2019-07-24 23:01:08 +00:00
|
|
|
// Copyright 2014 The Chromium Authors. All rights reserved.
|
|
|
|
// Use of this source code is governed by a BSD-style license that can be
|
|
|
|
// found in the LICENSE file.
|
|
|
|
|
2020-02-03 22:01:10 +00:00
|
|
|
#include "shell/browser/extensions/electron_extensions_browser_client.h"
|
2019-07-24 23:01:08 +00:00
|
|
|
|
2022-06-01 06:12:47 +00:00
|
|
|
#include <algorithm>
|
2019-07-24 23:01:08 +00:00
|
|
|
#include <utility>
|
|
|
|
|
2023-02-03 11:43:42 +00:00
|
|
|
#include "base/functional/bind.h"
|
2019-07-24 23:01:08 +00:00
|
|
|
#include "base/memory/ptr_util.h"
|
2020-02-13 00:39:12 +00:00
|
|
|
#include "base/path_service.h"
|
2019-07-24 23:01:08 +00:00
|
|
|
#include "build/build_config.h"
|
2020-02-13 00:39:12 +00:00
|
|
|
#include "chrome/browser/extensions/chrome_url_request_util.h"
|
|
|
|
#include "chrome/common/chrome_paths.h"
|
|
|
|
#include "chrome/common/extensions/chrome_manifest_url_handlers.h"
|
2019-07-24 23:01:08 +00:00
|
|
|
#include "components/version_info/version_info.h"
|
|
|
|
#include "content/public/browser/browser_context.h"
|
|
|
|
#include "content/public/browser/browser_task_traits.h"
|
|
|
|
#include "content/public/browser/browser_thread.h"
|
|
|
|
#include "content/public/browser/render_frame_host.h"
|
|
|
|
#include "content/public/common/user_agent.h"
|
2022-12-05 22:59:19 +00:00
|
|
|
#include "extensions/browser/api/core_extensions_browser_api_provider.h"
|
2019-07-24 23:01:08 +00:00
|
|
|
#include "extensions/browser/api/extensions_api_client.h"
|
|
|
|
#include "extensions/browser/component_extension_resource_manager.h"
|
|
|
|
#include "extensions/browser/event_router.h"
|
2020-02-13 00:39:12 +00:00
|
|
|
#include "extensions/browser/extension_protocols.h"
|
2020-03-11 11:15:07 +00:00
|
|
|
#include "extensions/browser/extensions_browser_interface_binders.h"
|
2019-07-24 23:01:08 +00:00
|
|
|
#include "extensions/browser/null_app_sorting.h"
|
|
|
|
#include "extensions/browser/updater/null_extension_cache.h"
|
|
|
|
#include "extensions/browser/url_request_util.h"
|
|
|
|
#include "extensions/common/features/feature_channel.h"
|
2020-02-13 00:39:12 +00:00
|
|
|
#include "extensions/common/file_util.h"
|
2020-01-15 00:20:30 +00:00
|
|
|
#include "extensions/common/manifest_constants.h"
|
|
|
|
#include "extensions/common/manifest_url_handlers.h"
|
2020-02-13 00:39:12 +00:00
|
|
|
#include "net/base/mime_util.h"
|
2020-01-15 00:20:30 +00:00
|
|
|
#include "services/network/public/mojom/url_loader.mojom.h"
|
2019-07-24 23:01:08 +00:00
|
|
|
#include "shell/browser/browser.h"
|
2020-02-03 22:01:10 +00:00
|
|
|
#include "shell/browser/electron_browser_client.h"
|
|
|
|
#include "shell/browser/electron_browser_context.h"
|
|
|
|
#include "shell/browser/extensions/api/runtime/electron_runtime_api_delegate.h"
|
2020-02-13 00:39:12 +00:00
|
|
|
#include "shell/browser/extensions/electron_component_extension_resource_manager.h"
|
2020-02-03 22:01:10 +00:00
|
|
|
#include "shell/browser/extensions/electron_extension_host_delegate.h"
|
|
|
|
#include "shell/browser/extensions/electron_extension_system_factory.h"
|
|
|
|
#include "shell/browser/extensions/electron_extension_web_contents_observer.h"
|
2020-01-13 22:55:58 +00:00
|
|
|
#include "shell/browser/extensions/electron_extensions_api_client.h"
|
2020-01-15 23:11:51 +00:00
|
|
|
#include "shell/browser/extensions/electron_extensions_browser_api_provider.h"
|
2020-04-24 01:55:17 +00:00
|
|
|
#include "shell/browser/extensions/electron_kiosk_delegate.h"
