diff options
Diffstat (limited to 'chrome/browser/profile.cc')
-rw-r--r-- | chrome/browser/profile.cc | 1670 |
1 files changed, 1670 insertions, 0 deletions
diff --git a/chrome/browser/profile.cc b/chrome/browser/profile.cc new file mode 100644 index 0000000..af54776 --- /dev/null +++ b/chrome/browser/profile.cc @@ -0,0 +1,1670 @@ +// Copyright (c) 2010 The Chromium Authors. All rights reserved. +// Use of this source code is governed by a BSD-style license that can be +// found in the LICENSE file. + +#include "chrome/browser/profile.h" + +#include "app/resource_bundle.h" +#include "app/theme_provider.h" +#include "base/command_line.h" +#include "base/env_var.h" +#include "base/file_path.h" +#include "base/file_util.h" +#include "base/path_service.h" +#include "base/scoped_ptr.h" +#include "base/string_util.h" +#include "chrome/browser/appcache/chrome_appcache_service.h" +#include "chrome/browser/autocomplete/autocomplete_classifier.h" +#include "chrome/browser/autofill/personal_data_manager.h" +#include "chrome/browser/background_contents_service.h" +#include "chrome/browser/bookmarks/bookmark_model.h" +#include "chrome/browser/browser_list.h" +#include "chrome/browser/browser_prefs.h" +#include "chrome/browser/browser_process.h" +#include "chrome/browser/browser_theme_provider.h" +#include "chrome/browser/chrome_thread.h" +#include "chrome/browser/dom_ui/ntp_resource_cache.h" +#include "chrome/browser/download/download_manager.h" +#include "chrome/browser/extensions/extension_devtools_manager.h" +#include "chrome/browser/extensions/extension_error_reporter.h" +#include "chrome/browser/extensions/extension_message_service.h" +#include "chrome/browser/extensions/extension_process_manager.h" +#include "chrome/browser/extensions/extensions_service.h" +#include "chrome/browser/extensions/user_script_master.h" +#include "chrome/browser/favicon_service.h" +#include "chrome/browser/find_bar_state.h" +#include "chrome/browser/geolocation/geolocation_content_settings_map.h" +#include "chrome/browser/geolocation/geolocation_permission_context.h" +#include "chrome/browser/spellcheck_host.h" +#include "chrome/browser/transport_security_persister.h" +#include "chrome/browser/history/history.h" +#include "chrome/browser/history/top_sites.h" +#include "chrome/browser/host_content_settings_map.h" +#include "chrome/browser/host_zoom_map.h" +#include "chrome/browser/in_process_webkit/webkit_context.h" +#include "chrome/browser/net/chrome_url_request_context.h" +#include "chrome/browser/net/gaia/token_service.h" +#include "chrome/browser/net/ssl_config_service_manager.h" +#include "chrome/browser/notifications/desktop_notification_service.h" +#include "chrome/browser/password_manager/password_store_default.h" +#include "chrome/browser/pref_value_store.h" +#include "chrome/browser/printing/cloud_print/cloud_print_proxy_service.h" +#include "chrome/browser/profile_manager.h" +#include "chrome/browser/renderer_host/render_process_host.h" +#include "chrome/browser/search_engines/template_url_fetcher.h" +#include "chrome/browser/search_engines/template_url_model.h" +#include "chrome/browser/sessions/session_service.h" +#include "chrome/browser/sessions/tab_restore_service.h" +#include "chrome/browser/ssl/ssl_host_state.h" +#include "chrome/browser/sync/profile_sync_service.h" +#include "chrome/browser/sync/profile_sync_factory_impl.h" +#include "chrome/browser/tabs/pinned_tab_service.h" +#include "chrome/browser/user_style_sheet_watcher.h" +#include "chrome/browser/visitedlink_master.h" +#include "chrome/browser/visitedlink_event_listener.h" +#include "chrome/browser/webdata/web_data_service.h" +#include "chrome/browser/web_resource/web_resource_service.h" +#include "chrome/common/chrome_constants.h" +#include "chrome/common/chrome_paths.h" +#include "chrome/common/chrome_switches.h" +#include "chrome/common/json_pref_store.h" +#include "chrome/common/notification_service.h" +#include "chrome/common/pref_names.h" +#include "chrome/common/render_messages.h" +#include "grit/browser_resources.h" +#include "grit/locale_settings.h" +#include "net/base/transport_security_state.h" +#include "webkit/database/database_tracker.h" + +#if defined(TOOLKIT_USES_GTK) +#include "chrome/browser/gtk/gtk_theme_provider.h" +#endif + +using base::Time; +using base::TimeDelta; + +namespace { + +// Delay, in milliseconds, before we explicitly create the SessionService. +static const int kCreateSessionServiceDelayMS = 500; + +enum ContextType { + kNormalContext, + kMediaContext +}; + +// Gets the cache parameters from the command line. |type| is the type of +// request context that we need, |cache_path| will be set to the user provided +// path, or will not be touched if there is not an argument. |max_size| will +// be the user provided value or zero by default. +void GetCacheParameters(ContextType type, FilePath* cache_path, + int* max_size) { + DCHECK(cache_path); + DCHECK(max_size); + + // Override the cache location if specified by the user. + std::wstring user_path(CommandLine::ForCurrentProcess()->GetSwitchValue( + switches::kDiskCacheDir)); + + if (!user_path.empty()) { + *cache_path = FilePath::FromWStringHack(user_path); + } + + const char* arg = kNormalContext == type ? switches::kDiskCacheSize : + switches::kMediaCacheSize; + std::string value = + CommandLine::ForCurrentProcess()->GetSwitchValueASCII(arg); + + // By default we let the cache determine the right size. + *max_size = 0; + if (!StringToInt(value, max_size)) { + *max_size = 0; + } else if (max_size < 0) { + *max_size = 0; + } +} + +FilePath GetCachePath(const FilePath& base) { + return base.Append(chrome::kCacheDirname); +} + +FilePath GetMediaCachePath(const FilePath& base) { + return base.Append(chrome::kMediaCacheDirname); +} + +bool HasACacheSubdir(const FilePath &dir) { + return file_util::PathExists(GetCachePath(dir)) || + file_util::PathExists(GetMediaCachePath(dir)); +} + +void PostExtensionLoadedToContextGetter(ChromeURLRequestContextGetter* getter, + Extension* extension) { + if (!getter) + return; + // Callee takes ownership of new ExtensionInfo struct. + ChromeThread::PostTask( + ChromeThread::IO, FROM_HERE, + NewRunnableMethod(getter, + &ChromeURLRequestContextGetter::OnNewExtensions, + extension->id(), + new ChromeURLRequestContext::ExtensionInfo( + extension->name(), + extension->path(), + extension->default_locale(), + extension->web_extent(), + extension->api_permissions()))); +} + +void PostExtensionUnloadedToContextGetter(ChromeURLRequestContextGetter* getter, + Extension* extension) { + if (!getter) + return; + ChromeThread::PostTask( + ChromeThread::IO, FROM_HERE, + NewRunnableMethod(getter, + &ChromeURLRequestContextGetter::OnUnloadedExtension, + extension->id())); +} + +// Returns true if the default apps should be loaded (so that the app panel is +// not empty). +bool IncludeDefaultApps() { +#if