blob: aacfea084f52763a872a6022f1ea9a1d59575ed5 [file] [log] [blame]
[email protected]3a80ea332012-01-09 19:53:291// Copyright (c) 2012 The Chromium Authors. All rights reserved.
license.botbf09a502008-08-24 00:55:552// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
initial.commit09911bf2008-07-26 23:55:294
5#include "chrome/browser/browser_process_impl.h"
6
[email protected]38489a32012-05-11 02:24:547#include <algorithm>
[email protected]3cdacd42010-04-30 18:55:538#include <map>
[email protected]68f88b992011-05-07 02:01:399#include <set>
10#include <vector>
[email protected]3cdacd42010-04-30 18:55:5311
[email protected]b3cc0542011-11-19 22:43:4412#include "base/bind.h"
13#include "base/bind_helpers.h"
initial.commit09911bf2008-07-26 23:55:2914#include "base/command_line.h"
[email protected]6b4e6852012-02-14 04:02:4815#include "base/debug/alias.h"
[email protected]6641bf662009-08-21 00:34:0916#include "base/file_util.h"
initial.commit09911bf2008-07-26 23:55:2917#include "base/path_service.h"
[email protected]03b9b4e2012-10-22 20:01:5218#include "base/prefs/json_pref_store.h"
[email protected]985655a2011-02-23 09:54:2519#include "base/synchronization/waitable_event.h"
[email protected]34b99632011-01-01 01:01:0620#include "base/threading/thread.h"
21#include "base/threading/thread_restrictions.h"
[email protected]e13ad79b2010-07-22 21:36:5022#include "chrome/browser/automation/automation_provider_list.h"
[email protected]a07676b22011-06-17 16:36:5323#include "chrome/browser/background/background_mode_manager.h"
[email protected]c38831a12011-10-28 12:44:4924#include "chrome/browser/chrome_browser_main.h"
[email protected]572f40c9b2012-07-06 20:35:3325#include "chrome/browser/chrome_content_browser_client.h"
[email protected]dfba8762011-09-02 12:49:5426#include "chrome/browser/chrome_plugin_service_filter.h"
[email protected]c1adf5a2011-08-03 22:11:3727#include "chrome/browser/component_updater/component_updater_configurator.h"
28#include "chrome/browser/component_updater/component_updater_service.h"
[email protected]4475d232011-07-27 15:29:2029#include "chrome/browser/debugger/remote_debugging_server.h"
[email protected]195c99c2012-10-31 06:24:5130#include "chrome/browser/defaults.h"
[email protected]254ed742011-08-16 18:45:2731#include "chrome/browser/download/download_request_limiter.h"
[email protected]75e51b52012-02-04 16:57:5432#include "chrome/browser/download/download_status_updater.h"
[email protected]5a38dfd2012-07-23 23:22:1033#include "chrome/browser/extensions/event_router_forwarder.h"
[email protected]fc4facd2011-03-22 23:18:5034#include "chrome/browser/extensions/extension_tab_id_map.h"
[email protected]815856722011-04-13 17:19:1935#include "chrome/browser/first_run/upgrade_util.h"
[email protected]dcefa302009-05-20 00:24:3936#include "chrome/browser/icon_manager.h"
[email protected]c4ff4952010-01-08 19:12:4737#include "chrome/browser/intranet_redirect_detector.h"
[email protected]0ac83682010-01-22 17:46:2738#include "chrome/browser/io_thread.h"
[email protected]2e6389f2012-05-18 19:41:2539#include "chrome/browser/lifetime/application_lifetime.h"
[email protected]dc6f4962009-02-13 01:25:5040#include "chrome/browser/metrics/metrics_service.h"
[email protected]0b565182011-03-02 18:11:1541#include "chrome/browser/metrics/thread_watcher.h"
[email protected]cf265dc02012-08-15 01:01:1642#include "chrome/browser/metrics/variations/variations_service.h"
[email protected]b2fcd0e2010-12-01 15:19:4043#include "chrome/browser/net/chrome_net_log.h"
[email protected]ca167a32011-09-30 15:19:1144#include "chrome/browser/net/crl_set_fetcher.h"
[email protected]d393a0fd2009-05-13 23:32:0145#include "chrome/browser/net/sdch_dictionary_fetcher.h"
[email protected]29672ab2009-10-30 03:44:0346#include "chrome/browser/notifications/notification_ui_manager.h"
[email protected]de75c702012-09-25 23:06:0247#include "chrome/browser/plugins/plugin_finder.h"
[email protected]21d3a882012-05-31 14:41:5548#include "chrome/browser/policy/policy_service.h"
[email protected]caf63aea2011-04-26 11:04:1049#include "chrome/browser/prefs/browser_prefs.h"
[email protected]37858e52010-08-26 00:22:0250#include "chrome/browser/prefs/pref_service.h"
[email protected]1459fb62011-05-25 19:03:2751#include "chrome/browser/prerender/prerender_tracker.h"
[email protected]68f88b992011-05-07 02:01:3952#include "chrome/browser/printing/background_printing_manager.h"
[email protected]e06131d2010-02-10 18:40:3353#include "chrome/browser/printing/print_job_manager.h"
[email protected]dbeebd52010-11-16 20:34:1654#include "chrome/browser/printing/print_preview_tab_controller.h"
[email protected]8ecad5e2010-12-02 21:18:3355#include "chrome/browser/profiles/profile_manager.h"
[email protected]8bcdf072011-06-03 16:52:1556#include "chrome/browser/renderer_host/chrome_resource_dispatcher_host_delegate.h"
[email protected]81218f42009-02-05 18:48:0857#include "chrome/browser/safe_browsing/safe_browsing_service.h"
[email protected]e450fa62011-02-01 12:52:5658#include "chrome/browser/shell_integration.h"
[email protected]9e7f015f2011-05-28 00:24:2559#include "chrome/browser/status_icons/status_tray.h"
[email protected]94e385322012-10-08 20:21:3360#include "chrome/browser/thumbnails/render_widget_snapshot_taker.h"
[email protected]195c99c2012-10-31 06:24:5161#include "chrome/browser/ui/bookmarks/bookmark_prompt_controller.h"
[email protected]71b73f02011-04-06 15:57:2962#include "chrome/browser/ui/browser_list.h"
[email protected]4ef795df2010-02-03 02:35:0863#include "chrome/common/chrome_constants.h"
[email protected]794b8f22012-04-25 23:59:2664#include "chrome/common/chrome_content_client.h"
[email protected]432115822011-07-10 15:52:2765#include "chrome/common/chrome_notification_types.h"
initial.commit09911bf2008-07-26 23:55:2966#include "chrome/common/chrome_paths.h"
67#include "chrome/common/chrome_switches.h"
[email protected]f1b6de22010-03-06 12:13:4768#include "chrome/common/extensions/extension_l10n_util.h"
[email protected]985655a2011-02-23 09:54:2569#include "chrome/common/extensions/extension_resource.h"
initial.commit09911bf2008-07-26 23:55:2970#include "chrome/common/pref_names.h"
[email protected]5c08f222010-09-22 09:37:2171#include "chrome/common/switch_utils.h"
[email protected]985655a2011-02-23 09:54:2572#include "chrome/common/url_constants.h"
[email protected]bd48c2b02010-04-09 20:32:4273#include "chrome/installer/util/google_update_constants.h"
[email protected]c38831a12011-10-28 12:44:4974#include "content/public/browser/browser_thread.h"
[email protected]b9535422012-02-09 01:47:5975#include "content/public/browser/child_process_security_policy.h"
[email protected]ad50def52011-10-19 23:17:0776#include "content/public/browser/notification_details.h"
[email protected]3a5180ae2011-12-21 02:39:3877#include "content/public/browser/plugin_service.h"
[email protected]f3b1a082011-11-18 00:34:3078#include "content/public/browser/render_process_host.h"