|
2020-02-03 22:01:10 +00:00
|
|
|
#include "shell/browser/extensions/electron_navigation_ui_data.h"
|
2020-01-13 22:55:58 +00:00
|
|
|
#include "shell/browser/extensions/electron_process_manager_delegate.h"
|
2020-02-13 00:39:12 +00:00
|
|
|
#include "ui/base/resource/resource_bundle.h"
|
2019-07-24 23:01:08 +00:00
|
|
|
|
|
|
|
using content::BrowserContext;
|
|
|
|
using content::BrowserThread;
|
2020-02-13 00:39:12 +00:00
|
|
|
using extensions::ExtensionsBrowserClient;
|
2019-07-24 23:01:08 +00:00
|
|
|
|
|
|
|
namespace electron {
|
|
|
|
|
2020-02-03 22:01:10 +00:00
|
|
|
ElectronExtensionsBrowserClient::ElectronExtensionsBrowserClient()
|
2021-06-08 02:00:05 +00:00
|
|
|
: api_client_(std::make_unique<extensions::ElectronExtensionsAPIClient>()),
|
|
|
|
process_manager_delegate_(
|
|
|
|
std::make_unique<extensions::ElectronProcessManagerDelegate>()),
|
|
|
|
extension_cache_(std::make_unique<extensions::NullExtensionCache>()) {
|
2020-01-13 22:55:58 +00:00
|
|
|
// Electron does not have a concept of channel, so leave UNKNOWN to
|
2019-07-24 23:01:08 +00:00
|
|
|
// enable all channel-dependent extension APIs.
|
|
|
|
extensions::SetCurrentChannel(version_info::Channel::UNKNOWN);
|
2021-06-08 02:00:05 +00:00
|
|
|
resource_manager_ =
|
|
|
|
std::make_unique<extensions::ElectronComponentExtensionResourceManager>();
|
2019-07-24 23:01:08 +00:00
|
|
|
|
|
|
|
AddAPIProvider(
|
|
|
|
std::make_unique<extensions::CoreExtensionsBrowserAPIProvider>());
|
2020-01-15 23:11:51 +00:00
|
|
|
AddAPIProvider(
|
|
|
|
std::make_unique<extensions::ElectronExtensionsBrowserAPIProvider>());
|
2019-07-24 23:01:08 +00:00
|
|
|
}
|
|
|
|
|
2021-06-04 04:16:13 +00:00
|
|
|
ElectronExtensionsBrowserClient::~ElectronExtensionsBrowserClient() = default;
|
2019-07-24 23:01:08 +00:00
|
|
|
|
2020-02-03 22:01:10 +00:00
|
|
|
bool ElectronExtensionsBrowserClient::IsShuttingDown() {
|
2019-07-24 23:01:08 +00:00
|
|
|
return electron::Browser::Get()->is_shutting_down();
|
|
|
|
}
|
|
|
|
|
2020-02-03 22:01:10 +00:00
|
|
|
bool ElectronExtensionsBrowserClient::AreExtensionsDisabled(
|
2019-07-24 23:01:08 +00:00
|
|
|
const base::CommandLine& command_line,
|
|
|
|
BrowserContext* context) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
chore: bump chromium to 118.0.5975.0 (main) (#39531)
* chore: bump chromium in DEPS to 118.0.5951.0
* chore: update printing.patch
Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4727894
No logic changes, but patch needed to be manually re-applied due to upstream code shear
* chore: update port_autofill_colors_to_the_color_pipeline.patch
No manual changes; patch applied with fuzz
* chore: update patches
* chore: bump chromium in DEPS to 118.0.5953.0
* chore: update patches
* chore: bump chromium in DEPS to 118.0.5955.0
* chore: update patches
* chore: bump chromium in DEPS to 118.0.5957.0
* chore: update patches
* chore: include path of native_web_keyboard_event.h
Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4758689
* chore: remove reference to eextensions/browser/notification-types.h
Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4771627
* chore: update references to renamed upstream field NativeWebKeyboardEvent.skip_if_unhandled (formerly known as skip_in_browser
Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4758689
Need a second pair of eyes on this commit. In particular the reference in content_converter.cc, skipInBrowser, seems to not be set or documented anywhere? Is this unused/vestigal code?
