Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(95)

Side by Side Diff: extensions/renderer/script_injection.cc

Issue 885493007: Refactoring: de-couple Extensions from "script injection System" [render side] : 1 (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Plumb script_injection_instance_id from WebViewGuest to script injection. Created 5 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2014 The Chromium Authors. All rights reserved. 1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "extensions/renderer/script_injection.h" 5 #include "extensions/renderer/script_injection.h"
6 6
7 #include <map> 7 #include <map>
8 8
9 #include "base/lazy_instance.h" 9 #include "base/lazy_instance.h"
10 #include "base/metrics/histogram.h" 10 #include "base/metrics/histogram.h"
11 #include "base/timer/elapsed_timer.h" 11 #include "base/timer/elapsed_timer.h"
12 #include "base/values.h" 12 #include "base/values.h"
13 #include "content/public/renderer/render_view.h" 13 #include "content/public/renderer/render_view.h"
14 #include "content/public/renderer/v8_value_converter.h" 14 #include "content/public/renderer/v8_value_converter.h"
15 #include "extensions/common/extension.h" 15 #include "extensions/common/extension.h"
16 #include "extensions/common/extension_consumer.h"
16 #include "extensions/common/extension_messages.h" 17 #include "extensions/common/extension_messages.h"
17 #include "extensions/common/feature_switch.h" 18 #include "extensions/common/feature_switch.h"
18 #include "extensions/common/manifest_handlers/csp_info.h" 19 #include "extensions/common/manifest_handlers/csp_info.h"
19 #include "extensions/renderer/dom_activity_logger.h" 20 #include "extensions/renderer/dom_activity_logger.h"
20 #include "extensions/renderer/extension_groups.h" 21 #include "extensions/renderer/extension_groups.h"
21 #include "extensions/renderer/extensions_renderer_client.h" 22 #include "extensions/renderer/extensions_renderer_client.h"
22 #include "third_party/WebKit/public/platform/WebString.h" 23 #include "third_party/WebKit/public/platform/WebString.h"
23 #include "third_party/WebKit/public/web/WebDocument.h" 24 #include "third_party/WebKit/public/web/WebDocument.h"
24 #include "third_party/WebKit/public/web/WebLocalFrame.h" 25 #include "third_party/WebKit/public/web/WebLocalFrame.h"
25 #include "third_party/WebKit/public/web/WebScopedUserGesture.h" 26 #include "third_party/WebKit/public/web/WebScopedUserGesture.h"
26 #include "third_party/WebKit/public/web/WebScriptSource.h" 27 #include "third_party/WebKit/public/web/WebScriptSource.h"
27 #include "third_party/WebKit/public/web/WebSecurityOrigin.h" 28 #include "third_party/WebKit/public/web/WebSecurityOrigin.h"
28 #include "url/gurl.h" 29 #include "url/gurl.h"
29 30
30 namespace extensions { 31 namespace extensions {
31 32
32 namespace { 33 namespace {
33 34
34 typedef std::map<std::string, int> IsolatedWorldMap; 35 using IsolatedWorldKey = std::pair<HostID, int>;
36 using IsolatedWorldMap = std::map<IsolatedWorldKey, int>;
35 base::LazyInstance<IsolatedWorldMap> g_isolated_worlds = 37 base::LazyInstance<IsolatedWorldMap> g_isolated_worlds =
36 LAZY_INSTANCE_INITIALIZER; 38 LAZY_INSTANCE_INITIALIZER;
37 39
38 const int64 kInvalidRequestId = -1; 40 const int64 kInvalidRequestId = -1;
39 41
40 // The id of the next pending injection. 42 // The id of the next pending injection.
41 int64 g_next_pending_id = 0; 43 int64 g_next_pending_id = 0;
42 44
43 bool ShouldNotifyBrowserOfInjections() { 45 bool ShouldNotifyBrowserOfInjections() {
44 return !FeatureSwitch::scripts_require_action()->IsEnabled(); 46 return !FeatureSwitch::scripts_require_action()->IsEnabled();
45 } 47 }
46 48
47 // Append all the child frames of |parent_frame| to |frames_vector|. 49 // Append all the child frames of |parent_frame| to |frames_vector|.
