OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/profiles/profile_io_data.h" | 5 #include "chrome/browser/profiles/profile_io_data.h" |
6 | 6 |
7 #include <string> | 7 #include <string> |
8 | 8 |
9 #include "base/basictypes.h" | 9 #include "base/basictypes.h" |
10 #include "base/bind.h" | 10 #include "base/bind.h" |
(...skipping 401 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
412 sync_disabled_.MoveToThread(io_message_loop_proxy); | 412 sync_disabled_.MoveToThread(io_message_loop_proxy); |
413 | 413 |
414 signin_allowed_.Init(prefs::kSigninAllowed, pref_service); | 414 signin_allowed_.Init(prefs::kSigninAllowed, pref_service); |
415 signin_allowed_.MoveToThread(io_message_loop_proxy); | 415 signin_allowed_.MoveToThread(io_message_loop_proxy); |
416 } | 416 } |
417 | 417 |
418 quick_check_enabled_.Init(prefs::kQuickCheckEnabled, | 418 quick_check_enabled_.Init(prefs::kQuickCheckEnabled, |
419 local_state_pref_service); | 419 local_state_pref_service); |
420 quick_check_enabled_.MoveToThread(io_message_loop_proxy); | 420 quick_check_enabled_.MoveToThread(io_message_loop_proxy); |
421 | 421 |
422 media_device_id_salt_.reset(new MediaDeviceIDSalt(pref_service, | 422 media_device_id_salt_ = new MediaDeviceIDSalt(pref_service, is_incognito()); |
423 is_incognito())); | |
424 | 423 |
425 network_prediction_enabled_.Init(prefs::kNetworkPredictionEnabled, | 424 network_prediction_enabled_.Init(prefs::kNetworkPredictionEnabled, |
426 pref_service); | 425 pref_service); |
427 network_prediction_enabled_.MoveToThread(io_message_loop_proxy); | 426 network_prediction_enabled_.MoveToThread(io_message_loop_proxy); |
428 | 427 |
429 #if defined(OS_CHROMEOS) | 428 #if defined(OS_CHROMEOS) |
430 cert_verifier_ = policy::PolicyCertServiceFactory::CreateForProfile(profile); | 429 cert_verifier_ = policy::PolicyCertServiceFactory::CreateForProfile(profile); |
431 #endif | 430 #endif |
432 // The URLBlacklistManager has to be created on the UI thread to register | 431 // The URLBlacklistManager has to be created on the UI thread to register |
433 // observers of |pref_service|, and it also has to clean up on | 432 // observers of |pref_service|, and it also has to clean up on |
(...skipping 289 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
723 // Allow either Init() or SetCookieSettingsForTesting() to initialize. | 722 // Allow either Init() or SetCookieSettingsForTesting() to initialize. |
724 DCHECK(initialized_ || cookie_settings_.get()); | 723 DCHECK(initialized_ || cookie_settings_.get()); |
725 return cookie_settings_.get(); | 724 return cookie_settings_.get(); |
726 } | 725 } |
727 | 726 |
728 HostContentSettingsMap* ProfileIOData::GetHostContentSettingsMap() const { | 727 HostContentSettingsMap* ProfileIOData::GetHostContentSettingsMap() const { |
729 DCHECK(initialized_); | 728 DCHECK(initialized_); |
730 return host_content_settings_map_.get(); | 729 return host_content_settings_map_.get(); |
731 } | 730 } |
732 | 731 |
733 std::string ProfileIOData::GetMediaDeviceIDSalt() const { | 732 ResourceContext::SaltCallback ProfileIOData::GetMediaDeviceIDSalt() const { |
734 return media_device_id_salt_->GetSalt(); | 733 return base::Bind(&MediaDeviceIDSalt::GetSalt, media_device_id_salt_); |
735 } | 734 } |
736 | 735 |
737 void ProfileIOData::InitializeMetricsEnabledStateOnUIThread() { | 736 void ProfileIOData::InitializeMetricsEnabledStateOnUIThread() { |
738 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | 737 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
739 #if defined(OS_CHROMEOS) | 738 #if defined(OS_CHROMEOS) |
