/* * Copyright (C) 2003, 2006, 2010 Apple Inc. All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * * THIS SOFTWARE IS PROVIDED BY APPLE INC. ``AS IS'' AND ANY * EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE INC. OR * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY * OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ #ifndef FrameLoadRequest_h #define FrameLoadRequest_h #include "FrameLoaderTypes.h" #include "ResourceRequest.h" #include "SecurityOrigin.h" #include "SubstituteData.h" namespace WebCore { class Frame; struct FrameLoadRequest { public: FrameLoadRequest(SecurityOrigin* requester, LockHistory lockHistory, LockBackForwardList lockBackForwardList, ShouldSendReferrer shouldSendReferrer, AllowNavigationToInvalidURL allowNavigationToInvalidURL, NewFrameOpenerPolicy newFrameOpenerPolicy, ShouldOpenExternalURLsPolicy shouldOpenExternalURLsPolicy) : m_requester(requester) , m_shouldCheckNewWindowPolicy(false) , m_lockHistory(lockHistory) , m_lockBackForwardList(lockBackForwardList) , m_shouldSendReferrer(shouldSendReferrer) , m_allowNavigationToInvalidURL(allowNavigationToInvalidURL) , m_newFrameOpenerPolicy(newFrameOpenerPolicy) , m_shouldReplaceDocumentIfJavaScriptURL(ReplaceDocumentIfJavaScriptURL) , m_shouldOpenExternalURLsPolicy(shouldOpenExternalURLsPolicy) { } FrameLoadRequest(SecurityOrigin* requester, const ResourceRequest& resourceRequest, LockHistory lockHistory, LockBackForwardList lockBackForwardList, ShouldSendReferrer shouldSendReferrer, AllowNavigationToInvalidURL allowNavigationToInvalidURL, NewFrameOpenerPolicy newFrameOpenerPolicy, ShouldOpenExternalURLsPolicy shouldOpenExternalURLsPolicy) : m_requester(requester) , m_resourceRequest(resourceRequest) , m_shouldCheckNewWindowPolicy(false) , m_lockHistory(lockHistory) , m_lockBackForwardList(lockBackForwardList) , m_shouldSendReferrer(shouldSendReferrer) , m_allowNavigationToInvalidURL(allowNavigationToInvalidURL) , m_newFrameOpenerPolicy(newFrameOpenerPolicy) , m_shouldReplaceDocumentIfJavaScriptURL(ReplaceDocumentIfJavaScriptURL) , m_shouldOpenExternalURLsPolicy(shouldOpenExternalURLsPolicy) { } FrameLoadRequest(SecurityOrigin* requester, const ResourceRequest& resourceRequest, const String& frameName, LockHistory lockHistory, LockBackForwardList lockBackForwardList, ShouldSendReferrer shouldSendReferrer, AllowNavigationToInvalidURL allowNavigationToInvalidURL, NewFrameOpenerPolicy newFrameOpenerPolicy, ShouldOpenExternalURLsPolicy shouldOpenExternalURLsPolicy) : m_requester(requester) , m_resourceRequest(resourceRequest) , m_frameName(frameName) , m_shouldCheckNewWindowPolicy(false) , m_lockHistory(lockHistory) , m_lockBackForwardList(lockBackForwardList) , m_shouldSendReferrer(shouldSendReferrer) , m_allowNavigationToInvalidURL(allowNavigationToInvalidURL) , m_newFrameOpenerPolicy(newFrameOpenerPolicy) , m_shouldReplaceDocumentIfJavaScriptURL(ReplaceDocumentIfJavaScriptURL) , m_shouldOpenExternalURLsPolicy(shouldOpenExternalURLsPolicy) { } FrameLoadRequest(SecurityOrigin* requester, const ResourceRequest& resourceRequest, const String& frameName, LockHistory lockHistory, LockBackForwardList lockBackForwardList, ShouldSendReferrer