defined(OS_CHROMEOS) && defined(GOOGLE_CHROME_BUILD) + return true; +#endif + return false; +} + +// Simple task to log the size of the current profile. +class ProfileSizeTask : public Task { + public: + explicit ProfileSizeTask(const FilePath& path) : path_(path) {} + virtual ~ProfileSizeTask() {} + + virtual void Run(); + private: + FilePath path_; +}; + +void ProfileSizeTask::Run() { + int64 size = file_util::ComputeFilesSize(path_, FILE_PATH_LITERAL("*")); + int size_MB = static_cast<int>(size / (1024 * 1024)); + UMA_HISTOGRAM_COUNTS_10000("Profile.TotalSize", size_MB); + + size = file_util::ComputeFilesSize(path_, FILE_PATH_LITERAL("History")); + size_MB = static_cast<int>(size / (1024 * 1024)); + UMA_HISTOGRAM_COUNTS_10000("Profile.HistorySize", size_MB); + + size = file_util::ComputeFilesSize(path_, FILE_PATH_LITERAL("History*")); + size_MB = static_cast<int>(size / (1024 * 1024)); + UMA_HISTOGRAM_COUNTS_10000("Profile.TotalHistorySize", size_MB); + + size = file_util::ComputeFilesSize(path_, FILE_PATH_LITERAL("Cookies")); + size_MB = static_cast<int>(size / (1024 * 1024)); + UMA_HISTOGRAM_COUNTS_10000("Profile.CookiesSize", size_MB); + + size = file_util::ComputeFilesSize(path_, FILE_PATH_LITERAL("Bookmarks")); + size_MB = static_cast<int>(size / (1024 * 1024)); + UMA_HISTOGRAM_COUNTS_10000("Profile.BookmarksSize", size_MB); + + size = file_util::ComputeFilesSize(path_, FILE_PATH_LITERAL("Thumbnails")); + size_MB = static_cast<int>(size / (1024 * 1024)); + UMA_HISTOGRAM_COUNTS_10000("Profile.ThumbnailsSize", size_MB); + + size = file_util::ComputeFilesSize(path_, FILE_PATH_LITERAL("Visited Links")); + size_MB = static_cast<int>(size / (1024 * 1024)); + UMA_HISTOGRAM_COUNTS_10000("Profile.VisitedLinksSize", size_MB); + + size = file_util::ComputeFilesSize(path_, FILE_PATH_LITERAL("Web Data")); + size_MB = static_cast<int>(size / (1024 * 1024)); + UMA_HISTOGRAM_COUNTS_10000("Profile.WebDataSize", size_MB); + + size = file_util::ComputeFilesSize(path_, FILE_PATH_LITERAL("Extension*")); + size_MB = static_cast<int>(size / (1024 * 1024)); + UMA_HISTOGRAM_COUNTS_10000("Profile.ExtensionSize", size_MB); +} + +} // namespace + +// A pointer to the request context for the default profile. See comments on +// Profile::GetDefaultRequestContext. +URLRequestContextGetter* Profile::default_request_context_; + +static void CleanupRequestContext(ChromeURLRequestContextGetter* context) { + if (context) + context->CleanupOnUIThread(); +} + +// static +const ProfileId Profile::InvalidProfileId = static_cast<ProfileId>(0); + +// static +void Profile::RegisterUserPrefs(PrefService* prefs) { + prefs->RegisterBooleanPref(prefs::kSearchSuggestEnabled, true); + prefs->RegisterBooleanPref(prefs::kSessionExitedCleanly, true); + prefs->RegisterBooleanPref(prefs::kSafeBrowsingEnabled, true); + // TODO(estade): IDS_SPELLCHECK_DICTIONARY should be an ASCII string. + prefs->RegisterLocalizedStringPref(prefs::kSpellCheckDictionary, + IDS_SPELLCHECK_DICTIONARY); + prefs->RegisterBooleanPref(prefs::kEnableSpellCheck, true); + prefs->RegisterBooleanPref(prefs::kEnableAutoSpellCorrect, true); +#if defined(TOOLKIT_USES_GTK) + prefs->RegisterBooleanPref(prefs::kUsesSystemTheme, + GtkThemeProvider::DefaultUsesSystemTheme()); +#endif + prefs->RegisterFilePathPref(prefs::kCurrentThemePackFilename, FilePath()); + prefs->RegisterStringPref(prefs::kCurrentThemeID, + BrowserThemeProvider::kDefaultThemeID); + prefs->RegisterDictionaryPref(prefs::kCurrentThemeImages); + prefs->RegisterDictionaryPref(prefs::kCurrentThemeColors); + prefs->RegisterDictionaryPref(prefs::kCurrentThemeTints); + prefs->RegisterDictionaryPref(prefs::kCurrentThemeDisplayProperties); + prefs->RegisterBooleanPref(prefs::kDisableExtensions, false); + prefs->RegisterStringPref(prefs::kSelectFileLastDirectory, ""); +} + +// static +Profile* Profile::CreateProfile(const FilePath& path) { + return new ProfileImpl(path); +} + +// static +URLRequestContextGetter* Profile::GetDefaultRequestContext() { + return default_request_context_; +} + +bool Profile::IsSyncAccessible() { + ProfileSyncService* syncService = GetProfileSyncService(); + return syncService && !syncService->IsManaged(); +} + +#if defined(OS_WIN) +#include "chrome/browser/password_manager/password_store_win.h" +#elif defined(OS_MACOSX) +#include "chrome/browser/keychain_mac.h" +#include "chrome/browser/password_manager/password_store_mac.h" +#elif defined(OS_POSIX) && !defined(OS_CHROMEOS) +#include "base/xdg_util.h" +#include "chrome/browser/password_manager/native_backend_gnome_x.h" +#include "chrome/browser/password_manager/native_backend_kwallet_x.h" +#include "chrome/browser/password_manager/password_store_x.h" +#endif + +//////////////////////////////////////////////////////////////////////////////// +// +// OffTheRecordProfileImpl is a profile subclass that wraps an existing profile +// to make it suitable for the off the record mode. +// +//////////////////////////////////////////////////////////////////////////////// +class OffTheRecordProfileImpl : public Profile, + public NotificationObserver { + public: + explicit OffTheRecordProfileImpl(Profile* real_profile) + : profile_(real_profile), + start_time_(Time::Now()) { + request_context_ = ChromeURLRequestContextGetter::CreateOffTheRecord(this); + + // Register for browser close notifications so we can detect when the last + // off-the-record window is closed, in which case we can clean our states + // (cookies, downloads...). + registrar_.Add(this, NotificationType::BROWSER_CLOSED, + NotificationService::AllSources()); + background_contents_service_.reset( + new BackgroundContentsService(this, CommandLine::ForCurrentProcess())); + } + + virtual ~OffTheRecordProfileImpl() { + NotificationService::current()->Notify(NotificationType::PROFILE_DESTROYED, + Source<Profile>(this), + NotificationService::NoDetails()); + CleanupRequestContext(request_context_); + + // Clean up all DB files/directories + ChromeThread::PostTask( + ChromeThread::FILE, FROM_HERE, + NewRunnableMethod( + db_tracker_.get(), + &webkit_database::DatabaseTracker::DeleteIncognitoDBDirectory)); + } + + virtual ProfileId GetRuntimeId() { + return reinterpret_cast<ProfileId>(this); + } + + virtual FilePath GetPath() { return profile_->GetPath(); } + + virtual bool IsOffTheRecord() { + return true; + } + + virtual Profile* GetOffTheRecordProfile() { + return this; + } + + virtual void DestroyOffTheRecordProfile() { + // Suicide is bad! + NOTREACHED(); + } + + virtual bool HasOffTheRecordProfile() { + return true; + } + + virtual Profile* GetOriginalProfile() { + return profile_; + } + + virtual webkit_database::DatabaseTracker* GetDatabaseTracker() { + if (!db_tracker_) { + db_tracker_ = new webkit_database::DatabaseTracker( + GetPath(), IsOffTheRecord()); + } + return db_tracker_; + } + + virtual