blob: 46f08b86d756f414a6199a2cab183a57f7007b46 [file] [log] [blame]
[email protected]91854cd2012-01-10 19:43:571// Copyright (c) 2012 The Chromium Authors. All rights reserved.
license.botbf09a502008-08-24 00:55:552// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
initial.commit09911bf2008-07-26 23:55:294
[email protected]93ddb3c2012-04-11 21:44:295#include "content/browser/web_contents/web_contents_impl.h"
[email protected]39526562011-02-05 03:41:516
[email protected]2bb171882012-03-07 02:09:467#include <utility>
[email protected]b75b8292010-10-01 07:28:258
[email protected]36fb2c7c2011-04-04 15:49:089#include "base/command_line.h"
[email protected]e11f0e92013-06-12 15:12:0310#include "base/debug/trace_event.h"
[email protected]cbb1ef592013-06-05 19:49:4611#include "base/lazy_instance.h"
[email protected]6d636e62013-07-31 03:15:5612#include "base/logging.h"
[email protected]835d7c82010-10-14 04:38:3813#include "base/metrics/histogram.h"
[email protected]724159a2010-12-30 01:11:1814#include "base/metrics/stats_counters.h"
[email protected]04cbd3d2013-12-04 04:58:2015#include "base/process/process.h"
[email protected]348fbaac2013-06-11 06:31:5116#include "base/strings/string16.h"
17#include "base/strings/string_number_conversions.h"
18#include "base/strings/string_util.h"
[email protected]74ebfb12013-06-07 20:48:0019#include "base/strings/utf_string_conversions.h"
[email protected]a43858f2013-06-28 15:18:3720#include "base/time/time.h"
[email protected]7a846df2012-09-20 19:17:3921#include "content/browser/browser_plugin/browser_plugin_embedder.h"
22#include "content/browser/browser_plugin/browser_plugin_guest.h"
[email protected]8eb04562013-03-06 03:41:1423#include "content/browser/browser_plugin/browser_plugin_guest_manager.h"
[email protected]b9535422012-02-09 01:47:5924#include "content/browser/child_process_security_policy_impl.h"
[email protected]70019152012-12-19 11:44:1925#include "content/browser/devtools/devtools_manager_impl.h"
[email protected]5f2aa722013-08-07 16:59:4126#include "content/browser/dom_storage/dom_storage_context_wrapper.h"
[email protected]1ea3c792012-04-17 01:25:0427#include "content/browser/dom_storage/session_storage_namespace_impl.h"
[email protected]8bd9e562011-08-16 23:55:4628#include "content/browser/download/download_stats.h"
[email protected]aa4f3972012-03-01 18:12:1229#include "content/browser/download/mhtml_generation_manager.h"
[email protected]a53209b2012-01-20 16:48:1630#include "content/browser/download/save_package.h"
[email protected]bffc8302014-01-23 20:52:1631#include "content/browser/frame_host/cross_process_frame_connector.h"
[email protected]d4a8ca482013-10-30 21:06:4032#include "content/browser/frame_host/interstitial_page_impl.h"
33#include "content/browser/frame_host/navigation_entry_impl.h"
[email protected]6ea6bdf2013-12-06 13:35:0134#include "content/browser/frame_host/navigator_impl.h"
[email protected]52913802013-12-10 05:52:1835#include "content/browser/frame_host/render_frame_host_impl.h"
[email protected]bffc8302014-01-23 20:52:1636#include "content/browser/frame_host/render_widget_host_view_child_frame.h"
[email protected]5c9250872012-01-30 17:24:0537#include "content/browser/host_zoom_map_impl.h"
[email protected]678c0362012-12-05 08:02:4438#include "content/browser/loader/resource_dispatcher_host_impl.h"
[email protected]0bc7f3542013-10-21 15:05:5339#include "content/browser/message_port_message_filter.h"
40#include "content/browser/message_port_service.h"
[email protected]d9030b82013-07-19 08:26:0641#include "content/browser/power_save_blocker_impl.h"
[email protected]f3b1a082011-11-18 00:34:3042#include "content/browser/renderer_host/render_process_host_impl.h"
[email protected]b3c41c0b2012-03-06 15:48:3243#include "content/browser/renderer_host/render_view_host_impl.h"
[email protected]bafe6cd2012-05-23 23:09:5044#include "content/browser/renderer_host/render_widget_host_impl.h"
[email protected]b6583592012-01-25 19:52:3345#include "content/browser/site_instance_impl.h"
[email protected]b5a40842012-11-28 15:26:1146#include "content/browser/web_contents/web_contents_view_guest.h"
[email protected]eb2ef212013-01-29 04:27:5847#include "content/browser/webui/generic_handler.h"
[email protected]86a0a6e2013-01-28 06:33:0348#include "content/browser/webui/web_ui_controller_factory_registry.h"
[email protected]d2353452012-01-19 19:53:5649#include "content/browser/webui/web_ui_impl.h"
[email protected]8eb04562013-03-06 03:41:1450#include "content/common/browser_plugin/browser_plugin_constants.h"
[email protected]703dd662013-03-05 07:37:4251#include "content/common/browser_plugin/browser_plugin_messages.h"
[email protected]f114fa42013-12-06 17:06:4452#include "content/common/frame_messages.h"
[email protected]41225fe2013-03-29 05:32:0253#include "content/common/image_messages.h"
[email protected]35be7ec2012-02-12 20:42:5154#include "content/common/ssl_status_serialization.h"
[email protected]2c5569662011-03-22 20:45:0255#include "content/common/view_messages.h"
[email protected]5a3bdf52012-05-24 15:12:5756#include "content/port/browser/render_view_host_delegate_view.h"
[email protected]5626b0892012-02-20 14:46:5857#include "content/port/browser/render_widget_host_view_port.h"
[email protected]ccb797302011-12-15 16:55:1158#include "content/public/browser/browser_context.h"
[email protected]da8543762012-03-20 08:52:2059#include "content/public/browser/color_chooser.h"
[email protected]87f3c082011-10-19 18:07:4460#include "content/public/browser/content_browser_client.h"
[email protected]98f66112012-12-25 12:59:3661#include "content/public/browser/devtools_agent_host.h"
[email protected]e582fdd2011-12-20 16:48:1762#include "content/public/browser/download_manager.h"
[email protected]c5a5c0842012-05-04 20:05:1463#include "content/public/browser/download_url_parameters.h"
[email protected]d9083482012-01-06 00:38:4664#include "content/public/browser/invalidate_type.h"
[email protected]71a88bb2013-02-01 22:05:1565#include "content/public/browser/javascript_dialog_manager.h"
[email protected]a02cf4c2012-06-20 01:02:0066#include "content/public/browser/load_from_memory_cache_details.h"
[email protected]09d31d52012-03-11 22:30:2767#include "content/public/browser/load_notification_details.h"
[email protected]5b96836f2011-12-22 07:39:0068#include "content/public/browser/navigation_details.h"
[email protected]375fa1b2012-05-22 22:05:3769#include "content/public/browser/notification_details.h"
[email protected]be2510c02012-05-28 14:52:1470#include "content/public/browser/notification_service.h"
[email protected]55578b0a2012-04-18 14:31:3271#include "content/public/browser/resource_request_details.h"
[email protected]4c3a23582012-08-18 08:54:3472#include "content/public/browser/storage_partition.h"
[email protected]7f6f44c2011-12-14 13:23:3873#include "content/public/browser/user_metrics.h"
[email protected]674bc592011-12-20 23:00:4274#include "content/public/browser/web_contents_delegate.h"
[email protected]d8c660432011-12-22 20:51:2575#include "content/public/browser/web_contents_observer.h"
[email protected]8643e6d2012-01-18 20:26:1076#include "content/public/browser/web_contents_view.h"
[email protected]e091df82011-10-11 18:13:2177#include "content/public/common/bindings_policy.h"
[email protected]54087fe2011-10-28 22:02:4878#include "content/public/common/content_constants.h"
[email protected]64d69de42012-02-06 00:19:5479#include "content/public/common/content_switches.h"
[email protected]7940b8e2013-07-25 23:08:4980#include "content/public/common/page_zoom.h"
[email protected]04cbd3d2013-12-04 04:58:2081#include "content/public/common/result_codes.h"
[email protected]a1d29162011-10-14 17:14:0382#include "content/public/common/url_constants.h"
[email protected]f16cc6782013-12-16 23:42:5783#include "content/public/common/url_utils.h"
[email protected]a53209b2012-01-20 16:48:1684#include "net/base/mime_util.h"
[email protected]d686e812009-06-03 19:10:2985#include "net/base/net_util.h"
[email protected]8bfc8272013-09-09 20:10:5386#include "net/http/http_cache.h"
87#include "net/http/http_transaction_factory.h"
88#include "net/url_request/url_request_context.h"
[email protected]abe2c032011-03-31 18:49:3489#include "net/url_request/url_request_context_getter.h"
[email protected]a08412b62012-05-29 21:28:5690#include "ui/base/layout.h"
[email protected]7da9c4c2012-06-12 14:43:0191#include "ui/gfx/display.h"
[email protected]d353541f2012-05-03 22:45:4192#include "ui/gfx/screen.h"
[email protected]66bd5512012-08-01 02:02:5293#include "ui/gl/gl_switches.h"
[email protected]fab55e72013-05-31 07:06:1894#include "webkit/common/webpreferences.h"
[email protected]3c733bde2010-12-21 19:56:3195
[email protected]583418cc2013-01-17 14:01:1096#if defined(OS_ANDROID)
97#include "content/browser/android/date_time_chooser_android.h"
[email protected]a794f3a2013-10-30 17:00:3298#include "content/browser/renderer_host/java/java_bridge_dispatcher_host_manager.h"
[email protected]155c7f22013-12-09 17:07:1899#include "content/browser/web_contents/web_contents_android.h"
[email protected]a794f3a2013-10-30 17:00:32100#include "content/common/java_bridge_messages.h"
[email protected]74ebfb12013-06-07 20:48:00101#include "content/public/browser/android/content_view_core.h"
[email protected]583418cc2013-01-17 14:01:10102#endif
103
[email protected]f66df822012-05-18 16:52:17104#if defined(OS_MACOSX)
[email protected]bafe6cd2012-05-23 23:09:50105#include "base/mac/foundation_util.h"
[email protected]423e644f2013-06-19 00:48:27106#include "ui/gl/io_surface_support_mac.h"
[email protected]38b098f2012-03-14 21:11:57107#endif
[email protected]3e45ba92009-02-20 21:09:00108
[email protected]420ae012009-04-24 05:16:32109// Cross-Site Navigations
110//
[email protected]b172aee2012-04-10 17:05:26111// If a WebContentsImpl is told to navigate to a different web site (as
112// determined by SiteInstance), it will replace its current RenderViewHost with
113// a new RenderViewHost dedicated to the new SiteInstance. This works as
114// follows:
[email protected]420ae012009-04-24 05:16:32115//
[email protected]fc6c1872013-10-03 01:22:35116// - RVHM::Navigate determines whether the destination is cross-site, and if so,
[email protected]a2750082011-09-01 12:29:46117// it creates a pending_render_view_host_.
[email protected]420ae012009-04-24 05:16:32118// - The pending RVH is "suspended," so that no navigation messages are sent to
[email protected]fc6c1872013-10-03 01:22:35119// its renderer until the beforeunload JavaScript handler has a chance to
[email protected]420ae012009-04-24 05:16:32120// run in the current RVH.
121// - The pending RVH tells CrossSiteRequestManager (a thread-safe singleton)
[email protected]fc6c1872013-10-03 01:22:35122// that it has a pending cross-site request. We will check this on the IO
123// thread when deciding how to handle the response.
124// - The current RVH runs its beforeunload handler. If it returns false, we
[email protected]a2750082011-09-01 12:29:46125// cancel all the pending logic. Otherwise we allow the pending RVH to send
126// the navigation request to its renderer.
127// - ResourceDispatcherHost receives a ResourceRequest on the IO thread for the
[email protected]fc6c1872013-10-03 01:22:35128// main resource load on the pending RVH. It creates a
129// CrossSiteResourceHandler to check whether a process swap is needed when
130// the request is ready to commit.
[email protected]a2750082011-09-01 12:29:46131// - When RDH receives a response, the BufferedResourceHandler determines
132// whether it is a download. If so, it sends a message to the new renderer
133// causing it to cancel the request, and the download proceeds. For now, the
[email protected]b172aee2012-04-10 17:05:26134// pending RVH remains until the next DidNavigate event for this
135// WebContentsImpl. This isn't ideal, but it doesn't affect any functionality.
[email protected]420ae012009-04-24 05:16:32136// - After RDH receives a response and determines that it is safe and not a
[email protected]fc6c1872013-10-03 01:22:35137// download, the CrossSiteResourceHandler checks whether a process swap is
138// needed (either because CrossSiteRequestManager has state for it or because
139// a transfer was needed for a redirect).
140// - If so, CrossSiteResourceHandler pauses the response to first run the old
141// page's unload handler. It does this by asynchronously calling the
[email protected]b0936d22013-11-28 06:47:36142// OnCrossSiteResponse method of RenderFrameHostManager on the UI thread,
143// which sends a SwapOut message to the current RVH.
[email protected]fc6c1872013-10-03 01:22:35144// - Once the unload handler is finished, RVHM::SwappedOut checks if a transfer
145// to a new process is needed, based on the stored pending_nav_params_. (This
146// is independent of whether we started out with a cross-process navigation.)
147// - If not, it just tells the ResourceDispatcherHost to resume the response
148// to its current RenderViewHost.
149// - If so, it cancels the current pending RenderViewHost and sets up a new
150// navigation using RequestTransferURL. When the transferred request
151// arrives in the ResourceDispatcherHost, we transfer the response and
152// resume it.
[email protected]420ae012009-04-24 05:16:32153// - The pending renderer sends a FrameNavigate message that invokes the
154// DidNavigate method. This replaces the current RVH with the
[email protected]a2750082011-09-01 12:29:46155// pending RVH.
[email protected]b0936d22013-11-28 06:47:36156// - The previous renderer is kept swapped out in RenderFrameHostManager in case
[email protected]992db4c2011-05-12 15:37:15157// the user goes back. The process only stays live if another tab is using
158// it, but if so, the existing frame relationships will be maintained.
[email protected]420ae012009-04-24 05:16:32159
[email protected]8ff00d72012-10-23 19:12:21160namespace content {
[email protected]420ae012009-04-24 05:16:32161namespace {
162
[email protected]82114f52012-03-20 22:53:41163const char kDotGoogleDotCom[] = ".google.com";
[email protected]ca406032011-07-19 21:53:05164
[email protected]155c7f22013-12-09 17:07:18165#if defined(OS_ANDROID)
166const char kWebContentsAndroidKey[] = "web_contents_android";
167#endif // OS_ANDROID
168
[email protected]e4abd3b42013-11-12 18:28:47169base::LazyInstance<std::vector<WebContentsImpl::CreatedCallback> >
[email protected]cbb1ef592013-06-05 19:49:46170g_created_callbacks = LAZY_INSTANCE_INITIALIZER;
171
[email protected]795c28972012-12-06 06:13:39172static int StartDownload(content::RenderViewHost* rvh,
173 const GURL& url,
[email protected]433bd24b2013-03-20 18:27:29174 bool is_favicon,
[email protected]263cb08f2013-09-18 00:26:30175 uint32_t max_bitmap_size) {
[email protected]41225fe2013-03-29 05:32:02176 static int g_next_image_download_id = 0;
177 rvh->Send(new ImageMsg_DownloadImage(rvh->GetRoutingID(),
178 ++g_next_image_download_id,
179 url,
180 is_favicon,
[email protected]263cb08f2013-09-18 00:26:30181 max_bitmap_size));
[email protected]41225fe2013-03-29 05:32:02182 return g_next_image_download_id;
[email protected]795c28972012-12-06 06:13:39183}
184
[email protected]8bfc8272013-09-09 20:10:53185void NotifyCacheOnIO(
186 scoped_refptr<net::URLRequestContextGetter> request_context,
187 const GURL& url,
188 const std::string& http_method) {
189 request_context->GetURLRequestContext()->http_transaction_factory()->
190 GetCache()->OnExternalCacheHit(url, http_method);
191}
192
[email protected]9b159a52013-10-03 17:24:55193// Helper function for retrieving all the sites in a frame tree.
194bool CollectSites(BrowserContext* context,
195 std::set<GURL>* sites,
196 FrameTreeNode* node) {
197 sites->insert(SiteInstance::GetSiteForURL(context, node->current_url()));
198 return true;
199}
200
[email protected]a86c0e962013-12-17 17:10:39201bool ForEachFrameInternal(
202 const base::Callback<void(RenderFrameHost*)>& on_frame,
203 FrameTreeNode* node) {
[email protected]94d0cc12013-12-18 00:07:41204 on_frame.Run(node->current_frame_host());
[email protected]a86c0e962013-12-17 17:10:39205 return true;
206}
207
208void SendToAllFramesInternal(IPC::Message* message, RenderFrameHost* rfh) {
209 IPC::Message* message_copy = new IPC::Message(*message);
210 message_copy->set_routing_id(rfh->GetRoutingID());
211 rfh->Send(message_copy);
212}
213
[email protected]420ae012009-04-24 05:16:32214} // namespace
215
[email protected]54944cde2012-12-09 09:24:59216WebContents* WebContents::Create(const WebContents::CreateParams& params) {
[email protected]2188b012013-08-01 21:49:15217 return WebContentsImpl::CreateWithOpener(
218 params, static_cast<WebContentsImpl*>(params.opener));
[email protected]d1198fd2012-08-13 22:50:19219}
220
221WebContents* WebContents::CreateWithSessionStorage(
[email protected]54944cde2012-12-09 09:24:59222 const WebContents::CreateParams& params,
[email protected]fdac6ade2013-07-20 01:06:30223 const SessionStorageNamespaceMap& session_storage_namespace_map) {
[email protected]54944cde2012-12-09 09:24:59224 WebContentsImpl* new_contents = new WebContentsImpl(
225 params.browser_context, NULL);
[email protected]fdac6ade2013-07-20 01:06:30226
227 for (SessionStorageNamespaceMap::const_iterator it =
228 session_storage_namespace_map.begin();
229 it != session_storage_namespace_map.end();
230 ++it) {
231 new_contents->GetController()
232 .SetSessionStorageNamespace(it->first, it->second.get());
233 }
234
[email protected]54944cde2012-12-09 09:24:59235 new_contents->Init(params);
[email protected]d1198fd2012-08-13 22:50:19236 return new_contents;
[email protected]a81343d232011-12-27 07:39:20237}
[email protected]746d3052012-05-22 15:15:47238
[email protected]e4abd3b42013-11-12 18:28:47239void WebContentsImpl::AddCreatedCallback(const CreatedCallback& callback) {
[email protected]cbb1ef592013-06-05 19:49:46240 g_created_callbacks.Get().push_back(callback);
241}
242
[email protected]e4abd3b42013-11-12 18:28:47243void WebContentsImpl::RemoveCreatedCallback(const CreatedCallback& callback) {
[email protected]cbb1ef592013-06-05 19:49:46244 for (size_t i = 0; i < g_created_callbacks.Get().size(); ++i) {
245 if (g_created_callbacks.Get().at(i).Equals(callback)) {
246 g_created_callbacks.Get().erase(g_created_callbacks.Get().begin() + i);
247 return;
248 }
249 }
250}
251
[email protected]299d7f12012-05-23 05:31:15252WebContents* WebContents::FromRenderViewHost(const RenderViewHost* rvh) {
[email protected]746d3052012-05-22 15:15:47253 return rvh->GetDelegate()->GetAsWebContents();
254}
255
[email protected]a86c0e962013-12-17 17:10:39256WebContents* WebContents::FromRenderFrameHost(RenderFrameHost* rfh) {
257 RenderFrameHostImpl* rfh_impl = static_cast<RenderFrameHostImpl*>(rfh);
258 if (!rfh_impl)
259 return NULL;
260 return rfh_impl->delegate()->GetAsWebContents();
261}
262
[email protected]7fff43e2013-05-21 20:21:10263// WebContentsImpl::DestructionObserver ----------------------------------------
264
265class WebContentsImpl::DestructionObserver : public WebContentsObserver {
266 public:
267 DestructionObserver(WebContentsImpl* owner, WebContents* watched_contents)
268 : WebContentsObserver(watched_contents),
269 owner_(owner) {
270 }
271
272 // WebContentsObserver:
273 virtual void WebContentsDestroyed(WebContents* web_contents) OVERRIDE {
274 owner_->OnWebContentsDestroyed(static_cast<WebContentsImpl*>(web_contents));
275 }
276
277 private:
278 WebContentsImpl* owner_;
279
280 DISALLOW_COPY_AND_ASSIGN(DestructionObserver);
281};
282
[email protected]b172aee2012-04-10 17:05:26283// WebContentsImpl -------------------------------------------------------------
[email protected]420ae012009-04-24 05:16:32284
[email protected]b172aee2012-04-10 17:05:26285WebContentsImpl::WebContentsImpl(
[email protected]8ff00d72012-10-23 19:12:21286 BrowserContext* browser_context,
[email protected]d1198fd2012-08-13 22:50:19287 WebContentsImpl* opener)
[email protected]b680ad22009-04-15 23:19:42288 : delegate_(NULL),
[email protected]69e797f2013-04-30 01:10:22289 controller_(this, browser_context),
[email protected]5a3bdf52012-05-24 15:12:57290 render_view_host_delegate_view_(NULL),
[email protected]14392a52012-05-02 20:28:44291 opener_(opener),
[email protected]2ceee8f2014-01-14 18:02:08292#if defined(OS_WIN)
[email protected]c73a2282013-04-29 21:10:41293 accessible_parent_(NULL),
294#endif
[email protected]6ea6bdf2013-12-06 13:35:01295 frame_tree_(new NavigatorImpl(&controller_, this),
296 this, this, this, this),
[email protected]d5f942ba2008-09-26 19:30:34297 is_loading_(false),
[email protected]443b80e2010-12-14 00:42:23298 crashed_status_(base::TERMINATION_STATUS_STILL_RUNNING),
299 crashed_error_code_(0),
[email protected]d5f942ba2008-09-26 19:30:34300 waiting_for_response_(false),
[email protected]fcf75d42013-12-03 20:11:26301 load_state_(net::LOAD_STATE_IDLE, base::string16()),
[email protected]094e5b22009-09-25 04:23:56302 upload_size_(0),
303 upload_position_(0),
[email protected]f17a0ee2010-05-17 17:38:47304 displayed_insecure_content_(false),
[email protected]54597982013-02-06 01:59:55305 capturer_count_(0),
306 should_normally_be_visible_(true),
[email protected]fdd61c62009-04-22 19:22:57307 is_being_destroyed_(false),
308 notify_disconnection_(false),
[email protected]71a88bb2013-02-01 22:05:15309 dialog_manager_(NULL),
[email protected]7ab1e7d62009-10-14 23:32:01310 is_showing_before_unload_dialog_(false),
[email protected]ebf40a72010-07-22 01:46:38311 closed_by_user_gesture_(false),
[email protected]8ff00d72012-10-23 19:12:21312 minimum_zoom_percent_(static_cast<int>(kMinimumZoomFactor * 100)),
313 maximum_zoom_percent_(static_cast<int>(kMaximumZoomFactor * 100)),
[email protected]9e823662010-10-13 23:36:00314 temporary_zoom_settings_(false),
[email protected]cb805452013-05-22 15:16:21315 color_chooser_identifier_(0),
[email protected]f114fa42013-12-06 17:06:44316 render_view_message_source_(NULL),
[email protected]5dcaf8e2013-12-28 01:31:42317 fullscreen_widget_routing_id_(MSG_ROUTING_NONE),
318 is_subframe_(false) {
[email protected]cbb1ef592013-06-05 19:49:46319 for (size_t i = 0; i < g_created_callbacks.Get().size(); i++)
320 g_created_callbacks.Get().at(i).Run(this);
[email protected]9b159a52013-10-03 17:24:55321 frame_tree_.SetFrameRemoveListener(
322 base::Bind(&WebContentsImpl::OnFrameRemoved,
323 base::Unretained(this)));
[email protected]332af7732009-03-11 13:21:35324}
initial.commit09911bf2008-07-26 23:55:29325
[email protected]b172aee2012-04-10 17:05:26326WebContentsImpl::~WebContentsImpl() {
[email protected]420ae012009-04-24 05:16:32327 is_being_destroyed_ = true;
328
[email protected]d9030b82013-07-19 08:26:06329 ClearAllPowerSaveBlockers();
330
[email protected]b24b68a2012-09-24 21:57:26331 for (std::set<RenderWidgetHostImpl*>::iterator iter =
332 created_widgets_.begin(); iter != created_widgets_.end(); ++iter) {
333 (*iter)->DetachDelegate();
334 }
335 created_widgets_.clear();
336
[email protected]3ab9cb82011-06-03 18:02:07337 // Clear out any JavaScript state.
[email protected]71a88bb2013-02-01 22:05:15338 if (dialog_manager_)
[email protected]4567f152013-07-31 13:20:11339 dialog_manager_->WebContentsDestroyed(this);
[email protected]3ab9cb82011-06-03 18:02:07340
[email protected]da8543762012-03-20 08:52:20341 if (color_chooser_)
342 color_chooser_->End();
343
[email protected]420ae012009-04-24 05:16:32344 NotifyDisconnected();
[email protected]420ae012009-04-24 05:16:32345
[email protected]ca13a442012-04-17 14:00:12346 // Notify any observer that have a reference on this WebContents.
[email protected]8ff00d72012-10-23 19:12:21347 NotificationService::current()->Notify(
348 NOTIFICATION_WEB_CONTENTS_DESTROYED,
349 Source<WebContents>(this),
350 NotificationService::NoDetails());
[email protected]420ae012009-04-24 05:16:32351
[email protected]fa944cb82013-11-15 17:51:21352 RenderViewHost* pending_rvh = GetRenderManager()->pending_render_view_host();
[email protected]f273ee52013-10-18 16:05:27353 if (pending_rvh) {
354 FOR_EACH_OBSERVER(WebContentsObserver,
355 observers_,
356 RenderViewDeleted(pending_rvh));
357 }
358
359 FOR_EACH_OBSERVER(WebContentsObserver,
360 observers_,
[email protected]fa944cb82013-11-15 17:51:21361 RenderViewDeleted(GetRenderManager()->current_host()));
[email protected]f273ee52013-10-18 16:05:27362
[email protected]2db9bd72012-04-13 20:20:56363 FOR_EACH_OBSERVER(WebContentsObserver,
364 observers_,
365 WebContentsImplDestroyed());
[email protected]232a5812011-03-04 22:42:08366
[email protected]6934a702011-12-20 00:04:51367 SetDelegate(NULL);
[email protected]7fff43e2013-05-21 20:21:10368
369 STLDeleteContainerPairSecondPointers(destruction_observers_.begin(),
370 destruction_observers_.end());
[email protected]b5a1d11c2011-02-17 03:09:42371}
372
[email protected]d1198fd2012-08-13 22:50:19373WebContentsImpl* WebContentsImpl::CreateWithOpener(
[email protected]54944cde2012-12-09 09:24:59374 const WebContents::CreateParams& params,
[email protected]d1198fd2012-08-13 22:50:19375 WebContentsImpl* opener) {
[email protected]e11f0e92013-06-12 15:12:03376 TRACE_EVENT0("browser", "WebContentsImpl::CreateWithOpener");
[email protected]54944cde2012-12-09 09:24:59377 WebContentsImpl* new_contents = new WebContentsImpl(
378 params.browser_context, opener);
[email protected]d1198fd2012-08-13 22:50:19379
[email protected]54944cde2012-12-09 09:24:59380 new_contents->Init(params);
[email protected]d1198fd2012-08-13 22:50:19381 return new_contents;
382}
383
[email protected]b371a5652013-02-20 11:25:51384// static
[email protected]8eb04562013-03-06 03:41:14385BrowserPluginGuest* WebContentsImpl::CreateGuest(
[email protected]dd8c8232012-11-03 00:49:36386 BrowserContext* browser_context,
[email protected]1bc28312012-11-08 08:31:53387 SiteInstance* site_instance,
[email protected]738f57a2013-06-29 21:06:54388 int guest_instance_id,
389 scoped_ptr<base::DictionaryValue> extra_params) {
[email protected]6706b8da2013-03-19 13:20:39390 WebContentsImpl* new_contents = new WebContentsImpl(browser_context, NULL);
[email protected]7a846df2012-09-20 19:17:39391
392 // This makes |new_contents| act as a guest.
393 // For more info, see comment above class BrowserPluginGuest.
[email protected]738f57a2013-06-29 21:06:54394 BrowserPluginGuest::Create(
[email protected]dbbce92c2013-10-31 16:51:19395 guest_instance_id, site_instance, new_contents, extra_params.Pass());
[email protected]b5a40842012-11-28 15:26:11396
[email protected]3de10bb32013-01-08 21:57:33397 WebContents::CreateParams create_params(browser_context, site_instance);
[email protected]3de10bb32013-01-08 21:57:33398 new_contents->Init(create_params);
[email protected]b5a40842012-11-28 15:26:11399
[email protected]216be772013-01-25 00:22:27400 // We are instantiating a WebContents for browser plugin. Set its subframe bit
401 // to true.
