blob: 16b1dbbb8758eb2b5e2bb6c3b68bd03bbed3f2c2 [file] [log] [blame]
// Copyright 2015 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "chrome/browser/push_messaging/push_messaging_service_factory.h"
#include <memory>
#include "base/functional/bind.h"
#include "base/memory/ptr_util.h"
#include "build/chromeos_buildflags.h"
#include "chrome/browser/browser_process.h"
#include "chrome/browser/content_settings/host_content_settings_map_factory.h"
#include "chrome/browser/engagement/site_engagement_service_factory.h"
#include "chrome/browser/gcm/gcm_profile_service_factory.h"
#include "chrome/browser/gcm/instance_id/instance_id_profile_service_factory.h"
#include "chrome/browser/permissions/permission_manager_factory.h"
#include "chrome/browser/profiles/profile.h"
#include "chrome/browser/push_messaging/push_messaging_service_impl.h"
#include "chrome/browser/safe_browsing/safe_browsing_service.h"
#include "components/gcm_driver/instance_id/instance_id_profile_service.h"
#include "components/safe_browsing/core/common/safe_browsing_prefs.h"
// static
PushMessagingServiceImpl* PushMessagingServiceFactory::GetForProfile(
content::BrowserContext* context) {
// The Push API is not currently supported in incognito mode.
// See https://crbug.com/401439.
if (context->IsOffTheRecord())
return nullptr;
return static_cast<PushMessagingServiceImpl*>(
GetInstance()->GetServiceForBrowserContext(context, true));
}
// static
PushMessagingServiceFactory* PushMessagingServiceFactory::GetInstance() {
static base::NoDestructor<PushMessagingServiceFactory> instance;
return instance.get();
}
PushMessagingServiceFactory::PushMessagingServiceFactory()
: ProfileKeyedServiceFactory(
"PushMessagingProfileService",
ProfileSelections::Builder()
.WithRegular(ProfileSelection::kOwnInstance)
// TODO(crbug.com/40257657): Check if this service is needed in
// Guest mode.
.WithGuest(ProfileSelection::kOwnInstance)
// TODO(crbug.com/41488885): Check if this service is needed for
// Ash Internals.
.WithAshInternals(ProfileSelection::kOwnInstance)
.Build()) {
DependsOn(gcm::GCMProfileServiceFactory::GetInstance());
DependsOn(instance_id::InstanceIDProfileServiceFactory::GetInstance());
DependsOn(HostContentSettingsMapFactory::GetInstance());
DependsOn(PermissionManagerFactory::GetInstance());
DependsOn(site_engagement::SiteEngagementServiceFactory::GetInstance());
}
PushMessagingServiceFactory::~PushMessagingServiceFactory() = default;
void PushMessagingServiceFactory::RestoreFactoryForTests(
content::BrowserContext* context) {
SetTestingFactory(
context, base::BindRepeating([](content::BrowserContext* context) {
return GetInstance()->BuildServiceInstanceForBrowserContext(context);
}));
}
std::unique_ptr<KeyedService>
PushMessagingServiceFactory::BuildServiceInstanceForBrowserContext(
content::BrowserContext* context) const {
Profile* profile = Profile::FromBrowserContext(context);
CHECK(!profile->IsOffTheRecord());
// Reporting service worker network requests should only be done for ESB
// users. The check below is the first ESB check. A second ESB check is
// performed before anything about the service worker is sent off device to
// Safe Browsing. If at the time of the second check the user is found to no
// longer be an ESB user, no Safe Browsing report will be sent.
bool includeSafeBrowsingDatabase =
g_browser_process && g_browser_process->safe_browsing_service() &&
safe_browsing::IsEnhancedProtectionEnabled(*profile->GetPrefs());
return std::make_unique<PushMessagingServiceImpl>(
profile,
includeSafeBrowsingDatabase
? g_browser_process->safe_browsing_service()->database_manager()
: nullptr);
}