// Copyright 2014 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "extensions/renderer/script_injection.h" #include #include "base/lazy_instance.h" #include "base/metrics/histogram.h" #include "base/timer/elapsed_timer.h" #include "base/values.h" #include "content/public/renderer/render_view.h" #include "content/public/renderer/v8_value_converter.h" #include "extensions/common/extension.h" #include "extensions/common/extension_messages.h" #include "extensions/common/feature_switch.h" #include "extensions/common/manifest_handlers/csp_info.h" #include "extensions/renderer/dom_activity_logger.h" #include "extensions/renderer/extension_groups.h" #include "extensions/renderer/extensions_renderer_client.h" #include "third_party/WebKit/public/platform/WebString.h" #include "third_party/WebKit/public/web/WebDocument.h" #include "third_party/WebKit/public/web/WebLocalFrame.h" #include "third_party/WebKit/public/web/WebScopedUserGesture.h" #include "third_party/WebKit/public/web/WebScriptSource.h" #include "third_party/WebKit/public/web/WebSecurityOrigin.h" #include "url/gurl.h" namespace extensions { namespace { typedef std::map IsolatedWorldMap; base::LazyInstance g_isolated_worlds = LAZY_INSTANCE_INITIALIZER; const int64 kInvalidRequestId = -1; // The id of the next pending injection. int64 g_next_pending_id = 0; bool ShouldNotifyBrowserOfInjections() { return !FeatureSwitch::scripts_require_action()->IsEnabled(); } // Append all the child frames of |parent_frame| to |frames_vector|. void AppendAllChildFrames(blink::WebFrame* parent_frame, std::vector* frames_vector) { DCHECK(parent_frame); for (blink::WebFrame* child_frame = parent_frame->firstChild(); child_frame; child_frame = child_frame->nextSibling()) { frames_vector->push_back(child_frame); AppendAllChildFrames(child_frame, frames_vector); } } // Gets the isolated world ID to use for the given |extension| in the given // |frame|. If no isolated world has been created for that extension, // one will be created and initialized. int GetIsolatedWorldIdForExtension(const Extension* extension, blink::WebLocalFrame* frame) { static int g_next_isolated_world_id = ExtensionsRendererClient::Get()->GetLowestIsolatedWorldId(); IsolatedWorldMap& isolated_worlds = g_isolated_worlds.Get(); int id = 0; IsolatedWorldMap::iterator iter = isolated_worlds.find(extension->id()); if (iter != isolated_worlds.end()) { id = iter->second; } else { id = g_next_isolated_world_id++; // This map will tend to pile up over time, but realistically, you're never // going to have enough extensions for it to matter. isolated_worlds[extension->id()] = id; } // We need to set the isolated world origin and CSP even if it's not a new // world since these are stored per frame, and we might not have used this // isolated world in this frame before. frame->setIsolatedWorldSecurityOrigin( id, blink::WebSecurityOrigin::create(extension->url())); frame->setIsolatedWorldContentSecurityPolicy( id, blink::WebString::fromUTF8(CSPInfo::GetContentSecurityPolicy(extension))); frame->setIsolatedWorldHumanReadableName( id, blink::WebString::fromUTF8(extension->name())); return id; } } // namespace // static std::string ScriptInjection::GetExtensionIdForIsolatedWorld( int isolated_world_id) { IsolatedWorldMap& isolated_worlds = g_isolated_worlds.Get(); for (IsolatedWorldMap::iterator iter = isolated_worlds.begin(); iter != isolated_worlds.end(); ++iter) { if (iter->second == isolated_world_id) return iter->first; } return std::string(); } // static void ScriptInjection::RemoveIsolatedWorld(const std::string& extension_id) { g_isolated_worlds.Get().erase(extension_id); } ScriptInjection::ScriptInjection( scoped_ptr injector, blink::WebLocalFrame* web_frame, const std::string& extension_id, UserScript::RunLocation run_location, int tab_id) : injector_(injector.Pass()), web_frame_(web_frame), extension_id_(extension_id), run_location_(run_location), tab_id_(tab_id), request_id_(kInvalidRequestId), complete_(false) { } ScriptInjection::~ScriptInjection() { if (!complete_) injector_->OnWillNotInject(ScriptInjector::WONT_INJECT); } bool ScriptInjection::TryToInject(UserScript::RunLocation current_location, const Extension* extension, ScriptsRunInfo* scripts_run_info) { if (current_location < run_location_) return false; // Wait for the right location. if (request_id_ != kInvalidRequestId) return false; // We're waiting for permission right now, try again later. if (!extension) { NotifyWillNotInject(ScriptInjector::EXTENSION_REMOVED); return true; // We're done. } switch (injector_->CanExecuteOnFrame( extension, web_frame_, tab_id_, web_frame_->top()->document().url())) { case PermissionsData::ACCESS_DENIED: NotifyWillNotInject(ScriptInjector::NOT_ALLOWED); return true; // We're done. case PermissionsData::ACCESS_WITHHELD: RequestPermission(); return false; // Wait around for permission. case PermissionsData::ACCESS_ALLOWED: Inject(extension, scripts_run_info); return true; // We're done! } // Some compilers don't realize that we always return from the switch() above. // Make them happy. return