blob: ca2f048bf6df54033d1c02e295a76419c9c2e8aa [file] [log] [blame]
[email protected]f2a893c2011-01-05 09:38:071// Copyright (c) 2011 The Chromium Authors. All rights reserved.
license.botbf09a502008-08-24 00:55:552// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
initial.commit09911bf2008-07-26 23:55:294
5#include "chrome/browser/browser_process_impl.h"
6
[email protected]3cdacd42010-04-30 18:55:537#include <map>
[email protected]68f88b992011-05-07 02:01:398#include <set>
9#include <vector>
[email protected]3cdacd42010-04-30 18:55:5310
initial.commit09911bf2008-07-26 23:55:2911#include "base/command_line.h"
[email protected]6641bf662009-08-21 00:34:0912#include "base/file_util.h"
initial.commit09911bf2008-07-26 23:55:2913#include "base/path_service.h"
[email protected]985655a2011-02-23 09:54:2514#include "base/synchronization/waitable_event.h"
[email protected]c6032e82010-09-13 20:06:0515#include "base/task.h"
[email protected]34b99632011-01-01 01:01:0616#include "base/threading/thread.h"
17#include "base/threading/thread_restrictions.h"
[email protected]e13ad79b2010-07-22 21:36:5018#include "chrome/browser/automation/automation_provider_list.h"
[email protected]a07676b22011-06-17 16:36:5319#include "chrome/browser/background/background_mode_manager.h"
[email protected]b443cb042009-12-15 22:05:0920#include "chrome/browser/browser_main.h"
[email protected]0ac83682010-01-22 17:46:2721#include "chrome/browser/browser_process_sub_thread.h"
[email protected]ac262c9f2008-10-19 17:45:2122#include "chrome/browser/browser_trial.h"
[email protected]6c69796d2010-07-16 21:41:1623#include "chrome/browser/download/download_file_manager.h"
[email protected]e7f009d2011-06-14 19:35:1024#include "chrome/browser/download/mhtml_generation_manager.h"
[email protected]5ba0a2c2009-02-19 01:19:3425#include "chrome/browser/download/save_file_manager.h"
[email protected]3ce02412011-03-01 12:01:1526#include "chrome/browser/extensions/extension_event_router_forwarder.h"
[email protected]fc4facd2011-03-22 23:18:5027#include "chrome/browser/extensions/extension_tab_id_map.h"
[email protected]214538842011-04-01 18:47:2428#include "chrome/browser/extensions/user_script_listener.h"
[email protected]815856722011-04-13 17:19:1929#include "chrome/browser/first_run/upgrade_util.h"
[email protected]f7578f52010-08-30 22:22:4930#include "chrome/browser/google/google_url_tracker.h"
[email protected]dcefa302009-05-20 00:24:3931#include "chrome/browser/icon_manager.h"
[email protected]c4ff4952010-01-08 19:12:4732#include "chrome/browser/intranet_redirect_detector.h"
[email protected]0ac83682010-01-22 17:46:2733#include "chrome/browser/io_thread.h"
[email protected]dc6f4962009-02-13 01:25:5034#include "chrome/browser/metrics/metrics_service.h"
[email protected]0b565182011-03-02 18:11:1535#include "chrome/browser/metrics/thread_watcher.h"
[email protected]b2fcd0e2010-12-01 15:19:4036#include "chrome/browser/net/chrome_net_log.h"
[email protected]3530cd92010-06-27 06:22:0137#include "chrome/browser/net/predictor_api.h"
[email protected]d393a0fd2009-05-13 23:32:0138#include "chrome/browser/net/sdch_dictionary_fetcher.h"
[email protected]29672ab2009-10-30 03:44:0339#include "chrome/browser/notifications/notification_ui_manager.h"
[email protected]985655a2011-02-23 09:54:2540#include "chrome/browser/policy/browser_policy_connector.h"
[email protected]caf63aea2011-04-26 11:04:1041#include "chrome/browser/prefs/browser_prefs.h"
[email protected]37858e52010-08-26 00:22:0242#include "chrome/browser/prefs/pref_service.h"
[email protected]1459fb62011-05-25 19:03:2743#include "chrome/browser/prerender/prerender_tracker.h"
[email protected]68f88b992011-05-07 02:01:3944#include "chrome/browser/printing/background_printing_manager.h"
[email protected]e06131d2010-02-10 18:40:3345#include "chrome/browser/printing/print_job_manager.h"
[email protected]dbeebd52010-11-16 20:34:1646#include "chrome/browser/printing/print_preview_tab_controller.h"
[email protected]8ecad5e2010-12-02 21:18:3347#include "chrome/browser/profiles/profile_manager.h"
[email protected]8bcdf072011-06-03 16:52:1548#include "chrome/browser/renderer_host/chrome_resource_dispatcher_host_delegate.h"
[email protected]a7a5e992010-12-09 23:39:5149#include "chrome/browser/safe_browsing/client_side_detection_service.h"
[email protected]81218f42009-02-05 18:48:0850#include "chrome/browser/safe_browsing/safe_browsing_service.h"
[email protected]e450fa62011-02-01 12:52:5651#include "chrome/browser/shell_integration.h"
[email protected]8b8e7c92010-08-19 18:05:5652#include "chrome/browser/sidebar/sidebar_manager.h"
[email protected]9e7f015f2011-05-28 00:24:2553#include "chrome/browser/status_icons/status_tray.h"
[email protected]0b4d3382010-07-14 16:13:0454#include "chrome/browser/tab_closeable_state_watcher.h"
[email protected]71b73f02011-04-06 15:57:2955#include "chrome/browser/ui/browser_list.h"
[email protected]4ef795df2010-02-03 02:35:0856#include "chrome/common/chrome_constants.h"
[email protected]432115822011-07-10 15:52:2757#include "chrome/common/chrome_notification_types.h"
initial.commit09911bf2008-07-26 23:55:2958#include "chrome/common/chrome_paths.h"
59#include "chrome/common/chrome_switches.h"
[email protected]de23f3f2011-05-18 16:20:2360#include "chrome/common/default_plugin.h"
[email protected]f1b6de22010-03-06 12:13:4761#include "chrome/common/extensions/extension_l10n_util.h"
[email protected]985655a2011-02-23 09:54:2562#include "chrome/common/extensions/extension_resource.h"
[email protected]ea587b02010-05-21 15:01:3563#include "chrome/common/json_pref_store.h"
initial.commit09911bf2008-07-26 23:55:2964#include "chrome/common/pref_names.h"
[email protected]5c08f222010-09-22 09:37:2165#include "chrome/common/switch_utils.h"
[email protected]985655a2011-02-23 09:54:2566#include "chrome/common/url_constants.h"
[email protected]bd48c2b02010-04-09 20:32:4267#include "chrome/installer/util/google_update_constants.h"
[email protected]a01efd22011-03-01 00:38:3268#include "content/browser/browser_child_process_host.h"
69#include "content/browser/browser_thread.h"
[email protected]419a0572011-04-18 22:21:4670#include "content/browser/child_process_security_policy.h"
[email protected]b46442d7e2011-06-29 02:16:0671#include "content/browser/debugger/browser_list_tabcontents_provider.h"
72#include "content/browser/debugger/devtools_http_protocol_handler.h"
73#include "content/browser/debugger/devtools_manager.h"
74#include "content/browser/debugger/devtools_protocol_handler.h"
[email protected]d9f37932011-05-09 20:09:2475#include "content/browser/gpu/gpu_process_host_ui_shim.h"
[email protected]6eac57a2011-07-12 21:15:0976#include "content/browser/net/browser_online_state_observer.h"
[email protected]a01efd22011-03-01 00:38:3277#include "content/browser/plugin_service.h"
78#include "content/browser/renderer_host/render_process_host.h"
79#include "content/browser/renderer_host/resource_dispatcher_host.h"
[email protected]f20d7332011-03-08 21:11:5380#include "content/common/notification_service.h"
[email protected]d55aaa132009-09-28 21:08:0481#include "ipc/ipc_logging.h"
[email protected]12c84e22011-07-11 09:35:4582#include "net/socket/client_socket_pool_manager.h"
[email protected]abe2c032011-03-31 18:49:3483#include "net/url_request/url_request_context_getter.h"
[email protected]2dfeaf92011-01-10 21:08:2184#include "ui/base/clipboard/clipboard.h"
[email protected]c051a1b2011-01-21 23:30:1785#include "ui/base/l10n/l10n_util.h"
[email protected]de23f3f2011-05-18 16:20:2386#include "webkit/plugins/npapi/plugin_list.h"
[email protected]b112a4c2009-02-01 20:24:0187
88#if defined(OS_WIN)
[email protected]2362e4f2009-05-08 00:34:0589#include "views/focus/view_storage.h"
[email protected]86230b92009-11-23 20:38:3890#endif
91
[email protected]d55aaa132009-09-28 21:08:0492#if defined(IPC_MESSAGE_LOG_ENABLED)
[email protected]ff47b2962011-03-07 23:51:4993#include "content/common/child_process_messages.h"
[email protected]d55aaa132009-09-28 21:08:0494#endif
95
[email protected]db0e86dd2011-03-16 14:47:2196#if defined(OS_CHROMEOS)
97#include "chrome/browser/chromeos/proxy_config_service_impl.h"
[email protected]2d14b3732011-05-10 16:48:4498#include "chrome/browser/chromeos/web_socket_proxy_controller.h"
[email protected]db0e86dd2011-03-16 14:47:2199#endif // defined(OS_CHROMEOS)
100
[email protected]3cdacd42010-04-30 18:55:53101#if (defined(OS_WIN) || defined(OS_LINUX)) && !defined(OS_CHROMEOS)
102// How often to check if the persistent instance of Chrome needs to restart
103// to install an update.
