blob: d554f7e1ac9eb9783573367caab85243bf771eff [file] [log] [blame]
[email protected]f2a893c2011-01-05 09:38:071// Copyright (c) 2011 The Chromium Authors. All rights reserved.
license.botbf09a502008-08-24 00:55:552// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
initial.commit09911bf2008-07-26 23:55:294
5#include "chrome/browser/browser_process_impl.h"
6
[email protected]3cdacd42010-04-30 18:55:537#include <map>
[email protected]68f88b992011-05-07 02:01:398#include <set>
9#include <vector>
[email protected]3cdacd42010-04-30 18:55:5310
initial.commit09911bf2008-07-26 23:55:2911#include "base/command_line.h"
[email protected]6641bf662009-08-21 00:34:0912#include "base/file_util.h"
initial.commit09911bf2008-07-26 23:55:2913#include "base/path_service.h"
[email protected]985655a2011-02-23 09:54:2514#include "base/synchronization/waitable_event.h"
[email protected]c6032e82010-09-13 20:06:0515#include "base/task.h"
[email protected]34b99632011-01-01 01:01:0616#include "base/threading/thread.h"
17#include "base/threading/thread_restrictions.h"
[email protected]e13ad79b2010-07-22 21:36:5018#include "chrome/browser/automation/automation_provider_list.h"
[email protected]a07676b22011-06-17 16:36:5319#include "chrome/browser/background/background_mode_manager.h"
[email protected]b443cb042009-12-15 22:05:0920#include "chrome/browser/browser_main.h"
[email protected]0ac83682010-01-22 17:46:2721#include "chrome/browser/browser_process_sub_thread.h"
[email protected]ac262c9f2008-10-19 17:45:2122#include "chrome/browser/browser_trial.h"
[email protected]6c69796d2010-07-16 21:41:1623#include "chrome/browser/download/download_file_manager.h"
[email protected]e7f009d2011-06-14 19:35:1024#include "chrome/browser/download/mhtml_generation_manager.h"
[email protected]5ba0a2c2009-02-19 01:19:3425#include "chrome/browser/download/save_file_manager.h"
[email protected]3ce02412011-03-01 12:01:1526#include "chrome/browser/extensions/extension_event_router_forwarder.h"
[email protected]fc4facd2011-03-22 23:18:5027#include "chrome/browser/extensions/extension_tab_id_map.h"
[email protected]214538842011-04-01 18:47:2428#include "chrome/browser/extensions/user_script_listener.h"
[email protected]815856722011-04-13 17:19:1929#include "chrome/browser/first_run/upgrade_util.h"
[email protected]f7578f52010-08-30 22:22:4930#include "chrome/browser/google/google_url_tracker.h"
[email protected]dcefa302009-05-20 00:24:3931#include "chrome/browser/icon_manager.h"
[email protected]c4ff4952010-01-08 19:12:4732#include "chrome/browser/intranet_redirect_detector.h"
[email protected]0ac83682010-01-22 17:46:2733#include "chrome/browser/io_thread.h"
[email protected]dc6f4962009-02-13 01:25:5034#include "chrome/browser/metrics/metrics_service.h"
[email protected]0b565182011-03-02 18:11:1535#include "chrome/browser/metrics/thread_watcher.h"
[email protected]b2fcd0e2010-12-01 15:19:4036#include "chrome/browser/net/chrome_net_log.h"
[email protected]3530cd92010-06-27 06:22:0137#include "chrome/browser/net/predictor_api.h"
[email protected]d393a0fd2009-05-13 23:32:0138#include "chrome/browser/net/sdch_dictionary_fetcher.h"
[email protected]29672ab2009-10-30 03:44:0339#include "chrome/browser/notifications/notification_ui_manager.h"
[email protected]985655a2011-02-23 09:54:2540#include "chrome/browser/policy/browser_policy_connector.h"
[email protected]caf63aea2011-04-26 11:04:1041#include "chrome/browser/prefs/browser_prefs.h"
[email protected]37858e52010-08-26 00:22:0242#include "chrome/browser/prefs/pref_service.h"
[email protected]1459fb62011-05-25 19:03:2743#include "chrome/browser/prerender/prerender_tracker.h"
[email protected]68f88b992011-05-07 02:01:3944#include "chrome/browser/printing/background_printing_manager.h"
[email protected]e06131d2010-02-10 18:40:3345#include "chrome/browser/printing/print_job_manager.h"
[email protected]dbeebd52010-11-16 20:34:1646#include "chrome/browser/printing/print_preview_tab_controller.h"
[email protected]8ecad5e2010-12-02 21:18:3347#include "chrome/browser/profiles/profile_manager.h"
[email protected]8bcdf072011-06-03 16:52:1548#include "chrome/browser/renderer_host/chrome_resource_dispatcher_host_delegate.h"
[email protected]a7a5e992010-12-09 23:39:5149#include "chrome/browser/safe_browsing/client_side_detection_service.h"
[email protected]81218f42009-02-05 18:48:0850#include "chrome/browser/safe_browsing/safe_browsing_service.h"
[email protected]e450fa62011-02-01 12:52:5651#include "chrome/browser/shell_integration.h"
[email protected]8b8e7c92010-08-19 18:05:5652#include "chrome/browser/sidebar/sidebar_manager.h"
[email protected]9e7f015f2011-05-28 00:24:2553#include "chrome/browser/status_icons/status_tray.h"
[email protected]0b4d3382010-07-14 16:13:0454#include "chrome/browser/tab_closeable_state_watcher.h"
[email protected]71b73f02011-04-06 15:57:2955#include "chrome/browser/ui/browser_list.h"
[email protected]4ef795df2010-02-03 02:35:0856#include "chrome/common/chrome_constants.h"
[email protected]432115822011-07-10 15:52:2757#include "chrome/common/chrome_notification_types.h"
initial.commit09911bf2008-07-26 23:55:2958#include "chrome/common/chrome_paths.h"
59#include "chrome/common/chrome_switches.h"
[email protected]de23f3f2011-05-18 16:20:2360#include "chrome/common/default_plugin.h"
[email protected]f1b6de22010-03-06 12:13:4761#include "chrome/common/extensions/extension_l10n_util.h"
[email protected]985655a2011-02-23 09:54:2562#include "chrome/common/extensions/extension_resource.h"
[email protected]ea587b02010-05-21 15:01:3563#include "chrome/common/json_pref_store.h"
initial.commit09911bf2008-07-26 23:55:2964#include "chrome/common/pref_names.h"
[email protected]5c08f222010-09-22 09:37:2165#include "chrome/common/switch_utils.h"
[email protected]985655a2011-02-23 09:54:2566#include "chrome/common/url_constants.h"
[email protected]bd48c2b02010-04-09 20:32:4267#include "chrome/installer/util/google_update_constants.h"
[email protected]a01efd22011-03-01 00:38:3268#include "content/browser/browser_child_process_host.h"
69#include "content/browser/browser_thread.h"
[email protected]419a0572011-04-18 22:21:4670#include "content/browser/child_process_security_policy.h"
[email protected]b46442d7e2011-06-29 02:16:0671#include "content/browser/debugger/browser_list_tabcontents_provider.h"
72#include "content/browser/debugger/devtools_http_protocol_handler.h"
73#include "content/browser/debugger/devtools_manager.h"
74#include "content/browser/debugger/devtools_protocol_handler.h"
[email protected]d9f37932011-05-09 20:09:2475#include "content/browser/gpu/gpu_process_host_ui_shim.h"
[email protected]6eac57a2011-07-12 21:15:0976#include "content/browser/net/browser_online_state_observer.h"
[email protected]a01efd22011-03-01 00:38:3277#include "content/browser/plugin_service.h"
78#include "content/browser/renderer_host/render_process_host.h"
79#include "content/browser/renderer_host/resource_dispatcher_host.h"
[email protected]f20d7332011-03-08 21:11:5380#include "content/common/notification_service.h"
[email protected]d55aaa132009-09-28 21:08:0481#include "ipc/ipc_logging.h"
[email protected]12c84e22011-07-11 09:35:4582#include "net/socket/client_socket_pool_manager.h"
[email protected]abe2c032011-03-31 18:49:3483#include "net/url_request/url_request_context_getter.h"
[email protected]2dfeaf92011-01-10 21:08:2184#include "ui/base/clipboard/clipboard.h"
[email protected]c051a1b2011-01-21 23:30:1785#include "ui/base/l10n/l10n_util.h"
[email protected]de23f3f2011-05-18 16:20:2386#include "webkit/plugins/npapi/plugin_list.h"
[email protected]b112a4c2009-02-01 20:24:0187
88#if defined(OS_WIN)
[email protected]2362e4f2009-05-08 00:34:0589#include "views/focus/view_storage.h"
[email protected]86230b92009-11-23 20:38:3890#endif
91
[email protected]d55aaa132009-09-28 21:08:0492#if defined(IPC_MESSAGE_LOG_ENABLED)
[email protected]ff47b2962011-03-07 23:51:4993#include "content/common/child_process_messages.h"
[email protected]d55aaa132009-09-28 21:08:0494#endif
95
[email protected]db0e86dd2011-03-16 14:47:2196#if defined(OS_CHROMEOS)
97#include "chrome/browser/chromeos/proxy_config_service_impl.h"
[email protected]2d14b3732011-05-10 16:48:4498#include "chrome/browser/chromeos/web_socket_proxy_controller.h"
[email protected]db0e86dd2011-03-16 14:47:2199#endif // defined(OS_CHROMEOS)
100
[email protected]3cdacd42010-04-30 18:55:53101#if (defined(OS_WIN) || defined(OS_LINUX)) && !defined(OS_CHROMEOS)
102// How often to check if the persistent instance of Chrome needs to restart
103// to install an update.
