• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 // Copyright 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4 
5 #include "content/renderer/render_frame_impl.h"
6 
7 #include <map>
8 #include <string>
9 
10 #include "base/command_line.h"
11 #include "base/i18n/char_iterator.h"
12 #include "base/strings/utf_string_conversions.h"
13 #include "base/time/time.h"
14 #include "content/child/appcache/appcache_dispatcher.h"
15 #include "content/child/plugin_messages.h"
16 #include "content/child/quota_dispatcher.h"
17 #include "content/child/request_extra_data.h"
18 #include "content/child/service_worker/web_service_worker_provider_impl.h"
19 #include "content/common/frame_messages.h"
20 #include "content/common/socket_stream_handle_data.h"
21 #include "content/common/swapped_out_messages.h"
22 #include "content/common/view_messages.h"
23 #include "content/public/common/content_constants.h"
24 #include "content/public/common/content_switches.h"
25 #include "content/public/common/url_constants.h"
26 #include "content/public/renderer/content_renderer_client.h"
27 #include "content/public/renderer/document_state.h"
28 #include "content/public/renderer/navigation_state.h"
29 #include "content/public/renderer/render_frame_observer.h"
30 #include "content/renderer/accessibility/renderer_accessibility.h"
31 #include "content/renderer/browser_plugin/browser_plugin.h"
32 #include "content/renderer/browser_plugin/browser_plugin_manager.h"
33 #include "content/renderer/internal_document_state_data.h"
34 #include "content/renderer/npapi/plugin_channel_host.h"
35 #include "content/renderer/render_thread_impl.h"
36 #include "content/renderer/render_view_impl.h"
37 #include "content/renderer/render_widget_fullscreen_pepper.h"
38 #include "content/renderer/renderer_webapplicationcachehost_impl.h"
39 #include "content/renderer/websharedworker_proxy.h"
40 #include "net/base/net_errors.h"
41 #include "net/http/http_util.h"
42 #include "third_party/WebKit/public/platform/WebStorageQuotaCallbacks.h"
43 #include "third_party/WebKit/public/platform/WebString.h"
44 #include "third_party/WebKit/public/platform/WebURL.h"
45 #include "third_party/WebKit/public/platform/WebURLError.h"
46 #include "third_party/WebKit/public/platform/WebURLResponse.h"
47 #include "third_party/WebKit/public/platform/WebVector.h"
48 #include "third_party/WebKit/public/web/WebDocument.h"
49 #include "third_party/WebKit/public/web/WebFrame.h"
50 #include "third_party/WebKit/public/web/WebNavigationPolicy.h"
51 #include "third_party/WebKit/public/web/WebPlugin.h"
52 #include "third_party/WebKit/public/web/WebPluginParams.h"
53 #include "third_party/WebKit/public/web/WebSearchableFormData.h"
54 #include "third_party/WebKit/public/web/WebSecurityOrigin.h"
55 #include "third_party/WebKit/public/web/WebUserGestureIndicator.h"
56 #include "third_party/WebKit/public/web/WebView.h"
57 #include "webkit/child/weburlresponse_extradata_impl.h"
58 
59 #if defined(ENABLE_PLUGINS)
60 #include "content/renderer/npapi/webplugin_impl.h"
61 #include "content/renderer/pepper/pepper_browser_connection.h"
62 #include "content/renderer/pepper/pepper_plugin_instance_impl.h"
63 #include "content/renderer/pepper/pepper_webplugin_impl.h"
64 #include "content/renderer/pepper/plugin_module.h"
65 #endif
66 
67 #if defined(ENABLE_WEBRTC)
68 #include "content/renderer/media/rtc_peer_connection_handler.h"
69 #endif
70 
71 using blink::WebDataSource;
72 using blink::WebDocument;
73 using blink::WebFrame;
74 using blink::WebNavigationPolicy;
75 using blink::WebPluginParams;
76 using blink::WebReferrerPolicy;
77 using blink::WebSearchableFormData;
78 using blink::WebSecurityOrigin;
79 using blink::WebServiceWorkerProvider;
80 using blink::WebStorageQuotaCallbacks;
81 using blink::WebString;
82 using blink::WebURL;
83 using blink::WebURLError;
84 using blink::WebURLRequest;
85 using blink::WebURLResponse;
86 using blink::WebUserGestureIndicator;
87 using blink::WebVector;
88 using blink::WebView;
89 using base::Time;
90 using base::TimeDelta;
91 using webkit_glue::WebURLResponseExtraDataImpl;
92 
93 namespace content {
94 
95 namespace {
96 
97 typedef std::map<blink::WebFrame*, RenderFrameImpl*> FrameMap;
98 base::LazyInstance<FrameMap> g_child_frame_map = LAZY_INSTANCE_INITIALIZER;
99 
100 }  // namespace
101 
102 static RenderFrameImpl* (*g_create_render_frame_impl)(RenderViewImpl*, int32) =
103     NULL;
104 
105 // static
Create(RenderViewImpl * render_view,int32 routing_id)106 RenderFrameImpl* RenderFrameImpl::Create(RenderViewImpl* render_view,
107                                          int32 routing_id) {
108   DCHECK(routing_id != MSG_ROUTING_NONE);
109 
110   if (g_create_render_frame_impl)
111     return g_create_render_frame_impl(render_view, routing_id);
112   else
113     return new RenderFrameImpl(render_view, routing_id);
114 }
115 
116 // static
InstallCreateHook(RenderFrameImpl * (* create_render_frame_impl)(RenderViewImpl *,int32))117 void RenderFrameImpl::InstallCreateHook(
118     RenderFrameImpl* (*create_render_frame_impl)(RenderViewImpl*, int32)) {
119   CHECK(!g_create_render_frame_impl);
120   g_create_render_frame_impl = create_render_frame_impl;
121 }
122 
123 // RenderFrameImpl ----------------------------------------------------------
RenderFrameImpl(RenderViewImpl * render_view,int routing_id)124 RenderFrameImpl::RenderFrameImpl(RenderViewImpl* render_view, int routing_id)
125     : render_view_(render_view),
126       routing_id_(routing_id),
127       is_swapped_out_(false),
128       is_detaching_(false) {
129   RenderThread::Get()->AddRoute(routing_id_, this);
130 #if defined(ENABLE_PLUGINS)
131   new PepperBrowserConnection(this);
132 #endif
133 
134   GetContentClient()->renderer()->RenderFrameCreated(this);
135 }
136 
~RenderFrameImpl()137 RenderFrameImpl::~RenderFrameImpl() {
138   FOR_EACH_OBSERVER(RenderFrameObserver, observers_, RenderFrameGone());
139   FOR_EACH_OBSERVER(RenderFrameObserver, observers_, OnDestruct());
140   RenderThread::Get()->RemoveRoute(routing_id_);
141 }
142 
GetRenderWidget()143 RenderWidget* RenderFrameImpl::GetRenderWidget() {
144   return render_view_;
145 }
146 
147 #if defined(ENABLE_PLUGINS)
PepperPluginCreated(RendererPpapiHost * host)148 void RenderFrameImpl::PepperPluginCreated(RendererPpapiHost* host) {
149   FOR_EACH_OBSERVER(RenderFrameObserver, observers_,
150                     DidCreatePepperPlugin(host));
151 }
152 
PepperInstanceCreated(PepperPluginInstanceImpl * instance)153 void RenderFrameImpl::PepperInstanceCreated(
154     PepperPluginInstanceImpl* instance) {
155   active_pepper_instances_.insert(instance);
156 }
157 
PepperInstanceDeleted(PepperPluginInstanceImpl * instance)158 void RenderFrameImpl::PepperInstanceDeleted(
159     PepperPluginInstanceImpl* instance) {
160   active_pepper_instances_.erase(instance);
161 
162   if (render_view_->pepper_last_mouse_event_target() == instance)
163     render_view_->set_pepper_last_mouse_event_target(NULL);
164   if (render_view_->focused_pepper_plugin() == instance)
165     PepperFocusChanged(instance, false);
166 }
167 
PepperDidChangeCursor(PepperPluginInstanceImpl * instance,const blink::WebCursorInfo & cursor)168 void RenderFrameImpl::PepperDidChangeCursor(
169     PepperPluginInstanceImpl* instance,
170     const blink::WebCursorInfo& cursor) {
171   // Update the cursor appearance immediately if the requesting plugin is the
172   // one which receives the last mouse event. Otherwise, the new cursor won't be
173   // picked up until the plugin gets the next input event. That is bad if, e.g.,
174   // the plugin would like to set an invisible cursor when there isn't any user
175   // input for a while.
