22a70eb803
* chore: bump chromium in DEPS to 91.0.4464.0 * chore: rebuild chromium/dcheck.patch with import-patches -3 Mechanical only; no code changes * chore: remove content_browser_main_loop.patch Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2725153 The function being patched (BrowserMainLoop::MainMessageLoopRun()) no longer exists. NB: if removing this introduces regressions the likely fix will be to add a similar patch for ShellBrowserMainParts::WillRunMainMessageLoop() which has similar code and was added at the same time this was removed. * chore: rebuild chromium/put_back_deleted_colors_for_autofill.patch with import-patches -3 Mechanical only; no code changes * chore: rebuild chromium/disable_color_correct_rendering.patch with import-patches -3 Mechanical only; no code changes * chore: rebuild chromium/eat_allow_disabling_blink_scheduler_throttling_per_renderview.patch with patch Mechanical only; no code changes * chore: rebuild chromium/gpu_notify_when_dxdiag_request_fails.patch with import-patches -3 Mechanical only; no code changes * chore: rebuild chromium/ui_gtk_public_header.patch manually no code changes * chore: rebuild chromium/web_contents.patch with import-patches -3 Mechanical only; no code changes * chore: remove v8/skip_global_registration_of_shared_arraybuffer_backing_stores.patch Refs: https://chromium-review.googlesource.com/c/v8/v8/+/2763874 This patch has been merged upstream * chore: export patches * chore: update add_trustedauthclient_to_urlloaderfactory.patch Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2757969 Sync with removal of render_frame_id_ * chore: sync chromium/put_back_deleted_colors_for_autofill.patch Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2785841 SkColorFromColorId() no longer takes theme, scheme args * chore: sync chromium/put_back_deleted_colors_for_autofill.patch Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2772143 Change new calls to GetDarkSchemeColor to fit our patched call signature * chore: update add_trustedauthclient_to_urlloaderfactory.patch Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2757969 Sync with removal of render_frame_id_ in our mojom * chore: update chromium/frame_host_manager.patch Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2740008 UrlInfo ctor now takes UrlInfo::OriginIsolationRequest instead of a bool * chore: update chromium/revert_remove_contentrendererclient_shouldfork.patch Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2755314 Upstream has removed `history_list_length_` which we were comparing to 0 to calculate our `is_initial_navigation` bool when calling ShouldFork(). ShouldFork() is ours and none of the code paths actually use that param, so this commit removes it altogether. * chore: update permissions_to_register Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2789074 Replace all uses of APIPermission::ID enum with Mojo type * refactor: update return type of PreMainMessageLoopRun() Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2725153 Used to return void; now returns an int errorcode. Note: 2725153 also has some nice doc updates about Browser's "stages" * refactor: sync ElectronBrowserMainParts to MainParts changes Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2725153 RunMainMessageLoopParts has been replaced with WillRunMainMessageLoop so `BrowserMainLoop::result_code_` is no longer available to us for our exit_code_ pointer. This variable held a dual role: (1) of course, hold the exit code, but also (2) was a nullptr before the message loop was ready, indicating to anyone calling SetExitCode() that we were still in startup and could just exit() without any extra steps. exit_code_ still fulfills these two roles but is now a base::Optional. * chore: update ElectronBrowserMainParts::PreDefaultMainMessageLoopRun Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2725153 BrowserMainParts::BrowsePreDefaultMainMesssageLoopRun() has been removed; move that work to the new WillRunMainMessageLoop(). * refactor: stop using CallbackList; it has been removed. Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2785973 * refactor: update use of threadpools. Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2773408 The upstream code is still in flux (e.g. reverts and re-lands) but the tl;dr for this commit is (1) include thread_pool.h if you're using it and (2) don't instantiate pools directly. * refactor: remove routing_id from CreateLoaderAndStart Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2762858 NB: One logic branch in ProxyingURLLoaderFactory::CreateLoaderAndStart calls std::make_unique<InProgressRequest>, which needs a routing_id. This PR uses the member field `routing_id_` since there's no longer one being passed into CreateLoaderAndStart. * refactor: sync to upstream ParittionOptions churn Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2771318 PartitionOptions' enums have changed. * refactor: update Manifest::Location usage Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2771320 tldr: s/Manifest::FOO/ManifestLocation::kFoo/ * chore: bump chromium in DEPS to 91.0.4465.0 * update patches * refactor: update extensions::Manifest to upstream Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2771320 - extensions::Manifest::COMPONENT + extensions::mojom::ManifestLocation::kExternalComponent * refactor: sync with upstream UrlInfo ctor changes Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2740008 UrlInfo ctor now takes UrlInfo::OriginIsolationRequest instead of a bool * chore: update invocation of convert_protocol_to_json.py Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2792623 python3 is being used in parts of the upstream build, but the copy of convert_protocol_to_json.py invoked in v8/third_party/inspector_protocol is not python3-friendly. Node has a py2+3-friendly version of it in its tools directory, so call it instead. * chore: use extensions::mojom::APIPermissionID Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2791122 tldr: - extensions::APIPermission::kFoo + extensions::mojom::APIPermissionID::kFoo * chore: Remove support for TLS1.0/1.1 in SSLVersionMin policy Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2765737 Remove TLS v1.0 & 1.1 from our SSLProtocolVersionFromString() function. This is the same change made upstream at https://chromium-review.googlesource.com/c/chromium/src/+/2765737/8/chrome/browser/ssl/ssl_config_service_manager_pref.cc * fixup! chore: update ElectronBrowserMainParts::PreDefaultMainMessageLoopRun * chore: Use IDType for permission change subscriptions. Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2791431 tldr: {Subscribe,Unsubscribe}PermissionStatusChange's tag type used to be an int; now it's the new SubscriptionId type (which is an IdType64). * chore: sync PowerMonitor code to upstream refactor Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2752635 tldr: PowerMonitor has been split into PowerStateObserver, PowerSuspendObserver, and PowerThermalObserver to reduce number of tasks posted to consumers who only need notifications for one of those things instead of all of them. * chore: use PartitionOptions's new Cookies field Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2771318 * Revert "refactor: remove routing_id from CreateLoaderAndStart" This reverts commit 8c9773b87a3c84f9073a47089eb2b6889d745245. 8c9773b was only a partial fix; reverting to start & try again. * update patches * chore: bump chromium in DEPS to 91.0.4466.0 * chore: update chromium/accelerator.patch Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2795472 tldr: sync patch with upstream renamed variable & macro names. * chore: update chromium/gtk_visibility.patch Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2796200 tldr: no code changes; just updating the diff to apply cleanly. note: ooh upstream Wayland hacking! * chore: update chromium/picture-in-picture.patch Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2710023 tldr: no code changes; just updating the diff to apply cleanly. * chore: update chromium/worker_feat_add_hook_to_notify_script_ready.patch Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2775573 tldr: no code changes; just updating the diff to apply cleanly. * chore: export_all_patches * chore: update chromium/feat_add_set_theme_source_to_allow_apps_to.patch Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2796511 tldr: NotifyObservers has been renamed to NotifyOnNativeThemeUpdated, so update the invocation in our patch. * chore: update ElectronBrowserClient w/upstream API Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2797454 tldr: GetDevToolsManagerDelegate() was returning an owned raw pointer. Replaced it with CreateDevToolsManagerDelegate() which uses unique_ptr<>. * chore: handle new content::PermissionType::FILE_HANDLING in toV8() Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2762201 `file-handling` string confirmed in https://chromium-review.googlesource.com/c/chromium/src/+/2762201/18/chrome/browser/ui/webui/settings/site_settings_helper.cc * refactor: remove routing_id from CreateLoaderAndStart pt 1 Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2762858 Part 1: the easiest ones * 2796724: Support Python3 https://chromium-review.googlesource.com/c/infra/luci/python-adb/+/2796724 * chore: bump chromium in DEPS to 91.0.4468.0 * 2668974: WebShare: Implement SharingServicePicker https://chromium-review.googlesource.com/c/chromium/src/+/2668974 * 2802766: Apply modernize-make-unique to media/ https://chromium-review.googlesource.com/c/chromium/src/+/2802766 * 2802823: Apply modernize-make-unique to gpu/ https://chromium-review.googlesource.com/c/chromium/src/+/2802823 * 2803041: Apply modernize-make-unique to remaining files https://chromium-review.googlesource.com/c/chromium/src/+/2803041 * 2798873: Convert GtkKeyBindingsHandler build checks to runtime checks https://chromium-review.googlesource.com/c/chromium/src/+/2798873 * 2733595: [ch-r] Parse ACCEPT_CH H2/3 frame and restart with new headers if needed https://chromium-review.googlesource.com/c/chromium/src/+/2733595 * chore: update patch indices * 2795107: Remove unused PermissionRequest IDs. https://chromium-review.googlesource.com/c/chromium/src/+/2795107 * chore: bump chromium in DEPS to 91.0.4469.0 * chore: fixup patch indices * chore: bump chromium in DEPS to 91.0.4469.5 * PiP 1.5: Add microphone, camera, and hang up buttons to the PiP window https://chromium-review.googlesource.com/c/chromium/src/+/2710023 * fixup! refactor: remove routing_id from CreateLoaderAndStart * refactor: use URLLoaderNetworkServiceObserver for auth requests from SimpleURLLoader * fixup! chore: fixup patch indices * 2724817: Expand scope of wasm-eval to all URLs https://chromium-review.googlesource.com/c/chromium/src/+/2724817 * Fixup patch after rebase * chore: bump chromium in DEPS to 91.0.4472.0 * 2797341: [ozone/x11] Enabled the global shortcut listener. https://chromium-review.googlesource.com/c/chromium/src/+/2797341 * 2805553: Reland Add GTK ColorMixers to ColorPipeline P1 https://chromium-review.googlesource.com/c/chromium/src/+/2805553 *2804366
: PiP 1.5: Label back to tab button with origin and center it https://chromium-review.googlesource.com/c/chromium/src/+/2804366 * 2784730: Fix crash on AX mode change in NativeViewHost without a Widget https://chromium-review.googlesource.com/c/chromium/src/+/2784730 * chore: update patch indices * 2810174: Add PdfAnnotationsEnabled policy. https://chromium-review.googlesource.com/c/chromium/src/+/2810174 * 2807829: Allow capturers to indicate if they want a WakeLock or not. https://chromium-review.googlesource.com/c/chromium/src/+/2807829 * chore: bump chromium in DEPS to 92.0.4473.0 * chore: bump chromium in DEPS to 92.0.4474.0 * chore: bump chromium in DEPS to 92.0.4475.0 * chore: update patches * chore: updates patches * chore: update is_media_key patch to handle new ozone impl Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2797341 * fix: ExecuteJavascript requests now need to be flagged as non-bf-aware Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2787195 * chore: icon_util_x11 is now icon_util_linux Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2791362 * build: update sysroots Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2628496 * build: fix missing symbols on linux build * use_ozone and use_x11 are not exclusive * new button view to build for pip Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2797341 Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2804366 * chore: fix broken gtk_util color patch * chore: remove patch conflict * build: update linux manifests * chore: build bttlb on all platforms for pip * chore: add thread_pool include for views delegate win * chore: fix lint * chore: add node patches for V8 changes * build: add missing base include on windows * fix: update frame host manager patch for new state transitions Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2714464 * chore: update windows zip manifests * chore: update mac zip manifests * chore: fix patch linting * refactor: implement missing URLLoaderNetworkServiceObserver methods It is against The Mojo Rules to leave hanging callbacks. These always have to be called. Refs:186528aab9
* spec: fix locale test on local linux * fix: pass the exit code correctly in new PreMainMessageLoopRun Refs:2622e91c44
* fix: ensure we early-exit when request_handler_ is not provided Refs:93077afbfb
* fix: strongly set result_code in the BrowserMainLoop * fix: invalid usage of non-targetted PostTask You must always either use a host threadpool or specify a target thread. In this case we did neither after this refactor. Refs:4e33ee0ad3
* chore: fix gn check * chore: remove stray .rej files in patch * chore: add mojo error code to url loader failure * build: ensure CI is truthy in arm test env * fix: handle windowCaptureMacV2 being enabled when fetching media source id Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2709931 Co-authored-by: Charles Kerr <charles@charleskerr.com> Co-authored-by: Shelley Vohr <shelley.vohr@gmail.com> Co-authored-by: deepak1556 <hop2deep@gmail.com> Co-authored-by: Samuel Attard <samuel.r.attard@gmail.com> Co-authored-by: Samuel Attard <sattard@slack-corp.com>
1817 lines
66 KiB
C++
1817 lines
66 KiB
C++
// Copyright (c) 2013 GitHub, Inc.
