1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 2 // Use of this source code is governed by a BSD-style license that can be 3 // found in the LICENSE file. 4 5 #include "content/browser/storage_partition_impl_map.h" 6 7 #include "base/bind.h" 8 #include "base/callback.h" 9 #include "base/files/file_enumerator.h" 10 #include "base/files/file_path.h" 11 #include "base/files/file_util.h" 12 #include "base/stl_util.h" 13 #include "base/strings/string_number_conversions.h" 14 #include "base/strings/string_util.h" 15 #include "base/strings/stringprintf.h" 16 #include "base/threading/sequenced_worker_pool.h" 17 #include "content/browser/appcache/chrome_appcache_service.h" 18 #include "content/browser/fileapi/browser_file_system_helper.h" 19 #include "content/browser/fileapi/chrome_blob_storage_context.h" 20 #include "content/browser/loader/resource_request_info_impl.h" 21 #include "content/browser/resource_context_impl.h" 22 #include "content/browser/service_worker/service_worker_request_handler.h" 23 #include "content/browser/storage_partition_impl.h" 24 #include "content/browser/streams/stream.h" 25 #include "content/browser/streams/stream_context.h" 26 #include "content/browser/streams/stream_registry.h" 27 #include "content/browser/streams/stream_url_request_job.h" 28 #include "content/browser/webui/url_data_manager_backend.h" 29 #include "content/public/browser/browser_context.h" 30 #include "content/public/browser/browser_thread.h" 31 #include "content/public/browser/content_browser_client.h" 32 #include "content/public/browser/storage_partition.h" 33 #include "content/public/common/content_constants.h" 34 #include "content/public/common/url_constants.h" 35 #include "crypto/sha2.h" 36 #include "net/url_request/url_request_context.h" 37 #include "net/url_request/url_request_context_getter.h" 38 #include "storage/browser/blob/blob_storage_context.h" 39 #include "storage/browser/blob/blob_url_request_job_factory.h" 40 #include "storage/browser/fileapi/file_system_url_request_job_factory.h" 41 #include "storage/common/blob/blob_data.h" 42 43 using storage::FileSystemContext; 44 using storage::BlobStorageContext; 45 46 namespace content { 47 48 namespace { 49 50 // A derivative that knows about Streams too. 51 class BlobProtocolHandler : public net::URLRequestJobFactory::ProtocolHandler { 52 public: 53 BlobProtocolHandler(ChromeBlobStorageContext* blob_storage_context, 54 StreamContext* stream_context, 55 storage::FileSystemContext* file_system_context) 56 : blob_storage_context_(blob_storage_context), 57 stream_context_(stream_context), 58 file_system_context_(file_system_context) {} 59 60 virtual ~BlobProtocolHandler() { 61 } 62 63 virtual net::URLRequestJob* MaybeCreateJob( 64 net::URLRequest* request, 65 net::NetworkDelegate* network_delegate) const OVERRIDE { 66 scoped_refptr<Stream> stream = 67 stream_context_->registry()->GetStream(request->url()); 68 if (stream.get()) 69 return new StreamURLRequestJob(request, network_delegate, stream); 70 71 if (!blob_protocol_handler_) { 72 // Construction is deferred because 'this' is constructed on 73 // the main thread but we want blob_protocol_handler_ constructed 74 // on the IO thread. 75 blob_protocol_handler_.reset(new storage::BlobProtocolHandler( 76 blob_storage_context_->context(), 77 file_system_context_.get(), 78 BrowserThread::GetMessageLoopProxyForThread(BrowserThread::FILE) 79 .get())); 80 } 81 return blob_protocol_handler_->MaybeCreateJob(request, network_delegate); 82 } 83 84 private: 85 const scoped_refptr<ChromeBlobStorageContext> blob_storage_context_; 86 const scoped_refptr<StreamContext> stream_context_; 87 const scoped_refptr<storage::FileSystemContext> file_system_context_; 88 mutable scoped_ptr<storage::BlobProtocolHandler> blob_protocol_handler_; 89 DISALLOW_COPY_AND_ASSIGN(BlobProtocolHandler); 90 }; 91 92 // These constants are used to create the directory structure under the profile 93 // where renderers with a non-default storage partition keep their persistent 94 // state. This will contain a set of directories that partially mirror the 95 // directory structure of BrowserContext::GetPath(). 