blob: d3ae1091c8d4fba486b818b43d6a47b117d1b830 [file] [log] [blame]
[email protected]f2a893c2011-01-05 09:38:071// Copyright (c) 2011 The Chromium Authors. All rights reserved.
license.botbf09a502008-08-24 00:55:552// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
initial.commit09911bf2008-07-26 23:55:294
5#include "chrome/browser/browser_process_impl.h"
6
[email protected]3cdacd42010-04-30 18:55:537#include <map>
[email protected]68f88b992011-05-07 02:01:398#include <set>
9#include <vector>
[email protected]3cdacd42010-04-30 18:55:5310
initial.commit09911bf2008-07-26 23:55:2911#include "base/command_line.h"
[email protected]6641bf662009-08-21 00:34:0912#include "base/file_util.h"
initial.commit09911bf2008-07-26 23:55:2913#include "base/path_service.h"
[email protected]985655a2011-02-23 09:54:2514#include "base/synchronization/waitable_event.h"
[email protected]c6032e82010-09-13 20:06:0515#include "base/task.h"
[email protected]34b99632011-01-01 01:01:0616#include "base/threading/thread.h"
17#include "base/threading/thread_restrictions.h"
[email protected]e13ad79b2010-07-22 21:36:5018#include "chrome/browser/automation/automation_provider_list.h"
[email protected]a07676b22011-06-17 16:36:5319#include "chrome/browser/background/background_mode_manager.h"
[email protected]b443cb042009-12-15 22:05:0920#include "chrome/browser/browser_main.h"
[email protected]0ac83682010-01-22 17:46:2721#include "chrome/browser/browser_process_sub_thread.h"
[email protected]ac262c9f2008-10-19 17:45:2122#include "chrome/browser/browser_trial.h"
[email protected]c1adf5a2011-08-03 22:11:3723#include "chrome/browser/component_updater/component_updater_configurator.h"
24#include "chrome/browser/component_updater/component_updater_service.h"
[email protected]0639cfd2011-07-20 11:38:0325#include "chrome/browser/debugger/devtools_protocol_handler.h"
[email protected]4475d232011-07-27 15:29:2026#include "chrome/browser/debugger/remote_debugging_server.h"
[email protected]6c69796d2010-07-16 21:41:1627#include "chrome/browser/download/download_file_manager.h"
[email protected]3ce02412011-03-01 12:01:1528#include "chrome/browser/extensions/extension_event_router_forwarder.h"
[email protected]fc4facd2011-03-22 23:18:5029#include "chrome/browser/extensions/extension_tab_id_map.h"
[email protected]214538842011-04-01 18:47:2430#include "chrome/browser/extensions/user_script_listener.h"
[email protected]815856722011-04-13 17:19:1931#include "chrome/browser/first_run/upgrade_util.h"
[email protected]f7578f52010-08-30 22:22:4932#include "chrome/browser/google/google_url_tracker.h"
[email protected]dcefa302009-05-20 00:24:3933#include "chrome/browser/icon_manager.h"
[email protected]c4ff4952010-01-08 19:12:4734#include "chrome/browser/intranet_redirect_detector.h"
[email protected]0ac83682010-01-22 17:46:2735#include "chrome/browser/io_thread.h"
[email protected]dc6f4962009-02-13 01:25:5036#include "chrome/browser/metrics/metrics_service.h"
[email protected]0b565182011-03-02 18:11:1537#include "chrome/browser/metrics/thread_watcher.h"
[email protected]b2fcd0e2010-12-01 15:19:4038#include "chrome/browser/net/chrome_net_log.h"
[email protected]3530cd92010-06-27 06:22:0139#include "chrome/browser/net/predictor_api.h"
[email protected]d393a0fd2009-05-13 23:32:0140#include "chrome/browser/net/sdch_dictionary_fetcher.h"
[email protected]29672ab2009-10-30 03:44:0341#include "chrome/browser/notifications/notification_ui_manager.h"
[email protected]985655a2011-02-23 09:54:2542#include "chrome/browser/policy/browser_policy_connector.h"
[email protected]caf63aea2011-04-26 11:04:1043#include "chrome/browser/prefs/browser_prefs.h"
[email protected]37858e52010-08-26 00:22:0244#include "chrome/browser/prefs/pref_service.h"
[email protected]1459fb62011-05-25 19:03:2745#include "chrome/browser/prerender/prerender_tracker.h"
[email protected]68f88b992011-05-07 02:01:3946#include "chrome/browser/printing/background_printing_manager.h"
[email protected]e06131d2010-02-10 18:40:3347#include "chrome/browser/printing/print_job_manager.h"
[email protected]dbeebd52010-11-16 20:34:1648#include "chrome/browser/printing/print_preview_tab_controller.h"
[email protected]8ecad5e2010-12-02 21:18:3349#include "chrome/browser/profiles/profile_manager.h"
[email protected]8bcdf072011-06-03 16:52:1550#include "chrome/browser/renderer_host/chrome_resource_dispatcher_host_delegate.h"
[email protected]a7a5e992010-12-09 23:39:5151#include "chrome/browser/safe_browsing/client_side_detection_service.h"
[email protected]81218f42009-02-05 18:48:0852#include "chrome/browser/safe_browsing/safe_browsing_service.h"
[email protected]e450fa62011-02-01 12:52:5653#include "chrome/browser/shell_integration.h"
[email protected]8b8e7c92010-08-19 18:05:5654#include "chrome/browser/sidebar/sidebar_manager.h"
[email protected]9e7f015f2011-05-28 00:24:2555#include "chrome/browser/status_icons/status_tray.h"
[email protected]0b4d3382010-07-14 16:13:0456#include "chrome/browser/tab_closeable_state_watcher.h"
[email protected]71b73f02011-04-06 15:57:2957#include "chrome/browser/ui/browser_list.h"
[email protected]87522db92011-07-28 23:44:1458#include "chrome/browser/web_resource/gpu_blacklist_updater.h"
[email protected]4ef795df2010-02-03 02:35:0859#include "chrome/common/chrome_constants.h"
[email protected]432115822011-07-10 15:52:2760#include "chrome/common/chrome_notification_types.h"
initial.commit09911bf2008-07-26 23:55:2961#include "chrome/common/chrome_paths.h"
62#include "chrome/common/chrome_switches.h"
[email protected]de23f3f2011-05-18 16:20:2363#include "chrome/common/default_plugin.h"
[email protected]f1b6de22010-03-06 12:13:4764#include "chrome/common/extensions/extension_l10n_util.h"
[email protected]985655a2011-02-23 09:54:2565#include "chrome/common/extensions/extension_resource.h"
[email protected]ea587b02010-05-21 15:01:3566#include "chrome/common/json_pref_store.h"
initial.commit09911bf2008-07-26 23:55:2967#include "chrome/common/pref_names.h"
[email protected]5c08f222010-09-22 09:37:2168#include "chrome/common/switch_utils.h"
[email protected]985655a2011-02-23 09:54:2569#include "chrome/common/url_constants.h"
[email protected]bd48c2b02010-04-09 20:32:4270#include "chrome/installer/util/google_update_constants.h"
[email protected]a01efd22011-03-01 00:38:3271#include "content/browser/browser_child_process_host.h"
72#include "content/browser/browser_thread.h"
[email protected]419a0572011-04-18 22:21:4673#include "content/browser/child_process_security_policy.h"
[email protected]b46442d7e2011-06-29 02:16:0674#include "content/browser/debugger/devtools_manager.h"
[email protected]8f6a3b852011-07-19 16:48:5675#include "content/browser/download/mhtml_generation_manager.h"
[email protected]0ffaa482011-07-14 23:41:2876#include "content/browser/download/save_file_manager.h"
[email protected]d9f37932011-05-09 20:09:2477#include "content/browser/gpu/gpu_process_host_ui_shim.h"
[email protected]6eac57a2011-07-12 21:15:0978#include "content/browser/net/browser_online_state_observer.h"
[email protected]a01efd22011-03-01 00:38:3279#include "content/browser/plugin_service.h"
80#include "content/browser/renderer_host/render_process_host.h"
81#include "content/browser/renderer_host/resource_dispatcher_host.h"
[email protected]f20d7332011-03-08 21:11:5382#include "content/common/notification_service.h"
[email protected]18590f22011-07-29 16:41:2883#include "content/common/url_fetcher.h"
[email protected]d55aaa132009-09-28 21:08:0484#include "ipc/ipc_logging.h"
[email protected]12c84e22011-07-11 09:35:4585#include "net/socket/client_socket_pool_manager.h"
[email protected]abe2c032011-03-31 18:49:3486#include "net/url_request/url_request_context_getter.h"
[email protected]2dfeaf92011-01-10 21:08:2187#include "ui/base/clipboard/clipboard.h"
[email protected]c051a1b2011-01-21 23:30:1788#include "ui/base/l10n/l10n_util.h"
[email protected]de23f3f2011-05-18 16:20:2389#include "webkit/plugins/npapi/plugin_list.h"
[email protected]b112a4c2009-02-01 20:24:0190
91#if defined(OS_WIN)
[email protected]2362e4f2009-05-08 00:34:0592#include "views/focus/view_storage.h"
[email protected]86230b92009-11-23 20:38:3893#endif
94
[email protected]d55aaa132009-09-28 21:08:0495#if defined(IPC_MESSAGE_LOG_ENABLED)
[email protected]ff47b2962011-03-07 23:51:4996#include "content/common/child_process_messages.h"
[email protected]d55aaa132009-09-28 21:08:0497#endif
98
[email protected]db0e86dd2011-03-16 14:47:2199#if defined(OS_CHROMEOS)
100#include "chrome/browser/chromeos/proxy_config_service_impl.h"
[email protected]2d14b3732011-05-10 16:48:44101#include "chrome/browser/chromeos/web_socket_proxy_controller.h"
[email protected]db0e86dd2011-03-16 14:47:21102#endif // defined(OS_CHROMEOS)
103
[email protected]3cdacd42010-04-30 18:55:53104#if (defined(OS_WIN) || defined(OS_LINUX)) && !defined(OS_CHROMEOS)
105// How often to check if the persistent instance of Chrome needs to restart
106// to install an update.
