blob: 8763e6e8424b4aa23a4669dd8824ca64ee7e5b4a [file] [log] [blame]
// Copyright (c) 2012 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "android_webview/browser/aw_browser_context.h"
#include <utility>
#include "android_webview/browser/aw_browser_policy_connector.h"
#include "android_webview/browser/aw_form_database_service.h"
#include "android_webview/browser/aw_metrics_service_client.h"
#include "android_webview/browser/aw_permission_manager.h"
#include "android_webview/browser/aw_quota_manager_bridge.h"
#include "android_webview/browser/aw_resource_context.h"
#include "android_webview/browser/jni_dependency_factory.h"
#include "android_webview/browser/net/aw_url_request_context_getter.h"
#include "android_webview/common/aw_content_client.h"
#include "base/base_paths_android.h"
#include "base/bind.h"
#include "base/path_service.h"
#include "components/autofill/core/common/autofill_pref_names.h"
#include "components/metrics/metrics_service.h"
#include "components/policy/core/browser/browser_policy_connector_base.h"
#include "components/policy/core/browser/configuration_policy_pref_store.h"
#include "components/policy/core/browser/url_blacklist_manager.h"
#include "components/pref_registry/pref_registry_syncable.h"
#include "components/prefs/in_memory_pref_store.h"
#include "components/prefs/pref_service.h"
#include "components/prefs/pref_service_factory.h"
#include "components/url_formatter/url_fixer.h"
#include "components/user_prefs/user_prefs.h"
#include "components/visitedlink/browser/visitedlink_master.h"
#include "content/public/browser/browser_thread.h"
#include "content/public/browser/ssl_host_state_delegate.h"
#include "content/public/browser/storage_partition.h"
#include "content/public/browser/web_contents.h"
#include "net/proxy/proxy_config_service_android.h"
#include "net/proxy/proxy_service.h"
using base::FilePath;
using content::BrowserThread;
namespace android_webview {
namespace prefs {
// String that specifies the Android account type to use for Negotiate
// authentication.
const char kAuthAndroidNegotiateAccountType[] =
"auth.android_negotiate_account_type";
// Whitelist containing servers for which Integrated Authentication is enabled.
const char kAuthServerWhitelist[] = "auth.server_whitelist";
} // namespace prefs
namespace {
// Shows notifications which correspond to PersistentPrefStore's reading errors.
void HandleReadError(PersistentPrefStore::PrefReadError error) {
}
void DeleteDirRecursively(const base::FilePath& path) {
if (!base::DeleteFile(path, true)) {
// Deleting a non-existent file is considered successful, so this will
// trigger only in case of real errors.
LOG(WARNING) << "Failed to delete " << path.AsUTF8Unsafe();
}
}
AwBrowserContext* g_browser_context = NULL;
std::unique_ptr<net::ProxyConfigService> CreateProxyConfigService() {
std::unique_ptr<net::ProxyConfigService> config_service =
net::ProxyService::CreateSystemProxyConfigService(
BrowserThread::GetMessageLoopProxyForThread(BrowserThread::IO),
nullptr /* Ignored on Android */);
// TODO(csharrison) Architect the wrapper better so we don't need a cast for
// android ProxyConfigServices.
net::ProxyConfigServiceAndroid* android_config_service =
static_cast<net::ProxyConfigServiceAndroid*>(config_service.get());
android_config_service->set_exclude_pac_url(true);
return config_service;
}
bool OverrideBlacklistForURL(const GURL& url, bool* block, int* reason) {
// We don't have URLs that should never be blacklisted here.
return false;
}
policy::URLBlacklistManager* CreateURLBlackListManager(
PrefService* pref_service) {
policy::URLBlacklist::SegmentURLCallback segment_url_callback =
static_cast<policy::URLBlacklist::SegmentURLCallback>(
url_formatter::SegmentURL);
base::SequencedWorkerPool* pool = BrowserThread::GetBlockingPool();
scoped_refptr<base::SequencedTaskRunner> background_task_runner =
pool->GetSequencedTaskRunner(pool->GetSequenceToken());
scoped_refptr<base::SingleThreadTaskRunner> io_task_runner =
BrowserThread::GetMessageLoopProxyForThread(BrowserThread::IO);
return new policy::URLBlacklistManager(pref_service, background_task_runner,
io_task_runner, segment_url_callback,
base::Bind(OverrideBlacklistForURL));
}
} // namespace
// Delete the legacy cache dir (in the app data dir) in 10 seconds after init.
int AwBrowserContext::legacy_cache_removal_delay_ms_ = 10000;
AwBrowserContext::AwBrowserContext(
const FilePath path,
JniDependencyFactory* native_factory)
: context_storage_path_(path),
native_factory_(native_factory) {
DCHECK(!g_browser_context);
g_browser_context = this;
BrowserContext::Initialize(this, path);
// This constructor is entered during the creation of ContentBrowserClient,
// before browser threads are created. Therefore any checks to enforce
// threading (such as BrowserThread::CurrentlyOn()) will fail here.
