OLD | NEW |
---|---|
1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "extensions/renderer/script_injection.h" | 5 #include "extensions/renderer/script_injection.h" |
6 | 6 |
7 #include <map> | 7 #include <map> |
8 | 8 |
9 #include "base/lazy_instance.h" | 9 #include "base/lazy_instance.h" |
10 #include "base/metrics/histogram.h" | 10 #include "base/metrics/histogram.h" |
11 #include "base/timer/elapsed_timer.h" | 11 #include "base/timer/elapsed_timer.h" |
12 #include "base/values.h" | 12 #include "base/values.h" |
13 #include "content/public/renderer/render_view.h" | 13 #include "content/public/renderer/render_view.h" |
14 #include "content/public/renderer/v8_value_converter.h" | 14 #include "content/public/renderer/v8_value_converter.h" |
15 #include "extensions/common/extension.h" | 15 #include "extensions/common/extension.h" |
16 #include "extensions/common/extension_consumer.h" | |
16 #include "extensions/common/extension_messages.h" | 17 #include "extensions/common/extension_messages.h" |
17 #include "extensions/common/feature_switch.h" | 18 #include "extensions/common/feature_switch.h" |
18 #include "extensions/common/manifest_handlers/csp_info.h" | 19 #include "extensions/common/manifest_handlers/csp_info.h" |
19 #include "extensions/renderer/dom_activity_logger.h" | 20 #include "extensions/renderer/dom_activity_logger.h" |
20 #include "extensions/renderer/extension_groups.h" | 21 #include "extensions/renderer/extension_groups.h" |
21 #include "extensions/renderer/extensions_renderer_client.h" | 22 #include "extensions/renderer/extensions_renderer_client.h" |
22 #include "third_party/WebKit/public/platform/WebString.h" | 23 #include "third_party/WebKit/public/platform/WebString.h" |
23 #include "third_party/WebKit/public/web/WebDocument.h" | 24 #include "third_party/WebKit/public/web/WebDocument.h" |
24 #include "third_party/WebKit/public/web/WebLocalFrame.h" | 25 #include "third_party/WebKit/public/web/WebLocalFrame.h" |
25 #include "third_party/WebKit/public/web/WebScopedUserGesture.h" | 26 #include "third_party/WebKit/public/web/WebScopedUserGesture.h" |
26 #include "third_party/WebKit/public/web/WebScriptSource.h" | 27 #include "third_party/WebKit/public/web/WebScriptSource.h" |
27 #include "third_party/WebKit/public/web/WebSecurityOrigin.h" | 28 #include "third_party/WebKit/public/web/WebSecurityOrigin.h" |
28 #include "url/gurl.h" | 29 #include "url/gurl.h" |
29 | 30 |
30 namespace extensions { | 31 namespace extensions { |
31 | 32 |
32 namespace { | 33 namespace { |
33 | 34 |
34 typedef std::map<std::string, int> IsolatedWorldMap; | 35 using IsolatedWorldKey = std::pair<HostID, int>; |
36 using IsolatedWorldMap = std::map<IsolatedWorldKey, int>; | |
35 base::LazyInstance<IsolatedWorldMap> g_isolated_worlds = | 37 base::LazyInstance<IsolatedWorldMap> g_isolated_worlds = |
36 LAZY_INSTANCE_INITIALIZER; | 38 LAZY_INSTANCE_INITIALIZER; |
37 | 39 |
38 const int64 kInvalidRequestId = -1; | 40 const int64 kInvalidRequestId = -1; |
39 | 41 |
40 // The id of the next pending injection. | 42 // The id of the next pending injection. |
41 int64 g_next_pending_id = 0; | 43 int64 g_next_pending_id = 0; |
42 | 44 |
43 bool ShouldNotifyBrowserOfInjections() { | 45 bool ShouldNotifyBrowserOfInjections() { |
44 return !FeatureSwitch::scripts_require_action()->IsEnabled(); | 46 return !FeatureSwitch::scripts_require_action()->IsEnabled(); |