107static const int kUpdateCheckIntervalHours = 6;
108#endif
109
[email protected]c6032e82010-09-13 20:06:05110#if defined(USE_X11)
111// How long to wait for the File thread to complete during EndSession, on
112// Linux. We have a timeout here because we're unable to run the UI messageloop
113// and there's some deadlock risk. Our only option is to exit anyway.
114static const int kEndSessionTimeoutSeconds = 10;
115#endif
116
[email protected]bb975362009-01-21 01:00:22117BrowserProcessImpl::BrowserProcessImpl(const CommandLine& command_line)
initial.commit09911bf2008-07-26 23:55:29118 : created_resource_dispatcher_host_(false),
119 created_metrics_service_(false),
120 created_io_thread_(false),
121 created_file_thread_(false),
122 created_db_thread_(false),
[email protected]914511712009-11-23 19:42:33123 created_process_launcher_thread_(false),
[email protected]875ee822010-05-18 20:58:01124 created_cache_thread_(false),
[email protected]0b565182011-03-02 18:11:15125 created_watchdog_thread_(false),
[email protected]2d14b3732011-05-10 16:48:44126#if defined(OS_CHROMEOS)
127 created_web_socket_proxy_thread_(false),
128#endif
initial.commit09911bf2008-07-26 23:55:29129 created_profile_manager_(false),
130 created_local_state_(false),
[email protected]b112a4c2009-02-01 20:24:01131 created_icon_manager_(false),
[email protected]40ecc902009-03-16 13:42:47132 created_devtools_manager_(false),
[email protected]8b8e7c92010-08-19 18:05:56133 created_sidebar_manager_(false),
[email protected]985655a2011-02-23 09:54:25134 created_browser_policy_connector_(false),
[email protected]29672ab2009-10-30 03:44:03135 created_notification_ui_manager_(false),
[email protected]462a0ff2011-06-02 17:15:34136 created_safe_browsing_service_(false),
[email protected]a7a5e992010-12-09 23:39:51137 created_safe_browsing_detection_service_(false),
initial.commit09911bf2008-07-26 23:55:29138 module_ref_count_(0),
[email protected]afd20c022010-06-10 00:48:20139 did_start_(false),
[email protected]1b2db1a2008-08-08 17:46:13140 checked_for_new_frames_(false),
[email protected]4747caf2011-03-23 20:09:21141 using_new_frames_(false) {
initial.commit09911bf2008-07-26 23:55:29142 g_browser_process = this;
[email protected]2dfeaf92011-01-10 21:08:21143 clipboard_.reset(new ui::Clipboard);
initial.commit09911bf2008-07-26 23:55:29144 main_notification_service_.reset(new NotificationService);
145
146 // Must be created after the NotificationService.
147 print_job_manager_.reset(new printing::PrintJobManager);
148
[email protected]b2fcd0e2010-12-01 15:19:40149 net_log_.reset(new ChromeNetLog);
[email protected]3ce02412011-03-01 12:01:15150
151 extension_event_router_forwarder_ = new ExtensionEventRouterForwarder;
[email protected]fc4facd2011-03-22 23:18:50152
153 ExtensionTabIdMap::GetInstance()->Init();
[email protected]6eac57a2011-07-12 21:15:09154
155 online_state_observer_.reset(new BrowserOnlineStateObserver);
initial.commit09911bf2008-07-26 23:55:29156}
157
158BrowserProcessImpl::~BrowserProcessImpl() {
[email protected]2d14b3732011-05-10 16:48:44159#if defined(OS_CHROMEOS)
160 if (web_socket_proxy_thread_.get())
161 chromeos::WebSocketProxyController::Shutdown();
162 web_socket_proxy_thread_.reset();
163#endif
164
initial.commit09911bf2008-07-26 23:55:29165 // Delete the AutomationProviderList before NotificationService,
166 // since it may try to unregister notifications
167 // Both NotificationService and AutomationProvider are singleton instances in
168 // the BrowserProcess. Since AutomationProvider may have some active
169 // notification observers, it is essential that it gets destroyed before the
170 // NotificationService. NotificationService won't be destroyed until after
171 // this destructor is run.
172 automation_provider_list_.reset();
173
[email protected]d393a0fd2009-05-13 23:32:01174 // We need to shutdown the SdchDictionaryFetcher as it regularly holds
175 // a pointer to a URLFetcher, and that URLFetcher (upon destruction) will do
176 // a PostDelayedTask onto the IO thread. This shutdown call will both discard
177 // any pending URLFetchers, and avoid creating any more.
178 SdchDictionaryFetcher::Shutdown();
179
[email protected]51ac040762011-01-20 02:01:04180 // We need to destroy the MetricsService, GoogleURLTracker,
181 // IntranetRedirectDetector, and SafeBrowsing ClientSideDetectionService
182 // before the io_thread_ gets destroyed, since their destructors can call the
183 // URLFetcher destructor, which does a PostDelayedTask operation on the IO
184 // thread. (The IO thread will handle that URLFetcher operation before going
185 // away.)
initial.commit09911bf2008-07-26 23:55:29186 metrics_service_.reset();
187 google_url_tracker_.reset();
[email protected]c4ff4952010-01-08 19:12:47188 intranet_redirect_detector_.reset();
[email protected]51ac040762011-01-20 02:01:04189 safe_browsing_detection_service_.reset();
initial.commit09911bf2008-07-26 23:55:29190
[email protected]d8a899c2010-09-21 04:50:33191 // Need to clear the desktop notification balloons before the io_thread_ and
192 // before the profiles, since if there are any still showing we will access
193 // those things during teardown.
194 notification_ui_manager_.reset();
195
[email protected]18590f22011-07-29 16:41:28196 // FIXME - We shouldn't need this, it's because of DefaultRequestContext! :(
197 // We need to kill off all URLFetchers using profile related
198 // URLRequestContexts. Normally that'd be covered by deleting the Profiles,
199 // but we have some URLFetchers using the DefaultRequestContext, so they need
200 // to be cancelled too. Remove this when DefaultRequestContext goes away.
201 BrowserThread::PostTask(BrowserThread::IO, FROM_HERE,
202 NewRunnableFunction(&URLFetcher::CancelAll));
203
initial.commit09911bf2008-07-26 23:55:29204 // Need to clear profiles (download managers) before the io_thread_.
205 profile_manager_.reset();
206
207 // Debugger must be cleaned up before IO thread and NotificationService.
