e86d1cba75
* chore: bump chromium in DEPS to 104.0.5096.0 * 3651284: Use the entry settings object for window.open navigation https://chromium-review.googlesource.com/c/chromium/src/+/3651284 * 3644598: Make RenderFrameHost used for notification permission decision https://chromium-review.googlesource.com/c/chromium/src/+/3644598 * 3642842: Window Placement: Prototype Fullscreen Capability Delegation - Part 2 https://chromium-review.googlesource.com/c/chromium/src/+/3642842 * 3652785: [sandbox] Enable sandboxed pointers on sanitizer builds https://chromium-review.googlesource.com/c/v8/v8/+/3652785 * 3611967: webhid: Migrate HidDelegate to use BrowserContext and Origin https://chromium-review.googlesource.com/c/chromium/src/+/3611967 * 3665762: Remove RenderFrameHost::IsRenderFrameCreated from //content/. https://chromium-review.googlesource.com/c/chromium/src/+/3665762 * 3659375: Fold x509_util_ios and most of x509_util_mac into x509_util_apple https://chromium-review.googlesource.com/c/chromium/src/+/3659375 * 3656234: [CodeHealth] Remove uses of base::ListValue::Append() (Final, take 2) https://chromium-review.googlesource.com/c/chromium/src/+/3656234 * chore: update patch indices * chore: fix lint * 3644598: Make RenderFrameHost used for notification permission decision https://chromium-review.googlesource.com/c/chromium/src/+/3644598 * webhid: Migrate HidDelegate to use BrowserContext and Origin This is a temporary fix for https://chromium-review.googlesource.com/c/chromium/src/+/3611967 to get the build compiling, but we need to either patch around https://chromium-review.googlesource.com/c/chromium/src/+/3611967 or move our device permissioning to BrowserContext * chore: fix lint * build: run electron/script/gen-libc++-filenames.js fixes gn check * chore: bump chromium in DEPS to 104.0.5098.0 * chore: disable flaking tests * 3682394: Change pipes surrounding code references in comments to backticks https://chromium-review.googlesource.com/c/chromium/src/+/3682394 * 3652749: Delete GLRenderer and related classes https://chromium-review.googlesource.com/c/chromium/src/+/3652749 * chore: fixup patch indices * 3671199: Remove ContentMainDelegate::PostFieldTrialInitialization https://chromium-review.googlesource.com/c/chromium/src/+/3671199 * 3607963: hid: Do not exclude HID device with no collections https://chromium-review.googlesource.com/c/chromium/src/+/3607963 * refactor: use ElectronBrowserContext instead of WebContents to persist devices due to changes like https://chromium-review.googlesource.com/c/chromium/src/+/3611967, we can no longer use WebContents to store device permissions so this commit moves device permission storage to live in memory in ElectronBrowserContext instead. * 3557253: Deprecate some signature checks https://chromium-review.googlesource.com/c/v8/v8/+/3557253 * chore: bump chromium in DEPS to 104.0.5100.0 * 3680781: Add policy for Renderer App Container. https://chromium-review.googlesource.com/c/chromium/src/+/3680781 * chore: update patch indices * 3675465: Update NetLog network service API to use mojom::DictionaryValue. https://chromium-review.googlesource.com/c/chromium/src/+/3675465 * chore: bump chromium in DEPS to 104.0.5102.0 * chore: update patches * chore: bump chromium in DEPS to 104.0.5103.0 * chore: update patches * chore: bump chromium in DEPS to 104.0.5104.0 * chore: update patches * fix: add patch for DCHECK in fullscreen test * build: fix nan build * build: make the nan spec runner work on macOS * chore: bump chromium in DEPS to 104.0.5106.0 * chore: update patches * chore: bump chromium in DEPS to 104.0.5108.0 * chore: update patches * chore: bump chromium in DEPS to 104.0.5110.0 * chore: update patches * chore: bump chromium in DEPS to 104.0.5112.0 * chore: bump chromium in DEPS to 105.0.5113.0 * chore: bump chromium in DEPS to 105.0.5115.0 * chore: bump chromium in DEPS to 105.0.5117.0 * chore: update patches * chore: update libcpp patch * 3693745: Delete base::LowerCaseEqualsASCII() Ref: https://chromium-review.googlesource.com/c/chromium/src/+/3693745 * 3669226: Remove printing PostTask usage of IO thread Ref: https://chromium-review.googlesource.com/c/chromium/src/+/3669226 * 3687395: Remove DictionaryValue::HasKey(). Ref: https://chromium-review.googlesource.com/c/chromium/src/+/3687395 * 3691014: Prevent unsafe narrowing: ui/accessibility, part 2 Ref: https://chromium-review.googlesource.com/c/chromium/src/+/3691014 * 3560567: [MSC] Porting GenerateStreams clients to handle stream vectors. Ref: https://chromium-review.googlesource.com/c/chromium/src/+/3560567 * 3684873: [Bluetooth][Win/Linux] Add bluetooth pair confirmation prompt https://chromium-review.googlesource.com/c/chromium/src/+/3684873 * chore: bump chromium in DEPS to 105.0.5119.0 * chore: missing includes in desktop_notification_controller * chore: update patches * 3685951: Reland "Make sure screen object is created once in tests." https://chromium-review.googlesource.com/c/chromium/src/+/3685951 * fixup: Reland "Make sure screen object is created once in tests." * 3646014: [API] Deprecate LegacyOOMErrorCallback Ref: https://chromium-review.googlesource.com/c/v8/v8/+/3646014 * chore: bump chromium in DEPS to 105.0.5121.0 * chore: update patches * 3699085: [cleanup] update PrintBackend::EnumeratePrinters to use reference Ref: https://chromium-review.googlesource.com/c/chromium/src/+/3699085 * chore: bump chromium in DEPS to 105.0.5123.0 * chore: update patches * chore: bump chromium in DEPS to 105.0.5125.0 * chore: update patches * 3630082: [sandbox] Also enable the sandbox outside of Chromium builds Ref: https://chromium-review.googlesource.com/c/v8/v8/+/3630082 * chore: bump chromium in DEPS to 105.0.5127.0 * chore: update patches * chore: bump chromium in DEPS to 105.0.5129.0 * chore: update patches * 3703741: Remove WebContents::GetMainFrame. https://chromium-review.googlesource.com/c/chromium/src/+/3703741 * chore: update patches * fixup! 3703741: Remove WebContents::GetMainFrame. * fix lint * more lint * chore: document breaking change * 3687671: [v8] Freeze flags after initialization https://chromium-review.googlesource.com/c/chromium/src/+/3687671 * fixup! 3560567: [MSC] Porting GenerateStreams clients to handle stream vectors. * use the v8 allocator for node serdes * chore: update patches * remove faulty non-v8-sandbox-compatible code * make NodeArrayBufferAllocator use the v8 allocator under the hood * fixup! 3560567: [MSC] Porting GenerateStreams clients to handle stream vectors. * fix build on windows * 3691954: [Reland][Extensions Bindings] Validate arguments sent to API events https://chromium-review.googlesource.com/c/chromium/src/+/3691954 * chore: remove deprecated AccessorSignatures https://github.com/nodejs/nan/pull/941 * Update patches/chromium/notification_provenance.patch Co-authored-by: John Kleinschmidt <jkleinsc@electronjs.org> * remove chore_expose_v8_initialization_isolate_callbacks.patch * add link to nodejs/nan#941 * 52026: Do not allow md4 or md5 based signatures in X.509 certificates. https://boringssl-review.googlesource.com/c/boringssl/+/52026 * chore: update patches * disable nan buffer-test * disable sandboxed pointers for now * force sandboxed pointers off * improve node allocation patch * restore accidentally dropped node crypto test patch Co-authored-by: electron-roller[bot] <84116207+electron-roller[bot]@users.noreply.github.com> Co-authored-by: Shelley Vohr <shelley.vohr@gmail.com> Co-authored-by: John Kleinschmidt <jkleinsc@electronjs.org> Co-authored-by: Charles Kerr <charles@charleskerr.com> Co-authored-by: PatchUp <73610968+patchup[bot]@users.noreply.github.com> Co-authored-by: Samuel Attard <sattard@salesforce.com> Co-authored-by: Keeley Hammond <khammond@slack-corp.com> Co-authored-by: VerteDinde <keeleymhammond@gmail.com> Co-authored-by: VerteDinde <vertedinde@electronjs.org> Co-authored-by: Jeremy Rose <jeremya@chromium.org> Co-authored-by: Jeremy Rose <japthorp@slack-corp.com>
496 lines
17 KiB
C++
496 lines
17 KiB
C++
// Copyright (c) 2013 GitHub, Inc.
