OLD | NEW |
---|---|
1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "extensions/renderer/script_injection.h" | 5 #include "extensions/renderer/script_injection.h" |
6 | 6 |
7 #include <map> | 7 #include <map> |
8 | 8 |
9 #include "base/lazy_instance.h" | 9 #include "base/lazy_instance.h" |
10 #include "base/metrics/histogram.h" | 10 #include "base/metrics/histogram.h" |
11 #include "base/timer/elapsed_timer.h" | 11 #include "base/timer/elapsed_timer.h" |
12 #include "base/values.h" | 12 #include "base/values.h" |
13 #include "content/public/child/v8_value_converter.h" | 13 #include "content/public/child/v8_value_converter.h" |
14 #include "content/public/renderer/render_view.h" | 14 #include "content/public/renderer/render_view.h" |
15 #include "extensions/common/extension_messages.h" | 15 #include "extensions/common/extension_messages.h" |
16 #include "extensions/common/host_id.h" | 16 #include "extensions/common/host_id.h" |
17 #include "extensions/common/manifest_handlers/csp_info.h" | 17 #include "extensions/common/manifest_handlers/csp_info.h" |
18 #include "extensions/renderer/dom_activity_logger.h" | 18 #include "extensions/renderer/dom_activity_logger.h" |
19 #include "extensions/renderer/extension_groups.h" | 19 #include "extensions/renderer/extension_groups.h" |
20 #include "extensions/renderer/extension_injection_host.h" | 20 #include "extensions/renderer/extension_injection_host.h" |
21 #include "extensions/renderer/extensions_renderer_client.h" | 21 #include "extensions/renderer/extensions_renderer_client.h" |
22 #include "extensions/renderer/script_injection_callback.h" | |
23 #include "extensions/renderer/script_injection_manager.h" | |
24 #include "extensions/renderer/scripts_run_info.h" | |
22 #include "third_party/WebKit/public/platform/WebString.h" | 25 #include "third_party/WebKit/public/platform/WebString.h" |
23 #include "third_party/WebKit/public/web/WebDocument.h" | 26 #include "third_party/WebKit/public/web/WebDocument.h" |
24 #include "third_party/WebKit/public/web/WebLocalFrame.h" | 27 #include "third_party/WebKit/public/web/WebLocalFrame.h" |
25 #include "third_party/WebKit/public/web/WebScopedUserGesture.h" | 28 #include "third_party/WebKit/public/web/WebScopedUserGesture.h" |
26 #include "third_party/WebKit/public/web/WebScriptSource.h" | 29 #include "third_party/WebKit/public/web/WebScriptSource.h" |
27 #include "third_party/WebKit/public/web/WebSecurityOrigin.h" | 30 #include "third_party/WebKit/public/web/WebSecurityOrigin.h" |
28 #include "url/gurl.h" | 31 #include "url/gurl.h" |
29 | 32 |
30 namespace extensions { | 33 namespace extensions { |
31 | 34 |
(...skipping 78 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
110 blink::WebLocalFrame* web_frame, | 113 blink::WebLocalFrame* web_frame, |
111 const HostID& host_id, | 114 const HostID& host_id, |
112 UserScript::RunLocation run_location, | 115 UserScript::RunLocation run_location, |
113 int tab_id) | 116 int tab_id) |
114 : injector_(injector.Pass()), | 117 : injector_(injector.Pass()), |
115 web_frame_(web_frame), | 118 web_frame_(web_frame), |
116 host_id_(host_id), | 119 host_id_(host_id), |
117 run_location_(run_location), | 120 run_location_(run_location), |
118 tab_id_(tab_id), | 121 tab_id_(tab_id), |
119 request_id_(kInvalidRequestId), | 122 request_id_(kInvalidRequestId), |
120 complete_(false) { | 123 complete_(false), |
124 running_frames_(0), | |
125 execution_results_(new base::ListValue()), | |
126 all_injections_started_(false), | |
127 script_injection_manager_(nullptr) { | |
121 } | 128 } |
122 | 129 |
123 ScriptInjection::~ScriptInjection() { | 130 ScriptInjection::~ScriptInjection() { |
124 if (!complete_) | 131 if (!complete_) |
125 injector_->OnWillNotInject(ScriptInjector::WONT_INJECT); | 132 injector_->OnWillNotInject(ScriptInjector::WONT_INJECT); |
126 } | 133 } |
127 | 134 |
128 bool ScriptInjection::TryToInject(UserScript::RunLocation current_location, | 135 ScriptInjection::InjectionResult ScriptInjection::TryToInject( |
