blob: e3a7bb5055245a185bb95fb5f281468dcb9b9bea [file] [log] [blame]
[email protected]3a80ea332012-01-09 19:53:291// Copyright (c) 2012 The Chromium Authors. All rights reserved.
license.botbf09a502008-08-24 00:55:552// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
initial.commit09911bf2008-07-26 23:55:294
5#include "chrome/browser/browser_process_impl.h"
6
[email protected]38489a32012-05-11 02:24:547#include <algorithm>
[email protected]3cdacd42010-04-30 18:55:538#include <map>
[email protected]68f88b992011-05-07 02:01:399#include <set>
10#include <vector>
[email protected]3cdacd42010-04-30 18:55:5311
[email protected]b3cc0542011-11-19 22:43:4412#include "base/bind.h"
13#include "base/bind_helpers.h"
initial.commit09911bf2008-07-26 23:55:2914#include "base/command_line.h"
[email protected]6b4e6852012-02-14 04:02:4815#include "base/debug/alias.h"
[email protected]6641bf662009-08-21 00:34:0916#include "base/file_util.h"
initial.commit09911bf2008-07-26 23:55:2917#include "base/path_service.h"
[email protected]985655a2011-02-23 09:54:2518#include "base/synchronization/waitable_event.h"
[email protected]34b99632011-01-01 01:01:0619#include "base/threading/thread.h"
20#include "base/threading/thread_restrictions.h"
[email protected]e13ad79b2010-07-22 21:36:5021#include "chrome/browser/automation/automation_provider_list.h"
[email protected]a07676b22011-06-17 16:36:5322#include "chrome/browser/background/background_mode_manager.h"
[email protected]ac262c9f2008-10-19 17:45:2123#include "chrome/browser/browser_trial.h"
[email protected]c38831a12011-10-28 12:44:4924#include "chrome/browser/chrome_browser_main.h"
[email protected]dfba8762011-09-02 12:49:5425#include "chrome/browser/chrome_plugin_service_filter.h"
[email protected]c1adf5a2011-08-03 22:11:3726#include "chrome/browser/component_updater/component_updater_configurator.h"
27#include "chrome/browser/component_updater/component_updater_service.h"
[email protected]4475d232011-07-27 15:29:2028#include "chrome/browser/debugger/remote_debugging_server.h"
[email protected]254ed742011-08-16 18:45:2729#include "chrome/browser/download/download_request_limiter.h"
[email protected]75e51b52012-02-04 16:57:5430#include "chrome/browser/download/download_status_updater.h"
[email protected]3ce02412011-03-01 12:01:1531#include "chrome/browser/extensions/extension_event_router_forwarder.h"
[email protected]fc4facd2011-03-22 23:18:5032#include "chrome/browser/extensions/extension_tab_id_map.h"
[email protected]815856722011-04-13 17:19:1933#include "chrome/browser/first_run/upgrade_util.h"
[email protected]dcefa302009-05-20 00:24:3934#include "chrome/browser/icon_manager.h"
[email protected]c4ff4952010-01-08 19:12:4735#include "chrome/browser/intranet_redirect_detector.h"
[email protected]0ac83682010-01-22 17:46:2736#include "chrome/browser/io_thread.h"
[email protected]dc6f4962009-02-13 01:25:5037#include "chrome/browser/metrics/metrics_service.h"
[email protected]0b565182011-03-02 18:11:1538#include "chrome/browser/metrics/thread_watcher.h"
[email protected]b2fcd0e2010-12-01 15:19:4039#include "chrome/browser/net/chrome_net_log.h"
[email protected]ca167a32011-09-30 15:19:1140#include "chrome/browser/net/crl_set_fetcher.h"
[email protected]d393a0fd2009-05-13 23:32:0141#include "chrome/browser/net/sdch_dictionary_fetcher.h"
[email protected]29672ab2009-10-30 03:44:0342#include "chrome/browser/notifications/notification_ui_manager.h"
[email protected]985655a2011-02-23 09:54:2543#include "chrome/browser/policy/browser_policy_connector.h"
[email protected]8d6b2432012-03-31 12:11:1844#include "chrome/browser/policy/policy_service_impl.h"
[email protected]243ec0782012-02-14 21:03:0245#include "chrome/browser/policy/policy_service_stub.h"
[email protected]caf63aea2011-04-26 11:04:1046#include "chrome/browser/prefs/browser_prefs.h"
[email protected]37858e52010-08-26 00:22:0247#include "chrome/browser/prefs/pref_service.h"
[email protected]1459fb62011-05-25 19:03:2748#include "chrome/browser/prerender/prerender_tracker.h"
[email protected]68f88b992011-05-07 02:01:3949#include "chrome/browser/printing/background_printing_manager.h"
[email protected]e06131d2010-02-10 18:40:3350#include "chrome/browser/printing/print_job_manager.h"
[email protected]dbeebd52010-11-16 20:34:1651#include "chrome/browser/printing/print_preview_tab_controller.h"
[email protected]8ecad5e2010-12-02 21:18:3352#include "chrome/browser/profiles/profile_manager.h"
[email protected]8bcdf072011-06-03 16:52:1553#include "chrome/browser/renderer_host/chrome_resource_dispatcher_host_delegate.h"
[email protected]81218f42009-02-05 18:48:0854#include "chrome/browser/safe_browsing/safe_browsing_service.h"
[email protected]e450fa62011-02-01 12:52:5655#include "chrome/browser/shell_integration.h"
[email protected]9e7f015f2011-05-28 00:24:2556#include "chrome/browser/status_icons/status_tray.h"
[email protected]0b4d3382010-07-14 16:13:0457#include "chrome/browser/tab_closeable_state_watcher.h"
[email protected]7a0e72f2011-09-20 19:59:1158#include "chrome/browser/tab_contents/thumbnail_generator.h"
[email protected]71b73f02011-04-06 15:57:2959#include "chrome/browser/ui/browser_list.h"
[email protected]4ef795df2010-02-03 02:35:0860#include "chrome/common/chrome_constants.h"
[email protected]794b8f22012-04-25 23:59:2661#include "chrome/common/chrome_content_client.h"
[email protected]432115822011-07-10 15:52:2762#include "chrome/common/chrome_notification_types.h"
initial.commit09911bf2008-07-26 23:55:2963#include "chrome/common/chrome_paths.h"
64#include "chrome/common/chrome_switches.h"
[email protected]f1b6de22010-03-06 12:13:4765#include "chrome/common/extensions/extension_l10n_util.h"
[email protected]985655a2011-02-23 09:54:2566#include "chrome/common/extensions/extension_resource.h"
[email protected]ea587b02010-05-21 15:01:3567#include "chrome/common/json_pref_store.h"
initial.commit09911bf2008-07-26 23:55:2968#include "chrome/common/pref_names.h"
[email protected]5c08f222010-09-22 09:37:2169#include "chrome/common/switch_utils.h"
[email protected]985655a2011-02-23 09:54:2570#include "chrome/common/url_constants.h"
[email protected]bd48c2b02010-04-09 20:32:4271#include "chrome/installer/util/google_update_constants.h"
[email protected]c38831a12011-10-28 12:44:4972#include "content/public/browser/browser_thread.h"
[email protected]b9535422012-02-09 01:47:5973#include "content/public/browser/child_process_security_policy.h"
[email protected]ad50def52011-10-19 23:17:0774#include "content/public/browser/notification_details.h"
[email protected]3a5180ae2011-12-21 02:39:3875#include "content/public/browser/plugin_service.h"
[email protected]f3b1a082011-11-18 00:34:3076#include "content/public/browser/render_process_host.h"
[email protected]ea114722012-03-12 01:11:2577#include "content/public/browser/resource_dispatcher_host.h"
[email protected]794b8f22012-04-25 23:59:2678#include "content/public/common/pepper_plugin_info.h"
[email protected]12c84e22011-07-11 09:35:4579#include "net/socket/client_socket_pool_manager.h"
[email protected]abe2c032011-03-31 18:49:3480#include "net/url_request/url_request_context_getter.h"
[email protected]2dfeaf92011-01-10 21:08:2181#include "ui/base/clipboard/clipboard.h"
[email protected]c051a1b2011-01-21 23:30:1782#include "ui/base/l10n/l10n_util.h"
[email protected]b112a4c2009-02-01 20:24:0183
84#if defined(OS_WIN)
[email protected]477ae052011-11-18 23:53:5785#include "ui/views/focus/view_storage.h"
[email protected]03d8d3e92011-09-20 06:07:1186#elif defined(OS_MACOSX)
87#include "chrome/browser/chrome_browser_main_mac.h"
[email protected]86230b92009-11-23 20:38:3888#endif
89
[email protected]4189bc222012-03-29 23:11:4790#if defined(USE_AURA)
91#include "ui/aura/env.h"
92#endif
93
[email protected]db0e86dd2011-03-16 14:47:2194#if defined(OS_CHROMEOS)
[email protected]38489a32012-05-11 02:24:5495#include "chrome/browser/chromeos/oom_priority_manager.h"
[email protected]db0e86dd2011-03-16 14:47:2196#endif // defined(OS_CHROMEOS)
97
[email protected]3cdacd42010-04-30 18:55:5398#if (defined(OS_WIN) || defined(OS_LINUX)) && !defined(OS_CHROMEOS)
99// How often to check if the persistent instance of Chrome needs to restart
100// to install an update.
