgroundModeManager is not needed under |
| // ChromeOS because Chrome is always running (no need for special keep-alive |
| // or launch-on-startup support). |
| #if !defined(OS_CHROMEOS) |
| background_mode_manager_.reset(new BackgroundModeManager(this, |
| CommandLine::ForCurrentProcess())); |
| #endif |
| |
| background_contents_service_.reset( |
| new BackgroundContentsService(this, CommandLine::ForCurrentProcess())); |
| |
| // Log the profile size after a reasonable startup delay. |
| ChromeThread::PostDelayedTask(ChromeThread::FILE, FROM_HERE, |
| new ProfileSizeTask(path_), 112000); |
| } |
| |
| void ProfileImpl::InitExtensions() { |
| if (user_script_master_ || extensions_service_) |
| return; // Already initialized. |
| |
| const CommandLine* command_line = CommandLine::ForCurrentProcess(); |
| if (command_line->HasSwitch( |
| switches::kEnableExtensionTimelineApi)) { |
| extension_devtools_manager_ = new ExtensionDevToolsManager(this); |
| } |
| |
| extension_process_manager_.reset(ExtensionProcessManager::Create(this)); |
| extension_message_service_ = new ExtensionMessageService(this); |
| |
| ExtensionErrorReporter::Init(true); // allow noisy errors. |
| |
| FilePath script_dir; // Don't look for user scripts in any directory. |
| // TODO(aa): We should just remove this functionality, |
| // since it isn't used anymore. |
| user_script_master_ = new UserScriptMaster(script_dir, this); |
| |
| extensions_service_ = new ExtensionsService( |
| this, |
| CommandLine::ForCurrentProcess(), |
| GetPrefs(), |
| GetPath().AppendASCII(ExtensionsService::kInstallDirectoryName), |
| true); |
| |
| // Register the component extensions. |
| typedef std::list<std::pair<std::string, int> > ComponentExtensionList; |
| ComponentExtensionList component_extensions; |
| |
| // Bookmark manager. |
| component_extensions.push_back( |
| std::make_pair("bookmark_manager", IDR_BOOKMARKS_MANIFEST)); |
| |
| #if defined(TOUCH_UI) |
| component_extensions.push_back( |
| std::make_pair("keyboard", IDR_KEYBOARD_MANIFEST)); |
| #endif |
| |
| // Web Store. |
| component_extensions.push_back( |
| std::make_pair("web_store", IDR_WEBSTORE_MANIFEST)); |
| |
| // Some sample apps to make our lives easier while we are developing extension |
| // apps. This way we don't have to constantly install these over and over. |
| if (Extension::AppsAreEnabled() && IncludeDefaultApps()) { |
| component_extensions.push_back( |
| std::make_pair("gmail_app", IDR_GMAIL_APP_MANIFEST)); |
| component_extensions.push_back( |
| std::make_pair("calendar_app", IDR_CALENDAR_APP_MANIFEST)); |
| component_extensions.push_back( |
| std::make_pair("docs_app", IDR_DOCS_APP_MANIFEST)); |
| } |
| |
| #if defined(OS_CHROMEOS) && defined(GOOGLE_CHROME_BUILD) |
| if (Extension::AppsAreEnabled()) { |
| component_extensions.push_back( |
| std::make_pair("chat_manager", IDR_TALK_APP_MANIFEST)); |
| } |
| #endif |
| |
| for (ComponentExtensionList::iterator iter = component_extensions.begin(); |
| iter != component_extensions.end(); ++iter) { |
| FilePath path; |
| if (PathService::Get(chrome::DIR_RESOURCES, &path)) { |
| path = path.AppendASCII(iter->first); |
| } else { |
| NOTREACHED(); |
| } |
| |
| std::string manifest = |
| ResourceBundle::GetSharedInstance().GetRawDataResource( |
| iter->second).as_string(); |
| extensions_service_->register_component_extension( |
| ExtensionsService::ComponentExtensionInfo(manifest, path)); |
| } |
| |
| extensions_service_->Init(); |
| |
| // Load any extensions specified with --load-extension. |
| if (command_line->HasSwitch(switches::kLoadExtension)) { |
| FilePath path = command_line->GetSwitchValuePath(switches::kLoadExtension); |
| extensions_service_->LoadExtension(path); |
| } |
| } |
| |
| void ProfileImpl::InitWebResources() { |
| if (web_resource_service_) |
| return; |
| |
| web_resource_service_ = new WebResourceService(this); |
| web_resource_service_->StartAfterDelay(); |
| } |
| |
| NTPResourceCache* ProfileImpl::GetNTPResourceCache() { |
| if (!ntp_resource_cache_.get()) |
| ntp_resource_cache_.reset(new NTPResourceCache(this)); |
| return ntp_resource_cache_.get(); |
| } |
| |
| FilePath ProfileImpl::last_selected_directory() { |
