Web Inspector and Site Isolation¶
Last updated 2026-02-27.
This document explains how Site Isolation affects the architecture of Web Inspector in WebKit, describes the design changes made to support cross-process inspection, and outlines the work remaining. For a primer on Site Isolation itself — RemoteFrames, BrowsingContextGroups, and provisional navigation — see Site Isolation.
Contents: - Background: Inspector Agents and the Single-Process Assumption - Background: The Inspector Target System - Two Modes of Operation - Architecture: Target-Based Multiplexing - The BackendDispatcher Fallback Chain - Frame Target Lifecycle - Domain Implementation: Console - Domain Implementation: Network (In Progress) - Domain Implementation: Page (In Progress) - Security: Inspector-Only IPC Interfaces - Compatibility with Legacy Backends - Remaining Work: Agent Migration Plan - Key Risks and Architectural Challenges - Testing - Key Source Files
Background: Inspector Agents and the Single-Process Assumption¶
Web Inspector's backend is organized as a collection of agents, each responsible for one
protocol domain (Network, Page, DOM, Debugger, etc.). Historically, all agents for a
given inspected page lived in a single WebCore::Page in a single WebContent Process. A single
InspectorBackend handled all commands; InspectorBackendDispatcher routed each JSON-RPC
command to the correct agent.
PageInspectorController owns the agents and the BackendDispatcher for a Page. Commands
from the frontend arrive as JSON strings, get parsed in UIProcess, and are dispatched to the
correct PageInspectorController via the target routing system.
This design works perfectly when all frames share one process — but breaks down under Site
Isolation, where a WebPageProxy may have its frames distributed across several WebContent
Processes, each with its own Page and PageInspectorController.
Background: The Inspector Target System¶
To persist a debugging session across WebProcess swaps (introduced with PSON), the concept of inspector targets was introduced. A target is an opaque handle that:
- Provides a stable
targetIdthe frontend can route commands to across process swaps. - Allows the same protocol interfaces to be reused across execution context types (Page, Worker, JSContext, Frame).
- Lets the frontend reason about the capabilities of each backend independently.
WebPageInspectorController in UIProcess manages the set of active targets. The Target
domain in InspectorTargetAgent exposes target lifecycle events (Target.targetCreated,
Target.targetDestroyed) to the frontend, and routes incoming commands to the correct target's
BackendDispatcher.
Before Site Isolation work, there were three target types involved in web browsing:
Page— legacy direct-backend target (pre-PSON and WebKitLegacy). No sub-targets.WebPage— represents aWebPageProxy. May have transient worker sub-targets.Worker— represents a dedicated Web Worker spawned from a Page.
Site Isolation adds a fourth:
Frame— represents an individualWebFrameProxy/LocalFrame, each potentially in its own WebContent Process.
Two Modes of Operation¶
Mode 1: SI-disabled and WebKitLegacy¶
When Site Isolation is off, the architecture is essentially unchanged from the pre-SI model:
- One
WebPageInspectorTargetProxy(typeWebPage) is created to manage the lifetime of the underlyingPage,Frame, andWorkertargets in the inspected webpage. - One
PageInspectorTargetProxy(typePage) is created for the onePageInspectorController. - All agents live in one
PageInspectorControllerin one WebContent Process. didCreateFrameonWebPageInspectorControlleris a no-op — no frame targets are created.- Commands are routed through the page target to
PageInspectorController.
Mode 2: SI-enabled¶
When Site Isolation is enabled, each WebFrameProxy gets its own inspector target:
- Each
WebFrameProxycreation triggers aFrameInspectorTargetProxy(typeFrame) andWI.FrameTargetin the frontend. - One
PageInspectorTargetProxy(typePage) still exists per web page. - Frames intuitively belong to a page and frames can have subframes, but these relationships are treated as optional data fields that do not factor into the Target lifetime semantics.
- Each frame target corresponds to a
FrameInspectorControllerin the owning WebContent Process. - Commands targeted at a frame ID are routed to the correct
FrameInspectorTargetProxy, which sends them over IPC to theFrameInspectorControllerin that process.
The key callsite is in WebFrameProxy's constructor
(UIProcess/WebFrameProxy.cpp):
page.inspectorController().didCreateFrame(*this);
And in the destructor, the target is torn down symmetrically:
page->inspectorController().willDestroyFrame(*this);
This means frame targets are always present in the backend when frames exist, regardless of whether a frontend is connected — consistent with how page and worker targets behave.
