blob: bd5d10b966a77b6f602a54025dd9eaf9be72b6da [file] [log] [blame]
[email protected]55eb70e762012-02-20 17:38:391// Copyright (c) 2012 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include "content/public/browser/browser_context.h"
6
avib7348942015-12-25 20:57:107#include <stddef.h>
8#include <stdint.h>
avi1ed4a4372017-04-25 05:39:419
erge69130f52016-03-02 00:13:2810#include <algorithm>
11#include <limits>
rockot963ad3e82016-04-13 16:33:2312#include <memory>
Takuto Ikuta8332bf9d2019-01-05 03:58:0013#include <unordered_set>
dcheng36b6aec92015-12-26 06:16:3614#include <utility>
rockot963ad3e82016-04-13 16:33:2315#include <vector>
avib7348942015-12-25 20:57:1016
mmenkec0b2b8b12017-04-21 16:27:5217#include "base/base64.h"
Takashi Toyoshimaa12ecf42018-09-25 07:46:0118#include "base/bind.h"
rockot963ad3e82016-04-13 16:33:2319#include "base/command_line.h"
Takashi Toyoshimaa12ecf42018-09-25 07:46:0120#include "base/feature_list.h"
Chris Cunninghama5b38012017-10-28 07:27:1821#include "base/files/file_path.h"
bencccfe2a2016-03-05 16:54:1422#include "base/guid.h"
erge69130f52016-03-02 00:13:2823#include "base/lazy_instance.h"
mmenkec0b2b8b12017-04-21 16:27:5224#include "base/logging.h"
rockot963ad3e82016-04-13 16:33:2325#include "base/macros.h"
avi1ed4a4372017-04-25 05:39:4126#include "base/memory/ptr_util.h"
Ken Rockot435132692018-11-20 21:46:1027#include "base/memory/weak_ptr.h"
Chris Cunningham4507edfa2019-05-30 20:15:5428#include "base/metrics/field_trial_params.h"
Ken Rockotda7edc62018-11-10 01:01:4529#include "base/no_destructor.h"
erge69130f52016-03-02 00:13:2830#include "base/rand_util.h"
Takashi Toyoshima621e2bf2018-09-18 08:05:1631#include "base/supports_user_data.h"
Gabriel Charette44db1422018-08-06 11:19:3332#include "base/task/post_task.h"
Ken Rockot84f58fd2018-06-22 21:54:1433#include "base/threading/sequenced_task_runner_handle.h"
ben21a34c252016-06-29 22:24:3734#include "base/threading/thread_task_runner_handle.h"
Andrey Lushnikovd39d9062018-04-24 17:33:3535#include "base/unguessable_token.h"
avib7348942015-12-25 20:57:1036#include "build/build_config.h"
dmurph7ac019a2016-05-13 00:13:1737#include "content/browser/blob_storage/chrome_blob_storage_context.h"
msrameke169ccb2017-04-26 05:21:4138#include "content/browser/browsing_data/browsing_data_remover_impl.h"
Alex Moshchuk99b795422019-03-07 00:27:3239#include "content/browser/child_process_security_policy_impl.h"
Ken Rockot84f58fd2018-06-22 21:54:1440#include "content/browser/content_service_delegate_impl.h"
[email protected]b441a8492012-06-06 14:55:5741#include "content/browser/download/download_manager_impl.h"
[email protected]678c0362012-12-05 08:02:4442#include "content/browser/loader/resource_dispatcher_host_impl.h"
[email protected]3dcea37a2019-02-11 19:46:5143#include "content/browser/media/browser_feature_provider.h"
Andrey Lushnikovebff0442018-07-12 20:02:5844#include "content/browser/permissions/permission_controller_impl.h"
mvanouwerkerk17205ea2014-11-07 17:30:1545#include "content/browser/push_messaging/push_messaging_router.h"
Ken Rockotc7a279c2017-05-04 23:51:4546#include "content/browser/service_manager/common_browser_interfaces.h"
[email protected]4c3a23582012-08-18 08:54:3447#include "content/browser/storage_partition_impl_map.h"
[email protected]d7c7c98a2012-07-12 21:27:4448#include "content/common/child_process_host_impl.h"
[email protected]393b6cb2014-05-15 00:55:1249#include "content/public/browser/blob_handle.h"
Eric Seckler8652dcd52018-09-20 10:42:2850#include "content/public/browser/browser_task_traits.h"
[email protected]55eb70e762012-02-20 17:38:3951#include "content/public/browser/browser_thread.h"
[email protected]b441a8492012-06-06 14:55:5752#include "content/public/browser/content_browser_client.h"
Daniel Murphyd9a41e7b2019-05-09 17:56:5453#include "content/public/browser/indexed_db_context.h"
falken04a6912a2016-09-23 21:06:2954#include "content/public/browser/render_process_host.h"
Takashi Toyoshima0190a3b2019-01-21 07:39:0655#include "content/public/browser/shared_cors_origin_access_list.h"
[email protected]536fd0b2013-03-14 17:41:5756#include "content/public/browser/site_instance.h"
rockot963ad3e82016-04-13 16:33:2357#include "content/public/common/content_switches.h"
bend32292b2016-10-07 00:21:5858#include "content/public/common/service_manager_connection.h"
ben51bb6c62016-11-17 20:15:5759#include "content/public/common/service_names.mojom.h"
Chris Cunningham4507edfa2019-05-30 20:15:5460#include "media/base/media_switches.h"
61#include "media/capabilities/in_memory_video_decode_stats_db_impl.h"
Chris Cunningham9e669472017-11-15 21:03:1162#include "media/capabilities/video_decode_stats_db_impl.h"
Chris Cunninghama5b38012017-10-28 07:27:1863#include "media/mojo/services/video_decode_perf_history.h"
Ken Rockot40a1df792019-05-08 22:15:5264#include "mojo/public/cpp/bindings/remote.h"
[email protected]4d7c4ef2012-03-16 01:47:1265#include "net/cookies/cookie_store.h"
[email protected]6e2d3d22012-02-24 18:10:3666#include "net/url_request/url_request_context.h"
[email protected]6939075a2012-08-28 08:35:5367#include "net/url_request/url_request_context_getter.h"
Ken Rockot84f58fd2018-06-22 21:54:1468#include "services/content/public/mojom/constants.mojom.h"
69#include "services/content/service.h"
ben768c8dc2016-08-12 00:26:5070#include "services/file/file_service.h"
Ken Rockot21142de2018-02-10 01:45:3071#include "services/file/public/mojom/constants.mojom.h"
ben768c8dc2016-08-12 00:26:5072#include "services/file/user_id_map.h"
Takashi Toyoshimaa12ecf42018-09-25 07:46:0173#include "services/network/public/cpp/features.h"
rockot734fb662016-10-15 16:41:3074#include "services/service_manager/public/cpp/connector.h"
Ken Rockot435132692018-11-20 21:46:1075#include "services/service_manager/public/cpp/service.h"