104static const int kUpdateCheckIntervalHours = 6;
105#endif
106
[email protected]c6032e82010-09-13 20:06:05107#if defined(USE_X11)
108// How long to wait for the File thread to complete during EndSession, on
109// Linux. We have a timeout here because we're unable to run the UI messageloop
110// and there's some deadlock risk. Our only option is to exit anyway.
111static const int kEndSessionTimeoutSeconds = 10;
112#endif
113
[email protected]bb975362009-01-21 01:00:22114BrowserProcessImpl::BrowserProcessImpl(const CommandLine& command_line)
initial.commit09911bf2008-07-26 23:55:29115 : created_resource_dispatcher_host_(false),
116 created_metrics_service_(false),
117 created_io_thread_(false),
118 created_file_thread_(false),
119 created_db_thread_(false),
[email protected]914511712009-11-23 19:42:33120 created_process_launcher_thread_(false),
[email protected]875ee822010-05-18 20:58:01121 created_cache_thread_(false),
[email protected]0b565182011-03-02 18:11:15122 created_watchdog_thread_(false),
[email protected]2d14b3732011-05-10 16:48:44123#if defined(OS_CHROMEOS)
124 created_web_socket_proxy_thread_(false),
125#endif
initial.commit09911bf2008-07-26 23:55:29126 created_profile_manager_(false),
127 created_local_state_(false),
[email protected]b112a4c2009-02-01 20:24:01128 created_icon_manager_(false),
[email protected]40ecc902009-03-16 13:42:47129 created_devtools_manager_(false),
[email protected]8b8e7c92010-08-19 18:05:56130 created_sidebar_manager_(false),
[email protected]985655a2011-02-23 09:54:25131 created_browser_policy_connector_(false),
[email protected]29672ab2009-10-30 03:44:03132 created_notification_ui_manager_(false),
[email protected]462a0ff2011-06-02 17:15:34133 created_safe_browsing_service_(false),
[email protected]a7a5e992010-12-09 23:39:51134 created_safe_browsing_detection_service_(false),
initial.commit09911bf2008-07-26 23:55:29135 module_ref_count_(0),
[email protected]afd20c022010-06-10 00:48:20136 did_start_(false),
[email protected]1b2db1a2008-08-08 17:46:13137 checked_for_new_frames_(false),
[email protected]4747caf2011-03-23 20:09:21138 using_new_frames_(false) {
initial.commit09911bf2008-07-26 23:55:29139 g_browser_process = this;
[email protected]2dfeaf92011-01-10 21:08:21140 clipboard_.reset(new ui::Clipboard);
initial.commit09911bf2008-07-26 23:55:29141 main_notification_service_.reset(new NotificationService);
142
143 // Must be created after the NotificationService.
144 print_job_manager_.reset(new printing::PrintJobManager);
145
[email protected]b2fcd0e2010-12-01 15:19:40146 net_log_.reset(new ChromeNetLog);
[email protected]3ce02412011-03-01 12:01:15147
148 extension_event_router_forwarder_ = new ExtensionEventRouterForwarder;
[email protected]fc4facd2011-03-22 23:18:50149
150 ExtensionTabIdMap::GetInstance()->Init();
[email protected]6eac57a2011-07-12 21:15:09151
152 online_state_observer_.reset(new BrowserOnlineStateObserver);
initial.commit09911bf2008-07-26 23:55:29153}
154
155BrowserProcessImpl::~BrowserProcessImpl() {
[email protected]2d14b3732011-05-10 16:48:44156#if defined(OS_CHROMEOS)
157 if (web_socket_proxy_thread_.get())
158 chromeos::WebSocketProxyController::Shutdown();
159 web_socket_proxy_thread_.reset();
160#endif
161
initial.commit09911bf2008-07-26 23:55:29162 // Delete the AutomationProviderList before NotificationService,
163 // since it may try to unregister notifications
164 // Both NotificationService and AutomationProvider are singleton instances in
165 // the BrowserProcess. Since AutomationProvider may have some active
166 // notification observers, it is essential that it gets destroyed before the
167 // NotificationService. NotificationService won't be destroyed until after
168 // this destructor is run.
169 automation_provider_list_.reset();
170
[email protected]d393a0fd2009-05-13 23:32:01171 // We need to shutdown the SdchDictionaryFetcher as it regularly holds
172 // a pointer to a URLFetcher, and that URLFetcher (upon destruction) will do
173 // a PostDelayedTask onto the IO thread. This shutdown call will both discard
174 // any pending URLFetchers, and avoid creating any more.
175 SdchDictionaryFetcher::Shutdown();
176
[email protected]51ac040762011-01-20 02:01:04177 // We need to destroy the MetricsService, GoogleURLTracker,
178 // IntranetRedirectDetector, and SafeBrowsing ClientSideDetectionService
179 // before the io_thread_ gets destroyed, since their destructors can call the
180 // URLFetcher destructor, which does a PostDelayedTask operation on the IO
181 // thread. (The IO thread will handle that URLFetcher operation before going
182 // away.)
initial.commit09911bf2008-07-26 23:55:29183 metrics_service_.reset();
184 google_url_tracker_.reset();
[email protected]c4ff4952010-01-08 19:12:47185 intranet_redirect_detector_.reset();
[email protected]51ac040762011-01-20 02:01:04186 safe_browsing_detection_service_.reset();
initial.commit09911bf2008-07-26 23:55:29187
[email protected]d8a899c2010-09-21 04:50:33188 // Need to clear the desktop notification balloons before the io_thread_ and
189 // before the profiles, since if there are any still showing we will access
190 // those things during teardown.
191 notification_ui_manager_.reset();
192
initial.commit09911bf2008-07-26 23:55:29193 // Need to clear profiles (download managers) before the io_thread_.
194 profile_manager_.reset();
195
196 // Debugger must be cleaned up before IO thread and NotificationService.
[email protected]5613126e2011-01-31 15:27:55197 if (devtools_http_handler_.get()) {
198 devtools_http_handler_->Stop();
199 devtools_http_handler_ = NULL;
200 }
201 if (devtools_legacy_handler_.get()) {
202 devtools_legacy_handler_->Stop();
203 devtools_legacy_handler_ = NULL;
204 }
initial.commit09911bf2008-07-26 23:55:29205
[email protected]4b58e7d2011-07-11 10:22:56206#if defined(ENABLE_SAFE_BROWSING)
[email protected]462a0ff2011-06-02 17:15:34207 if (safe_browsing_service_.get())
208 safe_browsing_service()->ShutDown();
[email protected]4b58e7d2011-07-11 10:22:56209#endif
initial.commit09911bf2008-07-26 23:55:29210
[email protected]462a0ff2011-06-02 17:15:34211 if (resource_dispatcher_host_.get()) {
initial.commit09911bf2008-07-26 23:55:29212 // Cancel pending requests and prevent new requests.
