Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "android_webview/renderer/aw_render_view_ext.h" | 5 #include "android_webview/renderer/aw_render_view_ext.h" |
| 6 | 6 |
| 7 #include <string> | 7 #include <string> |
| 8 | 8 |
| 9 #include "android_webview/common/aw_hit_test_data.h" | 9 #include "android_webview/common/aw_hit_test_data.h" |
| 10 #include "android_webview/common/render_view_messages.h" | 10 #include "android_webview/common/render_view_messages.h" |
| (...skipping 16 matching lines...) Expand all Loading... | |
| 27 #include "third_party/WebKit/Source/WebKit/chromium/public/WebNode.h" | 27 #include "third_party/WebKit/Source/WebKit/chromium/public/WebNode.h" |
| 28 #include "third_party/WebKit/Source/WebKit/chromium/public/WebNodeList.h" | 28 #include "third_party/WebKit/Source/WebKit/chromium/public/WebNodeList.h" |
| 29 #include "third_party/WebKit/Source/WebKit/chromium/public/WebSecurityOrigin.h" | 29 #include "third_party/WebKit/Source/WebKit/chromium/public/WebSecurityOrigin.h" |
| 30 #include "third_party/WebKit/Source/WebKit/chromium/public/WebView.h" | 30 #include "third_party/WebKit/Source/WebKit/chromium/public/WebView.h" |
| 31 #include "third_party/skia/include/core/SkPicture.h" | 31 #include "third_party/skia/include/core/SkPicture.h" |
| 32 | 32 |
| 33 namespace android_webview { | 33 namespace android_webview { |
| 34 | 34 |
| 35 namespace { | 35 namespace { |
| 36 | 36 |
| 37 bool allowMixedContent(const WebKit::WebURL& url) { | |
|
joth
2013/06/13 19:16:28
nit: wrong Camelification
| |
| 38 // We treat non-standard schemes as "secure" in the WebView to allow them to | |
| 39 // be used for request interception. | |
| 40 // TODO(benm): Tighten this restriction by requiring embedders to register | |
| 41 // their custom schemes? See b/9420953. | |
| 42 GURL gurl(url); | |
| 43 return !gurl.IsStandard(); | |
| 44 } | |
| 45 | |
| 37 GURL GetAbsoluteUrl(const WebKit::WebNode& node, const string16& url_fragment) { | 46 GURL GetAbsoluteUrl(const WebKit::WebNode& node, const string16& url_fragment) { |
| 38 return GURL(node.document().completeURL(url_fragment)); | 47 return GURL(node.document().completeURL(url_fragment)); |
| 39 } | 48 } |
| 40 | 49 |
| 41 string16 GetHref(const WebKit::WebElement& element) { | 50 string16 GetHref(const WebKit::WebElement& element) { |
| 42 // Get the actual 'href' attribute, which might relative if valid or can | 51 // Get the actual 'href' attribute, which might relative if valid or can |
| 43 // possibly contain garbage otherwise, so not using absoluteLinkURL here. | 52 // possibly contain garbage otherwise, so not using absoluteLinkURL here. |
| 44 return element.getAttribute("href"); | 53 return element.getAttribute("href"); |
| 45 } | 54 } |
| 46 | 55 |
| (...skipping 128 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 175 if (enabled_per_settings) | 184 if (enabled_per_settings) |
| 176 return true; | 185 return true; |
| 177 | 186 |
| 178 // For compatibility, only blacklist network schemes instead of whitelisting. | 187 // For compatibility, only blacklist network schemes instead of whitelisting. |
| 179 const GURL url(image_url); | 188 const GURL url(image_url); |
| 180 return !(url.SchemeIs(chrome::kHttpScheme) || | 189 return !(url.SchemeIs(chrome::kHttpScheme) || |
| 181 url.SchemeIs(chrome::kHttpsScheme) || | 190 url.SchemeIs(chrome::kHttpsScheme) || |
| 182 url.SchemeIs(chrome::kFtpScheme)); | 191 url.SchemeIs(chrome::kFtpScheme)); |
| 183 } | 192 } |
| 184 | 193 |
| 194 bool AwRenderViewExt::allowDisplayingInsecureContent( | |
| 195 WebKit::WebFrame* frame, | |
| 196 bool enabled_per_settings, | |
| 197 const WebKit::WebSecurityOrigin& origin, | |
| 198 const WebKit::WebURL& url) { | |
| 199 return enabled_per_settings ? true : allowMixedContent(url); | |
| 200 } | |
| 201 | |
| 202 bool AwRenderViewExt::allowRunningInsecureContent( | |
| 203 WebKit::WebFrame* frame, | |
| 204 bool enabled_per_settings, | |
| 205 const WebKit::WebSecurityOrigin& origin, | |
| 206 const WebKit::WebURL& url) { | |
| 207 return enabled_per_settings ? true : allowMixedContent(url); | |
| 208 } | |
| 209 | |
| 185 void AwRenderViewExt::DidCommitProvisionalLoad(WebKit::WebFrame* frame, | 210 void AwRenderViewExt::DidCommitProvisionalLoad(WebKit::WebFrame* frame, |
| 186 bool is_new_navigation) { | 211 bool is_new_navigation) { |
| 187 content::DocumentState* document_state = | 212 content::DocumentState* document_state = |
| 188 content::DocumentState::FromDataSource(frame->dataSource()); | 213 content::DocumentState::FromDataSource(frame->dataSource()); |
| 189 if (document_state->can_load_local_resources()) { | 214 if (document_state->can_load_local_resources()) { |
| 190 WebKit::WebSecurityOrigin origin = frame->document().securityOrigin(); | 215 WebKit::WebSecurityOrigin origin = frame->document().securityOrigin(); |
| 191 origin.grantLoadLocalResources(); | 216 origin.grantLoadLocalResources(); |
| 192 } | 217 } |
| 193 } | 218 } |
| 194 | 219 |
| (...skipping 74 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 269 } | 294 } |
| 270 | 295 |
| 271 void AwRenderViewExt::OnSetInitialPageScale(double page_scale_factor) { | 296 void AwRenderViewExt::OnSetInitialPageScale(double page_scale_factor) { |
| 272 if (!render_view() || !render_view()->GetWebView()) | 297 if (!render_view() || !render_view()->GetWebView()) |
| 273 return; | 298 return; |
| 274 render_view()->GetWebView()->setInitialPageScaleOverride( | 299 render_view()->GetWebView()->setInitialPageScaleOverride( |
| 275 page_scale_factor); | 300 page_scale_factor); |
| 276 } | 301 } |
| 277 | 302 |
| 278 } // namespace android_webview | 303 } // namespace android_webview |
| OLD | NEW |