[email protected]4475d232011-07-27 15:29:20208 remote_debugging_server_.reset();
209
[email protected]5613126e2011-01-31 15:27:55210 if (devtools_legacy_handler_.get()) {
211 devtools_legacy_handler_->Stop();
212 devtools_legacy_handler_ = NULL;
213 }
initial.commit09911bf2008-07-26 23:55:29214
[email protected]4b58e7d2011-07-11 10:22:56215#if defined(ENABLE_SAFE_BROWSING)
[email protected]462a0ff2011-06-02 17:15:34216 if (safe_browsing_service_.get())
217 safe_browsing_service()->ShutDown();
[email protected]4b58e7d2011-07-11 10:22:56218#endif
initial.commit09911bf2008-07-26 23:55:29219
[email protected]462a0ff2011-06-02 17:15:34220 if (resource_dispatcher_host_.get()) {
initial.commit09911bf2008-07-26 23:55:29221 // Cancel pending requests and prevent new requests.
222 resource_dispatcher_host()->Shutdown();
223 }
224
[email protected]fc4facd2011-03-22 23:18:50225 ExtensionTabIdMap::GetInstance()->Shutdown();
226
[email protected]985655a2011-02-23 09:54:25227 // The policy providers managed by |browser_policy_connector_| need to shut
228 // down while the IO and FILE threads are still alive.
229 browser_policy_connector_.reset();
[email protected]f2a893c2011-01-05 09:38:07230
[email protected]7a31f7c2011-03-21 23:22:04231 // Destroying the GpuProcessHostUIShims on the UI thread posts a task to
232 // delete related objects on the GPU thread. This must be done before
233 // stopping the GPU thread. The GPU thread will close IPC channels to renderer
234 // processes so this has to happen before stopping the IO thread.
235 GpuProcessHostUIShim::DestroyAll();
[email protected]7a31f7c2011-03-21 23:22:04236
[email protected]8fd11832011-07-14 20:01:13237 // Stop the watchdog thread before stopping other threads.
238 watchdog_thread_.reset();
239
initial.commit09911bf2008-07-26 23:55:29240 // Need to stop io_thread_ before resource_dispatcher_host_, since
241 // io_thread_ may still deref ResourceDispatcherHost and handle resource
242 // request before going away.
[email protected]0ac83682010-01-22 17:46:27243 io_thread_.reset();
initial.commit09911bf2008-07-26 23:55:29244
[email protected]875ee822010-05-18 20:58:01245 // The IO thread was the only user of this thread.
246 cache_thread_.reset();
247
[email protected]914511712009-11-23 19:42:33248 // Stop the process launcher thread after the IO thread, in case the IO thread
249 // posted a task to terminate a process on the process launcher thread.
250 process_launcher_thread_.reset();
251
initial.commit09911bf2008-07-26 23:55:29252 // Clean up state that lives on the file_thread_ before it goes away.
253 if (resource_dispatcher_host_.get()) {
254 resource_dispatcher_host()->download_file_manager()->Shutdown();
255 resource_dispatcher_host()->save_file_manager()->Shutdown();
256 }
257
258 // Need to stop the file_thread_ here to force it to process messages in its
259 // message loop from the previous call to shutdown the DownloadFileManager,
260 // SaveFileManager and SessionService.
261 file_thread_.reset();
262
263 // With the file_thread_ flushed, we can release any icon resources.
264 icon_manager_.reset();
265
266 // Need to destroy ResourceDispatcherHost before PluginService and
[email protected]49f28bc72010-02-04 00:10:01267 // SafeBrowsingService, since it caches a pointer to it. This also
268 // causes the webkit thread to terminate.
initial.commit09911bf2008-07-26 23:55:29269 resource_dispatcher_host_.reset();
270
271 // Wait for the pending print jobs to finish.
272 print_job_manager_->OnQuit();
273 print_job_manager_.reset();
274
[email protected]0b4d3382010-07-14 16:13:04275 // Destroy TabCloseableStateWatcher before NotificationService since the
276 // former registers for notifications.
277 tab_closeable_state_watcher_.reset();
278
initial.commit09911bf2008-07-26 23:55:29279 // Now OK to destroy NotificationService.
280 main_notification_service_.reset();
281
282 g_browser_process = NULL;
283}
284
[email protected]c6032e82010-09-13 20:06:05285#if defined(OS_WIN)
[email protected]295039bd2008-08-15 04:32:57286// Send a QuitTask to the given MessageLoop.
287static void PostQuit(MessageLoop* message_loop) {
288 message_loop->PostTask(FROM_HERE, new MessageLoop::QuitTask());
289}
[email protected]c6032e82010-09-13 20:06:05290#elif defined(USE_X11)
291static void Signal(base::WaitableEvent* event) {
292 event->Signal();
293}
294#endif
initial.commit09911bf2008-07-26 23:55:29295
[email protected]b443cb042009-12-15 22:05:09296unsigned int BrowserProcessImpl::AddRefModule() {
297 DCHECK(CalledOnValidThread());
[email protected]afd20c022010-06-10 00:48:20298 did_start_ = true;
[email protected]b443cb042009-12-15 22:05:09299 module_ref_count_++;
300 return module_ref_count_;
301}
302
303unsigned int BrowserProcessImpl::ReleaseModule() {
304 DCHECK(CalledOnValidThread());
[email protected]760d970a2010-05-18 00:39:18305 DCHECK_NE(0u, module_ref_count_);
[email protected]b443cb042009-12-15 22:05:09306 module_ref_count_--;
307 if (0 == module_ref_count_) {
[email protected]7d038c32010-12-14 00:40:00308 // Allow UI and IO threads to do blocking IO on shutdown, since we do a lot
309 // of it on shutdown for valid reasons.
310 base::ThreadRestrictions::SetIOAllowed(true);
311 io_thread()->message_loop()->PostTask(
312 FROM_HERE,
313 NewRunnableFunction(&base::ThreadRestrictions::SetIOAllowed, true));
[email protected]b443cb042009-12-15 22:05:09314 MessageLoop::current()->PostTask(
[email protected]34f73fb2010-03-24 20:50:34315 FROM_HERE, NewRunnableFunction(DidEndMainMessageLoop));
[email protected]b443cb042009-12-15 22:05:09316 MessageLoop::current()->Quit();
317 }
318 return module_ref_count_;
319}
320
initial.commit09911bf2008-07-26 23:55:29321void BrowserProcessImpl::EndSession() {
initial.commit09911bf2008-07-26 23:55:29322 // Mark all the profiles as clean.
323 ProfileManager* pm = profile_manager();
[email protected]844a1002011-04-19 11:37:21324 std::vector<Profile*> profiles(pm->GetLoadedProfiles());
325 for (size_t i = 0; i < profiles.size(); ++i)
326 profiles[i]->MarkAsCleanShutdown();
initial.commit09911bf2008-07-26 23:55:29327
328 // Tell the metrics service it was cleanly shutdown.
329 MetricsService* metrics = g_browser_process->metrics_service();
330 if (metrics && local_state()) {
initial.commit09911bf2008-07-26 23:55:29331 metrics->RecordStartOfSessionEnd();
332
333 // MetricsService lazily writes to prefs, force it to write now.
[email protected]6faa0e0d2009-04-28 06:50:36334 local_state()->SavePersistentPrefs();
initial.commit09911bf2008-07-26 23:55:29335 }
336
337 // We must write that the profile and metrics service shutdown cleanly,
338 // otherwise on startup we'll think we crashed. So we block until done and
339 // then proceed with normal shutdown.
[email protected]c6032e82010-09-13 20:06:05340#if defined(USE_X11)
341 // Can't run a local loop on linux. Instead create a waitable event.
