blob: 0d4be7ffa69f492cdc8eea6be4e73b369b773059 [file] [log] [blame]
[email protected]f2a893c2011-01-05 09:38:071// Copyright (c) 2011 The Chromium Authors. All rights reserved.
license.botbf09a502008-08-24 00:55:552// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
initial.commit09911bf2008-07-26 23:55:294
5#include "chrome/browser/browser_process_impl.h"
6
[email protected]3cdacd42010-04-30 18:55:537#include <map>
[email protected]68f88b992011-05-07 02:01:398#include <set>
9#include <vector>
[email protected]3cdacd42010-04-30 18:55:5310
initial.commit09911bf2008-07-26 23:55:2911#include "base/command_line.h"
[email protected]6641bf662009-08-21 00:34:0912#include "base/file_util.h"
initial.commit09911bf2008-07-26 23:55:2913#include "base/path_service.h"
[email protected]985655a2011-02-23 09:54:2514#include "base/synchronization/waitable_event.h"
[email protected]c6032e82010-09-13 20:06:0515#include "base/task.h"
[email protected]34b99632011-01-01 01:01:0616#include "base/threading/thread.h"
17#include "base/threading/thread_restrictions.h"
[email protected]e13ad79b2010-07-22 21:36:5018#include "chrome/browser/automation/automation_provider_list.h"
[email protected]a07676b22011-06-17 16:36:5319#include "chrome/browser/background/background_mode_manager.h"
[email protected]b443cb042009-12-15 22:05:0920#include "chrome/browser/browser_main.h"
[email protected]0ac83682010-01-22 17:46:2721#include "chrome/browser/browser_process_sub_thread.h"
[email protected]ac262c9f2008-10-19 17:45:2122#include "chrome/browser/browser_trial.h"
[email protected]0639cfd2011-07-20 11:38:0323#include "chrome/browser/debugger/devtools_protocol_handler.h"
[email protected]4475d232011-07-27 15:29:2024#include "chrome/browser/debugger/remote_debugging_server.h"
[email protected]6c69796d2010-07-16 21:41:1625#include "chrome/browser/download/download_file_manager.h"
[email protected]3ce02412011-03-01 12:01:1526#include "chrome/browser/extensions/extension_event_router_forwarder.h"
[email protected]fc4facd2011-03-22 23:18:5027#include "chrome/browser/extensions/extension_tab_id_map.h"
[email protected]214538842011-04-01 18:47:2428#include "chrome/browser/extensions/user_script_listener.h"
[email protected]815856722011-04-13 17:19:1929#include "chrome/browser/first_run/upgrade_util.h"
[email protected]f7578f52010-08-30 22:22:4930#include "chrome/browser/google/google_url_tracker.h"
[email protected]dcefa302009-05-20 00:24:3931#include "chrome/browser/icon_manager.h"
[email protected]c4ff4952010-01-08 19:12:4732#include "chrome/browser/intranet_redirect_detector.h"
[email protected]0ac83682010-01-22 17:46:2733#include "chrome/browser/io_thread.h"
[email protected]dc6f4962009-02-13 01:25:5034#include "chrome/browser/metrics/metrics_service.h"
[email protected]0b565182011-03-02 18:11:1535#include "chrome/browser/metrics/thread_watcher.h"
[email protected]b2fcd0e2010-12-01 15:19:4036#include "chrome/browser/net/chrome_net_log.h"
[email protected]3530cd92010-06-27 06:22:0137#include "chrome/browser/net/predictor_api.h"
[email protected]d393a0fd2009-05-13 23:32:0138#include "chrome/browser/net/sdch_dictionary_fetcher.h"
[email protected]29672ab2009-10-30 03:44:0339#include "chrome/browser/notifications/notification_ui_manager.h"
[email protected]985655a2011-02-23 09:54:2540#include "chrome/browser/policy/browser_policy_connector.h"
[email protected]caf63aea2011-04-26 11:04:1041#include "chrome/browser/prefs/browser_prefs.h"
[email protected]37858e52010-08-26 00:22:0242#include "chrome/browser/prefs/pref_service.h"
[email protected]1459fb62011-05-25 19:03:2743#include "chrome/browser/prerender/prerender_tracker.h"
[email protected]68f88b992011-05-07 02:01:3944#include "chrome/browser/printing/background_printing_manager.h"
[email protected]e06131d2010-02-10 18:40:3345#include "chrome/browser/printing/print_job_manager.h"
[email protected]dbeebd52010-11-16 20:34:1646#include "chrome/browser/printing/print_preview_tab_controller.h"
[email protected]8ecad5e2010-12-02 21:18:3347#include "chrome/browser/profiles/profile_manager.h"
[email protected]8bcdf072011-06-03 16:52:1548#include "chrome/browser/renderer_host/chrome_resource_dispatcher_host_delegate.h"
[email protected]a7a5e992010-12-09 23:39:5149#include "chrome/browser/safe_browsing/client_side_detection_service.h"
[email protected]81218f42009-02-05 18:48:0850#include "chrome/browser/safe_browsing/safe_browsing_service.h"
[email protected]e450fa62011-02-01 12:52:5651#include "chrome/browser/shell_integration.h"
[email protected]8b8e7c92010-08-19 18:05:5652#include "chrome/browser/sidebar/sidebar_manager.h"
[email protected]9e7f015f2011-05-28 00:24:2553#include "chrome/browser/status_icons/status_tray.h"
[email protected]0b4d3382010-07-14 16:13:0454#include "chrome/browser/tab_closeable_state_watcher.h"
[email protected]71b73f02011-04-06 15:57:2955#include "chrome/browser/ui/browser_list.h"
[email protected]87522db92011-07-28 23:44:1456#include "chrome/browser/web_resource/gpu_blacklist_updater.h"
[email protected]4ef795df2010-02-03 02:35:0857#include "chrome/common/chrome_constants.h"
[email protected]432115822011-07-10 15:52:2758#include "chrome/common/chrome_notification_types.h"
initial.commit09911bf2008-07-26 23:55:2959#include "chrome/common/chrome_paths.h"
60#include "chrome/common/chrome_switches.h"
[email protected]de23f3f2011-05-18 16:20:2361#include "chrome/common/default_plugin.h"
[email protected]f1b6de22010-03-06 12:13:4762#include "chrome/common/extensions/extension_l10n_util.h"
[email protected]985655a2011-02-23 09:54:2563#include "chrome/common/extensions/extension_resource.h"
[email protected]ea587b02010-05-21 15:01:3564#include "chrome/common/json_pref_store.h"
initial.commit09911bf2008-07-26 23:55:2965#include "chrome/common/pref_names.h"
[email protected]5c08f222010-09-22 09:37:2166#include "chrome/common/switch_utils.h"
[email protected]985655a2011-02-23 09:54:2567#include "chrome/common/url_constants.h"
[email protected]bd48c2b02010-04-09 20:32:4268#include "chrome/installer/util/google_update_constants.h"
[email protected]a01efd22011-03-01 00:38:3269#include "content/browser/browser_child_process_host.h"
70#include "content/browser/browser_thread.h"
[email protected]419a0572011-04-18 22:21:4671#include "content/browser/child_process_security_policy.h"
[email protected]b46442d7e2011-06-29 02:16:0672#include "content/browser/debugger/devtools_manager.h"
[email protected]8f6a3b852011-07-19 16:48:5673#include "content/browser/download/mhtml_generation_manager.h"
[email protected]0ffaa482011-07-14 23:41:2874#include "content/browser/download/save_file_manager.h"
[email protected]d9f37932011-05-09 20:09:2475#include "content/browser/gpu/gpu_process_host_ui_shim.h"
[email protected]6eac57a2011-07-12 21:15:0976#include "content/browser/net/browser_online_state_observer.h"
[email protected]a01efd22011-03-01 00:38:3277#include "content/browser/plugin_service.h"
78#include "content/browser/renderer_host/render_process_host.h"
79#include "content/browser/renderer_host/resource_dispatcher_host.h"
[email protected]f20d7332011-03-08 21:11:5380#include "content/common/notification_service.h"
[email protected]18590f22011-07-29 16:41:2881#include "content/common/url_fetcher.h"
[email protected]d55aaa132009-09-28 21:08:0482#include "ipc/ipc_logging.h"
[email protected]12c84e22011-07-11 09:35:4583#include "net/socket/client_socket_pool_manager.h"
[email protected]abe2c032011-03-31 18:49:3484#include "net/url_request/url_request_context_getter.h"
[email protected]2dfeaf92011-01-10 21:08:2185#include "ui/base/clipboard/clipboard.h"
[email protected]c051a1b2011-01-21 23:30:1786#include "ui/base/l10n/l10n_util.h"
[email protected]de23f3f2011-05-18 16:20:2387#include "webkit/plugins/npapi/plugin_list.h"
[email protected]b112a4c2009-02-01 20:24:0188
89#if defined(OS_WIN)
[email protected]2362e4f2009-05-08 00:34:0590#include "views/focus/view_storage.h"
[email protected]86230b92009-11-23 20:38:3891#endif
92
[email protected]d55aaa132009-09-28 21:08:0493#if defined(IPC_MESSAGE_LOG_ENABLED)
[email protected]ff47b2962011-03-07 23:51:4994#include "content/common/child_process_messages.h"
[email protected]d55aaa132009-09-28 21:08:0495#endif
96
[email protected]db0e86dd2011-03-16 14:47:2197#if defined(OS_CHROMEOS)
98#include "chrome/browser/chromeos/proxy_config_service_impl.h"
[email protected]2d14b3732011-05-10 16:48:4499#include "chrome/browser/chromeos/web_socket_proxy_controller.h"
[email protected]db0e86dd2011-03-16 14:47:21100#endif // defined(OS_CHROMEOS)
101
[email protected]3cdacd42010-04-30 18:55:53102#if (defined(OS_WIN) || defined(OS_LINUX)) && !defined(OS_CHROMEOS)
103// How often to check if the persistent instance of Chrome needs to restart
104// to install an update.