101static const int kUpdateCheckIntervalHours = 6;
102#endif
103
[email protected]af391f02011-09-15 06:13:35104#if defined(OS_WIN)
105// Attest to the fact that the call to the file thread to save preferences has
106// run, and it is safe to terminate. This avoids the potential of some other
107// task prematurely terminating our waiting message loop by posting a
108// QuitTask().
109static bool g_end_session_file_thread_has_completed = false;
110#endif
111
[email protected]c6032e82010-09-13 20:06:05112#if defined(USE_X11)
113// How long to wait for the File thread to complete during EndSession, on
114// Linux. We have a timeout here because we're unable to run the UI messageloop
115// and there's some deadlock risk. Our only option is to exit anyway.
116static const int kEndSessionTimeoutSeconds = 10;
117#endif
118
[email protected]631bb742011-11-02 11:29:39119using content::BrowserThread;
[email protected]b9535422012-02-09 01:47:59120using content::ChildProcessSecurityPolicy;
[email protected]3a5180ae2011-12-21 02:39:38121using content::PluginService;
[email protected]ea114722012-03-12 01:11:25122using content::ResourceDispatcherHost;
[email protected]631bb742011-11-02 11:29:39123
[email protected]bb975362009-01-21 01:00:22124BrowserProcessImpl::BrowserProcessImpl(const CommandLine& command_line)
[email protected]99907362012-01-11 05:41:40125 : created_metrics_service_(false),
[email protected]0b565182011-03-02 18:11:15126 created_watchdog_thread_(false),
initial.commit09911bf2008-07-26 23:55:29127 created_profile_manager_(false),
128 created_local_state_(false),
[email protected]b112a4c2009-02-01 20:24:01129 created_icon_manager_(false),
[email protected]985655a2011-02-23 09:54:25130 created_browser_policy_connector_(false),
[email protected]29672ab2009-10-30 03:44:03131 created_notification_ui_manager_(false),
[email protected]462a0ff2011-06-02 17:15:34132 created_safe_browsing_service_(false),
initial.commit09911bf2008-07-26 23:55:29133 module_ref_count_(0),
[email protected]afd20c022010-06-10 00:48:20134 did_start_(false),
[email protected]1b2db1a2008-08-08 17:46:13135 checked_for_new_frames_(false),
[email protected]7a0e72f2011-09-20 19:59:11136 using_new_frames_(false),
137 thumbnail_generator_(new ThumbnailGenerator),
138 download_status_updater_(new DownloadStatusUpdater) {
initial.commit09911bf2008-07-26 23:55:29139 g_browser_process = this;
[email protected]2dfeaf92011-01-10 21:08:21140 clipboard_.reset(new ui::Clipboard);
initial.commit09911bf2008-07-26 23:55:29141
[email protected]058e5732012-03-01 22:48:03142#if !defined(OS_ANDROID)
initial.commit09911bf2008-07-26 23:55:29143 // Must be created after the NotificationService.
144 print_job_manager_.reset(new printing::PrintJobManager);
[email protected]058e5732012-03-01 22:48:03145#endif
initial.commit09911bf2008-07-26 23:55:29146
[email protected]b2fcd0e2010-12-01 15:19:40147 net_log_.reset(new ChromeNetLog);
[email protected]3ce02412011-03-01 12:01:15148
[email protected]8add5412011-10-01 21:02:14149 ChildProcessSecurityPolicy::GetInstance()->RegisterWebSafeScheme(
150 chrome::kExtensionScheme);
151
[email protected]3ce02412011-03-01 12:01:15152 extension_event_router_forwarder_ = new ExtensionEventRouterForwarder;
[email protected]fc4facd2011-03-22 23:18:50153
154 ExtensionTabIdMap::GetInstance()->Init();
initial.commit09911bf2008-07-26 23:55:29155}
156
157BrowserProcessImpl::~BrowserProcessImpl() {
[email protected]058e5732012-03-01 22:48:03158#if !defined(OS_ANDROID)
[email protected]2e5b60a22011-11-28 15:56:41159 // Wait for the pending print jobs to finish.
160 print_job_manager_->OnQuit();
161 print_job_manager_.reset();
[email protected]058e5732012-03-01 22:48:03162#endif
[email protected]2e5b60a22011-11-28 15:56:41163
164 tracked_objects::ThreadData::EnsureCleanupWasCalled(4);
165
166 g_browser_process = NULL;
167}
168
169void BrowserProcessImpl::StartTearDown() {
[email protected]2e22e2f2012-03-15 21:53:10170#if defined(ENABLE_AUTOMATION)
initial.commit09911bf2008-07-26 23:55:29171 // Delete the AutomationProviderList before NotificationService,
172 // since it may try to unregister notifications
173 // Both NotificationService and AutomationProvider are singleton instances in
174 // the BrowserProcess. Since AutomationProvider may have some active
175 // notification observers, it is essential that it gets destroyed before the
176 // NotificationService. NotificationService won't be destroyed until after
177 // this destructor is run.
178 automation_provider_list_.reset();
[email protected]2e22e2f2012-03-15 21:53:10179#endif
initial.commit09911bf2008-07-26 23:55:29180
[email protected]d393a0fd2009-05-13 23:32:01181 // We need to shutdown the SdchDictionaryFetcher as it regularly holds
182 // a pointer to a URLFetcher, and that URLFetcher (upon destruction) will do
183 // a PostDelayedTask onto the IO thread. This shutdown call will both discard
184 // any pending URLFetchers, and avoid creating any more.
