blob: c197a783e43ca2f0898a96a6cc6bb7004d0e6831 [file] [log] [blame]
[email protected]e284e6d82010-01-29 19:49:451// Copyright (c) 2010 The Chromium Authors. All rights reserved.
license.botbf09a502008-08-24 00:55:552// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
initial.commit09911bf2008-07-26 23:55:294
5#include "chrome/browser/profile.h"
6
[email protected]2735e3692009-09-25 18:19:397#include "app/theme_provider.h"
initial.commit09911bf2008-07-26 23:55:298#include "base/command_line.h"
[email protected]04fba9a92008-10-28 17:25:259#include "base/file_path.h"
[email protected]405a64b2009-09-16 21:03:4410#include "base/file_util.h"
initial.commit09911bf2008-07-26 23:55:2911#include "base/path_service.h"
12#include "base/scoped_ptr.h"
13#include "base/string_util.h"
[email protected]def11712009-11-06 00:42:1514#include "chrome/browser/autofill/personal_data_manager.h"
[email protected]a9afddb2009-02-12 17:49:4215#include "chrome/browser/bookmarks/bookmark_model.h"
initial.commit09911bf2008-07-26 23:55:2916#include "chrome/browser/browser_list.h"
[email protected]9acc48602009-11-30 21:18:5117#include "chrome/browser/browser_prefs.h"
[email protected]8a4892d8d2009-11-23 20:40:5718#include "chrome/browser/browser_process.h"
[email protected]67a46b7f2009-06-16 21:41:0219#include "chrome/browser/browser_theme_provider.h"
[email protected]6fad2632009-11-02 05:59:3720#include "chrome/browser/chrome_thread.h"
[email protected]9c8dd902009-11-19 17:50:4221#include "chrome/browser/dom_ui/ntp_resource_cache.h"
[email protected]b7f05882009-02-22 01:21:5622#include "chrome/browser/download/download_manager.h"
[email protected]89ebc7e2009-08-24 22:11:0723#include "chrome/browser/extensions/extension_devtools_manager.h"
[email protected]7120f132009-07-20 21:05:3724#include "chrome/browser/extensions/extension_message_service.h"
[email protected]481e1a42009-05-06 20:56:0525#include "chrome/browser/extensions/extension_process_manager.h"
[email protected]6014d672008-12-05 00:38:2526#include "chrome/browser/extensions/extensions_service.h"
[email protected]0938d3c2009-01-09 20:37:3527#include "chrome/browser/extensions/user_script_master.h"
[email protected]0189bc722009-08-28 21:56:4828#include "chrome/browser/favicon_service.h"
[email protected]9c92d192009-12-02 08:03:1629#include "chrome/browser/spellcheck_host.h"
[email protected]326e6792009-12-11 21:04:4230#include "chrome/browser/transport_security_persister.h"
[email protected]a9afddb2009-02-12 17:49:4231#include "chrome/browser/history/history.h"
[email protected]e284e6d82010-01-29 19:49:4532#include "chrome/browser/host_content_settings_map.h"
[email protected]40bd6582009-12-04 23:49:5133#include "chrome/browser/host_zoom_map.h"
[email protected]3bf335a2009-06-26 20:46:0634#include "chrome/browser/in_process_webkit/webkit_context.h"
[email protected]6ab9b202008-12-23 22:34:5035#include "chrome/browser/net/chrome_url_request_context.h"
[email protected]db36938c2009-08-19 21:48:4236#include "chrome/browser/net/ssl_config_service_manager.h"
[email protected]4bb336302009-10-12 05:44:2637#include "chrome/browser/notifications/desktop_notification_service.h"
[email protected]e69d33952009-06-03 22:00:4138#include "chrome/browser/password_manager/password_store_default.h"
[email protected]8c6335d32010-01-20 09:21:5039#include "chrome/browser/privacy_blacklist/blacklist.h"
initial.commit09911bf2008-07-26 23:55:2940#include "chrome/browser/profile_manager.h"
[email protected]8c8657d62009-01-16 18:31:2641#include "chrome/browser/renderer_host/render_process_host.h"
[email protected]90085af02009-10-29 17:53:2142#include "chrome/browser/search_versus_navigate_classifier.h"
[email protected]1132436e2009-04-08 20:06:3343#include "chrome/browser/search_engines/template_url_fetcher.h"
[email protected]f63ae312009-02-04 17:58:4644#include "chrome/browser/search_engines/template_url_model.h"
[email protected]85e921fb82009-02-11 23:19:4445#include "chrome/browser/sessions/session_service.h"
[email protected]bd580a252009-02-12 01:16:3046#include "chrome/browser/sessions/tab_restore_service.h"
[email protected]1132436e2009-04-08 20:06:3347#include "chrome/browser/ssl/ssl_host_state.h"
[email protected]48352c12009-08-15 01:19:1148#include "chrome/browser/sync/profile_sync_service.h"
[email protected]449478302009-06-09 20:04:2849#include "chrome/browser/thumbnail_store.h"
initial.commit09911bf2008-07-26 23:55:2950#include "chrome/browser/visitedlink_master.h"
[email protected]3e90d4a2009-07-03 17:38:3951#include "chrome/browser/visitedlink_event_listener.h"
initial.commit09911bf2008-07-26 23:55:2952#include "chrome/browser/webdata/web_data_service.h"
[email protected]b1748b1d82009-11-30 20:32:5653#include "chrome/browser/web_resource/web_resource_service.h"
[email protected]23f1ef12009-09-01 22:30:3054#include "chrome/common/appcache/chrome_appcache_service.h"
initial.commit09911bf2008-07-26 23:55:2955#include "chrome/common/chrome_constants.h"
56#include "chrome/common/chrome_paths.h"
57#include "chrome/common/chrome_switches.h"
[email protected]5b1a0e22009-05-26 19:00:5858#include "chrome/common/extensions/extension_error_reporter.h"
initial.commit09911bf2008-07-26 23:55:2959#include "chrome/common/notification_service.h"
60#include "chrome/common/pref_names.h"
[email protected]f7011fcb2009-01-28 21:54:3261#include "chrome/common/render_messages.h"
[email protected]f90f5c512009-02-18 19:10:5862#include "grit/locale_settings.h"
[email protected]326e6792009-12-11 21:04:4263#include "net/base/transport_security_state.h"
[email protected]2f351cb2009-11-09 23:43:3464#include "webkit/database/database_tracker.h"
initial.commit09911bf2008-07-26 23:55:2965
[email protected]a5166af62009-07-03 00:42:2966#if defined(OS_LINUX)
67#include "chrome/browser/gtk/gtk_theme_provider.h"
68#endif
69
[email protected]e1acf6f2008-10-27 20:43:3370using base::Time;
71using base::TimeDelta;
72
[email protected]e5642992009-06-26 23:06:3173namespace {
74
initial.commit09911bf2008-07-26 23:55:2975// Delay, in milliseconds, before we explicitly create the SessionService.
76static const int kCreateSessionServiceDelayMS = 500;
77
[email protected]e5642992009-06-26 23:06:3178enum ContextType {
79 kNormalContext,
80 kMediaContext
81};
82
83// Gets the cache parameters from the command line. |type| is the type of
84// request context that we need, |cache_path| will be set to the user provided
85// path, or will not be touched if there is not an argument. |max_size| will
86// be the user provided value or zero by default.
87void GetCacheParameters(ContextType type, FilePath* cache_path,
88 int* max_size) {
89 DCHECK(cache_path);
90 DCHECK(max_size);
91
92 // Override the cache location if specified by the user.
93 std::wstring user_path(CommandLine::ForCurrentProcess()->GetSwitchValue(
94 switches::kDiskCacheDir));
95
96 if (!user_path.empty()) {
97 *cache_path = FilePath::FromWStringHack(user_path);
98 }
99
[email protected]b7e0a2a2009-10-13 02:07:25100 const char* arg = kNormalContext == type ? switches::kDiskCacheSize :
101 switches::kMediaCacheSize;
[email protected]e5642992009-06-26 23:06:31102 std::string value =
[email protected]b7e0a2a2009-10-13 02:07:25103 CommandLine::ForCurrentProcess()->GetSwitchValueASCII(arg);
[email protected]e5642992009-06-26 23:06:31104
105 // By default we let the cache determine the right size.
106 *max_size = 0;
107 if (!StringToInt(value, max_size)) {
108 *max_size = 0;
109 } else if (max_size < 0) {
110 *max_size = 0;
111 }
112}
113
[email protected]405a64b2009-09-16 21:03:44114FilePath GetCachePath(const FilePath& base) {
115 return base.Append(chrome::kCacheDirname);
116}
117
118FilePath GetMediaCachePath(const FilePath& base) {
119 return base.Append(chrome::kMediaCacheDirname);
120}
121
122bool HasACacheSubdir(const FilePath &dir) {
123 return file_util::PathExists(GetCachePath(dir)) ||
124 file_util::PathExists(GetMediaCachePath(dir));
125}
126
[email protected]e5642992009-06-26 23:06:31127} // namespace
128
initial.commit09911bf2008-07-26 23:55:29129// A pointer to the request context for the default profile. See comments on
130// Profile::GetDefaultRequestContext.
