Unregister from GCM when the only GCM app is removed
[chromium-blink-merge.git] / extensions / shell / renderer / shell_content_renderer_client.cc
blobe39a515442741fca34baf6450fb98765d536e56f
1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "extensions/shell/renderer/shell_content_renderer_client.h"
7 #include "content/public/common/content_constants.h"
8 #include "content/public/renderer/render_frame.h"
9 #include "content/public/renderer/render_frame_observer.h"
10 #include "content/public/renderer/render_frame_observer_tracker.h"
11 #include "content/public/renderer/render_thread.h"
12 #include "extensions/common/extensions_client.h"
13 #include "extensions/renderer/default_dispatcher_delegate.h"
14 #include "extensions/renderer/dispatcher.h"
15 #include "extensions/renderer/extension_helper.h"
16 #include "extensions/renderer/guest_view/extensions_guest_view_container.h"
17 #include "extensions/renderer/guest_view/guest_view_container.h"
18 #include "extensions/renderer/guest_view/mime_handler_view/mime_handler_view_container.h"
19 #include "extensions/shell/common/shell_extensions_client.h"
20 #include "extensions/shell/renderer/shell_extensions_renderer_client.h"
21 #include "third_party/WebKit/public/web/WebLocalFrame.h"
23 #if !defined(DISABLE_NACL)
24 #include "components/nacl/common/nacl_constants.h"
25 #include "components/nacl/renderer/nacl_helper.h"
26 #include "components/nacl/renderer/ppb_nacl_private.h"
27 #include "components/nacl/renderer/ppb_nacl_private_impl.h"
28 #endif
30 using blink::WebFrame;
31 using blink::WebString;
32 using content::RenderThread;
34 namespace extensions {
36 namespace {
38 // TODO: promote ExtensionFrameHelper to a common place and share with this.
39 class ShellFrameHelper
40 : public content::RenderFrameObserver,
41 public content::RenderFrameObserverTracker<ShellFrameHelper> {
42 public:
43 ShellFrameHelper(content::RenderFrame* render_frame,
44 Dispatcher* extension_dispatcher);
45 ~ShellFrameHelper() override;
47 // RenderFrameObserver implementation.
48 void WillReleaseScriptContext(v8::Handle<v8::Context>, int world_id) override;
50 private:
51 Dispatcher* extension_dispatcher_;
53 DISALLOW_COPY_AND_ASSIGN(ShellFrameHelper);
56 ShellFrameHelper::ShellFrameHelper(content::RenderFrame* render_frame,
57 Dispatcher* extension_dispatcher)
58 : content::RenderFrameObserver(render_frame),
59 content::RenderFrameObserverTracker<ShellFrameHelper>(render_frame),
60 extension_dispatcher_(extension_dispatcher) {
63 ShellFrameHelper::~ShellFrameHelper() {
66 void ShellFrameHelper::WillReleaseScriptContext(v8::Handle<v8::Context> context,
67 int world_id) {
68 extension_dispatcher_->WillReleaseScriptContext(
69 render_frame()->GetWebFrame(), context, world_id);
72 } // namespace
74 ShellContentRendererClient::ShellContentRendererClient() {
77 ShellContentRendererClient::~ShellContentRendererClient() {
80 void ShellContentRendererClient::RenderThreadStarted() {
81 RenderThread* thread = RenderThread::Get();
83 extensions_client_.reset(CreateExtensionsClient());
84 ExtensionsClient::Set(extensions_client_.get());
86 extensions_renderer_client_.reset(new ShellExtensionsRendererClient);
87 ExtensionsRendererClient::Set(extensions_renderer_client_.get());
89 extension_dispatcher_delegate_.reset(new DefaultDispatcherDelegate());
91 // Must be initialized after ExtensionsRendererClient.
92 extension_dispatcher_.reset(
93 new Dispatcher(extension_dispatcher_delegate_.get()));
94 thread->AddObserver(extension_dispatcher_.get());
96 // TODO(jamescook): Init WebSecurityPolicy for chrome-extension: schemes.
