1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "content/browser/renderer_host/render_view_host_impl.h"
12 #include "base/callback.h"
13 #include "base/command_line.h"
14 #include "base/i18n/rtl.h"
15 #include "base/json/json_reader.h"
16 #include "base/message_loop/message_loop.h"
17 #include "base/metrics/field_trial.h"
18 #include "base/metrics/histogram.h"
19 #include "base/stl_util.h"
20 #include "base/strings/string_util.h"
21 #include "base/strings/utf_string_conversions.h"
22 #include "base/sys_info.h"
23 #include "base/time/time.h"
24 #include "base/trace_event/trace_event.h"
25 #include "base/values.h"
26 #include "cc/base/switches.h"
27 #include "content/browser/bad_message.h"
28 #include "content/browser/child_process_security_policy_impl.h"
29 #include "content/browser/dom_storage/session_storage_namespace_impl.h"
30 #include "content/browser/frame_host/frame_tree.h"
31 #include "content/browser/gpu/compositor_util.h"
32 #include "content/browser/gpu/gpu_data_manager_impl.h"
33 #include "content/browser/gpu/gpu_process_host.h"
34 #include "content/browser/gpu/gpu_surface_tracker.h"
35 #include "content/browser/host_zoom_map_impl.h"
36 #include "content/browser/loader/resource_dispatcher_host_impl.h"
37 #include "content/browser/renderer_host/dip_util.h"
38 #include "content/browser/renderer_host/media/audio_renderer_host.h"
39 #include "content/browser/renderer_host/render_process_host_impl.h"
40 #include "content/browser/renderer_host/render_view_host_delegate.h"
41 #include "content/browser/renderer_host/render_view_host_delegate_view.h"
42 #include "content/browser/renderer_host/render_widget_host_view_base.h"
43 #include "content/common/browser_plugin/browser_plugin_messages.h"
44 #include "content/common/content_switches_internal.h"
45 #include "content/common/drag_messages.h"
46 #include "content/common/frame_messages.h"
47 #include "content/common/input_messages.h"
48 #include "content/common/inter_process_time_ticks_converter.h"
49 #include "content/common/speech_recognition_messages.h"
50 #include "content/common/swapped_out_messages.h"
51 #include "content/common/view_messages.h"
52 #include "content/public/browser/ax_event_notification_details.h"
53 #include "content/public/browser/browser_accessibility_state.h"
54 #include "content/public/browser/browser_context.h"
55 #include "content/public/browser/browser_message_filter.h"
56 #include "content/public/browser/content_browser_client.h"
57 #include "content/public/browser/focused_node_details.h"
58 #include "content/public/browser/native_web_keyboard_event.h"
59 #include "content/public/browser/notification_details.h"
60 #include "content/public/browser/notification_service.h"
61 #include "content/public/browser/notification_types.h"
62 #include "content/public/browser/render_frame_host.h"
63 #include "content/public/browser/render_widget_host_iterator.h"
64 #include "content/public/browser/storage_partition.h"
65 #include "content/public/browser/user_metrics.h"
66 #include "content/public/common/bindings_policy.h"
67 #include "content/public/common/content_constants.h"
68 #include "content/public/common/content_switches.h"
69 #include "content/public/common/context_menu_params.h"
70 #include "content/public/common/drop_data.h"
71 #include "content/public/common/file_chooser_file_info.h"
72 #include "content/public/common/file_chooser_params.h"
73 #include "content/public/common/result_codes.h"
74 #include "content/public/common/url_constants.h"
75 #include "content/public/common/url_utils.h"
76 #include "net/base/filename_util.h"
77 #include "net/base/net_util.h"
78 #include "net/base/network_change_notifier.h"
79 #include "net/url_request/url_request_context_getter.h"
80 #include "storage/browser/fileapi/isolated_context.h"
81 #include "third_party/skia/include/core/SkBitmap.h"
82 #include "ui/base/touch/touch_device.h"
83 #include "ui/base/touch/touch_enabled.h"
84 #include "ui/base/ui_base_switches.h"
85 #include "ui/gfx/image/image_skia.h"
86 #include "ui/gfx/native_widget_types.h"
87 #include "ui/native_theme/native_theme_switches.h"
88 #include "url/url_constants.h"
91 #include "base/win/win_util.h"
92 #include "ui/gfx/platform_font_win.h"
93 #include "ui/gfx/win/dpi.h"
96 using base::TimeDelta
;
97 using blink::WebConsoleMessage
;
98 using blink::WebDragOperation
;
99 using blink::WebDragOperationNone
;
100 using blink::WebDragOperationsMask
;
101 using blink::WebInputEvent
;
102 using blink::WebMediaPlayerAction
;
103 using blink::WebPluginAction
;
110 const int kVirtualKeyboardDisplayWaitTimeoutMs
= 100;
111 const int kMaxVirtualKeyboardDisplayRetries
= 5;
113 void DismissVirtualKeyboardTask() {
114 static int virtual_keyboard_display_retries
= 0;
115 // If the virtual keyboard is not yet visible, then we execute the task again
116 // waiting for it to show up.
117 if (!base::win::DismissVirtualKeyboard()) {
118 if (virtual_keyboard_display_retries
< kMaxVirtualKeyboardDisplayRetries
) {
119 BrowserThread::PostDelayedTask(
120 BrowserThread::UI
, FROM_HERE
,
121 base::Bind(base::IgnoreResult(&DismissVirtualKeyboardTask
)),
122 TimeDelta::FromMilliseconds(kVirtualKeyboardDisplayWaitTimeoutMs
));
123 ++virtual_keyboard_display_retries
;
125 virtual_keyboard_display_retries
= 0;
130 void GetWindowsSpecificPrefs(RendererPreferences
* prefs
) {
131 NONCLIENTMETRICS_XP metrics
= {0};
132 base::win::GetNonClientMetrics(&metrics
);
134 prefs
->caption_font_family_name
= metrics
.lfCaptionFont
.lfFaceName
;
135 prefs
->caption_font_height
= gfx::PlatformFontWin::GetFontSize(
136 metrics
.lfCaptionFont
);
138 prefs
->small_caption_font_family_name
= metrics
.lfSmCaptionFont
.lfFaceName
;
139 prefs
->small_caption_font_height
= gfx::PlatformFontWin::GetFontSize(
140 metrics
.lfSmCaptionFont
);
142 prefs
->menu_font_family_name
= metrics
.lfMenuFont
.lfFaceName
;
143 prefs
->menu_font_height
= gfx::PlatformFontWin::GetFontSize(
146 prefs
->status_font_family_name
= metrics
.lfStatusFont
.lfFaceName
;
147 prefs
->status_font_height
= gfx::PlatformFontWin::GetFontSize(
148 metrics
.lfStatusFont
);
150 prefs
->message_font_family_name
= metrics
.lfMessageFont
.lfFaceName
;
151 prefs
->message_font_height
= gfx::PlatformFontWin::GetFontSize(
152 metrics
.lfMessageFont
);
154 prefs
->vertical_scroll_bar_width_in_dips
=
155 gfx::win::GetSystemMetricsInDIP(SM_CXVSCROLL
);
156 prefs
->horizontal_scroll_bar_height_in_dips
=