|
|
// Use of this source code is governed by the MIT license that can be
|
|
// found in the LICENSE file.
|
|
|
|
#include "shell/app/electron_main_delegate.h"
|
|
|
|
#include <iostream>
|
|
#include <memory>
|
|
#include <string>
|
|
#include <utility>
|
|
|
|
#include "base/base_switches.h"
|
|
#include "base/command_line.h"
|
|
#include "base/debug/stack_trace.h"
|
|
#include "base/environment.h"
|
|
#include "base/files/file_util.h"
|
|
#include "base/logging.h"
|
|
#include "base/mac/bundle_locations.h"
|
|
#include "base/path_service.h"
|
|
#include "base/strings/string_split.h"
|
|
#include "chrome/common/chrome_paths.h"
|
|
#include "chrome/common/chrome_switches.h"
|
|
#include "components/content_settings/core/common/content_settings_pattern.h"
|
|
#include "content/public/common/content_switches.h"
|
|
#include "electron/buildflags/buildflags.h"
|
|
#include "extensions/common/constants.h"
|
|
#include "ipc/ipc_buildflags.h"
|
|
#include "sandbox/policy/switches.h"
|
|
#include "services/tracing/public/cpp/stack_sampling/tracing_sampler_profiler.h"
|
|
#include "shell/app/command_line_args.h"
|
|
#include "shell/app/electron_content_client.h"
|
|
#include "shell/browser/electron_browser_client.h"
|
|
#include "shell/browser/electron_gpu_client.h"
|
|
#include "shell/browser/feature_list.h"
|
|
#include "shell/browser/relauncher.h"
|
|
#include "shell/common/application_info.h"
|
|
#include "shell/common/electron_paths.h"
|
|
#include "shell/common/logging.h"
|
|
#include "shell/common/options_switches.h"
|
|
#include "shell/common/platform_util.h"
|
|
#include "shell/renderer/electron_renderer_client.h"
|
|
#include "shell/renderer/electron_sandboxed_renderer_client.h"
|
|
#include "shell/utility/electron_content_utility_client.h"
|
|
#include "ui/base/resource/resource_bundle.h"
|
|
#include "ui/base/ui_base_switches.h"
|
|
|
|
#if BUILDFLAG(IS_MAC)
|
|
#include "shell/app/electron_main_delegate_mac.h"
|
|
#endif
|
|
|
|
#if BUILDFLAG(IS_WIN)
|
|
#include "base/win/win_util.h"
|
|
#include "chrome/child/v8_crashpad_support_win.h"
|
|
#endif
|
|
|
|
#if BUILDFLAG(IS_LINUX)
|
|
#include "base/nix/xdg_util.h"
|
|
#include "components/crash/core/app/breakpad_linux.h"
|
|
#include "v8/include/v8-wasm-trap-handler-posix.h"
|
|
#include "v8/include/v8.h"
|
|
#endif
|
|
|
|
#if !defined(MAS_BUILD)
|
|
#include "components/crash/core/app/crash_switches.h" // nogncheck
|
|
#include "components/crash/core/app/crashpad.h" // nogncheck
|
|
#include "components/crash/core/common/crash_key.h"
|
|
#include "components/crash/core/common/crash_keys.h"
|
|
#include "shell/app/electron_crash_reporter_client.h"
|
|
#include "shell/browser/api/electron_api_crash_reporter.h"
|
|
#include "shell/common/crash_keys.h"
|
|
#endif
|
|
|
|
namespace electron {
|
|
|
|
namespace {
|
|
|
|
const char kRelauncherProcess[] = "relauncher";
|
|
|
|
constexpr base::StringPiece kElectronDisableSandbox("ELECTRON_DISABLE_SANDBOX");
|
|
constexpr base::StringPiece kElectronEnableStackDumping(
|
|
"ELECTRON_ENABLE_STACK_DUMPING");
|
|
|
|
bool IsBrowserProcess(base::CommandLine* cmd) {
|
|
std::string process_type = cmd->GetSwitchValueASCII(::switches::kProcessType);
|
|
return process_type.empty();
|
|
}
|
|
|
|
// Returns true if this subprocess type needs the ResourceBundle initialized
|
|
// and resources loaded.