96 // 97 // The kStoragePartitionDirname contains an extensions directory which is 98 // further partitioned by extension id, followed by another level of directories 99 // for the "default" extension storage partition and one directory for each 100 // persistent partition used by a webview tag. Example: 101 // 102 // Storage/ext/ABCDEF/def 103 // Storage/ext/ABCDEF/hash(partition name) 104 // 105 // The code in GetStoragePartitionPath() constructs these path names. 106 // 107 // TODO(nasko): Move extension related path code out of content. 108 const base::FilePath::CharType kStoragePartitionDirname[] = 109 FILE_PATH_LITERAL("Storage"); 110 const base::FilePath::CharType kExtensionsDirname[] = 111 FILE_PATH_LITERAL("ext"); 112 const base::FilePath::CharType kDefaultPartitionDirname[] = 113 FILE_PATH_LITERAL("def"); 114 const base::FilePath::CharType kTrashDirname[] = 115 FILE_PATH_LITERAL("trash"); 116 117 // Because partition names are user specified, they can be arbitrarily long 118 // which makes them unsuitable for paths names. We use a truncation of a 119 // SHA256 hash to perform a deterministic shortening of the string. The 120 // kPartitionNameHashBytes constant controls the length of the truncation. 121 // We use 6 bytes, which gives us 99.999% reliability against collisions over 122 // 1 million partition domains. 123 // 124 // Analysis: 125 // We assume that all partition names within one partition domain are 126 // controlled by the the same entity. Thus there is no chance for adverserial 127 // attack and all we care about is accidental collision. To get 5 9s over 128 // 1 million domains, we need the probability of a collision in any one domain 129 // to be 130 // 131 // p < nroot(1000000, .99999) ~= 10^-11 132 // 133 // We use the following birthday attack approximation to calculate the max 134 // number of unique names for this probability: 135 // 136 // n(p,H) = sqrt(2*H * ln(1/(1-p))) 137 // 138 // For a 6-byte hash, H = 2^(6*8). n(10^-11, H) ~= 75 139 // 140 // An average partition domain is likely to have less than 10 unique 141 // partition names which is far lower than 75. 142 // 143 // Note, that for 4 9s of reliability, the limit is 237 partition names per 144 // partition domain. 145 const int kPartitionNameHashBytes = 6; 146 147 // Needed for selecting all files in ObliterateOneDirectory() below. 148 #if defined(OS_POSIX) 149 const int kAllFileTypes = base::FileEnumerator::FILES | 150 base::FileEnumerator::DIRECTORIES | 151 base::FileEnumerator::SHOW_SYM_LINKS; 152 #else 153 const int kAllFileTypes = base::FileEnumerator::FILES | 154 base::FileEnumerator::DIRECTORIES; 155 #endif 156 157 base::FilePath GetStoragePartitionDomainPath( 158 const std::string& partition_domain) { 159 CHECK(base::IsStringUTF8(partition_domain)); 160 161 return base::FilePath(kStoragePartitionDirname).Append(kExtensionsDirname) 162 .Append(base::FilePath::FromUTF8Unsafe(partition_domain)); 163 } 164 165 // Helper function for doing a depth-first deletion of the data on disk. 166 // Examines paths directly in |current_dir| (no recursion) and tries to 167 // delete from disk anything that is in, or isn't a parent of something in 168 // |paths_to_keep|. Paths that need further expansion are added to 169 // |paths_to_consider|. 170 void ObliterateOneDirectory(const base::FilePath& current_dir, 171 const std::vector<base::FilePath>& paths_to_keep, 172 std::vector<base::FilePath>* paths_to_consider) { 173 CHECK(current_dir.IsAbsolute()); 174 175 base::FileEnumerator enumerator(current_dir, false, kAllFileTypes); 176 for (base::FilePath to_delete = enumerator.Next(); !to_delete.empty(); 177 to_delete = enumerator.Next()) { 178 // Enum tracking which of the 3 possible actions to take for |to_delete|. 179 enum { kSkip, kEnqueue, kDelete } action = kDelete; 180 181 for (std::vector<base::FilePath>::const_iterator to_keep = 182 paths_to_keep.begin(); 183 to_keep != paths_to_keep.end(); 184 ++to_keep) { 185 if (to_delete == *to_keep) { 186 action = kSkip; 187 break; 188 } else if (to_delete.IsParent(*to_keep)) { 189 // |to_delete| contains a path to keep. Add to stack for further 190 // processing. 