blob: 5d0ccecec2d9ff4fea4edf8158365baf0cfb9c6b [file] [log] [blame]
license.botbf09a502008-08-24 00:55:551// Copyright (c) 2006-2008 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
initial.commit09911bf2008-07-26 23:55:294
5#include "chrome/browser/profile.h"
6
7#include "base/command_line.h"
[email protected]04fba9a92008-10-28 17:25:258#include "base/file_path.h"
initial.commit09911bf2008-07-26 23:55:299#include "base/file_util.h"
initial.commit09911bf2008-07-26 23:55:2910#include "base/path_service.h"
11#include "base/scoped_ptr.h"
12#include "base/string_util.h"
[email protected]a9afddb2009-02-12 17:49:4213#include "chrome/browser/bookmarks/bookmark_model.h"
initial.commit09911bf2008-07-26 23:55:2914#include "chrome/browser/browser_list.h"
15#include "chrome/browser/browser_process.h"
[email protected]67a46b7f2009-06-16 21:41:0216#include "chrome/browser/browser_theme_provider.h"
[email protected]b7f05882009-02-22 01:21:5617#include "chrome/browser/download/download_manager.h"
[email protected]481e1a42009-05-06 20:56:0518#include "chrome/browser/extensions/extension_process_manager.h"
[email protected]6014d672008-12-05 00:38:2519#include "chrome/browser/extensions/extensions_service.h"
[email protected]0938d3c2009-01-09 20:37:3520#include "chrome/browser/extensions/user_script_master.h"
[email protected]a9afddb2009-02-12 17:49:4221#include "chrome/browser/history/history.h"
[email protected]3bf335a2009-06-26 20:46:0622#include "chrome/browser/in_process_webkit/webkit_context.h"
[email protected]6ab9b202008-12-23 22:34:5023#include "chrome/browser/net/chrome_url_request_context.h"
[email protected]e69d33952009-06-03 22:00:4124#include "chrome/browser/password_manager/password_store_default.h"
[email protected]eaadd9052009-06-23 18:02:2325#include "chrome/browser/privacy_blacklist/blacklist.h"
initial.commit09911bf2008-07-26 23:55:2926#include "chrome/browser/profile_manager.h"
[email protected]8c8657d62009-01-16 18:31:2627#include "chrome/browser/renderer_host/render_process_host.h"
[email protected]1132436e2009-04-08 20:06:3328#include "chrome/browser/search_engines/template_url_fetcher.h"
[email protected]f63ae312009-02-04 17:58:4629#include "chrome/browser/search_engines/template_url_model.h"
[email protected]85e921fb82009-02-11 23:19:4430#include "chrome/browser/sessions/session_service.h"
[email protected]bd580a252009-02-12 01:16:3031#include "chrome/browser/sessions/tab_restore_service.h"
[email protected]f0a644292009-02-25 23:32:4732#include "chrome/browser/spellchecker.h"
[email protected]1132436e2009-04-08 20:06:3333#include "chrome/browser/ssl/ssl_host_state.h"
[email protected]449478302009-06-09 20:04:2834#include "chrome/browser/thumbnail_store.h"
initial.commit09911bf2008-07-26 23:55:2935#include "chrome/browser/visitedlink_master.h"
36#include "chrome/browser/webdata/web_data_service.h"
37#include "chrome/common/chrome_constants.h"
38#include "chrome/common/chrome_paths.h"
39#include "chrome/common/chrome_switches.h"
[email protected]5b1a0e22009-05-26 19:00:5840#include "chrome/common/extensions/extension_error_reporter.h"
[email protected]47accfd62009-05-14 18:46:2141#include "chrome/common/net/cookie_monster_sqlite.h"
initial.commit09911bf2008-07-26 23:55:2942#include "chrome/common/notification_service.h"
43#include "chrome/common/pref_names.h"
[email protected]f7011fcb2009-01-28 21:54:3244#include "chrome/common/render_messages.h"
[email protected]f90f5c512009-02-18 19:10:5845#include "grit/locale_settings.h"
[email protected]a9cea7542009-05-20 04:30:2346#include "net/base/force_tls_state.h"
initial.commit09911bf2008-07-26 23:55:2947
[email protected]e1acf6f2008-10-27 20:43:3348using base::Time;
49using base::TimeDelta;
50
[email protected]e5642992009-06-26 23:06:3151namespace {
52
initial.commit09911bf2008-07-26 23:55:2953// Delay, in milliseconds, before we explicitly create the SessionService.
54static const int kCreateSessionServiceDelayMS = 500;
55
[email protected]e5642992009-06-26 23:06:3156enum ContextType {
57 kNormalContext,
58 kMediaContext
59};
60
61// Gets the cache parameters from the command line. |type| is the type of
62// request context that we need, |cache_path| will be set to the user provided
63// path, or will not be touched if there is not an argument. |max_size| will
64// be the user provided value or zero by default.
65void GetCacheParameters(ContextType type, FilePath* cache_path,
66 int* max_size) {
67 DCHECK(cache_path);
68 DCHECK(max_size);
69
70 // Override the cache location if specified by the user.
71 std::wstring user_path(CommandLine::ForCurrentProcess()->GetSwitchValue(
72 switches::kDiskCacheDir));
73
74 if (!user_path.empty()) {
75 *cache_path = FilePath::FromWStringHack(user_path);
76 }
77
78 const wchar_t* arg = kNormalContext == type ? switches::kDiskCacheSize :
79 switches::kMediaCacheSize;
80 std::string value =
81 WideToASCII(CommandLine::ForCurrentProcess()->GetSwitchValue(arg));
82
83 // By default we let the cache determine the right size.
84 *max_size = 0;
85 if (!StringToInt(value, max_size)) {
86 *max_size = 0;
87 } else if (max_size < 0) {
88 *max_size = 0;
89 }
90}
91
92} // namespace
93
initial.commit09911bf2008-07-26 23:55:2994// A pointer to the request context for the default profile. See comments on
95// Profile::GetDefaultRequestContext.
96URLRequestContext* Profile::default_request_context_;
97
[email protected]47accfd62009-05-14 18:46:2198static void CleanupRequestContext(ChromeURLRequestContext* context) {
99 if (context) {
100 context->CleanupOnUIThread();
101
102 // Clean up request context on IO thread.
103 g_browser_process->io_thread()->message_loop()->ReleaseSoon(FROM_HERE,
104 context);
105 }
106}
107
[email protected]34cc84f2009-02-13 10:04:35108// static
initial.commit09911bf2008-07-26 23:55:29109void Profile::RegisterUserPrefs(PrefService* prefs) {
[email protected]430d3f72008-10-27 17:56:55110 prefs->RegisterBooleanPref(prefs::kSearchSuggestEnabled, true);
initial.commit09911bf2008-07-26 23:55:29111 prefs->RegisterBooleanPref(prefs::kSessionExitedCleanly, true);
112 prefs->RegisterBooleanPref(prefs::kSafeBrowsingEnabled, true);
[email protected]74c8b422009-03-11 00:34:12113 // TODO(estade): IDS_SPELLCHECK_DICTIONARY should be an ASCII string.
