webplugin_delegate_proxy.cc revision 5f1c94371a64b3196d4be9466099bb892df9b88e
1// Copyright (c) 2012 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include "content/renderer/npapi/webplugin_delegate_proxy.h"
6
7#include <algorithm>
8
9#include "base/auto_reset.h"
10#include "base/basictypes.h"
11#include "base/command_line.h"
12#include "base/file_util.h"
13#include "base/logging.h"
14#include "base/memory/ref_counted.h"
15#include "base/memory/scoped_ptr.h"
16#include "base/process/process.h"
17#include "base/strings/string_split.h"
18#include "base/strings/string_util.h"
19#include "base/strings/utf_string_conversions.h"
20#include "base/version.h"
21#include "content/child/child_process.h"
22#include "content/child/npapi/npobject_proxy.h"
23#include "content/child/npapi/npobject_stub.h"
24#include "content/child/npapi/npobject_util.h"
25#include "content/child/npapi/webplugin_resource_client.h"
26#include "content/child/plugin_messages.h"
27#include "content/common/content_constants_internal.h"
28#include "content/common/cursors/webcursor.h"
29#include "content/common/frame_messages.h"
30#include "content/common/view_messages.h"
31#include "content/public/renderer/content_renderer_client.h"
32#include "content/renderer/npapi/plugin_channel_host.h"
33#include "content/renderer/npapi/webplugin_impl.h"
34#include "content/renderer/render_thread_impl.h"
35#include "content/renderer/render_view_impl.h"
36#include "content/renderer/sad_plugin.h"
37#include "ipc/ipc_channel_handle.h"
38#include "net/base/mime_util.h"
39#include "skia/ext/platform_canvas.h"
40#include "third_party/WebKit/public/platform/WebDragData.h"
41#include "third_party/WebKit/public/platform/WebString.h"
42#include "third_party/WebKit/public/web/WebBindings.h"
43#include "third_party/WebKit/public/web/WebDocument.h"
44#include "third_party/WebKit/public/web/WebFrame.h"
45#include "third_party/WebKit/public/web/WebView.h"
46#include "ui/gfx/blit.h"
47#include "ui/gfx/canvas.h"
48#include "ui/gfx/native_widget_types.h"
49#include "ui/gfx/size.h"
50#include "ui/gfx/skia_util.h"
51
52#if defined(OS_POSIX)
53#include "ipc/ipc_channel_posix.h"
54#endif
55
56#if defined(OS_MACOSX)
57#include "base/mac/mac_util.h"
58#endif
59
60#if defined(OS_WIN)
61#include "content/public/common/sandbox_init.h"
62#endif
63
64using blink::WebBindings;
65using blink::WebCursorInfo;
66using blink::WebDragData;
67using blink::WebInputEvent;
68using blink::WebString;
69using blink::WebView;
70
71namespace content {
72
73namespace {
74
75class ScopedLogLevel {
76 public:
77  explicit ScopedLogLevel(int level);
78  ~ScopedLogLevel();
79
80 private:
81  int old_level_;
82
83  DISALLOW_COPY_AND_ASSIGN(ScopedLogLevel);
84};
85
86ScopedLogLevel::ScopedLogLevel(int level)
87    : old_level_(logging::GetMinLogLevel()) {
88  logging::SetMinLogLevel(level);
89}
90
91ScopedLogLevel::~ScopedLogLevel() {
92  logging::SetMinLogLevel(old_level_);
93}
94
95// Proxy for WebPluginResourceClient.  The object owns itself after creation,
96// deleting itself after its callback has been called.
97class ResourceClientProxy : public WebPluginResourceClient {
98 public:
99  ResourceClientProxy(PluginChannelHost* channel, int instance_id)
100    : channel_(channel), instance_id_(instance_id), resource_id_(0),
101      multibyte_response_expected_(false) {
102  }
103
104  virtual ~ResourceClientProxy() {
105  }
106
107  void Initialize(unsigned long resource_id, const GURL& url, int notify_id) {
108    resource_id_ = resource_id;
109    channel_->Send(new PluginMsg_HandleURLRequestReply(
110        instance_id_, resource_id, url, notify_id));
111  }
112
113  void InitializeForSeekableStream(unsigned long resource_id,
114                                   int range_request_id) {
115    resource_id_ = resource_id;
116    multibyte_response_expected_ = true;
117    channel_->Send(new PluginMsg_HTTPRangeRequestReply(
118        instance_id_, resource_id, range_request_id));
119  }
120
121  // PluginResourceClient implementation:
122  virtual void WillSendRequest(const GURL& url, int http_status_code) OVERRIDE {
123    DCHECK(channel_.get() != NULL);
124    channel_->Send(new PluginMsg_WillSendRequest(
125        instance_id_, resource_id_, url, http_status_code));
126  }
127
128  virtual void DidReceiveResponse(const std::string& mime_type,
129                                  const std::string& headers,
130                                  uint32 expected_length,
131                                  uint32 last_modified,
132                                  bool request_is_seekable) OVERRIDE {
133    DCHECK(channel_.get() != NULL);
134    PluginMsg_DidReceiveResponseParams params;
135    params.id = resource_id_;
136    params.mime_type = mime_type;
137    params.headers = headers;
138    params.expected_length = expected_length;
139    params.last_modified = last_modified;
140    params.request_is_seekable = request_is_seekable;
141    // Grab a reference on the underlying channel so it does not get
142    // deleted from under us.
143    scoped_refptr<PluginChannelHost> channel_ref(channel_);
144    channel_->Send(new PluginMsg_DidReceiveResponse(instance_id_, params));
145  }
146
147  virtual void DidReceiveData(const char* buffer,
148                              int length,
149                              int data_offset) OVERRIDE {
150    DCHECK(channel_.get() != NULL);
151    DCHECK_GT(length, 0);
152    std::vector<char> data;
153    data.resize(static_cast<size_t>(length));
154    memcpy(&data.front(), buffer, length);
155    // Grab a reference on the underlying channel so it does not get
156    // deleted from under us.
