2015-06-16 09:23:29 +00:00
|
|
|
// Copyright (c) 2015 GitHub, Inc.
|
|
|
|
// Use of this source code is governed by the MIT license that can be
|
|
|
|
// found in the LICENSE file.
|
|
|
|
|
2019-06-19 20:46:59 +00:00
|
|
|
#include "shell/browser/api/electron_api_session.h"
|
2015-06-16 09:23:29 +00:00
|
|
|
|
2019-08-26 16:47:32 +00:00
|
|
|
#include <algorithm>
|
2018-09-13 00:25:56 +00:00
|
|
|
#include <memory>
|
2020-02-10 22:08:53 +00:00
|
|
|
#include <set>
|
2015-06-24 03:59:11 +00:00
|
|
|
#include <string>
|
2018-09-13 00:25:56 +00:00
|
|
|
#include <utility>
|
2015-07-13 22:13:17 +00:00
|
|
|
#include <vector>
|
2015-06-24 03:59:11 +00:00
|
|
|
|
2019-12-19 13:53:49 +00:00
|
|
|
#include "base/command_line.h"
|
2015-07-26 08:30:02 +00:00
|
|
|
#include "base/files/file_path.h"
|
2016-04-18 04:59:15 +00:00
|
|
|
#include "base/guid.h"
|
2016-01-14 09:31:54 +00:00
|
|
|
#include "base/strings/string_number_conversions.h"
|
2015-07-02 14:12:18 +00:00
|
|
|
#include "base/strings/string_util.h"
|
2021-05-04 03:13:46 +00:00
|
|
|
#include "base/strings/stringprintf.h"
|
2018-01-02 12:03:46 +00:00
|
|
|
#include "chrome/browser/browser_process.h"
|
2020-09-23 20:22:10 +00:00
|
|
|
#include "chrome/common/chrome_switches.h"
|
2015-07-26 08:30:02 +00:00
|
|
|
#include "chrome/common/pref_names.h"
|
2018-04-10 15:58:49 +00:00
|
|
|
#include "components/download/public/common/download_danger_type.h"
|
2019-08-29 03:27:20 +00:00
|
|
|
#include "components/download/public/common/download_url_parameters.h"
|
2016-08-26 22:30:02 +00:00
|
|
|
#include "components/prefs/pref_service.h"
|
2018-10-04 18:08:56 +00:00
|
|
|
#include "components/prefs/value_map_pref_store.h"
|
|
|
|
#include "components/proxy_config/proxy_config_dictionary.h"
|
|
|
|
#include "components/proxy_config/proxy_config_pref_names.h"
|
2020-10-27 06:50:06 +00:00
|
|
|
#include "components/proxy_config/proxy_prefs.h"
|
2022-03-15 20:34:53 +00:00
|
|
|
#include "content/browser/code_cache/generated_code_cache_context.h" // nogncheck
|
2019-01-12 01:00:43 +00:00
|
|
|
#include "content/public/browser/browser_task_traits.h"
|
2015-06-25 08:43:01 +00:00
|
|
|
#include "content/public/browser/browser_thread.h"
|
2018-04-10 15:29:26 +00:00
|
|
|
#include "content/public/browser/download_item_utils.h"
|
2016-11-18 10:43:43 +00:00
|
|
|
#include "content/public/browser/download_manager_delegate.h"
|
2019-05-29 23:43:06 +00:00
|
|
|
#include "content/public/browser/network_service_instance.h"
|
2015-06-25 08:43:01 +00:00
|
|
|
#include "content/public/browser/storage_partition.h"
|
2020-05-19 17:18:12 +00:00
|
|
|
#include "gin/arguments.h"
|
2019-09-18 19:58:00 +00:00
|
|
|
#include "mojo/public/cpp/bindings/pending_remote.h"
|
|
|
|
#include "mojo/public/cpp/bindings/self_owned_receiver.h"
|
2019-04-20 17:20:37 +00:00
|
|
|
#include "net/base/completion_repeating_callback.h"
|
2015-06-24 03:59:11 +00:00
|
|
|
#include "net/base/load_flags.h"
|
2016-05-23 05:29:55 +00:00
|
|
|
#include "net/http/http_auth_handler_factory.h"
|
|
|
|
#include "net/http/http_auth_preferences.h"
|
2018-10-04 18:08:56 +00:00
|
|
|
#include "net/http/http_cache.h"
|
2020-06-04 11:05:37 +00:00
|
|
|
#include "net/http/http_util.h"
|
2019-06-28 22:22:23 +00:00
|
|
|
#include "services/network/network_service.h"
|
2019-04-23 21:39:21 +00:00
|
|
|
#include "services/network/public/cpp/features.h"
|
2020-05-19 17:18:12 +00:00
|
|
|
#include "shell/browser/api/electron_api_app.h"
|
2019-06-19 20:46:59 +00:00
|
|
|
#include "shell/browser/api/electron_api_cookies.h"
|
2019-09-03 22:54:14 +00:00
|
|
|
#include "shell/browser/api/electron_api_data_pipe_holder.h"
|
2019-06-19 20:46:59 +00:00
|
|
|
#include "shell/browser/api/electron_api_download_item.h"
|
|
|
|
#include "shell/browser/api/electron_api_net_log.h"
|
2019-10-24 00:51:06 +00:00
|
|
|
#include "shell/browser/api/electron_api_protocol.h"
|
2020-02-20 23:19:06 +00:00
|
|
|
#include "shell/browser/api/electron_api_service_worker_context.h"
|
2019-10-24 00:51:06 +00:00
|
|
|
#include "shell/browser/api/electron_api_web_request.h"
|
2019-06-19 20:46:59 +00:00
|
|
|
#include "shell/browser/browser.h"
|
|
|
|
#include "shell/browser/electron_browser_context.h"
|
|
|
|
#include "shell/browser/electron_browser_main_parts.h"
|
|
|
|
#include "shell/browser/electron_permission_manager.h"
|
2020-06-22 16:35:24 +00:00
|
|
|
#include "shell/browser/javascript_environment.h"
|
2019-06-19 20:46:59 +00:00
|
|
|
#include "shell/browser/media/media_device_id_salt.h"
|
2019-08-07 15:04:09 +00:00
|
|
|
#include "shell/browser/net/cert_verifier_client.h"
|
2019-06-19 20:46:59 +00:00
|
|
|
#include "shell/browser/session_preferences.h"
|
2019-10-25 13:03:28 +00:00
|
|
|
#include "shell/common/gin_converters/callback_converter.h"
|
|
|
|
#include "shell/common/gin_converters/content_converter.h"
|
|
|
|
#include "shell/common/gin_converters/file_path_converter.h"
|
|
|
|
#include "shell/common/gin_converters/gurl_converter.h"
|
|
|
|
#include "shell/common/gin_converters/net_converter.h"
|
2019-10-31 07:56:00 +00:00
|
|
|
#include "shell/common/gin_converters/value_converter.h"
|
2019-10-25 13:03:28 +00:00
|
|
|
#include "shell/common/gin_helper/dictionary.h"
|
|
|
|
#include "shell/common/gin_helper/object_template_builder.h"
|
2019-06-19 20:46:59 +00:00
|
|
|
#include "shell/common/node_includes.h"
|
|
|
|
#include "shell/common/options_switches.h"
|
2020-02-03 22:01:10 +00:00
|
|
|
#include "shell/common/process_util.h"
|
2022-07-13 21:26:16 +00:00
|
|
|
#include "third_party/blink/public/common/storage_key/storage_key.h"
|
2016-06-22 06:57:51 +00:00
|
|
|
#include "ui/base/l10n/l10n_util.h"
|
2015-06-16 09:23:29 +00:00
|
|
|
|
2019-07-24 23:01:08 +00:00
|
|
|
#if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
|
2020-01-13 22:56:28 +00:00
|
|
|
#include "extensions/browser/extension_registry.h"
|
2020-02-03 22:01:10 +00:00
|
|
|
#include "shell/browser/extensions/electron_extension_system.h"
|
2020-01-13 22:56:28 +00:00
|
|
|
#include "shell/common/gin_converters/extension_converter.h"
|
2019-07-24 23:01:08 +00:00
|
|
|
#endif
|
|
|
|
|
2019-10-31 20:11:51 +00:00
|
|
|
#if BUILDFLAG(ENABLE_BUILTIN_SPELLCHECKER)
|
2019-11-30 22:17:46 +00:00
|
|
|
#include "chrome/browser/spellchecker/spellcheck_factory.h" // nogncheck
|
|
|
|
#include "chrome/browser/spellchecker/spellcheck_service.h" // nogncheck
|
2019-10-31 20:11:51 +00:00
|
|
|
#include "components/spellcheck/browser/pref_names.h"
|
|
|
|
#include "components/spellcheck/common/spellcheck_common.h"
|
2019-11-26 21:16:43 +00:00
|
|
|
|
|
|
|
#if BUILDFLAG(USE_BROWSER_SPELLCHECKER)
|
|
|
|
#include "components/spellcheck/browser/spellcheck_platform.h"
|
|
|
|
#include "components/spellcheck/common/spellcheck_features.h"
|
|
|
|
#endif
|
2019-10-31 20:11:51 +00:00
|
|
|
#endif
|
|
|
|
|
2015-07-02 14:12:18 +00:00
|
|
|
using content::BrowserThread;
|
|
|
|
using content::StoragePartition;
|
|
|
|
|
2019-11-05 23:41:20 +00:00
|
|
|
namespace predictors {
|
|
|
|
// NOTE(nornagon): this is copied from
|
|
|
|
// //chrome/browser/predictors/resource_prefetch_predictor.cc we don't need
|
|
|
|
// anything in that file other than this constructor. Without it we get a link
|
|
|
|
// error. Probably upstream the constructor should be moved to
|
|
|
|
// preconnect_manager.cc.
