summaryrefslogtreecommitdiff
path: root/chromium/content/renderer/render_frame_impl.cc
diff options
context:
space:
mode:
Diffstat (limited to 'chromium/content/renderer/render_frame_impl.cc')
-rw-r--r--chromium/content/renderer/render_frame_impl.cc900
1 files changed, 900 insertions, 0 deletions
diff --git a/chromium/content/renderer/render_frame_impl.cc b/chromium/content/renderer/render_frame_impl.cc
new file mode 100644
index 00000000000..92bfb3d6a3c
--- /dev/null
+++ b/chromium/content/renderer/render_frame_impl.cc
@@ -0,0 +1,900 @@
+// Copyright 2013 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include "content/renderer/render_frame_impl.h"
+
+#include "base/strings/utf_string_conversions.h"
+#include "base/time/time.h"
+#include "content/child/appcache/appcache_dispatcher.h"
+#include "content/child/fileapi/file_system_dispatcher.h"
+#include "content/child/fileapi/webfilesystem_callback_adapters.h"
+#include "content/child/quota_dispatcher.h"
+#include "content/child/request_extra_data.h"
+#include "content/common/socket_stream_handle_data.h"
+#include "content/common/view_messages.h"
+#include "content/public/common/content_constants.h"
+#include "content/public/common/url_constants.h"
+#include "content/public/renderer/content_renderer_client.h"
+#include "content/public/renderer/document_state.h"
+#include "content/public/renderer/navigation_state.h"
+#include "content/public/renderer/password_form_conversion_utils.h"
+#include "content/renderer/browser_plugin/browser_plugin.h"
+#include "content/renderer/browser_plugin/browser_plugin_manager.h"
+#include "content/renderer/internal_document_state_data.h"
+#include "content/renderer/media/rtc_peer_connection_handler.h"
+#include "content/renderer/render_thread_impl.h"
+#include "content/renderer/render_view_impl.h"
+#include "content/renderer/renderer_webapplicationcachehost_impl.h"
+#include "content/renderer/websharedworker_proxy.h"
+#include "net/base/net_errors.h"
+#include "net/http/http_util.h"
+#include "third_party/WebKit/public/platform/WebString.h"
+#include "third_party/WebKit/public/platform/WebURL.h"
+#include "third_party/WebKit/public/platform/WebURLError.h"
+#include "third_party/WebKit/public/platform/WebURLResponse.h"
+#include "third_party/WebKit/public/platform/WebVector.h"
+#include "third_party/WebKit/public/web/WebDocument.h"
+#include "third_party/WebKit/public/web/WebFileSystemCallbacks.h"
+#include "third_party/WebKit/public/web/WebFrame.h"
+#include "third_party/WebKit/public/web/WebNavigationPolicy.h"
+#include "third_party/WebKit/public/web/WebPlugin.h"
+#include "third_party/WebKit/public/web/WebPluginParams.h"
+#include "third_party/WebKit/public/web/WebSearchableFormData.h"
+#include "third_party/WebKit/public/web/WebSecurityOrigin.h"
+#include "third_party/WebKit/public/web/WebStorageQuotaCallbacks.h"
+#include "third_party/WebKit/public/web/WebUserGestureIndicator.h"
+#include "third_party/WebKit/public/web/WebView.h"
+#include "webkit/child/weburlresponse_extradata_impl.h"
+
+using WebKit::WebDataSource;
+using WebKit::WebDocument;
+using WebKit::WebFileSystemCallbacks;
+using WebKit::WebFrame;
+using WebKit::WebNavigationPolicy;
+using WebKit::WebPluginParams;
+using WebKit::WebReferrerPolicy;
+using WebKit::WebSearchableFormData;
+using WebKit::WebSecurityOrigin;
+using WebKit::WebStorageQuotaCallbacks;
+using WebKit::WebString;
+using WebKit::WebURL;
+using WebKit::WebURLError;
+using WebKit::WebURLRequest;
+using WebKit::WebURLResponse;
+using WebKit::WebUserGestureIndicator;
+using WebKit::WebVector;
+using WebKit::WebView;
+using base::Time;
+using base::TimeDelta;
+using webkit_glue::WebURLResponseExtraDataImpl;
+
+namespace content {
+
+static RenderFrameImpl* (*g_create_render_frame_impl)(RenderViewImpl*, int32) =
+ NULL;
+
+// static
+RenderFrameImpl* RenderFrameImpl::Create(RenderViewImpl* render_view,
+ int32 routing_id) {
+ DCHECK(routing_id != MSG_ROUTING_NONE);
+
+ RenderFrameImpl* render_frame = NULL;
+ if (g_create_render_frame_impl)
+ render_frame = g_create_render_frame_impl(render_view, routing_id);
+ else
+ render_frame = new RenderFrameImpl(render_view, routing_id);
+
+ return render_frame;
+}
+
+// static
+void RenderFrameImpl::InstallCreateHook(
+ RenderFrameImpl* (*create_render_frame_impl)(RenderViewImpl*, int32)) {
+ CHECK(!g_create_render_frame_impl);
+ g_create_render_frame_impl = create_render_frame_impl;
+}
+
+// RenderFrameImpl ----------------------------------------------------------
+RenderFrameImpl::RenderFrameImpl(RenderViewImpl* render_view, int routing_id)
+ : render_view_(render_view),
+ routing_id_(routing_id) {
+}
+
+RenderFrameImpl::~RenderFrameImpl() {
+}
+
+int RenderFrameImpl::GetRoutingID() const {
+ // TODO(nasko): Until we register RenderFrameHost in the browser process as
+ // a listener, we must route all messages to the RenderViewHost, so use the
+ // routing id of the RenderView for now.