213 resource_dispatcher_host()->Shutdown();
214 }
215
[email protected]fc4facd2011-03-22 23:18:50216 ExtensionTabIdMap::GetInstance()->Shutdown();
217
[email protected]985655a2011-02-23 09:54:25218 // The policy providers managed by |browser_policy_connector_| need to shut
219 // down while the IO and FILE threads are still alive.
220 browser_policy_connector_.reset();
[email protected]f2a893c2011-01-05 09:38:07221
[email protected]7a31f7c2011-03-21 23:22:04222 // Destroying the GpuProcessHostUIShims on the UI thread posts a task to
223 // delete related objects on the GPU thread. This must be done before
224 // stopping the GPU thread. The GPU thread will close IPC channels to renderer
225 // processes so this has to happen before stopping the IO thread.
226 GpuProcessHostUIShim::DestroyAll();
[email protected]7a31f7c2011-03-21 23:22:04227
initial.commit09911bf2008-07-26 23:55:29228 // Need to stop io_thread_ before resource_dispatcher_host_, since
229 // io_thread_ may still deref ResourceDispatcherHost and handle resource
230 // request before going away.
[email protected]0ac83682010-01-22 17:46:27231 io_thread_.reset();
initial.commit09911bf2008-07-26 23:55:29232
[email protected]875ee822010-05-18 20:58:01233 // The IO thread was the only user of this thread.
234 cache_thread_.reset();
235
[email protected]914511712009-11-23 19:42:33236 // Stop the process launcher thread after the IO thread, in case the IO thread
237 // posted a task to terminate a process on the process launcher thread.
238 process_launcher_thread_.reset();
239
initial.commit09911bf2008-07-26 23:55:29240 // Clean up state that lives on the file_thread_ before it goes away.
241 if (resource_dispatcher_host_.get()) {
242 resource_dispatcher_host()->download_file_manager()->Shutdown();
243 resource_dispatcher_host()->save_file_manager()->Shutdown();
244 }
245
246 // Need to stop the file_thread_ here to force it to process messages in its
247 // message loop from the previous call to shutdown the DownloadFileManager,
248 // SaveFileManager and SessionService.
249 file_thread_.reset();
250
251 // With the file_thread_ flushed, we can release any icon resources.
252 icon_manager_.reset();
253
254 // Need to destroy ResourceDispatcherHost before PluginService and
[email protected]49f28bc72010-02-04 00:10:01255 // SafeBrowsingService, since it caches a pointer to it. This also
256 // causes the webkit thread to terminate.
initial.commit09911bf2008-07-26 23:55:29257 resource_dispatcher_host_.reset();
258
259 // Wait for the pending print jobs to finish.
260 print_job_manager_->OnQuit();
261 print_job_manager_.reset();
262
[email protected]0b4d3382010-07-14 16:13:04263 // Destroy TabCloseableStateWatcher before NotificationService since the
264 // former registers for notifications.
265 tab_closeable_state_watcher_.reset();
266
initial.commit09911bf2008-07-26 23:55:29267 // Now OK to destroy NotificationService.
268 main_notification_service_.reset();
269
[email protected]0b565182011-03-02 18:11:15270 // Stop the watchdog thread after stopping other threads.
271 watchdog_thread_.reset();
272
initial.commit09911bf2008-07-26 23:55:29273 g_browser_process = NULL;
274}
275
[email protected]c6032e82010-09-13 20:06:05276#if defined(OS_WIN)
[email protected]295039bd2008-08-15 04:32:57277// Send a QuitTask to the given MessageLoop.
278static void PostQuit(MessageLoop* message_loop) {
279 message_loop->PostTask(FROM_HERE, new MessageLoop::QuitTask());
280}
[email protected]c6032e82010-09-13 20:06:05281#elif defined(USE_X11)
282static void Signal(base::WaitableEvent* event) {
283 event->Signal();
284}
285#endif
initial.commit09911bf2008-07-26 23:55:29286
[email protected]b443cb042009-12-15 22:05:09287unsigned int BrowserProcessImpl::AddRefModule() {
288 DCHECK(CalledOnValidThread());
[email protected]afd20c022010-06-10 00:48:20289 did_start_ = true;
[email protected]b443cb042009-12-15 22:05:09290 module_ref_count_++;
291 return module_ref_count_;
292}
293
294unsigned int BrowserProcessImpl::ReleaseModule() {
295 DCHECK(CalledOnValidThread());
[email protected]760d970a2010-05-18 00:39:18296 DCHECK_NE(0u, module_ref_count_);
[email protected]b443cb042009-12-15 22:05:09297 module_ref_count_--;
298 if (0 == module_ref_count_) {
[email protected]7d038c32010-12-14 00:40:00299 // Allow UI and IO threads to do blocking IO on shutdown, since we do a lot
300 // of it on shutdown for valid reasons.
301 base::ThreadRestrictions::SetIOAllowed(true);
302 io_thread()->message_loop()->PostTask(
303 FROM_HERE,
304 NewRunnableFunction(&base::ThreadRestrictions::SetIOAllowed, true));
[email protected]b443cb042009-12-15 22:05:09305 MessageLoop::current()->PostTask(
[email protected]34f73fb2010-03-24 20:50:34306 FROM_HERE, NewRunnableFunction(DidEndMainMessageLoop));
[email protected]b443cb042009-12-15 22:05:09307 MessageLoop::current()->Quit();
308 }
309 return module_ref_count_;
310}
311
initial.commit09911bf2008-07-26 23:55:29312void BrowserProcessImpl::EndSession() {
initial.commit09911bf2008-07-26 23:55:29313 // Mark all the profiles as clean.
314 ProfileManager* pm = profile_manager();
[email protected]844a1002011-04-19 11:37:21315 std::vector<Profile*> profiles(pm->GetLoadedProfiles());
316 for (size_t i = 0; i < profiles.size(); ++i)
317 profiles[i]->MarkAsCleanShutdown();
initial.commit09911bf2008-07-26 23:55:29318
319 // Tell the metrics service it was cleanly shutdown.
320 MetricsService* metrics = g_browser_process->metrics_service();
321 if (metrics && local_state()) {
initial.commit09911bf2008-07-26 23:55:29322 metrics->RecordStartOfSessionEnd();
323
324 // MetricsService lazily writes to prefs, force it to write now.
[email protected]6faa0e0d2009-04-28 06:50:36325 local_state()->SavePersistentPrefs();
initial.commit09911bf2008-07-26 23:55:29326 }
327
328 // We must write that the profile and metrics service shutdown cleanly,
329 // otherwise on startup we'll think we crashed. So we block until done and
330 // then proceed with normal shutdown.
[email protected]c6032e82010-09-13 20:06:05331#if defined(USE_X11)
332 // Can't run a local loop on linux. Instead create a waitable event.
