OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "extensions/browser/event_router.h" | 5 #include "extensions/browser/event_router.h" |
6 | 6 |
7 #include <utility> | 7 #include <utility> |
8 | 8 |
9 #include "base/bind.h" | 9 #include "base/bind.h" |
10 #include "base/command_line.h" | 10 #include "base/command_line.h" |
11 #include "base/message_loop/message_loop.h" | 11 #include "base/message_loop/message_loop.h" |
12 #include "base/stl_util.h" | 12 #include "base/stl_util.h" |
13 #include "base/values.h" | 13 #include "base/values.h" |
14 #include "chrome/browser/chrome_notification_types.h" | 14 #include "chrome/browser/chrome_notification_types.h" |
| 15 #include "content/public/browser/child_process_security_policy.h" |
15 #include "content/public/browser/notification_service.h" | 16 #include "content/public/browser/notification_service.h" |
16 #include "content/public/browser/render_process_host.h" | 17 #include "content/public/browser/render_process_host.h" |
17 #include "extensions/browser/api_activity_monitor.h" | 18 #include "extensions/browser/api_activity_monitor.h" |
18 #include "extensions/browser/extension_host.h" | 19 #include "extensions/browser/extension_host.h" |
19 #include "extensions/browser/extension_prefs.h" | 20 #include "extensions/browser/extension_prefs.h" |
20 #include "extensions/browser/extension_registry.h" | 21 #include "extensions/browser/extension_registry.h" |
21 #include "extensions/browser/extension_system.h" | 22 #include "extensions/browser/extension_system.h" |
22 #include "extensions/browser/extension_util.h" | 23 #include "extensions/browser/extension_util.h" |
23 #include "extensions/browser/extensions_browser_client.h" | 24 #include "extensions/browser/extensions_browser_client.h" |
24 #include "extensions/browser/lazy_background_task_queue.h" | 25 #include "extensions/browser/lazy_background_task_queue.h" |
(...skipping 480 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
505 incognito_context, extension, event)) { | 506 incognito_context, extension, event)) { |
506 already_dispatched->insert( | 507 already_dispatched->insert( |
507 std::make_pair(incognito_context, extension_id)); | 508 std::make_pair(incognito_context, extension_id)); |
508 } | 509 } |
509 } | 510 } |
510 } | 511 } |
511 | 512 |
512 void EventRouter::DispatchEventToProcess(const std::string& extension_id, | 513 void EventRouter::DispatchEventToProcess(const std::string& extension_id, |
513 content::RenderProcessHost* process, | 514 content::RenderProcessHost* process, |
514 const linked_ptr<Event>& event) { | 515 const linked_ptr<Event>& event) { |
| 516 BrowserContext* listener_context = process->GetBrowserContext(); |
| 517 ProcessMap* process_map = ProcessMap::Get(listener_context); |
| 518 |
515 const Extension* extension = | 519 const Extension* extension = |
516 ExtensionRegistry::Get(browser_context_)->enabled_extensions().GetByID( | 520 ExtensionRegistry::Get(browser_context_)->enabled_extensions().GetByID( |
517 extension_id); | 521 extension_id); |
| 522 // NOTE: |extension| being NULL does not necessarily imply that this event |
| 523 // shouldn't be dispatched. Events can be dispatched to WebUI as well. |
518 | 524 |
519 // The extension could have been removed, but we do not unregister it until | 525 if (!extension && !extension_id.empty()) { |
520 // the extension process is unloaded. | 526 // Trying to dispatch an event to an extension that doesn't exist. The |
521 if (!extension) | 527 // extension could have been removed, but we do not unregister it until the |
522 return; | 528 // extension process is unloaded. |
523 | |
524 BrowserContext* listener_context = process->GetBrowserContext(); | |
525 ProcessMap* process_map = ProcessMap::Get(listener_context); | |
526 // If the event is privileged, only send to extension processes. Otherwise, | |
527 // it's OK to send to normal renderers (e.g., for content scripts). | |
528 if (!process_map->Contains(extension->id(), process->GetID()) && | |
529 !ExtensionAPI::GetSharedInstance()->IsAvailableInUntrustedContext( | |
530 event->event_name, extension)) { | |
531 return; | 529 return; |
532 } | 530 } |
533 | 531 |
534 // If the event is restricted to a URL, only dispatch if the extension has | 532 if (extension) { |