176   if (instance == render_view_->pepper_last_mouse_event_target())
177     GetRenderWidget()->didChangeCursor(cursor);
178 }
179 
PepperDidReceiveMouseEvent(PepperPluginInstanceImpl * instance)180 void RenderFrameImpl::PepperDidReceiveMouseEvent(
181     PepperPluginInstanceImpl* instance) {
182   render_view_->set_pepper_last_mouse_event_target(instance);
183 }
184 
PepperFocusChanged(PepperPluginInstanceImpl * instance,bool focused)185 void RenderFrameImpl::PepperFocusChanged(PepperPluginInstanceImpl* instance,
186                                          bool focused) {
187   if (focused)
188     render_view_->set_focused_pepper_plugin(instance);
189   else if (render_view_->focused_pepper_plugin() == instance)
190     render_view_->set_focused_pepper_plugin(NULL);
191 
192   GetRenderWidget()->UpdateTextInputType();
193   GetRenderWidget()->UpdateSelectionBounds();
194 }
195 
PepperTextInputTypeChanged(PepperPluginInstanceImpl * instance)196 void RenderFrameImpl::PepperTextInputTypeChanged(
197     PepperPluginInstanceImpl* instance) {
198   if (instance != render_view_->focused_pepper_plugin())
199     return;
200 
201   GetRenderWidget()->UpdateTextInputType();
202   if (render_view_->renderer_accessibility()) {
203     render_view_->renderer_accessibility()->FocusedNodeChanged(
204         blink::WebNode());
205   }
206 }
207 
PepperCaretPositionChanged(PepperPluginInstanceImpl * instance)208 void RenderFrameImpl::PepperCaretPositionChanged(
209     PepperPluginInstanceImpl* instance) {
210   if (instance != render_view_->focused_pepper_plugin())
211     return;
212   GetRenderWidget()->UpdateSelectionBounds();
213 }
214 
PepperCancelComposition(PepperPluginInstanceImpl * instance)215 void RenderFrameImpl::PepperCancelComposition(
216     PepperPluginInstanceImpl* instance) {
217   if (instance != render_view_->focused_pepper_plugin())
218     return;
219   Send(new ViewHostMsg_ImeCancelComposition(render_view_->GetRoutingID()));;
220 #if defined(OS_MACOSX) || defined(OS_WIN) || defined(USE_AURA)
221   GetRenderWidget()->UpdateCompositionInfo(true);
222 #endif
223 }
224 
PepperSelectionChanged(PepperPluginInstanceImpl * instance)225 void RenderFrameImpl::PepperSelectionChanged(
226     PepperPluginInstanceImpl* instance) {
227   if (instance != render_view_->focused_pepper_plugin())
228     return;
229   render_view_->SyncSelectionIfRequired();
230 }
231 
CreatePepperFullscreenContainer(PepperPluginInstanceImpl * plugin)232 RenderWidgetFullscreenPepper* RenderFrameImpl::CreatePepperFullscreenContainer(
233     PepperPluginInstanceImpl* plugin) {
234   GURL active_url;
235   if (render_view_->webview() && render_view_->webview()->mainFrame())
236     active_url = GURL(render_view_->webview()->mainFrame()->document().url());
237   RenderWidgetFullscreenPepper* widget = RenderWidgetFullscreenPepper::Create(
238       GetRenderWidget()->routing_id(), plugin, active_url,
239       GetRenderWidget()->screenInfo());
240   widget->show(blink::WebNavigationPolicyIgnore);
241   return widget;
242 }
243 
IsPepperAcceptingCompositionEvents() const244 bool RenderFrameImpl::IsPepperAcceptingCompositionEvents() const {
245   if (!render_view_->focused_pepper_plugin())
246     return false;
247   return render_view_->focused_pepper_plugin()->
248       IsPluginAcceptingCompositionEvents();
249 }
250 
PluginCrashed(const base::FilePath & plugin_path,base::ProcessId plugin_pid)251 void RenderFrameImpl::PluginCrashed(const base::FilePath& plugin_path,
252                                    base::ProcessId plugin_pid) {
253   // TODO(jam): dispatch this IPC in RenderFrameHost and switch to use
254   // routing_id_ as a result.
255   Send(new FrameHostMsg_PluginCrashed(routing_id_, plugin_path, plugin_pid));
256 }
257 
DidInitiatePaint()258 void RenderFrameImpl::DidInitiatePaint() {
259   // Notify all instances that we painted.  The same caveats apply as for
260   // ViewFlushedPaint regarding instances closing themselves, so we take
261   // similar precautions.
262   PepperPluginSet plugins = active_pepper_instances_;
263   for (PepperPluginSet::iterator i = plugins.begin(); i != plugins.end(); ++i) {
264     if (active_pepper_instances_.find(*i) != active_pepper_instances_.end())
265       (*i)->ViewInitiatedPaint();
266   }
267 }
268 
DidFlushPaint()269 void RenderFrameImpl::DidFlushPaint() {
270   // Notify all instances that we flushed. This will call into the plugin, and
271   // we it may ask to close itself as a result. This will, in turn, modify our
272   // set, possibly invalidating the iterator. So we iterate on a copy that
273   // won't change out from under us.
274   PepperPluginSet plugins = active_pepper_instances_;
275   for (PepperPluginSet::iterator i = plugins.begin(); i != plugins.end(); ++i) {
276     // The copy above makes sure our iterator is never invalid if some plugins
277     // are destroyed. But some plugin may decide to close all of its views in
278     // response to a paint in one of them, so we need to make sure each one is
279     // still "current" before using it.
280     //
281     // It's possible that a plugin was destroyed, but another one was created
282     // with the same address. In this case, we'll call ViewFlushedPaint on that
283     // new plugin. But that's OK for this particular case since we're just
284     // notifying all of our instances that the view flushed, and the new one is
285     // one of our instances.
286     //
287     // What about the case where a new one is created in a callback at a new
288     // address and we don't issue the callback? We're still OK since this
289     // callback is used for flush callbacks and we could not have possibly
290     // started a new paint for the new plugin while processing a previous paint
291     // for an existing one.
292     if (active_pepper_instances_.find(*i) != active_pepper_instances_.end())
293       (*i)->ViewFlushedPaint();
294   }
295 }
296 
GetBitmapForOptimizedPluginPaint(const gfx::Rect & paint_bounds,TransportDIB ** dib,gfx::Rect * location,gfx::Rect * clip,float * scale_factor)297 PepperPluginInstanceImpl* RenderFrameImpl::GetBitmapForOptimizedPluginPaint(
298       const gfx::Rect& paint_bounds,
299       TransportDIB** dib,
300       gfx::Rect* location,
301       gfx::Rect* clip,
302       float* scale_factor) {
303   for (PepperPluginSet::iterator i = active_pepper_instances_.begin();
304        i != active_pepper_instances_.end(); ++i) {
305     PepperPluginInstanceImpl* instance = *i;
306     // In Flash fullscreen , the plugin contents should be painted onto the
307     // fullscreen widget instead of the web page.
308     if (!instance->FlashIsFullscreenOrPending() &&
309         instance->GetBitmapForOptimizedPluginPaint(paint_bounds, dib, location,
310                                                    clip, scale_factor))
311       return *i;
312   }
313   return NULL;
314 }
315 
PageVisibilityChanged(bool shown)316 void RenderFrameImpl::PageVisibilityChanged(bool shown) {
317   // Inform PPAPI plugins that their page is no longer visible.
318   for (PepperPluginSet::iterator i = active_pepper_instances_.begin();
319        i != active_pepper_instances_.end(); ++i)
320     (*i)->PageVisibilityChanged(shown);
321 }
322 
OnSetFocus(bool enable)323 void RenderFrameImpl::OnSetFocus(bool enable) {
324   // Notify all Pepper plugins.
325   for (PepperPluginSet::iterator i = active_pepper_instances_.begin();
326        i != active_pepper_instances_.end(); ++i)
327     (*i)->SetContentAreaFocus(enable);
328 }
329 
WillHandleMouseEvent(const blink::WebMouseEvent & event)330 void RenderFrameImpl::WillHandleMouseEvent(const blink::WebMouseEvent& event) {
331   // This method is called for every mouse event that the render view receives.
332   // And then the mouse event is forwarded to WebKit, which dispatches it to the
333   // event target. Potentially a Pepper plugin will receive the event.