105static const int kUpdateCheckIntervalHours = 6;
106#endif
107
[email protected]c6032e82010-09-13 20:06:05108#if defined(USE_X11)
109// How long to wait for the File thread to complete during EndSession, on
110// Linux. We have a timeout here because we're unable to run the UI messageloop
111// and there's some deadlock risk. Our only option is to exit anyway.
112static const int kEndSessionTimeoutSeconds = 10;
113#endif
114
[email protected]bb975362009-01-21 01:00:22115BrowserProcessImpl::BrowserProcessImpl(const CommandLine& command_line)
initial.commit09911bf2008-07-26 23:55:29116 : created_resource_dispatcher_host_(false),
117 created_metrics_service_(false),
118 created_io_thread_(false),
119 created_file_thread_(false),
120 created_db_thread_(false),
[email protected]914511712009-11-23 19:42:33121 created_process_launcher_thread_(false),
[email protected]875ee822010-05-18 20:58:01122 created_cache_thread_(false),
[email protected]0b565182011-03-02 18:11:15123 created_watchdog_thread_(false),
[email protected]2d14b3732011-05-10 16:48:44124#if defined(OS_CHROMEOS)
125 created_web_socket_proxy_thread_(false),
126#endif
initial.commit09911bf2008-07-26 23:55:29127 created_profile_manager_(false),
128 created_local_state_(false),
[email protected]b112a4c2009-02-01 20:24:01129 created_icon_manager_(false),
[email protected]40ecc902009-03-16 13:42:47130 created_devtools_manager_(false),
[email protected]8b8e7c92010-08-19 18:05:56131 created_sidebar_manager_(false),
[email protected]985655a2011-02-23 09:54:25132 created_browser_policy_connector_(false),
[email protected]29672ab2009-10-30 03:44:03133 created_notification_ui_manager_(false),
[email protected]462a0ff2011-06-02 17:15:34134 created_safe_browsing_service_(false),
[email protected]a7a5e992010-12-09 23:39:51135 created_safe_browsing_detection_service_(false),
initial.commit09911bf2008-07-26 23:55:29136 module_ref_count_(0),
[email protected]afd20c022010-06-10 00:48:20137 did_start_(false),
[email protected]1b2db1a2008-08-08 17:46:13138 checked_for_new_frames_(false),
[email protected]4747caf2011-03-23 20:09:21139 using_new_frames_(false) {
initial.commit09911bf2008-07-26 23:55:29140 g_browser_process = this;
[email protected]2dfeaf92011-01-10 21:08:21141 clipboard_.reset(new ui::Clipboard);
initial.commit09911bf2008-07-26 23:55:29142 main_notification_service_.reset(new NotificationService);
143
144 // Must be created after the NotificationService.
145 print_job_manager_.reset(new printing::PrintJobManager);
146
[email protected]b2fcd0e2010-12-01 15:19:40147 net_log_.reset(new ChromeNetLog);
[email protected]3ce02412011-03-01 12:01:15148
149 extension_event_router_forwarder_ = new ExtensionEventRouterForwarder;
[email protected]fc4facd2011-03-22 23:18:50150
151 ExtensionTabIdMap::GetInstance()->Init();
[email protected]6eac57a2011-07-12 21:15:09152
153 online_state_observer_.reset(new BrowserOnlineStateObserver);
initial.commit09911bf2008-07-26 23:55:29154}
155
156BrowserProcessImpl::~BrowserProcessImpl() {
[email protected]2d14b3732011-05-10 16:48:44157#if defined(OS_CHROMEOS)
158 if (web_socket_proxy_thread_.get())
159 chromeos::WebSocketProxyController::Shutdown();
160 web_socket_proxy_thread_.reset();
161#endif
162
initial.commit09911bf2008-07-26 23:55:29163 // Delete the AutomationProviderList before NotificationService,
164 // since it may try to unregister notifications
165 // Both NotificationService and AutomationProvider are singleton instances in
166 // the BrowserProcess. Since AutomationProvider may have some active
167 // notification observers, it is essential that it gets destroyed before the
168 // NotificationService. NotificationService won't be destroyed until after
169 // this destructor is run.
170 automation_provider_list_.reset();
171
[email protected]d393a0fd2009-05-13 23:32:01172 // We need to shutdown the SdchDictionaryFetcher as it regularly holds
173 // a pointer to a URLFetcher, and that URLFetcher (upon destruction) will do
174 // a PostDelayedTask onto the IO thread. This shutdown call will both discard
175 // any pending URLFetchers, and avoid creating any more.
176 SdchDictionaryFetcher::Shutdown();
177
[email protected]51ac040762011-01-20 02:01:04178 // We need to destroy the MetricsService, GoogleURLTracker,
179 // IntranetRedirectDetector, and SafeBrowsing ClientSideDetectionService
180 // before the io_thread_ gets destroyed, since their destructors can call the
181 // URLFetcher destructor, which does a PostDelayedTask operation on the IO
182 // thread. (The IO thread will handle that URLFetcher operation before going
183 // away.)
initial.commit09911bf2008-07-26 23:55:29184 metrics_service_.reset();
185 google_url_tracker_.reset();
[email protected]c4ff4952010-01-08 19:12:47186 intranet_redirect_detector_.reset();
[email protected]51ac040762011-01-20 02:01:04187 safe_browsing_detection_service_.reset();
initial.commit09911bf2008-07-26 23:55:29188
[email protected]d8a899c2010-09-21 04:50:33189 // Need to clear the desktop notification balloons before the io_thread_ and
190 // before the profiles, since if there are any still showing we will access
191 // those things during teardown.
192 notification_ui_manager_.reset();
193
[email protected]18590f22011-07-29 16:41:28194 // FIXME - We shouldn't need this, it's because of DefaultRequestContext! :(
195 // We need to kill off all URLFetchers using profile related
196 // URLRequestContexts. Normally that'd be covered by deleting the Profiles,
197 // but we have some URLFetchers using the DefaultRequestContext, so they need
198 // to be cancelled too. Remove this when DefaultRequestContext goes away.
199 BrowserThread::PostTask(BrowserThread::IO, FROM_HERE,
200 NewRunnableFunction(&URLFetcher::CancelAll));
201
initial.commit09911bf2008-07-26 23:55:29202 // Need to clear profiles (download managers) before the io_thread_.
203 profile_manager_.reset();
204
205 // Debugger must be cleaned up before IO thread and NotificationService.
