// Copyright (c) 2010 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "chrome/renderer/renderer_webkitclient_impl.h" #if defined(USE_SYSTEM_SQLITE) #include #else #include "third_party/sqlite/preprocessed/sqlite3.h" #endif #include "base/command_line.h" #include "base/file_path.h" #include "base/platform_file.h" #include "base/shared_memory.h" #include "chrome/common/chrome_switches.h" #include "chrome/common/database_util.h" #include "chrome/common/render_messages.h" #include "chrome/common/webmessageportchannel_impl.h" #include "chrome/plugin/npobject_util.h" #include "chrome/renderer/net/renderer_net_predictor.h" #include "chrome/renderer/render_thread.h" #include "chrome/renderer/render_view.h" #include "chrome/renderer/renderer_webindexeddatabase_impl.h" #include "chrome/renderer/renderer_webstoragenamespace_impl.h" #include "chrome/renderer/visitedlink_slave.h" #include "chrome/renderer/webgles2context_impl.h" #include "chrome/renderer/webgraphicscontext3d_command_buffer_impl.h" #include "googleurl/src/gurl.h" #include "ipc/ipc_sync_message_filter.h" #include "third_party/WebKit/WebKit/chromium/public/WebFrame.h" #include "third_party/WebKit/WebKit/chromium/public/WebGraphicsContext3D.h" #include "third_party/WebKit/WebKit/chromium/public/WebIndexedDatabase.h" #include "third_party/WebKit/WebKit/chromium/public/WebStorageEventDispatcher.h" #include "third_party/WebKit/WebKit/chromium/public/WebURL.h" #include "third_party/WebKit/WebKit/chromium/public/WebVector.h" #include "webkit/glue/webkit_glue.h" #if defined(OS_MACOSX) #include "chrome/common/font_descriptor_mac.h" #include "chrome/common/font_loader_mac.h" #endif #if defined(OS_LINUX) #include "chrome/renderer/renderer_sandbox_support_linux.h" #endif #if defined(OS_POSIX) #include "base/file_descriptor_posix.h" #endif using WebKit::WebFrame; using WebKit::WebIndexedDatabase; using WebKit::WebKitClient; using WebKit::WebStorageArea; using WebKit::WebStorageEventDispatcher; using WebKit::WebStorageNamespace; using WebKit::WebString; using WebKit::WebURL; using WebKit::WebVector; RendererWebKitClientImpl::RendererWebKitClientImpl() : sudden_termination_disables_(0) { } RendererWebKitClientImpl::~RendererWebKitClientImpl() { } //------------------------------------------------------------------------------ WebKit::WebClipboard* RendererWebKitClientImpl::clipboard() { return &clipboard_; } WebKit::WebMimeRegistry* RendererWebKitClientImpl::mimeRegistry() { return &mime_registry_; } WebKit::WebFileSystem* RendererWebKitClientImpl::fileSystem() { return &file_system_; } WebKit::WebSandboxSupport* RendererWebKitClientImpl::sandboxSupport() { return &sandbox_support_; } WebKit::WebCookieJar* RendererWebKitClientImpl::cookieJar() { NOTREACHED() << "Use WebFrameClient::cookieJar() instead!"; return NULL; } bool RendererWebKitClientImpl::sandboxEnabled() { // As explained in WebKitClient.h, this function is used to decide whether to // allow file system operations to come out of WebKit or not. Even if the // sandbox is disabled, there's no reason why the code should act any // differently...unless we're in single process mode. In which case, we have // no other choice. WebKitClient.h discourages using this switch unless // absolutely necessary, so hopefully we won't end up with too many code paths // being different in single-process mode. return !CommandLine::ForCurrentProcess()->HasSwitch(switches::kSingleProcess); } bool RendererWebKitClientImpl::SendSyncMessageFromAnyThread( IPC::SyncMessage* msg) { RenderThread* render_thread = RenderThread::current(); if (render_thread) return render_thread->Send(msg); scoped_refptr sync_msg_filter = ChildThread::current()->sync_message_filter(); return sync_msg_filter->Send(msg); } unsigned long long RendererWebKitClientImpl::visitedLinkHash( const char* canonical_url, size_t length) { return RenderThread::current()->visited_link_slave()->ComputeURLFingerprint( canonical_url, length); } bool RendererWebKitClientImpl::isLinkVisited(unsigned long long link_hash) { return RenderThread::current()->visited_link_slave()->IsVisited(link_hash); } WebKit::WebMessagePortChannel* RendererWebKitClientImpl::createMessagePortChannel() { return new WebMessagePortChannelImpl(); } void RendererWebKitClientImpl::prefetchHostName(const WebString& hostname) { if (!hostname.isEmpty()) { std::string hostname_utf8; UTF16ToUTF8(hostname.data(), hostname.length(), &hostname_utf8); DnsPrefetchCString(hostname_utf8.data(), hostname_utf8.length()); } } bool RendererWebKitClientImpl::CheckPreparsedJsCachingEnabled() const { static bool checked = false; static bool result = false; if (!checked) { const CommandLine& command_line = *CommandLine::ForCurrentProcess(); result = command_line.HasSwitch(switches::kEnablePreparsedJsCaching); checked = true; } return result; } void RendererWebKitClientImpl::cacheMetadata( const WebKit::WebURL& url, double response_time, const char* data, size_t size) { if (!CheckPreparsedJsCachingEnabled()) return; // Let the browser know we generated cacheable metadata for this resource. The // browser may cache it and return it on subsequent responses to speed // the processing of this resource. std::vector copy(data, data + size); RenderThread::current()->Send(new ViewHostMsg_DidGenerateCacheableMetadata( url, response_time, copy)); } WebString RendererWebKitClientImpl::defaultLocale() { // TODO(darin): Eliminate this webkit_glue call. return WideToUTF16(webkit_glue::GetWebKitLocale()); } void RendererWebKitClientImpl::suddenTerminationChanged(bool enabled) { if (enabled) { // We should not get more enables than disables, but we want it to be a // non-fatal error if it does happen. DCHECK_GT(sudden_termination_disables_, 0); sudden_termination_disables_ = std::max(sudden_termination_disables_ - 1, 0); if (sudden_termination_disables_ != 0) return; } else { sudden_termination_disables_++; if (sudden_termination_disables_ != 1) return; } RenderThread* thread = RenderThread::current(); if (thread) // NULL in unittests. thread->Send(new ViewHostMsg_SuddenTerminationChanged(enabled)); } WebStorageNamespace* RendererWebKitClientImpl::createLocalStorageNamespace( const WebString& path, unsigned quota) { if (CommandLine::ForCurrentProcess()->HasSwitch(switches::kSingleProcess)) return WebStorageNamespace::createLocalStorageNamespace(path, quota); return new RendererWebStorageNamespaceImpl(DOM_STORAGE_LOCAL); } void RendererWebKitClientImpl::dispatchStorageEvent( const WebString& key, const WebString& old_value, const WebString& new_value, const WebString& origin, const WebKit::WebURL& url, bool is_local_storage) { DCHECK(CommandLine::ForCurrentProcess()->HasSwitch(switches::kSingleProcess)); // Inefficient, but only used in single process mode. scoped_ptr event_dispatcher( WebStorageEventDispatcher::create()); event_dispatcher->dispatchStorageEvent(key, old_value, new_value, origin, url, is_local_storage); } //------------------------------------------------------------------------------ WebIndexedDatabase* RendererWebKitClientImpl::indexedDatabase() { if (!web_indexed_database_.get()) { if (CommandLine::ForCurrentProcess()->HasSwitch(switches::kSingleProcess)) web_indexed_database_.reset(WebIndexedDatabase::create()); else web_indexed_database_.reset(new RendererWebIndexedDatabaseImpl()); } return web_indexed_database_.get(); } //------------------------------------------------------------------------------ WebString RendererWebKitClientImpl::MimeRegistry::mimeTypeForExtension( const WebString& file_extension) { if (IsPluginProcess()) return SimpleWebMimeRegistryImpl::mimeTypeForExtension(file_extension); // The sandbox restricts our access to the registry, so we need to proxy // these calls over to the browser process. std::string mime_type; RenderThread::current()->Send(new ViewHostMsg_GetMimeTypeFromExtension( webkit_glue::WebStringToFilePathString(file_extension), &mime_type)); return ASCIIToUTF16(mime_type); } WebString RendererWebKitClientImpl::MimeRegistry::mimeTypeFromFile( const WebString& file_path) { if (IsPluginProcess()) return SimpleWebMimeRegistryImpl::mimeTypeFromFile(file_path); // The sandbox restricts our access to the registry, so we need to proxy // these calls over to the browser process. std::string mime_type; RenderThread::current()->Send(new ViewHostMsg_GetMimeTypeFromFile( FilePath(webkit_glue::WebStringToFilePathString(file_path)), &mime_type)); return ASCIIToUTF16(mime_type); } WebString RendererWebKitClientImpl::MimeRegistry::preferredExtensionForMIMEType( const WebString& mime_type) { if (IsPluginProcess()) return SimpleWebMimeRegistryImpl::preferredExtensionForMIMEType(mime_type); // The sandbox restricts our access to the registry, so we need to proxy // these calls over to the browser process. FilePath::StringType file_extension; RenderThread::current()->Send( new ViewHostMsg_GetPreferredExtensionForMimeType(UTF16ToASCII(mime_type), &file_extension)); return webkit_glue::FilePathStringToWebString(file_extension); } //------------------------------------------------------------------------------ bool RendererWebKitClientImpl::FileSystem::getFileSize(const WebString& path, long long& result) { if (SendSyncMessageFromAnyThread(new ViewHostMsg_GetFileSize( webkit_glue::WebStringToFilePath(path), reinterpret_cast(&result)))) { return result >= 0; } result = -1; return false; } bool RendererWebKitClientImpl::FileSystem::getFileModificationTime( const