| return GetPrefs()->GetFilePath(prefs::kSelectFileLastDirectory); |
| } |
| |
| void ProfileImpl::set_last_selected_directory(const FilePath& path) { |
| GetPrefs()->SetFilePath(prefs::kSelectFileLastDirectory, path); |
| } |
| |
| ProfileImpl::~ProfileImpl() { |
| NotificationService::current()->Notify( |
| NotificationType::PROFILE_DESTROYED, |
| Source<Profile>(this), |
| NotificationService::NoDetails()); |
| |
| tab_restore_service_ = NULL; |
| |
| StopCreateSessionServiceTimer(); |
| // TemplateURLModel schedules a task on the WebDataService from its |
| // destructor. Delete it first to ensure the task gets scheduled before we |
| // shut down the database. |
| template_url_model_.reset(); |
| |
| // DownloadManager is lazily created, so check before accessing it. |
| if (download_manager_.get()) { |
| // The download manager queries the history system and should be shutdown |
| // before the history is shutdown so it can properly cancel all requests. |
| download_manager_->Shutdown(); |
| download_manager_ = NULL; |
| } |
| |
| // The theme provider provides bitmaps to whoever wants them. |
| theme_provider_.reset(); |
| |
| // Remove pref observers. |
| PrefService* prefs = GetPrefs(); |
| prefs->RemovePrefObserver(prefs::kSpellCheckDictionary, this); |
| prefs->RemovePrefObserver(prefs::kEnableSpellCheck, this); |
| prefs->RemovePrefObserver(prefs::kEnableAutoSpellCorrect, this); |
| |
| // Delete the NTP resource cache so we can unregister pref observers. |
| ntp_resource_cache_.reset(); |
| |
| // The sync service needs to be deleted before the services it calls. |
| sync_service_.reset(); |
| |
| // Both HistoryService and WebDataService maintain threads for background |
| // processing. Its possible each thread still has tasks on it that have |
| // increased the ref count of the service. In such a situation, when we |
| // decrement the refcount, it won't be 0, and the threads/databases aren't |
| // properly shut down. By explicitly calling Cleanup/Shutdown we ensure the |
| // databases are properly closed. |
| if (web_data_service_.get()) |
| web_data_service_->Shutdown(); |
| |
| if (top_sites_.get()) |
| top_sites_->ClearProfile(); |
| |
| if (history_service_.get()) |
| history_service_->Cleanup(); |
| |
| if (spellcheck_host_.get()) |
| spellcheck_host_->UnsetObserver(); |
| |
| if (default_request_context_ == request_context_) |
| default_request_context_ = NULL; |
| |
| CleanupRequestContext(request_context_); |
| CleanupRequestContext(media_request_context_); |
| CleanupRequestContext(extensions_request_context_); |
| |
| // HistoryService may call into the BookmarkModel, as such we need to |
| // delete HistoryService before the BookmarkModel. The destructor for |
| // HistoryService will join with HistoryService's backend thread so that |
| // by the time the destructor has finished we're sure it will no longer call |
| // into the BookmarkModel. |
| history_service_ = NULL; |
| bookmark_bar_model_.reset(); |
| |
| // FaviconService depends on HistoryServce so make sure we delete |
| // HistoryService first. |
| favicon_service_ = NULL; |
| |
| if (extension_message_service_) |
| extension_message_service_->DestroyingProfile(); |
| |
| if (extensions_service_) |
| extensions_service_->DestroyingProfile(); |
| |
| // This causes the Preferences file to be written to disk. |
| MarkAsCleanShutdown(); |
| } |
| |
| ProfileId ProfileImpl::GetRuntimeId() { |
| return reinterpret_cast<ProfileId>(this); |
| } |
| |
| FilePath ProfileImpl::GetPath() { |
| return path_; |
| } |
| |
| bool ProfileImpl::IsOffTheRecord() { |
| return false; |
| } |
| |
| Profile* ProfileImpl::GetOffTheRecordProfile() { |
| if (!off_the_record_profile_.get()) { |
| scoped_ptr<Profile> p(CreateOffTheRecordProfile()); |
| off_the_record_profile_.swap(p); |
| } |
| return off_the_record_profile_.get(); |
| } |
| |
| void ProfileImpl::DestroyOffTheRecordProfile() { |
| off_the_record_profile_.reset(); |
| } |
| |
| bool ProfileImpl::HasOffTheRecordProfile() { |
| return off_the_record_profile_.get() != NULL; |
| } |
| |
| Profile* ProfileImpl::GetOriginalProfile() { |
| return this; |
| } |
| |
