blob: 0ce64d84884c60c1aa891c6a84458733dce2346e [file] [log] [blame]
[email protected]55eb70e762012-02-20 17:38:391// Copyright (c) 2012 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include "content/public/browser/browser_context.h"
6
avib7348942015-12-25 20:57:107#include <stddef.h>
8#include <stdint.h>
avi1ed4a4372017-04-25 05:39:419
erge69130f52016-03-02 00:13:2810#include <algorithm>
11#include <limits>
rockot963ad3e82016-04-13 16:33:2312#include <memory>
Takuto Ikuta8332bf9d2019-01-05 03:58:0013#include <unordered_set>
dcheng36b6aec92015-12-26 06:16:3614#include <utility>
rockot963ad3e82016-04-13 16:33:2315#include <vector>
avib7348942015-12-25 20:57:1016
mmenkec0b2b8b12017-04-21 16:27:5217#include "base/base64.h"
Takashi Toyoshimaa12ecf42018-09-25 07:46:0118#include "base/bind.h"
rockot963ad3e82016-04-13 16:33:2319#include "base/command_line.h"
Takashi Toyoshimaa12ecf42018-09-25 07:46:0120#include "base/feature_list.h"
Chris Cunninghama5b38012017-10-28 07:27:1821#include "base/files/file_path.h"
bencccfe2a2016-03-05 16:54:1422#include "base/guid.h"
erge69130f52016-03-02 00:13:2823#include "base/lazy_instance.h"
mmenkec0b2b8b12017-04-21 16:27:5224#include "base/logging.h"
rockot963ad3e82016-04-13 16:33:2325#include "base/macros.h"
avi1ed4a4372017-04-25 05:39:4126#include "base/memory/ptr_util.h"
Ken Rockot435132692018-11-20 21:46:1027#include "base/memory/weak_ptr.h"
Chris Cunningham4507edfa2019-05-30 20:15:5428#include "base/metrics/field_trial_params.h"
Ken Rockotda7edc62018-11-10 01:01:4529#include "base/no_destructor.h"
erge69130f52016-03-02 00:13:2830#include "base/rand_util.h"
Takashi Toyoshima621e2bf2018-09-18 08:05:1631#include "base/supports_user_data.h"
Gabriel Charette44db1422018-08-06 11:19:3332#include "base/task/post_task.h"
Ken Rockot84f58fd2018-06-22 21:54:1433#include "base/threading/sequenced_task_runner_handle.h"
ben21a34c252016-06-29 22:24:3734#include "base/threading/thread_task_runner_handle.h"
Andrey Lushnikovd39d9062018-04-24 17:33:3535#include "base/unguessable_token.h"
avib7348942015-12-25 20:57:1036#include "build/build_config.h"
dmurph7ac019a2016-05-13 00:13:1737#include "content/browser/blob_storage/chrome_blob_storage_context.h"
msrameke169ccb2017-04-26 05:21:4138#include "content/browser/browsing_data/browsing_data_remover_impl.h"
Alex Moshchuk99b795422019-03-07 00:27:3239#include "content/browser/child_process_security_policy_impl.h"
Ken Rockot84f58fd2018-06-22 21:54:1440#include "content/browser/content_service_delegate_impl.h"
[email protected]b441a8492012-06-06 14:55:5741#include "content/browser/download/download_manager_impl.h"
[email protected]678c0362012-12-05 08:02:4442#include "content/browser/loader/resource_dispatcher_host_impl.h"
[email protected]3dcea37a2019-02-11 19:46:5143#include "content/browser/media/browser_feature_provider.h"
Andrey Lushnikovebff0442018-07-12 20:02:5844#include "content/browser/permissions/permission_controller_impl.h"
mvanouwerkerk17205ea2014-11-07 17:30:1545#include "content/browser/push_messaging/push_messaging_router.h"
Ken Rockotc7a279c2017-05-04 23:51:4546#include "content/browser/service_manager/common_browser_interfaces.h"
[email protected]4c3a23582012-08-18 08:54:3447#include "content/browser/storage_partition_impl_map.h"
[email protected]d7c7c98a2012-07-12 21:27:4448#include "content/common/child_process_host_impl.h"
[email protected]393b6cb2014-05-15 00:55:1249#include "content/public/browser/blob_handle.h"
Eric Seckler8652dcd52018-09-20 10:42:2850#include "content/public/browser/browser_task_traits.h"
[email protected]55eb70e762012-02-20 17:38:3951#include "content/public/browser/browser_thread.h"
[email protected]b441a8492012-06-06 14:55:5752#include "content/public/browser/content_browser_client.h"
Daniel Murphyd9a41e7b2019-05-09 17:56:5453#include "content/public/browser/indexed_db_context.h"
falken04a6912a2016-09-23 21:06:2954#include "content/public/browser/render_process_host.h"
Takashi Toyoshima0190a3b2019-01-21 07:39:0655#include "content/public/browser/shared_cors_origin_access_list.h"
[email protected]536fd0b2013-03-14 17:41:5756#include "content/public/browser/site_instance.h"
Ken Rockotfd03e682019-06-20 21:13:5457#include "content/public/browser/system_connector.h"
rockot963ad3e82016-04-13 16:33:2358#include "content/public/common/content_switches.h"
bend32292b2016-10-07 00:21:5859#include "content/public/common/service_manager_connection.h"
ben51bb6c62016-11-17 20:15:5760#include "content/public/common/service_names.mojom.h"
Chris Cunningham4507edfa2019-05-30 20:15:5461#include "media/base/media_switches.h"
62#include "media/capabilities/in_memory_video_decode_stats_db_impl.h"
Chris Cunningham9e669472017-11-15 21:03:1163#include "media/capabilities/video_decode_stats_db_impl.h"
Chris Cunninghama5b38012017-10-28 07:27:1864#include "media/mojo/services/video_decode_perf_history.h"
Ken Rockot40a1df792019-05-08 22:15:5265#include "mojo/public/cpp/bindings/remote.h"
[email protected]4d7c4ef2012-03-16 01:47:1266#include "net/cookies/cookie_store.h"
[email protected]6e2d3d22012-02-24 18:10:3667#include "net/url_request/url_request_context.h"
[email protected]6939075a2012-08-28 08:35:5368#include "net/url_request/url_request_context_getter.h"
Ken Rockot84f58fd2018-06-22 21:54:1469#include "services/content/public/mojom/constants.mojom.h"
70#include "services/content/service.h"
ben768c8dc2016-08-12 00:26:5071#include "services/file/file_service.h"
Ken Rockot21142de2018-02-10 01:45:3072#include "services/file/public/mojom/constants.mojom.h"
ben768c8dc2016-08-12 00:26:5073#include "services/file/user_id_map.h"
Takashi Toyoshimaa12ecf42018-09-25 07:46:0174#include "services/network/public/cpp/features.h"
rockot734fb662016-10-15 16:41:3075#include "services/service_manager/public/cpp/connector.h"
Ken Rockot435132692018-11-20 21:46:1076#include "services/service_manager/public/cpp/service.h"