WebString& path, double& result) { base::Time time; if (SendSyncMessageFromAnyThread(new ViewHostMsg_GetFileModificationTime( webkit_glue::WebStringToFilePath(path), &time))) { result = time.ToDoubleT(); return !time.is_null(); } result = 0; return false; } base::PlatformFile RendererWebKitClientImpl::FileSystem::openFile( const WebString& path, int mode) { IPC::PlatformFileForTransit handle = IPC::InvalidPlatformFileForTransit(); SendSyncMessageFromAnyThread(new ViewHostMsg_OpenFile( webkit_glue::WebStringToFilePath(path), mode, &handle)); return IPC::PlatformFileForTransitToPlatformFile(handle); } //------------------------------------------------------------------------------ #if defined(OS_WIN) bool RendererWebKitClientImpl::SandboxSupport::ensureFontLoaded(HFONT font) { LOGFONT logfont; GetObject(font, sizeof(LOGFONT), &logfont); return RenderThread::current()->Send(new ViewHostMsg_PreCacheFont(logfont)); } #elif defined(OS_LINUX) WebString RendererWebKitClientImpl::SandboxSupport::getFontFamilyForCharacters( const WebKit::WebUChar* characters, size_t num_characters) { AutoLock lock(unicode_font_families_mutex_); const std::string key(reinterpret_cast(characters), num_characters * sizeof(characters[0])); const std::map::const_iterator iter = unicode_font_families_.find(key); if (iter != unicode_font_families_.end()) return WebString::fromUTF8(iter->second); const std::string family_name = renderer_sandbox_support::getFontFamilyForCharacters(characters, num_characters); unicode_font_families_.insert(make_pair(key, family_name)); return WebString::fromUTF8(family_name); } void RendererWebKitClientImpl::SandboxSupport::getRenderStyleForStrike( const char* family, int sizeAndStyle, WebKit::WebFontRenderStyle* out) { renderer_sandbox_support::getRenderStyleForStrike(family, sizeAndStyle, out); } #elif defined(OS_MACOSX) bool RendererWebKitClientImpl::SandboxSupport::loadFont(NSFont* srcFont, ATSFontContainerRef* out) { DCHECK(srcFont); DCHECK(out); uint32 font_data_size; FontDescriptor src_font_descriptor(srcFont); base::SharedMemoryHandle font_data; if (!RenderThread::current()->Send(new ViewHostMsg_LoadFont( src_font_descriptor, &font_data_size, &font_data))) { LOG(ERROR) << "Sending ViewHostMsg_LoadFont() IPC failed for " << src_font_descriptor.font_name; *out = kATSFontContainerRefUnspecified; return false; } if (font_data_size == 0 || font_data == base::SharedMemory::NULLHandle()) { LOG(ERROR) << "Bad response from ViewHostMsg_LoadFont() for " << src_font_descriptor.font_name; *out = kATSFontContainerRefUnspecified; return false; } return FontLoader::ATSFontContainerFromBuffer(font_data, font_data_size, out); } #endif //------------------------------------------------------------------------------ WebKitClient::FileHandle RendererWebKitClientImpl::databaseOpenFile( const WebString& vfs_file_name, int desired_flags) { return DatabaseUtil::databaseOpenFile(vfs_file_name, desired_flags); } int RendererWebKitClientImpl::databaseDeleteFile( const WebString& vfs_file_name, bool sync_dir) { return DatabaseUtil::databaseDeleteFile(vfs_file_name, sync_dir); } long RendererWebKitClientImpl::databaseGetFileAttributes( const WebString& vfs_file_name) { return DatabaseUtil::databaseGetFileAttributes(vfs_file_name); } long long RendererWebKitClientImpl::databaseGetFileSize( const WebString& vfs_file_name) { return DatabaseUtil::databaseGetFileSize(vfs_file_name); } WebKit::WebSharedWorkerRepository* RendererWebKitClientImpl::sharedWorkerRepository() { if (!CommandLine::ForCurrentProcess()->HasSwitch( switches::kDisableSharedWorkers)) { return &shared_worker_repository_; } else { return NULL; } } WebKit::WebGraphicsContext3D* RendererWebKitClientImpl::createGraphicsContext3D() { // TODO(kbr): remove the WebGraphicsContext3D::createDefault code path // completely. if (CommandLine::ForCurrentProcess()->HasSwitch(switches::kInProcessWebGL)) { return WebKit::WebGraphicsContext3D::createDefault(); } else { #if defined(ENABLE_GPU) return new WebGraphicsContext3DCommandBufferImpl(); #else return NULL; #endif } } WebKit::WebGLES2Context* RendererWebKitClientImpl::createGLES2Context() { #if defined(ENABLE_GPU) return new WebGLES2ContextImpl(); #else return NULL; #endif } //------------------------------------------------------------------------------ WebKit::WebString RendererWebKitClientImpl::signedPublicKeyAndChallengeString( unsigned key_size_index, const WebKit::WebString& challenge, const WebKit::WebURL& url) { std::string signed_public_key; RenderThread::current()->Send(new ViewHostMsg_Keygen( static_cast(key_size_index), challenge.utf8(), GURL(url), &signed_public_key)); return WebString::fromUTF8(signed_public_key); }