2020-01-15 23:11:51 +00:00
|
|
|
// Copyright (c) 2019 Slack Technologies, Inc.
|
|
|
|
// Use of this source code is governed by the MIT license that can be
|
|
|
|
// found in the LICENSE file.
|
|
|
|
|
|
|
|
#include "shell/browser/extensions/api/tabs/tabs_api.h"
|
|
|
|
|
|
|
|
#include <memory>
|
|
|
|
#include <utility>
|
|
|
|
|
2021-07-27 20:36:22 +00:00
|
|
|
#include "chrome/common/url_constants.h"
|
|
|
|
#include "components/url_formatter/url_fixer.h"
|
|
|
|
#include "content/public/browser/navigation_entry.h"
|
2020-01-15 23:11:51 +00:00
|
|
|
#include "extensions/browser/extension_api_frame_id_map.h"
|
|
|
|
#include "extensions/common/error_utils.h"
|
|
|
|
#include "extensions/common/manifest_constants.h"
|
2021-03-16 14:28:55 +00:00
|
|
|
#include "extensions/common/mojom/host_id.mojom.h"
|
2020-01-15 23:11:51 +00:00
|
|
|
#include "extensions/common/permissions/permissions_data.h"
|
2020-02-04 20:19:40 +00:00
|
|
|
#include "shell/browser/api/electron_api_web_contents.h"
|
2020-02-13 00:39:12 +00:00
|
|
|
#include "shell/browser/web_contents_zoom_controller.h"
|
|
|
|
#include "shell/common/extensions/api/tabs.h"
|
|
|
|
#include "third_party/blink/public/common/page/page_zoom.h"
|
2021-07-02 00:51:37 +00:00
|
|
|
#include "url/gurl.h"
|
2020-02-13 00:39:12 +00:00
|
|
|
|
|
|
|
using electron::WebContentsZoomController;
|
2020-01-15 23:11:51 +00:00
|
|
|
|
|
|
|
namespace extensions {
|
|
|
|
|
2020-02-13 00:39:12 +00:00
|
|
|
namespace tabs = api::tabs;
|
|
|
|
|
2020-01-15 23:11:51 +00:00
|
|
|
const char kFrameNotFoundError[] = "No frame with id * in tab *.";
|
2020-02-13 00:39:12 +00:00
|
|
|
const char kPerOriginOnlyInAutomaticError[] =
|
|
|
|
"Can only set scope to "
|
|
|
|
"\"per-origin\" in \"automatic\" mode.";
|
2020-01-15 23:11:51 +00:00
|
|
|
|
|
|
|
using api::extension_types::InjectDetails;
|
|
|
|
|
2020-02-13 00:39:12 +00:00
|
|
|
namespace {
|
|
|
|
void ZoomModeToZoomSettings(WebContentsZoomController::ZoomMode zoom_mode,
|
|
|
|
api::tabs::ZoomSettings* zoom_settings) {
|
|
|
|
DCHECK(zoom_settings);
|
|
|
|
switch (zoom_mode) {
|
2020-10-27 17:51:45 +00:00
|
|
|
case WebContentsZoomController::ZoomMode::kDefault:
|
2020-02-13 00:39:12 +00:00
|
|
|
zoom_settings->mode = api::tabs::ZOOM_SETTINGS_MODE_AUTOMATIC;
|
|
|
|
zoom_settings->scope = api::tabs::ZOOM_SETTINGS_SCOPE_PER_ORIGIN;
|
|
|
|
break;
|
2020-10-27 17:51:45 +00:00
|
|
|
case WebContentsZoomController::ZoomMode::kIsolated:
|
2020-02-13 00:39:12 +00:00
|
|
|
zoom_settings->mode = api::tabs::ZOOM_SETTINGS_MODE_AUTOMATIC;
|
|
|
|
zoom_settings->scope = api::tabs::ZOOM_SETTINGS_SCOPE_PER_TAB;
|
|
|
|
break;
|
2020-10-27 17:51:45 +00:00
|
|
|
case WebContentsZoomController::ZoomMode::kManual:
|
2020-02-13 00:39:12 +00:00
|
|
|
zoom_settings->mode = api::tabs::ZOOM_SETTINGS_MODE_MANUAL;
|
|
|
|
zoom_settings->scope = api::tabs::ZOOM_SETTINGS_SCOPE_PER_TAB;
|
|
|
|
break;
|
2020-10-27 17:51:45 +00:00
|
|
|
case WebContentsZoomController::ZoomMode::kDisabled:
|
2020-02-13 00:39:12 +00:00
|
|
|
zoom_settings->mode = api::tabs::ZOOM_SETTINGS_MODE_DISABLED;
|
|
|
|
zoom_settings->scope = api::tabs::ZOOM_SETTINGS_SCOPE_PER_TAB;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} // namespace
|
|
|
|
|
2020-01-15 23:11:51 +00:00
|
|
|
ExecuteCodeInTabFunction::ExecuteCodeInTabFunction() : execute_tab_id_(-1) {}
|
|
|
|
|
2021-06-04 04:16:13 +00:00
|
|
|
ExecuteCodeInTabFunction::~ExecuteCodeInTabFunction() = default;
|
2020-01-15 23:11:51 +00:00
|
|
|
|
|
|
|
ExecuteCodeFunction::InitResult ExecuteCodeInTabFunction::Init() {
|
|
|
|
if (init_result_)
|
|
|
|
return init_result_.value();
|
|
|
|
|
2021-07-26 16:02:16 +00:00
|
|
|
const auto& list = args_->GetList();
|
|
|
|
if (list.size() < 2)
|
|
|
|
return set_init_result(VALIDATION_FAILURE);
|
|
|
|
|
|
|
|
const auto& tab_id_value = list[0];
|
2020-01-15 23:11:51 +00:00
|
|
|
// |tab_id| is optional so it's ok if it's not there.