|
|
// Use of this source code is governed by the MIT license that can be
|
|
// found in the LICENSE file.
|
|
|
|
#include "shell/browser/electron_browser_client.h"
|
|
|
|
#if defined(OS_WIN)
|
|
#include <shlobj.h>
|
|
#endif
|
|
|
|
#include <memory>
|
|
#include <utility>
|
|
|
|
#include "base/base_switches.h"
|
|
#include "base/command_line.h"
|
|
#include "base/debug/crash_logging.h"
|
|
#include "base/environment.h"
|
|
#include "base/files/file_util.h"
|
|
#include "base/json/json_reader.h"
|
|
#include "base/lazy_instance.h"
|
|
#include "base/no_destructor.h"
|
|
#include "base/path_service.h"
|
|
#include "base/stl_util.h"
|
|
#include "base/strings/string_number_conversions.h"
|
|
#include "base/strings/string_util.h"
|
|
#include "base/strings/utf_string_conversions.h"
|
|
#include "base/task/post_task.h"
|
|
#include "chrome/browser/browser_process.h"
|
|
#include "chrome/common/chrome_paths.h"
|
|
#include "chrome/common/chrome_version.h"
|
|
#include "components/net_log/chrome_net_log.h"
|
|
#include "components/network_hints/common/network_hints.mojom.h"
|
|
#include "content/browser/site_instance_impl.h" // nogncheck
|
|
#include "content/public/browser/browser_main_runner.h"
|
|
#include "content/public/browser/browser_ppapi_host.h"
|
|
#include "content/public/browser/browser_task_traits.h"
|
|
#include "content/public/browser/client_certificate_delegate.h"
|
|
#include "content/public/browser/login_delegate.h"
|
|
#include "content/public/browser/overlay_window.h"
|
|
#include "content/public/browser/render_frame_host.h"
|
|
#include "content/public/browser/render_process_host.h"
|
|
#include "content/public/browser/render_view_host.h"
|
|
#include "content/public/browser/site_instance.h"
|
|
#include "content/public/browser/tts_controller.h"
|
|
#include "content/public/browser/tts_platform.h"
|
|
#include "content/public/common/content_descriptors.h"
|
|
#include "content/public/common/content_paths.h"
|
|
#include "content/public/common/content_switches.h"
|
|
#include "content/public/common/url_constants.h"
|
|
#include "electron/buildflags/buildflags.h"
|
|
#include "electron/grit/electron_resources.h"
|
|
#include "electron/shell/common/api/api.mojom.h"
|
|
#include "mojo/public/cpp/bindings/binder_map.h"
|
|
#include "net/base/escape.h"
|
|
#include "net/ssl/ssl_cert_request_info.h"
|
|
#include "ppapi/buildflags/buildflags.h"
|
|
#include "ppapi/host/ppapi_host.h"
|
|
#include "printing/buildflags/buildflags.h"
|
|
#include "services/device/public/cpp/geolocation/location_provider.h"
|
|
#include "services/network/public/cpp/features.h"
|
|
#include "services/network/public/cpp/resource_request_body.h"
|
|
#include "services/network/public/cpp/self_deleting_url_loader_factory.h"
|
|
#include "shell/app/electron_crash_reporter_client.h"
|
|
#include "shell/browser/api/electron_api_app.h"
|
|
#include "shell/browser/api/electron_api_crash_reporter.h"
|
|
#include "shell/browser/api/electron_api_protocol.h"
|
|
#include "shell/browser/api/electron_api_session.h"
|
|
#include "shell/browser/api/electron_api_web_contents.h"
|
|
#include "shell/browser/api/electron_api_web_request.h"
|
|
#include "shell/browser/badging/badge_manager.h"
|
|
#include "shell/browser/child_web_contents_tracker.h"
|
|
#include "shell/browser/electron_autofill_driver_factory.h"
|
|
#include "shell/browser/electron_browser_context.h"
|
|
#include "shell/browser/electron_browser_handler_impl.h"
|
|
#include "shell/browser/electron_browser_main_parts.h"
|
|
#include "shell/browser/electron_navigation_throttle.h"
|
|
#include "shell/browser/electron_quota_permission_context.h"
|
|
#include "shell/browser/electron_speech_recognition_manager_delegate.h"
|
|
#include "shell/browser/font_defaults.h"
|
|
#include "shell/browser/javascript_environment.h"
|
|
#include "shell/browser/media/media_capture_devices_dispatcher.h"
|
|
#include "shell/browser/native_window.h"
|
|
#include "shell/browser/net/network_context_service.h"
|
|
#include "shell/browser/net/network_context_service_factory.h"
|
|
#include "shell/browser/net/proxying_url_loader_factory.h"
|
|
#include "shell/browser/net/proxying_websocket.h"
|
|
#include "shell/browser/net/system_network_context_manager.h"
|
|
#include "shell/browser/network_hints_handler_impl.h"
|
|
#include "shell/browser/notifications/notification_presenter.h"
|
|
#include "shell/browser/notifications/platform_notification_service.h"
|
|
#include "shell/browser/protocol_registry.h"
|
|
#include "shell/browser/serial/electron_serial_delegate.h"
|
|
#include "shell/browser/session_preferences.h"
|
|
#include "shell/browser/ui/devtools_manager_delegate.h"
|
|
#include "shell/browser/web_contents_permission_helper.h"
|
|
#include "shell/browser/web_contents_preferences.h"
|
|
#include "shell/browser/window_list.h"
|
|
#include "shell/common/api/api.mojom.h"
|
|
#include "shell/common/application_info.h"
|
|
#include "shell/common/electron_paths.h"
|
|
#include "shell/common/options_switches.h"
|
|
#include "shell/common/platform_util.h"
|
|
#include "third_party/blink/public/common/loader/url_loader_throttle.h"
|
|
#include "third_party/blink/public/common/web_preferences/web_preferences.h"
|
|
#include "third_party/blink/public/mojom/badging/badging.mojom.h"
|
|
#include "ui/base/resource/resource_bundle.h"
|
|
#include "ui/native_theme/native_theme.h"
|
|
#include "v8/include/v8.h"
|
|
|
|
#if defined(OS_WIN)
|
|
#include "sandbox/win/src/sandbox_policy.h"
|
|
#endif
|
|
|
|
#if defined(USE_NSS_CERTS)
|
|
#include "net/ssl/client_cert_store_nss.h"
|
|
#elif defined(OS_WIN)
|
|
#include "net/ssl/client_cert_store_win.h"
|
|
#elif defined(OS_MAC)
|
|
#include "net/ssl/client_cert_store_mac.h"
|
|
#elif defined(USE_OPENSSL)
|
|
#include "net/ssl/client_cert_store.h"
|
|
#endif
|
|
|
|
#if BUILDFLAG(ENABLE_BUILTIN_SPELLCHECKER)
|
|
#include "chrome/browser/spellchecker/spell_check_host_chrome_impl.h" // nogncheck
|
|
#include "components/spellcheck/common/spellcheck.mojom.h" // nogncheck
|
|
#endif
|
|
|
|
#if BUILDFLAG(OVERRIDE_LOCATION_PROVIDER)
|
|
#include "shell/browser/fake_location_provider.h"
|
|
#endif // BUILDFLAG(OVERRIDE_LOCATION_PROVIDER)
|
|
|
|
#if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
|
|
#include "chrome/common/webui_url_constants.h"
|
|
#include "content/public/browser/child_process_security_policy.h"
|
|
#include "content/public/browser/file_url_loader.h"
|
|
#include "content/public/browser/web_ui_url_loader_factory.h"
|
|
#include "extensions/browser/api/mime_handler_private/mime_handler_private.h"
|
|
#include "extensions/browser/api/web_request/web_request_api.h"
|
|
#include "extensions/browser/browser_context_keyed_api_factory.h"
|
|
#include "extensions/browser/extension_host.h"
|
|
#include "extensions/browser/extension_message_filter.h"
|
|
#include "extensions/browser/extension_navigation_throttle.h"
|
|
#include "extensions/browser/extension_navigation_ui_data.h"
|
|
#include "extensions/browser/extension_protocols.h"
|
|
#include "extensions/browser/extension_registry.h"
|
|
#include "extensions/browser/extensions_browser_client.h"
|
|
#include "extensions/browser/guest_view/extensions_guest_view_message_filter.h"
|
|
#include "extensions/browser/guest_view/mime_handler_view/mime_handler_view_guest.h"
|
|
#include "extensions/browser/info_map.h"
|
|
#include "extensions/browser/process_manager.h"
|
|
#include "extensions/browser/process_map.h"
|
|
#include "extensions/browser/url_loader_factory_manager.h"
|
|
#include "extensions/common/api/mime_handler.mojom.h"
|
|
#include "extensions/common/constants.h"
|
|
#include "extensions/common/extension.h"
|
|
#include "extensions/common/switches.h"
|
|
#include "shell/browser/extensions/electron_extension_message_filter.h"
|
|
#include "shell/browser/extensions/electron_extension_system.h"
|
|
#include "shell/browser/extensions/electron_extension_web_contents_observer.h"
|
|
#endif
|
|
|
|
#if BUILDFLAG(ENABLE_PLUGINS)
|
|
#include "chrome/browser/plugins/plugin_response_interceptor_url_loader_throttle.h" // nogncheck
|
|
#include "shell/browser/plugins/plugin_utils.h"
|
|
#endif
|
|
|
|
#if defined(OS_MAC)
|
|
#include "content/common/mac_helpers.h"
|
|
#include "content/public/common/child_process_host.h"
|
|
#endif
|
|
|
|
#if defined(OS_LINUX) && !defined(MAS_BUILD)
|
|
#include "base/debug/leak_annotations.h"
|
|
#include "components/crash/content/browser/crash_handler_host_linux.h"
|
|
#include "components/crash/core/app/breakpad_linux.h" // nogncheck
|
|
#include "components/crash/core/app/crash_switches.h" // nogncheck
|
|
#include "components/crash/core/app/crashpad.h" // nogncheck
|
|
#endif
|
|
|
|
#if BUILDFLAG(ENABLE_PICTURE_IN_PICTURE) && defined(OS_WIN)
|
|
#include "chrome/browser/ui/views/overlay/overlay_window_views.h"
|
|
#include "shell/browser/browser.h"
|
|
#include "ui/aura/window.h"
|
|
#include "ui/aura/window_tree_host.h"
|
|
#include "ui/base/win/shell.h"
|
|
#include "ui/views/widget/widget.h"
|
|
#endif
|
|
|
|
using content::BrowserThread;
|
|
|
|
namespace electron {
|
|
|
|
namespace {
|
|
|
|
// Next navigation should not restart renderer process.
|
|
bool g_suppress_renderer_process_restart = false;
|
|
|
|
// c.f. https://chromium-review.googlesource.com/c/chromium/src/+/2680274
|
|
content::SiteInfo GetSiteForURL(content::BrowserContext* browser_context,
|
|
const GURL& url) {
|
|
return content::SiteInfo::Create(
|
|
content::IsolationContext(browser_context),
|
|
content::UrlInfo(url, content::UrlInfo::OriginIsolationRequest::kNone),
|
|
content::CoopCoepCrossOriginIsolatedInfo::CreateNonIsolated());
|
|
}
|
|
|
|
bool IsSameWebSite(content::BrowserContext* browser_context,
|
|
content::SiteInstance* site_instance,
|
|
const GURL& dest_url) {
|
|
return site_instance->IsSameSiteWithURL(dest_url) ||
|
|
// `IsSameSiteWithURL` doesn't seem to work for some URIs such as
|
|
// `file:`, handle these scenarios by comparing only the site as
|
|
// defined by `GetSiteForURL`.
