| Index: chrome/browser/guest_view/web_view/web_view_guest.cc
|
| diff --git a/chrome/browser/guest_view/web_view/web_view_guest.cc b/chrome/browser/guest_view/web_view/web_view_guest.cc
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..98a606b615c2f775e9a2b6a0785677efe70ba07f
|
| --- /dev/null
|
| +++ b/chrome/browser/guest_view/web_view/web_view_guest.cc
|
| @@ -0,0 +1,1131 @@
|
| +// Copyright 2014 The Chromium Authors. All rights reserved.
|
| +// Use of this source code is governed by a BSD-style license that can be
|
| +// found in the LICENSE file.
|
| +
|
| +#include "chrome/browser/guest_view/web_view/web_view_guest.h"
|
| +
|
| +#include "base/message_loop/message_loop.h"
|
| +#include "base/strings/stringprintf.h"
|
| +#include "base/strings/utf_string_conversions.h"
|
| +#include "chrome/browser/extensions/api/web_request/web_request_api.h"
|
| +#include "chrome/browser/extensions/api/web_view/web_view_internal_api.h"
|
| +#include "chrome/browser/guest_view/web_view/chrome_web_view_guest_delegate.h"
|
| +#include "chrome/browser/guest_view/web_view/web_view_constants.h"
|
| +#include "chrome/browser/guest_view/web_view/web_view_permission_helper.h"
|
| +#include "chrome/browser/guest_view/web_view/web_view_permission_types.h"
|
| +#include "chrome/browser/guest_view/web_view/web_view_renderer_state.h"
|
| +#include "content/public/browser/browser_thread.h"
|
| +#include "content/public/browser/child_process_security_policy.h"
|
| +#include "content/public/browser/native_web_keyboard_event.h"
|
| +#include "content/public/browser/navigation_entry.h"
|
| +#include "content/public/browser/notification_details.h"
|
| +#include "content/public/browser/notification_service.h"
|
| +#include "content/public/browser/notification_source.h"
|
| +#include "content/public/browser/notification_types.h"
|
| +#include "content/public/browser/render_process_host.h"
|
| +#include "content/public/browser/render_view_host.h"
|
| +#include "content/public/browser/resource_request_details.h"
|
| +#include "content/public/browser/site_instance.h"
|
| +#include "content/public/browser/storage_partition.h"
|
| +#include "content/public/browser/user_metrics.h"
|
| +#include "content/public/browser/web_contents.h"
|
| +#include "content/public/browser/web_contents_delegate.h"
|
| +#include "content/public/common/media_stream_request.h"
|
| +#include "content/public/common/page_zoom.h"
|
| +#include "content/public/common/result_codes.h"
|
| +#include "content/public/common/stop_find_action.h"
|
| +#include "content/public/common/url_constants.h"
|
| +#include "extensions/browser/extension_system.h"
|
| +#include "extensions/browser/guest_view/guest_view_constants.h"
|
| +#include "extensions/browser/guest_view/guest_view_manager.h"
|
| +#include "extensions/common/constants.h"
|
| +#include "extensions/common/extension_messages.h"
|
| +#include "ipc/ipc_message_macros.h"
|
| +#include "net/base/escape.h"
|
| +#include "net/base/net_errors.h"
|
| +#include "third_party/WebKit/public/web/WebFindOptions.h"
|
| +#include "ui/base/models/simple_menu_model.h"
|
| +
|
| +using base::UserMetricsAction;
|
| +using content::RenderFrameHost;
|
| +using content::ResourceType;
|
| +using content::WebContents;
|
| +
|
| +namespace extensions {
|
| +
|
| +namespace {
|
| +
|
| +std::string WindowOpenDispositionToString(
|
| + WindowOpenDisposition window_open_disposition) {
|
| + switch (window_open_disposition) {
|
| + case IGNORE_ACTION:
|
| + return "ignore";
|
| + case SAVE_TO_DISK:
|
| + return "save_to_disk";
|
| + case CURRENT_TAB:
|
| + return "current_tab";
|
| + case NEW_BACKGROUND_TAB:
|
| + return "new_background_tab";
|
| + case NEW_FOREGROUND_TAB:
|
| + return "new_foreground_tab";
|
| + case NEW_WINDOW:
|
| + return "new_window";
|
| + case NEW_POPUP:
|
| + return "new_popup";
|
| + default:
|
| + NOTREACHED() << "Unknown Window Open Disposition";
|
| + return "ignore";
|
| + }
|
| +}
|
| +
|
| +static std::string TerminationStatusToString(base::TerminationStatus status) {
|
| + switch (status) {
|
| + case base::TERMINATION_STATUS_NORMAL_TERMINATION:
|
| + return "normal";
|
| + case base::TERMINATION_STATUS_ABNORMAL_TERMINATION:
|
| + case base::TERMINATION_STATUS_STILL_RUNNING:
|
| + return "abnormal";
|
| + case base::TERMINATION_STATUS_PROCESS_WAS_KILLED:
|
| + return "killed";
|
| + case base::TERMINATION_STATUS_PROCESS_CRASHED:
|
| + return "crashed";
|
| + case base::TERMINATION_STATUS_MAX_ENUM:
|
| + break;
|
| + }
|
| + NOTREACHED() << "Unknown Termination Status.";
|
| + return "unknown";
|
| +}
|
| +
|
| +std::string GetStoragePartitionIdFromSiteURL(const GURL& site_url) {
|
| + const std::string& partition_id = site_url.query();
|
| + bool persist_storage = site_url.path().find("persist") != std::string::npos;
|
| + return (persist_storage ? webview::kPersistPrefix : "") + partition_id;
|
| +}
|
| +
|
| +void RemoveWebViewEventListenersOnIOThread(
|
| + void* profile,
|
| + const std::string& extension_id,
|
| + int embedder_process_id,
|
| + int view_instance_id) {
|
| + DCHECK(content::BrowserThread::CurrentlyOn(content::BrowserThread::IO));
|
| + ExtensionWebRequestEventRouter::GetInstance()->RemoveWebViewEventListeners(
|
| + profile,
|
| + extension_id,
|
| + embedder_process_id,
|
| + view_instance_id);
|
| +}
|
| +
|
| +void ParsePartitionParam(const base::DictionaryValue& create_params,
|
| + std::string* storage_partition_id,
|
| + bool* persist_storage) {
|
| + std::string partition_str;
|
| + if (!create_params.GetString(webview::kStoragePartitionId, &partition_str)) {
|
| + return;
|
| + }
|
| +
|
| + // Since the "persist:" prefix is in ASCII, StartsWith will work fine on
|
| + // UTF-8 encoded |partition_id|. If the prefix is a match, we can safely
|
| + // remove the prefix without splicing in the middle of a multi-byte codepoint.
