| // Copyright 2013 The Chromium Authors |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "content/browser/renderer_host/navigator.h" |
| |
| #include <utility> |
| |
| #include "base/check_op.h" |
| #include "base/debug/dump_without_crashing.h" |
| #include "base/metrics/histogram_macros.h" |
| #include "base/notreached.h" |
| #include "base/strings/strcat.h" |
| #include "base/strings/string_util.h" |
| #include "base/time/time.h" |
| #include "base/types/optional_util.h" |
| #include "content/browser/child_process_security_policy_impl.h" |
| #include "content/browser/process_lock.h" |
| #include "content/browser/renderer_host/debug_urls.h" |
| #include "content/browser/renderer_host/frame_tree.h" |
| #include "content/browser/renderer_host/frame_tree_node.h" |
| #include "content/browser/renderer_host/navigation_controller_impl.h" |
| #include "content/browser/renderer_host/navigation_entry_impl.h" |
| #include "content/browser/renderer_host/navigation_request.h" |
| #include "content/browser/renderer_host/navigation_request_info.h" |
| #include "content/browser/renderer_host/navigation_transitions/navigation_transition_utils.h" |
| #include "content/browser/renderer_host/navigator_delegate.h" |
| #include "content/browser/renderer_host/render_frame_host_delegate.h" |
| #include "content/browser/renderer_host/render_frame_host_impl.h" |
| #include "content/browser/renderer_host/render_view_host_impl.h" |
| #include "content/browser/site_info.h" |
| #include "content/browser/site_instance_impl.h" |
| #include "content/browser/web_package/prefetched_signed_exchange_cache.h" |
| #include "content/browser/webui/web_ui_controller_factory_registry.h" |
| #include "content/browser/webui/web_ui_impl.h" |
| #include "content/common/navigation_params_utils.h" |
| #include "content/public/browser/browser_context.h" |
| #include "content/public/browser/content_browser_client.h" |
| #include "content/public/browser/global_request_id.h" |
| #include "content/public/browser/invalidate_type.h" |
| #include "content/public/browser/navigation_controller.h" |
| #include "content/public/browser/navigation_details.h" |
| #include "content/public/browser/page_navigator.h" |
| #include "content/public/browser/render_view_host.h" |
| #include "content/public/browser/restore_type.h" |
| #include "content/public/common/bindings_policy.h" |
| #include "content/public/common/content_client.h" |
| #include "content/public/common/content_constants.h" |
| #include "content/public/common/url_utils.h" |
| #include "net/base/net_errors.h" |
| #include "services/metrics/public/cpp/ukm_builders.h" |
| #include "services/metrics/public/cpp/ukm_recorder.h" |
| #include "services/metrics/public/cpp/ukm_source_id.h" |
| #include "services/network/public/mojom/url_loader_factory.mojom.h" |
| #include "third_party/blink/public/common/loader/inter_process_time_ticks_converter.h" |
| #include "third_party/blink/public/common/navigation/navigation_policy.h" |
| #include "third_party/blink/public/mojom/navigation/navigation_params.mojom.h" |
| #include "url/gurl.h" |
| #include "url/url_util.h" |
| |
| namespace content { |
| |
| namespace { |
| |
| using WebFeature = blink::mojom::WebFeature; |
| using CrossOriginOpenerPolicyValue = |
| network::mojom::CrossOriginOpenerPolicyValue; |
| using CrossOriginEmbedderPolicyValue = |
| network::mojom::CrossOriginEmbedderPolicyValue; |
| |
| void LogNavigationStartToBeginWithAvoidUnnecessaryBeforeUnloadSync( |
| base::TimeDelta delta) { |
| base::UmaHistogramTimes( |
| "Navigation.NavigationStartToBeginWithAvoidUnnecessaryBeforeUnloadSync", |
| delta); |
| } |
| |
| // Map Cross-Origin-Opener-Policy header value to its corresponding WebFeature. |
| absl::optional<WebFeature> FeatureCoop(CrossOriginOpenerPolicyValue value) { |
| switch (value) { |
| case CrossOriginOpenerPolicyValue::kUnsafeNone: |
| return absl::nullopt; |
| case CrossOriginOpenerPolicyValue::kSameOrigin: |
| return WebFeature::kCrossOriginOpenerPolicySameOrigin; |
| case CrossOriginOpenerPolicyValue::kSameOriginAllowPopups: |
| return WebFeature::kCrossOriginOpenerPolicySameOriginAllowPopups; |
| case CrossOriginOpenerPolicyValue::kRestrictProperties: |
| return WebFeature::kCrossOriginOpenerPolicyRestrictProperties; |
| case CrossOriginOpenerPolicyValue::kSameOriginPlusCoep: |
| case CrossOriginOpenerPolicyValue::kRestrictPropertiesPlusCoep: |
| return WebFeature::kCoopAndCoepIsolated; |
| } |
| } |
| |
| // Map Cross-Origin-Opener-Policy-Report-Only header value to its corresponding |
| // WebFeature. |
| absl::optional<WebFeature> FeatureCoopRO(CrossOriginOpenerPolicyValue value) { |
| switch (value) { |
| case CrossOriginOpenerPolicyValue::kUnsafeNone: |
| return absl::nullopt; |
| case CrossOriginOpenerPolicyValue::kSameOrigin: |
| return WebFeature::kCrossOriginOpenerPolicySameOriginReportOnly; |
| case CrossOriginOpenerPolicyValue::kSameOriginAllowPopups: |
| return WebFeature:: |
| kCrossOriginOpenerPolicySameOriginAllowPopupsReportOnly; |
| case CrossOriginOpenerPolicyValue::kRestrictProperties: |
| return WebFeature::kCrossOriginOpenerPolicyRestrictPropertiesReportOnly; |
| case CrossOriginOpenerPolicyValue::kSameOriginPlusCoep: |
| case CrossOriginOpenerPolicyValue::kRestrictPropertiesPlusCoep: |
| return WebFeature::kCoopAndCoepIsolatedReportOnly; |
| } |
| } |
| |
| // Map Cross-Origin-Embedder-Policy header value to its |
| // corresponding WebFeature. |
| absl::optional<WebFeature> FeatureCoep(CrossOriginEmbedderPolicyValue value) { |
| switch (value) { |
| case CrossOriginEmbedderPolicyValue::kNone: |
| return absl::nullopt; |
| case CrossOriginEmbedderPolicyValue::kCredentialless: |
| return WebFeature::kCrossOriginEmbedderPolicyCredentialless; |
| case CrossOriginEmbedderPolicyValue::kRequireCorp: |
| return WebFeature::kCrossOriginEmbedderPolicyRequireCorp; |
| } |
| } |
| |
| // Map Cross-Origin-Embedder-Policy-Report-Only header value to its |
| // corresponding WebFeature. |
| absl::optional<WebFeature> FeatureCoepRO(CrossOriginEmbedderPolicyValue value) { |
| switch (value) { |
| case CrossOriginEmbedderPolicyValue::kNone: |
| return absl::nullopt; |
| case CrossOriginEmbedderPolicyValue::kCredentialless: |
| return WebFeature::kCrossOriginEmbedderPolicyCredentiallessReportOnly; |
| case CrossOriginEmbedderPolicyValue::kRequireCorp: |
| return WebFeature::kCrossOriginEmbedderPolicyRequireCorpReportOnly; |
| } |
| } |
| |
| ukm::SourceId GetPageUkmSourceId(RenderFrameHost& rfh) { |
| // RenderFrameHost::GetPageUkmSourceId does not support being called in the |
| // prerendering state, because our data collection policy disallows collecting |
| // UKMs while prerendering. This function changes calls within Navigator to |
| // use kInvalidSourceId in this state, since most other callers outside |
| // Navigator can avoid the call during prerendering. |
| // If a future use case needs a UKM during prerendering, please see |
| // //content/browser/preloading/prerender/README.md and consult the Prerender |
| // team. |
| if (rfh.IsInLifecycleState(RenderFrameHost::LifecycleState::kPrerendering)) { |
| return ukm::kInvalidSourceId; |
| } |
| return rfh.GetPageUkmSourceId(); |
| } |
| |
| // TODO(titouan): Move the feature computation logic into `NavigationRequest`, |
| // and use `NavigationRequest::TakeWebFeatureToLog()` to record them later. |
| void RecordWebPlatformSecurityMetrics(RenderFrameHostImpl* rfh, |
| bool has_embedding_control, |
| bool is_error_page) { |
| ContentBrowserClient* client = GetContentClient()->browser(); |
| |
| auto log = [&](absl::optional<WebFeature> feature) { |
| if (feature) |
| client->LogWebFeatureForCurrentPage(rfh, feature.value()); |
| }; |
| |
| // [COOP] |
| if (rfh->IsInPrimaryMainFrame()) { |
| log(FeatureCoop(rfh->cross_origin_opener_policy().value)); |
| log(FeatureCoopRO(rfh->cross_origin_opener_policy().report_only_value)); |
| |
| if (rfh->cross_origin_opener_policy().reporting_endpoint || |
| rfh->cross_origin_opener_policy().report_only_reporting_endpoint) { |
| log(WebFeature::kCrossOriginOpenerPolicyReporting); |
| } |
| } |
| |
| // [COEP] |