Ken Rockot543f5e32018-02-04 02:13:5077#include "services/service_manager/public/mojom/service.mojom.h"
Xing Liu89860472018-02-09 20:07:0278#include "storage/browser/blob/blob_storage_context.h"
pilgrime92c5fcd2014-09-10 23:31:2379#include "storage/browser/database/database_tracker.h"
80#include "storage/browser/fileapi/external_mount_points.h"
[email protected]55eb70e762012-02-20 17:38:3981
[email protected]314c3e22012-02-21 03:57:4282using base::UserDataAdapter;
[email protected]55eb70e762012-02-20 17:38:3983
[email protected]55eb70e762012-02-20 17:38:3984namespace content {
85
[email protected]735e20c2012-03-20 01:16:5986namespace {
87
Ken Rockotda7edc62018-11-10 01:01:4588using TokenToContextMap = std::map<base::Token, BrowserContext*>;
89TokenToContextMap& GetTokenToContextMap() {
90 static base::NoDestructor<TokenToContextMap> map;
91 return *map;
92}
ben6c85c4492016-06-16 20:40:5193
Ken Rockotda7edc62018-11-10 01:01:4594class ServiceInstanceGroupHolder : public base::SupportsUserData::Data {
ben6c85c4492016-06-16 20:40:5195 public:
Ken Rockotda7edc62018-11-10 01:01:4596 explicit ServiceInstanceGroupHolder(const base::Token& instance_group)
97 : instance_group_(instance_group) {}
98 ~ServiceInstanceGroupHolder() override {}
ben6c85c4492016-06-16 20:40:5199
Ken Rockotda7edc62018-11-10 01:01:45100 const base::Token& instance_group() const { return instance_group_; }
ben6c85c4492016-06-16 20:40:51101
102 private:
Ken Rockotda7edc62018-11-10 01:01:45103 base::Token instance_group_;
ben6c85c4492016-06-16 20:40:51104
Ken Rockotda7edc62018-11-10 01:01:45105 DISALLOW_COPY_AND_ASSIGN(ServiceInstanceGroupHolder);
ben6c85c4492016-06-16 20:40:51106};
erge69130f52016-03-02 00:13:28107
Ken Rockot499519e2018-12-04 06:57:44108// The file service runs on the IO thread but we want to limit its lifetime to
109// that of the BrowserContext which creates it. This provides thread-safe access
110// to the relevant state on the IO thread.
111class FileServiceIOThreadState
112 : public base::RefCountedThreadSafe<FileServiceIOThreadState> {
113 public:
114 explicit FileServiceIOThreadState(
115 scoped_refptr<base::SingleThreadTaskRunner> io_task_runner)
116 : io_task_runner_(std::move(io_task_runner)) {}
117
118 void StartOnIOThread(service_manager::mojom::ServiceRequest request) {
119 DCHECK(io_task_runner_->RunsTasksInCurrentSequence());
120 file_service_ = std::make_unique<file::FileService>(std::move(request));
121 }
122
123 void ShutDown() {
124 io_task_runner_->PostTask(
125 FROM_HERE,
126 base::BindOnce(&FileServiceIOThreadState::ShutDownOnIOThread, this));
127 }
128
129 private:
130 friend class base::RefCountedThreadSafe<FileServiceIOThreadState>;
131
132 ~FileServiceIOThreadState() { DCHECK(!file_service_); }
133
134 void ShutDownOnIOThread() { file_service_.reset(); }
135
136 const scoped_refptr<base::SingleThreadTaskRunner> io_task_runner_;
137 std::unique_ptr<file::FileService> file_service_;
138
139 DISALLOW_COPY_AND_ASSIGN(FileServiceIOThreadState);
140};
141
142class FileServiceHolder : public base::SupportsUserData::Data {
143 public:
144 explicit FileServiceHolder(scoped_refptr<FileServiceIOThreadState> state)
145 : state_(std::move(state)) {}
146 ~FileServiceHolder() override { state_->ShutDown(); }
147
148 private:
149 const scoped_refptr<FileServiceIOThreadState> state_;
150
151 DISALLOW_COPY_AND_ASSIGN(FileServiceHolder);
152};
153
Ken Rockot84f58fd2018-06-22 21:54:14154class ContentServiceDelegateHolder : public base::SupportsUserData::Data {
155 public:
156 explicit ContentServiceDelegateHolder(BrowserContext* browser_context)
157 : delegate_(browser_context) {}
158 ~ContentServiceDelegateHolder() override = default;
159
160 ContentServiceDelegateImpl* delegate() { return &delegate_; }
161
162 private:
163 ContentServiceDelegateImpl delegate_;
164
165 DISALLOW_COPY_AND_ASSIGN(ContentServiceDelegateHolder);
166};
167
[email protected]e0ce8a1e2012-09-18 10:26:36168// Key names on BrowserContext.
msrameke169ccb2017-04-26 05:21:41169const char kBrowsingDataRemoverKey[] = "browsing-data-remover";
Ken Rockot84f58fd2018-06-22 21:54:14170const char kContentServiceDelegateKey[] = "content-service-delegate";
Ken Rockot499519e2018-12-04 06:57:44171const char kFileServiceKey[] = "file-service";
[email protected]6ef0c3912013-01-25 22:46:34172const char kDownloadManagerKeyName[] = "download_manager";
Takashi Toyoshima621e2bf2018-09-18 08:05:16173const char kPermissionControllerKey[] = "permission-controller";
bend32292b2016-10-07 00:21:58174const char kServiceManagerConnection[] = "service-manager-connection";
Ken Rockotda7edc62018-11-10 01:01:45175const char kServiceInstanceGroup[] = "service-instance-group";
rockot963ad3e82016-04-13 16:33:23176const char kStoragePartitionMapKeyName[] = "content_storage_partition_map";
Chris Cunninghama5b38012017-10-28 07:27:18177const char kVideoDecodePerfHistoryId[] = "video-decode-perf-history";
erge69130f52016-03-02 00:13:28178
[email protected]9afc14e22013-09-25 22:34:14179#if defined(OS_CHROMEOS)
180const char kMountPointsKey[] = "mount_points";
181#endif // defined(OS_CHROMEOS)
182
Ken Rockotda7edc62018-11-10 01:01:45183void RemoveBrowserContextFromInstanceGroupMap(BrowserContext* browser_context) {
184 ServiceInstanceGroupHolder* holder = static_cast<ServiceInstanceGroupHolder*>(
185 browser_context->GetUserData(kServiceInstanceGroup));
ben6c85c4492016-06-16 20:40:51186 if (holder) {
Ken Rockotda7edc62018-11-10 01:01:45187 auto it = GetTokenToContextMap().find(holder->instance_group());
188 if (it != GetTokenToContextMap().end())
189 GetTokenToContextMap().erase(it);
ben6c85c4492016-06-16 20:40:51190 }
191}
192
[email protected]14acc642012-11-17 12:20:10193StoragePartitionImplMap* GetStoragePartitionMap(
194 BrowserContext* browser_context) {
