| OLD | NEW |
| (Empty) |
| 1 // Copyright 2013 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "chrome/browser/guestview/webview/webview_guest.h" | |
| 6 | |
| 7 #include "base/message_loop/message_loop.h" | |
| 8 #include "base/strings/stringprintf.h" | |
| 9 #include "chrome/browser/chrome_notification_types.h" | |
| 10 #include "chrome/browser/extensions/api/web_request/web_request_api.h" | |
| 11 #include "chrome/browser/extensions/api/webview/webview_api.h" | |
| 12 #include "chrome/browser/extensions/chrome_extension_web_contents_observer.h" | |
| 13 #include "chrome/browser/extensions/extension_renderer_state.h" | |
| 14 #include "chrome/browser/extensions/menu_manager.h" | |
| 15 #include "chrome/browser/extensions/script_executor.h" | |
| 16 #include "chrome/browser/favicon/favicon_tab_helper.h" | |
| 17 #include "chrome/browser/guestview/guestview_constants.h" | |
| 18 #include "chrome/browser/guestview/webview/webview_constants.h" | |
| 19 #include "chrome/browser/guestview/webview/webview_permission_types.h" | |
| 20 #include "chrome/common/chrome_version_info.h" | |
| 21 #include "content/public/browser/browser_thread.h" | |
| 22 #include "content/public/browser/geolocation_permission_context.h" | |
| 23 #include "content/public/browser/native_web_keyboard_event.h" | |
| 24 #include "content/public/browser/navigation_entry.h" | |
| 25 #include "content/public/browser/notification_details.h" | |
| 26 #include "content/public/browser/notification_service.h" | |
| 27 #include "content/public/browser/notification_source.h" | |
| 28 #include "content/public/browser/notification_types.h" | |
| 29 #include "content/public/browser/render_process_host.h" | |
| 30 #include "content/public/browser/resource_request_details.h" | |
| 31 #include "content/public/browser/site_instance.h" | |
| 32 #include "content/public/browser/storage_partition.h" | |
| 33 #include "content/public/browser/user_metrics.h" | |
| 34 #include "content/public/browser/web_contents.h" | |
| 35 #include "content/public/browser/web_contents_delegate.h" | |
| 36 #include "content/public/common/media_stream_request.h" | |
| 37 #include "content/public/common/page_zoom.h" | |
| 38 #include "content/public/common/result_codes.h" | |
| 39 #include "content/public/common/stop_find_action.h" | |
| 40 #include "extensions/common/constants.h" | |
| 41 #include "net/base/net_errors.h" | |
| 42 #include "third_party/WebKit/public/web/WebFindOptions.h" | |
| 43 | |
| 44 #if defined(ENABLE_PLUGINS) | |
| 45 #include "chrome/browser/guestview/webview/plugin_permission_helper.h" | |
| 46 #endif | |
| 47 | |
| 48 #if defined(OS_CHROMEOS) | |
| 49 #include "chrome/browser/chromeos/accessibility/accessibility_manager.h" | |
| 50 #endif | |
| 51 | |
| 52 using base::UserMetricsAction; | |
| 53 using content::WebContents; | |
| 54 | |
| 55 namespace { | |
| 56 | |
| 57 static std::string TerminationStatusToString(base::TerminationStatus status) { | |
| 58 switch (status) { | |
| 59 case base::TERMINATION_STATUS_NORMAL_TERMINATION: | |
| 60 return "normal"; | |
| 61 case base::TERMINATION_STATUS_ABNORMAL_TERMINATION: | |
| 62 case base::TERMINATION_STATUS_STILL_RUNNING: | |
| 63 return "abnormal"; | |
| 64 case base::TERMINATION_STATUS_PROCESS_WAS_KILLED: | |
| 65 return "killed"; | |
| 66 case base::TERMINATION_STATUS_PROCESS_CRASHED: | |
| 67 #if defined(OS_ANDROID) | |
| 68 case base::TERMINATION_STATUS_OOM_PROTECTED: | |
| 69 #endif | |
| 70 return "crashed"; | |
| 71 case base::TERMINATION_STATUS_MAX_ENUM: | |
| 72 break; | |
| 73 } | |
| 74 NOTREACHED() << "Unknown Termination Status."; | |
| 75 return "unknown"; | |
| 76 } | |
| 77 | |
| 78 static std::string PermissionTypeToString(BrowserPluginPermissionType type) { | |
| 79 switch (type) { | |
| 80 case BROWSER_PLUGIN_PERMISSION_TYPE_NEW_WINDOW: | |
| 81 return webview::kPermissionTypeNewWindow; | |
| 82 case BROWSER_PLUGIN_PERMISSION_TYPE_UNKNOWN: | |
| 83 NOTREACHED(); | |
| 84 break; | |
| 85 default: { | |
| 86 WebViewPermissionType webview = static_cast<WebViewPermissionType>(type); | |
| 87 switch (webview) { | |
| 88 case WEB_VIEW_PERMISSION_TYPE_DOWNLOAD: | |
| 89 return webview::kPermissionTypeDownload; | |
| 90 case WEB_VIEW_PERMISSION_TYPE_GEOLOCATION: | |
| 91 return webview::kPermissionTypeGeolocation; | |
| 92 case WEB_VIEW_PERMISSION_TYPE_JAVASCRIPT_DIALOG: | |
| 93 return webview::kPermissionTypeDialog; | |
| 94 case WEB_VIEW_PERMISSION_TYPE_LOAD_PLUGIN: | |
| 95 return webview::kPermissionTypeLoadPlugin; | |
| 96 case WEB_VIEW_PERMISSION_TYPE_MEDIA: | |
| 97 return webview::kPermissionTypeMedia; | |
| 98 case WEB_VIEW_PERMISSION_TYPE_POINTER_LOCK: | |
| 99 return webview::kPermissionTypePointerLock; | |
| 100 } | |
| 101 NOTREACHED(); | |
| 102 } | |
| 103 } | |
| 104 return std::string(); | |
| 105 } | |
| 106 | |
| 107 void RemoveWebViewEventListenersOnIOThread( | |
| 108 void* profile, | |
| 109 const std::string& extension_id, | |
| 110 int embedder_process_id, | |
| 111 int view_instance_id) { | |
| 112 DCHECK(content::BrowserThread::CurrentlyOn(content::BrowserThread::IO)); | |
| 113 ExtensionWebRequestEventRouter::GetInstance()->RemoveWebViewEventListeners( | |
| 114 profile, | |
| 115 extension_id, | |
| 116 embedder_process_id, | |
| 117 view_instance_id); | |
| 118 } | |
| 119 | |
| 120 void AttachWebViewHelpers(WebContents* contents) { | |
