1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "chrome/browser/profiles/off_the_record_profile_io_data.h"
8 #include "base/command_line.h"
9 #include "base/logging.h"
10 #include "base/prefs/pref_service.h"
11 #include "base/stl_util.h"
12 #include "base/threading/worker_pool.h"
13 #include "build/build_config.h"
14 #include "chrome/browser/browser_process.h"
15 #include "chrome/browser/custom_handlers/protocol_handler_registry.h"
16 #include "chrome/browser/custom_handlers/protocol_handler_registry_factory.h"
17 #include "chrome/browser/io_thread.h"
18 #include "chrome/browser/net/about_protocol_handler.h"
19 #include "chrome/browser/net/chrome_net_log.h"
20 #include "chrome/browser/net/chrome_network_delegate.h"
21 #include "chrome/browser/net/chrome_url_request_context_getter.h"
22 #include "chrome/browser/profiles/profile.h"
23 #include "chrome/common/chrome_switches.h"
24 #include "chrome/common/pref_names.h"
25 #include "chrome/common/url_constants.h"
26 #include "content/public/browser/browser_thread.h"
27 #include "content/public/browser/cookie_store_factory.h"
28 #include "content/public/browser/resource_context.h"
29 #include "extensions/common/constants.h"
30 #include "extensions/common/extension.h"
31 #include "net/base/sdch_dictionary_fetcher.h"
32 #include "net/base/sdch_manager.h"
33 #include "net/ftp/ftp_network_layer.h"
34 #include "net/http/http_cache.h"
35 #include "net/http/http_network_session.h"
36 #include "net/http/http_server_properties_impl.h"
37 #include "net/ssl/channel_id_service.h"
38 #include "net/ssl/default_channel_id_store.h"
39 #include "net/url_request/url_request_job_factory_impl.h"
40 #include "webkit/browser/database/database_tracker.h"
42 using content::BrowserThread;
44 OffTheRecordProfileIOData::Handle::Handle(Profile* profile)
45 : io_data_(new OffTheRecordProfileIOData(profile->GetProfileType())),
48 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
52 OffTheRecordProfileIOData::Handle::~Handle() {
53 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
54 io_data_->ShutdownOnUIThread(GetAllContextGetters().Pass());
57 content::ResourceContext*
58 OffTheRecordProfileIOData::Handle::GetResourceContext() const {
59 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
61 return GetResourceContextNoInit();
64 content::ResourceContext*
65 OffTheRecordProfileIOData::Handle::GetResourceContextNoInit() const {
66 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
67 // Don't call LazyInitialize here, since the resource context is created at
68 // the beginning of initalization and is used by some members while they're
69 // being initialized (i.e. AppCacheService).
70 return io_data_->GetResourceContext();
73 scoped_refptr<ChromeURLRequestContextGetter>
74 OffTheRecordProfileIOData::Handle::CreateMainRequestContextGetter(
75 content::ProtocolHandlerMap* protocol_handlers,
76 content::URLRequestInterceptorScopedVector request_interceptors) const {
77 // TODO(oshima): Re-enable when ChromeOS only accesses the profile on the UI
79 #if !defined(OS_CHROMEOS)
80 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
81 #endif // defined(OS_CHROMEOS)
83 DCHECK(!main_request_context_getter_.get());
84 main_request_context_getter_ = ChromeURLRequestContextGetter::Create(
85 profile_, io_data_, protocol_handlers, request_interceptors.Pass());
86 return main_request_context_getter_;
89 scoped_refptr<ChromeURLRequestContextGetter>
90 OffTheRecordProfileIOData::Handle::GetExtensionsRequestContextGetter() const {
91 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
93 if (!extensions_request_context_getter_.get()) {
94 extensions_request_context_getter_ =
95 ChromeURLRequestContextGetter::CreateForExtensions(profile_, io_data_);
97 return extensions_request_context_getter_;
100 scoped_refptr<ChromeURLRequestContextGetter>
101 OffTheRecordProfileIOData::Handle::GetIsolatedAppRequestContextGetter(
102 const base::FilePath& partition_path,
103 bool in_memory) const {
104 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
105 DCHECK(!partition_path.empty());
108 // Keep a map of request context getters, one per requested app ID.