|
|
|
|
int tab_id = -1;
|
2021-07-26 16:02:16 +00:00
|
|
|
if (tab_id_value.is_int()) {
|
|
|
|
// But if it is present, it needs to be non-negative.
|
|
|
|
tab_id = tab_id_value.GetInt();
|
|
|
|
if (tab_id < 0) {
|
|
|
|
return set_init_result(VALIDATION_FAILURE);
|
|
|
|
}
|
|
|
|
}
|
2020-01-15 23:11:51 +00:00
|
|
|
|
|
|
|
// |details| are not optional.
|
2021-07-26 16:02:16 +00:00
|
|
|
const base::Value& details_value = list[1];
|
|
|
|
if (!details_value.is_dict())
|
2020-01-15 23:11:51 +00:00
|
|
|
return set_init_result(VALIDATION_FAILURE);
|
2021-07-26 16:02:16 +00:00
|
|
|
std::unique_ptr<InjectDetails> details(new InjectDetails());
|
|
|
|
if (!InjectDetails::Populate(details_value, details.get()))
|
2020-01-15 23:11:51 +00:00
|
|
|
return set_init_result(VALIDATION_FAILURE);
|
|
|
|
|
|
|
|
if (tab_id == -1) {
|
|
|
|
// There's no useful concept of a "default tab" in Electron.
|
|
|
|
// TODO(nornagon): we could potentially kick this to an event to allow the
|
|
|
|
// app to decide what "default tab" means for them?
|
|
|
|
return set_init_result(VALIDATION_FAILURE);
|
|
|
|
}
|
|
|
|
|
|
|
|
execute_tab_id_ = tab_id;
|
|
|
|
details_ = std::move(details);
|
2021-03-16 14:28:55 +00:00
|
|
|
set_host_id(
|
2021-03-16 19:40:29 +00:00
|
|
|
mojom::HostID(mojom::HostID::HostType::kExtensions, extension()->id()));
|
2020-01-15 23:11:51 +00:00
|
|
|
return set_init_result(SUCCESS);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool ExecuteCodeInTabFunction::CanExecuteScriptOnPage(std::string* error) {
|
|
|
|
// If |tab_id| is specified, look for the tab. Otherwise default to selected
|
|
|
|
// tab in the current window.
|
|
|
|
CHECK_GE(execute_tab_id_, 0);
|
2020-07-16 23:16:05 +00:00
|
|
|
auto* contents = electron::api::WebContents::FromID(execute_tab_id_);
|
2020-01-15 23:11:51 +00:00
|
|
|
if (!contents) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
int frame_id = details_->frame_id ? *details_->frame_id
|
|
|
|
: ExtensionApiFrameIdMap::kTopFrameId;
|
|
|
|
content::RenderFrameHost* rfh =
|
|
|
|
ExtensionApiFrameIdMap::GetRenderFrameHostById(contents->web_contents(),
|
|
|
|
frame_id);
|
|
|
|
if (!rfh) {
|
|
|
|
*error = ErrorUtils::FormatErrorMessage(
|
|
|
|
kFrameNotFoundError, base::NumberToString(frame_id),
|
|
|
|
base::NumberToString(execute_tab_id_));
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Content scripts declared in manifest.json can access frames at about:-URLs
|
|
|
|
// if the extension has permission to access the frame's origin, so also allow
|
|
|
|
// programmatic content scripts at about:-URLs for allowed origins.
|
|
|
|
GURL effective_document_url(rfh->GetLastCommittedURL());
|
|
|
|
bool is_about_url = effective_document_url.SchemeIs(url::kAboutScheme);
|
|
|
|
if (is_about_url && details_->match_about_blank &&
|
|
|
|
*details_->match_about_blank) {
|
|
|
|
effective_document_url = GURL(rfh->GetLastCommittedOrigin().Serialize());
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!effective_document_url.is_valid()) {
|
|
|
|
// Unknown URL, e.g. because no load was committed yet. Allow for now, the
|
|
|
|
// renderer will check again and fail the injection if needed.
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
// NOTE: This can give the wrong answer due to race conditions, but it is OK,
|
|
|
|
// we check again in the renderer.
|
|
|
|
if (!extension()->permissions_data()->CanAccessPage(effective_document_url,
|
|
|
|
execute_tab_id_, error)) {
|
|
|
|
if (is_about_url &&
|
|
|
|
extension()->permissions_data()->active_permissions().HasAPIPermission(
|
chore: bump chromium to 92.0.4475.0 (master) (#28462)
* chore: bump chromium in DEPS to 91.0.4464.0
* chore: rebuild chromium/dcheck.patch with import-patches -3
Mechanical only; no code changes
* chore: remove content_browser_main_loop.patch
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2725153
The function being patched (BrowserMainLoop::MainMessageLoopRun()) no
longer exists.
NB: if removing this introduces regressions the likely fix will be to
add a similar patch for ShellBrowserMainParts::WillRunMainMessageLoop()
which has similar code and was added at the same time this was removed.
