| Index: chrome/browser/guest_view/web_view/web_view_guest.cc
|
| diff --git a/chrome/browser/guest_view/web_view/web_view_guest.cc b/chrome/browser/guest_view/web_view/web_view_guest.cc
|
| deleted file mode 100644
|
| index 5365e1b265fb50976b2caef71cac275e4283a5a9..0000000000000000000000000000000000000000
|
| --- a/chrome/browser/guest_view/web_view/web_view_guest.cc
|
| +++ /dev/null
|
| @@ -1,1023 +0,0 @@
|
| -// Copyright 2014 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "chrome/browser/guest_view/web_view/web_view_guest.h"
|
| -
|
| -#include "base/message_loop/message_loop.h"
|
| -#include "base/strings/stringprintf.h"
|
| -#include "chrome/browser/chrome_notification_types.h"
|
| -#include "chrome/browser/extensions/api/web_request/web_request_api.h"
|
| -#include "chrome/browser/extensions/api/webview/webview_api.h"
|
| -#include "chrome/browser/extensions/chrome_extension_web_contents_observer.h"
|
| -#include "chrome/browser/extensions/extension_renderer_state.h"
|
| -#include "chrome/browser/extensions/menu_manager.h"
|
| -#include "chrome/browser/extensions/script_executor.h"
|
| -#include "chrome/browser/favicon/favicon_tab_helper.h"
|
| -#include "chrome/browser/guest_view/guest_view_constants.h"
|
| -#include "chrome/browser/guest_view/web_view/web_view_constants.h"
|
| -#include "chrome/browser/guest_view/web_view/web_view_permission_types.h"
|
| -#include "chrome/common/chrome_version_info.h"
|
| -#include "content/public/browser/browser_thread.h"
|
| -#include "content/public/browser/geolocation_permission_context.h"
|
| -#include "content/public/browser/native_web_keyboard_event.h"
|
| -#include "content/public/browser/navigation_entry.h"
|
| -#include "content/public/browser/notification_details.h"
|
| -#include "content/public/browser/notification_service.h"
|
| -#include "content/public/browser/notification_source.h"
|
| -#include "content/public/browser/notification_types.h"
|
| -#include "content/public/browser/render_process_host.h"
|
| -#include "content/public/browser/resource_request_details.h"
|
| -#include "content/public/browser/site_instance.h"
|
| -#include "content/public/browser/storage_partition.h"
|
| -#include "content/public/browser/user_metrics.h"
|
| -#include "content/public/browser/web_contents.h"
|
| -#include "content/public/browser/web_contents_delegate.h"
|
| -#include "content/public/common/media_stream_request.h"
|
| -#include "content/public/common/page_zoom.h"
|
| -#include "content/public/common/result_codes.h"
|
| -#include "content/public/common/stop_find_action.h"
|
| -#include "extensions/common/constants.h"
|
| -#include "net/base/net_errors.h"
|
| -#include "third_party/WebKit/public/web/WebFindOptions.h"
|
| -
|
| -#if defined(ENABLE_PLUGINS)
|
| -#include "chrome/browser/guest_view/web_view/plugin_permission_helper.h"
|
| -#endif
|
| -
|
| -#if defined(OS_CHROMEOS)
|
| -#include "chrome/browser/chromeos/accessibility/accessibility_manager.h"
|
| -#endif
|
| -
|
| -using base::UserMetricsAction;
|
| -using content::WebContents;
|
| -
|
| -namespace {
|
| -
|
| -static std::string TerminationStatusToString(base::TerminationStatus status) {
|
| - switch (status) {
|
| - case base::TERMINATION_STATUS_NORMAL_TERMINATION:
|
| - return "normal";
|
| - case base::TERMINATION_STATUS_ABNORMAL_TERMINATION:
|
| - case base::TERMINATION_STATUS_STILL_RUNNING:
|
| - return "abnormal";
|
| - case base::TERMINATION_STATUS_PROCESS_WAS_KILLED:
|
| - return "killed";
|
| - case base::TERMINATION_STATUS_PROCESS_CRASHED:
|
| -#if defined(OS_ANDROID)
|
| - case base::TERMINATION_STATUS_OOM_PROTECTED:
|
| -#endif
|
| - return "crashed";
|
| - case base::TERMINATION_STATUS_MAX_ENUM:
|
| - break;
|
| - }
|
| - NOTREACHED() << "Unknown Termination Status.";
|
| - return "unknown";
|
| -}
|
| -
|
| -static std::string PermissionTypeToString(BrowserPluginPermissionType type) {
|
| - switch (type) {
|
| - case BROWSER_PLUGIN_PERMISSION_TYPE_NEW_WINDOW:
|
| - return webview::kPermissionTypeNewWindow;
|
| - case BROWSER_PLUGIN_PERMISSION_TYPE_UNKNOWN:
|
| - NOTREACHED();
|
| - break;
|
| - default: {
|
| - WebViewPermissionType webview = static_cast<WebViewPermissionType>(type);
|
| - switch (webview) {
|
| - case WEB_VIEW_PERMISSION_TYPE_DOWNLOAD:
|
| - return webview::kPermissionTypeDownload;
|
| - case WEB_VIEW_PERMISSION_TYPE_GEOLOCATION:
|
| - return webview::kPermissionTypeGeolocation;
|
| - case WEB_VIEW_PERMISSION_TYPE_JAVASCRIPT_DIALOG:
|
| - return webview::kPermissionTypeDialog;
|
| - case WEB_VIEW_PERMISSION_TYPE_LOAD_PLUGIN:
|
| - return webview::kPermissionTypeLoadPlugin;
|
| - case WEB_VIEW_PERMISSION_TYPE_MEDIA:
|
| - return webview::kPermissionTypeMedia;
|
| - case WEB_VIEW_PERMISSION_TYPE_POINTER_LOCK:
|
| - return webview::kPermissionTypePointerLock;
|
| - }
|
| - NOTREACHED();
|
| - }
|
| - }
|
| - return std::string();
|
| -}
|
| -
|
| -void RemoveWebViewEventListenersOnIOThread(
|
| - void* profile,
|
| - const std::string& extension_id,
|
| - int embedder_process_id,
|
| - int view_instance_id) {
|
| - DCHECK(content::BrowserThread::CurrentlyOn(content::BrowserThread::IO));
|
| - ExtensionWebRequestEventRouter::GetInstance()->RemoveWebViewEventListeners(
|
| - profile,
|
| - extension_id,
|
| - embedder_process_id,
|
| - view_instance_id);
|
| -}
|
| -
|
| -void AttachWebViewHelpers(WebContents* contents) {
|
| - FaviconTabHelper::CreateForWebContents(contents);
|
| - extensions::ChromeExtensionWebContentsObserver::CreateForWebContents(
|
| - contents);
|
| -#if defined(ENABLE_PLUGINS)
|
| - PluginPermissionHelper::CreateForWebContents(contents);
|
| -#endif
|
| -}
|
| -
|
| -} // namespace
|
| -
|
| -WebViewGuest::WebViewGuest(WebContents* guest_web_contents,
|
| - const std::string& extension_id)
|
| - : GuestView<WebViewGuest>(guest_web_contents, extension_id),
|
| - WebContentsObserver(guest_web_contents),
|
| - script_executor_(new extensions::ScriptExecutor(guest_web_contents,
|
| - &script_observers_)),
|
| - next_permission_request_id_(0),
|
| - is_overriding_user_agent_(false),
|
| - pending_reload_on_attachment_(false),
|
| - main_frame_id_(0),
|
| - chromevox_injected_(false),
|
| - find_helper_(this),
|
| - javascript_dialog_helper_(this) {
|
| - notification_registrar_.Add(
|
| - this, content::NOTIFICATION_LOAD_COMPLETED_MAIN_FRAME,
|
| - content::Source<WebContents>(guest_web_contents));
|
| -
|
| - notification_registrar_.Add(
|
| - this, content::NOTIFICATION_RESOURCE_RECEIVED_REDIRECT,
|
| - content::Source<WebContents>(guest_web_contents));
|
| -
|
| -#if defined(OS_CHROMEOS)
|
| - chromeos::AccessibilityManager* accessibility_manager =
|
| - chromeos::AccessibilityManager::Get();
|
| - CHECK(accessibility_manager);
|
| - accessibility_subscription_ = accessibility_manager->RegisterCallback(
|
| - base::Bind(&WebViewGuest::OnAccessibilityStatusChanged,
|
| - base::Unretained(this)));
|
| -#endif
|
| -
|
| - AttachWebViewHelpers(guest_web_contents);
|
| -}
|
| -
|
| -// static
|
| -const std::string& WebViewGuest::Type = "webview";
|
| -
|
| -// static.
|
| -int WebViewGuest::GetViewInstanceId(WebContents* contents) {
|
| - WebViewGuest* guest = FromWebContents(contents);
|
| - if (!guest)
|
| - return guestview::kInstanceIDNone;
|
| -
|
| - return guest->view_instance_id();
|
| -}
|
| -
|
| -// static
|
| -void WebViewGuest::RecordUserInitiatedUMA(const PermissionResponseInfo& info,
|
| - bool allow) {
|
| - if (allow) {
|
| - // Note that |allow| == true means the embedder explicitly allowed the
|
| - // request. For some requests they might still fail. An example of such
|
| - // scenario would be: an embedder allows geolocation request but doesn't
|
| - // have geolocation access on its own.
|
| - switch (info.permission_type) {
|
| - case BROWSER_PLUGIN_PERMISSION_TYPE_NEW_WINDOW:
|
| - content::RecordAction(
|
| - UserMetricsAction("BrowserPlugin.PermissionAllow.NewWindow"));
|
| - break;
|
| - case BROWSER_PLUGIN_PERMISSION_TYPE_UNKNOWN:
|
| - break;
|
| - default: {
|
| - WebViewPermissionType webview_permission_type =
|
| - static_cast<WebViewPermissionType>(info.permission_type);
|
| - switch (webview_permission_type) {
|
| - case WEB_VIEW_PERMISSION_TYPE_DOWNLOAD:
|
| - content::RecordAction(
|
| - UserMetricsAction("WebView.PermissionAllow.Download"));
|
| - break;
|
| - case WEB_VIEW_PERMISSION_TYPE_GEOLOCATION:
|
| - content::RecordAction(
|
| - UserMetricsAction("WebView.PermissionAllow.Geolocation"));
|
| - break;
|
| - case WEB_VIEW_PERMISSION_TYPE_JAVASCRIPT_DIALOG:
|
| - content::RecordAction(
|
| - UserMetricsAction("WebView.PermissionAllow.JSDialog"));
|
| - break;
|
| - case WEB_VIEW_PERMISSION_TYPE_LOAD_PLUGIN:
|
| - content::RecordAction(
|
| - UserMetricsAction("WebView.Guest.PermissionAllow.PluginLoad"));
|
| - case WEB_VIEW_PERMISSION_TYPE_MEDIA:
|
| - content::RecordAction(
|
| - UserMetricsAction("WebView.PermissionAllow.Media"));