109 StoragePartitionDescriptor descriptor(partition_path, in_memory);
110 ChromeURLRequestContextGetterMap::iterator iter =
111 app_request_context_getter_map_.find(descriptor);
112 CHECK(iter != app_request_context_getter_map_.end());
116 scoped_refptr<ChromeURLRequestContextGetter>
117 OffTheRecordProfileIOData::Handle::CreateIsolatedAppRequestContextGetter(
118 const base::FilePath& partition_path,
120 content::ProtocolHandlerMap* protocol_handlers,
121 content::URLRequestInterceptorScopedVector request_interceptors) const {
122 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
123 DCHECK(!partition_path.empty());
126 // Keep a map of request context getters, one per requested app ID.
127 StoragePartitionDescriptor descriptor(partition_path, in_memory);
128 DCHECK_EQ(app_request_context_getter_map_.count(descriptor), 0u);
130 scoped_ptr<ProtocolHandlerRegistry::JobInterceptorFactory>
131 protocol_handler_interceptor(
132 ProtocolHandlerRegistryFactory::GetForBrowserContext(profile_)->
133 CreateJobInterceptorFactory());
134 ChromeURLRequestContextGetter* context =
135 ChromeURLRequestContextGetter::CreateForIsolatedApp(
139 protocol_handler_interceptor.Pass(),
141 request_interceptors.Pass());
142 app_request_context_getter_map_[descriptor] = context;
147 DevToolsNetworkController*
148 OffTheRecordProfileIOData::Handle::GetDevToolsNetworkController() const {
149 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
150 return io_data_->network_controller();
153 void OffTheRecordProfileIOData::Handle::LazyInitialize() const {
157 // Set initialized_ to true at the beginning in case any of the objects
158 // below try to get the ResourceContext pointer.
160 #if defined(FULL_SAFE_BROWSING) || defined(MOBILE_SAFE_BROWSING)
161 io_data_->safe_browsing_enabled()->Init(prefs::kSafeBrowsingEnabled,
162 profile_->GetPrefs());
163 io_data_->safe_browsing_enabled()->MoveToThread(
164 BrowserThread::GetMessageLoopProxyForThread(BrowserThread::IO));
166 #if defined(SPDY_PROXY_AUTH_ORIGIN)
167 io_data_->data_reduction_proxy_enabled()->Init(
168 data_reduction_proxy::prefs::kDataReductionProxyEnabled,
169 profile_->GetPrefs());
170 io_data_->data_reduction_proxy_enabled()->MoveToThread(
171 BrowserThread::GetMessageLoopProxyForThread(BrowserThread::IO));
173 io_data_->InitializeOnUIThread(profile_);
176 scoped_ptr<ProfileIOData::ChromeURLRequestContextGetterVector>
177 OffTheRecordProfileIOData::Handle::GetAllContextGetters() {
178 scoped_ptr<ChromeURLRequestContextGetterVector> context_getters(
179 new ChromeURLRequestContextGetterVector());
180 ChromeURLRequestContextGetterMap::iterator iter =
181 app_request_context_getter_map_.begin();
182 for (; iter != app_request_context_getter_map_.end(); ++iter)
183 context_getters->push_back(iter->second);
185 if (extensions_request_context_getter_)
186 context_getters->push_back(extensions_request_context_getter_);
188 if (main_request_context_getter_)
189 context_getters->push_back(main_request_context_getter_);
191 return context_getters.Pass();
194 OffTheRecordProfileIOData::OffTheRecordProfileIOData(
195 Profile::ProfileType profile_type)
196 : ProfileIOData(profile_type) {}
198 OffTheRecordProfileIOData::~OffTheRecordProfileIOData() {
199 DestroyResourceContext();
202 void OffTheRecordProfileIOData::InitializeInternal(
203 ProfileParams* profile_params,
204 content::ProtocolHandlerMap* protocol_handlers,
205 content::URLRequestInterceptorScopedVector request_interceptors) const {
206 net::URLRequestContext* main_context = main_request_context();
208 IOThread* const io_thread = profile_params->io_thread;
209 IOThread::Globals* const io_thread_globals = io_thread->globals();
211 ApplyProfileParamsToContext(main_context);
213 main_context->set_transport_security_state(transport_security_state());
215 main_context->set_net_log(io_thread->net_log());
217 main_context->set_network_delegate(network_delegate());
219 main_context->set_host_resolver(
220 io_thread_globals->host_resolver.get());
221 main_context->set_http_auth_handler_factory(
222 io_thread_globals->http_auth_handler_factory.get());
223 main_context->set_fraudulent_certificate_reporter(
224 fraudulent_certificate_reporter());
225 main_context->set_proxy_service(proxy_service());
227 main_context->set_throttler_manager(
228 io_thread_globals->throttler_manager.get());
230 main_context->set_cert_transparency_verifier(
231 io_thread_globals->cert_transparency_verifier.get());
233 // For incognito, we use the default non-persistent HttpServerPropertiesImpl.