191 action = kEnqueue; 192 break; 193 } 194 } 195 196 switch (action) { 197 case kDelete: 198 base::DeleteFile(to_delete, true); 199 break; 200 201 case kEnqueue: 202 paths_to_consider->push_back(to_delete); 203 break; 204 205 case kSkip: 206 break; 207 } 208 } 209 } 210 211 // Synchronously attempts to delete |unnormalized_root|, preserving only 212 // entries in |paths_to_keep|. If there are no entries in |paths_to_keep| on 213 // disk, then it completely removes |unnormalized_root|. All paths must be 214 // absolute paths. 215 void BlockingObliteratePath( 216 const base::FilePath& unnormalized_browser_context_root, 217 const base::FilePath& unnormalized_root, 218 const std::vector<base::FilePath>& paths_to_keep, 219 const scoped_refptr<base::TaskRunner>& closure_runner, 220 const base::Closure& on_gc_required) { 221 // Early exit required because MakeAbsoluteFilePath() will fail on POSIX 222 // if |unnormalized_root| does not exist. This is safe because there is 223 // nothing to do in this situation anwyays. 224 if (!base::PathExists(unnormalized_root)) { 225 return; 226 } 227 228 // Never try to obliterate things outside of the browser context root or the 229 // browser context root itself. Die hard. 230 base::FilePath root = base::MakeAbsoluteFilePath(unnormalized_root); 231 base::FilePath browser_context_root = 232 base::MakeAbsoluteFilePath(unnormalized_browser_context_root); 233 CHECK(!root.empty()); 234 CHECK(!browser_context_root.empty()); 235 CHECK(browser_context_root.IsParent(root) && browser_context_root != root); 236 237 // Reduce |paths_to_keep| set to those under the root and actually on disk. 238 std::vector<base::FilePath> valid_paths_to_keep; 239 for (std::vector<base::FilePath>::const_iterator it = paths_to_keep.begin(); 240 it != paths_to_keep.end(); 241 ++it) { 242 if (root.IsParent(*it) && base::PathExists(*it)) 243 valid_paths_to_keep.push_back(*it); 244 } 245 246 // If none of the |paths_to_keep| are valid anymore then we just whack the 247 // root and be done with it. Otherwise, signal garbage collection and do 248 // a best-effort delete of the on-disk structures. 249 if (valid_paths_to_keep.empty()) { 250 base::DeleteFile(root, true); 251 return; 252 } 253 closure_runner->PostTask(FROM_HERE, on_gc_required); 254 255 // Otherwise, start at the root and delete everything that is not in 256 // |valid_paths_to_keep|. 257 std::vector<base::FilePath> paths_to_consider; 258 paths_to_consider.push_back(root); 259 while(!paths_to_consider.empty()) { 260 base::FilePath path = paths_to_consider.back(); 261 paths_to_consider.pop_back(); 262 ObliterateOneDirectory(path, valid_paths_to_keep, &paths_to_consider); 263 } 264 } 265 266 // Ensures each path in |active_paths| is a direct child of storage_root. 267 void NormalizeActivePaths(const base::FilePath& storage_root, 268 base::hash_set<base::FilePath>* active_paths) { 269 base::hash_set<base::FilePath> normalized_active_paths; 270 271 for (base::hash_set<base::FilePath>::iterator iter = active_paths->begin(); 272 iter != active_paths->end(); ++iter) { 273 base::FilePath relative_path; 274 if (!storage_root.AppendRelativePath(*iter, &relative_path)) 275 continue; 276 277 std::vector<base::FilePath::StringType> components; 278 relative_path.GetComponents(&components); 279 280 DCHECK(!relative_path.empty()); 281 normalized_active_paths.insert(storage_root.Append(components.front())); 282 } 283 284 active_paths->swap(normalized_active_paths); 285 } 286 287 // Deletes all entries inside the |storage_root| that are not in the 288 // |active_paths|. Deletion is done in 2 steps: 289 // 290 // (1) Moving all garbage collected paths into a trash directory. 291 // (2) Asynchronously deleting the trash directory. 292 // 293 // The deletion is asynchronous because after (1) completes, calling code can 294 // safely continue to use the paths that had just been garbage collected 295 // without fear of race conditions. 