diff options
| author | Simon Hausmann <simon.hausmann@nokia.com> | 2012-01-06 14:44:00 +0100 |
|---|---|---|
| committer | Simon Hausmann <simon.hausmann@nokia.com> | 2012-01-06 14:44:00 +0100 |
| commit | 40736c5763bf61337c8c14e16d8587db021a87d4 (patch) | |
| tree | b17a9c00042ad89cb1308e2484491799aa14e9f8 /Source/WebCore/bindings/ScriptControllerBase.cpp | |
| download | qtwebkit-40736c5763bf61337c8c14e16d8587db021a87d4.tar.gz | |
Imported WebKit commit 2ea9d364d0f6efa8fa64acf19f451504c59be0e4 (http://svn.webkit.org/repository/webkit/trunk@104285)
Diffstat (limited to 'Source/WebCore/bindings/ScriptControllerBase.cpp')
| -rw-r--r-- | Source/WebCore/bindings/ScriptControllerBase.cpp | 133 |
1 files changed, 133 insertions, 0 deletions
diff --git a/Source/WebCore/bindings/ScriptControllerBase.cpp b/Source/WebCore/bindings/ScriptControllerBase.cpp new file mode 100644 index 000000000..570f964ce --- /dev/null +++ b/Source/WebCore/bindings/ScriptControllerBase.cpp @@ -0,0 +1,133 @@ +/* + * Copyright (C) 1999-2001 Harri Porten (porten@kde.org) + * Copyright (C) 2001 Peter Kelly (pmk@post.com) + * Copyright (C) 2006, 2007, 2008 Apple Inc. All rights reserved. + * + * This library is free software; you can redistribute it and/or + * modify it under the terms of the GNU Lesser General Public + * License as published by the Free Software Foundation; either + * version 2 of the License, or (at your option) any later version. + * + * This library is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU + * Lesser General Public License for more details. + * + * You should have received a copy of the GNU Lesser General Public + * License along with this library; if not, write to the Free Software + * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA + */ + +#include "config.h" +#include "ScriptController.h" + +#include "ContentSecurityPolicy.h" +#include "Document.h" +#include "DocumentLoader.h" +#include "Frame.h" +#include "FrameLoaderClient.h" +#include "Page.h" +#include "ScriptSourceCode.h" +#include "ScriptValue.h" +#include "SecurityOrigin.h" +#include "Settings.h" +#include "UserGestureIndicator.h" + +namespace WebCore { + +bool ScriptController::canExecuteScripts(ReasonForCallingCanExecuteScripts reason) +{ + if (m_frame->document() && m_frame->document()->isSandboxed(SandboxScripts)) + return false; + + if (m_frame->document() && m_frame->document()->isViewSource()) { + ASSERT(m_frame->document()->securityOrigin()->isUnique()); + return true; + } + + Settings* settings = m_frame->settings(); + const bool allowed = m_frame->loader()->client()->allowScript(settings && settings->isScriptEnabled()); + if (!allowed && reason == AboutToExecuteScript) + m_frame->loader()->client()->didNotAllowScript(); + return allowed; +} + +ScriptValue ScriptController::executeScript(const String& script, bool forceUserGesture) +{ + UserGestureIndicator gestureIndicator(forceUserGesture ? DefinitelyProcessingUserGesture : PossiblyProcessingUserGesture); + return executeScript(ScriptSourceCode(script, m_frame->document()->url())); +} + +ScriptValue ScriptController::executeScript(const ScriptSourceCode& sourceCode) +{ + if (!canExecuteScripts(AboutToExecuteScript) || isPaused()) + return ScriptValue(); + + bool wasInExecuteScript = m_inExecuteScript; + m_inExecuteScript = true; + + RefPtr<Frame> protect(m_frame); // Script execution can destroy the frame, and thus the ScriptController. + + ScriptValue result = evaluate(sourceCode); + + if (!wasInExecuteScript) { + m_inExecuteScript = false; + Document::updateStyleForAllDocuments(); + } + + return result; +} + +bool ScriptController::executeIfJavaScriptURL(const KURL& url, ShouldReplaceDocumentIfJavaScriptURL shouldReplaceDocumentIfJavaScriptURL) +{ + if (!protocolIsJavaScript(url)) + return false; + + if (!m_frame->page() + || !m_frame->page()->javaScriptURLsAreAllowed() + || !m_frame->document()->contentSecurityPolicy()->allowJavaScriptURLs() + || m_frame->inViewSourceMode()) + return true; + + // We need to hold onto the Frame here because executing script can + // destroy the frame. + RefPtr<Frame> protector(m_frame); + RefPtr<Document> ownerDocument(m_frame->document()); + + const int javascriptSchemeLength = sizeof("javascript:") - 1; + + String decodedURL = decodeURLEscapeSequences(url.string()); + ScriptValue result = executeScript(decodedURL.substring(javascriptSchemeLength)); + + // If executing script caused this frame to be removed from the page, we + // don't want to try to replace its document! + if (!m_frame->page()) + return true; + + String scriptResult; +#if USE(JSC) + JSDOMWindowShell* shell = windowShell(mainThreadNormalWorld()); + JSC::ExecState* exec = shell->window()->globalExec(); + if (!result.getString(exec, scriptResult)) + return true; +#else + if (!result.getString(scriptResult)) + return true; +#endif + + // FIXME: We should always replace the document, but doing so + // synchronously can cause crashes: + // http://bugs.webkit.org/show_bug.cgi?id=16782 + if (shouldReplaceDocumentIfJavaScriptURL == ReplaceDocumentIfJavaScriptURL) { + // We're still in a frame, so there should be a DocumentLoader. + ASSERT(m_frame->document()->loader()); + + // DocumentWriter::replaceDocument can cause the DocumentLoader to get deref'ed and possible destroyed, + // so protect it with a RefPtr. + if (RefPtr<DocumentLoader> loader = m_frame->document()->loader()) + loader->writer()->replaceDocument(scriptResult, ownerDocument.get()); + } + return true; +} + +} // namespace WebCore |