* chore: sync signature of ElectronExtensionsBrowserClient::IsValidContext() to upstream change
Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4784198
* chore: add auto_pip_setting_helper.[cc,h] to chromium_src build
Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4688277
Exiting upstream code used by chromium_src now depends on this new upstream class
* chore: bump chromium in DEPS to 118.0.5959.0
* chore: update add_maximized_parameter_to_linuxui_getwindowframeprovider.patch
Xref: add_maximized_parameter_to_linuxui_getwindowframeprovider.patch
manually adjust patch to minor upstream chagnes
* chore: update patches
* chore: bump chromium in DEPS to 118.0.5961.0
* chore: bump chromium in DEPS to 118.0.5963.0
* chore: update patches
* 4780994: Rename various base files to "apple" since iOS uses them too
https://chromium-review.googlesource.com/c/chromium/src/+/4780994
* Many files moved from `mac` -> `apple`
This commit follows a handful of CLs that simply rename files/symbols to change `mac`
to `apple`
to signify their use across both macOS and iOS:
- 4784010: Move scoped_nsautorelease_pool to base/apple, leave a forwarding header
- 4790744: Move foundation_util to base/apple, leave a forwarding header
- 4790741: Move scoped_cftypreref to base/apple, leave a forwarding header
- 4787627: Move and rename macOS+iOS base/ files in PA to "apple"
- 4780399: Move OSStatus logging to base/apple
- 4787387: Remove forwarding headers
- 4781113: Rename message_pump_mac to "apple" because iOS uses it too
* fixup minor patch update error
A function param got dropped from this patch somewhere earlier
* chore: bump chromium in DEPS to 118.0.5965.2
* chore: update patches
* 4799213: Move ScopedTypeRef and ScopedCFTypeRef into base::apple::
https://chromium-review.googlesource.com/c/chromium/src/+/4799213
* Fix removed include to BrowserContext
In crrev.com/c/4767962 an include to BrowserContext was removed,
which was necessary for compilation. This broke only for us because
"chrome/browser/profiles/profile.h" includes that class, but we remove
all references to profiles.
* chore: bump chromium in DEPS to 118.0.5967.0
* chore: update patches
* chore: bump chromium in DEPS to 118.0.5969.0
* chore: update patches
* chore: bump chromium in DEPS to 118.0.5971.0
* chore: bump chromium in DEPS to 118.0.5973.0
* chore: update patches
* 4772121: [OOPIF PDF] Replace PDFWebContentsHelper with PDFDocumentHelper
https://chromium-review.googlesource.com/c/chromium/src/+/4772121
* 4811164: [Extensions] Do some cleanup in ChromeManagementAPIDelegate.
https://chromium-review.googlesource.com/c/chromium/src/+/4811164
* 4809488: Remove duplicate dnd functionality between Web and Renderer prefs
https://chromium-review.googlesource.com/c/chromium/src/+/4809488
Given that this is no longer an option of web preferences, we should
consider deprecating this option and then removing it.