157 gfx::win::GetSystemMetricsInDIP(SM_CYHSCROLL
);
158 prefs
->arrow_bitmap_height_vertical_scroll_bar_in_dips
=
159 gfx::win::GetSystemMetricsInDIP(SM_CYVSCROLL
);
160 prefs
->arrow_bitmap_width_horizontal_scroll_bar_in_dips
=
161 gfx::win::GetSystemMetricsInDIP(SM_CXHSCROLL
);
168 const int64
RenderViewHostImpl::kUnloadTimeoutMS
= 1000;
170 ///////////////////////////////////////////////////////////////////////////////
171 // RenderViewHost, public:
174 RenderViewHost
* RenderViewHost::FromID(int render_process_id
,
175 int render_view_id
) {
176 return RenderViewHostImpl::FromID(render_process_id
, render_view_id
);
180 RenderViewHost
* RenderViewHost::From(RenderWidgetHost
* rwh
) {
181 DCHECK(rwh
->IsRenderView());
182 return static_cast<RenderViewHostImpl
*>(RenderWidgetHostImpl::From(rwh
));
185 ///////////////////////////////////////////////////////////////////////////////
186 // RenderViewHostImpl, public:
189 RenderViewHostImpl
* RenderViewHostImpl::FromID(int render_process_id
,
190 int render_view_id
) {
191 RenderWidgetHost
* widget
=
192 RenderWidgetHost::FromID(render_process_id
, render_view_id
);
193 if (!widget
|| !widget
->IsRenderView())
195 return static_cast<RenderViewHostImpl
*>(RenderWidgetHostImpl::From(widget
));
198 RenderViewHostImpl::RenderViewHostImpl(
199 SiteInstance
* instance
,
200 RenderViewHostDelegate
* delegate
,
201 RenderWidgetHostDelegate
* widget_delegate
,
203 int main_frame_routing_id
,
206 bool has_initialized_audio_host
)
207 : RenderWidgetHostImpl(widget_delegate
,
208 instance
->GetProcess(),
211 frames_ref_count_(0),
213 instance_(static_cast<SiteInstanceImpl
*>(instance
)),
214 waiting_for_drag_context_response_(false),
215 enabled_bindings_(0),
218 is_active_(!swapped_out
),
219 is_swapped_out_(swapped_out
),
220 main_frame_routing_id_(main_frame_routing_id
),
221 is_waiting_for_close_ack_(false),
222 sudden_termination_allowed_(false),
223 render_view_termination_status_(base::TERMINATION_STATUS_STILL_RUNNING
),
224 virtual_keyboard_requested_(false),
225 is_focused_element_editable_(false),
226 updating_web_preferences_(false),
227 weak_factory_(this) {
228 DCHECK(instance_
.get());
229 CHECK(delegate_
); // http://crbug.com/82827
231 GetProcess()->AddObserver(this);
232 GetProcess()->EnableSendQueue();
234 if (ResourceDispatcherHostImpl::Get()) {
235 bool has_active_audio
= false;
236 if (has_initialized_audio_host
) {
237 scoped_refptr
<AudioRendererHost
> arh
=
238 static_cast<RenderProcessHostImpl
*>(GetProcess())
239 ->audio_renderer_host();
242 arh
->RenderFrameHasActiveAudio(main_frame_routing_id_
);
244 BrowserThread::PostTask(
247 base::Bind(&ResourceDispatcherHostImpl::OnRenderViewHostCreated
,
248 base::Unretained(ResourceDispatcherHostImpl::Get()),
249 GetProcess()->GetID(),
256 RenderViewHostImpl::~RenderViewHostImpl() {
257 if (ResourceDispatcherHostImpl::Get()) {
258 BrowserThread::PostTask(
259 BrowserThread::IO
, FROM_HERE
,
260 base::Bind(&ResourceDispatcherHostImpl::OnRenderViewHostDeleted
,
261 base::Unretained(ResourceDispatcherHostImpl::Get()),
262 GetProcess()->GetID(), GetRoutingID()));
265 delegate_
->RenderViewDeleted(this);
266 GetProcess()->RemoveObserver(this);
269 RenderViewHostDelegate
* RenderViewHostImpl::GetDelegate() const {
273 SiteInstanceImpl
* RenderViewHostImpl::GetSiteInstance() const {
274 return instance_
.get();
277 bool RenderViewHostImpl::CreateRenderView(
278 int opener_frame_route_id
,
281 const FrameReplicationState
& replicated_frame_state
,
282 bool window_was_created_with_opener
) {
283 TRACE_EVENT0("renderer_host,navigation",
284 "RenderViewHostImpl::CreateRenderView");
285 DCHECK(!IsRenderViewLive()) << "Creating view twice";
287 // The process may (if we're sharing a process with another host that already
288 // initialized it) or may not (we have our own process or the old process
289 // crashed) have been initialized. Calling Init multiple times will be
290 // ignored, so this is safe.
291 if (!GetProcess()->Init())
293 DCHECK(GetProcess()->HasConnection());
294 DCHECK(GetProcess()->GetBrowserContext());
296 set_renderer_initialized(true);
298 GpuSurfaceTracker::Get()->SetSurfaceHandle(
299 surface_id(), GetCompositingSurface());
301 // Ensure the RenderView starts with a next_page_id larger than any existing
302 // page ID it might be asked to render.
303 int32 next_page_id
= 1;
304 if (max_page_id
> -1)
305 next_page_id
= max_page_id
+ 1;
307 ViewMsg_New_Params params
;
308 params
.renderer_preferences
=
309 delegate_
->GetRendererPrefs(GetProcess()->GetBrowserContext());
311 GetWindowsSpecificPrefs(¶ms
.renderer_preferences
);
313 params
.web_preferences
= GetWebkitPreferences();
314 params
.view_id
= GetRoutingID();
315 params
.main_frame_routing_id
= main_frame_routing_id_
;
316 params
.surface_id
= surface_id();
317 params
.session_storage_namespace_id
=
318 delegate_
->GetSessionStorageNamespace(instance_
.get())->id();
319 // Ensure the RenderView sets its opener correctly.
320 params
.opener_frame_route_id
= opener_frame_route_id
;
321 params
.swapped_out
= !is_active_
;
322 params
.replicated_frame_state
= replicated_frame_state
;
323 params
.proxy_routing_id
= proxy_route_id
;
324 params
.hidden
= is_hidden();
325 params
.never_visible
= delegate_
->IsNeverVisible();
326 params
.window_was_created_with_opener
= window_was_created_with_opener
;
327 params
.next_page_id
= next_page_id
;
328 params
.enable_auto_resize
= auto_resize_enabled();
329 params
.min_size
= min_size_for_auto_resize();
330 params
.max_size
= max_size_for_auto_resize();
331 GetResizeParams(¶ms
.initial_size
);
333 if (!Send(new ViewMsg_New(params
)))
335 SetInitialRenderSizeParams(params
.initial_size
);
337 // If the RWHV has not yet been set, the surface ID namespace will get
338 // passed down by the call to SetView().
340 Send(new ViewMsg_SetSurfaceIdNamespace(GetRoutingID(),
341 view_
->GetSurfaceIdNamespace()));
344 // If it's enabled, tell the renderer to set up the Javascript bindings for
345 // sending messages back to the browser.
346 if (GetProcess()->IsForGuestsOnly())
347 DCHECK_EQ(0, enabled_bindings_
);
348 Send(new ViewMsg_AllowBindings(GetRoutingID(), enabled_bindings_
));
349 // Let our delegate know that we created a RenderView.
350 delegate_
->RenderViewCreated(this);
352 // Since this method can create the main RenderFrame in the renderer process,
353 // set the proper state on its corresponding RenderFrameHost.
