summaryrefslogtreecommitdiffstats
path: root/Source/WebCore/page/Location.cpp
diff options
context:
space:
mode:
Diffstat (limited to 'Source/WebCore/page/Location.cpp')
-rw-r--r--Source/WebCore/page/Location.cpp276
1 files changed, 276 insertions, 0 deletions
diff --git a/Source/WebCore/page/Location.cpp b/Source/WebCore/page/Location.cpp
new file mode 100644
index 0000000..be185f9
--- /dev/null
+++ b/Source/WebCore/page/Location.cpp
@@ -0,0 +1,276 @@
+/*
+ * Copyright (C) 2008, 2010 Apple Inc. All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ *
+ * 1. Redistributions of source code must retain the above copyright
+ * notice, this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above copyright
+ * notice, this list of conditions and the following disclaimer in the
+ * documentation and/or other materials provided with the distribution.
+ * 3. Neither the name of Apple Computer, Inc. ("Apple") nor the names of
+ * its contributors may be used to endorse or promote products derived
+ * from this software without specific prior written permission.
+ *
+ * THIS SOFTWARE IS PROVIDED BY APPLE AND ITS CONTRIBUTORS "AS IS" AND ANY
+ * EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
+ * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
+ * DISCLAIMED. IN NO EVENT SHALL APPLE OR ITS CONTRIBUTORS BE LIABLE FOR ANY
+ * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
+ * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
+ * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
+ * ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+ * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
+ * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ */
+
+#include "config.h"
+#include "Location.h"
+
+#include "DOMWindow.h"
+#include "ExceptionCode.h"
+#include "Frame.h"
+#include "FrameLoader.h"
+#include "KURL.h"
+
+namespace WebCore {
+
+Location::Location(Frame* frame)
+ : m_frame(frame)
+{
+}
+
+void Location::disconnectFrame()
+{
+ m_frame = 0;
+}
+
+inline const KURL& Location::url() const
+{
+ ASSERT(m_frame);
+
+ const KURL& url = m_frame->loader()->url();
+ if (!url.isValid())
+ return blankURL(); // Use "about:blank" while the page is still loading (before we have a frame).
+
+ return url;
+}
+
+String Location::href() const
+{
+ if (!m_frame)
+ return String();
+
+ const KURL& url = this->url();
+ return url.hasPath() ? url.prettyURL() : url.prettyURL() + "/";
+}
+
+String Location::protocol() const
+{
+ if (!m_frame)
+ return String();
+
+ return url().protocol() + ":";
+}
+
+String Location::host() const
+{
+ if (!m_frame)
+ return String();
+
+ // Note: this is the IE spec. The NS spec swaps the two, it says
+ // "The hostname property is the concatenation of the host and port properties, separated by a colon."
+ const KURL& url = this->url();
+ return url.port() ? url.host() + ":" + String::number(url.port()) : url.host();
+}
+
+String Location::hostname() const
+{
+ if (!m_frame)
+ return String();
+
+ return url().host();
+}
+
+String Location::port() const
+{
+ if (!m_frame)
+ return String();
+
+ const KURL& url = this->url();
+ return url.port() ? String::number(url.port()) : "";
+}
+
+String Location::pathname() const
+{
+ if (!m_frame)
+ return String();
+
+ const KURL& url = this->url();
+ return url.path().isEmpty() ? "/" : url.path();
+}
+
+String Location::search() const
+{
+ if (!m_frame)
+ return String();
+
+ const KURL& url = this->url();
+ return url.query().isEmpty() ? "" : "?" + url.query();
+}
+
+String Location::origin() const
+{
+ if (!m_frame)
+ return String();
+ return SecurityOrigin::create(url())->toString();
+}
+
+String Location::hash() const
+{
+ if (!m_frame)
+ return String();
+
+ const String& fragmentIdentifier = url().fragmentIdentifier();
+ return fragmentIdentifier.isEmpty() ? "" : "#" + fragmentIdentifier;
+}
+
+String Location::getParameter(const String& name) const
+{
+ if (!m_frame)
+ return String();
+
+ ParsedURLParameters parameters;
+ url().copyParsedQueryTo(parameters);
+ return parameters.get(name);
+}
+
+String Location::toString() const
