Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(192)

Side by Side Diff: third_party/WebKit/Source/core/loader/FrameLoader.cpp

Issue 1858533002: Introduce WebCachePolicy to merge cache policy enums (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: hiroshige review Created 4 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 /* 1 /*
2 * Copyright (C) 2006, 2007, 2008, 2009, 2010, 2011 Apple Inc. All rights reserv ed. 2 * Copyright (C) 2006, 2007, 2008, 2009, 2010, 2011 Apple Inc. All rights reserv ed.
3 * Copyright (C) 2008 Nokia Corporation and/or its subsidiary(-ies) 3 * Copyright (C) 2008 Nokia Corporation and/or its subsidiary(-ies)
4 * Copyright (C) 2008, 2009 Torch Mobile Inc. All rights reserved. (http://www.t orchmobile.com/) 4 * Copyright (C) 2008, 2009 Torch Mobile Inc. All rights reserved. (http://www.t orchmobile.com/)
5 * Copyright (C) 2008 Alp Toker <alp@atoker.com> 5 * Copyright (C) 2008 Alp Toker <alp@atoker.com>
6 * Copyright (C) Research In Motion Limited 2009. All rights reserved. 6 * Copyright (C) Research In Motion Limited 2009. All rights reserved.
7 * Copyright (C) 2011 Kris Jordan <krisjordan@gmail.com> 7 * Copyright (C) 2011 Kris Jordan <krisjordan@gmail.com>
8 * Copyright (C) 2011 Google Inc. All rights reserved. 8 * Copyright (C) 2011 Google Inc. All rights reserved.
9 * 9 *
10 * Redistribution and use in source and binary forms, with or without 10 * Redistribution and use in source and binary forms, with or without
(...skipping 74 matching lines...) Expand 10 before | Expand all | Expand 10 after
85 #include "platform/Logging.h" 85 #include "platform/Logging.h"
86 #include "platform/PluginScriptForbiddenScope.h" 86 #include "platform/PluginScriptForbiddenScope.h"
87 #include "platform/ScriptForbiddenScope.h" 87 #include "platform/ScriptForbiddenScope.h"
88 #include "platform/UserGestureIndicator.h" 88 #include "platform/UserGestureIndicator.h"
89 #include "platform/network/HTTPParsers.h" 89 #include "platform/network/HTTPParsers.h"
90 #include "platform/network/ResourceRequest.h" 90 #include "platform/network/ResourceRequest.h"
91 #include "platform/scroll/ScrollAnimatorBase.h" 91 #include "platform/scroll/ScrollAnimatorBase.h"
92 #include "platform/weborigin/SecurityOrigin.h" 92 #include "platform/weborigin/SecurityOrigin.h"
93 #include "platform/weborigin/SecurityPolicy.h" 93 #include "platform/weborigin/SecurityPolicy.h"
94 #include "platform/weborigin/Suborigin.h" 94 #include "platform/weborigin/Suborigin.h"
95 #include "public/platform/WebCachePolicy.h"
95 #include "public/platform/WebURLRequest.h" 96 #include "public/platform/WebURLRequest.h"
96 #include "wtf/TemporaryChange.h" 97 #include "wtf/TemporaryChange.h"
97 #include "wtf/text/CString.h" 98 #include "wtf/text/CString.h"
98 #include "wtf/text/WTFString.h" 99 #include "wtf/text/WTFString.h"
99 100
100 using blink::WebURLRequest; 101 using blink::WebURLRequest;
101 102
102 namespace blink { 103 namespace blink {
103 104
104 using namespace HTMLNames; 105 using namespace HTMLNames;
105 106
106 bool isBackForwardLoadType(FrameLoadType type) 107 bool isBackForwardLoadType(FrameLoadType type)
107 { 108 {
108 return type == FrameLoadTypeBackForward || type == FrameLoadTypeInitialHisto ryLoad; 109 return type == FrameLoadTypeBackForward || type == FrameLoadTypeInitialHisto ryLoad;
109 } 110 }
110 111
111 static bool needsHistoryItemRestore(FrameLoadType type) 112 static bool needsHistoryItemRestore(FrameLoadType type)
112 { 113 {
113 return type == FrameLoadTypeBackForward || type == FrameLoadTypeReload 114 return type == FrameLoadTypeBackForward || type == FrameLoadTypeReload