|
| + // We can use the rest of the string as UTF-8 encoded one.
|
| + if (StartsWithASCII(partition_str, "persist:", true)) {
|
| + size_t index = partition_str.find(":");
|
| + CHECK(index != std::string::npos);
|
| + // It is safe to do index + 1, since we tested for the full prefix above.
|
| + *storage_partition_id = partition_str.substr(index + 1);
|
| +
|
| + if (storage_partition_id->empty()) {
|
| + // TODO(lazyboy): Better way to deal with this error.
|
| + return;
|
| + }
|
| + *persist_storage = true;
|
| + } else {
|
| + *storage_partition_id = partition_str;
|
| + *persist_storage = false;
|
| + }
|
| +}
|
| +
|
| +} // namespace
|
| +
|
| +// static
|
| +GuestViewBase* WebViewGuest::Create(content::BrowserContext* browser_context,
|
| + int guest_instance_id) {
|
| + return new WebViewGuest(browser_context, guest_instance_id);
|
| +}
|
| +
|
| +// static
|
| +bool WebViewGuest::GetGuestPartitionConfigForSite(
|
| + const GURL& site,
|
| + std::string* partition_domain,
|
| + std::string* partition_name,
|
| + bool* in_memory) {
|
| + if (!site.SchemeIs(content::kGuestScheme))
|
| + return false;
|
| +
|
| + // Since guest URLs are only used for packaged apps, there must be an app
|
| + // id in the URL.
|
| + CHECK(site.has_host());
|
| + *partition_domain = site.host();
|
| + // Since persistence is optional, the path must either be empty or the
|
| + // literal string.
|
| + *in_memory = (site.path() != "/persist");
|
| + // The partition name is user supplied value, which we have encoded when the
|
| + // URL was created, so it needs to be decoded.
|
| + *partition_name =
|
| + net::UnescapeURLComponent(site.query(), net::UnescapeRule::NORMAL);
|
| + return true;
|
| +}
|
| +
|
| +// static
|
| +const char WebViewGuest::Type[] = "webview";
|
| +
|
| +// static
|
| +int WebViewGuest::GetViewInstanceId(WebContents* contents) {
|
| + WebViewGuest* guest = FromWebContents(contents);
|
| + if (!guest)
|
| + return guestview::kInstanceIDNone;
|
| +
|
| + return guest->view_instance_id();
|
| +}
|
| +
|
| +const char* WebViewGuest::GetAPINamespace() {
|
| + return webview::kAPINamespace;
|
| +}
|
| +
|
| +void WebViewGuest::CreateWebContents(
|
| + const std::string& embedder_extension_id,
|
| + int embedder_render_process_id,
|
| + const base::DictionaryValue& create_params,
|
| + const WebContentsCreatedCallback& callback) {
|
| + content::RenderProcessHost* embedder_render_process_host =
|
| + content::RenderProcessHost::FromID(embedder_render_process_id);
|
| + std::string storage_partition_id;
|
| + bool persist_storage = false;
|
| + std::string storage_partition_string;
|
| + ParsePartitionParam(create_params, &storage_partition_id, &persist_storage);
|
| + // Validate that the partition id coming from the renderer is valid UTF-8,
|
| + // since we depend on this in other parts of the code, such as FilePath
|
| + // creation. If the validation fails, treat it as a bad message and kill the
|
| + // renderer process.
|
| + if (!base::IsStringUTF8(storage_partition_id)) {
|
| + content::RecordAction(
|
| + base::UserMetricsAction("BadMessageTerminate_BPGM"));
|
| + base::KillProcess(
|
| + embedder_render_process_host->GetHandle(),
|
| + content::RESULT_CODE_KILLED_BAD_MESSAGE, false);
|
| + callback.Run(NULL);
|
| + return;
|
| + }
|
| + std::string url_encoded_partition = net::EscapeQueryParamValue(
|
| + storage_partition_id, false);
|
| + // The SiteInstance of a given webview tag is based on the fact that it's
|
| + // a guest process in addition to which platform application the tag
|
| + // belongs to and what storage partition is in use, rather than the URL
|
| + // that the tag is being navigated to.
|
| + GURL guest_site(base::StringPrintf("%s://%s/%s?%s",
|
| + content::kGuestScheme,
|
| + embedder_extension_id.c_str(),
|
| + persist_storage ? "persist" : "",
|
| + url_encoded_partition.c_str()));
|
| +
|
| + // If we already have a webview tag in the same app using the same storage
|
| + // partition, we should use the same SiteInstance so the existing tag and
|
| + // the new tag can script each other.
|
| + GuestViewManager* guest_view_manager =
|
| + GuestViewManager::FromBrowserContext(
|
| + embedder_render_process_host->GetBrowserContext());
|
| + content::SiteInstance* guest_site_instance =
|
| + guest_view_manager->GetGuestSiteInstance(guest_site);
|
| + if (!guest_site_instance) {
|
| + // Create the SiteInstance in a new BrowsingInstance, which will ensure
|
| + // that webview tags are also not allowed to send messages across
|
| + // different partitions.
|
| + guest_site_instance = content::SiteInstance::CreateForURL(
|
| + embedder_render_process_host->GetBrowserContext(), guest_site);
|
| + }
|
| + WebContents::CreateParams params(
|
| + embedder_render_process_host->GetBrowserContext(),
|
| + guest_site_instance);
|
| + params.guest_delegate = this;
|
| + callback.Run(WebContents::Create(params));
|
| +}
|
| +
|
| +void WebViewGuest::DidAttachToEmbedder() {
|
| + SetUpAutoSize();
|
| +
|
| + std::string name;
|
| + if (attach_params()->GetString(webview::kName, &name)) {
|
| + // If the guest window's name is empty, then the WebView tag's name is
|
| + // assigned. Otherwise, the guest window's name takes precedence over the
|
| + // WebView tag's name.
|
| + if (name_.empty())
|
| + name_ = name;
|
| + }
|
| + ReportFrameNameChange(name_);
|
| +
|
| + std::string user_agent_override;
|
| + if (attach_params()->GetString(webview::kParameterUserAgentOverride,
|
| + &user_agent_override)) {
|
| + SetUserAgentOverride(user_agent_override);
|
| + } else {
|
| + SetUserAgentOverride("");
|
| + }
|
| +
|
| + std::string src;
|
| + if (attach_params()->GetString("src", &src) && !src.empty())
|
| + NavigateGuest(src);
|
| +
|
| + if (GetOpener()) {
|
| + // We need to do a navigation here if the target URL has changed between
|
| + // the time the WebContents was created and the time it was attached.