|
|
(GetSiteForURL(browser_context, dest_url).site_url() ==
|
|
site_instance->GetSiteURL());
|
|
}
|
|
|
|
ElectronBrowserClient* g_browser_client = nullptr;
|
|
|
|
base::LazyInstance<std::string>::DestructorAtExit
|
|
g_io_thread_application_locale = LAZY_INSTANCE_INITIALIZER;
|
|
|
|
base::NoDestructor<std::string> g_application_locale;
|
|
|
|
void SetApplicationLocaleOnIOThread(const std::string& locale) {
|
|
DCHECK_CURRENTLY_ON(BrowserThread::IO);
|
|
g_io_thread_application_locale.Get() = locale;
|
|
}
|
|
|
|
void BindNetworkHintsHandler(
|
|
content::RenderFrameHost* frame_host,
|
|
mojo::PendingReceiver<network_hints::mojom::NetworkHintsHandler> receiver) {
|
|
NetworkHintsHandlerImpl::Create(frame_host, std::move(receiver));
|
|
}
|
|
|
|
#if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
|
|
// Used by the GetPrivilegeRequiredByUrl() and GetProcessPrivilege() functions
|
|
// below. Extension, and isolated apps require different privileges to be
|
|
// granted to their RenderProcessHosts. This classification allows us to make
|
|
// sure URLs are served by hosts with the right set of privileges.
|
|
enum class RenderProcessHostPrivilege {
|
|
kNormal,
|
|
kHosted,
|
|
kIsolated,
|
|
kExtension,
|
|
};
|
|
|
|
RenderProcessHostPrivilege GetPrivilegeRequiredByUrl(
|
|
const GURL& url,
|
|
extensions::ExtensionRegistry* registry) {
|
|
// Default to a normal renderer cause it is lower privileged. This should only
|
|
// occur if the URL on a site instance is either malformed, or uninitialized.
|
|
// If it is malformed, then there is no need for better privileges anyways.
|
|
// If it is uninitialized, but eventually settles on being an a scheme other
|
|
// than normal webrenderer, the navigation logic will correct us out of band
|
|
// anyways.
|
|
if (!url.is_valid())
|
|
return RenderProcessHostPrivilege::kNormal;
|
|
|
|
if (!url.SchemeIs(extensions::kExtensionScheme))
|
|
return RenderProcessHostPrivilege::kNormal;
|
|
|
|
return RenderProcessHostPrivilege::kExtension;
|
|
}
|
|
|
|
RenderProcessHostPrivilege GetProcessPrivilege(
|
|
content::RenderProcessHost* process_host,
|
|
extensions::ProcessMap* process_map,
|
|
extensions::ExtensionRegistry* registry) {
|
|
std::set<std::string> extension_ids =
|
|
process_map->GetExtensionsInProcess(process_host->GetID());
|
|
if (extension_ids.empty())
|
|
return RenderProcessHostPrivilege::kNormal;
|
|
|
|
return RenderProcessHostPrivilege::kExtension;
|
|
}
|
|
|
|
const extensions::Extension* GetEnabledExtensionFromEffectiveURL(
|
|
content::BrowserContext* context,
|
|
const GURL& effective_url) {
|
|
if (!effective_url.SchemeIs(extensions::kExtensionScheme))
|
|
return nullptr;
|
|
|
|
extensions::ExtensionRegistry* registry =
|
|
extensions::ExtensionRegistry::Get(context);
|
|
if (!registry)
|
|
return nullptr;
|
|
|
|
return registry->enabled_extensions().GetByID(effective_url.host());
|
|
}
|
|
#endif // BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
|
|
|
|
#if defined(OS_LINUX)
|
|
breakpad::CrashHandlerHostLinux* CreateCrashHandlerHost(
|
|
const std::string& process_type) {
|
|
base::FilePath dumps_path;
|
|
base::PathService::Get(electron::DIR_CRASH_DUMPS, &dumps_path);
|
|
{
|
|
ANNOTATE_SCOPED_MEMORY_LEAK;
|
|
bool upload = ElectronCrashReporterClient::Get()->GetCollectStatsConsent();
|
|
breakpad::CrashHandlerHostLinux* crash_handler =
|
|
new breakpad::CrashHandlerHostLinux(process_type, dumps_path, upload);
|
|
crash_handler->StartUploaderThread();
|
|
return crash_handler;
|
|
}
|
|
}
|
|
|
|
int GetCrashSignalFD(const base::CommandLine& command_line) {
|
|
// Extensions have the same process type as renderers.
|
|
if (command_line.HasSwitch(extensions::switches::kExtensionProcess)) {
|
|
static breakpad::CrashHandlerHostLinux* crash_handler = nullptr;
|
|
if (!crash_handler)
|
|
crash_handler = CreateCrashHandlerHost("extension");
|
|
return crash_handler->GetDeathSignalSocket();
|
|
}
|
|
|
|
std::string process_type =
|
|
command_line.GetSwitchValueASCII(::switches::kProcessType);
|
|
|
|
if (process_type == ::switches::kRendererProcess) {
|
|
static breakpad::CrashHandlerHostLinux* crash_handler = nullptr;
|
|
if (!crash_handler)
|
|
crash_handler = CreateCrashHandlerHost(process_type);
|
|
return crash_handler->GetDeathSignalSocket();
|
|
}
|
|
|
|
if (process_type == ::switches::kPpapiPluginProcess) {
|
|
static breakpad::CrashHandlerHostLinux* crash_handler = nullptr;
|
|
if (!crash_handler)
|
|
crash_handler = CreateCrashHandlerHost(process_type);
|
|
return crash_handler->GetDeathSignalSocket();
|
|
}
|
|
|
|
if (process_type == ::switches::kGpuProcess) {
|
|
static breakpad::CrashHandlerHostLinux* crash_handler = nullptr;
|
|
if (!crash_handler)
|
|
crash_handler = CreateCrashHandlerHost(process_type);
|
|
return crash_handler->GetDeathSignalSocket();
|
|
}
|
|
|
|
if (process_type == ::switches::kUtilityProcess) {
|
|
static breakpad::CrashHandlerHostLinux* crash_handler = nullptr;
|
|
if (!crash_handler)
|
|
crash_handler = CreateCrashHandlerHost(process_type);
|
|
return crash_handler->GetDeathSignalSocket();
|
|
}
|
|
|
|
return -1;
|
|
}
|
|
#endif // defined(OS_LINUX)
|
|
|
|
} // namespace
|
|
|
|
// static
|
|
void ElectronBrowserClient::SuppressRendererProcessRestartForOnce() {
|
|
g_suppress_renderer_process_restart = true;
|
|
}
|
|
|
|
ElectronBrowserClient* ElectronBrowserClient::Get() {
|
|
return g_browser_client;
|
|
}
|
|
|
|
// static
|
|
void ElectronBrowserClient::SetApplicationLocale(const std::string& locale) {
|
|
if (!BrowserThread::IsThreadInitialized(BrowserThread::IO) ||
|
|
!base::PostTask(
|
|
FROM_HERE, {BrowserThread::IO},
|
|
base::BindOnce(&SetApplicationLocaleOnIOThread, locale))) {
|
|
g_io_thread_application_locale.Get() = locale;
|
|
}
|
|
*g_application_locale = locale;
|
|
}
|
|
|
|
ElectronBrowserClient::ElectronBrowserClient() {
|
|
DCHECK(!g_browser_client);
|
|
g_browser_client = this;
|
|
}
|
|
|
|
ElectronBrowserClient::~ElectronBrowserClient() {
|
|
DCHECK(g_browser_client);
|
|
g_browser_client = nullptr;
|
|
}
|
|
|
|
content::WebContents* ElectronBrowserClient::GetWebContentsFromProcessID(
|
|
int process_id) {
|
|
// If the process is a pending process, we should use the web contents
|
|
// for the frame host passed into RegisterPendingProcess.
|
|
const auto iter = pending_processes_.find(process_id);
|
|
if (iter != std::end(pending_processes_))
|
|
return iter->second;
|
|
|
|
// Certain render process will be created with no associated render view,
|
|
// for example: ServiceWorker.
|
|
return WebContentsPreferences::GetWebContentsFromProcessID(process_id);
|
|
}
|
|
|
|
bool ElectronBrowserClient::ShouldForceNewSiteInstance(
|
|
content::RenderFrameHost* current_rfh,
|
|
content::RenderFrameHost* speculative_rfh,
|
|
content::BrowserContext* browser_context,
|
|
const GURL& url,
|
|
bool has_response_started) const {
|
|
if (url.SchemeIs(url::kJavaScriptScheme))
|
|
// "javascript:" scheme should always use same SiteInstance
|
|
return false;
|
|
if (url.SchemeIs(extensions::kExtensionScheme))
|
|
return false;
|
|
|
|
content::SiteInstance* current_instance = current_rfh->GetSiteInstance();
|
|
content::SiteInstance* speculative_instance =
|
|
speculative_rfh ? speculative_rfh->GetSiteInstance() : nullptr;
|
|
int process_id = current_instance->GetProcess()->GetID();
|
|
if (NavigationWasRedirectedCrossSite(browser_context, current_instance,
|
|
speculative_instance, url,
|
|
has_response_started)) {
|
|
// Navigation was redirected. We can't force the current, speculative or a
|
|
// new unrelated site instance to be used. Delegate to the content layer.
|
|
return false;
|
|
} else if (IsRendererSandboxed(process_id)) {
|
|
// Renderer is sandboxed, delegate the decision to the content layer for all
|
|
// origins.
|
|
return false;
|
|
} else if (!RendererUsesNativeWindowOpen(process_id)) {
|
|
// non-sandboxed renderers without native window.open should always create
|
|
// a new SiteInstance
|
|
return true;
|
|
} else {
|
|
auto* web_contents = content::WebContents::FromRenderFrameHost(current_rfh);
|
|
if (!ChildWebContentsTracker::FromWebContents(web_contents)) {
|
|
// Root WebContents should always create new process to make sure
|
|
// native addons are loaded correctly after reload / navigation.
|
|
// (Non-root WebContents opened by window.open() should try to
|
|
// reuse process to allow synchronous cross-window scripting.)
|
|
return true;
|
|
}
|
|
}
|
|
|
|
// Create new a SiteInstance if navigating to a different site.