[email protected]ea114722012-03-12 01:11:2579#include "content/public/browser/resource_dispatcher_host.h"
[email protected]794b8f22012-04-25 23:59:2680#include "content/public/common/pepper_plugin_info.h"
[email protected]12c84e22011-07-11 09:35:4581#include "net/socket/client_socket_pool_manager.h"
[email protected]abe2c032011-03-31 18:49:3482#include "net/url_request/url_request_context_getter.h"
[email protected]c051a1b2011-01-21 23:30:1783#include "ui/base/l10n/l10n_util.h"
[email protected]b112a4c2009-02-01 20:24:0184
[email protected]3b19e8e2012-10-17 19:15:4985#if defined(ENABLE_CONFIGURATION_POLICY)
86#include "chrome/browser/policy/browser_policy_connector.h"
87#else
[email protected]21d3a882012-05-31 14:41:5588#include "chrome/browser/policy/policy_service_stub.h"
89#endif // defined(ENABLE_CONFIGURATION_POLICY)
90
[email protected]b112a4c2009-02-01 20:24:0191#if defined(OS_WIN)
[email protected]770c6d82012-09-06 22:21:3292#include "base/win/windows_version.h"
[email protected]477ae052011-11-18 23:53:5793#include "ui/views/focus/view_storage.h"
[email protected]03d8d3e92011-09-20 06:07:1194#elif defined(OS_MACOSX)
95#include "chrome/browser/chrome_browser_main_mac.h"
[email protected]86230b92009-11-23 20:38:3896#endif
97
[email protected]4189bc222012-03-29 23:11:4798#if defined(USE_AURA)
99#include "ui/aura/env.h"
100#endif
101
[email protected]db0e86dd2011-03-16 14:47:21102#if defined(OS_CHROMEOS)
[email protected]e715e9a2012-10-10 23:02:32103#include "chrome/browser/chromeos/memory/oom_priority_manager.h"
[email protected]db0e86dd2011-03-16 14:47:21104#endif // defined(OS_CHROMEOS)
105
[email protected]2366a3a2012-10-02 20:41:14106#if defined(ENABLE_PLUGIN_INSTALLATION)
107#include "chrome/browser/web_resource/plugins_resource_service.h"
108#endif
109
[email protected]3cdacd42010-04-30 18:55:53110#if (defined(OS_WIN) || defined(OS_LINUX)) && !defined(OS_CHROMEOS)
111// How often to check if the persistent instance of Chrome needs to restart
112// to install an update.
113static const int kUpdateCheckIntervalHours = 6;
114#endif
115
[email protected]af391f02011-09-15 06:13:35116#if defined(OS_WIN)
117// Attest to the fact that the call to the file thread to save preferences has
118// run, and it is safe to terminate. This avoids the potential of some other
119// task prematurely terminating our waiting message loop by posting a
120// QuitTask().
121static bool g_end_session_file_thread_has_completed = false;
122#endif
123
[email protected]c6032e82010-09-13 20:06:05124#if defined(USE_X11)
125// How long to wait for the File thread to complete during EndSession, on
126// Linux. We have a timeout here because we're unable to run the UI messageloop
127// and there's some deadlock risk. Our only option is to exit anyway.
128static const int kEndSessionTimeoutSeconds = 10;
129#endif
130
[email protected]631bb742011-11-02 11:29:39131using content::BrowserThread;
[email protected]b9535422012-02-09 01:47:59132using content::ChildProcessSecurityPolicy;
[email protected]3a5180ae2011-12-21 02:39:38133using content::PluginService;
[email protected]ea114722012-03-12 01:11:25134using content::ResourceDispatcherHost;
[email protected]631bb742011-11-02 11:29:39135
[email protected]0de615a2012-11-08 04:40:59136BrowserProcessImpl::BrowserProcessImpl(
137 base::SequencedTaskRunner* local_state_task_runner,
138 const CommandLine& command_line)
[email protected]99907362012-01-11 05:41:40139 : created_metrics_service_(false),
[email protected]0b565182011-03-02 18:11:15140 created_watchdog_thread_(false),
[email protected]663831822012-05-23 10:19:21141 created_browser_policy_connector_(false),
initial.commit09911bf2008-07-26 23:55:29142 created_profile_manager_(false),
143 created_local_state_(false),
[email protected]b112a4c2009-02-01 20:24:01144 created_icon_manager_(false),
[email protected]29672ab2009-10-30 03:44:03145 created_notification_ui_manager_(false),
[email protected]462a0ff2011-06-02 17:15:34146 created_safe_browsing_service_(false),
initial.commit09911bf2008-07-26 23:55:29147 module_ref_count_(0),
[email protected]afd20c022010-06-10 00:48:20148 did_start_(false),
[email protected]1b2db1a2008-08-08 17:46:13149 checked_for_new_frames_(false),
[email protected]7a0e72f2011-09-20 19:59:11150 using_new_frames_(false),
[email protected]94e385322012-10-08 20:21:33151 render_widget_snapshot_taker_(new RenderWidgetSnapshotTaker),
[email protected]0de615a2012-11-08 04:40:59152 download_status_updater_(new DownloadStatusUpdater),
153 local_state_task_runner_(local_state_task_runner) {
initial.commit09911bf2008-07-26 23:55:29154 g_browser_process = this;
initial.commit09911bf2008-07-26 23:55:29155
[email protected]658677f2012-06-09 06:04:02156#if defined(ENABLE_PRINTING)
initial.commit09911bf2008-07-26 23:55:29157 // Must be created after the NotificationService.
158 print_job_manager_.reset(new printing::PrintJobManager);
[email protected]058e5732012-03-01 22:48:03159#endif
initial.commit09911bf2008-07-26 23:55:29160
[email protected]b2fcd0e2010-12-01 15:19:40161 net_log_.reset(new ChromeNetLog);
[email protected]3ce02412011-03-01 12:01:15162
[email protected]8add5412011-10-01 21:02:14163 ChildProcessSecurityPolicy::GetInstance()->RegisterWebSafeScheme(
164 chrome::kExtensionScheme);
[email protected]b23b1b42012-05-18 19:09:16165 ChildProcessSecurityPolicy::GetInstance()->RegisterWebSafeScheme(
166 chrome::kExtensionResourceScheme);
[email protected]8add5412011-10-01 21:02:14167
[email protected]5a38dfd2012-07-23 23:22:10168 extension_event_router_forwarder_ = new extensions::EventRouterForwarder;
[email protected]fc4facd2011-03-22 23:18:50169
170 ExtensionTabIdMap::GetInstance()->Init();
initial.commit09911bf2008-07-26 23:55:29171}
172
173BrowserProcessImpl::~BrowserProcessImpl() {
[email protected]2e5b60a22011-11-28 15:56:41174 tracked_objects::ThreadData::EnsureCleanupWasCalled(4);
175
176 g_browser_process = NULL;
177}
178
179void BrowserProcessImpl::StartTearDown() {
[email protected]2e22e2f2012-03-15 21:53:10180#if defined(ENABLE_AUTOMATION)
initial.commit09911bf2008-07-26 23:55:29181 // Delete the AutomationProviderList before NotificationService,
182 // since it may try to unregister notifications
183 // Both NotificationService and AutomationProvider are singleton instances in
184 // the BrowserProcess. Since AutomationProvider may have some active
185 // notification observers, it is essential that it gets destroyed before the
186 // NotificationService. NotificationService won't be destroyed until after
187 // this destructor is run.
188 automation_provider_list_.reset();
[email protected]2e22e2f2012-03-15 21:53:10189#endif
initial.commit09911bf2008-07-26 23:55:29190
[email protected]d393a0fd2009-05-13 23:32:01191 // We need to shutdown the SdchDictionaryFetcher as it regularly holds
192 // a pointer to a URLFetcher, and that URLFetcher (upon destruction) will do
193 // a PostDelayedTask onto the IO thread. This shutdown call will both discard
194 // any pending URLFetchers, and avoid creating any more.
