1/*
2 * Copyright (C) 2012-2019 Apple Inc. All rights reserved.
3 *
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions
6 * are met:
7 * 1. Redistributions of source code must retain the above copyright
8 * notice, this list of conditions and the following disclaimer.
9 * 2. Redistributions in binary form must reproduce the above copyright
10 * notice, this list of conditions and the following disclaimer in the
11 * documentation and/or other materials provided with the distribution.
12 *
13 * THIS SOFTWARE IS PROVIDED BY APPLE INC. AND ITS CONTRIBUTORS ``AS IS''
14 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
15 * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
16 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE INC. OR ITS CONTRIBUTORS
17 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
18 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
19 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
20 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
21 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
22 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
23 * THE POSSIBILITY OF SUCH DAMAGE.
24 */
25
26#pragma once
27
28#include "AuxiliaryProcess.h"
29#include "CacheModel.h"
30#include "DownloadManager.h"
31#include "NetworkBlobRegistry.h"
32#include "NetworkContentRuleListManager.h"
33#include "NetworkHTTPSUpgradeChecker.h"
34#include "SandboxExtension.h"
35#include "WebResourceLoadStatisticsStore.h"
36#include "WebsiteData.h"
37#include <WebCore/AdClickAttribution.h>
38#include <WebCore/ClientOrigin.h>
39#include <WebCore/DiagnosticLoggingClient.h>
40#include <WebCore/FetchIdentifier.h>
41#include <WebCore/IDBKeyData.h>
42#include <WebCore/IDBServer.h>
43#include <WebCore/RegistrableDomain.h>
44#include <WebCore/ServiceWorkerIdentifier.h>
45#include <WebCore/ServiceWorkerTypes.h>
46#include <memory>
47#include <wtf/CrossThreadTask.h>
48#include <wtf/Function.h>
49#include <wtf/HashSet.h>
50#include <wtf/MemoryPressureHandler.h>
51#include <wtf/NeverDestroyed.h>
52#include <wtf/RetainPtr.h>
53#include <wtf/WeakPtr.h>
54
55#if PLATFORM(IOS_FAMILY)
56#include "WebSQLiteDatabaseTracker.h"
57#endif
58
59#if PLATFORM(COCOA)
60typedef struct OpaqueCFHTTPCookieStorage* CFHTTPCookieStorageRef;
61#endif
62
63namespace IPC {
64class FormDataReference;
65}
66
67namespace PAL {
68class SessionID;
69}
70
71namespace WebCore {
72class CertificateInfo;
73class CurlProxySettings;
74class DownloadID;
75class ProtectionSpace;
76class StorageQuotaManager;
77class NetworkStorageSession;
78class ResourceError;
79class SWServer;
80enum class IncludeHttpOnlyCookies : bool;
81enum class StoredCredentialsPolicy : uint8_t;
82enum class StorageAccessPromptWasShown : bool;
83enum class StorageAccessWasGranted : bool;
84struct ClientOrigin;
85struct MessageWithMessagePorts;
86struct SecurityOriginData;
87struct SoupNetworkProxySettings;
88struct ServiceWorkerClientIdentifier;
89}
90
91namespace WebKit {
92
93class AuthenticationManager;
94class NetworkConnectionToWebProcess;
95class NetworkProcessSupplement;
96class NetworkProximityManager;
97class NetworkResourceLoader;
98class WebSWServerConnection;
99class WebSWServerToContextConnection;
100enum class ShouldGrandfatherStatistics : bool;
101enum class StorageAccessStatus : uint8_t;
102enum class WebsiteDataFetchOption;
103enum class WebsiteDataType;
104struct NetworkProcessCreationParameters;
105struct WebsiteDataStoreParameters;
106
107#if ENABLE(SERVICE_WORKER)
108class WebSWOriginStore;
109#endif
110
111namespace CacheStorage {
112class Engine;
113}
114
