blob: 3bc4df03992b1ed485befba7c23e51dc8f44d05e [file] [log] [blame]
[email protected]f2a893c2011-01-05 09:38:071// Copyright (c) 2011 The Chromium Authors. All rights reserved.
license.botbf09a502008-08-24 00:55:552// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
initial.commit09911bf2008-07-26 23:55:294
5#include "chrome/browser/browser_process_impl.h"
6
[email protected]3cdacd42010-04-30 18:55:537#include <map>
[email protected]68f88b992011-05-07 02:01:398#include <set>
9#include <vector>
[email protected]3cdacd42010-04-30 18:55:5310
initial.commit09911bf2008-07-26 23:55:2911#include "base/command_line.h"
[email protected]6641bf662009-08-21 00:34:0912#include "base/file_util.h"
initial.commit09911bf2008-07-26 23:55:2913#include "base/path_service.h"
[email protected]985655a2011-02-23 09:54:2514#include "base/synchronization/waitable_event.h"
[email protected]c6032e82010-09-13 20:06:0515#include "base/task.h"
[email protected]34b99632011-01-01 01:01:0616#include "base/threading/thread.h"
17#include "base/threading/thread_restrictions.h"
[email protected]e13ad79b2010-07-22 21:36:5018#include "chrome/browser/automation/automation_provider_list.h"
[email protected]a07676b22011-06-17 16:36:5319#include "chrome/browser/background/background_mode_manager.h"
[email protected]b443cb042009-12-15 22:05:0920#include "chrome/browser/browser_main.h"
[email protected]0ac83682010-01-22 17:46:2721#include "chrome/browser/browser_process_sub_thread.h"
[email protected]ac262c9f2008-10-19 17:45:2122#include "chrome/browser/browser_trial.h"
[email protected]0639cfd2011-07-20 11:38:0323#include "chrome/browser/debugger/devtools_protocol_handler.h"
[email protected]4475d232011-07-27 15:29:2024#include "chrome/browser/debugger/remote_debugging_server.h"
[email protected]6c69796d2010-07-16 21:41:1625#include "chrome/browser/download/download_file_manager.h"
[email protected]3ce02412011-03-01 12:01:1526#include "chrome/browser/extensions/extension_event_router_forwarder.h"
[email protected]fc4facd2011-03-22 23:18:5027#include "chrome/browser/extensions/extension_tab_id_map.h"
[email protected]214538842011-04-01 18:47:2428#include "chrome/browser/extensions/user_script_listener.h"
[email protected]815856722011-04-13 17:19:1929#include "chrome/browser/first_run/upgrade_util.h"
[email protected]f7578f52010-08-30 22:22:4930#include "chrome/browser/google/google_url_tracker.h"
[email protected]dcefa302009-05-20 00:24:3931#include "chrome/browser/icon_manager.h"
[email protected]c4ff4952010-01-08 19:12:4732#include "chrome/browser/intranet_redirect_detector.h"
[email protected]0ac83682010-01-22 17:46:2733#include "chrome/browser/io_thread.h"
[email protected]dc6f4962009-02-13 01:25:5034#include "chrome/browser/metrics/metrics_service.h"
[email protected]0b565182011-03-02 18:11:1535#include "chrome/browser/metrics/thread_watcher.h"
[email protected]b2fcd0e2010-12-01 15:19:4036#include "chrome/browser/net/chrome_net_log.h"
[email protected]3530cd92010-06-27 06:22:0137#include "chrome/browser/net/predictor_api.h"
[email protected]d393a0fd2009-05-13 23:32:0138#include "chrome/browser/net/sdch_dictionary_fetcher.h"
[email protected]29672ab2009-10-30 03:44:0339#include "chrome/browser/notifications/notification_ui_manager.h"
[email protected]985655a2011-02-23 09:54:2540#include "chrome/browser/policy/browser_policy_connector.h"
[email protected]caf63aea2011-04-26 11:04:1041#include "chrome/browser/prefs/browser_prefs.h"
[email protected]37858e52010-08-26 00:22:0242#include "chrome/browser/prefs/pref_service.h"
[email protected]1459fb62011-05-25 19:03:2743#include "chrome/browser/prerender/prerender_tracker.h"
[email protected]68f88b992011-05-07 02:01:3944#include "chrome/browser/printing/background_printing_manager.h"
[email protected]e06131d2010-02-10 18:40:3345#include "chrome/browser/printing/print_job_manager.h"
[email protected]dbeebd52010-11-16 20:34:1646#include "chrome/browser/printing/print_preview_tab_controller.h"
[email protected]8ecad5e2010-12-02 21:18:3347#include "chrome/browser/profiles/profile_manager.h"
[email protected]8bcdf072011-06-03 16:52:1548#include "chrome/browser/renderer_host/chrome_resource_dispatcher_host_delegate.h"
[email protected]a7a5e992010-12-09 23:39:5149#include "chrome/browser/safe_browsing/client_side_detection_service.h"
[email protected]81218f42009-02-05 18:48:0850#include "chrome/browser/safe_browsing/safe_browsing_service.h"
[email protected]e450fa62011-02-01 12:52:5651#include "chrome/browser/shell_integration.h"
[email protected]8b8e7c92010-08-19 18:05:5652#include "chrome/browser/sidebar/sidebar_manager.h"
[email protected]9e7f015f2011-05-28 00:24:2553#include "chrome/browser/status_icons/status_tray.h"
[email protected]0b4d3382010-07-14 16:13:0454#include "chrome/browser/tab_closeable_state_watcher.h"
[email protected]71b73f02011-04-06 15:57:2955#include "chrome/browser/ui/browser_list.h"
[email protected]87522db92011-07-28 23:44:1456#include "chrome/browser/web_resource/gpu_blacklist_updater.h"
[email protected]4ef795df2010-02-03 02:35:0857#include "chrome/common/chrome_constants.h"
[email protected]432115822011-07-10 15:52:2758#include "chrome/common/chrome_notification_types.h"
initial.commit09911bf2008-07-26 23:55:2959#include "chrome/common/chrome_paths.h"
60#include "chrome/common/chrome_switches.h"
[email protected]de23f3f2011-05-18 16:20:2361#include "chrome/common/default_plugin.h"
[email protected]f1b6de22010-03-06 12:13:4762#include "chrome/common/extensions/extension_l10n_util.h"
[email protected]985655a2011-02-23 09:54:2563#include "chrome/common/extensions/extension_resource.h"
[email protected]ea587b02010-05-21 15:01:3564#include "chrome/common/json_pref_store.h"
initial.commit09911bf2008-07-26 23:55:2965#include "chrome/common/pref_names.h"
[email protected]5c08f222010-09-22 09:37:2166#include "chrome/common/switch_utils.h"
[email protected]985655a2011-02-23 09:54:2567#include "chrome/common/url_constants.h"
[email protected]bd48c2b02010-04-09 20:32:4268#include "chrome/installer/util/google_update_constants.h"
[email protected]a01efd22011-03-01 00:38:3269#include "content/browser/browser_child_process_host.h"
70#include "content/browser/browser_thread.h"
[email protected]419a0572011-04-18 22:21:4671#include "content/browser/child_process_security_policy.h"
[email protected]b46442d7e2011-06-29 02:16:0672#include "content/browser/debugger/devtools_manager.h"
[email protected]8f6a3b852011-07-19 16:48:5673#include "content/browser/download/mhtml_generation_manager.h"
[email protected]0ffaa482011-07-14 23:41:2874#include "content/browser/download/save_file_manager.h"
[email protected]d9f37932011-05-09 20:09:2475#include "content/browser/gpu/gpu_process_host_ui_shim.h"
[email protected]6eac57a2011-07-12 21:15:0976#include "content/browser/net/browser_online_state_observer.h"
[email protected]a01efd22011-03-01 00:38:3277#include "content/browser/plugin_service.h"
78#include "content/browser/renderer_host/render_process_host.h"
79#include "content/browser/renderer_host/resource_dispatcher_host.h"
[email protected]f20d7332011-03-08 21:11:5380#include "content/common/notification_service.h"
[email protected]d55aaa132009-09-28 21:08:0481#include "ipc/ipc_logging.h"
[email protected]12c84e22011-07-11 09:35:4582#include "net/socket/client_socket_pool_manager.h"
[email protected]abe2c032011-03-31 18:49:3483#include "net/url_request/url_request_context_getter.h"
[email protected]2dfeaf92011-01-10 21:08:2184#include "ui/base/clipboard/clipboard.h"
[email protected]c051a1b2011-01-21 23:30:1785#include "ui/base/l10n/l10n_util.h"
[email protected]de23f3f2011-05-18 16:20:2386#include "webkit/plugins/npapi/plugin_list.h"
[email protected]b112a4c2009-02-01 20:24:0187
88#if defined(OS_WIN)
[email protected]2362e4f2009-05-08 00:34:0589#include "views/focus/view_storage.h"
[email protected]86230b92009-11-23 20:38:3890#endif
91
[email protected]d55aaa132009-09-28 21:08:0492#if defined(IPC_MESSAGE_LOG_ENABLED)
[email protected]ff47b2962011-03-07 23:51:4993#include "content/common/child_process_messages.h"
[email protected]d55aaa132009-09-28 21:08:0494#endif
95
[email protected]db0e86dd2011-03-16 14:47:2196#if defined(OS_CHROMEOS)
97#include "chrome/browser/chromeos/proxy_config_service_impl.h"
[email protected]2d14b3732011-05-10 16:48:4498#include "chrome/browser/chromeos/web_socket_proxy_controller.h"
[email protected]db0e86dd2011-03-16 14:47:2199#endif // defined(OS_CHROMEOS)
100
[email protected]3cdacd42010-04-30 18:55:53101#if (defined(OS_WIN) || defined(OS_LINUX)) && !defined(OS_CHROMEOS)
102// How often to check if the persistent instance of Chrome needs to restart
103// to install an update.
