Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "chrome/browser/io_thread.h" | 5 #include "chrome/browser/io_thread.h" |
| 6 | 6 |
| 7 #include <vector> | 7 #include <vector> |
| 8 | 8 |
| 9 #include "base/bind.h" | 9 #include "base/bind.h" |
| 10 #include "base/bind_helpers.h" | 10 #include "base/bind_helpers.h" |
| (...skipping 445 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 456 } | 456 } |
| 457 | 457 |
| 458 net::URLRequestContextGetter* IOThread::system_url_request_context_getter() { | 458 net::URLRequestContextGetter* IOThread::system_url_request_context_getter() { |
| 459 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); | 459 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
| 460 if (!system_url_request_context_getter_.get()) { | 460 if (!system_url_request_context_getter_.get()) { |
| 461 InitSystemRequestContext(); | 461 InitSystemRequestContext(); |
| 462 } | 462 } |
| 463 return system_url_request_context_getter_.get(); | 463 return system_url_request_context_getter_.get(); |
| 464 } | 464 } |
| 465 | 465 |
| 466 void IOThread::Init() { | 466 void IOThread::DoInitTasks() { |
| 467 TRACE_EVENT0("startup", "IOThread::Init"); | |
| 468 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); | |
| 469 | |
| 470 #if defined(USE_NSS) || defined(OS_IOS) | 467 #if defined(USE_NSS) || defined(OS_IOS) |
| 471 net::SetMessageLoopForNSSHttpIO(); | 468 net::SetMessageLoopForNSSHttpIO(); |
| 472 #endif | 469 #endif |
| 473 | 470 |
| 474 const CommandLine& command_line = *CommandLine::ForCurrentProcess(); | |
| 475 | |
| 476 DCHECK(!globals_); | 471 DCHECK(!globals_); |
| 477 globals_ = new Globals; | 472 globals_ = new Globals; |
| 478 | 473 |
| 474 const CommandLine& command_line = *CommandLine::ForCurrentProcess(); | |
| 475 | |
| 479 // Add an observer that will emit network change events to the ChromeNetLog. | 476 // Add an observer that will emit network change events to the ChromeNetLog. |
| 480 // Assuming NetworkChangeNotifier dispatches in FIFO order, we should be | 477 // Assuming NetworkChangeNotifier dispatches in FIFO order, we should be |
| 481 // logging the network change before other IO thread consumers respond to it. | 478 // logging the network change before other IO thread consumers respond to it. |
| 482 network_change_observer_.reset( | 479 network_change_observer_.reset(new LoggingNetworkChangeObserver(net_log_)); |
| 483 new LoggingNetworkChangeObserver(net_log_)); | |
| 484 | 480 |
| 485 // Setup the HistogramWatcher to run on the IO thread. | 481 // Setup the HistogramWatcher to run on the IO thread. |
| 486 net::NetworkChangeNotifier::InitHistogramWatcher(); | 482 net::NetworkChangeNotifier::InitHistogramWatcher(); |
| 487 | 483 |
| 488 globals_->extension_event_router_forwarder = | 484 globals_->extension_event_router_forwarder = |
| 489 extension_event_router_forwarder_; | 485 extension_event_router_forwarder_; |
| 490 ChromeNetworkDelegate* network_delegate = | 486 ChromeNetworkDelegate* network_delegate = new ChromeNetworkDelegate( |
| 491 new ChromeNetworkDelegate(extension_event_router_forwarder_, | 487 extension_event_router_forwarder_, &system_enable_referrers_); |
| 492 &system_enable_referrers_); | |
| 493 if (command_line.HasSwitch(switches::kDisableExtensionsHttpThrottling)) | 488 if (command_line.HasSwitch(switches::kDisableExtensionsHttpThrottling)) |
