Upstream version 8.37.180.0
[platform/framework/web/crosswalk.git] / src / chrome / browser / guest_view / web_view / web_view_guest.cc
1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #include "chrome/browser/guest_view/web_view/web_view_guest.h"
6
7 #include "base/message_loop/message_loop.h"
8 #include "base/strings/stringprintf.h"
9 #include "base/strings/utf_string_conversions.h"
10 #include "chrome/browser/chrome_notification_types.h"
11 #include "chrome/browser/content_settings/tab_specific_content_settings.h"
12 #include "chrome/browser/extensions/api/web_request/web_request_api.h"
13 #include "chrome/browser/extensions/api/webview/webview_api.h"
14 #include "chrome/browser/extensions/chrome_extension_web_contents_observer.h"
15 #include "chrome/browser/extensions/extension_renderer_state.h"
16 #include "chrome/browser/extensions/menu_manager.h"
17 #include "chrome/browser/extensions/script_executor.h"
18 #include "chrome/browser/favicon/favicon_tab_helper.h"
19 #include "chrome/browser/geolocation/geolocation_permission_context.h"
20 #include "chrome/browser/geolocation/geolocation_permission_context_factory.h"
21 #include "chrome/browser/guest_view/guest_view_constants.h"
22 #include "chrome/browser/guest_view/guest_view_manager.h"
23 #include "chrome/browser/guest_view/web_view/web_view_constants.h"
24 #include "chrome/browser/guest_view/web_view/web_view_permission_types.h"
25 #include "chrome/browser/renderer_context_menu/context_menu_delegate.h"
26 #include "chrome/browser/renderer_context_menu/render_view_context_menu.h"
27 #include "chrome/browser/ui/pdf/pdf_tab_helper.h"
28 #include "chrome/common/chrome_version_info.h"
29 #include "chrome/common/render_messages.h"
30 #include "content/public/browser/browser_thread.h"
31 #include "content/public/browser/child_process_security_policy.h"
32 #include "content/public/browser/host_zoom_map.h"
33 #include "content/public/browser/native_web_keyboard_event.h"
34 #include "content/public/browser/navigation_entry.h"
35 #include "content/public/browser/notification_details.h"
36 #include "content/public/browser/notification_service.h"
37 #include "content/public/browser/notification_source.h"
38 #include "content/public/browser/notification_types.h"
39 #include "content/public/browser/render_process_host.h"
40 #include "content/public/browser/render_view_host.h"
41 #include "content/public/browser/resource_request_details.h"
42 #include "content/public/browser/site_instance.h"
43 #include "content/public/browser/storage_partition.h"
44 #include "content/public/browser/user_metrics.h"
45 #include "content/public/browser/web_contents.h"
46 #include "content/public/browser/web_contents_delegate.h"
47 #include "content/public/common/media_stream_request.h"
48 #include "content/public/common/page_zoom.h"
49 #include "content/public/common/result_codes.h"
50 #include "content/public/common/stop_find_action.h"
51 #include "content/public/common/url_constants.h"
52 #include "extensions/common/constants.h"
53 #include "ipc/ipc_message_macros.h"
54 #include "net/base/escape.h"
55 #include "net/base/net_errors.h"
56 #include "third_party/WebKit/public/web/WebFindOptions.h"
57 #include "ui/base/models/simple_menu_model.h"
58
59 #if defined(ENABLE_PRINTING)
60 #if defined(ENABLE_FULL_PRINTING)
61 #include "chrome/browser/printing/print_preview_message_handler.h"
62 #include "chrome/browser/printing/print_view_manager.h"
63 #else
64 #include "chrome/browser/printing/print_view_manager_basic.h"
65 #endif  // defined(ENABLE_FULL_PRINTING)
66 #endif  // defined(ENABLE_PRINTING)
67
68 #if defined(ENABLE_PLUGINS)
69 #include "chrome/browser/guest_view/web_view/plugin_permission_helper.h"
70 #endif
71
72 #if defined(OS_CHROMEOS)
73 #include "chrome/browser/chromeos/accessibility/accessibility_manager.h"
74 #endif
75
76 using base::UserMetricsAction;
77 using content::RenderFrameHost;
78 using content::WebContents;
79
80 namespace {
81
82 std::string WindowOpenDispositionToString(
83   WindowOpenDisposition window_open_disposition) {
84   switch (window_open_disposition) {
85     case IGNORE_ACTION:
86       return "ignore";
87     case SAVE_TO_DISK:
88       return "save_to_disk";
89     case CURRENT_TAB:
90       return "current_tab";
91     case NEW_BACKGROUND_TAB:
92       return "new_background_tab";
93     case NEW_FOREGROUND_TAB:
94       return "new_foreground_tab";
95     case NEW_WINDOW:
96       return "new_window";
97     case NEW_POPUP:
98       return "new_popup";
99     default:
100       NOTREACHED() << "Unknown Window Open Disposition";
101       return "ignore";
102   }
103 }
104
105 static std::string TerminationStatusToString(base::TerminationStatus status) {
106   switch (status) {
107     case base::TERMINATION_STATUS_NORMAL_TERMINATION:
108       return "normal";
109     case base::TERMINATION_STATUS_ABNORMAL_TERMINATION:
110     case base::TERMINATION_STATUS_STILL_RUNNING:
111       return "abnormal";
112     case base::TERMINATION_STATUS_PROCESS_WAS_KILLED:
113       return "killed";
114     case base::TERMINATION_STATUS_PROCESS_CRASHED:
115 #if defined(OS_ANDROID)
116     case base::TERMINATION_STATUS_OOM_PROTECTED:
117 #endif
118       return "crashed";
119     case base::TERMINATION_STATUS_MAX_ENUM:
120       break;
121   }
122   NOTREACHED() << "Unknown Termination Status.";
123   return "unknown";
124 }
125
126 static std::string PermissionTypeToString(WebViewPermissionType type) {
127   switch (type) {
128     case WEB_VIEW_PERMISSION_TYPE_DOWNLOAD:
129       return webview::kPermissionTypeDownload;
130     case WEB_VIEW_PERMISSION_TYPE_FILESYSTEM:
131       return webview::kPermissionTypeFileSystem;
132     case WEB_VIEW_PERMISSION_TYPE_GEOLOCATION:
133       return webview::kPermissionTypeGeolocation;
134     case WEB_VIEW_PERMISSION_TYPE_JAVASCRIPT_DIALOG:
135       return webview::kPermissionTypeDialog;
136     case WEB_VIEW_PERMISSION_TYPE_LOAD_PLUGIN:
137       return webview::kPermissionTypeLoadPlugin;
138     case WEB_VIEW_PERMISSION_TYPE_MEDIA:
139       return webview::kPermissionTypeMedia;
140     case WEB_VIEW_PERMISSION_TYPE_NEW_WINDOW:
141       return webview::kPermissionTypeNewWindow;
142     case WEB_VIEW_PERMISSION_TYPE_POINTER_LOCK:
143       return webview::kPermissionTypePointerLock;
144     default:
145       NOTREACHED();
146       return std::string();
147   }
148 }
149
150 std::string GetStoragePartitionIdFromSiteURL(const GURL& site_url) {
151   const std::string& partition_id = site_url.query();
152   bool persist_storage = site_url.path().find("persist") != std::string::npos;
153   return (persist_storage ? webview::kPersistPrefix : "") + partition_id;
154 }
155
156 void RemoveWebViewEventListenersOnIOThread(
157     void* profile,
158     const std::string& extension_id,
159     int embedder_process_id,
160     int view_instance_id) {
161   DCHECK(content::BrowserThread::CurrentlyOn(content::BrowserThread::IO));
162   ExtensionWebRequestEventRouter::GetInstance()->RemoveWebViewEventListeners(
163       profile,
164       extension_id,
165       embedder_process_id,
166       view_instance_id);
167 }
168
169 void AttachWebViewHelpers(WebContents* contents) {
170   FaviconTabHelper::CreateForWebContents(contents);
171   extensions::ChromeExtensionWebContentsObserver::CreateForWebContents(
172       contents);
173 #if defined(ENABLE_PLUGINS)
174   PluginPermissionHelper::CreateForWebContents(contents);
175 #endif
176 #if defined(ENABLE_PRINTING)
177 #if defined(ENABLE_FULL_PRINTING)
178   printing::PrintViewManager::CreateForWebContents(contents);
179   printing::PrintPreviewMessageHandler::CreateForWebContents(contents);
180 #else
181   printing::PrintViewManagerBasic::CreateForWebContents(contents);
182 #endif  // defined(ENABLE_FULL_PRINTING)
183 #endif  // defined(ENABLE_PRINTING)
184   PDFTabHelper::CreateForWebContents(contents);
185 }
186
187 }  // namespace
188
189 WebViewGuest::WebViewGuest(int guest_instance_id,
190                            WebContents* guest_web_contents,
191                            const std::string& embedder_extension_id)
192    :  GuestView<WebViewGuest>(guest_instance_id),
193       script_executor_(new extensions::ScriptExecutor(guest_web_contents,
194                                                       &script_observers_)),
195       pending_context_menu_request_id_(0),
196       next_permission_request_id_(0),
197       is_overriding_user_agent_(false),
198       main_frame_id_(0),
199       chromevox_injected_(false),
200       find_helper_(this),
201       javascript_dialog_helper_(this) {
202   Init(guest_web_contents, embedder_extension_id);
203   notification_registrar_.Add(
204       this, content::NOTIFICATION_LOAD_COMPLETED_MAIN_FRAME,
205       content::Source<WebContents>(guest_web_contents));
206
207   notification_registrar_.Add(
208       this, content::NOTIFICATION_RESOURCE_RECEIVED_REDIRECT,
209       content::Source<WebContents>(guest_web_contents));
210
211 #if defined(OS_CHROMEOS)
212   chromeos::AccessibilityManager* accessibility_manager =
213       chromeos::AccessibilityManager::Get();
214   CHECK(accessibility_manager);
215   accessibility_subscription_ = accessibility_manager->RegisterCallback(
216       base::Bind(&WebViewGuest::OnAccessibilityStatusChanged,
217                  base::Unretained(this)));
218 #endif
219
220   AttachWebViewHelpers(guest_web_contents);
221 }
222
223 // static
224 bool WebViewGuest::GetGuestPartitionConfigForSite(
225     const GURL& site,
226     std::string* partition_domain,
227     std::string* partition_name,
228     bool* in_memory) {
229   if (!site.SchemeIs(content::kGuestScheme))
230     return false;
231
232   // Since guest URLs are only used for packaged apps, there must be an app
233   // id in the URL.