48 void AppendAllChildFrames(blink::WebFrame* parent_frame, 50 void AppendAllChildFrames(blink::WebFrame* parent_frame,
49 std::vector<blink::WebFrame*>* frames_vector) { 51 std::vector<blink::WebFrame*>* frames_vector) {
50 DCHECK(parent_frame); 52 DCHECK(parent_frame);
51 for (blink::WebFrame* child_frame = parent_frame->firstChild(); child_frame; 53 for (blink::WebFrame* child_frame = parent_frame->firstChild(); child_frame;
52 child_frame = child_frame->nextSibling()) { 54 child_frame = child_frame->nextSibling()) {
53 frames_vector->push_back(child_frame); 55 frames_vector->push_back(child_frame);
54 AppendAllChildFrames(child_frame, frames_vector); 56 AppendAllChildFrames(child_frame, frames_vector);
55 } 57 }
56 } 58 }
57 59
58 // Gets the isolated world ID to use for the given |extension| in the given 60 // Gets the isolated world ID to use for the given |host, instance_id|
59 // |frame|. If no isolated world has been created for that extension, 61 // in the given |frame|. If no isolated world has been created for that
60 // one will be created and initialized. 62 // |host, instance_id| one will be created and initialized.
61 int GetIsolatedWorldIdForExtension(const Extension* extension, 63 int GetIsolatedWorldIdForInstance(const Host* host,
62 blink::WebLocalFrame* frame) { 64 int instance_id,
65 blink::WebLocalFrame* frame) {
63 static int g_next_isolated_world_id = 66 static int g_next_isolated_world_id =
64 ExtensionsRendererClient::Get()->GetLowestIsolatedWorldId(); 67 ExtensionsRendererClient::Get()->GetLowestIsolatedWorldId();
65 68
66 IsolatedWorldMap& isolated_worlds = g_isolated_worlds.Get(); 69 IsolatedWorldMap& isolated_worlds = g_isolated_worlds.Get();
67 70
68 int id = 0; 71 int id = 0;
69 IsolatedWorldMap::iterator iter = isolated_worlds.find(extension->id()); 72 const HostID& host_id = host->id();
73 IsolatedWorldKey key(host_id, instance_id);
74 IsolatedWorldMap::iterator iter = isolated_worlds.find(key);
70 if (iter != isolated_worlds.end()) { 75 if (iter != isolated_worlds.end()) {
71 id = iter->second; 76 id = iter->second;
72 } else { 77 } else {
73 id = g_next_isolated_world_id++; 78 id = g_next_isolated_world_id++;
74 // This map will tend to pile up over time, but realistically, you're never 79 // This map will tend to pile up over time, but realistically, you're never
75 // going to have enough extensions for it to matter. 80 // going to have enough hosts for it to matter.
76 isolated_worlds[extension->id()] = id; 81 isolated_worlds[key] = id;
77 } 82 }
78 83
84 GURL origin;
85 std::string name;
86 std::string name_web_view = "WebView";
87 const GURL* origin_ptr = &origin;
88 const std::string* name_ptr = &name;
89
90 if (host_id.type() == HostID::EXTENSIONS) {
91 const Extension* extension =
92 static_cast<const ExtensionConsumer*>(host)->extension();
Devlin 2015/02/04 17:01:14 Generally, having something like class AbstractCla
Xi Han 2015/02/05 16:06:20 Adds some of these functions in the Host class.
93 frame->setIsolatedWorldContentSecurityPolicy(
94 id,
95 blink::WebString::fromUTF8(CSPInfo::GetContentSecurityPolicy(
96 extension)));
97 if (instance_id == 0) { // The instance is a TAB.
98 origin_ptr = &extension->url();
99 name_ptr = &extension->name();
100 }
101 }
102 if (instance_id != 0) // The instance is a <webview>.
103 name_ptr = &name_web_view;
104
79 // We need to set the isolated world origin and CSP even if it's not a new 105 // We need to set the isolated world origin and CSP even if it's not a new
80 // world since these are stored per frame, and we might not have used this 106 // world since these are stored per frame, and we might not have used this
81 // isolated world in this frame before. 107 // isolated world in this frame before.