104static const int kUpdateCheckIntervalHours = 6;
105#endif
106
[email protected]c6032e82010-09-13 20:06:05107#if defined(USE_X11)
108// How long to wait for the File thread to complete during EndSession, on
109// Linux. We have a timeout here because we're unable to run the UI messageloop
110// and there's some deadlock risk. Our only option is to exit anyway.
111static const int kEndSessionTimeoutSeconds = 10;
112#endif
113
[email protected]bb975362009-01-21 01:00:22114BrowserProcessImpl::BrowserProcessImpl(const CommandLine& command_line)
initial.commit09911bf2008-07-26 23:55:29115 : created_resource_dispatcher_host_(false),
116 created_metrics_service_(false),
117 created_io_thread_(false),
118 created_file_thread_(false),
119 created_db_thread_(false),
[email protected]914511712009-11-23 19:42:33120 created_process_launcher_thread_(false),
[email protected]875ee822010-05-18 20:58:01121 created_cache_thread_(false),
[email protected]0b565182011-03-02 18:11:15122 created_watchdog_thread_(false),
[email protected]2d14b3732011-05-10 16:48:44123#if defined(OS_CHROMEOS)
124 created_web_socket_proxy_thread_(false),
125#endif
initial.commit09911bf2008-07-26 23:55:29126 created_profile_manager_(false),
127 created_local_state_(false),
[email protected]b112a4c2009-02-01 20:24:01128 created_icon_manager_(false),
[email protected]40ecc902009-03-16 13:42:47129 created_devtools_manager_(false),
[email protected]8b8e7c92010-08-19 18:05:56130 created_sidebar_manager_(false),
[email protected]985655a2011-02-23 09:54:25131 created_browser_policy_connector_(false),
[email protected]29672ab2009-10-30 03:44:03132 created_notification_ui_manager_(false),
[email protected]462a0ff2011-06-02 17:15:34133 created_safe_browsing_service_(false),
[email protected]a7a5e992010-12-09 23:39:51134 created_safe_browsing_detection_service_(false),
initial.commit09911bf2008-07-26 23:55:29135 module_ref_count_(0),
[email protected]afd20c022010-06-10 00:48:20136 did_start_(false),
[email protected]1b2db1a2008-08-08 17:46:13137 checked_for_new_frames_(false),
[email protected]4747caf2011-03-23 20:09:21138 using_new_frames_(false) {
initial.commit09911bf2008-07-26 23:55:29139 g_browser_process = this;
[email protected]2dfeaf92011-01-10 21:08:21140 clipboard_.reset(new ui::Clipboard);
initial.commit09911bf2008-07-26 23:55:29141 main_notification_service_.reset(new NotificationService);
142
143 // Must be created after the NotificationService.
144 print_job_manager_.reset(new printing::PrintJobManager);
145
[email protected]b2fcd0e2010-12-01 15:19:40146 net_log_.reset(new ChromeNetLog);
[email protected]3ce02412011-03-01 12:01:15147
148 extension_event_router_forwarder_ = new ExtensionEventRouterForwarder;
[email protected]fc4facd2011-03-22 23:18:50149
150 ExtensionTabIdMap::GetInstance()->Init();
[email protected]6eac57a2011-07-12 21:15:09151
152 online_state_observer_.reset(new BrowserOnlineStateObserver);
initial.commit09911bf2008-07-26 23:55:29153}
154
155BrowserProcessImpl::~BrowserProcessImpl() {
[email protected]2d14b3732011-05-10 16:48:44156#if defined(OS_CHROMEOS)
157 if (web_socket_proxy_thread_.get())
158 chromeos::WebSocketProxyController::Shutdown();
159 web_socket_proxy_thread_.reset();
160#endif
161
initial.commit09911bf2008-07-26 23:55:29162 // Delete the AutomationProviderList before NotificationService,
163 // since it may try to unregister notifications
164 // Both NotificationService and AutomationProvider are singleton instances in
165 // the BrowserProcess. Since AutomationProvider may have some active
166 // notification observers, it is essential that it gets destroyed before the
167 // NotificationService. NotificationService won't be destroyed until after
168 // this destructor is run.
169 automation_provider_list_.reset();
170
[email protected]d393a0fd2009-05-13 23:32:01171 // We need to shutdown the SdchDictionaryFetcher as it regularly holds
172 // a pointer to a URLFetcher, and that URLFetcher (upon destruction) will do
173 // a PostDelayedTask onto the IO thread. This shutdown call will both discard
174 // any pending URLFetchers, and avoid creating any more.
175 SdchDictionaryFetcher::Shutdown();
176
[email protected]51ac040762011-01-20 02:01:04177 // We need to destroy the MetricsService, GoogleURLTracker,
178 // IntranetRedirectDetector, and SafeBrowsing ClientSideDetectionService
179 // before the io_thread_ gets destroyed, since their destructors can call the
180 // URLFetcher destructor, which does a PostDelayedTask operation on the IO
181 // thread. (The IO thread will handle that URLFetcher operation before going
182 // away.)
initial.commit09911bf2008-07-26 23:55:29183 metrics_service_.reset();
184 google_url_tracker_.reset();
[email protected]c4ff4952010-01-08 19:12:47185 intranet_redirect_detector_.reset();
[email protected]51ac040762011-01-20 02:01:04186 safe_browsing_detection_service_.reset();
initial.commit09911bf2008-07-26 23:55:29187
[email protected]d8a899c2010-09-21 04:50:33188 // Need to clear the desktop notification balloons before the io_thread_ and
189 // before the profiles, since if there are any still showing we will access
190 // those things during teardown.
191 notification_ui_manager_.reset();
192
initial.commit09911bf2008-07-26 23:55:29193 // Need to clear profiles (download managers) before the io_thread_.
194 profile_manager_.reset();
195
196 // Debugger must be cleaned up before IO thread and NotificationService.
[email protected]5613126e2011-01-31 15:27:55197 if (devtools_http_handler_.get()) {
198 devtools_http_handler_->Stop();
199 devtools_http_handler_ = NULL;
200 }
201 if (devtools_legacy_handler_.get()) {
202 devtools_legacy_handler_->Stop();
203 devtools_legacy_handler_ = NULL;
204 }
initial.commit09911bf2008-07-26 23:55:29205
[email protected]4b58e7d2011-07-11 10:22:56206#if defined(ENABLE_SAFE_BROWSING)
[email protected]462a0ff2011-06-02 17:15:34207 if (safe_browsing_service_.get())
208 safe_browsing_service()->ShutDown();
[email protected]4b58e7d2011-07-11 10:22:56209#endif
initial.commit09911bf2008-07-26 23:55:29210
[email protected]462a0ff2011-06-02 17:15:34211 if (resource_dispatcher_host_.get()) {
initial.commit09911bf2008-07-26 23:55:29212 // Cancel pending requests and prevent new requests.