|
|
bool SubprocessNeedsResourceBundle(const std::string& process_type) {
|
|
return
|
|
#if BUILDFLAG(IS_LINUX)
|
|
// The zygote process opens the resources for the renderers.
|
|
process_type == ::switches::kZygoteProcess ||
|
|
#endif
|
|
#if BUILDFLAG(IS_MAC)
|
|
// Mac needs them too for scrollbar related images and for sandbox
|
|
// profiles.
|
|
process_type == ::switches::kGpuProcess ||
|
|
#endif
|
|
process_type == ::switches::kPpapiPluginProcess ||
|
|
process_type == ::switches::kRendererProcess ||
|
|
process_type == ::switches::kUtilityProcess;
|
|
}
|
|
|
|
#if BUILDFLAG(IS_WIN)
|
|
void InvalidParameterHandler(const wchar_t*,
|
|
const wchar_t*,
|
|
const wchar_t*,
|
|
unsigned int,
|
|
uintptr_t) {
|
|
// noop.
|
|
}
|
|
#endif
|
|
|
|
// TODO(nornagon): move path provider overriding to its own file in
|
|
// shell/common
|
|
bool ElectronPathProvider(int key, base::FilePath* result) {
|
|
bool create_dir = false;
|
|
base::FilePath cur;
|
|
switch (key) {
|
|
case chrome::DIR_USER_DATA:
|
|
if (!base::PathService::Get(DIR_APP_DATA, &cur))
|
|
return false;
|
|
cur = cur.Append(base::FilePath::FromUTF8Unsafe(
|
|
GetPossiblyOverriddenApplicationName()));
|
|
create_dir = true;
|
|
break;
|
|
case DIR_CRASH_DUMPS:
|
|
if (!base::PathService::Get(chrome::DIR_USER_DATA, &cur))
|
|
return false;
|
|
cur = cur.Append(FILE_PATH_LITERAL("Crashpad"));
|
|
create_dir = true;
|
|
break;
|
|
case chrome::DIR_APP_DICTIONARIES:
|
|
// TODO(nornagon): can we just default to using Chrome's logic here?
|
|
if (!base::PathService::Get(DIR_SESSION_DATA, &cur))
|
|
return false;
|
|
cur = cur.Append(base::FilePath::FromUTF8Unsafe("Dictionaries"));
|
|
create_dir = true;
|
|
break;
|
|
case DIR_SESSION_DATA:
|
|
// By default and for backward, equivalent to DIR_USER_DATA.
|
|
return base::PathService::Get(chrome::DIR_USER_DATA, result);
|
|
case DIR_USER_CACHE: {
|
|
#if BUILDFLAG(IS_POSIX)
|
|
int parent_key = base::DIR_CACHE;
|
|
#else
|
|
// On Windows, there's no OS-level centralized location for caches, so
|
|
// store the cache in the app data directory.