| 121 FaviconTabHelper::CreateForWebContents(contents); | |
| 122 extensions::ChromeExtensionWebContentsObserver::CreateForWebContents( | |
| 123 contents); | |
| 124 #if defined(ENABLE_PLUGINS) | |
| 125 PluginPermissionHelper::CreateForWebContents(contents); | |
| 126 #endif | |
| 127 } | |
| 128 | |
| 129 } // namespace | |
| 130 | |
| 131 WebViewGuest::WebViewGuest(WebContents* guest_web_contents, | |
| 132 const std::string& extension_id) | |
| 133 : GuestView(guest_web_contents, extension_id), | |
| 134 WebContentsObserver(guest_web_contents), | |
| 135 script_executor_(new extensions::ScriptExecutor(guest_web_contents, | |
| 136 &script_observers_)), | |
| 137 next_permission_request_id_(0), | |
| 138 is_overriding_user_agent_(false), | |
| 139 pending_reload_on_attachment_(false), | |
| 140 main_frame_id_(0), | |
| 141 chromevox_injected_(false), | |
| 142 find_helper_(this), | |
| 143 javascript_dialog_helper_(this) { | |
| 144 notification_registrar_.Add( | |
| 145 this, content::NOTIFICATION_LOAD_COMPLETED_MAIN_FRAME, | |
| 146 content::Source<WebContents>(guest_web_contents)); | |
| 147 | |
| 148 notification_registrar_.Add( | |
| 149 this, content::NOTIFICATION_RESOURCE_RECEIVED_REDIRECT, | |
| 150 content::Source<WebContents>(guest_web_contents)); | |
| 151 | |
| 152 #if defined(OS_CHROMEOS) | |
| 153 chromeos::AccessibilityManager* accessibility_manager = | |
| 154 chromeos::AccessibilityManager::Get(); | |
| 155 CHECK(accessibility_manager); | |
| 156 accessibility_subscription_ = accessibility_manager->RegisterCallback( | |
| 157 base::Bind(&WebViewGuest::OnAccessibilityStatusChanged, | |
| 158 base::Unretained(this))); | |
| 159 #endif | |
| 160 | |
| 161 AttachWebViewHelpers(guest_web_contents); | |
| 162 } | |
| 163 | |
| 164 // static | |
| 165 WebViewGuest* WebViewGuest::From(int embedder_process_id, | |
| 166 int guest_instance_id) { | |
| 167 GuestView* guest = GuestView::From(embedder_process_id, guest_instance_id); | |
| 168 if (!guest) | |
| 169 return NULL; | |
| 170 return guest->AsWebView(); | |
| 171 } | |
| 172 | |
| 173 // static | |
| 174 WebViewGuest* WebViewGuest::FromWebContents(WebContents* contents) { | |
| 175 GuestView* guest = GuestView::FromWebContents(contents); | |
| 176 return guest ? guest->AsWebView() : NULL; | |
| 177 } | |
| 178 | |
| 179 // static. | |
| 180 int WebViewGuest::GetViewInstanceId(WebContents* contents) { | |
| 181 WebViewGuest* guest = FromWebContents(contents); | |
| 182 if (!guest) | |
| 183 return guestview::kInstanceIDNone; | |
| 184 | |
| 185 return guest->view_instance_id(); | |
| 186 } | |
| 187 | |
| 188 // static | |
| 189 void WebViewGuest::RecordUserInitiatedUMA(const PermissionResponseInfo& info, | |
| 190 bool allow) { | |
| 191 if (allow) { | |
| 192 // Note that |allow| == true means the embedder explicitly allowed the | |
| 193 // request. For some requests they might still fail. An example of such | |
| 194 // scenario would be: an embedder allows geolocation request but doesn't | |
| 195 // have geolocation access on its own. | |
| 196 switch (info.permission_type) { | |
| 197 case BROWSER_PLUGIN_PERMISSION_TYPE_NEW_WINDOW: | |
| 198 content::RecordAction( | |
| 199 UserMetricsAction("BrowserPlugin.PermissionAllow.NewWindow")); | |
| 200 break; | |
| 201 case BROWSER_PLUGIN_PERMISSION_TYPE_UNKNOWN: | |
| 202 break; | |
| 203 default: { | |
| 204 WebViewPermissionType webview_permission_type = | |
| 205 static_cast<WebViewPermissionType>(info.permission_type); | |
| 206 switch (webview_permission_type) { | |
| 207 case WEB_VIEW_PERMISSION_TYPE_DOWNLOAD: | |
| 208 content::RecordAction( | |
| 209 UserMetricsAction("WebView.PermissionAllow.Download")); | |
| 210 break; | |
| 211 case WEB_VIEW_PERMISSION_TYPE_GEOLOCATION: | |
| 212 content::RecordAction( | |
| 213 UserMetricsAction("WebView.PermissionAllow.Geolocation")); | |
| 214 break; | |
| 215 case WEB_VIEW_PERMISSION_TYPE_JAVASCRIPT_DIALOG: | |
| 216 content::RecordAction( | |
| 217 UserMetricsAction("WebView.PermissionAllow.JSDialog")); | |
| 218 break; | |
| 219 case WEB_VIEW_PERMISSION_TYPE_LOAD_PLUGIN: | |
| 220 content::RecordAction( | |
| 221 UserMetricsAction("WebView.Guest.PermissionAllow.PluginLoad")); | |
| 222 case WEB_VIEW_PERMISSION_TYPE_MEDIA: | |
| 223 content::RecordAction( | |
| 224 UserMetricsAction("WebView.PermissionAllow.Media")); | |
| 225 break; | |
| 226 case WEB_VIEW_PERMISSION_TYPE_POINTER_LOCK: | |
| 227 content::RecordAction( | |
| 228 UserMetricsAction("WebView.PermissionAllow.PointerLock")); | |
| 229 break; | |
| 230 default: | |
| 231 break; | |
| 232 } | |
| 233 } | |
| 234 } | |
| 235 } else { | |
| 236 switch (info.permission_type) { | |
| 237 case BROWSER_PLUGIN_PERMISSION_TYPE_NEW_WINDOW: | |
| 238 content::RecordAction( | |
| 239 UserMetricsAction("BrowserPlugin.PermissionDeny.NewWindow")); | |
| 240 break; | |
| 241 case BROWSER_PLUGIN_PERMISSION_TYPE_UNKNOWN: | |
| 242 break; | |
| 243 default: { | |
| 244 WebViewPermissionType webview_permission_type = | |
| 245 static_cast<WebViewPermissionType>(info.permission_type); | |
| 246 switch (webview_permission_type) { | |
| 247 case WEB_VIEW_PERMISSION_TYPE_DOWNLOAD: | |
| 248 content::RecordAction( | |
| 249 UserMetricsAction("WebView.PermissionDeny.Download")); | |
| 250 break; | |
| 251 case WEB_VIEW_PERMISSION_TYPE_GEOLOCATION: | |
| 252 content::RecordAction( | |