|
| + // We also need to do an initial navigation if a RenderView was never
|
| + // created for the new window in cases where there is no referrer.
|
| + PendingWindowMap::iterator it =
|
| + GetOpener()->pending_new_windows_.find(this);
|
| + if (it != GetOpener()->pending_new_windows_.end()) {
|
| + const NewWindowInfo& new_window_info = it->second;
|
| + if (new_window_info.changed || !guest_web_contents()->HasOpener())
|
| + NavigateGuest(new_window_info.url.spec());
|
| + } else {
|
| + NOTREACHED();
|
| + }
|
| +
|
| + // Once a new guest is attached to the DOM of the embedder page, then the
|
| + // lifetime of the new guest is no longer managed by the opener guest.
|
| + GetOpener()->pending_new_windows_.erase(this);
|
| + }
|
| +}
|
| +
|
| +void WebViewGuest::DidInitialize() {
|
| + script_executor_.reset(
|
| + new ScriptExecutor(guest_web_contents(), &script_observers_));
|
| +
|
| + notification_registrar_.Add(
|
| + this, content::NOTIFICATION_LOAD_COMPLETED_MAIN_FRAME,
|
| + content::Source<WebContents>(guest_web_contents()));
|
| +
|
| + notification_registrar_.Add(
|
| + this, content::NOTIFICATION_RESOURCE_RECEIVED_REDIRECT,
|
| + content::Source<WebContents>(guest_web_contents()));
|
| +
|
| + if (web_view_guest_delegate_)
|
| + web_view_guest_delegate_->OnDidInitialize();
|
| + AttachWebViewHelpers(guest_web_contents());
|
| +}
|
| +
|
| +void WebViewGuest::AttachWebViewHelpers(WebContents* contents) {
|
| + if (web_view_guest_delegate_)
|
| + web_view_guest_delegate_->OnAttachWebViewHelpers(contents);
|
| + web_view_permission_helper_.reset(new WebViewPermissionHelper(this));
|
| +}
|
| +
|
| +void WebViewGuest::DidStopLoading() {
|
| + scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue());
|
| + DispatchEventToEmbedder(
|
| + new GuestViewBase::Event(webview::kEventLoadStop, args.Pass()));
|
| +}
|
| +
|
| +void WebViewGuest::EmbedderDestroyed() {
|
| + // TODO(fsamuel): WebRequest event listeners for <webview> should survive
|
| + // reparenting of a <webview> within a single embedder. Right now, we keep
|
| + // around the browser state for the listener for the lifetime of the embedder.
|
| + // Ideally, the lifetime of the listeners should match the lifetime of the
|
| + // <webview> DOM node. Once http://crbug.com/156219 is resolved we can move
|
| + // the call to RemoveWebViewEventListenersOnIOThread back to
|
| + // WebViewGuest::WebContentsDestroyed.
|
| + content::BrowserThread::PostTask(
|
| + content::BrowserThread::IO,
|
| + FROM_HERE,
|
| + base::Bind(
|
| + &RemoveWebViewEventListenersOnIOThread,
|
| + browser_context(), embedder_extension_id(),
|
| + embedder_render_process_id(),
|
| + view_instance_id()));
|
| +}
|
| +
|
| +void WebViewGuest::GuestDestroyed() {
|
| + // Clean up custom context menu items for this guest.
|
| + if (web_view_guest_delegate_)
|
| + web_view_guest_delegate_->OnGuestDestroyed();
|
| + RemoveWebViewStateFromIOThread(web_contents());
|
| +}
|
| +
|
| +void WebViewGuest::GuestReady() {
|
| + // The guest RenderView should always live in an isolated guest process.
|
| + CHECK(guest_web_contents()->GetRenderProcessHost()->IsIsolatedGuest());
|
| + Send(new ExtensionMsg_SetFrameName(
|
| + guest_web_contents()->GetRoutingID(), name_));
|
| +}
|
| +
|
| +void WebViewGuest::GuestSizeChangedDueToAutoSize(const gfx::Size& old_size,
|
| + const gfx::Size& new_size) {
|
| + scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue());
|
| + args->SetInteger(webview::kOldHeight, old_size.height());
|
| + args->SetInteger(webview::kOldWidth, old_size.width());
|
| + args->SetInteger(webview::kNewHeight, new_size.height());
|
| + args->SetInteger(webview::kNewWidth, new_size.width());
|
| + DispatchEventToEmbedder(
|
| + new GuestViewBase::Event(webview::kEventSizeChanged, args.Pass()));
|
| +}
|
| +
|
| +bool WebViewGuest::IsAutoSizeSupported() const {
|
| + return true;
|
| +}
|
| +
|
| +bool WebViewGuest::IsDragAndDropEnabled() const {
|
| + return true;
|
| +}
|
| +
|
| +void WebViewGuest::WillDestroy() {
|
| + if (!attached() && GetOpener())
|
| + GetOpener()->pending_new_windows_.erase(this);
|
| + DestroyUnattachedWindows();
|
| +}
|
| +
|
| +bool WebViewGuest::AddMessageToConsole(WebContents* source,
|
| + int32 level,
|
| + const base::string16& message,
|
| + int32 line_no,
|
| + const base::string16& source_id) {
|
| + scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue());
|
| + // Log levels are from base/logging.h: LogSeverity.
|
| + args->SetInteger(webview::kLevel, level);
|
| + args->SetString(webview::kMessage, message);
|
| + args->SetInteger(webview::kLine, line_no);
|
| + args->SetString(webview::kSourceId, source_id);
|
| + DispatchEventToEmbedder(
|
| + new GuestViewBase::Event(webview::kEventConsoleMessage, args.Pass()));
|
| + return true;
|
| +}
|
| +
|
| +void WebViewGuest::CloseContents(WebContents* source) {
|
| + scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue());
|
| + DispatchEventToEmbedder(
|
| + new GuestViewBase::Event(webview::kEventClose, args.Pass()));
|
| +}
|
| +
|
| +void WebViewGuest::FindReply(WebContents* source,
|
| + int request_id,
|
| + int number_of_matches,
|
| + const gfx::Rect& selection_rect,
|
| + int active_match_ordinal,
|
| + bool final_update) {
|
| + find_helper_.FindReply(request_id, number_of_matches, selection_rect,
|
| + active_match_ordinal, final_update);
|
| +}
|
| +
|
| +bool WebViewGuest::HandleContextMenu(
|
| + const content::ContextMenuParams& params) {
|
| + if (!web_view_guest_delegate_)
|
| + return false;
|
| + return web_view_guest_delegate_->HandleContextMenu(params);
|
| +}
|
| +
|
| +void WebViewGuest::HandleKeyboardEvent(
|
| + WebContents* source,
|
| + const content::NativeWebKeyboardEvent& event) {
|
| + if (!attached())
|
| + return;
|
| +
|
| + if (HandleKeyboardShortcuts(event))
|
| + return;
|
| +
|
| + // Send the unhandled keyboard events back to the embedder to reprocess them.
