summaryrefslogtreecommitdiffstats
path: root/content
diff options
context:
space:
mode:
authorjam@chromium.org <jam@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2011-03-18 19:57:02 +0000
committerjam@chromium.org <jam@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2011-03-18 19:57:02 +0000
commit6e24cf16fe291a8a1eae87f89538a76d690cd98f (patch)
tree64fbe2d30de5aa3b2cfe098e45928d5e5582a841 /content
parentaac169d29b5e92211ba31192659260f63036dcf8 (diff)
downloadchromium_src-6e24cf16fe291a8a1eae87f89538a76d690cd98f.zip
chromium_src-6e24cf16fe291a8a1eae87f89538a76d690cd98f.tar.gz
chromium_src-6e24cf16fe291a8a1eae87f89538a76d690cd98f.tar.bz2
Move RenderView to content. I've added a new method to ContentRendererClient to determine the text language. This is only temporary, since the surrounding code should itself be moved out of RenderView.
TBR=avi Review URL: http://codereview.chromium.org/6709038 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@78738 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'content')
-rw-r--r--content/content_renderer.gypi3
-rw-r--r--content/renderer/content_renderer_client.cc4
-rw-r--r--content/renderer/content_renderer_client.h4
-rw-r--r--content/renderer/render_view.cc5424
-rw-r--r--content/renderer/render_view.h1440
5 files changed, 6875 insertions, 0 deletions
diff --git a/content/content_renderer.gypi b/content/content_renderer.gypi
index 51b4365..2f78f13 100644
--- a/content/content_renderer.gypi
+++ b/content/content_renderer.gypi
@@ -13,6 +13,7 @@
'../ppapi/ppapi.gyp:ppapi_proxy',
'../skia/skia.gyp:skia',
'../third_party/ffmpeg/ffmpeg.gyp:ffmpeg',
+ '../third_party/icu/icu.gyp:icuuc',
'../third_party/libjingle/libjingle.gyp:libjingle',
'../third_party/npapi/npapi.gyp:npapi',
],
@@ -72,6 +73,8 @@
'renderer/pepper_plugin_delegate_impl.h',
'renderer/plugin_channel_host.cc',
'renderer/plugin_channel_host.h',
+ 'renderer/render_view.cc',
+ 'renderer/render_view.h',
'renderer/render_widget.cc',
'renderer/render_widget.h',
'renderer/render_widget_fullscreen.cc',
diff --git a/content/renderer/content_renderer_client.cc b/content/renderer/content_renderer_client.cc
index 61ec4ce..b06acad 100644
--- a/content/renderer/content_renderer_client.cc
+++ b/content/renderer/content_renderer_client.cc
@@ -27,4 +27,8 @@ std::string ContentRendererClient::GetNavigationErrorHtml(
return std::string();
}
+std::string ContentRendererClient::DetermineTextLanguage(const string16& text) {
+ return std::string();
+}
+
} // namespace content
diff --git a/content/renderer/content_renderer_client.h b/content/renderer/content_renderer_client.h
index 2950026..4f41a78 100644
--- a/content/renderer/content_renderer_client.h
+++ b/content/renderer/content_renderer_client.h
@@ -8,6 +8,7 @@
#include <string>
+#include "base/string16.h"
#include "content/common/content_client.h"
class RenderView;
@@ -38,6 +39,9 @@ class ContentRendererClient {
virtual std::string GetNavigationErrorHtml(
const WebKit::WebURLRequest& failed_request,
const WebKit::WebURLError& error);
+ // Returns the ISO 639_1 language code of the specified |text|, or 'unknown'
+ // if it failed.
+ virtual std::string DetermineTextLanguage(const string16& text);
};
} // namespace content
diff --git a/content/renderer/render_view.cc b/content/renderer/render_view.cc
new file mode 100644
index 0000000..64303eb
--- /dev/null
+++ b/content/renderer/render_view.cc
@@ -0,0 +1,5424 @@
+// Copyright (c) 2011 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include "content/renderer/render_view.h"
+
+#include <algorithm>
+#include <cmath>
+#include <string>
+#include <vector>
+
+#include "base/callback.h"
+#include "base/command_line.h"
+#include "base/compiler_specific.h"
+#include "base/lazy_instance.h"
+#include "base/metrics/histogram.h"
+#include "base/path_service.h"
+#include "base/process_util.h"
+#include "base/string_piece.h"
+#include "base/string_util.h"
+#include "base/sys_string_conversions.h"
+#include "base/time.h"
+#include "base/utf_string_conversions.h"
+#include "build/build_config.h"
+#include "chrome/common/autofill_messages.h"
+#include "chrome/common/bindings_policy.h"
+#include "chrome/common/child_process_logging.h"
+#include "chrome/common/chrome_constants.h"
+#include "chrome/common/chrome_paths.h"
+#include "chrome/common/chrome_switches.h"
+#include "chrome/common/extensions/extension.h"
+#include "chrome/common/extensions/extension_constants.h"
+#include "chrome/common/extensions/extension_set.h"
+#include "chrome/common/json_value_serializer.h"
+#include "chrome/common/pepper_plugin_registry.h"
+#include "chrome/common/render_messages.h"
+#include "chrome/common/render_messages_params.h"
+#include "chrome/common/render_view_commands.h"
+#include "chrome/common/renderer_preferences.h"
+#include "chrome/common/thumbnail_score.h"
+#include "chrome/common/url_constants.h"
+#include "chrome/common/web_apps.h"
+#include "chrome/common/window_container_type.h"
+#include "chrome/renderer/about_handler.h"
+#include "chrome/renderer/autofill/autofill_agent.h"
+#include "chrome/renderer/autofill/form_manager.h"
+#include "chrome/renderer/autofill/password_autofill_manager.h"
+#include "chrome/renderer/automation/dom_automation_controller.h"
+#include "chrome/renderer/devtools_agent.h"
+#include "chrome/renderer/devtools_client.h"
+#include "chrome/renderer/extension_groups.h"
+#include "chrome/renderer/extensions/bindings_utils.h"
+#include "chrome/renderer/extensions/event_bindings.h"
+#include "chrome/renderer/extensions/extension_process_bindings.h"
+#include "chrome/renderer/extensions/extension_resource_request_policy.h"
+#include "chrome/renderer/extensions/renderer_extension_bindings.h"
+#include "chrome/renderer/external_host_bindings.h"
+#include "chrome/renderer/external_popup_menu.h"
+#include "chrome/renderer/localized_error.h"
+#include "chrome/renderer/page_click_tracker.h"
+#include "chrome/renderer/page_load_histograms.h"
+#include "chrome/renderer/print_web_view_helper.h"
+#include "chrome/renderer/render_process.h"
+#include "chrome/renderer/render_thread.h"
+#include "chrome/renderer/render_view_observer.h"
+#include "chrome/renderer/render_view_visitor.h"
+#include "chrome/renderer/safe_browsing/malware_dom_details.h"
+#include "chrome/renderer/safe_browsing/phishing_classifier_delegate.h"
+#include "chrome/renderer/searchbox.h"
+#include "chrome/renderer/spellchecker/spellcheck.h"
+#include "chrome/renderer/spellchecker/spellcheck_provider.h"
+#include "chrome/renderer/translate_helper.h"
+#include "chrome/renderer/user_script_idle_scheduler.h"
+#include "chrome/renderer/user_script_slave.h"
+#include "chrome/renderer/visitedlink_slave.h"
+#include "content/common/appcache/appcache_dispatcher.h"
+#include "content/common/clipboard_messages.h"
+#include "content/common/content_constants.h"
+#include "content/common/database_messages.h"
+#include "content/common/file_system/file_system_dispatcher.h"
+#include "content/common/file_system/webfilesystem_callback_dispatcher.h"
+#include "content/common/notification_service.h"
+#include "content/common/page_zoom.h"
+#include "content/common/pepper_messages.h"
+#include "content/renderer/audio_message_filter.h"
+#include "content/renderer/content_renderer_client.h"
+#include "content/renderer/device_orientation_dispatcher.h"
+#include "content/renderer/geolocation_dispatcher.h"
+#include "content/renderer/ggl.h"
+#include "content/renderer/load_progress_tracker.h"
+#include "content/renderer/media/audio_renderer_impl.h"
+#include "content/renderer/media/ipc_video_decoder.h"
+#include "content/renderer/navigation_state.h"
+#include "content/renderer/notification_provider.h"
+#include "content/renderer/p2p/socket_dispatcher.h"
+#include "content/renderer/plugin_channel_host.h"
+#include "content/renderer/renderer_webapplicationcachehost_impl.h"
+#include "content/renderer/renderer_webstoragenamespace_impl.h"
+#include "content/renderer/render_widget_fullscreen.h"
+#include "content/renderer/render_widget_fullscreen_pepper.h"
+#include "content/renderer/speech_input_dispatcher.h"
+#include "content/renderer/webgraphicscontext3d_command_buffer_impl.h"
+#include "content/renderer/webplugin_delegate_proxy.h"
+#include "content/renderer/websharedworker_proxy.h"
+#include "content/renderer/webworker_proxy.h"
+#include "content/renderer/web_ui_bindings.h"
+#include "media/base/filter_collection.h"
+#include "media/base/media_switches.h"
+#include "media/base/message_loop_factory_impl.h"
+#include "net/base/data_url.h"
+#include "net/base/escape.h"
+#include "net/base/net_errors.h"
+#include "net/http/http_util.h"
+#include "ppapi/c/private/ppb_flash_net_connector.h"
+#include "skia/ext/bitmap_platform_device.h"
+#include "skia/ext/image_operations.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebAccessibilityCache.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebAccessibilityObject.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebCString.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebDataSource.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebDevToolsAgent.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebDocument.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebDragData.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebElement.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebFileChooserParams.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebFileSystem.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebFileSystemCallbacks.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebFindOptions.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebFormControlElement.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebFormElement.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebFrame.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebGraphicsContext3D.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebHistoryItem.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebImage.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebInputElement.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebMediaPlayerAction.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebNetworkStateNotifier.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebNode.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebNodeList.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebPageSerializer.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebPlugin.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebPluginContainer.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebPluginDocument.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebPluginParams.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebPoint.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebRange.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebRect.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebScriptSource.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebSearchableFormData.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebSecurityOrigin.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebSettings.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebSize.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebStorageNamespace.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebString.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebTextCheckingCompletion.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebTextCheckingResult.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebURL.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebURLError.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebURLRequest.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebURLResponse.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebVector.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebView.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebWindowFeatures.h"
+#include "third_party/skia/include/core/SkBitmap.h"
+#include "ui/base/message_box_flags.h"
+#include "ui/gfx/color_utils.h"
+#include "ui/gfx/favicon_size.h"
+#include "ui/gfx/native_widget_types.h"
+#include "ui/gfx/point.h"
+#include "ui/gfx/rect.h"
+#include "ui/gfx/skbitmap_operations.h"
+#include "v8/include/v8-testing.h"
+#include "v8/include/v8.h"
+#include "webkit/appcache/web_application_cache_host_impl.h"
+#include "webkit/glue/alt_error_page_resource_fetcher.h"
+#include "webkit/glue/context_menu.h"
+#include "webkit/glue/dom_operations.h"
+#include "webkit/glue/form_data.h"
+#include "webkit/glue/form_field.h"
+#include "webkit/glue/glue_serialize.h"
+#include "webkit/glue/image_decoder.h"
+#include "webkit/glue/image_resource_fetcher.h"
+#include "webkit/glue/media/video_renderer_impl.h"
+#include "webkit/glue/password_form_dom_manager.h"
+#include "webkit/glue/resource_fetcher.h"
+#include "webkit/glue/site_isolation_metrics.h"
+#include "webkit/glue/webaccessibility.h"
+#include "webkit/glue/webdropdata.h"
+#include "webkit/glue/webkit_constants.h"
+#include "webkit/glue/webkit_glue.h"
+#include "webkit/glue/webmediaplayer_impl.h"
+#include "webkit/plugins/npapi/default_plugin_shared.h"
+#include "webkit/plugins/npapi/plugin_list.h"
+#include "webkit/plugins/npapi/webplugin_delegate.h"
+#include "webkit/plugins/npapi/webplugin_delegate_impl.h"
+#include "webkit/plugins/npapi/webplugin_impl.h"
+#include "webkit/plugins/npapi/webview_plugin.h"
+#include "webkit/plugins/ppapi/ppapi_webplugin_impl.h"
+
+#if defined(OS_WIN)
+// TODO(port): these files are currently Windows only because they concern:
+// * theming
+#include "ui/gfx/native_theme_win.h"
+#elif defined(USE_X11)
+#include "third_party/WebKit/Source/WebKit/chromium/public/linux/WebRenderTheme.h"
+#include "ui/gfx/native_theme_linux.h"
+#elif defined(OS_MACOSX)
+#include "skia/ext/skia_utils_mac.h"
+#endif
+
+using WebKit::WebAccessibilityCache;
+using WebKit::WebAccessibilityNotification;
+using WebKit::WebAccessibilityObject;
+using WebKit::WebApplicationCacheHost;
+using WebKit::WebApplicationCacheHostClient;
+using WebKit::WebCString;
+using WebKit::WebColor;
+using WebKit::WebColorName;
+using WebKit::WebConsoleMessage;
+using WebKit::WebContextMenuData;
+using WebKit::WebCookieJar;
+using WebKit::WebData;
+using WebKit::WebDataSource;
+using WebKit::WebDevToolsAgent;
+using WebKit::WebDocument;
+using WebKit::WebDragData;
+using WebKit::WebDragOperation;
+using WebKit::WebDragOperationsMask;
+using WebKit::WebEditingAction;
+using WebKit::WebElement;
+using WebKit::WebExternalPopupMenu;
+using WebKit::WebExternalPopupMenuClient;
+using WebKit::WebFileChooserCompletion;
+using WebKit::WebFileSystem;
+using WebKit::WebFileSystemCallbacks;
+using WebKit::WebFindOptions;
+using WebKit::WebFormControlElement;
+using WebKit::WebFormElement;
+using WebKit::WebFrame;
+using WebKit::WebHistoryItem;
+using WebKit::WebImage;
+using WebKit::WebInputElement;
+using WebKit::WebMediaPlayer;
+using WebKit::WebMediaPlayerAction;
+using WebKit::WebMediaPlayerClient;
+using WebKit::WebNavigationPolicy;
+using WebKit::WebNavigationType;
+using WebKit::WebNetworkStateNotifier;
+using WebKit::WebNode;
+using WebKit::WebPageSerializer;
+using WebKit::WebPageSerializerClient;
+using WebKit::WebPlugin;
+using WebKit::WebPluginContainer;
+using WebKit::WebPluginDocument;
+using WebKit::WebPluginParams;
+using WebKit::WebPoint;
+using WebKit::WebPopupMenuInfo;
+using WebKit::WebRange;
+using WebKit::WebRect;
+using WebKit::WebScriptSource;
+using WebKit::WebSearchableFormData;
+using WebKit::WebSecurityOrigin;
+using WebKit::WebSettings;
+using WebKit::WebSharedWorker;
+using WebKit::WebSize;
+using WebKit::WebStorageNamespace;
+using WebKit::WebString;
+using WebKit::WebTextAffinity;
+using WebKit::WebTextCheckingResult;
+using WebKit::WebTextDirection;
+using WebKit::WebURL;
+using WebKit::WebURLError;
+using WebKit::WebURLRequest;
+using WebKit::WebURLResponse;
+using WebKit::WebVector;
+using WebKit::WebView;
+using WebKit::WebWidget;
+using WebKit::WebWindowFeatures;
+using WebKit::WebWorker;
+using WebKit::WebWorkerClient;
+using appcache::WebApplicationCacheHostImpl;
+using autofill::AutoFillAgent;
+using autofill::FormManager;
+using autofill::PasswordAutofillManager;
+using base::Time;
+using base::TimeDelta;
+using webkit_glue::AltErrorPageResourceFetcher;
+using webkit_glue::FormData;
+using webkit_glue::FormField;
+using webkit_glue::ImageResourceFetcher;
+using webkit_glue::PasswordForm;
+using webkit_glue::PasswordFormDomManager;
+using webkit_glue::ResourceFetcher;
+using webkit_glue::SiteIsolationMetrics;
+using webkit_glue::WebAccessibility;
+
+//-----------------------------------------------------------------------------
+
+typedef std::map<WebKit::WebView*, RenderView*> ViewMap;
+static base::LazyInstance<ViewMap> g_view_map(base::LINKER_INITIALIZED);
+
+// define to write the time necessary for thumbnail/DOM text retrieval,
+// respectively, into the system debug log
+// #define TIME_TEXT_RETRIEVAL
+
+// maximum number of characters in the document to index, any text beyond this
+// point will be clipped
+static const size_t kMaxIndexChars = 65535;
+
+// Size of the thumbnails that we'll generate
+static const int kThumbnailWidth = 212;
+static const int kThumbnailHeight = 132;
+
+// Delay in milliseconds that we'll wait before capturing the page contents
+// and thumbnail.
+static const int kDelayForCaptureMs = 500;
+
+// Typically, we capture the page data once the page is loaded.
+// Sometimes, the page never finishes to load, preventing the page capture
+// To workaround this problem, we always perform a capture after the following
+// delay.
+static const int kDelayForForcedCaptureMs = 6000;
+
+// Time, in seconds, we delay before sending content state changes (such as form
+// state and scroll position) to the browser. We delay sending changes to avoid
+// spamming the browser.
+// To avoid having tab/session restore require sending a message to get the
+// current content state during tab closing we use a shorter timeout for the
+// foreground renderer. This means there is a small window of time from which
+// content state is modified and not sent to session restore, but this is
+// better than having to wake up all renderers during shutdown.
+static const int kDelaySecondsForContentStateSyncHidden = 5;
+static const int kDelaySecondsForContentStateSync = 1;
+
+// The maximum number of popups that can be spawned from one page.
+static const int kMaximumNumberOfUnacknowledgedPopups = 25;
+
+static const char kBackForwardNavigationScheme[] = "history";
+
+static void GetRedirectChain(WebDataSource* ds, std::vector<GURL>* result) {
+ WebVector<WebURL> urls;
+ ds->redirectChain(urls);
+ result->reserve(urls.size());
+ for (size_t i = 0; i < urls.size(); ++i)
+ result->push_back(urls[i]);
+}
+
+static bool PaintViewIntoCanvas(WebView* view,
+ skia::PlatformCanvas& canvas) {
+ view->layout();
+ const WebSize& size = view->size();
+
+ if (!canvas.initialize(size.width, size.height, true))
+ return false;
+
+ view->paint(webkit_glue::ToWebCanvas(&canvas),
+ WebRect(0, 0, size.width, size.height));
+ // TODO: Add a way to snapshot the whole page, not just the currently
+ // visible part.
+
+ return true;
+}
+
+// Calculates how "boring" a thumbnail is. The boring score is the
+// 0,1 ranged percentage of pixels that are the most common
+// luma. Higher boring scores indicate that a higher percentage of a
+// bitmap are all the same brightness.
+static double CalculateBoringScore(SkBitmap* bitmap) {
+ int histogram[256] = {0};
+ color_utils::BuildLumaHistogram(bitmap, histogram);
+
+ int color_count = *std::max_element(histogram, histogram + 256);
+ int pixel_count = bitmap->width() * bitmap->height();
+ return static_cast<double>(color_count) / pixel_count;
+}
+
+// True if |frame| contains content that is white-listed for content settings.
+static bool IsWhitelistedForContentSettings(WebFrame* frame) {
+ WebSecurityOrigin origin = frame->securityOrigin();
+ if (origin.isEmpty())
+ return false; // Uninitialized document?
+
+ if (EqualsASCII(origin.protocol(), chrome::kChromeUIScheme))
+ return true; // Browser UI elements should still work.
+
+ // If the scheme is ftp: or file:, an empty file name indicates a directory
+ // listing, which requires JavaScript to function properly.
+ GURL frame_url = frame->url();
+ const char* kDirProtocols[] = { "ftp", "file" };
+ for (size_t i = 0; i < arraysize(kDirProtocols); ++i) {
+ if (EqualsASCII(origin.protocol(), kDirProtocols[i])) {
+ return frame_url.SchemeIs(kDirProtocols[i]) &&
+ frame_url.ExtractFileName().empty();
+ }
+ }
+
+ return false;
+}
+
+// Returns true if the frame is navigating to an URL either into or out of an
+// extension app's extent.
+// TODO(creis): Temporary workaround for crbug.com/65953: Only return true if
+// we would enter an extension app's extent from a non-app, or if we leave an
+// extension with no web extent. We avoid swapping processes to exit a hosted
+// app with a web extent for now, since we do not yet restore context (such
+// as window.opener) if the window navigates back.
+static bool CrossesExtensionExtents(const ExtensionSet* extensions,
+ WebFrame* frame,
+ const GURL& new_url) {
+ // If the URL is still empty, this is a window.open navigation. Check the
+ // opener's URL.
+ GURL old_url(frame->url());
+ if (old_url.is_empty() && frame->opener())
+ old_url = frame->opener()->url();
+
+ bool old_url_is_hosted_app = extensions->GetByURL(old_url) &&
+ !extensions->GetByURL(old_url)->web_extent().is_empty();
+ return !extensions->InSameExtent(old_url, new_url) &&
+ !old_url_is_hosted_app;
+}
+
+// Returns true if the parameter node is a textfield, text area or a content
+// editable div.
+static bool IsEditableNode(const WebNode& node) {
+ bool is_editable_node = false;
+ if (!node.isNull()) {
+ if (node.isContentEditable()) {
+ is_editable_node = true;
+ } else if (node.isElementNode()) {
+ is_editable_node =
+ node.toConst<WebElement>().isTextFormControlElement();
+ }
+ }
+ return is_editable_node;
+}
+
+static bool WebAccessibilityNotificationToViewHostMsg(
+ WebAccessibilityNotification notification,
+ ViewHostMsg_AccessibilityNotification_Params::NotificationType* type) {
+ switch (notification) {
+ case WebKit::WebAccessibilityNotificationCheckedStateChanged:
+ *type = ViewHostMsg_AccessibilityNotification_Params::
+ NOTIFICATION_TYPE_CHECK_STATE_CHANGED;
+ break;
+ case WebKit::WebAccessibilityNotificationChildrenChanged:
+ *type = ViewHostMsg_AccessibilityNotification_Params::
+ NOTIFICATION_TYPE_CHILDREN_CHANGED;
+ break;
+ case WebKit::WebAccessibilityNotificationFocusedUIElementChanged:
+ *type = ViewHostMsg_AccessibilityNotification_Params::
+ NOTIFICATION_TYPE_FOCUS_CHANGED;
+ break;
+ case WebKit::WebAccessibilityNotificationLoadComplete:
+ *type = ViewHostMsg_AccessibilityNotification_Params::
+ NOTIFICATION_TYPE_LOAD_COMPLETE;
+ break;
+ case WebKit::WebAccessibilityNotificationValueChanged:
+ *type = ViewHostMsg_AccessibilityNotification_Params::
+ NOTIFICATION_TYPE_VALUE_CHANGED;
+ break;
+ case WebKit::WebAccessibilityNotificationSelectedTextChanged:
+ *type = ViewHostMsg_AccessibilityNotification_Params::
+ NOTIFICATION_TYPE_SELECTED_TEXT_CHANGED;
+ break;
+ default:
+ // TODO(ctguil): Support additional webkit notifications.
+ return false;
+ }
+ return true;
+}
+
+// Conversion for the incoming value. The map isn't perfect; v8 has Uint32,
+// and int64 which don't fit as Value::TYPE_INTEGER, so we let them fall into
+// being TYPE_DOUBLEs. Dates are converted to a string (which can then be
+// parsed into a base::Time), as are regexps. Arrays are converted into lists,
+// recursively. We don't deal with binary objects or functions - they become
+// null values.
+static Value* ConvertV8Value(const v8::Handle<v8::Value>& v8value) {
+ if (v8value->IsBoolean()) {
+ return Value::CreateBooleanValue(v8value->BooleanValue());
+ } else if (v8value->IsInt32()) {
+ return Value::CreateIntegerValue(v8value->Int32Value());
+ } else if (v8value->IsNumber()) {
+ return Value::CreateDoubleValue(v8value->NumberValue());
+ } else if (v8value->IsString()) {
+ return Value::CreateStringValue(*v8::String::Utf8Value(v8value));
+ } else if (v8value->IsDate()) {
+ v8::Date* date = v8::Date::Cast(*v8value);
+ return Value::CreateDoubleValue(date->NumberValue() / 1000.0);
+ } else if (v8value->IsRegExp()) {
+ return Value::CreateStringValue(
+ *v8::String::Utf8Value(v8value->ToString()));
+ } else if (v8value->IsArray()) {
+ v8::Array* array = v8::Array::Cast(*v8value);
+ uint32_t length = array->Length();
+ scoped_ptr<ListValue> list(new ListValue);
+ for (uint32_t i = 0 ; i < length ; ++i) {
+ list->Set(i, ConvertV8Value(array->Get(i)));
+ }
+ return list.release();
+ }
+ return Value::CreateNullValue();
+}
+
+///////////////////////////////////////////////////////////////////////////////
+
+int32 RenderView::next_page_id_ = 1;
+
+struct RenderView::PendingFileChooser {
+ PendingFileChooser(const ViewHostMsg_RunFileChooser_Params& p,
+ WebFileChooserCompletion* c)
+ : params(p),
+ completion(c) {
+ }
+ ViewHostMsg_RunFileChooser_Params params;
+ WebFileChooserCompletion* completion; // MAY BE NULL to skip callback.
+};
+
+RenderView::RenderView(RenderThreadBase* render_thread,
+ gfx::NativeViewId parent_hwnd,
+ int32 opener_id,
+ const RendererPreferences& renderer_prefs,
+ const WebPreferences& webkit_prefs,
+ SharedRenderViewCounter* counter,
+ int32 routing_id,
+ int64 session_storage_namespace_id,
+ const string16& frame_name)
+ : RenderWidget(render_thread, WebKit::WebPopupTypeNone),
+ webkit_preferences_(webkit_prefs),
+ send_content_state_immediately_(false),
+ enabled_bindings_(0),
+ send_preferred_size_changes_(false),
+ script_can_close_(true),
+ is_loading_(false),
+ navigation_gesture_(NavigationGestureUnknown),
+ opened_by_user_gesture_(true),
+ opener_suppressed_(false),
+ is_prerendering_(false),
+ page_id_(-1),
+ last_page_id_sent_to_browser_(-1),
+ last_indexed_page_id_(-1),
+ history_list_offset_(-1),
+ history_list_length_(0),
+ has_unload_listener_(false),
+#if defined(OS_MACOSX)
+ has_document_tag_(false),
+#endif
+ document_tag_(0),
+ target_url_status_(TARGET_NONE),
+ spelling_panel_visible_(false),
+ view_type_(ViewType::INVALID),
+ browser_window_id_(-1),
+ ALLOW_THIS_IN_INITIALIZER_LIST(pepper_delegate_(this)),
+ ALLOW_THIS_IN_INITIALIZER_LIST(page_info_method_factory_(this)),
+ ALLOW_THIS_IN_INITIALIZER_LIST(accessibility_method_factory_(this)),
+ ALLOW_THIS_IN_INITIALIZER_LIST(cookie_jar_(this)),
+ devtools_client_(NULL),
+ geolocation_dispatcher_(NULL),
+ speech_input_dispatcher_(NULL),
+ device_orientation_dispatcher_(NULL),
+ print_helper_(NULL),
+ searchbox_(NULL),
+ spellcheck_provider_(NULL),
+ accessibility_ack_pending_(false),
+ p2p_socket_dispatcher_(NULL),
+ pending_app_icon_requests_(0),
+ session_storage_namespace_id_(session_storage_namespace_id) {
+#if defined(OS_MACOSX)
+ // On Mac, the select popups are rendered by the browser.
+ // Note that we don't do this in RenderMain otherwise this would not be called
+ // in single-process mode.
+ WebKit::WebView::setUseExternalPopupMenus(true);
+#endif
+
+ ClearBlockedContentSettings();
+
+ routing_id_ = routing_id;
+ if (opener_id != MSG_ROUTING_NONE)
+ opener_id_ = opener_id;
+
+ if (counter) {
+ shared_popup_counter_ = counter;
+ shared_popup_counter_->data++;
+ decrement_shared_popup_at_destruction_ = true;
+ } else {
+ shared_popup_counter_ = new SharedRenderViewCounter(0);
+ decrement_shared_popup_at_destruction_ = false;
+ }
+
+ notification_provider_ = new NotificationProvider(this);
+
+ devtools_agent_ = new DevToolsAgent(this);
+ PasswordAutofillManager* password_autofill_manager =
+ new PasswordAutofillManager(this);
+ AutoFillAgent* autofill_agent = new AutoFillAgent(this,
+ password_autofill_manager);
+
+ webwidget_ = WebView::create(this, devtools_agent_, autofill_agent);
+ g_view_map.Get().insert(std::make_pair(webview(), this));
+ webkit_preferences_.Apply(webview());
+ webview()->initializeMainFrame(this);
+ if (!frame_name.empty())
+ webview()->mainFrame()->setName(frame_name);
+ webview()->settings()->setMinimumTimerInterval(
+ is_hidden() ? webkit_glue::kBackgroundTabTimerInterval :
+ webkit_glue::kForegroundTabTimerInterval);
+
+ OnSetRendererPrefs(renderer_prefs);
+
+ render_thread_->AddRoute(routing_id_, this);
+ // Take a reference on behalf of the RenderThread. This will be balanced
+ // when we receive ViewMsg_Close.
+ AddRef();
+
+ // If this is a popup, we must wait for the CreatingNew_ACK message before
+ // completing initialization. Otherwise, we can finish it now.
+ if (opener_id == MSG_ROUTING_NONE) {
+ did_show_ = true;
+ CompleteInit(parent_hwnd);
+ }
+
+ host_window_ = parent_hwnd;
+
+ const CommandLine& command_line = *CommandLine::ForCurrentProcess();
+ if (command_line.HasSwitch(switches::kDomAutomationController))
+ enabled_bindings_ |= BindingsPolicy::DOM_AUTOMATION;
+ if (command_line.HasSwitch(switches::kEnableAccessibility))
+ WebAccessibilityCache::enableAccessibility();
+
+ audio_message_filter_ = new AudioMessageFilter(routing_id_);
+ render_thread_->AddFilter(audio_message_filter_);
+
+ PageClickTracker* page_click_tracker = new PageClickTracker(this);
+ // Note that the order of insertion of the listeners is important.
+ // The password_autocomplete_manager takes the first shot at processing the
+ // notification and can stop the propagation.
+ page_click_tracker->AddListener(password_autofill_manager);
+ page_click_tracker->AddListener(autofill_agent);
+ new TranslateHelper(this);
+ print_helper_ = new PrintWebViewHelper(this);
+ searchbox_ = new SearchBox(this);
+
+ RenderThread* current_thread = RenderThread::current();
+ SpellCheck* spellcheck = current_thread ? current_thread->spellchecker() : 0;
+ spellcheck_provider_ = new SpellCheckProvider(this, spellcheck);
+
+ if (CommandLine::ForCurrentProcess()->HasSwitch(
+ switches::kEnableP2PApi)) {
+ p2p_socket_dispatcher_ = new P2PSocketDispatcher(this);
+ }
+
+ if (CommandLine::ForCurrentProcess()->HasSwitch(
+ switches::kEnableClientSidePhishingDetection)) {
+ new safe_browsing::PhishingClassifierDelegate(this, NULL);
+ }
+
+ // Observer for Malware DOM details messages.
+ new safe_browsing::MalwareDOMDetails(this);
+}
+
+RenderView::~RenderView() {
+ if (decrement_shared_popup_at_destruction_)
+ shared_popup_counter_->data--;
+
+ // If file chooser is still waiting for answer, dispatch empty answer.
+ while (!file_chooser_completions_.empty()) {
+ if (file_chooser_completions_.front()->completion) {
+ file_chooser_completions_.front()->completion->didChooseFile(
+ WebVector<WebString>());
+ }
+ file_chooser_completions_.pop_front();
+ }
+
+#if defined(OS_MACOSX)
+ // Tell the spellchecker that the document is closed.
+ if (has_document_tag_)
+ Send(new ViewHostMsg_DocumentWithTagClosed(routing_id_, document_tag_));
+
+ // Destroy all fake plugin window handles on the browser side.
+ while (!fake_plugin_window_handles_.empty()) {
+ // Make sure no NULL plugin window handles were inserted into this list.
+ DCHECK(*fake_plugin_window_handles_.begin());
+ // DestroyFakePluginWindowHandle modifies fake_plugin_window_handles_.
+ DestroyFakePluginWindowHandle(*fake_plugin_window_handles_.begin());
+ }
+#endif
+
+ render_thread_->RemoveFilter(audio_message_filter_);
+
+#ifndef NDEBUG
+ // Make sure we are no longer referenced by the ViewMap.
+ ViewMap* views = g_view_map.Pointer();
+ for (ViewMap::iterator it = views->begin(); it != views->end(); ++it)
+ DCHECK_NE(this, it->second) << "Failed to call Close?";
+#endif
+
+ FOR_EACH_OBSERVER(RenderViewObserver, observers_, set_render_view(NULL));
+ FOR_EACH_OBSERVER(RenderViewObserver, observers_, OnDestruct());
+}
+
+/*static*/
+void RenderView::ForEach(RenderViewVisitor* visitor) {
+ ViewMap* views = g_view_map.Pointer();
+ for (ViewMap::iterator it = views->begin(); it != views->end(); ++it) {
+ if (!visitor->Visit(it->second))
+ return;
+ }
+}
+
+/*static*/
+RenderView* RenderView::FromWebView(WebView* webview) {
+ ViewMap* views = g_view_map.Pointer();
+ ViewMap::iterator it = views->find(webview);
+ return it == views->end() ? NULL : it->second;
+}
+
+/*static*/
+RenderView* RenderView::Create(
+ RenderThreadBase* render_thread,
+ gfx::NativeViewId parent_hwnd,
+ int32 opener_id,
+ const RendererPreferences& renderer_prefs,
+ const WebPreferences& webkit_prefs,
+ SharedRenderViewCounter* counter,
+ int32 routing_id,
+ int64 session_storage_namespace_id,
+ const string16& frame_name) {
+ DCHECK(routing_id != MSG_ROUTING_NONE);
+ return new RenderView(
+ render_thread,
+ parent_hwnd,
+ opener_id,
+ renderer_prefs,
+ webkit_prefs,
+ counter,
+ routing_id,
+ session_storage_namespace_id,
+ frame_name); // adds reference
+}
+
+// static
+void RenderView::SetNextPageID(int32 next_page_id) {
+ // This method should only be called during process startup, and the given
+ // page id had better not exceed our current next page id!