* chore: bump chromium in DEPS to 118.0.5975.0
* chore: update patches
* fixup! chore: add auto_pip_settings_helper.{cc|h} to chromium_src build
* Reland "[windows] Remove RegKey::DeleteEmptyKey"
Refs https://chromium-review.googlesource.com/c/chromium/src/+/4813255
* Ensure StrCat means StrCat
Refs https://chromium-review.googlesource.com/c/chromium/src/+/1117180
* fixup! Remove RegKey::DeleteEmptyKey
* Consistently reject large p and large q in DH
Refs https://boringssl-review.googlesource.com/c/boringssl/+/62226
---------
Co-authored-by: electron-roller[bot] <84116207+electron-roller[bot]@users.noreply.github.com>
Co-authored-by: Charles Kerr <charles@charleskerr.com>
Co-authored-by: PatchUp <73610968+patchup[bot]@users.noreply.github.com>
Co-authored-by: clavin <clavin@electronjs.org>
Co-authored-by: deepak1556 <hop2deep@gmail.com>
2023-09-01 06:54:59 +00:00
|
|
|
bool ElectronExtensionsBrowserClient::IsValidContext(void* context) {
|
2020-08-17 20:21:53 +00:00
|
|
|
auto& context_map = ElectronBrowserContext::browser_context_map();
|
2019-07-24 23:01:08 +00:00
|
|
|
for (auto const& entry : context_map) {
|
|
|
|
if (entry.second && entry.second.get() == context)
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2020-02-03 22:01:10 +00:00
|
|
|
bool ElectronExtensionsBrowserClient::IsSameContext(BrowserContext* first,
|
|
|
|
BrowserContext* second) {
|
2019-07-24 23:01:08 +00:00
|
|
|
return first == second;
|
|
|
|
}
|
|
|
|
|
2020-02-03 22:01:10 +00:00
|
|
|
bool ElectronExtensionsBrowserClient::HasOffTheRecordContext(
|
2019-07-24 23:01:08 +00:00
|
|
|
BrowserContext* context) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2020-02-03 22:01:10 +00:00
|
|
|
BrowserContext* ElectronExtensionsBrowserClient::GetOffTheRecordContext(
|
2019-07-24 23:01:08 +00:00
|
|
|
BrowserContext* context) {
|
|
|
|
// app_shell only supports a single context.
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
2020-02-03 22:01:10 +00:00
|
|
|
BrowserContext* ElectronExtensionsBrowserClient::GetOriginalContext(
|
2019-07-24 23:01:08 +00:00
|
|
|
BrowserContext* context) {
|
|
|
|
DCHECK(context);
|
|
|
|
if (context->IsOffTheRecord()) {
|
2020-08-17 20:21:53 +00:00
|
|
|
return ElectronBrowserContext::From("", false);
|
2019-07-24 23:01:08 +00:00
|
|
|
} else {
|
|
|
|
return context;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-10-03 20:21:00 +00:00
|
|
|
content::BrowserContext*
|
2023-07-16 14:14:43 +00:00
|
|
|
ElectronExtensionsBrowserClient::GetContextRedirectedToOriginal(
|
2022-10-03 20:21:00 +00:00
|
|
|
content::BrowserContext* context,
|
2023-07-16 14:14:43 +00:00
|
|
|
bool force_guest_profile) {
|
2022-10-03 20:21:00 +00:00
|
|
|
return GetOriginalContext(context);
|
|
|
|
}
|
|
|
|
|
2023-07-16 14:14:43 +00:00
|
|
|
content::BrowserContext* ElectronExtensionsBrowserClient::GetContextOwnInstance(
|
2022-10-03 20:21:00 +00:00
|
|
|
content::BrowserContext* context,
|
2023-07-16 14:14:43 +00:00
|
|
|
bool force_guest_profile) {
|
2022-10-03 20:21:00 +00:00
|
|
|
return context;
|
|
|
|
}
|
|
|
|
|
2023-07-16 14:14:43 +00:00
|
|
|
content::BrowserContext*
|
|
|
|
ElectronExtensionsBrowserClient::GetContextForOriginalOnly(
|
2022-10-03 20:21:00 +00:00
|
|
|
content::BrowserContext* context,
|
2023-07-16 14:14:43 +00:00
|
|
|
bool force_guest_profile) {
|
2022-10-03 20:21:00 +00:00
|
|
|
return context->IsOffTheRecord() ? nullptr : context;
|
|
|
|
}
|
|
|
|
|
2023-07-20 07:36:59 +00:00
|
|
|
bool ElectronExtensionsBrowserClient::AreExtensionsDisabledForContext(
|
|
|
|
content::BrowserContext* context) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2020-02-03 22:01:10 +00:00
|
|
|
bool ElectronExtensionsBrowserClient::IsGuestSession(
|
2019-07-24 23:01:08 +00:00
|
|
|