354 if (main_frame_routing_id_
!= MSG_ROUTING_NONE
) {
355 RenderFrameHostImpl::FromID(GetProcess()->GetID(), main_frame_routing_id_
)
356 ->SetRenderFrameCreated(true);
362 bool RenderViewHostImpl::IsRenderViewLive() const {
363 return GetProcess()->HasConnection() && renderer_initialized();
366 void RenderViewHostImpl::SyncRendererPrefs() {
367 RendererPreferences renderer_preferences
=
368 delegate_
->GetRendererPrefs(GetProcess()->GetBrowserContext());
370 GetWindowsSpecificPrefs(&renderer_preferences
);
372 Send(new ViewMsg_SetRendererPrefs(GetRoutingID(), renderer_preferences
));
375 WebPreferences
RenderViewHostImpl::ComputeWebkitPrefs() {
376 TRACE_EVENT0("browser", "RenderViewHostImpl::GetWebkitPrefs");
377 WebPreferences prefs
;
379 const base::CommandLine
& command_line
=
380 *base::CommandLine::ForCurrentProcess();
382 prefs
.web_security_enabled
=
383 !command_line
.HasSwitch(switches::kDisableWebSecurity
);
385 prefs
.remote_fonts_enabled
=
386 !command_line
.HasSwitch(switches::kDisableRemoteFonts
);
387 prefs
.application_cache_enabled
= true;
388 prefs
.xss_auditor_enabled
=
389 !command_line
.HasSwitch(switches::kDisableXSSAuditor
);
390 prefs
.local_storage_enabled
=
391 !command_line
.HasSwitch(switches::kDisableLocalStorage
);
392 prefs
.databases_enabled
=
393 !command_line
.HasSwitch(switches::kDisableDatabases
);
394 #if defined(OS_ANDROID)
395 // WebAudio is enabled by default on x86 and ARM.
396 prefs
.webaudio_enabled
=
397 !command_line
.HasSwitch(switches::kDisableWebAudio
);
400 prefs
.experimental_webgl_enabled
=
401 GpuProcessHost::gpu_enabled() &&
402 !command_line
.HasSwitch(switches::kDisable3DAPIs
) &&
403 !command_line
.HasSwitch(switches::kDisableExperimentalWebGL
);
405 prefs
.pepper_3d_enabled
=
406 !command_line
.HasSwitch(switches::kDisablePepper3d
);
408 prefs
.flash_3d_enabled
=
409 GpuProcessHost::gpu_enabled() &&
410 !command_line
.HasSwitch(switches::kDisableFlash3d
);
411 prefs
.flash_stage3d_enabled
=
412 GpuProcessHost::gpu_enabled() &&
413 !command_line
.HasSwitch(switches::kDisableFlashStage3d
);
414 prefs
.flash_stage3d_baseline_enabled
=
415 GpuProcessHost::gpu_enabled() &&
416 !command_line
.HasSwitch(switches::kDisableFlashStage3d
);
418 prefs
.allow_file_access_from_file_urls
=
419 command_line
.HasSwitch(switches::kAllowFileAccessFromFiles
);
421 prefs
.accelerated_2d_canvas_enabled
=
422 GpuProcessHost::gpu_enabled() &&
423 !command_line
.HasSwitch(switches::kDisableAccelerated2dCanvas
);
424 prefs
.antialiased_2d_canvas_disabled
=
425 command_line
.HasSwitch(switches::kDisable2dCanvasAntialiasing
);
426 prefs
.antialiased_clips_2d_canvas_enabled
=
427 command_line
.HasSwitch(switches::kEnable2dCanvasClipAntialiasing
);
428 prefs
.accelerated_2d_canvas_msaa_sample_count
=
429 atoi(command_line
.GetSwitchValueASCII(
430 switches::kAcceleratedCanvas2dMSAASampleCount
).c_str());
432 prefs
.pinch_overlay_scrollbar_thickness
= 10;
433 prefs
.use_solid_color_scrollbars
= ui::IsOverlayScrollbarEnabled();
435 #if defined(OS_ANDROID)
436 // On Android, user gestures are normally required, unless that requirement
437 // is disabled with a command-line switch or the equivalent field trial is
438 // is set to "Enabled".
439 const std::string autoplay_group_name
= base::FieldTrialList::FindFullName(
440 "MediaElementAutoplay");
441 prefs
.user_gesture_required_for_media_playback
= !command_line
.HasSwitch(
442 switches::kDisableGestureRequirementForMediaPlayback
) &&
443 (autoplay_group_name
.empty() || autoplay_group_name
!= "Enabled");
446 prefs
.touch_enabled
= ui::AreTouchEventsEnabled();
447 prefs
.device_supports_touch
= prefs
.touch_enabled
&&
448 ui::IsTouchDevicePresent();
449 prefs
.available_pointer_types
= ui::GetAvailablePointerTypes();
450 prefs
.primary_pointer_type
= ui::GetPrimaryPointerType();
451 prefs
.available_hover_types
= ui::GetAvailableHoverTypes();
452 prefs
.primary_hover_type
= ui::GetPrimaryHoverType();
454 #if defined(OS_ANDROID)
455 prefs
.device_supports_mouse
= false;
458 prefs
.pointer_events_max_touch_points
= ui::MaxTouchPoints();
460 prefs
.touch_adjustment_enabled
=
461 !command_line
.HasSwitch(switches::kDisableTouchAdjustment
);
463 const std::string slimming_group
=
464 base::FieldTrialList::FindFullName("SlimmingPaint");
465 prefs
.slimming_paint_enabled
=
466 (command_line
.HasSwitch(switches::kEnableSlimmingPaint
) ||
467 !command_line
.HasSwitch(switches::kDisableSlimmingPaint
)) &&
468 (slimming_group
!= "DisableSlimmingPaint");
469 prefs
.slimming_paint_v2_enabled
=
470 prefs
.slimming_paint_enabled
&&
471 command_line
.HasSwitch(switches::kEnableSlimmingPaintV2
);
473 #if defined(OS_MACOSX) || defined(OS_CHROMEOS)
474 bool default_enable_scroll_animator
= true;
476 bool default_enable_scroll_animator
= false;
478 prefs
.enable_scroll_animator
= default_enable_scroll_animator
;
479 if (command_line
.HasSwitch(switches::kEnableSmoothScrolling
))
480 prefs
.enable_scroll_animator
= true;
481 if (command_line
.HasSwitch(switches::kDisableSmoothScrolling
))
482 prefs
.enable_scroll_animator
= false;
484 // Certain GPU features might have been blacklisted.
485 GpuDataManagerImpl::GetInstance()->UpdateRendererWebPrefs(&prefs
);
487 if (ChildProcessSecurityPolicyImpl::GetInstance()->HasWebUIBindings(
488 GetProcess()->GetID())) {
489 prefs
.loads_images_automatically
= true;
490 prefs
.javascript_enabled
= true;
493 prefs
.connection_type
= net::NetworkChangeNotifier::GetConnectionType();
495 prefs
.connection_type
!= net::NetworkChangeNotifier::CONNECTION_NONE
;
497 prefs
.number_of_cpu_cores
= base::SysInfo::NumberOfProcessors();
499 prefs
.viewport_meta_enabled
=
500 command_line
.HasSwitch(switches::kEnableViewportMeta
);
502 prefs
.viewport_enabled
=
503 command_line
.HasSwitch(switches::kEnableViewport
) ||
504 prefs
.viewport_meta_enabled
;
506 prefs
.main_frame_resizes_are_orientation_changes
=
507 command_line
.HasSwitch(switches::kMainFrameResizesAreOrientationChanges
);
509 prefs
.image_color_profiles_enabled
=
510 command_line
.HasSwitch(switches::kEnableImageColorProfiles
);
512 prefs
.spatial_navigation_enabled
= command_line
.HasSwitch(
513 switches::kEnableSpatialNavigation
);
515 prefs
.disable_reading_from_canvas
= command_line
.HasSwitch(
516 switches::kDisableReadingFromCanvas
);
518 prefs
.strict_mixed_content_checking
= command_line
.HasSwitch(
519 switches::kEnableStrictMixedContentChecking
);
521 prefs
.strict_powerful_feature_restrictions
= command_line
.HasSwitch(
522 switches::kEnableStrictPowerfulFeatureRestrictions
);
524 const std::string blockable_mixed_content_group
=
525 base::FieldTrialList::FindFullName("BlockableMixedContent");
526 prefs
.strictly_block_blockable_mixed_content
=
527 blockable_mixed_content_group
== "StrictlyBlockBlockableMixedContent";
529 const std::string plugin_mixed_content_status
=
530 base::FieldTrialList::FindFullName("PluginMixedContentStatus");
531 prefs
.block_mixed_plugin_content
=
532 plugin_mixed_content_status
== "BlockableMixedContent";
534 prefs
.v8_cache_options
= GetV8CacheOptions();
536 GetContentClient()->browser()->OverrideWebkitPrefs(this, &prefs
);
540 void RenderViewHostImpl::SuppressDialogsUntilSwapOut() {
541 Send(new ViewMsg_SuppressDialogsUntilSwapOut(GetRoutingID()));
544 void RenderViewHostImpl::ClosePage() {
545 is_waiting_for_close_ack_
= true;
546 StartHangMonitorTimeout(TimeDelta::FromMilliseconds(kUnloadTimeoutMS
));
548 if (IsRenderViewLive()) {
549 // Since we are sending an IPC message to the renderer, increase the event
550 // count to prevent the hang monitor timeout from being stopped by input
551 // event acknowledgements.