+ return render_view_->GetRoutingID();
+}
+
+bool RenderFrameImpl::Send(IPC::Message* message) {
+ // TODO(nasko): Move away from using the RenderView's Send method once we
+ // have enough infrastructure and state to make the right checks here.
+ return render_view_->Send(message);
+}
+
+bool RenderFrameImpl::OnMessageReceived(const IPC::Message& msg) {
+ // Pass the message up to the RenderView, until we have enough
+ // infrastructure to start processing messages in this object.
+ return render_view_->OnMessageReceived(msg);
+}
+
+// WebKit::WebFrameClient implementation -------------------------------------
+
+WebKit::WebPlugin* RenderFrameImpl::createPlugin(
+ WebKit::WebFrame* frame,
+ const WebKit::WebPluginParams& params) {
+ WebKit::WebPlugin* plugin = NULL;
+ if (GetContentClient()->renderer()->OverrideCreatePlugin(
+ render_view_, frame, params, &plugin)) {
+ return plugin;
+ }
+
+#if defined(ENABLE_PLUGINS)
+ if (UTF16ToASCII(params.mimeType) == kBrowserPluginMimeType) {
+ return render_view_->GetBrowserPluginManager()->CreateBrowserPlugin(
+ render_view_, frame, params);
+ }
+
+ WebPluginInfo info;
+ std::string mime_type;
+ bool found = render_view_->GetPluginInfo(
+ params.url, frame->top()->document().url(), params.mimeType.utf8(),
+ &info, &mime_type);
+ if (!found)
+ return NULL;
+
+ WebPluginParams params_to_use = params;
+ params_to_use.mimeType = WebString::fromUTF8(mime_type);
+ return render_view_->CreatePlugin(frame, info, params_to_use);
+#else
+ return NULL;
+#endif // defined(ENABLE_PLUGINS)
+}
+
+WebKit::WebSharedWorker* RenderFrameImpl::createSharedWorker(
+ WebKit::WebFrame* frame,
+ const WebKit::WebURL& url,
+ const WebKit::WebString& name,
+ unsigned long long document_id) {
+ int route_id = MSG_ROUTING_NONE;
+ bool exists = false;
+ bool url_mismatch = false;
+ ViewHostMsg_CreateWorker_Params params;
+ params.url = url;
+ params.name = name;
+ params.document_id = document_id;
+ params.render_view_route_id = GetRoutingID();
+ params.route_id = MSG_ROUTING_NONE;
+ params.script_resource_appcache_id = 0;
+ Send(new ViewHostMsg_LookupSharedWorker(
+ params, &exists, &route_id, &url_mismatch));
+ if (url_mismatch) {
+ return NULL;
+ } else {
+ return new WebSharedWorkerProxy(RenderThreadImpl::current(),
+ document_id,
+ exists,
+ route_id,
+ GetRoutingID());
+ }
+}
+
+WebKit::WebMediaPlayer* RenderFrameImpl::createMediaPlayer(
+ WebKit::WebFrame* frame,
+ const WebKit::WebURL& url,
+ WebKit::WebMediaPlayerClient* client) {
+ // TODO(nasko): Moving the implementation here involves moving a few media
+ // related client objects here or referencing them in the RenderView. Needs
+ // more work to understand where the proper place for those objects is.