97 // See ChromeContentRendererClient for details.
100 void ShellContentRendererClient::RenderFrameCreated(
101 content::RenderFrame* render_frame) {
102 // ShellFrameHelper destroys itself when the RenderFrame is destroyed.
103 new ShellFrameHelper(render_frame, extension_dispatcher_.get());
105 // TODO(jamescook): Do we need to add a new PepperHelper(render_frame) here?
106 // It doesn't seem necessary for either Pepper or NaCl.
107 // http://crbug.com/403004
108 #if !defined(DISABLE_NACL)
109 new nacl::NaClHelper(render_frame);
110 #endif
113 void ShellContentRendererClient::RenderViewCreated(
114 content::RenderView* render_view) {
115 new ExtensionHelper(render_view, extension_dispatcher_.get());
116 extension_dispatcher_->OnRenderViewCreated(render_view);
119 bool ShellContentRendererClient::OverrideCreatePlugin(
120 content::RenderFrame* render_frame,
121 blink::WebLocalFrame* frame,
122 const blink::WebPluginParams& params,
123 blink::WebPlugin** plugin) {
124 // Allow the content module to create the plugin.
125 return false;
128 blink::WebPlugin* ShellContentRendererClient::CreatePluginReplacement(
129 content::RenderFrame* render_frame,
130 const base::FilePath& plugin_path) {
131 // Don't provide a custom "failed to load" plugin.
132 return NULL;
135 bool ShellContentRendererClient::ShouldForwardToGuestContainer(
136 const IPC::Message& msg) {
137 return GuestViewContainer::HandlesMessage(msg);
140 bool ShellContentRendererClient::WillSendRequest(
141 blink::WebFrame* frame,
142 ui::PageTransition transition_type,
143 const GURL& url,
144 const GURL& first_party_for_cookies,
145 GURL* new_url) {
146 // TODO(jamescook): Cause an error for bad extension scheme requests?
147 return false;
150 void ShellContentRendererClient::DidCreateScriptContext(
151 WebFrame* frame,
152 v8::Handle<v8::Context> context,
153 int extension_group,
154 int world_id) {
155 extension_dispatcher_->DidCreateScriptContext(
156 frame, context, extension_group, world_id);
159 const void* ShellContentRendererClient::CreatePPAPIInterface(
160 const std::string& interface_name) {
161 #if !defined(DISABLE_NACL)
162 if (interface_name == PPB_NACL_PRIVATE_INTERFACE)
163 return nacl::GetNaClPrivateInterface();
164 #endif
165 return NULL;
168 bool ShellContentRendererClient::IsExternalPepperPlugin(
169 const std::string& module_name) {
170 #if !defined(DISABLE_NACL)
171 // TODO(bbudge) remove this when the trusted NaCl plugin has been removed.
172 // We must defer certain plugin events for NaCl instances since we switch
173 // from the in-process to the out-of-process proxy after instantiating them.
174 return module_name == nacl::kNaClPluginName;
175 #else
176 return false;
177 #endif
180 bool ShellContentRendererClient::ShouldEnableSiteIsolationPolicy() const {
181 // Extension renderers don't need site isolation.
182 return false;
185 content::BrowserPluginDelegate*
186 ShellContentRendererClient::CreateBrowserPluginDelegate(
187 content::RenderFrame* render_frame,
188 const std::string& mime_type,
189 const GURL& original_url) {
190 if (mime_type == content::kBrowserPluginMimeType) {
191 return new extensions::ExtensionsGuestViewContainer(render_frame);
192 } else {
193 return new extensions::MimeHandlerViewContainer(
194 render_frame, mime_type, original_url);
198 ExtensionsClient* ShellContentRendererClient::CreateExtensionsClient() {
199 return new ShellExtensionsClient;
202 } // namespace extensions