333 base::WaitableEvent done_writing(false, false);
[email protected]d04e7662010-10-10 22:24:48334 BrowserThread::PostTask(BrowserThread::FILE, FROM_HERE,
[email protected]c6032e82010-09-13 20:06:05335 NewRunnableFunction(Signal, &done_writing));
336 done_writing.TimedWait(
337 base::TimeDelta::FromSeconds(kEndSessionTimeoutSeconds));
338#elif defined(OS_WIN)
[email protected]d04e7662010-10-10 22:24:48339 BrowserThread::PostTask(BrowserThread::FILE, FROM_HERE,
[email protected]295039bd2008-08-15 04:32:57340 NewRunnableFunction(PostQuit, MessageLoop::current()));
initial.commit09911bf2008-07-26 23:55:29341 MessageLoop::current()->Run();
[email protected]c6032e82010-09-13 20:06:05342#else
343 NOTIMPLEMENTED();
344#endif
initial.commit09911bf2008-07-26 23:55:29345}
346
[email protected]e13ad79b2010-07-22 21:36:50347ResourceDispatcherHost* BrowserProcessImpl::resource_dispatcher_host() {
348 DCHECK(CalledOnValidThread());
349 if (!created_resource_dispatcher_host_)
350 CreateResourceDispatcherHost();
351 return resource_dispatcher_host_.get();
352}
353
354MetricsService* BrowserProcessImpl::metrics_service() {
355 DCHECK(CalledOnValidThread());
356 if (!created_metrics_service_)
357 CreateMetricsService();
358 return metrics_service_.get();
359}
360
361IOThread* BrowserProcessImpl::io_thread() {
362 DCHECK(CalledOnValidThread());
363 if (!created_io_thread_)
364 CreateIOThread();
365 return io_thread_.get();
366}
367
368base::Thread* BrowserProcessImpl::file_thread() {
369 DCHECK(CalledOnValidThread());
370 if (!created_file_thread_)
371 CreateFileThread();
372 return file_thread_.get();
373}
374
375base::Thread* BrowserProcessImpl::db_thread() {
376 DCHECK(CalledOnValidThread());
377 if (!created_db_thread_)
378 CreateDBThread();
379 return db_thread_.get();
380}
381
382base::Thread* BrowserProcessImpl::process_launcher_thread() {
383 DCHECK(CalledOnValidThread());
384 if (!created_process_launcher_thread_)
385 CreateProcessLauncherThread();
386 return process_launcher_thread_.get();
387}
388
389base::Thread* BrowserProcessImpl::cache_thread() {
390 DCHECK(CalledOnValidThread());
391 if (!created_cache_thread_)
392 CreateCacheThread();
393 return cache_thread_.get();
394}
395
[email protected]0b565182011-03-02 18:11:15396WatchDogThread* BrowserProcessImpl::watchdog_thread() {
397 DCHECK(CalledOnValidThread());
398 if (!created_watchdog_thread_)
399 CreateWatchdogThread();
400 DCHECK(watchdog_thread_.get() != NULL);
401 return watchdog_thread_.get();
402}
403
[email protected]2d14b3732011-05-10 16:48:44404#if defined(OS_CHROMEOS)
405base::Thread* BrowserProcessImpl::web_socket_proxy_thread() {
406 DCHECK(CalledOnValidThread());
407 if (!created_web_socket_proxy_thread_)
408 CreateWebSocketProxyThread();
409 DCHECK(web_socket_proxy_thread_.get() != NULL);
410 return web_socket_proxy_thread_.get();
411}
412#endif
413
[email protected]e13ad79b2010-07-22 21:36:50414ProfileManager* BrowserProcessImpl::profile_manager() {
415 DCHECK(CalledOnValidThread());
416 if (!created_profile_manager_)
417 CreateProfileManager();
418 return profile_manager_.get();
419}
420
421PrefService* BrowserProcessImpl::local_state() {
422 DCHECK(CalledOnValidThread());
423 if (!created_local_state_)
424 CreateLocalState();
425 return local_state_.get();
426}
427
428DevToolsManager* BrowserProcessImpl::devtools_manager() {
429 DCHECK(CalledOnValidThread());
430 if (!created_devtools_manager_)
431 CreateDevToolsManager();
432 return devtools_manager_.get();
433}
434
[email protected]8b8e7c92010-08-19 18:05:56435SidebarManager* BrowserProcessImpl::sidebar_manager() {
436 DCHECK(CalledOnValidThread());
437 if (!created_sidebar_manager_)
438 CreateSidebarManager();
439 return sidebar_manager_.get();
440}
441
[email protected]2dfeaf92011-01-10 21:08:21442ui::Clipboard* BrowserProcessImpl::clipboard() {
[email protected]e13ad79b2010-07-22 21:36:50443 DCHECK(CalledOnValidThread());
444 return clipboard_.get();
445}
446
[email protected]abe2c032011-03-31 18:49:34447net::URLRequestContextGetter* BrowserProcessImpl::system_request_context() {
[email protected]db0e86dd2011-03-16 14:47:21448 DCHECK(CalledOnValidThread());
449 return io_thread()->system_url_request_context_getter();
450}
451
452#if defined(OS_CHROMEOS)
453chromeos::ProxyConfigServiceImpl*
454BrowserProcessImpl::chromeos_proxy_config_service_impl() {
455 DCHECK(CalledOnValidThread());
456 if (!chromeos_proxy_config_service_impl_) {
457 chromeos_proxy_config_service_impl_ =
458 new chromeos::ProxyConfigServiceImpl();
459 }
460 return chromeos_proxy_config_service_impl_;
461}
462#endif // defined(OS_CHROMEOS)
463
[email protected]3ce02412011-03-01 12:01:15464ExtensionEventRouterForwarder*
465BrowserProcessImpl::extension_event_router_forwarder() {
466 return extension_event_router_forwarder_.get();
467}
468
[email protected]e13ad79b2010-07-22 21:36:50469NotificationUIManager* BrowserProcessImpl::notification_ui_manager() {
470 DCHECK(CalledOnValidThread());
471 if (!created_notification_ui_manager_)
472 CreateNotificationUIManager();
473 return notification_ui_manager_.get();
474}
475
[email protected]985655a2011-02-23 09:54:25476policy::BrowserPolicyConnector* BrowserProcessImpl::browser_policy_connector() {
[email protected]f2a893c2011-01-05 09:38:07477 DCHECK(CalledOnValidThread());
[email protected]985655a2011-02-23 09:54:25478 if (!created_browser_policy_connector_) {
479 DCHECK(browser_policy_connector_.get() == NULL);
480 created_browser_policy_connector_ = true;
[email protected]d9ee002c2011-04-27 12:52:54481 browser_policy_connector_.reset(policy::BrowserPolicyConnector::Create());
[email protected]f2a893c2011-01-05 09:38:07482 }
[email protected]985655a2011-02-23 09:54:25483 return browser_policy_connector_.get();
[email protected]f2a893c2011-01-05 09:38:07484}
485
[email protected]e13ad79b2010-07-22 21:36:50486IconManager* BrowserProcessImpl::icon_manager() {
487 DCHECK(CalledOnValidThread());
488 if (!created_icon_manager_)
489 CreateIconManager();
490 return icon_manager_.get();
491}
492
493ThumbnailGenerator* BrowserProcessImpl::GetThumbnailGenerator() {
494 return &thumbnail_generator_;
495}
496
497AutomationProviderList* BrowserProcessImpl::InitAutomationProviderList() {
498 DCHECK(CalledOnValidThread());
499 if (automation_provider_list_.get() == NULL) {
500 automation_provider_list_.reset(AutomationProviderList::GetInstance());
501 }
502 return automation_provider_list_.get();
503}
504
[email protected]5613126e2011-01-31 15:27:55505void BrowserProcessImpl::InitDevToolsHttpProtocolHandler(
[email protected]01000cf12011-02-04 11:39:22506 const std::string& ip,
[email protected]5613126e2011-01-31 15:27:55507 int port,
508 const std::string& frontend_url) {
[email protected]e13ad79b2010-07-22 21:36:50509 DCHECK(CalledOnValidThread());
[email protected]5613126e2011-01-31 15:27:55510 devtools_http_handler_ =
[email protected]01000cf12011-02-04 11:39:22511 DevToolsHttpProtocolHandler::Start(ip,
512 port,
[email protected]9678cb42011-01-31 18:49:42513 frontend_url,
514 new BrowserListTabContentsProvider());
[email protected]5613126e2011-01-31 15:27:55515}
516
517void BrowserProcessImpl::InitDevToolsLegacyProtocolHandler(int port) {
518 DCHECK(CalledOnValidThread());
519 devtools_legacy_handler_ = DevToolsProtocolHandler::Start(port);
[email protected]e13ad79b2010-07-22 21:36:50520}
521
522bool BrowserProcessImpl::IsShuttingDown() {
523 DCHECK(CalledOnValidThread());
524 return did_start_ && 0 == module_ref_count_;
525}
526
initial.commit09911bf2008-07-26 23:55:29527printing::PrintJobManager* BrowserProcessImpl::print_job_manager() {
528 // TODO(abarth): DCHECK(CalledOnValidThread());
[email protected]d8922f22010-05-07 00:57:27529 // http://code.google.com/p/chromium/issues/detail?id=6828
initial.commit09911bf2008-07-26 23:55:29530 // print_job_manager_ is initialized in the constructor and destroyed in the
531 // destructor, so it should always be valid.