+ return render_view_->createMediaPlayer(frame, url, client);
+}
+
+WebKit::WebApplicationCacheHost* RenderFrameImpl::createApplicationCacheHost(
+ WebKit::WebFrame* frame,
+ WebKit::WebApplicationCacheHostClient* client) {
+ if (!frame || !frame->view())
+ return NULL;
+ return new RendererWebApplicationCacheHostImpl(
+ RenderViewImpl::FromWebView(frame->view()), client,
+ RenderThreadImpl::current()->appcache_dispatcher()->backend_proxy());
+}
+
+WebKit::WebCookieJar* RenderFrameImpl::cookieJar(WebKit::WebFrame* frame) {
+ return render_view_->cookieJar(frame);
+}
+
+void RenderFrameImpl::didAccessInitialDocument(WebKit::WebFrame* frame) {
+ render_view_->didAccessInitialDocument(frame);
+}
+
+void RenderFrameImpl::didCreateFrame(WebKit::WebFrame* parent,
+ WebKit::WebFrame* child) {
+ Send(new ViewHostMsg_FrameAttached(GetRoutingID(), parent->identifier(),
+ child->identifier(), UTF16ToUTF8(child->assignedName())));
+}
+
+void RenderFrameImpl::didDisownOpener(WebKit::WebFrame* frame) {
+ render_view_->didDisownOpener(frame);
+}
+
+void RenderFrameImpl::frameDetached(WebKit::WebFrame* frame) {
+ int64 parent_frame_id = -1;
+ if (frame->parent())
+ parent_frame_id = frame->parent()->identifier();
+
+ Send(new ViewHostMsg_FrameDetached(GetRoutingID(), parent_frame_id,
+ frame->identifier()));
+
+ // Call back to RenderViewImpl for observers to be notified.
+ // TODO(nasko): Remove once we have RenderFrameObserver.
+ render_view_->frameDetached(frame);
+}
+
+void RenderFrameImpl::willClose(WebKit::WebFrame* frame) {
+ // Call back to RenderViewImpl for observers to be notified.
+ // TODO(nasko): Remove once we have RenderFrameObserver.
+ render_view_->willClose(frame);
+}
+
+void RenderFrameImpl::didChangeName(WebKit::WebFrame* frame,
+ const WebKit::WebString& name) {
+ if (!render_view_->renderer_preferences_.report_frame_name_changes)
+ return;
+
+ Send(new ViewHostMsg_UpdateFrameName(GetRoutingID(),
+ frame->identifier(),
+ !frame->parent(),
+ UTF16ToUTF8(name)));
+}
+
+void RenderFrameImpl::loadURLExternally(WebKit::WebFrame* frame,
+ const WebKit::WebURLRequest& request,
+ WebKit::WebNavigationPolicy policy) {
+ loadURLExternally(frame, request, policy, WebString());
+}
+
+void RenderFrameImpl::loadURLExternally(
+ WebKit::WebFrame* frame,
+ const WebKit::WebURLRequest& request,
+ WebKit::WebNavigationPolicy policy,
+ const WebKit::WebString& suggested_name) {
+ Referrer referrer(RenderViewImpl::GetReferrerFromRequest(frame, request));
+ if (policy == WebKit::WebNavigationPolicyDownload) {
+ Send(new ViewHostMsg_DownloadUrl(GetRoutingID(), request.url(), referrer,
+ suggested_name));
+ } else {
+ render_view_->OpenURL(frame, request.url(), referrer, policy);
+ }
+}
+
+WebKit::WebNavigationPolicy RenderFrameImpl::decidePolicyForNavigation(
+ WebKit::WebFrame* frame,
+ const WebKit::WebURLRequest& request,
+ WebKit::WebNavigationType type,
+ WebKit::WebNavigationPolicy default_policy,
+ bool is_redirect) {
+ return render_view_->decidePolicyForNavigation(
+ frame, request, type, default_policy, is_redirect);
+}
+
+void RenderFrameImpl::willSendSubmitEvent(WebKit::WebFrame* frame,
+ const WebKit::WebFormElement& form) {
+ // Some login forms have onSubmit handlers that put a hash of the password
+ // into a hidden field and then clear the password. (Issue 28910.)
+ // This method gets called before any of those handlers run, so save away
+ // a copy of the password in case it gets lost.
+ DocumentState* document_state =
+ DocumentState::FromDataSource(frame->dataSource());
+ document_state->set_password_form_data(CreatePasswordForm(form));
+}
+
+void RenderFrameImpl::willSubmitForm(WebKit::WebFrame* frame,
+ const WebKit::WebFormElement& form) {
+ DocumentState* document_state =
+ DocumentState::FromDataSource(frame->provisionalDataSource());
+ NavigationState* navigation_state = document_state->navigation_state();
+ InternalDocumentStateData* internal_data =
+ InternalDocumentStateData::FromDocumentState(document_state);
+
+ if (PageTransitionCoreTypeIs(navigation_state->transition_type(),
+ PAGE_TRANSITION_LINK)) {
+ navigation_state->set_transition_type(PAGE_TRANSITION_FORM_SUBMIT);
+ }
+
+ // Save these to be processed when the ensuing navigation is committed.
+ WebSearchableFormData web_searchable_form_data(form);
+ internal_data->set_searchable_form_url(web_searchable_form_data.url());
+ internal_data->set_searchable_form_encoding(
+ web_searchable_form_data.encoding().utf8());
+ scoped_ptr<PasswordForm> password_form_data =
+ CreatePasswordForm(form);
+
+ // In order to save the password that the user actually typed and not one
+ // that may have gotten transformed by the site prior to submit, recover it
+ // from the form contents already stored by |willSendSubmitEvent| into the
+ // dataSource's NavigationState (as opposed to the provisionalDataSource's,
+ // which is what we're storing into now.)