115namespace NetworkCache {
116class Cache;
117}
118
119class NetworkProcess : public AuxiliaryProcess, private DownloadManager::Client, public ThreadSafeRefCounted<NetworkProcess>
120#if ENABLE(INDEXED_DATABASE)
121 , public WebCore::IDBServer::IDBBackingStoreTemporaryFileHandler
122#endif
123 , public CanMakeWeakPtr<NetworkProcess>
124{
125 WTF_MAKE_NONCOPYABLE(NetworkProcess);
126public:
127 using RegistrableDomain = WebCore::RegistrableDomain;
128 using TopFrameDomain = WebCore::RegistrableDomain;
129 using SubFrameDomain = WebCore::RegistrableDomain;
130 using SubResourceDomain = WebCore::RegistrableDomain;
131 using RedirectDomain = WebCore::RegistrableDomain;
132 using RedirectedFromDomain = WebCore::RegistrableDomain;
133 using RedirectedToDomain = WebCore::RegistrableDomain;
134 using NavigatedFromDomain = WebCore::RegistrableDomain;
135 using NavigatedToDomain = WebCore::RegistrableDomain;
136 using DomainInNeedOfStorageAccess = WebCore::RegistrableDomain;
137 using OpenerDomain = WebCore::RegistrableDomain;
138 using OpenerPageID = uint64_t;
139 using PageID = uint64_t;
140 using FrameID = uint64_t;
141
142 NetworkProcess(AuxiliaryProcessInitializationParameters&&);
143 ~NetworkProcess();
144 static constexpr ProcessType processType = ProcessType::Network;
145
146 template <typename T>
147 T* supplement()
148 {
149 return static_cast<T*>(m_supplements.get(T::supplementName()));
150 }
151
152 template <typename T>
153 void addSupplement()
154 {
155 m_supplements.add(T::supplementName(), std::make_unique<T>(*this));
156 }
157
158 void removeNetworkConnectionToWebProcess(NetworkConnectionToWebProcess&);
159
160 AuthenticationManager& authenticationManager();
161 DownloadManager& downloadManager();
162
163 NetworkCache::Cache* cache() { return m_cache.get(); }
164
165 void setSession(const PAL::SessionID&, Ref<NetworkSession>&&);
166 NetworkSession* networkSession(const PAL::SessionID&) const override;
167 void destroySession(const PAL::SessionID&);
168
169 // Needed for test infrastructure
170 HashMap<PAL::SessionID, Ref<NetworkSession>>& networkSessions() { return m_networkSessions; }
171
172 void forEachNetworkStorageSession(const Function<void(WebCore::NetworkStorageSession&)>&);
173 WebCore::NetworkStorageSession* storageSession(const PAL::SessionID&) const;
174 WebCore::NetworkStorageSession& defaultStorageSession() const;
175 void switchToNewTestingSession();
176#if PLATFORM(COCOA)
177 void ensureSession(const PAL::SessionID&, const String& identifier, RetainPtr<CFHTTPCookieStorageRef>&&);
178#else
179 void ensureSession(const PAL::SessionID&, const String& identifier);
180#endif
181
182 bool canHandleHTTPSServerTrustEvaluation() const { return m_canHandleHTTPSServerTrustEvaluation; }
183
184 void processWillSuspendImminently();
185 void prepareToSuspend();
186 void cancelPrepareToSuspend();
187 void processDidResume();
188 void resume();
189
190 // Diagnostic messages logging.
191 void logDiagnosticMessage(uint64_t webPageID, const String& message, const String& description, WebCore::ShouldSample);
192 void logDiagnosticMessageWithResult(uint64_t webPageID, const String& message, const String& description, WebCore::DiagnosticLoggingResultType, WebCore::ShouldSample);
193 void logDiagnosticMessageWithValue(uint64_t webPageID, const String& message, const String& description, double value, unsigned significantFigures, WebCore::ShouldSample);
194
195#if PLATFORM(COCOA)
196 RetainPtr<CFDataRef> sourceApplicationAuditData() const;
197 void getHostNamesWithHSTSCache(WebCore::NetworkStorageSession&, HashSet<String>&);