Architecture: Target-Based Multiplexing¶
UIProcess
┌─────────────────────────────────────────────────────────┐
│ WebPageInspectorController │
│ ├── PageInspectorTargetProxy (type: Page) │
│ │ └── PageInspectorController (in WCP-A) │
│ ├── FrameInspectorTargetProxy frame-1 (main) │
│ │ └── FrameInspectorController (in WCP-A) │
│ └── FrameInspectorTargetProxy frame-2 (cross-origin) │
│ └── FrameInspectorController (in WCP-B) │
└─────────────────────────────────────────────────────────┘
IPC ↕ IPC ↕
WebContent Process A WebContent Process B
PageInspectorController PageInspectorController (not exposed)
FrameInspectorController FrameInspectorController
InspectorTargetAgent (in JavaScriptCore/inspector/agents/InspectorTargetAgent.cpp) is the
glue layer. It receives all incoming commands from the frontend, looks up the target by targetId,
and calls sendMessageToTarget() on the appropriate InspectorTargetProxy.
For frame targets, FrameInspectorTargetProxy::sendMessageToTarget() sends the message over
IPC to FrameInspectorTarget in the WebContent Process, which calls
FrameInspectorController::dispatchMessageFromFrontend().
The BackendDispatcher Fallback Chain¶
FrameInspectorController owns agents for a single frame. Not every domain has been moved to
per-frame agents yet — only Console is fully per-frame today. For unimplemented domains,
commands must fall through to the page-level PageInspectorController.
This is accomplished by passing the parent BackendDispatcher as a fallback when
constructing the frame-level one (FrameInspectorController.cpp):
FrameInspectorController::FrameInspectorController(
LocalFrame& frame, PageInspectorController& parentPageController)
: m_backendDispatcher(BackendDispatcher::create(
m_frontendRouter.copyRef(),
&parentPageController.backendDispatcher())) // <-- fallback
When BackendDispatcher::dispatch() receives a command for a domain not registered in
the frame-level dispatcher, it forwards the call to its fallback dispatcher — the page-level
BackendDispatcher. This makes per-domain migration incremental: a domain can be moved from
PageInspectorController to FrameInspectorController independently, and the fallback chain
ensures correct routing at every intermediate state.
InstrumentingAgents uses the same fallback pattern: a frame's InstrumentingAgents holds a
pointer to the parent page's InstrumentingAgents. When instrumentation fires in the frame
process (e.g., a network event), it first notifies frame-level agents and then falls through to
page-level agents for any domain not yet migrated.
Command from frontend
│
▼
FrameInspectorController.backendDispatcher
│
│ domain registered at frame level?
├── yes ──► frame-level agent handles it
│
└── no ───► fallback to PageInspectorController.backendDispatcher
│
▼
page-level agent handles it
Frame Target Lifecycle¶
Creation¶
WebFrameProxy is created in UIProcess whenever a new frame is established (both same-process
and cross-process frames). Its constructor calls didCreateFrame(), which calls
addTarget() in WebPageInspectorController. If a frontend is connected, this fires
Target.targetCreated to notify the frontend immediately.
Connection (WebProcess side)¶
When a frontend connects and enumerates targets, FrameInspectorTargetProxy::connect()
sends an IPC message to the WebContent Process hosting the frame. On the WebProcess side,
FrameInspectorTarget::connect() (WebProcess/Inspector/WebFrameInspectorTarget.cpp)
creates a UIProcessForwardingFrontendChannel and connects it to FrameInspectorController:
void FrameInspectorTarget::connect(
Inspector::FrontendChannel::ConnectionType connectionType)
{
if (m_channel)
return;
Ref frame = m_frame.get();
m_channel = makeUnique<UIProcessForwardingFrontendChannel>(
frame, identifier(), connectionType);
if (RefPtr coreFrame = frame->coreLocalFrame())
coreFrame->protectedInspectorController()->connectFrontend(*m_channel);
}
Events flowing back to UIProcess¶
When a frame-level agent emits an event (e.g., Console.messageAdded),
UIProcessForwardingFrontendChannel::sendMessageToFrontend() sends it over IPC to UIProcess
(WebProcess/Inspector/UIProcessForwardingFrontendChannel.cpp):
void UIProcessForwardingFrontendChannel::sendMessageToFrontend(
const String& message)
{
if (RefPtr page = protectedFrame()->page())
page->send(Messages::WebPageProxy::SendMessageToInspectorFrontend(
m_targetId, message));
}
UIProcess receives it in WebPageInspectorController::sendMessageToInspectorFrontend(), which
calls InspectorTargetAgent::sendMessageFromTargetToFrontend() to deliver the event — tagged
with the frame's targetId — to the frontend.