234   CHECK(site.has_host());
235   *partition_domain = site.host();
236   // Since persistence is optional, the path must either be empty or the
237   // literal string.
238   *in_memory = (site.path() != "/persist");
239   // The partition name is user supplied value, which we have encoded when the
240   // URL was created, so it needs to be decoded.
241   *partition_name =
242       net::UnescapeURLComponent(site.query(), net::UnescapeRule::NORMAL);
243   return true;
244 }
245
246 // static
247 const char WebViewGuest::Type[] = "webview";
248
249 // static
250 int WebViewGuest::GetViewInstanceId(WebContents* contents) {
251   WebViewGuest* guest = FromWebContents(contents);
252   if (!guest)
253     return guestview::kInstanceIDNone;
254
255   return guest->view_instance_id();
256 }
257
258 // static
259 void WebViewGuest::ParsePartitionParam(
260     const base::DictionaryValue* extra_params,
261     std::string* storage_partition_id,
262     bool* persist_storage) {
263   std::string partition_str;
264   if (!extra_params->GetString(webview::kStoragePartitionId, &partition_str)) {
265     return;
266   }
267
268   // Since the "persist:" prefix is in ASCII, StartsWith will work fine on
269   // UTF-8 encoded |partition_id|. If the prefix is a match, we can safely
270   // remove the prefix without splicing in the middle of a multi-byte codepoint.
271   // We can use the rest of the string as UTF-8 encoded one.
272   if (StartsWithASCII(partition_str, "persist:", true)) {
273     size_t index = partition_str.find(":");
274     CHECK(index != std::string::npos);
275     // It is safe to do index + 1, since we tested for the full prefix above.
276     *storage_partition_id = partition_str.substr(index + 1);
277
278     if (storage_partition_id->empty()) {
279       // TODO(lazyboy): Better way to deal with this error.
280       return;
281     }
282     *persist_storage = true;
283   } else {
284     *storage_partition_id = partition_str;
285     *persist_storage = false;
286   }
287 }
288
289 // static
290 void WebViewGuest::RecordUserInitiatedUMA(const PermissionResponseInfo& info,
291                                           bool allow) {
292   if (allow) {
293     // Note that |allow| == true means the embedder explicitly allowed the
294     // request. For some requests they might still fail. An example of such
295     // scenario would be: an embedder allows geolocation request but doesn't
296     // have geolocation access on its own.
297     switch (info.permission_type) {
298       case WEB_VIEW_PERMISSION_TYPE_DOWNLOAD:
299         content::RecordAction(
300             UserMetricsAction("WebView.PermissionAllow.Download"));
301         break;
302       case WEB_VIEW_PERMISSION_TYPE_FILESYSTEM:
303         content::RecordAction(
304             UserMetricsAction("WebView.PermissionAllow.FileSystem"));
305         break;
306       case WEB_VIEW_PERMISSION_TYPE_GEOLOCATION:
307         content::RecordAction(
308             UserMetricsAction("WebView.PermissionAllow.Geolocation"));
309         break;
310       case WEB_VIEW_PERMISSION_TYPE_JAVASCRIPT_DIALOG:
311         content::RecordAction(
312             UserMetricsAction("WebView.PermissionAllow.JSDialog"));
313         break;
314       case WEB_VIEW_PERMISSION_TYPE_LOAD_PLUGIN:
315         content::RecordAction(
316             UserMetricsAction("WebView.Guest.PermissionAllow.PluginLoad"));
317       case WEB_VIEW_PERMISSION_TYPE_MEDIA:
318         content::RecordAction(
319             UserMetricsAction("WebView.PermissionAllow.Media"));
320         break;
321       case WEB_VIEW_PERMISSION_TYPE_NEW_WINDOW:
322         content::RecordAction(
323             UserMetricsAction("BrowserPlugin.PermissionAllow.NewWindow"));
324         break;
325       case WEB_VIEW_PERMISSION_TYPE_POINTER_LOCK:
326         content::RecordAction(
327             UserMetricsAction("WebView.PermissionAllow.PointerLock"));
328         break;
329       default:
330         break;
331     }
332   } else {
333     switch (info.permission_type) {
334       case WEB_VIEW_PERMISSION_TYPE_DOWNLOAD:
335         content::RecordAction(
336             UserMetricsAction("WebView.PermissionDeny.Download"));
337         break;
338       case WEB_VIEW_PERMISSION_TYPE_FILESYSTEM:
339         content::RecordAction(
340             UserMetricsAction("WebView.PermissionDeny.FileSystem"));
341         break;
342       case WEB_VIEW_PERMISSION_TYPE_GEOLOCATION:
343         content::RecordAction(
344             UserMetricsAction("WebView.PermissionDeny.Geolocation"));
345         break;
346       case WEB_VIEW_PERMISSION_TYPE_JAVASCRIPT_DIALOG:
347         content::RecordAction(
348             UserMetricsAction("WebView.PermissionDeny.JSDialog"));
349         break;
350       case WEB_VIEW_PERMISSION_TYPE_LOAD_PLUGIN:
351         content::RecordAction(
352             UserMetricsAction("WebView.Guest.PermissionDeny.PluginLoad"));
353         break;
354       case WEB_VIEW_PERMISSION_TYPE_MEDIA:
355         content::RecordAction(
356             UserMetricsAction("WebView.PermissionDeny.Media"));
357         break;
358       case WEB_VIEW_PERMISSION_TYPE_NEW_WINDOW:
359         content::RecordAction(
360             UserMetricsAction("BrowserPlugin.PermissionDeny.NewWindow"));
361         break;
362       case WEB_VIEW_PERMISSION_TYPE_POINTER_LOCK:
363         content::RecordAction(
364             UserMetricsAction("WebView.PermissionDeny.PointerLock"));
365         break;
366       default:
367         break;
368     }
369   }
370 }
371
372 // static
373 scoped_ptr<base::ListValue> WebViewGuest::MenuModelToValue(
374     const ui::SimpleMenuModel& menu_model) {
375   scoped_ptr<base::ListValue> items(new base::ListValue());
376   for (int i = 0; i < menu_model.GetItemCount(); ++i) {
377     base::DictionaryValue* item_value = new base::DictionaryValue();
378     // TODO(lazyboy): We need to expose some kind of enum equivalent of
379     // |command_id| instead of plain integers.