[email protected]e7244d82008-10-29 18:13:26114 prefs->RegisterLocalizedStringPref(prefs::kSpellCheckDictionary,
115 IDS_SPELLCHECK_DICTIONARY);
116 prefs->RegisterBooleanPref(prefs::kEnableSpellCheck, true);
[email protected]154a4332009-06-03 20:20:58117 prefs->RegisterBooleanPref(prefs::kEnableAutoSpellCorrect, true);
[email protected]f93fe782009-02-19 01:26:13118 prefs->RegisterBooleanPref(prefs::kEnableUserScripts, false);
[email protected]4a190632009-05-09 01:07:42119 prefs->RegisterStringPref(prefs::kCurrentThemeID, L"");
120 prefs->RegisterDictionaryPref(prefs::kCurrentThemeImages);
121 prefs->RegisterDictionaryPref(prefs::kCurrentThemeColors);
122 prefs->RegisterDictionaryPref(prefs::kCurrentThemeTints);
[email protected]7895ea22009-06-02 20:53:50123 prefs->RegisterDictionaryPref(prefs::kCurrentThemeDisplayProperties);
[email protected]f93fe782009-02-19 01:26:13124 prefs->RegisterBooleanPref(prefs::kEnableExtensions, false);
initial.commit09911bf2008-07-26 23:55:29125}
126
[email protected]34cc84f2009-02-13 10:04:35127// static
[email protected]f7011fcb2009-01-28 21:54:32128Profile* Profile::CreateProfile(const FilePath& path) {
initial.commit09911bf2008-07-26 23:55:29129 return new ProfileImpl(path);
130}
131
[email protected]34cc84f2009-02-13 10:04:35132// static
initial.commit09911bf2008-07-26 23:55:29133URLRequestContext* Profile::GetDefaultRequestContext() {
134 return default_request_context_;
135}
136
[email protected]e69d33952009-06-03 22:00:41137#if defined(OS_LINUX)
138// Temporarily disabled while we figure some stuff out.
139// http://code.google.com/p/chromium/issues/detail?id=12351
140// #include "chrome/browser/password_manager/password_store_gnome.h"
141// #include "chrome/browser/password_manager/password_store_kwallet.h"
142#elif defined(OS_WIN)
143#include "chrome/browser/password_manager/password_store_win.h"
[email protected]034eba52009-06-03 22:50:56144#elif defined(OS_MACOSX)
145#include "chrome/browser/keychain_mac.h"
[email protected]e0411ae52009-06-30 23:59:17146#include "chrome/browser/password_manager/login_database_mac.h"
[email protected]034eba52009-06-03 22:50:56147#include "chrome/browser/password_manager/password_store_mac.h"
[email protected]e69d33952009-06-03 22:00:41148#endif
initial.commit09911bf2008-07-26 23:55:29149
initial.commit09911bf2008-07-26 23:55:29150////////////////////////////////////////////////////////////////////////////////
151//
152// OffTheRecordProfileImpl is a profile subclass that wraps an existing profile
[email protected]4a190632009-05-09 01:07:42153// to make it suitable for the off the record mode.
initial.commit09911bf2008-07-26 23:55:29154//
155////////////////////////////////////////////////////////////////////////////////
156class OffTheRecordProfileImpl : public Profile,
157 public NotificationObserver {
158 public:
159 explicit OffTheRecordProfileImpl(Profile* real_profile)
160 : profile_(real_profile),
[email protected]47accfd62009-05-14 18:46:21161 extensions_request_context_(NULL),
initial.commit09911bf2008-07-26 23:55:29162 start_time_(Time::Now()) {
[email protected]6ab9b202008-12-23 22:34:50163 request_context_ = ChromeURLRequestContext::CreateOffTheRecord(this);
initial.commit09911bf2008-07-26 23:55:29164 request_context_->AddRef();
[email protected]481e1a42009-05-06 20:56:05165
initial.commit09911bf2008-07-26 23:55:29166 // Register for browser close notifications so we can detect when the last
167 // off-the-record window is closed, in which case we can clean our states
168 // (cookies, downloads...).
[email protected]88cf3292009-05-22 01:48:43169 registrar_.Add(this, NotificationType::BROWSER_CLOSED,
170 NotificationService::AllSources());
initial.commit09911bf2008-07-26 23:55:29171 }
172
173 virtual ~OffTheRecordProfileImpl() {
[email protected]47accfd62009-05-14 18:46:21174 CleanupRequestContext(request_context_);
[email protected]47accfd62009-05-14 18:46:21175 CleanupRequestContext(extensions_request_context_);
initial.commit09911bf2008-07-26 23:55:29176 }
177
[email protected]f7011fcb2009-01-28 21:54:32178 virtual FilePath GetPath() { return profile_->GetPath(); }
initial.commit09911bf2008-07-26 23:55:29179
180 virtual bool IsOffTheRecord() {
181 return true;
182 }
183
184 virtual Profile* GetOffTheRecordProfile() {
185 return this;
186 }
187
[email protected]860f55492009-03-27 19:50:59188 virtual void DestroyOffTheRecordProfile() {
189 // Suicide is bad!
190 NOTREACHED();
191 }
192
initial.commit09911bf2008-07-26 23:55:29193 virtual Profile* GetOriginalProfile() {
194 return profile_;
195 }
196
197 virtual VisitedLinkMaster* GetVisitedLinkMaster() {
[email protected]7fb6c862009-03-13 02:51:49198 // We don't provide access to the VisitedLinkMaster when we're OffTheRecord
199 // because we don't want to leak the sites that the user has visited before.
200 return NULL;
initial.commit09911bf2008-07-26 23:55:29201 }
202
[email protected]6014d672008-12-05 00:38:25203 virtual ExtensionsService* GetExtensionsService() {
[email protected]1bd54132009-06-11 00:05:34204 return NULL;
[email protected]6014d672008-12-05 00:38:25205 }
206
[email protected]0938d3c2009-01-09 20:37:35207 virtual UserScriptMaster* GetUserScriptMaster() {
208 return profile_->GetUserScriptMaster();
[email protected]04fba9a92008-10-28 17:25:25209 }
210
[email protected]481e1a42009-05-06 20:56:05211 virtual ExtensionProcessManager* GetExtensionProcessManager() {
[email protected]1bd54132009-06-11 00:05:34212 return NULL;
[email protected]481e1a42009-05-06 20:56:05213 }
214
[email protected]34cc84f2009-02-13 10:04:35215 virtual SSLHostState* GetSSLHostState() {
216 if (!ssl_host_state_.get())
217 ssl_host_state_.reset(new SSLHostState());
218
219 DCHECK(ssl_host_state_->CalledOnValidThread());
220 return ssl_host_state_.get();
221 }
222
[email protected]a9cea7542009-05-20 04:30:23223 virtual net::ForceTLSState* GetForceTLSState() {
224 if (!force_tls_state_.get())
225 force_tls_state_.reset(new net::ForceTLSState());
226
227 return force_tls_state_.get();
228 }
229
initial.commit09911bf2008-07-26 23:55:29230 virtual HistoryService* GetHistoryService(ServiceAccessType sat) {
231 if (sat == EXPLICIT_ACCESS) {
232 return profile_->GetHistoryService(sat);
233 } else {
234 NOTREACHED() << "This profile is OffTheRecord";
235 return NULL;
236 }
237 }
238
initial.commit09911bf2008-07-26 23:55:29239 virtual WebDataService* GetWebDataService(ServiceAccessType sat) {
240 if (sat == EXPLICIT_ACCESS) {
241 return profile_->GetWebDataService(sat);
242 } else {
243 NOTREACHED() << "This profile is OffTheRecord";
244 return NULL;
245 }
246 }
247
[email protected]e69d33952009-06-03 22:00:41248 virtual PasswordStore* GetPasswordStore(ServiceAccessType sat) {
249 if (sat == EXPLICIT_ACCESS) {
250 return profile_->GetPasswordStore(sat);
251 } else {
252 NOTREACHED() << "This profile is OffTheRecord";
253 return NULL;
254 }
255 }
256
initial.commit09911bf2008-07-26 23:55:29257 virtual PrefService* GetPrefs() {
258 return profile_->GetPrefs();
259 }
260
261 virtual TemplateURLModel* GetTemplateURLModel() {
262 return profile_->GetTemplateURLModel();
263 }
264
265 virtual TemplateURLFetcher* GetTemplateURLFetcher() {
266 return profile_->GetTemplateURLFetcher();
267 }
268
269 virtual DownloadManager* GetDownloadManager() {
270 if (!download_manager_.get()) {
271 scoped_refptr<DownloadManager> dlm(new DownloadManager);
272 dlm->Init(this);
273 download_manager_.swap(dlm);
274 }
275 return download_manager_.get();
276 }
277
278 virtual bool HasCreatedDownloadManager() const {
279 return (download_manager_.get() != NULL);
280 }
281
[email protected]4a190632009-05-09 01:07:42282 virtual void InitThemes() {
283 GetOriginalProfile()->InitThemes();
284 }
285
286 virtual void SetTheme(Extension* extension) {
287 GetOriginalProfile()->SetTheme(extension);
288 }
289
290 virtual void ClearTheme() {
291 GetOriginalProfile()->ClearTheme();
292 }
293
294 virtual ThemeProvider* GetThemeProvider() {
295 return GetOriginalProfile()->GetThemeProvider();
296 }
297
initial.commit09911bf2008-07-26 23:55:29298 virtual URLRequestContext* GetRequestContext() {
299 return request_context_;
300 }
301
[email protected]e7f29642009-03-02 22:53:18302 virtual URLRequestContext* GetRequestContextForMedia() {
[email protected]d14c7ac2009-05-29 20:38:11303 // In OTR mode, media request context is the same as the original one.