|
|
|
|
PreconnectRequest::PreconnectRequest(
|
2019-12-11 00:22:35 +00:00
|
|
|
const url::Origin& origin,
|
2019-11-05 23:41:20 +00:00
|
|
|
int num_sockets,
|
|
|
|
const net::NetworkIsolationKey& network_isolation_key)
|
|
|
|
: origin(origin),
|
|
|
|
num_sockets(num_sockets),
|
|
|
|
network_isolation_key(network_isolation_key) {
|
|
|
|
DCHECK_GE(num_sockets, 0);
|
|
|
|
}
|
|
|
|
} // namespace predictors
|
|
|
|
|
2015-07-02 14:12:18 +00:00
|
|
|
namespace {
|
|
|
|
|
2015-07-13 22:13:17 +00:00
|
|
|
struct ClearStorageDataOptions {
|
2022-07-13 21:26:16 +00:00
|
|
|
blink::StorageKey storage_key;
|
2016-03-08 04:40:10 +00:00
|
|
|
uint32_t storage_types = StoragePartition::REMOVE_DATA_MASK_ALL;
|
|
|
|
uint32_t quota_types = StoragePartition::QUOTA_MANAGED_STORAGE_MASK_ALL;
|
2015-07-13 22:13:17 +00:00
|
|
|
};
|
2015-07-02 14:12:18 +00:00
|
|
|
|
2016-03-08 04:40:10 +00:00
|
|
|
uint32_t GetStorageMask(const std::vector<std::string>& storage_types) {
|
|
|
|
uint32_t storage_mask = 0;
|
2015-07-13 22:13:17 +00:00
|
|
|
for (const auto& it : storage_types) {
|
2015-12-07 11:56:23 +00:00
|
|
|
auto type = base::ToLowerASCII(it);
|
2021-11-24 08:45:59 +00:00
|
|
|
if (type == "cookies")
|
2015-07-02 14:12:18 +00:00
|
|
|
storage_mask |= StoragePartition::REMOVE_DATA_MASK_COOKIES;
|
2015-07-13 22:13:17 +00:00
|
|
|
else if (type == "filesystem")
|
2015-07-02 14:12:18 +00:00
|
|
|
storage_mask |= StoragePartition::REMOVE_DATA_MASK_FILE_SYSTEMS;
|
2015-07-13 22:13:17 +00:00
|
|
|
else if (type == "indexdb")
|
2015-07-02 14:12:18 +00:00
|
|
|
storage_mask |= StoragePartition::REMOVE_DATA_MASK_INDEXEDDB;
|
2015-07-13 22:13:17 +00:00
|
|
|
else if (type == "localstorage")
|
2015-07-02 14:12:18 +00:00
|
|
|
storage_mask |= StoragePartition::REMOVE_DATA_MASK_LOCAL_STORAGE;
|
2015-07-13 22:13:17 +00:00
|
|
|
else if (type == "shadercache")
|
2015-07-02 14:12:18 +00:00
|
|
|
storage_mask |= StoragePartition::REMOVE_DATA_MASK_SHADER_CACHE;
|
2015-07-13 22:13:17 +00:00
|
|
|
else if (type == "websql")
|
2015-07-02 14:12:18 +00:00
|
|
|
storage_mask |= StoragePartition::REMOVE_DATA_MASK_WEBSQL;
|
2015-07-13 22:13:17 +00:00
|
|
|
else if (type == "serviceworkers")
|
2015-07-02 14:12:18 +00:00
|
|
|
storage_mask |= StoragePartition::REMOVE_DATA_MASK_SERVICE_WORKERS;
|
2018-04-13 17:03:16 +00:00
|
|
|
else if (type == "cachestorage")
|
|
|
|
storage_mask |= StoragePartition::REMOVE_DATA_MASK_CACHE_STORAGE;
|
2015-07-02 14:12:18 +00:00
|
|
|
}
|
|
|
|
return storage_mask;
|
|
|
|
}
|
|
|
|
|
2016-03-08 04:40:10 +00:00
|
|
|
uint32_t GetQuotaMask(const std::vector<std::string>& quota_types) {
|
|
|
|
uint32_t quota_mask = 0;
|
2015-07-13 22:13:17 +00:00
|
|
|
for (const auto& it : quota_types) {
|
2015-12-07 11:56:23 +00:00
|
|
|
auto type = base::ToLowerASCII(it);
|
2015-07-13 22:13:17 +00:00
|
|
|
if (type == "temporary")
|
2015-07-02 14:12:18 +00:00
|
|
|
quota_mask |= StoragePartition::QUOTA_MANAGED_STORAGE_MASK_TEMPORARY;
|
2015-07-13 22:13:17 +00:00
|
|
|
else if (type == "persistent")
|
2015-07-02 14:12:18 +00:00
|
|
|
quota_mask |= StoragePartition::QUOTA_MANAGED_STORAGE_MASK_PERSISTENT;
|
2015-07-13 22:13:17 +00:00
|
|
|
else if (type == "syncable")
|
|
|
|
quota_mask |= StoragePartition::QUOTA_MANAGED_STORAGE_MASK_SYNCABLE;
|
2015-07-02 14:12:18 +00:00
|
|
|
}
|
|
|
|
return quota_mask;
|
|
|
|
}
|
|
|
|
|
|
|
|
} // namespace
|
|
|
|
|
2019-10-25 13:03:28 +00:00
|
|
|
namespace gin {
|
2015-07-13 22:13:17 +00:00
|
|
|
|
2018-04-18 01:55:30 +00:00
|
|
|
template <>
|
2015-07-13 22:13:17 +00:00
|
|
|
struct Converter<ClearStorageDataOptions> {
|
|
|
|
static bool FromV8(v8::Isolate* isolate,
|
|
|
|
v8::Local<v8::Value> val,
|
|
|
|
ClearStorageDataOptions* out) {
|
2019-10-25 13:03:28 +00:00
|
|
|
gin_helper::Dictionary options;
|
2015-07-13 22:13:17 +00:00
|
|
|
if (!ConvertFromV8(isolate, val, &options))
|
|
|
|
return false;
|
2022-07-13 21:26:16 +00:00
|
|
|
if (GURL storage_origin; options.Get("origin", &storage_origin))
|
|
|
|
out->storage_key = blink::StorageKey(url::Origin::Create(storage_origin));
|
2015-07-13 22:13:17 +00:00
|
|
|
std::vector<std::string> types;
|
|
|
|
if (options.Get("storages", &types))
|
|
|
|
out->storage_types = GetStorageMask(types);
|
|
|
|
if (options.Get("quotas", &types))
|
|
|
|
out->quota_types = GetQuotaMask(types);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2020-09-23 20:22:10 +00:00
|
|
|
bool SSLProtocolVersionFromString(const std::string& version_str,
|
|
|
|
network::mojom::SSLVersion* version) {
|
|
|
|
if (version_str == switches::kSSLVersionTLSv12) {
|
|
|
|
*version = network::mojom::SSLVersion::kTLS12;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
if (version_str == switches::kSSLVersionTLSv13) {
|
|
|
|
*version = network::mojom::SSLVersion::kTLS13;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2020-10-21 18:03:59 +00:00
|
|
|
template <>
|
|
|
|
struct Converter<uint16_t> {
|
|
|
|
static bool FromV8(v8::Isolate* isolate,
|
|
|
|
v8::Local<v8::Value> val,
|
|
|
|
uint16_t* out) {
|
|
|
|
auto maybe = val->IntegerValue(isolate->GetCurrentContext());
|
|
|
|
if (maybe.IsNothing())
|
|
|
|
return false;
|
|
|
|
*out = maybe.FromJust();
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2020-09-23 20:22:10 +00:00
|
|
|
template <>
|
|
|
|
struct Converter<network::mojom::SSLConfigPtr> {
|
|
|
|
static bool FromV8(v8::Isolate* isolate,
|
|
|
|
v8::Local<v8::Value> val,
|
|
|
|
network::mojom::SSLConfigPtr* out) {
|
|
|
|
gin_helper::Dictionary options;
|
|
|
|
if (!ConvertFromV8(isolate, val, &options))
|
|
|
|
return false;
|
|
|
|
*out = network::mojom::SSLConfig::New();
|
|
|
|
std::string version_min_str;
|
|
|
|
if (options.Get("minVersion", &version_min_str)) {
|
|
|
|
if (!SSLProtocolVersionFromString(version_min_str, &(*out)->version_min))
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
std::string version_max_str;
|
|
|
|
if (options.Get("maxVersion", &version_max_str)) {
|
|
|
|
if (!SSLProtocolVersionFromString(version_max_str,
|
|
|
|
&(*out)->version_max) ||
|
|
|
|
(*out)->version_max < network::mojom::SSLVersion::kTLS12)
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2020-10-21 18:03:59 +00:00
|
|
|
if (options.Has("disabledCipherSuites") &&
|
|
|
|
!options.Get("disabledCipherSuites", &(*out)->disabled_cipher_suites)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
std::sort((*out)->disabled_cipher_suites.begin(),
|
|
|
|
(*out)->disabled_cipher_suites.end());
|
|
|
|
|
|
|
|
// TODO(nornagon): also support other SSLConfig properties?
|
2020-09-23 20:22:10 +00:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2019-10-25 13:03:28 +00:00
|
|
|
} // namespace gin
|
2015-07-13 22:13:17 +00:00
|
|
|
|
2022-06-29 19:55:47 +00:00
|
|
|
namespace electron::api {
|
2015-06-16 09:23:29 +00:00
|
|
|
|
2015-06-24 03:59:11 +00:00
|
|
|
namespace {
|
|
|
|
|
2016-07-12 12:01:49 +00:00
|
|
|
const char kPersistPrefix[] = "persist:";
|
|
|
|
|
2016-11-18 10:43:43 +00:00
|
|
|
void DownloadIdCallback(content::DownloadManager* download_manager,
|
|
|
|
const base::FilePath& path,
|
|
|
|
const std::vector<GURL>& url_chain,
|
|
|
|
const std::string& mime_type,
|
|
|
|
int64_t offset,
|
|
|
|
int64_t length,
|
|
|
|
const std::string& last_modified,
|
|
|
|
const std::string& etag,
|
|
|
|
const base::Time& start_time,
|
|
|
|
uint32_t id) {
|
2016-11-24 15:16:39 +00:00
|
|
|
download_manager->CreateDownloadItem(
|
2022-02-25 18:17:35 +00:00
|
|
|
base::GenerateGUID(), id, path, path, url_chain, GURL(),
|
|
|
|
content::StoragePartitionConfig::CreateDefault(
|
|
|
|
download_manager->GetBrowserContext()),
|
|
|
|
GURL(), GURL(), absl::nullopt, mime_type, mime_type, start_time,
|
|
|
|
base::Time(), etag, last_modified, offset, length, std::string(),
|
2018-04-10 15:29:26 +00:00
|
|
|
download::DownloadItem::INTERRUPTED,
|
2018-04-10 15:58:49 +00:00
|
|
|
download::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS,
|
2018-04-10 16:08:50 +00:00
|
|
|
download::DOWNLOAD_INTERRUPT_REASON_NETWORK_TIMEOUT, false, base::Time(),
|
2021-08-24 00:52:17 +00:00
|
|
|
false, std::vector<download::DownloadItem::ReceivedSlice>(),
|
|
|
|
download::DownloadItemRerouteInfo());
|
2016-11-18 10:43:43 +00:00
|
|
|
}
|
|
|
|
|
2020-03-10 09:39:40 +00:00
|
|
|
#if BUILDFLAG(ENABLE_BUILTIN_SPELLCHECKER)
|
2020-02-10 22:08:53 +00:00
|
|
|
class DictionaryObserver final : public SpellcheckCustomDictionary::Observer {
|
|
|
|
private:
|
|
|
|
std::unique_ptr<gin_helper::Promise<std::set<std::string>>> promise_;
|
|
|
|
base::WeakPtr<SpellcheckService> spellcheck_;
|
|
|
|
|
|
|
|
public:
|
|
|
|
DictionaryObserver(gin_helper::Promise<std::set<std::string>> promise,
|
|
|
|
base::WeakPtr<SpellcheckService> spellcheck)
|
|
|
|
: spellcheck_(spellcheck) {
|
|
|
|
promise_ = std::make_unique<gin_helper::Promise<std::set<std::string>>>(
|
|
|
|
std::move(promise));
|
|
|
|
if (spellcheck_)
|
|
|
|
spellcheck_->GetCustomDictionary()->AddObserver(this);
|
|
|
|
}
|
|
|
|
|
|
|
|
~DictionaryObserver() {
|
|
|
|
if (spellcheck_)
|
|
|
|
spellcheck_->GetCustomDictionary()->RemoveObserver(this);
|
|
|
|
}
|
|
|
|
|
|
|
|
void OnCustomDictionaryLoaded() override {
|
|
|
|
if (spellcheck_) {
|
|
|
|
promise_->Resolve(spellcheck_->GetCustomDictionary()->GetWords());
|
|
|
|
} else {
|
|
|
|
promise_->RejectWithErrorMessage(
|
|
|
|
"Spellcheck in unexpected state: failed to load custom dictionary.");
|
|
|
|
}
|
|
|
|
delete this;
|
|
|
|
}
|
|
|
|
|
|
|
|
void OnCustomDictionaryChanged(
|
|
|
|
const SpellcheckCustomDictionary::Change& dictionary_change) override {
|
|
|
|
// noop
|
|
|
|
}
|
|
|
|
};
|
2020-03-10 09:39:40 +00:00
|
|
|
#endif // BUILDFLAG(ENABLE_BUILTIN_SPELLCHECKER)
|
2020-02-10 22:08:53 +00:00
|
|
|
|
2020-05-19 17:18:12 +00:00
|
|
|
struct UserDataLink : base::SupportsUserData::Data {
|
|
|
|
explicit UserDataLink(Session* ses) : session(ses) {}
|
|
|
|
|
|
|
|
Session* session;
|
|
|
|
};
|
|
|
|
|
|
|
|
const void* kElectronApiSessionKey = &kElectronApiSessionKey;
|
|
|
|
|
2015-06-24 03:59:11 +00:00
|
|
|
} // namespace
|
|
|
|
|
2020-05-19 17:18:12 +00:00
|
|
|
gin::WrapperInfo Session::kWrapperInfo = {gin::kEmbedderNativeGin};
|
|
|
|
|
2016-04-25 01:17:54 +00:00
|
|
|
Session::Session(v8::Isolate* isolate, ElectronBrowserContext* browser_context)
|
2021-03-29 10:45:08 +00:00
|
|
|
: isolate_(isolate),
|
|
|
|
network_emulation_token_(base::UnguessableToken::Create()),
|
2016-04-18 04:59:15 +00:00
|
|
|
browser_context_(browser_context) {
|
2016-09-21 23:24:03 +00:00
|
|
|
// Observe DownloadManager to get download notifications.