| 253 UserMetricsAction("WebView.PermissionDeny.Geolocation")); | |
| 254 break; | |
| 255 case WEB_VIEW_PERMISSION_TYPE_JAVASCRIPT_DIALOG: | |
| 256 content::RecordAction( | |
| 257 UserMetricsAction("WebView.PermissionDeny.JSDialog")); | |
| 258 break; | |
| 259 case WEB_VIEW_PERMISSION_TYPE_LOAD_PLUGIN: | |
| 260 content::RecordAction( | |
| 261 UserMetricsAction("WebView.Guest.PermissionDeny.PluginLoad")); | |
| 262 case WEB_VIEW_PERMISSION_TYPE_MEDIA: | |
| 263 content::RecordAction( | |
| 264 UserMetricsAction("WebView.PermissionDeny.Media")); | |
| 265 break; | |
| 266 case WEB_VIEW_PERMISSION_TYPE_POINTER_LOCK: | |
| 267 content::RecordAction( | |
| 268 UserMetricsAction("WebView.PermissionDeny.PointerLock")); | |
| 269 break; | |
| 270 default: | |
| 271 break; | |
| 272 } | |
| 273 } | |
| 274 } | |
| 275 } | |
| 276 } | |
| 277 | |
| 278 void WebViewGuest::Attach(WebContents* embedder_web_contents, | |
| 279 const base::DictionaryValue& args) { | |
| 280 std::string user_agent_override; | |
| 281 if (args.GetString(webview::kParameterUserAgentOverride, | |
| 282 &user_agent_override)) { | |
| 283 SetUserAgentOverride(user_agent_override); | |
| 284 } else { | |
| 285 SetUserAgentOverride(""); | |
| 286 } | |
| 287 | |
| 288 GuestView::Attach(embedder_web_contents, args); | |
| 289 | |
| 290 AddWebViewToExtensionRendererState(); | |
| 291 } | |
| 292 | |
| 293 GuestView::Type WebViewGuest::GetViewType() const { | |
| 294 return GuestView::WEBVIEW; | |
| 295 } | |
| 296 | |
| 297 WebViewGuest* WebViewGuest::AsWebView() { | |
| 298 return this; | |
| 299 } | |
| 300 | |
| 301 AdViewGuest* WebViewGuest::AsAdView() { | |
| 302 return NULL; | |
| 303 } | |
| 304 | |
| 305 void WebViewGuest::AddMessageToConsole(int32 level, | |
| 306 const base::string16& message, | |
| 307 int32 line_no, | |
| 308 const base::string16& source_id) { | |
| 309 scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue()); | |
| 310 // Log levels are from base/logging.h: LogSeverity. | |
| 311 args->SetInteger(webview::kLevel, level); | |
| 312 args->SetString(webview::kMessage, message); | |
| 313 args->SetInteger(webview::kLine, line_no); | |
| 314 args->SetString(webview::kSourceId, source_id); | |
| 315 DispatchEvent( | |
| 316 new GuestView::Event(webview::kEventConsoleMessage, args.Pass())); | |
| 317 } | |
| 318 | |
| 319 void WebViewGuest::Close() { | |
| 320 scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue()); | |
| 321 DispatchEvent(new GuestView::Event(webview::kEventClose, args.Pass())); | |
| 322 } | |
| 323 | |
| 324 void WebViewGuest::DidAttach() { | |
| 325 if (pending_reload_on_attachment_) { | |
| 326 pending_reload_on_attachment_ = false; | |
| 327 guest_web_contents()->GetController().Reload(false); | |
| 328 } | |
| 329 } | |
| 330 | |
| 331 void WebViewGuest::EmbedderDestroyed() { | |
| 332 // TODO(fsamuel): WebRequest event listeners for <webview> should survive | |
| 333 // reparenting of a <webview> within a single embedder. Right now, we keep | |
| 334 // around the browser state for the listener for the lifetime of the embedder. | |
| 335 // Ideally, the lifetime of the listeners should match the lifetime of the | |
| 336 // <webview> DOM node. Once http://crbug.com/156219 is resolved we can move | |
| 337 // the call to RemoveWebViewEventListenersOnIOThread back to | |
| 338 // WebViewGuest::WebContentsDestroyed. | |
| 339 content::BrowserThread::PostTask( | |
| 340 content::BrowserThread::IO, | |
| 341 FROM_HERE, | |
| 342 base::Bind( | |
| 343 &RemoveWebViewEventListenersOnIOThread, | |
| 344 browser_context(), embedder_extension_id(), | |
| 345 embedder_render_process_id(), | |
| 346 view_instance_id())); | |
| 347 } | |
| 348 | |
| 349 void WebViewGuest::FindReply(int request_id, | |
| 350 int number_of_matches, | |
| 351 const gfx::Rect& selection_rect, | |
| 352 int active_match_ordinal, | |
| 353 bool final_update) { | |
| 354 find_helper_.FindReply(request_id, number_of_matches, selection_rect, | |
| 355 active_match_ordinal, final_update); | |
| 356 } | |
| 357 | |
| 358 void WebViewGuest::GuestProcessGone(base::TerminationStatus status) { | |
| 359 // Cancel all find sessions in progress. | |
| 360 find_helper_.CancelAllFindSessions(); | |
| 361 | |
| 362 scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue()); | |
| 363 args->SetInteger(webview::kProcessId, | |
| 364 guest_web_contents()->GetRenderProcessHost()->GetID()); | |
| 365 args->SetString(webview::kReason, TerminationStatusToString(status)); | |
| 366 DispatchEvent( | |
| 367 new GuestView::Event(webview::kEventExit, args.Pass())); | |
| 368 } | |
| 369 | |
| 370 bool WebViewGuest::HandleKeyboardEvent( | |
| 371 const content::NativeWebKeyboardEvent& event) { | |
| 372 if (event.type != blink::WebInputEvent::RawKeyDown) | |
| 373 return false; | |
| 374 | |
| 375 #if defined(OS_MACOSX) | |
| 376 if (event.modifiers != blink::WebInputEvent::MetaKey) | |
| 377 return false; | |
| 378 | |
| 379 if (event.windowsKeyCode == ui::VKEY_OEM_4) { | |
| 380 Go(-1); | |
| 381 return true; | |
| 382 } | |
| 383 | |
| 384 if (event.windowsKeyCode == ui::VKEY_OEM_6) { | |
| 385 Go(1); | |
| 386 return true; | |
| 387 } | |
| 388 #else | |
| 389 if (event.windowsKeyCode == ui::VKEY_BROWSER_BACK) { | |
| 390 Go(-1); | |
| 391 return true; | |
| 392 } | |
| 393 | |
| 394 if (event.windowsKeyCode == ui::VKEY_BROWSER_FORWARD) { | |