[email protected]5dcaf8e2013-12-28 01:31:42402 new_contents->is_subframe_ = true;
[email protected]216be772013-01-25 00:22:27403
[email protected]8eb04562013-03-06 03:41:14404 return new_contents->browser_plugin_guest_.get();
[email protected]7a846df2012-09-20 19:17:39405}
406
[email protected]b0936d22013-11-28 06:47:36407RenderFrameHostManager* WebContentsImpl::GetRenderManagerForTesting() {
[email protected]fa944cb82013-11-15 17:51:21408 return GetRenderManager();
[email protected]765187182012-01-11 23:59:28409}
410
[email protected]7bb761892012-07-20 09:32:47411bool WebContentsImpl::OnMessageReceived(RenderViewHost* render_view_host,
412 const IPC::Message& message) {
[email protected]f114fa42013-12-06 17:06:44413 return OnMessageReceived(render_view_host, NULL, message);
414}
415
416bool WebContentsImpl::OnMessageReceived(RenderViewHost* render_view_host,
417 RenderFrameHost* render_frame_host,
418 const IPC::Message& message) {
419 DCHECK(render_view_host || render_frame_host);
[email protected]d2353452012-01-19 19:53:56420 if (GetWebUI() &&
421 static_cast<WebUIImpl*>(GetWebUI())->OnMessageReceived(message)) {
[email protected]f82d57b52011-04-27 19:13:17422 return true;
[email protected]d2353452012-01-19 19:53:56423 }
[email protected]f82d57b52011-04-27 19:13:17424
[email protected]d8c660432011-12-22 20:51:25425 ObserverListBase<WebContentsObserver>::Iterator it(observers_);
426 WebContentsObserver* observer;
[email protected]0f180ee2011-01-21 18:23:10427 while ((observer = it.GetNext()) != NULL)
428 if (observer->OnMessageReceived(message))
[email protected]403415a2011-01-10 18:57:53429 return true;
[email protected]403415a2011-01-10 18:57:53430
[email protected]1d62cf72014-02-07 21:31:57431 // Message handlers should be aware of which
432 // RenderViewHost/RenderFrameHost sent the message, which is temporarily
433 // stored in render_(view|frame)_message_source_.
434 if (render_frame_host)
435 render_frame_message_source_ = render_frame_host;
436 else
437 render_view_message_source_ = render_view_host;
438
[email protected]724159a2010-12-30 01:11:18439 bool handled = true;
440 bool message_is_ok = true;
[email protected]b172aee2012-04-10 17:05:26441 IPC_BEGIN_MESSAGE_MAP_EX(WebContentsImpl, message, message_is_ok)
[email protected]f114fa42013-12-06 17:06:44442 IPC_MESSAGE_HANDLER(FrameHostMsg_PepperPluginHung, OnPepperPluginHung)
443 IPC_MESSAGE_HANDLER(FrameHostMsg_PluginCrashed, OnPluginCrashed)
[email protected]724159a2010-12-30 01:11:18444 IPC_MESSAGE_HANDLER(ViewHostMsg_DidLoadResourceFromMemoryCache,
445 OnDidLoadResourceFromMemoryCache)
446 IPC_MESSAGE_HANDLER(ViewHostMsg_DidDisplayInsecureContent,
447 OnDidDisplayInsecureContent)
448 IPC_MESSAGE_HANDLER(ViewHostMsg_DidRunInsecureContent,
449 OnDidRunInsecureContent)
[email protected]1d62cf72014-02-07 21:31:57450 IPC_MESSAGE_HANDLER(FrameHostMsg_DidFinishDocumentLoad,
[email protected]724159a2010-12-30 01:11:18451 OnDocumentLoadedInFrame)
452 IPC_MESSAGE_HANDLER(ViewHostMsg_DidFinishLoad, OnDidFinishLoad)
[email protected]7d472472011-01-22 01:30:25453 IPC_MESSAGE_HANDLER(ViewHostMsg_GoToEntryAtOffset, OnGoToEntryAtOffset)
[email protected]216813952011-05-19 22:21:26454 IPC_MESSAGE_HANDLER(ViewHostMsg_UpdateZoomLimits, OnUpdateZoomLimits)
[email protected]3a29a6e2011-08-24 18:26:21455 IPC_MESSAGE_HANDLER(ViewHostMsg_EnumerateDirectory, OnEnumerateDirectory)
[email protected]7d189022011-08-25 22:54:20456 IPC_MESSAGE_HANDLER(ViewHostMsg_JSOutOfMemory, OnJSOutOfMemory)
457 IPC_MESSAGE_HANDLER(ViewHostMsg_RegisterProtocolHandler,
458 OnRegisterProtocolHandler)
[email protected]b888919c2011-09-02 00:32:16459 IPC_MESSAGE_HANDLER(ViewHostMsg_Find_Reply, OnFindReply)
[email protected]7fc4bbb2011-09-08 21:23:10460 IPC_MESSAGE_HANDLER(ViewHostMsg_AppCacheAccessed, OnAppCacheAccessed)
[email protected]da8543762012-03-20 08:52:20461 IPC_MESSAGE_HANDLER(ViewHostMsg_OpenColorChooser, OnOpenColorChooser)
462 IPC_MESSAGE_HANDLER(ViewHostMsg_EndColorChooser, OnEndColorChooser)
463 IPC_MESSAGE_HANDLER(ViewHostMsg_SetSelectedColorInColorChooser,
464 OnSetSelectedColorInColorChooser)
[email protected]d0759f492012-04-19 22:50:50465 IPC_MESSAGE_HANDLER(ViewHostMsg_WebUISend, OnWebUISend)
[email protected]d8415ad92012-08-23 14:40:50466 IPC_MESSAGE_HANDLER(ViewHostMsg_RequestPpapiBrokerPermission,
467 OnRequestPpapiBrokerPermission)
[email protected]c4538072013-03-18 02:17:55468 IPC_MESSAGE_HANDLER_GENERIC(BrowserPluginHostMsg_AllocateInstanceID,
469 OnBrowserPluginMessage(message))
470 IPC_MESSAGE_HANDLER_GENERIC(BrowserPluginHostMsg_Attach,
471 OnBrowserPluginMessage(message))
[email protected]41225fe2013-03-29 05:32:02472 IPC_MESSAGE_HANDLER(ImageHostMsg_DidDownloadImage, OnDidDownloadImage)
473 IPC_MESSAGE_HANDLER(ViewHostMsg_UpdateFaviconURL, OnUpdateFaviconURL)
[email protected]583418cc2013-01-17 14:01:10474#if defined(OS_ANDROID)
475 IPC_MESSAGE_HANDLER(ViewHostMsg_FindMatchRects_Reply,
476 OnFindMatchRectsReply)
477 IPC_MESSAGE_HANDLER(ViewHostMsg_OpenDateTimeDialog,
478 OnOpenDateTimeDialog)
[email protected]a794f3a2013-10-30 17:00:32479 IPC_MESSAGE_HANDLER_DELAY_REPLY(JavaBridgeHostMsg_GetChannelHandle,
480 OnJavaBridgeGetChannelHandle)
[email protected]583418cc2013-01-17 14:01:10481#endif
[email protected]1dd0bb752014-02-01 01:16:26482 IPC_MESSAGE_HANDLER(ViewHostMsg_MediaPlayingNotification,
483 OnMediaPlayingNotification)
484 IPC_MESSAGE_HANDLER(ViewHostMsg_MediaPausedNotification,
485 OnMediaPausedNotification)
[email protected]9f268072013-11-07 00:02:15486 IPC_MESSAGE_HANDLER(ViewHostMsg_DidFirstVisuallyNonEmptyPaint,
487 OnFirstVisuallyNonEmptyPaint)
[email protected]edc3af82013-12-12 21:24:07488 IPC_MESSAGE_HANDLER(ViewHostMsg_ShowValidationMessage,
489 OnShowValidationMessage)
490 IPC_MESSAGE_HANDLER(ViewHostMsg_HideValidationMessage,
491 OnHideValidationMessage)
492 IPC_MESSAGE_HANDLER(ViewHostMsg_MoveValidationMessage,
493 OnMoveValidationMessage)
[email protected]724159a2010-12-30 01:11:18494 IPC_MESSAGE_UNHANDLED(handled = false)
495 IPC_END_MESSAGE_MAP_EX()
[email protected]f114fa42013-12-06 17:06:44496 render_view_message_source_ = NULL;
[email protected]1d62cf72014-02-07 21:31:57497 render_frame_message_source_ = NULL;
[email protected]724159a2010-12-30 01:11:18498
499 if (!message_is_ok) {
[email protected]e6e30ac2014-01-13 21:24:39500 RecordAction(base::UserMetricsAction("BadMessageTerminate_RVD"));
[email protected]724159a2010-12-30 01:11:18501 GetRenderProcessHost()->ReceivedBadMessage();
502 }
503
504 return handled;
505}
506
[email protected]b172aee2012-04-10 17:05:26507void WebContentsImpl::RunFileChooser(
[email protected]6c2e472f2011-08-24 23:26:18508 RenderViewHost* render_view_host,
[email protected]8ff00d72012-10-23 19:12:21509 const FileChooserParams& params) {
[email protected]e5f2de02012-07-20 22:15:43510 if (delegate_)
511 delegate_->RunFileChooser(this, params);
[email protected]6c2e472f2011-08-24 23:26:18512}
513
[email protected]d1198fd2012-08-13 22:50:19514NavigationControllerImpl& WebContentsImpl::GetController() {
[email protected]f5fa20e2011-12-21 22:35:56515 return controller_;
516}
517
[email protected]d1198fd2012-08-13 22:50:19518const NavigationControllerImpl& WebContentsImpl::GetController() const {
[email protected]f5fa20e2011-12-21 22:35:56519 return controller_;
520}
521
[email protected]8ff00d72012-10-23 19:12:21522BrowserContext* WebContentsImpl::GetBrowserContext() const {
[email protected]a26023822011-12-29 00:23:55523 return controller_.GetBrowserContext();
[email protected]627e0512011-12-21 22:55:30524}
525
[email protected]b172aee2012-04-10 17:05:26526const GURL& WebContentsImpl::GetURL() const {
[email protected]c854a7e2013-05-21 16:42:24527 // We may not have a navigation entry yet.
[email protected]59167c22013-06-03 18:07:32528 NavigationEntry* entry = controller_.GetVisibleEntry();
[email protected]36fc0392011-12-25 03:59:51529 return entry ? entry->GetVirtualURL() : GURL::EmptyGURL();
[email protected]be1f56ab2011-12-22 06:55:31530}
531
[email protected]a093ce02013-07-22 20:53:14532const GURL& WebContentsImpl::GetVisibleURL() const {
[email protected]c854a7e2013-05-21 16:42:24533 // We may not have a navigation entry yet.
[email protected]59167c22013-06-03 18:07:32534 NavigationEntry* entry = controller_.GetVisibleEntry();
[email protected]c854a7e2013-05-21 16:42:24535 return entry ? entry->GetVirtualURL() : GURL::EmptyGURL();
536}
537
538const GURL& WebContentsImpl::GetLastCommittedURL() const {
539 // We may not have a navigation entry yet.
540 NavigationEntry* entry = controller_.GetLastCommittedEntry();
541 return entry ? entry->GetVirtualURL() : GURL::EmptyGURL();
542}
543
[email protected]8ff00d72012-10-23 19:12:21544WebContentsDelegate* WebContentsImpl::GetDelegate() {
[email protected]be1f56ab2011-12-22 06:55:31545 return delegate_;
546}
547
[email protected]8ff00d72012-10-23 19:12:21548void WebContentsImpl::SetDelegate(WebContentsDelegate* delegate) {
[email protected]be1f56ab2011-12-22 06:55:31549 // TODO(cbentzel): remove this debugging code?
550 if (delegate == delegate_)
551 return;
552 if (delegate_)
553 delegate_->Detach(this);
554 delegate_ = delegate;
[email protected]a6b73c62013-02-11 23:05:08555 if (delegate_) {
[email protected]be1f56ab2011-12-22 06:55:31556 delegate_->Attach(this);
[email protected]a6b73c62013-02-11 23:05:08557 // Ensure the visible RVH reflects the new delegate's preferences.
[email protected]86f98a22013-03-20 14:35:00558 if (view_)
559 view_->SetOverscrollControllerEnabled(delegate->CanOverscrollContent());
[email protected]a6b73c62013-02-11 23:05:08560 }
[email protected]be1f56ab2011-12-22 06:55:31561}
562
[email protected]8ff00d72012-10-23 19:12:21563RenderProcessHost* WebContentsImpl::GetRenderProcessHost() const {
[email protected]fa944cb82013-11-15 17:51:21564 RenderViewHostImpl* host = GetRenderManager()->current_host();
[email protected]82114f52012-03-20 22:53:41565 return host ? host->GetProcess() : NULL;
[email protected]8cb5d5b2010-02-09 11:36:16566}
567
[email protected]60eca4eb2013-12-06 00:02:16568RenderFrameHost* WebContentsImpl::GetMainFrame() {
[email protected]94d0cc12013-12-18 00:07:41569 return frame_tree_.root()->current_frame_host();
[email protected]60eca4eb2013-12-06 00:02:16570}
571
[email protected]a86c0e962013-12-17 17:10:39572void WebContentsImpl::ForEachFrame(
573 const base::Callback<void(RenderFrameHost*)>& on_frame) {
574 frame_tree_.ForEach(base::Bind(&ForEachFrameInternal, on_frame));
575}
576
577void WebContentsImpl::SendToAllFrames(IPC::Message* message) {
578 ForEachFrame(base::Bind(&SendToAllFramesInternal, message));
579 delete message;
580}
581
[email protected]b172aee2012-04-10 17:05:26582RenderViewHost* WebContentsImpl::GetRenderViewHost() const {
[email protected]fa944cb82013-11-15 17:51:21583 return GetRenderManager()->current_host();
[email protected]be1f56ab2011-12-22 06:55:31584}
585
[email protected]a04c9d02012-11-14 21:04:34586void WebContentsImpl::GetRenderViewHostAtPosition(
587 int x,
588 int y,
589 const base::Callback<void(RenderViewHost*, int, int)>& callback) {
590 BrowserPluginEmbedder* embedder = GetBrowserPluginEmbedder();
591 if (embedder)
592 embedder->GetRenderViewHostAtPosition(x, y, callback);
593 else
594 callback.Run(GetRenderViewHost(), x, y);
595}
596
[email protected]bfcfa692013-02-07 06:17:02597WebContents* WebContentsImpl::GetEmbedderWebContents() const {
598 BrowserPluginGuest* guest = GetBrowserPluginGuest();
599 if (guest)
600 return guest->embedder_web_contents();
601 return NULL;
602}
603
604int WebContentsImpl::GetEmbeddedInstanceID() const {
605 BrowserPluginGuest* guest = GetBrowserPluginGuest();
606 if (guest)
607 return guest->instance_id();
608 return 0;
609}
610
[email protected]6b618e62012-08-16 12:59:18611int WebContentsImpl::GetRoutingID() const {
612 if (!GetRenderViewHost())
613 return MSG_ROUTING_NONE;
614
615 return GetRenderViewHost()->GetRoutingID();
616}
617
[email protected]44470a22013-01-24 01:21:54618int WebContentsImpl::GetFullscreenWidgetRoutingID() const {
619 return fullscreen_widget_routing_id_;
620}
621
[email protected]b172aee2012-04-10 17:05:26622RenderWidgetHostView* WebContentsImpl::GetRenderWidgetHostView() const {
[email protected]fa944cb82013-11-15 17:51:21623 return GetRenderManager()->GetRenderWidgetHostView();
[email protected]be1f56ab2011-12-22 06:55:31624}
625
[email protected]f8497342013-02-05 22:15:02626RenderWidgetHostViewPort* WebContentsImpl::GetRenderWidgetHostViewPort() const {
627 BrowserPluginGuest* guest = GetBrowserPluginGuest();
628 if (guest && guest->embedder_web_contents()) {
629 return guest->embedder_web_contents()->GetRenderWidgetHostViewPort();
630 }
631 return RenderWidgetHostViewPort::FromRWHV(GetRenderWidgetHostView());
632}
633
[email protected]4aebbca2013-09-17 22:26:49634RenderWidgetHostView* WebContentsImpl::GetFullscreenRenderWidgetHostView()
635 const {
636 RenderWidgetHost* const widget_host =
637 RenderWidgetHostImpl::FromID(GetRenderProcessHost()->GetID(),
638 GetFullscreenWidgetRoutingID());
639 return widget_host ? widget_host->GetView() : NULL;
640}
641
[email protected]8ff00d72012-10-23 19:12:21642WebContentsView* WebContentsImpl::GetView() const {
[email protected]be1f56ab2011-12-22 06:55:31643 return view_.get();
644}
645
[email protected]8ff00d72012-10-23 19:12:21646WebUI* WebContentsImpl::CreateWebUI(const GURL& url) {
[email protected]d2353452012-01-19 19:53:56647 WebUIImpl* web_ui = new WebUIImpl(this);
[email protected]86a0a6e2013-01-28 06:33:03648 WebUIController* controller = WebUIControllerFactoryRegistry::GetInstance()->
649 CreateWebUIControllerForURL(web_ui, url);
[email protected]c63cedf22012-01-17 18:42:22650 if (controller) {
[email protected]eb2ef212013-01-29 04:27:58651 web_ui->AddMessageHandler(new GenericHandler());
[email protected]c63cedf22012-01-17 18:42:22652 web_ui->SetController(controller);
653 return web_ui;
654 }
655
656 delete web_ui;
657 return NULL;
658}
659
[email protected]8ff00d72012-10-23 19:12:21660WebUI* WebContentsImpl::GetWebUI() const {
[email protected]fa944cb82013-11-15 17:51:21661 return GetRenderManager()->web_ui() ? GetRenderManager()->web_ui()
662 : GetRenderManager()->pending_web_ui();
[email protected]be1f56ab2011-12-22 06:55:31663}
664
[email protected]8ff00d72012-10-23 19:12:21665WebUI* WebContentsImpl::GetCommittedWebUI() const {
[email protected]fa944cb82013-11-15 17:51:21666 return GetRenderManager()->web_ui();
[email protected]d5f942ba2008-09-26 19:30:34667}
668
[email protected]86ef6a392012-05-11 22:03:11669void WebContentsImpl::SetUserAgentOverride(const std::string& override) {
[email protected]bf70edce2012-06-20 22:32:22670 if (GetUserAgentOverride() == override)
671 return;
672
673 renderer_preferences_.user_agent_override = override;
674
675 // Send the new override string to the renderer.
676 RenderViewHost* host = GetRenderViewHost();
677 if (host)
678 host->SyncRendererPrefs();
679
680 // Reload the page if a load is currently in progress to avoid having
681 // different parts of the page loaded using different user agents.
[email protected]6286a372013-10-09 04:03:27682 NavigationEntry* entry = controller_.GetVisibleEntry();
[email protected]bf70edce2012-06-20 22:32:22683 if (is_loading_ && entry != NULL && entry->GetIsOverridingUserAgent())
684 controller_.ReloadIgnoringCache(true);
[email protected]8d0f3312012-08-18 01:47:53685
686 FOR_EACH_OBSERVER(WebContentsObserver, observers_,
687 UserAgentOverrideSet(override));
[email protected]86ef6a392012-05-11 22:03:11688}
689
690const std::string& WebContentsImpl::GetUserAgentOverride() const {
[email protected]bf70edce2012-06-20 22:32:22691 return renderer_preferences_.user_agent_override;
[email protected]86ef6a392012-05-11 22:03:11692}
693
[email protected]2ceee8f2014-01-14 18:02:08694#if defined(OS_WIN)
[email protected]c73a2282013-04-29 21:10:41695void WebContentsImpl::SetParentNativeViewAccessible(
696gfx::NativeViewAccessible accessible_parent) {
697 accessible_parent_ = accessible_parent;
[email protected]3144b892013-05-25 01:14:45698 if (GetRenderViewHost())
699 GetRenderViewHostImpl()->SetParentNativeViewAccessible(accessible_parent);
[email protected]c73a2282013-04-29 21:10:41700}
701#endif
702
[email protected]fcf75d42013-12-03 20:11:26703const base::string16& WebContentsImpl::GetTitle() const {
[email protected]4c6092c5b2009-06-06 00:23:55704 // Transient entries take precedence. They are used for interstitial pages
705 // that are shown on top of existing pages.
[email protected]10f417c52011-12-28 21:04:23706 NavigationEntry* entry = controller_.GetTransientEntry();
[email protected]b5cca982011-05-26 04:42:08707 std::string accept_languages =
[email protected]8ff00d72012-10-23 19:12:21708 GetContentClient()->browser()->GetAcceptLangs(
[email protected]627e0512011-12-21 22:55:30709 GetBrowserContext());
[email protected]45d0ef7f2011-01-05 13:46:23710 if (entry) {
[email protected]b5cca982011-05-26 04:42:08711 return entry->GetTitleForDisplay(accept_languages);
[email protected]45d0ef7f2011-01-05 13:46:23712 }
[email protected]fa944cb82013-11-15 17:51:21713 WebUI* our_web_ui = GetRenderManager()->pending_web_ui() ?
714 GetRenderManager()->pending_web_ui() : GetRenderManager()->web_ui();
[email protected]7ade2732011-02-10 00:13:58715 if (our_web_ui) {
[email protected]96d185d2009-04-24 03:28:54716 // Don't override the title in view source mode.
[email protected]59167c22013-06-03 18:07:32717 entry = controller_.GetVisibleEntry();
[email protected]96d185d2009-04-24 03:28:54718 if (!(entry && entry->IsViewSourceMode())) {
[email protected]e0112912011-02-02 22:54:35719 // Give the Web UI the chance to override our title.
[email protected]fcf75d42013-12-03 20:11:26720 const base::string16& title = our_web_ui->GetOverriddenTitle();
[email protected]96d185d2009-04-24 03:28:54721 if (!title.empty())
722 return title;
723 }
724 }
725
726 // We use the title for the last committed entry rather than a pending
727 // navigation entry. For example, when the user types in a URL, we want to
728 // keep the old page's title until the new load has committed and we get a new
729 // title.
[email protected]96d185d2009-04-24 03:28:54730 entry = controller_.GetLastCommittedEntry();
[email protected]59167c22013-06-03 18:07:32731
[email protected]9eeafc012013-11-25 23:49:47732 // We make an exception for initial navigations.
733 if (controller_.IsInitialNavigation()) {
734 // We only want to use the title from the visible entry in one of two cases:
735 // 1. There's already a committed entry for an initial navigation, in which
736 // case we are doing a history navigation in a new tab (e.g., Ctrl+Back).
737 // 2. The pending entry has been explicitly assigned a title to display.
738 //
739 // If there's no last committed entry and no assigned title, we should fall
740 // back to |page_title_when_no_navigation_entry_| rather than showing the
741 // URL.
742 if (entry ||
743 (controller_.GetVisibleEntry() &&
744 !controller_.GetVisibleEntry()->GetTitle().empty())) {
745 entry = controller_.GetVisibleEntry();
746 }
747 }
[email protected]59167c22013-06-03 18:07:32748
[email protected]45d0ef7f2011-01-05 13:46:23749 if (entry) {
[email protected]b5cca982011-05-26 04:42:08750 return entry->GetTitleForDisplay(accept_languages);
[email protected]45d0ef7f2011-01-05 13:46:23751 }
[email protected]987fc3a2011-05-26 14:18:09752
753 // |page_title_when_no_navigation_entry_| is finally used
754 // if no title cannot be retrieved.
755 return page_title_when_no_navigation_entry_;
[email protected]96d185d2009-04-24 03:28:54756}
757
[email protected]b172aee2012-04-10 17:05:26758int32 WebContentsImpl::GetMaxPageID() {
[email protected]74ce1ad2011-12-16 21:51:46759 return GetMaxPageIDForSiteInstance(GetSiteInstance());
760}
761
[email protected]b172aee2012-04-10 17:05:26762int32 WebContentsImpl::GetMaxPageIDForSiteInstance(
763 SiteInstance* site_instance) {
[email protected]b6583592012-01-25 19:52:33764 if (max_page_ids_.find(site_instance->GetId()) == max_page_ids_.end())
765 max_page_ids_[site_instance->GetId()] = -1;
[email protected]74ce1ad2011-12-16 21:51:46766
[email protected]b6583592012-01-25 19:52:33767 return max_page_ids_[site_instance->GetId()];
[email protected]d5f942ba2008-09-26 19:30:34768}
769
[email protected]b172aee2012-04-10 17:05:26770void WebContentsImpl::UpdateMaxPageID(int32 page_id) {
[email protected]74ce1ad2011-12-16 21:51:46771 UpdateMaxPageIDForSiteInstance(GetSiteInstance(), page_id);
772}
773
[email protected]b172aee2012-04-10 17:05:26774void WebContentsImpl::UpdateMaxPageIDForSiteInstance(
[email protected]b6583592012-01-25 19:52:33775 SiteInstance* site_instance, int32 page_id) {
[email protected]74ce1ad2011-12-16 21:51:46776 if (GetMaxPageIDForSiteInstance(site_instance) < page_id)
[email protected]b6583592012-01-25 19:52:33777 max_page_ids_[site_instance->GetId()] = page_id;
[email protected]d5f942ba2008-09-26 19:30:34778}
779
[email protected]ec6c05f2013-10-23 18:41:57780void WebContentsImpl::CopyMaxPageIDsFrom(WebContents* web_contents) {
781 WebContentsImpl* contents = static_cast<WebContentsImpl*>(web_contents);
782 max_page_ids_ = contents->max_page_ids_;
[email protected]91854cd2012-01-10 19:43:57783}
784
[email protected]b172aee2012-04-10 17:05:26785SiteInstance* WebContentsImpl::GetSiteInstance() const {
[email protected]fa944cb82013-11-15 17:51:21786 return GetRenderManager()->current_host()->GetSiteInstance();
[email protected]96d185d2009-04-24 03:28:54787}
788
[email protected]b172aee2012-04-10 17:05:26789SiteInstance* WebContentsImpl::GetPendingSiteInstance() const {
[email protected]fa944cb82013-11-15 17:51:21790 RenderViewHost* dest_rvh = GetRenderManager()->pending_render_view_host() ?
791 GetRenderManager()->pending_render_view_host() :
792 GetRenderManager()->current_host();
[email protected]9f76c1e2012-03-05 15:15:58793 return dest_rvh->GetSiteInstance();
[email protected]77362eb2011-08-01 17:18:38794}
795
[email protected]b172aee2012-04-10 17:05:26796bool WebContentsImpl::IsLoading() const {
[email protected]be1f56ab2011-12-22 06:55:31797 return is_loading_;
[email protected]3c9e1872010-11-18 16:17:49798}
799
[email protected]b172aee2012-04-10 17:05:26800bool WebContentsImpl::IsWaitingForResponse() const {
[email protected]be1f56ab2011-12-22 06:55:31801 return waiting_for_response_;
802}
803
[email protected]b172aee2012-04-10 17:05:26804const net::LoadStateWithParam& WebContentsImpl::GetLoadState() const {
[email protected]be1f56ab2011-12-22 06:55:31805 return load_state_;
806}
807
[email protected]fcf75d42013-12-03 20:11:26808const base::string16& WebContentsImpl::GetLoadStateHost() const {
[email protected]be1f56ab2011-12-22 06:55:31809 return load_state_host_;
810}
811
[email protected]b172aee2012-04-10 17:05:26812uint64 WebContentsImpl::GetUploadSize() const {
[email protected]be1f56ab2011-12-22 06:55:31813 return upload_size_;
814}
815
[email protected]b172aee2012-04-10 17:05:26816uint64 WebContentsImpl::GetUploadPosition() const {
[email protected]be1f56ab2011-12-22 06:55:31817 return upload_position_;
818}
819
[email protected]1ae93fb2013-06-14 03:38:56820std::set<GURL> WebContentsImpl::GetSitesInTab() const {
[email protected]1ae93fb2013-06-14 03:38:56821 std::set<GURL> sites;
[email protected]a86c0e962013-12-17 17:10:39822 frame_tree_.ForEach(base::Bind(&CollectSites,
823 base::Unretained(GetBrowserContext()),
824 base::Unretained(&sites)));
[email protected]1ae93fb2013-06-14 03:38:56825 return sites;
826}
827
[email protected]b172aee2012-04-10 17:05:26828const std::string& WebContentsImpl::GetEncoding() const {
[email protected]be1f56ab2011-12-22 06:55:31829 return encoding_;
830}
831
[email protected]b172aee2012-04-10 17:05:26832bool WebContentsImpl::DisplayedInsecureContent() const {
[email protected]be1f56ab2011-12-22 06:55:31833 return displayed_insecure_content_;
834}
835
[email protected]222f5822014-02-05 23:40:49836void WebContentsImpl::IncrementCapturerCount(const gfx::Size& capture_size) {
[email protected]5a652232013-02-12 06:15:25837 DCHECK(!is_being_destroyed_);
[email protected]54597982013-02-06 01:59:55838 ++capturer_count_;
839 DVLOG(1) << "There are now " << capturer_count_
840 << " capturing(s) of WebContentsImpl@" << this;
[email protected]222f5822014-02-05 23:40:49841
842 // Note: This provides a hint to upstream code to size the views optimally
843 // for quality (e.g., to avoid scaling).