|
2021-05-19 23:15:47 +00:00
|
|
|
browser_context->GetDownloadManager()->AddObserver(this);
|
2016-04-25 01:17:54 +00:00
|
|
|
|
2017-12-05 06:59:15 +00:00
|
|
|
new SessionPreferences(browser_context);
|
|
|
|
|
2019-11-07 23:35:12 +00:00
|
|
|
protocol_.Reset(isolate, Protocol::Create(isolate, browser_context).ToV8());
|
|
|
|
|
2020-05-19 17:18:12 +00:00
|
|
|
browser_context->SetUserData(kElectronApiSessionKey,
|
|
|
|
std::make_unique<UserDataLink>(this));
|
2020-03-05 19:58:19 +00:00
|
|
|
|
2020-03-10 09:39:40 +00:00
|
|
|
#if BUILDFLAG(ENABLE_BUILTIN_SPELLCHECKER)
|
2020-03-05 19:58:19 +00:00
|
|
|
SpellcheckService* service =
|
2020-08-17 20:21:53 +00:00
|
|
|
SpellcheckServiceFactory::GetForContext(browser_context_);
|
2020-03-05 19:58:19 +00:00
|
|
|
if (service) {
|
|
|
|
service->SetHunspellObserver(this);
|
|
|
|
}
|
2020-03-10 09:39:40 +00:00
|
|
|
#endif
|
2020-09-23 19:29:08 +00:00
|
|
|
|
|
|
|
#if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
|
|
|
|
extensions::ExtensionRegistry::Get(browser_context)->AddObserver(this);
|
|
|
|
#endif
|
2015-06-16 09:23:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
Session::~Session() {
|
2021-05-19 23:15:47 +00:00
|
|
|
browser_context()->GetDownloadManager()->RemoveObserver(this);
|
2020-03-05 19:58:19 +00:00
|
|
|
|
2020-03-10 09:39:40 +00:00
|
|
|
#if BUILDFLAG(ENABLE_BUILTIN_SPELLCHECKER)
|
2020-03-05 19:58:19 +00:00
|
|
|
SpellcheckService* service =
|
2020-08-17 20:21:53 +00:00
|
|
|
SpellcheckServiceFactory::GetForContext(browser_context_);
|
2020-03-05 19:58:19 +00:00
|
|
|
if (service) {
|
|
|
|
service->SetHunspellObserver(nullptr);
|
|
|
|
}
|
2020-03-10 09:39:40 +00:00
|
|
|
#endif
|
2020-09-23 19:29:08 +00:00
|
|
|
|
|
|
|
#if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
|
|
|
|
extensions::ExtensionRegistry::Get(browser_context())->RemoveObserver(this);
|
|
|
|
#endif
|
2015-08-30 18:52:01 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void Session::OnDownloadCreated(content::DownloadManager* manager,
|
2018-04-10 15:29:26 +00:00
|
|
|
download::DownloadItem* item) {
|
2016-04-27 14:59:39 +00:00
|
|
|
if (item->IsSavePackageDownload())
|
2015-10-14 04:41:31 +00:00
|
|
|
return;
|
2016-04-25 01:17:54 +00:00
|
|
|
|
2021-03-29 10:45:08 +00:00
|
|
|
v8::HandleScope handle_scope(isolate_);
|
|
|
|
auto handle = DownloadItem::FromOrCreate(isolate_, item);
|
2018-04-10 15:29:26 +00:00
|
|
|
if (item->GetState() == download::DownloadItem::INTERRUPTED)
|
2016-11-18 10:43:43 +00:00
|
|
|
handle->SetSavePath(item->GetTargetFilePath());
|
2018-04-10 15:29:26 +00:00
|
|
|
content::WebContents* web_contents =
|
|
|
|
content::DownloadItemUtils::GetWebContents(item);
|
|
|
|
bool prevent_default = Emit("will-download", handle, web_contents);
|
2015-08-30 18:52:01 +00:00
|
|
|
if (prevent_default) {
|
|
|
|
item->Cancel(true);
|
|
|
|
item->Remove();
|
|
|
|
}
|
2015-06-16 09:23:29 +00:00
|
|
|
}
|
|
|
|
|
2020-03-10 09:39:40 +00:00
|
|
|
#if BUILDFLAG(ENABLE_BUILTIN_SPELLCHECKER)
|
2020-03-05 19:58:19 +00:00
|
|
|
void Session::OnHunspellDictionaryInitialized(const std::string& language) {
|
|
|
|
Emit("spellcheck-dictionary-initialized", language);
|
|
|
|
}
|
|
|
|
void Session::OnHunspellDictionaryDownloadBegin(const std::string& language) {
|
|
|
|
Emit("spellcheck-dictionary-download-begin", language);
|
|
|
|
}
|
|
|
|
void Session::OnHunspellDictionaryDownloadSuccess(const std::string& language) {
|
|
|
|
Emit("spellcheck-dictionary-download-success", language);
|
|
|
|
}
|
|
|
|
void Session::OnHunspellDictionaryDownloadFailure(const std::string& language) {
|
|
|
|
Emit("spellcheck-dictionary-download-failure", language);
|
|
|
|
}
|
2020-03-10 09:39:40 +00:00
|
|
|
#endif
|
2020-03-05 19:58:19 +00:00
|
|
|
|
2020-05-19 17:18:12 +00:00
|
|
|
v8::Local<v8::Promise> Session::ResolveProxy(gin::Arguments* args) {
|
2019-03-08 20:51:12 +00:00
|
|
|
v8::Isolate* isolate = args->isolate();
|
2019-11-01 06:10:32 +00:00
|
|
|
gin_helper::Promise<std::string> promise(isolate);
|
2019-03-08 20:51:12 +00:00
|
|
|
v8::Local<v8::Promise> handle = promise.GetHandle();
|
|
|
|
|
|
|
|
GURL url;
|
|
|
|
args->GetNext(&url);
|
|
|
|
|
|
|
|
browser_context_->GetResolveProxyHelper()->ResolveProxy(
|
2019-11-01 06:10:32 +00:00
|
|
|
url, base::BindOnce(gin_helper::Promise<std::string>::ResolvePromise,
|
2019-05-01 20:45:08 +00:00
|
|
|
std::move(promise)));
|
2019-03-08 20:51:12 +00:00
|
|
|
|
|
|
|
return handle;
|
2015-06-24 03:59:11 +00:00
|
|
|
}
|
|
|
|
|
2019-04-30 22:09:17 +00:00
|
|
|
v8::Local<v8::Promise> Session::GetCacheSize() {
|
2021-03-29 10:45:08 +00:00
|
|
|
gin_helper::Promise<int64_t> promise(isolate_);
|
2019-04-30 22:09:17 +00:00
|
|
|
auto handle = promise.GetHandle();
|
2019-03-08 22:42:03 +00:00
|
|
|
|
2021-05-04 03:13:46 +00:00
|
|
|
browser_context_->GetDefaultStoragePartition()
|
2019-04-30 22:09:17 +00:00
|
|
|
->GetNetworkContext()
|
2019-08-23 00:03:28 +00:00
|
|
|
->ComputeHttpCacheSize(
|
|
|
|
base::Time(), base::Time::Max(),
|
|
|
|
base::BindOnce(
|
2019-11-01 06:10:32 +00:00
|
|
|
[](gin_helper::Promise<int64_t> promise, bool is_upper_bound,
|
2019-08-23 00:03:28 +00:00
|
|
|
int64_t size_or_error) {
|
|
|
|
if (size_or_error < 0) {
|
|
|
|
promise.RejectWithErrorMessage(
|
|
|
|
net::ErrorToString(size_or_error));
|
|
|
|
} else {
|
|
|
|
promise.Resolve(size_or_error);
|
|
|
|
}
|
|
|
|
},
|
|
|
|
std::move(promise)));
|
2019-04-30 22:09:17 +00:00
|
|
|
|
|
|
|
return handle;
|
|
|
|
}
|
|
|
|
|
|
|
|
v8::Local<v8::Promise> Session::ClearCache() {
|
2021-03-29 10:45:08 +00:00
|
|
|
gin_helper::Promise<void> promise(isolate_);
|
2019-04-30 22:09:17 +00:00
|
|
|
auto handle = promise.GetHandle();
|
|
|
|
|
2021-05-04 03:13:46 +00:00
|
|
|
browser_context_->GetDefaultStoragePartition()
|
2019-04-30 22:09:17 +00:00
|
|
|
->GetNetworkContext()
|
|
|
|
->ClearHttpCache(base::Time(), base::Time::Max(), nullptr,
|
2019-11-01 06:10:32 +00:00
|
|
|
base::BindOnce(gin_helper::Promise<void>::ResolvePromise,
|
2019-04-30 22:09:17 +00:00
|
|
|
std::move(promise)));
|
2019-03-08 22:42:03 +00:00
|
|
|
|
|
|
|
return handle;
|
2015-07-02 14:12:18 +00:00
|
|
|
}
|
|
|
|
|
2020-05-19 17:18:12 +00:00
|
|
|
v8::Local<v8::Promise> Session::ClearStorageData(gin::Arguments* args) {
|
2019-03-08 17:02:30 +00:00
|
|
|
v8::Isolate* isolate = args->isolate();
|
2019-11-01 06:10:32 +00:00
|
|
|
gin_helper::Promise<void> promise(isolate);
|
2019-03-08 17:02:30 +00:00
|
|
|
v8::Local<v8::Promise> handle = promise.GetHandle();
|
|
|
|
|
2015-07-13 22:13:17 +00:00
|
|
|
ClearStorageDataOptions options;
|
|
|
|
args->GetNext(&options);
|
|
|
|
|
2021-05-04 03:13:46 +00:00
|
|
|
auto* storage_partition = browser_context()->GetStoragePartition(nullptr);
|
2016-12-03 11:14:33 +00:00
|
|
|
if (options.storage_types & StoragePartition::REMOVE_DATA_MASK_COOKIES) {
|
|
|
|
// Reset media device id salt when cookies are cleared.
|
|
|
|
// https://w3c.github.io/mediacapture-main/#dom-mediadeviceinfo-deviceid
|
2018-10-19 18:51:43 +00:00
|
|
|
MediaDeviceIDSalt::Reset(browser_context()->prefs());
|
2016-12-03 11:14:33 +00:00
|
|
|
}
|
2019-03-08 17:02:30 +00:00
|
|
|
|
|
|
|
storage_partition->ClearData(
|
2022-07-13 21:26:16 +00:00
|
|
|
options.storage_types, options.quota_types, options.storage_key,
|
|
|
|
base::Time(), base::Time::Max(),
|
2019-11-01 06:10:32 +00:00
|
|
|
base::BindOnce(gin_helper::Promise<void>::ResolvePromise,
|
2019-08-23 00:03:28 +00:00
|
|
|
std::move(promise)));
|
2019-03-08 17:02:30 +00:00
|
|
|
return handle;
|
2015-07-02 14:12:18 +00:00
|
|
|
}
|
|
|
|
|
2016-01-12 15:28:12 +00:00
|
|
|
void Session::FlushStorageData() {
|
2021-05-04 03:13:46 +00:00
|
|
|
auto* storage_partition = browser_context()->GetStoragePartition(nullptr);
|
2016-01-12 15:28:12 +00:00
|
|
|
storage_partition->Flush();
|
|
|
|
}
|
|
|
|
|
2020-05-19 17:18:12 +00:00
|
|
|
v8::Local<v8::Promise> Session::SetProxy(gin::Arguments* args) {
|
2019-03-08 20:51:12 +00:00
|
|
|
v8::Isolate* isolate = args->isolate();
|
2019-11-01 06:10:32 +00:00
|
|
|
gin_helper::Promise<void> promise(isolate);
|
2019-03-08 20:51:12 +00:00
|
|
|
v8::Local<v8::Promise> handle = promise.GetHandle();
|
|
|
|
|
2019-10-25 13:03:28 +00:00
|
|
|
gin_helper::Dictionary options;
|
2019-03-08 20:51:12 +00:00
|
|
|
args->GetNext(&options);
|
|
|
|
|
2018-10-04 18:08:56 +00:00
|
|
|
if (!browser_context_->in_memory_pref_store()) {
|
2019-03-08 20:51:12 +00:00
|
|
|
promise.Resolve();
|
|
|
|
return handle;
|
2018-10-04 18:08:56 +00:00
|
|
|
}
|
|
|
|
|
2020-10-27 06:50:06 +00:00
|
|
|
std::string mode, proxy_rules, bypass_list, pac_url;
|
2018-10-04 18:08:56 +00:00
|
|
|
|
|
|
|
options.Get("pacScript", &pac_url);
|
|
|
|
options.Get("proxyRules", &proxy_rules);
|
|
|
|
options.Get("proxyBypassRules", &bypass_list);
|
|
|
|
|
2020-10-27 06:50:06 +00:00
|
|
|
ProxyPrefs::ProxyMode proxy_mode = ProxyPrefs::MODE_FIXED_SERVERS;
|
|
|
|
if (!options.Get("mode", &mode)) {
|
|
|
|
// pacScript takes precedence over proxyRules.