334   // In order to tell whether a plugin gets the last mouse event and which it
335   // is, we set |pepper_last_mouse_event_target_| to NULL here. If a plugin gets
336   // the event, it will notify us via DidReceiveMouseEvent() and set itself as
337   // |pepper_last_mouse_event_target_|.
338   render_view_->set_pepper_last_mouse_event_target(NULL);
339 }
340 
SimulateImeSetComposition(const base::string16 & text,const std::vector<blink::WebCompositionUnderline> & underlines,int selection_start,int selection_end)341 void RenderFrameImpl::SimulateImeSetComposition(
342     const base::string16& text,
343     const std::vector<blink::WebCompositionUnderline>& underlines,
344     int selection_start,
345     int selection_end) {
346   render_view_->OnImeSetComposition(
347       text, underlines, selection_start, selection_end);
348 }
349 
SimulateImeConfirmComposition(const base::string16 & text,const gfx::Range & replacement_range)350 void RenderFrameImpl::SimulateImeConfirmComposition(
351     const base::string16& text,
352     const gfx::Range& replacement_range) {
353   render_view_->OnImeConfirmComposition(text, replacement_range, false);
354 }
355 
356 
OnImeSetComposition(const base::string16 & text,const std::vector<blink::WebCompositionUnderline> & underlines,int selection_start,int selection_end)357 void RenderFrameImpl::OnImeSetComposition(
358     const base::string16& text,
359     const std::vector<blink::WebCompositionUnderline>& underlines,
360     int selection_start,
361     int selection_end) {
362   // When a PPAPI plugin has focus, we bypass WebKit.
363   if (!IsPepperAcceptingCompositionEvents()) {
364     pepper_composition_text_ = text;
365   } else {
366     // TODO(kinaba) currently all composition events are sent directly to
367     // plugins. Use DOM event mechanism after WebKit is made aware about
368     // plugins that support composition.
369     // The code below mimics the behavior of WebCore::Editor::setComposition.
370 
371     // Empty -> nonempty: composition started.
372     if (pepper_composition_text_.empty() && !text.empty()) {
373       render_view_->focused_pepper_plugin()->HandleCompositionStart(
374           base::string16());
375     }
376     // Nonempty -> empty: composition canceled.
377     if (!pepper_composition_text_.empty() && text.empty()) {
378       render_view_->focused_pepper_plugin()->HandleCompositionEnd(
379           base::string16());
380     }
381     pepper_composition_text_ = text;
382     // Nonempty: composition is ongoing.
383     if (!pepper_composition_text_.empty()) {
384       render_view_->focused_pepper_plugin()->HandleCompositionUpdate(
385           pepper_composition_text_, underlines, selection_start,
386           selection_end);
387     }
388   }
389 }
390 
OnImeConfirmComposition(const base::string16 & text,const gfx::Range & replacement_range,bool keep_selection)391 void RenderFrameImpl::OnImeConfirmComposition(
392     const base::string16& text,
393     const gfx::Range& replacement_range,
394     bool keep_selection) {
395   // When a PPAPI plugin has focus, we bypass WebKit.
396   // Here, text.empty() has a special meaning. It means to commit the last
397   // update of composition text (see
398   // RenderWidgetHost::ImeConfirmComposition()).
399   const base::string16& last_text = text.empty() ? pepper_composition_text_
400                                                  : text;
401 
402   // last_text is empty only when both text and pepper_composition_text_ is.
403   // Ignore it.
404   if (last_text.empty())
405     return;
406 
407   if (!IsPepperAcceptingCompositionEvents()) {
408     base::i18n::UTF16CharIterator iterator(&last_text);
409     int32 i = 0;
410     while (iterator.Advance()) {
411       blink::WebKeyboardEvent char_event;
412       char_event.type = blink::WebInputEvent::Char;
413       char_event.timeStampSeconds = base::Time::Now().ToDoubleT();
414       char_event.modifiers = 0;
415       char_event.windowsKeyCode = last_text[i];
416       char_event.nativeKeyCode = last_text[i];
417 
418       const int32 char_start = i;
419       for (; i < iterator.array_pos(); ++i) {
420         char_event.text[i - char_start] = last_text[i];
421         char_event.unmodifiedText[i - char_start] = last_text[i];
422       }
423 
424       if (GetRenderWidget()->webwidget())
425         GetRenderWidget()->webwidget()->handleInputEvent(char_event);
426     }
427   } else {
428     // Mimics the order of events sent by WebKit.
429     // See WebCore::Editor::setComposition() for the corresponding code.
430     render_view_->focused_pepper_plugin()->HandleCompositionEnd(last_text);
431     render_view_->focused_pepper_plugin()->HandleTextInput(last_text);
432   }
433   pepper_composition_text_.clear();
434 }
435 
436 #endif  // ENABLE_PLUGINS
437 
Send(IPC::Message * message)438 bool RenderFrameImpl::Send(IPC::Message* message) {
439   if (is_detaching_ ||
440       ((is_swapped_out_ || render_view_->is_swapped_out()) &&
441        !SwappedOutMessages::CanSendWhileSwappedOut(message))) {
442     delete message;
443     return false;
444   }
445 
446   return RenderThread::Get()->Send(message);
447 }
448 
OnMessageReceived(const IPC::Message & msg)449 bool RenderFrameImpl::OnMessageReceived(const IPC::Message& msg) {
450   ObserverListBase<RenderFrameObserver>::Iterator it(observers_);
451   RenderFrameObserver* observer;
452   while ((observer = it.GetNext()) != NULL) {
453     if (observer->OnMessageReceived(msg))
454       return true;
455   }
456 
457   // TODO(ajwong): Fill in with message handlers as various components
458   // are migrated over to understand frames.
459   return false;
460 }
461 
GetRenderView()462 RenderView* RenderFrameImpl::GetRenderView() {
463   return render_view_;
464 }
465 
GetRoutingID()466 int RenderFrameImpl::GetRoutingID() {
467   return routing_id_;
468 }
469 
GetWebkitPreferences()470 WebPreferences& RenderFrameImpl::GetWebkitPreferences() {
471   return render_view_->GetWebkitPreferences();
472 }
473 
ShowContextMenu(ContextMenuClient * client,const ContextMenuParams & params)474 int RenderFrameImpl::ShowContextMenu(ContextMenuClient* client,
475                                      const ContextMenuParams& params) {
476   return render_view_->ShowContextMenu(client, params);
477 }
478 
CancelContextMenu(int request_id)479 void RenderFrameImpl::CancelContextMenu(int request_id) {
480   return render_view_->CancelContextMenu(request_id);
481 }
482 
CreatePlugin(blink::WebFrame * frame,const WebPluginInfo & info,const blink::WebPluginParams & params)483 blink::WebPlugin* RenderFrameImpl::CreatePlugin(
484     blink::WebFrame* frame,
485     const WebPluginInfo& info,
486     const blink::WebPluginParams& params) {
487 #if defined(ENABLE_PLUGINS)
488   bool pepper_plugin_was_registered = false;
489   scoped_refptr<PluginModule> pepper_module(PluginModule::Create(
490       this, info, &pepper_plugin_was_registered));
491   if (pepper_plugin_was_registered) {
492     if (pepper_module.get()) {
493       // TODO(jam): change to take RenderFrame.
494       return new PepperWebPluginImpl(
495           pepper_module.get(), params, render_view_->AsWeakPtr(), this);
496     }
497   }
498 #if defined(OS_CHROMEOS)
499   LOG(WARNING) << "Pepper module/plugin creation failed.";
500   return NULL;
501 #else
502   // TODO(jam): change to take RenderFrame.