129 const InjectionHost* injection_host, | 136 UserScript::RunLocation current_location, |
130 ScriptsRunInfo* scripts_run_info) { | 137 const InjectionHost* injection_host, |
138 ScriptsRunInfo* scripts_run_info, | |
139 ScriptInjectionManager* manager) { | |
140 script_injection_manager_ = manager; | |
131 if (current_location < run_location_) | 141 if (current_location < run_location_) |
132 return false; // Wait for the right location. | 142 return INJECTION_WAITING; // Wait for the right location. |
133 | 143 |
134 if (request_id_ != kInvalidRequestId) | 144 if (request_id_ != kInvalidRequestId) { |
135 return false; // We're waiting for permission right now, try again later. | 145 // We're waiting for permission right now, try again later. |
146 return INJECTION_WAITING; | |
147 } | |
136 | 148 |
137 if (!injection_host) { | 149 if (!injection_host) { |
138 NotifyWillNotInject(ScriptInjector::EXTENSION_REMOVED); | 150 NotifyWillNotInject(ScriptInjector::EXTENSION_REMOVED); |
139 return true; // We're done. | 151 return INJECTION_FINISHED; // We're done. |
140 } | 152 } |
141 | 153 |
142 switch (injector_->CanExecuteOnFrame(injection_host, web_frame_, tab_id_, | 154 switch (injector_->CanExecuteOnFrame(injection_host, web_frame_, tab_id_, |
143 web_frame_->top()->document().url())) { | 155 web_frame_->top()->document().url())) { |
144 case PermissionsData::ACCESS_DENIED: | 156 case PermissionsData::ACCESS_DENIED: |
145 NotifyWillNotInject(ScriptInjector::NOT_ALLOWED); | 157 NotifyWillNotInject(ScriptInjector::NOT_ALLOWED); |
146 return true; // We're done. | 158 return INJECTION_FINISHED; // We're done. |
147 case PermissionsData::ACCESS_WITHHELD: | 159 case PermissionsData::ACCESS_WITHHELD: |
148 SendInjectionMessage(true /* request permission */); | 160 SendInjectionMessage(true /* request permission */); |
149 return false; // Wait around for permission. | 161 return INJECTION_WAITING; // Wait around for permission. |
150 case PermissionsData::ACCESS_ALLOWED: | 162 case PermissionsData::ACCESS_ALLOWED: |
151 Inject(injection_host, scripts_run_info); | 163 return Inject(injection_host, scripts_run_info); |
Devlin
2015/03/03 23:47:03
Let's instead do:
InjectionResult result = Inject(
kozy
2015/03/04 08:55:08
Done.
| |
152 return true; // We're done! | |
153 } | 164 } |
154 | 165 |
155 NOTREACHED(); | 166 NOTREACHED(); |
156 return false; | 167 return INJECTION_FINISHED; |
157 } | 168 } |
158 | 169 |
159 bool ScriptInjection::OnPermissionGranted(const InjectionHost* injection_host, | 170 ScriptInjection::InjectionResult ScriptInjection::OnPermissionGranted( |
160 ScriptsRunInfo* scripts_run_info) { | 171 const InjectionHost* injection_host, |
172 ScriptsRunInfo* scripts_run_info) { | |
161 if (!injection_host) { | 173 if (!injection_host) { |
162 NotifyWillNotInject(ScriptInjector::EXTENSION_REMOVED); | 174 NotifyWillNotInject(ScriptInjector::EXTENSION_REMOVED); |
163 return false; | 175 return INJECTION_FINISHED; |
164 } | 176 } |
165 | 177 |
166 Inject(injection_host, scripts_run_info); | 178 return Inject(injection_host, scripts_run_info); |
167 return true; | |
168 } | 179 } |
169 | 180 |
170 void ScriptInjection::SendInjectionMessage(bool request_permission) { | 181 void ScriptInjection::SendInjectionMessage(bool request_permission) { |
171 content::RenderView* render_view = | 182 content::RenderView* render_view = |
172 content::RenderView::FromWebView(web_frame()->top()->view()); | 183 content::RenderView::FromWebView(web_frame()->top()->view()); |
173 | 184 |
174 // If we are just notifying the browser of the injection, then send an | 185 // If we are just notifying the browser of the injection, then send an |
175 // invalid request (which is treated like a notification). | 186 // invalid request (which is treated like a notification). |
176 request_id_ = request_permission ? g_next_pending_id++ : kInvalidRequestId; | 187 request_id_ = request_permission ? g_next_pending_id++ : kInvalidRequestId; |
177 render_view->Send(new ExtensionHostMsg_RequestScriptInjectionPermission( | 188 render_view->Send(new ExtensionHostMsg_RequestScriptInjectionPermission( |