[email protected]be180c802009-10-23 06:33:31131URLRequestContextGetter* Profile::default_request_context_;
initial.commit09911bf2008-07-26 23:55:29132
[email protected]be180c802009-10-23 06:33:31133static void CleanupRequestContext(ChromeURLRequestContextGetter* context) {
[email protected]13c30922009-11-19 03:43:19134 if (context)
[email protected]47accfd62009-05-14 18:46:21135 context->CleanupOnUIThread();
[email protected]47accfd62009-05-14 18:46:21136}
137
[email protected]34cc84f2009-02-13 10:04:35138// static
[email protected]4bf6afd2009-10-08 14:00:11139const ProfileId Profile::InvalidProfileId = static_cast<ProfileId>(0);
140
141// static
initial.commit09911bf2008-07-26 23:55:29142void Profile::RegisterUserPrefs(PrefService* prefs) {
[email protected]430d3f72008-10-27 17:56:55143 prefs->RegisterBooleanPref(prefs::kSearchSuggestEnabled, true);
initial.commit09911bf2008-07-26 23:55:29144 prefs->RegisterBooleanPref(prefs::kSessionExitedCleanly, true);
145 prefs->RegisterBooleanPref(prefs::kSafeBrowsingEnabled, true);
[email protected]74c8b422009-03-11 00:34:12146 // TODO(estade): IDS_SPELLCHECK_DICTIONARY should be an ASCII string.
[email protected]e7244d82008-10-29 18:13:26147 prefs->RegisterLocalizedStringPref(prefs::kSpellCheckDictionary,
148 IDS_SPELLCHECK_DICTIONARY);
149 prefs->RegisterBooleanPref(prefs::kEnableSpellCheck, true);
[email protected]154a4332009-06-03 20:20:58150 prefs->RegisterBooleanPref(prefs::kEnableAutoSpellCorrect, true);
[email protected]a5166af62009-07-03 00:42:29151#if defined(OS_LINUX)
152 prefs->RegisterBooleanPref(prefs::kUsesSystemTheme, false);
153#endif
[email protected]f017cc92009-12-14 20:48:07154 prefs->RegisterFilePathPref(prefs::kCurrentThemePackFilename, FilePath());
[email protected]51c490b2009-08-03 16:34:34155 prefs->RegisterStringPref(prefs::kCurrentThemeID,
156 UTF8ToWide(BrowserThemeProvider::kDefaultThemeID));
[email protected]4a190632009-05-09 01:07:42157 prefs->RegisterDictionaryPref(prefs::kCurrentThemeImages);
158 prefs->RegisterDictionaryPref(prefs::kCurrentThemeColors);
159 prefs->RegisterDictionaryPref(prefs::kCurrentThemeTints);
[email protected]7895ea22009-06-02 20:53:50160 prefs->RegisterDictionaryPref(prefs::kCurrentThemeDisplayProperties);
[email protected]6d60703b2009-08-29 01:29:23161 prefs->RegisterBooleanPref(prefs::kDisableExtensions, false);
initial.commit09911bf2008-07-26 23:55:29162}
163
[email protected]34cc84f2009-02-13 10:04:35164// static
[email protected]f7011fcb2009-01-28 21:54:32165Profile* Profile::CreateProfile(const FilePath& path) {
initial.commit09911bf2008-07-26 23:55:29166 return new ProfileImpl(path);
167}
168
[email protected]34cc84f2009-02-13 10:04:35169// static
[email protected]be180c802009-10-23 06:33:31170URLRequestContextGetter* Profile::GetDefaultRequestContext() {
initial.commit09911bf2008-07-26 23:55:29171 return default_request_context_;
172}
173
[email protected]e69d33952009-06-03 22:00:41174#if defined(OS_LINUX)
175// Temporarily disabled while we figure some stuff out.
176// http://code.google.com/p/chromium/issues/detail?id=12351
177// #include "chrome/browser/password_manager/password_store_gnome.h"
178// #include "chrome/browser/password_manager/password_store_kwallet.h"
179#elif defined(OS_WIN)
180#include "chrome/browser/password_manager/password_store_win.h"
[email protected]034eba52009-06-03 22:50:56181#elif defined(OS_MACOSX)
182#include "chrome/browser/keychain_mac.h"
[email protected]e0411ae52009-06-30 23:59:17183#include "chrome/browser/password_manager/login_database_mac.h"
[email protected]034eba52009-06-03 22:50:56184#include "chrome/browser/password_manager/password_store_mac.h"
[email protected]e69d33952009-06-03 22:00:41185#endif
initial.commit09911bf2008-07-26 23:55:29186
initial.commit09911bf2008-07-26 23:55:29187////////////////////////////////////////////////////////////////////////////////
188//
189// OffTheRecordProfileImpl is a profile subclass that wraps an existing profile
[email protected]4a190632009-05-09 01:07:42190// to make it suitable for the off the record mode.
initial.commit09911bf2008-07-26 23:55:29191//
192////////////////////////////////////////////////////////////////////////////////
193class OffTheRecordProfileImpl : public Profile,
194 public NotificationObserver {
195 public:
196 explicit OffTheRecordProfileImpl(Profile* real_profile)
197 : profile_(real_profile),
[email protected]47accfd62009-05-14 18:46:21198 extensions_request_context_(NULL),
initial.commit09911bf2008-07-26 23:55:29199 start_time_(Time::Now()) {
[email protected]be180c802009-10-23 06:33:31200 request_context_ = ChromeURLRequestContextGetter::CreateOffTheRecord(this);
[email protected]481e1a42009-05-06 20:56:05201
initial.commit09911bf2008-07-26 23:55:29202 // Register for browser close notifications so we can detect when the last
203 // off-the-record window is closed, in which case we can clean our states
204 // (cookies, downloads...).
[email protected]88cf3292009-05-22 01:48:43205 registrar_.Add(this, NotificationType::BROWSER_CLOSED,
206 NotificationService::AllSources());
initial.commit09911bf2008-07-26 23:55:29207 }
208
209 virtual ~OffTheRecordProfileImpl() {
[email protected]47accfd62009-05-14 18:46:21210 CleanupRequestContext(request_context_);
[email protected]47accfd62009-05-14 18:46:21211 CleanupRequestContext(extensions_request_context_);
initial.commit09911bf2008-07-26 23:55:29212 }
213
[email protected]4bf6afd2009-10-08 14:00:11214 virtual ProfileId GetRuntimeId() {
215 return reinterpret_cast<ProfileId>(this);
216 }
217
[email protected]a6d0f182010-01-12 08:01:44218 virtual FilePath GetPath() { return profile_->GetPath(); }
initial.commit09911bf2008-07-26 23:55:29219
220 virtual bool IsOffTheRecord() {
221 return true;
222 }
223
224 virtual Profile* GetOffTheRecordProfile() {
225 return this;
226 }
227
[email protected]860f55492009-03-27 19:50:59228 virtual void DestroyOffTheRecordProfile() {
229 // Suicide is bad!
230 NOTREACHED();
231 }
232
initial.commit09911bf2008-07-26 23:55:29233 virtual Profile* GetOriginalProfile() {
234 return profile_;
235 }
236
[email protected]2f351cb2009-11-09 23:43:34237 virtual webkit_database::DatabaseTracker* GetDatabaseTracker() {
238 if (!db_tracker_)
239 db_tracker_ = new webkit_database::DatabaseTracker(FilePath());
240 return db_tracker_;
241 }
242
initial.commit09911bf2008-07-26 23:55:29243 virtual VisitedLinkMaster* GetVisitedLinkMaster() {
[email protected]7fb6c862009-03-13 02:51:49244 // We don't provide access to the VisitedLinkMaster when we're OffTheRecord
245 // because we don't want to leak the sites that the user has visited before.
