blob: 26f73ac1df7412b5c494d3ab8d2d116103553737 [file] [log] [blame]
// Copyright 2015 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "headless/lib/browser/headless_content_browser_client.h"
#include <memory>
#include <string>
#include <string_view>
#include <unordered_set>
#include <vector>
#include "base/base_switches.h"
#include "base/check_deref.h"
#include "base/command_line.h"
#include "base/functional/bind.h"
#include "base/functional/callback.h"
#include "base/i18n/rtl.h"
#include "base/path_service.h"
#include "base/strings/string_number_conversions.h"
#include "base/strings/string_split.h"
#include "build/build_config.h"
#include "components/embedder_support/switches.h"
#include "components/headless/command_handler/headless_command_switches.h"
#include "content/public/browser/browser_context.h"
#include "content/public/browser/browser_thread.h"
#include "content/public/browser/client_certificate_delegate.h"
#include "content/public/browser/content_browser_client.h"
#include "content/public/browser/navigation_throttle_registry.h"
#include "content/public/browser/overlay_window.h"
#include "content/public/browser/render_process_host.h"
#include "content/public/browser/render_view_host.h"
#include "content/public/browser/storage_partition.h"
#include "content/public/browser/web_contents.h"
#include "content/public/common/content_switches.h"
#include "headless/lib/browser/headless_bluetooth_delegate.h"
#include "headless/lib/browser/headless_browser_context_impl.h"
#include "headless/lib/browser/headless_browser_impl.h"
#include "headless/lib/browser/headless_browser_main_parts.h"
#include "headless/lib/browser/headless_devtools_manager_delegate.h"
#include "headless/public/switches.h"
#include "mojo/public/cpp/bindings/binder_map.h"
#include "mojo/public/cpp/bindings/pending_receiver.h"
#include "mojo/public/cpp/bindings/receiver_set.h"
#include "net/base/port_util.h"
#include "net/base/url_util.h"
#include "net/cert/x509_certificate.h"
#include "net/ssl/client_cert_identity.h"
#include "net/ssl/ssl_private_key.h"
#include "printing/buildflags/buildflags.h"
#include "sandbox/policy/switches.h"
#include "third_party/blink/public/common/associated_interfaces/associated_interface_registry.h"
#include "ui/base/ui_base_switches.h"
#include "ui/gfx/switches.h"
#if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_CHROMEOS)
#include "components/crash/core/app/crash_switches.h" // nogncheck
#include "components/crash/core/app/crashpad.h" // nogncheck
#include "content/public/common/content_descriptors.h"
#endif // BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_CHROMEOS)
#if (BUILDFLAG(IS_WIN) || BUILDFLAG(IS_LINUX)) && defined(HEADLESS_USE_PREFS)
#include "components/os_crypt/sync/os_crypt.h" // nogncheck
#include "content/public/browser/network_service_util.h"
#endif
#if defined(HEADLESS_USE_POLICY)
#include "components/policy/content/policy_blocklist_navigation_throttle.h"
#include "content/public/browser/navigation_handle.h"
#include "content/public/browser/navigation_throttle.h"
#endif // defined(HEADLESS_USE_POLICY)
#if BUILDFLAG(ENABLE_PRINTING)
#include "components/printing/browser/headless/headless_print_manager.h"
#endif // defined(ENABLE_PRINTING)
namespace headless {
namespace {
#if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_CHROMEOS)
int GetCrashSignalFD(const base::CommandLine& command_line,
const HeadlessBrowser::Options& options) {
int fd;
pid_t pid;
return crash_reporter::GetHandlerSocket(&fd, &pid) ? fd : -1;
}
#endif // BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_CHROMEOS)
class HeadlessVideoOverlayWindow : public content::VideoOverlayWindow {
public:
bool IsActive() const override { return false; }
void Close() override {}
void ShowInactive() override {}
void Hide() override {}
bool IsVisible() const override { return false; }
gfx::Rect GetBounds() override { return gfx::Rect(size_); }
void UpdateNaturalSize(const gfx::Size& natural_size) override {
size_ = natural_size;
}
void SetPlaybackState(PlaybackState playback_state) override {}
void SetPlayPauseButtonVisibility(bool is_visible) override {}
void SetSkipAdButtonVisibility(bool is_visible) override {}
void SetNextTrackButtonVisibility(bool is_visible) override {}
void SetPreviousTrackButtonVisibility(bool is_visible) override {}
void SetMicrophoneMuted(bool muted) override {}
void SetCameraState(bool turned_on) override {}
void SetToggleMicrophoneButtonVisibility(bool is_visible) override {}
void SetToggleCameraButtonVisibility(bool is_visible) override {}
void SetHangUpButtonVisibility(bool is_visible) override {}
void SetNextSlideButtonVisibility(bool is_visible) override {}
void SetPreviousSlideButtonVisibility(bool is_visible) override {}
void SetMediaPosition(const media_session::MediaPosition&) override {}
void SetSourceTitle(const std::u16string& source_title) override {}
void SetFaviconImages(
const std::vector<media_session::MediaImage>& images) override {}
void SetSurfaceId(const viz::SurfaceId& surface_id) override {}
private:
gfx::Size size_;
};
} // namespace
// Implements a stub BadgeService. This implementation does nothing, but is
// required because inbound Mojo messages which do not have a registered
// handler are considered an error, and the render process is terminated.
