NOLINT disables the linting error that we can't fix because its just implementing a content API. We also disable clang-format because it tries to format the // NOLINT onto a new line which doesn't exactly work
		
			
				
	
	
		
			929 lines
		
	
	
	
		
			33 KiB
			
		
	
	
	
		
			C++
		
	
	
	
	
	
			
		
		
	
	
			929 lines
		
	
	
	
		
			33 KiB
			
		
	
	
	
		
			C++
		
	
	
	
	
	
// Copyright (c) 2013 GitHub, Inc.
 | 
						|
// Use of this source code is governed by the MIT license that can be
 | 
						|
// found in the LICENSE file.
 | 
						|
 | 
						|
#include "atom/browser/atom_browser_client.h"
 | 
						|
 | 
						|
#if defined(OS_WIN)
 | 
						|
#include <shlobj.h>
 | 
						|
#endif
 | 
						|
 | 
						|
#include <memory>
 | 
						|
#include <utility>
 | 
						|
 | 
						|
#include "atom/app/manifests.h"
 | 
						|
#include "atom/browser/api/atom_api_app.h"
 | 
						|
#include "atom/browser/api/atom_api_protocol.h"
 | 
						|
#include "atom/browser/api/atom_api_web_contents.h"
 | 
						|
#include "atom/browser/atom_browser_context.h"
 | 
						|
#include "atom/browser/atom_browser_main_parts.h"
 | 
						|
#include "atom/browser/atom_navigation_throttle.h"
 | 
						|
#include "atom/browser/atom_quota_permission_context.h"
 | 
						|
#include "atom/browser/atom_resource_dispatcher_host_delegate.h"
 | 
						|
#include "atom/browser/atom_speech_recognition_manager_delegate.h"
 | 
						|
#include "atom/browser/child_web_contents_tracker.h"
 | 
						|
#include "atom/browser/font_defaults.h"
 | 
						|
#include "atom/browser/io_thread.h"
 | 
						|
#include "atom/browser/media/media_capture_devices_dispatcher.h"
 | 
						|
#include "atom/browser/native_window.h"
 | 
						|
#include "atom/browser/net/network_context_service.h"
 | 
						|
#include "atom/browser/net/network_context_service_factory.h"
 | 
						|
#include "atom/browser/notifications/notification_presenter.h"
 | 
						|
#include "atom/browser/notifications/platform_notification_service.h"
 | 
						|
#include "atom/browser/session_preferences.h"
 | 
						|
#include "atom/browser/ui/devtools_manager_delegate.h"
 | 
						|
#include "atom/browser/web_contents_permission_helper.h"
 | 
						|
#include "atom/browser/web_contents_preferences.h"
 | 
						|
#include "atom/browser/window_list.h"
 | 
						|
#include "atom/common/application_info.h"
 | 
						|
#include "atom/common/options_switches.h"
 | 
						|
#include "atom/common/platform_util.h"
 | 
						|
#include "base/command_line.h"
 | 
						|
#include "base/environment.h"
 | 
						|
#include "base/files/file_util.h"
 | 
						|
#include "base/json/json_reader.h"
 | 
						|
#include "base/lazy_instance.h"
 | 
						|
#include "base/no_destructor.h"
 | 
						|
#include "base/path_service.h"
 | 
						|
#include "base/stl_util.h"
 | 
						|
#include "base/strings/string_number_conversions.h"
 | 
						|
#include "base/strings/string_util.h"
 | 
						|
#include "base/strings/utf_string_conversions.h"
 | 
						|
#include "base/task/post_task.h"
 | 
						|
#include "chrome/browser/browser_process.h"
 | 
						|
#include "chrome/common/chrome_version.h"
 | 
						|
#include "components/net_log/chrome_net_log.h"
 | 
						|
#include "content/public/browser/browser_ppapi_host.h"
 | 
						|
#include "content/public/browser/browser_task_traits.h"
 | 
						|
#include "content/public/browser/client_certificate_delegate.h"
 | 
						|
#include "content/public/browser/render_frame_host.h"
 | 
						|
#include "content/public/browser/render_process_host.h"
 | 
						|
#include "content/public/browser/render_view_host.h"
 | 
						|
#include "content/public/browser/resource_dispatcher_host.h"
 | 
						|
#include "content/public/browser/site_instance.h"
 | 
						|
#include "content/public/browser/web_contents.h"
 | 
						|
#include "content/public/common/content_paths.h"
 | 
						|
#include "content/public/common/content_switches.h"
 | 
						|
#include "content/public/common/service_names.mojom.h"
 | 
						|
#include "content/public/common/url_constants.h"
 | 
						|
#include "content/public/common/web_preferences.h"
 | 
						|
#include "electron/buildflags/buildflags.h"
 | 
						|
#include "electron/grit/electron_resources.h"
 | 
						|
#include "net/base/escape.h"
 | 
						|
#include "net/ssl/ssl_cert_request_info.h"
 | 
						|
#include "ppapi/host/ppapi_host.h"
 | 
						|
#include "printing/buildflags/buildflags.h"
 | 
						|
#include "services/device/public/cpp/geolocation/location_provider.h"
 | 
						|
#include "services/network/public/cpp/features.h"
 | 
						|
#include "services/network/public/cpp/resource_request_body.h"
 | 
						|
#include "services/proxy_resolver/public/mojom/proxy_resolver.mojom.h"
 | 
						|
#include "ui/base/l10n/l10n_util.h"
 | 
						|
#include "ui/base/resource/resource_bundle.h"
 | 
						|
#include "v8/include/v8.h"
 | 
						|
 | 
						|
#if defined(USE_NSS_CERTS)
 | 
						|
#include "net/ssl/client_cert_store_nss.h"
 | 
						|
#elif defined(OS_WIN)
 | 
						|
#include "net/ssl/client_cert_store_win.h"
 | 
						|
#elif defined(OS_MACOSX)
 | 
						|
#include "net/ssl/client_cert_store_mac.h"
 | 
						|
#include "services/audio/public/mojom/constants.mojom.h"
 | 
						|
#include "services/video_capture/public/mojom/constants.mojom.h"
 | 
						|
#elif defined(USE_OPENSSL)
 | 
						|
#include "net/ssl/client_cert_store.h"
 | 
						|
#endif
 | 
						|
 | 
						|
#if BUILDFLAG(ENABLE_PEPPER_FLASH)
 | 
						|
#include "chrome/browser/renderer_host/pepper/chrome_browser_pepper_host_factory.h"
 | 
						|