45 } | 47 } |
46 | 48 |
47 // Append all the child frames of |parent_frame| to |frames_vector|. | 49 // Append all the child frames of |parent_frame| to |frames_vector|. |
48 void AppendAllChildFrames(blink::WebFrame* parent_frame, | 50 void AppendAllChildFrames(blink::WebFrame* parent_frame, |
49 std::vector<blink::WebFrame*>* frames_vector) { | 51 std::vector<blink::WebFrame*>* frames_vector) { |
50 DCHECK(parent_frame); | 52 DCHECK(parent_frame); |
51 for (blink::WebFrame* child_frame = parent_frame->firstChild(); child_frame; | 53 for (blink::WebFrame* child_frame = parent_frame->firstChild(); child_frame; |
52 child_frame = child_frame->nextSibling()) { | 54 child_frame = child_frame->nextSibling()) { |
53 frames_vector->push_back(child_frame); | 55 frames_vector->push_back(child_frame); |
54 AppendAllChildFrames(child_frame, frames_vector); | 56 AppendAllChildFrames(child_frame, frames_vector); |
55 } | 57 } |
56 } | 58 } |
57 | 59 |
58 // Gets the isolated world ID to use for the given |extension| in the given | 60 // Gets the isolated world ID to use for the given |host, instance_id| |
59 // |frame|. If no isolated world has been created for that extension, | 61 // in the given |frame|. If no isolated world has been created for that |
60 // one will be created and initialized. | 62 // |host, instance_id| one will be created and initialized. |
61 int GetIsolatedWorldIdForExtension(const Extension* extension, | 63 int GetIsolatedWorldIdForInstance(const Host* host, |
62 blink::WebLocalFrame* frame) { | 64 int instance_id, |
65 blink::WebLocalFrame* frame) { | |
63 static int g_next_isolated_world_id = | 66 static int g_next_isolated_world_id = |
64 ExtensionsRendererClient::Get()->GetLowestIsolatedWorldId(); | 67 ExtensionsRendererClient::Get()->GetLowestIsolatedWorldId(); |
65 | 68 |
66 IsolatedWorldMap& isolated_worlds = g_isolated_worlds.Get(); | 69 IsolatedWorldMap& isolated_worlds = g_isolated_worlds.Get(); |
67 | 70 |
68 int id = 0; | 71 int id = 0; |
69 IsolatedWorldMap::iterator iter = isolated_worlds.find(extension->id()); | 72 const HostID& host_id = host->id(); |
73 IsolatedWorldKey key(host_id, instance_id); | |
74 IsolatedWorldMap::iterator iter = isolated_worlds.find(key); | |
70 if (iter != isolated_worlds.end()) { | 75 if (iter != isolated_worlds.end()) { |
71 id = iter->second; | 76 id = iter->second; |
72 } else { | 77 } else { |
73 id = g_next_isolated_world_id++; | 78 id = g_next_isolated_world_id++; |
74 // This map will tend to pile up over time, but realistically, you're never | 79 // This map will tend to pile up over time, but realistically, you're never |
75 // going to have enough extensions for it to matter. | 80 // going to have enough hosts for it to matter. |
76 isolated_worlds[extension->id()] = id; | 81 isolated_worlds[key] = id; |
77 } | 82 } |
78 | 83 |
84 GURL origin; | |
85 std::string name; | |
86 std::string name_web_view = "WebView"; | |
87 const GURL* origin_ptr = &origin; | |
88 const std::string* name_ptr = &name; | |
89 | |
90 if (host_id.type() == HostID::EXTENSIONS) { | |
91 const Extension* extension = | |
92 static_cast<const ExtensionConsumer*>(host)->extension(); | |
Devlin
2015/02/04 17:01:14
Generally, having something like
class AbstractCla
Xi Han
2015/02/05 16:06:20
Adds some of these functions in the Host class.