shouldSendReferrer, AllowNavigationToInvalidURL allowNavigationToInvalidURL, NewFrameOpenerPolicy newFrameOpenerPolicy, ShouldReplaceDocumentIfJavaScriptURL shouldReplaceDocumentIfJavaScriptURL, ShouldOpenExternalURLsPolicy shouldOpenExternalURLsPolicy) : m_requester(requester) , m_resourceRequest(resourceRequest) , m_frameName(frameName) , m_shouldCheckNewWindowPolicy(false) , m_lockHistory(lockHistory) , m_lockBackForwardList(lockBackForwardList) , m_shouldSendReferrer(shouldSendReferrer) , m_allowNavigationToInvalidURL(allowNavigationToInvalidURL) , m_newFrameOpenerPolicy(newFrameOpenerPolicy) , m_shouldReplaceDocumentIfJavaScriptURL(shouldReplaceDocumentIfJavaScriptURL) , m_shouldOpenExternalURLsPolicy(shouldOpenExternalURLsPolicy) { } WEBCORE_EXPORT FrameLoadRequest(Frame*, const ResourceRequest&, ShouldOpenExternalURLsPolicy, const SubstituteData& = SubstituteData()); bool isEmpty() const { return m_resourceRequest.isEmpty(); } const SecurityOrigin* requester() const { return m_requester.get(); } ResourceRequest& resourceRequest() { return m_resourceRequest; } const ResourceRequest& resourceRequest() const { return m_resourceRequest; } const String& frameName() const { return m_frameName; } void setFrameName(const String& frameName) { m_frameName = frameName; } void setShouldCheckNewWindowPolicy(bool checkPolicy) { m_shouldCheckNewWindowPolicy = checkPolicy; } bool shouldCheckNewWindowPolicy() const { return m_shouldCheckNewWindowPolicy; } const SubstituteData& substituteData() const { return m_substituteData; } void setSubstituteData(const SubstituteData& data) { m_substituteData = data; } bool hasSubstituteData() { return m_substituteData.isValid(); } LockHistory lockHistory() const { return m_lockHistory; } LockBackForwardList lockBackForwardList() const { return m_lockBackForwardList; } ShouldSendReferrer shouldSendReferrer() const { return m_shouldSendReferrer; } AllowNavigationToInvalidURL allowNavigationToInvalidURL() const { return m_allowNavigationToInvalidURL; } NewFrameOpenerPolicy newFrameOpenerPolicy() const { return m_newFrameOpenerPolicy; } // The shouldReplaceDocumentIfJavaScriptURL parameter will go away when the FIXME to eliminate the // corresponding parameter from ScriptController::executeIfJavaScriptURL() is addressed. ShouldReplaceDocumentIfJavaScriptURL shouldReplaceDocumentIfJavaScriptURL() const { return m_shouldReplaceDocumentIfJavaScriptURL; } void setShouldOpenExternalURLsPolicy(ShouldOpenExternalURLsPolicy policy) { m_shouldOpenExternalURLsPolicy = policy; } ShouldOpenExternalURLsPolicy shouldOpenExternalURLsPolicy() const { return m_shouldOpenExternalURLsPolicy; } private: RefPtr m_requester; ResourceRequest m_resourceRequest; String m_frameName; bool m_shouldCheckNewWindowPolicy; SubstituteData m_substituteData; LockHistory m_lockHistory; LockBackForwardList m_lockBackForwardList; ShouldSendReferrer m_shouldSendReferrer; AllowNavigationToInvalidURL m_allowNavigationToInvalidURL; NewFrameOpenerPolicy m_newFrameOpenerPolicy; ShouldReplaceDocumentIfJavaScriptURL m_shouldReplaceDocumentIfJavaScriptURL; ShouldOpenExternalURLsPolicy m_shouldOpenExternalURLsPolicy { ShouldOpenExternalURLsPolicy::ShouldNotAllow }; }; } #endif // FrameLoadRequest_h