| OLD | NEW |
| 1 // Copyright 2015 The Chromium Authors. All rights reserved. | 1 // Copyright 2015 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "content/browser/mojo/mojo_shell_context.h" | 5 #include "content/browser/mojo/mojo_shell_context.h" |
| 6 | 6 |
| 7 #include <utility> |
| 8 |
| 7 #include "base/lazy_instance.h" | 9 #include "base/lazy_instance.h" |
| 8 #include "base/macros.h" | 10 #include "base/macros.h" |
| 9 #include "base/path_service.h" | 11 #include "base/path_service.h" |
| 10 #include "base/single_thread_task_runner.h" | 12 #include "base/single_thread_task_runner.h" |
| 11 #include "base/thread_task_runner_handle.h" | 13 #include "base/thread_task_runner_handle.h" |
| 12 #include "content/browser/gpu/gpu_process_host.h" | 14 #include "content/browser/gpu/gpu_process_host.h" |
| 13 #include "content/common/gpu/gpu_process_launch_causes.h" | 15 #include "content/common/gpu/gpu_process_launch_causes.h" |
| 14 #include "content/common/process_control.mojom.h" | 16 #include "content/common/process_control.mojom.h" |
| 15 #include "content/public/browser/browser_thread.h" | 17 #include "content/public/browser/browser_thread.h" |
| 16 #include "content/public/browser/content_browser_client.h" | 18 #include "content/public/browser/content_browser_client.h" |
| (...skipping 28 matching lines...) Expand all Loading... |
| 45 const base::string16& process_name, | 47 const base::string16& process_name, |
| 46 bool use_sandbox) { | 48 bool use_sandbox) { |
| 47 UtilityProcessHost* process_host = | 49 UtilityProcessHost* process_host = |
| 48 UtilityProcessHost::Create(nullptr, nullptr); | 50 UtilityProcessHost::Create(nullptr, nullptr); |
| 49 process_host->SetName(process_name); | 51 process_host->SetName(process_name); |
| 50 if (!use_sandbox) | 52 if (!use_sandbox) |
| 51 process_host->DisableSandbox(); | 53 process_host->DisableSandbox(); |
| 52 process_host->StartMojoMode(); | 54 process_host->StartMojoMode(); |
| 53 | 55 |
| 54 ServiceRegistry* services = process_host->GetServiceRegistry(); | 56 ServiceRegistry* services = process_host->GetServiceRegistry(); |
| 55 services->ConnectToRemoteService(request.Pass()); | 57 services->ConnectToRemoteService(std::move(request)); |
| 56 } | 58 } |
| 57 | 59 |
| 58 void OnApplicationLoaded(const GURL& url, bool success) { | 60 void OnApplicationLoaded(const GURL& url, bool success) { |
| 59 if (!success) | 61 if (!success) |
| 60 LOG(ERROR) << "Failed to launch Mojo application for " << url.spec(); | 62 LOG(ERROR) << "Failed to launch Mojo application for " << url.spec(); |
| 61 } | 63 } |
| 62 | 64 |
| 63 // The default loader to use for all applications. This does nothing but drop | 65 // The default loader to use for all applications. This does nothing but drop |
| 64 // the Application request. | 66 // the Application request. |
| 65 class DefaultApplicationLoader : public mojo::shell::ApplicationLoader { | 67 class DefaultApplicationLoader : public mojo::shell::ApplicationLoader { |
| (...skipping 23 matching lines...) Expand all Loading... |
| 89 // mojo::shell::ApplicationLoader: | 91 // mojo::shell::ApplicationLoader: |
| 90 void Load( | 92 void Load( |
| 91 const GURL& url, | 93 const GURL& url, |
| 92 mojo::InterfaceRequest<mojo::Application> application_request) override { | 94 mojo::InterfaceRequest<mojo::Application> application_request) override { |
| 93 ProcessControlPtr process_control; | 95 ProcessControlPtr process_control; |
| 94 auto process_request = mojo::GetProxy(&process_control); | 96 auto process_request = mojo::GetProxy(&process_control); |
| 95 BrowserThread::PostTask(BrowserThread::IO, FROM_HERE, | 97 BrowserThread::PostTask(BrowserThread::IO, FROM_HERE, |
| 96 base::Bind(&StartUtilityProcessOnIOThread, | 98 base::Bind(&StartUtilityProcessOnIOThread, |
| 97 base::Passed(&process_request), | 99 base::Passed(&process_request), |
| 98 process_name_, use_sandbox_)); | 100 process_name_, use_sandbox_)); |