304 return request_context_;
[email protected]e7f29642009-03-02 22:53:18305 }
306
[email protected]47accfd62009-05-14 18:46:21307 URLRequestContext* GetRequestContextForExtensions() {
308 if (!extensions_request_context_) {
309 extensions_request_context_ =
310 ChromeURLRequestContext::CreateOffTheRecordForExtensions(this);
311 extensions_request_context_->AddRef();
312
313 DCHECK(extensions_request_context_->cookie_store());
314 }
315
316 return extensions_request_context_;
317 }
318
[email protected]eaadd9052009-06-23 18:02:23319 virtual Blacklist* GetBlacklist() {
320 return GetOriginalProfile()->GetBlacklist();
321 }
322
initial.commit09911bf2008-07-26 23:55:29323 virtual SessionService* GetSessionService() {
324 // Don't save any sessions when off the record.
325 return NULL;
326 }
327
328 virtual void ShutdownSessionService() {
329 // We don't allow a session service, nothing to do.
330 }
331
332 virtual bool HasSessionService() const {
333 // We never have a session service.
334 return false;
335 }
336
337 virtual std::wstring GetName() {
338 return profile_->GetName();
339 }
340
341 virtual void SetName(const std::wstring& name) {
342 profile_->SetName(name);
343 }
344
345 virtual std::wstring GetID() {
346 return profile_->GetID();
347 }
348
349 virtual void SetID(const std::wstring& id) {
350 profile_->SetID(id);
351 }
352
initial.commit09911bf2008-07-26 23:55:29353 virtual bool DidLastSessionExitCleanly() {
354 return profile_->DidLastSessionExitCleanly();
355 }
356
[email protected]d8e41ed2008-09-11 15:22:32357 virtual BookmarkModel* GetBookmarkModel() {
358 return profile_->GetBookmarkModel();
initial.commit09911bf2008-07-26 23:55:29359 }
360
[email protected]3a453fa2008-08-15 18:46:34361#ifdef CHROME_PERSONALIZATION
[email protected]57d3d0a2008-09-24 00:50:07362 virtual ProfilePersonalization* GetProfilePersonalization() {
[email protected]3a453fa2008-08-15 18:46:34363 return profile_->GetProfilePersonalization();
364 }
365#endif
366
initial.commit09911bf2008-07-26 23:55:29367 virtual bool IsSameProfile(Profile* profile) {
368 if (profile == static_cast<Profile*>(this))
369 return true;
370 return profile == profile_;
371 }
372
373 virtual Time GetStartTime() const {
374 return start_time_;
375 }
376
377 virtual TabRestoreService* GetTabRestoreService() {
378 return NULL;
379 }
380
[email protected]e7244d82008-10-29 18:13:26381 virtual void ResetTabRestoreService() {
[email protected]20930852008-10-15 19:30:41382 }
383
[email protected]e7244d82008-10-29 18:13:26384 virtual void ReinitializeSpellChecker() {
385 profile_->ReinitializeSpellChecker();
initial.commit09911bf2008-07-26 23:55:29386 }
387
388 virtual SpellChecker* GetSpellChecker() {
389 return profile_->GetSpellChecker();
390 }
391
[email protected]3bf335a2009-06-26 20:46:06392 virtual WebKitContext* GetWebKitContext() {
393 if (!webkit_context_.get())
394 webkit_context_ = new WebKitContext(GetPath(), true);
395 DCHECK(webkit_context_.get());
396 return webkit_context_.get();
397}
398
[email protected]449478302009-06-09 20:04:28399 virtual ThumbnailStore* GetThumbnailStore() {
400 return NULL;
401 }
402
initial.commit09911bf2008-07-26 23:55:29403 virtual void MarkAsCleanShutdown() {
404 }
405
[email protected]bdbc87c2009-01-25 05:08:54406 virtual void InitExtensions() {
407 NOTREACHED();
408 }
409
[email protected]ea0c98cf2009-06-18 23:02:54410 virtual void InitWebResources() {
411 NOTREACHED();
412 }
413
initial.commit09911bf2008-07-26 23:55:29414 virtual void ExitedOffTheRecordMode() {
415 // Drop our download manager so we forget about all the downloads made
416 // in off-the-record mode.
417 download_manager_ = NULL;
418 }
419
420 virtual void Observe(NotificationType type,
421 const NotificationSource& source,
422 const NotificationDetails& details) {
[email protected]bfd04a62009-02-01 18:16:56423 DCHECK_EQ(NotificationType::BROWSER_CLOSED, type.value);
initial.commit09911bf2008-07-26 23:55:29424 // We are only interested in OTR browser closing.
425 if (Source<Browser>(source)->profile() != this)
426 return;
427
428 // Let's check if we still have an Off The Record window opened.
429 // Note that we check against 1 as this notification is sent before the
430 // browser window is actually removed from the list.
431 if (BrowserList::GetBrowserCount(this) <= 1)
432 ExitedOffTheRecordMode();
433 }
434
435 private:
[email protected]88cf3292009-05-22 01:48:43436 NotificationRegistrar registrar_;
437
initial.commit09911bf2008-07-26 23:55:29438 // The real underlying profile.
439 Profile* profile_;
440
[email protected]6ab9b202008-12-23 22:34:50441 // The context to use for requests made from this OTR session.
442 ChromeURLRequestContext* request_context_;
initial.commit09911bf2008-07-26 23:55:29443
[email protected]47accfd62009-05-14 18:46:21444 ChromeURLRequestContext* extensions_request_context_;
445
initial.commit09911bf2008-07-26 23:55:29446 // The download manager that only stores downloaded items in memory.
447 scoped_refptr<DownloadManager> download_manager_;
448
[email protected]4a190632009-05-09 01:07:42449 scoped_refptr<BrowserThemeProvider> theme_provider_;
450
[email protected]3bf335a2009-06-26 20:46:06451 // Use a special WebKit context for OTR browsing.