* chore: rebuild chromium/put_back_deleted_colors_for_autofill.patch with import-patches -3
Mechanical only; no code changes
* chore: rebuild chromium/disable_color_correct_rendering.patch with import-patches -3
Mechanical only; no code changes
* chore: rebuild chromium/eat_allow_disabling_blink_scheduler_throttling_per_renderview.patch with patch
Mechanical only; no code changes
* chore: rebuild chromium/gpu_notify_when_dxdiag_request_fails.patch with import-patches -3
Mechanical only; no code changes
* chore: rebuild chromium/ui_gtk_public_header.patch manually
no code changes
* chore: rebuild chromium/web_contents.patch with import-patches -3
Mechanical only; no code changes
* chore: remove v8/skip_global_registration_of_shared_arraybuffer_backing_stores.patch
Refs: https://chromium-review.googlesource.com/c/v8/v8/+/2763874
This patch has been merged upstream
* chore: export patches
* chore: update add_trustedauthclient_to_urlloaderfactory.patch
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2757969
Sync with removal of render_frame_id_
* chore: sync chromium/put_back_deleted_colors_for_autofill.patch
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2785841
SkColorFromColorId() no longer takes theme, scheme args
* chore: sync chromium/put_back_deleted_colors_for_autofill.patch
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2772143
Change new calls to GetDarkSchemeColor to fit our patched call signature
* chore: update add_trustedauthclient_to_urlloaderfactory.patch
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2757969
Sync with removal of render_frame_id_ in our mojom
* chore: update chromium/frame_host_manager.patch
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2740008
UrlInfo ctor now takes UrlInfo::OriginIsolationRequest instead of a bool
* chore: update chromium/revert_remove_contentrendererclient_shouldfork.patch
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2755314
Upstream has removed `history_list_length_` which we were comparing to 0
to calculate our `is_initial_navigation` bool when calling ShouldFork().
ShouldFork() is ours and none of the code paths actually use that param,
so this commit removes it altogether.
* chore: update permissions_to_register
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2789074
Replace all uses of APIPermission::ID enum with Mojo type
* refactor: update return type of PreMainMessageLoopRun()
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2725153
Used to return void; now returns an int errorcode.
Note: 2725153 also has some nice doc updates about Browser's "stages"
* refactor: sync ElectronBrowserMainParts to MainParts changes
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2725153
RunMainMessageLoopParts has been replaced with WillRunMainMessageLoop
so `BrowserMainLoop::result_code_` is no longer available to us for our
exit_code_ pointer.
This variable held a dual role: (1) of course, hold the exit code, but
also (2) was a nullptr before the message loop was ready, indicating to
anyone calling SetExitCode() that we were still in startup and could
just exit() without any extra steps. exit_code_ still fulfills these two
roles but is now a base::Optional.
* chore: update ElectronBrowserMainParts::PreDefaultMainMessageLoopRun
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2725153
BrowserMainParts::BrowsePreDefaultMainMesssageLoopRun() has been
removed; move that work to the new WillRunMainMessageLoop().
* refactor: stop using CallbackList; it has been removed.
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2785973
* refactor: update use of threadpools.
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2773408
The upstream code is still in flux (e.g. reverts and re-lands) but the
tl;dr for this commit is (1) include thread_pool.h if you're using it
and (2) don't instantiate pools directly.
* refactor: remove routing_id from CreateLoaderAndStart
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2762858
NB: One logic branch in ProxyingURLLoaderFactory::CreateLoaderAndStart
calls std::make_unique<InProgressRequest>, which needs a routing_id.
This PR uses the member field `routing_id_` since there's no longer one
being passed into CreateLoaderAndStart.
* refactor: sync to upstream ParittionOptions churn
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2771318
PartitionOptions' enums have changed.
* refactor: update Manifest::Location usage
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2771320
tldr: s/Manifest::FOO/ManifestLocation::kFoo/
* chore: bump chromium in DEPS to 91.0.4465.0
* update patches
* refactor: update extensions::Manifest to upstream
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2771320
- extensions::Manifest::COMPONENT
+ extensions::mojom::ManifestLocation::kExternalComponent
* refactor: sync with upstream UrlInfo ctor changes
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2740008
UrlInfo ctor now takes UrlInfo::OriginIsolationRequest instead of a bool
* chore: update invocation of convert_protocol_to_json.py
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2792623
python3 is being used in parts of the upstream build, but the copy of
convert_protocol_to_json.py invoked in v8/third_party/inspector_protocol
is not python3-friendly. Node has a py2+3-friendly version of it in its
tools directory, so call it instead.
* chore: use extensions::mojom::APIPermissionID
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2791122
tldr:
- extensions::APIPermission::kFoo
+ extensions::mojom::APIPermissionID::kFoo
* chore: Remove support for TLS1.0/1.1 in SSLVersionMin policy
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2765737
Remove TLS v1.0 & 1.1 from our SSLProtocolVersionFromString() function.
This is the same change made upstream at
https://chromium-review.googlesource.com/c/chromium/src/+/2765737/8/chrome/browser/ssl/ssl_config_service_manager_pref.cc
* fixup! chore: update ElectronBrowserMainParts::PreDefaultMainMessageLoopRun
* chore: Use IDType for permission change subscriptions.
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2791431
tldr: {Subscribe,Unsubscribe}PermissionStatusChange's tag type used to
be an int; now it's the new SubscriptionId type (which is an IdType64).
* chore: sync PowerMonitor code to upstream refactor
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2752635
tldr: PowerMonitor has been split into PowerStateObserver,
PowerSuspendObserver, and PowerThermalObserver to reduce number of tasks
posted to consumers who only need notifications for one of those things
instead of all of them.
