blob: a12110943419e926b4b2bed1412bba16c1e36543 [file] [log] [blame]
[email protected]80a8fad2011-01-29 04:02:381// Copyright (c) 2011 The Chromium Authors. All rights reserved.
license.botbf09a502008-08-24 00:55:552// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
initial.commit09911bf2008-07-26 23:55:294
[email protected]1d8a3d1f2011-02-19 07:11:525#include "content/browser/site_instance.h"
initial.commit09911bf2008-07-26 23:55:296
[email protected]7e3abea42011-02-18 00:51:107#include "chrome/common/url_constants.h"
[email protected]39365212011-02-24 01:01:008#include "content/browser/browsing_instance.h"
[email protected]1fd1a502011-03-30 16:55:569#include "content/browser/content_browser_client.h"
[email protected]05fcf982011-04-19 00:44:1410#include "content/browser/renderer_host/browser_render_process_host.h"
[email protected]67fc0392011-02-25 02:56:5711#include "content/browser/webui/web_ui_factory.h"
[email protected]7f070d42011-03-09 20:25:3212#include "content/common/notification_service.h"
[email protected]1fd1a502011-03-30 16:55:5613#include "content/common/content_client.h"
initial.commit09911bf2008-07-26 23:55:2914#include "net/base/registry_controlled_domain.h"
15
[email protected]2ee0418e2009-06-26 21:00:4316// We treat javascript:, about:crash, about:hang, and about:shorthang as the
17// same site as any URL since they are actually modifiers on existing pages.
18static bool IsURLSameAsAnySiteInstance(const GURL& url) {
19 if (!url.is_valid())
20 return false;
21 return url.SchemeIs(chrome::kJavaScriptScheme) ||
22 url.spec() == chrome::kAboutCrashURL ||
[email protected]a8f024392011-01-13 21:50:1623 url.spec() == chrome::kAboutKillURL ||
[email protected]2ee0418e2009-06-26 21:00:4324 url.spec() == chrome::kAboutHangURL ||
25 url.spec() == chrome::kAboutShorthangURL;
26}
27
[email protected]4566f132009-03-12 01:55:1328SiteInstance::SiteInstance(BrowsingInstance* browsing_instance)
29 : browsing_instance_(browsing_instance),
30 render_process_host_factory_(NULL),
31 process_(NULL),
32 max_page_id_(-1),
33 has_site_(false) {
34 DCHECK(browsing_instance);
35
[email protected]5be94df2009-05-22 18:41:3236 registrar_.Add(this, NotificationType::RENDERER_PROCESS_TERMINATED,
37 NotificationService::AllSources());
[email protected]4566f132009-03-12 01:55:1338}
39
initial.commit09911bf2008-07-26 23:55:2940SiteInstance::~SiteInstance() {
41 // Now that no one is referencing us, we can safely remove ourselves from
42 // the BrowsingInstance. Any future visits to a page from this site
43 // (within the same BrowsingInstance) can safely create a new SiteInstance.
44 if (has_site_)
45 browsing_instance_->UnregisterSiteInstance(this);
46}
47
[email protected]5ab79b02010-04-26 16:47:1148bool SiteInstance::HasProcess() const {
49 return (process_ != NULL);
50}
51
initial.commit09911bf2008-07-26 23:55:2952RenderProcessHost* SiteInstance::GetProcess() {
[email protected]08c8ec7e2010-07-11 17:14:4853 // TODO(erikkay) It would be nice to ensure that the renderer type had been
54 // properly set before we get here. The default tab creation case winds up
55 // with no site set at this point, so it will default to TYPE_NORMAL. This
56 // may not be correct, so we'll wind up potentially creating a process that
57 // we then throw away, or worse sharing a process with the wrong process type.
58 // See crbug.com/43448.
59
initial.commit09911bf2008-07-26 23:55:2960 // Create a new process if ours went away or was reused.
[email protected]4566f132009-03-12 01:55:1361 if (!process_) {
initial.commit09911bf2008-07-26 23:55:2962 // See if we should reuse an old process
63 if (RenderProcessHost::ShouldTryToUseExistingProcessHost())
[email protected]4566f132009-03-12 01:55:1364 process_ = RenderProcessHost::GetExistingProcessHost(
[email protected]1dfa9502009-06-15 20:28:0965 browsing_instance_->profile(), GetRendererType());
initial.commit09911bf2008-07-26 23:55:2966
67 // Otherwise (or if that fails), create a new one.