|
| + // TODO(fsamuel): This introduces the possibility of out-of-order keyboard
|
| + // events because the guest may be arbitrarily delayed when responding to
|
| + // keyboard events. In that time, the embedder may have received and processed
|
| + // additional key events. This needs to be fixed as soon as possible.
|
| + // See http://crbug.com/229882.
|
| + embedder_web_contents()->GetDelegate()->HandleKeyboardEvent(
|
| + web_contents(), event);
|
| +}
|
| +
|
| +void WebViewGuest::LoadProgressChanged(content::WebContents* source,
|
| + double progress) {
|
| + scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue());
|
| + args->SetString(guestview::kUrl, guest_web_contents()->GetURL().spec());
|
| + args->SetDouble(webview::kProgress, progress);
|
| + DispatchEventToEmbedder(
|
| + new GuestViewBase::Event(webview::kEventLoadProgress, args.Pass()));
|
| +}
|
| +
|
| +void WebViewGuest::LoadAbort(bool is_top_level,
|
| + const GURL& url,
|
| + const std::string& error_type) {
|
| + scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue());
|
| + args->SetBoolean(guestview::kIsTopLevel, is_top_level);
|
| + args->SetString(guestview::kUrl, url.possibly_invalid_spec());
|
| + args->SetString(guestview::kReason, error_type);
|
| + DispatchEventToEmbedder(
|
| + new GuestViewBase::Event(webview::kEventLoadAbort, args.Pass()));
|
| +}
|
| +
|
| +void WebViewGuest::OnFrameNameChanged(bool is_top_level,
|
| + const std::string& name) {
|
| + if (!is_top_level)
|
| + return;
|
| +
|
| + if (name_ == name)
|
| + return;
|
| +
|
| + ReportFrameNameChange(name);
|
| +}
|
| +
|
| +void WebViewGuest::CreateNewGuestWebViewWindow(
|
| + const content::OpenURLParams& params) {
|
| + GuestViewManager* guest_manager =
|
| + GuestViewManager::FromBrowserContext(browser_context());
|
| + // Set the attach params to use the same partition as the opener.
|
| + // We pull the partition information from the site's URL, which is of the
|
| + // form guest://site/{persist}?{partition_name}.
|
| + const GURL& site_url = guest_web_contents()->GetSiteInstance()->GetSiteURL();
|
| + const std::string storage_partition_id =
|
| + GetStoragePartitionIdFromSiteURL(site_url);
|
| + base::DictionaryValue create_params;
|
| + create_params.SetString(webview::kStoragePartitionId, storage_partition_id);
|
| +
|
| + guest_manager->CreateGuest(WebViewGuest::Type,
|
| + embedder_extension_id(),
|
| + embedder_web_contents(),
|
| + create_params,
|
| + base::Bind(&WebViewGuest::NewGuestWebViewCallback,
|
| + base::Unretained(this),
|
| + params));
|
| +}
|
| +
|
| +void WebViewGuest::NewGuestWebViewCallback(
|
| + const content::OpenURLParams& params,
|
| + content::WebContents* guest_web_contents) {
|
| + WebViewGuest* new_guest = WebViewGuest::FromWebContents(guest_web_contents);
|
| + new_guest->SetOpener(this);
|
| +
|
| + // Take ownership of |new_guest|.
|
| + pending_new_windows_.insert(
|
| + std::make_pair(new_guest, NewWindowInfo(params.url, std::string())));
|
| +
|
| + // Request permission to show the new window.
|
| + RequestNewWindowPermission(params.disposition, gfx::Rect(),
|
| + params.user_gesture,
|
| + new_guest->guest_web_contents());
|
| +}
|
| +
|
| +// TODO(fsamuel): Find a reliable way to test the 'responsive' and
|
| +// 'unresponsive' events.
|
| +void WebViewGuest::RendererResponsive(content::WebContents* source) {
|
| + scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue());
|
| + args->SetInteger(webview::kProcessId,
|
| + guest_web_contents()->GetRenderProcessHost()->GetID());
|
| + DispatchEventToEmbedder(
|
| + new GuestViewBase::Event(webview::kEventResponsive, args.Pass()));
|
| +}
|
| +
|
| +void WebViewGuest::RendererUnresponsive(content::WebContents* source) {
|
| + scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue());
|
| + args->SetInteger(webview::kProcessId,
|
| + guest_web_contents()->GetRenderProcessHost()->GetID());
|
| + DispatchEventToEmbedder(
|
| + new GuestViewBase::Event(webview::kEventUnresponsive, args.Pass()));
|
| +}
|
| +
|
| +void WebViewGuest::Observe(int type,
|
| + const content::NotificationSource& source,
|
| + const content::NotificationDetails& details) {
|
| + switch (type) {
|
| + case content::NOTIFICATION_LOAD_COMPLETED_MAIN_FRAME: {
|
| + DCHECK_EQ(content::Source<WebContents>(source).ptr(),
|
| + guest_web_contents());
|
| + if (content::Source<WebContents>(source).ptr() == guest_web_contents())
|
| + LoadHandlerCalled();
|
| + break;
|
| + }
|
| + case content::NOTIFICATION_RESOURCE_RECEIVED_REDIRECT: {
|
| + DCHECK_EQ(content::Source<WebContents>(source).ptr(),
|
| + guest_web_contents());
|
| + content::ResourceRedirectDetails* resource_redirect_details =
|
| + content::Details<content::ResourceRedirectDetails>(details).ptr();
|
| + bool is_top_level = resource_redirect_details->resource_type ==
|
| + content::RESOURCE_TYPE_MAIN_FRAME;
|
| + LoadRedirect(resource_redirect_details->url,
|
| + resource_redirect_details->new_url,
|
| + is_top_level);
|
| + break;
|
| + }
|
| + default:
|
| + NOTREACHED() << "Unexpected notification sent.";
|
| + break;
|
| + }
|
| +}
|
| +
|
| +double WebViewGuest::GetZoom() {
|
| + if (!web_view_guest_delegate_)
|
| + return 1.0;
|
| + return web_view_guest_delegate_->GetZoom();
|
| +}
|
| +
|
| +void WebViewGuest::Find(
|
| + const base::string16& search_text,
|
| + const blink::WebFindOptions& options,
|
| + scoped_refptr<WebViewInternalFindFunction> find_function) {
|
| + find_helper_.Find(guest_web_contents(), search_text, options, find_function);
|
| +}
|
| +
|
| +void WebViewGuest::StopFinding(content::StopFindAction action) {
|
| + find_helper_.CancelAllFindSessions();
|
| + guest_web_contents()->StopFinding(action);
|
| +}
|
| +
|
| +void WebViewGuest::Go(int relative_index) {
|
| + guest_web_contents()->GetController().GoToOffset(relative_index);
|
| +}
|
| +
|
| +void WebViewGuest::Reload() {
|
| + // TODO(fsamuel): Don't check for repost because we don't want to show
|
| + // Chromium's repost warning. We might want to implement a separate API
|
| + // for registering a callback if a repost is about to happen.