| |
93 frame->setIsolatedWorldContentSecurityPolicy( | |
94 id, | |
95 blink::WebString::fromUTF8(CSPInfo::GetContentSecurityPolicy( | |
96 extension))); | |
97 if (instance_id == 0) { // The instance is a TAB. | |
98 origin_ptr = &extension->url(); | |
99 name_ptr = &extension->name(); | |
100 } | |
101 } | |
102 if (instance_id != 0) // The instance is a <webview>. | |
103 name_ptr = &name_web_view; | |
104 | |
79 // We need to set the isolated world origin and CSP even if it's not a new | 105 // We need to set the isolated world origin and CSP even if it's not a new |
80 // world since these are stored per frame, and we might not have used this | 106 // world since these are stored per frame, and we might not have used this |
81 // isolated world in this frame before. | 107 // isolated world in this frame before. |
82 frame->setIsolatedWorldSecurityOrigin( | 108 frame->setIsolatedWorldSecurityOrigin( |
83 id, blink::WebSecurityOrigin::create(extension->url())); | 109 id, blink::WebSecurityOrigin::create(*origin_ptr)); |
84 frame->setIsolatedWorldContentSecurityPolicy( | |
85 id, | |
86 blink::WebString::fromUTF8(CSPInfo::GetContentSecurityPolicy(extension))); | |
87 frame->setIsolatedWorldHumanReadableName( | 110 frame->setIsolatedWorldHumanReadableName( |
88 id, | 111 id, blink::WebString::fromUTF8(*name_ptr)); |
89 blink::WebString::fromUTF8(extension->name())); | |
90 | 112 |
91 return id; | 113 return id; |
92 } | 114 } |
93 | 115 |
94 } // namespace | 116 } // namespace |
95 | 117 |
96 // static | 118 // static |
97 std::string ScriptInjection::GetExtensionIdForIsolatedWorld( | 119 HostID ScriptInjection::GetHostIdForIsolatedWorld(int isolated_world_id) { |
98 int isolated_world_id) { | |
99 IsolatedWorldMap& isolated_worlds = g_isolated_worlds.Get(); | 120 IsolatedWorldMap& isolated_worlds = g_isolated_worlds.Get(); |
Devlin
2015/02/04 17:01:14
const &
Xi Han
2015/02/05 16:06:20
Done.
| |
100 | 121 |
101 for (IsolatedWorldMap::iterator iter = isolated_worlds.begin(); | 122 for (auto& kv : isolated_worlds) { |
Devlin
2015/02/04 17:01:14
const auto&
Xi Han
2015/02/05 16:06:20
Done.
| |
102 iter != isolated_worlds.end(); | 123 if (kv.second == isolated_world_id) |
103 ++iter) { | 124 return kv.first.first; |
104 if (iter->second == isolated_world_id) | |
105 return iter->first; | |
106 } | 125 } |
107 return std::string(); | 126 return HostID(); |
108 } | 127 } |
109 | 128 |
110 // static | 129 // static |
111 void ScriptInjection::RemoveIsolatedWorld(const std::string& extension_id) { | 130 void ScriptInjection::RemoveIsolatedWorld(const std::string& host_id) { |
112 g_isolated_worlds.Get().erase(extension_id); | 131 std::set<IsolatedWorldKey> keys_to_delete; |
132 IsolatedWorldMap& isolated_worlds = g_isolated_worlds.Get(); | |
133 for (auto& kv: isolated_worlds) { | |
134 const IsolatedWorldKey& key = kv.first; | |
135 if (key.first.id() == host_id) | |
136 keys_to_delete.insert(key); | |
137 } | |
138 for (auto& key : keys_to_delete) | |
139 isolated_worlds.erase(key); | |
113 } | 140 } |
114 | 141 |
115 ScriptInjection::ScriptInjection( | 142 ScriptInjection::ScriptInjection( |
116 scoped_ptr<ScriptInjector> injector, | 143 scoped_ptr<ScriptInjector> injector, |
117 blink::WebLocalFrame* web_frame, | 144 blink::WebLocalFrame* web_frame, |
118 const std::string& extension_id, | 145 const HostID& host_id, |
146 int instance_id, | |
119 UserScript::RunLocation run_location, | 147 UserScript::RunLocation run_location, |
120 int tab_id) | 148 int tab_id) |
121 : injector_(injector.Pass()), | 149 : injector_(injector.Pass()), |
122 web_frame_(web_frame), | 150 web_frame_(web_frame), |
123 extension_id_(extension_id), | 151 host_id_(host_id), |
152 instance_id_(instance_id), | |
124 run_location_(run_location), | 153 run_location_(run_location), |
125 tab_id_(tab_id), | 154 tab_id_(tab_id), |
126 request_id_(kInvalidRequestId), | 155 request_id_(kInvalidRequestId), |