342 base::WaitableEvent done_writing(false, false);
[email protected]d04e7662010-10-10 22:24:48343 BrowserThread::PostTask(BrowserThread::FILE, FROM_HERE,
[email protected]c6032e82010-09-13 20:06:05344 NewRunnableFunction(Signal, &done_writing));
345 done_writing.TimedWait(
346 base::TimeDelta::FromSeconds(kEndSessionTimeoutSeconds));
347#elif defined(OS_WIN)
[email protected]d04e7662010-10-10 22:24:48348 BrowserThread::PostTask(BrowserThread::FILE, FROM_HERE,
[email protected]295039bd2008-08-15 04:32:57349 NewRunnableFunction(PostQuit, MessageLoop::current()));
initial.commit09911bf2008-07-26 23:55:29350 MessageLoop::current()->Run();
[email protected]c6032e82010-09-13 20:06:05351#else
352 NOTIMPLEMENTED();
353#endif
initial.commit09911bf2008-07-26 23:55:29354}
355
[email protected]e13ad79b2010-07-22 21:36:50356ResourceDispatcherHost* BrowserProcessImpl::resource_dispatcher_host() {
357 DCHECK(CalledOnValidThread());
358 if (!created_resource_dispatcher_host_)
359 CreateResourceDispatcherHost();
360 return resource_dispatcher_host_.get();
361}
362
363MetricsService* BrowserProcessImpl::metrics_service() {
364 DCHECK(CalledOnValidThread());
365 if (!created_metrics_service_)
366 CreateMetricsService();
367 return metrics_service_.get();
368}
369
370IOThread* BrowserProcessImpl::io_thread() {
371 DCHECK(CalledOnValidThread());
372 if (!created_io_thread_)
373 CreateIOThread();
374 return io_thread_.get();
375}
376
377base::Thread* BrowserProcessImpl::file_thread() {
378 DCHECK(CalledOnValidThread());
379 if (!created_file_thread_)
380 CreateFileThread();
381 return file_thread_.get();
382}
383
384base::Thread* BrowserProcessImpl::db_thread() {
385 DCHECK(CalledOnValidThread());
386 if (!created_db_thread_)
387 CreateDBThread();
388 return db_thread_.get();
389}
390
391base::Thread* BrowserProcessImpl::process_launcher_thread() {
392 DCHECK(CalledOnValidThread());
393 if (!created_process_launcher_thread_)
394 CreateProcessLauncherThread();
395 return process_launcher_thread_.get();
396}
397
398base::Thread* BrowserProcessImpl::cache_thread() {
399 DCHECK(CalledOnValidThread());
400 if (!created_cache_thread_)
401 CreateCacheThread();
402 return cache_thread_.get();
403}
404
[email protected]0b565182011-03-02 18:11:15405WatchDogThread* BrowserProcessImpl::watchdog_thread() {
406 DCHECK(CalledOnValidThread());
407 if (!created_watchdog_thread_)
408 CreateWatchdogThread();
409 DCHECK(watchdog_thread_.get() != NULL);
410 return watchdog_thread_.get();
411}
412
[email protected]2d14b3732011-05-10 16:48:44413#if defined(OS_CHROMEOS)
414base::Thread* BrowserProcessImpl::web_socket_proxy_thread() {
415 DCHECK(CalledOnValidThread());
416 if (!created_web_socket_proxy_thread_)
417 CreateWebSocketProxyThread();
418 DCHECK(web_socket_proxy_thread_.get() != NULL);
419 return web_socket_proxy_thread_.get();
420}
421#endif
422
[email protected]e13ad79b2010-07-22 21:36:50423ProfileManager* BrowserProcessImpl::profile_manager() {
424 DCHECK(CalledOnValidThread());
425 if (!created_profile_manager_)
426 CreateProfileManager();
427 return profile_manager_.get();
428}
429
430PrefService* BrowserProcessImpl::local_state() {
431 DCHECK(CalledOnValidThread());
432 if (!created_local_state_)
433 CreateLocalState();
434 return local_state_.get();
435}
436
437DevToolsManager* BrowserProcessImpl::devtools_manager() {
438 DCHECK(CalledOnValidThread());
439 if (!created_devtools_manager_)
440 CreateDevToolsManager();
441 return devtools_manager_.get();
442}
443
[email protected]8b8e7c92010-08-19 18:05:56444SidebarManager* BrowserProcessImpl::sidebar_manager() {
445 DCHECK(CalledOnValidThread());
446 if (!created_sidebar_manager_)
447 CreateSidebarManager();
448 return sidebar_manager_.get();
449}
450
[email protected]2dfeaf92011-01-10 21:08:21451ui::Clipboard* BrowserProcessImpl::clipboard() {
[email protected]e13ad79b2010-07-22 21:36:50452 DCHECK(CalledOnValidThread());
453 return clipboard_.get();
454}
455
[email protected]abe2c032011-03-31 18:49:34456net::URLRequestContextGetter* BrowserProcessImpl::system_request_context() {
[email protected]db0e86dd2011-03-16 14:47:21457 DCHECK(CalledOnValidThread());
458 return io_thread()->system_url_request_context_getter();
459}
460
461#if defined(OS_CHROMEOS)
462chromeos::ProxyConfigServiceImpl*
463BrowserProcessImpl::chromeos_proxy_config_service_impl() {
464 DCHECK(CalledOnValidThread());
465 if (!chromeos_proxy_config_service_impl_) {
466 chromeos_proxy_config_service_impl_ =
467 new chromeos::ProxyConfigServiceImpl();
468 }
469 return chromeos_proxy_config_service_impl_;
470}
471#endif // defined(OS_CHROMEOS)
472
[email protected]3ce02412011-03-01 12:01:15473ExtensionEventRouterForwarder*
474BrowserProcessImpl::extension_event_router_forwarder() {
475 return extension_event_router_forwarder_.get();
476}
477
[email protected]e13ad79b2010-07-22 21:36:50478NotificationUIManager* BrowserProcessImpl::notification_ui_manager() {
479 DCHECK(CalledOnValidThread());
480 if (!created_notification_ui_manager_)
481 CreateNotificationUIManager();
482 return notification_ui_manager_.get();
483}
484
[email protected]985655a2011-02-23 09:54:25485policy::BrowserPolicyConnector* BrowserProcessImpl::browser_policy_connector() {
[email protected]f2a893c2011-01-05 09:38:07486 DCHECK(CalledOnValidThread());
[email protected]985655a2011-02-23 09:54:25487 if (!created_browser_policy_connector_) {
488 DCHECK(browser_policy_connector_.get() == NULL);
489 created_browser_policy_connector_ = true;
[email protected]f31e2e52011-07-14 16:01:19490#if defined(ENABLE_CONFIGURATION_POLICY)
[email protected]d9ee002c2011-04-27 12:52:54491 browser_policy_connector_.reset(policy::BrowserPolicyConnector::Create());
[email protected]f31e2e52011-07-14 16:01:19492#endif
[email protected]f2a893c2011-01-05 09:38:07493 }
[email protected]985655a2011-02-23 09:54:25494 return browser_policy_connector_.get();
[email protected]f2a893c2011-01-05 09:38:07495}
496
[email protected]e13ad79b2010-07-22 21:36:50497IconManager* BrowserProcessImpl::icon_manager() {
498 DCHECK(CalledOnValidThread());
499 if (!created_icon_manager_)
500 CreateIconManager();
501 return icon_manager_.get();
502}
503
504ThumbnailGenerator* BrowserProcessImpl::GetThumbnailGenerator() {
505 return &thumbnail_generator_;
506}
507
508AutomationProviderList* BrowserProcessImpl::InitAutomationProviderList() {
509 DCHECK(CalledOnValidThread());
510 if (automation_provider_list_.get() == NULL) {
511 automation_provider_list_.reset(AutomationProviderList::GetInstance());
512 }
513 return automation_provider_list_.get();
514}
515
[email protected]5613126e2011-01-31 15:27:55516void BrowserProcessImpl::InitDevToolsHttpProtocolHandler(
[email protected]4475d232011-07-27 15:29:20517 Profile* profile,
[email protected]01000cf12011-02-04 11:39:22518 const std::string& ip,
[email protected]5613126e2011-01-31 15:27:55519 int port,
520 const std::string& frontend_url) {
[email protected]e13ad79b2010-07-22 21:36:50521 DCHECK(CalledOnValidThread());
[email protected]4475d232011-07-27 15:29:20522 remote_debugging_server_.reset(
523 new RemoteDebuggingServer(profile, ip, port, frontend_url));
[email protected]5613126e2011-01-31 15:27:55524}
525
526void BrowserProcessImpl::InitDevToolsLegacyProtocolHandler(int port) {
527 DCHECK(CalledOnValidThread());
528 devtools_legacy_handler_ = DevToolsProtocolHandler::Start(port);
[email protected]e13ad79b2010-07-22 21:36:50529}
530
531bool BrowserProcessImpl::IsShuttingDown() {
532 DCHECK(CalledOnValidThread());
533 return did_start_ && 0 == module_ref_count_;
534}
535
initial.commit09911bf2008-07-26 23:55:29536printing::PrintJobManager* BrowserProcessImpl::print_job_manager() {
537 // TODO(abarth): DCHECK(CalledOnValidThread());
[email protected]d8922f22010-05-07 00:57:27538 // http://code.google.com/p/chromium/issues/detail?id=6828
initial.commit09911bf2008-07-26 23:55:29539 // print_job_manager_ is initialized in the constructor and destroyed in the
540 // destructor, so it should always be valid.