452 scoped_refptr<WebKitContext> webkit_context_;
453
[email protected]34cc84f2009-02-13 10:04:35454 // We don't want SSLHostState from the OTR profile to leak back to the main
455 // profile because then the main profile would learn some of the host names
456 // the user visited while OTR.
457 scoped_ptr<SSLHostState> ssl_host_state_;
458
[email protected]a9cea7542009-05-20 04:30:23459 // The ForceTLSState that only stores enabled sites in memory.
460 scoped_ptr<net::ForceTLSState> force_tls_state_;
461
initial.commit09911bf2008-07-26 23:55:29462 // Time we were started.
463 Time start_time_;
464
465 DISALLOW_EVIL_CONSTRUCTORS(OffTheRecordProfileImpl);
466};
467
[email protected]f7011fcb2009-01-28 21:54:32468ProfileImpl::ProfileImpl(const FilePath& path)
initial.commit09911bf2008-07-26 23:55:29469 : path_(path),
[email protected]f7011fcb2009-01-28 21:54:32470 request_context_(NULL),
[email protected]363347b2009-03-13 20:06:57471 media_request_context_(NULL),
[email protected]47accfd62009-05-14 18:46:21472 extensions_request_context_(NULL),
[email protected]eaadd9052009-06-23 18:02:23473 blacklist_(NULL),
[email protected]f7011fcb2009-01-28 21:54:32474 history_service_created_(false),
475 created_web_data_service_(false),
[email protected]e69d33952009-06-03 22:00:41476 created_password_store_(false),
[email protected]f7011fcb2009-01-28 21:54:32477 created_download_manager_(false),
[email protected]4a190632009-05-09 01:07:42478 created_theme_provider_(false),
[email protected]f7011fcb2009-01-28 21:54:32479 start_time_(Time::Now()),
480 spellchecker_(NULL),
initial.commit09911bf2008-07-26 23:55:29481 shutdown_session_service_(false) {
482 DCHECK(!path.empty()) << "Using an empty path will attempt to write " <<
483 "profile files to the root directory!";
[email protected]2d316662008-09-03 18:18:14484 create_session_service_timer_.Start(
485 TimeDelta::FromMilliseconds(kCreateSessionServiceDelayMS), this,
486 &ProfileImpl::EnsureSessionServiceCreated);
[email protected]bdbc87c2009-01-25 05:08:54487
[email protected]382a0702009-06-26 17:12:27488 extension_process_manager_.reset(new ExtensionProcessManager(this));
489
[email protected]e7244d82008-10-29 18:13:26490 PrefService* prefs = GetPrefs();
491 prefs->AddPrefObserver(prefs::kSpellCheckDictionary, this);
492 prefs->AddPrefObserver(prefs::kEnableSpellCheck, this);
[email protected]154a4332009-06-03 20:20:58493 prefs->AddPrefObserver(prefs::kEnableAutoSpellCorrect, this);
[email protected]380ab462009-04-24 01:23:58494
495#ifdef CHROME_PERSONALIZATION
496 if (!CommandLine::ForCurrentProcess()->HasSwitch(switches::kDisableP13n))
497 personalization_.reset(Personalization::CreateProfilePersonalization(this));
498#endif
499
[email protected]eaadd9052009-06-23 18:02:23500 if (CommandLine::ForCurrentProcess()->
501 HasSwitch(switches::kPrivacyBlacklist)) {
502 std::wstring option = CommandLine::ForCurrentProcess()->GetSwitchValue(
503 switches::kPrivacyBlacklist);
504#if defined(OS_POSIX)
505 FilePath path(WideToUTF8(option));
506#else
507 FilePath path(option);
508#endif
509 blacklist_ = new Blacklist(path);
510 }
511
[email protected]1351b6a2009-04-09 20:13:22512#if defined(OS_LINUX)
513 // TODO(port): Remove ifdef when the Linux splash page is not needed.
514 prefs->transient()->SetString(prefs::kHomePage, "about:linux-splash");
515 prefs->transient()->SetBoolean(prefs::kHomePageIsNewTabPage, false);
516#endif
[email protected]4a190632009-05-09 01:07:42517
518 // Listen for theme installation.
[email protected]88cf3292009-05-22 01:48:43519 registrar_.Add(this, NotificationType::THEME_INSTALLED,
520 NotificationService::AllSources());
initial.commit09911bf2008-07-26 23:55:29521}
522
[email protected]bdbc87c2009-01-25 05:08:54523void ProfileImpl::InitExtensions() {
[email protected]8c756ac2009-01-30 23:36:41524 if (user_script_master_ || extensions_service_)
525 return; // Already initialized.
526
[email protected]bdbc87c2009-01-25 05:08:54527 const CommandLine* command_line = CommandLine::ForCurrentProcess();
[email protected]f93fe782009-02-19 01:26:13528 PrefService* prefs = GetPrefs();
[email protected]bdbc87c2009-01-25 05:08:54529 bool user_scripts_enabled =
[email protected]f0a51fb52009-03-05 12:46:38530 command_line->HasSwitch(switches::kEnableUserScripts) ||
[email protected]f93fe782009-02-19 01:26:13531 prefs->GetBoolean(prefs::kEnableUserScripts);
[email protected]bdbc87c2009-01-25 05:08:54532
[email protected]f7011fcb2009-01-28 21:54:32533 FilePath script_dir;
[email protected]bdbc87c2009-01-25 05:08:54534 if (user_scripts_enabled) {
[email protected]0cd957b2009-03-06 20:13:23535 if (command_line->HasSwitch(switches::kUserScriptsDir)) {
536 std::wstring path_string =
537 command_line->GetSwitchValue(switches::kUserScriptsDir);
538 script_dir = FilePath::FromWStringHack(path_string);
539 } else {
540 script_dir = GetPath();
541 script_dir = script_dir.Append(chrome::kUserScriptsDirname);
542 }
[email protected]bdbc87c2009-01-25 05:08:54543 }
544
[email protected]bb28e062009-02-27 17:19:18545 ExtensionErrorReporter::Init(true); // allow noisy errors.
[email protected]bdbc87c2009-01-25 05:08:54546 user_script_master_ = new UserScriptMaster(
[email protected]9197f3b2009-06-02 00:49:27547 g_browser_process->file_thread()->message_loop(),
548 script_dir);
[email protected]894bb502009-05-21 22:39:57549 extensions_service_ = new ExtensionsService(
[email protected]a9b00ac2009-06-25 21:03:23550 this,
551 CommandLine::ForCurrentProcess(),
552 GetPrefs(),
553 GetPath().AppendASCII(ExtensionsService::kInstallDirectoryName),
554 MessageLoop::current(),
[email protected]a1257b12009-06-12 02:51:34555 g_browser_process->file_thread()->message_loop());
[email protected]bdbc87c2009-01-25 05:08:54556
[email protected]9197f3b2009-06-02 00:49:27557 extensions_service_->Init();
[email protected]bdbc87c2009-01-25 05:08:54558}
559
[email protected]ea0c98cf2009-06-18 23:02:54560void ProfileImpl::InitWebResources() {
561 web_resource_service_ = new WebResourceService(
562 this,
563 g_browser_process->file_thread()->message_loop());
564
565 web_resource_service_->StartAfterDelay();
566}
567
initial.commit09911bf2008-07-26 23:55:29568ProfileImpl::~ProfileImpl() {
[email protected]169627b2008-12-06 19:30:19569 tab_restore_service_ = NULL;
initial.commit09911bf2008-07-26 23:55:29570
571 StopCreateSessionServiceTimer();
572 // TemplateURLModel schedules a task on the WebDataService from its
573 // destructor. Delete it first to ensure the task gets scheduled before we
574 // shut down the database.