246 return NULL;
initial.commit09911bf2008-07-26 23:55:29247 }
248
[email protected]6014d672008-12-05 00:38:25249 virtual ExtensionsService* GetExtensionsService() {
[email protected]1bd54132009-06-11 00:05:34250 return NULL;
[email protected]6014d672008-12-05 00:38:25251 }
252
[email protected]0938d3c2009-01-09 20:37:35253 virtual UserScriptMaster* GetUserScriptMaster() {
[email protected]c931db62009-12-23 03:28:51254 return NULL;
[email protected]04fba9a92008-10-28 17:25:25255 }
256
[email protected]89ebc7e2009-08-24 22:11:07257 virtual ExtensionDevToolsManager* GetExtensionDevToolsManager() {
258 return NULL;
259 }
260
[email protected]481e1a42009-05-06 20:56:05261 virtual ExtensionProcessManager* GetExtensionProcessManager() {
[email protected]1bd54132009-06-11 00:05:34262 return NULL;
[email protected]481e1a42009-05-06 20:56:05263 }
264
[email protected]7120f132009-07-20 21:05:37265 virtual ExtensionMessageService* GetExtensionMessageService() {
266 return NULL;
267 }
268
[email protected]34cc84f2009-02-13 10:04:35269 virtual SSLHostState* GetSSLHostState() {
270 if (!ssl_host_state_.get())
271 ssl_host_state_.reset(new SSLHostState());
272
273 DCHECK(ssl_host_state_->CalledOnValidThread());
274 return ssl_host_state_.get();
275 }
276
[email protected]326e6792009-12-11 21:04:42277 virtual net::TransportSecurityState* GetTransportSecurityState() {
278 if (!transport_security_state_.get()) {
279 transport_security_state_ =
280 new net::TransportSecurityState();
[email protected]77f6fb432009-09-05 14:21:09281 }
[email protected]a9cea7542009-05-20 04:30:23282
[email protected]326e6792009-12-11 21:04:42283 return transport_security_state_.get();
[email protected]a9cea7542009-05-20 04:30:23284 }
285
initial.commit09911bf2008-07-26 23:55:29286 virtual HistoryService* GetHistoryService(ServiceAccessType sat) {
287 if (sat == EXPLICIT_ACCESS) {
288 return profile_->GetHistoryService(sat);
289 } else {
290 NOTREACHED() << "This profile is OffTheRecord";
291 return NULL;
292 }
293 }
294
[email protected]0850fa62009-10-08 22:34:29295 virtual HistoryService* GetHistoryServiceWithoutCreating() {
296 return profile_->GetHistoryServiceWithoutCreating();
297 }
298
[email protected]0189bc722009-08-28 21:56:48299 virtual FaviconService* GetFaviconService(ServiceAccessType sat) {
300 if (sat == EXPLICIT_ACCESS) {
301 return profile_->GetFaviconService(sat);
302 } else {
303 NOTREACHED() << "This profile is OffTheRecord";
304 return NULL;
305 }
306 }
307
[email protected]90085af02009-10-29 17:53:21308 virtual SearchVersusNavigateClassifier* GetSearchVersusNavigateClassifier() {
309 return profile_->GetSearchVersusNavigateClassifier();
310 }
311
initial.commit09911bf2008-07-26 23:55:29312 virtual WebDataService* GetWebDataService(ServiceAccessType sat) {
313 if (sat == EXPLICIT_ACCESS) {
314 return profile_->GetWebDataService(sat);
315 } else {
316 NOTREACHED() << "This profile is OffTheRecord";
317 return NULL;
318 }
319 }
320
[email protected]9cddbe372009-10-23 21:23:53321 virtual WebDataService* GetWebDataServiceWithoutCreating() {
322 return profile_->GetWebDataServiceWithoutCreating();
323 }
324
[email protected]e69d33952009-06-03 22:00:41325 virtual PasswordStore* GetPasswordStore(ServiceAccessType sat) {
326 if (sat == EXPLICIT_ACCESS) {
327 return profile_->GetPasswordStore(sat);
328 } else {
329 NOTREACHED() << "This profile is OffTheRecord";
330 return NULL;
331 }
332 }
333
initial.commit09911bf2008-07-26 23:55:29334 virtual PrefService* GetPrefs() {
335 return profile_->GetPrefs();
336 }
337
338 virtual TemplateURLModel* GetTemplateURLModel() {
339 return profile_->GetTemplateURLModel();
340 }
341
342 virtual TemplateURLFetcher* GetTemplateURLFetcher() {
343 return profile_->GetTemplateURLFetcher();
344 }
345
346 virtual DownloadManager* GetDownloadManager() {
347 if (!download_manager_.get()) {
348 scoped_refptr<DownloadManager> dlm(new DownloadManager);
349 dlm->Init(this);
350 download_manager_.swap(dlm);
351 }
352 return download_manager_.get();
353 }
354
355 virtual bool HasCreatedDownloadManager() const {
356 return (download_manager_.get() != NULL);
357 }
358
[email protected]def11712009-11-06 00:42:15359 virtual PersonalDataManager* GetPersonalDataManager() {
360 return NULL;
361 }
362
[email protected]4a190632009-05-09 01:07:42363 virtual void InitThemes() {
364 GetOriginalProfile()->InitThemes();
365 }
366
367 virtual void SetTheme(Extension* extension) {
368 GetOriginalProfile()->SetTheme(extension);
369 }
370
[email protected]a5166af62009-07-03 00:42:29371 virtual void SetNativeTheme() {
372 GetOriginalProfile()->SetNativeTheme();
373 }
374
[email protected]4a190632009-05-09 01:07:42375 virtual void ClearTheme() {
376 GetOriginalProfile()->ClearTheme();
377 }
378
[email protected]51c490b2009-08-03 16:34:34379 virtual Extension* GetTheme() {
380 return GetOriginalProfile()->GetTheme();
381 }
382
[email protected]5786d3d2009-12-18 00:18:44383 virtual BrowserThemeProvider* GetThemeProvider() {
[email protected]4a190632009-05-09 01:07:42384 return GetOriginalProfile()->GetThemeProvider();
385 }
386
[email protected]be180c802009-10-23 06:33:31387 virtual URLRequestContextGetter* GetRequestContext() {
initial.commit09911bf2008-07-26 23:55:29388 return request_context_;
389 }
390
[email protected]be180c802009-10-23 06:33:31391 virtual URLRequestContextGetter* GetRequestContextForMedia() {
[email protected]d14c7ac2009-05-29 20:38:11392 // In OTR mode, media request context is the same as the original one.
393 return request_context_;
[email protected]e7f29642009-03-02 22:53:18394 }
395
[email protected]be180c802009-10-23 06:33:31396 URLRequestContextGetter* GetRequestContextForExtensions() {
[email protected]47accfd62009-05-14 18:46:21397 if (!extensions_request_context_) {
398 extensions_request_context_ =
[email protected]be180c802009-10-23 06:33:31399 ChromeURLRequestContextGetter::CreateOffTheRecordForExtensions(this);
[email protected]47accfd62009-05-14 18:46:21400 }
401
402 return extensions_request_context_;
403 }
404
[email protected]db36938c2009-08-19 21:48:42405 virtual net::SSLConfigService* GetSSLConfigService() {
406 return GetOriginalProfile()->GetSSLConfigService();
407 }
408
[email protected]e284e6d82010-01-29 19:49:45409 virtual HostContentSettingsMap* GetHostContentSettingsMap() {
410 // Need to use a separate map from the normal one to avoid persisting
411 // content setting changes in OTR mode.
412 if (!host_content_settings_map_.get())
413 host_content_settings_map_.reset(new HostContentSettingsMap(this));
414 return host_content_settings_map_.get();
415 }
416
[email protected]40bd6582009-12-04 23:49:51417 virtual HostZoomMap* GetHostZoomMap() {
418 // Need to use a separate map from the normal one to avoid persisting zoom
419 // changes in OTR mode.
420 if (!host_zoom_map_)
421 host_zoom_map_ = new HostZoomMap(this);
422 return host_zoom_map_.get();
423 }
424
[email protected]8c6335d32010-01-20 09:21:50425 virtual Blacklist* GetPrivacyBlacklist() {
426 return GetOriginalProfile()->GetPrivacyBlacklist();
[email protected]eaadd9052009-06-23 18:02:23427 }
428
initial.commit09911bf2008-07-26 23:55:29429 virtual SessionService* GetSessionService() {
430 // Don't save any sessions when off the record.
431 return NULL;
432 }
433
434 virtual void ShutdownSessionService() {
435 // We don't allow a session service, nothing to do.
436 }
437
438 virtual bool HasSessionService() const {
439 // We never have a session service.
440 return false;
441 }
442
initial.commit09911bf2008-07-26 23:55:29443 virtual bool DidLastSessionExitCleanly() {
444 return profile_->DidLastSessionExitCleanly();
445 }
446
[email protected]d8e41ed2008-09-11 15:22:32447 virtual BookmarkModel* GetBookmarkModel() {
448 return profile_->GetBookmarkModel();
initial.commit09911bf2008-07-26 23:55:29449 }
450
[email protected]4bb336302009-10-12 05:44:26451 virtual DesktopNotificationService* GetDesktopNotificationService() {
[email protected]7d7696c52009-12-01 20:54:58452 if (!desktop_notification_service_.get()) {
453 desktop_notification_service_.reset(new DesktopNotificationService(
454 this, g_browser_process->notification_ui_manager()));
455 }
456 return desktop_notification_service_.get();
[email protected]4bb336302009-10-12 05:44:26457 }
458
[email protected]48352c12009-08-15 01:19:11459 virtual ProfileSyncService* GetProfileSyncService() {
460 return NULL;
[email protected]3a453fa2008-08-15 18:46:34461 }
[email protected]3a453fa2008-08-15 18:46:34462
initial.commit09911bf2008-07-26 23:55:29463 virtual bool IsSameProfile(Profile* profile) {
464 if (profile == static_cast<Profile*>(this))
465 return true;
466 return profile == profile_;
467 }
468
469 virtual Time GetStartTime() const {
470 return start_time_;
471 }
472
473 virtual TabRestoreService* GetTabRestoreService() {
474 return NULL;
475 }
476
[email protected]e7244d82008-10-29 18:13:26477 virtual void ResetTabRestoreService() {
[email protected]20930852008-10-15 19:30:41478 }
479
[email protected]85c55dc2009-11-06 03:05:46480 virtual SpellCheckHost* GetSpellCheckHost() {
481 return profile_->GetSpellCheckHost();
482 }
483
484 virtual void ReinitializeSpellCheckHost(bool force) {
485 profile_->ReinitializeSpellCheckHost(force);
486 }
[email protected]85c55dc2009-11-06 03:05:46487
[email protected]3bf335a2009-06-26 20:46:06488 virtual WebKitContext* GetWebKitContext() {
[email protected]c27324b2009-11-19 22:44:29489 if (!webkit_context_.get())
[email protected]cfe8a112009-11-25 22:52:21490 webkit_context_ = new WebKitContext(FilePath(), true);
[email protected]c27324b2009-11-19 22:44:29491 DCHECK(webkit_context_.get());
492 return webkit_context_.get();
493 }
[email protected]3bf335a2009-06-26 20:46:06494
[email protected]449478302009-06-09 20:04:28495 virtual ThumbnailStore* GetThumbnailStore() {
496 return NULL;
497 }
498
initial.commit09911bf2008-07-26 23:55:29499 virtual void MarkAsCleanShutdown() {
500 }
501
[email protected]bdbc87c2009-01-25 05:08:54502 virtual void InitExtensions() {
503 NOTREACHED();
504 }
505
[email protected]ea0c98cf2009-06-18 23:02:54506 virtual void InitWebResources() {
507 NOTREACHED();
508 }
509
[email protected]9c8dd902009-11-19 17:50:42510 virtual NTPResourceCache* GetNTPResourceCache() {
511 // Just return the real profile resource cache.