// See https://crbug.com/1090429
class HeadlessContentBrowserClient::StubBadgeService
: public blink::mojom::BadgeService {
public:
StubBadgeService() = default;
StubBadgeService(const StubBadgeService&) = delete;
StubBadgeService& operator=(const StubBadgeService&) = delete;
~StubBadgeService() override = default;
void Bind(mojo::PendingReceiver<blink::mojom::BadgeService> receiver) {
receivers_.Add(this, std::move(receiver));
}
void Reset() {}
// blink::mojom::BadgeService:
void SetBadge(blink::mojom::BadgeValuePtr value) override {}
void ClearBadge() override {}
private:
mojo::ReceiverSet<blink::mojom::BadgeService> receivers_;
};
// As with the above stub BadgeService, a stub implementation of a
// PersistentRendererPrefsService is needed since the service is
// implemented in chrome, and thus won't be available here.
class HeadlessContentBrowserClient::StubPersistentRendererPrefsService
: public blink::mojom::PersistentRendererPrefsService {
public:
StubPersistentRendererPrefsService() = default;
StubPersistentRendererPrefsService(
const StubPersistentRendererPrefsService&) = delete;
StubPersistentRendererPrefsService& operator=(
const StubPersistentRendererPrefsService&) = delete;
~StubPersistentRendererPrefsService() override = default;
void Bind(mojo::PendingReceiver<blink::mojom::PersistentRendererPrefsService>
receiver) {
receivers_.Add(this, std::move(receiver));
}
// blink::mojom::PersistentRendererPrefsService:
void SetViewSourceLineWrapping(bool value) override {}
private:
mojo::ReceiverSet<blink::mojom::PersistentRendererPrefsService> receivers_;
};
HeadlessContentBrowserClient::HeadlessContentBrowserClient(
HeadlessBrowserImpl* browser)
: browser_(browser) {}
HeadlessContentBrowserClient::~HeadlessContentBrowserClient() = default;
std::unique_ptr<content::BrowserMainParts>
HeadlessContentBrowserClient::CreateBrowserMainParts(
bool /* is_integration_test */) {
return std::make_unique<HeadlessBrowserMainParts>(*browser_);
}
void HeadlessContentBrowserClient::OverrideWebPreferences(
content::WebContents* web_contents,
content::SiteInstance& main_frame_site,
blink::web_pref::WebPreferences* prefs) {
prefs->lazy_load_enabled = browser_->options()->lazy_load_enabled;
if (base::CommandLine::ForCurrentProcess()->HasSwitch(
::switches::kForceHighContrast)) {
prefs->in_forced_colors = true;
prefs->preferred_contrast = blink::mojom::PreferredContrast::kMore;
}
}
void HeadlessContentBrowserClient::RegisterBrowserInterfaceBindersForFrame(
content::RenderFrameHost* render_frame_host,
mojo::BinderMapWithContext<content::RenderFrameHost*>* map) {
map->Add<blink::mojom::BadgeService>(base::BindRepeating(
&HeadlessContentBrowserClient::BindBadgeService, base::Unretained(this)));
map->Add<blink::mojom::PersistentRendererPrefsService>(base::BindRepeating(
&HeadlessContentBrowserClient::BindPersistentRendererPrefsService,
base::Unretained(this)));
}
void HeadlessContentBrowserClient::
RegisterAssociatedInterfaceBindersForRenderFrameHost(
content::RenderFrameHost& render_frame_host,
blink::AssociatedInterfaceRegistry& associated_registry) {
// TODO(crbug.com/40203902): Move the registry logic below to a
// dedicated file to ensure security review coverage.