BrowserContext* context) const {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2020-02-03 22:01:10 +00:00
|
|
|
bool ElectronExtensionsBrowserClient::IsExtensionIncognitoEnabled(
|
2019-07-24 23:01:08 +00:00
|
|
|
const std::string& extension_id,
|
|
|
|
content::BrowserContext* context) const {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2020-02-03 22:01:10 +00:00
|
|
|
bool ElectronExtensionsBrowserClient::CanExtensionCrossIncognito(
|
2019-07-24 23:01:08 +00:00
|
|
|
const extensions::Extension* extension,
|
|
|
|
content::BrowserContext* context) const {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2020-02-03 22:01:10 +00:00
|
|
|
base::FilePath ElectronExtensionsBrowserClient::GetBundleResourcePath(
|
2019-07-24 23:01:08 +00:00
|
|
|
const network::ResourceRequest& request,
|
|
|
|
const base::FilePath& extension_resources_path,
|
|
|
|
int* resource_id) const {
|
|
|
|
*resource_id = 0;
|
2020-02-13 00:39:12 +00:00
|
|
|
base::FilePath chrome_resources_path;
|
|
|
|
if (!base::PathService::Get(chrome::DIR_RESOURCES, &chrome_resources_path))
|
|
|
|
return base::FilePath();
|
|
|
|
|
|
|
|
// Since component extension resources are included in
|
|
|
|
// component_extension_resources.pak file in |chrome_resources_path|,
|
|
|
|
// calculate the extension |request_relative_path| against
|
|
|
|
// |chrome_resources_path|.
|
|
|
|
if (!chrome_resources_path.IsParent(extension_resources_path))
|
|
|
|
return base::FilePath();
|
|
|
|
|
|
|
|
const base::FilePath request_relative_path =
|
|
|
|
extensions::file_util::ExtensionURLToRelativeFilePath(request.url);
|
|
|
|
if (!ExtensionsBrowserClient::Get()
|
|
|
|
->GetComponentExtensionResourceManager()
|
|
|
|
->IsComponentExtensionResource(extension_resources_path,
|
|
|
|
request_relative_path, resource_id)) {
|
|
|
|
return base::FilePath();
|
|
|
|
}
|
|
|
|
DCHECK_NE(0, *resource_id);
|
|
|
|
|
|
|
|
return request_relative_path;
|
2019-07-24 23:01:08 +00:00
|
|
|
}
|
|
|
|
|
2020-02-03 22:01:10 +00:00
|
|
|
void ElectronExtensionsBrowserClient::LoadResourceFromResourceBundle(
|
2019-07-24 23:01:08 +00:00
|
|
|
const network::ResourceRequest& request,
|
2019-12-11 00:22:35 +00:00
|
|
|
mojo::PendingReceiver<network::mojom::URLLoader> loader,
|
2019-07-24 23:01:08 +00:00
|
|
|
const base::FilePath& resource_relative_path,
|
|
|
|
int resource_id,
|
2021-06-03 08:05:04 +00:00
|
|
|
scoped_refptr<net::HttpResponseHeaders> headers,
|
|
|
|
mojo::PendingRemote<network::mojom::URLLoaderClient> client) {
|
2020-02-13 00:39:12 +00:00
|
|
|
extensions::chrome_url_request_util::LoadResourceFromResourceBundle(
|
|
|
|
request, std::move(loader), resource_relative_path, resource_id,
|
2021-06-03 08:05:04 +00:00
|
|
|
std::move(headers), std::move(client));
|
2019-07-24 23:01:08 +00:00
|
|
|
}
|
|
|
|
|
2020-01-15 00:20:30 +00:00
|
|
|
namespace {
|
2020-12-22 22:14:44 +00:00
|
|
|
bool AllowCrossRendererResourceLoad(
|
|
|
|
const network::ResourceRequest& request,
|
|
|
|
network::mojom::RequestDestination destination,
|
|
|
|
ui::PageTransition page_transition,
|
|
|
|
int child_id,
|
|
|
|
bool is_incognito,
|
|
|
|
const extensions::Extension* extension,
|
|
|
|
const extensions::ExtensionSet& extensions,
|
|
|
|
const extensions::ProcessMap& process_map,
|
|
|
|
bool* allowed) {
|
2020-01-15 00:20:30 +00:00
|
|
|
if (extensions::url_request_util::AllowCrossRendererResourceLoad(
|
2020-12-22 22:14:44 +00:00
|
|
|
request, destination, page_transition, child_id, is_incognito,
|
2020-01-15 00:20:30 +00:00
|
|
|
extension, extensions, process_map, allowed)) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
// If there aren't any explicitly marked web accessible resources, the
|
|
|
|
// load should be allowed only if it is by DevTools. A close approximation is
|
|
|
|
// checking if the extension contains a DevTools page.
