blob: bb6528b82543712385441c4c4b74f37cfd7a59df [file] [log] [blame]
[email protected]f2a893c2011-01-05 09:38:071// Copyright (c) 2011 The Chromium Authors. All rights reserved.
license.botbf09a502008-08-24 00:55:552// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
initial.commit09911bf2008-07-26 23:55:294
5#include "chrome/browser/browser_process_impl.h"
6
[email protected]3cdacd42010-04-30 18:55:537#include <map>
[email protected]68f88b992011-05-07 02:01:398#include <set>
9#include <vector>
[email protected]3cdacd42010-04-30 18:55:5310
initial.commit09911bf2008-07-26 23:55:2911#include "base/command_line.h"
[email protected]6641bf662009-08-21 00:34:0912#include "base/file_util.h"
initial.commit09911bf2008-07-26 23:55:2913#include "base/path_service.h"
[email protected]985655a2011-02-23 09:54:2514#include "base/synchronization/waitable_event.h"
[email protected]c6032e82010-09-13 20:06:0515#include "base/task.h"
[email protected]34b99632011-01-01 01:01:0616#include "base/threading/thread.h"
17#include "base/threading/thread_restrictions.h"
[email protected]e13ad79b2010-07-22 21:36:5018#include "chrome/browser/automation/automation_provider_list.h"
[email protected]a07676b22011-06-17 16:36:5319#include "chrome/browser/background/background_mode_manager.h"
[email protected]b443cb042009-12-15 22:05:0920#include "chrome/browser/browser_main.h"
[email protected]0ac83682010-01-22 17:46:2721#include "chrome/browser/browser_process_sub_thread.h"
[email protected]ac262c9f2008-10-19 17:45:2122#include "chrome/browser/browser_trial.h"
[email protected]0639cfd2011-07-20 11:38:0323#include "chrome/browser/debugger/devtools_protocol_handler.h"
[email protected]4475d232011-07-27 15:29:2024#include "chrome/browser/debugger/remote_debugging_server.h"
[email protected]6c69796d2010-07-16 21:41:1625#include "chrome/browser/download/download_file_manager.h"
[email protected]3ce02412011-03-01 12:01:1526#include "chrome/browser/extensions/extension_event_router_forwarder.h"
[email protected]fc4facd2011-03-22 23:18:5027#include "chrome/browser/extensions/extension_tab_id_map.h"
[email protected]214538842011-04-01 18:47:2428#include "chrome/browser/extensions/user_script_listener.h"
[email protected]815856722011-04-13 17:19:1929#include "chrome/browser/first_run/upgrade_util.h"
[email protected]f7578f52010-08-30 22:22:4930#include "chrome/browser/google/google_url_tracker.h"
[email protected]dcefa302009-05-20 00:24:3931#include "chrome/browser/icon_manager.h"
[email protected]c4ff4952010-01-08 19:12:4732#include "chrome/browser/intranet_redirect_detector.h"
[email protected]0ac83682010-01-22 17:46:2733#include "chrome/browser/io_thread.h"
[email protected]dc6f4962009-02-13 01:25:5034#include "chrome/browser/metrics/metrics_service.h"
[email protected]0b565182011-03-02 18:11:1535#include "chrome/browser/metrics/thread_watcher.h"
[email protected]b2fcd0e2010-12-01 15:19:4036#include "chrome/browser/net/chrome_net_log.h"
[email protected]3530cd92010-06-27 06:22:0137#include "chrome/browser/net/predictor_api.h"
[email protected]d393a0fd2009-05-13 23:32:0138#include "chrome/browser/net/sdch_dictionary_fetcher.h"
[email protected]29672ab2009-10-30 03:44:0339#include "chrome/browser/notifications/notification_ui_manager.h"
[email protected]985655a2011-02-23 09:54:2540#include "chrome/browser/policy/browser_policy_connector.h"
[email protected]caf63aea2011-04-26 11:04:1041#include "chrome/browser/prefs/browser_prefs.h"
[email protected]37858e52010-08-26 00:22:0242#include "chrome/browser/prefs/pref_service.h"
[email protected]1459fb62011-05-25 19:03:2743#include "chrome/browser/prerender/prerender_tracker.h"
[email protected]68f88b992011-05-07 02:01:3944#include "chrome/browser/printing/background_printing_manager.h"
[email protected]e06131d2010-02-10 18:40:3345#include "chrome/browser/printing/print_job_manager.h"
[email protected]dbeebd52010-11-16 20:34:1646#include "chrome/browser/printing/print_preview_tab_controller.h"
[email protected]8ecad5e2010-12-02 21:18:3347#include "chrome/browser/profiles/profile_manager.h"
[email protected]8bcdf072011-06-03 16:52:1548#include "chrome/browser/renderer_host/chrome_resource_dispatcher_host_delegate.h"
[email protected]a7a5e992010-12-09 23:39:5149#include "chrome/browser/safe_browsing/client_side_detection_service.h"
[email protected]81218f42009-02-05 18:48:0850#include "chrome/browser/safe_browsing/safe_browsing_service.h"
[email protected]e450fa62011-02-01 12:52:5651#include "chrome/browser/shell_integration.h"
[email protected]8b8e7c92010-08-19 18:05:5652#include "chrome/browser/sidebar/sidebar_manager.h"
[email protected]9e7f015f2011-05-28 00:24:2553#include "chrome/browser/status_icons/status_tray.h"
[email protected]0b4d3382010-07-14 16:13:0454#include "chrome/browser/tab_closeable_state_watcher.h"
[email protected]71b73f02011-04-06 15:57:2955#include "chrome/browser/ui/browser_list.h"
[email protected]4ef795df2010-02-03 02:35:0856#include "chrome/common/chrome_constants.h"
[email protected]432115822011-07-10 15:52:2757#include "chrome/common/chrome_notification_types.h"
initial.commit09911bf2008-07-26 23:55:2958#include "chrome/common/chrome_paths.h"
59#include "chrome/common/chrome_switches.h"
[email protected]de23f3f2011-05-18 16:20:2360#include "chrome/common/default_plugin.h"
[email protected]f1b6de22010-03-06 12:13:4761#include "chrome/common/extensions/extension_l10n_util.h"
[email protected]985655a2011-02-23 09:54:2562#include "chrome/common/extensions/extension_resource.h"
[email protected]ea587b02010-05-21 15:01:3563#include "chrome/common/json_pref_store.h"
initial.commit09911bf2008-07-26 23:55:2964#include "chrome/common/pref_names.h"
[email protected]5c08f222010-09-22 09:37:2165#include "chrome/common/switch_utils.h"
[email protected]985655a2011-02-23 09:54:2566#include "chrome/common/url_constants.h"
[email protected]bd48c2b02010-04-09 20:32:4267#include "chrome/installer/util/google_update_constants.h"
[email protected]a01efd22011-03-01 00:38:3268#include "content/browser/browser_child_process_host.h"
69#include "content/browser/browser_thread.h"
[email protected]419a0572011-04-18 22:21:4670#include "content/browser/child_process_security_policy.h"
[email protected]b46442d7e2011-06-29 02:16:0671#include "content/browser/debugger/devtools_manager.h"
[email protected]8f6a3b852011-07-19 16:48:5672#include "content/browser/download/mhtml_generation_manager.h"
[email protected]0ffaa482011-07-14 23:41:2873#include "content/browser/download/save_file_manager.h"
[email protected]d9f37932011-05-09 20:09:2474#include "content/browser/gpu/gpu_process_host_ui_shim.h"
[email protected]6eac57a2011-07-12 21:15:0975#include "content/browser/net/browser_online_state_observer.h"
[email protected]a01efd22011-03-01 00:38:3276#include "content/browser/plugin_service.h"
77#include "content/browser/renderer_host/render_process_host.h"
78#include "content/browser/renderer_host/resource_dispatcher_host.h"
[email protected]f20d7332011-03-08 21:11:5379#include "content/common/notification_service.h"
[email protected]d55aaa132009-09-28 21:08:0480#include "ipc/ipc_logging.h"
[email protected]12c84e22011-07-11 09:35:4581#include "net/socket/client_socket_pool_manager.h"
[email protected]abe2c032011-03-31 18:49:3482#include "net/url_request/url_request_context_getter.h"
[email protected]2dfeaf92011-01-10 21:08:2183#include "ui/base/clipboard/clipboard.h"
[email protected]c051a1b2011-01-21 23:30:1784#include "ui/base/l10n/l10n_util.h"
[email protected]de23f3f2011-05-18 16:20:2385#include "webkit/plugins/npapi/plugin_list.h"
[email protected]b112a4c2009-02-01 20:24:0186
87#if defined(OS_WIN)
[email protected]2362e4f2009-05-08 00:34:0588#include "views/focus/view_storage.h"
[email protected]86230b92009-11-23 20:38:3889#endif
90
[email protected]d55aaa132009-09-28 21:08:0491#if defined(IPC_MESSAGE_LOG_ENABLED)
[email protected]ff47b2962011-03-07 23:51:4992#include "content/common/child_process_messages.h"
[email protected]d55aaa132009-09-28 21:08:0493#endif
94
[email protected]db0e86dd2011-03-16 14:47:2195#if defined(OS_CHROMEOS)
96#include "chrome/browser/chromeos/proxy_config_service_impl.h"
[email protected]2d14b3732011-05-10 16:48:4497#include "chrome/browser/chromeos/web_socket_proxy_controller.h"
[email protected]db0e86dd2011-03-16 14:47:2198#endif // defined(OS_CHROMEOS)
99
[email protected]3cdacd42010-04-30 18:55:53100#if (defined(OS_WIN) || defined(OS_LINUX)) && !defined(OS_CHROMEOS)
101// How often to check if the persistent instance of Chrome needs to restart
102// to install an update.
