| Index: extensions/renderer/script_injection.cc | 
| diff --git a/extensions/renderer/script_injection.cc b/extensions/renderer/script_injection.cc | 
| index 4db534a1f68c1934127ec61a5617c701d28aa40b..d3113cdabe8f3f951cd1d663e1127a7a72e3d399 100644 | 
| --- a/extensions/renderer/script_injection.cc | 
| +++ b/extensions/renderer/script_injection.cc | 
| @@ -9,17 +9,21 @@ | 
| #include "base/lazy_instance.h" | 
| #include "base/metrics/histogram.h" | 
| #include "content/public/common/url_constants.h" | 
| +#include "content/public/renderer/render_view.h" | 
| #include "extensions/common/extension.h" | 
| #include "extensions/common/extension_messages.h" | 
| +#include "extensions/common/feature_switch.h" | 
| #include "extensions/common/permissions/permissions_data.h" | 
| #include "extensions/renderer/dom_activity_logger.h" | 
| #include "extensions/renderer/extension_groups.h" | 
| +#include "extensions/renderer/extension_helper.h" | 
| #include "extensions/renderer/script_context.h" | 
| #include "extensions/renderer/user_script_slave.h" | 
| #include "grit/renderer_resources.h" | 
| #include "third_party/WebKit/public/web/WebDocument.h" | 
| #include "third_party/WebKit/public/web/WebFrame.h" | 
| #include "third_party/WebKit/public/web/WebScriptSource.h" | 
| +#include "third_party/WebKit/public/web/WebView.h" | 
| #include "ui/base/resource/resource_bundle.h" | 
| #include "url/gurl.h" | 
|  | 
| @@ -27,6 +31,13 @@ namespace extensions { | 
|  | 
| namespace { | 
|  | 
| +// The id of the next pending injection. | 
| +int64 g_next_pending_id = 0; | 
| + | 
| +// The number of an invalid request, which is used if the feature to delay | 
| +// script injection is not enabled. | 
| +const int64 kInvalidRequestId = -1; | 
| + | 
| // These two strings are injected before and after the Greasemonkey API and | 
| // user script to wrap it in an anonymous scope. | 
| const char kUserScriptHead[] = "(function (unsafeWindow) {\n"; | 
| @@ -57,6 +68,42 @@ ScriptInjection::ScriptsRunInfo::ScriptsRunInfo() : num_css(0u), num_js(0u) { | 
| ScriptInjection::ScriptsRunInfo::~ScriptsRunInfo() { | 
| } | 
|  | 
| +struct ScriptInjection::PendingInjection { | 
| +  PendingInjection(blink::WebFrame* web_frame, | 
| +                   UserScript::RunLocation run_location, | 
| +                   int page_id); | 
| +  ~PendingInjection(); | 
| + | 
| +  // The globally-unique id of this request. | 
| +  int64 id; | 
| + | 
| +  // The pointer to the web frame into which the script should be injected. | 
| +  // This is weak, but safe because we remove pending requests when a frame is | 
| +  // terminated. | 
| +  blink::WebFrame* web_frame; | 
| + | 
| +  // The run location to inject at. | 
| +  // Note: This could be a lie - we might inject well after this run location | 
| +  // has come and gone. But we need to know it to know which scripts to inject. | 
| +  UserScript::RunLocation run_location; | 
| + | 
| +  // The corresponding page id, to protect against races. | 
| +  int page_id; | 
| +}; | 
| + | 
| +ScriptInjection::PendingInjection::PendingInjection( | 
| +    blink::WebFrame* web_frame, | 
| +    UserScript::RunLocation run_location, | 
| +    int page_id) | 
| +    : id(g_next_pending_id++), | 
| +      web_frame(web_frame), | 
| +      run_location(run_location), | 
| +      page_id(page_id) { | 
| +} | 
| + | 
| +ScriptInjection::PendingInjection::~PendingInjection() { | 
| +} | 
| + | 
| // static | 
| GURL ScriptInjection::GetDocumentUrlForFrame(blink::WebFrame* frame) { | 
| GURL data_source_url = ScriptContext::GetDataSourceURLForFrame(frame); | 
| @@ -81,6 +128,114 @@ ScriptInjection::ScriptInjection( | 
| ScriptInjection::~ScriptInjection() { | 
| } | 
|  | 
| +void ScriptInjection::InjectIfAllowed(blink::WebFrame* frame, | 
| +                                      UserScript::RunLocation run_location, | 
| +                                      const GURL& document_url, | 
| +                                      ScriptsRunInfo* scripts_run_info) { | 
| +  if (!WantsToRun(frame, run_location, document_url)) | 
| +    return; | 
| + | 
| +  const Extension* extension = user_script_slave_->GetExtension(extension_id_); | 
