22a70eb803
* chore: bump chromium in DEPS to 91.0.4464.0 * chore: rebuild chromium/dcheck.patch with import-patches -3 Mechanical only; no code changes * chore: remove content_browser_main_loop.patch Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2725153 The function being patched (BrowserMainLoop::MainMessageLoopRun()) no longer exists. NB: if removing this introduces regressions the likely fix will be to add a similar patch for ShellBrowserMainParts::WillRunMainMessageLoop() which has similar code and was added at the same time this was removed. * chore: rebuild chromium/put_back_deleted_colors_for_autofill.patch with import-patches -3 Mechanical only; no code changes * chore: rebuild chromium/disable_color_correct_rendering.patch with import-patches -3 Mechanical only; no code changes * chore: rebuild chromium/eat_allow_disabling_blink_scheduler_throttling_per_renderview.patch with patch Mechanical only; no code changes * chore: rebuild chromium/gpu_notify_when_dxdiag_request_fails.patch with import-patches -3 Mechanical only; no code changes * chore: rebuild chromium/ui_gtk_public_header.patch manually no code changes * chore: rebuild chromium/web_contents.patch with import-patches -3 Mechanical only; no code changes * chore: remove v8/skip_global_registration_of_shared_arraybuffer_backing_stores.patch Refs: https://chromium-review.googlesource.com/c/v8/v8/+/2763874 This patch has been merged upstream * chore: export patches * chore: update add_trustedauthclient_to_urlloaderfactory.patch Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2757969 Sync with removal of render_frame_id_ * chore: sync chromium/put_back_deleted_colors_for_autofill.patch Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2785841 SkColorFromColorId() no longer takes theme, scheme args * chore: sync chromium/put_back_deleted_colors_for_autofill.patch Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2772143 Change new calls to GetDarkSchemeColor to fit our patched call signature * chore: update add_trustedauthclient_to_urlloaderfactory.patch Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2757969 Sync with removal of render_frame_id_ in our mojom * chore: update chromium/frame_host_manager.patch Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2740008 UrlInfo ctor now takes UrlInfo::OriginIsolationRequest instead of a bool * chore: update chromium/revert_remove_contentrendererclient_shouldfork.patch Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2755314 Upstream has removed `history_list_length_` which we were comparing to 0 to calculate our `is_initial_navigation` bool when calling ShouldFork(). ShouldFork() is ours and none of the code paths actually use that param, so this commit removes it altogether. * chore: update permissions_to_register Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2789074 Replace all uses of APIPermission::ID enum with Mojo type * refactor: update return type of PreMainMessageLoopRun() Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2725153 Used to return void; now returns an int errorcode. Note: 2725153 also has some nice doc updates about Browser's "stages" * refactor: sync ElectronBrowserMainParts to MainParts changes Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2725153 RunMainMessageLoopParts has been replaced with WillRunMainMessageLoop so `BrowserMainLoop::result_code_` is no longer available to us for our exit_code_ pointer. This variable held a dual role: (1) of course, hold the exit code, but also (2) was a nullptr before the message loop was ready, indicating to anyone calling SetExitCode() that we were still in startup and could just exit() without any extra steps. exit_code_ still fulfills these two roles but is now a base::Optional. * chore: update ElectronBrowserMainParts::PreDefaultMainMessageLoopRun Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2725153 BrowserMainParts::BrowsePreDefaultMainMesssageLoopRun() has been removed; move that work to the new WillRunMainMessageLoop(). * refactor: stop using CallbackList; it has been removed. Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2785973 * refactor: update use of threadpools. Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2773408 The upstream code is still in flux (e.g. reverts and re-lands) but the tl;dr for this commit is (1) include thread_pool.h if you're using it and (2) don't instantiate pools directly. * refactor: remove routing_id from CreateLoaderAndStart Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2762858 NB: One logic branch in ProxyingURLLoaderFactory::CreateLoaderAndStart calls std::make_unique<InProgressRequest>, which needs a routing_id. This PR uses the member field `routing_id_` since there's no longer one being passed into CreateLoaderAndStart. * refactor: sync to upstream ParittionOptions churn Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2771318 PartitionOptions' enums have changed. * refactor: update Manifest::Location usage Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2771320 tldr: s/Manifest::FOO/ManifestLocation::kFoo/ * chore: bump chromium in DEPS to 91.0.4465.0 * update patches * refactor: update extensions::Manifest to upstream Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2771320 - extensions::Manifest::COMPONENT + extensions::mojom::ManifestLocation::kExternalComponent * refactor: sync with upstream UrlInfo ctor changes Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2740008 UrlInfo ctor now takes UrlInfo::OriginIsolationRequest instead of a bool * chore: update invocation of convert_protocol_to_json.py Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2792623 python3 is being used in parts of the upstream build, but the copy of convert_protocol_to_json.py invoked in v8/third_party/inspector_protocol is not python3-friendly. Node has a py2+3-friendly version of it in its tools directory, so call it instead. * chore: use extensions::mojom::APIPermissionID Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2791122 tldr: - extensions::APIPermission::kFoo + extensions::mojom::APIPermissionID::kFoo * chore: Remove support for TLS1.0/1.1 in SSLVersionMin policy Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2765737 Remove TLS v1.0 & 1.1 from our SSLProtocolVersionFromString() function. This is the same change made upstream at https://chromium-review.googlesource.com/c/chromium/src/+/2765737/8/chrome/browser/ssl/ssl_config_service_manager_pref.cc * fixup! chore: update ElectronBrowserMainParts::PreDefaultMainMessageLoopRun * chore: Use IDType for permission change subscriptions. Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2791431 tldr: {Subscribe,Unsubscribe}PermissionStatusChange's tag type used to be an int; now it's the new SubscriptionId type (which is an IdType64). * chore: sync PowerMonitor code to upstream refactor Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2752635 tldr: PowerMonitor has been split into PowerStateObserver, PowerSuspendObserver, and PowerThermalObserver to reduce number of tasks posted to consumers who only need notifications for one of those things instead of all of them. * chore: use PartitionOptions's new Cookies field Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2771318 * Revert "refactor: remove routing_id from CreateLoaderAndStart" This reverts commit 8c9773b87a3c84f9073a47089eb2b6889d745245. 8c9773b was only a partial fix; reverting to start & try again. * update patches * chore: bump chromium in DEPS to 91.0.4466.0 * chore: update chromium/accelerator.patch Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2795472 tldr: sync patch with upstream renamed variable & macro names. * chore: update chromium/gtk_visibility.patch Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2796200 tldr: no code changes; just updating the diff to apply cleanly. note: ooh upstream Wayland hacking! * chore: update chromium/picture-in-picture.patch Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2710023 tldr: no code changes; just updating the diff to apply cleanly. * chore: update chromium/worker_feat_add_hook_to_notify_script_ready.patch Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2775573 tldr: no code changes; just updating the diff to apply cleanly. * chore: export_all_patches * chore: update chromium/feat_add_set_theme_source_to_allow_apps_to.patch Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2796511 tldr: NotifyObservers has been renamed to NotifyOnNativeThemeUpdated, so update the invocation in our patch. * chore: update ElectronBrowserClient w/upstream API Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2797454 tldr: GetDevToolsManagerDelegate() was returning an owned raw pointer. Replaced it with CreateDevToolsManagerDelegate() which uses unique_ptr<>. * chore: handle new content::PermissionType::FILE_HANDLING in