552 increment_in_flight_event_count();
554 // TODO(creis): Should this be moved to Shutdown? It may not be called for
555 // RenderViewHosts that have been swapped out.
556 NotificationService::current()->Notify(
557 NOTIFICATION_RENDER_VIEW_HOST_WILL_CLOSE_RENDER_VIEW
,
558 Source
<RenderViewHost
>(this),
559 NotificationService::NoDetails());
561 Send(new ViewMsg_ClosePage(GetRoutingID()));
563 // This RenderViewHost doesn't have a live renderer, so just skip the unload
564 // event and close the page.
565 ClosePageIgnoringUnloadEvents();
569 void RenderViewHostImpl::ClosePageIgnoringUnloadEvents() {
570 StopHangMonitorTimeout();
571 is_waiting_for_close_ack_
= false;
573 sudden_termination_allowed_
= true;
574 delegate_
->Close(this);
577 #if defined(OS_ANDROID)
578 void RenderViewHostImpl::ActivateNearestFindResult(int request_id
,
581 Send(new InputMsg_ActivateNearestFindResult(GetRoutingID(),
585 void RenderViewHostImpl::RequestFindMatchRects(int current_version
) {
586 Send(new ViewMsg_FindMatchRects(GetRoutingID(), current_version
));
590 void RenderViewHostImpl::RenderProcessExited(RenderProcessHost
* host
,
591 base::TerminationStatus status
,
593 if (!renderer_initialized())
596 RenderWidgetHostImpl::RendererExited(status
, exit_code
);
597 delegate_
->RenderViewTerminated(this, status
, exit_code
);
600 void RenderViewHostImpl::DragTargetDragEnter(
601 const DropData
& drop_data
,
602 const gfx::Point
& client_pt
,
603 const gfx::Point
& screen_pt
,
604 WebDragOperationsMask operations_allowed
,
606 const int renderer_id
= GetProcess()->GetID();
607 ChildProcessSecurityPolicyImpl
* policy
=
608 ChildProcessSecurityPolicyImpl::GetInstance();
610 #if defined(OS_CHROMEOS)
611 // The externalfile:// scheme is used in Chrome OS to open external files in a
613 if (drop_data
.url
.SchemeIs(content::kExternalFileScheme
))
614 policy
->GrantRequestURL(renderer_id
, drop_data
.url
);
617 // The URL could have been cobbled together from any highlighted text string,
618 // and can't be interpreted as a capability.
619 DropData
filtered_data(drop_data
);
620 GetProcess()->FilterURL(true, &filtered_data
.url
);
621 if (drop_data
.did_originate_from_renderer
) {
622 filtered_data
.filenames
.clear();
625 // The filenames vector, on the other hand, does represent a capability to
626 // access the given files.
627 storage::IsolatedContext::FileInfoSet files
;
628 for (std::vector
<ui::FileInfo
>::iterator
iter(
629 filtered_data
.filenames
.begin());
630 iter
!= filtered_data
.filenames
.end();
632 // A dragged file may wind up as the value of an input element, or it
633 // may be used as the target of a navigation instead. We don't know
634 // which will happen at this point, so generously grant both access
635 // and request permissions to the specific file to cover both cases.
636 // We do not give it the permission to request all file:// URLs.
638 // Make sure we have the same display_name as the one we register.
639 if (iter
->display_name
.empty()) {
641 files
.AddPath(iter
->path
, &name
);
642 iter
->display_name
= base::FilePath::FromUTF8Unsafe(name
);
644 files
.AddPathWithName(iter
->path
, iter
->display_name
.AsUTF8Unsafe());
647 policy
->GrantRequestSpecificFileURL(renderer_id
,
648 net::FilePathToFileURL(iter
->path
));
650 // If the renderer already has permission to read these paths, we don't need
651 // to re-grant them. This prevents problems with DnD for files in the CrOS
652 // file manager--the file manager already had read/write access to those
653 // directories, but dragging a file would cause the read/write access to be
654 // overwritten with read-only access, making them impossible to delete or
655 // rename until the renderer was killed.
656 if (!policy
->CanReadFile(renderer_id
, iter
->path
))
657 policy
->GrantReadFile(renderer_id
, iter
->path
);
660 storage::IsolatedContext
* isolated_context
=
661 storage::IsolatedContext::GetInstance();
662 DCHECK(isolated_context
);
663 std::string filesystem_id
= isolated_context
->RegisterDraggedFileSystem(
665 if (!filesystem_id
.empty()) {
666 // Grant the permission iff the ID is valid.
667 policy
->GrantReadFileSystem(renderer_id
, filesystem_id
);
669 filtered_data
.filesystem_id
= base::UTF8ToUTF16(filesystem_id
);
671 storage::FileSystemContext
* file_system_context
=
672 BrowserContext::GetStoragePartition(GetProcess()->GetBrowserContext(),
674 ->GetFileSystemContext();
675 for (size_t i
= 0; i
< filtered_data
.file_system_files
.size(); ++i
) {
676 storage::FileSystemURL file_system_url
=
677 file_system_context
->CrackURL(filtered_data
.file_system_files
[i
].url
);
679 std::string register_name
;
680 std::string filesystem_id
= isolated_context
->RegisterFileSystemForPath(
681 file_system_url
.type(), file_system_url
.filesystem_id(),
682 file_system_url
.path(), ®ister_name
);
683 policy
->GrantReadFileSystem(renderer_id
, filesystem_id
);
685 // Note: We are using the origin URL provided by the sender here. It may be
686 // different from the receiver's.
687 filtered_data
.file_system_files
[i
].url
=
688 GURL(storage::GetIsolatedFileSystemRootURIString(
689 file_system_url
.origin(), filesystem_id
, std::string())
690 .append(register_name
));
693 Send(new DragMsg_TargetDragEnter(GetRoutingID(), filtered_data
, client_pt
,
694 screen_pt
, operations_allowed
,
698 void RenderViewHostImpl::DragTargetDragOver(
699 const gfx::Point
& client_pt
,
700 const gfx::Point
& screen_pt
,
701 WebDragOperationsMask operations_allowed
,
703 Send(new DragMsg_TargetDragOver(GetRoutingID(), client_pt
, screen_pt
,
704 operations_allowed
, key_modifiers
));
707 void RenderViewHostImpl::DragTargetDragLeave() {
708 Send(new DragMsg_TargetDragLeave(GetRoutingID()));
711 void RenderViewHostImpl::DragTargetDrop(
712 const gfx::Point
& client_pt
,
713 const gfx::Point
& screen_pt
,
715 Send(new DragMsg_TargetDrop(GetRoutingID(), client_pt
, screen_pt
,
719 void RenderViewHostImpl::DragSourceEndedAt(
720 int client_x
, int client_y
, int screen_x
, int screen_y
,
721 WebDragOperation operation
) {
722 Send(new DragMsg_SourceEnded(GetRoutingID(),
723 gfx::Point(client_x
, client_y
),
724 gfx::Point(screen_x
, screen_y
),
728 void RenderViewHostImpl::DragSourceSystemDragEnded() {
729 Send(new DragMsg_SourceSystemDragEnded(GetRoutingID()));
732 RenderFrameHost
* RenderViewHostImpl::GetMainFrame() {
733 return RenderFrameHost::FromID(GetProcess()->GetID(), main_frame_routing_id_
);
736 void RenderViewHostImpl::AllowBindings(int bindings_flags
) {
737 // Never grant any bindings to browser plugin guests.