+{
+ if (!m_frame)
+ return String();
+
+ const KURL& url = this->url();
+ return url.hasPath() ? url.prettyURL() : url.prettyURL() + "/";
+}
+
+void Location::setHref(const String& urlString, DOMWindow* activeWindow, DOMWindow* firstWindow)
+{
+ if (!m_frame)
+ return;
+ m_frame->domWindow()->setLocation(urlString, activeWindow, firstWindow);
+}
+
+void Location::setProtocol(const String& protocol, DOMWindow* activeWindow, DOMWindow* firstWindow, ExceptionCode& ec)
+{
+ if (!m_frame)
+ return;
+ KURL url = m_frame->loader()->url();
+ if (!url.setProtocol(protocol)) {
+ ec = SYNTAX_ERR;
+ return;
+ }
+ m_frame->domWindow()->setLocation(url.string(), activeWindow, firstWindow);
+}
+
+void Location::setHost(const String& host, DOMWindow* activeWindow, DOMWindow* firstWindow)
+{
+ if (!m_frame)
+ return;
+ KURL url = m_frame->loader()->url();
+ url.setHostAndPort(host);
+ m_frame->domWindow()->setLocation(url.string(), activeWindow, firstWindow);
+}
+
+void Location::setHostname(const String& hostname, DOMWindow* activeWindow, DOMWindow* firstWindow)
+{
+ if (!m_frame)
+ return;
+ KURL url = m_frame->loader()->url();
+ url.setHost(hostname);
+ m_frame->domWindow()->setLocation(url.string(), activeWindow, firstWindow);
+}
+
+void Location::setPort(const String& portString, DOMWindow* activeWindow, DOMWindow* firstWindow)
+{
+ if (!m_frame)
+ return;
+ KURL url = m_frame->loader()->url();
+ int port = portString.toInt();
+ if (port < 0 || port > 0xFFFF)
+ url.removePort();
+ else
+ url.setPort(port);
+ m_frame->domWindow()->setLocation(url.string(), activeWindow, firstWindow);
+}
+
+void Location::setPathname(const String& pathname, DOMWindow* activeWindow, DOMWindow* firstWindow)
+{
+ if (!m_frame)
+ return;
+ KURL url = m_frame->loader()->url();
+ url.setPath(pathname);
+ m_frame->domWindow()->setLocation(url.string(), activeWindow, firstWindow);
+}
+
+void Location::setSearch(const String& search, DOMWindow* activeWindow, DOMWindow* firstWindow)
+{
+ if (!m_frame)
+ return;
+ KURL url = m_frame->loader()->url();
+ url.setQuery(search);
+ m_frame->domWindow()->setLocation(url.string(), activeWindow, firstWindow);
+}
+
+void Location::setHash(const String& hash, DOMWindow* activeWindow, DOMWindow* firstWindow)
+{
+ if (!m_frame)
+ return;
+ KURL url = m_frame->loader()->url();
+ String oldFragmentIdentifier = url.fragmentIdentifier();
+ String newFragmentIdentifier = hash;
+ if (hash[0] == '#')
+ newFragmentIdentifier = hash.substring(1);
+ url.setFragmentIdentifier(newFragmentIdentifier);
+ // Note that by parsing the URL and *then* comparing fragments, we are
+ // comparing fragments post-canonicalization, and so this handles the
+ // cases where fragment identifiers are ignored or invalid.
+ if (equalIgnoringNullity(oldFragmentIdentifier, url.fragmentIdentifier()))
+ return;
+ m_frame->domWindow()->setLocation(url.string(), activeWindow, firstWindow);
+}
+
+void Location::assign(const String& urlString, DOMWindow* activeWindow, DOMWindow* firstWindow)
+{
+ if (!m_frame)
+ return;
+ m_frame->domWindow()->setLocation(urlString, activeWindow, firstWindow);
+}
+
+void Location::replace(const String& urlString, DOMWindow* activeWindow, DOMWindow* firstWindow)
+{
+ if (!m_frame)
+ return;
+ m_frame->domWindow()->setLocation(urlString, activeWindow, firstWindow, LockHistoryAndBackForwardList);
+}
+
+void Location::reload(DOMWindow* activeWindow)
+{
+ if (!m_frame)
+ return;
+ // FIXME: It's not clear this cross-origin security check is valuable.
+ // We allow one page to change the location of another. Why block attempts to reload?
+ // Other location operations simply block use of JavaScript URLs cross origin.
+ DOMWindow* targetWindow = m_frame->domWindow();
+ if (!activeWindow->securityOrigin()->canAccess(targetWindow->securityOrigin())) {
+ targetWindow->printErrorMessage(targetWindow->crossDomainAccessErrorMessage(activeWindow));
+ return;
+ }
+ if (protocolIsJavaScript(m_frame->loader()->url()))
+ return;
+ m_frame->navigationScheduler()->scheduleRefresh();
+}
+
+} // namespace WebCore