VisitedLinkMaster* GetVisitedLinkMaster() { + // We don't provide access to the VisitedLinkMaster when we're OffTheRecord + // because we don't want to leak the sites that the user has visited before. + return NULL; + } + + virtual ExtensionsService* GetExtensionsService() { + return GetOriginalProfile()->GetExtensionsService(); + } + + virtual BackgroundContentsService* GetBackgroundContentsService() { + return background_contents_service_.get(); + } + + virtual UserScriptMaster* GetUserScriptMaster() { + return GetOriginalProfile()->GetUserScriptMaster(); + } + + virtual ExtensionDevToolsManager* GetExtensionDevToolsManager() { + // TODO(mpcomplete): figure out whether we should return the original + // profile's version. + return NULL; + } + + virtual ExtensionProcessManager* GetExtensionProcessManager() { + return GetOriginalProfile()->GetExtensionProcessManager(); + } + + virtual ExtensionMessageService* GetExtensionMessageService() { + return GetOriginalProfile()->GetExtensionMessageService(); + } + + virtual SSLHostState* GetSSLHostState() { + if (!ssl_host_state_.get()) + ssl_host_state_.reset(new SSLHostState()); + + DCHECK(ssl_host_state_->CalledOnValidThread()); + return ssl_host_state_.get(); + } + + virtual net::TransportSecurityState* GetTransportSecurityState() { + if (!transport_security_state_.get()) + transport_security_state_ = new net::TransportSecurityState(); + + return transport_security_state_.get(); + } + + virtual HistoryService* GetHistoryService(ServiceAccessType sat) { + if (sat == EXPLICIT_ACCESS) + return profile_->GetHistoryService(sat); + + NOTREACHED() << "This profile is OffTheRecord"; + return NULL; + } + + virtual HistoryService* GetHistoryServiceWithoutCreating() { + return profile_->GetHistoryServiceWithoutCreating(); + } + + virtual FaviconService* GetFaviconService(ServiceAccessType sat) { + if (sat == EXPLICIT_ACCESS) + return profile_->GetFaviconService(sat); + + NOTREACHED() << "This profile is OffTheRecord"; + return NULL; + } + + virtual AutocompleteClassifier* GetAutocompleteClassifier() { + return profile_->GetAutocompleteClassifier(); + } + + virtual WebDataService* GetWebDataService(ServiceAccessType sat) { + if (sat == EXPLICIT_ACCESS) + return profile_->GetWebDataService(sat); + + NOTREACHED() << "This profile is OffTheRecord"; + return NULL; + } + + virtual WebDataService* GetWebDataServiceWithoutCreating() { + return profile_->GetWebDataServiceWithoutCreating(); + } + + virtual PasswordStore* GetPasswordStore(ServiceAccessType sat) { + if (sat == EXPLICIT_ACCESS) + return profile_->GetPasswordStore(sat); + + NOTREACHED() << "This profile is OffTheRecord"; + return NULL; + } + + virtual PrefService* GetPrefs() { + return profile_->GetPrefs(); + } + + virtual TemplateURLModel* GetTemplateURLModel() { + return profile_->GetTemplateURLModel(); + } + + virtual TemplateURLFetcher* GetTemplateURLFetcher() { + return profile_->GetTemplateURLFetcher(); + } + + virtual DownloadManager* GetDownloadManager() { + if (!download_manager_.get()) { + scoped_refptr<DownloadManager> dlm(new DownloadManager); + dlm->Init(this); + download_manager_.swap(dlm); + } + return download_manager_.get(); + } + + virtual bool HasCreatedDownloadManager() const { + return (download_manager_.get() != NULL); + } + + virtual PersonalDataManager* GetPersonalDataManager() { + return NULL; + } + + virtual void InitThemes() { + profile_->InitThemes(); + } + + virtual void SetTheme(Extension* extension) { + profile_->SetTheme(extension); + } + + virtual void SetNativeTheme() { + profile_->SetNativeTheme(); + } + + virtual void ClearTheme() { + profile_->ClearTheme(); + } + + virtual Extension* GetTheme() { + return profile_->GetTheme(); + } + + virtual BrowserThemeProvider* GetThemeProvider() { + return profile_->GetThemeProvider(); + } + + virtual URLRequestContextGetter* GetRequestContext() { + return request_context_; + } + + virtual URLRequestContextGetter* GetRequestContextForMedia() { + // In OTR mode, media request context is the same as the original one. + return request_context_; + } + + URLRequestContextGetter* GetRequestContextForExtensions() { + return GetOriginalProfile()->GetRequestContextForExtensions(); + } + + virtual net::SSLConfigService* GetSSLConfigService() { + return profile_->GetSSLConfigService(); + } + + virtual HostContentSettingsMap* GetHostContentSettingsMap() { + // Retrieve the host content settings map of the parent profile in order to + // ensure the preferences have been migrated. + profile_->GetHostContentSettingsMap(); + if (!host_content_settings_map_.get()) + host_content_settings_map_ = new HostContentSettingsMap(this); + return host_content_settings_map_.get(); + } + + virtual HostZoomMap* GetHostZoomMap() { + if (!host_zoom_map_) + host_zoom_map_ = new HostZoomMap(this); + return host_zoom_map_.get(); + } + + virtual GeolocationContentSettingsMap* GetGeolocationContentSettingsMap() { + return profile_->GetGeolocationContentSettingsMap(); + } + + virtual GeolocationPermissionContext* GetGeolocationPermissionContext() { + return profile_->GetGeolocationPermissionContext(); + } + + virtual UserStyleSheetWatcher* GetUserStyleSheetWatcher() { + return profile_->GetUserStyleSheetWatcher(); + } + + virtual FindBarState* GetFindBarState() { + if (!find_bar_state_.get()) + find_bar_state_.reset(new FindBarState()); + return find_bar_state_.get(); + } + + virtual SessionService* GetSessionService() { + // Don't save any sessions when off the record. + return NULL; + } + + virtual void ShutdownSessionService() { + // We don't allow a session service, nothing to do. + } + + virtual bool HasSessionService() const { + // We never have a session service. + return false; + } + + virtual bool DidLastSessionExitCleanly() { + return profile_->DidLastSessionExitCleanly(); + } + + virtual BookmarkModel* GetBookmarkModel() { + return profile_->GetBookmarkModel(); + } + + virtual DesktopNotificationService* GetDesktopNotificationService() { + if (!desktop_notification_service_.get()) { + desktop_notification_service_.reset(new DesktopNotificationService( + this, g_browser_process->notification_ui_manager())); + } + return desktop_notification_service_.get(); + } + + virtual TokenService* GetTokenService() { + return NULL; + } + + virtual ProfileSyncService* GetProfileSyncService() { + return NULL; + } + + virtual CloudPrintProxyService* GetCloudPrintProxyService() { + return NULL; + } + + virtual bool IsSameProfile(Profile* profile) { + return (profile == this) || (profile == profile_); + } + + virtual Time GetStartTime() const { + return start_time_; + } + + virtual TabRestoreService* GetTabRestoreService() { + return NULL; + } + + virtual void ResetTabRestoreService() { + } + + virtual SpellCheckHost* GetSpellCheckHost() { + return profile_->GetSpellCheckHost(); + } + + virtual void ReinitializeSpellCheckHost(bool