| log(FeatureCoep(rfh->cross_origin_embedder_policy().value)); |
| log(FeatureCoepRO(rfh->cross_origin_embedder_policy().report_only_value)); |
| |
| // Record iframes embedded in cross-origin contexts without a CSP |
| // frame-ancestor directive. |
| bool is_embedded_in_cross_origin_context = false; |
| RenderFrameHostImpl* parent = rfh->GetParent(); |
| while (parent) { |
| if (!parent->GetLastCommittedOrigin().IsSameOriginWith( |
| rfh->GetLastCommittedOrigin())) { |
| is_embedded_in_cross_origin_context = true; |
| break; |
| } |
| parent = parent->GetParent(); |
| } |
| |
| if (is_embedded_in_cross_origin_context && !has_embedding_control && |
| !is_error_page) { |
| log(WebFeature::kCrossOriginSubframeWithoutEmbeddingControl); |
| RenderFrameHostImpl* main_frame = rfh->GetMainFrame(); |
| ukm::builders::CrossOriginSubframeWithoutEmbeddingControl( |
| GetPageUkmSourceId(*main_frame)) |
| .SetSubframeEmbedded(1) |
| .Record(ukm::UkmRecorder::Get()); |
| } |
| |
| // Record whether <iframe> with the credentialless attribute contains |
| // sandboxed document or not. Please note: |
| // - This is recorded once for every new document in the iframe. |
| // - It excludes nested document that are credentialless only by inheritance. |
| // - It would have been better to take a snapshot of the frame.credentialless |
| // attribute at the beginning of the navigation, as opposed to when the |
| // new document has been created, because it might have changed. Still, it |
| // is good enough, a priori. |
| if (rfh->frame_tree_node()->Credentialless()) { |
| base::UmaHistogramBoolean( |
| "Navigation.AnonymousIframeIsSandboxed", |
| rfh->active_sandbox_flags() != network::mojom::WebSandboxFlags::kNone); |
| } |
| |
| // Webview tag guests do not follow regular process model decisions. They |
| // always stay in their original SiteInstance, regardless of COOP. Assumption |
| // made below about COOP:same-origin and unsafe-none never being in the same |
| // BrowsingInstance does not hold. See https://crbug.com/1243711. |
| if (rfh->GetSiteInstance()->IsGuest()) |
| return; |
| |
| // Check if the navigation resulted in having same-origin documents in pages |
| // with different COOP status inside the browsing context group. |
| RenderFrameHostImpl* top_level_document = |
| rfh->frame_tree_node()->frame_tree().GetMainFrame(); |
| network::mojom::CrossOriginOpenerPolicyValue page_coop = |
| top_level_document->cross_origin_opener_policy().value; |
| for (RenderFrameHostImpl* other_tld : |
| rfh->delegate()->GetActiveTopLevelDocumentsInBrowsingContextGroup(rfh)) { |
| network::mojom::CrossOriginOpenerPolicyValue other_page_coop = |
| other_tld->cross_origin_opener_policy().value; |
| if (page_coop == other_page_coop) |
| continue; |
| |
| using CoopValue = network::mojom::CrossOriginOpenerPolicyValue; |
| DCHECK((page_coop == CoopValue::kSameOriginAllowPopups && |
| other_page_coop == CoopValue::kUnsafeNone) || |
| (page_coop == CoopValue::kUnsafeNone && |
| other_page_coop == CoopValue::kSameOriginAllowPopups)); |
| for (FrameTreeNode* frame_tree_node : |
| other_tld->frame_tree_node()->frame_tree().Nodes()) { |
| RenderFrameHostImpl* other_rfh = frame_tree_node->current_frame_host(); |
| if (other_rfh->lifecycle_state() == |
| RenderFrameHostImpl::LifecycleStateImpl::kActive && |
| rfh->GetLastCommittedOrigin().IsSameOriginWith( |
| other_rfh->GetLastCommittedOrigin())) { |
| // Always log the feature on the COOP same-origin-allow-popups page, |
| // since this is the spec we are trying to change. |
| RenderFrameHostImpl* rfh_to_log = |
| page_coop == CoopValue::kSameOriginAllowPopups ? rfh : other_rfh; |
| client->LogWebFeatureForCurrentPage( |
| rfh_to_log, blink::mojom::WebFeature:: |
| kSameOriginDocumentsWithDifferentCOOPStatus); |
| } |
| } |
| } |
| } |
| |
| // Records the fact that `rfh` made use of `web_features`. |
| void RecordMetrics(RenderFrameHostImpl& rfh, |
| const std::vector<blink::mojom::WebFeature>& web_features) { |
| ContentBrowserClient& client = *GetContentClient()->browser(); |
| for (const auto feature : web_features) { |
| client.LogWebFeatureForCurrentPage(&rfh, feature); |
| } |
| } |
| |
| bool HasEmbeddingControl(NavigationRequest* navigation_request) { |
| if (!navigation_request->response()) |
| // This navigation did not result in a network request. The embedding of |
| // the frame is not controlled by network headers. |
| return true; |
| |
| // Check if the request has a CSP frame-ancestor directive. |
| for (const auto& csp : navigation_request->response() |
| ->parsed_headers->content_security_policy) { |
| if (csp->header->type == |
| network::mojom::ContentSecurityPolicyType::kEnforce && |
| csp->directives.contains( |
| network::mojom::CSPDirectiveName::FrameAncestors)) { |
| return true; |
| } |
| } |
| |
| return false; |
| } |
| |
| } // namespace |
| |
| struct Navigator::NavigationMetricsData { |
| NavigationMetricsData(base::TimeTicks start_time, |
| GURL url, |
| ukm::SourceId ukm_source_id, |
| bool is_browser_initiated_before_unload) |
| : start_time_(start_time), |
| url_(url), |
| ukm_source_id_(ukm_source_id), |
| is_browser_initiated_before_unload_( |
| is_browser_initiated_before_unload) {} |
| |
| base::TimeTicks start_time_; |
| GURL url_; |
| ukm::SourceId ukm_source_id_; |
| bool is_browser_initiated_before_unload_; |
| |
| // Timestamps before_unload_(start|end)_ give the time it took to run |
| // beforeunloads dispatched from the browser process. For browser-initiated |
| // navigations this includes all frames (all beforeunload handlers on a page). |
| // For renderer-initiated navigations this just includes OOPIFs since local |
| // beforeunloads will have been run in the renderer before dispatching the |
| // navigation IPC. |
| absl::optional<base::TimeTicks> before_unload_start_; |
| absl::optional<base::TimeTicks> before_unload_end_; |
| |
| // Time at which the browser process received a navigation request and |
| // dispatched beforeunloads to the renderer. |
| absl::optional<base::TimeTicks> before_unload_sent_; |
| |
| // Timestamps renderer_before_unload_(start|end)_ give the time it took to run |
| // beforeunloads for local frames in a renderer-initiated navigation, prior to |
| // notifying the browser process about the navigation. |
| absl::optional<base::TimeTicks> renderer_before_unload_start_; |
| absl::optional<base::TimeTicks> renderer_before_unload_end_; |
| |
| // Time at which the browser process dispatched the CommitNavigation to the |
| // renderer. |
| absl::optional<base::TimeTicks> commit_navigation_sent_; |
| }; |
| |
| Navigator::Navigator( |
| BrowserContext* browser_context, |
| FrameTree& frame_tree, |
| NavigatorDelegate* delegate, |
| NavigationControllerDelegate* navigation_controller_delegate) |
| : controller_(browser_context, frame_tree, navigation_controller_delegate), |
| delegate_(delegate) {} |
| |
| Navigator::~Navigator() = default; |
| |
| // static |
| bool Navigator::CheckWebUIRendererDoesNotDisplayNormalURL( |
| RenderFrameHostImpl* render_frame_host, |
| const UrlInfo& url_info, |
| bool is_renderer_initiated_check) { |
| const GURL& url = url_info.url; |
| // In single process mode, everything runs in the same process, so the checks |
| // below are irrelevant. |
| if (RenderProcessHost::run_renderer_in_process()) |
| return true; |
| |
| // In the case of error page process, any URL is allowed to commit. |
| ProcessLock process_lock = render_frame_host->GetProcess()->GetProcessLock(); |
| if (process_lock.is_error_page()) |
| return true; |
| |
| bool frame_has_bindings = ((render_frame_host->GetEnabledBindings() & |
| kWebUIBindingsPolicyMask) != 0); |
| bool is_allowed_in_web_ui_renderer = |
| WebUIControllerFactoryRegistry::GetInstance()->IsURLAcceptableForWebUI( |
| render_frame_host->GetProcess()->GetBrowserContext(), url); |
| |
| // Embedders might disable locking for WebUI URLs, which is bad idea, however |
| // this method should take this into account. |
| SiteInstanceImpl* site_instance = render_frame_host->GetSiteInstance(); |
| SiteInfo site_info = site_instance->DeriveSiteInfo(url_info); |