#endif  // BUILDFLAG(ENABLE_PEPPER_FLASH)
 | 
						|
 | 
						|
#if BUILDFLAG(OVERRIDE_LOCATION_PROVIDER)
 | 
						|
#include "atom/browser/fake_location_provider.h"
 | 
						|
#endif  // BUILDFLAG(OVERRIDE_LOCATION_PROVIDER)
 | 
						|
 | 
						|
#if BUILDFLAG(ENABLE_TTS)
 | 
						|
#include "chrome/browser/speech/tts_controller_delegate_impl.h"
 | 
						|
#include "chrome/browser/speech/tts_message_filter.h"
 | 
						|
#endif  // BUILDFLAG(ENABLE_TTS)
 | 
						|
 | 
						|
#if BUILDFLAG(ENABLE_PRINTING)
 | 
						|
#include "chrome/browser/printing/printing_message_filter.h"
 | 
						|
#include "chrome/services/printing/public/mojom/constants.mojom.h"
 | 
						|
#include "components/services/pdf_compositor/public/interfaces/pdf_compositor.mojom.h"
 | 
						|
#endif  // BUILDFLAG(ENABLE_PRINTING)
 | 
						|
 | 
						|
using content::BrowserThread;
 | 
						|
 | 
						|
namespace atom {
 | 
						|
 | 
						|
namespace {
 | 
						|
 | 
						|
// Next navigation should not restart renderer process.
 | 
						|
bool g_suppress_renderer_process_restart = false;
 | 
						|
 | 
						|
bool IsSameWebSite(content::BrowserContext* browser_context,
 | 
						|
                   content::SiteInstance* site_instance,
 | 
						|
                   const GURL& dest_url) {
 | 
						|
  return site_instance->IsSameSiteWithURL(dest_url) ||
 | 
						|
         // `IsSameSiteWithURL` doesn't seem to work for some URIs such as
 | 
						|
         // `file:`, handle these scenarios by comparing only the site as
 | 
						|
         // defined by `GetSiteForURL`.
 | 
						|
         (content::SiteInstance::GetSiteForURL(browser_context, dest_url) ==
 | 
						|
          site_instance->GetSiteURL());
 | 
						|
}
 | 
						|
 | 
						|
AtomBrowserClient* g_browser_client = nullptr;
 | 
						|
 | 
						|
base::LazyInstance<std::string>::DestructorAtExit
 | 
						|
    g_io_thread_application_locale = LAZY_INSTANCE_INITIALIZER;
 | 
						|
 | 
						|
base::NoDestructor<std::string> g_application_locale;
 | 
						|
 | 
						|
void SetApplicationLocaleOnIOThread(const std::string& locale) {
 | 
						|
  DCHECK_CURRENTLY_ON(BrowserThread::IO);
 | 
						|
  g_io_thread_application_locale.Get() = locale;
 | 
						|
}
 | 
						|
 | 
						|
}  // namespace
 | 
						|
 | 
						|
// static
 | 
						|
void AtomBrowserClient::SuppressRendererProcessRestartForOnce() {
 | 
						|
  g_suppress_renderer_process_restart = true;
 | 
						|
}
 | 
						|
 | 
						|
AtomBrowserClient* AtomBrowserClient::Get() {
 | 
						|
  return g_browser_client;
 | 
						|
}
 | 
						|
 | 
						|
// static
 | 
						|
void AtomBrowserClient::SetApplicationLocale(const std::string& locale) {
 | 
						|
  if (!BrowserThread::IsThreadInitialized(BrowserThread::IO) ||
 | 
						|
      !base::PostTaskWithTraits(
 | 
						|
          FROM_HERE, {BrowserThread::IO},
 | 
						|
          base::BindOnce(&SetApplicationLocaleOnIOThread, locale))) {
 | 
						|
    g_io_thread_application_locale.Get() = locale;
 | 
						|
  }
 | 
						|
  *g_application_locale = locale;
 | 
						|
}
 | 
						|
 | 
						|
AtomBrowserClient::AtomBrowserClient() {
 | 
						|
  DCHECK(!g_browser_client);
 | 
						|
  g_browser_client = this;
 | 
						|
}
 | 
						|
 | 
						|
AtomBrowserClient::~AtomBrowserClient() {
 | 
						|
  DCHECK(g_browser_client);
 | 
						|
  g_browser_client = nullptr;
 | 
						|
}
 | 
						|
 | 
						|
content::WebContents* AtomBrowserClient::GetWebContentsFromProcessID(
 | 
						|
    int process_id) {
 | 
						|
  // If the process is a pending process, we should use the web contents
 | 
						|
  // for the frame host passed into RegisterPendingProcess.
 | 
						|
  if (base::ContainsKey(pending_processes_, process_id))
 | 
						|
    return pending_processes_[process_id];
 | 
						|
 | 
						|
  // Certain render process will be created with no associated render view,
 | 
						|
  // for example: ServiceWorker.
 | 
						|
  return WebContentsPreferences::GetWebContentsFromProcessID(process_id);
 | 
						|
}
 | 
						|
 | 
						|
bool AtomBrowserClient::ShouldForceNewSiteInstance(
 | 
						|
    content::RenderFrameHost* current_rfh,
 | 
						|
    content::RenderFrameHost* speculative_rfh,
 | 
						|
    content::BrowserContext* browser_context,
 | 
						|
    const GURL& url,
 | 
						|
    bool has_response_started) const {
 | 
						|
  if (url.SchemeIs(url::kJavaScriptScheme))
 | 
						|
    // "javacript:" scheme should always use same SiteInstance
 | 
						|
    return false;
 | 
						|
 | 
						|
  content::SiteInstance* current_instance = current_rfh->GetSiteInstance();
 | 
						|
  content::SiteInstance* speculative_instance =
 | 
						|
      speculative_rfh ? speculative_rfh->GetSiteInstance() : nullptr;
 | 
						|
  int process_id = current_instance->GetProcess()->GetID();
 | 
						|
  if (NavigationWasRedirectedCrossSite(browser_context, current_instance,
 | 
						|
                                       speculative_instance, url,
 | 
						|
                                       has_response_started)) {
 | 
						|
    // Navigation was redirected. We can't force the current, speculative or a
 | 
						|
    // new unrelated site instance to be used. Delegate to the content layer.
 | 
						|
    return false;
 | 
						|
  } else if (IsRendererSandboxed(process_id)) {
 | 
						|
    // Renderer is sandboxed, delegate the decision to the content layer for all
 | 
						|
    // origins.
 | 
						|
    return false;
 | 
						|
  } else if (!RendererUsesNativeWindowOpen(process_id)) {