[email protected]cf956b982011-12-02 12:00:45195 BrowserThread::PostTask(BrowserThread::IO, FROM_HERE,
196 base::Bind(&SdchDictionaryFetcher::Shutdown));
[email protected]d393a0fd2009-05-13 23:32:01197
[email protected]54e26c122012-05-17 15:36:21198 // We need to destroy the MetricsService, VariationsService,
199 // IntranetRedirectDetector, and SafeBrowsing ClientSideDetectionService
200 // (owned by the SafeBrowsingService) before the io_thread_ gets destroyed,
201 // since their destructors can call the URLFetcher destructor, which does a
202 // PostDelayedTask operation on the IO thread. (The IO thread will handle that
203 // URLFetcher operation before going away.)
initial.commit09911bf2008-07-26 23:55:29204 metrics_service_.reset();
[email protected]54e26c122012-05-17 15:36:21205 variations_service_.reset();
[email protected]c4ff4952010-01-08 19:12:47206 intranet_redirect_detector_.reset();
[email protected]9efb46692011-08-23 12:56:05207#if defined(ENABLE_SAFE_BROWSING)
208 if (safe_browsing_service_.get()) {
209 safe_browsing_service()->ShutDown();
210 }
211#endif
initial.commit09911bf2008-07-26 23:55:29212
[email protected]d8a899c2010-09-21 04:50:33213 // Need to clear the desktop notification balloons before the io_thread_ and
214 // before the profiles, since if there are any still showing we will access
215 // those things during teardown.
216 notification_ui_manager_.reset();
217
initial.commit09911bf2008-07-26 23:55:29218 // Need to clear profiles (download managers) before the io_thread_.
219 profile_manager_.reset();
220
[email protected]81054f812012-08-30 00:47:09221#if !defined(OS_ANDROID)
initial.commit09911bf2008-07-26 23:55:29222 // Debugger must be cleaned up before IO thread and NotificationService.
[email protected]4475d232011-07-27 15:29:20223 remote_debugging_server_.reset();
[email protected]81054f812012-08-30 00:47:09224#endif
[email protected]4475d232011-07-27 15:29:20225
[email protected]fc4facd2011-03-22 23:18:50226 ExtensionTabIdMap::GetInstance()->Shutdown();
227
[email protected]3b19e8e2012-10-17 19:15:49228#if defined(ENABLE_CONFIGURATION_POLICY)
[email protected]985655a2011-02-23 09:54:25229 // The policy providers managed by |browser_policy_connector_| need to shut
230 // down while the IO and FILE threads are still alive.
[email protected]3b19e8e2012-10-17 19:15:49231 if (browser_policy_connector_)
232 browser_policy_connector_->Shutdown();
233#endif
[email protected]f2a893c2011-01-05 09:38:07234
[email protected]8fd11832011-07-14 20:01:13235 // Stop the watchdog thread before stopping other threads.
236 watchdog_thread_.reset();
[email protected]4189bc222012-03-29 23:11:47237
238#if defined(USE_AURA)
239 // Delete aura after the metrics service has been deleted as it accesses
240 // monitor information.
241 aura::Env::DeleteInstance();
242#endif
[email protected]2e5b60a22011-11-28 15:56:41243}
[email protected]8fd11832011-07-14 20:01:13244
[email protected]99907362012-01-11 05:41:40245void BrowserProcessImpl::PostDestroyThreads() {
246 // With the file_thread_ flushed, we can release any icon resources.
247 icon_manager_.reset();
initial.commit09911bf2008-07-26 23:55:29248
[email protected]99907362012-01-11 05:41:40249 // Reset associated state right after actual thread is stopped,
250 // as io_thread_.global_ cleanup happens in CleanUp on the IO
251 // thread, i.e. as the thread exits its message loop.
252 //
253 // This is important also because in various places, the
254 // IOThread object being NULL is considered synonymous with the
255 // IO thread having stopped.
256 io_thread_.reset();
initial.commit09911bf2008-07-26 23:55:29257}
258
[email protected]c6032e82010-09-13 20:06:05259#if defined(OS_WIN)
[email protected]af391f02011-09-15 06:13:35260// Send a QuitTask to the given MessageLoop when the (file) thread has processed
261// our (other) recent requests (to save preferences).
262// Change the boolean so that the receiving thread will know that we did indeed
263// send the QuitTask that terminated the message loop.
[email protected]295039bd2008-08-15 04:32:57264static void PostQuit(MessageLoop* message_loop) {
[email protected]af391f02011-09-15 06:13:35265 g_end_session_file_thread_has_completed = true;
[email protected]a778709f2011-12-10 00:28:17266 message_loop->PostTask(FROM_HERE, MessageLoop::QuitClosure());
[email protected]295039bd2008-08-15 04:32:57267}
[email protected]c6032e82010-09-13 20:06:05268#elif defined(USE_X11)
269static void Signal(base::WaitableEvent* event) {
270 event->Signal();
271}
272#endif
initial.commit09911bf2008-07-26 23:55:29273
[email protected]b443cb042009-12-15 22:05:09274unsigned int BrowserProcessImpl::AddRefModule() {
275 DCHECK(CalledOnValidThread());
[email protected]6b4e6852012-02-14 04:02:48276
277 // CHECK(!IsShuttingDown());
278 if (IsShuttingDown()) {
279 // Copy the stacktrace which released the final reference onto our stack so
280 // it will be available in the crash report for inspection.
281 base::debug::StackTrace callstack = release_last_reference_callstack_;
282 base::debug::Alias(&callstack);
283 CHECK(false);
284 }
285
[email protected]afd20c022010-06-10 00:48:20286 did_start_ = true;
[email protected]b443cb042009-12-15 22:05:09287 module_ref_count_++;
288 return module_ref_count_;
289}
290
291unsigned int BrowserProcessImpl::ReleaseModule() {
292 DCHECK(CalledOnValidThread());
[email protected]760d970a2010-05-18 00:39:18293 DCHECK_NE(0u, module_ref_count_);
[email protected]b443cb042009-12-15 22:05:09294 module_ref_count_--;
295 if (0 == module_ref_count_) {
[email protected]6b4e6852012-02-14 04:02:48296 release_last_reference_callstack_ = base::debug::StackTrace();
297
[email protected]658677f2012-06-09 06:04:02298#if defined(ENABLE_PRINTING)
[email protected]6869771f2012-05-19 00:30:57299 // Wait for the pending print jobs to finish. Don't do this later, since
300 // this might cause a nested message loop to run, and we don't want pending
301 // tasks to run once teardown has started.
302 print_job_manager_->OnQuit();
303 print_job_manager_.reset();
304#endif
305
[email protected]e6244c182011-11-01 22:06:58306 CHECK(MessageLoop::current()->is_running());
[email protected]03d8d3e92011-09-20 06:07:11307
308#if defined(OS_MACOSX)
[email protected]8d2f91e2011-09-15 22:38:04309 MessageLoop::current()->PostTask(
[email protected]03d8d3e92011-09-20 06:07:11310 FROM_HERE,
[email protected]b3cc0542011-11-19 22:43:44311 base::Bind(ChromeBrowserMainPartsMac::DidEndMainMessageLoop));
[email protected]03d8d3e92011-09-20 06:07:11312#endif
[email protected]b443cb042009-12-15 22:05:09313 MessageLoop::current()->Quit();
314 }
315 return module_ref_count_;
316}
317
initial.commit09911bf2008-07-26 23:55:29318void BrowserProcessImpl::EndSession() {
initial.commit09911bf2008-07-26 23:55:29319 // Mark all the profiles as clean.