103static const int kUpdateCheckIntervalHours = 6;
104#endif
105
[email protected]c6032e82010-09-13 20:06:05106#if defined(USE_X11)
107// How long to wait for the File thread to complete during EndSession, on
108// Linux. We have a timeout here because we're unable to run the UI messageloop
109// and there's some deadlock risk. Our only option is to exit anyway.
110static const int kEndSessionTimeoutSeconds = 10;
111#endif
112
[email protected]bb975362009-01-21 01:00:22113BrowserProcessImpl::BrowserProcessImpl(const CommandLine& command_line)
initial.commit09911bf2008-07-26 23:55:29114 : created_resource_dispatcher_host_(false),
115 created_metrics_service_(false),
116 created_io_thread_(false),
117 created_file_thread_(false),
118 created_db_thread_(false),
[email protected]914511712009-11-23 19:42:33119 created_process_launcher_thread_(false),
[email protected]875ee822010-05-18 20:58:01120 created_cache_thread_(false),
[email protected]0b565182011-03-02 18:11:15121 created_watchdog_thread_(false),
[email protected]2d14b3732011-05-10 16:48:44122#if defined(OS_CHROMEOS)
123 created_web_socket_proxy_thread_(false),
124#endif
initial.commit09911bf2008-07-26 23:55:29125 created_profile_manager_(false),
126 created_local_state_(false),
[email protected]b112a4c2009-02-01 20:24:01127 created_icon_manager_(false),
[email protected]40ecc902009-03-16 13:42:47128 created_devtools_manager_(false),
[email protected]8b8e7c92010-08-19 18:05:56129 created_sidebar_manager_(false),
[email protected]985655a2011-02-23 09:54:25130 created_browser_policy_connector_(false),
[email protected]29672ab2009-10-30 03:44:03131 created_notification_ui_manager_(false),
[email protected]462a0ff2011-06-02 17:15:34132 created_safe_browsing_service_(false),
[email protected]a7a5e992010-12-09 23:39:51133 created_safe_browsing_detection_service_(false),
initial.commit09911bf2008-07-26 23:55:29134 module_ref_count_(0),
[email protected]afd20c022010-06-10 00:48:20135 did_start_(false),
[email protected]1b2db1a2008-08-08 17:46:13136 checked_for_new_frames_(false),
[email protected]4747caf2011-03-23 20:09:21137 using_new_frames_(false) {
initial.commit09911bf2008-07-26 23:55:29138 g_browser_process = this;
[email protected]2dfeaf92011-01-10 21:08:21139 clipboard_.reset(new ui::Clipboard);
initial.commit09911bf2008-07-26 23:55:29140 main_notification_service_.reset(new NotificationService);
141
142 // Must be created after the NotificationService.
143 print_job_manager_.reset(new printing::PrintJobManager);
144
[email protected]b2fcd0e2010-12-01 15:19:40145 net_log_.reset(new ChromeNetLog);
[email protected]3ce02412011-03-01 12:01:15146
147 extension_event_router_forwarder_ = new ExtensionEventRouterForwarder;
[email protected]fc4facd2011-03-22 23:18:50148
149 ExtensionTabIdMap::GetInstance()->Init();
[email protected]6eac57a2011-07-12 21:15:09150
151 online_state_observer_.reset(new BrowserOnlineStateObserver);
initial.commit09911bf2008-07-26 23:55:29152}
153
154BrowserProcessImpl::~BrowserProcessImpl() {
[email protected]2d14b3732011-05-10 16:48:44155#if defined(OS_CHROMEOS)
156 if (web_socket_proxy_thread_.get())
157 chromeos::WebSocketProxyController::Shutdown();
158 web_socket_proxy_thread_.reset();
159#endif
160
initial.commit09911bf2008-07-26 23:55:29161 // Delete the AutomationProviderList before NotificationService,
162 // since it may try to unregister notifications
163 // Both NotificationService and AutomationProvider are singleton instances in
164 // the BrowserProcess. Since AutomationProvider may have some active
165 // notification observers, it is essential that it gets destroyed before the
166 // NotificationService. NotificationService won't be destroyed until after
167 // this destructor is run.
168 automation_provider_list_.reset();
169
[email protected]d393a0fd2009-05-13 23:32:01170 // We need to shutdown the SdchDictionaryFetcher as it regularly holds
171 // a pointer to a URLFetcher, and that URLFetcher (upon destruction) will do
172 // a PostDelayedTask onto the IO thread. This shutdown call will both discard
173 // any pending URLFetchers, and avoid creating any more.
174 SdchDictionaryFetcher::Shutdown();
175
[email protected]51ac040762011-01-20 02:01:04176 // We need to destroy the MetricsService, GoogleURLTracker,
177 // IntranetRedirectDetector, and SafeBrowsing ClientSideDetectionService
178 // before the io_thread_ gets destroyed, since their destructors can call the
179 // URLFetcher destructor, which does a PostDelayedTask operation on the IO
180 // thread. (The IO thread will handle that URLFetcher operation before going
181 // away.)
initial.commit09911bf2008-07-26 23:55:29182 metrics_service_.reset();
183 google_url_tracker_.reset();
[email protected]c4ff4952010-01-08 19:12:47184 intranet_redirect_detector_.reset();
[email protected]51ac040762011-01-20 02:01:04185 safe_browsing_detection_service_.reset();
initial.commit09911bf2008-07-26 23:55:29186
[email protected]d8a899c2010-09-21 04:50:33187 // Need to clear the desktop notification balloons before the io_thread_ and
188 // before the profiles, since if there are any still showing we will access
189 // those things during teardown.
190 notification_ui_manager_.reset();
191
initial.commit09911bf2008-07-26 23:55:29192 // Need to clear profiles (download managers) before the io_thread_.
193 profile_manager_.reset();
194
195 // Debugger must be cleaned up before IO thread and NotificationService.
[email protected]4475d232011-07-27 15:29:20196 remote_debugging_server_.reset();
197
[email protected]5613126e2011-01-31 15:27:55198 if (devtools_legacy_handler_.get()) {
199 devtools_legacy_handler_->Stop();
200 devtools_legacy_handler_ = NULL;
201 }
initial.commit09911bf2008-07-26 23:55:29202
[email protected]4b58e7d2011-07-11 10:22:56203#if defined(ENABLE_SAFE_BROWSING)
[email protected]462a0ff2011-06-02 17:15:34204 if (safe_browsing_service_.get())
205 safe_browsing_service()->ShutDown();
[email protected]4b58e7d2011-07-11 10:22:56206#endif
initial.commit09911bf2008-07-26 23:55:29207
[email protected]462a0ff2011-06-02 17:15:34208 if (resource_dispatcher_host_.get()) {
initial.commit09911bf2008-07-26 23:55:29209 // Cancel pending requests and prevent new requests.