[email protected]4c3a23582012-08-18 08:54:34195 StoragePartitionImplMap* partition_map =
196 static_cast<StoragePartitionImplMap*>(
a.cavalcantiffab73762015-08-15 02:55:48197 browser_context->GetUserData(kStoragePartitionMapKeyName));
[email protected]d7c7c98a2012-07-12 21:27:44198 if (!partition_map) {
avi1ed4a4372017-04-25 05:39:41199 auto partition_map_owned =
Jeremy Roman04f27c372017-10-27 15:20:55200 std::make_unique<StoragePartitionImplMap>(browser_context);
avi1ed4a4372017-04-25 05:39:41201 partition_map = partition_map_owned.get();
202 browser_context->SetUserData(kStoragePartitionMapKeyName,
203 std::move(partition_map_owned));
[email protected]d7c7c98a2012-07-12 21:27:44204 }
[email protected]14acc642012-11-17 12:20:10205 return partition_map;
206}
207
208StoragePartition* GetStoragePartitionFromConfig(
209 BrowserContext* browser_context,
210 const std::string& partition_domain,
211 const std::string& partition_name,
Dan Elphick6c0d8492017-09-12 09:35:38212 bool in_memory,
213 bool can_create) {
[email protected]14acc642012-11-17 12:20:10214 StoragePartitionImplMap* partition_map =
215 GetStoragePartitionMap(browser_context);
[email protected]d7c7c98a2012-07-12 21:27:44216
[email protected]1bc28312012-11-08 08:31:53217 if (browser_context->IsOffTheRecord())
218 in_memory = true;
219
Dan Elphick6c0d8492017-09-12 09:35:38220 return partition_map->Get(partition_domain, partition_name, in_memory,
221 can_create);
[email protected]d1198fd2012-08-13 22:50:19222}
223
[email protected]6939075a2012-08-28 08:35:53224void SaveSessionStateOnIOThread(
225 const scoped_refptr<net::URLRequestContextGetter>& context_getter,
[email protected]98d6d4562014-06-25 20:57:55226 AppCacheServiceImpl* appcache_service) {
[email protected]6939075a2012-08-28 08:35:53227 appcache_service->set_force_keep_session_state();
[email protected]6e2d3d22012-02-24 18:10:36228}
229
[email protected]89acda82013-06-25 20:52:50230void SaveSessionStateOnIndexedDBThread(
Daniel Murphyd9a41e7b2019-05-09 17:56:54231 scoped_refptr<IndexedDBContext> indexed_db_context) {
[email protected]bf510ed2012-06-05 08:31:43232 indexed_db_context->SetForceKeepSessionState();
[email protected]6e2d3d22012-02-24 18:10:36233}
234
falken41f4175162014-10-29 07:03:41235void ShutdownServiceWorkerContext(StoragePartition* partition) {
236 ServiceWorkerContextWrapper* wrapper =
237 static_cast<ServiceWorkerContextWrapper*>(
238 partition->GetServiceWorkerContext());
239 wrapper->process_manager()->Shutdown();
240}
241
avi1ed4a4372017-04-25 05:39:41242void SetDownloadManager(
243 BrowserContext* context,
244 std::unique_ptr<content::DownloadManager> download_manager) {
ttr31481dc54b2015-08-06 20:11:26245 DCHECK_CURRENTLY_ON(BrowserThread::UI);
246 DCHECK(download_manager);
avi1ed4a4372017-04-25 05:39:41247 context->SetUserData(kDownloadManagerKeyName, std::move(download_manager));
ttr31481dc54b2015-08-06 20:11:26248}
249
Ken Rockot499519e2018-12-04 06:57:44250std::unique_ptr<service_manager::Service>
251CreateMainThreadServiceForBrowserContext(
252 BrowserContext* browser_context,
253 const std::string& service_name,
254 service_manager::mojom::ServiceRequest request) {
255 if (service_name == content::mojom::kServiceName) {
256 auto* delegate_holder = static_cast<ContentServiceDelegateHolder*>(
257 browser_context->GetUserData(kContentServiceDelegateKey));
258 auto* delegate = delegate_holder->delegate();
259 auto service =
260 std::make_unique<content::Service>(delegate, std::move(request));
261 delegate->AddService(service.get());
262 return service;
263 }
264
265 return browser_context->HandleServiceRequest(service_name,
266 std::move(request));
267}
268
bend32292b2016-10-07 00:21:58269class BrowserContextServiceManagerConnectionHolder
rockot963ad3e82016-04-13 16:33:23270 : public base::SupportsUserData::Data {
271 public:
benaad37ecd2017-04-12 22:08:20272 explicit BrowserContextServiceManagerConnectionHolder(
Ken Rockot435132692018-11-20 21:46:10273 BrowserContext* browser_context,
Ken Rockot499519e2018-12-04 06:57:44274 service_manager::mojom::ServiceRequest request,
275 scoped_refptr<base::SequencedTaskRunner> main_thread_task_runner)
Ken Rockot435132692018-11-20 21:46:10276 : browser_context_(browser_context),
Ken Rockot499519e2018-12-04 06:57:44277 main_thread_task_runner_(std::move(main_thread_task_runner)),
Ken Rockot435132692018-11-20 21:46:10278 service_manager_connection_(ServiceManagerConnection::Create(
rockotcef38272016-07-15 22:47:47279 std::move(request),
Eric Seckler8652dcd52018-09-20 10:42:28280 base::CreateSingleThreadTaskRunnerWithTraits(
Ken Rockot435132692018-11-20 21:46:10281 {BrowserThread::IO}))) {
282 service_manager_connection_->SetDefaultServiceRequestHandler(
283 base::BindRepeating(
284 &BrowserContextServiceManagerConnectionHolder::OnServiceRequest,
285 weak_ptr_factory_.GetWeakPtr()));
286 }
bend32292b2016-10-07 00:21:58287 ~BrowserContextServiceManagerConnectionHolder() override {}
rockot963ad3e82016-04-13 16:33:23288
bend32292b2016-10-07 00:21:58289 ServiceManagerConnection* service_manager_connection() {
290 return service_manager_connection_.get();
291 }
rockot963ad3e82016-04-13 16:33:23292
Ken Rockotad3c7582018-12-12 17:04:14293 void DestroyRunningServices() { running_services_.clear(); }
294
rockot963ad3e82016-04-13 16:33:23295 private:
Ken Rockot435132692018-11-20 21:46:10296 void OnServiceRequest(const std::string& service_name,
297 service_manager::mojom::ServiceRequest request) {
298 std::unique_ptr<service_manager::Service> service =
Ken Rockot499519e2018-12-04 06:57:44299 CreateMainThreadServiceForBrowserContext(browser_context_, service_name,
300 std::move(request));
Ken Rockot435132692018-11-20 21:46:10301 if (!service) {
302 LOG(ERROR) << "Ignoring request for unknown per-browser-context service:"
303 << service_name;
304 return;
305 }
306
307 auto* raw_service = service.get();