 | 
						|
    // non-sandboxed renderers without native window.open should always create
 | 
						|
    // a new SiteInstance
 | 
						|
    return true;
 | 
						|
  } else {
 | 
						|
    auto* web_contents = content::WebContents::FromRenderFrameHost(current_rfh);
 | 
						|
    if (!ChildWebContentsTracker::FromWebContents(web_contents)) {
 | 
						|
      // Root WebContents should always create new process to make sure
 | 
						|
      // native addons are loaded correctly after reload / navigation.
 | 
						|
      // (Non-root WebContents opened by window.open() should try to
 | 
						|
      //  reuse process to allow synchronous cross-window scripting.)
 | 
						|
      return true;
 | 
						|
    }
 | 
						|
  }
 | 
						|
 | 
						|
  // Create new a SiteInstance if navigating to a different site.
 | 
						|
  return !IsSameWebSite(browser_context, current_instance, url);
 | 
						|
}
 | 
						|
 | 
						|
bool AtomBrowserClient::NavigationWasRedirectedCrossSite(
 | 
						|
    content::BrowserContext* browser_context,
 | 
						|
    content::SiteInstance* current_instance,
 | 
						|
    content::SiteInstance* speculative_instance,
 | 
						|
    const GURL& dest_url,
 | 
						|
    bool has_response_started) const {
 | 
						|
  bool navigation_was_redirected = false;
 | 
						|
  if (has_response_started) {
 | 
						|
    navigation_was_redirected =
 | 
						|
        !IsSameWebSite(browser_context, current_instance, dest_url);
 | 
						|
  } else {
 | 
						|
    navigation_was_redirected =
 | 
						|
        speculative_instance &&
 | 
						|
        !IsSameWebSite(browser_context, speculative_instance, dest_url);
 | 
						|
  }
 | 
						|
 | 
						|
  return navigation_was_redirected;
 | 
						|
}
 | 
						|
 | 
						|
void AtomBrowserClient::AddProcessPreferences(
 | 
						|
    int process_id,
 | 
						|
    AtomBrowserClient::ProcessPreferences prefs) {
 | 
						|
  base::AutoLock auto_lock(process_preferences_lock_);
 | 
						|
  process_preferences_[process_id] = prefs;
 | 
						|
}
 | 
						|
 | 
						|
void AtomBrowserClient::RemoveProcessPreferences(int process_id) {
 | 
						|
  base::AutoLock auto_lock(process_preferences_lock_);
 | 
						|
  process_preferences_.erase(process_id);
 | 
						|
}
 | 
						|
 | 
						|
bool AtomBrowserClient::IsProcessObserved(int process_id) const {
 | 
						|
  base::AutoLock auto_lock(process_preferences_lock_);
 | 
						|
  return process_preferences_.find(process_id) != process_preferences_.end();
 | 
						|
}
 | 
						|
 | 
						|
bool AtomBrowserClient::IsRendererSandboxed(int process_id) const {
 | 
						|
  base::AutoLock auto_lock(process_preferences_lock_);
 | 
						|
  auto it = process_preferences_.find(process_id);
 | 
						|
  return it != process_preferences_.end() && it->second.sandbox;
 | 
						|
}
 | 
						|
 | 
						|
bool AtomBrowserClient::RendererUsesNativeWindowOpen(int process_id) const {
 | 
						|
  base::AutoLock auto_lock(process_preferences_lock_);
 | 
						|
  auto it = process_preferences_.find(process_id);
 | 
						|
  return it != process_preferences_.end() && it->second.native_window_open;
 | 
						|
}
 | 
						|
 | 
						|
bool AtomBrowserClient::RendererDisablesPopups(int process_id) const {
 | 
						|
  base::AutoLock auto_lock(process_preferences_lock_);
 | 
						|
  auto it = process_preferences_.find(process_id);
 | 
						|
  return it != process_preferences_.end() && it->second.disable_popups;
 | 
						|
}
 | 
						|
 | 
						|
std::string AtomBrowserClient::GetAffinityPreference(
 | 
						|
    content::RenderFrameHost* rfh) const {
 | 
						|
  auto* web_contents = content::WebContents::FromRenderFrameHost(rfh);
 | 
						|
  auto* web_preferences = WebContentsPreferences::From(web_contents);
 | 
						|
  std::string affinity;
 | 
						|
  if (web_preferences &&
 | 
						|
      web_preferences->GetPreference("affinity", &affinity) &&
 | 
						|
      !affinity.empty()) {
 | 
						|
    affinity = base::ToLowerASCII(affinity);
 | 
						|
  }
 | 
						|
 | 
						|
  return affinity;
 | 
						|
}
 | 
						|
 | 
						|
content::SiteInstance* AtomBrowserClient::GetSiteInstanceFromAffinity(
 | 
						|
    content::BrowserContext* browser_context,
 | 
						|
    const GURL& url,
 | 
						|
    content::RenderFrameHost* rfh) const {
 | 
						|
  std::string affinity = GetAffinityPreference(rfh);
 | 
						|
  if (!affinity.empty()) {
 | 
						|
    auto iter = site_per_affinities_.find(affinity);
 | 
						|
    GURL dest_site = content::SiteInstance::GetSiteForURL(browser_context, url);
 | 
						|
    if (iter != site_per_affinities_.end() &&
 | 
						|
        IsSameWebSite(browser_context, iter->second, dest_site)) {
 | 
						|
      return iter->second;
 | 
						|
    }
 | 
						|
  }
 | 
						|
 | 
						|
  return nullptr;
 | 
						|
}
 | 
						|
 | 
						|
void AtomBrowserClient::ConsiderSiteInstanceForAffinity(
 | 
						|
    content::RenderFrameHost* rfh,
 | 
						|
    content::SiteInstance* site_instance) {
 | 
						|
  std::string affinity = GetAffinityPreference(rfh);
 | 
						|
  if (!affinity.empty()) {
 | 
						|
    site_per_affinities_[affinity] = site_instance;
 | 
						|
  }
 | 
						|
}
 | 
						|
 | 
						|
void AtomBrowserClient::RenderProcessWillLaunch(
 | 
						|
    content::RenderProcessHost* host,
 | 
						|
    service_manager::mojom::ServiceRequest* service_request) {
 | 
						|
  // When a render process is crashed, it might be reused.
 | 
						|
  int process_id = host->GetID();