|
|
|
|
if (!pac_url.empty()) {
|
|
|
|
proxy_mode = ProxyPrefs::MODE_PAC_SCRIPT;
|
|
|
|
} else {
|
|
|
|
proxy_mode = ProxyPrefs::MODE_FIXED_SERVERS;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if (!ProxyPrefs::StringToProxyMode(mode, &proxy_mode)) {
|
|
|
|
promise.RejectWithErrorMessage(
|
|
|
|
"Invalid mode, must be one of direct, auto_detect, pac_script, "
|
|
|
|
"fixed_servers or system");
|
|
|
|
return handle;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
std::unique_ptr<base::Value> proxy_config;
|
|
|
|
if (proxy_mode == ProxyPrefs::MODE_DIRECT) {
|
|
|
|
proxy_config =
|
|
|
|
std::make_unique<base::Value>(ProxyConfigDictionary::CreateDirect());
|
|
|
|
} else if (proxy_mode == ProxyPrefs::MODE_SYSTEM) {
|
|
|
|
proxy_config =
|
|
|
|
std::make_unique<base::Value>(ProxyConfigDictionary::CreateSystem());
|
|
|
|
} else if (proxy_mode == ProxyPrefs::MODE_AUTO_DETECT) {
|
|
|
|
proxy_config = std::make_unique<base::Value>(
|
|
|
|
ProxyConfigDictionary::CreateAutoDetect());
|
|
|
|
} else if (proxy_mode == ProxyPrefs::MODE_PAC_SCRIPT) {
|
|
|
|
proxy_config =
|
2018-10-25 16:48:25 +00:00
|
|
|
std::make_unique<base::Value>(ProxyConfigDictionary::CreatePacScript(
|
2020-10-27 06:50:06 +00:00
|
|
|
pac_url, true /* pac_mandatory */));
|
2018-10-04 18:08:56 +00:00
|
|
|
} else {
|
2020-10-27 06:50:06 +00:00
|
|
|
proxy_config = std::make_unique<base::Value>(
|
|
|
|
ProxyConfigDictionary::CreateFixedServers(proxy_rules, bypass_list));
|
2018-10-04 18:08:56 +00:00
|
|
|
}
|
2020-10-27 06:50:06 +00:00
|
|
|
browser_context_->in_memory_pref_store()->SetValue(
|
|
|
|
proxy_config::prefs::kProxy, std::move(proxy_config),
|
|
|
|
WriteablePrefStore::DEFAULT_PREF_WRITE_FLAGS);
|
2018-10-04 18:08:56 +00:00
|
|
|
|
2019-03-08 20:51:12 +00:00
|
|
|
base::ThreadTaskRunnerHandle::Get()->PostTask(
|
2019-11-01 06:10:32 +00:00
|
|
|
FROM_HERE, base::BindOnce(gin_helper::Promise<void>::ResolvePromise,
|
2019-08-23 00:03:28 +00:00
|
|
|
std::move(promise)));
|
2019-03-08 20:51:12 +00:00
|
|
|
|
|
|
|
return handle;
|
2015-07-16 14:36:48 +00:00
|
|
|
}
|
|
|
|
|
2020-10-27 06:50:06 +00:00
|
|
|
v8::Local<v8::Promise> Session::ForceReloadProxyConfig() {
|
2021-03-29 10:45:08 +00:00
|
|
|
gin_helper::Promise<void> promise(isolate_);
|
2020-10-27 06:50:06 +00:00
|
|
|
auto handle = promise.GetHandle();
|
|
|
|
|
2021-05-04 03:13:46 +00:00
|
|
|
browser_context_->GetDefaultStoragePartition()
|
2020-10-27 06:50:06 +00:00
|
|
|
->GetNetworkContext()
|
|
|
|
->ForceReloadProxyConfig(base::BindOnce(
|
|
|
|
gin_helper::Promise<void>::ResolvePromise, std::move(promise)));
|
|
|
|
|
|
|
|
return handle;
|
|
|
|
}
|
|
|
|
|
2015-07-30 02:38:04 +00:00
|
|
|
void Session::SetDownloadPath(const base::FilePath& path) {
|
2018-04-18 01:55:30 +00:00
|
|
|
browser_context_->prefs()->SetFilePath(prefs::kDownloadDefaultDirectory,
|
|
|
|
path);
|
2015-07-26 08:30:02 +00:00
|
|
|
}
|
|
|
|
|
2019-10-25 13:03:28 +00:00
|
|
|
void Session::EnableNetworkEmulation(const gin_helper::Dictionary& options) {
|
2018-10-02 18:08:10 +00:00
|
|
|
auto conditions = network::mojom::NetworkConditions::New();
|
|
|
|
|
|
|
|
options.Get("offline", &conditions->offline);
|
|
|
|
options.Get("downloadThroughput", &conditions->download_throughput);
|
|
|
|
options.Get("uploadThroughput", &conditions->upload_throughput);
|
|
|
|
double latency = 0.0;
|
|
|
|
if (options.Get("latency", &latency) && latency) {
|
2021-11-24 08:45:59 +00:00
|
|
|
conditions->latency = base::Milliseconds(latency);
|
2015-09-27 13:19:52 +00:00
|
|
|
}
|
|
|
|
|
2020-08-17 20:21:53 +00:00
|
|
|
auto* network_context =
|
2021-05-04 03:13:46 +00:00
|
|
|
browser_context_->GetDefaultStoragePartition()->GetNetworkContext();
|
2018-10-02 18:08:10 +00:00
|
|
|
network_context->SetNetworkConditions(network_emulation_token_,
|
|
|
|
std::move(conditions));
|
2015-09-27 13:19:52 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void Session::DisableNetworkEmulation() {
|
2020-08-17 20:21:53 +00:00
|
|
|
auto* network_context =
|
2021-05-04 03:13:46 +00:00
|
|
|
browser_context_->GetDefaultStoragePartition()->GetNetworkContext();
|
2018-10-02 18:08:10 +00:00
|
|
|
network_context->SetNetworkConditions(
|
|
|
|
network_emulation_token_, network::mojom::NetworkConditions::New());
|
2015-09-27 13:19:52 +00:00
|
|
|
}
|
|
|
|
|
2015-11-18 03:45:15 +00:00
|
|
|
void Session::SetCertVerifyProc(v8::Local<v8::Value> val,
|
2020-05-19 17:18:12 +00:00
|
|
|
gin::Arguments* args) {
|
2019-08-07 15:04:09 +00:00
|
|
|
CertVerifierClient::CertVerifyProc proc;
|
2019-10-25 13:03:28 +00:00
|
|
|
if (!(val->IsNull() || gin::ConvertFromV8(args->isolate(), val, &proc))) {
|
2020-05-19 17:18:12 +00:00
|
|
|
args->ThrowTypeError("Must pass null or function");
|
2015-11-18 03:17:08 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-09-18 19:58:00 +00:00
|
|
|
mojo::PendingRemote<network::mojom::CertVerifierClient>
|
|
|
|
cert_verifier_client_remote;
|
2019-08-02 23:56:46 +00:00
|
|
|
if (proc) {
|
2019-09-18 19:58:00 +00:00
|
|
|
mojo::MakeSelfOwnedReceiver(
|
|
|
|
std::make_unique<CertVerifierClient>(proc),
|
|
|
|
cert_verifier_client_remote.InitWithNewPipeAndPassReceiver());
|
2019-06-28 22:22:23 +00:00
|
|
|
}
|
2021-05-04 03:13:46 +00:00
|
|
|
browser_context_->GetDefaultStoragePartition()
|
2019-08-02 23:56:46 +00:00
|
|
|
->GetNetworkContext()
|
2019-09-18 19:58:00 +00:00
|
|
|
->SetCertVerifierClient(std::move(cert_verifier_client_remote));
|
2015-11-18 03:17:08 +00:00
|
|
|
}
|
|
|
|
|
2016-01-31 21:35:34 +00:00
|
|
|
void Session::SetPermissionRequestHandler(v8::Local<v8::Value> val,
|
2020-05-19 17:18:12 +00:00
|
|
|
gin::Arguments* args) {
|
2019-05-03 21:20:43 +00:00
|
|
|
auto* permission_manager = static_cast<ElectronPermissionManager*>(
|
|
|
|
browser_context()->GetPermissionControllerDelegate());
|
|
|
|
if (val->IsNull()) {
|
|
|
|
permission_manager->SetPermissionRequestHandler(
|
|
|
|
ElectronPermissionManager::RequestHandler());
|
|
|
|
return;
|
|
|
|
}
|
2019-06-13 18:11:43 +00:00
|
|
|
auto handler = std::make_unique<ElectronPermissionManager::RequestHandler>();
|
2019-10-25 13:03:28 +00:00
|
|
|
if (!gin::ConvertFromV8(args->isolate(), val, handler.get())) {
|
2020-05-19 17:18:12 +00:00
|
|
|
args->ThrowTypeError("Must pass null or function");
|
2016-01-31 21:35:34 +00:00
|
|
|
return;
|
|
|
|
}
|
2019-05-03 18:30:48 +00:00
|
|
|
permission_manager->SetPermissionRequestHandler(base::BindRepeating(
|
2019-06-13 18:11:43 +00:00
|
|
|
[](ElectronPermissionManager::RequestHandler* handler,
|
|
|
|
content::WebContents* web_contents,
|
2022-05-17 16:48:40 +00:00
|
|
|
blink::PermissionType permission_type,
|
2019-05-03 18:30:48 +00:00
|
|
|
ElectronPermissionManager::StatusCallback callback,
|
2019-06-13 18:11:43 +00:00
|
|
|
const base::Value& details) {
|
2019-05-03 21:20:43 +00:00
|
|
|
handler->Run(web_contents, permission_type,
|
|
|
|
base::AdaptCallbackForRepeating(std::move(callback)),
|
|
|
|
details);
|
2019-05-03 18:30:48 +00:00
|
|
|
},
|
2019-05-03 21:20:43 +00:00
|
|
|
base::Owned(std::move(handler))));
|
2016-01-31 21:35:34 +00:00
|
|
|
}
|
|
|
|
|
2018-08-28 14:05:08 +00:00
|
|
|
void Session::SetPermissionCheckHandler(v8::Local<v8::Value> val,
|
2020-05-19 17:18:12 +00:00
|
|
|
gin::Arguments* args) {
|
2018-08-28 14:05:08 +00:00
|
|
|
ElectronPermissionManager::CheckHandler handler;
|
2019-10-25 13:03:28 +00:00
|
|
|
if (!(val->IsNull() || gin::ConvertFromV8(args->isolate(), val, &handler))) {
|
2020-05-19 17:18:12 +00:00
|
|
|
args->ThrowTypeError("Must pass null or function");
|
2018-08-28 14:05:08 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
auto* permission_manager = static_cast<ElectronPermissionManager*>(
|
2018-10-02 21:53:10 +00:00
|
|
|
browser_context()->GetPermissionControllerDelegate());
|
2018-08-28 14:05:08 +00:00
|
|
|
permission_manager->SetPermissionCheckHandler(handler);
|
|
|
|
}
|
|
|
|
|
2021-09-23 11:00:11 +00:00
|
|
|
void Session::SetDevicePermissionHandler(v8::Local<v8::Value> val,
|
|
|
|
gin::Arguments* args) {
|
|
|
|
ElectronPermissionManager::DeviceCheckHandler handler;
|
|
|
|
if (!(val->IsNull() || gin::ConvertFromV8(args->isolate(), val, &handler))) {
|
|
|
|
args->ThrowTypeError("Must pass null or function");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
auto* permission_manager = static_cast<ElectronPermissionManager*>(
|
|
|
|
browser_context()->GetPermissionControllerDelegate());
|
|
|
|
permission_manager->SetDevicePermissionHandler(handler);
|
|
|
|
}
|
|
|
|
|
2020-05-19 17:18:12 +00:00
|
|
|
v8::Local<v8::Promise> Session::ClearHostResolverCache(gin::Arguments* args) {
|
2019-03-08 18:26:17 +00:00
|
|
|
v8::Isolate* isolate = args->isolate();
|
2019-11-01 06:10:32 +00:00
|
|
|
gin_helper::Promise<void> promise(isolate);
|
2019-03-08 18:26:17 +00:00
|
|
|
v8::Local<v8::Promise> handle = promise.GetHandle();
|
2016-02-01 13:33:23 +00:00
|
|
|
|
2021-05-04 03:13:46 +00:00
|
|
|
browser_context_->GetDefaultStoragePartition()
|
2019-04-25 17:51:48 +00:00
|
|
|
->GetNetworkContext()
|
2019-05-03 21:30:25 +00:00
|
|
|
->ClearHostCache(nullptr,
|
2019-11-01 06:10:32 +00:00
|
|
|
base::BindOnce(gin_helper::Promise<void>::ResolvePromise,
|
2019-05-03 21:30:25 +00:00
|
|
|
std::move(promise)));
|
2019-04-25 17:51:48 +00:00
|
|
|
|
2019-03-08 18:26:17 +00:00
|
|
|
return handle;
|
2016-02-01 13:33:23 +00:00
|
|
|
}
|
|
|
|
|
2019-05-03 21:30:25 +00:00
|
|
|
v8::Local<v8::Promise> Session::ClearAuthCache() {
|
2021-03-29 10:45:08 +00:00
|
|
|
gin_helper::Promise<void> promise(isolate_);
|
2019-03-09 02:41:42 +00:00
|
|
|
v8::Local<v8::Promise> handle = promise.GetHandle();
|
|
|
|
|
2021-05-04 03:13:46 +00:00
|
|
|
browser_context_->GetDefaultStoragePartition()
|
2019-05-03 21:30:25 +00:00
|
|
|
->GetNetworkContext()
|
2019-08-23 00:03:28 +00:00
|
|
|
->ClearHttpAuthCache(
|
2020-09-21 08:00:36 +00:00
|
|
|
base::Time(), base::Time::Max(),
|
2019-11-01 06:10:32 +00:00
|
|
|
base::BindOnce(gin_helper::Promise<void>::ResolvePromise,
|
2019-08-23 00:03:28 +00:00
|
|
|
std::move(promise)));
|
2016-11-30 16:35:15 +00:00
|
|
|
|
2019-03-09 02:41:42 +00:00
|
|
|
return handle;
|
2016-11-30 16:35:15 +00:00
|
|
|
}
|
|
|
|
|
2016-05-23 05:29:55 +00:00
|
|
|
void Session::AllowNTLMCredentialsForDomains(const std::string& domains) {
|
2020-06-02 19:58:00 +00:00
|
|
|
auto* command_line = base::CommandLine::ForCurrentProcess();
|
2019-08-07 15:04:09 +00:00
|
|
|
network::mojom::HttpAuthDynamicParamsPtr auth_dynamic_params =
|
|
|
|
network::mojom::HttpAuthDynamicParams::New();
|
|
|
|
auth_dynamic_params->server_allowlist = domains;
|
2019-12-19 13:53:49 +00:00
|
|
|
auth_dynamic_params->enable_negotiate_port =
|
2020-06-02 19:58:00 +00:00
|
|
|
command_line->HasSwitch(electron::switches::kEnableAuthNegotiatePort);
|
|
|
|
auth_dynamic_params->ntlm_v2_enabled =
|
|
|
|
!command_line->HasSwitch(electron::switches::kDisableNTLMv2);
|
2019-08-07 15:04:09 +00:00
|
|
|
content::GetNetworkService()->ConfigureHttpAuthPrefs(
|
|
|
|
std::move(auth_dynamic_params));
|
2016-05-23 05:29:55 +00:00
|
|
|
}
|
|
|
|
|
2016-06-22 06:57:51 +00:00
|
|
|
void Session::SetUserAgent(const std::string& user_agent,
|
2020-05-19 17:18:12 +00:00
|
|
|
gin::Arguments* args) {
|
2019-08-29 06:50:14 +00:00
|
|
|
browser_context_->SetUserAgent(user_agent);
|
2020-08-17 20:21:53 +00:00
|
|
|
auto* network_context =
|
2021-05-04 03:13:46 +00:00
|
|
|
browser_context_->GetDefaultStoragePartition()->GetNetworkContext();
|
2020-06-04 11:05:37 +00:00
|
|
|
network_context->SetUserAgent(user_agent);
|
|
|
|
|
|
|
|
std::string accept_lang;
|
|
|
|
if (args->GetNext(&accept_lang)) {
|
|
|
|
network_context->SetAcceptLanguage(
|
|
|
|
net::HttpUtil::GenerateAcceptLanguageHeader(accept_lang));
|
|
|
|
}
|
2016-06-22 06:57:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
std::string Session::GetUserAgent() {
|
|
|
|
return browser_context_->GetUserAgent();
|
|
|
|
}
|
|
|
|
|
2020-09-23 20:22:10 +00:00
|
|
|
void Session::SetSSLConfig(network::mojom::SSLConfigPtr config) {