+ DCHECK_EQ(next_page_id_, 1);
+ DCHECK(next_page_id >= next_page_id_);
+ next_page_id_ = next_page_id;
+}
+
+void RenderView::AddObserver(RenderViewObserver* observer) {
+ observers_.AddObserver(observer);
+}
+
+void RenderView::RemoveObserver(RenderViewObserver* observer) {
+ observer->set_render_view(NULL);
+ observers_.RemoveObserver(observer);
+}
+
+bool RenderView::RendererAccessibilityNotification::ShouldIncludeChildren() {
+ typedef ViewHostMsg_AccessibilityNotification_Params params;
+ if (type == WebKit::WebAccessibilityNotificationChildrenChanged ||
+ type == WebKit::WebAccessibilityNotificationLoadComplete) {
+ return true;
+ }
+ return false;
+}
+
+WebKit::WebView* RenderView::webview() const {
+ return static_cast<WebKit::WebView*>(webwidget());
+}
+
+void RenderView::UserMetricsRecordAction(const std::string& action) {
+ Send(new ViewHostMsg_UserMetricsRecordAction(action));
+}
+
+bool RenderView::InstallWebApplicationUsingDefinitionFile(WebFrame* frame,
+ string16* error) {
+ // There is an issue of drive-by installs with the below implementation. A web
+ // site could force a user to install an app by timing the dialog to come up
+ // just before the user clicks.
+ //
+ // We do show a success UI that allows users to uninstall, but it seems that
+ // we might still want to put up an infobar before showing the install dialog.
+ //
+ // TODO(aa): Figure out this issue before removing the kEnableCrxlessWebApps
+ // switch.
+ if (!CommandLine::ForCurrentProcess()->HasSwitch(
+ switches::kEnableCrxlessWebApps)) {
+ *error = ASCIIToUTF16("CRX-less web apps aren't enabled.");
+ return false;
+ }
+
+ if (frame != frame->top()) {
+ *error = ASCIIToUTF16("Applications can only be installed from the top "
+ "frame.");
+ return false;
+ }
+
+ if (pending_app_info_.get()) {
+ *error = ASCIIToUTF16("An application install is already in progress.");
+ return false;
+ }
+
+ pending_app_info_.reset(new WebApplicationInfo());
+ if (!web_apps::ParseWebAppFromWebDocument(frame, pending_app_info_.get(),
+ error)) {
+ return false;
+ }
+
+ if (!pending_app_info_->manifest_url.is_valid()) {
+ *error = ASCIIToUTF16("Web application definition not found or invalid.");
+ return false;
+ }
+
+ app_definition_fetcher_.reset(new ResourceFetcher(
+ pending_app_info_->manifest_url, webview()->mainFrame(),
+ NewCallback(this, &RenderView::DidDownloadApplicationDefinition)));
+ return true;
+}
+
+void RenderView::SetReportLoadProgressEnabled(bool enabled) {
+ if (!enabled) {
+ load_progress_tracker_.reset(NULL);
+ return;
+ }
+ if (load_progress_tracker_ == NULL)
+ load_progress_tracker_.reset(new LoadProgressTracker(this));
+}
+
+void RenderView::DidDownloadApplicationDefinition(
+ const WebKit::WebURLResponse& response,
+ const std::string& data) {
+ scoped_ptr<WebApplicationInfo> app_info(
+ pending_app_info_.release());
+
+ JSONStringValueSerializer serializer(data);
+ int error_code = 0;
+ std::string error_message;
+ scoped_ptr<Value> result(serializer.Deserialize(&error_code, &error_message));
+ if (!result.get()) {
+ AddErrorToRootConsole(UTF8ToUTF16(error_message));
+ return;
+ }
+
+ string16 error_message_16;
+ if (!web_apps::ParseWebAppFromDefinitionFile(result.get(), app_info.get(),
+ &error_message_16)) {
+ AddErrorToRootConsole(error_message_16);
+ return;
+ }
+
+ if (!app_info->icons.empty()) {
+ pending_app_info_.reset(app_info.release());
+ pending_app_icon_requests_ =
+ static_cast<int>(pending_app_info_->icons.size());
+ for (size_t i = 0; i < pending_app_info_->icons.size(); ++i) {
+ app_icon_fetchers_.push_back(linked_ptr<ImageResourceFetcher>(
+ new ImageResourceFetcher(
+ pending_app_info_->icons[i].url,
+ webview()->mainFrame(),
+ static_cast<int>(i),
+ pending_app_info_->icons[i].width,
+ NewCallback(this, &RenderView::DidDownloadApplicationIcon))));
+ }
+ } else {
+ Send(new ViewHostMsg_InstallApplication(routing_id_, *app_info));
+ }
+}
+
+void RenderView::DidDownloadApplicationIcon(ImageResourceFetcher* fetcher,
+ const SkBitmap& image) {
+ pending_app_info_->icons[fetcher->id()].data = image;
+
+ // Remove the image fetcher from our pending list. We're in the callback from
+ // ImageResourceFetcher, best to delay deletion.
+ for (ImageResourceFetcherList::iterator iter = app_icon_fetchers_.begin();
+ iter != app_icon_fetchers_.end(); ++iter) {
+ if (iter->get() == fetcher) {
+ iter->release();
+ app_icon_fetchers_.erase(iter);
+ break;
+ }
+ }
+
+ // We're in the callback from the ImageResourceFetcher, best to delay
+ // deletion.
+ MessageLoop::current()->DeleteSoon(FROM_HERE, fetcher);
+
+ if (--pending_app_icon_requests_ > 0)
+ return;
+
+ // There is a maximum size of IPC on OS X and Linux that we have run into in
+ // some situations. We're not sure what it is, but our hypothesis is in the
+ // neighborhood of 1 MB.
+ //
+ // To be on the safe side, we give ourselves 128 KB for just the image data.
+ // This should be more than enough for 128, 48, and 16 px 32-bit icons. If we
+ // want to start allowing larger icons (see bug 63406), we'll have to either
+ // experiment mor ewith this and find the real limit, or else come up with
+ // some alternative way to transmit the icon data to the browser process.
+ //
+ // See also: bug 63729.
+ const size_t kMaxIconSize = 1024 * 128;
+ size_t actual_icon_size = 0;
+ for (size_t i = 0; i < pending_app_info_->icons.size(); ++i) {
+ size_t current_size = pending_app_info_->icons[i].data.getSize();
+ if (current_size > kMaxIconSize - actual_icon_size) {
+ AddErrorToRootConsole(ASCIIToUTF16(
+ "Icons are too large. Maximum total size for app icons is 128 KB."));
+ return;
+ }
+ actual_icon_size += current_size;
+ }
+
+ Send(new ViewHostMsg_InstallApplication(routing_id_, *pending_app_info_));
+ pending_app_info_.reset(NULL);
+}
+
+void RenderView::PluginCrashed(const FilePath& plugin_path) {
+ Send(new ViewHostMsg_CrashedPlugin(routing_id_, plugin_path));
+}
+
+WebPlugin* RenderView::CreatePluginNoCheck(WebFrame* frame,
+ const WebPluginParams& params) {
+ webkit::npapi::WebPluginInfo info;
+ bool found;
+ ContentSetting setting;
+ std::string mime_type;
+ Send(new ViewHostMsg_GetPluginInfo(
+ routing_id_, params.url, frame->top()->url(), params.mimeType.utf8(),
+ &found, &info, &setting, &mime_type));
+ if (!found || !webkit::npapi::IsPluginEnabled(info))
+ return NULL;
+
+ scoped_refptr<webkit::ppapi::PluginModule> pepper_module(
+ pepper_delegate_.CreatePepperPlugin(info.path));
+ if (pepper_module)
+ return CreatePepperPlugin(frame, params, info.path, pepper_module.get());
+ return CreateNPAPIPlugin(frame, params, info.path, mime_type);
+}
+
+void RenderView::RegisterPluginDelegate(WebPluginDelegateProxy* delegate) {
+ plugin_delegates_.insert(delegate);
+ // If the renderer is visible, set initial visibility and focus state.
+ if (!is_hidden()) {
+#if defined(OS_MACOSX)
+ delegate->SetContainerVisibility(true);
+ if (webview() && webview()->isActive())
+ delegate->SetWindowFocus(true);
+#endif
+ }
+ // Plugins start assuming the content has focus (so that they work in
+ // environments where RenderView isn't hosting them), so we always have to
+ // set the initial state. See webplugin_delegate_impl.h for details.
+ delegate->SetContentAreaFocus(has_focus());
+}
+
+void RenderView::UnregisterPluginDelegate(WebPluginDelegateProxy* delegate) {
+ plugin_delegates_.erase(delegate);
+}
+
+bool RenderView::OnMessageReceived(const IPC::Message& message) {
+ WebFrame* main_frame = webview() ? webview()->mainFrame() : NULL;
+ if (main_frame)
+ child_process_logging::SetActiveURL(main_frame->url());
+
+ ObserverListBase<RenderViewObserver>::Iterator it(observers_);
+ RenderViewObserver* observer;
+ while ((observer = it.GetNext()) != NULL)
+ if (observer->OnMessageReceived(message))
+ return true;
+
+ bool handled = true;
+ IPC_BEGIN_MESSAGE_MAP(RenderView, message)
+ IPC_MESSAGE_HANDLER(ViewMsg_CaptureThumbnail, OnCaptureThumbnail)
+ IPC_MESSAGE_HANDLER(ViewMsg_CaptureSnapshot, OnCaptureSnapshot)
+ IPC_MESSAGE_HANDLER(ViewMsg_Navigate, OnNavigate)
+ IPC_MESSAGE_HANDLER(ViewMsg_Stop, OnStop)
+ IPC_MESSAGE_HANDLER(ViewMsg_ReloadFrame, OnReloadFrame)
+ IPC_MESSAGE_HANDLER(ViewMsg_Undo, OnUndo)
+ IPC_MESSAGE_HANDLER(ViewMsg_Redo, OnRedo)
+ IPC_MESSAGE_HANDLER(ViewMsg_Cut, OnCut)
+ IPC_MESSAGE_HANDLER(ViewMsg_Copy, OnCopy)
+#if defined(OS_MACOSX)
+ IPC_MESSAGE_HANDLER(ViewMsg_CopyToFindPboard, OnCopyToFindPboard)
+#endif
+ IPC_MESSAGE_HANDLER(ViewMsg_Paste, OnPaste)
+ IPC_MESSAGE_HANDLER(ViewMsg_Replace, OnReplace)
+ IPC_MESSAGE_HANDLER(ViewMsg_ToggleSpellPanel, OnToggleSpellPanel)
+ IPC_MESSAGE_HANDLER(ViewMsg_AdvanceToNextMisspelling,
+ OnAdvanceToNextMisspelling)
+ IPC_MESSAGE_HANDLER(ViewMsg_ToggleSpellCheck, OnToggleSpellCheck)
+ IPC_MESSAGE_HANDLER(ViewMsg_Delete, OnDelete)
+ IPC_MESSAGE_HANDLER(ViewMsg_SelectAll, OnSelectAll)
+ IPC_MESSAGE_HANDLER(ViewMsg_CopyImageAt, OnCopyImageAt)
+ IPC_MESSAGE_HANDLER(ViewMsg_ExecuteEditCommand, OnExecuteEditCommand)
+ IPC_MESSAGE_HANDLER(ViewMsg_Find, OnFind)
+ IPC_MESSAGE_HANDLER(ViewMsg_StopFinding, OnStopFinding)
+ IPC_MESSAGE_HANDLER(ViewMsg_FindReplyACK, OnFindReplyAck)
+ IPC_MESSAGE_HANDLER(ViewMsg_Zoom, OnZoom)
+ IPC_MESSAGE_HANDLER(ViewMsg_SetContentSettingsForLoadingURL,
+ OnSetContentSettingsForLoadingURL)
+ IPC_MESSAGE_HANDLER(ViewMsg_SetZoomLevel, OnSetZoomLevel)
+ IPC_MESSAGE_HANDLER(ViewMsg_SetZoomLevelForLoadingURL,
+ OnSetZoomLevelForLoadingURL)
+ IPC_MESSAGE_HANDLER(ViewMsg_SetPageEncoding, OnSetPageEncoding)
+ IPC_MESSAGE_HANDLER(ViewMsg_ResetPageEncodingToDefault,
+ OnResetPageEncodingToDefault)
+ IPC_MESSAGE_HANDLER(ViewMsg_SetupDevToolsClient, OnSetupDevToolsClient)
+ IPC_MESSAGE_HANDLER(ViewMsg_DownloadFavicon, OnDownloadFavicon)
+ IPC_MESSAGE_HANDLER(ViewMsg_ScriptEvalRequest, OnScriptEvalRequest)
+ IPC_MESSAGE_HANDLER(ViewMsg_CSSInsertRequest, OnCSSInsertRequest)
+ IPC_MESSAGE_HANDLER(ViewMsg_AddMessageToConsole, OnAddMessageToConsole)
+ IPC_MESSAGE_HANDLER(ViewMsg_ReservePageIDRange, OnReservePageIDRange)
+ IPC_MESSAGE_HANDLER(ViewMsg_DragTargetDragEnter, OnDragTargetDragEnter)
+ IPC_MESSAGE_HANDLER(ViewMsg_DragTargetDragOver, OnDragTargetDragOver)
+ IPC_MESSAGE_HANDLER(ViewMsg_DragTargetDragLeave, OnDragTargetDragLeave)
+ IPC_MESSAGE_HANDLER(ViewMsg_DragTargetDrop, OnDragTargetDrop)
+ IPC_MESSAGE_HANDLER(ViewMsg_AllowBindings, OnAllowBindings)
+ IPC_MESSAGE_HANDLER(ViewMsg_SetWebUIProperty, OnSetWebUIProperty)
+ IPC_MESSAGE_HANDLER(ViewMsg_DragSourceEndedOrMoved,
+ OnDragSourceEndedOrMoved)
+ IPC_MESSAGE_HANDLER(ViewMsg_DragSourceSystemDragEnded,
+ OnDragSourceSystemDragEnded)
+ IPC_MESSAGE_HANDLER(ViewMsg_SetInitialFocus, OnSetInitialFocus)
+ IPC_MESSAGE_HANDLER(ViewMsg_ScrollFocusedEditableNodeIntoView,
+ OnScrollFocusedEditableNodeIntoView)
+ IPC_MESSAGE_HANDLER(ViewMsg_UpdateTargetURL_ACK, OnUpdateTargetURLAck)
+ IPC_MESSAGE_HANDLER(ViewMsg_UpdateWebPreferences, OnUpdateWebPreferences)
+ IPC_MESSAGE_HANDLER(ViewMsg_SetAltErrorPageURL, OnSetAltErrorPageURL)
+ IPC_MESSAGE_HANDLER(ViewMsg_InstallMissingPlugin, OnInstallMissingPlugin)
+ IPC_MESSAGE_HANDLER(ViewMsg_DisplayPrerenderedPage,
+ OnDisplayPrerenderedPage)
+ IPC_MESSAGE_HANDLER(ViewMsg_RunFileChooserResponse, OnFileChooserResponse)
+ IPC_MESSAGE_HANDLER(ViewMsg_EnableViewSourceMode, OnEnableViewSourceMode)
+ IPC_MESSAGE_HANDLER(ViewMsg_GetAllSavableResourceLinksForCurrentPage,
+ OnGetAllSavableResourceLinksForCurrentPage)
+ IPC_MESSAGE_HANDLER(
+ ViewMsg_GetSerializedHtmlDataForCurrentPageWithLocalLinks,
+ OnGetSerializedHtmlDataForCurrentPageWithLocalLinks)
+ IPC_MESSAGE_HANDLER(ViewMsg_GetApplicationInfo, OnGetApplicationInfo)
+ IPC_MESSAGE_HANDLER(ViewMsg_ShouldClose, OnShouldClose)
+ IPC_MESSAGE_HANDLER(ViewMsg_ClosePage, OnClosePage)
+ IPC_MESSAGE_HANDLER(ViewMsg_ThemeChanged, OnThemeChanged)
+ IPC_MESSAGE_HANDLER(ViewMsg_HandleMessageFromExternalHost,
+ OnHandleMessageFromExternalHost)
+ IPC_MESSAGE_HANDLER(ViewMsg_DisassociateFromPopupCount,
+ OnDisassociateFromPopupCount)
+ IPC_MESSAGE_HANDLER(ViewMsg_AllowScriptToClose,
+ OnAllowScriptToClose)
+ IPC_MESSAGE_HANDLER(ViewMsg_MoveOrResizeStarted, OnMoveOrResizeStarted)
+ IPC_MESSAGE_HANDLER(ViewMsg_ExtensionResponse, OnExtensionResponse)
+ IPC_MESSAGE_HANDLER(ViewMsg_ExtensionMessageInvoke,
+ OnExtensionMessageInvoke)
+ IPC_MESSAGE_HANDLER(ViewMsg_ClearFocusedNode, OnClearFocusedNode)
+ IPC_MESSAGE_HANDLER(ViewMsg_SetBackground, OnSetBackground)
+ IPC_MESSAGE_HANDLER(ViewMsg_EnablePreferredSizeChangedMode,
+ OnEnablePreferredSizeChangedMode)
+ IPC_MESSAGE_HANDLER(ViewMsg_DisableScrollbarsForSmallWindows,
+ OnDisableScrollbarsForSmallWindows)
+ IPC_MESSAGE_HANDLER(ViewMsg_SetRendererPrefs, OnSetRendererPrefs)
+ IPC_MESSAGE_HANDLER(ViewMsg_UpdateBrowserWindowId,
+ OnUpdateBrowserWindowId)
+ IPC_MESSAGE_HANDLER(ViewMsg_NotifyRenderViewType,
+ OnNotifyRendererViewType)
+ IPC_MESSAGE_HANDLER(ViewMsg_MediaPlayerActionAt, OnMediaPlayerActionAt)
+ IPC_MESSAGE_HANDLER(ViewMsg_SetActive, OnSetActive)
+#if defined(OS_MACOSX)
+ IPC_MESSAGE_HANDLER(ViewMsg_SetWindowVisibility, OnSetWindowVisibility)
+ IPC_MESSAGE_HANDLER(ViewMsg_WindowFrameChanged, OnWindowFrameChanged)
+ IPC_MESSAGE_HANDLER(ViewMsg_PluginImeCompositionCompleted,
+ OnPluginImeCompositionCompleted)
+#endif
+ IPC_MESSAGE_HANDLER(ViewMsg_SetEditCommandsForNextKeyEvent,
+ OnSetEditCommandsForNextKeyEvent)
+ IPC_MESSAGE_HANDLER(ViewMsg_ExecuteCode,
+ OnExecuteCode)
+ IPC_MESSAGE_HANDLER(ViewMsg_CustomContextMenuAction,
+ OnCustomContextMenuAction)
+ IPC_MESSAGE_HANDLER(ViewMsg_EnableAccessibility, OnEnableAccessibility)
+ IPC_MESSAGE_HANDLER(ViewMsg_SetAccessibilityFocus, OnSetAccessibilityFocus)
+ IPC_MESSAGE_HANDLER(ViewMsg_AccessibilityDoDefaultAction,
+ OnAccessibilityDoDefaultAction)
+ IPC_MESSAGE_HANDLER(ViewMsg_AccessibilityNotifications_ACK,
+ OnAccessibilityNotificationsAck)
+ IPC_MESSAGE_HANDLER(ViewMsg_AsyncOpenFile_ACK, OnAsyncFileOpened)
+#if defined(OS_MACOSX)
+ IPC_MESSAGE_HANDLER(ViewMsg_SelectPopupMenuItem, OnSelectPopupMenuItem)
+#endif
+ IPC_MESSAGE_HANDLER(ViewMsg_JavaScriptStressTestControl,
+ OnJavaScriptStressTestControl)
+ IPC_MESSAGE_HANDLER(ViewMsg_ContextMenuClosed, OnContextMenuClosed)
+ IPC_MESSAGE_HANDLER(ViewMsg_NetworkStateChanged, OnNetworkStateChanged)
+
+ // TODO(viettrungluu): Move to a separate message filter.
+#if defined(ENABLE_FLAPPER_HACKS)
+ IPC_MESSAGE_HANDLER(PepperMsg_ConnectTcpACK, OnConnectTcpACK)
+#endif
+
+ // Have the super handle all other messages.
+ IPC_MESSAGE_UNHANDLED(handled = RenderWidget::OnMessageReceived(message))
+ IPC_END_MESSAGE_MAP()
+ return handled;
+}
+
+void RenderView::OnCaptureThumbnail() {
+ WebFrame* main_frame = webview()->mainFrame();
+ if (!main_frame)
+ return;
+
+ // get the URL for this page
+ GURL url(main_frame->url());
+ if (url.is_empty())
+ return;
+
+ if (size_.IsEmpty())
+ return; // Don't create an empty thumbnail!
+
+ ThumbnailScore score;
+ SkBitmap thumbnail;
+ if (!CaptureThumbnail(webview(), kThumbnailWidth, kThumbnailHeight,
+ &thumbnail, &score))
+ return;
+
+ // send the thumbnail message to the browser process
+ Send(new ViewHostMsg_Thumbnail(routing_id_, url, score, thumbnail));
+}
+
+void RenderView::OnCaptureSnapshot() {
+ SkBitmap snapshot;
+ bool error = false;
+
+ WebFrame* main_frame = webview()->mainFrame();
+ if (!main_frame)
+ error = true;
+
+ if (!error && !CaptureSnapshot(webview(), &snapshot))
+ error = true;
+
+ DCHECK(error == snapshot.empty()) <<
+ "Snapshot should be empty on error, non-empty otherwise.";
+
+ // Send the snapshot to the browser process.
+ Send(new ViewHostMsg_Snapshot(routing_id_, snapshot));
+}
+
+void RenderView::CapturePageInfo(int load_id, bool preliminary_capture) {
+ if (load_id != page_id_)
+ return; // this capture call is no longer relevant due to navigation
+ if (load_id == last_indexed_page_id_)
+ return; // we already indexed this page
+
+ if (!webview())
+ return;
+
+ WebFrame* main_frame = webview()->mainFrame();
+ if (!main_frame)
+ return;
+
+ // Don't index/capture pages that are in view source mode.
+ if (main_frame->isViewSourceModeEnabled())
+ return;
+
+ // Don't index/capture pages that failed to load. This only checks the top
+ // level frame so the thumbnail may contain a frame that failed to load.
+ WebDataSource* ds = main_frame->dataSource();
+ if (ds && ds->hasUnreachableURL())
+ return;
+
+ if (!preliminary_capture)
+ last_indexed_page_id_ = load_id;
+
+ // Get the URL for this page.
+ GURL url(main_frame->url());
+ if (url.is_empty())
+ return;
+
+ // Retrieve the frame's full text.
+ string16 contents;
+ CaptureText(main_frame, &contents);
+ if (contents.size()) {
+ WebKit::WebDocument document = main_frame->document();
+ // If the page explicitly specifies a language, use it, otherwise we'll
+ // determine it based on the text content using the CLD.
+ std::string language =
+ TranslateHelper::GetPageLanguageFromMetaTag(&document);
+ if (language.empty()) {
+ base::TimeTicks begin_time = base::TimeTicks::Now();
+ language = content::GetContentClient()->renderer()->
+ DetermineTextLanguage(contents);
+ UMA_HISTOGRAM_MEDIUM_TIMES("Renderer4.LanguageDetection",
+ base::TimeTicks::Now() - begin_time);
+ }
+ // Send the text to the browser for indexing (the browser might decide not
+ // to index, if the URL is HTTPS for instance) and language discovery.
+ Send(new ViewHostMsg_PageContents(
+ routing_id_, url, load_id, contents, language,
+ TranslateHelper::IsPageTranslatable(&document)));
+ }
+
+ // Generate the thumbnail here if the in-browser thumbnailing isn't
+ // enabled. TODO(satorux): Remove this and related code once
+ // crbug.com/65936 is complete.
+ if (!CommandLine::ForCurrentProcess()->HasSwitch(
+ switches::kEnableInBrowserThumbnailing)) {
+ OnCaptureThumbnail();
+ }
+
+ FOR_EACH_OBSERVER(RenderViewObserver, observers_, PageCaptured(contents));
+}
+
+void RenderView::CaptureText(WebFrame* frame, string16* contents) {
+ contents->clear();
+ if (!frame)
+ return;
+
+#ifdef TIME_TEXT_RETRIEVAL
+ double begin = time_util::GetHighResolutionTimeNow();
+#endif
+
+ // get the contents of the frame
+ *contents = frame->contentAsText(kMaxIndexChars);
+
+#ifdef TIME_TEXT_RETRIEVAL
+ double end = time_util::GetHighResolutionTimeNow();
+ char buf[128];
+ sprintf_s(buf, "%d chars retrieved for indexing in %gms\n",
+ contents.size(), (end - begin)*1000);
+ OutputDebugStringA(buf);
+#endif
+
+ // When the contents are clipped to the maximum, we don't want to have a
+ // partial word indexed at the end that might have been clipped. Therefore,
+ // terminate the string at the last space to ensure no words are clipped.
+ if (contents->size() == kMaxIndexChars) {
+ size_t last_space_index = contents->find_last_of(kWhitespaceUTF16);
+ if (last_space_index == std::wstring::npos)
+ return; // don't index if we got a huge block of text with no spaces
+ contents->resize(last_space_index);
+ }
+}
+
+bool RenderView::CaptureThumbnail(WebView* view,
+ int w,
+ int h,
+ SkBitmap* thumbnail,
+ ThumbnailScore* score) {
+ base::TimeTicks beginning_time = base::TimeTicks::Now();
+
+ skia::PlatformCanvas canvas;
+
+ // Paint |view| into |canvas|.
+ if (!PaintViewIntoCanvas(view, canvas))
+ return false;
+
+ skia::BitmapPlatformDevice& device =
+ static_cast<skia::BitmapPlatformDevice&>(canvas.getTopPlatformDevice());
+
+ const SkBitmap& src_bmp = device.accessBitmap(false);
+
+ SkRect dest_rect = { 0, 0, SkIntToScalar(w), SkIntToScalar(h) };
+ float dest_aspect = dest_rect.width() / dest_rect.height();
+
+ // Get the src rect so that we can preserve the aspect ratio while filling
+ // the destination.
+ SkIRect src_rect;
+ if (src_bmp.width() < dest_rect.width() ||
+ src_bmp.height() < dest_rect.height()) {
+ // Source image is smaller: we clip the part of source image within the
+ // dest rect, and then stretch it to fill the dest rect. We don't respect
+ // the aspect ratio in this case.
+ src_rect.set(0, 0, static_cast<S16CPU>(dest_rect.width()),
+ static_cast<S16CPU>(dest_rect.height()));
+ score->good_clipping = false;
+ } else {
+ float src_aspect = static_cast<float>(src_bmp.width()) / src_bmp.height();
+ if (src_aspect > dest_aspect) {
+ // Wider than tall, clip horizontally: we center the smaller thumbnail in
+ // the wider screen.
+ S16CPU new_width = static_cast<S16CPU>(src_bmp.height() * dest_aspect);
+ S16CPU x_offset = (src_bmp.width() - new_width) / 2;
+ src_rect.set(x_offset, 0, new_width + x_offset, src_bmp.height());
+ score->good_clipping = false;
+ } else {
+ src_rect.set(0, 0, src_bmp.width(),
+ static_cast<S16CPU>(src_bmp.width() / dest_aspect));
+ score->good_clipping = true;
+ }
+ }
+
+ score->at_top = (view->mainFrame()->scrollOffset().height == 0);
+
+ SkBitmap subset;
+ device.accessBitmap(false).extractSubset(&subset, src_rect);
+
+ // First do a fast downsample by powers of two to get close to the final size.
+ SkBitmap downsampled_subset =
+ SkBitmapOperations::DownsampleByTwoUntilSize(subset, w, h);
+
+ // Do a high-quality resize from the downscaled size to the final size.
+ *thumbnail = skia::ImageOperations::Resize(
+ downsampled_subset, skia::ImageOperations::RESIZE_LANCZOS3, w, h);
+
+ score->boring_score = CalculateBoringScore(thumbnail);
+
+ HISTOGRAM_TIMES("Renderer4.Thumbnail",
+ base::TimeTicks::Now() - beginning_time);
+
+ return true;
+}
+
+bool RenderView::CaptureSnapshot(WebView* view, SkBitmap* snapshot) {
+ base::TimeTicks beginning_time = base::TimeTicks::Now();
+
+ skia::PlatformCanvas canvas;
+ if (!PaintViewIntoCanvas(view, canvas))
+ return false;
+
+ skia::BitmapPlatformDevice& device =
+ static_cast<skia::BitmapPlatformDevice&>(canvas.getTopPlatformDevice());
+
+ const SkBitmap& bitmap = device.accessBitmap(false);
+ if (!bitmap.copyTo(snapshot, SkBitmap::kARGB_8888_Config))
+ return false;
+
+ HISTOGRAM_TIMES("Renderer4.Snapshot",
+ base::TimeTicks::Now() - beginning_time);
+ return true;
+}
+
+void RenderView::OnNavigate(const ViewMsg_Navigate_Params& params) {
+ if (!webview())
+ return;
+
+ history_list_offset_ = params.current_history_list_offset;
+ history_list_length_ = params.current_history_list_length;
+
+ child_process_logging::SetActiveURL(params.url);
+
+ AboutHandler::MaybeHandle(params.url);
+
+ bool is_reload =
+ params.navigation_type == ViewMsg_Navigate_Params::RELOAD ||
+ params.navigation_type == ViewMsg_Navigate_Params::RELOAD_IGNORING_CACHE;
+
+ WebFrame* main_frame = webview()->mainFrame();
+ if (is_reload && main_frame->currentHistoryItem().isNull()) {
+ // We cannot reload if we do not have any history state. This happens, for
+ // example, when recovering from a crash. Our workaround here is a bit of
+ // a hack since it means that reload after a crashed tab does not cause an
+ // end-to-end cache validation.
+ is_reload = false;
+ }
+
+ // A navigation resulting from loading a javascript URL should not be treated
+ // as a browser initiated event. Instead, we want it to look as if the page
+ // initiated any load resulting from JS execution.
+ if (!params.url.SchemeIs(chrome::kJavaScriptScheme)) {
+ NavigationState* state = NavigationState::CreateBrowserInitiated(
+ params.page_id,
+ params.pending_history_list_offset,
+ params.transition,
+ params.request_time);
+ if (params.navigation_type == ViewMsg_Navigate_Params::RESTORE) {
+ // We're doing a load of a page that was restored from the last session.
+ // By default this prefers the cache over loading (LOAD_PREFERRING_CACHE)
+ // which can result in stale data for pages that are set to expire. We
+ // explicitly override that by setting the policy here so that as
+ // necessary we load from the network.
+ state->set_cache_policy_override(WebURLRequest::UseProtocolCachePolicy);
+ }
+ pending_navigation_state_.reset(state);
+ }
+
+ NavigationState* navigation_state = pending_navigation_state_.get();
+
+ // If we are reloading, then WebKit will use the history state of the current
+ // page, so we should just ignore any given history state. Otherwise, if we
+ // have history state, then we need to navigate to it, which corresponds to a
+ // back/forward navigation event.
+ if (is_reload) {
+ if (navigation_state)
+ navigation_state->set_load_type(NavigationState::RELOAD);
+ bool ignore_cache = (params.navigation_type ==
+ ViewMsg_Navigate_Params::RELOAD_IGNORING_CACHE);
+ main_frame->reload(ignore_cache);
+ } else if (!params.state.empty()) {
+ // We must know the page ID of the page we are navigating back to.
+ DCHECK_NE(params.page_id, -1);
+ if (navigation_state)
+ navigation_state->set_load_type(NavigationState::HISTORY_LOAD);
+ main_frame->loadHistoryItem(
+ webkit_glue::HistoryItemFromString(params.state));
+ } else {
+ // Navigate to the given URL.
+ WebURLRequest request(params.url);
+
+ // A session history navigation should have been accompanied by state.
+ DCHECK_EQ(params.page_id, -1);
+
+ if (main_frame->isViewSourceModeEnabled())
+ request.setCachePolicy(WebURLRequest::ReturnCacheDataElseLoad);
+
+ if (params.referrer.is_valid()) {
+ request.setHTTPHeaderField(WebString::fromUTF8("Referer"),
+ WebString::fromUTF8(params.referrer.spec()));
+ }
+
+ if (!params.extra_headers.empty()) {
+ for (net::HttpUtil::HeadersIterator i(params.extra_headers.begin(),
+ params.extra_headers.end(), "\n");
+ i.GetNext(); ) {
+ request.addHTTPHeaderField(WebString::fromUTF8(i.name()),
+ WebString::fromUTF8(i.values()));
+ }
+ }
+
+ if (navigation_state) {
+ if (params.navigation_type != ViewMsg_Navigate_Params::PRERENDER) {
+ navigation_state->set_load_type(NavigationState::NORMAL_LOAD);
+ } else {
+ navigation_state->set_load_type(NavigationState::PRERENDER_LOAD);
+ is_prerendering_ = true;
+ }
+ }
+ main_frame->loadRequest(request);
+ }
+
+ // In case LoadRequest failed before DidCreateDataSource was called.
+ pending_navigation_state_.reset();
+}
+
+// Stop loading the current page
+void RenderView::OnStop() {
+ if (webview())
+ webview()->mainFrame()->stopLoading();
+}
+
+// Reload current focused frame.
+// E.g. called by right-clicking on the frame and picking "reload this frame".
+void RenderView::OnReloadFrame() {
+ if (webview() && webview()->focusedFrame()) {
+ // We always obey the cache (ignore_cache=false) here.
+ // TODO(evanm): perhaps we could allow shift-clicking the menu item to do
+ // a cache-ignoring reload of the frame.
+ webview()->focusedFrame()->reload(false);
+ }
+}
+
+void RenderView::OnCopyImageAt(int x, int y) {
+ webview()->copyImageAt(WebPoint(x, y));
+}
+
+void RenderView::OnExecuteEditCommand(const std::string& name,
+ const std::string& value) {
+ if (!webview() || !webview()->focusedFrame())
+ return;
+
+ webview()->focusedFrame()->executeCommand(
+ WebString::fromUTF8(name), WebString::fromUTF8(value));
+}
+
+void RenderView::OnSetupDevToolsClient() {
+ DCHECK(!devtools_client_);
+ devtools_client_ = new DevToolsClient(this);
+}
+
+void RenderView::OnUpdateTargetURLAck() {
+ // Check if there is a targeturl waiting to be sent.
+ if (target_url_status_ == TARGET_PENDING) {
+ Send(new ViewHostMsg_UpdateTargetURL(routing_id_, page_id_,
+ pending_target_url_));
+ }
+
+ target_url_status_ = TARGET_NONE;
+}
+
+void RenderView::OnUndo() {
+ if (!webview())
+ return;
+
+ webview()->focusedFrame()->executeCommand(WebString::fromUTF8("Undo"));
+ UserMetricsRecordAction("Undo");
+}
+
+void RenderView::OnRedo() {
+ if (!webview())
+ return;
+
+ webview()->focusedFrame()->executeCommand(WebString::fromUTF8("Redo"));
+ UserMetricsRecordAction("Redo");
+}
+
+void RenderView::OnCut() {
+ if (!webview())
+ return;
+
+ webview()->focusedFrame()->executeCommand(WebString::fromUTF8("Cut"));
+ UserMetricsRecordAction("Cut");
+}
+
+void RenderView::OnCopy() {
+ if (!webview())
+ return;
+
+ webview()->focusedFrame()->executeCommand(WebString::fromUTF8("Copy"));
+ UserMetricsRecordAction("Copy");
+}
+
+#if defined(OS_MACOSX)
+void RenderView::OnCopyToFindPboard() {
+ if (!webview())
+ return;
+
+ // Since the find pasteboard supports only plain text, this can be simpler
+ // than the |OnCopy()| case.