|
|
int parent_key = base::DIR_ROAMING_APP_DATA;
|
|
#endif
|
|
if (!base::PathService::Get(parent_key, &cur))
|
|
return false;
|
|
cur = cur.Append(base::FilePath::FromUTF8Unsafe(
|
|
GetPossiblyOverriddenApplicationName()));
|
|
create_dir = true;
|
|
break;
|
|
}
|
|
#if BUILDFLAG(IS_LINUX)
|
|
case DIR_APP_DATA: {
|
|
auto env = base::Environment::Create();
|
|
cur = base::nix::GetXDGDirectory(
|
|
env.get(), base::nix::kXdgConfigHomeEnvVar, base::nix::kDotConfigDir);
|
|
break;
|
|
}
|
|
#endif
|
|
#if BUILDFLAG(IS_WIN)
|
|
case DIR_RECENT:
|
|
if (!platform_util::GetFolderPath(DIR_RECENT, &cur))
|
|
return false;
|
|
create_dir = true;
|
|
break;
|
|
#endif
|
|
case DIR_APP_LOGS:
|
|
#if BUILDFLAG(IS_MAC)
|
|
if (!base::PathService::Get(base::DIR_HOME, &cur))
|
|
return false;
|
|
cur = cur.Append(FILE_PATH_LITERAL("Library"));
|
|
cur = cur.Append(FILE_PATH_LITERAL("Logs"));
|
|
cur = cur.Append(base::FilePath::FromUTF8Unsafe(
|
|
GetPossiblyOverriddenApplicationName()));
|
|
#else
|
|
if (!base::PathService::Get(chrome::DIR_USER_DATA, &cur))
|
|
return false;
|
|
cur = cur.Append(base::FilePath::FromUTF8Unsafe("logs"));
|
|
#endif
|
|
create_dir = true;
|
|
break;
|
|
default:
|
|
return false;
|
|
}
|
|
|
|
// TODO(bauerb): http://crbug.com/259796
|
|
base::ThreadRestrictions::ScopedAllowIO allow_io;
|
|
if (create_dir && !base::PathExists(cur) && !base::CreateDirectory(cur)) {
|
|
return false;
|
|
}
|
|
|
|
*result = cur;
|
|
|
|
return true;
|
|
}
|
|
|
|
void RegisterPathProvider() {
|
|
base::PathService::RegisterProvider(ElectronPathProvider, PATH_START,
|
|
PATH_END);
|
|
}
|
|
|
|
} // namespace
|
|
|
|
std::string LoadResourceBundle(const std::string& locale) {
|
|
const bool initialized = ui::ResourceBundle::HasSharedInstance();
|
|
DCHECK(!initialized);
|
|
|
|
// Load other resource files.
|
|
base::FilePath pak_dir;
|
|
#if BUILDFLAG(IS_MAC)
|
|
pak_dir =
|
|
base::mac::FrameworkBundlePath().Append(FILE_PATH_LITERAL("Resources"));
|
|
#else
|
|
base::PathService::Get(base::DIR_MODULE, &pak_dir);
|
|
#endif
|
|
|
|
std::string loaded_locale = ui::ResourceBundle::InitSharedInstanceWithLocale(
|
|
locale, nullptr, ui::ResourceBundle::LOAD_COMMON_RESOURCES);
|
|
ui::ResourceBundle& bundle = ui::ResourceBundle::GetSharedInstance();
|
|
bundle.AddDataPackFromPath(pak_dir.Append(FILE_PATH_LITERAL("resources.pak")),
|
|
ui::kScaleFactorNone);
|
|
return loaded_locale;
|
|
}
|
|
|
|
ElectronMainDelegate::ElectronMainDelegate() = default;
|
|
|
|
ElectronMainDelegate::~ElectronMainDelegate() = default;
|
|
|
|
const char* const ElectronMainDelegate::kNonWildcardDomainNonPortSchemes[] = {
|
|
extensions::kExtensionScheme};
|
|
const size_t ElectronMainDelegate::kNonWildcardDomainNonPortSchemesSize =
|
|
std::size(kNonWildcardDomainNonPortSchemes);
|
|
|
|
bool ElectronMainDelegate::BasicStartupComplete(int* exit_code) {
|
|
auto* command_line = base::CommandLine::ForCurrentProcess();
|
|
|
|
#if BUILDFLAG(IS_WIN)
|
|
v8_crashpad_support::SetUp();
|
|
|
|
// On Windows the terminal returns immediately, so we add a new line to
|
|
// prevent output in the same line as the prompt.