738 if (GetProcess()->IsForGuestsOnly()) {
739 NOTREACHED() << "Never grant bindings to a guest process.";
743 // Ensure we aren't granting WebUI bindings to a process that has already
744 // been used for non-privileged views.
745 if (bindings_flags
& BINDINGS_POLICY_WEB_UI
&&
746 GetProcess()->HasConnection() &&
747 !ChildProcessSecurityPolicyImpl::GetInstance()->HasWebUIBindings(
748 GetProcess()->GetID())) {
749 // This process has no bindings yet. Make sure it does not have more
750 // than this single active view.
751 // --single-process only has one renderer.
752 if (GetProcess()->GetActiveViewCount() > 1 &&
753 !base::CommandLine::ForCurrentProcess()->HasSwitch(
754 switches::kSingleProcess
))
758 if (bindings_flags
& BINDINGS_POLICY_WEB_UI
) {
759 ChildProcessSecurityPolicyImpl::GetInstance()->GrantWebUIBindings(
760 GetProcess()->GetID());
763 enabled_bindings_
|= bindings_flags
;
764 if (renderer_initialized())
765 Send(new ViewMsg_AllowBindings(GetRoutingID(), enabled_bindings_
));
768 int RenderViewHostImpl::GetEnabledBindings() const {
769 return enabled_bindings_
;
772 void RenderViewHostImpl::SetWebUIProperty(const std::string
& name
,
773 const std::string
& value
) {
774 // This is a sanity check before telling the renderer to enable the property.
775 // It could lie and send the corresponding IPC messages anyway, but we will
776 // not act on them if enabled_bindings_ doesn't agree. If we get here without
777 // WebUI bindings, kill the renderer process.
778 if (enabled_bindings_
& BINDINGS_POLICY_WEB_UI
) {
779 Send(new ViewMsg_SetWebUIProperty(GetRoutingID(), name
, value
));
782 base::UserMetricsAction("BindingsMismatchTerminate_RVH_WebUI"));
783 GetProcess()->Shutdown(content::RESULT_CODE_KILLED
, false);
787 void RenderViewHostImpl::GotFocus() {
788 RenderWidgetHostImpl::GotFocus(); // Notifies the renderer it got focus.
790 RenderViewHostDelegateView
* view
= delegate_
->GetDelegateView();
795 void RenderViewHostImpl::LostCapture() {
796 RenderWidgetHostImpl::LostCapture();
797 delegate_
->LostCapture();
800 void RenderViewHostImpl::LostMouseLock() {
801 RenderWidgetHostImpl::LostMouseLock();
802 delegate_
->LostMouseLock();
805 void RenderViewHostImpl::SetInitialFocus(bool reverse
) {
806 Send(new ViewMsg_SetInitialFocus(GetRoutingID(), reverse
));
809 void RenderViewHostImpl::FilesSelectedInChooser(
810 const std::vector
<content::FileChooserFileInfo
>& files
,
811 FileChooserParams::Mode permissions
) {
812 storage::FileSystemContext
* const file_system_context
=
813 BrowserContext::GetStoragePartition(GetProcess()->GetBrowserContext(),
815 ->GetFileSystemContext();
816 // Grant the security access requested to the given files.
817 for (size_t i
= 0; i
< files
.size(); ++i
) {
818 const content::FileChooserFileInfo
& file
= files
[i
];
819 if (permissions
== FileChooserParams::Save
) {
820 ChildProcessSecurityPolicyImpl::GetInstance()->GrantCreateReadWriteFile(
821 GetProcess()->GetID(), file
.file_path
);
823 ChildProcessSecurityPolicyImpl::GetInstance()->GrantReadFile(
824 GetProcess()->GetID(), file
.file_path
);
826 if (file
.file_system_url
.is_valid()) {
827 ChildProcessSecurityPolicyImpl::GetInstance()->GrantReadFileSystem(
828 GetProcess()->GetID(),
829 file_system_context
->CrackURL(file
.file_system_url
)
830 .mount_filesystem_id());
833 Send(new ViewMsg_RunFileChooserResponse(GetRoutingID(), files
));
836 void RenderViewHostImpl::DirectoryEnumerationFinished(
838 const std::vector
<base::FilePath
>& files
) {
839 // Grant the security access requested to the given files.
840 for (std::vector
<base::FilePath
>::const_iterator file
= files
.begin();
841 file
!= files
.end(); ++file
) {
842 ChildProcessSecurityPolicyImpl::GetInstance()->GrantReadFile(
843 GetProcess()->GetID(), *file
);
845 Send(new ViewMsg_EnumerateDirectoryResponse(GetRoutingID(),
850 void RenderViewHostImpl::SetIsLoading(bool is_loading
) {
851 if (ResourceDispatcherHostImpl::Get()) {
852 BrowserThread::PostTask(
855 base::Bind(&ResourceDispatcherHostImpl::OnRenderViewHostSetIsLoading
,
856 base::Unretained(ResourceDispatcherHostImpl::Get()),
857 GetProcess()->GetID(),
861 RenderWidgetHostImpl::SetIsLoading(is_loading
);
864 void RenderViewHostImpl::LoadStateChanged(
866 const net::LoadStateWithParam
& load_state
,
867 uint64 upload_position
,
868 uint64 upload_size
) {
869 delegate_
->LoadStateChanged(url
, load_state
, upload_position
, upload_size
);
872 bool RenderViewHostImpl::SuddenTerminationAllowed() const {
873 return sudden_termination_allowed_
||
874 GetProcess()->SuddenTerminationAllowed();
877 ///////////////////////////////////////////////////////////////////////////////
878 // RenderViewHostImpl, IPC message handlers:
880 bool RenderViewHostImpl::OnMessageReceived(const IPC::Message
& msg
) {
881 if (!BrowserMessageFilter::CheckCanDispatchOnUI(msg
, this))
884 // Filter out most IPC messages if this renderer is swapped out.
885 // We still want to handle certain ACKs to keep our state consistent.
886 if (is_swapped_out_
) {
887 if (!SwappedOutMessages::CanHandleWhileSwappedOut(msg
)) {
888 // If this is a synchronous message and we decided not to handle it,
889 // we must send an error reply, or else the renderer will be stuck
890 // and won't respond to future requests.
892 IPC::Message
* reply
= IPC::SyncMessage::GenerateReply(&msg
);
893 reply
->set_reply_error();
896 // Don't continue looking for someone to handle it.