[email protected]cf956b982011-12-02 12:00:45185 BrowserThread::PostTask(BrowserThread::IO, FROM_HERE,
186 base::Bind(&SdchDictionaryFetcher::Shutdown));
[email protected]d393a0fd2009-05-13 23:32:01187
[email protected]665fa012012-05-09 00:24:38188 // We need to destroy the MetricsService, IntranetRedirectDetector, and
189 // SafeBrowsing ClientSideDetectionService (owned by the SafeBrowsingService)
190 // before the io_thread_ gets destroyed, since their destructors can call the
191 // URLFetcher destructor, which does a PostDelayedTask operation on the IO
192 // thread. (The IO thread will handle that URLFetcher operation before going
193 // away.)
initial.commit09911bf2008-07-26 23:55:29194 metrics_service_.reset();
[email protected]c4ff4952010-01-08 19:12:47195 intranet_redirect_detector_.reset();
[email protected]9efb46692011-08-23 12:56:05196#if defined(ENABLE_SAFE_BROWSING)
197 if (safe_browsing_service_.get()) {
198 safe_browsing_service()->ShutDown();
199 }
200#endif
initial.commit09911bf2008-07-26 23:55:29201
[email protected]d8a899c2010-09-21 04:50:33202 // Need to clear the desktop notification balloons before the io_thread_ and
203 // before the profiles, since if there are any still showing we will access
204 // those things during teardown.
205 notification_ui_manager_.reset();
206
initial.commit09911bf2008-07-26 23:55:29207 // Need to clear profiles (download managers) before the io_thread_.
208 profile_manager_.reset();
209
210 // Debugger must be cleaned up before IO thread and NotificationService.
[email protected]4475d232011-07-27 15:29:20211 remote_debugging_server_.reset();
212
[email protected]fc4facd2011-03-22 23:18:50213 ExtensionTabIdMap::GetInstance()->Shutdown();
214
[email protected]985655a2011-02-23 09:54:25215 // The policy providers managed by |browser_policy_connector_| need to shut
216 // down while the IO and FILE threads are still alive.
217 browser_policy_connector_.reset();
[email protected]f2a893c2011-01-05 09:38:07218
[email protected]8fd11832011-07-14 20:01:13219 // Stop the watchdog thread before stopping other threads.
220 watchdog_thread_.reset();
[email protected]4189bc222012-03-29 23:11:47221
222#if defined(USE_AURA)
223 // Delete aura after the metrics service has been deleted as it accesses
224 // monitor information.
225 aura::Env::DeleteInstance();
226#endif
[email protected]2e5b60a22011-11-28 15:56:41227}
[email protected]8fd11832011-07-14 20:01:13228
[email protected]99907362012-01-11 05:41:40229void BrowserProcessImpl::PostDestroyThreads() {
230 // With the file_thread_ flushed, we can release any icon resources.
231 icon_manager_.reset();
initial.commit09911bf2008-07-26 23:55:29232
[email protected]99907362012-01-11 05:41:40233 // Reset associated state right after actual thread is stopped,
234 // as io_thread_.global_ cleanup happens in CleanUp on the IO
235 // thread, i.e. as the thread exits its message loop.
236 //
237 // This is important also because in various places, the
238 // IOThread object being NULL is considered synonymous with the
239 // IO thread having stopped.
240 io_thread_.reset();
initial.commit09911bf2008-07-26 23:55:29241}
242
[email protected]c6032e82010-09-13 20:06:05243#if defined(OS_WIN)
[email protected]af391f02011-09-15 06:13:35244// Send a QuitTask to the given MessageLoop when the (file) thread has processed
245// our (other) recent requests (to save preferences).
246// Change the boolean so that the receiving thread will know that we did indeed
247// send the QuitTask that terminated the message loop.
[email protected]295039bd2008-08-15 04:32:57248static void PostQuit(MessageLoop* message_loop) {
[email protected]af391f02011-09-15 06:13:35249 g_end_session_file_thread_has_completed = true;
[email protected]a778709f2011-12-10 00:28:17250 message_loop->PostTask(FROM_HERE, MessageLoop::QuitClosure());
[email protected]295039bd2008-08-15 04:32:57251}
[email protected]c6032e82010-09-13 20:06:05252#elif defined(USE_X11)
253static void Signal(base::WaitableEvent* event) {
254 event->Signal();
255}
256#endif
initial.commit09911bf2008-07-26 23:55:29257
[email protected]b443cb042009-12-15 22:05:09258unsigned int BrowserProcessImpl::AddRefModule() {
259 DCHECK(CalledOnValidThread());
[email protected]6b4e6852012-02-14 04:02:48260
261 // CHECK(!IsShuttingDown());
262 if (IsShuttingDown()) {
263 // Copy the stacktrace which released the final reference onto our stack so
264 // it will be available in the crash report for inspection.
265 base::debug::StackTrace callstack = release_last_reference_callstack_;
266 base::debug::Alias(&callstack);
267 CHECK(false);
268 }
269
[email protected]afd20c022010-06-10 00:48:20270 did_start_ = true;
[email protected]b443cb042009-12-15 22:05:09271 module_ref_count_++;
272 return module_ref_count_;
273}
274
275unsigned int BrowserProcessImpl::ReleaseModule() {
276 DCHECK(CalledOnValidThread());
[email protected]760d970a2010-05-18 00:39:18277 DCHECK_NE(0u, module_ref_count_);
[email protected]b443cb042009-12-15 22:05:09278 module_ref_count_--;
279 if (0 == module_ref_count_) {
[email protected]6b4e6852012-02-14 04:02:48280 release_last_reference_callstack_ = base::debug::StackTrace();
281
[email protected]e6244c182011-11-01 22:06:58282 CHECK(MessageLoop::current()->is_running());
[email protected]7d038c32010-12-14 00:40:00283 // Allow UI and IO threads to do blocking IO on shutdown, since we do a lot
284 // of it on shutdown for valid reasons.
285 base::ThreadRestrictions::SetIOAllowed(true);
[email protected]0a53082e2011-09-16 09:31:25286 CHECK(!BrowserList::GetLastActive());
[email protected]dd483702011-12-02 14:47:42287 BrowserThread::PostTask(
288 BrowserThread::IO,
[email protected]7d038c32010-12-14 00:40:00289 FROM_HERE,
[email protected]dcde7672012-01-06 02:37:17290 base::Bind(base::IgnoreResult(&base::ThreadRestrictions::SetIOAllowed),
291 true));
[email protected]03d8d3e92011-09-20 06:07:11292
293#if defined(OS_MACOSX)
[email protected]8d2f91e2011-09-15 22:38:04294 MessageLoop::current()->PostTask(
[email protected]03d8d3e92011-09-20 06:07:11295 FROM_HERE,
[email protected]b3cc0542011-11-19 22:43:44296 base::Bind(ChromeBrowserMainPartsMac::DidEndMainMessageLoop));
[email protected]03d8d3e92011-09-20 06:07:11297#endif
[email protected]b443cb042009-12-15 22:05:09298 MessageLoop::current()->Quit();
299 }
300 return module_ref_count_;
301}
302
initial.commit09911bf2008-07-26 23:55:29303void BrowserProcessImpl::EndSession() {
initial.commit09911bf2008-07-26 23:55:29304 // Mark all the profiles as clean.
305 ProfileManager* pm = profile_manager();
[email protected]844a1002011-04-19 11:37:21306 std::vector<Profile*> profiles(pm->GetLoadedProfiles());
307 for (size_t i = 0; i < profiles.size(); ++i)
308 profiles[i]->MarkAsCleanShutdown();
initial.commit09911bf2008-07-26 23:55:29309
310 // Tell the metrics service it was cleanly shutdown.