380     item_value->SetInteger(webview::kMenuItemCommandId,
381                            menu_model.GetCommandIdAt(i));
382     item_value->SetString(webview::kMenuItemLabel, menu_model.GetLabelAt(i));
383     items->Append(item_value);
384   }
385   return items.Pass();
386 }
387
388 void WebViewGuest::DidAttachToEmbedder() {
389   std::string name;
390   if (extra_params()->GetString(webview::kName, &name)) {
391     // If the guest window's name is empty, then the WebView tag's name is
392     // assigned. Otherwise, the guest window's name takes precedence over the
393     // WebView tag's name.
394     if (name_.empty())
395       name_ = name;
396   }
397   ReportFrameNameChange(name_);
398
399   std::string user_agent_override;
400   if (extra_params()->GetString(webview::kParameterUserAgentOverride,
401                                 &user_agent_override)) {
402     SetUserAgentOverride(user_agent_override);
403   } else {
404     SetUserAgentOverride("");
405   }
406
407   std::string src;
408   if (extra_params()->GetString("src", &src) && !src.empty())
409     NavigateGuest(src);
410
411   if (GetOpener()) {
412     // We need to do a navigation here if the target URL has changed between
413     // the time the WebContents was created and the time it was attached.
414     // We also need to do an initial navigation if a RenderView was never
415     // created for the new window in cases where there is no referrer.
416     PendingWindowMap::iterator it =
417         GetOpener()->pending_new_windows_.find(this);
418     if (it != GetOpener()->pending_new_windows_.end()) {
419       const NewWindowInfo& new_window_info = it->second;
420       if (new_window_info.changed || !guest_web_contents()->HasOpener())
421         NavigateGuest(new_window_info.url.spec());
422     } else {
423       NOTREACHED();
424     }
425
426     // Once a new guest is attached to the DOM of the embedder page, then the
427     // lifetime of the new guest is no longer managed by the opener guest.
428     GetOpener()->pending_new_windows_.erase(this);
429   }
430 }
431
432 void WebViewGuest::DidStopLoading() {
433   scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue());
434   DispatchEvent(new GuestViewBase::Event(webview::kEventLoadStop, args.Pass()));
435 }
436
437 void WebViewGuest::EmbedderDestroyed() {
438   // TODO(fsamuel): WebRequest event listeners for <webview> should survive
439   // reparenting of a <webview> within a single embedder. Right now, we keep
440   // around the browser state for the listener for the lifetime of the embedder.
441   // Ideally, the lifetime of the listeners should match the lifetime of the
442   // <webview> DOM node. Once http://crbug.com/156219 is resolved we can move
443   // the call to RemoveWebViewEventListenersOnIOThread back to
444   // WebViewGuest::WebContentsDestroyed.
445   content::BrowserThread::PostTask(
446       content::BrowserThread::IO,
447       FROM_HERE,
448       base::Bind(
449           &RemoveWebViewEventListenersOnIOThread,
450           browser_context(), embedder_extension_id(),
451           embedder_render_process_id(),
452           view_instance_id()));
453 }
454
455 void WebViewGuest::GuestDestroyed() {
456   // Clean up custom context menu items for this guest.
457   extensions::MenuManager* menu_manager = extensions::MenuManager::Get(
458       Profile::FromBrowserContext(browser_context()));
459   menu_manager->RemoveAllContextItems(extensions::MenuItem::ExtensionKey(
460       embedder_extension_id(), view_instance_id()));
461
462   RemoveWebViewFromExtensionRendererState(web_contents());
463 }
464
465 bool WebViewGuest::IsDragAndDropEnabled() const {
466   return true;
467 }
468
469 void WebViewGuest::WillDestroy() {
470   if (!attached() && GetOpener())
471     GetOpener()->pending_new_windows_.erase(this);
472   DestroyUnattachedWindows();
473 }
474
475 bool WebViewGuest::AddMessageToConsole(WebContents* source,
476                                        int32 level,
477                                        const base::string16& message,
478                                        int32 line_no,
479                                        const base::string16& source_id) {
480   scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue());
481   // Log levels are from base/logging.h: LogSeverity.
482   args->SetInteger(webview::kLevel, level);
483   args->SetString(webview::kMessage, message);
484   args->SetInteger(webview::kLine, line_no);
485   args->SetString(webview::kSourceId, source_id);
486   DispatchEvent(
487       new GuestViewBase::Event(webview::kEventConsoleMessage, args.Pass()));
488   return true;
489 }
490
491 void WebViewGuest::CloseContents(WebContents* source) {
492   scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue());
493   DispatchEvent(new GuestViewBase::Event(webview::kEventClose, args.Pass()));
494 }
495
496 void WebViewGuest::FindReply(WebContents* source,
497                              int request_id,
498                              int number_of_matches,
499                              const gfx::Rect& selection_rect,
500                              int active_match_ordinal,
501                              bool final_update) {
502   find_helper_.FindReply(request_id, number_of_matches, selection_rect,
503                          active_match_ordinal, final_update);
504 }
505
506 bool WebViewGuest::HandleContextMenu(
507     const content::ContextMenuParams& params) {
508   ContextMenuDelegate* menu_delegate =
509       ContextMenuDelegate::FromWebContents(guest_web_contents());
510   DCHECK(menu_delegate);
511
512   pending_menu_ = menu_delegate->BuildMenu(guest_web_contents(), params);
513
514   // Pass it to embedder.
515   int request_id = ++pending_context_menu_request_id_;
516   scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue());
517   scoped_ptr<base::ListValue> items =
518       MenuModelToValue(pending_menu_->menu_model());
519   args->Set(webview::kContextMenuItems, items.release());
520   args->SetInteger(webview::kRequestId, request_id);
521   DispatchEvent(new GuestViewBase::Event(webview::kEventContextMenu,
522                                          args.Pass()));
523   return true;
524 }
525
526 void WebViewGuest::HandleKeyboardEvent(
527     WebContents* source,
528     const content::NativeWebKeyboardEvent& event) {
529   if (!attached())
530     return;
531
532   if (HandleKeyboardShortcuts(event))
533     return;
534
535   // Send the unhandled keyboard events back to the embedder to reprocess them.
536   // TODO(fsamuel): This introduces the possibility of out-of-order keyboard
537   // events because the guest may be arbitrarily delayed when responding to
538   // keyboard events. In that time, the embedder may have received and processed
539   // additional key events. This needs to be fixed as soon as possible.
540   // See http://crbug.com/229882.
541   embedder_web_contents()->GetDelegate()->HandleKeyboardEvent(
542       web_contents(), event);
543 }
544
545 void WebViewGuest::LoadProgressChanged(content::WebContents* source,
546                                        double progress) {
547   scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue());
548   args->SetString(guestview::kUrl, guest_web_contents()->GetURL().spec());
549   args->SetDouble(webview::kProgress, progress);
550   DispatchEvent(
551       new GuestViewBase::Event(webview::kEventLoadProgress, args.Pass()));
552 }
553
554 void WebViewGuest::LoadAbort(bool is_top_level,
555                              const GURL& url,
556                              const std::string& error_type) {
557   scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue());
558   args->SetBoolean(guestview::kIsTopLevel, is_top_level);
559   args->SetString(guestview::kUrl, url.possibly_invalid_spec());
560   args->SetString(guestview::kReason, error_type);
561   DispatchEvent(
562       new GuestViewBase::Event(webview::kEventLoadAbort, args.Pass()));
563 }
564
565 void WebViewGuest::OnUpdateFrameName(bool is_top_level,
566                                      const std::string& name) {
567   if (!is_top_level)
568     return;
569
570   if (name_ == name)
571     return;
572
573   ReportFrameNameChange(name);
574 }
575
576 WebViewGuest* WebViewGuest::CreateNewGuestWindow(
577     const content::OpenURLParams& params) {
578   GuestViewManager* guest_manager =
579       GuestViewManager::FromBrowserContext(browser_context());
580   // Allocate a new instance ID for the new guest.
581   int instance_id = guest_manager->GetNextInstanceID();
582
583   // Set the attach params to use the same partition as the opener.
584   // We pull the partition information from the site's URL, which is of the
585   // form guest://site/{persist}?{partition_name}.
