blob: 54ecdf2d1fd5437d424df497beef0b55747802f6 [file] [log] [blame]
license.botbf09a502008-08-24 00:55:551// Copyright (c) 2006-2008 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
initial.commit09911bf2008-07-26 23:55:294
5#include "chrome/browser/profile.h"
6
7#include "base/command_line.h"
[email protected]04fba9a92008-10-28 17:25:258#include "base/file_path.h"
initial.commit09911bf2008-07-26 23:55:299#include "base/file_util.h"
initial.commit09911bf2008-07-26 23:55:2910#include "base/path_service.h"
11#include "base/scoped_ptr.h"
12#include "base/string_util.h"
[email protected]a9afddb2009-02-12 17:49:4213#include "chrome/browser/bookmarks/bookmark_model.h"
initial.commit09911bf2008-07-26 23:55:2914#include "chrome/browser/browser_list.h"
15#include "chrome/browser/browser_process.h"
[email protected]67a46b7f2009-06-16 21:41:0216#include "chrome/browser/browser_theme_provider.h"
[email protected]b7f05882009-02-22 01:21:5617#include "chrome/browser/download/download_manager.h"
[email protected]481e1a42009-05-06 20:56:0518#include "chrome/browser/extensions/extension_process_manager.h"
[email protected]6014d672008-12-05 00:38:2519#include "chrome/browser/extensions/extensions_service.h"
[email protected]0938d3c2009-01-09 20:37:3520#include "chrome/browser/extensions/user_script_master.h"
[email protected]a9afddb2009-02-12 17:49:4221#include "chrome/browser/history/history.h"
[email protected]3bf335a2009-06-26 20:46:0622#include "chrome/browser/in_process_webkit/webkit_context.h"
[email protected]6ab9b202008-12-23 22:34:5023#include "chrome/browser/net/chrome_url_request_context.h"
[email protected]e69d33952009-06-03 22:00:4124#include "chrome/browser/password_manager/password_store_default.h"
[email protected]eaadd9052009-06-23 18:02:2325#include "chrome/browser/privacy_blacklist/blacklist.h"
initial.commit09911bf2008-07-26 23:55:2926#include "chrome/browser/profile_manager.h"
[email protected]8c8657d62009-01-16 18:31:2627#include "chrome/browser/renderer_host/render_process_host.h"
[email protected]1132436e2009-04-08 20:06:3328#include "chrome/browser/search_engines/template_url_fetcher.h"
[email protected]f63ae312009-02-04 17:58:4629#include "chrome/browser/search_engines/template_url_model.h"
[email protected]85e921fb82009-02-11 23:19:4430#include "chrome/browser/sessions/session_service.h"
[email protected]bd580a252009-02-12 01:16:3031#include "chrome/browser/sessions/tab_restore_service.h"
[email protected]f0a644292009-02-25 23:32:4732#include "chrome/browser/spellchecker.h"
[email protected]1132436e2009-04-08 20:06:3333#include "chrome/browser/ssl/ssl_host_state.h"
[email protected]449478302009-06-09 20:04:2834#include "chrome/browser/thumbnail_store.h"
initial.commit09911bf2008-07-26 23:55:2935#include "chrome/browser/visitedlink_master.h"
36#include "chrome/browser/webdata/web_data_service.h"
37#include "chrome/common/chrome_constants.h"
38#include "chrome/common/chrome_paths.h"
39#include "chrome/common/chrome_switches.h"
[email protected]5b1a0e22009-05-26 19:00:5840#include "chrome/common/extensions/extension_error_reporter.h"
[email protected]47accfd62009-05-14 18:46:2141#include "chrome/common/net/cookie_monster_sqlite.h"
initial.commit09911bf2008-07-26 23:55:2942#include "chrome/common/notification_service.h"
43#include "chrome/common/pref_names.h"
[email protected]f7011fcb2009-01-28 21:54:3244#include "chrome/common/render_messages.h"
[email protected]f90f5c512009-02-18 19:10:5845#include "grit/locale_settings.h"
[email protected]a9cea7542009-05-20 04:30:2346#include "net/base/force_tls_state.h"
initial.commit09911bf2008-07-26 23:55:2947
[email protected]e1acf6f2008-10-27 20:43:3348using base::Time;
49using base::TimeDelta;
50
[email protected]e5642992009-06-26 23:06:3151namespace {
52
initial.commit09911bf2008-07-26 23:55:2953// Delay, in milliseconds, before we explicitly create the SessionService.
54static const int kCreateSessionServiceDelayMS = 500;
55
[email protected]e5642992009-06-26 23:06:3156enum ContextType {
57 kNormalContext,
58 kMediaContext
59};
60
61// Gets the cache parameters from the command line. |type| is the type of
62// request context that we need, |cache_path| will be set to the user provided
63// path, or will not be touched if there is not an argument. |max_size| will
64// be the user provided value or zero by default.
65void GetCacheParameters(ContextType type, FilePath* cache_path,
66 int* max_size) {
67 DCHECK(cache_path);
68 DCHECK(max_size);
69
70 // Override the cache location if specified by the user.
71 std::wstring user_path(CommandLine::ForCurrentProcess()->GetSwitchValue(
72 switches::kDiskCacheDir));
73
74 if (!user_path.empty()) {
75 *cache_path = FilePath::FromWStringHack(user_path);
76 }
77
78 const wchar_t* arg = kNormalContext == type ? switches::kDiskCacheSize :
79 switches::kMediaCacheSize;
80 std::string value =
81 WideToASCII(CommandLine::ForCurrentProcess()->GetSwitchValue(arg));
82
83 // By default we let the cache determine the right size.
84 *max_size = 0;
85 if (!StringToInt(value, max_size)) {
86 *max_size = 0;
87 } else if (max_size < 0) {
88 *max_size = 0;
89 }
90}
91
92} // namespace
93
initial.commit09911bf2008-07-26 23:55:2994// A pointer to the request context for the default profile. See comments on
95// Profile::GetDefaultRequestContext.
96URLRequestContext* Profile::default_request_context_;
97
[email protected]47accfd62009-05-14 18:46:2198static void CleanupRequestContext(ChromeURLRequestContext* context) {
99 if (context) {
100 context->CleanupOnUIThread();
101
102 // Clean up request context on IO thread.
103 g_browser_process->io_thread()->message_loop()->ReleaseSoon(FROM_HERE,
104 context);
105 }
106}
107
[email protected]34cc84f2009-02-13 10:04:35108// static
initial.commit09911bf2008-07-26 23:55:29109void Profile::RegisterUserPrefs(PrefService* prefs) {
[email protected]430d3f72008-10-27 17:56:55110 prefs->RegisterBooleanPref(prefs::kSearchSuggestEnabled, true);
initial.commit09911bf2008-07-26 23:55:29111 prefs->RegisterBooleanPref(prefs::kSessionExitedCleanly, true);
112 prefs->RegisterBooleanPref(prefs::kSafeBrowsingEnabled, true);
[email protected]74c8b422009-03-11 00:34:12113 // TODO(estade): IDS_SPELLCHECK_DICTIONARY should be an ASCII string.