toV8() Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2762201 `file-handling` string confirmed in https://chromium-review.googlesource.com/c/chromium/src/+/2762201/18/chrome/browser/ui/webui/settings/site_settings_helper.cc * refactor: remove routing_id from CreateLoaderAndStart pt 1 Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2762858 Part 1: the easiest ones * 2796724: Support Python3 https://chromium-review.googlesource.com/c/infra/luci/python-adb/+/2796724 * chore: bump chromium in DEPS to 91.0.4468.0 * 2668974: WebShare: Implement SharingServicePicker https://chromium-review.googlesource.com/c/chromium/src/+/2668974 * 2802766: Apply modernize-make-unique to media/ https://chromium-review.googlesource.com/c/chromium/src/+/2802766 * 2802823: Apply modernize-make-unique to gpu/ https://chromium-review.googlesource.com/c/chromium/src/+/2802823 * 2803041: Apply modernize-make-unique to remaining files https://chromium-review.googlesource.com/c/chromium/src/+/2803041 * 2798873: Convert GtkKeyBindingsHandler build checks to runtime checks https://chromium-review.googlesource.com/c/chromium/src/+/2798873 * 2733595: [ch-r] Parse ACCEPT_CH H2/3 frame and restart with new headers if needed https://chromium-review.googlesource.com/c/chromium/src/+/2733595 * chore: update patch indices * 2795107: Remove unused PermissionRequest IDs. https://chromium-review.googlesource.com/c/chromium/src/+/2795107 * chore: bump chromium in DEPS to 91.0.4469.0 * chore: fixup patch indices * chore: bump chromium in DEPS to 91.0.4469.5 * PiP 1.5: Add microphone, camera, and hang up buttons to the PiP window https://chromium-review.googlesource.com/c/chromium/src/+/2710023 * fixup! refactor: remove routing_id from CreateLoaderAndStart * refactor: use URLLoaderNetworkServiceObserver for auth requests from SimpleURLLoader * fixup! chore: fixup patch indices * 2724817: Expand scope of wasm-eval to all URLs https://chromium-review.googlesource.com/c/chromium/src/+/2724817 * Fixup patch after rebase * chore: bump chromium in DEPS to 91.0.4472.0 * 2797341: [ozone/x11] Enabled the global shortcut listener. https://chromium-review.googlesource.com/c/chromium/src/+/2797341 * 2805553: Reland Add GTK ColorMixers to ColorPipeline P1 https://chromium-review.googlesource.com/c/chromium/src/+/2805553 *2804366
: PiP 1.5: Label back to tab button with origin and center it https://chromium-review.googlesource.com/c/chromium/src/+/2804366 * 2784730: Fix crash on AX mode change in NativeViewHost without a Widget https://chromium-review.googlesource.com/c/chromium/src/+/2784730 * chore: update patch indices * 2810174: Add PdfAnnotationsEnabled policy. https://chromium-review.googlesource.com/c/chromium/src/+/2810174 * 2807829: Allow capturers to indicate if they want a WakeLock or not. https://chromium-review.googlesource.com/c/chromium/src/+/2807829 * chore: bump chromium in DEPS to 92.0.4473.0 * chore: bump chromium in DEPS to 92.0.4474.0 * chore: bump chromium in DEPS to 92.0.4475.0 * chore: update patches * chore: updates patches * chore: update is_media_key patch to handle new ozone impl Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2797341 * fix: ExecuteJavascript requests now need to be flagged as non-bf-aware Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2787195 * chore: icon_util_x11 is now icon_util_linux Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2791362 * build: update sysroots Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2628496 * build: fix missing symbols on linux build * use_ozone and use_x11 are not exclusive * new button view to build for pip Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2797341 Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2804366 * chore: fix broken gtk_util color patch * chore: remove patch conflict * build: update linux manifests * chore: build bttlb on all platforms for pip * chore: add thread_pool include for views delegate win * chore: fix lint * chore: add node patches for V8 changes * build: add missing base include on windows * fix: update frame host manager patch for new state transitions Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2714464 * chore: update windows zip manifests * chore: update mac zip manifests * chore: fix patch linting * refactor: implement missing URLLoaderNetworkServiceObserver methods It is against The Mojo Rules to leave hanging callbacks. These always have to be called. Refs:186528aab9
* spec: fix locale test on local linux * fix: pass the exit code correctly in new PreMainMessageLoopRun Refs:2622e91c44
* fix: ensure we early-exit when request_handler_ is not provided Refs:93077afbfb
* fix: strongly set result_code in the BrowserMainLoop * fix: invalid usage of non-targetted PostTask You must always either use a host threadpool or specify a target thread. In this case we did neither after this refactor. Refs:4e33ee0ad3
* chore: fix gn check * chore: remove stray .rej files in patch * chore: add mojo error code to url loader failure * build: ensure CI is truthy in arm test env * fix: handle windowCaptureMacV2 being enabled when fetching media source id Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2709931 Co-authored-by: Charles Kerr <charles@charleskerr.com> Co-authored-by: Shelley Vohr <shelley.vohr@gmail.com> Co-authored-by: deepak1556 <hop2deep@gmail.com> Co-authored-by: Samuel Attard <samuel.r.attard@gmail.com> Co-authored-by: Samuel Attard <sattard@slack-corp.com>
1068 lines
38 KiB
C++
1068 lines
38 KiB
C++
// Copyright (c) 2012 The Chromium Authors. All rights reserved.
|
|
// Copyright (c) 2013 Adam Roben <adam@roben.org>. All rights reserved.
|
|
// Use of this source code is governed by a BSD-style license that can be
|
|
// found in the LICENSE-CHROMIUM file.
|
|
|
|
#include "shell/browser/ui/inspectable_web_contents.h"
|
|
|
|
#include <memory>
|
|
#include <utility>
|
|
|
|
#include "base/base64.h"
|
|
#include "base/guid.h"
|
|
#include "base/json/json_reader.h"
|
|
#include "base/json/json_writer.h"
|
|
#include "base/json/string_escape.h"
|
|
#include "base/metrics/histogram.h"
|
|
#include "base/stl_util.h"
|
|
#include "base/strings/pattern.h"
|
|
#include "base/strings/string_util.h"
|
|
#include "base/strings/stringprintf.h"
|
|
#include "base/strings/utf_string_conversions.h"
|
|
#include "base/task/post_task.h"
|
|
#include "base/values.h"
|
|
#include "components/prefs/pref_registry_simple.h"
|
|
#include "components/prefs/pref_service.h"
|
|
#include "components/prefs/scoped_user_pref_update.h"
|
|
#include "content/public/browser/browser_context.h"
|
|
#include "content/public/browser/browser_task_traits.h"
|
|
#include "content/public/browser/browser_thread.h"
|
|
#include "content/public/browser/file_select_listener.h"
|
|
#include "content/public/browser/file_url_loader.h"
|
|
#include "content/public/browser/host_zoom_map.h"
|
|
#include "content/public/browser/navigation_handle.h"
|
|
#include "content/public/browser/render_frame_host.h"
|
|
#include "content/public/browser/render_view_host.h"
|
|
#include "content/public/browser/shared_cors_origin_access_list.h"
|
|
#include "content/public/browser/storage_partition.h"
|
|
#include "content/public/common/user_agent.h"
|
|
#include "ipc/ipc_channel.h"
|
|
#include "net/http/http_response_headers.h"
|
|
#include "services/network/public/cpp/simple_url_loader.h"
|
|
#include "services/network/public/cpp/simple_url_loader_stream_consumer.h"
|
|
#include "services/network/public/cpp/wrapper_shared_url_loader_factory.h"
|
|
#include "shell/browser/net/asar/asar_url_loader_factory.h"
|
|
#include "shell/browser/protocol_registry.h"
|
|
#include "shell/browser/ui/inspectable_web_contents_delegate.h"
|
|
#include "shell/browser/ui/inspectable_web_contents_view.h"
|
|
#include "shell/browser/ui/inspectable_web_contents_view_delegate.h"
|
|
#include "shell/common/platform_util.h"
|
|
#include "third_party/blink/public/common/logging/logging_utils.h"
|
|
#include "third_party/blink/public/common/page/page_zoom.h"
|
|
#include "ui/display/display.h"
|
|
#include "ui/display/screen.h"
|
|
|
|
#if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
|
|
#include "chrome/common/extensions/chrome_manifest_url_handlers.h"
|
|
#include "content/public/browser/child_process_security_policy.h"
|
|
#include "content/public/browser/render_process_host.h"
|
|
#include "extensions/browser/extension_registry.h"
|
|
#include "extensions/common/permissions/permissions_data.h"
|
|
#include "shell/browser/electron_browser_context.h"
|
|
#endif
|
|
|
|
namespace electron {
|
|
|
|
namespace {
|
|
|
|
const double kPresetZoomFactors[] = {0.25, 0.333, 0.5, 0.666, 0.75, 0.9,
|
|
1.0, 1.1, 1.25, 1.5, 1.75, 2.0,
|
|
2.5, 3.0, 4.0, 5.0};
|
|
|
|
const char kChromeUIDevToolsURL[] =
|
|
"devtools://devtools/bundled/devtools_app.html?"
