
* chore: bump chromium to 135.0.7049.7 (main) (#45900) chore: bump chromium in DEPS to 135.0.7049.7 (cherry picked from commitbb1c3dff21
) * chore: bump chromium to 136.0.7053.1 (main) (#45906) * chore: bump chromium in DEPS to 136.0.7052.0 * chore: update mas_avoid_private_macos_api_usage.patch.patch6318359
patch applied manually due to context shear * chore: update preconnect_manager.patch Xref:6318420
patch applied manually due to context shear * chore: e patches all * chore: bump chromium to 136.0.7053.1 * chore: update fix_remove_profiles_from_spellcheck_service.patch Xref:6326575
patch applied manually due to context shear * chore: e patches all * chore: revert removal of v8 API used by Node.js * devtools: Remove DevToolsUIBindings::SendJsonRequest() |6326236
* 6244461: Merge //content/common/user_agent.cc into //components/embedder_support:user_agent |6244461
* 6313744: Migrate views::Background factory methods to ColorVariant |6313744
* 6314545: Remove multiple argument support from base::ToString() |6314545
* 6317362: [Extensions] Inline MessagingDelegate::CreateReceiverForTab() |6317362
* 6308998: Add SettingAccess structured metrics event for DevTools |6308998
* 6295214: Remove redundant state field in per-extension preferences |6295214
NB: this change is copied from the upstream change to extensions/shell/browser/shell_extension_loader.cc * fix: ui/ linter error This is showing up in an eslint build step in Electron: > /__w/electron/electron/src/out/Default/gen/ui/webui/resources/cr_elements/preprocessed/cr_menu_selector/cr_menu_selector.ts > 77:23 error This assertion is unnecessary since the receiver accepts the original type of the expression @typescript-eslint/no-unnecessary-type-assertion > > ✖ 1 problem (1 error, 0 warnings) > 1 error and 0 warnings potentially fixable with the `--fix` option. However, removing the assertion causes a typescript build failure: > gen/ui/webui/resources/cr_elements/preprocessed/cr_menu_selector/cr_menu_selector.ts:77:23 - error TS2345: Argument of type 'HTMLElement | null' is not assignable to parameter of type 'HTMLElement'. > Type 'null' is not assignable to type 'HTMLElement'. > > 77 items.indexOf(this.querySelector<HTMLElement>(':focus')); > ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ So I think the two different steps may be picking up typescript definitions. This patch should be removed after the issue is tracked down and fixed in a followup task. * fix: -Wnonnull warning Fixes this warning: > 2025-03-07T01:05:01.8637705Z ../../third_party/electron_node/src/debug_utils.cc(257,12): error: null passed to a callee that requires a non-null argument [-Werror,-Wnonnull] > 2025-03-07T01:05:01.8638267Z 257 | return nullptr; > 2025-03-07T01:05:01.8638481Z | ^~~~~~~ > 2025-03-07T01:05:01.8638700Z 1 error generated. Not sure why this warning was never triggered before; `git blame` indicates this code hasn't changed in ages: > c40a8273ef2 (Michaël Zasso 2024-05-10 09:50:20 +0200 255) #endif // DEBUG > 8e2d33f1562 (Anna Henningsen 2018-06-07 16:54:29 +0200 256) } > 247b5130595 (Refael Ackermann 2018-10-22 15:07:00 -0400 257) return nullptr; > 247b5130595 (Refael Ackermann 2018-10-22 15:07:00 -0400 258) } Presumably this is failing in this Chromium roll due to a clang version bump. We should remove this patch after upstreaming it. * docs: add upstream pr link for Node patch --------- Co-authored-by: electron-roller[bot] <84116207+electron-roller[bot]@users.noreply.github.com> Co-authored-by: Charles Kerr <charles@charleskerr.com> (cherry picked from commit458b14b8ed