104static const int kUpdateCheckIntervalHours = 6;
105#endif
106
[email protected]c6032e82010-09-13 20:06:05107#if defined(USE_X11)
108// How long to wait for the File thread to complete during EndSession, on
109// Linux. We have a timeout here because we're unable to run the UI messageloop
110// and there's some deadlock risk. Our only option is to exit anyway.
111static const int kEndSessionTimeoutSeconds = 10;
112#endif
113
[email protected]bb975362009-01-21 01:00:22114BrowserProcessImpl::BrowserProcessImpl(const CommandLine& command_line)
initial.commit09911bf2008-07-26 23:55:29115 : created_resource_dispatcher_host_(false),
116 created_metrics_service_(false),
117 created_io_thread_(false),
118 created_file_thread_(false),
119 created_db_thread_(false),
[email protected]914511712009-11-23 19:42:33120 created_process_launcher_thread_(false),
[email protected]875ee822010-05-18 20:58:01121 created_cache_thread_(false),
[email protected]0b565182011-03-02 18:11:15122 created_watchdog_thread_(false),
[email protected]2d14b3732011-05-10 16:48:44123#if defined(OS_CHROMEOS)
124 created_web_socket_proxy_thread_(false),
125#endif
initial.commit09911bf2008-07-26 23:55:29126 created_profile_manager_(false),
127 created_local_state_(false),
[email protected]b112a4c2009-02-01 20:24:01128 created_icon_manager_(false),
[email protected]40ecc902009-03-16 13:42:47129 created_devtools_manager_(false),
[email protected]8b8e7c92010-08-19 18:05:56130 created_sidebar_manager_(false),
[email protected]985655a2011-02-23 09:54:25131 created_browser_policy_connector_(false),
[email protected]29672ab2009-10-30 03:44:03132 created_notification_ui_manager_(false),
[email protected]462a0ff2011-06-02 17:15:34133 created_safe_browsing_service_(false),
[email protected]a7a5e992010-12-09 23:39:51134 created_safe_browsing_detection_service_(false),
initial.commit09911bf2008-07-26 23:55:29135 module_ref_count_(0),
[email protected]afd20c022010-06-10 00:48:20136 did_start_(false),
[email protected]1b2db1a2008-08-08 17:46:13137 checked_for_new_frames_(false),
[email protected]4747caf2011-03-23 20:09:21138 using_new_frames_(false) {
initial.commit09911bf2008-07-26 23:55:29139 g_browser_process = this;
[email protected]2dfeaf92011-01-10 21:08:21140 clipboard_.reset(new ui::Clipboard);
initial.commit09911bf2008-07-26 23:55:29141 main_notification_service_.reset(new NotificationService);
142
143 // Must be created after the NotificationService.
144 print_job_manager_.reset(new printing::PrintJobManager);
145
[email protected]b2fcd0e2010-12-01 15:19:40146 net_log_.reset(new ChromeNetLog);
[email protected]3ce02412011-03-01 12:01:15147
148 extension_event_router_forwarder_ = new ExtensionEventRouterForwarder;
[email protected]fc4facd2011-03-22 23:18:50149
150 ExtensionTabIdMap::GetInstance()->Init();
[email protected]6eac57a2011-07-12 21:15:09151
152 online_state_observer_.reset(new BrowserOnlineStateObserver);
initial.commit09911bf2008-07-26 23:55:29153}
154
155BrowserProcessImpl::~BrowserProcessImpl() {
[email protected]2d14b3732011-05-10 16:48:44156#if defined(OS_CHROMEOS)
157 if (web_socket_proxy_thread_.get())
158 chromeos::WebSocketProxyController::Shutdown();
159 web_socket_proxy_thread_.reset();
160#endif
161
initial.commit09911bf2008-07-26 23:55:29162 // Delete the AutomationProviderList before NotificationService,
163 // since it may try to unregister notifications
164 // Both NotificationService and AutomationProvider are singleton instances in
165 // the BrowserProcess. Since AutomationProvider may have some active
166 // notification observers, it is essential that it gets destroyed before the
167 // NotificationService. NotificationService won't be destroyed until after
168 // this destructor is run.
169 automation_provider_list_.reset();
170
[email protected]d393a0fd2009-05-13 23:32:01171 // We need to shutdown the SdchDictionaryFetcher as it regularly holds
172 // a pointer to a URLFetcher, and that URLFetcher (upon destruction) will do
173 // a PostDelayedTask onto the IO thread. This shutdown call will both discard
174 // any pending URLFetchers, and avoid creating any more.
175 SdchDictionaryFetcher::Shutdown();
176
[email protected]51ac040762011-01-20 02:01:04177 // We need to destroy the MetricsService, GoogleURLTracker,
178 // IntranetRedirectDetector, and SafeBrowsing ClientSideDetectionService
179 // before the io_thread_ gets destroyed, since their destructors can call the
180 // URLFetcher destructor, which does a PostDelayedTask operation on the IO
181 // thread. (The IO thread will handle that URLFetcher operation before going
182 // away.)
initial.commit09911bf2008-07-26 23:55:29183 metrics_service_.reset();
184 google_url_tracker_.reset();
[email protected]c4ff4952010-01-08 19:12:47185 intranet_redirect_detector_.reset();
[email protected]51ac040762011-01-20 02:01:04186 safe_browsing_detection_service_.reset();
initial.commit09911bf2008-07-26 23:55:29187
[email protected]d8a899c2010-09-21 04:50:33188 // Need to clear the desktop notification balloons before the io_thread_ and
189 // before the profiles, since if there are any still showing we will access
190 // those things during teardown.
191 notification_ui_manager_.reset();
192
initial.commit09911bf2008-07-26 23:55:29193 // Need to clear profiles (download managers) before the io_thread_.
194 profile_manager_.reset();
195
196 // Debugger must be cleaned up before IO thread and NotificationService.
[email protected]4475d232011-07-27 15:29:20197 remote_debugging_server_.reset();
198
[email protected]5613126e2011-01-31 15:27:55199 if (devtools_legacy_handler_.get()) {
200 devtools_legacy_handler_->Stop();
201 devtools_legacy_handler_ = NULL;
202 }
initial.commit09911bf2008-07-26 23:55:29203
[email protected]4b58e7d2011-07-11 10:22:56204#if defined(ENABLE_SAFE_BROWSING)
[email protected]462a0ff2011-06-02 17:15:34205 if (safe_browsing_service_.get())
206 safe_browsing_service()->ShutDown();
[email protected]4b58e7d2011-07-11 10:22:56207#endif
initial.commit09911bf2008-07-26 23:55:29208
[email protected]462a0ff2011-06-02 17:15:34209 if (resource_dispatcher_host_.get()) {
initial.commit09911bf2008-07-26 23:55:29210 // Cancel pending requests and prevent new requests.