|
|
return !IsSameWebSite(browser_context, current_instance, url);
|
|
}
|
|
|
|
bool ElectronBrowserClient::NavigationWasRedirectedCrossSite(
|
|
content::BrowserContext* browser_context,
|
|
content::SiteInstance* current_instance,
|
|
content::SiteInstance* speculative_instance,
|
|
const GURL& dest_url,
|
|
bool has_response_started) const {
|
|
bool navigation_was_redirected = false;
|
|
if (has_response_started) {
|
|
navigation_was_redirected =
|
|
!IsSameWebSite(browser_context, current_instance, dest_url);
|
|
} else {
|
|
navigation_was_redirected =
|
|
speculative_instance &&
|
|
!IsSameWebSite(browser_context, speculative_instance, dest_url);
|
|
}
|
|
|
|
return navigation_was_redirected;
|
|
}
|
|
|
|
void ElectronBrowserClient::AddProcessPreferences(
|
|
int process_id,
|
|
ElectronBrowserClient::ProcessPreferences prefs) {
|
|
process_preferences_[process_id] = prefs;
|
|
}
|
|
|
|
void ElectronBrowserClient::RemoveProcessPreferences(int process_id) {
|
|
process_preferences_.erase(process_id);
|
|
}
|
|
|
|
bool ElectronBrowserClient::IsProcessObserved(int process_id) const {
|
|
return process_preferences_.find(process_id) != process_preferences_.end();
|
|
}
|
|
|
|
bool ElectronBrowserClient::IsRendererSandboxed(int process_id) const {
|
|
auto it = process_preferences_.find(process_id);
|
|
return it != process_preferences_.end() && it->second.sandbox;
|
|
}
|
|
|
|
bool ElectronBrowserClient::RendererUsesNativeWindowOpen(int process_id) const {
|
|
auto it = process_preferences_.find(process_id);
|
|
return it != process_preferences_.end() && it->second.native_window_open;
|
|
}
|
|
|
|
bool ElectronBrowserClient::RendererDisablesPopups(int process_id) const {
|
|
auto it = process_preferences_.find(process_id);
|
|
return it != process_preferences_.end() && it->second.disable_popups;
|
|
}
|
|
|
|
std::string ElectronBrowserClient::GetAffinityPreference(
|
|
content::RenderFrameHost* rfh) const {
|
|
auto* web_contents = content::WebContents::FromRenderFrameHost(rfh);
|
|
auto* web_preferences = WebContentsPreferences::From(web_contents);
|
|
std::string affinity;
|
|
if (web_preferences &&
|
|
web_preferences->GetPreference("affinity", &affinity) &&
|
|
!affinity.empty()) {
|
|
affinity = base::ToLowerASCII(affinity);
|
|
}
|
|
|
|
return affinity;
|
|
}
|
|
|
|
content::SiteInstance* ElectronBrowserClient::GetSiteInstanceFromAffinity(
|
|
content::BrowserContext* browser_context,
|
|
const GURL& url,
|
|
content::RenderFrameHost* rfh) const {
|
|
std::string affinity = GetAffinityPreference(rfh);
|
|
if (!affinity.empty()) {
|
|
auto iter = site_per_affinities_.find(affinity);
|
|
GURL dest_site = GetSiteForURL(browser_context, url).site_url();
|
|
if (iter != site_per_affinities_.end() &&
|
|
IsSameWebSite(browser_context, iter->second, dest_site)) {
|
|
return iter->second;
|
|
}
|
|
}
|
|
|
|
return nullptr;
|
|
}
|
|
|
|
void ElectronBrowserClient::ConsiderSiteInstanceForAffinity(
|
|
content::RenderFrameHost* rfh,
|
|
content::SiteInstance* site_instance) {
|
|
std::string affinity = GetAffinityPreference(rfh);
|
|
if (!affinity.empty()) {
|
|
site_per_affinities_[affinity] = site_instance;
|
|
}
|
|
}
|
|
|
|
bool ElectronBrowserClient::IsRendererSubFrame(int process_id) const {
|
|
return base::Contains(renderer_is_subframe_, process_id);
|
|
}
|
|
|
|
void ElectronBrowserClient::RenderProcessWillLaunch(
|
|
content::RenderProcessHost* host) {
|
|
// When a render process is crashed, it might be reused.
|
|
int process_id = host->GetID();
|
|
if (IsProcessObserved(process_id))
|
|
return;
|
|
|
|
auto* browser_context = host->GetBrowserContext();
|
|
ALLOW_UNUSED_LOCAL(browser_context);
|
|
|
|
#if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
|
|
host->AddFilter(
|
|
new extensions::ExtensionMessageFilter(process_id, browser_context));
|
|
host->AddFilter(new extensions::ExtensionsGuestViewMessageFilter(
|
|
process_id, browser_context));
|
|
host->AddFilter(
|
|
new ElectronExtensionMessageFilter(process_id, browser_context));
|
|
#endif
|
|
|
|
ProcessPreferences prefs;
|
|
auto* web_preferences =
|
|
WebContentsPreferences::From(GetWebContentsFromProcessID(process_id));
|
|
if (web_preferences) {
|
|
prefs.sandbox = web_preferences->IsEnabled(options::kSandbox);
|
|
prefs.native_window_open =
|
|
web_preferences->IsEnabled(options::kNativeWindowOpen);
|
|
prefs.disable_popups = web_preferences->IsEnabled("disablePopups");
|
|
prefs.web_security = web_preferences->IsEnabled(options::kWebSecurity,
|
|
true /* default value */);
|
|
prefs.browser_context = host->GetBrowserContext();
|
|
}
|
|
|
|
AddProcessPreferences(host->GetID(), prefs);
|
|
// ensure the ProcessPreferences is removed later
|
|
host->AddObserver(this);
|
|
}
|
|
|
|
content::SpeechRecognitionManagerDelegate*
|
|
ElectronBrowserClient::CreateSpeechRecognitionManagerDelegate() {
|
|
return new ElectronSpeechRecognitionManagerDelegate;
|
|
}
|
|
|
|
content::TtsPlatform* ElectronBrowserClient::GetTtsPlatform() {
|
|
return nullptr;
|
|
}
|
|
|
|
void ElectronBrowserClient::OverrideWebkitPrefs(
|
|
content::WebContents* web_contents,
|
|
blink::web_pref::WebPreferences* prefs) {
|
|
prefs->javascript_enabled = true;
|
|
prefs->web_security_enabled = true;
|
|
prefs->plugins_enabled = true;
|
|
prefs->dom_paste_enabled = true;
|
|
prefs->allow_scripts_to_close_windows = true;
|
|
prefs->javascript_can_access_clipboard = true;
|
|
prefs->local_storage_enabled = true;
|
|
prefs->databases_enabled = true;
|
|
prefs->application_cache_enabled = true;
|
|
prefs->allow_universal_access_from_file_urls = true;
|
|
prefs->allow_file_access_from_file_urls = true;
|
|
prefs->webgl1_enabled = true;
|
|
prefs->webgl2_enabled = true;
|
|
prefs->allow_running_insecure_content = false;
|
|
prefs->default_minimum_page_scale_factor = 1.f;
|
|
prefs->default_maximum_page_scale_factor = 1.f;
|
|
prefs->navigate_on_drag_drop = false;
|
|
#if !BUILDFLAG(ENABLE_PICTURE_IN_PICTURE)
|
|
prefs->picture_in_picture_enabled = false;
|
|
#endif
|
|
|
|
ui::NativeTheme* native_theme = ui::NativeTheme::GetInstanceForNativeUi();
|
|
prefs->preferred_color_scheme =
|
|
native_theme->ShouldUseDarkColors()
|
|
? blink::mojom::PreferredColorScheme::kDark
|
|
: blink::mojom::PreferredColorScheme::kLight;
|
|
|
|
auto preloads =
|
|
SessionPreferences::GetValidPreloads(web_contents->GetBrowserContext());
|
|
if (!preloads.empty())
|
|
prefs->preloads = preloads;
|
|
if (CanUseCustomSiteInstance())
|
|
prefs->disable_electron_site_instance_overrides = true;
|
|
|
|
SetFontDefaults(prefs);
|
|
|
|
// Custom preferences of guest page.
|
|
auto* web_preferences = WebContentsPreferences::From(web_contents);
|
|
if (web_preferences) {
|
|
web_preferences->OverrideWebkitPrefs(prefs);
|
|
}
|
|
}
|
|
|
|
void ElectronBrowserClient::SetCanUseCustomSiteInstance(bool should_disable) {
|
|
disable_process_restart_tricks_ = should_disable;
|
|
}
|
|
|
|
bool ElectronBrowserClient::CanUseCustomSiteInstance() {
|
|
return disable_process_restart_tricks_;
|
|
}
|
|
|
|
content::ContentBrowserClient::SiteInstanceForNavigationType
|
|
ElectronBrowserClient::ShouldOverrideSiteInstanceForNavigation(
|
|
content::RenderFrameHost* current_rfh,
|
|
content::RenderFrameHost* speculative_rfh,
|
|
content::BrowserContext* browser_context,
|
|
const GURL& url,
|
|
bool has_navigation_started,
|
|
bool has_response_started,
|
|
content::SiteInstance** affinity_site_instance) const {
|
|
if (g_suppress_renderer_process_restart) {
|
|
g_suppress_renderer_process_restart = false;
|
|
return SiteInstanceForNavigationType::ASK_CHROMIUM;
|
|
}
|
|
|
|
// Do we have an affinity site to manage ?
|
|
content::SiteInstance* site_instance_from_affinity =
|
|
GetSiteInstanceFromAffinity(browser_context, url, current_rfh);
|
|
if (site_instance_from_affinity) {
|
|
*affinity_site_instance = site_instance_from_affinity;
|
|
return SiteInstanceForNavigationType::FORCE_AFFINITY;
|
|
}
|
|
|
|
if (!ShouldForceNewSiteInstance(current_rfh, speculative_rfh, browser_context,
|
|
url, has_response_started)) {
|
|
return SiteInstanceForNavigationType::ASK_CHROMIUM;
|
|
}
|
|
|
|
// ShouldOverrideSiteInstanceForNavigation will be called more than once
|
|
// during a navigation (currently twice, on request and when it's about
|
|
// to commit in the renderer), look at
|
|
// RenderFrameHostManager::GetFrameHostForNavigation.
|
|
// In the default mode we should reuse the same site instance until the
|
|
// request commits otherwise it will get destroyed. Currently there is no
|
|
// unique lifetime tracker for a navigation request during site instance
|
|
// creation. We check for the state of the request, which should be one of
|
|
// (WAITING_FOR_RENDERER_RESPONSE, STARTED, RESPONSE_STARTED, FAILED) along
|
|
// with the availability of a speculative render frame host.
|
|
if (has_response_started) {
|
|
return SiteInstanceForNavigationType::FORCE_CURRENT;
|
|
}
|
|
|
|
if (!has_navigation_started) {
|
|
// If the navigation didn't start yet, ignore any candidate site instance.
|
|
// If such instance exists, it belongs to a previous navigation still
|
|
// taking place. Fixes https://github.com/electron/electron/issues/17576.
|
|
return SiteInstanceForNavigationType::FORCE_NEW;
|
|
}
|
|
|
|
return SiteInstanceForNavigationType::FORCE_CANDIDATE_OR_NEW;
|
|
}
|
|
|
|
void ElectronBrowserClient::RegisterPendingSiteInstance(
|
|
content::RenderFrameHost* rfh,
|
|
content::SiteInstance* pending_site_instance) {
|
|
// Do we have an affinity site to manage?
|
|
ConsiderSiteInstanceForAffinity(rfh, pending_site_instance);
|
|
|
|
// Remember the original web contents for the pending renderer process.
|
|
auto* web_contents = content::WebContents::FromRenderFrameHost(rfh);
|
|
auto* pending_process = pending_site_instance->GetProcess();
|
|
pending_processes_[pending_process->GetID()] = web_contents;
|
|
|
|
if (rfh->GetParent())
|
|
renderer_is_subframe_.insert(pending_process->GetID());
|
|
else
|
|
renderer_is_subframe_.erase(pending_process->GetID());
|
|
}
|
|
|
|
void ElectronBrowserClient::AppendExtraCommandLineSwitches(
|
|
base::CommandLine* command_line,
|
|
int process_id) {
|
|
// Make sure we're about to launch a known executable
|
|
{
|
|
base::ThreadRestrictions::ScopedAllowIO allow_io;
|
|
base::FilePath child_path;
|
|
base::FilePath program =
|
|
base::MakeAbsoluteFilePath(command_line->GetProgram());
|
|
#if defined(OS_MAC)
|
|
auto renderer_child_path = content::ChildProcessHost::GetChildPath(
|
|
content::ChildProcessHost::CHILD_RENDERER);
|
|
auto gpu_child_path = content::ChildProcessHost::GetChildPath(
|
|
content::ChildProcessHost::CHILD_GPU);
|
|
#if BUILDFLAG(ENABLE_PLUGINS)
|
|
auto plugin_child_path = content::ChildProcessHost::GetChildPath(
|
|
content::ChildProcessHost::CHILD_PLUGIN);
|
|
#endif
|
|
if (program != renderer_child_path && program != gpu_child_path
|
|
#if BUILDFLAG(ENABLE_PLUGINS)
|
|
&& program != plugin_child_path
|
|
#endif
|
|
) {
|
|
child_path = content::ChildProcessHost::GetChildPath(
|
|
content::ChildProcessHost::CHILD_NORMAL);
|
|
CHECK_EQ(program, child_path)
|
|
<< "Aborted from launching unexpected helper executable";
|
|
}
|
|
#else
|
|
if (!base::PathService::Get(content::CHILD_PROCESS_EXE, &child_path)) {
|
|
CHECK(false) << "Unable to get child process binary name.";
|
|
}
|
|
SCOPED_CRASH_KEY_STRING256("ChildProcess", "child_process_exe",
|
|
child_path.AsUTF8Unsafe());
|
|
SCOPED_CRASH_KEY_STRING256("ChildProcess", "program",
|
|
program.AsUTF8Unsafe());
|
|
CHECK_EQ(program, child_path);
|
|
#endif
|
|
}
|
|
|
|
std::string process_type =
|
|
command_line->GetSwitchValueASCII(::switches::kProcessType);
|
|
|
|
#if defined(OS_LINUX)
|
|
bool enable_crash_reporter = false;
|
|
enable_crash_reporter = breakpad::IsCrashReporterEnabled();
|
|
if (enable_crash_reporter) {
|
|
std::string switch_value =
|
|
api::crash_reporter::GetClientId() + ",no_channel";
|
|
command_line->AppendSwitchASCII(::switches::kEnableCrashReporter,
|
|
switch_value);
|
|
for (const auto& pair : api::crash_reporter::GetGlobalCrashKeys()) {
|
|
if (!switch_value.empty())
|
|
switch_value += ",";
|
|
switch_value += pair.first;
|
|
switch_value += "=";
|
|
switch_value += pair.second;
|
|
}
|
|
command_line->AppendSwitchASCII(switches::kGlobalCrashKeys, switch_value);
|
|
}
|
|
#endif
|
|
|
|
if (process_type == ::switches::kUtilityProcess ||
|
|
process_type == ::switches::kRendererProcess) {
|
|
// Copy following switches to child process.