+ WebFrame* frame = webview()->focusedFrame();
+ if (frame->hasSelection()) {
+ string16 selection = frame->selectionAsText();
+ RenderThread::current()->Send(
+ new ClipboardHostMsg_FindPboardWriteStringAsync(selection));
+ }
+
+ UserMetricsRecordAction("CopyToFindPboard");
+}
+#endif
+
+void RenderView::OnPaste() {
+ if (!webview())
+ return;
+
+ webview()->focusedFrame()->executeCommand(WebString::fromUTF8("Paste"));
+ UserMetricsRecordAction("Paste");
+}
+
+void RenderView::OnReplace(const string16& text) {
+ if (!webview())
+ return;
+
+ WebFrame* frame = webview()->focusedFrame();
+ if (!frame->hasSelection())
+ frame->selectWordAroundCaret();
+ frame->replaceSelection(text);
+}
+
+void RenderView::OnAdvanceToNextMisspelling() {
+ if (!webview())
+ return;
+ webview()->focusedFrame()->executeCommand(
+ WebString::fromUTF8("AdvanceToNextMisspelling"));
+}
+
+void RenderView::OnToggleSpellPanel(bool is_currently_visible) {
+ if (!webview())
+ return;
+ // We need to tell the webView whether the spelling panel is visible or not so
+ // that it won't need to make ipc calls later.
+ spelling_panel_visible_ = is_currently_visible;
+ webview()->focusedFrame()->executeCommand(
+ WebString::fromUTF8("ToggleSpellPanel"));
+}
+
+void RenderView::OnToggleSpellCheck() {
+ if (!webview())
+ return;
+
+ WebFrame* frame = webview()->focusedFrame();
+ frame->enableContinuousSpellChecking(
+ !frame->isContinuousSpellCheckingEnabled());
+}
+
+void RenderView::OnDelete() {
+ if (!webview())
+ return;
+
+ webview()->focusedFrame()->executeCommand(WebString::fromUTF8("Delete"));
+ UserMetricsRecordAction("DeleteSelection");
+}
+
+void RenderView::OnSelectAll() {
+ if (!webview())
+ return;
+
+ webview()->focusedFrame()->executeCommand(
+ WebString::fromUTF8("SelectAll"));
+ UserMetricsRecordAction("SelectAll");
+}
+
+void RenderView::OnSetInitialFocus(bool reverse) {
+ if (!webview())
+ return;
+ webview()->setInitialFocus(reverse);
+}
+
+void RenderView::OnScrollFocusedEditableNodeIntoView() {
+ WebKit::WebNode node = GetFocusedNode();
+ if (!node.isNull()) {
+ if (IsEditableNode(node))
+ // TODO(varunjain): Change webkit API to scroll a particular node into
+ // view and use that API here instead.
+ webview()->scrollFocusedNodeIntoView();
+ }
+}
+
+///////////////////////////////////////////////////////////////////////////////
+
+void RenderView::SetContentSettings(const ContentSettings& settings) {
+ current_content_settings_ = settings;
+}
+
+// Tell the embedding application that the URL of the active page has changed
+void RenderView::UpdateURL(WebFrame* frame) {
+ WebDataSource* ds = frame->dataSource();
+ DCHECK(ds);
+
+ const WebURLRequest& request = ds->request();
+ const WebURLRequest& original_request = ds->originalRequest();
+ const WebURLResponse& response = ds->response();
+
+ NavigationState* navigation_state = NavigationState::FromDataSource(ds);
+ DCHECK(navigation_state);
+
+ ViewHostMsg_FrameNavigate_Params params;
+ params.http_status_code = response.httpStatusCode();
+ params.is_post = false;
+ params.page_id = page_id_;
+ params.frame_id = frame->identifier();
+ params.socket_address.set_host(response.remoteIPAddress().utf8());
+ params.socket_address.set_port(response.remotePort());
+ params.was_fetched_via_proxy = response.wasFetchedViaProxy();
+ params.was_within_same_page = navigation_state->was_within_same_page();
+ if (!navigation_state->security_info().empty()) {
+ // SSL state specified in the request takes precedence over the one in the
+ // response.
+ // So far this is only intended for error pages that are not expected to be
+ // over ssl, so we should not get any clash.
+ DCHECK(response.securityInfo().isEmpty());
+ params.security_info = navigation_state->security_info();
+ } else {
+ params.security_info = response.securityInfo();
+ }
+
+ // Set the URL to be displayed in the browser UI to the user.
+ if (ds->hasUnreachableURL()) {
+ params.url = ds->unreachableURL();
+ } else {
+ params.url = request.url();
+ }
+
+ GetRedirectChain(ds, &params.redirects);
+ params.should_update_history = !ds->hasUnreachableURL() &&
+ !response.isMultipartPayload() && (response.httpStatusCode() != 404);
+
+ params.searchable_form_url = navigation_state->searchable_form_url();
+ params.searchable_form_encoding =
+ navigation_state->searchable_form_encoding();
+
+ const PasswordForm* password_form_data =
+ navigation_state->password_form_data();
+ if (password_form_data)
+ params.password_form = *password_form_data;
+
+ params.gesture = navigation_gesture_;
+ navigation_gesture_ = NavigationGestureUnknown;
+
+ // Make navigation state a part of the FrameNavigate message so that commited
+ // entry had it at all times.
+ const WebHistoryItem& item = frame->currentHistoryItem();
+ if (!item.isNull()) {
+ params.content_state = webkit_glue::HistoryItemToString(item);
+ } else {
+ params.content_state =
+ webkit_glue::CreateHistoryStateForURL(GURL(request.url()));
+ }
+
+ if (!frame->parent()) {
+ // Top-level navigation.
+
+ // Clear "block" flags for the new page. This needs to happen before any of
+ // allowScripts(), allowImages(), allowPlugins() is called for the new page
+ // so that these functions can correctly detect that a piece of content
+ // flipped from "not blocked" to "blocked".
+ ClearBlockedContentSettings();
+
+ // Set content settings. Default them from the parent window if one exists.
+ // This makes sure about:blank windows work as expected.
+ HostContentSettings::iterator host_content_settings =
+ host_content_settings_.find(GURL(request.url()));
+ if (host_content_settings != host_content_settings_.end()) {
+ SetContentSettings(host_content_settings->second);
+
+ // These content settings were merely recorded transiently for this load.
+ // We can erase them now. If at some point we reload this page, the
+ // browser will send us new, up-to-date content settings.
+ host_content_settings_.erase(host_content_settings);
+ } else if (frame->opener()) {
+ // The opener's view is not guaranteed to be non-null (it could be
+ // detached from its page but not yet destructed).
+ if (WebView* opener_view = frame->opener()->view()) {
+ RenderView* opener = FromWebView(opener_view);
+ SetContentSettings(opener->current_content_settings_);
+ }
+ }
+
+ // Set zoom level, but don't do it for full-page plugin since they don't use
+ // the same zoom settings.
+ HostZoomLevels::iterator host_zoom =
+ host_zoom_levels_.find(GURL(request.url()));
+ if (webview()->mainFrame()->document().isPluginDocument()) {
+ // Reset the zoom levels for plugins.
+ webview()->setZoomLevel(false, 0);
+ } else {
+ if (host_zoom != host_zoom_levels_.end())
+ webview()->setZoomLevel(false, host_zoom->second);
+ }
+
+ if (host_zoom != host_zoom_levels_.end()) {
+ // This zoom level was merely recorded transiently for this load. We can
+ // erase it now. If at some point we reload this page, the browser will
+ // send us a new, up-to-date zoom level.
+ host_zoom_levels_.erase(host_zoom);
+ }
+
+ // Reset the zoom limits in case a plugin had changed them previously. This
+ // will also call us back which will cause us to send a message to
+ // update TabContents.
+ webview()->zoomLimitsChanged(
+ WebView::zoomFactorToZoomLevel(WebView::minTextSizeMultiplier),
+ WebView::zoomFactorToZoomLevel(WebView::maxTextSizeMultiplier));
+
+ // Update contents MIME type for main frame.
+ params.contents_mime_type = ds->response().mimeType().utf8();
+
+ params.transition = navigation_state->transition_type();
+ if (!PageTransition::IsMainFrame(params.transition)) {
+ // If the main frame does a load, it should not be reported as a subframe
+ // navigation. This can occur in the following case:
+ // 1. You're on a site with frames.
+ // 2. You do a subframe navigation. This is stored with transition type
+ // MANUAL_SUBFRAME.
+ // 3. You navigate to some non-frame site, say, google.com.
+ // 4. You navigate back to the page from step 2. Since it was initially
+ // MANUAL_SUBFRAME, it will be that same transition type here.
+ // We don't want that, because any navigation that changes the toplevel
+ // frame should be tracked as a toplevel navigation (this allows us to
+ // update the URL bar, etc).
+ params.transition = PageTransition::LINK;
+ }
+
+ // If we have a valid consumed client redirect source,
+ // the page contained a client redirect (meta refresh, document.loc...),
+ // so we set the referrer and transition to match.
+ if (completed_client_redirect_src_.is_valid()) {
+ DCHECK(completed_client_redirect_src_ == params.redirects[0]);
+ params.referrer = completed_client_redirect_src_;
+ params.transition = static_cast<PageTransition::Type>(
+ params.transition | PageTransition::CLIENT_REDIRECT);
+ } else {
+ // Bug 654101: the referrer will be empty on https->http transitions. It
+ // would be nice if we could get the real referrer from somewhere.
+ params.referrer = GURL(
+ original_request.httpHeaderField(WebString::fromUTF8("Referer")));
+ }
+
+ string16 method = request.httpMethod();
+ if (EqualsASCII(method, "POST"))
+ params.is_post = true;
+
+ // Save some histogram data so we can compute the average memory used per
+ // page load of the glyphs.
+ UMA_HISTOGRAM_COUNTS_10000("Memory.GlyphPagesPerLoad",
+ webkit_glue::GetGlyphPageCount());
+
+ // This message needs to be sent before any of allowScripts(),
+ // allowImages(), allowPlugins() is called for the new page, so that when
+ // these functions send a ViewHostMsg_ContentBlocked message, it arrives
+ // after the ViewHostMsg_FrameNavigate message.
+ Send(new ViewHostMsg_FrameNavigate(routing_id_, params));
+ } else {
+ // Subframe navigation: the type depends on whether this navigation
+ // generated a new session history entry. When they do generate a session
+ // history entry, it means the user initiated the navigation and we should
+ // mark it as such. This test checks if this is the first time UpdateURL
+ // has been called since WillNavigateToURL was called to initiate the load.
+ if (page_id_ > last_page_id_sent_to_browser_)
+ params.transition = PageTransition::MANUAL_SUBFRAME;
+ else
+ params.transition = PageTransition::AUTO_SUBFRAME;
+
+ Send(new ViewHostMsg_FrameNavigate(routing_id_, params));
+ }
+
+ last_page_id_sent_to_browser_ =
+ std::max(last_page_id_sent_to_browser_, page_id_);
+
+ // If we end up reusing this WebRequest (for example, due to a #ref click),
+ // we don't want the transition type to persist. Just clear it.
+ navigation_state->set_transition_type(PageTransition::LINK);
+
+ // Check if the navigation was within the same page, in which case we don't
+ // want to clear the accessibility cache.
+ if (accessibility_.get() && !navigation_state->was_within_same_page()) {
+ accessibility_.reset();
+ pending_accessibility_notifications_.clear();
+ }
+}
+
+// Tell the embedding application that the title of the active page has changed
+void RenderView::UpdateTitle(WebFrame* frame, const string16& title) {
+ // Ignore all but top level navigations...
+ if (!frame->parent()) {
+ Send(new ViewHostMsg_UpdateTitle(
+ routing_id_,
+ page_id_,
+ UTF16ToWideHack(title.length() > chrome::kMaxTitleChars ?
+ title.substr(0, chrome::kMaxTitleChars) : title)));
+ }
+}
+
+void RenderView::UpdateEncoding(WebFrame* frame,
+ const std::string& encoding_name) {
+ // Only update main frame's encoding_name.
+ if (webview()->mainFrame() == frame &&
+ last_encoding_name_ != encoding_name) {
+ // Save the encoding name for later comparing.
+ last_encoding_name_ = encoding_name;
+
+ Send(new ViewHostMsg_UpdateEncoding(routing_id_, last_encoding_name_));
+ }
+}
+
+// Sends the last committed session history state to the browser so it will be
+// saved before we navigate to a new page. This must be called *before* the
+// page ID has been updated so we know what it was.
+void RenderView::UpdateSessionHistory(WebFrame* frame) {
+ // If we have a valid page ID at this point, then it corresponds to the page
+ // we are navigating away from. Otherwise, this is the first navigation, so
+ // there is no past session history to record.
+ if (page_id_ == -1)
+ return;
+
+ const WebHistoryItem& item =
+ webview()->mainFrame()->previousHistoryItem();
+ if (item.isNull())
+ return;
+
+ Send(new ViewHostMsg_UpdateState(
+ routing_id_, page_id_, webkit_glue::HistoryItemToString(item)));
+}
+
+void RenderView::OpenURL(
+ const GURL& url, const GURL& referrer, WebNavigationPolicy policy) {
+ Send(new ViewHostMsg_OpenURL(
+ routing_id_, url, referrer, NavigationPolicyToDisposition(policy)));
+}
+
+// WebViewDelegate ------------------------------------------------------------
+
+void RenderView::LoadNavigationErrorPage(WebFrame* frame,
+ const WebURLRequest& failed_request,
+ const WebURLError& error,
+ const std::string& html,
+ bool replace) {
+ std::string alt_html = !html.empty() ? html :
+ content::GetContentClient()->renderer()->GetNavigationErrorHtml(
+ failed_request, error);
+ frame->loadHTMLString(alt_html,
+ GURL(chrome::kUnreachableWebDataURL),
+ error.unreachableURL,
+ replace);
+}
+
+void RenderView::BindDOMAutomationController(WebFrame* frame) {
+ if (!dom_automation_controller_.get()) {
+ dom_automation_controller_.reset(new DomAutomationController());
+ }
+ dom_automation_controller_->set_message_sender(this);
+ dom_automation_controller_->set_routing_id(routing_id_);
+ dom_automation_controller_->BindToJavascript(frame,
+ "domAutomationController");
+}
+
+bool RenderView::RunJavaScriptMessage(int type,
+ const std::wstring& message,
+ const std::wstring& default_value,
+ const GURL& frame_url,
+ std::wstring* result) {
+ bool success = false;
+ std::wstring result_temp;
+ if (!result)
+ result = &result_temp;
+
+ SendAndRunNestedMessageLoop(new ViewHostMsg_RunJavaScriptMessage(
+ routing_id_, message, default_value, frame_url, type, &success, result));
+ return success;
+}
+
+bool RenderView::SendAndRunNestedMessageLoop(IPC::SyncMessage* message) {
+ // Before WebKit asks us to show an alert (etc.), it takes care of doing the
+ // equivalent of WebView::willEnterModalLoop. In the case of showModalDialog
+ // it is particularly important that we do not call willEnterModalLoop as
+ // that would defer resource loads for the dialog itself.
+ if (RenderThread::current()) // Will be NULL during unit tests.
+ RenderThread::current()->DoNotNotifyWebKitOfModalLoop();
+
+ message->EnableMessagePumping(); // Runs a nested message loop.
+ return Send(message);
+}
+
+void RenderView::AddGURLSearchProvider(
+ const GURL& osd_url,
+ const ViewHostMsg_PageHasOSDD_Type& provider_type) {
+ if (!osd_url.is_empty())
+ Send(new ViewHostMsg_PageHasOSDD(routing_id_, page_id_, osd_url,
+ provider_type));
+}
+
+void RenderView::OnAllowScriptToClose(bool script_can_close) {
+ script_can_close_ = script_can_close;
+}
+
+void RenderView::AddSearchProvider(
+ const std::string& url,
+ const ViewHostMsg_PageHasOSDD_Type& provider_type) {
+ if (provider_type.type ==
+ ViewHostMsg_PageHasOSDD_Type::EXPLICIT_DEFAULT_PROVIDER &&
+ !webview()->mainFrame()->isProcessingUserGesture())
+ return;
+
+ AddGURLSearchProvider(GURL(url), provider_type);
+}
+
+ViewHostMsg_GetSearchProviderInstallState_Params
+RenderView::GetSearchProviderInstallState(WebFrame* frame,
+ const std::string& url) {
+ GURL inquiry_url = GURL(url);
+ if (inquiry_url.is_empty())
+ return ViewHostMsg_GetSearchProviderInstallState_Params::Denied();
+
+ ViewHostMsg_GetSearchProviderInstallState_Params install;
+ Send(new ViewHostMsg_GetSearchProviderInstallState(routing_id_,
+ frame->url(),
+ inquiry_url,
+ &install));
+ return install;
+}
+
+void RenderView::OnMissingPluginStatus(
+ WebPluginDelegateProxy* delegate,
+ int status) {
+#if defined(OS_WIN)
+ if (!first_default_plugin_) {
+ // Show the InfoBar for the first available plugin.
+ if (status == webkit::npapi::default_plugin::MISSING_PLUGIN_AVAILABLE) {
+ first_default_plugin_ = delegate->AsWeakPtr();
+ Send(new ViewHostMsg_MissingPluginStatus(routing_id_, status));
+ }
+ } else {
+ // Closes the InfoBar if user clicks on the plugin (instead of the InfoBar)
+ // to start the download/install.
+ if (status ==
+ webkit::npapi::default_plugin::MISSING_PLUGIN_USER_STARTED_DOWNLOAD) {
+ Send(new ViewHostMsg_MissingPluginStatus(routing_id_, status));
+ }
+ }
+#else
+ // TODO(port): Implement the infobar that accompanies the default plugin.
+ // Linux: http://crbug.com/10952
+ // Mac: http://crbug.com/17392
+ NOTIMPLEMENTED();
+#endif
+}
+
+// WebKit::WebViewClient ------------------------------------------------------
+
+WebView* RenderView::createView(
+ WebFrame* creator,
+ const WebURLRequest& request,
+ const WebWindowFeatures& features,
+ const WebString& frame_name) {
+ // Check to make sure we aren't overloading on popups.
+ if (shared_popup_counter_->data > kMaximumNumberOfUnacknowledgedPopups)
+ return NULL;
+
+ // This window can't be closed from a window.close() call until we receive a
+ // message from the Browser process explicitly allowing it.
+ script_can_close_ = false;
+
+ ViewHostMsg_CreateWindow_Params params;
+ params.opener_id = routing_id_;
+ params.user_gesture = creator->isProcessingUserGesture();
+ params.window_container_type = WindowFeaturesToContainerType(features);
+ params.session_storage_namespace_id = session_storage_namespace_id_;
+ params.frame_name = frame_name;
+ params.opener_frame_id = creator->identifier();
+ params.opener_url = creator->url();
+ params.opener_security_origin = creator->securityOrigin().toString().utf8();
+ if (!request.isNull())
+ params.target_url = request.url();
+
+ int32 routing_id = MSG_ROUTING_NONE;
+ int64 cloned_session_storage_namespace_id;
+ bool opener_suppressed = creator->willSuppressOpenerInNewFrame();
+
+ render_thread_->Send(
+ new ViewHostMsg_CreateWindow(params,
+ &routing_id,
+ &cloned_session_storage_namespace_id));
+ if (routing_id == MSG_ROUTING_NONE)
+ return NULL;
+
+ RenderView* view = RenderView::Create(render_thread_,
+ 0,
+ routing_id_,
+ renderer_preferences_,
+ webkit_preferences_,
+ shared_popup_counter_,
+ routing_id,
+ cloned_session_storage_namespace_id,
+ frame_name);
+ view->opened_by_user_gesture_ = params.user_gesture;
+
+ // Record whether the creator frame is trying to suppress the opener field.
+ view->opener_suppressed_ = opener_suppressed;
+
+ // Record the security origin of the creator.
+ GURL creator_url(creator->securityOrigin().toString().utf8());
+ if (!creator_url.is_valid() || !creator_url.IsStandard())
+ creator_url = GURL();
+ view->creator_url_ = creator_url;
+
+ // Copy over the alternate error page URL so we can have alt error pages in
+ // the new render view (we don't need the browser to send the URL back down).
+ view->alternate_error_page_url_ = alternate_error_page_url_;
+
+ return view->webview();
+}
+
+WebWidget* RenderView::createPopupMenu(WebKit::WebPopupType popup_type) {
+ RenderWidget* widget = RenderWidget::Create(routing_id_,
+ render_thread_,
+ popup_type);
+ return widget->webwidget();
+}
+
+WebWidget* RenderView::createPopupMenu(const WebPopupMenuInfo& info) {
+ // TODO(jcivelli): Remove this deprecated method when its been removed from
+ // the WebViewClient interface. It's been replaced by
+ // createExternalPopupMenu.
+ NOTREACHED();
+ return NULL;
+}
+
+WebExternalPopupMenu* RenderView::createExternalPopupMenu(
+ const WebPopupMenuInfo& popup_menu_info,
+ WebExternalPopupMenuClient* popup_menu_client) {
+ DCHECK(!external_popup_menu_.get());
+ external_popup_menu_.reset(
+ new ExternalPopupMenu(this, popup_menu_info, popup_menu_client));
+ return external_popup_menu_.get();
+}
+
+webkit::ppapi::FullscreenContainer*
+RenderView::CreatePepperFullscreenContainer(
+ webkit::ppapi::PluginInstance* plugin) {
+ RenderWidgetFullscreenPepper* widget =
+ RenderWidgetFullscreenPepper::Create(routing_id_, render_thread_, plugin);
+ widget->show(WebKit::WebNavigationPolicyIgnore);
+ return widget;
+}
+
+WebStorageNamespace* RenderView::createSessionStorageNamespace(unsigned quota) {
+ if (CommandLine::ForCurrentProcess()->HasSwitch(switches::kSingleProcess))
+ return WebStorageNamespace::createSessionStorageNamespace(quota);
+ CHECK(session_storage_namespace_id_ != kInvalidSessionStorageNamespaceId);
+ return new RendererWebStorageNamespaceImpl(DOM_STORAGE_SESSION,
+ session_storage_namespace_id_);
+}
+
+void RenderView::didAddMessageToConsole(
+ const WebConsoleMessage& message, const WebString& source_name,
+ unsigned source_line) {
+ Send(new ViewHostMsg_AddMessageToConsole(routing_id_,
+ UTF16ToWideHack(message.text),
+ static_cast<int32>(source_line),
+ UTF16ToWideHack(source_name)));
+}
+
+void RenderView::printPage(WebFrame* frame) {
+ print_helper_->ScriptInitiatedPrint(frame);
+}
+
+WebKit::WebNotificationPresenter* RenderView::notificationPresenter() {
+ return notification_provider_;
+}
+
+void RenderView::didStartLoading() {
+ if (is_loading_) {
+ DLOG(WARNING) << "didStartLoading called while loading";
+ return;
+ }
+
+ is_loading_ = true;
+ // Clear the pointer so that we can assign it only when there is an unknown
+ // plugin on a page.
+ first_default_plugin_.reset();
+
+ Send(new ViewHostMsg_DidStartLoading(routing_id_));
+}
+
+void RenderView::didStopLoading() {
+ if (!is_loading_) {
+ DLOG(WARNING) << "DidStopLoading called while not loading";
+ return;
+ }
+
+ is_loading_ = false;
+
+ // NOTE: For now we're doing the safest thing, and sending out notification
+ // when done loading. This currently isn't an issue as the favicon is only
+ // displayed when done loading. Ideally we would send notification when
+ // finished parsing the head, but webkit doesn't support that yet.
+ // The feed discovery code would also benefit from access to the head.
+ GURL favicon_url(webview()->mainFrame()->favIconURL());
+ if (!favicon_url.is_empty())
+ Send(new ViewHostMsg_UpdateFaviconURL(routing_id_, page_id_, favicon_url));
+
+ AddGURLSearchProvider(webview()->mainFrame()->openSearchDescriptionURL(),
+ ViewHostMsg_PageHasOSDD_Type::Autodetected());
+
+ Send(new ViewHostMsg_DidStopLoading(routing_id_));
+
+ if (load_progress_tracker_ != NULL)
+ load_progress_tracker_->DidStopLoading();
+
+ MessageLoop::current()->PostDelayedTask(
+ FROM_HERE,
+ page_info_method_factory_.NewRunnableMethod(
+ &RenderView::CapturePageInfo, page_id_, false),
+ send_content_state_immediately_ ? 0 : kDelayForCaptureMs);
+}
+
+void RenderView::didChangeLoadProgress(WebFrame* frame, double load_progress) {
+ if (load_progress_tracker_ != NULL)
+ load_progress_tracker_->DidChangeLoadProgress(frame, load_progress);
+}
+
+bool RenderView::isSmartInsertDeleteEnabled() {
+#if defined(OS_MACOSX)
+ return true;
+#else
+ return false;
+#endif
+}
+
+bool RenderView::isSelectTrailingWhitespaceEnabled() {
+#if defined(OS_WIN)
+ return true;
+#else
+ return false;
+#endif
+}
+
+void RenderView::didChangeSelection(bool is_empty_selection) {
+#if defined(OS_POSIX)
+ if (!handling_input_event_)
+ return;
+ // TODO(estade): investigate incremental updates to the selection so that we
+ // don't send the entire selection over IPC every time.
+ if (!is_empty_selection) {
+ // Sometimes we get repeated didChangeSelection calls from webkit when
+ // the selection hasn't actually changed. We don't want to report these
+ // because it will cause us to continually claim the X clipboard.
+ const std::string& this_selection =
+ webview()->focusedFrame()->selectionAsText().utf8();
+ if (this_selection == last_selection_)
+ return;
+
+ Send(new ViewHostMsg_SelectionChanged(routing_id_,
+ this_selection));
+ last_selection_ = this_selection;
+ } else {
+ last_selection_.clear();
+ Send(new ViewHostMsg_SelectionChanged(routing_id_,
+ last_selection_));
+ }
+#endif // defined(OS_POSIX)
+}
+
+void RenderView::didExecuteCommand(const WebString& command_name) {
+ const std::string& name = UTF16ToUTF8(command_name);
+ if (StartsWithASCII(name, "Move", true) ||
+ StartsWithASCII(name, "Insert", true) ||
+ StartsWithASCII(name, "Delete", true))
+ return;
+ UserMetricsRecordAction(name);
+}
+
+void RenderView::SendPendingAccessibilityNotifications() {
+ if (!accessibility_.get())
+ return;
+
+ if (pending_accessibility_notifications_.empty())
+ return;
+
+ // Send all pending accessibility notifications.
+ std::vector<ViewHostMsg_AccessibilityNotification_Params> notifications;
+ for (size_t i = 0; i < pending_accessibility_notifications_.size(); i++) {
+ RendererAccessibilityNotification& notification =
+ pending_accessibility_notifications_[i];
+ WebAccessibilityObject obj = accessibility_->getObjectById(notification.id);
+ if (!obj.isValid())
+ continue;
+
+ ViewHostMsg_AccessibilityNotification_Params param;
+ WebAccessibilityNotificationToViewHostMsg(
+ pending_accessibility_notifications_[i].type, &param.notification_type);
+ param.acc_obj = WebAccessibility(
+ obj, accessibility_.get(), notification.ShouldIncludeChildren());
+ notifications.push_back(param);
+ }
+ pending_accessibility_notifications_.clear();
+ Send(new ViewHostMsg_AccessibilityNotifications(routing_id_, notifications));
+ accessibility_ack_pending_ = true;
+}
+
+bool RenderView::handleCurrentKeyboardEvent() {
+ if (edit_commands_.empty())
+ return false;
+
+ WebFrame* frame = webview()->focusedFrame();
+ if (!frame)
+ return false;
+
+ EditCommands::iterator it = edit_commands_.begin();
+ EditCommands::iterator end = edit_commands_.end();
+
+ bool did_execute_command = false;
+ for (; it != end; ++it) {
+ // In gtk and cocoa, it's possible to bind multiple edit commands to one
+ // key (but it's the exception). Once one edit command is not executed, it
+ // seems safest to not execute the rest.
+ if (!frame->executeCommand(WebString::fromUTF8(it->name),
+ WebString::fromUTF8(it->value)))
+ break;
+ did_execute_command = true;
+ }
+
+ return did_execute_command;
+}
+
+void RenderView::spellCheck(const WebString& text,
+ int& misspelled_offset,
+ int& misspelled_length) {
+ EnsureDocumentTag();
+
+ string16 word(text);
+ RenderThread* thread = RenderThread::current();
+ // Will be NULL during unit tests.
+ if (thread) {
+ thread->spellchecker()->SpellCheckWord(
+ word.c_str(), word.size(), document_tag_,
+ &misspelled_offset, &misspelled_length, NULL);
+ }
+}
+
+void RenderView::requestCheckingOfText(
+ const WebString& text,
+ WebKit::WebTextCheckingCompletion* completion) {
+ spellcheck_provider_->RequestTextChecking(text, document_tag_, completion);
+}
+
+WebString RenderView::autoCorrectWord(const WebKit::WebString& word) {
+ string16 autocorrect_word;
+ const CommandLine& command_line = *CommandLine::ForCurrentProcess();
+ if (command_line.HasSwitch(switches::kExperimentalSpellcheckerFeatures)) {
+ EnsureDocumentTag();
+ RenderThread* thread = RenderThread::current();
+ // Will be NULL during unit tests.
+ if (thread) {
+ autocorrect_word =
+ thread->spellchecker()->GetAutoCorrectionWord(
+ word, document_tag_);
+ }
+ }
+ return autocorrect_word;
+}
+
+void RenderView::showSpellingUI(bool show) {
+ Send(new ViewHostMsg_ShowSpellingPanel(routing_id_, show));
+}
+
+bool RenderView::isShowingSpellingUI() {
+ return spelling_panel_visible_;
+}
+
+void RenderView::updateSpellingUIWithMisspelledWord(const WebString& word) {
+ Send(new ViewHostMsg_UpdateSpellingPanelWithMisspelledWord(routing_id_,
+ word));
+}
+
+void RenderView::continuousSpellCheckingEnabledStateChanged() {
+ UpdateToggleSpellCheckCommandState();
+}
+
+bool RenderView::runFileChooser(
+ const WebKit::WebFileChooserParams& params,
+ WebFileChooserCompletion* chooser_completion) {
+ // Do not open the file dialog in a hidden RenderView.
+ if (is_hidden())
+ return false;
+ ViewHostMsg_RunFileChooser_Params ipc_params;
+ if (params.directory)
+ ipc_params.mode = ViewHostMsg_RunFileChooser_Params::OpenFolder;
+ else if (params.multiSelect)
+ ipc_params.mode = ViewHostMsg_RunFileChooser_Params::OpenMultiple;
+ else
+ ipc_params.mode = ViewHostMsg_RunFileChooser_Params::Open;
+ ipc_params.title = params.title;
+ ipc_params.default_file_name =
+ webkit_glue::WebStringToFilePath(params.initialValue);
+ ipc_params.accept_types = params.acceptTypes;
+
+ return ScheduleFileChooser(ipc_params, chooser_completion);
+}
+
+void RenderView::runModalAlertDialog(
+ WebFrame* frame, const WebString& message) {
+ RunJavaScriptMessage(ui::MessageBoxFlags::kIsJavascriptAlert,
+ UTF16ToWideHack(message),
+ std::wstring(),
+ frame->url(),
+ NULL);
+}
+
+bool RenderView::runModalConfirmDialog(
+ WebFrame* frame, const WebString& message) {
+ return RunJavaScriptMessage(ui::MessageBoxFlags::kIsJavascriptConfirm,
+ UTF16ToWideHack(message),
+ std::wstring(),
+ frame->url(),
+ NULL);
+}
+
+bool RenderView::runModalPromptDialog(
+ WebFrame* frame, const WebString& message, const WebString& default_value,
+ WebString* actual_value) {
+ std::wstring result;
+ bool ok = RunJavaScriptMessage(ui::MessageBoxFlags::kIsJavascriptPrompt,
+ UTF16ToWideHack(message),
+ UTF16ToWideHack(default_value),
+ frame->url(),
+ &result);
+ if (ok)
+ actual_value->assign(WideToUTF16Hack(result));
+ return ok;
+}
+
+bool RenderView::runModalBeforeUnloadDialog(
+ WebFrame* frame, const WebString& message) {
+ bool success = false;
+ // This is an ignored return value, but is included so we can accept the same
+ // response as RunJavaScriptMessage.
+ std::wstring ignored_result;
+ SendAndRunNestedMessageLoop(new ViewHostMsg_RunBeforeUnloadConfirm(
+ routing_id_, frame->url(), UTF16ToWideHack(message), &success,
+ &ignored_result));
+ return success;
+}
+
+void RenderView::showContextMenu(
+ WebFrame* frame, const WebContextMenuData& data) {
+ ContextMenuParams params = ContextMenuParams(data);
+ if (!params.misspelled_word.empty() && RenderThread::current()) {
+ int misspelled_offset, misspelled_length;
+ bool spelled_right = RenderThread::current()->spellchecker()->
+ SpellCheckWord(
+ params.misspelled_word.c_str(), params.misspelled_word.size(),
+ document_tag_,
+ &misspelled_offset, &misspelled_length,
+ &params.dictionary_suggestions);
+ if (spelled_right)
+ params.misspelled_word.clear();
+ }
+ // Serializing a GURL longer than content::kMaxURLChars will fail, so don't do
+ // it. We replace it with an empty GURL so the appropriate items are disabled
+ // in the context menu.
+ // TODO(jcivelli): http://crbug.com/45160 This prevents us from saving large
+ // data encoded images. We should have a way to save them.
+ if (params.src_url.spec().size() > content::kMaxURLChars)
+ params.src_url = GURL();
+ context_menu_node_ = data.node;
+ Send(new ViewHostMsg_ContextMenu(routing_id_, params));
+}
+
+bool RenderView::supportsFullscreen() {
+ return CommandLine::ForCurrentProcess()->HasSwitch(
+ switches::kEnableVideoFullscreen);
+}
+
+void RenderView::enterFullscreenForNode(const WebKit::WebNode& node) {
+ NOTIMPLEMENTED();
+}
+
+void RenderView::exitFullscreenForNode(const WebKit::WebNode& node) {
+ NOTIMPLEMENTED();
+}
+
+void RenderView::setStatusText(const WebString& text) {
+}
+
+void RenderView::UpdateTargetURL(const GURL& url, const GURL& fallback_url) {
+ GURL latest_url = url.is_empty() ? fallback_url : url;
+ if (latest_url == target_url_)
+ return;
+
+ // Tell the browser to display a destination link.
+ if (target_url_status_ == TARGET_INFLIGHT ||
+ target_url_status_ == TARGET_PENDING) {
+ // If we have a request in-flight, save the URL to be sent when we
+ // receive an ACK to the in-flight request. We can happily overwrite
+ // any existing pending sends.
+ pending_target_url_ = latest_url;
+ target_url_status_ = TARGET_PENDING;
+ } else {
+ Send(new ViewHostMsg_UpdateTargetURL(routing_id_, page_id_, latest_url));
+ target_url_ = latest_url;
+ target_url_status_ = TARGET_INFLIGHT;
+ }
+}
+
+void RenderView::UpdateToggleSpellCheckCommandState() {
+ bool is_enabled = false;
+ WebKit::WebNode node = GetFocusedNode();
+ if (!node.isNull())
+ is_enabled = IsEditableNode(node);
+
+ RenderViewCommandCheckedState checked_state =
+ RENDER_VIEW_COMMAND_CHECKED_STATE_UNCHECKED;
+ if (is_enabled && webview()) {
+ WebFrame* frame = webview()->focusedFrame();
+ if (frame->isContinuousSpellCheckingEnabled())
+ checked_state = RENDER_VIEW_COMMAND_CHECKED_STATE_CHECKED;
+ }
+
+ Send(new ViewHostMsg_CommandStateChanged(
+ routing_id_,
+ RENDER_VIEW_COMMAND_TOGGLE_SPELL_CHECK,
+ is_enabled,
+ checked_state));
+}
+
+void RenderView::StartNavStateSyncTimerIfNecessary() {
+ int delay;
+ if (send_content_state_immediately_)
+ delay = 0;
+ else if (is_hidden())
+ delay = kDelaySecondsForContentStateSyncHidden;
+ else
+ delay = kDelaySecondsForContentStateSync;
+
+ if (nav_state_sync_timer_.IsRunning()) {
+ // The timer is already running. If the delay of the timer maches the amount
+ // we want to delay by, then return. Otherwise stop the timer so that it
+ // gets started with the right delay.