211 resource_dispatcher_host()->Shutdown();
212 }
213
[email protected]fc4facd2011-03-22 23:18:50214 ExtensionTabIdMap::GetInstance()->Shutdown();
215
[email protected]985655a2011-02-23 09:54:25216 // The policy providers managed by |browser_policy_connector_| need to shut
217 // down while the IO and FILE threads are still alive.
218 browser_policy_connector_.reset();
[email protected]f2a893c2011-01-05 09:38:07219
[email protected]7a31f7c2011-03-21 23:22:04220 // Destroying the GpuProcessHostUIShims on the UI thread posts a task to
221 // delete related objects on the GPU thread. This must be done before
222 // stopping the GPU thread. The GPU thread will close IPC channels to renderer
223 // processes so this has to happen before stopping the IO thread.
224 GpuProcessHostUIShim::DestroyAll();
[email protected]7a31f7c2011-03-21 23:22:04225
[email protected]8fd11832011-07-14 20:01:13226 // Stop the watchdog thread before stopping other threads.
227 watchdog_thread_.reset();
228
initial.commit09911bf2008-07-26 23:55:29229 // Need to stop io_thread_ before resource_dispatcher_host_, since
230 // io_thread_ may still deref ResourceDispatcherHost and handle resource
231 // request before going away.
[email protected]0ac83682010-01-22 17:46:27232 io_thread_.reset();
initial.commit09911bf2008-07-26 23:55:29233
[email protected]875ee822010-05-18 20:58:01234 // The IO thread was the only user of this thread.
235 cache_thread_.reset();
236
[email protected]914511712009-11-23 19:42:33237 // Stop the process launcher thread after the IO thread, in case the IO thread
238 // posted a task to terminate a process on the process launcher thread.
239 process_launcher_thread_.reset();
240
initial.commit09911bf2008-07-26 23:55:29241 // Clean up state that lives on the file_thread_ before it goes away.
242 if (resource_dispatcher_host_.get()) {
243 resource_dispatcher_host()->download_file_manager()->Shutdown();
244 resource_dispatcher_host()->save_file_manager()->Shutdown();
245 }
246
247 // Need to stop the file_thread_ here to force it to process messages in its
248 // message loop from the previous call to shutdown the DownloadFileManager,
249 // SaveFileManager and SessionService.
250 file_thread_.reset();
251
252 // With the file_thread_ flushed, we can release any icon resources.
253 icon_manager_.reset();
254
255 // Need to destroy ResourceDispatcherHost before PluginService and
[email protected]49f28bc72010-02-04 00:10:01256 // SafeBrowsingService, since it caches a pointer to it. This also
257 // causes the webkit thread to terminate.
initial.commit09911bf2008-07-26 23:55:29258 resource_dispatcher_host_.reset();
259
260 // Wait for the pending print jobs to finish.
261 print_job_manager_->OnQuit();
262 print_job_manager_.reset();
263
[email protected]0b4d3382010-07-14 16:13:04264 // Destroy TabCloseableStateWatcher before NotificationService since the
265 // former registers for notifications.
266 tab_closeable_state_watcher_.reset();
267
initial.commit09911bf2008-07-26 23:55:29268 // Now OK to destroy NotificationService.
269 main_notification_service_.reset();
270
271 g_browser_process = NULL;
272}
273
[email protected]c6032e82010-09-13 20:06:05274#if defined(OS_WIN)
[email protected]295039bd2008-08-15 04:32:57275// Send a QuitTask to the given MessageLoop.
276static void PostQuit(MessageLoop* message_loop) {
277 message_loop->PostTask(FROM_HERE, new MessageLoop::QuitTask());
278}
[email protected]c6032e82010-09-13 20:06:05279#elif defined(USE_X11)
280static void Signal(base::WaitableEvent* event) {
281 event->Signal();
282}
283#endif
initial.commit09911bf2008-07-26 23:55:29284
[email protected]b443cb042009-12-15 22:05:09285unsigned int BrowserProcessImpl::AddRefModule() {
286 DCHECK(CalledOnValidThread());
[email protected]afd20c022010-06-10 00:48:20287 did_start_ = true;
[email protected]b443cb042009-12-15 22:05:09288 module_ref_count_++;
289 return module_ref_count_;
290}
291
292unsigned int BrowserProcessImpl::ReleaseModule() {
293 DCHECK(CalledOnValidThread());
[email protected]760d970a2010-05-18 00:39:18294 DCHECK_NE(0u, module_ref_count_);
[email protected]b443cb042009-12-15 22:05:09295 module_ref_count_--;
296 if (0 == module_ref_count_) {
[email protected]7d038c32010-12-14 00:40:00297 // Allow UI and IO threads to do blocking IO on shutdown, since we do a lot
298 // of it on shutdown for valid reasons.
299 base::ThreadRestrictions::SetIOAllowed(true);
300 io_thread()->message_loop()->PostTask(
301 FROM_HERE,
302 NewRunnableFunction(&base::ThreadRestrictions::SetIOAllowed, true));
[email protected]b443cb042009-12-15 22:05:09303 MessageLoop::current()->PostTask(
[email protected]34f73fb2010-03-24 20:50:34304 FROM_HERE, NewRunnableFunction(DidEndMainMessageLoop));
[email protected]b443cb042009-12-15 22:05:09305 MessageLoop::current()->Quit();
306 }
307 return module_ref_count_;
308}
309
initial.commit09911bf2008-07-26 23:55:29310void BrowserProcessImpl::EndSession() {
initial.commit09911bf2008-07-26 23:55:29311 // Mark all the profiles as clean.
312 ProfileManager* pm = profile_manager();
[email protected]844a1002011-04-19 11:37:21313 std::vector<Profile*> profiles(pm->GetLoadedProfiles());
314 for (size_t i = 0; i < profiles.size(); ++i)
315 profiles[i]->MarkAsCleanShutdown();
initial.commit09911bf2008-07-26 23:55:29316
317 // Tell the metrics service it was cleanly shutdown.
318 MetricsService* metrics = g_browser_process->metrics_service();
319 if (metrics && local_state()) {
initial.commit09911bf2008-07-26 23:55:29320 metrics->RecordStartOfSessionEnd();
321
322 // MetricsService lazily writes to prefs, force it to write now.
[email protected]6faa0e0d2009-04-28 06:50:36323 local_state()->SavePersistentPrefs();
initial.commit09911bf2008-07-26 23:55:29324 }
325
326 // We must write that the profile and metrics service shutdown cleanly,
327 // otherwise on startup we'll think we crashed. So we block until done and
328 // then proceed with normal shutdown.
[email protected]c6032e82010-09-13 20:06:05329#if defined(USE_X11)
330 // Can't run a local loop on linux. Instead create a waitable event.
