| Index: chrome/renderer/user_script_slave.cc
|
| ===================================================================
|
| --- chrome/renderer/user_script_slave.cc (revision 50051)
|
| +++ chrome/renderer/user_script_slave.cc (working copy)
|
| @@ -18,8 +18,6 @@
|
| #include "chrome/renderer/extension_groups.h"
|
| #include "chrome/renderer/render_thread.h"
|
| #include "googleurl/src/gurl.h"
|
| -#include "third_party/WebKit/WebKit/chromium/public/WebDocument.h"
|
| -#include "third_party/WebKit/WebKit/chromium/public/WebElement.h"
|
| #include "third_party/WebKit/WebKit/chromium/public/WebFrame.h"
|
|
|
| #include "grit/renderer_resources.h"
|
| @@ -151,19 +149,6 @@
|
| if (!URLPattern::IsValidScheme(frame_url.scheme()))
|
| return true;
|
|
|
| - // Only inject user scripts into documents with an <html> tag as the root
|
| - // element. Note that WebCore fixes up html pages that lack a root HTML
|
| - // element so that they include one. Also, documents like text/plain and
|
| - // image/* are wrapped in a simple HTML document.
|
| - //
|
| - // Basically, this check filters out SVG documents and other types of XML
|
| - // documents.
|
| - if (frame->document().isNull() ||
|
| - frame->document().documentElement().isNull() ||
|
| - !frame->document().documentElement().hasTagName("html")) {
|
| - return true;
|
| - }
|
| -
|
| // Don't inject user scripts into the gallery itself. This prevents
|
| // a user script from removing the "report abuse" link, for example.
|
| if (frame_url.host() == GURL(extension_urls::kGalleryBrowsePrefix).host())
|
|
|