82 frame->setIsolatedWorldSecurityOrigin( 108 frame->setIsolatedWorldSecurityOrigin(
83 id, blink::WebSecurityOrigin::create(extension->url())); 109 id, blink::WebSecurityOrigin::create(*origin_ptr));
84 frame->setIsolatedWorldContentSecurityPolicy(
85 id,
86 blink::WebString::fromUTF8(CSPInfo::GetContentSecurityPolicy(extension)));
87 frame->setIsolatedWorldHumanReadableName( 110 frame->setIsolatedWorldHumanReadableName(
88 id, 111 id, blink::WebString::fromUTF8(*name_ptr));
89 blink::WebString::fromUTF8(extension->name()));
90 112
91 return id; 113 return id;
92 } 114 }
93 115
94 } // namespace 116 } // namespace
95 117
96 // static 118 // static
97 std::string ScriptInjection::GetExtensionIdForIsolatedWorld( 119 HostID ScriptInjection::GetHostIdForIsolatedWorld(int isolated_world_id) {
98 int isolated_world_id) {
99 IsolatedWorldMap& isolated_worlds = g_isolated_worlds.Get(); 120 IsolatedWorldMap& isolated_worlds = g_isolated_worlds.Get();
Devlin 2015/02/04 17:01:14 const &
Xi Han 2015/02/05 16:06:20 Done.
100 121
101 for (IsolatedWorldMap::iterator iter = isolated_worlds.begin(); 122 for (auto& kv : isolated_worlds) {
Devlin 2015/02/04 17:01:14 const auto&
Xi Han 2015/02/05 16:06:20 Done.
102 iter != isolated_worlds.end(); 123 if (kv.second == isolated_world_id)
103 ++iter) { 124 return kv.first.first;
104 if (iter->second == isolated_world_id)
105 return iter->first;
106 } 125 }
107 return std::string(); 126 return HostID();
108 } 127 }
109 128
110 // static 129 // static
111 void ScriptInjection::RemoveIsolatedWorld(const std::string& extension_id) { 130 void ScriptInjection::RemoveIsolatedWorld(const std::string& host_id) {
112 g_isolated_worlds.Get().erase(extension_id); 131 std::set<IsolatedWorldKey> keys_to_delete;
132 IsolatedWorldMap& isolated_worlds = g_isolated_worlds.Get();
133 for (auto& kv: isolated_worlds) {
134 const IsolatedWorldKey& key = kv.first;
135 if (key.first.id() == host_id)
136 keys_to_delete.insert(key);
137 }
138 for (auto& key : keys_to_delete)
139 isolated_worlds.erase(key);
113 } 140 }
114 141
115 ScriptInjection::ScriptInjection( 142 ScriptInjection::ScriptInjection(
116 scoped_ptr<ScriptInjector> injector, 143 scoped_ptr<ScriptInjector> injector,
117 blink::WebLocalFrame* web_frame, 144 blink::WebLocalFrame* web_frame,
118 const std::string& extension_id, 145 const HostID& host_id,
146 int instance_id,
119 UserScript::RunLocation run_location, 147 UserScript::RunLocation run_location,
120 int tab_id) 148 int tab_id)
121 : injector_(injector.Pass()), 149 : injector_(injector.Pass()),
122 web_frame_(web_frame), 150 web_frame_(web_frame),
123 extension_id_(extension_id), 151 host_id_(host_id),
152 instance_id_(instance_id),
124 run_location_(run_location), 153 run_location_(run_location),
125 tab_id_(tab_id), 154 tab_id_(tab_id),
126 request_id_(kInvalidRequestId), 155 request_id_(kInvalidRequestId),
127 complete_(false) { 156 complete_(false) {
128 } 157 }
129 158
130 ScriptInjection::~ScriptInjection() { 159 ScriptInjection::~ScriptInjection() {
131 if (!complete_) 160 if (!complete_)
132 injector_->OnWillNotInject(ScriptInjector::WONT_INJECT); 161 injector_->OnWillNotInject(ScriptInjector::WONT_INJECT);
133 } 162 }
134 163
135 bool ScriptInjection::TryToInject(UserScript::RunLocation current_location, 164 bool ScriptInjection::TryToInject(UserScript::RunLocation current_location,
136 const Extension* extension, 165 const Host* host,
137 ScriptsRunInfo* scripts_run_info) { 166 ScriptsRunInfo* scripts_run_info) {
138 if (current_location < run_location_) 167 if (current_location < run_location_)
139 return false; // Wait for the right location. 168 return false; // Wait for the right location.