| 99 process_control->LoadApplication(url.spec(), application_request.Pass(), | 101 process_control->LoadApplication(url.spec(), std::move(application_request), |
| 100 base::Bind(&OnApplicationLoaded, url)); | 102 base::Bind(&OnApplicationLoaded, url)); |
| 101 } | 103 } |
| 102 | 104 |
| 103 const base::string16 process_name_; | 105 const base::string16 process_name_; |
| 104 const bool use_sandbox_; | 106 const bool use_sandbox_; |
| 105 | 107 |
| 106 DISALLOW_COPY_AND_ASSIGN(UtilityProcessLoader); | 108 DISALLOW_COPY_AND_ASSIGN(UtilityProcessLoader); |
| 107 }; | 109 }; |
| 108 | 110 |
| 109 // Request ProcessControl from GPU process host. Must be called on IO thread. | 111 // Request ProcessControl from GPU process host. Must be called on IO thread. |
| 110 void RequestGpuProcessControl(mojo::InterfaceRequest<ProcessControl> request) { | 112 void RequestGpuProcessControl(mojo::InterfaceRequest<ProcessControl> request) { |
| 111 BrowserChildProcessHostDelegate* process_host = | 113 BrowserChildProcessHostDelegate* process_host = |
| 112 GpuProcessHost::Get(GpuProcessHost::GPU_PROCESS_KIND_SANDBOXED, | 114 GpuProcessHost::Get(GpuProcessHost::GPU_PROCESS_KIND_SANDBOXED, |
| 113 CAUSE_FOR_GPU_LAUNCH_MOJO_SETUP); | 115 CAUSE_FOR_GPU_LAUNCH_MOJO_SETUP); |
| 114 if (!process_host) { | 116 if (!process_host) { |
| 115 DLOG(ERROR) << "GPU process host not available."; | 117 DLOG(ERROR) << "GPU process host not available."; |
| 116 return; | 118 return; |
| 117 } | 119 } |
| 118 | 120 |
| 119 // TODO(xhwang): It's possible that |process_host| is non-null, but the actual | 121 // TODO(xhwang): It's possible that |process_host| is non-null, but the actual |
| 120 // process is dead. In that case, |request| will be dropped and application | 122 // process is dead. In that case, |request| will be dropped and application |
| 121 // load requests through ProcessControl will also fail. Make sure we handle | 123 // load requests through ProcessControl will also fail. Make sure we handle |
| 122 // these cases correctly. | 124 // these cases correctly. |
| 123 process_host->GetServiceRegistry()->ConnectToRemoteService(request.Pass()); | 125 process_host->GetServiceRegistry()->ConnectToRemoteService( |
| 126 std::move(request)); |
| 124 } | 127 } |
| 125 | 128 |
| 126 // Forwards the load request to the GPU process. | 129 // Forwards the load request to the GPU process. |
| 127 class GpuProcessLoader : public mojo::shell::ApplicationLoader { | 130 class GpuProcessLoader : public mojo::shell::ApplicationLoader { |
| 128 public: | 131 public: |
| 129 GpuProcessLoader() {} | 132 GpuProcessLoader() {} |
| 130 ~GpuProcessLoader() override {} | 133 ~GpuProcessLoader() override {} |
| 131 | 134 |
| 132 private: | 135 private: |
| 133 // mojo::shell::ApplicationLoader: | 136 // mojo::shell::ApplicationLoader: |
| 134 void Load( | 137 void Load( |
| 135 const GURL& url, | 138 const GURL& url, |
| 136 mojo::InterfaceRequest<mojo::Application> application_request) override { | 139 mojo::InterfaceRequest<mojo::Application> application_request) override { |
| 137 ProcessControlPtr process_control; | 140 ProcessControlPtr process_control; |
| 138 auto process_request = mojo::GetProxy(&process_control); | 141 auto process_request = mojo::GetProxy(&process_control); |
| 139 BrowserThread::PostTask( | 142 BrowserThread::PostTask( |
| 140 BrowserThread::IO, FROM_HERE, | 143 BrowserThread::IO, FROM_HERE, |
| 141 base::Bind(&RequestGpuProcessControl, base::Passed(&process_request))); | 144 base::Bind(&RequestGpuProcessControl, base::Passed(&process_request))); |
| 142 process_control->LoadApplication(url.spec(), application_request.Pass(), | 145 process_control->LoadApplication(url.spec(), std::move(application_request), |
| 143 base::Bind(&OnApplicationLoaded, url)); | 146 base::Bind(&OnApplicationLoaded, url)); |
| 144 } | 147 } |
| 145 | 148 |
| 146 DISALLOW_COPY_AND_ASSIGN(GpuProcessLoader); | 149 DISALLOW_COPY_AND_ASSIGN(GpuProcessLoader); |