308 service->set_termination_closure(base::BindOnce(
309 &BrowserContextServiceManagerConnectionHolder::OnServiceQuit,
310 base::Unretained(this), raw_service));
311 running_services_.emplace(raw_service, std::move(service));
312 }
313
314 void OnServiceQuit(service_manager::Service* service) {
315 running_services_.erase(service);
316 }
317
318 BrowserContext* const browser_context_;
Ken Rockot499519e2018-12-04 06:57:44319 const scoped_refptr<base::SequencedTaskRunner> main_thread_task_runner_;
bend32292b2016-10-07 00:21:58320 std::unique_ptr<ServiceManagerConnection> service_manager_connection_;
Ken Rockot435132692018-11-20 21:46:10321 std::map<service_manager::Service*, std::unique_ptr<service_manager::Service>>
322 running_services_;
323
324 base::WeakPtrFactory<BrowserContextServiceManagerConnectionHolder>
325 weak_ptr_factory_{this};
rockot963ad3e82016-04-13 16:33:23326
bend32292b2016-10-07 00:21:58327 DISALLOW_COPY_AND_ASSIGN(BrowserContextServiceManagerConnectionHolder);
rockot963ad3e82016-04-13 16:33:23328};
329
Jens Widell7ca8fb42018-02-21 14:11:54330base::WeakPtr<storage::BlobStorageContext> BlobStorageContextGetterForBrowser(
Xing Liu89860472018-02-09 20:07:02331 scoped_refptr<ChromeBlobStorageContext> blob_context) {
332 DCHECK_CURRENTLY_ON(BrowserThread::IO);
333 return blob_context->context()->AsWeakPtr();
334}
335
[email protected]735e20c2012-03-20 01:16:59336} // namespace
337
[email protected]14acc642012-11-17 12:20:10338// static
339void BrowserContext::AsyncObliterateStoragePartition(
340 BrowserContext* browser_context,
[email protected]399583b2012-12-11 09:33:42341 const GURL& site,
342 const base::Closure& on_gc_required) {
Marijn Kruisselbrink83e5cdb2019-06-20 00:06:28343 GetStoragePartitionMap(browser_context)
344 ->AsyncObliterate(site, on_gc_required);
[email protected]399583b2012-12-11 09:33:42345}
346
347// static
348void BrowserContext::GarbageCollectStoragePartitions(
dcheng59716272016-04-09 05:19:08349 BrowserContext* browser_context,
Takuto Ikuta8332bf9d2019-01-05 03:58:00350 std::unique_ptr<std::unordered_set<base::FilePath>> active_paths,
dcheng59716272016-04-09 05:19:08351 const base::Closure& done) {
dcheng36b6aec92015-12-26 06:16:36352 GetStoragePartitionMap(browser_context)
353 ->GarbageCollect(std::move(active_paths), done);
[email protected]14acc642012-11-17 12:20:10354}
355
Marijn Kruisselbrink83e5cdb2019-06-20 00:06:28356DownloadManager* BrowserContext::GetDownloadManager(BrowserContext* context) {
mostynbfbcdc27a2015-03-13 17:58:52357 DCHECK_CURRENTLY_ON(BrowserThread::UI);
[email protected]b441a8492012-06-06 14:55:57358 if (!context->GetUserData(kDownloadManagerKeyName)) {
Min Qinddb40ce2017-10-28 03:38:26359 DownloadManager* download_manager = new DownloadManagerImpl(context);
[email protected]d25fda12012-06-12 17:05:03360
avi1ed4a4372017-04-25 05:39:41361 SetDownloadManager(context, base::WrapUnique(download_manager));
[email protected]b441a8492012-06-06 14:55:57362 download_manager->SetDelegate(context->GetDownloadManagerDelegate());
[email protected]b441a8492012-06-06 14:55:57363 }
364
[email protected]eba4a4d2013-05-29 02:18:06365 return static_cast<DownloadManager*>(
366 context->GetUserData(kDownloadManagerKeyName));
[email protected]b441a8492012-06-06 14:55:57367}
368
[email protected]6ef0c3912013-01-25 22:46:34369// static
[email protected]cd501a72014-08-22 19:58:31370storage::ExternalMountPoints* BrowserContext::GetMountPoints(
[email protected]6ef0c3912013-01-25 22:46:34371 BrowserContext* context) {
372 // Ensure that these methods are called on the UI thread, except for
373 // unittests where a UI thread might not have been created.
374 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI) ||
Gabriel Charette2983181c2018-03-28 17:01:09375 !BrowserThread::IsThreadInitialized(BrowserThread::UI));
[email protected]6ef0c3912013-01-25 22:46:34376
377#if defined(OS_CHROMEOS)
378 if (!context->GetUserData(kMountPointsKey)) {
[email protected]cd501a72014-08-22 19:58:31379 scoped_refptr<storage::ExternalMountPoints> mount_points =
380 storage::ExternalMountPoints::CreateRefCounted();
[email protected]6ef0c3912013-01-25 22:46:34381 context->SetUserData(
382 kMountPointsKey,
Jeremy Roman04f27c372017-10-27 15:20:55383 std::make_unique<UserDataAdapter<storage::ExternalMountPoints>>(
avicb129c02017-05-03 06:49:29384 mount_points.get()));
[email protected]6ef0c3912013-01-25 22:46:34385 }
386
[email protected]cd501a72014-08-22 19:58:31387 return UserDataAdapter<storage::ExternalMountPoints>::Get(context,
388 kMountPointsKey);
[email protected]6ef0c3912013-01-25 22:46:34389#else
Ivan Kotenkov2c0d2bb32017-11-01 15:41:28390 return nullptr;
[email protected]6ef0c3912013-01-25 22:46:34391#endif
392}
393
msrameke169ccb2017-04-26 05:21:41394// static
395content::BrowsingDataRemover* content::BrowserContext::GetBrowsingDataRemover(
396 BrowserContext* context) {
397 DCHECK_CURRENTLY_ON(BrowserThread::UI);
398
399 if (!context->GetUserData(kBrowsingDataRemoverKey)) {
400 std::unique_ptr<BrowsingDataRemoverImpl> remover =
Jeremy Roman04f27c372017-10-27 15:20:55401 std::make_unique<BrowsingDataRemoverImpl>(context);
msrameke169ccb2017-04-26 05:21:41402 remover->SetEmbedderDelegate(context->GetBrowsingDataRemoverDelegate());
403 context->SetUserData(kBrowsingDataRemoverKey, std::move(remover));
404 }
405
406 return static_cast<BrowsingDataRemoverImpl*>(
407 context->GetUserData(kBrowsingDataRemoverKey));
408}
409
Andrey Lushnikovebff0442018-07-12 20:02:58410// static
411content::PermissionController* content::BrowserContext::GetPermissionController(
412 BrowserContext* context) {
413 DCHECK_CURRENTLY_ON(BrowserThread::UI);
414
415 if (!context->GetUserData(kPermissionControllerKey)) {
416 context->SetUserData(kPermissionControllerKey,
417 std::make_unique<PermissionControllerImpl>(context));
418 }
419
420 return static_cast<PermissionControllerImpl*>(
