blob: fea876beed8f4b3fd3a440d5251cced259fb0b30 [file] [log] [blame]
license.botbf09a502008-08-24 00:55:551// Copyright (c) 2006-2008 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
initial.commit09911bf2008-07-26 23:55:294
5#include "chrome/browser/profile.h"
6
[email protected]2735e3692009-09-25 18:19:397#include "app/theme_provider.h"
initial.commit09911bf2008-07-26 23:55:298#include "base/command_line.h"
[email protected]04fba9a92008-10-28 17:25:259#include "base/file_path.h"
[email protected]405a64b2009-09-16 21:03:4410#include "base/file_util.h"
initial.commit09911bf2008-07-26 23:55:2911#include "base/path_service.h"
12#include "base/scoped_ptr.h"
13#include "base/string_util.h"
[email protected]def11712009-11-06 00:42:1514#include "chrome/browser/autofill/personal_data_manager.h"
[email protected]a9afddb2009-02-12 17:49:4215#include "chrome/browser/bookmarks/bookmark_model.h"
initial.commit09911bf2008-07-26 23:55:2916#include "chrome/browser/browser_list.h"
[email protected]67a46b7f2009-06-16 21:41:0217#include "chrome/browser/browser_theme_provider.h"
[email protected]6fad2632009-11-02 05:59:3718#include "chrome/browser/chrome_thread.h"
[email protected]9c8dd902009-11-19 17:50:4219#include "chrome/browser/dom_ui/ntp_resource_cache.h"
[email protected]b7f05882009-02-22 01:21:5620#include "chrome/browser/download/download_manager.h"
[email protected]89ebc7e2009-08-24 22:11:0721#include "chrome/browser/extensions/extension_devtools_manager.h"
[email protected]7120f132009-07-20 21:05:3722#include "chrome/browser/extensions/extension_message_service.h"
[email protected]481e1a42009-05-06 20:56:0523#include "chrome/browser/extensions/extension_process_manager.h"
[email protected]6014d672008-12-05 00:38:2524#include "chrome/browser/extensions/extensions_service.h"
[email protected]0938d3c2009-01-09 20:37:3525#include "chrome/browser/extensions/user_script_master.h"
[email protected]0189bc722009-08-28 21:56:4826#include "chrome/browser/favicon_service.h"
[email protected]77f6fb432009-09-05 14:21:0927#include "chrome/browser/strict_transport_security_persister.h"
[email protected]a9afddb2009-02-12 17:49:4228#include "chrome/browser/history/history.h"
[email protected]3bf335a2009-06-26 20:46:0629#include "chrome/browser/in_process_webkit/webkit_context.h"
[email protected]6ab9b202008-12-23 22:34:5030#include "chrome/browser/net/chrome_url_request_context.h"
[email protected]db36938c2009-08-19 21:48:4231#include "chrome/browser/net/ssl_config_service_manager.h"
[email protected]4bb336302009-10-12 05:44:2632#include "chrome/browser/notifications/desktop_notification_service.h"
[email protected]e69d33952009-06-03 22:00:4133#include "chrome/browser/password_manager/password_store_default.h"
[email protected]588074f2009-10-29 09:40:1034#include "chrome/browser/privacy_blacklist/blacklist_io.h"
initial.commit09911bf2008-07-26 23:55:2935#include "chrome/browser/profile_manager.h"
[email protected]8c8657d62009-01-16 18:31:2636#include "chrome/browser/renderer_host/render_process_host.h"
[email protected]90085af02009-10-29 17:53:2137#include "chrome/browser/search_versus_navigate_classifier.h"
[email protected]1132436e2009-04-08 20:06:3338#include "chrome/browser/search_engines/template_url_fetcher.h"
[email protected]f63ae312009-02-04 17:58:4639#include "chrome/browser/search_engines/template_url_model.h"
[email protected]85e921fb82009-02-11 23:19:4440#include "chrome/browser/sessions/session_service.h"
[email protected]bd580a252009-02-12 01:16:3041#include "chrome/browser/sessions/tab_restore_service.h"
[email protected]1132436e2009-04-08 20:06:3342#include "chrome/browser/ssl/ssl_host_state.h"
[email protected]48352c12009-08-15 01:19:1143#include "chrome/browser/sync/profile_sync_service.h"
[email protected]449478302009-06-09 20:04:2844#include "chrome/browser/thumbnail_store.h"
initial.commit09911bf2008-07-26 23:55:2945#include "chrome/browser/visitedlink_master.h"
[email protected]3e90d4a2009-07-03 17:38:3946#include "chrome/browser/visitedlink_event_listener.h"
initial.commit09911bf2008-07-26 23:55:2947#include "chrome/browser/webdata/web_data_service.h"
[email protected]23f1ef12009-09-01 22:30:3048#include "chrome/common/appcache/chrome_appcache_service.h"
initial.commit09911bf2008-07-26 23:55:2949#include "chrome/common/chrome_constants.h"
50#include "chrome/common/chrome_paths.h"
51#include "chrome/common/chrome_switches.h"
[email protected]5b1a0e22009-05-26 19:00:5852#include "chrome/common/extensions/extension_error_reporter.h"
initial.commit09911bf2008-07-26 23:55:2953#include "chrome/common/notification_service.h"
54#include "chrome/common/pref_names.h"
[email protected]f7011fcb2009-01-28 21:54:3255#include "chrome/common/render_messages.h"
[email protected]f90f5c512009-02-18 19:10:5856#include "grit/locale_settings.h"
[email protected]77f6fb432009-09-05 14:21:0957#include "net/base/strict_transport_security_state.h"
[email protected]2f351cb2009-11-09 23:43:3458#include "webkit/database/database_tracker.h"
initial.commit09911bf2008-07-26 23:55:2959
[email protected]a5166af62009-07-03 00:42:2960#if defined(OS_LINUX)
61#include "chrome/browser/gtk/gtk_theme_provider.h"
62#endif
63
[email protected]2627431b2009-09-15 20:21:5364#if defined(OS_CHROMEOS)
[email protected]fecc1522009-10-15 21:08:2965#include "chrome/browser/chromeos/preferences.h"
[email protected]2627431b2009-09-15 20:21:5366#endif
67
[email protected]e1acf6f2008-10-27 20:43:3368using base::Time;
69using base::TimeDelta;
70
[email protected]e5642992009-06-26 23:06:3171namespace {
72
initial.commit09911bf2008-07-26 23:55:2973// Delay, in milliseconds, before we explicitly create the SessionService.
74static const int kCreateSessionServiceDelayMS = 500;
75
[email protected]e5642992009-06-26 23:06:3176enum ContextType {
77 kNormalContext,
78 kMediaContext
79};
80
81// Gets the cache parameters from the command line. |type| is the type of
82// request context that we need, |cache_path| will be set to the user provided
83// path, or will not be touched if there is not an argument. |max_size| will
84// be the user provided value or zero by default.
85void GetCacheParameters(ContextType type, FilePath* cache_path,
86 int* max_size) {
87 DCHECK(cache_path);
88 DCHECK(max_size);
89
90 // Override the cache location if specified by the user.
91 std::wstring user_path(CommandLine::ForCurrentProcess()->GetSwitchValue(
92 switches::kDiskCacheDir));
93
94 if (!user_path.empty()) {
95 *cache_path = FilePath::FromWStringHack(user_path);
96 }
97
[email protected]b7e0a2a2009-10-13 02:07:2598 const char* arg = kNormalContext == type ? switches::kDiskCacheSize :
99 switches::kMediaCacheSize;
[email protected]e5642992009-06-26 23:06:31100 std::string value =
[email protected]b7e0a2a2009-10-13 02:07:25101 CommandLine::ForCurrentProcess()->GetSwitchValueASCII(arg);
[email protected]e5642992009-06-26 23:06:31102
103 // By default we let the cache determine the right size.
104 *max_size = 0;
105 if (!StringToInt(value, max_size)) {
106 *max_size = 0;
107 } else if (max_size < 0) {
108 *max_size = 0;
109 }
110}
111
[email protected]405a64b2009-09-16 21:03:44112FilePath GetCachePath(const FilePath& base) {
113 return base.Append(chrome::kCacheDirname);
114}
115
116FilePath GetMediaCachePath(const FilePath& base) {
117 return base.Append(chrome::kMediaCacheDirname);
118}
119
120bool HasACacheSubdir(const FilePath &dir) {
121 return file_util::PathExists(GetCachePath(dir)) ||
122 file_util::PathExists(GetMediaCachePath(dir));
123}
124
[email protected]e5642992009-06-26 23:06:31125} // namespace
126
initial.commit09911bf2008-07-26 23:55:29127// A pointer to the request context for the default profile. See comments on
128// Profile::GetDefaultRequestContext.
