Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(287)

Side by Side Diff: Source/core/page/CreateWindow.cpp

Issue 176763009: Have DOMWindow deal with references instead of pointers when possible (Closed) Base URL: svn://svn.chromium.org/blink/trunk
Patch Set: Rebase Created 6 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « Source/core/page/CreateWindow.h ('k') | Source/modules/mediasource/VideoPlaybackQuality.cpp » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 /* 1 /*
2 * Copyright (C) 2006, 2007, 2008, 2010 Apple Inc. All rights reserved. 2 * Copyright (C) 2006, 2007, 2008, 2010 Apple Inc. All rights reserved.
3 * Copyright (C) 2010 Nokia Corporation and/or its subsidiary(-ies) 3 * Copyright (C) 2010 Nokia Corporation and/or its subsidiary(-ies)
4 * 4 *
5 * Redistribution and use in source and binary forms, with or without 5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions 6 * modification, are permitted provided that the following conditions
7 * are met: 7 * are met:
8 * 1. Redistributions of source code must retain the above copyright 8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer. 9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright 10 * 2. Redistributions in binary form must reproduce the above copyright
(...skipping 26 matching lines...) Expand all
37 #include "core/page/FocusController.h" 37 #include "core/page/FocusController.h"
38 #include "core/page/Page.h" 38 #include "core/page/Page.h"
39 #include "core/page/WindowFeatures.h" 39 #include "core/page/WindowFeatures.h"
40 #include "platform/network/ResourceRequest.h" 40 #include "platform/network/ResourceRequest.h"
41 #include "platform/weborigin/KURL.h" 41 #include "platform/weborigin/KURL.h"
42 #include "platform/weborigin/SecurityOrigin.h" 42 #include "platform/weborigin/SecurityOrigin.h"
43 #include "platform/weborigin/SecurityPolicy.h" 43 #include "platform/weborigin/SecurityPolicy.h"
44 44
45 namespace WebCore { 45 namespace WebCore {
46 46
47 static LocalFrame* createWindow(LocalFrame* openerFrame, LocalFrame* lookupFrame , const FrameLoadRequest& request, const WindowFeatures& features, NavigationPol icy policy, ShouldSendReferrer shouldSendReferrer, bool& created) 47 static LocalFrame* createWindow(LocalFrame& openerFrame, LocalFrame& lookupFrame , const FrameLoadRequest& request, const WindowFeatures& features, NavigationPol icy policy, ShouldSendReferrer shouldSendReferrer, bool& created)
48 { 48 {
49 ASSERT(!features.dialog || request.frameName().isEmpty()); 49 ASSERT(!features.dialog || request.frameName().isEmpty());
50 50
51 if (!request.frameName().isEmpty() && request.frameName() != "_blank" && pol icy == NavigationPolicyIgnore) { 51 if (!request.frameName().isEmpty() && request.frameName() != "_blank" && pol icy == NavigationPolicyIgnore) {
52 if (LocalFrame* frame = lookupFrame->loader().findFrameForNavigation(req uest.frameName(), openerFrame->document())) { 52 if (LocalFrame* frame = lookupFrame.loader().findFrameForNavigation(requ est.frameName(), openerFrame.document())) {
53 if (request.frameName() != "_self") 53 if (request.frameName() != "_self")
54 frame->page()->focusController().setFocusedFrame(frame); 54 frame->page()->focusController().setFocusedFrame(frame);
55 created = false; 55 created = false;
56 return frame; 56 return frame;
57 } 57 }
58 } 58 }
59 59
60 // Sandboxed frames cannot open new auxiliary browsing contexts. 60 // Sandboxed frames cannot open new auxiliary browsing contexts.
61 if (openerFrame->document()->isSandboxed(SandboxPopups)) { 61 if (openerFrame.document()->isSandboxed(SandboxPopups)) {
62 // FIXME: This message should be moved off the console once a solution t o https://bugs.webkit.org/show_bug.cgi?id=103274 exists. 62 // FIXME: This message should be moved off the console once a solution t o https://bugs.webkit.org/show_bug.cgi?id=103274 exists.