311 MetricsService* metrics = g_browser_process->metrics_service();
312 if (metrics && local_state()) {
initial.commit09911bf2008-07-26 23:55:29313 metrics->RecordStartOfSessionEnd();
314
315 // MetricsService lazily writes to prefs, force it to write now.
[email protected]fbe17c8a2011-12-27 16:41:48316 local_state()->CommitPendingWrite();
initial.commit09911bf2008-07-26 23:55:29317 }
318
[email protected]79a75b02012-04-26 18:03:58319 // http://crbug.com/125207
320 base::ThreadRestrictions::ScopedAllowWait allow_wait;
321
initial.commit09911bf2008-07-26 23:55:29322 // We must write that the profile and metrics service shutdown cleanly,
323 // otherwise on startup we'll think we crashed. So we block until done and
324 // then proceed with normal shutdown.
[email protected]c6032e82010-09-13 20:06:05325#if defined(USE_X11)
326 // Can't run a local loop on linux. Instead create a waitable event.
[email protected]0bfbcdb2011-09-15 21:28:04327 scoped_ptr<base::WaitableEvent> done_writing(
328 new base::WaitableEvent(false, false));
[email protected]d04e7662010-10-10 22:24:48329 BrowserThread::PostTask(BrowserThread::FILE, FROM_HERE,
[email protected]b3cc0542011-11-19 22:43:44330 base::Bind(Signal, done_writing.get()));
[email protected]0bfbcdb2011-09-15 21:28:04331 // If all file writes haven't cleared in the timeout, leak the WaitableEvent
332 // so that there's no race to reference it in Signal().
333 if (!done_writing->TimedWait(
334 base::TimeDelta::FromSeconds(kEndSessionTimeoutSeconds)))
335 ignore_result(done_writing.release());
336
[email protected]c6032e82010-09-13 20:06:05337#elif defined(OS_WIN)
[email protected]d04e7662010-10-10 22:24:48338 BrowserThread::PostTask(BrowserThread::FILE, FROM_HERE,
[email protected]b3cc0542011-11-19 22:43:44339 base::Bind(PostQuit, MessageLoop::current()));
[email protected]af391f02011-09-15 06:13:35340 int quits_received = 0;
341 do {
342 MessageLoop::current()->Run();
343 ++quits_received;
344 } while (!g_end_session_file_thread_has_completed);
345 // If we did get extra quits, then we should re-post them to the message loop.
346 while (--quits_received > 0)
[email protected]a778709f2011-12-10 00:28:17347 MessageLoop::current()->PostTask(FROM_HERE, MessageLoop::QuitClosure());
[email protected]c6032e82010-09-13 20:06:05348#else
349 NOTIMPLEMENTED();
350#endif
initial.commit09911bf2008-07-26 23:55:29351}
352
[email protected]e13ad79b2010-07-22 21:36:50353MetricsService* BrowserProcessImpl::metrics_service() {
354 DCHECK(CalledOnValidThread());
355 if (!created_metrics_service_)
356 CreateMetricsService();
357 return metrics_service_.get();
358}
359
360IOThread* BrowserProcessImpl::io_thread() {
361 DCHECK(CalledOnValidThread());
[email protected]2e5b60a22011-11-28 15:56:41362 DCHECK(io_thread_.get());
[email protected]e13ad79b2010-07-22 21:36:50363 return io_thread_.get();
364}
365
[email protected]0b565182011-03-02 18:11:15366WatchDogThread* BrowserProcessImpl::watchdog_thread() {
367 DCHECK(CalledOnValidThread());
368 if (!created_watchdog_thread_)
369 CreateWatchdogThread();
370 DCHECK(watchdog_thread_.get() != NULL);
371 return watchdog_thread_.get();
372}
373
[email protected]e13ad79b2010-07-22 21:36:50374ProfileManager* BrowserProcessImpl::profile_manager() {
375 DCHECK(CalledOnValidThread());
376 if (!created_profile_manager_)
377 CreateProfileManager();
378 return profile_manager_.get();
379}
380
381PrefService* BrowserProcessImpl::local_state() {
382 DCHECK(CalledOnValidThread());
383 if (!created_local_state_)
384 CreateLocalState();
385 return local_state_.get();
386}
387
[email protected]2dfeaf92011-01-10 21:08:21388ui::Clipboard* BrowserProcessImpl::clipboard() {
[email protected]e13ad79b2010-07-22 21:36:50389 DCHECK(CalledOnValidThread());
390 return clipboard_.get();
391}
392
[email protected]abe2c032011-03-31 18:49:34393net::URLRequestContextGetter* BrowserProcessImpl::system_request_context() {
[email protected]db0e86dd2011-03-16 14:47:21394 DCHECK(CalledOnValidThread());
395 return io_thread()->system_url_request_context_getter();
396}
397
398#if defined(OS_CHROMEOS)
[email protected]38489a32012-05-11 02:24:54399chromeos::OomPriorityManager* BrowserProcessImpl::oom_priority_manager() {
[email protected]5b869962011-09-20 19:49:33400 DCHECK(CalledOnValidThread());
401 if (!oom_priority_manager_.get())
[email protected]38489a32012-05-11 02:24:54402 oom_priority_manager_.reset(new chromeos::OomPriorityManager());
[email protected]5b869962011-09-20 19:49:33403 return oom_priority_manager_.get();
404}
[email protected]db0e86dd2011-03-16 14:47:21405#endif // defined(OS_CHROMEOS)
406
[email protected]3ce02412011-03-01 12:01:15407ExtensionEventRouterForwarder*
408BrowserProcessImpl::extension_event_router_forwarder() {
409 return extension_event_router_forwarder_.get();
410}
411
[email protected]e13ad79b2010-07-22 21:36:50412NotificationUIManager* BrowserProcessImpl::notification_ui_manager() {
413 DCHECK(CalledOnValidThread());
414 if (!created_notification_ui_manager_)
415 CreateNotificationUIManager();
416 return notification_ui_manager_.get();
417}
418
[email protected]985655a2011-02-23 09:54:25419policy::BrowserPolicyConnector* BrowserProcessImpl::browser_policy_connector() {
[email protected]f2a893c2011-01-05 09:38:07420 DCHECK(CalledOnValidThread());
[email protected]985655a2011-02-23 09:54:25421 if (!created_browser_policy_connector_) {
422 DCHECK(browser_policy_connector_.get() == NULL);
423 created_browser_policy_connector_ = true;
[email protected]f31e2e52011-07-14 16:01:19424#if defined(ENABLE_CONFIGURATION_POLICY)
[email protected]5fe04582011-11-21 19:25:57425 browser_policy_connector_.reset(new policy::BrowserPolicyConnector());
426 browser_policy_connector_->Init();
[email protected]f31e2e52011-07-14 16:01:19427#endif
[email protected]f2a893c2011-01-05 09:38:07428 }
[email protected]985655a2011-02-23 09:54:25429 return browser_policy_connector_.get();
[email protected]f2a893c2011-01-05 09:38:07430}
431
[email protected]a4179c2a2012-02-09 18:14:21432policy::PolicyService* BrowserProcessImpl::policy_service() {
[email protected]8d6b2432012-03-31 12:11:18433 if (!policy_service_.get()) {
[email protected]a4179c2a2012-02-09 18:14:21434#if defined(ENABLE_CONFIGURATION_POLICY)
[email protected]8d6b2432012-03-31 12:11:18435 policy_service_.reset(browser_policy_connector()->CreatePolicyService());