[email protected]be180c802009-10-23 06:33:31129URLRequestContextGetter* Profile::default_request_context_;
initial.commit09911bf2008-07-26 23:55:29130
[email protected]be180c802009-10-23 06:33:31131static void CleanupRequestContext(ChromeURLRequestContextGetter* context) {
[email protected]13c30922009-11-19 03:43:19132 if (context)
[email protected]47accfd62009-05-14 18:46:21133 context->CleanupOnUIThread();
[email protected]47accfd62009-05-14 18:46:21134}
135
[email protected]34cc84f2009-02-13 10:04:35136// static
[email protected]4bf6afd2009-10-08 14:00:11137const ProfileId Profile::InvalidProfileId = static_cast<ProfileId>(0);
138
139// static
initial.commit09911bf2008-07-26 23:55:29140void Profile::RegisterUserPrefs(PrefService* prefs) {
[email protected]430d3f72008-10-27 17:56:55141 prefs->RegisterBooleanPref(prefs::kSearchSuggestEnabled, true);
initial.commit09911bf2008-07-26 23:55:29142 prefs->RegisterBooleanPref(prefs::kSessionExitedCleanly, true);
143 prefs->RegisterBooleanPref(prefs::kSafeBrowsingEnabled, true);
[email protected]74c8b422009-03-11 00:34:12144 // TODO(estade): IDS_SPELLCHECK_DICTIONARY should be an ASCII string.
[email protected]e7244d82008-10-29 18:13:26145 prefs->RegisterLocalizedStringPref(prefs::kSpellCheckDictionary,
146 IDS_SPELLCHECK_DICTIONARY);
147 prefs->RegisterBooleanPref(prefs::kEnableSpellCheck, true);
[email protected]154a4332009-06-03 20:20:58148 prefs->RegisterBooleanPref(prefs::kEnableAutoSpellCorrect, true);
[email protected]f93fe782009-02-19 01:26:13149 prefs->RegisterBooleanPref(prefs::kEnableUserScripts, false);
[email protected]a5166af62009-07-03 00:42:29150#if defined(OS_LINUX)
151 prefs->RegisterBooleanPref(prefs::kUsesSystemTheme, false);
152#endif
[email protected]51c490b2009-08-03 16:34:34153 prefs->RegisterStringPref(prefs::kCurrentThemeID,
154 UTF8ToWide(BrowserThemeProvider::kDefaultThemeID));
[email protected]4a190632009-05-09 01:07:42155 prefs->RegisterDictionaryPref(prefs::kCurrentThemeImages);
156 prefs->RegisterDictionaryPref(prefs::kCurrentThemeColors);
157 prefs->RegisterDictionaryPref(prefs::kCurrentThemeTints);
[email protected]7895ea22009-06-02 20:53:50158 prefs->RegisterDictionaryPref(prefs::kCurrentThemeDisplayProperties);
[email protected]6d60703b2009-08-29 01:29:23159 prefs->RegisterBooleanPref(prefs::kDisableExtensions, false);
initial.commit09911bf2008-07-26 23:55:29160}
161
[email protected]34cc84f2009-02-13 10:04:35162// static
[email protected]f7011fcb2009-01-28 21:54:32163Profile* Profile::CreateProfile(const FilePath& path) {
initial.commit09911bf2008-07-26 23:55:29164 return new ProfileImpl(path);
165}
166
[email protected]34cc84f2009-02-13 10:04:35167// static
[email protected]be180c802009-10-23 06:33:31168URLRequestContextGetter* Profile::GetDefaultRequestContext() {
initial.commit09911bf2008-07-26 23:55:29169 return default_request_context_;
170}
171
[email protected]e69d33952009-06-03 22:00:41172#if defined(OS_LINUX)
173// Temporarily disabled while we figure some stuff out.
174// http://code.google.com/p/chromium/issues/detail?id=12351
175// #include "chrome/browser/password_manager/password_store_gnome.h"
176// #include "chrome/browser/password_manager/password_store_kwallet.h"
177#elif defined(OS_WIN)
178#include "chrome/browser/password_manager/password_store_win.h"
[email protected]034eba52009-06-03 22:50:56179#elif defined(OS_MACOSX)
180#include "chrome/browser/keychain_mac.h"
[email protected]e0411ae52009-06-30 23:59:17181#include "chrome/browser/password_manager/login_database_mac.h"
[email protected]034eba52009-06-03 22:50:56182#include "chrome/browser/password_manager/password_store_mac.h"
[email protected]e69d33952009-06-03 22:00:41183#endif
initial.commit09911bf2008-07-26 23:55:29184
initial.commit09911bf2008-07-26 23:55:29185////////////////////////////////////////////////////////////////////////////////
186//
187// OffTheRecordProfileImpl is a profile subclass that wraps an existing profile
[email protected]4a190632009-05-09 01:07:42188// to make it suitable for the off the record mode.
initial.commit09911bf2008-07-26 23:55:29189//
190////////////////////////////////////////////////////////////////////////////////
191class OffTheRecordProfileImpl : public Profile,
192 public NotificationObserver {
193 public:
194 explicit OffTheRecordProfileImpl(Profile* real_profile)
195 : profile_(real_profile),
[email protected]47accfd62009-05-14 18:46:21196 extensions_request_context_(NULL),
initial.commit09911bf2008-07-26 23:55:29197 start_time_(Time::Now()) {
[email protected]be180c802009-10-23 06:33:31198 request_context_ = ChromeURLRequestContextGetter::CreateOffTheRecord(this);
[email protected]481e1a42009-05-06 20:56:05199
initial.commit09911bf2008-07-26 23:55:29200 // Register for browser close notifications so we can detect when the last
201 // off-the-record window is closed, in which case we can clean our states
202 // (cookies, downloads...).
[email protected]88cf3292009-05-22 01:48:43203 registrar_.Add(this, NotificationType::BROWSER_CLOSED,
204 NotificationService::AllSources());
initial.commit09911bf2008-07-26 23:55:29205 }
206
207 virtual ~OffTheRecordProfileImpl() {
[email protected]47accfd62009-05-14 18:46:21208 CleanupRequestContext(request_context_);
[email protected]47accfd62009-05-14 18:46:21209 CleanupRequestContext(extensions_request_context_);
initial.commit09911bf2008-07-26 23:55:29210 }
211
[email protected]4bf6afd2009-10-08 14:00:11212 virtual ProfileId GetRuntimeId() {
213 return reinterpret_cast<ProfileId>(this);
214 }
215
[email protected]f7011fcb2009-01-28 21:54:32216 virtual FilePath GetPath() { return profile_->GetPath(); }
initial.commit09911bf2008-07-26 23:55:29217
218 virtual bool IsOffTheRecord() {
219 return true;
220 }
221
222 virtual Profile* GetOffTheRecordProfile() {
223 return this;
224 }
225
[email protected]860f55492009-03-27 19:50:59226 virtual void DestroyOffTheRecordProfile() {
227 // Suicide is bad!
228 NOTREACHED();
229 }
230
initial.commit09911bf2008-07-26 23:55:29231 virtual Profile* GetOriginalProfile() {
232 return profile_;
233 }
234
[email protected]2f351cb2009-11-09 23:43:34235 virtual webkit_database::DatabaseTracker* GetDatabaseTracker() {
236 if (!db_tracker_)
237 db_tracker_ = new webkit_database::DatabaseTracker(FilePath());
238 return db_tracker_;
239 }
240
initial.commit09911bf2008-07-26 23:55:29241 virtual VisitedLinkMaster* GetVisitedLinkMaster() {
[email protected]7fb6c862009-03-13 02:51:49242 // We don't provide access to the VisitedLinkMaster when we're OffTheRecord
243 // because we don't want to leak the sites that the user has visited before.