157    scoped_refptr<PluginChannelHost> channel_ref(channel_);
158    channel_->Send(new PluginMsg_DidReceiveData(instance_id_, resource_id_,
159                                                data, data_offset));
160  }
161
162  virtual void DidFinishLoading(unsigned long resource_id) OVERRIDE {
163    DCHECK(channel_.get() != NULL);
164    DCHECK_EQ(resource_id, resource_id_);
165    channel_->Send(new PluginMsg_DidFinishLoading(instance_id_, resource_id_));
166    channel_ = NULL;
167    base::MessageLoop::current()->DeleteSoon(FROM_HERE, this);
168  }
169
170  virtual void DidFail(unsigned long resource_id) OVERRIDE {
171    DCHECK(channel_.get() != NULL);
172    DCHECK_EQ(resource_id, resource_id_);
173    channel_->Send(new PluginMsg_DidFail(instance_id_, resource_id_));
174    channel_ = NULL;
175    base::MessageLoop::current()->DeleteSoon(FROM_HERE, this);
176  }
177
178  virtual bool IsMultiByteResponseExpected() OVERRIDE {
179    return multibyte_response_expected_;
180  }
181
182  virtual int ResourceId() OVERRIDE {
183    return resource_id_;
184  }
185
186 private:
187  scoped_refptr<PluginChannelHost> channel_;
188  int instance_id_;
189  unsigned long resource_id_;
190  // Set to true if the response expected is a multibyte response.
191  // For e.g. response for a HTTP byte range request.
192  bool multibyte_response_expected_;
193};
194
195}  // namespace
196
197WebPluginDelegateProxy::WebPluginDelegateProxy(
198    WebPluginImpl* plugin,
199    const std::string& mime_type,
200    const base::WeakPtr<RenderViewImpl>& render_view,
201    RenderFrameImpl* render_frame)
202    : render_view_(render_view),
203      render_frame_(render_frame),
204      plugin_(plugin),
205      uses_shared_bitmaps_(false),
206#if defined(OS_MACOSX)
207      uses_compositor_(false),
208#elif defined(OS_WIN)
209      dummy_activation_window_(NULL),
210#endif
211      window_(gfx::kNullPluginWindow),
212      mime_type_(mime_type),
213      instance_id_(MSG_ROUTING_NONE),
214      npobject_(NULL),
215      npp_(new NPP_t),
216      sad_plugin_(NULL),
217      invalidate_pending_(false),
218      transparent_(false),
219      front_buffer_index_(0),
220      page_url_(render_view_->webview()->mainFrame()->document().url()) {
221}
222
223WebPluginDelegateProxy::~WebPluginDelegateProxy() {
224  if (npobject_)
225    WebBindings::releaseObject(npobject_);
226}
227
228WebPluginDelegateProxy::SharedBitmap::SharedBitmap() {}
229
230WebPluginDelegateProxy::SharedBitmap::~SharedBitmap() {}
231
232void WebPluginDelegateProxy::PluginDestroyed() {
233#if defined(OS_MACOSX) || defined(OS_WIN)
234  // Ensure that the renderer doesn't think the plugin still has focus.
235  if (render_view_)
236    render_view_->PluginFocusChanged(false, instance_id_);
237#endif
238
239#if defined(OS_WIN)
240  if (dummy_activation_window_ && render_view_) {
241    render_view_->Send(new ViewHostMsg_WindowlessPluginDummyWindowDestroyed(
242        render_view_->routing_id(), dummy_activation_window_));
243  }
244  dummy_activation_window_ = NULL;
245#endif
246
247  if (window_)
248    WillDestroyWindow();
249
250  if (render_view_.get())
251    render_view_->UnregisterPluginDelegate(this);
252
253  if (channel_host_.get()) {
254    Send(new PluginMsg_DestroyInstance(instance_id_));
255
256    // Must remove the route after sending the destroy message, rather than
257    // before, since RemoveRoute can lead to all the outstanding NPObjects
258    // being told the channel went away if this was the last instance.
259    channel_host_->RemoveRoute(instance_id_);
260
261    // Remove the mapping between our instance-Id and NPP identifiers, used by
262    // the channel to track object ownership, before releasing it.
263    channel_host_->RemoveMappingForNPObjectOwner(instance_id_);
264
265    // Release the channel host now. If we are is the last reference to the
266    // channel, this avoids a race where this renderer asks a new connection to
267    // the same plugin between now and the time 'this' is actually deleted.
268    // Destroying the channel host is what releases the channel name -> FD
269    // association on POSIX, and if we ask for a new connection before it is
270    // released, the plugin will give us a new FD, and we'll assert when trying
271    // to associate it with the channel name.
272    channel_host_ = NULL;
273  }
274
275  plugin_ = NULL;
276
277  base::MessageLoop::current()->DeleteSoon(FROM_HERE, this);
278}
279
280bool WebPluginDelegateProxy::Initialize(
281    const GURL& url,
282    const std::vector<std::string>& arg_names,
283    const std::vector<std::string>& arg_values,
284    bool load_manually) {
285  // TODO(shess): Attempt to work around http://crbug.com/97285 and
286  // http://crbug.com/141055 by retrying the connection.  Reports seem
287  // to indicate that the plugin hasn't crashed, and that the problem
288  // is not 100% persistent.
289  const size_t kAttempts = 2;
290
291  bool result = false;
292  scoped_refptr<PluginChannelHost> channel_host;
293  int instance_id = 0;
294
295  for (size_t attempt = 0; !result && attempt < kAttempts; attempt++) {
296#if defined(OS_MACOSX)
297    // TODO(shess): Debugging for http://crbug.com/97285 .  See comment
298    // in plugin_channel_host.cc.
299    scoped_ptr<base::AutoReset<bool> > track_nested_removes(
300        new base::AutoReset<bool>(PluginChannelHost::GetRemoveTrackingFlag(),
301                                  true));
302#endif
303
304    IPC::ChannelHandle channel_handle;
305    if (!RenderThreadImpl::current()->Send(new FrameHostMsg_OpenChannelToPlugin(
306            render_frame_->GetRoutingID(), url, page_url_, mime_type_,
307            &channel_handle, &info_))) {
308      continue;
309    }
310
311    if (channel_handle.name.empty()) {
312      // We got an invalid handle.  Either the plugin couldn't be found (which
313      // shouldn't happen, since if we got here the plugin should exist) or the
314      // plugin crashed on initialization.
315      if (!info_.path.empty()) {
316        render_view_->main_render_frame()->PluginCrashed(
317            info_.path, base::kNullProcessId);
318        LOG(ERROR) << "Plug-in crashed on start";
319
320        // Return true so that the plugin widget is created and we can paint the
321        // crashed plugin there.