296 // 297 // This code also ignores failed moves rather than attempting a smarter retry. 298 // Moves shouldn't fail here unless there is some out-of-band error (eg., 299 // FS corruption). Retry logic is dangerous in the general case because 300 // there is not necessarily a guaranteed case where the logic may succeed. 301 // 302 // This function is still named BlockingGarbageCollect() because it does 303 // execute a few filesystem operations synchronously. 304 void BlockingGarbageCollect( 305 const base::FilePath& storage_root, 306 const scoped_refptr<base::TaskRunner>& file_access_runner, 307 scoped_ptr<base::hash_set<base::FilePath> > active_paths) { 308 CHECK(storage_root.IsAbsolute()); 309 310 NormalizeActivePaths(storage_root, active_paths.get()); 311 312 base::FileEnumerator enumerator(storage_root, false, kAllFileTypes); 313 base::FilePath trash_directory; 314 if (!base::CreateTemporaryDirInDir(storage_root, kTrashDirname, 315 &trash_directory)) { 316 // Unable to continue without creating the trash directory so give up. 317 return; 318 } 319 for (base::FilePath path = enumerator.Next(); !path.empty(); 320 path = enumerator.Next()) { 321 if (active_paths->find(path) == active_paths->end() && 322 path != trash_directory) { 323 // Since |trash_directory| is unique for each run of this function there 324 // can be no colllisions on the move. 325 base::Move(path, trash_directory.Append(path.BaseName())); 326 } 327 } 328 329 file_access_runner->PostTask( 330 FROM_HERE, 331 base::Bind(base::IgnoreResult(&base::DeleteFile), trash_directory, true)); 332 } 333 334 } // namespace 335 336 // static 337 base::FilePath StoragePartitionImplMap::GetStoragePartitionPath( 338 const std::string& partition_domain, 339 const std::string& partition_name) { 340 if (partition_domain.empty()) 341 return base::FilePath(); 342 343 base::FilePath path = GetStoragePartitionDomainPath(partition_domain); 344 345 // TODO(ajwong): Mangle in-memory into this somehow, either by putting 346 // it into the partition_name, or by manually adding another path component 347 // here. Otherwise, it's possible to have an in-memory StoragePartition and 348 // a persistent one that return the same FilePath for GetPath(). 349 if (!partition_name.empty()) { 350 // For analysis of why we can ignore collisions, see the comment above 351 // kPartitionNameHashBytes. 352 char buffer[kPartitionNameHashBytes]; 353 crypto::SHA256HashString(partition_name, &buffer[0], 354 sizeof(buffer)); 355 return path.AppendASCII(base::HexEncode(buffer, sizeof(buffer))); 356 } 357 358 return path.Append(kDefaultPartitionDirname); 359 } 360 361 StoragePartitionImplMap::StoragePartitionImplMap( 362 BrowserContext* browser_context) 363 : browser_context_(browser_context), 364 resource_context_initialized_(false) { 365 // Doing here instead of initializer list cause it's just too ugly to read. 366 base::SequencedWorkerPool* blocking_pool = BrowserThread::GetBlockingPool(); 367 file_access_runner_ = 368 blocking_pool->GetSequencedTaskRunner(blocking_pool->GetSequenceToken()); 369 } 370 371 StoragePartitionImplMap::~StoragePartitionImplMap() { 372 STLDeleteContainerPairSecondPointers(partitions_.begin(), 373 partitions_.end()); 374 } 375 376 StoragePartitionImpl* StoragePartitionImplMap::Get( 377 const std::string& partition_domain, 378 const std::string& partition_name, 379 bool in_memory) { 380 // Find the previously created partition if it's available. 