|
|
"remoteBase=%s&"
|
|
"can_dock=%s&"
|
|
"toolbarColor=rgba(223,223,223,1)&"
|
|
"textColor=rgba(0,0,0,1)&"
|
|
"experiments=true";
|
|
const char kChromeUIDevToolsRemoteFrontendBase[] =
|
|
"https://chrome-devtools-frontend.appspot.com/";
|
|
const char kChromeUIDevToolsRemoteFrontendPath[] = "serve_file";
|
|
|
|
const char kDevToolsBoundsPref[] = "electron.devtools.bounds";
|
|
const char kDevToolsZoomPref[] = "electron.devtools.zoom";
|
|
const char kDevToolsPreferences[] = "electron.devtools.preferences";
|
|
|
|
const char kFrontendHostId[] = "id";
|
|
const char kFrontendHostMethod[] = "method";
|
|
const char kFrontendHostParams[] = "params";
|
|
const char kTitleFormat[] = "Developer Tools - %s";
|
|
|
|
const size_t kMaxMessageChunkSize = IPC::Channel::kMaximumMessageSize / 4;
|
|
|
|
// Stores all instances of InspectableWebContents.
|
|
InspectableWebContents::List g_web_contents_instances_;
|
|
|
|
base::Value RectToDictionary(const gfx::Rect& bounds) {
|
|
base::Value dict(base::Value::Type::DICTIONARY);
|
|
dict.SetKey("x", base::Value(bounds.x()));
|
|
dict.SetKey("y", base::Value(bounds.y()));
|
|
dict.SetKey("width", base::Value(bounds.width()));
|
|
dict.SetKey("height", base::Value(bounds.height()));
|
|
return dict;
|
|
}
|
|
|
|
gfx::Rect DictionaryToRect(const base::Value* dict) {
|
|
const base::Value* found = dict->FindKey("x");
|
|
int x = found ? found->GetInt() : 0;
|
|
|
|
found = dict->FindKey("y");
|
|
int y = found ? found->GetInt() : 0;
|
|
|
|
found = dict->FindKey("width");
|
|
int width = found ? found->GetInt() : 800;
|
|
|
|
found = dict->FindKey("height");
|
|
int height = found ? found->GetInt() : 600;
|
|
|
|
return gfx::Rect(x, y, width, height);
|
|
}
|
|
|
|
bool IsPointInRect(const gfx::Point& point, const gfx::Rect& rect) {
|
|
return point.x() > rect.x() && point.x() < (rect.width() + rect.x()) &&
|
|
point.y() > rect.y() && point.y() < (rect.height() + rect.y());
|
|
}
|
|
|
|
bool IsPointInScreen(const gfx::Point& point) {
|
|
for (const auto& display : display::Screen::GetScreen()->GetAllDisplays()) {
|
|
if (IsPointInRect(point, display.bounds()))
|
|
return true;
|
|
}
|
|
return false;
|
|
}
|
|
|
|
void SetZoomLevelForWebContents(content::WebContents* web_contents,
|
|
double level) {
|
|
content::HostZoomMap::SetZoomLevel(web_contents, level);
|
|
}
|
|
|
|
double GetNextZoomLevel(double level, bool out) {
|
|
double factor = blink::PageZoomLevelToZoomFactor(level);
|
|
size_t size = base::size(kPresetZoomFactors);
|
|
for (size_t i = 0; i < size; ++i) {
|
|
if (!blink::PageZoomValuesEqual(kPresetZoomFactors[i], factor))
|
|
continue;
|
|
if (out && i > 0)
|
|
return blink::PageZoomFactorToZoomLevel(kPresetZoomFactors[i - 1]);
|
|
if (!out && i != size - 1)
|
|
return blink::PageZoomFactorToZoomLevel(kPresetZoomFactors[i + 1]);
|
|
}
|
|
return level;
|
|
}
|
|
|
|
GURL GetRemoteBaseURL() {
|
|
return GURL(base::StringPrintf("%s%s/%s/",
|
|
kChromeUIDevToolsRemoteFrontendBase,
|
|
kChromeUIDevToolsRemoteFrontendPath,
|
|
content::GetWebKitRevision().c_str()));
|
|
}
|
|
|
|
GURL GetDevToolsURL(bool can_dock) {
|
|
auto url_string = base::StringPrintf(kChromeUIDevToolsURL,
|
|
GetRemoteBaseURL().spec().c_str(),
|
|
can_dock ? "true" : "");
|
|
return GURL(url_string);
|
|
}
|
|
|
|
constexpr base::TimeDelta kInitialBackoffDelay =
|
|
base::TimeDelta::FromMilliseconds(250);
|
|
constexpr base::TimeDelta kMaxBackoffDelay = base::TimeDelta::FromSeconds(10);
|
|
|
|
} // namespace
|
|
|
|
class InspectableWebContents::NetworkResourceLoader
|
|
: public network::SimpleURLLoaderStreamConsumer {
|
|
public:
|
|
class URLLoaderFactoryHolder {
|
|
public:
|
|
network::mojom::URLLoaderFactory* get() {
|
|
return ptr_.get() ? ptr_.get() : refptr_.get();
|
|
}
|
|
void operator=(std::unique_ptr<network::mojom::URLLoaderFactory>&& ptr) {
|
|
ptr_ = std::move(ptr);
|
|
}
|
|
void operator=(scoped_refptr<network::SharedURLLoaderFactory>&& refptr) {
|
|
refptr_ = std::move(refptr);
|
|
}
|
|
|
|
private:
|
|
std::unique_ptr<network::mojom::URLLoaderFactory> ptr_;
|
|
scoped_refptr<network::SharedURLLoaderFactory> refptr_;
|
|
};
|
|
|
|
static void Create(int stream_id,
|
|
InspectableWebContents* bindings,
|
|
const network::ResourceRequest& resource_request,
|
|
const net::NetworkTrafficAnnotationTag& traffic_annotation,
|
|
URLLoaderFactoryHolder url_loader_factory,
|
|
DispatchCallback callback,
|
|
base::TimeDelta retry_delay = base::TimeDelta()) {
|
|
auto resource_loader =
|
|
std::make_unique<InspectableWebContents::NetworkResourceLoader>(
|
|
stream_id, bindings, resource_request, traffic_annotation,
|
|
std::move(url_loader_factory), std::move(callback), retry_delay);
|
|
bindings->loaders_.insert(std::move(resource_loader));
|
|
}
|
|
|
|
NetworkResourceLoader(
|
|
int stream_id,
|
|
InspectableWebContents* bindings,
|
|
const network::ResourceRequest& resource_request,
|
|
const net::NetworkTrafficAnnotationTag& traffic_annotation,
|
|
URLLoaderFactoryHolder url_loader_factory,
|
|
DispatchCallback callback,
|
|
base::TimeDelta delay)
|
|
: stream_id_(stream_id),
|
|
bindings_(bindings),
|
|
resource_request_(resource_request),
|
|
traffic_annotation_(traffic_annotation),
|
|
loader_(network::SimpleURLLoader::Create(
|
|
std::make_unique<network::ResourceRequest>(resource_request),
|
|
traffic_annotation)),
|
|
url_loader_factory_(std::move(url_loader_factory)),