| 494 network_delegate->NeverThrottleRequests(); | 489 network_delegate->NeverThrottleRequests(); |
| 495 globals_->system_network_delegate.reset(network_delegate); | 490 globals_->system_network_delegate.reset(network_delegate); |
| 496 globals_->host_resolver = CreateGlobalHostResolver(net_log_); | 491 globals_->host_resolver = CreateGlobalHostResolver(net_log_); |
| 497 UpdateDnsClientEnabled(); | 492 UpdateDnsClientEnabled(); |
| 498 globals_->cert_verifier.reset(net::CertVerifier::CreateDefault()); | 493 globals_->cert_verifier.reset(net::CertVerifier::CreateDefault()); |
| 499 globals_->transport_security_state.reset(new net::TransportSecurityState()); | 494 globals_->transport_security_state.reset(new net::TransportSecurityState()); |
| 500 globals_->ssl_config_service = GetSSLConfigService(); | 495 globals_->ssl_config_service = GetSSLConfigService(); |
| 501 if (command_line.HasSwitch(switches::kSpdyProxyAuthOrigin)) { | 496 if (command_line.HasSwitch(switches::kSpdyProxyAuthOrigin)) { |
| 502 spdyproxy_auth_origin_ = | 497 spdyproxy_auth_origin_ = |
| 503 command_line.GetSwitchValueASCII(switches::kSpdyProxyAuthOrigin); | 498 command_line.GetSwitchValueASCII(switches::kSpdyProxyAuthOrigin); |
| 504 } else { | 499 } else { |
| 505 #if defined(SPDY_PROXY_AUTH_ORIGIN) | 500 #if defined(SPDY_PROXY_AUTH_ORIGIN) |
| 506 spdyproxy_auth_origin_ = SPDY_PROXY_AUTH_ORIGIN; | 501 spdyproxy_auth_origin_ = SPDY_PROXY_AUTH_ORIGIN; |
| 507 #endif | 502 #endif |
| 508 } | 503 } |
| 509 globals_->http_auth_handler_factory.reset(CreateDefaultAuthHandlerFactory( | 504 globals_->http_auth_handler_factory |
| 510 globals_->host_resolver.get())); | 505 .reset(CreateDefaultAuthHandlerFactory(globals_->host_resolver.get())); |
|
mmenke
2013/07/10 18:48:24
nit: For all of these, it's much more common acro
mmenke
2013/07/10 18:51:04
"On the same line as the object name", rather.
| |
| 511 globals_->http_server_properties.reset(new net::HttpServerPropertiesImpl); | 506 globals_->http_server_properties.reset(new net::HttpServerPropertiesImpl); |
| 512 // For the ProxyScriptFetcher, we use a direct ProxyService. | 507 // For the ProxyScriptFetcher, we use a direct ProxyService. |
| 513 globals_->proxy_script_fetcher_proxy_service.reset( | 508 globals_->proxy_script_fetcher_proxy_service |
| 514 net::ProxyService::CreateDirectWithNetLog(net_log_)); | 509 .reset(net::ProxyService::CreateDirectWithNetLog(net_log_)); |
| 515 // In-memory cookie store. | 510 // In-memory cookie store. |
| 516 globals_->system_cookie_store = new net::CookieMonster(NULL, NULL); | 511 globals_->system_cookie_store = new net::CookieMonster(NULL, NULL); |
| 517 // In-memory server bound cert store. | 512 // In-memory server bound cert store. |
| 518 globals_->system_server_bound_cert_service.reset( | 513 globals_->system_server_bound_cert_service |
| 519 new net::ServerBoundCertService( | 514 .reset(new net::ServerBoundCertService( |
| 520 new net::DefaultServerBoundCertStore(NULL), | 515 new net::DefaultServerBoundCertStore(NULL), |
| 521 base::WorkerPool::GetTaskRunner(true))); | 516 base::WorkerPool::GetTaskRunner(true))); |
| 522 globals_->dns_probe_service.reset(new chrome_browser_net::DnsProbeService()); | 517 globals_->dns_probe_service.reset(new chrome_browser_net::DnsProbeService()); |