503   return new WebPluginImpl(frame, params, info.path, render_view_->AsWeakPtr(),
504                            this);
505 #endif
506 #else
507   return NULL;
508 #endif
509 }
510 
LoadURLExternally(blink::WebFrame * frame,const blink::WebURLRequest & request,blink::WebNavigationPolicy policy)511 void RenderFrameImpl::LoadURLExternally(
512     blink::WebFrame* frame,
513     const blink::WebURLRequest& request,
514     blink::WebNavigationPolicy policy) {
515   loadURLExternally(frame, request, policy);
516 }
517 
518 // blink::WebFrameClient implementation ----------------------------------------
519 
createPlugin(blink::WebFrame * frame,const blink::WebPluginParams & params)520 blink::WebPlugin* RenderFrameImpl::createPlugin(
521     blink::WebFrame* frame,
522     const blink::WebPluginParams& params) {
523   blink::WebPlugin* plugin = NULL;
524   if (GetContentClient()->renderer()->OverrideCreatePlugin(
525           this, frame, params, &plugin)) {
526     return plugin;
527   }
528 
529   if (UTF16ToASCII(params.mimeType) == kBrowserPluginMimeType) {
530     return render_view_->GetBrowserPluginManager()->CreateBrowserPlugin(
531         render_view_, frame);
532   }
533 
534 #if defined(ENABLE_PLUGINS)
535   WebPluginInfo info;
536   std::string mime_type;
537   bool found = false;
538   Send(new FrameHostMsg_GetPluginInfo(
539       routing_id_, params.url, frame->top()->document().url(),
540       params.mimeType.utf8(), &found, &info, &mime_type));
541   if (!found)
542     return NULL;
543 
544   WebPluginParams params_to_use = params;
545   params_to_use.mimeType = WebString::fromUTF8(mime_type);
546   return CreatePlugin(frame, info, params_to_use);
547 #else
548   return NULL;
549 #endif  // defined(ENABLE_PLUGINS)
550 }
551 
createMediaPlayer(blink::WebFrame * frame,const blink::WebURL & url,blink::WebMediaPlayerClient * client)552 blink::WebMediaPlayer* RenderFrameImpl::createMediaPlayer(
553     blink::WebFrame* frame,
554     const blink::WebURL& url,
555     blink::WebMediaPlayerClient* client) {
556   // TODO(nasko): Moving the implementation here involves moving a few media
557   // related client objects here or referencing them in the RenderView. Needs
558   // more work to understand where the proper place for those objects is.
559   return render_view_->CreateMediaPlayer(this, frame, url, client);
560 }
561 
createApplicationCacheHost(blink::WebFrame * frame,blink::WebApplicationCacheHostClient * client)562 blink::WebApplicationCacheHost* RenderFrameImpl::createApplicationCacheHost(
563     blink::WebFrame* frame,
564     blink::WebApplicationCacheHostClient* client) {
565   if (!frame || !frame->view())
566     return NULL;
567   return new RendererWebApplicationCacheHostImpl(
568       RenderViewImpl::FromWebView(frame->view()), client,
569       RenderThreadImpl::current()->appcache_dispatcher()->backend_proxy());
570 }
571 
572 blink::WebWorkerPermissionClientProxy*
createWorkerPermissionClientProxy(WebFrame * frame)573 RenderFrameImpl::createWorkerPermissionClientProxy(WebFrame* frame) {
574   if (!frame || !frame->view())
575     return NULL;
576   return GetContentClient()->renderer()->CreateWorkerPermissionClientProxy(
577       RenderViewImpl::FromWebView(frame->view()), frame);
578 }
579 
cookieJar(blink::WebFrame * frame)580 blink::WebCookieJar* RenderFrameImpl::cookieJar(blink::WebFrame* frame) {
581   return render_view_->cookieJar(frame);
582 }
583 
createServiceWorkerProvider(blink::WebFrame * frame,blink::WebServiceWorkerProviderClient * client)584 blink::WebServiceWorkerProvider* RenderFrameImpl::createServiceWorkerProvider(
585     blink::WebFrame* frame,
586     blink::WebServiceWorkerProviderClient* client) {
587   return new WebServiceWorkerProviderImpl(
588       ChildThread::current()->thread_safe_sender(),
589       make_scoped_ptr(client));
590 }
591 
didAccessInitialDocument(blink::WebFrame * frame)592 void RenderFrameImpl::didAccessInitialDocument(blink::WebFrame* frame) {
593   render_view_->didAccessInitialDocument(frame);
594 }
595 
createChildFrame(blink::WebFrame * parent,const blink::WebString & name)596 blink::WebFrame* RenderFrameImpl::createChildFrame(
597     blink::WebFrame* parent,
598     const blink::WebString& name) {
599   RenderFrameImpl* child_render_frame = this;
600   long long child_frame_identifier = WebFrame::generateEmbedderIdentifier();
601   if (CommandLine::ForCurrentProcess()->HasSwitch(switches::kSitePerProcess)) {
602     // Synchronously notify the browser of a child frame creation to get the
603     // routing_id for the RenderFrame.
604     int routing_id;
605     Send(new FrameHostMsg_CreateChildFrame(routing_id_,
606                                            parent->identifier(),
607                                            child_frame_identifier,
608                                            UTF16ToUTF8(name),
609                                            &routing_id));
610     child_render_frame = RenderFrameImpl::Create(render_view_, routing_id);
611   }
612 
613   blink::WebFrame* web_frame = WebFrame::create(child_render_frame,
614                                                 child_frame_identifier);
615 
616   if (CommandLine::ForCurrentProcess()->HasSwitch(switches::kSitePerProcess)) {
617     g_child_frame_map.Get().insert(
618         std::make_pair(web_frame, child_render_frame));
619   }
620 
621   return web_frame;
622 }
623 
didDisownOpener(blink::WebFrame * frame)624 void RenderFrameImpl::didDisownOpener(blink::WebFrame* frame) {
625   render_view_->didDisownOpener(frame);
626 }
627 
frameDetached(blink::WebFrame * frame)628 void RenderFrameImpl::frameDetached(blink::WebFrame* frame) {
629   // NOTE: This function is called on the frame that is being detached and not
630   // the parent frame.  This is different from createChildFrame() which is
631   // called on the parent frame.
632   CHECK(!is_detaching_);
633 
634   int64 parent_frame_id = -1;
635   if (frame->parent())
636     parent_frame_id = frame->parent()->identifier();
637 
638   Send(new FrameHostMsg_Detach(routing_id_, parent_frame_id,
639                                frame->identifier()));
640 
641   // Currently multiple WebCore::Frames can send frameDetached to a single
642   // RenderFrameImpl. This is legacy behavior from when RenderViewImpl served
643   // as a shared WebFrameClient for multiple Webcore::Frame objects. It also
644   // prevents this class from entering the |is_detaching_| state because
645   // even though one WebCore::Frame may have detached itself, others will
646   // still need to use this object.
647   if (CommandLine::ForCurrentProcess()->HasSwitch(switches::kSitePerProcess)) {
648     // The |is_detaching_| flag disables Send(). FrameHostMsg_Detach must be
649     // sent before setting |is_detaching_| to true. In contrast, Observers
650     // should only be notified afterwards so they cannot call back into and
651     // have IPCs fired off.
652     is_detaching_ = true;
653   }
654 
655   // Call back to RenderViewImpl for observers to be notified.
656   // TODO(nasko): Remove once we have RenderFrameObserver.
657   render_view_->frameDetached(frame);
658 
659   frame->close();
660 
661   if (CommandLine::ForCurrentProcess()->HasSwitch(switches::kSitePerProcess)) {
662     // If the frame does not have a parent, it is the main frame. The main
663     // frame is owned by the containing RenderViewHost so it does not require
664     // any cleanup here.
665     if (frame->parent()) {
666       FrameMap::iterator it = g_child_frame_map.Get().find(frame);
667       DCHECK(it != g_child_frame_map.Get().end());
668       DCHECK_EQ(it->second, this);
669       g_child_frame_map.Get().erase(it);
670       delete this;
671       // Object is invalid after this point.
672     }
673   }
674 }
675 
willClose(blink::WebFrame * frame)676 void RenderFrameImpl::willClose(blink::WebFrame* frame) {
677   // Call back to RenderViewImpl for observers to be notified.
678   // TODO(nasko): Remove once we have RenderFrameObserver.