320 ProfileManager* pm = profile_manager();
[email protected]844a1002011-04-19 11:37:21321 std::vector<Profile*> profiles(pm->GetLoadedProfiles());
322 for (size_t i = 0; i < profiles.size(); ++i)
[email protected]6c0ca7fc2012-10-05 16:27:22323 profiles[i]->SetExitType(Profile::EXIT_SESSION_ENDED);
initial.commit09911bf2008-07-26 23:55:29324
325 // Tell the metrics service it was cleanly shutdown.
326 MetricsService* metrics = g_browser_process->metrics_service();
327 if (metrics && local_state()) {
initial.commit09911bf2008-07-26 23:55:29328 metrics->RecordStartOfSessionEnd();
329
330 // MetricsService lazily writes to prefs, force it to write now.
[email protected]fbe17c8a2011-12-27 16:41:48331 local_state()->CommitPendingWrite();
initial.commit09911bf2008-07-26 23:55:29332 }
333
[email protected]79a75b02012-04-26 18:03:58334 // http://crbug.com/125207
335 base::ThreadRestrictions::ScopedAllowWait allow_wait;
336
initial.commit09911bf2008-07-26 23:55:29337 // We must write that the profile and metrics service shutdown cleanly,
338 // otherwise on startup we'll think we crashed. So we block until done and
339 // then proceed with normal shutdown.
[email protected]c6032e82010-09-13 20:06:05340#if defined(USE_X11)
341 // Can't run a local loop on linux. Instead create a waitable event.
[email protected]0bfbcdb2011-09-15 21:28:04342 scoped_ptr<base::WaitableEvent> done_writing(
343 new base::WaitableEvent(false, false));
[email protected]d04e7662010-10-10 22:24:48344 BrowserThread::PostTask(BrowserThread::FILE, FROM_HERE,
[email protected]b3cc0542011-11-19 22:43:44345 base::Bind(Signal, done_writing.get()));
[email protected]0bfbcdb2011-09-15 21:28:04346 // If all file writes haven't cleared in the timeout, leak the WaitableEvent
347 // so that there's no race to reference it in Signal().
348 if (!done_writing->TimedWait(
349 base::TimeDelta::FromSeconds(kEndSessionTimeoutSeconds)))
350 ignore_result(done_writing.release());
351
[email protected]c6032e82010-09-13 20:06:05352#elif defined(OS_WIN)
[email protected]d04e7662010-10-10 22:24:48353 BrowserThread::PostTask(BrowserThread::FILE, FROM_HERE,
[email protected]b3cc0542011-11-19 22:43:44354 base::Bind(PostQuit, MessageLoop::current()));
[email protected]af391f02011-09-15 06:13:35355 int quits_received = 0;
356 do {
357 MessageLoop::current()->Run();
358 ++quits_received;
359 } while (!g_end_session_file_thread_has_completed);
360 // If we did get extra quits, then we should re-post them to the message loop.
361 while (--quits_received > 0)
[email protected]a778709f2011-12-10 00:28:17362 MessageLoop::current()->PostTask(FROM_HERE, MessageLoop::QuitClosure());
[email protected]c6032e82010-09-13 20:06:05363#else
364 NOTIMPLEMENTED();
365#endif
initial.commit09911bf2008-07-26 23:55:29366}
367
[email protected]e13ad79b2010-07-22 21:36:50368MetricsService* BrowserProcessImpl::metrics_service() {
369 DCHECK(CalledOnValidThread());
370 if (!created_metrics_service_)
371 CreateMetricsService();
372 return metrics_service_.get();
373}
374
375IOThread* BrowserProcessImpl::io_thread() {
376 DCHECK(CalledOnValidThread());
[email protected]2e5b60a22011-11-28 15:56:41377 DCHECK(io_thread_.get());
[email protected]e13ad79b2010-07-22 21:36:50378 return io_thread_.get();
379}
380
[email protected]0b565182011-03-02 18:11:15381WatchDogThread* BrowserProcessImpl::watchdog_thread() {
382 DCHECK(CalledOnValidThread());
383 if (!created_watchdog_thread_)
384 CreateWatchdogThread();
385 DCHECK(watchdog_thread_.get() != NULL);
386 return watchdog_thread_.get();
387}
388
[email protected]e13ad79b2010-07-22 21:36:50389ProfileManager* BrowserProcessImpl::profile_manager() {
390 DCHECK(CalledOnValidThread());
391 if (!created_profile_manager_)
392 CreateProfileManager();
393 return profile_manager_.get();
394}
395
396PrefService* BrowserProcessImpl::local_state() {
397 DCHECK(CalledOnValidThread());
398 if (!created_local_state_)
399 CreateLocalState();
400 return local_state_.get();
401}
402
[email protected]abe2c032011-03-31 18:49:34403net::URLRequestContextGetter* BrowserProcessImpl::system_request_context() {
[email protected]db0e86dd2011-03-16 14:47:21404 DCHECK(CalledOnValidThread());
405 return io_thread()->system_url_request_context_getter();
406}
407
[email protected]04811242012-07-06 18:04:29408chrome_variations::VariationsService* BrowserProcessImpl::variations_service() {
[email protected]54e26c122012-05-17 15:36:21409 DCHECK(CalledOnValidThread());
410 if (!variations_service_.get())
[email protected]04811242012-07-06 18:04:29411 variations_service_.reset(new chrome_variations::VariationsService());
[email protected]54e26c122012-05-17 15:36:21412 return variations_service_.get();
413}
414
[email protected]db0e86dd2011-03-16 14:47:21415#if defined(OS_CHROMEOS)
[email protected]38489a32012-05-11 02:24:54416chromeos::OomPriorityManager* BrowserProcessImpl::oom_priority_manager() {
[email protected]5b869962011-09-20 19:49:33417 DCHECK(CalledOnValidThread());
418 if (!oom_priority_manager_.get())
[email protected]38489a32012-05-11 02:24:54419 oom_priority_manager_.reset(new chromeos::OomPriorityManager());
[email protected]5b869962011-09-20 19:49:33420 return oom_priority_manager_.get();
421}
[email protected]db0e86dd2011-03-16 14:47:21422#endif // defined(OS_CHROMEOS)
423
[email protected]5a38dfd2012-07-23 23:22:10424extensions::EventRouterForwarder*
[email protected]3ce02412011-03-01 12:01:15425BrowserProcessImpl::extension_event_router_forwarder() {
426 return extension_event_router_forwarder_.get();
427}
428
[email protected]e13ad79b2010-07-22 21:36:50429NotificationUIManager* BrowserProcessImpl::notification_ui_manager() {
430 DCHECK(CalledOnValidThread());
431 if (!created_notification_ui_manager_)
432 CreateNotificationUIManager();
433 return notification_ui_manager_.get();
434}
435
[email protected]985655a2011-02-23 09:54:25436policy::BrowserPolicyConnector* BrowserProcessImpl::browser_policy_connector() {
[email protected]f2a893c2011-01-05 09:38:07437 DCHECK(CalledOnValidThread());
[email protected]f31e2e52011-07-14 16:01:19438#if defined(ENABLE_CONFIGURATION_POLICY)
[email protected]3b19e8e2012-10-17 19:15:49439 if (!created_browser_policy_connector_) {
440 // Init() should not reenter this function. If it does this will DCHECK.