#if BUILDFLAG(ENABLE_PRINTING)
associated_registry.AddInterface<printing::mojom::PrintManagerHost>(
base::BindRepeating(
[](content::RenderFrameHost* render_frame_host,
mojo::PendingAssociatedReceiver<printing::mojom::PrintManagerHost>
receiver) {
HeadlessPrintManager::BindPrintManagerHost(std::move(receiver),
render_frame_host);
},
&render_frame_host));
#endif
}
std::unique_ptr<content::DevToolsManagerDelegate>
HeadlessContentBrowserClient::CreateDevToolsManagerDelegate() {
return std::make_unique<HeadlessDevToolsManagerDelegate>(
browser_->GetWeakPtr());
}
content::GeneratedCodeCacheSettings
HeadlessContentBrowserClient::GetGeneratedCodeCacheSettings(
content::BrowserContext* context) {
// If we pass 0 for size, disk_cache will pick a default size using the
// heuristics based on available disk size. These are implemented in
// disk_cache::PreferredCacheSize in net/disk_cache/cache_util.cc.
return content::GeneratedCodeCacheSettings(true, 0, context->GetPath());
}
#if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_CHROMEOS)
void HeadlessContentBrowserClient::GetAdditionalMappedFilesForChildProcess(
const base::CommandLine& command_line,
int child_process_id,
content::PosixFileDescriptorInfo* mappings) {
int crash_signal_fd = GetCrashSignalFD(command_line, *browser_->options());
if (crash_signal_fd >= 0)
mappings->Share(kCrashDumpSignal, crash_signal_fd);
}
#endif // BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_CHROMEOS)
void HeadlessContentBrowserClient::AppendExtraCommandLineSwitches(
base::CommandLine* command_line,
int child_process_id) {
// NOTE: We may be called on the UI or IO thread. If called on the IO thread,
// |browser_| may have already been destroyed.
if (!command_line->HasSwitch(::switches::kHeadless)) {
command_line->AppendSwitchASCII(::switches::kHeadless, "old");
}
#if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_CHROMEOS)
int fd;
pid_t pid;
if (crash_reporter::GetHandlerSocket(&fd, &pid)) {
command_line->AppendSwitchASCII(
crash_reporter::switches::kCrashpadHandlerPid,
base::NumberToString(pid));
}
#endif // BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_CHROMEOS)
// If we're spawning a renderer, then override the language switch.
std::string process_type =
command_line->GetSwitchValueASCII(::switches::kProcessType);
const base::CommandLine& old_command_line =
CHECK_DEREF(base::CommandLine::ForCurrentProcess());
if (process_type == ::switches::kRendererProcess) {
// Renderer processes are initialized on the UI thread, so this is safe.
content::RenderProcessHost* render_process_host =
content::RenderProcessHost::FromID(child_process_id);
if (render_process_host) {
HeadlessBrowserContextImpl* headless_browser_context_impl =
HeadlessBrowserContextImpl::From(
render_process_host->GetBrowserContext());
std::vector<std::string_view> languages = base::SplitStringPiece(
headless_browser_context_impl->options()->accept_language(), ",",
base::TRIM_WHITESPACE, base::SPLIT_WANT_NONEMPTY);
if (!languages.empty()) {
command_line->AppendSwitchASCII(::switches::kLang,
std::string(languages[0]));
}
}
// Please keep this in alphabetical order.
static const char* const kForwardSwitches[] = {
embedder_support::kOriginTrialDisabledFeatures,
embedder_support::kOriginTrialPublicKey,
switches::kAllowVideoCodecs,
switches::kDisablePDFTagging,
};
command_line->CopySwitchesFrom(old_command_line, kForwardSwitches);
} else if (process_type == ::switches::kGpuProcess) {
static const char* const kForwardSwitches[] = {switches::kEnableGPU};
command_line->CopySwitchesFrom(old_command_line, kForwardSwitches);
}
}
std::string HeadlessContentBrowserClient::GetApplicationLocale() {
return base::i18n::GetConfiguredLocale();
}
std::string HeadlessContentBrowserClient::GetAcceptLangs(
content::BrowserContext* context) {
return browser_->options()->accept_language;
}
void HeadlessContentBrowserClient::AllowCertificateError(
content::WebContents* web_contents,
int cert_error,
const net::SSLInfo& ssl_info,
const GURL& request_url,
bool is_primary_main_frame_request,
bool strict_enforcement,
base::OnceCallback<void(content::CertificateRequestResultType)> callback) {
if (!callback.is_null()) {
// If --allow-insecure-localhost is specified, and the request
// was for localhost, then the error was not fatal.