532 DCHECK(print_job_manager_.get());
533 return print_job_manager_.get();
534}
535
[email protected]dbeebd52010-11-16 20:34:16536printing::PrintPreviewTabController*
537 BrowserProcessImpl::print_preview_tab_controller() {
538 DCHECK(CalledOnValidThread());
539 if (!print_preview_tab_controller_.get())
540 CreatePrintPreviewTabController();
541 return print_preview_tab_controller_.get();
542}
543
[email protected]68f88b992011-05-07 02:01:39544printing::BackgroundPrintingManager*
545 BrowserProcessImpl::background_printing_manager() {
546 DCHECK(CalledOnValidThread());
547 if (!background_printing_manager_.get())
548 CreateBackgroundPrintingManager();
549 return background_printing_manager_.get();
550}
551
[email protected]e13ad79b2010-07-22 21:36:50552GoogleURLTracker* BrowserProcessImpl::google_url_tracker() {
553 DCHECK(CalledOnValidThread());
554 if (!google_url_tracker_.get())
555 CreateGoogleURLTracker();
556 return google_url_tracker_.get();
557}
558
559IntranetRedirectDetector* BrowserProcessImpl::intranet_redirect_detector() {
560 DCHECK(CalledOnValidThread());
561 if (!intranet_redirect_detector_.get())
562 CreateIntranetRedirectDetector();
563 return intranet_redirect_detector_.get();
564}
565
566const std::string& BrowserProcessImpl::GetApplicationLocale() {
567 DCHECK(!locale_.empty());
568 return locale_;
569}
570
571void BrowserProcessImpl::SetApplicationLocale(const std::string& locale) {
572 locale_ = locale;
573 extension_l10n_util::SetProcessLocale(locale);
574}
575
[email protected]073ed7b2010-09-27 09:20:02576DownloadStatusUpdater* BrowserProcessImpl::download_status_updater() {
577 return &download_status_updater_;
578}
579
[email protected]e13ad79b2010-07-22 21:36:50580TabCloseableStateWatcher* BrowserProcessImpl::tab_closeable_state_watcher() {
581 DCHECK(CalledOnValidThread());
582 if (!tab_closeable_state_watcher_.get())
583 CreateTabCloseableStateWatcher();
584 return tab_closeable_state_watcher_.get();
585}
586
[email protected]9e7f015f2011-05-28 00:24:25587BackgroundModeManager* BrowserProcessImpl::background_mode_manager() {
588 DCHECK(CalledOnValidThread());
589 if (!background_mode_manager_.get())
590 CreateBackgroundModeManager();
591 return background_mode_manager_.get();
592}
593
594StatusTray* BrowserProcessImpl::status_tray() {
595 DCHECK(CalledOnValidThread());
596 if (!status_tray_.get())
597 CreateStatusTray();
598 return status_tray_.get();
599}
600
[email protected]462a0ff2011-06-02 17:15:34601
602SafeBrowsingService* BrowserProcessImpl::safe_browsing_service() {
603 DCHECK(CalledOnValidThread());
604 if (!created_safe_browsing_service_)
605 CreateSafeBrowsingService();
606 return safe_browsing_service_.get();
607}
608
[email protected]a7a5e992010-12-09 23:39:51609safe_browsing::ClientSideDetectionService*
610 BrowserProcessImpl::safe_browsing_detection_service() {
611 DCHECK(CalledOnValidThread());
[email protected]462a0ff2011-06-02 17:15:34612 if (!created_safe_browsing_detection_service_)
[email protected]a7a5e992010-12-09 23:39:51613 CreateSafeBrowsingDetectionService();
[email protected]a7a5e992010-12-09 23:39:51614 return safe_browsing_detection_service_.get();
615}
616
[email protected]8b08a47f2011-02-25 12:36:37617bool BrowserProcessImpl::plugin_finder_disabled() const {
618 return *plugin_finder_disabled_pref_;
619}
620
[email protected]432115822011-07-10 15:52:27621void BrowserProcessImpl::Observe(int type,
[email protected]6618d1d2010-12-15 21:18:47622 const NotificationSource& source,
623 const NotificationDetails& details) {
[email protected]432115822011-07-10 15:52:27624 if (type == chrome::NOTIFICATION_PREF_CHANGED) {
[email protected]e450fa62011-02-01 12:52:56625 std::string* pref = Details<std::string>(details).ptr();
626 if (*pref == prefs::kDefaultBrowserSettingEnabled) {
627 if (local_state_->GetBoolean(prefs::kDefaultBrowserSettingEnabled))
628 ShellIntegration::SetAsDefaultBrowser();
[email protected]419a0572011-04-18 22:21:46629 } else if (*pref == prefs::kDisabledSchemes) {
630 ApplyDisabledSchemesPolicy();
[email protected]40850a52011-05-26 22:07:35631 } else if (*pref == prefs::kAllowCrossOriginAuthPrompt) {
632 ApplyAllowCrossOriginAuthPromptPolicy();
[email protected]e450fa62011-02-01 12:52:56633 }
[email protected]6618d1d2010-12-15 21:18:47634 } else {
635 NOTREACHED();
636 }
637}
638
[email protected]e13ad79b2010-07-22 21:36:50639#if (defined(OS_WIN) || defined(OS_LINUX)) && !defined(OS_CHROMEOS)
640void BrowserProcessImpl::StartAutoupdateTimer() {
641 autoupdate_timer_.Start(
642 base::TimeDelta::FromHours(kUpdateCheckIntervalHours),
643 this,
644 &BrowserProcessImpl::OnAutoupdateTimer);
645}
646#endif
647
[email protected]d6f37fc2011-02-13 23:58:41648ChromeNetLog* BrowserProcessImpl::net_log() {
649 return net_log_.get();
650}
651
[email protected]1459fb62011-05-25 19:03:27652prerender::PrerenderTracker* BrowserProcessImpl::prerender_tracker() {
653 if (!prerender_tracker_.get())
654 prerender_tracker_.reset(new prerender::PrerenderTracker);
655
656 return prerender_tracker_.get();
657}
658
[email protected]e7f009d2011-06-14 19:35:10659MHTMLGenerationManager* BrowserProcessImpl::mhtml_generation_manager() {
660 if (!mhtml_generation_manager_.get())
661 mhtml_generation_manager_ = new MHTMLGenerationManager();
662
663 return mhtml_generation_manager_.get();
664}
665
initial.commit09911bf2008-07-26 23:55:29666void BrowserProcessImpl::CreateResourceDispatcherHost() {
667 DCHECK(!created_resource_dispatcher_host_ &&
668 resource_dispatcher_host_.get() == NULL);
669 created_resource_dispatcher_host_ = true;
670
[email protected]214538842011-04-01 18:47:24671 // UserScriptListener will delete itself.
672 ResourceQueue::DelegateSet resource_queue_delegates;
673 resource_queue_delegates.insert(new UserScriptListener());
674
675 resource_dispatcher_host_.reset(
676 new ResourceDispatcherHost(resource_queue_delegates));
initial.commit09911bf2008-07-26 23:55:29677 resource_dispatcher_host_->Initialize();
[email protected]1459fb62011-05-25 19:03:27678
[email protected]8bcdf072011-06-03 16:52:15679 resource_dispatcher_host_delegate_.reset(
680 new ChromeResourceDispatcherHostDelegate(resource_dispatcher_host_.get(),
[email protected]92e0a612011-05-30 21:37:00681 prerender_tracker()));
[email protected]8bcdf072011-06-03 16:52:15682 resource_dispatcher_host_->set_delegate(
683 resource_dispatcher_host_delegate_.get());
[email protected]40850a52011-05-26 22:07:35684
685 pref_change_registrar_.Add(prefs::kAllowCrossOriginAuthPrompt, this);
686 ApplyAllowCrossOriginAuthPromptPolicy();
initial.commit09911bf2008-07-26 23:55:29687}
688
689void BrowserProcessImpl::CreateMetricsService() {
690 DCHECK(!created_metrics_service_ && metrics_service_.get() == NULL);
691 created_metrics_service_ = true;
692
693 metrics_service_.reset(new MetricsService);
694}
695
696void BrowserProcessImpl::CreateIOThread() {
697 DCHECK(!created_io_thread_ && io_thread_.get() == NULL);
698 created_io_thread_ = true;
699
700 // Prior to starting the io thread, we create the plugin service as
701 // it is predominantly used from the io thread, but must be created
702 // on the main thread. The service ctor is inexpensive and does not
703 // invoke the io_thread() accessor.