331 base::WaitableEvent done_writing(false, false);
[email protected]d04e7662010-10-10 22:24:48332 BrowserThread::PostTask(BrowserThread::FILE, FROM_HERE,
[email protected]c6032e82010-09-13 20:06:05333 NewRunnableFunction(Signal, &done_writing));
334 done_writing.TimedWait(
335 base::TimeDelta::FromSeconds(kEndSessionTimeoutSeconds));
336#elif defined(OS_WIN)
[email protected]d04e7662010-10-10 22:24:48337 BrowserThread::PostTask(BrowserThread::FILE, FROM_HERE,
[email protected]295039bd2008-08-15 04:32:57338 NewRunnableFunction(PostQuit, MessageLoop::current()));
initial.commit09911bf2008-07-26 23:55:29339 MessageLoop::current()->Run();
[email protected]c6032e82010-09-13 20:06:05340#else
341 NOTIMPLEMENTED();
342#endif
initial.commit09911bf2008-07-26 23:55:29343}
344
[email protected]e13ad79b2010-07-22 21:36:50345ResourceDispatcherHost* BrowserProcessImpl::resource_dispatcher_host() {
346 DCHECK(CalledOnValidThread());
347 if (!created_resource_dispatcher_host_)
348 CreateResourceDispatcherHost();
349 return resource_dispatcher_host_.get();
350}
351
352MetricsService* BrowserProcessImpl::metrics_service() {
353 DCHECK(CalledOnValidThread());
354 if (!created_metrics_service_)
355 CreateMetricsService();
356 return metrics_service_.get();
357}
358
359IOThread* BrowserProcessImpl::io_thread() {
360 DCHECK(CalledOnValidThread());
361 if (!created_io_thread_)
362 CreateIOThread();
363 return io_thread_.get();
364}
365
366base::Thread* BrowserProcessImpl::file_thread() {
367 DCHECK(CalledOnValidThread());
368 if (!created_file_thread_)
369 CreateFileThread();
370 return file_thread_.get();
371}
372
373base::Thread* BrowserProcessImpl::db_thread() {
374 DCHECK(CalledOnValidThread());
375 if (!created_db_thread_)
376 CreateDBThread();
377 return db_thread_.get();
378}
379
380base::Thread* BrowserProcessImpl::process_launcher_thread() {
381 DCHECK(CalledOnValidThread());
382 if (!created_process_launcher_thread_)
383 CreateProcessLauncherThread();
384 return process_launcher_thread_.get();
385}
386
387base::Thread* BrowserProcessImpl::cache_thread() {
388 DCHECK(CalledOnValidThread());
389 if (!created_cache_thread_)
390 CreateCacheThread();
391 return cache_thread_.get();
392}
393
[email protected]0b565182011-03-02 18:11:15394WatchDogThread* BrowserProcessImpl::watchdog_thread() {
395 DCHECK(CalledOnValidThread());
396 if (!created_watchdog_thread_)
397 CreateWatchdogThread();
398 DCHECK(watchdog_thread_.get() != NULL);
399 return watchdog_thread_.get();
400}
401
[email protected]2d14b3732011-05-10 16:48:44402#if defined(OS_CHROMEOS)
403base::Thread* BrowserProcessImpl::web_socket_proxy_thread() {
404 DCHECK(CalledOnValidThread());
405 if (!created_web_socket_proxy_thread_)
406 CreateWebSocketProxyThread();
407 DCHECK(web_socket_proxy_thread_.get() != NULL);
408 return web_socket_proxy_thread_.get();
409}
410#endif
411
[email protected]e13ad79b2010-07-22 21:36:50412ProfileManager* BrowserProcessImpl::profile_manager() {
413 DCHECK(CalledOnValidThread());
414 if (!created_profile_manager_)
415 CreateProfileManager();
416 return profile_manager_.get();
417}
418
419PrefService* BrowserProcessImpl::local_state() {
420 DCHECK(CalledOnValidThread());
421 if (!created_local_state_)
422 CreateLocalState();
423 return local_state_.get();
424}
425
426DevToolsManager* BrowserProcessImpl::devtools_manager() {
427 DCHECK(CalledOnValidThread());
428 if (!created_devtools_manager_)
429 CreateDevToolsManager();
430 return devtools_manager_.get();
431}
432
[email protected]8b8e7c92010-08-19 18:05:56433SidebarManager* BrowserProcessImpl::sidebar_manager() {
434 DCHECK(CalledOnValidThread());
435 if (!created_sidebar_manager_)
436 CreateSidebarManager();
437 return sidebar_manager_.get();
438}
439
[email protected]2dfeaf92011-01-10 21:08:21440ui::Clipboard* BrowserProcessImpl::clipboard() {
[email protected]e13ad79b2010-07-22 21:36:50441 DCHECK(CalledOnValidThread());
442 return clipboard_.get();
443}
444
[email protected]abe2c032011-03-31 18:49:34445net::URLRequestContextGetter* BrowserProcessImpl::system_request_context() {
[email protected]db0e86dd2011-03-16 14:47:21446 DCHECK(CalledOnValidThread());
447 return io_thread()->system_url_request_context_getter();
448}
449
450#if defined(OS_CHROMEOS)
451chromeos::ProxyConfigServiceImpl*
452BrowserProcessImpl::chromeos_proxy_config_service_impl() {
453 DCHECK(CalledOnValidThread());
454 if (!chromeos_proxy_config_service_impl_) {
455 chromeos_proxy_config_service_impl_ =
456 new chromeos::ProxyConfigServiceImpl();
457 }
458 return chromeos_proxy_config_service_impl_;
459}
460#endif // defined(OS_CHROMEOS)
461
[email protected]3ce02412011-03-01 12:01:15462ExtensionEventRouterForwarder*
463BrowserProcessImpl::extension_event_router_forwarder() {
464 return extension_event_router_forwarder_.get();
465}
466
[email protected]e13ad79b2010-07-22 21:36:50467NotificationUIManager* BrowserProcessImpl::notification_ui_manager() {
468 DCHECK(CalledOnValidThread());
469 if (!created_notification_ui_manager_)
470 CreateNotificationUIManager();
471 return notification_ui_manager_.get();
472}
473
[email protected]985655a2011-02-23 09:54:25474policy::BrowserPolicyConnector* BrowserProcessImpl::browser_policy_connector() {
[email protected]f2a893c2011-01-05 09:38:07475 DCHECK(CalledOnValidThread());
[email protected]985655a2011-02-23 09:54:25476 if (!created_browser_policy_connector_) {
477 DCHECK(browser_policy_connector_.get() == NULL);
478 created_browser_policy_connector_ = true;
[email protected]f31e2e52011-07-14 16:01:19479#if defined(ENABLE_CONFIGURATION_POLICY)
[email protected]d9ee002c2011-04-27 12:52:54480 browser_policy_connector_.reset(policy::BrowserPolicyConnector::Create());
[email protected]f31e2e52011-07-14 16:01:19481#endif
[email protected]f2a893c2011-01-05 09:38:07482 }
[email protected]985655a2011-02-23 09:54:25483 return browser_policy_connector_.get();
[email protected]f2a893c2011-01-05 09:38:07484}
485
[email protected]e13ad79b2010-07-22 21:36:50486IconManager* BrowserProcessImpl::icon_manager() {
487 DCHECK(CalledOnValidThread());
488 if (!created_icon_manager_)
489 CreateIconManager();
490 return icon_manager_.get();
491}
492
493ThumbnailGenerator* BrowserProcessImpl::GetThumbnailGenerator() {
494 return &thumbnail_generator_;
495}
496
497AutomationProviderList* BrowserProcessImpl::InitAutomationProviderList() {
498 DCHECK(CalledOnValidThread());
499 if (automation_provider_list_.get() == NULL) {
500 automation_provider_list_.reset(AutomationProviderList::GetInstance());
501 }
502 return automation_provider_list_.get();
503}
504
[email protected]5613126e2011-01-31 15:27:55505void BrowserProcessImpl::InitDevToolsHttpProtocolHandler(
[email protected]4475d232011-07-27 15:29:20506 Profile* profile,
[email protected]01000cf12011-02-04 11:39:22507 const std::string& ip,
[email protected]5613126e2011-01-31 15:27:55508 int port,
509 const std::string& frontend_url) {
[email protected]e13ad79b2010-07-22 21:36:50510 DCHECK(CalledOnValidThread());
[email protected]4475d232011-07-27 15:29:20511 remote_debugging_server_.reset(
512 new RemoteDebuggingServer(profile, ip, port, frontend_url));
[email protected]5613126e2011-01-31 15:27:55513}
514
515void BrowserProcessImpl::InitDevToolsLegacyProtocolHandler(int port) {
516 DCHECK(CalledOnValidThread());
517 devtools_legacy_handler_ = DevToolsProtocolHandler::Start(port);
[email protected]e13ad79b2010-07-22 21:36:50518}
519
520bool BrowserProcessImpl::IsShuttingDown() {
521 DCHECK(CalledOnValidThread());
522 return did_start_ && 0 == module_ref_count_;
523}
524
initial.commit09911bf2008-07-26 23:55:29525printing::PrintJobManager* BrowserProcessImpl::print_job_manager() {
526 // TODO(abarth): DCHECK(CalledOnValidThread());
[email protected]d8922f22010-05-07 00:57:27527 // http://code.google.com/p/chromium/issues/detail?id=6828
initial.commit09911bf2008-07-26 23:55:29528 // print_job_manager_ is initialized in the constructor and destroyed in the
529 // destructor, so it should always be valid.