|
|
if (IsBrowserProcess(command_line))
|
|
std::wcout << std::endl;
|
|
#endif // !BUILDFLAG(IS_WIN)
|
|
|
|
auto env = base::Environment::Create();
|
|
|
|
gin_helper::Locker::SetIsBrowserProcess(IsBrowserProcess(command_line));
|
|
|
|
// Enable convenient stack printing. This is enabled by default in
|
|
// non-official builds.
|
|
if (env->HasVar(kElectronEnableStackDumping))
|
|
base::debug::EnableInProcessStackDumping();
|
|
|
|
if (env->HasVar(kElectronDisableSandbox))
|
|
command_line->AppendSwitch(sandbox::policy::switches::kNoSandbox);
|
|
|
|
tracing_sampler_profiler_ =
|
|
tracing::TracingSamplerProfiler::CreateOnMainThread();
|
|
|
|
chrome::RegisterPathProvider();
|
|
electron::RegisterPathProvider();
|
|
|
|
#if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
|
|
ContentSettingsPattern::SetNonWildcardDomainNonPortSchemes(
|
|
kNonWildcardDomainNonPortSchemes, kNonWildcardDomainNonPortSchemesSize);
|
|
#endif
|
|
|
|
#if BUILDFLAG(IS_MAC)
|
|
OverrideChildProcessPath();
|
|
OverrideFrameworkBundlePath();
|
|
SetUpBundleOverrides();
|
|
#endif
|
|
|
|
#if BUILDFLAG(IS_WIN)
|
|
// Ignore invalid parameter errors.
|
|
_set_invalid_parameter_handler(InvalidParameterHandler);
|
|
// Disable the ActiveVerifier, which is used by Chrome to track possible
|
|
// bugs, but no use in Electron.
|
|
base::win::DisableHandleVerifier();
|
|
|
|
if (IsBrowserProcess(command_line))
|
|
base::win::PinUser32();
|
|
#endif
|
|
|
|
#if BUILDFLAG(IS_LINUX)
|
|
// Check for --no-sandbox parameter when running as root.
|
|
if (getuid() == 0 && IsSandboxEnabled(command_line))
|
|
LOG(FATAL) << "Running as root without --"
|
|
<< sandbox::policy::switches::kNoSandbox
|
|
<< " is not supported. See https://crbug.com/638180.";
|
|
#endif
|
|
|
|
#if defined(MAS_BUILD)
|
|
// In MAS build we are using --disable-remote-core-animation.
|
|
//
|
|
// According to ccameron:
|
|
// If you're running with --disable-remote-core-animation, you may want to
|
|
// also run with --disable-gpu-memory-buffer-compositor-resources as well.
|
|
// That flag makes it so we use regular GL textures instead of IOSurfaces
|
|
// for compositor resources. IOSurfaces are very heavyweight to
|
|
// create/destroy, but they can be displayed directly by CoreAnimation (and
|
|
// --disable-remote-core-animation makes it so we don't use this property,
|
|
// so they're just heavyweight with no upside).
