// Copyright (c) 2012 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #ifndef CONTENT_BROWSER_SITE_INSTANCE_IMPL_H_ #define CONTENT_BROWSER_SITE_INSTANCE_IMPL_H_ #include <stddef.h> #include <stdint.h> #include "base/observer_list.h" #include "base/optional.h" #include "content/browser/isolation_context.h" #include "content/browser/renderer_host/render_process_host_impl.h" #include "content/common/content_export.h" #include "content/public/browser/render_process_host_observer.h" #include "content/public/browser/site_instance.h" #include "url/gurl.h" #include "url/origin.h" namespace content { class BrowsingInstance; class RenderProcessHostFactory; class CONTENT_EXPORT SiteInstanceImpl final : public SiteInstance, public RenderProcessHostObserver { public: class CONTENT_EXPORT Observer { public: // Called when this SiteInstance transitions to having no active frames, // as measured by active_frame_count(). virtual void ActiveFrameCountIsZero(SiteInstanceImpl* site_instance) {} // Called when the renderer process of this SiteInstance has exited. virtual void RenderProcessGone(SiteInstanceImpl* site_instance) = 0; }; static scoped_refptr<SiteInstanceImpl> Create( BrowserContext* browser_context); static scoped_refptr<SiteInstanceImpl> CreateForURL( BrowserContext* browser_context, const GURL& url); static scoped_refptr<SiteInstanceImpl> CreateForServiceWorker( BrowserContext* browser_context, const GURL& url, bool can_reuse_process = false); // Creates a SiteInstance for |url| like CreateForURL() would except the // instance that is returned has its process_reuse_policy set to // REUSE_PENDING_OR_COMMITTED_SITE and the default SiteInstance will never // be returned. static scoped_refptr<SiteInstanceImpl> CreateReusableInstanceForTesting( BrowserContext* browser_context, const GURL& url); static bool ShouldAssignSiteForURL(const GURL& url); // Returns whether |lock_url| is at least at the granularity of a site (i.e., // a scheme plus eTLD+1, like https://google.com). Also returns true if the // lock is to a more specific origin (e.g., https://accounts.google.com), but // not if the lock is empty or applies to an entire scheme (e.g., file://). static bool IsOriginLockASite(const GURL& lock_url); // Return whether both URLs are part of the same web site, for the purpose of // assigning them to processes accordingly. The decision is currently based // on the registered domain of the URLs (google.com, bbc.co.uk), as well as // the scheme (https, http). Note that if the destination is a blank page, // we consider that to be part of the same web site for the purposes for // process assignment. |should_compare_effective_urls| allows comparing URLs // without converting them to effective URLs first. This is useful for // avoiding OOPIFs when otherwise same-site URLs may look cross-site via // their effective URLs. static bool IsSameWebSite(const IsolationContext& isolation_context, const GURL& src_url, const GURL& dest_url, bool should_compare_effective_urls); // SiteInstance interface overrides. int32_t GetId() override; int32_t GetBrowsingInstanceId() override; bool HasProcess() override; RenderProcessHost* GetProcess() override; BrowserContext* GetBrowserContext() override; const GURL& GetSiteURL() override; scoped_refptr<SiteInstance> GetRelatedSiteInstance(const GURL& url) override; bool IsRelatedSiteInstance(const SiteInstance* instance) override; size_t GetRelatedActiveContentsCount() override; bool RequiresDedicatedProcess() override; bool IsSameSiteWithURL(const GURL& url) override; // The policy to apply when selecting a RenderProcessHost for the // SiteInstance. If no suitable RenderProcessHost for the SiteInstance exists // according to the policy, and there are processes with unmatched service // workers for the site, the newest process with an unmatched service worker // is reused. If still no RenderProcessHost exists a new RenderProcessHost // will be created unless the process limit has been reached. When the limit // has been reached, the RenderProcessHost reused will be chosen randomly and // not based on the site. enum class ProcessReusePolicy { // In this mode, all instances of the site will be hosted in the same // RenderProcessHost. PROCESS_PER_SITE, // In this mode, the site will be rendered in a RenderProcessHost that is // already in use for the site, either for a pending navigation or a // committed navigation. If multiple such processes exist, ones that have // foreground frames are given priority, and otherwise one is selected // randomly. REUSE_PENDING_OR_COMMITTED_SITE, // In this mode, SiteInstances don't proactively reuse processes. An // existing process with an unmatched service worker for the site is reused // only for navigations, not for service workers. When the process limit has // been reached, a randomly chosen RenderProcessHost is reused as in the // other