530 DCHECK(print_job_manager_.get());
531 return print_job_manager_.get();
532}
533
[email protected]dbeebd52010-11-16 20:34:16534printing::PrintPreviewTabController*
535 BrowserProcessImpl::print_preview_tab_controller() {
536 DCHECK(CalledOnValidThread());
537 if (!print_preview_tab_controller_.get())
538 CreatePrintPreviewTabController();
539 return print_preview_tab_controller_.get();
540}
541
[email protected]68f88b992011-05-07 02:01:39542printing::BackgroundPrintingManager*
543 BrowserProcessImpl::background_printing_manager() {
544 DCHECK(CalledOnValidThread());
545 if (!background_printing_manager_.get())
546 CreateBackgroundPrintingManager();
547 return background_printing_manager_.get();
548}
549
[email protected]e13ad79b2010-07-22 21:36:50550GoogleURLTracker* BrowserProcessImpl::google_url_tracker() {
551 DCHECK(CalledOnValidThread());
552 if (!google_url_tracker_.get())
553 CreateGoogleURLTracker();
554 return google_url_tracker_.get();
555}
556
557IntranetRedirectDetector* BrowserProcessImpl::intranet_redirect_detector() {
558 DCHECK(CalledOnValidThread());
559 if (!intranet_redirect_detector_.get())
560 CreateIntranetRedirectDetector();
561 return intranet_redirect_detector_.get();
562}
563
564const std::string& BrowserProcessImpl::GetApplicationLocale() {
565 DCHECK(!locale_.empty());
566 return locale_;
567}
568
569void BrowserProcessImpl::SetApplicationLocale(const std::string& locale) {
570 locale_ = locale;
571 extension_l10n_util::SetProcessLocale(locale);
572}
573
[email protected]073ed7b2010-09-27 09:20:02574DownloadStatusUpdater* BrowserProcessImpl::download_status_updater() {
575 return &download_status_updater_;
576}
577
[email protected]e13ad79b2010-07-22 21:36:50578TabCloseableStateWatcher* BrowserProcessImpl::tab_closeable_state_watcher() {
579 DCHECK(CalledOnValidThread());
580 if (!tab_closeable_state_watcher_.get())
581 CreateTabCloseableStateWatcher();
582 return tab_closeable_state_watcher_.get();
583}
584
[email protected]9e7f015f2011-05-28 00:24:25585BackgroundModeManager* BrowserProcessImpl::background_mode_manager() {
586 DCHECK(CalledOnValidThread());
587 if (!background_mode_manager_.get())
588 CreateBackgroundModeManager();
589 return background_mode_manager_.get();
590}
591
592StatusTray* BrowserProcessImpl::status_tray() {
593 DCHECK(CalledOnValidThread());
594 if (!status_tray_.get())
595 CreateStatusTray();
596 return status_tray_.get();
597}
598
[email protected]462a0ff2011-06-02 17:15:34599
600SafeBrowsingService* BrowserProcessImpl::safe_browsing_service() {
601 DCHECK(CalledOnValidThread());
602 if (!created_safe_browsing_service_)
603 CreateSafeBrowsingService();
604 return safe_browsing_service_.get();
605}
606
[email protected]a7a5e992010-12-09 23:39:51607safe_browsing::ClientSideDetectionService*
608 BrowserProcessImpl::safe_browsing_detection_service() {
609 DCHECK(CalledOnValidThread());
[email protected]462a0ff2011-06-02 17:15:34610 if (!created_safe_browsing_detection_service_)
[email protected]a7a5e992010-12-09 23:39:51611 CreateSafeBrowsingDetectionService();
[email protected]a7a5e992010-12-09 23:39:51612 return safe_browsing_detection_service_.get();
613}
614
[email protected]8b08a47f2011-02-25 12:36:37615bool BrowserProcessImpl::plugin_finder_disabled() const {
616 return *plugin_finder_disabled_pref_;
617}
618
[email protected]432115822011-07-10 15:52:27619void BrowserProcessImpl::Observe(int type,
[email protected]6618d1d2010-12-15 21:18:47620 const NotificationSource& source,
621 const NotificationDetails& details) {
[email protected]432115822011-07-10 15:52:27622 if (type == chrome::NOTIFICATION_PREF_CHANGED) {
[email protected]e450fa62011-02-01 12:52:56623 std::string* pref = Details<std::string>(details).ptr();
624 if (*pref == prefs::kDefaultBrowserSettingEnabled) {
625 if (local_state_->GetBoolean(prefs::kDefaultBrowserSettingEnabled))
626 ShellIntegration::SetAsDefaultBrowser();
[email protected]419a0572011-04-18 22:21:46627 } else if (*pref == prefs::kDisabledSchemes) {
628 ApplyDisabledSchemesPolicy();
[email protected]40850a52011-05-26 22:07:35629 } else if (*pref == prefs::kAllowCrossOriginAuthPrompt) {
630 ApplyAllowCrossOriginAuthPromptPolicy();
[email protected]e450fa62011-02-01 12:52:56631 }
[email protected]6618d1d2010-12-15 21:18:47632 } else {
633 NOTREACHED();
634 }
635}
636
[email protected]e13ad79b2010-07-22 21:36:50637#if (defined(OS_WIN) || defined(OS_LINUX)) && !defined(OS_CHROMEOS)
638void BrowserProcessImpl::StartAutoupdateTimer() {
639 autoupdate_timer_.Start(
640 base::TimeDelta::FromHours(kUpdateCheckIntervalHours),
641 this,
642 &BrowserProcessImpl::OnAutoupdateTimer);
643}
644#endif
645
[email protected]d6f37fc2011-02-13 23:58:41646ChromeNetLog* BrowserProcessImpl::net_log() {
647 return net_log_.get();
648}
649
[email protected]1459fb62011-05-25 19:03:27650prerender::PrerenderTracker* BrowserProcessImpl::prerender_tracker() {
651 if (!prerender_tracker_.get())
652 prerender_tracker_.reset(new prerender::PrerenderTracker);
653
654 return prerender_tracker_.get();
655}
656
[email protected]e7f009d2011-06-14 19:35:10657MHTMLGenerationManager* BrowserProcessImpl::mhtml_generation_manager() {
658 if (!mhtml_generation_manager_.get())
659 mhtml_generation_manager_ = new MHTMLGenerationManager();
660
661 return mhtml_generation_manager_.get();
662}
663
[email protected]87522db92011-07-28 23:44:14664GpuBlacklistUpdater* BrowserProcessImpl::gpu_blacklist_updater() {
665 if (!gpu_blacklist_updater_.get())
666 gpu_blacklist_updater_ = new GpuBlacklistUpdater();
667
668 return gpu_blacklist_updater_.get();
669}
670
initial.commit09911bf2008-07-26 23:55:29671void BrowserProcessImpl::CreateResourceDispatcherHost() {
672 DCHECK(!created_resource_dispatcher_host_ &&
673 resource_dispatcher_host_.get() == NULL);
674 created_resource_dispatcher_host_ = true;
675
[email protected]214538842011-04-01 18:47:24676 // UserScriptListener will delete itself.
677 ResourceQueue::DelegateSet resource_queue_delegates;
678 resource_queue_delegates.insert(new UserScriptListener());
679
680 resource_dispatcher_host_.reset(
681 new ResourceDispatcherHost(resource_queue_delegates));
initial.commit09911bf2008-07-26 23:55:29682 resource_dispatcher_host_->Initialize();
[email protected]1459fb62011-05-25 19:03:27683
[email protected]8bcdf072011-06-03 16:52:15684 resource_dispatcher_host_delegate_.reset(
685 new ChromeResourceDispatcherHostDelegate(resource_dispatcher_host_.get(),
[email protected]92e0a612011-05-30 21:37:00686 prerender_tracker()));
[email protected]8bcdf072011-06-03 16:52:15687 resource_dispatcher_host_->set_delegate(
688 resource_dispatcher_host_delegate_.get());
[email protected]40850a52011-05-26 22:07:35689
690 pref_change_registrar_.Add(prefs::kAllowCrossOriginAuthPrompt, this);
691 ApplyAllowCrossOriginAuthPromptPolicy();
initial.commit09911bf2008-07-26 23:55:29692}
693
694void BrowserProcessImpl::CreateMetricsService() {
695 DCHECK(!created_metrics_service_ && metrics_service_.get() == NULL);
696 created_metrics_service_ = true;
697
698 metrics_service_.reset(new MetricsService);
699}
700
701void BrowserProcessImpl::CreateIOThread() {
702 DCHECK(!created_io_thread_ && io_thread_.get() == NULL);
703 created_io_thread_ = true;
704
705 // Prior to starting the io thread, we create the plugin service as
706 // it is predominantly used from the io thread, but must be created
707 // on the main thread. The service ctor is inexpensive and does not
708 // invoke the io_thread() accessor.