586   const GURL& site_url = guest_web_contents()->GetSiteInstance()->GetSiteURL();
587   scoped_ptr<base::DictionaryValue> create_params(extra_params()->DeepCopy());
588   const std::string storage_partition_id =
589       GetStoragePartitionIdFromSiteURL(site_url);
590   create_params->SetString(webview::kStoragePartitionId, storage_partition_id);
591
592   WebContents* new_guest_web_contents =
593       guest_manager->CreateGuest(guest_web_contents()->GetSiteInstance(),
594                                  instance_id,
595                                  create_params.Pass());
596   WebViewGuest* new_guest =
597       WebViewGuest::FromWebContents(new_guest_web_contents);
598   new_guest->SetOpener(this);
599
600   // Take ownership of |new_guest|.
601   pending_new_windows_.insert(
602       std::make_pair(new_guest, NewWindowInfo(params.url, std::string())));
603
604   // Request permission to show the new window.
605   RequestNewWindowPermission(params.disposition, gfx::Rect(),
606                              params.user_gesture,
607                              new_guest->guest_web_contents());
608
609   return new_guest;
610 }
611
612 // TODO(fsamuel): Find a reliable way to test the 'responsive' and
613 // 'unresponsive' events.
614 void WebViewGuest::RendererResponsive(content::WebContents* source) {
615   scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue());
616   args->SetInteger(webview::kProcessId,
617       guest_web_contents()->GetRenderProcessHost()->GetID());
618   DispatchEvent(
619       new GuestViewBase::Event(webview::kEventResponsive, args.Pass()));
620 }
621
622 void WebViewGuest::RendererUnresponsive(content::WebContents* source) {
623   scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue());
624   args->SetInteger(webview::kProcessId,
625       guest_web_contents()->GetRenderProcessHost()->GetID());
626   DispatchEvent(
627       new GuestViewBase::Event(webview::kEventUnresponsive, args.Pass()));
628 }
629
630 void WebViewGuest::Observe(int type,
631                            const content::NotificationSource& source,
632                            const content::NotificationDetails& details) {
633   switch (type) {
634     case content::NOTIFICATION_LOAD_COMPLETED_MAIN_FRAME: {
635       DCHECK_EQ(content::Source<WebContents>(source).ptr(),
636                 guest_web_contents());
637       if (content::Source<WebContents>(source).ptr() == guest_web_contents())
638         LoadHandlerCalled();
639       break;
640     }
641     case content::NOTIFICATION_RESOURCE_RECEIVED_REDIRECT: {
642       DCHECK_EQ(content::Source<WebContents>(source).ptr(),
643                 guest_web_contents());
644       content::ResourceRedirectDetails* resource_redirect_details =
645           content::Details<content::ResourceRedirectDetails>(details).ptr();
646       bool is_top_level =
647           resource_redirect_details->resource_type == ResourceType::MAIN_FRAME;
648       LoadRedirect(resource_redirect_details->url,
649                    resource_redirect_details->new_url,
650                    is_top_level);
651       break;
652     }
653     default:
654       NOTREACHED() << "Unexpected notification sent.";
655       break;
656   }
657 }
658
659 double WebViewGuest::GetZoom() {
660   return current_zoom_factor_;
661 }
662
663 void WebViewGuest::Find(
664     const base::string16& search_text,
665     const blink::WebFindOptions& options,
666     scoped_refptr<extensions::WebviewFindFunction> find_function) {
667   find_helper_.Find(guest_web_contents(), search_text, options, find_function);
668 }
669
670 void WebViewGuest::StopFinding(content::StopFindAction action) {
671   find_helper_.CancelAllFindSessions();
672   guest_web_contents()->StopFinding(action);
673 }
674
675 void WebViewGuest::Go(int relative_index) {
676   guest_web_contents()->GetController().GoToOffset(relative_index);
677 }
678
679 void WebViewGuest::Reload() {
680   // TODO(fsamuel): Don't check for repost because we don't want to show
681   // Chromium's repost warning. We might want to implement a separate API
682   // for registering a callback if a repost is about to happen.
683   guest_web_contents()->GetController().Reload(false);
684 }
685
686 void WebViewGuest::RequestFileSystemPermission(
687     const GURL& url,
688     bool allowed_by_default,
689     const base::Callback<void(bool)>& callback) {
690   base::DictionaryValue request_info;
691   request_info.Set(guestview::kUrl, base::Value::CreateStringValue(url.spec()));
692   RequestPermission(
693       WEB_VIEW_PERMISSION_TYPE_FILESYSTEM,
694       request_info,
695       base::Bind(&WebViewGuest::OnWebViewFileSystemPermissionResponse,
696                  base::Unretained(this),
697                  callback),
698       allowed_by_default);
699 }
700
701 void WebViewGuest::OnWebViewFileSystemPermissionResponse(
702     const base::Callback<void(bool)>& callback,
703     bool allow,
704     const std::string& user_input) {
705   callback.Run(allow && attached());
706 }
707
708 void WebViewGuest::RequestGeolocationPermission(
709     int bridge_id,
710     const GURL& requesting_frame,
711     bool user_gesture,
712     const base::Callback<void(bool)>& callback) {
713   base::DictionaryValue request_info;
714   request_info.Set(guestview::kUrl,
715                    base::Value::CreateStringValue(requesting_frame.spec()));
716   request_info.Set(guestview::kUserGesture,
717                    base::Value::CreateBooleanValue(user_gesture));
718
719   // It is safe to hold an unretained pointer to WebViewGuest because this
720   // callback is called from WebViewGuest::SetPermission.
721   const PermissionResponseCallback permission_callback =
722       base::Bind(&WebViewGuest::OnWebViewGeolocationPermissionResponse,
723                  base::Unretained(this),
724                  bridge_id,
725                  user_gesture,
726                  callback);
727   int request_id = RequestPermission(
728       WEB_VIEW_PERMISSION_TYPE_GEOLOCATION,
729       request_info,
730       permission_callback,
731       false /* allowed_by_default */);
732   bridge_id_to_request_id_map_[bridge_id] = request_id;
733 }
734
735 void WebViewGuest::OnWebViewGeolocationPermissionResponse(
736     int bridge_id,
737     bool user_gesture,
738     const base::Callback<void(bool)>& callback,
739     bool allow,
740     const std::string& user_input) {
741   // The <webview> embedder has allowed the permission. We now need to make sure
742   // that the embedder has geolocation permission.
743   RemoveBridgeID(bridge_id);
744
745   if (!allow || !attached()) {
746     callback.Run(false);
747     return;
748   }
749
750   Profile* profile = Profile::FromBrowserContext(browser_context());
751   GeolocationPermissionContextFactory::GetForProfile(profile)->
752       RequestGeolocationPermission(
753           embedder_web_contents(),
754           // The geolocation permission request here is not initiated
755           // through WebGeolocationPermissionRequest. We are only interested
756           // in the fact whether the embedder/app has geolocation
757           // permission. Therefore we use an invalid |bridge_id|.
758           -1,
759           embedder_web_contents()->GetLastCommittedURL(),
760           user_gesture,
761           callback,
762           NULL);
763 }
764
765 void WebViewGuest::CancelGeolocationPermissionRequest(int bridge_id) {
766   int request_id = RemoveBridgeID(bridge_id);
767   RequestMap::iterator request_itr =
768       pending_permission_requests_.find(request_id);
769
770   if (request_itr == pending_permission_requests_.end())
771     return;
772
773   pending_permission_requests_.erase(request_itr);
774 }
775
776 void WebViewGuest::OnWebViewMediaPermissionResponse(
777     const content::MediaStreamRequest& request,
778     const content::MediaResponseCallback& callback,
779     bool allow,
780     const std::string& user_input) {
781   if (!allow || !attached()) {
782     // Deny the request.