}
AwBrowserContext::~AwBrowserContext() {
DCHECK_EQ(this, g_browser_context);
g_browser_context = NULL;
}
// static
AwBrowserContext* AwBrowserContext::GetDefault() {
// TODO(joth): rather than store in a global here, lookup this instance
// from the Java-side peer.
return g_browser_context;
}
// static
AwBrowserContext* AwBrowserContext::FromWebContents(
content::WebContents* web_contents) {
// This is safe; this is the only implementation of the browser context.
return static_cast<AwBrowserContext*>(web_contents->GetBrowserContext());
}
// static
void AwBrowserContext::SetLegacyCacheRemovalDelayForTest(int delay_ms) {
legacy_cache_removal_delay_ms_ = delay_ms;
}
void AwBrowserContext::PreMainMessageLoopRun() {
FilePath cache_path;
const FilePath fallback_cache_dir =
GetPath().Append(FILE_PATH_LITERAL("Cache"));
if (PathService::Get(base::DIR_CACHE, &cache_path)) {
cache_path = cache_path.Append(
FILE_PATH_LITERAL("org.chromium.android_webview"));
// Delay the legacy dir removal to not impact startup performance.
BrowserThread::PostDelayedTask(
BrowserThread::FILE, FROM_HERE,
base::Bind(&DeleteDirRecursively, fallback_cache_dir),
base::TimeDelta::FromMilliseconds(legacy_cache_removal_delay_ms_));
} else {
cache_path = fallback_cache_dir;
LOG(WARNING) << "Failed to get cache directory for Android WebView. "
<< "Using app data directory as a fallback.";
}
browser_policy_connector_.reset(new AwBrowserPolicyConnector());
InitUserPrefService();
url_request_context_getter_ = new AwURLRequestContextGetter(
cache_path, CreateProxyConfigService(), user_pref_service_.get());
base::SequencedWorkerPool* pool = BrowserThread::GetBlockingPool();
scoped_refptr<base::SequencedTaskRunner> db_task_runner =
pool->GetSequencedTaskRunnerWithShutdownBehavior(
pool->GetSequenceToken(),
base::SequencedWorkerPool::SKIP_ON_SHUTDOWN);
visitedlink_master_.reset(
new visitedlink::VisitedLinkMaster(this, this, false));
visitedlink_master_->Init();
form_database_service_.reset(
new AwFormDatabaseService(context_storage_path_));
EnsureResourceContextInitialized(this);
blacklist_manager_.reset(CreateURLBlackListManager(user_pref_service_.get()));
// UMA uses randomly-generated GUIDs (globally unique identifiers) to
// anonymously identify logs. Every WebView-using app on every device
// is given a GUID, stored in this file in the app's data directory.
const FilePath guid_file_path =
GetPath().Append(FILE_PATH_LITERAL("metrics_guid"));
AwMetricsServiceClient::GetInstance()->Initialize(
user_pref_service_.get(),
content::BrowserContext::GetDefaultStoragePartition(this)->
GetURLRequestContext(),
guid_file_path);
}
void AwBrowserContext::AddVisitedURLs(const std::vector<GURL>& urls) {
DCHECK(visitedlink_master_);
visitedlink_master_->AddURLs(urls);
}
AwQuotaManagerBridge* AwBrowserContext::GetQuotaManagerBridge() {
if (!quota_manager_bridge_.get()) {
quota_manager_bridge_ = native_factory_->CreateAwQuotaManagerBridge(this);
}
return quota_manager_bridge_.get();
}
AwFormDatabaseService* AwBrowserContext::GetFormDatabaseService() {
return form_database_service_.get();
}
AwURLRequestContextGetter* AwBrowserContext::GetAwURLRequestContext() {
return url_request_context_getter_.get();
}
AwMessagePortService* AwBrowserContext::GetMessagePortService() {
if (!message_port_service_.get()) {
message_port_service_.reset(
native_factory_->CreateAwMessagePortService());
}
return message_port_service_.get();
}
// Create user pref service
void AwBrowserContext::InitUserPrefService() {
user_prefs::PrefRegistrySyncable* pref_registry =
new user_prefs::PrefRegistrySyncable();
// We only use the autocomplete feature of Autofill, which is controlled via
// the manager_delegate. We don't use the rest of Autofill, which is why it is
// hardcoded as disabled here.