| 395 Go(1); | |
| 396 return true; | |
| 397 } | |
| 398 #endif | |
| 399 return false; | |
| 400 } | |
| 401 | |
| 402 bool WebViewGuest::IsDragAndDropEnabled() { | |
| 403 return true; | |
| 404 } | |
| 405 | |
| 406 bool WebViewGuest::IsOverridingUserAgent() const { | |
| 407 return is_overriding_user_agent_; | |
| 408 } | |
| 409 | |
| 410 void WebViewGuest::LoadProgressed(double progress) { | |
| 411 scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue()); | |
| 412 args->SetString(guestview::kUrl, guest_web_contents()->GetURL().spec()); | |
| 413 args->SetDouble(webview::kProgress, progress); | |
| 414 DispatchEvent(new GuestView::Event(webview::kEventLoadProgress, args.Pass())); | |
| 415 } | |
| 416 | |
| 417 void WebViewGuest::LoadAbort(bool is_top_level, | |
| 418 const GURL& url, | |
| 419 const std::string& error_type) { | |
| 420 scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue()); | |
| 421 args->SetBoolean(guestview::kIsTopLevel, is_top_level); | |
| 422 args->SetString(guestview::kUrl, url.possibly_invalid_spec()); | |
| 423 args->SetString(guestview::kReason, error_type); | |
| 424 DispatchEvent(new GuestView::Event(webview::kEventLoadAbort, args.Pass())); | |
| 425 } | |
| 426 | |
| 427 // TODO(fsamuel): Find a reliable way to test the 'responsive' and | |
| 428 // 'unresponsive' events. | |
| 429 void WebViewGuest::RendererResponsive() { | |
| 430 scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue()); | |
| 431 args->SetInteger(webview::kProcessId, | |
| 432 guest_web_contents()->GetRenderProcessHost()->GetID()); | |
| 433 DispatchEvent(new GuestView::Event(webview::kEventResponsive, args.Pass())); | |
| 434 } | |
| 435 | |
| 436 void WebViewGuest::RendererUnresponsive() { | |
| 437 scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue()); | |
| 438 args->SetInteger(webview::kProcessId, | |
| 439 guest_web_contents()->GetRenderProcessHost()->GetID()); | |
| 440 DispatchEvent(new GuestView::Event(webview::kEventUnresponsive, args.Pass())); | |
| 441 } | |
| 442 | |
| 443 void WebViewGuest::RequestPermission( | |
| 444 BrowserPluginPermissionType permission_type, | |
| 445 const base::DictionaryValue& request_info, | |
| 446 const PermissionResponseCallback& callback, | |
| 447 bool allowed_by_default) { | |
| 448 RequestPermissionInternal(permission_type, | |
| 449 request_info, | |
| 450 callback, | |
| 451 allowed_by_default); | |
| 452 } | |
| 453 | |
| 454 void WebViewGuest::Observe(int type, | |
| 455 const content::NotificationSource& source, | |
| 456 const content::NotificationDetails& details) { | |
| 457 switch (type) { | |
| 458 case content::NOTIFICATION_LOAD_COMPLETED_MAIN_FRAME: { | |
| 459 DCHECK_EQ(content::Source<WebContents>(source).ptr(), | |
| 460 guest_web_contents()); | |
| 461 if (content::Source<WebContents>(source).ptr() == guest_web_contents()) | |
| 462 LoadHandlerCalled(); | |
| 463 break; | |
| 464 } | |
| 465 case content::NOTIFICATION_RESOURCE_RECEIVED_REDIRECT: { | |
| 466 DCHECK_EQ(content::Source<WebContents>(source).ptr(), | |
| 467 guest_web_contents()); | |
| 468 content::ResourceRedirectDetails* resource_redirect_details = | |
| 469 content::Details<content::ResourceRedirectDetails>(details).ptr(); | |
| 470 bool is_top_level = | |
| 471 resource_redirect_details->resource_type == ResourceType::MAIN_FRAME; | |
| 472 LoadRedirect(resource_redirect_details->url, | |
| 473 resource_redirect_details->new_url, | |
| 474 is_top_level); | |
| 475 break; | |
| 476 } | |
| 477 default: | |
| 478 NOTREACHED() << "Unexpected notification sent."; | |
| 479 break; | |
| 480 } | |
| 481 } | |
| 482 | |
| 483 void WebViewGuest::SetZoom(double zoom_factor) { | |
| 484 double zoom_level = content::ZoomFactorToZoomLevel(zoom_factor); | |
| 485 guest_web_contents()->SetZoomLevel(zoom_level); | |
| 486 | |
| 487 scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue()); | |
| 488 args->SetDouble(webview::kOldZoomFactor, current_zoom_factor_); | |
| 489 args->SetDouble(webview::kNewZoomFactor, zoom_factor); | |
| 490 DispatchEvent(new GuestView::Event(webview::kEventZoomChange, args.Pass())); | |
| 491 | |
| 492 current_zoom_factor_ = zoom_factor; | |
| 493 } | |
| 494 | |
| 495 double WebViewGuest::GetZoom() { | |
| 496 return current_zoom_factor_; | |
| 497 } | |
| 498 | |
| 499 void WebViewGuest::Find( | |
| 500 const base::string16& search_text, | |
| 501 const blink::WebFindOptions& options, | |
| 502 scoped_refptr<extensions::WebviewFindFunction> find_function) { | |
| 503 find_helper_.Find(guest_web_contents(), search_text, options, find_function); | |
| 504 } | |
| 505 | |
| 506 void WebViewGuest::StopFinding(content::StopFindAction action) { | |
| 507 find_helper_.CancelAllFindSessions(); | |
| 508 guest_web_contents()->StopFinding(action); | |
| 509 } | |
| 510 | |
| 511 void WebViewGuest::Go(int relative_index) { | |
| 512 guest_web_contents()->GetController().GoToOffset(relative_index); | |
| 513 } | |
| 514 | |
| 515 void WebViewGuest::Reload() { | |
| 516 // TODO(fsamuel): Don't check for repost because we don't want to show | |
| 517 // Chromium's repost warning. We might want to implement a separate API | |
| 518 // for registering a callback if a repost is about to happen. | |
| 519 guest_web_contents()->GetController().Reload(false); | |
| 520 } | |
| 521 | |
| 522 | |