244 return NULL;
initial.commit09911bf2008-07-26 23:55:29245 }
246
[email protected]6014d672008-12-05 00:38:25247 virtual ExtensionsService* GetExtensionsService() {
[email protected]1bd54132009-06-11 00:05:34248 return NULL;
[email protected]6014d672008-12-05 00:38:25249 }
250
[email protected]0938d3c2009-01-09 20:37:35251 virtual UserScriptMaster* GetUserScriptMaster() {
252 return profile_->GetUserScriptMaster();
[email protected]04fba9a92008-10-28 17:25:25253 }
254
[email protected]89ebc7e2009-08-24 22:11:07255 virtual ExtensionDevToolsManager* GetExtensionDevToolsManager() {
256 return NULL;
257 }
258
[email protected]481e1a42009-05-06 20:56:05259 virtual ExtensionProcessManager* GetExtensionProcessManager() {
[email protected]1bd54132009-06-11 00:05:34260 return NULL;
[email protected]481e1a42009-05-06 20:56:05261 }
262
[email protected]7120f132009-07-20 21:05:37263 virtual ExtensionMessageService* GetExtensionMessageService() {
264 return NULL;
265 }
266
[email protected]34cc84f2009-02-13 10:04:35267 virtual SSLHostState* GetSSLHostState() {
268 if (!ssl_host_state_.get())
269 ssl_host_state_.reset(new SSLHostState());
270
271 DCHECK(ssl_host_state_->CalledOnValidThread());
272 return ssl_host_state_.get();
273 }
274
[email protected]77f6fb432009-09-05 14:21:09275 virtual net::StrictTransportSecurityState* GetStrictTransportSecurityState() {
276 if (!strict_transport_security_state_.get()) {
277 strict_transport_security_state_ =
278 new net::StrictTransportSecurityState();
279 }
[email protected]a9cea7542009-05-20 04:30:23280
[email protected]77f6fb432009-09-05 14:21:09281 return strict_transport_security_state_.get();
[email protected]a9cea7542009-05-20 04:30:23282 }
283
initial.commit09911bf2008-07-26 23:55:29284 virtual HistoryService* GetHistoryService(ServiceAccessType sat) {
285 if (sat == EXPLICIT_ACCESS) {
286 return profile_->GetHistoryService(sat);
287 } else {
288 NOTREACHED() << "This profile is OffTheRecord";
289 return NULL;
290 }
291 }
292
[email protected]0850fa62009-10-08 22:34:29293 virtual HistoryService* GetHistoryServiceWithoutCreating() {
294 return profile_->GetHistoryServiceWithoutCreating();
295 }
296
[email protected]0189bc722009-08-28 21:56:48297 virtual FaviconService* GetFaviconService(ServiceAccessType sat) {
298 if (sat == EXPLICIT_ACCESS) {
299 return profile_->GetFaviconService(sat);
300 } else {
301 NOTREACHED() << "This profile is OffTheRecord";
302 return NULL;
303 }
304 }
305
[email protected]90085af02009-10-29 17:53:21306 virtual SearchVersusNavigateClassifier* GetSearchVersusNavigateClassifier() {
307 return profile_->GetSearchVersusNavigateClassifier();
308 }
309
initial.commit09911bf2008-07-26 23:55:29310 virtual WebDataService* GetWebDataService(ServiceAccessType sat) {
311 if (sat == EXPLICIT_ACCESS) {
312 return profile_->GetWebDataService(sat);
313 } else {
314 NOTREACHED() << "This profile is OffTheRecord";
315 return NULL;
316 }
317 }
318
[email protected]9cddbe372009-10-23 21:23:53319 virtual WebDataService* GetWebDataServiceWithoutCreating() {
320 return profile_->GetWebDataServiceWithoutCreating();
321 }
322
[email protected]e69d33952009-06-03 22:00:41323 virtual PasswordStore* GetPasswordStore(ServiceAccessType sat) {
324 if (sat == EXPLICIT_ACCESS) {
325 return profile_->GetPasswordStore(sat);
326 } else {
327 NOTREACHED() << "This profile is OffTheRecord";
328 return NULL;
329 }
330 }
331
initial.commit09911bf2008-07-26 23:55:29332 virtual PrefService* GetPrefs() {
333 return profile_->GetPrefs();
334 }
335
336 virtual TemplateURLModel* GetTemplateURLModel() {
337 return profile_->GetTemplateURLModel();
338 }
339
340 virtual TemplateURLFetcher* GetTemplateURLFetcher() {
341 return profile_->GetTemplateURLFetcher();
342 }
343
344 virtual DownloadManager* GetDownloadManager() {
345 if (!download_manager_.get()) {
346 scoped_refptr<DownloadManager> dlm(new DownloadManager);
347 dlm->Init(this);
348 download_manager_.swap(dlm);
349 }
350 return download_manager_.get();
351 }
352
353 virtual bool HasCreatedDownloadManager() const {
354 return (download_manager_.get() != NULL);
355 }
356
[email protected]def11712009-11-06 00:42:15357 virtual PersonalDataManager* GetPersonalDataManager() {
358 return NULL;
359 }
360
[email protected]4a190632009-05-09 01:07:42361 virtual void InitThemes() {
362 GetOriginalProfile()->InitThemes();
363 }
364
365 virtual void SetTheme(Extension* extension) {
366 GetOriginalProfile()->SetTheme(extension);
367 }
368
[email protected]a5166af62009-07-03 00:42:29369 virtual void SetNativeTheme() {
370 GetOriginalProfile()->SetNativeTheme();
371 }
372
[email protected]4a190632009-05-09 01:07:42373 virtual void ClearTheme() {
374 GetOriginalProfile()->ClearTheme();
375 }
376
[email protected]51c490b2009-08-03 16:34:34377 virtual Extension* GetTheme() {
378 return GetOriginalProfile()->GetTheme();
379 }
380
[email protected]4a190632009-05-09 01:07:42381 virtual ThemeProvider* GetThemeProvider() {
382 return GetOriginalProfile()->GetThemeProvider();
383 }
384
[email protected]be180c802009-10-23 06:33:31385 virtual URLRequestContextGetter* GetRequestContext() {
initial.commit09911bf2008-07-26 23:55:29386 return request_context_;
387 }
388
[email protected]be180c802009-10-23 06:33:31389 virtual URLRequestContextGetter* GetRequestContextForMedia() {
[email protected]d14c7ac2009-05-29 20:38:11390 // In OTR mode, media request context is the same as the original one.
391 return request_context_;
[email protected]e7f29642009-03-02 22:53:18392 }
393
[email protected]be180c802009-10-23 06:33:31394 URLRequestContextGetter* GetRequestContextForExtensions() {
[email protected]47accfd62009-05-14 18:46:21395 if (!extensions_request_context_) {
396 extensions_request_context_ =
[email protected]be180c802009-10-23 06:33:31397 ChromeURLRequestContextGetter::CreateOffTheRecordForExtensions(this);
[email protected]47accfd62009-05-14 18:46:21398 }
399
400 return extensions_request_context_;
401 }
402
[email protected]db36938c2009-08-19 21:48:42403 virtual net::SSLConfigService* GetSSLConfigService() {
404 return GetOriginalProfile()->GetSSLConfigService();
405 }
406
[email protected]eaadd9052009-06-23 18:02:23407 virtual Blacklist* GetBlacklist() {
408 return GetOriginalProfile()->GetBlacklist();
409 }
410
initial.commit09911bf2008-07-26 23:55:29411 virtual SessionService* GetSessionService() {
412 // Don't save any sessions when off the record.
413 return NULL;
414 }
415
416 virtual void ShutdownSessionService() {
417 // We don't allow a session service, nothing to do.
418 }
419
420 virtual bool HasSessionService() const {
421 // We never have a session service.
422 return false;
423 }
424
425 virtual std::wstring GetName() {
426 return profile_->GetName();
427 }
428
429 virtual void SetName(const std::wstring& name) {
430 profile_->SetName(name);
431 }
432
433 virtual std::wstring GetID() {
434 return profile_->GetID();
435 }
436
437 virtual void SetID(const std::wstring& id) {
438 profile_->SetID(id);
439 }
440
initial.commit09911bf2008-07-26 23:55:29441 virtual bool DidLastSessionExitCleanly() {
442 return profile_->DidLastSessionExitCleanly();
443 }
444
[email protected]d8e41ed2008-09-11 15:22:32445 virtual BookmarkModel* GetBookmarkModel() {
446 return profile_->GetBookmarkModel();
initial.commit09911bf2008-07-26 23:55:29447 }
448
[email protected]4bb336302009-10-12 05:44:26449 virtual DesktopNotificationService* GetDesktopNotificationService() {
450 return profile_->GetDesktopNotificationService();
451 }
452
[email protected]48352c12009-08-15 01:19:11453 virtual ProfileSyncService* GetProfileSyncService() {
454 return NULL;
[email protected]3a453fa2008-08-15 18:46:34455 }
[email protected]3a453fa2008-08-15 18:46:34456
initial.commit09911bf2008-07-26 23:55:29457 virtual bool IsSameProfile(Profile* profile) {
458 if (profile == static_cast<Profile*>(this))
459 return true;
460 return profile == profile_;
461 }
462
463 virtual Time GetStartTime() const {
464 return start_time_;
465 }
466
467 virtual TabRestoreService* GetTabRestoreService() {
468 return NULL;
469 }
470
[email protected]e7244d82008-10-29 18:13:26471 virtual void ResetTabRestoreService() {
[email protected]20930852008-10-15 19:30:41472 }
473
[email protected]85c55dc2009-11-06 03:05:46474 virtual SpellCheckHost* GetSpellCheckHost() {
475 return profile_->GetSpellCheckHost();
476 }
477
478 virtual void ReinitializeSpellCheckHost(bool force) {
479 profile_->ReinitializeSpellCheckHost(force);
480 }
[email protected]85c55dc2009-11-06 03:05:46481
[email protected]3bf335a2009-06-26 20:46:06482 virtual WebKitContext* GetWebKitContext() {
[email protected]c27324b2009-11-19 22:44:29483 if (!webkit_context_.get())
484 webkit_context_ = new WebKitContext(GetPath(), true);
485 DCHECK(webkit_context_.get());
486 return webkit_context_.get();
487 }
[email protected]3bf335a2009-06-26 20:46:06488
[email protected]449478302009-06-09 20:04:28489 virtual ThumbnailStore* GetThumbnailStore() {
490 return NULL;
491 }
492
initial.commit09911bf2008-07-26 23:55:29493 virtual void MarkAsCleanShutdown() {
494 }
495
[email protected]bdbc87c2009-01-25 05:08:54496 virtual void InitExtensions() {
497 NOTREACHED();
498 }
499
[email protected]ea0c98cf2009-06-18 23:02:54500 virtual void InitWebResources() {
501 NOTREACHED();
502 }
503
[email protected]9c8dd902009-11-19 17:50:42504 virtual NTPResourceCache* GetNTPResourceCache() {
505 // Just return the real profile resource cache.
506 return profile_->GetNTPResourceCache();
507 }
508
initial.commit09911bf2008-07-26 23:55:29509 virtual void ExitedOffTheRecordMode() {
510 // Drop our download manager so we forget about all the downloads made
511 // in off-the-record mode.
512 download_manager_ = NULL;
513 }
514
515 virtual void Observe(NotificationType type,
516 const NotificationSource& source,
517 const NotificationDetails& details) {
[email protected]bfd04a62009-02-01 18:16:56518 DCHECK_EQ(NotificationType::BROWSER_CLOSED, type.value);
initial.commit09911bf2008-07-26 23:55:29519 // We are only interested in OTR browser closing.