|
| + guest_web_contents()->GetController().Reload(false);
|
| +}
|
| +
|
| +void WebViewGuest::SetUserAgentOverride(
|
| + const std::string& user_agent_override) {
|
| + if (!attached())
|
| + return;
|
| + is_overriding_user_agent_ = !user_agent_override.empty();
|
| + if (is_overriding_user_agent_) {
|
| + content::RecordAction(UserMetricsAction("WebView.Guest.OverrideUA"));
|
| + }
|
| + guest_web_contents()->SetUserAgentOverride(user_agent_override);
|
| +}
|
| +
|
| +void WebViewGuest::Stop() {
|
| + guest_web_contents()->Stop();
|
| +}
|
| +
|
| +void WebViewGuest::Terminate() {
|
| + content::RecordAction(UserMetricsAction("WebView.Guest.Terminate"));
|
| + base::ProcessHandle process_handle =
|
| + guest_web_contents()->GetRenderProcessHost()->GetHandle();
|
| + if (process_handle)
|
| + base::KillProcess(process_handle, content::RESULT_CODE_KILLED, false);
|
| +}
|
| +
|
| +bool WebViewGuest::ClearData(const base::Time remove_since,
|
| + uint32 removal_mask,
|
| + const base::Closure& callback) {
|
| + content::RecordAction(UserMetricsAction("WebView.Guest.ClearData"));
|
| + content::StoragePartition* partition =
|
| + content::BrowserContext::GetStoragePartition(
|
| + guest_web_contents()->GetBrowserContext(),
|
| + guest_web_contents()->GetSiteInstance());
|
| +
|
| + if (!partition)
|
| + return false;
|
| +
|
| + partition->ClearData(
|
| + removal_mask,
|
| + content::StoragePartition::QUOTA_MANAGED_STORAGE_MASK_ALL,
|
| + GURL(),
|
| + content::StoragePartition::OriginMatcherFunction(),
|
| + remove_since,
|
| + base::Time::Now(),
|
| + callback);
|
| + return true;
|
| +}
|
| +
|
| +WebViewGuest::WebViewGuest(content::BrowserContext* browser_context,
|
| + int guest_instance_id)
|
| + : GuestView<WebViewGuest>(browser_context, guest_instance_id),
|
| + is_overriding_user_agent_(false),
|
| + find_helper_(this),
|
| + javascript_dialog_helper_(this) {
|
| + web_view_guest_delegate_.reset(new ChromeWebViewGuestDelegate(this));
|
| +}
|
| +
|
| +WebViewGuest::~WebViewGuest() {
|
| +}
|
| +
|
| +void WebViewGuest::DidCommitProvisionalLoadForFrame(
|
| + content::RenderFrameHost* render_frame_host,
|
| + const GURL& url,
|
| + content::PageTransition transition_type) {
|
| + find_helper_.CancelAllFindSessions();
|
| +
|
| + scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue());
|
| + args->SetString(guestview::kUrl, url.spec());
|
| + args->SetBoolean(guestview::kIsTopLevel, !render_frame_host->GetParent());
|
| + args->SetInteger(webview::kInternalCurrentEntryIndex,
|
| + guest_web_contents()->GetController().GetCurrentEntryIndex());
|
| + args->SetInteger(webview::kInternalEntryCount,
|
| + guest_web_contents()->GetController().GetEntryCount());
|
| + args->SetInteger(webview::kInternalProcessId,
|
| + guest_web_contents()->GetRenderProcessHost()->GetID());
|
| + DispatchEventToEmbedder(
|
| + new GuestViewBase::Event(webview::kEventLoadCommit, args.Pass()));
|
| + if (web_view_guest_delegate_) {
|
| + web_view_guest_delegate_->OnDidCommitProvisionalLoadForFrame(
|
| + !render_frame_host->GetParent());
|
| + }
|
| +}
|
| +
|
| +void WebViewGuest::DidFailProvisionalLoad(
|
| + content::RenderFrameHost* render_frame_host,
|
| + const GURL& validated_url,
|
| + int error_code,
|
| + const base::string16& error_description) {
|
| + LoadAbort(!render_frame_host->GetParent(), validated_url,
|
| + net::ErrorToShortString(error_code));
|
| +}
|
| +
|
| +void WebViewGuest::DidStartProvisionalLoadForFrame(
|
| + content::RenderFrameHost* render_frame_host,
|
| + const GURL& validated_url,
|
| + bool is_error_page,
|
| + bool is_iframe_srcdoc) {
|
| + scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue());
|
| + args->SetString(guestview::kUrl, validated_url.spec());
|
| + args->SetBoolean(guestview::kIsTopLevel, !render_frame_host->GetParent());
|
| + DispatchEventToEmbedder(
|
| + new GuestViewBase::Event(webview::kEventLoadStart, args.Pass()));
|
| +}
|
| +
|
| +void WebViewGuest::DocumentLoadedInFrame(
|
| + content::RenderFrameHost* render_frame_host) {
|
| + if (web_view_guest_delegate_)
|
| + web_view_guest_delegate_->OnDocumentLoadedInFrame(render_frame_host);
|
| +}
|
| +
|
| +bool WebViewGuest::OnMessageReceived(const IPC::Message& message,
|
| + RenderFrameHost* render_frame_host) {
|
| + bool handled = true;
|
| + IPC_BEGIN_MESSAGE_MAP(WebViewGuest, message)
|
| + IPC_MESSAGE_HANDLER(ExtensionHostMsg_FrameNameChanged, OnFrameNameChanged)
|
| + IPC_MESSAGE_UNHANDLED(handled = false)
|
| + IPC_END_MESSAGE_MAP()
|
| + return handled;
|
| +}
|
| +
|
| +void WebViewGuest::RenderProcessGone(base::TerminationStatus status) {
|
| + // Cancel all find sessions in progress.