740 // Just fetch the value from ChromeOS' settings while we're on the UI thread. | 739 // Just fetch the value from ChromeOS' settings while we're on the UI thread. |
741 // TODO(stevet): For now, this value is only set on profile initialization. | 740 // TODO(stevet): For now, this value is only set on profile initialization. |
742 // We will want to do something similar to the PrefMember method below in the | 741 // We will want to do something similar to the PrefMember method below in the |
743 // future to more accurately capture this state. | 742 // future to more accurately capture this state. |
744 chromeos::CrosSettings::Get()->GetBoolean(chromeos::kStatsReportingPref, | 743 chromeos::CrosSettings::Get()->GetBoolean(chromeos::kStatsReportingPref, |
(...skipping 124 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
869 | 868 |
870 bool ProfileIOData::ResourceContext::AllowContentAccess( | 869 bool ProfileIOData::ResourceContext::AllowContentAccess( |
871 const GURL& origin, ContentSettingsType type) { | 870 const GURL& origin, ContentSettingsType type) { |
872 HostContentSettingsMap* content_settings = | 871 HostContentSettingsMap* content_settings = |
873 io_data_->GetHostContentSettingsMap(); | 872 io_data_->GetHostContentSettingsMap(); |
874 ContentSetting setting = content_settings->GetContentSetting( | 873 ContentSetting setting = content_settings->GetContentSetting( |
875 origin, origin, type, NO_RESOURCE_IDENTIFIER); | 874 origin, origin, type, NO_RESOURCE_IDENTIFIER); |
876 return setting == CONTENT_SETTING_ALLOW; | 875 return setting == CONTENT_SETTING_ALLOW; |
877 } | 876 } |
878 | 877 |
879 std::string ProfileIOData::ResourceContext::GetMediaDeviceIDSalt() { | 878 ResourceContext::SaltCallback |
| 879 ProfileIOData::ResourceContext::GetMediaDeviceIDSalt() { |
880 return io_data_->GetMediaDeviceIDSalt(); | 880 return io_data_->GetMediaDeviceIDSalt(); |
881 } | 881 } |
882 | 882 |
883 // static | 883 // static |
884 std::string ProfileIOData::GetSSLSessionCacheShard() { | 884 std::string ProfileIOData::GetSSLSessionCacheShard() { |
885 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); | 885 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); |
886 // The SSL session cache is partitioned by setting a string. This returns a | 886 // The SSL session cache is partitioned by setting a string. This returns a |
887 // unique string to partition the SSL session cache. Each time we create a | 887 // unique string to partition the SSL session cache. Each time we create a |
888 // new profile, we'll get a fresh SSL session cache which is separate from | 888 // new profile, we'll get a fresh SSL session cache which is separate from |
889 // the other profiles. | 889 // the other profiles. |
(...skipping 249 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
1139 void ProfileIOData::SetCookieSettingsForTesting( | 1139 void ProfileIOData::SetCookieSettingsForTesting( |
1140 CookieSettings* cookie_settings) { | 1140 CookieSettings* cookie_settings) { |
1141 DCHECK(!cookie_settings_.get()); | 1141 DCHECK(!cookie_settings_.get()); |
1142 cookie_settings_ = cookie_settings; | 1142 cookie_settings_ = cookie_settings; |
1143 } | 1143 } |
1144 | 1144 |
1145 void ProfileIOData::set_signin_names_for_testing( | 1145 void ProfileIOData::set_signin_names_for_testing( |
1146 SigninNamesOnIOThread* signin_names) { | 1146 SigninNamesOnIOThread* signin_names) { |
1147 signin_names_.reset(signin_names); | 1147 signin_names_.reset(signin_names); |
1148 } | 1148 } |
OLD | NEW |