198 void deleteHSTSCacheForHostNames(WebCore::NetworkStorageSession&, const Vector<String>&);
199 void clearHSTSCache(WebCore::NetworkStorageSession&, WallTime modifiedSince);
200 bool suppressesConnectionTerminationOnSystemChange() const { return m_suppressesConnectionTerminationOnSystemChange; }
201#endif
202
203 void findPendingDownloadLocation(NetworkDataTask&, ResponseCompletionHandler&&, const WebCore::ResourceResponse&);
204
205 void prefetchDNS(const String&);
206
207 void addWebsiteDataStore(WebsiteDataStoreParameters&&);
208
209#if ENABLE(RESOURCE_LOAD_STATISTICS)
210 void clearPrevalentResource(PAL::SessionID, const RegistrableDomain&, CompletionHandler<void()>&&);
211 void clearUserInteraction(PAL::SessionID, const RegistrableDomain&, CompletionHandler<void()>&&);
212 void deleteWebsiteDataForRegistrableDomains(PAL::SessionID, OptionSet<WebsiteDataType>, HashMap<RegistrableDomain, WebsiteDataToRemove>&&, bool shouldNotifyPage, CompletionHandler<void(const HashSet<RegistrableDomain>&)>&&);
213 void deleteCookiesForTesting(PAL::SessionID, RegistrableDomain, bool includeHttpOnlyCookies, CompletionHandler<void()>&&);
214 void dumpResourceLoadStatistics(PAL::SessionID, CompletionHandler<void(String)>&&);
215 void updatePrevalentDomainsToBlockCookiesFor(PAL::SessionID, const Vector<RegistrableDomain>& domainsToBlock, CompletionHandler<void()>&&);
216 void isGrandfathered(PAL::SessionID, const RegistrableDomain&, CompletionHandler<void(bool)>&&);
217 void isPrevalentResource(PAL::SessionID, const RegistrableDomain&, CompletionHandler<void(bool)>&&);
218 void isVeryPrevalentResource(PAL::SessionID, const RegistrableDomain&, CompletionHandler<void(bool)>&&);
219 void setAgeCapForClientSideCookies(PAL::SessionID, Optional<Seconds>, CompletionHandler<void()>&&);
220 void isRegisteredAsRedirectingTo(PAL::SessionID, const RedirectedFromDomain&, const RedirectedToDomain&, CompletionHandler<void(bool)>&&);
221 void isRegisteredAsSubFrameUnder(PAL::SessionID, const SubFrameDomain&, const TopFrameDomain&, CompletionHandler<void(bool)>&&);
222 void isRegisteredAsSubresourceUnder(PAL::SessionID, const SubResourceDomain&, const TopFrameDomain&, CompletionHandler<void(bool)>&&);
223 void setGrandfathered(PAL::SessionID, const RegistrableDomain&, bool isGrandfathered, CompletionHandler<void()>&&);
224 void setMaxStatisticsEntries(PAL::SessionID, uint64_t maximumEntryCount, CompletionHandler<void()>&&);
225 void setPrevalentResource(PAL::SessionID, const RegistrableDomain&, CompletionHandler<void()>&&);
226 void setPrevalentResourceForDebugMode(PAL::SessionID, const RegistrableDomain&, CompletionHandler<void()>&&);
227 void setVeryPrevalentResource(PAL::SessionID, const RegistrableDomain&, CompletionHandler<void()>&&);
228 void setPruneEntriesDownTo(PAL::SessionID, uint64_t pruneTargetCount, CompletionHandler<void()>&&);
229 void hadUserInteraction(PAL::SessionID, const RegistrableDomain&, CompletionHandler<void(bool)>&&);
230 void getAllStorageAccessEntries(PAL::SessionID, CompletionHandler<void(Vector<String> domains)>&&);
231 void logFrameNavigation(PAL::SessionID, const NavigatedToDomain&, const TopFrameDomain&, const NavigatedFromDomain&, bool isRedirect, bool isMainFrame);
232 void logUserInteraction(PAL::SessionID, const TopFrameDomain&, CompletionHandler<void()>&&);
233 void removePrevalentDomains(PAL::SessionID, const Vector<RegistrableDomain>&);
234 void resetCacheMaxAgeCapForPrevalentResources(PAL::SessionID, CompletionHandler<void()>&&);
235 void resetParametersToDefaultValues(PAL::SessionID, CompletionHandler<void()>&&);