Ken Rockot543f5e32018-02-04 02:13:5076#include "services/service_manager/public/mojom/service.mojom.h"
Xing Liu89860472018-02-09 20:07:0277#include "storage/browser/blob/blob_storage_context.h"
pilgrime92c5fcd2014-09-10 23:31:2378#include "storage/browser/database/database_tracker.h"
79#include "storage/browser/fileapi/external_mount_points.h"
[email protected]55eb70e762012-02-20 17:38:3980
[email protected]314c3e22012-02-21 03:57:4281using base::UserDataAdapter;
[email protected]55eb70e762012-02-20 17:38:3982
[email protected]55eb70e762012-02-20 17:38:3983namespace content {
84
[email protected]735e20c2012-03-20 01:16:5985namespace {
86
Ken Rockotda7edc62018-11-10 01:01:4587using TokenToContextMap = std::map<base::Token, BrowserContext*>;
88TokenToContextMap& GetTokenToContextMap() {
89 static base::NoDestructor<TokenToContextMap> map;
90 return *map;
91}
ben6c85c4492016-06-16 20:40:5192
Ken Rockotda7edc62018-11-10 01:01:4593class ServiceInstanceGroupHolder : public base::SupportsUserData::Data {
ben6c85c4492016-06-16 20:40:5194 public:
Ken Rockotda7edc62018-11-10 01:01:4595 explicit ServiceInstanceGroupHolder(const base::Token& instance_group)
96 : instance_group_(instance_group) {}
97 ~ServiceInstanceGroupHolder() override {}
ben6c85c4492016-06-16 20:40:5198
Ken Rockotda7edc62018-11-10 01:01:4599 const base::Token& instance_group() const { return instance_group_; }
ben6c85c4492016-06-16 20:40:51100
101 private:
Ken Rockotda7edc62018-11-10 01:01:45102 base::Token instance_group_;
ben6c85c4492016-06-16 20:40:51103
Ken Rockotda7edc62018-11-10 01:01:45104 DISALLOW_COPY_AND_ASSIGN(ServiceInstanceGroupHolder);
ben6c85c4492016-06-16 20:40:51105};
erge69130f52016-03-02 00:13:28106
Ken Rockot499519e2018-12-04 06:57:44107// The file service runs on the IO thread but we want to limit its lifetime to
108// that of the BrowserContext which creates it. This provides thread-safe access
109// to the relevant state on the IO thread.
110class FileServiceIOThreadState
111 : public base::RefCountedThreadSafe<FileServiceIOThreadState> {
112 public:
113 explicit FileServiceIOThreadState(
114 scoped_refptr<base::SingleThreadTaskRunner> io_task_runner)
115 : io_task_runner_(std::move(io_task_runner)) {}
116
117 void StartOnIOThread(service_manager::mojom::ServiceRequest request) {
118 DCHECK(io_task_runner_->RunsTasksInCurrentSequence());
119 file_service_ = std::make_unique<file::FileService>(std::move(request));
120 }
121
122 void ShutDown() {
123 io_task_runner_->PostTask(
124 FROM_HERE,
125 base::BindOnce(&FileServiceIOThreadState::ShutDownOnIOThread, this));
126 }
127
128 private:
129 friend class base::RefCountedThreadSafe<FileServiceIOThreadState>;
130
131 ~FileServiceIOThreadState() { DCHECK(!file_service_); }
132
133 void ShutDownOnIOThread() { file_service_.reset(); }
134
135 const scoped_refptr<base::SingleThreadTaskRunner> io_task_runner_;
136 std::unique_ptr<file::FileService> file_service_;
137
138 DISALLOW_COPY_AND_ASSIGN(FileServiceIOThreadState);
139};
140
141class FileServiceHolder : public base::SupportsUserData::Data {
142 public:
143 explicit FileServiceHolder(scoped_refptr<FileServiceIOThreadState> state)
144 : state_(std::move(state)) {}
145 ~FileServiceHolder() override { state_->ShutDown(); }
146
147 private:
148 const scoped_refptr<FileServiceIOThreadState> state_;
149
150 DISALLOW_COPY_AND_ASSIGN(FileServiceHolder);
151};
152
Ken Rockot84f58fd2018-06-22 21:54:14153class ContentServiceDelegateHolder : public base::SupportsUserData::Data {
154 public:
155 explicit ContentServiceDelegateHolder(BrowserContext* browser_context)
156 : delegate_(browser_context) {}
157 ~ContentServiceDelegateHolder() override = default;
158
159 ContentServiceDelegateImpl* delegate() { return &delegate_; }
160
161 private:
162 ContentServiceDelegateImpl delegate_;
163
164 DISALLOW_COPY_AND_ASSIGN(ContentServiceDelegateHolder);
165};
166
[email protected]e0ce8a1e2012-09-18 10:26:36167// Key names on BrowserContext.
msrameke169ccb2017-04-26 05:21:41168const char kBrowsingDataRemoverKey[] = "browsing-data-remover";
Ken Rockot84f58fd2018-06-22 21:54:14169const char kContentServiceDelegateKey[] = "content-service-delegate";
Ken Rockot499519e2018-12-04 06:57:44170const char kFileServiceKey[] = "file-service";
[email protected]6ef0c3912013-01-25 22:46:34171const char kDownloadManagerKeyName[] = "download_manager";
Takashi Toyoshima621e2bf2018-09-18 08:05:16172const char kPermissionControllerKey[] = "permission-controller";
bend32292b2016-10-07 00:21:58173const char kServiceManagerConnection[] = "service-manager-connection";
Ken Rockotda7edc62018-11-10 01:01:45174const char kServiceInstanceGroup[] = "service-instance-group";
rockot963ad3e82016-04-13 16:33:23175const char kStoragePartitionMapKeyName[] = "content_storage_partition_map";
Chris Cunninghama5b38012017-10-28 07:27:18176const char kVideoDecodePerfHistoryId[] = "video-decode-perf-history";
erge69130f52016-03-02 00:13:28177
[email protected]9afc14e22013-09-25 22:34:14178#if defined(OS_CHROMEOS)
179const char kMountPointsKey[] = "mount_points";
180#endif // defined(OS_CHROMEOS)
181
Ken Rockotda7edc62018-11-10 01:01:45182void RemoveBrowserContextFromInstanceGroupMap(BrowserContext* browser_context) {
183 ServiceInstanceGroupHolder* holder = static_cast<ServiceInstanceGroupHolder*>(
184 browser_context->GetUserData(kServiceInstanceGroup));
ben6c85c4492016-06-16 20:40:51185 if (holder) {
Ken Rockotda7edc62018-11-10 01:01:45186 auto it = GetTokenToContextMap().find(holder->instance_group());
187 if (it != GetTokenToContextMap().end())
188 GetTokenToContextMap().erase(it);
ben6c85c4492016-06-16 20:40:51189 }
190}
191
[email protected]14acc642012-11-17 12:20:10192StoragePartitionImplMap* GetStoragePartitionMap(
193 BrowserContext* browser_context) {
[email protected]4c3a23582012-08-18 08:54:34194 StoragePartitionImplMap* partition_map =
