15821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Copyright (c) 2012 The Chromium Authors. All rights reserved.
25821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Use of this source code is governed by a BSD-style license that can be
35821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// found in the LICENSE file.
45821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
55821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "chrome/browser/password_manager/password_store_factory.h"
65821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
75821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/command_line.h"
85821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/environment.h"
92a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)#include "base/prefs/pref_service.h"
105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "chrome/browser/password_manager/login_database.h"
115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "chrome/browser/password_manager/password_store.h"
125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "chrome/browser/password_manager/password_store_default.h"
13c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)#include "chrome/browser/profiles/incognito_helpers.h"
145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "chrome/browser/webdata/web_data_service.h"
155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "chrome/browser/webdata/web_data_service_factory.h"
165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "chrome/common/chrome_constants.h"
175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "chrome/common/chrome_switches.h"
185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "chrome/common/pref_names.h"
1990dce4d38c5ff5333bea97d859d4e484e27edf0cTorne (Richard Coles)#include "components/browser_context_keyed_service/browser_context_dependency_manager.h"
202a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)#include "components/user_prefs/pref_registry_syncable.h"
215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#if defined(OS_WIN)
235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "chrome/browser/password_manager/password_store_win.h"
245821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#elif defined(OS_MACOSX)
255821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "chrome/browser/password_manager/password_store_mac.h"
265821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "crypto/apple_keychain.h"
275821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "crypto/mock_apple_keychain.h"
285821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#elif defined(OS_CHROMEOS) || defined(OS_ANDROID)
295821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Don't do anything. We're going to use the default store.
30c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)#elif defined(USE_X11)
315821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/nix/xdg_util.h"
325821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#if defined(USE_GNOME_KEYRING)
335821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "chrome/browser/password_manager/native_backend_gnome_x.h"
345821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#endif
355821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "chrome/browser/password_manager/native_backend_kwallet_x.h"
365821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "chrome/browser/password_manager/password_store_x.h"
375821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#endif
385821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
39c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)#if !defined(OS_CHROMEOS) && defined(USE_X11)
405821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)namespace {
415821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
425821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)const LocalProfileId kInvalidLocalProfileId =
435821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    static_cast<LocalProfileId>(0);
445821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
455821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}  // namespace
465821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#endif
475821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
485821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)scoped_refptr<PasswordStore> PasswordStoreFactory::GetForProfile(
495821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    Profile* profile,
505821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    Profile::ServiceAccessType sat) {
515821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (sat == Profile::IMPLICIT_ACCESS && profile->IsOffTheRecord()) {
525821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    NOTREACHED() << "This profile is OffTheRecord";
535821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return NULL;
545821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
555821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
565821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  return static_cast<PasswordStore*>(
5790dce4d38c5ff5333bea97d859d4e484e27edf0cTorne (Richard Coles)      GetInstance()->GetServiceForBrowserContext(profile, true).get());
585821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
595821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
605821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// static
615821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)PasswordStoreFactory* PasswordStoreFactory::GetInstance() {
625821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  return Singleton<PasswordStoreFactory>::get();
635821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
645821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
655821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)PasswordStoreFactory::PasswordStoreFactory()
6690dce4d38c5ff5333bea97d859d4e484e27edf0cTorne (Richard Coles)    : RefcountedBrowserContextKeyedServiceFactory(
675821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        "PasswordStore",
6890dce4d38c5ff5333bea97d859d4e484e27edf0cTorne (Richard Coles)        BrowserContextDependencyManager::GetInstance()) {
695821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  DependsOn(WebDataServiceFactory::GetInstance());
705821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
715821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
725821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)PasswordStoreFactory::~PasswordStoreFactory() {}
735821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
74c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)#if !defined(OS_CHROMEOS) && defined(USE_X11)
755821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)LocalProfileId PasswordStoreFactory::GetLocalProfileId(
765821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    PrefService* prefs) const {
775821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  LocalProfileId id = prefs->GetInteger(prefs::kLocalProfileId);
785821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (id == kInvalidLocalProfileId) {
795821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // Note that there are many more users than this. Thus, by design, this is
805821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // not a unique id. However, it is large enough that it is very unlikely
815821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // that it would be repeated twice on a single machine. It is still possible
825821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // for that to occur though, so the potential results of it actually
835821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // happening should be considered when using this value.