policies. DEFAULT, }; void set_process_reuse_policy(ProcessReusePolicy policy) { DCHECK(!IsDefaultSiteInstance()); process_reuse_policy_ = policy; } ProcessReusePolicy process_reuse_policy() const { return process_reuse_policy_; } // Whether the SiteInstance is created for a service worker. If this flag // is true, when a new process is created for this SiteInstance or a randomly // chosen existing process is reused because of the process limit, the process // will be tracked as having an unmatched service worker until reused by // another SiteInstance from the same site. bool is_for_service_worker() const { return is_for_service_worker_; } // Returns the URL which was used to set the |site_| for this SiteInstance. // May be empty if this SiteInstance does not have a |site_|. const GURL& original_url() { DCHECK(!IsDefaultSiteInstance()); return original_url_; } // Returns true if |original_url()| is the same site as // |dest_url| or this object is a default SiteInstance and can be // considered the same site as |dest_url|. bool IsOriginalUrlSameSite(const GURL& dest_url, bool should_compare_effective_urls); // Returns the URL which should be used in a LockToOrigin call for this // SiteInstance's process. This is the same as |site_| except for cases // involving effective URLs, such as hosted apps. In those cases, this URL // is a site URL that is computed without the use of effective URLs. // // NOTE: This URL is currently set even in cases where this SiteInstance's // process is *not* going to be locked to it. Callers should be careful to // consider this case when comparing lock URLs; ShouldLockToOrigin() may be // used to determine whether the process lock will actually be used. // // TODO(alexmos): See if we can clean this up and not set |lock_url_| if the // SiteInstance's process isn't going to be locked. const GURL& lock_url() { return lock_url_; } // True if |url| resolves to an effective URL that is different from |url|. // See GetEffectiveURL(). This will be true for hosted apps as well as NTP // URLs. static bool HasEffectiveURL(BrowserContext* browser_context, const GURL& url); // Returns the site for the given URL, which includes only the scheme and // registered domain. Returns an empty GURL if the URL has no host. // |url| will be resolved to an effective URL (via // ContentBrowserClient::GetEffectiveURL()) before determining the site. static GURL GetSiteForURL(const IsolationContext& isolation_context, const GURL& url); // Returns the site of a given |origin|. Unlike GetSiteForURL(), this does // not utilize effective URLs, isolated origins, or other special logic. It // only translates an origin into a site (i.e., scheme and eTLD+1) and is // used internally by GetSiteForURL(). For making process model decisions, // GetSiteForURL() should be used instead. static GURL GetSiteForOrigin(const url::Origin& origin); // Returns the URL to which a process should be locked for the given URL. // This is computed similarly to the site URL (see GetSiteForURL), but // without resolving effective URLs. static GURL DetermineProcessLockURL(const IsolationContext& isolation_context, const GURL& url); // Set the web site that this SiteInstance is rendering pages for. // This includes the scheme and registered domain, but not the port. If the // URL does not have a valid registered domain, then the full hostname is // stored. This method does not convert this instance into a default // SiteInstance, but the BrowsingInstance will call this method with |url| // set to GetDefaultSiteURL(), when it is creating its default SiteInstance. void SetSite(const GURL& url); // Similar to SetSite(), but first attempts to convert this object to a // default SiteInstance if |url| can be placed inside a default SiteInstance. // If conversion is not possible, then the normal SetSite() logic is run. void ConvertToDefaultOrSetSite(const GURL& url); // Returns whether SetSite() has been called. bool HasSite() const; // Returns whether there is currently a related SiteInstance (registered with // BrowsingInstance) for the site of the given url. If so, we should try to // avoid dedicating an unused SiteInstance to it (e.g., in a new tab). bool HasRelatedSiteInstance(const GURL& url); // Returns whether this SiteInstance has a process that is the wrong type for // the given URL. If so, the browser should force a process swap when // navigating to the URL. bool HasWrongProcessForURL(const GURL& url); // Increase the number of active frames in this SiteInstance. This is // increased when a frame is created. void IncrementActiveFrameCount(); // Decrease the number of active frames in this SiteInstance. This is // decreased when a frame is destroyed. Decrementing this to zero will notify // observers, and may trigger deletion of proxies. void DecrementActiveFrameCount(); // Get the number of active frames which belong to