575 template_url_model_.reset();
576
577 // The download manager queries the history system and should be deleted
578 // before the history is shutdown so it can properly cancel all requests.
579 download_manager_ = NULL;
580
[email protected]4a190632009-05-09 01:07:42581 // The theme provider provides bitmaps to whoever wants them.
582 theme_provider_ = NULL;
583
[email protected]e7244d82008-10-29 18:13:26584 // Remove pref observers.
585 PrefService* prefs = GetPrefs();
586 prefs->RemovePrefObserver(prefs::kSpellCheckDictionary, this);
587 prefs->RemovePrefObserver(prefs::kEnableSpellCheck, this);
[email protected]154a4332009-06-03 20:20:58588 prefs->RemovePrefObserver(prefs::kEnableAutoSpellCorrect, this);
[email protected]e7244d82008-10-29 18:13:26589
[email protected]3a453fa2008-08-15 18:46:34590#ifdef CHROME_PERSONALIZATION
[email protected]57d3d0a2008-09-24 00:50:07591 personalization_.reset();
[email protected]3a453fa2008-08-15 18:46:34592#endif
593
initial.commit09911bf2008-07-26 23:55:29594 // Both HistoryService and WebDataService maintain threads for background
595 // processing. Its possible each thread still has tasks on it that have
596 // increased the ref count of the service. In such a situation, when we
597 // decrement the refcount, it won't be 0, and the threads/databases aren't
598 // properly shut down. By explicitly calling Cleanup/Shutdown we ensure the
599 // databases are properly closed.
600 if (web_data_service_.get())
601 web_data_service_->Shutdown();
602
603 if (history_service_.get())
604 history_service_->Cleanup();
605
606 // The I/O thread may be NULL during testing.
[email protected]ab820df2008-08-26 05:55:10607 base::Thread* io_thread = g_browser_process->io_thread();
initial.commit09911bf2008-07-26 23:55:29608
609 if (spellchecker_) {
610 // The spellchecker must be deleted on the I/O thread. During testing, we
611 // don't have an I/O thread.
612 if (io_thread)
613 io_thread->message_loop()->ReleaseSoon(FROM_HERE, spellchecker_);
614 else
615 spellchecker_->Release();
616 }
617
[email protected]47accfd62009-05-14 18:46:21618 if (default_request_context_ == request_context_)
619 default_request_context_ = NULL;
[email protected]6ab9b202008-12-23 22:34:50620
[email protected]47accfd62009-05-14 18:46:21621 CleanupRequestContext(request_context_);
622 CleanupRequestContext(media_request_context_);
623 CleanupRequestContext(extensions_request_context_);
[email protected]1e744f22009-04-08 01:00:17624
[email protected]eaadd9052009-06-23 18:02:23625 // When the request contexts are gone, the blacklist wont be needed anymore.
626 delete blacklist_;
627 blacklist_ = 0;
628
[email protected]d8e41ed2008-09-11 15:22:32629 // HistoryService may call into the BookmarkModel, as such we need to
630 // delete HistoryService before the BookmarkModel. The destructor for
[email protected]90ef13132008-08-27 03:27:46631 // HistoryService will join with HistoryService's backend thread so that
632 // by the time the destructor has finished we're sure it will no longer call
[email protected]d8e41ed2008-09-11 15:22:32633 // into the BookmarkModel.
[email protected]90ef13132008-08-27 03:27:46634 history_service_ = NULL;
635 bookmark_bar_model_.reset();
636
initial.commit09911bf2008-07-26 23:55:29637 MarkAsCleanShutdown();
638}
639
[email protected]f7011fcb2009-01-28 21:54:32640FilePath ProfileImpl::GetPath() {
initial.commit09911bf2008-07-26 23:55:29641 return path_;
642}
643
644bool ProfileImpl::IsOffTheRecord() {
645 return false;
646}
647
648Profile* ProfileImpl::GetOffTheRecordProfile() {
649 if (!off_the_record_profile_.get()) {
650 scoped_ptr<OffTheRecordProfileImpl> p(new OffTheRecordProfileImpl(this));
651 off_the_record_profile_.swap(p);
652 }
653 return off_the_record_profile_.get();
654}
655
[email protected]860f55492009-03-27 19:50:59656void ProfileImpl::DestroyOffTheRecordProfile() {
657 off_the_record_profile_.reset();
658}
659
initial.commit09911bf2008-07-26 23:55:29660Profile* ProfileImpl::GetOriginalProfile() {
661 return this;
662}
663
[email protected]176aa482008-11-14 03:25:15664static void BroadcastNewHistoryTable(base::SharedMemory* table_memory) {
initial.commit09911bf2008-07-26 23:55:29665 if (!table_memory)
666 return;
667
668 // send to all RenderProcessHosts
669 for (RenderProcessHost::iterator i = RenderProcessHost::begin();
670 i != RenderProcessHost::end(); i++) {
[email protected]03c47322009-06-29 17:25:27671 if (!i->second->HasConnection())
initial.commit09911bf2008-07-26 23:55:29672 continue;
673
[email protected]176aa482008-11-14 03:25:15674 base::SharedMemoryHandle new_table;
[email protected]f7011fcb2009-01-28 21:54:32675 base::ProcessHandle process = i->second->process().handle();
initial.commit09911bf2008-07-26 23:55:29676 if (!process) {
677 // process can be null if it's started with the --single-process flag.
[email protected]f7011fcb2009-01-28 21:54:32678 process = base::Process::Current().handle();
initial.commit09911bf2008-07-26 23:55:29679 }
680
681 table_memory->ShareToProcess(process, &new_table);
682 IPC::Message* msg = new ViewMsg_VisitedLink_NewTable(new_table);
[email protected]03c47322009-06-29 17:25:27683 i->second->Send(msg);
initial.commit09911bf2008-07-26 23:55:29684 }
685}
686
687VisitedLinkMaster* ProfileImpl::GetVisitedLinkMaster() {
688 if (!visited_link_master_.get()) {
689 scoped_ptr<VisitedLinkMaster> visited_links(
690 new VisitedLinkMaster(g_browser_process->file_thread(),
691 BroadcastNewHistoryTable, this));
692 if (!visited_links->Init())
693 return NULL;
694 visited_link_master_.swap(visited_links);
695 }
696
697 return visited_link_master_.get();
698}
699
[email protected]6014d672008-12-05 00:38:25700ExtensionsService* ProfileImpl::GetExtensionsService() {
701 return extensions_service_.get();
702}
703
[email protected]0938d3c2009-01-09 20:37:35704UserScriptMaster* ProfileImpl::GetUserScriptMaster() {
[email protected]0938d3c2009-01-09 20:37:35705 return user_script_master_.get();
[email protected]04fba9a92008-10-28 17:25:25706}
707
[email protected]481e1a42009-05-06 20:56:05708ExtensionProcessManager* ProfileImpl::GetExtensionProcessManager() {
[email protected]382a0702009-06-26 17:12:27709 return extension_process_manager_.get();
[email protected]481e1a42009-05-06 20:56:05710}
711
[email protected]34cc84f2009-02-13 10:04:35712SSLHostState* ProfileImpl::GetSSLHostState() {
713 if (!ssl_host_state_.get())
714 ssl_host_state_.reset(new SSLHostState());
715
716 DCHECK(ssl_host_state_->CalledOnValidThread());
717 return ssl_host_state_.get();
718}
719
[email protected]a9cea7542009-05-20 04:30:23720net::ForceTLSState* ProfileImpl::GetForceTLSState() {
721 if (!force_tls_state_.get())
722 force_tls_state_.reset(new net::ForceTLSState());
723
724 return force_tls_state_.get();
725}
726
initial.commit09911bf2008-07-26 23:55:29727PrefService* ProfileImpl::GetPrefs() {
728 if (!prefs_.get()) {
[email protected]6faa0e0d2009-04-28 06:50:36729 prefs_.reset(new PrefService(GetPrefFilePath(),
730 g_browser_process->file_thread()));
initial.commit09911bf2008-07-26 23:55:29731
732 // The Profile class and ProfileManager class may read some prefs so
733 // register known prefs as soon as possible.