[email protected]e7244d82008-10-29 18:13:26114 prefs->RegisterLocalizedStringPref(prefs::kSpellCheckDictionary,
115 IDS_SPELLCHECK_DICTIONARY);
116 prefs->RegisterBooleanPref(prefs::kEnableSpellCheck, true);
[email protected]154a4332009-06-03 20:20:58117 prefs->RegisterBooleanPref(prefs::kEnableAutoSpellCorrect, true);
[email protected]f93fe782009-02-19 01:26:13118 prefs->RegisterBooleanPref(prefs::kEnableUserScripts, false);
[email protected]4a190632009-05-09 01:07:42119 prefs->RegisterStringPref(prefs::kCurrentThemeID, L"");
120 prefs->RegisterDictionaryPref(prefs::kCurrentThemeImages);
121 prefs->RegisterDictionaryPref(prefs::kCurrentThemeColors);
122 prefs->RegisterDictionaryPref(prefs::kCurrentThemeTints);
[email protected]7895ea22009-06-02 20:53:50123 prefs->RegisterDictionaryPref(prefs::kCurrentThemeDisplayProperties);
[email protected]f93fe782009-02-19 01:26:13124 prefs->RegisterBooleanPref(prefs::kEnableExtensions, false);
initial.commit09911bf2008-07-26 23:55:29125}
126
[email protected]34cc84f2009-02-13 10:04:35127// static
[email protected]f7011fcb2009-01-28 21:54:32128Profile* Profile::CreateProfile(const FilePath& path) {
initial.commit09911bf2008-07-26 23:55:29129 return new ProfileImpl(path);
130}
131
[email protected]34cc84f2009-02-13 10:04:35132// static
initial.commit09911bf2008-07-26 23:55:29133URLRequestContext* Profile::GetDefaultRequestContext() {
134 return default_request_context_;
135}
136
[email protected]e69d33952009-06-03 22:00:41137#if defined(OS_LINUX)
138// Temporarily disabled while we figure some stuff out.
139// http://code.google.com/p/chromium/issues/detail?id=12351
140// #include "chrome/browser/password_manager/password_store_gnome.h"
141// #include "chrome/browser/password_manager/password_store_kwallet.h"
142#elif defined(OS_WIN)
143#include "chrome/browser/password_manager/password_store_win.h"
[email protected]034eba52009-06-03 22:50:56144#elif defined(OS_MACOSX)
145#include "chrome/browser/keychain_mac.h"
146#include "chrome/browser/password_manager/password_store_mac.h"
[email protected]e69d33952009-06-03 22:00:41147#endif
initial.commit09911bf2008-07-26 23:55:29148
initial.commit09911bf2008-07-26 23:55:29149////////////////////////////////////////////////////////////////////////////////
150//
151// OffTheRecordProfileImpl is a profile subclass that wraps an existing profile
[email protected]4a190632009-05-09 01:07:42152// to make it suitable for the off the record mode.
initial.commit09911bf2008-07-26 23:55:29153//
154////////////////////////////////////////////////////////////////////////////////
155class OffTheRecordProfileImpl : public Profile,
156 public NotificationObserver {
157 public:
158 explicit OffTheRecordProfileImpl(Profile* real_profile)
159 : profile_(real_profile),
[email protected]47accfd62009-05-14 18:46:21160 extensions_request_context_(NULL),
initial.commit09911bf2008-07-26 23:55:29161 start_time_(Time::Now()) {
[email protected]6ab9b202008-12-23 22:34:50162 request_context_ = ChromeURLRequestContext::CreateOffTheRecord(this);
initial.commit09911bf2008-07-26 23:55:29163 request_context_->AddRef();
[email protected]481e1a42009-05-06 20:56:05164
initial.commit09911bf2008-07-26 23:55:29165 // Register for browser close notifications so we can detect when the last
166 // off-the-record window is closed, in which case we can clean our states
167 // (cookies, downloads...).
[email protected]88cf3292009-05-22 01:48:43168 registrar_.Add(this, NotificationType::BROWSER_CLOSED,
169 NotificationService::AllSources());
initial.commit09911bf2008-07-26 23:55:29170 }
171
172 virtual ~OffTheRecordProfileImpl() {
[email protected]47accfd62009-05-14 18:46:21173 CleanupRequestContext(request_context_);
[email protected]47accfd62009-05-14 18:46:21174 CleanupRequestContext(extensions_request_context_);
initial.commit09911bf2008-07-26 23:55:29175 }
176
[email protected]f7011fcb2009-01-28 21:54:32177 virtual FilePath GetPath() { return profile_->GetPath(); }
initial.commit09911bf2008-07-26 23:55:29178
179 virtual bool IsOffTheRecord() {
180 return true;
181 }
182
183 virtual Profile* GetOffTheRecordProfile() {
184 return this;
185 }
186
[email protected]860f55492009-03-27 19:50:59187 virtual void DestroyOffTheRecordProfile() {
188 // Suicide is bad!
189 NOTREACHED();
190 }
191
initial.commit09911bf2008-07-26 23:55:29192 virtual Profile* GetOriginalProfile() {
193 return profile_;
194 }
195
196 virtual VisitedLinkMaster* GetVisitedLinkMaster() {
[email protected]7fb6c862009-03-13 02:51:49197 // We don't provide access to the VisitedLinkMaster when we're OffTheRecord
198 // because we don't want to leak the sites that the user has visited before.
199 return NULL;
initial.commit09911bf2008-07-26 23:55:29200 }
201
[email protected]6014d672008-12-05 00:38:25202 virtual ExtensionsService* GetExtensionsService() {
[email protected]1bd54132009-06-11 00:05:34203 return NULL;
[email protected]6014d672008-12-05 00:38:25204 }
205
[email protected]0938d3c2009-01-09 20:37:35206 virtual UserScriptMaster* GetUserScriptMaster() {
207 return profile_->GetUserScriptMaster();
[email protected]04fba9a92008-10-28 17:25:25208 }
209
[email protected]481e1a42009-05-06 20:56:05210 virtual ExtensionProcessManager* GetExtensionProcessManager() {
[email protected]1bd54132009-06-11 00:05:34211 return NULL;
[email protected]481e1a42009-05-06 20:56:05212 }
213
[email protected]34cc84f2009-02-13 10:04:35214 virtual SSLHostState* GetSSLHostState() {
215 if (!ssl_host_state_.get())
216 ssl_host_state_.reset(new SSLHostState());
217
218 DCHECK(ssl_host_state_->CalledOnValidThread());
219 return ssl_host_state_.get();
220 }
221
[email protected]a9cea7542009-05-20 04:30:23222 virtual net::ForceTLSState* GetForceTLSState() {
223 if (!force_tls_state_.get())
224 force_tls_state_.reset(new net::ForceTLSState());
225
226 return force_tls_state_.get();
227 }
228
initial.commit09911bf2008-07-26 23:55:29229 virtual HistoryService* GetHistoryService(ServiceAccessType sat) {
230 if (sat == EXPLICIT_ACCESS) {
231 return profile_->GetHistoryService(sat);
232 } else {
233 NOTREACHED() << "This profile is OffTheRecord";
234 return NULL;
235 }
236 }
237
initial.commit09911bf2008-07-26 23:55:29238 virtual WebDataService* GetWebDataService(ServiceAccessType sat) {
239 if (sat == EXPLICIT_ACCESS) {
240 return profile_->GetWebDataService(sat);
241 } else {
242 NOTREACHED() << "This profile is OffTheRecord";
243 return NULL;
244 }
245 }
246
[email protected]e69d33952009-06-03 22:00:41247 virtual PasswordStore* GetPasswordStore(ServiceAccessType sat) {
248 if (sat == EXPLICIT_ACCESS) {
249 return profile_->GetPasswordStore(sat);
250 } else {
251 NOTREACHED() << "This profile is OffTheRecord";
252 return NULL;
253 }
254 }
255
initial.commit09911bf2008-07-26 23:55:29256 virtual PrefService* GetPrefs() {
257 return profile_->GetPrefs();
258 }
259
260 virtual TemplateURLModel* GetTemplateURLModel() {
261 return profile_->GetTemplateURLModel();
262 }
263
264 virtual TemplateURLFetcher* GetTemplateURLFetcher() {
265 return profile_->GetTemplateURLFetcher();
266 }
267
268 virtual DownloadManager* GetDownloadManager() {
269 if (!download_manager_.get()) {
270 scoped_refptr<DownloadManager> dlm(new DownloadManager);
271 dlm->Init(this);
272 download_manager_.swap(dlm);
273 }
274 return download_manager_.get();
275 }
276
277 virtual bool HasCreatedDownloadManager() const {
278 return (download_manager_.get() != NULL);
279 }
280
[email protected]4a190632009-05-09 01:07:42281 virtual void InitThemes() {
282 GetOriginalProfile()->InitThemes();
283 }
284
285 virtual void SetTheme(Extension* extension) {
286 GetOriginalProfile()->SetTheme(extension);
287 }
288
289 virtual void ClearTheme() {
290 GetOriginalProfile()->ClearTheme();
291 }
292
293 virtual ThemeProvider* GetThemeProvider() {
294 return GetOriginalProfile()->GetThemeProvider();
295 }
296
initial.commit09911bf2008-07-26 23:55:29297 virtual URLRequestContext* GetRequestContext() {
298 return request_context_;
299 }
300
[email protected]e7f29642009-03-02 22:53:18301 virtual URLRequestContext* GetRequestContextForMedia() {
[email protected]d14c7ac2009-05-29 20:38:11302 // In OTR mode, media request context is the same as the original one.