| 523 globals_->load_time_stats.reset(new chrome_browser_net::LoadTimeStats()); | 518 globals_->load_time_stats.reset(new chrome_browser_net::LoadTimeStats()); |
| 524 globals_->host_mapping_rules.reset(new net::HostMappingRules()); | 519 globals_->host_mapping_rules.reset(new net::HostMappingRules()); |
| 525 globals_->http_user_agent_settings.reset( | 520 globals_->http_user_agent_settings |
| 526 new BasicHttpUserAgentSettings(std::string())); | 521 .reset(new BasicHttpUserAgentSettings(std::string())); |
| 527 if (command_line.HasSwitch(switches::kHostRules)) { | 522 if (command_line.HasSwitch(switches::kHostRules)) { |
| 528 TRACE_EVENT_BEGIN0("startup", "IOThread::Init:SetRulesFromString"); | 523 TRACE_EVENT_BEGIN0("startup", "IOThread::Init:SetRulesFromString"); |
| 529 globals_->host_mapping_rules->SetRulesFromString( | 524 globals_->host_mapping_rules->SetRulesFromString( |
| 530 command_line.GetSwitchValueASCII(switches::kHostRules)); | 525 command_line.GetSwitchValueASCII(switches::kHostRules)); |
| 531 TRACE_EVENT_END0("startup", "IOThread::Init:SetRulesFromString"); | 526 TRACE_EVENT_END0("startup", "IOThread::Init:SetRulesFromString"); |
| 532 } | 527 } |
| 533 if (command_line.HasSwitch(switches::kIgnoreCertificateErrors)) | 528 if (command_line.HasSwitch(switches::kIgnoreCertificateErrors)) |
| 534 globals_->ignore_certificate_errors = true; | 529 globals_->ignore_certificate_errors = true; |
| 535 if (command_line.HasSwitch(switches::kTestingFixedHttpPort)) { | 530 if (command_line.HasSwitch(switches::kTestingFixedHttpPort)) { |
| 536 globals_->testing_fixed_http_port = | 531 globals_->testing_fixed_http_port = |
| 537 GetSwitchValueAsInt(command_line, switches::kTestingFixedHttpPort); | 532 GetSwitchValueAsInt(command_line, switches::kTestingFixedHttpPort); |
| 538 } | 533 } |
| 539 if (command_line.HasSwitch(switches::kTestingFixedHttpsPort)) { | 534 if (command_line.HasSwitch(switches::kTestingFixedHttpsPort)) { |
| 540 globals_->testing_fixed_https_port = | 535 globals_->testing_fixed_https_port = |
| 541 GetSwitchValueAsInt(command_line, switches::kTestingFixedHttpsPort); | 536 GetSwitchValueAsInt(command_line, switches::kTestingFixedHttpsPort); |
| 542 } | 537 } |
| 543 globals_->enable_quic.set(ShouldEnableQuic(command_line)); | 538 globals_->enable_quic.set(ShouldEnableQuic(command_line)); |
| 544 if (command_line.HasSwitch(switches::kOriginToForceQuicOn)) { | 539 if (command_line.HasSwitch(switches::kOriginToForceQuicOn)) { |
| 545 net::HostPortPair quic_origin = | 540 net::HostPortPair quic_origin = net::HostPortPair::FromString( |
| 546 net::HostPortPair::FromString( | 541 command_line.GetSwitchValueASCII(switches::kOriginToForceQuicOn)); |
| 547 command_line.GetSwitchValueASCII(switches::kOriginToForceQuicOn)); | |
| 548 if (!quic_origin.IsEmpty()) { | 542 if (!quic_origin.IsEmpty()) { |
| 549 globals_->origin_to_force_quic_on.set(quic_origin); | 543 globals_->origin_to_force_quic_on.set(quic_origin); |
| 550 } | 544 } |
| 551 } | 545 } |
| 552 if (command_line.HasSwitch( | 546 if (command_line.HasSwitch(switches::kEnableUserAlternateProtocolPorts)) { |
| 553 switches::kEnableUserAlternateProtocolPorts)) { | |
| 554 globals_->enable_user_alternate_protocol_ports = true; | 547 globals_->enable_user_alternate_protocol_ports = true; |
| 555 } | 548 } |