) * chore!: bump chromium to 136.0.7054.0 (main) (#45923) * chore: bump chromium in DEPS to 136.0.7054.0 * chore: update allow_in-process_windows_to_have_different_web_prefs.patch Xref:5906158
patch applied manually due to context shear * chore: e patches all * refactor!: Session.clearStorageData(syncable) Xref:6309405
Remove syncable type from opts.quota in Session.clearStorageData(opts) because it that category has been removed upstream. BREAKING CHANGE: Removed ses.clearDataStorage({ quota: 'syncable' }) * docs: deprecate Session.clearDataStorage({ quota }) --------- Co-authored-by: electron-roller[bot] <84116207+electron-roller[bot]@users.noreply.github.com> Co-authored-by: Charles Kerr <charles@charleskerr.com> (cherry picked from commit20414f66ca
) * chore: bump chromium to 136.0.7058.1 (main) (#45928) * chore: bump chromium in DEPS to 136.0.7056.0 * chore: update mas_avoid_private_macos_api_usage.patch.patch no manual changes; patch applied with fuzz * chore: update fix_adapt_exclusive_access_for_electron_needs.patch patch applied manually due to context shear 6319958: [FS] Replace GURL with url::Origin for Excluisve Access Bubble |6319958
* chore: update feat_allow_usage_of_sccontentsharingpicker_on_supported_platforms.patch no manual changes; patch applied with fuzz 6311876: Expose captured surface resolution for MacOS |6311876
* chore: e patches all * 6319958: [FS] Replace GURL with url::Origin for Excluisve Access Bubble |6319958
* 6326673: views: Delete the single-parameter Widget::InitParams constructor. |6326673
*6331102
* 6331102: [A11yPerformance] Rename AXMode::kScreenReader to kExtendedProperties |6331102
Sync with shell/browser/ui/webui/accessibility_ui.cc to upstream chrome/browser/accessibility/accessibility_ui.cc changes in 4af8657 * chore: bump Chromium 136.0.7058.1 (#45933) chore: bump chromium in DEPS to 136.0.7058.1 --------- Co-authored-by: electron-roller[bot] <84116207+electron-roller[bot]@users.noreply.github.com> Co-authored-by: Charles Kerr <charles@charleskerr.com> (cherry picked from commitb0c11371e0
) * chore: bump chromium to 136.0.7062.0 (main) (#45957) * chore: bump chromium in DEPS to 136.0.7059.0 * chore: bump chromium in DEPS to 136.0.7060.0 * chore: bump chromium in DEPS to 136.0.7062.0 --------- Co-authored-by: electron-roller[bot] <84116207+electron-roller[bot]@users.noreply.github.com> (cherry picked from commit2de8fd7d93
) * fixup! chore: bump chromium to 136.0.7053.1 (main) (#45906) chore: fix patch shear * chore: remove cherry-pick-521faebc8a7c.patch fixed upstream @ 521faeb 6334632: Disable setting primtive restart for WebGL in the cmd decoder. |6334632
* chore: remove cherry-pick-9dacf5694dfd.patch fixed upstream @ 9dacf56 6330188: Move WebGL primitive restart state setting to the GPU process. |6330188
* chore: e patches all --------- Co-authored-by: Charles Kerr <charles@charleskerr.com> Co-authored-by: electron-roller[bot] <84116207+electron-roller[bot]@users.noreply.github.com>
938 lines
35 KiB
C++
938 lines
35 KiB
C++
// Copyright (c) 2014 GitHub, Inc.
|
|
// Use of this source code is governed by the MIT license that can be
|
|
// found in the LICENSE file.
