| // Copyright 2015 The Chromium Authors |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "chrome/browser/push_messaging/push_messaging_service_factory.h" |
| |
| #include <memory> |
| |
| #include "base/functional/bind.h" |
| #include "base/memory/ptr_util.h" |
| #include "build/chromeos_buildflags.h" |
| #include "chrome/browser/browser_process.h" |
| #include "chrome/browser/content_settings/host_content_settings_map_factory.h" |
| #include "chrome/browser/engagement/site_engagement_service_factory.h" |
| #include "chrome/browser/gcm/gcm_profile_service_factory.h" |
| #include "chrome/browser/gcm/instance_id/instance_id_profile_service_factory.h" |
| #include "chrome/browser/permissions/permission_manager_factory.h" |
| #include "chrome/browser/profiles/profile.h" |
| #include "chrome/browser/push_messaging/push_messaging_service_impl.h" |
| #include "chrome/browser/safe_browsing/safe_browsing_service.h" |
| #include "components/gcm_driver/instance_id/instance_id_profile_service.h" |
| #include "components/safe_browsing/core/common/safe_browsing_prefs.h" |
| |
| // static |
| PushMessagingServiceImpl* PushMessagingServiceFactory::GetForProfile( |
| content::BrowserContext* context) { |
| // The Push API is not currently supported in incognito mode. |
| // See https://crbug.com/401439. |
| if (context->IsOffTheRecord()) |
| return nullptr; |
| |
| return static_cast<PushMessagingServiceImpl*>( |
| GetInstance()->GetServiceForBrowserContext(context, true)); |
| } |
| |
| // static |
| PushMessagingServiceFactory* PushMessagingServiceFactory::GetInstance() { |
| static base::NoDestructor<PushMessagingServiceFactory> instance; |
| return instance.get(); |
| } |
| |
| PushMessagingServiceFactory::PushMessagingServiceFactory() |
| : ProfileKeyedServiceFactory( |
| "PushMessagingProfileService", |
| ProfileSelections::Builder() |
| .WithRegular(ProfileSelection::kOwnInstance) |
| // TODO(crbug.com/40257657): Check if this service is needed in |
| // Guest mode. |
| .WithGuest(ProfileSelection::kOwnInstance) |
| // TODO(crbug.com/41488885): Check if this service is needed for |
| // Ash Internals. |
| .WithAshInternals(ProfileSelection::kOwnInstance) |
| .Build()) { |
| DependsOn(gcm::GCMProfileServiceFactory::GetInstance()); |
| DependsOn(instance_id::InstanceIDProfileServiceFactory::GetInstance()); |
| DependsOn(HostContentSettingsMapFactory::GetInstance()); |
| DependsOn(PermissionManagerFactory::GetInstance()); |
| DependsOn(site_engagement::SiteEngagementServiceFactory::GetInstance()); |
| } |
| |
| PushMessagingServiceFactory::~PushMessagingServiceFactory() = default; |
| |
| void PushMessagingServiceFactory::RestoreFactoryForTests( |
| content::BrowserContext* context) { |
| SetTestingFactory( |
| context, base::BindRepeating([](content::BrowserContext* context) { |
| return GetInstance()->BuildServiceInstanceForBrowserContext(context); |
| })); |
| } |
| |
| std::unique_ptr<KeyedService> |
| PushMessagingServiceFactory::BuildServiceInstanceForBrowserContext( |
| content::BrowserContext* context) const { |
| Profile* profile = Profile::FromBrowserContext(context); |
| CHECK(!profile->IsOffTheRecord()); |
| // Reporting service worker network requests should only be done for ESB |
| // users. The check below is the first ESB check. A second ESB check is |
| // performed before anything about the service worker is sent off device to |
| // Safe Browsing. If at the time of the second check the user is found to no |
| // longer be an ESB user, no Safe Browsing report will be sent. |
| bool includeSafeBrowsingDatabase = |
| g_browser_process && g_browser_process->safe_browsing_service() && |
| safe_browsing::IsEnhancedProtectionEnabled(*profile->GetPrefs()); |
| return std::make_unique<PushMessagingServiceImpl>( |
| profile, |
| includeSafeBrowsingDatabase |
| ? g_browser_process->safe_browsing_service()->database_manager() |
| : nullptr); |
| } |