|
|
|
|
browser_context_->SetSSLConfig(std::move(config));
|
|
|
|
}
|
|
|
|
|
2020-03-11 07:02:22 +00:00
|
|
|
bool Session::IsPersistent() {
|
|
|
|
return !browser_context_->IsOffTheRecord();
|
|
|
|
}
|
|
|
|
|
2019-03-14 15:11:01 +00:00
|
|
|
v8::Local<v8::Promise> Session::GetBlobData(v8::Isolate* isolate,
|
|
|
|
const std::string& uuid) {
|
2019-09-03 22:54:14 +00:00
|
|
|
gin::Handle<DataPipeHolder> holder = DataPipeHolder::From(isolate, uuid);
|
|
|
|
if (holder.IsEmpty()) {
|
2019-11-01 06:10:32 +00:00
|
|
|
gin_helper::Promise<v8::Local<v8::Value>> promise(isolate);
|
2019-09-03 22:54:14 +00:00
|
|
|
promise.RejectWithErrorMessage("Could not get blob data handle");
|
|
|
|
return promise.GetHandle();
|
|
|
|
}
|
2016-08-23 05:57:43 +00:00
|
|
|
|
2019-09-03 22:54:14 +00:00
|
|
|
return holder->ReadAll(isolate);
|
2016-08-23 00:39:06 +00:00
|
|
|
}
|
|
|
|
|
2019-08-29 03:27:20 +00:00
|
|
|
void Session::DownloadURL(const GURL& url) {
|
2021-05-19 23:15:47 +00:00
|
|
|
auto* download_manager = browser_context()->GetDownloadManager();
|
2019-08-29 03:27:20 +00:00
|
|
|
auto download_params = std::make_unique<download::DownloadUrlParameters>(
|
2020-03-11 11:15:07 +00:00
|
|
|
url, MISSING_TRAFFIC_ANNOTATION);
|
2019-08-29 03:27:20 +00:00
|
|
|
download_manager->DownloadUrl(std::move(download_params));
|
|
|
|
}
|
|
|
|
|
2019-10-25 13:03:28 +00:00
|
|
|
void Session::CreateInterruptedDownload(const gin_helper::Dictionary& options) {
|
2016-11-18 10:43:43 +00:00
|
|
|
int64_t offset = 0, length = 0;
|
2019-09-21 14:51:28 +00:00
|
|
|
double start_time = base::Time::Now().ToDoubleT();
|
2016-11-18 10:43:43 +00:00
|
|
|
std::string mime_type, last_modified, etag;
|
|
|
|
base::FilePath path;
|
|
|
|
std::vector<GURL> url_chain;
|
|
|
|
options.Get("path", &path);
|
|
|
|
options.Get("urlChain", &url_chain);
|
|
|
|
options.Get("mimeType", &mime_type);
|
|
|
|
options.Get("offset", &offset);
|
|
|
|
options.Get("length", &length);
|
|
|
|
options.Get("lastModified", &last_modified);
|
|
|
|
options.Get("eTag", &etag);
|
|
|
|
options.Get("startTime", &start_time);
|
2016-12-07 07:28:53 +00:00
|
|
|
if (path.empty() || url_chain.empty() || length == 0) {
|
2021-03-29 10:45:08 +00:00
|
|
|
isolate_->ThrowException(v8::Exception::Error(gin::StringToV8(
|
|
|
|
isolate_, "Must pass non-empty path, urlChain and length.")));
|
2016-11-18 10:43:43 +00:00
|
|
|
return;
|
2016-12-07 07:28:53 +00:00
|
|
|
}
|
|
|
|
if (offset >= length) {
|
2021-03-29 10:45:08 +00:00
|
|
|
isolate_->ThrowException(v8::Exception::Error(gin::StringToV8(
|
|
|
|
isolate_, "Must pass an offset value less than length.")));
|
2016-12-07 07:28:53 +00:00
|
|
|
return;
|
|
|
|
}
|
2021-05-19 23:15:47 +00:00
|
|
|
auto* download_manager = browser_context()->GetDownloadManager();
|
2020-04-03 00:22:46 +00:00
|
|
|
download_manager->GetNextId(base::BindRepeating(
|
2016-11-18 10:43:43 +00:00
|
|
|
&DownloadIdCallback, download_manager, path, url_chain, mime_type, offset,
|
|
|
|
length, last_modified, etag, base::Time::FromDoubleT(start_time)));
|
|
|
|
}
|
|
|
|
|
2020-11-10 17:06:03 +00:00
|
|
|
void Session::SetPreloads(const std::vector<base::FilePath>& preloads) {
|
2017-12-05 06:59:15 +00:00
|
|
|
auto* prefs = SessionPreferences::FromBrowserContext(browser_context());
|
|
|
|
DCHECK(prefs);
|
|
|
|
prefs->set_preloads(preloads);
|
2017-09-16 15:05:49 +00:00
|
|
|
}
|
2017-12-05 02:50:06 +00:00
|
|
|
|
2020-11-10 17:06:03 +00:00
|
|
|
std::vector<base::FilePath> Session::GetPreloads() const {
|
2017-12-05 06:59:15 +00:00
|
|
|
auto* prefs = SessionPreferences::FromBrowserContext(browser_context());
|
|
|
|
DCHECK(prefs);
|
|
|
|
return prefs->preloads();
|
2017-09-16 15:05:49 +00:00
|
|
|
}
|
|
|
|
|
2019-07-24 23:01:08 +00:00
|
|
|
#if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
|
2020-01-13 22:56:28 +00:00
|
|
|
v8::Local<v8::Promise> Session::LoadExtension(
|
2021-02-01 22:41:08 +00:00
|
|
|
const base::FilePath& extension_path,
|
|
|
|
gin::Arguments* args) {
|
2021-03-29 10:45:08 +00:00
|
|
|
gin_helper::Promise<const extensions::Extension*> promise(isolate_);
|
2020-01-13 22:56:28 +00:00
|
|
|
v8::Local<v8::Promise> handle = promise.GetHandle();
|
2020-08-21 03:47:10 +00:00
|
|
|
|
|
|
|
if (!extension_path.IsAbsolute()) {
|
|
|
|
promise.RejectWithErrorMessage(
|
|
|
|
"The path to the extension in 'loadExtension' must be absolute");
|
|
|
|
return handle;
|
|
|
|
}
|
|
|
|
|
2020-02-10 16:28:03 +00:00
|
|
|
if (browser_context()->IsOffTheRecord()) {
|
|
|
|
promise.RejectWithErrorMessage(
|
|
|
|
"Extensions cannot be loaded in a temporary session");
|
|
|
|
return handle;
|
|
|
|
}
|
2020-01-13 22:56:28 +00:00
|
|
|
|
2021-02-01 22:41:08 +00:00
|
|
|
int load_flags = extensions::Extension::FOLLOW_SYMLINKS_ANYWHERE;
|
|
|
|
gin_helper::Dictionary options;
|
|
|
|
if (args->GetNext(&options)) {
|
|
|
|
bool allowFileAccess = false;
|
|
|
|
options.Get("allowFileAccess", &allowFileAccess);
|
|
|
|
if (allowFileAccess)
|
|
|
|
load_flags |= extensions::Extension::ALLOW_FILE_ACCESS;
|
|
|
|
}
|
|
|
|
|
2020-02-03 22:01:10 +00:00
|
|
|
auto* extension_system = static_cast<extensions::ElectronExtensionSystem*>(
|
2020-01-13 22:56:28 +00:00
|
|
|
extensions::ExtensionSystem::Get(browser_context()));
|
2020-01-21 17:43:18 +00:00
|
|
|
extension_system->LoadExtension(
|
2021-02-01 22:41:08 +00:00
|
|
|
extension_path, load_flags,
|
2020-01-21 17:43:18 +00:00
|
|
|
base::BindOnce(
|
|
|
|
[](gin_helper::Promise<const extensions::Extension*> promise,
|
2020-02-03 22:01:10 +00:00
|
|
|
const extensions::Extension* extension,
|
|
|
|
const std::string& error_msg) {
|
2020-01-21 17:43:18 +00:00
|
|
|
if (extension) {
|
2020-02-03 22:01:10 +00:00
|
|
|
if (!error_msg.empty()) {
|
|
|
|
node::Environment* env =
|
2021-03-29 10:45:08 +00:00
|
|
|
node::Environment::GetCurrent(promise.isolate());
|
2020-02-03 22:01:10 +00:00
|
|
|
EmitWarning(env, error_msg, "ExtensionLoadWarning");
|
|
|
|
}
|
2020-01-21 17:43:18 +00:00
|
|
|
promise.Resolve(extension);
|
|
|
|
} else {
|
2020-02-03 22:01:10 +00:00
|
|
|
promise.RejectWithErrorMessage(error_msg);
|
2020-01-21 17:43:18 +00:00
|
|
|
}
|
|
|
|
},
|
|
|
|
std::move(promise)));
|
2020-01-13 22:56:28 +00:00
|
|
|
|
|
|
|
return handle;
|
|
|
|
}
|
|
|
|
|
|
|
|
void Session::RemoveExtension(const std::string& extension_id) {
|
2020-02-03 22:01:10 +00:00
|
|
|
auto* extension_system = static_cast<extensions::ElectronExtensionSystem*>(
|
2019-07-24 23:01:08 +00:00
|
|
|
extensions::ExtensionSystem::Get(browser_context()));
|
2020-01-13 22:56:28 +00:00
|
|
|
extension_system->RemoveExtension(extension_id);
|
|
|
|
}
|
|
|
|
|
|
|
|
v8::Local<v8::Value> Session::GetExtension(const std::string& extension_id) {
|
|
|
|
auto* registry = extensions::ExtensionRegistry::Get(browser_context());
|
|
|
|
const extensions::Extension* extension =
|
|
|
|
registry->GetInstalledExtension(extension_id);
|
|
|
|
if (extension) {
|
2021-03-29 10:45:08 +00:00
|
|
|
return gin::ConvertToV8(isolate_, extension);
|
2020-01-13 22:56:28 +00:00
|
|
|
} else {
|
2021-03-29 10:45:08 +00:00
|
|
|
return v8::Null(isolate_);
|
2020-01-13 22:56:28 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
v8::Local<v8::Value> Session::GetAllExtensions() {
|
|
|
|
auto* registry = extensions::ExtensionRegistry::Get(browser_context());
|
|
|
|
auto installed_extensions = registry->GenerateInstalledExtensionsSet();
|
|
|
|
std::vector<const extensions::Extension*> extensions_vector;
|
|
|
|
for (const auto& extension : *installed_extensions) {
|
chore: bump chromium to 92.0.4475.0 (master) (#28462)
* chore: bump chromium in DEPS to 91.0.4464.0
* chore: rebuild chromium/dcheck.patch with import-patches -3
Mechanical only; no code changes
* chore: remove content_browser_main_loop.patch
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2725153
The function being patched (BrowserMainLoop::MainMessageLoopRun()) no
longer exists.
NB: if removing this introduces regressions the likely fix will be to
add a similar patch for ShellBrowserMainParts::WillRunMainMessageLoop()
which has similar code and was added at the same time this was removed.
* chore: rebuild chromium/put_back_deleted_colors_for_autofill.patch with import-patches -3
Mechanical only; no code changes
* chore: rebuild chromium/disable_color_correct_rendering.patch with import-patches -3
Mechanical only; no code changes
* chore: rebuild chromium/eat_allow_disabling_blink_scheduler_throttling_per_renderview.patch with patch
Mechanical only; no code changes
* chore: rebuild chromium/gpu_notify_when_dxdiag_request_fails.patch with import-patches -3
Mechanical only; no code changes
* chore: rebuild chromium/ui_gtk_public_header.patch manually
no code changes
* chore: rebuild chromium/web_contents.patch with import-patches -3
Mechanical only; no code changes
* chore: remove v8/skip_global_registration_of_shared_arraybuffer_backing_stores.patch
Refs: https://chromium-review.googlesource.com/c/v8/v8/+/2763874
This patch has been merged upstream
* chore: export patches
* chore: update add_trustedauthclient_to_urlloaderfactory.patch
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2757969
Sync with removal of render_frame_id_
* chore: sync chromium/put_back_deleted_colors_for_autofill.patch
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2785841
SkColorFromColorId() no longer takes theme, scheme args
* chore: sync chromium/put_back_deleted_colors_for_autofill.patch
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2772143
Change new calls to GetDarkSchemeColor to fit our patched call signature
* chore: update add_trustedauthclient_to_urlloaderfactory.patch
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2757969
Sync with removal of render_frame_id_ in our mojom
* chore: update chromium/frame_host_manager.patch
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2740008
UrlInfo ctor now takes UrlInfo::OriginIsolationRequest instead of a bool
* chore: update chromium/revert_remove_contentrendererclient_shouldfork.patch
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2755314
Upstream has removed `history_list_length_` which we were comparing to 0
to calculate our `is_initial_navigation` bool when calling ShouldFork().
ShouldFork() is ours and none of the code paths actually use that param,
so this commit removes it altogether.
* chore: update permissions_to_register
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2789074
Replace all uses of APIPermission::ID enum with Mojo type
* refactor: update return type of PreMainMessageLoopRun()
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2725153
Used to return void; now returns an int errorcode.
Note: 2725153 also has some nice doc updates about Browser's "stages"
* refactor: sync ElectronBrowserMainParts to MainParts changes
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2725153
RunMainMessageLoopParts has been replaced with WillRunMainMessageLoop
so `BrowserMainLoop::result_code_` is no longer available to us for our
exit_code_ pointer.
This variable held a dual role: (1) of course, hold the exit code, but
also (2) was a nullptr before the message loop was ready, indicating to
anyone calling SetExitCode() that we were still in startup and could
just exit() without any extra steps. exit_code_ still fulfills these two
roles but is now a base::Optional.
* chore: update ElectronBrowserMainParts::PreDefaultMainMessageLoopRun
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2725153
BrowserMainParts::BrowsePreDefaultMainMesssageLoopRun() has been
removed; move that work to the new WillRunMainMessageLoop().
* refactor: stop using CallbackList; it has been removed.
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2785973
* refactor: update use of threadpools.
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2773408
The upstream code is still in flux (e.g. reverts and re-lands) but the
tl;dr for this commit is (1) include thread_pool.h if you're using it
and (2) don't instantiate pools directly.