844 if (!capture_size.IsEmpty() && preferred_size_for_capture_.IsEmpty()) {
845 preferred_size_for_capture_ = capture_size;
846 OnPreferredSizeChanged(preferred_size_);
847 }
[email protected]54597982013-02-06 01:59:55848}
849
850void WebContentsImpl::DecrementCapturerCount() {
851 --capturer_count_;
852 DVLOG(1) << "There are now " << capturer_count_
853 << " capturing(s) of WebContentsImpl@" << this;
854 DCHECK_LE(0, capturer_count_);
855
[email protected]5a652232013-02-12 06:15:25856 if (is_being_destroyed_)
857 return;
858
[email protected]222f5822014-02-05 23:40:49859 if (capturer_count_ == 0) {
860 const gfx::Size old_size = preferred_size_for_capture_;
861 preferred_size_for_capture_ = gfx::Size();
862 OnPreferredSizeChanged(old_size);
863 }
864
[email protected]1ac10dca2013-08-20 20:47:04865 if (IsHidden()) {
[email protected]54597982013-02-06 01:59:55866 DVLOG(1) << "Executing delayed WasHidden().";
867 WasHidden();
868 }
[email protected]be1f56ab2011-12-22 06:55:31869}
870
[email protected]f2bd40812013-07-20 04:30:44871int WebContentsImpl::GetCapturerCount() const {
872 return capturer_count_;
873}
874
[email protected]b172aee2012-04-10 17:05:26875bool WebContentsImpl::IsCrashed() const {
[email protected]be1f56ab2011-12-22 06:55:31876 return (crashed_status_ == base::TERMINATION_STATUS_PROCESS_CRASHED ||
877 crashed_status_ == base::TERMINATION_STATUS_ABNORMAL_TERMINATION ||
878 crashed_status_ == base::TERMINATION_STATUS_PROCESS_WAS_KILLED);
[email protected]3c9e1872010-11-18 16:17:49879}
880
[email protected]b172aee2012-04-10 17:05:26881void WebContentsImpl::SetIsCrashed(base::TerminationStatus status,
882 int error_code) {
[email protected]443b80e2010-12-14 00:42:23883 if (status == crashed_status_)
[email protected]d5f942ba2008-09-26 19:30:34884 return;
885
[email protected]443b80e2010-12-14 00:42:23886 crashed_status_ = status;
887 crashed_error_code_ = error_code;
[email protected]8ff00d72012-10-23 19:12:21888 NotifyNavigationStateChanged(INVALIDATE_TYPE_TAB);
[email protected]d5f942ba2008-09-26 19:30:34889}
890
[email protected]b172aee2012-04-10 17:05:26891base::TerminationStatus WebContentsImpl::GetCrashedStatus() const {
[email protected]be1f56ab2011-12-22 06:55:31892 return crashed_status_;
893}
894
[email protected]b172aee2012-04-10 17:05:26895bool WebContentsImpl::IsBeingDestroyed() const {
[email protected]be1f56ab2011-12-22 06:55:31896 return is_being_destroyed_;
897}
898
[email protected]b172aee2012-04-10 17:05:26899void WebContentsImpl::NotifyNavigationStateChanged(unsigned changed_flags) {
[email protected]d5f942ba2008-09-26 19:30:34900 if (delegate_)
901 delegate_->NavigationStateChanged(this, changed_flags);
902}
903
[email protected]3e324142012-06-25 18:26:33904base::TimeTicks WebContentsImpl::GetLastSelectedTime() const {
905 return last_selected_time_;
906}
907
[email protected]9e2e4632012-07-27 16:38:41908void WebContentsImpl::WasShown() {
[email protected]96d185d2009-04-24 03:28:54909 controller_.SetActive(true);
[email protected]c30585c2012-02-16 15:02:04910 RenderWidgetHostViewPort* rwhv =
911 RenderWidgetHostViewPort::FromRWHV(GetRenderWidgetHostView());
[email protected]8cb5d5b2010-02-09 11:36:16912 if (rwhv) {
[email protected]68ef3962013-09-26 06:45:29913 rwhv->Show();
[email protected]789e9152009-08-04 21:59:43914#if defined(OS_MACOSX)
[email protected]8cb5d5b2010-02-09 11:36:16915 rwhv->SetActive(true);
[email protected]789e9152009-08-04 21:59:43916#endif
917 }
[email protected]96d185d2009-04-24 03:28:54918
[email protected]5ac20162010-11-24 23:33:11919 last_selected_time_ = base::TimeTicks::Now();
[email protected]3e69bc82011-05-26 23:22:38920
[email protected]b9769d82012-02-10 00:23:59921 // The resize rect might have changed while this was inactive -- send the new
922 // one to make sure it's up to date.
[email protected]9f76c1e2012-03-05 15:15:58923 RenderViewHostImpl* rvh =
924 static_cast<RenderViewHostImpl*>(GetRenderViewHost());
[email protected]b9769d82012-02-10 00:23:59925 if (rvh) {
926 rvh->ResizeRectChanged(GetRootWindowResizerRect());
927 }
[email protected]96d185d2009-04-24 03:28:54928
[email protected]c0d9d5672013-10-09 07:38:03929 FOR_EACH_OBSERVER(WebContentsObserver, observers_, WasShown());
930
[email protected]54597982013-02-06 01:59:55931 should_normally_be_visible_ = true;
[email protected]be1f56ab2011-12-22 06:55:31932}
933
[email protected]b172aee2012-04-10 17:05:26934void WebContentsImpl::WasHidden() {
[email protected]54597982013-02-06 01:59:55935 // If there are entities capturing screenshots or video (e.g., mirroring),
936 // don't activate the "disable rendering" optimization.
937 if (capturer_count_ == 0) {
[email protected]151a63d2011-12-20 22:32:52938 // |GetRenderViewHost()| can be NULL if the user middle clicks a link to
[email protected]54597982013-02-06 01:59:55939 // open a tab in the background, then closes the tab before selecting it.
[email protected]b172aee2012-04-10 17:05:26940 // This is because closing the tab calls WebContentsImpl::Destroy(), which
[email protected]151a63d2011-12-20 22:32:52941 // removes the |GetRenderViewHost()|; then when we actually destroy the
[email protected]3e324142012-06-25 18:26:33942 // window, OnWindowPosChanged() notices and calls WasHidden() (which
[email protected]151a63d2011-12-20 22:32:52943 // calls us).
[email protected]c30585c2012-02-16 15:02:04944 RenderWidgetHostViewPort* rwhv =
945 RenderWidgetHostViewPort::FromRWHV(GetRenderWidgetHostView());
[email protected]8cb5d5b2010-02-09 11:36:16946 if (rwhv)
[email protected]68ef3962013-09-26 06:45:29947 rwhv->Hide();
[email protected]96d185d2009-04-24 03:28:54948 }
949
[email protected]c0d9d5672013-10-09 07:38:03950 FOR_EACH_OBSERVER(WebContentsObserver, observers_, WasHidden());
951
[email protected]54597982013-02-06 01:59:55952 should_normally_be_visible_ = false;
[email protected]375fa1b2012-05-22 22:05:37953}
954
[email protected]b172aee2012-04-10 17:05:26955bool WebContentsImpl::NeedToFireBeforeUnload() {
[email protected]be1f56ab2011-12-22 06:55:31956 // TODO(creis): Should we fire even for interstitial pages?
[email protected]0bfbf882011-12-22 18:19:27957 return WillNotifyDisconnection() &&
958 !ShowingInterstitialPage() &&
[email protected]9f76c1e2012-03-05 15:15:58959 !static_cast<RenderViewHostImpl*>(
960 GetRenderViewHost())->SuddenTerminationAllowed();
[email protected]be1f56ab2011-12-22 06:55:31961}
962
[email protected]b172aee2012-04-10 17:05:26963void WebContentsImpl::Stop() {
[email protected]fa944cb82013-11-15 17:51:21964 GetRenderManager()->Stop();
[email protected]d16609c2013-08-23 06:01:40965 FOR_EACH_OBSERVER(WebContentsObserver, observers_, NavigationStopped());
[email protected]0bfbf882011-12-22 18:19:27966}
967
[email protected]b172aee2012-04-10 17:05:26968WebContents* WebContentsImpl::Clone() {
[email protected]14392a52012-05-02 20:28:44969 // We use our current SiteInstance since the cloned entry will use it anyway.
[email protected]ed245db2012-12-18 08:00:45970 // We pass our own opener so that the cloned page can access it if it was
971 // before.
[email protected]54944cde2012-12-09 09:24:59972 CreateParams create_params(GetBrowserContext(), GetSiteInstance());
[email protected]ed245db2012-12-18 08:00:45973 create_params.initial_size = view_->GetContainerSize();
[email protected]54944cde2012-12-09 09:24:59974 WebContentsImpl* tc = CreateWithOpener(create_params, opener_);
[email protected]d1198fd2012-08-13 22:50:19975 tc->GetController().CopyStateFrom(controller_);
[email protected]7381d9f2012-09-12 20:26:22976 FOR_EACH_OBSERVER(WebContentsObserver,
977 observers_,
978 DidCloneToNewWebContents(this, tc));
[email protected]0bfbf882011-12-22 18:19:27979 return tc;
980}
981
[email protected]14392a52012-05-02 20:28:44982void WebContentsImpl::Observe(int type,
[email protected]8ff00d72012-10-23 19:12:21983 const NotificationSource& source,
984 const NotificationDetails& details) {
[email protected]14392a52012-05-02 20:28:44985 switch (type) {
[email protected]8ff00d72012-10-23 19:12:21986 case NOTIFICATION_RENDER_WIDGET_HOST_DESTROYED: {
987 RenderWidgetHost* host = Source<RenderWidgetHost>(source).ptr();
[email protected]bafe6cd2012-05-23 23:09:50988 for (PendingWidgetViews::iterator i = pending_widget_views_.begin();
989 i != pending_widget_views_.end(); ++i) {
990 if (host->GetView() == i->second) {
991 pending_widget_views_.erase(i);
992 break;
993 }
994 }
995 break;
996 }
[email protected]14392a52012-05-02 20:28:44997 default:
998 NOTREACHED();
999 }
1000}
1001
[email protected]ec6c05f2013-10-23 18:41:571002WebContents* WebContentsImpl::GetWebContents() {
1003 return this;
1004}
1005
[email protected]54944cde2012-12-09 09:24:591006void WebContentsImpl::Init(const WebContents::CreateParams& params) {
[email protected]fa944cb82013-11-15 17:51:211007 // This is set before initializing the render manager since
[email protected]b0936d22013-11-28 06:47:361008 // RenderFrameHostManager::Init calls back into us via its delegate to ask if
[email protected]fa944cb82013-11-15 17:51:211009 // it should be hidden.
[email protected]d6fa88f2013-10-18 16:00:431010 should_normally_be_visible_ = !params.initially_hidden;
1011
[email protected]fa944cb82013-11-15 17:51:211012 GetRenderManager()->Init(
[email protected]227692c52013-05-31 22:43:041013 params.browser_context, params.site_instance, params.routing_id,
1014 params.main_frame_routing_id);
[email protected]d1198fd2012-08-13 22:50:191015
[email protected]8ff00d72012-10-23 19:12:211016 view_.reset(GetContentClient()->browser()->
[email protected]d1198fd2012-08-13 22:50:191017 OverrideCreateWebContentsView(this, &render_view_host_delegate_view_));
[email protected]59383c782013-04-17 16:43:271018 if (view_) {
[email protected]d1198fd2012-08-13 22:50:191019 CHECK(render_view_host_delegate_view_);
1020 } else {
[email protected]f8497342013-02-05 22:15:021021 WebContentsViewDelegate* delegate =
1022 GetContentClient()->browser()->GetWebContentsViewDelegate(this);
1023
[email protected]59383c782013-04-17 16:43:271024 if (browser_plugin_guest_) {
[email protected]6ac389a2013-07-09 01:32:381025 scoped_ptr<WebContentsViewPort> platform_view(CreateWebContentsView(
1026 this, delegate, &render_view_host_delegate_view_));
[email protected]f8497342013-02-05 22:15:021027
[email protected]b5a40842012-11-28 15:26:111028 WebContentsViewGuest* rv = new WebContentsViewGuest(
[email protected]6ac389a2013-07-09 01:32:381029 this, browser_plugin_guest_.get(), platform_view.Pass(),
[email protected]cb8d7cf22013-06-19 04:16:431030 render_view_host_delegate_view_);
[email protected]b5a40842012-11-28 15:26:111031 render_view_host_delegate_view_ = rv;
1032 view_.reset(rv);
1033 } else {
[email protected]f8497342013-02-05 22:15:021034 // Regular WebContentsView.
[email protected]b5a40842012-11-28 15:26:111035 view_.reset(CreateWebContentsView(
1036 this, delegate, &render_view_host_delegate_view_));
1037 }
[email protected]d1198fd2012-08-13 22:50:191038 CHECK(render_view_host_delegate_view_);
1039 }
1040 CHECK(view_.get());
1041
[email protected]ed245db2012-12-18 08:00:451042 gfx::Size initial_size = params.initial_size;
[email protected]54944cde2012-12-09 09:24:591043 view_->CreateView(initial_size, params.context);
[email protected]d1198fd2012-08-13 22:50:191044
1045 // Listen for whether our opener gets destroyed.
[email protected]7fff43e2013-05-21 20:21:101046 if (opener_)
1047 AddDestructionObserver(opener_);
[email protected]d1198fd2012-08-13 22:50:191048
1049 registrar_.Add(this,
[email protected]8ff00d72012-10-23 19:12:211050 NOTIFICATION_RENDER_WIDGET_HOST_DESTROYED,
1051 NotificationService::AllBrowserContextsAndSources());
[email protected]c7654a232013-06-12 21:04:441052#if defined(OS_ANDROID)
[email protected]d1198fd2012-08-13 22:50:191053 java_bridge_dispatcher_host_manager_.reset(
1054 new JavaBridgeDispatcherHostManager(this));
[email protected]583418cc2013-01-17 14:01:101055 date_time_chooser_.reset(new DateTimeChooserAndroid());
1056#endif
[email protected]d1198fd2012-08-13 22:50:191057}
1058
[email protected]7fff43e2013-05-21 20:21:101059void WebContentsImpl::OnWebContentsDestroyed(WebContentsImpl* web_contents) {
1060 RemoveDestructionObserver(web_contents);
1061
[email protected]14392a52012-05-02 20:28:441062 // Clear the opener if it has been closed.
1063 if (web_contents == opener_) {
[email protected]14392a52012-05-02 20:28:441064 opener_ = NULL;
[email protected]ceee8cd2013-03-08 04:59:511065 return;
[email protected]14392a52012-05-02 20:28:441066 }
[email protected]ceee8cd2013-03-08 04:59:511067 // Clear a pending contents that has been closed before being shown.
1068 for (PendingContents::iterator iter = pending_contents_.begin();
1069 iter != pending_contents_.end();
1070 ++iter) {
1071 if (iter->second != web_contents)
1072 continue;
1073 pending_contents_.erase(iter);
[email protected]ceee8cd2013-03-08 04:59:511074 return;
1075 }
1076 NOTREACHED();
[email protected]14392a52012-05-02 20:28:441077}
1078
[email protected]7fff43e2013-05-21 20:21:101079void WebContentsImpl::AddDestructionObserver(WebContentsImpl* web_contents) {
1080 if (!ContainsKey(destruction_observers_, web_contents)) {
1081 destruction_observers_[web_contents] =
1082 new DestructionObserver(this, web_contents);
1083 }
1084}
1085
1086void WebContentsImpl::RemoveDestructionObserver(WebContentsImpl* web_contents) {
1087 DestructionObservers::iterator iter =
1088 destruction_observers_.find(web_contents);
1089 if (iter != destruction_observers_.end()) {
1090 delete destruction_observers_[web_contents];
1091 destruction_observers_.erase(iter);
1092 }
1093}
1094
[email protected]b172aee2012-04-10 17:05:261095void WebContentsImpl::AddObserver(WebContentsObserver* observer) {
[email protected]be1f56ab2011-12-22 06:55:311096 observers_.AddObserver(observer);
1097}
1098
[email protected]b172aee2012-04-10 17:05:261099void WebContentsImpl::RemoveObserver(WebContentsObserver* observer) {
[email protected]be1f56ab2011-12-22 06:55:311100 observers_.RemoveObserver(observer);
1101}
1102
[email protected]b172aee2012-04-10 17:05:261103void WebContentsImpl::Activate() {
[email protected]d5f942ba2008-09-26 19:30:341104 if (delegate_)
1105 delegate_->ActivateContents(this);
1106}
1107
[email protected]b172aee2012-04-10 17:05:261108void WebContentsImpl::Deactivate() {
[email protected]ea42e7782010-08-23 23:58:121109 if (delegate_)
1110 delegate_->DeactivateContents(this);
1111}
1112
[email protected]b172aee2012-04-10 17:05:261113void WebContentsImpl::LostCapture() {
[email protected]63954792011-07-11 04:17:481114 if (delegate_)
1115 delegate_->LostCapture();
1116}
1117
[email protected]b24b68a2012-09-24 21:57:261118void WebContentsImpl::RenderWidgetDeleted(
1119 RenderWidgetHostImpl* render_widget_host) {
1120 if (is_being_destroyed_) {
1121 // |created_widgets_| might have been destroyed.
1122 return;
1123 }
1124
1125 std::set<RenderWidgetHostImpl*>::iterator iter =
1126 created_widgets_.find(render_widget_host);
1127 if (iter != created_widgets_.end())
1128 created_widgets_.erase(iter);
[email protected]44470a22013-01-24 01:21:541129
1130 if (render_widget_host &&
1131 render_widget_host->GetRoutingID() == fullscreen_widget_routing_id_) {
[email protected]4aebbca2013-09-17 22:26:491132 if (delegate_ && delegate_->EmbedsFullscreenWidget())
1133 delegate_->ToggleFullscreenModeForTab(this, false);
[email protected]44470a22013-01-24 01:21:541134 FOR_EACH_OBSERVER(WebContentsObserver,
1135 observers_,
1136 DidDestroyFullscreenWidget(
1137 fullscreen_widget_routing_id_));
1138 fullscreen_widget_routing_id_ = MSG_ROUTING_NONE;
1139 }
[email protected]b24b68a2012-09-24 21:57:261140}
1141
[email protected]b172aee2012-04-10 17:05:261142bool WebContentsImpl::PreHandleKeyboardEvent(
1143 const NativeWebKeyboardEvent& event,
1144 bool* is_keyboard_shortcut) {
[email protected]63954792011-07-11 04:17:481145 return delegate_ &&
[email protected]b3996ba2012-08-08 00:39:131146 delegate_->PreHandleKeyboardEvent(this, event, is_keyboard_shortcut);
[email protected]63954792011-07-11 04:17:481147}
1148
[email protected]b172aee2012-04-10 17:05:261149void WebContentsImpl::HandleKeyboardEvent(const NativeWebKeyboardEvent& event) {
[email protected]6d5c060a2013-06-18 11:27:061150 if (browser_plugin_embedder_ &&
1151 browser_plugin_embedder_->HandleKeyboardEvent(event)) {
1152 return;
1153 }
1154
[email protected]63954792011-07-11 04:17:481155 if (delegate_)
[email protected]b3996ba2012-08-08 00:39:131156 delegate_->HandleKeyboardEvent(this, event);
[email protected]63954792011-07-11 04:17:481157}
1158
[email protected]fb3f066e2013-02-12 19:12:521159bool WebContentsImpl::PreHandleWheelEvent(
[email protected]180ef242013-11-07 06:50:461160 const blink::WebMouseWheelEvent& event) {
[email protected]bccc4472013-04-18 16:37:191161#if !defined(OS_MACOSX)
1162 // On platforms other than Mac, control+mousewheel changes zoom. On Mac, this
1163 // isn't done for two reasons:
1164 // -the OS already has a gesture to do this through pinch-zoom
1165 // -if a user starts an inertial scroll, let's go, and presses control
1166 // (i.e. control+tab) then the OS's buffered scroll events will come in
1167 // with control key set which isn't what the user wants
[email protected]fb3f066e2013-02-12 19:12:521168 if (delegate_ &&
1169 event.wheelTicksY &&
[email protected]180ef242013-11-07 06:50:461170 (event.modifiers & blink::WebInputEvent::ControlKey)) {
[email protected]fb3f066e2013-02-12 19:12:521171 delegate_->ContentsZoomChange(event.wheelTicksY > 0);
1172 return true;
1173 }
[email protected]bccc4472013-04-18 16:37:191174#endif
[email protected]fb3f066e2013-02-12 19:12:521175
1176 return false;
1177}
1178
[email protected]04bce562014-01-30 05:34:541179bool WebContentsImpl::PreHandleGestureEvent(
1180 const blink::WebGestureEvent& event) {
[email protected]28042d32014-02-03 14:10:031181 return delegate_ && delegate_->PreHandleGestureEvent(this, event);
[email protected]04bce562014-01-30 05:34:541182}
1183
[email protected]2ceee8f2014-01-14 18:02:081184#if defined(OS_WIN)
[email protected]c73a2282013-04-29 21:10:411185gfx::NativeViewAccessible WebContentsImpl::GetParentNativeViewAccessible() {
1186 return accessible_parent_;
1187}
1188#endif
1189
[email protected]b172aee2012-04-10 17:05:261190void WebContentsImpl::HandleMouseDown() {
[email protected]32ded2212011-11-10 18:51:431191 if (delegate_)
1192 delegate_->HandleMouseDown();
1193}
1194
[email protected]b172aee2012-04-10 17:05:261195void WebContentsImpl::HandleMouseUp() {
[email protected]63954792011-07-11 04:17:481196 if (delegate_)
1197 delegate_->HandleMouseUp();
1198}
1199
[email protected]590a634e2012-07-19 16:38:231200void WebContentsImpl::HandlePointerActivate() {
[email protected]63954792011-07-11 04:17:481201 if (delegate_)
[email protected]590a634e2012-07-19 16:38:231202 delegate_->HandlePointerActivate();
1203}
1204
1205void WebContentsImpl::HandleGestureBegin() {
1206 if (delegate_)
1207 delegate_->HandleGestureBegin();
1208}
1209
1210void WebContentsImpl::HandleGestureEnd() {
1211 if (delegate_)
1212 delegate_->HandleGestureEnd();
[email protected]63954792011-07-11 04:17:481213}
1214
[email protected]b172aee2012-04-10 17:05:261215void WebContentsImpl::ToggleFullscreenMode(bool enter_fullscreen) {
[email protected]4aebbca2013-09-17 22:26:491216 // This method is being called to enter or leave renderer-initiated fullscreen
1217 // mode. Either way, make sure any existing fullscreen widget is shut down
1218 // first.
1219 RenderWidgetHostView* const widget_view = GetFullscreenRenderWidgetHostView();
1220 if (widget_view)
1221 RenderWidgetHostImpl::From(widget_view->GetRenderWidgetHost())->Shutdown();
1222
[email protected]8a5e0ca2011-08-25 06:30:471223 if (delegate_)
1224 delegate_->ToggleFullscreenModeForTab(this, enter_fullscreen);
1225}
1226
[email protected]b172aee2012-04-10 17:05:261227bool WebContentsImpl::IsFullscreenForCurrentTab() const {
[email protected]199bba6e2012-04-04 16:19:381228 return delegate_ ? delegate_->IsFullscreenForTabOrPending(this) : false;
[email protected]5d5f7af2011-10-01 01:38:121229}
1230
[email protected]a9c81f02012-06-01 00:15:441231void WebContentsImpl::RequestToLockMouse(bool user_gesture,
1232 bool last_unlocked_by_target) {
[email protected]e9621112011-10-17 05:38:371233 if (delegate_) {
[email protected]a9c81f02012-06-01 00:15:441234 delegate_->RequestToLockMouse(this, user_gesture, last_unlocked_by_target);
[email protected]e9621112011-10-17 05:38:371235 } else {
1236 GotResponseToLockMouseRequest(false);
1237 }
1238}
1239
[email protected]b172aee2012-04-10 17:05:261240void WebContentsImpl::LostMouseLock() {
[email protected]e9621112011-10-17 05:38:371241 if (delegate_)
1242 delegate_->LostMouseLock();
1243}
1244
[email protected]bafe6cd2012-05-23 23:09:501245void WebContentsImpl::CreateNewWindow(
[email protected]04cbd3d2013-12-04 04:58:201246 int render_process_id,
[email protected]bafe6cd2012-05-23 23:09:501247 int route_id,
[email protected]227692c52013-05-31 22:43:041248 int main_frame_route_id,
[email protected]97714c82012-06-06 10:15:131249 const ViewHostMsg_CreateWindow_Params& params,
1250 SessionStorageNamespace* session_storage_namespace) {
[email protected]bafe6cd2012-05-23 23:09:501251 // We usually create the new window in the same BrowsingInstance (group of
1252 // script-related windows), by passing in the current SiteInstance. However,
[email protected]c4538072013-03-18 02:17:551253 // if the opener is being suppressed (in a non-guest), we create a new
1254 // SiteInstance in its own BrowsingInstance.
1255 bool is_guest = GetRenderProcessHost()->IsGuest();
1256
[email protected]04cbd3d2013-12-04 04:58:201257 // If the opener is to be suppressed, the new window can be in any process.
1258 // Since routing ids are process specific, we must not have one passed in
1259 // as argument here.
1260 DCHECK(!params.opener_suppressed || route_id == MSG_ROUTING_NONE);
1261
[email protected]bafe6cd2012-05-23 23:09:501262 scoped_refptr<SiteInstance> site_instance =
[email protected]c4538072013-03-18 02:17:551263 params.opener_suppressed && !is_guest ?
[email protected]e94bbcb2012-09-07 05:33:571264 SiteInstance::CreateForURL(GetBrowserContext(), params.target_url) :
[email protected]bafe6cd2012-05-23 23:09:501265 GetSiteInstance();
1266
[email protected]04cbd3d2013-12-04 04:58:201267 // A message to create a new window can only come from the active process for
1268 // this WebContentsImpl instance. If any other process sends the request,
1269 // it is invalid and the process must be terminated.
1270 if (GetRenderProcessHost()->GetID() != render_process_id) {
1271 base::ProcessHandle process_handle =
1272 RenderProcessHost::FromID(render_process_id)->GetHandle();
1273 if (process_handle != base::kNullProcessHandle) {
1274 RecordAction(
[email protected]e6e30ac2014-01-13 21:24:391275 base::UserMetricsAction("Terminate_ProcessMismatch_CreateNewWindow"));
[email protected]04cbd3d2013-12-04 04:58:201276 base::KillProcess(process_handle, content::RESULT_CODE_KILLED, false);
1277 }
1278 return;
1279 }
1280
[email protected]d1198fd2012-08-13 22:50:191281 // We must assign the SessionStorageNamespace before calling Init().
[email protected]4c3a23582012-08-18 08:54:341282 //
1283 // http://crbug.com/142685
[email protected]fdac6ade2013-07-20 01:06:301284 const std::string& partition_id =
1285 GetContentClient()->browser()->
1286 GetStoragePartitionIdForSite(GetBrowserContext(),
1287 site_instance->GetSiteURL());
[email protected]fc72bb12013-06-02 21:13:461288 StoragePartition* partition = BrowserContext::GetStoragePartition(
1289 GetBrowserContext(), site_instance.get());
[email protected]5f2aa722013-08-07 16:59:411290 DOMStorageContextWrapper* dom_storage_context =
1291 static_cast<DOMStorageContextWrapper*>(partition->GetDOMStorageContext());
[email protected]d1198fd2012-08-13 22:50:191292 SessionStorageNamespaceImpl* session_storage_namespace_impl =
1293 static_cast<SessionStorageNamespaceImpl*>(session_storage_namespace);
1294 CHECK(session_storage_namespace_impl->IsFromContext(dom_storage_context));
[email protected]dd6730412013-08-14 15:03:371295
1296 if (delegate_ &&
1297 !delegate_->ShouldCreateWebContents(this,
1298 route_id,
1299 params.window_container_type,
1300 params.frame_name,
1301 params.target_url,
1302 partition_id,
1303 session_storage_namespace)) {
[email protected]f1cd3362014-01-07 20:43:011304 if (route_id != MSG_ROUTING_NONE &&
1305 !RenderViewHost::FromID(render_process_id, route_id)) {
1306 // If the embedder didn't create a WebContents for this route, we need to
1307 // delete the RenderView that had already been created.
1308 Send(new ViewMsg_Close(route_id));
1309 }
[email protected]dd6730412013-08-14 15:03:371310 GetRenderViewHost()->GetProcess()->ResumeRequestsForView(route_id);
1311 GetRenderViewHost()->GetProcess()->ResumeRequestsForView(
1312 main_frame_route_id);
1313 return;
1314 }
1315
1316 // Create the new web contents. This will automatically create the new
1317 // WebContentsView. In the future, we may want to create the view separately.
1318 WebContentsImpl* new_contents =
1319 new WebContentsImpl(GetBrowserContext(),
1320 params.opener_suppressed ? NULL : this);
1321
[email protected]d1198fd2012-08-13 22:50:191322 new_contents->GetController().SetSessionStorageNamespace(
[email protected]fdac6ade2013-07-20 01:06:301323 partition_id,
[email protected]d1198fd2012-08-13 22:50:191324 session_storage_namespace);
[email protected]fc72bb12013-06-02 21:13:461325 CreateParams create_params(GetBrowserContext(), site_instance.get());
[email protected]54944cde2012-12-09 09:24:591326 create_params.routing_id = route_id;
[email protected]227692c52013-05-31 22:43:041327 create_params.main_frame_routing_id = main_frame_route_id;
[email protected]c4538072013-03-18 02:17:551328 if (!is_guest) {
1329 create_params.context = view_->GetNativeView();
1330 create_params.initial_size = view_->GetContainerSize();
1331 } else {
1332 // This makes |new_contents| act as a guest.
1333 // For more info, see comment above class BrowserPluginGuest.
1334 int instance_id = GetBrowserPluginGuestManager()->get_next_instance_id();
1335 WebContentsImpl* new_contents_impl =
1336 static_cast<WebContentsImpl*>(new_contents);
[email protected]c61b317c72013-11-14 06:40:461337 BrowserPluginGuest::CreateWithOpener(instance_id,
1338 new_contents_impl->opener() != NULL,
1339 new_contents_impl,
1340 GetBrowserPluginGuest());
[email protected]c4538072013-03-18 02:17:551341 }
[email protected]1ac10dca2013-08-20 20:47:041342 if (params.disposition == NEW_BACKGROUND_TAB)
1343 create_params.initially_hidden = true;
[email protected]54944cde2012-12-09 09:24:591344 new_contents->Init(create_params);
[email protected]d1198fd2012-08-13 22:50:191345
[email protected]c4538072013-03-18 02:17:551346 // Save the window for later if we're not suppressing the opener (since it
[email protected]d70bea92013-04-05 04:23:341347 // will be shown immediately).
1348 if (!params.opener_suppressed) {
1349 if (!is_guest) {
1350 WebContentsViewPort* new_view = new_contents->view_.get();
[email protected]bafe6cd2012-05-23 23:09:501351
[email protected]d70bea92013-04-05 04:23:341352 // TODO(brettw): It seems bogus that we have to call this function on the
1353 // newly created object and give it one of its own member variables.
1354 new_view->CreateViewForWidget(new_contents->GetRenderViewHost());
1355 }
[email protected]bafe6cd2012-05-23 23:09:501356 // Save the created window associated with the route so we can show it
1357 // later.