* chore: use PartitionOptions's new Cookies field
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2771318
* Revert "refactor: remove routing_id from CreateLoaderAndStart"
This reverts commit 8c9773b87a3c84f9073a47089eb2b6889d745245.
8c9773b was only a partial fix; reverting to start & try again.
* update patches
* chore: bump chromium in DEPS to 91.0.4466.0
* chore: update chromium/accelerator.patch
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2795472
tldr: sync patch with upstream renamed variable & macro names.
* chore: update chromium/gtk_visibility.patch
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2796200
tldr: no code changes; just updating the diff to apply cleanly.
note: ooh upstream Wayland hacking!
* chore: update chromium/picture-in-picture.patch
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2710023
tldr: no code changes; just updating the diff to apply cleanly.
* chore: update chromium/worker_feat_add_hook_to_notify_script_ready.patch
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2775573
tldr: no code changes; just updating the diff to apply cleanly.
* chore: export_all_patches
* chore: update chromium/feat_add_set_theme_source_to_allow_apps_to.patch
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2796511
tldr: NotifyObservers has been renamed to NotifyOnNativeThemeUpdated,
so update the invocation in our patch.
* chore: update ElectronBrowserClient w/upstream API
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2797454
tldr: GetDevToolsManagerDelegate() was returning an owned raw pointer.
Replaced it with CreateDevToolsManagerDelegate() which uses unique_ptr<>.
* chore: handle new content::PermissionType::FILE_HANDLING in toV8()
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2762201
`file-handling` string confirmed in https://chromium-review.googlesource.com/c/chromium/src/+/2762201/18/chrome/browser/ui/webui/settings/site_settings_helper.cc
* refactor: remove routing_id from CreateLoaderAndStart pt 1
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2762858
Part 1: the easiest ones
* 2796724: Support Python3
https://chromium-review.googlesource.com/c/infra/luci/python-adb/+/2796724
* chore: bump chromium in DEPS to 91.0.4468.0
* 2668974: WebShare: Implement SharingServicePicker
https://chromium-review.googlesource.com/c/chromium/src/+/2668974
* 2802766: Apply modernize-make-unique to media/
https://chromium-review.googlesource.com/c/chromium/src/+/2802766
* 2802823: Apply modernize-make-unique to gpu/
https://chromium-review.googlesource.com/c/chromium/src/+/2802823
* 2803041: Apply modernize-make-unique to remaining files
https://chromium-review.googlesource.com/c/chromium/src/+/2803041
* 2798873: Convert GtkKeyBindingsHandler build checks to runtime checks
https://chromium-review.googlesource.com/c/chromium/src/+/2798873
* 2733595: [ch-r] Parse ACCEPT_CH H2/3 frame and restart with new headers if needed
https://chromium-review.googlesource.com/c/chromium/src/+/2733595
* chore: update patch indices
* 2795107: Remove unused PermissionRequest IDs.
https://chromium-review.googlesource.com/c/chromium/src/+/2795107
* chore: bump chromium in DEPS to 91.0.4469.0
* chore: fixup patch indices
* chore: bump chromium in DEPS to 91.0.4469.5
* PiP 1.5: Add microphone, camera, and hang up buttons to the PiP window
https://chromium-review.googlesource.com/c/chromium/src/+/2710023
* fixup! refactor: remove routing_id from CreateLoaderAndStart
* refactor: use URLLoaderNetworkServiceObserver for auth requests from SimpleURLLoader
* fixup! chore: fixup patch indices
* 2724817: Expand scope of wasm-eval to all URLs
https://chromium-review.googlesource.com/c/chromium/src/+/2724817
* Fixup patch after rebase
* chore: bump chromium in DEPS to 91.0.4472.0
* 2797341: [ozone/x11] Enabled the global shortcut listener.
https://chromium-review.googlesource.com/c/chromium/src/+/2797341
* 2805553: Reland Add GTK ColorMixers to ColorPipeline P1
https://chromium-review.googlesource.com/c/chromium/src/+/2805553
* 2804366: PiP 1.5: Label back to tab button with origin and center it
https://chromium-review.googlesource.com/c/chromium/src/+/2804366
* 2784730: Fix crash on AX mode change in NativeViewHost without a Widget
https://chromium-review.googlesource.com/c/chromium/src/+/2784730
* chore: update patch indices
* 2810174: Add PdfAnnotationsEnabled policy.
https://chromium-review.googlesource.com/c/chromium/src/+/2810174
* 2807829: Allow capturers to indicate if they want a WakeLock or not.
https://chromium-review.googlesource.com/c/chromium/src/+/2807829
* chore: bump chromium in DEPS to 92.0.4473.0
* chore: bump chromium in DEPS to 92.0.4474.0
* chore: bump chromium in DEPS to 92.0.4475.0
* chore: update patches
* chore: updates patches
* chore: update is_media_key patch to handle new ozone impl
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2797341
* fix: ExecuteJavascript requests now need to be flagged as non-bf-aware
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2787195
* chore: icon_util_x11 is now icon_util_linux
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2791362
* build: update sysroots
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2628496
* build: fix missing symbols on linux build
* use_ozone and use_x11 are not exclusive
* new button view to build for pip
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2797341
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2804366
* chore: fix broken gtk_util color patch
* chore: remove patch conflict
* build: update linux manifests
* chore: build bttlb on all platforms for pip
* chore: add thread_pool include for views delegate win
* chore: fix lint
* chore: add node patches for V8 changes
* build: add missing base include on windows
* fix: update frame host manager patch for new state transitions
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2714464
* chore: update windows zip manifests
* chore: update mac zip manifests
* chore: fix patch linting
* refactor: implement missing URLLoaderNetworkServiceObserver methods
It is against The Mojo Rules to leave hanging callbacks. These always
have to be called.
