// Copyright (c) 2013 GitHub, Inc. // Use of this source code is governed by the MIT license that can be // found in the LICENSE file. #include "atom/browser/atom_browser_client.h" #if defined(OS_WIN) #include #endif #include "atom/browser/api/atom_api_app.h" #include "atom/browser/api/atom_api_protocol.h" #include "atom/browser/atom_access_token_store.h" #include "atom/browser/atom_browser_context.h" #include "atom/browser/atom_browser_main_parts.h" #include "atom/browser/atom_quota_permission_context.h" #include "atom/browser/atom_resource_dispatcher_host_delegate.h" #include "atom/browser/atom_speech_recognition_manager_delegate.h" #include "atom/browser/native_window.h" #include "atom/browser/web_contents_permission_helper.h" #include "atom/browser/web_contents_preferences.h" #include "atom/browser/window_list.h" #include "atom/common/options_switches.h" #include "base/command_line.h" #include "base/files/file_util.h" #include "base/stl_util.h" #include "base/strings/string_number_conversions.h" #include "base/strings/string_util.h" #include "chrome/browser/printing/printing_message_filter.h" #include "chrome/browser/renderer_host/pepper/chrome_browser_pepper_host_factory.h" #include "chrome/browser/renderer_host/pepper/widevine_cdm_message_filter.h" #include "chrome/browser/speech/tts_message_filter.h" #include "content/public/browser/browser_ppapi_host.h" #include "content/public/browser/client_certificate_delegate.h" #include "content/public/browser/geolocation_delegate.h" #include "content/public/browser/render_process_host.h" #include "content/public/browser/render_view_host.h" #include "content/public/browser/resource_dispatcher_host.h" #include "content/public/browser/site_instance.h" #include "content/public/browser/web_contents.h" #include "content/public/common/url_constants.h" #include "content/public/common/web_preferences.h" #include "net/ssl/ssl_cert_request_info.h" #include "ppapi/host/ppapi_host.h" #include "ui/base/l10n/l10n_util.h" #include "v8/include/v8.h" namespace atom { namespace { // Next navigation should not restart renderer process. bool g_suppress_renderer_process_restart = false; // Custom schemes to be registered to handle service worker. std::string g_custom_service_worker_schemes = ""; // A provider of Geolocation services to override AccessTokenStore. class AtomGeolocationDelegate : public content::GeolocationDelegate { public: AtomGeolocationDelegate() = default; content::AccessTokenStore* CreateAccessTokenStore() final { return new AtomAccessTokenStore(); } private: DISALLOW_COPY_AND_ASSIGN(AtomGeolocationDelegate); }; void Noop(scoped_refptr) { } } // namespace // static void AtomBrowserClient::SuppressRendererProcessRestartForOnce() { g_suppress_renderer_process_restart = true; } void AtomBrowserClient::SetCustomServiceWorkerSchemes( const std::vector& schemes) { g_custom_service_worker_schemes = base::JoinString(schemes, ","); } AtomBrowserClient::AtomBrowserClient() : delegate_(nullptr) { } AtomBrowserClient::~AtomBrowserClient() { } content::WebContents* AtomBrowserClient::GetWebContentsFromProcessID( int process_id) { // If the process is a pending process, we should use the old one. if (ContainsKey(pending_processes_, process_id)) process_id = pending_processes_[process_id]; // Certain render process will be created with no associated render view, // for example: ServiceWorker. return WebContentsPreferences::GetWebContentsFromProcessID(process_id); } bool AtomBrowserClient::ShouldCreateNewSiteInstance( content::BrowserContext* browser_context, content::SiteInstance* current_instance, const GURL& url) { if (url.SchemeIs(url::kJavaScriptScheme)) // "javacript:" scheme should always use same SiteInstance return false; if (!IsRendererSandboxed(current_instance->GetProcess()->GetID())) // non-sandboxed renderers should always create a new SiteInstance return true; // Create new a SiteInstance if navigating to a different site. auto src_url = current_instance->GetSiteURL(); return !content::SiteInstance::IsSameWebSite(browser_context, src_url, url) && // `IsSameWebSite` doesn't seem to work for some URIs such as `file:`, // handle these scenarios by comparing only the site as defined by // `GetSiteForURL`. content::SiteInstance::GetSiteForURL(browser_context, url) != src_url; } void AtomBrowserClient::AddSandboxedRendererId(int process_id) { base::AutoLock auto_lock(sandboxed_renderers_lock_); sandboxed_renderers_.insert(process_id); } void AtomBrowserClient::RemoveSandboxedRendererId(int process_id) { base::AutoLock auto_lock(sandboxed_renderers_lock_); sandboxed_renderers_.erase(process_id); } bool AtomBrowserClient::IsRendererSandboxed(int process_id) { base::AutoLock auto_lock(sandboxed_renderers_lock_); return sandboxed_renderers_.count(process_id); } void AtomBrowserClient::RenderProcessWillLaunch( content::RenderProcessHost* host) { int process_id = host->GetID(); host->AddFilter(new printing::PrintingMessageFilter(process_id)); host->AddFilter(new TtsMessageFilter(process_id, host->GetBrowserContext())); host->AddFilter( new WidevineCdmMessageFilter(process_id, host->GetBrowserContext())); content::WebContents* web_contents = GetWebContentsFromProcessID(process_id); if (WebContentsPreferences::IsSandboxed(web_contents)) { AddSandboxedRendererId(host->GetID()); // ensure the sandboxed renderer id is removed later host->AddObserver(this); } } content::SpeechRecognitionManagerDelegate* AtomBrowserClient::CreateSpeechRecognitionManagerDelegate() { return new AtomSpeechRecognitionManagerDelegate; } content::GeolocationDelegate* AtomBrowserClient::CreateGeolocationDelegate() { return new AtomGeolocationDelegate(); } void AtomBrowserClient::OverrideWebkitPrefs( content::RenderViewHost* host, content::WebPreferences* prefs) { prefs->javascript_enabled = true; prefs->web_security_enabled = true; prefs->javascript_can_open_windows_automatically = true; prefs->plugins_enabled = true; prefs->dom_paste_enabled = true; prefs->allow_scripts_to_close_windows = true; prefs->javascript_can_access_clipboard = true; prefs->local_storage_enabled = true; prefs->databases_enabled = true; prefs->application_cache_enabled = true; prefs->allow_universal_access_from_file_urls = true; prefs->allow_file_access_from_file_urls = true; prefs->experimental_webgl_enabled = true; prefs->allow_displaying_insecure_content = false; prefs->allow_running_insecure_content = false; // Custom preferences of guest page. auto web_contents = content::WebContents::FromRenderViewHost(host); WebContentsPreferences::OverrideWebkitPrefs(web_contents, prefs); } std::string AtomBrowserClient::GetApplicationLocale() { return l10n_util::GetApplicationLocale(""); } void AtomBrowserClient::OverrideSiteInstanceForNavigation( content::BrowserContext* browser_context, content::SiteInstance* current_instance, const GURL& url, content::SiteInstance** new_instance) { if (g_suppress_renderer_process_restart) { g_suppress_renderer_process_restart = false; return; } if (!ShouldCreateNewSiteInstance(browser_context, current_instance, url)) return; scoped_refptr site_instance = content::SiteInstance::CreateForURL(browser_context, url); *new_instance = site_instance.get(); // Make sure the |site_instance| is not freed when this function returns. // FIXME(zcbenz): We should adjust OverrideSiteInstanceForNavigation's // interface to solve this. content::BrowserThread::PostTask( content::BrowserThread::UI, FROM_HERE, base::Bind(&Noop, base::RetainedRef(site_instance))); // Remember the original renderer process of the pending renderer process. auto current_process = current_instance->GetProcess(); auto pending_process = (*new_instance)->GetProcess(); pending_processes_[pending_process->GetID()] = current_process->GetID(); // Clear the entry in map when process ends. current_process->AddObserver(this); } void AtomBrowserClient::AppendExtraCommandLineSwitches( base::CommandLine* command_line, int process_id) { std::string process_type = command_line->GetSwitchValueASCII("type"); if (process_type != "renderer") return; // Copy following switches to child process. static const char* const kCommonSwitchNames[] = { switches::kStandardSchemes, switches::kEnableSandbox }; command_line->CopySwitchesFrom( *base::CommandLine::ForCurrentProcess(), kCommonSwitchNames, arraysize(kCommonSwitchNames)); // The registered service worker schemes. if (!g_custom_service_worker_schemes.empty()) command_line->AppendSwitchASCII(switches::kRegisterServiceWorkerSchemes, g_custom_service_worker_schemes); #if