210 resource_dispatcher_host()->Shutdown();
211 }
212
[email protected]fc4facd2011-03-22 23:18:50213 ExtensionTabIdMap::GetInstance()->Shutdown();
214
[email protected]985655a2011-02-23 09:54:25215 // The policy providers managed by |browser_policy_connector_| need to shut
216 // down while the IO and FILE threads are still alive.
217 browser_policy_connector_.reset();
[email protected]f2a893c2011-01-05 09:38:07218
[email protected]7a31f7c2011-03-21 23:22:04219 // Destroying the GpuProcessHostUIShims on the UI thread posts a task to
220 // delete related objects on the GPU thread. This must be done before
221 // stopping the GPU thread. The GPU thread will close IPC channels to renderer
222 // processes so this has to happen before stopping the IO thread.
223 GpuProcessHostUIShim::DestroyAll();
[email protected]7a31f7c2011-03-21 23:22:04224
[email protected]8fd11832011-07-14 20:01:13225 // Stop the watchdog thread before stopping other threads.
226 watchdog_thread_.reset();
227
initial.commit09911bf2008-07-26 23:55:29228 // Need to stop io_thread_ before resource_dispatcher_host_, since
229 // io_thread_ may still deref ResourceDispatcherHost and handle resource
230 // request before going away.
[email protected]0ac83682010-01-22 17:46:27231 io_thread_.reset();
initial.commit09911bf2008-07-26 23:55:29232
[email protected]875ee822010-05-18 20:58:01233 // The IO thread was the only user of this thread.
234 cache_thread_.reset();
235
[email protected]914511712009-11-23 19:42:33236 // Stop the process launcher thread after the IO thread, in case the IO thread
237 // posted a task to terminate a process on the process launcher thread.
238 process_launcher_thread_.reset();
239
initial.commit09911bf2008-07-26 23:55:29240 // Clean up state that lives on the file_thread_ before it goes away.
241 if (resource_dispatcher_host_.get()) {
242 resource_dispatcher_host()->download_file_manager()->Shutdown();
243 resource_dispatcher_host()->save_file_manager()->Shutdown();
244 }
245
246 // Need to stop the file_thread_ here to force it to process messages in its
247 // message loop from the previous call to shutdown the DownloadFileManager,
248 // SaveFileManager and SessionService.
249 file_thread_.reset();
250
251 // With the file_thread_ flushed, we can release any icon resources.
252 icon_manager_.reset();
253
254 // Need to destroy ResourceDispatcherHost before PluginService and
[email protected]49f28bc72010-02-04 00:10:01255 // SafeBrowsingService, since it caches a pointer to it. This also
256 // causes the webkit thread to terminate.
initial.commit09911bf2008-07-26 23:55:29257 resource_dispatcher_host_.reset();
258
259 // Wait for the pending print jobs to finish.
260 print_job_manager_->OnQuit();
261 print_job_manager_.reset();
262
[email protected]0b4d3382010-07-14 16:13:04263 // Destroy TabCloseableStateWatcher before NotificationService since the
264 // former registers for notifications.
265 tab_closeable_state_watcher_.reset();
266
initial.commit09911bf2008-07-26 23:55:29267 // Now OK to destroy NotificationService.
268 main_notification_service_.reset();
269
270 g_browser_process = NULL;
271}
272
[email protected]c6032e82010-09-13 20:06:05273#if defined(OS_WIN)
[email protected]295039bd2008-08-15 04:32:57274// Send a QuitTask to the given MessageLoop.
275static void PostQuit(MessageLoop* message_loop) {
276 message_loop->PostTask(FROM_HERE, new MessageLoop::QuitTask());
277}
[email protected]c6032e82010-09-13 20:06:05278#elif defined(USE_X11)
279static void Signal(base::WaitableEvent* event) {
280 event->Signal();
281}
282#endif
initial.commit09911bf2008-07-26 23:55:29283
[email protected]b443cb042009-12-15 22:05:09284unsigned int BrowserProcessImpl::AddRefModule() {
285 DCHECK(CalledOnValidThread());
[email protected]afd20c022010-06-10 00:48:20286 did_start_ = true;
[email protected]b443cb042009-12-15 22:05:09287 module_ref_count_++;
288 return module_ref_count_;
289}
290
291unsigned int BrowserProcessImpl::ReleaseModule() {
292 DCHECK(CalledOnValidThread());
[email protected]760d970a2010-05-18 00:39:18293 DCHECK_NE(0u, module_ref_count_);
[email protected]b443cb042009-12-15 22:05:09294 module_ref_count_--;
295 if (0 == module_ref_count_) {
[email protected]7d038c32010-12-14 00:40:00296 // Allow UI and IO threads to do blocking IO on shutdown, since we do a lot
297 // of it on shutdown for valid reasons.
298 base::ThreadRestrictions::SetIOAllowed(true);
299 io_thread()->message_loop()->PostTask(
300 FROM_HERE,
301 NewRunnableFunction(&base::ThreadRestrictions::SetIOAllowed, true));
[email protected]b443cb042009-12-15 22:05:09302 MessageLoop::current()->PostTask(
[email protected]34f73fb2010-03-24 20:50:34303 FROM_HERE, NewRunnableFunction(DidEndMainMessageLoop));
[email protected]b443cb042009-12-15 22:05:09304 MessageLoop::current()->Quit();
305 }
306 return module_ref_count_;
307}
308
initial.commit09911bf2008-07-26 23:55:29309void BrowserProcessImpl::EndSession() {
initial.commit09911bf2008-07-26 23:55:29310 // Mark all the profiles as clean.
311 ProfileManager* pm = profile_manager();
[email protected]844a1002011-04-19 11:37:21312 std::vector<Profile*> profiles(pm->GetLoadedProfiles());
313 for (size_t i = 0; i < profiles.size(); ++i)
314 profiles[i]->MarkAsCleanShutdown();
initial.commit09911bf2008-07-26 23:55:29315
316 // Tell the metrics service it was cleanly shutdown.
317 MetricsService* metrics = g_browser_process->metrics_service();
318 if (metrics && local_state()) {
initial.commit09911bf2008-07-26 23:55:29319 metrics->RecordStartOfSessionEnd();
320
321 // MetricsService lazily writes to prefs, force it to write now.
[email protected]6faa0e0d2009-04-28 06:50:36322 local_state()->SavePersistentPrefs();
initial.commit09911bf2008-07-26 23:55:29323 }
324
325 // We must write that the profile and metrics service shutdown cleanly,
326 // otherwise on startup we'll think we crashed. So we block until done and
327 // then proceed with normal shutdown.
[email protected]c6032e82010-09-13 20:06:05328#if defined(USE_X11)
329 // Can't run a local loop on linux. Instead create a waitable event.