421 context->GetUserData(kPermissionControllerKey));
422}
423
[email protected]4c3a23582012-08-18 08:54:34424StoragePartition* BrowserContext::GetStoragePartition(
425 BrowserContext* browser_context,
Dan Elphick6c0d8492017-09-12 09:35:38426 SiteInstance* site_instance,
427 bool can_create) {
[email protected]1bc28312012-11-08 08:31:53428 std::string partition_domain;
429 std::string partition_name;
430 bool in_memory = false;
[email protected]4c3a23582012-08-18 08:54:34431
[email protected]4c3a23582012-08-18 08:54:34432 if (site_instance) {
[email protected]1bc28312012-11-08 08:31:53433 GetContentClient()->browser()->GetStoragePartitionConfigForSite(
Marijn Kruisselbrink83e5cdb2019-06-20 00:06:28434 browser_context, site_instance->GetSiteURL(), true, &partition_domain,
435 &partition_name, &in_memory);
[email protected]4c3a23582012-08-18 08:54:34436 }
437
Dan Elphick6c0d8492017-09-12 09:35:38438 return GetStoragePartitionFromConfig(browser_context, partition_domain,
439 partition_name, in_memory, can_create);
[email protected]4c3a23582012-08-18 08:54:34440}
441
[email protected]e94bbcb2012-09-07 05:33:57442StoragePartition* BrowserContext::GetStoragePartitionForSite(
443 BrowserContext* browser_context,
Dan Elphick6c0d8492017-09-12 09:35:38444 const GURL& site,
445 bool can_create) {
[email protected]1bc28312012-11-08 08:31:53446 std::string partition_domain;
447 std::string partition_name;
448 bool in_memory;
[email protected]e94bbcb2012-09-07 05:33:57449
[email protected]1bc28312012-11-08 08:31:53450 GetContentClient()->browser()->GetStoragePartitionConfigForSite(
[email protected]14acc642012-11-17 12:20:10451 browser_context, site, true, &partition_domain, &partition_name,
452 &in_memory);
[email protected]1bc28312012-11-08 08:31:53453
Dan Elphick6c0d8492017-09-12 09:35:38454 return GetStoragePartitionFromConfig(browser_context, partition_domain,
455 partition_name, in_memory, can_create);
[email protected]e94bbcb2012-09-07 05:33:57456}
457
[email protected]4c3a23582012-08-18 08:54:34458void BrowserContext::ForEachStoragePartition(
459 BrowserContext* browser_context,
460 const StoragePartitionCallback& callback) {
461 StoragePartitionImplMap* partition_map =
462 static_cast<StoragePartitionImplMap*>(
a.cavalcantiffab73762015-08-15 02:55:48463 browser_context->GetUserData(kStoragePartitionMapKeyName));
[email protected]4c3a23582012-08-18 08:54:34464 if (!partition_map)
465 return;
466
467 partition_map->ForEach(callback);
468}
469
470StoragePartition* BrowserContext::GetDefaultStoragePartition(
471 BrowserContext* browser_context) {
Ivan Kotenkov2c0d2bb32017-11-01 15:41:28472 return GetStoragePartition(browser_context, nullptr);
[email protected]55eb70e762012-02-20 17:38:39473}
474
tbarzicdb712682015-03-06 06:05:41475// static
[email protected]393b6cb2014-05-15 00:55:12476void BrowserContext::CreateMemoryBackedBlob(BrowserContext* browser_context,
Marijn Kruisselbrink604fd7e72017-10-26 16:31:05477 const char* data,
478 size_t length,
479 const std::string& content_type,
480 BlobCallback callback) {
mostynbfbcdc27a2015-03-13 17:58:52481 DCHECK_CURRENTLY_ON(BrowserThread::UI);
[email protected]393b6cb2014-05-15 00:55:12482
483 ChromeBlobStorageContext* blob_context =
484 ChromeBlobStorageContext::GetFor(browser_context);
Eric Seckler8652dcd52018-09-20 10:42:28485 base::PostTaskWithTraitsAndReplyWithResult(
486 FROM_HERE, {BrowserThread::IO},
Marijn Kruisselbrink604fd7e72017-10-26 16:31:05487 base::BindOnce(&ChromeBlobStorageContext::CreateMemoryBackedBlob,
488 base::WrapRefCounted(blob_context), data, length,
489 content_type),
490 std::move(callback));
[email protected]393b6cb2014-05-15 00:55:12491}
492
[email protected]66e53d0282014-08-07 10:04:35493// static
Xing Liu89860472018-02-09 20:07:02494BrowserContext::BlobContextGetter BrowserContext::GetBlobStorageContext(
495 BrowserContext* browser_context) {
496 DCHECK_CURRENTLY_ON(BrowserThread::UI);
497 scoped_refptr<ChromeBlobStorageContext> chrome_blob_context =
498 ChromeBlobStorageContext::GetFor(browser_context);
Jens Widell7ca8fb42018-02-21 14:11:54499 return base::BindRepeating(&BlobStorageContextGetterForBrowser,
500 chrome_blob_context);
Xing Liu89860472018-02-09 20:07:02501}
502
503// static
Marijn Kruisselbrink9e073a82018-06-18 17:48:58504blink::mojom::BlobPtr BrowserContext::GetBlobPtr(
505 BrowserContext* browser_context,
506 const std::string& uuid) {
507 DCHECK_CURRENTLY_ON(BrowserThread::UI);
508 return ChromeBlobStorageContext::GetBlobPtr(browser_context, uuid);
509}
510
511// static
[email protected]66e53d0282014-08-07 10:04:35512void BrowserContext::DeliverPushMessage(
513 BrowserContext* browser_context,
514 const GURL& origin,
avib7348942015-12-25 20:57:10515 int64_t service_worker_registration_id,
Rayan Kanso3b686202019-05-10 17:41:55516 const std::string& message_id,
Han Leonc1deace2018-08-03 03:52:53517 base::Optional<std::string> payload,
Mario Sanchez Pradad2990112019-05-07 08:13:49518 const base::Callback<void(blink::mojom::PushDeliveryStatus)>& callback) {
mostynbfbcdc27a2015-03-13 17:58:52519 DCHECK_CURRENTLY_ON(BrowserThread::UI);
harknessdd4d2b22016-01-27 19:26:43520 PushMessagingRouter::DeliverMessage(browser_context, origin,
Han Leonc1deace2018-08-03 03:52:53521 service_worker_registration_id,
Rayan Kanso3b686202019-05-10 17:41:55522 message_id, std::move(payload), callback);
[email protected]66e53d0282014-08-07 10:04:35523}
524
falken41f4175162014-10-29 07:03:41525// static
526void BrowserContext::NotifyWillBeDestroyed(BrowserContext* browser_context) {
Lukasz Anforowicz58d0dac2018-03-23 15:48:10527 // Make sure NotifyWillBeDestroyed is idempotent. This helps facilitate the
528 // pattern where NotifyWillBeDestroyed is called from *both*
Kent Tamura21d1de62018-12-10 04:45:20529 // ShellBrowserContext and its derived classes (e.g. WebTestBrowserContext).