| bool should_lock_process = |
| site_info.ShouldLockProcessToSite(site_instance->GetIsolationContext()); |
| |
| // If the |render_frame_host| has any WebUI bindings, disallow URLs that are |
| // not allowed in a WebUI renderer process. |
| if (frame_has_bindings) { |
| // The process itself must have WebUI bit in the security policy. |
| // Otherwise it indicates that there is a bug in browser process logic and |
| // the browser process must be terminated. |
| // TODO(nasko): Convert to CHECK() once it is confirmed this is not |
| // violated in reality. |
| if (!ChildProcessSecurityPolicyImpl::GetInstance()->HasWebUIBindings( |
| render_frame_host->GetProcess()->GetID())) { |
| base::debug::DumpWithoutCrashing(); |
| } |
| |
| // Check whether the process must be locked and if so that the process lock |
| // is indeed in place. |
| if (should_lock_process && !process_lock.is_locked_to_site()) |
| return false; |
| |
| // There must be a WebUI on the frame. |
| if (!render_frame_host->web_ui()) |
| return false; |
| |
| // The |url| must be allowed in a WebUI process if the frame has WebUI. |
| if (!is_allowed_in_web_ui_renderer) { |
| // If this method is called in response to IPC message from the renderer |
| // process, it should be terminated, otherwise it is a bug in the |
| // navigation logic and the browser process should be terminated to avoid |
| // exposing users to security issues. |
| if (is_renderer_initiated_check) |
| return false; |
| |
| CHECK(false); |
| } |
| } |
| |
| // If `url` is one that is allowed in WebUI renderer process, ensure that its |
| // origin is either opaque or its process lock matches the RFH process lock. |
| // As an example, the origin may be opaque if a WebUI navigation resulted in |
| // an error page. |
| // |
| // TODO(alexmos): Currently, `is_allowed_in_web_ui_renderer` is unexpectedly |
| // true for about:blank and renderer debug URLs, even when they commit with |
| // an origin that is not allowed into a WebUI renderer. For now, these cases |
| // are also skipped via the origin opaqueness check, but |
| // `is_allowed_in_web_ui_renderer` should be strengthened to not be true in |
| // this case so that the checks above also apply. See |
| // https://crbug.com/1320402. |
| if (is_allowed_in_web_ui_renderer) { |
| // Verify `site_info`'s process lock matches the RFH's process lock, if one |
| // is in place. |
| if (should_lock_process) { |
| if (!url::Origin::Create(url).opaque() && |
| process_lock != ProcessLock::FromSiteInfo(site_info)) { |
| return false; |
| } |
| } |
| } |
| |
| return true; |
| } |
| |
| // A renderer-initiated navigation should be ignored iff a) there is an ongoing |
| // request b) which is browser initiated or a history traversal and c) the |
| // renderer request is not user-initiated. |
| // Renderer-initiated history traversals cause navigations to be ignored for |
| // compatibility reasons - this behavior is asserted by several web platform |
| // tests. |
| // static |
| bool Navigator::ShouldIgnoreIncomingRendererRequest( |
| const NavigationRequest* ongoing_navigation_request, |
| bool has_user_gesture) { |
| return ongoing_navigation_request && |
| (ongoing_navigation_request->browser_initiated() || |
| NavigationTypeUtils::IsHistory( |
| ongoing_navigation_request->common_params().navigation_type)) && |
| !has_user_gesture; |
| } |
| |
| NavigatorDelegate* Navigator::GetDelegate() { |
| return delegate_; |
| } |
| |
| bool Navigator::StartHistoryNavigationInNewSubframe( |
| RenderFrameHostImpl* render_frame_host, |
| mojo::PendingAssociatedRemote<mojom::NavigationClient>* navigation_client, |
| blink::LocalFrameToken initiator_frame_token, |
| int initiator_process_id) { |
| return controller_.StartHistoryNavigationInNewSubframe( |
| render_frame_host, navigation_client, initiator_frame_token, |
| initiator_process_id); |
| } |
| |
| void Navigator::DidNavigate( |
| RenderFrameHostImpl* render_frame_host, |
| const mojom::DidCommitProvisionalLoadParams& params, |
| std::unique_ptr<NavigationRequest> navigation_request, |
| bool was_within_same_document) { |
| DCHECK(navigation_request); |
| FrameTreeNode* frame_tree_node = render_frame_host->frame_tree_node(); |
| FrameTree& frame_tree = frame_tree_node->frame_tree(); |
| DCHECK_EQ(&frame_tree, &controller_.frame_tree()); |
| base::WeakPtr<RenderFrameHostImpl> old_frame_host = |
| frame_tree_node->render_manager()->current_frame_host()->GetWeakPtr(); |
| |
| // Save the activation status of the previous page here before it gets reset |
| // in FrameTreeNode::ResetForNavigation. |
| bool previous_document_was_activated = |
| frame_tree.root()->HasStickyUserActivation(); |
| |
| if (auto& old_page_info = navigation_request->commit_params().old_page_info) { |
| // This is a same-site main-frame navigation where we did a proactive |
| // BrowsingInstance swap but we're reusing the old page's process, and we |
| // have dispatched the pagehide and visibilitychange handlers of the old |
| // page when we committed the new page. |
| auto* page_lifecycle_state_manager = |
| old_frame_host->render_view_host()->GetPageLifecycleStateManager(); |
| page_lifecycle_state_manager->DidSetPagehideDispatchDuringNewPageCommit( |
| std::move(old_page_info->new_lifecycle_state_for_old_page)); |
| } |
| |
| // If a frame claims the navigation was same-document, it must be the current |
| // frame, not a pending one. |
| if (was_within_same_document && render_frame_host != old_frame_host.get()) { |
| was_within_same_document = false; |
| } |
| |
| // This is the last point where the browser still embeds the `viz::Surface` of |
| // the old page. The next `WebContentsImpl::DidNavigateMainFramePreCommit()` |
| // will hide the old View, and the |
| // `RenderFrameHostManager::DidNavigateFrame()` will subsequently unload the |
| // old page and show the new View. |
| // |
| // TODO(https://crbug.com/1473327): Move this into |
| // `RenderFrameHostManager::CommitPending` to accommodate both regular |
| // navigations and early-commit. |
| NavigationTransitionUtils::CaptureNavigationEntryScreenshot( |
| *navigation_request); |
| |
| if (ui::PageTransitionIsMainFrame(params.transition)) { |
| // Run tasks that must execute just before the commit. |
| delegate_->DidNavigateMainFramePreCommit(frame_tree_node, |
| was_within_same_document); |
| } |
| |
| // The current RenderFrameHost might change after the call below if a |
| // RenderFrameHost swap happens, so save the current RenderFrameHost's id in |
| // the NavigationRequest. |
| navigation_request->set_previous_render_frame_host_id( |
| old_frame_host->GetGlobalId()); |
| |
| // DidNavigateFrame() must be called before replicating the new origin and |
| // other properties to proxies. This is because it destroys the subframes of |
| // the frame we're navigating from, which might trigger those subframes to |
| // run unload handlers. Those unload handlers should still see the old |
| // frame's origin. See https://crbug.com/825283. |
| frame_tree_node->render_manager()->DidNavigateFrame( |
| render_frame_host, navigation_request->common_params().has_user_gesture, |
| was_within_same_document, |
| navigation_request->browsing_context_group_swap() |
| .ShouldClearProxiesOnCommit(), |
| navigation_request->commit_params().frame_policy); |
| |
| // Save the new page's origin and other properties, and replicate them to |
| // proxies, including the proxy created in DidNavigateFrame() to replace the |
| // old frame in cross-process navigation cases. |
| render_frame_host->browsing_context_state()->SetCurrentOrigin( |
| params.origin, params.has_potentially_trustworthy_unique_origin); |
| render_frame_host->browsing_context_state()->SetInsecureRequestPolicy( |
| params.insecure_request_policy); |
| render_frame_host->browsing_context_state()->SetInsecureNavigationsSet( |
| params.insecure_navigations_set); |
| |
| if (!was_within_same_document) { |
| // Navigating to a new location means a new, fresh set of http headers |
| // and/or <meta> elements - we need to reset Permissions Policy. |