213 resource_dispatcher_host()->Shutdown();
214 }
215
[email protected]fc4facd2011-03-22 23:18:50216 ExtensionTabIdMap::GetInstance()->Shutdown();
217
[email protected]985655a2011-02-23 09:54:25218 // The policy providers managed by |browser_policy_connector_| need to shut
219 // down while the IO and FILE threads are still alive.
220 browser_policy_connector_.reset();
[email protected]f2a893c2011-01-05 09:38:07221
[email protected]7a31f7c2011-03-21 23:22:04222 // Destroying the GpuProcessHostUIShims on the UI thread posts a task to
223 // delete related objects on the GPU thread. This must be done before
224 // stopping the GPU thread. The GPU thread will close IPC channels to renderer
225 // processes so this has to happen before stopping the IO thread.
226 GpuProcessHostUIShim::DestroyAll();
[email protected]7a31f7c2011-03-21 23:22:04227
initial.commit09911bf2008-07-26 23:55:29228 // Need to stop io_thread_ before resource_dispatcher_host_, since
229 // io_thread_ may still deref ResourceDispatcherHost and handle resource
230 // request before going away.
[email protected]0ac83682010-01-22 17:46:27231 io_thread_.reset();
initial.commit09911bf2008-07-26 23:55:29232
[email protected]875ee822010-05-18 20:58:01233 // The IO thread was the only user of this thread.
234 cache_thread_.reset();
235
[email protected]914511712009-11-23 19:42:33236 // Stop the process launcher thread after the IO thread, in case the IO thread
237 // posted a task to terminate a process on the process launcher thread.
238 process_launcher_thread_.reset();
239
initial.commit09911bf2008-07-26 23:55:29240 // Clean up state that lives on the file_thread_ before it goes away.
241 if (resource_dispatcher_host_.get()) {
242 resource_dispatcher_host()->download_file_manager()->Shutdown();
243 resource_dispatcher_host()->save_file_manager()->Shutdown();
244 }
245
246 // Need to stop the file_thread_ here to force it to process messages in its
247 // message loop from the previous call to shutdown the DownloadFileManager,
248 // SaveFileManager and SessionService.
249 file_thread_.reset();
250
251 // With the file_thread_ flushed, we can release any icon resources.
252 icon_manager_.reset();
253
254 // Need to destroy ResourceDispatcherHost before PluginService and
[email protected]49f28bc72010-02-04 00:10:01255 // SafeBrowsingService, since it caches a pointer to it. This also
256 // causes the webkit thread to terminate.
initial.commit09911bf2008-07-26 23:55:29257 resource_dispatcher_host_.reset();
258
259 // Wait for the pending print jobs to finish.
260 print_job_manager_->OnQuit();
261 print_job_manager_.reset();
262
[email protected]0b4d3382010-07-14 16:13:04263 // Destroy TabCloseableStateWatcher before NotificationService since the
264 // former registers for notifications.
265 tab_closeable_state_watcher_.reset();
266
initial.commit09911bf2008-07-26 23:55:29267 // Now OK to destroy NotificationService.
268 main_notification_service_.reset();
269
[email protected]0b565182011-03-02 18:11:15270 // Stop the watchdog thread after stopping other threads.
271 watchdog_thread_.reset();
272
initial.commit09911bf2008-07-26 23:55:29273 g_browser_process = NULL;
274}
275
[email protected]c6032e82010-09-13 20:06:05276#if defined(OS_WIN)
[email protected]295039bd2008-08-15 04:32:57277// Send a QuitTask to the given MessageLoop.
278static void PostQuit(MessageLoop* message_loop) {
279 message_loop->PostTask(FROM_HERE, new MessageLoop::QuitTask());
280}
[email protected]c6032e82010-09-13 20:06:05281#elif defined(USE_X11)
282static void Signal(base::WaitableEvent* event) {
283 event->Signal();
284}
285#endif
initial.commit09911bf2008-07-26 23:55:29286
[email protected]b443cb042009-12-15 22:05:09287unsigned int BrowserProcessImpl::AddRefModule() {
288 DCHECK(CalledOnValidThread());
[email protected]afd20c022010-06-10 00:48:20289 did_start_ = true;
[email protected]b443cb042009-12-15 22:05:09290 module_ref_count_++;
291 return module_ref_count_;
292}
293
294unsigned int BrowserProcessImpl::ReleaseModule() {
295 DCHECK(CalledOnValidThread());
[email protected]760d970a2010-05-18 00:39:18296 DCHECK_NE(0u, module_ref_count_);
[email protected]b443cb042009-12-15 22:05:09297 module_ref_count_--;
298 if (0 == module_ref_count_) {
[email protected]7d038c32010-12-14 00:40:00299 // Allow UI and IO threads to do blocking IO on shutdown, since we do a lot
300 // of it on shutdown for valid reasons.
301 base::ThreadRestrictions::SetIOAllowed(true);
302 io_thread()->message_loop()->PostTask(
303 FROM_HERE,
304 NewRunnableFunction(&base::ThreadRestrictions::SetIOAllowed, true));
[email protected]b443cb042009-12-15 22:05:09305 MessageLoop::current()->PostTask(
[email protected]34f73fb2010-03-24 20:50:34306 FROM_HERE, NewRunnableFunction(DidEndMainMessageLoop));
[email protected]b443cb042009-12-15 22:05:09307 MessageLoop::current()->Quit();
308 }
309 return module_ref_count_;
310}
311
initial.commit09911bf2008-07-26 23:55:29312void BrowserProcessImpl::EndSession() {
initial.commit09911bf2008-07-26 23:55:29313 // Mark all the profiles as clean.
314 ProfileManager* pm = profile_manager();
[email protected]844a1002011-04-19 11:37:21315 std::vector<Profile*> profiles(pm->GetLoadedProfiles());
316 for (size_t i = 0; i < profiles.size(); ++i)
317 profiles[i]->MarkAsCleanShutdown();
initial.commit09911bf2008-07-26 23:55:29318
319 // Tell the metrics service it was cleanly shutdown.
320 MetricsService* metrics = g_browser_process->metrics_service();
321 if (metrics && local_state()) {
initial.commit09911bf2008-07-26 23:55:29322 metrics->RecordStartOfSessionEnd();
323
324 // MetricsService lazily writes to prefs, force it to write now.
[email protected]6faa0e0d2009-04-28 06:50:36325 local_state()->SavePersistentPrefs();
initial.commit09911bf2008-07-26 23:55:29326 }
327
328 // We must write that the profile and metrics service shutdown cleanly,
329 // otherwise on startup we'll think we crashed. So we block until done and
330 // then proceed with normal shutdown.
[email protected]c6032e82010-09-13 20:06:05331#if defined(USE_X11)
332 // Can't run a local loop on linux. Instead create a waitable event.