322        return true;
323      }
324      LOG(ERROR) << "Plug-in couldn't be found";
325      return false;
326    }
327
328    channel_host =
329        PluginChannelHost::GetPluginChannelHost(
330            channel_handle, ChildProcess::current()->io_message_loop_proxy());
331    if (!channel_host.get()) {
332      LOG(ERROR) << "Couldn't get PluginChannelHost";
333      continue;
334    }
335#if defined(OS_MACOSX)
336    track_nested_removes.reset();
337#endif
338
339    {
340      // TODO(bauerb): Debugging for http://crbug.com/141055.
341      ScopedLogLevel log_level(-2);  // Equivalent to --v=2
342      result = channel_host->Send(new PluginMsg_CreateInstance(
343          mime_type_, &instance_id));
344      if (!result) {
345        LOG(ERROR) << "Couldn't send PluginMsg_CreateInstance";
346        continue;
347      }
348    }
349  }
350
351  // Failed too often, give up.
352  if (!result)
353    return false;
354
355  channel_host_ = channel_host;
356  instance_id_ = instance_id;
357
358  channel_host_->AddRoute(instance_id_, this, NULL);
359
360  // Inform the channel of the mapping between our instance-Id and dummy NPP
361  // identifier, for use in object ownership tracking.
362  channel_host_->AddMappingForNPObjectOwner(instance_id_, GetPluginNPP());
363
364  // Now tell the PluginInstance in the plugin process to initialize.
365  PluginMsg_Init_Params params;
366  params.url = url;
367  params.page_url = page_url_;
368  params.arg_names = arg_names;
369  params.arg_values = arg_values;
370  params.host_render_view_routing_id = render_view_->routing_id();
371  params.load_manually = load_manually;
372
373  result = false;
374  Send(new PluginMsg_Init(instance_id_, params, &transparent_, &result));
375
376  if (!result)
377    LOG(WARNING) << "PluginMsg_Init returned false";
378
379  render_view_->RegisterPluginDelegate(this);
380
381  return result;
382}
383
384bool WebPluginDelegateProxy::Send(IPC::Message* msg) {
385  if (!channel_host_.get()) {
386    DLOG(WARNING) << "dropping message because channel host is null";
387    delete msg;
388    return false;
389  }
390
391  return channel_host_->Send(msg);
392}
393
394void WebPluginDelegateProxy::SendJavaScriptStream(const GURL& url,
395                                                  const std::string& result,
396                                                  bool success,
397                                                  int notify_id) {
398  Send(new PluginMsg_SendJavaScriptStream(
399      instance_id_, url, result, success, notify_id));
400}
401
402void WebPluginDelegateProxy::DidReceiveManualResponse(
403    const GURL& url, const std::string& mime_type,
404    const std::string& headers, uint32 expected_length,
405    uint32 last_modified) {
406  PluginMsg_DidReceiveResponseParams params;
407  params.id = 0;
408  params.mime_type = mime_type;
409  params.headers = headers;
410  params.expected_length = expected_length;
411  params.last_modified = last_modified;
412  Send(new PluginMsg_DidReceiveManualResponse(instance_id_, url, params));
413}
414
415void WebPluginDelegateProxy::DidReceiveManualData(const char* buffer,
416                                                  int length) {
417  DCHECK_GT(length, 0);
418  std::vector<char> data;
419  data.resize(static_cast<size_t>(length));
420  memcpy(&data.front(), buffer, length);
421  Send(new PluginMsg_DidReceiveManualData(instance_id_, data));
422}
423
424void WebPluginDelegateProxy::DidFinishManualLoading() {
425  Send(new PluginMsg_DidFinishManualLoading(instance_id_));
426}
427
428void WebPluginDelegateProxy::DidManualLoadFail() {
429  Send(new PluginMsg_DidManualLoadFail(instance_id_));
430}
431
432bool WebPluginDelegateProxy::OnMessageReceived(const IPC::Message& msg) {
433  GetContentClient()->SetActiveURL(page_url_);
434
435  bool handled = true;
436  IPC_BEGIN_MESSAGE_MAP(WebPluginDelegateProxy, msg)
437    IPC_MESSAGE_HANDLER(PluginHostMsg_SetWindow, OnSetWindow)
438    IPC_MESSAGE_HANDLER(PluginHostMsg_CancelResource, OnCancelResource)
439    IPC_MESSAGE_HANDLER(PluginHostMsg_InvalidateRect, OnInvalidateRect)
440    IPC_MESSAGE_HANDLER(PluginHostMsg_GetWindowScriptNPObject,
441                        OnGetWindowScriptNPObject)
442    IPC_MESSAGE_HANDLER(PluginHostMsg_GetPluginElement, OnGetPluginElement)
443    IPC_MESSAGE_HANDLER(PluginHostMsg_ResolveProxy, OnResolveProxy)
444    IPC_MESSAGE_HANDLER(PluginHostMsg_SetCookie, OnSetCookie)
445    IPC_MESSAGE_HANDLER(PluginHostMsg_GetCookies, OnGetCookies)
446    IPC_MESSAGE_HANDLER(PluginHostMsg_URLRequest, OnHandleURLRequest)
447    IPC_MESSAGE_HANDLER(PluginHostMsg_CancelDocumentLoad, OnCancelDocumentLoad)
448    IPC_MESSAGE_HANDLER(PluginHostMsg_InitiateHTTPRangeRequest,
449                        OnInitiateHTTPRangeRequest)
450    IPC_MESSAGE_HANDLER(PluginHostMsg_DidStartLoading, OnDidStartLoading)
451    IPC_MESSAGE_HANDLER(PluginHostMsg_DidStopLoading, OnDidStopLoading)
452    IPC_MESSAGE_HANDLER(PluginHostMsg_DeferResourceLoading,
453                        OnDeferResourceLoading)
454    IPC_MESSAGE_HANDLER(PluginHostMsg_URLRedirectResponse,
455                        OnURLRedirectResponse)
456    IPC_MESSAGE_HANDLER(PluginHostMsg_CheckIfRunInsecureContent,
457                        OnCheckIfRunInsecureContent)
458#if defined(OS_WIN)
459    IPC_MESSAGE_HANDLER(PluginHostMsg_SetWindowlessData, OnSetWindowlessData)
460    IPC_MESSAGE_HANDLER(PluginHostMsg_NotifyIMEStatus, OnNotifyIMEStatus)
461#endif
462#if defined(OS_MACOSX)
463    IPC_MESSAGE_HANDLER(PluginHostMsg_FocusChanged,
464                        OnFocusChanged);
465    IPC_MESSAGE_HANDLER(PluginHostMsg_StartIme,
466                        OnStartIme);
467    IPC_MESSAGE_HANDLER(PluginHostMsg_AcceleratedPluginEnabledRendering,
468                        OnAcceleratedPluginEnabledRendering)
469    IPC_MESSAGE_HANDLER(PluginHostMsg_AcceleratedPluginAllocatedIOSurface,
470                        OnAcceleratedPluginAllocatedIOSurface)
471    IPC_MESSAGE_HANDLER(PluginHostMsg_AcceleratedPluginSwappedIOSurface,
472                        OnAcceleratedPluginSwappedIOSurface)
473#endif
474    IPC_MESSAGE_UNHANDLED(handled = false)
475  IPC_END_MESSAGE_MAP()
476  DCHECK(handled);
477  return handled;
478}
479
480void WebPluginDelegateProxy::OnChannelError() {
481  if (plugin_) {
482    if (window_) {
483      // The actual WebPluginDelegate never got a chance to tell the WebPlugin
484      // its window was going away. Do it on its behalf.