| +  DCHECK(extension);  // WantsToRun() should be false if there's no extension. | 
| + | 
| +  // We use the top render view here (instead of the render view for the | 
| +  // frame), because script injection on any frame requires permission for | 
| +  // the top frame. Additionally, if we have to show any UI for permissions, | 
| +  // it should only be done on the top frame. | 
| +  content::RenderView* top_render_view = | 
| +      content::RenderView::FromWebView(frame->top()->view()); | 
| + | 
| +  int tab_id = ExtensionHelper::Get(top_render_view)->tab_id(); | 
| + | 
| +  // By default, we allow injection. | 
| +  bool should_inject = true; | 
| + | 
| +  // Check if the extension requires user consent for injection *and* we have a | 
| +  // valid tab id (if we don't have a tab id, we have no UI surface to ask for | 
| +  // user consent). | 
| +  if (tab_id != -1 && | 
| +      PermissionsData::RequiresActionForScriptExecution( | 
| +          extension, | 
| +          tab_id, | 
| +          frame->top()->document().url())) { | 
| +    int64 request_id = kInvalidRequestId; | 
| +    int page_id = top_render_view->GetPageId(); | 
| + | 
| +    // We only delay the injection if the feature is enabled. | 
| +    // Otherwise, we simply treat this as a notification by passing an invalid | 
| +    // id. | 
| +    if (FeatureSwitch::scripts_require_action()->IsEnabled()) { | 
| +      should_inject = false; | 
| +      ScopedVector<PendingInjection>::iterator pending_injection = | 
| +          pending_injections_.insert( | 
| +              pending_injections_.end(), | 
| +              new PendingInjection(frame, run_location, page_id)); | 
| +      request_id = (*pending_injection)->id; | 
| +    } | 
| + | 
| +    top_render_view->Send( | 
| +        new ExtensionHostMsg_RequestContentScriptPermission( | 
| +            top_render_view->GetRoutingID(), | 
| +            extension->id(), | 
| +            page_id, | 
| +            request_id)); | 
| +  } | 
| + | 
| +  if (should_inject) | 
| +    Inject(frame, run_location, scripts_run_info); | 
| +} | 
| + | 
| +bool ScriptInjection::NotifyScriptPermitted( | 
| +    int64 request_id, | 
| +    content::RenderView* render_view, | 
| +    ScriptsRunInfo* scripts_run_info, | 
| +    blink::WebFrame** frame_out) { | 
| +  ScopedVector<PendingInjection>::iterator iter = pending_injections_.begin(); | 
| +  while (iter != pending_injections_.end() && (*iter)->id != request_id) | 
| +    ++iter; | 
| + | 
| +  // No matching request. | 
| +  if (iter == pending_injections_.end()) | 
| +    return false; | 
| + | 
| +  // We found the request, so pull it out of the pending list. | 
| +  scoped_ptr<PendingInjection> pending_injection(*iter); | 
| +  pending_injections_.weak_erase(iter); | 
| + | 
| +  // Ensure the Page ID and Extension are still valid. Otherwise, don't inject. | 
| +  if (render_view->GetPageId() != pending_injection->page_id) | 
| +    return false; | 
| + | 
| +  const Extension* extension = user_script_slave_->GetExtension(extension_id_); | 
| +  if (!extension) | 
| +    return false; | 
| + | 
| +  // Everything matches! Inject the script. | 
| +  if (frame_out) | 
| +    *frame_out = pending_injection->web_frame; | 
| +  Inject(pending_injection->web_frame, | 
| +         pending_injection->run_location, | 
| +         scripts_run_info); | 
| +  return true; | 
| +} | 
| + | 
| +void ScriptInjection::FrameDetached(blink::WebFrame* frame) { | 
| +  // Any pending injections associated with the given frame will never run. | 
| +  // Remove them. | 
| +  for (ScopedVector<PendingInjection>::iterator iter = | 
| +           pending_injections_.begin(); | 
| +       iter != pending_injections_.end();) { | 
| +    if ((*iter)->web_frame == frame) | 
| +      iter = pending_injections_.erase(iter); | 
| +    else | 
| +      ++iter; | 
| +  } | 
| +} | 
| + | 
| +void ScriptInjection::SetScript(scoped_ptr<UserScript> script) { | 
| +  script_.reset(script.release()); | 
| +} | 
| + | 
| bool ScriptInjection::WantsToRun(blink::WebFrame* frame, | 
| UserScript::RunLocation run_location, | 
| const GURL& document_url) const { | 
|  |