+ if (password_form_data) {
+ DocumentState* old_document_state =
+ DocumentState::FromDataSource(frame->dataSource());
+ if (old_document_state) {
+ PasswordForm* old_form_data = old_document_state->password_form_data();
+ if (old_form_data && old_form_data->action == password_form_data->action)
+ password_form_data->password_value = old_form_data->password_value;
+ }
+ }
+
+ document_state->set_password_form_data(password_form_data.Pass());
+
+ // Call back to RenderViewImpl for observers to be notified.
+ // TODO(nasko): Remove once we have RenderFrameObserver.
+ render_view_->willSubmitForm(frame, form);
+}
+
+void RenderFrameImpl::didCreateDataSource(WebKit::WebFrame* frame,
+ WebKit::WebDataSource* datasource) {
+ // TODO(nasko): Move implementation here. Needed state:
+ // * pending_navigation_params_
+ // * webview
+ // Needed methods:
+ // * PopulateDocumentStateFromPending
+ // * CreateNavigationStateFromPending
+ render_view_->didCreateDataSource(frame, datasource);
+}
+
+void RenderFrameImpl::didStartProvisionalLoad(WebKit::WebFrame* frame) {
+ // TODO(nasko): Move implementation here. Needed state:
+ // * is_swapped_out_
+ // * navigation_gesture_
+ // * completed_client_redirect_src_
+ render_view_->didStartProvisionalLoad(frame);
+}
+
+void RenderFrameImpl::didReceiveServerRedirectForProvisionalLoad(
+ WebKit::WebFrame* frame) {
+ // TODO(nasko): Move implementation here. Needed state:
+ // * page_id_
+ render_view_->didReceiveServerRedirectForProvisionalLoad(frame);
+}
+
+void RenderFrameImpl::didFailProvisionalLoad(
+ WebKit::WebFrame* frame,
+ const WebKit::WebURLError& error) {
+ // TODO(nasko): Move implementation here. Needed state:
+ // * page_id_
+ // * pending_navigation_params_
+ // Needed methods
+ // * MaybeLoadAlternateErrorPage
+ // * LoadNavigationErrorPage
+ render_view_->didFailProvisionalLoad(frame, error);
+}
+
+void RenderFrameImpl::didCommitProvisionalLoad(WebKit::WebFrame* frame,
+ bool is_new_navigation) {
+ // TODO(nasko): Move implementation here. Needed state:
+ // * page_id_
+ // * next_page_id_
+ // * history_list_offset_
+ // * history_list_length_
+ // * history_page_ids_
+ // Needed methods
+ // * webview
+ // * UpdateSessionHistory
+ // * GetLoadingUrl
+ render_view_->didCommitProvisionalLoad(frame, is_new_navigation);
+}
+
+void RenderFrameImpl::didClearWindowObject(WebKit::WebFrame* frame) {
+ // TODO(nasko): Move implementation here. Needed state:
+ // * enabled_bindings_
+ // * dom_automation_controller_
+ // * stats_collection_controller_
+ render_view_->didClearWindowObject(frame);
+}
+
+void RenderFrameImpl::didCreateDocumentElement(WebKit::WebFrame* frame) {
+ // Notify the browser about non-blank documents loading in the top frame.
+ GURL url = frame->document().url();
+ if (url.is_valid() && url.spec() != kAboutBlankURL) {
+ // TODO(nasko): Check if webview()->mainFrame() is the same as the
+ // frame->tree()->top().
+ if (frame == render_view_->webview()->mainFrame())
+ Send(new ViewHostMsg_DocumentAvailableInMainFrame(GetRoutingID()));
+ }
+
+ // Call back to RenderViewImpl for observers to be notified.
+ // TODO(nasko): Remove once we have RenderFrameObserver.
+ render_view_->didCreateDocumentElement(frame);
+}
+
+void RenderFrameImpl::didReceiveTitle(WebKit::WebFrame* frame,
+ const WebKit::WebString& title,
+ WebKit::WebTextDirection direction) {
+ // TODO(nasko): Investigate wheather implementation should move here.
+ render_view_->didReceiveTitle(frame, title, direction);
+}
+
+void RenderFrameImpl::didChangeIcon(WebKit::WebFrame* frame,
+ WebKit::WebIconURL::Type icon_type) {
+ // TODO(nasko): Investigate wheather implementation should move here.
+ render_view_->didChangeIcon(frame, icon_type);
+}
+
+void RenderFrameImpl::didFinishDocumentLoad(WebKit::WebFrame* frame) {
+ // TODO(nasko): Move implementation here. No state needed, just observers
+ // notification in before updating encoding.