63 openerFrame->document()->addConsoleMessage(SecurityMessageSource, ErrorM essageLevel, "Blocked opening '" + request.resourceRequest().url().elidedString( ) + "' in a new window because the request was made in a sandboxed frame whose ' allow-popups' permission is not set."); 63 openerFrame.document()->addConsoleMessage(SecurityMessageSource, ErrorMe ssageLevel, "Blocked opening '" + request.resourceRequest().url().elidedString() + "' in a new window because the request was made in a sandboxed frame whose 'a llow-popups' permission is not set.");
64 return 0; 64 return 0;
65 } 65 }
66 66
67 if (openerFrame->settings() && !openerFrame->settings()->supportsMultipleWin dows()) { 67 if (openerFrame.settings() && !openerFrame.settings()->supportsMultipleWindo ws()) {
68 created = false; 68 created = false;
69 return openerFrame->tree().top(); 69 return openerFrame.tree().top();
70 } 70 }
71 71
72 Page* oldPage = openerFrame->page(); 72 Page* oldPage = openerFrame.page();
73 if (!oldPage) 73 if (!oldPage)
74 return 0; 74 return 0;
75 75
76 Page* page = oldPage->chrome().client().createWindow(openerFrame, request, f eatures, policy, shouldSendReferrer); 76 Page* page = oldPage->chrome().client().createWindow(&openerFrame, request, features, policy, shouldSendReferrer);
77 if (!page) 77 if (!page)
78 return 0; 78 return 0;
79 FrameHost* host = &page->frameHost(); 79 FrameHost* host = &page->frameHost();
80 80
81 LocalFrame* frame = page->mainFrame(); 81 ASSERT(page->mainFrame());
82 LocalFrame& frame = *page->mainFrame();
82 83
83 frame->loader().forceSandboxFlags(openerFrame->document()->sandboxFlags()); 84 frame.loader().forceSandboxFlags(openerFrame.document()->sandboxFlags());
84 85
85 if (request.frameName() != "_blank") 86 if (request.frameName() != "_blank")
86 frame->tree().setName(request.frameName()); 87 frame.tree().setName(request.frameName());
87 88
88 host->chrome().setWindowFeatures(features); 89 host->chrome().setWindowFeatures(features);
89 90
90 // 'x' and 'y' specify the location of the window, while 'width' and 'height ' 91 // 'x' and 'y' specify the location of the window, while 'width' and 'height '
91 // specify the size of the viewport. We can only resize the window, so adjus t 92 // specify the size of the viewport. We can only resize the window, so adjus t
92 // for the difference between the window size and the viewport size. 93 // for the difference between the window size and the viewport size.
93 94
94 FloatRect windowRect = host->chrome().windowRect(); 95 FloatRect windowRect = host->chrome().windowRect();
95 FloatSize viewportSize = host->chrome().pageRect().size(); 96 FloatSize viewportSize = host->chrome().pageRect().size();
96 97
97 if (features.xSet) 98 if (features.xSet)
98 windowRect.setX(features.x); 99 windowRect.setX(features.x);
99 if (features.ySet) 100 if (features.ySet)
100 windowRect.setY(features.y); 101 windowRect.setY(features.y);
101 if (features.widthSet) 102 if (features.widthSet)
102 windowRect.setWidth(features.width + (windowRect.width() - viewportSize. width())); 103 windowRect.setWidth(features.width + (windowRect.width() - viewportSize. width()));
103 if (features.heightSet) 104 if (features.heightSet)
104 windowRect.setHeight(features.height + (windowRect.height() - viewportSi ze.height())); 105 windowRect.setHeight(features.height + (windowRect.height() - viewportSi ze.height()));
105 106
106 // Ensure non-NaN values, minimum size as well as being within valid screen area. 107 // Ensure non-NaN values, minimum size as well as being within valid screen area.