1358 DCHECK_NE(MSG_ROUTING_NONE, route_id);
1359 pending_contents_[route_id] = new_contents;
[email protected]7fff43e2013-05-21 20:21:101360 AddDestructionObserver(new_contents);
[email protected]bafe6cd2012-05-23 23:09:501361 }
1362
1363 if (delegate_) {
1364 delegate_->WebContentsCreated(
[email protected]50de3222013-03-20 15:36:131365 this, params.opener_frame_id, params.frame_name,
1366 params.target_url, new_contents);
[email protected]bafe6cd2012-05-23 23:09:501367 }
1368
1369 if (params.opener_suppressed) {
1370 // When the opener is suppressed, the original renderer cannot access the
1371 // new window. As a result, we need to show and navigate the window here.
[email protected]eda238a12012-09-07 23:44:001372 bool was_blocked = false;
1373 if (delegate_) {
1374 gfx::Rect initial_pos;
1375 delegate_->AddNewContents(
1376 this, new_contents, params.disposition, initial_pos,
1377 params.user_gesture, &was_blocked);
1378 }
1379 if (!was_blocked) {
[email protected]8ff00d72012-10-23 19:12:211380 OpenURLParams open_params(params.target_url,
1381 Referrer(),
1382 CURRENT_TAB,
1383 PAGE_TRANSITION_LINK,
1384 true /* is_renderer_initiated */);
[email protected]e7f2e7c2013-07-15 09:41:301385 open_params.user_gesture = params.user_gesture;
[email protected]eda238a12012-09-07 23:44:001386 new_contents->OpenURL(open_params);
1387 }
[email protected]bafe6cd2012-05-23 23:09:501388 }
1389}
1390
[email protected]a8504022013-12-04 20:23:511391void WebContentsImpl::CreateNewWidget(int render_process_id,
1392 int route_id,
[email protected]180ef242013-11-07 06:50:461393 blink::WebPopupType popup_type) {
[email protected]a8504022013-12-04 20:23:511394 CreateNewWidget(render_process_id, route_id, false, popup_type);
[email protected]bafe6cd2012-05-23 23:09:501395}
1396
[email protected]a8504022013-12-04 20:23:511397void WebContentsImpl::CreateNewFullscreenWidget(int render_process_id,
1398 int route_id) {
1399 CreateNewWidget(render_process_id, route_id, true, blink::WebPopupTypeNone);
[email protected]bafe6cd2012-05-23 23:09:501400}
1401
[email protected]a8504022013-12-04 20:23:511402void WebContentsImpl::CreateNewWidget(int render_process_id,
1403 int route_id,
[email protected]bafe6cd2012-05-23 23:09:501404 bool is_fullscreen,
[email protected]180ef242013-11-07 06:50:461405 blink::WebPopupType popup_type) {
[email protected]8ff00d72012-10-23 19:12:211406 RenderProcessHost* process = GetRenderProcessHost();
[email protected]a8504022013-12-04 20:23:511407 // A message to create a new widget can only come from the active process for
1408 // this WebContentsImpl instance. If any other process sends the request,
1409 // it is invalid and the process must be terminated.
1410 if (process->GetID() != render_process_id) {
1411 base::ProcessHandle process_handle =
1412 RenderProcessHost::FromID(render_process_id)->GetHandle();
1413 if (process_handle != base::kNullProcessHandle) {
1414 RecordAction(
[email protected]e6e30ac2014-01-13 21:24:391415 base::UserMetricsAction("Terminate_ProcessMismatch_CreateNewWidget"));
[email protected]a8504022013-12-04 20:23:511416 base::KillProcess(process_handle, content::RESULT_CODE_KILLED, false);
1417 }
1418 return;
1419 }
1420
[email protected]bafe6cd2012-05-23 23:09:501421 RenderWidgetHostImpl* widget_host =
[email protected]1ac10dca2013-08-20 20:47:041422 new RenderWidgetHostImpl(this, process, route_id, IsHidden());
[email protected]b24b68a2012-09-24 21:57:261423 created_widgets_.insert(widget_host);
1424
[email protected]83918ec2013-01-10 15:37:191425 RenderWidgetHostViewPort* widget_view = RenderWidgetHostViewPort::FromRWHV(
1426 view_->CreateViewForPopupWidget(widget_host));
1427 if (!widget_view)
1428 return;
[email protected]bafe6cd2012-05-23 23:09:501429 if (!is_fullscreen) {
1430 // Popups should not get activated.
1431 widget_view->SetPopupType(popup_type);
1432 }
1433 // Save the created widget associated with the route so we can show it later.
1434 pending_widget_views_[route_id] = widget_view;
1435
1436#if defined(OS_MACOSX)
1437 // A RenderWidgetHostViewMac has lifetime scoped to the view. We'll retain it
1438 // to allow it to survive the trip without being hosted.
1439 base::mac::NSObjectRetain(widget_view->GetNativeView());
1440#endif
1441}
1442
1443void WebContentsImpl::ShowCreatedWindow(int route_id,
1444 WindowOpenDisposition disposition,
1445 const gfx::Rect& initial_pos,
1446 bool user_gesture) {
1447 WebContentsImpl* contents = GetCreatedWindow(route_id);
[email protected]eda238a12012-09-07 23:44:001448 if (contents) {
1449 WebContentsDelegate* delegate = GetDelegate();
1450 if (delegate) {
1451 delegate->AddNewContents(
1452 this, contents, disposition, initial_pos, user_gesture, NULL);
1453 }
1454 }
[email protected]bafe6cd2012-05-23 23:09:501455}
1456
1457void WebContentsImpl::ShowCreatedWidget(int route_id,
1458 const gfx::Rect& initial_pos) {
1459 ShowCreatedWidget(route_id, false, initial_pos);
1460}
1461
1462void WebContentsImpl::ShowCreatedFullscreenWidget(int route_id) {
1463 ShowCreatedWidget(route_id, true, gfx::Rect());
1464}
1465
1466void WebContentsImpl::ShowCreatedWidget(int route_id,
1467 bool is_fullscreen,
1468 const gfx::Rect& initial_pos) {
[email protected]bafe6cd2012-05-23 23:09:501469 RenderWidgetHostViewPort* widget_host_view =
1470 RenderWidgetHostViewPort::FromRWHV(GetCreatedWidget(route_id));
1471 if (!widget_host_view)
1472 return;
[email protected]4aebbca2013-09-17 22:26:491473 if (is_fullscreen) {
[email protected]d7f80ba2013-10-12 07:42:311474 DCHECK_EQ(MSG_ROUTING_NONE, fullscreen_widget_routing_id_);
1475 fullscreen_widget_routing_id_ = route_id;
[email protected]4aebbca2013-09-17 22:26:491476 if (delegate_ && delegate_->EmbedsFullscreenWidget()) {
1477 widget_host_view->InitAsChild(GetRenderWidgetHostView()->GetNativeView());
1478 delegate_->ToggleFullscreenModeForTab(this, true);
1479 } else {
1480 widget_host_view->InitAsFullscreen(GetRenderWidgetHostViewPort());
[email protected]4aebbca2013-09-17 22:26:491481 }
[email protected]4aebbca2013-09-17 22:26:491482 FOR_EACH_OBSERVER(WebContentsObserver,
1483 observers_,
1484 DidShowFullscreenWidget(route_id));
1485 if (!widget_host_view->HasFocus())
1486 widget_host_view->Focus();
1487 } else {
[email protected]f8497342013-02-05 22:15:021488 widget_host_view->InitAsPopup(GetRenderWidgetHostViewPort(), initial_pos);
[email protected]4aebbca2013-09-17 22:26:491489 }
[email protected]89054502012-06-03 10:29:241490
1491 RenderWidgetHostImpl* render_widget_host_impl =
1492 RenderWidgetHostImpl::From(widget_host_view->GetRenderWidgetHost());
1493 render_widget_host_impl->Init();
[email protected]d7f80ba2013-10-12 07:42:311494 // Only allow privileged mouse lock for fullscreen render widget, which is
1495 // used to implement Pepper Flash fullscreen.
1496 render_widget_host_impl->set_allow_privileged_mouse_lock(is_fullscreen);
[email protected]bafe6cd2012-05-23 23:09:501497
1498#if defined(OS_MACOSX)
1499 // A RenderWidgetHostViewMac has lifetime scoped to the view. Now that it's
1500 // properly embedded (or purposefully ignored) we can release the retain we
1501 // took in CreateNewWidget().
1502 base::mac::NSObjectRelease(widget_host_view->GetNativeView());
1503#endif
1504}
1505
1506WebContentsImpl* WebContentsImpl::GetCreatedWindow(int route_id) {
1507 PendingContents::iterator iter = pending_contents_.find(route_id);
1508
1509 // Certain systems can block the creation of new windows. If we didn't succeed
1510 // in creating one, just return NULL.
1511 if (iter == pending_contents_.end()) {
1512 return NULL;
1513 }
1514
1515 WebContentsImpl* new_contents = iter->second;
1516 pending_contents_.erase(route_id);
[email protected]7fff43e2013-05-21 20:21:101517 RemoveDestructionObserver(new_contents);
[email protected]bafe6cd2012-05-23 23:09:501518
[email protected]d70bea92013-04-05 04:23:341519 // Don't initialize the guest WebContents immediately.
1520 if (new_contents->GetRenderProcessHost()->IsGuest())
1521 return new_contents;
1522
[email protected]bafe6cd2012-05-23 23:09:501523 if (!new_contents->GetRenderProcessHost()->HasConnection() ||
1524 !new_contents->GetRenderViewHost()->GetView())
1525 return NULL;
1526
1527 // TODO(brettw): It seems bogus to reach into here and initialize the host.
1528 static_cast<RenderViewHostImpl*>(new_contents->GetRenderViewHost())->Init();
1529 return new_contents;
1530}
1531
1532RenderWidgetHostView* WebContentsImpl::GetCreatedWidget(int route_id) {
1533 PendingWidgetViews::iterator iter = pending_widget_views_.find(route_id);
1534 if (iter == pending_widget_views_.end()) {
1535 DCHECK(false);
1536 return NULL;
1537 }
1538
1539 RenderWidgetHostView* widget_host_view = iter->second;
1540 pending_widget_views_.erase(route_id);
1541
1542 RenderWidgetHost* widget_host = widget_host_view->GetRenderWidgetHost();
1543 if (!widget_host->GetProcess()->HasConnection()) {
1544 // The view has gone away or the renderer crashed. Nothing to do.
1545 return NULL;
1546 }
1547
1548 return widget_host_view;
1549}
1550
[email protected]f13b4202012-06-12 23:53:231551void WebContentsImpl::RequestMediaAccessPermission(
[email protected]33662e52013-01-07 21:31:091552 const MediaStreamRequest& request,
[email protected]8ff00d72012-10-23 19:12:211553 const MediaResponseCallback& callback) {
[email protected]f13b4202012-06-12 23:53:231554 if (delegate_)
1555 delegate_->RequestMediaAccessPermission(this, request, callback);
1556 else
[email protected]b5f76742013-04-29 15:05:591557 callback.Run(MediaStreamDevices(), scoped_ptr<MediaStreamUI>());
[email protected]f13b4202012-06-12 23:53:231558}
1559
[email protected]cc9200432013-07-23 23:02:401560SessionStorageNamespace* WebContentsImpl::GetSessionStorageNamespace(
1561 SiteInstance* instance) {
1562 return controller_.GetSessionStorageNamespace(instance);
1563}
1564
[email protected]9b159a52013-10-03 17:24:551565FrameTree* WebContentsImpl::GetFrameTree() {
1566 return &frame_tree_;
1567}
1568
[email protected]edc3af82013-12-12 21:24:071569void WebContentsImpl::OnShowValidationMessage(
1570 const gfx::Rect& anchor_in_root_view,
[email protected]6ff9c8f2013-12-20 09:05:291571 const base::string16& main_text,
1572 const base::string16& sub_text) {
[email protected]edc3af82013-12-12 21:24:071573 if (delegate_)
1574 delegate_->ShowValidationMessage(
1575 this, anchor_in_root_view, main_text, sub_text);
1576}
1577
1578void WebContentsImpl::OnHideValidationMessage() {
1579 if (delegate_)
1580 delegate_->HideValidationMessage(this);
1581}
1582
1583void WebContentsImpl::OnMoveValidationMessage(
1584 const gfx::Rect& anchor_in_root_view) {
1585 if (delegate_)
1586 delegate_->MoveValidationMessage(this, anchor_in_root_view);
1587}
1588
[email protected]32deec62013-05-15 23:55:041589void WebContentsImpl::DidSendScreenRects(RenderWidgetHostImpl* rwh) {
1590 if (browser_plugin_embedder_)
[email protected]a7568e62013-06-14 07:50:441591 browser_plugin_embedder_->DidSendScreenRects();
[email protected]32deec62013-05-15 23:55:041592}
1593
[email protected]b172aee2012-04-10 17:05:261594void WebContentsImpl::UpdatePreferredSize(const gfx::Size& pref_size) {
[email protected]222f5822014-02-05 23:40:491595 const gfx::Size old_size = GetPreferredSize();
[email protected]bcd2815602012-01-14 18:17:231596 preferred_size_ = pref_size;
[email protected]222f5822014-02-05 23:40:491597 OnPreferredSizeChanged(old_size);
[email protected]0548c5352011-09-07 00:33:331598}
1599
[email protected]b172aee2012-04-10 17:05:261600void WebContentsImpl::ResizeDueToAutoResize(const gfx::Size& new_size) {
[email protected]61e2b3cc2012-03-02 16:13:341601 if (delegate_)
1602 delegate_->ResizeDueToAutoResize(this, new_size);
1603}
1604
[email protected]b172aee2012-04-10 17:05:261605WebContents* WebContentsImpl::OpenURL(const OpenURLParams& params) {
[email protected]e5d549d2011-12-28 01:29:201606 if (!delegate_)
1607 return NULL;
[email protected]00c37fc2011-08-02 00:22:501608
[email protected]e5d549d2011-12-28 01:29:201609 WebContents* new_contents = delegate_->OpenURLFromTab(this, params);
[email protected]e5d549d2011-12-28 01:29:201610 return new_contents;
[email protected]d5f942ba2008-09-26 19:30:341611}
1612
[email protected]6b618e62012-08-16 12:59:181613bool WebContentsImpl::Send(IPC::Message* message) {
1614 if (!GetRenderViewHost()) {
1615 delete message;
1616 return false;
1617 }
1618
1619 return GetRenderViewHost()->Send(message);
1620}
1621
[email protected]b172aee2012-04-10 17:05:261622bool WebContentsImpl::NavigateToPendingEntry(
[email protected]c5eed492012-01-04 17:07:501623 NavigationController::ReloadType reload_type) {
[email protected]3691e5cf2014-01-22 10:16:201624 return frame_tree_.root()->navigator()->NavigateToPendingEntry(
1625 frame_tree_.GetMainFrame(), reload_type);
[email protected]876bc832010-09-07 16:29:541626}
[email protected]96d185d2009-04-24 03:28:541627
[email protected]a86c0e962013-12-17 17:10:391628void WebContentsImpl::RenderFrameForInterstitialPageCreated(
1629 RenderFrameHost* render_frame_host) {
[email protected]ba45bfd2012-05-22 21:51:441630 FOR_EACH_OBSERVER(WebContentsObserver, observers_,
[email protected]a86c0e962013-12-17 17:10:391631 RenderFrameForInterstitialPageCreated(render_frame_host));
[email protected]ba45bfd2012-05-22 21:51:441632}
1633
[email protected]20ca0382013-02-28 19:50:071634void WebContentsImpl::AttachInterstitialPage(
1635 InterstitialPageImpl* interstitial_page) {
1636 DCHECK(interstitial_page);
[email protected]fa944cb82013-11-15 17:51:211637 GetRenderManager()->set_interstitial_page(interstitial_page);
[email protected]90fb08ed2013-09-24 17:43:291638
1639 // Cancel any visible dialogs so that they don't interfere with the
1640 // interstitial.
1641 if (dialog_manager_)
1642 dialog_manager_->CancelActiveAndPendingDialogs(this);
1643
[email protected]20ca0382013-02-28 19:50:071644 FOR_EACH_OBSERVER(WebContentsObserver, observers_,
1645 DidAttachInterstitialPage());
1646}
1647
1648void WebContentsImpl::DetachInterstitialPage() {
1649 if (GetInterstitialPage())
[email protected]fa944cb82013-11-15 17:51:211650 GetRenderManager()->remove_interstitial_page();
[email protected]20ca0382013-02-28 19:50:071651 FOR_EACH_OBSERVER(WebContentsObserver, observers_,
1652 DidDetachInterstitialPage());
1653}
1654
[email protected]b172aee2012-04-10 17:05:261655void WebContentsImpl::SetHistoryLengthAndPrune(
[email protected]b6583592012-01-25 19:52:331656 const SiteInstance* site_instance,
1657 int history_length,
1658 int32 minimum_page_id) {
[email protected]5229253b2011-08-16 14:36:411659 // SetHistoryLengthAndPrune doesn't work when there are pending cross-site
1660 // navigations. Callers should ensure that this is the case.
[email protected]fa944cb82013-11-15 17:51:211661 if (GetRenderManager()->pending_render_view_host()) {
[email protected]9e1ad4b2011-08-14 16:49:191662 NOTREACHED();
[email protected]796931a92011-08-10 01:32:141663 return;
[email protected]9e1ad4b2011-08-14 16:49:191664 }
[email protected]9f76c1e2012-03-05 15:15:581665 RenderViewHostImpl* rvh = GetRenderViewHostImpl();
[email protected]9e1ad4b2011-08-14 16:49:191666 if (!rvh) {
1667 NOTREACHED();
1668 return;
1669 }
[email protected]9f76c1e2012-03-05 15:15:581670 if (site_instance && rvh->GetSiteInstance() != site_instance) {
[email protected]9e1ad4b2011-08-14 16:49:191671 NOTREACHED();
1672 return;
1673 }
[email protected]6b618e62012-08-16 12:59:181674 Send(new ViewMsg_SetHistoryLengthAndPrune(GetRoutingID(),
1675 history_length,
1676 minimum_page_id));
[email protected]796931a92011-08-10 01:32:141677}
1678
[email protected]b172aee2012-04-10 17:05:261679void WebContentsImpl::FocusThroughTabTraversal(bool reverse) {
[email protected]0bfbf882011-12-22 18:19:271680 if (ShowingInterstitialPage()) {
[email protected]fa944cb82013-11-15 17:51:211681 GetRenderManager()->interstitial_page()->FocusThroughTabTraversal(reverse);
[email protected]7e383692009-06-12 19:14:541682 return;
1683 }
[email protected]9f76c1e2012-03-05 15:15:581684 GetRenderViewHostImpl()->SetInitialFocus(reverse);
[email protected]96d185d2009-04-24 03:28:541685}
1686
[email protected]b172aee2012-04-10 17:05:261687bool WebContentsImpl::ShowingInterstitialPage() const {
[email protected]fa944cb82013-11-15 17:51:211688 return GetRenderManager()->interstitial_page() != NULL;
[email protected]96d185d2009-04-24 03:28:541689}
1690
[email protected]b172aee2012-04-10 17:05:261691InterstitialPage* WebContentsImpl::GetInterstitialPage() const {
[email protected]fa944cb82013-11-15 17:51:211692 return GetRenderManager()->interstitial_page();
[email protected]686493142011-07-15 21:47:221693}
1694
[email protected]b172aee2012-04-10 17:05:261695bool WebContentsImpl::IsSavable() {
[email protected]a53209b2012-01-20 16:48:161696 // WebKit creates Document object when MIME type is application/xhtml+xml,
1697 // so we also support this MIME type.
1698 return contents_mime_type_ == "text/html" ||
1699 contents_mime_type_ == "text/xml" ||
1700 contents_mime_type_ == "application/xhtml+xml" ||
1701 contents_mime_type_ == "text/plain" ||
1702 contents_mime_type_ == "text/css" ||
1703 net::IsSupportedJavascriptMimeType(contents_mime_type_.c_str());
1704}
1705
[email protected]b172aee2012-04-10 17:05:261706void WebContentsImpl::OnSavePage() {
[email protected]c7dd2f62011-07-18 15:57:591707 // If we can not save the page, try to download it.
[email protected]a53209b2012-01-20 16:48:161708 if (!IsSavable()) {
[email protected]35869622012-10-26 23:23:551709 RecordDownloadSource(INITIATED_BY_SAVE_PACKAGE_ON_NON_HTML);
[email protected]3c71576ce2013-07-23 02:00:011710 SaveFrame(GetURL(), Referrer());
[email protected]27678b2a2012-02-04 22:09:141711 return;
[email protected]c7dd2f62011-07-18 15:57:591712 }
1713
1714 Stop();
1715
1716 // Create the save package and possibly prompt the user for the name to save
1717 // the page as. The user prompt is an asynchronous operation that runs on
1718 // another thread.
1719 save_package_ = new SavePackage(this);
1720 save_package_->GetSaveInfo();
1721}
1722
1723// Used in automated testing to bypass prompting the user for file names.
1724// Instead, the names and paths are hard coded rather than running them through
1725// file name sanitation and extension / mime checking.
[email protected]2dec8ec2013-02-07 19:20:341726bool WebContentsImpl::SavePage(const base::FilePath& main_file,
1727 const base::FilePath& dir_path,
[email protected]8ff00d72012-10-23 19:12:211728 SavePageType save_type) {
[email protected]c7dd2f62011-07-18 15:57:591729 // Stop the page from navigating.
1730 Stop();
1731
1732 save_package_ = new SavePackage(this, save_type, main_file, dir_path);
[email protected]8ff00d72012-10-23 19:12:211733 return save_package_->Init(SavePackageDownloadCreatedCallback());
[email protected]c7dd2f62011-07-18 15:57:591734}
1735
[email protected]3c71576ce2013-07-23 02:00:011736void WebContentsImpl::SaveFrame(const GURL& url,
1737 const Referrer& referrer) {
1738 if (!GetURL().is_valid())
1739 return;
1740 bool is_main_frame = (url == GetURL());
1741
1742 DownloadManager* dlm =
1743 BrowserContext::GetDownloadManager(GetBrowserContext());
1744 if (!dlm)
1745 return;
1746 int64 post_id = -1;
1747 if (is_main_frame) {
[email protected]6286a372013-10-09 04:03:271748 const NavigationEntry* entry = controller_.GetLastCommittedEntry();
[email protected]3c71576ce2013-07-23 02:00:011749 if (entry)
1750 post_id = entry->GetPostID();
1751 }
1752 scoped_ptr<DownloadUrlParameters> params(
1753 DownloadUrlParameters::FromWebContents(this, url));
1754 params->set_referrer(referrer);
1755 params->set_post_id(post_id);
1756 params->set_prefer_cache(true);
1757 if (post_id >= 0)
1758 params->set_method("POST");
1759 params->set_prompt(true);
1760 dlm->DownloadUrl(params.Pass());
1761}
1762
[email protected]b172aee2012-04-10 17:05:261763void WebContentsImpl::GenerateMHTML(
[email protected]2dec8ec2013-02-07 19:20:341764 const base::FilePath& file,
[email protected]18516cf92013-08-28 18:19:481765 const base::Callback<void(int64)>& callback) {
1766 MHTMLGenerationManager::GetInstance()->SaveMHTML(this, file, callback);
[email protected]aa4f3972012-03-01 18:12:121767}
1768
[email protected]6286a372013-10-09 04:03:271769// TODO(nasko): Rename this method to IsVisibleEntry.
[email protected]b172aee2012-04-10 17:05:261770bool WebContentsImpl::IsActiveEntry(int32 page_id) {
[email protected]6286a372013-10-09 04:03:271771 NavigationEntryImpl* visible_entry =
1772 NavigationEntryImpl::FromNavigationEntry(controller_.GetVisibleEntry());
1773 return (visible_entry != NULL &&
1774 visible_entry->site_instance() == GetSiteInstance() &&
1775 visible_entry->GetPageID() == page_id);
[email protected]420ae012009-04-24 05:16:321776}
1777
[email protected]b172aee2012-04-10 17:05:261778const std::string& WebContentsImpl::GetContentsMimeType() const {
[email protected]0bfbf882011-12-22 18:19:271779 return contents_mime_type_;
1780}
1781
[email protected]b172aee2012-04-10 17:05:261782bool WebContentsImpl::WillNotifyDisconnection() const {
[email protected]0bfbf882011-12-22 18:19:271783 return notify_disconnection_;
1784}
1785
[email protected]b172aee2012-04-10 17:05:261786void WebContentsImpl::SetOverrideEncoding(const std::string& encoding) {
[email protected]be1f56ab2011-12-22 06:55:311787 SetEncoding(encoding);
[email protected]6b618e62012-08-16 12:59:181788 Send(new ViewMsg_SetPageEncoding(GetRoutingID(), encoding));
[email protected]8cb5d5b2010-02-09 11:36:161789}
1790
[email protected]b172aee2012-04-10 17:05:261791void WebContentsImpl::ResetOverrideEncoding() {
[email protected]be1f56ab2011-12-22 06:55:311792 encoding_.clear();
[email protected]6b618e62012-08-16 12:59:181793 Send(new ViewMsg_ResetPageEncodingToDefault(GetRoutingID()));
[email protected]8cb5d5b2010-02-09 11:36:161794}
1795
[email protected]8ff00d72012-10-23 19:12:211796RendererPreferences* WebContentsImpl::GetMutableRendererPrefs() {
[email protected]0bfbf882011-12-22 18:19:271797 return &renderer_preferences_;
1798}
1799
[email protected]e35ccd52012-05-23 16:22:471800void WebContentsImpl::Close() {
1801 Close(GetRenderViewHost());
1802}
1803
[email protected]cf200a562013-05-03 16:24:291804void WebContentsImpl::DragSourceEndedAt(int client_x, int client_y,
[email protected]180ef242013-11-07 06:50:461805 int screen_x, int screen_y, blink::WebDragOperation operation) {
[email protected]cf200a562013-05-03 16:24:291806 if (browser_plugin_embedder_.get())
1807 browser_plugin_embedder_->DragSourceEndedAt(client_x, client_y,
1808 screen_x, screen_y, operation);
1809 if (GetRenderViewHost())
1810 GetRenderViewHostImpl()->DragSourceEndedAt(client_x, client_y,
1811 screen_x, screen_y, operation);
1812}
1813
1814void WebContentsImpl::DragSourceMovedTo(int client_x, int client_y,
1815 int screen_x, int screen_y) {
1816 if (browser_plugin_embedder_.get())
1817 browser_plugin_embedder_->DragSourceMovedTo(client_x, client_y,
1818 screen_x, screen_y);
1819 if (GetRenderViewHost())
1820 GetRenderViewHostImpl()->DragSourceMovedTo(client_x, client_y,
1821 screen_x, screen_y);
1822}
1823
[email protected]d60f3702013-12-26 16:30:241824void WebContentsImpl::DidGetResourceResponseStart(
1825 const ResourceRequestDetails& details) {
1826 controller_.ssl_manager()->DidStartResourceResponse(details);
1827
1828 FOR_EACH_OBSERVER(WebContentsObserver, observers_,
1829 DidGetResourceResponseStart(details));
1830
1831 // TODO(avi): Remove. http://crbug.com/170921
1832 NotificationService::current()->Notify(
1833 NOTIFICATION_RESOURCE_RESPONSE_STARTED,
1834 Source<WebContents>(this),
1835 Details<const ResourceRequestDetails>(&details));
1836}
1837
1838void WebContentsImpl::DidGetRedirectForResourceRequest(
1839 RenderViewHost* render_view_host,
1840 const ResourceRedirectDetails& details) {
1841 controller_.ssl_manager()->DidReceiveResourceRedirect(details);
1842
1843 FOR_EACH_OBSERVER(
1844 WebContentsObserver,
1845 observers_,
1846 DidGetRedirectForResourceRequest(render_view_host, details));
1847
1848 // TODO(avi): Remove. http://crbug.com/170921
1849 NotificationService::current()->Notify(
1850 NOTIFICATION_RESOURCE_RECEIVED_REDIRECT,
1851 Source<WebContents>(this),
1852 Details<const ResourceRedirectDetails>(&details));
1853}
1854
[email protected]b172aee2012-04-10 17:05:261855void WebContentsImpl::SystemDragEnded() {
[email protected]151a63d2011-12-20 22:32:521856 if (GetRenderViewHost())
[email protected]9f76c1e2012-03-05 15:15:581857 GetRenderViewHostImpl()->DragSourceSystemDragEnded();
[email protected]6934a702011-12-20 00:04:511858 if (delegate_)
1859 delegate_->DragEnded();
[email protected]cf200a562013-05-03 16:24:291860 if (browser_plugin_embedder_.get())
1861 browser_plugin_embedder_->SystemDragEnded();
[email protected]7813bd72011-02-05 02:19:341862}
1863
[email protected]e35ccd52012-05-23 16:22:471864void WebContentsImpl::UserGestureDone() {
1865 OnUserGesture();
1866}
1867
[email protected]b172aee2012-04-10 17:05:261868void WebContentsImpl::SetClosedByUserGesture(bool value) {
[email protected]0bfbf882011-12-22 18:19:271869 closed_by_user_gesture_ = value;
1870}
1871
[email protected]b172aee2012-04-10 17:05:261872bool WebContentsImpl::GetClosedByUserGesture() const {
[email protected]0bfbf882011-12-22 18:19:271873 return closed_by_user_gesture_;
1874}
1875
[email protected]b172aee2012-04-10 17:05:261876double WebContentsImpl::GetZoomLevel() const {
[email protected]5c9250872012-01-30 17:24:051877 HostZoomMapImpl* zoom_map = static_cast<HostZoomMapImpl*>(
[email protected]5fe3713a2012-02-22 08:31:561878 HostZoomMap::GetForBrowserContext(GetBrowserContext()));
[email protected]b75b8292010-10-01 07:28:251879 if (!zoom_map)
[email protected]d0b8d092010-10-25 04:05:171880 return 0;
[email protected]b75b8292010-10-01 07:28:251881
1882 double zoom_level;
1883 if (temporary_zoom_settings_) {
1884 zoom_level = zoom_map->GetTemporaryZoomLevel(
[email protected]9f76c1e2012-03-05 15:15:581885 GetRenderProcessHost()->GetID(), GetRenderViewHost()->GetRoutingID());
[email protected]b75b8292010-10-01 07:28:251886 } else {
[email protected]2ae88d12011-10-14 09:11:191887 GURL url;
[email protected]6286a372013-10-09 04:03:271888 NavigationEntry* entry = GetController().GetLastCommittedEntry();
[email protected]2ae88d12011-10-14 09:11:191889 // Since zoom map is updated using rewritten URL, use rewritten URL
1890 // to get the zoom level.