|
2020-02-13 00:39:12 +00:00
|
|
|
if (extension && !extensions::chrome_manifest_urls::GetDevToolsPage(extension)
|
2020-01-15 00:20:30 +00:00
|
|
|
.is_empty()) {
|
|
|
|
*allowed = true;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Couldn't determine if the resource is allowed or not.
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
} // namespace
|
|
|
|
|
2020-02-03 22:01:10 +00:00
|
|
|
bool ElectronExtensionsBrowserClient::AllowCrossRendererResourceLoad(
|
2020-12-14 18:57:36 +00:00
|
|
|
const network::ResourceRequest& request,
|
2020-12-22 22:14:44 +00:00
|
|
|
network::mojom::RequestDestination destination,
|
2019-07-24 23:01:08 +00:00
|
|
|
ui::PageTransition page_transition,
|
|
|
|
int child_id,
|
|
|
|
bool is_incognito,
|
|
|
|
const extensions::Extension* extension,
|
|
|
|
const extensions::ExtensionSet& extensions,
|
|
|
|
const extensions::ProcessMap& process_map) {
|
|
|
|
bool allowed = false;
|
2020-01-15 00:20:30 +00:00
|
|
|
if (::electron::AllowCrossRendererResourceLoad(
|
2020-12-22 22:14:44 +00:00
|
|
|
request, destination, page_transition, child_id, is_incognito,
|
2019-07-24 23:01:08 +00:00
|
|
|
extension, extensions, process_map, &allowed)) {
|
|
|
|
return allowed;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Couldn't determine if resource is allowed. Block the load.
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2020-02-03 22:01:10 +00:00
|
|
|
PrefService* ElectronExtensionsBrowserClient::GetPrefServiceForContext(
|
2019-07-24 23:01:08 +00:00
|
|
|
BrowserContext* context) {
|
|
|
|
return static_cast<ElectronBrowserContext*>(context)->prefs();
|
|
|
|
}
|
|
|
|
|
2020-02-03 22:01:10 +00:00
|
|
|
void ElectronExtensionsBrowserClient::GetEarlyExtensionPrefsObservers(
|
2019-07-24 23:01:08 +00:00
|
|
|
content::BrowserContext* context,
|
|
|
|
std::vector<extensions::EarlyExtensionPrefsObserver*>* observers) const {}
|
|
|
|
|
|
|
|
extensions::ProcessManagerDelegate*
|
2020-02-03 22:01:10 +00:00
|
|
|
ElectronExtensionsBrowserClient::GetProcessManagerDelegate() const {
|
2020-01-13 22:55:58 +00:00
|
|
|
return process_manager_delegate_.get();
|
2019-07-24 23:01:08 +00:00
|
|
|
}
|
|
|
|
|
2020-02-03 22:01:10 +00:00
|
|
|
std::unique_ptr<extensions::ExtensionHostDelegate>
|
|
|
|
ElectronExtensionsBrowserClient::
|
2019-07-24 23:01:08 +00:00
|
|
|
CreateExtensionHostDelegate() { // TODO(samuelmaddock):
|
2021-06-08 02:00:05 +00:00
|
|
|
return std::make_unique<extensions::ElectronExtensionHostDelegate>();
|
2019-07-24 23:01:08 +00:00
|
|
|
}
|
|
|
|
|
2020-02-03 22:01:10 +00:00
|
|
|
bool ElectronExtensionsBrowserClient::DidVersionUpdate(
|
|
|
|
BrowserContext* context) {
|
2019-07-24 23:01:08 +00:00
|
|
|
// TODO(jamescook): We might want to tell extensions when app_shell updates.