535 // permission for it (or if the event originated from itself). | 533 // Dispatching event to an extension. |
536 if (!event->event_url.is_empty() && | 534 // If the event is privileged, only send to extension processes. Otherwise, |
537 event->event_url.host() != extension->id() && | 535 // it's OK to send to normal renderers (e.g., for content scripts). |
538 !extension->permissions_data() | 536 if (!process_map->Contains(extension->id(), process->GetID()) && |
539 ->active_permissions() | 537 !ExtensionAPI::GetSharedInstance()->IsAvailableInUntrustedContext( |
540 ->HasEffectiveAccessToURL(event->event_url)) { | 538 event->event_name, extension)) { |
| 539 return; |
| 540 } |
| 541 |
| 542 // If the event is restricted to a URL, only dispatch if the extension has |
| 543 // permission for it (or if the event originated from itself). |
| 544 if (!event->event_url.is_empty() && |
| 545 event->event_url.host() != extension->id() && |
| 546 !extension->permissions_data() |
| 547 ->active_permissions() |
| 548 ->HasEffectiveAccessToURL(event->event_url)) { |
| 549 return; |
| 550 } |
| 551 |
| 552 if (!CanDispatchEventToBrowserContext(listener_context, extension, event)) { |
| 553 return; |
| 554 } |
| 555 } else if (content::ChildProcessSecurityPolicy::GetInstance() |
| 556 ->HasWebUIBindings(process->GetID())) { |
| 557 // Dispatching event to WebUI. |
| 558 if (!ExtensionAPI::GetSharedInstance()->IsAvailableToWebUI( |
| 559 event->event_name)) { |
| 560 return; |
| 561 } |
| 562 } else { |
| 563 // Dispatching event to a webpage - however, all such events (e.g. |
| 564 // messaging) don't go through EventRouter so this should be impossible. |
| 565 NOTREACHED(); |
541 return; | 566 return; |
542 } | 567 } |
543 | 568 |
544 if (!CanDispatchEventToBrowserContext(listener_context, extension, event)) | |
545 return; | |
546 | |
547 if (!event->will_dispatch_callback.is_null()) { | 569 if (!event->will_dispatch_callback.is_null()) { |
548 event->will_dispatch_callback.Run(listener_context, extension, | 570 event->will_dispatch_callback.Run( |
549 event->event_args.get()); | 571 listener_context, extension, event->event_args.get()); |
550 } | 572 } |
551 | 573 |
552 DispatchExtensionMessage(process, listener_context, extension->id(), | 574 DispatchExtensionMessage(process, |
553 event->event_name, event->event_args.get(), | 575 listener_context, |
554 event->user_gesture, event->filter_info); | 576 extension_id, |
555 IncrementInFlightEvents(listener_context, extension); | 577 event->event_name, |
| 578 event->event_args.get(), |
| 579 event->user_gesture, |
| 580 event->filter_info); |
| 581 |
| 582 if (extension) |
| 583 IncrementInFlightEvents(listener_context, extension); |
556 } | 584 } |
557 | 585 |
558 bool EventRouter::CanDispatchEventToBrowserContext( | 586 bool EventRouter::CanDispatchEventToBrowserContext( |
559 BrowserContext* context, | 587 BrowserContext* context, |
560 const Extension* extension, | 588 const Extension* extension, |
561 const linked_ptr<Event>& event) { | 589 const linked_ptr<Event>& event) { |
562 // Is this event from a different browser context than the renderer (ie, an | 590 // Is this event from a different browser context than the renderer (ie, an |
563 // incognito tab event sent to a normal process, or vice versa). | 591 // incognito tab event sent to a normal process, or vice versa). |
564 bool cross_incognito = event->restrict_to_browser_context && | 592 bool cross_incognito = event->restrict_to_browser_context && |
565 context != event->restrict_to_browser_context; | 593 context != event->restrict_to_browser_context; |
(...skipping 205 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
771 } | 799 } |
772 | 800 |
773 EventListenerInfo::EventListenerInfo(const std::string& event_name, | 801 EventListenerInfo::EventListenerInfo(const std::string& event_name, |
774 const std::string& extension_id, | 802 const std::string& extension_id, |
775 content::BrowserContext* browser_context) | 803 content::BrowserContext* browser_context) |
776 : event_name(event_name), | 804 : event_name(event_name), |
777 extension_id(extension_id), | 805 extension_id(extension_id), |
778 browser_context(browser_context) {} | 806 browser_context(browser_context) {} |
779 | 807 |
780 } // namespace extensions | 808 } // namespace extensions |
OLD | NEW |