[email protected]6286a372013-10-09 04:03:271891 url = entry ? entry->GetURL() : GURL::EmptyGURL();
[email protected]367c5c1d2013-03-11 18:59:021892 zoom_level = zoom_map->GetZoomLevelForHostAndScheme(url.scheme(),
1893 net::GetHostOrSpecFromURL(url));
[email protected]b75b8292010-10-01 07:28:251894 }
[email protected]d0b8d092010-10-25 04:05:171895 return zoom_level;
1896}
[email protected]b75b8292010-10-01 07:28:251897
[email protected]b172aee2012-04-10 17:05:261898int WebContentsImpl::GetZoomPercent(bool* enable_increment,
[email protected]9a8408902012-09-26 16:17:591899 bool* enable_decrement) const {
[email protected]d0b8d092010-10-25 04:05:171900 *enable_decrement = *enable_increment = false;
[email protected]0f083402011-11-22 02:59:011901 // Calculate the zoom percent from the factor. Round up to the nearest whole
1902 // number.
[email protected]b75b8292010-10-01 07:28:251903 int percent = static_cast<int>(
[email protected]7940b8e2013-07-25 23:08:491904 ZoomLevelToZoomFactor(GetZoomLevel()) * 100 + 0.5);
[email protected]b75b8292010-10-01 07:28:251905 *enable_decrement = percent > minimum_zoom_percent_;
1906 *enable_increment = percent < maximum_zoom_percent_;
1907 return percent;
1908}
1909
[email protected]b172aee2012-04-10 17:05:261910void WebContentsImpl::ViewSource() {
[email protected]1788e772010-12-15 16:40:501911 if (!delegate_)
1912 return;
1913
[email protected]6286a372013-10-09 04:03:271914 NavigationEntry* entry = GetController().GetLastCommittedEntry();
1915 if (!entry)
[email protected]1788e772010-12-15 16:40:501916 return;
1917
[email protected]6286a372013-10-09 04:03:271918 delegate_->ViewSourceForTab(this, entry->GetURL());
[email protected]77d8d622010-12-15 10:30:121919}
1920
[email protected]b172aee2012-04-10 17:05:261921void WebContentsImpl::ViewFrameSource(const GURL& url,
[email protected]691aa2f2013-05-28 22:52:041922 const PageState& page_state) {
[email protected]932b7a12011-03-09 12:50:271923 if (!delegate_)
1924 return;
1925
[email protected]691aa2f2013-05-28 22:52:041926 delegate_->ViewSourceForFrame(this, url, page_state);
[email protected]932b7a12011-03-09 12:50:271927}
1928
[email protected]b172aee2012-04-10 17:05:261929int WebContentsImpl::GetMinimumZoomPercent() const {
[email protected]0bfbf882011-12-22 18:19:271930 return minimum_zoom_percent_;
1931}
1932
[email protected]b172aee2012-04-10 17:05:261933int WebContentsImpl::GetMaximumZoomPercent() const {
[email protected]0bfbf882011-12-22 18:19:271934 return maximum_zoom_percent_;
1935}
1936
[email protected]b172aee2012-04-10 17:05:261937gfx::Size WebContentsImpl::GetPreferredSize() const {
[email protected]222f5822014-02-05 23:40:491938 return capturer_count_ == 0 ? preferred_size_ : preferred_size_for_capture_;
[email protected]bcd2815602012-01-14 18:17:231939}
1940
[email protected]b172aee2012-04-10 17:05:261941bool WebContentsImpl::GotResponseToLockMouseRequest(bool allowed) {
[email protected]0bfbf882011-12-22 18:19:271942 return GetRenderViewHost() ?
[email protected]9f76c1e2012-03-05 15:15:581943 GetRenderViewHostImpl()->GotResponseToLockMouseRequest(allowed) : false;
[email protected]0bfbf882011-12-22 18:19:271944}
1945
[email protected]b172aee2012-04-10 17:05:261946bool WebContentsImpl::HasOpener() const {
[email protected]14392a52012-05-02 20:28:441947 return opener_ != NULL;
[email protected]a0358d72012-03-09 14:06:501948}
1949
[email protected]cb805452013-05-22 15:16:211950void WebContentsImpl::DidChooseColorInColorChooser(SkColor color) {
[email protected]6b618e62012-08-16 12:59:181951 Send(new ViewMsg_DidChooseColorResponse(
[email protected]cb805452013-05-22 15:16:211952 GetRoutingID(), color_chooser_identifier_, color));
[email protected]da8543762012-03-20 08:52:201953}
1954
[email protected]cb805452013-05-22 15:16:211955void WebContentsImpl::DidEndColorChooser() {
1956 Send(new ViewMsg_DidEndColorChooser(GetRoutingID(),
1957 color_chooser_identifier_));
1958 color_chooser_.reset();
1959 color_chooser_identifier_ = 0;
[email protected]da8543762012-03-20 08:52:201960}
1961
[email protected]41225fe2013-03-29 05:32:021962int WebContentsImpl::DownloadImage(const GURL& url,
1963 bool is_favicon,
[email protected]263cb08f2013-09-18 00:26:301964 uint32_t max_bitmap_size,
[email protected]41225fe2013-03-29 05:32:021965 const ImageDownloadCallback& callback) {
[email protected]795c28972012-12-06 06:13:391966 RenderViewHost* host = GetRenderViewHost();
[email protected]263cb08f2013-09-18 00:26:301967 int id = StartDownload(host, url, is_favicon, max_bitmap_size);
[email protected]41225fe2013-03-29 05:32:021968 image_download_map_[id] = callback;
[email protected]795c28972012-12-06 06:13:391969 return id;
1970}
1971
[email protected]5dcaf8e2013-12-28 01:31:421972bool WebContentsImpl::IsSubframe() const {
1973 return is_subframe_;
1974}
1975
[email protected]9649d492014-01-10 07:15:521976void WebContentsImpl::SetZoomLevel(double level) {
1977 Send(new ViewMsg_SetZoomLevel(GetRoutingID(), level));
1978 BrowserPluginEmbedder* embedder = GetBrowserPluginEmbedder();
1979 if (embedder)
1980 embedder->SetZoomLevel(level);
1981}
1982
[email protected]36ec24f2014-01-09 00:32:081983void WebContentsImpl::Find(int request_id,
1984 const base::string16& search_text,
1985 const blink::WebFindOptions& options) {
1986 Send(new ViewMsg_Find(GetRoutingID(), request_id, search_text, options));
1987}
1988
1989void WebContentsImpl::StopFinding(StopFindAction action) {
1990 Send(new ViewMsg_StopFinding(GetRoutingID(), action));
1991}
1992
[email protected]b172aee2012-04-10 17:05:261993bool WebContentsImpl::FocusLocationBarByDefault() {
[email protected]6286a372013-10-09 04:03:271994 NavigationEntry* entry = controller_.GetVisibleEntry();
[email protected]081dc522013-05-15 04:59:201995 if (entry && entry->GetURL() == GURL(kAboutBlankURL))
[email protected]0c9406632013-02-08 01:13:331996 return true;
1997 return delegate_ && delegate_->ShouldFocusLocationBarByDefault(this);
[email protected]0bfbf882011-12-22 18:19:271998}
1999
[email protected]b172aee2012-04-10 17:05:262000void WebContentsImpl::SetFocusToLocationBar(bool select_all) {
[email protected]0bfbf882011-12-22 18:19:272001 if (delegate_)
2002 delegate_->SetFocusToLocationBar(select_all);
[email protected]c40d6232011-03-25 00:16:212003}
2004
[email protected]52913802013-12-10 05:52:182005void WebContentsImpl::DidStartProvisionalLoad(
2006 RenderFrameHostImpl* render_frame_host,
[email protected]54047eb52012-05-08 21:45:572007 int64 frame_id,
[email protected]d37c33e2012-10-12 13:35:132008 int64 parent_frame_id,
[email protected]54047eb52012-05-08 21:45:572009 bool is_main_frame,
[email protected]52913802013-12-10 05:52:182010 const GURL& validated_url,
2011 bool is_error_page,
2012 bool is_iframe_srcdoc) {
2013 if (is_main_frame)
[email protected]d974a0a2013-01-10 01:43:572014 DidChangeLoadProgress(0);
2015
[email protected]0d60f0192011-04-14 12:40:102016 // Notify observers about the start of the provisional load.
[email protected]d8c660432011-12-22 20:51:252017 FOR_EACH_OBSERVER(WebContentsObserver, observers_,
[email protected]d37c33e2012-10-12 13:35:132018 DidStartProvisionalLoadForFrame(frame_id, parent_frame_id,
2019 is_main_frame, validated_url, is_error_page,
[email protected]52913802013-12-10 05:52:182020 is_iframe_srcdoc, render_frame_host->render_view_host()));
[email protected]400992b2012-06-14 00:03:542021
2022 if (is_main_frame) {
[email protected]52913802013-12-10 05:52:182023 FOR_EACH_OBSERVER(
2024 WebContentsObserver,
2025 observers_,
2026 ProvisionalChangeToMainFrameUrl(validated_url,
[email protected]66256d72014-01-10 22:41:582027 render_frame_host));
[email protected]400992b2012-06-14 00:03:542028 }
2029}
2030
[email protected]3109fbb72014-01-06 23:57:152031void WebContentsImpl::DidFailProvisionalLoadWithError(
2032 RenderFrameHostImpl* render_frame_host,
2033 const FrameHostMsg_DidFailProvisionalLoadWithError_Params& params) {
2034 GURL validated_url(params.url);
2035 FOR_EACH_OBSERVER(
2036 WebContentsObserver,
2037 observers_,
2038 DidFailProvisionalLoad(params.frame_id,
2039 params.frame_unique_name,
2040 params.is_main_frame,
2041 validated_url,
2042 params.error_code,
2043 params.error_description,
2044 render_frame_host->render_view_host()));
2045}
2046
[email protected]b80624c2014-02-09 02:46:552047void WebContentsImpl::DidFailLoadWithError(
2048 RenderFrameHostImpl* render_frame_host,
2049 int64 frame_id,
2050 const GURL& url,
2051 bool is_main_frame,
2052 int error_code,
2053 const base::string16& error_description) {
2054 FOR_EACH_OBSERVER(WebContentsObserver, observers_,
2055 DidFailLoad(frame_id, url, is_main_frame,
2056 error_code, error_description,
2057 render_frame_host->render_view_host()));
2058}
2059
[email protected]52913802013-12-10 05:52:182060void WebContentsImpl::NotifyChangedNavigationState(
2061 InvalidateTypes changed_flags) {
2062 NotifyNavigationStateChanged(changed_flags);
2063}
2064
[email protected]3691e5cf2014-01-22 10:16:202065void WebContentsImpl::AboutToNavigateRenderFrame(
2066 RenderFrameHostImpl* render_frame_host) {
2067 // Notify observers that we will navigate in this RenderView.
2068 FOR_EACH_OBSERVER(
2069 WebContentsObserver,
2070 observers_,
2071 AboutToNavigateRenderView(render_frame_host->render_view_host()));
2072}
2073
2074void WebContentsImpl::DidStartNavigationToPendingEntry(
2075 RenderFrameHostImpl* render_frame_host,
2076 const GURL& url,
2077 NavigationController::ReloadType reload_type) {
2078 // Notify observers about navigation.
2079 FOR_EACH_OBSERVER(
2080 WebContentsObserver,
2081 observers_,
2082 DidStartNavigationToPendingEntry(url, reload_type));
2083}
2084
[email protected]400992b2012-06-14 00:03:542085void WebContentsImpl::DidRedirectProvisionalLoad(
[email protected]66256d72014-01-10 22:41:582086 RenderFrameHostImpl* render_frame_host,
2087 const GURL& validated_target_url) {
[email protected]400992b2012-06-14 00:03:542088 // Notify observers about the provisional change in the main frame URL.
[email protected]66256d72014-01-10 22:41:582089 FOR_EACH_OBSERVER(
2090 WebContentsObserver,
2091 observers_,
2092 ProvisionalChangeToMainFrameUrl(validated_target_url,
2093 render_frame_host));
[email protected]724159a2010-12-30 01:11:182094}
2095
[email protected]b172aee2012-04-10 17:05:262096void WebContentsImpl::OnDidLoadResourceFromMemoryCache(
[email protected]724159a2010-12-30 01:11:182097 const GURL& url,
[email protected]70435962011-08-02 20:13:282098 const std::string& security_info,
2099 const std::string& http_method,
[email protected]6d6cfb3a2012-05-23 22:53:182100 const std::string& mime_type,
[email protected]70435962011-08-02 20:13:282101 ResourceType::Type resource_type) {
[email protected]28620862011-03-22 23:07:192102 base::StatsCounter cache("WebKit.CacheHit");
[email protected]724159a2010-12-30 01:11:182103 cache.Increment();
2104
2105 // Send out a notification that we loaded a resource from our memory cache.
[email protected]70d66502011-09-23 00:55:082106 int cert_id = 0;
2107 net::CertStatus cert_status = 0;
2108 int security_bits = -1;
2109 int connection_status = 0;
[email protected]0bbd63b2013-11-29 00:02:122110 SignedCertificateTimestampIDStatusList signed_certificate_timestamp_ids;
[email protected]8ff00d72012-10-23 19:12:212111 DeserializeSecurityInfo(security_info, &cert_id, &cert_status,
[email protected]0bbd63b2013-11-29 00:02:122112 &security_bits, &connection_status,
2113 &signed_certificate_timestamp_ids);
2114 // TODO(alcutter,eranm): Pass signed_certificate_timestamp_ids into details
[email protected]8ff00d72012-10-23 19:12:212115 LoadFromMemoryCacheDetails details(
[email protected]a02cf4c2012-06-20 01:02:002116 url, GetRenderProcessHost()->GetID(), cert_id, cert_status, http_method,
2117 mime_type, resource_type);
[email protected]724159a2010-12-30 01:11:182118
[email protected]b0f724c2013-09-05 04:21:132119 controller_.ssl_manager()->DidLoadFromMemoryCache(details);
2120
2121 FOR_EACH_OBSERVER(WebContentsObserver, observers_,
2122 DidLoadResourceFromMemoryCache(details));
2123
[email protected]8bfc8272013-09-09 20:10:532124 if (url.is_valid() && url.SchemeIsHTTPOrHTTPS()) {
2125 scoped_refptr<net::URLRequestContextGetter> request_context(
2126 resource_type == ResourceType::MEDIA ?
2127 GetBrowserContext()->GetMediaRequestContextForRenderProcess(
2128 GetRenderProcessHost()->GetID()) :
2129 GetBrowserContext()->GetRequestContextForRenderProcess(
2130 GetRenderProcessHost()->GetID()));
2131 BrowserThread::PostTask(
2132 BrowserThread::IO,
2133 FROM_HERE,
2134 base::Bind(&NotifyCacheOnIO, request_context, url, http_method));
2135 }
[email protected]724159a2010-12-30 01:11:182136}
2137
[email protected]b172aee2012-04-10 17:05:262138void WebContentsImpl::OnDidDisplayInsecureContent() {
[email protected]e6e30ac2014-01-13 21:24:392139 RecordAction(base::UserMetricsAction("SSL.DisplayedInsecureContent"));
[email protected]724159a2010-12-30 01:11:182140 displayed_insecure_content_ = true;
[email protected]e67ebf32013-02-13 11:07:192141 SSLManager::NotifySSLInternalStateChanged(
2142 GetController().GetBrowserContext());
[email protected]724159a2010-12-30 01:11:182143}
2144
[email protected]b172aee2012-04-10 17:05:262145void WebContentsImpl::OnDidRunInsecureContent(
[email protected]92771112011-01-20 00:13:022146 const std::string& security_origin, const GURL& target_url) {
[email protected]9450c462013-11-23 01:22:582147 LOG(WARNING) << security_origin << " ran insecure content from "
2148 << target_url.possibly_invalid_spec();
[email protected]e6e30ac2014-01-13 21:24:392149 RecordAction(base::UserMetricsAction("SSL.RanInsecureContent"));
[email protected]82114f52012-03-20 22:53:412150 if (EndsWith(security_origin, kDotGoogleDotCom, false))
[email protected]e6e30ac2014-01-13 21:24:392151 RecordAction(base::UserMetricsAction("SSL.RanInsecureContentGoogle"));
[email protected]330614de2012-02-13 17:07:182152 controller_.ssl_manager()->DidRunInsecureContent(security_origin);
[email protected]f2b58c4d2011-06-01 23:29:412153 displayed_insecure_content_ = true;
[email protected]e67ebf32013-02-13 11:07:192154 SSLManager::NotifySSLInternalStateChanged(
2155 GetController().GetBrowserContext());
[email protected]724159a2010-12-30 01:11:182156}
2157
[email protected]b172aee2012-04-10 17:05:262158void WebContentsImpl::OnDocumentLoadedInFrame(int64 frame_id) {
[email protected]1d62cf72014-02-07 21:31:572159 CHECK(render_frame_message_source_);
2160 CHECK(!render_view_message_source_);
2161 RenderFrameHostImpl* rfh =
2162 static_cast<RenderFrameHostImpl*>(render_frame_message_source_);
2163
2164 FOR_EACH_OBSERVER(WebContentsObserver,
2165 observers_,
2166 DocumentLoadedInFrame(frame_id, rfh->render_view_host()));
[email protected]724159a2010-12-30 01:11:182167}
2168
[email protected]b172aee2012-04-10 17:05:262169void WebContentsImpl::OnDidFinishLoad(
[email protected]1a55c5be2011-11-29 11:36:312170 int64 frame_id,
[email protected]b502ed462013-01-08 08:20:062171 const GURL& url,
[email protected]1a55c5be2011-11-29 11:36:312172 bool is_main_frame) {
[email protected]8b3af1e2014-01-24 13:29:122173 if (!render_view_message_source_) {
2174 RecordAction(base::UserMetricsAction("BadMessageTerminate_RVD2"));
2175 GetRenderProcessHost()->ReceivedBadMessage();
2176 return;
2177 }
[email protected]a1b99262013-12-27 21:56:222178
2179 // --site-per-process mode has a short-term hack allowing cross-process
2180 // subframe pages to commit thinking they are top-level. Correct it here to
2181 // avoid confusing the observers.
2182 if (CommandLine::ForCurrentProcess()->HasSwitch(switches::kSitePerProcess) &&
2183 render_view_message_source_ != GetRenderViewHost())
2184 is_main_frame = false;
2185
[email protected]8b3af1e2014-01-24 13:29:122186 GURL validated_url(url);
[email protected]f114fa42013-12-06 17:06:442187 RenderProcessHost* render_process_host =
2188 render_view_message_source_->GetProcess();
[email protected]5dcaf8e2013-12-28 01:31:422189 render_process_host->FilterURL(false, &validated_url);
[email protected]d8c660432011-12-22 20:51:252190 FOR_EACH_OBSERVER(WebContentsObserver, observers_,
[email protected]7bb761892012-07-20 09:32:472191 DidFinishLoad(frame_id, validated_url, is_main_frame,
[email protected]f114fa42013-12-06 17:06:442192 render_view_message_source_));
[email protected]1a55c5be2011-11-29 11:36:312193}
2194
[email protected]b172aee2012-04-10 17:05:262195void WebContentsImpl::OnGoToEntryAtOffset(int offset) {
[email protected]216813952011-05-19 22:21:262196 if (!delegate_ || delegate_->OnGoToEntryOffset(offset)) {
[email protected]10f417c52011-12-28 21:04:232197 NavigationEntryImpl* entry = NavigationEntryImpl::FromNavigationEntry(
[email protected]022af742011-12-28 18:37:252198 controller_.GetEntryAtOffset(offset));
[email protected]216813952011-05-19 22:21:262199 if (!entry)
2200 return;
2201 // Note that we don't call NavigationController::GotToOffset() as we don't
2202 // want to create a pending navigation entry (it might end up lingering
2203 // http://crbug.com/51680).
[email protected]022af742011-12-28 18:37:252204 entry->SetTransitionType(
[email protected]8ff00d72012-10-23 19:12:212205 PageTransitionFromInt(
[email protected]36fc0392011-12-25 03:59:512206 entry->GetTransitionType() |
[email protected]8ff00d72012-10-23 19:12:212207 PAGE_TRANSITION_FORWARD_BACK));
[email protected]3691e5cf2014-01-22 10:16:202208 frame_tree_.root()->navigator()->NavigateToEntry(
2209 frame_tree_.GetMainFrame(),
2210 *entry,
2211 NavigationControllerImpl::NO_RELOAD);
[email protected]a13cc362011-07-28 21:29:572212
2213 // If the entry is being restored and doesn't have a SiteInstance yet, fill
2214 // it in now that we know. This allows us to find the entry when it commits.
2215 if (!entry->site_instance() &&
[email protected]10f417c52011-12-28 21:04:232216 entry->restore_type() != NavigationEntryImpl::RESTORE_NONE) {
[email protected]b6583592012-01-25 19:52:332217 entry->set_site_instance(
2218 static_cast<SiteInstanceImpl*>(GetPendingSiteInstance()));
[email protected]a13cc362011-07-28 21:29:572219 }
[email protected]216813952011-05-19 22:21:262220 }
2221}
2222
[email protected]b172aee2012-04-10 17:05:262223void WebContentsImpl::OnUpdateZoomLimits(int minimum_percent,
2224 int maximum_percent,
2225 bool remember) {
[email protected]216813952011-05-19 22:21:262226 minimum_zoom_percent_ = minimum_percent;
2227 maximum_zoom_percent_ = maximum_percent;
2228 temporary_zoom_settings_ = !remember;
2229}
2230
[email protected]b172aee2012-04-10 17:05:262231void WebContentsImpl::OnEnumerateDirectory(int request_id,
[email protected]2dec8ec2013-02-07 19:20:342232 const base::FilePath& path) {
[email protected]e5f2de02012-07-20 22:15:432233 if (!delegate_)
2234 return;
2235
[email protected]b9535422012-02-09 01:47:592236 ChildProcessSecurityPolicyImpl* policy =
2237 ChildProcessSecurityPolicyImpl::GetInstance();
[email protected]45d5c602013-10-07 18:33:222238 if (policy->CanReadFile(GetRenderProcessHost()->GetID(), path))
[email protected]b9535422012-02-09 01:47:592239 delegate_->EnumerateDirectory(this, request_id, path);
[email protected]3a29a6e2011-08-24 18:26:212240}
2241
[email protected]b172aee2012-04-10 17:05:262242void WebContentsImpl::OnJSOutOfMemory() {
[email protected]e5f2de02012-07-20 22:15:432243 if (delegate_)
2244 delegate_->JSOutOfMemory(this);
[email protected]7d189022011-08-25 22:54:202245}
2246
[email protected]b172aee2012-04-10 17:05:262247void WebContentsImpl::OnRegisterProtocolHandler(const std::string& protocol,
2248 const GURL& url,
[email protected]fcf75d42013-12-03 20:11:262249 const base::string16& title,
[email protected]3a3b75a2012-06-01 08:38:362250 bool user_gesture) {
[email protected]e5f2de02012-07-20 22:15:432251 if (!delegate_)
2252 return;
2253
[email protected]b9535422012-02-09 01:47:592254 ChildProcessSecurityPolicyImpl* policy =
2255 ChildProcessSecurityPolicyImpl::GetInstance();
[email protected]8f810632013-06-06 22:33:322256 if (policy->IsPseudoScheme(protocol))
[email protected]b9535422012-02-09 01:47:592257 return;
[email protected]8f810632013-06-06 22:33:322258
[email protected]3a3b75a2012-06-01 08:38:362259 delegate_->RegisterProtocolHandler(this, protocol, url, title, user_gesture);
[email protected]7d189022011-08-25 22:54:202260}
2261
[email protected]b172aee2012-04-10 17:05:262262void WebContentsImpl::OnFindReply(int request_id,
2263 int number_of_matches,
2264 const gfx::Rect& selection_rect,
2265 int active_match_ordinal,
2266 bool final_update) {
[email protected]e5f2de02012-07-20 22:15:432267 if (delegate_) {
2268 delegate_->FindReply(this, request_id, number_of_matches, selection_rect,
2269 active_match_ordinal, final_update);
2270 }
[email protected]b888919c2011-09-02 00:32:162271}
2272
[email protected]59363fc92012-09-05 03:46:312273#if defined(OS_ANDROID)
2274void WebContentsImpl::OnFindMatchRectsReply(
2275 int version,
2276 const std::vector<gfx::RectF>& rects,
2277 const gfx::RectF& active_rect) {
2278 if (delegate_)
2279 delegate_->FindMatchRectsReply(this, version, rects, active_rect);
2280}
[email protected]583418cc2013-01-17 14:01:102281
[email protected]1ff427972013-02-07 21:14:072282void WebContentsImpl::OnOpenDateTimeDialog(
2283 const ViewHostMsg_DateTimeDialogValue_Params& value) {
[email protected]ee59cbec2013-08-16 14:59:092284 date_time_chooser_->ShowDialog(ContentViewCore::FromWebContents(this),
2285 GetRenderViewHost(),
2286 value.dialog_type,
[email protected]e8072562013-12-04 06:04:132287 value.dialog_value,
[email protected]ee59cbec2013-08-16 14:59:092288 value.minimum,
2289 value.maximum,
[email protected]6e08bfb2013-12-07 02:56:172290 value.step,
2291 value.suggestions);
[email protected]583418cc2013-01-17 14:01:102292}
2293
[email protected]a794f3a2013-10-30 17:00:322294void WebContentsImpl::OnJavaBridgeGetChannelHandle(IPC::Message* reply_msg) {
2295 java_bridge_dispatcher_host_manager_->OnGetChannelHandle(
[email protected]f114fa42013-12-06 17:06:442296 render_view_message_source_, reply_msg);
[email protected]a794f3a2013-10-30 17:00:322297}
2298
[email protected]59363fc92012-09-05 03:46:312299#endif
2300
[email protected]f114fa42013-12-06 17:06:442301void WebContentsImpl::OnPepperPluginHung(int plugin_child_id,
2302 const base::FilePath& path,
2303 bool is_hung) {
2304 UMA_HISTOGRAM_COUNTS("Pepper.PluginHung", 1);
2305
2306 FOR_EACH_OBSERVER(WebContentsObserver, observers_,
2307 PluginHungStatusChanged(plugin_child_id, path, is_hung));
2308}
2309
2310void WebContentsImpl::OnPluginCrashed(const base::FilePath& plugin_path,
[email protected]cf4d6e742013-01-10 14:06:422311 base::ProcessId plugin_pid) {
[email protected]3fc07c52012-04-20 00:27:442312 FOR_EACH_OBSERVER(WebContentsObserver, observers_,
[email protected]cf4d6e742013-01-10 14:06:422313 PluginCrashed(plugin_path, plugin_pid));
[email protected]d952a052011-09-06 18:42:452314}
2315
[email protected]b172aee2012-04-10 17:05:262316void WebContentsImpl::OnAppCacheAccessed(const GURL& manifest_url,
2317 bool blocked_by_policy) {
[email protected]7fc4bbb2011-09-08 21:23:102318 // Notify observers about navigation.
[email protected]d8c660432011-12-22 20:51:252319 FOR_EACH_OBSERVER(WebContentsObserver, observers_,
[email protected]7fc4bbb2011-09-08 21:23:102320 AppCacheAccessed(manifest_url, blocked_by_policy));
2321}
2322
[email protected]8bc5ff02013-11-29 06:34:032323void WebContentsImpl::OnOpenColorChooser(
2324 int color_chooser_id,
2325 SkColor color,
2326 const std::vector<ColorSuggestion>& suggestions) {
2327 ColorChooser* new_color_chooser =
2328 delegate_->OpenColorChooser(this, color, suggestions);
[email protected]820957a2014-01-14 14:56:302329 if (!new_color_chooser)
[email protected]cb805452013-05-22 15:16:212330 return;
[email protected]820957a2014-01-14 14:56:302331 if (color_chooser_)
2332 color_chooser_->End();
[email protected]cb805452013-05-22 15:16:212333 color_chooser_.reset(new_color_chooser);
2334 color_chooser_identifier_ = color_chooser_id;
[email protected]da8543762012-03-20 08:52:202335}
2336
[email protected]b172aee2012-04-10 17:05:262337void WebContentsImpl::OnEndColorChooser(int color_chooser_id) {
[email protected]da8543762012-03-20 08:52:202338 if (color_chooser_ &&
[email protected]cb805452013-05-22 15:16:212339 color_chooser_id == color_chooser_identifier_)
[email protected]da8543762012-03-20 08:52:202340 color_chooser_->End();
2341}
2342
[email protected]b172aee2012-04-10 17:05:262343void WebContentsImpl::OnSetSelectedColorInColorChooser(int color_chooser_id,
[email protected]55578b0a2012-04-18 14:31:322344 SkColor color) {
[email protected]da8543762012-03-20 08:52:202345 if (color_chooser_ &&
[email protected]cb805452013-05-22 15:16:212346 color_chooser_id == color_chooser_identifier_)
[email protected]da8543762012-03-20 08:52:202347 color_chooser_->SetSelectedColor(color);
2348}
2349
[email protected]d0759f492012-04-19 22:50:502350// This exists for render views that don't have a WebUI, but do have WebUI
2351// bindings enabled.