114 || type == FrameLoadTypeReloadBypassingCache; 115 || type == FrameLoadTypeReloadBypassingCache;
115 } 116 }
116 117
117 // static 118 // static
118 ResourceRequest FrameLoader::resourceRequestFromHistoryItem(HistoryItem* item, 119 ResourceRequest FrameLoader::resourceRequestFromHistoryItem(HistoryItem* item, W ebCachePolicy cachePolicy)
119 ResourceRequestCachePolicy cachePolicy)
120 { 120 {
121 RefPtr<EncodedFormData> formData = item->formData(); 121 RefPtr<EncodedFormData> formData = item->formData();
122 ResourceRequest request(item->url()); 122 ResourceRequest request(item->url());
123 request.setHTTPReferrer(item->referrer()); 123 request.setHTTPReferrer(item->referrer());
124 request.setCachePolicy(cachePolicy); 124 request.setCachePolicy(cachePolicy);
125 if (formData) { 125 if (formData) {
126 request.setHTTPMethod(HTTPNames::POST); 126 request.setHTTPMethod(HTTPNames::POST);
127 request.setHTTPBody(formData); 127 request.setHTTPBody(formData);
128 request.setHTTPContentType(item->formContentType()); 128 request.setHTTPContentType(item->formContentType());
129 RefPtr<SecurityOrigin> securityOrigin = SecurityOrigin::createFromString (item->referrer().referrer); 129 RefPtr<SecurityOrigin> securityOrigin = SecurityOrigin::createFromString (item->referrer().referrer);
130 request.addHTTPOriginIfNeeded(securityOrigin); 130 request.addHTTPOriginIfNeeded(securityOrigin);
131 } 131 }
132 return request; 132 return request;
133 } 133 }
134 134
135 ResourceRequest FrameLoader::resourceRequestForReload(FrameLoadType frameLoadTyp e, 135 ResourceRequest FrameLoader::resourceRequestForReload(FrameLoadType frameLoadTyp e,
136 const KURL& overrideURL, ClientRedirectPolicy clientRedirectPolicy) 136 const KURL& overrideURL, ClientRedirectPolicy clientRedirectPolicy)
137 { 137 {
138 ASSERT(frameLoadType == FrameLoadTypeReload || frameLoadType == FrameLoadTyp eReloadBypassingCache); 138 ASSERT(frameLoadType == FrameLoadTypeReload || frameLoadType == FrameLoadTyp eReloadBypassingCache);
139 ResourceRequestCachePolicy cachePolicy = frameLoadType == FrameLoadTypeReloa dBypassingCache ? BypassingCache : ValidatingCacheData; 139 WebCachePolicy cachePolicy = frameLoadType == FrameLoadTypeReloadBypassingCa che ? WebCachePolicy::BypassingCache : WebCachePolicy::ValidatingCacheData;
140 if (!m_currentItem) 140 if (!m_currentItem)
141 return ResourceRequest(); 141 return ResourceRequest();
142 ResourceRequest request = resourceRequestFromHistoryItem(m_currentItem.get() , cachePolicy); 142 ResourceRequest request = resourceRequestFromHistoryItem(m_currentItem.get() , cachePolicy);
143 143
144 // ClientRedirectPolicy is an indication that this load was triggered by 144 // ClientRedirectPolicy is an indication that this load was triggered by
145 // some direct interaction with the page. If this reload is not a client 145 // some direct interaction with the page. If this reload is not a client
146 // redirect, we should reuse the referrer from the original load of the 146 // redirect, we should reuse the referrer from the original load of the
147 // current document. If this reload is a client redirect (e.g., location.rel oad()), 147 // current document. If this reload is a client redirect (e.g., location.rel oad()),
148 // it was initiated by something in the current document and should 148 // it was initiated by something in the current document and should
149 // therefore show the current document's url as the referrer. 149 // therefore show the current document's url as the referrer.