236 void scheduleClearInMemoryAndPersistent(PAL::SessionID, Optional<WallTime> modifiedSince, ShouldGrandfatherStatistics, CompletionHandler<void()>&&);
237 void scheduleCookieBlockingUpdate(PAL::SessionID, CompletionHandler<void()>&&);
238 void scheduleStatisticsAndDataRecordsProcessing(PAL::SessionID, CompletionHandler<void()>&&);
239 void submitTelemetry(PAL::SessionID, CompletionHandler<void()>&&);
240 void setCacheMaxAgeCapForPrevalentResources(PAL::SessionID, Seconds, CompletionHandler<void()>&&);
241 void setGrandfatheringTime(PAL::SessionID, Seconds, CompletionHandler<void()>&&);
242 void setLastSeen(PAL::SessionID, const RegistrableDomain&, Seconds, CompletionHandler<void()>&&);
243 void setMinimumTimeBetweenDataRecordsRemoval(PAL::SessionID, Seconds, CompletionHandler<void()>&&);
244 void setNotifyPagesWhenDataRecordsWereScanned(PAL::SessionID, bool value, CompletionHandler<void()>&&);
245 void setIsRunningResourceLoadStatisticsTest(PAL::SessionID, bool value, CompletionHandler<void()>&&);
246 void setNotifyPagesWhenTelemetryWasCaptured(PAL::SessionID, bool value, CompletionHandler<void()>&&);
247 void setResourceLoadStatisticsEnabled(bool);
248 void setResourceLoadStatisticsDebugMode(PAL::SessionID, bool debugMode, CompletionHandler<void()>&&d);
249 void setShouldClassifyResourcesBeforeDataRecordsRemoval(PAL::SessionID, bool value, CompletionHandler<void()>&&);
250 void setSubframeUnderTopFrameDomain(PAL::SessionID, const SubFrameDomain&, const TopFrameDomain&, CompletionHandler<void()>&&);
251 void setSubresourceUnderTopFrameDomain(PAL::SessionID, const SubResourceDomain&, const TopFrameDomain&, CompletionHandler<void()>&&);
252 void setSubresourceUniqueRedirectTo(PAL::SessionID, const SubResourceDomain&, const RedirectedToDomain&, CompletionHandler<void()>&&);
253 void setSubresourceUniqueRedirectFrom(PAL::SessionID, const SubResourceDomain&, const RedirectedFromDomain&, CompletionHandler<void()>&&);
254 void setTimeToLiveUserInteraction(PAL::SessionID, Seconds, CompletionHandler<void()>&&);
255 void setTopFrameUniqueRedirectTo(PAL::SessionID, const TopFrameDomain&, const RedirectedToDomain&, CompletionHandler<void()>&&);
256 void setTopFrameUniqueRedirectFrom(PAL::SessionID, const TopFrameDomain&, const RedirectedFromDomain&, CompletionHandler<void()>&&);
257 void registrableDomainsWithWebsiteData(PAL::SessionID, OptionSet<WebsiteDataType>, bool shouldNotifyPage, CompletionHandler<void(HashSet<RegistrableDomain>&&)>&&);
258 void committedCrossSiteLoadWithLinkDecoration(PAL::SessionID, const RegistrableDomain& fromDomain, const RegistrableDomain& toDomain, uint64_t pageID, CompletionHandler<void()>&&);
259 void setCrossSiteLoadWithLinkDecorationForTesting(PAL::SessionID, const RegistrableDomain& fromDomain, const RegistrableDomain& toDomain, CompletionHandler<void()>&&);
260 void resetCrossSiteLoadsWithLinkDecorationForTesting(PAL::SessionID, CompletionHandler<void()>&&);
261#endif
262
263 using CacheStorageRootPathCallback = CompletionHandler<void(String&&)>;
264 void cacheStorageRootPath(PAL::SessionID, CacheStorageRootPathCallback&&);
265
266 void preconnectTo(const URL&, WebCore::StoredCredentialsPolicy);
267
268 void setSessionIsControlledByAutomation(PAL::SessionID, bool);
269 bool sessionIsControlledByAutomation(PAL::SessionID) const;
270
271#if ENABLE(CONTENT_EXTENSIONS)
272 NetworkContentRuleListManager& networkContentRuleListManager() { return m_networkContentRuleListManager; }
273#endif
274
275#if ENABLE(INDEXED_DATABASE)
276 WebCore::IDBServer::IDBServer& idbServer(PAL::SessionID);
277 // WebCore::IDBServer::IDBBackingStoreFileHandler.
