| Index: extensions/browser/process_map.cc
|
| diff --git a/extensions/browser/process_map.cc b/extensions/browser/process_map.cc
|
| index 3651f8af524fcc673756056ab1e3ce726addb210..12fb5380916ba3c9863254741fe19e545e78556e 100644
|
| --- a/extensions/browser/process_map.cc
|
| +++ b/extensions/browser/process_map.cc
|
| @@ -4,7 +4,11 @@
|
|
|
| #include "extensions/browser/process_map.h"
|
|
|
| +#include "content/public/browser/child_process_security_policy.h"
|
| +#include "extensions/browser/extension_registry.h"
|
| #include "extensions/browser/process_map_factory.h"
|
| +#include "extensions/common/extension.h"
|
| +#include "extensions/common/features/feature.h"
|
|
|
| namespace extensions {
|
|
|
| @@ -119,4 +123,33 @@ std::set<std::string> ProcessMap::GetExtensionsInProcess(int process_id) const {
|
| return result;
|
| }
|
|
|
| +Feature::Context ProcessMap::GuessContextType(const Extension* extension,
|
| + int process_id) const {
|
| + // WARNING: This logic must match Dispatcher::ClassifyJavaScriptContext, as
|
| + // much as possible.
|
| +
|
| + if (content::ChildProcessSecurityPolicy::GetInstance()->HasWebUIBindings(
|
| + process_id)) {
|
| + return Feature::WEBUI_CONTEXT;
|
| + }
|
| +
|
| + if (!extension) {
|
| + return Feature::WEB_PAGE_CONTEXT;
|
| + }
|
| +
|
| + if (!Contains(extension->id(), process_id)) {
|
| + // This could equally be UNBLESSED_EXTENSION_CONTEXT, but we don't record
|
| + // which processes have extension frames in them.
|
| + // TODO(kalman): Investigate this.
|
| + return Feature::CONTENT_SCRIPT_CONTEXT;
|
| + }
|
| +
|
| + if (extension->is_hosted_app() &&
|
| + extension->location() != Manifest::COMPONENT) {
|
| + return Feature::BLESSED_WEB_PAGE_CONTEXT;
|
| + }
|
| +
|
| + return Feature::BLESSED_EXTENSION_CONTEXT;
|
| +}
|
| +
|
| } // namespace extensions
|
|
|