 | 
						|
  if (IsProcessObserved(process_id))
 | 
						|
    return;
 | 
						|
 | 
						|
#if BUILDFLAG(ENABLE_PRINTING)
 | 
						|
  host->AddFilter(new printing::PrintingMessageFilter(
 | 
						|
      process_id, host->GetBrowserContext()));
 | 
						|
#endif
 | 
						|
 | 
						|
#if BUILDFLAG(ENABLE_TTS)
 | 
						|
  host->AddFilter(new TtsMessageFilter(host->GetBrowserContext()));
 | 
						|
#endif
 | 
						|
 | 
						|
  ProcessPreferences prefs;
 | 
						|
  auto* web_preferences =
 | 
						|
      WebContentsPreferences::From(GetWebContentsFromProcessID(process_id));
 | 
						|
  if (web_preferences) {
 | 
						|
    prefs.sandbox = web_preferences->IsEnabled(options::kSandbox);
 | 
						|
    prefs.native_window_open =
 | 
						|
        web_preferences->IsEnabled(options::kNativeWindowOpen);
 | 
						|
    prefs.disable_popups = web_preferences->IsEnabled("disablePopups");
 | 
						|
    prefs.web_security = web_preferences->IsEnabled(options::kWebSecurity,
 | 
						|
                                                    true /* default value */);
 | 
						|
  }
 | 
						|
  AddProcessPreferences(host->GetID(), prefs);
 | 
						|
  // ensure the ProcessPreferences is removed later
 | 
						|
  host->AddObserver(this);
 | 
						|
}
 | 
						|
 | 
						|
content::SpeechRecognitionManagerDelegate*
 | 
						|
AtomBrowserClient::CreateSpeechRecognitionManagerDelegate() {
 | 
						|
  return new AtomSpeechRecognitionManagerDelegate;
 | 
						|
}
 | 
						|
 | 
						|
content::TtsControllerDelegate* AtomBrowserClient::GetTtsControllerDelegate() {
 | 
						|
#if BUILDFLAG(ENABLE_TTS)
 | 
						|
  return TtsControllerDelegateImpl::GetInstance();
 | 
						|
#else
 | 
						|
  return nullptr;
 | 
						|
#endif
 | 
						|
}
 | 
						|
 | 
						|
void AtomBrowserClient::OverrideWebkitPrefs(content::RenderViewHost* host,
 | 
						|
                                            content::WebPreferences* prefs) {
 | 
						|
  prefs->javascript_enabled = true;
 | 
						|
  prefs->web_security_enabled = true;
 | 
						|
  prefs->plugins_enabled = true;
 | 
						|
  prefs->dom_paste_enabled = true;
 | 
						|
  prefs->allow_scripts_to_close_windows = true;
 | 
						|
  prefs->javascript_can_access_clipboard = true;
 | 
						|
  prefs->local_storage_enabled = true;
 | 
						|
  prefs->databases_enabled = true;
 | 
						|
  prefs->application_cache_enabled = true;
 | 
						|
  prefs->allow_universal_access_from_file_urls = true;
 | 
						|
  prefs->allow_file_access_from_file_urls = true;
 | 
						|
  prefs->webgl1_enabled = true;
 | 
						|
  prefs->webgl2_enabled = true;
 | 
						|
  prefs->allow_running_insecure_content = false;
 | 
						|
  prefs->default_minimum_page_scale_factor = 1.f;
 | 
						|
  prefs->default_maximum_page_scale_factor = 1.f;
 | 
						|
  prefs->navigate_on_drag_drop = false;
 | 
						|
 | 
						|
  SetFontDefaults(prefs);
 | 
						|
 | 
						|
  // Custom preferences of guest page.
 | 
						|
  auto* web_contents = content::WebContents::FromRenderViewHost(host);
 | 
						|
  auto* web_preferences = WebContentsPreferences::From(web_contents);
 | 
						|
  if (web_preferences)
 | 
						|
    web_preferences->OverrideWebkitPrefs(prefs);
 | 
						|
}
 | 
						|
 | 
						|
content::ContentBrowserClient::SiteInstanceForNavigationType
 | 
						|
AtomBrowserClient::ShouldOverrideSiteInstanceForNavigation(
 | 
						|
    content::RenderFrameHost* current_rfh,
 | 
						|
    content::RenderFrameHost* speculative_rfh,
 | 
						|
    content::BrowserContext* browser_context,
 | 
						|
    const GURL& url,
 | 
						|
    bool has_response_started,
 | 
						|
    content::SiteInstance** affinity_site_instance) const {
 | 
						|
  if (g_suppress_renderer_process_restart) {
 | 
						|
    g_suppress_renderer_process_restart = false;
 | 
						|
    return SiteInstanceForNavigationType::ASK_CHROMIUM;
 | 
						|
  }
 | 
						|
 | 
						|
  // Do we have an affinity site to manage ?
 | 
						|
  content::SiteInstance* site_instance_from_affinity =
 | 
						|
      GetSiteInstanceFromAffinity(browser_context, url, current_rfh);
 | 
						|
  if (site_instance_from_affinity) {
 | 
						|
    *affinity_site_instance = site_instance_from_affinity;
 | 
						|
    return SiteInstanceForNavigationType::FORCE_AFFINITY;
 | 
						|
  }
 | 
						|
 | 
						|
  if (!ShouldForceNewSiteInstance(current_rfh, speculative_rfh, browser_context,
 | 
						|
                                  url, has_response_started)) {
 | 
						|
    return SiteInstanceForNavigationType::ASK_CHROMIUM;
 | 
						|
  }
 | 
						|
 | 
						|
  // ShouldOverrideSiteInstanceForNavigation will be called more than once
 | 
						|
  // during a navigation (currently twice, on request and when it's about
 | 
						|
  // to commit in the renderer), look at
 | 
						|
  // RenderFrameHostManager::GetFrameHostForNavigation.
 | 
						|
  // In the default mode we should reuse the same site instance until the
 | 
						|
  // request commits otherwise it will get destroyed. Currently there is no
 | 
						|
  // unique lifetime tracker for a navigation request during site instance
 | 
						|
  // creation. We check for the state of the request, which should be one of
 | 
						|
  // (WAITING_FOR_RENDERER_RESPONSE, STARTED, RESPONSE_STARTED, FAILED) along
 | 
						|
  // with the availability of a speculative render frame host.
 | 
						|
  if (has_response_started) {
 | 
						|
    return SiteInstanceForNavigationType::FORCE_CURRENT;
 | 
						|
  }
 | 
						|
 | 