520 if (Source<Browser>(source)->profile() != this)
521 return;
522
523 // Let's check if we still have an Off The Record window opened.
524 // Note that we check against 1 as this notification is sent before the
525 // browser window is actually removed from the list.
526 if (BrowserList::GetBrowserCount(this) <= 1)
527 ExitedOffTheRecordMode();
528 }
529
530 private:
[email protected]88cf3292009-05-22 01:48:43531 NotificationRegistrar registrar_;
532
initial.commit09911bf2008-07-26 23:55:29533 // The real underlying profile.
534 Profile* profile_;
535
[email protected]6ab9b202008-12-23 22:34:50536 // The context to use for requests made from this OTR session.
[email protected]13c30922009-11-19 03:43:19537 scoped_refptr<ChromeURLRequestContextGetter> request_context_;
initial.commit09911bf2008-07-26 23:55:29538
[email protected]13c30922009-11-19 03:43:19539 scoped_refptr<ChromeURLRequestContextGetter> extensions_request_context_;
[email protected]23f1ef12009-09-01 22:30:30540
initial.commit09911bf2008-07-26 23:55:29541 // The download manager that only stores downloaded items in memory.
542 scoped_refptr<DownloadManager> download_manager_;
543
[email protected]3bf335a2009-06-26 20:46:06544 // Use a special WebKit context for OTR browsing.
545 scoped_refptr<WebKitContext> webkit_context_;
546
[email protected]34cc84f2009-02-13 10:04:35547 // We don't want SSLHostState from the OTR profile to leak back to the main
548 // profile because then the main profile would learn some of the host names
549 // the user visited while OTR.
550 scoped_ptr<SSLHostState> ssl_host_state_;
551
[email protected]77f6fb432009-09-05 14:21:09552 // The StrictTransportSecurityState that only stores enabled sites in memory.
553 scoped_refptr<net::StrictTransportSecurityState>
554 strict_transport_security_state_;
[email protected]a9cea7542009-05-20 04:30:23555
initial.commit09911bf2008-07-26 23:55:29556 // Time we were started.
557 Time start_time_;
558
[email protected]2f351cb2009-11-09 23:43:34559 // The main database tracker for this profile.
560 // Should be used only on the file thread.
561 scoped_refptr<webkit_database::DatabaseTracker> db_tracker_;
562
[email protected]90085af02009-10-29 17:53:21563 DISALLOW_COPY_AND_ASSIGN(OffTheRecordProfileImpl);
initial.commit09911bf2008-07-26 23:55:29564};
565
[email protected]f7011fcb2009-01-28 21:54:32566ProfileImpl::ProfileImpl(const FilePath& path)
initial.commit09911bf2008-07-26 23:55:29567 : path_(path),
[email protected]3e90d4a2009-07-03 17:38:39568 visited_link_event_listener_(new VisitedLinkEventListener()),
[email protected]89ebc7e2009-08-24 22:11:07569 extension_devtools_manager_(NULL),
[email protected]f7011fcb2009-01-28 21:54:32570 request_context_(NULL),
[email protected]363347b2009-03-13 20:06:57571 media_request_context_(NULL),
[email protected]47accfd62009-05-14 18:46:21572 extensions_request_context_(NULL),
[email protected]eaadd9052009-06-23 18:02:23573 blacklist_(NULL),
[email protected]f7011fcb2009-01-28 21:54:32574 history_service_created_(false),
[email protected]0189bc722009-08-28 21:56:48575 favicon_service_created_(false),
[email protected]f7011fcb2009-01-28 21:54:32576 created_web_data_service_(false),
[email protected]e69d33952009-06-03 22:00:41577 created_password_store_(false),
[email protected]f7011fcb2009-01-28 21:54:32578 created_download_manager_(false),
[email protected]4a190632009-05-09 01:07:42579 created_theme_provider_(false),
[email protected]f7011fcb2009-01-28 21:54:32580 start_time_(Time::Now()),
[email protected]85c55dc2009-11-06 03:05:46581#if defined(OS_LINUX)
582 spellcheck_host_(NULL),
583 spellcheck_host_ready_(false),
584#endif
initial.commit09911bf2008-07-26 23:55:29585 shutdown_session_service_(false) {
586 DCHECK(!path.empty()) << "Using an empty path will attempt to write " <<
587 "profile files to the root directory!";
[email protected]2d316662008-09-03 18:18:14588 create_session_service_timer_.Start(
589 TimeDelta::FromMilliseconds(kCreateSessionServiceDelayMS), this,
590 &ProfileImpl::EnsureSessionServiceCreated);
[email protected]bdbc87c2009-01-25 05:08:54591
[email protected]89ebc7e2009-08-24 22:11:07592 if (CommandLine::ForCurrentProcess()->HasSwitch(
593 switches::kEnableExtensionTimelineApi)) {
594 extension_devtools_manager_ = new ExtensionDevToolsManager(this);
595 }
596
[email protected]382a0702009-06-26 17:12:27597 extension_process_manager_.reset(new ExtensionProcessManager(this));
[email protected]7120f132009-07-20 21:05:37598 extension_message_service_ = new ExtensionMessageService(this);
[email protected]382a0702009-06-26 17:12:27599
[email protected]e7244d82008-10-29 18:13:26600 PrefService* prefs = GetPrefs();
601 prefs->AddPrefObserver(prefs::kSpellCheckDictionary, this);
602 prefs->AddPrefObserver(prefs::kEnableSpellCheck, this);
[email protected]154a4332009-06-03 20:20:58603 prefs->AddPrefObserver(prefs::kEnableAutoSpellCorrect, this);
[email protected]380ab462009-04-24 01:23:58604
[email protected]eaadd9052009-06-23 18:02:23605 if (CommandLine::ForCurrentProcess()->
606 HasSwitch(switches::kPrivacyBlacklist)) {
607 std::wstring option = CommandLine::ForCurrentProcess()->GetSwitchValue(
608 switches::kPrivacyBlacklist);
609#if defined(OS_POSIX)
610 FilePath path(WideToUTF8(option));
611#else
612 FilePath path(option);
613#endif
[email protected]588074f2009-10-29 09:40:10614 blacklist_.reset(new Blacklist);
615 // TODO(phajdan.jr): Handle errors when reading blacklist.
616 BlacklistIO::ReadBinary(blacklist_.get(), path);
[email protected]eaadd9052009-06-23 18:02:23617 }
618
[email protected]405a64b2009-09-16 21:03:44619#if defined(OS_MACOSX)
620 // If the profile directory doesn't already have a cache directory and it
621 // is under ~/Library/Application Support, use a suitable cache directory
622 // under ~/Library/Caches. For example, a profile directory of
623 // ~/Library/Application Support/Google/Chrome/MyProfileName that doesn't
624 // have a "Cache" or "MediaCache" subdirectory would use the cache directory
625 // ~/Library/Caches/Google/Chrome/MyProfileName.
626 //
627 // TODO(akalin): Come up with unit tests for this.
628 // TODO(akalin): Use for Linux, too?
629 if (!HasACacheSubdir(path_)) {
630 FilePath app_data_path, user_cache_path;
631 if (PathService::Get(base::DIR_APP_DATA, &app_data_path) &&
632 PathService::Get(base::DIR_CACHE, &user_cache_path) &&
633 app_data_path.AppendRelativePath(path_, &user_cache_path)) {
634 base_cache_path_ = user_cache_path;
635 }
636 }
637#else
[email protected]bc96d562009-08-11 18:45:13638 if (!PathService::IsOverridden(chrome::DIR_USER_DATA))
639 PathService::Get(chrome::DIR_USER_CACHE, &base_cache_path_);
[email protected]405a64b2009-09-16 21:03:44640#endif
[email protected]bc96d562009-08-11 18:45:13641 if (base_cache_path_.empty())
642 base_cache_path_ = path_;
643
[email protected]4a190632009-05-09 01:07:42644 // Listen for theme installation.
[email protected]88cf3292009-05-22 01:48:43645 registrar_.Add(this, NotificationType::THEME_INSTALLED,
646 NotificationService::AllSources());
[email protected]48352c12009-08-15 01:19:11647
648 // Listen for bookmark model load, to bootstrap the sync service.
649 registrar_.Add(this, NotificationType::BOOKMARK_MODEL_LOADED,
650 Source<Profile>(this));
[email protected]db36938c2009-08-19 21:48:42651
652 ssl_config_service_manager_.reset(
653 SSLConfigServiceManager::CreateDefaultManager(this));
[email protected]2627431b2009-09-15 20:21:53654
655#if defined(OS_CHROMEOS)
[email protected]fecc1522009-10-15 21:08:29656 chromeos_preferences_.Init(prefs);
[email protected]2627431b2009-09-15 20:21:53657#endif
initial.commit09911bf2008-07-26 23:55:29658}
659
[email protected]bdbc87c2009-01-25 05:08:54660void ProfileImpl::InitExtensions() {
[email protected]8c756ac2009-01-30 23:36:41661 if (user_script_master_ || extensions_service_)
662 return; // Already initialized.