| ChromeAppCacheService* ProfileImpl::GetAppCacheService() { |
| if (!appcache_service_) { |
| appcache_service_ = new ChromeAppCacheService; |
| ChromeThread::PostTask( |
| ChromeThread::IO, FROM_HERE, |
| NewRunnableMethod(appcache_service_.get(), |
| &ChromeAppCacheService::InitializeOnIOThread, |
| GetPath(), IsOffTheRecord(), |
| make_scoped_refptr(GetHostContentSettingsMap()))); |
| } |
| return appcache_service_; |
| } |
| |
| webkit_database::DatabaseTracker* ProfileImpl::GetDatabaseTracker() { |
| if (!db_tracker_) { |
| db_tracker_ = new webkit_database::DatabaseTracker( |
| GetPath(), IsOffTheRecord()); |
| } |
| return db_tracker_; |
| } |
| |
| VisitedLinkMaster* ProfileImpl::GetVisitedLinkMaster() { |
| if (!visited_link_master_.get()) { |
| scoped_ptr<VisitedLinkMaster> visited_links( |
| new VisitedLinkMaster(visited_link_event_listener_.get(), this)); |
| if (!visited_links->Init()) |
| return NULL; |
| visited_link_master_.swap(visited_links); |
| } |
| |
| return visited_link_master_.get(); |
| } |
| |
| ExtensionsService* ProfileImpl::GetExtensionsService() { |
| return extensions_service_.get(); |
| } |
| |
| BackgroundContentsService* ProfileImpl::GetBackgroundContentsService() { |
| return background_contents_service_.get(); |
| } |
| |
| StatusTray* ProfileImpl::GetStatusTray() { |
| if (!status_tray_.get()) |
| status_tray_.reset(StatusTray::Create()); |
| return status_tray_.get(); |
| } |
| |
| UserScriptMaster* ProfileImpl::GetUserScriptMaster() { |
| return user_script_master_.get(); |
| } |
| |
| ExtensionDevToolsManager* ProfileImpl::GetExtensionDevToolsManager() { |
| return extension_devtools_manager_.get(); |
| } |
| |
| ExtensionProcessManager* ProfileImpl::GetExtensionProcessManager() { |
| return extension_process_manager_.get(); |
| } |
| |
| ExtensionMessageService* ProfileImpl::GetExtensionMessageService() { |
| return extension_message_service_.get(); |
| } |
| |
| SSLHostState* ProfileImpl::GetSSLHostState() { |
| if (!ssl_host_state_.get()) |
| ssl_host_state_.reset(new SSLHostState()); |
| |
| DCHECK(ssl_host_state_->CalledOnValidThread()); |
| return ssl_host_state_.get(); |
| } |
| |
| net::TransportSecurityState* |
| ProfileImpl::GetTransportSecurityState() { |
| if (!transport_security_state_.get()) { |
| transport_security_state_ = new net::TransportSecurityState(); |
| transport_security_persister_ = |
| new TransportSecurityPersister(); |
| transport_security_persister_->Initialize( |
| transport_security_state_.get(), path_); |
| } |
| |
| return transport_security_state_.get(); |
| } |
| |
| PrefService* ProfileImpl::GetPrefs() { |
| if (!prefs_.get()) { |
| prefs_.reset(PrefService::CreatePrefService(GetPrefFilePath(), |
| GetOriginalProfile())); |
| |
| // The Profile class and ProfileManager class may read some prefs so |
| // register known prefs as soon as possible. |
| Profile::RegisterUserPrefs(prefs_.get()); |
| browser::RegisterUserPrefs(prefs_.get()); |
| |
| // The last session exited cleanly if there is no pref for |
| // kSessionExitedCleanly or the value for kSessionExitedCleanly is true. |
| last_session_exited_cleanly_ = |
| prefs_->GetBoolean(prefs::kSessionExitedCleanly); |
| // Mark the session as open. |
| prefs_->SetBoolean(prefs::kSessionExitedCleanly, false); |
| // Make sure we save to disk that the session has opened. |
| prefs_->ScheduleSavePersistentPrefs(); |
| } |
| |
| return prefs_.get(); |
| } |
| |
| FilePath ProfileImpl::GetPrefFilePath() { |
| FilePath pref_file_path = path_; |
| pref_file_path = pref_file_path.Append(chrome::kPreferencesFilename); |
| return pref_file_path; |
| } |
| |
| URLRequestContextGetter* ProfileImpl::GetRequestContext() { |
| if (!request_context_) { |
| FilePath cookie_path = GetPath(); |
| cookie_path = cookie_path.Append(chrome::kCookieFilename); |
| FilePath cache_path = base_cache_path_; |
| int max_size; |
| GetCacheParameters(kNormalContext, &cache_path, &max_size); |
| |
| cache_path = GetCachePath(cache_path); |
| request_context_ = ChromeURLRequestContextGetter::CreateOriginal( |
| this, cookie_path, cache_path, max_size); |
| |
| // The first request context is always a normal (non-OTR) request context. |
