summaryrefslogtreecommitdiffstats
path: root/chrome_frame/protocol_sink_wrap.cc
diff options
context:
space:
mode:
authorrobertshield@chromium.org <robertshield@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2009-12-04 20:42:33 +0000
committerrobertshield@chromium.org <robertshield@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2009-12-04 20:42:33 +0000
commit723f2992cd897dc9c31e33994c49bd389bd800e1 (patch)
tree96383943a9e4ec925b6140085cff5f848715b4a8 /chrome_frame/protocol_sink_wrap.cc
parent1ded8cdc42869e312e55e7f14b6017d545b282d2 (diff)
downloadchromium_src-723f2992cd897dc9c31e33994c49bd389bd800e1.zip
chromium_src-723f2992cd897dc9c31e33994c49bd389bd800e1.tar.gz
chromium_src-723f2992cd897dc9c31e33994c49bd389bd800e1.tar.bz2
Limit the X-UA-Compatible HTTP header-based altering of the mime type performed by Chrome Frame to top-level requests only in IE.
BUG=having an iframe that requests a resource that includes the X-UA-Compatible header in the response will trigger CF taking over the page. TEST=BUG doesn't happen anymore. Review URL: http://codereview.chromium.org/465036 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@33849 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'chrome_frame/protocol_sink_wrap.cc')
-rw-r--r--chrome_frame/protocol_sink_wrap.cc49
1 files changed, 14 insertions, 35 deletions
diff --git a/chrome_frame/protocol_sink_wrap.cc b/chrome_frame/protocol_sink_wrap.cc
index 9888209..d4498299 100644
--- a/chrome_frame/protocol_sink_wrap.cc
+++ b/chrome_frame/protocol_sink_wrap.cc
@@ -70,10 +70,13 @@ ProtocolSinkWrap::ProtocolSinkWrap()
}
ProtocolSinkWrap::~ProtocolSinkWrap() {
- CComCritSecLock<CComAutoCriticalSection> lock(sink_map_lock_);
- DCHECK(sink_map_.end() != sink_map_.find(protocol_));
- sink_map_.erase(protocol_);
- protocol_ = NULL;
+ // This object may be destroyed before Initialize is called.
+ if (protocol_ != NULL) {
+ CComCritSecLock<CComAutoCriticalSection> lock(sink_map_lock_);
+ DCHECK(sink_map_.end() != sink_map_.find(protocol_));
+ sink_map_.erase(protocol_);
+ protocol_ = NULL;
+ }
DLOG(INFO) << "ProtocolSinkWrap: active sinks: " << sink_map_.size();
}
@@ -614,47 +617,23 @@ ScopedComPtr<IInternetProtocolSink> ProtocolSinkWrap::MaybeWrapSink(
IInternetProtocol* protocol, IInternetProtocolSink* prot_sink,
const wchar_t* url) {
ScopedComPtr<IInternetProtocolSink> sink_to_use(prot_sink);
- ScopedComPtr<IWebBrowser2> web_browser;
// FYI: GUID_NULL doesn't work when the URL is being loaded from history.
// asking for IID_IHttpNegotiate as the service id works, but
// getting the IWebBrowser2 interface still doesn't work.
ScopedComPtr<IHttpNegotiate> http_negotiate;
HRESULT hr = DoQueryService(GUID_NULL, prot_sink, http_negotiate.Receive());
- if (http_negotiate) {
- hr = DoQueryService(IID_ITargetFrame2, http_negotiate,
- web_browser.Receive());
- }
-
- if (web_browser) {
- // Do one more check to make sure we don't wrap requests that are
- // targeted to sub frames.
- // For a use case, see FullTabModeIE_SubIFrame and FullTabModeIE_SubFrame
- // unit tests.
-
- // Default should_wrap to true in case no window is available.
- // In that case this request is a top level request.
- bool should_wrap = true;
-
- ScopedComPtr<IHTMLWindow2> current_frame, parent_frame;
- hr = DoQueryService(IID_IHTMLWindow2, http_negotiate,
- current_frame.Receive());
- if (current_frame) {
- // Only the top level window will return self when get_parent is called.
- current_frame->get_parent(parent_frame.Receive());
- if (parent_frame != current_frame) {
- DLOG(INFO) << "Sub frame detected";
- should_wrap = false;
- }
- }
- if (should_wrap) {
- CComObject<ProtocolSinkWrap>* wrap = NULL;
- CComObject<ProtocolSinkWrap>::CreateInstance(&wrap);
- DCHECK(wrap);
+ if (http_negotiate && !IsSubFrameRequest(http_negotiate)) {
+ CComObject<ProtocolSinkWrap>* wrap = NULL;
+ CComObject<ProtocolSinkWrap>::CreateInstance(&wrap);
+ DCHECK(wrap);
+ if (wrap) {
+ wrap->AddRef();
if (wrap->Initialize(protocol, prot_sink, url)) {
sink_to_use = wrap;
}
+ wrap->Release();
}
}