Provisional Frames¶
During provisional navigation, a frame may briefly exist in two processes simultaneously (see
Provisional Navigation). The inspector mirrors this:
WebFrameProxy is created for the provisional frame in the same constructor path, so it gets an
inspector target immediately. If the provisional load commits, the old frame target is destroyed
and the new one persists. If the load fails, the provisional frame target is destroyed with no
observable change to the frontend.
Destruction¶
WebFrameProxy's destructor calls willDestroyFrame(). WebPageInspectorController
removes the target and fires Target.targetDestroyed to the frontend.
Domain Implementation: Console¶
Console is the first domain fully migrated to per-frame agents. Each FrameInspectorController
owns a FrameConsoleAgent (see the constructor in FrameInspectorController.cpp). Console
messages originating from cross-origin iframes now appear in Web Inspector correctly attributed
to the originating frame, rather than being lost or mis-attributed.
Domain Implementation: Network (In Progress)¶
Network and Page domains remain as Page Target agents — they do not become per-frame agents
and there is no BackendDispatcher fallback involved. Instead, the design splits each domain
agent across two processes:
- UIProcess side —
ProxyingNetworkAgent/ProxyingPageAgentlive in UIProcess as part ofWebPageInspectorController. They handle all command dispatch and own the authoritative view of network and page state. - WebContent Process side — A
NetworkAgentProxyin each WebContent Process hooks intoInstrumentingAgentsto capture per-frame network events (resource loads, responses, etc.) and forwards them over IPC to the UIProcess agent.
This means command routing for Network and Page never traverses the FrameInspectorController
fallback chain. All Network/Page commands arrive at the UIProcess agent directly via the Page
target, and the UIProcess agent is responsible for fanning out to the appropriate WebContent
Process when per-frame data is needed (e.g., Network.getResponseBody).
Response Body Retrieval (getResponseBody)¶
Under the single-process model, Network.getResponseBody reads directly from
NetworkResourcesData in the same process as the agent. Under SI, the response body
lives in whichever WebContent Process loaded the resource — the UIProcess proxy agent
must route the request to the correct process.
The design introduces BackendResourceDataStore, a per-page data store in the WebKit
layer (WebProcess/Inspector/) that buffers resource metadata and response content
independently of the inspector agent lifecycle. NetworkAgentProxy writes to the store
at each instrumentation point (willSendRequest, responseReceived, dataReceived);
ProxyingNetworkAgent reads from it via IPC when the frontend requests a body.
Frontend UIProcess WebProcess(es)
ProxyingNetworkAgent
Network.getResponseBody ──► look up requestId
(requestId: "r-42") in m_requestIdToResourceKey
──► {ProcessB, ResourceID-7}
┌──────────────────────┐
QueryResponseBody(ResID-7) ──►│ BackendResourceData │
│ Store │
◄── (content, base64Encoded) ──│ entry for ResID-7 │
└──────────────────────┘
respond to frontend ◄──
The UIProcess maintains a HashMap<String, BackendResourceKey> mapping each frontend-facing
requestId string to a BackendResourceKey { WebProcessIdentifier, BackendResourceIdentifier }.
This mapping is populated when requestWillBeSent IPC arrives from each WebProcess, ensuring
that getResponseBody routes to the process that actually loaded the resource — even when the
same URL was loaded by multiple processes.
Domain Implementation: Page (In Progress)¶
Page domain adaptation mirrors Network. Page.getResourceTree must collect and merge frame
subtrees from each WebContent Process. The merged result presents the frontend with a unified
frame tree even though resources are distributed across processes.
getResourceTree Aggregation¶
The legacy implementation in LegacyPageAgent::getResourceTree() calls
buildObjectForFrameTree(localMainFrame.get()), which recursively traverses
frame->tree().traverseNext(). This only visits LocalFrame children — under SI,
cross-origin subframes are RemoteFrame instances and are invisible to this traversal.