| // Even when Chromium is started in OTR mode, a normal profile is always |
| // created first. |
| if (!default_request_context_) { |
| default_request_context_ = request_context_; |
| // TODO(eroman): this isn't terribly useful anymore now that the |
| // URLRequestContext is constructed by the IO thread... |
| NotificationService::current()->Notify( |
| NotificationType::DEFAULT_REQUEST_CONTEXT_AVAILABLE, |
| NotificationService::AllSources(), NotificationService::NoDetails()); |
| } |
| } |
| |
| return request_context_; |
| } |
| |
| URLRequestContextGetter* ProfileImpl::GetRequestContextForMedia() { |
| if (!media_request_context_) { |
| FilePath cache_path = base_cache_path_; |
| int max_size; |
| GetCacheParameters(kMediaContext, &cache_path, &max_size); |
| |
| cache_path = GetMediaCachePath(cache_path); |
| media_request_context_ = |
| ChromeURLRequestContextGetter::CreateOriginalForMedia( |
| this, cache_path, max_size); |
| } |
| |
| return media_request_context_; |
| } |
| |
| FaviconService* ProfileImpl::GetFaviconService(ServiceAccessType sat) { |
| if (!favicon_service_created_) { |
| favicon_service_created_ = true; |
| scoped_refptr<FaviconService> service(new FaviconService(this)); |
| favicon_service_.swap(service); |
| } |
| return favicon_service_.get(); |
| } |
| |
| URLRequestContextGetter* ProfileImpl::GetRequestContextForExtensions() { |
| if (!extensions_request_context_) { |
| FilePath cookie_path = GetPath(); |
| cookie_path = cookie_path.Append(chrome::kExtensionsCookieFilename); |
| |
| extensions_request_context_ = |
| ChromeURLRequestContextGetter::CreateOriginalForExtensions( |
| this, cookie_path); |
| } |
| |
| return extensions_request_context_; |
| } |
| |
| // TODO(mpcomplete): This is lame. 5+ copies of the extension data on the IO |
| // thread. We should have 1 shared data object that all the contexts get access |
| // to. Fix by M8. |
| void ProfileImpl::RegisterExtensionWithRequestContexts( |
| Extension* extension) { |
| // Notify the default, extension and media contexts on the IO thread. |
| PostExtensionLoadedToContextGetter( |
| static_cast<ChromeURLRequestContextGetter*>(GetRequestContext()), |
| extension); |
| PostExtensionLoadedToContextGetter( |
| static_cast<ChromeURLRequestContextGetter*>( |
| GetRequestContextForExtensions()), |
| extension); |
| PostExtensionLoadedToContextGetter( |
| static_cast<ChromeURLRequestContextGetter*>( |
| GetRequestContextForMedia()), |
| extension); |
| |
| // Ditto for OTR if it's active, except for the media context which is the |
| // same as the regular context. |
| if (off_the_record_profile_.get()) { |
| PostExtensionLoadedToContextGetter( |
| static_cast<ChromeURLRequestContextGetter*>( |
| off_the_record_profile_->GetRequestContext()), |
| extension); |
| PostExtensionLoadedToContextGetter( |
| static_cast<ChromeURLRequestContextGetter*>( |
| off_the_record_profile_->GetRequestContextForExtensions()), |
| extension); |
| } |
| } |
| |
| void ProfileImpl::UnregisterExtensionWithRequestContexts( |
| Extension* extension) { |
| // Notify the default, extension and media contexts on the IO thread. |
| PostExtensionUnloadedToContextGetter( |
| static_cast<ChromeURLRequestContextGetter*>(GetRequestContext()), |
| extension); |
| PostExtensionUnloadedToContextGetter( |
| static_cast<ChromeURLRequestContextGetter*>( |
| GetRequestContextForExtensions()), |
| extension); |
| PostExtensionUnloadedToContextGetter( |
| static_cast<ChromeURLRequestContextGetter*>( |
| GetRequestContextForMedia()), |
| extension); |
| |
| // Ditto for OTR if it's active, except for the media context which is the |
| // same as the regular context. |
| if (off_the_record_profile_.get()) { |
| PostExtensionUnloadedToContextGetter( |
| static_cast<ChromeURLRequestContextGetter*>( |
| off_the_record_profile_->GetRequestContext()), |
| extension); |
| PostExtensionUnloadedToContextGetter( |
| static_cast<ChromeURLRequestContextGetter*>( |
| off_the_record_profile_->GetRequestContextForExtensions()), |
| extension); |
| } |
| } |
| |
| net::SSLConfigService* ProfileImpl::GetSSLConfigService() { |
| return ssl_config_service_manager_->Get(); |
| } |
| |