709 PluginService::GetInstance();
710
[email protected]de23f3f2011-05-18 16:20:23711 // Add the Chrome specific plugins.
712 chrome::RegisterInternalDefaultPlugin();
713
714 // Register the internal Flash if available.
715 FilePath path;
716 if (!CommandLine::ForCurrentProcess()->HasSwitch(
717 switches::kDisableInternalFlash) &&
718 PathService::Get(chrome::FILE_FLASH_PLUGIN, &path)) {
719 webkit::npapi::PluginList::Singleton()->AddExtraPluginPath(path);
720 }
721
[email protected]f1933792011-06-14 00:49:34722#if defined(OS_POSIX)
723 // Also find plugins in a user-specific plugins dir,
724 // e.g. ~/.config/chromium/Plugins.
725 FilePath user_data_dir;
726 if (PathService::Get(chrome::DIR_USER_DATA, &user_data_dir)) {
727 webkit::npapi::PluginList::Singleton()->AddExtraPluginDir(
728 user_data_dir.Append("Plugins"));
729 }
730#endif
731
[email protected]3ce02412011-03-01 12:01:15732 scoped_ptr<IOThread> thread(new IOThread(
733 local_state(), net_log_.get(), extension_event_router_forwarder_.get()));
[email protected]ab820df2008-08-26 05:55:10734 base::Thread::Options options;
735 options.message_loop_type = MessageLoop::TYPE_IO;
736 if (!thread->StartWithOptions(options))
initial.commit09911bf2008-07-26 23:55:29737 return;
738 io_thread_.swap(thread);
739}
740
741void BrowserProcessImpl::CreateFileThread() {
742 DCHECK(!created_file_thread_ && file_thread_.get() == NULL);
743 created_file_thread_ = true;
744
[email protected]ab820df2008-08-26 05:55:10745 scoped_ptr<base::Thread> thread(
[email protected]d04e7662010-10-10 22:24:48746 new BrowserProcessSubThread(BrowserThread::FILE));
[email protected]a1db3842008-09-17 22:04:06747 base::Thread::Options options;
[email protected]9e549b582009-02-05 21:13:39748#if defined(OS_WIN)
749 // On Windows, the FILE thread needs to be have a UI message loop which pumps
750 // messages in such a way that Google Update can communicate back to us.
[email protected]a1db3842008-09-17 22:04:06751 options.message_loop_type = MessageLoop::TYPE_UI;
[email protected]9e549b582009-02-05 21:13:39752#else
753 options.message_loop_type = MessageLoop::TYPE_IO;
754#endif
[email protected]a1db3842008-09-17 22:04:06755 if (!thread->StartWithOptions(options))
initial.commit09911bf2008-07-26 23:55:29756 return;
757 file_thread_.swap(thread);
758}
759
[email protected]2d14b3732011-05-10 16:48:44760#if defined(OS_CHROMEOS)
761void BrowserProcessImpl::CreateWebSocketProxyThread() {
762 DCHECK(!created_web_socket_proxy_thread_);
763 DCHECK(web_socket_proxy_thread_.get() == NULL);
764 created_web_socket_proxy_thread_ = true;
765
766 scoped_ptr<base::Thread> thread(
767 new BrowserProcessSubThread(BrowserThread::WEB_SOCKET_PROXY));
768 base::Thread::Options options;
769 options.message_loop_type = MessageLoop::TYPE_IO;
770 if (!thread->StartWithOptions(options))
771 return;
772 web_socket_proxy_thread_.swap(thread);
773}
774#endif
775
initial.commit09911bf2008-07-26 23:55:29776void BrowserProcessImpl::CreateDBThread() {
777 DCHECK(!created_db_thread_ && db_thread_.get() == NULL);
778 created_db_thread_ = true;
779
[email protected]ab820df2008-08-26 05:55:10780 scoped_ptr<base::Thread> thread(
[email protected]d04e7662010-10-10 22:24:48781 new BrowserProcessSubThread(BrowserThread::DB));
initial.commit09911bf2008-07-26 23:55:29782 if (!thread->Start())
783 return;
784 db_thread_.swap(thread);
785}
786
[email protected]914511712009-11-23 19:42:33787void BrowserProcessImpl::CreateProcessLauncherThread() {
788 DCHECK(!created_process_launcher_thread_ && !process_launcher_thread_.get());
789 created_process_launcher_thread_ = true;
790
791 scoped_ptr<base::Thread> thread(
[email protected]d04e7662010-10-10 22:24:48792 new BrowserProcessSubThread(BrowserThread::PROCESS_LAUNCHER));
[email protected]914511712009-11-23 19:42:33793 if (!thread->Start())
794 return;
795 process_launcher_thread_.swap(thread);
796}
797
[email protected]875ee822010-05-18 20:58:01798void BrowserProcessImpl::CreateCacheThread() {
799 DCHECK(!created_cache_thread_ && !cache_thread_.get());
800 created_cache_thread_ = true;
801
802 scoped_ptr<base::Thread> thread(
[email protected]75096332010-11-09 03:28:13803 new BrowserThread(BrowserThread::CACHE));
[email protected]875ee822010-05-18 20:58:01804 base::Thread::Options options;
805 options.message_loop_type = MessageLoop::TYPE_IO;
806 if (!thread->StartWithOptions(options))
807 return;
808 cache_thread_.swap(thread);
809}
810
[email protected]0b565182011-03-02 18:11:15811void BrowserProcessImpl::CreateWatchdogThread() {
812 DCHECK(!created_watchdog_thread_ && watchdog_thread_.get() == NULL);
813 created_watchdog_thread_ = true;
814
815 scoped_ptr<WatchDogThread> thread(new WatchDogThread());
816 if (!thread->Start())
817 return;
818 watchdog_thread_.swap(thread);
819}
820
initial.commit09911bf2008-07-26 23:55:29821void BrowserProcessImpl::CreateProfileManager() {
822 DCHECK(!created_profile_manager_ && profile_manager_.get() == NULL);
823 created_profile_manager_ = true;
824
825 profile_manager_.reset(new ProfileManager());
826}
827
828void BrowserProcessImpl::CreateLocalState() {
829 DCHECK(!created_local_state_ && local_state_.get() == NULL);
830 created_local_state_ = true;
831
[email protected]b9636002009-03-04 00:05:25832 FilePath local_state_path;
initial.commit09911bf2008-07-26 23:55:29833 PathService::Get(chrome::FILE_LOCAL_STATE, &local_state_path);
[email protected]f2d1f612010-12-09 15:10:17834 local_state_.reset(
[email protected]fcf53572011-06-29 15:44:37835 PrefService::CreatePrefService(local_state_path, NULL, false));
[email protected]492d2142010-09-10 13:55:18836
[email protected]caf63aea2011-04-26 11:04:10837 // Initialize the prefs of the local state.
838 browser::RegisterLocalState(local_state_.get());
839
[email protected]2a7e7c152010-10-01 20:12:09840 pref_change_registrar_.Init(local_state_.get());
841
[email protected]f16b9662011-04-27 10:06:07842 print_job_manager_->InitOnUIThread(local_state_.get());
[email protected]e450fa62011-02-01 12:52:56843
844 // Initialize the notification for the default browser setting policy.
845 local_state_->RegisterBooleanPref(prefs::kDefaultBrowserSettingEnabled,
846 false);
847 if (local_state_->IsManagedPreference(prefs::kDefaultBrowserSettingEnabled)) {
848 if (local_state_->GetBoolean(prefs::kDefaultBrowserSettingEnabled))
849 ShellIntegration::SetAsDefaultBrowser();
850 }
851 pref_change_registrar_.Add(prefs::kDefaultBrowserSettingEnabled, this);
[email protected]8b08a47f2011-02-25 12:36:37852
853 // Initialize the preference for the plugin finder policy.