|
|
|
|
#include <limits>
|
|
#include <memory>
|
|
#include <string>
|
|
#include <string_view>
|
|
#include <utility>
|
|
#include <vector>
|
|
|
|
#include "base/containers/span.h"
|
|
#include "base/memory/memory_pressure_listener.h"
|
|
#include "base/strings/strcat.h"
|
|
#include "base/strings/utf_string_conversions.h"
|
|
#include "components/spellcheck/renderer/spellcheck.h"
|
|
#include "content/public/renderer/render_frame.h"
|
|
#include "content/public/renderer/render_frame_observer.h"
|
|
#include "content/public/renderer/render_frame_visitor.h"
|
|
#include "gin/handle.h"
|
|
#include "gin/object_template_builder.h"
|
|
#include "gin/wrappable.h"
|
|
#include "services/service_manager/public/cpp/interface_provider.h"
|
|
#include "shell/common/api/api.mojom.h"
|
|
#include "shell/common/gin_converters/blink_converter.h"
|
|
#include "shell/common/gin_converters/callback_converter.h"
|
|
#include "shell/common/gin_converters/file_path_converter.h"
|
|
#include "shell/common/gin_converters/value_converter.h"
|
|
#include "shell/common/gin_helper/dictionary.h"
|
|
#include "shell/common/gin_helper/error_thrower.h"
|
|
#include "shell/common/gin_helper/function_template_extensions.h"
|
|
#include "shell/common/gin_helper/promise.h"
|
|
#include "shell/common/node_includes.h"
|
|
#include "shell/common/options_switches.h"
|
|
#include "shell/common/web_contents_utility.mojom.h"
|
|
#include "shell/renderer/api/context_bridge/object_cache.h"
|
|
#include "shell/renderer/api/electron_api_context_bridge.h"
|
|
#include "shell/renderer/api/electron_api_spell_check_client.h"
|
|
#include "shell/renderer/renderer_client_base.h"
|
|
#include "third_party/blink/public/common/associated_interfaces/associated_interface_provider.h"
|
|
#include "third_party/blink/public/common/page/page_zoom.h"
|
|
#include "third_party/blink/public/common/web_cache/web_cache_resource_type_stats.h"
|
|
#include "third_party/blink/public/common/web_preferences/web_preferences.h"
|
|
#include "third_party/blink/public/platform/browser_interface_broker_proxy.h"
|
|
#include "third_party/blink/public/platform/web_cache.h"
|
|
#include "third_party/blink/public/platform/web_isolated_world_info.h"
|
|
#include "third_party/blink/public/web/web_custom_element.h"
|
|
#include "third_party/blink/public/web/web_document.h"
|
|
#include "third_party/blink/public/web/web_element.h"
|
|
#include "third_party/blink/public/web/web_frame_widget.h"
|
|
#include "third_party/blink/public/web/web_input_method_controller.h"
|
|
#include "third_party/blink/public/web/web_local_frame.h"
|
|
#include "third_party/blink/public/web/web_script_execution_callback.h"
|
|
#include "third_party/blink/public/web/web_script_source.h"
|
|
#include "third_party/blink/public/web/web_view.h"
|
|
#include "third_party/blink/renderer/core/execution_context/execution_context.h" // nogncheck
|
|
#include "third_party/blink/renderer/core/frame/csp/content_security_policy.h" // nogncheck
|
|
#include "third_party/blink/renderer/platform/bindings/dom_wrapper_world.h" // nogncheck
|
|
#include "ui/base/ime/ime_text_span.h"
|
|
#include "url/url_util.h"
|
|
|
|
#if BUILDFLAG(ENABLE_BUILTIN_SPELLCHECKER)
|
|
#include "components/spellcheck/renderer/spellcheck.h"
|
|
#include "components/spellcheck/renderer/spellcheck_provider.h"
|
|
#endif
|
|
|
|
namespace gin {
|
|
|
|
template <>
|
|
struct Converter<blink::WebCssOrigin> {
|
|
static bool FromV8(v8::Isolate* isolate,
|
|
v8::Local<v8::Value> val,
|
|
blink::WebCssOrigin* out) {
|
|
std::string css_origin;
|
|
if (!ConvertFromV8(isolate, val, &css_origin))
|
|
return false;
|
|
if (css_origin == "user") {
|
|
*out = blink::WebCssOrigin::kUser;
|
|
} else if (css_origin == "author") {
|
|
*out = blink::WebCssOrigin::kAuthor;
|
|
} else {
|
|
return false;
|
|
}
|
|
return true;
|
|
}
|
|
};
|
|
|
|
} // namespace gin
|
|
|
|
namespace electron {
|
|
|
|
content::RenderFrame* GetRenderFrame(v8::Local<v8::Object> value) {
|
|