| HostContentSettingsMap* ProfileImpl::GetHostContentSettingsMap() { |
| if (!host_content_settings_map_.get()) |
| host_content_settings_map_ = new HostContentSettingsMap(this); |
| return host_content_settings_map_.get(); |
| } |
| |
| HostZoomMap* ProfileImpl::GetHostZoomMap() { |
| if (!host_zoom_map_) |
| host_zoom_map_ = new HostZoomMap(this); |
| return host_zoom_map_.get(); |
| } |
| |
| GeolocationContentSettingsMap* ProfileImpl::GetGeolocationContentSettingsMap() { |
| if (!geolocation_content_settings_map_.get()) |
| geolocation_content_settings_map_ = new GeolocationContentSettingsMap(this); |
| return geolocation_content_settings_map_.get(); |
| } |
| |
| GeolocationPermissionContext* ProfileImpl::GetGeolocationPermissionContext() { |
| if (!geolocation_permission_context_.get()) |
| geolocation_permission_context_ = new GeolocationPermissionContext(this); |
| return geolocation_permission_context_.get(); |
| } |
| |
| UserStyleSheetWatcher* ProfileImpl::GetUserStyleSheetWatcher() { |
| if (!user_style_sheet_watcher_.get()) { |
| user_style_sheet_watcher_ = new UserStyleSheetWatcher(GetPath()); |
| user_style_sheet_watcher_->Init(); |
| } |
| return user_style_sheet_watcher_.get(); |
| } |
| |
| FindBarState* ProfileImpl::GetFindBarState() { |
| if (!find_bar_state_.get()) { |
| find_bar_state_.reset(new FindBarState()); |
| } |
| return find_bar_state_.get(); |
| } |
| |
| HistoryService* ProfileImpl::GetHistoryService(ServiceAccessType sat) { |
| if (!history_service_created_) { |
| history_service_created_ = true; |
| scoped_refptr<HistoryService> history(new HistoryService(this)); |
| if (!history->Init(GetPath(), GetBookmarkModel())) |
| return NULL; |
| history_service_.swap(history); |
| |
| // Send out the notification that the history service was created. |
| NotificationService::current()-> |
| Notify(NotificationType::HISTORY_CREATED, Source<Profile>(this), |
| Details<HistoryService>(history_service_.get())); |
| } |
| return history_service_.get(); |
| } |
| |
| HistoryService* ProfileImpl::GetHistoryServiceWithoutCreating() { |
| return history_service_.get(); |
| } |
| |
| TemplateURLModel* ProfileImpl::GetTemplateURLModel() { |
| if (!template_url_model_.get()) |
| template_url_model_.reset(new TemplateURLModel(this)); |
| return template_url_model_.get(); |
| } |
| |
| TemplateURLFetcher* ProfileImpl::GetTemplateURLFetcher() { |
| if (!template_url_fetcher_.get()) |
| template_url_fetcher_.reset(new TemplateURLFetcher(this)); |
| return template_url_fetcher_.get(); |
| } |
| |
| AutocompleteClassifier* ProfileImpl::GetAutocompleteClassifier() { |
| if (!autocomplete_classifier_.get()) |
| autocomplete_classifier_.reset(new AutocompleteClassifier(this)); |
| return autocomplete_classifier_.get(); |
| } |
| |
| WebDataService* ProfileImpl::GetWebDataService(ServiceAccessType sat) { |
| if (!created_web_data_service_) |
| CreateWebDataService(); |
| return web_data_service_.get(); |
| } |
| |
| WebDataService* ProfileImpl::GetWebDataServiceWithoutCreating() { |
| return web_data_service_.get(); |
| } |
| |
| void ProfileImpl::CreateWebDataService() { |
| DCHECK(!created_web_data_service_ && web_data_service_.get() == NULL); |
| created_web_data_service_ = true; |
| scoped_refptr<WebDataService> wds(new WebDataService()); |
| if (!wds->Init(GetPath())) |
| return; |
| web_data_service_.swap(wds); |
| } |
| |
| PasswordStore* ProfileImpl::GetPasswordStore(ServiceAccessType sat) { |
| if (!created_password_store_) |
| CreatePasswordStore(); |
| return password_store_.get(); |
| } |
| |
| void ProfileImpl::CreatePasswordStore() { |
| DCHECK(!created_password_store_ && password_store_.get() == NULL); |
| created_password_store_ = true; |
| scoped_refptr<PasswordStore> ps; |
| FilePath login_db_file_path = GetPath(); |
| login_db_file_path = login_db_file_path.Append(chrome::kLoginDataFileName); |
| LoginDatabase* login_db = new LoginDatabase(); |
| if (!login_db->Init(login_db_file_path)) { |
| LOG(ERROR) << "Could not initialize login database."; |
| delete login_db; |
| return; |
| } |
| #if defined(OS_WIN) |
| ps = new PasswordStoreWin(login_db, this, |
| GetWebDataService(Profile::IMPLICIT_ACCESS)); |