278 void accessToTemporaryFileComplete(const String& path) final;
279 void setIDBPerOriginQuota(uint64_t);
280#endif
281 void updateQuotaBasedOnSpaceUsageForTesting(PAL::SessionID, const WebCore::ClientOrigin&);
282
283#if ENABLE(SANDBOX_EXTENSIONS)
284 void getSandboxExtensionsForBlobFiles(const Vector<String>& filenames, CompletionHandler<void(SandboxExtension::HandleArray&&)>&&);
285#endif
286
287 void didReceiveNetworkProcessMessage(IPC::Connection&, IPC::Decoder&);
288
289#if ENABLE(SERVICE_WORKER)
290 WebSWServerToContextConnection* serverToContextConnectionForRegistrableDomain(const WebCore::RegistrableDomain&);
291 void createServerToContextConnection(const WebCore::RegistrableDomain&, Optional<PAL::SessionID>);
292
293 WebCore::SWServer& swServerForSession(PAL::SessionID);
294 void registerSWServerConnection(WebSWServerConnection&);
295 void unregisterSWServerConnection(WebSWServerConnection&);
296
297 void swContextConnectionMayNoLongerBeNeeded(WebSWServerToContextConnection&);
298
299 WebSWServerToContextConnection* connectionToContextProcessFromIPCConnection(IPC::Connection&);
300 void connectionToContextProcessWasClosed(Ref<WebSWServerToContextConnection>&&);
301#endif
302
303#if PLATFORM(IOS_FAMILY)
304 bool parentProcessHasServiceWorkerEntitlement() const;
305#else
306 bool parentProcessHasServiceWorkerEntitlement() const { return true; }
307#endif
308
309#if PLATFORM(COCOA)
310 NetworkHTTPSUpgradeChecker& networkHTTPSUpgradeChecker() { return m_networkHTTPSUpgradeChecker; }
311#endif
312
313 const String& uiProcessBundleIdentifier() const { return m_uiProcessBundleIdentifier; }
314
315 void ref() const override { ThreadSafeRefCounted<NetworkProcess>::ref(); }
316 void deref() const override { ThreadSafeRefCounted<NetworkProcess>::deref(); }
317
318 CacheStorage::Engine* findCacheEngine(const PAL::SessionID&);
319 CacheStorage::Engine& ensureCacheEngine(const PAL::SessionID&, Function<Ref<CacheStorage::Engine>()>&&);
320 void removeCacheEngine(const PAL::SessionID&);
321 void requestStorageSpace(PAL::SessionID, const WebCore::ClientOrigin&, uint64_t quota, uint64_t currentSize, uint64_t spaceRequired, CompletionHandler<void(Optional<uint64_t>)>&&);
322
323 NetworkBlobRegistry& networkBlobRegistry() override { return m_networkBlobRegistry; }
324
325 void storeAdClickAttribution(PAL::SessionID, WebCore::AdClickAttribution&&);
326 void dumpAdClickAttribution(PAL::SessionID, CompletionHandler<void(String)>&&);
327 void clearAdClickAttribution(PAL::SessionID, CompletionHandler<void()>&&);
328 void setAdClickAttributionOverrideTimerForTesting(PAL::SessionID, bool value, CompletionHandler<void()>&&);
329 void setAdClickAttributionConversionURLForTesting(PAL::SessionID, URL&&, CompletionHandler<void()>&&);
330 void markAdClickAttributionsAsExpiredForTesting(PAL::SessionID, CompletionHandler<void()>&&);
331
332 WebCore::StorageQuotaManager& storageQuotaManager(PAL::SessionID, const WebCore::ClientOrigin&);
333
334 void addKeptAliveLoad(Ref<NetworkResourceLoader>&&);
335 void removeKeptAliveLoad(NetworkResourceLoader&);
336
337private:
338 void platformInitializeNetworkProcess(const NetworkProcessCreationParameters&);
339 std::unique_ptr<WebCore::NetworkStorageSession> platformCreateDefaultStorageSession() const;
340
341 void terminate() override;
342 void platformTerminate();
343
344 void lowMemoryHandler(Critical);
345
346 void processDidTransitionToForeground();
347 void processDidTransitionToBackground();
348 void platformProcessDidTransitionToForeground();
349 void platformProcessDidTransitionToBackground();
350
351 enum class ShouldAcknowledgeWhenReadyToSuspend { No, Yes };
352 void actualPrepareToSuspend(ShouldAcknowledgeWhenReadyToSuspend);
353 void platformPrepareToSuspend(CompletionHandler<void()>&&);
354 void platformProcessDidResume();
355
356 // AuxiliaryProcess
357 void initializeProcess(const AuxiliaryProcessInitializationParameters&) override;
358 void initializeProcessName(const AuxiliaryProcessInitializationParameters&) override;