783     callback.Run(content::MediaStreamDevices(),
784                  content::MEDIA_DEVICE_INVALID_STATE,
785                  scoped_ptr<content::MediaStreamUI>());
786     return;
787   }
788   if (!embedder_web_contents()->GetDelegate())
789     return;
790
791   embedder_web_contents()->GetDelegate()->
792       RequestMediaAccessPermission(embedder_web_contents(), request, callback);
793 }
794
795 void WebViewGuest::OnWebViewDownloadPermissionResponse(
796     const base::Callback<void(bool)>& callback,
797     bool allow,
798     const std::string& user_input) {
799   callback.Run(allow && attached());
800 }
801
802 void WebViewGuest::OnWebViewPointerLockPermissionResponse(
803     const base::Callback<void(bool)>& callback,
804     bool allow,
805     const std::string& user_input) {
806   callback.Run(allow && attached());
807 }
808
809 WebViewGuest::SetPermissionResult WebViewGuest::SetPermission(
810     int request_id,
811     PermissionResponseAction action,
812     const std::string& user_input) {
813   RequestMap::iterator request_itr =
814       pending_permission_requests_.find(request_id);
815
816   if (request_itr == pending_permission_requests_.end())
817     return SET_PERMISSION_INVALID;
818
819   const PermissionResponseInfo& info = request_itr->second;
820   bool allow = (action == ALLOW) ||
821       ((action == DEFAULT) && info.allowed_by_default);
822
823   info.callback.Run(allow, user_input);
824
825   // Only record user initiated (i.e. non-default) actions.
826   if (action != DEFAULT)
827     RecordUserInitiatedUMA(info, allow);
828
829   pending_permission_requests_.erase(request_itr);
830
831   return allow ? SET_PERMISSION_ALLOWED : SET_PERMISSION_DENIED;
832 }
833
834 void WebViewGuest::SetUserAgentOverride(
835     const std::string& user_agent_override) {
836   if (!attached())
837     return;
838   is_overriding_user_agent_ = !user_agent_override.empty();
839   if (is_overriding_user_agent_) {
840     content::RecordAction(UserMetricsAction("WebView.Guest.OverrideUA"));
841   }
842   guest_web_contents()->SetUserAgentOverride(user_agent_override);
843 }
844
845 void WebViewGuest::Stop() {
846   guest_web_contents()->Stop();
847 }
848
849 void WebViewGuest::Terminate() {
850   content::RecordAction(UserMetricsAction("WebView.Guest.Terminate"));
851   base::ProcessHandle process_handle =
852       guest_web_contents()->GetRenderProcessHost()->GetHandle();
853   if (process_handle)
854     base::KillProcess(process_handle, content::RESULT_CODE_KILLED, false);
855 }
856
857 bool WebViewGuest::ClearData(const base::Time remove_since,
858                              uint32 removal_mask,
859                              const base::Closure& callback) {
860   content::RecordAction(UserMetricsAction("WebView.Guest.ClearData"));
861   content::StoragePartition* partition =
862       content::BrowserContext::GetStoragePartition(
863           guest_web_contents()->GetBrowserContext(),
864           guest_web_contents()->GetSiteInstance());
865
866   if (!partition)
867     return false;
868
869   partition->ClearData(
870       removal_mask,
871       content::StoragePartition::QUOTA_MANAGED_STORAGE_MASK_ALL,
872       GURL(),
873       content::StoragePartition::OriginMatcherFunction(),
874       remove_since,
875       base::Time::Now(),
876       callback);
877   return true;
878 }
879
880 // static
881 void WebViewGuest::FileSystemAccessedAsync(int render_process_id,
882                                            int render_frame_id,
883                                            int request_id,
884                                            const GURL& url,
885                                            bool blocked_by_policy) {
886   WebViewGuest* guest =
887       WebViewGuest::FromFrameID(render_process_id, render_frame_id);
888   DCHECK(guest);
889   guest->RequestFileSystemPermission(
890       url,
891       !blocked_by_policy,
892       base::Bind(&WebViewGuest::FileSystemAccessedAsyncResponse,
893                  render_process_id,
894                  render_frame_id,
895                  request_id,
896                  url));
897 }
898
899 // static
900 void WebViewGuest::FileSystemAccessedAsyncResponse(int render_process_id,
901                                                    int render_frame_id,
902                                                    int request_id,
903                                                    const GURL& url,
904                                                    bool allowed) {
905   TabSpecificContentSettings::FileSystemAccessed(
906       render_process_id, render_frame_id, url, !allowed);
907   content::RenderFrameHost* render_frame_host =
908       content::RenderFrameHost::FromID(render_process_id, render_frame_id);
909   if (!render_frame_host)
910     return;
911   render_frame_host->Send(
912       new ChromeViewMsg_RequestFileSystemAccessAsyncResponse(
913           render_frame_id, request_id, allowed));
914 }
915
916 // static
917 void WebViewGuest::FileSystemAccessedSync(int render_process_id,
918                                           int render_frame_id,
919                                           const GURL& url,
920                                           bool blocked_by_policy,
921                                           IPC::Message* reply_msg) {
922   WebViewGuest* guest =
923       WebViewGuest::FromFrameID(render_process_id, render_frame_id);
924   DCHECK(guest);
925   guest->RequestFileSystemPermission(
926       url,
927       !blocked_by_policy,
928       base::Bind(&WebViewGuest::FileSystemAccessedSyncResponse,
929                  render_process_id,
930                  render_frame_id,
931                  url,
932                  reply_msg));
933 }
934
935 // static
936 void WebViewGuest::FileSystemAccessedSyncResponse(int render_process_id,
937                                                   int render_frame_id,
938                                                   const GURL& url,
939                                                   IPC::Message* reply_msg,
940                                                   bool allowed) {
941   TabSpecificContentSettings::FileSystemAccessed(
942       render_process_id, render_frame_id, url, !allowed);
943   ChromeViewHostMsg_RequestFileSystemAccessSync::WriteReplyParams(reply_msg,
944                                                                   allowed);
945   content::RenderFrameHost* render_frame_host =
946       content::RenderFrameHost::FromID(render_process_id, render_frame_id);
947   if (!render_frame_id)
948     return;
949   render_frame_host->Send(reply_msg);
950 }
951
952 WebViewGuest::~WebViewGuest() {
953 }
954
955 void WebViewGuest::DidCommitProvisionalLoadForFrame(
956     int64 frame_id,
957     const base::string16& frame_unique_name,
958     bool is_main_frame,
959     const GURL& url,
960     content::PageTransition transition_type,
961     content::RenderViewHost* render_view_host) {
962   find_helper_.CancelAllFindSessions();
963
964   scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue());
965   args->SetString(guestview::kUrl, url.spec());
966   args->SetBoolean(guestview::kIsTopLevel, is_main_frame);
967   args->SetInteger(webview::kInternalCurrentEntryIndex,
968       guest_web_contents()->GetController().GetCurrentEntryIndex());
969   args->SetInteger(webview::kInternalEntryCount,
970       guest_web_contents()->GetController().GetEntryCount());
971   args->SetInteger(webview::kInternalProcessId,
972       guest_web_contents()->GetRenderProcessHost()->GetID());
973   DispatchEvent(
974       new GuestViewBase::Event(webview::kEventLoadCommit, args.Pass()));
975
976   // Update the current zoom factor for the new page.
977   current_zoom_factor_ = content::ZoomLevelToZoomFactor(
978       content::HostZoomMap::GetZoomLevel(guest_web_contents()));
979
980   if (is_main_frame) {
981     chromevox_injected_ = false;
982     main_frame_id_ = frame_id;
983   }
984 }
985
986 void WebViewGuest::DidFailProvisionalLoad(
987     int64 frame_id,
988     const base::string16& frame_unique_name,
989     bool is_main_frame,
990     const GURL& validated_url,
991     int error_code,
992     const base::string16& error_description,
993     content::RenderViewHost* render_view_host) {
994   // Translate the |error_code| into an error string.
995   std::string error_type(net::ErrorToString(error_code));
996   DCHECK(StartsWithASCII(error_type, "net::", true));
997   error_type.erase(0, 5);
998   LoadAbort(is_main_frame, validated_url, error_type);
999 }
1000
1001 void WebViewGuest::DidStartProvisionalLoadForFrame(
1002     int64 frame_id,
1003     int64 parent_frame_id,
1004     bool is_main_frame,
1005     const GURL& validated_url,
1006     bool is_error_page,
1007     bool is_iframe_srcdoc,
1008     content::RenderViewHost* render_view_host) {
1009   scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue());
1010   args->SetString(guestview::kUrl, validated_url.spec());
1011   args->SetBoolean(guestview::kIsTopLevel, is_main_frame);
1012   DispatchEvent(
1013       new GuestViewBase::Event(webview::kEventLoadStart, args.Pass()));
1014 }
1015
1016 void WebViewGuest::DocumentLoadedInFrame(
1017     int64 frame_id,
1018     content::RenderViewHost* render_view_host) {
1019   if (frame_id == main_frame_id_)
1020     InjectChromeVoxIfNeeded(render_view_host);
1021 }
1022
1023 bool WebViewGuest::OnMessageReceived(const IPC::Message& message,
1024                                      RenderFrameHost* render_frame_host) {
1025   bool handled = true;
1026   IPC_BEGIN_MESSAGE_MAP(WebViewGuest, message)
1027     IPC_MESSAGE_HANDLER(ChromeViewHostMsg_UpdateFrameName, OnUpdateFrameName)
1028     IPC_MESSAGE_UNHANDLED(handled = false)
1029   IPC_END_MESSAGE_MAP()
1030   return handled;
1031 }
1032
1033 void WebViewGuest::RenderProcessGone(base::TerminationStatus status) {
1034   // Cancel all find sessions in progress.