[email protected]4475d232011-07-27 15:29:20206 remote_debugging_server_.reset();
207
[email protected]5613126e2011-01-31 15:27:55208 if (devtools_legacy_handler_.get()) {
209 devtools_legacy_handler_->Stop();
210 devtools_legacy_handler_ = NULL;
211 }
initial.commit09911bf2008-07-26 23:55:29212
[email protected]4b58e7d2011-07-11 10:22:56213#if defined(ENABLE_SAFE_BROWSING)
[email protected]462a0ff2011-06-02 17:15:34214 if (safe_browsing_service_.get())
215 safe_browsing_service()->ShutDown();
[email protected]4b58e7d2011-07-11 10:22:56216#endif
initial.commit09911bf2008-07-26 23:55:29217
[email protected]462a0ff2011-06-02 17:15:34218 if (resource_dispatcher_host_.get()) {
initial.commit09911bf2008-07-26 23:55:29219 // Cancel pending requests and prevent new requests.
220 resource_dispatcher_host()->Shutdown();
221 }
222
[email protected]fc4facd2011-03-22 23:18:50223 ExtensionTabIdMap::GetInstance()->Shutdown();
224
[email protected]985655a2011-02-23 09:54:25225 // The policy providers managed by |browser_policy_connector_| need to shut
226 // down while the IO and FILE threads are still alive.
227 browser_policy_connector_.reset();
[email protected]f2a893c2011-01-05 09:38:07228
[email protected]7a31f7c2011-03-21 23:22:04229 // Destroying the GpuProcessHostUIShims on the UI thread posts a task to
230 // delete related objects on the GPU thread. This must be done before
231 // stopping the GPU thread. The GPU thread will close IPC channels to renderer
232 // processes so this has to happen before stopping the IO thread.
233 GpuProcessHostUIShim::DestroyAll();
[email protected]7a31f7c2011-03-21 23:22:04234
[email protected]8fd11832011-07-14 20:01:13235 // Stop the watchdog thread before stopping other threads.
236 watchdog_thread_.reset();
237
initial.commit09911bf2008-07-26 23:55:29238 // Need to stop io_thread_ before resource_dispatcher_host_, since
239 // io_thread_ may still deref ResourceDispatcherHost and handle resource
240 // request before going away.
[email protected]0ac83682010-01-22 17:46:27241 io_thread_.reset();
initial.commit09911bf2008-07-26 23:55:29242
[email protected]875ee822010-05-18 20:58:01243 // The IO thread was the only user of this thread.
244 cache_thread_.reset();
245
[email protected]914511712009-11-23 19:42:33246 // Stop the process launcher thread after the IO thread, in case the IO thread
247 // posted a task to terminate a process on the process launcher thread.
248 process_launcher_thread_.reset();
249
initial.commit09911bf2008-07-26 23:55:29250 // Clean up state that lives on the file_thread_ before it goes away.
251 if (resource_dispatcher_host_.get()) {
252 resource_dispatcher_host()->download_file_manager()->Shutdown();
253 resource_dispatcher_host()->save_file_manager()->Shutdown();
254 }
255
256 // Need to stop the file_thread_ here to force it to process messages in its
257 // message loop from the previous call to shutdown the DownloadFileManager,
258 // SaveFileManager and SessionService.
259 file_thread_.reset();
260
261 // With the file_thread_ flushed, we can release any icon resources.
262 icon_manager_.reset();
263
264 // Need to destroy ResourceDispatcherHost before PluginService and
[email protected]49f28bc72010-02-04 00:10:01265 // SafeBrowsingService, since it caches a pointer to it. This also
266 // causes the webkit thread to terminate.
initial.commit09911bf2008-07-26 23:55:29267 resource_dispatcher_host_.reset();
268
269 // Wait for the pending print jobs to finish.
270 print_job_manager_->OnQuit();
271 print_job_manager_.reset();
272
[email protected]0b4d3382010-07-14 16:13:04273 // Destroy TabCloseableStateWatcher before NotificationService since the
274 // former registers for notifications.
275 tab_closeable_state_watcher_.reset();
276
initial.commit09911bf2008-07-26 23:55:29277 // Now OK to destroy NotificationService.
278 main_notification_service_.reset();
279
280 g_browser_process = NULL;
281}
282
[email protected]c6032e82010-09-13 20:06:05283#if defined(OS_WIN)
[email protected]295039bd2008-08-15 04:32:57284// Send a QuitTask to the given MessageLoop.
285static void PostQuit(MessageLoop* message_loop) {
286 message_loop->PostTask(FROM_HERE, new MessageLoop::QuitTask());
287}
[email protected]c6032e82010-09-13 20:06:05288#elif defined(USE_X11)
289static void Signal(base::WaitableEvent* event) {
290 event->Signal();
291}
292#endif
initial.commit09911bf2008-07-26 23:55:29293
[email protected]b443cb042009-12-15 22:05:09294unsigned int BrowserProcessImpl::AddRefModule() {
295 DCHECK(CalledOnValidThread());
[email protected]afd20c022010-06-10 00:48:20296 did_start_ = true;
[email protected]b443cb042009-12-15 22:05:09297 module_ref_count_++;
298 return module_ref_count_;
299}
300
301unsigned int BrowserProcessImpl::ReleaseModule() {
302 DCHECK(CalledOnValidThread());
[email protected]760d970a2010-05-18 00:39:18303 DCHECK_NE(0u, module_ref_count_);
[email protected]b443cb042009-12-15 22:05:09304 module_ref_count_--;
305 if (0 == module_ref_count_) {
[email protected]7d038c32010-12-14 00:40:00306 // Allow UI and IO threads to do blocking IO on shutdown, since we do a lot
307 // of it on shutdown for valid reasons.
308 base::ThreadRestrictions::SetIOAllowed(true);
309 io_thread()->message_loop()->PostTask(
310 FROM_HERE,
311 NewRunnableFunction(&base::ThreadRestrictions::SetIOAllowed, true));
[email protected]b443cb042009-12-15 22:05:09312 MessageLoop::current()->PostTask(
[email protected]34f73fb2010-03-24 20:50:34313 FROM_HERE, NewRunnableFunction(DidEndMainMessageLoop));
[email protected]b443cb042009-12-15 22:05:09314 MessageLoop::current()->Quit();
315 }
316 return module_ref_count_;
317}
318
initial.commit09911bf2008-07-26 23:55:29319void BrowserProcessImpl::EndSession() {
initial.commit09911bf2008-07-26 23:55:29320 // Mark all the profiles as clean.
321 ProfileManager* pm = profile_manager();
[email protected]844a1002011-04-19 11:37:21322 std::vector<Profile*> profiles(pm->GetLoadedProfiles());
323 for (size_t i = 0; i < profiles.size(); ++i)
324 profiles[i]->MarkAsCleanShutdown();
initial.commit09911bf2008-07-26 23:55:29325
326 // Tell the metrics service it was cleanly shutdown.
327 MetricsService* metrics = g_browser_process->metrics_service();
328 if (metrics && local_state()) {
initial.commit09911bf2008-07-26 23:55:29329 metrics->RecordStartOfSessionEnd();
330
331 // MetricsService lazily writes to prefs, force it to write now.
[email protected]6faa0e0d2009-04-28 06:50:36332 local_state()->SavePersistentPrefs();
initial.commit09911bf2008-07-26 23:55:29333 }
334
335 // We must write that the profile and metrics service shutdown cleanly,
336 // otherwise on startup we'll think we crashed. So we block until done and
337 // then proceed with normal shutdown.
[email protected]c6032e82010-09-13 20:06:05338#if defined(USE_X11)
339 // Can't run a local loop on linux. Instead create a waitable event.