359 void initializeSandbox(const AuxiliaryProcessInitializationParameters&, SandboxInitializationParameters&) override;
360 void initializeConnection(IPC::Connection*) override;
361 bool shouldTerminate() override;
362
363 // IPC::Connection::Client
364 void didReceiveMessage(IPC::Connection&, IPC::Decoder&) override;
365 void didReceiveSyncMessage(IPC::Connection&, IPC::Decoder&, std::unique_ptr<IPC::Encoder>&) override;
366 void didClose(IPC::Connection&) override;
367
368 // DownloadManager::Client
369 void didCreateDownload() override;
370 void didDestroyDownload() override;
371 IPC::Connection* downloadProxyConnection() override;
372 IPC::Connection* parentProcessConnectionForDownloads() override { return parentProcessConnection(); }
373 AuthenticationManager& downloadsAuthenticationManager() override;
374 void pendingDownloadCanceled(DownloadID) override;
375 uint32_t downloadMonitorSpeedMultiplier() const override { return m_downloadMonitorSpeedMultiplier; }
376
377 // Message Handlers
378 void didReceiveSyncNetworkProcessMessage(IPC::Connection&, IPC::Decoder&, std::unique_ptr<IPC::Encoder>&);
379 void initializeNetworkProcess(NetworkProcessCreationParameters&&);
380 void createNetworkConnectionToWebProcess(bool isServiceWorkerProcess, WebCore::RegistrableDomain&&);
381
382 void fetchWebsiteData(PAL::SessionID, OptionSet<WebsiteDataType>, OptionSet<WebsiteDataFetchOption>, uint64_t callbackID);
383 void deleteWebsiteData(PAL::SessionID, OptionSet<WebsiteDataType>, WallTime modifiedSince, uint64_t callbackID);
384 void deleteWebsiteDataForOrigins(PAL::SessionID, OptionSet<WebsiteDataType>, const Vector<WebCore::SecurityOriginData>& origins, const Vector<String>& cookieHostNames, const Vector<String>& HSTSCacheHostnames, uint64_t callbackID);
385
386 void clearCachedCredentials();
387
388 void setCacheStorageParameters(PAL::SessionID, String&& cacheStorageDirectory, SandboxExtension::Handle&&);
389 void initializeQuotaUsers(WebCore::StorageQuotaManager&, PAL::SessionID, const WebCore::ClientOrigin&);
390
391 // FIXME: This should take a session ID so we can identify which disk cache to delete.
392 void clearDiskCache(WallTime modifiedSince, CompletionHandler<void()>&&);
393
394 void downloadRequest(PAL::SessionID, DownloadID, const WebCore::ResourceRequest&, const String& suggestedFilename);
395 void resumeDownload(PAL::SessionID, DownloadID, const IPC::DataReference& resumeData, const String& path, SandboxExtension::Handle&&);
396 void cancelDownload(DownloadID);
397#if PLATFORM(COCOA)
398 void publishDownloadProgress(DownloadID, const URL&, SandboxExtension::Handle&&);
399#endif
400 void continueWillSendRequest(DownloadID, WebCore::ResourceRequest&&);
401 void continueDecidePendingDownloadDestination(DownloadID, String destination, SandboxExtension::Handle&&, bool allowOverwrite);
402 void applicationDidEnterBackground();
403 void applicationWillEnterForeground();
404
405 void setCacheModel(CacheModel);
406 void allowSpecificHTTPSCertificateForHost(const WebCore::CertificateInfo&, const String& host);
407 void setCanHandleHTTPSServerTrustEvaluation(bool);
408 void getNetworkProcessStatistics(uint64_t callbackID);
409 void clearCacheForAllOrigins(uint32_t cachesToClear);
410 void setAllowsAnySSLCertificateForWebSocket(bool, CompletionHandler<void()>&&);
411
412 void syncAllCookies();
413 void didSyncAllCookies();
414
415#if USE(SOUP)
416 void setIgnoreTLSErrors(bool);
417 void userPreferredLanguagesChanged(const Vector<String>&);
418 void setNetworkProxySettings(const WebCore::SoupNetworkProxySettings&);
419#endif
420
421#if USE(CURL)
422 void setNetworkProxySettings(PAL::SessionID, WebCore::CurlProxySettings&&);
423#endif
424
425#if PLATFORM(MAC)
426 static void setSharedHTTPCookieStorage(const Vector<uint8_t>& identifier);
427#endif
428
429 void platformSyncAllCookies(CompletionHandler<void()>&&);
430
431 void originsWithPersistentCredentials(CompletionHandler<void(Vector<WebCore::SecurityOriginData>)>&&);