+ render_view_->didFinishDocumentLoad(frame);
+}
+
+void RenderFrameImpl::didHandleOnloadEvents(WebKit::WebFrame* frame) {
+ // TODO(nasko): Move implementation here. Needed state:
+ // * page_id_
+ render_view_->didHandleOnloadEvents(frame);
+}
+
+void RenderFrameImpl::didFailLoad(WebKit::WebFrame* frame,
+ const WebKit::WebURLError& error) {
+ // TODO(nasko): Move implementation here. No state needed.
+ render_view_->didFailLoad(frame, error);
+}
+
+void RenderFrameImpl::didFinishLoad(WebKit::WebFrame* frame) {
+ // TODO(nasko): Move implementation here. No state needed, just observers
+ // notification before sending message to the browser process.
+ render_view_->didFinishLoad(frame);
+}
+
+void RenderFrameImpl::didNavigateWithinPage(WebKit::WebFrame* frame,
+ bool is_new_navigation) {
+ // TODO(nasko): Move implementation here. No state needed, just observers
+ // notification before sending message to the browser process.
+ render_view_->didNavigateWithinPage(frame, is_new_navigation);
+}
+
+void RenderFrameImpl::didUpdateCurrentHistoryItem(WebKit::WebFrame* frame) {
+ // TODO(nasko): Move implementation here. Needed methods:
+ // * StartNavStateSyncTimerIfNecessary
+ render_view_->didUpdateCurrentHistoryItem(frame);
+}
+
+void RenderFrameImpl::willRequestAfterPreconnect(
+ WebKit::WebFrame* frame,
+ WebKit::WebURLRequest& request) {
+ WebKit::WebReferrerPolicy referrer_policy = WebKit::WebReferrerPolicyDefault;
+ WebString custom_user_agent;
+
+ if (request.extraData()) {
+ // This will only be called before willSendRequest, so only ExtraData
+ // members we have to copy here is on WebURLRequestExtraDataImpl.
+ webkit_glue::WebURLRequestExtraDataImpl* old_extra_data =
+ static_cast<webkit_glue::WebURLRequestExtraDataImpl*>(
+ request.extraData());
+
+ referrer_policy = old_extra_data->referrer_policy();
+ custom_user_agent = old_extra_data->custom_user_agent();
+ }
+
+ bool was_after_preconnect_request = true;
+ // The args after |was_after_preconnect_request| are not used, and set to
+ // correct values at |willSendRequest|.
+ request.setExtraData(new webkit_glue::WebURLRequestExtraDataImpl(
+ referrer_policy, custom_user_agent, was_after_preconnect_request));
+}
+
+void RenderFrameImpl::willSendRequest(
+ WebKit::WebFrame* frame,
+ unsigned identifier,
+ WebKit::WebURLRequest& request,
+ const WebKit::WebURLResponse& redirect_response) {
+ // The request my be empty during tests.
+ if (request.url().isEmpty())
+ return;
+
+ WebFrame* top_frame = frame->top();
+ if (!top_frame)
+ top_frame = frame;
+ WebDataSource* provisional_data_source = top_frame->provisionalDataSource();
+ WebDataSource* top_data_source = top_frame->dataSource();
+ WebDataSource* data_source =
+ provisional_data_source ? provisional_data_source : top_data_source;
+
+ PageTransition transition_type = PAGE_TRANSITION_LINK;
+ DocumentState* document_state = DocumentState::FromDataSource(data_source);
+ DCHECK(document_state);
+ InternalDocumentStateData* internal_data =
+ InternalDocumentStateData::FromDocumentState(document_state);
+ NavigationState* navigation_state = document_state->navigation_state();
+ transition_type = navigation_state->transition_type();
+
+ GURL request_url(request.url());
+ GURL new_url;
+ if (GetContentClient()->renderer()->WillSendRequest(
+ frame,
+ transition_type,
+ request_url,
+ request.firstPartyForCookies(),
+ &new_url)) {
+ request.setURL(WebURL(new_url));
+ }
+
+ if (internal_data->is_cache_policy_override_set())
+ request.setCachePolicy(internal_data->cache_policy_override());
+
+ WebKit::WebReferrerPolicy referrer_policy;
+ if (internal_data->is_referrer_policy_set()) {
+ referrer_policy = internal_data->referrer_policy();
+ internal_data->clear_referrer_policy();
+ } else {
+ referrer_policy = frame->document().referrerPolicy();
+ }
+
+ // The request's extra data may indicate that we should set a custom user
+ // agent. This needs to be done here, after WebKit is through with setting the
+ // user agent on its own.