333 base::WaitableEvent done_writing(false, false);
[email protected]d04e7662010-10-10 22:24:48334 BrowserThread::PostTask(BrowserThread::FILE, FROM_HERE,
[email protected]c6032e82010-09-13 20:06:05335 NewRunnableFunction(Signal, &done_writing));
336 done_writing.TimedWait(
337 base::TimeDelta::FromSeconds(kEndSessionTimeoutSeconds));
338#elif defined(OS_WIN)
[email protected]d04e7662010-10-10 22:24:48339 BrowserThread::PostTask(BrowserThread::FILE, FROM_HERE,
[email protected]295039bd2008-08-15 04:32:57340 NewRunnableFunction(PostQuit, MessageLoop::current()));
initial.commit09911bf2008-07-26 23:55:29341 MessageLoop::current()->Run();
[email protected]c6032e82010-09-13 20:06:05342#else
343 NOTIMPLEMENTED();
344#endif
initial.commit09911bf2008-07-26 23:55:29345}
346
[email protected]e13ad79b2010-07-22 21:36:50347ResourceDispatcherHost* BrowserProcessImpl::resource_dispatcher_host() {
348 DCHECK(CalledOnValidThread());
349 if (!created_resource_dispatcher_host_)
350 CreateResourceDispatcherHost();
351 return resource_dispatcher_host_.get();
352}
353
354MetricsService* BrowserProcessImpl::metrics_service() {
355 DCHECK(CalledOnValidThread());
356 if (!created_metrics_service_)
357 CreateMetricsService();
358 return metrics_service_.get();
359}
360
361IOThread* BrowserProcessImpl::io_thread() {
362 DCHECK(CalledOnValidThread());
363 if (!created_io_thread_)
364 CreateIOThread();
365 return io_thread_.get();
366}
367
368base::Thread* BrowserProcessImpl::file_thread() {
369 DCHECK(CalledOnValidThread());
370 if (!created_file_thread_)
371 CreateFileThread();
372 return file_thread_.get();
373}
374
375base::Thread* BrowserProcessImpl::db_thread() {
376 DCHECK(CalledOnValidThread());
377 if (!created_db_thread_)
378 CreateDBThread();
379 return db_thread_.get();
380}
381
382base::Thread* BrowserProcessImpl::process_launcher_thread() {
383 DCHECK(CalledOnValidThread());
384 if (!created_process_launcher_thread_)
385 CreateProcessLauncherThread();
386 return process_launcher_thread_.get();
387}
388
389base::Thread* BrowserProcessImpl::cache_thread() {
390 DCHECK(CalledOnValidThread());
391 if (!created_cache_thread_)
392 CreateCacheThread();
393 return cache_thread_.get();
394}
395
[email protected]0b565182011-03-02 18:11:15396WatchDogThread* BrowserProcessImpl::watchdog_thread() {
397 DCHECK(CalledOnValidThread());
398 if (!created_watchdog_thread_)
399 CreateWatchdogThread();
400 DCHECK(watchdog_thread_.get() != NULL);
401 return watchdog_thread_.get();
402}
403
[email protected]2d14b3732011-05-10 16:48:44404#if defined(OS_CHROMEOS)
405base::Thread* BrowserProcessImpl::web_socket_proxy_thread() {
406 DCHECK(CalledOnValidThread());
407 if (!created_web_socket_proxy_thread_)
408 CreateWebSocketProxyThread();
409 DCHECK(web_socket_proxy_thread_.get() != NULL);
410 return web_socket_proxy_thread_.get();
411}
412#endif
413
[email protected]e13ad79b2010-07-22 21:36:50414ProfileManager* BrowserProcessImpl::profile_manager() {
415 DCHECK(CalledOnValidThread());
416 if (!created_profile_manager_)
417 CreateProfileManager();
418 return profile_manager_.get();
419}
420
421PrefService* BrowserProcessImpl::local_state() {
422 DCHECK(CalledOnValidThread());
423 if (!created_local_state_)
424 CreateLocalState();
425 return local_state_.get();
426}
427
428DevToolsManager* BrowserProcessImpl::devtools_manager() {
429 DCHECK(CalledOnValidThread());
430 if (!created_devtools_manager_)
431 CreateDevToolsManager();
432 return devtools_manager_.get();
433}
434
[email protected]8b8e7c92010-08-19 18:05:56435SidebarManager* BrowserProcessImpl::sidebar_manager() {
436 DCHECK(CalledOnValidThread());
437 if (!created_sidebar_manager_)
438 CreateSidebarManager();
439 return sidebar_manager_.get();
440}
441
[email protected]2dfeaf92011-01-10 21:08:21442ui::Clipboard* BrowserProcessImpl::clipboard() {
[email protected]e13ad79b2010-07-22 21:36:50443 DCHECK(CalledOnValidThread());
444 return clipboard_.get();
445}
446
[email protected]abe2c032011-03-31 18:49:34447net::URLRequestContextGetter* BrowserProcessImpl::system_request_context() {
[email protected]db0e86dd2011-03-16 14:47:21448 DCHECK(CalledOnValidThread());
449 return io_thread()->system_url_request_context_getter();
450}
451
452#if defined(OS_CHROMEOS)
453chromeos::ProxyConfigServiceImpl*
454BrowserProcessImpl::chromeos_proxy_config_service_impl() {
455 DCHECK(CalledOnValidThread());
456 if (!chromeos_proxy_config_service_impl_) {
457 chromeos_proxy_config_service_impl_ =
458 new chromeos::ProxyConfigServiceImpl();
459 }
460 return chromeos_proxy_config_service_impl_;
461}
462#endif // defined(OS_CHROMEOS)
463
[email protected]3ce02412011-03-01 12:01:15464ExtensionEventRouterForwarder*
465BrowserProcessImpl::extension_event_router_forwarder() {
466 return extension_event_router_forwarder_.get();
467}
468
[email protected]e13ad79b2010-07-22 21:36:50469NotificationUIManager* BrowserProcessImpl::notification_ui_manager() {
470 DCHECK(CalledOnValidThread());
471 if (!created_notification_ui_manager_)
472 CreateNotificationUIManager();
473 return notification_ui_manager_.get();
474}
475
[email protected]985655a2011-02-23 09:54:25476policy::BrowserPolicyConnector* BrowserProcessImpl::browser_policy_connector() {
[email protected]f2a893c2011-01-05 09:38:07477 DCHECK(CalledOnValidThread());
[email protected]985655a2011-02-23 09:54:25478 if (!created_browser_policy_connector_) {
479 DCHECK(browser_policy_connector_.get() == NULL);
480 created_browser_policy_connector_ = true;
[email protected]f31e2e52011-07-14 16:01:19481#if defined(ENABLE_CONFIGURATION_POLICY)
[email protected]d9ee002c2011-04-27 12:52:54482 browser_policy_connector_.reset(policy::BrowserPolicyConnector::Create());
[email protected]f31e2e52011-07-14 16:01:19483#endif
[email protected]f2a893c2011-01-05 09:38:07484 }
[email protected]985655a2011-02-23 09:54:25485 return browser_policy_connector_.get();
[email protected]f2a893c2011-01-05 09:38:07486}
487
[email protected]e13ad79b2010-07-22 21:36:50488IconManager* BrowserProcessImpl::icon_manager() {
489 DCHECK(CalledOnValidThread());
490 if (!created_icon_manager_)
491 CreateIconManager();
492 return icon_manager_.get();
493}
494
495ThumbnailGenerator* BrowserProcessImpl::GetThumbnailGenerator() {
496 return &thumbnail_generator_;
497}
498
499AutomationProviderList* BrowserProcessImpl::InitAutomationProviderList() {
500 DCHECK(CalledOnValidThread());
501 if (automation_provider_list_.get() == NULL) {
502 automation_provider_list_.reset(AutomationProviderList::GetInstance());
503 }
504 return automation_provider_list_.get();
505}
506
[email protected]5613126e2011-01-31 15:27:55507void BrowserProcessImpl::InitDevToolsHttpProtocolHandler(
[email protected]01000cf12011-02-04 11:39:22508 const std::string& ip,
[email protected]5613126e2011-01-31 15:27:55509 int port,
510 const std::string& frontend_url) {
[email protected]e13ad79b2010-07-22 21:36:50511 DCHECK(CalledOnValidThread());
[email protected]5613126e2011-01-31 15:27:55512 devtools_http_handler_ =
[email protected]01000cf12011-02-04 11:39:22513 DevToolsHttpProtocolHandler::Start(ip,
514 port,
[email protected]9678cb42011-01-31 18:49:42515 frontend_url,
516 new BrowserListTabContentsProvider());
[email protected]5613126e2011-01-31 15:27:55517}
518
519void BrowserProcessImpl::InitDevToolsLegacyProtocolHandler(int port) {
520 DCHECK(CalledOnValidThread());
521 devtools_legacy_handler_ = DevToolsProtocolHandler::Start(port);
[email protected]e13ad79b2010-07-22 21:36:50522}
523
524bool BrowserProcessImpl::IsShuttingDown() {
525 DCHECK(CalledOnValidThread());
526 return did_start_ && 0 == module_ref_count_;
527}
528
initial.commit09911bf2008-07-26 23:55:29529printing::PrintJobManager* BrowserProcessImpl::print_job_manager() {
530 // TODO(abarth): DCHECK(CalledOnValidThread());
[email protected]d8922f22010-05-07 00:57:27531 // http://code.google.com/p/chromium/issues/detail?id=6828
initial.commit09911bf2008-07-26 23:55:29532 // print_job_manager_ is initialized in the constructor and destroyed in the
533 // destructor, so it should always be valid.