340 base::WaitableEvent done_writing(false, false);
[email protected]d04e7662010-10-10 22:24:48341 BrowserThread::PostTask(BrowserThread::FILE, FROM_HERE,
[email protected]c6032e82010-09-13 20:06:05342 NewRunnableFunction(Signal, &done_writing));
343 done_writing.TimedWait(
344 base::TimeDelta::FromSeconds(kEndSessionTimeoutSeconds));
345#elif defined(OS_WIN)
[email protected]d04e7662010-10-10 22:24:48346 BrowserThread::PostTask(BrowserThread::FILE, FROM_HERE,
[email protected]295039bd2008-08-15 04:32:57347 NewRunnableFunction(PostQuit, MessageLoop::current()));
initial.commit09911bf2008-07-26 23:55:29348 MessageLoop::current()->Run();
[email protected]c6032e82010-09-13 20:06:05349#else
350 NOTIMPLEMENTED();
351#endif
initial.commit09911bf2008-07-26 23:55:29352}
353
[email protected]e13ad79b2010-07-22 21:36:50354ResourceDispatcherHost* BrowserProcessImpl::resource_dispatcher_host() {
355 DCHECK(CalledOnValidThread());
356 if (!created_resource_dispatcher_host_)
357 CreateResourceDispatcherHost();
358 return resource_dispatcher_host_.get();
359}
360
361MetricsService* BrowserProcessImpl::metrics_service() {
362 DCHECK(CalledOnValidThread());
363 if (!created_metrics_service_)
364 CreateMetricsService();
365 return metrics_service_.get();
366}
367
368IOThread* BrowserProcessImpl::io_thread() {
369 DCHECK(CalledOnValidThread());
370 if (!created_io_thread_)
371 CreateIOThread();
372 return io_thread_.get();
373}
374
375base::Thread* BrowserProcessImpl::file_thread() {
376 DCHECK(CalledOnValidThread());
377 if (!created_file_thread_)
378 CreateFileThread();
379 return file_thread_.get();
380}
381
382base::Thread* BrowserProcessImpl::db_thread() {
383 DCHECK(CalledOnValidThread());
384 if (!created_db_thread_)
385 CreateDBThread();
386 return db_thread_.get();
387}
388
389base::Thread* BrowserProcessImpl::process_launcher_thread() {
390 DCHECK(CalledOnValidThread());
391 if (!created_process_launcher_thread_)
392 CreateProcessLauncherThread();
393 return process_launcher_thread_.get();
394}
395
396base::Thread* BrowserProcessImpl::cache_thread() {
397 DCHECK(CalledOnValidThread());
398 if (!created_cache_thread_)
399 CreateCacheThread();
400 return cache_thread_.get();
401}
402
[email protected]0b565182011-03-02 18:11:15403WatchDogThread* BrowserProcessImpl::watchdog_thread() {
404 DCHECK(CalledOnValidThread());
405 if (!created_watchdog_thread_)
406 CreateWatchdogThread();
407 DCHECK(watchdog_thread_.get() != NULL);
408 return watchdog_thread_.get();
409}
410
[email protected]2d14b3732011-05-10 16:48:44411#if defined(OS_CHROMEOS)
412base::Thread* BrowserProcessImpl::web_socket_proxy_thread() {
413 DCHECK(CalledOnValidThread());
414 if (!created_web_socket_proxy_thread_)
415 CreateWebSocketProxyThread();
416 DCHECK(web_socket_proxy_thread_.get() != NULL);
417 return web_socket_proxy_thread_.get();
418}
419#endif
420
[email protected]e13ad79b2010-07-22 21:36:50421ProfileManager* BrowserProcessImpl::profile_manager() {
422 DCHECK(CalledOnValidThread());
423 if (!created_profile_manager_)
424 CreateProfileManager();
425 return profile_manager_.get();
426}
427
428PrefService* BrowserProcessImpl::local_state() {
429 DCHECK(CalledOnValidThread());
430 if (!created_local_state_)
431 CreateLocalState();
432 return local_state_.get();
433}
434
435DevToolsManager* BrowserProcessImpl::devtools_manager() {
436 DCHECK(CalledOnValidThread());
437 if (!created_devtools_manager_)
438 CreateDevToolsManager();
439 return devtools_manager_.get();
440}
441
[email protected]8b8e7c92010-08-19 18:05:56442SidebarManager* BrowserProcessImpl::sidebar_manager() {
443 DCHECK(CalledOnValidThread());
444 if (!created_sidebar_manager_)
445 CreateSidebarManager();
446 return sidebar_manager_.get();
447}
448
[email protected]2dfeaf92011-01-10 21:08:21449ui::Clipboard* BrowserProcessImpl::clipboard() {
[email protected]e13ad79b2010-07-22 21:36:50450 DCHECK(CalledOnValidThread());
451 return clipboard_.get();
452}
453
[email protected]abe2c032011-03-31 18:49:34454net::URLRequestContextGetter* BrowserProcessImpl::system_request_context() {
[email protected]db0e86dd2011-03-16 14:47:21455 DCHECK(CalledOnValidThread());
456 return io_thread()->system_url_request_context_getter();
457}
458
459#if defined(OS_CHROMEOS)
460chromeos::ProxyConfigServiceImpl*
461BrowserProcessImpl::chromeos_proxy_config_service_impl() {
462 DCHECK(CalledOnValidThread());
463 if (!chromeos_proxy_config_service_impl_) {
464 chromeos_proxy_config_service_impl_ =
465 new chromeos::ProxyConfigServiceImpl();
466 }
467 return chromeos_proxy_config_service_impl_;
468}
469#endif // defined(OS_CHROMEOS)
470
[email protected]3ce02412011-03-01 12:01:15471ExtensionEventRouterForwarder*
472BrowserProcessImpl::extension_event_router_forwarder() {
473 return extension_event_router_forwarder_.get();
474}
475
[email protected]e13ad79b2010-07-22 21:36:50476NotificationUIManager* BrowserProcessImpl::notification_ui_manager() {
477 DCHECK(CalledOnValidThread());
478 if (!created_notification_ui_manager_)
479 CreateNotificationUIManager();
480 return notification_ui_manager_.get();
481}
482
[email protected]985655a2011-02-23 09:54:25483policy::BrowserPolicyConnector* BrowserProcessImpl::browser_policy_connector() {
[email protected]f2a893c2011-01-05 09:38:07484 DCHECK(CalledOnValidThread());
[email protected]985655a2011-02-23 09:54:25485 if (!created_browser_policy_connector_) {
486 DCHECK(browser_policy_connector_.get() == NULL);
487 created_browser_policy_connector_ = true;
[email protected]f31e2e52011-07-14 16:01:19488#if defined(ENABLE_CONFIGURATION_POLICY)
[email protected]d9ee002c2011-04-27 12:52:54489 browser_policy_connector_.reset(policy::BrowserPolicyConnector::Create());
[email protected]f31e2e52011-07-14 16:01:19490#endif
[email protected]f2a893c2011-01-05 09:38:07491 }
[email protected]985655a2011-02-23 09:54:25492 return browser_policy_connector_.get();
[email protected]f2a893c2011-01-05 09:38:07493}
494
[email protected]e13ad79b2010-07-22 21:36:50495IconManager* BrowserProcessImpl::icon_manager() {
496 DCHECK(CalledOnValidThread());
497 if (!created_icon_manager_)
498 CreateIconManager();
499 return icon_manager_.get();
500}
501
502ThumbnailGenerator* BrowserProcessImpl::GetThumbnailGenerator() {
503 return &thumbnail_generator_;
504}
505
506AutomationProviderList* BrowserProcessImpl::InitAutomationProviderList() {
507 DCHECK(CalledOnValidThread());
508 if (automation_provider_list_.get() == NULL) {
509 automation_provider_list_.reset(AutomationProviderList::GetInstance());
510 }
511 return automation_provider_list_.get();
512}
513
[email protected]5613126e2011-01-31 15:27:55514void BrowserProcessImpl::InitDevToolsHttpProtocolHandler(
[email protected]4475d232011-07-27 15:29:20515 Profile* profile,
[email protected]01000cf12011-02-04 11:39:22516 const std::string& ip,
[email protected]5613126e2011-01-31 15:27:55517 int port,
518 const std::string& frontend_url) {
[email protected]e13ad79b2010-07-22 21:36:50519 DCHECK(CalledOnValidThread());
[email protected]4475d232011-07-27 15:29:20520 remote_debugging_server_.reset(
521 new RemoteDebuggingServer(profile, ip, port, frontend_url));
[email protected]5613126e2011-01-31 15:27:55522}
523
524void BrowserProcessImpl::InitDevToolsLegacyProtocolHandler(int port) {
525 DCHECK(CalledOnValidThread());
526 devtools_legacy_handler_ = DevToolsProtocolHandler::Start(port);
[email protected]e13ad79b2010-07-22 21:36:50527}
528
529bool BrowserProcessImpl::IsShuttingDown() {
530 DCHECK(CalledOnValidThread());
531 return did_start_ && 0 == module_ref_count_;
532}
533
initial.commit09911bf2008-07-26 23:55:29534printing::PrintJobManager* BrowserProcessImpl::print_job_manager() {
535 // TODO(abarth): DCHECK(CalledOnValidThread());
[email protected]d8922f22010-05-07 00:57:27536 // http://code.google.com/p/chromium/issues/detail?id=6828
initial.commit09911bf2008-07-26 23:55:29537 // print_job_manager_ is initialized in the constructor and destroyed in the
538 // destructor, so it should always be valid.