140 169
141 if (request_id_ != kInvalidRequestId) 170 if (request_id_ != kInvalidRequestId)
142 return false; // We're waiting for permission right now, try again later. 171 return false; // We're waiting for permission right now, try again later.
143 172
144 if (!extension) { 173 if (!host) {
145 NotifyWillNotInject(ScriptInjector::EXTENSION_REMOVED); 174 NotifyWillNotInject(ScriptInjector::EXTENSION_REMOVED);
146 return true; // We're done. 175 return true; // We're done.
147 } 176 }
148 177
178 const Extension* extension =
179 static_cast<const ExtensionConsumer*>(host)->extension();
Devlin 2015/02/04 17:01:14 This feels very unfinished to me. I think I'd rat
Xi Han 2015/02/05 16:06:20 I updated all the if(!host) check, it is a great c
180
181 // TODO(hanxi): refactor ScriptInjection::CanExecuteOnFrame(...) and pass in
182 // Host.
149 switch (injector_->CanExecuteOnFrame( 183 switch (injector_->CanExecuteOnFrame(
150 extension, web_frame_, tab_id_, web_frame_->top()->document().url())) { 184 extension, web_frame_, tab_id_, web_frame_->top()->document().url())) {
151 case PermissionsData::ACCESS_DENIED: 185 case PermissionsData::ACCESS_DENIED:
152 NotifyWillNotInject(ScriptInjector::NOT_ALLOWED); 186 NotifyWillNotInject(ScriptInjector::NOT_ALLOWED);
153 return true; // We're done. 187 return true; // We're done.
154 case PermissionsData::ACCESS_WITHHELD: 188 case PermissionsData::ACCESS_WITHHELD:
155 RequestPermission(); 189 RequestPermission();
156 return false; // Wait around for permission. 190 return false; // Wait around for permission.
157 case PermissionsData::ACCESS_ALLOWED: 191 case PermissionsData::ACCESS_ALLOWED:
158 Inject(extension, scripts_run_info); 192 Inject(host, scripts_run_info);
159 return true; // We're done! 193 return true; // We're done!
160 } 194 }
161 195
162 // Some compilers don't realize that we always return from the switch() above. 196 // Some compilers don't realize that we always return from the switch() above.
163 // Make them happy. 197 // Make them happy.
164 return false; 198 return false;
165 } 199 }
166 200
167 bool ScriptInjection::OnPermissionGranted(const Extension* extension, 201 bool ScriptInjection::OnPermissionGranted(const Host* host,
168 ScriptsRunInfo* scripts_run_info) { 202 ScriptsRunInfo* scripts_run_info) {
169 if (!extension) { 203 if (!host) {
170 NotifyWillNotInject(ScriptInjector::EXTENSION_REMOVED); 204 NotifyWillNotInject(ScriptInjector::EXTENSION_REMOVED);
171 return false; 205 return false;
172 } 206 }
173 207
174 Inject(extension, scripts_run_info); 208 Inject(host, scripts_run_info);
175 return true; 209 return true;
176 } 210 }
177 211
178 void ScriptInjection::RequestPermission() { 212 void ScriptInjection::RequestPermission() {
179 content::RenderView* render_view = 213 content::RenderView* render_view =
180 content::RenderView::FromWebView(web_frame()->top()->view()); 214 content::RenderView::FromWebView(web_frame()->top()->view());
181 215
182 // If we are just notifying the browser of the injection, then send an 216 // If we are just notifying the browser of the injection, then send an
183 // invalid request (which is treated like a notification). 217 // invalid request (which is treated like a notification).