534 DCHECK(print_job_manager_.get());
535 return print_job_manager_.get();
536}
537
[email protected]dbeebd52010-11-16 20:34:16538printing::PrintPreviewTabController*
539 BrowserProcessImpl::print_preview_tab_controller() {
540 DCHECK(CalledOnValidThread());
541 if (!print_preview_tab_controller_.get())
542 CreatePrintPreviewTabController();
543 return print_preview_tab_controller_.get();
544}
545
[email protected]68f88b992011-05-07 02:01:39546printing::BackgroundPrintingManager*
547 BrowserProcessImpl::background_printing_manager() {
548 DCHECK(CalledOnValidThread());
549 if (!background_printing_manager_.get())
550 CreateBackgroundPrintingManager();
551 return background_printing_manager_.get();
552}
553
[email protected]e13ad79b2010-07-22 21:36:50554GoogleURLTracker* BrowserProcessImpl::google_url_tracker() {
555 DCHECK(CalledOnValidThread());
556 if (!google_url_tracker_.get())
557 CreateGoogleURLTracker();
558 return google_url_tracker_.get();
559}
560
561IntranetRedirectDetector* BrowserProcessImpl::intranet_redirect_detector() {
562 DCHECK(CalledOnValidThread());
563 if (!intranet_redirect_detector_.get())
564 CreateIntranetRedirectDetector();
565 return intranet_redirect_detector_.get();
566}
567
568const std::string& BrowserProcessImpl::GetApplicationLocale() {
569 DCHECK(!locale_.empty());
570 return locale_;
571}
572
573void BrowserProcessImpl::SetApplicationLocale(const std::string& locale) {
574 locale_ = locale;
575 extension_l10n_util::SetProcessLocale(locale);
576}
577
[email protected]073ed7b2010-09-27 09:20:02578DownloadStatusUpdater* BrowserProcessImpl::download_status_updater() {
579 return &download_status_updater_;
580}
581
[email protected]e13ad79b2010-07-22 21:36:50582TabCloseableStateWatcher* BrowserProcessImpl::tab_closeable_state_watcher() {
583 DCHECK(CalledOnValidThread());
584 if (!tab_closeable_state_watcher_.get())
585 CreateTabCloseableStateWatcher();
586 return tab_closeable_state_watcher_.get();
587}
588
[email protected]9e7f015f2011-05-28 00:24:25589BackgroundModeManager* BrowserProcessImpl::background_mode_manager() {
590 DCHECK(CalledOnValidThread());
591 if (!background_mode_manager_.get())
592 CreateBackgroundModeManager();
593 return background_mode_manager_.get();
594}
595
596StatusTray* BrowserProcessImpl::status_tray() {
597 DCHECK(CalledOnValidThread());
598 if (!status_tray_.get())
599 CreateStatusTray();
600 return status_tray_.get();
601}
602
[email protected]462a0ff2011-06-02 17:15:34603
604SafeBrowsingService* BrowserProcessImpl::safe_browsing_service() {
605 DCHECK(CalledOnValidThread());
606 if (!created_safe_browsing_service_)
607 CreateSafeBrowsingService();
608 return safe_browsing_service_.get();
609}
610
[email protected]a7a5e992010-12-09 23:39:51611safe_browsing::ClientSideDetectionService*
612 BrowserProcessImpl::safe_browsing_detection_service() {
613 DCHECK(CalledOnValidThread());
[email protected]462a0ff2011-06-02 17:15:34614 if (!created_safe_browsing_detection_service_)
[email protected]a7a5e992010-12-09 23:39:51615 CreateSafeBrowsingDetectionService();
[email protected]a7a5e992010-12-09 23:39:51616 return safe_browsing_detection_service_.get();
617}
618
[email protected]8b08a47f2011-02-25 12:36:37619bool BrowserProcessImpl::plugin_finder_disabled() const {
620 return *plugin_finder_disabled_pref_;
621}
622
[email protected]432115822011-07-10 15:52:27623void BrowserProcessImpl::Observe(int type,
[email protected]6618d1d2010-12-15 21:18:47624 const NotificationSource& source,
625 const NotificationDetails& details) {
[email protected]432115822011-07-10 15:52:27626 if (type == chrome::NOTIFICATION_PREF_CHANGED) {
[email protected]e450fa62011-02-01 12:52:56627 std::string* pref = Details<std::string>(details).ptr();
628 if (*pref == prefs::kDefaultBrowserSettingEnabled) {
629 if (local_state_->GetBoolean(prefs::kDefaultBrowserSettingEnabled))
630 ShellIntegration::SetAsDefaultBrowser();
[email protected]419a0572011-04-18 22:21:46631 } else if (*pref == prefs::kDisabledSchemes) {
632 ApplyDisabledSchemesPolicy();
[email protected]40850a52011-05-26 22:07:35633 } else if (*pref == prefs::kAllowCrossOriginAuthPrompt) {
634 ApplyAllowCrossOriginAuthPromptPolicy();
[email protected]e450fa62011-02-01 12:52:56635 }
[email protected]6618d1d2010-12-15 21:18:47636 } else {
637 NOTREACHED();
638 }
639}
640
[email protected]e13ad79b2010-07-22 21:36:50641#if (defined(OS_WIN) || defined(OS_LINUX)) && !defined(OS_CHROMEOS)
642void BrowserProcessImpl::StartAutoupdateTimer() {
643 autoupdate_timer_.Start(
644 base::TimeDelta::FromHours(kUpdateCheckIntervalHours),
645 this,
646 &BrowserProcessImpl::OnAutoupdateTimer);
647}
648#endif
649
[email protected]d6f37fc2011-02-13 23:58:41650ChromeNetLog* BrowserProcessImpl::net_log() {
651 return net_log_.get();
652}
653
[email protected]1459fb62011-05-25 19:03:27654prerender::PrerenderTracker* BrowserProcessImpl::prerender_tracker() {
655 if (!prerender_tracker_.get())
656 prerender_tracker_.reset(new prerender::PrerenderTracker);
657
658 return prerender_tracker_.get();
659}
660
[email protected]e7f009d2011-06-14 19:35:10661MHTMLGenerationManager* BrowserProcessImpl::mhtml_generation_manager() {
662 if (!mhtml_generation_manager_.get())
663 mhtml_generation_manager_ = new MHTMLGenerationManager();
664
665 return mhtml_generation_manager_.get();
666}
667
initial.commit09911bf2008-07-26 23:55:29668void BrowserProcessImpl::CreateResourceDispatcherHost() {
669 DCHECK(!created_resource_dispatcher_host_ &&
670 resource_dispatcher_host_.get() == NULL);
671 created_resource_dispatcher_host_ = true;
672
[email protected]214538842011-04-01 18:47:24673 // UserScriptListener will delete itself.
674 ResourceQueue::DelegateSet resource_queue_delegates;
675 resource_queue_delegates.insert(new UserScriptListener());
676
677 resource_dispatcher_host_.reset(
678 new ResourceDispatcherHost(resource_queue_delegates));
initial.commit09911bf2008-07-26 23:55:29679 resource_dispatcher_host_->Initialize();
[email protected]1459fb62011-05-25 19:03:27680
[email protected]8bcdf072011-06-03 16:52:15681 resource_dispatcher_host_delegate_.reset(
682 new ChromeResourceDispatcherHostDelegate(resource_dispatcher_host_.get(),
[email protected]92e0a612011-05-30 21:37:00683 prerender_tracker()));
[email protected]8bcdf072011-06-03 16:52:15684 resource_dispatcher_host_->set_delegate(
685 resource_dispatcher_host_delegate_.get());
[email protected]40850a52011-05-26 22:07:35686
687 pref_change_registrar_.Add(prefs::kAllowCrossOriginAuthPrompt, this);
688 ApplyAllowCrossOriginAuthPromptPolicy();
initial.commit09911bf2008-07-26 23:55:29689}
690
691void BrowserProcessImpl::CreateMetricsService() {
692 DCHECK(!created_metrics_service_ && metrics_service_.get() == NULL);
693 created_metrics_service_ = true;
694
695 metrics_service_.reset(new MetricsService);
696}
697
698void BrowserProcessImpl::CreateIOThread() {
699 DCHECK(!created_io_thread_ && io_thread_.get() == NULL);
700 created_io_thread_ = true;
701
702 // Prior to starting the io thread, we create the plugin service as
703 // it is predominantly used from the io thread, but must be created
704 // on the main thread. The service ctor is inexpensive and does not
705 // invoke the io_thread() accessor.