381 StoragePartitionConfig partition_config( 382 partition_domain, partition_name, in_memory); 383 384 PartitionMap::const_iterator it = partitions_.find(partition_config); 385 if (it != partitions_.end()) 386 return it->second; 387 388 base::FilePath partition_path = 389 browser_context_->GetPath().Append( 390 GetStoragePartitionPath(partition_domain, partition_name)); 391 StoragePartitionImpl* partition = 392 StoragePartitionImpl::Create(browser_context_, in_memory, 393 partition_path); 394 partitions_[partition_config] = partition; 395 396 ChromeBlobStorageContext* blob_storage_context = 397 ChromeBlobStorageContext::GetFor(browser_context_); 398 StreamContext* stream_context = StreamContext::GetFor(browser_context_); 399 ProtocolHandlerMap protocol_handlers; 400 protocol_handlers[url::kBlobScheme] = 401 linked_ptr<net::URLRequestJobFactory::ProtocolHandler>( 402 new BlobProtocolHandler(blob_storage_context, 403 stream_context, 404 partition->GetFileSystemContext())); 405 protocol_handlers[url::kFileSystemScheme] = 406 linked_ptr<net::URLRequestJobFactory::ProtocolHandler>( 407 CreateFileSystemProtocolHandler(partition_domain, 408 partition->GetFileSystemContext())); 409 protocol_handlers[kChromeUIScheme] = 410 linked_ptr<net::URLRequestJobFactory::ProtocolHandler>( 411 URLDataManagerBackend::CreateProtocolHandler( 412 browser_context_->GetResourceContext(), 413 browser_context_->IsOffTheRecord(), 414 partition->GetAppCacheService(), 415 blob_storage_context)); 416 std::vector<std::string> additional_webui_schemes; 417 GetContentClient()->browser()->GetAdditionalWebUISchemes( 418 &additional_webui_schemes); 419 for (std::vector<std::string>::const_iterator it = 420 additional_webui_schemes.begin(); 421 it != additional_webui_schemes.end(); 422 ++it) { 423 protocol_handlers[*it] = 424 linked_ptr<net::URLRequestJobFactory::ProtocolHandler>( 425 URLDataManagerBackend::CreateProtocolHandler( 426 browser_context_->GetResourceContext(), 427 browser_context_->IsOffTheRecord(), 428 partition->GetAppCacheService(), 429 blob_storage_context)); 430 } 431 protocol_handlers[kChromeDevToolsScheme] = 432 linked_ptr<net::URLRequestJobFactory::ProtocolHandler>( 433 CreateDevToolsProtocolHandler(browser_context_->GetResourceContext(), 434 browser_context_->IsOffTheRecord())); 435 436 URLRequestInterceptorScopedVector request_interceptors; 437 request_interceptors.push_back( 438 ServiceWorkerRequestHandler::CreateInterceptor().release()); 439 440 // These calls must happen after StoragePartitionImpl::Create(). 441 if (partition_domain.empty()) { 442 partition->SetURLRequestContext( 443 GetContentClient()->browser()->CreateRequestContext( 444 browser_context_, 445 &protocol_handlers, 446 request_interceptors.Pass())); 447 } else { 448 partition->SetURLRequestContext( 449 GetContentClient()->browser()->CreateRequestContextForStoragePartition( 450 browser_context_, 451 partition->GetPath(), 452 in_memory, 453 &protocol_handlers, 454 request_interceptors.Pass())); 455 } 456 partition->SetMediaURLRequestContext( 457 partition_domain.empty() ? 458 browser_context_->GetMediaRequestContext() : 459 browser_context_->GetMediaRequestContextForStoragePartition( 460 partition->GetPath(), in_memory)); 461 462 PostCreateInitialization(partition, in_memory); 463 464 return partition; 465 } 466 467 void StoragePartitionImplMap::AsyncObliterate( 468 const GURL& site, 469 const base::Closure& on_gc_required) { 470 // This method should avoid creating any StoragePartition (which would 471 // create more open file handles) so that it can delete as much of the 472 // data off disk as possible. 473 std::string partition_domain; 474 std::string partition_name; 475 bool in_memory = false; 476 GetContentClient()->browser()->GetStoragePartitionConfigForSite( 477 browser_context_, site, false, &partition_domain, 478 &partition_name, &in_memory); 479 480 // Find the active partitions for the domain. Because these partitions are 481 // active, it is not possible to just delete the directories that contain 482 // the backing data structures without causing the browser to crash. Instead, 483 // of deleteing the directory, we tell each storage context later to 484 // remove any data they have saved. This will leave the directory structure 485 // intact but it will only contain empty databases. 486 std::vector<StoragePartitionImpl*> active_partitions; 487 std::vector<base::FilePath> paths_to_keep; 488 for (PartitionMap::const_iterator it = partitions_.begin(); 489 it != partitions_.end(); 490 ++it) { 491 const StoragePartitionConfig& config = it->first; 492 if (config.partition_domain == partition_domain) { 493 it->second->ClearData( 494 // All except shader cache. 