184 request_id_ = ShouldNotifyBrowserOfInjections() ? kInvalidRequestId 218 request_id_ = ShouldNotifyBrowserOfInjections() ? kInvalidRequestId
185 : g_next_pending_id++; 219 : g_next_pending_id++;
186 render_view->Send(new ExtensionHostMsg_RequestScriptInjectionPermission( 220 render_view->Send(new ExtensionHostMsg_RequestScriptInjectionPermission(
187 render_view->GetRoutingID(), 221 render_view->GetRoutingID(),
188 extension_id_, 222 host_id_.id(),
189 injector_->script_type(), 223 injector_->script_type(),
190 request_id_)); 224 request_id_));
191 } 225 }
192 226
193 void ScriptInjection::NotifyWillNotInject( 227 void ScriptInjection::NotifyWillNotInject(
194 ScriptInjector::InjectFailureReason reason) { 228 ScriptInjector::InjectFailureReason reason) {
195 complete_ = true; 229 complete_ = true;
196 injector_->OnWillNotInject(reason); 230 injector_->OnWillNotInject(reason);
197 } 231 }
198 232
199 void ScriptInjection::Inject(const Extension* extension, 233 void ScriptInjection::Inject(const Host* host,
200 ScriptsRunInfo* scripts_run_info) { 234 ScriptsRunInfo* scripts_run_info) {
201 DCHECK(extension); 235 DCHECK(host);
202 DCHECK(scripts_run_info); 236 DCHECK(scripts_run_info);
203 DCHECK(!complete_); 237 DCHECK(!complete_);
204 238
205 if (ShouldNotifyBrowserOfInjections()) 239 if (ShouldNotifyBrowserOfInjections())
206 RequestPermission(); 240 RequestPermission();
207 241
208 std::vector<blink::WebFrame*> frame_vector; 242 std::vector<blink::WebFrame*> frame_vector;
209 frame_vector.push_back(web_frame_); 243 frame_vector.push_back(web_frame_);
210 if (injector_->ShouldExecuteInChildFrames()) 244 if (injector_->ShouldExecuteInChildFrames())
211 AppendAllChildFrames(web_frame_, &frame_vector); 245 AppendAllChildFrames(web_frame_, &frame_vector);
(...skipping 10 matching lines...) Expand all
222 GURL top_url = web_frame_->top()->document().url(); 256 GURL top_url = web_frame_->top()->document().url();
223 for (std::vector<blink::WebFrame*>::iterator iter = frame_vector.begin(); 257 for (std::vector<blink::WebFrame*>::iterator iter = frame_vector.begin();
224 iter != frame_vector.end(); 258 iter != frame_vector.end();
225 ++iter) { 259 ++iter) {
226 // TODO(dcheng): Unfortunately, the code as written won't work in an OOPI 260 // TODO(dcheng): Unfortunately, the code as written won't work in an OOPI
227 // world. This is just a temporary hack to make things compile. 261 // world. This is just a temporary hack to make things compile.
228 blink::WebLocalFrame* frame = (*iter)->toWebLocalFrame(); 262 blink::WebLocalFrame* frame = (*iter)->toWebLocalFrame();
229 263
230 // We recheck access here in the renderer for extra safety against races 264 // We recheck access here in the renderer for extra safety against races
231 // with navigation, but different frames can have different URLs, and the 265 // with navigation, but different frames can have different URLs, and the
232 // extension might only have access to a subset of them. 266 // host might only have access to a subset of them.
233 // For child frames, we just skip ones the extension doesn't have access 267 // For child frames, we just skip ones the host doesn't have access
234 // to and carry on. 268 // to and carry on.
235 // Note: we don't consider ACCESS_WITHHELD because there is nowhere to 269 // Note: we don't consider ACCESS_WITHHELD because there is nowhere to
236 // surface a request for a child frame. 270 // surface a request for a child frame.
237 // TODO(rdevlin.cronin): We should ask for permission somehow. 271 // TODO(rdevlin.cronin): We should ask for permission somehow.