303 return request_context_;
[email protected]e7f29642009-03-02 22:53:18304 }
305
[email protected]47accfd62009-05-14 18:46:21306 URLRequestContext* GetRequestContextForExtensions() {
307 if (!extensions_request_context_) {
308 extensions_request_context_ =
309 ChromeURLRequestContext::CreateOffTheRecordForExtensions(this);
310 extensions_request_context_->AddRef();
311
312 DCHECK(extensions_request_context_->cookie_store());
313 }
314
315 return extensions_request_context_;
316 }
317
[email protected]eaadd9052009-06-23 18:02:23318 virtual Blacklist* GetBlacklist() {
319 return GetOriginalProfile()->GetBlacklist();
320 }
321
initial.commit09911bf2008-07-26 23:55:29322 virtual SessionService* GetSessionService() {
323 // Don't save any sessions when off the record.
324 return NULL;
325 }
326
327 virtual void ShutdownSessionService() {
328 // We don't allow a session service, nothing to do.
329 }
330
331 virtual bool HasSessionService() const {
332 // We never have a session service.
333 return false;
334 }
335
336 virtual std::wstring GetName() {
337 return profile_->GetName();
338 }
339
340 virtual void SetName(const std::wstring& name) {
341 profile_->SetName(name);
342 }
343
344 virtual std::wstring GetID() {
345 return profile_->GetID();
346 }
347
348 virtual void SetID(const std::wstring& id) {
349 profile_->SetID(id);
350 }
351
initial.commit09911bf2008-07-26 23:55:29352 virtual bool DidLastSessionExitCleanly() {
353 return profile_->DidLastSessionExitCleanly();
354 }
355
[email protected]d8e41ed2008-09-11 15:22:32356 virtual BookmarkModel* GetBookmarkModel() {
357 return profile_->GetBookmarkModel();
initial.commit09911bf2008-07-26 23:55:29358 }
359
[email protected]3a453fa2008-08-15 18:46:34360#ifdef CHROME_PERSONALIZATION
[email protected]57d3d0a2008-09-24 00:50:07361 virtual ProfilePersonalization* GetProfilePersonalization() {
[email protected]3a453fa2008-08-15 18:46:34362 return profile_->GetProfilePersonalization();
363 }
364#endif
365
initial.commit09911bf2008-07-26 23:55:29366 virtual bool IsSameProfile(Profile* profile) {
367 if (profile == static_cast<Profile*>(this))
368 return true;
369 return profile == profile_;
370 }
371
372 virtual Time GetStartTime() const {
373 return start_time_;
374 }
375
376 virtual TabRestoreService* GetTabRestoreService() {
377 return NULL;
378 }
379
[email protected]e7244d82008-10-29 18:13:26380 virtual void ResetTabRestoreService() {
[email protected]20930852008-10-15 19:30:41381 }
382
[email protected]e7244d82008-10-29 18:13:26383 virtual void ReinitializeSpellChecker() {
384 profile_->ReinitializeSpellChecker();
initial.commit09911bf2008-07-26 23:55:29385 }
386
387 virtual SpellChecker* GetSpellChecker() {
388 return profile_->GetSpellChecker();
389 }
390
[email protected]3bf335a2009-06-26 20:46:06391 virtual WebKitContext* GetWebKitContext() {
392 if (!webkit_context_.get())
393 webkit_context_ = new WebKitContext(GetPath(), true);
394 DCHECK(webkit_context_.get());
395 return webkit_context_.get();
396}
397
[email protected]449478302009-06-09 20:04:28398 virtual ThumbnailStore* GetThumbnailStore() {
399 return NULL;
400 }
401
initial.commit09911bf2008-07-26 23:55:29402 virtual void MarkAsCleanShutdown() {
403 }
404
[email protected]bdbc87c2009-01-25 05:08:54405 virtual void InitExtensions() {
406 NOTREACHED();
407 }
408
[email protected]ea0c98cf2009-06-18 23:02:54409 virtual void InitWebResources() {
410 NOTREACHED();
411 }
412
initial.commit09911bf2008-07-26 23:55:29413 virtual void ExitedOffTheRecordMode() {
414 // Drop our download manager so we forget about all the downloads made
415 // in off-the-record mode.
416 download_manager_ = NULL;
417 }
418
419 virtual void Observe(NotificationType type,
420 const NotificationSource& source,
421 const NotificationDetails& details) {
[email protected]bfd04a62009-02-01 18:16:56422 DCHECK_EQ(NotificationType::BROWSER_CLOSED, type.value);
initial.commit09911bf2008-07-26 23:55:29423 // We are only interested in OTR browser closing.
424 if (Source<Browser>(source)->profile() != this)
425 return;
426
427 // Let's check if we still have an Off The Record window opened.
428 // Note that we check against 1 as this notification is sent before the
429 // browser window is actually removed from the list.
430 if (BrowserList::GetBrowserCount(this) <= 1)
431 ExitedOffTheRecordMode();
432 }
433
434 private:
[email protected]88cf3292009-05-22 01:48:43435 NotificationRegistrar registrar_;
436
initial.commit09911bf2008-07-26 23:55:29437 // The real underlying profile.
438 Profile* profile_;
439
[email protected]6ab9b202008-12-23 22:34:50440 // The context to use for requests made from this OTR session.
441 ChromeURLRequestContext* request_context_;
initial.commit09911bf2008-07-26 23:55:29442
[email protected]47accfd62009-05-14 18:46:21443 ChromeURLRequestContext* extensions_request_context_;
444
initial.commit09911bf2008-07-26 23:55:29445 // The download manager that only stores downloaded items in memory.
446 scoped_refptr<DownloadManager> download_manager_;
447
[email protected]4a190632009-05-09 01:07:42448 scoped_refptr<BrowserThemeProvider> theme_provider_;
449
[email protected]3bf335a2009-06-26 20:46:06450 // Use a special WebKit context for OTR browsing.