* refactor: remove routing_id from CreateLoaderAndStart
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2762858
NB: One logic branch in ProxyingURLLoaderFactory::CreateLoaderAndStart
calls std::make_unique<InProgressRequest>, which needs a routing_id.
This PR uses the member field `routing_id_` since there's no longer one
being passed into CreateLoaderAndStart.
* refactor: sync to upstream ParittionOptions churn
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2771318
PartitionOptions' enums have changed.
* refactor: update Manifest::Location usage
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2771320
tldr: s/Manifest::FOO/ManifestLocation::kFoo/
* chore: bump chromium in DEPS to 91.0.4465.0
* update patches
* refactor: update extensions::Manifest to upstream
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2771320
- extensions::Manifest::COMPONENT
+ extensions::mojom::ManifestLocation::kExternalComponent
* refactor: sync with upstream UrlInfo ctor changes
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2740008
UrlInfo ctor now takes UrlInfo::OriginIsolationRequest instead of a bool
* chore: update invocation of convert_protocol_to_json.py
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2792623
python3 is being used in parts of the upstream build, but the copy of
convert_protocol_to_json.py invoked in v8/third_party/inspector_protocol
is not python3-friendly. Node has a py2+3-friendly version of it in its
tools directory, so call it instead.
* chore: use extensions::mojom::APIPermissionID
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2791122
tldr:
- extensions::APIPermission::kFoo
+ extensions::mojom::APIPermissionID::kFoo
* chore: Remove support for TLS1.0/1.1 in SSLVersionMin policy
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2765737
Remove TLS v1.0 & 1.1 from our SSLProtocolVersionFromString() function.
This is the same change made upstream at
https://chromium-review.googlesource.com/c/chromium/src/+/2765737/8/chrome/browser/ssl/ssl_config_service_manager_pref.cc
* fixup! chore: update ElectronBrowserMainParts::PreDefaultMainMessageLoopRun
* chore: Use IDType for permission change subscriptions.
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2791431
tldr: {Subscribe,Unsubscribe}PermissionStatusChange's tag type used to
be an int; now it's the new SubscriptionId type (which is an IdType64).
* chore: sync PowerMonitor code to upstream refactor
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2752635
tldr: PowerMonitor has been split into PowerStateObserver,
PowerSuspendObserver, and PowerThermalObserver to reduce number of tasks
posted to consumers who only need notifications for one of those things
instead of all of them.
* chore: use PartitionOptions's new Cookies field
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2771318
* Revert "refactor: remove routing_id from CreateLoaderAndStart"
This reverts commit 8c9773b87a3c84f9073a47089eb2b6889d745245.
8c9773b was only a partial fix; reverting to start & try again.
* update patches
* chore: bump chromium in DEPS to 91.0.4466.0
* chore: update chromium/accelerator.patch
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2795472
tldr: sync patch with upstream renamed variable & macro names.
* chore: update chromium/gtk_visibility.patch
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2796200
tldr: no code changes; just updating the diff to apply cleanly.
note: ooh upstream Wayland hacking!
* chore: update chromium/picture-in-picture.patch
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2710023
tldr: no code changes; just updating the diff to apply cleanly.
* chore: update chromium/worker_feat_add_hook_to_notify_script_ready.patch
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2775573
tldr: no code changes; just updating the diff to apply cleanly.
* chore: export_all_patches
* chore: update chromium/feat_add_set_theme_source_to_allow_apps_to.patch
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2796511
tldr: NotifyObservers has been renamed to NotifyOnNativeThemeUpdated,
so update the invocation in our patch.
* chore: update ElectronBrowserClient w/upstream API
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2797454
tldr: GetDevToolsManagerDelegate() was returning an owned raw pointer.
Replaced it with CreateDevToolsManagerDelegate() which uses unique_ptr<>.
* chore: handle new content::PermissionType::FILE_HANDLING in toV8()
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2762201
`file-handling` string confirmed in https://chromium-review.googlesource.com/c/chromium/src/+/2762201/18/chrome/browser/ui/webui/settings/site_settings_helper.cc
* refactor: remove routing_id from CreateLoaderAndStart pt 1
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2762858
Part 1: the easiest ones
* 2796724: Support Python3
https://chromium-review.googlesource.com/c/infra/luci/python-adb/+/2796724
* chore: bump chromium in DEPS to 91.0.4468.0
* 2668974: WebShare: Implement SharingServicePicker
https://chromium-review.googlesource.com/c/chromium/src/+/2668974
* 2802766: Apply modernize-make-unique to media/
https://chromium-review.googlesource.com/c/chromium/src/+/2802766
* 2802823: Apply modernize-make-unique to gpu/
https://chromium-review.googlesource.com/c/chromium/src/+/2802823
* 2803041: Apply modernize-make-unique to remaining files
https://chromium-review.googlesource.com/c/chromium/src/+/2803041
* 2798873: Convert GtkKeyBindingsHandler build checks to runtime checks
https://chromium-review.googlesource.com/c/chromium/src/+/2798873
* 2733595: [ch-r] Parse ACCEPT_CH H2/3 frame and restart with new headers if needed
https://chromium-review.googlesource.com/c/chromium/src/+/2733595
* chore: update patch indices
* 2795107: Remove unused PermissionRequest IDs.
https://chromium-review.googlesource.com/c/chromium/src/+/2795107
* chore: bump chromium in DEPS to 91.0.4469.0
* chore: fixup patch indices
* chore: bump chromium in DEPS to 91.0.4469.5
* PiP 1.5: Add microphone, camera, and hang up buttons to the PiP window
https://chromium-review.googlesource.com/c/chromium/src/+/2710023
* fixup! refactor: remove routing_id from CreateLoaderAndStart
* refactor: use URLLoaderNetworkServiceObserver for auth requests from SimpleURLLoader
* fixup! chore: fixup patch indices
* 2724817: Expand scope of wasm-eval to all URLs
https://chromium-review.googlesource.com/c/chromium/src/+/2724817
* Fixup patch after rebase
* chore: bump chromium in DEPS to 91.0.4472.0
* 2797341: [ozone/x11] Enabled the global shortcut listener.
https://chromium-review.googlesource.com/c/chromium/src/+/2797341
* 2805553: Reland Add GTK ColorMixers to ColorPipeline P1
https://chromium-review.googlesource.com/c/chromium/src/+/2805553
* 2804366: PiP 1.5: Label back to tab button with origin and center it
https://chromium-review.googlesource.com/c/chromium/src/+/2804366
* 2784730: Fix crash on AX mode change in NativeViewHost without a Widget
https://chromium-review.googlesource.com/c/chromium/src/+/2784730
* chore: update patch indices
* 2810174: Add PdfAnnotationsEnabled policy.
https://chromium-review.googlesource.com/c/chromium/src/+/2810174
* 2807829: Allow capturers to indicate if they want a WakeLock or not.
https://chromium-review.googlesource.com/c/chromium/src/+/2807829
* chore: bump chromium in DEPS to 92.0.4473.0
* chore: bump chromium in DEPS to 92.0.4474.0
* chore: bump chromium in DEPS to 92.0.4475.0
* chore: update patches
* chore: updates patches
* chore: update is_media_key patch to handle new ozone impl
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2797341
* fix: ExecuteJavascript requests now need to be flagged as non-bf-aware
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2787195
* chore: icon_util_x11 is now icon_util_linux
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2791362
* build: update sysroots
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2628496
* build: fix missing symbols on linux build
* use_ozone and use_x11 are not exclusive
* new button view to build for pip
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2797341
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2804366
* chore: fix broken gtk_util color patch
* chore: remove patch conflict
* build: update linux manifests
* chore: build bttlb on all platforms for pip
* chore: add thread_pool include for views delegate win
* chore: fix lint
* chore: add node patches for V8 changes
* build: add missing base include on windows
* fix: update frame host manager patch for new state transitions
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2714464
* chore: update windows zip manifests
* chore: update mac zip manifests
* chore: fix patch linting
* refactor: implement missing URLLoaderNetworkServiceObserver methods
It is against The Mojo Rules to leave hanging callbacks. These always
have to be called.
Refs: https://github.com/electron/electron/commit/186528aab9f8e29d658f07d220bb7f627980edda
* spec: fix locale test on local linux
* fix: pass the exit code correctly in new PreMainMessageLoopRun
Refs: https://github.com/electron/electron/commit/2622e91c4493ceb032e2f80cb484885bb8f97475
* fix: ensure we early-exit when request_handler_ is not provided
Refs: https://github.com/electron/electron/commit/93077afbfb6db248a0c0cc447d7ad2c9ccfda1d5
* fix: strongly set result_code in the BrowserMainLoop
* fix: invalid usage of non-targetted PostTask
You must always either use a host threadpool or specify a target
thread. In this case we did neither after this refactor.
Refs: https://github.com/electron/electron/pull/28462/commits/4e33ee0ad35a710bd34641cb0376bdee6aea2d1f
* chore: fix gn check
* chore: remove stray .rej files in patch
* chore: add mojo error code to url loader failure
* build: ensure CI is truthy in arm test env
* fix: handle windowCaptureMacV2 being enabled when fetching media source id
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2709931
Co-authored-by: Charles Kerr <charles@charleskerr.com>
Co-authored-by: Shelley Vohr <shelley.vohr@gmail.com>
Co-authored-by: deepak1556 <hop2deep@gmail.com>
Co-authored-by: Samuel Attard <samuel.r.attard@gmail.com>
Co-authored-by: Samuel Attard <sattard@slack-corp.com>
2021-04-15 17:44:35 +00:00
|
|
|
if (extension->location() !=
|
2021-05-19 23:08:24 +00:00
|
|
|
extensions::mojom::ManifestLocation::kComponent)
|
2020-02-13 00:39:12 +00:00
|
|
|
extensions_vector.emplace_back(extension.get());
|
2020-01-13 22:56:28 +00:00
|
|
|
}
|
2021-03-29 10:45:08 +00:00
|
|
|
return gin::ConvertToV8(isolate_, extensions_vector);
|
2019-07-24 23:01:08 +00:00
|
|
|
}
|
2020-09-23 19:29:08 +00:00
|
|
|
|
|
|
|
void Session::OnExtensionLoaded(content::BrowserContext* browser_context,
|
|
|
|
const extensions::Extension* extension) {
|
|
|
|
Emit("extension-loaded", extension);
|
|
|
|
}
|
|
|
|
|
|
|
|
void Session::OnExtensionUnloaded(content::BrowserContext* browser_context,
|
|
|
|
const extensions::Extension* extension,
|
|
|
|
extensions::UnloadedExtensionReason reason) {
|
|
|
|
Emit("extension-unloaded", extension);
|
|
|
|
}
|
|
|
|
|
|
|
|
void Session::OnExtensionReady(content::BrowserContext* browser_context,
|
|
|
|
const extensions::Extension* extension) {
|
|
|
|
Emit("extension-ready", extension);
|
|
|
|
}
|
2019-07-24 23:01:08 +00:00
|
|
|
#endif
|
|
|
|
|
2015-06-16 09:23:29 +00:00
|
|
|
v8::Local<v8::Value> Session::Cookies(v8::Isolate* isolate) {
|
|
|
|
if (cookies_.IsEmpty()) {
|
2016-09-21 23:24:03 +00:00
|
|
|
auto handle = Cookies::Create(isolate, browser_context());
|
2015-06-16 09:23:29 +00:00
|
|
|
cookies_.Reset(isolate, handle.ToV8());
|
|
|
|
}
|
2020-03-26 17:34:32 +00:00
|
|
|
return cookies_.Get(isolate);
|
2015-06-16 09:23:29 +00:00
|
|
|
}
|
|
|
|
|
2016-06-08 14:31:27 +00:00
|
|
|
v8::Local<v8::Value> Session::Protocol(v8::Isolate* isolate) {
|
2020-03-26 17:34:32 +00:00
|
|
|
return protocol_.Get(isolate);
|
2016-06-08 14:31:27 +00:00
|
|
|
}
|
|
|
|
|
2020-02-20 23:19:06 +00:00
|
|
|
v8::Local<v8::Value> Session::ServiceWorkerContext(v8::Isolate* isolate) {
|
|
|
|
if (service_worker_context_.IsEmpty()) {
|
|
|
|
v8::Local<v8::Value> handle;
|
|
|
|
handle = ServiceWorkerContext::Create(isolate, browser_context()).ToV8();
|
|
|
|
service_worker_context_.Reset(isolate, handle);