272 const Extension* extension =
273 static_cast<const ExtensionConsumer*>(host)->extension();
238 if (injector_->CanExecuteOnFrame(extension, frame, tab_id_, top_url) == 274 if (injector_->CanExecuteOnFrame(extension, frame, tab_id_, top_url) ==
239 PermissionsData::ACCESS_DENIED) { 275 PermissionsData::ACCESS_DENIED) {
240 DCHECK(frame->parent()); 276 DCHECK(frame->parent());
241 continue; 277 continue;
242 } 278 }
243 if (inject_js) 279 if (inject_js)
244 InjectJs(extension, frame, execution_results.get()); 280 InjectJs(host, frame, execution_results.get());
245 if (inject_css) 281 if (inject_css)
246 InjectCss(frame); 282 InjectCss(frame);
247 } 283 }
248 284
249 complete_ = true; 285 complete_ = true;
250 injector_->OnInjectionComplete(execution_results.Pass(), 286 injector_->OnInjectionComplete(execution_results.Pass(),
251 scripts_run_info, 287 scripts_run_info,
252 run_location_); 288 run_location_);
253 } 289 }
254 290
255 void ScriptInjection::InjectJs(const Extension* extension, 291 void ScriptInjection::InjectJs(const Host* host,
256 blink::WebLocalFrame* frame, 292 blink::WebLocalFrame* frame,
257 base::ListValue* execution_results) { 293 base::ListValue* execution_results) {
258 std::vector<blink::WebScriptSource> sources = 294 std::vector<blink::WebScriptSource> sources =
259 injector_->GetJsSources(run_location_); 295 injector_->GetJsSources(run_location_);
260 bool in_main_world = injector_->ShouldExecuteInMainWorld(); 296 bool in_main_world = injector_->ShouldExecuteInMainWorld();
261 int world_id = in_main_world 297 int world_id = in_main_world
262 ? DOMActivityLogger::kMainWorldId 298 ? DOMActivityLogger::kMainWorldId
263 : GetIsolatedWorldIdForExtension(extension, frame); 299 : GetIsolatedWorldIdForInstance(host, instance_id_, frame);
264 bool expects_results = injector_->ExpectsResults(); 300 bool expects_results = injector_->ExpectsResults();
265 301
266 base::ElapsedTimer exec_timer; 302 base::ElapsedTimer exec_timer;
267 DOMActivityLogger::AttachToWorld(world_id, extension->id()); 303 DOMActivityLogger::AttachToWorld(world_id, host->id().id());
268 v8::HandleScope scope(v8::Isolate::GetCurrent()); 304 v8::HandleScope scope(v8::Isolate::GetCurrent());
269 v8::Local<v8::Value> script_value; 305 v8::Local<v8::Value> script_value;
270 if (in_main_world) { 306 if (in_main_world) {
271 // We only inject in the main world for javascript: urls. 307 // We only inject in the main world for javascript: urls.
272 DCHECK_EQ(1u, sources.size()); 308 DCHECK_EQ(1u, sources.size());
273 309
274 const blink::WebScriptSource& source = sources.front(); 310 const blink::WebScriptSource& source = sources.front();
275 if (expects_results) 311 if (expects_results)
276 script_value = frame->executeScriptAndReturnValue(source); 312 script_value = frame->executeScriptAndReturnValue(source);
277 else 313 else
(...skipping 35 matching lines...) Expand 10 before | Expand all | Expand 10 after
313 std::vector<std::string> css_sources = 349 std::vector<std::string> css_sources =
314 injector_->GetCssSources(run_location_); 350 injector_->GetCssSources(run_location_);
315 for (std::vector<std::string>::const_iterator iter = css_sources.begin(); 351 for (std::vector<std::string>::const_iterator iter = css_sources.begin();
316 iter != css_sources.end(); 352 iter != css_sources.end();
317 ++iter) { 353 ++iter) {
318 frame->document().insertStyleSheet(blink::WebString::fromUTF8(*iter)); 354 frame->document().insertStyleSheet(blink::WebString::fromUTF8(*iter));
319 } 355 }
320 } 356 }
321 357
322 } // namespace extensions 358 } // namespace extensions
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698