|
| + find_helper_.CancelAllFindSessions();
|
| +
|
| + scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue());
|
| + args->SetInteger(webview::kProcessId,
|
| + guest_web_contents()->GetRenderProcessHost()->GetID());
|
| + args->SetString(webview::kReason, TerminationStatusToString(status));
|
| + DispatchEventToEmbedder(
|
| + new GuestViewBase::Event(webview::kEventExit, args.Pass()));
|
| +}
|
| +
|
| +void WebViewGuest::UserAgentOverrideSet(const std::string& user_agent) {
|
| + if (!attached())
|
| + return;
|
| + content::NavigationController& controller =
|
| + guest_web_contents()->GetController();
|
| + content::NavigationEntry* entry = controller.GetVisibleEntry();
|
| + if (!entry)
|
| + return;
|
| + entry->SetIsOverridingUserAgent(!user_agent.empty());
|
| + guest_web_contents()->GetController().Reload(false);
|
| +}
|
| +
|
| +void WebViewGuest::ReportFrameNameChange(const std::string& name) {
|
| + name_ = name;
|
| + scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue());
|
| + args->SetString(webview::kName, name);
|
| + DispatchEventToEmbedder(
|
| + new GuestViewBase::Event(webview::kEventFrameNameChanged, args.Pass()));
|
| +}
|
| +
|
| +void WebViewGuest::LoadHandlerCalled() {
|
| + scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue());
|
| + DispatchEventToEmbedder(
|
| + new GuestViewBase::Event(webview::kEventContentLoad, args.Pass()));
|
| +}
|
| +
|
| +void WebViewGuest::LoadRedirect(const GURL& old_url,
|
| + const GURL& new_url,
|
| + bool is_top_level) {
|
| + scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue());
|
| + args->SetBoolean(guestview::kIsTopLevel, is_top_level);
|
| + args->SetString(webview::kNewURL, new_url.spec());
|
| + args->SetString(webview::kOldURL, old_url.spec());
|
| + DispatchEventToEmbedder(
|
| + new GuestViewBase::Event(webview::kEventLoadRedirect, args.Pass()));
|
| +}
|
| +
|
| +void WebViewGuest::PushWebViewStateToIOThread() {
|
| + const GURL& site_url = guest_web_contents()->GetSiteInstance()->GetSiteURL();
|
| + std::string partition_domain;
|
| + std::string partition_id;
|
| + bool in_memory;
|
| + if (!GetGuestPartitionConfigForSite(
|
| + site_url, &partition_domain, &partition_id, &in_memory)) {
|
| + NOTREACHED();
|
| + return;
|
| + }
|
| + DCHECK(embedder_extension_id() == partition_domain);
|
| +
|
| + WebViewRendererState::WebViewInfo web_view_info;
|
| + web_view_info.embedder_process_id = embedder_render_process_id();
|
| + web_view_info.instance_id = view_instance_id();
|
| + web_view_info.partition_id = partition_id;
|
| + web_view_info.embedder_extension_id = embedder_extension_id();
|
| +
|
| + content::BrowserThread::PostTask(
|
| + content::BrowserThread::IO,
|
| + FROM_HERE,
|
| + base::Bind(&WebViewRendererState::AddGuest,
|
| + base::Unretained(WebViewRendererState::GetInstance()),
|
| + guest_web_contents()->GetRenderProcessHost()->GetID(),
|
| + guest_web_contents()->GetRoutingID(),
|
| + web_view_info));
|
| +}
|
| +
|
| +// static
|
| +void WebViewGuest::RemoveWebViewStateFromIOThread(
|
| + WebContents* web_contents) {
|
| + content::BrowserThread::PostTask(
|
| + content::BrowserThread::IO, FROM_HERE,
|
| + base::Bind(
|
| + &WebViewRendererState::RemoveGuest,
|
| + base::Unretained(WebViewRendererState::GetInstance()),
|
| + web_contents->GetRenderProcessHost()->GetID(),
|
| + web_contents->GetRoutingID()));
|
| +}
|
| +
|
| +content::WebContents* WebViewGuest::CreateNewGuestWindow(
|
| + const content::WebContents::CreateParams& create_params) {
|
| + GuestViewManager* guest_manager =
|
| + GuestViewManager::FromBrowserContext(browser_context());
|
| + return guest_manager->CreateGuestWithWebContentsParams(
|
| + WebViewGuest::Type,
|
| + embedder_extension_id(),
|
| + embedder_web_contents()->GetRenderProcessHost()->GetID(),
|
| + create_params);
|
| +}
|
| +
|
| +void WebViewGuest::RequestMediaAccessPermission(
|
| + content::WebContents* source,
|
| + const content::MediaStreamRequest& request,
|
| + const content::MediaResponseCallback& callback) {
|
| + web_view_permission_helper_->RequestMediaAccessPermission(source,
|
| + request,
|
| + callback);
|
| +}
|
| +
|
| +void WebViewGuest::CanDownload(
|
| + content::RenderViewHost* render_view_host,
|
| + const GURL& url,
|
| + const std::string& request_method,
|
| + const base::Callback<void(bool)>& callback) {
|
| + web_view_permission_helper_->CanDownload(render_view_host,
|
| + url,
|
| + request_method,
|
| + callback);
|
| +}
|
| +
|
| +void WebViewGuest::RequestPointerLockPermission(
|
| + bool user_gesture,
|
| + bool last_unlocked_by_target,
|
| + const base::Callback<void(bool)>& callback) {
|
| + web_view_permission_helper_->RequestPointerLockPermission(
|
| + user_gesture,
|
| + last_unlocked_by_target,
|
| + callback);
|
| +}
|
| +
|
| +void WebViewGuest::WillAttachToEmbedder() {
|
| + // We must install the mapping from guests to WebViews prior to resuming
|
| + // suspended resource loads so that the WebRequest API will catch resource
|
| + // requests.
