Index: extensions/renderer/script_injection.cc |
diff --git a/extensions/renderer/script_injection.cc b/extensions/renderer/script_injection.cc |
index 4db534a1f68c1934127ec61a5617c701d28aa40b..02a6eec957c43d742828bfcde3a6fd3fec8a1112 100644 |
--- a/extensions/renderer/script_injection.cc |
+++ b/extensions/renderer/script_injection.cc |
@@ -9,6 +9,7 @@ |
#include "base/lazy_instance.h" |
#include "base/metrics/histogram.h" |
#include "content/public/common/url_constants.h" |
+#include "content/public/renderer/render_view.h" |
#include "extensions/common/extension.h" |
#include "extensions/common/extension_messages.h" |
#include "extensions/common/permissions/permissions_data.h" |
@@ -20,6 +21,7 @@ |
#include "third_party/WebKit/public/web/WebDocument.h" |
#include "third_party/WebKit/public/web/WebFrame.h" |
#include "third_party/WebKit/public/web/WebScriptSource.h" |
+#include "third_party/WebKit/public/web/WebView.h" |
#include "ui/base/resource/resource_bundle.h" |
#include "url/gurl.h" |
@@ -27,6 +29,9 @@ namespace extensions { |
namespace { |
+// The id of the next pending injection. |
+int64 g_next_pending_id = 0; |
+ |
// These two strings are injected before and after the Greasemonkey API and |
// user script to wrap it in an anonymous scope. |
const char kUserScriptHead[] = "(function (unsafeWindow) {\n"; |
@@ -57,6 +62,42 @@ ScriptInjection::ScriptsRunInfo::ScriptsRunInfo() : num_css(0u), num_js(0u) { |
ScriptInjection::ScriptsRunInfo::~ScriptsRunInfo() { |
} |
+struct ScriptInjection::PendingInjection { |
+ PendingInjection(blink::WebFrame* web_frame, |
+ UserScript::RunLocation run_location, |
+ int page_id); |
+ ~PendingInjection(); |
+ |
+ // The globally-unique id of this request. |
+ int64 id; |
+ |
+ // The pointer to the web frame into which the script should be injected. |
+ // This is weak, but safe because we remove pending requests when a frame is |
+ // terminated. |
+ blink::WebFrame* web_frame; |
+ |
+ // The run location to inject at. |
+ // Note: This could be a lie - we might inject well after this run location |
+ // has come and gone. But we need to know it to know which scripts to inject. |
+ UserScript::RunLocation run_location; |
+ |
+ // The corresponding page id, to protect against races. |
+ int page_id; |
+}; |
+ |
+ScriptInjection::PendingInjection::PendingInjection( |
+ blink::WebFrame* web_frame, |
+ UserScript::RunLocation run_location, |
+ int page_id) |
+ : id(g_next_pending_id++), |
+ web_frame(web_frame), |
+ run_location(run_location), |
+ page_id(page_id) { |
+} |
+ |
+ScriptInjection::PendingInjection::~PendingInjection() { |
+} |
+ |
// static |
GURL ScriptInjection::GetDocumentUrlForFrame(blink::WebFrame* frame) { |
GURL data_source_url = ScriptContext::GetDataSourceURLForFrame(frame); |
@@ -81,6 +122,90 @@ ScriptInjection::ScriptInjection( |
ScriptInjection::~ScriptInjection() { |
} |
+void ScriptInjection::InjectIfAllowed(blink::WebFrame* frame, |
+ UserScript::RunLocation run_location, |
+ const GURL& document_url, |
+ ScriptsRunInfo* scripts_run_info) { |
+ if (!WantsToRun(frame, run_location, document_url)) |
+ return; |
+ |
+ const Extension* extension = user_script_slave_->GetExtension(extension_id_); |
+ CHECK(extension); // WantsToRun() should be false if there's no extension. |
+ |
+ if (PermissionsData::RequiresActionForScriptExecution(extension)) { |
+ // We use the top render view here (instead of the render view for the |
+ // frame), because script injection on any frame requires permission for |
+ // the top frame. Additionally, if we have to show any UI for permissions, |
+ // it should only be done on the top frame. |
+ content::RenderView* top_render_view = |
+ content::RenderView::FromWebView(frame->top()->view()); |
+ int page_id = top_render_view->GetPageId(); |
+ ScopedVector<PendingInjection>::iterator pending_injection = |
+ pending_injections_.insert( |
+ pending_injections_.end(), |
+ new PendingInjection(frame, run_location, page_id)); |
+ |
+ top_render_view->Send( |
+ new ExtensionHostMsg_RequestContentScriptPermission( |
+ top_render_view->GetRoutingID(), |
+ extension->id(), |
+ page_id, |
+ (*pending_injection)->id)); |
+ } else { |
+ Inject(frame, run_location, scripts_run_info); |
+ } |
+} |
+ |
+bool ScriptInjection::NotifyScriptPermitted( |
+ int64 request_id, |
+ content::RenderView* render_view, |
+ ScriptsRunInfo* scripts_run_info, |
+ blink::WebFrame** frame_out) { |
+ if (!render_view) |
+ return false; |
+ |
+ ScopedVector<PendingInjection>::iterator iter = pending_injections_.begin(); |
+ while (iter != pending_injections_.end() && (*iter)->id != request_id) |
+ ++iter; |
+ |
+ // No matching request. |
+ if (iter == pending_injections_.end()) |
+ return false; |
+ |
+ // We found the request, so pull it out of the pending list. |
+ scoped_ptr<PendingInjection> pending_injection(*iter); |
+ pending_injections_.weak_erase(iter); |
+ |
+ // Ensure the Page ID and Extension are still valid. Otherwise, don't inject. |
+ if (render_view->GetPageId() != pending_injection->page_id) |
+ return false; |
+ |
+ const Extension* extension = user_script_slave_->GetExtension(extension_id_); |
+ if (!extension) |
+ return false; |
+ |
+ // Everything matches! Inject the script. |
+ if (frame_out) |
+ *frame_out = pending_injection->web_frame; |
+ Inject(pending_injection->web_frame, |
+ pending_injection->run_location, |
+ scripts_run_info); |
+ return true; |
+} |
+ |
+void ScriptInjection::FrameDetached(blink::WebFrame* frame) { |
+ // Any pending injections associated with the given frame will never run. |
+ // Remove them. |
+ for (ScopedVector<PendingInjection>::iterator iter = |
+ pending_injections_.begin(); |
+ iter != pending_injections_.end();) { |
+ if ((*iter)->web_frame == frame) |
+ pending_injections_.erase(iter); |
+ else |
+ ++iter; |
+ } |
+} |
+ |
bool ScriptInjection::WantsToRun(blink::WebFrame* frame, |
UserScript::RunLocation run_location, |
const GURL& document_url) const { |