password_store_factory.cc revision c2e0dbddbe15c98d52c4786dac06cb8952a8ae6d
15821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Copyright (c) 2012 The Chromium Authors. All rights reserved. 25821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Use of this source code is governed by a BSD-style license that can be 35821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// found in the LICENSE file. 45821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 55821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "chrome/browser/password_manager/password_store_factory.h" 65821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 75821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/command_line.h" 85821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/environment.h" 92a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)#include "base/prefs/pref_service.h" 105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "chrome/browser/password_manager/login_database.h" 115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "chrome/browser/password_manager/password_store.h" 125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "chrome/browser/password_manager/password_store_default.h" 13c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)#include "chrome/browser/profiles/incognito_helpers.h" 145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "chrome/browser/profiles/profile_dependency_manager.h" 155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "chrome/browser/webdata/web_data_service.h" 165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "chrome/browser/webdata/web_data_service_factory.h" 175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "chrome/common/chrome_constants.h" 185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "chrome/common/chrome_switches.h" 195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "chrome/common/pref_names.h" 202a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles)#include "components/user_prefs/pref_registry_syncable.h" 215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#if defined(OS_WIN) 235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "chrome/browser/password_manager/password_store_win.h" 245821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#elif defined(OS_MACOSX) 255821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "chrome/browser/password_manager/password_store_mac.h" 265821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "crypto/apple_keychain.h" 275821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "crypto/mock_apple_keychain.h" 285821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#elif defined(OS_CHROMEOS) || defined(OS_ANDROID) 295821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Don't do anything. We're going to use the default store. 30c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)#elif defined(USE_X11) 315821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/nix/xdg_util.h" 325821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#if defined(USE_GNOME_KEYRING) 335821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "chrome/browser/password_manager/native_backend_gnome_x.h" 345821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#endif 355821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "chrome/browser/password_manager/native_backend_kwallet_x.h" 365821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "chrome/browser/password_manager/password_store_x.h" 375821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#endif 385821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 39c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)#if !defined(OS_CHROMEOS) && defined(USE_X11) 405821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)namespace { 415821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 425821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)const LocalProfileId kInvalidLocalProfileId = 435821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) static_cast<LocalProfileId>(0); 445821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 455821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} // namespace 465821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#endif 475821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 485821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)scoped_refptr<PasswordStore> PasswordStoreFactory::GetForProfile( 495821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) Profile* profile, 505821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) Profile::ServiceAccessType sat) { 515821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (sat == Profile::IMPLICIT_ACCESS && profile->IsOffTheRecord()) { 525821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) NOTREACHED() << "This profile is OffTheRecord"; 535821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return NULL; 545821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 555821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 565821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return static_cast<PasswordStore*>( 575821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) GetInstance()->GetServiceForProfile(profile, true).get()); 585821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 595821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 605821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// static 615821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)PasswordStoreFactory* PasswordStoreFactory::GetInstance() { 625821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return Singleton<PasswordStoreFactory>::get(); 635821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 645821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 655821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)PasswordStoreFactory::PasswordStoreFactory() 665821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) : RefcountedProfileKeyedServiceFactory( 675821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) "PasswordStore", 685821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ProfileDependencyManager::GetInstance()) { 695821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) DependsOn(WebDataServiceFactory::GetInstance()); 705821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 715821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 725821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)PasswordStoreFactory::~PasswordStoreFactory() {} 735821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 74c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)#if !defined(OS_CHROMEOS) && defined(USE_X11) 755821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)LocalProfileId PasswordStoreFactory::GetLocalProfileId( 765821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) PrefService* prefs) const { 775821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) LocalProfileId id = prefs->GetInteger(prefs::kLocalProfileId); 785821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (id == kInvalidLocalProfileId) { 795821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Note that there are many more users than this. Thus, by design, this is 805821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // not a unique id. However, it is large enough that it is very unlikely 815821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // that it would be repeated twice on a single machine. It is still possible 825821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // for that to occur though, so the potential results of it actually 835821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // happening should be considered when using this value. 845821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) static const LocalProfileId kLocalProfileIdMask = 855821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) static_cast<LocalProfileId>((1 << 24) - 1); 865821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) do { 875821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) id = rand() & kLocalProfileIdMask; 885821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // TODO(mdm): scan other profiles to make sure they are not using this id? 895821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } while (id == kInvalidLocalProfileId); 905821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) prefs->SetInteger(prefs::kLocalProfileId, id); 915821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 925821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return id; 935821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 945821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#endif 955821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 965821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)scoped_refptr<RefcountedProfileKeyedService> 97c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)PasswordStoreFactory::BuildServiceInstanceFor( 98c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles) content::BrowserContext* context) const { 99c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles) Profile* profile = static_cast<Profile*>(context); 100c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles) 1015821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) scoped_refptr<PasswordStore> ps; 1022a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) base::FilePath login_db_file_path = profile->GetPath(); 1035821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) login_db_file_path = login_db_file_path.Append(chrome::kLoginDataFileName); 1045821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) LoginDatabase* login_db = new LoginDatabase(); 1055821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) { 1065821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // TODO(paivanof@gmail.com): execution of login_db->Init() should go 1075821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // to DB thread. http://crbug.com/138903 1085821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) base::ThreadRestrictions::ScopedAllowIO allow_io; 1095821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!login_db->Init(login_db_file_path)) { 1105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) LOG(ERROR) << "Could