|
| + PushWebViewStateToIOThread();
|
| +}
|
| +
|
| +content::JavaScriptDialogManager*
|
| + WebViewGuest::GetJavaScriptDialogManager() {
|
| + return &javascript_dialog_helper_;
|
| +}
|
| +
|
| +content::ColorChooser* WebViewGuest::OpenColorChooser(
|
| + WebContents* web_contents,
|
| + SkColor color,
|
| + const std::vector<content::ColorSuggestion>& suggestions) {
|
| + if (!attached() || !embedder_web_contents()->GetDelegate())
|
| + return NULL;
|
| + return embedder_web_contents()->GetDelegate()->OpenColorChooser(
|
| + web_contents, color, suggestions);
|
| +}
|
| +
|
| +void WebViewGuest::RunFileChooser(WebContents* web_contents,
|
| + const content::FileChooserParams& params) {
|
| + if (!attached() || !embedder_web_contents()->GetDelegate())
|
| + return;
|
| +
|
| + embedder_web_contents()->GetDelegate()->RunFileChooser(web_contents, params);
|
| +}
|
| +
|
| +void WebViewGuest::NavigateGuest(const std::string& src) {
|
| + GURL url = ResolveURL(src);
|
| +
|
| + // Do not allow navigating a guest to schemes other than known safe schemes.
|
| + // This will block the embedder trying to load unwanted schemes, e.g.
|
| + // chrome://settings.
|
| + bool scheme_is_blocked =
|
| + (!content::ChildProcessSecurityPolicy::GetInstance()->IsWebSafeScheme(
|
| + url.scheme()) &&
|
| + !url.SchemeIs(url::kAboutScheme)) ||
|
| + url.SchemeIs(url::kJavaScriptScheme);
|
| + if (scheme_is_blocked || !url.is_valid()) {
|
| + LoadAbort(true /* is_top_level */, url,
|
| + net::ErrorToShortString(net::ERR_ABORTED));
|
| + return;
|
| + }
|
| +
|
| + GURL validated_url(url);
|
| + guest_web_contents()->GetRenderProcessHost()->
|
| + FilterURL(false, &validated_url);
|
| + // As guests do not swap processes on navigation, only navigations to
|
| + // normal web URLs are supported. No protocol handlers are installed for
|
| + // other schemes (e.g., WebUI or extensions), and no permissions or bindings
|
| + // can be granted to the guest process.
|
| + LoadURLWithParams(validated_url,
|
| + content::Referrer(),
|
| + content::PAGE_TRANSITION_AUTO_TOPLEVEL,
|
| + guest_web_contents());
|
| +}
|
| +
|
| +bool WebViewGuest::HandleKeyboardShortcuts(
|
| + const content::NativeWebKeyboardEvent& event) {
|
| + if (event.type != blink::WebInputEvent::RawKeyDown)
|
| + return false;
|
| +
|
| + // If the user hits the escape key without any modifiers then unlock the
|
| + // mouse if necessary.
|
| + if ((event.windowsKeyCode == ui::VKEY_ESCAPE) &&
|
| + !(event.modifiers & blink::WebInputEvent::InputModifiers)) {
|
| + return guest_web_contents()->GotResponseToLockMouseRequest(false);
|
| + }
|
| +
|
| +#if defined(OS_MACOSX)
|
| + if (event.modifiers != blink::WebInputEvent::MetaKey)
|
| + return false;
|
| +
|
| + if (event.windowsKeyCode == ui::VKEY_OEM_4) {
|
| + Go(-1);
|
| + return true;
|
| + }
|
| +
|
| + if (event.windowsKeyCode == ui::VKEY_OEM_6) {
|
| + Go(1);
|
| + return true;
|
| + }
|
| +#else
|
| + if (event.windowsKeyCode == ui::VKEY_BROWSER_BACK) {
|
| + Go(-1);
|
| + return true;
|
| + }
|
| +
|
| + if (event.windowsKeyCode == ui::VKEY_BROWSER_FORWARD) {
|
| + Go(1);
|
| + return true;
|
| + }
|
| +#endif
|
| +
|
| + return false;
|
| +}
|
| +
|
| +void WebViewGuest::SetUpAutoSize() {
|
| + // Read the autosize parameters passed in from the embedder.
|
| + bool auto_size_enabled = false;
|
| + attach_params()->GetBoolean(webview::kAttributeAutoSize, &auto_size_enabled);
|
| +
|
| + int max_height = 0;
|
| + int max_width = 0;
|
| + attach_params()->GetInteger(webview::kAttributeMaxHeight, &max_height);
|
| + attach_params()->GetInteger(webview::kAttributeMaxWidth, &max_width);
|
| +
|
| + int min_height = 0;
|
| + int min_width = 0;
|
| + attach_params()->GetInteger(webview::kAttributeMinHeight, &min_height);
|
| + attach_params()->GetInteger(webview::kAttributeMinWidth, &min_width);
|
| +
|
| + // Call SetAutoSize to apply all the appropriate validation and clipping of
|
| + // values.
|
| + SetAutoSize(auto_size_enabled,
|
| + gfx::Size(min_width, min_height),
|
| + gfx::Size(max_width, max_height));
|
| +}
|
| +
|
| +void WebViewGuest::ShowContextMenu(
|
| + int request_id,
|
| + const WebViewGuestDelegate::MenuItemVector* items) {
|
| + if (web_view_guest_delegate_)
|
| + web_view_guest_delegate_->OnShowContextMenu(request_id, items);
|
| +}
|
| +
|
| +void WebViewGuest::SetName(const std::string& name) {
|
| + if (name_ == name)
|
| + return;
|
| + name_ = name;
|
| +
|
| + Send(new ExtensionMsg_SetFrameName(routing_id(), name_));
|
| +}
|
| +
|
| +void WebViewGuest::SetZoom(double zoom_factor) {
|
| + if (web_view_guest_delegate_)
|
| + web_view_guest_delegate_->OnSetZoom(zoom_factor);
|
| +}
|
| +
|
| +void WebViewGuest::AddNewContents(content::WebContents* source,
|
| + content::WebContents* new_contents,
|
| + WindowOpenDisposition disposition,
|
| + const gfx::Rect& initial_pos,
|
| + bool user_gesture,
|
| + bool* was_blocked) {
|
| + if (was_blocked)
|
| + *was_blocked = false;
|
| + RequestNewWindowPermission(disposition,
|
| + initial_pos,
|
| + user_gesture,
|
| + new_contents);
|
| +}
|
| +
|
| +content::WebContents* WebViewGuest::OpenURLFromTab(
|
| + content::WebContents* source,
|
| + const content::OpenURLParams& params) {
|
| + // If the guest wishes to navigate away prior to attachment then we save the
|
| + // navigation to perform upon attachment. Navigation initializes a lot of
|
| + // state that assumes an embedder exists, such as RenderWidgetHostViewGuest.