| frame_tree_node->ResetForNavigation(); |
| } |
| |
| // If the committing URL requires the SiteInstance's site to be assigned, |
| // that site assignment should've already happened at ReadyToCommit time. We |
| // should never get here with a SiteInstance that doesn't have a site |
| // assigned in that case. |
| SiteInstanceImpl* site_instance = render_frame_host->GetSiteInstance(); |
| const UrlInfo& url_info = navigation_request->GetUrlInfo(); |
| if (!site_instance->HasSite() && |
| SiteInstanceImpl::ShouldAssignSiteForUrlInfo(url_info)) { |
| NOTREACHED() << "SiteInstance should have already set a site: " |
| << params.url; |
| // TODO(alexmos): convert this to a CHECK and remove the fallback call to |
| // ConvertToDefaultOrSetSite() after verifying that this doesn't happen in |
| // practice. |
| base::debug::DumpWithoutCrashing(); |
| site_instance->ConvertToDefaultOrSetSite(url_info); |
| } |
| |
| // Need to update MIME type here because it's referred to in |
| // UpdateNavigationCommands() called by RendererDidNavigate() to |
| // determine whether or not to enable the encoding menu. |
| // It's updated only for the main frame. For a subframe, |
| // RenderView::UpdateURL does not set params.contents_mime_type. |
| // (see http://code.google.com/p/chromium/issues/detail?id=2929 ) |
| // TODO(jungshik): Add a test for the encoding menu to avoid |
| // regressing it again. |
| // TODO(nasko): Verify the correctness of the above comment, since some of the |
| // code doesn't exist anymore. Also, move this code in the |
| // PageTransitionIsMainFrame code block above. |
| if (ui::PageTransitionIsMainFrame(params.transition)) { |
| render_frame_host->GetPage().SetContentsMimeType(params.contents_mime_type); |
| } |
| |
| // RenderFrameHostImpl::DidNavigate will update the url, and may cause the |
| // node to consider itself no longer on the initial empty document. Record |
| // whether we're leaving the initial empty document before that. |
| bool was_on_initial_empty_document = |
| frame_tree_node->is_on_initial_empty_document(); |
| |
| render_frame_host->DidNavigate(params, navigation_request.get(), |
| was_within_same_document); |
| |
| int old_entry_count = controller_.GetEntryCount(); |
| LoadCommittedDetails details; |
| base::TimeTicks start = base::TimeTicks::Now(); |
| bool did_navigate = controller_.RendererDidNavigate( |
| render_frame_host, params, &details, was_within_same_document, |
| was_on_initial_empty_document, previous_document_was_activated, |
| navigation_request.get()); |
| if (!was_within_same_document) { |
| base::UmaHistogramTimes( |
| base::StrCat( |
| {"Navigation.RendererDidNavigateTime.", |
| render_frame_host->GetParent() ? "Subframe" : "MainFrame"}), |
| base::TimeTicks::Now() - start); |
| } |
| |
| // Update the RenderFrameHost's last committed FrameNavigationEntry, to have a |
| // record of it in rare cases where the last committed NavigationEntry may not |
| // agree. Always update this even if the FrameNavigationEntry is null after |
| // RendererDidNavigate, to ensure that a stale copy is not kept around. |
| // TODO(https://crbug.com/608402): Eliminate cases where the |
| // FrameNavigationEntry can be null after RendererDidNavigate. |
| // TODO(https://crbug.com/1304466): Merge this with |
| // RenderFrameHostImpl::DidNavigate if that can be moved after |
| // RendererDidNavigate, allowing us to avoid duplicating the URL and origin in |
| // RenderFrameHost. |
| FrameNavigationEntry* frame_entry = nullptr; |
| if (controller_.GetLastCommittedEntry()) { |
| frame_entry = |
| controller_.GetLastCommittedEntry()->GetFrameEntry(frame_tree_node); |
| } |
| render_frame_host->set_last_committed_frame_entry(frame_entry); |
| |
| // If the history length and/or offset changed, update other renderers in the |
| // FrameTree. |
| if (old_entry_count != controller_.GetEntryCount() || |
| details.previous_entry_index != |
| controller_.GetLastCommittedEntryIndex()) { |
| frame_tree.root()->render_manager()->ExecutePageBroadcastMethod( |
| base::BindRepeating( |
| [](int history_offset, int history_count, RenderViewHostImpl* rvh) { |
| if (auto& broadcast = rvh->GetAssociatedPageBroadcast()) |
| broadcast->SetHistoryOffsetAndLength(history_offset, |
| history_count); |
| }, |
| controller_.GetLastCommittedEntryIndex(), |
| controller_.GetEntryCount()), |
| site_instance->group()); |
| } |
| |
| // If this was the navigation of a top-level frame to another browsing context |
| // group, update the browsing context group in all the renderers that have a |
| // representation of this page. Do not update the page in the main frame's own |
| // process, as it was already updated during commit. |
| // TODO(https://crbug.com/1446696): See if that can be consolidated with other |
| // similar IPCs. |
| if (render_frame_host->is_main_frame() && |
| navigation_request->browsing_context_group_swap().ShouldSwap()) { |
| SiteInstanceImpl* final_site_instance = |
| render_frame_host->GetSiteInstance(); |
| blink::BrowsingContextGroupInfo browsing_context_group_info( |
| final_site_instance->browsing_instance_token(), |
| final_site_instance->coop_related_group_token()); |
| frame_tree.root()->render_manager()->ExecutePageBroadcastMethod( |
| base::BindRepeating( |
| [](const blink::BrowsingContextGroupInfo& info, |
| RenderViewHostImpl* rvh) { |
| if (auto& broadcast = rvh->GetAssociatedPageBroadcast()) { |
| broadcast->UpdatePageBrowsingContextGroup(info); |
| } |
| }, |
| browsing_context_group_info), |
| final_site_instance->group()); |
| } |
| |
| // Store some information for recording WebPlatform security metrics. These |
| // metrics depends on information present in the NavigationRequest. However |
| // they must be recorded after the NavigationRequest has been destroyed and |
| // DidFinishNavigation was called, otherwise they will not be properly |
| // attributed to the right page. |
| bool has_embedding_control = HasEmbeddingControl(navigation_request.get()); |
| bool is_error_page = navigation_request->IsErrorPage(); |
| const GURL original_request_url = navigation_request->GetOriginalRequestURL(); |
| |
| // Get the list of web features that the navigating document made use of |
| // before it could commit. We attribute these to the new document once it |
| // has committed. |
| std::vector<blink::mojom::WebFeature> web_features = |
| navigation_request->TakeWebFeaturesToLog(); |
| |
| // Navigations that activate an existing bfcached or prerendered document do |
| // not create a new document. |
| bool did_create_new_document = |
| !navigation_request->IsPageActivation() && !was_within_same_document; |
| |
| // Send notification about committed provisional loads. This notification is |
| // different from the NAV_ENTRY_COMMITTED notification which doesn't include |
| // the actual URL navigated to. |
| DCHECK(delegate_); |
| DCHECK_EQ(!render_frame_host->GetParent(), |
| did_navigate ? details.is_main_frame : false); |
| navigation_request->DidCommitNavigation(params, did_navigate, |
| details.did_replace_entry, |
| details.previous_main_frame_url); |
| |
| // Dispatch PrimaryPageChanged notification when a main frame |
| // non-same-document navigation changes the current Page in the FrameTree. |
| // |
| // We do this here to ensure that this navigation has updated all relevant |
| // properties of RenderFrameHost / Page / Navigation Controller / Navigation |
| // Request (e.g. `RenderFrameHost::GetLastCommittedURL`, |
| // `NavigationRequest::GetHttpStatusCode`) before notifying the observers. |
| // TODO(crbug.com/1275933): Don't dispatch PrimaryPageChanged for initial |
| // empty document navigations. |
| if (!was_within_same_document && render_frame_host->is_main_frame()) { |
| render_frame_host->GetPage().NotifyPageBecameCurrent(); |
| |
| // Finally reset the `navigation_request` after navigation commit and all |
| // NavigationRequest usages. |
| navigation_request.reset(); |
| } |
| |
| if (did_create_new_document) { |
| RecordWebPlatformSecurityMetrics(render_frame_host, has_embedding_control, |
| is_error_page); |