+ if (nav_state_sync_timer_.GetCurrentDelay().InSeconds() == delay)
+ return;
+ nav_state_sync_timer_.Stop();
+ }
+
+ nav_state_sync_timer_.Start(
+ TimeDelta::FromSeconds(delay), this, &RenderView::SyncNavigationState);
+}
+
+void RenderView::setMouseOverURL(const WebURL& url) {
+ mouse_over_url_ = GURL(url);
+ UpdateTargetURL(mouse_over_url_, focus_url_);
+}
+
+void RenderView::setKeyboardFocusURL(const WebURL& url) {
+ focus_url_ = GURL(url);
+ UpdateTargetURL(focus_url_, mouse_over_url_);
+}
+
+void RenderView::setToolTipText(const WebString& text, WebTextDirection hint) {
+ Send(new ViewHostMsg_SetTooltipText(routing_id_, UTF16ToWideHack(text),
+ hint));
+}
+
+void RenderView::startDragging(const WebDragData& data,
+ WebDragOperationsMask mask,
+ const WebImage& image,
+ const WebPoint& imageOffset) {
+#if WEBKIT_USING_SKIA
+ SkBitmap bitmap(image.getSkBitmap());
+#elif WEBKIT_USING_CG
+ SkBitmap bitmap = gfx::CGImageToSkBitmap(image.getCGImageRef());
+#endif
+
+ Send(new ViewHostMsg_StartDragging(routing_id_,
+ WebDropData(data),
+ mask,
+ bitmap,
+ imageOffset));
+}
+
+bool RenderView::acceptsLoadDrops() {
+ return renderer_preferences_.can_accept_load_drops;
+}
+
+void RenderView::focusNext() {
+ Send(new ViewHostMsg_TakeFocus(routing_id_, false));
+}
+
+void RenderView::focusPrevious() {
+ Send(new ViewHostMsg_TakeFocus(routing_id_, true));
+}
+
+void RenderView::focusedNodeChanged(const WebNode& node) {
+ Send(new ViewHostMsg_FocusedNodeChanged(routing_id_, IsEditableNode(node)));
+
+ if (WebAccessibilityCache::accessibilityEnabled() && node.isNull()) {
+ // TODO(ctguil): Make WebKit send this notification.
+ // When focus is cleared notify accessibility that the document is focused.
+ postAccessibilityNotification(
+ webview()->accessibilityObject(),
+ WebKit::WebAccessibilityNotificationFocusedUIElementChanged);
+ }
+
+ UpdateToggleSpellCheckCommandState();
+}
+
+void RenderView::navigateBackForwardSoon(int offset) {
+ Send(new ViewHostMsg_GoToEntryAtOffset(routing_id_, offset));
+}
+
+int RenderView::historyBackListCount() {
+ return history_list_offset_ < 0 ? 0 : history_list_offset_;
+}
+
+int RenderView::historyForwardListCount() {
+ return history_list_length_ - historyBackListCount() - 1;
+}
+
+void RenderView::didUpdateInspectorSetting(const WebString& key,
+ const WebString& value) {
+ Send(new ViewHostMsg_UpdateInspectorSetting(routing_id_,
+ key.utf8(),
+ value.utf8()));
+}
+
+// WebKit::WebWidgetClient ----------------------------------------------------
+
+void RenderView::didFocus() {
+ // TODO(jcivelli): when https://bugs.webkit.org/show_bug.cgi?id=33389 is fixed
+ // we won't have to test for user gesture anymore and we can
+ // move that code back to render_widget.cc
+ if (webview() && webview()->mainFrame() &&
+ webview()->mainFrame()->isProcessingUserGesture()) {
+ Send(new ViewHostMsg_Focus(routing_id_));
+ }
+}
+
+void RenderView::didBlur() {
+ // TODO(jcivelli): see TODO above in didFocus().
+ if (webview() && webview()->mainFrame() &&
+ webview()->mainFrame()->isProcessingUserGesture()) {
+ Send(new ViewHostMsg_Blur(routing_id_));
+ }
+}
+
+// We are supposed to get a single call to Show for a newly created RenderView
+// that was created via RenderView::CreateWebView. So, we wait until this
+// point to dispatch the ShowView message.
+//
+// This method provides us with the information about how to display the newly
+// created RenderView (i.e., as a constrained popup or as a new tab).
+//
+void RenderView::show(WebNavigationPolicy policy) {
+ DCHECK(!did_show_) << "received extraneous Show call";
+ DCHECK(opener_id_ != MSG_ROUTING_NONE);
+
+ if (did_show_)
+ return;
+ did_show_ = true;
+
+ // Extensions and apps always allowed to create unrequested popups. The second
+ // check is necessary to include content scripts.
+ if (render_thread_->GetExtensions()->GetByURL(creator_url_) ||
+ bindings_utils::GetInfoForCurrentContext()) {
+ opened_by_user_gesture_ = true;
+ }
+
+ // Force new windows to a popup if they were not opened with a user gesture.
+ if (!opened_by_user_gesture_) {
+ // We exempt background tabs for compat with older versions of Chrome.
+ // TODO(darin): This seems bogus. These should have a user gesture, so
+ // we probably don't need this check.
+ if (policy != WebKit::WebNavigationPolicyNewBackgroundTab)
+ policy = WebKit::WebNavigationPolicyNewPopup;
+ }
+
+ // NOTE: initial_pos_ may still have its default values at this point, but
+ // that's okay. It'll be ignored if disposition is not NEW_POPUP, or the
+ // browser process will impose a default position otherwise.
+ Send(new ViewHostMsg_ShowView(opener_id_, routing_id_,
+ NavigationPolicyToDisposition(policy), initial_pos_,
+ opened_by_user_gesture_));
+ SetPendingWindowRect(initial_pos_);
+}
+
+void RenderView::runModal() {
+ DCHECK(did_show_) << "should already have shown the view";
+
+ // We must keep WebKit's shared timer running in this case in order to allow
+ // showModalDialog to function properly.
+ //
+ // TODO(darin): WebKit should really be smarter about suppressing events and
+ // timers so that we do not need to manage the shared timer in such a heavy
+ // handed manner.
+ //
+ if (RenderThread::current()) // Will be NULL during unit tests.
+ RenderThread::current()->DoNotSuspendWebKitSharedTimer();
+
+ SendAndRunNestedMessageLoop(new ViewHostMsg_RunModal(routing_id_));
+}
+
+// WebKit::WebFrameClient -----------------------------------------------------
+
+WebPlugin* RenderView::createPlugin(WebFrame* frame,
+ const WebPluginParams& params) {
+ WebPlugin* plugin = content::GetContentClient()->renderer()->CreatePlugin(
+ this, frame, params);
+ if (!plugin)
+ plugin = CreatePluginNoCheck(frame, params);
+ return plugin;
+}
+
+WebWorker* RenderView::createWorker(WebFrame* frame, WebWorkerClient* client) {
+ WebApplicationCacheHostImpl* appcache_host =
+ WebApplicationCacheHostImpl::FromFrame(frame);
+ int appcache_host_id = appcache_host ? appcache_host->host_id() : 0;
+ return new WebWorkerProxy(client, RenderThread::current(), routing_id_,
+ appcache_host_id);
+}
+
+WebSharedWorker* RenderView::createSharedWorker(
+ WebFrame* frame, const WebURL& url, const WebString& name,
+ unsigned long long document_id) {
+
+ int route_id = MSG_ROUTING_NONE;
+ bool exists = false;
+ bool url_mismatch = false;
+ ViewHostMsg_CreateWorker_Params params;
+ params.url = url;
+ params.is_shared = true;
+ params.name = name;
+ params.document_id = document_id;
+ params.render_view_route_id = routing_id_;
+ params.route_id = MSG_ROUTING_NONE;
+ params.parent_appcache_host_id = 0;
+ params.script_resource_appcache_id = 0;
+ Send(new ViewHostMsg_LookupSharedWorker(
+ params, &exists, &route_id, &url_mismatch));
+ if (url_mismatch) {
+ return NULL;
+ } else {
+ return new WebSharedWorkerProxy(RenderThread::current(),
+ document_id,
+ exists,
+ route_id,
+ routing_id_);
+ }
+}
+
+WebMediaPlayer* RenderView::createMediaPlayer(
+ WebFrame* frame, WebMediaPlayerClient* client) {
+ scoped_ptr<media::MessageLoopFactory> message_loop_factory(
+ new media::MessageLoopFactoryImpl());
+ scoped_ptr<media::FilterCollection> collection(
+ new media::FilterCollection());
+
+ // Add in any custom filter factories first.
+ const CommandLine* cmd_line = CommandLine::ForCurrentProcess();
+ if (!cmd_line->HasSwitch(switches::kDisableAudio)) {
+ // Add the chrome specific audio renderer.
+ collection->AddAudioRenderer(new AudioRendererImpl(audio_message_filter()));
+ }
+
+ if (cmd_line->HasSwitch(switches::kEnableAcceleratedDecoding) &&
+ !cmd_line->HasSwitch(switches::kDisableAcceleratedCompositing)) {
+ WebGraphicsContext3DCommandBufferImpl* context =
+ static_cast<WebGraphicsContext3DCommandBufferImpl*>(
+ frame->view()->graphicsContext3D());
+ if (!context)
+ return NULL;
+
+ // Add the hardware video decoder factory.
+ // TODO(hclam): This will cause the renderer process to crash on context
+ // lost.
+ bool ret = context->makeContextCurrent();
+ CHECK(ret) << "Failed to switch context";
+ collection->AddVideoDecoder(new IpcVideoDecoder(
+ MessageLoop::current(), context->context()));
+ }
+
+ scoped_refptr<webkit_glue::WebVideoRenderer> video_renderer;
+ bool pts_logging = cmd_line->HasSwitch(switches::kEnableVideoLogging);
+ scoped_refptr<webkit_glue::VideoRendererImpl> renderer(
+ new webkit_glue::VideoRendererImpl(pts_logging));
+ collection->AddVideoRenderer(renderer);
+ video_renderer = renderer;
+
+ scoped_ptr<webkit_glue::WebMediaPlayerImpl> result(
+ new webkit_glue::WebMediaPlayerImpl(client,
+ collection.release(),
+ message_loop_factory.release()));
+ if (!result->Initialize(frame,
+ cmd_line->HasSwitch(switches::kSimpleDataSource),
+ video_renderer)) {
+ return NULL;
+ }
+ return result.release();
+}
+
+WebApplicationCacheHost* RenderView::createApplicationCacheHost(
+ WebFrame* frame, WebApplicationCacheHostClient* client) {
+ return new RendererWebApplicationCacheHostImpl(
+ FromWebView(frame->view()), client,
+ RenderThread::current()->appcache_dispatcher()->backend_proxy());
+}
+
+WebCookieJar* RenderView::cookieJar(WebFrame* frame) {
+ return &cookie_jar_;
+}
+
+void RenderView::frameDetached(WebFrame* frame) {
+ FOR_EACH_OBSERVER(RenderViewObserver, observers_, FrameDetached(frame));
+}
+
+void RenderView::willClose(WebFrame* frame) {
+ WebDataSource* ds = frame->dataSource();
+ NavigationState* navigation_state = NavigationState::FromDataSource(ds);
+
+ page_load_histograms_.Dump(frame);
+ navigation_state->user_script_idle_scheduler()->Cancel();
+
+ FOR_EACH_OBSERVER(RenderViewObserver, observers_, FrameWillClose(frame));
+}
+
+bool RenderView::allowImages(WebFrame* frame, bool enabled_per_settings) {
+ if (enabled_per_settings &&
+ AllowContentType(CONTENT_SETTINGS_TYPE_IMAGES))
+ return true;
+
+ if (IsWhitelistedForContentSettings(frame))
+ return true;
+
+ DidBlockContentType(CONTENT_SETTINGS_TYPE_IMAGES, std::string());
+ return false; // Other protocols fall through here.
+}
+
+bool RenderView::allowPlugins(WebFrame* frame, bool enabled_per_settings) {
+ return WebFrameClient::allowPlugins(frame, enabled_per_settings);
+}
+
+
+void RenderView::loadURLExternally(
+ WebFrame* frame, const WebURLRequest& request,
+ WebNavigationPolicy policy) {
+ GURL referrer(request.httpHeaderField(WebString::fromUTF8("Referer")));
+ if (policy == WebKit::WebNavigationPolicyDownload) {
+ Send(new ViewHostMsg_DownloadUrl(routing_id_, request.url(), referrer));
+ } else {
+ OpenURL(request.url(), referrer, policy);
+ }
+}
+
+WebNavigationPolicy RenderView::decidePolicyForNavigation(
+ WebFrame* frame, const WebURLRequest& request, WebNavigationType type,
+ const WebNode&, WebNavigationPolicy default_policy, bool is_redirect) {
+ // Webkit is asking whether to navigate to a new URL.
+ // This is fine normally, except if we're showing UI from one security
+ // context and they're trying to navigate to a different context.
+ const GURL& url = request.url();
+
+ // If the browser is interested, then give it a chance to look at top level
+ // navigations.
+ if (renderer_preferences_.browser_handles_top_level_requests &&
+ IsNonLocalTopLevelNavigation(url, frame, type)) {
+ GURL referrer(request.httpHeaderField(WebString::fromUTF8("Referer")));
+ // Reset these counters as the RenderView could be reused for the next
+ // navigation.
+ page_id_ = -1;
+ last_page_id_sent_to_browser_ = -1;
+ OpenURL(url, referrer, default_policy);
+ return WebKit::WebNavigationPolicyIgnore; // Suppress the load here.
+ }
+
+ // A content initiated navigation may have originated from a link-click,
+ // script, drag-n-drop operation, etc.
+ bool is_content_initiated =
+ NavigationState::FromDataSource(frame->provisionalDataSource())->
+ is_content_initiated();
+ GURL old_url(frame->url());
+
+ // Detect when we're crossing a permission-based boundary (e.g. into or out of
+ // an extension or app origin, leaving a WebUI page, etc). We only care about
+ // top-level navigations within the current tab (as opposed to, for example,
+ // opening a new window). But we sometimes navigate to about:blank to clear a
+ // tab, and we want to still allow that.
+ //
+ // Note: we do this only for GET requests because our mechanism for switching
+ // processes only issues GET requests. In particular, POST requests don't
+ // work, because this mechanism does not preserve form POST data. If it
+ // becomes necessary to support process switching for POST requests, we will
+ // need to send the request's httpBody data up to the browser process, and
+ // issue a special POST navigation in WebKit (via
+ // FrameLoader::loadFrameRequest). See ResourceDispatcher and WebURLLoaderImpl
+ // for examples of how to send the httpBody data.
+ // Note2: We normally don't do this for browser-initiated navigations, since
+ // it's pointless to tell the browser about navigations it gave us. But
+ // we do potentially ask the browser to handle a redirect that was originally
+ // initiated by the browser. See http://crbug.com/70943
+ //
+ // TODO(creis): Move this redirect check to the browser process to avoid
+ // ping-ponging. See http://crbug.com/72380.
+ if (!frame->parent() && (is_content_initiated || is_redirect) &&
+ default_policy == WebKit::WebNavigationPolicyCurrentTab &&
+ request.httpMethod() == "GET" && !url.SchemeIs(chrome::kAboutScheme)) {
+ bool send_referrer = false;
+ bool should_fork =
+ BindingsPolicy::is_web_ui_enabled(enabled_bindings_) ||
+ frame->isViewSourceModeEnabled() ||
+ url.SchemeIs(chrome::kViewSourceScheme);
+
+ // If the navigation would cross an app extent boundary, we also need
+ // to defer to the browser to ensure process isolation.
+ // TODO(erikkay) This is happening inside of a check to is_content_initiated
+ // which means that things like the back button won't trigger it. Is that
+ // OK?
+ // TODO(creis): For hosted apps, we currently only swap processes to enter
+ // the app and not exit it, since we currently lose context (e.g.,
+ // window.opener) if the window navigates back. See crbug.com/65953.
+ if (!should_fork &&
+ CrossesExtensionExtents(
+ render_thread_->GetExtensions(),
+ frame,
+ url)) {
+ // Include the referrer in this case since we're going from a hosted web
+ // page. (the packaged case is handled previously by the extension
+ // navigation test)
+ should_fork = true;
+ send_referrer = true;
+
+ if (is_content_initiated) {
+ const Extension* extension =
+ render_thread_->GetExtensions()->GetByURL(url);
+ if (extension && extension->is_app()) {
+ UMA_HISTOGRAM_ENUMERATION(
+ extension_misc::kAppLaunchHistogram,
+ extension_misc::APP_LAUNCH_CONTENT_NAVIGATION,
+ extension_misc::APP_LAUNCH_BUCKET_BOUNDARY);
+ }
+ }
+ }
+
+ if (should_fork) {
+ GURL referrer(request.httpHeaderField(WebString::fromUTF8("Referer")));
+ OpenURL(url, send_referrer ? referrer : GURL(), default_policy);
+ return WebKit::WebNavigationPolicyIgnore; // Suppress the load here.
+ }
+ }
+
+ // Detect when a page is "forking" a new tab that can be safely rendered in
+ // its own process. This is done by sites like Gmail that try to open links
+ // in new windows without script connections back to the original page. We
+ // treat such cases as browser navigations (in which we will create a new
+ // renderer for a cross-site navigation), rather than WebKit navigations.
+ //
+ // We use the following heuristic to decide whether to fork a new page in its
+ // own process:
+ // The parent page must open a new tab to about:blank, set the new tab's
+ // window.opener to null, and then redirect the tab to a cross-site URL using
+ // JavaScript.
+ //
+ // TODO(creis): Deprecate this logic once we can rely on rel=noreferrer
+ // (see below).
+ bool is_fork =
+ // Must start from a tab showing about:blank, which is later redirected.
+ old_url == GURL(chrome::kAboutBlankURL) &&
+ // Must be the first real navigation of the tab.
+ historyBackListCount() < 1 &&
+ historyForwardListCount() < 1 &&
+ // The parent page must have set the child's window.opener to null before
+ // redirecting to the desired URL.
+ frame->opener() == NULL &&
+ // Must be a top-level frame.
+ frame->parent() == NULL &&
+ // Must not have issued the request from this page.
+ is_content_initiated &&
+ // Must be targeted at the current tab.
+ default_policy == WebKit::WebNavigationPolicyCurrentTab &&
+ // Must be a JavaScript navigation, which appears as "other".
+ type == WebKit::WebNavigationTypeOther;
+
+ // Recognize if this navigation is from a link with rel=noreferrer and
+ // target=_blank attributes, in which case the opener will be suppressed. If
+ // so, it is safe to load cross-site pages in a separate process, so we
+ // should let the browser handle it.
+ bool is_noreferrer_and_blank_target =
+ // Frame should be top level and not yet navigated.
+ frame->parent() == NULL &&
+ frame->url().isEmpty() &&
+ historyBackListCount() < 1 &&
+ historyForwardListCount() < 1 &&
+ // Links with rel=noreferrer will have no Referer field, and their
+ // resulting frame will have its window.opener suppressed.
+ // TODO(creis): should add a request.httpReferrer() method to help avoid
+ // typos on the unusual spelling of Referer.
+ request.httpHeaderField(WebString::fromUTF8("Referer")).isNull() &&
+ opener_suppressed_ &&
+ frame->opener() == NULL &&
+ // Links with target=_blank will have no name.
+ frame->name().isNull() &&
+ // Another frame (with a non-empty creator) should have initiated the
+ // request, targeted at this frame.
+ !creator_url_.is_empty() &&
+ is_content_initiated &&
+ default_policy == WebKit::WebNavigationPolicyCurrentTab &&
+ type == WebKit::WebNavigationTypeOther;
+
+ if (is_fork || is_noreferrer_and_blank_target) {
+ // Open the URL via the browser, not via WebKit.
+ OpenURL(url, GURL(), default_policy);
+ return WebKit::WebNavigationPolicyIgnore;
+ }
+
+ return default_policy;
+}
+
+bool RenderView::canHandleRequest(
+ WebFrame* frame, const WebURLRequest& request) {
+ // We allow WebKit to think that everything can be handled even though
+ // browser-side we limit what we load.
+ return true;
+}
+
+WebURLError RenderView::cannotHandleRequestError(
+ WebFrame* frame, const WebURLRequest& request) {
+ NOTREACHED(); // Since we said we can handle all requests.
+ return WebURLError();
+}
+
+WebURLError RenderView::cancelledError(
+ WebFrame* frame, const WebURLRequest& request) {
+ WebURLError error;
+ error.domain = WebString::fromUTF8(net::kErrorDomain);
+ error.reason = net::ERR_ABORTED;
+ error.unreachableURL = request.url();
+ return error;
+}
+
+void RenderView::unableToImplementPolicyWithError(
+ WebFrame*, const WebURLError&) {
+ NOTREACHED(); // Since we said we can handle all requests.
+}
+
+void RenderView::willSendSubmitEvent(WebKit::WebFrame* frame,
+ const WebKit::WebFormElement& form) {
+ // Some login forms have onSubmit handlers that put a hash of the password
+ // into a hidden field and then clear the password. (Issue 28910.)
+ // This method gets called before any of those handlers run, so save away
+ // a copy of the password in case it gets lost.
+ NavigationState* navigation_state =
+ NavigationState::FromDataSource(frame->dataSource());
+ navigation_state->set_password_form_data(
+ PasswordFormDomManager::CreatePasswordForm(form));
+}
+
+void RenderView::willSubmitForm(WebFrame* frame, const WebFormElement& form) {
+ NavigationState* navigation_state =
+ NavigationState::FromDataSource(frame->provisionalDataSource());
+
+ if (navigation_state->transition_type() == PageTransition::LINK)
+ navigation_state->set_transition_type(PageTransition::FORM_SUBMIT);
+
+ // Save these to be processed when the ensuing navigation is committed.
+ WebSearchableFormData web_searchable_form_data(form);
+ navigation_state->set_searchable_form_url(web_searchable_form_data.url());
+ navigation_state->set_searchable_form_encoding(
+ web_searchable_form_data.encoding().utf8());
+ PasswordForm* password_form_data =
+ PasswordFormDomManager::CreatePasswordForm(form);
+ navigation_state->set_password_form_data(password_form_data);
+
+ // If the password has been cleared, recover it from the form contents already
+ // stored by willSendSubmitEvent into the dataSource's NavigationState (as
+ // opposed to the provisionalDataSource's, which is what we're storing into
+ // now.)
+ if (password_form_data && password_form_data->password_value.empty()) {
+ NavigationState* old_navigation_state =
+ NavigationState::FromDataSource(frame->dataSource());
+ if (old_navigation_state) {
+ PasswordForm* old_form_data = old_navigation_state->password_form_data();
+ if (old_form_data && old_form_data->action == password_form_data->action)
+ password_form_data->password_value = old_form_data->password_value;
+ }
+ }
+
+ FormData form_data;
+ if (FormManager::WebFormElementToFormData(
+ form,
+ FormManager::REQUIRE_AUTOCOMPLETE,
+ static_cast<FormManager::ExtractMask>(
+ FormManager::EXTRACT_VALUE | FormManager::EXTRACT_OPTION_TEXT),
+ &form_data)) {
+ Send(new AutoFillHostMsg_FormSubmitted(routing_id_, form_data));
+ }
+}
+
+void RenderView::willPerformClientRedirect(
+ WebFrame* frame, const WebURL& from, const WebURL& to, double interval,
+ double fire_time) {
+ // Ignore
+}
+
+void RenderView::didCancelClientRedirect(WebFrame* frame) {
+ // Ignore
+}
+
+void RenderView::didCompleteClientRedirect(
+ WebFrame* frame, const WebURL& from) {
+ if (!frame->parent())
+ completed_client_redirect_src_ = from;
+}
+
+void RenderView::didCreateDataSource(WebFrame* frame, WebDataSource* ds) {
+ // If there are any app-related fetches in progress, they can be cancelled now
+ // since we have navigated away from the page that created them.
+ if (!frame->parent()) {
+ app_icon_fetchers_.clear();
+ app_definition_fetcher_.reset(NULL);
+ }
+
+ // The rest of RenderView assumes that a WebDataSource will always have a
+ // non-null NavigationState.
+ bool content_initiated = !pending_navigation_state_.get();
+ NavigationState* state = content_initiated ?
+ NavigationState::CreateContentInitiated() :
+ pending_navigation_state_.release();
+
+ // NavigationState::referred_by_prefetcher_ is true if we are
+ // navigating from a page that used prefetching using a link on that
+ // page. We are early enough in the request process here that we
+ // can still see the NavigationState of the previous page and set
+ // this value appropriately.
+ // TODO(gavinp): catch the important case of navigation in a new
+ // renderer process.
+ if (webview()) {
+ if (WebFrame* old_frame = webview()->mainFrame()) {
+ const WebURLRequest& original_request = ds->originalRequest();
+ const GURL referrer(
+ original_request.httpHeaderField(WebString::fromUTF8("Referer")));
+ if (!referrer.is_empty() &&
+ NavigationState::FromDataSource(
+ old_frame->dataSource())->was_prefetcher()) {
+ for (;old_frame;old_frame = old_frame->traverseNext(false)) {
+ WebDataSource* old_frame_ds = old_frame->dataSource();
+ if (old_frame_ds && referrer == GURL(old_frame_ds->request().url())) {
+ state->set_was_referred_by_prefetcher(true);
+ break;
+ }
+ }
+ }
+ }
+ }
+
+ if (content_initiated) {
+ const WebURLRequest& request = ds->request();
+ switch (request.cachePolicy()) {
+ case WebURLRequest::UseProtocolCachePolicy: // normal load.
+ state->set_load_type(NavigationState::LINK_LOAD_NORMAL);
+ break;
+ case WebURLRequest::ReloadIgnoringCacheData: // reload.
+ state->set_load_type(NavigationState::LINK_LOAD_RELOAD);
+ break;
+ case WebURLRequest::ReturnCacheDataElseLoad: // allow stale data.
+ state->set_load_type(NavigationState::LINK_LOAD_CACHE_STALE_OK);
+ break;
+ case WebURLRequest::ReturnCacheDataDontLoad: // Don't re-post.
+ state->set_load_type(NavigationState::LINK_LOAD_CACHE_ONLY);
+ break;
+ }
+ }
+
+ // If this datasource already has a UserScriptIdleScheduler, reuse that one.
+ // This is for navigations within a page (didNavigateWithinPage). See
+ // http://code.google.com/p/chromium/issues/detail?id=64093
+ NavigationState* old_state = NavigationState::FromDataSource(ds);
+ if (old_state && old_state->user_script_idle_scheduler()) {
+ state->swap_user_script_idle_scheduler(old_state);
+ } else {
+ state->set_user_script_idle_scheduler(
+ new UserScriptIdleScheduler(this, frame));
+ }
+
+ state->set_was_started_as_prerender(is_prerendering_);
+
+ ds->setExtraData(state);
+}
+
+void RenderView::didStartProvisionalLoad(WebFrame* frame) {
+ WebDataSource* ds = frame->provisionalDataSource();
+ NavigationState* navigation_state = NavigationState::FromDataSource(ds);
+
+ // Update the request time if WebKit has better knowledge of it.
+ if (navigation_state->request_time().is_null()) {
+ double event_time = ds->triggeringEventTime();
+ if (event_time != 0.0)
+ navigation_state->set_request_time(Time::FromDoubleT(event_time));
+ }
+
+ // Start time is only set after request time.
+ navigation_state->set_start_load_time(Time::Now());
+
+ bool is_top_most = !frame->parent();
+ if (is_top_most) {
+ navigation_gesture_ = frame->isProcessingUserGesture() ?
+ NavigationGestureUser : NavigationGestureAuto;
+
+ // Make sure redirect tracking state is clear for the new load.
+ completed_client_redirect_src_ = GURL();
+ } else if (frame->parent()->isLoading()) {
+ // Take note of AUTO_SUBFRAME loads here, so that we can know how to
+ // load an error page. See didFailProvisionalLoad.
+ navigation_state->set_transition_type(PageTransition::AUTO_SUBFRAME);
+ }
+
+ FOR_EACH_OBSERVER(
+ RenderViewObserver, observers_, DidStartProvisionalLoad(frame));
+
+ Send(new ViewHostMsg_DidStartProvisionalLoadForFrame(
+ routing_id_, frame->identifier(), is_top_most, ds->request().url()));
+}
+
+void RenderView::didReceiveServerRedirectForProvisionalLoad(WebFrame* frame) {
+ if (frame->parent())
+ return;
+ // Received a redirect on the main frame.
+ WebDataSource* data_source = frame->provisionalDataSource();
+ if (!data_source) {
+ // Should only be invoked when we have a data source.
+ NOTREACHED();
+ return;
+ }
+ std::vector<GURL> redirects;
+ GetRedirectChain(data_source, &redirects);
+ if (redirects.size() >= 2) {
+ Send(new ViewHostMsg_DidRedirectProvisionalLoad(routing_id_, page_id_,
+ redirects[redirects.size() - 2], redirects.back()));
+ }
+}
+
+void RenderView::didFailProvisionalLoad(WebFrame* frame,
+ const WebURLError& error) {
+ // Notify the browser that we failed a provisional load with an error.
+ //
+ // Note: It is important this notification occur before DidStopLoading so the
+ // SSL manager can react to the provisional load failure before being
+ // notified the load stopped.
+ //
+ WebDataSource* ds = frame->provisionalDataSource();
+ DCHECK(ds);
+
+ const WebURLRequest& failed_request = ds->request();
+
+ FOR_EACH_OBSERVER(
+ RenderViewObserver, observers_, DidFailProvisionalLoad(frame, error));
+
+ bool show_repost_interstitial =
+ (error.reason == net::ERR_CACHE_MISS &&
+ EqualsASCII(failed_request.httpMethod(), "POST"));
+ Send(new ViewHostMsg_DidFailProvisionalLoadWithError(
+ routing_id_, frame->identifier(), !frame->parent(), error.reason,
+ error.unreachableURL, show_repost_interstitial));
+
+ // Don't display an error page if this is simply a cancelled load. Aside
+ // from being dumb, WebCore doesn't expect it and it will cause a crash.
+ if (error.reason == net::ERR_ABORTED)
+ return;
+
+ // Make sure we never show errors in view source mode.
+ frame->enableViewSourceMode(false);
+
+ NavigationState* navigation_state = NavigationState::FromDataSource(ds);
+
+ // If this is a failed back/forward/reload navigation, then we need to do a
+ // 'replace' load. This is necessary to avoid messing up session history.
+ // Otherwise, we do a normal load, which simulates a 'go' navigation as far
+ // as session history is concerned.
+ //
+ // AUTO_SUBFRAME loads should always be treated as loads that do not advance
+ // the page id.
+ //
+ bool replace =
+ navigation_state->pending_page_id() != -1 ||
+ navigation_state->transition_type() == PageTransition::AUTO_SUBFRAME;
+
+ // If we failed on a browser initiated request, then make sure that our error
+ // page load is regarded as the same browser initiated request.
+ if (!navigation_state->is_content_initiated()) {
+ pending_navigation_state_.reset(NavigationState::CreateBrowserInitiated(
+ navigation_state->pending_page_id(),
+ navigation_state->pending_history_list_offset(),
+ navigation_state->transition_type(),
+ navigation_state->request_time()));
+ }
+
+ // Provide the user with a more helpful error page?
+ if (MaybeLoadAlternateErrorPage(frame, error, replace))
+ return;
+
+ // Fallback to a local error page.
+ LoadNavigationErrorPage(frame, failed_request, error, std::string(), replace);
+}
+
+void RenderView::didReceiveDocumentData(
+ WebFrame* frame, const char* data, size_t data_len,
+ bool& prevent_default) {
+ NavigationState* navigation_state =
+ NavigationState::FromDataSource(frame->dataSource());
+ navigation_state->set_use_error_page(false);
+}
+
+void RenderView::didCommitProvisionalLoad(WebFrame* frame,
+ bool is_new_navigation) {
+ NavigationState* navigation_state =
+ NavigationState::FromDataSource(frame->dataSource());
+
+ navigation_state->set_commit_load_time(Time::Now());
+ if (is_new_navigation) {
+ // When we perform a new navigation, we need to update the last committed
+ // session history entry with state for the page we are leaving.
+ UpdateSessionHistory(frame);
+
+ // We bump our Page ID to correspond with the new session history entry.
+ page_id_ = next_page_id_++;
+
+ // Advance our offset in session history, applying the length limit. There
+ // is now no forward history.
+ history_list_offset_++;
+ if (history_list_offset_ >= chrome::kMaxSessionHistoryEntries)
+ history_list_offset_ = chrome::kMaxSessionHistoryEntries - 1;
+ history_list_length_ = history_list_offset_ + 1;
+
+ MessageLoop::current()->PostDelayedTask(
+ FROM_HERE,
+ page_info_method_factory_.NewRunnableMethod(
+ &RenderView::CapturePageInfo, page_id_, true),
+ kDelayForForcedCaptureMs);
+ } else {
+ // Inspect the navigation_state on this frame to see if the navigation
+ // corresponds to a session history navigation... Note: |frame| may or
+ // may not be the toplevel frame, but for the case of capturing session
+ // history, the first committed frame suffices. We keep track of whether
+ // we've seen this commit before so that only capture session history once
+ // per navigation.
+ //
+ // Note that we need to check if the page ID changed. In the case of a
+ // reload, the page ID doesn't change, and UpdateSessionHistory gets the
+ // previous URL and the current page ID, which would be wrong.
+ if (navigation_state->pending_page_id() != -1 &&
+ navigation_state->pending_page_id() != page_id_ &&
+ !navigation_state->request_committed()) {
+ // This is a successful session history navigation!
+ UpdateSessionHistory(frame);
+ page_id_ = navigation_state->pending_page_id();
+
+ history_list_offset_ = navigation_state->pending_history_list_offset();
+ }
+ }
+
+ FOR_EACH_OBSERVER(RenderViewObserver, observers_,
+ DidCommitProvisionalLoad(frame, is_new_navigation));
+
+ // Remember that we've already processed this request, so we don't update
+ // the session history again. We do this regardless of whether this is
+ // a session history navigation, because if we attempted a session history
+ // navigation without valid HistoryItem state, WebCore will think it is a
+ // new navigation.
+ navigation_state->set_request_committed(true);
+
+ UpdateURL(frame);
+
+ // If this committed load was initiated by a client redirect, we're
+ // at the last stop now, so clear it.
+ completed_client_redirect_src_ = GURL();
+
+ // Check whether we have new encoding name.