Refs: https://github.com/electron/electron/commit/186528aab9f8e29d658f07d220bb7f627980edda
* spec: fix locale test on local linux
* fix: pass the exit code correctly in new PreMainMessageLoopRun
Refs: https://github.com/electron/electron/commit/2622e91c4493ceb032e2f80cb484885bb8f97475
* fix: ensure we early-exit when request_handler_ is not provided
Refs: https://github.com/electron/electron/commit/93077afbfb6db248a0c0cc447d7ad2c9ccfda1d5
* fix: strongly set result_code in the BrowserMainLoop
* fix: invalid usage of non-targetted PostTask
You must always either use a host threadpool or specify a target
thread. In this case we did neither after this refactor.
Refs: https://github.com/electron/electron/pull/28462/commits/4e33ee0ad35a710bd34641cb0376bdee6aea2d1f
* chore: fix gn check
* chore: remove stray .rej files in patch
* chore: add mojo error code to url loader failure
* build: ensure CI is truthy in arm test env
* fix: handle windowCaptureMacV2 being enabled when fetching media source id
Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2709931
Co-authored-by: Charles Kerr <charles@charleskerr.com>
Co-authored-by: Shelley Vohr <shelley.vohr@gmail.com>
Co-authored-by: deepak1556 <hop2deep@gmail.com>
Co-authored-by: Samuel Attard <samuel.r.attard@gmail.com>
Co-authored-by: Samuel Attard <sattard@slack-corp.com>
2021-04-15 17:44:35 +00:00
|
|
|
extensions::mojom::APIPermissionID::kTab)) {
|
2020-01-15 23:11:51 +00:00
|
|
|
*error = ErrorUtils::FormatErrorMessage(
|
|
|
|
manifest_errors::kCannotAccessAboutUrl,
|
|
|
|
rfh->GetLastCommittedURL().spec(),
|
|
|
|
rfh->GetLastCommittedOrigin().Serialize());
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
ScriptExecutor* ExecuteCodeInTabFunction::GetScriptExecutor(
|
|
|
|
std::string* error) {
|
2020-07-16 23:16:05 +00:00
|
|
|
auto* contents = electron::api::WebContents::FromID(execute_tab_id_);
|
2020-01-15 23:11:51 +00:00
|
|
|
if (!contents)
|
|
|
|
return nullptr;
|
|
|
|
return contents->script_executor();
|
|
|
|
}
|
|
|
|
|
|
|
|
bool ExecuteCodeInTabFunction::IsWebView() const {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
const GURL& ExecuteCodeInTabFunction::GetWebViewSrc() const {
|
|
|
|
return GURL::EmptyGURL();
|
|
|
|
}
|
|
|
|
|
|
|
|
bool TabsExecuteScriptFunction::ShouldInsertCSS() const {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2020-10-16 01:30:41 +00:00
|
|
|
bool TabsExecuteScriptFunction::ShouldRemoveCSS() const {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2020-02-13 00:39:12 +00:00
|
|
|
ExtensionFunction::ResponseAction TabsGetFunction::Run() {
|
|
|
|
std::unique_ptr<tabs::Get::Params> params(tabs::Get::Params::Create(*args_));
|
|
|
|
EXTENSION_FUNCTION_VALIDATE(params.get());
|
|
|
|
int tab_id = params->tab_id;
|
|
|
|
|
2020-07-16 23:16:05 +00:00
|
|
|
auto* contents = electron::api::WebContents::FromID(tab_id);
|
2020-02-13 00:39:12 +00:00
|
|
|
if (!contents)
|
|
|
|
return RespondNow(Error("No such tab"));
|
|
|
|
|
|
|
|
tabs::Tab tab;
|
|
|
|
|
2021-06-08 02:00:05 +00:00
|
|
|
tab.id = std::make_unique<int>(tab_id);
|
2020-02-13 00:39:12 +00:00
|
|
|
// TODO(nornagon): in Chrome, the tab URL is only available to extensions
|
|
|
|
// that have the "tabs" (or "activeTab") permission. We should do the same
|
|
|
|
// permission check here.