|
|
callback_(std::move(callback)),
|
|
retry_delay_(delay) {
|
|
loader_->SetOnResponseStartedCallback(base::BindOnce(
|
|
&NetworkResourceLoader::OnResponseStarted, base::Unretained(this)));
|
|
timer_.Start(FROM_HERE, delay,
|
|
base::BindRepeating(&NetworkResourceLoader::DownloadAsStream,
|
|
base::Unretained(this)));
|
|
}
|
|
|
|
NetworkResourceLoader(const NetworkResourceLoader&) = delete;
|
|
NetworkResourceLoader& operator=(const NetworkResourceLoader&) = delete;
|
|
|
|
private:
|
|
void DownloadAsStream() {
|
|
loader_->DownloadAsStream(url_loader_factory_.get(), this);
|
|
}
|
|
|
|
base::TimeDelta GetNextExponentialBackoffDelay(const base::TimeDelta& delta) {
|
|
if (delta.is_zero()) {
|
|
return kInitialBackoffDelay;
|
|
} else {
|
|
return delta * 1.3;
|
|
}
|
|
}
|
|
|
|
void OnResponseStarted(const GURL& final_url,
|
|
const network::mojom::URLResponseHead& response_head) {
|
|
response_headers_ = response_head.headers;
|
|
}
|
|
|
|
void OnDataReceived(base::StringPiece chunk,
|
|
base::OnceClosure resume) override {
|
|
base::Value chunkValue;
|
|
|
|
bool encoded = !base::IsStringUTF8(chunk);
|
|
if (encoded) {
|
|
std::string encoded_string;
|
|
base::Base64Encode(chunk, &encoded_string);
|
|
chunkValue = base::Value(std::move(encoded_string));
|
|
} else {
|
|
chunkValue = base::Value(chunk);
|
|
}
|
|
base::Value id(stream_id_);
|
|
base::Value encodedValue(encoded);
|
|
|
|
bindings_->CallClientFunction("DevToolsAPI.streamWrite", &id, &chunkValue,
|
|
&encodedValue);
|
|
std::move(resume).Run();
|
|
}
|
|
|
|
void OnComplete(bool success) override {
|
|
if (!success && loader_->NetError() == net::ERR_INSUFFICIENT_RESOURCES &&
|
|
retry_delay_ < kMaxBackoffDelay) {
|
|
const base::TimeDelta delay =
|
|
GetNextExponentialBackoffDelay(retry_delay_);
|
|
LOG(WARNING) << "InspectableWebContents::NetworkResourceLoader id = "
|
|
<< stream_id_
|
|
<< " failed with insufficient resources, retrying in "
|
|
<< delay << "." << std::endl;
|
|
NetworkResourceLoader::Create(
|
|
stream_id_, bindings_, resource_request_, traffic_annotation_,
|
|
std::move(url_loader_factory_), std::move(callback_), delay);
|
|
} else {
|
|
base::DictionaryValue response;
|
|
response.SetInteger("statusCode", response_headers_
|
|
? response_headers_->response_code()
|
|
: 200);
|
|
|
|
auto headers = std::make_unique<base::DictionaryValue>();
|
|
size_t iterator = 0;
|
|
std::string name;
|
|
std::string value;
|
|
while (response_headers_ &&
|
|
response_headers_->EnumerateHeaderLines(&iterator, &name, &value))
|
|
headers->SetString(name, value);
|
|
|
|
response.Set("headers", std::move(headers));
|
|
std::move(callback_).Run(&response);
|
|
}
|
|
|
|
bindings_->loaders_.erase(bindings_->loaders_.find(this));
|
|
}
|
|
|
|
void OnRetry(base::OnceClosure start_retry) override {}
|
|
|
|
const int stream_id_;
|
|
InspectableWebContents* const bindings_;
|
|
const network::ResourceRequest resource_request_;
|
|
const net::NetworkTrafficAnnotationTag traffic_annotation_;
|
|
std::unique_ptr<network::SimpleURLLoader> loader_;
|
|
URLLoaderFactoryHolder url_loader_factory_;
|
|
DispatchCallback callback_;
|
|
scoped_refptr<net::HttpResponseHeaders> response_headers_;
|
|
base::OneShotTimer timer_;
|
|
base::TimeDelta retry_delay_;
|
|
};
|
|
|
|
// Implemented separately on each platform.
|
|
InspectableWebContentsView* CreateInspectableContentsView(
|
|
InspectableWebContents* inspectable_web_contents);
|
|
|
|
// static
|
|
const InspectableWebContents::List& InspectableWebContents::GetAll() {
|
|
return g_web_contents_instances_;
|
|
}
|
|
|
|
// static
|
|
void InspectableWebContents::RegisterPrefs(PrefRegistrySimple* registry) {
|
|
registry->RegisterDictionaryPref(kDevToolsBoundsPref,
|
|
RectToDictionary(gfx::Rect(0, 0, 800, 600)));
|
|
registry->RegisterDoublePref(kDevToolsZoomPref, 0.);
|
|
registry->RegisterDictionaryPref(kDevToolsPreferences);
|
|
}
|
|
|
|
InspectableWebContents::InspectableWebContents(
|
|
content::WebContents* web_contents,
|
|
PrefService* pref_service,
|
|
bool is_guest)
|
|
: pref_service_(pref_service),
|
|
web_contents_(web_contents),
|
|
is_guest_(is_guest),
|
|
view_(CreateInspectableContentsView(this)) {
|
|
const base::Value* bounds_dict = pref_service_->Get(kDevToolsBoundsPref);
|
|
if (bounds_dict->is_dict()) {
|
|
devtools_bounds_ = DictionaryToRect(bounds_dict);
|
|
// Sometimes the devtools window is out of screen or has too small size.
|
|
if (devtools_bounds_.height() < 100 || devtools_bounds_.width() < 100) {
|
|
devtools_bounds_.set_height(600);
|
|
devtools_bounds_.set_width(800);
|
|
}
|
|
if (!IsPointInScreen(devtools_bounds_.origin())) {
|
|
gfx::Rect display;
|
|
if (!is_guest && web_contents->GetNativeView()) {
|
|
display = display::Screen::GetScreen()
|
|
->GetDisplayNearestView(web_contents->GetNativeView())
|
|
.bounds();
|
|
} else {
|
|
display = display::Screen::GetScreen()->GetPrimaryDisplay().bounds();
|
|
}
|
|
|
|
devtools_bounds_.set_x(display.x() +
|
|
(display.width() - devtools_bounds_.width()) / 2);
|
|
devtools_bounds_.set_y(
|
|
display.y() + (display.height() - devtools_bounds_.height()) / 2);
|
|
}
|
|
}
|
|
g_web_contents_instances_.push_back(this);
|
|
}
|
|
|
|
InspectableWebContents::~InspectableWebContents() {
|
|
g_web_contents_instances_.remove(this);
|
|
// Unsubscribe from devtools and Clean up resources.