|
|
static const char* const kCommonSwitchNames[] = {
|
|
switches::kStandardSchemes, switches::kEnableSandbox,
|
|
switches::kSecureSchemes, switches::kBypassCSPSchemes,
|
|
switches::kCORSSchemes, switches::kFetchSchemes,
|
|
switches::kServiceWorkerSchemes, switches::kEnableApiFilteringLogging,
|
|
switches::kStreamingSchemes};
|
|
command_line->CopySwitchesFrom(*base::CommandLine::ForCurrentProcess(),
|
|
kCommonSwitchNames,
|
|
base::size(kCommonSwitchNames));
|
|
}
|
|
|
|
if (process_type == ::switches::kRendererProcess) {
|
|
#if defined(OS_WIN)
|
|
// Append --app-user-model-id.
|
|
PWSTR current_app_id;
|
|
if (SUCCEEDED(GetCurrentProcessExplicitAppUserModelID(¤t_app_id))) {
|
|
command_line->AppendSwitchNative(switches::kAppUserModelId,
|
|
current_app_id);
|
|
CoTaskMemFree(current_app_id);
|
|
}
|
|
#endif
|
|
|
|
if (delegate_) {
|
|
auto app_path = static_cast<api::App*>(delegate_)->GetAppPath();
|
|
command_line->AppendSwitchPath(switches::kAppPath, app_path);
|
|
}
|
|
|
|
std::unique_ptr<base::Environment> env(base::Environment::Create());
|
|
if (env->HasVar("ELECTRON_PROFILE_INIT_SCRIPTS")) {
|
|
command_line->AppendSwitch("profile-electron-init");
|
|
}
|
|
|
|
// Extension background pages don't have WebContentsPreferences, but they
|
|
// support WebSQL by default.
|
|
#if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
|
|
content::RenderProcessHost* process =
|
|
content::RenderProcessHost::FromID(process_id);
|
|
if (extensions::ProcessMap::Get(process->GetBrowserContext())
|
|
->Contains(process_id))
|
|
command_line->AppendSwitch(switches::kEnableWebSQL);
|
|
#endif
|
|
|
|
content::WebContents* web_contents =
|
|
GetWebContentsFromProcessID(process_id);
|
|
if (web_contents) {
|
|
auto* web_preferences = WebContentsPreferences::From(web_contents);
|
|
if (web_preferences)
|
|
web_preferences->AppendCommandLineSwitches(
|
|
command_line, IsRendererSubFrame(process_id));
|
|
}
|
|
}
|
|
}
|
|
|
|
void ElectronBrowserClient::DidCreatePpapiPlugin(
|
|
content::BrowserPpapiHost* host) {}
|
|
|
|
// attempt to get api key from env
|
|
std::string ElectronBrowserClient::GetGeolocationApiKey() {
|
|
std::unique_ptr<base::Environment> env(base::Environment::Create());
|
|
std::string api_key;
|
|
env->GetVar("GOOGLE_API_KEY", &api_key);
|
|
return api_key;
|
|
}
|
|
|
|
scoped_refptr<content::QuotaPermissionContext>
|
|
ElectronBrowserClient::CreateQuotaPermissionContext() {
|
|
return new ElectronQuotaPermissionContext;
|
|
}
|
|
|
|
content::GeneratedCodeCacheSettings
|
|
ElectronBrowserClient::GetGeneratedCodeCacheSettings(
|
|
content::BrowserContext* context) {
|
|
// TODO(deepak1556): Use platform cache directory.
|
|
base::FilePath cache_path = context->GetPath();
|
|
// If we pass 0 for size, disk_cache will pick a default size using the
|
|
// heuristics based on available disk size. These are implemented in
|
|
// disk_cache::PreferredCacheSize in net/disk_cache/cache_util.cc.
|
|
return content::GeneratedCodeCacheSettings(true, 0, cache_path);
|
|
}
|
|
|
|
void ElectronBrowserClient::AllowCertificateError(
|
|
content::WebContents* web_contents,
|
|
int cert_error,
|
|
const net::SSLInfo& ssl_info,
|
|
const GURL& request_url,
|
|
bool is_main_frame_request,
|
|
bool strict_enforcement,
|
|
base::OnceCallback<void(content::CertificateRequestResultType)> callback) {
|
|
if (delegate_) {
|
|
delegate_->AllowCertificateError(web_contents, cert_error, ssl_info,
|
|
request_url, is_main_frame_request,
|
|
strict_enforcement, std::move(callback));
|
|
}
|
|
}
|
|
|
|
base::OnceClosure ElectronBrowserClient::SelectClientCertificate(
|
|
content::WebContents* web_contents,
|
|
net::SSLCertRequestInfo* cert_request_info,
|
|
net::ClientCertIdentityList client_certs,
|
|
std::unique_ptr<content::ClientCertificateDelegate> delegate) {
|
|
if (!client_certs.empty() && delegate_) {
|
|
delegate_->SelectClientCertificate(web_contents, cert_request_info,
|
|
std::move(client_certs),
|
|
std::move(delegate));
|
|
}
|
|
return base::OnceClosure();
|
|
}
|
|
|
|
bool ElectronBrowserClient::CanCreateWindow(
|
|
content::RenderFrameHost* opener,
|
|
const GURL& opener_url,
|
|
const GURL& opener_top_level_frame_url,
|
|
const url::Origin& source_origin,
|
|
content::mojom::WindowContainerType container_type,
|
|
const GURL& target_url,
|
|
const content::Referrer& referrer,
|
|
const std::string& frame_name,
|
|
WindowOpenDisposition disposition,
|
|
const blink::mojom::WindowFeatures& features,
|
|
const std::string& raw_features,
|
|
const scoped_refptr<network::ResourceRequestBody>& body,
|
|
bool user_gesture,
|
|
bool opener_suppressed,
|
|
bool* no_javascript_access) {
|
|
DCHECK_CURRENTLY_ON(BrowserThread::UI);
|
|
|
|
int opener_render_process_id = opener->GetProcess()->GetID();
|
|
|
|
if (RendererUsesNativeWindowOpen(opener_render_process_id)) {
|
|
if (RendererDisablesPopups(opener_render_process_id)) {
|
|
// <webview> without allowpopups attribute should return
|
|
// null from window.open calls
|
|
return false;
|
|
} else {
|
|
*no_javascript_access = false;
|
|
return true;
|
|
}
|
|
}
|
|
|
|
if (delegate_) {
|
|
return delegate_->CanCreateWindow(
|
|
opener, opener_url, opener_top_level_frame_url, source_origin,
|
|
container_type, target_url, referrer, frame_name, disposition, features,
|
|
raw_features, body, user_gesture, opener_suppressed,
|
|
no_javascript_access);
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
#if BUILDFLAG(ENABLE_PICTURE_IN_PICTURE)
|
|
std::unique_ptr<content::OverlayWindow>
|
|
ElectronBrowserClient::CreateWindowForPictureInPicture(
|
|
content::PictureInPictureWindowController* controller) {
|
|
auto overlay_window = content::OverlayWindow::Create(controller);
|
|
#if defined(OS_WIN)
|
|
std::wstring app_user_model_id = Browser::Get()->GetAppUserModelID();
|
|
if (!app_user_model_id.empty()) {
|
|
auto* overlay_window_view =
|
|
static_cast<OverlayWindowViews*>(overlay_window.get());
|
|
ui::win::SetAppIdForWindow(app_user_model_id,
|
|
overlay_window_view->GetNativeWindow()
|
|
->GetHost()
|
|
->GetAcceleratedWidget());
|
|
}
|
|
#endif
|
|
return overlay_window;
|
|
}
|
|
#endif
|
|
|
|
void ElectronBrowserClient::GetAdditionalAllowedSchemesForFileSystem(
|
|
std::vector<std::string>* additional_schemes) {
|
|
auto schemes_list = api::GetStandardSchemes();
|
|
if (!schemes_list.empty())
|
|
additional_schemes->insert(additional_schemes->end(), schemes_list.begin(),
|
|
schemes_list.end());
|
|
additional_schemes->push_back(content::kChromeDevToolsScheme);
|
|
additional_schemes->push_back(content::kChromeUIScheme);
|
|
}
|
|
|
|
void ElectronBrowserClient::GetAdditionalWebUISchemes(
|
|
std::vector<std::string>* additional_schemes) {
|
|
additional_schemes->push_back(content::kChromeDevToolsScheme);
|
|
}
|
|
|
|
void ElectronBrowserClient::SiteInstanceGotProcess(
|
|
content::SiteInstance* site_instance) {
|
|
#if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
|
|
auto* browser_context =
|
|
static_cast<ElectronBrowserContext*>(site_instance->GetBrowserContext());
|
|
if (!browser_context->IsOffTheRecord()) {
|
|
extensions::ExtensionRegistry* registry =
|
|
extensions::ExtensionRegistry::Get(browser_context);
|
|
const extensions::Extension* extension =
|
|
registry->enabled_extensions().GetExtensionOrAppByURL(
|
|
site_instance->GetSiteURL());
|
|
if (!extension)
|
|
return;
|
|
|
|
extensions::ProcessMap::Get(browser_context)
|
|
->Insert(extension->id(), site_instance->GetProcess()->GetID(),
|
|
site_instance->GetId());
|
|
}
|
|
#endif // BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
|
|
}
|
|
|
|
bool ElectronBrowserClient::IsSuitableHost(
|
|
content::RenderProcessHost* process_host,
|
|
const GURL& site_url) {
|
|
#if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
|
|
auto* browser_context = process_host->GetBrowserContext();
|
|
extensions::ExtensionRegistry* registry =
|
|
extensions::ExtensionRegistry::Get(browser_context);
|
|
extensions::ProcessMap* process_map =
|
|
extensions::ProcessMap::Get(browser_context);
|
|
|
|
// Otherwise, just make sure the process privilege matches the privilege
|
|
// required by the site.
|
|
RenderProcessHostPrivilege privilege_required =
|
|
GetPrivilegeRequiredByUrl(site_url, registry);
|
|
return GetProcessPrivilege(process_host, process_map, registry) ==
|
|
privilege_required;
|
|
#else
|
|
return content::ContentBrowserClient::IsSuitableHost(process_host, site_url);
|
|
#endif
|
|
}
|
|
|
|
bool ElectronBrowserClient::ShouldUseProcessPerSite(
|
|
content::BrowserContext* browser_context,
|
|
const GURL& effective_url) {
|
|
#if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
|
|
const extensions::Extension* extension =
|
|
GetEnabledExtensionFromEffectiveURL(browser_context, effective_url);
|
|
return extension != nullptr;
|
|
#else
|
|
return content::ContentBrowserClient::ShouldUseProcessPerSite(browser_context,
|
|
effective_url);
|
|
#endif
|
|
}
|
|
|
|
bool ElectronBrowserClient::ArePersistentMediaDeviceIDsAllowed(
|
|
content::BrowserContext* browser_context,
|
|
const GURL& scope,
|
|
const GURL& site_for_cookies,
|
|
const base::Optional<url::Origin>& top_frame_origin) {
|
|
return true;
|
|
}
|
|
|
|
void ElectronBrowserClient::SiteInstanceDeleting(
|
|
content::SiteInstance* site_instance) {
|
|
// We are storing weak_ptr, is it fundamental to maintain the map up-to-date
|
|
// when an instance is destroyed.