127 complete_(false) { | 156 complete_(false) { |
128 } | 157 } |
129 | 158 |
130 ScriptInjection::~ScriptInjection() { | 159 ScriptInjection::~ScriptInjection() { |
131 if (!complete_) | 160 if (!complete_) |
132 injector_->OnWillNotInject(ScriptInjector::WONT_INJECT); | 161 injector_->OnWillNotInject(ScriptInjector::WONT_INJECT); |
133 } | 162 } |
134 | 163 |
135 bool ScriptInjection::TryToInject(UserScript::RunLocation current_location, | 164 bool ScriptInjection::TryToInject(UserScript::RunLocation current_location, |
136 const Extension* extension, | 165 const Host* host, |
137 ScriptsRunInfo* scripts_run_info) { | 166 ScriptsRunInfo* scripts_run_info) { |
138 if (current_location < run_location_) | 167 if (current_location < run_location_) |
139 return false; // Wait for the right location. | 168 return false; // Wait for the right location. |
140 | 169 |
141 if (request_id_ != kInvalidRequestId) | 170 if (request_id_ != kInvalidRequestId) |
142 return false; // We're waiting for permission right now, try again later. | 171 return false; // We're waiting for permission right now, try again later. |
143 | 172 |
144 if (!extension) { | 173 if (!host) { |
145 NotifyWillNotInject(ScriptInjector::EXTENSION_REMOVED); | 174 NotifyWillNotInject(ScriptInjector::EXTENSION_REMOVED); |
146 return true; // We're done. | 175 return true; // We're done. |
147 } | 176 } |
148 | 177 |
178 const Extension* extension = | |
179 static_cast<const ExtensionConsumer*>(host)->extension(); | |
Devlin
2015/02/04 17:01:14
This feels very unfinished to me. I think I'd rat
Xi Han
2015/02/05 16:06:20
I updated all the if(!host) check, it is a great c
| |
180 | |
181 // TODO(hanxi): refactor ScriptInjection::CanExecuteOnFrame(...) and pass in | |
182 // Host. | |
149 switch (injector_->CanExecuteOnFrame( | 183 switch (injector_->CanExecuteOnFrame( |
150 extension, web_frame_, tab_id_, web_frame_->top()->document().url())) { | 184 extension, web_frame_, tab_id_, web_frame_->top()->document().url())) { |
151 case PermissionsData::ACCESS_DENIED: | 185 case PermissionsData::ACCESS_DENIED: |
152 NotifyWillNotInject(ScriptInjector::NOT_ALLOWED); | 186 NotifyWillNotInject(ScriptInjector::NOT_ALLOWED); |
153 return true; // We're done. | 187 return true; // We're done. |
154 case PermissionsData::ACCESS_WITHHELD: | 188 case PermissionsData::ACCESS_WITHHELD: |
155 RequestPermission(); | 189 RequestPermission(); |
156 return false; // Wait around for permission. | 190 return false; // Wait around for permission. |
157 case PermissionsData::ACCESS_ALLOWED: | 191 case PermissionsData::ACCESS_ALLOWED: |
158 Inject(extension, scripts_run_info); | 192 Inject(host, scripts_run_info); |
159 return true; // We're done! | 193 return true; // We're done! |
160 } | 194 } |
161 | 195 |
162 // Some compilers don't realize that we always return from the switch() above. | 196 // Some compilers don't realize that we always return from the switch() above. |
163 // Make them happy. | 197 // Make them happy. |
164 return false; | 198 return false; |
165 } | 199 } |
166 | 200 |
167 bool ScriptInjection::OnPermissionGranted(const Extension* extension, | 201 bool ScriptInjection::OnPermissionGranted(const Host* host, |
168 ScriptsRunInfo* scripts_run_info) { | 202 ScriptsRunInfo* scripts_run_info) { |
169 if (!extension) { | 203 if (!host) { |
170 NotifyWillNotInject(ScriptInjector::EXTENSION_REMOVED); | 204 NotifyWillNotInject(ScriptInjector::EXTENSION_REMOVED); |
171 return false; | 205 return false; |
172 } | 206 } |
173 | 207 |
174 Inject(extension, scripts_run_info); | 208 Inject(host, scripts_run_info); |
175 return true; | 209 return true; |
176 } | 210 } |
177 | 211 |
178 void ScriptInjection::RequestPermission() { | 212 void ScriptInjection::RequestPermission() { |
179 content::RenderView* render_view = | 213 content::RenderView* render_view = |
180 content::RenderView::FromWebView(web_frame()->top()->view()); | 214 content::RenderView::FromWebView(web_frame()->top()->view()); |