485      WillDestroyWindow();
486    }
487    plugin_->Invalidate();
488  }
489  if (channel_host_.get() && !channel_host_->expecting_shutdown()) {
490    render_view_->main_render_frame()->PluginCrashed(
491        info_.path, channel_host_->peer_pid());
492  }
493
494#if defined(OS_MACOSX) || defined(OS_WIN)
495  // Ensure that the renderer doesn't think the plugin still has focus.
496  if (render_view_)
497    render_view_->PluginFocusChanged(false, instance_id_);
498#endif
499}
500
501static void CopyTransportDIBHandleForMessage(
502    const TransportDIB::Handle& handle_in,
503    TransportDIB::Handle* handle_out,
504    base::ProcessId peer_pid) {
505#if defined(OS_MACOSX)
506  // On Mac, TransportDIB::Handle is typedef'ed to FileDescriptor, and
507  // FileDescriptor message fields needs to remain valid until the message is
508  // sent or else the sendmsg() call will fail.
509  if ((handle_out->fd = HANDLE_EINTR(dup(handle_in.fd))) < 0) {
510    PLOG(ERROR) << "dup()";
511    return;
512  }
513  handle_out->auto_close = true;
514#elif defined(OS_WIN)
515  // On Windows we need to duplicate the handle for the plugin process.
516  *handle_out = NULL;
517  BrokerDuplicateHandle(handle_in, peer_pid, handle_out,
518                        FILE_MAP_READ | FILE_MAP_WRITE, 0);
519  DCHECK(*handle_out != NULL);
520#else
521  // Don't need to do anything special for other platforms.
522  *handle_out = handle_in;
523#endif
524}
525
526void WebPluginDelegateProxy::SendUpdateGeometry(
527    bool bitmaps_changed) {
528  if (!channel_host_.get())
529    return;
530
531  PluginMsg_UpdateGeometry_Param param;
532  param.window_rect = plugin_rect_;
533  param.clip_rect = clip_rect_;
534  param.windowless_buffer0 = TransportDIB::DefaultHandleValue();
535  param.windowless_buffer1 = TransportDIB::DefaultHandleValue();
536  param.windowless_buffer_index = back_buffer_index();
537
538#if defined(OS_POSIX)
539  // If we're using POSIX mmap'd TransportDIBs, sending the handle across
540  // IPC establishes a new mapping rather than just sending a window ID,
541  // so only do so if we've actually changed the shared memory bitmaps.
542  if (bitmaps_changed)
543#endif
544  {
545    if (transport_stores_[0].dib)
546      CopyTransportDIBHandleForMessage(transport_stores_[0].dib->handle(),
547                                       &param.windowless_buffer0,
548                                       channel_host_->peer_pid());
549
550    if (transport_stores_[1].dib)
551      CopyTransportDIBHandleForMessage(transport_stores_[1].dib->handle(),
552                                       &param.windowless_buffer1,
553                                       channel_host_->peer_pid());
554  }
555
556  IPC::Message* msg;
557#if defined(OS_WIN)
558  if (UseSynchronousGeometryUpdates()) {
559    msg = new PluginMsg_UpdateGeometrySync(instance_id_, param);
560  } else  // NOLINT
561#endif
562  {
563    msg = new PluginMsg_UpdateGeometry(instance_id_, param);
564    msg->set_unblock(true);
565  }
566
567  Send(msg);
568}
569
570void WebPluginDelegateProxy::UpdateGeometry(const gfx::Rect& window_rect,
571                                            const gfx::Rect& clip_rect) {
572  // window_rect becomes either a window in native windowing system
573  // coords, or a backing buffer.  In either case things will go bad
574  // if the rectangle is very large.
575  if (window_rect.width() < 0  || window_rect.width() > kMaxPluginSideLength ||
576      window_rect.height() < 0 || window_rect.height() > kMaxPluginSideLength ||
577      // We know this won't overflow due to above checks.
578      static_cast<uint32>(window_rect.width()) *
579          static_cast<uint32>(window_rect.height()) > kMaxPluginSize) {
580    return;
581  }
582
583  plugin_rect_ = window_rect;
584  clip_rect_ = clip_rect;
585
586  bool bitmaps_changed = false;
587
588  if (uses_shared_bitmaps_) {
589    if (!front_buffer_canvas() ||
590        (window_rect.width() != front_buffer_canvas()->getDevice()->width() ||
591         window_rect.height() != front_buffer_canvas()->getDevice()->height()))
592    {
593      bitmaps_changed = true;
594
595      // Create a shared memory section that the plugin paints into
596      // asynchronously.