2352void WebContentsImpl::OnWebUISend(const GURL& source_url,
2353 const std::string& name,
2354 const base::ListValue& args) {
2355 if (delegate_)
2356 delegate_->WebUISend(this, source_url, name, args);
2357}
2358
[email protected]d8415ad92012-08-23 14:40:502359void WebContentsImpl::OnRequestPpapiBrokerPermission(
[email protected]ea0309c2013-08-06 19:35:442360 int routing_id,
[email protected]d8415ad92012-08-23 14:40:502361 const GURL& url,
[email protected]2dec8ec2013-02-07 19:20:342362 const base::FilePath& plugin_path) {
[email protected]8c8fc292012-11-23 18:57:162363 if (!delegate_) {
[email protected]ea0309c2013-08-06 19:35:442364 OnPpapiBrokerPermissionResult(routing_id, false);
[email protected]8c8fc292012-11-23 18:57:162365 return;
[email protected]d8415ad92012-08-23 14:40:502366 }
2367
[email protected]8c8fc292012-11-23 18:57:162368 if (!delegate_->RequestPpapiBrokerPermission(
2369 this, url, plugin_path,
2370 base::Bind(&WebContentsImpl::OnPpapiBrokerPermissionResult,
[email protected]ea0309c2013-08-06 19:35:442371 base::Unretained(this), routing_id))) {
[email protected]8c8fc292012-11-23 18:57:162372 NOTIMPLEMENTED();
[email protected]ea0309c2013-08-06 19:35:442373 OnPpapiBrokerPermissionResult(routing_id, false);
[email protected]8c8fc292012-11-23 18:57:162374 }
[email protected]d8415ad92012-08-23 14:40:502375}
2376
[email protected]ea0309c2013-08-06 19:35:442377void WebContentsImpl::OnPpapiBrokerPermissionResult(int routing_id,
[email protected]d8415ad92012-08-23 14:40:502378 bool result) {
[email protected]ea0309c2013-08-06 19:35:442379 Send(new ViewMsg_PpapiBrokerPermissionResult(routing_id, result));
[email protected]d8415ad92012-08-23 14:40:502380}
2381
[email protected]c4538072013-03-18 02:17:552382void WebContentsImpl::OnBrowserPluginMessage(const IPC::Message& message) {
[email protected]19be7a62012-10-01 23:03:372383 // This creates a BrowserPluginEmbedder, which handles all the BrowserPlugin
[email protected]b479912c2013-01-23 00:07:082384 // specific messages for this WebContents. This means that any message from
[email protected]c4538072013-03-18 02:17:552385 // a BrowserPlugin prior to this will be ignored.
[email protected]7a846df2012-09-20 19:17:392386 // For more info, see comment above classes BrowserPluginEmbedder and
2387 // BrowserPluginGuest.
2388 CHECK(!browser_plugin_embedder_.get());
[email protected]8eb04562013-03-06 03:41:142389 browser_plugin_embedder_.reset(BrowserPluginEmbedder::Create(this));
[email protected]b479912c2013-01-23 00:07:082390 browser_plugin_embedder_->OnMessageReceived(message);
[email protected]19be7a62012-10-01 23:03:372391}
2392
[email protected]41225fe2013-03-29 05:32:022393void WebContentsImpl::OnDidDownloadImage(
[email protected]795c28972012-12-06 06:13:392394 int id,
[email protected]749fadd2013-05-15 08:37:482395 int http_status_code,
[email protected]795c28972012-12-06 06:13:392396 const GURL& image_url,
[email protected]263cb08f2013-09-18 00:26:302397 const std::vector<SkBitmap>& bitmaps,
2398 const std::vector<gfx::Size>& original_bitmap_sizes) {
[email protected]229ef3b2014-01-21 07:46:132399 if (bitmaps.size() != original_bitmap_sizes.size())
2400 return;
2401
[email protected]41225fe2013-03-29 05:32:022402 ImageDownloadMap::iterator iter = image_download_map_.find(id);
2403 if (iter == image_download_map_.end()) {
[email protected]795c28972012-12-06 06:13:392404 // Currently WebContents notifies us of ANY downloads so that it is
2405 // possible to get here.
2406 return;
2407 }
2408 if (!iter->second.is_null()) {
[email protected]263cb08f2013-09-18 00:26:302409 iter->second.Run(
2410 id, http_status_code, image_url, bitmaps, original_bitmap_sizes);
[email protected]795c28972012-12-06 06:13:392411 }
[email protected]41225fe2013-03-29 05:32:022412 image_download_map_.erase(id);
[email protected]795c28972012-12-06 06:13:392413}
2414
2415void WebContentsImpl::OnUpdateFaviconURL(
2416 int32 page_id,
2417 const std::vector<FaviconURL>& candidates) {
2418 FOR_EACH_OBSERVER(WebContentsObserver, observers_,
2419 DidUpdateFaviconURL(page_id, candidates));
2420}
2421
[email protected]1dd0bb752014-02-01 01:16:262422void WebContentsImpl::OnMediaPlayingNotification(int64 player_cookie,
2423 bool has_video,
2424 bool has_audio) {
2425// Chrome OS does its own detection of audio and video.
2426#if !defined(OS_CHROMEOS)
2427 scoped_ptr<PowerSaveBlocker> blocker;
2428 if (has_video) {
2429 blocker = PowerSaveBlocker::Create(
2430 PowerSaveBlocker::kPowerSaveBlockPreventDisplaySleep, "Playing video");
2431#if defined(OS_ANDROID)
2432 static_cast<PowerSaveBlockerImpl*>(blocker.get())
2433 ->InitDisplaySleepBlocker(GetView()->GetNativeView());
2434#endif
2435 } else if (has_audio) {
2436 blocker = PowerSaveBlocker::Create(
2437 PowerSaveBlocker::kPowerSaveBlockPreventAppSuspension, "Playing audio");
2438 }
2439
2440 if (blocker) {
2441 power_save_blockers_[render_view_message_source_][player_cookie] =
2442 blocker.release();
2443 }
2444#endif // !defined(OS_CHROMEOS)
2445}
2446
2447void WebContentsImpl::OnMediaPausedNotification(int64 player_cookie) {
[email protected]d9030b82013-07-19 08:26:062448 // Chrome OS does its own detection of audio and video.
2449#if !defined(OS_CHROMEOS)
[email protected]1dd0bb752014-02-01 01:16:262450 delete power_save_blockers_[render_view_message_source_][player_cookie];
2451 power_save_blockers_[render_view_message_source_].erase(player_cookie);
[email protected]d9030b82013-07-19 08:26:062452#endif // !defined(OS_CHROMEOS)
2453}
2454
[email protected]9f268072013-11-07 00:02:152455void WebContentsImpl::OnFirstVisuallyNonEmptyPaint(int32 page_id) {
2456 FOR_EACH_OBSERVER(WebContentsObserver, observers_,
2457 DidFirstVisuallyNonEmptyPaint(page_id));
2458}
[email protected]d9030b82013-07-19 08:26:062459
[email protected]e67ebf32013-02-13 11:07:192460void WebContentsImpl::DidChangeVisibleSSLState() {
2461 FOR_EACH_OBSERVER(WebContentsObserver, observers_,
2462 DidChangeVisibleSSLState());
2463}
2464
[email protected]17e286e2013-03-01 23:29:392465void WebContentsImpl::NotifyBeforeFormRepostWarningShow() {
2466 FOR_EACH_OBSERVER(WebContentsObserver, observers_,
2467 BeforeFormRepostWarningShow());
2468}
2469
[email protected]ec6c05f2013-10-23 18:41:572470
2471void WebContentsImpl::ActivateAndShowRepostFormWarningDialog() {
2472 Activate();
2473 if (delegate_)
2474 delegate_->ShowRepostFormWarningDialog(this);
2475}
2476
[email protected]96d185d2009-04-24 03:28:542477// Notifies the RenderWidgetHost instance about the fact that the page is
[email protected]91621872013-10-08 04:04:592478// loading, or done loading.
2479void WebContentsImpl::SetIsLoading(RenderViewHost* render_view_host,
2480 bool is_loading,
[email protected]b172aee2012-04-10 17:05:262481 LoadNotificationDetails* details) {
[email protected]96d185d2009-04-24 03:28:542482 if (is_loading == is_loading_)
2483 return;
2484
2485 if (!is_loading) {
[email protected]fcf75d42013-12-03 20:11:262486 load_state_ = net::LoadStateWithParam(net::LOAD_STATE_IDLE,
2487 base::string16());
[email protected]96d185d2009-04-24 03:28:542488 load_state_host_.clear();
[email protected]094e5b22009-09-25 04:23:562489 upload_size_ = 0;
2490 upload_position_ = 0;
[email protected]96d185d2009-04-24 03:28:542491 }
2492
[email protected]fa944cb82013-11-15 17:51:212493 GetRenderManager()->SetIsLoading(is_loading);
[email protected]96d185d2009-04-24 03:28:542494
2495 is_loading_ = is_loading;
2496 waiting_for_response_ = is_loading;
2497
[email protected]6ebdc9b2010-09-27 16:55:572498 if (delegate_)
2499 delegate_->LoadingStateChanged(this);
[email protected]8ff00d72012-10-23 19:12:212500 NotifyNavigationStateChanged(INVALIDATE_TYPE_LOAD);
[email protected]96d185d2009-04-24 03:28:542501
[email protected]eab61442013-11-14 18:35:482502 std::string url = (details ? details->url.possibly_invalid_spec() : "NULL");
[email protected]91621872013-10-08 04:04:592503 if (is_loading) {
[email protected]eab61442013-11-14 18:35:482504 TRACE_EVENT_ASYNC_BEGIN1("browser", "WebContentsImpl Loading", this,
2505 "URL", url);
[email protected]91621872013-10-08 04:04:592506 FOR_EACH_OBSERVER(WebContentsObserver, observers_,
2507 DidStartLoading(render_view_host));
2508 } else {
[email protected]eab61442013-11-14 18:35:482509 TRACE_EVENT_ASYNC_END1("browser", "WebContentsImpl Loading", this,
2510 "URL", url);
[email protected]91621872013-10-08 04:04:592511 FOR_EACH_OBSERVER(WebContentsObserver, observers_,
2512 DidStopLoading(render_view_host));
2513 }
[email protected]66798902013-10-01 18:40:162514
2515 // TODO(avi): Remove. http://crbug.com/170921
[email protected]8ff00d72012-10-23 19:12:212516 int type = is_loading ? NOTIFICATION_LOAD_START : NOTIFICATION_LOAD_STOP;
2517 NotificationDetails det = NotificationService::NoDetails();
[email protected]96d185d2009-04-24 03:28:542518 if (details)
[email protected]8ff00d72012-10-23 19:12:212519 det = Details<LoadNotificationDetails>(details);
2520 NotificationService::current()->Notify(
2521 type, Source<NavigationController>(&controller_), det);
[email protected]96d185d2009-04-24 03:28:542522}
2523
[email protected]f17986f482014-02-07 01:50:402524void WebContentsImpl::DidNavigateMainFramePostCommit(
2525 const LoadCommittedDetails& details,
2526 const ViewHostMsg_FrameNavigate_Params& params) {
2527 if (details.is_navigation_to_different_page()) {
2528 // Clear the status bubble. This is a workaround for a bug where WebKit
2529 // doesn't let us know that the cursor left an element during a
2530 // transition (this is also why the mouse cursor remains as a hand after
2531 // clicking on a link); see bugs 1184641 and 980803. We don't want to
2532 // clear the bubble when a user navigates to a named anchor in the same
2533 // page.
2534 UpdateTargetURL(details.entry->GetPageID(), GURL());
2535 }
2536
2537 if (!details.is_in_page) {
2538 // Once the main frame is navigated, we're no longer considered to have
2539 // displayed insecure content.
2540 displayed_insecure_content_ = false;
2541 SSLManager::NotifySSLInternalStateChanged(
2542 GetController().GetBrowserContext());
2543 }
2544
2545 // Notify observers about navigation.
2546 FOR_EACH_OBSERVER(WebContentsObserver, observers_,
2547 DidNavigateMainFrame(details, params));
2548}
2549
2550void WebContentsImpl::DidNavigateAnyFramePostCommit(
2551 RenderViewHost* render_view_host,
2552 const LoadCommittedDetails& details,
2553 const ViewHostMsg_FrameNavigate_Params& params) {
2554 // If we navigate off the page, close all JavaScript dialogs.
2555 if (dialog_manager_ && !details.is_in_page)
2556 dialog_manager_->CancelActiveAndPendingDialogs(this);
2557
2558 // Notify observers about navigation.
2559 FOR_EACH_OBSERVER(WebContentsObserver, observers_,
2560 DidNavigateAnyFrame(details, params));
2561}
2562
2563bool WebContentsImpl::ShouldAssignSiteForURL(const GURL& url) {
2564 // about:blank should not "use up" a new SiteInstance. The SiteInstance can
2565 // still be used for a normal web site.
2566 if (url == GURL(kAboutBlankURL))
2567 return false;
2568
2569 // The embedder will then have the opportunity to determine if the URL
2570 // should "use up" the SiteInstance.
2571 return GetContentClient()->browser()->ShouldAssignSiteForURL(url);
2572}
2573
[email protected]b172aee2012-04-10 17:05:262574void WebContentsImpl::UpdateMaxPageIDIfNecessary(RenderViewHost* rvh) {
[email protected]74ce1ad2011-12-16 21:51:462575 // If we are creating a RVH for a restored controller, then we need to make
2576 // sure the RenderView starts with a next_page_id_ larger than the number
2577 // of restored entries. This must be called before the RenderView starts
2578 // navigating (to avoid a race between the browser updating max_page_id and
2579 // the renderer updating next_page_id_). Because of this, we only call this
2580 // from CreateRenderView and allow that to notify the RenderView for us.
[email protected]71fde352011-12-29 03:29:562581 int max_restored_page_id = controller_.GetMaxRestoredPageID();
[email protected]9f76c1e2012-03-05 15:15:582582 if (max_restored_page_id >
2583 GetMaxPageIDForSiteInstance(rvh->GetSiteInstance()))
2584 UpdateMaxPageIDForSiteInstance(rvh->GetSiteInstance(),
2585 max_restored_page_id);
[email protected]420ae012009-04-24 05:16:322586}
2587
[email protected]b172aee2012-04-10 17:05:262588bool WebContentsImpl::UpdateTitleForEntry(NavigationEntryImpl* entry,
[email protected]fcf75d42013-12-03 20:11:262589 const base::string16& title) {
[email protected]420ae012009-04-24 05:16:322590 // For file URLs without a title, use the pathname instead. In the case of a
2591 // synthesized title, we don't want the update to count toward the "one set
2592 // per page of the title to history."
[email protected]fcf75d42013-12-03 20:11:262593 base::string16 final_title;
[email protected]420ae012009-04-24 05:16:322594 bool explicit_set;
[email protected]36fc0392011-12-25 03:59:512595 if (entry && entry->GetURL().SchemeIsFile() && title.empty()) {
[email protected]32956122013-12-25 07:29:242596 final_title = base::UTF8ToUTF16(entry->GetURL().ExtractFileName());
[email protected]420ae012009-04-24 05:16:322597 explicit_set = false; // Don't count synthetic titles toward the set limit.
2598 } else {
[email protected]acafd272011-07-26 17:35:572599 TrimWhitespace(title, TRIM_ALL, &final_title);
[email protected]420ae012009-04-24 05:16:322600 explicit_set = true;
2601 }
2602
[email protected]987fc3a2011-05-26 14:18:092603 // If a page is created via window.open and never navigated,
2604 // there will be no navigation entry. In this situation,
[email protected]73eb2602012-02-09 19:50:552605 // |page_title_when_no_navigation_entry_| will be used for page title.
[email protected]987fc3a2011-05-26 14:18:092606 if (entry) {
[email protected]36fc0392011-12-25 03:59:512607 if (final_title == entry->GetTitle())
[email protected]987fc3a2011-05-26 14:18:092608 return false; // Nothing changed, don't bother.
[email protected]420ae012009-04-24 05:16:322609
[email protected]36fc0392011-12-25 03:59:512610 entry->SetTitle(final_title);
[email protected]987fc3a2011-05-26 14:18:092611 } else {
2612 if (page_title_when_no_navigation_entry_ == final_title)
2613 return false; // Nothing changed, don't bother.
2614
2615 page_title_when_no_navigation_entry_ = final_title;
2616 }
[email protected]420ae012009-04-24 05:16:322617
[email protected]420ae012009-04-24 05:16:322618 // Lastly, set the title for the view.
[email protected]790e2fd2011-09-21 20:28:232619 view_->SetPageTitle(final_title);
[email protected]420ae012009-04-24 05:16:322620
[email protected]66798902013-10-01 18:40:162621 FOR_EACH_OBSERVER(WebContentsObserver, observers_,
[email protected]1ef02d242013-10-07 16:18:532622 TitleWasSet(entry, explicit_set));
[email protected]66798902013-10-01 18:40:162623
2624 // TODO(avi): Remove. http://crbug.com/170921
[email protected]8ff00d72012-10-23 19:12:212625 std::pair<NavigationEntry*, bool> details =
[email protected]2bb171882012-03-07 02:09:462626 std::make_pair(entry, explicit_set);
[email protected]8ff00d72012-10-23 19:12:212627 NotificationService::current()->Notify(
2628 NOTIFICATION_WEB_CONTENTS_TITLE_UPDATED,
2629 Source<WebContents>(this),
2630 Details<std::pair<NavigationEntry*, bool> >(&details));
[email protected]cbc0e1b2010-04-12 18:33:042631
[email protected]420ae012009-04-24 05:16:322632 return true;
2633}
2634
[email protected]7b712ee22013-10-03 00:57:282635void WebContentsImpl::NotifySwapped(RenderViewHost* old_host,
2636 RenderViewHost* new_host) {
[email protected]420ae012009-04-24 05:16:322637 // After sending out a swap notification, we need to send a disconnect
2638 // notification so that clients that pick up a pointer to |this| can NULL the
2639 // pointer. See Bug 1230284.
2640 notify_disconnection_ = true;
[email protected]da7a7182013-09-06 08:11:112641 FOR_EACH_OBSERVER(WebContentsObserver, observers_,
[email protected]7b712ee22013-10-03 00:57:282642 RenderViewHostChanged(old_host, new_host));
[email protected]da7a7182013-09-06 08:11:112643
2644 // TODO(avi): Remove. http://crbug.com/170921
[email protected]7b712ee22013-10-03 00:57:282645 std::pair<RenderViewHost*, RenderViewHost*> details =
2646 std::make_pair(old_host, new_host);
[email protected]8ff00d72012-10-23 19:12:212647 NotificationService::current()->Notify(
[email protected]7b712ee22013-10-03 00:57:282648 NOTIFICATION_RENDER_VIEW_HOST_CHANGED,
[email protected]8ff00d72012-10-23 19:12:212649 Source<WebContents>(this),
[email protected]7b712ee22013-10-03 00:57:282650 Details<std::pair<RenderViewHost*, RenderViewHost*> >(&details));
[email protected]7a846df2012-09-20 19:17:392651
2652 // Ensure that the associated embedder gets cleared after a RenderViewHost
2653 // gets swapped, so we don't reuse the same embedder next time a
2654 // RenderViewHost is attached to this WebContents.
2655 RemoveBrowserPluginEmbedder();
[email protected]420ae012009-04-24 05:16:322656}
2657
[email protected]da7a7182013-09-06 08:11:112658// TODO(avi): Remove this entire function because this notification is already
2659// covered by two observer functions. http://crbug.com/170921
[email protected]b172aee2012-04-10 17:05:262660void WebContentsImpl::NotifyDisconnected() {
[email protected]420ae012009-04-24 05:16:322661 if (!notify_disconnection_)
2662 return;
2663
2664 notify_disconnection_ = false;
[email protected]8ff00d72012-10-23 19:12:212665 NotificationService::current()->Notify(
2666 NOTIFICATION_WEB_CONTENTS_DISCONNECTED,
2667 Source<WebContents>(this),
2668 NotificationService::NoDetails());
[email protected]420ae012009-04-24 05:16:322669}
2670
[email protected]cbb1ef592013-06-05 19:49:462671void WebContentsImpl::NotifyNavigationEntryCommitted(
2672 const LoadCommittedDetails& load_details) {
2673 FOR_EACH_OBSERVER(
2674 WebContentsObserver, observers_, NavigationEntryCommitted(load_details));
2675}
2676
[email protected]f114fa42013-12-06 17:06:442677bool WebContentsImpl::OnMessageReceived(RenderFrameHost* render_frame_host,
2678 const IPC::Message& message) {
2679 return OnMessageReceived(NULL, render_frame_host, message);
[email protected]271ff5792013-12-04 22:29:312680}
2681
[email protected]b849847b2013-12-10 21:57:582682void WebContentsImpl::RenderFrameCreated(RenderFrameHost* render_frame_host) {
2683 // Note this is only for subframes, the notification for the main frame
2684 // happens in RenderViewCreated.
2685 FOR_EACH_OBSERVER(WebContentsObserver,
2686 observers_,
2687 RenderFrameCreated(render_frame_host));
2688}
2689
2690void WebContentsImpl::RenderFrameDeleted(RenderFrameHost* render_frame_host) {
2691 FOR_EACH_OBSERVER(WebContentsObserver,
2692 observers_,
2693 RenderFrameDeleted(render_frame_host));
2694}
2695
[email protected]a09d53ce2014-01-31 00:46:422696void WebContentsImpl::WorkerCrashed(RenderFrameHost* render_frame_host) {
[email protected]b765deb2013-12-18 06:43:302697 if (delegate_)
2698 delegate_->WorkerCrashed(this);
2699}
2700
[email protected]a09d53ce2014-01-31 00:46:422701void WebContentsImpl::ShowContextMenu(RenderFrameHost* render_frame_host,
2702 const ContextMenuParams& params) {
2703 // Allow WebContentsDelegates to handle the context menu operation first.
[email protected]63028f52014-02-10 16:45:402704 if (delegate_ && delegate_->HandleContextMenu(params))
[email protected]a09d53ce2014-01-31 00:46:422705 return;
2706
2707 render_view_host_delegate_view_->ShowContextMenu(render_frame_host, params);
2708}
2709
[email protected]a86c0e962013-12-17 17:10:392710WebContents* WebContentsImpl::GetAsWebContents() {
2711 return this;
2712}
2713
[email protected]5a3bdf52012-05-24 15:12:572714RenderViewHostDelegateView* WebContentsImpl::GetDelegateView() {
2715 return render_view_host_delegate_view_;
[email protected]420ae012009-04-24 05:16:322716}
2717
[email protected]8d3347f2009-07-09 22:00:212718RenderViewHostDelegate::RendererManagement*
[email protected]b172aee2012-04-10 17:05:262719WebContentsImpl::GetRendererManagementDelegate() {
[email protected]fa944cb82013-11-15 17:51:212720 return GetRenderManager();
[email protected]8d3347f2009-07-09 22:00:212721}
2722
[email protected]8ff00d72012-10-23 19:12:212723RendererPreferences WebContentsImpl::GetRendererPrefs(
2724 BrowserContext* browser_context) const {
[email protected]840b1512009-07-21 16:53:462725 return renderer_preferences_;
[email protected]80d96fa2009-06-10 22:34:512726}
2727
[email protected]b172aee2012-04-10 17:05:262728gfx::Rect WebContentsImpl::GetRootWindowResizerRect() const {
[email protected]b7a756d42012-01-23 18:08:172729 if (delegate_)
2730 return delegate_->GetRootWindowResizerRect();
2731 return gfx::Rect();
2732}
2733
[email protected]7a846df2012-09-20 19:17:392734void WebContentsImpl::RemoveBrowserPluginEmbedder() {
[email protected]59383c782013-04-17 16:43:272735 if (browser_plugin_embedder_)
[email protected]7a846df2012-09-20 19:17:392736 browser_plugin_embedder_.reset();
2737}
2738
[email protected]b172aee2012-04-10 17:05:262739void WebContentsImpl::RenderViewCreated(RenderViewHost* render_view_host) {
[email protected]14392a52012-05-02 20:28:442740 // Don't send notifications if we are just creating a swapped-out RVH for
2741 // the opener chain. These won't be used for view-source or WebUI, so it's
2742 // ok to return early.
[email protected]04c2576d2014-02-07 12:11:582743 if (static_cast<RenderViewHostImpl*>(render_view_host)->IsSwappedOut())
[email protected]14392a52012-05-02 20:28:442744 return;
2745
[email protected]86f98a22013-03-20 14:35:002746 if (delegate_)
2747 view_->SetOverscrollControllerEnabled(delegate_->CanOverscrollContent());
[email protected]a6b73c62013-02-11 23:05:082748
[email protected]8ff00d72012-10-23 19:12:212749 NotificationService::current()->Notify(
2750 NOTIFICATION_WEB_CONTENTS_RENDER_VIEW_HOST_CREATED,
2751 Source<WebContents>(this),
2752 Details<RenderViewHost>(render_view_host));
[email protected]420ae012009-04-24 05:16:322753
2754 // When we're creating views, we're still doing initial setup, so we always
[email protected]e0112912011-02-02 22:54:352755 // use the pending Web UI rather than any possibly existing committed one.
[email protected]fa944cb82013-11-15 17:51:212756 if (GetRenderManager()->pending_web_ui())
2757 GetRenderManager()->pending_web_ui()->RenderViewCreated(render_view_host);
[email protected]420ae012009-04-24 05:16:322758
[email protected]6286a372013-10-09 04:03:272759 NavigationEntry* entry = controller_.GetPendingEntry();
[email protected]e770b1e92013-08-29 14:26:332760 if (entry && entry->IsViewSourceMode()) {
[email protected]420ae012009-04-24 05:16:322761 // Put the renderer in view source mode.
[email protected]6b618e62012-08-16 12:59:182762 render_view_host->Send(
[email protected]9f76c1e2012-03-05 15:15:582763 new ViewMsg_EnableViewSourceMode(render_view_host->GetRoutingID()));
[email protected]420ae012009-04-24 05:16:322764 }
[email protected]0666aef2009-05-13 19:48:082765
[email protected]60780f412013-02-25 16:34:102766 view_->RenderViewCreated(render_view_host);
[email protected]11f764bb2011-05-25 19:45:262767
2768 FOR_EACH_OBSERVER(
[email protected]d8c660432011-12-22 20:51:252769 WebContentsObserver, observers_, RenderViewCreated(render_view_host));
[email protected]b849847b2013-12-10 21:57:582770
2771 // We tell the observers now instead of when the main RenderFrameHostImpl is
2772 // constructed because otherwise it would be too early (i.e. IPCs sent to the
2773 // frame would be dropped because it's not created yet).
2774 RenderFrameHost* main_frame = GetMainFrame();
2775 FOR_EACH_OBSERVER(
2776 WebContentsObserver, observers_, RenderFrameCreated(main_frame));
[email protected]420ae012009-04-24 05:16:322777}
2778
[email protected]b172aee2012-04-10 17:05:262779void WebContentsImpl::RenderViewReady(RenderViewHost* rvh) {
[email protected]151a63d2011-12-20 22:32:522780 if (rvh != GetRenderViewHost()) {
[email protected]420ae012009-04-24 05:16:322781 // Don't notify the world, since this came from a renderer in the
2782 // background.
2783 return;
2784 }
2785
[email protected]da7a7182013-09-06 08:11:112786 notify_disconnection_ = true;
2787 // TODO(avi): Remove. http://crbug.com/170921
2788 NotificationService::current()->Notify(
2789 NOTIFICATION_WEB_CONTENTS_CONNECTED,
2790 Source<WebContents>(this),
2791 NotificationService::NoDetails());
2792
[email protected]be1f56ab2011-12-22 06:55:312793 bool was_crashed = IsCrashed();
[email protected]443b80e2010-12-14 00:42:232794 SetIsCrashed(base::TERMINATION_STATUS_STILL_RUNNING, 0);
[email protected]9d8a4642009-07-29 17:25:302795
2796 // Restore the focus to the tab (otherwise the focus will be on the top
2797 // window).
[email protected]484ae5912010-09-29 19:16:142798 if (was_crashed && !FocusLocationBarByDefault() &&
2799 (!delegate_ || delegate_->ShouldFocusPageAfterCrash())) {
[email protected]f3615f02013-02-26 06:09:062800 view_->Focus();
[email protected]484ae5912010-09-29 19:16:142801 }
[email protected]32ded2212011-11-10 18:51:432802
[email protected]d8c660432011-12-22 20:51:252803 FOR_EACH_OBSERVER(WebContentsObserver, observers_, RenderViewReady());
[email protected]420ae012009-04-24 05:16:322804}
2805
[email protected]ec6a7eb2013-04-22 17:34:222806void WebContentsImpl::RenderViewTerminated(RenderViewHost* rvh,
2807 base::TerminationStatus status,
2808 int error_code) {
[email protected]151a63d2011-12-20 22:32:522809 if (rvh != GetRenderViewHost()) {
[email protected]420ae012009-04-24 05:16:322810 // The pending page's RenderViewHost is gone.
2811 return;
2812 }
2813
[email protected]d9030b82013-07-19 08:26:062814 ClearPowerSaveBlockers(rvh);
[email protected]91621872013-10-08 04:04:592815 SetIsLoading(rvh, false, NULL);
[email protected]420ae012009-04-24 05:16:322816 NotifyDisconnected();
[email protected]443b80e2010-12-14 00:42:232817 SetIsCrashed(status, error_code);
[email protected]be1f56ab2011-12-22 06:55:312818 GetView()->OnTabCrashed(GetCrashedStatus(), crashed_error_code_);
[email protected]420ae012009-04-24 05:16:322819
[email protected]d8c660432011-12-22 20:51:252820 FOR_EACH_OBSERVER(WebContentsObserver,
[email protected]9cddb1a22011-11-15 15:04:272821 observers_,
[email protected]58d5cfe2013-07-10 02:40:522822 RenderProcessGone(GetCrashedStatus()));
[email protected]420ae012009-04-24 05:16:322823}
2824
[email protected]b172aee2012-04-10 17:05:262825void WebContentsImpl::RenderViewDeleted(RenderViewHost* rvh) {
[email protected]d9030b82013-07-19 08:26:062826 ClearPowerSaveBlockers(rvh);
[email protected]fa944cb82013-11-15 17:51:212827 GetRenderManager()->RenderViewDeleted(rvh);
[email protected]d8c660432011-12-22 20:51:252828 FOR_EACH_OBSERVER(WebContentsObserver, observers_, RenderViewDeleted(rvh));
[email protected]2e4633c2009-07-09 16:58:062829}
2830
[email protected]f17986f482014-02-07 01:50:402831void WebContentsImpl::DidNavigate(
2832 RenderViewHost* rvh,
2833 const ViewHostMsg_FrameNavigate_Params& orig_params) {
2834 ViewHostMsg_FrameNavigate_Params params(orig_params);
2835 bool use_site_per_process =
2836 CommandLine::ForCurrentProcess()->HasSwitch(switches::kSitePerProcess);
2837 if (frame_tree_.IsFirstNavigationAfterSwap()) {
2838 // First navigation should be a main frame navigation.