178 render_view->GetRoutingID(), | 189 render_view->GetRoutingID(), |
179 host_id_.id(), | 190 host_id_.id(), |
180 injector_->script_type(), | 191 injector_->script_type(), |
181 request_id_)); | 192 request_id_)); |
182 } | 193 } |
183 | 194 |
184 void ScriptInjection::NotifyWillNotInject( | 195 void ScriptInjection::NotifyWillNotInject( |
185 ScriptInjector::InjectFailureReason reason) { | 196 ScriptInjector::InjectFailureReason reason) { |
186 complete_ = true; | 197 complete_ = true; |
187 injector_->OnWillNotInject(reason); | 198 injector_->OnWillNotInject(reason); |
188 } | 199 } |
189 | 200 |
190 void ScriptInjection::Inject(const InjectionHost* injection_host, | 201 ScriptInjection::InjectionResult ScriptInjection::Inject( |
191 ScriptsRunInfo* scripts_run_info) { | 202 const InjectionHost* injection_host, |
203 ScriptsRunInfo* scripts_run_info) { | |
192 DCHECK(injection_host); | 204 DCHECK(injection_host); |
193 DCHECK(scripts_run_info); | 205 DCHECK(scripts_run_info); |
194 DCHECK(!complete_); | 206 DCHECK(!complete_); |
195 | 207 |
196 if (injection_host->ShouldNotifyBrowserOfInjection()) | 208 if (injection_host->ShouldNotifyBrowserOfInjection()) |
197 SendInjectionMessage(false /* don't request permission */); | 209 SendInjectionMessage(false /* don't request permission */); |
198 | 210 |
199 std::vector<blink::WebFrame*> frame_vector; | 211 std::vector<blink::WebFrame*> frame_vector; |
200 frame_vector.push_back(web_frame_); | 212 frame_vector.push_back(web_frame_); |
201 if (injector_->ShouldExecuteInChildFrames()) | 213 if (injector_->ShouldExecuteInChildFrames()) |
202 AppendAllChildFrames(web_frame_, &frame_vector); | 214 AppendAllChildFrames(web_frame_, &frame_vector); |
203 | 215 |
204 scoped_ptr<blink::WebScopedUserGesture> gesture; | |
205 if (injector_->IsUserGesture()) | |
206 gesture.reset(new blink::WebScopedUserGesture()); | |
207 | |
208 bool inject_js = injector_->ShouldInjectJs(run_location_); | 216 bool inject_js = injector_->ShouldInjectJs(run_location_); |
209 bool inject_css = injector_->ShouldInjectCss(run_location_); | 217 bool inject_css = injector_->ShouldInjectCss(run_location_); |
210 DCHECK(inject_js || inject_css); | 218 DCHECK(inject_js || inject_css); |
211 | 219 |
212 scoped_ptr<base::ListValue> execution_results(new base::ListValue()); | |
213 GURL top_url = web_frame_->top()->document().url(); | 220 GURL top_url = web_frame_->top()->document().url(); |
214 for (std::vector<blink::WebFrame*>::iterator iter = frame_vector.begin(); | 221 for (std::vector<blink::WebFrame*>::iterator iter = frame_vector.begin(); |
215 iter != frame_vector.end(); | 222 iter != frame_vector.end(); |
216 ++iter) { | 223 ++iter) { |
217 // TODO(dcheng): Unfortunately, the code as written won't work in an OOPI | 224 // TODO(dcheng): Unfortunately, the code as written won't work in an OOPI |
218 // world. This is just a temporary hack to make things compile. | 225 // world. This is just a temporary hack to make things compile. |
219 blink::WebLocalFrame* frame = (*iter)->toWebLocalFrame(); | 226 blink::WebLocalFrame* frame = (*iter)->toWebLocalFrame(); |
220 | 227 |
221 // We recheck access here in the renderer for extra safety against races | 228 // We recheck access here in the renderer for extra safety against races |
222 // with navigation, but different frames can have different URLs, and the | 229 // with navigation, but different frames can have different URLs, and the |
223 // injection host might only have access to a subset of them. | 230 // injection host might only have access to a subset of them. |
224 // For child frames, we just skip ones the injection host doesn't have | 231 // For child frames, we just skip ones the injection host doesn't have |
225 // access to and carry on. | 232 // access to and carry on. |
226 // Note: we don't consider ACCESS_WITHHELD because there is nowhere to | 233 // Note: we don't consider ACCESS_WITHHELD because there is nowhere to |
227 // surface a request for a child frame. | 234 // surface a request for a child frame. |