|
| - break;
|
| - case WEB_VIEW_PERMISSION_TYPE_POINTER_LOCK:
|
| - content::RecordAction(
|
| - UserMetricsAction("WebView.PermissionAllow.PointerLock"));
|
| - break;
|
| - default:
|
| - break;
|
| - }
|
| - }
|
| - }
|
| - } else {
|
| - switch (info.permission_type) {
|
| - case BROWSER_PLUGIN_PERMISSION_TYPE_NEW_WINDOW:
|
| - content::RecordAction(
|
| - UserMetricsAction("BrowserPlugin.PermissionDeny.NewWindow"));
|
| - break;
|
| - case BROWSER_PLUGIN_PERMISSION_TYPE_UNKNOWN:
|
| - break;
|
| - default: {
|
| - WebViewPermissionType webview_permission_type =
|
| - static_cast<WebViewPermissionType>(info.permission_type);
|
| - switch (webview_permission_type) {
|
| - case WEB_VIEW_PERMISSION_TYPE_DOWNLOAD:
|
| - content::RecordAction(
|
| - UserMetricsAction("WebView.PermissionDeny.Download"));
|
| - break;
|
| - case WEB_VIEW_PERMISSION_TYPE_GEOLOCATION:
|
| - content::RecordAction(
|
| - UserMetricsAction("WebView.PermissionDeny.Geolocation"));
|
| - break;
|
| - case WEB_VIEW_PERMISSION_TYPE_JAVASCRIPT_DIALOG:
|
| - content::RecordAction(
|
| - UserMetricsAction("WebView.PermissionDeny.JSDialog"));
|
| - break;
|
| - case WEB_VIEW_PERMISSION_TYPE_LOAD_PLUGIN:
|
| - content::RecordAction(
|
| - UserMetricsAction("WebView.Guest.PermissionDeny.PluginLoad"));
|
| - case WEB_VIEW_PERMISSION_TYPE_MEDIA:
|
| - content::RecordAction(
|
| - UserMetricsAction("WebView.PermissionDeny.Media"));
|
| - break;
|
| - case WEB_VIEW_PERMISSION_TYPE_POINTER_LOCK:
|
| - content::RecordAction(
|
| - UserMetricsAction("WebView.PermissionDeny.PointerLock"));
|
| - break;
|
| - default:
|
| - break;
|
| - }
|
| - }
|
| - }
|
| - }
|
| -}
|
| -
|
| -void WebViewGuest::Attach(WebContents* embedder_web_contents,
|
| - const base::DictionaryValue& args) {
|
| - std::string user_agent_override;
|
| - if (args.GetString(webview::kParameterUserAgentOverride,
|
| - &user_agent_override)) {
|
| - SetUserAgentOverride(user_agent_override);
|
| - } else {
|
| - SetUserAgentOverride("");
|
| - }
|
| -
|
| - GuestViewBase::Attach(embedder_web_contents, args);
|
| -
|
| - AddWebViewToExtensionRendererState();
|
| -}
|
| -
|
| -void WebViewGuest::AddMessageToConsole(int32 level,
|
| - const base::string16& message,
|
| - int32 line_no,
|
| - const base::string16& source_id) {
|
| - scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue());
|
| - // Log levels are from base/logging.h: LogSeverity.
|
| - args->SetInteger(webview::kLevel, level);
|
| - args->SetString(webview::kMessage, message);
|
| - args->SetInteger(webview::kLine, line_no);
|
| - args->SetString(webview::kSourceId, source_id);
|
| - DispatchEvent(
|
| - new GuestViewBase::Event(webview::kEventConsoleMessage, args.Pass()));
|
| -}
|
| -
|
| -void WebViewGuest::Close() {
|
| - scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue());
|
| - DispatchEvent(new GuestViewBase::Event(webview::kEventClose, args.Pass()));
|
| -}
|
| -
|
| -void WebViewGuest::DidAttach() {
|
| - if (pending_reload_on_attachment_) {
|
| - pending_reload_on_attachment_ = false;
|
| - guest_web_contents()->GetController().Reload(false);
|
| - }
|
| -}
|
| -
|
| -void WebViewGuest::EmbedderDestroyed() {
|
| - // TODO(fsamuel): WebRequest event listeners for <webview> should survive
|
| - // reparenting of a <webview> within a single embedder. Right now, we keep
|
| - // around the browser state for the listener for the lifetime of the embedder.
|
| - // Ideally, the lifetime of the listeners should match the lifetime of the
|
| - // <webview> DOM node. Once http://crbug.com/156219 is resolved we can move
|
| - // the call to RemoveWebViewEventListenersOnIOThread back to
|
| - // WebViewGuest::WebContentsDestroyed.
|
| - content::BrowserThread::PostTask(
|
| - content::BrowserThread::IO,
|
| - FROM_HERE,
|
| - base::Bind(
|
| - &RemoveWebViewEventListenersOnIOThread,
|
| - browser_context(), embedder_extension_id(),
|
| - embedder_render_process_id(),
|
| - view_instance_id()));
|
| -}
|
| -
|
| -void WebViewGuest::FindReply(int request_id,
|
| - int number_of_matches,
|
| - const gfx::Rect& selection_rect,
|
| - int active_match_ordinal,
|
| - bool final_update) {
|
| - find_helper_.FindReply(request_id, number_of_matches, selection_rect,
|
| - active_match_ordinal, final_update);
|
| -}
|
| -
|
| -void WebViewGuest::GuestProcessGone(base::TerminationStatus status) {
|
| - // Cancel all find sessions in progress.