[email protected]4566f132009-03-12 01:55:1368 if (!process_) {
[email protected]a6df5112009-01-21 23:50:1569 if (render_process_host_factory_) {
[email protected]4566f132009-03-12 01:55:1370 process_ = render_process_host_factory_->CreateRenderProcessHost(
[email protected]a6df5112009-01-21 23:50:1571 browsing_instance_->profile());
72 } else {
[email protected]4566f132009-03-12 01:55:1373 process_ = new BrowserRenderProcessHost(browsing_instance_->profile());
[email protected]a6df5112009-01-21 23:50:1574 }
75 }
initial.commit09911bf2008-07-26 23:55:2976
initial.commit09911bf2008-07-26 23:55:2977 // Make sure the process starts at the right max_page_id
[email protected]4566f132009-03-12 01:55:1378 process_->UpdateMaxPageID(max_page_id_);
initial.commit09911bf2008-07-26 23:55:2979 }
[email protected]4566f132009-03-12 01:55:1380 DCHECK(process_);
initial.commit09911bf2008-07-26 23:55:2981
[email protected]4566f132009-03-12 01:55:1382 return process_;
initial.commit09911bf2008-07-26 23:55:2983}
84
85void SiteInstance::SetSite(const GURL& url) {
86 // A SiteInstance's site should not change.
87 // TODO(creis): When following links or script navigations, we can currently
88 // render pages from other sites in this SiteInstance. This will eventually
89 // be fixed, but until then, we should still not set the site of a
90 // SiteInstance more than once.
91 DCHECK(!has_site_);
92
93 // Remember that this SiteInstance has been used to load a URL, even if the
94 // URL is invalid.
95 has_site_ = true;
[email protected]3a8eecb2010-04-22 23:56:3096 site_ = GetSiteForURL(browsing_instance_->profile(), url);
initial.commit09911bf2008-07-26 23:55:2997
98 // Now that we have a site, register it with the BrowsingInstance. This
99 // ensures that we won't create another SiteInstance for this site within
100 // the same BrowsingInstance, because all same-site pages within a
101 // BrowsingInstance can script each other.
102 browsing_instance_->RegisterSiteInstance(this);
103}
104
105bool SiteInstance::HasRelatedSiteInstance(const GURL& url) {
106 return browsing_instance_->HasSiteInstance(url);
107}
108
109SiteInstance* SiteInstance::GetRelatedSiteInstance(const GURL& url) {
110 return browsing_instance_->GetSiteInstanceForURL(url);
111}
112
113/*static*/
114SiteInstance* SiteInstance::CreateSiteInstance(Profile* profile) {
115 return new SiteInstance(new BrowsingInstance(profile));
116}
117
118/*static*/
[email protected]d8a96622009-05-07 19:21:16119SiteInstance* SiteInstance::CreateSiteInstanceForURL(Profile* profile,
120 const GURL& url) {
[email protected]633fbc42009-05-07 23:39:47121 // This BrowsingInstance may be deleted if it returns an existing
122 // SiteInstance.
123 scoped_refptr<BrowsingInstance> instance(new BrowsingInstance(profile));
124 return instance->GetSiteInstanceForURL(url);
[email protected]d8a96622009-05-07 19:21:16125}
126
127/*static*/
[email protected]3a8eecb2010-04-22 23:56:30128GURL SiteInstance::GetSiteForURL(Profile* profile, const GURL& real_url) {
129 GURL url = GetEffectiveURL(profile, real_url);
130
initial.commit09911bf2008-07-26 23:55:29131 // URLs with no host should have an empty site.
132 GURL site;
133
134 // TODO(creis): For many protocols, we should just treat the scheme as the
[email protected]76a010b2008-12-07 23:48:03135 // site, since there is no host. e.g., file:, about:, chrome:
initial.commit09911bf2008-07-26 23:55:29136
137 // If the url has a host, then determine the site.
138 if (url.has_host()) {
[email protected]6705b232008-11-26 00:16:51139 // Only keep the scheme and registered domain as given by GetOrigin. This
140 // may also include a port, which we need to drop.
initial.commit09911bf2008-07-26 23:55:29141 site = url.GetOrigin();
142
[email protected]6705b232008-11-26 00:16:51143 // Remove port, if any.
144 if (site.has_port()) {
145 GURL::Replacements rep;
146 rep.ClearPort();
147 site = site.ReplaceComponents(rep);
148 }
149
initial.commit09911bf2008-07-26 23:55:29150 // If this URL has a registered domain, we only want to remember that part.