451 scoped_refptr<WebKitContext> webkit_context_;
452
[email protected]34cc84f2009-02-13 10:04:35453 // We don't want SSLHostState from the OTR profile to leak back to the main
454 // profile because then the main profile would learn some of the host names
455 // the user visited while OTR.
456 scoped_ptr<SSLHostState> ssl_host_state_;
457
[email protected]a9cea7542009-05-20 04:30:23458 // The ForceTLSState that only stores enabled sites in memory.
459 scoped_ptr<net::ForceTLSState> force_tls_state_;
460
initial.commit09911bf2008-07-26 23:55:29461 // Time we were started.
462 Time start_time_;
463
464 DISALLOW_EVIL_CONSTRUCTORS(OffTheRecordProfileImpl);
465};
466
[email protected]f7011fcb2009-01-28 21:54:32467ProfileImpl::ProfileImpl(const FilePath& path)
initial.commit09911bf2008-07-26 23:55:29468 : path_(path),
[email protected]f7011fcb2009-01-28 21:54:32469 request_context_(NULL),
[email protected]363347b2009-03-13 20:06:57470 media_request_context_(NULL),
[email protected]47accfd62009-05-14 18:46:21471 extensions_request_context_(NULL),
[email protected]eaadd9052009-06-23 18:02:23472 blacklist_(NULL),
[email protected]f7011fcb2009-01-28 21:54:32473 history_service_created_(false),
474 created_web_data_service_(false),
[email protected]e69d33952009-06-03 22:00:41475 created_password_store_(false),
[email protected]f7011fcb2009-01-28 21:54:32476 created_download_manager_(false),
[email protected]4a190632009-05-09 01:07:42477 created_theme_provider_(false),
[email protected]f7011fcb2009-01-28 21:54:32478 start_time_(Time::Now()),
479 spellchecker_(NULL),
initial.commit09911bf2008-07-26 23:55:29480 shutdown_session_service_(false) {
481 DCHECK(!path.empty()) << "Using an empty path will attempt to write " <<
482 "profile files to the root directory!";
[email protected]2d316662008-09-03 18:18:14483 create_session_service_timer_.Start(
484 TimeDelta::FromMilliseconds(kCreateSessionServiceDelayMS), this,
485 &ProfileImpl::EnsureSessionServiceCreated);
[email protected]bdbc87c2009-01-25 05:08:54486
[email protected]382a0702009-06-26 17:12:27487 extension_process_manager_.reset(new ExtensionProcessManager(this));
488
[email protected]e7244d82008-10-29 18:13:26489 PrefService* prefs = GetPrefs();
490 prefs->AddPrefObserver(prefs::kSpellCheckDictionary, this);
491 prefs->AddPrefObserver(prefs::kEnableSpellCheck, this);
[email protected]154a4332009-06-03 20:20:58492 prefs->AddPrefObserver(prefs::kEnableAutoSpellCorrect, this);
[email protected]380ab462009-04-24 01:23:58493
494#ifdef CHROME_PERSONALIZATION
495 if (!CommandLine::ForCurrentProcess()->HasSwitch(switches::kDisableP13n))
496 personalization_.reset(Personalization::CreateProfilePersonalization(this));
497#endif
498
[email protected]eaadd9052009-06-23 18:02:23499 if (CommandLine::ForCurrentProcess()->
500 HasSwitch(switches::kPrivacyBlacklist)) {
501 std::wstring option = CommandLine::ForCurrentProcess()->GetSwitchValue(
502 switches::kPrivacyBlacklist);
503#if defined(OS_POSIX)
504 FilePath path(WideToUTF8(option));
505#else
506 FilePath path(option);
507#endif
508 blacklist_ = new Blacklist(path);
509 }
510
[email protected]1351b6a2009-04-09 20:13:22511#if defined(OS_LINUX)
512 // TODO(port): Remove ifdef when the Linux splash page is not needed.
513 prefs->transient()->SetString(prefs::kHomePage, "about:linux-splash");
514 prefs->transient()->SetBoolean(prefs::kHomePageIsNewTabPage, false);
515#endif
[email protected]4a190632009-05-09 01:07:42516
517 // Listen for theme installation.
[email protected]88cf3292009-05-22 01:48:43518 registrar_.Add(this, NotificationType::THEME_INSTALLED,
519 NotificationService::AllSources());
initial.commit09911bf2008-07-26 23:55:29520}
521
[email protected]bdbc87c2009-01-25 05:08:54522void ProfileImpl::InitExtensions() {
[email protected]8c756ac2009-01-30 23:36:41523 if (user_script_master_ || extensions_service_)
524 return; // Already initialized.
525
[email protected]bdbc87c2009-01-25 05:08:54526 const CommandLine* command_line = CommandLine::ForCurrentProcess();
[email protected]f93fe782009-02-19 01:26:13527 PrefService* prefs = GetPrefs();
[email protected]bdbc87c2009-01-25 05:08:54528 bool user_scripts_enabled =
[email protected]f0a51fb52009-03-05 12:46:38529 command_line->HasSwitch(switches::kEnableUserScripts) ||
[email protected]f93fe782009-02-19 01:26:13530 prefs->GetBoolean(prefs::kEnableUserScripts);
[email protected]bdbc87c2009-01-25 05:08:54531
[email protected]f7011fcb2009-01-28 21:54:32532 FilePath script_dir;
[email protected]bdbc87c2009-01-25 05:08:54533 if (user_scripts_enabled) {
[email protected]0cd957b2009-03-06 20:13:23534 if (command_line->HasSwitch(switches::kUserScriptsDir)) {
535 std::wstring path_string =
536 command_line->GetSwitchValue(switches::kUserScriptsDir);
537 script_dir = FilePath::FromWStringHack(path_string);
538 } else {
539 script_dir = GetPath();
540 script_dir = script_dir.Append(chrome::kUserScriptsDirname);
541 }
[email protected]bdbc87c2009-01-25 05:08:54542 }
543
[email protected]bb28e062009-02-27 17:19:18544 ExtensionErrorReporter::Init(true); // allow noisy errors.
[email protected]bdbc87c2009-01-25 05:08:54545 user_script_master_ = new UserScriptMaster(
[email protected]9197f3b2009-06-02 00:49:27546 g_browser_process->file_thread()->message_loop(),
547 script_dir);
[email protected]894bb502009-05-21 22:39:57548 extensions_service_ = new ExtensionsService(
[email protected]a9b00ac2009-06-25 21:03:23549 this,
550 CommandLine::ForCurrentProcess(),
551 GetPrefs(),
552 GetPath().AppendASCII(ExtensionsService::kInstallDirectoryName),
553 MessageLoop::current(),
[email protected]a1257b12009-06-12 02:51:34554 g_browser_process->file_thread()->message_loop());
[email protected]bdbc87c2009-01-25 05:08:54555
[email protected]9197f3b2009-06-02 00:49:27556 extensions_service_->Init();
[email protected]bdbc87c2009-01-25 05:08:54557}
558
[email protected]ea0c98cf2009-06-18 23:02:54559void ProfileImpl::InitWebResources() {
560 web_resource_service_ = new WebResourceService(
561 this,
562 g_browser_process->file_thread()->message_loop());
563
564 web_resource_service_->StartAfterDelay();
565}
566
initial.commit09911bf2008-07-26 23:55:29567ProfileImpl::~ProfileImpl() {
[email protected]169627b2008-12-06 19:30:19568 tab_restore_service_ = NULL;
initial.commit09911bf2008-07-26 23:55:29569
570 StopCreateSessionServiceTimer();
571 // TemplateURLModel schedules a task on the WebDataService from its
572 // destructor. Delete it first to ensure the task gets scheduled before we
573 // shut down the database.