|
| - find_helper_.CancelAllFindSessions();
|
| -
|
| - scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue());
|
| - args->SetInteger(webview::kProcessId,
|
| - guest_web_contents()->GetRenderProcessHost()->GetID());
|
| - args->SetString(webview::kReason, TerminationStatusToString(status));
|
| - DispatchEvent(new GuestViewBase::Event(webview::kEventExit, args.Pass()));
|
| -}
|
| -
|
| -bool WebViewGuest::HandleKeyboardEvent(
|
| - const content::NativeWebKeyboardEvent& event) {
|
| - if (event.type != blink::WebInputEvent::RawKeyDown)
|
| - return false;
|
| -
|
| -#if defined(OS_MACOSX)
|
| - if (event.modifiers != blink::WebInputEvent::MetaKey)
|
| - return false;
|
| -
|
| - if (event.windowsKeyCode == ui::VKEY_OEM_4) {
|
| - Go(-1);
|
| - return true;
|
| - }
|
| -
|
| - if (event.windowsKeyCode == ui::VKEY_OEM_6) {
|
| - Go(1);
|
| - return true;
|
| - }
|
| -#else
|
| - if (event.windowsKeyCode == ui::VKEY_BROWSER_BACK) {
|
| - Go(-1);
|
| - return true;
|
| - }
|
| -
|
| - if (event.windowsKeyCode == ui::VKEY_BROWSER_FORWARD) {
|
| - Go(1);
|
| - return true;
|
| - }
|
| -#endif
|
| - return false;
|
| -}
|
| -
|
| -bool WebViewGuest::IsDragAndDropEnabled() {
|
| - return true;
|
| -}
|
| -
|
| -bool WebViewGuest::IsOverridingUserAgent() const {
|
| - return is_overriding_user_agent_;
|
| -}
|
| -
|
| -void WebViewGuest::LoadProgressed(double progress) {
|
| - scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue());
|
| - args->SetString(guestview::kUrl, guest_web_contents()->GetURL().spec());
|
| - args->SetDouble(webview::kProgress, progress);
|
| - DispatchEvent(
|
| - new GuestViewBase::Event(webview::kEventLoadProgress, args.Pass()));
|
| -}
|
| -
|
| -void WebViewGuest::LoadAbort(bool is_top_level,
|
| - const GURL& url,
|
| - const std::string& error_type) {
|
| - scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue());
|
| - args->SetBoolean(guestview::kIsTopLevel, is_top_level);
|
| - args->SetString(guestview::kUrl, url.possibly_invalid_spec());
|
| - args->SetString(guestview::kReason, error_type);
|
| - DispatchEvent(
|
| - new GuestViewBase::Event(webview::kEventLoadAbort, args.Pass()));
|
| -}
|
| -
|
| -// TODO(fsamuel): Find a reliable way to test the 'responsive' and
|
| -// 'unresponsive' events.
|
| -void WebViewGuest::RendererResponsive() {
|
| - scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue());
|
| - args->SetInteger(webview::kProcessId,
|
| - guest_web_contents()->GetRenderProcessHost()->GetID());
|
| - DispatchEvent(
|
| - new GuestViewBase::Event(webview::kEventResponsive, args.Pass()));
|
| -}
|
| -
|
| -void WebViewGuest::RendererUnresponsive() {
|
| - scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue());
|
| - args->SetInteger(webview::kProcessId,
|
| - guest_web_contents()->GetRenderProcessHost()->GetID());
|
| - DispatchEvent(
|
| - new GuestViewBase::Event(webview::kEventUnresponsive, args.Pass()));
|
| -}
|
| -
|
| -void WebViewGuest::RequestPermission(
|
| - BrowserPluginPermissionType permission_type,
|
| - const base::DictionaryValue& request_info,
|
| - const PermissionResponseCallback& callback,
|
| - bool allowed_by_default) {
|
| - RequestPermissionInternal(permission_type,
|
| - request_info,
|
| - callback,
|
| - allowed_by_default);
|
| -}
|
| -
|
| -void WebViewGuest::Observe(int type,
|
| - const content::NotificationSource& source,
|
| - const content::NotificationDetails& details) {
|
| - switch (type) {
|
| - case content::NOTIFICATION_LOAD_COMPLETED_MAIN_FRAME: {
|
| - DCHECK_EQ(content::Source<WebContents>(source).ptr(),
|
| - guest_web_contents());
|
| - if (content::Source<WebContents>(source).ptr() == guest_web_contents())
|
| - LoadHandlerCalled();
|
| - break;
|
| - }
|
| - case content::NOTIFICATION_RESOURCE_RECEIVED_REDIRECT: {
|
| - DCHECK_EQ(content::Source<WebContents>(source).ptr(),
|
| - guest_web_contents());
|
| - content::ResourceRedirectDetails* resource_redirect_details =
|
| - content::Details<content::ResourceRedirectDetails>(details).ptr();
|
| - bool is_top_level =
|
| - resource_redirect_details->resource_type == ResourceType::MAIN_FRAME;
|
| - LoadRedirect(resource_redirect_details->url,
|
| - resource_redirect_details->new_url,
|
| - is_top_level);
|
| - break;
|
| - }
|
| - default:
|
| - NOTREACHED() << "Unexpected notification sent.";
|
| - break;
|
| - }
|
| -}
|
| -
|
| -void WebViewGuest::SetZoom(double zoom_factor) {
|
| - double zoom_level = content::ZoomFactorToZoomLevel(zoom_factor);
|
| - guest_web_contents()->SetZoomLevel(zoom_level);
|
| -
|
| - scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue());
|
| - args->SetDouble(webview::kOldZoomFactor, current_zoom_factor_);
|
| - args->SetDouble(webview::kNewZoomFactor, zoom_factor);
|
| - DispatchEvent(
|
| - new GuestViewBase::Event(webview::kEventZoomChange, args.Pass()));
|
| -
|
| - current_zoom_factor_ = zoom_factor;
|
| -}
|
| -
|
| -double WebViewGuest::GetZoom() {
|
| - return current_zoom_factor_;
|
| -}
|
| -
|
| -void WebViewGuest::Find(
|
| - const base::string16& search_text,
|
| - const blink::WebFindOptions& options,
|
| - scoped_refptr<extensions::WebviewFindFunction> find_function) {
|
| - find_helper_.Find(guest_web_contents(), search_text, options, find_function);
|
| -}
|
| -
|
| -void WebViewGuest::StopFinding(content::StopFindAction action) {
|
| - find_helper_.CancelAllFindSessions();
|
| - guest_web_contents()->StopFinding(action);
|
| -}
|
| -
|
| -void WebViewGuest::Go(int relative_index) {
|
| - guest_web_contents()->GetController().GoToOffset(relative_index);
|
| -}
|
| -
|
| -void WebViewGuest::Reload() {
|
| - // TODO(fsamuel): Don't check for repost because we don't want to show
|
| - // Chromium's repost warning. We might want to implement a separate API
|
| - // for registering a callback if a repost is about to happen.