bool allow_localhost = base::CommandLine::ForCurrentProcess()->HasSwitch(
::switches::kAllowInsecureLocalhost);
if (allow_localhost && net::IsLocalhost(request_url)) {
std::move(callback).Run(
content::CERTIFICATE_REQUEST_RESULT_TYPE_CONTINUE);
return;
}
std::move(callback).Run(content::CERTIFICATE_REQUEST_RESULT_TYPE_DENY);
}
}
base::OnceClosure HeadlessContentBrowserClient::SelectClientCertificate(
content::BrowserContext* browser_context,
int process_id,
content::WebContents* web_contents,
net::SSLCertRequestInfo* cert_request_info,
net::ClientCertIdentityList client_certs,
std::unique_ptr<content::ClientCertificateDelegate> delegate) {
delegate->ContinueWithCertificate(nullptr, nullptr);
return base::OnceClosure();
}
bool HeadlessContentBrowserClient::ShouldEnableStrictSiteIsolation() {
// Use --site-per-process as the only source of truth for enabling site
// isolation, see SiteIsolationPolicy::UseDedicatedProcessesForAllSites()
// in content/public/browser/site_isolation_policy.cc.
return false;
}
bool HeadlessContentBrowserClient::
ShouldAllowProcessPerSiteForMultipleMainFrames(
content::BrowserContext* context) {
return false;
}
bool HeadlessContentBrowserClient::IsInterestGroupAPIAllowed(
content::BrowserContext* browser_context,
content::RenderFrameHost* render_frame_host,
content::InterestGroupApiOperation operation,
const url::Origin& top_frame_origin,
const url::Origin& api_origin) {
return true;
}
bool HeadlessContentBrowserClient::IsPrivacySandboxReportingDestinationAttested(
content::BrowserContext* browser_context,
const url::Origin& destination_origin,
content::PrivacySandboxInvokingAPI invoking_api) {
base::CommandLine* command_line = base::CommandLine::ForCurrentProcess();
return command_line->HasSwitch(switches::kForceReportingDestinationAttested);
}
bool HeadlessContentBrowserClient::IsSharedStorageAllowed(
content::BrowserContext* browser_context,
content::RenderFrameHost* rfh,
const url::Origin& top_frame_origin,
const url::Origin& accessing_origin,
std::string* out_debug_message,
bool* out_block_is_site_setting_specific) {
return true;
}
bool HeadlessContentBrowserClient::IsSharedStorageSelectURLAllowed(
content::BrowserContext* browser_context,
const url::Origin& top_frame_origin,
const url::Origin& accessing_origin,
std::string* out_debug_message,
bool* out_block_is_site_setting_specific) {
return true;
}
bool HeadlessContentBrowserClient::IsFencedStorageReadAllowed(
content::BrowserContext* browser_context,
content::RenderFrameHost* rfh,
const url::Origin& top_frame_origin,
const url::Origin& accessing_origin) {
return true;
}
bool HeadlessContentBrowserClient::IsCookieDeprecationLabelAllowed(
content::BrowserContext* browser_context) {
return true;
}
bool HeadlessContentBrowserClient::IsCookieDeprecationLabelAllowedForContext(
content::BrowserContext* browser_context,
const url::Origin& top_frame_origin,
const url::Origin& context_origin) {
return true;
}
void HeadlessContentBrowserClient::ConfigureNetworkContextParams(
content::BrowserContext* context,
bool in_memory,
const base::FilePath& relative_partition_path,
::network::mojom::NetworkContextParams* network_context_params,
::cert_verifier::mojom::CertVerifierCreationParams*
cert_verifier_creation_params) {
HeadlessBrowserContextImpl::From(context)->ConfigureNetworkContextParams(
in_memory, relative_partition_path, network_context_params,
cert_verifier_creation_params);
}
std::string HeadlessContentBrowserClient::GetProduct() {
return HeadlessBrowser::GetProductNameAndVersion();
}
std::string HeadlessContentBrowserClient::GetUserAgent() {
return browser_->options()->user_agent;
}
blink::UserAgentMetadata HeadlessContentBrowserClient::GetUserAgentMetadata() {
return HeadlessBrowser::GetUserAgentMetadata();
}
void HeadlessContentBrowserClient::BindBadgeService(
content::RenderFrameHost* render_frame_host,
mojo::PendingReceiver<blink::mojom::BadgeService> receiver) {
if (!stub_badge_service_)
stub_badge_service_ = std::make_unique<StubBadgeService>();
stub_badge_service_->Bind(std::move(receiver));
}
void HeadlessContentBrowserClient::BindPersistentRendererPrefsService(
content::RenderFrameHost* render_frame_host,
mojo::PendingReceiver<blink::mojom::PersistentRendererPrefsService>
receiver) {
if (!stub_persistent_renderer_prefs_service_) {
stub_persistent_renderer_prefs_service_ =
std::make_unique<StubPersistentRendererPrefsService>();
}
stub_persistent_renderer_prefs_service_->Bind(std::move(receiver));
}
bool HeadlessContentBrowserClient::CanAcceptUntrustedExchangesIfNeeded() {
// We require --user-data-dir flag too so that no dangerous changes are made
// in the user's regular profile.