195 static_cast<StoragePartitionImplMap*>(
a.cavalcantiffab73762015-08-15 02:55:48196 browser_context->GetUserData(kStoragePartitionMapKeyName));
[email protected]d7c7c98a2012-07-12 21:27:44197 if (!partition_map) {
avi1ed4a4372017-04-25 05:39:41198 auto partition_map_owned =
Jeremy Roman04f27c372017-10-27 15:20:55199 std::make_unique<StoragePartitionImplMap>(browser_context);
avi1ed4a4372017-04-25 05:39:41200 partition_map = partition_map_owned.get();
201 browser_context->SetUserData(kStoragePartitionMapKeyName,
202 std::move(partition_map_owned));
[email protected]d7c7c98a2012-07-12 21:27:44203 }
[email protected]14acc642012-11-17 12:20:10204 return partition_map;
205}
206
207StoragePartition* GetStoragePartitionFromConfig(
208 BrowserContext* browser_context,
209 const std::string& partition_domain,
210 const std::string& partition_name,
Dan Elphick6c0d8492017-09-12 09:35:38211 bool in_memory,
212 bool can_create) {
[email protected]14acc642012-11-17 12:20:10213 StoragePartitionImplMap* partition_map =
214 GetStoragePartitionMap(browser_context);
[email protected]d7c7c98a2012-07-12 21:27:44215
[email protected]1bc28312012-11-08 08:31:53216 if (browser_context->IsOffTheRecord())
217 in_memory = true;
218
Dan Elphick6c0d8492017-09-12 09:35:38219 return partition_map->Get(partition_domain, partition_name, in_memory,
220 can_create);
[email protected]d1198fd2012-08-13 22:50:19221}
222
[email protected]6939075a2012-08-28 08:35:53223void SaveSessionStateOnIOThread(
224 const scoped_refptr<net::URLRequestContextGetter>& context_getter,
[email protected]98d6d4562014-06-25 20:57:55225 AppCacheServiceImpl* appcache_service) {
[email protected]6939075a2012-08-28 08:35:53226 appcache_service->set_force_keep_session_state();
[email protected]6e2d3d22012-02-24 18:10:36227}
228
[email protected]89acda82013-06-25 20:52:50229void SaveSessionStateOnIndexedDBThread(
Daniel Murphyd9a41e7b2019-05-09 17:56:54230 scoped_refptr<IndexedDBContext> indexed_db_context) {
[email protected]bf510ed2012-06-05 08:31:43231 indexed_db_context->SetForceKeepSessionState();
[email protected]6e2d3d22012-02-24 18:10:36232}
233
falken41f4175162014-10-29 07:03:41234void ShutdownServiceWorkerContext(StoragePartition* partition) {
235 ServiceWorkerContextWrapper* wrapper =
236 static_cast<ServiceWorkerContextWrapper*>(
237 partition->GetServiceWorkerContext());
238 wrapper->process_manager()->Shutdown();
239}
240
avi1ed4a4372017-04-25 05:39:41241void SetDownloadManager(
242 BrowserContext* context,
243 std::unique_ptr<content::DownloadManager> download_manager) {
ttr31481dc54b2015-08-06 20:11:26244 DCHECK_CURRENTLY_ON(BrowserThread::UI);
245 DCHECK(download_manager);
avi1ed4a4372017-04-25 05:39:41246 context->SetUserData(kDownloadManagerKeyName, std::move(download_manager));
ttr31481dc54b2015-08-06 20:11:26247}
248
Ken Rockot499519e2018-12-04 06:57:44249std::unique_ptr<service_manager::Service>
250CreateMainThreadServiceForBrowserContext(
251 BrowserContext* browser_context,
252 const std::string& service_name,
253 service_manager::mojom::ServiceRequest request) {
254 if (service_name == content::mojom::kServiceName) {
255 auto* delegate_holder = static_cast<ContentServiceDelegateHolder*>(
256 browser_context->GetUserData(kContentServiceDelegateKey));
257 auto* delegate = delegate_holder->delegate();
258 auto service =
259 std::make_unique<content::Service>(delegate, std::move(request));
260 delegate->AddService(service.get());
261 return service;
262 }
263
264 return browser_context->HandleServiceRequest(service_name,
265 std::move(request));
266}
267
bend32292b2016-10-07 00:21:58268class BrowserContextServiceManagerConnectionHolder
rockot963ad3e82016-04-13 16:33:23269 : public base::SupportsUserData::Data {
270 public:
benaad37ecd2017-04-12 22:08:20271 explicit BrowserContextServiceManagerConnectionHolder(
Ken Rockot435132692018-11-20 21:46:10272 BrowserContext* browser_context,
Ken Rockot499519e2018-12-04 06:57:44273 service_manager::mojom::ServiceRequest request,
274 scoped_refptr<base::SequencedTaskRunner> main_thread_task_runner)
Ken Rockot435132692018-11-20 21:46:10275 : browser_context_(browser_context),
Ken Rockot499519e2018-12-04 06:57:44276 main_thread_task_runner_(std::move(main_thread_task_runner)),
Ken Rockot435132692018-11-20 21:46:10277 service_manager_connection_(ServiceManagerConnection::Create(
rockotcef38272016-07-15 22:47:47278 std::move(request),
Eric Seckler8652dcd52018-09-20 10:42:28279 base::CreateSingleThreadTaskRunnerWithTraits(
Ken Rockot435132692018-11-20 21:46:10280 {BrowserThread::IO}))) {
281 service_manager_connection_->SetDefaultServiceRequestHandler(
282 base::BindRepeating(
283 &BrowserContextServiceManagerConnectionHolder::OnServiceRequest,
284 weak_ptr_factory_.GetWeakPtr()));
285 }
bend32292b2016-10-07 00:21:58286 ~BrowserContextServiceManagerConnectionHolder() override {}
rockot963ad3e82016-04-13 16:33:23287
bend32292b2016-10-07 00:21:58288 ServiceManagerConnection* service_manager_connection() {
289 return service_manager_connection_.get();
290 }
rockot963ad3e82016-04-13 16:33:23291
Ken Rockotad3c7582018-12-12 17:04:14292 void DestroyRunningServices() { running_services_.clear(); }
293
rockot963ad3e82016-04-13 16:33:23294 private:
Ken Rockot435132692018-11-20 21:46:10295 void OnServiceRequest(const std::string& service_name,
296 service_manager::mojom::ServiceRequest request) {
297 std::unique_ptr<service_manager::Service> service =
Ken Rockot499519e2018-12-04 06:57:44298 CreateMainThreadServiceForBrowserContext(browser_context_, service_name,
299 std::move(request));
Ken Rockot435132692018-11-20 21:46:10300 if (!service) {
301 LOG(ERROR) << "Ignoring request for unknown per-browser-context service:"
302 << service_name;
303 return;
304 }
305
306 auto* raw_service = service.get();
307 service->set_termination_closure(base::BindOnce(