330 base::WaitableEvent done_writing(false, false);
[email protected]d04e7662010-10-10 22:24:48331 BrowserThread::PostTask(BrowserThread::FILE, FROM_HERE,
[email protected]c6032e82010-09-13 20:06:05332 NewRunnableFunction(Signal, &done_writing));
333 done_writing.TimedWait(
334 base::TimeDelta::FromSeconds(kEndSessionTimeoutSeconds));
335#elif defined(OS_WIN)
[email protected]d04e7662010-10-10 22:24:48336 BrowserThread::PostTask(BrowserThread::FILE, FROM_HERE,
[email protected]295039bd2008-08-15 04:32:57337 NewRunnableFunction(PostQuit, MessageLoop::current()));
initial.commit09911bf2008-07-26 23:55:29338 MessageLoop::current()->Run();
[email protected]c6032e82010-09-13 20:06:05339#else
340 NOTIMPLEMENTED();
341#endif
initial.commit09911bf2008-07-26 23:55:29342}
343
[email protected]e13ad79b2010-07-22 21:36:50344ResourceDispatcherHost* BrowserProcessImpl::resource_dispatcher_host() {
345 DCHECK(CalledOnValidThread());
346 if (!created_resource_dispatcher_host_)
347 CreateResourceDispatcherHost();
348 return resource_dispatcher_host_.get();
349}
350
351MetricsService* BrowserProcessImpl::metrics_service() {
352 DCHECK(CalledOnValidThread());
353 if (!created_metrics_service_)
354 CreateMetricsService();
355 return metrics_service_.get();
356}
357
358IOThread* BrowserProcessImpl::io_thread() {
359 DCHECK(CalledOnValidThread());
360 if (!created_io_thread_)
361 CreateIOThread();
362 return io_thread_.get();
363}
364
365base::Thread* BrowserProcessImpl::file_thread() {
366 DCHECK(CalledOnValidThread());
367 if (!created_file_thread_)
368 CreateFileThread();
369 return file_thread_.get();
370}
371
372base::Thread* BrowserProcessImpl::db_thread() {
373 DCHECK(CalledOnValidThread());
374 if (!created_db_thread_)
375 CreateDBThread();
376 return db_thread_.get();
377}
378
379base::Thread* BrowserProcessImpl::process_launcher_thread() {
380 DCHECK(CalledOnValidThread());
381 if (!created_process_launcher_thread_)
382 CreateProcessLauncherThread();
383 return process_launcher_thread_.get();
384}
385
386base::Thread* BrowserProcessImpl::cache_thread() {
387 DCHECK(CalledOnValidThread());
388 if (!created_cache_thread_)
389 CreateCacheThread();
390 return cache_thread_.get();
391}
392
[email protected]0b565182011-03-02 18:11:15393WatchDogThread* BrowserProcessImpl::watchdog_thread() {
394 DCHECK(CalledOnValidThread());
395 if (!created_watchdog_thread_)
396 CreateWatchdogThread();
397 DCHECK(watchdog_thread_.get() != NULL);
398 return watchdog_thread_.get();
399}
400
[email protected]2d14b3732011-05-10 16:48:44401#if defined(OS_CHROMEOS)
402base::Thread* BrowserProcessImpl::web_socket_proxy_thread() {
403 DCHECK(CalledOnValidThread());
404 if (!created_web_socket_proxy_thread_)
405 CreateWebSocketProxyThread();
406 DCHECK(web_socket_proxy_thread_.get() != NULL);
407 return web_socket_proxy_thread_.get();
408}
409#endif
410
[email protected]e13ad79b2010-07-22 21:36:50411ProfileManager* BrowserProcessImpl::profile_manager() {
412 DCHECK(CalledOnValidThread());
413 if (!created_profile_manager_)
414 CreateProfileManager();
415 return profile_manager_.get();
416}
417
418PrefService* BrowserProcessImpl::local_state() {
419 DCHECK(CalledOnValidThread());
420 if (!created_local_state_)
421 CreateLocalState();
422 return local_state_.get();
423}
424
425DevToolsManager* BrowserProcessImpl::devtools_manager() {
426 DCHECK(CalledOnValidThread());
427 if (!created_devtools_manager_)
428 CreateDevToolsManager();
429 return devtools_manager_.get();
430}
431
[email protected]8b8e7c92010-08-19 18:05:56432SidebarManager* BrowserProcessImpl::sidebar_manager() {
433 DCHECK(CalledOnValidThread());
434 if (!created_sidebar_manager_)
435 CreateSidebarManager();
436 return sidebar_manager_.get();
437}
438
[email protected]2dfeaf92011-01-10 21:08:21439ui::Clipboard* BrowserProcessImpl::clipboard() {
[email protected]e13ad79b2010-07-22 21:36:50440 DCHECK(CalledOnValidThread());
441 return clipboard_.get();
442}
443
[email protected]abe2c032011-03-31 18:49:34444net::URLRequestContextGetter* BrowserProcessImpl::system_request_context() {
[email protected]db0e86dd2011-03-16 14:47:21445 DCHECK(CalledOnValidThread());
446 return io_thread()->system_url_request_context_getter();
447}
448
449#if defined(OS_CHROMEOS)
450chromeos::ProxyConfigServiceImpl*
451BrowserProcessImpl::chromeos_proxy_config_service_impl() {
452 DCHECK(CalledOnValidThread());
453 if (!chromeos_proxy_config_service_impl_) {
454 chromeos_proxy_config_service_impl_ =
455 new chromeos::ProxyConfigServiceImpl();
456 }
457 return chromeos_proxy_config_service_impl_;
458}
459#endif // defined(OS_CHROMEOS)
460
[email protected]3ce02412011-03-01 12:01:15461ExtensionEventRouterForwarder*
462BrowserProcessImpl::extension_event_router_forwarder() {
463 return extension_event_router_forwarder_.get();
464}
465
[email protected]e13ad79b2010-07-22 21:36:50466NotificationUIManager* BrowserProcessImpl::notification_ui_manager() {
467 DCHECK(CalledOnValidThread());
468 if (!created_notification_ui_manager_)
469 CreateNotificationUIManager();
470 return notification_ui_manager_.get();
471}
472
[email protected]985655a2011-02-23 09:54:25473policy::BrowserPolicyConnector* BrowserProcessImpl::browser_policy_connector() {
[email protected]f2a893c2011-01-05 09:38:07474 DCHECK(CalledOnValidThread());
[email protected]985655a2011-02-23 09:54:25475 if (!created_browser_policy_connector_) {
476 DCHECK(browser_policy_connector_.get() == NULL);
477 created_browser_policy_connector_ = true;
[email protected]f31e2e52011-07-14 16:01:19478#if defined(ENABLE_CONFIGURATION_POLICY)
[email protected]d9ee002c2011-04-27 12:52:54479 browser_policy_connector_.reset(policy::BrowserPolicyConnector::Create());
[email protected]f31e2e52011-07-14 16:01:19480#endif
[email protected]f2a893c2011-01-05 09:38:07481 }
[email protected]985655a2011-02-23 09:54:25482 return browser_policy_connector_.get();
[email protected]f2a893c2011-01-05 09:38:07483}
484
[email protected]e13ad79b2010-07-22 21:36:50485IconManager* BrowserProcessImpl::icon_manager() {
486 DCHECK(CalledOnValidThread());
487 if (!created_icon_manager_)
488 CreateIconManager();
489 return icon_manager_.get();
490}
491
492ThumbnailGenerator* BrowserProcessImpl::GetThumbnailGenerator() {
493 return &thumbnail_generator_;
494}
495
496AutomationProviderList* BrowserProcessImpl::InitAutomationProviderList() {
497 DCHECK(CalledOnValidThread());
498 if (automation_provider_list_.get() == NULL) {
499 automation_provider_list_.reset(AutomationProviderList::GetInstance());
500 }
501 return automation_provider_list_.get();
502}
503
[email protected]5613126e2011-01-31 15:27:55504void BrowserProcessImpl::InitDevToolsHttpProtocolHandler(
[email protected]4475d232011-07-27 15:29:20505 Profile* profile,
[email protected]01000cf12011-02-04 11:39:22506 const std::string& ip,
[email protected]5613126e2011-01-31 15:27:55507 int port,
508 const std::string& frontend_url) {
[email protected]e13ad79b2010-07-22 21:36:50509 DCHECK(CalledOnValidThread());
[email protected]4475d232011-07-27 15:29:20510 remote_debugging_server_.reset(
511 new RemoteDebuggingServer(profile, ip, port, frontend_url));
[email protected]5613126e2011-01-31 15:27:55512}
513
514void BrowserProcessImpl::InitDevToolsLegacyProtocolHandler(int port) {
515 DCHECK(CalledOnValidThread());
516 devtools_legacy_handler_ = DevToolsProtocolHandler::Start(port);
[email protected]e13ad79b2010-07-22 21:36:50517}
518
519bool BrowserProcessImpl::IsShuttingDown() {
520 DCHECK(CalledOnValidThread());
521 return did_start_ && 0 == module_ref_count_;
522}
523
initial.commit09911bf2008-07-26 23:55:29524printing::PrintJobManager* BrowserProcessImpl::print_job_manager() {
525 // TODO(abarth): DCHECK(CalledOnValidThread());
[email protected]d8922f22010-05-07 00:57:27526 // http://code.google.com/p/chromium/issues/detail?id=6828
initial.commit09911bf2008-07-26 23:55:29527 // print_job_manager_ is initialized in the constructor and destroyed in the
528 // destructor, so it should always be valid.