force) { + profile_->ReinitializeSpellCheckHost(force); + } + + virtual WebKitContext* GetWebKitContext() { + if (!webkit_context_.get()) + webkit_context_ = new WebKitContext(this); + DCHECK(webkit_context_.get()); + return webkit_context_.get(); + } + + virtual history::TopSites* GetTopSites() { + return NULL; + } + + virtual void MarkAsCleanShutdown() { + } + + virtual void InitExtensions() { + NOTREACHED(); + } + + virtual void InitWebResources() { + NOTREACHED(); + } + + virtual NTPResourceCache* GetNTPResourceCache() { + // Just return the real profile resource cache. + return profile_->GetNTPResourceCache(); + } + + virtual FilePath last_selected_directory() { + const FilePath& directory = last_selected_directory_; + if (directory.empty()) { + return profile_->last_selected_directory(); + } + return directory; + } + + virtual void set_last_selected_directory(const FilePath& path) { + last_selected_directory_ = path; + } + + virtual void ExitedOffTheRecordMode() { + // Drop our download manager so we forget about all the downloads made + // in off-the-record mode. + download_manager_ = NULL; + } + + virtual void Observe(NotificationType type, + const NotificationSource& source, + const NotificationDetails& details) { + DCHECK_EQ(NotificationType::BROWSER_CLOSED, type.value); + // We are only interested in OTR browser closing. + if (Source<Browser>(source)->profile() != this) + return; + + // Let's check if we still have an Off The Record window opened. + // Note that we check against 1 as this notification is sent before the + // browser window is actually removed from the list. + if (BrowserList::GetBrowserCount(this) <= 1) + ExitedOffTheRecordMode(); + } + + private: + NotificationRegistrar registrar_; + + // The real underlying profile. + Profile* profile_; + + // The context to use for requests made from this OTR session. + scoped_refptr<ChromeURLRequestContextGetter> request_context_; + + // The download manager that only stores downloaded items in memory. + scoped_refptr<DownloadManager> download_manager_; + + // Use a separate desktop notification service for OTR. + scoped_ptr<DesktopNotificationService> desktop_notification_service_; + + // We use a non-writable content settings map for OTR. + scoped_refptr<HostContentSettingsMap> host_content_settings_map_; + + // Use a separate zoom map for OTR. + scoped_refptr<HostZoomMap> host_zoom_map_; + + // Use a special WebKit context for OTR browsing. + scoped_refptr<WebKitContext> webkit_context_; + + // We don't want SSLHostState from the OTR profile to leak back to the main + // profile because then the main profile would learn some of the host names + // the user visited while OTR. + scoped_ptr<SSLHostState> ssl_host_state_; + + // Use a separate FindBarState so search terms do not leak back to the main + // profile. + scoped_ptr<FindBarState> find_bar_state_; + + // The TransportSecurityState that only stores enabled sites in memory. + scoped_refptr<net::TransportSecurityState> + transport_security_state_; + + // Time we were started. + Time start_time_; + + // The main database tracker for this profile. + // Should be used only on the file thread. + scoped_refptr<webkit_database::DatabaseTracker> db_tracker_; + + FilePath last_selected_directory_; + + // Tracks all BackgroundContents running under this profile. + scoped_ptr<BackgroundContentsService> background_contents_service_; + + DISALLOW_COPY_AND_ASSIGN(OffTheRecordProfileImpl); +}; + +ProfileImpl::ProfileImpl(const FilePath& path) + : path_(path), + visited_link_event_listener_(new VisitedLinkEventListener()), + extension_devtools_manager_(NULL), + request_context_(NULL), + media_request_context_(NULL), + extensions_request_context_(NULL), + host_content_settings_map_(NULL), + host_zoom_map_(NULL), + history_service_created_(false), + favicon_service_created_(false), + created_web_data_service_(false), + created_password_store_(false), + created_download_manager_(false), + created_theme_provider_(false), + start_time_(Time::Now()), + spellcheck_host_(NULL), + spellcheck_host_ready_(false), + shutdown_session_service_(false) { + DCHECK(!path.empty()) << "Using an empty path will attempt to write " << + "profile files to the root directory!"; + create_session_service_timer_.Start( + TimeDelta::FromMilliseconds(kCreateSessionServiceDelayMS), this, + &ProfileImpl::EnsureSessionServiceCreated); + + PrefService* prefs = GetPrefs(); + prefs->AddPrefObserver(prefs::kSpellCheckDictionary, this); + prefs->AddPrefObserver(prefs::kEnableSpellCheck, this); + prefs->AddPrefObserver(prefs::kEnableAutoSpellCorrect, this); + +#if defined(OS_MACOSX) + // If the profile directory doesn't already have a cache directory and it + // is under ~/Library/Application Support, use a suitable cache directory + // under ~/Library/Caches. For example, a profile directory of + // ~/Library/Application Support/Google/Chrome/MyProfileName that doesn't + // have a "Cache" or "MediaCache" subdirectory would use the cache directory + // ~/Library/Caches/Google/Chrome/MyProfileName. + // + // TODO(akalin): Come up with unit tests for this. + if (!HasACacheSubdir(path_)) { + FilePath app_data_path, user_cache_path; + if (PathService::Get(base::DIR_APP_DATA, &app_data_path) && + PathService::Get(base::DIR_USER_CACHE, &user_cache_path) && + app_data_path.AppendRelativePath(path_, &user_cache_path)) { + base_cache_path_ = user_cache_path; + } + } +#elif defined(OS_POSIX) // Posix minus Mac. + // See http://standards.freedesktop.org/basedir-spec/basedir-spec-latest.html + // for a spec on where cache files go. The net effect for most systems is we + // use ~/.cache/chromium/ for Chromium and ~/.cache/google-chrome/ for + // official builds. + if (!PathService::IsOverridden(chrome::DIR_USER_DATA)) { +#if defined(GOOGLE_CHROME_BUILD) + const char kCacheDir[] = "google-chrome"; +#else + const char kCacheDir[] = "chromium"; +#endif + PathService::Get(base::DIR_USER_CACHE, &base_cache_path_); + base_cache_path_ = base_cache_path_.Append(kCacheDir); + if (!file_util::PathExists(base_cache_path_)) + file_util::CreateDirectory(base_cache_path_); + } +#endif + if (base_cache_path_.empty()) + base_cache_path_ = path_; + + // Listen for theme installation. + registrar_.Add(this, NotificationType::THEME_INSTALLED, + NotificationService::AllSources()); + + // Listen for bookmark model load, to bootstrap the sync service. + registrar_.Add(this, NotificationType::BOOKMARK_MODEL_LOADED, + Source<Profile>(this)); + + ssl_config_service_manager_.reset( + SSLConfigServiceManager::CreateDefaultManager(this)); + +#if defined(OS_CHROMEOS) + chromeos_preferences_.Init(prefs); +#endif + + pinned_tab_service_.reset(new PinnedTabService(this)); + + background_contents_service_.reset( + new BackgroundContentsService(this, CommandLine::ForCurrentProcess())); + + // Log the profile size after a