308 &BrowserContextServiceManagerConnectionHolder::OnServiceQuit,
309 base::Unretained(this), raw_service));
310 running_services_.emplace(raw_service, std::move(service));
311 }
312
313 void OnServiceQuit(service_manager::Service* service) {
314 running_services_.erase(service);
315 }
316
317 BrowserContext* const browser_context_;
Ken Rockot499519e2018-12-04 06:57:44318 const scoped_refptr<base::SequencedTaskRunner> main_thread_task_runner_;
bend32292b2016-10-07 00:21:58319 std::unique_ptr<ServiceManagerConnection> service_manager_connection_;
Ken Rockot435132692018-11-20 21:46:10320 std::map<service_manager::Service*, std::unique_ptr<service_manager::Service>>
321 running_services_;
322
323 base::WeakPtrFactory<BrowserContextServiceManagerConnectionHolder>
324 weak_ptr_factory_{this};
rockot963ad3e82016-04-13 16:33:23325
bend32292b2016-10-07 00:21:58326 DISALLOW_COPY_AND_ASSIGN(BrowserContextServiceManagerConnectionHolder);
rockot963ad3e82016-04-13 16:33:23327};
328
Jens Widell7ca8fb42018-02-21 14:11:54329base::WeakPtr<storage::BlobStorageContext> BlobStorageContextGetterForBrowser(
Xing Liu89860472018-02-09 20:07:02330 scoped_refptr<ChromeBlobStorageContext> blob_context) {
331 DCHECK_CURRENTLY_ON(BrowserThread::IO);
332 return blob_context->context()->AsWeakPtr();
333}
334
[email protected]735e20c2012-03-20 01:16:59335} // namespace
336
[email protected]14acc642012-11-17 12:20:10337// static
338void BrowserContext::AsyncObliterateStoragePartition(
339 BrowserContext* browser_context,
[email protected]399583b2012-12-11 09:33:42340 const GURL& site,
341 const base::Closure& on_gc_required) {
Marijn Kruisselbrink83e5cdb2019-06-20 00:06:28342 GetStoragePartitionMap(browser_context)
343 ->AsyncObliterate(site, on_gc_required);
[email protected]399583b2012-12-11 09:33:42344}
345
346// static
347void BrowserContext::GarbageCollectStoragePartitions(
dcheng59716272016-04-09 05:19:08348 BrowserContext* browser_context,
Takuto Ikuta8332bf9d2019-01-05 03:58:00349 std::unique_ptr<std::unordered_set<base::FilePath>> active_paths,
dcheng59716272016-04-09 05:19:08350 const base::Closure& done) {
dcheng36b6aec92015-12-26 06:16:36351 GetStoragePartitionMap(browser_context)
352 ->GarbageCollect(std::move(active_paths), done);
[email protected]14acc642012-11-17 12:20:10353}
354
Marijn Kruisselbrink83e5cdb2019-06-20 00:06:28355DownloadManager* BrowserContext::GetDownloadManager(BrowserContext* context) {
mostynbfbcdc27a2015-03-13 17:58:52356 DCHECK_CURRENTLY_ON(BrowserThread::UI);
[email protected]b441a8492012-06-06 14:55:57357 if (!context->GetUserData(kDownloadManagerKeyName)) {
Min Qinddb40ce2017-10-28 03:38:26358 DownloadManager* download_manager = new DownloadManagerImpl(context);
[email protected]d25fda12012-06-12 17:05:03359
avi1ed4a4372017-04-25 05:39:41360 SetDownloadManager(context, base::WrapUnique(download_manager));
[email protected]b441a8492012-06-06 14:55:57361 download_manager->SetDelegate(context->GetDownloadManagerDelegate());
[email protected]b441a8492012-06-06 14:55:57362 }
363
[email protected]eba4a4d2013-05-29 02:18:06364 return static_cast<DownloadManager*>(
365 context->GetUserData(kDownloadManagerKeyName));
[email protected]b441a8492012-06-06 14:55:57366}
367
[email protected]6ef0c3912013-01-25 22:46:34368// static
[email protected]cd501a72014-08-22 19:58:31369storage::ExternalMountPoints* BrowserContext::GetMountPoints(
[email protected]6ef0c3912013-01-25 22:46:34370 BrowserContext* context) {
371 // Ensure that these methods are called on the UI thread, except for
372 // unittests where a UI thread might not have been created.
373 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI) ||
Gabriel Charette2983181c2018-03-28 17:01:09374 !BrowserThread::IsThreadInitialized(BrowserThread::UI));
[email protected]6ef0c3912013-01-25 22:46:34375
376#if defined(OS_CHROMEOS)
377 if (!context->GetUserData(kMountPointsKey)) {
[email protected]cd501a72014-08-22 19:58:31378 scoped_refptr<storage::ExternalMountPoints> mount_points =
379 storage::ExternalMountPoints::CreateRefCounted();
[email protected]6ef0c3912013-01-25 22:46:34380 context->SetUserData(
381 kMountPointsKey,
Jeremy Roman04f27c372017-10-27 15:20:55382 std::make_unique<UserDataAdapter<storage::ExternalMountPoints>>(
avicb129c02017-05-03 06:49:29383 mount_points.get()));
[email protected]6ef0c3912013-01-25 22:46:34384 }
385
[email protected]cd501a72014-08-22 19:58:31386 return UserDataAdapter<storage::ExternalMountPoints>::Get(context,
387 kMountPointsKey);
[email protected]6ef0c3912013-01-25 22:46:34388#else
Ivan Kotenkov2c0d2bb32017-11-01 15:41:28389 return nullptr;
[email protected]6ef0c3912013-01-25 22:46:34390#endif
391}
392
msrameke169ccb2017-04-26 05:21:41393// static
394content::BrowsingDataRemover* content::BrowserContext::GetBrowsingDataRemover(
395 BrowserContext* context) {
396 DCHECK_CURRENTLY_ON(BrowserThread::UI);
397
398 if (!context->GetUserData(kBrowsingDataRemoverKey)) {
399 std::unique_ptr<BrowsingDataRemoverImpl> remover =
Jeremy Roman04f27c372017-10-27 15:20:55400 std::make_unique<BrowsingDataRemoverImpl>(context);
msrameke169ccb2017-04-26 05:21:41401 remover->SetEmbedderDelegate(context->GetBrowsingDataRemoverDelegate());
402 context->SetUserData(kBrowsingDataRemoverKey, std::move(remover));
403 }
404
405 return static_cast<BrowsingDataRemoverImpl*>(
406 context->GetUserData(kBrowsingDataRemoverKey));
407}
408
Andrey Lushnikovebff0442018-07-12 20:02:58409// static
410content::PermissionController* content::BrowserContext::GetPermissionController(
411 BrowserContext* context) {
412 DCHECK_CURRENTLY_ON(BrowserThread::UI);
413
414 if (!context->GetUserData(kPermissionControllerKey)) {
415 context->SetUserData(kPermissionControllerKey,
416 std::make_unique<PermissionControllerImpl>(context));
417 }
418
419 return static_cast<PermissionControllerImpl*>(