901 if (delegate_
->OnMessageReceived(this, msg
))
905 IPC_BEGIN_MESSAGE_MAP(RenderViewHostImpl
, msg
)
906 IPC_MESSAGE_HANDLER(FrameHostMsg_RenderProcessGone
, OnRenderProcessGone
)
907 IPC_MESSAGE_HANDLER(ViewHostMsg_ShowView
, OnShowView
)
908 IPC_MESSAGE_HANDLER(ViewHostMsg_ShowWidget
, OnShowWidget
)
909 IPC_MESSAGE_HANDLER(ViewHostMsg_ShowFullscreenWidget
,
910 OnShowFullscreenWidget
)
911 IPC_MESSAGE_HANDLER(ViewHostMsg_RenderViewReady
, OnRenderViewReady
)
912 IPC_MESSAGE_HANDLER(ViewHostMsg_UpdateState
, OnUpdateState
)
913 IPC_MESSAGE_HANDLER(ViewHostMsg_UpdateTargetURL
, OnUpdateTargetURL
)
914 IPC_MESSAGE_HANDLER(ViewHostMsg_Close
, OnClose
)
915 IPC_MESSAGE_HANDLER(ViewHostMsg_RequestMove
, OnRequestMove
)
916 IPC_MESSAGE_HANDLER(ViewHostMsg_DocumentAvailableInMainFrame
,
917 OnDocumentAvailableInMainFrame
)
918 IPC_MESSAGE_HANDLER(ViewHostMsg_DidContentsPreferredSizeChange
,
919 OnDidContentsPreferredSizeChange
)
920 IPC_MESSAGE_HANDLER(ViewHostMsg_RouteCloseEvent
,
922 IPC_MESSAGE_HANDLER(DragHostMsg_StartDragging
, OnStartDragging
)
923 IPC_MESSAGE_HANDLER(DragHostMsg_UpdateDragCursor
, OnUpdateDragCursor
)
924 IPC_MESSAGE_HANDLER(ViewHostMsg_TakeFocus
, OnTakeFocus
)
925 IPC_MESSAGE_HANDLER(ViewHostMsg_FocusedNodeChanged
, OnFocusedNodeChanged
)
926 IPC_MESSAGE_HANDLER(ViewHostMsg_ClosePage_ACK
, OnClosePageACK
)
927 IPC_MESSAGE_HANDLER(ViewHostMsg_DidZoomURL
, OnDidZoomURL
)
928 IPC_MESSAGE_HANDLER(ViewHostMsg_PageScaleFactorIsOneChanged
,
929 OnPageScaleFactorIsOneChanged
)
930 IPC_MESSAGE_HANDLER(ViewHostMsg_RunFileChooser
, OnRunFileChooser
)
931 IPC_MESSAGE_HANDLER(ViewHostMsg_FocusedNodeTouched
, OnFocusedNodeTouched
)
932 // Have the super handle all other messages.
933 IPC_MESSAGE_UNHANDLED(
934 handled
= RenderWidgetHostImpl::OnMessageReceived(msg
))
935 IPC_END_MESSAGE_MAP()
940 void RenderViewHostImpl::Init() {
941 RenderWidgetHostImpl::Init();
944 void RenderViewHostImpl::Shutdown() {
945 // We can't release the SessionStorageNamespace until our peer
946 // in the renderer has wound down.
947 if (GetProcess()->HasConnection()) {
948 RenderProcessHostImpl::ReleaseOnCloseACK(
950 delegate_
->GetSessionStorageNamespaceMap(),
954 RenderWidgetHostImpl::Shutdown();
957 void RenderViewHostImpl::WasHidden() {
958 if (ResourceDispatcherHostImpl::Get()) {
959 BrowserThread::PostTask(
960 BrowserThread::IO
, FROM_HERE
,
961 base::Bind(&ResourceDispatcherHostImpl::OnRenderViewHostWasHidden
,
962 base::Unretained(ResourceDispatcherHostImpl::Get()),
963 GetProcess()->GetID(), GetRoutingID()));
966 RenderWidgetHostImpl::WasHidden();
969 void RenderViewHostImpl::WasShown(const ui::LatencyInfo
& latency_info
) {
970 if (ResourceDispatcherHostImpl::Get()) {
971 BrowserThread::PostTask(
972 BrowserThread::IO
, FROM_HERE
,
973 base::Bind(&ResourceDispatcherHostImpl::OnRenderViewHostWasShown
,
974 base::Unretained(ResourceDispatcherHostImpl::Get()),
975 GetProcess()->GetID(), GetRoutingID()));
978 RenderWidgetHostImpl::WasShown(latency_info
);
981 bool RenderViewHostImpl::IsRenderView() const {
985 void RenderViewHostImpl::CreateNewWindow(
987 int main_frame_route_id
,
988 const ViewHostMsg_CreateWindow_Params
& params
,
989 SessionStorageNamespace
* session_storage_namespace
) {
990 ViewHostMsg_CreateWindow_Params
validated_params(params
);
991 GetProcess()->FilterURL(false, &validated_params
.target_url
);
992 GetProcess()->FilterURL(false, &validated_params
.opener_url
);
993 GetProcess()->FilterURL(true, &validated_params
.opener_security_origin
);
995 delegate_
->CreateNewWindow(GetSiteInstance(), route_id
, main_frame_route_id
,
996 validated_params
, session_storage_namespace
);
999 void RenderViewHostImpl::CreateNewWidget(int route_id
,
1000 blink::WebPopupType popup_type
) {
1001 delegate_
->CreateNewWidget(GetProcess()->GetID(), route_id
, popup_type
);
1004 void RenderViewHostImpl::CreateNewFullscreenWidget(int route_id
) {
1005 delegate_
->CreateNewFullscreenWidget(GetProcess()->GetID(), route_id
);
1008 void RenderViewHostImpl::OnShowView(int route_id
,
1009 WindowOpenDisposition disposition
,
1010 const gfx::Rect
& initial_rect
,
1011 bool user_gesture
) {
1012 delegate_
->ShowCreatedWindow(route_id
, disposition
, initial_rect
,
1014 Send(new ViewMsg_Move_ACK(route_id
));
1017 void RenderViewHostImpl::OnShowWidget(int route_id
,
1018 const gfx::Rect
& initial_rect
) {
1020 delegate_
->ShowCreatedWidget(route_id
, initial_rect
);
1021 Send(new ViewMsg_Move_ACK(route_id
));
1024 void RenderViewHostImpl::OnShowFullscreenWidget(int route_id
) {
1026 delegate_
->ShowCreatedFullscreenWidget(route_id
);
1027 Send(new ViewMsg_Move_ACK(route_id
));
1030 void RenderViewHostImpl::OnRenderViewReady() {
1031 render_view_termination_status_
= base::TERMINATION_STATUS_STILL_RUNNING
;
1034 delegate_
->RenderViewReady(this);
1037 void RenderViewHostImpl::OnRenderProcessGone(int status
, int exit_code
) {
1038 // Do nothing, otherwise RenderWidgetHostImpl will assume it is not a
1039 // RenderViewHostImpl and destroy itself.
1040 // TODO(nasko): Remove this hack once RenderViewHost and RenderWidgetHost are
1044 void RenderViewHostImpl::OnUpdateState(int32 page_id
, const PageState
& state
) {
1045 // If the following DCHECK fails, you have encountered a tricky edge-case that
1046 // has evaded reproduction for a very long time. Please report what you were
1047 // doing on http://crbug.com/407376, whether or not you can reproduce the
1049 DCHECK_EQ(page_id
, page_id_
);
1051 // Without this check, the renderer can trick the browser into using
1052 // filenames it can't access in a future session restore.
1053 if (!CanAccessFilesOfPageState(state
)) {
1054 bad_message::ReceivedBadMessage(
1055 GetProcess(), bad_message::RVH_CAN_ACCESS_FILES_OF_PAGE_STATE
);
1059 delegate_
->UpdateState(this, page_id
, state
);
1062 void RenderViewHostImpl::OnUpdateTargetURL(const GURL
& url
) {
1064 delegate_
->UpdateTargetURL(this, url
);
1066 // Send a notification back to the renderer that we are ready to
1067 // receive more target urls.
1068 Send(new ViewMsg_UpdateTargetURL_ACK(GetRoutingID()));
1071 void RenderViewHostImpl::OnClose() {
1072 // If the renderer is telling us to close, it has already run the unload
1073 // events, and we can take the fast path.