574 template_url_model_.reset();
575
576 // The download manager queries the history system and should be deleted
577 // before the history is shutdown so it can properly cancel all requests.
578 download_manager_ = NULL;
579
[email protected]4a190632009-05-09 01:07:42580 // The theme provider provides bitmaps to whoever wants them.
581 theme_provider_ = NULL;
582
[email protected]e7244d82008-10-29 18:13:26583 // Remove pref observers.
584 PrefService* prefs = GetPrefs();
585 prefs->RemovePrefObserver(prefs::kSpellCheckDictionary, this);
586 prefs->RemovePrefObserver(prefs::kEnableSpellCheck, this);
[email protected]154a4332009-06-03 20:20:58587 prefs->RemovePrefObserver(prefs::kEnableAutoSpellCorrect, this);
[email protected]e7244d82008-10-29 18:13:26588
[email protected]3a453fa2008-08-15 18:46:34589#ifdef CHROME_PERSONALIZATION
[email protected]57d3d0a2008-09-24 00:50:07590 personalization_.reset();
[email protected]3a453fa2008-08-15 18:46:34591#endif
592
initial.commit09911bf2008-07-26 23:55:29593 // Both HistoryService and WebDataService maintain threads for background
594 // processing. Its possible each thread still has tasks on it that have
595 // increased the ref count of the service. In such a situation, when we
596 // decrement the refcount, it won't be 0, and the threads/databases aren't
597 // properly shut down. By explicitly calling Cleanup/Shutdown we ensure the
598 // databases are properly closed.
599 if (web_data_service_.get())
600 web_data_service_->Shutdown();
601
602 if (history_service_.get())
603 history_service_->Cleanup();
604
605 // The I/O thread may be NULL during testing.
[email protected]ab820df2008-08-26 05:55:10606 base::Thread* io_thread = g_browser_process->io_thread();
initial.commit09911bf2008-07-26 23:55:29607
608 if (spellchecker_) {
609 // The spellchecker must be deleted on the I/O thread. During testing, we
610 // don't have an I/O thread.
611 if (io_thread)
612 io_thread->message_loop()->ReleaseSoon(FROM_HERE, spellchecker_);
613 else
614 spellchecker_->Release();
615 }
616
[email protected]47accfd62009-05-14 18:46:21617 if (default_request_context_ == request_context_)
618 default_request_context_ = NULL;
[email protected]6ab9b202008-12-23 22:34:50619
[email protected]47accfd62009-05-14 18:46:21620 CleanupRequestContext(request_context_);
621 CleanupRequestContext(media_request_context_);
622 CleanupRequestContext(extensions_request_context_);
[email protected]1e744f22009-04-08 01:00:17623
[email protected]eaadd9052009-06-23 18:02:23624 // When the request contexts are gone, the blacklist wont be needed anymore.
625 delete blacklist_;
626 blacklist_ = 0;
627
[email protected]d8e41ed2008-09-11 15:22:32628 // HistoryService may call into the BookmarkModel, as such we need to
629 // delete HistoryService before the BookmarkModel. The destructor for
[email protected]90ef13132008-08-27 03:27:46630 // HistoryService will join with HistoryService's backend thread so that
631 // by the time the destructor has finished we're sure it will no longer call
[email protected]d8e41ed2008-09-11 15:22:32632 // into the BookmarkModel.
[email protected]90ef13132008-08-27 03:27:46633 history_service_ = NULL;
634 bookmark_bar_model_.reset();
635
initial.commit09911bf2008-07-26 23:55:29636 MarkAsCleanShutdown();
637}
638
[email protected]f7011fcb2009-01-28 21:54:32639FilePath ProfileImpl::GetPath() {
initial.commit09911bf2008-07-26 23:55:29640 return path_;
641}
642
643bool ProfileImpl::IsOffTheRecord() {
644 return false;
645}
646
647Profile* ProfileImpl::GetOffTheRecordProfile() {
648 if (!off_the_record_profile_.get()) {
649 scoped_ptr<OffTheRecordProfileImpl> p(new OffTheRecordProfileImpl(this));
650 off_the_record_profile_.swap(p);
651 }
652 return off_the_record_profile_.get();
653}
654
[email protected]860f55492009-03-27 19:50:59655void ProfileImpl::DestroyOffTheRecordProfile() {
656 off_the_record_profile_.reset();
657}
658
initial.commit09911bf2008-07-26 23:55:29659Profile* ProfileImpl::GetOriginalProfile() {
660 return this;
661}
662
[email protected]176aa482008-11-14 03:25:15663static void BroadcastNewHistoryTable(base::SharedMemory* table_memory) {
initial.commit09911bf2008-07-26 23:55:29664 if (!table_memory)
665 return;
666
667 // send to all RenderProcessHosts
668 for (RenderProcessHost::iterator i = RenderProcessHost::begin();
669 i != RenderProcessHost::end(); i++) {
670 if (!i->second->channel())
671 continue;
672
[email protected]176aa482008-11-14 03:25:15673 base::SharedMemoryHandle new_table;
[email protected]f7011fcb2009-01-28 21:54:32674 base::ProcessHandle process = i->second->process().handle();
initial.commit09911bf2008-07-26 23:55:29675 if (!process) {
676 // process can be null if it's started with the --single-process flag.
[email protected]f7011fcb2009-01-28 21:54:32677 process = base::Process::Current().handle();
initial.commit09911bf2008-07-26 23:55:29678 }
679
680 table_memory->ShareToProcess(process, &new_table);
681 IPC::Message* msg = new ViewMsg_VisitedLink_NewTable(new_table);
682 i->second->channel()->Send(msg);
683 }
684}
685
686VisitedLinkMaster* ProfileImpl::GetVisitedLinkMaster() {
687 if (!visited_link_master_.get()) {
688 scoped_ptr<VisitedLinkMaster> visited_links(
689 new VisitedLinkMaster(g_browser_process->file_thread(),
690 BroadcastNewHistoryTable, this));
691 if (!visited_links->Init())
692 return NULL;
693 visited_link_master_.swap(visited_links);
694 }
695
696 return visited_link_master_.get();
697}
698
[email protected]6014d672008-12-05 00:38:25699ExtensionsService* ProfileImpl::GetExtensionsService() {
700 return extensions_service_.get();
701}
702
[email protected]0938d3c2009-01-09 20:37:35703UserScriptMaster* ProfileImpl::GetUserScriptMaster() {
[email protected]0938d3c2009-01-09 20:37:35704 return user_script_master_.get();
[email protected]04fba9a92008-10-28 17:25:25705}
706
[email protected]481e1a42009-05-06 20:56:05707ExtensionProcessManager* ProfileImpl::GetExtensionProcessManager() {
[email protected]382a0702009-06-26 17:12:27708 return extension_process_manager_.get();
[email protected]481e1a42009-05-06 20:56:05709}
710
[email protected]34cc84f2009-02-13 10:04:35711SSLHostState* ProfileImpl::GetSSLHostState() {
712 if (!ssl_host_state_.get())
713 ssl_host_state_.reset(new SSLHostState());
714
715 DCHECK(ssl_host_state_->CalledOnValidThread());
716 return ssl_host_state_.get();
717}
718
[email protected]a9cea7542009-05-20 04:30:23719net::ForceTLSState* ProfileImpl::GetForceTLSState() {
720 if (!force_tls_state_.get())
721 force_tls_state_.reset(new net::ForceTLSState());
722
723 return force_tls_state_.get();
724}
725
initial.commit09911bf2008-07-26 23:55:29726PrefService* ProfileImpl::GetPrefs() {
727 if (!prefs_.get()) {
[email protected]6faa0e0d2009-04-28 06:50:36728 prefs_.reset(new PrefService(GetPrefFilePath(),
729 g_browser_process->file_thread()));
initial.commit09911bf2008-07-26 23:55:29730
731 // The Profile class and ProfileManager class may read some prefs so
732 // register known prefs as soon as possible.