[email protected]a4179c2a2012-02-09 18:14:21436#else
[email protected]243ec0782012-02-14 21:03:02437 policy_service_.reset(new policy::PolicyServiceStub());
[email protected]a4179c2a2012-02-09 18:14:21438#endif
[email protected]8d6b2432012-03-31 12:11:18439 }
440 return policy_service_.get();
[email protected]a4179c2a2012-02-09 18:14:21441}
442
[email protected]e13ad79b2010-07-22 21:36:50443IconManager* BrowserProcessImpl::icon_manager() {
444 DCHECK(CalledOnValidThread());
445 if (!created_icon_manager_)
446 CreateIconManager();
447 return icon_manager_.get();
448}
449
450ThumbnailGenerator* BrowserProcessImpl::GetThumbnailGenerator() {
[email protected]7a0e72f2011-09-20 19:59:11451 return thumbnail_generator_.get();
[email protected]e13ad79b2010-07-22 21:36:50452}
453
[email protected]120655d2011-09-16 22:10:32454AutomationProviderList* BrowserProcessImpl::GetAutomationProviderList() {
[email protected]e13ad79b2010-07-22 21:36:50455 DCHECK(CalledOnValidThread());
[email protected]2e22e2f2012-03-15 21:53:10456#if defined(ENABLE_AUTOMATION)
[email protected]120655d2011-09-16 22:10:32457 if (automation_provider_list_.get() == NULL)
458 automation_provider_list_.reset(new AutomationProviderList());
[email protected]e13ad79b2010-07-22 21:36:50459 return automation_provider_list_.get();
[email protected]2e22e2f2012-03-15 21:53:10460#else
461 return NULL;
462#endif
[email protected]e13ad79b2010-07-22 21:36:50463}
464
[email protected]5613126e2011-01-31 15:27:55465void BrowserProcessImpl::InitDevToolsHttpProtocolHandler(
[email protected]4475d232011-07-27 15:29:20466 Profile* profile,
[email protected]01000cf12011-02-04 11:39:22467 const std::string& ip,
[email protected]5613126e2011-01-31 15:27:55468 int port,
469 const std::string& frontend_url) {
[email protected]e13ad79b2010-07-22 21:36:50470 DCHECK(CalledOnValidThread());
[email protected]4475d232011-07-27 15:29:20471 remote_debugging_server_.reset(
472 new RemoteDebuggingServer(profile, ip, port, frontend_url));
[email protected]5613126e2011-01-31 15:27:55473}
474
[email protected]e13ad79b2010-07-22 21:36:50475bool BrowserProcessImpl::IsShuttingDown() {
476 DCHECK(CalledOnValidThread());
477 return did_start_ && 0 == module_ref_count_;
478}
479
initial.commit09911bf2008-07-26 23:55:29480printing::PrintJobManager* BrowserProcessImpl::print_job_manager() {
481 // TODO(abarth): DCHECK(CalledOnValidThread());
[email protected]d8922f22010-05-07 00:57:27482 // http://code.google.com/p/chromium/issues/detail?id=6828
initial.commit09911bf2008-07-26 23:55:29483 // print_job_manager_ is initialized in the constructor and destroyed in the
484 // destructor, so it should always be valid.
485 DCHECK(print_job_manager_.get());
486 return print_job_manager_.get();
487}
488
[email protected]dbeebd52010-11-16 20:34:16489printing::PrintPreviewTabController*
490 BrowserProcessImpl::print_preview_tab_controller() {
[email protected]058e5732012-03-01 22:48:03491#if defined(OS_ANDROID)
492 NOTIMPLEMENTED();
493 return NULL;
494#else
[email protected]dbeebd52010-11-16 20:34:16495 DCHECK(CalledOnValidThread());
496 if (!print_preview_tab_controller_.get())
497 CreatePrintPreviewTabController();
498 return print_preview_tab_controller_.get();
[email protected]058e5732012-03-01 22:48:03499#endif
[email protected]dbeebd52010-11-16 20:34:16500}
501
[email protected]68f88b992011-05-07 02:01:39502printing::BackgroundPrintingManager*
503 BrowserProcessImpl::background_printing_manager() {
[email protected]058e5732012-03-01 22:48:03504#if defined(OS_ANDROID)
505 NOTIMPLEMENTED();
506 return NULL;
507#else
[email protected]68f88b992011-05-07 02:01:39508 DCHECK(CalledOnValidThread());
509 if (!background_printing_manager_.get())
510 CreateBackgroundPrintingManager();
511 return background_printing_manager_.get();
[email protected]058e5732012-03-01 22:48:03512#endif
[email protected]68f88b992011-05-07 02:01:39513}
514
[email protected]e13ad79b2010-07-22 21:36:50515IntranetRedirectDetector* BrowserProcessImpl::intranet_redirect_detector() {
516 DCHECK(CalledOnValidThread());
517 if (!intranet_redirect_detector_.get())
518 CreateIntranetRedirectDetector();
519 return intranet_redirect_detector_.get();
520}
521
522const std::string& BrowserProcessImpl::GetApplicationLocale() {
523 DCHECK(!locale_.empty());
524 return locale_;
525}
526
527void BrowserProcessImpl::SetApplicationLocale(const std::string& locale) {
528 locale_ = locale;
529 extension_l10n_util::SetProcessLocale(locale);
530}
531
[email protected]073ed7b2010-09-27 09:20:02532DownloadStatusUpdater* BrowserProcessImpl::download_status_updater() {
[email protected]7a0e72f2011-09-20 19:59:11533 return download_status_updater_.get();
[email protected]073ed7b2010-09-27 09:20:02534}
535
[email protected]254ed742011-08-16 18:45:27536DownloadRequestLimiter* BrowserProcessImpl::download_request_limiter() {
537 DCHECK(CalledOnValidThread());
538 if (!download_request_limiter_)
539 download_request_limiter_ = new DownloadRequestLimiter();
540 return download_request_limiter_;
541}
542
[email protected]e13ad79b2010-07-22 21:36:50543TabCloseableStateWatcher* BrowserProcessImpl::tab_closeable_state_watcher() {
544 DCHECK(CalledOnValidThread());
545 if (!tab_closeable_state_watcher_.get())
546 CreateTabCloseableStateWatcher();
547 return tab_closeable_state_watcher_.get();
548}
549
[email protected]9e7f015f2011-05-28 00:24:25550BackgroundModeManager* BrowserProcessImpl::background_mode_manager() {
551 DCHECK(CalledOnValidThread());
552 if (!background_mode_manager_.get())
553 CreateBackgroundModeManager();
554 return background_mode_manager_.get();
555}
556
557StatusTray* BrowserProcessImpl::status_tray() {
558 DCHECK(CalledOnValidThread());
559 if (!status_tray_.get())
560 CreateStatusTray();
561 return status_tray_.get();
562}
563
[email protected]462a0ff2011-06-02 17:15:34564
565SafeBrowsingService* BrowserProcessImpl::safe_browsing_service() {
566 DCHECK(CalledOnValidThread());
567 if (!created_safe_browsing_service_)
568 CreateSafeBrowsingService();
569 return safe_browsing_service_.get();
570}
571
[email protected]a7a5e992010-12-09 23:39:51572safe_browsing::ClientSideDetectionService*
573 BrowserProcessImpl::safe_browsing_detection_service() {
574 DCHECK(CalledOnValidThread());
[email protected]9efb46692011-08-23 12:56:05575 if (safe_browsing_service())