228 // TODO(rdevlin.cronin): We should ask for permission somehow. | 235 // TODO(rdevlin.cronin): We should ask for permission somehow. |
229 if (injector_->CanExecuteOnFrame(injection_host, frame, tab_id_, top_url) == | 236 if (injector_->CanExecuteOnFrame(injection_host, frame, tab_id_, top_url) == |
230 PermissionsData::ACCESS_DENIED) { | 237 PermissionsData::ACCESS_DENIED) { |
231 DCHECK(frame->parent()); | 238 DCHECK(frame->parent()); |
232 continue; | 239 continue; |
233 } | 240 } |
234 if (inject_js) | 241 if (inject_js) |
235 InjectJs(injection_host, frame, execution_results.get()); | 242 InjectJs(injection_host, frame); |
236 if (inject_css) | 243 if (inject_css) |
237 InjectCss(frame); | 244 InjectCss(frame); |
238 } | 245 } |
239 | 246 |
240 complete_ = true; | 247 all_injections_started_ = true; |
241 | 248 injector_->GetRunInfo(scripts_run_info, run_location_); |
242 // TODO(hanxi): don't log these metrics for webUIs' injections. | 249 scripts_run_info->num_blocking_js = running_frames_; |
243 injector_->OnInjectionComplete(execution_results.Pass(), | 250 TryToFinish(); |
244 scripts_run_info, | 251 return complete_ ? INJECTION_FINISHED : INJECTION_BLOCKED; |
245 run_location_); | |
246 } | 252 } |
247 | 253 |
248 void ScriptInjection::InjectJs(const InjectionHost* injection_host, | 254 void ScriptInjection::InjectJs(const InjectionHost* injection_host, |
249 blink::WebLocalFrame* frame, | 255 blink::WebLocalFrame* frame) { |
250 base::ListValue* execution_results) { | 256 ++running_frames_; |
251 std::vector<blink::WebScriptSource> sources = | 257 std::vector<blink::WebScriptSource> sources = |
252 injector_->GetJsSources(run_location_); | 258 injector_->GetJsSources(run_location_); |
253 bool in_main_world = injector_->ShouldExecuteInMainWorld(); | 259 bool in_main_world = injector_->ShouldExecuteInMainWorld(); |
254 int world_id = in_main_world | 260 int world_id = in_main_world |
255 ? DOMActivityLogger::kMainWorldId | 261 ? DOMActivityLogger::kMainWorldId |
256 : GetIsolatedWorldIdForInstance(injection_host, frame); | 262 : GetIsolatedWorldIdForInstance(injection_host, frame); |
257 bool expects_results = injector_->ExpectsResults(); | 263 bool is_user_gesture = injector_->IsUserGesture(); |
264 | |
265 scoped_ptr<blink::WebScriptExecutionCallback> callback( | |
266 new ScriptInjectionCallback(this, frame)); | |
258 | 267 |
259 base::ElapsedTimer exec_timer; | 268 base::ElapsedTimer exec_timer; |
260 if (injection_host->id().type() == HostID::EXTENSIONS) | 269 if (injection_host->id().type() == HostID::EXTENSIONS) |
261 DOMActivityLogger::AttachToWorld(world_id, injection_host->id().id()); | 270 DOMActivityLogger::AttachToWorld(world_id, injection_host->id().id()); |
262 v8::HandleScope scope(v8::Isolate::GetCurrent()); | 271 |
263 v8::Local<v8::Value> script_value; | |
264 if (in_main_world) { | 272 if (in_main_world) { |
265 // We only inject in the main world for javascript: urls. | 273 // We only inject in the main world for javascript: urls. |
266 DCHECK_EQ(1u, sources.size()); | 274 DCHECK_EQ(1u, sources.size()); |
267 | 275 |
268 const blink::WebScriptSource& source = sources.front(); | 276 frame->requestExecuteScriptAndReturnValue(sources.front(), |
269 if (expects_results) | 277 is_user_gesture, |
270 script_value = frame->executeScriptAndReturnValue(source); | 278 callback.release()); |
271 else | 279 } else { |
272 frame->executeScript(source); | 280 frame->requestExecuteScriptInIsolatedWorld(world_id, |
273 } else { // in isolated world | 281 &sources.front(), |
274 scoped_ptr<blink::WebVector<v8::Local<v8::Value> > > results; | 282 sources.size(), |
275 if (expects_results) | 283 EXTENSION_GROUP_CONTENT_SCRIPTS, |
276 results.reset(new blink::WebVector<v8::Local<v8::Value> >()); | 284 is_user_gesture, |
277 frame->executeScriptInIsolatedWorld(world_id, | 285 callback.release()); |
278 &sources.front(), | |
279 sources.size(), | |
280 EXTENSION_GROUP_CONTENT_SCRIPTS, | |
281 results.get()); | |