						|
  return SiteInstanceForNavigationType::FORCE_CANDIDATE_OR_NEW;
 | 
						|
}
 | 
						|
 | 
						|
void AtomBrowserClient::RegisterPendingSiteInstance(
 | 
						|
    content::RenderFrameHost* rfh,
 | 
						|
    content::SiteInstance* pending_site_instance) {
 | 
						|
  // Do we have an affinity site to manage?
 | 
						|
  ConsiderSiteInstanceForAffinity(rfh, pending_site_instance);
 | 
						|
 | 
						|
  // Remember the original web contents for the pending renderer process.
 | 
						|
  auto* web_contents = content::WebContents::FromRenderFrameHost(rfh);
 | 
						|
  auto* pending_process = pending_site_instance->GetProcess();
 | 
						|
  pending_processes_[pending_process->GetID()] = web_contents;
 | 
						|
}
 | 
						|
 | 
						|
void AtomBrowserClient::AppendExtraCommandLineSwitches(
 | 
						|
    base::CommandLine* command_line,
 | 
						|
    int process_id) {
 | 
						|
  // Make sure we're about to launch a known executable
 | 
						|
  {
 | 
						|
    base::FilePath child_path;
 | 
						|
    base::PathService::Get(content::CHILD_PROCESS_EXE, &child_path);
 | 
						|
 | 
						|
    base::ThreadRestrictions::ScopedAllowIO allow_io;
 | 
						|
    CHECK(base::MakeAbsoluteFilePath(command_line->GetProgram()) == child_path);
 | 
						|
  }
 | 
						|
 | 
						|
  std::string process_type =
 | 
						|
      command_line->GetSwitchValueASCII(::switches::kProcessType);
 | 
						|
  if (process_type != ::switches::kRendererProcess)
 | 
						|
    return;
 | 
						|
 | 
						|
  // Copy following switches to child process.
 | 
						|
  static const char* const kCommonSwitchNames[] = {
 | 
						|
      switches::kStandardSchemes,     switches::kEnableSandbox,
 | 
						|
      switches::kSecureSchemes,       switches::kBypassCSPSchemes,
 | 
						|
      switches::kCORSSchemes,         switches::kFetchSchemes,
 | 
						|
      switches::kServiceWorkerSchemes};
 | 
						|
  command_line->CopySwitchesFrom(*base::CommandLine::ForCurrentProcess(),
 | 
						|
                                 kCommonSwitchNames,
 | 
						|
                                 base::size(kCommonSwitchNames));
 | 
						|
 | 
						|
#if defined(OS_WIN)
 | 
						|
  // Append --app-user-model-id.
 | 
						|
  PWSTR current_app_id;
 | 
						|
  if (SUCCEEDED(GetCurrentProcessExplicitAppUserModelID(¤t_app_id))) {
 | 
						|
    command_line->AppendSwitchNative(switches::kAppUserModelId, current_app_id);
 | 
						|
    CoTaskMemFree(current_app_id);
 | 
						|
  }
 | 
						|
#endif
 | 
						|
 | 
						|
  if (delegate_) {
 | 
						|
    auto app_path = static_cast<api::App*>(delegate_)->GetAppPath();
 | 
						|
    command_line->AppendSwitchPath(switches::kAppPath, app_path);
 | 
						|
  }
 | 
						|
 | 
						|
  content::WebContents* web_contents = GetWebContentsFromProcessID(process_id);
 | 
						|
  if (web_contents) {
 | 
						|
    if (web_contents->GetVisibleURL().SchemeIs("chrome-devtools")) {
 | 
						|
      command_line->AppendSwitch(switches::kDisableRemoteModule);
 | 
						|
    }
 | 
						|
    auto* web_preferences = WebContentsPreferences::From(web_contents);
 | 
						|
    if (web_preferences)
 | 
						|
      web_preferences->AppendCommandLineSwitches(command_line);
 | 
						|
    SessionPreferences::AppendExtraCommandLineSwitches(
 | 
						|
        web_contents->GetBrowserContext(), command_line);
 | 
						|
  }
 | 
						|
}
 | 
						|
 | 
						|
void AtomBrowserClient::AdjustUtilityServiceProcessCommandLine(
 | 
						|
    const service_manager::Identity& identity,
 | 
						|
    base::CommandLine* command_line) {
 | 
						|
#if defined(OS_MACOSX)
 | 
						|
  if (identity.name() == video_capture::mojom::kServiceName ||
 | 
						|
      identity.name() == audio::mojom::kServiceName)
 | 
						|
    command_line->AppendSwitch(::switches::kMessageLoopTypeUi);
 | 
						|
#endif
 | 
						|
}
 | 
						|
 | 
						|
void AtomBrowserClient::DidCreatePpapiPlugin(content::BrowserPpapiHost* host) {
 | 
						|
#if BUILDFLAG(ENABLE_PEPPER_FLASH)
 | 
						|
  host->GetPpapiHost()->AddHostFactoryFilter(
 | 
						|
      base::WrapUnique(new ChromeBrowserPepperHostFactory(host)));
 | 
						|
#endif
 | 
						|
}
 | 
						|
 | 
						|
// attempt to get api key from env
 | 
						|
std::string AtomBrowserClient::GetGeolocationApiKey() {
 | 
						|
  std::unique_ptr<base::Environment> env(base::Environment::Create());
 | 
						|
  std::string api_key;
 | 
						|
  env->GetVar("GOOGLE_API_KEY", &api_key);
 | 
						|
  return api_key;
 | 
						|
}
 | 
						|
 | 
						|
content::QuotaPermissionContext*
 | 
						|
AtomBrowserClient::CreateQuotaPermissionContext() {
 | 
						|
  return new AtomQuotaPermissionContext;
 | 
						|
}
 | 
						|
 | 
						|
content::GeneratedCodeCacheSettings
 | 
						|
AtomBrowserClient::GetGeneratedCodeCacheSettings(
 | 
						|
    content::BrowserContext* context) {
 | 
						|
  // TODO(deepak1556): Use platform cache directory.
 | 
						|
  base::FilePath cache_path = context->GetPath();
 | 
						|
  // If we pass 0 for size, disk_cache will pick a default size using the
 | 
						|
  // heuristics based on available disk size. These are implemented in
 | 
						|
  // disk_cache::PreferredCacheSize in net/disk_cache/cache_util.cc.
 | 
						|
  return content::GeneratedCodeCacheSettings(true, 0, cache_path);
 | 
						|
}
 | 
						|
 | 
						|
void AtomBrowserClient::AllowCertificateError(
 | 
						|
    content::WebContents* web_contents,
 | 
						|
    int cert_error,
 | 
						|
    const net::SSLInfo& ssl_info,