Lukasz Anforowicz58d0dac2018-03-23 15:48:10530 if (browser_context->was_notify_will_be_destroyed_called_)
531 return;
532 browser_context->was_notify_will_be_destroyed_called_ = true;
533
Ken Rockot99c5bc742018-07-12 15:36:56534 // Subclasses of BrowserContext may expect there to be no more
535 // RenderProcessHosts using them by the time this function returns. We
536 // therefore explicitly tear down embedded Content Service instances now to
537 // ensure that all their WebContents (and therefore RPHs) are torn down too.
538 browser_context->RemoveUserData(kContentServiceDelegateKey);
539
Ken Rockotad3c7582018-12-12 17:04:14540 // Tear down all running service instances which were started on behalf of
541 // this BrowserContext. Note that we leave the UserData itself in place
542 // because it's possible for someone to call
543 // |GetServiceManagerConnectionFor()| between now and actual BrowserContext
544 // destruction.
545 BrowserContextServiceManagerConnectionHolder* connection_holder =
546 static_cast<BrowserContextServiceManagerConnectionHolder*>(
547 browser_context->GetUserData(kServiceManagerConnection));
548 if (connection_holder)
549 connection_holder->DestroyRunningServices();
550
falken41f4175162014-10-29 07:03:41551 // Service Workers must shutdown before the browser context is destroyed,
552 // since they keep render process hosts alive and the codebase assumes that
553 // render process hosts die before their profile (browser context) dies.
554 ForEachStoragePartition(browser_context,
555 base::Bind(ShutdownServiceWorkerContext));
falken04a6912a2016-09-23 21:06:29556
557 // Shared workers also keep render process hosts alive, and are expected to
Darin Fisherd3768b2f62017-10-07 01:00:16558 // return ref counts to 0 after documents close. However, to ensure that
559 // hosts are destructed now, forcibly release their ref counts here.
falken04a6912a2016-09-23 21:06:29560 for (RenderProcessHost::iterator host_iterator =
561 RenderProcessHost::AllHostsIterator();
562 !host_iterator.IsAtEnd(); host_iterator.Advance()) {
563 RenderProcessHost* host = host_iterator.GetCurrentValue();
Benoit Lizeab08362c2017-07-19 14:50:54564 if (host->GetBrowserContext() == browser_context) {
565 // This will also clean up spare RPH references.
Yutaka Hirano09a9afb92017-08-16 09:11:45566 host->DisableKeepAliveRefCount();
Benoit Lizeab08362c2017-07-19 14:50:54567 }
falken04a6912a2016-09-23 21:06:29568 }
Alex Moshchuk99b795422019-03-07 00:27:32569
Aaron Colwell67f93006c2019-04-01 22:45:28570 // Clean up any isolated origins associated with this BrowserContext. This
Alex Moshchuk99b795422019-03-07 00:27:32571 // should be safe now that all RenderProcessHosts are destroyed, since future
572 // navigations or security decisions shouldn't ever need to consult these
Aaron Colwell67f93006c2019-04-01 22:45:28573 // isolated origins.
Alex Moshchuk99b795422019-03-07 00:27:32574 ChildProcessSecurityPolicyImpl* policy =
575 ChildProcessSecurityPolicyImpl::GetInstance();
Aaron Colwell67f93006c2019-04-01 22:45:28576 policy->RemoveIsolatedOriginsForBrowserContext(*browser_context);
falken41f4175162014-10-29 07:03:41577}
578
[email protected]314c3e22012-02-21 03:57:42579void BrowserContext::EnsureResourceContextInitialized(BrowserContext* context) {
[email protected]7e26ac92012-02-27 20:15:05580 // This will be enough to tickle initialization of BrowserContext if
581 // necessary, which initializes ResourceContext. The reason we don't call
[email protected]4c3a23582012-08-18 08:54:34582 // ResourceContext::InitializeResourceContext() directly here is that
583 // ResourceContext initialization may call back into BrowserContext
584 // and when that call returns it'll end rewriting its UserData map. It will
585 // end up rewriting the same value but this still causes a race condition.
586 //
587 // See http://crbug.com/115678.
588 GetDefaultStoragePartition(context);
[email protected]55eb70e762012-02-20 17:38:39589}
590
[email protected]6e2d3d22012-02-24 18:10:36591void BrowserContext::SaveSessionState(BrowserContext* browser_context) {
[email protected]b1b502e2012-09-16 07:31:43592 StoragePartition* storage_partition =
593 BrowserContext::GetDefaultStoragePartition(browser_context);
[email protected]6e2d3d22012-02-24 18:10:36594
Joshua Bell607cb142017-07-24 19:17:16595 storage::DatabaseTracker* database_tracker =
596 storage_partition->GetDatabaseTracker();
597 database_tracker->task_runner()->PostTask(
598 FROM_HERE,
599 base::BindOnce(&storage::DatabaseTracker::SetForceKeepSessionState,
kylecharda69d882017-10-04 05:49:52600 base::WrapRefCounted(database_tracker)));
Joshua Bell607cb142017-07-24 19:17:16601
Gabriel Charette2983181c2018-03-28 17:01:09602 if (BrowserThread::IsThreadInitialized(BrowserThread::IO)) {
John Abd-El-Malekb175a612018-12-03 20:11:58603 scoped_refptr<net::URLRequestContextGetter> context_getter;
John Abd-El-Malekb175a612018-12-03 20:11:58604 if (!base::FeatureList::IsEnabled(network::features::kNetworkService))
605 context_getter = storage_partition->GetURLRequestContext();
Eric Seckler8652dcd52018-09-20 10:42:28606 base::PostTaskWithTraits(
607 FROM_HERE, {BrowserThread::IO},
John Abd-El-Malekb175a612018-12-03 20:11:58608 base::BindOnce(&SaveSessionStateOnIOThread, context_getter,
609 static_cast<AppCacheServiceImpl*>(
610 storage_partition->GetAppCacheService())));
[email protected]6e2d3d22012-02-24 18:10:36611 }
612
Clark DuVall385b5a52018-06-14 21:33:32613 storage_partition->GetCookieManagerForBrowserProcess()
614 ->SetForceKeepSessionState();
615
[email protected]5f2aa722013-08-07 16:59:41616 DOMStorageContextWrapper* dom_storage_context_proxy =
617 static_cast<DOMStorageContextWrapper*>(
[email protected]b1b502e2012-09-16 07:31:43618 storage_partition->GetDOMStorageContext());
[email protected]5f2aa722013-08-07 16:59:41619 dom_storage_context_proxy->SetForceKeepSessionState();
[email protected]735e20c2012-03-20 01:16:59620