|
|
if (GetDevToolsWebContents())
|
|
WebContentsDestroyed();
|
|
// Let destructor destroy managed_devtools_web_contents_.
|
|
}
|
|
|
|
InspectableWebContentsView* InspectableWebContents::GetView() const {
|
|
return view_.get();
|
|
}
|
|
|
|
content::WebContents* InspectableWebContents::GetWebContents() const {
|
|
return web_contents_.get();
|
|
}
|
|
|
|
content::WebContents* InspectableWebContents::GetDevToolsWebContents() const {
|
|
if (external_devtools_web_contents_)
|
|
return external_devtools_web_contents_;
|
|
else
|
|
return managed_devtools_web_contents_.get();
|
|
}
|
|
|
|
void InspectableWebContents::InspectElement(int x, int y) {
|
|
if (agent_host_)
|
|
agent_host_->InspectElement(web_contents_->GetMainFrame(), x, y);
|
|
}
|
|
|
|
void InspectableWebContents::SetDelegate(
|
|
InspectableWebContentsDelegate* delegate) {
|
|
delegate_ = delegate;
|
|
}
|
|
|
|
InspectableWebContentsDelegate* InspectableWebContents::GetDelegate() const {
|
|
return delegate_;
|
|
}
|
|
|
|
bool InspectableWebContents::IsGuest() const {
|
|
return is_guest_;
|
|
}
|
|
|
|
void InspectableWebContents::ReleaseWebContents() {
|
|
web_contents_.release();
|
|
WebContentsDestroyed();
|
|
view_.reset();
|
|
}
|
|
|
|
void InspectableWebContents::SetDockState(const std::string& state) {
|
|
if (state == "detach") {
|
|
can_dock_ = false;
|
|
} else {
|
|
can_dock_ = true;
|
|
dock_state_ = state;
|
|
}
|
|
}
|
|
|
|
void InspectableWebContents::SetDevToolsWebContents(
|
|
content::WebContents* devtools) {
|
|
if (!managed_devtools_web_contents_)
|
|
external_devtools_web_contents_ = devtools;
|
|
}
|
|
|
|
void InspectableWebContents::ShowDevTools(bool activate) {
|
|
if (embedder_message_dispatcher_) {
|
|
if (managed_devtools_web_contents_)
|
|
view_->ShowDevTools(activate);
|
|
return;
|
|
}
|
|
|
|
activate_ = activate;
|
|
|
|
// Show devtools only after it has done loading, this is to make sure the
|
|
// SetIsDocked is called *BEFORE* ShowDevTools.
|
|
embedder_message_dispatcher_ =
|
|
DevToolsEmbedderMessageDispatcher::CreateForDevToolsFrontend(this);
|
|
|
|
if (!external_devtools_web_contents_) { // no external devtools
|
|
managed_devtools_web_contents_ = content::WebContents::Create(
|
|
content::WebContents::CreateParams(web_contents_->GetBrowserContext()));
|
|
managed_devtools_web_contents_->SetDelegate(this);
|
|
}
|
|
|
|
Observe(GetDevToolsWebContents());
|
|
AttachTo(content::DevToolsAgentHost::GetOrCreateFor(web_contents_.get()));
|
|
|
|
GetDevToolsWebContents()->GetController().LoadURL(
|
|
GetDevToolsURL(can_dock_), content::Referrer(),
|
|
ui::PAGE_TRANSITION_AUTO_TOPLEVEL, std::string());
|
|
}
|
|
|
|
void InspectableWebContents::CloseDevTools() {
|
|
if (GetDevToolsWebContents()) {
|
|
frontend_loaded_ = false;
|
|
if (managed_devtools_web_contents_) {
|
|
view_->CloseDevTools();
|
|
managed_devtools_web_contents_.reset();
|
|
}
|
|
embedder_message_dispatcher_.reset();
|
|
if (!IsGuest())
|
|
web_contents_->Focus();
|
|
}
|
|
}
|
|
|
|
bool InspectableWebContents::IsDevToolsViewShowing() {
|
|
return managed_devtools_web_contents_ && view_->IsDevToolsViewShowing();
|
|
}
|
|
|
|
void InspectableWebContents::AttachTo(
|
|
scoped_refptr<content::DevToolsAgentHost> host) {
|
|
Detach();
|
|
agent_host_ = std::move(host);
|
|
// We could use ForceAttachClient here if problem arises with
|
|
// devtools multiple session support.
|
|
agent_host_->AttachClient(this);
|
|
}
|
|
|
|
void InspectableWebContents::Detach() {
|
|
if (agent_host_)
|
|
agent_host_->DetachClient(this);
|
|
agent_host_ = nullptr;
|
|
}
|
|
|
|
void InspectableWebContents::Reattach(DispatchCallback callback) {
|
|
if (agent_host_) {
|
|
agent_host_->DetachClient(this);
|
|
agent_host_->AttachClient(this);
|
|
}
|
|
std::move(callback).Run(nullptr);
|
|
}
|
|
|
|
void InspectableWebContents::CallClientFunction(
|
|
const std::string& function_name,
|
|
const base::Value* arg1,
|
|
const base::Value* arg2,
|
|
const base::Value* arg3) {
|
|
if (!GetDevToolsWebContents())
|
|
return;
|
|
|
|
std::string javascript = function_name + "(";
|
|
if (arg1) {
|
|
std::string json;
|
|
base::JSONWriter::Write(*arg1, &json);
|
|
javascript.append(json);
|
|
if (arg2) {
|
|
base::JSONWriter::Write(*arg2, &json);
|
|
javascript.append(", ").append(json);
|
|
if (arg3) {
|
|
base::JSONWriter::Write(*arg3, &json);
|
|
javascript.append(", ").append(json);
|
|
}
|
|
}
|
|
}
|
|
javascript.append(");");
|
|
GetDevToolsWebContents()->GetMainFrame()->ExecuteJavaScript(
|
|
base::UTF8ToUTF16(javascript), base::NullCallback());
|
|
}
|
|
|
|
gfx::Rect InspectableWebContents::GetDevToolsBounds() const {
|
|
return devtools_bounds_;
|
|
}
|
|
|
|
void InspectableWebContents::SaveDevToolsBounds(const gfx::Rect& bounds) {
|
|
pref_service_->Set(kDevToolsBoundsPref, RectToDictionary(bounds));
|
|
devtools_bounds_ = bounds;
|
|
}
|
|
|
|
double InspectableWebContents::GetDevToolsZoomLevel() const {
|
|
return pref_service_->GetDouble(kDevToolsZoomPref);
|
|
}
|
|
|
|
void InspectableWebContents::UpdateDevToolsZoomLevel(double level) {
|
|
pref_service_->SetDouble(kDevToolsZoomPref, level);
|
|
}
|
|
|
|
void InspectableWebContents::ActivateWindow() {
|
|
// Set the zoom level.
|
|
SetZoomLevelForWebContents(GetDevToolsWebContents(), GetDevToolsZoomLevel());
|
|
}
|
|
|
|
void InspectableWebContents::CloseWindow() {
|
|
GetDevToolsWebContents()->DispatchBeforeUnload(false /* auto_cancel */);
|
|
}
|
|
|
|
void InspectableWebContents::LoadCompleted() {
|
|
frontend_loaded_ = true;
|
|
if (managed_devtools_web_contents_)
|
|
view_->ShowDevTools(activate_);
|
|
|
|
// If the devtools can dock, "SetIsDocked" will be called by devtools itself.