420 context->GetUserData(kPermissionControllerKey));
421}
422
[email protected]4c3a23582012-08-18 08:54:34423StoragePartition* BrowserContext::GetStoragePartition(
424 BrowserContext* browser_context,
Dan Elphick6c0d8492017-09-12 09:35:38425 SiteInstance* site_instance,
426 bool can_create) {
[email protected]1bc28312012-11-08 08:31:53427 std::string partition_domain;
428 std::string partition_name;
429 bool in_memory = false;
[email protected]4c3a23582012-08-18 08:54:34430
[email protected]4c3a23582012-08-18 08:54:34431 if (site_instance) {
[email protected]1bc28312012-11-08 08:31:53432 GetContentClient()->browser()->GetStoragePartitionConfigForSite(
Marijn Kruisselbrink83e5cdb2019-06-20 00:06:28433 browser_context, site_instance->GetSiteURL(), true, &partition_domain,
434 &partition_name, &in_memory);
[email protected]4c3a23582012-08-18 08:54:34435 }
436
Dan Elphick6c0d8492017-09-12 09:35:38437 return GetStoragePartitionFromConfig(browser_context, partition_domain,
438 partition_name, in_memory, can_create);
[email protected]4c3a23582012-08-18 08:54:34439}
440
[email protected]e94bbcb2012-09-07 05:33:57441StoragePartition* BrowserContext::GetStoragePartitionForSite(
442 BrowserContext* browser_context,
Dan Elphick6c0d8492017-09-12 09:35:38443 const GURL& site,
444 bool can_create) {
[email protected]1bc28312012-11-08 08:31:53445 std::string partition_domain;
446 std::string partition_name;
447 bool in_memory;
[email protected]e94bbcb2012-09-07 05:33:57448
[email protected]1bc28312012-11-08 08:31:53449 GetContentClient()->browser()->GetStoragePartitionConfigForSite(
[email protected]14acc642012-11-17 12:20:10450 browser_context, site, true, &partition_domain, &partition_name,
451 &in_memory);
[email protected]1bc28312012-11-08 08:31:53452
Dan Elphick6c0d8492017-09-12 09:35:38453 return GetStoragePartitionFromConfig(browser_context, partition_domain,
454 partition_name, in_memory, can_create);
[email protected]e94bbcb2012-09-07 05:33:57455}
456
[email protected]4c3a23582012-08-18 08:54:34457void BrowserContext::ForEachStoragePartition(
458 BrowserContext* browser_context,
459 const StoragePartitionCallback& callback) {
460 StoragePartitionImplMap* partition_map =
461 static_cast<StoragePartitionImplMap*>(
a.cavalcantiffab73762015-08-15 02:55:48462 browser_context->GetUserData(kStoragePartitionMapKeyName));
[email protected]4c3a23582012-08-18 08:54:34463 if (!partition_map)
464 return;
465
466 partition_map->ForEach(callback);
467}
468
469StoragePartition* BrowserContext::GetDefaultStoragePartition(
470 BrowserContext* browser_context) {
Ivan Kotenkov2c0d2bb32017-11-01 15:41:28471 return GetStoragePartition(browser_context, nullptr);
[email protected]55eb70e762012-02-20 17:38:39472}
473
tbarzicdb712682015-03-06 06:05:41474// static
[email protected]393b6cb2014-05-15 00:55:12475void BrowserContext::CreateMemoryBackedBlob(BrowserContext* browser_context,
Marijn Kruisselbrink604fd7e72017-10-26 16:31:05476 const char* data,
477 size_t length,
478 const std::string& content_type,
479 BlobCallback callback) {
mostynbfbcdc27a2015-03-13 17:58:52480 DCHECK_CURRENTLY_ON(BrowserThread::UI);
[email protected]393b6cb2014-05-15 00:55:12481
482 ChromeBlobStorageContext* blob_context =
483 ChromeBlobStorageContext::GetFor(browser_context);
Eric Seckler8652dcd52018-09-20 10:42:28484 base::PostTaskWithTraitsAndReplyWithResult(
485 FROM_HERE, {BrowserThread::IO},
Marijn Kruisselbrink604fd7e72017-10-26 16:31:05486 base::BindOnce(&ChromeBlobStorageContext::CreateMemoryBackedBlob,
487 base::WrapRefCounted(blob_context), data, length,
488 content_type),
489 std::move(callback));
[email protected]393b6cb2014-05-15 00:55:12490}
491
[email protected]66e53d0282014-08-07 10:04:35492// static
Xing Liu89860472018-02-09 20:07:02493BrowserContext::BlobContextGetter BrowserContext::GetBlobStorageContext(
494 BrowserContext* browser_context) {
495 DCHECK_CURRENTLY_ON(BrowserThread::UI);
496 scoped_refptr<ChromeBlobStorageContext> chrome_blob_context =
497 ChromeBlobStorageContext::GetFor(browser_context);
Jens Widell7ca8fb42018-02-21 14:11:54498 return base::BindRepeating(&BlobStorageContextGetterForBrowser,
499 chrome_blob_context);
Xing Liu89860472018-02-09 20:07:02500}
501
502// static
Marijn Kruisselbrink9e073a82018-06-18 17:48:58503blink::mojom::BlobPtr BrowserContext::GetBlobPtr(
504 BrowserContext* browser_context,
505 const std::string& uuid) {
506 DCHECK_CURRENTLY_ON(BrowserThread::UI);
507 return ChromeBlobStorageContext::GetBlobPtr(browser_context, uuid);
508}
509
510// static
[email protected]66e53d0282014-08-07 10:04:35511void BrowserContext::DeliverPushMessage(
512 BrowserContext* browser_context,
513 const GURL& origin,
avib7348942015-12-25 20:57:10514 int64_t service_worker_registration_id,
Rayan Kanso3b686202019-05-10 17:41:55515 const std::string& message_id,
Han Leonc1deace2018-08-03 03:52:53516 base::Optional<std::string> payload,
Mario Sanchez Pradad2990112019-05-07 08:13:49517 const base::Callback<void(blink::mojom::PushDeliveryStatus)>& callback) {
mostynbfbcdc27a2015-03-13 17:58:52518 DCHECK_CURRENTLY_ON(BrowserThread::UI);
harknessdd4d2b22016-01-27 19:26:43519 PushMessagingRouter::DeliverMessage(browser_context, origin,
Han Leonc1deace2018-08-03 03:52:53520 service_worker_registration_id,
Rayan Kanso3b686202019-05-10 17:41:55521 message_id, std::move(payload), callback);
[email protected]66e53d0282014-08-07 10:04:35522}
523
falken41f4175162014-10-29 07:03:41524// static
525void BrowserContext::NotifyWillBeDestroyed(BrowserContext* browser_context) {
Lukasz Anforowicz58d0dac2018-03-23 15:48:10526 // Make sure NotifyWillBeDestroyed is idempotent. This helps facilitate the
527 // pattern where NotifyWillBeDestroyed is called from *both*
Kent Tamura21d1de62018-12-10 04:45:20528 // ShellBrowserContext and its derived classes (e.g. WebTestBrowserContext).