|
|
|
|
}
|
2020-03-26 17:34:32 +00:00
|
|
|
return service_worker_context_.Get(isolate);
|
2020-02-20 23:19:06 +00:00
|
|
|
}
|
|
|
|
|
2015-12-01 04:52:22 +00:00
|
|
|
v8::Local<v8::Value> Session::WebRequest(v8::Isolate* isolate) {
|
|
|
|
if (web_request_.IsEmpty()) {
|
2019-10-24 00:51:06 +00:00
|
|
|
auto handle = WebRequest::Create(isolate, browser_context());
|
2019-08-11 04:24:51 +00:00
|
|
|
web_request_.Reset(isolate, handle.ToV8());
|
2015-12-01 04:52:22 +00:00
|
|
|
}
|
2020-03-26 17:34:32 +00:00
|
|
|
return web_request_.Get(isolate);
|
2015-12-01 04:52:22 +00:00
|
|
|
}
|
|
|
|
|
2018-10-04 18:08:56 +00:00
|
|
|
v8::Local<v8::Value> Session::NetLog(v8::Isolate* isolate) {
|
|
|
|
if (net_log_.IsEmpty()) {
|
2020-03-26 17:34:32 +00:00
|
|
|
auto handle = NetLog::Create(isolate, browser_context());
|
2018-10-04 18:08:56 +00:00
|
|
|
net_log_.Reset(isolate, handle.ToV8());
|
|
|
|
}
|
2020-03-26 17:34:32 +00:00
|
|
|
return net_log_.Get(isolate);
|
2018-10-04 18:08:56 +00:00
|
|
|
}
|
|
|
|
|
2020-08-17 20:21:53 +00:00
|
|
|
static void StartPreconnectOnUI(ElectronBrowserContext* browser_context,
|
|
|
|
const GURL& url,
|
|
|
|
int num_sockets_to_preconnect) {
|
2021-09-06 07:33:10 +00:00
|
|
|
url::Origin origin = url::Origin::Create(url);
|
2019-08-26 16:47:32 +00:00
|
|
|
std::vector<predictors::PreconnectRequest> requests = {
|
2019-12-11 00:22:35 +00:00
|
|
|
{url::Origin::Create(url), num_sockets_to_preconnect,
|
2021-09-06 07:33:10 +00:00
|
|
|
net::NetworkIsolationKey(origin, origin)}};
|
2019-08-26 16:47:32 +00:00
|
|
|
browser_context->GetPreconnectManager()->Start(url, requests);
|
|
|
|
}
|
|
|
|
|
2019-10-25 13:03:28 +00:00
|
|
|
void Session::Preconnect(const gin_helper::Dictionary& options,
|
2020-05-19 17:18:12 +00:00
|
|
|
gin::Arguments* args) {
|
2019-08-26 16:47:32 +00:00
|
|
|
GURL url;
|
|
|
|
if (!options.Get("url", &url) || !url.is_valid()) {
|
2020-05-19 17:18:12 +00:00
|
|
|
args->ThrowTypeError(
|
|
|
|
"Must pass non-empty valid url to session.preconnect.");
|
2019-08-26 16:47:32 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
int num_sockets_to_preconnect = 1;
|
|
|
|
if (options.Get("numSockets", &num_sockets_to_preconnect)) {
|
|
|
|
const int kMinSocketsToPreconnect = 1;
|
|
|
|
const int kMaxSocketsToPreconnect = 6;
|
|
|
|
if (num_sockets_to_preconnect < kMinSocketsToPreconnect ||
|
|
|
|
num_sockets_to_preconnect > kMaxSocketsToPreconnect) {
|
2020-05-19 17:18:12 +00:00
|
|
|
args->ThrowTypeError(
|
2019-08-26 16:47:32 +00:00
|
|
|
base::StringPrintf("numSocketsToPreconnect is outside range [%d,%d]",
|
|
|
|
kMinSocketsToPreconnect, kMaxSocketsToPreconnect));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
DCHECK_GT(num_sockets_to_preconnect, 0);
|
2022-05-17 16:48:40 +00:00
|
|
|
content::GetUIThreadTaskRunner({})->PostTask(
|
|
|
|
FROM_HERE,
|
2020-08-17 20:21:53 +00:00
|
|
|
base::BindOnce(&StartPreconnectOnUI, base::Unretained(browser_context_),
|
2019-08-26 16:47:32 +00:00
|
|
|
url, num_sockets_to_preconnect));
|
|
|
|
}
|
|
|
|
|
2020-10-08 16:45:36 +00:00
|
|
|
v8::Local<v8::Promise> Session::CloseAllConnections() {
|
2021-03-29 10:45:08 +00:00
|
|
|
gin_helper::Promise<void> promise(isolate_);
|
2020-10-08 16:45:36 +00:00
|
|
|
auto handle = promise.GetHandle();
|
|
|
|
|
2021-05-04 03:13:46 +00:00
|
|
|
browser_context_->GetDefaultStoragePartition()
|
2020-10-08 16:45:36 +00:00
|
|
|
->GetNetworkContext()
|
|
|
|
->CloseAllConnections(base::BindOnce(
|
|
|
|
gin_helper::Promise<void>::ResolvePromise, std::move(promise)));
|
|
|
|
|
|
|
|
return handle;
|
|
|
|
}
|
|
|
|
|
2021-04-27 16:54:28 +00:00
|
|
|
v8::Local<v8::Value> Session::GetPath(v8::Isolate* isolate) {
|
|
|
|
if (browser_context_->IsOffTheRecord()) {
|
|
|
|
return v8::Null(isolate);
|
|
|
|
}
|
|
|
|
return gin::ConvertToV8(isolate, browser_context_->GetPath());
|
|
|
|
}
|
|
|
|
|
2022-03-15 20:34:53 +00:00
|
|
|
void Session::SetCodeCachePath(gin::Arguments* args) {
|
|
|
|
base::FilePath code_cache_path;
|
|
|
|
auto* storage_partition = browser_context_->GetDefaultStoragePartition();
|
|
|
|
auto* code_cache_context = storage_partition->GetGeneratedCodeCacheContext();
|
|
|
|
if (code_cache_context) {
|
|
|
|
if (!args->GetNext(&code_cache_path) || !code_cache_path.IsAbsolute()) {
|
|
|
|
args->ThrowTypeError(
|
|
|
|
"Absolute path must be provided to store code cache.");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
code_cache_context->Initialize(
|
|
|
|
code_cache_path, 0 /* allows disk_cache to choose the size */);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
v8::Local<v8::Promise> Session::ClearCodeCaches(
|
|
|
|
const gin_helper::Dictionary& options) {
|
|
|
|
auto* isolate = JavascriptEnvironment::GetIsolate();
|
|
|
|
gin_helper::Promise<void> promise(isolate);
|
|
|
|
v8::Local<v8::Promise> handle = promise.GetHandle();
|
|
|
|
|
|
|
|
std::set<GURL> url_list;
|
|
|
|
base::RepeatingCallback<bool(const GURL&)> url_matcher = base::NullCallback();
|
|
|
|
if (options.Get("urls", &url_list) && !url_list.empty()) {
|
|
|
|
url_matcher = base::BindRepeating(
|
|
|
|
[](const std::set<GURL>& url_list, const GURL& url) {
|
|
|
|
return base::Contains(url_list, url);
|
|
|
|
},
|
|
|
|
url_list);
|
|
|
|
}
|
|
|
|
|
|
|
|
browser_context_->GetDefaultStoragePartition()->ClearCodeCaches(
|
|
|
|
base::Time(), base::Time::Max(), url_matcher,
|
|
|
|
base::BindOnce(gin_helper::Promise<void>::ResolvePromise,
|
|
|
|
std::move(promise)));
|
|
|
|
|
|
|
|
return handle;
|
|
|
|
}
|
|
|
|
|
2019-10-31 20:11:51 +00:00
|
|
|
#if BUILDFLAG(ENABLE_BUILTIN_SPELLCHECKER)
|
|
|
|
base::Value Session::GetSpellCheckerLanguages() {
|
|
|
|
return browser_context_->prefs()
|
|
|
|
->Get(spellcheck::prefs::kSpellCheckDictionaries)
|
|
|
|
->Clone();
|
|
|
|
}
|
|
|
|
|
|
|
|
void Session::SetSpellCheckerLanguages(
|
|
|
|
gin_helper::ErrorThrower thrower,
|
|
|
|
const std::vector<std::string>& languages) {
|
2022-06-22 08:14:35 +00:00
|
|
|
base::Value::List language_codes;
|
2019-10-31 20:11:51 +00:00
|
|
|
for (const std::string& lang : languages) {
|
|
|
|
std::string code = spellcheck::GetCorrespondingSpellCheckLanguage(lang);
|
|
|
|
if (code.empty()) {
|
|
|
|
thrower.ThrowError("Invalid language code provided: \"" + lang +
|
|
|
|
"\" is not a valid language code");
|
|
|
|
return;
|
|
|
|
}
|
2021-10-06 02:21:00 +00:00
|
|
|
language_codes.Append(code);
|
2019-10-31 20:11:51 +00:00
|
|
|
}
|
|
|
|
browser_context_->prefs()->Set(spellcheck::prefs::kSpellCheckDictionaries,
|
2022-06-22 08:14:35 +00:00
|
|
|
base::Value(std::move(language_codes)));
|
2020-10-23 07:34:19 +00:00
|
|
|
// Enable spellcheck if > 0 languages, disable if no languages set
|
|
|
|
browser_context_->prefs()->SetBoolean(spellcheck::prefs::kSpellCheckEnable,
|
|
|
|
!languages.empty());
|
2019-10-31 20:11:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void SetSpellCheckerDictionaryDownloadURL(gin_helper::ErrorThrower thrower,
|
|
|
|
const GURL& url) {
|
|
|
|
if (!url.is_valid()) {
|
|
|
|
thrower.ThrowError(
|
|
|
|
"The URL you provided to setSpellCheckerDictionaryDownloadURL is not a "
|
|
|
|
"valid URL");
|
|
|
|
return;
|
|
|
|
}
|
2020-02-25 22:57:28 +00:00
|
|
|
SpellcheckHunspellDictionary::SetBaseDownloadURL(url);
|
2019-10-31 20:11:51 +00:00
|
|
|
}
|
2019-11-26 21:16:43 +00:00
|
|
|
|
2020-02-10 22:08:53 +00:00
|
|
|
v8::Local<v8::Promise> Session::ListWordsInSpellCheckerDictionary() {
|
2021-03-29 10:45:08 +00:00
|
|
|
gin_helper::Promise<std::set<std::string>> promise(isolate_);
|
2020-02-10 22:08:53 +00:00
|
|
|
v8::Local<v8::Promise> handle = promise.GetHandle();
|
|
|
|
|
|
|
|
SpellcheckService* spellcheck =
|
2020-08-17 20:21:53 +00:00
|
|
|
SpellcheckServiceFactory::GetForContext(browser_context_);
|
2020-02-10 22:08:53 +00:00
|
|
|
|
2020-10-22 17:53:42 +00:00
|
|
|
if (!spellcheck) {
|
2020-02-10 22:08:53 +00:00
|
|
|
promise.RejectWithErrorMessage(
|
|
|
|
"Spellcheck in unexpected state: failed to load custom dictionary.");
|
2020-10-22 17:53:42 +00:00
|
|
|
return handle;
|
|
|
|
}
|
2020-02-10 22:08:53 +00:00
|
|
|
|
|
|
|
if (spellcheck->GetCustomDictionary()->IsLoaded()) {
|
|
|
|
promise.Resolve(spellcheck->GetCustomDictionary()->GetWords());
|
|
|
|
} else {
|
|
|
|
new DictionaryObserver(std::move(promise), spellcheck->GetWeakPtr());
|
|
|
|
// Dictionary loads by default asynchronously,
|
|
|
|
// call the load function anyways just to be sure.
|
|
|
|
spellcheck->GetCustomDictionary()->Load();
|
|
|
|
}
|
|
|
|
|
|
|
|
return handle;
|
|
|
|
}
|
|
|
|
|
2019-11-26 21:16:43 +00:00
|
|
|
bool Session::AddWordToSpellCheckerDictionary(const std::string& word) {
|
2020-03-10 07:45:43 +00:00
|
|
|
// don't let in-memory sessions add spellchecker words
|
|
|
|
// because files will persist unintentionally
|
|
|
|
bool is_in_memory = browser_context_->IsOffTheRecord();
|
|
|
|
if (is_in_memory)
|
|
|
|
return false;
|
|
|
|
|
2020-02-06 07:05:30 +00:00
|
|
|
SpellcheckService* service =
|
2020-08-17 20:21:53 +00:00
|
|
|
SpellcheckServiceFactory::GetForContext(browser_context_);
|
2020-02-06 07:05:30 +00:00
|
|
|
if (!service)
|
|
|
|
return false;
|
|
|
|
|
2019-11-26 21:16:43 +00:00
|
|
|
#if BUILDFLAG(USE_BROWSER_SPELLCHECKER)
|
|
|
|
if (spellcheck::UseBrowserSpellChecker()) {
|
2020-02-06 07:05:30 +00:00
|
|
|
spellcheck_platform::AddWord(service->platform_spell_checker(),
|
|
|
|
base::UTF8ToUTF16(word));
|
2019-11-26 21:16:43 +00:00
|
|
|
}
|
|
|
|
#endif
|
2020-02-06 07:05:30 +00:00
|
|
|
return service->GetCustomDictionary()->AddWord(word);
|
2019-11-26 21:16:43 +00:00
|
|
|
}
|
2020-02-10 22:07:25 +00:00
|
|
|
|
|
|
|
bool Session::RemoveWordFromSpellCheckerDictionary(const std::string& word) {
|
2020-03-10 07:45:43 +00:00
|
|
|
// don't let in-memory sessions remove spellchecker words
|
|
|
|
// because files will persist unintentionally
|
|
|
|
bool is_in_memory = browser_context_->IsOffTheRecord();
|
|
|
|
if (is_in_memory)
|
|
|
|
return false;
|
|
|
|
|
2020-02-10 22:07:25 +00:00
|
|
|
SpellcheckService* service =
|
2020-08-17 20:21:53 +00:00
|
|
|
SpellcheckServiceFactory::GetForContext(browser_context_);
|
2020-02-10 22:07:25 +00:00
|
|
|
if (!service)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
#if BUILDFLAG(USE_BROWSER_SPELLCHECKER)
|
|
|
|
if (spellcheck::UseBrowserSpellChecker()) {
|
|
|
|
spellcheck_platform::RemoveWord(service->platform_spell_checker(),
|
|
|
|
base::UTF8ToUTF16(word));
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
return service->GetCustomDictionary()->RemoveWord(word);
|
|
|
|
}
|
2020-11-11 15:29:18 +00:00
|
|
|
|
|
|
|
void Session::SetSpellCheckerEnabled(bool b) {
|
|
|
|
browser_context_->prefs()->SetBoolean(spellcheck::prefs::kSpellCheckEnable,
|
|
|
|
b);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool Session::IsSpellCheckerEnabled() const {
|
|
|
|
return browser_context_->prefs()->GetBoolean(
|
|
|
|
spellcheck::prefs::kSpellCheckEnable);
|
|
|
|
}
|
|
|
|
|
2020-03-10 09:39:40 +00:00
|
|
|
#endif // BUILDFLAG(ENABLE_BUILTIN_SPELLCHECKER)
|
2019-10-31 20:11:51 +00:00
|
|
|
|
2020-05-19 17:18:12 +00:00
|
|
|
// static
|
|
|
|
Session* Session::FromBrowserContext(content::BrowserContext* context) {
|
2020-10-26 18:56:31 +00:00
|
|
|
auto* data =
|
2020-05-19 17:18:12 +00:00
|
|
|
static_cast<UserDataLink*>(context->GetUserData(kElectronApiSessionKey));
|
|
|
|
return data ? data->session : nullptr;
|
|
|
|
}
|
|
|
|
|
2015-06-16 09:23:29 +00:00
|
|
|
// static
|
2019-10-25 13:03:28 +00:00
|
|
|
gin::Handle<Session> Session::CreateFrom(
|
|
|
|
v8::Isolate* isolate,
|
|
|
|
ElectronBrowserContext* browser_context) {
|
2020-05-19 17:18:12 +00:00
|
|
|
Session* existing = FromBrowserContext(browser_context);
|
2015-06-24 07:37:04 +00:00
|
|
|
if (existing)
|
2020-05-19 17:18:12 +00:00
|
|
|
return gin::CreateHandle(isolate, existing);
|
2015-06-24 07:37:04 +00:00
|
|
|
|
2018-04-18 01:55:30 +00:00
|
|
|
auto handle =
|
2019-10-25 13:03:28 +00:00
|
|
|
gin::CreateHandle(isolate, new Session(isolate, browser_context));
|
2016-08-01 11:11:17 +00:00
|
|
|
|
|
|
|
// The Sessions should never be garbage collected, since the common pattern is
|
|
|
|
// to use partition strings, instead of using the Session object directly.