854 // This preference is only needed on the IO thread so make it available there.
855 local_state_->RegisterBooleanPref(prefs::kDisablePluginFinder, false);
856 plugin_finder_disabled_pref_.Init(prefs::kDisablePluginFinder,
857 local_state_.get(), NULL);
858 plugin_finder_disabled_pref_.MoveToThread(BrowserThread::IO);
[email protected]419a0572011-04-18 22:21:46859
[email protected]1f8110b2011-05-24 14:48:30860 // Initialize the disk cache location policy. This policy is not hot update-
861 // able so we need to have it when initializing the profiles.
862 local_state_->RegisterFilePathPref(prefs::kDiskCacheDir, FilePath());
863
[email protected]12c84e22011-07-11 09:35:45864 // Another policy that needs to be defined before the net subsystem is
865 // initialized is MaxConnectionsPerProxy so we do it here.
866 local_state_->RegisterIntegerPref(prefs::kMaxConnectionsPerProxy,
867 net::kDefaultMaxSocketsPerProxyServer);
868 int max_per_proxy = local_state_->GetInteger(prefs::kMaxConnectionsPerProxy);
869 net::ClientSocketPoolManager::set_max_sockets_per_proxy_server(
870 std::max(std::min(max_per_proxy, 99),
871 net::ClientSocketPoolManager::max_sockets_per_group()));
872
[email protected]b99c41c2011-04-27 15:18:48873 // This is observed by ChildProcessSecurityPolicy, which lives in content/
874 // though, so it can't register itself.
[email protected]419a0572011-04-18 22:21:46875 local_state_->RegisterListPref(prefs::kDisabledSchemes);
[email protected]b99c41c2011-04-27 15:18:48876 pref_change_registrar_.Add(prefs::kDisabledSchemes, this);
[email protected]419a0572011-04-18 22:21:46877 ApplyDisabledSchemesPolicy();
[email protected]fd6159a2010-09-03 09:38:39878}
initial.commit09911bf2008-07-26 23:55:29879
initial.commit09911bf2008-07-26 23:55:29880void BrowserProcessImpl::CreateIconManager() {
881 DCHECK(!created_icon_manager_ && icon_manager_.get() == NULL);
882 created_icon_manager_ = true;
883 icon_manager_.reset(new IconManager);
884}
885
[email protected]40ecc902009-03-16 13:42:47886void BrowserProcessImpl::CreateDevToolsManager() {
[email protected]73ee01522009-06-05 10:13:44887 DCHECK(devtools_manager_.get() == NULL);
[email protected]40ecc902009-03-16 13:42:47888 created_devtools_manager_ = true;
[email protected]73ee01522009-06-05 10:13:44889 devtools_manager_ = new DevToolsManager();
[email protected]40ecc902009-03-16 13:42:47890}
891
[email protected]8b8e7c92010-08-19 18:05:56892void BrowserProcessImpl::CreateSidebarManager() {
893 DCHECK(sidebar_manager_.get() == NULL);
894 created_sidebar_manager_ = true;
895 sidebar_manager_ = new SidebarManager();
896}
897
initial.commit09911bf2008-07-26 23:55:29898void BrowserProcessImpl::CreateGoogleURLTracker() {
899 DCHECK(google_url_tracker_.get() == NULL);
900 scoped_ptr<GoogleURLTracker> google_url_tracker(new GoogleURLTracker);
901 google_url_tracker_.swap(google_url_tracker);
902}
[email protected]6641bf662009-08-21 00:34:09903
[email protected]c4ff4952010-01-08 19:12:47904void BrowserProcessImpl::CreateIntranetRedirectDetector() {
905 DCHECK(intranet_redirect_detector_.get() == NULL);
906 scoped_ptr<IntranetRedirectDetector> intranet_redirect_detector(
907 new IntranetRedirectDetector);
908 intranet_redirect_detector_.swap(intranet_redirect_detector);
909}
910
[email protected]29672ab2009-10-30 03:44:03911void BrowserProcessImpl::CreateNotificationUIManager() {
912 DCHECK(notification_ui_manager_.get() == NULL);
[email protected]b0b2a3dd2011-01-06 00:30:05913 notification_ui_manager_.reset(NotificationUIManager::Create(local_state()));
914
[email protected]29672ab2009-10-30 03:44:03915 created_notification_ui_manager_ = true;
916}
917
[email protected]0b4d3382010-07-14 16:13:04918void BrowserProcessImpl::CreateTabCloseableStateWatcher() {
919 DCHECK(tab_closeable_state_watcher_.get() == NULL);
920 tab_closeable_state_watcher_.reset(TabCloseableStateWatcher::Create());
921}
922
[email protected]9e7f015f2011-05-28 00:24:25923void BrowserProcessImpl::CreateBackgroundModeManager() {
924 DCHECK(background_mode_manager_.get() == NULL);
925 background_mode_manager_.reset(
926 new BackgroundModeManager(CommandLine::ForCurrentProcess()));
927}
928
929void BrowserProcessImpl::CreateStatusTray() {
930 DCHECK(status_tray_.get() == NULL);
931 status_tray_.reset(StatusTray::Create());
932}
933
[email protected]dbeebd52010-11-16 20:34:16934void BrowserProcessImpl::CreatePrintPreviewTabController() {
935 DCHECK(print_preview_tab_controller_.get() == NULL);
936 print_preview_tab_controller_ = new printing::PrintPreviewTabController();
937}
938
[email protected]68f88b992011-05-07 02:01:39939void BrowserProcessImpl::CreateBackgroundPrintingManager() {
940 DCHECK(background_printing_manager_.get() == NULL);
941 background_printing_manager_.reset(new printing::BackgroundPrintingManager());
942}
943
[email protected]462a0ff2011-06-02 17:15:34944void BrowserProcessImpl::CreateSafeBrowsingService() {
945 DCHECK(safe_browsing_service_.get() == NULL);
[email protected]8c40da62011-07-13 22:58:46946 // Set this flag to true so that we don't retry indefinitely to
947 // create the service class if there was an error.
[email protected]462a0ff2011-06-02 17:15:34948 created_safe_browsing_service_ = true;
[email protected]4b58e7d2011-07-11 10:22:56949#if defined(ENABLE_SAFE_BROWSING)
[email protected]462a0ff2011-06-02 17:15:34950 safe_browsing_service_ = SafeBrowsingService::CreateSafeBrowsingService();
951 safe_browsing_service_->Initialize();
[email protected]4b58e7d2011-07-11 10:22:56952#endif
[email protected]462a0ff2011-06-02 17:15:34953}
954
[email protected]a7a5e992010-12-09 23:39:51955void BrowserProcessImpl::CreateSafeBrowsingDetectionService() {
956 DCHECK(safe_browsing_detection_service_.get() == NULL);
957 // Set this flag to true so that we don't retry indefinitely to
958 // create the service class if there was an error.
959 created_safe_browsing_detection_service_ = true;
960
[email protected]4b58e7d2011-07-11 10:22:56961#if defined(ENABLE_SAFE_BROWSING)
[email protected]1eb19a32011-07-28 22:22:54962 if (IsSafeBrowsingDetectionServiceEnabled()) {
[email protected]a7a5e992010-12-09 23:39:51963 safe_browsing_detection_service_.reset(
964 safe_browsing::ClientSideDetectionService::Create(
[email protected]1eb19a32011-07-28 22:22:54965 g_browser_process->system_request_context()));
[email protected]a7a5e992010-12-09 23:39:51966 }
[email protected]4b58e7d2011-07-11 10:22:56967#endif
[email protected]a7a5e992010-12-09 23:39:51968}
969
970bool BrowserProcessImpl::IsSafeBrowsingDetectionServiceEnabled() {
971 // The safe browsing client-side detection is enabled only if the switch is
[email protected]436ebd62011-06-09 22:08:11972 // not disabled and when safe browsing related stats are allowed to be
973 // collected.