v8::Local<v8::Context> context = value->GetCreationContextChecked();
|
|
if (context.IsEmpty())
|
|
return nullptr;
|
|
blink::WebLocalFrame* frame = blink::WebLocalFrame::FrameForContext(context);
|
|
if (!frame)
|
|
return nullptr;
|
|
return content::RenderFrame::FromWebFrame(frame);
|
|
}
|
|
|
|
namespace api {
|
|
|
|
namespace {
|
|
|
|
#if BUILDFLAG(ENABLE_BUILTIN_SPELLCHECKER)
|
|
|
|
bool SpellCheckWord(content::RenderFrame* render_frame,
|
|
const std::string& word,
|
|
std::vector<std::u16string>* optional_suggestions) {
|
|
size_t start;
|
|
size_t length;
|
|
|
|
RendererClientBase* client = RendererClientBase::Get();
|
|
|
|
mojo::Remote<spellcheck::mojom::SpellCheckHost> spellcheck_host;
|
|
render_frame->GetBrowserInterfaceBroker().GetInterface(
|
|
spellcheck_host.BindNewPipeAndPassReceiver());
|
|
if (!spellcheck_host.is_bound())
|
|
return false;
|
|
|
|
std::u16string w = base::UTF8ToUTF16(word);
|
|
return client->GetSpellCheck()->SpellCheckWord(
|
|
w, *spellcheck_host.get(), &start, &length, optional_suggestions);
|
|
}
|
|
|
|
#endif
|
|
|
|
class ScriptExecutionCallback {
|
|
public:
|
|
// for compatibility with the older version of this, error is after result
|
|
using CompletionCallback =
|
|
base::OnceCallback<void(const v8::Local<v8::Value>& result,
|
|
const v8::Local<v8::Value>& error)>;
|
|
|
|
explicit ScriptExecutionCallback(
|
|
gin_helper::Promise<v8::Local<v8::Value>> promise,
|
|
CompletionCallback callback)
|
|
: promise_(std::move(promise)), callback_(std::move(callback)) {}
|
|
|
|
~ScriptExecutionCallback() = default;
|
|
|
|
// disable copy
|
|
ScriptExecutionCallback(const ScriptExecutionCallback&) = delete;
|
|
ScriptExecutionCallback& operator=(const ScriptExecutionCallback&) = delete;
|
|
|
|
void CopyResultToCallingContextAndFinalize(
|
|
v8::Isolate* isolate,
|
|
const v8::Local<v8::Object>& result) {
|
|
v8::MaybeLocal<v8::Value> maybe_result;
|
|
bool success = true;
|
|
std::string errmsg =
|
|
"An unknown exception occurred while getting the result of the script";
|
|
{
|
|
v8::TryCatch try_catch(isolate);
|
|
v8::Local<v8::Context> source_context =
|
|
result->GetCreationContextChecked();
|
|
maybe_result = PassValueToOtherContext(
|
|
source_context, promise_.GetContext(), result,
|
|
source_context->Global(), false, BridgeErrorTarget::kSource);
|
|
if (maybe_result.IsEmpty() || try_catch.HasCaught()) {
|
|
success = false;
|
|
}
|
|
if (try_catch.HasCaught()) {
|
|
auto message = try_catch.Message();
|
|
|
|
if (!message.IsEmpty()) {
|
|
gin::ConvertFromV8(isolate, message->Get(), &errmsg);
|
|
}
|
|
}
|
|
}
|
|
if (!success) {
|
|
// Failed convert so we send undefined everywhere
|
|
if (callback_)
|
|
std::move(callback_).Run(
|
|
v8::Undefined(isolate),
|
|
v8::Exception::Error(v8::String::NewFromUtf8(
|
|
isolate, errmsg.data(),
|
|
v8::NewStringType::kNormal, errmsg.size())
|
|
.ToLocalChecked()));
|
|
promise_.RejectWithErrorMessage(errmsg);
|
|
} else {
|
|
v8::Local<v8::Context> context = promise_.GetContext();
|
|
v8::Context::Scope context_scope(context);
|
|
v8::Local<v8::Value> cloned_value = maybe_result.ToLocalChecked();
|
|
if (callback_)
|
|
std::move(callback_).Run(cloned_value, v8::Undefined(isolate));
|
|
promise_.Resolve(cloned_value);
|
|
}
|
|
}
|
|
|
|
void Completed(const std::vector<v8::Local<v8::Value>>& result) {
|
|
v8::Isolate* isolate = promise_.isolate();
|
|
if (!result.empty()) {
|
|
if (!result[0].IsEmpty()) {
|
|
v8::Local<v8::Value> value = result[0];
|
|
// Either the result was created in the same world as the caller
|
|
// or the result is not an object and therefore does not have a
|
|
// prototype chain to protect
|
|
bool should_clone_value =
|
|
!(value->IsObject() &&
|
|
promise_.GetContext() ==
|
|
value.As<v8::Object>()->GetCreationContextChecked()) &&
|
|
value->IsObject();
|
|
if (should_clone_value) {
|
|
CopyResultToCallingContextAndFinalize(isolate,
|
|
value.As<v8::Object>());
|
|
} else {
|
|
// Right now only single results per frame is supported.