734 Profile::RegisterUserPrefs(prefs_.get());
735 ProfileManager::RegisterUserPrefs(prefs_.get());
736
737 // The last session exited cleanly if there is no pref for
738 // kSessionExitedCleanly or the value for kSessionExitedCleanly is true.
739 last_session_exited_cleanly_ =
740 prefs_->GetBoolean(prefs::kSessionExitedCleanly);
741 // Mark the session as open.
742 prefs_->SetBoolean(prefs::kSessionExitedCleanly, false);
743 // Make sure we save to disk that the session has opened.
[email protected]6faa0e0d2009-04-28 06:50:36744 prefs_->ScheduleSavePersistentPrefs();
initial.commit09911bf2008-07-26 23:55:29745 }
746
747 return prefs_.get();
748}
749
[email protected]f7011fcb2009-01-28 21:54:32750FilePath ProfileImpl::GetPrefFilePath() {
751 FilePath pref_file_path = path_;
752 pref_file_path = pref_file_path.Append(chrome::kPreferencesFilename);
initial.commit09911bf2008-07-26 23:55:29753 return pref_file_path;
754}
755
756URLRequestContext* ProfileImpl::GetRequestContext() {
757 if (!request_context_) {
[email protected]f7011fcb2009-01-28 21:54:32758 FilePath cookie_path = GetPath();
759 cookie_path = cookie_path.Append(chrome::kCookieFilename);
760 FilePath cache_path = GetPath();
[email protected]e5642992009-06-26 23:06:31761 int max_size;
762 GetCacheParameters(kNormalContext, &cache_path, &max_size);
[email protected]2b2830a2009-02-07 01:58:42763
[email protected]f7011fcb2009-01-28 21:54:32764 cache_path = cache_path.Append(chrome::kCacheDirname);
[email protected]6ab9b202008-12-23 22:34:50765 request_context_ = ChromeURLRequestContext::CreateOriginal(
[email protected]e5642992009-06-26 23:06:31766 this, cookie_path, cache_path, max_size);
initial.commit09911bf2008-07-26 23:55:29767 request_context_->AddRef();
768
[email protected]6ab9b202008-12-23 22:34:50769 // The first request context is always a normal (non-OTR) request context.
770 // Even when Chromium is started in OTR mode, a normal profile is always
771 // created first.
772 if (!default_request_context_) {
773 default_request_context_ = request_context_;
774 NotificationService::current()->Notify(
[email protected]bfd04a62009-02-01 18:16:56775 NotificationType::DEFAULT_REQUEST_CONTEXT_AVAILABLE,
[email protected]6ab9b202008-12-23 22:34:50776 NotificationService::AllSources(), NotificationService::NoDetails());
777 }
778
initial.commit09911bf2008-07-26 23:55:29779 DCHECK(request_context_->cookie_store());
780 }
781
782 return request_context_;
783}
784
[email protected]e7f29642009-03-02 22:53:18785URLRequestContext* ProfileImpl::GetRequestContextForMedia() {
786 if (!media_request_context_) {
787 FilePath cache_path = GetPath();
[email protected]e5642992009-06-26 23:06:31788 int max_size;
789 GetCacheParameters(kMediaContext, &cache_path, &max_size);
[email protected]e3edeba2009-03-23 18:57:14790
[email protected]4e7b5dbb2009-03-25 00:09:23791 cache_path = cache_path.Append(chrome::kMediaCacheDirname);
[email protected]e7f29642009-03-02 22:53:18792 media_request_context_ = ChromeURLRequestContext::CreateOriginalForMedia(
[email protected]e5642992009-06-26 23:06:31793 this, cache_path, max_size);
[email protected]e7f29642009-03-02 22:53:18794 media_request_context_->AddRef();
795
796 DCHECK(media_request_context_->cookie_store());
797 }
798
799 return media_request_context_;
800}
801
[email protected]47accfd62009-05-14 18:46:21802URLRequestContext* ProfileImpl::GetRequestContextForExtensions() {
803 if (!extensions_request_context_) {
804 FilePath cookie_path = GetPath();
805 cookie_path = cookie_path.Append(chrome::kExtensionsCookieFilename);
806
807 extensions_request_context_ =
808 ChromeURLRequestContext::CreateOriginalForExtensions(this, cookie_path);
809 extensions_request_context_->AddRef();
810
811 DCHECK(extensions_request_context_->cookie_store());
812 }
813
814 return extensions_request_context_;
815}
816
[email protected]eaadd9052009-06-23 18:02:23817Blacklist* ProfileImpl::GetBlacklist() {
818 return blacklist_;
819}
820
initial.commit09911bf2008-07-26 23:55:29821HistoryService* ProfileImpl::GetHistoryService(ServiceAccessType sat) {
822 if (!history_service_created_) {
[email protected]90ef13132008-08-27 03:27:46823 history_service_created_ = true;
initial.commit09911bf2008-07-26 23:55:29824 scoped_refptr<HistoryService> history(new HistoryService(this));
[email protected]d8e41ed2008-09-11 15:22:32825 if (!history->Init(GetPath(), GetBookmarkModel()))
initial.commit09911bf2008-07-26 23:55:29826 return NULL;
827 history_service_.swap(history);
initial.commit09911bf2008-07-26 23:55:29828
829 // Send out the notification that the history service was created.
830 NotificationService::current()->
[email protected]bfd04a62009-02-01 18:16:56831 Notify(NotificationType::HISTORY_CREATED, Source<Profile>(this),
initial.commit09911bf2008-07-26 23:55:29832 Details<HistoryService>(history_service_.get()));
833 }
834 return history_service_.get();
835}
836
initial.commit09911bf2008-07-26 23:55:29837TemplateURLModel* ProfileImpl::GetTemplateURLModel() {
838 if (!template_url_model_.get())
839 template_url_model_.reset(new TemplateURLModel(this));
840 return template_url_model_.get();
841}
842
843TemplateURLFetcher* ProfileImpl::GetTemplateURLFetcher() {
844 if (!template_url_fetcher_.get())
845 template_url_fetcher_.reset(new TemplateURLFetcher(this));
846 return template_url_fetcher_.get();
847}
848
849WebDataService* ProfileImpl::GetWebDataService(ServiceAccessType sat) {
850 if (!created_web_data_service_)
851 CreateWebDataService();
852 return web_data_service_.get();
853}
854
855void ProfileImpl::CreateWebDataService() {
856 DCHECK(!created_web_data_service_ && web_data_service_.get() == NULL);
857 created_web_data_service_ = true;
858 scoped_refptr<WebDataService> wds(new WebDataService());
859 if (!wds->Init(GetPath()))
860 return;
861 web_data_service_.swap(wds);
862}
863
[email protected]e69d33952009-06-03 22:00:41864PasswordStore* ProfileImpl::GetPasswordStore(ServiceAccessType sat) {
865 if (!created_password_store_)
866 CreatePasswordStore();
867 return password_store_.get();
868}
869
870void ProfileImpl::CreatePasswordStore() {
871 DCHECK(!created_password_store_ && password_store_.get() == NULL);
872 created_password_store_ = true;
873 scoped_refptr<PasswordStore> ps;
874#if defined(OS_LINUX)
875// Temporarily disabled while we figure some stuff out.