512 return profile_->GetNTPResourceCache();
513 }
514
initial.commit09911bf2008-07-26 23:55:29515 virtual void ExitedOffTheRecordMode() {
516 // Drop our download manager so we forget about all the downloads made
517 // in off-the-record mode.
518 download_manager_ = NULL;
519 }
520
521 virtual void Observe(NotificationType type,
522 const NotificationSource& source,
523 const NotificationDetails& details) {
[email protected]bfd04a62009-02-01 18:16:56524 DCHECK_EQ(NotificationType::BROWSER_CLOSED, type.value);
initial.commit09911bf2008-07-26 23:55:29525 // We are only interested in OTR browser closing.
526 if (Source<Browser>(source)->profile() != this)
527 return;
528
529 // Let's check if we still have an Off The Record window opened.
530 // Note that we check against 1 as this notification is sent before the
531 // browser window is actually removed from the list.
532 if (BrowserList::GetBrowserCount(this) <= 1)
533 ExitedOffTheRecordMode();
534 }
535
536 private:
[email protected]88cf3292009-05-22 01:48:43537 NotificationRegistrar registrar_;
538
initial.commit09911bf2008-07-26 23:55:29539 // The real underlying profile.
540 Profile* profile_;
541
[email protected]6ab9b202008-12-23 22:34:50542 // The context to use for requests made from this OTR session.
[email protected]13c30922009-11-19 03:43:19543 scoped_refptr<ChromeURLRequestContextGetter> request_context_;
initial.commit09911bf2008-07-26 23:55:29544
[email protected]13c30922009-11-19 03:43:19545 scoped_refptr<ChromeURLRequestContextGetter> extensions_request_context_;
[email protected]23f1ef12009-09-01 22:30:30546
[email protected]e284e6d82010-01-29 19:49:45547 scoped_ptr<HostContentSettingsMap> host_content_settings_map_;
548
[email protected]40bd6582009-12-04 23:49:51549 scoped_refptr<HostZoomMap> host_zoom_map_;
550
initial.commit09911bf2008-07-26 23:55:29551 // The download manager that only stores downloaded items in memory.
552 scoped_refptr<DownloadManager> download_manager_;
553
[email protected]7d7696c52009-12-01 20:54:58554 // Use a separate desktop notification service for OTR.
555 scoped_ptr<DesktopNotificationService> desktop_notification_service_;
556
[email protected]3bf335a2009-06-26 20:46:06557 // Use a special WebKit context for OTR browsing.
558 scoped_refptr<WebKitContext> webkit_context_;
559
[email protected]34cc84f2009-02-13 10:04:35560 // We don't want SSLHostState from the OTR profile to leak back to the main
561 // profile because then the main profile would learn some of the host names
562 // the user visited while OTR.
563 scoped_ptr<SSLHostState> ssl_host_state_;
564
[email protected]326e6792009-12-11 21:04:42565 // The TransportSecurityState that only stores enabled sites in memory.
566 scoped_refptr<net::TransportSecurityState>
567 transport_security_state_;
[email protected]a9cea7542009-05-20 04:30:23568
initial.commit09911bf2008-07-26 23:55:29569 // Time we were started.
570 Time start_time_;
571
[email protected]2f351cb2009-11-09 23:43:34572 // The main database tracker for this profile.
573 // Should be used only on the file thread.
574 scoped_refptr<webkit_database::DatabaseTracker> db_tracker_;
575
[email protected]90085af02009-10-29 17:53:21576 DISALLOW_COPY_AND_ASSIGN(OffTheRecordProfileImpl);
initial.commit09911bf2008-07-26 23:55:29577};
578
[email protected]f7011fcb2009-01-28 21:54:32579ProfileImpl::ProfileImpl(const FilePath& path)
initial.commit09911bf2008-07-26 23:55:29580 : path_(path),
[email protected]a6d0f182010-01-12 08:01:44581 visited_link_event_listener_(new VisitedLinkEventListener()),
[email protected]89ebc7e2009-08-24 22:11:07582 extension_devtools_manager_(NULL),
[email protected]f7011fcb2009-01-28 21:54:32583 request_context_(NULL),
[email protected]363347b2009-03-13 20:06:57584 media_request_context_(NULL),
[email protected]47accfd62009-05-14 18:46:21585 extensions_request_context_(NULL),
[email protected]e284e6d82010-01-29 19:49:45586 host_content_settings_map_(NULL),
[email protected]40bd6582009-12-04 23:49:51587 host_zoom_map_(NULL),
[email protected]f7011fcb2009-01-28 21:54:32588 history_service_created_(false),
[email protected]0189bc722009-08-28 21:56:48589 favicon_service_created_(false),
[email protected]f7011fcb2009-01-28 21:54:32590 created_web_data_service_(false),
[email protected]e69d33952009-06-03 22:00:41591 created_password_store_(false),
[email protected]f7011fcb2009-01-28 21:54:32592 created_download_manager_(false),
[email protected]4a190632009-05-09 01:07:42593 created_theme_provider_(false),
[email protected]f7011fcb2009-01-28 21:54:32594 start_time_(Time::Now()),
[email protected]85c55dc2009-11-06 03:05:46595 spellcheck_host_(NULL),
596 spellcheck_host_ready_(false),
initial.commit09911bf2008-07-26 23:55:29597 shutdown_session_service_(false) {
598 DCHECK(!path.empty()) << "Using an empty path will attempt to write " <<
599 "profile files to the root directory!";
[email protected]2d316662008-09-03 18:18:14600 create_session_service_timer_.Start(
601 TimeDelta::FromMilliseconds(kCreateSessionServiceDelayMS), this,
602 &ProfileImpl::EnsureSessionServiceCreated);
[email protected]bdbc87c2009-01-25 05:08:54603
[email protected]89ebc7e2009-08-24 22:11:07604 if (CommandLine::ForCurrentProcess()->HasSwitch(
605 switches::kEnableExtensionTimelineApi)) {
606 extension_devtools_manager_ = new ExtensionDevToolsManager(this);
607 }
608
[email protected]382a0702009-06-26 17:12:27609 extension_process_manager_.reset(new ExtensionProcessManager(this));
[email protected]7120f132009-07-20 21:05:37610 extension_message_service_ = new ExtensionMessageService(this);
[email protected]382a0702009-06-26 17:12:27611
[email protected]e7244d82008-10-29 18:13:26612 PrefService* prefs = GetPrefs();
613 prefs->AddPrefObserver(prefs::kSpellCheckDictionary, this);
614 prefs->AddPrefObserver(prefs::kEnableSpellCheck, this);
[email protected]154a4332009-06-03 20:20:58615 prefs->AddPrefObserver(prefs::kEnableAutoSpellCorrect, this);
[email protected]380ab462009-04-24 01:23:58616
[email protected]405a64b2009-09-16 21:03:44617#if defined(OS_MACOSX)
618 // If the profile directory doesn't already have a cache directory and it
619 // is under ~/Library/Application Support, use a suitable cache directory
620 // under ~/Library/Caches. For example, a profile directory of
621 // ~/Library/Application Support/Google/Chrome/MyProfileName that doesn't
622 // have a "Cache" or "MediaCache" subdirectory would use the cache directory
623 // ~/Library/Caches/Google/Chrome/MyProfileName.
624 //
625 // TODO(akalin): Come up with unit tests for this.
[email protected]405a64b2009-09-16 21:03:44626 if (!HasACacheSubdir(path_)) {
627 FilePath app_data_path, user_cache_path;
628 if (PathService::Get(base::DIR_APP_DATA, &app_data_path) &&
[email protected]b70454862009-12-03 01:07:12629 PathService::Get(base::DIR_USER_CACHE, &user_cache_path) &&
[email protected]405a64b2009-09-16 21:03:44630 app_data_path.AppendRelativePath(path_, &user_cache_path)) {
631 base_cache_path_ = user_cache_path;
632 }
633 }
[email protected]9e9b6e8e2009-12-02 08:45:01634#elif defined(OS_POSIX) // Posix minus Mac.
635 // See http://standards.freedesktop.org/basedir-spec/basedir-spec-latest.html
636 // for a spec on where cache files go. The net effect for most systems is we
637 // use ~/.cache/chromium/ for Chromium and ~/.cache/google-chrome/ for
638 // official builds.
639 if (!PathService::IsOverridden(chrome::DIR_USER_DATA)) {
640#if defined(GOOGLE_CHROME_BUILD)
641 const char kCacheDir[] = "google-chrome";
[email protected]405a64b2009-09-16 21:03:44642#else
[email protected]9e9b6e8e2009-12-02 08:45:01643 const char kCacheDir[] = "chromium";
644#endif
645 PathService::Get(base::DIR_USER_CACHE, &base_cache_path_);
646 base_cache_path_ = base_cache_path_.Append(kCacheDir);
647 if (!file_util::PathExists(base_cache_path_))
648 file_util::CreateDirectory(base_cache_path_);
649 }
[email protected]405a64b2009-09-16 21:03:44650#endif
[email protected]bc96d562009-08-11 18:45:13651 if (base_cache_path_.empty())
652 base_cache_path_ = path_;
653
[email protected]4a190632009-05-09 01:07:42654 // Listen for theme installation.