|
| + // Navigation also resumes resource loading which we don't want to allow
|
| + // until attachment.
|
| + if (!attached()) {
|
| + WebViewGuest* opener = GetOpener();
|
| + PendingWindowMap::iterator it =
|
| + opener->pending_new_windows_.find(this);
|
| + if (it == opener->pending_new_windows_.end())
|
| + return NULL;
|
| + const NewWindowInfo& info = it->second;
|
| + NewWindowInfo new_window_info(params.url, info.name);
|
| + new_window_info.changed = new_window_info.url != info.url;
|
| + it->second = new_window_info;
|
| + return NULL;
|
| + }
|
| + if (params.disposition == CURRENT_TAB) {
|
| + // This can happen for cross-site redirects.
|
| + LoadURLWithParams(params.url, params.referrer, params.transition, source);
|
| + return source;
|
| + }
|
| +
|
| + CreateNewGuestWebViewWindow(params);
|
| + return NULL;
|
| +}
|
| +
|
| +void WebViewGuest::WebContentsCreated(WebContents* source_contents,
|
| + int opener_render_frame_id,
|
| + const base::string16& frame_name,
|
| + const GURL& target_url,
|
| + content::WebContents* new_contents) {
|
| + WebViewGuest* guest = WebViewGuest::FromWebContents(new_contents);
|
| + CHECK(guest);
|
| + guest->SetOpener(this);
|
| + std::string guest_name = base::UTF16ToUTF8(frame_name);
|
| + guest->name_ = guest_name;
|
| + pending_new_windows_.insert(
|
| + std::make_pair(guest, NewWindowInfo(target_url, guest_name)));
|
| +}
|
| +
|
| +void WebViewGuest::LoadURLWithParams(const GURL& url,
|
| + const content::Referrer& referrer,
|
| + content::PageTransition transition_type,
|
| + content::WebContents* web_contents) {
|
| + content::NavigationController::LoadURLParams load_url_params(url);
|
| + load_url_params.referrer = referrer;
|
| + load_url_params.transition_type = transition_type;
|
| + load_url_params.extra_headers = std::string();
|
| + if (is_overriding_user_agent_) {
|
| + load_url_params.override_user_agent =
|
| + content::NavigationController::UA_OVERRIDE_TRUE;
|
| + }
|
| + web_contents->GetController().LoadURLWithParams(load_url_params);
|
| +}
|
| +
|
| +void WebViewGuest::RequestNewWindowPermission(
|
| + WindowOpenDisposition disposition,
|
| + const gfx::Rect& initial_bounds,
|
| + bool user_gesture,
|
| + content::WebContents* new_contents) {
|
| + WebViewGuest* guest = WebViewGuest::FromWebContents(new_contents);
|
| + if (!guest)
|
| + return;
|
| + PendingWindowMap::iterator it = pending_new_windows_.find(guest);
|
| + if (it == pending_new_windows_.end())
|
| + return;
|
| + const NewWindowInfo& new_window_info = it->second;
|
| +
|
| + // Retrieve the opener partition info if we have it.
|
| + const GURL& site_url = new_contents->GetSiteInstance()->GetSiteURL();
|
| + std::string storage_partition_id = GetStoragePartitionIdFromSiteURL(site_url);
|
| +
|
| + base::DictionaryValue request_info;
|
| + request_info.SetInteger(webview::kInitialHeight, initial_bounds.height());
|
| + request_info.SetInteger(webview::kInitialWidth, initial_bounds.width());
|
| + request_info.Set(webview::kTargetURL,
|
| + new base::StringValue(new_window_info.url.spec()));
|
| + request_info.Set(webview::kName, new base::StringValue(new_window_info.name));
|
| + request_info.SetInteger(webview::kWindowID, guest->guest_instance_id());
|
| + // We pass in partition info so that window-s created through newwindow
|
| + // API can use it to set their partition attribute.
|
| + request_info.Set(webview::kStoragePartitionId,
|
| + new base::StringValue(storage_partition_id));
|
| + request_info.Set(
|
| + webview::kWindowOpenDisposition,
|
| + new base::StringValue(WindowOpenDispositionToString(disposition)));
|
| +
|
| + web_view_permission_helper_->
|
| + RequestPermission(WEB_VIEW_PERMISSION_TYPE_NEW_WINDOW,
|
| + request_info,
|
| + base::Bind(&WebViewGuest::OnWebViewNewWindowResponse,
|
| + base::Unretained(this),
|
| + guest->guest_instance_id()),
|
| + false /* allowed_by_default */);
|
| +}
|
| +
|
| +void WebViewGuest::DestroyUnattachedWindows() {
|
| + // Destroy() reaches in and removes the WebViewGuest from its opener's
|
| + // pending_new_windows_ set. To avoid mutating the set while iterating, we
|
| + // create a copy of the pending new windows set and iterate over the copy.
|
| + PendingWindowMap pending_new_windows(pending_new_windows_);
|
| + // Clean up unattached new windows opened by this guest.
|
| + for (PendingWindowMap::const_iterator it = pending_new_windows.begin();
|
| + it != pending_new_windows.end(); ++it) {
|
| + it->first->Destroy();
|
| + }
|
| + // All pending windows should be removed from the set after Destroy() is
|
| + // called on all of them.
|
| + DCHECK(pending_new_windows_.empty());
|
| +}
|
| +
|
| +GURL WebViewGuest::ResolveURL(const std::string& src) {
|
| + if (!in_extension()) {
|
| + NOTREACHED();
|
| + return GURL(src);
|
| + }
|
| +
|
| + GURL default_url(base::StringPrintf("%s://%s/",
|
| + kExtensionScheme,
|
| + embedder_extension_id().c_str()));
|
| + return default_url.Resolve(src);
|
| +}
|
| +
|
| +void WebViewGuest::OnWebViewNewWindowResponse(
|
| + int new_window_instance_id,
|
| + bool allow,
|
| + const std::string& user_input) {
|
| + WebViewGuest* guest =
|
| + WebViewGuest::From(embedder_render_process_id(), new_window_instance_id);
|
| + if (!guest)
|
| + return;
|
| +
|
| + if (!allow)
|
| + guest->Destroy();
|
| +}
|
| +
|
| +} // namespace extensions
|
|
|