704 PluginService::GetInstance();
705
[email protected]de23f3f2011-05-18 16:20:23706 // Add the Chrome specific plugins.
707 chrome::RegisterInternalDefaultPlugin();
708
709 // Register the internal Flash if available.
710 FilePath path;
711 if (!CommandLine::ForCurrentProcess()->HasSwitch(
712 switches::kDisableInternalFlash) &&
713 PathService::Get(chrome::FILE_FLASH_PLUGIN, &path)) {
714 webkit::npapi::PluginList::Singleton()->AddExtraPluginPath(path);
715 }
716
[email protected]f1933792011-06-14 00:49:34717#if defined(OS_POSIX)
718 // Also find plugins in a user-specific plugins dir,
719 // e.g. ~/.config/chromium/Plugins.
720 FilePath user_data_dir;
721 if (PathService::Get(chrome::DIR_USER_DATA, &user_data_dir)) {
722 webkit::npapi::PluginList::Singleton()->AddExtraPluginDir(
723 user_data_dir.Append("Plugins"));
724 }
725#endif
726
[email protected]3ce02412011-03-01 12:01:15727 scoped_ptr<IOThread> thread(new IOThread(
728 local_state(), net_log_.get(), extension_event_router_forwarder_.get()));
[email protected]ab820df2008-08-26 05:55:10729 base::Thread::Options options;
730 options.message_loop_type = MessageLoop::TYPE_IO;
731 if (!thread->StartWithOptions(options))
initial.commit09911bf2008-07-26 23:55:29732 return;
733 io_thread_.swap(thread);
734}
735
736void BrowserProcessImpl::CreateFileThread() {
737 DCHECK(!created_file_thread_ && file_thread_.get() == NULL);
738 created_file_thread_ = true;
739
[email protected]ab820df2008-08-26 05:55:10740 scoped_ptr<base::Thread> thread(
[email protected]d04e7662010-10-10 22:24:48741 new BrowserProcessSubThread(BrowserThread::FILE));
[email protected]a1db3842008-09-17 22:04:06742 base::Thread::Options options;
[email protected]9e549b582009-02-05 21:13:39743#if defined(OS_WIN)
744 // On Windows, the FILE thread needs to be have a UI message loop which pumps
745 // messages in such a way that Google Update can communicate back to us.
[email protected]a1db3842008-09-17 22:04:06746 options.message_loop_type = MessageLoop::TYPE_UI;
[email protected]9e549b582009-02-05 21:13:39747#else
748 options.message_loop_type = MessageLoop::TYPE_IO;
749#endif
[email protected]a1db3842008-09-17 22:04:06750 if (!thread->StartWithOptions(options))
initial.commit09911bf2008-07-26 23:55:29751 return;
752 file_thread_.swap(thread);
753}
754
[email protected]2d14b3732011-05-10 16:48:44755#if defined(OS_CHROMEOS)
756void BrowserProcessImpl::CreateWebSocketProxyThread() {
757 DCHECK(!created_web_socket_proxy_thread_);
758 DCHECK(web_socket_proxy_thread_.get() == NULL);
759 created_web_socket_proxy_thread_ = true;
760
761 scoped_ptr<base::Thread> thread(
762 new BrowserProcessSubThread(BrowserThread::WEB_SOCKET_PROXY));
763 base::Thread::Options options;
764 options.message_loop_type = MessageLoop::TYPE_IO;
765 if (!thread->StartWithOptions(options))
766 return;
767 web_socket_proxy_thread_.swap(thread);
768}
769#endif
770
initial.commit09911bf2008-07-26 23:55:29771void BrowserProcessImpl::CreateDBThread() {
772 DCHECK(!created_db_thread_ && db_thread_.get() == NULL);
773 created_db_thread_ = true;
774
[email protected]ab820df2008-08-26 05:55:10775 scoped_ptr<base::Thread> thread(
[email protected]d04e7662010-10-10 22:24:48776 new BrowserProcessSubThread(BrowserThread::DB));
initial.commit09911bf2008-07-26 23:55:29777 if (!thread->Start())
778 return;
779 db_thread_.swap(thread);
780}
781
[email protected]914511712009-11-23 19:42:33782void BrowserProcessImpl::CreateProcessLauncherThread() {
783 DCHECK(!created_process_launcher_thread_ && !process_launcher_thread_.get());
784 created_process_launcher_thread_ = true;
785
786 scoped_ptr<base::Thread> thread(
[email protected]d04e7662010-10-10 22:24:48787 new BrowserProcessSubThread(BrowserThread::PROCESS_LAUNCHER));
[email protected]914511712009-11-23 19:42:33788 if (!thread->Start())
789 return;
790 process_launcher_thread_.swap(thread);
791}
792
[email protected]875ee822010-05-18 20:58:01793void BrowserProcessImpl::CreateCacheThread() {
794 DCHECK(!created_cache_thread_ && !cache_thread_.get());
795 created_cache_thread_ = true;
796
797 scoped_ptr<base::Thread> thread(
[email protected]75096332010-11-09 03:28:13798 new BrowserThread(BrowserThread::CACHE));
[email protected]875ee822010-05-18 20:58:01799 base::Thread::Options options;
800 options.message_loop_type = MessageLoop::TYPE_IO;
801 if (!thread->StartWithOptions(options))
802 return;
803 cache_thread_.swap(thread);
804}
805
[email protected]0b565182011-03-02 18:11:15806void BrowserProcessImpl::CreateWatchdogThread() {
807 DCHECK(!created_watchdog_thread_ && watchdog_thread_.get() == NULL);
808 created_watchdog_thread_ = true;
809
810 scoped_ptr<WatchDogThread> thread(new WatchDogThread());
811 if (!thread->Start())
812 return;
813 watchdog_thread_.swap(thread);
814}
815
initial.commit09911bf2008-07-26 23:55:29816void BrowserProcessImpl::CreateProfileManager() {
817 DCHECK(!created_profile_manager_ && profile_manager_.get() == NULL);
818 created_profile_manager_ = true;
819
820 profile_manager_.reset(new ProfileManager());
821}
822
823void BrowserProcessImpl::CreateLocalState() {
824 DCHECK(!created_local_state_ && local_state_.get() == NULL);
825 created_local_state_ = true;
826
[email protected]b9636002009-03-04 00:05:25827 FilePath local_state_path;
initial.commit09911bf2008-07-26 23:55:29828 PathService::Get(chrome::FILE_LOCAL_STATE, &local_state_path);
[email protected]f2d1f612010-12-09 15:10:17829 local_state_.reset(
[email protected]fcf53572011-06-29 15:44:37830 PrefService::CreatePrefService(local_state_path, NULL, false));
[email protected]492d2142010-09-10 13:55:18831
[email protected]caf63aea2011-04-26 11:04:10832 // Initialize the prefs of the local state.
833 browser::RegisterLocalState(local_state_.get());
834
[email protected]2a7e7c152010-10-01 20:12:09835 pref_change_registrar_.Init(local_state_.get());
836
[email protected]f16b9662011-04-27 10:06:07837 print_job_manager_->InitOnUIThread(local_state_.get());
[email protected]e450fa62011-02-01 12:52:56838
839 // Initialize the notification for the default browser setting policy.
840 local_state_->RegisterBooleanPref(prefs::kDefaultBrowserSettingEnabled,
841 false);
842 if (local_state_->IsManagedPreference(prefs::kDefaultBrowserSettingEnabled)) {
843 if (local_state_->GetBoolean(prefs::kDefaultBrowserSettingEnabled))
844 ShellIntegration::SetAsDefaultBrowser();
845 }
846 pref_change_registrar_.Add(prefs::kDefaultBrowserSettingEnabled, this);
[email protected]8b08a47f2011-02-25 12:36:37847
848 // Initialize the preference for the plugin finder policy.
849 // This preference is only needed on the IO thread so make it available there.