1035   find_helper_.CancelAllFindSessions();
1036
1037   scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue());
1038   args->SetInteger(webview::kProcessId,
1039                    guest_web_contents()->GetRenderProcessHost()->GetID());
1040   args->SetString(webview::kReason, TerminationStatusToString(status));
1041   DispatchEvent(new GuestViewBase::Event(webview::kEventExit, args.Pass()));
1042 }
1043
1044 void WebViewGuest::UserAgentOverrideSet(const std::string& user_agent) {
1045   if (!attached())
1046     return;
1047   content::NavigationController& controller =
1048       guest_web_contents()->GetController();
1049   content::NavigationEntry* entry = controller.GetVisibleEntry();
1050   if (!entry)
1051     return;
1052   entry->SetIsOverridingUserAgent(!user_agent.empty());
1053   guest_web_contents()->GetController().Reload(false);
1054 }
1055
1056 void WebViewGuest::RenderViewReady() {
1057   // The guest RenderView should always live in an isolated guest process.
1058   CHECK(guest_web_contents()->GetRenderProcessHost()->IsIsolatedGuest());
1059   Send(new ChromeViewMsg_SetName(guest_web_contents()->GetRoutingID(), name_));
1060 }
1061
1062 void WebViewGuest::ReportFrameNameChange(const std::string& name) {
1063   name_ = name;
1064   scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue());
1065   args->SetString(webview::kName, name);
1066   DispatchEvent(
1067       new GuestViewBase::Event(webview::kEventFrameNameChanged, args.Pass()));
1068 }
1069
1070 void WebViewGuest::LoadHandlerCalled() {
1071   scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue());
1072   DispatchEvent(
1073       new GuestViewBase::Event(webview::kEventContentLoad, args.Pass()));
1074 }
1075
1076 void WebViewGuest::LoadRedirect(const GURL& old_url,
1077                                 const GURL& new_url,
1078                                 bool is_top_level) {
1079   scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue());
1080   args->SetBoolean(guestview::kIsTopLevel, is_top_level);
1081   args->SetString(webview::kNewURL, new_url.spec());
1082   args->SetString(webview::kOldURL, old_url.spec());
1083   DispatchEvent(
1084       new GuestViewBase::Event(webview::kEventLoadRedirect, args.Pass()));
1085 }
1086
1087 void WebViewGuest::AddWebViewToExtensionRendererState() {
1088   const GURL& site_url = guest_web_contents()->GetSiteInstance()->GetSiteURL();
1089   std::string partition_domain;
1090   std::string partition_id;
1091   bool in_memory;
1092   if (!GetGuestPartitionConfigForSite(
1093           site_url, &partition_domain, &partition_id, &in_memory)) {
1094     NOTREACHED();
1095     return;
1096   }
1097   DCHECK(embedder_extension_id() == partition_domain);
1098
1099   ExtensionRendererState::WebViewInfo web_view_info;
1100   web_view_info.embedder_process_id = embedder_render_process_id();
1101   web_view_info.instance_id = view_instance_id();
1102   web_view_info.partition_id = partition_id;
1103   web_view_info.embedder_extension_id = embedder_extension_id();
1104
1105   content::BrowserThread::PostTask(
1106       content::BrowserThread::IO,
1107       FROM_HERE,
1108       base::Bind(&ExtensionRendererState::AddWebView,
1109                  base::Unretained(ExtensionRendererState::GetInstance()),
1110                  guest_web_contents()->GetRenderProcessHost()->GetID(),
1111                  guest_web_contents()->GetRoutingID(),
1112                  web_view_info));
1113 }
1114
1115 // static
1116 void WebViewGuest::RemoveWebViewFromExtensionRendererState(
1117     WebContents* web_contents) {
1118   content::BrowserThread::PostTask(
1119       content::BrowserThread::IO, FROM_HERE,
1120       base::Bind(
1121           &ExtensionRendererState::RemoveWebView,
1122           base::Unretained(ExtensionRendererState::GetInstance()),
1123           web_contents->GetRenderProcessHost()->GetID(),
1124           web_contents->GetRoutingID()));
1125 }
1126
1127 void WebViewGuest::SizeChanged(const gfx::Size& old_size,
1128                                const gfx::Size& new_size) {
1129   scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue());
1130   args->SetInteger(webview::kOldHeight, old_size.height());
1131   args->SetInteger(webview::kOldWidth, old_size.width());
1132   args->SetInteger(webview::kNewHeight, new_size.height());
1133   args->SetInteger(webview::kNewWidth, new_size.width());
1134   DispatchEvent(
1135       new GuestViewBase::Event(webview::kEventSizeChanged, args.Pass()));
1136 }
1137
1138 void WebViewGuest::RequestMediaAccessPermission(
1139     content::WebContents* source,
1140     const content::MediaStreamRequest& request,
1141     const content::MediaResponseCallback& callback) {
1142   base::DictionaryValue request_info;
1143   request_info.Set(
1144       guestview::kUrl,
1145       base::Value::CreateStringValue(request.security_origin.spec()));
1146   RequestPermission(WEB_VIEW_PERMISSION_TYPE_MEDIA,
1147                     request_info,
1148                     base::Bind(&WebViewGuest::OnWebViewMediaPermissionResponse,
1149                                base::Unretained(this),
1150                                request,
1151                                callback),
1152                     false /* allowed_by_default */);
1153 }
1154
1155 void WebViewGuest::CanDownload(
1156     content::RenderViewHost* render_view_host,
1157     const GURL& url,
1158     const std::string& request_method,
1159     const base::Callback<void(bool)>& callback) {
1160   base::DictionaryValue request_info;
1161   request_info.Set(
1162       guestview::kUrl,
1163       base::Value::CreateStringValue(url.spec()));
1164   RequestPermission(
1165       WEB_VIEW_PERMISSION_TYPE_DOWNLOAD,
1166       request_info,
1167       base::Bind(&WebViewGuest::OnWebViewDownloadPermissionResponse,
1168                  base::Unretained(this),
1169                  callback),
1170       false /* allowed_by_default */);
1171 }
1172
1173 void WebViewGuest::RequestPointerLockPermission(
1174     bool user_gesture,
1175     bool last_unlocked_by_target,
1176     const base::Callback<void(bool)>& callback) {
1177   base::DictionaryValue request_info;
1178   request_info.Set(guestview::kUserGesture,
1179                    base::Value::CreateBooleanValue(user_gesture));
1180   request_info.Set(webview::kLastUnlockedBySelf,
1181                    base::Value::CreateBooleanValue(last_unlocked_by_target));
1182   request_info.Set(guestview::kUrl,
1183                    base::Value::CreateStringValue(
1184                        guest_web_contents()->GetLastCommittedURL().spec()));
1185
1186   RequestPermission(
1187       WEB_VIEW_PERMISSION_TYPE_POINTER_LOCK,
1188       request_info,
1189       base::Bind(&WebViewGuest::OnWebViewPointerLockPermissionResponse,
1190                  base::Unretained(this),
1191                  callback),
1192       false /* allowed_by_default */);
1193 }
1194
1195 void WebViewGuest::WillAttachToEmbedder() {
1196   // We must install the mapping from guests to WebViews prior to resuming
1197   // suspended resource loads so that the WebRequest API will catch resource
1198   // requests.