|
|
|
|
tab.url = std::make_unique<std::string>(
|
|
|
|
contents->web_contents()->GetLastCommittedURL().spec());
|
|
|
|
|
|
|
|
return RespondNow(ArgumentList(tabs::Get::Results::Create(std::move(tab))));
|
|
|
|
}
|
|
|
|
|
|
|
|
ExtensionFunction::ResponseAction TabsSetZoomFunction::Run() {
|
|
|
|
std::unique_ptr<tabs::SetZoom::Params> params(
|
|
|
|
tabs::SetZoom::Params::Create(*args_));
|
|
|
|
EXTENSION_FUNCTION_VALIDATE(params);
|
|
|
|
|
|
|
|
int tab_id = params->tab_id ? *params->tab_id : -1;
|
2020-07-16 23:16:05 +00:00
|
|
|
auto* contents = electron::api::WebContents::FromID(tab_id);
|
2020-02-13 00:39:12 +00:00
|
|
|
if (!contents)
|
|
|
|
return RespondNow(Error("No such tab"));
|
|
|
|
|
|
|
|
auto* web_contents = contents->web_contents();
|
|
|
|
GURL url(web_contents->GetVisibleURL());
|
|
|
|
std::string error;
|
|
|
|
if (extension()->permissions_data()->IsRestrictedUrl(url, &error))
|
|
|
|
return RespondNow(Error(error));
|
|
|
|
|
|
|
|
auto* zoom_controller = contents->GetZoomController();
|
|
|
|
double zoom_level =
|
|
|
|
params->zoom_factor > 0
|
|
|
|
? blink::PageZoomFactorToZoomLevel(params->zoom_factor)
|
|
|
|
: blink::PageZoomFactorToZoomLevel(
|
|
|
|
zoom_controller->GetDefaultZoomFactor());
|
|
|
|
|
|
|
|
zoom_controller->SetZoomLevel(zoom_level);
|
|
|
|
|
|
|
|
return RespondNow(NoArguments());
|
|
|
|
}
|
|
|
|
|
|
|
|
ExtensionFunction::ResponseAction TabsGetZoomFunction::Run() {
|
|
|
|
std::unique_ptr<tabs::GetZoom::Params> params(
|
|
|
|
tabs::GetZoom::Params::Create(*args_));
|
|
|
|
EXTENSION_FUNCTION_VALIDATE(params);
|
|
|
|
|
|
|
|
int tab_id = params->tab_id ? *params->tab_id : -1;
|
2020-07-16 23:16:05 +00:00
|
|
|
auto* contents = electron::api::WebContents::FromID(tab_id);
|
2020-02-13 00:39:12 +00:00
|
|
|
if (!contents)
|
|
|
|
return RespondNow(Error("No such tab"));
|
|
|
|
|
|
|
|
double zoom_level = contents->GetZoomController()->GetZoomLevel();
|
|
|
|
double zoom_factor = blink::PageZoomLevelToZoomFactor(zoom_level);
|
|
|
|
|
|
|
|
return RespondNow(ArgumentList(tabs::GetZoom::Results::Create(zoom_factor)));
|
|
|
|
}
|
|
|
|
|
|
|
|
ExtensionFunction::ResponseAction TabsGetZoomSettingsFunction::Run() {
|
|
|
|
std::unique_ptr<tabs::GetZoomSettings::Params> params(
|
|
|
|
tabs::GetZoomSettings::Params::Create(*args_));
|
|
|
|
EXTENSION_FUNCTION_VALIDATE(params);
|
|
|
|
|
|
|
|
int tab_id = params->tab_id ? *params->tab_id : -1;
|
2020-07-16 23:16:05 +00:00
|
|
|
auto* contents = electron::api::WebContents::FromID(tab_id);
|
2020-02-13 00:39:12 +00:00
|
|
|
if (!contents)
|
|
|
|
return RespondNow(Error("No such tab"));
|
|
|
|
|
|
|
|
auto* zoom_controller = contents->GetZoomController();
|
|
|
|
WebContentsZoomController::ZoomMode zoom_mode =
|
|
|
|
contents->GetZoomController()->zoom_mode();
|
|
|
|
api::tabs::ZoomSettings zoom_settings;
|
|
|
|
ZoomModeToZoomSettings(zoom_mode, &zoom_settings);
|
2021-06-08 02:00:05 +00:00
|
|
|
zoom_settings.default_zoom_factor = std::make_unique<double>(
|
|
|
|
blink::PageZoomLevelToZoomFactor(zoom_controller->GetDefaultZoomLevel()));
|
2020-02-13 00:39:12 +00:00
|
|
|
|
|
|
|
return RespondNow(
|
|
|
|
ArgumentList(api::tabs::GetZoomSettings::Results::Create(zoom_settings)));
|
|
|
|
}
|
|
|
|
|
|
|
|
ExtensionFunction::ResponseAction TabsSetZoomSettingsFunction::Run() {
|
|
|
|
using api::tabs::ZoomSettings;
|
|
|
|
|
|
|
|
std::unique_ptr<tabs::SetZoomSettings::Params> params(
|
|
|
|
tabs::SetZoomSettings::Params::Create(*args_));
|
|
|
|
EXTENSION_FUNCTION_VALIDATE(params);
|
|
|
|
|
|
|
|
int tab_id = params->tab_id ? *params->tab_id : -1;
|
2020-07-16 23:16:05 +00:00
|
|
|
auto* contents = electron::api::WebContents::FromID(tab_id);
|
2020-02-13 00:39:12 +00:00
|
|
|
if (!contents)
|
|
|
|
return RespondNow(Error("No such tab"));
|
|
|
|
|
|
|
|
std::string error;
|
|
|
|
GURL url(contents->web_contents()->GetVisibleURL());
|
|
|
|
if (extension()->permissions_data()->IsRestrictedUrl(url, &error))
|
|
|
|
return RespondNow(Error(error));
|
|
|
|
|
|
|
|
// "per-origin" scope is only available in "automatic" mode.
|
|
|
|
if (params->zoom_settings.scope == tabs::ZOOM_SETTINGS_SCOPE_PER_ORIGIN &&
|
|
|
|
params->zoom_settings.mode != tabs::ZOOM_SETTINGS_MODE_AUTOMATIC &&
|
|
|
|
params->zoom_settings.mode != tabs::ZOOM_SETTINGS_MODE_NONE) {
|
|
|
|
return RespondNow(Error(kPerOriginOnlyInAutomaticError));
|
|
|
|
}
|
|
|
|
|
|
|
|
// Determine the correct internal zoom mode to set |web_contents| to from the
|
|
|
|
// user-specified |zoom_settings|.