850 local_state_->RegisterBooleanPref(prefs::kDisablePluginFinder, false);
851 plugin_finder_disabled_pref_.Init(prefs::kDisablePluginFinder,
852 local_state_.get(), NULL);
853 plugin_finder_disabled_pref_.MoveToThread(BrowserThread::IO);
[email protected]419a0572011-04-18 22:21:46854
[email protected]1f8110b2011-05-24 14:48:30855 // Initialize the disk cache location policy. This policy is not hot update-
856 // able so we need to have it when initializing the profiles.
857 local_state_->RegisterFilePathPref(prefs::kDiskCacheDir, FilePath());
858
[email protected]12c84e22011-07-11 09:35:45859 // Another policy that needs to be defined before the net subsystem is
860 // initialized is MaxConnectionsPerProxy so we do it here.
861 local_state_->RegisterIntegerPref(prefs::kMaxConnectionsPerProxy,
862 net::kDefaultMaxSocketsPerProxyServer);
863 int max_per_proxy = local_state_->GetInteger(prefs::kMaxConnectionsPerProxy);
864 net::ClientSocketPoolManager::set_max_sockets_per_proxy_server(
865 std::max(std::min(max_per_proxy, 99),
866 net::ClientSocketPoolManager::max_sockets_per_group()));
867
[email protected]b99c41c2011-04-27 15:18:48868 // This is observed by ChildProcessSecurityPolicy, which lives in content/
869 // though, so it can't register itself.
[email protected]419a0572011-04-18 22:21:46870 local_state_->RegisterListPref(prefs::kDisabledSchemes);
[email protected]b99c41c2011-04-27 15:18:48871 pref_change_registrar_.Add(prefs::kDisabledSchemes, this);
[email protected]419a0572011-04-18 22:21:46872 ApplyDisabledSchemesPolicy();
[email protected]fd6159a2010-09-03 09:38:39873}
initial.commit09911bf2008-07-26 23:55:29874
initial.commit09911bf2008-07-26 23:55:29875void BrowserProcessImpl::CreateIconManager() {
876 DCHECK(!created_icon_manager_ && icon_manager_.get() == NULL);
877 created_icon_manager_ = true;
878 icon_manager_.reset(new IconManager);
879}
880
[email protected]40ecc902009-03-16 13:42:47881void BrowserProcessImpl::CreateDevToolsManager() {
[email protected]73ee01522009-06-05 10:13:44882 DCHECK(devtools_manager_.get() == NULL);
[email protected]40ecc902009-03-16 13:42:47883 created_devtools_manager_ = true;
[email protected]73ee01522009-06-05 10:13:44884 devtools_manager_ = new DevToolsManager();
[email protected]40ecc902009-03-16 13:42:47885}
886
[email protected]8b8e7c92010-08-19 18:05:56887void BrowserProcessImpl::CreateSidebarManager() {
888 DCHECK(sidebar_manager_.get() == NULL);
889 created_sidebar_manager_ = true;
890 sidebar_manager_ = new SidebarManager();
891}
892
initial.commit09911bf2008-07-26 23:55:29893void BrowserProcessImpl::CreateGoogleURLTracker() {
894 DCHECK(google_url_tracker_.get() == NULL);
895 scoped_ptr<GoogleURLTracker> google_url_tracker(new GoogleURLTracker);
896 google_url_tracker_.swap(google_url_tracker);
897}
[email protected]6641bf662009-08-21 00:34:09898
[email protected]c4ff4952010-01-08 19:12:47899void BrowserProcessImpl::CreateIntranetRedirectDetector() {
900 DCHECK(intranet_redirect_detector_.get() == NULL);
901 scoped_ptr<IntranetRedirectDetector> intranet_redirect_detector(
902 new IntranetRedirectDetector);
903 intranet_redirect_detector_.swap(intranet_redirect_detector);
904}
905
[email protected]29672ab2009-10-30 03:44:03906void BrowserProcessImpl::CreateNotificationUIManager() {
907 DCHECK(notification_ui_manager_.get() == NULL);
[email protected]b0b2a3dd2011-01-06 00:30:05908 notification_ui_manager_.reset(NotificationUIManager::Create(local_state()));
909
[email protected]29672ab2009-10-30 03:44:03910 created_notification_ui_manager_ = true;
911}
912
[email protected]0b4d3382010-07-14 16:13:04913void BrowserProcessImpl::CreateTabCloseableStateWatcher() {
914 DCHECK(tab_closeable_state_watcher_.get() == NULL);
915 tab_closeable_state_watcher_.reset(TabCloseableStateWatcher::Create());
916}
917
[email protected]9e7f015f2011-05-28 00:24:25918void BrowserProcessImpl::CreateBackgroundModeManager() {
919 DCHECK(background_mode_manager_.get() == NULL);
920 background_mode_manager_.reset(
921 new BackgroundModeManager(CommandLine::ForCurrentProcess()));
922}
923
924void BrowserProcessImpl::CreateStatusTray() {
925 DCHECK(status_tray_.get() == NULL);
926 status_tray_.reset(StatusTray::Create());
927}
928
[email protected]dbeebd52010-11-16 20:34:16929void BrowserProcessImpl::CreatePrintPreviewTabController() {
930 DCHECK(print_preview_tab_controller_.get() == NULL);
931 print_preview_tab_controller_ = new printing::PrintPreviewTabController();
932}
933
[email protected]68f88b992011-05-07 02:01:39934void BrowserProcessImpl::CreateBackgroundPrintingManager() {
935 DCHECK(background_printing_manager_.get() == NULL);
936 background_printing_manager_.reset(new printing::BackgroundPrintingManager());
937}
938
[email protected]462a0ff2011-06-02 17:15:34939void BrowserProcessImpl::CreateSafeBrowsingService() {
940 DCHECK(safe_browsing_service_.get() == NULL);
941 created_safe_browsing_service_ = true;
[email protected]4b58e7d2011-07-11 10:22:56942#if defined(ENABLE_SAFE_BROWSING)
[email protected]462a0ff2011-06-02 17:15:34943 safe_browsing_service_ = SafeBrowsingService::CreateSafeBrowsingService();
944 safe_browsing_service_->Initialize();
[email protected]4b58e7d2011-07-11 10:22:56945#endif
[email protected]462a0ff2011-06-02 17:15:34946}
947
[email protected]a7a5e992010-12-09 23:39:51948void BrowserProcessImpl::CreateSafeBrowsingDetectionService() {
949 DCHECK(safe_browsing_detection_service_.get() == NULL);
950 // Set this flag to true so that we don't retry indefinitely to
951 // create the service class if there was an error.
952 created_safe_browsing_detection_service_ = true;
953
[email protected]4b58e7d2011-07-11 10:22:56954#if defined(ENABLE_SAFE_BROWSING)
[email protected]cae64fe2011-06-17 17:54:50955 FilePath model_file_dir;
[email protected]a7a5e992010-12-09 23:39:51956 Profile* profile = profile_manager() ?
957 profile_manager()->GetDefaultProfile() : NULL;
958 if (IsSafeBrowsingDetectionServiceEnabled() &&
[email protected]cae64fe2011-06-17 17:54:50959 PathService::Get(chrome::DIR_USER_DATA, &model_file_dir) &&
[email protected]a7a5e992010-12-09 23:39:51960 profile && profile->GetRequestContext()) {
961 safe_browsing_detection_service_.reset(
962 safe_browsing::ClientSideDetectionService::Create(
[email protected]cae64fe2011-06-17 17:54:50963 model_file_dir, profile->GetRequestContext()));
[email protected]a7a5e992010-12-09 23:39:51964 }
[email protected]4b58e7d2011-07-11 10:22:56965#endif
[email protected]a7a5e992010-12-09 23:39:51966}
967
968bool BrowserProcessImpl::IsSafeBrowsingDetectionServiceEnabled() {
969 // The safe browsing client-side detection is enabled only if the switch is
[email protected]436ebd62011-06-09 22:08:11970 // not disabled and when safe browsing related stats are allowed to be
971 // collected.