|
|
for (auto iter = site_per_affinities_.begin();
|
|
iter != site_per_affinities_.end(); ++iter) {
|
|
if (iter->second == site_instance) {
|
|
site_per_affinities_.erase(iter);
|
|
break;
|
|
}
|
|
}
|
|
|
|
#if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
|
|
// Don't do anything if we're shutting down.
|
|
if (content::BrowserMainRunner::ExitedMainMessageLoop())
|
|
return;
|
|
|
|
auto* browser_context =
|
|
static_cast<ElectronBrowserContext*>(site_instance->GetBrowserContext());
|
|
if (!browser_context->IsOffTheRecord()) {
|
|
// If this isn't an extension renderer there's nothing to do.
|
|
extensions::ExtensionRegistry* registry =
|
|
extensions::ExtensionRegistry::Get(browser_context);
|
|
const extensions::Extension* extension =
|
|
registry->enabled_extensions().GetExtensionOrAppByURL(
|
|
site_instance->GetSiteURL());
|
|
if (!extension)
|
|
return;
|
|
|
|
extensions::ProcessMap::Get(browser_context)
|
|
->Remove(extension->id(), site_instance->GetProcess()->GetID(),
|
|
site_instance->GetId());
|
|
}
|
|
#endif
|
|
}
|
|
|
|
std::unique_ptr<net::ClientCertStore>
|
|
ElectronBrowserClient::CreateClientCertStore(
|
|
content::BrowserContext* browser_context) {
|
|
#if defined(USE_NSS_CERTS)
|
|
return std::make_unique<net::ClientCertStoreNSS>(
|
|
net::ClientCertStoreNSS::PasswordDelegateFactory());
|
|
#elif defined(OS_WIN)
|
|
return std::make_unique<net::ClientCertStoreWin>();
|
|
#elif defined(OS_MAC)
|
|
return std::make_unique<net::ClientCertStoreMac>();
|
|
#elif defined(USE_OPENSSL)
|
|
return std::unique_ptr<net::ClientCertStore>();
|
|
#endif
|
|
}
|
|
|
|
std::unique_ptr<device::LocationProvider>
|
|
ElectronBrowserClient::OverrideSystemLocationProvider() {
|
|
#if BUILDFLAG(OVERRIDE_LOCATION_PROVIDER)
|
|
return std::make_unique<FakeLocationProvider>();
|
|
#else
|
|
return nullptr;
|
|
#endif
|
|
}
|
|
|
|
void ElectronBrowserClient::ConfigureNetworkContextParams(
|
|
content::BrowserContext* browser_context,
|
|
bool in_memory,
|
|
const base::FilePath& relative_partition_path,
|
|
network::mojom::NetworkContextParams* network_context_params,
|
|
cert_verifier::mojom::CertVerifierCreationParams*
|
|
cert_verifier_creation_params) {
|
|
DCHECK(browser_context);
|
|
return NetworkContextServiceFactory::GetForContext(browser_context)
|
|
->ConfigureNetworkContextParams(network_context_params,
|
|
cert_verifier_creation_params);
|
|
}
|
|
|
|
network::mojom::NetworkContext*
|
|
ElectronBrowserClient::GetSystemNetworkContext() {
|
|
DCHECK_CURRENTLY_ON(BrowserThread::UI);
|
|
DCHECK(g_browser_process->system_network_context_manager());
|
|
return g_browser_process->system_network_context_manager()->GetContext();
|
|
}
|
|
|
|
std::unique_ptr<content::BrowserMainParts>
|
|
ElectronBrowserClient::CreateBrowserMainParts(
|
|
const content::MainFunctionParams& params) {
|
|
return std::make_unique<ElectronBrowserMainParts>(params);
|
|
}
|
|
|
|
void ElectronBrowserClient::WebNotificationAllowed(
|
|
int render_process_id,
|
|
base::OnceCallback<void(bool, bool)> callback) {
|
|
content::WebContents* web_contents =
|
|
WebContentsPreferences::GetWebContentsFromProcessID(render_process_id);
|
|
if (!web_contents) {
|
|
std::move(callback).Run(false, false);
|
|
return;
|
|
}
|
|
auto* permission_helper =
|
|
WebContentsPermissionHelper::FromWebContents(web_contents);
|
|
if (!permission_helper) {
|
|
std::move(callback).Run(false, false);
|
|
return;
|
|
}
|
|
permission_helper->RequestWebNotificationPermission(
|
|
base::BindOnce(std::move(callback), web_contents->IsAudioMuted()));
|
|
}
|
|
|
|
void ElectronBrowserClient::RenderProcessHostDestroyed(
|
|
content::RenderProcessHost* host) {
|
|
int process_id = host->GetID();
|
|
pending_processes_.erase(process_id);
|
|
renderer_is_subframe_.erase(process_id);
|
|
RemoveProcessPreferences(process_id);
|
|
host->RemoveObserver(this);
|
|
}
|
|
|
|
void ElectronBrowserClient::RenderProcessReady(
|
|
content::RenderProcessHost* host) {
|
|
if (delegate_) {
|
|
static_cast<api::App*>(delegate_)->RenderProcessReady(host);
|
|
}
|
|
}
|
|
|
|
void ElectronBrowserClient::RenderProcessExited(
|
|
content::RenderProcessHost* host,
|
|
const content::ChildProcessTerminationInfo& info) {
|
|
if (delegate_) {
|
|
static_cast<api::App*>(delegate_)->RenderProcessExited(host);
|
|
}
|
|
}
|
|
|
|
void OnOpenExternal(const GURL& escaped_url, bool allowed) {
|
|
if (allowed) {
|
|
platform_util::OpenExternal(
|
|
escaped_url, platform_util::OpenExternalOptions(), base::DoNothing());
|
|
}
|
|
}
|
|
|
|
void HandleExternalProtocolInUI(
|
|
const GURL& url,
|
|
content::WebContents::OnceGetter web_contents_getter,
|
|
bool has_user_gesture) {
|
|
content::WebContents* web_contents = std::move(web_contents_getter).Run();
|
|
if (!web_contents)
|
|
return;
|
|
|
|
auto* permission_helper =
|
|
WebContentsPermissionHelper::FromWebContents(web_contents);
|
|
if (!permission_helper)
|
|
return;
|
|
|
|
GURL escaped_url(net::EscapeExternalHandlerValue(url.spec()));
|
|
auto callback = base::BindOnce(&OnOpenExternal, escaped_url);
|
|
permission_helper->RequestOpenExternalPermission(std::move(callback),
|
|
has_user_gesture, url);
|
|
}
|
|
|
|
bool ElectronBrowserClient::HandleExternalProtocol(
|
|
const GURL& url,
|
|
content::WebContents::OnceGetter web_contents_getter,
|
|
int child_id,
|
|
int frame_tree_node_id,
|
|
content::NavigationUIData* navigation_data,
|
|
bool is_main_frame,
|
|
ui::PageTransition page_transition,
|
|
bool has_user_gesture,
|
|
const base::Optional<url::Origin>& initiating_origin,
|
|
mojo::PendingRemote<network::mojom::URLLoaderFactory>* out_factory) {
|
|
base::PostTask(
|
|
FROM_HERE, {BrowserThread::UI},
|
|
base::BindOnce(&HandleExternalProtocolInUI, url,
|
|
std::move(web_contents_getter), has_user_gesture));
|
|
return true;
|
|
}
|
|
|
|
std::vector<std::unique_ptr<content::NavigationThrottle>>
|
|
ElectronBrowserClient::CreateThrottlesForNavigation(
|
|
content::NavigationHandle* handle) {
|
|
std::vector<std::unique_ptr<content::NavigationThrottle>> throttles;
|
|
throttles.push_back(std::make_unique<ElectronNavigationThrottle>(handle));
|
|
|
|
#if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
|
|
throttles.push_back(
|
|
std::make_unique<extensions::ExtensionNavigationThrottle>(handle));
|
|
#endif
|
|
|
|
return throttles;
|
|
}
|
|
|
|
content::MediaObserver* ElectronBrowserClient::GetMediaObserver() {
|
|
return MediaCaptureDevicesDispatcher::GetInstance();
|
|
}
|
|
|
|
std::unique_ptr<content::DevToolsManagerDelegate>
|
|
ElectronBrowserClient::CreateDevToolsManagerDelegate() {
|
|
return std::make_unique<DevToolsManagerDelegate>();
|
|
}
|
|
|
|
NotificationPresenter* ElectronBrowserClient::GetNotificationPresenter() {
|
|
if (!notification_presenter_) {
|
|
notification_presenter_.reset(NotificationPresenter::Create());
|
|
}
|
|
return notification_presenter_.get();
|
|
}
|
|
|
|
content::PlatformNotificationService*
|
|
ElectronBrowserClient::GetPlatformNotificationService(
|
|
content::BrowserContext* browser_context) {
|
|
if (!notification_service_) {
|
|
notification_service_ = std::make_unique<PlatformNotificationService>(this);
|
|
}
|
|
return notification_service_.get();
|
|
}
|
|
|
|
base::FilePath ElectronBrowserClient::GetDefaultDownloadDirectory() {
|
|
// ~/Downloads
|
|
base::FilePath path;
|
|
if (base::PathService::Get(base::DIR_HOME, &path))
|
|
path = path.Append(FILE_PATH_LITERAL("Downloads"));
|
|
|
|
return path;
|
|
}
|
|
|
|
scoped_refptr<network::SharedURLLoaderFactory>
|
|
ElectronBrowserClient::GetSystemSharedURLLoaderFactory() {
|
|
if (!g_browser_process)
|
|
return nullptr;
|
|
return g_browser_process->shared_url_loader_factory();
|
|
}
|
|
|
|
void ElectronBrowserClient::OnNetworkServiceCreated(
|
|
network::mojom::NetworkService* network_service) {
|
|
if (!g_browser_process)
|
|
return;
|
|
|
|
g_browser_process->system_network_context_manager()->OnNetworkServiceCreated(
|
|
network_service);
|
|
}
|
|
|
|
std::vector<base::FilePath>
|
|
ElectronBrowserClient::GetNetworkContextsParentDirectory() {
|
|
base::FilePath user_data_dir;
|
|
base::PathService::Get(DIR_USER_DATA, &user_data_dir);
|
|
DCHECK(!user_data_dir.empty());
|
|
|
|
return {user_data_dir};
|
|
}
|
|
|
|
std::string ElectronBrowserClient::GetProduct() {
|
|
return "Chrome/" CHROME_VERSION_STRING;
|
|
}
|
|
|
|
std::string ElectronBrowserClient::GetUserAgent() {
|
|
if (user_agent_override_.empty())
|
|
return GetApplicationUserAgent();
|
|
return user_agent_override_;
|
|
}
|
|
|
|
void ElectronBrowserClient::SetUserAgent(const std::string& user_agent) {
|
|
user_agent_override_ = user_agent;
|
|
}
|
|
|
|
void ElectronBrowserClient::RegisterNonNetworkNavigationURLLoaderFactories(
|
|
int frame_tree_node_id,
|
|
ukm::SourceIdObj ukm_source_id,
|
|
NonNetworkURLLoaderFactoryMap* factories) {
|
|
content::WebContents* web_contents =
|
|
content::WebContents::FromFrameTreeNodeId(frame_tree_node_id);
|
|
content::BrowserContext* context = web_contents->GetBrowserContext();
|
|
#if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
|
|
factories->emplace(
|
|
extensions::kExtensionScheme,
|
|
extensions::CreateExtensionNavigationURLLoaderFactory(
|
|
context, ukm_source_id,
|
|
false /* we don't support extensions::WebViewGuest */));
|
|
#endif
|
|
// Always allow navigating to file:// URLs.