706 PluginService::GetInstance();
707
[email protected]de23f3f2011-05-18 16:20:23708 // Add the Chrome specific plugins.
709 chrome::RegisterInternalDefaultPlugin();
710
711 // Register the internal Flash if available.
712 FilePath path;
713 if (!CommandLine::ForCurrentProcess()->HasSwitch(
714 switches::kDisableInternalFlash) &&
715 PathService::Get(chrome::FILE_FLASH_PLUGIN, &path)) {
716 webkit::npapi::PluginList::Singleton()->AddExtraPluginPath(path);
717 }
718
[email protected]f1933792011-06-14 00:49:34719#if defined(OS_POSIX)
720 // Also find plugins in a user-specific plugins dir,
721 // e.g. ~/.config/chromium/Plugins.
722 FilePath user_data_dir;
723 if (PathService::Get(chrome::DIR_USER_DATA, &user_data_dir)) {
724 webkit::npapi::PluginList::Singleton()->AddExtraPluginDir(
725 user_data_dir.Append("Plugins"));
726 }
727#endif
728
[email protected]3ce02412011-03-01 12:01:15729 scoped_ptr<IOThread> thread(new IOThread(
730 local_state(), net_log_.get(), extension_event_router_forwarder_.get()));
[email protected]ab820df2008-08-26 05:55:10731 base::Thread::Options options;
732 options.message_loop_type = MessageLoop::TYPE_IO;
733 if (!thread->StartWithOptions(options))
initial.commit09911bf2008-07-26 23:55:29734 return;
735 io_thread_.swap(thread);
736}
737
738void BrowserProcessImpl::CreateFileThread() {
739 DCHECK(!created_file_thread_ && file_thread_.get() == NULL);
740 created_file_thread_ = true;
741
[email protected]ab820df2008-08-26 05:55:10742 scoped_ptr<base::Thread> thread(
[email protected]d04e7662010-10-10 22:24:48743 new BrowserProcessSubThread(BrowserThread::FILE));
[email protected]a1db3842008-09-17 22:04:06744 base::Thread::Options options;
[email protected]9e549b582009-02-05 21:13:39745#if defined(OS_WIN)
746 // On Windows, the FILE thread needs to be have a UI message loop which pumps
747 // messages in such a way that Google Update can communicate back to us.
[email protected]a1db3842008-09-17 22:04:06748 options.message_loop_type = MessageLoop::TYPE_UI;
[email protected]9e549b582009-02-05 21:13:39749#else
750 options.message_loop_type = MessageLoop::TYPE_IO;
751#endif
[email protected]a1db3842008-09-17 22:04:06752 if (!thread->StartWithOptions(options))
initial.commit09911bf2008-07-26 23:55:29753 return;
754 file_thread_.swap(thread);
755}
756
[email protected]2d14b3732011-05-10 16:48:44757#if defined(OS_CHROMEOS)
758void BrowserProcessImpl::CreateWebSocketProxyThread() {
759 DCHECK(!created_web_socket_proxy_thread_);
760 DCHECK(web_socket_proxy_thread_.get() == NULL);
761 created_web_socket_proxy_thread_ = true;
762
763 scoped_ptr<base::Thread> thread(
764 new BrowserProcessSubThread(BrowserThread::WEB_SOCKET_PROXY));
765 base::Thread::Options options;
766 options.message_loop_type = MessageLoop::TYPE_IO;
767 if (!thread->StartWithOptions(options))
768 return;
769 web_socket_proxy_thread_.swap(thread);
770}
771#endif
772
initial.commit09911bf2008-07-26 23:55:29773void BrowserProcessImpl::CreateDBThread() {
774 DCHECK(!created_db_thread_ && db_thread_.get() == NULL);
775 created_db_thread_ = true;
776
[email protected]ab820df2008-08-26 05:55:10777 scoped_ptr<base::Thread> thread(
[email protected]d04e7662010-10-10 22:24:48778 new BrowserProcessSubThread(BrowserThread::DB));
initial.commit09911bf2008-07-26 23:55:29779 if (!thread->Start())
780 return;
781 db_thread_.swap(thread);
782}
783
[email protected]914511712009-11-23 19:42:33784void BrowserProcessImpl::CreateProcessLauncherThread() {
785 DCHECK(!created_process_launcher_thread_ && !process_launcher_thread_.get());
786 created_process_launcher_thread_ = true;
787
788 scoped_ptr<base::Thread> thread(
[email protected]d04e7662010-10-10 22:24:48789 new BrowserProcessSubThread(BrowserThread::PROCESS_LAUNCHER));
[email protected]914511712009-11-23 19:42:33790 if (!thread->Start())
791 return;
792 process_launcher_thread_.swap(thread);
793}
794
[email protected]875ee822010-05-18 20:58:01795void BrowserProcessImpl::CreateCacheThread() {
796 DCHECK(!created_cache_thread_ && !cache_thread_.get());
797 created_cache_thread_ = true;
798
799 scoped_ptr<base::Thread> thread(
[email protected]75096332010-11-09 03:28:13800 new BrowserThread(BrowserThread::CACHE));
[email protected]875ee822010-05-18 20:58:01801 base::Thread::Options options;
802 options.message_loop_type = MessageLoop::TYPE_IO;
803 if (!thread->StartWithOptions(options))
804 return;
805 cache_thread_.swap(thread);
806}
807
[email protected]0b565182011-03-02 18:11:15808void BrowserProcessImpl::CreateWatchdogThread() {
809 DCHECK(!created_watchdog_thread_ && watchdog_thread_.get() == NULL);
810 created_watchdog_thread_ = true;
811
812 scoped_ptr<WatchDogThread> thread(new WatchDogThread());
813 if (!thread->Start())
814 return;
815 watchdog_thread_.swap(thread);
816}
817
initial.commit09911bf2008-07-26 23:55:29818void BrowserProcessImpl::CreateProfileManager() {
819 DCHECK(!created_profile_manager_ && profile_manager_.get() == NULL);
820 created_profile_manager_ = true;
821
822 profile_manager_.reset(new ProfileManager());
823}
824
825void BrowserProcessImpl::CreateLocalState() {
826 DCHECK(!created_local_state_ && local_state_.get() == NULL);
827 created_local_state_ = true;
828
[email protected]b9636002009-03-04 00:05:25829 FilePath local_state_path;
initial.commit09911bf2008-07-26 23:55:29830 PathService::Get(chrome::FILE_LOCAL_STATE, &local_state_path);
[email protected]f2d1f612010-12-09 15:10:17831 local_state_.reset(
[email protected]fcf53572011-06-29 15:44:37832 PrefService::CreatePrefService(local_state_path, NULL, false));
[email protected]492d2142010-09-10 13:55:18833
[email protected]caf63aea2011-04-26 11:04:10834 // Initialize the prefs of the local state.
835 browser::RegisterLocalState(local_state_.get());
836
[email protected]2a7e7c152010-10-01 20:12:09837 pref_change_registrar_.Init(local_state_.get());
838
[email protected]f16b9662011-04-27 10:06:07839 print_job_manager_->InitOnUIThread(local_state_.get());
[email protected]e450fa62011-02-01 12:52:56840
841 // Initialize the notification for the default browser setting policy.
842 local_state_->RegisterBooleanPref(prefs::kDefaultBrowserSettingEnabled,
843 false);
844 if (local_state_->IsManagedPreference(prefs::kDefaultBrowserSettingEnabled)) {
845 if (local_state_->GetBoolean(prefs::kDefaultBrowserSettingEnabled))
846 ShellIntegration::SetAsDefaultBrowser();
847 }
848 pref_change_registrar_.Add(prefs::kDefaultBrowserSettingEnabled, this);
[email protected]8b08a47f2011-02-25 12:36:37849
850 // Initialize the preference for the plugin finder policy.
851 // This preference is only needed on the IO thread so make it available there.