|
| - guest_web_contents()->GetController().Reload(false);
|
| -}
|
| -
|
| -
|
| -void WebViewGuest::RequestGeolocationPermission(
|
| - int bridge_id,
|
| - const GURL& requesting_frame,
|
| - bool user_gesture,
|
| - const base::Callback<void(bool)>& callback) {
|
| - base::DictionaryValue request_info;
|
| - request_info.Set(guestview::kUrl,
|
| - base::Value::CreateStringValue(requesting_frame.spec()));
|
| - request_info.Set(guestview::kUserGesture,
|
| - base::Value::CreateBooleanValue(user_gesture));
|
| -
|
| - // It is safe to hold an unretained pointer to WebViewGuest because this
|
| - // callback is called from WebViewGuest::SetPermission.
|
| - const PermissionResponseCallback permission_callback =
|
| - base::Bind(&WebViewGuest::OnWebViewGeolocationPermissionResponse,
|
| - base::Unretained(this),
|
| - bridge_id,
|
| - user_gesture,
|
| - callback);
|
| - int request_id = RequestPermissionInternal(
|
| - static_cast<BrowserPluginPermissionType>(
|
| - WEB_VIEW_PERMISSION_TYPE_GEOLOCATION),
|
| - request_info,
|
| - permission_callback,
|
| - false /* allowed_by_default */);
|
| - bridge_id_to_request_id_map_[bridge_id] = request_id;
|
| -}
|
| -
|
| -void WebViewGuest::OnWebViewGeolocationPermissionResponse(
|
| - int bridge_id,
|
| - bool user_gesture,
|
| - const base::Callback<void(bool)>& callback,
|
| - bool allow,
|
| - const std::string& user_input) {
|
| - // The <webview> embedder has allowed the permission. We now need to make sure
|
| - // that the embedder has geolocation permission.
|
| - RemoveBridgeID(bridge_id);
|
| -
|
| - if (!allow || !attached()) {
|
| - callback.Run(false);
|
| - return;
|
| - }
|
| -
|
| - content::GeolocationPermissionContext* geolocation_context =
|
| - browser_context()->GetGeolocationPermissionContext();
|
| -
|
| - DCHECK(geolocation_context);
|
| - geolocation_context->RequestGeolocationPermission(
|
| - embedder_web_contents()->GetRenderProcessHost()->GetID(),
|
| - embedder_web_contents()->GetRoutingID(),
|
| - // The geolocation permission request here is not initiated
|
| - // through WebGeolocationPermissionRequest. We are only interested
|
| - // in the fact whether the embedder/app has geolocation
|
| - // permission. Therefore we use an invalid |bridge_id|.
|
| - -1 /* bridge_id */,
|
| - embedder_web_contents()->GetLastCommittedURL(),
|
| - user_gesture,
|
| - callback);
|
| -}
|
| -
|
| -void WebViewGuest::CancelGeolocationPermissionRequest(int bridge_id) {
|
| - int request_id = RemoveBridgeID(bridge_id);
|
| - RequestMap::iterator request_itr =
|
| - pending_permission_requests_.find(request_id);
|
| -
|
| - if (request_itr == pending_permission_requests_.end())
|
| - return;
|
| -
|
| - pending_permission_requests_.erase(request_itr);
|
| -}
|
| -
|
| -void WebViewGuest::OnWebViewMediaPermissionResponse(
|
| - const content::MediaStreamRequest& request,
|
| - const content::MediaResponseCallback& callback,
|
| - bool allow,
|
| - const std::string& user_input) {
|
| - if (!allow || !attached()) {
|
| - // Deny the request.
|
| - callback.Run(content::MediaStreamDevices(),
|
| - content::MEDIA_DEVICE_INVALID_STATE,
|
| - scoped_ptr<content::MediaStreamUI>());
|
| - return;
|
| - }
|
| - if (!embedder_web_contents()->GetDelegate())
|
| - return;
|
| -
|
| - embedder_web_contents()->GetDelegate()->
|
| - RequestMediaAccessPermission(embedder_web_contents(), request, callback);
|
| -}
|
| -
|
| -void WebViewGuest::OnWebViewDownloadPermissionResponse(
|
| - const base::Callback<void(bool)>& callback,
|
| - bool allow,
|
| - const std::string& user_input) {
|
| - callback.Run(allow && attached());
|
| -}
|
| -
|
| -void WebViewGuest::OnWebViewPointerLockPermissionResponse(
|
| - const base::Callback<void(bool)>& callback,
|
| - bool allow,
|
| - const std::string& user_input) {
|
| - callback.Run(allow && attached());
|
| -}
|
| -
|
| -WebViewGuest::SetPermissionResult WebViewGuest::SetPermission(
|
| - int request_id,
|
| - PermissionResponseAction action,
|
| - const std::string& user_input) {
|
| - RequestMap::iterator request_itr =
|
| - pending_permission_requests_.find(request_id);
|
| -
|
| - if (request_itr == pending_permission_requests_.end())
|
| - return SET_PERMISSION_INVALID;
|
| -
|
| - const PermissionResponseInfo& info = request_itr->second;
|
| - bool allow = (action == ALLOW) ||
|
| - ((action == DEFAULT) && info.allowed_by_default);
|
| -
|
| - info.callback.Run(allow, user_input);
|
| -
|
| - // Only record user initiated (i.e. non-default) actions.