Lukasz Anforowicz58d0dac2018-03-23 15:48:10529 if (browser_context->was_notify_will_be_destroyed_called_)
530 return;
531 browser_context->was_notify_will_be_destroyed_called_ = true;
532
Ken Rockot99c5bc742018-07-12 15:36:56533 // Subclasses of BrowserContext may expect there to be no more
534 // RenderProcessHosts using them by the time this function returns. We
535 // therefore explicitly tear down embedded Content Service instances now to
536 // ensure that all their WebContents (and therefore RPHs) are torn down too.
537 browser_context->RemoveUserData(kContentServiceDelegateKey);
538
Ken Rockotad3c7582018-12-12 17:04:14539 // Tear down all running service instances which were started on behalf of
540 // this BrowserContext. Note that we leave the UserData itself in place
541 // because it's possible for someone to call
542 // |GetServiceManagerConnectionFor()| between now and actual BrowserContext
543 // destruction.
544 BrowserContextServiceManagerConnectionHolder* connection_holder =
545 static_cast<BrowserContextServiceManagerConnectionHolder*>(
546 browser_context->GetUserData(kServiceManagerConnection));
547 if (connection_holder)
548 connection_holder->DestroyRunningServices();
549
falken41f4175162014-10-29 07:03:41550 // Service Workers must shutdown before the browser context is destroyed,
551 // since they keep render process hosts alive and the codebase assumes that
552 // render process hosts die before their profile (browser context) dies.
553 ForEachStoragePartition(browser_context,
554 base::Bind(ShutdownServiceWorkerContext));
falken04a6912a2016-09-23 21:06:29555
556 // Shared workers also keep render process hosts alive, and are expected to
Darin Fisherd3768b2f62017-10-07 01:00:16557 // return ref counts to 0 after documents close. However, to ensure that
558 // hosts are destructed now, forcibly release their ref counts here.
falken04a6912a2016-09-23 21:06:29559 for (RenderProcessHost::iterator host_iterator =
560 RenderProcessHost::AllHostsIterator();
561 !host_iterator.IsAtEnd(); host_iterator.Advance()) {
562 RenderProcessHost* host = host_iterator.GetCurrentValue();
Benoit Lizeab08362c2017-07-19 14:50:54563 if (host->GetBrowserContext() == browser_context) {
564 // This will also clean up spare RPH references.
Yutaka Hirano09a9afb92017-08-16 09:11:45565 host->DisableKeepAliveRefCount();
Benoit Lizeab08362c2017-07-19 14:50:54566 }
falken04a6912a2016-09-23 21:06:29567 }
Alex Moshchuk99b795422019-03-07 00:27:32568
Aaron Colwell67f93006c2019-04-01 22:45:28569 // Clean up any isolated origins associated with this BrowserContext. This
Alex Moshchuk99b795422019-03-07 00:27:32570 // should be safe now that all RenderProcessHosts are destroyed, since future
571 // navigations or security decisions shouldn't ever need to consult these
Aaron Colwell67f93006c2019-04-01 22:45:28572 // isolated origins.
Alex Moshchuk99b795422019-03-07 00:27:32573 ChildProcessSecurityPolicyImpl* policy =
574 ChildProcessSecurityPolicyImpl::GetInstance();
Aaron Colwell67f93006c2019-04-01 22:45:28575 policy->RemoveIsolatedOriginsForBrowserContext(*browser_context);
falken41f4175162014-10-29 07:03:41576}
577
[email protected]314c3e22012-02-21 03:57:42578void BrowserContext::EnsureResourceContextInitialized(BrowserContext* context) {
[email protected]7e26ac92012-02-27 20:15:05579 // This will be enough to tickle initialization of BrowserContext if
580 // necessary, which initializes ResourceContext. The reason we don't call
[email protected]4c3a23582012-08-18 08:54:34581 // ResourceContext::InitializeResourceContext() directly here is that
582 // ResourceContext initialization may call back into BrowserContext
583 // and when that call returns it'll end rewriting its UserData map. It will
584 // end up rewriting the same value but this still causes a race condition.
585 //
586 // See http://crbug.com/115678.
587 GetDefaultStoragePartition(context);
[email protected]55eb70e762012-02-20 17:38:39588}
589
[email protected]6e2d3d22012-02-24 18:10:36590void BrowserContext::SaveSessionState(BrowserContext* browser_context) {
[email protected]b1b502e2012-09-16 07:31:43591 StoragePartition* storage_partition =
592 BrowserContext::GetDefaultStoragePartition(browser_context);
[email protected]6e2d3d22012-02-24 18:10:36593
Joshua Bell607cb142017-07-24 19:17:16594 storage::DatabaseTracker* database_tracker =
595 storage_partition->GetDatabaseTracker();
596 database_tracker->task_runner()->PostTask(
597 FROM_HERE,
598 base::BindOnce(&storage::DatabaseTracker::SetForceKeepSessionState,
kylecharda69d882017-10-04 05:49:52599 base::WrapRefCounted(database_tracker)));
Joshua Bell607cb142017-07-24 19:17:16600
Gabriel Charette2983181c2018-03-28 17:01:09601 if (BrowserThread::IsThreadInitialized(BrowserThread::IO)) {
John Abd-El-Malekb175a612018-12-03 20:11:58602 scoped_refptr<net::URLRequestContextGetter> context_getter;
John Abd-El-Malekb175a612018-12-03 20:11:58603 if (!base::FeatureList::IsEnabled(network::features::kNetworkService))
604 context_getter = storage_partition->GetURLRequestContext();
Eric Seckler8652dcd52018-09-20 10:42:28605 base::PostTaskWithTraits(
606 FROM_HERE, {BrowserThread::IO},
John Abd-El-Malekb175a612018-12-03 20:11:58607 base::BindOnce(&SaveSessionStateOnIOThread, context_getter,
608 static_cast<AppCacheServiceImpl*>(
609 storage_partition->GetAppCacheService())));
[email protected]6e2d3d22012-02-24 18:10:36610 }
611
Clark DuVall385b5a52018-06-14 21:33:32612 storage_partition->GetCookieManagerForBrowserProcess()
613 ->SetForceKeepSessionState();
614
[email protected]5f2aa722013-08-07 16:59:41615 DOMStorageContextWrapper* dom_storage_context_proxy =
616 static_cast<DOMStorageContextWrapper*>(
[email protected]b1b502e2012-09-16 07:31:43617 storage_partition->GetDOMStorageContext());
[email protected]5f2aa722013-08-07 16:59:41618 dom_storage_context_proxy->SetForceKeepSessionState();