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2020-02-03 22:01:10 +00:00
|
|
|
void ElectronExtensionsBrowserClient::PermitExternalProtocolHandler() {}
|
2019-07-24 23:01:08 +00:00
|
|
|
|
2020-02-03 22:01:10 +00:00
|
|
|
bool ElectronExtensionsBrowserClient::IsInDemoMode() {
|
2019-07-24 23:01:08 +00:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2020-02-03 22:01:10 +00:00
|
|
|
bool ElectronExtensionsBrowserClient::IsScreensaverInDemoMode(
|
2019-07-24 23:01:08 +00:00
|
|
|
const std::string& app_id) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2020-02-03 22:01:10 +00:00
|
|
|
bool ElectronExtensionsBrowserClient::IsRunningInForcedAppMode() {
|
2019-07-24 23:01:08 +00:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2020-02-03 22:01:10 +00:00
|
|
|
bool ElectronExtensionsBrowserClient::IsAppModeForcedForApp(
|
2019-07-24 23:01:08 +00:00
|
|
|
const extensions::ExtensionId& extension_id) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2020-02-03 22:01:10 +00:00
|
|
|
bool ElectronExtensionsBrowserClient::IsLoggedInAsPublicAccount() {
|
2019-07-24 23:01:08 +00:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
extensions::ExtensionSystemProvider*
|
2020-02-03 22:01:10 +00:00
|
|
|
ElectronExtensionsBrowserClient::GetExtensionSystemFactory() {
|
|
|
|
return extensions::ElectronExtensionSystemFactory::GetInstance();
|
2019-07-24 23:01:08 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
std::unique_ptr<extensions::RuntimeAPIDelegate>
|
2020-02-03 22:01:10 +00:00
|
|
|
ElectronExtensionsBrowserClient::CreateRuntimeAPIDelegate(
|
2019-07-24 23:01:08 +00:00
|
|
|
content::BrowserContext* context) const {
|
2020-02-03 22:01:10 +00:00
|
|
|
return std::make_unique<extensions::ElectronRuntimeAPIDelegate>(context);
|
2019-07-24 23:01:08 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
const extensions::ComponentExtensionResourceManager*
|
2020-02-03 22:01:10 +00:00
|
|
|
ElectronExtensionsBrowserClient::GetComponentExtensionResourceManager() {
|
2020-02-13 00:39:12 +00:00
|
|
|
return resource_manager_.get();
|
2019-07-24 23:01:08 +00:00
|
|
|
}
|
|
|
|
|
2020-02-03 22:01:10 +00:00
|
|
|
void ElectronExtensionsBrowserClient::BroadcastEventToRenderers(
|
2019-07-24 23:01:08 +00:00
|
|
|
extensions::events::HistogramValue histogram_value,
|
|
|
|
const std::string& event_name,
|
2022-06-01 06:12:47 +00:00
|
|
|
base::Value::List args,
|
2019-11-04 23:59:31 +00:00
|
|
|
bool dispatch_to_off_the_record_profiles) {
|
2019-07-24 23:01:08 +00:00
|
|
|
if (!BrowserThread::CurrentlyOn(BrowserThread::UI)) {
|
2022-05-17 16:48:40 +00:00
|
|
|
content::GetUIThreadTaskRunner({})->PostTask(
|
|
|
|
FROM_HERE,
|
2020-02-03 22:01:10 +00:00
|
|
|
base::BindOnce(
|
|
|
|
&ElectronExtensionsBrowserClient::BroadcastEventToRenderers,
|
|
|
|
base::Unretained(this), histogram_value, event_name,
|
|
|
|
std::move(args), dispatch_to_off_the_record_profiles));
|
2019-07-24 23:01:08 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2022-06-01 06:12:47 +00:00
|
|
|
auto event = std::make_unique<extensions::Event>(histogram_value, event_name,
|
2022-07-13 21:26:16 +00:00
|
|
|