| RecordMetrics(*render_frame_host, web_features); |
| } |
| |
| if (!did_navigate) |
| return; // No navigation happened. |
| |
| // DO NOT ADD MORE STUFF TO THIS FUNCTION! Your component should either listen |
| // for the appropriate notification (best) or you can add it to |
| // DidNavigateMainFramePostCommit / DidNavigateAnyFramePostCommit (only if |
| // necessary, please). |
| |
| // TODO(carlosk): Move this out. |
| RecordNavigationMetrics(details, params, site_instance, original_request_url); |
| |
| // Now that something has committed, we don't need to track whether the |
| // initial page has been accessed. |
| frame_tree.ResetHasAccessedInitialMainDocument(); |
| |
| // Run post-commit tasks. |
| if (details.is_main_frame) |
| delegate_->DidNavigateMainFramePostCommit(render_frame_host, details); |
| |
| delegate_->DidNavigateAnyFramePostCommit(render_frame_host, details); |
| } |
| |
| void Navigator::Navigate(std::unique_ptr<NavigationRequest> request, |
| ReloadType reload_type) { |
| TRACE_EVENT0("browser,navigation", "Navigator::Navigate"); |
| TRACE_EVENT_INSTANT_WITH_TIMESTAMP0( |
| "navigation,rail", "NavigationTiming navigationStart", |
| TRACE_EVENT_SCOPE_GLOBAL, request->common_params().navigation_start); |
| |
| FrameTreeNode* frame_tree_node = request->frame_tree_node(); |
| DCHECK_EQ(&(frame_tree_node->frame_tree()), &controller_.frame_tree()); |
| |
| metrics_data_ = std::make_unique<NavigationMetricsData>( |
| request->common_params().navigation_start, request->common_params().url, |
| GetPageUkmSourceId(*frame_tree_node->current_frame_host()), |
| true /* is_browser_initiated_before_unload */); |
| |
| // Check if the BeforeUnload event needs to execute before assigning the |
| // NavigationRequest to the FrameTreeNode. Assigning it to the FrameTreeNode |
| // has the side effect of initializing the current RenderFrameHost, which will |
| // return that it should execute the BeforeUnload event (even though we don't |
| // need to wait for it in the case of a brand new RenderFrameHost). |
| // |
| // We don't want to dispatch a beforeunload handler if |
| // is_history_navigation_in_new_child is true. This indicates a newly created |
| // child frame which does not have a beforeunload handler. |
| bool no_dispatch_because_avoid_unnecessary_sync = false; |
| bool should_dispatch_beforeunload = |
| !NavigationTypeUtils::IsSameDocument( |
| request->common_params().navigation_type) && |
| !request->common_params().is_history_navigation_in_new_child_frame && |
| frame_tree_node->current_frame_host()->ShouldDispatchBeforeUnload( |
| false /* check_subframes_only */, |
| &no_dispatch_because_avoid_unnecessary_sync); |
| |
| int nav_entry_id = request->nav_entry_id(); |
| bool is_pending_entry = |
| controller_.GetPendingEntry() && |
| (nav_entry_id == controller_.GetPendingEntry()->GetUniqueID()); |
| frame_tree_node->TakeNavigationRequest(std::move(request)); |
| DCHECK(frame_tree_node->navigation_request()); |
| |
| // Have the current renderer execute its beforeunload event if needed. If it |
| // is not needed then NavigationRequest::BeginNavigation should be directly |
| // called instead. |
| if (should_dispatch_beforeunload) { |
| frame_tree_node->navigation_request()->SetWaitingForRendererResponse(); |
| frame_tree_node->current_frame_host()->DispatchBeforeUnload( |
| RenderFrameHostImpl::BeforeUnloadType::BROWSER_INITIATED_NAVIGATION, |
| reload_type != ReloadType::NONE); |
| } else { |
| if (no_dispatch_because_avoid_unnecessary_sync) { |
| LogNavigationStartToBeginWithAvoidUnnecessaryBeforeUnloadSync( |
| base::TimeTicks::Now() - frame_tree_node->navigation_request() |
| ->common_params() |
| .navigation_start); |
| } |
| frame_tree_node->navigation_request()->BeginNavigation(); |
| // WARNING: The NavigationRequest might have been destroyed in |
| // BeginNavigation(). Do not use |frame_tree_node->navigation_request()| |
| // after this point without null checking it first. |
| } |
| |
| // Make sure no code called via RFH::Navigate clears the pending entry. |
| if (is_pending_entry) |
| CHECK_EQ(nav_entry_id, controller_.GetPendingEntry()->GetUniqueID()); |
| } |
| |
| void Navigator::RequestOpenURL( |
| RenderFrameHostImpl* render_frame_host, |
| const GURL& url, |
| const blink::LocalFrameToken* initiator_frame_token, |
| int initiator_process_id, |
| const absl::optional<url::Origin>& initiator_origin, |
| const absl::optional<GURL>& initiator_base_url, |
| const scoped_refptr<network::ResourceRequestBody>& post_body, |
| const std::string& extra_headers, |
| const Referrer& referrer, |
| WindowOpenDisposition disposition, |
| bool should_replace_current_entry, |
| bool user_gesture, |
| blink::mojom::TriggeringEventInfo triggering_event_info, |
| const std::string& href_translate, |
| scoped_refptr<network::SharedURLLoaderFactory> blob_url_loader_factory, |
| const absl::optional<blink::Impression>& impression) { |
| // Note: This can be called for subframes (even when OOPIFs are not possible) |
| // if the disposition calls for a different window. |
| |
| // Only the current RenderFrameHost should be sending an OpenURL request. |
| // Pending RenderFrameHost should know where it is navigating and pending |
| // deletion RenderFrameHost shouldn't be trying to navigate. |
| if (render_frame_host != |
| render_frame_host->frame_tree_node()->current_frame_host()) { |
| return; |
| } |
| |
| SiteInstance* current_site_instance = render_frame_host->GetSiteInstance(); |
| |
| // TODO(creis): Pass the redirect_chain into this method to support client |
| // redirects. http://crbug.com/311721. |
| std::vector<GURL> redirect_chain; |
| |
| int frame_tree_node_id = FrameTreeNode::kFrameTreeNodeInvalidId; |
| |
| // Send the navigation to the current FrameTreeNode if it's destined for a |
| // subframe in the current tab. We'll assume it's for the main frame |
| // (possibly of a new or different WebContents) otherwise. |
| if (disposition == WindowOpenDisposition::CURRENT_TAB && |
| render_frame_host->GetParentOrOuterDocument()) { |
| frame_tree_node_id = |
| render_frame_host->frame_tree_node()->frame_tree_node_id(); |
| } |
| |
| // Prerendering frames need to have an FTN id set, so OpenURL() can find |
| // the correct frame tree for the navigation. Due to the above logic, that |
| // means this function currently can't be called for prerendering main frames. |
| DCHECK(render_frame_host->lifecycle_state() != |
| RenderFrameHostImpl::LifecycleStateImpl::kPrerendering || |
| frame_tree_node_id != FrameTreeNode::kFrameTreeNodeInvalidId); |
| |
| OpenURLParams params(url, referrer, frame_tree_node_id, disposition, |
| ui::PAGE_TRANSITION_LINK, |
| true /* is_renderer_initiated */); |
| params.post_data = post_body; |
| params.extra_headers = extra_headers; |
| if (redirect_chain.size() > 0) |
| params.redirect_chain = redirect_chain; |
| params.should_replace_current_entry = should_replace_current_entry; |
| params.user_gesture = user_gesture; |
| params.triggering_event_info = triggering_event_info; |
| params.initiator_origin = initiator_origin; |
| params.initiator_base_url = initiator_base_url; |
| params.initiator_frame_token = base::OptionalFromPtr(initiator_frame_token); |
| params.initiator_process_id = initiator_process_id; |
| |
| // RequestOpenURL is used only for local frames, so we can get here only if |
| // the navigation is initiated by a frame in the same SiteInstance as this |
| // frame. Note that navigations on RenderFrameProxies do not use |
| // RequestOpenURL and go through NavigateFromFrameProxy instead. |
| params.source_site_instance = current_site_instance; |
| |
| params.source_render_frame_id = render_frame_host->GetRoutingID(); |
| params.source_render_process_id = render_frame_host->GetProcess()->GetID(); |
| |
| if (render_frame_host->web_ui()) { |
| // Note that we hide the referrer for Web UI pages. We don't really want |
| // web sites to see a referrer of "chrome://blah" (and some chrome: URLs |
| // might have search terms or other stuff we don't want to send to the |
| // site), so we send no referrer. |
| params.referrer = Referrer(); |