[email protected]88cf3292009-05-22 01:48:43655 registrar_.Add(this, NotificationType::THEME_INSTALLED,
656 NotificationService::AllSources());
[email protected]48352c12009-08-15 01:19:11657
658 // Listen for bookmark model load, to bootstrap the sync service.
659 registrar_.Add(this, NotificationType::BOOKMARK_MODEL_LOADED,
660 Source<Profile>(this));
[email protected]db36938c2009-08-19 21:48:42661
662 ssl_config_service_manager_.reset(
663 SSLConfigServiceManager::CreateDefaultManager(this));
[email protected]2627431b2009-09-15 20:21:53664
665#if defined(OS_CHROMEOS)
[email protected]fecc1522009-10-15 21:08:29666 chromeos_preferences_.Init(prefs);
[email protected]2627431b2009-09-15 20:21:53667#endif
initial.commit09911bf2008-07-26 23:55:29668}
669
[email protected]bdbc87c2009-01-25 05:08:54670void ProfileImpl::InitExtensions() {
[email protected]8c756ac2009-01-30 23:36:41671 if (user_script_master_ || extensions_service_)
672 return; // Already initialized.
673
[email protected]bdbc87c2009-01-25 05:08:54674 const CommandLine* command_line = CommandLine::ForCurrentProcess();
[email protected]bb28e062009-02-27 17:19:18675 ExtensionErrorReporter::Init(true); // allow noisy errors.
[email protected]faed6e12009-11-24 22:38:36676
677 FilePath script_dir; // Don't look for user scripts in any directory.
678 // TODO(aa): We should just remove this functionality,
679 // since it isn't used anymore.
[email protected]c931db62009-12-23 03:28:51680 user_script_master_ = new UserScriptMaster(script_dir, this);
[email protected]faed6e12009-11-24 22:38:36681
[email protected]894bb502009-05-21 22:39:57682 extensions_service_ = new ExtensionsService(
[email protected]a9b00ac2009-06-25 21:03:23683 this,
684 CommandLine::ForCurrentProcess(),
685 GetPrefs(),
686 GetPath().AppendASCII(ExtensionsService::kInstallDirectoryName),
[email protected]c8b437d2009-07-20 21:26:36687 true);
[email protected]bdbc87c2009-01-25 05:08:54688
[email protected]9197f3b2009-06-02 00:49:27689 extensions_service_->Init();
[email protected]919ddc82009-07-15 04:30:12690
691 // Load any extensions specified with --load-extension.
692 if (command_line->HasSwitch(switches::kLoadExtension)) {
[email protected]5d39e3142009-12-17 05:54:10693 FilePath path = command_line->GetSwitchValuePath(switches::kLoadExtension);
[email protected]919ddc82009-07-15 04:30:12694 extensions_service_->LoadExtension(path);
695
696 // Tell UserScriptMaser to watch this extension's directory for changes so
697 // you can live edit content scripts during development.
698 user_script_master_->AddWatchedPath(path);
699 }
[email protected]bdbc87c2009-01-25 05:08:54700}
701
[email protected]ea0c98cf2009-06-18 23:02:54702void ProfileImpl::InitWebResources() {
[email protected]0c274c202009-07-12 02:59:07703 if (web_resource_service_)
704 return; // Already initialized.
705
[email protected]6fad2632009-11-02 05:59:37706 web_resource_service_ = new WebResourceService(this);
[email protected]ea0c98cf2009-06-18 23:02:54707 web_resource_service_->StartAfterDelay();
708}
709
[email protected]9c8dd902009-11-19 17:50:42710NTPResourceCache* ProfileImpl::GetNTPResourceCache() {
711 if (!ntp_resource_cache_.get())
712 ntp_resource_cache_.reset(new NTPResourceCache(this));
713 return ntp_resource_cache_.get();
714}
715
initial.commit09911bf2008-07-26 23:55:29716ProfileImpl::~ProfileImpl() {
[email protected]169627b2008-12-06 19:30:19717 tab_restore_service_ = NULL;
initial.commit09911bf2008-07-26 23:55:29718
719 StopCreateSessionServiceTimer();
720 // TemplateURLModel schedules a task on the WebDataService from its
721 // destructor. Delete it first to ensure the task gets scheduled before we
722 // shut down the database.
723 template_url_model_.reset();
724
725 // The download manager queries the history system and should be deleted
726 // before the history is shutdown so it can properly cancel all requests.
727 download_manager_ = NULL;
728
[email protected]4a190632009-05-09 01:07:42729 // The theme provider provides bitmaps to whoever wants them.
[email protected]761962c2009-09-25 00:18:15730 theme_provider_.reset();
[email protected]4a190632009-05-09 01:07:42731
[email protected]44961292009-07-20 20:03:09732 // The ThumbnailStore saves thumbnails used by the NTP. Call Shutdown to
733 // save any new thumbnails to disk and release its reference to the
734 // HistoryService.
735 if (thumbnail_store_.get())
736 thumbnail_store_->Shutdown();
737
[email protected]e7244d82008-10-29 18:13:26738 // Remove pref observers.
739 PrefService* prefs = GetPrefs();
740 prefs->RemovePrefObserver(prefs::kSpellCheckDictionary, this);
741 prefs->RemovePrefObserver(prefs::kEnableSpellCheck, this);
[email protected]154a4332009-06-03 20:20:58742 prefs->RemovePrefObserver(prefs::kEnableAutoSpellCorrect, this);
[email protected]e7244d82008-10-29 18:13:26743
[email protected]9c8dd902009-11-19 17:50:42744 // Delete the NTP resource cache so we can unregister pref observers.
745 ntp_resource_cache_.reset();
746
[email protected]48352c12009-08-15 01:19:11747 sync_service_.reset();
[email protected]3a453fa2008-08-15 18:46:34748
initial.commit09911bf2008-07-26 23:55:29749 // Both HistoryService and WebDataService maintain threads for background
750 // processing. Its possible each thread still has tasks on it that have
751 // increased the ref count of the service. In such a situation, when we
752 // decrement the refcount, it won't be 0, and the threads/databases aren't
753 // properly shut down. By explicitly calling Cleanup/Shutdown we ensure the
754 // databases are properly closed.
755 if (web_data_service_.get())
756 web_data_service_->Shutdown();
757
758 if (history_service_.get())
759 history_service_->Cleanup();
760
[email protected]85c55dc2009-11-06 03:05:46761 if (spellcheck_host_.get())
762 spellcheck_host_->UnsetObserver();
initial.commit09911bf2008-07-26 23:55:29763
[email protected]cfc06f122009-11-16 22:18:55764 if (default_request_context_ == request_context_)
[email protected]47accfd62009-05-14 18:46:21765 default_request_context_ = NULL;
[email protected]6ab9b202008-12-23 22:34:50766
[email protected]47accfd62009-05-14 18:46:21767 CleanupRequestContext(request_context_);
768 CleanupRequestContext(media_request_context_);
769 CleanupRequestContext(extensions_request_context_);
[email protected]1e744f22009-04-08 01:00:17770
[email protected]d8e41ed2008-09-11 15:22:32771 // HistoryService may call into the BookmarkModel, as such we need to
772 // delete HistoryService before the BookmarkModel. The destructor for
[email protected]90ef13132008-08-27 03:27:46773 // HistoryService will join with HistoryService's backend thread so that
774 // by the time the destructor has finished we're sure it will no longer call
[email protected]d8e41ed2008-09-11 15:22:32775 // into the BookmarkModel.
[email protected]90ef13132008-08-27 03:27:46776 history_service_ = NULL;
777 bookmark_bar_model_.reset();
778
[email protected]0189bc722009-08-28 21:56:48779 // FaviconService depends on HistoryServce so make sure we delete
780 // HistoryService first.
781 favicon_service_ = NULL;
782
[email protected]7120f132009-07-20 21:05:37783 extension_message_service_->ProfileDestroyed();
784
[email protected]6ef635e42009-07-26 06:16:12785 if (extensions_service_)
786 extensions_service_->ProfileDestroyed();
787
[email protected]66da08b2009-10-19 22:27:00788 // This causes the Preferences file to be written to disk.