597      ResetWindowlessBitmaps();
598      if (!window_rect.IsEmpty()) {
599        if (!CreateSharedBitmap(&transport_stores_[0].dib,
600                                &transport_stores_[0].canvas) ||
601            !CreateSharedBitmap(&transport_stores_[1].dib,
602                                &transport_stores_[1].canvas)) {
603          DCHECK(false);
604          ResetWindowlessBitmaps();
605          return;
606        }
607      }
608    }
609  }
610
611  SendUpdateGeometry(bitmaps_changed);
612}
613
614void WebPluginDelegateProxy::ResetWindowlessBitmaps() {
615  transport_stores_[0].dib.reset();
616  transport_stores_[1].dib.reset();
617
618  transport_stores_[0].canvas.reset();
619  transport_stores_[1].canvas.reset();
620  transport_store_painted_ = gfx::Rect();
621  front_buffer_diff_ = gfx::Rect();
622}
623
624static size_t BitmapSizeForPluginRect(const gfx::Rect& plugin_rect) {
625  const size_t stride =
626      skia::PlatformCanvasStrideForWidth(plugin_rect.width());
627  return stride * plugin_rect.height();
628}
629
630#if !defined(OS_WIN)
631bool WebPluginDelegateProxy::CreateLocalBitmap(
632    std::vector<uint8>* memory,
633    scoped_ptr<skia::PlatformCanvas>* canvas) {
634  const size_t size = BitmapSizeForPluginRect(plugin_rect_);
635  memory->resize(size);
636  if (memory->size() != size)
637    return false;
638  canvas->reset(skia::CreatePlatformCanvas(
639      plugin_rect_.width(), plugin_rect_.height(), true, &((*memory)[0]),
640      skia::CRASH_ON_FAILURE));
641  return true;
642}
643#endif
644
645bool WebPluginDelegateProxy::CreateSharedBitmap(
646    scoped_ptr<TransportDIB>* memory,
647    scoped_ptr<skia::PlatformCanvas>* canvas) {
648  const size_t size = BitmapSizeForPluginRect(plugin_rect_);
649#if defined(OS_POSIX) && !defined(OS_MACOSX)
650  memory->reset(TransportDIB::Create(size, 0));
651  if (!memory->get())
652    return false;
653#endif
654#if defined(OS_POSIX) && !defined(OS_ANDROID)
655  TransportDIB::Handle handle;
656  IPC::Message* msg = new ViewHostMsg_AllocTransportDIB(size, false, &handle);
657  if (!RenderThreadImpl::current()->Send(msg))
658    return false;
659  if (handle.fd < 0)
660    return false;
661  memory->reset(TransportDIB::Map(handle));
662#else
663  static uint32 sequence_number = 0;
664  memory->reset(TransportDIB::Create(size, sequence_number++));
665#endif
666  canvas->reset((*memory)->GetPlatformCanvas(plugin_rect_.width(),
667                                             plugin_rect_.height()));
668  return !!canvas->get();
669}
670
671void WebPluginDelegateProxy::Paint(SkCanvas* canvas,
672                                   const gfx::Rect& damaged_rect) {
673  // Limit the damaged rectangle to whatever is contained inside the plugin
674  // rectangle, as that's the rectangle that we'll actually draw.
675  gfx::Rect rect = gfx::IntersectRects(damaged_rect, plugin_rect_);
676
677  // If the plugin is no longer connected (channel crashed) draw a crashed
678  // plugin bitmap
679  if (!channel_host_.get() || !channel_host_->channel_valid()) {
680    // Lazily load the sad plugin image.
681    if (!sad_plugin_)
682      sad_plugin_ = GetContentClient()->renderer()->GetSadPluginBitmap();
683    if (sad_plugin_)
684      PaintSadPlugin(canvas, plugin_rect_, *sad_plugin_);
685    return;
686  }
687
688  if (!uses_shared_bitmaps_)
689    return;
690
691  // We got a paint before the plugin's coordinates, so there's no buffer to
692  // copy from.
693  if (!front_buffer_canvas())
694    return;
695
696  gfx::Rect offset_rect = rect;
697  offset_rect.Offset(-plugin_rect_.x(), -plugin_rect_.y());
698
699  // transport_store_painted_ is really a bounding box, so in principle this
700  // check could falsely indicate that we don't need to paint offset_rect, but
701  // in practice it works fine.
702  if (!transport_store_painted_.Contains(offset_rect)) {
703    Send(new PluginMsg_Paint(instance_id_, offset_rect));
704    // Since the plugin is not blocked on the renderer in this context, there is
705    // a chance that it will begin repainting the back-buffer before we complete
706    // capturing the data. Buffer flipping would increase that risk because
707    // geometry update is asynchronous, so we don't want to use buffer flipping
708    // here.
709    UpdateFrontBuffer(offset_rect, false);
710  }
711
712  const SkBitmap& bitmap =
713      front_buffer_canvas()->getDevice()->accessBitmap(false);
714  SkPaint paint;
715  paint.setXfermodeMode(
716      transparent_ ? SkXfermode::kSrcATop_Mode : SkXfermode::kSrc_Mode);
717  SkIRect src_rect = gfx::RectToSkIRect(offset_rect);
718  canvas->drawBitmapRect(bitmap,
719                         &src_rect,
720                         gfx::RectToSkRect(rect),
721                         &paint);
722
723  if (invalidate_pending_) {
724    // Only send the PaintAck message if this paint is in response to an
725    // invalidate from the plugin, since this message acts as an access token
726    // to ensure only one process is using the transport dib at a time.
727    invalidate_pending_ = false;
728    Send(new PluginMsg_DidPaint(instance_id_));
729  }
730}
731
732NPObject* WebPluginDelegateProxy::GetPluginScriptableObject() {
733  if (npobject_)
734    return WebBindings::retainObject(npobject_);
735
736  if (!channel_host_.get())
737    return NULL;
738
739  int route_id = MSG_ROUTING_NONE;
740  Send(new PluginMsg_GetPluginScriptableObject(instance_id_, &route_id));
741  if (route_id == MSG_ROUTING_NONE)
742    return NULL;
743
744  npobject_ = NPObjectProxy::Create(
745      channel_host_.get(), route_id, 0, page_url_, GetPluginNPP());
746
747  return WebBindings::retainObject(npobject_);
748}
749
750NPP WebPluginDelegateProxy::GetPluginNPP() {
751  // Return a dummy NPP for WebKit to use to identify this plugin.
752  return npp_.get();
753}
754
755bool WebPluginDelegateProxy::GetFormValue(base::string16* value) {
756  bool success = false;
757  Send(new PluginMsg_GetFormValue(instance_id_, value, &success));
758  return success;
759}
760
761void WebPluginDelegateProxy::DidFinishLoadWithReason(
762    const GURL& url, NPReason reason, int notify_id) {
763  Send(new PluginMsg_DidFinishLoadWithReason(
764      instance_id_, url, reason, notify_id));
765}
766
767void WebPluginDelegateProxy::SetFocus(bool focused) {
768  Send(new PluginMsg_SetFocus(instance_id_, focused));
769#if defined(OS_WIN)
770  if (render_view_)
771    render_view_->PluginFocusChanged(focused, instance_id_);
772#endif
773}
774
775bool WebPluginDelegateProxy::HandleInputEvent(
776    const WebInputEvent& event,
777    WebCursor::CursorInfo* cursor_info) {
778  bool handled = false;
779  WebCursor cursor;
780  // A windowless plugin can enter a modal loop in the context of a
781  // NPP_HandleEvent call, in which case we need to pump messages to
782  // the plugin. We pass of the corresponding event handle to the
783  // plugin process, which is set if the plugin does enter a modal loop.