defined(OS_WIN) // Append --app-user-model-id. PWSTR current_app_id; if (SUCCEEDED(GetCurrentProcessExplicitAppUserModelID(¤t_app_id))) { command_line->AppendSwitchNative(switches::kAppUserModelId, current_app_id); CoTaskMemFree(current_app_id); } #endif content::WebContents* web_contents = GetWebContentsFromProcessID(process_id); if (!web_contents) return; WebContentsPreferences::AppendExtraCommandLineSwitches( web_contents, command_line); } void AtomBrowserClient::DidCreatePpapiPlugin( content::BrowserPpapiHost* host) { host->GetPpapiHost()->AddHostFactoryFilter( base::WrapUnique(new chrome::ChromeBrowserPepperHostFactory(host))); } content::QuotaPermissionContext* AtomBrowserClient::CreateQuotaPermissionContext() { return new AtomQuotaPermissionContext; } void AtomBrowserClient::AllowCertificateError( content::WebContents* web_contents, int cert_error, const net::SSLInfo& ssl_info, const GURL& request_url, content::ResourceType resource_type, bool overridable, bool strict_enforcement, bool expired_previous_decision, const base::Callback& callback, content::CertificateRequestResultType* request) { if (delegate_) { delegate_->AllowCertificateError( web_contents, cert_error, ssl_info, request_url, resource_type, overridable, strict_enforcement, expired_previous_decision, callback, request); } } void AtomBrowserClient::SelectClientCertificate( content::WebContents* web_contents, net::SSLCertRequestInfo* cert_request_info, std::unique_ptr delegate) { if (!cert_request_info->client_certs.empty() && delegate_) { delegate_->SelectClientCertificate( web_contents, cert_request_info, std::move(delegate)); } } void AtomBrowserClient::ResourceDispatcherHostCreated() { resource_dispatcher_host_delegate_.reset( new AtomResourceDispatcherHostDelegate); content::ResourceDispatcherHost::Get()->SetDelegate( resource_dispatcher_host_delegate_.get()); } bool AtomBrowserClient::CanCreateWindow( const GURL& opener_url, const GURL& opener_top_level_frame_url, const GURL& source_origin, WindowContainerType container_type, const std::string& frame_name, const GURL& target_url, const content::Referrer& referrer, WindowOpenDisposition disposition, const blink::WebWindowFeatures& features, bool user_gesture, bool opener_suppressed, content::ResourceContext* context, int render_process_id, int opener_render_view_id, int opener_render_frame_id, bool* no_javascript_access) { DCHECK_CURRENTLY_ON(content::BrowserThread::IO); if (IsRendererSandboxed(render_process_id)) { *no_javascript_access = false; return true; } if (delegate_) { content::BrowserThread::PostTask(content::BrowserThread::UI, FROM_HERE, base::Bind(&api::App::OnCreateWindow, base::Unretained(static_cast(delegate_)), target_url, frame_name, disposition, render_process_id, opener_render_frame_id)); } return false; } void AtomBrowserClient::GetAdditionalAllowedSchemesForFileSystem( std::vector* additional_schemes) { auto schemes_list = api::GetStandardSchemes(); if (!schemes_list.empty()) additional_schemes->insert(additional_schemes->end(), schemes_list.begin(), schemes_list.end()); additional_schemes->push_back(content::kChromeDevToolsScheme); } brightray::BrowserMainParts* AtomBrowserClient::OverrideCreateBrowserMainParts( const content::MainFunctionParams&) { v8::V8::Initialize(); // Init V8 before creating main parts. return new AtomBrowserMainParts; } void AtomBrowserClient::WebNotificationAllowed( int render_process_id, const base::Callback& callback) { content::WebContents* web_contents = WebContentsPreferences::GetWebContentsFromProcessID(render_process_id); if (!web_contents) { callback.Run(false, false); return; } auto permission_helper = WebContentsPermissionHelper::FromWebContents(web_contents); if (!permission_helper) { callback.Run(false, false); return; } permission_helper->RequestWebNotificationPermission( base::Bind(callback, web_contents->IsAudioMuted())); } void AtomBrowserClient::RenderProcessHostDestroyed( content::RenderProcessHost* host) { int process_id = host->GetID(); for (const auto& entry : pending_processes_) { if (entry.first == process_id || entry.second == process_id) { pending_processes_.erase(entry.first); break; } } RemoveSandboxedRendererId(process_id); } } // namespace atom