679   render_view_->willClose(frame);
680 }
681 
didChangeName(blink::WebFrame * frame,const blink::WebString & name)682 void RenderFrameImpl::didChangeName(blink::WebFrame* frame,
683                                     const blink::WebString& name) {
684   if (!render_view_->renderer_preferences_.report_frame_name_changes)
685     return;
686 
687   render_view_->Send(
688       new ViewHostMsg_UpdateFrameName(render_view_->GetRoutingID(),
689                                       frame->identifier(),
690                                       !frame->parent(),
691                                       UTF16ToUTF8(name)));
692 }
693 
didMatchCSS(blink::WebFrame * frame,const blink::WebVector<blink::WebString> & newly_matching_selectors,const blink::WebVector<blink::WebString> & stopped_matching_selectors)694 void RenderFrameImpl::didMatchCSS(
695     blink::WebFrame* frame,
696     const blink::WebVector<blink::WebString>& newly_matching_selectors,
697     const blink::WebVector<blink::WebString>& stopped_matching_selectors) {
698   render_view_->didMatchCSS(
699       frame, newly_matching_selectors, stopped_matching_selectors);
700 }
701 
loadURLExternally(blink::WebFrame * frame,const blink::WebURLRequest & request,blink::WebNavigationPolicy policy)702 void RenderFrameImpl::loadURLExternally(blink::WebFrame* frame,
703                                         const blink::WebURLRequest& request,
704                                         blink::WebNavigationPolicy policy) {
705   loadURLExternally(frame, request, policy, WebString());
706 }
707 
loadURLExternally(blink::WebFrame * frame,const blink::WebURLRequest & request,blink::WebNavigationPolicy policy,const blink::WebString & suggested_name)708 void RenderFrameImpl::loadURLExternally(
709     blink::WebFrame* frame,
710     const blink::WebURLRequest& request,
711     blink::WebNavigationPolicy policy,
712     const blink::WebString& suggested_name) {
713   Referrer referrer(RenderViewImpl::GetReferrerFromRequest(frame, request));
714   if (policy == blink::WebNavigationPolicyDownload) {
715     render_view_->Send(new ViewHostMsg_DownloadUrl(render_view_->GetRoutingID(),
716                                                    request.url(), referrer,
717                                                    suggested_name));
718   } else {
719     render_view_->OpenURL(frame, request.url(), referrer, policy);
720   }
721 }
722 
decidePolicyForNavigation(blink::WebFrame * frame,blink::WebDataSource::ExtraData * extra_data,const blink::WebURLRequest & request,blink::WebNavigationType type,blink::WebNavigationPolicy default_policy,bool is_redirect)723 blink::WebNavigationPolicy RenderFrameImpl::decidePolicyForNavigation(
724     blink::WebFrame* frame,
725     blink::WebDataSource::ExtraData* extra_data,
726     const blink::WebURLRequest& request,
727     blink::WebNavigationType type,
728     blink::WebNavigationPolicy default_policy,
729     bool is_redirect) {
730   return render_view_->decidePolicyForNavigation(
731       frame, extra_data, request, type, default_policy, is_redirect);
732 }
733 
decidePolicyForNavigation(blink::WebFrame * frame,const blink::WebURLRequest & request,blink::WebNavigationType type,blink::WebNavigationPolicy default_policy,bool is_redirect)734 blink::WebNavigationPolicy RenderFrameImpl::decidePolicyForNavigation(
735     blink::WebFrame* frame,
736     const blink::WebURLRequest& request,
737     blink::WebNavigationType type,
738     blink::WebNavigationPolicy default_policy,
739     bool is_redirect) {
740   return render_view_->decidePolicyForNavigation(
741       frame, request, type, default_policy, is_redirect);
742 }
743 
willSendSubmitEvent(blink::WebFrame * frame,const blink::WebFormElement & form)744 void RenderFrameImpl::willSendSubmitEvent(blink::WebFrame* frame,
745                                           const blink::WebFormElement& form) {
746   // Call back to RenderViewImpl for observers to be notified.
747   // TODO(nasko): Remove once we have RenderFrameObserver.
748   render_view_->willSendSubmitEvent(frame, form);
749 }
750 
willSubmitForm(blink::WebFrame * frame,const blink::WebFormElement & form)751 void RenderFrameImpl::willSubmitForm(blink::WebFrame* frame,
752                                      const blink::WebFormElement& form) {
753   DocumentState* document_state =
754       DocumentState::FromDataSource(frame->provisionalDataSource());
755   NavigationState* navigation_state = document_state->navigation_state();
756   InternalDocumentStateData* internal_data =
757       InternalDocumentStateData::FromDocumentState(document_state);
758 
759   if (PageTransitionCoreTypeIs(navigation_state->transition_type(),
760                                PAGE_TRANSITION_LINK)) {
761     navigation_state->set_transition_type(PAGE_TRANSITION_FORM_SUBMIT);
762   }
763 
764   // Save these to be processed when the ensuing navigation is committed.
765   WebSearchableFormData web_searchable_form_data(form);
766   internal_data->set_searchable_form_url(web_searchable_form_data.url());
767   internal_data->set_searchable_form_encoding(
768       web_searchable_form_data.encoding().utf8());
769 
770   // Call back to RenderViewImpl for observers to be notified.
771   // TODO(nasko): Remove once we have RenderFrameObserver.
772   render_view_->willSubmitForm(frame, form);
773 }
774 
didCreateDataSource(blink::WebFrame * frame,blink::WebDataSource * datasource)775 void RenderFrameImpl::didCreateDataSource(blink::WebFrame* frame,
776                                           blink::WebDataSource* datasource) {
777   // TODO(nasko): Move implementation here. Needed state:
778   // * pending_navigation_params_
779   // * webview
780   // Needed methods:
781   // * PopulateDocumentStateFromPending
782   // * CreateNavigationStateFromPending
783   render_view_->didCreateDataSource(frame, datasource);
784 }
785 
didStartProvisionalLoad(blink::WebFrame * frame)786 void RenderFrameImpl::didStartProvisionalLoad(blink::WebFrame* frame) {
787   WebDataSource* ds = frame->provisionalDataSource();
788 
789   // In fast/loader/stop-provisional-loads.html, we abort the load before this
790   // callback is invoked.
791   if (!ds)
792     return;
793 
794   DocumentState* document_state = DocumentState::FromDataSource(ds);
795 
796   // We should only navigate to swappedout:// when is_swapped_out_ is true.
797   CHECK((ds->request().url() != GURL(kSwappedOutURL)) ||
798         render_view_->is_swapped_out()) <<
799         "Heard swappedout:// when not swapped out.";
800 
801   // Update the request time if WebKit has better knowledge of it.
802   if (document_state->request_time().is_null()) {
803     double event_time = ds->triggeringEventTime();
804     if (event_time != 0.0)
805       document_state->set_request_time(Time::FromDoubleT(event_time));
806   }
807 
808   // Start time is only set after request time.
809   document_state->set_start_load_time(Time::Now());
810 
811   bool is_top_most = !frame->parent();
812   if (is_top_most) {
813     render_view_->set_navigation_gesture(
814         WebUserGestureIndicator::isProcessingUserGesture() ?
815             NavigationGestureUser : NavigationGestureAuto);
816   } else if (ds->replacesCurrentHistoryItem()) {
817     // Subframe navigations that don't add session history items must be
818     // marked with AUTO_SUBFRAME. See also didFailProvisionalLoad for how we
819     // handle loading of error pages.
820     document_state->navigation_state()->set_transition_type(
821         PAGE_TRANSITION_AUTO_SUBFRAME);
822   }
823 
824   FOR_EACH_OBSERVER(
825       RenderViewObserver, render_view_->observers(),
826       DidStartProvisionalLoad(frame));
827 
828   Send(new FrameHostMsg_DidStartProvisionalLoadForFrame(
829        routing_id_, frame->identifier(),
830        frame->parent() ? frame->parent()->identifier() : -1,
831        is_top_most, ds->request().url()));
832 }
833 
didReceiveServerRedirectForProvisionalLoad(blink::WebFrame * frame)834 void RenderFrameImpl::didReceiveServerRedirectForProvisionalLoad(
835     blink::WebFrame* frame) {
836   // TODO(nasko): Move implementation here. Needed state:
837   // * page_id_
838   render_view_->didReceiveServerRedirectForProvisionalLoad(frame);
839 }
840 
didFailProvisionalLoad(blink::WebFrame * frame,const blink::WebURLError & error)841 void RenderFrameImpl::didFailProvisionalLoad(
842     blink::WebFrame* frame,
843     const blink::WebURLError& error) {
844   // TODO(nasko): Move implementation here. Needed state:
845   // * page_id_
846   // * pending_navigation_params_
847   // Needed methods
848   // * MaybeLoadAlternateErrorPage
849   // * LoadNavigationErrorPage
850   render_view_->didFailProvisionalLoad(frame, error);
851 }
852 
didCommitProvisionalLoad(blink::WebFrame * frame,bool is_new_navigation)853 void RenderFrameImpl::didCommitProvisionalLoad(blink::WebFrame* frame,
854                                                bool is_new_navigation) {
855   // TODO(nasko): Move implementation here. Needed state:
856   // * page_id_
857   // * next_page_id_
858   // * history_list_offset_
859   // * history_list_length_
860   // * history_page_ids_
861   // Needed methods
862   // * webview
863   // * UpdateSessionHistory
864   // * GetLoadingUrl
865   render_view_->didCommitProvisionalLoad(frame, is_new_navigation);
866 }
867 
didClearWindowObject(blink::WebFrame * frame)868 void RenderFrameImpl::didClearWindowObject(blink::WebFrame* frame) {
869   // TODO(nasko): Move implementation here. Needed state:
870   // * enabled_bindings_
871   // * dom_automation_controller_
872   // * stats_collection_controller_
873   render_view_->didClearWindowObject(frame);
874 }
875 
didCreateDocumentElement(blink::WebFrame * frame)876 void RenderFrameImpl::didCreateDocumentElement(blink::WebFrame* frame) {
877   // Notify the browser about non-blank documents loading in the top frame.