784  IPC::SyncMessage* message = new PluginMsg_HandleInputEvent(
785      instance_id_, &event, &handled, &cursor);
786  message->set_pump_messages_event(modal_loop_pump_messages_event_.get());
787  Send(message);
788  return handled;
789}
790
791int WebPluginDelegateProxy::GetProcessId() {
792  return channel_host_->peer_pid();
793}
794
795void WebPluginDelegateProxy::SetContentAreaFocus(bool has_focus) {
796  IPC::Message* msg = new PluginMsg_SetContentAreaFocus(instance_id_,
797                                                        has_focus);
798  // Make sure focus events are delivered in the right order relative to
799  // sync messages they might interact with (Paint, HandleEvent, etc.).
800  msg->set_unblock(true);
801  Send(msg);
802}
803
804#if defined(OS_WIN)
805void WebPluginDelegateProxy::ImeCompositionUpdated(
806    const base::string16& text,
807    const std::vector<int>& clauses,
808    const std::vector<int>& target,
809    int cursor_position,
810    int plugin_id) {
811  // Dispatch the raw IME data if this plug-in is the focused one.
812  if (instance_id_ != plugin_id)
813    return;
814
815  IPC::Message* msg = new PluginMsg_ImeCompositionUpdated(instance_id_,
816      text, clauses, target, cursor_position);
817  msg->set_unblock(true);
818  Send(msg);
819}
820
821void WebPluginDelegateProxy::ImeCompositionCompleted(const base::string16& text,
822                                                     int plugin_id) {
823  // Dispatch the IME text if this plug-in is the focused one.
824  if (instance_id_ != plugin_id)
825    return;
826
827  IPC::Message* msg = new PluginMsg_ImeCompositionCompleted(instance_id_, text);
828  msg->set_unblock(true);
829  Send(msg);
830}
831#endif
832
833#if defined(OS_MACOSX)
834void WebPluginDelegateProxy::SetWindowFocus(bool window_has_focus) {
835  IPC::Message* msg = new PluginMsg_SetWindowFocus(instance_id_,
836                                                   window_has_focus);
837  // Make sure focus events are delivered in the right order relative to
838  // sync messages they might interact with (Paint, HandleEvent, etc.).
839  msg->set_unblock(true);
840  Send(msg);
841}
842
843void WebPluginDelegateProxy::SetContainerVisibility(bool is_visible) {
844  IPC::Message* msg;
845  if (is_visible) {
846    gfx::Rect window_frame = render_view_->rootWindowRect();
847    gfx::Rect view_frame = render_view_->windowRect();
848    blink::WebView* webview = render_view_->webview();
849    msg = new PluginMsg_ContainerShown(instance_id_, window_frame, view_frame,
850                                       webview && webview->isActive());
851  } else {
852    msg = new PluginMsg_ContainerHidden(instance_id_);
853  }
854  // Make sure visibility events are delivered in the right order relative to
855  // sync messages they might interact with (Paint, HandleEvent, etc.).
856  msg->set_unblock(true);
857  Send(msg);
858}
859
860void WebPluginDelegateProxy::WindowFrameChanged(gfx::Rect window_frame,
861                                                gfx::Rect view_frame) {
862  IPC::Message* msg = new PluginMsg_WindowFrameChanged(instance_id_,
863                                                       window_frame,
864                                                       view_frame);
865  // Make sure frame events are delivered in the right order relative to
866  // sync messages they might interact with (e.g., HandleEvent).
867  msg->set_unblock(true);
868  Send(msg);
869}
870void WebPluginDelegateProxy::ImeCompositionCompleted(const base::string16& text,
871                                                     int plugin_id) {
872  // If the message isn't intended for this plugin, there's nothing to do.
873  if (instance_id_ != plugin_id)
874    return;
875
876  IPC::Message* msg = new PluginMsg_ImeCompositionCompleted(instance_id_,
877                                                            text);
878  // Order relative to other key events is important.
879  msg->set_unblock(true);
880  Send(msg);
881}
882#endif  // OS_MACOSX
883
884void WebPluginDelegateProxy::OnSetWindow(gfx::PluginWindowHandle window) {
885#if defined(OS_MACOSX)
886  uses_shared_bitmaps_ = !window && !uses_compositor_;
887#else
888  uses_shared_bitmaps_ = !window;
889#endif
890  window_ = window;
891  if (plugin_)
892    plugin_->SetWindow(window);
893}
894
895void WebPluginDelegateProxy::WillDestroyWindow() {
896  DCHECK(window_);
897  plugin_->WillDestroyWindow(window_);
898  window_ = gfx::kNullPluginWindow;
899}
900
901#if defined(OS_WIN)
902void WebPluginDelegateProxy::OnSetWindowlessData(
903      HANDLE modal_loop_pump_messages_event,
904      gfx::NativeViewId dummy_activation_window) {
905  DCHECK(modal_loop_pump_messages_event_ == NULL);
906  DCHECK(dummy_activation_window_ == NULL);
907
908  dummy_activation_window_ = dummy_activation_window;
909  render_view_->Send(new ViewHostMsg_WindowlessPluginDummyWindowCreated(
910      render_view_->routing_id(), dummy_activation_window_));
911
912  // Bug 25583: this can be null because some "virus scanners" block the
913  // DuplicateHandle call in the plugin process.