|
| - if (action != DEFAULT)
|
| - RecordUserInitiatedUMA(info, allow);
|
| -
|
| - pending_permission_requests_.erase(request_itr);
|
| -
|
| - return allow ? SET_PERMISSION_ALLOWED : SET_PERMISSION_DENIED;
|
| -}
|
| -
|
| -void WebViewGuest::SetUserAgentOverride(
|
| - const std::string& user_agent_override) {
|
| - is_overriding_user_agent_ = !user_agent_override.empty();
|
| - if (is_overriding_user_agent_) {
|
| - content::RecordAction(UserMetricsAction("WebView.Guest.OverrideUA"));
|
| - }
|
| - guest_web_contents()->SetUserAgentOverride(user_agent_override);
|
| -}
|
| -
|
| -void WebViewGuest::Stop() {
|
| - guest_web_contents()->Stop();
|
| -}
|
| -
|
| -void WebViewGuest::Terminate() {
|
| - content::RecordAction(UserMetricsAction("WebView.Guest.Terminate"));
|
| - base::ProcessHandle process_handle =
|
| - guest_web_contents()->GetRenderProcessHost()->GetHandle();
|
| - if (process_handle)
|
| - base::KillProcess(process_handle, content::RESULT_CODE_KILLED, false);
|
| -}
|
| -
|
| -bool WebViewGuest::ClearData(const base::Time remove_since,
|
| - uint32 removal_mask,
|
| - const base::Closure& callback) {
|
| - content::RecordAction(UserMetricsAction("WebView.Guest.ClearData"));
|
| - content::StoragePartition* partition =
|
| - content::BrowserContext::GetStoragePartition(
|
| - guest_web_contents()->GetBrowserContext(),
|
| - guest_web_contents()->GetSiteInstance());
|
| -
|
| - if (!partition)
|
| - return false;
|
| -
|
| - partition->ClearData(
|
| - removal_mask,
|
| - content::StoragePartition::QUOTA_MANAGED_STORAGE_MASK_ALL,
|
| - GURL(),
|
| - content::StoragePartition::OriginMatcherFunction(),
|
| - remove_since,
|
| - base::Time::Now(),
|
| - callback);
|
| - return true;
|
| -}
|
| -
|
| -WebViewGuest::~WebViewGuest() {
|
| -}
|
| -
|
| -void WebViewGuest::DidCommitProvisionalLoadForFrame(
|
| - int64 frame_id,
|
| - const base::string16& frame_unique_name,
|
| - bool is_main_frame,
|
| - const GURL& url,
|
| - content::PageTransition transition_type,
|
| - content::RenderViewHost* render_view_host) {
|
| - find_helper_.CancelAllFindSessions();
|
| -
|
| - scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue());
|
| - args->SetString(guestview::kUrl, url.spec());
|
| - args->SetBoolean(guestview::kIsTopLevel, is_main_frame);
|
| - args->SetInteger(webview::kInternalCurrentEntryIndex,
|
| - guest_web_contents()->GetController().GetCurrentEntryIndex());
|
| - args->SetInteger(webview::kInternalEntryCount,
|
| - guest_web_contents()->GetController().GetEntryCount());
|
| - args->SetInteger(webview::kInternalProcessId,
|
| - guest_web_contents()->GetRenderProcessHost()->GetID());
|
| - DispatchEvent(
|
| - new GuestViewBase::Event(webview::kEventLoadCommit, args.Pass()));
|
| -
|
| - // Update the current zoom factor for the new page.
|
| - current_zoom_factor_ = content::ZoomLevelToZoomFactor(
|
| - guest_web_contents()->GetZoomLevel());
|
| -
|
| - if (is_main_frame) {
|
| - chromevox_injected_ = false;
|
| - main_frame_id_ = frame_id;
|
| - }
|
| -}
|
| -
|
| -void WebViewGuest::DidFailProvisionalLoad(
|
| - int64 frame_id,
|
| - const base::string16& frame_unique_name,
|
| - bool is_main_frame,
|
| - const GURL& validated_url,
|
| - int error_code,
|
| - const base::string16& error_description,
|
| - content::RenderViewHost* render_view_host) {
|
| - // Translate the |error_code| into an error string.
|
| - std::string error_type;
|
| - base::RemoveChars(net::ErrorToString(error_code), "net::", &error_type);
|
| - LoadAbort(is_main_frame, validated_url, error_type);
|
| -}
|
| -
|
| -void WebViewGuest::DidStartProvisionalLoadForFrame(
|
| - int64 frame_id,
|
| - int64 parent_frame_id,
|
| - bool is_main_frame,
|
| - const GURL& validated_url,
|
| - bool is_error_page,
|
| - bool is_iframe_srcdoc,
|
| - content::RenderViewHost* render_view_host) {
|
| - scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue());
|
| - args->SetString(guestview::kUrl, validated_url.spec());
|
| - args->SetBoolean(guestview::kIsTopLevel, is_main_frame);
|
| - DispatchEvent(
|
| - new GuestViewBase::Event(webview::kEventLoadStart, args.Pass()));
|
| -}
|
| -
|
| -void WebViewGuest::DocumentLoadedInFrame(
|
| - int64 frame_id,
|
| - content::RenderViewHost* render_view_host) {
|
| - if (frame_id == main_frame_id_)
|
| - InjectChromeVoxIfNeeded(render_view_host);
|
| -}
|
| -
|
| -void WebViewGuest::DidStopLoading(content::RenderViewHost* render_view_host) {
|
| - scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue());
|
| - DispatchEvent(new GuestViewBase::Event(webview::kEventLoadStop, args.Pass()));
|
| -}
|
| -
|
| -void WebViewGuest::WebContentsDestroyed(WebContents* web_contents) {
|
| - // Clean up custom context menu items for this guest.
|
| - extensions::MenuManager* menu_manager = extensions::MenuManager::Get(
|
| - Profile::FromBrowserContext(browser_context()));
|
| - menu_manager->RemoveAllContextItems(extensions::MenuItem::ExtensionKey(
|
| - embedder_extension_id(), view_instance_id()));
|
| -
|
| - RemoveWebViewFromExtensionRendererState(web_contents);
|
| -}
|
| -
|
| -void WebViewGuest::UserAgentOverrideSet(const std::string& user_agent) {
|
| - content::NavigationController& controller =
|
| - guest_web_contents()->GetController();
|
| - content::NavigationEntry* entry = controller.GetVisibleEntry();
|
| - if (!entry)
|
| - return;
|
| - entry->SetIsOverridingUserAgent(!user_agent.empty());
|
| - if (!attached()) {
|
| - // We cannot reload now because all resource loads are suspended until
|
| - // attachment.