181 | 215 |
182 // If we are just notifying the browser of the injection, then send an | 216 // If we are just notifying the browser of the injection, then send an |
183 // invalid request (which is treated like a notification). | 217 // invalid request (which is treated like a notification). |
184 request_id_ = ShouldNotifyBrowserOfInjections() ? kInvalidRequestId | 218 request_id_ = ShouldNotifyBrowserOfInjections() ? kInvalidRequestId |
185 : g_next_pending_id++; | 219 : g_next_pending_id++; |
186 render_view->Send(new ExtensionHostMsg_RequestScriptInjectionPermission( | 220 render_view->Send(new ExtensionHostMsg_RequestScriptInjectionPermission( |
187 render_view->GetRoutingID(), | 221 render_view->GetRoutingID(), |
188 extension_id_, | 222 host_id_.id(), |
189 injector_->script_type(), | 223 injector_->script_type(), |
190 request_id_)); | 224 request_id_)); |
191 } | 225 } |
192 | 226 |
193 void ScriptInjection::NotifyWillNotInject( | 227 void ScriptInjection::NotifyWillNotInject( |
194 ScriptInjector::InjectFailureReason reason) { | 228 ScriptInjector::InjectFailureReason reason) { |
195 complete_ = true; | 229 complete_ = true; |
196 injector_->OnWillNotInject(reason); | 230 injector_->OnWillNotInject(reason); |
197 } | 231 } |
198 | 232 |
199 void ScriptInjection::Inject(const Extension* extension, | 233 void ScriptInjection::Inject(const Host* host, |
200 ScriptsRunInfo* scripts_run_info) { | 234 ScriptsRunInfo* scripts_run_info) { |
201 DCHECK(extension); | 235 DCHECK(host); |
202 DCHECK(scripts_run_info); | 236 DCHECK(scripts_run_info); |
203 DCHECK(!complete_); | 237 DCHECK(!complete_); |
204 | 238 |
205 if (ShouldNotifyBrowserOfInjections()) | 239 if (ShouldNotifyBrowserOfInjections()) |
206 RequestPermission(); | 240 RequestPermission(); |
207 | 241 |
208 std::vector<blink::WebFrame*> frame_vector; | 242 std::vector<blink::WebFrame*> frame_vector; |
209 frame_vector.push_back(web_frame_); | 243 frame_vector.push_back(web_frame_); |
210 if (injector_->ShouldExecuteInChildFrames()) | 244 if (injector_->ShouldExecuteInChildFrames()) |
211 AppendAllChildFrames(web_frame_, &frame_vector); | 245 AppendAllChildFrames(web_frame_, &frame_vector); |
(...skipping 10 matching lines...) Expand all Loading... | |
222 GURL top_url = web_frame_->top()->document().url(); | 256 GURL top_url = web_frame_->top()->document().url(); |
223 for (std::vector<blink::WebFrame*>::iterator iter = frame_vector.begin(); | 257 for (std::vector<blink::WebFrame*>::iterator iter = frame_vector.begin(); |
224 iter != frame_vector.end(); | 258 iter != frame_vector.end(); |
225 ++iter) { | 259 ++iter) { |
226 // TODO(dcheng): Unfortunately, the code as written won't work in an OOPI | 260 // TODO(dcheng): Unfortunately, the code as written won't work in an OOPI |
227 // world. This is just a temporary hack to make things compile. | 261 // world. This is just a temporary hack to make things compile. |
228 blink::WebLocalFrame* frame = (*iter)->toWebLocalFrame(); | 262 blink::WebLocalFrame* frame = (*iter)->toWebLocalFrame(); |
229 | 263 |
230 // We recheck access here in the renderer for extra safety against races | 264 // We recheck access here in the renderer for extra safety against races |
231 // with navigation, but different frames can have different URLs, and the | 265 // with navigation, but different frames can have different URLs, and the |
232 // extension might only have access to a subset of them. | 266 // host might only have access to a subset of them. |
233 // For child frames, we just skip ones the extension doesn't have access | 267 // For child frames, we just skip ones the host doesn't have access |
234 // to and carry on. | 268 // to and carry on. |
235 // Note: we don't consider ACCESS_WITHHELD because there is nowhere to | 269 // Note: we don't consider ACCESS_WITHHELD because there is nowhere to |
236 // surface a request for a child frame. | 270 // surface a request for a child frame. |