876// http://code.google.com/p/chromium/issues/detail?id=12351
877// if (getenv("KDE_FULL_SESSION")) {
878// ps = new PasswordStoreKWallet();
879// } else {
880// ps = new PasswordStoreGnome();
881// }
882 NOTIMPLEMENTED();
883#elif defined(OS_WIN)
884 ps = new PasswordStoreWin(GetWebDataService(Profile::IMPLICIT_ACCESS));
[email protected]034eba52009-06-03 22:50:56885#elif defined(OS_MACOSX)
[email protected]e0411ae52009-06-30 23:59:17886 FilePath login_db_file_path = GetPath();
887 login_db_file_path = login_db_file_path.Append(chrome::kLoginDataFileName);
888 LoginDatabaseMac* login_db = new LoginDatabaseMac();
889 if (!login_db->Init(login_db_file_path)) {
890 LOG(ERROR) << "Could not initialize login database.";
891 delete login_db;
892 return;
893 }
894 ps = new PasswordStoreMac(new MacKeychain(), login_db);
[email protected]e69d33952009-06-03 22:00:41895#else
896 NOTIMPLEMENTED();
897#endif
898 if (!ps || !ps->Init()) {
899 // Try falling back to the default password manager
900 LOG(WARNING) << "Could not initialise native password manager - "
901 "falling back to default";
902 ps = new PasswordStoreDefault(GetWebDataService(Profile::IMPLICIT_ACCESS));
903 if (!ps->Init())
904 return;
905 }
906 password_store_.swap(ps);
907}
908
initial.commit09911bf2008-07-26 23:55:29909DownloadManager* ProfileImpl::GetDownloadManager() {
910 if (!created_download_manager_) {
911 scoped_refptr<DownloadManager> dlm(new DownloadManager);
912 dlm->Init(this);
913 created_download_manager_ = true;
914 download_manager_.swap(dlm);
915 }
916 return download_manager_.get();
917}
918
919bool ProfileImpl::HasCreatedDownloadManager() const {
920 return created_download_manager_;
921}
922
[email protected]4a190632009-05-09 01:07:42923void ProfileImpl::InitThemes() {
924 if (!created_theme_provider_) {
925 scoped_refptr<BrowserThemeProvider> themes(new BrowserThemeProvider);
926 themes->Init(this);
927 created_theme_provider_ = true;
928 theme_provider_.swap(themes);
929 }
930}
931
932void ProfileImpl::SetTheme(Extension* extension) {
933 InitThemes();
934 theme_provider_.get()->SetTheme(extension);
935}
936
937void ProfileImpl::ClearTheme() {
938 InitThemes();
939 theme_provider_.get()->UseDefaultTheme();
940}
941
942ThemeProvider* ProfileImpl::GetThemeProvider() {
943 InitThemes();
944 return theme_provider_.get();
945}
946
initial.commit09911bf2008-07-26 23:55:29947SessionService* ProfileImpl::GetSessionService() {
948 if (!session_service_.get() && !shutdown_session_service_) {
949 session_service_ = new SessionService(this);
950 session_service_->ResetFromCurrentBrowsers();
951 }
952 return session_service_.get();
953}
954
955void ProfileImpl::ShutdownSessionService() {
956 if (shutdown_session_service_)
957 return;
958
959 // We're about to exit, force creation of the session service if it hasn't
960 // been created yet. We do this to ensure session state matches the point in
961 // time the user exited.
962 GetSessionService();
963 shutdown_session_service_ = true;
964 session_service_ = NULL;
965}
966
967bool ProfileImpl::HasSessionService() const {
968 return (session_service_.get() != NULL);
969}
970
971std::wstring ProfileImpl::GetName() {
972 return GetPrefs()->GetString(prefs::kProfileName);
973}
974void ProfileImpl::SetName(const std::wstring& name) {
975 GetPrefs()->SetString(prefs::kProfileName, name);
976}
977
978std::wstring ProfileImpl::GetID() {
979 return GetPrefs()->GetString(prefs::kProfileID);
980}
981void ProfileImpl::SetID(const std::wstring& id) {
982 GetPrefs()->SetString(prefs::kProfileID, id);
983}
984
initial.commit09911bf2008-07-26 23:55:29985bool ProfileImpl::DidLastSessionExitCleanly() {
986 // last_session_exited_cleanly_ is set when the preferences are loaded. Force
987 // it to be set by asking for the prefs.
988 GetPrefs();
989 return last_session_exited_cleanly_;
990}
991
[email protected]d8e41ed2008-09-11 15:22:32992BookmarkModel* ProfileImpl::GetBookmarkModel() {
[email protected]90ef13132008-08-27 03:27:46993 if (!bookmark_bar_model_.get()) {
[email protected]d8e41ed2008-09-11 15:22:32994 bookmark_bar_model_.reset(new BookmarkModel(this));
[email protected]90ef13132008-08-27 03:27:46995 bookmark_bar_model_->Load();
996 }
initial.commit09911bf2008-07-26 23:55:29997 return bookmark_bar_model_.get();
998}
999
1000bool ProfileImpl::IsSameProfile(Profile* profile) {
1001 if (profile == static_cast<Profile*>(this))
1002 return true;
1003 OffTheRecordProfileImpl* otr_profile = off_the_record_profile_.get();
1004 return otr_profile && profile == static_cast<Profile*>(otr_profile);
1005}
1006
1007Time ProfileImpl::GetStartTime() const {
1008 return start_time_;
1009}
1010
1011TabRestoreService* ProfileImpl::GetTabRestoreService() {
1012 if (!tab_restore_service_.get())
[email protected]169627b2008-12-06 19:30:191013 tab_restore_service_ = new TabRestoreService(this);
initial.commit09911bf2008-07-26 23:55:291014 return tab_restore_service_.get();
1015}
1016
[email protected]449478302009-06-09 20:04:281017ThumbnailStore* ProfileImpl::GetThumbnailStore() {
1018 if (!thumbnail_store_.get()) {
1019 thumbnail_store_ = new ThumbnailStore;
[email protected]f2458dc2009-06-24 22:38:581020 thumbnail_store_->Init(GetPath().AppendASCII("thumbnailstore"), this);
[email protected]449478302009-06-09 20:04:281021 }
1022 return thumbnail_store_.get();
1023}
1024
initial.commit09911bf2008-07-26 23:55:291025void ProfileImpl::ResetTabRestoreService() {
[email protected]169627b2008-12-06 19:30:191026 tab_restore_service_ = NULL;
initial.commit09911bf2008-07-26 23:55:291027}
1028
[email protected]a9afddb2009-02-12 17:49:421029// To be run in the IO thread to notify all resource message filters that the
[email protected]20930852008-10-15 19:30:411030// spellchecker has changed.
1031class NotifySpellcheckerChangeTask : public Task {
1032 public:
1033 NotifySpellcheckerChangeTask(
[email protected]e7244d82008-10-29 18:13:261034 Profile* profile,
1035 const SpellcheckerReinitializedDetails& spellchecker)
[email protected]20930852008-10-15 19:30:411036 : profile_(profile),
1037 spellchecker_(spellchecker) {
1038 }
1039
1040 private:
1041 void Run(void) {
1042 NotificationService::current()->Notify(
[email protected]bfd04a62009-02-01 18:16:561043 NotificationType::SPELLCHECKER_REINITIALIZED,
[email protected]20930852008-10-15 19:30:411044 Source<Profile>(profile_),
1045 Details<SpellcheckerReinitializedDetails>(&spellchecker_));
1046 }
1047
1048 Profile* profile_;
1049 SpellcheckerReinitializedDetails spellchecker_;
1050};
1051
[email protected]e7244d82008-10-29 18:13:261052void ProfileImpl::InitializeSpellChecker(bool need_to_broadcast) {
[email protected]20930852008-10-15 19:30:411053 // The I/O thread may be NULL during testing.