107 FloatRect newWindowRect = DOMWindow::adjustWindowRect(frame, windowRect); 108 FloatRect newWindowRect = DOMWindow::adjustWindowRect(frame, windowRect);
108 109
109 host->chrome().setWindowRect(newWindowRect); 110 host->chrome().setWindowRect(newWindowRect);
110 host->chrome().show(policy); 111 host->chrome().show(policy);
111 112
112 created = true; 113 created = true;
113 return frame; 114 return &frame;
114 } 115 }
115 116
116 LocalFrame* createWindow(const String& urlString, const AtomicString& frameName, const WindowFeatures& windowFeatures, 117 LocalFrame* createWindow(const String& urlString, const AtomicString& frameName, const WindowFeatures& windowFeatures,
117 DOMWindow* callingWindow, LocalFrame* firstFrame, LocalFrame* openerFrame) 118 DOMWindow& callingWindow, LocalFrame& firstFrame, LocalFrame& openerFrame)
118 { 119 {
119 LocalFrame* activeFrame = callingWindow->frame(); 120 LocalFrame* activeFrame = callingWindow.frame();
121 ASSERT(activeFrame);
120 122
121 KURL completedURL = urlString.isEmpty() ? KURL(ParsedURLString, emptyString( )) : firstFrame->document()->completeURL(urlString); 123 KURL completedURL = urlString.isEmpty() ? KURL(ParsedURLString, emptyString( )) : firstFrame.document()->completeURL(urlString);
122 if (!completedURL.isEmpty() && !completedURL.isValid()) { 124 if (!completedURL.isEmpty() && !completedURL.isValid()) {
123 // Don't expose client code to invalid URLs. 125 // Don't expose client code to invalid URLs.
124 callingWindow->printErrorMessage("Unable to open a window with invalid U RL '" + completedURL.string() + "'.\n"); 126 callingWindow.printErrorMessage("Unable to open a window with invalid UR L '" + completedURL.string() + "'.\n");
125 return 0; 127 return 0;
126 } 128 }
127 129
128 // For whatever reason, Firefox uses the first frame to determine the outgoi ngReferrer. We replicate that behavior here. 130 // For whatever reason, Firefox uses the first frame to determine the outgoi ngReferrer. We replicate that behavior here.
129 Referrer referrer(SecurityPolicy::generateReferrerHeader(firstFrame->documen t()->referrerPolicy(), completedURL, firstFrame->document()->outgoingReferrer()) , firstFrame->document()->referrerPolicy()); 131 Referrer referrer(SecurityPolicy::generateReferrerHeader(firstFrame.document ()->referrerPolicy(), completedURL, firstFrame.document()->outgoingReferrer()), firstFrame.document()->referrerPolicy());
130 132
131 ResourceRequest request(completedURL, referrer); 133 ResourceRequest request(completedURL, referrer);
132 FrameLoader::addHTTPOriginIfNeeded(request, AtomicString(firstFrame->documen t()->outgoingOrigin())); 134 FrameLoader::addHTTPOriginIfNeeded(request, AtomicString(firstFrame.document ()->outgoingOrigin()));
133 FrameLoadRequest frameRequest(callingWindow->document(), request, frameName) ; 135 FrameLoadRequest frameRequest(callingWindow.document(), request, frameName);
134 136
135 // We pass the opener frame for the lookupFrame in case the active frame is different from 137 // We pass the opener frame for the lookupFrame in case the active frame is different from
136 // the opener frame, and the name references a frame relative to the opener frame. 138 // the opener frame, and the name references a frame relative to the opener frame.