+ WebString custom_user_agent;
+ bool was_after_preconnect_request = false;
+ if (request.extraData()) {
+ webkit_glue::WebURLRequestExtraDataImpl* old_extra_data =
+ static_cast<webkit_glue::WebURLRequestExtraDataImpl*>(
+ request.extraData());
+ custom_user_agent = old_extra_data->custom_user_agent();
+ was_after_preconnect_request =
+ old_extra_data->was_after_preconnect_request();
+
+ if (!custom_user_agent.isNull()) {
+ if (custom_user_agent.isEmpty())
+ request.clearHTTPHeaderField("User-Agent");
+ else
+ request.setHTTPHeaderField("User-Agent", custom_user_agent);
+ }
+ }
+
+ request.setExtraData(
+ new RequestExtraData(referrer_policy,
+ custom_user_agent,
+ was_after_preconnect_request,
+ (frame == top_frame),
+ frame->identifier(),
+ frame->parent() == top_frame,
+ frame->parent() ? frame->parent()->identifier() : -1,
+ navigation_state->allow_download(),
+ transition_type,
+ navigation_state->transferred_request_child_id(),
+ navigation_state->transferred_request_request_id()));
+
+ DocumentState* top_document_state =
+ DocumentState::FromDataSource(top_data_source);
+ if (top_document_state) {
+ // TODO(gavinp): separate out prefetching and prerender field trials
+ // if the rel=prerender rel type is sticking around.
+ if (request.targetType() == WebURLRequest::TargetIsPrefetch)
+ top_document_state->set_was_prefetcher(true);
+
+ if (was_after_preconnect_request)
+ top_document_state->set_was_after_preconnect_request(true);
+ }
+
+ // This is an instance where we embed a copy of the routing id
+ // into the data portion of the message. This can cause problems if we
+ // don't register this id on the browser side, since the download manager
+ // expects to find a RenderViewHost based off the id.
+ request.setRequestorID(GetRoutingID());
+ request.setHasUserGesture(WebUserGestureIndicator::isProcessingUserGesture());
+
+ if (!navigation_state->extra_headers().empty()) {
+ for (net::HttpUtil::HeadersIterator i(
+ navigation_state->extra_headers().begin(),
+ navigation_state->extra_headers().end(), "\n");
+ i.GetNext(); ) {
+ request.setHTTPHeaderField(WebString::fromUTF8(i.name()),
+ WebString::fromUTF8(i.values()));
+ }
+ }
+
+ if (!render_view_->renderer_preferences_.enable_referrers)
+ request.clearHTTPHeaderField("Referer");
+}
+
+void RenderFrameImpl::didReceiveResponse(
+ WebKit::WebFrame* frame,
+ unsigned identifier,
+ const WebKit::WebURLResponse& response) {
+ // Only do this for responses that correspond to a provisional data source
+ // of the top-most frame. If we have a provisional data source, then we
+ // can't have any sub-resources yet, so we know that this response must
+ // correspond to a frame load.
+ if (!frame->provisionalDataSource() || frame->parent())
+ return;
+
+ // If we are in view source mode, then just let the user see the source of
+ // the server's error page.
+ if (frame->isViewSourceModeEnabled())
+ return;
+
+ DocumentState* document_state =
+ DocumentState::FromDataSource(frame->provisionalDataSource());
+ int http_status_code = response.httpStatusCode();
+
+ // Record page load flags.
+ WebURLResponseExtraDataImpl* extra_data =
+ RenderViewImpl::GetExtraDataFromResponse(response);
+ if (extra_data) {
+ document_state->set_was_fetched_via_spdy(
+ extra_data->was_fetched_via_spdy());
+ document_state->set_was_npn_negotiated(
+ extra_data->was_npn_negotiated());
+ document_state->set_npn_negotiated_protocol(
+ extra_data->npn_negotiated_protocol());
+ document_state->set_was_alternate_protocol_available(
+ extra_data->was_alternate_protocol_available());
+ document_state->set_connection_info(
+ extra_data->connection_info());
+ document_state->set_was_fetched_via_proxy(
+ extra_data->was_fetched_via_proxy());
+ }
+ InternalDocumentStateData* internal_data =
+ InternalDocumentStateData::FromDocumentState(document_state);
+ internal_data->set_http_status_code(http_status_code);
+ // Whether or not the http status code actually corresponds to an error is
+ // only checked when the page is done loading, if |use_error_page| is
+ // still true.
+ internal_data->set_use_error_page(true);
+}
+
+void RenderFrameImpl::didFinishResourceLoad(WebKit::WebFrame* frame,
+ unsigned identifier) {
+ // TODO(nasko): Move implementation here. Needed state:
+ // * devtools_agent_
+ // Needed methods:
+ // * LoadNavigationErrorPage
+ render_view_->didFinishResourceLoad(frame, identifier);
+}
+
+void RenderFrameImpl::didLoadResourceFromMemoryCache(
+ WebKit::WebFrame* frame,
+ const WebKit::WebURLRequest& request,
+ const WebKit::WebURLResponse& response) {
+ // The recipients of this message have no use for data: URLs: they don't
+ // affect the page's insecure content list and are not in the disk cache. To
+ // prevent large (1M+) data: URLs from crashing in the IPC system, we simply
+ // filter them out here.