 | 
						|
    const GURL& request_url,
 | 
						|
    content::ResourceType resource_type,
 | 
						|
    bool strict_enforcement,
 | 
						|
    bool expired_previous_decision,
 | 
						|
    const base::Callback<void(content::CertificateRequestResultType)>&
 | 
						|
        callback) {
 | 
						|
  if (delegate_) {
 | 
						|
    delegate_->AllowCertificateError(
 | 
						|
        web_contents, cert_error, ssl_info, request_url, resource_type,
 | 
						|
        strict_enforcement, expired_previous_decision, callback);
 | 
						|
  }
 | 
						|
}
 | 
						|
 | 
						|
void AtomBrowserClient::SelectClientCertificate(
 | 
						|
    content::WebContents* web_contents,
 | 
						|
    net::SSLCertRequestInfo* cert_request_info,
 | 
						|
    net::ClientCertIdentityList client_certs,
 | 
						|
    std::unique_ptr<content::ClientCertificateDelegate> delegate) {
 | 
						|
  if (!client_certs.empty() && delegate_) {
 | 
						|
    delegate_->SelectClientCertificate(web_contents, cert_request_info,
 | 
						|
                                       std::move(client_certs),
 | 
						|
                                       std::move(delegate));
 | 
						|
  }
 | 
						|
}
 | 
						|
 | 
						|
void AtomBrowserClient::ResourceDispatcherHostCreated() {
 | 
						|
  resource_dispatcher_host_delegate_.reset(
 | 
						|
      new AtomResourceDispatcherHostDelegate);
 | 
						|
  content::ResourceDispatcherHost::Get()->SetDelegate(
 | 
						|
      resource_dispatcher_host_delegate_.get());
 | 
						|
}
 | 
						|
 | 
						|
bool AtomBrowserClient::CanCreateWindow(
 | 
						|
    content::RenderFrameHost* opener,
 | 
						|
    const GURL& opener_url,
 | 
						|
    const GURL& opener_top_level_frame_url,
 | 
						|
    const url::Origin& source_origin,
 | 
						|
    content::mojom::WindowContainerType container_type,
 | 
						|
    const GURL& target_url,
 | 
						|
    const content::Referrer& referrer,
 | 
						|
    const std::string& frame_name,
 | 
						|
    WindowOpenDisposition disposition,
 | 
						|
    const blink::mojom::WindowFeatures& features,
 | 
						|
    const std::vector<std::string>& additional_features,
 | 
						|
    const scoped_refptr<network::ResourceRequestBody>& body,
 | 
						|
    bool user_gesture,
 | 
						|
    bool opener_suppressed,
 | 
						|
    bool* no_javascript_access) {
 | 
						|
  DCHECK_CURRENTLY_ON(BrowserThread::UI);
 | 
						|
 | 
						|
  int opener_render_process_id = opener->GetProcess()->GetID();
 | 
						|
 | 
						|
  if (IsRendererSandboxed(opener_render_process_id)) {
 | 
						|
    *no_javascript_access = false;
 | 
						|
    return true;
 | 
						|
  }
 | 
						|
 | 
						|
  if (RendererUsesNativeWindowOpen(opener_render_process_id)) {
 | 
						|
    if (RendererDisablesPopups(opener_render_process_id)) {
 | 
						|
      // <webview> without allowpopups attribute should return
 | 
						|
      // null from window.open calls
 | 
						|
      return false;
 | 
						|
    } else {
 | 
						|
      *no_javascript_access = false;
 | 
						|
      return true;
 | 
						|
    }
 | 
						|
  }
 | 
						|
 | 
						|
  if (delegate_) {
 | 
						|
    return delegate_->CanCreateWindow(
 | 
						|
        opener, opener_url, opener_top_level_frame_url, source_origin,
 | 
						|
        container_type, target_url, referrer, frame_name, disposition, features,
 | 
						|
        additional_features, body, user_gesture, opener_suppressed,
 | 
						|
        no_javascript_access);
 | 
						|
  }
 | 
						|
 | 
						|
  return false;
 | 
						|
}
 | 
						|
 | 
						|
void AtomBrowserClient::GetAdditionalAllowedSchemesForFileSystem(
 | 
						|
    std::vector<std::string>* additional_schemes) {
 | 
						|
  auto schemes_list = api::GetStandardSchemes();
 | 
						|
  if (!schemes_list.empty())
 | 
						|
    additional_schemes->insert(additional_schemes->end(), schemes_list.begin(),
 | 
						|
                               schemes_list.end());
 | 
						|
  additional_schemes->push_back(content::kChromeDevToolsScheme);
 | 
						|
}
 | 
						|
 | 
						|
void AtomBrowserClient::GetAdditionalWebUISchemes(
 | 
						|
    std::vector<std::string>* additional_schemes) {
 | 
						|
  additional_schemes->push_back(content::kChromeDevToolsScheme);
 | 
						|
}
 | 
						|
 | 
						|
void AtomBrowserClient::SiteInstanceDeleting(
 | 
						|
    content::SiteInstance* site_instance) {
 | 
						|
  // We are storing weak_ptr, is it fundamental to maintain the map up-to-date
 | 
						|
  // when an instance is destroyed.
 | 
						|
  for (auto iter = site_per_affinities_.begin();
 | 
						|
       iter != site_per_affinities_.end(); ++iter) {
 | 
						|
    if (iter->second == site_instance) {
 | 
						|
      site_per_affinities_.erase(iter);
 | 
						|
      break;
 | 
						|
    }
 | 
						|
  }
 | 
						|
}
 | 
						|
 | 
						|
std::unique_ptr<net::ClientCertStore> AtomBrowserClient::CreateClientCertStore(
 | 
						|
    content::ResourceContext* resource_context) {
 | 
						|
#if defined(USE_NSS_CERTS)
 | 
						|
  return std::make_unique<net::ClientCertStoreNSS>(
 | 
						|
      net::ClientCertStoreNSS::PasswordDelegateFactory());
 | 
						|
#elif defined(OS_WIN)
 | 
						|
  return std::make_unique<net::ClientCertStoreWin>();
 | 
						|
#elif defined(OS_MACOSX)
 | 
						|
  return std::make_unique<net::ClientCertStoreMac>();
 | 
						|
#elif defined(USE_OPENSSL)
 | 
						|
  return std::unique_ptr<net::ClientCertStore>();
 | 
						|
#endif
 | 
						|
}
 | 
						|