| #elif defined(OS_MACOSX) |
| ps = new PasswordStoreMac(new MacKeychain(), login_db); |
| #elif defined(OS_CHROMEOS) |
| // For now, we use PasswordStoreDefault. We might want to make a native |
| // backend for PasswordStoreX (see below) in the future though. |
| ps = new PasswordStoreDefault(login_db, this, |
| GetWebDataService(Profile::IMPLICIT_ACCESS)); |
| #elif defined(OS_POSIX) |
| // On POSIX systems, we try to use the "native" password management system of |
| // the desktop environment currently running, allowing GNOME Keyring in XFCE. |
| // (In all cases we fall back on the default store in case of failure.) |
| base::DesktopEnvironment desktop_env; |
| std::string store_type = |
| CommandLine::ForCurrentProcess()->GetSwitchValueASCII( |
| switches::kPasswordStore); |
| if (store_type == "kwallet") { |
| desktop_env = base::DESKTOP_ENVIRONMENT_KDE4; |
| } else if (store_type == "gnome") { |
| desktop_env = base::DESKTOP_ENVIRONMENT_GNOME; |
| } else if (store_type == "detect") { |
| scoped_ptr<base::Environment> env(base::Environment::Create()); |
| desktop_env = base::GetDesktopEnvironment(env.get()); |
| LOG(INFO) << "Password storage detected desktop environment: " << |
| base::GetDesktopEnvironmentName(desktop_env); |
| } else { |
| // TODO(mdm): If the flag is not given, or has an unknown value, use the |
| // default store for now. Once we're confident in the other stores, we can |
| // default to detecting the desktop environment instead. |
| desktop_env = base::DESKTOP_ENVIRONMENT_OTHER; |
| } |
| |
| scoped_ptr<PasswordStoreX::NativeBackend> backend; |
| if (desktop_env == base::DESKTOP_ENVIRONMENT_KDE4) { |
| // KDE3 didn't use DBus, which our KWallet store uses. |
| LOG(INFO) << "Trying KWallet for password storage."; |
| backend.reset(new NativeBackendKWallet()); |
| if (backend->Init()) |
| LOG(INFO) << "Using KWallet for password storage."; |
| else |
| backend.reset(); |
| } else if (desktop_env == base::DESKTOP_ENVIRONMENT_GNOME || |
| desktop_env == base::DESKTOP_ENVIRONMENT_XFCE) { |
| #if defined(USE_GNOME_KEYRING) |
| LOG(INFO) << "Trying GNOME keyring for password storage."; |
| backend.reset(new NativeBackendGnome()); |
| if (backend->Init()) |
| LOG(INFO) << "Using GNOME keyring for password storage."; |
| else |
| backend.reset(); |
| #endif // defined(USE_GNOME_KEYRING) |
| } |
| // TODO(mdm): this can change to a WARNING when we detect by default. |
| if (!backend.get()) |
| LOG(INFO) << "Using default (unencrypted) store for password storage."; |
| |
| ps = new PasswordStoreX(login_db, this, |
| GetWebDataService(Profile::IMPLICIT_ACCESS), |
| backend.release()); |
| #else |
| NOTIMPLEMENTED(); |
| #endif |
| if (!ps) |
| delete login_db; |
| |
| if (!ps || !ps->Init()) { |
| NOTREACHED() << "Could not initialize password manager."; |
| return; |
| } |
| password_store_.swap(ps); |
| } |
| |
| DownloadManager* ProfileImpl::GetDownloadManager() { |
| if (!created_download_manager_) { |
| scoped_refptr<DownloadManager> dlm(new DownloadManager); |
| dlm->Init(this); |
| created_download_manager_ = true; |
| download_manager_.swap(dlm); |
| } |
| return download_manager_.get(); |
| } |
| |
| bool ProfileImpl::HasCreatedDownloadManager() const { |
| return created_download_manager_; |
| } |
| |
| PersonalDataManager* ProfileImpl::GetPersonalDataManager() { |
| if (!personal_data_manager_.get()) { |
| personal_data_manager_ = new PersonalDataManager(); |
| personal_data_manager_->Init(this); |
| } |
| return personal_data_manager_.get(); |
| } |
| |
| FileSystemHostContext* ProfileImpl::GetFileSystemHostContext() { |
| if (!file_system_host_context_.get()) |
| file_system_host_context_ = new FileSystemHostContext( |
| GetPath(), IsOffTheRecord()); |
| DCHECK(file_system_host_context_.get()); |
| return file_system_host_context_.get(); |
| } |
| |
| void ProfileImpl::InitThemes() { |
| if (!created_theme_provider_) { |
| #if defined(TOOLKIT_USES_GTK) |
| theme_provider_.reset(new GtkThemeProvider); |
| #else |
| theme_provider_.reset(new BrowserThemeProvider); |
| #endif |
| theme_provider_->Init(this); |
| created_theme_provider_ = true; |
| } |
| } |
| |
| void ProfileImpl::SetTheme(Extension* extension) { |