|
|
if (!can_dock_) {
|
|
SetIsDocked(DispatchCallback(), false);
|
|
} else {
|
|
if (dock_state_.empty()) {
|
|
const base::DictionaryValue* prefs =
|
|
pref_service_->GetDictionary(kDevToolsPreferences);
|
|
std::string current_dock_state;
|
|
prefs->GetString("currentDockState", ¤t_dock_state);
|
|
base::RemoveChars(current_dock_state, "\"", &dock_state_);
|
|
}
|
|
std::u16string javascript = base::UTF8ToUTF16(
|
|
"UI.DockController.instance().setDockSide(\"" + dock_state_ + "\");");
|
|
GetDevToolsWebContents()->GetMainFrame()->ExecuteJavaScript(
|
|
javascript, base::NullCallback());
|
|
}
|
|
|
|
#if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
|
|
AddDevToolsExtensionsToClient();
|
|
#endif
|
|
|
|
if (view_->GetDelegate())
|
|
view_->GetDelegate()->DevToolsOpened();
|
|
}
|
|
|
|
#if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
|
|
void InspectableWebContents::AddDevToolsExtensionsToClient() {
|
|
// get main browser context
|
|
auto* browser_context = web_contents_->GetBrowserContext();
|
|
const extensions::ExtensionRegistry* registry =
|
|
extensions::ExtensionRegistry::Get(browser_context);
|
|
if (!registry)
|
|
return;
|
|
|
|
base::ListValue results;
|
|
for (auto& extension : registry->enabled_extensions()) {
|
|
auto devtools_page_url =
|
|
extensions::chrome_manifest_urls::GetDevToolsPage(extension.get());
|
|
if (devtools_page_url.is_empty())
|
|
continue;
|
|
|
|
// Each devtools extension will need to be able to run in the devtools
|
|
// process. Grant the devtools process the ability to request URLs from the
|
|
// extension.
|
|
content::ChildProcessSecurityPolicy::GetInstance()->GrantRequestOrigin(
|
|
web_contents_->GetMainFrame()->GetProcess()->GetID(),
|
|
url::Origin::Create(extension->url()));
|
|
|
|
std::unique_ptr<base::DictionaryValue> extension_info(
|
|
new base::DictionaryValue());
|
|
extension_info->SetString("startPage", devtools_page_url.spec());
|
|
extension_info->SetString("name", extension->name());
|
|
extension_info->SetBoolean(
|
|
"exposeExperimentalAPIs",
|
|
extension->permissions_data()->HasAPIPermission(
|
|
extensions::mojom::APIPermissionID::kExperimental));
|
|
results.Append(std::move(extension_info));
|
|
}
|
|
|
|
CallClientFunction("DevToolsAPI.addExtensions", &results, NULL, NULL);
|
|
}
|
|
#endif
|
|
|
|
void InspectableWebContents::SetInspectedPageBounds(const gfx::Rect& rect) {
|
|
DevToolsContentsResizingStrategy strategy(rect);
|
|
if (contents_resizing_strategy_.Equals(strategy))
|
|
return;
|
|
|
|
contents_resizing_strategy_.CopyFrom(strategy);
|
|
if (managed_devtools_web_contents_)
|
|
view_->SetContentsResizingStrategy(contents_resizing_strategy_);
|
|
}
|
|
|
|
void InspectableWebContents::InspectElementCompleted() {}
|
|
|
|
void InspectableWebContents::InspectedURLChanged(const std::string& url) {
|
|
if (managed_devtools_web_contents_)
|
|
view_->SetTitle(
|
|
base::UTF8ToUTF16(base::StringPrintf(kTitleFormat, url.c_str())));
|
|
}
|
|
|
|
void InspectableWebContents::LoadNetworkResource(DispatchCallback callback,
|
|
const std::string& url,
|
|
const std::string& headers,
|
|
int stream_id) {
|
|
GURL gurl(url);
|
|
if (!gurl.is_valid()) {
|
|
base::DictionaryValue response;
|
|
response.SetInteger("statusCode", 404);
|
|
std::move(callback).Run(&response);
|
|
return;
|
|
}
|
|
|
|
// Create traffic annotation tag.
|
|
net::NetworkTrafficAnnotationTag traffic_annotation =
|
|
net::DefineNetworkTrafficAnnotation("devtools_network_resource", R"(
|
|
semantics {
|
|
sender: "Developer Tools"
|
|
description:
|
|
"When user opens Developer Tools, the browser may fetch additional "
|
|
"resources from the network to enrich the debugging experience "
|
|
"(e.g. source map resources)."
|
|
trigger: "User opens Developer Tools to debug a web page."
|
|
data: "Any resources requested by Developer Tools."
|
|
destination: WEBSITE
|
|
}
|
|
policy {
|
|
cookies_allowed: YES
|
|
cookies_store: "user"
|
|
setting:
|
|
"It's not possible to disable this feature from settings."
|
|
})");
|
|
|
|
network::ResourceRequest resource_request;
|
|
resource_request.url = gurl;
|
|
resource_request.site_for_cookies = net::SiteForCookies::FromUrl(gurl);
|
|
resource_request.headers.AddHeadersFromString(headers);
|
|
|
|
auto* protocol_registry = ProtocolRegistry::FromBrowserContext(
|
|
GetDevToolsWebContents()->GetBrowserContext());
|
|
NetworkResourceLoader::URLLoaderFactoryHolder url_loader_factory;
|
|
if (gurl.SchemeIsFile()) {
|
|
mojo::PendingRemote<network::mojom::URLLoaderFactory> pending_remote =
|
|
AsarURLLoaderFactory::Create();
|
|
url_loader_factory = network::SharedURLLoaderFactory::Create(
|
|
std::make_unique<network::WrapperPendingSharedURLLoaderFactory>(
|
|
std::move(pending_remote)));
|
|
} else if (protocol_registry->IsProtocolRegistered(gurl.scheme())) {
|
|
auto& protocol_handler = protocol_registry->handlers().at(gurl.scheme());
|
|
mojo::PendingRemote<network::mojom::URLLoaderFactory> pending_remote =
|
|
ElectronURLLoaderFactory::Create(protocol_handler.first,
|
|
protocol_handler.second);
|
|
url_loader_factory = network::SharedURLLoaderFactory::Create(
|
|
std::make_unique<network::WrapperPendingSharedURLLoaderFactory>(
|
|
std::move(pending_remote)));
|
|
} else {
|
|
auto* partition = content::BrowserContext::GetDefaultStoragePartition(
|
|
GetDevToolsWebContents()->GetBrowserContext());
|
|
url_loader_factory = partition->GetURLLoaderFactoryForBrowserProcess();
|
|
}
|
|
|
|
NetworkResourceLoader::Create(
|
|
stream_id, this, resource_request, traffic_annotation,
|
|
std::move(url_loader_factory), std::move(callback));
|
|
}
|
|
|
|
void InspectableWebContents::SetIsDocked(DispatchCallback callback,
|
|
bool docked) {