852 local_state_->RegisterBooleanPref(prefs::kDisablePluginFinder, false);
853 plugin_finder_disabled_pref_.Init(prefs::kDisablePluginFinder,
854 local_state_.get(), NULL);
855 plugin_finder_disabled_pref_.MoveToThread(BrowserThread::IO);
[email protected]419a0572011-04-18 22:21:46856
[email protected]1f8110b2011-05-24 14:48:30857 // Initialize the disk cache location policy. This policy is not hot update-
858 // able so we need to have it when initializing the profiles.
859 local_state_->RegisterFilePathPref(prefs::kDiskCacheDir, FilePath());
860
[email protected]12c84e22011-07-11 09:35:45861 // Another policy that needs to be defined before the net subsystem is
862 // initialized is MaxConnectionsPerProxy so we do it here.
863 local_state_->RegisterIntegerPref(prefs::kMaxConnectionsPerProxy,
864 net::kDefaultMaxSocketsPerProxyServer);
865 int max_per_proxy = local_state_->GetInteger(prefs::kMaxConnectionsPerProxy);
866 net::ClientSocketPoolManager::set_max_sockets_per_proxy_server(
867 std::max(std::min(max_per_proxy, 99),
868 net::ClientSocketPoolManager::max_sockets_per_group()));
869
[email protected]b99c41c2011-04-27 15:18:48870 // This is observed by ChildProcessSecurityPolicy, which lives in content/
871 // though, so it can't register itself.
[email protected]419a0572011-04-18 22:21:46872 local_state_->RegisterListPref(prefs::kDisabledSchemes);
[email protected]b99c41c2011-04-27 15:18:48873 pref_change_registrar_.Add(prefs::kDisabledSchemes, this);
[email protected]419a0572011-04-18 22:21:46874 ApplyDisabledSchemesPolicy();
[email protected]fd6159a2010-09-03 09:38:39875}
initial.commit09911bf2008-07-26 23:55:29876
initial.commit09911bf2008-07-26 23:55:29877void BrowserProcessImpl::CreateIconManager() {
878 DCHECK(!created_icon_manager_ && icon_manager_.get() == NULL);
879 created_icon_manager_ = true;
880 icon_manager_.reset(new IconManager);
881}
882
[email protected]40ecc902009-03-16 13:42:47883void BrowserProcessImpl::CreateDevToolsManager() {
[email protected]73ee01522009-06-05 10:13:44884 DCHECK(devtools_manager_.get() == NULL);
[email protected]40ecc902009-03-16 13:42:47885 created_devtools_manager_ = true;
[email protected]73ee01522009-06-05 10:13:44886 devtools_manager_ = new DevToolsManager();
[email protected]40ecc902009-03-16 13:42:47887}
888
[email protected]8b8e7c92010-08-19 18:05:56889void BrowserProcessImpl::CreateSidebarManager() {
890 DCHECK(sidebar_manager_.get() == NULL);
891 created_sidebar_manager_ = true;
892 sidebar_manager_ = new SidebarManager();
893}
894
initial.commit09911bf2008-07-26 23:55:29895void BrowserProcessImpl::CreateGoogleURLTracker() {
896 DCHECK(google_url_tracker_.get() == NULL);
897 scoped_ptr<GoogleURLTracker> google_url_tracker(new GoogleURLTracker);
898 google_url_tracker_.swap(google_url_tracker);
899}
[email protected]6641bf662009-08-21 00:34:09900
[email protected]c4ff4952010-01-08 19:12:47901void BrowserProcessImpl::CreateIntranetRedirectDetector() {
902 DCHECK(intranet_redirect_detector_.get() == NULL);
903 scoped_ptr<IntranetRedirectDetector> intranet_redirect_detector(
904 new IntranetRedirectDetector);
905 intranet_redirect_detector_.swap(intranet_redirect_detector);
906}
907
[email protected]29672ab2009-10-30 03:44:03908void BrowserProcessImpl::CreateNotificationUIManager() {
909 DCHECK(notification_ui_manager_.get() == NULL);
[email protected]b0b2a3dd2011-01-06 00:30:05910 notification_ui_manager_.reset(NotificationUIManager::Create(local_state()));
911
[email protected]29672ab2009-10-30 03:44:03912 created_notification_ui_manager_ = true;
913}
914
[email protected]0b4d3382010-07-14 16:13:04915void BrowserProcessImpl::CreateTabCloseableStateWatcher() {
916 DCHECK(tab_closeable_state_watcher_.get() == NULL);
917 tab_closeable_state_watcher_.reset(TabCloseableStateWatcher::Create());
918}
919
[email protected]9e7f015f2011-05-28 00:24:25920void BrowserProcessImpl::CreateBackgroundModeManager() {
921 DCHECK(background_mode_manager_.get() == NULL);
922 background_mode_manager_.reset(
923 new BackgroundModeManager(CommandLine::ForCurrentProcess()));
924}
925
926void BrowserProcessImpl::CreateStatusTray() {
927 DCHECK(status_tray_.get() == NULL);
928 status_tray_.reset(StatusTray::Create());
929}
930
[email protected]dbeebd52010-11-16 20:34:16931void BrowserProcessImpl::CreatePrintPreviewTabController() {
932 DCHECK(print_preview_tab_controller_.get() == NULL);
933 print_preview_tab_controller_ = new printing::PrintPreviewTabController();
934}
935
[email protected]68f88b992011-05-07 02:01:39936void BrowserProcessImpl::CreateBackgroundPrintingManager() {
937 DCHECK(background_printing_manager_.get() == NULL);
938 background_printing_manager_.reset(new printing::BackgroundPrintingManager());
939}
940
[email protected]462a0ff2011-06-02 17:15:34941void BrowserProcessImpl::CreateSafeBrowsingService() {
942 DCHECK(safe_browsing_service_.get() == NULL);
[email protected]8c40da62011-07-13 22:58:46943 // Set this flag to true so that we don't retry indefinitely to
944 // create the service class if there was an error.
[email protected]462a0ff2011-06-02 17:15:34945 created_safe_browsing_service_ = true;
[email protected]4b58e7d2011-07-11 10:22:56946#if defined(ENABLE_SAFE_BROWSING)
[email protected]462a0ff2011-06-02 17:15:34947 safe_browsing_service_ = SafeBrowsingService::CreateSafeBrowsingService();
948 safe_browsing_service_->Initialize();
[email protected]4b58e7d2011-07-11 10:22:56949#endif
[email protected]462a0ff2011-06-02 17:15:34950}
951
[email protected]a7a5e992010-12-09 23:39:51952void BrowserProcessImpl::CreateSafeBrowsingDetectionService() {
953 DCHECK(safe_browsing_detection_service_.get() == NULL);
954 // Set this flag to true so that we don't retry indefinitely to
955 // create the service class if there was an error.
956 created_safe_browsing_detection_service_ = true;
957
[email protected]4b58e7d2011-07-11 10:22:56958#if defined(ENABLE_SAFE_BROWSING)
[email protected]cae64fe2011-06-17 17:54:50959 FilePath model_file_dir;
[email protected]a7a5e992010-12-09 23:39:51960 if (IsSafeBrowsingDetectionServiceEnabled() &&
[email protected]8c40da62011-07-13 22:58:46961 PathService::Get(chrome::DIR_USER_DATA, &model_file_dir)) {
[email protected]a7a5e992010-12-09 23:39:51962 safe_browsing_detection_service_.reset(
963 safe_browsing::ClientSideDetectionService::Create(
[email protected]8c40da62011-07-13 22:58:46964 model_file_dir, g_browser_process->system_request_context()));
[email protected]a7a5e992010-12-09 23:39:51965 }
[email protected]4b58e7d2011-07-11 10:22:56966#endif
[email protected]a7a5e992010-12-09 23:39:51967}
968
969bool BrowserProcessImpl::IsSafeBrowsingDetectionServiceEnabled() {
970 // The safe browsing client-side detection is enabled only if the switch is
[email protected]436ebd62011-06-09 22:08:11971 // not disabled and when safe browsing related stats are allowed to be
972 // collected.
