password_store_factory.cc revision 5821806d5e7f356e8fa4b058a389a808ea183019
15821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Copyright (c) 2012 The Chromium Authors. All rights reserved.
25821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Use of this source code is governed by a BSD-style license that can be
35821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// found in the LICENSE file.
45821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
55821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "chrome/browser/password_manager/password_store_factory.h"
65821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
75821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/command_line.h"
85821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/environment.h"
95821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "chrome/browser/password_manager/login_database.h"
105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "chrome/browser/password_manager/password_store.h"
115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "chrome/browser/password_manager/password_store_default.h"
125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "chrome/browser/prefs/pref_service.h"
135821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "chrome/browser/profiles/profile_dependency_manager.h"
145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "chrome/browser/webdata/web_data_service.h"
155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "chrome/browser/webdata/web_data_service_factory.h"
165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "chrome/common/chrome_constants.h"
175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "chrome/common/chrome_switches.h"
185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "chrome/common/pref_names.h"
195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
205821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#if defined(OS_WIN)
215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "chrome/browser/password_manager/password_store_win.h"
225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#elif defined(OS_MACOSX)
235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "chrome/browser/password_manager/password_store_mac.h"
245821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "crypto/apple_keychain.h"
255821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "crypto/mock_apple_keychain.h"
265821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#elif defined(OS_CHROMEOS) || defined(OS_ANDROID)
275821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Don't do anything. We're going to use the default store.
285821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#elif defined(OS_POSIX)
295821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/nix/xdg_util.h"
305821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#if defined(USE_GNOME_KEYRING)
315821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "chrome/browser/password_manager/native_backend_gnome_x.h"
325821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#endif
335821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "chrome/browser/password_manager/native_backend_kwallet_x.h"
345821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "chrome/browser/password_manager/password_store_x.h"
355821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#endif
365821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
375821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#if !defined(OS_MACOSX) && !defined(OS_CHROMEOS) && !defined(OS_ANDROID) && \
385821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    defined(OS_POSIX)
395821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)namespace {
405821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
415821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)const LocalProfileId kInvalidLocalProfileId =
425821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    static_cast<LocalProfileId>(0);
435821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
445821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}  // namespace
455821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#endif
465821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
475821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)scoped_refptr<PasswordStore> PasswordStoreFactory::GetForProfile(
485821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    Profile* profile,
495821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    Profile::ServiceAccessType sat) {
505821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (sat == Profile::IMPLICIT_ACCESS && profile->IsOffTheRecord()) {
515821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    NOTREACHED() << "This profile is OffTheRecord";
525821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return NULL;
535821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
545821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
555821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  return static_cast<PasswordStore*>(
565821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      GetInstance()->GetServiceForProfile(profile, true).get());
575821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
585821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
595821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// static
605821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)PasswordStoreFactory* PasswordStoreFactory::GetInstance() {
615821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  return Singleton<PasswordStoreFactory>::get();
625821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
635821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
645821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)PasswordStoreFactory::PasswordStoreFactory()
655821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    : RefcountedProfileKeyedServiceFactory(
665821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        "PasswordStore",
675821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        ProfileDependencyManager::GetInstance()) {
685821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  DependsOn(WebDataServiceFactory::GetInstance());
695821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
705821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
715821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)PasswordStoreFactory::~PasswordStoreFactory() {}
725821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
735821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#if !defined(OS_MACOSX) && !defined(OS_CHROMEOS) && !defined(OS_ANDROID) && \
745821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    defined(OS_POSIX)
755821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)LocalProfileId PasswordStoreFactory::GetLocalProfileId(
765821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    PrefService* prefs) const {
775821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  LocalProfileId id = prefs->GetInteger(prefs::kLocalProfileId);
785821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (id == kInvalidLocalProfileId) {
795821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // Note that there are many more users than this. Thus, by design, this is
805821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // not a unique id. However, it is large enough that it is very unlikely
815821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // that it would be repeated twice on a single machine. It is still possible
825821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // for that to occur though, so the potential results of it actually
835821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // happening should be considered when using this value.
845821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    static const LocalProfileId kLocalProfileIdMask =
855821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        static_cast<LocalProfileId>((1 << 24) - 1);
865821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    do {
875821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      id = rand() & kLocalProfileIdMask;
885821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      // TODO(mdm): scan other profiles to make sure they are not using this id?
895821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    } while (id == kInvalidLocalProfileId);
905821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    prefs->SetInteger(prefs::kLocalProfileId, id);
915821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
925821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  return id;
935821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
945821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#endif
955821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
965821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)scoped_refptr<RefcountedProfileKeyedService>
975821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)PasswordStoreFactory::BuildServiceInstanceFor(Profile* profile) const {
985821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  scoped_refptr<PasswordStore> ps;
995821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  FilePath login_db_file_path = profile->GetPath();
1005821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  login_db_file_path = login_db_file_path.Append(chrome::kLoginDataFileName);
1015821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  LoginDatabase* login_db = new LoginDatabase();
1025821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  {
1035821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // TODO(paivanof@gmail.com): execution of login_db->Init() should go
1045821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // to DB thread. http://crbug.com/138903
1055821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    base::ThreadRestrictions::ScopedAllowIO allow_io;
1065821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (!login_db->Init(login_db_file_path)) {
1075821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      LOG(ERROR) << "Could not initialize login database.";
1085821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      delete login_db;
1095821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      return NULL;
1105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    }
1115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
1125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#if defined(OS_WIN)
1135821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  ps = new PasswordStoreWin(
1145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      login_db, profile,
1155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      WebDataServiceFactory::GetForProfile(profile, Profile::IMPLICIT_ACCESS));
1165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#elif defined(OS_MACOSX)
1175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (CommandLine::ForCurrentProcess()->HasSwitch(switches::kUseMockKeychain)) {
1185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    ps = new PasswordStoreMac(new crypto::MockAppleKeychain(), login_db);
1195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  } else {
1205821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    ps = new PasswordStoreMac(new crypto::AppleKeychain(), login_db);
1215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
1225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#elif defined(OS_CHROMEOS) || defined(OS_ANDROID)
1235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // For now, we use PasswordStoreDefault. We might want to make a native
1245821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // backend for PasswordStoreX (see below) in the future though.