|
|
|
|
WebContentsZoomController::ZoomMode zoom_mode =
|
2020-10-27 17:51:45 +00:00
|
|
|
WebContentsZoomController::ZoomMode::kDefault;
|
2020-02-13 00:39:12 +00:00
|
|
|
switch (params->zoom_settings.mode) {
|
|
|
|
case tabs::ZOOM_SETTINGS_MODE_NONE:
|
|
|
|
case tabs::ZOOM_SETTINGS_MODE_AUTOMATIC:
|
|
|
|
switch (params->zoom_settings.scope) {
|
|
|
|
case tabs::ZOOM_SETTINGS_SCOPE_NONE:
|
|
|
|
case tabs::ZOOM_SETTINGS_SCOPE_PER_ORIGIN:
|
2020-10-27 17:51:45 +00:00
|
|
|
zoom_mode = WebContentsZoomController::ZoomMode::kDefault;
|
2020-02-13 00:39:12 +00:00
|
|
|
break;
|
|
|
|
case tabs::ZOOM_SETTINGS_SCOPE_PER_TAB:
|
2020-10-27 17:51:45 +00:00
|
|
|
zoom_mode = WebContentsZoomController::ZoomMode::kIsolated;
|
2020-02-13 00:39:12 +00:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
case tabs::ZOOM_SETTINGS_MODE_MANUAL:
|
2020-10-27 17:51:45 +00:00
|
|
|
zoom_mode = WebContentsZoomController::ZoomMode::kManual;
|
2020-02-13 00:39:12 +00:00
|
|
|
break;
|
|
|
|
case tabs::ZOOM_SETTINGS_MODE_DISABLED:
|
2020-10-27 17:51:45 +00:00
|
|
|
zoom_mode = WebContentsZoomController::ZoomMode::kDisabled;
|
2020-02-13 00:39:12 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
contents->GetZoomController()->SetZoomMode(zoom_mode);
|
|
|
|
|
|
|
|
return RespondNow(NoArguments());
|
|
|
|
}
|
|
|
|
|
2021-07-27 20:36:22 +00:00
|
|
|
bool IsKillURL(const GURL& url) {
|
|
|
|
#if DCHECK_IS_ON()
|
|
|
|
// Caller should ensure that |url| is already "fixed up" by
|
|
|
|
// url_formatter::FixupURL, which (among many other things) takes care
|
|
|
|
// of rewriting about:kill into chrome://kill/.
|
|
|
|
if (url.SchemeIs(url::kAboutScheme))
|
|
|
|
DCHECK(url.IsAboutBlank() || url.IsAboutSrcdoc());
|
|
|
|
#endif
|
|
|
|
|
|
|
|
static const char* const kill_hosts[] = {
|
|
|
|
chrome::kChromeUICrashHost, chrome::kChromeUIDelayedHangUIHost,
|
|
|
|
chrome::kChromeUIHangUIHost, chrome::kChromeUIKillHost,
|
|
|
|
chrome::kChromeUIQuitHost, chrome::kChromeUIRestartHost,
|
|
|
|
content::kChromeUIBrowserCrashHost, content::kChromeUIMemoryExhaustHost,
|
|
|
|
};
|
|
|
|
|
|
|
|
if (!url.SchemeIs(content::kChromeUIScheme))
|
|
|
|
return false;
|
|
|
|
|
|
|
|
return base::Contains(kill_hosts, url.host_piece());
|
|
|
|
}
|
|
|
|
|
|
|
|
GURL ResolvePossiblyRelativeURL(const std::string& url_string,
|
|
|
|
const Extension* extension) {
|
|
|
|
GURL url = GURL(url_string);
|
|
|
|
if (!url.is_valid() && extension)
|
|
|
|
url = extension->GetResourceURL(url_string);
|
|
|
|
|
|
|
|
return url;
|
|
|
|
}
|
|
|
|
bool PrepareURLForNavigation(const std::string& url_string,
|
|
|
|
const Extension* extension,
|
|
|
|
GURL* return_url,
|
|
|
|
std::string* error) {
|
|
|
|
GURL url = ResolvePossiblyRelativeURL(url_string, extension);
|
|
|
|
|
|
|
|
// Ideally, the URL would only be "fixed" for user input (e.g. for URLs
|
|
|
|
// entered into the Omnibox), but some extensions rely on the legacy behavior
|
|
|
|
// where all navigations were subject to the "fixing". See also
|
|
|
|
// https://crbug.com/1145381.
|
|
|
|
url = url_formatter::FixupURL(url.spec(), "" /* = desired_tld */);
|
|
|
|
|
|
|
|
// Reject invalid URLs.
|
|
|
|
if (!url.is_valid()) {
|
|
|
|
const char kInvalidUrlError[] = "Invalid url: \"*\".";
|
|
|
|
*error = ErrorUtils::FormatErrorMessage(kInvalidUrlError, url_string);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Don't let the extension crash the browser or renderers.
|
|
|
|
if (IsKillURL(url)) {
|
|
|
|
const char kNoCrashBrowserError[] =
|
|
|
|
"I'm sorry. I'm afraid I can't do that.";
|
|
|
|
*error = kNoCrashBrowserError;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Don't let the extension navigate directly to devtools scheme pages, unless
|
|
|
|
// they have applicable permissions.