663
[email protected]bdbc87c2009-01-25 05:08:54664 const CommandLine* command_line = CommandLine::ForCurrentProcess();
[email protected]f93fe782009-02-19 01:26:13665 PrefService* prefs = GetPrefs();
[email protected]bdbc87c2009-01-25 05:08:54666 bool user_scripts_enabled =
[email protected]f0a51fb52009-03-05 12:46:38667 command_line->HasSwitch(switches::kEnableUserScripts) ||
[email protected]f93fe782009-02-19 01:26:13668 prefs->GetBoolean(prefs::kEnableUserScripts);
[email protected]bdbc87c2009-01-25 05:08:54669
[email protected]f7011fcb2009-01-28 21:54:32670 FilePath script_dir;
[email protected]bdbc87c2009-01-25 05:08:54671 if (user_scripts_enabled) {
[email protected]0cd957b2009-03-06 20:13:23672 if (command_line->HasSwitch(switches::kUserScriptsDir)) {
673 std::wstring path_string =
674 command_line->GetSwitchValue(switches::kUserScriptsDir);
675 script_dir = FilePath::FromWStringHack(path_string);
676 } else {
677 script_dir = GetPath();
678 script_dir = script_dir.Append(chrome::kUserScriptsDirname);
679 }
[email protected]bdbc87c2009-01-25 05:08:54680 }
681
[email protected]bb28e062009-02-27 17:19:18682 ExtensionErrorReporter::Init(true); // allow noisy errors.
[email protected]95d29192009-10-30 01:49:06683 user_script_master_ = new UserScriptMaster(script_dir);
[email protected]894bb502009-05-21 22:39:57684 extensions_service_ = new ExtensionsService(
[email protected]a9b00ac2009-06-25 21:03:23685 this,
686 CommandLine::ForCurrentProcess(),
687 GetPrefs(),
688 GetPath().AppendASCII(ExtensionsService::kInstallDirectoryName),
[email protected]c8b437d2009-07-20 21:26:36689 true);
[email protected]bdbc87c2009-01-25 05:08:54690
[email protected]9197f3b2009-06-02 00:49:27691 extensions_service_->Init();
[email protected]919ddc82009-07-15 04:30:12692
693 // Load any extensions specified with --load-extension.
694 if (command_line->HasSwitch(switches::kLoadExtension)) {
695 std::wstring path_string =
696 command_line->GetSwitchValue(switches::kLoadExtension);
697 FilePath path = FilePath::FromWStringHack(path_string);
698 extensions_service_->LoadExtension(path);
699
700 // Tell UserScriptMaser to watch this extension's directory for changes so
701 // you can live edit content scripts during development.
702 user_script_master_->AddWatchedPath(path);
703 }
[email protected]bdbc87c2009-01-25 05:08:54704}
705
[email protected]ea0c98cf2009-06-18 23:02:54706void ProfileImpl::InitWebResources() {
[email protected]0c274c202009-07-12 02:59:07707 if (web_resource_service_)
708 return; // Already initialized.
709
[email protected]6fad2632009-11-02 05:59:37710 web_resource_service_ = new WebResourceService(this);
[email protected]ea0c98cf2009-06-18 23:02:54711 web_resource_service_->StartAfterDelay();
712}
713
[email protected]9c8dd902009-11-19 17:50:42714NTPResourceCache* ProfileImpl::GetNTPResourceCache() {
715 if (!ntp_resource_cache_.get())
716 ntp_resource_cache_.reset(new NTPResourceCache(this));
717 return ntp_resource_cache_.get();
718}
719
initial.commit09911bf2008-07-26 23:55:29720ProfileImpl::~ProfileImpl() {
[email protected]169627b2008-12-06 19:30:19721 tab_restore_service_ = NULL;
initial.commit09911bf2008-07-26 23:55:29722
723 StopCreateSessionServiceTimer();
724 // TemplateURLModel schedules a task on the WebDataService from its
725 // destructor. Delete it first to ensure the task gets scheduled before we
726 // shut down the database.
727 template_url_model_.reset();
728
729 // The download manager queries the history system and should be deleted
730 // before the history is shutdown so it can properly cancel all requests.
731 download_manager_ = NULL;
732
[email protected]4a190632009-05-09 01:07:42733 // The theme provider provides bitmaps to whoever wants them.
[email protected]761962c2009-09-25 00:18:15734 theme_provider_.reset();
[email protected]4a190632009-05-09 01:07:42735
[email protected]44961292009-07-20 20:03:09736 // The ThumbnailStore saves thumbnails used by the NTP. Call Shutdown to
737 // save any new thumbnails to disk and release its reference to the
738 // HistoryService.
739 if (thumbnail_store_.get())
740 thumbnail_store_->Shutdown();
741
[email protected]e7244d82008-10-29 18:13:26742 // Remove pref observers.
743 PrefService* prefs = GetPrefs();
744 prefs->RemovePrefObserver(prefs::kSpellCheckDictionary, this);
745 prefs->RemovePrefObserver(prefs::kEnableSpellCheck, this);
[email protected]154a4332009-06-03 20:20:58746 prefs->RemovePrefObserver(prefs::kEnableAutoSpellCorrect, this);
[email protected]e7244d82008-10-29 18:13:26747
[email protected]9c8dd902009-11-19 17:50:42748 // Delete the NTP resource cache so we can unregister pref observers.
749 ntp_resource_cache_.reset();
750
[email protected]48352c12009-08-15 01:19:11751 sync_service_.reset();
[email protected]3a453fa2008-08-15 18:46:34752
initial.commit09911bf2008-07-26 23:55:29753 // Both HistoryService and WebDataService maintain threads for background
754 // processing. Its possible each thread still has tasks on it that have
755 // increased the ref count of the service. In such a situation, when we
756 // decrement the refcount, it won't be 0, and the threads/databases aren't
757 // properly shut down. By explicitly calling Cleanup/Shutdown we ensure the
758 // databases are properly closed.
759 if (web_data_service_.get())
760 web_data_service_->Shutdown();
761
762 if (history_service_.get())
763 history_service_->Cleanup();
764
[email protected]85c55dc2009-11-06 03:05:46765 if (spellcheck_host_.get())
766 spellcheck_host_->UnsetObserver();
initial.commit09911bf2008-07-26 23:55:29767
[email protected]cfc06f122009-11-16 22:18:55768 if (default_request_context_ == request_context_)
[email protected]47accfd62009-05-14 18:46:21769 default_request_context_ = NULL;
[email protected]6ab9b202008-12-23 22:34:50770
[email protected]47accfd62009-05-14 18:46:21771 CleanupRequestContext(request_context_);
772 CleanupRequestContext(media_request_context_);
773 CleanupRequestContext(extensions_request_context_);
[email protected]1e744f22009-04-08 01:00:17774
[email protected]eaadd9052009-06-23 18:02:23775 // When the request contexts are gone, the blacklist wont be needed anymore.
[email protected]588074f2009-10-29 09:40:10776 blacklist_.reset();
[email protected]eaadd9052009-06-23 18:02:23777
[email protected]d8e41ed2008-09-11 15:22:32778 // HistoryService may call into the BookmarkModel, as such we need to
779 // delete HistoryService before the BookmarkModel. The destructor for
[email protected]90ef13132008-08-27 03:27:46780 // HistoryService will join with HistoryService's backend thread so that
781 // by the time the destructor has finished we're sure it will no longer call
[email protected]d8e41ed2008-09-11 15:22:32782 // into the BookmarkModel.
[email protected]90ef13132008-08-27 03:27:46783 history_service_ = NULL;
784 bookmark_bar_model_.reset();
785
[email protected]0189bc722009-08-28 21:56:48786 // FaviconService depends on HistoryServce so make sure we delete
787 // HistoryService first.
788 favicon_service_ = NULL;
789
[email protected]7120f132009-07-20 21:05:37790 extension_message_service_->ProfileDestroyed();
791
[email protected]6ef635e42009-07-26 06:16:12792 if (extensions_service_)
793 extensions_service_->ProfileDestroyed();
794
[email protected]66da08b2009-10-19 22:27:00795 // This causes the Preferences file to be written to disk.