282 if (expects_results && !results->isEmpty()) | |
283 script_value = (*results)[0]; | |
284 } | 286 } |
285 | 287 |
286 if (injection_host->id().type() == HostID::EXTENSIONS) | 288 if (injection_host->id().type() == HostID::EXTENSIONS) |
287 UMA_HISTOGRAM_TIMES("Extensions.InjectScriptTime", exec_timer.Elapsed()); | 289 UMA_HISTOGRAM_TIMES("Extensions.InjectScriptTime", exec_timer.Elapsed()); |
290 } | |
288 | 291 |
292 void ScriptInjection::OnJSInjectionCompleted( | |
293 blink::WebLocalFrame* frame, | |
294 const blink::WebVector<v8::Local<v8::Value> >& results) { | |
295 DCHECK(running_frames_ > 0); | |
296 --running_frames_; | |
297 | |
298 bool expects_results = injector_->ExpectsResults(); | |
289 if (expects_results) { | 299 if (expects_results) { |
300 v8::Local<v8::Value> script_value; | |
301 if (!results.isEmpty()) | |
302 script_value = results[0]; | |
290 // Right now, we only support returning single results (per frame). | 303 // Right now, we only support returning single results (per frame). |
291 scoped_ptr<content::V8ValueConverter> v8_converter( | 304 scoped_ptr<content::V8ValueConverter> v8_converter( |
292 content::V8ValueConverter::create()); | 305 content::V8ValueConverter::create()); |
293 // It's safe to always use the main world context when converting | 306 // It's safe to always use the main world context when converting |
294 // here. V8ValueConverterImpl shouldn't actually care about the | 307 // here. V8ValueConverterImpl shouldn't actually care about the |
295 // context scope, and it switches to v8::Object's creation context | 308 // context scope, and it switches to v8::Object's creation context |
296 // when encountered. | 309 // when encountered. |
297 v8::Local<v8::Context> context = frame->mainWorldScriptContext(); | 310 v8::Local<v8::Context> context = frame->mainWorldScriptContext(); |
298 scoped_ptr<base::Value> result( | 311 scoped_ptr<base::Value> result( |
299 v8_converter->FromV8Value(script_value, context)); | 312 v8_converter->FromV8Value(script_value, context)); |
300 // Always append an execution result (i.e. no result == null result) | 313 if (!result.get()) |
301 // so that |execution_results| lines up with the frames. | 314 result.reset(base::Value::CreateNullValue()); |
302 execution_results->Append(result.get() ? result.release() | 315 // We guarantee that the main frame's result is at the first index, but |
303 : base::Value::CreateNullValue()); | 316 // any sub frames results do not have guaranteed order. |
317 execution_results_->Insert( | |
318 frame == web_frame_ ? 0 : execution_results_->GetSize(), | |
319 result.release()); | |
320 } | |
321 TryToFinish(); | |
322 } | |
323 | |
324 void ScriptInjection::TryToFinish() { | |
325 if (all_injections_started_ && running_frames_ == 0) { | |
326 complete_ = true; | |
327 injector_->OnInjectionComplete(execution_results_.Pass(), | |
328 run_location_); | |
329 | |
330 // This object can be destroyed after next line. | |
331 if (script_injection_manager_) | |
332 script_injection_manager_->OnInjectionFinished(this); | |
Devlin
2015/03/03 23:47:03
This will still notify the manager in all cases, s
kozy
2015/03/04 08:55:08
Done.
| |
304 } | 333 } |
305 } | 334 } |
306 | 335 |
307 void ScriptInjection::InjectCss(blink::WebLocalFrame* frame) { | 336 void ScriptInjection::InjectCss(blink::WebLocalFrame* frame) { |
308 std::vector<std::string> css_sources = | 337 std::vector<std::string> css_sources = |
309 injector_->GetCssSources(run_location_); | 338 injector_->GetCssSources(run_location_); |
310 for (std::vector<std::string>::const_iterator iter = css_sources.begin(); | 339 for (std::vector<std::string>::const_iterator iter = css_sources.begin(); |
311 iter != css_sources.end(); | 340 iter != css_sources.end(); |
312 ++iter) { | 341 ++iter) { |
313 frame->document().insertStyleSheet(blink::WebString::fromUTF8(*iter)); | 342 frame->document().insertStyleSheet(blink::WebString::fromUTF8(*iter)); |
314 } | 343 } |
315 } | 344 } |
316 | 345 |
317 } // namespace extensions | 346 } // namespace extensions |
OLD | NEW |