Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(4188)

Unified Diff: chrome/browser/chrome_content_browser_client.cc

Issue 8677026: Update process sharing rules for hosted and isolated apps. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Merge to get ProcessMap fix. Created 9 years ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « no previous file | chrome/browser/extensions/isolated_app_browsertest.cc » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: chrome/browser/chrome_content_browser_client.cc
diff --git a/chrome/browser/chrome_content_browser_client.cc b/chrome/browser/chrome_content_browser_client.cc
index e1fe96c343ddccdad14a5da51b273a0aa44934df..ced30b2b0de1e1383f14e914888dc45ad05f6c6f 100644
--- a/chrome/browser/chrome_content_browser_client.cc
+++ b/chrome/browser/chrome_content_browser_client.cc
@@ -160,8 +160,9 @@ bool HandleWebUI(GURL* url, content::BrowserContext* browser_context) {
// sure URLs are served by hosts with the right set of privileges.
enum RenderProcessHostPrivilege {
PRIV_NORMAL,
- PRIV_EXTENSION,
+ PRIV_HOSTED,
PRIV_ISOLATED,
+ PRIV_EXTENSION,
};
RenderProcessHostPrivilege GetPrivilegeRequiredByUrl(
@@ -178,9 +179,10 @@ RenderProcessHostPrivilege GetPrivilegeRequiredByUrl(
if (url.SchemeIs(chrome::kExtensionScheme)) {
const Extension* extension = service->GetExtensionByURL(url);
- if (extension && extension->is_storage_isolated()) {
+ if (extension && extension->is_storage_isolated())
return PRIV_ISOLATED;
- }
+ if (extension && extension->is_hosted_app())
+ return PRIV_HOSTED;
return PRIV_EXTENSION;
}
@@ -192,8 +194,6 @@ RenderProcessHostPrivilege GetProcessPrivilege(
content::RenderProcessHost* process_host,
extensions::ProcessMap* process_map,
ExtensionService* service) {
- // TODO(aa): It seems like hosted apps should be grouped separately from
- // extensions: crbug.com/102533.
std::set<std::string> extension_ids =
process_map->GetExtensionsInProcess(process_host->GetID());
if (extension_ids.empty())
@@ -204,11 +204,34 @@ RenderProcessHostPrivilege GetProcessPrivilege(
const Extension* extension = service->GetExtensionById(*iter, false);
if (extension && extension->is_storage_isolated())
return PRIV_ISOLATED;
+ if (extension && extension->is_hosted_app())
+ return PRIV_HOSTED;
}
return PRIV_EXTENSION;
}
+bool IsIsolatedAppInProcess(const GURL& site_url,
+ content::RenderProcessHost* process_host,
+ extensions::ProcessMap* process_map,
+ ExtensionService* service) {
+ std::set<std::string> extension_ids =
+ process_map->GetExtensionsInProcess(process_host->GetID());
+ if (extension_ids.empty())
+ return false;
+
+ for (std::set<std::string>::iterator iter = extension_ids.begin();
+ iter != extension_ids.end(); ++iter) {
+ const Extension* extension = service->GetExtensionById(*iter, false);
+ if (extension &&
+ extension->is_storage_isolated() &&
+ extension->url() == site_url)
+ return true;
+ }
+
+ return false;
+}
+
bool CertMatchesFilter(const net::X509Certificate& cert,
const base::DictionaryValue& filter) {
// TODO(markusheintz): This is the minimal required filter implementation.
@@ -436,8 +459,19 @@ bool ChromeContentBrowserClient::IsSuitableHost(
if (command_line.HasSwitch(switches::kEnableStrictSiteIsolation))
return false;
- return GetProcessPrivilege(process_host, process_map, service) ==
+ // An isolated app is only allowed to share with the exact same app in order
+ // to provide complete renderer process isolation. This also works around
+ // issue http://crbug.com/85588, where different isolated apps in the same
+ // process would end up using the first app's storage contexts.
+ RenderProcessHostPrivilege privilege_required =
GetPrivilegeRequiredByUrl(site_url, service);
+ if (privilege_required == PRIV_ISOLATED)
+ return IsIsolatedAppInProcess(site_url, process_host, process_map, service);
+
+ // Otherwise, just make sure the process privilege matches the privilege
+ // required by the site.
+ return GetProcessPrivilege(process_host, process_map, service) ==
+ privilege_required;
}
void ChromeContentBrowserClient::SiteInstanceGotProcess(
« no previous file with comments | « no previous file | chrome/browser/extensions/isolated_app_browsertest.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698