441 DCHECK(!browser_policy_connector_);
[email protected]5fe04582011-11-21 19:25:57442 browser_policy_connector_.reset(new policy::BrowserPolicyConnector());
443 browser_policy_connector_->Init();
[email protected]371e3ed2012-05-23 18:04:28444 created_browser_policy_connector_ = true;
[email protected]f2a893c2011-01-05 09:38:07445 }
[email protected]985655a2011-02-23 09:54:25446 return browser_policy_connector_.get();
[email protected]3b19e8e2012-10-17 19:15:49447#else
448 return NULL;
449#endif
[email protected]f2a893c2011-01-05 09:38:07450}
451
[email protected]a4179c2a2012-02-09 18:14:21452policy::PolicyService* BrowserProcessImpl::policy_service() {
453#if defined(ENABLE_CONFIGURATION_POLICY)
[email protected]3b19e8e2012-10-17 19:15:49454 return browser_policy_connector()->GetPolicyService();
[email protected]a4179c2a2012-02-09 18:14:21455#else
[email protected]3b19e8e2012-10-17 19:15:49456 if (!policy_service_.get())
[email protected]243ec0782012-02-14 21:03:02457 policy_service_.reset(new policy::PolicyServiceStub());
[email protected]8d6b2432012-03-31 12:11:18458 return policy_service_.get();
[email protected]3b19e8e2012-10-17 19:15:49459#endif
[email protected]a4179c2a2012-02-09 18:14:21460}
461
[email protected]e13ad79b2010-07-22 21:36:50462IconManager* BrowserProcessImpl::icon_manager() {
463 DCHECK(CalledOnValidThread());
464 if (!created_icon_manager_)
465 CreateIconManager();
466 return icon_manager_.get();
467}
468
[email protected]94e385322012-10-08 20:21:33469RenderWidgetSnapshotTaker* BrowserProcessImpl::GetRenderWidgetSnapshotTaker() {
470 return render_widget_snapshot_taker_.get();
[email protected]e13ad79b2010-07-22 21:36:50471}
472
[email protected]120655d2011-09-16 22:10:32473AutomationProviderList* BrowserProcessImpl::GetAutomationProviderList() {
[email protected]e13ad79b2010-07-22 21:36:50474 DCHECK(CalledOnValidThread());
[email protected]2e22e2f2012-03-15 21:53:10475#if defined(ENABLE_AUTOMATION)
[email protected]120655d2011-09-16 22:10:32476 if (automation_provider_list_.get() == NULL)
477 automation_provider_list_.reset(new AutomationProviderList());
[email protected]e13ad79b2010-07-22 21:36:50478 return automation_provider_list_.get();
[email protected]2e22e2f2012-03-15 21:53:10479#else
480 return NULL;
481#endif
[email protected]e13ad79b2010-07-22 21:36:50482}
483
[email protected]76698ea2012-08-24 20:50:37484void BrowserProcessImpl::CreateDevToolsHttpProtocolHandler(
[email protected]4475d232011-07-27 15:29:20485 Profile* profile,
[email protected]01000cf12011-02-04 11:39:22486 const std::string& ip,
[email protected]5613126e2011-01-31 15:27:55487 int port,
488 const std::string& frontend_url) {
[email protected]e13ad79b2010-07-22 21:36:50489 DCHECK(CalledOnValidThread());
[email protected]81054f812012-08-30 00:47:09490#if !defined(OS_ANDROID)
[email protected]76698ea2012-08-24 20:50:37491 // StartupBrowserCreator::LaunchBrowser can be run multiple times when browser
492 // is started with several profiles or existing browser process is reused.
493 if (!remote_debugging_server_.get()) {
494 remote_debugging_server_.reset(
495 new RemoteDebuggingServer(profile, ip, port, frontend_url));
496 }
[email protected]81054f812012-08-30 00:47:09497#endif
[email protected]5613126e2011-01-31 15:27:55498}
499
[email protected]e13ad79b2010-07-22 21:36:50500bool BrowserProcessImpl::IsShuttingDown() {
501 DCHECK(CalledOnValidThread());
502 return did_start_ && 0 == module_ref_count_;
503}
504
initial.commit09911bf2008-07-26 23:55:29505printing::PrintJobManager* BrowserProcessImpl::print_job_manager() {
506 // TODO(abarth): DCHECK(CalledOnValidThread());
[email protected]d8922f22010-05-07 00:57:27507 // http://code.google.com/p/chromium/issues/detail?id=6828
initial.commit09911bf2008-07-26 23:55:29508 // print_job_manager_ is initialized in the constructor and destroyed in the
509 // destructor, so it should always be valid.
510 DCHECK(print_job_manager_.get());
511 return print_job_manager_.get();
512}
513
[email protected]dbeebd52010-11-16 20:34:16514printing::PrintPreviewTabController*
515 BrowserProcessImpl::print_preview_tab_controller() {
[email protected]658677f2012-06-09 06:04:02516#if defined(ENABLE_PRINTING)
[email protected]dbeebd52010-11-16 20:34:16517 DCHECK(CalledOnValidThread());
518 if (!print_preview_tab_controller_.get())
519 CreatePrintPreviewTabController();
520 return print_preview_tab_controller_.get();
[email protected]658677f2012-06-09 06:04:02521#else
522 NOTIMPLEMENTED();
523 return NULL;
[email protected]058e5732012-03-01 22:48:03524#endif
[email protected]dbeebd52010-11-16 20:34:16525}
526
[email protected]68f88b992011-05-07 02:01:39527printing::BackgroundPrintingManager*
528 BrowserProcessImpl::background_printing_manager() {
[email protected]658677f2012-06-09 06:04:02529#if defined(ENABLE_PRINTING)
[email protected]68f88b992011-05-07 02:01:39530 DCHECK(CalledOnValidThread());
531 if (!background_printing_manager_.get())
532 CreateBackgroundPrintingManager();
533 return background_printing_manager_.get();
[email protected]658677f2012-06-09 06:04:02534#else
535 NOTIMPLEMENTED();
536 return NULL;
[email protected]058e5732012-03-01 22:48:03537#endif
[email protected]68f88b992011-05-07 02:01:39538}
539
[email protected]e13ad79b2010-07-22 21:36:50540IntranetRedirectDetector* BrowserProcessImpl::intranet_redirect_detector() {
541 DCHECK(CalledOnValidThread());
542 if (!intranet_redirect_detector_.get())
543 CreateIntranetRedirectDetector();
544 return intranet_redirect_detector_.get();
545}
546
547const std::string& BrowserProcessImpl::GetApplicationLocale() {
548 DCHECK(!locale_.empty());
549 return locale_;
550}
551
552void BrowserProcessImpl::SetApplicationLocale(const std::string& locale) {
553 locale_ = locale;
554 extension_l10n_util::SetProcessLocale(locale);
[email protected]e9a32a52012-06-14 23:32:43555 static_cast<chrome::ChromeContentBrowserClient*>(
556 content::GetContentClient()->browser())->SetApplicationLocale(locale);
[email protected]e13ad79b2010-07-22 21:36:50557}
558
[email protected]073ed7b2010-09-27 09:20:02559DownloadStatusUpdater* BrowserProcessImpl::download_status_updater() {
[email protected]7a0e72f2011-09-20 19:59:11560 return download_status_updater_.get();
[email protected]073ed7b2010-09-27 09:20:02561}
562
[email protected]195c99c2012-10-31 06:24:51563BookmarkPromptController* BrowserProcessImpl::bookmark_prompt_controller() {
564#if defined(OS_ANDROID)
565 return NULL;
566#else
567 return bookmark_prompt_controller_.get();
568#endif
569}
570
[email protected]254ed742011-08-16 18:45:27571DownloadRequestLimiter* BrowserProcessImpl::download_request_limiter() {
572 DCHECK(CalledOnValidThread());
573 if (!download_request_limiter_)