432 void removeCredentialsWithOrigins(const Vector<WebCore::SecurityOriginData>& origins, CompletionHandler<void()>&&);
433
434 void registerURLSchemeAsSecure(const String&) const;
435 void registerURLSchemeAsBypassingContentSecurityPolicy(const String&) const;
436 void registerURLSchemeAsLocal(const String&) const;
437 void registerURLSchemeAsNoAccess(const String&) const;
438 void registerURLSchemeAsDisplayIsolated(const String&) const;
439 void registerURLSchemeAsCORSEnabled(const String&) const;
440 void registerURLSchemeAsCanDisplayOnlyIfCanRequest(const String&) const;
441
442#if ENABLE(INDEXED_DATABASE)
443 void addIndexedDatabaseSession(PAL::SessionID, String&, SandboxExtension::Handle&);
444 void collectIndexedDatabaseOriginsForVersion(const String&, HashSet<WebCore::SecurityOriginData>&);
445 HashSet<WebCore::SecurityOriginData> indexedDatabaseOrigins(const String& path);
446 Ref<WebCore::IDBServer::IDBServer> createIDBServer(PAL::SessionID);
447#endif
448
449#if ENABLE(SERVICE_WORKER)
450 void didCreateWorkerContextProcessConnection(const IPC::Attachment&);
451
452 void postMessageToServiceWorkerClient(const WebCore::ServiceWorkerClientIdentifier& destinationIdentifier, WebCore::MessageWithMessagePorts&&, WebCore::ServiceWorkerIdentifier sourceIdentifier, const String& sourceOrigin);
453 void postMessageToServiceWorker(WebCore::ServiceWorkerIdentifier destination, WebCore::MessageWithMessagePorts&&, const WebCore::ServiceWorkerOrClientIdentifier& source, WebCore::SWServerConnectionIdentifier);
454
455 void disableServiceWorkerProcessTerminationDelay();
456
457 WebSWOriginStore& swOriginStoreForSession(PAL::SessionID);
458 WebSWOriginStore* existingSWOriginStoreForSession(PAL::SessionID) const;
459 bool needsServerToContextConnectionForRegistrableDomain(const WebCore::RegistrableDomain&) const;
460
461 void addServiceWorkerSession(PAL::SessionID, String& serviceWorkerRegistrationDirectory, const SandboxExtension::Handle&);
462#endif
463
464 void postStorageTask(CrossThreadTask&&);
465 // For execution on work queue thread only.
466 void performNextStorageTask();
467 void ensurePathExists(const String& path);
468
469 void clearStorageQuota(PAL::SessionID);
470 void initializeStorageQuota(const WebsiteDataStoreParameters&);
471
472 // Connections to WebProcesses.
473 Vector<Ref<NetworkConnectionToWebProcess>> m_webProcessConnections;
474
475 String m_diskCacheDirectory;
476 bool m_hasSetCacheModel { false };
477 CacheModel m_cacheModel { CacheModel::DocumentViewer };
478 bool m_suppressMemoryPressureHandler { false };
479 bool m_diskCacheIsDisabledForTesting { false };
480 bool m_canHandleHTTPSServerTrustEvaluation { true };
481 String m_uiProcessBundleIdentifier;
482 DownloadManager m_downloadManager;
483
484 HashMap<PAL::SessionID, Ref<CacheStorage::Engine>> m_cacheEngines;
485
486 RefPtr<NetworkCache::Cache> m_cache;
487
488 typedef HashMap<const char*, std::unique_ptr<NetworkProcessSupplement>, PtrHash<const char*>> NetworkProcessSupplementMap;
489 NetworkProcessSupplementMap m_supplements;
490
491 HashSet<PAL::SessionID> m_sessionsControlledByAutomation;
492 HashMap<PAL::SessionID, Vector<CacheStorageRootPathCallback>> m_cacheStorageParametersCallbacks;
493
494 HashMap<PAL::SessionID, Ref<NetworkSession>> m_networkSessions;
495 HashMap<PAL::SessionID, std::unique_ptr<WebCore::NetworkStorageSession>> m_networkStorageSessions;
496 mutable std::unique_ptr<WebCore::NetworkStorageSession> m_defaultNetworkStorageSession;
497 NetworkBlobRegistry m_networkBlobRegistry;
498
499#if PLATFORM(COCOA)
500 void platformInitializeNetworkProcessCocoa(const NetworkProcessCreationParameters&);
501 void setStorageAccessAPIEnabled(bool);
502
503 // FIXME: We'd like to be able to do this without the #ifdef, but WorkQueue + BinarySemaphore isn't good enough since
504 // multiple requests to clear the cache can come in before previous requests complete, and we need to wait for all of them.