|
|
auto* protocol_registry = ProtocolRegistry::FromBrowserContext(context);
|
|
protocol_registry->RegisterURLLoaderFactories(factories,
|
|
true /* allow_file_access */);
|
|
}
|
|
|
|
void ElectronBrowserClient::
|
|
RegisterNonNetworkWorkerMainResourceURLLoaderFactories(
|
|
content::BrowserContext* browser_context,
|
|
NonNetworkURLLoaderFactoryMap* factories) {
|
|
auto* protocol_registry =
|
|
ProtocolRegistry::FromBrowserContext(browser_context);
|
|
// Workers are not allowed to request file:// URLs, there is no particular
|
|
// reason for it, and we could consider supporting it in future.
|
|
protocol_registry->RegisterURLLoaderFactories(factories,
|
|
false /* allow_file_access */);
|
|
}
|
|
|
|
#if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
|
|
namespace {
|
|
|
|
// The FileURLLoaderFactory provided to the extension background pages.
|
|
// Checks with the ChildProcessSecurityPolicy to validate the file access.
|
|
class FileURLLoaderFactory : public network::SelfDeletingURLLoaderFactory {
|
|
public:
|
|
static mojo::PendingRemote<network::mojom::URLLoaderFactory> Create(
|
|
int child_id) {
|
|
mojo::PendingRemote<network::mojom::URLLoaderFactory> pending_remote;
|
|
|
|
// The FileURLLoaderFactory will delete itself when there are no more
|
|
// receivers - see the NonNetworkURLLoaderFactoryBase::OnDisconnect method.
|
|
new FileURLLoaderFactory(child_id,
|
|
pending_remote.InitWithNewPipeAndPassReceiver());
|
|
|
|
return pending_remote;
|
|
}
|
|
|
|
private:
|
|
explicit FileURLLoaderFactory(
|
|
int child_id,
|
|
mojo::PendingReceiver<network::mojom::URLLoaderFactory> factory_receiver)
|
|
: network::SelfDeletingURLLoaderFactory(std::move(factory_receiver)),
|
|
child_id_(child_id) {}
|
|
~FileURLLoaderFactory() override = default;
|
|
|
|
// network::mojom::URLLoaderFactory:
|
|
void CreateLoaderAndStart(
|
|
mojo::PendingReceiver<network::mojom::URLLoader> loader,
|
|
int32_t request_id,
|
|
uint32_t options,
|
|
const network::ResourceRequest& request,
|
|
mojo::PendingRemote<network::mojom::URLLoaderClient> client,
|
|
const net::MutableNetworkTrafficAnnotationTag& traffic_annotation)
|
|
override {
|
|
if (!content::ChildProcessSecurityPolicy::GetInstance()->CanRequestURL(
|
|
child_id_, request.url)) {
|
|
mojo::Remote<network::mojom::URLLoaderClient>(std::move(client))
|
|
->OnComplete(
|
|
network::URLLoaderCompletionStatus(net::ERR_ACCESS_DENIED));
|
|
return;
|
|
}
|
|
content::CreateFileURLLoaderBypassingSecurityChecks(
|
|
request, std::move(loader), std::move(client),
|
|
/*observer=*/nullptr,
|
|
/* allow_directory_listing */ true);
|
|
}
|
|
|
|
int child_id_;
|
|
|
|
DISALLOW_COPY_AND_ASSIGN(FileURLLoaderFactory);
|
|
};
|
|
|
|
} // namespace
|
|
#endif // BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
|
|
|
|
void ElectronBrowserClient::RegisterNonNetworkSubresourceURLLoaderFactories(
|
|
int render_process_id,
|
|
int render_frame_id,
|
|
NonNetworkURLLoaderFactoryMap* factories) {
|
|
auto* render_process_host =
|
|
content::RenderProcessHost::FromID(render_process_id);
|
|
DCHECK(render_process_host);
|
|
if (!render_process_host || !render_process_host->GetBrowserContext())
|
|
return;
|
|
|
|
content::RenderFrameHost* frame_host =
|
|
content::RenderFrameHost::FromID(render_process_id, render_frame_id);
|
|
content::WebContents* web_contents =
|
|
content::WebContents::FromRenderFrameHost(frame_host);
|
|
|
|
// Allow accessing file:// subresources from non-file protocols if web
|
|
// security is disabled.
|
|
bool allow_file_access = false;
|
|
if (web_contents) {
|
|
const auto& web_preferences = web_contents->GetOrCreateWebPreferences();
|
|
if (!web_preferences.web_security_enabled)
|
|
allow_file_access = true;
|
|
}
|
|
|
|
ProtocolRegistry::FromBrowserContext(render_process_host->GetBrowserContext())
|
|
->RegisterURLLoaderFactories(factories, allow_file_access);
|
|
|
|
#if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
|
|
auto factory = extensions::CreateExtensionURLLoaderFactory(render_process_id,
|
|
render_frame_id);
|
|
if (factory)
|
|
factories->emplace(extensions::kExtensionScheme, std::move(factory));
|
|
|
|
if (!web_contents)
|
|
return;
|
|
|
|
extensions::ElectronExtensionWebContentsObserver* web_observer =
|
|
extensions::ElectronExtensionWebContentsObserver::FromWebContents(
|
|
web_contents);
|
|
|
|
// There is nothing to do if no ElectronExtensionWebContentsObserver is
|
|
// attached to the |web_contents|.
|
|
if (!web_observer)
|
|
return;
|
|
|
|
const extensions::Extension* extension =
|
|
web_observer->GetExtensionFromFrame(frame_host, false);
|
|
if (!extension)
|
|
return;
|
|
|
|
// Support for chrome:// scheme if appropriate.
|
|
if (extension->is_extension() &&
|
|
extensions::Manifest::IsComponentLocation(extension->location())) {
|
|
// Components of chrome that are implemented as extensions or platform apps
|
|
// are allowed to use chrome://resources/ and chrome://theme/ URLs.
|
|
factories->emplace(content::kChromeUIScheme,
|
|
content::CreateWebUIURLLoaderFactory(
|
|
frame_host, content::kChromeUIScheme,
|
|
{content::kChromeUIResourcesHost}));
|
|
}
|
|
|
|
// Extension with a background page get file access that gets approval from
|
|
// ChildProcessSecurityPolicy.
|
|
extensions::ExtensionHost* host =
|
|
extensions::ProcessManager::Get(web_contents->GetBrowserContext())
|
|
->GetBackgroundHostForExtension(extension->id());
|
|
if (host) {
|
|
factories->emplace(url::kFileScheme,
|
|
FileURLLoaderFactory::Create(render_process_id));
|
|
}
|
|
#endif
|
|
}
|
|
|
|
bool ElectronBrowserClient::ShouldTreatURLSchemeAsFirstPartyWhenTopLevel(
|
|
base::StringPiece scheme,
|
|
bool is_embedded_origin_secure) {
|
|
if (is_embedded_origin_secure && scheme == content::kChromeUIScheme)
|
|
return true;
|
|
#if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
|
|
return scheme == extensions::kExtensionScheme;
|
|
#else
|
|
return false;
|
|
#endif
|
|
}
|
|
|
|
bool ElectronBrowserClient::WillInterceptWebSocket(
|
|
content::RenderFrameHost* frame) {
|
|
if (!frame)
|
|
return false;
|
|
|
|
v8::Isolate* isolate = JavascriptEnvironment::GetIsolate();
|
|
v8::HandleScope scope(isolate);
|
|
auto* browser_context = frame->GetProcess()->GetBrowserContext();
|
|
auto web_request = api::WebRequest::FromOrCreate(isolate, browser_context);
|
|
|
|
// NOTE: Some unit test environments do not initialize
|
|
// BrowserContextKeyedAPI factories for e.g. WebRequest.
|
|
if (!web_request.get())
|
|
return false;
|
|
|
|
bool has_listener = web_request->HasListener();
|
|
#if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
|
|
const auto* web_request_api =
|
|
extensions::BrowserContextKeyedAPIFactory<extensions::WebRequestAPI>::Get(
|
|
browser_context);
|
|
|
|
if (web_request_api)
|
|
has_listener |= web_request_api->MayHaveProxies();
|
|
#endif
|
|
|
|
return has_listener;
|
|
}
|
|
|
|
void ElectronBrowserClient::CreateWebSocket(
|
|
content::RenderFrameHost* frame,
|
|
WebSocketFactory factory,
|
|
const GURL& url,
|
|
const net::SiteForCookies& site_for_cookies,
|
|
const base::Optional<std::string>& user_agent,
|
|
mojo::PendingRemote<network::mojom::WebSocketHandshakeClient>
|
|
handshake_client) {
|
|
v8::Isolate* isolate = JavascriptEnvironment::GetIsolate();
|
|
v8::HandleScope scope(isolate);
|
|
auto* browser_context = frame->GetProcess()->GetBrowserContext();
|
|
|
|
auto web_request = api::WebRequest::FromOrCreate(isolate, browser_context);
|
|
DCHECK(web_request.get());
|
|
|
|
#if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
|
|
if (!web_request->HasListener()) {
|
|
auto* web_request_api = extensions::BrowserContextKeyedAPIFactory<
|
|
extensions::WebRequestAPI>::Get(browser_context);
|
|
|
|
if (web_request_api && web_request_api->MayHaveProxies()) {
|
|
web_request_api->ProxyWebSocket(frame, std::move(factory), url,
|
|
site_for_cookies.RepresentativeUrl(),
|
|
user_agent, std::move(handshake_client));
|
|
return;
|
|
}
|
|
}
|
|
#endif
|
|
|
|
ProxyingWebSocket::StartProxying(
|
|
web_request.get(), std::move(factory), url,
|
|
site_for_cookies.RepresentativeUrl(), user_agent,
|
|
std::move(handshake_client), true, frame->GetProcess()->GetID(),
|
|
frame->GetRoutingID(), frame->GetLastCommittedOrigin(), browser_context,
|
|
&next_id_);
|
|
}
|
|
|
|
bool ElectronBrowserClient::WillCreateURLLoaderFactory(
|
|
content::BrowserContext* browser_context,
|
|
content::RenderFrameHost* frame_host,
|
|
int render_process_id,
|
|
URLLoaderFactoryType type,
|
|
const url::Origin& request_initiator,
|
|
base::Optional<int64_t> navigation_id,
|
|
ukm::SourceIdObj ukm_source_id,
|
|
mojo::PendingReceiver<network::mojom::URLLoaderFactory>* factory_receiver,
|
|
mojo::PendingRemote<network::mojom::TrustedURLLoaderHeaderClient>*
|
|
header_client,
|
|
bool* bypass_redirect_checks,
|
|
bool* disable_secure_dns,
|
|
network::mojom::URLLoaderFactoryOverridePtr* factory_override) {
|
|
v8::Isolate* isolate = JavascriptEnvironment::GetIsolate();
|
|
v8::HandleScope scope(isolate);
|
|
auto web_request = api::WebRequest::FromOrCreate(isolate, browser_context);
|
|
DCHECK(web_request.get());
|
|
|
|
#if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
|
|
if (!web_request->HasListener()) {
|
|
auto* web_request_api = extensions::BrowserContextKeyedAPIFactory<
|
|
extensions::WebRequestAPI>::Get(browser_context);
|
|
|
|
DCHECK(web_request_api);
|
|
bool use_proxy_for_web_request =
|
|
web_request_api->MaybeProxyURLLoaderFactory(
|
|
browser_context, frame_host, render_process_id, type, navigation_id,
|
|
ukm_source_id, factory_receiver, header_client);
|
|
|
|
if (bypass_redirect_checks)
|
|
*bypass_redirect_checks = use_proxy_for_web_request;
|
|
if (use_proxy_for_web_request)
|
|
return true;
|
|
}
|
|
#endif
|
|
|
|
auto proxied_receiver = std::move(*factory_receiver);
|
|
mojo::PendingRemote<network::mojom::URLLoaderFactory> target_factory_remote;
|
|
*factory_receiver = target_factory_remote.InitWithNewPipeAndPassReceiver();
|
|
|
|
// Required by WebRequestInfoInitParams.
|
|
//
|
|
// Note that in Electron we allow webRequest to capture requests sent from
|
|
// browser process, so creation of |navigation_ui_data| is different from
|
|
// Chromium which only does for renderer-initialized navigations.