541 DCHECK(print_job_manager_.get());
542 return print_job_manager_.get();
543}
544
[email protected]dbeebd52010-11-16 20:34:16545printing::PrintPreviewTabController*
546 BrowserProcessImpl::print_preview_tab_controller() {
547 DCHECK(CalledOnValidThread());
548 if (!print_preview_tab_controller_.get())
549 CreatePrintPreviewTabController();
550 return print_preview_tab_controller_.get();
551}
552
[email protected]68f88b992011-05-07 02:01:39553printing::BackgroundPrintingManager*
554 BrowserProcessImpl::background_printing_manager() {
555 DCHECK(CalledOnValidThread());
556 if (!background_printing_manager_.get())
557 CreateBackgroundPrintingManager();
558 return background_printing_manager_.get();
559}
560
[email protected]e13ad79b2010-07-22 21:36:50561GoogleURLTracker* BrowserProcessImpl::google_url_tracker() {
562 DCHECK(CalledOnValidThread());
563 if (!google_url_tracker_.get())
564 CreateGoogleURLTracker();
565 return google_url_tracker_.get();
566}
567
568IntranetRedirectDetector* BrowserProcessImpl::intranet_redirect_detector() {
569 DCHECK(CalledOnValidThread());
570 if (!intranet_redirect_detector_.get())
571 CreateIntranetRedirectDetector();
572 return intranet_redirect_detector_.get();
573}
574
575const std::string& BrowserProcessImpl::GetApplicationLocale() {
576 DCHECK(!locale_.empty());
577 return locale_;
578}
579
580void BrowserProcessImpl::SetApplicationLocale(const std::string& locale) {
581 locale_ = locale;
582 extension_l10n_util::SetProcessLocale(locale);
583}
584
[email protected]073ed7b2010-09-27 09:20:02585DownloadStatusUpdater* BrowserProcessImpl::download_status_updater() {
586 return &download_status_updater_;
587}
588
[email protected]e13ad79b2010-07-22 21:36:50589TabCloseableStateWatcher* BrowserProcessImpl::tab_closeable_state_watcher() {
590 DCHECK(CalledOnValidThread());
591 if (!tab_closeable_state_watcher_.get())
592 CreateTabCloseableStateWatcher();
593 return tab_closeable_state_watcher_.get();
594}
595
[email protected]9e7f015f2011-05-28 00:24:25596BackgroundModeManager* BrowserProcessImpl::background_mode_manager() {
597 DCHECK(CalledOnValidThread());
598 if (!background_mode_manager_.get())
599 CreateBackgroundModeManager();
600 return background_mode_manager_.get();
601}
602
603StatusTray* BrowserProcessImpl::status_tray() {
604 DCHECK(CalledOnValidThread());
605 if (!status_tray_.get())
606 CreateStatusTray();
607 return status_tray_.get();
608}
609
[email protected]462a0ff2011-06-02 17:15:34610
611SafeBrowsingService* BrowserProcessImpl::safe_browsing_service() {
612 DCHECK(CalledOnValidThread());
613 if (!created_safe_browsing_service_)
614 CreateSafeBrowsingService();
615 return safe_browsing_service_.get();
616}
617
[email protected]a7a5e992010-12-09 23:39:51618safe_browsing::ClientSideDetectionService*
619 BrowserProcessImpl::safe_browsing_detection_service() {
620 DCHECK(CalledOnValidThread());
[email protected]462a0ff2011-06-02 17:15:34621 if (!created_safe_browsing_detection_service_)
[email protected]a7a5e992010-12-09 23:39:51622 CreateSafeBrowsingDetectionService();
[email protected]a7a5e992010-12-09 23:39:51623 return safe_browsing_detection_service_.get();
624}
625
[email protected]8b08a47f2011-02-25 12:36:37626bool BrowserProcessImpl::plugin_finder_disabled() const {
627 return *plugin_finder_disabled_pref_;
628}
629
[email protected]432115822011-07-10 15:52:27630void BrowserProcessImpl::Observe(int type,
[email protected]6618d1d2010-12-15 21:18:47631 const NotificationSource& source,
632 const NotificationDetails& details) {
[email protected]432115822011-07-10 15:52:27633 if (type == chrome::NOTIFICATION_PREF_CHANGED) {
[email protected]e450fa62011-02-01 12:52:56634 std::string* pref = Details<std::string>(details).ptr();
635 if (*pref == prefs::kDefaultBrowserSettingEnabled) {
636 if (local_state_->GetBoolean(prefs::kDefaultBrowserSettingEnabled))
637 ShellIntegration::SetAsDefaultBrowser();
[email protected]419a0572011-04-18 22:21:46638 } else if (*pref == prefs::kDisabledSchemes) {
639 ApplyDisabledSchemesPolicy();
[email protected]40850a52011-05-26 22:07:35640 } else if (*pref == prefs::kAllowCrossOriginAuthPrompt) {
641 ApplyAllowCrossOriginAuthPromptPolicy();
[email protected]e450fa62011-02-01 12:52:56642 }
[email protected]6618d1d2010-12-15 21:18:47643 } else {
644 NOTREACHED();
645 }
646}
647
[email protected]e13ad79b2010-07-22 21:36:50648#if (defined(OS_WIN) || defined(OS_LINUX)) && !defined(OS_CHROMEOS)
649void BrowserProcessImpl::StartAutoupdateTimer() {
650 autoupdate_timer_.Start(
651 base::TimeDelta::FromHours(kUpdateCheckIntervalHours),
652 this,
653 &BrowserProcessImpl::OnAutoupdateTimer);
654}
655#endif
656
[email protected]d6f37fc2011-02-13 23:58:41657ChromeNetLog* BrowserProcessImpl::net_log() {
658 return net_log_.get();
659}
660
[email protected]1459fb62011-05-25 19:03:27661prerender::PrerenderTracker* BrowserProcessImpl::prerender_tracker() {
662 if (!prerender_tracker_.get())
663 prerender_tracker_.reset(new prerender::PrerenderTracker);
664
665 return prerender_tracker_.get();
666}
667
[email protected]e7f009d2011-06-14 19:35:10668MHTMLGenerationManager* BrowserProcessImpl::mhtml_generation_manager() {
669 if (!mhtml_generation_manager_.get())
670 mhtml_generation_manager_ = new MHTMLGenerationManager();
671
672 return mhtml_generation_manager_.get();
673}
674
[email protected]87522db92011-07-28 23:44:14675GpuBlacklistUpdater* BrowserProcessImpl::gpu_blacklist_updater() {
676 if (!gpu_blacklist_updater_.get())
677 gpu_blacklist_updater_ = new GpuBlacklistUpdater();
678
679 return gpu_blacklist_updater_.get();
680}
681
[email protected]c1adf5a2011-08-03 22:11:37682ComponentUpdateService* BrowserProcessImpl::component_updater() {
683#if defined(OS_CHROMEOS)
684 return NULL;
685#else
686 if (!component_updater_.get()) {
687 ComponentUpdateService::Configurator* configurator =
688 MakeChromeComponentUpdaterConfigurator(
689 CommandLine::ForCurrentProcess(),
690 io_thread()->system_url_request_context_getter());
691 // Creating the component updater does not do anything, components
692 // need to be registered and Start() needs to be called.
693 component_updater_.reset(ComponentUpdateServiceFactory(configurator));
694 }
695 return component_updater_.get();
[email protected]c1adf5a2011-08-03 22:11:37696#endif
[email protected]aafbcb572011-08-03 22:22:32697}
[email protected]c1adf5a2011-08-03 22:11:37698
initial.commit09911bf2008-07-26 23:55:29699void BrowserProcessImpl::CreateResourceDispatcherHost() {
700 DCHECK(!created_resource_dispatcher_host_ &&
701 resource_dispatcher_host_.get() == NULL);
702 created_resource_dispatcher_host_ = true;
703
[email protected]214538842011-04-01 18:47:24704 // UserScriptListener will delete itself.