| InitThemes(); |
| theme_provider_.get()->SetTheme(extension); |
| } |
| |
| void ProfileImpl::SetNativeTheme() { |
| InitThemes(); |
| theme_provider_.get()->SetNativeTheme(); |
| } |
| |
| void ProfileImpl::ClearTheme() { |
| InitThemes(); |
| theme_provider_.get()->UseDefaultTheme(); |
| } |
| |
| Extension* ProfileImpl::GetTheme() { |
| InitThemes(); |
| |
| std::string id = theme_provider_.get()->GetThemeID(); |
| if (id == BrowserThemeProvider::kDefaultThemeID) |
| return NULL; |
| |
| return extensions_service_->GetExtensionById(id, false); |
| } |
| |
| BrowserThemeProvider* ProfileImpl::GetThemeProvider() { |
| InitThemes(); |
| return theme_provider_.get(); |
| } |
| |
| SessionService* ProfileImpl::GetSessionService() { |
| if (!session_service_.get() && !shutdown_session_service_) { |
| session_service_ = new SessionService(this); |
| session_service_->ResetFromCurrentBrowsers(); |
| } |
| return session_service_.get(); |
| } |
| |
| void ProfileImpl::ShutdownSessionService() { |
| if (shutdown_session_service_) |
| return; |
| |
| // We're about to exit, force creation of the session service if it hasn't |
| // been created yet. We do this to ensure session state matches the point in |
| // time the user exited. |
| GetSessionService(); |
| shutdown_session_service_ = true; |
| session_service_ = NULL; |
| } |
| |
| bool ProfileImpl::HasSessionService() const { |
| return (session_service_.get() != NULL); |
| } |
| |
| bool ProfileImpl::DidLastSessionExitCleanly() { |
| // last_session_exited_cleanly_ is set when the preferences are loaded. Force |
| // it to be set by asking for the prefs. |
| GetPrefs(); |
| return last_session_exited_cleanly_; |
| } |
| |
| BookmarkModel* ProfileImpl::GetBookmarkModel() { |
| if (!bookmark_bar_model_.get()) { |
| bookmark_bar_model_.reset(new BookmarkModel(this)); |
| bookmark_bar_model_->Load(); |
| } |
| return bookmark_bar_model_.get(); |
| } |
| |
| bool ProfileImpl::IsSameProfile(Profile* profile) { |
| if (profile == static_cast<Profile*>(this)) |
| return true; |
| Profile* otr_profile = off_the_record_profile_.get(); |
| return otr_profile && profile == otr_profile; |
| } |
| |
| Time ProfileImpl::GetStartTime() const { |
| return start_time_; |
| } |
| |
| TabRestoreService* ProfileImpl::GetTabRestoreService() { |
| if (!tab_restore_service_.get()) |
| tab_restore_service_ = new TabRestoreService(this); |
| return tab_restore_service_.get(); |
| } |
| |
| history::TopSites* ProfileImpl::GetTopSites() { |
| if (!top_sites_.get()) { |
| top_sites_ = new history::TopSites(this); |
| top_sites_->Init(GetPath().Append(chrome::kTopSitesFilename)); |
| } |
| return top_sites_; |
| } |
| |
| void ProfileImpl::ResetTabRestoreService() { |
| tab_restore_service_ = NULL; |
| } |
| |
| SpellCheckHost* ProfileImpl::GetSpellCheckHost() { |
| return spellcheck_host_ready_ ? spellcheck_host_.get() : NULL; |
| } |
| |
| void ProfileImpl::ReinitializeSpellCheckHost(bool force) { |
| // If we are already loading the spellchecker, and this is just a hint to |
| // load the spellchecker, do nothing. |
| if (!force && spellcheck_host_.get()) |
| return; |
| |
| spellcheck_host_ready_ = false; |
| |
| bool notify = false; |
| if (spellcheck_host_.get()) { |
| spellcheck_host_->UnsetObserver(); |
| spellcheck_host_ = NULL; |
| notify = true; |
| } |
| |
| PrefService* prefs = GetPrefs(); |
| if (prefs->GetBoolean(prefs::kEnableSpellCheck)) { |
| // Retrieve the (perhaps updated recently) dictionary name from preferences. |
| spellcheck_host_ = new SpellCheckHost( |
| this, |
| prefs->GetString(prefs::kSpellCheckDictionary), |
| GetRequestContext()); |
| spellcheck_host_->Initialize(); |
| } else if (notify) { |
| // The spellchecker has been disabled. |
| SpellCheckHostInitialized(); |
| } |
| } |
| |
| void ProfileImpl::SpellCheckHostInitialized() { |
| spellcheck_host_ready_ = spellcheck_host_ && |
| (spellcheck_host_->bdict_file() != base::kInvalidPlatformFileValue || |
| spellcheck_host_->use_platform_spellchecker()); |
| NotificationService::current()->Notify( |
| NotificationType::SPELLCHECK_HOST_REINITIALIZED, |
| Source<Profile>(this), NotificationService::NoDetails()); |