 | 
						|
std::unique_ptr<device::LocationProvider>
 | 
						|
AtomBrowserClient::OverrideSystemLocationProvider() {
 | 
						|
#if BUILDFLAG(OVERRIDE_LOCATION_PROVIDER)
 | 
						|
  return std::make_unique<FakeLocationProvider>();
 | 
						|
#else
 | 
						|
  return nullptr;
 | 
						|
#endif
 | 
						|
}
 | 
						|
 | 
						|
network::mojom::NetworkContextPtr AtomBrowserClient::CreateNetworkContext(
 | 
						|
    content::BrowserContext* browser_context,
 | 
						|
    bool /*in_memory*/,
 | 
						|
    const base::FilePath& /*relative_partition_path*/) {
 | 
						|
  if (!browser_context)
 | 
						|
    return nullptr;
 | 
						|
 | 
						|
  if (base::FeatureList::IsEnabled(network::features::kNetworkService)) {
 | 
						|
    return NetworkContextServiceFactory::GetForContext(browser_context)
 | 
						|
        ->CreateNetworkContext();
 | 
						|
  } else {
 | 
						|
    return static_cast<AtomBrowserContext*>(browser_context)
 | 
						|
        ->GetNetworkContext();
 | 
						|
  }
 | 
						|
}
 | 
						|
 | 
						|
network::mojom::NetworkContext* AtomBrowserClient::GetSystemNetworkContext() {
 | 
						|
  DCHECK_CURRENTLY_ON(BrowserThread::UI);
 | 
						|
  DCHECK(g_browser_process->system_network_context_manager());
 | 
						|
  return g_browser_process->system_network_context_manager()->GetContext();
 | 
						|
}
 | 
						|
 | 
						|
void AtomBrowserClient::RegisterOutOfProcessServices(
 | 
						|
    OutOfProcessServiceMap* services) {
 | 
						|
  (*services)[proxy_resolver::mojom::kProxyResolverServiceName] =
 | 
						|
      base::BindRepeating(&l10n_util::GetStringUTF16,
 | 
						|
                          IDS_UTILITY_PROCESS_PROXY_RESOLVER_NAME);
 | 
						|
 | 
						|
#if BUILDFLAG(ENABLE_PRINTING)
 | 
						|
  (*services)[printing::mojom::kServiceName] =
 | 
						|
      base::BindRepeating(&l10n_util::GetStringUTF16,
 | 
						|
                          IDS_UTILITY_PROCESS_PDF_COMPOSITOR_SERVICE_NAME);
 | 
						|
 | 
						|
  (*services)[printing::mojom::kChromePrintingServiceName] =
 | 
						|
      base::BindRepeating(&l10n_util::GetStringUTF16,
 | 
						|
                          IDS_UTILITY_PROCESS_PRINTING_SERVICE_NAME);
 | 
						|
#endif
 | 
						|
}
 | 
						|
 | 
						|
base::Optional<service_manager::Manifest>
 | 
						|
AtomBrowserClient::GetServiceManifestOverlay(base::StringPiece name) {
 | 
						|
  if (name == content::mojom::kBrowserServiceName) {
 | 
						|
    return GetElectronContentBrowserOverlayManifest();
 | 
						|
  } else if (name == content::mojom::kPackagedServicesServiceName) {
 | 
						|
    service_manager::Manifest overlay;
 | 
						|
    overlay.packaged_services = GetElectronPackagedServicesOverlayManifest();
 | 
						|
    return overlay;
 | 
						|
  }
 | 
						|
 | 
						|
  return base::nullopt;
 | 
						|
}
 | 
						|
 | 
						|
net::NetLog* AtomBrowserClient::GetNetLog() {
 | 
						|
  return g_browser_process->net_log();
 | 
						|
}
 | 
						|
 | 
						|
content::BrowserMainParts* AtomBrowserClient::CreateBrowserMainParts(
 | 
						|
    const content::MainFunctionParams& params) {
 | 
						|
  return new AtomBrowserMainParts(params);
 | 
						|
}
 | 
						|
 | 
						|
void AtomBrowserClient::WebNotificationAllowed(
 | 
						|
    int render_process_id,
 | 
						|
    const base::Callback<void(bool, bool)>& callback) {
 | 
						|
  content::WebContents* web_contents =
 | 
						|
      WebContentsPreferences::GetWebContentsFromProcessID(render_process_id);
 | 
						|
  if (!web_contents) {
 | 
						|
    callback.Run(false, false);
 | 
						|
    return;
 | 
						|
  }
 | 
						|
  auto* permission_helper =
 | 
						|
      WebContentsPermissionHelper::FromWebContents(web_contents);
 | 
						|
  if (!permission_helper) {
 | 
						|
    callback.Run(false, false);
 | 
						|
    return;
 | 
						|
  }
 | 
						|
  permission_helper->RequestWebNotificationPermission(
 | 
						|
      base::Bind(callback, web_contents->IsAudioMuted()));
 | 
						|
}
 | 
						|
 | 
						|
void AtomBrowserClient::RenderProcessHostDestroyed(
 | 
						|
    content::RenderProcessHost* host) {
 | 
						|
  int process_id = host->GetID();
 | 
						|
  pending_processes_.erase(process_id);
 | 
						|
  RemoveProcessPreferences(process_id);
 | 
						|
}
 | 
						|
 | 
						|
void AtomBrowserClient::RenderProcessReady(content::RenderProcessHost* host) {
 | 
						|
  render_process_host_pids_[host->GetID()] =
 | 
						|
      base::GetProcId(host->GetProcess().Handle());
 | 
						|
  if (delegate_) {
 | 
						|
    static_cast<api::App*>(delegate_)->RenderProcessReady(host);
 | 
						|
  }
 | 
						|
}
 | 
						|
 | 
						|
void AtomBrowserClient::RenderProcessExited(
 | 
						|
    content::RenderProcessHost* host,
 | 
						|
    const content::ChildProcessTerminationInfo& info) {
 | 
						|
  auto host_pid = render_process_host_pids_.find(host->GetID());
 | 
						|
  if (host_pid != render_process_host_pids_.end()) {
 | 
						|
    if (delegate_) {
 | 
						|
      static_cast<api::App*>(delegate_)->RenderProcessDisconnected(
 | 
						|
          host_pid->second);
 | 
						|
    }
 | 
						|
    render_process_host_pids_.erase(host_pid);
 | 
						|
  }
 | 
						|
}
 | 
						|
 | 
						|
void OnOpenExternal(const GURL& escaped_url, bool allowed) {
 | 
						|
  if (allowed)
 | 
						|
    platform_util::OpenExternal(
 | 
						|
#if defined(OS_WIN)
 | 
						|
        base::UTF8ToUTF16(escaped_url.spec()),
 | 
						|
#else
 | 
						|
        escaped_url,
 | 
						|