| |
| // Navigations in Web UI pages count as browser-initiated navigations. |
| params.is_renderer_initiated = false; |
| } |
| |
| params.blob_url_loader_factory = std::move(blob_url_loader_factory); |
| params.href_translate = href_translate; |
| params.impression = impression; |
| |
| delegate_->OpenURL(params); |
| } |
| |
| void Navigator::NavigateFromFrameProxy( |
| RenderFrameHostImpl* render_frame_host, |
| const GURL& url, |
| const blink::LocalFrameToken* initiator_frame_token, |
| int initiator_process_id, |
| const url::Origin& initiator_origin, |
| const absl::optional<GURL>& initiator_base_url, |
| SiteInstance* source_site_instance, |
| const Referrer& referrer, |
| ui::PageTransition page_transition, |
| bool should_replace_current_entry, |
| blink::NavigationDownloadPolicy download_policy, |
| const std::string& method, |
| scoped_refptr<network::ResourceRequestBody> post_body, |
| const std::string& extra_headers, |
| scoped_refptr<network::SharedURLLoaderFactory> blob_url_loader_factory, |
| network::mojom::SourceLocationPtr source_location, |
| bool has_user_gesture, |
| bool is_form_submission, |
| const absl::optional<blink::Impression>& impression, |
| blink::mojom::NavigationInitiatorActivationAndAdStatus |
| initiator_activation_and_ad_status, |
| base::TimeTicks navigation_start_time, |
| bool is_embedder_initiated_fenced_frame_navigation, |
| bool is_unfenced_top_navigation, |
| bool force_new_browsing_instance, |
| bool is_container_initiated, |
| absl::optional<std::u16string> embedder_shared_storage_context) { |
| // |method != "POST"| should imply absence of |post_body|. |
| if (method != "POST" && post_body) { |
| NOTREACHED(); |
| post_body = nullptr; |
| } |
| |
| // Allow the delegate to cancel the cross-process navigation. |
| // With MPArch there may be multiple main frames and so is_main_frame should |
| // not be used to identify outermost main frames. |
| if (!delegate_->ShouldAllowRendererInitiatedCrossProcessNavigation( |
| render_frame_host->IsOutermostMainFrame())) |
| return; |
| |
| // TODO(creis): Determine if this transfer started as a browser-initiated |
| // navigation. See https://crbug.com/495161. |
| bool is_renderer_initiated = true; |
| Referrer referrer_to_use(referrer); |
| if (render_frame_host->web_ui()) { |
| // Note that we hide the referrer for Web UI pages. We don't really want |
| // web sites to see a referrer of "chrome://blah" (and some chrome: URLs |
| // might have search terms or other stuff we don't want to send to the |
| // site), so we send no referrer. |
| referrer_to_use = Referrer(); |
| |
| // Navigations in Web UI pages count as browser-initiated navigations. |
| is_renderer_initiated = false; |
| } |
| |
| if (is_renderer_initiated && |
| ShouldIgnoreIncomingRendererRequest( |
| render_frame_host->frame_tree_node()->navigation_request(), |
| has_user_gesture)) { |
| return; |
| } |
| |
| controller_.NavigateFromFrameProxy( |
| render_frame_host, url, initiator_frame_token, initiator_process_id, |
| initiator_origin, initiator_base_url, is_renderer_initiated, |
| source_site_instance, referrer_to_use, page_transition, |
| should_replace_current_entry, download_policy, method, post_body, |
| extra_headers, std::move(source_location), |
| std::move(blob_url_loader_factory), is_form_submission, impression, |
| initiator_activation_and_ad_status, navigation_start_time, |
| is_embedder_initiated_fenced_frame_navigation, is_unfenced_top_navigation, |
| force_new_browsing_instance, is_container_initiated, |
| embedder_shared_storage_context); |
| } |
| |
| void Navigator::BeforeUnloadCompleted(FrameTreeNode* frame_tree_node, |
| bool proceed, |
| const base::TimeTicks& proceed_time) { |
| DCHECK(frame_tree_node); |
| |
| NavigationRequest* navigation_request = frame_tree_node->navigation_request(); |
| |
| // The NavigationRequest may have been canceled while the renderer was |
| // executing the BeforeUnload event. |
| if (!navigation_request) |
| return; |
| |
| // If the user chose not to proceed, cancel the ongoing navigation. |
| // Note: it might be a new navigation, and not the one that triggered the |
| // sending of the BeforeUnload IPC in the first place. However, the |
| // BeforeUnload where the user asked not to proceed will have taken place |
| // after the navigation started. The last user input should be respected, and |
| // the navigation cancelled anyway. |
| if (!proceed) { |
| CancelNavigation(frame_tree_node, NavigationDiscardReason::kCancelled); |
| return; |
| } |
| |
| // The browser-initiated NavigationRequest that triggered the sending of the |
| // BeforeUnload IPC might have been replaced by a renderer-initiated one while |
| // the BeforeUnload event executed in the renderer. In that case, the request |
| // will already have begun, so there is no need to start it again. |
| if (navigation_request->state() > |
| NavigationRequest::WAITING_FOR_RENDERER_RESPONSE) { |
| DCHECK(navigation_request->from_begin_navigation()); |
| return; |
| } |
| |
| // Update the navigation start: it should be when it was determined that the |
| // navigation will proceed. |
| navigation_request->set_navigation_start_time(proceed_time); |
| |
| DCHECK_EQ(NavigationRequest::WAITING_FOR_RENDERER_RESPONSE, |
| navigation_request->state()); |
| |
| // Send the request to the IO thread. |
| navigation_request->BeginNavigation(); |
| // DO NOT USE |navigation_request| BEYOND THIS POINT. It might have been |
| // destroyed in BeginNavigation(). |
| // See https://crbug.com/770157. |
| } |
| |
| void Navigator::OnBeginNavigation( |
| FrameTreeNode* frame_tree_node, |
| blink::mojom::CommonNavigationParamsPtr common_params, |
| blink::mojom::BeginNavigationParamsPtr begin_params, |
| scoped_refptr<network::SharedURLLoaderFactory> blob_url_loader_factory, |
| mojo::PendingAssociatedRemote<mojom::NavigationClient> navigation_client, |
| scoped_refptr<PrefetchedSignedExchangeCache> |
| prefetched_signed_exchange_cache, |
| int initiator_process_id, |
| mojo::PendingReceiver<mojom::NavigationRendererCancellationListener> |
| renderer_cancellation_listener) { |
| TRACE_EVENT0("navigation", "Navigator::OnBeginNavigation"); |
| |
| if (common_params->is_history_navigation_in_new_child_frame) { |
| // Try to find a FrameNavigationEntry that matches this frame instead, based |
| // on the frame's unique name. If this can't be found, fall back to the |
| // default path below. |
| |
| // |initiator_frame_token| is non-null here because a navigation in a new |
| // subframe always begins with renderer action (i.e., an HTML element being |
| // inserted into the DOM), so it is always renderer-initiated. |
| // Anyway validating |initiator_frame_token| here because it's from a |
| // renderer process. |
| DCHECK(begin_params->initiator_frame_token); |
| if (begin_params->initiator_frame_token && |
| frame_tree_node->navigator().StartHistoryNavigationInNewSubframe( |
| frame_tree_node->current_frame_host(), &navigation_client, |
| *begin_params->initiator_frame_token, initiator_process_id)) { |
| return; |
| } |
| } |
| |
| NavigationRequest* ongoing_navigation_request = |
| frame_tree_node->navigation_request(); |
| |
| // Client redirects during the initial history navigation of a child frame |
| // should take precedence over the history navigation (despite being renderer- |
| // initiated). See https://crbug.com/348447 and https://crbug.com/691168. |
| if (ongoing_navigation_request && |
| ongoing_navigation_request->common_params() |
| .is_history_navigation_in_new_child_frame) { |
| // Preemptively clear this local pointer before deleting the request. |
| ongoing_navigation_request = nullptr; |
| frame_tree_node->ResetNavigationRequest( |
| NavigationDiscardReason::kNewNavigation); |
| } |
| |
| // Verify this navigation has precedence. |
| if (ShouldIgnoreIncomingRendererRequest(ongoing_navigation_request, |
| common_params->has_user_gesture)) { |
| return; |
| } |
| |
| // Compute this ahead of creating the NavigationEntry, since it is needed both |
| // there and in CreateRendererInitiated. |