| 147 }; | 150 }; |
| 148 | 151 |
| 149 } // namespace | 152 } // namespace |
| 150 | 153 |
| 151 // Thread-safe proxy providing access to the shell context from any thread. | 154 // Thread-safe proxy providing access to the shell context from any thread. |
| 152 class MojoShellContext::Proxy { | 155 class MojoShellContext::Proxy { |
| 153 public: | 156 public: |
| 154 Proxy(MojoShellContext* shell_context) | 157 Proxy(MojoShellContext* shell_context) |
| 155 : shell_context_(shell_context), | 158 : shell_context_(shell_context), |
| 156 task_runner_(base::ThreadTaskRunnerHandle::Get()) {} | 159 task_runner_(base::ThreadTaskRunnerHandle::Get()) {} |
| 157 | 160 |
| 158 ~Proxy() {} | 161 ~Proxy() {} |
| 159 | 162 |
| 160 void ConnectToApplication( | 163 void ConnectToApplication( |
| 161 const GURL& url, | 164 const GURL& url, |
| 162 const GURL& requestor_url, | 165 const GURL& requestor_url, |
| 163 mojo::InterfaceRequest<mojo::ServiceProvider> request, | 166 mojo::InterfaceRequest<mojo::ServiceProvider> request, |
| 164 mojo::ServiceProviderPtr exposed_services, | 167 mojo::ServiceProviderPtr exposed_services, |
| 165 const mojo::shell::CapabilityFilter& filter, | 168 const mojo::shell::CapabilityFilter& filter, |
| 166 const mojo::Shell::ConnectToApplicationCallback& callback) { | 169 const mojo::Shell::ConnectToApplicationCallback& callback) { |
| 167 if (task_runner_ == base::ThreadTaskRunnerHandle::Get()) { | 170 if (task_runner_ == base::ThreadTaskRunnerHandle::Get()) { |
| 168 if (shell_context_) { | 171 if (shell_context_) { |
| 169 shell_context_->ConnectToApplicationOnOwnThread( | 172 shell_context_->ConnectToApplicationOnOwnThread( |
| 170 url, requestor_url, request.Pass(), exposed_services.Pass(), filter, | 173 url, requestor_url, std::move(request), std::move(exposed_services), |
| 171 callback); | 174 filter, callback); |
| 172 } | 175 } |
| 173 } else { | 176 } else { |
| 174 // |shell_context_| outlives the main MessageLoop, so it's safe for it to | 177 // |shell_context_| outlives the main MessageLoop, so it's safe for it to |
| 175 // be unretained here. | 178 // be unretained here. |
| 176 task_runner_->PostTask( | 179 task_runner_->PostTask( |
| 177 FROM_HERE, | 180 FROM_HERE, |
| 178 base::Bind(&MojoShellContext::ConnectToApplicationOnOwnThread, | 181 base::Bind(&MojoShellContext::ConnectToApplicationOnOwnThread, |
| 179 base::Unretained(shell_context_), url, requestor_url, | 182 base::Unretained(shell_context_), url, requestor_url, |
| 180 base::Passed(&request), base::Passed(&exposed_services), | 183 base::Passed(&request), base::Passed(&exposed_services), |
| 181 filter, callback)); | 184 filter, callback)); |
| (...skipping 17 matching lines...) Expand all Loading... |
| 199 } | 202 } |
| 200 | 203 |
| 201 MojoShellContext::MojoShellContext() { | 204 MojoShellContext::MojoShellContext() { |
| 202 proxy_.Get().reset(new Proxy(this)); | 205 proxy_.Get().reset(new Proxy(this)); |
| 203 | 206 |
| 204 // Construct with an empty filepath since mojo: urls can't be registered now | 207 // Construct with an empty filepath since mojo: urls can't be registered now |
| 205 // the url scheme registry is locked. | 208 // the url scheme registry is locked. |
| 206 scoped_ptr<mojo::package_manager::PackageManagerImpl> package_manager( | 209 scoped_ptr<mojo::package_manager::PackageManagerImpl> package_manager( |
| 207 new mojo::package_manager::PackageManagerImpl(base::FilePath(), nullptr)); | 210 new mojo::package_manager::PackageManagerImpl(base::FilePath(), nullptr)); |
| 208 application_manager_.reset( | 211 application_manager_.reset( |
| 209 new mojo::shell::ApplicationManager(package_manager.Pass())); | 212 new mojo::shell::ApplicationManager(std::move(package_manager))); |
| 210 | 213 |
| 211 application_manager_->set_default_loader( | 214 application_manager_->set_default_loader( |