705 ResourceQueue::DelegateSet resource_queue_delegates;
706 resource_queue_delegates.insert(new UserScriptListener());
707
708 resource_dispatcher_host_.reset(
709 new ResourceDispatcherHost(resource_queue_delegates));
initial.commit09911bf2008-07-26 23:55:29710 resource_dispatcher_host_->Initialize();
[email protected]1459fb62011-05-25 19:03:27711
[email protected]8bcdf072011-06-03 16:52:15712 resource_dispatcher_host_delegate_.reset(
713 new ChromeResourceDispatcherHostDelegate(resource_dispatcher_host_.get(),
[email protected]92e0a612011-05-30 21:37:00714 prerender_tracker()));
[email protected]8bcdf072011-06-03 16:52:15715 resource_dispatcher_host_->set_delegate(
716 resource_dispatcher_host_delegate_.get());
[email protected]40850a52011-05-26 22:07:35717
718 pref_change_registrar_.Add(prefs::kAllowCrossOriginAuthPrompt, this);
719 ApplyAllowCrossOriginAuthPromptPolicy();
initial.commit09911bf2008-07-26 23:55:29720}
721
722void BrowserProcessImpl::CreateMetricsService() {
723 DCHECK(!created_metrics_service_ && metrics_service_.get() == NULL);
724 created_metrics_service_ = true;
725
726 metrics_service_.reset(new MetricsService);
727}
728
729void BrowserProcessImpl::CreateIOThread() {
730 DCHECK(!created_io_thread_ && io_thread_.get() == NULL);
731 created_io_thread_ = true;
732
733 // Prior to starting the io thread, we create the plugin service as
734 // it is predominantly used from the io thread, but must be created
735 // on the main thread. The service ctor is inexpensive and does not
736 // invoke the io_thread() accessor.
737 PluginService::GetInstance();
738
[email protected]de23f3f2011-05-18 16:20:23739 // Add the Chrome specific plugins.
740 chrome::RegisterInternalDefaultPlugin();
741
742 // Register the internal Flash if available.
743 FilePath path;
744 if (!CommandLine::ForCurrentProcess()->HasSwitch(
745 switches::kDisableInternalFlash) &&
746 PathService::Get(chrome::FILE_FLASH_PLUGIN, &path)) {
747 webkit::npapi::PluginList::Singleton()->AddExtraPluginPath(path);
748 }
749
[email protected]f1933792011-06-14 00:49:34750#if defined(OS_POSIX)
751 // Also find plugins in a user-specific plugins dir,
752 // e.g. ~/.config/chromium/Plugins.
753 FilePath user_data_dir;
754 if (PathService::Get(chrome::DIR_USER_DATA, &user_data_dir)) {
755 webkit::npapi::PluginList::Singleton()->AddExtraPluginDir(
756 user_data_dir.Append("Plugins"));
757 }
758#endif
759
[email protected]3ce02412011-03-01 12:01:15760 scoped_ptr<IOThread> thread(new IOThread(
761 local_state(), net_log_.get(), extension_event_router_forwarder_.get()));
[email protected]ab820df2008-08-26 05:55:10762 base::Thread::Options options;
763 options.message_loop_type = MessageLoop::TYPE_IO;
764 if (!thread->StartWithOptions(options))
initial.commit09911bf2008-07-26 23:55:29765 return;
766 io_thread_.swap(thread);
767}
768
769void BrowserProcessImpl::CreateFileThread() {
770 DCHECK(!created_file_thread_ && file_thread_.get() == NULL);
771 created_file_thread_ = true;
772
[email protected]ab820df2008-08-26 05:55:10773 scoped_ptr<base::Thread> thread(
[email protected]d04e7662010-10-10 22:24:48774 new BrowserProcessSubThread(BrowserThread::FILE));
[email protected]a1db3842008-09-17 22:04:06775 base::Thread::Options options;
[email protected]9e549b582009-02-05 21:13:39776#if defined(OS_WIN)
777 // On Windows, the FILE thread needs to be have a UI message loop which pumps
778 // messages in such a way that Google Update can communicate back to us.
[email protected]a1db3842008-09-17 22:04:06779 options.message_loop_type = MessageLoop::TYPE_UI;
[email protected]9e549b582009-02-05 21:13:39780#else
781 options.message_loop_type = MessageLoop::TYPE_IO;
782#endif
[email protected]a1db3842008-09-17 22:04:06783 if (!thread->StartWithOptions(options))
initial.commit09911bf2008-07-26 23:55:29784 return;
785 file_thread_.swap(thread);
786}
787
[email protected]2d14b3732011-05-10 16:48:44788#if defined(OS_CHROMEOS)
789void BrowserProcessImpl::CreateWebSocketProxyThread() {
790 DCHECK(!created_web_socket_proxy_thread_);
791 DCHECK(web_socket_proxy_thread_.get() == NULL);
792 created_web_socket_proxy_thread_ = true;
793
794 scoped_ptr<base::Thread> thread(
795 new BrowserProcessSubThread(BrowserThread::WEB_SOCKET_PROXY));
796 base::Thread::Options options;
797 options.message_loop_type = MessageLoop::TYPE_IO;
798 if (!thread->StartWithOptions(options))
799 return;
800 web_socket_proxy_thread_.swap(thread);
801}
802#endif
803
initial.commit09911bf2008-07-26 23:55:29804void BrowserProcessImpl::CreateDBThread() {
805 DCHECK(!created_db_thread_ && db_thread_.get() == NULL);
806 created_db_thread_ = true;
807
[email protected]ab820df2008-08-26 05:55:10808 scoped_ptr<base::Thread> thread(
[email protected]d04e7662010-10-10 22:24:48809 new BrowserProcessSubThread(BrowserThread::DB));
initial.commit09911bf2008-07-26 23:55:29810 if (!thread->Start())
811 return;
812 db_thread_.swap(thread);
813}
814
[email protected]914511712009-11-23 19:42:33815void BrowserProcessImpl::CreateProcessLauncherThread() {
816 DCHECK(!created_process_launcher_thread_ && !process_launcher_thread_.get());
817 created_process_launcher_thread_ = true;
818
819 scoped_ptr<base::Thread> thread(
[email protected]d04e7662010-10-10 22:24:48820 new BrowserProcessSubThread(BrowserThread::PROCESS_LAUNCHER));
[email protected]914511712009-11-23 19:42:33821 if (!thread->Start())
822 return;
823 process_launcher_thread_.swap(thread);
824}
825
[email protected]875ee822010-05-18 20:58:01826void BrowserProcessImpl::CreateCacheThread() {
827 DCHECK(!created_cache_thread_ && !cache_thread_.get());
828 created_cache_thread_ = true;
829
830 scoped_ptr<base::Thread> thread(
[email protected]75096332010-11-09 03:28:13831 new BrowserThread(BrowserThread::CACHE));
[email protected]875ee822010-05-18 20:58:01832 base::Thread::Options options;
833 options.message_loop_type = MessageLoop::TYPE_IO;
834 if (!thread->StartWithOptions(options))
835 return;
836 cache_thread_.swap(thread);
837}
838
[email protected]0b565182011-03-02 18:11:15839void BrowserProcessImpl::CreateWatchdogThread() {
840 DCHECK(!created_watchdog_thread_ && watchdog_thread_.get() == NULL);
841 created_watchdog_thread_ = true;
842
843 scoped_ptr<WatchDogThread> thread(new WatchDogThread());
844 if (!thread->Start())
845 return;
846 watchdog_thread_.swap(thread);
847}
848
initial.commit09911bf2008-07-26 23:55:29849void BrowserProcessImpl::CreateProfileManager() {
850 DCHECK(!created_profile_manager_ && profile_manager_.get() == NULL);
851 created_profile_manager_ = true;
852
853 profile_manager_.reset(new ProfileManager());
854}
855
856void BrowserProcessImpl::CreateLocalState() {
857 DCHECK(!created_local_state_ && local_state_.get() == NULL);
858 created_local_state_ = true;
859
[email protected]b9636002009-03-04 00:05:25860 FilePath local_state_path;
initial.commit09911bf2008-07-26 23:55:29861 PathService::Get(chrome::FILE_LOCAL_STATE, &local_state_path);
[email protected]f2d1f612010-12-09 15:10:17862 local_state_.reset(
[email protected]fcf53572011-06-29 15:44:37863 PrefService::CreatePrefService(local_state_path, NULL, false));
[email protected]492d2142010-09-10 13:55:18864
[email protected]caf63aea2011-04-26 11:04:10865 // Initialize the prefs of the local state.
866 browser::RegisterLocalState(local_state_.get());
867
[email protected]2a7e7c152010-10-01 20:12:09868 pref_change_registrar_.Init(local_state_.get());
869
[email protected]f16b9662011-04-27 10:06:07870 print_job_manager_->InitOnUIThread(local_state_.get());
[email protected]e450fa62011-02-01 12:52:56871
872 // Initialize the notification for the default browser setting policy.