+ UpdateEncoding(frame, frame->view()->pageEncoding().utf8());
+}
+
+void RenderView::didClearWindowObject(WebFrame* frame) {
+ if (BindingsPolicy::is_dom_automation_enabled(enabled_bindings_))
+ BindDOMAutomationController(frame);
+ GURL frame_url = frame->url();
+ if (BindingsPolicy::is_web_ui_enabled(enabled_bindings_) &&
+ (frame_url.SchemeIs(chrome::kChromeUIScheme) ||
+ frame_url.SchemeIs(chrome::kDataScheme))) {
+ GetWebUIBindings()->set_message_sender(this);
+ GetWebUIBindings()->set_routing_id(routing_id_);
+ GetWebUIBindings()->BindToJavascript(frame, "chrome");
+ }
+ if (BindingsPolicy::is_external_host_enabled(enabled_bindings_)) {
+ GetExternalHostBindings()->set_message_sender(this);
+ GetExternalHostBindings()->set_routing_id(routing_id_);
+ GetExternalHostBindings()->BindToJavascript(frame, "externalHost");
+ }
+}
+
+void RenderView::didCreateDocumentElement(WebFrame* frame) {
+ if (RenderThread::current()) { // Will be NULL during unit tests.
+ RenderThread::current()->user_script_slave()->InjectScripts(
+ frame, UserScript::DOCUMENT_START);
+ }
+
+ // Notify the browser about non-blank documents loading in the top frame.
+ GURL url = frame->url();
+ if (url.is_valid() && url.spec() != chrome::kAboutBlankURL) {
+ if (frame == webview()->mainFrame())
+ Send(new ViewHostMsg_DocumentAvailableInMainFrame(routing_id_));
+ }
+}
+
+void RenderView::didReceiveTitle(WebFrame* frame, const WebString& title) {
+ UpdateTitle(frame, title);
+
+ // Also check whether we have new encoding name.
+ UpdateEncoding(frame, frame->view()->pageEncoding().utf8());
+}
+
+void RenderView::didChangeIcons(WebFrame* frame) {
+ if (!frame->parent()) {
+ Send(new ViewHostMsg_UpdateFaviconURL(
+ routing_id_,
+ page_id_,
+ frame->favIconURL()));
+ }
+}
+
+void RenderView::didFinishDocumentLoad(WebFrame* frame) {
+ WebDataSource* ds = frame->dataSource();
+ NavigationState* navigation_state = NavigationState::FromDataSource(ds);
+ DCHECK(navigation_state);
+ navigation_state->set_finish_document_load_time(Time::Now());
+
+ Send(new ViewHostMsg_DocumentLoadedInFrame(routing_id_, frame->identifier()));
+
+ FOR_EACH_OBSERVER(RenderViewObserver, observers_,
+ DidFinishDocumentLoad(frame));
+
+ // Check whether we have new encoding name.
+ UpdateEncoding(frame, frame->view()->pageEncoding().utf8());
+
+ if (RenderThread::current()) { // Will be NULL during unit tests.
+ RenderThread::current()->user_script_slave()->InjectScripts(
+ frame, UserScript::DOCUMENT_END);
+ }
+
+ // InjectScripts() can end up creating a new NavigationState if it triggers a
+ // fragment navigation, so we need to re-fetch it here.
+ navigation_state = NavigationState::FromDataSource(ds);
+ navigation_state->user_script_idle_scheduler()->DidFinishDocumentLoad();
+}
+
+void RenderView::OnUserScriptIdleTriggered(WebFrame* frame) {
+ if (RenderThread::current()) { // Will be NULL during unit tests.
+ RenderThread::current()->user_script_slave()->InjectScripts(
+ frame, UserScript::DOCUMENT_IDLE);
+ }
+
+ WebFrame* main_frame = webview()->mainFrame();
+ if (frame == main_frame) {
+ while (!pending_code_execution_queue_.empty()) {
+ linked_ptr<ViewMsg_ExecuteCode_Params>& params =
+ pending_code_execution_queue_.front();
+ ExecuteCodeImpl(main_frame, *params);
+ pending_code_execution_queue_.pop();
+ }
+ }
+}
+
+void RenderView::didHandleOnloadEvents(WebFrame* frame) {
+ if (webview()->mainFrame() == frame) {
+ Send(new ViewHostMsg_DocumentOnLoadCompletedInMainFrame(routing_id_,
+ page_id_));
+ }
+}
+
+void RenderView::didFailLoad(WebFrame* frame, const WebURLError& error) {
+ FOR_EACH_OBSERVER(RenderViewObserver, observers_, DidFailLoad(frame, error));
+}
+
+void RenderView::didFinishLoad(WebFrame* frame) {
+ WebDataSource* ds = frame->dataSource();
+ NavigationState* navigation_state = NavigationState::FromDataSource(ds);
+ DCHECK(navigation_state);
+ navigation_state->set_finish_load_time(Time::Now());
+ navigation_state->user_script_idle_scheduler()->DidFinishLoad();
+
+ FOR_EACH_OBSERVER(RenderViewObserver, observers_, DidFinishLoad(frame));
+
+ Send(new ViewHostMsg_DidFinishLoad(routing_id_, frame->identifier()));
+}
+
+void RenderView::didNavigateWithinPage(
+ WebFrame* frame, bool is_new_navigation) {
+ // If this was a reference fragment navigation that we initiated, then we
+ // could end up having a non-null pending navigation state. We just need to
+ // update the ExtraData on the datasource so that others who read the
+ // ExtraData will get the new NavigationState. Similarly, if we did not
+ // initiate this navigation, then we need to take care to reset any pre-
+ // existing navigation state to a content-initiated navigation state.
+ // DidCreateDataSource conveniently takes care of this for us.
+ didCreateDataSource(frame, frame->dataSource());
+
+ NavigationState* new_state =
+ NavigationState::FromDataSource(frame->dataSource());
+ new_state->set_was_within_same_page(true);
+
+ didCommitProvisionalLoad(frame, is_new_navigation);
+
+ UpdateTitle(frame, frame->view()->mainFrame()->dataSource()->pageTitle());
+}
+
+void RenderView::didUpdateCurrentHistoryItem(WebFrame* frame) {
+ StartNavStateSyncTimerIfNecessary();
+}
+
+void RenderView::assignIdentifierToRequest(
+ WebFrame* frame, unsigned identifier, const WebURLRequest& request) {
+ // Ignore
+}
+
+void RenderView::willSendRequest(
+ WebFrame* frame, unsigned identifier, WebURLRequest& request,
+ const WebURLResponse& redirect_response) {
+ WebFrame* top_frame = frame->top();
+ if (!top_frame)
+ top_frame = frame;
+ WebDataSource* provisional_data_source = top_frame->provisionalDataSource();
+ WebDataSource* top_data_source = top_frame->dataSource();
+ WebDataSource* data_source =
+ provisional_data_source ? provisional_data_source : top_data_source;
+
+ // If the request is for an extension resource, check whether it should be
+ // allowed. If not allowed, we reset the URL to something invalid to prevent
+ // the request and cause an error.
+ GURL request_url(request.url());
+ if (request_url.SchemeIs(chrome::kExtensionScheme) &&
+ !ExtensionResourceRequestPolicy::CanRequestResource(
+ request_url,
+ GURL(frame->url()),
+ render_thread_->GetExtensions())) {
+ request.setURL(WebURL(GURL("chrome-extension://invalid/")));
+ }
+
+ if (data_source) {
+ NavigationState* state = NavigationState::FromDataSource(data_source);
+ if (state && state->is_cache_policy_override_set())
+ request.setCachePolicy(state->cache_policy_override());
+ }
+
+ if (top_data_source) {
+ NavigationState* state = NavigationState::FromDataSource(top_data_source);
+ if (state && request.targetType() == WebURLRequest::TargetIsPrefetch)
+ state->set_was_prefetcher(true);
+ }
+
+ request.setRequestorID(routing_id_);
+ request.setHasUserGesture(frame->isProcessingUserGesture());
+
+ if (CommandLine::ForCurrentProcess()->HasSwitch(switches::kNoReferrers))
+ request.clearHTTPHeaderField("Referer");
+
+ // Temporary metrics, see site_isolation_metrics.h
+ SiteIsolationMetrics::AddRequest(identifier, request.targetType());
+}
+
+void RenderView::didReceiveResponse(
+ WebFrame* frame, unsigned identifier, const WebURLResponse& response) {
+
+ // Temporary metrics, see site_isolation_metrics.h
+ SiteIsolationMetrics::LogMimeTypeForCrossOriginRequest(frame,
+ identifier,
+ response);
+
+ // Only do this for responses that correspond to a provisional data source
+ // of the top-most frame. If we have a provisional data source, then we
+ // can't have any sub-resources yet, so we know that this response must
+ // correspond to a frame load.
+ if (!frame->provisionalDataSource() || frame->parent())
+ return;
+
+ // If we are in view source mode, then just let the user see the source of
+ // the server's error page.
+ if (frame->isViewSourceModeEnabled())
+ return;
+
+ NavigationState* navigation_state =
+ NavigationState::FromDataSource(frame->provisionalDataSource());
+ CHECK(navigation_state);
+ int http_status_code = response.httpStatusCode();
+
+ // Record page load flags.
+ navigation_state->set_was_fetched_via_spdy(response.wasFetchedViaSPDY());
+ navigation_state->set_was_npn_negotiated(response.wasNpnNegotiated());
+ navigation_state->set_was_alternate_protocol_available(
+ response.wasAlternateProtocolAvailable());
+ navigation_state->set_was_fetched_via_proxy(response.wasFetchedViaProxy());
+ navigation_state->set_http_status_code(http_status_code);
+ // Whether or not the http status code actually corresponds to an error is
+ // only checked when the page is done loading, if |use_error_page| is
+ // still true.
+ navigation_state->set_use_error_page(true);
+}
+
+void RenderView::didFinishResourceLoad(
+ WebFrame* frame, unsigned identifier) {
+ NavigationState* navigation_state =
+ NavigationState::FromDataSource(frame->dataSource());
+ if (!navigation_state->use_error_page())
+ return;
+
+ // Display error page, if appropriate.
+ int http_status_code = navigation_state->http_status_code();
+ if (http_status_code == 404) {
+ // On 404s, try a remote search page as a fallback.
+ const GURL& frame_url = frame->url();
+
+ const GURL& error_page_url = GetAlternateErrorPageURL(frame_url, HTTP_404);
+ if (error_page_url.is_valid()) {
+ WebURLError original_error;
+ original_error.unreachableURL = frame_url;
+
+ navigation_state->set_alt_error_page_fetcher(
+ new AltErrorPageResourceFetcher(
+ error_page_url, frame, original_error,
+ NewCallback(this, &RenderView::AltErrorPageFinished)));
+ return;
+ }
+ }
+
+ // Use an internal error page, if we have one for the status code.
+ if (LocalizedError::HasStrings(LocalizedError::kHttpErrorDomain,
+ http_status_code)) {
+ WebURLError error;
+ error.unreachableURL = frame->url();
+ error.domain = WebString::fromUTF8(LocalizedError::kHttpErrorDomain);
+ error.reason = http_status_code;
+
+ LoadNavigationErrorPage(frame, frame->dataSource()->request(), error,
+ std::string(), true);
+ }
+}
+
+void RenderView::didFailResourceLoad(
+ WebFrame* frame, unsigned identifier, const WebURLError& error) {
+ // Ignore
+}
+
+void RenderView::didLoadResourceFromMemoryCache(
+ WebFrame* frame, const WebURLRequest& request,
+ const WebURLResponse& response) {
+ // Let the browser know we loaded a resource from the memory cache. This
+ // message is needed to display the correct SSL indicators.
+ Send(new ViewHostMsg_DidLoadResourceFromMemoryCache(
+ routing_id_,
+ request.url(),
+ response.securityInfo()));
+}
+
+void RenderView::didDisplayInsecureContent(WebFrame* frame) {
+ Send(new ViewHostMsg_DidDisplayInsecureContent(routing_id_));
+}
+
+void RenderView::didRunInsecureContent(
+ WebFrame* frame, const WebSecurityOrigin& origin, const WebURL& target) {
+ Send(new ViewHostMsg_DidRunInsecureContent(
+ routing_id_,
+ origin.toString().utf8(),
+ target));
+}
+
+bool RenderView::allowScript(WebFrame* frame, bool enabled_per_settings) {
+ if (enabled_per_settings &&
+ AllowContentType(CONTENT_SETTINGS_TYPE_JAVASCRIPT))
+ return true;
+
+ if (IsWhitelistedForContentSettings(frame))
+ return true;
+
+ return false; // Other protocols fall through here.
+}
+
+bool RenderView::allowDatabase(
+ WebFrame* frame, const WebString& name, const WebString& display_name,
+ unsigned long estimated_size) {
+ WebSecurityOrigin origin = frame->securityOrigin();
+ if (origin.isEmpty())
+ return false; // Uninitialized document?
+
+ bool result;
+ if (!Send(new DatabaseHostMsg_Allow(routing_id_,
+ origin.toString().utf8(), name, display_name, estimated_size, &result)))
+ return false;
+ Send(new ViewHostMsg_WebDatabaseAccessed(routing_id_,
+ GURL(origin.toString().utf8()),
+ name,
+ display_name,
+ estimated_size,
+ !result));
+ return result;
+}
+void RenderView::didNotAllowScript(WebKit::WebFrame* frame) {
+ DidBlockContentType(CONTENT_SETTINGS_TYPE_JAVASCRIPT, std::string());
+}
+
+void RenderView::didNotAllowPlugins(WebKit::WebFrame* frame) {
+ DidBlockContentType(CONTENT_SETTINGS_TYPE_PLUGINS, std::string());
+}
+
+void RenderView::didExhaustMemoryAvailableForScript(WebFrame* frame) {
+ Send(new ViewHostMsg_JSOutOfMemory(routing_id_));
+}
+
+void RenderView::didCreateScriptContext(WebFrame* frame) {
+ EventBindings::HandleContextCreated(frame, false);
+}
+
+void RenderView::didDestroyScriptContext(WebFrame* frame) {
+ EventBindings::HandleContextDestroyed(frame);
+}
+
+void RenderView::didCreateIsolatedScriptContext(WebFrame* frame) {
+ EventBindings::HandleContextCreated(frame, true);
+}
+
+bool RenderView::allowScriptExtension(WebFrame* frame,
+ const WebString& extension_name,
+ int extension_group) {
+ // NULL in unit tests.
+ if (!RenderThread::current())
+ return true;
+
+ // Note: we prefer the provisional URL here instead of the document URL
+ // because we might be currently loading an URL into a blank page.
+ // See http://code.google.com/p/chromium/issues/detail?id=10924
+ WebDataSource* ds = frame->provisionalDataSource();
+ if (!ds)
+ ds = frame->dataSource();
+ return RenderThread::current()->AllowScriptExtension(
+ extension_name.utf8(), ds->request().url(), extension_group);
+}
+
+void RenderView::logCrossFramePropertyAccess(WebFrame* frame,
+ WebFrame* target,
+ bool cross_origin,
+ const WebString& property_name,
+ unsigned long long event_id) {
+ // TODO(johnnyg): track the individual properties and repeat event_ids.
+ page_load_histograms_.IncrementCrossFramePropertyAccess(cross_origin);
+}
+
+void RenderView::didChangeContentsSize(WebFrame* frame, const WebSize& size) {
+ CheckPreferredSize();
+}
+
+void RenderView::CheckPreferredSize() {
+ // We don't always want to send the change messages over IPC, only if we've
+ // be put in that mode by getting a |ViewMsg_EnablePreferredSizeChangedMode|
+ // message.
+ if (!send_preferred_size_changes_ || !webview())
+ return;
+
+ // WebCore likes to tell us things have changed even when they haven't, so
+ // cache the width and height and only send the IPC message when we're sure
+ // they're different.
+ gfx::Size size(webview()->mainFrame()->contentsPreferredWidth(),
+ webview()->mainFrame()->documentElementScrollHeight());
+
+ // In the presence of zoom, these sizes are still reported as if unzoomed,
+ // so we need to adjust.
+ double zoom_factor = WebView::zoomLevelToZoomFactor(webview()->zoomLevel());
+ size.set_width(static_cast<int>(size.width() * zoom_factor));
+ size.set_height(static_cast<int>(size.height() * zoom_factor));
+
+ if (size == preferred_size_)
+ return;
+
+ preferred_size_ = size;
+ Send(new ViewHostMsg_DidContentsPreferredSizeChange(routing_id_,
+ preferred_size_));
+}
+
+void RenderView::didChangeScrollOffset(WebFrame* frame) {
+ StartNavStateSyncTimerIfNecessary();
+}
+
+void RenderView::reportFindInPageMatchCount(int request_id, int count,
+ bool final_update) {
+ int active_match_ordinal = -1; // -1 = don't update active match ordinal
+ if (!count)
+ active_match_ordinal = 0;
+
+ IPC::Message* msg = new ViewHostMsg_Find_Reply(
+ routing_id_,
+ request_id,
+ count,
+ gfx::Rect(),
+ active_match_ordinal,
+ final_update);
+
+ // If we have a message that has been queued up, then we should just replace
+ // it. The ACK from the browser will make sure it gets sent when the browser
+ // wants it.
+ if (queued_find_reply_message_.get()) {
+ queued_find_reply_message_.reset(msg);
+ } else {
+ // Send the search result over to the browser process.
+ Send(msg);
+ }
+}
+
+void RenderView::reportFindInPageSelection(int request_id,
+ int active_match_ordinal,
+ const WebRect& selection_rect) {
+ // Send the search result over to the browser process.
+ Send(new ViewHostMsg_Find_Reply(routing_id_,
+ request_id,
+ -1,
+ selection_rect,
+ active_match_ordinal,
+ false));
+}
+
+void RenderView::openFileSystem(
+ WebFrame* frame,
+ WebFileSystem::Type type,
+ long long size,
+ bool create,
+ WebFileSystemCallbacks* callbacks) {
+ DCHECK(callbacks);
+
+ WebSecurityOrigin origin = frame->securityOrigin();
+ if (origin.isEmpty()) {
+ // Uninitialized document?
+ callbacks->didFail(WebKit::WebFileErrorAbort);
+ return;
+ }
+
+ ChildThread::current()->file_system_dispatcher()->OpenFileSystem(
+ GURL(origin.toString()), static_cast<fileapi::FileSystemType>(type),
+ size, create, new WebFileSystemCallbackDispatcher(callbacks));
+}
+
+// webkit_glue::WebPluginPageDelegate -----------------------------------------
+
+webkit::npapi::WebPluginDelegate* RenderView::CreatePluginDelegate(
+ const FilePath& file_path,
+ const std::string& mime_type) {
+ if (!PluginChannelHost::IsListening())
+ return NULL;
+
+ bool in_process_plugin = RenderProcess::current()->UseInProcessPlugins();
+ if (in_process_plugin) {
+#if defined(OS_WIN) // In-proc plugins aren't supported on Linux or Mac.
+ return webkit::npapi::WebPluginDelegateImpl::Create(
+ file_path, mime_type, gfx::NativeViewFromId(host_window_));
+#else
+ NOTIMPLEMENTED();
+ return NULL;
+#endif
+ }
+
+ return new WebPluginDelegateProxy(mime_type, AsWeakPtr());
+}
+
+void RenderView::CreatedPluginWindow(gfx::PluginWindowHandle window) {
+#if defined(USE_X11)
+ RenderThread::current()->Send(new ViewHostMsg_CreatePluginContainer(
+ routing_id(), window));
+#endif
+}
+
+void RenderView::WillDestroyPluginWindow(gfx::PluginWindowHandle window) {
+#if defined(USE_X11)
+ RenderThread::current()->Send(new ViewHostMsg_DestroyPluginContainer(
+ routing_id(), window));
+#endif
+ CleanupWindowInPluginMoves(window);
+}
+
+void RenderView::DidMovePlugin(const webkit::npapi::WebPluginGeometry& move) {
+ SchedulePluginMove(move);
+}
+
+void RenderView::DidStartLoadingForPlugin() {
+ // TODO(darin): Make is_loading_ be a counter!
+ didStartLoading();
+}
+
+void RenderView::DidStopLoadingForPlugin() {
+ // TODO(darin): Make is_loading_ be a counter!
+ didStopLoading();
+}
+
+WebCookieJar* RenderView::GetCookieJar() {
+ return &cookie_jar_;
+}
+
+void RenderView::SyncNavigationState() {
+ if (!webview())
+ return;
+
+ const WebHistoryItem& item = webview()->mainFrame()->currentHistoryItem();
+ if (item.isNull())
+ return;
+
+ Send(new ViewHostMsg_UpdateState(
+ routing_id_, page_id_, webkit_glue::HistoryItemToString(item)));
+}
+
+bool RenderView::DownloadImage(int id, const GURL& image_url, int image_size) {
+ // Make sure webview was not shut down.
+ if (!webview())
+ return false;
+ // Create an image resource fetcher and assign it with a call back object.
+ image_fetchers_.push_back(linked_ptr<ImageResourceFetcher>(
+ new ImageResourceFetcher(
+ image_url, webview()->mainFrame(), id, image_size,
+ NewCallback(this, &RenderView::DidDownloadImage))));
+ return true;
+}
+
+void RenderView::DidDownloadImage(ImageResourceFetcher* fetcher,
+ const SkBitmap& image) {
+ // Notify requester of image download status.
+ Send(new ViewHostMsg_DidDownloadFavicon(routing_id_,
+ fetcher->id(),
+ fetcher->image_url(),
+ image.isNull(),
+ image));
+
+ // Remove the image fetcher from our pending list. We're in the callback from
+ // ImageResourceFetcher, best to delay deletion.
+ for (ImageResourceFetcherList::iterator iter = image_fetchers_.begin();
+ iter != image_fetchers_.end(); ++iter) {
+ if (iter->get() == fetcher) {
+ iter->release();
+ image_fetchers_.erase(iter);
+ break;
+ }
+ }
+ MessageLoop::current()->DeleteSoon(FROM_HERE, fetcher);
+}
+
+void RenderView::OnDownloadFavicon(int id,
+ const GURL& image_url,
+ int image_size) {
+ bool data_image_failed = false;
+ if (image_url.SchemeIs("data")) {
+ SkBitmap data_image = ImageFromDataUrl(image_url);
+ data_image_failed = data_image.empty();
+ if (!data_image_failed) {
+ Send(new ViewHostMsg_DidDownloadFavicon(routing_id_, id, image_url, false,
+ data_image));
+ }
+ }
+
+ if (data_image_failed ||
+ !DownloadImage(id, image_url, image_size)) {
+ Send(new ViewHostMsg_DidDownloadFavicon(routing_id_, id, image_url, true,
+ SkBitmap()));
+ }
+}
+
+SkBitmap RenderView::ImageFromDataUrl(const GURL& url) const {
+ std::string mime_type, char_set, data;
+ if (net::DataURL::Parse(url, &mime_type, &char_set, &data) && !data.empty()) {
+ // Decode the favicon using WebKit's image decoder.
+ webkit_glue::ImageDecoder decoder(gfx::Size(kFaviconSize, kFaviconSize));
+ const unsigned char* src_data =
+ reinterpret_cast<const unsigned char*>(&data[0]);
+
+ return decoder.Decode(src_data, data.size());
+ }
+ return SkBitmap();
+}
+
+void RenderView::OnGetApplicationInfo(int page_id) {
+ WebApplicationInfo app_info;
+ if (page_id == page_id_) {
+ string16 error;
+ web_apps::ParseWebAppFromWebDocument(webview()->mainFrame(), &app_info,
+ &error);
+ }
+
+ // Prune out any data URLs in the set of icons. The browser process expects
+ // any icon with a data URL to have originated from a favicon. We don't want
+ // to decode arbitrary data URLs in the browser process. See
+ // http://b/issue?id=1162972
+ for (size_t i = 0; i < app_info.icons.size(); ++i) {
+ if (app_info.icons[i].url.SchemeIs(chrome::kDataScheme)) {
+ app_info.icons.erase(app_info.icons.begin() + i);
+ --i;
+ }
+ }
+
+ Send(new ViewHostMsg_DidGetApplicationInfo(routing_id_, page_id, app_info));
+}
+
+GURL RenderView::GetAlternateErrorPageURL(const GURL& failed_url,
+ ErrorPageType error_type) {
+ if (failed_url.SchemeIsSecure()) {
+ // If the URL that failed was secure, then the embedding web page was not
+ // expecting a network attacker to be able to manipulate its contents. As
+ // we fetch alternate error pages over HTTP, we would be allowing a network
+ // attacker to manipulate the contents of the response if we tried to use
+ // the link doctor here.
+ return GURL();
+ }
+
+ // Grab the base URL from the browser process.
+ if (!alternate_error_page_url_.is_valid())
+ return GURL();
+
+ // Strip query params from the failed URL.
+ GURL::Replacements remove_params;
+ remove_params.ClearUsername();
+ remove_params.ClearPassword();
+ remove_params.ClearQuery();
+ remove_params.ClearRef();
+ const GURL url_to_send = failed_url.ReplaceComponents(remove_params);
+ std::string spec_to_send = url_to_send.spec();
+ // Notify link doctor of the url truncation by sending of "?" at the end.
+ if (failed_url.has_query())
+ spec_to_send.append("?");
+
+ // Construct the query params to send to link doctor.
+ std::string params(alternate_error_page_url_.query());
+ params.append("&url=");
+ params.append(EscapeQueryParamValue(spec_to_send, true));
+ params.append("&sourceid=chrome");
+ params.append("&error=");
+ switch (error_type) {
+ case DNS_ERROR:
+ params.append("dnserror");
+ break;
+
+ case HTTP_404:
+ params.append("http404");
+ break;
+
+ case CONNECTION_ERROR:
+ params.append("connectionfailure");
+ break;
+
+ default:
+ NOTREACHED() << "unknown ErrorPageType";
+ }
+
+ // OK, build the final url to return.
+ GURL::Replacements link_doctor_params;
+ link_doctor_params.SetQueryStr(params);
+ GURL url = alternate_error_page_url_.ReplaceComponents(link_doctor_params);
+ return url;
+}
+
+WebUIBindings* RenderView::GetWebUIBindings() {
+ if (!web_ui_bindings_.get()) {
+ web_ui_bindings_.reset(new WebUIBindings());
+ }
+ return web_ui_bindings_.get();
+}
+
+ExternalHostBindings* RenderView::GetExternalHostBindings() {
+ if (!external_host_bindings_.get()) {
+ external_host_bindings_.reset(new ExternalHostBindings());
+ }
+ return external_host_bindings_.get();
+}
+
+WebKit::WebPlugin* RenderView::GetWebPluginFromPluginDocument() {
+ return webview()->mainFrame()->document().to<WebPluginDocument>().plugin();
+}
+
+void RenderView::OnFind(int request_id, const string16& search_text,
+ const WebFindOptions& options) {
+ WebFrame* main_frame = webview()->mainFrame();
+
+ if (main_frame->document().isPluginDocument()) {
+ if (options.findNext) {
+ // Just navigate back/forward.
+ GetWebPluginFromPluginDocument()->selectFindResult(options.forward);
+ } else {
+ if (GetWebPluginFromPluginDocument()->startFind(
+ search_text, options.matchCase, request_id)) {
+ } else {
+ // Send "no results".
+ Send(new ViewHostMsg_Find_Reply(routing_id_,
+ request_id,
+ 0,
+ gfx::Rect(),
+ 0,
+ true));
+ }
+ }
+ return;
+ }
+
+ WebFrame* frame_after_main = main_frame->traverseNext(true);
+ WebFrame* focused_frame = webview()->focusedFrame();
+ WebFrame* search_frame = focused_frame; // start searching focused frame.
+
+ bool multi_frame = (frame_after_main != main_frame);
+
+ // If we have multiple frames, we don't want to wrap the search within the
+ // frame, so we check here if we only have main_frame in the chain.
+ bool wrap_within_frame = !multi_frame;
+
+ WebRect selection_rect;
+ bool result = false;
+
+ // If something is selected when we start searching it means we cannot just
+ // increment the current match ordinal; we need to re-generate it.
+ WebRange current_selection = focused_frame->selectionRange();
+
+ do {
+ result = search_frame->find(
+ request_id, search_text, options, wrap_within_frame, &selection_rect);
+
+ if (!result) {
+ // don't leave text selected as you move to the next frame.
+ search_frame->executeCommand(WebString::fromUTF8("Unselect"));
+
+ // Find the next frame, but skip the invisible ones.
+ do {
+ // What is the next frame to search? (we might be going backwards). Note
+ // that we specify wrap=true so that search_frame never becomes NULL.
+ search_frame = options.forward ?
+ search_frame->traverseNext(true) :
+ search_frame->traversePrevious(true);
+ } while (!search_frame->hasVisibleContent() &&
+ search_frame != focused_frame);
+
+ // Make sure selection doesn't affect the search operation in new frame.
+ search_frame->executeCommand(WebString::fromUTF8("Unselect"));
+
+ // If we have multiple frames and we have wrapped back around to the
+ // focused frame, we need to search it once more allowing wrap within
+ // the frame, otherwise it will report 'no match' if the focused frame has
+ // reported matches, but no frames after the focused_frame contain a
+ // match for the search word(s).
+ if (multi_frame && search_frame == focused_frame) {
+ result = search_frame->find(
+ request_id, search_text, options, true, // Force wrapping.
+ &selection_rect);
+ }
+ }
+
+ webview()->setFocusedFrame(search_frame);
+ } while (!result && search_frame != focused_frame);
+
+ if (options.findNext && current_selection.isNull()) {
+ // Force the main_frame to report the actual count.
+ main_frame->increaseMatchCount(0, request_id);
+ } else {
+ // If nothing is found, set result to "0 of 0", otherwise, set it to
+ // "-1 of 1" to indicate that we found at least one item, but we don't know
+ // yet what is active.
+ int ordinal = result ? -1 : 0; // -1 here means, we might know more later.
+ int match_count = result ? 1 : 0; // 1 here means possibly more coming.
+
+ // If we find no matches then this will be our last status update.
+ // Otherwise the scoping effort will send more results.
+ bool final_status_update = !result;
+
+ // Send the search result over to the browser process.
+ Send(new ViewHostMsg_Find_Reply(routing_id_,
+ request_id,
+ match_count,
+ selection_rect,
+ ordinal,
+ final_status_update));
+
+ // Scoping effort begins, starting with the mainframe.
+ search_frame = main_frame;
+
+ main_frame->resetMatchCount();
+
+ do {
+ // Cancel all old scoping requests before starting a new one.
+ search_frame->cancelPendingScopingEffort();
+
+ // We don't start another scoping effort unless at least one match has
+ // been found.
+ if (result) {
+ // Start new scoping request. If the scoping function determines that it
+ // needs to scope, it will defer until later.
+ search_frame->scopeStringMatches(request_id,
+ search_text,
+ options,
+ true); // reset the tickmarks
+ }
+
+ // Iterate to the next frame. The frame will not necessarily scope, for
+ // example if it is not visible.
+ search_frame = search_frame->traverseNext(true);
+ } while (search_frame != main_frame);
+ }
+}
+
+void RenderView::OnStopFinding(const ViewMsg_StopFinding_Params& params) {
+ WebView* view = webview();
+ if (!view)
+ return;
+
+ WebDocument doc = view->mainFrame()->document();
+ if (doc.isPluginDocument()) {
+ GetWebPluginFromPluginDocument()->stopFind();
+ return;
+ }
+
+ bool clear_selection =
+ params.action == ViewMsg_StopFinding_Params::kClearSelection;
+ if (clear_selection)
+ view->focusedFrame()->executeCommand(WebString::fromUTF8("Unselect"));
+
+ WebFrame* frame = view->mainFrame();
+ while (frame) {
+ frame->stopFinding(clear_selection);
+ frame = frame->traverseNext(false);
+ }
+
+ if (params.action == ViewMsg_StopFinding_Params::kActivateSelection) {
+ WebFrame* focused_frame = view->focusedFrame();
+ if (focused_frame) {
+ WebDocument doc = focused_frame->document();
+ if (!doc.isNull()) {
+ WebNode node = doc.focusedNode();
+ if (!node.isNull())
+ node.simulateClick();
+ }
+ }
+ }
+}
+
+void RenderView::OnFindReplyAck() {
+ // Check if there is any queued up request waiting to be sent.
+ if (queued_find_reply_message_.get()) {
+ // Send the search result over to the browser process.
+ Send(queued_find_reply_message_.release());
+ }
+}
+
+bool RenderView::AllowContentType(ContentSettingsType settings_type) {
+ // CONTENT_SETTING_ASK is only valid for cookies.
+ return current_content_settings_.settings[settings_type] !=
+ CONTENT_SETTING_BLOCK;
+}
+
+void RenderView::DidBlockContentType(ContentSettingsType settings_type,
+ const std::string& resource_identifier) {
+ if (!content_blocked_[settings_type]) {
+ content_blocked_[settings_type] = true;
+ Send(new ViewHostMsg_ContentBlocked(routing_id_, settings_type,
+ resource_identifier));
+ }
+}
+
+void RenderView::ClearBlockedContentSettings() {
+ for (size_t i = 0; i < arraysize(content_blocked_); ++i)
+ content_blocked_[i] = false;
+}
+
+WebPlugin* RenderView::CreatePepperPlugin(
+ WebFrame* frame,
+ const WebPluginParams& params,
+ const FilePath& path,
+ webkit::ppapi::PluginModule* pepper_module) {
+ return new webkit::ppapi::WebPluginImpl(
+ pepper_module, params, pepper_delegate_.AsWeakPtr());
+}
+
+WebPlugin* RenderView::CreateNPAPIPlugin(
+ WebFrame* frame,
+ const WebPluginParams& params,
+ const FilePath& path,
+ const std::string& mime_type) {
+ return new webkit::npapi::WebPluginImpl(
+ frame, params, path, mime_type, AsWeakPtr());
+}
+
+void RenderView::OnZoom(PageZoom::Function function) {
+ if (!webview()) // Not sure if this can happen, but no harm in being safe.
+ return;
+
+ webview()->hidePopups();
+
+ double old_zoom_level = webview()->zoomLevel();
+ double zoom_level;
+ if (function == PageZoom::RESET) {
+ zoom_level = 0;
+ } else if (static_cast<int>(old_zoom_level) == old_zoom_level) {
+ // Previous zoom level is a whole number, so just increment/decrement.
+ zoom_level = old_zoom_level + function;
+ } else {
+ // Either the user hit the zoom factor limit and thus the zoom level is now
+ // not a whole number, or a plugin changed it to a custom value. We want
+ // to go to the next whole number so that the user can always get back to
+ // 100% with the keyboard/menu.
+ if ((old_zoom_level > 1 && function > 0) ||
+ (old_zoom_level < 1 && function < 0)) {
+ zoom_level = static_cast<int>(old_zoom_level + function);
+ } else {
+ // We're going towards 100%, so first go to the next whole number.
+ zoom_level = static_cast<int>(old_zoom_level);
+ }
+ }
+
+ webview()->setZoomLevel(false, zoom_level);
+ zoomLevelChanged();
+}
+
+void RenderView::OnSetZoomLevel(double zoom_level) {
+ // Don't set zoom level for full-page plugin since they don't use the same
+ // zoom settings.