not initialize login database."; 1115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) delete login_db; 1125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return NULL; 1135821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 1145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 1155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#if defined(OS_WIN) 1165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ps = new PasswordStoreWin( 1175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) login_db, profile, 1182a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) WebDataService::FromBrowserContext(profile)); 1195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#elif defined(OS_MACOSX) 1205821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (CommandLine::ForCurrentProcess()->HasSwitch(switches::kUseMockKeychain)) { 1215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ps = new PasswordStoreMac(new crypto::MockAppleKeychain(), login_db); 1225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } else { 1235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ps = new PasswordStoreMac(new crypto::AppleKeychain(), login_db); 1245821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 1255821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#elif defined(OS_CHROMEOS) || defined(OS_ANDROID) 1265821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // For now, we use PasswordStoreDefault. We might want to make a native 1275821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // backend for PasswordStoreX (see below) in the future though. 1285821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ps = new PasswordStoreDefault(login_db, profile); 129c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)#elif defined(USE_X11) 1305821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // On POSIX systems, we try to use the "native" password management system of 1315821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // the desktop environment currently running, allowing GNOME Keyring in XFCE. 1325821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // (In all cases we fall back on the basic store in case of failure.) 1335821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) base::nix::DesktopEnvironment desktop_env; 1345821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) std::string store_type = 1355821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) CommandLine::ForCurrentProcess()->GetSwitchValueASCII( 1365821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) switches::kPasswordStore); 1375821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (store_type == "kwallet") { 1385821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) desktop_env = base::nix::DESKTOP_ENVIRONMENT_KDE4; 1395821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } else if (store_type == "gnome") { 1405821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) desktop_env = base::nix::DESKTOP_ENVIRONMENT_GNOME; 1415821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } else if (store_type == "basic") { 1425821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) desktop_env = base::nix::DESKTOP_ENVIRONMENT_OTHER; 1435821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } else { 1445821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Detect the store to use automatically. 1455821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) scoped_ptr<base::Environment> env(base::Environment::Create()); 1465821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) desktop_env = base::nix::GetDesktopEnvironment(env.get()); 1475821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) const char* name = base::nix::GetDesktopEnvironmentName(desktop_env); 1485821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) VLOG(1) << "Password storage detected desktop environment: " 1495821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) << (name ? name : "(unknown)"); 1505821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 1515821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1525821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) PrefService* prefs = profile->GetPrefs(); 1535821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) LocalProfileId id = GetLocalProfileId(prefs); 1545821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1555821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) scoped_ptr<PasswordStoreX::NativeBackend> backend; 1565821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (desktop_env == base::nix::DESKTOP_ENVIRONMENT_KDE4) { 1575821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // KDE3 didn't use DBus, which our KWallet store uses. 1585821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) VLOG(1) << "Trying KWallet for password storage."; 1595821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) backend.reset(new NativeBackendKWallet(id, prefs)); 1605821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (backend->Init()) 1615821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) VLOG(1) << "Using KWallet for password storage."; 1625821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) else 1635821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) backend.reset(); 1645821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } else if (desktop_env == base::nix::DESKTOP_ENVIRONMENT_GNOME || 1655821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) desktop_env == base::nix::DESKTOP_ENVIRONMENT_UNITY || 1665821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) desktop_env == base::nix::DESKTOP_ENVIRONMENT_XFCE) { 1675821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#if defined(USE_GNOME_KEYRING) 1685821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) VLOG(1) << "Trying GNOME keyring for password storage."; 1695821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) backend.reset(new NativeBackendGnome(id, prefs)); 1705821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (backend->Init()) 1715821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) VLOG(1) << "Using GNOME keyring for password storage."; 1725821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) else 1735821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) backend.reset(); 1745821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#endif // defined(USE_GNOME_KEYRING) 1755821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 1765821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1775821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!backend.get()) { 1785821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) LOG(WARNING) << "Using basic (unencrypted) store for password storage. " 1795821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) "See http://code.google.com/p/chromium/wiki/LinuxPasswordStorage for " 1805821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) "more information about password storage options."; 1815821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 1825821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1835821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) ps = new PasswordStoreX(login_db, profile, backend.release()); 1845821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#else 1855821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) NOTIMPLEMENTED(); 1865821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#endif 1875821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!ps) 1885821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) delete login_db; 1895821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1905821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) if (!ps || !ps->Init()) { 1915821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) NOTREACHED() << "Could not initialize password manager."; 1925821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return NULL; 1935821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) } 1945821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 1955821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return ps; 1965821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 1975821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 198c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)void PasswordStoreFactory::RegisterUserPrefs( 199c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles) user_prefs::PrefRegistrySyncable* registry) { 200c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)#if !defined(OS_CHROMEOS) && defined(USE_X11) 201c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles) registry->RegisterIntegerPref( 202c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles) prefs::kLocalProfileId, 203c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles) kInvalidLocalProfileId, 204c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles) user_prefs::PrefRegistrySyncable::UNSYNCABLE_PREF); 2055821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 2065821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // Notice that the preprocessor conditions above are exactly those that will 2075821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) // result in using PasswordStoreX in CreatePasswordStore() below. 2082a99a7e74a7f215066514fe81d2bfa6639d9edddTorne (Richard Coles) PasswordStoreX::RegisterUserPrefs(registry); 2095821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#endif 2105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 2115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 212c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)content::BrowserContext* PasswordStoreFactory::GetBrowserContextToUse( 213c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles) content::BrowserContext* context) const { 214c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles) return chrome::GetBrowserContextRedirectedInIncognito(context); 2155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 2165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) 2175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)bool PasswordStoreFactory::ServiceIsNULLWhileTesting() const { 2185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles) return true; 2195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)} 220