151 std::string domain =
[email protected]8ac1a752008-07-31 19:40:37152 net::RegistryControlledDomainService::GetDomainAndRegistry(url);
initial.commit09911bf2008-07-26 23:55:29153 if (!domain.empty()) {
154 GURL::Replacements rep;
155 rep.SetHostStr(domain);
156 site = site.ReplaceComponents(rep);
157 }
158 }
159 return site;
160}
161
162/*static*/
[email protected]3a8eecb2010-04-22 23:56:30163bool SiteInstance::IsSameWebSite(Profile* profile,
164 const GURL& real_url1, const GURL& real_url2) {
165 GURL url1 = GetEffectiveURL(profile, real_url1);
166 GURL url2 = GetEffectiveURL(profile, real_url2);
167
initial.commit09911bf2008-07-26 23:55:29168 // We infer web site boundaries based on the registered domain name of the
[email protected]6705b232008-11-26 00:16:51169 // top-level page and the scheme. We do not pay attention to the port if
170 // one is present, because pages served from different ports can still
171 // access each other if they change their document.domain variable.
initial.commit09911bf2008-07-26 23:55:29172
[email protected]2ee0418e2009-06-26 21:00:43173 // Some special URLs will match the site instance of any other URL. This is
174 // done before checking both of them for validity, since we want these URLs
175 // to have the same site instance as even an invalid one.
176 if (IsURLSameAsAnySiteInstance(url1) || IsURLSameAsAnySiteInstance(url2))
initial.commit09911bf2008-07-26 23:55:29177 return true;
178
179 // If either URL is invalid, they aren't part of the same site.
[email protected]2ee0418e2009-06-26 21:00:43180 if (!url1.is_valid() || !url2.is_valid())
initial.commit09911bf2008-07-26 23:55:29181 return false;
initial.commit09911bf2008-07-26 23:55:29182
[email protected]6705b232008-11-26 00:16:51183 // If the schemes differ, they aren't part of the same site.
[email protected]2ee0418e2009-06-26 21:00:43184 if (url1.scheme() != url2.scheme())
initial.commit09911bf2008-07-26 23:55:29185 return false;
initial.commit09911bf2008-07-26 23:55:29186
[email protected]8ac1a752008-07-31 19:40:37187 return net::RegistryControlledDomainService::SameDomainOrHost(url1, url2);
initial.commit09911bf2008-07-26 23:55:29188}
[email protected]4566f132009-03-12 01:55:13189
[email protected]3a8eecb2010-04-22 23:56:30190/*static*/
191GURL SiteInstance::GetEffectiveURL(Profile* profile, const GURL& url) {
[email protected]36fb2c7c2011-04-04 15:49:08192 return content::GetContentClient()->browser()->GetEffectiveURL(profile, url);
[email protected]3a8eecb2010-04-22 23:56:30193}
194
[email protected]08c8ec7e2010-07-11 17:14:48195/*static*/
196RenderProcessHost::Type SiteInstance::RendererTypeForURL(const GURL& url) {
197 if (!url.is_valid())
[email protected]1dfa9502009-06-15 20:28:09198 return RenderProcessHost::TYPE_NORMAL;
199
[email protected]08c8ec7e2010-07-11 17:14:48200 if (url.SchemeIs(chrome::kExtensionScheme))
[email protected]1dfa9502009-06-15 20:28:09201 return RenderProcessHost::TYPE_EXTENSION;
202
[email protected]80a8fad2011-01-29 04:02:38203 // TODO(erikkay) creis recommends using UseWebUIForURL instead.
[email protected]1fd1a502011-03-30 16:55:56204 if (content::WebUIFactory::Get()->HasWebUIScheme(url))
[email protected]d0980792011-02-13 19:41:40205 return RenderProcessHost::TYPE_WEBUI;
[email protected]1dfa9502009-06-15 20:28:09206
207 return RenderProcessHost::TYPE_NORMAL;
208}
209
[email protected]08c8ec7e2010-07-11 17:14:48210RenderProcessHost::Type SiteInstance::GetRendererType() {
211 // We may not have a site at this point, which generally means this is a
212 // normal navigation.
213 if (!has_site_)
214 return RenderProcessHost::TYPE_NORMAL;
215
216 return RendererTypeForURL(site_);
217}
218
[email protected]4566f132009-03-12 01:55:13219void SiteInstance::Observe(NotificationType type,
220 const NotificationSource& source,
221 const NotificationDetails& details) {
222 DCHECK(type == NotificationType::RENDERER_PROCESS_TERMINATED);
223 RenderProcessHost* rph = Source<RenderProcessHost>(source).ptr();
224 if (rph == process_)
225 process_ = NULL;
226}