576 return safe_browsing_service()->safe_browsing_detection_service();
577 return NULL;
[email protected]a7a5e992010-12-09 23:39:51578}
579
[email protected]8b08a47f2011-02-25 12:36:37580bool BrowserProcessImpl::plugin_finder_disabled() const {
[email protected]2e5b60a22011-11-28 15:56:41581 if (plugin_finder_disabled_pref_.get())
582 return plugin_finder_disabled_pref_->GetValue();
583 else
584 return false;
[email protected]8b08a47f2011-02-25 12:36:37585}
586
[email protected]432115822011-07-10 15:52:27587void BrowserProcessImpl::Observe(int type,
[email protected]6c2381d2011-10-19 02:52:53588 const content::NotificationSource& source,
589 const content::NotificationDetails& details) {
[email protected]432115822011-07-10 15:52:27590 if (type == chrome::NOTIFICATION_PREF_CHANGED) {
[email protected]6c2381d2011-10-19 02:52:53591 std::string* pref = content::Details<std::string>(details).ptr();
[email protected]e450fa62011-02-01 12:52:56592 if (*pref == prefs::kDefaultBrowserSettingEnabled) {
[email protected]b61f62a2011-11-01 02:02:10593 ApplyDefaultBrowserPolicy();
[email protected]419a0572011-04-18 22:21:46594 } else if (*pref == prefs::kDisabledSchemes) {
595 ApplyDisabledSchemesPolicy();
[email protected]40850a52011-05-26 22:07:35596 } else if (*pref == prefs::kAllowCrossOriginAuthPrompt) {
597 ApplyAllowCrossOriginAuthPromptPolicy();
[email protected]e450fa62011-02-01 12:52:56598 }
[email protected]6618d1d2010-12-15 21:18:47599 } else {
600 NOTREACHED();
601 }
602}
603
[email protected]e13ad79b2010-07-22 21:36:50604#if (defined(OS_WIN) || defined(OS_LINUX)) && !defined(OS_CHROMEOS)
605void BrowserProcessImpl::StartAutoupdateTimer() {
[email protected]d323a172011-09-02 18:23:02606 autoupdate_timer_.Start(FROM_HERE,
[email protected]e13ad79b2010-07-22 21:36:50607 base::TimeDelta::FromHours(kUpdateCheckIntervalHours),
608 this,
609 &BrowserProcessImpl::OnAutoupdateTimer);
610}
611#endif
612
[email protected]d6f37fc2011-02-13 23:58:41613ChromeNetLog* BrowserProcessImpl::net_log() {
614 return net_log_.get();
615}
616
[email protected]1459fb62011-05-25 19:03:27617prerender::PrerenderTracker* BrowserProcessImpl::prerender_tracker() {
618 if (!prerender_tracker_.get())
619 prerender_tracker_.reset(new prerender::PrerenderTracker);
620
621 return prerender_tracker_.get();
622}
623
[email protected]c1adf5a2011-08-03 22:11:37624ComponentUpdateService* BrowserProcessImpl::component_updater() {
625#if defined(OS_CHROMEOS)
626 return NULL;
627#else
628 if (!component_updater_.get()) {
629 ComponentUpdateService::Configurator* configurator =
630 MakeChromeComponentUpdaterConfigurator(
631 CommandLine::ForCurrentProcess(),
632 io_thread()->system_url_request_context_getter());
633 // Creating the component updater does not do anything, components
634 // need to be registered and Start() needs to be called.
635 component_updater_.reset(ComponentUpdateServiceFactory(configurator));
636 }
637 return component_updater_.get();
[email protected]c1adf5a2011-08-03 22:11:37638#endif
[email protected]aafbcb572011-08-03 22:22:32639}
[email protected]c1adf5a2011-08-03 22:11:37640
[email protected]ca167a32011-09-30 15:19:11641CRLSetFetcher* BrowserProcessImpl::crl_set_fetcher() {
642#if defined(OS_CHROMEOS)
643 // There's no component updater on ChromeOS so there can't be a CRLSetFetcher
644 // either.
645 return NULL;
646#else
647 if (!crl_set_fetcher_.get()) {
648 crl_set_fetcher_ = new CRLSetFetcher();
649 }
650 return crl_set_fetcher_.get();
651#endif
652}
653
[email protected]99907362012-01-11 05:41:40654void BrowserProcessImpl::ResourceDispatcherHostCreated() {
[email protected]8bcdf072011-06-03 16:52:15655 resource_dispatcher_host_delegate_.reset(
[email protected]ea114722012-03-12 01:11:25656 new ChromeResourceDispatcherHostDelegate(prerender_tracker()));
657 ResourceDispatcherHost::Get()->SetDelegate(
658 resource_dispatcher_host_delegate_.get());
[email protected]40850a52011-05-26 22:07:35659
660 pref_change_registrar_.Add(prefs::kAllowCrossOriginAuthPrompt, this);
661 ApplyAllowCrossOriginAuthPromptPolicy();
initial.commit09911bf2008-07-26 23:55:29662}
663
664void BrowserProcessImpl::CreateMetricsService() {
665 DCHECK(!created_metrics_service_ && metrics_service_.get() == NULL);
666 created_metrics_service_ = true;
667
668 metrics_service_.reset(new MetricsService);
669}
670
[email protected]0b565182011-03-02 18:11:15671void BrowserProcessImpl::CreateWatchdogThread() {
672 DCHECK(!created_watchdog_thread_ && watchdog_thread_.get() == NULL);
673 created_watchdog_thread_ = true;
674
675 scoped_ptr<WatchDogThread> thread(new WatchDogThread());
676 if (!thread->Start())
677 return;
678 watchdog_thread_.swap(thread);
679}
680
initial.commit09911bf2008-07-26 23:55:29681void BrowserProcessImpl::CreateProfileManager() {
682 DCHECK(!created_profile_manager_ && profile_manager_.get() == NULL);
683 created_profile_manager_ = true;
684
[email protected]49a25632011-08-31 17:03:48685 FilePath user_data_dir;
686 PathService::Get(chrome::DIR_USER_DATA, &user_data_dir);
687 profile_manager_.reset(new ProfileManager(user_data_dir));
initial.commit09911bf2008-07-26 23:55:29688}
689
690void BrowserProcessImpl::CreateLocalState() {
691 DCHECK(!created_local_state_ && local_state_.get() == NULL);
692 created_local_state_ = true;
693
[email protected]b9636002009-03-04 00:05:25694 FilePath local_state_path;
initial.commit09911bf2008-07-26 23:55:29695 PathService::Get(chrome::FILE_LOCAL_STATE, &local_state_path);
[email protected]f2d1f612010-12-09 15:10:17696 local_state_.reset(
[email protected]fcf53572011-06-29 15:44:37697 PrefService::CreatePrefService(local_state_path, NULL, false));
[email protected]492d2142010-09-10 13:55:18698
[email protected]caf63aea2011-04-26 11:04:10699 // Initialize the prefs of the local state.
700 browser::RegisterLocalState(local_state_.get());
701
[email protected]2a7e7c152010-10-01 20:12:09702 pref_change_registrar_.Init(local_state_.get());
703
[email protected]058e5732012-03-01 22:48:03704#if !defined(OS_ANDROID)
[email protected]f16b9662011-04-27 10:06:07705 print_job_manager_->InitOnUIThread(local_state_.get());
[email protected]058e5732012-03-01 22:48:03706#endif
[email protected]e450fa62011-02-01 12:52:56707
708 // Initialize the notification for the default browser setting policy.