[email protected]4b58e7d2011-07-11 10:22:56974#if defined(ENABLE_SAFE_BROWSING) && !defined(OS_CHROMEOS)
[email protected]d081d192011-04-01 02:33:24975 return !CommandLine::ForCurrentProcess()->HasSwitch(
976 switches::kDisableClientSidePhishingDetection) &&
[email protected]462a0ff2011-06-02 17:15:34977 safe_browsing_service() &&
[email protected]436ebd62011-06-09 22:08:11978 safe_browsing_service()->CanReportStats();
[email protected]4b58e7d2011-07-11 10:22:56979#else
980 return false;
[email protected]d081d192011-04-01 02:33:24981#endif
[email protected]a7a5e992010-12-09 23:39:51982}
983
[email protected]419a0572011-04-18 22:21:46984void BrowserProcessImpl::ApplyDisabledSchemesPolicy() {
985 std::set<std::string> schemes;
[email protected]b99c41c2011-04-27 15:18:48986 const ListValue* scheme_list = local_state_->GetList(prefs::kDisabledSchemes);
987 for (ListValue::const_iterator iter = scheme_list->begin();
988 iter != scheme_list->end(); ++iter) {
[email protected]419a0572011-04-18 22:21:46989 std::string scheme;
990 if ((*iter)->GetAsString(&scheme))
991 schemes.insert(scheme);
992 }
993 ChildProcessSecurityPolicy::GetInstance()->RegisterDisabledSchemes(schemes);
994}
995
[email protected]40850a52011-05-26 22:07:35996void BrowserProcessImpl::ApplyAllowCrossOriginAuthPromptPolicy() {
997 bool value = local_state()->GetBoolean(prefs::kAllowCrossOriginAuthPrompt);
998 resource_dispatcher_host()->set_allow_cross_origin_auth_prompt(value);
999}
1000
[email protected]6641bf662009-08-21 00:34:091001// The BrowserProcess object must outlive the file thread so we use traits
1002// which don't do any management.
[email protected]c56428f22010-06-16 02:17:231003DISABLE_RUNNABLE_METHOD_REFCOUNT(BrowserProcessImpl);
[email protected]6641bf662009-08-21 00:34:091004
[email protected]d55aaa132009-09-28 21:08:041005#if defined(IPC_MESSAGE_LOG_ENABLED)
1006
1007void BrowserProcessImpl::SetIPCLoggingEnabled(bool enable) {
1008 // First enable myself.
1009 if (enable)
[email protected]8e8bb6d2010-12-13 08:18:551010 IPC::Logging::GetInstance()->Enable();
[email protected]d55aaa132009-09-28 21:08:041011 else
[email protected]8e8bb6d2010-12-13 08:18:551012 IPC::Logging::GetInstance()->Disable();
[email protected]d55aaa132009-09-28 21:08:041013
1014 // Now tell subprocesses. Messages to ChildProcess-derived
1015 // processes must be done on the IO thread.
1016 io_thread()->message_loop()->PostTask
1017 (FROM_HERE,
1018 NewRunnableMethod(
1019 this,
1020 &BrowserProcessImpl::SetIPCLoggingEnabledForChildProcesses,
1021 enable));
1022
1023 // Finally, tell the renderers which don't derive from ChildProcess.
1024 // Messages to the renderers must be done on the UI (main) thread.
[email protected]019191a2009-10-02 20:37:271025 for (RenderProcessHost::iterator i(RenderProcessHost::AllHostsIterator());
1026 !i.IsAtEnd(); i.Advance())
[email protected]ff47b2962011-03-07 23:51:491027 i.GetCurrentValue()->Send(new ChildProcessMsg_SetIPCLoggingEnabled(enable));
[email protected]d55aaa132009-09-28 21:08:041028}
1029
1030// Helper for SetIPCLoggingEnabled.
1031void BrowserProcessImpl::SetIPCLoggingEnabledForChildProcesses(bool enabled) {
[email protected]d04e7662010-10-10 22:24:481032 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO));
[email protected]d55aaa132009-09-28 21:08:041033
[email protected]d27893f62010-07-03 05:47:421034 BrowserChildProcessHost::Iterator i; // default constr references a singleton
[email protected]34cf97d2009-09-29 22:46:111035 while (!i.Done()) {
[email protected]ff47b2962011-03-07 23:51:491036 i->Send(new ChildProcessMsg_SetIPCLoggingEnabled(enabled));
[email protected]34cf97d2009-09-29 22:46:111037 ++i;
[email protected]d55aaa132009-09-28 21:08:041038 }
1039}
1040
1041#endif // IPC_MESSAGE_LOG_ENABLED
1042
[email protected]3cdacd42010-04-30 18:55:531043// Mac is currently not supported.
1044#if (defined(OS_WIN) || defined(OS_LINUX)) && !defined(OS_CHROMEOS)
[email protected]bd48c2b02010-04-09 20:32:421045
1046bool BrowserProcessImpl::CanAutorestartForUpdate() const {
1047 // Check if browser is in the background and if it needs to be restarted to
1048 // apply a pending update.
[email protected]c10fa3952010-08-24 16:52:531049 return BrowserList::size() == 0 && BrowserList::WillKeepAlive() &&
[email protected]815856722011-04-13 17:19:191050 upgrade_util::IsUpdatePendingRestart();
[email protected]bd48c2b02010-04-09 20:32:421051}
1052
[email protected]5c08f222010-09-22 09:37:211053// Switches to add when auto-restarting Chrome.
[email protected]6c10c972010-08-11 04:15:471054const char* const kSwitchesToAddOnAutorestart[] = {
[email protected]f9a06842010-08-21 00:32:401055 switches::kNoStartupWindow
[email protected]bd48c2b02010-04-09 20:32:421056};
1057
1058void BrowserProcessImpl::RestartPersistentInstance() {
1059 CommandLine* old_cl = CommandLine::ForCurrentProcess();
[email protected]3cdacd42010-04-30 18:55:531060 scoped_ptr<CommandLine> new_cl(new CommandLine(old_cl->GetProgram()));
[email protected]bd48c2b02010-04-09 20:32:421061
1062 std::map<std::string, CommandLine::StringType> switches =
1063 old_cl->GetSwitches();
1064
[email protected]5c08f222010-09-22 09:37:211065 switches::RemoveSwitchesForAutostart(&switches);
[email protected]bd48c2b02010-04-09 20:32:421066
1067 // Append the rest of the switches (along with their values, if any)
1068 // to the new command line
1069 for (std::map<std::string, CommandLine::StringType>::const_iterator i =
1070 switches.begin(); i != switches.end(); ++i) {
1071 CommandLine::StringType switch_value = i->second;
1072 if (switch_value.length() > 0) {
[email protected]05076ba22010-07-30 05:59:571073 new_cl->AppendSwitchNative(i->first, i->second);
[email protected]bd48c2b02010-04-09 20:32:421074 } else {
[email protected]3cdacd42010-04-30 18:55:531075 new_cl->AppendSwitch(i->first);
[email protected]bd48c2b02010-04-09 20:32:421076 }
1077 }
1078
[email protected]6c10c972010-08-11 04:15:471079 // Ensure that our desired switches are set on the new process.
[email protected]5c08f222010-09-22 09:37:211080 for (size_t i = 0; i < arraysize(kSwitchesToAddOnAutorestart); ++i) {
[email protected]6c10c972010-08-11 04:15:471081 if (!new_cl->HasSwitch(kSwitchesToAddOnAutorestart[i]))
1082 new_cl->AppendSwitch(kSwitchesToAddOnAutorestart[i]);
1083 }
[email protected]bd48c2b02010-04-09 20:32:421084
[email protected]3cdacd42010-04-30 18:55:531085 DLOG(WARNING) << "Shutting down current instance of the browser.";
[email protected]bc63a072011-06-28 21:12:571086 BrowserList::AttemptExit();
[email protected]3cdacd42010-04-30 18:55:531087
1088 // Transfer ownership to Upgrade.
[email protected]815856722011-04-13 17:19:191089 upgrade_util::SetNewCommandLine(new_cl.release());
[email protected]bd48c2b02010-04-09 20:32:421090}
1091
1092void BrowserProcessImpl::OnAutoupdateTimer() {
1093 if (CanAutorestartForUpdate()) {
[email protected]3cdacd42010-04-30 18:55:531094 DLOG(WARNING) << "Detected update. Restarting browser.";
[email protected]bd48c2b02010-04-09 20:32:421095 RestartPersistentInstance();
1096 }
1097}
1098
[email protected]3cdacd42010-04-30 18:55:531099#endif // (defined(OS_WIN) || defined(OS_LINUX)) && !defined(OS_CHROMEOS)