this SiteInstance. If // there are no active frames left, all frames in this SiteInstance can be // safely discarded. size_t active_frame_count() { return active_frame_count_; } // Increase the number of active WebContentses using this SiteInstance. Note // that, unlike active_frame_count, this does not count pending RFHs. void IncrementRelatedActiveContentsCount(); // Decrease the number of active WebContentses using this SiteInstance. Note // that, unlike active_frame_count, this does not count pending RFHs. void DecrementRelatedActiveContentsCount(); void AddObserver(Observer* observer); void RemoveObserver(Observer* observer); // Whether GetProcess() method (when it needs to find a new process to // associate with the current SiteInstanceImpl) can return a spare process. bool CanAssociateWithSpareProcess(); // Has no effect if the SiteInstanceImpl already has a |process_|. // Otherwise, prevents GetProcess() from associating this SiteInstanceImpl // with the spare RenderProcessHost - instead GetProcess will either need to // create a new, not-yet-initialized/spawned RenderProcessHost or will need to // reuse one of existing RenderProcessHosts. // // See also: // - https://crbug.com/840409. // - WebContents::CreateParams::desired_renderer_state // - SiteInstanceImpl::CanAssociateWithSpareProcess(). void PreventAssociationWithSpareProcess(); // Returns the special site URL used by the default SiteInstance. static const GURL& GetDefaultSiteURL(); // Get the effective URL for the given actual URL. This allows the // ContentBrowserClient to override the SiteInstance's site for certain URLs. // For example, Chrome uses this to replace hosted app URLs with extension // hosts. // Only public so that we can make a consistent process swap decision in // RenderFrameHostManager. static GURL GetEffectiveURL(BrowserContext* browser_context, const GURL& url); // Returns true if pages loaded from |url| ought to be handled only by a // renderer process isolated from other sites. If --site-per-process is used, // this is true for all sites. In other site isolation modes, only a subset // of sites will require dedicated processes. static bool DoesSiteRequireDedicatedProcess( const IsolationContext& isolation_context, const GURL& url); // Returns true if a process for a site |site_url| should be locked to just // that site. Returning true here also implies that |site_url| requires a // dedicated process. However, the converse does not hold: this might still // return false for certain special cases where an origin lock can't be // applied even when |site_url| requires a dedicated process (e.g., with // --site-per-process). Examples of those cases include <webview> guests, // single-process mode, or extensions where a process is currently allowed to // be reused for different extensions. Most of these special cases should // eventually be removed, and this function should become equivalent to // DoesSiteRequireDedicatedProcess(). // // Note that this function currently requires passing in a site URL (which // may use effective URLs), and not a lock URL to which the process may // eventually be locked via LockToOrigin(). See comments on lock_url() for // more info. // TODO(alexmos): See if this can take a lock URL instead. static bool ShouldLockToOrigin(const IsolationContext& isolation_context, GURL site_url); // Converts |site_url| into an origin that can be used as // |URLLoaderFactoryParams::request_initiator_site_lock|. // This means that the returned origin can be safely used in a eTLD+1 // comparison against |network::ResourceRequest::request_initiator|. // // base::nullopt is returned if |site_url| cannot be used as a // |request_initiator_site_lock| (e.g. in case of site_url = // chrome-guest://...). static base::Optional<url::Origin> GetRequestInitiatorSiteLock(GURL site_url); // Return an ID of the next BrowsingInstance to be created. This ID is // guaranteed to be higher than any ID of an existing BrowsingInstance. // This is useful when process model decisions need to be scoped only to // future BrowsingInstances. In particular, this can determine the cutoff in // BrowsingInstance IDs when adding a new isolated origin dynamically. static BrowsingInstanceId NextBrowsingInstanceId(); // Return the IsolationContext associated with this SiteInstance. This // specifies context for making process model decisions, such as information // about the current BrowsingInstance. const IsolationContext& GetIsolationContext(); // If this SiteInstance doesn't require a dedicated process, this will return // the BrowsingInstance's default process. RenderProcessHost* GetDefaultProcessIfUsable(); // Returns true if this object was constructed as a default site instance. bool IsDefaultSiteInstance() const; // Returns true if |site_url| is a site URL that the BrowsingInstance has // associated with its default SiteInstance. bool