(...skipping 608 matching lines...) Expand 10 before | Expand all | Expand 10 after
758 } 758 }
759 759
760 FrameLoadType FrameLoader::determineFrameLoadType(const FrameLoadRequest& reques t) 760 FrameLoadType FrameLoader::determineFrameLoadType(const FrameLoadRequest& reques t)
761 { 761 {
762 if (m_frame->tree().parent() && !m_stateMachine.committedFirstRealDocumentLo ad()) 762 if (m_frame->tree().parent() && !m_stateMachine.committedFirstRealDocumentLo ad())
763 return FrameLoadTypeInitialInChildFrame; 763 return FrameLoadTypeInitialInChildFrame;
764 if (!m_frame->tree().parent() && !client()->backForwardLength()) 764 if (!m_frame->tree().parent() && !client()->backForwardLength())
765 return FrameLoadTypeStandard; 765 return FrameLoadTypeStandard;
766 if (m_provisionalDocumentLoader && request.substituteData().failingURL() == m_provisionalDocumentLoader->url() && m_loadType == FrameLoadTypeBackForward) 766 if (m_provisionalDocumentLoader && request.substituteData().failingURL() == m_provisionalDocumentLoader->url() && m_loadType == FrameLoadTypeBackForward)
767 return FrameLoadTypeBackForward; 767 return FrameLoadTypeBackForward;
768 if (request.resourceRequest().getCachePolicy() == ValidatingCacheData) 768 if (request.resourceRequest().getCachePolicy() == WebCachePolicy::Validating CacheData)
769 return FrameLoadTypeReload; 769 return FrameLoadTypeReload;
770 if (request.resourceRequest().getCachePolicy() == BypassingCache) 770 if (request.resourceRequest().getCachePolicy() == WebCachePolicy::BypassingC ache)
771 return FrameLoadTypeReloadBypassingCache; 771 return FrameLoadTypeReloadBypassingCache;
772 // From the HTML5 spec for location.assign(): 772 // From the HTML5 spec for location.assign():
773 // "If the browsing context's session history contains only one Document, 773 // "If the browsing context's session history contains only one Document,
774 // and that was the about:blank Document created when the browsing context 774 // and that was the about:blank Document created when the browsing context
775 // was created, then the navigation must be done with replacement enabled. " 775 // was created, then the navigation must be done with replacement enabled. "
776 if (request.replacesCurrentItem() 776 if (request.replacesCurrentItem()
777 || (!m_stateMachine.committedMultipleRealLoads() 777 || (!m_stateMachine.committedMultipleRealLoads()
778 && equalIgnoringCase(m_frame->document()->url(), blankURL()))) 778 && equalIgnoringCase(m_frame->document()->url(), blankURL())))
779 return FrameLoadTypeReplaceCurrentItem; 779 return FrameLoadTypeReplaceCurrentItem;
780 780
(...skipping 782 matching lines...) Expand 10 before | Expand all | Expand 10 after
1563 // FIXME: We need a way to propagate insecure requests policy flags to 1563 // FIXME: We need a way to propagate insecure requests policy flags to
1564 // out-of-process frames. For now, we'll always use default behavior. 1564 // out-of-process frames. For now, we'll always use default behavior.
1565 if (!parentFrame->isLocalFrame()) 1565 if (!parentFrame->isLocalFrame())
1566 return nullptr; 1566 return nullptr;
1567 1567
1568 ASSERT(toLocalFrame(parentFrame)->document()); 1568 ASSERT(toLocalFrame(parentFrame)->document());
1569 return toLocalFrame(parentFrame)->document()->insecureNavigationsToUpgrade() ; 1569 return toLocalFrame(parentFrame)->document()->insecureNavigationsToUpgrade() ;
1570 } 1570 }
1571 1571
1572 } // namespace blink 1572 } // namespace blink
OLDNEW
« no previous file with comments | « third_party/WebKit/Source/core/loader/FrameLoader.h ('k') | third_party/WebKit/Source/core/loader/ImageLoader.cpp » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698