2839 // TODO(creis): This DCHECK is currently disabled for --site-per-process
2840 // because cross-process subframe navigations still have a main frame
2841 // PageTransition.
2842 if (!use_site_per_process)
2843 DCHECK(PageTransitionIsMainFrame(params.transition));
2844 frame_tree_.OnFirstNavigationAfterSwap(params.frame_id);
2845 }
2846
2847 // When using --site-per-process, look up the FrameTreeNode ID that the
2848 // renderer-specific frame ID corresponds to.
2849 int64 frame_tree_node_id = frame_tree_.root()->frame_tree_node_id();
2850 if (use_site_per_process) {
2851 FrameTreeNode* source_node = frame_tree_.FindByFrameID(params.frame_id);
2852 if (source_node)
2853 frame_tree_node_id = source_node->frame_tree_node_id();
2854
2855 // TODO(creis): In the short term, cross-process subframe navigations are
2856 // happening in the pending RenderViewHost's top-level frame. (We need to
2857 // both mirror the frame tree and get the navigation to occur in the correct
2858 // subframe to fix this.) Until then, we should check whether we have a
2859 // pending NavigationEntry with a frame ID and if so, treat the
2860 // cross-process "main frame" navigation as a subframe navigation. This
2861 // limits us to a single cross-process subframe per RVH, and it affects
2862 // NavigateToEntry, NavigatorImpl::DidStartProvisionalLoad, and
2863 // OnDidFinishLoad.
2864 NavigationEntryImpl* pending_entry =
2865 NavigationEntryImpl::FromNavigationEntry(controller_.GetPendingEntry());
2866 int root_ftn_id = frame_tree_.root()->frame_tree_node_id();
2867 if (pending_entry &&
2868 pending_entry->frame_tree_node_id() != -1 &&
2869 pending_entry->frame_tree_node_id() != root_ftn_id) {
2870 params.transition = PAGE_TRANSITION_AUTO_SUBFRAME;
2871 frame_tree_node_id = pending_entry->frame_tree_node_id();
2872 }
2873 }
2874
2875 if (PageTransitionIsMainFrame(params.transition)) {
2876 // When overscroll navigation gesture is enabled, a screenshot of the page
2877 // in its current state is taken so that it can be used during the
2878 // nav-gesture. It is necessary to take the screenshot here, before calling
2879 // RenderFrameHostManager::DidNavigateMainFrame, because that can change
2880 // WebContents::GetRenderViewHost to return the new host, instead of the one
2881 // that may have just been swapped out.
2882 if (delegate_ && delegate_->CanOverscrollContent())
2883 controller_.TakeScreenshot();
2884
2885 if (!use_site_per_process)
2886 GetRenderManager()->DidNavigateMainFrame(rvh);
2887 }
2888
2889 // When using --site-per-process, we notify the RFHM for all navigations,
2890 // not just main frame navigations.
2891 if (use_site_per_process) {
2892 FrameTreeNode* frame = frame_tree_.FindByID(frame_tree_node_id);
2893 // TODO(creis): Rename to DidNavigateFrame.
2894 frame->render_manager()->DidNavigateMainFrame(rvh);
2895 }
2896
2897 // Update the site of the SiteInstance if it doesn't have one yet, unless
2898 // assigning a site is not necessary for this URL. In that case, the
2899 // SiteInstance can still be considered unused until a navigation to a real
2900 // page.
2901 if (!static_cast<SiteInstanceImpl*>(GetSiteInstance())->HasSite() &&
2902 ShouldAssignSiteForURL(params.url)) {
2903 static_cast<SiteInstanceImpl*>(GetSiteInstance())->SetSite(params.url);
2904 }
2905
2906 // Need to update MIME type here because it's referred to in
2907 // UpdateNavigationCommands() called by RendererDidNavigate() to
2908 // determine whether or not to enable the encoding menu.
2909 // It's updated only for the main frame. For a subframe,
2910 // RenderView::UpdateURL does not set params.contents_mime_type.
2911 // (see http://code.google.com/p/chromium/issues/detail?id=2929 )
2912 // TODO(jungshik): Add a test for the encoding menu to avoid
2913 // regressing it again.
2914 if (PageTransitionIsMainFrame(params.transition))
2915 contents_mime_type_ = params.contents_mime_type;
2916
2917 LoadCommittedDetails details;
2918 bool did_navigate = controller_.RendererDidNavigate(rvh, params, &details);
2919
2920 // For now, keep track of each frame's URL in its FrameTreeNode. This lets
2921 // us estimate our process count for implementing OOP iframes.
2922 // TODO(creis): Remove this when we track which pages commit in each frame.
2923 frame_tree_.SetFrameUrl(params.frame_id, params.url);
2924
2925 // Send notification about committed provisional loads. This notification is
2926 // different from the NAV_ENTRY_COMMITTED notification which doesn't include
2927 // the actual URL navigated to and isn't sent for AUTO_SUBFRAME navigations.
2928 if (details.type != NAVIGATION_TYPE_NAV_IGNORE) {
2929 // For AUTO_SUBFRAME navigations, an event for the main frame is generated
2930 // that is not recorded in the navigation history. For the purpose of
2931 // tracking navigation events, we treat this event as a sub frame navigation
2932 // event.
2933 bool is_main_frame = did_navigate ? details.is_main_frame : false;
2934 PageTransition transition_type = params.transition;
2935 // Whether or not a page transition was triggered by going backward or
2936 // forward in the history is only stored in the navigation controller's
2937 // entry list.
2938 if (did_navigate &&
2939 (controller_.GetLastCommittedEntry()->GetTransitionType() &
2940 PAGE_TRANSITION_FORWARD_BACK)) {
2941 transition_type = PageTransitionFromInt(
2942 params.transition | PAGE_TRANSITION_FORWARD_BACK);
2943 }
2944 // Notify observers about the commit of the provisional load.
2945 FOR_EACH_OBSERVER(WebContentsObserver, observers_,
2946 DidCommitProvisionalLoadForFrame(
2947 params.frame_id,
2948 params.frame_unique_name,
2949 is_main_frame,
2950 params.url,
2951 transition_type,
2952 rvh));
2953 }
2954
2955 if (!did_navigate)
2956 return; // No navigation happened.
2957
2958 // DO NOT ADD MORE STUFF TO THIS FUNCTION! Your component should either listen
2959 // for the appropriate notification (best) or you can add it to
2960 // DidNavigateMainFramePostCommit / DidNavigateAnyFramePostCommit (only if
2961 // necessary, please).
2962
2963 // Run post-commit tasks.
2964 if (details.is_main_frame) {
2965 DidNavigateMainFramePostCommit(details, params);
2966 if (delegate_) {
2967 delegate_->DidNavigateMainFramePostCommit(this);
2968 view_->SetOverscrollControllerEnabled(delegate_->CanOverscrollContent());
2969 }
2970 }
2971 DidNavigateAnyFramePostCommit(rvh, details, params);
2972}
2973
[email protected]b172aee2012-04-10 17:05:262974void WebContentsImpl::UpdateState(RenderViewHost* rvh,
2975 int32 page_id,
[email protected]691aa2f2013-05-28 22:52:042976 const PageState& page_state) {
[email protected]992db4c2011-05-12 15:37:152977 // Ensure that this state update comes from either the active RVH or one of
2978 // the swapped out RVHs. We don't expect to hear from any other RVHs.
[email protected]94d0cc12013-12-18 00:07:412979 // TODO(nasko): This should go through RenderFrameHost.
2980 // TODO(creis): We can't update state for cross-process subframes until we
2981 // have FrameNavigationEntries. Once we do, this should be a DCHECK.
2982 if (rvh != GetRenderViewHost() &&
2983 !GetRenderManager()->IsRVHOnSwappedOutList(
2984 static_cast<RenderViewHostImpl*>(rvh)))
2985 return;
[email protected]420ae012009-04-24 05:16:322986
2987 // We must be prepared to handle state updates for any page, these occur
2988 // when the user is scrolling and entering form data, as well as when we're
2989 // leaving a page, in which case our state may have already been moved to
2990 // the next page. The navigation controller will look up the appropriate
2991 // NavigationEntry and update it when it is notified via the delegate.
2992
2993 int entry_index = controller_.GetEntryIndexWithPageID(
[email protected]9f76c1e2012-03-05 15:15:582994 rvh->GetSiteInstance(), page_id);
[email protected]420ae012009-04-24 05:16:322995 if (entry_index < 0)
2996 return;
[email protected]10f417c52011-12-28 21:04:232997 NavigationEntry* entry = controller_.GetEntryAtIndex(entry_index);
[email protected]420ae012009-04-24 05:16:322998
[email protected]691aa2f2013-05-28 22:52:042999 if (page_state == entry->GetPageState())
[email protected]420ae012009-04-24 05:16:323000 return; // Nothing to update.
[email protected]691aa2f2013-05-28 22:52:043001 entry->SetPageState(page_state);
[email protected]420ae012009-04-24 05:16:323002 controller_.NotifyEntryChanged(entry, entry_index);
3003}
3004
[email protected]b172aee2012-04-10 17:05:263005void WebContentsImpl::UpdateTitle(RenderViewHost* rvh,
3006 int32 page_id,
[email protected]fcf75d42013-12-03 20:11:263007 const base::string16& title,
[email protected]b172aee2012-04-10 17:05:263008 base::i18n::TextDirection title_direction) {
[email protected]420ae012009-04-24 05:16:323009 // If we have a title, that's a pretty good indication that we've started
3010 // getting useful data.
3011 SetNotWaitingForResponse();
3012
[email protected]73eb2602012-02-09 19:50:553013 // Try to find the navigation entry, which might not be the current one.
3014 // For example, it might be from a pending RVH for the pending entry.
[email protected]10f417c52011-12-28 21:04:233015 NavigationEntryImpl* entry = controller_.GetEntryWithPageID(
[email protected]9f76c1e2012-03-05 15:15:583016 rvh->GetSiteInstance(), page_id);
[email protected]987fc3a2011-05-26 14:18:093017
[email protected]73eb2602012-02-09 19:50:553018 // We can handle title updates when we don't have an entry in
3019 // UpdateTitleForEntry, but only if the update is from the current RVH.
3020 if (!entry && rvh != GetRenderViewHost())
3021 return;
3022
[email protected]a49e10b2011-08-01 23:57:463023 // TODO(evan): make use of title_direction.
3024 // http://code.google.com/p/chromium/issues/detail?id=27094
[email protected]987fc3a2011-05-26 14:18:093025 if (!UpdateTitleForEntry(entry, title))
[email protected]420ae012009-04-24 05:16:323026 return;
3027
3028 // Broadcast notifications when the UI should be updated.
3029 if (entry == controller_.GetEntryAtOffset(0))
[email protected]8ff00d72012-10-23 19:12:213030 NotifyNavigationStateChanged(INVALIDATE_TYPE_TITLE);
[email protected]420ae012009-04-24 05:16:323031}
3032
[email protected]b172aee2012-04-10 17:05:263033void WebContentsImpl::UpdateEncoding(RenderViewHost* render_view_host,
3034 const std::string& encoding) {
[email protected]be1f56ab2011-12-22 06:55:313035 SetEncoding(encoding);
[email protected]420ae012009-04-24 05:16:323036}
3037
[email protected]b172aee2012-04-10 17:05:263038void WebContentsImpl::UpdateTargetURL(int32 page_id, const GURL& url) {
[email protected]6934a702011-12-20 00:04:513039 if (delegate_)
3040 delegate_->UpdateTargetURL(this, page_id, url);
[email protected]420ae012009-04-24 05:16:323041}
3042
[email protected]b172aee2012-04-10 17:05:263043void WebContentsImpl::Close(RenderViewHost* rvh) {
[email protected]60780f412013-02-25 16:34:103044#if defined(OS_MACOSX)
[email protected]07707302009-11-06 00:50:293045 // The UI may be in an event-tracking loop, such as between the
3046 // mouse-down and mouse-up in text selection or a button click.
3047 // Defer the close until after tracking is complete, so that we
3048 // don't free objects out from under the UI.
[email protected]07707302009-11-06 00:50:293049 // TODO(shess): This could get more fine-grained. For instance,
3050 // closing a tab in another window while selecting text in the
3051 // current window's Omnibox should be just fine.
[email protected]60780f412013-02-25 16:34:103052 if (view_->IsEventTracking()) {
3053 view_->CloseTabAfterEventTracking();
[email protected]07707302009-11-06 00:50:293054 return;
3055 }
[email protected]60780f412013-02-25 16:34:103056#endif
[email protected]07707302009-11-06 00:50:293057
[email protected]420ae012009-04-24 05:16:323058 // Ignore this if it comes from a RenderViewHost that we aren't showing.
[email protected]151a63d2011-12-20 22:32:523059 if (delegate_ && rvh == GetRenderViewHost())
[email protected]6934a702011-12-20 00:04:513060 delegate_->CloseContents(this);
[email protected]420ae012009-04-24 05:16:323061}
3062
[email protected]b172aee2012-04-10 17:05:263063void WebContentsImpl::SwappedOut(RenderViewHost* rvh) {
[email protected]151a63d2011-12-20 22:32:523064 if (delegate_ && rvh == GetRenderViewHost())
[email protected]6934a702011-12-20 00:04:513065 delegate_->SwappedOut(this);
[email protected]e1986832013-06-14 07:27:283066
3067 // Allow the navigation to proceed.
[email protected]fa944cb82013-11-15 17:51:213068 GetRenderManager()->SwappedOut(rvh);
[email protected]cd9ed79d2011-11-15 19:22:573069}
3070
[email protected]b172aee2012-04-10 17:05:263071void WebContentsImpl::RequestMove(const gfx::Rect& new_bounds) {
[email protected]6934a702011-12-20 00:04:513072 if (delegate_ && delegate_->IsPopupOrPanel(this))
3073 delegate_->MoveContents(this, new_bounds);
[email protected]420ae012009-04-24 05:16:323074}
3075
[email protected]8ff00d72012-10-23 19:12:213076void WebContentsImpl::DidStartLoading(RenderViewHost* render_view_host) {
[email protected]91621872013-10-08 04:04:593077 SetIsLoading(render_view_host, true, NULL);
[email protected]420ae012009-04-24 05:16:323078}
3079
[email protected]8ff00d72012-10-23 19:12:213080void WebContentsImpl::DidStopLoading(RenderViewHost* render_view_host) {
[email protected]420ae012009-04-24 05:16:323081 scoped_ptr<LoadNotificationDetails> details;
3082
[email protected]9595fd82013-04-19 21:28:493083 // Use the last committed entry rather than the active one, in case a
3084 // pending entry has been created.
3085 NavigationEntry* entry = controller_.GetLastCommittedEntry();
[email protected]3691e5cf2014-01-22 10:16:203086 Navigator* navigator = frame_tree_.root()->navigator();
[email protected]9595fd82013-04-19 21:28:493087
[email protected]420ae012009-04-24 05:16:323088 // An entry may not exist for a stop when loading an initial blank page or
3089 // if an iframe injected by script into a blank page finishes loading.
3090 if (entry) {
[email protected]3691e5cf2014-01-22 10:16:203091 base::TimeDelta elapsed =
3092 base::TimeTicks::Now() - navigator->GetCurrentLoadStart();
[email protected]420ae012009-04-24 05:16:323093
3094 details.reset(new LoadNotificationDetails(
[email protected]36fc0392011-12-25 03:59:513095 entry->GetVirtualURL(),
3096 entry->GetTransitionType(),
[email protected]420ae012009-04-24 05:16:323097 elapsed,
3098 &controller_,
3099 controller_.GetCurrentEntryIndex()));
3100 }
3101
[email protected]91621872013-10-08 04:04:593102 SetIsLoading(render_view_host, false, details.get());
[email protected]420ae012009-04-24 05:16:323103}
3104
[email protected]b172aee2012-04-10 17:05:263105void WebContentsImpl::DidCancelLoading() {
[email protected]c95fa8b2011-04-28 20:26:163106 controller_.DiscardNonCommittedEntries();
3107
3108 // Update the URL display.
[email protected]8ff00d72012-10-23 19:12:213109 NotifyNavigationStateChanged(INVALIDATE_TYPE_URL);
[email protected]c95fa8b2011-04-28 20:26:163110}
3111
[email protected]b172aee2012-04-10 17:05:263112void WebContentsImpl::DidChangeLoadProgress(double progress) {
[email protected]6934a702011-12-20 00:04:513113 if (delegate_)
[email protected]b3996ba2012-08-08 00:39:133114 delegate_->LoadProgressChanged(this, progress);
[email protected]1a3c3cb2010-12-16 21:03:403115}
3116
[email protected]7cc78902012-12-06 02:32:263117void WebContentsImpl::DidDisownOpener(RenderViewHost* rvh) {
[email protected]f54d94a2013-04-11 22:44:393118 if (opener_) {
3119 // Clear our opener so that future cross-process navigations don't have an
3120 // opener assigned.
[email protected]7fff43e2013-05-21 20:21:103121 RemoveDestructionObserver(opener_);
[email protected]f54d94a2013-04-11 22:44:393122 opener_ = NULL;
3123 }
[email protected]7cc78902012-12-06 02:32:263124
3125 // Notify all swapped out RenderViewHosts for this tab. This is important
3126 // in case we go back to them, or if another window in those processes tries
3127 // to access window.opener.
[email protected]fa944cb82013-11-15 17:51:213128 GetRenderManager()->DidDisownOpener(rvh);
[email protected]7cc78902012-12-06 02:32:263129}
3130
[email protected]59167c22013-06-03 18:07:323131void WebContentsImpl::DidAccessInitialDocument() {
3132 // Update the URL display.
3133 NotifyNavigationStateChanged(content::INVALIDATE_TYPE_URL);
3134}
3135
[email protected]87717d0e2012-04-26 02:58:433136void WebContentsImpl::DocumentAvailableInMainFrame(
3137 RenderViewHost* render_view_host) {
3138 FOR_EACH_OBSERVER(WebContentsObserver, observers_,
3139 DocumentAvailableInMainFrame());
[email protected]952a68e2011-11-17 00:36:103140}
3141
[email protected]b172aee2012-04-10 17:05:263142void WebContentsImpl::DocumentOnLoadCompletedInMainFrame(
[email protected]25497492010-09-11 15:15:083143 RenderViewHost* render_view_host,
3144 int32 page_id) {
[email protected]6578fef2013-10-14 02:35:093145 FOR_EACH_OBSERVER(WebContentsObserver, observers_,
3146 DocumentOnLoadCompletedInMainFrame(page_id));
3147
3148 // TODO(avi): Remove. http://crbug.com/170921
[email protected]8ff00d72012-10-23 19:12:213149 NotificationService::current()->Notify(
3150 NOTIFICATION_LOAD_COMPLETED_MAIN_FRAME,
3151 Source<WebContents>(this),
3152 Details<int>(&page_id));
[email protected]25497492010-09-11 15:15:083153}
3154
[email protected]196159d2012-05-04 17:26:543155void WebContentsImpl::RequestOpenURL(RenderViewHost* rvh,
3156 const GURL& url,
[email protected]8ff00d72012-10-23 19:12:213157 const Referrer& referrer,
[email protected]b172aee2012-04-10 17:05:263158 WindowOpenDisposition disposition,
[email protected]e2caa032012-11-15 23:29:183159 int64 source_frame_id,
[email protected]866fa2cc2013-07-22 22:19:523160 bool should_replace_current_entry,
[email protected]e7f2e7c2013-07-15 09:41:303161 bool user_gesture) {
[email protected]196159d2012-05-04 17:26:543162 // If this came from a swapped out RenderViewHost, we only allow the request
3163 // if we are still in the same BrowsingInstance.
[email protected]04c2576d2014-02-07 12:11:583164 if (static_cast<RenderViewHostImpl*>(rvh)->IsSwappedOut() &&
[email protected]196159d2012-05-04 17:26:543165 !rvh->GetSiteInstance()->IsRelatedSiteInstance(GetSiteInstance())) {
3166 return;
3167 }
3168
[email protected]4ad5d77d2011-12-03 02:00:483169 // Delegate to RequestTransferURL because this is just the generic
3170 // case where |old_request_id| is empty.
[email protected]f8872902013-10-30 03:18:573171 // TODO(creis): Pass the redirect_chain into this method to support client
3172 // redirects. http://crbug.com/311721.
3173 std::vector<GURL> redirect_chain;
3174 RequestTransferURL(url, redirect_chain, referrer, PAGE_TRANSITION_LINK,
3175 disposition, source_frame_id, GlobalRequestID(),
[email protected]866fa2cc2013-07-22 22:19:523176 should_replace_current_entry, user_gesture);
[email protected]4ad5d77d2011-12-03 02:00:483177}
3178
[email protected]b172aee2012-04-10 17:05:263179void WebContentsImpl::RequestTransferURL(
3180 const GURL& url,
[email protected]f8872902013-10-30 03:18:573181 const std::vector<GURL>& redirect_chain,
[email protected]8ff00d72012-10-23 19:12:213182 const Referrer& referrer,
[email protected]f8872902013-10-30 03:18:573183 PageTransition page_transition,
[email protected]b172aee2012-04-10 17:05:263184 WindowOpenDisposition disposition,
3185 int64 source_frame_id,
[email protected]e2caa032012-11-15 23:29:183186 const GlobalRequestID& old_request_id,
[email protected]866fa2cc2013-07-22 22:19:523187 bool should_replace_current_entry,
[email protected]e7f2e7c2013-07-15 09:41:303188 bool user_gesture) {
[email protected]e5d549d2011-12-28 01:29:203189 WebContents* new_contents = NULL;
[email protected]9a60d1602013-09-11 04:09:123190 GURL dest_url(url);
3191 if (!GetContentClient()->browser()->ShouldAllowOpenURL(
[email protected]44d0930a2013-10-28 18:53:553192 GetSiteInstance(), url))
[email protected]9a60d1602013-09-11 04:09:123193 dest_url = GURL(kAboutBlankURL);
3194
[email protected]a1b99262013-12-27 21:56:223195 // Look up the FrameTreeNode ID corresponding to source_frame_id.
3196 int64 frame_tree_node_id = -1;
3197 if (CommandLine::ForCurrentProcess()->HasSwitch(switches::kSitePerProcess) &&
3198 source_frame_id != -1) {
3199 FrameTreeNode* source_node = frame_tree_.FindByFrameID(source_frame_id);
3200 if (source_node)
3201 frame_tree_node_id = source_node->frame_tree_node_id();
3202 }
[email protected]c80297782013-11-21 07:10:163203 OpenURLParams params(dest_url, referrer, source_frame_id,
3204 frame_tree_node_id, disposition,
[email protected]f8872902013-10-30 03:18:573205 page_transition, true /* is_renderer_initiated */);
3206 if (redirect_chain.size() > 0)
3207 params.redirect_chain = redirect_chain;
[email protected]44d0930a2013-10-28 18:53:553208 params.transferred_global_request_id = old_request_id;
3209 params.should_replace_current_entry = should_replace_current_entry;
3210 params.user_gesture = user_gesture;
3211
[email protected]fa944cb82013-11-15 17:51:213212 if (GetRenderManager()->web_ui()) {
[email protected]f8872902013-10-30 03:18:573213 // Web UI pages sometimes want to override the page transition type for
3214 // link clicks (e.g., so the new tab page can specify AUTO_BOOKMARK for
3215 // automatically generated suggestions). We don't override other types
3216 // like TYPED because they have different implications (e.g., autocomplete).
3217 if (PageTransitionCoreTypeIs(params.transition, PAGE_TRANSITION_LINK))
[email protected]fa944cb82013-11-15 17:51:213218 params.transition = GetRenderManager()->web_ui()->GetLinkTransitionType();
[email protected]44d0930a2013-10-28 18:53:553219
[email protected]e0112912011-02-02 22:54:353220 // Note also that we hide the referrer for Web UI pages. We don't really
[email protected]60e448982009-05-06 04:21:163221 // want web sites to see a referrer of "chrome://blah" (and some
3222 // chrome: URLs might have search terms or other stuff we don't want to
[email protected]420ae012009-04-24 05:16:323223 // send to the site), so we send no referrer.
[email protected]44d0930a2013-10-28 18:53:553224 params.referrer = Referrer();
3225
3226 // Navigations in Web UI pages count as browser-initiated navigations.
3227 params.is_renderer_initiated = false;
[email protected]ae5184d62011-10-06 19:25:583228 }
[email protected]44d0930a2013-10-28 18:53:553229
3230 new_contents = OpenURL(params);
3231
[email protected]ae5184d62011-10-06 19:25:583232 if (new_contents) {
3233 // Notify observers.
[email protected]d8c660432011-12-22 20:51:253234 FOR_EACH_OBSERVER(WebContentsObserver, observers_,
[email protected]ae5184d62011-10-06 19:25:583235 DidOpenRequestedURL(new_contents,
[email protected]9a60d1602013-09-11 04:09:123236 dest_url,
[email protected]ae5184d62011-10-06 19:25:583237 referrer,
3238 disposition,
[email protected]44d0930a2013-10-28 18:53:553239 params.transition,
[email protected]ae5184d62011-10-06 19:25:583240 source_frame_id));
[email protected]420ae012009-04-24 05:16:323241 }
3242}
3243
[email protected]e1c3a552012-05-04 20:51:323244void WebContentsImpl::RouteCloseEvent(RenderViewHost* rvh) {
3245 // Tell the active RenderViewHost to run unload handlers and close, as long
3246 // as the request came from a RenderViewHost in the same BrowsingInstance.
3247 // In most cases, we receive this from a swapped out RenderViewHost.
3248 // It is possible to receive it from one that has just been swapped in,
3249 // in which case we might as well deliver the message anyway.
3250 if (rvh->GetSiteInstance()->IsRelatedSiteInstance(GetSiteInstance()))
3251 GetRenderViewHost()->ClosePage();
3252}
3253
[email protected]f546640b2012-05-15 00:03:493254void WebContentsImpl::RouteMessageEvent(
3255 RenderViewHost* rvh,
3256 const ViewMsg_PostMessage_Params& params) {
3257 // Only deliver the message to the active RenderViewHost if the request
[email protected]0eba810b2012-10-18 03:19:363258 // came from a RenderViewHost in the same BrowsingInstance or if this
3259 // WebContents is dedicated to a browser plugin guest.
3260 // Note: This check means that an embedder could theoretically receive a
3261 // postMessage from anyone (not just its own guests). However, this is
3262 // probably not a risk for apps since other pages won't have references
3263 // to App windows.
3264 if (!rvh->GetSiteInstance()->IsRelatedSiteInstance(GetSiteInstance()) &&
3265 !GetBrowserPluginGuest() && !GetBrowserPluginEmbedder())
[email protected]f546640b2012-05-15 00:03:493266 return;
3267
3268 ViewMsg_PostMessage_Params new_params(params);
3269
[email protected]0bc7f3542013-10-21 15:05:533270 if (!params.message_port_ids.empty()) {
3271 MessagePortMessageFilter* message_port_message_filter =
3272 static_cast<RenderProcessHostImpl*>(GetRenderProcessHost())
3273 ->message_port_message_filter();
3274 std::vector<int> new_routing_ids(params.message_port_ids.size());
3275 for (size_t i = 0; i < params.message_port_ids.size(); ++i) {
3276 new_routing_ids[i] = message_port_message_filter->GetNextRoutingID();
3277 MessagePortService::GetInstance()->UpdateMessagePort(
3278 params.message_port_ids[i],
3279 message_port_message_filter,
3280 new_routing_ids[i]);
3281 }
3282 new_params.new_routing_ids = new_routing_ids;
3283 }
3284
[email protected]f546640b2012-05-15 00:03:493285 // If there is a source_routing_id, translate it to the routing ID for
3286 // the equivalent swapped out RVH in the target process. If we need
3287 // to create a swapped out RVH for the source tab, we create its opener
3288 // chain as well, since those will also be accessible to the target page.
3289 if (new_params.source_routing_id != MSG_ROUTING_NONE) {
3290 // Try to look up the WebContents for the source page.
3291 WebContentsImpl* source_contents = NULL;
3292 RenderViewHostImpl* source_rvh = RenderViewHostImpl::FromID(
3293 rvh->GetProcess()->GetID(), params.source_routing_id);
3294 if (source_rvh) {
3295 source_contents = static_cast<WebContentsImpl*>(
3296 source_rvh->GetDelegate()->GetAsWebContents());
3297 }
3298
3299 if (source_contents) {
[email protected]0eba810b2012-10-18 03:19:363300 if (GetBrowserPluginGuest()) {
3301 // We create a swapped out RenderView for the embedder in the guest's
3302 // render process but we intentionally do not expose the embedder's
3303 // opener chain to it.
3304 new_params.source_routing_id =
3305 source_contents->CreateSwappedOutRenderView(GetSiteInstance());
3306 } else {
3307 new_params.source_routing_id =
3308 source_contents->CreateOpenerRenderViews(GetSiteInstance());
3309 }
[email protected]f546640b2012-05-15 00:03:493310 } else {
3311 // We couldn't find it, so don't pass a source frame.
3312 new_params.source_routing_id = MSG_ROUTING_NONE;
3313 }
3314 }
3315
3316 // In most cases, we receive this from a swapped out RenderViewHost.
3317 // It is possible to receive it from one that has just been swapped in,
3318 // in which case we might as well deliver the message anyway.