|
|
if (managed_devtools_web_contents_)
|
|
view_->SetIsDocked(docked, activate_);
|
|
if (!callback.is_null())
|
|
std::move(callback).Run(nullptr);
|
|
}
|
|
|
|
void InspectableWebContents::OpenInNewTab(const std::string& url) {}
|
|
|
|
void InspectableWebContents::ShowItemInFolder(
|
|
const std::string& file_system_path) {
|
|
if (file_system_path.empty())
|
|
return;
|
|
|
|
base::FilePath path = base::FilePath::FromUTF8Unsafe(file_system_path);
|
|
|
|
// Pass empty callback here; we can ignore errors
|
|
platform_util::OpenPath(path, platform_util::OpenCallback());
|
|
}
|
|
|
|
void InspectableWebContents::SaveToFile(const std::string& url,
|
|
const std::string& content,
|
|
bool save_as) {
|
|
if (delegate_)
|
|
delegate_->DevToolsSaveToFile(url, content, save_as);
|
|
}
|
|
|
|
void InspectableWebContents::AppendToFile(const std::string& url,
|
|
const std::string& content) {
|
|
if (delegate_)
|
|
delegate_->DevToolsAppendToFile(url, content);
|
|
}
|
|
|
|
void InspectableWebContents::RequestFileSystems() {
|
|
if (delegate_)
|
|
delegate_->DevToolsRequestFileSystems();
|
|
}
|
|
|
|
void InspectableWebContents::AddFileSystem(const std::string& type) {
|
|
if (delegate_)
|
|
delegate_->DevToolsAddFileSystem(type, base::FilePath());
|
|
}
|
|
|
|
void InspectableWebContents::RemoveFileSystem(
|
|
const std::string& file_system_path) {
|
|
if (delegate_)
|
|
delegate_->DevToolsRemoveFileSystem(
|
|
base::FilePath::FromUTF8Unsafe(file_system_path));
|
|
}
|
|
|
|
void InspectableWebContents::UpgradeDraggedFileSystemPermissions(
|
|
const std::string& file_system_url) {}
|
|
|
|
void InspectableWebContents::IndexPath(int request_id,
|
|
const std::string& file_system_path,
|
|
const std::string& excluded_folders) {
|
|
if (delegate_)
|
|
delegate_->DevToolsIndexPath(request_id, file_system_path,
|
|
excluded_folders);
|
|
}
|
|
|
|
void InspectableWebContents::StopIndexing(int request_id) {
|
|
if (delegate_)
|
|
delegate_->DevToolsStopIndexing(request_id);
|
|
}
|
|
|
|
void InspectableWebContents::SearchInPath(int request_id,
|
|
const std::string& file_system_path,
|
|
const std::string& query) {
|
|
if (delegate_)
|
|
delegate_->DevToolsSearchInPath(request_id, file_system_path, query);
|
|
}
|
|
|
|
void InspectableWebContents::SetWhitelistedShortcuts(
|
|
const std::string& message) {}
|
|
|
|
void InspectableWebContents::SetEyeDropperActive(bool active) {}
|
|
void InspectableWebContents::ShowCertificateViewer(
|
|
const std::string& cert_chain) {}
|
|
|
|
void InspectableWebContents::ZoomIn() {
|
|
double new_level = GetNextZoomLevel(GetDevToolsZoomLevel(), false);
|
|
SetZoomLevelForWebContents(GetDevToolsWebContents(), new_level);
|
|
UpdateDevToolsZoomLevel(new_level);
|
|
}
|
|
|
|
void InspectableWebContents::ZoomOut() {
|
|
double new_level = GetNextZoomLevel(GetDevToolsZoomLevel(), true);
|
|
SetZoomLevelForWebContents(GetDevToolsWebContents(), new_level);
|
|
UpdateDevToolsZoomLevel(new_level);
|
|
}
|
|
|
|
void InspectableWebContents::ResetZoom() {
|
|
SetZoomLevelForWebContents(GetDevToolsWebContents(), 0.);
|
|
UpdateDevToolsZoomLevel(0.);
|
|
}
|
|
|
|
void InspectableWebContents::SetDevicesDiscoveryConfig(
|
|
bool discover_usb_devices,
|
|
bool port_forwarding_enabled,
|
|
const std::string& port_forwarding_config,
|
|
bool network_discovery_enabled,
|
|
const std::string& network_discovery_config) {}
|
|
|
|
void InspectableWebContents::SetDevicesUpdatesEnabled(bool enabled) {}
|
|
|
|
void InspectableWebContents::PerformActionOnRemotePage(
|
|
const std::string& page_id,
|
|
const std::string& action) {}
|
|
|
|
void InspectableWebContents::OpenRemotePage(const std::string& browser_id,
|
|
const std::string& url) {}
|
|
|
|
void InspectableWebContents::OpenNodeFrontend() {}
|
|
|
|
void InspectableWebContents::DispatchProtocolMessageFromDevToolsFrontend(
|
|
const std::string& message) {
|
|
// If the devtools wants to reload the page, hijack the message and handle it
|
|
// to the delegate.
|
|
if (base::MatchPattern(message,
|
|
"{\"id\":*,"
|
|
"\"method\":\"Page.reload\","
|
|
"\"params\":*}")) {
|
|
if (delegate_)
|
|
delegate_->DevToolsReloadPage();
|
|
return;
|
|
}
|
|
|
|
if (agent_host_)
|
|
agent_host_->DispatchProtocolMessage(
|
|
this, base::as_bytes(base::make_span(message)));
|
|
}
|
|
|
|
void InspectableWebContents::SendJsonRequest(DispatchCallback callback,
|
|
const std::string& browser_id,
|
|
const std::string& url) {
|
|
std::move(callback).Run(nullptr);
|
|
}
|
|
|
|
void InspectableWebContents::GetPreferences(DispatchCallback callback) {
|
|
const base::DictionaryValue* prefs =
|
|
pref_service_->GetDictionary(kDevToolsPreferences);
|
|
std::move(callback).Run(prefs);
|
|
}
|
|
|
|
void InspectableWebContents::SetPreference(const std::string& name,
|
|
const std::string& value) {
|
|
DictionaryPrefUpdate update(pref_service_, kDevToolsPreferences);
|
|
update.Get()->SetKey(name, base::Value(value));
|
|
}
|
|
|
|
void InspectableWebContents::RemovePreference(const std::string& name) {
|
|
DictionaryPrefUpdate update(pref_service_, kDevToolsPreferences);
|
|
update.Get()->RemoveWithoutPathExpansion(name, nullptr);
|
|
}
|
|
|
|
void InspectableWebContents::ClearPreferences() {
|
|
DictionaryPrefUpdate update(pref_service_, kDevToolsPreferences);
|
|
update.Get()->Clear();
|
|
}
|
|
|
|
void InspectableWebContents::ConnectionReady() {}
|
|
|
|
void InspectableWebContents::RegisterExtensionsAPI(const std::string& origin,
|
|
const std::string& script) {
|
|
extensions_api_[origin + "/"] = script;
|
|
}
|
|
|
|
void InspectableWebContents::HandleMessageFromDevToolsFrontend(
|
|
const std::string& message) {
|
|
// TODO(alexeykuzmin): Should we expect it to exist?