| 556 InitializeNetworkOptions(command_line); | 549 InitializeNetworkOptions(command_line); |
| 557 | 550 |
| 558 net::HttpNetworkSession::Params session_params; | 551 net::HttpNetworkSession::Params session_params; |
| 559 InitializeNetworkSessionParams(&session_params); | 552 InitializeNetworkSessionParams(&session_params); |
| 560 session_params.net_log = net_log_; | 553 session_params.net_log = net_log_; |
| 561 session_params.proxy_service = | 554 session_params.proxy_service = |
| 562 globals_->proxy_script_fetcher_proxy_service.get(); | 555 globals_->proxy_script_fetcher_proxy_service.get(); |
| 563 | 556 |
| 564 TRACE_EVENT_BEGIN0("startup", "IOThread::Init:HttpNetworkSession"); | 557 TRACE_EVENT_BEGIN0("startup", "IOThread::Init:HttpNetworkSession"); |
| 565 scoped_refptr<net::HttpNetworkSession> network_session( | 558 scoped_refptr<net::HttpNetworkSession> network_session( |
| 566 new net::HttpNetworkSession(session_params)); | 559 new net::HttpNetworkSession(session_params)); |
| 567 globals_->proxy_script_fetcher_http_transaction_factory | 560 globals_->proxy_script_fetcher_http_transaction_factory |
| 568 .reset(new net::HttpNetworkLayer(network_session.get())); | 561 .reset(new net::HttpNetworkLayer(network_session.get())); |
| 569 TRACE_EVENT_END0("startup", "IOThread::Init:HttpNetworkSession"); | 562 TRACE_EVENT_END0("startup", "IOThread::Init:HttpNetworkSession"); |
| 570 scoped_ptr<net::URLRequestJobFactoryImpl> job_factory( | 563 scoped_ptr<net::URLRequestJobFactoryImpl> job_factory( |
| 571 new net::URLRequestJobFactoryImpl()); | 564 new net::URLRequestJobFactoryImpl()); |
| 572 job_factory->SetProtocolHandler(chrome::kDataScheme, | 565 job_factory->SetProtocolHandler(chrome::kDataScheme, |
| 573 new net::DataProtocolHandler()); | 566 new net::DataProtocolHandler()); |
| 574 job_factory->SetProtocolHandler(chrome::kFileScheme, | 567 job_factory->SetProtocolHandler(chrome::kFileScheme, |
| 575 new net::FileProtocolHandler()); | 568 new net::FileProtocolHandler()); |
| 576 #if !defined(DISABLE_FTP_SUPPORT) | 569 #if !defined(DISABLE_FTP_SUPPORT) |
| 577 globals_->proxy_script_fetcher_ftp_transaction_factory.reset( | 570 globals_->proxy_script_fetcher_ftp_transaction_factory |
| 578 new net::FtpNetworkLayer(globals_->host_resolver.get())); | 571 .reset(new net::FtpNetworkLayer(globals_->host_resolver.get())); |
| 579 job_factory->SetProtocolHandler( | 572 job_factory->SetProtocolHandler( |
| 580 chrome::kFtpScheme, | 573 chrome::kFtpScheme, |
| 581 new net::FtpProtocolHandler( | 574 new net::FtpProtocolHandler( |
| 582 globals_->proxy_script_fetcher_ftp_transaction_factory.get())); | 575 globals_->proxy_script_fetcher_ftp_transaction_factory.get())); |
| 583 #endif | 576 #endif |
| 584 globals_->proxy_script_fetcher_url_request_job_factory = | 577 globals_->proxy_script_fetcher_url_request_job_factory = |
| 585 job_factory.PassAs<net::URLRequestJobFactory>(); | 578 job_factory.PassAs<net::URLRequestJobFactory>(); |
| 586 | 579 |
| 587 globals_->throttler_manager.reset(new net::URLRequestThrottlerManager()); | 580 globals_->throttler_manager.reset(new net::URLRequestThrottlerManager()); |
| 588 globals_->throttler_manager->set_net_log(net_log_); | 581 globals_->throttler_manager->set_net_log(net_log_); |