pref_registry->RegisterBooleanPref(autofill::prefs::kAutofillEnabled, false);
policy::URLBlacklistManager::RegisterProfilePrefs(pref_registry);
pref_registry->RegisterStringPref(prefs::kAuthServerWhitelist, std::string());
pref_registry->RegisterStringPref(prefs::kAuthAndroidNegotiateAccountType,
std::string());
metrics::MetricsService::RegisterPrefs(pref_registry);
PrefServiceFactory pref_service_factory;
pref_service_factory.set_user_prefs(make_scoped_refptr(
new InMemoryPrefStore()));
pref_service_factory.set_managed_prefs(
make_scoped_refptr(new policy::ConfigurationPolicyPrefStore(
browser_policy_connector_->GetPolicyService(),
browser_policy_connector_->GetHandlerList(),
policy::POLICY_LEVEL_MANDATORY)));
pref_service_factory.set_read_error_callback(base::Bind(&HandleReadError));
user_pref_service_ = pref_service_factory.Create(pref_registry);
user_prefs::UserPrefs::Set(this, user_pref_service_.get());
}
std::unique_ptr<content::ZoomLevelDelegate>
AwBrowserContext::CreateZoomLevelDelegate(
const base::FilePath& partition_path) {
return nullptr;
}
base::FilePath AwBrowserContext::GetPath() const {
return context_storage_path_;
}
bool AwBrowserContext::IsOffTheRecord() const {
// Android WebView does not support off the record profile yet.
return false;
}
content::ResourceContext* AwBrowserContext::GetResourceContext() {
if (!resource_context_) {
resource_context_.reset(
new AwResourceContext(url_request_context_getter_.get()));
}
return resource_context_.get();
}
content::DownloadManagerDelegate*
AwBrowserContext::GetDownloadManagerDelegate() {
return &download_manager_delegate_;
}
content::BrowserPluginGuestManager* AwBrowserContext::GetGuestManager() {
return NULL;
}
storage::SpecialStoragePolicy* AwBrowserContext::GetSpecialStoragePolicy() {
// Intentionally returning NULL as 'Extensions' and 'Apps' not supported.
return NULL;
}
content::PushMessagingService* AwBrowserContext::GetPushMessagingService() {
// TODO(johnme): Support push messaging in WebView.
return NULL;
}
content::SSLHostStateDelegate* AwBrowserContext::GetSSLHostStateDelegate() {
if (!ssl_host_state_delegate_.get()) {
ssl_host_state_delegate_.reset(new AwSSLHostStateDelegate());
}
return ssl_host_state_delegate_.get();
}
content::PermissionManager* AwBrowserContext::GetPermissionManager() {
if (!permission_manager_.get())
permission_manager_.reset(new AwPermissionManager());
return permission_manager_.get();
}
content::BackgroundSyncController*
AwBrowserContext::GetBackgroundSyncController() {
return nullptr;
}
net::URLRequestContextGetter* AwBrowserContext::CreateRequestContext(
content::ProtocolHandlerMap* protocol_handlers,
content::URLRequestInterceptorScopedVector request_interceptors) {
// This function cannot actually create the request context because
// there is a reentrant dependency on GetResourceContext() via
// content::StoragePartitionImplMap::Create(). This is not fixable
// until http://crbug.com/159193. Until then, assert that the context
// has already been allocated and just handle setting the protocol_handlers.
DCHECK(url_request_context_getter_.get());
url_request_context_getter_->SetHandlersAndInterceptors(
protocol_handlers, std::move(request_interceptors));
return url_request_context_getter_.get();
}
net::URLRequestContextGetter*
AwBrowserContext::CreateRequestContextForStoragePartition(
const base::FilePath& partition_path,
bool in_memory,
content::ProtocolHandlerMap* protocol_handlers,
content::URLRequestInterceptorScopedVector request_interceptors) {
NOTREACHED();
return NULL;
}
net::URLRequestContextGetter* AwBrowserContext::CreateMediaRequestContext() {
return url_request_context_getter_.get();
}
net::URLRequestContextGetter*
AwBrowserContext::CreateMediaRequestContextForStoragePartition(
const base::FilePath& partition_path,
bool in_memory) {
NOTREACHED();
return NULL;
}
policy::URLBlacklistManager* AwBrowserContext::GetURLBlacklistManager() {
// Should not be called until the end of PreMainMessageLoopRun, where
// blacklist_manager_ is initialized.
DCHECK(blacklist_manager_);
return blacklist_manager_.get();
}
void AwBrowserContext::RebuildTable(
const scoped_refptr<URLEnumerator>& enumerator) {
// Android WebView rebuilds from WebChromeClient.getVisitedHistory. The client
// can change in the lifetime of this WebView and may not yet be set here.
// Therefore this initialization path is not used.
enumerator->OnComplete(true);
}
} // namespace android_webview