reasonable startup delay. + ChromeThread::PostDelayedTask(ChromeThread::FILE, FROM_HERE, + new ProfileSizeTask(path_), 112000); +} + +void ProfileImpl::InitExtensions() { + if (user_script_master_ || extensions_service_) + return; // Already initialized. + + const CommandLine* command_line = CommandLine::ForCurrentProcess(); + if (command_line->HasSwitch( + switches::kEnableExtensionTimelineApi)) { + extension_devtools_manager_ = new ExtensionDevToolsManager(this); + } + + extension_process_manager_.reset(new ExtensionProcessManager(this)); + extension_message_service_ = new ExtensionMessageService(this); + + ExtensionErrorReporter::Init(true); // allow noisy errors. + + FilePath script_dir; // Don't look for user scripts in any directory. + // TODO(aa): We should just remove this functionality, + // since it isn't used anymore. + user_script_master_ = new UserScriptMaster(script_dir, this); + + extensions_service_ = new ExtensionsService( + this, + CommandLine::ForCurrentProcess(), + GetPrefs(), + GetPath().AppendASCII(ExtensionsService::kInstallDirectoryName), + true); + + // Register the component extensions. + typedef std::list<std::pair<std::string, int> > ComponentExtensionList; + ComponentExtensionList component_extensions; + + // Bookmark manager. + component_extensions.push_back( + std::make_pair("bookmark_manager", IDR_BOOKMARKS_MANIFEST)); + + // Some sample apps to make our lives easier while we are developing extension + // apps. This way we don't have to constantly install these over and over. + if (Extension::AppsAreEnabled() && IncludeDefaultApps()) { + component_extensions.push_back( + std::make_pair("gmail_app", IDR_GMAIL_APP_MANIFEST)); + component_extensions.push_back( + std::make_pair("calendar_app", IDR_CALENDAR_APP_MANIFEST)); + component_extensions.push_back( + std::make_pair("docs_app", IDR_DOCS_APP_MANIFEST)); + } + + for (ComponentExtensionList::iterator iter = component_extensions.begin(); + iter != component_extensions.end(); ++iter) { + FilePath path; + if (PathService::Get(chrome::DIR_RESOURCES, &path)) { + path = path.AppendASCII(iter->first); + } else { + NOTREACHED(); + } + + std::string manifest = + ResourceBundle::GetSharedInstance().GetRawDataResource( + iter->second).as_string(); + extensions_service_->register_component_extension( + ExtensionsService::ComponentExtensionInfo(manifest, path)); + } + + extensions_service_->Init(); + + // Load any extensions specified with --load-extension. + if (command_line->HasSwitch(switches::kLoadExtension)) { + FilePath path = command_line->GetSwitchValuePath(switches::kLoadExtension); + extensions_service_->LoadExtension(path); + } +} + +void ProfileImpl::InitWebResources() { + if (web_resource_service_) + return; // Already initialized. + + web_resource_service_ = new WebResourceService(this); + web_resource_service_->StartAfterDelay(); +} + +NTPResourceCache* ProfileImpl::GetNTPResourceCache() { + if (!ntp_resource_cache_.get()) + ntp_resource_cache_.reset(new NTPResourceCache(this)); + return ntp_resource_cache_.get(); +} + +FilePath ProfileImpl::last_selected_directory() { + return GetPrefs()->GetFilePath(prefs::kSelectFileLastDirectory); +} + +void ProfileImpl::set_last_selected_directory(const FilePath& path) { + GetPrefs()->SetFilePath(prefs::kSelectFileLastDirectory, path); +} + +ProfileImpl::~ProfileImpl() { + NotificationService::current()->Notify( + NotificationType::PROFILE_DESTROYED, + Source<Profile>(this), + NotificationService::NoDetails()); + + tab_restore_service_ = NULL; + + StopCreateSessionServiceTimer(); + // TemplateURLModel schedules a task on the WebDataService from its + // destructor. Delete it first to ensure the task gets scheduled before we + // shut down the database. + template_url_model_.reset(); + + // The download manager queries the history system and should be deleted + // before the history is shutdown so it can properly cancel all requests. + download_manager_ = NULL; + + // The theme provider provides bitmaps to whoever wants them. + theme_provider_.reset(); + + // Remove pref observers. + PrefService* prefs = GetPrefs(); + prefs->RemovePrefObserver(prefs::kSpellCheckDictionary, this); + prefs->RemovePrefObserver(prefs::kEnableSpellCheck, this); + prefs->RemovePrefObserver(prefs::kEnableAutoSpellCorrect, this); + + // Delete the NTP resource cache so we can unregister pref observers. + ntp_resource_cache_.reset(); + + sync_service_.reset(); + + // Both HistoryService and WebDataService maintain threads for background + // processing. Its possible each thread still has tasks on it that have + // increased the ref count of the service. In such a situation, when we + // decrement the refcount, it won't be 0, and the threads/databases aren't + // properly shut down. By explicitly calling Cleanup/Shutdown we ensure the + // databases are properly closed. + if (web_data_service_.get()) + web_data_service_->Shutdown(); + + if (history_service_.get()) + history_service_->Cleanup(); + + if (spellcheck_host_.get()) + spellcheck_host_->UnsetObserver(); + + if (default_request_context_ == request_context_) + default_request_context_ = NULL; + + CleanupRequestContext(request_context_); + CleanupRequestContext(media_request_context_); + CleanupRequestContext(extensions_request_context_); + + // HistoryService may call into the BookmarkModel, as such we need to + // delete HistoryService before the BookmarkModel. The destructor for + // HistoryService will join with HistoryService's backend thread so that + // by the time the destructor has finished we're sure it will no longer call + // into the BookmarkModel. + history_service_ = NULL; + bookmark_bar_model_.reset(); + + // FaviconService depends on HistoryServce so make sure we delete + // HistoryService first. + favicon_service_ = NULL; + + if (extension_message_service_) + extension_message_service_->ProfileDestroyed(); + + if (extensions_service_) + extensions_service_->ProfileDestroyed(); + + // This causes the Preferences file to be written to disk. + MarkAsCleanShutdown(); +} + +ProfileId ProfileImpl::GetRuntimeId() { + return reinterpret_cast<ProfileId>(this); +} + +FilePath ProfileImpl::GetPath() { + return path_; +} + +bool ProfileImpl::IsOffTheRecord() { + return false; +} + +Profile* ProfileImpl::GetOffTheRecordProfile() { + if (!off_the_record_profile_.get()) { + scoped_ptr<OffTheRecordProfileImpl> p(new OffTheRecordProfileImpl(this)); + off_the_record_profile_.swap(p); + } + return off_the_record_profile_.get(); +} + +void ProfileImpl::DestroyOffTheRecordProfile() { + off_the_record_profile_.reset(); +} + +bool ProfileImpl::HasOffTheRecordProfile() { + return off_the_record_profile_.get() != NULL; +} + +Profile* ProfileImpl::GetOriginalProfile() { + return this; +} + +webkit_database::DatabaseTracker* ProfileImpl::GetDatabaseTracker() { + if (!db_tracker_) { + db_tracker_ = new webkit_database::DatabaseTracker( + GetPath(), IsOffTheRecord()); + } + return db_tracker_; +} + +VisitedLinkMaster* ProfileImpl::GetVisitedLinkMaster() { + if (!visited_link_master_.get()) { + scoped_ptr<VisitedLinkMaster> visited_links( + new VisitedLinkMaster(visited_link_event_listener_.get(), this)); + if (!visited_links->Init()) + return NULL; + visited_link_master_.swap(visited_links); + } + + return visited_link_master_.get(); +} + +ExtensionsService* ProfileImpl::GetExtensionsService() { + return extensions_service_.get(); +} + +BackgroundContentsService* ProfileImpl::GetBackgroundContentsService() { + return background_contents_service_.get(); +} + +UserScriptMaster* ProfileImpl::GetUserScriptMaster() { + return user_script_master_.get(); +} + +ExtensionDevToolsManager* ProfileImpl::GetExtensionDevToolsManager() { + return extension_devtools_manager_.get(); +} + +ExtensionProcessManager* ProfileImpl::GetExtensionProcessManager() { + return extension_process_manager_.get(); +} + +ExtensionMessageService* ProfileImpl::GetExtensionMessageService() { + return extension_message_service_.get(); +} + +SSLHostState* ProfileImpl::GetSSLHostState() { + if (!ssl_host_state_.get()) + ssl_host_state_.reset(new SSLHostState()); + + DCHECK(ssl_host_state_->CalledOnValidThread()); + return ssl_host_state_.get(); +} + +net::TransportSecurityState* + ProfileImpl::GetTransportSecurityState() { + if (!transport_security_state_.get()) { + transport_security_state_ = new net::TransportSecurityState(); + transport_security_persister_ = + new TransportSecurityPersister(); + transport_security_persister_->Initialize( + transport_security_state_.get(), path_); + } + + return transport_security_state_.get(); +} + +PrefService* ProfileImpl::GetPrefs() { + if (!prefs_.get()) { + prefs_.reset(PrefService::CreatePrefService(GetPrefFilePath())); + + // The Profile class and ProfileManager class may read some prefs so + // register known prefs as soon as possible. + Profile::RegisterUserPrefs(prefs_.get()); + browser::RegisterUserPrefs(prefs_.get()); + + // The last session exited cleanly if there is no pref for + // kSessionExitedCleanly or the value for kSessionExitedCleanly is true. + last_session_exited_cleanly_ = + prefs_->GetBoolean(prefs::kSessionExitedCleanly); + // Mark the session as open. + prefs_->SetBoolean(prefs::kSessionExitedCleanly, false); + // Make sure we save to disk that the session has opened. + prefs_->ScheduleSavePersistentPrefs(); + } + + return prefs_.get(); +} + +FilePath ProfileImpl::GetPrefFilePath() { + FilePath pref_file_path = path_; + pref_file_path = pref_file_path.Append(chrome::kPreferencesFilename); + return pref_file_path; +} + +URLRequestContextGetter* ProfileImpl::GetRequestContext() { + if (!request_context_) { + FilePath cookie_path = GetPath(); + cookie_path = cookie_path.Append(chrome::kCookieFilename); + FilePath cache_path = base_cache_path_; + int max_size; + GetCacheParameters(kNormalContext, &cache_path, &max_size); + + cache_path = GetCachePath(cache_path); + request_context_ = ChromeURLRequestContextGetter::CreateOriginal( + this, cookie_path, cache_path, max_size); + + // The first request context is always a normal (non-OTR) request context. + // Even when Chromium is started in OTR mode, a normal profile is always + // created first. + if (!default_request_context_) { + default_request_context_ = request_context_; + // TODO(eroman): this isn't terribly useful anymore now that the + // URLRequestContext is constructed by the IO thread... + NotificationService::current()->Notify( + NotificationType::DEFAULT_REQUEST_CONTEXT_AVAILABLE, + NotificationService::AllSources(), NotificationService::NoDetails()); + } + } + + return request_context_; +} + +URLRequestContextGetter* ProfileImpl::GetRequestContextForMedia() { + if (!media_request_context_) { + FilePath cache_path = base_cache_path_; + int max_size; + GetCacheParameters(kMediaContext, &cache_path, &max_size); + + cache_path = GetMediaCachePath(cache_path); + media_request_context_ = + ChromeURLRequestContextGetter::CreateOriginalForMedia( + this, cache_path, max_size); + } + + return media_request_context_; +} + +FaviconService* ProfileImpl::GetFaviconService(ServiceAccessType sat) { + if (!favicon_service_created_) { + favicon_service_created_ = true; + scoped_refptr<FaviconService> service(new FaviconService(this)); + favicon_service_.swap(service); + } + return favicon_service_.get(); +} + +URLRequestContextGetter* ProfileImpl::GetRequestContextForExtensions() { + if (!extensions_request_context_) { + FilePath cookie_path = GetPath(); + cookie_path = cookie_path.Append(chrome::kExtensionsCookieFilename); + + extensions_request_context_ = + ChromeURLRequestContextGetter::CreateOriginalForExtensions( + this, cookie_path); + } + + return extensions_request_context_; +} + +void ProfileImpl::RegisterExtensionWithRequestContexts( + Extension* extension) { + // Notify the default, extension and media contexts on the IO thread. + PostExtensionLoadedToContextGetter( + static_cast<ChromeURLRequestContextGetter*>(GetRequestContext()), + extension); + PostExtensionLoadedToContextGetter( + static_cast<ChromeURLRequestContextGetter*>( + GetRequestContextForExtensions()), + extension); + PostExtensionLoadedToContextGetter( + static_cast<ChromeURLRequestContextGetter*>( + GetRequestContextForMedia()), + extension); +} + +void ProfileImpl::UnregisterExtensionWithRequestContexts( + Extension* extension) { + // Notify the default, extension and media contexts on the IO thread. + PostExtensionUnloadedToContextGetter( + static_cast<ChromeURLRequestContextGetter*>(GetRequestContext()), + extension); + PostExtensionUnloadedToContextGetter( + static_cast<ChromeURLRequestContextGetter*>( + GetRequestContextForExtensions()), + extension); + PostExtensionUnloadedToContextGetter( + static_cast<ChromeURLRequestContextGetter*>( + GetRequestContextForMedia()), + extension); +} + +net::SSLConfigService* ProfileImpl::GetSSLConfigService() { + return ssl_config_service_manager_->Get(); +} + +HostContentSettingsMap* ProfileImpl::GetHostContentSettingsMap() { + if (!host_content_settings_map_.get()) + host_content_settings_map_ = new HostContentSettingsMap(this); + return host_content_settings_map_.get(); +} + +HostZoomMap* ProfileImpl::GetHostZoomMap() { + if (!host_zoom_map_) + host_zoom_map_ = new HostZoomMap(this); + return host_zoom_map_.get(); +} + +GeolocationContentSettingsMap* ProfileImpl::GetGeolocationContentSettingsMap() { + if (!geolocation_content_settings_map_.get()) + geolocation_content_settings_map_ = new GeolocationContentSettingsMap(this); + return geolocation_content_settings_map_.get(); +} + +GeolocationPermissionContext* ProfileImpl::GetGeolocationPermissionContext() { + if (!geolocation_permission_context_.get()) + geolocation_permission_context_ = new