initial.commit09911bf2008-07-26 23:55:29789 MarkAsCleanShutdown();
790}
791
[email protected]4bf6afd2009-10-08 14:00:11792ProfileId ProfileImpl::GetRuntimeId() {
793 return reinterpret_cast<ProfileId>(this);
794}
795
[email protected]f7011fcb2009-01-28 21:54:32796FilePath ProfileImpl::GetPath() {
initial.commit09911bf2008-07-26 23:55:29797 return path_;
798}
799
800bool ProfileImpl::IsOffTheRecord() {
801 return false;
802}
803
804Profile* ProfileImpl::GetOffTheRecordProfile() {
805 if (!off_the_record_profile_.get()) {
806 scoped_ptr<OffTheRecordProfileImpl> p(new OffTheRecordProfileImpl(this));
807 off_the_record_profile_.swap(p);
808 }
809 return off_the_record_profile_.get();
810}
811
[email protected]860f55492009-03-27 19:50:59812void ProfileImpl::DestroyOffTheRecordProfile() {
813 off_the_record_profile_.reset();
814}
815
initial.commit09911bf2008-07-26 23:55:29816Profile* ProfileImpl::GetOriginalProfile() {
817 return this;
818}
819
[email protected]2f351cb2009-11-09 23:43:34820webkit_database::DatabaseTracker* ProfileImpl::GetDatabaseTracker() {
821 if (!db_tracker_)
822 db_tracker_ = new webkit_database::DatabaseTracker(GetPath());
823 return db_tracker_;
824}
825
initial.commit09911bf2008-07-26 23:55:29826VisitedLinkMaster* ProfileImpl::GetVisitedLinkMaster() {
[email protected]a6d0f182010-01-12 08:01:44827 if (!visited_link_master_.get()) {
828 scoped_ptr<VisitedLinkMaster> visited_links(
829 new VisitedLinkMaster(visited_link_event_listener_.get(), this));
830 if (!visited_links->Init())
831 return NULL;
832 visited_link_master_.swap(visited_links);
[email protected]a5fb1c52010-01-12 03:39:53833 }
[email protected]a6d0f182010-01-12 08:01:44834
835 return visited_link_master_.get();
initial.commit09911bf2008-07-26 23:55:29836}
837
[email protected]6014d672008-12-05 00:38:25838ExtensionsService* ProfileImpl::GetExtensionsService() {
839 return extensions_service_.get();
840}
841
[email protected]0938d3c2009-01-09 20:37:35842UserScriptMaster* ProfileImpl::GetUserScriptMaster() {
[email protected]0938d3c2009-01-09 20:37:35843 return user_script_master_.get();
[email protected]04fba9a92008-10-28 17:25:25844}
845
[email protected]89ebc7e2009-08-24 22:11:07846ExtensionDevToolsManager* ProfileImpl::GetExtensionDevToolsManager() {
847 return extension_devtools_manager_.get();
848}
849
[email protected]481e1a42009-05-06 20:56:05850ExtensionProcessManager* ProfileImpl::GetExtensionProcessManager() {
[email protected]382a0702009-06-26 17:12:27851 return extension_process_manager_.get();
[email protected]481e1a42009-05-06 20:56:05852}
853
[email protected]7120f132009-07-20 21:05:37854ExtensionMessageService* ProfileImpl::GetExtensionMessageService() {
855 return extension_message_service_.get();
856}
857
[email protected]34cc84f2009-02-13 10:04:35858SSLHostState* ProfileImpl::GetSSLHostState() {
859 if (!ssl_host_state_.get())
860 ssl_host_state_.reset(new SSLHostState());
861
862 DCHECK(ssl_host_state_->CalledOnValidThread());
863 return ssl_host_state_.get();
864}
865
[email protected]326e6792009-12-11 21:04:42866net::TransportSecurityState*
867 ProfileImpl::GetTransportSecurityState() {
868 if (!transport_security_state_.get()) {
869 transport_security_state_ = new net::TransportSecurityState();
870 transport_security_persister_ =
871 new TransportSecurityPersister();
872 transport_security_persister_->Initialize(
873 transport_security_state_.get(), path_);
[email protected]887f80d2009-09-04 16:57:51874 }
[email protected]a9cea7542009-05-20 04:30:23875
[email protected]326e6792009-12-11 21:04:42876 return transport_security_state_.get();
[email protected]a9cea7542009-05-20 04:30:23877}
878
initial.commit09911bf2008-07-26 23:55:29879PrefService* ProfileImpl::GetPrefs() {
880 if (!prefs_.get()) {
[email protected]6fad2632009-11-02 05:59:37881 prefs_.reset(new PrefService(GetPrefFilePath()));
initial.commit09911bf2008-07-26 23:55:29882
883 // The Profile class and ProfileManager class may read some prefs so
884 // register known prefs as soon as possible.
885 Profile::RegisterUserPrefs(prefs_.get());
[email protected]9acc48602009-11-30 21:18:51886 browser::RegisterUserPrefs(prefs_.get());
initial.commit09911bf2008-07-26 23:55:29887
888 // The last session exited cleanly if there is no pref for
889 // kSessionExitedCleanly or the value for kSessionExitedCleanly is true.
890 last_session_exited_cleanly_ =
891 prefs_->GetBoolean(prefs::kSessionExitedCleanly);
892 // Mark the session as open.
893 prefs_->SetBoolean(prefs::kSessionExitedCleanly, false);
894 // Make sure we save to disk that the session has opened.
[email protected]6faa0e0d2009-04-28 06:50:36895 prefs_->ScheduleSavePersistentPrefs();
initial.commit09911bf2008-07-26 23:55:29896 }
897
898 return prefs_.get();
899}
900
[email protected]f7011fcb2009-01-28 21:54:32901FilePath ProfileImpl::GetPrefFilePath() {
902 FilePath pref_file_path = path_;
903 pref_file_path = pref_file_path.Append(chrome::kPreferencesFilename);
initial.commit09911bf2008-07-26 23:55:29904 return pref_file_path;
905}
906
[email protected]be180c802009-10-23 06:33:31907URLRequestContextGetter* ProfileImpl::GetRequestContext() {
initial.commit09911bf2008-07-26 23:55:29908 if (!request_context_) {
[email protected]f7011fcb2009-01-28 21:54:32909 FilePath cookie_path = GetPath();
910 cookie_path = cookie_path.Append(chrome::kCookieFilename);
[email protected]bc96d562009-08-11 18:45:13911 FilePath cache_path = base_cache_path_;
[email protected]e5642992009-06-26 23:06:31912 int max_size;
913 GetCacheParameters(kNormalContext, &cache_path, &max_size);
[email protected]2b2830a2009-02-07 01:58:42914
[email protected]405a64b2009-09-16 21:03:44915 cache_path = GetCachePath(cache_path);
[email protected]be180c802009-10-23 06:33:31916 request_context_ = ChromeURLRequestContextGetter::CreateOriginal(
917 this, cookie_path, cache_path, max_size);
initial.commit09911bf2008-07-26 23:55:29918
[email protected]6ab9b202008-12-23 22:34:50919 // The first request context is always a normal (non-OTR) request context.
920 // Even when Chromium is started in OTR mode, a normal profile is always
921 // created first.
922 if (!default_request_context_) {
923 default_request_context_ = request_context_;
[email protected]be180c802009-10-23 06:33:31924 // TODO(eroman): this isn't terribly useful anymore now that the
925 // URLRequestContext is constructed by the IO thread...
[email protected]6ab9b202008-12-23 22:34:50926 NotificationService::current()->Notify(
[email protected]bfd04a62009-02-01 18:16:56927 NotificationType::DEFAULT_REQUEST_CONTEXT_AVAILABLE,
[email protected]6ab9b202008-12-23 22:34:50928 NotificationService::AllSources(), NotificationService::NoDetails());
929 }
initial.commit09911bf2008-07-26 23:55:29930 }
931
932 return request_context_;
933}
934
[email protected]be180c802009-10-23 06:33:31935URLRequestContextGetter* ProfileImpl::GetRequestContextForMedia() {
[email protected]e7f29642009-03-02 22:53:18936 if (!media_request_context_) {
[email protected]bc96d562009-08-11 18:45:13937 FilePath cache_path = base_cache_path_;
[email protected]e5642992009-06-26 23:06:31938 int max_size;
939 GetCacheParameters(kMediaContext, &cache_path, &max_size);
[email protected]e3edeba2009-03-23 18:57:14940
[email protected]405a64b2009-09-16 21:03:44941 cache_path = GetMediaCachePath(cache_path);
[email protected]be180c802009-10-23 06:33:31942 media_request_context_ =
943 ChromeURLRequestContextGetter::CreateOriginalForMedia(
944 this, cache_path, max_size);
[email protected]e7f29642009-03-02 22:53:18945 }
946
947 return media_request_context_;
948}
949
[email protected]0189bc722009-08-28 21:56:48950FaviconService* ProfileImpl::GetFaviconService(ServiceAccessType sat) {
951 if (!favicon_service_created_) {
952 favicon_service_created_ = true;
953 scoped_refptr<FaviconService> service(new FaviconService(this));
954 favicon_service_.swap(service);
955 }
956 return favicon_service_.get();
957}
958
[email protected]be180c802009-10-23 06:33:31959URLRequestContextGetter* ProfileImpl::GetRequestContextForExtensions() {
[email protected]47accfd62009-05-14 18:46:21960 if (!extensions_request_context_) {
961 FilePath cookie_path = GetPath();
962 cookie_path = cookie_path.Append(chrome::kExtensionsCookieFilename);
963
964 extensions_request_context_ =
[email protected]be180c802009-10-23 06:33:31965 ChromeURLRequestContextGetter::CreateOriginalForExtensions(
966 this, cookie_path);
[email protected]47accfd62009-05-14 18:46:21967 }
968
969 return extensions_request_context_;
970}
971
[email protected]db36938c2009-08-19 21:48:42972net::SSLConfigService* ProfileImpl::GetSSLConfigService() {
973 return ssl_config_service_manager_->Get();
974}
975
[email protected]e284e6d82010-01-29 19:49:45976HostContentSettingsMap* ProfileImpl::GetHostContentSettingsMap() {
977 if (!host_content_settings_map_.get())
978 host_content_settings_map_.reset(new HostContentSettingsMap(this));
979 return host_content_settings_map_.get();
980}
981
[email protected]40bd6582009-12-04 23:49:51982HostZoomMap* ProfileImpl::GetHostZoomMap() {
983 if (!host_zoom_map_)
984 host_zoom_map_ = new HostZoomMap(this);
985 return host_zoom_map_.get();
986}
987
[email protected]8c6335d32010-01-20 09:21:50988Blacklist* ProfileImpl::GetPrivacyBlacklist() {
[email protected]a307e31e2009-11-30 16:11:27989 if (!CommandLine::ForCurrentProcess()->HasSwitch(
[email protected]c37f8b42010-01-23 16:22:14990 switches::kEnablePrivacyBlacklists))
[email protected]a307e31e2009-11-30 16:11:27991 return NULL;
[email protected]c37f8b42010-01-23 16:22:14992 if (!privacy_blacklist_.get())
993 privacy_blacklist_.reset(new Blacklist(GetPrefs()));
[email protected]8c6335d32010-01-20 09:21:50994 return privacy_blacklist_.get();
[email protected]eaadd9052009-06-23 18:02:23995}
996
initial.commit09911bf2008-07-26 23:55:29997HistoryService* ProfileImpl::GetHistoryService(ServiceAccessType sat) {
998 if (!history_service_created_) {
[email protected]90ef13132008-08-27 03:27:46999 history_service_created_ = true;
initial.commit09911bf2008-07-26 23:55:291000 scoped_refptr<HistoryService> history(new HistoryService(this));
[email protected]d8e41ed2008-09-11 15:22:321001 if (!history->Init(GetPath(), GetBookmarkModel()))
initial.commit09911bf2008-07-26 23:55:291002 return NULL;
1003 history_service_.swap(history);
initial.commit09911bf2008-07-26 23:55:291004
1005 // Send out the notification that the history service was created.