529 DCHECK(print_job_manager_.get());
530 return print_job_manager_.get();
531}
532
[email protected]dbeebd52010-11-16 20:34:16533printing::PrintPreviewTabController*
534 BrowserProcessImpl::print_preview_tab_controller() {
535 DCHECK(CalledOnValidThread());
536 if (!print_preview_tab_controller_.get())
537 CreatePrintPreviewTabController();
538 return print_preview_tab_controller_.get();
539}
540
[email protected]68f88b992011-05-07 02:01:39541printing::BackgroundPrintingManager*
542 BrowserProcessImpl::background_printing_manager() {
543 DCHECK(CalledOnValidThread());
544 if (!background_printing_manager_.get())
545 CreateBackgroundPrintingManager();
546 return background_printing_manager_.get();
547}
548
[email protected]e13ad79b2010-07-22 21:36:50549GoogleURLTracker* BrowserProcessImpl::google_url_tracker() {
550 DCHECK(CalledOnValidThread());
551 if (!google_url_tracker_.get())
552 CreateGoogleURLTracker();
553 return google_url_tracker_.get();
554}
555
556IntranetRedirectDetector* BrowserProcessImpl::intranet_redirect_detector() {
557 DCHECK(CalledOnValidThread());
558 if (!intranet_redirect_detector_.get())
559 CreateIntranetRedirectDetector();
560 return intranet_redirect_detector_.get();
561}
562
563const std::string& BrowserProcessImpl::GetApplicationLocale() {
564 DCHECK(!locale_.empty());
565 return locale_;
566}
567
568void BrowserProcessImpl::SetApplicationLocale(const std::string& locale) {
569 locale_ = locale;
570 extension_l10n_util::SetProcessLocale(locale);
571}
572
[email protected]073ed7b2010-09-27 09:20:02573DownloadStatusUpdater* BrowserProcessImpl::download_status_updater() {
574 return &download_status_updater_;
575}
576
[email protected]e13ad79b2010-07-22 21:36:50577TabCloseableStateWatcher* BrowserProcessImpl::tab_closeable_state_watcher() {
578 DCHECK(CalledOnValidThread());
579 if (!tab_closeable_state_watcher_.get())
580 CreateTabCloseableStateWatcher();
581 return tab_closeable_state_watcher_.get();
582}
583
[email protected]9e7f015f2011-05-28 00:24:25584BackgroundModeManager* BrowserProcessImpl::background_mode_manager() {
585 DCHECK(CalledOnValidThread());
586 if (!background_mode_manager_.get())
587 CreateBackgroundModeManager();
588 return background_mode_manager_.get();
589}
590
591StatusTray* BrowserProcessImpl::status_tray() {
592 DCHECK(CalledOnValidThread());
593 if (!status_tray_.get())
594 CreateStatusTray();
595 return status_tray_.get();
596}
597
[email protected]462a0ff2011-06-02 17:15:34598
599SafeBrowsingService* BrowserProcessImpl::safe_browsing_service() {
600 DCHECK(CalledOnValidThread());
601 if (!created_safe_browsing_service_)
602 CreateSafeBrowsingService();
603 return safe_browsing_service_.get();
604}
605
[email protected]a7a5e992010-12-09 23:39:51606safe_browsing::ClientSideDetectionService*
607 BrowserProcessImpl::safe_browsing_detection_service() {
608 DCHECK(CalledOnValidThread());
[email protected]462a0ff2011-06-02 17:15:34609 if (!created_safe_browsing_detection_service_)
[email protected]a7a5e992010-12-09 23:39:51610 CreateSafeBrowsingDetectionService();
[email protected]a7a5e992010-12-09 23:39:51611 return safe_browsing_detection_service_.get();
612}
613
[email protected]8b08a47f2011-02-25 12:36:37614bool BrowserProcessImpl::plugin_finder_disabled() const {
615 return *plugin_finder_disabled_pref_;
616}
617
[email protected]432115822011-07-10 15:52:27618void BrowserProcessImpl::Observe(int type,
[email protected]6618d1d2010-12-15 21:18:47619 const NotificationSource& source,
620 const NotificationDetails& details) {
[email protected]432115822011-07-10 15:52:27621 if (type == chrome::NOTIFICATION_PREF_CHANGED) {
[email protected]e450fa62011-02-01 12:52:56622 std::string* pref = Details<std::string>(details).ptr();
623 if (*pref == prefs::kDefaultBrowserSettingEnabled) {
624 if (local_state_->GetBoolean(prefs::kDefaultBrowserSettingEnabled))
625 ShellIntegration::SetAsDefaultBrowser();
[email protected]419a0572011-04-18 22:21:46626 } else if (*pref == prefs::kDisabledSchemes) {
627 ApplyDisabledSchemesPolicy();
[email protected]40850a52011-05-26 22:07:35628 } else if (*pref == prefs::kAllowCrossOriginAuthPrompt) {
629 ApplyAllowCrossOriginAuthPromptPolicy();
[email protected]e450fa62011-02-01 12:52:56630 }
[email protected]6618d1d2010-12-15 21:18:47631 } else {
632 NOTREACHED();
633 }
634}
635
[email protected]e13ad79b2010-07-22 21:36:50636#if (defined(OS_WIN) || defined(OS_LINUX)) && !defined(OS_CHROMEOS)
637void BrowserProcessImpl::StartAutoupdateTimer() {
638 autoupdate_timer_.Start(
639 base::TimeDelta::FromHours(kUpdateCheckIntervalHours),
640 this,
641 &BrowserProcessImpl::OnAutoupdateTimer);
642}
643#endif
644
[email protected]d6f37fc2011-02-13 23:58:41645ChromeNetLog* BrowserProcessImpl::net_log() {
646 return net_log_.get();
647}
648
[email protected]1459fb62011-05-25 19:03:27649prerender::PrerenderTracker* BrowserProcessImpl::prerender_tracker() {
650 if (!prerender_tracker_.get())
651 prerender_tracker_.reset(new prerender::PrerenderTracker);
652
653 return prerender_tracker_.get();
654}
655
[email protected]e7f009d2011-06-14 19:35:10656MHTMLGenerationManager* BrowserProcessImpl::mhtml_generation_manager() {
657 if (!mhtml_generation_manager_.get())
658 mhtml_generation_manager_ = new MHTMLGenerationManager();
659
660 return mhtml_generation_manager_.get();
661}
662
initial.commit09911bf2008-07-26 23:55:29663void BrowserProcessImpl::CreateResourceDispatcherHost() {
664 DCHECK(!created_resource_dispatcher_host_ &&
665 resource_dispatcher_host_.get() == NULL);
666 created_resource_dispatcher_host_ = true;
667
[email protected]214538842011-04-01 18:47:24668 // UserScriptListener will delete itself.
669 ResourceQueue::DelegateSet resource_queue_delegates;
670 resource_queue_delegates.insert(new UserScriptListener());
671
672 resource_dispatcher_host_.reset(
673 new ResourceDispatcherHost(resource_queue_delegates));
initial.commit09911bf2008-07-26 23:55:29674 resource_dispatcher_host_->Initialize();
[email protected]1459fb62011-05-25 19:03:27675
[email protected]8bcdf072011-06-03 16:52:15676 resource_dispatcher_host_delegate_.reset(
677 new ChromeResourceDispatcherHostDelegate(resource_dispatcher_host_.get(),
[email protected]92e0a612011-05-30 21:37:00678 prerender_tracker()));
[email protected]8bcdf072011-06-03 16:52:15679 resource_dispatcher_host_->set_delegate(
680 resource_dispatcher_host_delegate_.get());
[email protected]40850a52011-05-26 22:07:35681
682 pref_change_registrar_.Add(prefs::kAllowCrossOriginAuthPrompt, this);
683 ApplyAllowCrossOriginAuthPromptPolicy();
initial.commit09911bf2008-07-26 23:55:29684}
685
686void BrowserProcessImpl::CreateMetricsService() {
687 DCHECK(!created_metrics_service_ && metrics_service_.get() == NULL);
688 created_metrics_service_ = true;
689
690 metrics_service_.reset(new MetricsService);
691}
692
693void BrowserProcessImpl::CreateIOThread() {
694 DCHECK(!created_io_thread_ && io_thread_.get() == NULL);
695 created_io_thread_ = true;
696
697 // Prior to starting the io thread, we create the plugin service as
698 // it is predominantly used from the io thread, but must be created
699 // on the main thread. The service ctor is inexpensive and does not
700 // invoke the io_thread() accessor.