IsSiteInDefaultSiteInstance(const GURL& site_url) const; // Returns true if the the site URL for |url| matches the site URL // for this instance (i.e. GetSiteURL()). Otherwise returns false. bool DoesSiteForURLMatch(const GURL& url); private: friend class BrowsingInstance; friend class SiteInstanceTestBrowserClient; FRIEND_TEST_ALL_PREFIXES(SiteInstanceTest, ProcessLockDoesNotUseEffectiveURL); // Create a new SiteInstance. Only BrowsingInstance should call this // directly; clients should use Create() or GetRelatedSiteInstance() instead. explicit SiteInstanceImpl(BrowsingInstance* browsing_instance); ~SiteInstanceImpl() override; // RenderProcessHostObserver implementation. void RenderProcessHostDestroyed(RenderProcessHost* host) override; void RenderProcessExited(RenderProcessHost* host, const ChildProcessTerminationInfo& info) override; // Used to restrict a process' origin access rights. void LockToOriginIfNeeded(); // If kProcessSharingWithStrictSiteInstances is enabled, this will check // whether both a site and a process have been assigned to this SiteInstance, // and if this doesn't require a dedicated process, will offer process_ to // BrowsingInstance as the default process for SiteInstances that don't need // a dedicated process. void MaybeSetBrowsingInstanceDefaultProcess(); // Returns the site for the given URL, which includes only the scheme and // registered domain. Returns an empty GURL if the URL has no host. // |should_use_effective_urls| specifies whether to resolve |url| to an // effective URL (via ContentBrowserClient::GetEffectiveURL()) before // determining the site. // |allow_default_site_url| specifies whether the default SiteInstance site // URL is allowed to be returned. static GURL GetSiteForURLInternal(const IsolationContext& isolation_context, const GURL& url, bool should_use_effective_urls, bool allow_default_site_url); // Returns true if pages loaded from |site_url| ought to be handled only by a // renderer process isolated from other sites. If --site-per-process is used, // this is true for all sites. In other site isolation modes, only a subset // of sites will require dedicated processes. // Note: Unlike DoesSiteRequireDedicatedProcess(), this method expects a site // URL instead of a plain URL. static bool DoesSiteURLRequireDedicatedProcess( const IsolationContext& isolation_context, const GURL& site_url); // Returns true if |url| and its |site_url| can be placed inside a default // SiteInstance. // // Note: |url| and |site_url| must be consistent with each other. In contexts // where the caller only has |url| it can use // SiteInstanceImpl::GetSiteForURL() to generate |site_url|. This call is // intentionally not set as a default value to encourage the caller to reuse // a site URL computation if they already have one. static bool CanBePlacedInDefaultSiteInstance( const IsolationContext& isolation_context, const GURL& url, const GURL& site_url); // An object used to construct RenderProcessHosts. static const RenderProcessHostFactory* g_render_process_host_factory_; // The next available SiteInstance ID. static int32_t next_site_instance_id_; // A unique ID for this SiteInstance. int32_t id_; // The number of active frames in this SiteInstance. size_t active_frame_count_; // BrowsingInstance to which this SiteInstance belongs. scoped_refptr<BrowsingInstance> browsing_instance_; // Current RenderProcessHost that is rendering pages for this SiteInstance. // This pointer will only change once the RenderProcessHost is destructed. It // will still remain the same even if the process crashes, since in that // scenario the RenderProcessHost remains the same. RenderProcessHost* process_; // Describes the desired behavior when GetProcess() method needs to find a new // process to associate with the current SiteInstanceImpl. If |false|, then // prevents the spare RenderProcessHost from being taken and stored in // |process_|. bool can_associate_with_spare_process_; // The web site that this SiteInstance is rendering pages for. GURL site_; // Whether SetSite has been called. bool has_site_; // The URL which was used to set the |site_| for this SiteInstance. GURL original_url_; // The URL to use when locking a process to this SiteInstance's site via // LockToOrigin(). This is the same as |site_| except for cases involving // effective URLs, such as hosted apps. In those cases, this URL is a site // URL that is computed without the use of effective URLs. GURL lock_url_; // The ProcessReusePolicy to use when creating a RenderProcessHost for this // SiteInstance. ProcessReusePolicy process_reuse_policy_; // Whether the SiteInstance was created for a service worker. bool is_for_service_worker_; base::ObserverList<Observer, true>::Unchecked observers_; DISALLOW_COPY_AND_ASSIGN(SiteInstanceImpl); }; } // namespace content #endif // CONTENT_BROWSER_SITE_INSTANCE_IMPL_H_