1074 ClosePageIgnoringUnloadEvents();
1077 void RenderViewHostImpl::OnRequestMove(const gfx::Rect
& pos
) {
1079 delegate_
->RequestMove(pos
);
1080 Send(new ViewMsg_Move_ACK(GetRoutingID()));
1083 void RenderViewHostImpl::OnDocumentAvailableInMainFrame(
1084 bool uses_temporary_zoom_level
) {
1085 delegate_
->DocumentAvailableInMainFrame(this);
1087 if (!uses_temporary_zoom_level
)
1090 HostZoomMapImpl
* host_zoom_map
=
1091 static_cast<HostZoomMapImpl
*>(HostZoomMap::Get(GetSiteInstance()));
1092 host_zoom_map
->SetTemporaryZoomLevel(GetProcess()->GetID(),
1094 host_zoom_map
->GetDefaultZoomLevel());
1097 void RenderViewHostImpl::OnDidContentsPreferredSizeChange(
1098 const gfx::Size
& new_size
) {
1099 delegate_
->UpdatePreferredSize(new_size
);
1102 void RenderViewHostImpl::OnRenderAutoResized(const gfx::Size
& new_size
) {
1103 delegate_
->ResizeDueToAutoResize(new_size
);
1106 void RenderViewHostImpl::OnRouteCloseEvent() {
1107 // Have the delegate route this to the active RenderViewHost.
1108 delegate_
->RouteCloseEvent(this);
1111 void RenderViewHostImpl::OnStartDragging(
1112 const DropData
& drop_data
,
1113 WebDragOperationsMask drag_operations_mask
,
1114 const SkBitmap
& bitmap
,
1115 const gfx::Vector2d
& bitmap_offset_in_dip
,
1116 const DragEventSourceInfo
& event_info
) {
1117 RenderViewHostDelegateView
* view
= delegate_
->GetDelegateView();
1121 DropData
filtered_data(drop_data
);
1122 RenderProcessHost
* process
= GetProcess();
1123 ChildProcessSecurityPolicyImpl
* policy
=
1124 ChildProcessSecurityPolicyImpl::GetInstance();
1126 // Allow drag of Javascript URLs to enable bookmarklet drag to bookmark bar.
1127 if (!filtered_data
.url
.SchemeIs(url::kJavaScriptScheme
))
1128 process
->FilterURL(true, &filtered_data
.url
);
1129 process
->FilterURL(false, &filtered_data
.html_base_url
);
1130 // Filter out any paths that the renderer didn't have access to. This prevents
1131 // the following attack on a malicious renderer:
1132 // 1. StartDragging IPC sent with renderer-specified filesystem paths that it
1133 // doesn't have read permissions for.
1134 // 2. We initiate a native DnD operation.
1135 // 3. DnD operation immediately ends since mouse is not held down. DnD events
1136 // still fire though, which causes read permissions to be granted to the
1137 // renderer for any file paths in the drop.
1138 filtered_data
.filenames
.clear();
1139 for (std::vector
<ui::FileInfo
>::const_iterator it
=
1140 drop_data
.filenames
.begin();
1141 it
!= drop_data
.filenames
.end();
1143 if (policy
->CanReadFile(GetProcess()->GetID(), it
->path
))
1144 filtered_data
.filenames
.push_back(*it
);
1147 storage::FileSystemContext
* file_system_context
=
1148 BrowserContext::GetStoragePartition(GetProcess()->GetBrowserContext(),
1150 ->GetFileSystemContext();
1151 filtered_data
.file_system_files
.clear();
1152 for (size_t i
= 0; i
< drop_data
.file_system_files
.size(); ++i
) {
1153 storage::FileSystemURL file_system_url
=
1154 file_system_context
->CrackURL(drop_data
.file_system_files
[i
].url
);
1155 if (policy
->CanReadFileSystemFile(GetProcess()->GetID(), file_system_url
))
1156 filtered_data
.file_system_files
.push_back(drop_data
.file_system_files
[i
]);
1159 float scale
= GetScaleFactorForView(GetView());
1160 gfx::ImageSkia
image(gfx::ImageSkiaRep(bitmap
, scale
));
1161 view
->StartDragging(filtered_data
, drag_operations_mask
, image
,
1162 bitmap_offset_in_dip
, event_info
);
1165 void RenderViewHostImpl::OnUpdateDragCursor(WebDragOperation current_op
) {
1166 RenderViewHostDelegateView
* view
= delegate_
->GetDelegateView();
1168 view
->UpdateDragCursor(current_op
);
1171 void RenderViewHostImpl::OnTakeFocus(bool reverse
) {
1172 RenderViewHostDelegateView
* view
= delegate_
->GetDelegateView();
1174 view
->TakeFocus(reverse
);
1177 void RenderViewHostImpl::OnFocusedNodeChanged(
1178 bool is_editable_node
,
1179 const gfx::Rect
& node_bounds_in_viewport
) {
1180 is_focused_element_editable_
= is_editable_node
;
1182 view_
->FocusedNodeChanged(is_editable_node
);
1184 if (!is_editable_node
&& virtual_keyboard_requested_
) {
1185 virtual_keyboard_requested_
= false;
1186 delegate_
->SetIsVirtualKeyboardRequested(false);
1187 BrowserThread::PostDelayedTask(
1188 BrowserThread::UI
, FROM_HERE
,
1189 base::Bind(base::IgnoreResult(&DismissVirtualKeyboardTask
)),
1190 TimeDelta::FromMilliseconds(kVirtualKeyboardDisplayWaitTimeoutMs
));
1194 // Convert node_bounds to screen coordinates.
1195 gfx::Rect view_bounds_in_screen
= view_
->GetViewBounds();
1196 gfx::Point origin
= node_bounds_in_viewport
.origin();
1197 origin
.Offset(view_bounds_in_screen
.x(), view_bounds_in_screen
.y());
1198 gfx::Rect
node_bounds_in_screen(origin
.x(), origin
.y(),
1199 node_bounds_in_viewport
.width(),
1200 node_bounds_in_viewport
.height());
1201 FocusedNodeDetails details
= {is_editable_node
, node_bounds_in_screen
};
1202 NotificationService::current()->Notify(NOTIFICATION_FOCUS_CHANGED_IN_PAGE
,
1203 Source
<RenderViewHost
>(this),
1204 Details
<FocusedNodeDetails
>(&details
));
1207 void RenderViewHostImpl::OnUserGesture() {
1208 delegate_
->OnUserGesture();
1211 void RenderViewHostImpl::OnClosePageACK() {
1212 decrement_in_flight_event_count();
1213 ClosePageIgnoringUnloadEvents();
1216 void RenderViewHostImpl::NotifyRendererUnresponsive() {
1217 delegate_
->RendererUnresponsive(this);
1220 void RenderViewHostImpl::NotifyRendererResponsive() {
1221 delegate_
->RendererResponsive(this);
1224 void RenderViewHostImpl::RequestToLockMouse(bool user_gesture
,
1225 bool last_unlocked_by_target
) {
1226 delegate_
->RequestToLockMouse(user_gesture
, last_unlocked_by_target
);
1229 bool RenderViewHostImpl::IsFullscreenGranted() const {
1230 return delegate_
->IsFullscreenForCurrentTab();
1233 blink::WebDisplayMode
RenderViewHostImpl::GetDisplayMode() const {
1234 return delegate_
->GetDisplayMode();
1237 void RenderViewHostImpl::OnFocus() {
1238 // Note: We allow focus and blur from swapped out RenderViewHosts, even when
1239 // the active RenderViewHost is in a different BrowsingInstance (e.g., WebUI).