| 523 void WebViewGuest::RequestGeolocationPermission( | |
| 524 int bridge_id, | |
| 525 const GURL& requesting_frame, | |
| 526 bool user_gesture, | |
| 527 const base::Callback<void(bool)>& callback) { | |
| 528 base::DictionaryValue request_info; | |
| 529 request_info.Set(guestview::kUrl, | |
| 530 base::Value::CreateStringValue(requesting_frame.spec())); | |
| 531 request_info.Set(guestview::kUserGesture, | |
| 532 base::Value::CreateBooleanValue(user_gesture)); | |
| 533 | |
| 534 // It is safe to hold an unretained pointer to WebViewGuest because this | |
| 535 // callback is called from WebViewGuest::SetPermission. | |
| 536 const PermissionResponseCallback permission_callback = | |
| 537 base::Bind(&WebViewGuest::OnWebViewGeolocationPermissionResponse, | |
| 538 base::Unretained(this), | |
| 539 bridge_id, | |
| 540 user_gesture, | |
| 541 callback); | |
| 542 int request_id = RequestPermissionInternal( | |
| 543 static_cast<BrowserPluginPermissionType>( | |
| 544 WEB_VIEW_PERMISSION_TYPE_GEOLOCATION), | |
| 545 request_info, | |
| 546 permission_callback, | |
| 547 false /* allowed_by_default */); | |
| 548 bridge_id_to_request_id_map_[bridge_id] = request_id; | |
| 549 } | |
| 550 | |
| 551 void WebViewGuest::OnWebViewGeolocationPermissionResponse( | |
| 552 int bridge_id, | |
| 553 bool user_gesture, | |
| 554 const base::Callback<void(bool)>& callback, | |
| 555 bool allow, | |
| 556 const std::string& user_input) { | |
| 557 // The <webview> embedder has allowed the permission. We now need to make sure | |
| 558 // that the embedder has geolocation permission. | |
| 559 RemoveBridgeID(bridge_id); | |
| 560 | |
| 561 if (!allow || !attached()) { | |
| 562 callback.Run(false); | |
| 563 return; | |
| 564 } | |
| 565 | |
| 566 content::GeolocationPermissionContext* geolocation_context = | |
| 567 browser_context()->GetGeolocationPermissionContext(); | |
| 568 | |
| 569 DCHECK(geolocation_context); | |
| 570 geolocation_context->RequestGeolocationPermission( | |
| 571 embedder_web_contents()->GetRenderProcessHost()->GetID(), | |
| 572 embedder_web_contents()->GetRoutingID(), | |
| 573 // The geolocation permission request here is not initiated | |
| 574 // through WebGeolocationPermissionRequest. We are only interested | |
| 575 // in the fact whether the embedder/app has geolocation | |
| 576 // permission. Therefore we use an invalid |bridge_id|. | |
| 577 -1 /* bridge_id */, | |
| 578 embedder_web_contents()->GetLastCommittedURL(), | |
| 579 user_gesture, | |
| 580 callback); | |
| 581 } | |
| 582 | |
| 583 void WebViewGuest::CancelGeolocationPermissionRequest(int bridge_id) { | |
| 584 int request_id = RemoveBridgeID(bridge_id); | |
| 585 RequestMap::iterator request_itr = | |
| 586 pending_permission_requests_.find(request_id); | |
| 587 | |
| 588 if (request_itr == pending_permission_requests_.end()) | |
| 589 return; | |
| 590 | |
| 591 pending_permission_requests_.erase(request_itr); | |
| 592 } | |
| 593 | |
| 594 void WebViewGuest::OnWebViewMediaPermissionResponse( | |
| 595 const content::MediaStreamRequest& request, | |
| 596 const content::MediaResponseCallback& callback, | |
| 597 bool allow, | |
| 598 const std::string& user_input) { | |
| 599 if (!allow || !attached()) { | |
| 600 // Deny the request. | |
| 601 callback.Run(content::MediaStreamDevices(), | |
| 602 content::MEDIA_DEVICE_INVALID_STATE, | |
| 603 scoped_ptr<content::MediaStreamUI>()); | |
| 604 return; | |
| 605 } | |
| 606 if (!embedder_web_contents()->GetDelegate()) | |
| 607 return; | |
| 608 | |
| 609 embedder_web_contents()->GetDelegate()-> | |
| 610 RequestMediaAccessPermission(embedder_web_contents(), request, callback); | |
| 611 } | |
| 612 | |
| 613 void WebViewGuest::OnWebViewDownloadPermissionResponse( | |
| 614 const base::Callback<void(bool)>& callback, | |
| 615 bool allow, | |
| 616 const std::string& user_input) { | |
| 617 callback.Run(allow && attached()); | |
| 618 } | |
| 619 | |
| 620 void WebViewGuest::OnWebViewPointerLockPermissionResponse( | |
| 621 const base::Callback<void(bool)>& callback, | |
| 622 bool allow, | |
| 623 const std::string& user_input) { | |
| 624 callback.Run(allow && attached()); | |
| 625 } | |
| 626 | |
| 627 WebViewGuest::SetPermissionResult WebViewGuest::SetPermission( | |
| 628 int request_id, | |
| 629 PermissionResponseAction action, | |
| 630 const std::string& user_input) { | |
| 631 RequestMap::iterator request_itr = | |
| 632 pending_permission_requests_.find(request_id); | |
| 633 | |
| 634 if (request_itr == pending_permission_requests_.end()) | |
| 635 return SET_PERMISSION_INVALID; | |
| 636 | |
| 637 const PermissionResponseInfo& info = request_itr->second; | |
| 638 bool allow = (action == ALLOW) || | |
| 639 ((action == DEFAULT) && info.allowed_by_default); | |
| 640 | |
| 641 info.callback.Run(allow, user_input); | |
| 642 | |
| 643 // Only record user initiated (i.e. non-default) actions. | |
| 644 if (action != DEFAULT) | |
| 645 RecordUserInitiatedUMA(info, allow); | |
| 646 | |
| 647 pending_permission_requests_.erase(request_itr); | |
| 648 | |
| 649 return allow ? SET_PERMISSION_ALLOWED : SET_PERMISSION_DENIED; | |
| 650 } | |
| 651 | |
| 652 void WebViewGuest::SetUserAgentOverride( | |
| 653 const std::string& user_agent_override) { | |
| 654 is_overriding_user_agent_ = !user_agent_override.empty(); | |
| 655 if (is_overriding_user_agent_) { | |