|
|
command_line->AppendSwitch(
|
|
::switches::kDisableGpuMemoryBufferCompositorResources);
|
|
#endif
|
|
|
|
content_client_ = std::make_unique<ElectronContentClient>();
|
|
SetContentClient(content_client_.get());
|
|
|
|
return false;
|
|
}
|
|
|
|
void ElectronMainDelegate::PreSandboxStartup() {
|
|
auto* command_line = base::CommandLine::ForCurrentProcess();
|
|
|
|
std::string process_type =
|
|
command_line->GetSwitchValueASCII(::switches::kProcessType);
|
|
|
|
base::FilePath user_data_dir =
|
|
command_line->GetSwitchValuePath(::switches::kUserDataDir);
|
|
if (!user_data_dir.empty()) {
|
|
base::PathService::OverrideAndCreateIfNeeded(chrome::DIR_USER_DATA,
|
|
user_data_dir, false, true);
|
|
}
|
|
|
|
#if !BUILDFLAG(IS_WIN)
|
|
// For windows we call InitLogging later, after the sandbox is initialized.
|
|
//
|
|
// On Linux, we force a "preinit" in the zygote (i.e. never log to a default
|
|
// log file), because the zygote is booted prior to JS running, so it can't
|
|
// know the correct user-data directory. (And, further, accessing the
|
|
// application name on Linux can cause glib calls that end up spawning
|
|
// threads, which if done before the zygote is booted, causes a CHECK().)
|
|
logging::InitElectronLogging(*command_line,
|
|
/* is_preinit = */ process_type.empty() ||
|
|
process_type == ::switches::kZygoteProcess);
|
|
#endif
|
|
|
|
#if !defined(MAS_BUILD)
|
|
crash_reporter::InitializeCrashKeys();
|
|
#endif
|
|
|
|
// Initialize ResourceBundle which handles files loaded from external
|
|
// sources. The language should have been passed in to us from the
|
|
// browser process as a command line flag.
|
|
if (SubprocessNeedsResourceBundle(process_type)) {
|
|
std::string locale = command_line->GetSwitchValueASCII(::switches::kLang);
|
|
LoadResourceBundle(locale);
|
|
}
|
|
|
|
#if BUILDFLAG(IS_WIN) || (BUILDFLAG(IS_MAC) && !defined(MAS_BUILD))
|
|
// In the main process, we wait for JS to call crashReporter.start() before
|
|
// initializing crashpad. If we're in the renderer, we want to initialize it
|
|
// immediately at boot.
|
|
if (!process_type.empty()) {
|
|
ElectronCrashReporterClient::Create();
|
|
crash_reporter::InitializeCrashpad(false, process_type);
|
|
}
|
|
#endif
|
|
|
|
#if BUILDFLAG(IS_LINUX)
|
|
// Zygote needs to call InitCrashReporter() in RunZygote().
|
|
if (process_type != ::switches::kZygoteProcess && !process_type.empty()) {
|
|
ElectronCrashReporterClient::Create();
|
|
if (crash_reporter::IsCrashpadEnabled()) {
|
|
if (command_line->HasSwitch(
|
|
crash_reporter::switches::kCrashpadHandlerPid)) {
|
|
crash_reporter::InitializeCrashpad(false, process_type);
|
|
crash_reporter::SetFirstChanceExceptionHandler(
|
|
v8::TryHandleWebAssemblyTrapPosix);
|
|
}
|
|
} else {
|
|
breakpad::InitCrashReporter(process_type);
|
|
}
|
|
}
|
|
#endif
|
|
|
|
#if !defined(MAS_BUILD)
|
|
crash_keys::SetCrashKeysFromCommandLine(*command_line);
|
|
crash_keys::SetPlatformCrashKey();
|
|
#endif
|
|
|
|
if (IsBrowserProcess(command_line)) {
|
|
// Only append arguments for browser process.
|
|
|
|
// Allow file:// URIs to read other file:// URIs by default.
|
|
command_line->AppendSwitch(::switches::kAllowFileAccessFromFiles);
|
|
|
|
#if BUILDFLAG(IS_MAC)
|
|
// Enable AVFoundation.