return base::CommandLine::ForCurrentProcess()->HasSwitch(
switches::kUserDataDir);
}
device::GeolocationSystemPermissionManager*
HeadlessContentBrowserClient::GetGeolocationSystemPermissionManager() {
#if BUILDFLAG(IS_MAC)
return browser_->GetGeolocationSystemPermissionManager();
#else
return nullptr;
#endif
}
#if BUILDFLAG(IS_WIN)
void HeadlessContentBrowserClient::SessionEnding(
std::optional<DWORD> control_type) {
DCHECK_LT(control_type.value_or(0), 0x7fu);
browser_->ShutdownWithExitCode(control_type.value_or(0) + 0x80u);
}
#endif
#if defined(HEADLESS_USE_POLICY)
void HeadlessContentBrowserClient::CreateThrottlesForNavigation(
content::NavigationThrottleRegistry& registry) {
// Avoid creating naviagtion throttle if preferences are not available
// (happens in tests).
content::NavigationHandle& handle = registry.GetNavigationHandle();
if (browser_->GetPrefs()) {
registry.AddThrottle(std::make_unique<PolicyBlocklistNavigationThrottle>(
registry, handle.GetWebContents()->GetBrowserContext()));
}
}
#endif // defined(HEADLESS_USE_POLICY)
void HeadlessContentBrowserClient::OnNetworkServiceCreated(
::network::mojom::NetworkService* network_service) {
HandleExplicitlyAllowedPorts(network_service);
SetEncryptionKey(network_service);
}
void HeadlessContentBrowserClient::GetHyphenationDictionary(
base::OnceCallback<void(const base::FilePath&)> callback) {
base::FilePath dir;
if (base::PathService::Get(base::DIR_EXE, &dir)) {
dir = dir.AppendASCII("hyphen-data");
std::move(callback).Run(dir);
}
}
std::unique_ptr<content::VideoOverlayWindow>
HeadlessContentBrowserClient::CreateWindowForVideoPictureInPicture(
content::VideoPictureInPictureWindowController* controller) {
return std::make_unique<HeadlessVideoOverlayWindow>();
}
// TODO(364362654, 40052246): force-disable network service sandboxing
// until it's stable in headful.
bool HeadlessContentBrowserClient::ShouldSandboxNetworkService() {
return false;
}
void HeadlessContentBrowserClient::HandleExplicitlyAllowedPorts(
::network::mojom::NetworkService* network_service) {
base::CommandLine* command_line = base::CommandLine::ForCurrentProcess();
if (!command_line->HasSwitch(switches::kExplicitlyAllowedPorts))
return;
std::string comma_separated_ports =
command_line->GetSwitchValueASCII(switches::kExplicitlyAllowedPorts);
const auto port_list = base::SplitStringPiece(
comma_separated_ports, ",", base::TRIM_WHITESPACE, base::SPLIT_WANT_ALL);
std::vector<uint16_t> explicitly_allowed_ports;
for (const auto port_str : port_list) {
int port;
if (!base::StringToInt(port_str, &port))
continue;
if (!net::IsPortValid(port))
continue;
explicitly_allowed_ports.push_back(port);
}
network_service->SetExplicitlyAllowedPorts(explicitly_allowed_ports);
}
void HeadlessContentBrowserClient::SetEncryptionKey(
::network::mojom::NetworkService* network_service) {
#if (BUILDFLAG(IS_WIN) || BUILDFLAG(IS_LINUX)) && defined(HEADLESS_USE_PREFS)
// The OSCrypt keys are process bound, so if network service is out of
// process, send it the required key if it is available.
if (content::IsOutOfProcessNetworkService()
#if BUILDFLAG(IS_WIN)
&& OSCrypt::IsEncryptionAvailable()
#endif
) {
network_service->SetEncryptionKey(OSCrypt::GetRawEncryptionKey());
}
#endif
}
content::BluetoothDelegate*
HeadlessContentBrowserClient::GetBluetoothDelegate() {
if (!bluetooth_delegate_) {
bluetooth_delegate_ = std::make_unique<HeadlessBluetoothDelegate>();
}
return bluetooth_delegate_.get();
}
bool HeadlessContentBrowserClient::IsRendererProcessPriorityEnabled() {
// Since there is no visible window in headless, the renderer process priority
// policy, which is mostly based on visibility, is not needed.
return false;
}
} // namespace headless