| } |
| |
| WebKitContext* ProfileImpl::GetWebKitContext() { |
| if (!webkit_context_.get()) |
| webkit_context_ = new WebKitContext(this); |
| DCHECK(webkit_context_.get()); |
| return webkit_context_.get(); |
| } |
| |
| DesktopNotificationService* ProfileImpl::GetDesktopNotificationService() { |
| DCHECK(ChromeThread::CurrentlyOn(ChromeThread::UI)); |
| if (!desktop_notification_service_.get()) { |
| desktop_notification_service_.reset(new DesktopNotificationService( |
| this, g_browser_process->notification_ui_manager())); |
| } |
| return desktop_notification_service_.get(); |
| } |
| |
| void ProfileImpl::MarkAsCleanShutdown() { |
| if (prefs_.get()) { |
| // The session cleanly exited, set kSessionExitedCleanly appropriately. |
| prefs_->SetBoolean(prefs::kSessionExitedCleanly, true); |
| |
| // NOTE: If you change what thread this writes on, be sure and update |
| // ChromeFrame::EndSession(). |
| prefs_->SavePersistentPrefs(); |
| } |
| } |
| |
| void ProfileImpl::Observe(NotificationType type, |
| const NotificationSource& source, |
| const NotificationDetails& details) { |
| if (NotificationType::PREF_CHANGED == type) { |
| std::string* pref_name_in = Details<std::string>(details).ptr(); |
| PrefService* prefs = Source<PrefService>(source).ptr(); |
| DCHECK(pref_name_in && prefs); |
| if (*pref_name_in == prefs::kSpellCheckDictionary || |
| *pref_name_in == prefs::kEnableSpellCheck) { |
| ReinitializeSpellCheckHost(true); |
| } else if (*pref_name_in == prefs::kEnableAutoSpellCorrect) { |
| NotificationService::current()->Notify( |
| NotificationType::SPELLCHECK_AUTOSPELL_TOGGLED, |
| Source<Profile>(this), NotificationService::NoDetails()); |
| } |
| } else if (NotificationType::THEME_INSTALLED == type) { |
| Extension* extension = Details<Extension>(details).ptr(); |
| SetTheme(extension); |
| } else if (NotificationType::BOOKMARK_MODEL_LOADED == type) { |
| GetProfileSyncService(); // Causes lazy-load if sync is enabled. |
| registrar_.Remove(this, NotificationType::BOOKMARK_MODEL_LOADED, |
| Source<Profile>(this)); |
| } |
| } |
| |
| void ProfileImpl::StopCreateSessionServiceTimer() { |
| create_session_service_timer_.Stop(); |
| } |
| |
| TokenService* ProfileImpl::GetTokenService() { |
| if (!token_service_.get()) { |
| token_service_.reset(new TokenService()); |
| } |
| return token_service_.get(); |
| } |
| |
| ProfileSyncService* ProfileImpl::GetProfileSyncService() { |
| return GetProfileSyncService(""); |
| } |
| |
| ProfileSyncService* ProfileImpl::GetProfileSyncService( |
| const std::string& cros_user) { |
| |
| if (!ProfileSyncService::IsSyncEnabled()) |
| return NULL; |
| if (!sync_service_.get()) |
| InitSyncService(cros_user); |
| return sync_service_.get(); |
| } |
| |
| CloudPrintProxyService* ProfileImpl::GetCloudPrintProxyService() { |
| if (!cloud_print_proxy_service_.get()) |
| InitCloudPrintProxyService(); |
| return cloud_print_proxy_service_.get(); |
| } |
| |
| void ProfileImpl::InitSyncService(const std::string& cros_user) { |
| profile_sync_factory_.reset( |
| new ProfileSyncFactoryImpl(this, CommandLine::ForCurrentProcess())); |
| sync_service_.reset( |
| profile_sync_factory_->CreateProfileSyncService(cros_user)); |
| sync_service_->Initialize(); |
| } |
| |
| void ProfileImpl::InitCloudPrintProxyService() { |
| cloud_print_proxy_service_.reset(new CloudPrintProxyService(this)); |
| cloud_print_proxy_service_->Initialize(); |
| } |
| |
| ChromeBlobStorageContext* ProfileImpl::GetBlobStorageContext() { |
| if (!blob_storage_context_) { |
| blob_storage_context_ = new ChromeBlobStorageContext(); |
| ChromeThread::PostTask( |
| ChromeThread::IO, FROM_HERE, |
| NewRunnableMethod(blob_storage_context_.get(), |
| &ChromeBlobStorageContext::InitializeOnIOThread)); |
| } |
| return blob_storage_context_; |
| } |
| |
| #if defined(OS_CHROMEOS) |
| chromeos::ProxyConfigServiceImpl* |
| ProfileImpl::GetChromeOSProxyConfigServiceImpl() { |
| if (!chromeos_proxy_config_service_impl_) { |
| chromeos_proxy_config_service_impl_ = |
| new chromeos::ProxyConfigServiceImpl(); |
| } |
| return chromeos_proxy_config_service_impl_; |
| } |
| #endif // defined(OS_CHROMEOS) |