|
|
command_line->AppendSwitch("enable-avfoundation");
|
|
#endif
|
|
}
|
|
}
|
|
|
|
void ElectronMainDelegate::SandboxInitialized(const std::string& process_type) {
|
|
#if BUILDFLAG(IS_WIN)
|
|
logging::InitElectronLogging(*base::CommandLine::ForCurrentProcess(),
|
|
/* is_preinit = */ process_type.empty());
|
|
#endif
|
|
}
|
|
|
|
void ElectronMainDelegate::PreBrowserMain() {
|
|
// This is initialized early because the service manager reads some feature
|
|
// flags and we need to make sure the feature list is initialized before the
|
|
// service manager reads the features.
|
|
InitializeFeatureList();
|
|
#if BUILDFLAG(IS_MAC)
|
|
RegisterAtomCrApp();
|
|
#endif
|
|
}
|
|
|
|
content::ContentBrowserClient*
|
|
ElectronMainDelegate::CreateContentBrowserClient() {
|
|
browser_client_ = std::make_unique<ElectronBrowserClient>();
|
|
return browser_client_.get();
|
|
}
|
|
|
|
content::ContentGpuClient* ElectronMainDelegate::CreateContentGpuClient() {
|
|
gpu_client_ = std::make_unique<ElectronGpuClient>();
|
|
return gpu_client_.get();
|
|
}
|
|
|
|
content::ContentRendererClient*
|
|
ElectronMainDelegate::CreateContentRendererClient() {
|
|
auto* command_line = base::CommandLine::ForCurrentProcess();
|
|
|
|
if (IsSandboxEnabled(command_line)) {
|
|
renderer_client_ = std::make_unique<ElectronSandboxedRendererClient>();
|
|
} else {
|
|
renderer_client_ = std::make_unique<ElectronRendererClient>();
|
|
}
|
|
|
|
return renderer_client_.get();
|
|
}
|
|
|
|
content::ContentUtilityClient*
|
|
ElectronMainDelegate::CreateContentUtilityClient() {
|
|
utility_client_ = std::make_unique<ElectronContentUtilityClient>();
|
|
return utility_client_.get();
|
|
}
|
|
|
|
absl::variant<int, content::MainFunctionParams>
|
|
ElectronMainDelegate::RunProcess(
|
|
const std::string& process_type,
|
|
content::MainFunctionParams main_function_params) {
|
|
if (process_type == kRelauncherProcess)
|
|
return relauncher::RelauncherMain(main_function_params);
|
|
else
|
|
return std::move(main_function_params);
|
|
}
|
|
|
|
bool ElectronMainDelegate::ShouldCreateFeatureList(InvokedIn invoked_in) {
|
|
return invoked_in == InvokedIn::kChildProcess;
|
|
}
|
|
|
|
bool ElectronMainDelegate::ShouldLockSchemeRegistry() {
|
|
return false;
|
|
}
|
|
|
|
#if BUILDFLAG(IS_LINUX)
|
|
void ElectronMainDelegate::ZygoteForked() {
|
|
// Needs to be called after we have DIR_USER_DATA. BrowserMain sets
|
|
// this up for the browser process in a different manner.
|
|
ElectronCrashReporterClient::Create();
|
|
const base::CommandLine* command_line =
|
|
base::CommandLine::ForCurrentProcess();
|
|
std::string process_type =
|
|
command_line->GetSwitchValueASCII(::switches::kProcessType);
|
|
if (crash_reporter::IsCrashpadEnabled()) {
|
|
if (command_line->HasSwitch(
|
|
crash_reporter::switches::kCrashpadHandlerPid)) {
|
|
crash_reporter::InitializeCrashpad(false, process_type);
|
|
crash_reporter::SetFirstChanceExceptionHandler(
|
|
v8::TryHandleWebAssemblyTrapPosix);
|
|
}
|
|
} else {
|
|
breakpad::InitCrashReporter(process_type);
|
|
}
|
|
|
|
// Reset the command line for the newly spawned process.
|
|
crash_keys::SetCrashKeysFromCommandLine(*command_line);
|
|
}
|
|
#endif // BUILDFLAG(IS_LINUX)
|
|
|
|
} // namespace electron
|