914  if (!modal_loop_pump_messages_event)
915    return;
916
917  modal_loop_pump_messages_event_.reset(
918      new base::WaitableEvent(modal_loop_pump_messages_event));
919}
920
921void WebPluginDelegateProxy::OnNotifyIMEStatus(int input_type,
922                                               const gfx::Rect& caret_rect) {
923  if (!render_view_)
924    return;
925
926  ViewHostMsg_TextInputState_Params p;
927  p.type = static_cast<ui::TextInputType>(input_type);
928  p.mode = ui::TEXT_INPUT_MODE_DEFAULT;
929  p.can_compose_inline = true;
930
931  render_view_->Send(new ViewHostMsg_TextInputStateChanged(
932      render_view_->routing_id(), p));
933
934  ViewHostMsg_SelectionBounds_Params bounds_params;
935  bounds_params.anchor_rect = bounds_params.focus_rect = caret_rect;
936  bounds_params.anchor_dir = bounds_params.focus_dir =
937      blink::WebTextDirectionLeftToRight;
938  bounds_params.is_anchor_first = true;
939  render_view_->Send(new ViewHostMsg_SelectionBoundsChanged(
940      render_view_->routing_id(),
941      bounds_params));
942}
943#endif
944
945void WebPluginDelegateProxy::OnCancelResource(int id) {
946  if (plugin_)
947    plugin_->CancelResource(id);
948}
949
950void WebPluginDelegateProxy::OnInvalidateRect(const gfx::Rect& rect) {
951  if (!plugin_)
952    return;
953
954  // Clip the invalidation rect to the plugin bounds; the plugin may have been
955  // resized since the invalidate message was sent.
956  gfx::Rect clipped_rect =
957      gfx::IntersectRects(rect, gfx::Rect(plugin_rect_.size()));
958
959  invalidate_pending_ = true;
960  // The plugin is blocked on the renderer because the invalidate message it has
961  // sent us is synchronous, so we can use buffer flipping here if the caller
962  // allows it.
963  UpdateFrontBuffer(clipped_rect, true);
964  plugin_->InvalidateRect(clipped_rect);
965}
966
967void WebPluginDelegateProxy::OnGetWindowScriptNPObject(
968    int route_id, bool* success) {
969  *success = false;
970  NPObject* npobject = NULL;
971  if (plugin_)
972    npobject = plugin_->GetWindowScriptNPObject();
973
974  if (!npobject)
975    return;
976
977  // The stub will delete itself when the proxy tells it that it's released, or
978  // otherwise when the channel is closed.
979  new NPObjectStub(npobject, channel_host_.get(), route_id, 0, page_url_);
980  *success = true;
981}
982
983void WebPluginDelegateProxy::OnResolveProxy(const GURL& url,
984                                            bool* result,
985                                            std::string* proxy_list) {
986  *result = RenderThreadImpl::current()->ResolveProxy(url, proxy_list);
987}
988
989void WebPluginDelegateProxy::OnGetPluginElement(int route_id, bool* success) {
990  *success = false;
991  NPObject* npobject = NULL;
992  if (plugin_)
993    npobject = plugin_->GetPluginElement();
994  if (!npobject)
995    return;
996
997  // The stub will delete itself when the proxy tells it that it's released, or
998  // otherwise when the channel is closed.
999  new NPObjectStub(
1000      npobject, channel_host_.get(), route_id, 0, page_url_);
1001  *success = true;
1002}
1003
1004void WebPluginDelegateProxy::OnSetCookie(const GURL& url,
1005                                         const GURL& first_party_for_cookies,
1006                                         const std::string& cookie) {
1007  if (plugin_)
1008    plugin_->SetCookie(url, first_party_for_cookies, cookie);
1009}
1010
1011void WebPluginDelegateProxy::OnGetCookies(const GURL& url,
1012                                          const GURL& first_party_for_cookies,
1013                                          std::string* cookies) {
1014  DCHECK(cookies);
1015  if (plugin_)
1016    *cookies = plugin_->GetCookies(url, first_party_for_cookies);
1017}
1018
1019void WebPluginDelegateProxy::CopyFromBackBufferToFrontBuffer(
1020    const gfx::Rect& rect) {
1021#if defined(OS_MACOSX)
1022  // Blitting the bits directly is much faster than going through CG, and since
1023  // the goal is just to move the raw pixels between two bitmaps with the same
1024  // pixel format (no compositing, color correction, etc.), it's safe.
1025  const size_t stride =
1026      skia::PlatformCanvasStrideForWidth(plugin_rect_.width());
1027  const size_t chunk_size = 4 * rect.width();
1028  DCHECK(back_buffer_dib() != NULL);
1029  uint8* source_data = static_cast<uint8*>(back_buffer_dib()->memory()) +
1030                       rect.y() * stride + 4 * rect.x();
1031  DCHECK(front_buffer_dib() != NULL);
1032  uint8* target_data = static_cast<uint8*>(front_buffer_dib()->memory()) +
1033                       rect.y() * stride + 4 * rect.x();
1034  for (int row = 0; row < rect.height(); ++row) {
1035    memcpy(target_data, source_data, chunk_size);
1036    source_data += stride;
1037    target_data += stride;
1038  }
1039#else
1040  BlitCanvasToCanvas(front_buffer_canvas(),
1041                     rect,
1042                     back_buffer_canvas(),
1043                     rect.origin());
1044#endif
1045}
1046
1047void WebPluginDelegateProxy::UpdateFrontBuffer(
1048    const gfx::Rect& rect,
1049    bool allow_buffer_flipping) {
1050  if (!front_buffer_canvas()) {
1051    return;
1052  }
1053
1054#if defined(OS_WIN)
1055  // If SendUpdateGeometry() would block on the plugin process then we don't
1056  // want to use buffer flipping at all since it would add extra locking.
1057  // (Alternatively we could probably safely use async updates for buffer
1058  // flipping all the time since the size is not changing.)
1059  if (UseSynchronousGeometryUpdates()) {
1060    allow_buffer_flipping = false;
1061  }
1062#endif
1063
1064  // Plugin has just painted "rect" into the back-buffer, so the front-buffer
1065  // no longer holds the latest content for that rectangle.
1066  front_buffer_diff_.Subtract(rect);
1067  if (allow_buffer_flipping && front_buffer_diff_.IsEmpty()) {
1068    // Back-buffer contains the latest content for all areas; simply flip
1069    // the buffers.
1070    front_buffer_index_ = back_buffer_index();
1071    SendUpdateGeometry(false);
1072    // The front-buffer now holds newer content for this region than the
1073    // back-buffer.
1074    front_buffer_diff_ = rect;
1075  } else {
1076    // Back-buffer contains the latest content for "rect" but the front-buffer
1077    // contains the latest content for some other areas (or buffer flipping not
1078    // allowed); fall back to copying the data.