1240 delegate_
->Activate();
1243 void RenderViewHostImpl::OnBlur() {
1244 delegate_
->Deactivate();
1247 gfx::Rect
RenderViewHostImpl::GetRootWindowResizerRect() const {
1248 return delegate_
->GetRootWindowResizerRect();
1251 void RenderViewHostImpl::ForwardMouseEvent(
1252 const blink::WebMouseEvent
& mouse_event
) {
1253 RenderWidgetHostImpl::ForwardMouseEvent(mouse_event
);
1254 if (mouse_event
.type
== WebInputEvent::MouseWheel
&& ignore_input_events())
1255 delegate_
->OnIgnoredUIEvent();
1258 void RenderViewHostImpl::ForwardKeyboardEvent(
1259 const NativeWebKeyboardEvent
& key_event
) {
1260 if (ignore_input_events()) {
1261 if (key_event
.type
== WebInputEvent::RawKeyDown
)
1262 delegate_
->OnIgnoredUIEvent();
1265 RenderWidgetHostImpl::ForwardKeyboardEvent(key_event
);
1268 void RenderViewHostImpl::OnTextSurroundingSelectionResponse(
1269 const base::string16
& content
,
1270 size_t start_offset
,
1271 size_t end_offset
) {
1274 view_
->OnTextSurroundingSelectionResponse(content
, start_offset
, end_offset
);
1277 WebPreferences
RenderViewHostImpl::GetWebkitPreferences() {
1278 if (!web_preferences_
.get()) {
1279 OnWebkitPreferencesChanged();
1281 return *web_preferences_
;
1284 void RenderViewHostImpl::UpdateWebkitPreferences(const WebPreferences
& prefs
) {
1285 web_preferences_
.reset(new WebPreferences(prefs
));
1286 Send(new ViewMsg_UpdateWebPreferences(GetRoutingID(), prefs
));
1289 void RenderViewHostImpl::OnWebkitPreferencesChanged() {
1290 // This is defensive code to avoid infinite loops due to code run inside
1291 // UpdateWebkitPreferences() accidentally updating more preferences and thus
1292 // calling back into this code. See crbug.com/398751 for one past example.
1293 if (updating_web_preferences_
)
1295 updating_web_preferences_
= true;
1296 UpdateWebkitPreferences(ComputeWebkitPrefs());
1297 updating_web_preferences_
= false;
1300 void RenderViewHostImpl::ClearFocusedElement() {
1301 is_focused_element_editable_
= false;
1302 Send(new ViewMsg_ClearFocusedElement(GetRoutingID()));
1305 bool RenderViewHostImpl::IsFocusedElementEditable() {
1306 return is_focused_element_editable_
;
1309 void RenderViewHostImpl::Zoom(PageZoom zoom
) {
1310 Send(new ViewMsg_Zoom(GetRoutingID(), zoom
));
1313 void RenderViewHostImpl::DisableScrollbarsForThreshold(const gfx::Size
& size
) {
1314 Send(new ViewMsg_DisableScrollbarsForSmallWindows(GetRoutingID(), size
));
1317 void RenderViewHostImpl::EnablePreferredSizeMode() {
1318 Send(new ViewMsg_EnablePreferredSizeChangedMode(GetRoutingID()));
1321 void RenderViewHostImpl::EnableAutoResize(const gfx::Size
& min_size
,
1322 const gfx::Size
& max_size
) {
1323 SetAutoResize(true, min_size
, max_size
);
1324 Send(new ViewMsg_EnableAutoResize(GetRoutingID(), min_size
, max_size
));
1327 void RenderViewHostImpl::DisableAutoResize(const gfx::Size
& new_size
) {
1328 SetAutoResize(false, gfx::Size(), gfx::Size());
1329 Send(new ViewMsg_DisableAutoResize(GetRoutingID(), new_size
));
1330 if (!new_size
.IsEmpty())
1331 GetView()->SetSize(new_size
);
1334 void RenderViewHostImpl::CopyImageAt(int x
, int y
) {
1335 Send(new ViewMsg_CopyImageAt(GetRoutingID(), x
, y
));
1338 void RenderViewHostImpl::SaveImageAt(int x
, int y
) {
1339 Send(new ViewMsg_SaveImageAt(GetRoutingID(), x
, y
));
1342 void RenderViewHostImpl::ExecuteMediaPlayerActionAtLocation(
1343 const gfx::Point
& location
, const blink::WebMediaPlayerAction
& action
) {
1344 Send(new ViewMsg_MediaPlayerActionAt(GetRoutingID(), location
, action
));
1347 void RenderViewHostImpl::ExecutePluginActionAtLocation(
1348 const gfx::Point
& location
, const blink::WebPluginAction
& action
) {
1349 Send(new ViewMsg_PluginActionAt(GetRoutingID(), location
, action
));
1352 void RenderViewHostImpl::NotifyMoveOrResizeStarted() {
1353 Send(new ViewMsg_MoveOrResizeStarted(GetRoutingID()));
1356 void RenderViewHostImpl::OnDidZoomURL(double zoom_level
,
1358 HostZoomMapImpl
* host_zoom_map
=
1359 static_cast<HostZoomMapImpl
*>(HostZoomMap::Get(GetSiteInstance()));
1361 host_zoom_map
->SetZoomLevelForView(GetProcess()->GetID(),
1364 net::GetHostOrSpecFromURL(url
));
1367 void RenderViewHostImpl::OnPageScaleFactorIsOneChanged(bool is_one
) {
1368 if (!GetSiteInstance())
1370 HostZoomMapImpl
* host_zoom_map
=
1371 static_cast<HostZoomMapImpl
*>(HostZoomMap::Get(GetSiteInstance()));
1376 host_zoom_map
->SetPageScaleFactorIsOneForView(GetProcess()->GetID(),
1377 GetRoutingID(), is_one
);
1380 void RenderViewHostImpl::OnRunFileChooser(const FileChooserParams
& params
) {
1381 // Do not allow messages with absolute paths in them as this can permit a
1382 // renderer to coerce the browser to perform I/O on a renderer controlled
1384 if (params
.default_file_name
!= params
.default_file_name
.BaseName()) {
1385 bad_message::ReceivedBadMessage(GetProcess(),
1386 bad_message::RVH_FILE_CHOOSER_PATH
);
1390 delegate_
->RunFileChooser(this, params
);
1393 void RenderViewHostImpl::OnFocusedNodeTouched(bool editable
) {
1396 virtual_keyboard_requested_
= base::win::DisplayVirtualKeyboard();
1397 delegate_
->SetIsVirtualKeyboardRequested(true);
1399 virtual_keyboard_requested_
= false;
1400 delegate_
->SetIsVirtualKeyboardRequested(false);
1401 base::win::DismissVirtualKeyboard();
1406 bool RenderViewHostImpl::CanAccessFilesOfPageState(
1407 const PageState
& state
) const {
1408 ChildProcessSecurityPolicyImpl
* policy
=
1409 ChildProcessSecurityPolicyImpl::GetInstance();
1411 const std::vector
<base::FilePath
>& file_paths
= state
.GetReferencedFiles();
1412 for (const auto& file
: file_paths
) {
1413 if (!policy
->CanReadFile(GetProcess()->GetID(), file
))
1419 void RenderViewHostImpl::GrantFileAccessFromPageState(const PageState
& state
) {
1420 ChildProcessSecurityPolicyImpl
* policy
=
1421 ChildProcessSecurityPolicyImpl::GetInstance();
1423 const std::vector
<base::FilePath
>& file_paths
= state
.GetReferencedFiles();
1424 for (const auto& file
: file_paths
) {
1425 if (!policy
->CanReadFile(GetProcess()->GetID(), file
))
1426 policy
->GrantReadFile(GetProcess()->GetID(), file
);
1430 void RenderViewHostImpl::SelectWordAroundCaret() {
1431 Send(new ViewMsg_SelectWordAroundCaret(GetRoutingID()));
1434 } // namespace content