| 212 scoped_ptr<mojo::shell::ApplicationLoader>(new DefaultApplicationLoader)); | 215 scoped_ptr<mojo::shell::ApplicationLoader>(new DefaultApplicationLoader)); |
| 213 | 216 |
| 214 StaticApplicationMap apps; | 217 StaticApplicationMap apps; |
| 215 GetContentClient()->browser()->RegisterInProcessMojoApplications(&apps); | 218 GetContentClient()->browser()->RegisterInProcessMojoApplications(&apps); |
| 216 if (g_applications_for_test) { | 219 if (g_applications_for_test) { |
| 217 // Add testing apps to the map, potentially overwriting whatever the | 220 // Add testing apps to the map, potentially overwriting whatever the |
| 218 // browser client registered. | 221 // browser client registered. |
| 219 for (const auto& entry : *g_applications_for_test) | 222 for (const auto& entry : *g_applications_for_test) |
| (...skipping 45 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 265 } | 268 } |
| 266 | 269 |
| 267 // static | 270 // static |
| 268 void MojoShellContext::ConnectToApplication( | 271 void MojoShellContext::ConnectToApplication( |
| 269 const GURL& url, | 272 const GURL& url, |
| 270 const GURL& requestor_url, | 273 const GURL& requestor_url, |
| 271 mojo::InterfaceRequest<mojo::ServiceProvider> request, | 274 mojo::InterfaceRequest<mojo::ServiceProvider> request, |
| 272 mojo::ServiceProviderPtr exposed_services, | 275 mojo::ServiceProviderPtr exposed_services, |
| 273 const mojo::shell::CapabilityFilter& filter, | 276 const mojo::shell::CapabilityFilter& filter, |
| 274 const mojo::Shell::ConnectToApplicationCallback& callback) { | 277 const mojo::Shell::ConnectToApplicationCallback& callback) { |
| 275 proxy_.Get()->ConnectToApplication(url, requestor_url, | 278 proxy_.Get()->ConnectToApplication(url, requestor_url, std::move(request), |
| 276 request.Pass(), exposed_services.Pass(), | 279 std::move(exposed_services), filter, |
| 277 filter, callback); | 280 callback); |
| 278 } | 281 } |
| 279 | 282 |
| 280 void MojoShellContext::ConnectToApplicationOnOwnThread( | 283 void MojoShellContext::ConnectToApplicationOnOwnThread( |
| 281 const GURL& url, | 284 const GURL& url, |
| 282 const GURL& requestor_url, | 285 const GURL& requestor_url, |
| 283 mojo::InterfaceRequest<mojo::ServiceProvider> request, | 286 mojo::InterfaceRequest<mojo::ServiceProvider> request, |
| 284 mojo::ServiceProviderPtr exposed_services, | 287 mojo::ServiceProviderPtr exposed_services, |
| 285 const mojo::shell::CapabilityFilter& filter, | 288 const mojo::shell::CapabilityFilter& filter, |
| 286 const mojo::Shell::ConnectToApplicationCallback& callback) { | 289 const mojo::Shell::ConnectToApplicationCallback& callback) { |
| 287 scoped_ptr<mojo::shell::ConnectToApplicationParams> params( | 290 scoped_ptr<mojo::shell::ConnectToApplicationParams> params( |
| 288 new mojo::shell::ConnectToApplicationParams); | 291 new mojo::shell::ConnectToApplicationParams); |
| 289 params->set_source( | 292 params->set_source( |
| 290 mojo::shell::Identity(requestor_url, std::string(), | 293 mojo::shell::Identity(requestor_url, std::string(), |
| 291 mojo::shell::GetPermissiveCapabilityFilter())); | 294 mojo::shell::GetPermissiveCapabilityFilter())); |
| 292 params->SetTarget(mojo::shell::Identity(url, std::string(), filter)); | 295 params->SetTarget(mojo::shell::Identity(url, std::string(), filter)); |
| 293 params->set_services(request.Pass()); | 296 params->set_services(std::move(request)); |
| 294 params->set_exposed_services(exposed_services.Pass()); | 297 params->set_exposed_services(std::move(exposed_services)); |
| 295 params->set_on_application_end(base::Bind(&base::DoNothing)); | 298 params->set_on_application_end(base::Bind(&base::DoNothing)); |
| 296 params->set_connect_callback(callback); | 299 params->set_connect_callback(callback); |
| 297 application_manager_->ConnectToApplication(params.Pass()); | 300 application_manager_->ConnectToApplication(std::move(params)); |
| 298 } | 301 } |
| 299 | 302 |
| 300 } // namespace content | 303 } // namespace content |
| OLD | NEW |