args.Clone());
|
|
|
|
for (auto const& [key, browser_context] :
|
|
|
|
ElectronBrowserContext::browser_context_map()) {
|
|
|
|
if (browser_context) {
|
|
|
|
extensions::EventRouter::Get(browser_context.get())
|
2019-07-24 23:01:08 +00:00
|
|
|
->BroadcastEvent(std::move(event));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-02-03 22:01:10 +00:00
|
|
|
extensions::ExtensionCache*
|
|
|
|
ElectronExtensionsBrowserClient::GetExtensionCache() {
|
2019-07-24 23:01:08 +00:00
|
|
|
return extension_cache_.get();
|
|
|
|
}
|
|
|
|
|
2020-02-03 22:01:10 +00:00
|
|
|
bool ElectronExtensionsBrowserClient::IsBackgroundUpdateAllowed() {
|
2019-07-24 23:01:08 +00:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2020-02-03 22:01:10 +00:00
|
|
|
bool ElectronExtensionsBrowserClient::IsMinBrowserVersionSupported(
|
2019-07-24 23:01:08 +00:00
|
|
|
const std::string& min_version) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2020-02-03 22:01:10 +00:00
|
|
|
void ElectronExtensionsBrowserClient::SetAPIClientForTest(
|
2019-07-24 23:01:08 +00:00
|
|
|
extensions::ExtensionsAPIClient* api_client) {
|
|
|
|
api_client_.reset(api_client);
|
|
|
|
}
|
|
|
|
|
|
|
|
extensions::ExtensionWebContentsObserver*
|
2020-02-03 22:01:10 +00:00
|
|
|
ElectronExtensionsBrowserClient::GetExtensionWebContentsObserver(
|
2019-07-24 23:01:08 +00:00
|
|
|
content::WebContents* web_contents) {
|
2020-02-03 22:01:10 +00:00
|
|
|
return extensions::ElectronExtensionWebContentsObserver::FromWebContents(
|
2019-07-24 23:01:08 +00:00
|
|
|
web_contents);
|
|
|
|
}
|
|
|
|
|
2020-02-03 22:01:10 +00:00
|
|
|
extensions::KioskDelegate* ElectronExtensionsBrowserClient::GetKioskDelegate() {
|
2020-04-24 01:55:17 +00:00
|
|
|
if (!kiosk_delegate_)
|
2021-06-08 02:00:05 +00:00
|
|
|
kiosk_delegate_ = std::make_unique<ElectronKioskDelegate>();
|
2020-04-24 01:55:17 +00:00
|
|
|
return kiosk_delegate_.get();
|
2019-07-24 23:01:08 +00:00
|
|
|
}
|
|
|
|
|
2020-02-03 22:01:10 +00:00
|
|
|
bool ElectronExtensionsBrowserClient::IsLockScreenContext(
|
2019-07-24 23:01:08 +00:00
|
|
|
content::BrowserContext* context) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2020-02-03 22:01:10 +00:00
|
|
|
std::string ElectronExtensionsBrowserClient::GetApplicationLocale() {
|
2019-07-24 23:01:08 +00:00
|
|
|
return ElectronBrowserClient::Get()->GetApplicationLocale();
|
|
|
|
}
|
|
|
|
|
2020-02-03 22:01:10 +00:00
|
|
|
std::string ElectronExtensionsBrowserClient::GetUserAgent() const {
|
2019-07-24 23:01:08 +00:00
|
|
|
return ElectronBrowserClient::Get()->GetUserAgent();
|
|
|
|
}
|
|
|
|
|
2020-02-03 22:01:10 +00:00
|
|
|
void ElectronExtensionsBrowserClient::RegisterBrowserInterfaceBindersForFrame(
|
2020-05-26 20:06:26 +00:00
|
|
|
mojo::BinderMapWithContext<content::RenderFrameHost*>* map,
|
2019-12-11 00:22:35 +00:00
|
|
|
content::RenderFrameHost* render_frame_host,
|
2020-03-11 11:15:07 +00:00
|
|
|
const extensions::Extension* extension) const {
|
|
|
|
PopulateExtensionFrameBinders(map, render_frame_host, extension);
|
|
|
|
}
|
2019-12-11 00:22:35 +00:00
|
|
|
|
2019-07-24 23:01:08 +00:00
|
|
|
} // namespace electron
|