539 DCHECK(print_job_manager_.get());
540 return print_job_manager_.get();
541}
542
[email protected]dbeebd52010-11-16 20:34:16543printing::PrintPreviewTabController*
544 BrowserProcessImpl::print_preview_tab_controller() {
545 DCHECK(CalledOnValidThread());
546 if (!print_preview_tab_controller_.get())
547 CreatePrintPreviewTabController();
548 return print_preview_tab_controller_.get();
549}
550
[email protected]68f88b992011-05-07 02:01:39551printing::BackgroundPrintingManager*
552 BrowserProcessImpl::background_printing_manager() {
553 DCHECK(CalledOnValidThread());
554 if (!background_printing_manager_.get())
555 CreateBackgroundPrintingManager();
556 return background_printing_manager_.get();
557}
558
[email protected]e13ad79b2010-07-22 21:36:50559GoogleURLTracker* BrowserProcessImpl::google_url_tracker() {
560 DCHECK(CalledOnValidThread());
561 if (!google_url_tracker_.get())
562 CreateGoogleURLTracker();
563 return google_url_tracker_.get();
564}
565
566IntranetRedirectDetector* BrowserProcessImpl::intranet_redirect_detector() {
567 DCHECK(CalledOnValidThread());
568 if (!intranet_redirect_detector_.get())
569 CreateIntranetRedirectDetector();
570 return intranet_redirect_detector_.get();
571}
572
573const std::string& BrowserProcessImpl::GetApplicationLocale() {
574 DCHECK(!locale_.empty());
575 return locale_;
576}
577
578void BrowserProcessImpl::SetApplicationLocale(const std::string& locale) {
579 locale_ = locale;
580 extension_l10n_util::SetProcessLocale(locale);
581}
582
[email protected]073ed7b2010-09-27 09:20:02583DownloadStatusUpdater* BrowserProcessImpl::download_status_updater() {
584 return &download_status_updater_;
585}
586
[email protected]e13ad79b2010-07-22 21:36:50587TabCloseableStateWatcher* BrowserProcessImpl::tab_closeable_state_watcher() {
588 DCHECK(CalledOnValidThread());
589 if (!tab_closeable_state_watcher_.get())
590 CreateTabCloseableStateWatcher();
591 return tab_closeable_state_watcher_.get();
592}
593
[email protected]9e7f015f2011-05-28 00:24:25594BackgroundModeManager* BrowserProcessImpl::background_mode_manager() {
595 DCHECK(CalledOnValidThread());
596 if (!background_mode_manager_.get())
597 CreateBackgroundModeManager();
598 return background_mode_manager_.get();
599}
600
601StatusTray* BrowserProcessImpl::status_tray() {
602 DCHECK(CalledOnValidThread());
603 if (!status_tray_.get())
604 CreateStatusTray();
605 return status_tray_.get();
606}
607
[email protected]462a0ff2011-06-02 17:15:34608
609SafeBrowsingService* BrowserProcessImpl::safe_browsing_service() {
610 DCHECK(CalledOnValidThread());
611 if (!created_safe_browsing_service_)
612 CreateSafeBrowsingService();
613 return safe_browsing_service_.get();
614}
615
[email protected]a7a5e992010-12-09 23:39:51616safe_browsing::ClientSideDetectionService*
617 BrowserProcessImpl::safe_browsing_detection_service() {
618 DCHECK(CalledOnValidThread());
[email protected]462a0ff2011-06-02 17:15:34619 if (!created_safe_browsing_detection_service_)
[email protected]a7a5e992010-12-09 23:39:51620 CreateSafeBrowsingDetectionService();
[email protected]a7a5e992010-12-09 23:39:51621 return safe_browsing_detection_service_.get();
622}
623
[email protected]8b08a47f2011-02-25 12:36:37624bool BrowserProcessImpl::plugin_finder_disabled() const {
625 return *plugin_finder_disabled_pref_;
626}
627
[email protected]432115822011-07-10 15:52:27628void BrowserProcessImpl::Observe(int type,
[email protected]6618d1d2010-12-15 21:18:47629 const NotificationSource& source,
630 const NotificationDetails& details) {
[email protected]432115822011-07-10 15:52:27631 if (type == chrome::NOTIFICATION_PREF_CHANGED) {
[email protected]e450fa62011-02-01 12:52:56632 std::string* pref = Details<std::string>(details).ptr();
633 if (*pref == prefs::kDefaultBrowserSettingEnabled) {
634 if (local_state_->GetBoolean(prefs::kDefaultBrowserSettingEnabled))
635 ShellIntegration::SetAsDefaultBrowser();
[email protected]419a0572011-04-18 22:21:46636 } else if (*pref == prefs::kDisabledSchemes) {
637 ApplyDisabledSchemesPolicy();
[email protected]40850a52011-05-26 22:07:35638 } else if (*pref == prefs::kAllowCrossOriginAuthPrompt) {
639 ApplyAllowCrossOriginAuthPromptPolicy();
[email protected]e450fa62011-02-01 12:52:56640 }
[email protected]6618d1d2010-12-15 21:18:47641 } else {
642 NOTREACHED();
643 }
644}
645
[email protected]e13ad79b2010-07-22 21:36:50646#if (defined(OS_WIN) || defined(OS_LINUX)) && !defined(OS_CHROMEOS)
647void BrowserProcessImpl::StartAutoupdateTimer() {
648 autoupdate_timer_.Start(
649 base::TimeDelta::FromHours(kUpdateCheckIntervalHours),
650 this,
651 &BrowserProcessImpl::OnAutoupdateTimer);
652}
653#endif
654
[email protected]d6f37fc2011-02-13 23:58:41655ChromeNetLog* BrowserProcessImpl::net_log() {
656 return net_log_.get();
657}
658
[email protected]1459fb62011-05-25 19:03:27659prerender::PrerenderTracker* BrowserProcessImpl::prerender_tracker() {
660 if (!prerender_tracker_.get())
661 prerender_tracker_.reset(new prerender::PrerenderTracker);
662
663 return prerender_tracker_.get();
664}
665
[email protected]e7f009d2011-06-14 19:35:10666MHTMLGenerationManager* BrowserProcessImpl::mhtml_generation_manager() {
667 if (!mhtml_generation_manager_.get())
668 mhtml_generation_manager_ = new MHTMLGenerationManager();
669
670 return mhtml_generation_manager_.get();
671}
672
[email protected]87522db92011-07-28 23:44:14673GpuBlacklistUpdater* BrowserProcessImpl::gpu_blacklist_updater() {
674 if (!gpu_blacklist_updater_.get())
675 gpu_blacklist_updater_ = new GpuBlacklistUpdater();
676
677 return gpu_blacklist_updater_.get();
678}
679
initial.commit09911bf2008-07-26 23:55:29680void BrowserProcessImpl::CreateResourceDispatcherHost() {
681 DCHECK(!created_resource_dispatcher_host_ &&
682 resource_dispatcher_host_.get() == NULL);
683 created_resource_dispatcher_host_ = true;
684
[email protected]214538842011-04-01 18:47:24685 // UserScriptListener will delete itself.
686 ResourceQueue::DelegateSet resource_queue_delegates;
687 resource_queue_delegates.insert(new UserScriptListener());
688
689 resource_dispatcher_host_.reset(
690 new ResourceDispatcherHost(resource_queue_delegates));
initial.commit09911bf2008-07-26 23:55:29691 resource_dispatcher_host_->Initialize();
[email protected]1459fb62011-05-25 19:03:27692
[email protected]8bcdf072011-06-03 16:52:15693 resource_dispatcher_host_delegate_.reset(
694 new ChromeResourceDispatcherHostDelegate(resource_dispatcher_host_.get(),
[email protected]92e0a612011-05-30 21:37:00695 prerender_tracker()));
[email protected]8bcdf072011-06-03 16:52:15696 resource_dispatcher_host_->set_delegate(
697 resource_dispatcher_host_delegate_.get());
[email protected]40850a52011-05-26 22:07:35698
699 pref_change_registrar_.Add(prefs::kAllowCrossOriginAuthPrompt, this);
700 ApplyAllowCrossOriginAuthPromptPolicy();
initial.commit09911bf2008-07-26 23:55:29701}
702
703void BrowserProcessImpl::CreateMetricsService() {
704 DCHECK(!created_metrics_service_ && metrics_service_.get() == NULL);
705 created_metrics_service_ = true;
706
707 metrics_service_.reset(new MetricsService);
708}
709
710void BrowserProcessImpl::CreateIOThread() {
711 DCHECK(!created_io_thread_ && io_thread_.get() == NULL);
712 created_io_thread_ = true;
713
714 // Prior to starting the io thread, we create the plugin service as
715 // it is predominantly used from the io thread, but must be created
716 // on the main thread. The service ctor is inexpensive and does not
717 // invoke the io_thread() accessor.