#endif
 | 
						|
        platform_util::OpenExternalOptions());
 | 
						|
}
 | 
						|
 | 
						|
void HandleExternalProtocolInUI(
 | 
						|
    const GURL& url,
 | 
						|
    const content::ResourceRequestInfo::WebContentsGetter& web_contents_getter,
 | 
						|
    bool has_user_gesture) {
 | 
						|
  content::WebContents* web_contents = web_contents_getter.Run();
 | 
						|
  if (!web_contents)
 | 
						|
    return;
 | 
						|
 | 
						|
  auto* permission_helper =
 | 
						|
      WebContentsPermissionHelper::FromWebContents(web_contents);
 | 
						|
  if (!permission_helper)
 | 
						|
    return;
 | 
						|
 | 
						|
  GURL escaped_url(net::EscapeExternalHandlerValue(url.spec()));
 | 
						|
  auto callback = base::Bind(&OnOpenExternal, escaped_url);
 | 
						|
  permission_helper->RequestOpenExternalPermission(callback, has_user_gesture,
 | 
						|
                                                   url);
 | 
						|
}
 | 
						|
 | 
						|
bool AtomBrowserClient::HandleExternalProtocol(
 | 
						|
    const GURL& url,
 | 
						|
    content::ResourceRequestInfo::WebContentsGetter web_contents_getter,
 | 
						|
    int child_id,
 | 
						|
    content::NavigationUIData* navigation_data,
 | 
						|
    bool is_main_frame,
 | 
						|
    ui::PageTransition page_transition,
 | 
						|
    bool has_user_gesture,
 | 
						|
    const std::string& method,
 | 
						|
    const net::HttpRequestHeaders& headers,
 | 
						|
    network::mojom::URLLoaderFactoryRequest* factory_request,
 | 
						|
    // clang-format off
 | 
						|
    network::mojom::URLLoaderFactory*& out_factory) {  // NOLINT
 | 
						|
  // clang-format on
 | 
						|
  base::PostTaskWithTraits(
 | 
						|
      FROM_HERE, {BrowserThread::UI},
 | 
						|
      base::BindOnce(&HandleExternalProtocolInUI, url, web_contents_getter,
 | 
						|
                     has_user_gesture));
 | 
						|
  return true;
 | 
						|
}
 | 
						|
 | 
						|
std::vector<std::unique_ptr<content::NavigationThrottle>>
 | 
						|
AtomBrowserClient::CreateThrottlesForNavigation(
 | 
						|
    content::NavigationHandle* handle) {
 | 
						|
  std::vector<std::unique_ptr<content::NavigationThrottle>> throttles;
 | 
						|
  throttles.push_back(std::make_unique<AtomNavigationThrottle>(handle));
 | 
						|
  return throttles;
 | 
						|
}
 | 
						|
 | 
						|
content::MediaObserver* AtomBrowserClient::GetMediaObserver() {
 | 
						|
  return MediaCaptureDevicesDispatcher::GetInstance();
 | 
						|
}
 | 
						|
 | 
						|
content::DevToolsManagerDelegate*
 | 
						|
AtomBrowserClient::GetDevToolsManagerDelegate() {
 | 
						|
  return new DevToolsManagerDelegate;
 | 
						|
}
 | 
						|
 | 
						|
NotificationPresenter* AtomBrowserClient::GetNotificationPresenter() {
 | 
						|
  if (!notification_presenter_) {
 | 
						|
    notification_presenter_.reset(NotificationPresenter::Create());
 | 
						|
  }
 | 
						|
  return notification_presenter_.get();
 | 
						|
}
 | 
						|
 | 
						|
content::PlatformNotificationService*
 | 
						|
AtomBrowserClient::GetPlatformNotificationService() {
 | 
						|
  if (!notification_service_) {
 | 
						|
    notification_service_.reset(new PlatformNotificationService(this));
 | 
						|
  }
 | 
						|
  return notification_service_.get();
 | 
						|
}
 | 
						|
 | 
						|
base::FilePath AtomBrowserClient::GetDefaultDownloadDirectory() {
 | 
						|
  // ~/Downloads
 | 
						|
  base::FilePath path;
 | 
						|
  if (base::PathService::Get(base::DIR_HOME, &path))
 | 
						|
    path = path.Append(FILE_PATH_LITERAL("Downloads"));
 | 
						|
 | 
						|
  return path;
 | 
						|
}
 | 
						|
 | 
						|
scoped_refptr<network::SharedURLLoaderFactory>
 | 
						|
AtomBrowserClient::GetSystemSharedURLLoaderFactory() {
 | 
						|
  if (!g_browser_process)
 | 
						|
    return nullptr;
 | 
						|
  return g_browser_process->shared_url_loader_factory();
 | 
						|
}
 | 
						|
 | 
						|
void AtomBrowserClient::OnNetworkServiceCreated(
 | 
						|
    network::mojom::NetworkService* network_service) {
 | 
						|
  if (!g_browser_process ||
 | 
						|
      !base::FeatureList::IsEnabled(network::features::kNetworkService))
 | 
						|
    return;
 | 
						|
 | 
						|
  g_browser_process->system_network_context_manager()->OnNetworkServiceCreated(
 | 
						|
      network_service);
 | 
						|
}
 | 
						|
 | 
						|
bool AtomBrowserClient::ShouldBypassCORB(int render_process_id) const {
 | 
						|
  // This is called on the network thread.
 | 
						|
  base::AutoLock auto_lock(process_preferences_lock_);
 | 
						|
  auto it = process_preferences_.find(render_process_id);
 | 
						|
  return it != process_preferences_.end() && !it->second.web_security;
 | 
						|
}
 | 
						|
 | 
						|
std::string AtomBrowserClient::GetProduct() const {
 | 
						|
  return "Chrome/" CHROME_VERSION_STRING;
 | 
						|
}
 | 
						|
 | 
						|
std::string AtomBrowserClient::GetUserAgent() const {
 | 
						|
  return GetApplicationUserAgent();
 | 
						|
}
 | 
						|
 | 
						|
std::string AtomBrowserClient::GetApplicationLocale() {
 | 
						|
  if (BrowserThread::CurrentlyOn(BrowserThread::IO))
 | 
						|
    return g_io_thread_application_locale.Get();
 | 
						|
  return *g_application_locale;
 | 
						|
}
 | 
						|
 | 
						|
bool AtomBrowserClient::ShouldEnableStrictSiteIsolation() {
 | 
						|
  // Enable site isolation. It is off by default in Chromium <= 69.
 | 
						|
  return true;
 | 
						|
}
 | 
						|
 | 
						|
}  // namespace atom
 |