1006 NotificationService::current()->
[email protected]bfd04a62009-02-01 18:16:561007 Notify(NotificationType::HISTORY_CREATED, Source<Profile>(this),
initial.commit09911bf2008-07-26 23:55:291008 Details<HistoryService>(history_service_.get()));
1009 }
1010 return history_service_.get();
1011}
1012
[email protected]0850fa62009-10-08 22:34:291013HistoryService* ProfileImpl::GetHistoryServiceWithoutCreating() {
1014 return history_service_.get();
1015}
1016
initial.commit09911bf2008-07-26 23:55:291017TemplateURLModel* ProfileImpl::GetTemplateURLModel() {
1018 if (!template_url_model_.get())
1019 template_url_model_.reset(new TemplateURLModel(this));
1020 return template_url_model_.get();
1021}
1022
1023TemplateURLFetcher* ProfileImpl::GetTemplateURLFetcher() {
1024 if (!template_url_fetcher_.get())
1025 template_url_fetcher_.reset(new TemplateURLFetcher(this));
1026 return template_url_fetcher_.get();
1027}
1028
[email protected]11f4857282009-11-13 19:56:171029SearchVersusNavigateClassifier*
1030ProfileImpl::GetSearchVersusNavigateClassifier() {
[email protected]90085af02009-10-29 17:53:211031 if (!search_versus_navigate_classifier_.get()) {
1032 search_versus_navigate_classifier_.reset(
1033 new SearchVersusNavigateClassifier(this));
1034 }
1035 return search_versus_navigate_classifier_.get();
1036}
1037
initial.commit09911bf2008-07-26 23:55:291038WebDataService* ProfileImpl::GetWebDataService(ServiceAccessType sat) {
1039 if (!created_web_data_service_)
1040 CreateWebDataService();
1041 return web_data_service_.get();
1042}
1043
[email protected]9cddbe372009-10-23 21:23:531044WebDataService* ProfileImpl::GetWebDataServiceWithoutCreating() {
1045 return web_data_service_.get();
1046}
1047
initial.commit09911bf2008-07-26 23:55:291048void ProfileImpl::CreateWebDataService() {
1049 DCHECK(!created_web_data_service_ && web_data_service_.get() == NULL);
1050 created_web_data_service_ = true;
1051 scoped_refptr<WebDataService> wds(new WebDataService());
1052 if (!wds->Init(GetPath()))
1053 return;
1054 web_data_service_.swap(wds);
1055}
1056
[email protected]e69d33952009-06-03 22:00:411057PasswordStore* ProfileImpl::GetPasswordStore(ServiceAccessType sat) {
1058 if (!created_password_store_)
1059 CreatePasswordStore();
1060 return password_store_.get();
1061}
1062
1063void ProfileImpl::CreatePasswordStore() {
1064 DCHECK(!created_password_store_ && password_store_.get() == NULL);
1065 created_password_store_ = true;
1066 scoped_refptr<PasswordStore> ps;
1067#if defined(OS_LINUX)
[email protected]d17634b2009-10-20 18:56:251068 // TODO(evanm): implement "native" password management.
1069 // This bug describes the issues.
1070 // http://code.google.com/p/chromium/issues/detail?id=12351
1071 ps = new PasswordStoreDefault(GetWebDataService(Profile::IMPLICIT_ACCESS));
1072 if (!ps->Init())
1073 return;
[email protected]e69d33952009-06-03 22:00:411074#elif defined(OS_WIN)
1075 ps = new PasswordStoreWin(GetWebDataService(Profile::IMPLICIT_ACCESS));
[email protected]034eba52009-06-03 22:50:561076#elif defined(OS_MACOSX)
[email protected]e0411ae52009-06-30 23:59:171077 FilePath login_db_file_path = GetPath();
1078 login_db_file_path = login_db_file_path.Append(chrome::kLoginDataFileName);
1079 LoginDatabaseMac* login_db = new LoginDatabaseMac();
1080 if (!login_db->Init(login_db_file_path)) {
1081 LOG(ERROR) << "Could not initialize login database.";
1082 delete login_db;
1083 return;
1084 }
1085 ps = new PasswordStoreMac(new MacKeychain(), login_db);
[email protected]e69d33952009-06-03 22:00:411086#else
1087 NOTIMPLEMENTED();
1088#endif
1089 if (!ps || !ps->Init()) {
1090 // Try falling back to the default password manager
1091 LOG(WARNING) << "Could not initialise native password manager - "
1092 "falling back to default";
1093 ps = new PasswordStoreDefault(GetWebDataService(Profile::IMPLICIT_ACCESS));
1094 if (!ps->Init())
1095 return;
1096 }
1097 password_store_.swap(ps);
1098}
1099
initial.commit09911bf2008-07-26 23:55:291100DownloadManager* ProfileImpl::GetDownloadManager() {
1101 if (!created_download_manager_) {
1102 scoped_refptr<DownloadManager> dlm(new DownloadManager);
1103 dlm->Init(this);
1104 created_download_manager_ = true;
1105 download_manager_.swap(dlm);
1106 }
1107 return download_manager_.get();
1108}
1109
1110bool ProfileImpl::HasCreatedDownloadManager() const {
1111 return created_download_manager_;
1112}
1113
[email protected]def11712009-11-06 00:42:151114PersonalDataManager* ProfileImpl::GetPersonalDataManager() {
1115 if (!personal_data_manager_.get()) {
[email protected]2609bc12010-01-24 08:32:551116 personal_data_manager_.reset(new PersonalDataManager(this));
[email protected]def11712009-11-06 00:42:151117 }
1118 return personal_data_manager_.get();
1119}
1120
[email protected]4a190632009-05-09 01:07:421121void ProfileImpl::InitThemes() {
1122 if (!created_theme_provider_) {
[email protected]0519e112009-09-29 15:49:571123#if defined(OS_LINUX)
[email protected]761962c2009-09-25 00:18:151124 theme_provider_.reset(new GtkThemeProvider);
[email protected]a5166af62009-07-03 00:42:291125#else
[email protected]761962c2009-09-25 00:18:151126 theme_provider_.reset(new BrowserThemeProvider);
[email protected]a5166af62009-07-03 00:42:291127#endif
[email protected]761962c2009-09-25 00:18:151128 theme_provider_->Init(this);
[email protected]4a190632009-05-09 01:07:421129 created_theme_provider_ = true;
[email protected]4a190632009-05-09 01:07:421130 }
1131}
1132
1133void ProfileImpl::SetTheme(Extension* extension) {
1134 InitThemes();
1135 theme_provider_.get()->SetTheme(extension);
1136}
1137
[email protected]a5166af62009-07-03 00:42:291138void ProfileImpl::SetNativeTheme() {
1139 InitThemes();
1140 theme_provider_.get()->SetNativeTheme();
1141}
1142
[email protected]4a190632009-05-09 01:07:421143void ProfileImpl::ClearTheme() {
1144 InitThemes();
1145 theme_provider_.get()->UseDefaultTheme();
1146}
1147
[email protected]51c490b2009-08-03 16:34:341148Extension* ProfileImpl::GetTheme() {
1149 InitThemes();
1150
1151 std::string id = theme_provider_.get()->GetThemeID();
1152 if (id == BrowserThemeProvider::kDefaultThemeID)
1153 return NULL;
1154
[email protected]61b411612009-11-10 23:17:411155 return extensions_service_->GetExtensionById(id, false);
[email protected]51c490b2009-08-03 16:34:341156}
1157
[email protected]5786d3d2009-12-18 00:18:441158BrowserThemeProvider* ProfileImpl::GetThemeProvider() {
[email protected]4a190632009-05-09 01:07:421159 InitThemes();
1160 return theme_provider_.get();
1161}
1162
initial.commit09911bf2008-07-26 23:55:291163SessionService* ProfileImpl::GetSessionService() {
1164 if (!session_service_.get() && !shutdown_session_service_) {
1165 session_service_ = new SessionService(this);
1166 session_service_->ResetFromCurrentBrowsers();
1167 }
1168 return session_service_.get();
1169}
1170
1171void ProfileImpl::ShutdownSessionService() {
1172 if (shutdown_session_service_)
1173 return;
1174
1175 // We're about to exit, force creation of the session service if it hasn't
1176 // been created yet. We do this to ensure session state matches the point in
1177 // time the user exited.