878   GURL url = frame->document().url();
879   if (url.is_valid() && url.spec() != kAboutBlankURL) {
880     // TODO(nasko): Check if webview()->mainFrame() is the same as the
881     // frame->tree()->top().
882     if (frame == render_view_->webview()->mainFrame()) {
883       render_view_->Send(new ViewHostMsg_DocumentAvailableInMainFrame(
884           render_view_->GetRoutingID()));
885     }
886   }
887 
888   // Call back to RenderViewImpl for observers to be notified.
889   // TODO(nasko): Remove once we have RenderFrameObserver.
890   render_view_->didCreateDocumentElement(frame);
891 }
892 
didReceiveTitle(blink::WebFrame * frame,const blink::WebString & title,blink::WebTextDirection direction)893 void RenderFrameImpl::didReceiveTitle(blink::WebFrame* frame,
894                                       const blink::WebString& title,
895                                       blink::WebTextDirection direction) {
896   // TODO(nasko): Investigate wheather implementation should move here.
897   render_view_->didReceiveTitle(frame, title, direction);
898 }
899 
didChangeIcon(blink::WebFrame * frame,blink::WebIconURL::Type icon_type)900 void RenderFrameImpl::didChangeIcon(blink::WebFrame* frame,
901                                     blink::WebIconURL::Type icon_type) {
902   // TODO(nasko): Investigate wheather implementation should move here.
903   render_view_->didChangeIcon(frame, icon_type);
904 }
905 
didFinishDocumentLoad(blink::WebFrame * frame)906 void RenderFrameImpl::didFinishDocumentLoad(blink::WebFrame* frame) {
907   // TODO(nasko): Move implementation here. No state needed, just observers
908   // notification in before updating encoding.
909   render_view_->didFinishDocumentLoad(frame);
910 }
911 
didHandleOnloadEvents(blink::WebFrame * frame)912 void RenderFrameImpl::didHandleOnloadEvents(blink::WebFrame* frame) {
913   // TODO(nasko): Move implementation here. Needed state:
914   // * page_id_
915   render_view_->didHandleOnloadEvents(frame);
916 }
917 
didFailLoad(blink::WebFrame * frame,const blink::WebURLError & error)918 void RenderFrameImpl::didFailLoad(blink::WebFrame* frame,
919                                   const blink::WebURLError& error) {
920   // TODO(nasko): Move implementation here. No state needed.
921   render_view_->didFailLoad(frame, error);
922 }
923 
didFinishLoad(blink::WebFrame * frame)924 void RenderFrameImpl::didFinishLoad(blink::WebFrame* frame) {
925   // TODO(nasko): Move implementation here. No state needed, just observers
926   // notification before sending message to the browser process.
927   render_view_->didFinishLoad(frame);
928 }
929 
didNavigateWithinPage(blink::WebFrame * frame,bool is_new_navigation)930 void RenderFrameImpl::didNavigateWithinPage(blink::WebFrame* frame,
931                                             bool is_new_navigation) {
932   // TODO(nasko): Move implementation here. No state needed, just observers
933   // notification before sending message to the browser process.
934   render_view_->didNavigateWithinPage(frame, is_new_navigation);
935 }
936 
didUpdateCurrentHistoryItem(blink::WebFrame * frame)937 void RenderFrameImpl::didUpdateCurrentHistoryItem(blink::WebFrame* frame) {
938   // TODO(nasko): Move implementation here. Needed methods:
939   // * StartNavStateSyncTimerIfNecessary
940   render_view_->didUpdateCurrentHistoryItem(frame);
941 }
942 
willRequestAfterPreconnect(blink::WebFrame * frame,blink::WebURLRequest & request)943 void RenderFrameImpl::willRequestAfterPreconnect(
944     blink::WebFrame* frame,
945     blink::WebURLRequest& request) {
946   blink::WebReferrerPolicy referrer_policy = blink::WebReferrerPolicyDefault;
947   WebString custom_user_agent;
948 
949   if (request.extraData()) {
950     // This will only be called before willSendRequest, so only ExtraData
951     // members we have to copy here is on WebURLRequestExtraDataImpl.
952     webkit_glue::WebURLRequestExtraDataImpl* old_extra_data =
953         static_cast<webkit_glue::WebURLRequestExtraDataImpl*>(
954             request.extraData());
955 
956     referrer_policy = old_extra_data->referrer_policy();
957     custom_user_agent = old_extra_data->custom_user_agent();
958   }
959 
960   bool was_after_preconnect_request = true;
961   // The args after |was_after_preconnect_request| are not used, and set to
962   // correct values at |willSendRequest|.
963   request.setExtraData(new webkit_glue::WebURLRequestExtraDataImpl(
964       referrer_policy, custom_user_agent, was_after_preconnect_request));
965 }
966 
willSendRequest(blink::WebFrame * frame,unsigned identifier,blink::WebURLRequest & request,const blink::WebURLResponse & redirect_response)967 void RenderFrameImpl::willSendRequest(
968     blink::WebFrame* frame,
969     unsigned identifier,
970     blink::WebURLRequest& request,
971     const blink::WebURLResponse& redirect_response) {
972   // The request my be empty during tests.
973   if (request.url().isEmpty())
974     return;
975 
976   WebFrame* top_frame = frame->top();
977   if (!top_frame)
978     top_frame = frame;
979   WebDataSource* provisional_data_source = top_frame->provisionalDataSource();
980   WebDataSource* top_data_source = top_frame->dataSource();
981   WebDataSource* data_source =
982       provisional_data_source ? provisional_data_source : top_data_source;
983 
984   PageTransition transition_type = PAGE_TRANSITION_LINK;
985   DocumentState* document_state = DocumentState::FromDataSource(data_source);
986   DCHECK(document_state);
987   InternalDocumentStateData* internal_data =
988       InternalDocumentStateData::FromDocumentState(document_state);
989   NavigationState* navigation_state = document_state->navigation_state();
990   transition_type = navigation_state->transition_type();
991 
992   GURL request_url(request.url());
993   GURL new_url;
994   if (GetContentClient()->renderer()->WillSendRequest(
995           frame,
996           transition_type,
997           request_url,
998           request.firstPartyForCookies(),
999           &new_url)) {
1000     request.setURL(WebURL(new_url));
1001   }
1002 
1003   if (internal_data->is_cache_policy_override_set())
1004     request.setCachePolicy(internal_data->cache_policy_override());
1005 
1006   blink::WebReferrerPolicy referrer_policy;
1007   if (internal_data->is_referrer_policy_set()) {
1008     referrer_policy = internal_data->referrer_policy();
1009     internal_data->clear_referrer_policy();
1010   } else {
1011     referrer_policy = frame->document().referrerPolicy();
1012   }
1013 
1014   // The request's extra data may indicate that we should set a custom user
1015   // agent. This needs to be done here, after WebKit is through with setting the
1016   // user agent on its own.
1017   WebString custom_user_agent;
1018   bool was_after_preconnect_request = false;
1019   if (request.extraData()) {
1020     webkit_glue::WebURLRequestExtraDataImpl* old_extra_data =
1021         static_cast<webkit_glue::WebURLRequestExtraDataImpl*>(
1022             request.extraData());
1023     custom_user_agent = old_extra_data->custom_user_agent();
1024     was_after_preconnect_request =
1025         old_extra_data->was_after_preconnect_request();
1026 
1027     if (!custom_user_agent.isNull()) {
1028       if (custom_user_agent.isEmpty())
1029         request.clearHTTPHeaderField("User-Agent");
1030       else
1031         request.setHTTPHeaderField("User-Agent", custom_user_agent);
1032     }
1033   }
1034 
1035   // Attach |should_replace_current_entry| state to requests so that, should
1036   // this navigation later require a request transfer, all state is preserved
1037   // when it is re-created in the new process.