137 bool created; 139 bool created;
138 LocalFrame* newFrame = createWindow(activeFrame, openerFrame, frameRequest, windowFeatures, NavigationPolicyIgnore, MaybeSendReferrer, created); 140 LocalFrame* newFrame = createWindow(*activeFrame, openerFrame, frameRequest, windowFeatures, NavigationPolicyIgnore, MaybeSendReferrer, created);
139 if (!newFrame) 141 if (!newFrame)
140 return 0; 142 return 0;
141 143
142 newFrame->loader().setOpener(openerFrame); 144 newFrame->loader().setOpener(&openerFrame);
143 newFrame->page()->setOpenedByDOM(); 145 newFrame->page()->setOpenedByDOM();
144 146
145 if (newFrame->domWindow()->isInsecureScriptAccess(callingWindow, completedUR L)) 147 if (newFrame->domWindow()->isInsecureScriptAccess(callingWindow, completedUR L))
146 return newFrame; 148 return newFrame;
147 149
148 if (created) { 150 if (created) {
149 FrameLoadRequest request(callingWindow->document(), ResourceRequest(comp letedURL, referrer)); 151 FrameLoadRequest request(callingWindow.document(), ResourceRequest(compl etedURL, referrer));
150 newFrame->loader().load(request); 152 newFrame->loader().load(request);
151 } else if (!urlString.isEmpty()) { 153 } else if (!urlString.isEmpty()) {
152 newFrame->navigationScheduler().scheduleLocationChange(callingWindow->do cument(), completedURL.string(), referrer, false); 154 newFrame->navigationScheduler().scheduleLocationChange(callingWindow.doc ument(), completedURL.string(), referrer, false);
153 } 155 }
154 return newFrame; 156 return newFrame;
155 } 157 }
156 158
157 void createWindowForRequest(const FrameLoadRequest& request, LocalFrame* openerF rame, NavigationPolicy policy, ShouldSendReferrer shouldSendReferrer) 159 void createWindowForRequest(const FrameLoadRequest& request, LocalFrame& openerF rame, NavigationPolicy policy, ShouldSendReferrer shouldSendReferrer)
158 { 160 {
159 if (openerFrame->document()->pageDismissalEventBeingDispatched() != Document ::NoDismissal) 161 if (openerFrame.document()->pageDismissalEventBeingDispatched() != Document: :NoDismissal)
160 return; 162 return;
161 163
162 if (openerFrame->document() && openerFrame->document()->isSandboxed(SandboxP opups)) 164 if (openerFrame.document() && openerFrame.document()->isSandboxed(SandboxPop ups))
163 return; 165 return;
164 166
165 if (!DOMWindow::allowPopUp(openerFrame)) 167 if (!DOMWindow::allowPopUp(openerFrame))
166 return; 168 return;
167 169
168 if (policy == NavigationPolicyCurrentTab) 170 if (policy == NavigationPolicyCurrentTab)
169 policy = NavigationPolicyNewForegroundTab; 171 policy = NavigationPolicyNewForegroundTab;
170 172
171 WindowFeatures features; 173 WindowFeatures features;
172 bool created; 174 bool created;
173 LocalFrame* newFrame = createWindow(openerFrame, openerFrame, request, featu res, policy, shouldSendReferrer, created); 175 LocalFrame* newFrame = createWindow(openerFrame, openerFrame, request, featu res, policy, shouldSendReferrer, created);
174 if (!newFrame) 176 if (!newFrame)
175 return; 177 return;
176 newFrame->page()->setOpenedByDOM(); 178 newFrame->page()->setOpenedByDOM();
177 if (shouldSendReferrer == MaybeSendReferrer) { 179 if (shouldSendReferrer == MaybeSendReferrer) {
178 newFrame->loader().setOpener(openerFrame); 180 newFrame->loader().setOpener(&openerFrame);
179 newFrame->document()->setReferrerPolicy(openerFrame->document()->referre rPolicy()); 181 newFrame->document()->setReferrerPolicy(openerFrame.document()->referrer Policy());
180 } 182 }
181 FrameLoadRequest newRequest(0, request.resourceRequest()); 183 FrameLoadRequest newRequest(0, request.resourceRequest());
182 newRequest.setFormState(request.formState()); 184 newRequest.setFormState(request.formState());
183 newFrame->loader().load(newRequest); 185 newFrame->loader().load(newRequest);
184 } 186 }
185 187
186 } // namespace WebCore 188 } // namespace WebCore
OLDNEW
« no previous file with comments | « Source/core/page/CreateWindow.h ('k') | Source/modules/mediasource/VideoPlaybackQuality.cpp » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698