false; } bool ScriptInjection::OnPermissionGranted(const Extension* extension, ScriptsRunInfo* scripts_run_info) { if (!extension) { NotifyWillNotInject(ScriptInjector::EXTENSION_REMOVED); return false; } Inject(extension, scripts_run_info); return true; } void ScriptInjection::RequestPermission() { content::RenderView* render_view = content::RenderView::FromWebView(web_frame()->top()->view()); // If we are just notifying the browser of the injection, then send an // invalid request (which is treated like a notification). request_id_ = ShouldNotifyBrowserOfInjections() ? kInvalidRequestId : g_next_pending_id++; render_view->Send(new ExtensionHostMsg_RequestScriptInjectionPermission( render_view->GetRoutingID(), extension_id_, injector_->script_type(), request_id_)); } void ScriptInjection::NotifyWillNotInject( ScriptInjector::InjectFailureReason reason) { complete_ = true; injector_->OnWillNotInject(reason); } void ScriptInjection::Inject(const Extension* extension, ScriptsRunInfo* scripts_run_info) { DCHECK(extension); DCHECK(scripts_run_info); DCHECK(!complete_); if (ShouldNotifyBrowserOfInjections()) RequestPermission(); std::vector frame_vector; frame_vector.push_back(web_frame_); if (injector_->ShouldExecuteInChildFrames()) AppendAllChildFrames(web_frame_, &frame_vector); scoped_ptr gesture; if (injector_->IsUserGesture()) gesture.reset(new blink::WebScopedUserGesture()); bool inject_js = injector_->ShouldInjectJs(run_location_); bool inject_css = injector_->ShouldInjectCss(run_location_); DCHECK(inject_js || inject_css); scoped_ptr execution_results(new base::ListValue()); GURL top_url = web_frame_->top()->document().url(); for (std::vector::iterator iter = frame_vector.begin(); iter != frame_vector.end(); ++iter) { // TODO(dcheng): Unfortunately, the code as written won't work in an OOPI // world. This is just a temporary hack to make things compile. blink::WebLocalFrame* frame = (*iter)->toWebLocalFrame(); // We recheck access here in the renderer for extra safety against races // with navigation, but different frames can have different URLs, and the // extension might only have access to a subset of them. // For child frames, we just skip ones the extension doesn't have access // to and carry on. // Note: we don't consider ACCESS_WITHHELD because there is nowhere to // surface a request for a child frame. // TODO(rdevlin.cronin): We should ask for permission somehow. if (injector_->CanExecuteOnFrame(extension, frame, tab_id_, top_url) == PermissionsData::ACCESS_DENIED) { DCHECK(frame->parent()); continue; } if (inject_js) InjectJs(extension, frame, execution_results.get()); if (inject_css) InjectCss(frame); } complete_ = true; injector_->OnInjectionComplete(execution_results.Pass(), scripts_run_info, run_location_); } void ScriptInjection::InjectJs(const Extension* extension, blink::WebLocalFrame* frame, base::ListValue* execution_results) { std::vector sources = injector_->GetJsSources(run_location_); bool in_main_world = injector_->ShouldExecuteInMainWorld(); int world_id = in_main_world ? DOMActivityLogger::kMainWorldId : GetIsolatedWorldIdForExtension(extension, frame); bool expects_results = injector_->ExpectsResults(); base::ElapsedTimer exec_timer; DOMActivityLogger::AttachToWorld(world_id, extension->id()); v8::HandleScope scope(v8::Isolate::GetCurrent()); v8::Local script_value; if (in_main_world) { // We only inject in the main world for javascript: urls. DCHECK_EQ(1u, sources.size()); const blink::WebScriptSource& source = sources.front(); if (expects_results) script_value = frame->executeScriptAndReturnValue(source); else frame->executeScript(source); } else { // in isolated world scoped_ptr > > results; if (expects_results) results.reset(new blink::WebVector >()); frame->executeScriptInIsolatedWorld(world_id, &sources.front(), sources.size(), EXTENSION_GROUP_CONTENT_SCRIPTS, results.get()); if (expects_results && !results->isEmpty()) script_value = (*results)[0]; } UMA_HISTOGRAM_TIMES("Extensions.InjectScriptTime", exec_timer.Elapsed()); if (expects_results) { // Right now, we only support returning single results (per frame). scoped_ptr v8_converter( content::V8ValueConverter::create()); // It's safe to always use the main world context when converting // here. V8ValueConverterImpl shouldn't actually care about the // context scope, and it switches to v8::Object's creation context // when encountered. v8::Local context = frame->mainWorldScriptContext(); scoped_ptr result( v8_converter->FromV8Value(script_value, context)); // Always append an execution result (i.e. no result == null result) // so that |execution_results| lines up with the frames. execution_results->Append(result.get() ? result.release() : base::Value::CreateNullValue()); } } void ScriptInjection::InjectCss(blink::WebLocalFrame* frame) { std::vector css_sources = injector_->GetCssSources(run_location_); for (std::vector::const_iterator iter = css_sources.begin(); iter != css_sources.end(); ++iter) { frame->document().insertStyleSheet(blink::WebString::fromUTF8(*iter)); } } } // namespace extensions