diff options
Diffstat (limited to 'chrome/browser/tab_contents/site_instance.cc')
-rw-r--r-- | chrome/browser/tab_contents/site_instance.cc | 145 |
1 files changed, 145 insertions, 0 deletions
diff --git a/chrome/browser/tab_contents/site_instance.cc b/chrome/browser/tab_contents/site_instance.cc new file mode 100644 index 0000000..a303f85 --- /dev/null +++ b/chrome/browser/tab_contents/site_instance.cc @@ -0,0 +1,145 @@ +// Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. +// Use of this source code is governed by a BSD-style license that can be +// found in the LICENSE file. + +#include "chrome/browser/tab_contents/site_instance.h" + +#include "net/base/registry_controlled_domain.h" + +SiteInstance::~SiteInstance() { + // Now that no one is referencing us, we can safely remove ourselves from + // the BrowsingInstance. Any future visits to a page from this site + // (within the same BrowsingInstance) can safely create a new SiteInstance. + if (has_site_) + browsing_instance_->UnregisterSiteInstance(this); +} + +RenderProcessHost* SiteInstance::GetProcess() { + RenderProcessHost* process = NULL; + if (process_host_id_ != -1) + process = RenderProcessHost::FromID(process_host_id_); + + // Create a new process if ours went away or was reused. + if (!process) { + // See if we should reuse an old process + if (RenderProcessHost::ShouldTryToUseExistingProcessHost()) + process = RenderProcessHost::GetExistingProcessHost( + browsing_instance_->profile()); + + // Otherwise (or if that fails), create a new one. + if (!process) + process = new RenderProcessHost(browsing_instance_->profile()); + + // Update our host ID, so all pages in this SiteInstance will use + // the correct process. + process_host_id_ = process->host_id(); + + // Make sure the process starts at the right max_page_id + process->UpdateMaxPageID(max_page_id_); + } + DCHECK(process); + + return process; +} + +void SiteInstance::SetSite(const GURL& url) { + // A SiteInstance's site should not change. + // TODO(creis): When following links or script navigations, we can currently + // render pages from other sites in this SiteInstance. This will eventually + // be fixed, but until then, we should still not set the site of a + // SiteInstance more than once. + DCHECK(!has_site_); + + // Remember that this SiteInstance has been used to load a URL, even if the + // URL is invalid. + has_site_ = true; + site_ = GetSiteForURL(url); + + // Now that we have a site, register it with the BrowsingInstance. This + // ensures that we won't create another SiteInstance for this site within + // the same BrowsingInstance, because all same-site pages within a + // BrowsingInstance can script each other. + browsing_instance_->RegisterSiteInstance(this); +} + +bool SiteInstance::HasRelatedSiteInstance(const GURL& url) { + return browsing_instance_->HasSiteInstance(url); +} + +SiteInstance* SiteInstance::GetRelatedSiteInstance(const GURL& url) { + return browsing_instance_->GetSiteInstanceForURL(url); +} + +/*static*/ +SiteInstance* SiteInstance::CreateSiteInstance(Profile* profile) { + return new SiteInstance(new BrowsingInstance(profile)); +} + +/*static*/ +GURL SiteInstance::GetSiteForURL(const GURL& url) { + // URLs with no host should have an empty site. + GURL site; + + // TODO(creis): For many protocols, we should just treat the scheme as the + // site, since there is no host. e.g., file:, about:, chrome: + + // If the url has a host, then determine the site. + if (url.has_host()) { + // Only keep the scheme and registered domain as given by GetOrigin. This + // may also include a port, which we need to drop. + site = url.GetOrigin(); + + // Remove port, if any. + if (site.has_port()) { + GURL::Replacements rep; + rep.ClearPort(); + site = site.ReplaceComponents(rep); + } + + // If this URL has a registered domain, we only want to remember that part. + std::string domain = + net::RegistryControlledDomainService::GetDomainAndRegistry(url); + if (!domain.empty()) { + GURL::Replacements rep; + rep.SetHostStr(domain); + site = site.ReplaceComponents(rep); + } + } + return site; +} + +/*static*/ +bool SiteInstance::IsSameWebSite(const GURL& url1, const GURL& url2) { + // We infer web site boundaries based on the registered domain name of the + // top-level page and the scheme. We do not pay attention to the port if + // one is present, because pages served from different ports can still + // access each other if they change their document.domain variable. + + // We must treat javascript: URLs as part of the same site, regardless of + // the site. + if (url1.SchemeIs("javascript") || url2.SchemeIs("javascript")) + return true; + + // We treat about:crash, about:hang, and about:shorthang as the same site as + // any URL, since they are used as demos for crashing/hanging a process. + GURL about_crash = GURL("about:crash"); + GURL about_hang = GURL("about:hang"); + GURL about_shorthang = GURL("about:shorthang"); + if (url1 == about_crash || url2 == about_crash || + url1 == about_hang || url2 == about_hang || + url1 == about_shorthang || url2 == about_shorthang) + return true; + + // If either URL is invalid, they aren't part of the same site. + if (!url1.is_valid() || !url2.is_valid()) { + return false; + } + + // If the schemes differ, they aren't part of the same site. + if (url1.scheme() != url2.scheme()) { + return false; + } + + return net::RegistryControlledDomainService::SameDomainOrHost(url1, url2); +} + |