718 PluginService::GetInstance();
719
[email protected]de23f3f2011-05-18 16:20:23720 // Add the Chrome specific plugins.
721 chrome::RegisterInternalDefaultPlugin();
722
723 // Register the internal Flash if available.
724 FilePath path;
725 if (!CommandLine::ForCurrentProcess()->HasSwitch(
726 switches::kDisableInternalFlash) &&
727 PathService::Get(chrome::FILE_FLASH_PLUGIN, &path)) {
728 webkit::npapi::PluginList::Singleton()->AddExtraPluginPath(path);
729 }
730
[email protected]f1933792011-06-14 00:49:34731#if defined(OS_POSIX)
732 // Also find plugins in a user-specific plugins dir,
733 // e.g. ~/.config/chromium/Plugins.
734 FilePath user_data_dir;
735 if (PathService::Get(chrome::DIR_USER_DATA, &user_data_dir)) {
736 webkit::npapi::PluginList::Singleton()->AddExtraPluginDir(
737 user_data_dir.Append("Plugins"));
738 }
739#endif
740
[email protected]3ce02412011-03-01 12:01:15741 scoped_ptr<IOThread> thread(new IOThread(
742 local_state(), net_log_.get(), extension_event_router_forwarder_.get()));
[email protected]ab820df2008-08-26 05:55:10743 base::Thread::Options options;
744 options.message_loop_type = MessageLoop::TYPE_IO;
745 if (!thread->StartWithOptions(options))
initial.commit09911bf2008-07-26 23:55:29746 return;
747 io_thread_.swap(thread);
748}
749
750void BrowserProcessImpl::CreateFileThread() {
751 DCHECK(!created_file_thread_ && file_thread_.get() == NULL);
752 created_file_thread_ = true;
753
[email protected]ab820df2008-08-26 05:55:10754 scoped_ptr<base::Thread> thread(
[email protected]d04e7662010-10-10 22:24:48755 new BrowserProcessSubThread(BrowserThread::FILE));
[email protected]a1db3842008-09-17 22:04:06756 base::Thread::Options options;
[email protected]9e549b582009-02-05 21:13:39757#if defined(OS_WIN)
758 // On Windows, the FILE thread needs to be have a UI message loop which pumps
759 // messages in such a way that Google Update can communicate back to us.
[email protected]a1db3842008-09-17 22:04:06760 options.message_loop_type = MessageLoop::TYPE_UI;
[email protected]9e549b582009-02-05 21:13:39761#else
762 options.message_loop_type = MessageLoop::TYPE_IO;
763#endif
[email protected]a1db3842008-09-17 22:04:06764 if (!thread->StartWithOptions(options))
initial.commit09911bf2008-07-26 23:55:29765 return;
766 file_thread_.swap(thread);
767}
768
[email protected]2d14b3732011-05-10 16:48:44769#if defined(OS_CHROMEOS)
770void BrowserProcessImpl::CreateWebSocketProxyThread() {
771 DCHECK(!created_web_socket_proxy_thread_);
772 DCHECK(web_socket_proxy_thread_.get() == NULL);
773 created_web_socket_proxy_thread_ = true;
774
775 scoped_ptr<base::Thread> thread(
776 new BrowserProcessSubThread(BrowserThread::WEB_SOCKET_PROXY));
777 base::Thread::Options options;
778 options.message_loop_type = MessageLoop::TYPE_IO;
779 if (!thread->StartWithOptions(options))
780 return;
781 web_socket_proxy_thread_.swap(thread);
782}
783#endif
784
initial.commit09911bf2008-07-26 23:55:29785void BrowserProcessImpl::CreateDBThread() {
786 DCHECK(!created_db_thread_ && db_thread_.get() == NULL);
787 created_db_thread_ = true;
788
[email protected]ab820df2008-08-26 05:55:10789 scoped_ptr<base::Thread> thread(
[email protected]d04e7662010-10-10 22:24:48790 new BrowserProcessSubThread(BrowserThread::DB));
initial.commit09911bf2008-07-26 23:55:29791 if (!thread->Start())
792 return;
793 db_thread_.swap(thread);
794}
795
[email protected]914511712009-11-23 19:42:33796void BrowserProcessImpl::CreateProcessLauncherThread() {
797 DCHECK(!created_process_launcher_thread_ && !process_launcher_thread_.get());
798 created_process_launcher_thread_ = true;
799
800 scoped_ptr<base::Thread> thread(
[email protected]d04e7662010-10-10 22:24:48801 new BrowserProcessSubThread(BrowserThread::PROCESS_LAUNCHER));
[email protected]914511712009-11-23 19:42:33802 if (!thread->Start())
803 return;
804 process_launcher_thread_.swap(thread);
805}
806
[email protected]875ee822010-05-18 20:58:01807void BrowserProcessImpl::CreateCacheThread() {
808 DCHECK(!created_cache_thread_ && !cache_thread_.get());
809 created_cache_thread_ = true;
810
811 scoped_ptr<base::Thread> thread(
[email protected]75096332010-11-09 03:28:13812 new BrowserThread(BrowserThread::CACHE));
[email protected]875ee822010-05-18 20:58:01813 base::Thread::Options options;
814 options.message_loop_type = MessageLoop::TYPE_IO;
815 if (!thread->StartWithOptions(options))
816 return;
817 cache_thread_.swap(thread);
818}
819
[email protected]0b565182011-03-02 18:11:15820void BrowserProcessImpl::CreateWatchdogThread() {
821 DCHECK(!created_watchdog_thread_ && watchdog_thread_.get() == NULL);
822 created_watchdog_thread_ = true;
823
824 scoped_ptr<WatchDogThread> thread(new WatchDogThread());
825 if (!thread->Start())
826 return;
827 watchdog_thread_.swap(thread);
828}
829
initial.commit09911bf2008-07-26 23:55:29830void BrowserProcessImpl::CreateProfileManager() {
831 DCHECK(!created_profile_manager_ && profile_manager_.get() == NULL);
832 created_profile_manager_ = true;
833
834 profile_manager_.reset(new ProfileManager());
835}
836
837void BrowserProcessImpl::CreateLocalState() {
838 DCHECK(!created_local_state_ && local_state_.get() == NULL);
839 created_local_state_ = true;
840
[email protected]b9636002009-03-04 00:05:25841 FilePath local_state_path;
initial.commit09911bf2008-07-26 23:55:29842 PathService::Get(chrome::FILE_LOCAL_STATE, &local_state_path);
[email protected]f2d1f612010-12-09 15:10:17843 local_state_.reset(
[email protected]fcf53572011-06-29 15:44:37844 PrefService::CreatePrefService(local_state_path, NULL, false));
[email protected]492d2142010-09-10 13:55:18845
[email protected]caf63aea2011-04-26 11:04:10846 // Initialize the prefs of the local state.
847 browser::RegisterLocalState(local_state_.get());
848
[email protected]2a7e7c152010-10-01 20:12:09849 pref_change_registrar_.Init(local_state_.get());
850
[email protected]f16b9662011-04-27 10:06:07851 print_job_manager_->InitOnUIThread(local_state_.get());
[email protected]e450fa62011-02-01 12:52:56852
853 // Initialize the notification for the default browser setting policy.
854 local_state_->RegisterBooleanPref(prefs::kDefaultBrowserSettingEnabled,
855 false);
856 if (local_state_->IsManagedPreference(prefs::kDefaultBrowserSettingEnabled)) {
857 if (local_state_->GetBoolean(prefs::kDefaultBrowserSettingEnabled))
858 ShellIntegration::SetAsDefaultBrowser();
859 }
860 pref_change_registrar_.Add(prefs::kDefaultBrowserSettingEnabled, this);
[email protected]8b08a47f2011-02-25 12:36:37861
862 // Initialize the preference for the plugin finder policy.