574 download_request_limiter_ = new DownloadRequestLimiter();
575 return download_request_limiter_;
576}
577
[email protected]9e7f015f2011-05-28 00:24:25578BackgroundModeManager* BrowserProcessImpl::background_mode_manager() {
579 DCHECK(CalledOnValidThread());
[email protected]7cee1902012-08-23 00:02:45580#if defined(ENABLE_BACKGROUND)
[email protected]9e7f015f2011-05-28 00:24:25581 if (!background_mode_manager_.get())
582 CreateBackgroundModeManager();
583 return background_mode_manager_.get();
[email protected]7cee1902012-08-23 00:02:45584#else
585 NOTIMPLEMENTED();
586 return NULL;
587#endif
[email protected]9e7f015f2011-05-28 00:24:25588}
589
590StatusTray* BrowserProcessImpl::status_tray() {
591 DCHECK(CalledOnValidThread());
592 if (!status_tray_.get())
593 CreateStatusTray();
594 return status_tray_.get();
595}
596
[email protected]462a0ff2011-06-02 17:15:34597
598SafeBrowsingService* BrowserProcessImpl::safe_browsing_service() {
599 DCHECK(CalledOnValidThread());
600 if (!created_safe_browsing_service_)
601 CreateSafeBrowsingService();
602 return safe_browsing_service_.get();
603}
604
[email protected]a7a5e992010-12-09 23:39:51605safe_browsing::ClientSideDetectionService*
606 BrowserProcessImpl::safe_browsing_detection_service() {
607 DCHECK(CalledOnValidThread());
[email protected]9efb46692011-08-23 12:56:05608 if (safe_browsing_service())
609 return safe_browsing_service()->safe_browsing_detection_service();
610 return NULL;
[email protected]a7a5e992010-12-09 23:39:51611}
612
[email protected]a6a7ced2012-11-01 17:24:18613void BrowserProcessImpl::OnPreferenceChanged(PrefServiceBase* service,
614 const std::string& pref) {
615 if (pref == prefs::kDefaultBrowserSettingEnabled) {
616 ApplyDefaultBrowserPolicy();
617 } else if (pref == prefs::kDisabledSchemes) {
618 ApplyDisabledSchemesPolicy();
619 } else if (pref == prefs::kAllowCrossOriginAuthPrompt) {
620 ApplyAllowCrossOriginAuthPromptPolicy();
[email protected]6618d1d2010-12-15 21:18:47621 }
622}
623
[email protected]e13ad79b2010-07-22 21:36:50624#if (defined(OS_WIN) || defined(OS_LINUX)) && !defined(OS_CHROMEOS)
625void BrowserProcessImpl::StartAutoupdateTimer() {
[email protected]d323a172011-09-02 18:23:02626 autoupdate_timer_.Start(FROM_HERE,
[email protected]e13ad79b2010-07-22 21:36:50627 base::TimeDelta::FromHours(kUpdateCheckIntervalHours),
628 this,
629 &BrowserProcessImpl::OnAutoupdateTimer);
630}
631#endif
632
[email protected]d6f37fc2011-02-13 23:58:41633ChromeNetLog* BrowserProcessImpl::net_log() {
634 return net_log_.get();
635}
636
[email protected]1459fb62011-05-25 19:03:27637prerender::PrerenderTracker* BrowserProcessImpl::prerender_tracker() {
638 if (!prerender_tracker_.get())
639 prerender_tracker_.reset(new prerender::PrerenderTracker);
640
641 return prerender_tracker_.get();
642}
643
[email protected]c1adf5a2011-08-03 22:11:37644ComponentUpdateService* BrowserProcessImpl::component_updater() {
645#if defined(OS_CHROMEOS)
646 return NULL;
647#else
648 if (!component_updater_.get()) {
649 ComponentUpdateService::Configurator* configurator =
650 MakeChromeComponentUpdaterConfigurator(
651 CommandLine::ForCurrentProcess(),
652 io_thread()->system_url_request_context_getter());
653 // Creating the component updater does not do anything, components
654 // need to be registered and Start() needs to be called.
655 component_updater_.reset(ComponentUpdateServiceFactory(configurator));
656 }
657 return component_updater_.get();
[email protected]c1adf5a2011-08-03 22:11:37658#endif
[email protected]aafbcb572011-08-03 22:22:32659}
[email protected]c1adf5a2011-08-03 22:11:37660
[email protected]ca167a32011-09-30 15:19:11661CRLSetFetcher* BrowserProcessImpl::crl_set_fetcher() {
662#if defined(OS_CHROMEOS)
663 // There's no component updater on ChromeOS so there can't be a CRLSetFetcher
664 // either.
665 return NULL;
666#else
667 if (!crl_set_fetcher_.get()) {
668 crl_set_fetcher_ = new CRLSetFetcher();
669 }
670 return crl_set_fetcher_.get();
671#endif
672}
673
[email protected]99907362012-01-11 05:41:40674void BrowserProcessImpl::ResourceDispatcherHostCreated() {
[email protected]8bcdf072011-06-03 16:52:15675 resource_dispatcher_host_delegate_.reset(
[email protected]ea114722012-03-12 01:11:25676 new ChromeResourceDispatcherHostDelegate(prerender_tracker()));
677 ResourceDispatcherHost::Get()->SetDelegate(
678 resource_dispatcher_host_delegate_.get());
[email protected]40850a52011-05-26 22:07:35679
680 pref_change_registrar_.Add(prefs::kAllowCrossOriginAuthPrompt, this);
681 ApplyAllowCrossOriginAuthPromptPolicy();
initial.commit09911bf2008-07-26 23:55:29682}
683
684void BrowserProcessImpl::CreateMetricsService() {
685 DCHECK(!created_metrics_service_ && metrics_service_.get() == NULL);
686 created_metrics_service_ = true;
687
688 metrics_service_.reset(new MetricsService);
689}
690
[email protected]0b565182011-03-02 18:11:15691void BrowserProcessImpl::CreateWatchdogThread() {
692 DCHECK(!created_watchdog_thread_ && watchdog_thread_.get() == NULL);
693 created_watchdog_thread_ = true;
694
695 scoped_ptr<WatchDogThread> thread(new WatchDogThread());
696 if (!thread->Start())
697 return;
698 watchdog_thread_.swap(thread);
699}
700
initial.commit09911bf2008-07-26 23:55:29701void BrowserProcessImpl::CreateProfileManager() {
702 DCHECK(!created_profile_manager_ && profile_manager_.get() == NULL);
703 created_profile_manager_ = true;
704
[email protected]49a25632011-08-31 17:03:48705 FilePath user_data_dir;
706 PathService::Get(chrome::DIR_USER_DATA, &user_data_dir);
707 profile_manager_.reset(new ProfileManager(user_data_dir));
initial.commit09911bf2008-07-26 23:55:29708}
709
710void BrowserProcessImpl::CreateLocalState() {
711 DCHECK(!created_local_state_ && local_state_.get() == NULL);
712 created_local_state_ = true;
713
[email protected]b9636002009-03-04 00:05:25714 FilePath local_state_path;
[email protected]0de615a2012-11-08 04:40:59715 CHECK(PathService::Get(chrome::FILE_LOCAL_STATE, &local_state_path));
[email protected]f2d1f612010-12-09 15:10:17716 local_state_.reset(
[email protected]0de615a2012-11-08 04:40:59717 PrefService::CreatePrefService(local_state_path, local_state_task_runner_,
718 policy_service(), NULL, false));
[email protected]492d2142010-09-10 13:55:18719
[email protected]caf63aea2011-04-26 11:04:10720 // Initialize the prefs of the local state.
[email protected]572f40c9b2012-07-06 20:35:33721 chrome::RegisterLocalState(local_state_.get());
[email protected]caf63aea2011-04-26 11:04:10722
[email protected]2a7e7c152010-10-01 20:12:09723 pref_change_registrar_.Init(local_state_.get());
724
[email protected]e450fa62011-02-01 12:52:56725 // Initialize the notification for the default browser setting policy.