701 PluginService::GetInstance();
702
[email protected]de23f3f2011-05-18 16:20:23703 // Add the Chrome specific plugins.
704 chrome::RegisterInternalDefaultPlugin();
705
706 // Register the internal Flash if available.
707 FilePath path;
708 if (!CommandLine::ForCurrentProcess()->HasSwitch(
709 switches::kDisableInternalFlash) &&
710 PathService::Get(chrome::FILE_FLASH_PLUGIN, &path)) {
711 webkit::npapi::PluginList::Singleton()->AddExtraPluginPath(path);
712 }
713
[email protected]f1933792011-06-14 00:49:34714#if defined(OS_POSIX)
715 // Also find plugins in a user-specific plugins dir,
716 // e.g. ~/.config/chromium/Plugins.
717 FilePath user_data_dir;
718 if (PathService::Get(chrome::DIR_USER_DATA, &user_data_dir)) {
719 webkit::npapi::PluginList::Singleton()->AddExtraPluginDir(
720 user_data_dir.Append("Plugins"));
721 }
722#endif
723
[email protected]3ce02412011-03-01 12:01:15724 scoped_ptr<IOThread> thread(new IOThread(
725 local_state(), net_log_.get(), extension_event_router_forwarder_.get()));
[email protected]ab820df2008-08-26 05:55:10726 base::Thread::Options options;
727 options.message_loop_type = MessageLoop::TYPE_IO;
728 if (!thread->StartWithOptions(options))
initial.commit09911bf2008-07-26 23:55:29729 return;
730 io_thread_.swap(thread);
731}
732
733void BrowserProcessImpl::CreateFileThread() {
734 DCHECK(!created_file_thread_ && file_thread_.get() == NULL);
735 created_file_thread_ = true;
736
[email protected]ab820df2008-08-26 05:55:10737 scoped_ptr<base::Thread> thread(
[email protected]d04e7662010-10-10 22:24:48738 new BrowserProcessSubThread(BrowserThread::FILE));
[email protected]a1db3842008-09-17 22:04:06739 base::Thread::Options options;
[email protected]9e549b582009-02-05 21:13:39740#if defined(OS_WIN)
741 // On Windows, the FILE thread needs to be have a UI message loop which pumps
742 // messages in such a way that Google Update can communicate back to us.
[email protected]a1db3842008-09-17 22:04:06743 options.message_loop_type = MessageLoop::TYPE_UI;
[email protected]9e549b582009-02-05 21:13:39744#else
745 options.message_loop_type = MessageLoop::TYPE_IO;
746#endif
[email protected]a1db3842008-09-17 22:04:06747 if (!thread->StartWithOptions(options))
initial.commit09911bf2008-07-26 23:55:29748 return;
749 file_thread_.swap(thread);
750}
751
[email protected]2d14b3732011-05-10 16:48:44752#if defined(OS_CHROMEOS)
753void BrowserProcessImpl::CreateWebSocketProxyThread() {
754 DCHECK(!created_web_socket_proxy_thread_);
755 DCHECK(web_socket_proxy_thread_.get() == NULL);
756 created_web_socket_proxy_thread_ = true;
757
758 scoped_ptr<base::Thread> thread(
759 new BrowserProcessSubThread(BrowserThread::WEB_SOCKET_PROXY));
760 base::Thread::Options options;
761 options.message_loop_type = MessageLoop::TYPE_IO;
762 if (!thread->StartWithOptions(options))
763 return;
764 web_socket_proxy_thread_.swap(thread);
765}
766#endif
767
initial.commit09911bf2008-07-26 23:55:29768void BrowserProcessImpl::CreateDBThread() {
769 DCHECK(!created_db_thread_ && db_thread_.get() == NULL);
770 created_db_thread_ = true;
771
[email protected]ab820df2008-08-26 05:55:10772 scoped_ptr<base::Thread> thread(
[email protected]d04e7662010-10-10 22:24:48773 new BrowserProcessSubThread(BrowserThread::DB));
initial.commit09911bf2008-07-26 23:55:29774 if (!thread->Start())
775 return;
776 db_thread_.swap(thread);
777}
778
[email protected]914511712009-11-23 19:42:33779void BrowserProcessImpl::CreateProcessLauncherThread() {
780 DCHECK(!created_process_launcher_thread_ && !process_launcher_thread_.get());
781 created_process_launcher_thread_ = true;
782
783 scoped_ptr<base::Thread> thread(
[email protected]d04e7662010-10-10 22:24:48784 new BrowserProcessSubThread(BrowserThread::PROCESS_LAUNCHER));
[email protected]914511712009-11-23 19:42:33785 if (!thread->Start())
786 return;
787 process_launcher_thread_.swap(thread);
788}
789
[email protected]875ee822010-05-18 20:58:01790void BrowserProcessImpl::CreateCacheThread() {
791 DCHECK(!created_cache_thread_ && !cache_thread_.get());
792 created_cache_thread_ = true;
793
794 scoped_ptr<base::Thread> thread(
[email protected]75096332010-11-09 03:28:13795 new BrowserThread(BrowserThread::CACHE));
[email protected]875ee822010-05-18 20:58:01796 base::Thread::Options options;
797 options.message_loop_type = MessageLoop::TYPE_IO;
798 if (!thread->StartWithOptions(options))
799 return;
800 cache_thread_.swap(thread);
801}
802
[email protected]0b565182011-03-02 18:11:15803void BrowserProcessImpl::CreateWatchdogThread() {
804 DCHECK(!created_watchdog_thread_ && watchdog_thread_.get() == NULL);
805 created_watchdog_thread_ = true;
806
807 scoped_ptr<WatchDogThread> thread(new WatchDogThread());
808 if (!thread->Start())
809 return;
810 watchdog_thread_.swap(thread);
811}
812
initial.commit09911bf2008-07-26 23:55:29813void BrowserProcessImpl::CreateProfileManager() {
814 DCHECK(!created_profile_manager_ && profile_manager_.get() == NULL);
815 created_profile_manager_ = true;
816
817 profile_manager_.reset(new ProfileManager());
818}
819
820void BrowserProcessImpl::CreateLocalState() {
821 DCHECK(!created_local_state_ && local_state_.get() == NULL);
822 created_local_state_ = true;
823
[email protected]b9636002009-03-04 00:05:25824 FilePath local_state_path;
initial.commit09911bf2008-07-26 23:55:29825 PathService::Get(chrome::FILE_LOCAL_STATE, &local_state_path);
[email protected]f2d1f612010-12-09 15:10:17826 local_state_.reset(
[email protected]fcf53572011-06-29 15:44:37827 PrefService::CreatePrefService(local_state_path, NULL, false));
[email protected]492d2142010-09-10 13:55:18828
[email protected]caf63aea2011-04-26 11:04:10829 // Initialize the prefs of the local state.
830 browser::RegisterLocalState(local_state_.get());
831
[email protected]2a7e7c152010-10-01 20:12:09832 pref_change_registrar_.Init(local_state_.get());
833
[email protected]f16b9662011-04-27 10:06:07834 print_job_manager_->InitOnUIThread(local_state_.get());
[email protected]e450fa62011-02-01 12:52:56835
836 // Initialize the notification for the default browser setting policy.
837 local_state_->RegisterBooleanPref(prefs::kDefaultBrowserSettingEnabled,
838 false);
839 if (local_state_->IsManagedPreference(prefs::kDefaultBrowserSettingEnabled)) {
840 if (local_state_->GetBoolean(prefs::kDefaultBrowserSettingEnabled))
841 ShellIntegration::SetAsDefaultBrowser();
842 }
843 pref_change_registrar_.Add(prefs::kDefaultBrowserSettingEnabled, this);
[email protected]8b08a47f2011-02-25 12:36:37844
845 // Initialize the preference for the plugin finder policy.
846 // This preference is only needed on the IO thread so make it available there.