| 656 content::RecordAction(UserMetricsAction("WebView.Guest.OverrideUA")); | |
| 657 } | |
| 658 guest_web_contents()->SetUserAgentOverride(user_agent_override); | |
| 659 } | |
| 660 | |
| 661 void WebViewGuest::Stop() { | |
| 662 guest_web_contents()->Stop(); | |
| 663 } | |
| 664 | |
| 665 void WebViewGuest::Terminate() { | |
| 666 content::RecordAction(UserMetricsAction("WebView.Guest.Terminate")); | |
| 667 base::ProcessHandle process_handle = | |
| 668 guest_web_contents()->GetRenderProcessHost()->GetHandle(); | |
| 669 if (process_handle) | |
| 670 base::KillProcess(process_handle, content::RESULT_CODE_KILLED, false); | |
| 671 } | |
| 672 | |
| 673 bool WebViewGuest::ClearData(const base::Time remove_since, | |
| 674 uint32 removal_mask, | |
| 675 const base::Closure& callback) { | |
| 676 content::RecordAction(UserMetricsAction("WebView.Guest.ClearData")); | |
| 677 content::StoragePartition* partition = | |
| 678 content::BrowserContext::GetStoragePartition( | |
| 679 guest_web_contents()->GetBrowserContext(), | |
| 680 guest_web_contents()->GetSiteInstance()); | |
| 681 | |
| 682 if (!partition) | |
| 683 return false; | |
| 684 | |
| 685 partition->ClearData( | |
| 686 removal_mask, | |
| 687 content::StoragePartition::QUOTA_MANAGED_STORAGE_MASK_ALL, | |
| 688 GURL(), | |
| 689 content::StoragePartition::OriginMatcherFunction(), | |
| 690 remove_since, | |
| 691 base::Time::Now(), | |
| 692 callback); | |
| 693 return true; | |
| 694 } | |
| 695 | |
| 696 WebViewGuest::~WebViewGuest() { | |
| 697 } | |
| 698 | |
| 699 void WebViewGuest::DidCommitProvisionalLoadForFrame( | |
| 700 int64 frame_id, | |
| 701 const base::string16& frame_unique_name, | |
| 702 bool is_main_frame, | |
| 703 const GURL& url, | |
| 704 content::PageTransition transition_type, | |
| 705 content::RenderViewHost* render_view_host) { | |
| 706 find_helper_.CancelAllFindSessions(); | |
| 707 | |
| 708 scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue()); | |
| 709 args->SetString(guestview::kUrl, url.spec()); | |
| 710 args->SetBoolean(guestview::kIsTopLevel, is_main_frame); | |
| 711 args->SetInteger(webview::kInternalCurrentEntryIndex, | |
| 712 guest_web_contents()->GetController().GetCurrentEntryIndex()); | |
| 713 args->SetInteger(webview::kInternalEntryCount, | |
| 714 guest_web_contents()->GetController().GetEntryCount()); | |
| 715 args->SetInteger(webview::kInternalProcessId, | |
| 716 guest_web_contents()->GetRenderProcessHost()->GetID()); | |
| 717 DispatchEvent(new GuestView::Event(webview::kEventLoadCommit, args.Pass())); | |
| 718 | |
| 719 // Update the current zoom factor for the new page. | |
| 720 current_zoom_factor_ = content::ZoomLevelToZoomFactor( | |
| 721 guest_web_contents()->GetZoomLevel()); | |
| 722 | |
| 723 if (is_main_frame) { | |
| 724 chromevox_injected_ = false; | |
| 725 main_frame_id_ = frame_id; | |
| 726 } | |
| 727 } | |
| 728 | |
| 729 void WebViewGuest::DidFailProvisionalLoad( | |
| 730 int64 frame_id, | |
| 731 const base::string16& frame_unique_name, | |
| 732 bool is_main_frame, | |
| 733 const GURL& validated_url, | |
| 734 int error_code, | |
| 735 const base::string16& error_description, | |
| 736 content::RenderViewHost* render_view_host) { | |
| 737 // Translate the |error_code| into an error string. | |
| 738 std::string error_type; | |
| 739 base::RemoveChars(net::ErrorToString(error_code), "net::", &error_type); | |
| 740 LoadAbort(is_main_frame, validated_url, error_type); | |
| 741 } | |
| 742 | |
| 743 void WebViewGuest::DidStartProvisionalLoadForFrame( | |
| 744 int64 frame_id, | |
| 745 int64 parent_frame_id, | |
| 746 bool is_main_frame, | |
| 747 const GURL& validated_url, | |
| 748 bool is_error_page, | |
| 749 bool is_iframe_srcdoc, | |
| 750 content::RenderViewHost* render_view_host) { | |
| 751 scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue()); | |
| 752 args->SetString(guestview::kUrl, validated_url.spec()); | |
| 753 args->SetBoolean(guestview::kIsTopLevel, is_main_frame); | |
| 754 DispatchEvent(new GuestView::Event(webview::kEventLoadStart, args.Pass())); | |
| 755 } | |
| 756 | |
| 757 void WebViewGuest::DocumentLoadedInFrame( | |
| 758 int64 frame_id, | |
| 759 content::RenderViewHost* render_view_host) { | |
| 760 if (frame_id == main_frame_id_) | |
| 761 InjectChromeVoxIfNeeded(render_view_host); | |
| 762 } | |
| 763 | |
| 764 void WebViewGuest::DidStopLoading(content::RenderViewHost* render_view_host) { | |
| 765 scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue()); | |
| 766 DispatchEvent(new GuestView::Event(webview::kEventLoadStop, args.Pass())); | |
| 767 } | |
| 768 | |
| 769 void WebViewGuest::WebContentsDestroyed(WebContents* web_contents) { | |
| 770 // Clean up custom context menu items for this guest. | |
| 771 extensions::MenuManager* menu_manager = extensions::MenuManager::Get( | |
| 772 Profile::FromBrowserContext(browser_context())); | |
| 773 menu_manager->RemoveAllContextItems(extensions::MenuItem::ExtensionKey( | |
| 774 embedder_extension_id(), view_instance_id())); | |
| 775 | |
| 776 RemoveWebViewFromExtensionRendererState(web_contents); | |
| 777 } | |
| 778 | |
| 779 void WebViewGuest::UserAgentOverrideSet(const std::string& user_agent) { | |
| 780 content::NavigationController& controller = | |
| 781 guest_web_contents()->GetController(); | |