| const bool override_user_agent = |
| delegate_->ShouldOverrideUserAgentForRendererInitiatedNavigation(); |
| |
| NavigationEntryImpl* navigation_entry = |
| GetNavigationEntryForRendererInitiatedNavigation( |
| *common_params, frame_tree_node, override_user_agent); |
| |
| frame_tree_node->TakeNavigationRequest( |
| NavigationRequest::CreateRendererInitiated( |
| frame_tree_node, navigation_entry, std::move(common_params), |
| std::move(begin_params), controller_.GetLastCommittedEntryIndex(), |
| controller_.GetEntryCount(), override_user_agent, |
| std::move(blob_url_loader_factory), std::move(navigation_client), |
| std::move(prefetched_signed_exchange_cache), |
| std::move(renderer_cancellation_listener))); |
| NavigationRequest* navigation_request = frame_tree_node->navigation_request(); |
| |
| metrics_data_ = std::make_unique<NavigationMetricsData>( |
| navigation_request->common_params().navigation_start, |
| navigation_request->common_params().url, |
| GetPageUkmSourceId(*frame_tree_node->current_frame_host()), |
| false /* is_browser_initiated_before_unload */); |
| |
| LogRendererInitiatedBeforeUnloadTime( |
| navigation_request->begin_params().before_unload_start, |
| navigation_request->begin_params().before_unload_end); |
| |
| // This frame has already run beforeunload before it sent this IPC. See if |
| // any of its cross-process subframes also need to run beforeunload. If so, |
| // delay the navigation until beforeunload completion callbacks are invoked on |
| // those frames. |
| DCHECK(!NavigationTypeUtils::IsSameDocument( |
| navigation_request->common_params().navigation_type)); |
| bool no_dispatch_because_avoid_unnecessary_sync = false; |
| bool should_dispatch_beforeunload = |
| frame_tree_node->current_frame_host()->ShouldDispatchBeforeUnload( |
| true /* check_subframes_only */, |
| &no_dispatch_because_avoid_unnecessary_sync); |
| if (should_dispatch_beforeunload) { |
| frame_tree_node->navigation_request()->SetWaitingForRendererResponse(); |
| frame_tree_node->current_frame_host()->DispatchBeforeUnload( |
| RenderFrameHostImpl::BeforeUnloadType::RENDERER_INITIATED_NAVIGATION, |
| NavigationTypeUtils::IsReload( |
| navigation_request->common_params().navigation_type)); |
| return; |
| } |
| |
| if (no_dispatch_because_avoid_unnecessary_sync) { |
| LogNavigationStartToBeginWithAvoidUnnecessaryBeforeUnloadSync( |
| base::TimeTicks::Now() - |
| navigation_request->common_params().navigation_start); |
| } |
| |
| // For main frames, NavigationHandle will be created after the call to |
| // |DidStartMainFrameNavigation|, so it receives the most up to date pending |
| // entry from the NavigationController. |
| navigation_request->BeginNavigation(); |
| // DO NOT USE |navigation_request| BEYOND THIS POINT. It might have been |
| // destroyed in BeginNavigation(). |
| // See https://crbug.com/770157. |
| } |
| |
| void Navigator::RestartNavigationAsCrossDocument( |
| std::unique_ptr<NavigationRequest> navigation_request) { |
| FrameTreeNode* frame_tree_node = navigation_request->frame_tree_node(); |
| // Don't restart the navigation if there is already another ongoing navigation |
| // in the FrameTreeNode. |
| if (frame_tree_node->navigation_request()) |
| return; |
| |
| navigation_request->ResetForCrossDocumentRestart(); |
| frame_tree_node->TakeNavigationRequest(std::move(navigation_request)); |
| frame_tree_node->navigation_request()->BeginNavigation(); |
| // DO NOT USE THE NAVIGATION REQUEST BEYOND THIS POINT. It might have been |
| // destroyed in BeginNavigation(). |
| // See https://crbug.com/770157. |
| } |
| |
| void Navigator::CancelNavigation(FrameTreeNode* frame_tree_node, |
| NavigationDiscardReason reason) { |
| if (frame_tree_node->navigation_request()) |
| frame_tree_node->navigation_request()->set_net_error(net::ERR_ABORTED); |
| frame_tree_node->ResetNavigationRequest(reason); |
| if (frame_tree_node->IsMainFrame()) |
| metrics_data_.reset(); |
| } |
| |
| void Navigator::LogCommitNavigationSent() { |
| if (!metrics_data_) { |
| return; |
| } |
| |
| metrics_data_->commit_navigation_sent_ = base::TimeTicks::Now(); |
| } |
| |
| void Navigator::LogBeforeUnloadTime( |
| base::TimeTicks renderer_before_unload_start_time, |
| base::TimeTicks renderer_before_unload_end_time, |
| base::TimeTicks before_unload_sent_time, |
| bool for_legacy) { |
| if (!metrics_data_) { |
| return; |
| } |
| |
| // LogBeforeUnloadTime is called once for each cross-process frame. Once all |
| // beforeunloads complete, the timestamps in navigation_data will be the |
| // timestamps of the beforeunload that blocked the navigation the longest. |
| // `for_legacy` indicates this is being called as the result of a PostTask(), |
| // which did not go to the renderer so that the times do not need to be |
| // adjusted. |
| if (!base::TimeTicks::IsConsistentAcrossProcesses() && !for_legacy) { |
| // These timestamps come directly from the renderer so they might need to be |
| // converted to local time stamps. |
| blink::InterProcessTimeTicksConverter converter( |
| blink::LocalTimeTicks::FromTimeTicks(before_unload_sent_time), |
| blink::LocalTimeTicks::FromTimeTicks(base::TimeTicks::Now()), |
| blink::RemoteTimeTicks::FromTimeTicks( |
| renderer_before_unload_start_time), |
| blink::RemoteTimeTicks::FromTimeTicks(renderer_before_unload_end_time)); |
| blink::LocalTimeTicks converted_renderer_before_unload_start = |
| converter.ToLocalTimeTicks(blink::RemoteTimeTicks::FromTimeTicks( |
| renderer_before_unload_start_time)); |
| blink::LocalTimeTicks converted_renderer_before_unload_end = |
| converter.ToLocalTimeTicks(blink::RemoteTimeTicks::FromTimeTicks( |
| renderer_before_unload_end_time)); |
| metrics_data_->before_unload_start_ = |
| converted_renderer_before_unload_start.ToTimeTicks(); |
| metrics_data_->before_unload_end_ = |
| converted_renderer_before_unload_end.ToTimeTicks(); |
| } else { |
| metrics_data_->before_unload_start_ = renderer_before_unload_start_time; |
| metrics_data_->before_unload_end_ = renderer_before_unload_end_time; |
| } |
| metrics_data_->before_unload_sent_ = before_unload_sent_time; |
| } |
| |
| void Navigator::LogRendererInitiatedBeforeUnloadTime( |
| base::TimeTicks renderer_before_unload_start_time, |
| base::TimeTicks renderer_before_unload_end_time) { |
| DCHECK(metrics_data_); |
| |
| if (renderer_before_unload_start_time == base::TimeTicks() || |
| renderer_before_unload_end_time == base::TimeTicks()) |
| return; |
| |
| if (!base::TimeTicks::IsConsistentAcrossProcesses()) { |
| // These timestamps come directly from the renderer so they might need to be |
| // converted to local time stamps. |
| blink::InterProcessTimeTicksConverter converter( |
| blink::LocalTimeTicks::FromTimeTicks(base::TimeTicks()), |
| blink::LocalTimeTicks::FromTimeTicks(base::TimeTicks::Now()), |
| blink::RemoteTimeTicks::FromTimeTicks( |
| renderer_before_unload_start_time), |
| blink::RemoteTimeTicks::FromTimeTicks(renderer_before_unload_end_time)); |
| blink::LocalTimeTicks converted_renderer_before_unload_start = |
| converter.ToLocalTimeTicks(blink::RemoteTimeTicks::FromTimeTicks( |
| renderer_before_unload_start_time)); |
| blink::LocalTimeTicks converted_renderer_before_unload_end = |
| converter.ToLocalTimeTicks(blink::RemoteTimeTicks::FromTimeTicks( |
| renderer_before_unload_end_time)); |
| metrics_data_->renderer_before_unload_start_ = |
| converted_renderer_before_unload_start.ToTimeTicks(); |
| metrics_data_->renderer_before_unload_end_ = |
| converted_renderer_before_unload_end.ToTimeTicks(); |
| } else { |
| metrics_data_->renderer_before_unload_start_ = |
| renderer_before_unload_start_time; |
| metrics_data_->renderer_before_unload_end_ = |
| renderer_before_unload_end_time; |
| } |
| } |
| |
| void Navigator::RecordNavigationMetrics( |
| const LoadCommittedDetails& details, |
| const mojom::DidCommitProvisionalLoadParams& params, |
| SiteInstance* site_instance, |
| const GURL& original_request_url) { |
| DCHECK(site_instance->HasProcess()); |
| |
| if (!details.is_main_frame || !metrics_data_ || |
| metrics_data_->url_ != original_request_url) { |