1255821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  ps = new PasswordStoreDefault(login_db, profile);
1265821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#elif defined(OS_POSIX)
1275821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // On POSIX systems, we try to use the "native" password management system of
1285821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // the desktop environment currently running, allowing GNOME Keyring in XFCE.
1295821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // (In all cases we fall back on the basic store in case of failure.)
1305821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  base::nix::DesktopEnvironment desktop_env;
1315821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  std::string store_type =
1325821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      CommandLine::ForCurrentProcess()->GetSwitchValueASCII(
1335821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)          switches::kPasswordStore);
1345821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (store_type == "kwallet") {
1355821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    desktop_env = base::nix::DESKTOP_ENVIRONMENT_KDE4;
1365821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  } else if (store_type == "gnome") {
1375821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    desktop_env = base::nix::DESKTOP_ENVIRONMENT_GNOME;
1385821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  } else if (store_type == "basic") {
1395821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    desktop_env = base::nix::DESKTOP_ENVIRONMENT_OTHER;
1405821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  } else {
1415821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // Detect the store to use automatically.
1425821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    scoped_ptr<base::Environment> env(base::Environment::Create());
1435821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    desktop_env = base::nix::GetDesktopEnvironment(env.get());
1445821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    const char* name = base::nix::GetDesktopEnvironmentName(desktop_env);
1455821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    VLOG(1) << "Password storage detected desktop environment: "
1465821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)            << (name ? name : "(unknown)");
1475821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
1485821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1495821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  PrefService* prefs = profile->GetPrefs();
1505821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  LocalProfileId id = GetLocalProfileId(prefs);
1515821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1525821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  scoped_ptr<PasswordStoreX::NativeBackend> backend;
1535821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (desktop_env == base::nix::DESKTOP_ENVIRONMENT_KDE4) {
1545821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    // KDE3 didn't use DBus, which our KWallet store uses.
1555821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    VLOG(1) << "Trying KWallet for password storage.";
1565821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    backend.reset(new NativeBackendKWallet(id, prefs));
1575821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (backend->Init())
1585821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      VLOG(1) << "Using KWallet for password storage.";
1595821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    else
1605821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      backend.reset();
1615821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  } else if (desktop_env == base::nix::DESKTOP_ENVIRONMENT_GNOME ||
1625821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)             desktop_env == base::nix::DESKTOP_ENVIRONMENT_UNITY ||
1635821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)             desktop_env == base::nix::DESKTOP_ENVIRONMENT_XFCE) {
1645821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#if defined(USE_GNOME_KEYRING)
1655821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    VLOG(1) << "Trying GNOME keyring for password storage.";
1665821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    backend.reset(new NativeBackendGnome(id, prefs));
1675821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (backend->Init())
1685821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      VLOG(1) << "Using GNOME keyring for password storage.";
1695821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    else
1705821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      backend.reset();
1715821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#endif  // defined(USE_GNOME_KEYRING)
1725821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
1735821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1745821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (!backend.get()) {
1755821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    LOG(WARNING) << "Using basic (unencrypted) store for password storage. "
1765821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        "See http://code.google.com/p/chromium/wiki/LinuxPasswordStorage for "
1775821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)        "more information about password storage options.";
1785821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
1795821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1805821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  ps = new PasswordStoreX(login_db, profile, backend.release());
1815821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#else
1825821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  NOTIMPLEMENTED();
1835821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#endif
1845821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (!ps)
1855821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    delete login_db;
1865821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1875821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (!ps || !ps->Init()) {
1885821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    NOTREACHED() << "Could not initialize password manager.";
1895821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return NULL;
1905821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
1915821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1925821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  return ps;
1935821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
1945821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1955821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)void PasswordStoreFactory::RegisterUserPrefs(PrefService* prefs) {
1965821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#if !defined(OS_MACOSX) && !defined(OS_CHROMEOS) && !defined(OS_ANDROID) \
1975821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  && defined(OS_POSIX)
1985821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  prefs->RegisterIntegerPref(prefs::kLocalProfileId,
1995821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                             kInvalidLocalProfileId,
2005821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                             PrefService::UNSYNCABLE_PREF);
2015821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
2025821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // Notice that the preprocessor conditions above are exactly those that will
2035821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  // result in using PasswordStoreX in CreatePasswordStore() below.
2045821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  PasswordStoreX::RegisterUserPrefs(prefs);
2055821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#endif
2065821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
2075821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
2085821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)bool PasswordStoreFactory::ServiceRedirectedInIncognito() const {
2095821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  return true;
2105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
2115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
2125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)bool PasswordStoreFactory::ServiceIsNULLWhileTesting() const {
2135821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  return true;
2145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
215