+ if (webview()->mainFrame()->document().isPluginDocument())
+ return;
+
+ webview()->hidePopups();
+ webview()->setZoomLevel(false, zoom_level);
+ zoomLevelChanged();
+}
+
+void RenderView::OnSetContentSettingsForLoadingURL(
+ const GURL& url,
+ const ContentSettings& content_settings) {
+ host_content_settings_[url] = content_settings;
+}
+
+void RenderView::OnSetZoomLevelForLoadingURL(const GURL& url,
+ double zoom_level) {
+ host_zoom_levels_[url] = zoom_level;
+}
+
+void RenderView::OnSetPageEncoding(const std::string& encoding_name) {
+ webview()->setPageEncoding(WebString::fromUTF8(encoding_name));
+}
+
+void RenderView::OnResetPageEncodingToDefault() {
+ WebString no_encoding;
+ webview()->setPageEncoding(no_encoding);
+}
+
+bool RenderView::GetAllChildFrames(
+ WebFrame* parent_frame,
+ std::vector<WebFrame*>* frames_vector) const {
+ if (!parent_frame)
+ return false;
+ for (WebFrame* child_frame = parent_frame->firstChild(); child_frame;
+ child_frame = child_frame->nextSibling()) {
+ frames_vector->push_back(child_frame);
+ GetAllChildFrames(child_frame, frames_vector);
+ }
+ return true;
+}
+
+WebFrame* RenderView::GetChildFrame(const std::wstring& xpath) const {
+ if (xpath.empty())
+ return webview()->mainFrame();
+
+ // xpath string can represent a frame deep down the tree (across multiple
+ // frame DOMs).
+ // Example, /html/body/table/tbody/tr/td/iframe\n/frameset/frame[0]
+ // should break into 2 xpaths
+ // /html/body/table/tbody/tr/td/iframe & /frameset/frame[0]
+
+ WebFrame* frame = webview()->mainFrame();
+
+ std::wstring xpath_remaining = xpath;
+ while (!xpath_remaining.empty()) {
+ std::wstring::size_type delim_pos = xpath_remaining.find_first_of(L'\n');
+ std::wstring xpath_child;
+ if (delim_pos != std::wstring::npos) {
+ xpath_child = xpath_remaining.substr(0, delim_pos);
+ xpath_remaining.erase(0, delim_pos + 1);
+ } else {
+ xpath_remaining.swap(xpath_child);
+ }
+ frame = frame->findChildByExpression(WideToUTF16Hack(xpath_child));
+ }
+
+ return frame;
+}
+
+WebNode RenderView::GetFocusedNode() const {
+ if (!webview())
+ return WebNode();
+ WebFrame* focused_frame = webview()->focusedFrame();
+ if (focused_frame) {
+ WebDocument doc = focused_frame->document();
+ if (!doc.isNull())
+ return doc.focusedNode();
+ }
+
+ return WebNode();
+}
+
+void RenderView::EvaluateScript(const string16& frame_xpath,
+ const string16& script,
+ int id,
+ bool notify_result) {
+ v8::Handle<v8::Value> result;
+ WebFrame* web_frame = GetChildFrame(UTF16ToWideHack(frame_xpath));
+ if (web_frame)
+ result = web_frame->executeScriptAndReturnValue(WebScriptSource(script));
+ if (notify_result) {
+ ListValue list;
+ if (web_frame) {
+ v8::HandleScope handle_scope;
+ v8::Local<v8::Context> context = web_frame->mainWorldScriptContext();
+ v8::Context::Scope context_scope(context);
+ list.Set(0, ConvertV8Value(result));
+ } else {
+ list.Set(0, Value::CreateNullValue());
+ }
+ Send(new ViewHostMsg_ScriptEvalResponse(routing_id_, id, list));
+ }
+}
+
+void RenderView::InsertCSS(const std::wstring& frame_xpath,
+ const std::string& css,
+ const std::string& id) {
+ WebFrame* web_frame = GetChildFrame(frame_xpath);
+ if (!web_frame)
+ return;
+
+ web_frame->insertStyleText(WebString::fromUTF8(css), WebString::fromUTF8(id));
+}
+
+void RenderView::OnScriptEvalRequest(const string16& frame_xpath,
+ const string16& jscript,
+ int id,
+ bool notify_result) {
+ EvaluateScript(frame_xpath, jscript, id, notify_result);
+}
+
+void RenderView::OnCSSInsertRequest(const std::wstring& frame_xpath,
+ const std::string& css,
+ const std::string& id) {
+ InsertCSS(frame_xpath, css, id);
+
+ // Notify RenderViewHost that css has been inserted into the frame.
+ Send(new ViewHostMsg_OnCSSInserted(routing_id_));
+}
+
+void RenderView::OnAddMessageToConsole(
+ const string16& frame_xpath,
+ const string16& message,
+ const WebConsoleMessage::Level& level) {
+ WebFrame* web_frame = GetChildFrame(UTF16ToWideHack(frame_xpath));
+ if (web_frame)
+ web_frame->addMessageToConsole(WebConsoleMessage(level, message));
+}
+
+void RenderView::OnAllowBindings(int enabled_bindings_flags) {
+ enabled_bindings_ |= enabled_bindings_flags;
+}
+
+void RenderView::OnSetWebUIProperty(const std::string& name,
+ const std::string& value) {
+ DCHECK(BindingsPolicy::is_web_ui_enabled(enabled_bindings_));
+ GetWebUIBindings()->SetProperty(name, value);
+}
+
+void RenderView::OnReservePageIDRange(int size_of_range) {
+ next_page_id_ += size_of_range + 1;
+}
+
+void RenderView::OnDragSourceEndedOrMoved(const gfx::Point& client_point,
+ const gfx::Point& screen_point,
+ bool ended,
+ WebDragOperation op) {
+ if (ended) {
+ webview()->dragSourceEndedAt(client_point, screen_point, op);
+ } else {
+ webview()->dragSourceMovedTo(client_point, screen_point, op);
+ }
+}
+
+void RenderView::OnDragSourceSystemDragEnded() {
+ webview()->dragSourceSystemDragEnded();
+}
+
+void RenderView::OnDragTargetDragEnter(const WebDropData& drop_data,
+ const gfx::Point& client_point,
+ const gfx::Point& screen_point,
+ WebDragOperationsMask ops) {
+ WebDragOperation operation = webview()->dragTargetDragEnter(
+ drop_data.ToDragData(),
+ 0, // drag identity, unused
+ client_point,
+ screen_point,
+ ops);
+
+ Send(new ViewHostMsg_UpdateDragCursor(routing_id_, operation));
+}
+
+void RenderView::OnDragTargetDragOver(const gfx::Point& client_point,
+ const gfx::Point& screen_point,
+ WebDragOperationsMask ops) {
+ WebDragOperation operation = webview()->dragTargetDragOver(
+ client_point,
+ screen_point,
+ ops);
+
+ Send(new ViewHostMsg_UpdateDragCursor(routing_id_, operation));
+}
+
+void RenderView::OnDragTargetDragLeave() {
+ webview()->dragTargetDragLeave();
+}
+
+void RenderView::OnDragTargetDrop(const gfx::Point& client_point,
+ const gfx::Point& screen_point) {
+ webview()->dragTargetDrop(client_point, screen_point);
+}
+
+void RenderView::OnUpdateWebPreferences(const WebPreferences& prefs) {
+ webkit_preferences_ = prefs;
+ webkit_preferences_.Apply(webview());
+}
+
+void RenderView::OnSetAltErrorPageURL(const GURL& url) {
+ alternate_error_page_url_ = url;
+}
+
+void RenderView::OnCustomContextMenuAction(
+ const webkit_glue::CustomContextMenuContext& custom_context,
+ unsigned action) {
+ if (custom_context.is_pepper_menu)
+ pepper_delegate_.OnCustomContextMenuAction(custom_context, action);
+ else
+ webview()->performCustomContextMenuAction(action);
+}
+
+void RenderView::OnInstallMissingPlugin() {
+ // This could happen when the first default plugin is deleted.
+ if (first_default_plugin_)
+ first_default_plugin_->InstallMissingPlugin();
+}
+
+void RenderView::OnDisplayPrerenderedPage() {
+ DCHECK(is_prerendering_);
+ is_prerendering_ = false;
+
+ // Update NavigationState for histograms.
+ WebDataSource* ds = webview()->mainFrame()->dataSource();
+ NavigationState* navigation_state = NavigationState::FromDataSource(ds);
+ navigation_state->set_prerendered_page_display_time(Time::Now());
+
+ // If there is a provisional data source, update its NavigationState, too.
+ WebDataSource* provisional_ds =
+ webview()->mainFrame()->provisionalDataSource();
+ if (provisional_ds) {
+ NavigationState* provisional_navigation_state =
+ NavigationState::FromDataSource(provisional_ds);
+ if (provisional_navigation_state) {
+ provisional_navigation_state->set_prerendered_page_display_time(
+ Time::Now());
+ }
+ }
+}
+
+void RenderView::OnFileChooserResponse(const std::vector<FilePath>& paths) {
+ // This could happen if we navigated to a different page before the user
+ // closed the chooser.
+ if (file_chooser_completions_.empty())
+ return;
+
+ WebVector<WebString> ws_file_names(paths.size());
+ for (size_t i = 0; i < paths.size(); ++i)
+ ws_file_names[i] = webkit_glue::FilePathToWebString(paths[i]);
+
+ if (file_chooser_completions_.front()->completion)
+ file_chooser_completions_.front()->completion->didChooseFile(ws_file_names);
+ file_chooser_completions_.pop_front();
+
+ // If there are more pending file chooser requests, schedule one now.
+ if (!file_chooser_completions_.empty()) {
+ Send(new ViewHostMsg_RunFileChooser(routing_id_,
+ file_chooser_completions_.front()->params));
+ }
+}
+
+void RenderView::OnEnableViewSourceMode() {
+ if (!webview())
+ return;
+ WebFrame* main_frame = webview()->mainFrame();
+ if (!main_frame)
+ return;
+
+ main_frame->enableViewSourceMode(true);
+}
+
+void RenderView::OnEnablePreferredSizeChangedMode(int flags) {
+ DCHECK(flags != kPreferredSizeNothing);
+ if (send_preferred_size_changes_)
+ return;
+ send_preferred_size_changes_ = true;
+
+ // WebKit doesn't send a notification of the effective height of the page
+ // changes, so poll for it.
+ // TODO: Add a notification for this to WebKit, remove polling. After that's
+ // done, rename kPreferredSizeHeightThisIsSlow to kPreferredSizeHeight.
+ // http://crbug.com/44850
+ if (flags & kPreferredSizeHeightThisIsSlow) {
+ preferred_size_change_timer_.Start(TimeDelta::FromMilliseconds(10), this,
+ &RenderView::CheckPreferredSize);
+ }
+}
+
+void RenderView::OnDisableScrollbarsForSmallWindows(
+ const gfx::Size& disable_scrollbar_size_limit) {
+ disable_scrollbars_size_limit_ = disable_scrollbar_size_limit;
+}
+
+void RenderView::OnSetRendererPrefs(const RendererPreferences& renderer_prefs) {
+ renderer_preferences_ = renderer_prefs;
+ UpdateFontRenderingFromRendererPrefs();
+#if defined(TOOLKIT_USES_GTK)
+ WebColorName name = WebKit::WebColorWebkitFocusRingColor;
+ WebKit::setNamedColors(&name, &renderer_prefs.focus_ring_color, 1);
+ WebKit::setCaretBlinkInterval(renderer_prefs.caret_blink_interval);
+ gfx::NativeThemeLinux::instance()->SetScrollbarColors(
+ renderer_prefs.thumb_inactive_color,
+ renderer_prefs.thumb_active_color,
+ renderer_prefs.track_color);
+
+ if (webview()) {
+ webview()->setScrollbarColors(
+ renderer_prefs.thumb_inactive_color,
+ renderer_prefs.thumb_active_color,
+ renderer_prefs.track_color);
+ webview()->setSelectionColors(
+ renderer_prefs.active_selection_bg_color,
+ renderer_prefs.active_selection_fg_color,
+ renderer_prefs.inactive_selection_bg_color,
+ renderer_prefs.inactive_selection_fg_color);
+ webview()->themeChanged();
+ }
+#endif
+}
+
+void RenderView::OnMediaPlayerActionAt(const gfx::Point& location,
+ const WebMediaPlayerAction& action) {
+ if (webview())
+ webview()->performMediaPlayerAction(action, location);
+}
+
+void RenderView::OnNotifyRendererViewType(ViewType::Type type) {
+ view_type_ = type;
+}
+
+void RenderView::OnUpdateBrowserWindowId(int window_id) {
+ browser_window_id_ = window_id;
+}
+
+void RenderView::OnEnableAccessibility() {
+ if (WebAccessibilityCache::accessibilityEnabled())
+ return;
+
+ WebAccessibilityCache::enableAccessibility();
+
+ if (webview()) {
+ // It's possible that the webview has already loaded a webpage without
+ // accessibility being enabled. Initialize the browser's cached
+ // accessibility tree by sending it a 'load complete' notification.
+ postAccessibilityNotification(
+ webview()->accessibilityObject(),
+ WebKit::WebAccessibilityNotificationLoadComplete);
+ }
+}
+
+void RenderView::OnSetAccessibilityFocus(int acc_obj_id) {
+ if (!accessibility_.get())
+ return;
+
+ WebAccessibilityObject obj = accessibility_->getObjectById(acc_obj_id);
+ WebAccessibilityObject root = webview()->accessibilityObject();
+ if (!obj.isValid() || !root.isValid())
+ return;
+
+ // By convention, calling SetFocus on the root of the tree should clear the
+ // current focus. Otherwise set the focus to the new node.
+ if (accessibility_->addOrGetId(obj) == accessibility_->addOrGetId(root))
+ webview()->clearFocusedNode();
+ else
+ obj.setFocused(true);
+}
+
+void RenderView::OnAccessibilityDoDefaultAction(int acc_obj_id) {
+ if (!accessibility_.get())
+ return;
+
+ WebAccessibilityObject obj = accessibility_->getObjectById(acc_obj_id);
+ if (!obj.isValid())
+ return;
+
+ obj.performDefaultAction();
+}
+
+void RenderView::OnAccessibilityNotificationsAck() {
+ DCHECK(accessibility_ack_pending_);
+ accessibility_ack_pending_ = false;
+ SendPendingAccessibilityNotifications();
+}
+
+void RenderView::OnGetAllSavableResourceLinksForCurrentPage(
+ const GURL& page_url) {
+ // Prepare list to storage all savable resource links.
+ std::vector<GURL> resources_list;
+ std::vector<GURL> referrers_list;
+ std::vector<GURL> frames_list;
+ webkit_glue::SavableResourcesResult result(&resources_list,
+ &referrers_list,
+ &frames_list);
+
+ if (!webkit_glue::GetAllSavableResourceLinksForCurrentPage(
+ webview(),
+ page_url,
+ &result,
+ chrome::kSavableSchemes)) {
+ // If something is wrong when collecting all savable resource links,
+ // send empty list to embedder(browser) to tell it failed.
+ referrers_list.clear();
+ resources_list.clear();
+ frames_list.clear();
+ }
+
+ // Send result of all savable resource links to embedder.
+ Send(new ViewHostMsg_SendCurrentPageAllSavableResourceLinks(routing_id_,
+ resources_list,
+ referrers_list,
+ frames_list));
+}
+
+void RenderView::OnGetSerializedHtmlDataForCurrentPageWithLocalLinks(
+ const std::vector<GURL>& links,
+ const std::vector<FilePath>& local_paths,
+ const FilePath& local_directory_name) {
+
+ // Convert std::vector of GURLs to WebVector<WebURL>
+ WebVector<WebURL> weburl_links(links);
+
+ // Convert std::vector of std::strings to WebVector<WebString>
+ WebVector<WebString> webstring_paths(local_paths.size());
+ for (size_t i = 0; i < local_paths.size(); i++)
+ webstring_paths[i] = webkit_glue::FilePathToWebString(local_paths[i]);
+
+ WebPageSerializer::serialize(webview()->mainFrame(),
+ true, this, weburl_links, webstring_paths,
+ webkit_glue::FilePathToWebString(
+ local_directory_name));
+}
+
+void RenderView::didSerializeDataForFrame(const WebURL& frame_url,
+ const WebCString& data,
+ WebPageSerializerClient::PageSerializationStatus status) {
+ Send(new ViewHostMsg_SendSerializedHtmlData(
+ routing_id_,
+ frame_url,
+ data.data(),
+ static_cast<int32>(status)));
+}
+
+void RenderView::OnShouldClose() {
+ bool should_close = webview()->dispatchBeforeUnloadEvent();
+ Send(new ViewHostMsg_ShouldClose_ACK(routing_id_, should_close));
+}
+
+void RenderView::OnClosePage(const ViewMsg_ClosePage_Params& params) {
+ // TODO(creis): We'd rather use webview()->Close() here, but that currently
+ // sets the WebView's delegate_ to NULL, preventing any JavaScript dialogs
+ // in the onunload handler from appearing. For now, we're bypassing that and
+ // calling the FrameLoader's CloseURL method directly. This should be
+ // revisited to avoid having two ways to close a page. Having a single way
+ // to close that can run onunload is also useful for fixing
+ // http://b/issue?id=753080.
+ // TODO(davemoore) This code should be removed once willClose() gets
+ // called when a page is destroyed. page_load_histograms_.Dump() is safe
+ // to call multiple times for the same frame, but it will simplify things.
+ page_load_histograms_.Dump(webview()->mainFrame());
+ page_load_histograms_.ResetCrossFramePropertyAccess();
+ webview()->dispatchUnloadEvent();
+
+ // Just echo back the params in the ACK.
+ Send(new ViewHostMsg_ClosePage_ACK(routing_id_, params));
+}
+
+void RenderView::OnThemeChanged() {
+#if defined(OS_WIN)
+ gfx::NativeTheme::instance()->CloseHandles();
+ if (webview())
+ webview()->themeChanged();
+#else // defined(OS_WIN)
+ // TODO(port): we don't support theming on non-Windows platforms yet
+ NOTIMPLEMENTED();
+#endif
+}
+
+void RenderView::OnHandleMessageFromExternalHost(const std::string& message,
+ const std::string& origin,
+ const std::string& target) {
+ if (message.empty())
+ return;
+ GetExternalHostBindings()->ForwardMessageFromExternalHost(message, origin,
+ target);
+}
+
+void RenderView::OnDisassociateFromPopupCount() {
+ if (decrement_shared_popup_at_destruction_)
+ shared_popup_counter_->data--;
+ shared_popup_counter_ = new SharedRenderViewCounter(0);
+ decrement_shared_popup_at_destruction_ = false;
+}
+
+bool RenderView::MaybeLoadAlternateErrorPage(WebFrame* frame,
+ const WebURLError& error,
+ bool replace) {
+ // We only show alternate error pages in the main frame. They are
+ // intended to assist the user when navigating, so there is not much
+ // value in showing them for failed subframes. Ideally, we would be
+ // able to use the TYPED transition type for this, but that flag is
+ // not preserved across page reloads.
+ if (frame->parent())
+ return false;
+
+ // Use the alternate error page service if this is a DNS failure or
+ // connection failure.
+ int ec = error.reason;
+ if (ec != net::ERR_NAME_NOT_RESOLVED &&
+ ec != net::ERR_CONNECTION_FAILED &&
+ ec != net::ERR_CONNECTION_REFUSED &&
+ ec != net::ERR_ADDRESS_UNREACHABLE &&
+ ec != net::ERR_CONNECTION_TIMED_OUT)
+ return false;
+
+ const GURL& error_page_url = GetAlternateErrorPageURL(error.unreachableURL,
+ ec == net::ERR_NAME_NOT_RESOLVED ? DNS_ERROR : CONNECTION_ERROR);
+ if (!error_page_url.is_valid())
+ return false;
+
+ // Load an empty page first so there is an immediate response to the error,
+ // and then kick off a request for the alternate error page.
+ frame->loadHTMLString(std::string(),
+ GURL(chrome::kUnreachableWebDataURL),
+ error.unreachableURL,
+ replace);
+
+ // Now, create a fetcher for the error page and associate it with the data
+ // source we just created via the LoadHTMLString call. That way if another
+ // navigation occurs, the fetcher will get destroyed.
+ NavigationState* navigation_state =
+ NavigationState::FromDataSource(frame->provisionalDataSource());
+ navigation_state->set_alt_error_page_fetcher(
+ new AltErrorPageResourceFetcher(
+ error_page_url, frame, error,
+ NewCallback(this, &RenderView::AltErrorPageFinished)));
+ return true;
+}
+
+void RenderView::AltErrorPageFinished(WebFrame* frame,
+ const WebURLError& original_error,
+ const std::string& html) {
+ // Here, we replace the blank page we loaded previously.
+ // If we failed to download the alternate error page, LoadNavigationErrorPage
+ // will simply display a default error page.
+ LoadNavigationErrorPage(frame, WebURLRequest(), original_error, html, true);
+}
+
+void RenderView::OnMoveOrResizeStarted() {
+ if (webview())
+ webview()->hidePopups();
+}
+
+void RenderView::OnResize(const gfx::Size& new_size,
+ const gfx::Rect& resizer_rect) {
+ if (webview()) {
+ webview()->hidePopups();
+ if (send_preferred_size_changes_) {
+ webview()->mainFrame()->setCanHaveScrollbars(
+ should_display_scrollbars(new_size.width(), new_size.height()));
+ }
+ }
+
+ RenderWidget::OnResize(new_size, resizer_rect);
+}
+
+void RenderView::DidInitiatePaint() {
+ // Notify the pepper plugins that we started painting.
+ pepper_delegate_.ViewInitiatedPaint();
+}
+
+void RenderView::DidFlushPaint() {
+ // Notify any pepper plugins that we painted. This will call into the plugin,
+ // and we it may ask to close itself as a result. This will, in turn, modify
+ // our set, possibly invalidating the iterator. So we iterate on a copy that
+ // won't change out from under us.
+ pepper_delegate_.ViewFlushedPaint();
+
+ WebFrame* main_frame = webview()->mainFrame();
+
+ // If we have a provisional frame we are between the start and commit stages
+ // of loading and we don't want to save stats.
+ if (!main_frame->provisionalDataSource()) {
+ WebDataSource* ds = main_frame->dataSource();
+ NavigationState* navigation_state = NavigationState::FromDataSource(ds);
+ DCHECK(navigation_state);
+
+ // TODO(jar): The following code should all be inside a method, probably in
+ // NavigatorState.
+ Time now = Time::Now();
+ if (navigation_state->first_paint_time().is_null()) {
+ navigation_state->set_first_paint_time(now);
+ }
+ if (navigation_state->first_paint_after_load_time().is_null() &&
+ !navigation_state->finish_load_time().is_null()) {
+ navigation_state->set_first_paint_after_load_time(now);
+ }
+ }
+}
+
+webkit::ppapi::PluginInstance* RenderView::GetBitmapForOptimizedPluginPaint(
+ const gfx::Rect& paint_bounds,
+ TransportDIB** dib,
+ gfx::Rect* location,
+ gfx::Rect* clip) {
+ return pepper_delegate_.GetBitmapForOptimizedPluginPaint(
+ paint_bounds, dib, location, clip);
+}
+
+gfx::Point RenderView::GetScrollOffset() {
+ WebKit::WebSize scroll_offset = webview()->mainFrame()->scrollOffset();
+ return gfx::Point(scroll_offset.width, scroll_offset.height);
+}
+
+void RenderView::OnClearFocusedNode() {
+ if (webview())
+ webview()->clearFocusedNode();
+}
+
+void RenderView::OnSetBackground(const SkBitmap& background) {
+ if (webview())
+ webview()->setIsTransparent(!background.empty());
+
+ SetBackground(background);
+}
+
+void RenderView::OnSetActive(bool active) {
+ if (webview())
+ webview()->setIsActive(active);
+
+#if defined(OS_MACOSX)
+ std::set<WebPluginDelegateProxy*>::iterator plugin_it;
+ for (plugin_it = plugin_delegates_.begin();
+ plugin_it != plugin_delegates_.end(); ++plugin_it) {
+ (*plugin_it)->SetWindowFocus(active);
+ }
+#endif
+}
+
+#if defined(OS_MACOSX)
+void RenderView::OnSetWindowVisibility(bool visible) {
+ // Inform plugins that their container has changed visibility.
+ std::set<WebPluginDelegateProxy*>::iterator plugin_it;
+ for (plugin_it = plugin_delegates_.begin();
+ plugin_it != plugin_delegates_.end(); ++plugin_it) {
+ (*plugin_it)->SetContainerVisibility(visible);
+ }
+}
+
+void RenderView::OnWindowFrameChanged(const gfx::Rect& window_frame,
+ const gfx::Rect& view_frame) {
+ // Inform plugins that their window's frame has changed.
+ std::set<WebPluginDelegateProxy*>::iterator plugin_it;
+ for (plugin_it = plugin_delegates_.begin();
+ plugin_it != plugin_delegates_.end(); ++plugin_it) {
+ (*plugin_it)->WindowFrameChanged(window_frame, view_frame);
+ }
+}
+
+void RenderView::OnPluginImeCompositionCompleted(const string16& text,
+ int plugin_id) {
+ // WebPluginDelegateProxy is responsible for figuring out if this event
+ // applies to it or not, so inform all the delegates.
+ std::set<WebPluginDelegateProxy*>::iterator plugin_it;
+ for (plugin_it = plugin_delegates_.begin();
+ plugin_it != plugin_delegates_.end(); ++plugin_it) {
+ (*plugin_it)->ImeCompositionCompleted(text, plugin_id);
+ }
+}
+#endif // OS_MACOSX
+
+void RenderView::SendExtensionRequest(
+ const ViewHostMsg_DomMessage_Params& params) {
+ Send(new ViewHostMsg_ExtensionRequest(routing_id_, params));
+}
+
+void RenderView::OnExtensionResponse(int request_id,
+ bool success,
+ const std::string& response,
+ const std::string& error) {
+ ExtensionProcessBindings::HandleResponse(
+ request_id, success, response, error);
+}
+
+void RenderView::OnExtensionMessageInvoke(const std::string& extension_id,
+ const std::string& function_name,
+ const ListValue& args,
+ const GURL& event_url) {
+ RendererExtensionBindings::Invoke(
+ extension_id, function_name, args, this, event_url);
+}
+
+void RenderView::postAccessibilityNotification(
+ const WebAccessibilityObject& obj,
+ WebAccessibilityNotification notification) {
+ if (!accessibility_.get() && webview()) {
+ // Load complete should be our first notification sent.
+ // TODO(ctguil): Investigate if a different notification is a WebCore bug.
+ if (notification != WebKit::WebAccessibilityNotificationLoadComplete)
+ return;
+
+ // Create and initialize our accessibility cache
+ accessibility_.reset(WebAccessibilityCache::create());
+ accessibility_->initialize(webview());
+ }
+
+ if (!accessibility_->isCached(obj)) {
+ // The browser doesn't know about objects that are not in the cache. Send a
+ // children change for the first accestor that actually is in the cache.
+ WebAccessibilityObject parent = obj;
+ while (parent.isValid() && !accessibility_->isCached(parent))
+ parent = parent.parentObject();
+
+ DCHECK(parent.isValid() && accessibility_->isCached(parent));
+ if (!parent.isValid())
+ return;
+ postAccessibilityNotification(
+ parent, WebKit::WebAccessibilityNotificationChildrenChanged);
+
+ // The parent's children change takes care of the child's children change.
+ if (notification == WebKit::WebAccessibilityNotificationChildrenChanged)
+ return;
+ }
+
+ // Add the accessibility object to our cache and ensure it's valid.
+ RendererAccessibilityNotification acc_notification;
+ acc_notification.id = accessibility_->addOrGetId(obj);
+ acc_notification.type = notification;
+ if (acc_notification.id < 0)
+ return;
+
+ ViewHostMsg_AccessibilityNotification_Params::NotificationType temp;
+ if (!WebAccessibilityNotificationToViewHostMsg(notification, &temp))
+ return;
+
+ // Discard duplicate accessibility notifications.
+ for (uint32 i = 0; i < pending_accessibility_notifications_.size(); i++) {
+ if (pending_accessibility_notifications_[i].id == acc_notification.id &&
+ pending_accessibility_notifications_[i].type == acc_notification.type) {
+ return;
+ }
+ }
+ pending_accessibility_notifications_.push_back(acc_notification);
+
+ if (!accessibility_ack_pending_ && accessibility_method_factory_.empty()) {
+ // When no accessibility notifications are in-flight post a task to send
+ // the notifications to the browser. We use PostTask so that we can queue
+ // up additional notifications.
+ MessageLoop::current()->PostTask(
+ FROM_HERE,
+ accessibility_method_factory_.NewRunnableMethod(
+ &RenderView::SendPendingAccessibilityNotifications));
+ }
+}
+
+void RenderView::OnSetEditCommandsForNextKeyEvent(
+ const EditCommands& edit_commands) {
+ edit_commands_ = edit_commands;
+}
+
+void RenderView::OnExecuteCode(const ViewMsg_ExecuteCode_Params& params) {
+ WebFrame* main_frame = webview() ? webview()->mainFrame() : NULL;
+ if (!main_frame) {
+ Send(new ViewMsg_ExecuteCodeFinished(routing_id_, params.request_id,
+ false));
+ return;
+ }
+
+ WebDataSource* ds = main_frame->dataSource();
+ NavigationState* navigation_state = NavigationState::FromDataSource(ds);
+ if (!navigation_state->user_script_idle_scheduler()->has_run()) {
+ pending_code_execution_queue_.push(
+ linked_ptr<ViewMsg_ExecuteCode_Params>(
+ new ViewMsg_ExecuteCode_Params(params)));
+ return;
+ }
+
+ ExecuteCodeImpl(main_frame, params);
+}
+
+void RenderView::ExecuteCodeImpl(WebFrame* frame,
+ const ViewMsg_ExecuteCode_Params& params) {
+ std::vector<WebFrame*> frame_vector;
+ frame_vector.push_back(frame);
+ if (params.all_frames)
+ GetAllChildFrames(frame, &frame_vector);
+
+ for (std::vector<WebFrame*>::iterator frame_it = frame_vector.begin();
+ frame_it != frame_vector.end(); ++frame_it) {
+ WebFrame* frame = *frame_it;
+ if (params.is_javascript) {
+ const Extension* extension =
+ render_thread_->GetExtensions()->GetByID(params.extension_id);
+
+ // Since extension info is sent separately from user script info, they can
+ // be out of sync. We just ignore this situation.
+ if (!extension)
+ continue;
+
+ if (!extension->CanExecuteScriptOnPage(frame->url(), NULL, NULL))
+ continue;
+
+ std::vector<WebScriptSource> sources;
+ sources.push_back(
+ WebScriptSource(WebString::fromUTF8(params.code)));
+ UserScriptSlave::InsertInitExtensionCode(&sources, params.extension_id);
+ frame->executeScriptInIsolatedWorld(
+ UserScriptSlave::GetIsolatedWorldId(params.extension_id),
+ &sources.front(), sources.size(), EXTENSION_GROUP_CONTENT_SCRIPTS);
+ } else {
+ frame->insertStyleText(WebString::fromUTF8(params.code), WebString());
+ }
+ }
+
+ Send(new ViewMsg_ExecuteCodeFinished(routing_id_, params.request_id, true));
+}
+
+void RenderView::Close() {
+ // We need to grab a pointer to the doomed WebView before we destroy it.
+ WebView* doomed = webview();
+ RenderWidget::Close();
+ g_view_map.Get().erase(doomed);
+}
+
+void RenderView::DidHandleKeyEvent() {
+ edit_commands_.clear();
+}
+
+void RenderView::DidHandleMouseEvent(const WebKit::WebMouseEvent& event) {
+ FOR_EACH_OBSERVER(RenderViewObserver, observers_, DidHandleMouseEvent(event));
+}
+
+void RenderView::OnWasHidden() {
+ RenderWidget::OnWasHidden();
+
+ if (webview()) {
+ webview()->settings()->setMinimumTimerInterval(
+ webkit_glue::kBackgroundTabTimerInterval);
+ }
+
+#if defined(OS_MACOSX)
+ // Inform plugins that their container is no longer visible.
+ std::set<WebPluginDelegateProxy*>::iterator plugin_it;
+ for (plugin_it = plugin_delegates_.begin();
+ plugin_it != plugin_delegates_.end(); ++plugin_it) {
+ (*plugin_it)->SetContainerVisibility(false);
+ }
+#endif // OS_MACOSX
+}
+
+void RenderView::OnWasRestored(bool needs_repainting) {
+ RenderWidget::OnWasRestored(needs_repainting);
+
+ if (webview()) {
+ webview()->settings()->setMinimumTimerInterval(
+ webkit_glue::kForegroundTabTimerInterval);
+ }
+
+#if defined(OS_MACOSX)
+ // Inform plugins that their container is now visible.
+ std::set<WebPluginDelegateProxy*>::iterator plugin_it;
+ for (plugin_it = plugin_delegates_.begin();
+ plugin_it != plugin_delegates_.end(); ++plugin_it) {
+ (*plugin_it)->SetContainerVisibility(true);
+ }
+#endif // OS_MACOSX
+}
+
+void RenderView::OnSetFocus(bool enable) {
+ RenderWidget::OnSetFocus(enable);
+
+ if (webview() && webview()->isActive()) {
+ // Notify all NPAPI plugins.
+ std::set<WebPluginDelegateProxy*>::iterator plugin_it;
+ for (plugin_it = plugin_delegates_.begin();
+ plugin_it != plugin_delegates_.end(); ++plugin_it) {
+#if defined(OS_MACOSX)
+ // RenderWidget's call to setFocus can cause the underlying webview's
+ // activation state to change just like a call to setIsActive.
+ if (enable)
+ (*plugin_it)->SetWindowFocus(true);
+#endif
+ (*plugin_it)->SetContentAreaFocus(enable);
+ }
+
+ // Notify all Pepper plugins.
+ pepper_delegate_.OnSetFocus(enable);
+ }
+}
+
+void RenderView::EnsureDocumentTag() {
+ // TODO(darin): There's actually no reason for this to be here. We should
+ // have the browser side manage the document tag.
+#if defined(OS_MACOSX)
+ if (!has_document_tag_) {
+ // Make the call to get the tag.
+ Send(new ViewHostMsg_GetDocumentTag(routing_id_, &document_tag_));
+ has_document_tag_ = true;
+ }
+#endif
+}
+
+#if defined(OS_MACOSX)
+void RenderView::PluginFocusChanged(bool focused, int plugin_id) {
+ IPC::Message* msg = new ViewHostMsg_PluginFocusChanged(routing_id(),
+ focused, plugin_id);
+ Send(msg);
+}
+
+void RenderView::StartPluginIme() {
+ IPC::Message* msg = new ViewHostMsg_StartPluginIme(routing_id());
+ // This message can be sent during event-handling, and needs to be delivered
+ // within that context.
+ msg->set_unblock(true);
+ Send(msg);
+}
+
+gfx::PluginWindowHandle RenderView::AllocateFakePluginWindowHandle(
+ bool opaque, bool root) {
+ gfx::PluginWindowHandle window = NULL;
+ Send(new ViewHostMsg_AllocateFakePluginWindowHandle(
+ routing_id(), opaque, root, &window));
+ if (window) {
+ fake_plugin_window_handles_.insert(window);
+ }
+ return window;
+}
+
+void RenderView::DestroyFakePluginWindowHandle(gfx::PluginWindowHandle window) {
+ if (window && fake_plugin_window_handles_.find(window) !=
+ fake_plugin_window_handles_.end()) {
+ Send(new ViewHostMsg_DestroyFakePluginWindowHandle(routing_id(), window));
+ fake_plugin_window_handles_.erase(window);
+ }
+}
+
+void RenderView::AcceleratedSurfaceSetIOSurface(gfx::PluginWindowHandle window,
+ int32 width,
+ int32 height,
+ uint64 io_surface_identifier) {
+ Send(new ViewHostMsg_AcceleratedSurfaceSetIOSurface(
+ routing_id(), window, width, height, io_surface_identifier));
+}
+
+void RenderView::AcceleratedSurfaceSetTransportDIB(
+ gfx::PluginWindowHandle window,
+ int32 width,
+ int32 height,
+ TransportDIB::Handle transport_dib) {
+ Send(new ViewHostMsg_AcceleratedSurfaceSetTransportDIB(
+ routing_id(), window, width, height, transport_dib));
+}
+
+TransportDIB::Handle RenderView::AcceleratedSurfaceAllocTransportDIB(
+ size_t size) {
+ TransportDIB::Handle dib_handle;
+ // Assume this is a synchronous RPC.