873 local_state_->RegisterBooleanPref(prefs::kDefaultBrowserSettingEnabled,
874 false);
875 if (local_state_->IsManagedPreference(prefs::kDefaultBrowserSettingEnabled)) {
876 if (local_state_->GetBoolean(prefs::kDefaultBrowserSettingEnabled))
877 ShellIntegration::SetAsDefaultBrowser();
878 }
879 pref_change_registrar_.Add(prefs::kDefaultBrowserSettingEnabled, this);
[email protected]8b08a47f2011-02-25 12:36:37880
881 // Initialize the preference for the plugin finder policy.
882 // This preference is only needed on the IO thread so make it available there.
883 local_state_->RegisterBooleanPref(prefs::kDisablePluginFinder, false);
884 plugin_finder_disabled_pref_.Init(prefs::kDisablePluginFinder,
885 local_state_.get(), NULL);
886 plugin_finder_disabled_pref_.MoveToThread(BrowserThread::IO);
[email protected]419a0572011-04-18 22:21:46887
[email protected]1f8110b2011-05-24 14:48:30888 // Initialize the disk cache location policy. This policy is not hot update-
889 // able so we need to have it when initializing the profiles.
890 local_state_->RegisterFilePathPref(prefs::kDiskCacheDir, FilePath());
891
[email protected]12c84e22011-07-11 09:35:45892 // Another policy that needs to be defined before the net subsystem is
893 // initialized is MaxConnectionsPerProxy so we do it here.
894 local_state_->RegisterIntegerPref(prefs::kMaxConnectionsPerProxy,
895 net::kDefaultMaxSocketsPerProxyServer);
896 int max_per_proxy = local_state_->GetInteger(prefs::kMaxConnectionsPerProxy);
897 net::ClientSocketPoolManager::set_max_sockets_per_proxy_server(
898 std::max(std::min(max_per_proxy, 99),
899 net::ClientSocketPoolManager::max_sockets_per_group()));
900
[email protected]b99c41c2011-04-27 15:18:48901 // This is observed by ChildProcessSecurityPolicy, which lives in content/
902 // though, so it can't register itself.
[email protected]419a0572011-04-18 22:21:46903 local_state_->RegisterListPref(prefs::kDisabledSchemes);
[email protected]b99c41c2011-04-27 15:18:48904 pref_change_registrar_.Add(prefs::kDisabledSchemes, this);
[email protected]419a0572011-04-18 22:21:46905 ApplyDisabledSchemesPolicy();
[email protected]fd6159a2010-09-03 09:38:39906}
initial.commit09911bf2008-07-26 23:55:29907
initial.commit09911bf2008-07-26 23:55:29908void BrowserProcessImpl::CreateIconManager() {
909 DCHECK(!created_icon_manager_ && icon_manager_.get() == NULL);
910 created_icon_manager_ = true;
911 icon_manager_.reset(new IconManager);
912}
913
[email protected]40ecc902009-03-16 13:42:47914void BrowserProcessImpl::CreateDevToolsManager() {
[email protected]73ee01522009-06-05 10:13:44915 DCHECK(devtools_manager_.get() == NULL);
[email protected]40ecc902009-03-16 13:42:47916 created_devtools_manager_ = true;
[email protected]f1038d832011-08-04 07:52:01917 devtools_manager_.reset(new DevToolsManager());
[email protected]40ecc902009-03-16 13:42:47918}
919
[email protected]8b8e7c92010-08-19 18:05:56920void BrowserProcessImpl::CreateSidebarManager() {
921 DCHECK(sidebar_manager_.get() == NULL);
922 created_sidebar_manager_ = true;
923 sidebar_manager_ = new SidebarManager();
924}
925
initial.commit09911bf2008-07-26 23:55:29926void BrowserProcessImpl::CreateGoogleURLTracker() {
927 DCHECK(google_url_tracker_.get() == NULL);
928 scoped_ptr<GoogleURLTracker> google_url_tracker(new GoogleURLTracker);
929 google_url_tracker_.swap(google_url_tracker);
930}
[email protected]6641bf662009-08-21 00:34:09931
[email protected]c4ff4952010-01-08 19:12:47932void BrowserProcessImpl::CreateIntranetRedirectDetector() {
933 DCHECK(intranet_redirect_detector_.get() == NULL);
934 scoped_ptr<IntranetRedirectDetector> intranet_redirect_detector(
935 new IntranetRedirectDetector);
936 intranet_redirect_detector_.swap(intranet_redirect_detector);
937}
938
[email protected]29672ab2009-10-30 03:44:03939void BrowserProcessImpl::CreateNotificationUIManager() {
940 DCHECK(notification_ui_manager_.get() == NULL);
[email protected]b0b2a3dd2011-01-06 00:30:05941 notification_ui_manager_.reset(NotificationUIManager::Create(local_state()));
942
[email protected]29672ab2009-10-30 03:44:03943 created_notification_ui_manager_ = true;
944}
945
[email protected]0b4d3382010-07-14 16:13:04946void BrowserProcessImpl::CreateTabCloseableStateWatcher() {
947 DCHECK(tab_closeable_state_watcher_.get() == NULL);
948 tab_closeable_state_watcher_.reset(TabCloseableStateWatcher::Create());
949}
950
[email protected]9e7f015f2011-05-28 00:24:25951void BrowserProcessImpl::CreateBackgroundModeManager() {
952 DCHECK(background_mode_manager_.get() == NULL);
953 background_mode_manager_.reset(
954 new BackgroundModeManager(CommandLine::ForCurrentProcess()));
955}
956
957void BrowserProcessImpl::CreateStatusTray() {
958 DCHECK(status_tray_.get() == NULL);
959 status_tray_.reset(StatusTray::Create());
960}
961
[email protected]dbeebd52010-11-16 20:34:16962void BrowserProcessImpl::CreatePrintPreviewTabController() {
963 DCHECK(print_preview_tab_controller_.get() == NULL);
964 print_preview_tab_controller_ = new printing::PrintPreviewTabController();
965}
966
[email protected]68f88b992011-05-07 02:01:39967void BrowserProcessImpl::CreateBackgroundPrintingManager() {
968 DCHECK(background_printing_manager_.get() == NULL);
969 background_printing_manager_.reset(new printing::BackgroundPrintingManager());
970}
971
[email protected]462a0ff2011-06-02 17:15:34972void BrowserProcessImpl::CreateSafeBrowsingService() {
973 DCHECK(safe_browsing_service_.get() == NULL);
[email protected]8c40da62011-07-13 22:58:46974 // Set this flag to true so that we don't retry indefinitely to
975 // create the service class if there was an error.
[email protected]462a0ff2011-06-02 17:15:34976 created_safe_browsing_service_ = true;
[email protected]4b58e7d2011-07-11 10:22:56977#if defined(ENABLE_SAFE_BROWSING)
[email protected]462a0ff2011-06-02 17:15:34978 safe_browsing_service_ = SafeBrowsingService::CreateSafeBrowsingService();
979 safe_browsing_service_->Initialize();
[email protected]4b58e7d2011-07-11 10:22:56980#endif
[email protected]462a0ff2011-06-02 17:15:34981}
982
[email protected]a7a5e992010-12-09 23:39:51983void BrowserProcessImpl::CreateSafeBrowsingDetectionService() {
984 DCHECK(safe_browsing_detection_service_.get() == NULL);
985 // Set this flag to true so that we don't retry indefinitely to
986 // create the service class if there was an error.
987 created_safe_browsing_detection_service_ = true;
988
[email protected]4b58e7d2011-07-11 10:22:56989#if defined(ENABLE_SAFE_BROWSING)
[email protected]1eb19a32011-07-28 22:22:54990 if (IsSafeBrowsingDetectionServiceEnabled()) {
[email protected]a7a5e992010-12-09 23:39:51991 safe_browsing_detection_service_.reset(
992 safe_browsing::ClientSideDetectionService::Create(
[email protected]1eb19a32011-07-28 22:22:54993 g_browser_process->system_request_context()));
[email protected]a7a5e992010-12-09 23:39:51994 }
[email protected]4b58e7d2011-07-11 10:22:56995#endif
[email protected]a7a5e992010-12-09 23:39:51996}
997
998bool BrowserProcessImpl::IsSafeBrowsingDetectionServiceEnabled() {
999 // The safe browsing client-side detection is enabled only if the switch is
[email protected]436ebd62011-06-09 22:08:111000 // not disabled and when safe browsing related stats are allowed to be
1001 // collected.