| return; |
| } |
| |
| ukm::builders::Unload builder(metrics_data_->ukm_source_id_); |
| base::TimeTicks first_before_unload_start_time; |
| |
| if (metrics_data_->is_browser_initiated_before_unload_) { |
| if (metrics_data_->before_unload_start_ && |
| metrics_data_->before_unload_end_) { |
| first_before_unload_start_time = |
| metrics_data_->before_unload_start_.value(); |
| builder.SetBeforeUnloadDuration( |
| (metrics_data_->before_unload_end_.value() - |
| metrics_data_->before_unload_start_.value()) |
| .InMilliseconds()); |
| } |
| } else { |
| if (metrics_data_->renderer_before_unload_start_ && |
| metrics_data_->renderer_before_unload_end_) { |
| first_before_unload_start_time = |
| metrics_data_->renderer_before_unload_start_.value(); |
| base::TimeDelta before_unload_duration = |
| metrics_data_->renderer_before_unload_end_.value() - |
| metrics_data_->renderer_before_unload_start_.value(); |
| |
| // If we had to dispatch beforeunload handlers for OOPIFs from the |
| // browser, add those into the beforeunload duration as they contributed |
| // to the total beforeunload latency. |
| if (metrics_data_->before_unload_sent_) { |
| before_unload_duration += metrics_data_->before_unload_end_.value() - |
| metrics_data_->before_unload_start_.value(); |
| } |
| builder.SetBeforeUnloadDuration(before_unload_duration.InMilliseconds()); |
| } |
| } |
| |
| // Records the queuing duration of the beforeunload sent from the browser to |
| // the frame that blocked the navigation the longest. This can happen in a |
| // renderer or browser initiated navigation and could mean a long queuing time |
| // blocked the navigation or a long beforeunload. Records nothing if none were |
| // sent. |
| if (metrics_data_->before_unload_sent_) { |
| builder.SetBeforeUnloadQueueingDuration( |
| (metrics_data_->before_unload_start_.value() - |
| metrics_data_->before_unload_sent_.value()) |
| .InMilliseconds()); |
| } |
| |
| // If this is a same-process navigation and we have timestamps for unload |
| // durations, fill those metrics out as well. |
| if (params.unload_start && params.unload_end && |
| params.commit_navigation_end && metrics_data_->commit_navigation_sent_) { |
| base::TimeTicks unload_start = params.unload_start.value(); |
| base::TimeTicks unload_end = params.unload_end.value(); |
| // Note: we expect `commit_navigation_end` to be later than `unload_end`. |
| // `unload_end` is recorded when the unload handlers finish running, which |
| // happens prior to the navigation committing and recording |
| // `commit_navigation_end` in this same-process case. |
| base::TimeTicks commit_navigation_end = |
| params.commit_navigation_end.value(); |
| |
| if (!base::TimeTicks::IsConsistentAcrossProcesses()) { |
| // These timestamps come directly from the renderer so they might need |
| // to be converted to local time stamps. |
| blink::InterProcessTimeTicksConverter converter( |
| blink::LocalTimeTicks::FromTimeTicks(first_before_unload_start_time), |
| blink::LocalTimeTicks::FromTimeTicks(base::TimeTicks::Now()), |
| blink::RemoteTimeTicks::FromTimeTicks(unload_start), |
| blink::RemoteTimeTicks::FromTimeTicks(commit_navigation_end)); |
| blink::LocalTimeTicks converted_unload_start = converter.ToLocalTimeTicks( |
| blink::RemoteTimeTicks::FromTimeTicks(unload_start)); |
| blink::LocalTimeTicks converted_unload_end = converter.ToLocalTimeTicks( |
| blink::RemoteTimeTicks::FromTimeTicks(unload_end)); |
| blink::LocalTimeTicks converted_commit_navigation_end = |
| converter.ToLocalTimeTicks( |
| blink::RemoteTimeTicks::FromTimeTicks(commit_navigation_end)); |
| unload_start = converted_unload_start.ToTimeTicks(); |
| unload_end = converted_unload_end.ToTimeTicks(); |
| commit_navigation_end = converted_commit_navigation_end.ToTimeTicks(); |
| } |
| builder.SetUnloadDuration((unload_end - unload_start).InMilliseconds()); |
| builder.SetUnloadQueueingDuration( |
| (unload_start - metrics_data_->commit_navigation_sent_.value()) |
| .InMilliseconds()); |
| if (metrics_data_->commit_navigation_sent_) { |
| builder.SetBeforeUnloadToCommit_SameProcess( |
| (commit_navigation_end - first_before_unload_start_time) |
| .InMilliseconds()); |
| } |
| } else if (metrics_data_->commit_navigation_sent_) { |
| // The navigation is cross-process and we don't have unload timings as they |
| // are run in the old process and don't block the navigation. |
| builder.SetBeforeUnloadToCommit_CrossProcess( |
| (metrics_data_->commit_navigation_sent_.value() - |
| first_before_unload_start_time) |
| .InMilliseconds()); |
| } |
| |
| builder.Record(ukm::UkmRecorder::Get()); |
| metrics_data_.reset(); |
| } |
| |
| NavigationEntryImpl* |
| Navigator::GetNavigationEntryForRendererInitiatedNavigation( |
| const blink::mojom::CommonNavigationParams& common_params, |
| FrameTreeNode* frame_tree_node, |
| bool override_user_agent) { |
| // With MPArch, there may be multiple main frames, but each one has its own |
| // NavigationController. Thus, it's correct to check for NavigationEntries for |
| // each main frame, even if one is embedded (e.g., a fenced frame). |
| if (!frame_tree_node->IsMainFrame()) |
| return nullptr; |
| |
| // If there is no browser-initiated pending entry for this navigation and it |
| // is not for the error URL, create a pending entry and ensure the address bar |
| // updates accordingly. We don't know the referrer or extra headers at this |
| // point, but the referrer will be set properly upon commit. This does not |
| // set the SiteInstance for the pending entry, because it may change |
| // before the URL commits. |
| NavigationEntryImpl* pending_entry = controller_.GetPendingEntry(); |
| bool has_browser_initiated_pending_entry = |
| pending_entry && !pending_entry->is_renderer_initiated(); |
| if (has_browser_initiated_pending_entry) |
| return nullptr; |
| |
| // A pending navigation entry is created in OnBeginNavigation(). The renderer |
| // sends a provisional load notification after that. We don't want to create |
| // a duplicate navigation entry here. |
| bool renderer_provisional_load_to_pending_url = |
| pending_entry && pending_entry->is_renderer_initiated() && |
| (pending_entry->GetURL() == common_params.url); |
| if (renderer_provisional_load_to_pending_url) |
| return nullptr; |
| |
| // Since GetNavigationEntryForRendererInitiatedNavigation is called from |
| // OnBeginNavigation, we can assume that no frame proxies are involved and |
| // therefore that |current_site_instance| is also the |source_site_instance|. |
| SiteInstance* current_site_instance = |
| frame_tree_node->current_frame_host()->GetSiteInstance(); |
| absl::optional<GURL> source_process_site_url = absl::nullopt; |
| if (current_site_instance && current_site_instance->HasProcess()) { |
| source_process_site_url = |
| current_site_instance->GetProcess()->GetProcessLock().site_url(); |
| } |
| // If `frame_tree_node` is the outermost main frame, it rewrites a virtual |
| // url in order to adjust the original input url if needed. For inner frames |
| // such as fenced frames or subframes, they don't rewrite urls as the urls |
| // are not input urls by users. |
| bool rewrite_virtual_urls = frame_tree_node->IsOutermostMainFrame(); |
| std::unique_ptr<NavigationEntryImpl> entry = |
| NavigationEntryImpl::FromNavigationEntry( |
| NavigationControllerImpl::CreateNavigationEntry( |
| common_params.url, content::Referrer(), |
| common_params.initiator_origin, common_params.initiator_base_url, |
| source_process_site_url, ui::PAGE_TRANSITION_LINK, |
| true /* is_renderer_initiated */, |
| std::string() /* extra_headers */, |
| controller_.GetBrowserContext(), |
| nullptr /* blob_url_loader_factory */, rewrite_virtual_urls)); |
| |
| entry->set_reload_type(NavigationRequest::NavigationTypeToReloadType( |
| common_params.navigation_type)); |
| entry->SetIsOverridingUserAgent(override_user_agent); |
| |
| controller_.SetPendingEntry(std::move(entry)); |
| delegate_->NotifyChangedNavigationState(content::INVALIDATE_TYPE_URL); |
| |
| return controller_.GetPendingEntry(); |
| } |
| |
| } // namespace content |