initial.commit09911bf2008-07-26 23:55:29796 MarkAsCleanShutdown();
797}
798
[email protected]4bf6afd2009-10-08 14:00:11799ProfileId ProfileImpl::GetRuntimeId() {
800 return reinterpret_cast<ProfileId>(this);
801}
802
[email protected]f7011fcb2009-01-28 21:54:32803FilePath ProfileImpl::GetPath() {
initial.commit09911bf2008-07-26 23:55:29804 return path_;
805}
806
807bool ProfileImpl::IsOffTheRecord() {
808 return false;
809}
810
811Profile* ProfileImpl::GetOffTheRecordProfile() {
812 if (!off_the_record_profile_.get()) {
813 scoped_ptr<OffTheRecordProfileImpl> p(new OffTheRecordProfileImpl(this));
814 off_the_record_profile_.swap(p);
815 }
816 return off_the_record_profile_.get();
817}
818
[email protected]860f55492009-03-27 19:50:59819void ProfileImpl::DestroyOffTheRecordProfile() {
820 off_the_record_profile_.reset();
821}
822
initial.commit09911bf2008-07-26 23:55:29823Profile* ProfileImpl::GetOriginalProfile() {
824 return this;
825}
826
[email protected]2f351cb2009-11-09 23:43:34827webkit_database::DatabaseTracker* ProfileImpl::GetDatabaseTracker() {
828 if (!db_tracker_)
829 db_tracker_ = new webkit_database::DatabaseTracker(GetPath());
830 return db_tracker_;
831}
832
initial.commit09911bf2008-07-26 23:55:29833VisitedLinkMaster* ProfileImpl::GetVisitedLinkMaster() {
834 if (!visited_link_master_.get()) {
835 scoped_ptr<VisitedLinkMaster> visited_links(
[email protected]6fad2632009-11-02 05:59:37836 new VisitedLinkMaster(visited_link_event_listener_.get(), this));
initial.commit09911bf2008-07-26 23:55:29837 if (!visited_links->Init())
838 return NULL;
839 visited_link_master_.swap(visited_links);
840 }
841
842 return visited_link_master_.get();
843}
844
[email protected]6014d672008-12-05 00:38:25845ExtensionsService* ProfileImpl::GetExtensionsService() {
846 return extensions_service_.get();
847}
848
[email protected]0938d3c2009-01-09 20:37:35849UserScriptMaster* ProfileImpl::GetUserScriptMaster() {
[email protected]0938d3c2009-01-09 20:37:35850 return user_script_master_.get();
[email protected]04fba9a92008-10-28 17:25:25851}
852
[email protected]89ebc7e2009-08-24 22:11:07853ExtensionDevToolsManager* ProfileImpl::GetExtensionDevToolsManager() {
854 return extension_devtools_manager_.get();
855}
856
[email protected]481e1a42009-05-06 20:56:05857ExtensionProcessManager* ProfileImpl::GetExtensionProcessManager() {
[email protected]382a0702009-06-26 17:12:27858 return extension_process_manager_.get();
[email protected]481e1a42009-05-06 20:56:05859}
860
[email protected]7120f132009-07-20 21:05:37861ExtensionMessageService* ProfileImpl::GetExtensionMessageService() {
862 return extension_message_service_.get();
863}
864
[email protected]34cc84f2009-02-13 10:04:35865SSLHostState* ProfileImpl::GetSSLHostState() {
866 if (!ssl_host_state_.get())
867 ssl_host_state_.reset(new SSLHostState());
868
869 DCHECK(ssl_host_state_->CalledOnValidThread());
870 return ssl_host_state_.get();
871}
872
[email protected]77f6fb432009-09-05 14:21:09873net::StrictTransportSecurityState*
874 ProfileImpl::GetStrictTransportSecurityState() {
875 if (!strict_transport_security_state_.get()) {
876 strict_transport_security_state_ = new net::StrictTransportSecurityState();
[email protected]0c03b432009-11-17 21:41:08877 strict_transport_security_persister_ =
878 new StrictTransportSecurityPersister();
879 strict_transport_security_persister_->Initialize(
[email protected]6fad2632009-11-02 05:59:37880 strict_transport_security_state_.get(), path_);
[email protected]887f80d2009-09-04 16:57:51881 }
[email protected]a9cea7542009-05-20 04:30:23882
[email protected]77f6fb432009-09-05 14:21:09883 return strict_transport_security_state_.get();
[email protected]a9cea7542009-05-20 04:30:23884}
885
initial.commit09911bf2008-07-26 23:55:29886PrefService* ProfileImpl::GetPrefs() {
887 if (!prefs_.get()) {
[email protected]6fad2632009-11-02 05:59:37888 prefs_.reset(new PrefService(GetPrefFilePath()));
initial.commit09911bf2008-07-26 23:55:29889
890 // The Profile class and ProfileManager class may read some prefs so
891 // register known prefs as soon as possible.
892 Profile::RegisterUserPrefs(prefs_.get());
893 ProfileManager::RegisterUserPrefs(prefs_.get());
[email protected]2627431b2009-09-15 20:21:53894#if defined(OS_CHROMEOS)
895 // Register Touchpad prefs here instead of in browser_prefs because these
896 // prefs are used in the constructor of ProfileImpl which happens before
897 // browser_prefs' RegisterAllPrefs is called.
[email protected]fecc1522009-10-15 21:08:29898 chromeos::Preferences::RegisterUserPrefs(prefs_.get());
[email protected]2627431b2009-09-15 20:21:53899#endif
initial.commit09911bf2008-07-26 23:55:29900
901 // The last session exited cleanly if there is no pref for
902 // kSessionExitedCleanly or the value for kSessionExitedCleanly is true.
903 last_session_exited_cleanly_ =
904 prefs_->GetBoolean(prefs::kSessionExitedCleanly);
905 // Mark the session as open.
906 prefs_->SetBoolean(prefs::kSessionExitedCleanly, false);
907 // Make sure we save to disk that the session has opened.
[email protected]6faa0e0d2009-04-28 06:50:36908 prefs_->ScheduleSavePersistentPrefs();
initial.commit09911bf2008-07-26 23:55:29909 }
910
911 return prefs_.get();
912}
913
[email protected]f7011fcb2009-01-28 21:54:32914FilePath ProfileImpl::GetPrefFilePath() {
915 FilePath pref_file_path = path_;
916 pref_file_path = pref_file_path.Append(chrome::kPreferencesFilename);
initial.commit09911bf2008-07-26 23:55:29917 return pref_file_path;
918}
919
[email protected]be180c802009-10-23 06:33:31920URLRequestContextGetter* ProfileImpl::GetRequestContext() {
initial.commit09911bf2008-07-26 23:55:29921 if (!request_context_) {
[email protected]f7011fcb2009-01-28 21:54:32922 FilePath cookie_path = GetPath();
923 cookie_path = cookie_path.Append(chrome::kCookieFilename);
[email protected]bc96d562009-08-11 18:45:13924 FilePath cache_path = base_cache_path_;
[email protected]e5642992009-06-26 23:06:31925 int max_size;
926 GetCacheParameters(kNormalContext, &cache_path, &max_size);
[email protected]2b2830a2009-02-07 01:58:42927
[email protected]405a64b2009-09-16 21:03:44928 cache_path = GetCachePath(cache_path);
[email protected]be180c802009-10-23 06:33:31929 request_context_ = ChromeURLRequestContextGetter::CreateOriginal(
930 this, cookie_path, cache_path, max_size);
initial.commit09911bf2008-07-26 23:55:29931
[email protected]6ab9b202008-12-23 22:34:50932 // The first request context is always a normal (non-OTR) request context.
933 // Even when Chromium is started in OTR mode, a normal profile is always
934 // created first.
935 if (!default_request_context_) {
936 default_request_context_ = request_context_;
[email protected]be180c802009-10-23 06:33:31937 // TODO(eroman): this isn't terribly useful anymore now that the
938 // URLRequestContext is constructed by the IO thread...
[email protected]6ab9b202008-12-23 22:34:50939 NotificationService::current()->Notify(
[email protected]bfd04a62009-02-01 18:16:56940 NotificationType::DEFAULT_REQUEST_CONTEXT_AVAILABLE,
[email protected]6ab9b202008-12-23 22:34:50941 NotificationService::AllSources(), NotificationService::NoDetails());
942 }
initial.commit09911bf2008-07-26 23:55:29943 }
944
945 return request_context_;
946}
947
[email protected]be180c802009-10-23 06:33:31948URLRequestContextGetter* ProfileImpl::GetRequestContextForMedia() {
[email protected]e7f29642009-03-02 22:53:18949 if (!media_request_context_) {
[email protected]bc96d562009-08-11 18:45:13950 FilePath cache_path = base_cache_path_;
[email protected]e5642992009-06-26 23:06:31951 int max_size;
952 GetCacheParameters(kMediaContext, &cache_path, &max_size);
[email protected]e3edeba2009-03-23 18:57:14953
[email protected]405a64b2009-09-16 21:03:44954 cache_path = GetMediaCachePath(cache_path);
[email protected]be180c802009-10-23 06:33:31955 media_request_context_ =
956 ChromeURLRequestContextGetter::CreateOriginalForMedia(
957 this, cache_path, max_size);
[email protected]e7f29642009-03-02 22:53:18958 }
959
960 return media_request_context_;
961}
962
[email protected]0189bc722009-08-28 21:56:48963FaviconService* ProfileImpl::GetFaviconService(ServiceAccessType sat) {
964 if (!favicon_service_created_) {
965 favicon_service_created_ = true;
966 scoped_refptr<FaviconService> service(new FaviconService(this));
967 favicon_service_.swap(service);
968 }
969 return favicon_service_.get();
970}
971
[email protected]be180c802009-10-23 06:33:31972URLRequestContextGetter* ProfileImpl::GetRequestContextForExtensions() {
[email protected]47accfd62009-05-14 18:46:21973 if (!extensions_request_context_) {
974 FilePath cookie_path = GetPath();
975 cookie_path = cookie_path.Append(chrome::kExtensionsCookieFilename);
976
977 extensions_request_context_ =
[email protected]be180c802009-10-23 06:33:31978 ChromeURLRequestContextGetter::CreateOriginalForExtensions(
979 this, cookie_path);
[email protected]47accfd62009-05-14 18:46:21980 }
981
982 return extensions_request_context_;
983}
984
[email protected]db36938c2009-08-19 21:48:42985net::SSLConfigService* ProfileImpl::GetSSLConfigService() {
986 return ssl_config_service_manager_->Get();
987}
988
[email protected]eaadd9052009-06-23 18:02:23989Blacklist* ProfileImpl::GetBlacklist() {
[email protected]588074f2009-10-29 09:40:10990 return blacklist_.get();
[email protected]eaadd9052009-06-23 18:02:23991}
992
initial.commit09911bf2008-07-26 23:55:29993HistoryService* ProfileImpl::GetHistoryService(ServiceAccessType sat) {
994 if (!history_service_created_) {
[email protected]90ef13132008-08-27 03:27:46995 history_service_created_ = true;
initial.commit09911bf2008-07-26 23:55:29996 scoped_refptr<HistoryService> history(new HistoryService(this));
[email protected]d8e41ed2008-09-11 15:22:32997 if (!history->Init(GetPath(), GetBookmarkModel()))
initial.commit09911bf2008-07-26 23:55:29998 return NULL;
999 history_service_.swap(history);
initial.commit09911bf2008-07-26 23:55:291000
1001 // Send out the notification that the history service was created.
