OLD | NEW |
1 /* | 1 /* |
2 * Copyright (C) 2006, 2007, 2008, 2009, 2010, 2011 Apple Inc. All rights reserv
ed. | 2 * Copyright (C) 2006, 2007, 2008, 2009, 2010, 2011 Apple Inc. All rights reserv
ed. |
3 * Copyright (C) 2008 Nokia Corporation and/or its subsidiary(-ies) | 3 * Copyright (C) 2008 Nokia Corporation and/or its subsidiary(-ies) |
4 * Copyright (C) 2008, 2009 Torch Mobile Inc. All rights reserved. (http://www.t
orchmobile.com/) | 4 * Copyright (C) 2008, 2009 Torch Mobile Inc. All rights reserved. (http://www.t
orchmobile.com/) |
5 * Copyright (C) 2008 Alp Toker <alp@atoker.com> | 5 * Copyright (C) 2008 Alp Toker <alp@atoker.com> |
6 * Copyright (C) Research In Motion Limited 2009. All rights reserved. | 6 * Copyright (C) Research In Motion Limited 2009. All rights reserved. |
7 * Copyright (C) 2011 Kris Jordan <krisjordan@gmail.com> | 7 * Copyright (C) 2011 Kris Jordan <krisjordan@gmail.com> |
8 * Copyright (C) 2011 Google Inc. All rights reserved. | 8 * Copyright (C) 2011 Google Inc. All rights reserved. |
9 * | 9 * |
10 * Redistribution and use in source and binary forms, with or without | 10 * Redistribution and use in source and binary forms, with or without |
(...skipping 799 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
810 if (formData) { | 810 if (formData) { |
811 request.setHTTPMethod("POST"); | 811 request.setHTTPMethod("POST"); |
812 request.setHTTPBody(formData); | 812 request.setHTTPBody(formData); |
813 request.setHTTPContentType(item->formContentType()); | 813 request.setHTTPContentType(item->formContentType()); |
814 RefPtr<SecurityOrigin> securityOrigin = SecurityOrigin::createFromString
(item->referrer().referrer); | 814 RefPtr<SecurityOrigin> securityOrigin = SecurityOrigin::createFromString
(item->referrer().referrer); |
815 request.addHTTPOriginIfNeeded(securityOrigin->toAtomicString()); | 815 request.addHTTPOriginIfNeeded(securityOrigin->toAtomicString()); |
816 } | 816 } |
817 return request; | 817 return request; |
818 } | 818 } |
819 | 819 |
820 void FrameLoader::reload(ReloadPolicy reloadPolicy, const KURL& overrideURL, con
st AtomicString& overrideEncoding) | 820 void FrameLoader::reload(ReloadPolicy reloadPolicy, const KURL& overrideURL, con
st AtomicString& overrideEncoding, ClientRedirectPolicy clientRedirectPolicy) |
821 { | 821 { |
822 if (!m_currentItem) | 822 if (!m_currentItem) |
823 return; | 823 return; |
824 | 824 |
825 ResourceRequestCachePolicy cachePolicy = reloadPolicy == EndToEndReload ? Re
loadBypassingCache : ReloadIgnoringCacheData; | 825 ResourceRequestCachePolicy cachePolicy = reloadPolicy == EndToEndReload ? Re
loadBypassingCache : ReloadIgnoringCacheData; |
826 ResourceRequest request = requestFromHistoryItem(m_currentItem.get(), cacheP
olicy); | 826 ResourceRequest request = requestFromHistoryItem(m_currentItem.get(), cacheP
olicy); |
827 request.setFrameType(m_frame->isMainFrame() ? WebURLRequest::FrameTypeTopLev
el : WebURLRequest::FrameTypeNested); | 827 request.setFrameType(m_frame->isMainFrame() ? WebURLRequest::FrameTypeTopLev
el : WebURLRequest::FrameTypeNested); |
828 request.setRequestContext(WebURLRequest::RequestContextInternal); | 828 request.setRequestContext(WebURLRequest::RequestContextInternal); |
| 829 |
| 830 // ClientRedirectPolicy is an indication that this load was triggered by |
| 831 // some direct interaction with the page. If this reload is not a client |
| 832 // redirect, we should reuse the referrer from the original load of the |
| 833 // current document. If this reload is a client redirect (e.g., location.rel
oad()), |
| 834 // it was initiated by something in the current document and should |
| 835 // therefore show the current document's url as the referrer. |
| 836 if (clientRedirectPolicy == ClientRedirect) |
| 837 request.setHTTPReferrer(Referrer(m_frame->document()->outgoingReferrer()
, m_frame->document()->referrerPolicy())); |
| 838 |
829 if (!overrideURL.isEmpty()) { | 839 if (!overrideURL.isEmpty()) { |
830 request.setURL(overrideURL); | 840 request.setURL(overrideURL); |
831 request.clearHTTPReferrer(); | 841 request.clearHTTPReferrer(); |
832 } | 842 } |
833 | 843 |
834 FrameLoadType type = reloadPolicy == EndToEndReload ? FrameLoadTypeReloadFro
mOrigin : FrameLoadTypeReload; | 844 FrameLoadType type = reloadPolicy == EndToEndReload ? FrameLoadTypeReloadFro
mOrigin : FrameLoadTypeReload; |
835 loadWithNavigationAction(NavigationAction(request, type), type, nullptr, Sub
stituteData(), CheckContentSecurityPolicy, NotClientRedirect, overrideEncoding); | 845 loadWithNavigationAction(NavigationAction(request, type), type, nullptr, Sub
stituteData(), CheckContentSecurityPolicy, clientRedirectPolicy, overrideEncodin
g); |
836 } | 846 } |
837 | 847 |
838 void FrameLoader::stopAllLoaders() | 848 void FrameLoader::stopAllLoaders() |
839 { | 849 { |
840 if (m_frame->document()->pageDismissalEventBeingDispatched() != Document::No
Dismissal) | 850 if (m_frame->document()->pageDismissalEventBeingDispatched() != Document::No
Dismissal) |
841 return; | 851 return; |
842 | 852 |
843 // If this method is called from within this method, infinite recursion can
occur (3442218). Avoid this. | 853 // If this method is called from within this method, infinite recursion can
occur (3442218). Avoid this. |
844 if (m_inStopAllLoaders) | 854 if (m_inStopAllLoaders) |
845 return; | 855 return; |
(...skipping 669 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
1515 // FIXME: We need a way to propagate sandbox flags to out-of-process frames. | 1525 // FIXME: We need a way to propagate sandbox flags to out-of-process frames. |
1516 Frame* parentFrame = m_frame->tree().parent(); | 1526 Frame* parentFrame = m_frame->tree().parent(); |
1517 if (parentFrame && parentFrame->isLocalFrame()) | 1527 if (parentFrame && parentFrame->isLocalFrame()) |
1518 flags |= toLocalFrame(parentFrame)->document()->sandboxFlags(); | 1528 flags |= toLocalFrame(parentFrame)->document()->sandboxFlags(); |
1519 if (FrameOwner* frameOwner = m_frame->owner()) | 1529 if (FrameOwner* frameOwner = m_frame->owner()) |
1520 flags |= frameOwner->sandboxFlags(); | 1530 flags |= frameOwner->sandboxFlags(); |
1521 return flags; | 1531 return flags; |
1522 } | 1532 } |
1523 | 1533 |
1524 } // namespace blink | 1534 } // namespace blink |
OLD | NEW |