GeolocationPermissionContext(this); + return geolocation_permission_context_.get(); +} + +UserStyleSheetWatcher* ProfileImpl::GetUserStyleSheetWatcher() { + if (!user_style_sheet_watcher_.get()) { + user_style_sheet_watcher_ = new UserStyleSheetWatcher(GetPath()); + user_style_sheet_watcher_->Init(); + } + return user_style_sheet_watcher_.get(); +} + +FindBarState* ProfileImpl::GetFindBarState() { + if (!find_bar_state_.get()) { + find_bar_state_.reset(new FindBarState()); + } + return find_bar_state_.get(); +} + +HistoryService* ProfileImpl::GetHistoryService(ServiceAccessType sat) { + if (!history_service_created_) { + history_service_created_ = true; + scoped_refptr<HistoryService> history(new HistoryService(this)); + if (!history->Init(GetPath(), GetBookmarkModel())) + return NULL; + history_service_.swap(history); + + // Send out the notification that the history service was created. + NotificationService::current()-> + Notify(NotificationType::HISTORY_CREATED, Source<Profile>(this), + Details<HistoryService>(history_service_.get())); + } + return history_service_.get(); +} + +HistoryService* ProfileImpl::GetHistoryServiceWithoutCreating() { + return history_service_.get(); +} + +TemplateURLModel* ProfileImpl::GetTemplateURLModel() { + if (!template_url_model_.get()) + template_url_model_.reset(new TemplateURLModel(this)); + return template_url_model_.get(); +} + +TemplateURLFetcher* ProfileImpl::GetTemplateURLFetcher() { + if (!template_url_fetcher_.get()) + template_url_fetcher_.reset(new TemplateURLFetcher(this)); + return template_url_fetcher_.get(); +} + +AutocompleteClassifier* ProfileImpl::GetAutocompleteClassifier() { + if (!autocomplete_classifier_.get()) + autocomplete_classifier_.reset(new AutocompleteClassifier(this)); + return autocomplete_classifier_.get(); +} + +WebDataService* ProfileImpl::GetWebDataService(ServiceAccessType sat) { + if (!created_web_data_service_) + CreateWebDataService(); + return web_data_service_.get(); +} + +WebDataService* ProfileImpl::GetWebDataServiceWithoutCreating() { + return web_data_service_.get(); +} + +void ProfileImpl::CreateWebDataService() { + DCHECK(!created_web_data_service_ && web_data_service_.get() == NULL); + created_web_data_service_ = true; + scoped_refptr<WebDataService> wds(new WebDataService()); + if (!wds->Init(GetPath())) + return; + web_data_service_.swap(wds); +} + +PasswordStore* ProfileImpl::GetPasswordStore(ServiceAccessType sat) { + if (!created_password_store_) + CreatePasswordStore(); + return password_store_.get(); +} + +void ProfileImpl::CreatePasswordStore() { + DCHECK(!created_password_store_ && password_store_.get() == NULL); + created_password_store_ = true; + scoped_refptr<PasswordStore> ps; + FilePath login_db_file_path = GetPath(); + login_db_file_path = login_db_file_path.Append(chrome::kLoginDataFileName); + LoginDatabase* login_db = new LoginDatabase(); + if (!login_db->Init(login_db_file_path)) { + LOG(ERROR) << "Could not initialize login database."; + delete login_db; + return; + } +#if defined(OS_WIN) + ps = new PasswordStoreWin(login_db, this, + GetWebDataService(Profile::IMPLICIT_ACCESS)); +#elif defined(OS_MACOSX) + ps = new PasswordStoreMac(new MacKeychain(), login_db); +#elif defined(OS_CHROMEOS) + // For now, we use PasswordStoreDefault. We might want to make a native + // backend for PasswordStoreX (see below) in the future though. + ps = new PasswordStoreDefault(login_db, this, + GetWebDataService(Profile::IMPLICIT_ACCESS)); +#elif defined(OS_POSIX) + // On POSIX systems, we try to use the "native" password management system of + // the desktop environment currently running, allowing GNOME Keyring in XFCE. + // (In all cases we fall back on the default store in case of failure.) + base::DesktopEnvironment desktop_env; + std::wstring store_type = CommandLine::ForCurrentProcess()->GetSwitchValue( + switches::kPasswordStore); + if (store_type == L"kwallet") { + desktop_env = base::DESKTOP_ENVIRONMENT_KDE4; + } else if (store_type == L"gnome") { + desktop_env = base::DESKTOP_ENVIRONMENT_GNOME; + } else if (store_type == L"detect") { + scoped_ptr<base::EnvVarGetter> env_getter(base::EnvVarGetter::Create()); + desktop_env = base::GetDesktopEnvironment(env_getter.get()); + LOG(INFO) << "Password storage detected desktop environment: " << + base::GetDesktopEnvironmentName(desktop_env); + } else { + // TODO(mdm): If the flag is not given, or has an unknown value, use the + // default store for now. Once we're confident in the other stores, we can + // default to detecting the desktop environment instead. + desktop_env = base::DESKTOP_ENVIRONMENT_OTHER; + } + + scoped_ptr<PasswordStoreX::NativeBackend> backend; + if (desktop_env == base::DESKTOP_ENVIRONMENT_KDE4) { + // KDE3 didn't use DBus, which our KWallet store uses. + LOG(INFO) << "Trying KWallet for password storage."; + backend.reset(new NativeBackendKWallet()); + if (backend->Init()) + LOG(INFO) << "Using KWallet for password storage."; + else + backend.reset(); + } else if (desktop_env == base::DESKTOP_ENVIRONMENT_GNOME || + desktop_env == base::DESKTOP_ENVIRONMENT_XFCE) { + LOG(INFO) << "Trying GNOME keyring for password storage."; + backend.reset(new NativeBackendGnome()); + if (backend->Init()) + LOG(INFO) << "Using GNOME keyring for password storage."; + else + backend.reset(); + } + // TODO(mdm): this can change to a WARNING when we detect by default. + if (!backend.get()) + LOG(INFO) << "Using default (unencrypted) store for password storage."; + + ps = new PasswordStoreX(login_db, this, + GetWebDataService(Profile::IMPLICIT_ACCESS), + backend.release()); +#else + NOTIMPLEMENTED(); +#endif + if (!ps) + delete login_db; + + if (!ps || !ps->Init()) { + NOTREACHED() << "Could not initialize password manager."; + return; + } + password_store_.swap(ps); +} + +DownloadManager* ProfileImpl::GetDownloadManager() { + if (!created_download_manager_) { + scoped_refptr<DownloadManager> dlm(new DownloadManager); + dlm->Init(this); + created_download_manager_ = true; + download_manager_.swap(dlm); + } + return download_manager_.get(); +} + +bool ProfileImpl::HasCreatedDownloadManager() const { + return created_download_manager_; +} + +PersonalDataManager* ProfileImpl::GetPersonalDataManager() { + if (!personal_data_manager_.get()) { + personal_data_manager_ = new PersonalDataManager(); + personal_data_manager_->Init(this); + } + return personal_data_manager_.get(); +} + +void ProfileImpl::InitThemes() { + if (!created_theme_provider_) { +#if defined(TOOLKIT_USES_GTK) + theme_provider_.reset(new GtkThemeProvider); +#else + theme_provider_.reset(new BrowserThemeProvider); +#endif + theme_provider_->Init(this); + created_theme_provider_ = true; + } +} + +void ProfileImpl::SetTheme(Extension* extension) { + InitThemes(); + theme_provider_.get()->SetTheme(extension); +} + +void