The same limitation affects searchInResources, which has an explicit FIXME:
// LegacyPageAgent.cpp:632
// FIXME: rework this frame tree traversal as it won't work with Site Isolation enabled.
for (Frame* frame = &m_inspectedPage->mainFrame(); frame; frame = frame->tree().traverseNext()) {
auto* localFrame = dynamicDowncast<LocalFrame>(frame);
if (!localFrame)
continue;
// ...
}
When Site Isolation is disabled, the Page domain is handled entirely in the WebProcess —
LegacyPageAgent traverses the frame tree directly and there is only one process, so
LocalFrame covers all frames.
When Site Isolation is enabled, ProxyingPageAgent::getResourceTree() fans out to every
WebContent Process hosting frames for the inspected page:
ProxyingPageAgentcreates a ref-countedResourceTreeAggregatorwith a completion callback (following theLegacyWebArchiveCallbackAggregatorpattern).- Each WebContent Process's
PageAgentProxyresponds with a flat list of frames and their subresources:{ frameId, parentFrameId, url, mimeType, securityOrigin, resources[] }. - As each reply arrives,
ResourceTreeAggregator::addPartialResult()merges the subtree into the accumulated frame tree, usingWebPageProxy's frame hierarchy to determine parent-child relationships. - When all replies have arrived (or a timeout fires), the aggregator's destructor assembles
the final
Protocol::Page::FrameResourceTreeand calls the completion handler.
Remote frames — frames that appear as stubs in one process because they are hosted in another — are replaced with the real frame data from the owning process during merge.
Phases:
- Phase 1 — getResourceTree aggregation across frame targets (in progress)
- Phase 2 — searchInResources across all frame targets
- Phase 3 — getResourceContent with correct process routing
- Phase 4 — Resource load events aggregated from all processes
Security: Inspector-Only IPC Interfaces¶
The proxying agent architecture introduces new IPC channels between UIProcess and WebContent Processes. These channels do not expand the attack surface — they are only active when Web Inspector is open and connected, and are scoped to the inspected page.
Dynamic IPC Receiver Registration¶
ProxyingPageAgent and ProxyingNetworkAgent in UIProcess dynamically register and
deregister themselves as IPC message receivers when the corresponding protocol domain is
enabled or disabled by the frontend:
Enable (domain activated by frontend):
// ProxyingPageAgent::enable()
protectedInspectedPage()->forEachWebContentProcess([&](auto& webProcess, auto pageID) {
webProcess.addMessageReceiver(Messages::ProxyingPageAgent::messageReceiverName(), pageID, *this);
webProcess.send(Messages::WebInspectorBackend::EnablePageInstrumentation { }, pageID);
});
Disable (domain deactivated or Inspector closes):
// ProxyingPageAgent::disable()
protectedInspectedPage()->forEachWebContentProcess([&](auto& webProcess, auto pageID) {
webProcess.send(Messages::WebInspectorBackend::DisablePageInstrumentation { }, pageID);
webProcess.removeMessageReceiver(Messages::ProxyingPageAgent::messageReceiverName(), pageID);
});```
When Inspector is closed, no handler is registered for these messages. The IPC infrastructure
rejects any message targeting a non-existent receiver.
### Conditional WebProcess Instrumentation
On the WebProcess side, `PageAgentProxy` and `NetworkAgentProxy` register with
`InstrumentingAgents` only when enabled:
```cpp
// PageAgentProxy::enable()
agents->setEnabledPageAgentInstrumentation(this);
// PageAgentProxy::disable()
agents->setEnabledPageAgentInstrumentation(nullptr);
When disabled, instrumentation hooks in WebCore (e.g., willSendRequest,
frameNavigated) find no registered proxy in the InstrumentingAgents registry.
The hooks become no-ops — no data is collected and no IPC messages are sent.
Ordering Guarantees¶
The enable/disable sequences are ordered to prevent race conditions:
- Enable: Register the UIProcess IPC receiver first, then tell the WebProcess to start sending. The receiver is ready before any messages arrive.
- Disable: Tell the WebProcess to stop sending first, then remove the UIProcess IPC receiver. No in-flight messages arrive at a deregistered receiver.