847 local_state_->RegisterBooleanPref(prefs::kDisablePluginFinder, false);
848 plugin_finder_disabled_pref_.Init(prefs::kDisablePluginFinder,
849 local_state_.get(), NULL);
850 plugin_finder_disabled_pref_.MoveToThread(BrowserThread::IO);
[email protected]419a0572011-04-18 22:21:46851
[email protected]1f8110b2011-05-24 14:48:30852 // Initialize the disk cache location policy. This policy is not hot update-
853 // able so we need to have it when initializing the profiles.
854 local_state_->RegisterFilePathPref(prefs::kDiskCacheDir, FilePath());
855
[email protected]12c84e22011-07-11 09:35:45856 // Another policy that needs to be defined before the net subsystem is
857 // initialized is MaxConnectionsPerProxy so we do it here.
858 local_state_->RegisterIntegerPref(prefs::kMaxConnectionsPerProxy,
859 net::kDefaultMaxSocketsPerProxyServer);
860 int max_per_proxy = local_state_->GetInteger(prefs::kMaxConnectionsPerProxy);
861 net::ClientSocketPoolManager::set_max_sockets_per_proxy_server(
862 std::max(std::min(max_per_proxy, 99),
863 net::ClientSocketPoolManager::max_sockets_per_group()));
864
[email protected]b99c41c2011-04-27 15:18:48865 // This is observed by ChildProcessSecurityPolicy, which lives in content/
866 // though, so it can't register itself.
[email protected]419a0572011-04-18 22:21:46867 local_state_->RegisterListPref(prefs::kDisabledSchemes);
[email protected]b99c41c2011-04-27 15:18:48868 pref_change_registrar_.Add(prefs::kDisabledSchemes, this);
[email protected]419a0572011-04-18 22:21:46869 ApplyDisabledSchemesPolicy();
[email protected]fd6159a2010-09-03 09:38:39870}
initial.commit09911bf2008-07-26 23:55:29871
initial.commit09911bf2008-07-26 23:55:29872void BrowserProcessImpl::CreateIconManager() {
873 DCHECK(!created_icon_manager_ && icon_manager_.get() == NULL);
874 created_icon_manager_ = true;
875 icon_manager_.reset(new IconManager);
876}
877
[email protected]40ecc902009-03-16 13:42:47878void BrowserProcessImpl::CreateDevToolsManager() {
[email protected]73ee01522009-06-05 10:13:44879 DCHECK(devtools_manager_.get() == NULL);
[email protected]40ecc902009-03-16 13:42:47880 created_devtools_manager_ = true;
[email protected]73ee01522009-06-05 10:13:44881 devtools_manager_ = new DevToolsManager();
[email protected]40ecc902009-03-16 13:42:47882}
883
[email protected]8b8e7c92010-08-19 18:05:56884void BrowserProcessImpl::CreateSidebarManager() {
885 DCHECK(sidebar_manager_.get() == NULL);
886 created_sidebar_manager_ = true;
887 sidebar_manager_ = new SidebarManager();
888}
889
initial.commit09911bf2008-07-26 23:55:29890void BrowserProcessImpl::CreateGoogleURLTracker() {
891 DCHECK(google_url_tracker_.get() == NULL);
892 scoped_ptr<GoogleURLTracker> google_url_tracker(new GoogleURLTracker);
893 google_url_tracker_.swap(google_url_tracker);
894}
[email protected]6641bf662009-08-21 00:34:09895
[email protected]c4ff4952010-01-08 19:12:47896void BrowserProcessImpl::CreateIntranetRedirectDetector() {
897 DCHECK(intranet_redirect_detector_.get() == NULL);
898 scoped_ptr<IntranetRedirectDetector> intranet_redirect_detector(
899 new IntranetRedirectDetector);
900 intranet_redirect_detector_.swap(intranet_redirect_detector);
901}
902
[email protected]29672ab2009-10-30 03:44:03903void BrowserProcessImpl::CreateNotificationUIManager() {
904 DCHECK(notification_ui_manager_.get() == NULL);
[email protected]b0b2a3dd2011-01-06 00:30:05905 notification_ui_manager_.reset(NotificationUIManager::Create(local_state()));
906
[email protected]29672ab2009-10-30 03:44:03907 created_notification_ui_manager_ = true;
908}
909
[email protected]0b4d3382010-07-14 16:13:04910void BrowserProcessImpl::CreateTabCloseableStateWatcher() {
911 DCHECK(tab_closeable_state_watcher_.get() == NULL);
912 tab_closeable_state_watcher_.reset(TabCloseableStateWatcher::Create());
913}
914
[email protected]9e7f015f2011-05-28 00:24:25915void BrowserProcessImpl::CreateBackgroundModeManager() {
916 DCHECK(background_mode_manager_.get() == NULL);
917 background_mode_manager_.reset(
918 new BackgroundModeManager(CommandLine::ForCurrentProcess()));
919}
920
921void BrowserProcessImpl::CreateStatusTray() {
922 DCHECK(status_tray_.get() == NULL);
923 status_tray_.reset(StatusTray::Create());
924}
925
[email protected]dbeebd52010-11-16 20:34:16926void BrowserProcessImpl::CreatePrintPreviewTabController() {
927 DCHECK(print_preview_tab_controller_.get() == NULL);
928 print_preview_tab_controller_ = new printing::PrintPreviewTabController();
929}
930
[email protected]68f88b992011-05-07 02:01:39931void BrowserProcessImpl::CreateBackgroundPrintingManager() {
932 DCHECK(background_printing_manager_.get() == NULL);
933 background_printing_manager_.reset(new printing::BackgroundPrintingManager());
934}
935
[email protected]462a0ff2011-06-02 17:15:34936void BrowserProcessImpl::CreateSafeBrowsingService() {
937 DCHECK(safe_browsing_service_.get() == NULL);
[email protected]8c40da62011-07-13 22:58:46938 // Set this flag to true so that we don't retry indefinitely to
939 // create the service class if there was an error.
[email protected]462a0ff2011-06-02 17:15:34940 created_safe_browsing_service_ = true;
[email protected]4b58e7d2011-07-11 10:22:56941#if defined(ENABLE_SAFE_BROWSING)
[email protected]462a0ff2011-06-02 17:15:34942 safe_browsing_service_ = SafeBrowsingService::CreateSafeBrowsingService();
943 safe_browsing_service_->Initialize();
[email protected]4b58e7d2011-07-11 10:22:56944#endif
[email protected]462a0ff2011-06-02 17:15:34945}
946
[email protected]a7a5e992010-12-09 23:39:51947void BrowserProcessImpl::CreateSafeBrowsingDetectionService() {
948 DCHECK(safe_browsing_detection_service_.get() == NULL);
949 // Set this flag to true so that we don't retry indefinitely to
950 // create the service class if there was an error.
951 created_safe_browsing_detection_service_ = true;
952
[email protected]4b58e7d2011-07-11 10:22:56953#if defined(ENABLE_SAFE_BROWSING)
[email protected]1eb19a32011-07-28 22:22:54954 if (IsSafeBrowsingDetectionServiceEnabled()) {
[email protected]a7a5e992010-12-09 23:39:51955 safe_browsing_detection_service_.reset(
956 safe_browsing::ClientSideDetectionService::Create(
[email protected]1eb19a32011-07-28 22:22:54957 g_browser_process->system_request_context()));
[email protected]a7a5e992010-12-09 23:39:51958 }
[email protected]4b58e7d2011-07-11 10:22:56959#endif
[email protected]a7a5e992010-12-09 23:39:51960}
961
962bool BrowserProcessImpl::IsSafeBrowsingDetectionServiceEnabled() {
963 // The safe browsing client-side detection is enabled only if the switch is
[email protected]436ebd62011-06-09 22:08:11964 // not disabled and when safe browsing related stats are allowed to be
965 // collected.