1054 base::Thread* io_thread = g_browser_process->io_thread();
1055 if (spellchecker_) {
1056 // The spellchecker must be deleted on the I/O thread.
1057 // A dummy variable to aid in logical clarity.
1058 SpellChecker* last_spellchecker = spellchecker_;
1059
1060 if (io_thread)
1061 io_thread->message_loop()->ReleaseSoon(FROM_HERE, last_spellchecker);
1062 else // during testing, we don't have an I/O thread
1063 last_spellchecker->Release();
[email protected]20930852008-10-15 19:30:411064 }
1065
[email protected]20930852008-10-15 19:30:411066 // Retrieve the (perhaps updated recently) dictionary name from preferences.
1067 PrefService* prefs = GetPrefs();
[email protected]e7244d82008-10-29 18:13:261068 bool enable_spellcheck = prefs->GetBoolean(prefs::kEnableSpellCheck);
[email protected]20930852008-10-15 19:30:411069
[email protected]e7244d82008-10-29 18:13:261070 if (enable_spellcheck) {
[email protected]bd17b702009-02-25 20:44:081071 FilePath dict_dir;
[email protected]e7244d82008-10-29 18:13:261072 PathService::Get(chrome::DIR_APP_DICTIONARIES, &dict_dir);
[email protected]a9afddb2009-02-12 17:49:421073 // Note that, as the object pointed to by previously by spellchecker_
[email protected]e7244d82008-10-29 18:13:261074 // is being deleted in the io thread, the spellchecker_ can be made to point
1075 // to a new object (RE-initialized) in parallel in this UI thread.
[email protected]4b4d1adc2008-12-10 22:28:581076 spellchecker_ = new SpellChecker(dict_dir,
[email protected]74c8b422009-03-11 00:34:121077 WideToASCII(prefs->GetString(prefs::kSpellCheckDictionary)),
1078 GetRequestContext(),
[email protected]bd17b702009-02-25 20:44:081079 FilePath());
[email protected]e7244d82008-10-29 18:13:261080 spellchecker_->AddRef(); // Manual refcounting.
1081 } else {
1082 spellchecker_ = NULL;
1083 }
[email protected]20930852008-10-15 19:30:411084
[email protected]154a4332009-06-03 20:20:581085 // Set auto spell correct status for spellchecker.
1086 if (spellchecker_) {
1087 spellchecker_->EnableAutoSpellCorrect(
1088 prefs->GetBoolean(prefs::kEnableAutoSpellCorrect));
1089 }
1090
[email protected]20930852008-10-15 19:30:411091 if (need_to_broadcast && io_thread) { // Notify resource message filters.
1092 SpellcheckerReinitializedDetails scoped_spellchecker;
1093 scoped_spellchecker.spellchecker = spellchecker_;
[email protected]e7244d82008-10-29 18:13:261094 if (io_thread) {
1095 io_thread->message_loop()->PostTask(
[email protected]a9afddb2009-02-12 17:49:421096 FROM_HERE,
[email protected]e7244d82008-10-29 18:13:261097 new NotifySpellcheckerChangeTask(this, scoped_spellchecker));
1098 }
[email protected]20930852008-10-15 19:30:411099 }
1100}
1101
[email protected]e7244d82008-10-29 18:13:261102void ProfileImpl::ReinitializeSpellChecker() {
1103 InitializeSpellChecker(true);
1104}
1105
initial.commit09911bf2008-07-26 23:55:291106SpellChecker* ProfileImpl::GetSpellChecker() {
1107 if (!spellchecker_) {
[email protected]20930852008-10-15 19:30:411108 // This is where spellchecker gets initialized. Note that this is being
1109 // initialized in the ui_thread. However, this is not a problem as long as
1110 // it is *used* in the io thread.
[email protected]34cc84f2009-02-13 10:04:351111 // TODO(sidchat): One day, change everything so that spellchecker gets
[email protected]20930852008-10-15 19:30:411112 // initialized in the IO thread itself.
[email protected]e7244d82008-10-29 18:13:261113 InitializeSpellChecker(false);
initial.commit09911bf2008-07-26 23:55:291114 }
[email protected]20930852008-10-15 19:30:411115
initial.commit09911bf2008-07-26 23:55:291116 return spellchecker_;
1117}
1118
[email protected]3bf335a2009-06-26 20:46:061119WebKitContext* ProfileImpl::GetWebKitContext() {
1120 if (!webkit_context_.get())
1121 webkit_context_ = new WebKitContext(path_, false);
1122 DCHECK(webkit_context_.get());
1123 return webkit_context_.get();
1124}
1125
initial.commit09911bf2008-07-26 23:55:291126void ProfileImpl::MarkAsCleanShutdown() {
1127 if (prefs_.get()) {
1128 // The session cleanly exited, set kSessionExitedCleanly appropriately.
1129 prefs_->SetBoolean(prefs::kSessionExitedCleanly, true);
1130
1131 // NOTE: If you change what thread this writes on, be sure and update
1132 // ChromeFrame::EndSession().
[email protected]6faa0e0d2009-04-28 06:50:361133 prefs_->SavePersistentPrefs();
initial.commit09911bf2008-07-26 23:55:291134 }
1135}
1136
[email protected]e7244d82008-10-29 18:13:261137void ProfileImpl::Observe(NotificationType type,
1138 const NotificationSource& source,
1139 const NotificationDetails& details) {
[email protected]bfd04a62009-02-01 18:16:561140 if (NotificationType::PREF_CHANGED == type) {
[email protected]e7244d82008-10-29 18:13:261141 std::wstring* pref_name_in = Details<std::wstring>(details).ptr();
1142 PrefService* prefs = Source<PrefService>(source).ptr();
1143 DCHECK(pref_name_in && prefs);
1144 if (*pref_name_in == prefs::kSpellCheckDictionary ||
[email protected]154a4332009-06-03 20:20:581145 *pref_name_in == prefs::kEnableSpellCheck ||
1146 *pref_name_in == prefs::kEnableAutoSpellCorrect) {
[email protected]e7244d82008-10-29 18:13:261147 InitializeSpellChecker(true);
1148 }
[email protected]4a190632009-05-09 01:07:421149 } else if (NotificationType::THEME_INSTALLED == type) {
1150 Extension* extension = Details<Extension>(details).ptr();
1151 SetTheme(extension);
[email protected]e7244d82008-10-29 18:13:261152 }
1153}
1154
initial.commit09911bf2008-07-26 23:55:291155void ProfileImpl::StopCreateSessionServiceTimer() {
[email protected]2d316662008-09-03 18:18:141156 create_session_service_timer_.Stop();
initial.commit09911bf2008-07-26 23:55:291157}
[email protected]3a453fa2008-08-15 18:46:341158
1159#ifdef CHROME_PERSONALIZATION
[email protected]57d3d0a2008-09-24 00:50:071160ProfilePersonalization* ProfileImpl::GetProfilePersonalization() {
[email protected]57d3d0a2008-09-24 00:50:071161 return personalization_.get();
[email protected]3a453fa2008-08-15 18:46:341162}
license.botbf09a502008-08-24 00:55:551163#endif