|
| - pending_reload_on_attachment_ = true;
|
| - return;
|
| - }
|
| - guest_web_contents()->GetController().Reload(false);
|
| -}
|
| -
|
| -void WebViewGuest::LoadHandlerCalled() {
|
| - scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue());
|
| - DispatchEvent(
|
| - new GuestViewBase::Event(webview::kEventContentLoad, args.Pass()));
|
| -}
|
| -
|
| -void WebViewGuest::LoadRedirect(const GURL& old_url,
|
| - const GURL& new_url,
|
| - bool is_top_level) {
|
| - scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue());
|
| - args->SetBoolean(guestview::kIsTopLevel, is_top_level);
|
| - args->SetString(webview::kNewURL, new_url.spec());
|
| - args->SetString(webview::kOldURL, old_url.spec());
|
| - DispatchEvent(
|
| - new GuestViewBase::Event(webview::kEventLoadRedirect, args.Pass()));
|
| -}
|
| -
|
| -void WebViewGuest::AddWebViewToExtensionRendererState() {
|
| - const GURL& site_url = guest_web_contents()->GetSiteInstance()->GetSiteURL();
|
| - std::string partition_domain;
|
| - std::string partition_id;
|
| - bool in_memory;
|
| - if (!GetGuestPartitionConfigForSite(
|
| - site_url, &partition_domain, &partition_id, &in_memory)) {
|
| - NOTREACHED();
|
| - return;
|
| - }
|
| - DCHECK(embedder_extension_id() == partition_domain);
|
| -
|
| - ExtensionRendererState::WebViewInfo webview_info;
|
| - webview_info.embedder_process_id = embedder_render_process_id();
|
| - webview_info.instance_id = view_instance_id();
|
| - webview_info.partition_id = partition_id;
|
| - webview_info.embedder_extension_id = embedder_extension_id();
|
| -
|
| - content::BrowserThread::PostTask(
|
| - content::BrowserThread::IO, FROM_HERE,
|
| - base::Bind(
|
| - &ExtensionRendererState::AddWebView,
|
| - base::Unretained(ExtensionRendererState::GetInstance()),
|
| - guest_web_contents()->GetRenderProcessHost()->GetID(),
|
| - guest_web_contents()->GetRoutingID(),
|
| - webview_info));
|
| -}
|
| -
|
| -// static
|
| -void WebViewGuest::RemoveWebViewFromExtensionRendererState(
|
| - WebContents* web_contents) {
|
| - content::BrowserThread::PostTask(
|
| - content::BrowserThread::IO, FROM_HERE,
|
| - base::Bind(
|
| - &ExtensionRendererState::RemoveWebView,
|
| - base::Unretained(ExtensionRendererState::GetInstance()),
|
| - web_contents->GetRenderProcessHost()->GetID(),
|
| - web_contents->GetRoutingID()));
|
| -}
|
| -
|
| -GURL WebViewGuest::ResolveURL(const std::string& src) {
|
| - if (!in_extension()) {
|
| - NOTREACHED();
|
| - return GURL(src);
|
| - }
|
| -
|
| - GURL default_url(base::StringPrintf("%s://%s/",
|
| - extensions::kExtensionScheme,
|
| - embedder_extension_id().c_str()));
|
| - return default_url.Resolve(src);
|
| -}
|
| -
|
| -void WebViewGuest::SizeChanged(const gfx::Size& old_size,
|
| - const gfx::Size& new_size) {
|
| - scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue());
|
| - args->SetInteger(webview::kOldHeight, old_size.height());
|
| - args->SetInteger(webview::kOldWidth, old_size.width());
|
| - args->SetInteger(webview::kNewHeight, new_size.height());
|
| - args->SetInteger(webview::kNewWidth, new_size.width());
|
| - DispatchEvent(
|
| - new GuestViewBase::Event(webview::kEventSizeChanged, args.Pass()));
|
| -}
|
| -
|
| -void WebViewGuest::RequestMediaAccessPermission(
|
| - const content::MediaStreamRequest& request,
|
| - const content::MediaResponseCallback& callback) {
|
| - base::DictionaryValue request_info;
|
| - request_info.Set(
|
| - guestview::kUrl,
|
| - base::Value::CreateStringValue(request.security_origin.spec()));
|
| - RequestPermission(static_cast<BrowserPluginPermissionType>(
|
| - WEB_VIEW_PERMISSION_TYPE_MEDIA),
|
| - request_info,
|
| - base::Bind(&WebViewGuest::OnWebViewMediaPermissionResponse,
|
| - base::Unretained(this),
|
| - request,
|
| - callback),
|
| - false /* allowed_by_default */);
|
| -}
|
| -
|
| -void WebViewGuest::CanDownload(
|
| - const std::string& request_method,
|
| - const GURL& url,
|
| - const base::Callback<void(bool)>& callback) {
|
| - base::DictionaryValue request_info;
|
| - request_info.Set(
|
| - guestview::kUrl,
|
| - base::Value::CreateStringValue(url.spec()));
|
| - RequestPermission(
|
| - static_cast<BrowserPluginPermissionType>(
|
| - WEB_VIEW_PERMISSION_TYPE_DOWNLOAD),
|
| - request_info,
|
| - base::Bind(&WebViewGuest::OnWebViewDownloadPermissionResponse,
|
| - base::Unretained(this),
|
| - callback),
|
| - false /* allowed_by_default */);
|
| -}
|
| -
|
| -void WebViewGuest::RequestPointerLockPermission(
|
| - bool user_gesture,
|
| - bool last_unlocked_by_target,
|
| - const base::Callback<void(bool)>& callback) {
|
| - base::DictionaryValue request_info;
|
| - request_info.Set(guestview::kUserGesture,
|