| 782 content::NavigationEntry* entry = controller.GetVisibleEntry(); | |
| 783 if (!entry) | |
| 784 return; | |
| 785 entry->SetIsOverridingUserAgent(!user_agent.empty()); | |
| 786 if (!attached()) { | |
| 787 // We cannot reload now because all resource loads are suspended until | |
| 788 // attachment. | |
| 789 pending_reload_on_attachment_ = true; | |
| 790 return; | |
| 791 } | |
| 792 guest_web_contents()->GetController().Reload(false); | |
| 793 } | |
| 794 | |
| 795 void WebViewGuest::LoadHandlerCalled() { | |
| 796 scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue()); | |
| 797 DispatchEvent(new GuestView::Event(webview::kEventContentLoad, args.Pass())); | |
| 798 } | |
| 799 | |
| 800 void WebViewGuest::LoadRedirect(const GURL& old_url, | |
| 801 const GURL& new_url, | |
| 802 bool is_top_level) { | |
| 803 scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue()); | |
| 804 args->SetBoolean(guestview::kIsTopLevel, is_top_level); | |
| 805 args->SetString(webview::kNewURL, new_url.spec()); | |
| 806 args->SetString(webview::kOldURL, old_url.spec()); | |
| 807 DispatchEvent(new GuestView::Event(webview::kEventLoadRedirect, args.Pass())); | |
| 808 } | |
| 809 | |
| 810 void WebViewGuest::AddWebViewToExtensionRendererState() { | |
| 811 const GURL& site_url = guest_web_contents()->GetSiteInstance()->GetSiteURL(); | |
| 812 std::string partition_domain; | |
| 813 std::string partition_id; | |
| 814 bool in_memory; | |
| 815 if (!GetGuestPartitionConfigForSite( | |
| 816 site_url, &partition_domain, &partition_id, &in_memory)) { | |
| 817 NOTREACHED(); | |
| 818 return; | |
| 819 } | |
| 820 DCHECK(embedder_extension_id() == partition_domain); | |
| 821 | |
| 822 ExtensionRendererState::WebViewInfo webview_info; | |
| 823 webview_info.embedder_process_id = embedder_render_process_id(); | |
| 824 webview_info.instance_id = view_instance_id(); | |
| 825 webview_info.partition_id = partition_id; | |
| 826 webview_info.embedder_extension_id = embedder_extension_id(); | |
| 827 | |
| 828 content::BrowserThread::PostTask( | |
| 829 content::BrowserThread::IO, FROM_HERE, | |
| 830 base::Bind( | |
| 831 &ExtensionRendererState::AddWebView, | |
| 832 base::Unretained(ExtensionRendererState::GetInstance()), | |
| 833 guest_web_contents()->GetRenderProcessHost()->GetID(), | |
| 834 guest_web_contents()->GetRoutingID(), | |
| 835 webview_info)); | |
| 836 } | |
| 837 | |
| 838 // static | |
| 839 void WebViewGuest::RemoveWebViewFromExtensionRendererState( | |
| 840 WebContents* web_contents) { | |
| 841 content::BrowserThread::PostTask( | |
| 842 content::BrowserThread::IO, FROM_HERE, | |
| 843 base::Bind( | |
| 844 &ExtensionRendererState::RemoveWebView, | |
| 845 base::Unretained(ExtensionRendererState::GetInstance()), | |
| 846 web_contents->GetRenderProcessHost()->GetID(), | |
| 847 web_contents->GetRoutingID())); | |
| 848 } | |
| 849 | |
| 850 GURL WebViewGuest::ResolveURL(const std::string& src) { | |
| 851 if (!in_extension()) { | |
| 852 NOTREACHED(); | |
| 853 return GURL(src); | |
| 854 } | |
| 855 | |
| 856 GURL default_url(base::StringPrintf("%s://%s/", | |
| 857 extensions::kExtensionScheme, | |
| 858 embedder_extension_id().c_str())); | |
| 859 return default_url.Resolve(src); | |
| 860 } | |
| 861 | |
| 862 void WebViewGuest::SizeChanged(const gfx::Size& old_size, | |
| 863 const gfx::Size& new_size) { | |
| 864 scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue()); | |
| 865 args->SetInteger(webview::kOldHeight, old_size.height()); | |
| 866 args->SetInteger(webview::kOldWidth, old_size.width()); | |
| 867 args->SetInteger(webview::kNewHeight, new_size.height()); | |
| 868 args->SetInteger(webview::kNewWidth, new_size.width()); | |
| 869 DispatchEvent(new GuestView::Event(webview::kEventSizeChanged, args.Pass())); | |
| 870 } | |
| 871 | |
| 872 void WebViewGuest::RequestMediaAccessPermission( | |
| 873 const content::MediaStreamRequest& request, | |
| 874 const content::MediaResponseCallback& callback) { | |
| 875 base::DictionaryValue request_info; | |
| 876 request_info.Set( | |
| 877 guestview::kUrl, | |
| 878 base::Value::CreateStringValue(request.security_origin.spec())); | |
| 879 RequestPermission(static_cast<BrowserPluginPermissionType>( | |
| 880 WEB_VIEW_PERMISSION_TYPE_MEDIA), | |
| 881 request_info, | |
| 882 base::Bind(&WebViewGuest::OnWebViewMediaPermissionResponse, | |
| 883 base::Unretained(this), | |
| 884 request, | |
| 885 callback), | |
| 886 false /* allowed_by_default */); | |
| 887 } | |
| 888 | |
| 889 void WebViewGuest::CanDownload( | |
| 890 const std::string& request_method, | |
| 891 const GURL& url, | |
| 892 const base::Callback<void(bool)>& callback) { | |
| 893 base::DictionaryValue request_info; | |
| 894 request_info.Set( | |
| 895 guestview::kUrl, | |
| 896 base::Value::CreateStringValue(url.spec())); | |
| 897 RequestPermission( | |
| 898 static_cast<BrowserPluginPermissionType>( | |
| 899 WEB_VIEW_PERMISSION_TYPE_DOWNLOAD), | |
| 900 request_info, | |
| 901 base::Bind(&WebViewGuest::OnWebViewDownloadPermissionResponse, | |
| 902 base::Unretained(this), | |
| 903 callback), | |
| 904 false /* allowed_by_default */); | |
| 905 } | |
| 906 | |
| 907 void WebViewGuest::RequestPointerLockPermission( | |
| 908 bool user_gesture, | |
| 909 bool last_unlocked_by_target, | |
| 910 const base::Callback<void(bool)>& callback) { | |