Daniel Murphyd9a41e7b2019-05-09 17:56:54621 scoped_refptr<IndexedDBContext> indexed_db_context =
622 storage_partition->GetIndexedDBContext();
Victor Costan4b8909d52019-05-28 19:25:51623 IndexedDBContext* const indexed_db_context_ptr = indexed_db_context.get();
624 indexed_db_context_ptr->TaskRunner()->PostTask(
625 FROM_HERE, base::BindOnce(&SaveSessionStateOnIndexedDBThread,
626 std::move(indexed_db_context)));
[email protected]6e2d3d22012-02-24 18:10:36627}
628
ttr31481dc54b2015-08-06 20:11:26629void BrowserContext::SetDownloadManagerForTesting(
630 BrowserContext* browser_context,
avi1ed4a4372017-04-25 05:39:41631 std::unique_ptr<content::DownloadManager> download_manager) {
632 SetDownloadManager(browser_context, std::move(download_manager));
ttr31481dc54b2015-08-06 20:11:26633}
634
rockot963ad3e82016-04-13 16:33:23635// static
Marijn Kruisselbrink83e5cdb2019-06-20 00:06:28636void BrowserContext::Initialize(BrowserContext* browser_context,
637 const base::FilePath& path) {
Ken Rockotda7edc62018-11-10 01:01:45638 const base::Token new_group = base::Token::CreateRandom();
639 ServiceInstanceGroupHolder* holder = static_cast<ServiceInstanceGroupHolder*>(
640 browser_context->GetUserData(kServiceInstanceGroup));
641 if (holder) {
642 file::ForgetServiceInstanceGroupUserDirAssociation(
643 holder->instance_group());
ben6c85c4492016-06-16 20:40:51644 }
Ken Rockotda7edc62018-11-10 01:01:45645 file::AssociateServiceInstanceGroupWithUserDir(new_group, path);
646 RemoveBrowserContextFromInstanceGroupMap(browser_context);
647 GetTokenToContextMap()[new_group] = browser_context;
avi1ed4a4372017-04-25 05:39:41648 browser_context->SetUserData(
Ken Rockotda7edc62018-11-10 01:01:45649 kServiceInstanceGroup,
650 std::make_unique<ServiceInstanceGroupHolder>(new_group));
rockot963ad3e82016-04-13 16:33:23651
Ken Rockotfd03e682019-06-20 21:13:54652 auto* system_connector = GetSystemConnector();
653 if (system_connector && base::ThreadTaskRunnerHandle::IsSet()) {
rockot963ad3e82016-04-13 16:33:23654 // NOTE: Many unit tests create a TestBrowserContext without initializing
bend32292b2016-10-07 00:21:58655 // Mojo or the global service manager connection.
rockot963ad3e82016-04-13 16:33:23656
Ken Rockot40a1df792019-05-08 22:15:52657 mojo::PendingRemote<service_manager::mojom::Service> service;
658 auto service_receiver = service.InitWithNewPipeAndPassReceiver();
rockot963ad3e82016-04-13 16:33:23659
Ken Rockot40a1df792019-05-08 22:15:52660 mojo::Remote<service_manager::mojom::ProcessMetadata> metadata;
Ken Rockota86fa542018-11-13 21:47:13661 service_manager::Identity identity(mojom::kBrowserServiceName, new_group,
662 base::Token{},
663 base::Token::CreateRandom());
Ken Rockotfd03e682019-06-20 21:13:54664 system_connector->RegisterServiceInstance(
Ken Rockot40a1df792019-05-08 22:15:52665 identity, std::move(service), metadata.BindNewPipeAndPassReceiver());
666 metadata->SetPID(base::GetCurrentProcId());
rockot963ad3e82016-04-13 16:33:23667
bend32292b2016-10-07 00:21:58668 BrowserContextServiceManagerConnectionHolder* connection_holder =
669 new BrowserContextServiceManagerConnectionHolder(
Ken Rockot40a1df792019-05-08 22:15:52670 browser_context, std::move(service_receiver),
Ken Rockot499519e2018-12-04 06:57:44671 base::SequencedTaskRunnerHandle::Get());
avi1ed4a4372017-04-25 05:39:41672 browser_context->SetUserData(kServiceManagerConnection,
673 base::WrapUnique(connection_holder));
bend32292b2016-10-07 00:21:58674 ServiceManagerConnection* connection =
675 connection_holder->service_manager_connection();
rockot963ad3e82016-04-13 16:33:23676
Ken Rockot84f58fd2018-06-22 21:54:14677 browser_context->SetUserData(
678 kContentServiceDelegateKey,
679 std::make_unique<ContentServiceDelegateHolder>(browser_context));
680
Ken Rockot499519e2018-12-04 06:57:44681 scoped_refptr<FileServiceIOThreadState> file_service_io_thread_state =
682 base::MakeRefCounted<FileServiceIOThreadState>(
683 base::CreateSingleThreadTaskRunnerWithTraits({BrowserThread::IO}));
684 connection->AddServiceRequestHandler(
685 file::mojom::kServiceName,
686 base::BindRepeating(
687 [](scoped_refptr<FileServiceIOThreadState> io_thread_state,
688 service_manager::mojom::ServiceRequest request) {
689 io_thread_state->StartOnIOThread(std::move(request));
690 },
691 file_service_io_thread_state));
692
693 browser_context->SetUserData(kFileServiceKey,
694 std::make_unique<FileServiceHolder>(
695 std::move(file_service_io_thread_state)));
tibellab3d36b2017-03-10 02:57:25696
Ken Rockotc7a279c2017-05-04 23:51:45697 RegisterCommonBrowserInterfaces(connection);
sammc030f5012017-03-13 02:28:45698 connection->Start();
rockot963ad3e82016-04-13 16:33:23699 }
erge69130f52016-03-02 00:13:28700}
701
rockot963ad3e82016-04-13 16:33:23702// static
Ken Rockotda7edc62018-11-10 01:01:45703const base::Token& BrowserContext::GetServiceInstanceGroupFor(
bencccfe2a2016-03-05 16:54:14704 BrowserContext* browser_context) {
Ken Rockotda7edc62018-11-10 01:01:45705 ServiceInstanceGroupHolder* holder = static_cast<ServiceInstanceGroupHolder*>(
706 browser_context->GetUserData(kServiceInstanceGroup));
707 CHECK(holder) << "Attempting to get the instance group for a BrowserContext "
708 << "that was never Initialized().";
709 return holder->instance_group();
erge69130f52016-03-02 00:13:28710}
711
rockot963ad3e82016-04-13 16:33:23712// static
Ken Rockotda7edc62018-11-10 01:01:45713BrowserContext* BrowserContext::GetBrowserContextForServiceInstanceGroup(
714 const base::Token& instance_group) {
715 auto it = GetTokenToContextMap().find(instance_group);
716 return it != GetTokenToContextMap().end() ? it->second : nullptr;
ben6c85c4492016-06-16 20:40:51717}
718
719// static
rockot400ea35b2016-10-15 19:15:32720service_manager::Connector* BrowserContext::GetConnectorFor(
rockot963ad3e82016-04-13 16:33:23721 BrowserContext* browser_context) {
bend32292b2016-10-07 00:21:58722 ServiceManagerConnection* connection =