237 // TODO(rdevlin.cronin): We should ask for permission somehow. | 271 // TODO(rdevlin.cronin): We should ask for permission somehow. |
272 const Extension* extension = | |
273 static_cast<const ExtensionConsumer*>(host)->extension(); | |
238 if (injector_->CanExecuteOnFrame(extension, frame, tab_id_, top_url) == | 274 if (injector_->CanExecuteOnFrame(extension, frame, tab_id_, top_url) == |
239 PermissionsData::ACCESS_DENIED) { | 275 PermissionsData::ACCESS_DENIED) { |
240 DCHECK(frame->parent()); | 276 DCHECK(frame->parent()); |
241 continue; | 277 continue; |
242 } | 278 } |
243 if (inject_js) | 279 if (inject_js) |
244 InjectJs(extension, frame, execution_results.get()); | 280 InjectJs(host, frame, execution_results.get()); |
245 if (inject_css) | 281 if (inject_css) |
246 InjectCss(frame); | 282 InjectCss(frame); |
247 } | 283 } |
248 | 284 |
249 complete_ = true; | 285 complete_ = true; |
250 injector_->OnInjectionComplete(execution_results.Pass(), | 286 injector_->OnInjectionComplete(execution_results.Pass(), |
251 scripts_run_info, | 287 scripts_run_info, |
252 run_location_); | 288 run_location_); |
253 } | 289 } |
254 | 290 |
255 void ScriptInjection::InjectJs(const Extension* extension, | 291 void ScriptInjection::InjectJs(const Host* host, |
256 blink::WebLocalFrame* frame, | 292 blink::WebLocalFrame* frame, |
257 base::ListValue* execution_results) { | 293 base::ListValue* execution_results) { |
258 std::vector<blink::WebScriptSource> sources = | 294 std::vector<blink::WebScriptSource> sources = |
259 injector_->GetJsSources(run_location_); | 295 injector_->GetJsSources(run_location_); |
260 bool in_main_world = injector_->ShouldExecuteInMainWorld(); | 296 bool in_main_world = injector_->ShouldExecuteInMainWorld(); |
261 int world_id = in_main_world | 297 int world_id = in_main_world |
262 ? DOMActivityLogger::kMainWorldId | 298 ? DOMActivityLogger::kMainWorldId |
263 : GetIsolatedWorldIdForExtension(extension, frame); | 299 : GetIsolatedWorldIdForInstance(host, instance_id_, frame); |
264 bool expects_results = injector_->ExpectsResults(); | 300 bool expects_results = injector_->ExpectsResults(); |
265 | 301 |
266 base::ElapsedTimer exec_timer; | 302 base::ElapsedTimer exec_timer; |
267 DOMActivityLogger::AttachToWorld(world_id, extension->id()); | 303 DOMActivityLogger::AttachToWorld(world_id, host->id().id()); |
268 v8::HandleScope scope(v8::Isolate::GetCurrent()); | 304 v8::HandleScope scope(v8::Isolate::GetCurrent()); |
269 v8::Local<v8::Value> script_value; | 305 v8::Local<v8::Value> script_value; |
270 if (in_main_world) { | 306 if (in_main_world) { |
271 // We only inject in the main world for javascript: urls. | 307 // We only inject in the main world for javascript: urls. |
272 DCHECK_EQ(1u, sources.size()); | 308 DCHECK_EQ(1u, sources.size()); |
273 | 309 |
274 const blink::WebScriptSource& source = sources.front(); | 310 const blink::WebScriptSource& source = sources.front(); |
275 if (expects_results) | 311 if (expects_results) |
276 script_value = frame->executeScriptAndReturnValue(source); | 312 script_value = frame->executeScriptAndReturnValue(source); |
277 else | 313 else |
(...skipping 35 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
313 std::vector<std::string> css_sources = | 349 std::vector<std::string> css_sources = |
314 injector_->GetCssSources(run_location_); | 350 injector_->GetCssSources(run_location_); |
315 for (std::vector<std::string>::const_iterator iter = css_sources.begin(); | 351 for (std::vector<std::string>::const_iterator iter = css_sources.begin(); |
316 iter != css_sources.end(); | 352 iter != css_sources.end(); |
317 ++iter) { | 353 ++iter) { |
318 frame->document().insertStyleSheet(blink::WebString::fromUTF8(*iter)); | 354 frame->document().insertStyleSheet(blink::WebString::fromUTF8(*iter)); |
319 } | 355 } |
320 } | 356 } |
321 | 357 |
322 } // namespace extensions | 358 } // namespace extensions |
OLD | NEW |