| 911 base::DictionaryValue request_info; | |
| 912 request_info.Set(guestview::kUserGesture, | |
| 913 base::Value::CreateBooleanValue(user_gesture)); | |
| 914 request_info.Set(webview::kLastUnlockedBySelf, | |
| 915 base::Value::CreateBooleanValue(last_unlocked_by_target)); | |
| 916 request_info.Set(guestview::kUrl, | |
| 917 base::Value::CreateStringValue( | |
| 918 guest_web_contents()->GetLastCommittedURL().spec())); | |
| 919 | |
| 920 RequestPermission( | |
| 921 static_cast<BrowserPluginPermissionType>( | |
| 922 WEB_VIEW_PERMISSION_TYPE_POINTER_LOCK), | |
| 923 request_info, | |
| 924 base::Bind(&WebViewGuest::OnWebViewPointerLockPermissionResponse, | |
| 925 base::Unretained(this), | |
| 926 callback), | |
| 927 false /* allowed_by_default */); | |
| 928 } | |
| 929 | |
| 930 content::JavaScriptDialogManager* | |
| 931 WebViewGuest::GetJavaScriptDialogManager() { | |
| 932 return &javascript_dialog_helper_; | |
| 933 } | |
| 934 | |
| 935 #if defined(OS_CHROMEOS) | |
| 936 void WebViewGuest::OnAccessibilityStatusChanged( | |
| 937 const chromeos::AccessibilityStatusEventDetails& details) { | |
| 938 if (details.notification_type == chromeos::ACCESSIBILITY_MANAGER_SHUTDOWN) { | |
| 939 accessibility_subscription_.reset(); | |
| 940 } else if (details.notification_type == | |
| 941 chromeos::ACCESSIBILITY_TOGGLE_SPOKEN_FEEDBACK) { | |
| 942 if (details.enabled) | |
| 943 InjectChromeVoxIfNeeded(guest_web_contents()->GetRenderViewHost()); | |
| 944 else | |
| 945 chromevox_injected_ = false; | |
| 946 } | |
| 947 } | |
| 948 #endif | |
| 949 | |
| 950 void WebViewGuest::InjectChromeVoxIfNeeded( | |
| 951 content::RenderViewHost* render_view_host) { | |
| 952 #if defined(OS_CHROMEOS) | |
| 953 if (!chromevox_injected_) { | |
| 954 chromeos::AccessibilityManager* manager = | |
| 955 chromeos::AccessibilityManager::Get(); | |
| 956 if (manager && manager->IsSpokenFeedbackEnabled()) { | |
| 957 manager->InjectChromeVox(render_view_host); | |
| 958 chromevox_injected_ = true; | |
| 959 } | |
| 960 } | |
| 961 #endif | |
| 962 } | |
| 963 | |
| 964 int WebViewGuest::RemoveBridgeID(int bridge_id) { | |
| 965 std::map<int, int>::iterator bridge_itr = | |
| 966 bridge_id_to_request_id_map_.find(bridge_id); | |
| 967 if (bridge_itr == bridge_id_to_request_id_map_.end()) | |
| 968 return webview::kInvalidPermissionRequestID; | |
| 969 | |
| 970 int request_id = bridge_itr->second; | |
| 971 bridge_id_to_request_id_map_.erase(bridge_itr); | |
| 972 return request_id; | |
| 973 } | |
| 974 | |
| 975 int WebViewGuest::RequestPermissionInternal( | |
| 976 BrowserPluginPermissionType permission_type, | |
| 977 const base::DictionaryValue& request_info, | |
| 978 const PermissionResponseCallback& callback, | |
| 979 bool allowed_by_default) { | |
| 980 // If there are too many pending permission requests then reject this request. | |
| 981 if (pending_permission_requests_.size() >= | |
| 982 webview::kMaxOutstandingPermissionRequests) { | |
| 983 // Let the stack unwind before we deny the permission request so that | |
| 984 // objects held by the permission request are not destroyed immediately | |
| 985 // after creation. This is to allow those same objects to be accessed again | |
| 986 // in the same scope without fear of use after freeing. | |
| 987 base::MessageLoop::current()->PostTask( | |
| 988 FROM_HERE, | |
| 989 base::Bind(&PermissionResponseCallback::Run, | |
| 990 base::Owned(new PermissionResponseCallback(callback)), | |
| 991 allowed_by_default, | |
| 992 std::string())); | |
| 993 return webview::kInvalidPermissionRequestID; | |
| 994 } | |
| 995 | |
| 996 int request_id = next_permission_request_id_++; | |
| 997 pending_permission_requests_[request_id] = | |
| 998 PermissionResponseInfo(callback, permission_type, allowed_by_default); | |
| 999 scoped_ptr<base::DictionaryValue> args(request_info.DeepCopy()); | |
| 1000 args->SetInteger(webview::kRequestId, request_id); | |
| 1001 switch (static_cast<int>(permission_type)) { | |
| 1002 case BROWSER_PLUGIN_PERMISSION_TYPE_NEW_WINDOW: { | |
| 1003 DispatchEvent(new GuestView::Event(webview::kEventNewWindow, | |
| 1004 args.Pass())); | |
| 1005 break; | |
| 1006 } | |
| 1007 case WEB_VIEW_PERMISSION_TYPE_JAVASCRIPT_DIALOG: { | |
| 1008 DispatchEvent(new GuestView::Event(webview::kEventDialog, | |
| 1009 args.Pass())); | |
| 1010 break; | |
| 1011 } | |
| 1012 default: { | |
| 1013 args->SetString(webview::kPermission, | |
| 1014 PermissionTypeToString(permission_type)); | |
| 1015 DispatchEvent(new GuestView::Event(webview::kEventPermissionRequest, | |
| 1016 args.Pass())); | |
| 1017 break; | |
| 1018 } | |
| 1019 } | |
| 1020 return request_id; | |
| 1021 } | |
| 1022 | |
| 1023 WebViewGuest::PermissionResponseInfo::PermissionResponseInfo() | |
| 1024 : permission_type(BROWSER_PLUGIN_PERMISSION_TYPE_UNKNOWN), | |
| 1025 allowed_by_default(false) { | |
| 1026 } | |
| 1027 | |
| 1028 WebViewGuest::PermissionResponseInfo::PermissionResponseInfo( | |
| 1029 const PermissionResponseCallback& callback, | |
| 1030 BrowserPluginPermissionType permission_type, | |
| 1031 bool allowed_by_default) | |
| 1032 : callback(callback), | |
| 1033 permission_type(permission_type), | |
| 1034 allowed_by_default(allowed_by_default) { | |
| 1035 } | |
| 1036 | |
| 1037 WebViewGuest::PermissionResponseInfo::~PermissionResponseInfo() { | |
| 1038 } | |
| OLD | NEW |