733 Profile::RegisterUserPrefs(prefs_.get());
734 ProfileManager::RegisterUserPrefs(prefs_.get());
735
736 // The last session exited cleanly if there is no pref for
737 // kSessionExitedCleanly or the value for kSessionExitedCleanly is true.
738 last_session_exited_cleanly_ =
739 prefs_->GetBoolean(prefs::kSessionExitedCleanly);
740 // Mark the session as open.
741 prefs_->SetBoolean(prefs::kSessionExitedCleanly, false);
742 // Make sure we save to disk that the session has opened.
[email protected]6faa0e0d2009-04-28 06:50:36743 prefs_->ScheduleSavePersistentPrefs();
initial.commit09911bf2008-07-26 23:55:29744 }
745
746 return prefs_.get();
747}
748
[email protected]f7011fcb2009-01-28 21:54:32749FilePath ProfileImpl::GetPrefFilePath() {
750 FilePath pref_file_path = path_;
751 pref_file_path = pref_file_path.Append(chrome::kPreferencesFilename);
initial.commit09911bf2008-07-26 23:55:29752 return pref_file_path;
753}
754
755URLRequestContext* ProfileImpl::GetRequestContext() {
756 if (!request_context_) {
[email protected]f7011fcb2009-01-28 21:54:32757 FilePath cookie_path = GetPath();
758 cookie_path = cookie_path.Append(chrome::kCookieFilename);
759 FilePath cache_path = GetPath();
[email protected]e5642992009-06-26 23:06:31760 int max_size;
761 GetCacheParameters(kNormalContext, &cache_path, &max_size);
[email protected]2b2830a2009-02-07 01:58:42762
[email protected]f7011fcb2009-01-28 21:54:32763 cache_path = cache_path.Append(chrome::kCacheDirname);
[email protected]6ab9b202008-12-23 22:34:50764 request_context_ = ChromeURLRequestContext::CreateOriginal(
[email protected]e5642992009-06-26 23:06:31765 this, cookie_path, cache_path, max_size);
initial.commit09911bf2008-07-26 23:55:29766 request_context_->AddRef();
767
[email protected]6ab9b202008-12-23 22:34:50768 // The first request context is always a normal (non-OTR) request context.
769 // Even when Chromium is started in OTR mode, a normal profile is always
770 // created first.
771 if (!default_request_context_) {
772 default_request_context_ = request_context_;
773 NotificationService::current()->Notify(
[email protected]bfd04a62009-02-01 18:16:56774 NotificationType::DEFAULT_REQUEST_CONTEXT_AVAILABLE,
[email protected]6ab9b202008-12-23 22:34:50775 NotificationService::AllSources(), NotificationService::NoDetails());
776 }
777
initial.commit09911bf2008-07-26 23:55:29778 DCHECK(request_context_->cookie_store());
779 }
780
781 return request_context_;
782}
783
[email protected]e7f29642009-03-02 22:53:18784URLRequestContext* ProfileImpl::GetRequestContextForMedia() {
785 if (!media_request_context_) {
786 FilePath cache_path = GetPath();
[email protected]e5642992009-06-26 23:06:31787 int max_size;
788 GetCacheParameters(kMediaContext, &cache_path, &max_size);
[email protected]e3edeba2009-03-23 18:57:14789
[email protected]4e7b5dbb2009-03-25 00:09:23790 cache_path = cache_path.Append(chrome::kMediaCacheDirname);
[email protected]e7f29642009-03-02 22:53:18791 media_request_context_ = ChromeURLRequestContext::CreateOriginalForMedia(
[email protected]e5642992009-06-26 23:06:31792 this, cache_path, max_size);
[email protected]e7f29642009-03-02 22:53:18793 media_request_context_->AddRef();
794
795 DCHECK(media_request_context_->cookie_store());
796 }
797
798 return media_request_context_;
799}
800
[email protected]47accfd62009-05-14 18:46:21801URLRequestContext* ProfileImpl::GetRequestContextForExtensions() {
802 if (!extensions_request_context_) {
803 FilePath cookie_path = GetPath();
804 cookie_path = cookie_path.Append(chrome::kExtensionsCookieFilename);
805
806 extensions_request_context_ =
807 ChromeURLRequestContext::CreateOriginalForExtensions(this, cookie_path);
808 extensions_request_context_->AddRef();
809
810 DCHECK(extensions_request_context_->cookie_store());
811 }
812
813 return extensions_request_context_;
814}
815
[email protected]eaadd9052009-06-23 18:02:23816Blacklist* ProfileImpl::GetBlacklist() {
817 return blacklist_;
818}
819
initial.commit09911bf2008-07-26 23:55:29820HistoryService* ProfileImpl::GetHistoryService(ServiceAccessType sat) {
821 if (!history_service_created_) {
[email protected]90ef13132008-08-27 03:27:46822 history_service_created_ = true;
initial.commit09911bf2008-07-26 23:55:29823 scoped_refptr<HistoryService> history(new HistoryService(this));
[email protected]d8e41ed2008-09-11 15:22:32824 if (!history->Init(GetPath(), GetBookmarkModel()))
initial.commit09911bf2008-07-26 23:55:29825 return NULL;
826 history_service_.swap(history);
initial.commit09911bf2008-07-26 23:55:29827
828 // Send out the notification that the history service was created.
829 NotificationService::current()->
[email protected]bfd04a62009-02-01 18:16:56830 Notify(NotificationType::HISTORY_CREATED, Source<Profile>(this),
initial.commit09911bf2008-07-26 23:55:29831 Details<HistoryService>(history_service_.get()));
832 }
833 return history_service_.get();
834}
835
initial.commit09911bf2008-07-26 23:55:29836TemplateURLModel* ProfileImpl::GetTemplateURLModel() {
837 if (!template_url_model_.get())
838 template_url_model_.reset(new TemplateURLModel(this));
839 return template_url_model_.get();
840}
841
842TemplateURLFetcher* ProfileImpl::GetTemplateURLFetcher() {
843 if (!template_url_fetcher_.get())
844 template_url_fetcher_.reset(new TemplateURLFetcher(this));
845 return template_url_fetcher_.get();
846}
847
848WebDataService* ProfileImpl::GetWebDataService(ServiceAccessType sat) {
849 if (!created_web_data_service_)
850 CreateWebDataService();
851 return web_data_service_.get();
852}
853
854void ProfileImpl::CreateWebDataService() {
855 DCHECK(!created_web_data_service_ && web_data_service_.get() == NULL);
856 created_web_data_service_ = true;
857 scoped_refptr<WebDataService> wds(new WebDataService());
858 if (!wds->Init(GetPath()))
859 return;
860 web_data_service_.swap(wds);
861}
862
[email protected]e69d33952009-06-03 22:00:41863PasswordStore* ProfileImpl::GetPasswordStore(ServiceAccessType sat) {
864 if (!created_password_store_)
865 CreatePasswordStore();
866 return password_store_.get();
867}
868
869void ProfileImpl::CreatePasswordStore() {
870 DCHECK(!created_password_store_ && password_store_.get() == NULL);
871 created_password_store_ = true;
872 scoped_refptr<PasswordStore> ps;
873#if defined(OS_LINUX)
874// Temporarily disabled while we figure some stuff out.