863 // This preference is only needed on the IO thread so make it available there.
864 local_state_->RegisterBooleanPref(prefs::kDisablePluginFinder, false);
865 plugin_finder_disabled_pref_.Init(prefs::kDisablePluginFinder,
866 local_state_.get(), NULL);
867 plugin_finder_disabled_pref_.MoveToThread(BrowserThread::IO);
[email protected]419a0572011-04-18 22:21:46868
[email protected]1f8110b2011-05-24 14:48:30869 // Initialize the disk cache location policy. This policy is not hot update-
870 // able so we need to have it when initializing the profiles.
871 local_state_->RegisterFilePathPref(prefs::kDiskCacheDir, FilePath());
872
[email protected]12c84e22011-07-11 09:35:45873 // Another policy that needs to be defined before the net subsystem is
874 // initialized is MaxConnectionsPerProxy so we do it here.
875 local_state_->RegisterIntegerPref(prefs::kMaxConnectionsPerProxy,
876 net::kDefaultMaxSocketsPerProxyServer);
877 int max_per_proxy = local_state_->GetInteger(prefs::kMaxConnectionsPerProxy);
878 net::ClientSocketPoolManager::set_max_sockets_per_proxy_server(
879 std::max(std::min(max_per_proxy, 99),
880 net::ClientSocketPoolManager::max_sockets_per_group()));
881
[email protected]b99c41c2011-04-27 15:18:48882 // This is observed by ChildProcessSecurityPolicy, which lives in content/
883 // though, so it can't register itself.
[email protected]419a0572011-04-18 22:21:46884 local_state_->RegisterListPref(prefs::kDisabledSchemes);
[email protected]b99c41c2011-04-27 15:18:48885 pref_change_registrar_.Add(prefs::kDisabledSchemes, this);
[email protected]419a0572011-04-18 22:21:46886 ApplyDisabledSchemesPolicy();
[email protected]fd6159a2010-09-03 09:38:39887}
initial.commit09911bf2008-07-26 23:55:29888
initial.commit09911bf2008-07-26 23:55:29889void BrowserProcessImpl::CreateIconManager() {
890 DCHECK(!created_icon_manager_ && icon_manager_.get() == NULL);
891 created_icon_manager_ = true;
892 icon_manager_.reset(new IconManager);
893}
894
[email protected]40ecc902009-03-16 13:42:47895void BrowserProcessImpl::CreateDevToolsManager() {
[email protected]73ee01522009-06-05 10:13:44896 DCHECK(devtools_manager_.get() == NULL);
[email protected]40ecc902009-03-16 13:42:47897 created_devtools_manager_ = true;
[email protected]73ee01522009-06-05 10:13:44898 devtools_manager_ = new DevToolsManager();
[email protected]40ecc902009-03-16 13:42:47899}
900
[email protected]8b8e7c92010-08-19 18:05:56901void BrowserProcessImpl::CreateSidebarManager() {
902 DCHECK(sidebar_manager_.get() == NULL);
903 created_sidebar_manager_ = true;
904 sidebar_manager_ = new SidebarManager();
905}
906
initial.commit09911bf2008-07-26 23:55:29907void BrowserProcessImpl::CreateGoogleURLTracker() {
908 DCHECK(google_url_tracker_.get() == NULL);
909 scoped_ptr<GoogleURLTracker> google_url_tracker(new GoogleURLTracker);
910 google_url_tracker_.swap(google_url_tracker);
911}
[email protected]6641bf662009-08-21 00:34:09912
[email protected]c4ff4952010-01-08 19:12:47913void BrowserProcessImpl::CreateIntranetRedirectDetector() {
914 DCHECK(intranet_redirect_detector_.get() == NULL);
915 scoped_ptr<IntranetRedirectDetector> intranet_redirect_detector(
916 new IntranetRedirectDetector);
917 intranet_redirect_detector_.swap(intranet_redirect_detector);
918}
919
[email protected]29672ab2009-10-30 03:44:03920void BrowserProcessImpl::CreateNotificationUIManager() {
921 DCHECK(notification_ui_manager_.get() == NULL);
[email protected]b0b2a3dd2011-01-06 00:30:05922 notification_ui_manager_.reset(NotificationUIManager::Create(local_state()));
923
[email protected]29672ab2009-10-30 03:44:03924 created_notification_ui_manager_ = true;
925}
926
[email protected]0b4d3382010-07-14 16:13:04927void BrowserProcessImpl::CreateTabCloseableStateWatcher() {
928 DCHECK(tab_closeable_state_watcher_.get() == NULL);
929 tab_closeable_state_watcher_.reset(TabCloseableStateWatcher::Create());
930}
931
[email protected]9e7f015f2011-05-28 00:24:25932void BrowserProcessImpl::CreateBackgroundModeManager() {
933 DCHECK(background_mode_manager_.get() == NULL);
934 background_mode_manager_.reset(
935 new BackgroundModeManager(CommandLine::ForCurrentProcess()));
936}
937
938void BrowserProcessImpl::CreateStatusTray() {
939 DCHECK(status_tray_.get() == NULL);
940 status_tray_.reset(StatusTray::Create());
941}
942
[email protected]dbeebd52010-11-16 20:34:16943void BrowserProcessImpl::CreatePrintPreviewTabController() {
944 DCHECK(print_preview_tab_controller_.get() == NULL);
945 print_preview_tab_controller_ = new printing::PrintPreviewTabController();
946}
947
[email protected]68f88b992011-05-07 02:01:39948void BrowserProcessImpl::CreateBackgroundPrintingManager() {
949 DCHECK(background_printing_manager_.get() == NULL);
950 background_printing_manager_.reset(new printing::BackgroundPrintingManager());
951}
952
[email protected]462a0ff2011-06-02 17:15:34953void BrowserProcessImpl::CreateSafeBrowsingService() {
954 DCHECK(safe_browsing_service_.get() == NULL);
[email protected]8c40da62011-07-13 22:58:46955 // Set this flag to true so that we don't retry indefinitely to
956 // create the service class if there was an error.
[email protected]462a0ff2011-06-02 17:15:34957 created_safe_browsing_service_ = true;
[email protected]4b58e7d2011-07-11 10:22:56958#if defined(ENABLE_SAFE_BROWSING)
[email protected]462a0ff2011-06-02 17:15:34959 safe_browsing_service_ = SafeBrowsingService::CreateSafeBrowsingService();
960 safe_browsing_service_->Initialize();
[email protected]4b58e7d2011-07-11 10:22:56961#endif
[email protected]462a0ff2011-06-02 17:15:34962}
963
[email protected]a7a5e992010-12-09 23:39:51964void BrowserProcessImpl::CreateSafeBrowsingDetectionService() {
965 DCHECK(safe_browsing_detection_service_.get() == NULL);
966 // Set this flag to true so that we don't retry indefinitely to
967 // create the service class if there was an error.
968 created_safe_browsing_detection_service_ = true;
969
[email protected]4b58e7d2011-07-11 10:22:56970#if defined(ENABLE_SAFE_BROWSING)
[email protected]1eb19a32011-07-28 22:22:54971 if (IsSafeBrowsingDetectionServiceEnabled()) {
[email protected]a7a5e992010-12-09 23:39:51972 safe_browsing_detection_service_.reset(
973 safe_browsing::ClientSideDetectionService::Create(
[email protected]1eb19a32011-07-28 22:22:54974 g_browser_process->system_request_context()));
[email protected]a7a5e992010-12-09 23:39:51975 }
[email protected]4b58e7d2011-07-11 10:22:56976#endif
[email protected]a7a5e992010-12-09 23:39:51977}
978
979bool BrowserProcessImpl::IsSafeBrowsingDetectionServiceEnabled() {
980 // The safe browsing client-side detection is enabled only if the switch is
[email protected]436ebd62011-06-09 22:08:11981 // not disabled and when safe browsing related stats are allowed to be
982 // collected.
