Index: chrome/renderer/extensions/dispatcher.cc |
diff --git a/chrome/renderer/extensions/dispatcher.cc b/chrome/renderer/extensions/dispatcher.cc |
index dbb84d411f11c8a37b00d280d25afd3cce459e8d..51d68af6cc5008357d0b152589cea4afd02f2281 100644 |
--- a/chrome/renderer/extensions/dispatcher.cc |
+++ b/chrome/renderer/extensions/dispatcher.cc |
@@ -47,15 +47,11 @@ |
#include "chrome/renderer/extensions/logging_native_handler.h" |
#include "chrome/renderer/extensions/media_galleries_custom_bindings.h" |
#include "chrome/renderer/extensions/messaging_bindings.h" |
-#include "chrome/renderer/extensions/module_system.h" |
-#include "chrome/renderer/extensions/object_backed_native_handler.h" |
#include "chrome/renderer/extensions/page_actions_custom_bindings.h" |
#include "chrome/renderer/extensions/page_capture_custom_bindings.h" |
#include "chrome/renderer/extensions/pepper_request_natives.h" |
#include "chrome/renderer/extensions/render_view_observer_natives.h" |
-#include "chrome/renderer/extensions/request_sender.h" |
#include "chrome/renderer/extensions/runtime_custom_bindings.h" |
-#include "chrome/renderer/extensions/safe_builtins.h" |
#include "chrome/renderer/extensions/send_request_natives.h" |
#include "chrome/renderer/extensions/set_icon_natives.h" |
#include "chrome/renderer/extensions/sync_file_system_custom_bindings.h" |
@@ -85,6 +81,11 @@ |
#include "extensions/common/permissions/permissions_data.h" |
#include "extensions/common/switches.h" |
#include "extensions/common/view_type.h" |
+#include "extensions/renderer/module_system.h" |
+#include "extensions/renderer/object_backed_native_handler.h" |
+#include "extensions/renderer/request_sender.h" |
+#include "extensions/renderer/safe_builtins.h" |
+#include "extensions/renderer/script_context.h" |
#include "grit/common_resources.h" |
#include "grit/renderer_resources.h" |
#include "third_party/WebKit/public/platform/WebString.h" |
@@ -133,7 +134,7 @@ static const char kOnSuspendCanceledEvent[] = "runtime.onSuspendCanceled"; |
// |
// Note that this isn't necessarily an object, since webpages can write, for |
// example, "window.chrome = true". |
-v8::Handle<v8::Value> GetOrCreateChrome(ChromeV8Context* context) { |
+v8::Handle<v8::Value> GetOrCreateChrome(ScriptContext* context) { |
v8::Handle<v8::String> chrome_string( |
v8::String::NewFromUtf8(context->isolate(), "chrome")); |
v8::Handle<v8::Object> global(context->v8_context()->Global()); |
@@ -1131,11 +1132,11 @@ void Dispatcher::DidCreateScriptContext( |
extension_id = ""; |
} |
- Feature::Context context_type = ClassifyJavaScriptContext( |
- extension, |
- extension_group, |
- UserScriptSlave::GetDataSourceURLForFrame(frame), |
- frame->document().securityOrigin()); |
+ Feature::Context context_type = |
+ ClassifyJavaScriptContext(extension, |
+ extension_group, |
+ ScriptContext::GetDataSourceURLForFrame(frame), |
+ frame->document().securityOrigin()); |
ChromeV8Context* context = |
new ChromeV8Context(v8_context, frame, extension, context_type); |
@@ -1271,7 +1272,7 @@ std::string Dispatcher::GetExtensionID(const WebFrame* frame, int world_id) { |
return std::string(); |
// Extension pages (chrome-extension:// URLs). |
- GURL frame_url = UserScriptSlave::GetDataSourceURLForFrame(frame); |
+ GURL frame_url = ScriptContext::GetDataSourceURLForFrame(frame); |
return extensions_.GetExtensionOrAppIDByURL(frame_url); |
} |
@@ -1606,7 +1607,8 @@ void Dispatcher::OnExtensionResponse(int request_id, |
} |
bool Dispatcher::CheckContextAccessToExtensionAPI( |
- const std::string& function_name, ChromeV8Context* context) const { |
+ const std::string& function_name, |
+ ScriptContext* context) const { |
if (!context) { |
DLOG(ERROR) << "Not in a v8::Context"; |
return false; |
@@ -1621,7 +1623,7 @@ bool Dispatcher::CheckContextAccessToExtensionAPI( |
// Theoretically we could end up with bindings being injected into sandboxed |
// frames, for example content scripts. Don't let them execute API functions. |
blink::WebFrame* frame = context->web_frame(); |
- if (IsSandboxedPage(UserScriptSlave::GetDataSourceURLForFrame(frame))) { |
+ if (IsSandboxedPage(ScriptContext::GetDataSourceURLForFrame(frame))) { |
static const char kMessage[] = |
"%s cannot be used within a sandboxed frame."; |
std::string error_msg = base::StringPrintf(kMessage, function_name.c_str()); |