[email protected]6b618e62012-08-16 12:59:183319 Send(new ViewMsg_PostMessageEvent(GetRoutingID(), new_params));
[email protected]f546640b2012-05-15 00:03:493320}
3321
[email protected]b172aee2012-04-10 17:05:263322void WebContentsImpl::RunJavaScriptMessage(
[email protected]fedec012012-01-28 03:09:343323 RenderViewHost* rvh,
[email protected]fcf75d42013-12-03 20:11:263324 const base::string16& message,
3325 const base::string16& default_prompt,
[email protected]420ae012009-04-24 05:16:323326 const GURL& frame_url,
[email protected]8ff00d72012-10-23 19:12:213327 JavaScriptMessageType javascript_message_type,
[email protected]420ae012009-04-24 05:16:323328 IPC::Message* reply_msg,
3329 bool* did_suppress_message) {
[email protected]3ab9cb82011-06-03 18:02:073330 // Suppress JavaScript dialogs when requested. Also suppress messages when
3331 // showing an interstitial as it's shown over the previous page and we don't
3332 // want the hidden page's dialogs to interfere with the interstitial.
[email protected]8f55e802010-12-06 18:11:503333 bool suppress_this_message =
[email protected]04c2576d2014-02-07 12:11:583334 static_cast<RenderViewHostImpl*>(rvh)->IsSwappedOut() ||
[email protected]0bfbf882011-12-22 18:19:273335 ShowingInterstitialPage() ||
[email protected]3ab9cb82011-06-03 18:02:073336 !delegate_ ||
[email protected]51da7e32012-01-30 19:24:523337 delegate_->ShouldSuppressDialogs() ||
[email protected]71a88bb2013-02-01 22:05:153338 !delegate_->GetJavaScriptDialogManager();
[email protected]420ae012009-04-24 05:16:323339
3340 if (!suppress_this_message) {
[email protected]8ff00d72012-10-23 19:12:213341 std::string accept_lang = GetContentClient()->browser()->
[email protected]55df9092012-02-29 22:56:433342 GetAcceptLangs(GetBrowserContext());
[email protected]71a88bb2013-02-01 22:05:153343 dialog_manager_ = delegate_->GetJavaScriptDialogManager();
3344 dialog_manager_->RunJavaScriptDialog(
[email protected]55df9092012-02-29 22:56:433345 this,
3346 frame_url.GetOrigin(),
3347 accept_lang,
3348 javascript_message_type,
3349 message,
[email protected]51da7e32012-01-30 19:24:523350 default_prompt,
[email protected]b172aee2012-04-10 17:05:263351 base::Bind(&WebContentsImpl::OnDialogClosed,
3352 base::Unretained(this),
3353 rvh,
3354 reply_msg),
[email protected]51da7e32012-01-30 19:24:523355 &suppress_this_message);
[email protected]420ae012009-04-24 05:16:323356 }
[email protected]3ab9cb82011-06-03 18:02:073357
[email protected]6dd2f1e2013-09-11 15:06:013358 *did_suppress_message = suppress_this_message;
3359
[email protected]3ab9cb82011-06-03 18:02:073360 if (suppress_this_message) {
3361 // If we are suppressing messages, just reply as if the user immediately
3362 // pressed "Cancel".
[email protected]fcf75d42013-12-03 20:11:263363 OnDialogClosed(rvh, reply_msg, false, base::string16());
[email protected]3ab9cb82011-06-03 18:02:073364 }
3365
[email protected]6dd2f1e2013-09-11 15:06:013366 // OnDialogClosed (two lines up) may have caused deletion of this object (see
3367 // http://crbug.com/288961 ). The only safe thing to do here is return.
[email protected]420ae012009-04-24 05:16:323368}
3369
[email protected]b172aee2012-04-10 17:05:263370void WebContentsImpl::RunBeforeUnloadConfirm(RenderViewHost* rvh,
[email protected]fcf75d42013-12-03 20:11:263371 const base::string16& message,
[email protected]b172aee2012-04-10 17:05:263372 bool is_reload,
3373 IPC::Message* reply_msg) {
[email protected]9f76c1e2012-03-05 15:15:583374 RenderViewHostImpl* rvhi = static_cast<RenderViewHostImpl*>(rvh);
[email protected]6934a702011-12-20 00:04:513375 if (delegate_)
3376 delegate_->WillRunBeforeUnloadConfirm();
[email protected]3ab9cb82011-06-03 18:02:073377
3378 bool suppress_this_message =
[email protected]04c2576d2014-02-07 12:11:583379 rvhi->rvh_state() != RenderViewHostImpl::STATE_DEFAULT ||
[email protected]3ab9cb82011-06-03 18:02:073380 !delegate_ ||
[email protected]51da7e32012-01-30 19:24:523381 delegate_->ShouldSuppressDialogs() ||
[email protected]71a88bb2013-02-01 22:05:153382 !delegate_->GetJavaScriptDialogManager();
[email protected]992db4c2011-05-12 15:37:153383 if (suppress_this_message) {
[email protected]fedec012012-01-28 03:09:343384 // The reply must be sent to the RVH that sent the request.
[email protected]fcf75d42013-12-03 20:11:263385 rvhi->JavaScriptDialogClosed(reply_msg, true, base::string16());
[email protected]8f55e802010-12-06 18:11:503386 return;
3387 }
[email protected]3ab9cb82011-06-03 18:02:073388
[email protected]7ab1e7d62009-10-14 23:32:013389 is_showing_before_unload_dialog_ = true;
[email protected]71a88bb2013-02-01 22:05:153390 dialog_manager_ = delegate_->GetJavaScriptDialogManager();
3391 dialog_manager_->RunBeforeUnloadDialog(
[email protected]3b3301f62012-02-29 04:32:323392 this, message, is_reload,
[email protected]b172aee2012-04-10 17:05:263393 base::Bind(&WebContentsImpl::OnDialogClosed, base::Unretained(this), rvh,
[email protected]51da7e32012-01-30 19:24:523394 reply_msg));
[email protected]420ae012009-04-24 05:16:323395}
3396
[email protected]a796f202012-05-30 14:14:253397bool WebContentsImpl::AddMessageToConsole(int32 level,
[email protected]fcf75d42013-12-03 20:11:263398 const base::string16& message,
[email protected]a796f202012-05-30 14:14:253399 int32 line_no,
[email protected]fcf75d42013-12-03 20:11:263400 const base::string16& source_id) {
[email protected]a796f202012-05-30 14:14:253401 if (!delegate_)
3402 return false;
3403 return delegate_->AddMessageToConsole(this, level, message, line_no,
3404 source_id);
3405}
3406
[email protected]b172aee2012-04-10 17:05:263407WebPreferences WebContentsImpl::GetWebkitPrefs() {
[email protected]6286a372013-10-09 04:03:273408 // We want to base the page config off of the actual URL, rather than the
3409 // virtual URL.
3410 // TODO(nasko): Investigate how to remove the GetActiveEntry usage here,
3411 // as it is deprecated and can be out of sync with GetRenderViewHost().
[email protected]34b565c2013-09-23 20:14:003412 GURL url = controller_.GetActiveEntry()
3413 ? controller_.GetActiveEntry()->GetURL() : GURL::EmptyGURL();
[email protected]947bb3902013-10-28 18:03:153414
[email protected]fa944cb82013-11-15 17:51:213415 return GetRenderManager()->current_host()->GetWebkitPrefs(url);
[email protected]420ae012009-04-24 05:16:323416}
3417
[email protected]0eba810b2012-10-18 03:19:363418int WebContentsImpl::CreateSwappedOutRenderView(
[email protected]8ff00d72012-10-23 19:12:213419 SiteInstance* instance) {
[email protected]94d0cc12013-12-18 00:07:413420 return GetRenderManager()->CreateRenderFrame(instance, MSG_ROUTING_NONE,
3421 true, true);
[email protected]0eba810b2012-10-18 03:19:363422}
3423
[email protected]b172aee2012-04-10 17:05:263424void WebContentsImpl::OnUserGesture() {
[email protected]ddb85052011-05-18 14:40:273425 // Notify observers.
[email protected]d8c660432011-12-22 20:51:253426 FOR_EACH_OBSERVER(WebContentsObserver, observers_, DidGetUserGesture());
[email protected]686493142011-07-15 21:47:223427
[email protected]ea114722012-03-12 01:11:253428 ResourceDispatcherHostImpl* rdh = ResourceDispatcherHostImpl::Get();
[email protected]b39e7a88b2012-01-10 21:43:173429 if (rdh) // NULL in unittests.
3430 rdh->OnUserGesture(this);
[email protected]7d472472011-01-22 01:30:253431}
3432
[email protected]b172aee2012-04-10 17:05:263433void WebContentsImpl::OnIgnoredUIEvent() {
[email protected]31145092011-09-30 01:49:443434 // Notify observers.
[email protected]d8c660432011-12-22 20:51:253435 FOR_EACH_OBSERVER(WebContentsObserver, observers_, DidGetIgnoredUIEvent());
[email protected]fa1cf0b82010-01-15 21:49:443436}
3437
[email protected]b172aee2012-04-10 17:05:263438void WebContentsImpl::RendererUnresponsive(RenderViewHost* rvh,
[email protected]2e9d79f2013-08-16 05:45:563439 bool is_during_beforeunload,
[email protected]b172aee2012-04-10 17:05:263440 bool is_during_unload) {
[email protected]992db4c2011-05-12 15:37:153441 // Don't show hung renderer dialog for a swapped out RVH.
[email protected]151a63d2011-12-20 22:32:523442 if (rvh != GetRenderViewHost())
[email protected]992db4c2011-05-12 15:37:153443 return;
3444
[email protected]9f76c1e2012-03-05 15:15:583445 RenderViewHostImpl* rvhi = static_cast<RenderViewHostImpl*>(rvh);
3446
[email protected]e5fc1632011-08-08 07:51:533447 // Ignore renderer unresponsive event if debugger is attached to the tab
3448 // since the event may be a result of the renderer sitting on a breakpoint.
3449 // See http://crbug.com/65458
[email protected]98f66112012-12-25 12:59:363450 if (DevToolsAgentHost::IsDebuggerAttached(this))
[email protected]e5fc1632011-08-08 07:51:533451 return;
3452
[email protected]2e9d79f2013-08-16 05:45:563453 if (is_during_beforeunload || is_during_unload) {
[email protected]420ae012009-04-24 05:16:323454 // Hang occurred while firing the beforeunload/unload handler.
3455 // Pretend the handler fired so tab closing continues as if it had.
[email protected]9f76c1e2012-03-05 15:15:583456 rvhi->set_sudden_termination_allowed(true);
[email protected]420ae012009-04-24 05:16:323457
[email protected]fa944cb82013-11-15 17:51:213458 if (!GetRenderManager()->ShouldCloseTabOnUnresponsiveRenderer())
[email protected]420ae012009-04-24 05:16:323459 return;
3460
3461 // If the tab hangs in the beforeunload/unload handler there's really
[email protected]2e9d79f2013-08-16 05:45:563462 // nothing we can do to recover. If the hang is in the beforeunload handler,
3463 // pretend the beforeunload listeners have all fired and allow the delegate
3464 // to continue closing; the user will not have the option of cancelling the
3465 // close. Otherwise, pretend the unload listeners have all fired and close
3466 // the tab.
3467 bool close = true;
3468 if (is_during_beforeunload) {
3469 delegate_->BeforeUnloadFired(this, true, &close);
3470 }
3471 if (close)
3472 Close(rvh);
[email protected]420ae012009-04-24 05:16:323473 return;
3474 }
3475
[email protected]9f76c1e2012-03-05 15:15:583476 if (!GetRenderViewHostImpl() || !GetRenderViewHostImpl()->IsRenderViewLive())
[email protected]55452902011-06-01 21:57:473477 return;
3478
[email protected]6934a702011-12-20 00:04:513479 if (delegate_)
3480 delegate_->RendererUnresponsive(this);
[email protected]420ae012009-04-24 05:16:323481}
3482
[email protected]b172aee2012-04-10 17:05:263483void WebContentsImpl::RendererResponsive(RenderViewHost* render_view_host) {
[email protected]6934a702011-12-20 00:04:513484 if (delegate_)
3485 delegate_->RendererResponsive(this);
[email protected]420ae012009-04-24 05:16:323486}
3487
[email protected]b172aee2012-04-10 17:05:263488void WebContentsImpl::LoadStateChanged(
3489 const GURL& url,
3490 const net::LoadStateWithParam& load_state,
3491 uint64 upload_position,
3492 uint64 upload_size) {
[email protected]420ae012009-04-24 05:16:323493 load_state_ = load_state;
[email protected]094e5b22009-09-25 04:23:563494 upload_position_ = upload_position;
3495 upload_size_ = upload_size;
[email protected]04866c42011-05-03 20:03:503496 load_state_host_ = net::IDNToUnicode(url.host(),
[email protected]8ff00d72012-10-23 19:12:213497 GetContentClient()->browser()->GetAcceptLangs(
[email protected]627e0512011-12-21 22:55:303498 GetBrowserContext()));
[email protected]9c235f042011-08-10 22:28:213499 if (load_state_.state == net::LOAD_STATE_READING_RESPONSE)
[email protected]420ae012009-04-24 05:16:323500 SetNotWaitingForResponse();
[email protected]d9083482012-01-06 00:38:463501 if (IsLoading()) {
[email protected]8ff00d72012-10-23 19:12:213502 NotifyNavigationStateChanged(INVALIDATE_TYPE_LOAD | INVALIDATE_TYPE_TAB);
[email protected]d9083482012-01-06 00:38:463503 }
[email protected]420ae012009-04-24 05:16:323504}
3505
[email protected]b172aee2012-04-10 17:05:263506void WebContentsImpl::BeforeUnloadFiredFromRenderManager(
[email protected]feaded02012-09-25 19:12:553507 bool proceed, const base::TimeTicks& proceed_time,
[email protected]420ae012009-04-24 05:16:323508 bool* proceed_to_fire_unload) {
[email protected]6d65a462013-06-21 21:29:123509 FOR_EACH_OBSERVER(WebContentsObserver, observers_,
3510 BeforeUnloadFired(proceed_time));
[email protected]6934a702011-12-20 00:04:513511 if (delegate_)
3512 delegate_->BeforeUnloadFired(this, proceed, proceed_to_fire_unload);
[email protected]e80af492013-06-24 21:52:093513 // Note: |this| might be deleted at this point.
[email protected]420ae012009-04-24 05:16:323514}
3515
[email protected]58d5cfe2013-07-10 02:40:523516void WebContentsImpl::RenderProcessGoneFromRenderManager(
[email protected]3a3d47472010-07-15 21:03:543517 RenderViewHost* render_view_host) {
[email protected]443b80e2010-12-14 00:42:233518 DCHECK(crashed_status_ != base::TERMINATION_STATUS_STILL_RUNNING);
[email protected]ec6a7eb2013-04-22 17:34:223519 RenderViewTerminated(render_view_host, crashed_status_, crashed_error_code_);
[email protected]3a3d47472010-07-15 21:03:543520}
3521
[email protected]b172aee2012-04-10 17:05:263522void WebContentsImpl::UpdateRenderViewSizeForRenderManager() {
[email protected]8643e6d2012-01-18 20:26:103523 // TODO(brettw) this is a hack. See WebContentsView::SizeContents.
[email protected]dc0fd432013-08-27 15:29:213524 gfx::Size size = GetSizeForNewRenderView();
[email protected]0323ee42010-02-17 22:03:263525 // 0x0 isn't a valid window size (minimal window size is 1x1) but it may be
3526 // here during container initialization and normal window size will be set
3527 // later. In case of tab duplication this resizing to 0x0 prevents setting
3528 // normal size later so just ignore it.
3529 if (!size.IsEmpty())
3530 view_->SizeContents(size);
[email protected]420ae012009-04-24 05:16:323531}
3532
[email protected]af905902013-10-01 21:38:513533void WebContentsImpl::CancelModalDialogsForRenderManager() {
3534 // We need to cancel modal dialogs when doing a process swap, since the load
3535 // deferrer would prevent us from swapping out.
3536 if (dialog_manager_)
3537 dialog_manager_->CancelActiveAndPendingDialogs(this);
3538}
3539
[email protected]7b712ee22013-10-03 00:57:283540void WebContentsImpl::NotifySwappedFromRenderManager(RenderViewHost* old_host,
3541 RenderViewHost* new_host) {
3542 NotifySwapped(old_host, new_host);
[email protected]a6b73c62013-02-11 23:05:083543
3544 // Make sure the visible RVH reflects the new delegate's preferences.
[email protected]86f98a22013-03-20 14:35:003545 if (delegate_)
3546 view_->SetOverscrollControllerEnabled(delegate_->CanOverscrollContent());
[email protected]d56a49e2013-02-23 00:47:393547
[email protected]7b712ee22013-10-03 00:57:283548 view_->RenderViewSwappedIn(new_host);
[email protected]3a3d47472010-07-15 21:03:543549}
3550
[email protected]14392a52012-05-02 20:28:443551int WebContentsImpl::CreateOpenerRenderViewsForRenderManager(
3552 SiteInstance* instance) {
3553 if (!opener_)
3554 return MSG_ROUTING_NONE;
3555
3556 // Recursively create RenderViews for anything else in the opener chain.
3557 return opener_->CreateOpenerRenderViews(instance);
3558}
3559
3560int WebContentsImpl::CreateOpenerRenderViews(SiteInstance* instance) {
3561 int opener_route_id = MSG_ROUTING_NONE;
3562
3563 // If this tab has an opener, ensure it has a RenderView in the given
3564 // SiteInstance as well.
3565 if (opener_)
3566 opener_route_id = opener_->CreateOpenerRenderViews(instance);
3567
[email protected]45a22ad2013-02-21 03:25:003568 // If any of the renderers (current, pending, or swapped out) for this
3569 // WebContents has the same SiteInstance, use it.
[email protected]fa944cb82013-11-15 17:51:213570 if (GetRenderManager()->current_host()->GetSiteInstance() == instance)
3571 return GetRenderManager()->current_host()->GetRoutingID();
[email protected]0720b532012-08-28 19:23:373572
[email protected]fa944cb82013-11-15 17:51:213573 if (GetRenderManager()->pending_render_view_host() &&
3574 GetRenderManager()->pending_render_view_host()->GetSiteInstance() ==
3575 instance)
3576 return GetRenderManager()->pending_render_view_host()->GetRoutingID();
[email protected]45a22ad2013-02-21 03:25:003577
[email protected]fa944cb82013-11-15 17:51:213578 RenderViewHostImpl* rvh = GetRenderManager()->GetSwappedOutRenderViewHost(
[email protected]0720b532012-08-28 19:23:373579 instance);
3580 if (rvh)
3581 return rvh->GetRoutingID();
3582
[email protected]14392a52012-05-02 20:28:443583 // Create a swapped out RenderView in the given SiteInstance if none exists,
3584 // setting its opener to the given route_id. Return the new view's route_id.
[email protected]94d0cc12013-12-18 00:07:413585 return GetRenderManager()->CreateRenderFrame(instance, opener_route_id,
3586 true, true);
[email protected]14392a52012-05-02 20:28:443587}
3588
[email protected]b172aee2012-04-10 17:05:263589NavigationControllerImpl& WebContentsImpl::GetControllerForRenderManager() {
[email protected]d1198fd2012-08-13 22:50:193590 return GetController();
[email protected]3a3d47472010-07-15 21:03:543591}
3592
[email protected]b172aee2012-04-10 17:05:263593WebUIImpl* WebContentsImpl::CreateWebUIForRenderManager(const GURL& url) {
[email protected]d2353452012-01-19 19:53:563594 return static_cast<WebUIImpl*>(CreateWebUI(url));
[email protected]420ae012009-04-24 05:16:323595}
3596
[email protected]10f417c52011-12-28 21:04:233597NavigationEntry*
[email protected]b172aee2012-04-10 17:05:263598 WebContentsImpl::GetLastCommittedNavigationEntryForRenderManager() {
[email protected]420ae012009-04-24 05:16:323599 return controller_.GetLastCommittedEntry();
3600}
3601
[email protected]b172aee2012-04-10 17:05:263602bool WebContentsImpl::CreateRenderViewForRenderManager(
[email protected]bffc8302014-01-23 20:52:163603 RenderViewHost* render_view_host,
3604 int opener_route_id,
3605 CrossProcessFrameConnector* frame_connector) {
[email protected]e11f0e92013-06-12 15:12:033606 TRACE_EVENT0("browser", "WebContentsImpl::CreateRenderViewForRenderManager");
[email protected]245f7d52011-11-28 15:36:443607 // Can be NULL during tests.
[email protected]bffc8302014-01-23 20:52:163608 RenderWidgetHostView* rwh_view;
3609 // TODO(kenrb): RenderWidgetHostViewChildFrame special casing is temporary
3610 // until RenderWidgetHost is attached to RenderFrameHost. We need to special
3611 // case this because RWH is still a base class of RenderViewHost, and child
3612 // frame RWHVs are unique in that they do not have their own WebContents.
3613 if (frame_connector) {
3614 RenderWidgetHostViewChildFrame* rwh_view_child =
3615 new RenderWidgetHostViewChildFrame(render_view_host);
3616 frame_connector->set_view(rwh_view_child);
3617 rwh_view = rwh_view_child;
3618 } else {
3619 rwh_view = view_->CreateViewForWidget(render_view_host);
3620 }
[email protected]1a98a932009-11-17 00:12:523621
[email protected]420ae012009-04-24 05:16:323622 // Now that the RenderView has been created, we need to tell it its size.
[email protected]245f7d52011-11-28 15:36:443623 if (rwh_view)
[email protected]dc0fd432013-08-27 15:29:213624 rwh_view->SetSize(GetSizeForNewRenderView());
[email protected]420ae012009-04-24 05:16:323625
[email protected]74ce1ad2011-12-16 21:51:463626 // Make sure we use the correct starting page_id in the new RenderView.
3627 UpdateMaxPageIDIfNecessary(render_view_host);
3628 int32 max_page_id =
[email protected]9f76c1e2012-03-05 15:15:583629 GetMaxPageIDForSiteInstance(render_view_host->GetSiteInstance());
[email protected]74ce1ad2011-12-16 21:51:463630
[email protected]9f76c1e2012-03-05 15:15:583631 if (!static_cast<RenderViewHostImpl*>(
[email protected]fcf75d42013-12-03 20:11:263632 render_view_host)->CreateRenderView(base::string16(),
[email protected]51dbd1c2012-05-16 00:36:493633 opener_route_id,
[email protected]500ca7f12012-10-25 00:13:133634 max_page_id)) {
[email protected]a4127722011-04-27 23:13:523635 return false;
[email protected]14392a52012-05-02 20:28:443636 }
[email protected]a4127722011-04-27 23:13:523637
[email protected]a220b5932013-09-21 03:47:443638#if defined(OS_POSIX) && !defined(OS_MACOSX) && !defined(OS_ANDROID)
[email protected]f8233cc2011-05-31 20:24:503639 // Force a ViewMsg_Resize to be sent, needed to make plugins show up on
3640 // linux. See crbug.com/83941.
[email protected]245f7d52011-11-28 15:36:443641 if (rwh_view) {
3642 if (RenderWidgetHost* render_widget_host = rwh_view->GetRenderWidgetHost())
3643 render_widget_host->WasResized();
3644 }
[email protected]f8233cc2011-05-31 20:24:503645#endif
3646
[email protected]420ae012009-04-24 05:16:323647 return true;
3648}
3649
[email protected]7d244f12013-08-22 21:41:513650#if defined(OS_ANDROID)
[email protected]155c7f22013-12-09 17:07:183651base::android::ScopedJavaLocalRef<jobject>
3652WebContentsImpl::GetJavaWebContents() {
3653 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
3654
3655 WebContentsAndroid* web_contents_android =
3656 static_cast<WebContentsAndroid*>(GetUserData(kWebContentsAndroidKey));
3657 if (!web_contents_android) {
3658 web_contents_android = new WebContentsAndroid(this);
3659 SetUserData(kWebContentsAndroidKey, web_contents_android);
3660 }
3661 return web_contents_android->GetJavaObject();
3662}
3663
[email protected]7d244f12013-08-22 21:41:513664bool WebContentsImpl::CreateRenderViewForInitialEmptyDocument() {
3665 return CreateRenderViewForRenderManager(GetRenderViewHost(),
[email protected]bffc8302014-01-23 20:52:163666 MSG_ROUTING_NONE,
3667 NULL);
[email protected]7d244f12013-08-22 21:41:513668}
3669#endif
3670
[email protected]b172aee2012-04-10 17:05:263671void WebContentsImpl::OnDialogClosed(RenderViewHost* rvh,
3672 IPC::Message* reply_msg,
3673 bool success,
[email protected]fcf75d42013-12-03 20:11:263674 const base::string16& user_input) {
[email protected]beb440c2009-11-06 04:08:543675 if (is_showing_before_unload_dialog_ && !success) {
3676 // If a beforeunload dialog is canceled, we need to stop the throbber from
3677 // spinning, since we forced it to start spinning in Navigate.
[email protected]89793072012-07-23 22:25:293678 DidStopLoading(rvh);
[email protected]15d160c02012-07-04 10:52:353679 controller_.DiscardNonCommittedEntries();
[email protected]ec8e8b02013-06-19 04:57:103680
[email protected]6d65a462013-06-21 21:29:123681 FOR_EACH_OBSERVER(WebContentsObserver, observers_,
3682 BeforeUnloadDialogCancelled());
[email protected]beb440c2009-11-06 04:08:543683 }
3684 is_showing_before_unload_dialog_ = false;
[email protected]9f76c1e2012-03-05 15:15:583685 static_cast<RenderViewHostImpl*>(
3686 rvh)->JavaScriptDialogClosed(reply_msg, success, user_input);
[email protected]beb440c2009-11-06 04:08:543687}
3688
[email protected]b172aee2012-04-10 17:05:263689void WebContentsImpl::SetEncoding(const std::string& encoding) {
[email protected]8ff00d72012-10-23 19:12:213690 encoding_ = GetContentClient()->browser()->
[email protected]763ec4ca2011-04-29 15:48:123691 GetCanonicalEncodingNameByAliasName(encoding);
[email protected]aacd7cc2009-09-02 14:51:103692}
[email protected]f45d2a72010-03-08 23:28:353693
[email protected]b172aee2012-04-10 17:05:263694void WebContentsImpl::CreateViewAndSetSizeForRVH(RenderViewHost* rvh) {
[email protected]60780f412013-02-25 16:34:103695 RenderWidgetHostView* rwh_view = view_->CreateViewForWidget(rvh);
[email protected]245f7d52011-11-28 15:36:443696 // Can be NULL during tests.
3697 if (rwh_view)
[email protected]d487beefe2011-12-21 05:41:213698 rwh_view->SetSize(GetView()->GetContainerSize());
[email protected]33f74972010-12-08 16:40:363699}
[email protected]9f76c1e2012-03-05 15:15:583700
[email protected]1ac10dca2013-08-20 20:47:043701bool WebContentsImpl::IsHidden() {
3702 return capturer_count_ == 0 && !should_normally_be_visible_;
3703}
3704
[email protected]b0936d22013-11-28 06:47:363705RenderFrameHostManager* WebContentsImpl::GetRenderManager() const {
[email protected]fa944cb82013-11-15 17:51:213706 return frame_tree_.root()->render_manager();
3707}
3708
[email protected]b172aee2012-04-10 17:05:263709RenderViewHostImpl* WebContentsImpl::GetRenderViewHostImpl() {
[email protected]9f76c1e2012-03-05 15:15:583710 return static_cast<RenderViewHostImpl*>(GetRenderViewHost());
3711}
[email protected]7900bfdb2012-05-24 19:31:243712
[email protected]f8497342013-02-05 22:15:023713BrowserPluginGuest* WebContentsImpl::GetBrowserPluginGuest() const {
[email protected]7a846df2012-09-20 19:17:393714 return browser_plugin_guest_.get();
3715}
3716
[email protected]738f57a2013-06-29 21:06:543717void WebContentsImpl::SetBrowserPluginGuest(BrowserPluginGuest* guest) {
3718 CHECK(!browser_plugin_guest_);
3719 browser_plugin_guest_.reset(guest);
3720}
3721
[email protected]f8497342013-02-05 22:15:023722BrowserPluginEmbedder* WebContentsImpl::GetBrowserPluginEmbedder() const {
[email protected]7a846df2012-09-20 19:17:393723 return browser_plugin_embedder_.get();
3724}
[email protected]8ff00d72012-10-23 19:12:213725
[email protected]8eb04562013-03-06 03:41:143726BrowserPluginGuestManager*
3727 WebContentsImpl::GetBrowserPluginGuestManager() const {
3728 return static_cast<BrowserPluginGuestManager*>(
3729 GetBrowserContext()->GetUserData(
3730 browser_plugin::kBrowserPluginGuestManagerKeyName));
3731}
3732
[email protected]d9030b82013-07-19 08:26:063733void WebContentsImpl::ClearPowerSaveBlockers(
3734 RenderViewHost* render_view_host) {
3735 STLDeleteValues(&power_save_blockers_[render_view_host]);
3736 power_save_blockers_.erase(render_view_host);
3737}
3738
3739void WebContentsImpl::ClearAllPowerSaveBlockers() {
3740 for (PowerSaveBlockerMap::iterator i(power_save_blockers_.begin());
3741 i != power_save_blockers_.end(); ++i)
3742 STLDeleteValues(&power_save_blockers_[i->first]);
3743 power_save_blockers_.clear();
3744}
3745
[email protected]dc0fd432013-08-27 15:29:213746gfx::Size WebContentsImpl::GetSizeForNewRenderView() const {
3747 gfx::Size size;
3748 if (delegate_)
3749 size = delegate_->GetSizeForNewRenderView(this);
3750 if (size.IsEmpty())
3751 size = view_->GetContainerSize();
3752 return size;
3753}
3754
[email protected]9b159a52013-10-03 17:24:553755void WebContentsImpl::OnFrameRemoved(
3756 RenderViewHostImpl* render_view_host,
3757 int64 frame_id) {
3758 FOR_EACH_OBSERVER(WebContentsObserver, observers_,
3759 FrameDetached(render_view_host, frame_id));
3760}
3761
[email protected]222f5822014-02-05 23:40:493762void WebContentsImpl::OnPreferredSizeChanged(const gfx::Size& old_size) {
3763 if (!delegate_)
3764 return;
3765 const gfx::Size new_size = GetPreferredSize();
3766 if (new_size != old_size)
3767 delegate_->UpdatePreferredSize(this, new_size);
3768}
3769
[email protected]8ff00d72012-10-23 19:12:213770} // namespace content