+ if (Send(new ViewHostMsg_AllocTransportDIB(size, true, &dib_handle)))
+ return dib_handle;
+ // Return an invalid handle if Send() fails.
+ return TransportDIB::DefaultHandleValue();
+}
+
+void RenderView::AcceleratedSurfaceFreeTransportDIB(TransportDIB::Id dib_id) {
+ Send(new ViewHostMsg_FreeTransportDIB(dib_id));
+}
+
+void RenderView::AcceleratedSurfaceBuffersSwapped(
+ gfx::PluginWindowHandle window, uint64 surface_id) {
+ Send(new ViewHostMsg_AcceleratedSurfaceBuffersSwapped(
+ routing_id(), window, surface_id));
+}
+#endif
+
+bool RenderView::ScheduleFileChooser(
+ const ViewHostMsg_RunFileChooser_Params& params,
+ WebFileChooserCompletion* completion) {
+ static const size_t kMaximumPendingFileChooseRequests = 4;
+ if (file_chooser_completions_.size() > kMaximumPendingFileChooseRequests) {
+ // This sanity check prevents too many file choose requests from getting
+ // queued which could DoS the user. Getting these is most likely a
+ // programming error (there are many ways to DoS the user so it's not
+ // considered a "real" security check), either in JS requesting many file
+ // choosers to pop up, or in a plugin.
+ //
+ // TODO(brettw) we might possibly want to require a user gesture to open
+ // a file picker, which will address this issue in a better way.
+ return false;
+ }
+
+ file_chooser_completions_.push_back(linked_ptr<PendingFileChooser>(
+ new PendingFileChooser(params, completion)));
+ if (file_chooser_completions_.size() == 1) {
+ // Actually show the browse dialog when this is the first request.
+ Send(new ViewHostMsg_RunFileChooser(routing_id_, params));
+ }
+ return true;
+}
+
+void RenderView::OnPageTranslated() {
+ WebFrame* frame = webview()->mainFrame();
+ if (!frame)
+ return;
+
+ FOR_EACH_OBSERVER(RenderViewObserver, observers_, FrameTranslated(frame));
+}
+
+WebKit::WebGeolocationClient* RenderView::geolocationClient() {
+ if (!geolocation_dispatcher_)
+ geolocation_dispatcher_ = new GeolocationDispatcher(this);
+ return geolocation_dispatcher_;
+}
+
+WebKit::WebSpeechInputController* RenderView::speechInputController(
+ WebKit::WebSpeechInputListener* listener) {
+ if (!speech_input_dispatcher_)
+ speech_input_dispatcher_ = new SpeechInputDispatcher(this, listener);
+ return speech_input_dispatcher_;
+}
+
+WebKit::WebDeviceOrientationClient* RenderView::deviceOrientationClient() {
+ if (!device_orientation_dispatcher_)
+ device_orientation_dispatcher_ = new DeviceOrientationDispatcher(this);
+ return device_orientation_dispatcher_;
+}
+
+void RenderView::zoomLimitsChanged(double minimum_level, double maximum_level) {
+ // For now, don't remember plugin zoom values. We don't want to mix them with
+ // normal web content (i.e. a fixed layout plugin would usually want them
+ // different).
+ bool remember = !webview()->mainFrame()->document().isPluginDocument();
+
+ int minimum_percent = static_cast<int>(
+ WebView::zoomLevelToZoomFactor(minimum_level) * 100);
+ int maximum_percent = static_cast<int>(
+ WebView::zoomLevelToZoomFactor(maximum_level) * 100);
+
+ Send(new ViewHostMsg_UpdateZoomLimits(
+ routing_id_, minimum_percent, maximum_percent, remember));
+}
+
+void RenderView::zoomLevelChanged() {
+ bool remember = !webview()->mainFrame()->document().isPluginDocument();
+
+ // Tell the browser which url got zoomed so it can update the menu and the
+ // saved values if necessary
+ Send(new ViewHostMsg_DidZoomURL(
+ routing_id_, webview()->zoomLevel(), remember,
+ GURL(webview()->mainFrame()->url())));
+}
+
+void RenderView::registerProtocolHandler(const WebString& scheme,
+ const WebString& base_url,
+ const WebString& url,
+ const WebString& title) {
+ GURL base(base_url);
+ GURL absolute_url = base.Resolve(UTF16ToUTF8(url));
+ if (base.GetOrigin() != absolute_url.GetOrigin()) {
+ return;
+ }
+ RenderThread::current()->Send(
+ new ViewHostMsg_RegisterProtocolHandler(routing_id_,
+ UTF16ToUTF8(scheme),
+ absolute_url,
+ title));
+}
+
+bool RenderView::IsNonLocalTopLevelNavigation(
+ const GURL& url, WebKit::WebFrame* frame, WebKit::WebNavigationType type) {
+ // Must be a top level frame.
+ if (frame->parent() != NULL)
+ return false;
+
+ // Navigations initiated within Webkit are not sent out to the external host
+ // in the following cases.
+ // 1. The url scheme is not http/https
+ // 2. There is no opener and this is not the first url being opened by this
+ // RenderView.
+ // 3. The origin of the url and the opener is the same in which case the
+ // opener relationship is maintained.
+ // 4. Reloads/form submits/back forward navigations
+ if (!url.SchemeIs("http") && !url.SchemeIs("https"))
+ return false;
+
+ // Not interested in reloads/form submits/resubmits/back forward navigations.
+ if (type != WebKit::WebNavigationTypeReload &&
+ type != WebKit::WebNavigationTypeFormSubmitted &&
+ type != WebKit::WebNavigationTypeFormResubmitted &&
+ type != WebKit::WebNavigationTypeBackForward) {
+ // The opener relationship between the new window and the parent allows the
+ // new window to script the parent and vice versa. This is not allowed if
+ // the origins of the two domains are different. This can be treated as a
+ // top level navigation and routed back to the host.
+ WebKit::WebFrame* opener = frame->opener();
+ if (!opener) {
+ // Force link click navigations to always be routed to the host as they
+ // may update session state on the server.
+ if (type == WebKit::WebNavigationTypeLinkClicked)
+ return true;
+ // If this is the first page being loaded by this RenderView instance then
+ // it should stay here.
+ if (page_id_ == -1) {
+ return false;
+ } else {
+ return true;
+ }
+ }
+
+ if (url.GetOrigin() != GURL(opener->url()).GetOrigin())
+ return true;
+ }
+ return false;
+}
+
+void RenderView::OnAsyncFileOpened(base::PlatformFileError error_code,
+ IPC::PlatformFileForTransit file_for_transit,
+ int message_id) {
+ pepper_delegate_.OnAsyncFileOpened(
+ error_code,
+ IPC::PlatformFileForTransitToPlatformFile(file_for_transit),
+ message_id);
+}
+
+#if defined(OS_MACOSX)
+void RenderView::OnSelectPopupMenuItem(int selected_index) {
+ if (external_popup_menu_ == NULL) {
+ // Crash reports from the field indicate that we can be notified with a
+ // NULL external popup menu (we probably get notified twice).
+ // If you hit this please file a bug against jcivelli and include the page
+ // and steps to repro.
+ NOTREACHED();
+ return;
+ }
+ external_popup_menu_->DidSelectItem(selected_index);
+ external_popup_menu_.reset();
+}
+#endif
+
+void RenderView::AddErrorToRootConsole(const string16& message) {
+ if (webview() && webview()->mainFrame()) {
+ webview()->mainFrame()->addMessageToConsole(
+ WebConsoleMessage(WebConsoleMessage::LevelError, message));
+ }
+}
+
+#if defined(ENABLE_FLAPPER_HACKS)
+void RenderView::OnConnectTcpACK(
+ int request_id,
+ IPC::PlatformFileForTransit socket_for_transit,
+ const PP_Flash_NetAddress& local_addr,
+ const PP_Flash_NetAddress& remote_addr) {
+ pepper_delegate_.OnConnectTcpACK(
+ request_id,
+ IPC::PlatformFileForTransitToPlatformFile(socket_for_transit),
+ local_addr,
+ remote_addr);
+}
+#endif
+
+void RenderView::OnJavaScriptStressTestControl(int cmd, int param) {
+ if (cmd == kJavaScriptStressTestSetStressRunType) {
+ v8::Testing::SetStressRunType(static_cast<v8::Testing::StressType>(param));
+ } else if (cmd == kJavaScriptStressTestPrepareStressRun) {
+ v8::Testing::PrepareStressRun(param);
+ }
+}
+
+void RenderView::OnContextMenuClosed(
+ const webkit_glue::CustomContextMenuContext& custom_context) {
+ if (custom_context.is_pepper_menu)
+ pepper_delegate_.OnContextMenuClosed(custom_context);
+ else
+ context_menu_node_.reset();
+}
+
+void RenderView::OnNetworkStateChanged(bool online) {
+ WebNetworkStateNotifier::setOnLine(online);
+}
diff --git a/content/renderer/render_view.h b/content/renderer/render_view.h
new file mode 100644
index 0000000..21e4e23
--- /dev/null
+++ b/content/renderer/render_view.h
@@ -0,0 +1,1440 @@
+// Copyright (c) 2011 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#ifndef CONTENT_RENDERER_RENDER_VIEW_H_
+#define CONTENT_RENDERER_RENDER_VIEW_H_
+#pragma once
+
+#include <deque>
+#include <map>
+#include <queue>
+#include <set>
+#include <string>
+#include <vector>
+
+#include "app/surface/transport_dib.h"
+#include "base/basictypes.h"
+#include "base/gtest_prod_util.h"
+#include "base/id_map.h"
+#include "base/linked_ptr.h"
+#include "base/observer_list.h"
+#include "base/timer.h"
+#include "base/weak_ptr.h"
+#include "build/build_config.h"
+#include "chrome/common/content_settings.h"
+#include "chrome/common/edit_command.h"
+#include "chrome/common/renderer_preferences.h"
+#include "chrome/common/view_types.h"
+#include "chrome/renderer/external_popup_menu.h"
+#include "chrome/renderer/page_load_histograms.h"
+#include "content/renderer/renderer_webcookiejar_impl.h"
+#include "content/common/navigation_gesture.h"
+#include "content/common/page_zoom.h"
+#include "content/renderer/pepper_plugin_delegate_impl.h"
+#include "content/renderer/render_widget.h"
+#include "ipc/ipc_platform_file.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebAccessibilityNotification.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebConsoleMessage.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebFileSystem.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebFrameClient.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebPageSerializerClient.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebNode.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebTextDirection.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebViewClient.h"
+#include "third_party/WebKit/Source/WebKit/chromium/public/WebNavigationType.h"
+#include "webkit/glue/webpreferences.h"
+#include "webkit/plugins/npapi/webplugin_page_delegate.h"
+
+#if defined(OS_WIN)
+// RenderView is a diamond-shaped hierarchy, with WebWidgetClient at the root.
+// VS warns when we inherit the WebWidgetClient method implementations from
+// RenderWidget. It's safe to ignore that warning.
+#pragma warning(disable: 4250)
+#endif
+
+class AudioMessageFilter;
+class BlockedPlugin;
+class DeviceOrientationDispatcher;
+class DevToolsAgent;
+class DevToolsClient;
+class DomAutomationController;
+class WebUIBindings;
+class ExternalHostBindings;
+class FilePath;
+class GeolocationDispatcher;
+class GeolocationDispatcherOld;
+class GURL;
+class ListValue;
+class LoadProgressTracker;
+class NavigationState;
+class NotificationProvider;
+class P2PSocketDispatcher;
+class PepperDeviceTest;
+class PrintWebViewHelper;
+class RenderViewObserver;
+class RenderViewVisitor;
+class SearchBox;
+class SkBitmap;
+class SpeechInputDispatcher;
+class SpellCheckProvider;
+class WebPluginDelegatePepper;
+class WebPluginDelegateProxy;
+struct ContextMenuMediaParams;
+struct PP_Flash_NetAddress;
+struct ThumbnailScore;
+struct ViewHostMsg_DomMessage_Params;
+struct ViewHostMsg_GetSearchProviderInstallState_Params;
+struct ViewHostMsg_PageHasOSDD_Type;
+struct ViewHostMsg_RunFileChooser_Params;
+struct ViewMsg_ClosePage_Params;
+struct ViewMsg_ExecuteCode_Params;
+struct ViewMsg_Navigate_Params;
+struct ViewMsg_StopFinding_Params;
+struct WebApplicationInfo;
+struct WebDropData;
+
+namespace base {
+class WaitableEvent;
+}
+
+namespace chrome {
+class ChromeContentRendererClient;
+}
+
+namespace gfx {
+class Point;
+class Rect;
+}
+
+namespace webkit {
+
+namespace npapi {
+class PluginGroup;
+} // namespace npapi
+
+namespace ppapi {
+class FullscreenContainer;
+class PluginInstance;
+class PluginModule;
+} // namespace ppapi
+
+} // namespace webkit
+
+namespace webkit_glue {
+struct CustomContextMenuContext;
+class ImageResourceFetcher;
+struct FileUploadData;
+struct FormData;
+struct PasswordFormFillData;
+class ResourceFetcher;
+}
+
+namespace WebKit {
+class WebAccessibilityCache;
+class WebAccessibilityObject;
+class WebApplicationCacheHost;
+class WebApplicationCacheHostClient;
+class WebDataSource;
+class WebDocument;
+class WebDragData;
+class WebFrame;
+class WebGeolocationClient;
+class WebGeolocationServiceInterface;
+class WebImage;
+class WebInputElement;
+class WebKeyboardEvent;
+class WebMediaPlayer;
+class WebMediaPlayerClient;
+class WebMouseEvent;
+class WebPlugin;
+class WebSpeechInputController;
+class WebSpeechInputListener;
+class WebStorageNamespace;
+class WebTextCheckingCompletion;
+class WebURLRequest;
+class WebView;
+struct WebContextMenuData;
+struct WebFileChooserParams;
+struct WebFindOptions;
+struct WebMediaPlayerAction;
+struct WebPluginParams;
+struct WebPoint;
+struct WebWindowFeatures;
+}
+
+// We need to prevent a page from trying to create infinite popups. It is not
+// as simple as keeping a count of the number of immediate children
+// popups. Having an html file that window.open()s itself would create
+// an unlimited chain of RenderViews who only have one RenderView child.
+//
+// Therefore, each new top level RenderView creates a new counter and shares it
+// with all its children and grandchildren popup RenderViews created with
+// createView() to have a sort of global limit for the page so no more than
+// kMaximumNumberOfPopups popups are created.
+//
+// This is a RefCounted holder of an int because I can't say
+// scoped_refptr<int>.
+typedef base::RefCountedData<int> SharedRenderViewCounter;
+
+//
+// RenderView is an object that manages a WebView object, and provides a
+// communication interface with an embedding application process
+//
+class RenderView : public RenderWidget,
+ public WebKit::WebViewClient,
+ public WebKit::WebFrameClient,
+ public WebKit::WebPageSerializerClient,
+ public webkit::npapi::WebPluginPageDelegate,
+ public base::SupportsWeakPtr<RenderView> {
+ public:
+ // Creates a new RenderView. The parent_hwnd specifies a HWND to use as the
+ // parent of the WebView HWND that will be created. If this is a constrained
+ // popup or as a new tab, opener_id is the routing ID of the RenderView
+ // responsible for creating this RenderView (corresponding to parent_hwnd).
+ // |counter| is either a currently initialized counter, or NULL (in which case
+ // we treat this RenderView as a top level window).
+ static RenderView* Create(
+ RenderThreadBase* render_thread,
+ gfx::NativeViewId parent_hwnd,
+ int32 opener_id,
+ const RendererPreferences& renderer_prefs,
+ const WebPreferences& webkit_prefs,
+ SharedRenderViewCounter* counter,
+ int32 routing_id,
+ int64 session_storage_namespace_id,
+ const string16& frame_name);
+
+ // Visit all RenderViews with a live WebView (i.e., RenderViews that have
+ // been closed but not yet destroyed are excluded).
+ static void ForEach(RenderViewVisitor* visitor);
+
+ // Returns the RenderView containing the given WebView.
+ static RenderView* FromWebView(WebKit::WebView* webview);
+
+ // Sets the "next page id" counter.
+ static void SetNextPageID(int32 next_page_id);
+
+ // May return NULL when the view is closing.
+ WebKit::WebView* webview() const;
+
+ int browser_window_id() const {
+ return browser_window_id_;
+ }
+
+ ViewType::Type view_type() const {
+ return view_type_;
+ }
+
+ int page_id() const {
+ return page_id_;
+ }
+
+ AudioMessageFilter* audio_message_filter() {
+ return audio_message_filter_;
+ }
+
+ const WebPreferences& webkit_preferences() const {
+ return webkit_preferences_;
+ }
+
+ void set_send_content_state_immediately(bool value) {
+ send_content_state_immediately_ = value;
+ }
+
+ // Returns true if we should display scrollbars for the given view size and
+ // false if the scrollbars should be hidden.
+ bool should_display_scrollbars(int width, int height) const {
+ return (!send_preferred_size_changes_ ||
+ (disable_scrollbars_size_limit_.width() <= width ||
+ disable_scrollbars_size_limit_.height() <= height));
+ }
+
+ SearchBox* searchbox() const { return searchbox_; }
+
+ const WebKit::WebNode& context_menu_node() { return context_menu_node_; }
+
+ // Current P2PSocketDispatcher. Set to NULL if P2P API is disabled.
+ P2PSocketDispatcher* p2p_socket_dispatcher() {
+ return p2p_socket_dispatcher_;
+ }
+
+ // Functions to add and remove observers for this object.
+ void AddObserver(RenderViewObserver* observer);
+ void RemoveObserver(RenderViewObserver* observer);
+
+ // Called from JavaScript window.external.AddSearchProvider() to add a
+ // keyword for a provider described in the given OpenSearch document.
+ void AddSearchProvider(const std::string& url,
+ const ViewHostMsg_PageHasOSDD_Type& provider_type);
+
+ // Returns the install state for the given search provider url.
+ ViewHostMsg_GetSearchProviderInstallState_Params
+ GetSearchProviderInstallState(WebKit::WebFrame* frame,
+ const std::string& url);
+
+ // Evaluates a string of JavaScript in a particular frame.
+ void EvaluateScript(const string16& frame_xpath,
+ const string16& jscript,
+ int id,
+ bool notify_result);
+
+ // Adds the given file chooser request to the file_chooser_completion_ queue
+ // (see that var for more) and requests the chooser be displayed if there are
+ // no other waiting items in the queue.
+ //
+ // Returns true if the chooser was successfully scheduled. False means we
+ // didn't schedule anything.
+ bool ScheduleFileChooser(const ViewHostMsg_RunFileChooser_Params& params,
+ WebKit::WebFileChooserCompletion* completion);
+
+ // Called when the translate helper has finished translating the page. We
+ // use this signal to re-scan the page for forms.
+ void OnPageTranslated();
+
+ // Sets the content settings that back allowScripts(), allowImages(), and
+ // allowPlugins().
+ void SetContentSettings(const ContentSettings& settings);
+
+ // Notifies the browser that the given action has been performed. This is
+ // aggregated to the user metrics service.
+ void UserMetricsRecordAction(const std::string& action);
+
+ // Starts installation of the page in the specified frame as a web app. The
+ // page must link to an external 'definition file'. This is different from
+ // the 'application shortcuts' feature where we pull the application
+ // definition out of optional meta tags in the page.
+ bool InstallWebApplicationUsingDefinitionFile(WebKit::WebFrame* frame,
+ string16* error);
+
+ // Sets whether the renderer should report load progress to the browser.
+ void SetReportLoadProgressEnabled(bool enabled);
+
+ // Extensions ----------------------------------------------------------------
+
+ void SendExtensionRequest(const ViewHostMsg_DomMessage_Params& params);
+
+ void OnExtensionResponse(int request_id, bool success,
+ const std::string& response,
+ const std::string& error);
+
+ void OnSetExtensionViewMode(const std::string& mode);
+
+ // Called when the "idle" user script state has been reached. See
+ // UserScript::DOCUMENT_IDLE.
+ void OnUserScriptIdleTriggered(WebKit::WebFrame* frame);
+
+ // Plugin-related functions --------------------------------------------------
+ // (See also WebPluginPageDelegate implementation.)
+
+ // Notification that the given plugin has crashed.
+ void PluginCrashed(const FilePath& plugin_path);
+
+ // Notification that the default plugin has done something about a missing
+ // plugin. See default_plugin_shared.h for possible values of |status|.
+ void OnMissingPluginStatus(WebPluginDelegateProxy* delegate,
+ int status);
+
+ // Creates a fullscreen container for a pepper plugin instance.
+ webkit::ppapi::FullscreenContainer* CreatePepperFullscreenContainer(
+ webkit::ppapi::PluginInstance* plugin);
+
+ // Create a new plugin without checking the content settings.
+ WebKit::WebPlugin* CreatePluginNoCheck(WebKit::WebFrame* frame,
+ const WebKit::WebPluginParams& params);
+
+#if defined(OS_MACOSX)
+ // Informs the render view that the given plugin has gained or lost focus.
+ void PluginFocusChanged(bool focused, int plugin_id);
+
+ // Starts plugin IME.
+ void StartPluginIme();
+
+ // Helper routines for accelerated plugin support. Used by the
+ // WebPluginDelegateProxy, which has a pointer to the RenderView.
+ gfx::PluginWindowHandle AllocateFakePluginWindowHandle(bool opaque,
+ bool root);
+ void DestroyFakePluginWindowHandle(gfx::PluginWindowHandle window);
+ void AcceleratedSurfaceSetIOSurface(gfx::PluginWindowHandle window,
+ int32 width,
+ int32 height,
+ uint64 io_surface_identifier);
+ TransportDIB::Handle AcceleratedSurfaceAllocTransportDIB(size_t size);
+ void AcceleratedSurfaceFreeTransportDIB(TransportDIB::Id dib_id);
+ void AcceleratedSurfaceSetTransportDIB(gfx::PluginWindowHandle window,
+ int32 width,
+ int32 height,
+ TransportDIB::Handle transport_dib);
+ void AcceleratedSurfaceBuffersSwapped(gfx::PluginWindowHandle window,
+ uint64 surface_id);
+#endif
+
+ void RegisterPluginDelegate(WebPluginDelegateProxy* delegate);
+ void UnregisterPluginDelegate(WebPluginDelegateProxy* delegate);
+
+ // IPC::Channel::Listener implementation -------------------------------------
+
+ virtual bool OnMessageReceived(const IPC::Message& msg);
+
+ // WebKit::WebWidgetClient implementation ------------------------------------
+
+ // Most methods are handled by RenderWidget.
+ virtual void didFocus();
+ virtual void didBlur();
+ virtual void show(WebKit::WebNavigationPolicy policy);
+ virtual void runModal();
+
+ // WebKit::WebViewClient implementation --------------------------------------
+
+ virtual WebKit::WebView* createView(
+ WebKit::WebFrame* creator,
+ const WebKit::WebURLRequest& request,
+ const WebKit::WebWindowFeatures& features,
+ const WebKit::WebString& frame_name);
+ virtual WebKit::WebWidget* createPopupMenu(WebKit::WebPopupType popup_type);
+ virtual WebKit::WebWidget* createPopupMenu(
+ const WebKit::WebPopupMenuInfo& info);
+ virtual WebKit::WebExternalPopupMenu* createExternalPopupMenu(
+ const WebKit::WebPopupMenuInfo& popup_menu_info,
+ WebKit::WebExternalPopupMenuClient* popup_menu_client);
+ virtual WebKit::WebStorageNamespace* createSessionStorageNamespace(
+ unsigned quota);
+ virtual void didAddMessageToConsole(
+ const WebKit::WebConsoleMessage& message,
+ const WebKit::WebString& source_name,
+ unsigned source_line);
+ virtual void printPage(WebKit::WebFrame* frame);
+ virtual WebKit::WebNotificationPresenter* notificationPresenter();
+ virtual void didStartLoading();
+ virtual void didStopLoading();
+ virtual void didChangeLoadProgress(WebKit::WebFrame* frame,
+ double load_progress);
+ virtual bool isSmartInsertDeleteEnabled();
+ virtual bool isSelectTrailingWhitespaceEnabled();
+ virtual void didChangeSelection(bool is_selection_empty);
+ virtual void didExecuteCommand(const WebKit::WebString& command_name);
+ virtual bool handleCurrentKeyboardEvent();
+ virtual void spellCheck(const WebKit::WebString& text,
+ int& offset,
+ int& length);
+ virtual void requestCheckingOfText(
+ const WebKit::WebString& text,
+ WebKit::WebTextCheckingCompletion* completion);
+ virtual WebKit::WebString autoCorrectWord(
+ const WebKit::WebString& misspelled_word);
+ virtual void showSpellingUI(bool show);
+ virtual bool isShowingSpellingUI();
+ virtual void updateSpellingUIWithMisspelledWord(
+ const WebKit::WebString& word);
+ virtual void continuousSpellCheckingEnabledStateChanged();
+ virtual bool runFileChooser(
+ const WebKit::WebFileChooserParams& params,
+ WebKit::WebFileChooserCompletion* chooser_completion);
+ virtual void runModalAlertDialog(WebKit::WebFrame* frame,
+ const WebKit::WebString& message);
+ virtual bool runModalConfirmDialog(WebKit::WebFrame* frame,
+ const WebKit::WebString& message);
+ virtual bool runModalPromptDialog(WebKit::WebFrame* frame,
+ const WebKit::WebString& message,
+ const WebKit::WebString& default_value,
+ WebKit::WebString* actual_value);
+ virtual bool runModalBeforeUnloadDialog(WebKit::WebFrame* frame,
+ const WebKit::WebString& message);
+ virtual void showContextMenu(WebKit::WebFrame* frame,
+ const WebKit::WebContextMenuData& data);
+ virtual bool supportsFullscreen();
+ virtual void enterFullscreenForNode(const WebKit::WebNode&);
+ virtual void exitFullscreenForNode(const WebKit::WebNode&);
+ virtual void setStatusText(const WebKit::WebString& text);
+ virtual void setMouseOverURL(const WebKit::WebURL& url);
+ virtual void setKeyboardFocusURL(const WebKit::WebURL& url);
+ virtual void setToolTipText(const WebKit::WebString& text,
+ WebKit::WebTextDirection hint);
+ virtual void startDragging(const WebKit::WebDragData& data,
+ WebKit::WebDragOperationsMask mask,
+ const WebKit::WebImage& image,
+ const WebKit::WebPoint& imageOffset);
+ virtual bool acceptsLoadDrops();
+ virtual void focusNext();
+ virtual void focusPrevious();
+ virtual void focusedNodeChanged(const WebKit::WebNode& node);
+ virtual void navigateBackForwardSoon(int offset);
+ virtual int historyBackListCount();
+ virtual int historyForwardListCount();
+ virtual void postAccessibilityNotification(
+ const WebKit::WebAccessibilityObject& obj,
+ WebKit::WebAccessibilityNotification notification);
+ virtual void didUpdateInspectorSetting(const WebKit::WebString& key,
+ const WebKit::WebString& value);
+ virtual WebKit::WebGeolocationClient* geolocationClient();
+ virtual WebKit::WebSpeechInputController* speechInputController(
+ WebKit::WebSpeechInputListener* listener);
+ virtual WebKit::WebDeviceOrientationClient* deviceOrientationClient();
+ virtual void zoomLimitsChanged(double minimum_level, double maximum_level);
+ virtual void zoomLevelChanged();
+ virtual void registerProtocolHandler(const WebKit::WebString& scheme,
+ const WebKit::WebString& base_url,
+ const WebKit::WebString& url,
+ const WebKit::WebString& title);
+
+ // WebKit::WebFrameClient implementation -------------------------------------
+
+ virtual WebKit::WebPlugin* createPlugin(
+ WebKit::WebFrame* frame,
+ const WebKit::WebPluginParams& params);
+ virtual WebKit::WebWorker* createWorker(WebKit::WebFrame* frame,
+ WebKit::WebWorkerClient* client);
+ virtual WebKit::WebSharedWorker* createSharedWorker(
+ WebKit::WebFrame* frame, const WebKit::WebURL& url,
+ const WebKit::WebString& name, unsigned long long documentId);
+ virtual WebKit::WebMediaPlayer* createMediaPlayer(
+ WebKit::WebFrame* frame,
+ WebKit::WebMediaPlayerClient* client);
+ virtual WebKit::WebApplicationCacheHost* createApplicationCacheHost(
+ WebKit::WebFrame* frame,
+ WebKit::WebApplicationCacheHostClient* client);
+ virtual WebKit::WebCookieJar* cookieJar(WebKit::WebFrame* frame);
+ virtual void frameDetached(WebKit::WebFrame* frame);
+ virtual void willClose(WebKit::WebFrame* frame);
+ virtual bool allowImages(WebKit::WebFrame* frame, bool enabled_per_settings);
+ virtual bool allowPlugins(WebKit::WebFrame* frame, bool enabled_per_settings);
+ virtual void loadURLExternally(WebKit::WebFrame* frame,
+ const WebKit::WebURLRequest& request,
+ WebKit::WebNavigationPolicy policy);
+ virtual WebKit::WebNavigationPolicy decidePolicyForNavigation(
+ WebKit::WebFrame* frame,
+ const WebKit::WebURLRequest& request,
+ WebKit::WebNavigationType type,
+ const WebKit::WebNode&,
+ WebKit::WebNavigationPolicy default_policy,
+ bool is_redirect);
+ virtual bool canHandleRequest(WebKit::WebFrame* frame,
+ const WebKit::WebURLRequest& request);
+ virtual WebKit::WebURLError cannotHandleRequestError(
+ WebKit::WebFrame* frame,
+ const WebKit::WebURLRequest& request);
+ virtual WebKit::WebURLError cancelledError(
+ WebKit::WebFrame* frame,
+ const WebKit::WebURLRequest& request);
+ virtual void unableToImplementPolicyWithError(
+ WebKit::WebFrame* frame,
+ const WebKit::WebURLError& error);
+ virtual void willSendSubmitEvent(WebKit::WebFrame* frame,
+ const WebKit::WebFormElement& form);
+ virtual void willSubmitForm(WebKit::WebFrame* frame,
+ const WebKit::WebFormElement& form);
+ virtual void willPerformClientRedirect(WebKit::WebFrame* frame,
+ const WebKit::WebURL& from,
+ const WebKit::WebURL& to,
+ double interval,
+ double fire_time);
+ virtual void didCancelClientRedirect(WebKit::WebFrame* frame);
+ virtual void didCompleteClientRedirect(WebKit::WebFrame* frame,
+ const WebKit::WebURL& from);
+ virtual void didCreateDataSource(WebKit::WebFrame* frame,
+ WebKit::WebDataSource* datasource);
+ virtual void didStartProvisionalLoad(WebKit::WebFrame* frame);
+ virtual void didReceiveServerRedirectForProvisionalLoad(
+ WebKit::WebFrame* frame);
+ virtual void didFailProvisionalLoad(WebKit::WebFrame* frame,
+ const WebKit::WebURLError& error);
+ virtual void didReceiveDocumentData(WebKit::WebFrame* frame,
+ const char* data, size_t length,
+ bool& prevent_default);
+ virtual void didCommitProvisionalLoad(WebKit::WebFrame* frame,
+ bool is_new_navigation);
+ virtual void didClearWindowObject(WebKit::WebFrame* frame);
+ virtual void didCreateDocumentElement(WebKit::WebFrame* frame);
+ virtual void didReceiveTitle(WebKit::WebFrame* frame,
+ const WebKit::WebString& title);
+ virtual void didChangeIcons(WebKit::WebFrame*);
+ virtual void didFinishDocumentLoad(WebKit::WebFrame* frame);
+ virtual void didHandleOnloadEvents(WebKit::WebFrame* frame);
+ virtual void didFailLoad(WebKit::WebFrame* frame,
+ const WebKit::WebURLError& error);
+ virtual void didFinishLoad(WebKit::WebFrame* frame);
+ virtual void didNavigateWithinPage(WebKit::WebFrame* frame,
+ bool is_new_navigation);
+ virtual void didUpdateCurrentHistoryItem(WebKit::WebFrame* frame);
+ virtual void assignIdentifierToRequest(WebKit::WebFrame* frame,
+ unsigned identifier,
+ const WebKit::WebURLRequest& request);
+ virtual void willSendRequest(WebKit::WebFrame* frame,
+ unsigned identifier,
+ WebKit::WebURLRequest& request,
+ const WebKit::WebURLResponse& redirect_response);
+ virtual void didReceiveResponse(WebKit::WebFrame* frame,
+ unsigned identifier,
+ const WebKit::WebURLResponse& response);
+ virtual void didFinishResourceLoad(WebKit::WebFrame* frame,
+ unsigned identifier);
+ virtual void didFailResourceLoad(WebKit::WebFrame* frame,
+ unsigned identifier,
+ const WebKit::WebURLError& error);
+ virtual void didLoadResourceFromMemoryCache(
+ WebKit::WebFrame* frame,
+ const WebKit::WebURLRequest& request,
+ const WebKit::WebURLResponse&);
+ virtual void didDisplayInsecureContent(WebKit::WebFrame* frame);
+ virtual void didRunInsecureContent(
+ WebKit::WebFrame* frame,
+ const WebKit::WebSecurityOrigin& origin,
+ const WebKit::WebURL& target);
+
+ virtual bool allowScript(WebKit::WebFrame* frame, bool enabled_per_settings);
+ virtual bool allowDatabase(WebKit::WebFrame* frame,
+ const WebKit::WebString& name,
+ const WebKit::WebString& display_name,
+ unsigned long estimated_size);
+ virtual void didNotAllowScript(WebKit::WebFrame* frame);
+ virtual void didNotAllowPlugins(WebKit::WebFrame* frame);
+ virtual void didExhaustMemoryAvailableForScript(WebKit::WebFrame* frame);
+ virtual void didCreateScriptContext(WebKit::WebFrame* frame);
+ virtual void didDestroyScriptContext(WebKit::WebFrame* frame);
+ virtual void didCreateIsolatedScriptContext(WebKit::WebFrame* frame);
+ virtual bool allowScriptExtension(WebKit::WebFrame*,
+ const WebKit::WebString& extension_name,
+ int extensionGroup);
+ virtual void logCrossFramePropertyAccess(
+ WebKit::WebFrame* frame,
+ WebKit::WebFrame* target,
+ bool cross_origin,
+ const WebKit::WebString& property_name,
+ unsigned long long event_id);
+ virtual void didChangeContentsSize(WebKit::WebFrame* frame,
+ const WebKit::WebSize& size);
+ virtual void didChangeScrollOffset(WebKit::WebFrame* frame);
+ virtual void reportFindInPageMatchCount(int request_id,
+ int count,
+ bool final_update);
+ virtual void reportFindInPageSelection(int request_id,
+ int active_match_ordinal,
+ const WebKit::WebRect& sel);
+
+ virtual void openFileSystem(WebKit::WebFrame* frame,
+ WebKit::WebFileSystem::Type type,
+ long long size,
+ bool create,
+ WebKit::WebFileSystemCallbacks* callbacks);
+
+ // WebKit::WebPageSerializerClient implementation ----------------------------
+
+ virtual void didSerializeDataForFrame(const WebKit::WebURL& frame_url,
+ const WebKit::WebCString& data,
+ PageSerializationStatus status);
+
+ // webkit_glue::WebPluginPageDelegate implementation -------------------------
+
+ virtual webkit::npapi::WebPluginDelegate* CreatePluginDelegate(
+ const FilePath& file_path,
+ const std::string& mime_type);
+ virtual void CreatedPluginWindow(gfx::PluginWindowHandle handle);
+ virtual void WillDestroyPluginWindow(gfx::PluginWindowHandle handle);
+ virtual void DidMovePlugin(const webkit::npapi::WebPluginGeometry& move);
+ virtual void DidStartLoadingForPlugin();
+ virtual void DidStopLoadingForPlugin();
+ virtual WebKit::WebCookieJar* GetCookieJar();
+
+ // Please do not add your stuff randomly to the end here. If there is an
+ // appropriate section, add it there. If not, there are some random functions
+ // nearer to the top you can add it to.