726 local_state_->RegisterBooleanPref(prefs::kDefaultBrowserSettingEnabled,
727 false);
[email protected]e450fa62011-02-01 12:52:56728 pref_change_registrar_.Add(prefs::kDefaultBrowserSettingEnabled, this);
[email protected]8b08a47f2011-02-25 12:36:37729
[email protected]cb166d4e3f2012-11-01 06:36:08730 // This policy needs to be defined before the net subsystem is initialized,
731 // so we do it here.
[email protected]12c84e22011-07-11 09:35:45732 local_state_->RegisterIntegerPref(prefs::kMaxConnectionsPerProxy,
733 net::kDefaultMaxSocketsPerProxyServer);
734 int max_per_proxy = local_state_->GetInteger(prefs::kMaxConnectionsPerProxy);
735 net::ClientSocketPoolManager::set_max_sockets_per_proxy_server(
[email protected]a8af2152012-03-21 20:29:52736 net::HttpNetworkSession::NORMAL_SOCKET_POOL,
[email protected]12c84e22011-07-11 09:35:45737 std::max(std::min(max_per_proxy, 99),
[email protected]a8af2152012-03-21 20:29:52738 net::ClientSocketPoolManager::max_sockets_per_group(
739 net::HttpNetworkSession::NORMAL_SOCKET_POOL)));
[email protected]12c84e22011-07-11 09:35:45740
[email protected]b99c41c2011-04-27 15:18:48741 // This is observed by ChildProcessSecurityPolicy, which lives in content/
742 // though, so it can't register itself.
[email protected]419a0572011-04-18 22:21:46743 local_state_->RegisterListPref(prefs::kDisabledSchemes);
[email protected]b99c41c2011-04-27 15:18:48744 pref_change_registrar_.Add(prefs::kDisabledSchemes, this);
[email protected]419a0572011-04-18 22:21:46745 ApplyDisabledSchemesPolicy();
[email protected]199b4bd072011-11-08 17:45:52746
747 local_state_->RegisterBooleanPref(prefs::kAllowCrossOriginAuthPrompt, false);
[email protected]770c6d82012-09-06 22:21:32748
749#if defined(OS_WIN)
750 if (base::win::GetVersion() >= base::win::VERSION_WIN8)
751 local_state_->RegisterBooleanPref(prefs::kRestartSwitchMode, false);
752#endif
[email protected]fd6159a2010-09-03 09:38:39753}
initial.commit09911bf2008-07-26 23:55:29754
[email protected]99907362012-01-11 05:41:40755void BrowserProcessImpl::PreCreateThreads() {
756 io_thread_.reset(new IOThread(
757 local_state(), net_log_.get(), extension_event_router_forwarder_.get()));
758}
759
[email protected]d2caaa22011-12-12 03:04:15760void BrowserProcessImpl::PreMainMessageLoopRun() {
[email protected]99907362012-01-11 05:41:40761 PluginService* plugin_service = PluginService::GetInstance();
762 plugin_service->SetFilter(ChromePluginServiceFilter::GetInstance());
763 plugin_service->StartWatchingPlugins();
764
765 // Register the internal Flash if available.
766 FilePath path;
767 if (!CommandLine::ForCurrentProcess()->HasSwitch(
768 switches::kDisableInternalFlash) &&
[email protected]c9bd7652012-09-07 22:33:30769 PathService::Get(chrome::FILE_FLASH_PLUGIN_EXISTING, &path)) {
[email protected]99907362012-01-11 05:41:40770 plugin_service->AddExtraPluginPath(path);
771 }
772
[email protected]794b8f22012-04-25 23:59:26773 // Register bundled Pepper Flash if available.
774 content::PepperPluginInfo plugin;
775 bool add_at_beginning = false;
776 chrome::ChromeContentClient* content_client =
777 static_cast<chrome::ChromeContentClient*>(content::GetContentClient());
[email protected]21620c212012-05-02 02:07:45778 if (content_client->GetBundledFieldTrialPepperFlash(&plugin,
779 &add_at_beginning)) {
[email protected]794b8f22012-04-25 23:59:26780 plugin_service->RegisterInternalPlugin(plugin.ToWebPluginInfo(),
781 add_at_beginning);
782 }
783
[email protected]99907362012-01-11 05:41:40784#if defined(OS_POSIX)
785 // Also find plugins in a user-specific plugins dir,
786 // e.g. ~/.config/chromium/Plugins.
787 FilePath user_data_dir;
788 if (PathService::Get(chrome::DIR_USER_DATA, &user_data_dir)) {
[email protected]c6f3dea2012-01-14 02:23:11789 plugin_service->AddExtraPluginDir(user_data_dir.Append("Plugins"));
[email protected]99907362012-01-11 05:41:40790 }
791#endif
792
[email protected]d2caaa22011-12-12 03:04:15793 if (local_state_->IsManagedPreference(prefs::kDefaultBrowserSettingEnabled))
794 ApplyDefaultBrowserPolicy();
[email protected]de75c702012-09-25 23:06:02795
796 // Triggers initialization of the singleton instance on UI thread.
797 PluginFinder::GetInstance()->Init();
[email protected]2366a3a2012-10-02 20:41:14798
799#if defined(ENABLE_PLUGIN_INSTALLATION)
800 if (!plugins_resource_service_) {
801 plugins_resource_service_ = new PluginsResourceService(local_state());
802 plugins_resource_service_->StartAfterDelay();
803 }
804#endif
[email protected]195c99c2012-10-31 06:24:51805
806#if !defined(OS_ANDROID)
807 if (browser_defaults::bookmarks_enabled)
808 bookmark_prompt_controller_.reset(new BookmarkPromptController());
809#endif
[email protected]d2caaa22011-12-12 03:04:15810}
811
initial.commit09911bf2008-07-26 23:55:29812void BrowserProcessImpl::CreateIconManager() {
813 DCHECK(!created_icon_manager_ && icon_manager_.get() == NULL);
814 created_icon_manager_ = true;
815 icon_manager_.reset(new IconManager);
816}
817
[email protected]c4ff4952010-01-08 19:12:47818void BrowserProcessImpl::CreateIntranetRedirectDetector() {
819 DCHECK(intranet_redirect_detector_.get() == NULL);
820 scoped_ptr<IntranetRedirectDetector> intranet_redirect_detector(
821 new IntranetRedirectDetector);
822 intranet_redirect_detector_.swap(intranet_redirect_detector);
823}
824
[email protected]29672ab2009-10-30 03:44:03825void BrowserProcessImpl::CreateNotificationUIManager() {
[email protected]29cebbd2012-06-06 21:43:42826#if defined(ENABLE_NOTIFICATIONS)
[email protected]29672ab2009-10-30 03:44:03827 DCHECK(notification_ui_manager_.get() == NULL);
[email protected]b0b2a3dd2011-01-06 00:30:05828 notification_ui_manager_.reset(NotificationUIManager::Create(local_state()));
[email protected]29672ab2009-10-30 03:44:03829 created_notification_ui_manager_ = true;
[email protected]29cebbd2012-06-06 21:43:42830#endif
[email protected]29672ab2009-10-30 03:44:03831}
832
[email protected]9e7f015f2011-05-28 00:24:25833void BrowserProcessImpl::CreateBackgroundModeManager() {
834 DCHECK(background_mode_manager_.get() == NULL);
835 background_mode_manager_.reset(
[email protected]279170832011-10-12 23:38:03836 new BackgroundModeManager(CommandLine::ForCurrentProcess(),
837 &profile_manager()->GetProfileInfoCache()));
[email protected]9e7f015f2011-05-28 00:24:25838}
839
840void BrowserProcessImpl::CreateStatusTray() {
841 DCHECK(status_tray_.get() == NULL);
842 status_tray_.reset(StatusTray::Create());
843}
844
[email protected]dbeebd52010-11-16 20:34:16845void BrowserProcessImpl::CreatePrintPreviewTabController() {
[email protected]658677f2012-06-09 06:04:02846#if defined(ENABLE_PRINTING)
[email protected]dbeebd52010-11-16 20:34:16847 DCHECK(print_preview_tab_controller_.get() == NULL);
848 print_preview_tab_controller_ = new printing::PrintPreviewTabController();
[email protected]658677f2012-06-09 06:04:02849#else
850 NOTIMPLEMENTED();
[email protected]058e5732012-03-01 22:48:03851#endif
[email protected]dbeebd52010-11-16 20:34:16852}
853
[email protected]68f88b992011-05-07 02:01:39854void BrowserProcessImpl::CreateBackgroundPrintingManager() {
[email protected]658677f2012-06-09 06:04:02855#if defined(ENABLE_PRINTING)
[email protected]68f88b992011-05-07 02:01:39856 DCHECK(background_printing_manager_.get() == NULL);
857 background_printing_manager_.reset(new printing::BackgroundPrintingManager());
[email protected]658677f2012-06-09 06:04:02858#else
859 NOTIMPLEMENTED();
860#endif
[email protected]68f88b992011-05-07 02:01:39861}
862
[email protected]462a0ff2011-06-02 17:15:34863void BrowserProcessImpl::CreateSafeBrowsingService() {
864 DCHECK(safe_browsing_service_.get() == NULL);
[email protected]8c40da62011-07-13 22:58:46865 // Set this flag to true so that we don't retry indefinitely to
866 // create the service class if there was an error.