709 local_state_->RegisterBooleanPref(prefs::kDefaultBrowserSettingEnabled,
710 false);
[email protected]e450fa62011-02-01 12:52:56711 pref_change_registrar_.Add(prefs::kDefaultBrowserSettingEnabled, this);
[email protected]8b08a47f2011-02-25 12:36:37712
713 // Initialize the preference for the plugin finder policy.
714 // This preference is only needed on the IO thread so make it available there.
715 local_state_->RegisterBooleanPref(prefs::kDisablePluginFinder, false);
[email protected]2e5b60a22011-11-28 15:56:41716 plugin_finder_disabled_pref_.reset(new BooleanPrefMember);
717 plugin_finder_disabled_pref_->Init(prefs::kDisablePluginFinder,
[email protected]8b08a47f2011-02-25 12:36:37718 local_state_.get(), NULL);
[email protected]2e5b60a22011-11-28 15:56:41719 plugin_finder_disabled_pref_->MoveToThread(BrowserThread::IO);
[email protected]419a0572011-04-18 22:21:46720
[email protected]12c84e22011-07-11 09:35:45721 // Another policy that needs to be defined before the net subsystem is
722 // initialized is MaxConnectionsPerProxy so we do it here.
723 local_state_->RegisterIntegerPref(prefs::kMaxConnectionsPerProxy,
724 net::kDefaultMaxSocketsPerProxyServer);
725 int max_per_proxy = local_state_->GetInteger(prefs::kMaxConnectionsPerProxy);
726 net::ClientSocketPoolManager::set_max_sockets_per_proxy_server(
[email protected]a8af2152012-03-21 20:29:52727 net::HttpNetworkSession::NORMAL_SOCKET_POOL,
[email protected]12c84e22011-07-11 09:35:45728 std::max(std::min(max_per_proxy, 99),
[email protected]a8af2152012-03-21 20:29:52729 net::ClientSocketPoolManager::max_sockets_per_group(
730 net::HttpNetworkSession::NORMAL_SOCKET_POOL)));
[email protected]12c84e22011-07-11 09:35:45731
[email protected]b99c41c2011-04-27 15:18:48732 // This is observed by ChildProcessSecurityPolicy, which lives in content/
733 // though, so it can't register itself.
[email protected]419a0572011-04-18 22:21:46734 local_state_->RegisterListPref(prefs::kDisabledSchemes);
[email protected]b99c41c2011-04-27 15:18:48735 pref_change_registrar_.Add(prefs::kDisabledSchemes, this);
[email protected]419a0572011-04-18 22:21:46736 ApplyDisabledSchemesPolicy();
[email protected]199b4bd072011-11-08 17:45:52737
738 local_state_->RegisterBooleanPref(prefs::kAllowCrossOriginAuthPrompt, false);
[email protected]fd6159a2010-09-03 09:38:39739}
initial.commit09911bf2008-07-26 23:55:29740
[email protected]99907362012-01-11 05:41:40741void BrowserProcessImpl::PreCreateThreads() {
742 io_thread_.reset(new IOThread(
743 local_state(), net_log_.get(), extension_event_router_forwarder_.get()));
744}
745
[email protected]d2caaa22011-12-12 03:04:15746void BrowserProcessImpl::PreMainMessageLoopRun() {
[email protected]99907362012-01-11 05:41:40747 PluginService* plugin_service = PluginService::GetInstance();
748 plugin_service->SetFilter(ChromePluginServiceFilter::GetInstance());
749 plugin_service->StartWatchingPlugins();
750
751 // Register the internal Flash if available.
752 FilePath path;
753 if (!CommandLine::ForCurrentProcess()->HasSwitch(
754 switches::kDisableInternalFlash) &&
755 PathService::Get(chrome::FILE_FLASH_PLUGIN, &path)) {
756 plugin_service->AddExtraPluginPath(path);
757 }
758
[email protected]794b8f22012-04-25 23:59:26759 // Register bundled Pepper Flash if available.
760 content::PepperPluginInfo plugin;
761 bool add_at_beginning = false;
762 chrome::ChromeContentClient* content_client =
763 static_cast<chrome::ChromeContentClient*>(content::GetContentClient());
[email protected]21620c212012-05-02 02:07:45764 if (content_client->GetBundledFieldTrialPepperFlash(&plugin,
765 &add_at_beginning)) {
[email protected]794b8f22012-04-25 23:59:26766 plugin_service->RegisterInternalPlugin(plugin.ToWebPluginInfo(),
767 add_at_beginning);
768 }
769
[email protected]99907362012-01-11 05:41:40770#if defined(OS_POSIX)
771 // Also find plugins in a user-specific plugins dir,
772 // e.g. ~/.config/chromium/Plugins.
773 FilePath user_data_dir;
774 if (PathService::Get(chrome::DIR_USER_DATA, &user_data_dir)) {
[email protected]c6f3dea2012-01-14 02:23:11775 plugin_service->AddExtraPluginDir(user_data_dir.Append("Plugins"));
[email protected]99907362012-01-11 05:41:40776 }
777#endif
778
[email protected]d2caaa22011-12-12 03:04:15779 if (local_state_->IsManagedPreference(prefs::kDefaultBrowserSettingEnabled))
780 ApplyDefaultBrowserPolicy();
781}
782
initial.commit09911bf2008-07-26 23:55:29783void BrowserProcessImpl::CreateIconManager() {
784 DCHECK(!created_icon_manager_ && icon_manager_.get() == NULL);
785 created_icon_manager_ = true;
786 icon_manager_.reset(new IconManager);
787}
788
[email protected]c4ff4952010-01-08 19:12:47789void BrowserProcessImpl::CreateIntranetRedirectDetector() {
790 DCHECK(intranet_redirect_detector_.get() == NULL);
791 scoped_ptr<IntranetRedirectDetector> intranet_redirect_detector(
792 new IntranetRedirectDetector);
793 intranet_redirect_detector_.swap(intranet_redirect_detector);
794}
795
[email protected]29672ab2009-10-30 03:44:03796void BrowserProcessImpl::CreateNotificationUIManager() {
797 DCHECK(notification_ui_manager_.get() == NULL);
[email protected]b0b2a3dd2011-01-06 00:30:05798 notification_ui_manager_.reset(NotificationUIManager::Create(local_state()));
[email protected]29672ab2009-10-30 03:44:03799 created_notification_ui_manager_ = true;
800}
801
[email protected]0b4d3382010-07-14 16:13:04802void BrowserProcessImpl::CreateTabCloseableStateWatcher() {
803 DCHECK(tab_closeable_state_watcher_.get() == NULL);
804 tab_closeable_state_watcher_.reset(TabCloseableStateWatcher::Create());
805}
806
[email protected]9e7f015f2011-05-28 00:24:25807void BrowserProcessImpl::CreateBackgroundModeManager() {
808 DCHECK(background_mode_manager_.get() == NULL);
809 background_mode_manager_.reset(
[email protected]279170832011-10-12 23:38:03810 new BackgroundModeManager(CommandLine::ForCurrentProcess(),
811 &profile_manager()->GetProfileInfoCache()));
[email protected]9e7f015f2011-05-28 00:24:25812}
813
814void BrowserProcessImpl::CreateStatusTray() {
815 DCHECK(status_tray_.get() == NULL);
816 status_tray_.reset(StatusTray::Create());
817}
818
[email protected]dbeebd52010-11-16 20:34:16819void BrowserProcessImpl::CreatePrintPreviewTabController() {
[email protected]058e5732012-03-01 22:48:03820#if defined(OS_ANDROID)
821 NOTIMPLEMENTED();
822#else
[email protected]dbeebd52010-11-16 20:34:16823 DCHECK(print_preview_tab_controller_.get() == NULL);
824 print_preview_tab_controller_ = new printing::PrintPreviewTabController();
[email protected]058e5732012-03-01 22:48:03825#endif
[email protected]dbeebd52010-11-16 20:34:16826}
827
[email protected]68f88b992011-05-07 02:01:39828void BrowserProcessImpl::CreateBackgroundPrintingManager() {
829 DCHECK(background_printing_manager_.get() == NULL);
830 background_printing_manager_.reset(new printing::BackgroundPrintingManager());
831}
832
[email protected]462a0ff2011-06-02 17:15:34833void BrowserProcessImpl::CreateSafeBrowsingService() {
834 DCHECK(safe_browsing_service_.get() == NULL);
[email protected]8c40da62011-07-13 22:58:46835 // Set this flag to true so that we don't retry indefinitely to
836 // create the service class if there was an error.