[email protected]4b58e7d2011-07-11 10:22:56972#if defined(ENABLE_SAFE_BROWSING) && !defined(OS_CHROMEOS)
[email protected]d081d192011-04-01 02:33:24973 return !CommandLine::ForCurrentProcess()->HasSwitch(
974 switches::kDisableClientSidePhishingDetection) &&
[email protected]462a0ff2011-06-02 17:15:34975 safe_browsing_service() &&
[email protected]436ebd62011-06-09 22:08:11976 safe_browsing_service()->CanReportStats();
[email protected]4b58e7d2011-07-11 10:22:56977#else
978 return false;
[email protected]d081d192011-04-01 02:33:24979#endif
[email protected]a7a5e992010-12-09 23:39:51980}
981
[email protected]419a0572011-04-18 22:21:46982void BrowserProcessImpl::ApplyDisabledSchemesPolicy() {
983 std::set<std::string> schemes;
[email protected]b99c41c2011-04-27 15:18:48984 const ListValue* scheme_list = local_state_->GetList(prefs::kDisabledSchemes);
985 for (ListValue::const_iterator iter = scheme_list->begin();
986 iter != scheme_list->end(); ++iter) {
[email protected]419a0572011-04-18 22:21:46987 std::string scheme;
988 if ((*iter)->GetAsString(&scheme))
989 schemes.insert(scheme);
990 }
991 ChildProcessSecurityPolicy::GetInstance()->RegisterDisabledSchemes(schemes);
992}
993
[email protected]40850a52011-05-26 22:07:35994void BrowserProcessImpl::ApplyAllowCrossOriginAuthPromptPolicy() {
995 bool value = local_state()->GetBoolean(prefs::kAllowCrossOriginAuthPrompt);
996 resource_dispatcher_host()->set_allow_cross_origin_auth_prompt(value);
997}
998
[email protected]6641bf662009-08-21 00:34:09999// The BrowserProcess object must outlive the file thread so we use traits
1000// which don't do any management.
[email protected]c56428f22010-06-16 02:17:231001DISABLE_RUNNABLE_METHOD_REFCOUNT(BrowserProcessImpl);
[email protected]6641bf662009-08-21 00:34:091002
[email protected]d55aaa132009-09-28 21:08:041003#if defined(IPC_MESSAGE_LOG_ENABLED)
1004
1005void BrowserProcessImpl::SetIPCLoggingEnabled(bool enable) {
1006 // First enable myself.
1007 if (enable)
[email protected]8e8bb6d2010-12-13 08:18:551008 IPC::Logging::GetInstance()->Enable();
[email protected]d55aaa132009-09-28 21:08:041009 else
[email protected]8e8bb6d2010-12-13 08:18:551010 IPC::Logging::GetInstance()->Disable();
[email protected]d55aaa132009-09-28 21:08:041011
1012 // Now tell subprocesses. Messages to ChildProcess-derived
1013 // processes must be done on the IO thread.
1014 io_thread()->message_loop()->PostTask
1015 (FROM_HERE,
1016 NewRunnableMethod(
1017 this,
1018 &BrowserProcessImpl::SetIPCLoggingEnabledForChildProcesses,
1019 enable));
1020
1021 // Finally, tell the renderers which don't derive from ChildProcess.
1022 // Messages to the renderers must be done on the UI (main) thread.
[email protected]019191a2009-10-02 20:37:271023 for (RenderProcessHost::iterator i(RenderProcessHost::AllHostsIterator());
1024 !i.IsAtEnd(); i.Advance())
[email protected]ff47b2962011-03-07 23:51:491025 i.GetCurrentValue()->Send(new ChildProcessMsg_SetIPCLoggingEnabled(enable));
[email protected]d55aaa132009-09-28 21:08:041026}
1027
1028// Helper for SetIPCLoggingEnabled.
1029void BrowserProcessImpl::SetIPCLoggingEnabledForChildProcesses(bool enabled) {
[email protected]d04e7662010-10-10 22:24:481030 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO));
[email protected]d55aaa132009-09-28 21:08:041031
[email protected]d27893f62010-07-03 05:47:421032 BrowserChildProcessHost::Iterator i; // default constr references a singleton
[email protected]34cf97d2009-09-29 22:46:111033 while (!i.Done()) {
[email protected]ff47b2962011-03-07 23:51:491034 i->Send(new ChildProcessMsg_SetIPCLoggingEnabled(enabled));
[email protected]34cf97d2009-09-29 22:46:111035 ++i;
[email protected]d55aaa132009-09-28 21:08:041036 }
1037}
1038
1039#endif // IPC_MESSAGE_LOG_ENABLED
1040
[email protected]3cdacd42010-04-30 18:55:531041// Mac is currently not supported.
1042#if (defined(OS_WIN) || defined(OS_LINUX)) && !defined(OS_CHROMEOS)
[email protected]bd48c2b02010-04-09 20:32:421043
1044bool BrowserProcessImpl::CanAutorestartForUpdate() const {
1045 // Check if browser is in the background and if it needs to be restarted to
1046 // apply a pending update.
[email protected]c10fa3952010-08-24 16:52:531047 return BrowserList::size() == 0 && BrowserList::WillKeepAlive() &&
[email protected]815856722011-04-13 17:19:191048 upgrade_util::IsUpdatePendingRestart();
[email protected]bd48c2b02010-04-09 20:32:421049}
1050
[email protected]5c08f222010-09-22 09:37:211051// Switches to add when auto-restarting Chrome.
[email protected]6c10c972010-08-11 04:15:471052const char* const kSwitchesToAddOnAutorestart[] = {
[email protected]f9a06842010-08-21 00:32:401053 switches::kNoStartupWindow
[email protected]bd48c2b02010-04-09 20:32:421054};
1055
1056void BrowserProcessImpl::RestartPersistentInstance() {
1057 CommandLine* old_cl = CommandLine::ForCurrentProcess();
[email protected]3cdacd42010-04-30 18:55:531058 scoped_ptr<CommandLine> new_cl(new CommandLine(old_cl->GetProgram()));
[email protected]bd48c2b02010-04-09 20:32:421059
1060 std::map<std::string, CommandLine::StringType> switches =
1061 old_cl->GetSwitches();
1062
[email protected]5c08f222010-09-22 09:37:211063 switches::RemoveSwitchesForAutostart(&switches);
[email protected]bd48c2b02010-04-09 20:32:421064
1065 // Append the rest of the switches (along with their values, if any)
1066 // to the new command line
1067 for (std::map<std::string, CommandLine::StringType>::const_iterator i =
1068 switches.begin(); i != switches.end(); ++i) {
1069 CommandLine::StringType switch_value = i->second;
1070 if (switch_value.length() > 0) {
[email protected]05076ba22010-07-30 05:59:571071 new_cl->AppendSwitchNative(i->first, i->second);
[email protected]bd48c2b02010-04-09 20:32:421072 } else {
[email protected]3cdacd42010-04-30 18:55:531073 new_cl->AppendSwitch(i->first);
[email protected]bd48c2b02010-04-09 20:32:421074 }
1075 }
1076
[email protected]6c10c972010-08-11 04:15:471077 // Ensure that our desired switches are set on the new process.
[email protected]5c08f222010-09-22 09:37:211078 for (size_t i = 0; i < arraysize(kSwitchesToAddOnAutorestart); ++i) {
[email protected]6c10c972010-08-11 04:15:471079 if (!new_cl->HasSwitch(kSwitchesToAddOnAutorestart[i]))
1080 new_cl->AppendSwitch(kSwitchesToAddOnAutorestart[i]);
1081 }
[email protected]bd48c2b02010-04-09 20:32:421082
[email protected]3cdacd42010-04-30 18:55:531083 DLOG(WARNING) << "Shutting down current instance of the browser.";
[email protected]bc63a072011-06-28 21:12:571084 BrowserList::AttemptExit();
[email protected]3cdacd42010-04-30 18:55:531085
1086 // Transfer ownership to Upgrade.
[email protected]815856722011-04-13 17:19:191087 upgrade_util::SetNewCommandLine(new_cl.release());
[email protected]bd48c2b02010-04-09 20:32:421088}
1089
1090void BrowserProcessImpl::OnAutoupdateTimer() {
1091 if (CanAutorestartForUpdate()) {
[email protected]3cdacd42010-04-30 18:55:531092 DLOG(WARNING) << "Detected update. Restarting browser.";
[email protected]bd48c2b02010-04-09 20:32:421093 RestartPersistentInstance();
1094 }
1095}
1096
[email protected]3cdacd42010-04-30 18:55:531097#endif // (defined(OS_WIN) || defined(OS_LINUX)) && !defined(OS_CHROMEOS)