1199   AddWebViewToExtensionRendererState();
1200 }
1201
1202 content::JavaScriptDialogManager*
1203     WebViewGuest::GetJavaScriptDialogManager() {
1204   return &javascript_dialog_helper_;
1205 }
1206
1207 content::ColorChooser* WebViewGuest::OpenColorChooser(
1208     WebContents* web_contents,
1209     SkColor color,
1210     const std::vector<content::ColorSuggestion>& suggestions) {
1211   if (!attached() || !embedder_web_contents()->GetDelegate())
1212     return NULL;
1213   return embedder_web_contents()->GetDelegate()->OpenColorChooser(
1214       web_contents, color, suggestions);
1215 }
1216
1217 void WebViewGuest::RunFileChooser(WebContents* web_contents,
1218                                   const content::FileChooserParams& params) {
1219   if (!attached() || !embedder_web_contents()->GetDelegate())
1220     return;
1221
1222   embedder_web_contents()->GetDelegate()->RunFileChooser(web_contents, params);
1223 }
1224
1225 void WebViewGuest::NavigateGuest(const std::string& src) {
1226   GURL url = ResolveURL(src);
1227
1228   // Do not allow navigating a guest to schemes other than known safe schemes.
1229   // This will block the embedder trying to load unwanted schemes, e.g.
1230   // chrome://settings.
1231   bool scheme_is_blocked =
1232       (!content::ChildProcessSecurityPolicy::GetInstance()->IsWebSafeScheme(
1233            url.scheme()) &&
1234        !url.SchemeIs(url::kAboutScheme)) ||
1235       url.SchemeIs(url::kJavaScriptScheme);
1236   if (scheme_is_blocked || !url.is_valid()) {
1237     std::string error_type(net::ErrorToString(net::ERR_ABORTED));
1238     DCHECK(StartsWithASCII(error_type, "net::", true));
1239     error_type.erase(0, 5);
1240     LoadAbort(true /* is_top_level */, url, error_type);
1241     return;
1242   }
1243
1244   GURL validated_url(url);
1245   guest_web_contents()->GetRenderProcessHost()->
1246       FilterURL(false, &validated_url);
1247   // As guests do not swap processes on navigation, only navigations to
1248   // normal web URLs are supported.  No protocol handlers are installed for
1249   // other schemes (e.g., WebUI or extensions), and no permissions or bindings
1250   // can be granted to the guest process.
1251   LoadURLWithParams(validated_url,
1252                     content::Referrer(),
1253                     content::PAGE_TRANSITION_AUTO_TOPLEVEL,
1254                     guest_web_contents());
1255 }
1256
1257 #if defined(OS_CHROMEOS)
1258 void WebViewGuest::OnAccessibilityStatusChanged(
1259     const chromeos::AccessibilityStatusEventDetails& details) {
1260   if (details.notification_type == chromeos::ACCESSIBILITY_MANAGER_SHUTDOWN) {
1261     accessibility_subscription_.reset();
1262   } else if (details.notification_type ==
1263       chromeos::ACCESSIBILITY_TOGGLE_SPOKEN_FEEDBACK) {
1264     if (details.enabled)
1265       InjectChromeVoxIfNeeded(guest_web_contents()->GetRenderViewHost());
1266     else
1267       chromevox_injected_ = false;
1268   }
1269 }
1270 #endif
1271
1272 void WebViewGuest::InjectChromeVoxIfNeeded(
1273     content::RenderViewHost* render_view_host) {
1274 #if defined(OS_CHROMEOS)
1275   if (!chromevox_injected_) {
1276     chromeos::AccessibilityManager* manager =
1277         chromeos::AccessibilityManager::Get();
1278     if (manager && manager->IsSpokenFeedbackEnabled()) {
1279       manager->InjectChromeVox(render_view_host);
1280       chromevox_injected_ = true;
1281     }
1282   }
1283 #endif
1284 }
1285
1286 int WebViewGuest::RemoveBridgeID(int bridge_id) {
1287   std::map<int, int>::iterator bridge_itr =
1288       bridge_id_to_request_id_map_.find(bridge_id);
1289   if (bridge_itr == bridge_id_to_request_id_map_.end())
1290     return webview::kInvalidPermissionRequestID;
1291
1292   int request_id = bridge_itr->second;
1293   bridge_id_to_request_id_map_.erase(bridge_itr);
1294   return request_id;
1295 }
1296
1297 int WebViewGuest::RequestPermission(
1298     WebViewPermissionType permission_type,
1299     const base::DictionaryValue& request_info,
1300     const PermissionResponseCallback& callback,
1301     bool allowed_by_default) {
1302   // If there are too many pending permission requests then reject this request.
1303   if (pending_permission_requests_.size() >=
1304       webview::kMaxOutstandingPermissionRequests) {
1305     // Let the stack unwind before we deny the permission request so that
1306     // objects held by the permission request are not destroyed immediately
1307     // after creation. This is to allow those same objects to be accessed again
1308     // in the same scope without fear of use after freeing.
1309     base::MessageLoop::current()->PostTask(
1310         FROM_HERE,
1311         base::Bind(&PermissionResponseCallback::Run,
1312                   base::Owned(new PermissionResponseCallback(callback)),
1313                   allowed_by_default,
1314                   std::string()));
1315     return webview::kInvalidPermissionRequestID;
1316   }
1317
1318   int request_id = next_permission_request_id_++;
1319   pending_permission_requests_[request_id] =
1320       PermissionResponseInfo(callback, permission_type, allowed_by_default);
1321   scoped_ptr<base::DictionaryValue> args(request_info.DeepCopy());
1322   args->SetInteger(webview::kRequestId, request_id);
1323   switch (permission_type) {
1324     case WEB_VIEW_PERMISSION_TYPE_NEW_WINDOW: {
1325       DispatchEvent(
1326           new GuestViewBase::Event(webview::kEventNewWindow, args.Pass()));
1327       break;
1328     }
1329     case WEB_VIEW_PERMISSION_TYPE_JAVASCRIPT_DIALOG: {
1330       DispatchEvent(
1331           new GuestViewBase::Event(webview::kEventDialog, args.Pass()));
1332       break;
1333     }
1334     default: {
1335       args->SetString(webview::kPermission,
1336                       PermissionTypeToString(permission_type));
1337       DispatchEvent(new GuestViewBase::Event(webview::kEventPermissionRequest,
1338                                              args.Pass()));
1339       break;
1340     }
1341   }
1342   return request_id;
1343 }
1344
1345 bool WebViewGuest::HandleKeyboardShortcuts(
1346     const content::NativeWebKeyboardEvent& event) {
1347   if (event.type != blink::WebInputEvent::RawKeyDown)
1348     return false;
1349
1350   // If the user hits the escape key without any modifiers then unlock the
1351   // mouse if necessary.
1352   if ((event.windowsKeyCode == ui::VKEY_ESCAPE) &&
1353       !(event.modifiers & blink::WebInputEvent::InputModifiers)) {
1354     return guest_web_contents()->GotResponseToLockMouseRequest(false);
1355   }
1356
1357 #if defined(OS_MACOSX)
1358   if (event.modifiers != blink::WebInputEvent::MetaKey)
1359     return false;
1360
1361   if (event.windowsKeyCode == ui::VKEY_OEM_4) {
1362     Go(-1);
1363     return true;
1364   }
1365
1366   if (event.windowsKeyCode == ui::VKEY_OEM_6) {
1367     Go(1);
1368     return true;
1369   }
1370 #else
1371   if (event.windowsKeyCode == ui::VKEY_BROWSER_BACK) {
1372     Go(-1);
1373     return true;
1374   }
1375
1376   if (event.windowsKeyCode == ui::VKEY_BROWSER_FORWARD) {
1377     Go(1);
1378     return true;
1379   }
1380 #endif
1381
1382   return false;
1383 }
1384
1385 WebViewGuest::PermissionResponseInfo::PermissionResponseInfo()
1386     : permission_type(WEB_VIEW_PERMISSION_TYPE_UNKNOWN),
1387       allowed_by_default(false) {
1388 }
1389
1390 WebViewGuest::PermissionResponseInfo::PermissionResponseInfo(
1391     const PermissionResponseCallback& callback,
1392     WebViewPermissionType permission_type,
1393     bool allowed_by_default)
1394     : callback(callback),
1395       permission_type(permission_type),
1396       allowed_by_default(allowed_by_default) {
1397 }
1398
1399 WebViewGuest::PermissionResponseInfo::~PermissionResponseInfo() {
1400 }
1401
1402 void WebViewGuest::ShowContextMenu(int request_id,
1403                                    const MenuItemVector* items) {
1404   if (!pending_menu_.get())
1405     return;
1406
1407   // Make sure this was the correct request.