495 ~StoragePartition::REMOVE_DATA_MASK_SHADER_CACHE, 496 StoragePartition::QUOTA_MANAGED_STORAGE_MASK_ALL, 497 GURL(), 498 StoragePartition::OriginMatcherFunction(), 499 base::Time(), base::Time::Max(), 500 base::Bind(&base::DoNothing)); 501 if (!config.in_memory) { 502 paths_to_keep.push_back(it->second->GetPath()); 503 } 504 } 505 } 506 507 // Start a best-effort delete of the on-disk storage excluding paths that are 508 // known to still be in use. This is to delete any previously created 509 // StoragePartition state that just happens to not have been used during this 510 // run of the browser. 511 base::FilePath domain_root = browser_context_->GetPath().Append( 512 GetStoragePartitionDomainPath(partition_domain)); 513 514 BrowserThread::PostBlockingPoolTask( 515 FROM_HERE, 516 base::Bind(&BlockingObliteratePath, browser_context_->GetPath(), 517 domain_root, paths_to_keep, 518 base::MessageLoopProxy::current(), on_gc_required)); 519 } 520 521 void StoragePartitionImplMap::GarbageCollect( 522 scoped_ptr<base::hash_set<base::FilePath> > active_paths, 523 const base::Closure& done) { 524 // Include all paths for current StoragePartitions in the active_paths since 525 // they cannot be deleted safely. 526 for (PartitionMap::const_iterator it = partitions_.begin(); 527 it != partitions_.end(); 528 ++it) { 529 const StoragePartitionConfig& config = it->first; 530 if (!config.in_memory) 531 active_paths->insert(it->second->GetPath()); 532 } 533 534 // Find the directory holding the StoragePartitions and delete everything in 535 // there that isn't considered active. 536 base::FilePath storage_root = browser_context_->GetPath().Append( 537 GetStoragePartitionDomainPath(std::string())); 538 file_access_runner_->PostTaskAndReply( 539 FROM_HERE, 540 base::Bind(&BlockingGarbageCollect, storage_root, 541 file_access_runner_, 542 base::Passed(&active_paths)), 543 done); 544 } 545 546 void StoragePartitionImplMap::ForEach( 547 const BrowserContext::StoragePartitionCallback& callback) { 548 for (PartitionMap::const_iterator it = partitions_.begin(); 549 it != partitions_.end(); 550 ++it) { 551 callback.Run(it->second); 552 } 553 } 554 555 void StoragePartitionImplMap::PostCreateInitialization( 556 StoragePartitionImpl* partition, 557 bool in_memory) { 558 // TODO(ajwong): ResourceContexts no longer have any storage related state. 559 // We should move this into a place where it is called once per 560 // BrowserContext creation rather than piggybacking off the default context 561 // creation. 562 // Note: moving this into Get() before partitions_[] is set causes reentrency. 563 if (!resource_context_initialized_) { 564 resource_context_initialized_ = true; 565 InitializeResourceContext(browser_context_); 566 } 567 568 // Check first to avoid memory leak in unittests. 569 if (BrowserThread::IsMessageLoopValid(BrowserThread::IO)) { 570 BrowserThread::PostTask( 571 BrowserThread::IO, FROM_HERE, 572 base::Bind(&ChromeAppCacheService::InitializeOnIOThread, 573 partition->GetAppCacheService(), 574 in_memory ? base::FilePath() : 575 partition->GetPath().Append(kAppCacheDirname), 576 browser_context_->GetResourceContext(), 577 make_scoped_refptr(partition->GetURLRequestContext()), 578 make_scoped_refptr( 579 browser_context_->GetSpecialStoragePolicy()))); 580 581 BrowserThread::PostTask( 582 BrowserThread::IO, 583 FROM_HERE, 584 base::Bind(&ServiceWorkerContextWrapper::SetBlobParametersForCache, 585 partition->GetServiceWorkerContext(), 586 make_scoped_refptr(partition->GetURLRequestContext()), 587 make_scoped_refptr( 588 ChromeBlobStorageContext::GetFor(browser_context_)))); 589 590 // We do not call InitializeURLRequestContext() for media contexts because, 591 // other than the HTTP cache, the media contexts share the same backing 592 // objects as their associated "normal" request context. Thus, the previous 593 // call serves to initialize the media request context for this storage 594 // partition as well. 595 } 596 } 597 598 } // namespace content 599