File: origin_agent_cluster_isolation_state.cc

package info (click to toggle)
chromium 141.0.7390.107-1~deb12u1
  • links: PTS, VCS
  • area: main
  • in suites: bookworm-proposed-updates
  • size: 6,254,812 kB
  • sloc: cpp: 35,264,957; ansic: 7,169,920; javascript: 4,250,185; python: 1,460,636; asm: 950,788; xml: 751,751; pascal: 187,972; sh: 89,459; perl: 88,691; objc: 79,953; sql: 53,924; cs: 44,622; fortran: 24,137; makefile: 22,319; tcl: 15,277; php: 14,018; yacc: 8,995; ruby: 7,553; awk: 3,720; lisp: 3,096; lex: 1,330; ada: 727; jsp: 228; sed: 36
file content (75 lines) | stat: -rw-r--r-- 3,367 bytes parent folder | download | duplicates (3)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
// Copyright 2022 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.

#include "content/browser/origin_agent_cluster_isolation_state.h"

#include "base/feature_list.h"
#include "content/public/browser/content_browser_client.h"
#include "content/public/browser/site_isolation_policy.h"
#include "content/public/common/content_client.h"
#include "content/public/common/content_features.h"
#include "third_party/blink/public/common/features.h"

namespace content {

// static
OriginAgentClusterIsolationState
OriginAgentClusterIsolationState::CreateForDefaultIsolation(
    BrowserContext* context) {
  if (SiteIsolationPolicy::AreOriginAgentClustersEnabledByDefault(context)) {
    // If OAC-by-default is enabled, we also check to see if origin-keyed
    // processes have been enabled as the default.
    bool requires_origin_keyed_process =
        SiteIsolationPolicy::AreOriginKeyedProcessesEnabledByDefault();
    return CreateForOriginAgentCluster(/*had_oac_request=*/false,
                                       requires_origin_keyed_process);
  }
  return CreateNonIsolatedByDefault();
}

// static
OriginAgentClusterIsolationState
OriginAgentClusterIsolationState::CreateForOriginAgentCluster(
    bool had_oac_request,
    bool requires_origin_keyed_process) {
  AgentClusterKey::OACStatus logical_oac_status =
      had_oac_request ? AgentClusterKey::OACStatus::kOriginKeyedByHeader
                      : AgentClusterKey::OACStatus::kOriginKeyedByDefault;
  AgentClusterKey::OACStatus process_isolation_oac_status =
      requires_origin_keyed_process
          ? logical_oac_status
          : AgentClusterKey::OACStatus::kSiteKeyedByDefault;
  return OriginAgentClusterIsolationState(logical_oac_status,
                                          process_isolation_oac_status);
}

OriginAgentClusterIsolationState::OriginAgentClusterIsolationState(
    AgentClusterKey::OACStatus logical_oac_status,
    AgentClusterKey::OACStatus process_isolation_oac_status)
    : logical_oac_status_(logical_oac_status),
      process_isolation_oac_status_(process_isolation_oac_status) {
  // Process isolation can only be requested if logical isolation is enabled.
  CHECK((logical_oac_status_ ==
             AgentClusterKey::OACStatus::kOriginKeyedByHeader ||
         logical_oac_status_ ==
             AgentClusterKey::OACStatus::kOriginKeyedByDefault) ||
        (process_isolation_oac_status_ !=
             AgentClusterKey::OACStatus::kOriginKeyedByHeader &&
         process_isolation_oac_status_ !=
             AgentClusterKey::OACStatus::kOriginKeyedByDefault));

  // Process isolation can only be requested if process isolation for
  // origin-keyed agent clusters is enabled.
  // TODO(crbug.com/40176090): Once SiteInstanceGroups are fully implemented, we
  // should be able to give all OAC origins their own SiteInstance.
  // OriginAgentClusterIsolationState might not need to track process isolation
  // state on top of logical isolation state.
  CHECK(SiteIsolationPolicy::IsProcessIsolationForOriginAgentClusterEnabled() ||
        (process_isolation_oac_status_ !=
             AgentClusterKey::OACStatus::kOriginKeyedByHeader &&
         process_isolation_oac_status_ !=
             AgentClusterKey::OACStatus::kOriginKeyedByDefault));
}

}  // namespace content