845821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    static const LocalProfileId kLocalProfileIdMask =
855821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        static_cast<LocalProfileId>((1 << 24) - 1);
865821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    do {
875821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      id = rand() & kLocalProfileIdMask;
885821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      // TODO(mdm): scan other profiles to make sure they are not using this id?
895821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    } while (id == kInvalidLocalProfileId);
905821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    prefs->SetInteger(prefs::kLocalProfileId, id);
915821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
925821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  return id;
935821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
945821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#endif
955821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
9690dce4d38c5ff5333bea97d859d4e484e27edf0cTorne (Richard Coles)scoped_refptr<RefcountedBrowserContextKeyedService>
97c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)PasswordStoreFactory::BuildServiceInstanceFor(
98c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)    content::BrowserContext* context) const {
99c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)  Profile* profile = static_cast<Profile*>(context);
100c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)
1015821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  scoped_refptr<PasswordStore> ps;
1022a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)  base::FilePath login_db_file_path = profile->GetPath();
1035821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  login_db_file_path = login_db_file_path.Append(chrome::kLoginDataFileName);
1045821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  LoginDatabase* login_db = new LoginDatabase();
1055821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  {
1065821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // TODO(paivanof@gmail.com): execution of login_db->Init() should go
1075821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // to DB thread. http://crbug.com/138903
1085821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    base::ThreadRestrictions::ScopedAllowIO allow_io;
1095821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (!login_db->Init(login_db_file_path)) {
1105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      LOG(ERROR) << "Could not initialize login database.";
1115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      delete login_db;
1125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      return NULL;
1135821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    }
1145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
1155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#if defined(OS_WIN)
1165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  ps = new PasswordStoreWin(
1175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      login_db, profile,
1182a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)      WebDataService::FromBrowserContext(profile));
1195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#elif defined(OS_MACOSX)
1205821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (CommandLine::ForCurrentProcess()->HasSwitch(switches::kUseMockKeychain)) {
1215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    ps = new PasswordStoreMac(new crypto::MockAppleKeychain(), login_db);
1225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  } else {
1235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    ps = new PasswordStoreMac(new crypto::AppleKeychain(), login_db);
1245821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
1255821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#elif defined(OS_CHROMEOS) || defined(OS_ANDROID)
1265821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // For now, we use PasswordStoreDefault. We might want to make a native
1275821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // backend for PasswordStoreX (see below) in the future though.
1285821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  ps = new PasswordStoreDefault(login_db, profile);
129c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)#elif defined(USE_X11)
1305821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // On POSIX systems, we try to use the "native" password management system of
1315821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // the desktop environment currently running, allowing GNOME Keyring in XFCE.
1325821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // (In all cases we fall back on the basic store in case of failure.)
1335821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  base::nix::DesktopEnvironment desktop_env;
1345821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  std::string store_type =
1355821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      CommandLine::ForCurrentProcess()->GetSwitchValueASCII(
1365821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)          switches::kPasswordStore);
1375821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (store_type == "kwallet") {
1385821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    desktop_env = base::nix::DESKTOP_ENVIRONMENT_KDE4;
1395821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  } else if (store_type == "gnome") {
1405821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    desktop_env = base::nix::DESKTOP_ENVIRONMENT_GNOME;
1415821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  } else if (store_type == "basic") {
1425821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    desktop_env = base::nix::DESKTOP_ENVIRONMENT_OTHER;
1435821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  } else {
1445821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // Detect the store to use automatically.