723 GetServiceManagerConnectionFor(browser_context);
ben5be0b9132016-08-03 00:17:18724 return connection ? connection->GetConnector() : nullptr;
725}
726
727// static
bend32292b2016-10-07 00:21:58728ServiceManagerConnection* BrowserContext::GetServiceManagerConnectionFor(
ben5be0b9132016-08-03 00:17:18729 BrowserContext* browser_context) {
bend32292b2016-10-07 00:21:58730 BrowserContextServiceManagerConnectionHolder* connection_holder =
731 static_cast<BrowserContextServiceManagerConnectionHolder*>(
732 browser_context->GetUserData(kServiceManagerConnection));
733 return connection_holder ? connection_holder->service_manager_connection()
734 : nullptr;
rockot963ad3e82016-04-13 16:33:23735}
736
mmenkec0b2b8b12017-04-21 16:27:52737BrowserContext::BrowserContext()
Takashi Toyoshima0190a3b2019-01-21 07:39:06738 : unique_id_(base::UnguessableToken::Create().ToString()) {}
mmenkec0b2b8b12017-04-21 16:27:52739
[email protected]55eb70e762012-02-20 17:38:39740BrowserContext::~BrowserContext() {
Ken Rockotda7edc62018-11-10 01:01:45741 CHECK(GetUserData(kServiceInstanceGroup))
erge69130f52016-03-02 00:13:28742 << "Attempting to destroy a BrowserContext that never called "
743 << "Initialize()";
744
kinukof6ed359c2016-07-26 13:27:21745 DCHECK(!GetUserData(kStoragePartitionMapKeyName))
746 << "StoragePartitionMap is not shut down properly";
747
Lukasz Anforowicz58d0dac2018-03-23 15:48:10748 DCHECK(was_notify_will_be_destroyed_called_);
749
Ken Rockotda7edc62018-11-10 01:01:45750 RemoveBrowserContextFromInstanceGroupMap(this);
ben6c85c4492016-06-16 20:40:51751
[email protected]b441a8492012-06-06 14:55:57752 if (GetUserData(kDownloadManagerKeyName))
753 GetDownloadManager(this)->Shutdown();
[email protected]55eb70e762012-02-20 17:38:39754}
755
kinukof6ed359c2016-07-26 13:27:21756void BrowserContext::ShutdownStoragePartitions() {
757 if (GetUserData(kStoragePartitionMapKeyName))
758 RemoveUserData(kStoragePartitionMapKeyName);
759}
760
mmenkec0b2b8b12017-04-21 16:27:52761std::string BrowserContext::GetMediaDeviceIDSalt() {
Andrey Lushnikovd39d9062018-04-24 17:33:35762 return unique_id_;
mmenkec0b2b8b12017-04-21 16:27:52763}
764
765// static
766std::string BrowserContext::CreateRandomMediaDeviceIDSalt() {
Andrey Lushnikovd39d9062018-04-24 17:33:35767 return base::UnguessableToken::Create().ToString();
768}
769
Ken Rockot435132692018-11-20 21:46:10770std::unique_ptr<service_manager::Service> BrowserContext::HandleServiceRequest(
771 const std::string& service_name,
772 service_manager::mojom::ServiceRequest request) {
773 return nullptr;
774}
775
Lucas Furukawa Gadanif45223862019-06-21 23:11:14776const std::string& BrowserContext::UniqueId() {
Andrey Lushnikovd39d9062018-04-24 17:33:35777 return unique_id_;
mmenkec0b2b8b12017-04-21 16:27:52778}
779
Chris Cunninghama5b38012017-10-28 07:27:18780media::VideoDecodePerfHistory* BrowserContext::GetVideoDecodePerfHistory() {
781 media::VideoDecodePerfHistory* decode_history =
782 static_cast<media::VideoDecodePerfHistory*>(
783 GetUserData(kVideoDecodePerfHistoryId));
784
785 // Lazily created. Note, this does not trigger loading the DB from disk. That
786 // occurs later upon first VideoDecodePerfHistory API request that requires DB
787 // access. DB operations will not block the UI thread.
788 if (!decode_history) {
Chris Cunningham4507edfa2019-05-30 20:15:54789 const char kUseInMemoryDBParamName[] = "db_in_memory";
790 const bool kUseInMemoryDBDefault = false;
791 bool use_in_memory_db = base::GetFieldTrialParamByFeatureAsBool(
792 media::kMediaCapabilitiesWithParameters, kUseInMemoryDBParamName,
793 kUseInMemoryDBDefault);
794
795 std::unique_ptr<media::VideoDecodeStatsDB> stats_db;
796 if (use_in_memory_db) {
797 stats_db =
798 std::make_unique<media::InMemoryVideoDecodeStatsDBImpl>(nullptr);
799 } else {
800 stats_db = media::VideoDecodeStatsDBImpl::Create(
801 GetPath().Append(FILE_PATH_LITERAL("VideoDecodeStats")));
802 }
803
[email protected]3dcea37a2019-02-11 19:46:51804 auto new_decode_history = std::make_unique<media::VideoDecodePerfHistory>(
805 std::move(stats_db), BrowserFeatureProvider::GetFactoryCB());
chcunningham06b81092018-09-24 20:20:51806 decode_history = new_decode_history.get();
807
808 SetUserData(kVideoDecodePerfHistoryId, std::move(new_decode_history));
Chris Cunninghama5b38012017-10-28 07:27:18809 }
810
811 return decode_history;
812}
813
Min Qind3ff2ed62018-07-21 06:46:59814download::InProgressDownloadManager*
815BrowserContext::RetriveInProgressDownloadManager() {
816 return nullptr;
817}
818
Takashi Toyoshima0190a3b2019-01-21 07:39:06819void BrowserContext::SetCorsOriginAccessListForOrigin(
820 const url::Origin& source_origin,
821 std::vector<network::mojom::CorsOriginPatternPtr> allow_patterns,
822 std::vector<network::mojom::CorsOriginPatternPtr> block_patterns,
823 base::OnceClosure closure) {
824 NOTREACHED() << "Sub-classes should implement this method to communicate "
825 "with NetworkService to bypass CORS checks.";
826}
827
Lucas Furukawa Gadani0a70be92019-06-28 17:31:26828SharedCorsOriginAccessList* BrowserContext::GetSharedCorsOriginAccessList() {
Takashi Toyoshima0190a3b2019-01-21 07:39:06829 // Need to return a valid instance regardless of CORS bypass supports.
830 static const base::NoDestructor<scoped_refptr<SharedCorsOriginAccessList>>
831 empty_list(SharedCorsOriginAccessList::Create());
832 return empty_list->get();
833}
834
Sam Goto0230b712019-05-14 00:30:51835SmsService* BrowserContext::GetSmsService() {
836 return nullptr;
837}
838
Marijn Kruisselbrink83e5cdb2019-06-20 00:06:28839NativeFileSystemPermissionContext*
840BrowserContext::GetNativeFileSystemPermissionContext() {
841 return nullptr;
842}
843
Rayan Kanso03a847b2019-06-27 21:00:09844ContentIndexProvider* BrowserContext::GetContentIndexProvider() {
845 return nullptr;
846}
847
[email protected]55eb70e762012-02-20 17:38:39848} // namespace content