[email protected]4b58e7d2011-07-11 10:22:561002#if defined(ENABLE_SAFE_BROWSING) && !defined(OS_CHROMEOS)
[email protected]d081d192011-04-01 02:33:241003 return !CommandLine::ForCurrentProcess()->HasSwitch(
1004 switches::kDisableClientSidePhishingDetection) &&
[email protected]462a0ff2011-06-02 17:15:341005 safe_browsing_service() &&
[email protected]436ebd62011-06-09 22:08:111006 safe_browsing_service()->CanReportStats();
[email protected]4b58e7d2011-07-11 10:22:561007#else
1008 return false;
[email protected]d081d192011-04-01 02:33:241009#endif
[email protected]a7a5e992010-12-09 23:39:511010}
1011
[email protected]419a0572011-04-18 22:21:461012void BrowserProcessImpl::ApplyDisabledSchemesPolicy() {
1013 std::set<std::string> schemes;
[email protected]b99c41c2011-04-27 15:18:481014 const ListValue* scheme_list = local_state_->GetList(prefs::kDisabledSchemes);
1015 for (ListValue::const_iterator iter = scheme_list->begin();
1016 iter != scheme_list->end(); ++iter) {
[email protected]419a0572011-04-18 22:21:461017 std::string scheme;
1018 if ((*iter)->GetAsString(&scheme))
1019 schemes.insert(scheme);
1020 }
1021 ChildProcessSecurityPolicy::GetInstance()->RegisterDisabledSchemes(schemes);
1022}
1023
[email protected]40850a52011-05-26 22:07:351024void BrowserProcessImpl::ApplyAllowCrossOriginAuthPromptPolicy() {
1025 bool value = local_state()->GetBoolean(prefs::kAllowCrossOriginAuthPrompt);
1026 resource_dispatcher_host()->set_allow_cross_origin_auth_prompt(value);
1027}
1028
[email protected]6641bf662009-08-21 00:34:091029// The BrowserProcess object must outlive the file thread so we use traits
1030// which don't do any management.
[email protected]c56428f22010-06-16 02:17:231031DISABLE_RUNNABLE_METHOD_REFCOUNT(BrowserProcessImpl);
[email protected]6641bf662009-08-21 00:34:091032
[email protected]d55aaa132009-09-28 21:08:041033#if defined(IPC_MESSAGE_LOG_ENABLED)
1034
1035void BrowserProcessImpl::SetIPCLoggingEnabled(bool enable) {
1036 // First enable myself.
1037 if (enable)
[email protected]8e8bb6d2010-12-13 08:18:551038 IPC::Logging::GetInstance()->Enable();
[email protected]d55aaa132009-09-28 21:08:041039 else
[email protected]8e8bb6d2010-12-13 08:18:551040 IPC::Logging::GetInstance()->Disable();
[email protected]d55aaa132009-09-28 21:08:041041
1042 // Now tell subprocesses. Messages to ChildProcess-derived
1043 // processes must be done on the IO thread.
1044 io_thread()->message_loop()->PostTask
1045 (FROM_HERE,
1046 NewRunnableMethod(
1047 this,
1048 &BrowserProcessImpl::SetIPCLoggingEnabledForChildProcesses,
1049 enable));
1050
1051 // Finally, tell the renderers which don't derive from ChildProcess.
1052 // Messages to the renderers must be done on the UI (main) thread.
[email protected]019191a2009-10-02 20:37:271053 for (RenderProcessHost::iterator i(RenderProcessHost::AllHostsIterator());
1054 !i.IsAtEnd(); i.Advance())
[email protected]ff47b2962011-03-07 23:51:491055 i.GetCurrentValue()->Send(new ChildProcessMsg_SetIPCLoggingEnabled(enable));
[email protected]d55aaa132009-09-28 21:08:041056}
1057
1058// Helper for SetIPCLoggingEnabled.
1059void BrowserProcessImpl::SetIPCLoggingEnabledForChildProcesses(bool enabled) {
[email protected]d04e7662010-10-10 22:24:481060 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO));
[email protected]d55aaa132009-09-28 21:08:041061
[email protected]d27893f62010-07-03 05:47:421062 BrowserChildProcessHost::Iterator i; // default constr references a singleton
[email protected]34cf97d2009-09-29 22:46:111063 while (!i.Done()) {
[email protected]ff47b2962011-03-07 23:51:491064 i->Send(new ChildProcessMsg_SetIPCLoggingEnabled(enabled));
[email protected]34cf97d2009-09-29 22:46:111065 ++i;
[email protected]d55aaa132009-09-28 21:08:041066 }
1067}
1068
1069#endif // IPC_MESSAGE_LOG_ENABLED
1070
[email protected]3cdacd42010-04-30 18:55:531071// Mac is currently not supported.
1072#if (defined(OS_WIN) || defined(OS_LINUX)) && !defined(OS_CHROMEOS)
[email protected]bd48c2b02010-04-09 20:32:421073
1074bool BrowserProcessImpl::CanAutorestartForUpdate() const {
1075 // Check if browser is in the background and if it needs to be restarted to
1076 // apply a pending update.
[email protected]c10fa3952010-08-24 16:52:531077 return BrowserList::size() == 0 && BrowserList::WillKeepAlive() &&
[email protected]815856722011-04-13 17:19:191078 upgrade_util::IsUpdatePendingRestart();
[email protected]bd48c2b02010-04-09 20:32:421079}
1080
[email protected]5c08f222010-09-22 09:37:211081// Switches to add when auto-restarting Chrome.
[email protected]6c10c972010-08-11 04:15:471082const char* const kSwitchesToAddOnAutorestart[] = {
[email protected]f9a06842010-08-21 00:32:401083 switches::kNoStartupWindow
[email protected]bd48c2b02010-04-09 20:32:421084};
1085
1086void BrowserProcessImpl::RestartPersistentInstance() {
1087 CommandLine* old_cl = CommandLine::ForCurrentProcess();
[email protected]3cdacd42010-04-30 18:55:531088 scoped_ptr<CommandLine> new_cl(new CommandLine(old_cl->GetProgram()));
[email protected]bd48c2b02010-04-09 20:32:421089
1090 std::map<std::string, CommandLine::StringType> switches =
1091 old_cl->GetSwitches();
1092
[email protected]5c08f222010-09-22 09:37:211093 switches::RemoveSwitchesForAutostart(&switches);
[email protected]bd48c2b02010-04-09 20:32:421094
1095 // Append the rest of the switches (along with their values, if any)
1096 // to the new command line
1097 for (std::map<std::string, CommandLine::StringType>::const_iterator i =
1098 switches.begin(); i != switches.end(); ++i) {
1099 CommandLine::StringType switch_value = i->second;
1100 if (switch_value.length() > 0) {
[email protected]05076ba22010-07-30 05:59:571101 new_cl->AppendSwitchNative(i->first, i->second);
[email protected]bd48c2b02010-04-09 20:32:421102 } else {
[email protected]3cdacd42010-04-30 18:55:531103 new_cl->AppendSwitch(i->first);
[email protected]bd48c2b02010-04-09 20:32:421104 }
1105 }
1106
[email protected]6c10c972010-08-11 04:15:471107 // Ensure that our desired switches are set on the new process.
[email protected]5c08f222010-09-22 09:37:211108 for (size_t i = 0; i < arraysize(kSwitchesToAddOnAutorestart); ++i) {
[email protected]6c10c972010-08-11 04:15:471109 if (!new_cl->HasSwitch(kSwitchesToAddOnAutorestart[i]))
1110 new_cl->AppendSwitch(kSwitchesToAddOnAutorestart[i]);
1111 }
[email protected]bd48c2b02010-04-09 20:32:421112
[email protected]3cdacd42010-04-30 18:55:531113 DLOG(WARNING) << "Shutting down current instance of the browser.";
[email protected]bc63a072011-06-28 21:12:571114 BrowserList::AttemptExit();
[email protected]3cdacd42010-04-30 18:55:531115
1116 // Transfer ownership to Upgrade.
[email protected]815856722011-04-13 17:19:191117 upgrade_util::SetNewCommandLine(new_cl.release());
[email protected]bd48c2b02010-04-09 20:32:421118}
1119
1120void BrowserProcessImpl::OnAutoupdateTimer() {
1121 if (CanAutorestartForUpdate()) {
[email protected]3cdacd42010-04-30 18:55:531122 DLOG(WARNING) << "Detected update. Restarting browser.";
[email protected]bd48c2b02010-04-09 20:32:421123 RestartPersistentInstance();
1124 }
1125}
1126
[email protected]3cdacd42010-04-30 18:55:531127#endif // (defined(OS_WIN) || defined(OS_LINUX)) && !defined(OS_CHROMEOS)