Per-Page Scoping¶
IPC receivers are registered with the inspected page's identifier as the destination:
webProcess.addMessageReceiver(
Messages::ProxyingPageAgent::messageReceiverName(), pageID, *this);
Only WebContent Processes hosting the inspected page can address these handlers.
Processes for other pages cannot send to them. The [ExceptionForEnabledBy] attribute
in the .messages.in definitions provides an additional safeguard.
Summary¶
| Condition | UIProcess Receiver | WebProcess Instrumentation | IPC Traffic |
|---|---|---|---|
| Inspector closed | Not registered | Not registered | None |
| Inspector open, domain enabled | Registered (inspected page only) | Registered with InstrumentingAgents | Active |
| Inspector open, domain not enabled | Not registered | Not registered | None |
These IPC channels exist only for the duration of an active Inspector session, are scoped to a single inspected page, and are torn down completely when Inspector disconnects.
Compatibility with Legacy Backends¶
Web Inspector must continue to work with backends shipping in iOS 13 and later, which have no Frame targets. The frontend's target iteration logic handles this:
- If a
WebPagetarget has associatedFrametargets → send per-frame commands to the frame targets. - If a
WebPagetarget has no associatedFrametargets (older backend) → treat the page target as the single frame and send all commands there.
No frontend code needs to know whether it is talking to a single-process backend or a Site-Isolated backend — the frame target abstraction provides uniform addressing.
Remaining Work: Agent Migration Plan¶
Every inspector protocol domain must be adapted to work under Site Isolation. Each domain falls into one of two migration patterns — per-frame or octopus — based on whether its data is inherently scoped to a single frame or presents a unified page-level view.
Per-Frame Domains¶
Per-frame domains get a new Frame*Agent subclass registered in
FrameInspectorController::createLazyAgents(). Commands route via the target system; events
flow through FrontendRouter. No new IPC is needed. IDs (NodeId, StyleSheetId, ScriptId,
etc.) are scoped per-target — the wire format doesn't change, but the frontend must pair each
ID with the target it came from.
| Domain | Status | Notes |
|---|---|---|
| Console | Done | FrameConsoleAgent landed; reference implementation for all per-frame agents |
| Runtime | In progress | FrameRuntimeAgent (PR #59021) |
| Debugger | Not started | Blocked on bug 298909 (not actively being worked; needs design investigation — see Key Risks) |
| DOM | Not started | Cross-frame traversal must stop at process boundaries |
| CSS | Not started | Must migrate with or after DOM due to tight coupling |
| DOMDebugger | Not started | Depends on DOM + Debugger |
| LayerTree | Not started | Simplest migration; thin agent |
| DOMStorage | Not started | Origin-scoped; self-contained |
| Worker | Not started | Frame-associated; self-contained |
| Canvas | Not started | Has existing base/subclass split |
| Animation | Not started | Requires refactoring before migration |
Octopus Domains¶
Octopus domains use a proxy-aggregator architecture: a *AgentProxy in each WebContent
Process captures instrumentation events and forwards them via IPC to a Proxying*Agent
aggregator in the UIProcess. The UIProcess agent handles command dispatch, ID remapping, and
presents a unified view to the frontend. A Legacy*Agent handles the WebKitLegacy
single-process path.
| Domain | Status | Notes |
|---|---|---|
| Network | In progress | Core proxy/aggregator exists; commands (getResponseBody, etc.) still TODO |
| Page | In progress | Frame lifecycle events wired; getResourceTree aggregation still TODO |
| Timeline | Not started | Highest octopus priority; orchestrates sub-instruments |
| ScriptProfiler | Not started | Timeline sub-instrument |
| Heap | Not started | Large snapshot data; heap object ID remapping |
| IndexedDB | Not started | Origin-routed commands |
| CPUProfiler | Not started | ENABLE(RESOURCE_USAGE) only |
| Memory | Not started | ENABLE(RESOURCE_USAGE) only |
| Audit | Not started | May use target multiplexing instead of full octopus |
UIProcess-Only¶
The Browser domain already lives entirely in WebPageInspectorController and requires
no migration.
Migration Priority Order¶
Priority is determined by a combination of user impact and technical dependency. Foundation domains enable basic cross-process inspection and are prerequisites for higher-level domains. Core frame inspection follows because most other frame-scoped agents depend on DOM and Debugger. The remaining per-frame agents are ordered by user-facing importance, and page-level octopus agents come last because they already partially function through the page target fallback path.