+ GURL url(request.url());
+ if (url.SchemeIs("data"))
+ return;
+
+ // Let the browser know we loaded a resource from the memory cache. This
+ // message is needed to display the correct SSL indicators.
+ Send(new ViewHostMsg_DidLoadResourceFromMemoryCache(
+ GetRoutingID(),
+ url,
+ response.securityInfo(),
+ request.httpMethod().utf8(),
+ response.mimeType().utf8(),
+ ResourceType::FromTargetType(request.targetType())));
+}
+
+void RenderFrameImpl::didDisplayInsecureContent(WebKit::WebFrame* frame) {
+ Send(new ViewHostMsg_DidDisplayInsecureContent(GetRoutingID()));
+}
+
+void RenderFrameImpl::didRunInsecureContent(
+ WebKit::WebFrame* frame,
+ const WebKit::WebSecurityOrigin& origin,
+ const WebKit::WebURL& target) {
+ Send(new ViewHostMsg_DidRunInsecureContent(
+ GetRoutingID(),
+ origin.toString().utf8(),
+ target));
+}
+
+void RenderFrameImpl::didExhaustMemoryAvailableForScript(
+ WebKit::WebFrame* frame) {
+ Send(new ViewHostMsg_JSOutOfMemory(GetRoutingID()));
+}
+
+void RenderFrameImpl::didCreateScriptContext(WebKit::WebFrame* frame,
+ v8::Handle<v8::Context> context,
+ int extension_group,
+ int world_id) {
+ GetContentClient()->renderer()->DidCreateScriptContext(
+ frame, context, extension_group, world_id);
+}
+
+void RenderFrameImpl::willReleaseScriptContext(WebKit::WebFrame* frame,
+ v8::Handle<v8::Context> context,
+ int world_id) {
+ GetContentClient()->renderer()->WillReleaseScriptContext(
+ frame, context, world_id);
+}
+
+void RenderFrameImpl::didFirstVisuallyNonEmptyLayout(WebKit::WebFrame* frame) {
+ render_view_->didFirstVisuallyNonEmptyLayout(frame);
+}
+
+void RenderFrameImpl::didChangeContentsSize(WebKit::WebFrame* frame,
+ const WebKit::WebSize& size) {
+ // TODO(nasko): Move implementation here. Needed state:
+ // * cached_has_main_frame_horizontal_scrollbar_
+ // * cached_has_main_frame_vertical_scrollbar_
+ render_view_->didChangeContentsSize(frame, size);
+}
+
+void RenderFrameImpl::didChangeScrollOffset(WebKit::WebFrame* frame) {
+ // TODO(nasko): Move implementation here. Needed methods:
+ // * StartNavStateSyncTimerIfNecessary
+ render_view_->didChangeScrollOffset(frame);
+}
+
+void RenderFrameImpl::willInsertBody(WebKit::WebFrame* frame) {
+ if (!frame->parent())
+ Send(new ViewHostMsg_WillInsertBody(GetRoutingID()));
+}
+
+void RenderFrameImpl::reportFindInPageMatchCount(int request_id,
+ int count,
+ bool final_update) {
+ int active_match_ordinal = -1; // -1 = don't update active match ordinal
+ if (!count)
+ active_match_ordinal = 0;
+
+ Send(new ViewHostMsg_Find_Reply(GetRoutingID(),
+ request_id,
+ count,
+ gfx::Rect(),
+ active_match_ordinal,
+ final_update));
+}
+
+void RenderFrameImpl::reportFindInPageSelection(
+ int request_id,
+ int active_match_ordinal,
+ const WebKit::WebRect& selection_rect) {
+ Send(new ViewHostMsg_Find_Reply(GetRoutingID(),
+ request_id,
+ -1,
+ selection_rect,
+ active_match_ordinal,
+ false));
+}
+
+void RenderFrameImpl::openFileSystem(
+ WebKit::WebFrame* frame,
+ WebKit::WebFileSystemType type,
+ long long size,
+ bool create,
+ WebKit::WebFileSystemCallbacks* callbacks) {
+ DCHECK(callbacks);
+
+ WebSecurityOrigin origin = frame->document().securityOrigin();
+ if (origin.isUnique()) {
+ // Unique origins cannot store persistent state.
+ callbacks->didFail(WebKit::WebFileErrorAbort);
+ return;
+ }
+
+ ChildThread::current()->file_system_dispatcher()->OpenFileSystem(
+ GURL(origin.toString()), static_cast<fileapi::FileSystemType>(type),
+ size, create,
+ base::Bind(&OpenFileSystemCallbackAdapter, callbacks),
+ base::Bind(&FileStatusCallbackAdapter, callbacks));
+}
+
+void RenderFrameImpl::deleteFileSystem(
+ WebKit::WebFrame* frame,
+ WebKit::WebFileSystemType type,
+ WebKit::WebFileSystemCallbacks* callbacks) {
+ DCHECK(callbacks);
+
+ WebSecurityOrigin origin = frame->document().securityOrigin();
+ if (origin.isUnique()) {
+ // Unique origins cannot store persistent state.