|
2020-05-19 17:18:12 +00:00
|
|
|
handle->Pin(isolate);
|
|
|
|
|
|
|
|
App::Get()->EmitCustomEvent("session-created",
|
|
|
|
handle.ToV8().As<v8::Object>());
|
2016-08-01 11:11:17 +00:00
|
|
|
|
2015-09-01 10:02:14 +00:00
|
|
|
return handle;
|
|
|
|
}
|
|
|
|
|
2015-09-05 14:39:48 +00:00
|
|
|
// static
|
2019-10-30 05:30:59 +00:00
|
|
|
gin::Handle<Session> Session::FromPartition(v8::Isolate* isolate,
|
|
|
|
const std::string& partition,
|
2022-07-05 15:25:18 +00:00
|
|
|
base::Value::Dict options) {
|
2020-08-17 20:21:53 +00:00
|
|
|
ElectronBrowserContext* browser_context;
|
2016-07-12 12:01:49 +00:00
|
|
|
if (partition.empty()) {
|
2019-10-30 05:30:59 +00:00
|
|
|
browser_context =
|
|
|
|
ElectronBrowserContext::From("", false, std::move(options));
|
2016-07-12 12:01:49 +00:00
|
|
|
} else if (base::StartsWith(partition, kPersistPrefix,
|
|
|
|
base::CompareCase::SENSITIVE)) {
|
|
|
|
std::string name = partition.substr(8);
|
2019-10-30 05:30:59 +00:00
|
|
|
browser_context =
|
|
|
|
ElectronBrowserContext::From(name, false, std::move(options));
|
2016-07-12 12:01:49 +00:00
|
|
|
} else {
|
2019-10-30 05:30:59 +00:00
|
|
|
browser_context =
|
|
|
|
ElectronBrowserContext::From(partition, true, std::move(options));
|
2016-07-12 12:01:49 +00:00
|
|
|
}
|
2020-08-17 20:21:53 +00:00
|
|
|
return CreateFrom(isolate, browser_context);
|
2015-09-05 14:39:48 +00:00
|
|
|
}
|
|
|
|
|
2020-05-19 17:18:12 +00:00
|
|
|
gin::ObjectTemplateBuilder Session::GetObjectTemplateBuilder(
|
|
|
|
v8::Isolate* isolate) {
|
|
|
|
return gin_helper::EventEmitterMixin<Session>::GetObjectTemplateBuilder(
|
|
|
|
isolate)
|
2015-12-03 08:04:46 +00:00
|
|
|
.SetMethod("resolveProxy", &Session::ResolveProxy)
|
2019-04-30 22:09:17 +00:00
|
|
|
.SetMethod("getCacheSize", &Session::GetCacheSize)
|
|
|
|
.SetMethod("clearCache", &Session::ClearCache)
|
2015-12-03 08:04:46 +00:00
|
|
|
.SetMethod("clearStorageData", &Session::ClearStorageData)
|
2016-01-12 15:28:12 +00:00
|
|
|
.SetMethod("flushStorageData", &Session::FlushStorageData)
|
2015-12-03 08:04:46 +00:00
|
|
|
.SetMethod("setProxy", &Session::SetProxy)
|
2020-10-27 06:50:06 +00:00
|
|
|
.SetMethod("forceReloadProxyConfig", &Session::ForceReloadProxyConfig)
|
2015-12-03 08:04:46 +00:00
|
|
|
.SetMethod("setDownloadPath", &Session::SetDownloadPath)
|
|
|
|
.SetMethod("enableNetworkEmulation", &Session::EnableNetworkEmulation)
|
|
|
|
.SetMethod("disableNetworkEmulation", &Session::DisableNetworkEmulation)
|
2018-05-23 20:51:28 +00:00
|
|
|
.SetMethod("setCertificateVerifyProc", &Session::SetCertVerifyProc)
|
2016-01-31 21:35:34 +00:00
|
|
|
.SetMethod("setPermissionRequestHandler",
|
|
|
|
&Session::SetPermissionRequestHandler)
|
2018-08-28 14:05:08 +00:00
|
|
|
.SetMethod("setPermissionCheckHandler",
|
|
|
|
&Session::SetPermissionCheckHandler)
|
2021-09-23 11:00:11 +00:00
|
|
|
.SetMethod("setDevicePermissionHandler",
|
|
|
|
&Session::SetDevicePermissionHandler)
|
2016-02-01 13:33:23 +00:00
|
|
|
.SetMethod("clearHostResolverCache", &Session::ClearHostResolverCache)
|
2016-11-30 16:35:15 +00:00
|
|
|
.SetMethod("clearAuthCache", &Session::ClearAuthCache)
|
2016-05-23 05:29:55 +00:00
|
|
|
.SetMethod("allowNTLMCredentialsForDomains",
|
|
|
|
&Session::AllowNTLMCredentialsForDomains)
|
2020-03-11 07:02:22 +00:00
|
|
|
.SetMethod("isPersistent", &Session::IsPersistent)
|
2016-06-22 06:57:51 +00:00
|
|
|
.SetMethod("setUserAgent", &Session::SetUserAgent)
|
|
|
|
.SetMethod("getUserAgent", &Session::GetUserAgent)
|
2020-09-23 20:22:10 +00:00
|
|
|
.SetMethod("setSSLConfig", &Session::SetSSLConfig)
|
2016-08-23 05:57:43 +00:00
|
|
|
.SetMethod("getBlobData", &Session::GetBlobData)
|
2019-08-29 03:27:20 +00:00
|
|
|
.SetMethod("downloadURL", &Session::DownloadURL)
|
2016-11-18 10:43:43 +00:00
|
|
|
.SetMethod("createInterruptedDownload",
|
|
|
|
&Session::CreateInterruptedDownload)
|
2017-12-05 06:59:15 +00:00
|
|
|
.SetMethod("setPreloads", &Session::SetPreloads)
|
2017-09-16 15:05:49 +00:00
|
|
|
.SetMethod("getPreloads", &Session::GetPreloads)
|
2019-07-24 23:01:08 +00:00
|
|
|
#if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
|
2020-01-13 22:56:28 +00:00
|
|
|
.SetMethod("loadExtension", &Session::LoadExtension)
|
|
|
|
.SetMethod("removeExtension", &Session::RemoveExtension)
|
|
|
|
.SetMethod("getExtension", &Session::GetExtension)
|
|
|
|
.SetMethod("getAllExtensions", &Session::GetAllExtensions)
|
2019-10-31 20:11:51 +00:00
|
|
|
#endif
|
|
|
|
#if BUILDFLAG(ENABLE_BUILTIN_SPELLCHECKER)
|
|
|
|
.SetMethod("getSpellCheckerLanguages", &Session::GetSpellCheckerLanguages)
|
|
|
|
.SetMethod("setSpellCheckerLanguages", &Session::SetSpellCheckerLanguages)
|
|
|
|
.SetProperty("availableSpellCheckerLanguages",
|
|
|
|
&spellcheck::SpellCheckLanguages)
|
|
|
|
.SetMethod("setSpellCheckerDictionaryDownloadURL",
|
|
|
|
&SetSpellCheckerDictionaryDownloadURL)
|
2020-02-10 22:08:53 +00:00
|
|
|
.SetMethod("listWordsInSpellCheckerDictionary",
|
|
|
|
&Session::ListWordsInSpellCheckerDictionary)
|
2019-11-26 21:16:43 +00:00
|
|
|
.SetMethod("addWordToSpellCheckerDictionary",
|
|
|
|
&Session::AddWordToSpellCheckerDictionary)
|
2020-02-10 22:07:25 +00:00
|
|
|
.SetMethod("removeWordFromSpellCheckerDictionary",
|
|
|
|
&Session::RemoveWordFromSpellCheckerDictionary)
|
2020-11-11 15:29:18 +00:00
|
|
|
.SetMethod("setSpellCheckerEnabled", &Session::SetSpellCheckerEnabled)
|
|
|
|
.SetMethod("isSpellCheckerEnabled", &Session::IsSpellCheckerEnabled)
|
|
|
|
.SetProperty("spellCheckerEnabled", &Session::IsSpellCheckerEnabled,
|
|
|
|
&Session::SetSpellCheckerEnabled)
|
2019-07-24 23:01:08 +00:00
|
|
|
#endif
|
2019-08-26 16:47:32 +00:00
|
|
|
.SetMethod("preconnect", &Session::Preconnect)
|
2020-10-08 16:45:36 +00:00
|
|
|
.SetMethod("closeAllConnections", &Session::CloseAllConnections)
|
2021-04-27 16:54:28 +00:00
|
|
|
.SetMethod("getStoragePath", &Session::GetPath)
|
2022-03-15 20:34:53 +00:00
|
|
|
.SetMethod("setCodeCachePath", &Session::SetCodeCachePath)
|
|
|
|
.SetMethod("clearCodeCaches", &Session::ClearCodeCaches)
|
2015-12-01 04:52:22 +00:00
|
|
|
.SetProperty("cookies", &Session::Cookies)
|
2018-10-04 18:08:56 +00:00
|
|
|
.SetProperty("netLog", &Session::NetLog)
|
2016-06-08 14:31:27 +00:00
|
|
|
.SetProperty("protocol", &Session::Protocol)
|
2020-02-20 23:19:06 +00:00
|
|
|
.SetProperty("serviceWorkers", &Session::ServiceWorkerContext)
|
2021-04-27 16:54:28 +00:00
|
|
|
.SetProperty("webRequest", &Session::WebRequest)
|
|
|
|
.SetProperty("storagePath", &Session::GetPath);
|
2015-12-03 08:04:46 +00:00
|
|
|
}
|
|
|
|
|
2020-05-19 17:18:12 +00:00
|
|
|
const char* Session::GetTypeName() {
|
|
|
|
return "Session";
|
|
|
|
}
|
|
|
|
|
2022-06-29 19:55:47 +00:00
|
|
|
} // namespace electron::api
|
2015-09-01 10:02:14 +00:00
|
|
|
|
|
|
|
namespace {
|
|
|
|
|
2016-08-02 11:38:35 +00:00
|
|
|
using electron::api::Session;
|
|
|
|
|
2018-04-18 01:55:30 +00:00
|
|
|
v8::Local<v8::Value> FromPartition(const std::string& partition,
|
2020-05-19 17:18:12 +00:00
|
|
|
gin::Arguments* args) {
|
2016-07-12 11:21:59 +00:00
|
|
|
if (!electron::Browser::Get()->is_ready()) {
|
2020-05-19 17:18:12 +00:00
|
|
|
args->ThrowTypeError("Session can only be received when app is ready");
|
2016-07-12 11:21:59 +00:00
|
|
|
return v8::Null(args->isolate());
|
|
|
|
}
|
2022-07-05 15:25:18 +00:00
|
|
|
base::Value::Dict options;
|
2016-07-12 12:53:19 +00:00
|
|
|
args->GetNext(&options);
|
2019-10-30 05:30:59 +00:00
|
|
|
return Session::FromPartition(args->isolate(), partition, std::move(options))
|
|
|
|
.ToV8();
|
2016-07-12 11:21:59 +00:00
|
|
|
}
|
|
|
|
|
2018-04-18 01:55:30 +00:00
|
|
|
void Initialize(v8::Local<v8::Object> exports,
|
|
|
|
v8::Local<v8::Value> unused,
|
|
|
|
v8::Local<v8::Context> context,
|
|
|
|
void* priv) {
|
2015-09-01 10:02:14 +00:00
|
|
|
v8::Isolate* isolate = context->GetIsolate();
|
2019-10-25 13:03:28 +00:00
|
|
|
gin_helper::Dictionary dict(isolate, exports);
|
2016-07-12 11:21:59 +00:00
|
|
|
dict.SetMethod("fromPartition", &FromPartition);
|
2015-09-01 10:02:14 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
} // namespace
|
|
|
|
|
2020-02-14 11:25:39 +00:00
|
|
|
NODE_LINKED_MODULE_CONTEXT_AWARE(electron_browser_session, Initialize)
|