+
+ virtual void DidFlushPaint();
+
+ protected:
+ // RenderWidget overrides:
+ virtual void Close();
+ virtual void OnResize(const gfx::Size& new_size,
+ const gfx::Rect& resizer_rect);
+ virtual void DidInitiatePaint();
+ virtual webkit::ppapi::PluginInstance* GetBitmapForOptimizedPluginPaint(
+ const gfx::Rect& paint_bounds,
+ TransportDIB** dib,
+ gfx::Rect* location,
+ gfx::Rect* clip);
+ virtual gfx::Point GetScrollOffset();
+ virtual void DidHandleKeyEvent();
+ virtual void DidHandleMouseEvent(const WebKit::WebMouseEvent& event);
+ virtual void OnSetFocus(bool enable);
+ virtual void OnWasHidden();
+ virtual void OnWasRestored(bool needs_repainting);
+
+ private:
+ // TODO(jam): temporary friend class to ease with the file move. Remove soon.
+ friend class chrome::ChromeContentRendererClient;
+
+ // For unit tests.
+ friend class ExternalPopupMenuTest;
+ friend class PepperDeviceTest;
+ friend class RenderViewTest;
+
+ FRIEND_TEST_ALL_PREFIXES(ExternalPopupMenuRemoveTest, RemoveOnChange);
+ FRIEND_TEST_ALL_PREFIXES(ExternalPopupMenuTest, NormalCase);
+ FRIEND_TEST_ALL_PREFIXES(ExternalPopupMenuTest, ShowPopupThenNavigate);
+ FRIEND_TEST_ALL_PREFIXES(RenderViewTest, BlockScriptInitiatedPrinting);
+ FRIEND_TEST_ALL_PREFIXES(RenderViewTest, ImeComposition);
+ FRIEND_TEST_ALL_PREFIXES(RenderViewTest, InsertCharacters);
+ FRIEND_TEST_ALL_PREFIXES(RenderViewTest, JSBlockSentAfterPageLoad);
+ FRIEND_TEST_ALL_PREFIXES(RenderViewTest, LastCommittedUpdateState);
+ FRIEND_TEST_ALL_PREFIXES(RenderViewTest, OnHandleKeyboardEvent);
+ FRIEND_TEST_ALL_PREFIXES(RenderViewTest, OnImeStateChanged);
+ FRIEND_TEST_ALL_PREFIXES(RenderViewTest, OnNavStateChanged);
+ FRIEND_TEST_ALL_PREFIXES(RenderViewTest, OnPrintPages);
+ FRIEND_TEST_ALL_PREFIXES(RenderViewTest, OnSetTextDirection);
+ FRIEND_TEST_ALL_PREFIXES(RenderViewTest, PrintLayoutTest);
+ FRIEND_TEST_ALL_PREFIXES(RenderViewTest, PrintWithIframe);
+ FRIEND_TEST_ALL_PREFIXES(RenderViewTest, UpdateTargetURLWithInvalidURL);
+#if defined(OS_MACOSX)
+ FRIEND_TEST_ALL_PREFIXES(RenderViewTest, MacTestCmdUp);
+#endif
+
+ typedef std::map<GURL, ContentSettings> HostContentSettings;
+ typedef std::map<GURL, double> HostZoomLevels;
+
+ // Cannot use std::set unfortunately since linked_ptr<> does not support
+ // operator<.
+ typedef std::vector<linked_ptr<webkit_glue::ImageResourceFetcher> >
+ ImageResourceFetcherList;
+
+ // Identifies an accessibility notification from webkit.
+ struct RendererAccessibilityNotification {
+ public:
+ bool ShouldIncludeChildren();
+
+ // The webkit glue id of the accessibility object.
+ int32 id;
+
+ // The accessibility notification type.
+ WebKit::WebAccessibilityNotification type;
+ };
+
+ enum ErrorPageType {
+ DNS_ERROR,
+ HTTP_404,
+ CONNECTION_ERROR,
+ };
+
+ RenderView(RenderThreadBase* render_thread,
+ gfx::NativeViewId parent_hwnd,
+ int32 opener_id,
+ const RendererPreferences& renderer_prefs,
+ const WebPreferences& webkit_prefs,
+ SharedRenderViewCounter* counter,
+ int32 routing_id,
+ int64 session_storage_namespace_id,
+ const string16& frame_name);
+
+ // Do not delete directly. This class is reference counted.
+ virtual ~RenderView();
+
+ void UpdateURL(WebKit::WebFrame* frame);
+ void UpdateTitle(WebKit::WebFrame* frame, const string16& title);
+ void UpdateSessionHistory(WebKit::WebFrame* frame);
+
+ // Update current main frame's encoding and send it to browser window.
+ // Since we want to let users see the right encoding info from menu
+ // before finishing loading, we call the UpdateEncoding in
+ // a) function:DidCommitLoadForFrame. When this function is called,
+ // that means we have got first data. In here we try to get encoding
+ // of page if it has been specified in http header.
+ // b) function:DidReceiveTitle. When this function is called,
+ // that means we have got specified title. Because in most of webpages,
+ // title tags will follow meta tags. In here we try to get encoding of
+ // page if it has been specified in meta tag.
+ // c) function:DidFinishDocumentLoadForFrame. When this function is
+ // called, that means we have got whole html page. In here we should
+ // finally get right encoding of page.
+ void UpdateEncoding(WebKit::WebFrame* frame,
+ const std::string& encoding_name);
+
+ void OpenURL(const GURL& url, const GURL& referrer,
+ WebKit::WebNavigationPolicy policy);
+
+ // Captures the thumbnail and text contents for indexing for the given load
+ // ID. If the view's load ID is different than the parameter, this call is
+ // a NOP. Typically called on a timer, so the load ID may have changed in the
+ // meantime.
+ void CapturePageInfo(int load_id, bool preliminary_capture);
+
+ // Retrieves the text from the given frame contents, the page text up to the
+ // maximum amount kMaxIndexChars will be placed into the given buffer.
+ void CaptureText(WebKit::WebFrame* frame, string16* contents);
+
+ // Creates a thumbnail of |frame|'s contents resized to (|w|, |h|)
+ // and puts that in |thumbnail|. Thumbnail metadata goes in |score|.
+ bool CaptureThumbnail(WebKit::WebView* view, int w, int h,
+ SkBitmap* thumbnail,
+ ThumbnailScore* score);
+
+ // Capture a snapshot of a view. This is used to allow an extension
+ // to get a snapshot of a tab using chrome.tabs.captureVisibleTab().
+ bool CaptureSnapshot(WebKit::WebView* view, SkBitmap* snapshot);
+
+ bool RunJavaScriptMessage(int type,
+ const std::wstring& message,
+ const std::wstring& default_value,
+ const GURL& frame_url,
+ std::wstring* result);
+
+ // Sends a message and runs a nested message loop.
+ bool SendAndRunNestedMessageLoop(IPC::SyncMessage* message);
+
+ // Adds search provider from the given OpenSearch description URL as a
+ // keyword search.
+ void AddGURLSearchProvider(const GURL& osd_url,
+ const ViewHostMsg_PageHasOSDD_Type& provider_type);
+
+ // Send queued accessibility notifications from the renderer to the browser.
+ void SendPendingAccessibilityNotifications();
+
+ // IPC message handlers ------------------------------------------------------
+ //
+ // The documentation for these functions should be in
+ // render_messages_internal.h for the message that the function is handling.
+
+ void OnAccessibilityDoDefaultAction(int acc_obj_id);
+ void OnAccessibilityNotificationsAck();
+ void OnAllowBindings(int enabled_bindings_flags);
+ void OnAddMessageToConsole(const string16& frame_xpath,
+ const string16& message,
+ const WebKit::WebConsoleMessage::Level&);
+ void OnAdvanceToNextMisspelling();
+ void OnAllowScriptToClose(bool script_can_close);
+ void OnAsyncFileOpened(base::PlatformFileError error_code,
+ IPC::PlatformFileForTransit file_for_transit,
+ int message_id);
+ void OnCancelDownload(int32 download_id);
+ void OnClearFocusedNode();
+ void OnClosePage(const ViewMsg_ClosePage_Params& params);
+#if defined(ENABLE_FLAPPER_HACKS)
+ void OnConnectTcpACK(int request_id,
+ IPC::PlatformFileForTransit socket_for_transit,
+ const PP_Flash_NetAddress& local_addr,
+ const PP_Flash_NetAddress& remote_addr);
+#endif
+ void OnContextMenuClosed(
+ const webkit_glue::CustomContextMenuContext& custom_context);
+ void OnCopy();
+ void OnCopyImageAt(int x, int y);
+#if defined(OS_MACOSX)
+ void OnCopyToFindPboard();
+#endif
+ void OnCut();
+ void OnCaptureThumbnail();
+ void OnCaptureSnapshot();
+ void OnCSSInsertRequest(const std::wstring& frame_xpath,
+ const std::string& css,
+ const std::string& id);
+ void OnCustomContextMenuAction(
+ const webkit_glue::CustomContextMenuContext& custom_context,
+ unsigned action);
+ void OnDelete();
+ void OnDeterminePageLanguage();
+ void OnDisableScrollbarsForSmallWindows(
+ const gfx::Size& disable_scrollbars_size_limit);
+ void OnDisassociateFromPopupCount();
+ void OnDownloadFavicon(int id, const GURL& image_url, int image_size);
+ void OnDragSourceEndedOrMoved(const gfx::Point& client_point,
+ const gfx::Point& screen_point,
+ bool ended,
+ WebKit::WebDragOperation drag_operation);
+ void OnDragSourceSystemDragEnded();
+ void OnDragTargetDrop(const gfx::Point& client_pt,
+ const gfx::Point& screen_pt);
+ void OnDragTargetDragEnter(const WebDropData& drop_data,
+ const gfx::Point& client_pt,
+ const gfx::Point& screen_pt,
+ WebKit::WebDragOperationsMask operations_allowed);
+ void OnDragTargetDragLeave();
+ void OnDragTargetDragOver(const gfx::Point& client_pt,
+ const gfx::Point& screen_pt,
+ WebKit::WebDragOperationsMask operations_allowed);
+ void OnEnablePreferredSizeChangedMode(int flags);
+ void OnEnableViewSourceMode();
+ void OnExecuteCode(const ViewMsg_ExecuteCode_Params& params);
+ void OnExecuteEditCommand(const std::string& name, const std::string& value);
+ void OnExtensionMessageInvoke(const std::string& extension_id,
+ const std::string& function_name,
+ const ListValue& args,
+ const GURL& event_url);
+ void OnFileChooserResponse(const std::vector<FilePath>& paths);
+ void OnFind(int request_id, const string16&, const WebKit::WebFindOptions&);
+ void OnFindReplyAck();
+ void OnEnableAccessibility();
+ void OnGetAllSavableResourceLinksForCurrentPage(const GURL& page_url);
+ void OnGetApplicationInfo(int page_id);
+ void OnGetSerializedHtmlDataForCurrentPageWithLocalLinks(
+ const std::vector<GURL>& links,
+ const std::vector<FilePath>& local_paths,
+ const FilePath& local_directory_name);
+ void OnHandleMessageFromExternalHost(const std::string& message,
+ const std::string& origin,
+ const std::string& target);
+ void OnInstallMissingPlugin();
+ void OnDisplayPrerenderedPage();
+ void OnMediaPlayerActionAt(const gfx::Point& location,
+ const WebKit::WebMediaPlayerAction& action);
+ void OnMoveOrResizeStarted();
+ void OnNavigate(const ViewMsg_Navigate_Params& params);
+ void OnNetworkStateChanged(bool online);
+ void OnNotifyRendererViewType(ViewType::Type view_type);
+ void OnPaste();
+#if defined(OS_MACOSX)
+ void OnPluginImeCompositionCompleted(const string16& text, int plugin_id);
+#endif
+ void OnRedo();
+ void OnReloadFrame();
+ void OnReplace(const string16& text);
+ void OnReservePageIDRange(int size_of_range);
+ void OnResetPageEncodingToDefault();
+ void OnScriptEvalRequest(const string16& frame_xpath,
+ const string16& jscript,
+ int id,
+ bool notify_result);
+ void OnSelectAll();
+ void OnSetAccessibilityFocus(int acc_obj_id);
+ void OnSetActive(bool active);
+ void OnSetAltErrorPageURL(const GURL& gurl);
+ void OnSetBackground(const SkBitmap& background);
+ void OnSetContentSettingsForLoadingURL(
+ const GURL& url,
+ const ContentSettings& content_settings);
+ void OnSetWebUIProperty(const std::string& name, const std::string& value);
+ void OnSetEditCommandsForNextKeyEvent(const EditCommands& edit_commands);
+ void OnSetInitialFocus(bool reverse);
+ void OnScrollFocusedEditableNodeIntoView();
+ void OnSetPageEncoding(const std::string& encoding_name);
+ void OnSetRendererPrefs(const RendererPreferences& renderer_prefs);
+ void OnSetupDevToolsClient();
+#if defined(OS_MACOSX)
+ void OnSetWindowVisibility(bool visible);
+#endif
+ void OnSetZoomLevel(double zoom_level);
+ void OnSetZoomLevelForLoadingURL(const GURL& url, double zoom_level);
+ void OnShouldClose();
+ void OnStop();
+ void OnStopFinding(const ViewMsg_StopFinding_Params& params);
+ void OnThemeChanged();
+ void OnToggleSpellCheck();
+ void OnToggleSpellPanel(bool is_currently_visible);
+ void OnUndo();
+ void OnUpdateBrowserWindowId(int window_id);
+ void OnUpdateTargetURLAck();
+ void OnUpdateWebPreferences(const WebPreferences& prefs);
+#if defined(OS_MACOSX)
+ void OnWindowFrameChanged(const gfx::Rect& window_frame,
+ const gfx::Rect& view_frame);
+ void OnSelectPopupMenuItem(int selected_index);
+#endif
+ void OnZoom(PageZoom::Function function);
+ void OnJavaScriptStressTestControl(int cmd, int param);
+
+ // Adding a new message handler? Please add it in alphabetical order above
+ // and put it in the same position in the .cc file.
+
+ // Misc private functions ----------------------------------------------------
+
+ // Helper method that returns if the user wants to block content of type
+ // |content_type|.
+ bool AllowContentType(ContentSettingsType settings_type);
+
+ void AltErrorPageFinished(WebKit::WebFrame* frame,
+ const WebKit::WebURLError& original_error,
+ const std::string& html);
+
+ // Exposes the DOMAutomationController object that allows JS to send
+ // information to the browser process.
+ void BindDOMAutomationController(WebKit::WebFrame* webframe);
+
+ // Check whether the preferred size has changed. This is called periodically
+ // by preferred_size_change_timer_.
+ void CheckPreferredSize();
+
+ // Resets the |content_blocked_| array.
+ void ClearBlockedContentSettings();
+
+ // Creates DevToolsClient and sets up JavaScript bindings for developer tools
+ // UI that is going to be hosted by this RenderView.
+ void CreateDevToolsClient();
+
+ // Create a new NPAPI plugin.
+ WebKit::WebPlugin* CreateNPAPIPlugin(WebKit::WebFrame* frame,
+ const WebKit::WebPluginParams& params,
+ const FilePath& path,
+ const std::string& mime_type);
+
+ // Create a new Pepper plugin.
+ WebKit::WebPlugin* CreatePepperPlugin(
+ WebKit::WebFrame* frame,
+ const WebKit::WebPluginParams& params,
+ const FilePath& path,
+ webkit::ppapi::PluginModule* pepper_module);
+
+ // Sends an IPC notification that the specified content type was blocked.
+ // If the content type requires it, |resource_identifier| names the specific
+ // resource that was blocked (the plugin path in the case of plugins),
+ // otherwise it's the empty string.
+ void DidBlockContentType(ContentSettingsType settings_type,
+ const std::string& resource_identifier);
+
+ // This callback is triggered when DownloadImage completes, either
+ // succesfully or with a failure. See DownloadImage for more details.
+ void DidDownloadImage(webkit_glue::ImageResourceFetcher* fetcher,
+ const SkBitmap& image);
+
+ // Callback triggered when we finish downloading the application definition
+ // file.
+ void DidDownloadApplicationDefinition(const WebKit::WebURLResponse& response,
+ const std::string& data);
+
+ // Callback triggered after each icon referenced by the application definition
+ // is downloaded.
+ void DidDownloadApplicationIcon(webkit_glue::ImageResourceFetcher* fetcher,
+ const SkBitmap& image);
+
+ // Requests to download an image. When done, the RenderView is
+ // notified by way of DidDownloadImage. Returns true if the request was
+ // successfully started, false otherwise. id is used to uniquely identify the
+ // request and passed back to the DidDownloadImage method. If the image has
+ // multiple frames, the frame whose size is image_size is returned. If the
+ // image doesn't have a frame at the specified size, the first is returned.
+ bool DownloadImage(int id, const GURL& image_url, int image_size);
+
+ // Initializes the document_tag_ member if necessary.
+ void EnsureDocumentTag();
+
+ // Backend for the IPC Message ExecuteCode in addition to being used
+ // internally by other RenderView functions.
+ void ExecuteCodeImpl(WebKit::WebFrame* frame,
+ const ViewMsg_ExecuteCode_Params& params);
+
+ // Get all child frames of parent_frame, returned by frames_vector.
+ bool GetAllChildFrames(WebKit::WebFrame* parent_frame,
+ std::vector<WebKit::WebFrame* >* frames_vector) const;
+
+ GURL GetAlternateErrorPageURL(const GURL& failed_url,
+ ErrorPageType error_type);
+
+ // Locates a sub frame with given xpath
+ WebKit::WebFrame* GetChildFrame(const std::wstring& frame_xpath) const;
+
+ // Gets the focused node. If no such node exists then the node will be isNull.
+ WebKit::WebNode GetFocusedNode() const;
+
+ WebUIBindings* GetWebUIBindings();
+
+ ExternalHostBindings* GetExternalHostBindings();
+
+ // Should only be called if this object wraps a PluginDocument.
+ WebKit::WebPlugin* GetWebPluginFromPluginDocument();
+
+ // Decodes a data: URL image or returns an empty image in case of failure.
+ SkBitmap ImageFromDataUrl(const GURL&) const;
+
+ // Inserts a string of CSS in a particular frame. |id| can be specified to
+ // give the CSS style element an id, and (if specified) will replace the
+ // element with the same id.
+ void InsertCSS(const std::wstring& frame_xpath,
+ const std::string& css,
+ const std::string& id);
+
+ // Returns false unless this is a top-level navigation that crosses origins.
+ bool IsNonLocalTopLevelNavigation(const GURL& url,
+ WebKit::WebFrame* frame,
+ WebKit::WebNavigationType type);
+
+ void LoadNavigationErrorPage(WebKit::WebFrame* frame,
+ const WebKit::WebURLRequest& failed_request,
+ const WebKit::WebURLError& error,
+ const std::string& html,
+ bool replace);
+
+ bool MaybeLoadAlternateErrorPage(WebKit::WebFrame* frame,
+ const WebKit::WebURLError& error,
+ bool replace);
+
+ // Starts nav_state_sync_timer_ if it isn't already running.
+ void StartNavStateSyncTimerIfNecessary();
+
+ // Dispatches the current navigation state to the browser. Called on a
+ // periodic timer so we don't send too many messages.
+ void SyncNavigationState();
+
+#if defined(OS_LINUX)
+ void UpdateFontRenderingFromRendererPrefs();
+#else
+ void UpdateFontRenderingFromRendererPrefs() {}
+#endif
+
+ // Update the target url and tell the browser that the target URL has changed.
+ // If |url| is empty, show |fallback_url|.
+ void UpdateTargetURL(const GURL& url, const GURL& fallback_url);
+
+ // Updates the state of the toggle spell check command in the browser process.
+ void UpdateToggleSpellCheckCommandState();
+
+ // Helper to add an error message to the root frame's console.
+ void AddErrorToRootConsole(const string16& message);
+
+ // ---------------------------------------------------------------------------
+ // ADDING NEW FUNCTIONS? Please keep private functions alphabetized and put
+ // it in the same order in the .cc file as it was in the header.
+ // ---------------------------------------------------------------------------
+
+ // Settings ------------------------------------------------------------------
+
+ WebPreferences webkit_preferences_;
+ RendererPreferences renderer_preferences_;
+
+ HostContentSettings host_content_settings_;
+ HostZoomLevels host_zoom_levels_;
+
+ // Whether content state (such as form state, scroll position and page
+ // contents) should be sent to the browser immediately. This is normally
+ // false, but set to true by some tests.
+ bool send_content_state_immediately_;
+
+ // Stores if loading of images, scripts, and plugins is allowed.
+ ContentSettings current_content_settings_;
+
+ // Bitwise-ORed set of extra bindings that have been enabled. See
+ // BindingsPolicy for details.
+ int enabled_bindings_;
+
+ // The alternate error page URL, if one exists.
+ GURL alternate_error_page_url_;
+
+ // If true, we send IPC messages when |preferred_size_| changes.
+ bool send_preferred_size_changes_;
+
+ // If non-empty, and |send_preferred_size_changes_| is true, disable drawing
+ // scroll bars on windows smaller than this size. Used for windows that the
+ // browser resizes to the size of the content, such as browser action popups.
+ // If a render view is set to the minimum size of its content, webkit may add
+ // scroll bars. This makes sense for fixed sized windows, but it does not
+ // make sense when the size of the view was chosen to fit the content.
+ // This setting ensures that no scroll bars are drawn. The size limit exists
+ // because if the view grows beyond a size known to the browser, scroll bars
+ // should be drawn.
+ gfx::Size disable_scrollbars_size_limit_;
+
+ // We need to prevent windows from closing themselves with a window.close()
+ // call while a blocked popup notification is being displayed. We cannot
+ // synchronously query the Browser process. We cannot wait for the Browser
+ // process to send a message to us saying that a blocked popup notification
+ // is being displayed. We instead assume that when we create a window off
+ // this RenderView, that it is going to be blocked until we get a message
+ // from the Browser process telling us otherwise.
+ bool script_can_close_;
+
+ // Loading state -------------------------------------------------------------
+
+ // True if the top level frame is currently being loaded.
+ bool is_loading_;
+
+ // The gesture that initiated the current navigation.
+ NavigationGesture navigation_gesture_;
+
+ // Used for popups.
+ bool opened_by_user_gesture_;
+ GURL creator_url_;
+
+ // Whether this RenderView was created by a frame that was suppressing its
+ // opener. If so, we may want to load pages in a separate process. See
+ // decidePolicyForNavigation for details.
+ bool opener_suppressed_;
+
+ // If we are handling a top-level client-side redirect, this tracks the URL
+ // of the page that initiated it. Specifically, when a load is committed this
+ // is used to determine if that load originated from a client-side redirect.
+ // It is empty if there is no top-level client-side redirect.
+ GURL completed_client_redirect_src_;
+
+ // Stores if images, scripts, and plugins have actually been blocked.
+ bool content_blocked_[CONTENT_SETTINGS_NUM_TYPES];
+
+ // Holds state pertaining to a navigation that we initiated. This is held by
+ // the WebDataSource::ExtraData attribute. We use pending_navigation_state_
+ // as a temporary holder for the state until the WebDataSource corresponding
+ // to the new navigation is created. See DidCreateDataSource.
+ scoped_ptr<NavigationState> pending_navigation_state_;
+
+ // Timer used to delay the updating of nav state (see SyncNavigationState).
+ base::OneShotTimer<RenderView> nav_state_sync_timer_;
+
+ // True if the RenderView is currently prerendering a page.
+ bool is_prerendering_;
+
+ // Page IDs ------------------------------------------------------------------
+ //
+ // Page IDs allow the browser to identify pages in each renderer process for
+ // keeping back/forward history in sync.
+
+ // ID of the current page. Note that this is NOT updated for every main
+ // frame navigation, only for "regular" navigations that go into session
+ // history. In particular, client redirects, like the page cycler uses
+ // (document.location.href="foo") do not count as regular navigations and do
+ // not increment the page id.
+ int32 page_id_;
+
+ // Indicates the ID of the last page that we sent a FrameNavigate to the
+ // browser for. This is used to determine if the most recent transition
+ // generated a history entry (less than page_id_), or not (equal to or
+ // greater than). Note that this will be greater than page_id_ if the user
+ // goes back.
+ int32 last_page_id_sent_to_browser_;
+
+ // Page_id from the last page we indexed. This prevents us from indexing the
+ // same page twice in a row.
+ int32 last_indexed_page_id_;
+
+ // The next available page ID to use. This ensures that the page IDs are
+ // globally unique in the renderer.
+ static int32 next_page_id_;
+
+ // Page info -----------------------------------------------------------------
+
+ // The last gotten main frame's encoding.
+ std::string last_encoding_name_;
+
+ int history_list_offset_;
+ int history_list_length_;
+
+ // True if the page has any frame-level unload or beforeunload listeners.
+ bool has_unload_listener_;
+
+#if defined(OS_MACOSX)
+ // True if the current RenderView has been assigned a document tag.
+ bool has_document_tag_;
+#endif
+
+ int document_tag_;
+
+ // UI state ------------------------------------------------------------------
+
+ // The state of our target_url transmissions. When we receive a request to
+ // send a URL to the browser, we set this to TARGET_INFLIGHT until an ACK
+ // comes back - if a new request comes in before the ACK, we store the new
+ // URL in pending_target_url_ and set the status to TARGET_PENDING. If an
+ // ACK comes back and we are in TARGET_PENDING, we send the stored URL and
+ // revert to TARGET_INFLIGHT.
+ //
+ // We don't need a queue of URLs to send, as only the latest is useful.
+ enum {
+ TARGET_NONE,
+ TARGET_INFLIGHT, // We have a request in-flight, waiting for an ACK
+ TARGET_PENDING // INFLIGHT + we have a URL waiting to be sent
+ } target_url_status_;
+
+ // The URL we show the user in the status bar. We use this to determine if we
+ // want to send a new one (we do not need to send duplicates). It will be
+ // equal to either |mouse_over_url_| or |focus_url_|, depending on which was
+ // updated last.
+ GURL target_url_;
+
+ // The URL the user's mouse is hovering over.
+ GURL mouse_over_url_;
+
+ // The URL that has keyboard focus.
+ GURL focus_url_;
+
+ // The next target URL we want to send to the browser.
+ GURL pending_target_url_;
+
+ // True if the browser is showing the spelling panel for us.
+ bool spelling_panel_visible_;
+
+ // The text selection the last time DidChangeSelection got called.
+ std::string last_selection_;
+
+ // View ----------------------------------------------------------------------
+
+ // Type of view attached with RenderView. See view_types.h
+ ViewType::Type view_type_;
+
+ // Id number of browser window which RenderView is attached to. This is used
+ // for extensions.
+ int browser_window_id_;
+
+ // Cache the preferred size of the page in order to prevent sending the IPC
+ // when layout() recomputes but doesn't actually change sizes.
+ gfx::Size preferred_size_;
+
+ // Nasty hack. WebKit does not send us events when the preferred size changes,
+ // so we must poll it. See also:
+ // https://bugs.webkit.org/show_bug.cgi?id=32807.
+ base::RepeatingTimer<RenderView> preferred_size_change_timer_;
+
+#if defined(OS_MACOSX)
+ // Track the fake plugin window handles allocated on the browser side for
+ // the accelerated compositor and (currently) accelerated plugins so that
+ // we can discard them when the view goes away.
+ std::set<gfx::PluginWindowHandle> fake_plugin_window_handles_;
+#endif
+
+ // Plugins -------------------------------------------------------------------
+
+ // Remember the first uninstalled plugin, so that we can ask the plugin
+ // to install itself when user clicks on the info bar.
+ base::WeakPtr<webkit::npapi::WebPluginDelegate> first_default_plugin_;
+
+ PepperPluginDelegateImpl pepper_delegate_;
+
+ // All the currently active plugin delegates for this RenderView; kept so that
+ // we can enumerate them to send updates about things like window location
+ // or tab focus and visibily. These are non-owning references.
+ std::set<WebPluginDelegateProxy*> plugin_delegates_;
+
+ // Helper objects ------------------------------------------------------------
+
+ ScopedRunnableMethodFactory<RenderView> page_info_method_factory_;
+ ScopedRunnableMethodFactory<RenderView> accessibility_method_factory_;
+
+ RendererWebCookieJarImpl cookie_jar_;
+
+ // The next group of objects all implement RenderViewObserver, so are deleted
+ // along with the RenderView automatically. This is why we just store weak
+ // references.
+
+ // Provides access to this renderer from the remote Inspector UI.
+ DevToolsAgent* devtools_agent_;
+
+ // DevToolsClient for renderer hosting developer tools UI. It's NULL for other
+ // render views.
+ DevToolsClient* devtools_client_;
+
+ // Holds a reference to the service which provides desktop notifications.
+ NotificationProvider* notification_provider_;
+
+ // The geolocation dispatcher attached to this view, lazily initialized.
+ GeolocationDispatcher* geolocation_dispatcher_;
+
+ // The speech dispatcher attached to this view, lazily initialized.
+ SpeechInputDispatcher* speech_input_dispatcher_;
+
+ // Device orientation dispatcher attached to this view; lazily initialized.
+ DeviceOrientationDispatcher* device_orientation_dispatcher_;
+
+ // PrintWebViewHelper handles printing. Weak pointer since it implements
+ // RenderViewObserver interface.
+ PrintWebViewHelper* print_helper_;
+
+ // Weak pointer since it implements RenderViewObserver interface.
+ SearchBox* searchbox_;
+
+ // spellcheck provider which is registered as a view observer.
+ // Note that RenderViewObserver subclasses like this will be deleted
+ // automatically during RenderView destruction.
+ SpellCheckProvider* spellcheck_provider_;
+
+ scoped_refptr<AudioMessageFilter> audio_message_filter_;
+
+ // Handles accessibility requests into the renderer side, as well as
+ // maintains the cache and other features of the accessibility tree.
+ scoped_ptr<WebKit::WebAccessibilityCache> accessibility_;
+
+ // Collect renderer accessibility notifications until they are ready to be
+ // sent to the browser.
+ std::vector<RendererAccessibilityNotification>
+ pending_accessibility_notifications_;
+
+ // Set if we are waiting for a accessibility notification ack.
+ bool accessibility_ack_pending_;
+
+ // Responsible for sending page load related histograms.
+ PageLoadHistograms page_load_histograms_;
+
+ // Dispatches all P2P socket used by the renderer.
+ P2PSocketDispatcher* p2p_socket_dispatcher_;
+
+ // Misc ----------------------------------------------------------------------
+
+ // The current and pending file chooser completion objects. If the queue is
+ // nonempty, the first item represents the currently running file chooser
+ // callback, and the remaining elements are the other file chooser completion
+ // still waiting to be run (in order).
+ struct PendingFileChooser;
+ std::deque< linked_ptr<PendingFileChooser> > file_chooser_completions_;
+
+ std::queue<linked_ptr<ViewMsg_ExecuteCode_Params> >
+ pending_code_execution_queue_;
+
+ // ImageResourceFetchers schedule via DownloadImage.
+ ImageResourceFetcherList image_fetchers_;
+
+ // The app info that we are processing. This is used when installing an app
+ // via application definition. The in-progress web app is stored here while
+ // its manifest and icons are downloaded.
+ scoped_ptr<WebApplicationInfo> pending_app_info_;
+
+ // Used to download the application definition file.
+ scoped_ptr<webkit_glue::ResourceFetcher> app_definition_fetcher_;
+
+ // Used to download the icons for an application.
+ ImageResourceFetcherList app_icon_fetchers_;
+
+ // The number of app icon requests outstanding. When this reaches zero, we're
+ // done processing an app definition file.
+ int pending_app_icon_requests_;
+
+ // The SessionStorage namespace that we're assigned to has an ID, and that ID
+ // is passed to us upon creation. WebKit asks for this ID upon first use and
+ // uses it whenever asking the browser process to allocate new storage areas.
+ int64 session_storage_namespace_id_;
+
+ // The total number of unrequested popups that exist and can be followed back
+ // to a common opener. This count is shared among all RenderViews created
+ // with createView(). All popups are treated as unrequested until
+ // specifically instructed otherwise by the Browser process.
+ scoped_refptr<SharedRenderViewCounter> shared_popup_counter_;
+
+ // Whether this is a top level window (instead of a popup). Top level windows
+ // shouldn't count against their own |shared_popup_counter_|.
+ bool decrement_shared_popup_at_destruction_;
+
+ // If the browser hasn't sent us an ACK for the last FindReply we sent
+ // to it, then we need to queue up the message (keeping only the most
+ // recent message if new ones come in).
+ scoped_ptr<IPC::Message> queued_find_reply_message_;
+
+ // Stores edit commands associated to the next key event.
+ // Shall be cleared as soon as the next key event is processed.
+ EditCommands edit_commands_;
+
+ // Allows JS to access DOM automation. The JS object is only exposed when the
+ // DOM automation bindings are enabled.
+ scoped_ptr<DomAutomationController> dom_automation_controller_;
+
+ // Allows Web UI pages (new tab page, etc.) to talk to the browser. The JS
+ // object is only exposed when Web UI bindings are enabled.
+ scoped_ptr<WebUIBindings> web_ui_bindings_;
+
+ // External host exposed through automation controller.
+ scoped_ptr<ExternalHostBindings> external_host_bindings_;
+
+ // The external popup for the currently showing select popup.
+ scoped_ptr<ExternalPopupMenu> external_popup_menu_;
+
+ // The node that the context menu was pressed over.
+ WebKit::WebNode context_menu_node_;
+
+ // Reports load progress to the browser.
+ scoped_ptr<LoadProgressTracker> load_progress_tracker_;
+
+ // All the registered observers. We expect this list to be small, so vector
+ // is fine.
+ ObserverList<RenderViewObserver> observers_;
+
+ // ---------------------------------------------------------------------------
+ // ADDING NEW DATA? Please see if it fits appropriately in one of the above
+ // sections rather than throwing it randomly at the end. If you're adding a
+ // bunch of stuff, you should probably create a helper class and put your
+ // data and methods on that to avoid bloating RenderView more. You can use
+ // the Observer interface to filter IPC messages and receive frame change
+ // notifications.
+ // ---------------------------------------------------------------------------
+
+ DISALLOW_COPY_AND_ASSIGN(RenderView);
+};
+
+#endif // CONTENT_RENDERER_RENDER_VIEW_H_