1178 GetSessionService();
1179 shutdown_session_service_ = true;
1180 session_service_ = NULL;
1181}
1182
1183bool ProfileImpl::HasSessionService() const {
1184 return (session_service_.get() != NULL);
1185}
1186
initial.commit09911bf2008-07-26 23:55:291187bool ProfileImpl::DidLastSessionExitCleanly() {
1188 // last_session_exited_cleanly_ is set when the preferences are loaded. Force
1189 // it to be set by asking for the prefs.
1190 GetPrefs();
1191 return last_session_exited_cleanly_;
1192}
1193
[email protected]d8e41ed2008-09-11 15:22:321194BookmarkModel* ProfileImpl::GetBookmarkModel() {
[email protected]90ef13132008-08-27 03:27:461195 if (!bookmark_bar_model_.get()) {
[email protected]d8e41ed2008-09-11 15:22:321196 bookmark_bar_model_.reset(new BookmarkModel(this));
[email protected]90ef13132008-08-27 03:27:461197 bookmark_bar_model_->Load();
1198 }
initial.commit09911bf2008-07-26 23:55:291199 return bookmark_bar_model_.get();
1200}
1201
1202bool ProfileImpl::IsSameProfile(Profile* profile) {
1203 if (profile == static_cast<Profile*>(this))
1204 return true;
1205 OffTheRecordProfileImpl* otr_profile = off_the_record_profile_.get();
1206 return otr_profile && profile == static_cast<Profile*>(otr_profile);
1207}
1208
1209Time ProfileImpl::GetStartTime() const {
1210 return start_time_;
1211}
1212
1213TabRestoreService* ProfileImpl::GetTabRestoreService() {
1214 if (!tab_restore_service_.get())
[email protected]169627b2008-12-06 19:30:191215 tab_restore_service_ = new TabRestoreService(this);
initial.commit09911bf2008-07-26 23:55:291216 return tab_restore_service_.get();
1217}
1218
[email protected]449478302009-06-09 20:04:281219ThumbnailStore* ProfileImpl::GetThumbnailStore() {
1220 if (!thumbnail_store_.get()) {
1221 thumbnail_store_ = new ThumbnailStore;
[email protected]daa82dc2009-07-28 01:22:251222 thumbnail_store_->Init(
1223 GetPath().Append(chrome::kNewTabThumbnailsFilename), this);
[email protected]449478302009-06-09 20:04:281224 }
1225 return thumbnail_store_.get();
1226}
1227
initial.commit09911bf2008-07-26 23:55:291228void ProfileImpl::ResetTabRestoreService() {
[email protected]169627b2008-12-06 19:30:191229 tab_restore_service_ = NULL;
initial.commit09911bf2008-07-26 23:55:291230}
1231
[email protected]85c55dc2009-11-06 03:05:461232SpellCheckHost* ProfileImpl::GetSpellCheckHost() {
1233 return spellcheck_host_ready_ ? spellcheck_host_.get() : NULL;
1234}
1235
1236void ProfileImpl::ReinitializeSpellCheckHost(bool force) {
1237 // If we are already loading the spellchecker, and this is just a hint to
1238 // load the spellchecker, do nothing.
1239 if (!force && spellcheck_host_.get())
1240 return;
1241
[email protected]f41301e2009-11-16 21:30:071242 spellcheck_host_ready_ = false;
1243
[email protected]85c55dc2009-11-06 03:05:461244 bool notify = false;
1245 if (spellcheck_host_.get()) {
1246 spellcheck_host_->UnsetObserver();
[email protected]71c012a2009-11-10 01:33:051247 spellcheck_host_ = NULL;
[email protected]85c55dc2009-11-06 03:05:461248 notify = true;
1249 }
1250
1251 PrefService* prefs = GetPrefs();
1252 if (prefs->GetBoolean(prefs::kEnableSpellCheck)) {
1253 // Retrieve the (perhaps updated recently) dictionary name from preferences.
1254 spellcheck_host_ = new SpellCheckHost(this,
1255 WideToASCII(prefs->GetString(prefs::kSpellCheckDictionary)),
1256 GetRequestContext());
[email protected]f41301e2009-11-16 21:30:071257 spellcheck_host_->Initialize();
[email protected]85c55dc2009-11-06 03:05:461258 } else if (notify) {
1259 // The spellchecker has been disabled.
1260 SpellCheckHostInitialized();
1261 }
1262}
1263
1264void ProfileImpl::SpellCheckHostInitialized() {
[email protected]cb6037d2009-11-16 22:55:171265 spellcheck_host_ready_ = spellcheck_host_ &&
[email protected]c27324b2009-11-19 22:44:291266 (spellcheck_host_->bdict_file() != base::kInvalidPlatformFileValue ||
1267 spellcheck_host_->use_platform_spellchecker());
[email protected]85c55dc2009-11-06 03:05:461268 NotificationService::current()->Notify(
1269 NotificationType::SPELLCHECK_HOST_REINITIALIZED,
1270 Source<Profile>(this), NotificationService::NoDetails());
1271}
initial.commit09911bf2008-07-26 23:55:291272
[email protected]3bf335a2009-06-26 20:46:061273WebKitContext* ProfileImpl::GetWebKitContext() {
1274 if (!webkit_context_.get())
1275 webkit_context_ = new WebKitContext(path_, false);
1276 DCHECK(webkit_context_.get());
1277 return webkit_context_.get();
1278}
1279
[email protected]4bb336302009-10-12 05:44:261280DesktopNotificationService* ProfileImpl::GetDesktopNotificationService() {
1281 DCHECK(ChromeThread::CurrentlyOn(ChromeThread::UI));
1282 if (!desktop_notification_service_.get()) {
[email protected]4bb336302009-10-12 05:44:261283 desktop_notification_service_.reset(new DesktopNotificationService(
[email protected]29672ab2009-10-30 03:44:031284 this, g_browser_process->notification_ui_manager()));
[email protected]4bb336302009-10-12 05:44:261285 }
[email protected]4bb336302009-10-12 05:44:261286 return desktop_notification_service_.get();
1287}
1288
initial.commit09911bf2008-07-26 23:55:291289void ProfileImpl::MarkAsCleanShutdown() {
1290 if (prefs_.get()) {
1291 // The session cleanly exited, set kSessionExitedCleanly appropriately.
1292 prefs_->SetBoolean(prefs::kSessionExitedCleanly, true);
1293
1294 // NOTE: If you change what thread this writes on, be sure and update
1295 // ChromeFrame::EndSession().
[email protected]6faa0e0d2009-04-28 06:50:361296 prefs_->SavePersistentPrefs();
initial.commit09911bf2008-07-26 23:55:291297 }
1298}
1299
[email protected]e7244d82008-10-29 18:13:261300void ProfileImpl::Observe(NotificationType type,
1301 const NotificationSource& source,
1302 const NotificationDetails& details) {
[email protected]bfd04a62009-02-01 18:16:561303 if (NotificationType::PREF_CHANGED == type) {
[email protected]e7244d82008-10-29 18:13:261304 std::wstring* pref_name_in = Details<std::wstring>(details).ptr();
1305 PrefService* prefs = Source<PrefService>(source).ptr();
1306 DCHECK(pref_name_in && prefs);
1307 if (*pref_name_in == prefs::kSpellCheckDictionary ||
[email protected]85c55dc2009-11-06 03:05:461308 *pref_name_in == prefs::kEnableSpellCheck) {
[email protected]85c55dc2009-11-06 03:05:461309 ReinitializeSpellCheckHost(true);
[email protected]c27324b2009-11-19 22:44:291310 } else if (*pref_name_in == prefs::kEnableAutoSpellCorrect) {
1311 NotificationService::current()->Notify(
1312 NotificationType::SPELLCHECK_AUTOSPELL_TOGGLED,
1313 Source<Profile>(this), NotificationService::NoDetails());
[email protected]e7244d82008-10-29 18:13:261314 }
[email protected]4a190632009-05-09 01:07:421315 } else if (NotificationType::THEME_INSTALLED == type) {
1316 Extension* extension = Details<Extension>(details).ptr();
1317 SetTheme(extension);
[email protected]48352c12009-08-15 01:19:111318 } else if (NotificationType::BOOKMARK_MODEL_LOADED == type) {
1319 GetProfileSyncService(); // Causes lazy-load if sync is enabled.
1320 registrar_.Remove(this, NotificationType::BOOKMARK_MODEL_LOADED,
1321 Source<Profile>(this));
[email protected]e7244d82008-10-29 18:13:261322 }
1323}
1324
initial.commit09911bf2008-07-26 23:55:291325void ProfileImpl::StopCreateSessionServiceTimer() {
[email protected]2d316662008-09-03 18:18:141326 create_session_service_timer_.Stop();
initial.commit09911bf2008-07-26 23:55:291327}
[email protected]3a453fa2008-08-15 18:46:341328
[email protected]48352c12009-08-15 01:19:111329ProfileSyncService* ProfileImpl::GetProfileSyncService() {
[email protected]eec3bcfa2009-11-12 17:23:431330 if (!ProfileSyncService::IsSyncEnabled()) {
1331 return NULL;
[email protected]7367f1a2009-10-10 01:09:441332 }
[email protected]eec3bcfa2009-11-12 17:23:431333 if (!sync_service_.get())
1334 InitSyncService();
1335 return sync_service_.get();
[email protected]48352c12009-08-15 01:19:111336}
1337
1338void ProfileImpl::InitSyncService() {
[email protected]48352c12009-08-15 01:19:111339 sync_service_.reset(new ProfileSyncService(this));
1340 sync_service_->Initialize();
[email protected]48352c12009-08-15 01:19:111341}