- Foundation (active): Console (done), Network, Page, Runtime
- Core frame inspection: Debugger, DOM, CSS
- Dependent frame agents: DOMDebugger, LayerTree, DOMStorage, Worker
- Remaining frame agents: Canvas, Animation
- Page-level octopus agents: Timeline, ScriptProfiler, Heap, IndexedDB, CPUProfiler, Memory, Audit
Key Risks and Architectural Challenges¶
Debugger: Single-Debugger-Multiple-Agents¶
There is one JSC::Debugger (specifically, PageDebugger) per Page, but each frame target
needs its own FrameDebuggerAgent. Multiple agents sharing one debugger creates conflicts:
breakpoint ID allocation collisions, didParseSource() being final (cannot be overridden
to filter scripts per-frame), pause routing to the correct frame agent, and step commands
potentially crossing frame boundaries.
Status: Exploratory. Possible approaches: (a) shared PageDebugger with per-frame agent
adapters that filter events by frame, (b) separate FrameDebugger per target, or (c) keep
Debugger as an octopus domain with a UIProcess-side agent. Trade-offs around pause coordination
and stepping across frames need further investigation.
DOM: Cross-Frame Traversal at Process Boundaries¶
InspectorDOMAgent currently traverses into iframe contentDocument as children of
HTMLFrameOwnerElement. Under SI, this crosses process boundaries. contentDocument must be
omitted for out-of-process frames; the frontend discovers child frame DOM trees via frame
targets instead. DOM.performSearch changes from all-frames to per-frame scope.
DOM.moveTo across frames becomes invalid.
Status: Design direction clear. Omitting contentDocument for out-of-process frames is
straightforward; the frontend discovers child DOM trees via frame targets. performSearch
scoping per-frame is a bounded change.
CSS: Heavy DOM Agent Coupling¶
InspectorCSSAgent depends on InspectorDOMAgent for node resolution, document enumeration,
undo/redo history, and layout flag tracking. This coupling actually simplifies when both
agents are co-located per-frame (one document, one ID namespace, one history), but CSS
must migrate with or after DOM.
Status: Blocked on DOM. Expected to simplify once both agents work within single-frame scope (one document, one ID namespace, one undo history).
Network: RequestId Collision Across Processes¶
ResourceLoaderIdentifier is generated per-process, so two WebContent Processes could
produce the same value. The UIProcess ProxyingNetworkAgent must qualify request IDs with the
source process to avoid incorrect resource lookups.
Status: Solution designed. ProxyingNetworkAgent qualifies each requestId with a
BackendResourceKey { WebProcessIdentifier, BackendResourceIdentifier } — see
Response Body Retrieval above.
Testing¶
Web Inspector layout tests live in LayoutTests/inspector/ and
LayoutTests/http/tests/inspector/. Cross-origin frame tests use the HTTP test
infrastructure to create multi-origin scenarios. Key test directories for SI work:
LayoutTests/inspector/target/— Target lifecycle and multiplexingLayoutTests/http/tests/inspector/— Cross-origin inspection scenariosLayoutTests/http/tests/site-isolation/inspector/— SI-specific inspector tests
To run inspector tests with Site Isolation enabled:
Tools/Scripts/run-webkit-tests --site-isolation LayoutTests/inspector/
Tools/Scripts/run-webkit-tests --site-isolation LayoutTests/http/tests/inspector/
Each migrated domain should include: 1. Same-origin frame tests — Verify behavior unchanged from pre-SI. 2. Cross-origin frame tests — Verify correct data attribution across processes. 3. Provisional navigation tests — Clean target teardown/creation during cross-origin nav. 4. Legacy compatibility — Domain still works with SI disabled.
At the time of writing, Console and Runtime domains have been implemented and cross-origin frame test cases were added to each domain's test suite. Aside from these agents, test coverage for cross-origin frames and various frame tree scenarios is minimal. New tests exercising cross-origin iframe behavior will need to be developed alongside the relevant SI-enabled agent.
Cross-Origin Test Examples¶
Cross-origin inspector tests create iframes pointing at a different hostname (e.g.,
localhost vs 127.0.0.1) so that Site Isolation places them in separate WebContent Processes.