[email protected]4b58e7d2011-07-11 10:22:56973#if defined(ENABLE_SAFE_BROWSING) && !defined(OS_CHROMEOS)
[email protected]d081d192011-04-01 02:33:24974 return !CommandLine::ForCurrentProcess()->HasSwitch(
975 switches::kDisableClientSidePhishingDetection) &&
[email protected]462a0ff2011-06-02 17:15:34976 safe_browsing_service() &&
[email protected]436ebd62011-06-09 22:08:11977 safe_browsing_service()->CanReportStats();
[email protected]4b58e7d2011-07-11 10:22:56978#else
979 return false;
[email protected]d081d192011-04-01 02:33:24980#endif
[email protected]a7a5e992010-12-09 23:39:51981}
982
[email protected]419a0572011-04-18 22:21:46983void BrowserProcessImpl::ApplyDisabledSchemesPolicy() {
984 std::set<std::string> schemes;
[email protected]b99c41c2011-04-27 15:18:48985 const ListValue* scheme_list = local_state_->GetList(prefs::kDisabledSchemes);
986 for (ListValue::const_iterator iter = scheme_list->begin();
987 iter != scheme_list->end(); ++iter) {
[email protected]419a0572011-04-18 22:21:46988 std::string scheme;
989 if ((*iter)->GetAsString(&scheme))
990 schemes.insert(scheme);
991 }
992 ChildProcessSecurityPolicy::GetInstance()->RegisterDisabledSchemes(schemes);
993}
994
[email protected]40850a52011-05-26 22:07:35995void BrowserProcessImpl::ApplyAllowCrossOriginAuthPromptPolicy() {
996 bool value = local_state()->GetBoolean(prefs::kAllowCrossOriginAuthPrompt);
997 resource_dispatcher_host()->set_allow_cross_origin_auth_prompt(value);
998}
999
[email protected]6641bf662009-08-21 00:34:091000// The BrowserProcess object must outlive the file thread so we use traits
1001// which don't do any management.
[email protected]c56428f22010-06-16 02:17:231002DISABLE_RUNNABLE_METHOD_REFCOUNT(BrowserProcessImpl);
[email protected]6641bf662009-08-21 00:34:091003
[email protected]d55aaa132009-09-28 21:08:041004#if defined(IPC_MESSAGE_LOG_ENABLED)
1005
1006void BrowserProcessImpl::SetIPCLoggingEnabled(bool enable) {
1007 // First enable myself.
1008 if (enable)
[email protected]8e8bb6d2010-12-13 08:18:551009 IPC::Logging::GetInstance()->Enable();
[email protected]d55aaa132009-09-28 21:08:041010 else
[email protected]8e8bb6d2010-12-13 08:18:551011 IPC::Logging::GetInstance()->Disable();
[email protected]d55aaa132009-09-28 21:08:041012
1013 // Now tell subprocesses. Messages to ChildProcess-derived
1014 // processes must be done on the IO thread.
1015 io_thread()->message_loop()->PostTask
1016 (FROM_HERE,
1017 NewRunnableMethod(
1018 this,
1019 &BrowserProcessImpl::SetIPCLoggingEnabledForChildProcesses,
1020 enable));
1021
1022 // Finally, tell the renderers which don't derive from ChildProcess.
1023 // Messages to the renderers must be done on the UI (main) thread.
[email protected]019191a2009-10-02 20:37:271024 for (RenderProcessHost::iterator i(RenderProcessHost::AllHostsIterator());
1025 !i.IsAtEnd(); i.Advance())
[email protected]ff47b2962011-03-07 23:51:491026 i.GetCurrentValue()->Send(new ChildProcessMsg_SetIPCLoggingEnabled(enable));
[email protected]d55aaa132009-09-28 21:08:041027}
1028
1029// Helper for SetIPCLoggingEnabled.
1030void BrowserProcessImpl::SetIPCLoggingEnabledForChildProcesses(bool enabled) {
[email protected]d04e7662010-10-10 22:24:481031 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO));
[email protected]d55aaa132009-09-28 21:08:041032
[email protected]d27893f62010-07-03 05:47:421033 BrowserChildProcessHost::Iterator i; // default constr references a singleton
[email protected]34cf97d2009-09-29 22:46:111034 while (!i.Done()) {
[email protected]ff47b2962011-03-07 23:51:491035 i->Send(new ChildProcessMsg_SetIPCLoggingEnabled(enabled));
[email protected]34cf97d2009-09-29 22:46:111036 ++i;
[email protected]d55aaa132009-09-28 21:08:041037 }
1038}
1039
1040#endif // IPC_MESSAGE_LOG_ENABLED
1041
[email protected]3cdacd42010-04-30 18:55:531042// Mac is currently not supported.
1043#if (defined(OS_WIN) || defined(OS_LINUX)) && !defined(OS_CHROMEOS)
[email protected]bd48c2b02010-04-09 20:32:421044
1045bool BrowserProcessImpl::CanAutorestartForUpdate() const {
1046 // Check if browser is in the background and if it needs to be restarted to
1047 // apply a pending update.
[email protected]c10fa3952010-08-24 16:52:531048 return BrowserList::size() == 0 && BrowserList::WillKeepAlive() &&
[email protected]815856722011-04-13 17:19:191049 upgrade_util::IsUpdatePendingRestart();
[email protected]bd48c2b02010-04-09 20:32:421050}
1051
[email protected]5c08f222010-09-22 09:37:211052// Switches to add when auto-restarting Chrome.
[email protected]6c10c972010-08-11 04:15:471053const char* const kSwitchesToAddOnAutorestart[] = {
[email protected]f9a06842010-08-21 00:32:401054 switches::kNoStartupWindow
[email protected]bd48c2b02010-04-09 20:32:421055};
1056
1057void BrowserProcessImpl::RestartPersistentInstance() {
1058 CommandLine* old_cl = CommandLine::ForCurrentProcess();
[email protected]3cdacd42010-04-30 18:55:531059 scoped_ptr<CommandLine> new_cl(new CommandLine(old_cl->GetProgram()));
[email protected]bd48c2b02010-04-09 20:32:421060
1061 std::map<std::string, CommandLine::StringType> switches =
1062 old_cl->GetSwitches();
1063
[email protected]5c08f222010-09-22 09:37:211064 switches::RemoveSwitchesForAutostart(&switches);
[email protected]bd48c2b02010-04-09 20:32:421065
1066 // Append the rest of the switches (along with their values, if any)
1067 // to the new command line
1068 for (std::map<std::string, CommandLine::StringType>::const_iterator i =
1069 switches.begin(); i != switches.end(); ++i) {
1070 CommandLine::StringType switch_value = i->second;
1071 if (switch_value.length() > 0) {
[email protected]05076ba22010-07-30 05:59:571072 new_cl->AppendSwitchNative(i->first, i->second);
[email protected]bd48c2b02010-04-09 20:32:421073 } else {
[email protected]3cdacd42010-04-30 18:55:531074 new_cl->AppendSwitch(i->first);
[email protected]bd48c2b02010-04-09 20:32:421075 }
1076 }
1077
[email protected]6c10c972010-08-11 04:15:471078 // Ensure that our desired switches are set on the new process.
[email protected]5c08f222010-09-22 09:37:211079 for (size_t i = 0; i < arraysize(kSwitchesToAddOnAutorestart); ++i) {
[email protected]6c10c972010-08-11 04:15:471080 if (!new_cl->HasSwitch(kSwitchesToAddOnAutorestart[i]))
1081 new_cl->AppendSwitch(kSwitchesToAddOnAutorestart[i]);
1082 }
[email protected]bd48c2b02010-04-09 20:32:421083
[email protected]3cdacd42010-04-30 18:55:531084 DLOG(WARNING) << "Shutting down current instance of the browser.";
[email protected]bc63a072011-06-28 21:12:571085 BrowserList::AttemptExit();
[email protected]3cdacd42010-04-30 18:55:531086
1087 // Transfer ownership to Upgrade.
[email protected]815856722011-04-13 17:19:191088 upgrade_util::SetNewCommandLine(new_cl.release());
[email protected]bd48c2b02010-04-09 20:32:421089}
1090
1091void BrowserProcessImpl::OnAutoupdateTimer() {
1092 if (CanAutorestartForUpdate()) {
[email protected]3cdacd42010-04-30 18:55:531093 DLOG(WARNING) << "Detected update. Restarting browser.";
[email protected]bd48c2b02010-04-09 20:32:421094 RestartPersistentInstance();
1095 }
1096}
1097
[email protected]3cdacd42010-04-30 18:55:531098#endif // (defined(OS_WIN) || defined(OS_LINUX)) && !defined(OS_CHROMEOS)