[email protected]735e20c2012-03-20 01:16:59619
Daniel Murphyd9a41e7b2019-05-09 17:56:54620 scoped_refptr<IndexedDBContext> indexed_db_context =
621 storage_partition->GetIndexedDBContext();
Victor Costan4b8909d52019-05-28 19:25:51622 IndexedDBContext* const indexed_db_context_ptr = indexed_db_context.get();
623 indexed_db_context_ptr->TaskRunner()->PostTask(
624 FROM_HERE, base::BindOnce(&SaveSessionStateOnIndexedDBThread,
625 std::move(indexed_db_context)));
[email protected]6e2d3d22012-02-24 18:10:36626}
627
ttr31481dc54b2015-08-06 20:11:26628void BrowserContext::SetDownloadManagerForTesting(
629 BrowserContext* browser_context,
avi1ed4a4372017-04-25 05:39:41630 std::unique_ptr<content::DownloadManager> download_manager) {
631 SetDownloadManager(browser_context, std::move(download_manager));
ttr31481dc54b2015-08-06 20:11:26632}
633
rockot963ad3e82016-04-13 16:33:23634// static
Marijn Kruisselbrink83e5cdb2019-06-20 00:06:28635void BrowserContext::Initialize(BrowserContext* browser_context,
636 const base::FilePath& path) {
Ken Rockotda7edc62018-11-10 01:01:45637 const base::Token new_group = base::Token::CreateRandom();
638 ServiceInstanceGroupHolder* holder = static_cast<ServiceInstanceGroupHolder*>(
639 browser_context->GetUserData(kServiceInstanceGroup));
640 if (holder) {
641 file::ForgetServiceInstanceGroupUserDirAssociation(
642 holder->instance_group());
ben6c85c4492016-06-16 20:40:51643 }
Ken Rockotda7edc62018-11-10 01:01:45644 file::AssociateServiceInstanceGroupWithUserDir(new_group, path);
645 RemoveBrowserContextFromInstanceGroupMap(browser_context);
646 GetTokenToContextMap()[new_group] = browser_context;
avi1ed4a4372017-04-25 05:39:41647 browser_context->SetUserData(
Ken Rockotda7edc62018-11-10 01:01:45648 kServiceInstanceGroup,
649 std::make_unique<ServiceInstanceGroupHolder>(new_group));
rockot963ad3e82016-04-13 16:33:23650
bend32292b2016-10-07 00:21:58651 ServiceManagerConnection* service_manager_connection =
652 ServiceManagerConnection::GetForProcess();
fdoray4f155f02016-10-12 11:28:50653 if (service_manager_connection && base::ThreadTaskRunnerHandle::IsSet()) {
rockot963ad3e82016-04-13 16:33:23654 // NOTE: Many unit tests create a TestBrowserContext without initializing
bend32292b2016-10-07 00:21:58655 // Mojo or the global service manager connection.
rockot963ad3e82016-04-13 16:33:23656
Ken Rockot40a1df792019-05-08 22:15:52657 mojo::PendingRemote<service_manager::mojom::Service> service;
658 auto service_receiver = service.InitWithNewPipeAndPassReceiver();
rockot963ad3e82016-04-13 16:33:23659
Ken Rockot40a1df792019-05-08 22:15:52660 mojo::Remote<service_manager::mojom::ProcessMetadata> metadata;
Ken Rockota86fa542018-11-13 21:47:13661 service_manager::Identity identity(mojom::kBrowserServiceName, new_group,
662 base::Token{},
663 base::Token::CreateRandom());
664 service_manager_connection->GetConnector()->RegisterServiceInstance(
Ken Rockot40a1df792019-05-08 22:15:52665 identity, std::move(service), metadata.BindNewPipeAndPassReceiver());
666 metadata->SetPID(base::GetCurrentProcId());
rockot963ad3e82016-04-13 16:33:23667
bend32292b2016-10-07 00:21:58668 BrowserContextServiceManagerConnectionHolder* connection_holder =
669 new BrowserContextServiceManagerConnectionHolder(
Ken Rockot40a1df792019-05-08 22:15:52670 browser_context, std::move(service_receiver),
Ken Rockot499519e2018-12-04 06:57:44671 base::SequencedTaskRunnerHandle::Get());
avi1ed4a4372017-04-25 05:39:41672 browser_context->SetUserData(kServiceManagerConnection,
673 base::WrapUnique(connection_holder));
bend32292b2016-10-07 00:21:58674 ServiceManagerConnection* connection =
675 connection_holder->service_manager_connection();
rockot963ad3e82016-04-13 16:33:23676
Ken Rockot84f58fd2018-06-22 21:54:14677 browser_context->SetUserData(
678 kContentServiceDelegateKey,
679 std::make_unique<ContentServiceDelegateHolder>(browser_context));
680
Ken Rockot499519e2018-12-04 06:57:44681 scoped_refptr<FileServiceIOThreadState> file_service_io_thread_state =
682 base::MakeRefCounted<FileServiceIOThreadState>(
683 base::CreateSingleThreadTaskRunnerWithTraits({BrowserThread::IO}));
684 connection->AddServiceRequestHandler(
685 file::mojom::kServiceName,
686 base::BindRepeating(
687 [](scoped_refptr<FileServiceIOThreadState> io_thread_state,
688 service_manager::mojom::ServiceRequest request) {
689 io_thread_state->StartOnIOThread(std::move(request));
690 },
691 file_service_io_thread_state));
692
693 browser_context->SetUserData(kFileServiceKey,
694 std::make_unique<FileServiceHolder>(
695 std::move(file_service_io_thread_state)));
tibellab3d36b2017-03-10 02:57:25696
Ken Rockotc7a279c2017-05-04 23:51:45697 RegisterCommonBrowserInterfaces(connection);
sammc030f5012017-03-13 02:28:45698 connection->Start();
rockot963ad3e82016-04-13 16:33:23699 }
erge69130f52016-03-02 00:13:28700}
701
rockot963ad3e82016-04-13 16:33:23702// static
Ken Rockotda7edc62018-11-10 01:01:45703const base::Token& BrowserContext::GetServiceInstanceGroupFor(
bencccfe2a2016-03-05 16:54:14704 BrowserContext* browser_context) {
Ken Rockotda7edc62018-11-10 01:01:45705 ServiceInstanceGroupHolder* holder = static_cast<ServiceInstanceGroupHolder*>(
706 browser_context->GetUserData(kServiceInstanceGroup));
707 CHECK(holder) << "Attempting to get the instance group for a BrowserContext "
708 << "that was never Initialized().";
709 return holder->instance_group();
erge69130f52016-03-02 00:13:28710}
711
rockot963ad3e82016-04-13 16:33:23712// static
Ken Rockotda7edc62018-11-10 01:01:45713BrowserContext* BrowserContext::GetBrowserContextForServiceInstanceGroup(
714 const base::Token& instance_group) {
715 auto it = GetTokenToContextMap().find(instance_group);
716 return it != GetTokenToContextMap().end() ? it->second : nullptr;
ben6c85c4492016-06-16 20:40:51717}
718
719// static