+ callbacks->didSucceed();
+ return;
+ }
+
+ ChildThread::current()->file_system_dispatcher()->DeleteFileSystem(
+ GURL(origin.toString()),
+ static_cast<fileapi::FileSystemType>(type),
+ base::Bind(&FileStatusCallbackAdapter, callbacks));
+}
+
+void RenderFrameImpl::requestStorageQuota(
+ WebKit::WebFrame* frame,
+ WebKit::WebStorageQuotaType type,
+ unsigned long long requested_size,
+ WebKit::WebStorageQuotaCallbacks* callbacks) {
+ DCHECK(frame);
+ WebSecurityOrigin origin = frame->document().securityOrigin();
+ if (origin.isUnique()) {
+ // Unique origins cannot store persistent state.
+ callbacks->didFail(WebKit::WebStorageQuotaErrorAbort);
+ return;
+ }
+ ChildThread::current()->quota_dispatcher()->RequestStorageQuota(
+ GetRoutingID(), GURL(origin.toString()),
+ static_cast<quota::StorageType>(type), requested_size,
+ QuotaDispatcher::CreateWebStorageQuotaCallbacksWrapper(callbacks));
+}
+
+void RenderFrameImpl::willOpenSocketStream(
+ WebKit::WebSocketStreamHandle* handle) {
+ SocketStreamHandleData::AddToHandle(handle, GetRoutingID());
+}
+
+void RenderFrameImpl::willStartUsingPeerConnectionHandler(
+ WebKit::WebFrame* frame,
+ WebKit::WebRTCPeerConnectionHandler* handler) {
+#if defined(ENABLE_WEBRTC)
+ static_cast<RTCPeerConnectionHandler*>(handler)->associateWithFrame(frame);
+#endif
+}
+
+bool RenderFrameImpl::willCheckAndDispatchMessageEvent(
+ WebKit::WebFrame* sourceFrame,
+ WebKit::WebFrame* targetFrame,
+ WebKit::WebSecurityOrigin targetOrigin,
+ WebKit::WebDOMMessageEvent event) {
+ // TODO(nasko): Move implementation here. Needed state:
+ // * is_swapped_out_
+ return render_view_->willCheckAndDispatchMessageEvent(
+ sourceFrame, targetFrame, targetOrigin, event);
+}
+
+WebKit::WebString RenderFrameImpl::userAgentOverride(
+ WebKit::WebFrame* frame,
+ const WebKit::WebURL& url) {
+ if (!render_view_->webview() || !render_view_->webview()->mainFrame() ||
+ render_view_->renderer_preferences_.user_agent_override.empty()) {
+ return WebKit::WebString();
+ }
+
+ // If we're in the middle of committing a load, the data source we need
+ // will still be provisional.
+ WebFrame* main_frame = render_view_->webview()->mainFrame();
+ WebDataSource* data_source = NULL;
+ if (main_frame->provisionalDataSource())
+ data_source = main_frame->provisionalDataSource();
+ else
+ data_source = main_frame->dataSource();
+
+ InternalDocumentStateData* internal_data = data_source ?
+ InternalDocumentStateData::FromDataSource(data_source) : NULL;
+ if (internal_data && internal_data->is_overriding_user_agent())
+ return WebString::fromUTF8(
+ render_view_->renderer_preferences_.user_agent_override);
+ return WebKit::WebString();
+}
+
+WebKit::WebString RenderFrameImpl::doNotTrackValue(WebKit::WebFrame* frame) {
+ if (render_view_->renderer_preferences_.enable_do_not_track)
+ return WebString::fromUTF8("1");
+ return WebString();
+}
+
+bool RenderFrameImpl::allowWebGL(WebKit::WebFrame* frame, bool default_value) {
+ if (!default_value)
+ return false;
+
+ bool blocked = true;
+ Send(new ViewHostMsg_Are3DAPIsBlocked(
+ GetRoutingID(),
+ GURL(frame->top()->document().securityOrigin().toString()),
+ THREE_D_API_TYPE_WEBGL,
+ &blocked));
+ return !blocked;
+}
+
+void RenderFrameImpl::didLoseWebGLContext(WebKit::WebFrame* frame,
+ int arb_robustness_status_code) {
+ Send(new ViewHostMsg_DidLose3DContext(
+ GURL(frame->top()->document().securityOrigin().toString()),
+ THREE_D_API_TYPE_WEBGL,
+ arb_robustness_status_code));
+}
+
+} // namespace content