1455821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    scoped_ptr<base::Environment> env(base::Environment::Create());
1465821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    desktop_env = base::nix::GetDesktopEnvironment(env.get());
1475821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    const char* name = base::nix::GetDesktopEnvironmentName(desktop_env);
1485821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    VLOG(1) << "Password storage detected desktop environment: "
1495821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)            << (name ? name : "(unknown)");
1505821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
1515821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1525821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  PrefService* prefs = profile->GetPrefs();
1535821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  LocalProfileId id = GetLocalProfileId(prefs);
1545821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1555821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  scoped_ptr<PasswordStoreX::NativeBackend> backend;
1565821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (desktop_env == base::nix::DESKTOP_ENVIRONMENT_KDE4) {
1575821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // KDE3 didn't use DBus, which our KWallet store uses.
1585821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    VLOG(1) << "Trying KWallet for password storage.";
1595821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    backend.reset(new NativeBackendKWallet(id, prefs));
1605821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (backend->Init())
1615821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      VLOG(1) << "Using KWallet for password storage.";
1625821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    else
1635821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      backend.reset();
1645821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  } else if (desktop_env == base::nix::DESKTOP_ENVIRONMENT_GNOME ||
1655821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)             desktop_env == base::nix::DESKTOP_ENVIRONMENT_UNITY ||
1665821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)             desktop_env == base::nix::DESKTOP_ENVIRONMENT_XFCE) {
1675821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#if defined(USE_GNOME_KEYRING)
1685821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    VLOG(1) << "Trying GNOME keyring for password storage.";
1695821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    backend.reset(new NativeBackendGnome(id, prefs));
1705821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (backend->Init())
1715821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      VLOG(1) << "Using GNOME keyring for password storage.";
1725821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    else
1735821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      backend.reset();
1745821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#endif  // defined(USE_GNOME_KEYRING)
1755821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
1765821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1775821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (!backend.get()) {
1785821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    LOG(WARNING) << "Using basic (unencrypted) store for password storage. "
1795821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        "See http://code.google.com/p/chromium/wiki/LinuxPasswordStorage for "
1805821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        "more information about password storage options.";
1815821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
1825821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1835821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  ps = new PasswordStoreX(login_db, profile, backend.release());
1845821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#else
1855821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  NOTIMPLEMENTED();
1865821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#endif
187868fa2fe829687343ffae624259930155e16dbd8Torne (Richard Coles)  if (!ps.get())
1885821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    delete login_db;
1895821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
190868fa2fe829687343ffae624259930155e16dbd8Torne (Richard Coles)  if (!ps.get() || !ps->Init()) {
1915821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    NOTREACHED() << "Could not initialize password manager.";
1925821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return NULL;
1935821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
1945821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1955821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  return ps;
1965821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
1975821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1987dbb3d5cf0c15f500944d211057644d6a2f37371Ben Murdochvoid PasswordStoreFactory::RegisterProfilePrefs(
199c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)    user_prefs::PrefRegistrySyncable* registry) {
200c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)#if !defined(OS_CHROMEOS) && defined(USE_X11)
201c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)  registry->RegisterIntegerPref(
202c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)      prefs::kLocalProfileId,
203c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)      kInvalidLocalProfileId,
204c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)      user_prefs::PrefRegistrySyncable::UNSYNCABLE_PREF);
2055821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
2065821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // Notice that the preprocessor conditions above are exactly those that will
2075821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // result in using PasswordStoreX in CreatePasswordStore() below.
2087dbb3d5cf0c15f500944d211057644d6a2f37371Ben Murdoch  PasswordStoreX::RegisterProfilePrefs(registry);
2095821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#endif
2105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
2115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
212c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)content::BrowserContext* PasswordStoreFactory::GetBrowserContextToUse(
213c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)    content::BrowserContext* context) const {
214c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)  return chrome::GetBrowserContextRedirectedInIncognito(context);
2155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
2165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
2175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)bool PasswordStoreFactory::ServiceIsNULLWhileTesting() const {
2185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  return true;
2195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
220