234 set_http_server_properties(
235 scoped_ptr<net::HttpServerProperties>(
236 new net::HttpServerPropertiesImpl()));
237 main_context->set_http_server_properties(http_server_properties());
239 // For incognito, we use a non-persistent channel ID store.
240 net::ChannelIDService* channel_id_service =
241 new net::ChannelIDService(
242 new net::DefaultChannelIDStore(NULL),
243 base::WorkerPool::GetTaskRunner(true));
244 set_channel_id_service(channel_id_service);
245 main_context->set_channel_id_service(channel_id_service);
247 using content::CookieStoreConfig;
248 main_context->set_cookie_store(
249 CreateCookieStore(CookieStoreConfig(
251 CookieStoreConfig::EPHEMERAL_SESSION_COOKIES,
253 profile_params->cookie_monster_delegate.get())));
255 net::HttpCache::BackendFactory* main_backend =
256 net::HttpCache::DefaultBackend::InMemory(0);
257 main_http_factory_ = CreateMainHttpFactory(profile_params, main_backend);
259 main_context->set_http_transaction_factory(main_http_factory_.get());
260 #if !defined(DISABLE_FTP_SUPPORT)
262 new net::FtpNetworkLayer(main_context->host_resolver()));
263 #endif // !defined(DISABLE_FTP_SUPPORT)
265 scoped_ptr<net::URLRequestJobFactoryImpl> main_job_factory(
266 new net::URLRequestJobFactoryImpl());
268 InstallProtocolHandlers(main_job_factory.get(), protocol_handlers);
269 main_job_factory_ = SetUpJobFactoryDefaults(
270 main_job_factory.Pass(),
271 request_interceptors.Pass(),
272 profile_params->protocol_handler_interceptor.Pass(),
275 main_context->set_job_factory(main_job_factory_.get());
277 // Setup the SDCHManager for this profile.
278 sdch_manager_.reset(new net::SdchManager);
279 sdch_manager_->set_sdch_fetcher(
280 new net::SdchDictionaryFetcher(
282 // SdchDictionaryFetcher takes a reference to the Getter, and
283 // hence implicitly takes ownership.
284 new net::TrivialURLRequestContextGetter(
286 content::BrowserThread::GetMessageLoopProxyForThread(
287 content::BrowserThread::IO))));
288 main_context->set_sdch_manager(sdch_manager_.get());
290 #if defined(ENABLE_EXTENSIONS)
291 InitializeExtensionsRequestContext(profile_params);
295 void OffTheRecordProfileIOData::
296 InitializeExtensionsRequestContext(ProfileParams* profile_params) const {
297 net::URLRequestContext* extensions_context = extensions_request_context();
299 IOThread* const io_thread = profile_params->io_thread;
300 IOThread::Globals* const io_thread_globals = io_thread->globals();
302 ApplyProfileParamsToContext(extensions_context);
304 extensions_context->set_transport_security_state(transport_security_state());
306 extensions_context->set_net_log(io_thread->net_log());
308 extensions_context->set_throttler_manager(
309 io_thread_globals->throttler_manager.get());
311 extensions_context->set_cert_transparency_verifier(
312 io_thread_globals->cert_transparency_verifier.get());
314 // All we care about for extensions is the cookie store. For incognito, we
315 // use a non-persistent cookie store.
316 net::CookieMonster* extensions_cookie_store =
317 content::CreateCookieStore(content::CookieStoreConfig())->
319 // Enable cookies for devtools and extension URLs.