ProfileImpl::SetNativeTheme() { + InitThemes(); + theme_provider_.get()->SetNativeTheme(); +} + +void ProfileImpl::ClearTheme() { + InitThemes(); + theme_provider_.get()->UseDefaultTheme(); +} + +Extension* ProfileImpl::GetTheme() { + InitThemes(); + + std::string id = theme_provider_.get()->GetThemeID(); + if (id == BrowserThemeProvider::kDefaultThemeID) + return NULL; + + return extensions_service_->GetExtensionById(id, false); +} + +BrowserThemeProvider* ProfileImpl::GetThemeProvider() { + InitThemes(); + return theme_provider_.get(); +} + +SessionService* ProfileImpl::GetSessionService() { + if (!session_service_.get() && !shutdown_session_service_) { + session_service_ = new SessionService(this); + session_service_->ResetFromCurrentBrowsers(); + } + return session_service_.get(); +} + +void ProfileImpl::ShutdownSessionService() { + if (shutdown_session_service_) + return; + + // We're about to exit, force creation of the session service if it hasn't + // been created yet. We do this to ensure session state matches the point in + // time the user exited. + GetSessionService(); + shutdown_session_service_ = true; + session_service_ = NULL; +} + +bool ProfileImpl::HasSessionService() const { + return (session_service_.get() != NULL); +} + +bool ProfileImpl::DidLastSessionExitCleanly() { + // last_session_exited_cleanly_ is set when the preferences are loaded. Force + // it to be set by asking for the prefs. + GetPrefs(); + return last_session_exited_cleanly_; +} + +BookmarkModel* ProfileImpl::GetBookmarkModel() { + if (!bookmark_bar_model_.get()) { + bookmark_bar_model_.reset(new BookmarkModel(this)); + bookmark_bar_model_->Load(); + } + return bookmark_bar_model_.get(); +} + +bool ProfileImpl::IsSameProfile(Profile* profile) { + if (profile == static_cast<Profile*>(this)) + return true; + OffTheRecordProfileImpl* otr_profile = off_the_record_profile_.get(); + return otr_profile && profile == static_cast<Profile*>(otr_profile); +} + +Time ProfileImpl::GetStartTime() const { + return start_time_; +} + +TabRestoreService* ProfileImpl::GetTabRestoreService() { + if (!tab_restore_service_.get()) + tab_restore_service_ = new TabRestoreService(this); + return tab_restore_service_.get(); +} + +history::TopSites* ProfileImpl::GetTopSites() { + if (!top_sites_.get()) { + top_sites_ = new history::TopSites(this); + top_sites_->Init(GetPath().Append(chrome::kTopSitesFilename)); + } + return top_sites_; +} + +void ProfileImpl::ResetTabRestoreService() { + tab_restore_service_ = NULL; +} + +SpellCheckHost* ProfileImpl::GetSpellCheckHost() { + return spellcheck_host_ready_ ? spellcheck_host_.get() : NULL; +} + +void ProfileImpl::ReinitializeSpellCheckHost(bool force) { + // If we are already loading the spellchecker, and this is just a hint to + // load the spellchecker, do nothing. + if (!force && spellcheck_host_.get()) + return; + + spellcheck_host_ready_ = false; + + bool notify = false; + if (spellcheck_host_.get()) { + spellcheck_host_->UnsetObserver(); + spellcheck_host_ = NULL; + notify = true; + } + + PrefService* prefs = GetPrefs(); + if (prefs->GetBoolean(prefs::kEnableSpellCheck)) { + // Retrieve the (perhaps updated recently) dictionary name from preferences. + spellcheck_host_ = new SpellCheckHost( + this, + prefs->GetString(prefs::kSpellCheckDictionary), + GetRequestContext()); + spellcheck_host_->Initialize(); + } else if (notify) { + // The spellchecker has been disabled. + SpellCheckHostInitialized(); + } +} + +void ProfileImpl::SpellCheckHostInitialized() { + spellcheck_host_ready_ = spellcheck_host_ && + (spellcheck_host_->bdict_file() != base::kInvalidPlatformFileValue || + spellcheck_host_->use_platform_spellchecker()); + NotificationService::current()->Notify( + NotificationType::SPELLCHECK_HOST_REINITIALIZED, + Source<Profile>(this), NotificationService::NoDetails()); +} + +WebKitContext* ProfileImpl::GetWebKitContext() { + if (!webkit_context_.get()) + webkit_context_ = new WebKitContext(this); + DCHECK(webkit_context_.get()); + return webkit_context_.get(); +} + +DesktopNotificationService* ProfileImpl::GetDesktopNotificationService() { + DCHECK(ChromeThread::CurrentlyOn(ChromeThread::UI)); + if (!desktop_notification_service_.get()) { + desktop_notification_service_.reset(new DesktopNotificationService( + this, g_browser_process->notification_ui_manager())); + } + return desktop_notification_service_.get(); +} + +void ProfileImpl::MarkAsCleanShutdown() { + if (prefs_.get()) { + // The session cleanly exited, set kSessionExitedCleanly appropriately. + prefs_->SetBoolean(prefs::kSessionExitedCleanly, true); + + // NOTE: If you change what thread this writes on, be sure and update + // ChromeFrame::EndSession(). + prefs_->SavePersistentPrefs(); + } +} + +void ProfileImpl::Observe(NotificationType type, + const NotificationSource& source, + const NotificationDetails& details) { + if (NotificationType::PREF_CHANGED == type) { + std::wstring* pref_name_in = Details<std::wstring>(details).ptr(); + PrefService* prefs = Source<PrefService>(source).ptr(); + DCHECK(pref_name_in && prefs); + if (*pref_name_in == prefs::kSpellCheckDictionary || + *pref_name_in == prefs::kEnableSpellCheck) { + ReinitializeSpellCheckHost(true); + } else if (*pref_name_in == prefs::kEnableAutoSpellCorrect) { + NotificationService::current()->Notify( + NotificationType::SPELLCHECK_AUTOSPELL_TOGGLED, + Source<Profile>(this), NotificationService::NoDetails()); + } + } else if (NotificationType::THEME_INSTALLED == type) { + Extension* extension = Details<Extension>(details).ptr(); + SetTheme(extension); + } else if (NotificationType::BOOKMARK_MODEL_LOADED == type) { + GetProfileSyncService(); // Causes lazy-load if sync is enabled. + registrar_.Remove(this, NotificationType::BOOKMARK_MODEL_LOADED, + Source<Profile>(this)); + } +} + +void ProfileImpl::StopCreateSessionServiceTimer() { + create_session_service_timer_.Stop(); +} + +TokenService* ProfileImpl::GetTokenService() { + if (!token_service_.get()) { + token_service_.reset(new TokenService()); + } + return token_service_.get(); +} + +ProfileSyncService* ProfileImpl::GetProfileSyncService() { + if (!ProfileSyncService::IsSyncEnabled()) + return NULL; + if (!sync_service_.get()) + InitSyncService(); + return sync_service_.get(); +} + +CloudPrintProxyService* ProfileImpl::GetCloudPrintProxyService() { + if (!cloud_print_proxy_service_.get()) + InitCloudPrintProxyService(); + return cloud_print_proxy_service_.get(); +} + +void ProfileImpl::InitSyncService() { + profile_sync_factory_.reset( + new ProfileSyncFactoryImpl(this, CommandLine::ForCurrentProcess())); + sync_service_.reset( + profile_sync_factory_->CreateProfileSyncService()); + sync_service_->Initialize(); +} + +void ProfileImpl::InitCloudPrintProxyService() { + cloud_print_proxy_service_.reset(new CloudPrintProxyService(this)); + cloud_print_proxy_service_->Initialize(); +} |