| 589 // Always done in production, disabled only for unit tests. | 582 // Always done in production, disabled only for unit tests. |
| 590 globals_->throttler_manager->set_enable_thread_checks(true); | 583 globals_->throttler_manager->set_enable_thread_checks(true); |
| 591 | 584 |
| 592 globals_->proxy_script_fetcher_context.reset( | 585 globals_->proxy_script_fetcher_context |
| 593 ConstructProxyScriptFetcherContext(globals_, net_log_)); | 586 .reset(ConstructProxyScriptFetcherContext(globals_, net_log_)); |
| 594 | 587 |
| 595 globals_->network_time_notifier.reset( | 588 globals_->network_time_notifier.reset(new net::NetworkTimeNotifier( |
| 596 new net::NetworkTimeNotifier( | 589 scoped_ptr<base::TickClock>(new base::DefaultTickClock()))); |
| 597 scoped_ptr<base::TickClock>(new base::DefaultTickClock()))); | |
| 598 | 590 |
| 599 sdch_manager_ = new net::SdchManager(); | 591 sdch_manager_ = new net::SdchManager(); |
| 600 | 592 |
| 601 #if defined(OS_MACOSX) && !defined(OS_IOS) | 593 #if defined(OS_MACOSX) && !defined(OS_IOS) |
| 602 // Start observing Keychain events. This needs to be done on the UI thread, | 594 // Start observing Keychain events. This needs to be done on the UI thread, |
| 603 // as Keychain services requires a CFRunLoop. | 595 // as Keychain services requires a CFRunLoop. |
| 604 BrowserThread::PostTask(BrowserThread::UI, | 596 BrowserThread::PostTask( |
| 605 FROM_HERE, | 597 BrowserThread::UI, FROM_HERE, base::Bind(&ObserveKeychainEvents)); |
| 606 base::Bind(&ObserveKeychainEvents)); | |
| 607 #endif | 598 #endif |
| 608 | 599 |
| 609 // InitSystemRequestContext turns right around and posts a task back | 600 // InitSystemRequestContext turns right around and posts a task back |
| 610 // to the IO thread, so we can't let it run until we know the IO | 601 // to the IO thread, so we can't let it run until we know the IO |
| 611 // thread has started. | 602 // thread has started. |
| 612 // | 603 // |
| 613 // Note that since we are at BrowserThread::Init time, the UI thread | 604 // Note that since we are at BrowserThread::Init time, the UI thread |
| 614 // is blocked waiting for the thread to start. Therefore, posting | 605 // is blocked waiting for the thread to start. Therefore, posting |
| 615 // this task to the main thread's message loop here is guaranteed to | 606 // this task to the main thread's message loop here is guaranteed to |
| 616 // get it onto the message loop while the IOThread object still | 607 // get it onto the message loop while the IOThread object still |
| 617 // exists. However, the message might not be processed on the UI | 608 // exists. However, the message might not be processed on the UI |
| 618 // thread until after IOThread is gone, so use a weak pointer. | 609 // thread until after IOThread is gone, so use a weak pointer. |
| 619 BrowserThread::PostTask(BrowserThread::UI, | 610 BrowserThread::PostTask(BrowserThread::UI, |
| 620 FROM_HERE, | 611 FROM_HERE, |
| 621 base::Bind(&IOThread::InitSystemRequestContext, | 612 base::Bind(&IOThread::InitSystemRequestContext, |
| 622 weak_factory_.GetWeakPtr())); | 613 weak_factory_.GetWeakPtr())); |
| 623 } | 614 } |
| 624 | 615 |
| 616 void IOThread::Init() { | |
| 617 TRACE_EVENT0("startup", "IOThread::Init"); | |
| 618 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); | |
|
awong
2013/07/10 18:45:47
This confuses me...