|
|
std::unique_ptr<extensions::ExtensionNavigationUIData> navigation_ui_data;
|
|
if (navigation_id.has_value()) {
|
|
navigation_ui_data =
|
|
std::make_unique<extensions::ExtensionNavigationUIData>();
|
|
}
|
|
|
|
mojo::PendingReceiver<network::mojom::TrustedURLLoaderHeaderClient>
|
|
header_client_receiver;
|
|
if (header_client)
|
|
header_client_receiver = header_client->InitWithNewPipeAndPassReceiver();
|
|
|
|
auto* protocol_registry =
|
|
ProtocolRegistry::FromBrowserContext(browser_context);
|
|
new ProxyingURLLoaderFactory(
|
|
web_request.get(), protocol_registry->intercept_handlers(),
|
|
render_process_id,
|
|
frame_host ? frame_host->GetRoutingID() : MSG_ROUTING_NONE,
|
|
frame_host ? frame_host->GetRenderViewHost()->GetRoutingID()
|
|
: MSG_ROUTING_NONE,
|
|
&next_id_, std::move(navigation_ui_data), std::move(navigation_id),
|
|
std::move(proxied_receiver), std::move(target_factory_remote),
|
|
std::move(header_client_receiver), type);
|
|
|
|
if (bypass_redirect_checks)
|
|
*bypass_redirect_checks = true;
|
|
|
|
return true;
|
|
}
|
|
|
|
void ElectronBrowserClient::OverrideURLLoaderFactoryParams(
|
|
content::BrowserContext* browser_context,
|
|
const url::Origin& origin,
|
|
bool is_for_isolated_world,
|
|
network::mojom::URLLoaderFactoryParams* factory_params) {
|
|
// Bypass CORB and CORS when web security is disabled.
|
|
auto it = process_preferences_.find(factory_params->process_id);
|
|
if (it != process_preferences_.end() && !it->second.web_security) {
|
|
factory_params->is_corb_enabled = false;
|
|
factory_params->disable_web_security = true;
|
|
}
|
|
|
|
extensions::URLLoaderFactoryManager::OverrideURLLoaderFactoryParams(
|
|
browser_context, origin, is_for_isolated_world, factory_params);
|
|
}
|
|
|
|
#if defined(OS_WIN)
|
|
bool ElectronBrowserClient::PreSpawnChild(
|
|
sandbox::TargetPolicy* policy,
|
|
sandbox::policy::SandboxType sandbox_type,
|
|
ChildSpawnFlags flags) {
|
|
// Allow crashpad to communicate via named pipe.
|
|
sandbox::ResultCode result = policy->AddRule(
|
|
sandbox::TargetPolicy::SUBSYS_FILES,
|
|
sandbox::TargetPolicy::FILES_ALLOW_ANY, L"\\??\\pipe\\crashpad_*");
|
|
if (result != sandbox::SBOX_ALL_OK)
|
|
return false;
|
|
return true;
|
|
}
|
|
#endif // defined(OS_WIN)
|
|
|
|
bool ElectronBrowserClient::BindAssociatedReceiverFromFrame(
|
|
content::RenderFrameHost* render_frame_host,
|
|
const std::string& interface_name,
|
|
mojo::ScopedInterfaceEndpointHandle* handle) {
|
|
if (interface_name == mojom::ElectronAutofillDriver::Name_) {
|
|
AutofillDriverFactory::BindAutofillDriver(
|
|
mojom::ElectronAutofillDriverAssociatedRequest(std::move(*handle)),
|
|
render_frame_host);
|
|
return true;
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
std::string ElectronBrowserClient::GetApplicationLocale() {
|
|
if (BrowserThread::CurrentlyOn(BrowserThread::IO))
|
|
return g_io_thread_application_locale.Get();
|
|
return *g_application_locale;
|
|
}
|
|
|
|
base::FilePath ElectronBrowserClient::GetFontLookupTableCacheDir() {
|
|
base::FilePath user_data_dir;
|
|
base::PathService::Get(DIR_USER_DATA, &user_data_dir);
|
|
DCHECK(!user_data_dir.empty());
|
|
return user_data_dir.Append(FILE_PATH_LITERAL("FontLookupTableCache"));
|
|
}
|
|
|
|
bool ElectronBrowserClient::ShouldEnableStrictSiteIsolation() {
|
|
// Enable site isolation. It is off by default in Chromium <= 69.
|
|
return true;
|
|
}
|
|
|
|
void ElectronBrowserClient::BindHostReceiverForRenderer(
|
|
content::RenderProcessHost* render_process_host,
|
|
mojo::GenericPendingReceiver receiver) {
|
|
#if BUILDFLAG(ENABLE_BUILTIN_SPELLCHECKER)
|
|
if (auto host_receiver = receiver.As<spellcheck::mojom::SpellCheckHost>()) {
|
|
SpellCheckHostChromeImpl::Create(render_process_host->GetID(),
|
|
std::move(host_receiver));
|
|
return;
|
|
}
|
|
#endif
|
|
}
|
|
|
|
void BindElectronBrowser(
|
|
content::RenderFrameHost* frame_host,
|
|
mojo::PendingReceiver<electron::mojom::ElectronBrowser> receiver) {
|
|
ElectronBrowserHandlerImpl::Create(frame_host, std::move(receiver));
|
|
}
|
|
|
|
#if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
|
|
void BindMimeHandlerService(
|
|
content::RenderFrameHost* frame_host,
|
|
mojo::PendingReceiver<extensions::mime_handler::MimeHandlerService>
|
|
receiver) {
|
|
content::WebContents* contents =
|
|
content::WebContents::FromRenderFrameHost(frame_host);
|
|
auto* guest_view =
|
|
extensions::MimeHandlerViewGuest::FromWebContents(contents);
|
|
if (!guest_view)
|
|
return;
|
|
extensions::MimeHandlerServiceImpl::Create(guest_view->GetStreamWeakPtr(),
|
|
std::move(receiver));
|
|
}
|
|
|
|
void BindBeforeUnloadControl(
|
|
content::RenderFrameHost* frame_host,
|
|
mojo::PendingReceiver<extensions::mime_handler::BeforeUnloadControl>
|
|
receiver) {
|
|
auto* web_contents = content::WebContents::FromRenderFrameHost(frame_host);
|
|
if (!web_contents)
|
|
return;
|
|
|
|
auto* guest_view =
|
|
extensions::MimeHandlerViewGuest::FromWebContents(web_contents);
|
|
if (!guest_view)
|
|
return;
|
|
guest_view->FuseBeforeUnloadControl(std::move(receiver));
|
|
}
|
|
#endif
|
|
|
|
void ElectronBrowserClient::RegisterBrowserInterfaceBindersForFrame(
|
|
content::RenderFrameHost* render_frame_host,
|
|
mojo::BinderMapWithContext<content::RenderFrameHost*>* map) {
|
|
map->Add<network_hints::mojom::NetworkHintsHandler>(
|
|
base::BindRepeating(&BindNetworkHintsHandler));
|
|
map->Add<blink::mojom::BadgeService>(
|
|
base::BindRepeating(&badging::BadgeManager::BindFrameReceiver));
|
|
map->Add<electron::mojom::ElectronBrowser>(
|
|
base::BindRepeating(&BindElectronBrowser));
|
|
#if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
|
|
map->Add<extensions::mime_handler::MimeHandlerService>(
|
|
base::BindRepeating(&BindMimeHandlerService));
|
|
map->Add<extensions::mime_handler::BeforeUnloadControl>(
|
|
base::BindRepeating(&BindBeforeUnloadControl));
|
|
|
|
content::WebContents* web_contents =
|
|
content::WebContents::FromRenderFrameHost(render_frame_host);
|
|
if (!web_contents)
|
|
return;
|
|
|
|
const GURL& site = render_frame_host->GetSiteInstance()->GetSiteURL();
|
|
if (!site.SchemeIs(extensions::kExtensionScheme))
|
|
return;
|
|
|
|
content::BrowserContext* browser_context =
|
|
render_frame_host->GetProcess()->GetBrowserContext();
|
|
auto* extension = extensions::ExtensionRegistry::Get(browser_context)
|
|
->enabled_extensions()
|
|
.GetByID(site.host());
|
|
if (!extension)
|
|
return;
|
|
extensions::ExtensionsBrowserClient::Get()
|
|
->RegisterBrowserInterfaceBindersForFrame(map, render_frame_host,
|
|
extension);
|
|
#endif
|
|
}
|
|
|
|
#if defined(OS_LINUX)
|
|
void ElectronBrowserClient::GetAdditionalMappedFilesForChildProcess(
|
|
const base::CommandLine& command_line,
|
|
int child_process_id,
|
|
content::PosixFileDescriptorInfo* mappings) {
|
|
int crash_signal_fd = GetCrashSignalFD(command_line);
|
|
if (crash_signal_fd >= 0) {
|
|
mappings->Share(kCrashDumpSignal, crash_signal_fd);
|
|
}
|
|
}
|
|
#endif
|
|
|
|
std::unique_ptr<content::LoginDelegate>
|
|
ElectronBrowserClient::CreateLoginDelegate(
|
|
const net::AuthChallengeInfo& auth_info,
|
|
content::WebContents* web_contents,
|
|
const content::GlobalRequestID& request_id,
|
|
bool is_main_frame,
|
|
const GURL& url,
|
|
scoped_refptr<net::HttpResponseHeaders> response_headers,
|
|
bool first_auth_attempt,
|
|
LoginAuthRequiredCallback auth_required_callback) {
|
|
return std::make_unique<LoginHandler>(
|
|
auth_info, web_contents, is_main_frame, url, response_headers,
|
|
first_auth_attempt, std::move(auth_required_callback));
|
|
}
|
|
|
|
std::vector<std::unique_ptr<blink::URLLoaderThrottle>>
|
|
ElectronBrowserClient::CreateURLLoaderThrottles(
|
|
const network::ResourceRequest& request,
|
|
content::BrowserContext* browser_context,
|
|
const base::RepeatingCallback<content::WebContents*()>& wc_getter,
|
|
content::NavigationUIData* navigation_ui_data,
|
|
int frame_tree_node_id) {
|
|
DCHECK_CURRENTLY_ON(BrowserThread::UI);
|
|
|
|
std::vector<std::unique_ptr<blink::URLLoaderThrottle>> result;
|
|
|
|
#if BUILDFLAG(ENABLE_PLUGINS) && BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
|
|
result.push_back(std::make_unique<PluginResponseInterceptorURLLoaderThrottle>(
|
|
request.destination, frame_tree_node_id));
|
|
#endif
|
|
|
|
return result;
|
|
}
|
|
|
|
base::flat_set<std::string>
|
|
ElectronBrowserClient::GetPluginMimeTypesWithExternalHandlers(
|
|
content::BrowserContext* browser_context) {
|
|
base::flat_set<std::string> mime_types;
|
|
#if BUILDFLAG(ENABLE_PLUGINS) && BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
|
|
auto map = PluginUtils::GetMimeTypeToExtensionIdMap(browser_context);
|
|
for (const auto& pair : map)
|
|
mime_types.insert(pair.first);
|
|
#endif
|
|
return mime_types;
|
|
}
|
|
|
|
content::SerialDelegate* ElectronBrowserClient::GetSerialDelegate() {
|
|
if (!serial_delegate_)
|
|
serial_delegate_ = std::make_unique<ElectronSerialDelegate>();
|
|
return serial_delegate_.get();
|
|
}
|
|
|
|
content::BluetoothDelegate* ElectronBrowserClient::GetBluetoothDelegate() {
|
|
if (!bluetooth_delegate_)
|
|
bluetooth_delegate_ = std::make_unique<ElectronBluetoothDelegate>();
|
|
return bluetooth_delegate_.get();
|
|
}
|
|
|
|
void ElectronBrowserClient::BindBadgeServiceReceiverFromServiceWorker(
|
|
content::RenderProcessHost* service_worker_process_host,
|
|
const GURL& service_worker_scope,
|
|
mojo::PendingReceiver<blink::mojom::BadgeService> receiver) {
|
|
badging::BadgeManager::BindServiceWorkerReceiver(
|
|
service_worker_process_host, service_worker_scope, std::move(receiver));
|
|
}
|
|
|
|
} // namespace electron
|