Console domain (LayoutTests/http/tests/inspector/console/message-from-iframe.html) —
Tests that console messages from same-origin, cross-origin, and nested (grandchild) iframes
all arrive correctly. The test dynamically appends iframes and listens for
ConsoleManager.Event.MessageAdded:
function addIFrame(iframeID, url) {
let iframe = document.createElement("iframe");
iframe.src = url;
iframe.onload = () => console.log(`iframe ${iframeID} is loaded in ${location.href}`);
document.body.appendChild(iframe);
}
// Same-origin iframe:
addIFrame(1, "resources/console-messages.html");
// Cross-origin iframe (different hostname triggers SI process isolation):
addIFrame(2, "http://localhost:8000/inspector/console/resources/console-messages.html");
// Nested: grandchild same-origin iframe inside a cross-origin parent:
addIFrame(4, "http://localhost:8000/inspector/console/resources/embedded-cross-origin.html");
Runtime domain (PR #59021,
LayoutTests/http/tests/site-isolation/inspector/runtime/evaluate-in-cross-origin-iframe.html) —
Tests that Runtime.evaluate and callFunctionOn work correctly in a cross-origin frame's
execution context. The test creates a cross-origin iframe, waits for its FrameTarget and
ExecutionContext, then evaluates expressions in both the main page and the cross-origin
frame to verify process isolation:
// Create cross-origin iframe using the opposite hostname.
let crossOriginHost = location.hostname === "localhost" ? "127.0.0.1" : "localhost";
iframe.src = `http://${crossOriginHost}:8000/.../frame-with-passphrase.html`;
// After TargetAdded fires, evaluate in the cross-origin frame's target:
let passphraseValue = await crossOriginTarget.RuntimeAgent.evaluate.invoke({
expression: "window.passphrase", objectGroup: "test", returnByValue: true
});
// Verify isolation — the cross-origin frame has "cross-origin-secret",
// while the main page has "main-page-value".
Key Source Files¶
| File | Role |
|---|---|
UIProcess/Inspector/WebPageInspectorController.h/.cpp |
Manages all targets for a WebPageProxy |
UIProcess/Inspector/FrameInspectorTargetProxy.h/.cpp |
Frame target proxy in UIProcess |
UIProcess/Inspector/PageInspectorTargetProxy.h/.cpp |
Page target proxy in UIProcess |
UIProcess/Inspector/InspectorTargetProxy.h |
Base class for all target proxies |
UIProcess/WebFrameProxy.cpp |
Creates/destroys frame inspector targets on frame lifecycle |
WebProcess/Inspector/WebFrameInspectorTarget.h/.cpp |
Frame target in WebContent Process |
WebProcess/Inspector/UIProcessForwardingFrontendChannel.cpp |
IPC: WebProcess → UIProcess for events |
WebCore/inspector/FrameInspectorController.h/.cpp |
Per-frame agent controller with fallback chain (frame-targeted domains) |
WebCore/inspector/PageInspectorController.h/.cpp |
Per-page agent controller (legacy + fallback target) |
WebCore/inspector/InstrumentingAgents.h |
Agent registry with fallback to parent controller |
WebKit/UIProcess/Inspector/ProxyingNetworkAgent.h/.cpp |
Network agent in UIProcess; receives events from per-WP NetworkAgentProxy |
WebKit/UIProcess/Inspector/ProxyingPageAgent.h/.cpp |
Page agent in UIProcess; handles getResourceTree aggregation |
WebProcess/Inspector/PageAgentProxy.cpp |
Page instrumentation proxy; conditionally registers with InstrumentingAgents |
WebProcess/Inspector/NetworkAgentProxy.cpp |
Network instrumentation proxy; conditionally registers with InstrumentingAgents |
WebProcess/Inspector/WebInspectorBackend.messages.in |
Enable/Disable instrumentation IPC messages |
UIProcess/Inspector/Agents/ProxyingPageAgent.messages.in |
Events from WebProcess; guarded by [ExceptionForEnabledBy] |
UIProcess/Inspector/Agents/ProxyingNetworkAgent.messages.in |
Events from WebProcess; guarded by [ExceptionForEnabledBy] |
JavaScriptCore/inspector/agents/InspectorTargetAgent.cpp |
Target multiplexing and command routing |
JavaScriptCore/inspector/InspectorBackendDispatcher.cpp |
BackendDispatcher with fallback dispatcher |