875// http://code.google.com/p/chromium/issues/detail?id=12351
876// if (getenv("KDE_FULL_SESSION")) {
877// ps = new PasswordStoreKWallet();
878// } else {
879// ps = new PasswordStoreGnome();
880// }
881 NOTIMPLEMENTED();
882#elif defined(OS_WIN)
883 ps = new PasswordStoreWin(GetWebDataService(Profile::IMPLICIT_ACCESS));
[email protected]034eba52009-06-03 22:50:56884#elif defined(OS_MACOSX)
885 ps = new PasswordStoreMac(new MacKeychain());
[email protected]e69d33952009-06-03 22:00:41886#else
887 NOTIMPLEMENTED();
888#endif
889 if (!ps || !ps->Init()) {
890 // Try falling back to the default password manager
891 LOG(WARNING) << "Could not initialise native password manager - "
892 "falling back to default";
893 ps = new PasswordStoreDefault(GetWebDataService(Profile::IMPLICIT_ACCESS));
894 if (!ps->Init())
895 return;
896 }
897 password_store_.swap(ps);
898}
899
initial.commit09911bf2008-07-26 23:55:29900DownloadManager* ProfileImpl::GetDownloadManager() {
901 if (!created_download_manager_) {
902 scoped_refptr<DownloadManager> dlm(new DownloadManager);
903 dlm->Init(this);
904 created_download_manager_ = true;
905 download_manager_.swap(dlm);
906 }
907 return download_manager_.get();
908}
909
910bool ProfileImpl::HasCreatedDownloadManager() const {
911 return created_download_manager_;
912}
913
[email protected]4a190632009-05-09 01:07:42914void ProfileImpl::InitThemes() {
915 if (!created_theme_provider_) {
916 scoped_refptr<BrowserThemeProvider> themes(new BrowserThemeProvider);
917 themes->Init(this);
918 created_theme_provider_ = true;
919 theme_provider_.swap(themes);
920 }
921}
922
923void ProfileImpl::SetTheme(Extension* extension) {
924 InitThemes();
925 theme_provider_.get()->SetTheme(extension);
926}
927
928void ProfileImpl::ClearTheme() {
929 InitThemes();
930 theme_provider_.get()->UseDefaultTheme();
931}
932
933ThemeProvider* ProfileImpl::GetThemeProvider() {
934 InitThemes();
935 return theme_provider_.get();
936}
937
initial.commit09911bf2008-07-26 23:55:29938SessionService* ProfileImpl::GetSessionService() {
939 if (!session_service_.get() && !shutdown_session_service_) {
940 session_service_ = new SessionService(this);
941 session_service_->ResetFromCurrentBrowsers();
942 }
943 return session_service_.get();
944}
945
946void ProfileImpl::ShutdownSessionService() {
947 if (shutdown_session_service_)
948 return;
949
950 // We're about to exit, force creation of the session service if it hasn't
951 // been created yet. We do this to ensure session state matches the point in
952 // time the user exited.
953 GetSessionService();
954 shutdown_session_service_ = true;
955 session_service_ = NULL;
956}
957
958bool ProfileImpl::HasSessionService() const {
959 return (session_service_.get() != NULL);
960}
961
962std::wstring ProfileImpl::GetName() {
963 return GetPrefs()->GetString(prefs::kProfileName);
964}
965void ProfileImpl::SetName(const std::wstring& name) {
966 GetPrefs()->SetString(prefs::kProfileName, name);
967}
968
969std::wstring ProfileImpl::GetID() {
970 return GetPrefs()->GetString(prefs::kProfileID);
971}
972void ProfileImpl::SetID(const std::wstring& id) {
973 GetPrefs()->SetString(prefs::kProfileID, id);
974}
975
initial.commit09911bf2008-07-26 23:55:29976bool ProfileImpl::DidLastSessionExitCleanly() {
977 // last_session_exited_cleanly_ is set when the preferences are loaded. Force
978 // it to be set by asking for the prefs.
979 GetPrefs();
980 return last_session_exited_cleanly_;
981}
982
[email protected]d8e41ed2008-09-11 15:22:32983BookmarkModel* ProfileImpl::GetBookmarkModel() {
[email protected]90ef13132008-08-27 03:27:46984 if (!bookmark_bar_model_.get()) {
[email protected]d8e41ed2008-09-11 15:22:32985 bookmark_bar_model_.reset(new BookmarkModel(this));
[email protected]90ef13132008-08-27 03:27:46986 bookmark_bar_model_->Load();
987 }
initial.commit09911bf2008-07-26 23:55:29988 return bookmark_bar_model_.get();
989}
990
991bool ProfileImpl::IsSameProfile(Profile* profile) {
992 if (profile == static_cast<Profile*>(this))
993 return true;
994 OffTheRecordProfileImpl* otr_profile = off_the_record_profile_.get();
995 return otr_profile && profile == static_cast<Profile*>(otr_profile);
996}
997
998Time ProfileImpl::GetStartTime() const {
999 return start_time_;
1000}
1001
1002TabRestoreService* ProfileImpl::GetTabRestoreService() {
1003 if (!tab_restore_service_.get())
[email protected]169627b2008-12-06 19:30:191004 tab_restore_service_ = new TabRestoreService(this);
initial.commit09911bf2008-07-26 23:55:291005 return tab_restore_service_.get();
1006}
1007
[email protected]449478302009-06-09 20:04:281008ThumbnailStore* ProfileImpl::GetThumbnailStore() {
1009 if (!thumbnail_store_.get()) {
1010 thumbnail_store_ = new ThumbnailStore;
[email protected]f2458dc2009-06-24 22:38:581011 thumbnail_store_->Init(GetPath().AppendASCII("thumbnailstore"), this);
[email protected]449478302009-06-09 20:04:281012 }
1013 return thumbnail_store_.get();
1014}
1015
initial.commit09911bf2008-07-26 23:55:291016void ProfileImpl::ResetTabRestoreService() {
[email protected]169627b2008-12-06 19:30:191017 tab_restore_service_ = NULL;
initial.commit09911bf2008-07-26 23:55:291018}
1019
[email protected]a9afddb2009-02-12 17:49:421020// To be run in the IO thread to notify all resource message filters that the
[email protected]20930852008-10-15 19:30:411021// spellchecker has changed.
1022class NotifySpellcheckerChangeTask : public Task {
1023 public:
1024 NotifySpellcheckerChangeTask(
[email protected]e7244d82008-10-29 18:13:261025 Profile* profile,
1026 const SpellcheckerReinitializedDetails& spellchecker)
[email protected]20930852008-10-15 19:30:411027 : profile_(profile),
1028 spellchecker_(spellchecker) {
1029 }
1030
1031 private:
1032 void Run(void) {
1033 NotificationService::current()->Notify(
[email protected]bfd04a62009-02-01 18:16:561034 NotificationType::SPELLCHECKER_REINITIALIZED,
[email protected]20930852008-10-15 19:30:411035 Source<Profile>(profile_),
1036 Details<SpellcheckerReinitializedDetails>(&spellchecker_));
1037 }
1038
1039 Profile* profile_;
1040 SpellcheckerReinitializedDetails spellchecker_;
1041};
1042
[email protected]e7244d82008-10-29 18:13:261043void ProfileImpl::InitializeSpellChecker(bool need_to_broadcast) {
[email protected]20930852008-10-15 19:30:411044 // The I/O thread may be NULL during testing.