[email protected]462a0ff2011-06-02 17:15:34867 created_safe_browsing_service_ = true;
[email protected]4b58e7d2011-07-11 10:22:56868#if defined(ENABLE_SAFE_BROWSING)
[email protected]462a0ff2011-06-02 17:15:34869 safe_browsing_service_ = SafeBrowsingService::CreateSafeBrowsingService();
870 safe_browsing_service_->Initialize();
[email protected]4b58e7d2011-07-11 10:22:56871#endif
[email protected]462a0ff2011-06-02 17:15:34872}
873
[email protected]419a0572011-04-18 22:21:46874void BrowserProcessImpl::ApplyDisabledSchemesPolicy() {
875 std::set<std::string> schemes;
[email protected]b99c41c2011-04-27 15:18:48876 const ListValue* scheme_list = local_state_->GetList(prefs::kDisabledSchemes);
877 for (ListValue::const_iterator iter = scheme_list->begin();
878 iter != scheme_list->end(); ++iter) {
[email protected]419a0572011-04-18 22:21:46879 std::string scheme;
880 if ((*iter)->GetAsString(&scheme))
881 schemes.insert(scheme);
882 }
883 ChildProcessSecurityPolicy::GetInstance()->RegisterDisabledSchemes(schemes);
884}
885
[email protected]b61f62a2011-11-01 02:02:10886void BrowserProcessImpl::ApplyDefaultBrowserPolicy() {
887 if (local_state_->GetBoolean(prefs::kDefaultBrowserSettingEnabled)) {
888 scoped_refptr<ShellIntegration::DefaultWebClientWorker>
889 set_browser_worker = new ShellIntegration::DefaultBrowserWorker(NULL);
890 set_browser_worker->StartSetAsDefault();
891 }
892}
893
[email protected]40850a52011-05-26 22:07:35894void BrowserProcessImpl::ApplyAllowCrossOriginAuthPromptPolicy() {
895 bool value = local_state()->GetBoolean(prefs::kAllowCrossOriginAuthPrompt);
[email protected]ea114722012-03-12 01:11:25896 ResourceDispatcherHost::Get()->SetAllowCrossOriginAuthPrompt(value);
[email protected]40850a52011-05-26 22:07:35897}
898
[email protected]3cdacd42010-04-30 18:55:53899// Mac is currently not supported.
900#if (defined(OS_WIN) || defined(OS_LINUX)) && !defined(OS_CHROMEOS)
[email protected]bd48c2b02010-04-09 20:32:42901
902bool BrowserProcessImpl::CanAutorestartForUpdate() const {
903 // Check if browser is in the background and if it needs to be restarted to
904 // apply a pending update.
[email protected]2e6389f2012-05-18 19:41:25905 return BrowserList::size() == 0 && browser::WillKeepAlive() &&
[email protected]815856722011-04-13 17:19:19906 upgrade_util::IsUpdatePendingRestart();
[email protected]bd48c2b02010-04-09 20:32:42907}
908
[email protected]5c08f222010-09-22 09:37:21909// Switches to add when auto-restarting Chrome.
[email protected]6c10c972010-08-11 04:15:47910const char* const kSwitchesToAddOnAutorestart[] = {
[email protected]f9a06842010-08-21 00:32:40911 switches::kNoStartupWindow
[email protected]bd48c2b02010-04-09 20:32:42912};
913
[email protected]f6e6d2e2011-10-28 18:39:22914void BrowserProcessImpl::RestartBackgroundInstance() {
[email protected]bd48c2b02010-04-09 20:32:42915 CommandLine* old_cl = CommandLine::ForCurrentProcess();
[email protected]3cdacd42010-04-30 18:55:53916 scoped_ptr<CommandLine> new_cl(new CommandLine(old_cl->GetProgram()));
[email protected]bd48c2b02010-04-09 20:32:42917
918 std::map<std::string, CommandLine::StringType> switches =
919 old_cl->GetSwitches();
920
[email protected]5c08f222010-09-22 09:37:21921 switches::RemoveSwitchesForAutostart(&switches);
[email protected]bd48c2b02010-04-09 20:32:42922
923 // Append the rest of the switches (along with their values, if any)
924 // to the new command line
925 for (std::map<std::string, CommandLine::StringType>::const_iterator i =
926 switches.begin(); i != switches.end(); ++i) {
927 CommandLine::StringType switch_value = i->second;
928 if (switch_value.length() > 0) {
[email protected]05076ba22010-07-30 05:59:57929 new_cl->AppendSwitchNative(i->first, i->second);
[email protected]bd48c2b02010-04-09 20:32:42930 } else {
[email protected]3cdacd42010-04-30 18:55:53931 new_cl->AppendSwitch(i->first);
[email protected]bd48c2b02010-04-09 20:32:42932 }
933 }
934
[email protected]6c10c972010-08-11 04:15:47935 // Ensure that our desired switches are set on the new process.
[email protected]5c08f222010-09-22 09:37:21936 for (size_t i = 0; i < arraysize(kSwitchesToAddOnAutorestart); ++i) {
[email protected]6c10c972010-08-11 04:15:47937 if (!new_cl->HasSwitch(kSwitchesToAddOnAutorestart[i]))
938 new_cl->AppendSwitch(kSwitchesToAddOnAutorestart[i]);
939 }
[email protected]bd48c2b02010-04-09 20:32:42940
[email protected]3cdacd42010-04-30 18:55:53941 DLOG(WARNING) << "Shutting down current instance of the browser.";
[email protected]2e6389f2012-05-18 19:41:25942 browser::AttemptExit();
[email protected]3cdacd42010-04-30 18:55:53943
944 // Transfer ownership to Upgrade.
[email protected]815856722011-04-13 17:19:19945 upgrade_util::SetNewCommandLine(new_cl.release());
[email protected]bd48c2b02010-04-09 20:32:42946}
947
948void BrowserProcessImpl::OnAutoupdateTimer() {
949 if (CanAutorestartForUpdate()) {
[email protected]3cdacd42010-04-30 18:55:53950 DLOG(WARNING) << "Detected update. Restarting browser.";
[email protected]f6e6d2e2011-10-28 18:39:22951 RestartBackgroundInstance();
[email protected]bd48c2b02010-04-09 20:32:42952 }
953}
954
[email protected]3cdacd42010-04-30 18:55:53955#endif // (defined(OS_WIN) || defined(OS_LINUX)) && !defined(OS_CHROMEOS)