1038   bool should_replace_current_entry = false;
1039   if (navigation_state->is_content_initiated()) {
1040     should_replace_current_entry = data_source->replacesCurrentHistoryItem();
1041   } else {
1042     // If the navigation is browser-initiated, the NavigationState contains the
1043     // correct value instead of the WebDataSource.
1044     //
1045     // TODO(davidben): Avoid this awkward duplication of state. See comment on
1046     // NavigationState::should_replace_current_entry().
1047     should_replace_current_entry =
1048         navigation_state->should_replace_current_entry();
1049   }
1050   request.setExtraData(
1051       new RequestExtraData(referrer_policy,
1052                            custom_user_agent,
1053                            was_after_preconnect_request,
1054                            routing_id_,
1055                            (frame == top_frame),
1056                            frame->identifier(),
1057                            GURL(frame->document().securityOrigin().toString()),
1058                            frame->parent() == top_frame,
1059                            frame->parent() ? frame->parent()->identifier() : -1,
1060                            navigation_state->allow_download(),
1061                            transition_type,
1062                            should_replace_current_entry,
1063                            navigation_state->transferred_request_child_id(),
1064                            navigation_state->transferred_request_request_id()));
1065 
1066   DocumentState* top_document_state =
1067       DocumentState::FromDataSource(top_data_source);
1068   if (top_document_state) {
1069     // TODO(gavinp): separate out prefetching and prerender field trials
1070     // if the rel=prerender rel type is sticking around.
1071     if (request.targetType() == WebURLRequest::TargetIsPrefetch)
1072       top_document_state->set_was_prefetcher(true);
1073 
1074     if (was_after_preconnect_request)
1075       top_document_state->set_was_after_preconnect_request(true);
1076   }
1077 
1078   // This is an instance where we embed a copy of the routing id
1079   // into the data portion of the message. This can cause problems if we
1080   // don't register this id on the browser side, since the download manager
1081   // expects to find a RenderViewHost based off the id.
1082   request.setRequestorID(render_view_->GetRoutingID());
1083   request.setHasUserGesture(WebUserGestureIndicator::isProcessingUserGesture());
1084 
1085   if (!navigation_state->extra_headers().empty()) {
1086     for (net::HttpUtil::HeadersIterator i(
1087         navigation_state->extra_headers().begin(),
1088         navigation_state->extra_headers().end(), "\n");
1089         i.GetNext(); ) {
1090       request.setHTTPHeaderField(WebString::fromUTF8(i.name()),
1091                                  WebString::fromUTF8(i.values()));
1092     }
1093   }
1094 
1095   if (!render_view_->renderer_preferences_.enable_referrers)
1096     request.clearHTTPHeaderField("Referer");
1097 }
1098 
didReceiveResponse(blink::WebFrame * frame,unsigned identifier,const blink::WebURLResponse & response)1099 void RenderFrameImpl::didReceiveResponse(
1100     blink::WebFrame* frame,
1101     unsigned identifier,
1102     const blink::WebURLResponse& response) {
1103   // Only do this for responses that correspond to a provisional data source
1104   // of the top-most frame.  If we have a provisional data source, then we
1105   // can't have any sub-resources yet, so we know that this response must
1106   // correspond to a frame load.
1107   if (!frame->provisionalDataSource() || frame->parent())
1108     return;
1109 
1110   // If we are in view source mode, then just let the user see the source of
1111   // the server's error page.
1112   if (frame->isViewSourceModeEnabled())
1113     return;
1114 
1115   DocumentState* document_state =
1116       DocumentState::FromDataSource(frame->provisionalDataSource());
1117   int http_status_code = response.httpStatusCode();
1118 
1119   // Record page load flags.
1120   WebURLResponseExtraDataImpl* extra_data =
1121       RenderViewImpl::GetExtraDataFromResponse(response);
1122   if (extra_data) {
1123     document_state->set_was_fetched_via_spdy(
1124         extra_data->was_fetched_via_spdy());
1125     document_state->set_was_npn_negotiated(
1126         extra_data->was_npn_negotiated());
1127     document_state->set_npn_negotiated_protocol(
1128         extra_data->npn_negotiated_protocol());
1129     document_state->set_was_alternate_protocol_available(
1130         extra_data->was_alternate_protocol_available());
1131     document_state->set_connection_info(
1132         extra_data->connection_info());
1133     document_state->set_was_fetched_via_proxy(
1134         extra_data->was_fetched_via_proxy());
1135   }
1136   InternalDocumentStateData* internal_data =
1137       InternalDocumentStateData::FromDocumentState(document_state);
1138   internal_data->set_http_status_code(http_status_code);
1139   // Whether or not the http status code actually corresponds to an error is
1140   // only checked when the page is done loading, if |use_error_page| is
1141   // still true.
1142   internal_data->set_use_error_page(true);
1143 }
1144 
didFinishResourceLoad(blink::WebFrame * frame,unsigned identifier)1145 void RenderFrameImpl::didFinishResourceLoad(blink::WebFrame* frame,
1146                                             unsigned identifier) {
1147   // TODO(nasko): Move implementation here. Needed state:
1148   // * devtools_agent_
1149   // Needed methods:
1150   // * LoadNavigationErrorPage
1151   render_view_->didFinishResourceLoad(frame, identifier);
1152 }
1153 
didLoadResourceFromMemoryCache(blink::WebFrame * frame,const blink::WebURLRequest & request,const blink::WebURLResponse & response)1154 void RenderFrameImpl::didLoadResourceFromMemoryCache(
1155     blink::WebFrame* frame,
1156     const blink::WebURLRequest& request,
1157     const blink::WebURLResponse& response) {
1158   // The recipients of this message have no use for data: URLs: they don't
1159   // affect the page's insecure content list and are not in the disk cache. To
1160   // prevent large (1M+) data: URLs from crashing in the IPC system, we simply
1161   // filter them out here.
1162   GURL url(request.url());
1163   if (url.SchemeIs("data"))
1164     return;
1165 
1166   // Let the browser know we loaded a resource from the memory cache.  This
1167   // message is needed to display the correct SSL indicators.
1168   render_view_->Send(new ViewHostMsg_DidLoadResourceFromMemoryCache(
1169       render_view_->GetRoutingID(),
1170       url,
1171       response.securityInfo(),
1172       request.httpMethod().utf8(),
1173       response.mimeType().utf8(),
1174       ResourceType::FromTargetType(request.targetType())));
1175 }
1176 
didDisplayInsecureContent(blink::WebFrame * frame)1177 void RenderFrameImpl::didDisplayInsecureContent(blink::WebFrame* frame) {
1178   render_view_->Send(new ViewHostMsg_DidDisplayInsecureContent(
1179       render_view_->GetRoutingID()));
1180 }
1181 
didRunInsecureContent(blink::WebFrame * frame,const blink::WebSecurityOrigin & origin,const blink::WebURL & target)1182 void RenderFrameImpl::didRunInsecureContent(
1183     blink::WebFrame* frame,
1184     const blink::WebSecurityOrigin& origin,
1185     const blink::WebURL& target) {
1186   render_view_->Send(new ViewHostMsg_DidRunInsecureContent(
1187       render_view_->GetRoutingID(),
1188       origin.toString().utf8(),
1189       target));
1190 }
1191 
didAbortLoading(blink::WebFrame * frame)1192 void RenderFrameImpl::didAbortLoading(blink::WebFrame* frame) {
1193 #if defined(ENABLE_PLUGINS)
1194   if (frame != render_view_->webview()->mainFrame())
1195     return;
1196   PluginChannelHost::Broadcast(
1197       new PluginHostMsg_DidAbortLoading(render_view_->GetRoutingID()));
1198 #endif
1199 }
1200 
didExhaustMemoryAvailableForScript(blink::WebFrame * frame)1201 void RenderFrameImpl::didExhaustMemoryAvailableForScript(
1202     blink::WebFrame* frame) {
1203   render_view_->Send(new ViewHostMsg_JSOutOfMemory(
1204       render_view_->GetRoutingID()));
1205 }
1206 