[email protected]462a0ff2011-06-02 17:15:34837 created_safe_browsing_service_ = true;
[email protected]4b58e7d2011-07-11 10:22:56838#if defined(ENABLE_SAFE_BROWSING)
[email protected]462a0ff2011-06-02 17:15:34839 safe_browsing_service_ = SafeBrowsingService::CreateSafeBrowsingService();
840 safe_browsing_service_->Initialize();
[email protected]4b58e7d2011-07-11 10:22:56841#endif
[email protected]462a0ff2011-06-02 17:15:34842}
843
[email protected]419a0572011-04-18 22:21:46844void BrowserProcessImpl::ApplyDisabledSchemesPolicy() {
845 std::set<std::string> schemes;
[email protected]b99c41c2011-04-27 15:18:48846 const ListValue* scheme_list = local_state_->GetList(prefs::kDisabledSchemes);
847 for (ListValue::const_iterator iter = scheme_list->begin();
848 iter != scheme_list->end(); ++iter) {
[email protected]419a0572011-04-18 22:21:46849 std::string scheme;
850 if ((*iter)->GetAsString(&scheme))
851 schemes.insert(scheme);
852 }
853 ChildProcessSecurityPolicy::GetInstance()->RegisterDisabledSchemes(schemes);
854}
855
[email protected]b61f62a2011-11-01 02:02:10856void BrowserProcessImpl::ApplyDefaultBrowserPolicy() {
857 if (local_state_->GetBoolean(prefs::kDefaultBrowserSettingEnabled)) {
858 scoped_refptr<ShellIntegration::DefaultWebClientWorker>
859 set_browser_worker = new ShellIntegration::DefaultBrowserWorker(NULL);
860 set_browser_worker->StartSetAsDefault();
861 }
862}
863
[email protected]40850a52011-05-26 22:07:35864void BrowserProcessImpl::ApplyAllowCrossOriginAuthPromptPolicy() {
865 bool value = local_state()->GetBoolean(prefs::kAllowCrossOriginAuthPrompt);
[email protected]ea114722012-03-12 01:11:25866 ResourceDispatcherHost::Get()->SetAllowCrossOriginAuthPrompt(value);
[email protected]40850a52011-05-26 22:07:35867}
868
[email protected]3cdacd42010-04-30 18:55:53869// Mac is currently not supported.
870#if (defined(OS_WIN) || defined(OS_LINUX)) && !defined(OS_CHROMEOS)
[email protected]bd48c2b02010-04-09 20:32:42871
872bool BrowserProcessImpl::CanAutorestartForUpdate() const {
873 // Check if browser is in the background and if it needs to be restarted to
874 // apply a pending update.
[email protected]c10fa3952010-08-24 16:52:53875 return BrowserList::size() == 0 && BrowserList::WillKeepAlive() &&
[email protected]815856722011-04-13 17:19:19876 upgrade_util::IsUpdatePendingRestart();
[email protected]bd48c2b02010-04-09 20:32:42877}
878
[email protected]5c08f222010-09-22 09:37:21879// Switches to add when auto-restarting Chrome.
[email protected]6c10c972010-08-11 04:15:47880const char* const kSwitchesToAddOnAutorestart[] = {
[email protected]f9a06842010-08-21 00:32:40881 switches::kNoStartupWindow
[email protected]bd48c2b02010-04-09 20:32:42882};
883
[email protected]f6e6d2e2011-10-28 18:39:22884void BrowserProcessImpl::RestartBackgroundInstance() {
[email protected]bd48c2b02010-04-09 20:32:42885 CommandLine* old_cl = CommandLine::ForCurrentProcess();
[email protected]3cdacd42010-04-30 18:55:53886 scoped_ptr<CommandLine> new_cl(new CommandLine(old_cl->GetProgram()));
[email protected]bd48c2b02010-04-09 20:32:42887
888 std::map<std::string, CommandLine::StringType> switches =
889 old_cl->GetSwitches();
890
[email protected]5c08f222010-09-22 09:37:21891 switches::RemoveSwitchesForAutostart(&switches);
[email protected]bd48c2b02010-04-09 20:32:42892
893 // Append the rest of the switches (along with their values, if any)
894 // to the new command line
895 for (std::map<std::string, CommandLine::StringType>::const_iterator i =
896 switches.begin(); i != switches.end(); ++i) {
897 CommandLine::StringType switch_value = i->second;
898 if (switch_value.length() > 0) {
[email protected]05076ba22010-07-30 05:59:57899 new_cl->AppendSwitchNative(i->first, i->second);
[email protected]bd48c2b02010-04-09 20:32:42900 } else {
[email protected]3cdacd42010-04-30 18:55:53901 new_cl->AppendSwitch(i->first);
[email protected]bd48c2b02010-04-09 20:32:42902 }
903 }
904
[email protected]6c10c972010-08-11 04:15:47905 // Ensure that our desired switches are set on the new process.
[email protected]5c08f222010-09-22 09:37:21906 for (size_t i = 0; i < arraysize(kSwitchesToAddOnAutorestart); ++i) {
[email protected]6c10c972010-08-11 04:15:47907 if (!new_cl->HasSwitch(kSwitchesToAddOnAutorestart[i]))
908 new_cl->AppendSwitch(kSwitchesToAddOnAutorestart[i]);
909 }
[email protected]bd48c2b02010-04-09 20:32:42910
[email protected]3cdacd42010-04-30 18:55:53911 DLOG(WARNING) << "Shutting down current instance of the browser.";
[email protected]b8b60082011-12-13 14:16:02912 BrowserList::AttemptExit();
[email protected]3cdacd42010-04-30 18:55:53913
914 // Transfer ownership to Upgrade.
[email protected]815856722011-04-13 17:19:19915 upgrade_util::SetNewCommandLine(new_cl.release());
[email protected]bd48c2b02010-04-09 20:32:42916}
917
918void BrowserProcessImpl::OnAutoupdateTimer() {
919 if (CanAutorestartForUpdate()) {
[email protected]3cdacd42010-04-30 18:55:53920 DLOG(WARNING) << "Detected update. Restarting browser.";
[email protected]f6e6d2e2011-10-28 18:39:22921 RestartBackgroundInstance();
[email protected]bd48c2b02010-04-09 20:32:42922 }
923}
924
[email protected]3cdacd42010-04-30 18:55:53925#endif // (defined(OS_WIN) || defined(OS_LINUX)) && !defined(OS_CHROMEOS)