1079    CopyFromBackBufferToFrontBuffer(rect);
1080  }
1081  transport_store_painted_.Union(rect);
1082}
1083
1084void WebPluginDelegateProxy::OnHandleURLRequest(
1085    const PluginHostMsg_URLRequest_Params& params) {
1086  const char* data = NULL;
1087  if (params.buffer.size())
1088    data = &params.buffer[0];
1089
1090  const char* target = NULL;
1091  if (params.target.length())
1092    target = params.target.c_str();
1093
1094  plugin_->HandleURLRequest(
1095      params.url.c_str(), params.method.c_str(), target, data,
1096      static_cast<unsigned int>(params.buffer.size()), params.notify_id,
1097      params.popups_allowed, params.notify_redirects);
1098}
1099
1100WebPluginResourceClient* WebPluginDelegateProxy::CreateResourceClient(
1101    unsigned long resource_id, const GURL& url, int notify_id) {
1102  if (!channel_host_.get())
1103    return NULL;
1104
1105  ResourceClientProxy* proxy =
1106      new ResourceClientProxy(channel_host_.get(), instance_id_);
1107  proxy->Initialize(resource_id, url, notify_id);
1108  return proxy;
1109}
1110
1111WebPluginResourceClient* WebPluginDelegateProxy::CreateSeekableResourceClient(
1112    unsigned long resource_id, int range_request_id) {
1113  if (!channel_host_.get())
1114    return NULL;
1115
1116  ResourceClientProxy* proxy =
1117      new ResourceClientProxy(channel_host_.get(), instance_id_);
1118  proxy->InitializeForSeekableStream(resource_id, range_request_id);
1119  return proxy;
1120}
1121
1122void WebPluginDelegateProxy::FetchURL(unsigned long resource_id,
1123                                      int notify_id,
1124                                      const GURL& url,
1125                                      const GURL& first_party_for_cookies,
1126                                      const std::string& method,
1127                                      const char* buf,
1128                                      unsigned int len,
1129                                      const GURL& referrer,
1130                                      bool notify_redirects,
1131                                      bool is_plugin_src_load,
1132                                      int origin_pid,
1133                                      int render_frame_id,
1134                                      int render_view_id) {
1135  PluginMsg_FetchURL_Params params;
1136  params.resource_id = resource_id;
1137  params.notify_id = notify_id;
1138  params.url = url;
1139  params.first_party_for_cookies = first_party_for_cookies;
1140  params.method = method;
1141  if (len) {
1142    params.post_data.resize(len);
1143    memcpy(&params.post_data.front(), buf, len);
1144  }
1145  params.referrer = referrer;
1146  params.notify_redirect = notify_redirects;
1147  params.is_plugin_src_load = is_plugin_src_load;
1148  params.render_frame_id = render_frame_id;
1149  Send(new PluginMsg_FetchURL(instance_id_, params));
1150}
1151
1152#if defined(OS_MACOSX)
1153void WebPluginDelegateProxy::OnFocusChanged(bool focused) {
1154  if (render_view_)
1155    render_view_->PluginFocusChanged(focused, instance_id_);
1156}
1157
1158void WebPluginDelegateProxy::OnStartIme() {
1159  if (render_view_)
1160    render_view_->StartPluginIme();
1161}
1162#endif
1163
1164gfx::PluginWindowHandle WebPluginDelegateProxy::GetPluginWindowHandle() {
1165  return window_;
1166}
1167
1168void WebPluginDelegateProxy::OnCancelDocumentLoad() {
1169  plugin_->CancelDocumentLoad();
1170}
1171
1172void WebPluginDelegateProxy::OnInitiateHTTPRangeRequest(
1173    const std::string& url,
1174    const std::string& range_info,
1175    int range_request_id) {
1176  plugin_->InitiateHTTPRangeRequest(
1177      url.c_str(), range_info.c_str(), range_request_id);
1178}
1179
1180void WebPluginDelegateProxy::OnDidStartLoading() {
1181  plugin_->DidStartLoading();
1182}
1183
1184void WebPluginDelegateProxy::OnDidStopLoading() {
1185  plugin_->DidStopLoading();
1186}
1187
1188void WebPluginDelegateProxy::OnDeferResourceLoading(unsigned long resource_id,
1189                                                    bool defer) {
1190  plugin_->SetDeferResourceLoading(resource_id, defer);
1191}
1192
1193#if defined(OS_MACOSX)
1194void WebPluginDelegateProxy::OnAcceleratedPluginEnabledRendering() {
1195  uses_compositor_ = true;
1196  OnSetWindow(gfx::kNullPluginWindow);
1197}
1198
1199void WebPluginDelegateProxy::OnAcceleratedPluginAllocatedIOSurface(
1200    int32 width,
1201    int32 height,
1202    uint32 surface_id) {
1203  if (plugin_)
1204    plugin_->AcceleratedPluginAllocatedIOSurface(width, height, surface_id);
1205}
1206
1207void WebPluginDelegateProxy::OnAcceleratedPluginSwappedIOSurface() {
1208  if (plugin_)
1209    plugin_->AcceleratedPluginSwappedIOSurface();
1210}
1211#endif
1212
1213#if defined(OS_WIN)
1214bool WebPluginDelegateProxy::UseSynchronousGeometryUpdates() {
1215  // Need to update geometry synchronously with WMP, otherwise if a site
1216  // scripts the plugin to start playing while it's in the middle of handling
1217  // an update geometry message, videos don't play.  See urls in bug 20260.
1218  if (info_.name.find(base::ASCIIToUTF16("Windows Media Player")) !=
1219      base::string16::npos)
1220    return true;
1221
1222  // The move networks plugin needs to be informed of geometry updates
1223  // synchronously.
1224  std::vector<WebPluginMimeType>::iterator index;
1225  for (index = info_.mime_types.begin(); index != info_.mime_types.end();
1226       index++) {
1227    if (index->mime_type == "application/x-vnd.moveplayer.qm" ||
1228        index->mime_type == "application/x-vnd.moveplay2.qm" ||
1229        index->mime_type == "application/x-vnd.movenetworks.qm" ||
1230        index->mime_type == "application/x-vnd.mnplayer.qm") {
1231      return true;
1232    }
1233  }
1234  return false;
1235}
1236#endif
1237
1238void WebPluginDelegateProxy::OnURLRedirectResponse(bool allow,
1239                                                   int resource_id) {
1240  if (!plugin_)
1241    return;
1242
1243  plugin_->URLRedirectResponse(allow, resource_id);
1244}
1245
1246void WebPluginDelegateProxy::OnCheckIfRunInsecureContent(const GURL& url,
1247                                                         bool* result) {
1248  *result = plugin_->CheckIfRunInsecureContent(url);
1249}
1250
1251}  // namespace content
1252