|
|
|
|
if (url.SchemeIs(content::kChromeDevToolsScheme) &&
|
|
|
|
!(extension->permissions_data()->HasAPIPermission(
|
|
|
|
extensions::mojom::APIPermissionID::kDevtools) ||
|
|
|
|
extension->permissions_data()->HasAPIPermission(
|
|
|
|
extensions::mojom::APIPermissionID::kDebugger))) {
|
|
|
|
const char kCannotNavigateToDevtools[] =
|
|
|
|
"Cannot navigate to a devtools:// page without either the devtools or "
|
|
|
|
"debugger permission.";
|
|
|
|
*error = kCannotNavigateToDevtools;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return_url->Swap(&url);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
TabsUpdateFunction::TabsUpdateFunction() : web_contents_(nullptr) {}
|
|
|
|
|
|
|
|
ExtensionFunction::ResponseAction TabsUpdateFunction::Run() {
|
|
|
|
std::unique_ptr<tabs::Update::Params> params(
|
|
|
|
tabs::Update::Params::Create(*args_));
|
|
|
|
EXTENSION_FUNCTION_VALIDATE(params.get());
|
|
|
|
|
|
|
|
int tab_id = params->tab_id ? *params->tab_id : -1;
|
|
|
|
auto* contents = electron::api::WebContents::FromID(tab_id);
|
|
|
|
if (!contents)
|
|
|
|
return RespondNow(Error("No such tab"));
|
|
|
|
|
|
|
|
web_contents_ = contents->web_contents();
|
|
|
|
|
|
|
|
// Navigate the tab to a new location if the url is different.
|
|
|
|
std::string error;
|
|
|
|
if (params->update_properties.url.get()) {
|
|
|
|
std::string updated_url = *params->update_properties.url;
|
|
|
|
if (!UpdateURL(updated_url, tab_id, &error))
|
|
|
|
return RespondNow(Error(std::move(error)));
|
|
|
|
}
|
|
|
|
|
|
|
|
if (params->update_properties.muted.get()) {
|
|
|
|
contents->SetAudioMuted(*params->update_properties.muted);
|
|
|
|
}
|
|
|
|
|
|
|
|
return RespondNow(GetResult());
|
|
|
|
}
|
|
|
|
|
|
|
|
bool TabsUpdateFunction::UpdateURL(const std::string& url_string,
|
|
|
|
int tab_id,
|
|
|
|
std::string* error) {
|
|
|
|
GURL url;
|
|
|
|
if (!PrepareURLForNavigation(url_string, extension(), &url, error)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
const bool is_javascript_scheme = url.SchemeIs(url::kJavaScriptScheme);
|
|
|
|
// JavaScript URLs are forbidden in chrome.tabs.update().
|
|
|
|
if (is_javascript_scheme) {
|
|
|
|
const char kJavaScriptUrlsNotAllowedInTabsUpdate[] =
|
|
|
|
"JavaScript URLs are not allowed in chrome.tabs.update. Use "
|
|
|
|
"chrome.tabs.executeScript instead.";
|
|
|
|
*error = kJavaScriptUrlsNotAllowedInTabsUpdate;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
content::NavigationController::LoadURLParams load_params(url);
|
|
|
|
|
|
|
|
// Treat extension-initiated navigations as renderer-initiated so that the URL
|
|
|
|
// does not show in the omnibox until it commits. This avoids URL spoofs
|
|
|
|
// since URLs can be opened on behalf of untrusted content.
|
|
|
|
load_params.is_renderer_initiated = true;
|
|
|
|
// All renderer-initiated navigations need to have an initiator origin.
|
|
|
|
load_params.initiator_origin = extension()->origin();
|
|
|
|
// |source_site_instance| needs to be set so that a renderer process
|
|
|
|
// compatible with |initiator_origin| is picked by Site Isolation.
|
|
|
|
load_params.source_site_instance = content::SiteInstance::CreateForURL(
|
|
|
|
web_contents_->GetBrowserContext(),
|
|
|
|
load_params.initiator_origin->GetURL());
|
|
|
|
|
|
|
|
// Marking the navigation as initiated via an API means that the focus
|
|
|
|
// will stay in the omnibox - see https://crbug.com/1085779.
|
|
|
|
load_params.transition_type = ui::PAGE_TRANSITION_FROM_API;
|
|
|
|
|
|
|
|
web_contents_->GetController().LoadURLWithParams(load_params);
|
|
|
|
|
|
|
|
DCHECK_EQ(url,
|
|
|
|
web_contents_->GetController().GetPendingEntry()->GetVirtualURL());
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
ExtensionFunction::ResponseValue TabsUpdateFunction::GetResult() {
|
|
|
|
if (!has_callback())
|
|
|
|
return NoArguments();
|
|
|
|
|
|
|
|
tabs::Tab tab;
|
|
|
|
|
|
|
|
auto* api_web_contents = electron::api::WebContents::From(web_contents_);
|
|
|
|
tab.id =
|
|
|
|
std::make_unique<int>(api_web_contents ? api_web_contents->ID() : -1);
|
|
|
|
// TODO(nornagon): in Chrome, the tab URL is only available to extensions
|
|
|
|
// that have the "tabs" (or "activeTab") permission. We should do the same
|
|
|
|
// permission check here.
|
|
|
|
tab.url = std::make_unique<std::string>(
|
|
|
|
web_contents_->GetLastCommittedURL().spec());
|
|
|
|
|
|
|
|
return ArgumentList(tabs::Get::Results::Create(std::move(tab)));
|
|
|
|
}
|
|
|
|
|
|
|
|
void TabsUpdateFunction::OnExecuteCodeFinished(
|
|
|
|
const std::string& error,
|
|
|
|
const GURL& url,
|
|
|
|
const base::ListValue& script_result) {
|
|
|
|
if (!error.empty()) {
|
|
|
|
Respond(Error(error));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
return Respond(GetResult());
|
|
|
|
}
|
|
|
|
|
2020-01-15 23:11:51 +00:00
|
|
|
} // namespace extensions
|