1002 NotificationService::current()->
[email protected]bfd04a62009-02-01 18:16:561003 Notify(NotificationType::HISTORY_CREATED, Source<Profile>(this),
initial.commit09911bf2008-07-26 23:55:291004 Details<HistoryService>(history_service_.get()));
1005 }
1006 return history_service_.get();
1007}
1008
[email protected]0850fa62009-10-08 22:34:291009HistoryService* ProfileImpl::GetHistoryServiceWithoutCreating() {
1010 return history_service_.get();
1011}
1012
initial.commit09911bf2008-07-26 23:55:291013TemplateURLModel* ProfileImpl::GetTemplateURLModel() {
1014 if (!template_url_model_.get())
1015 template_url_model_.reset(new TemplateURLModel(this));
1016 return template_url_model_.get();
1017}
1018
1019TemplateURLFetcher* ProfileImpl::GetTemplateURLFetcher() {
1020 if (!template_url_fetcher_.get())
1021 template_url_fetcher_.reset(new TemplateURLFetcher(this));
1022 return template_url_fetcher_.get();
1023}
1024
[email protected]11f4857282009-11-13 19:56:171025SearchVersusNavigateClassifier*
1026ProfileImpl::GetSearchVersusNavigateClassifier() {
[email protected]90085af02009-10-29 17:53:211027 if (!search_versus_navigate_classifier_.get()) {
1028 search_versus_navigate_classifier_.reset(
1029 new SearchVersusNavigateClassifier(this));
1030 }
1031 return search_versus_navigate_classifier_.get();
1032}
1033
initial.commit09911bf2008-07-26 23:55:291034WebDataService* ProfileImpl::GetWebDataService(ServiceAccessType sat) {
1035 if (!created_web_data_service_)
1036 CreateWebDataService();
1037 return web_data_service_.get();
1038}
1039
[email protected]9cddbe372009-10-23 21:23:531040WebDataService* ProfileImpl::GetWebDataServiceWithoutCreating() {
1041 return web_data_service_.get();
1042}
1043
initial.commit09911bf2008-07-26 23:55:291044void ProfileImpl::CreateWebDataService() {
1045 DCHECK(!created_web_data_service_ && web_data_service_.get() == NULL);
1046 created_web_data_service_ = true;
1047 scoped_refptr<WebDataService> wds(new WebDataService());
1048 if (!wds->Init(GetPath()))
1049 return;
1050 web_data_service_.swap(wds);
1051}
1052
[email protected]e69d33952009-06-03 22:00:411053PasswordStore* ProfileImpl::GetPasswordStore(ServiceAccessType sat) {
1054 if (!created_password_store_)
1055 CreatePasswordStore();
1056 return password_store_.get();
1057}
1058
1059void ProfileImpl::CreatePasswordStore() {
1060 DCHECK(!created_password_store_ && password_store_.get() == NULL);
1061 created_password_store_ = true;
1062 scoped_refptr<PasswordStore> ps;
1063#if defined(OS_LINUX)
[email protected]d17634b2009-10-20 18:56:251064 // TODO(evanm): implement "native" password management.
1065 // This bug describes the issues.
1066 // http://code.google.com/p/chromium/issues/detail?id=12351
1067 ps = new PasswordStoreDefault(GetWebDataService(Profile::IMPLICIT_ACCESS));
1068 if (!ps->Init())
1069 return;
[email protected]e69d33952009-06-03 22:00:411070#elif defined(OS_WIN)
1071 ps = new PasswordStoreWin(GetWebDataService(Profile::IMPLICIT_ACCESS));
[email protected]034eba52009-06-03 22:50:561072#elif defined(OS_MACOSX)
[email protected]e0411ae52009-06-30 23:59:171073 FilePath login_db_file_path = GetPath();
1074 login_db_file_path = login_db_file_path.Append(chrome::kLoginDataFileName);
1075 LoginDatabaseMac* login_db = new LoginDatabaseMac();
1076 if (!login_db->Init(login_db_file_path)) {
1077 LOG(ERROR) << "Could not initialize login database.";
1078 delete login_db;
1079 return;
1080 }
1081 ps = new PasswordStoreMac(new MacKeychain(), login_db);
[email protected]e69d33952009-06-03 22:00:411082#else
1083 NOTIMPLEMENTED();
1084#endif
1085 if (!ps || !ps->Init()) {
1086 // Try falling back to the default password manager
1087 LOG(WARNING) << "Could not initialise native password manager - "
1088 "falling back to default";
1089 ps = new PasswordStoreDefault(GetWebDataService(Profile::IMPLICIT_ACCESS));
1090 if (!ps->Init())
1091 return;
1092 }
1093 password_store_.swap(ps);
1094}
1095
initial.commit09911bf2008-07-26 23:55:291096DownloadManager* ProfileImpl::GetDownloadManager() {
1097 if (!created_download_manager_) {
1098 scoped_refptr<DownloadManager> dlm(new DownloadManager);
1099 dlm->Init(this);
1100 created_download_manager_ = true;
1101 download_manager_.swap(dlm);
1102 }
1103 return download_manager_.get();
1104}
1105
1106bool ProfileImpl::HasCreatedDownloadManager() const {
1107 return created_download_manager_;
1108}
1109
[email protected]def11712009-11-06 00:42:151110PersonalDataManager* ProfileImpl::GetPersonalDataManager() {
1111 if (!personal_data_manager_.get()) {
1112 personal_data_manager_.reset(new PersonalDataManager);
1113 }
1114 return personal_data_manager_.get();
1115}
1116
[email protected]4a190632009-05-09 01:07:421117void ProfileImpl::InitThemes() {
1118 if (!created_theme_provider_) {
[email protected]0519e112009-09-29 15:49:571119#if defined(OS_LINUX)
[email protected]761962c2009-09-25 00:18:151120 theme_provider_.reset(new GtkThemeProvider);
[email protected]a5166af62009-07-03 00:42:291121#else
[email protected]761962c2009-09-25 00:18:151122 theme_provider_.reset(new BrowserThemeProvider);
[email protected]a5166af62009-07-03 00:42:291123#endif
[email protected]761962c2009-09-25 00:18:151124 theme_provider_->Init(this);
[email protected]4a190632009-05-09 01:07:421125 created_theme_provider_ = true;
[email protected]4a190632009-05-09 01:07:421126 }
1127}
1128
1129void ProfileImpl::SetTheme(Extension* extension) {
1130 InitThemes();
1131 theme_provider_.get()->SetTheme(extension);
1132}
1133
[email protected]a5166af62009-07-03 00:42:291134void ProfileImpl::SetNativeTheme() {
1135 InitThemes();
1136 theme_provider_.get()->SetNativeTheme();
1137}
1138
[email protected]4a190632009-05-09 01:07:421139void ProfileImpl::ClearTheme() {
1140 InitThemes();
1141 theme_provider_.get()->UseDefaultTheme();
1142}
1143
[email protected]51c490b2009-08-03 16:34:341144Extension* ProfileImpl::GetTheme() {
1145 InitThemes();
1146
1147 std::string id = theme_provider_.get()->GetThemeID();
1148 if (id == BrowserThemeProvider::kDefaultThemeID)
1149 return NULL;
1150
[email protected]61b411612009-11-10 23:17:411151 return extensions_service_->GetExtensionById(id, false);
[email protected]51c490b2009-08-03 16:34:341152}
1153
[email protected]4a190632009-05-09 01:07:421154ThemeProvider* ProfileImpl::GetThemeProvider() {
1155 InitThemes();
1156 return theme_provider_.get();
1157}
1158
initial.commit09911bf2008-07-26 23:55:291159SessionService* ProfileImpl::GetSessionService() {
1160 if (!session_service_.get() && !shutdown_session_service_) {
1161 session_service_ = new SessionService(this);
1162 session_service_->ResetFromCurrentBrowsers();
1163 }
1164 return session_service_.get();
1165}
1166
1167void ProfileImpl::ShutdownSessionService() {
1168 if (shutdown_session_service_)
1169 return;
1170
1171 // We're about to exit, force creation of the session service if it hasn't
1172 // been created yet. We do this to ensure session state matches the point in
1173 // time the user exited.
1174 GetSessionService();
1175 shutdown_session_service_ = true;
1176 session_service_ = NULL;
1177}
1178
1179bool ProfileImpl::HasSessionService() const {
1180 return (session_service_.get() != NULL);
1181}
1182
1183std::wstring ProfileImpl::GetName() {
1184 return GetPrefs()->GetString(prefs::kProfileName);
1185}
1186void ProfileImpl::SetName(const std::wstring& name) {
1187 GetPrefs()->SetString(prefs::kProfileName, name);
1188}
1189
1190std::wstring ProfileImpl::GetID() {
1191 return GetPrefs()->GetString(prefs::kProfileID);
1192}
1193void ProfileImpl::SetID(const std::wstring& id) {
1194 GetPrefs()->SetString(prefs::kProfileID, id);
1195}
1196
initial.commit09911bf2008-07-26 23:55:291197bool ProfileImpl::DidLastSessionExitCleanly() {
1198 // last_session_exited_cleanly_ is set when the preferences are loaded. Force
1199 // it to be set by asking for the prefs.