|
|
if (!embedder_message_dispatcher_) {
|
|
return;
|
|
}
|
|
|
|
std::string method;
|
|
base::ListValue empty_params;
|
|
base::ListValue* params = &empty_params;
|
|
|
|
base::DictionaryValue* dict = nullptr;
|
|
std::unique_ptr<base::Value> parsed_message(
|
|
base::JSONReader::ReadDeprecated(message));
|
|
if (!parsed_message || !parsed_message->GetAsDictionary(&dict) ||
|
|
!dict->GetString(kFrontendHostMethod, &method) ||
|
|
(dict->HasKey(kFrontendHostParams) &&
|
|
!dict->GetList(kFrontendHostParams, ¶ms))) {
|
|
LOG(ERROR) << "Invalid message was sent to embedder: " << message;
|
|
return;
|
|
}
|
|
int id = 0;
|
|
dict->GetInteger(kFrontendHostId, &id);
|
|
embedder_message_dispatcher_->Dispatch(
|
|
base::BindRepeating(&InspectableWebContents::SendMessageAck,
|
|
weak_factory_.GetWeakPtr(), id),
|
|
method, params);
|
|
}
|
|
|
|
void InspectableWebContents::DispatchProtocolMessage(
|
|
content::DevToolsAgentHost* agent_host,
|
|
base::span<const uint8_t> message) {
|
|
if (!frontend_loaded_)
|
|
return;
|
|
|
|
base::StringPiece str_message(reinterpret_cast<const char*>(message.data()),
|
|
message.size());
|
|
if (str_message.size() < kMaxMessageChunkSize) {
|
|
std::string param;
|
|
base::EscapeJSONString(str_message, true, ¶m);
|
|
std::u16string javascript =
|
|
base::UTF8ToUTF16("DevToolsAPI.dispatchMessage(" + param + ");");
|
|
GetDevToolsWebContents()->GetMainFrame()->ExecuteJavaScript(
|
|
javascript, base::NullCallback());
|
|
return;
|
|
}
|
|
|
|
base::Value total_size(static_cast<int>(str_message.length()));
|
|
for (size_t pos = 0; pos < str_message.length();
|
|
pos += kMaxMessageChunkSize) {
|
|
base::Value message_value(str_message.substr(pos, kMaxMessageChunkSize));
|
|
CallClientFunction("DevToolsAPI.dispatchMessageChunk", &message_value,
|
|
pos ? nullptr : &total_size, nullptr);
|
|
}
|
|
}
|
|
|
|
void InspectableWebContents::AgentHostClosed(
|
|
content::DevToolsAgentHost* agent_host) {}
|
|
|
|
void InspectableWebContents::RenderFrameHostChanged(
|
|
content::RenderFrameHost* old_host,
|
|
content::RenderFrameHost* new_host) {
|
|
if (new_host->GetParent())
|
|
return;
|
|
frontend_host_ = content::DevToolsFrontendHost::Create(
|
|
new_host, base::BindRepeating(
|
|
&InspectableWebContents::HandleMessageFromDevToolsFrontend,
|
|
weak_factory_.GetWeakPtr()));
|
|
}
|
|
|
|
void InspectableWebContents::WebContentsDestroyed() {
|
|
if (managed_devtools_web_contents_)
|
|
managed_devtools_web_contents_->SetDelegate(nullptr);
|
|
|
|
frontend_loaded_ = false;
|
|
external_devtools_web_contents_ = nullptr;
|
|
Observe(nullptr);
|
|
Detach();
|
|
embedder_message_dispatcher_.reset();
|
|
|
|
if (view_ && view_->GetDelegate())
|
|
view_->GetDelegate()->DevToolsClosed();
|
|
}
|
|
|
|
bool InspectableWebContents::DidAddMessageToConsole(
|
|
content::WebContents* source,
|
|
blink::mojom::ConsoleMessageLevel level,
|
|
const std::u16string& message,
|
|
int32_t line_no,
|
|
const std::u16string& source_id) {
|
|
logging::LogMessage("CONSOLE", line_no,
|
|
blink::ConsoleMessageLevelToLogSeverity(level))
|
|
.stream()
|
|
<< "\"" << message << "\", source: " << source_id << " (" << line_no
|
|
<< ")";
|
|
return true;
|
|
}
|
|
|
|
bool InspectableWebContents::HandleKeyboardEvent(
|
|
content::WebContents* source,
|
|
const content::NativeWebKeyboardEvent& event) {
|
|
auto* delegate = web_contents_->GetDelegate();
|
|
return !delegate || delegate->HandleKeyboardEvent(source, event);
|
|
}
|
|
|
|
void InspectableWebContents::CloseContents(content::WebContents* source) {
|
|
// This is where the devtools closes itself (by clicking the x button).
|
|
CloseDevTools();
|
|
}
|
|
|
|
content::ColorChooser* InspectableWebContents::OpenColorChooser(
|
|
content::WebContents* source,
|
|
SkColor color,
|
|
const std::vector<blink::mojom::ColorSuggestionPtr>& suggestions) {
|
|
auto* delegate = web_contents_->GetDelegate();
|
|
if (delegate)
|
|
return delegate->OpenColorChooser(source, color, suggestions);
|
|
return nullptr;
|
|
}
|
|
|
|
void InspectableWebContents::RunFileChooser(
|
|
content::RenderFrameHost* render_frame_host,
|
|
scoped_refptr<content::FileSelectListener> listener,
|
|
const blink::mojom::FileChooserParams& params) {
|
|
auto* delegate = web_contents_->GetDelegate();
|
|
if (delegate)
|
|
delegate->RunFileChooser(render_frame_host, std::move(listener), params);
|
|
}
|
|
|
|
void InspectableWebContents::EnumerateDirectory(
|
|
content::WebContents* source,
|
|
scoped_refptr<content::FileSelectListener> listener,
|
|
const base::FilePath& path) {
|
|
auto* delegate = web_contents_->GetDelegate();
|
|
if (delegate)
|
|
delegate->EnumerateDirectory(source, std::move(listener), path);
|
|
}
|
|
|
|
void InspectableWebContents::OnWebContentsFocused(
|
|
content::RenderWidgetHost* render_widget_host) {
|
|
#if defined(TOOLKIT_VIEWS)
|
|
if (view_->GetDelegate())
|
|
view_->GetDelegate()->DevToolsFocused();
|
|
#endif
|
|
}
|
|
|
|
void InspectableWebContents::ReadyToCommitNavigation(
|
|
content::NavigationHandle* navigation_handle) {
|
|
if (navigation_handle->IsInMainFrame()) {
|
|
if (navigation_handle->GetRenderFrameHost() ==
|
|
GetDevToolsWebContents()->GetMainFrame() &&
|
|
frontend_host_) {
|
|
return;
|
|
}
|
|
frontend_host_ = content::DevToolsFrontendHost::Create(
|
|
web_contents()->GetMainFrame(),
|
|
base::BindRepeating(
|
|
&InspectableWebContents::HandleMessageFromDevToolsFrontend,
|
|
base::Unretained(this)));
|
|
return;
|
|
}
|
|
}
|
|
|
|
void InspectableWebContents::DidFinishNavigation(
|
|
content::NavigationHandle* navigation_handle) {
|
|
if (navigation_handle->IsInMainFrame() ||
|
|
!navigation_handle->GetURL().SchemeIs("chrome-extension") ||
|
|
!navigation_handle->HasCommitted())
|
|
return;
|
|
content::RenderFrameHost* frame = navigation_handle->GetRenderFrameHost();
|
|
auto origin = navigation_handle->GetURL().GetOrigin().spec();
|
|
auto it = extensions_api_.find(origin);
|
|
if (it == extensions_api_.end())
|
|
return;
|
|
// Injected Script from devtools frontend doesn't expose chrome,
|
|
// most likely bug in chromium.
|
|
base::ReplaceFirstSubstringAfterOffset(&it->second, 0, "var chrome",
|
|
"var chrome = window.chrome ");
|
|
auto script = base::StringPrintf("%s(\"%s\")", it->second.c_str(),
|
|
base::GenerateGUID().c_str());
|
|
// Invoking content::DevToolsFrontendHost::SetupExtensionsAPI(frame, script);
|
|
// should be enough, but it seems to be a noop currently.
|
|
frame->ExecuteJavaScriptForTests(base::UTF8ToUTF16(script),
|
|
base::NullCallback());
|
|
}
|
|
|
|
void InspectableWebContents::SendMessageAck(int request_id,
|
|
const base::Value* arg) {
|
|
base::Value id_value(request_id);
|
|
CallClientFunction("DevToolsAPI.embedderMessageAck", &id_value, arg, nullptr);
|
|
}
|
|
|
|
} // namespace electron
|