| - base::Value::CreateBooleanValue(user_gesture));
|
| - request_info.Set(webview::kLastUnlockedBySelf,
|
| - base::Value::CreateBooleanValue(last_unlocked_by_target));
|
| - request_info.Set(guestview::kUrl,
|
| - base::Value::CreateStringValue(
|
| - guest_web_contents()->GetLastCommittedURL().spec()));
|
| -
|
| - RequestPermission(
|
| - static_cast<BrowserPluginPermissionType>(
|
| - WEB_VIEW_PERMISSION_TYPE_POINTER_LOCK),
|
| - request_info,
|
| - base::Bind(&WebViewGuest::OnWebViewPointerLockPermissionResponse,
|
| - base::Unretained(this),
|
| - callback),
|
| - false /* allowed_by_default */);
|
| -}
|
| -
|
| -content::JavaScriptDialogManager*
|
| - WebViewGuest::GetJavaScriptDialogManager() {
|
| - return &javascript_dialog_helper_;
|
| -}
|
| -
|
| -#if defined(OS_CHROMEOS)
|
| -void WebViewGuest::OnAccessibilityStatusChanged(
|
| - const chromeos::AccessibilityStatusEventDetails& details) {
|
| - if (details.notification_type == chromeos::ACCESSIBILITY_MANAGER_SHUTDOWN) {
|
| - accessibility_subscription_.reset();
|
| - } else if (details.notification_type ==
|
| - chromeos::ACCESSIBILITY_TOGGLE_SPOKEN_FEEDBACK) {
|
| - if (details.enabled)
|
| - InjectChromeVoxIfNeeded(guest_web_contents()->GetRenderViewHost());
|
| - else
|
| - chromevox_injected_ = false;
|
| - }
|
| -}
|
| -#endif
|
| -
|
| -void WebViewGuest::InjectChromeVoxIfNeeded(
|
| - content::RenderViewHost* render_view_host) {
|
| -#if defined(OS_CHROMEOS)
|
| - if (!chromevox_injected_) {
|
| - chromeos::AccessibilityManager* manager =
|
| - chromeos::AccessibilityManager::Get();
|
| - if (manager && manager->IsSpokenFeedbackEnabled()) {
|
| - manager->InjectChromeVox(render_view_host);
|
| - chromevox_injected_ = true;
|
| - }
|
| - }
|
| -#endif
|
| -}
|
| -
|
| -int WebViewGuest::RemoveBridgeID(int bridge_id) {
|
| - std::map<int, int>::iterator bridge_itr =
|
| - bridge_id_to_request_id_map_.find(bridge_id);
|
| - if (bridge_itr == bridge_id_to_request_id_map_.end())
|
| - return webview::kInvalidPermissionRequestID;
|
| -
|
| - int request_id = bridge_itr->second;
|
| - bridge_id_to_request_id_map_.erase(bridge_itr);
|
| - return request_id;
|
| -}
|
| -
|
| -int WebViewGuest::RequestPermissionInternal(
|
| - BrowserPluginPermissionType permission_type,
|
| - const base::DictionaryValue& request_info,
|
| - const PermissionResponseCallback& callback,
|
| - bool allowed_by_default) {
|
| - // If there are too many pending permission requests then reject this request.
|
| - if (pending_permission_requests_.size() >=
|
| - webview::kMaxOutstandingPermissionRequests) {
|
| - // Let the stack unwind before we deny the permission request so that
|
| - // objects held by the permission request are not destroyed immediately
|
| - // after creation. This is to allow those same objects to be accessed again
|
| - // in the same scope without fear of use after freeing.
|
| - base::MessageLoop::current()->PostTask(
|
| - FROM_HERE,
|
| - base::Bind(&PermissionResponseCallback::Run,
|
| - base::Owned(new PermissionResponseCallback(callback)),
|
| - allowed_by_default,
|
| - std::string()));
|
| - return webview::kInvalidPermissionRequestID;
|
| - }
|
| -
|
| - int request_id = next_permission_request_id_++;
|
| - pending_permission_requests_[request_id] =
|
| - PermissionResponseInfo(callback, permission_type, allowed_by_default);
|
| - scoped_ptr<base::DictionaryValue> args(request_info.DeepCopy());
|
| - args->SetInteger(webview::kRequestId, request_id);
|
| - switch (static_cast<int>(permission_type)) {
|
| - case BROWSER_PLUGIN_PERMISSION_TYPE_NEW_WINDOW: {
|
| - DispatchEvent(
|
| - new GuestViewBase::Event(webview::kEventNewWindow, args.Pass()));
|
| - break;
|
| - }
|
| - case WEB_VIEW_PERMISSION_TYPE_JAVASCRIPT_DIALOG: {
|
| - DispatchEvent(
|
| - new GuestViewBase::Event(webview::kEventDialog, args.Pass()));
|
| - break;
|
| - }
|
| - default: {
|
| - args->SetString(webview::kPermission,
|
| - PermissionTypeToString(permission_type));
|
| - DispatchEvent(new GuestViewBase::Event(webview::kEventPermissionRequest,
|
| - args.Pass()));
|
| - break;
|
| - }
|
| - }
|
| - return request_id;
|
| -}
|
| -
|
| -WebViewGuest::PermissionResponseInfo::PermissionResponseInfo()
|
| - : permission_type(BROWSER_PLUGIN_PERMISSION_TYPE_UNKNOWN),
|
| - allowed_by_default(false) {
|
| -}
|
| -
|
| -WebViewGuest::PermissionResponseInfo::PermissionResponseInfo(
|
| - const PermissionResponseCallback& callback,
|
| - BrowserPluginPermissionType permission_type,
|
| - bool allowed_by_default)
|
| - : callback(callback),
|
| - permission_type(permission_type),
|
| - allowed_by_default(allowed_by_default) {
|
| -}
|
| -
|
| -WebViewGuest::PermissionResponseInfo::~PermissionResponseInfo() {
|
| -}
|
|
|