1200 GetPrefs();
1201 return last_session_exited_cleanly_;
1202}
1203
[email protected]d8e41ed2008-09-11 15:22:321204BookmarkModel* ProfileImpl::GetBookmarkModel() {
[email protected]90ef13132008-08-27 03:27:461205 if (!bookmark_bar_model_.get()) {
[email protected]d8e41ed2008-09-11 15:22:321206 bookmark_bar_model_.reset(new BookmarkModel(this));
[email protected]90ef13132008-08-27 03:27:461207 bookmark_bar_model_->Load();
1208 }
initial.commit09911bf2008-07-26 23:55:291209 return bookmark_bar_model_.get();
1210}
1211
1212bool ProfileImpl::IsSameProfile(Profile* profile) {
1213 if (profile == static_cast<Profile*>(this))
1214 return true;
1215 OffTheRecordProfileImpl* otr_profile = off_the_record_profile_.get();
1216 return otr_profile && profile == static_cast<Profile*>(otr_profile);
1217}
1218
1219Time ProfileImpl::GetStartTime() const {
1220 return start_time_;
1221}
1222
1223TabRestoreService* ProfileImpl::GetTabRestoreService() {
1224 if (!tab_restore_service_.get())
[email protected]169627b2008-12-06 19:30:191225 tab_restore_service_ = new TabRestoreService(this);
initial.commit09911bf2008-07-26 23:55:291226 return tab_restore_service_.get();
1227}
1228
[email protected]449478302009-06-09 20:04:281229ThumbnailStore* ProfileImpl::GetThumbnailStore() {
1230 if (!thumbnail_store_.get()) {
1231 thumbnail_store_ = new ThumbnailStore;
[email protected]daa82dc2009-07-28 01:22:251232 thumbnail_store_->Init(
1233 GetPath().Append(chrome::kNewTabThumbnailsFilename), this);
[email protected]449478302009-06-09 20:04:281234 }
1235 return thumbnail_store_.get();
1236}
1237
initial.commit09911bf2008-07-26 23:55:291238void ProfileImpl::ResetTabRestoreService() {
[email protected]169627b2008-12-06 19:30:191239 tab_restore_service_ = NULL;
initial.commit09911bf2008-07-26 23:55:291240}
1241
[email protected]85c55dc2009-11-06 03:05:461242SpellCheckHost* ProfileImpl::GetSpellCheckHost() {
1243 return spellcheck_host_ready_ ? spellcheck_host_.get() : NULL;
1244}
1245
1246void ProfileImpl::ReinitializeSpellCheckHost(bool force) {
1247 // If we are already loading the spellchecker, and this is just a hint to
1248 // load the spellchecker, do nothing.
1249 if (!force && spellcheck_host_.get())
1250 return;
1251
[email protected]f41301e2009-11-16 21:30:071252 spellcheck_host_ready_ = false;
1253
[email protected]85c55dc2009-11-06 03:05:461254 bool notify = false;
1255 if (spellcheck_host_.get()) {
1256 spellcheck_host_->UnsetObserver();
[email protected]71c012a2009-11-10 01:33:051257 spellcheck_host_ = NULL;
[email protected]85c55dc2009-11-06 03:05:461258 notify = true;
1259 }
1260
1261 PrefService* prefs = GetPrefs();
1262 if (prefs->GetBoolean(prefs::kEnableSpellCheck)) {
1263 // Retrieve the (perhaps updated recently) dictionary name from preferences.
1264 spellcheck_host_ = new SpellCheckHost(this,
1265 WideToASCII(prefs->GetString(prefs::kSpellCheckDictionary)),
1266 GetRequestContext());
[email protected]f41301e2009-11-16 21:30:071267 spellcheck_host_->Initialize();
[email protected]85c55dc2009-11-06 03:05:461268 } else if (notify) {
1269 // The spellchecker has been disabled.
1270 SpellCheckHostInitialized();
1271 }
1272}
1273
1274void ProfileImpl::SpellCheckHostInitialized() {
[email protected]cb6037d2009-11-16 22:55:171275 spellcheck_host_ready_ = spellcheck_host_ &&
[email protected]c27324b2009-11-19 22:44:291276 (spellcheck_host_->bdict_file() != base::kInvalidPlatformFileValue ||
1277 spellcheck_host_->use_platform_spellchecker());
[email protected]85c55dc2009-11-06 03:05:461278 NotificationService::current()->Notify(
1279 NotificationType::SPELLCHECK_HOST_REINITIALIZED,
1280 Source<Profile>(this), NotificationService::NoDetails());
1281}
initial.commit09911bf2008-07-26 23:55:291282
[email protected]3bf335a2009-06-26 20:46:061283WebKitContext* ProfileImpl::GetWebKitContext() {
1284 if (!webkit_context_.get())
1285 webkit_context_ = new WebKitContext(path_, false);
1286 DCHECK(webkit_context_.get());
1287 return webkit_context_.get();
1288}
1289
[email protected]4bb336302009-10-12 05:44:261290DesktopNotificationService* ProfileImpl::GetDesktopNotificationService() {
1291 DCHECK(ChromeThread::CurrentlyOn(ChromeThread::UI));
1292 if (!desktop_notification_service_.get()) {
[email protected]4bb336302009-10-12 05:44:261293 desktop_notification_service_.reset(new DesktopNotificationService(
[email protected]29672ab2009-10-30 03:44:031294 this, g_browser_process->notification_ui_manager()));
[email protected]4bb336302009-10-12 05:44:261295 }
[email protected]4bb336302009-10-12 05:44:261296 return desktop_notification_service_.get();
1297}
1298
initial.commit09911bf2008-07-26 23:55:291299void ProfileImpl::MarkAsCleanShutdown() {
1300 if (prefs_.get()) {
1301 // The session cleanly exited, set kSessionExitedCleanly appropriately.
1302 prefs_->SetBoolean(prefs::kSessionExitedCleanly, true);
1303
1304 // NOTE: If you change what thread this writes on, be sure and update
1305 // ChromeFrame::EndSession().
[email protected]6faa0e0d2009-04-28 06:50:361306 prefs_->SavePersistentPrefs();
initial.commit09911bf2008-07-26 23:55:291307 }
1308}
1309
[email protected]e7244d82008-10-29 18:13:261310void ProfileImpl::Observe(NotificationType type,
1311 const NotificationSource& source,
1312 const NotificationDetails& details) {
[email protected]bfd04a62009-02-01 18:16:561313 if (NotificationType::PREF_CHANGED == type) {
[email protected]e7244d82008-10-29 18:13:261314 std::wstring* pref_name_in = Details<std::wstring>(details).ptr();
1315 PrefService* prefs = Source<PrefService>(source).ptr();
1316 DCHECK(pref_name_in && prefs);
1317 if (*pref_name_in == prefs::kSpellCheckDictionary ||
[email protected]85c55dc2009-11-06 03:05:461318 *pref_name_in == prefs::kEnableSpellCheck) {
[email protected]85c55dc2009-11-06 03:05:461319 ReinitializeSpellCheckHost(true);
[email protected]c27324b2009-11-19 22:44:291320 } else if (*pref_name_in == prefs::kEnableAutoSpellCorrect) {
1321 NotificationService::current()->Notify(
1322 NotificationType::SPELLCHECK_AUTOSPELL_TOGGLED,
1323 Source<Profile>(this), NotificationService::NoDetails());
[email protected]e7244d82008-10-29 18:13:261324 }
[email protected]4a190632009-05-09 01:07:421325 } else if (NotificationType::THEME_INSTALLED == type) {
1326 Extension* extension = Details<Extension>(details).ptr();
1327 SetTheme(extension);
[email protected]48352c12009-08-15 01:19:111328 } else if (NotificationType::BOOKMARK_MODEL_LOADED == type) {
1329 GetProfileSyncService(); // Causes lazy-load if sync is enabled.
1330 registrar_.Remove(this, NotificationType::BOOKMARK_MODEL_LOADED,
1331 Source<Profile>(this));
[email protected]e7244d82008-10-29 18:13:261332 }
1333}
1334
initial.commit09911bf2008-07-26 23:55:291335void ProfileImpl::StopCreateSessionServiceTimer() {
[email protected]2d316662008-09-03 18:18:141336 create_session_service_timer_.Stop();
initial.commit09911bf2008-07-26 23:55:291337}
[email protected]3a453fa2008-08-15 18:46:341338
[email protected]48352c12009-08-15 01:19:111339ProfileSyncService* ProfileImpl::GetProfileSyncService() {
[email protected]eec3bcfa2009-11-12 17:23:431340 if (!ProfileSyncService::IsSyncEnabled()) {
1341 return NULL;
[email protected]7367f1a2009-10-10 01:09:441342 }
[email protected]eec3bcfa2009-11-12 17:23:431343 if (!sync_service_.get())
1344 InitSyncService();
1345 return sync_service_.get();
[email protected]48352c12009-08-15 01:19:111346}
1347
1348void ProfileImpl::InitSyncService() {
[email protected]48352c12009-08-15 01:19:111349 sync_service_.reset(new ProfileSyncService(this));
1350 sync_service_->Initialize();
[email protected]48352c12009-08-15 01:19:111351}