1045 base::Thread* io_thread = g_browser_process->io_thread();
1046 if (spellchecker_) {
1047 // The spellchecker must be deleted on the I/O thread.
1048 // A dummy variable to aid in logical clarity.
1049 SpellChecker* last_spellchecker = spellchecker_;
1050
1051 if (io_thread)
1052 io_thread->message_loop()->ReleaseSoon(FROM_HERE, last_spellchecker);
1053 else // during testing, we don't have an I/O thread
1054 last_spellchecker->Release();
[email protected]20930852008-10-15 19:30:411055 }
1056
[email protected]20930852008-10-15 19:30:411057 // Retrieve the (perhaps updated recently) dictionary name from preferences.
1058 PrefService* prefs = GetPrefs();
[email protected]e7244d82008-10-29 18:13:261059 bool enable_spellcheck = prefs->GetBoolean(prefs::kEnableSpellCheck);
[email protected]20930852008-10-15 19:30:411060
[email protected]e7244d82008-10-29 18:13:261061 if (enable_spellcheck) {
[email protected]bd17b702009-02-25 20:44:081062 FilePath dict_dir;
[email protected]e7244d82008-10-29 18:13:261063 PathService::Get(chrome::DIR_APP_DICTIONARIES, &dict_dir);
[email protected]a9afddb2009-02-12 17:49:421064 // Note that, as the object pointed to by previously by spellchecker_
[email protected]e7244d82008-10-29 18:13:261065 // is being deleted in the io thread, the spellchecker_ can be made to point
1066 // to a new object (RE-initialized) in parallel in this UI thread.
[email protected]4b4d1adc2008-12-10 22:28:581067 spellchecker_ = new SpellChecker(dict_dir,
[email protected]74c8b422009-03-11 00:34:121068 WideToASCII(prefs->GetString(prefs::kSpellCheckDictionary)),
1069 GetRequestContext(),
[email protected]bd17b702009-02-25 20:44:081070 FilePath());
[email protected]e7244d82008-10-29 18:13:261071 spellchecker_->AddRef(); // Manual refcounting.
1072 } else {
1073 spellchecker_ = NULL;
1074 }
[email protected]20930852008-10-15 19:30:411075
[email protected]154a4332009-06-03 20:20:581076 // Set auto spell correct status for spellchecker.
1077 if (spellchecker_) {
1078 spellchecker_->EnableAutoSpellCorrect(
1079 prefs->GetBoolean(prefs::kEnableAutoSpellCorrect));
1080 }
1081
[email protected]20930852008-10-15 19:30:411082 if (need_to_broadcast && io_thread) { // Notify resource message filters.
1083 SpellcheckerReinitializedDetails scoped_spellchecker;
1084 scoped_spellchecker.spellchecker = spellchecker_;
[email protected]e7244d82008-10-29 18:13:261085 if (io_thread) {
1086 io_thread->message_loop()->PostTask(
[email protected]a9afddb2009-02-12 17:49:421087 FROM_HERE,
[email protected]e7244d82008-10-29 18:13:261088 new NotifySpellcheckerChangeTask(this, scoped_spellchecker));
1089 }
[email protected]20930852008-10-15 19:30:411090 }
1091}
1092
[email protected]e7244d82008-10-29 18:13:261093void ProfileImpl::ReinitializeSpellChecker() {
1094 InitializeSpellChecker(true);
1095}
1096
initial.commit09911bf2008-07-26 23:55:291097SpellChecker* ProfileImpl::GetSpellChecker() {
1098 if (!spellchecker_) {
[email protected]20930852008-10-15 19:30:411099 // This is where spellchecker gets initialized. Note that this is being
1100 // initialized in the ui_thread. However, this is not a problem as long as
1101 // it is *used* in the io thread.
[email protected]34cc84f2009-02-13 10:04:351102 // TODO(sidchat): One day, change everything so that spellchecker gets
[email protected]20930852008-10-15 19:30:411103 // initialized in the IO thread itself.
[email protected]e7244d82008-10-29 18:13:261104 InitializeSpellChecker(false);
initial.commit09911bf2008-07-26 23:55:291105 }
[email protected]20930852008-10-15 19:30:411106
initial.commit09911bf2008-07-26 23:55:291107 return spellchecker_;
1108}
1109
[email protected]3bf335a2009-06-26 20:46:061110WebKitContext* ProfileImpl::GetWebKitContext() {
1111 if (!webkit_context_.get())
1112 webkit_context_ = new WebKitContext(path_, false);
1113 DCHECK(webkit_context_.get());
1114 return webkit_context_.get();
1115}
1116
initial.commit09911bf2008-07-26 23:55:291117void ProfileImpl::MarkAsCleanShutdown() {
1118 if (prefs_.get()) {
1119 // The session cleanly exited, set kSessionExitedCleanly appropriately.
1120 prefs_->SetBoolean(prefs::kSessionExitedCleanly, true);
1121
1122 // NOTE: If you change what thread this writes on, be sure and update
1123 // ChromeFrame::EndSession().
[email protected]6faa0e0d2009-04-28 06:50:361124 prefs_->SavePersistentPrefs();
initial.commit09911bf2008-07-26 23:55:291125 }
1126}
1127
[email protected]e7244d82008-10-29 18:13:261128void ProfileImpl::Observe(NotificationType type,
1129 const NotificationSource& source,
1130 const NotificationDetails& details) {
[email protected]bfd04a62009-02-01 18:16:561131 if (NotificationType::PREF_CHANGED == type) {
[email protected]e7244d82008-10-29 18:13:261132 std::wstring* pref_name_in = Details<std::wstring>(details).ptr();
1133 PrefService* prefs = Source<PrefService>(source).ptr();
1134 DCHECK(pref_name_in && prefs);
1135 if (*pref_name_in == prefs::kSpellCheckDictionary ||
[email protected]154a4332009-06-03 20:20:581136 *pref_name_in == prefs::kEnableSpellCheck ||
1137 *pref_name_in == prefs::kEnableAutoSpellCorrect) {
[email protected]e7244d82008-10-29 18:13:261138 InitializeSpellChecker(true);
1139 }
[email protected]4a190632009-05-09 01:07:421140 } else if (NotificationType::THEME_INSTALLED == type) {
1141 Extension* extension = Details<Extension>(details).ptr();
1142 SetTheme(extension);
[email protected]e7244d82008-10-29 18:13:261143 }
1144}
1145
initial.commit09911bf2008-07-26 23:55:291146void ProfileImpl::StopCreateSessionServiceTimer() {
[email protected]2d316662008-09-03 18:18:141147 create_session_service_timer_.Stop();
initial.commit09911bf2008-07-26 23:55:291148}
[email protected]3a453fa2008-08-15 18:46:341149
1150#ifdef CHROME_PERSONALIZATION
[email protected]57d3d0a2008-09-24 00:50:071151ProfilePersonalization* ProfileImpl::GetProfilePersonalization() {
[email protected]57d3d0a2008-09-24 00:50:071152 return personalization_.get();
[email protected]3a453fa2008-08-15 18:46:341153}
license.botbf09a502008-08-24 00:55:551154#endif