505 // In the future using WorkQueue and a counting semaphore would work, as would WorkQueue supporting the libdispatch concept of "work groups".
506 dispatch_group_t m_clearCacheDispatchGroup { nullptr };
507
508 bool m_suppressesConnectionTerminationOnSystemChange { false };
509#endif
510
511#if ENABLE(CONTENT_EXTENSIONS)
512 NetworkContentRuleListManager m_networkContentRuleListManager;
513#endif
514
515#if PLATFORM(IOS_FAMILY)
516 WebSQLiteDatabaseTracker m_webSQLiteDatabaseTracker;
517#endif
518
519 Ref<WorkQueue> m_storageTaskQueue { WorkQueue::create("com.apple.WebKit.StorageTask") };
520
521#if ENABLE(INDEXED_DATABASE)
522 HashMap<PAL::SessionID, String> m_idbDatabasePaths;
523 HashMap<PAL::SessionID, RefPtr<WebCore::IDBServer::IDBServer>> m_idbServers;
524 uint64_t m_idbPerOriginQuota { WebCore::IDBServer::defaultPerOriginQuota };
525#endif
526
527 Deque<CrossThreadTask> m_storageTasks;
528 Lock m_storageTaskMutex;
529
530#if ENABLE(SERVICE_WORKER)
531 HashMap<WebCore::RegistrableDomain, RefPtr<WebSWServerToContextConnection>> m_serverToContextConnections;
532 bool m_waitingForServerToContextProcessConnection { false };
533 bool m_shouldDisableServiceWorkerProcessTerminationDelay { false };
534 HashMap<PAL::SessionID, String> m_swDatabasePaths;
535 HashMap<PAL::SessionID, std::unique_ptr<WebCore::SWServer>> m_swServers;
536 HashMap<WebCore::SWServerConnectionIdentifier, WebSWServerConnection*> m_swServerConnections;
537#endif
538
539#if PLATFORM(COCOA)
540 NetworkHTTPSUpgradeChecker m_networkHTTPSUpgradeChecker;
541#endif
542
543 class StorageQuotaManagers {
544 public:
545 uint64_t defaultQuota(const WebCore::ClientOrigin& origin) const { return origin.topOrigin == origin.clientOrigin ? m_defaultQuota : m_defaultThirdPartyQuota; }
546 void setDefaultQuotas(uint64_t defaultQuota, uint64_t defaultThirdPartyQuota)
547 {
548 m_defaultQuota = defaultQuota;
549 m_defaultThirdPartyQuota = defaultThirdPartyQuota;
550 }
551
552 HashMap<WebCore::ClientOrigin, std::unique_ptr<WebCore::StorageQuotaManager>>& managersPerOrigin() { return m_managersPerOrigin; }
553
554 private:
555 uint64_t m_defaultQuota { WebCore::StorageQuotaManager::defaultQuota() };
556 uint64_t m_defaultThirdPartyQuota { WebCore::StorageQuotaManager::defaultThirdPartyQuota() };
557 HashMap<WebCore::ClientOrigin, std::unique_ptr<WebCore::StorageQuotaManager>> m_managersPerOrigin;
558 };
559 HashMap<PAL::SessionID, StorageQuotaManagers> m_storageQuotaManagers;
560 uint32_t m_downloadMonitorSpeedMultiplier { 1 };
561};
562
563} // namespace WebKit
564