didCreateScriptContext(blink::WebFrame * frame,v8::Handle<v8::Context> context,int extension_group,int world_id)1207 void RenderFrameImpl::didCreateScriptContext(blink::WebFrame* frame,
1208                                              v8::Handle<v8::Context> context,
1209                                              int extension_group,
1210                                              int world_id) {
1211   GetContentClient()->renderer()->DidCreateScriptContext(
1212       frame, context, extension_group, world_id);
1213 }
1214 
willReleaseScriptContext(blink::WebFrame * frame,v8::Handle<v8::Context> context,int world_id)1215 void RenderFrameImpl::willReleaseScriptContext(blink::WebFrame* frame,
1216                                                v8::Handle<v8::Context> context,
1217                                                int world_id) {
1218   GetContentClient()->renderer()->WillReleaseScriptContext(
1219       frame, context, world_id);
1220 }
1221 
didFirstVisuallyNonEmptyLayout(blink::WebFrame * frame)1222 void RenderFrameImpl::didFirstVisuallyNonEmptyLayout(blink::WebFrame* frame) {
1223   render_view_->didFirstVisuallyNonEmptyLayout(frame);
1224 }
1225 
didChangeContentsSize(blink::WebFrame * frame,const blink::WebSize & size)1226 void RenderFrameImpl::didChangeContentsSize(blink::WebFrame* frame,
1227                                             const blink::WebSize& size) {
1228   // TODO(nasko): Move implementation here. Needed state:
1229   // * cached_has_main_frame_horizontal_scrollbar_
1230   // * cached_has_main_frame_vertical_scrollbar_
1231   render_view_->didChangeContentsSize(frame, size);
1232 }
1233 
didChangeScrollOffset(blink::WebFrame * frame)1234 void RenderFrameImpl::didChangeScrollOffset(blink::WebFrame* frame) {
1235   // TODO(nasko): Move implementation here. Needed methods:
1236   // * StartNavStateSyncTimerIfNecessary
1237   render_view_->didChangeScrollOffset(frame);
1238 }
1239 
willInsertBody(blink::WebFrame * frame)1240 void RenderFrameImpl::willInsertBody(blink::WebFrame* frame) {
1241   if (!frame->parent()) {
1242     render_view_->Send(new ViewHostMsg_WillInsertBody(
1243         render_view_->GetRoutingID()));
1244   }
1245 }
1246 
reportFindInPageMatchCount(int request_id,int count,bool final_update)1247 void RenderFrameImpl::reportFindInPageMatchCount(int request_id,
1248                                                  int count,
1249                                                  bool final_update) {
1250   int active_match_ordinal = -1;  // -1 = don't update active match ordinal
1251   if (!count)
1252     active_match_ordinal = 0;
1253 
1254   render_view_->Send(new ViewHostMsg_Find_Reply(
1255       render_view_->GetRoutingID(), request_id, count,
1256       gfx::Rect(), active_match_ordinal, final_update));
1257 }
1258 
reportFindInPageSelection(int request_id,int active_match_ordinal,const blink::WebRect & selection_rect)1259 void RenderFrameImpl::reportFindInPageSelection(
1260     int request_id,
1261     int active_match_ordinal,
1262     const blink::WebRect& selection_rect) {
1263   render_view_->Send(new ViewHostMsg_Find_Reply(
1264       render_view_->GetRoutingID(), request_id, -1, selection_rect,
1265       active_match_ordinal, false));
1266 }
1267 
requestStorageQuota(blink::WebFrame * frame,blink::WebStorageQuotaType type,unsigned long long requested_size,blink::WebStorageQuotaCallbacks * callbacks)1268 void RenderFrameImpl::requestStorageQuota(
1269     blink::WebFrame* frame,
1270     blink::WebStorageQuotaType type,
1271     unsigned long long requested_size,
1272     blink::WebStorageQuotaCallbacks* callbacks) {
1273   DCHECK(frame);
1274   WebSecurityOrigin origin = frame->document().securityOrigin();
1275   if (origin.isUnique()) {
1276     // Unique origins cannot store persistent state.
1277     callbacks->didFail(blink::WebStorageQuotaErrorAbort);
1278     return;
1279   }
1280   ChildThread::current()->quota_dispatcher()->RequestStorageQuota(
1281       render_view_->GetRoutingID(), GURL(origin.toString()),
1282       static_cast<quota::StorageType>(type), requested_size,
1283       QuotaDispatcher::CreateWebStorageQuotaCallbacksWrapper(callbacks));
1284 }
1285 
willOpenSocketStream(blink::WebSocketStreamHandle * handle)1286 void RenderFrameImpl::willOpenSocketStream(
1287     blink::WebSocketStreamHandle* handle) {
1288   SocketStreamHandleData::AddToHandle(handle, render_view_->GetRoutingID());
1289 }
1290 
willStartUsingPeerConnectionHandler(blink::WebFrame * frame,blink::WebRTCPeerConnectionHandler * handler)1291 void RenderFrameImpl::willStartUsingPeerConnectionHandler(
1292     blink::WebFrame* frame,
1293     blink::WebRTCPeerConnectionHandler* handler) {
1294 #if defined(ENABLE_WEBRTC)
1295   static_cast<RTCPeerConnectionHandler*>(handler)->associateWithFrame(frame);
1296 #endif
1297 }
1298 
willCheckAndDispatchMessageEvent(blink::WebFrame * sourceFrame,blink::WebFrame * targetFrame,blink::WebSecurityOrigin targetOrigin,blink::WebDOMMessageEvent event)1299 bool RenderFrameImpl::willCheckAndDispatchMessageEvent(
1300     blink::WebFrame* sourceFrame,
1301     blink::WebFrame* targetFrame,
1302     blink::WebSecurityOrigin targetOrigin,
1303     blink::WebDOMMessageEvent event) {
1304   // TODO(nasko): Move implementation here. Needed state:
1305   // * is_swapped_out_
1306   return render_view_->willCheckAndDispatchMessageEvent(
1307       sourceFrame, targetFrame, targetOrigin, event);
1308 }
1309 
userAgentOverride(blink::WebFrame * frame,const blink::WebURL & url)1310 blink::WebString RenderFrameImpl::userAgentOverride(
1311     blink::WebFrame* frame,
1312     const blink::WebURL& url) {
1313   if (!render_view_->webview() || !render_view_->webview()->mainFrame() ||
1314       render_view_->renderer_preferences_.user_agent_override.empty()) {
1315     return blink::WebString();
1316   }
1317 
1318   // If we're in the middle of committing a load, the data source we need
1319   // will still be provisional.
1320   WebFrame* main_frame = render_view_->webview()->mainFrame();
1321   WebDataSource* data_source = NULL;
1322   if (main_frame->provisionalDataSource())
1323     data_source = main_frame->provisionalDataSource();
1324   else
1325     data_source = main_frame->dataSource();
1326 
1327   InternalDocumentStateData* internal_data = data_source ?
1328       InternalDocumentStateData::FromDataSource(data_source) : NULL;
1329   if (internal_data && internal_data->is_overriding_user_agent())
1330     return WebString::fromUTF8(
1331         render_view_->renderer_preferences_.user_agent_override);
1332   return blink::WebString();
1333 }
1334 
doNotTrackValue(blink::WebFrame * frame)1335 blink::WebString RenderFrameImpl::doNotTrackValue(blink::WebFrame* frame) {
1336   if (render_view_->renderer_preferences_.enable_do_not_track)
1337     return WebString::fromUTF8("1");
1338   return WebString();
1339 }
1340 
allowWebGL(blink::WebFrame * frame,bool default_value)1341 bool RenderFrameImpl::allowWebGL(blink::WebFrame* frame, bool default_value) {
1342   if (!default_value)
1343     return false;
1344 
1345   bool blocked = true;
1346   render_view_->Send(new ViewHostMsg_Are3DAPIsBlocked(
1347       render_view_->GetRoutingID(),
1348       GURL(frame->top()->document().securityOrigin().toString()),
1349       THREE_D_API_TYPE_WEBGL,
1350       &blocked));
1351   return !blocked;
1352 }
1353 
didLoseWebGLContext(blink::WebFrame * frame,int arb_robustness_status_code)1354 void RenderFrameImpl::didLoseWebGLContext(blink::WebFrame* frame,
1355                                           int arb_robustness_status_code) {
1356   render_view_->Send(new ViewHostMsg_DidLose3DContext(
1357       GURL(frame->top()->document().securityOrigin().toString()),
1358       THREE_D_API_TYPE_WEBGL,
1359       arb_robustness_status_code));
1360 }
1361 
AddObserver(RenderFrameObserver * observer)1362 void RenderFrameImpl::AddObserver(RenderFrameObserver* observer) {
1363   observers_.AddObserver(observer);
1364 }
1365 
RemoveObserver(RenderFrameObserver * observer)1366 void RenderFrameImpl::RemoveObserver(RenderFrameObserver* observer) {
1367   observer->RenderFrameGone();
1368   observers_.RemoveObserver(observer);
1369 }
1370 
1371 }  // namespace content
1372