1408   if (request_id != pending_context_menu_request_id_)
1409     return;
1410
1411   // TODO(lazyboy): Implement.
1412   DCHECK(!items);
1413
1414   ContextMenuDelegate* menu_delegate =
1415       ContextMenuDelegate::FromWebContents(guest_web_contents());
1416   menu_delegate->ShowMenu(pending_menu_.Pass());
1417 }
1418
1419 void WebViewGuest::SetName(const std::string& name) {
1420   if (name_ == name)
1421     return;
1422   name_ = name;
1423
1424   Send(new ChromeViewMsg_SetName(routing_id(), name_));
1425 }
1426
1427 void WebViewGuest::SetZoom(double zoom_factor) {
1428   double zoom_level = content::ZoomFactorToZoomLevel(zoom_factor);
1429   content::HostZoomMap::SetZoomLevel(guest_web_contents(), zoom_level);
1430
1431   scoped_ptr<base::DictionaryValue> args(new base::DictionaryValue());
1432   args->SetDouble(webview::kOldZoomFactor, current_zoom_factor_);
1433   args->SetDouble(webview::kNewZoomFactor, zoom_factor);
1434   DispatchEvent(
1435       new GuestViewBase::Event(webview::kEventZoomChange, args.Pass()));
1436
1437   current_zoom_factor_ = zoom_factor;
1438 }
1439
1440 void WebViewGuest::AddNewContents(content::WebContents* source,
1441                                   content::WebContents* new_contents,
1442                                   WindowOpenDisposition disposition,
1443                                   const gfx::Rect& initial_pos,
1444                                   bool user_gesture,
1445                                   bool* was_blocked) {
1446   if (was_blocked)
1447     *was_blocked = false;
1448   RequestNewWindowPermission(disposition,
1449                              initial_pos,
1450                              user_gesture,
1451                              new_contents);
1452 }
1453
1454 content::WebContents* WebViewGuest::OpenURLFromTab(
1455     content::WebContents* source,
1456     const content::OpenURLParams& params) {
1457   // If the guest wishes to navigate away prior to attachment then we save the
1458   // navigation to perform upon attachment. Navigation initializes a lot of
1459   // state that assumes an embedder exists, such as RenderWidgetHostViewGuest.
1460   // Navigation also resumes resource loading which we don't want to allow
1461   // until attachment.
1462   if (!attached()) {
1463     WebViewGuest* opener = GetOpener();
1464     PendingWindowMap::iterator it =
1465         opener->pending_new_windows_.find(this);
1466     if (it == opener->pending_new_windows_.end())
1467       return NULL;
1468     const NewWindowInfo& info = it->second;
1469     NewWindowInfo new_window_info(params.url, info.name);
1470     new_window_info.changed = new_window_info.url != info.url;
1471     it->second = new_window_info;
1472     return NULL;
1473   }
1474   if (params.disposition == CURRENT_TAB) {
1475     // This can happen for cross-site redirects.
1476     LoadURLWithParams(params.url, params.referrer, params.transition, source);
1477     return source;
1478   }
1479
1480   return CreateNewGuestWindow(params)->guest_web_contents();
1481 }
1482
1483 void WebViewGuest::WebContentsCreated(WebContents* source_contents,
1484                                       int opener_render_frame_id,
1485                                       const base::string16& frame_name,
1486                                       const GURL& target_url,
1487                                       content::WebContents* new_contents) {
1488   WebViewGuest* guest = WebViewGuest::FromWebContents(new_contents);
1489   CHECK(guest);
1490   guest->SetOpener(this);
1491   std::string guest_name = base::UTF16ToUTF8(frame_name);
1492   guest->name_ = guest_name;
1493   pending_new_windows_.insert(
1494       std::make_pair(guest, NewWindowInfo(target_url, guest_name)));
1495 }
1496
1497 void WebViewGuest::LoadURLWithParams(const GURL& url,
1498                                      const content::Referrer& referrer,
1499                                      content::PageTransition transition_type,
1500                                      content::WebContents* web_contents) {
1501   content::NavigationController::LoadURLParams load_url_params(url);
1502   load_url_params.referrer = referrer;
1503   load_url_params.transition_type = transition_type;
1504   load_url_params.extra_headers = std::string();
1505   if (is_overriding_user_agent_) {
1506     load_url_params.override_user_agent =
1507         content::NavigationController::UA_OVERRIDE_TRUE;
1508   }
1509   web_contents->GetController().LoadURLWithParams(load_url_params);
1510 }
1511
1512 void WebViewGuest::RequestNewWindowPermission(
1513     WindowOpenDisposition disposition,
1514     const gfx::Rect& initial_bounds,
1515     bool user_gesture,
1516     content::WebContents* new_contents) {
1517   WebViewGuest* guest = WebViewGuest::FromWebContents(new_contents);
1518   if (!guest)
1519     return;
1520   PendingWindowMap::iterator it = pending_new_windows_.find(guest);
1521   if (it == pending_new_windows_.end())
1522     return;
1523   const NewWindowInfo& new_window_info = it->second;
1524
1525   // Retrieve the opener partition info if we have it.
1526   const GURL& site_url = new_contents->GetSiteInstance()->GetSiteURL();
1527   std::string storage_partition_id = GetStoragePartitionIdFromSiteURL(site_url);
1528
1529   base::DictionaryValue request_info;
1530   request_info.Set(webview::kInitialHeight,
1531                    base::Value::CreateIntegerValue(initial_bounds.height()));
1532   request_info.Set(webview::kInitialWidth,
1533                    base::Value::CreateIntegerValue(initial_bounds.width()));
1534   request_info.Set(webview::kTargetURL,
1535                    base::Value::CreateStringValue(new_window_info.url.spec()));
1536   request_info.Set(webview::kName,
1537                    base::Value::CreateStringValue(new_window_info.name));
1538   request_info.Set(webview::kWindowID,
1539                    base::Value::CreateIntegerValue(guest->guest_instance_id()));
1540   // We pass in partition info so that window-s created through newwindow
1541   // API can use it to set their partition attribute.
1542   request_info.Set(webview::kStoragePartitionId,
1543                    base::Value::CreateStringValue(storage_partition_id));
1544   request_info.Set(webview::kWindowOpenDisposition,
1545                    base::Value::CreateStringValue(
1546                        WindowOpenDispositionToString(disposition)));
1547
1548   RequestPermission(WEB_VIEW_PERMISSION_TYPE_NEW_WINDOW,
1549                     request_info,
1550                     base::Bind(&WebViewGuest::OnWebViewNewWindowResponse,
1551                                base::Unretained(this),
1552                                guest->guest_instance_id()),
1553                                false /* allowed_by_default */);
1554 }
1555
1556 void WebViewGuest::DestroyUnattachedWindows() {
1557   // Destroy() reaches in and removes the WebViewGuest from its opener's
1558   // pending_new_windows_ set. To avoid mutating the set while iterating, we
1559   // create a copy of the pending new windows set and iterate over the copy.
1560   PendingWindowMap pending_new_windows(pending_new_windows_);
1561   // Clean up unattached new windows opened by this guest.
1562   for (PendingWindowMap::const_iterator it = pending_new_windows.begin();
1563        it != pending_new_windows.end(); ++it) {
1564     it->first->Destroy();
1565   }
1566   // All pending windows should be removed from the set after Destroy() is
1567   // called on all of them.
1568   DCHECK(pending_new_windows_.empty());
1569 }
1570
1571 GURL WebViewGuest::ResolveURL(const std::string& src) {
1572   if (!in_extension()) {
1573     NOTREACHED();
1574     return GURL(src);
1575   }
1576
1577   GURL default_url(base::StringPrintf("%s://%s/",
1578                                       extensions::kExtensionScheme,
1579                                       embedder_extension_id().c_str()));
1580   return default_url.Resolve(src);
1581 }
1582
1583 void WebViewGuest::OnWebViewNewWindowResponse(
1584     int new_window_instance_id,
1585     bool allow,
1586     const std::string& user_input) {
1587   WebViewGuest* guest =
1588       WebViewGuest::From(embedder_render_process_id(), new_window_instance_id);
1589   if (!guest)
1590     return;
1591
1592   if (!allow)
1593     guest->Destroy();
1594 }