My understanding of the origi
| |
| 619 | |
| 620 BrowserThread::PostTask( | |
| 621 BrowserThread::IO, | |
| 622 FROM_HERE, | |
| 623 base::Bind(&IOThread::DoInitTasks, base::Unretained(this))); | |
| 624 } | |
| 625 | |
| 625 void IOThread::CleanUp() { | 626 void IOThread::CleanUp() { |
| 626 base::debug::LeakTracker<SafeBrowsingURLRequestContext>::CheckForLeaks(); | 627 base::debug::LeakTracker<SafeBrowsingURLRequestContext>::CheckForLeaks(); |
| 627 | 628 |
| 628 delete sdch_manager_; | 629 delete sdch_manager_; |
| 629 sdch_manager_ = NULL; | 630 sdch_manager_ = NULL; |
| 630 | 631 |
| 631 #if defined(USE_NSS) || defined(OS_IOS) | 632 #if defined(USE_NSS) || defined(OS_IOS) |
| 632 net::ShutdownNSSHttpIO(); | 633 net::ShutdownNSSHttpIO(); |
| 633 #endif | 634 #endif |
| 634 | 635 |
| 635 system_url_request_context_getter_ = NULL; | 636 system_url_request_context_getter_ = NULL; |
| 636 | 637 |
| 637 // Release objects that the net::URLRequestContext could have been pointing | 638 // Release objects that the net::URLRequestContext could have been pointing |
| 638 // to. | 639 // to. |
| 639 | 640 |
| 640 // This must be reset before the ChromeNetLog is destroyed. | 641 // This must be reset before the ChromeNetLog is destroyed. |
| 641 network_change_observer_.reset(); | 642 network_change_observer_.reset(); |
| 642 | 643 |
| 643 system_proxy_config_service_.reset(); | 644 system_proxy_config_service_.reset(); |
| 644 | 645 |
| 645 delete globals_; | 646 delete globals_; |
| 646 globals_ = NULL; | 647 globals_ = NULL; |
| 647 | 648 |
| 648 base::debug::LeakTracker<SystemURLRequestContextGetter>::CheckForLeaks(); | 649 base::debug::LeakTracker<SystemURLRequestContextGetter>::CheckForLeaks(); |
| 649 } | 650 } |
| 650 | 651 |
| 651 void IOThread::InitializeNetworkOptions(const CommandLine& command_line) { | 652 void IOThread::InitializeNetworkOptions(const CommandLine& command_line) { |
| 652 if (command_line.HasSwitch(switches::kEnableFileCookies)) { | 653 if (command_line.HasSwitch(switches::kEnableFileCookies)) { |
| 653 // Enable cookie storage for file:// URLs. Must do this before the first | 654 // Enable cookie storage for file:// URLs. Must do this before the first |
| 654 // Profile (and therefore the first CookieMonster) is created. | 655 // Profile (and therefore the first CookieMonster) is created. |
|
mmenke
2013/07/10 18:48:24
After this CL, this can actually be done after the
| |
| 655 net::CookieMonster::EnableFileScheme(); | 656 net::CookieMonster::EnableFileScheme(); |
| 656 } | 657 } |
| 657 | 658 |
| 658 // If "spdy.disabled" preference is controlled via policy, then skip use-spdy | 659 // If "spdy.disabled" preference is controlled via policy, then skip use-spdy |
| 659 // command line flags. | 660 // command line flags. |
| 660 if (is_spdy_disabled_by_policy_) | 661 if (is_spdy_disabled_by_policy_) |
| 661 return; | 662 return; |
| 662 | 663 |
| 663 if (command_line.HasSwitch(switches::kEnableIPPooling)) | 664 if (command_line.HasSwitch(switches::kEnableIPPooling)) |
| 664 globals_->enable_spdy_ip_pooling.set(true); | 665 globals_->enable_spdy_ip_pooling.set(true); |
| (...skipping 295 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 960 base::FieldTrialList::FindFullName(kQuicFieldTrialName); | 961 base::FieldTrialList::FindFullName(kQuicFieldTrialName); |
| 961 | 962 |
| 962 if (command_line.HasSwitch(switches::kDisableQuic)) | 963 if (command_line.HasSwitch(switches::kDisableQuic)) |
| 963 return false; | 964 return false; |
| 964 | 965 |
| 965 if (command_line.HasSwitch(switches::kEnableQuic)) | 966 if (command_line.HasSwitch(switches::kEnableQuic)) |
| 966 return true; | 967 return true; |
| 967 | 968 |
| 968 return quic_trial_group == kQuicFieldTrialEnabledGroupName; | 969 return quic_trial_group == kQuicFieldTrialEnabledGroupName; |
| 969 } | 970 } |
| OLD | NEW |