[email protected]4b58e7d2011-07-11 10:22:56966#if defined(ENABLE_SAFE_BROWSING) && !defined(OS_CHROMEOS)
[email protected]d081d192011-04-01 02:33:24967 return !CommandLine::ForCurrentProcess()->HasSwitch(
968 switches::kDisableClientSidePhishingDetection) &&
[email protected]462a0ff2011-06-02 17:15:34969 safe_browsing_service() &&
[email protected]436ebd62011-06-09 22:08:11970 safe_browsing_service()->CanReportStats();
[email protected]4b58e7d2011-07-11 10:22:56971#else
972 return false;
[email protected]d081d192011-04-01 02:33:24973#endif
[email protected]a7a5e992010-12-09 23:39:51974}
975
[email protected]419a0572011-04-18 22:21:46976void BrowserProcessImpl::ApplyDisabledSchemesPolicy() {
977 std::set<std::string> schemes;
[email protected]b99c41c2011-04-27 15:18:48978 const ListValue* scheme_list = local_state_->GetList(prefs::kDisabledSchemes);
979 for (ListValue::const_iterator iter = scheme_list->begin();
980 iter != scheme_list->end(); ++iter) {
[email protected]419a0572011-04-18 22:21:46981 std::string scheme;
982 if ((*iter)->GetAsString(&scheme))
983 schemes.insert(scheme);
984 }
985 ChildProcessSecurityPolicy::GetInstance()->RegisterDisabledSchemes(schemes);
986}
987
[email protected]40850a52011-05-26 22:07:35988void BrowserProcessImpl::ApplyAllowCrossOriginAuthPromptPolicy() {
989 bool value = local_state()->GetBoolean(prefs::kAllowCrossOriginAuthPrompt);
990 resource_dispatcher_host()->set_allow_cross_origin_auth_prompt(value);
991}
992
[email protected]6641bf662009-08-21 00:34:09993// The BrowserProcess object must outlive the file thread so we use traits
994// which don't do any management.
[email protected]c56428f22010-06-16 02:17:23995DISABLE_RUNNABLE_METHOD_REFCOUNT(BrowserProcessImpl);
[email protected]6641bf662009-08-21 00:34:09996
[email protected]d55aaa132009-09-28 21:08:04997#if defined(IPC_MESSAGE_LOG_ENABLED)
998
999void BrowserProcessImpl::SetIPCLoggingEnabled(bool enable) {
1000 // First enable myself.
1001 if (enable)
[email protected]8e8bb6d2010-12-13 08:18:551002 IPC::Logging::GetInstance()->Enable();
[email protected]d55aaa132009-09-28 21:08:041003 else
[email protected]8e8bb6d2010-12-13 08:18:551004 IPC::Logging::GetInstance()->Disable();
[email protected]d55aaa132009-09-28 21:08:041005
1006 // Now tell subprocesses. Messages to ChildProcess-derived
1007 // processes must be done on the IO thread.
1008 io_thread()->message_loop()->PostTask
1009 (FROM_HERE,
1010 NewRunnableMethod(
1011 this,
1012 &BrowserProcessImpl::SetIPCLoggingEnabledForChildProcesses,
1013 enable));
1014
1015 // Finally, tell the renderers which don't derive from ChildProcess.
1016 // Messages to the renderers must be done on the UI (main) thread.
[email protected]019191a2009-10-02 20:37:271017 for (RenderProcessHost::iterator i(RenderProcessHost::AllHostsIterator());
1018 !i.IsAtEnd(); i.Advance())
[email protected]ff47b2962011-03-07 23:51:491019 i.GetCurrentValue()->Send(new ChildProcessMsg_SetIPCLoggingEnabled(enable));
[email protected]d55aaa132009-09-28 21:08:041020}
1021
1022// Helper for SetIPCLoggingEnabled.
1023void BrowserProcessImpl::SetIPCLoggingEnabledForChildProcesses(bool enabled) {
[email protected]d04e7662010-10-10 22:24:481024 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO));
[email protected]d55aaa132009-09-28 21:08:041025
[email protected]d27893f62010-07-03 05:47:421026 BrowserChildProcessHost::Iterator i; // default constr references a singleton
[email protected]34cf97d2009-09-29 22:46:111027 while (!i.Done()) {
[email protected]ff47b2962011-03-07 23:51:491028 i->Send(new ChildProcessMsg_SetIPCLoggingEnabled(enabled));
[email protected]34cf97d2009-09-29 22:46:111029 ++i;
[email protected]d55aaa132009-09-28 21:08:041030 }
1031}
1032
1033#endif // IPC_MESSAGE_LOG_ENABLED
1034
[email protected]3cdacd42010-04-30 18:55:531035// Mac is currently not supported.
1036#if (defined(OS_WIN) || defined(OS_LINUX)) && !defined(OS_CHROMEOS)
[email protected]bd48c2b02010-04-09 20:32:421037
1038bool BrowserProcessImpl::CanAutorestartForUpdate() const {
1039 // Check if browser is in the background and if it needs to be restarted to
1040 // apply a pending update.
[email protected]c10fa3952010-08-24 16:52:531041 return BrowserList::size() == 0 && BrowserList::WillKeepAlive() &&
[email protected]815856722011-04-13 17:19:191042 upgrade_util::IsUpdatePendingRestart();
[email protected]bd48c2b02010-04-09 20:32:421043}
1044
[email protected]5c08f222010-09-22 09:37:211045// Switches to add when auto-restarting Chrome.
[email protected]6c10c972010-08-11 04:15:471046const char* const kSwitchesToAddOnAutorestart[] = {
[email protected]f9a06842010-08-21 00:32:401047 switches::kNoStartupWindow
[email protected]bd48c2b02010-04-09 20:32:421048};
1049
1050void BrowserProcessImpl::RestartPersistentInstance() {
1051 CommandLine* old_cl = CommandLine::ForCurrentProcess();
[email protected]3cdacd42010-04-30 18:55:531052 scoped_ptr<CommandLine> new_cl(new CommandLine(old_cl->GetProgram()));
[email protected]bd48c2b02010-04-09 20:32:421053
1054 std::map<std::string, CommandLine::StringType> switches =
1055 old_cl->GetSwitches();
1056
[email protected]5c08f222010-09-22 09:37:211057 switches::RemoveSwitchesForAutostart(&switches);
[email protected]bd48c2b02010-04-09 20:32:421058
1059 // Append the rest of the switches (along with their values, if any)
1060 // to the new command line
1061 for (std::map<std::string, CommandLine::StringType>::const_iterator i =
1062 switches.begin(); i != switches.end(); ++i) {
1063 CommandLine::StringType switch_value = i->second;
1064 if (switch_value.length() > 0) {
[email protected]05076ba22010-07-30 05:59:571065 new_cl->AppendSwitchNative(i->first, i->second);
[email protected]bd48c2b02010-04-09 20:32:421066 } else {
[email protected]3cdacd42010-04-30 18:55:531067 new_cl->AppendSwitch(i->first);
[email protected]bd48c2b02010-04-09 20:32:421068 }
1069 }
1070
[email protected]6c10c972010-08-11 04:15:471071 // Ensure that our desired switches are set on the new process.
[email protected]5c08f222010-09-22 09:37:211072 for (size_t i = 0; i < arraysize(kSwitchesToAddOnAutorestart); ++i) {
[email protected]6c10c972010-08-11 04:15:471073 if (!new_cl->HasSwitch(kSwitchesToAddOnAutorestart[i]))
1074 new_cl->AppendSwitch(kSwitchesToAddOnAutorestart[i]);
1075 }
[email protected]bd48c2b02010-04-09 20:32:421076
[email protected]3cdacd42010-04-30 18:55:531077 DLOG(WARNING) << "Shutting down current instance of the browser.";
[email protected]bc63a072011-06-28 21:12:571078 BrowserList::AttemptExit();
[email protected]3cdacd42010-04-30 18:55:531079
1080 // Transfer ownership to Upgrade.
[email protected]815856722011-04-13 17:19:191081 upgrade_util::SetNewCommandLine(new_cl.release());
[email protected]bd48c2b02010-04-09 20:32:421082}
1083
1084void BrowserProcessImpl::OnAutoupdateTimer() {
1085 if (CanAutorestartForUpdate()) {
[email protected]3cdacd42010-04-30 18:55:531086 DLOG(WARNING) << "Detected update. Restarting browser.";
[email protected]bd48c2b02010-04-09 20:32:421087 RestartPersistentInstance();
1088 }
1089}
1090
[email protected]3cdacd42010-04-30 18:55:531091#endif // (defined(OS_WIN) || defined(OS_LINUX)) && !defined(OS_CHROMEOS)