320 const char* const schemes[] = {
321 content::kChromeDevToolsScheme,
322 extensions::kExtensionScheme
324 extensions_cookie_store->SetCookieableSchemes(schemes, arraysize(schemes));
325 extensions_context->set_cookie_store(extensions_cookie_store);
327 scoped_ptr<net::URLRequestJobFactoryImpl> extensions_job_factory(
328 new net::URLRequestJobFactoryImpl());
329 // TODO(shalev): The extensions_job_factory has a NULL NetworkDelegate.
330 // Without a network_delegate, this protocol handler will never
331 // handle file: requests, but as a side effect it makes
332 // job_factory::IsHandledProtocol return true, which prevents attempts to
333 // handle the protocol externally. We pass NULL in to
334 // SetUpJobFactoryDefaults() to get this effect.
335 extensions_job_factory_ = SetUpJobFactoryDefaults(
336 extensions_job_factory.Pass(),
337 content::URLRequestInterceptorScopedVector(),
338 scoped_ptr<ProtocolHandlerRegistry::JobInterceptorFactory>(),
341 extensions_context->set_job_factory(extensions_job_factory_.get());
344 net::URLRequestContext* OffTheRecordProfileIOData::InitializeAppRequestContext(
345 net::URLRequestContext* main_context,
346 const StoragePartitionDescriptor& partition_descriptor,
347 scoped_ptr<ProtocolHandlerRegistry::JobInterceptorFactory>
348 protocol_handler_interceptor,
349 content::ProtocolHandlerMap* protocol_handlers,
350 content::URLRequestInterceptorScopedVector request_interceptors) const {
351 AppRequestContext* context = new AppRequestContext();
353 // Copy most state from the main context.
354 context->CopyFrom(main_context);
356 // Use a separate in-memory cookie store for the app.
357 // TODO(creis): We should have a cookie delegate for notifying the cookie
358 // extensions API, but we need to update it to understand isolated apps first.
359 context->SetCookieStore(
360 content::CreateCookieStore(content::CookieStoreConfig()));
362 // Use a separate in-memory cache for the app.
363 net::HttpCache::BackendFactory* app_backend =
364 net::HttpCache::DefaultBackend::InMemory(0);
365 net::HttpNetworkSession* main_network_session =
366 main_http_factory_->GetSession();
367 scoped_ptr<net::HttpCache> app_http_cache =
368 CreateHttpFactory(main_network_session, app_backend);
370 context->SetHttpTransactionFactory(
371 app_http_cache.PassAs<net::HttpTransactionFactory>());
373 scoped_ptr<net::URLRequestJobFactoryImpl> job_factory(
374 new net::URLRequestJobFactoryImpl());
375 InstallProtocolHandlers(job_factory.get(), protocol_handlers);
376 scoped_ptr<net::URLRequestJobFactory> top_job_factory;
377 top_job_factory = SetUpJobFactoryDefaults(job_factory.Pass(),
378 request_interceptors.Pass(),
379 protocol_handler_interceptor.Pass(),
382 context->SetJobFactory(top_job_factory.Pass());
386 net::URLRequestContext*
387 OffTheRecordProfileIOData::InitializeMediaRequestContext(
388 net::URLRequestContext* original_context,
389 const StoragePartitionDescriptor& partition_descriptor) const {
394 net::URLRequestContext*
395 OffTheRecordProfileIOData::AcquireMediaRequestContext() const {
400 net::URLRequestContext*
401 OffTheRecordProfileIOData::AcquireIsolatedAppRequestContext(
402 net::URLRequestContext* main_context,
403 const StoragePartitionDescriptor& partition_descriptor,
404 scoped_ptr<ProtocolHandlerRegistry::JobInterceptorFactory>
405 protocol_handler_interceptor,
406 content::ProtocolHandlerMap* protocol_handlers,
407 content::URLRequestInterceptorScopedVector request_interceptors) const {
408 // We create per-app contexts on demand, unlike the others above.
409 net::URLRequestContext* app_request_context =
410 InitializeAppRequestContext(main_context,
411 partition_descriptor,
412 protocol_handler_interceptor.Pass(),
414 request_interceptors.Pass());
415 DCHECK(app_request_context);
416 return app_request_context;
419 net::URLRequestContext*
420 OffTheRecordProfileIOData::AcquireIsolatedMediaRequestContext(
421 net::URLRequestContext* app_context,
422 const StoragePartitionDescriptor& partition_descriptor) const {