rockot400ea35b2016-10-15 19:15:32720service_manager::Connector* BrowserContext::GetConnectorFor(
rockot963ad3e82016-04-13 16:33:23721 BrowserContext* browser_context) {
bend32292b2016-10-07 00:21:58722 ServiceManagerConnection* connection =
723 GetServiceManagerConnectionFor(browser_context);
ben5be0b9132016-08-03 00:17:18724 return connection ? connection->GetConnector() : nullptr;
725}
726
727// static
bend32292b2016-10-07 00:21:58728ServiceManagerConnection* BrowserContext::GetServiceManagerConnectionFor(
ben5be0b9132016-08-03 00:17:18729 BrowserContext* browser_context) {
bend32292b2016-10-07 00:21:58730 BrowserContextServiceManagerConnectionHolder* connection_holder =
731 static_cast<BrowserContextServiceManagerConnectionHolder*>(
732 browser_context->GetUserData(kServiceManagerConnection));
733 return connection_holder ? connection_holder->service_manager_connection()
734 : nullptr;
rockot963ad3e82016-04-13 16:33:23735}
736
mmenkec0b2b8b12017-04-21 16:27:52737BrowserContext::BrowserContext()
Takashi Toyoshima0190a3b2019-01-21 07:39:06738 : unique_id_(base::UnguessableToken::Create().ToString()) {}
mmenkec0b2b8b12017-04-21 16:27:52739
[email protected]55eb70e762012-02-20 17:38:39740BrowserContext::~BrowserContext() {
Ken Rockotda7edc62018-11-10 01:01:45741 CHECK(GetUserData(kServiceInstanceGroup))
erge69130f52016-03-02 00:13:28742 << "Attempting to destroy a BrowserContext that never called "
743 << "Initialize()";
744
kinukof6ed359c2016-07-26 13:27:21745 DCHECK(!GetUserData(kStoragePartitionMapKeyName))
746 << "StoragePartitionMap is not shut down properly";
747
Lukasz Anforowicz58d0dac2018-03-23 15:48:10748 DCHECK(was_notify_will_be_destroyed_called_);
749
Ken Rockotda7edc62018-11-10 01:01:45750 RemoveBrowserContextFromInstanceGroupMap(this);
ben6c85c4492016-06-16 20:40:51751
[email protected]b441a8492012-06-06 14:55:57752 if (GetUserData(kDownloadManagerKeyName))
753 GetDownloadManager(this)->Shutdown();
[email protected]55eb70e762012-02-20 17:38:39754}
755
kinukof6ed359c2016-07-26 13:27:21756void BrowserContext::ShutdownStoragePartitions() {
757 if (GetUserData(kStoragePartitionMapKeyName))
758 RemoveUserData(kStoragePartitionMapKeyName);
759}
760
mmenkec0b2b8b12017-04-21 16:27:52761std::string BrowserContext::GetMediaDeviceIDSalt() {
Andrey Lushnikovd39d9062018-04-24 17:33:35762 return unique_id_;
mmenkec0b2b8b12017-04-21 16:27:52763}
764
765// static
766std::string BrowserContext::CreateRandomMediaDeviceIDSalt() {
Andrey Lushnikovd39d9062018-04-24 17:33:35767 return base::UnguessableToken::Create().ToString();
768}
769
Ken Rockot435132692018-11-20 21:46:10770std::unique_ptr<service_manager::Service> BrowserContext::HandleServiceRequest(
771 const std::string& service_name,
772 service_manager::mojom::ServiceRequest request) {
773 return nullptr;
774}
775
Andrey Lushnikovd39d9062018-04-24 17:33:35776const std::string& BrowserContext::UniqueId() const {
777 return unique_id_;
mmenkec0b2b8b12017-04-21 16:27:52778}
779
Chris Cunninghama5b38012017-10-28 07:27:18780media::VideoDecodePerfHistory* BrowserContext::GetVideoDecodePerfHistory() {
781 media::VideoDecodePerfHistory* decode_history =
782 static_cast<media::VideoDecodePerfHistory*>(
783 GetUserData(kVideoDecodePerfHistoryId));
784
785 // Lazily created. Note, this does not trigger loading the DB from disk. That
786 // occurs later upon first VideoDecodePerfHistory API request that requires DB
787 // access. DB operations will not block the UI thread.
788 if (!decode_history) {
Chris Cunningham4507edfa2019-05-30 20:15:54789 const char kUseInMemoryDBParamName[] = "db_in_memory";
790 const bool kUseInMemoryDBDefault = false;
791 bool use_in_memory_db = base::GetFieldTrialParamByFeatureAsBool(
792 media::kMediaCapabilitiesWithParameters, kUseInMemoryDBParamName,
793 kUseInMemoryDBDefault);
794
795 std::unique_ptr<media::VideoDecodeStatsDB> stats_db;
796 if (use_in_memory_db) {
797 stats_db =
798 std::make_unique<media::InMemoryVideoDecodeStatsDBImpl>(nullptr);
799 } else {
800 stats_db = media::VideoDecodeStatsDBImpl::Create(
801 GetPath().Append(FILE_PATH_LITERAL("VideoDecodeStats")));
802 }
803
[email protected]3dcea37a2019-02-11 19:46:51804 auto new_decode_history = std::make_unique<media::VideoDecodePerfHistory>(
805 std::move(stats_db), BrowserFeatureProvider::GetFactoryCB());
chcunningham06b81092018-09-24 20:20:51806 decode_history = new_decode_history.get();
807
808 SetUserData(kVideoDecodePerfHistoryId, std::move(new_decode_history));
Chris Cunninghama5b38012017-10-28 07:27:18809 }
810
811 return decode_history;
812}
813
Min Qind3ff2ed62018-07-21 06:46:59814download::InProgressDownloadManager*
815BrowserContext::RetriveInProgressDownloadManager() {
816 return nullptr;
817}
818
Takashi Toyoshima0190a3b2019-01-21 07:39:06819void BrowserContext::SetCorsOriginAccessListForOrigin(
820 const url::Origin& source_origin,
821 std::vector<network::mojom::CorsOriginPatternPtr> allow_patterns,
822 std::vector<network::mojom::CorsOriginPatternPtr> block_patterns,
823 base::OnceClosure closure) {
824 NOTREACHED() << "Sub-classes should implement this method to communicate "
825 "with NetworkService to bypass CORS checks.";
826}
827
828const SharedCorsOriginAccessList*
829BrowserContext::GetSharedCorsOriginAccessList() const {
830 // Need to return a valid instance regardless of CORS bypass supports.
831 static const base::NoDestructor<scoped_refptr<SharedCorsOriginAccessList>>
832 empty_list(SharedCorsOriginAccessList::Create());
833 return empty_list->get();
834}
835
Sam Goto0230b712019-05-14 00:30:51836SmsService* BrowserContext::GetSmsService() {
837 return nullptr;
838}
839
Marijn Kruisselbrink83e5cdb2019-06-20 00:06:28840NativeFileSystemPermissionContext*
841BrowserContext::GetNativeFileSystemPermissionContext() {
842 return nullptr;
843}
844
[email protected]55eb70e762012-02-20 17:38:39845} // namespace content