[email protected]4b58e7d2011-07-11 10:22:56983#if defined(ENABLE_SAFE_BROWSING) && !defined(OS_CHROMEOS)
[email protected]d081d192011-04-01 02:33:24984 return !CommandLine::ForCurrentProcess()->HasSwitch(
985 switches::kDisableClientSidePhishingDetection) &&
[email protected]462a0ff2011-06-02 17:15:34986 safe_browsing_service() &&
[email protected]436ebd62011-06-09 22:08:11987 safe_browsing_service()->CanReportStats();
[email protected]4b58e7d2011-07-11 10:22:56988#else
989 return false;
[email protected]d081d192011-04-01 02:33:24990#endif
[email protected]a7a5e992010-12-09 23:39:51991}
992
[email protected]419a0572011-04-18 22:21:46993void BrowserProcessImpl::ApplyDisabledSchemesPolicy() {
994 std::set<std::string> schemes;
[email protected]b99c41c2011-04-27 15:18:48995 const ListValue* scheme_list = local_state_->GetList(prefs::kDisabledSchemes);
996 for (ListValue::const_iterator iter = scheme_list->begin();
997 iter != scheme_list->end(); ++iter) {
[email protected]419a0572011-04-18 22:21:46998 std::string scheme;
999 if ((*iter)->GetAsString(&scheme))
1000 schemes.insert(scheme);
1001 }
1002 ChildProcessSecurityPolicy::GetInstance()->RegisterDisabledSchemes(schemes);
1003}
1004
[email protected]40850a52011-05-26 22:07:351005void BrowserProcessImpl::ApplyAllowCrossOriginAuthPromptPolicy() {
1006 bool value = local_state()->GetBoolean(prefs::kAllowCrossOriginAuthPrompt);
1007 resource_dispatcher_host()->set_allow_cross_origin_auth_prompt(value);
1008}
1009
[email protected]6641bf662009-08-21 00:34:091010// The BrowserProcess object must outlive the file thread so we use traits
1011// which don't do any management.
[email protected]c56428f22010-06-16 02:17:231012DISABLE_RUNNABLE_METHOD_REFCOUNT(BrowserProcessImpl);
[email protected]6641bf662009-08-21 00:34:091013
[email protected]d55aaa132009-09-28 21:08:041014#if defined(IPC_MESSAGE_LOG_ENABLED)
1015
1016void BrowserProcessImpl::SetIPCLoggingEnabled(bool enable) {
1017 // First enable myself.
1018 if (enable)
[email protected]8e8bb6d2010-12-13 08:18:551019 IPC::Logging::GetInstance()->Enable();
[email protected]d55aaa132009-09-28 21:08:041020 else
[email protected]8e8bb6d2010-12-13 08:18:551021 IPC::Logging::GetInstance()->Disable();
[email protected]d55aaa132009-09-28 21:08:041022
1023 // Now tell subprocesses. Messages to ChildProcess-derived
1024 // processes must be done on the IO thread.
1025 io_thread()->message_loop()->PostTask
1026 (FROM_HERE,
1027 NewRunnableMethod(
1028 this,
1029 &BrowserProcessImpl::SetIPCLoggingEnabledForChildProcesses,
1030 enable));
1031
1032 // Finally, tell the renderers which don't derive from ChildProcess.
1033 // Messages to the renderers must be done on the UI (main) thread.
[email protected]019191a2009-10-02 20:37:271034 for (RenderProcessHost::iterator i(RenderProcessHost::AllHostsIterator());
1035 !i.IsAtEnd(); i.Advance())
[email protected]ff47b2962011-03-07 23:51:491036 i.GetCurrentValue()->Send(new ChildProcessMsg_SetIPCLoggingEnabled(enable));
[email protected]d55aaa132009-09-28 21:08:041037}
1038
1039// Helper for SetIPCLoggingEnabled.
1040void BrowserProcessImpl::SetIPCLoggingEnabledForChildProcesses(bool enabled) {
[email protected]d04e7662010-10-10 22:24:481041 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO));
[email protected]d55aaa132009-09-28 21:08:041042
[email protected]d27893f62010-07-03 05:47:421043 BrowserChildProcessHost::Iterator i; // default constr references a singleton
[email protected]34cf97d2009-09-29 22:46:111044 while (!i.Done()) {
[email protected]ff47b2962011-03-07 23:51:491045 i->Send(new ChildProcessMsg_SetIPCLoggingEnabled(enabled));
[email protected]34cf97d2009-09-29 22:46:111046 ++i;
[email protected]d55aaa132009-09-28 21:08:041047 }
1048}
1049
1050#endif // IPC_MESSAGE_LOG_ENABLED
1051
[email protected]3cdacd42010-04-30 18:55:531052// Mac is currently not supported.
1053#if (defined(OS_WIN) || defined(OS_LINUX)) && !defined(OS_CHROMEOS)
[email protected]bd48c2b02010-04-09 20:32:421054
1055bool BrowserProcessImpl::CanAutorestartForUpdate() const {
1056 // Check if browser is in the background and if it needs to be restarted to
1057 // apply a pending update.
[email protected]c10fa3952010-08-24 16:52:531058 return BrowserList::size() == 0 && BrowserList::WillKeepAlive() &&
[email protected]815856722011-04-13 17:19:191059 upgrade_util::IsUpdatePendingRestart();
[email protected]bd48c2b02010-04-09 20:32:421060}
1061
[email protected]5c08f222010-09-22 09:37:211062// Switches to add when auto-restarting Chrome.
[email protected]6c10c972010-08-11 04:15:471063const char* const kSwitchesToAddOnAutorestart[] = {
[email protected]f9a06842010-08-21 00:32:401064 switches::kNoStartupWindow
[email protected]bd48c2b02010-04-09 20:32:421065};
1066
1067void BrowserProcessImpl::RestartPersistentInstance() {
1068 CommandLine* old_cl = CommandLine::ForCurrentProcess();
[email protected]3cdacd42010-04-30 18:55:531069 scoped_ptr<CommandLine> new_cl(new CommandLine(old_cl->GetProgram()));
[email protected]bd48c2b02010-04-09 20:32:421070
1071 std::map<std::string, CommandLine::StringType> switches =
1072 old_cl->GetSwitches();
1073
[email protected]5c08f222010-09-22 09:37:211074 switches::RemoveSwitchesForAutostart(&switches);
[email protected]bd48c2b02010-04-09 20:32:421075
1076 // Append the rest of the switches (along with their values, if any)
1077 // to the new command line
1078 for (std::map<std::string, CommandLine::StringType>::const_iterator i =
1079 switches.begin(); i != switches.end(); ++i) {
1080 CommandLine::StringType switch_value = i->second;
1081 if (switch_value.length() > 0) {
[email protected]05076ba22010-07-30 05:59:571082 new_cl->AppendSwitchNative(i->first, i->second);
[email protected]bd48c2b02010-04-09 20:32:421083 } else {
[email protected]3cdacd42010-04-30 18:55:531084 new_cl->AppendSwitch(i->first);
[email protected]bd48c2b02010-04-09 20:32:421085 }
1086 }
1087
[email protected]6c10c972010-08-11 04:15:471088 // Ensure that our desired switches are set on the new process.
[email protected]5c08f222010-09-22 09:37:211089 for (size_t i = 0; i < arraysize(kSwitchesToAddOnAutorestart); ++i) {
[email protected]6c10c972010-08-11 04:15:471090 if (!new_cl->HasSwitch(kSwitchesToAddOnAutorestart[i]))
1091 new_cl->AppendSwitch(kSwitchesToAddOnAutorestart[i]);
1092 }
[email protected]bd48c2b02010-04-09 20:32:421093
[email protected]3cdacd42010-04-30 18:55:531094 DLOG(WARNING) << "Shutting down current instance of the browser.";
[email protected]bc63a072011-06-28 21:12:571095 BrowserList::AttemptExit();
[email protected]3cdacd42010-04-30 18:55:531096
1097 // Transfer ownership to Upgrade.
[email protected]815856722011-04-13 17:19:191098 upgrade_util::SetNewCommandLine(new_cl.release());
[email protected]bd48c2b02010-04-09 20:32:421099}
1100
1101void BrowserProcessImpl::OnAutoupdateTimer() {
1102 if (CanAutorestartForUpdate()) {
[email protected]3cdacd42010-04-30 18:55:531103 DLOG(WARNING) << "Detected update. Restarting browser.";
[email protected]bd48c2b02010-04-09 20:32:421104 RestartPersistentInstance();
1105 }
1106}
1107
[email protected]3cdacd42010-04-30 18:55:531108#endif // (defined(OS_WIN) || defined(OS_LINUX)) && !defined(OS_CHROMEOS)