|
|
if (callback_)
|
|
std::move(callback_).Run(value, v8::Undefined(isolate));
|
|
promise_.Resolve(value);
|
|
}
|
|
} else {
|
|
const char errmsg[] =
|
|
"Script failed to execute, this normally means an error "
|
|
"was thrown. Check the renderer console for the error.";
|
|
if (!callback_.is_null()) {
|
|
v8::Local<v8::Context> context = promise_.GetContext();
|
|
v8::Context::Scope context_scope(context);
|
|
std::move(callback_).Run(
|
|
v8::Undefined(isolate),
|
|
v8::Exception::Error(
|
|
v8::String::NewFromUtf8Literal(isolate, errmsg)));
|
|
}
|
|
promise_.RejectWithErrorMessage(errmsg);
|
|
}
|
|
} else {
|
|
const char errmsg[] =
|
|
"WebFrame was removed before script could run. This normally means "
|
|
"the underlying frame was destroyed";
|
|
if (!callback_.is_null()) {
|
|
v8::Local<v8::Context> context = promise_.GetContext();
|
|
v8::Context::Scope context_scope(context);
|
|
std::move(callback_).Run(
|
|
v8::Undefined(isolate),
|
|
v8::Exception::Error(
|
|
v8::String::NewFromUtf8Literal(isolate, errmsg)));
|
|
}
|
|
promise_.RejectWithErrorMessage(errmsg);
|
|
}
|
|
delete this;
|
|
}
|
|
|
|
private:
|
|
gin_helper::Promise<v8::Local<v8::Value>> promise_;
|
|
CompletionCallback callback_;
|
|
};
|
|
|
|
class FrameSetSpellChecker : public content::RenderFrameVisitor {
|
|
public:
|
|
FrameSetSpellChecker(raw_ptr<SpellCheckClient> spell_check_client,
|
|
raw_ptr<content::RenderFrame> main_frame)
|
|
: spell_check_client_(spell_check_client), main_frame_(main_frame) {
|
|
content::RenderFrame::ForEach(this);
|
|
main_frame->GetWebFrame()->SetSpellCheckPanelHostClient(spell_check_client);
|
|
}
|
|
|
|
// disable copy
|
|
FrameSetSpellChecker(const FrameSetSpellChecker&) = delete;
|
|
FrameSetSpellChecker& operator=(const FrameSetSpellChecker&) = delete;
|
|
|
|
bool Visit(content::RenderFrame* render_frame) override {
|
|
if (render_frame->GetMainRenderFrame() == main_frame_ ||
|
|
(render_frame->IsMainFrame() && render_frame == main_frame_)) {
|
|
render_frame->GetWebFrame()->SetTextCheckClient(spell_check_client_);
|
|
}
|
|
return true;
|
|
}
|
|
|
|
private:
|
|
raw_ptr<SpellCheckClient> spell_check_client_;
|
|
raw_ptr<content::RenderFrame> main_frame_;
|
|
};
|
|
|
|
class SpellCheckerHolder final : private content::RenderFrameObserver {
|
|
public:
|
|
// Find existing holder for the |render_frame|.
|
|
static SpellCheckerHolder* FromRenderFrame(
|
|
content::RenderFrame* render_frame) {
|
|
for (auto* holder : instances_) {
|
|
if (holder->render_frame() == render_frame)
|
|
return holder;
|
|
}
|
|
return nullptr;
|
|
}
|
|
|
|
SpellCheckerHolder(content::RenderFrame* render_frame,
|
|
std::unique_ptr<SpellCheckClient> spell_check_client)
|
|
: content::RenderFrameObserver(render_frame),
|
|
spell_check_client_(std::move(spell_check_client)) {
|
|
DCHECK(!FromRenderFrame(render_frame));
|
|
instances_.insert(this);
|
|
}
|
|
|
|
~SpellCheckerHolder() final { instances_.erase(this); }
|
|
|
|
void UnsetAndDestroy() {
|
|
FrameSetSpellChecker set_spell_checker(nullptr, render_frame());
|
|
delete this;
|
|
}
|
|
|
|
// RenderFrameObserver implementation.
|
|
void OnDestruct() final {
|
|
// Since we delete this in WillReleaseScriptContext, this method is unlikely
|
|
// to be called, but override anyway since I'm not sure if there are some
|
|
// corner cases.
|
|
//
|
|
// Note that while there are two "delete this", it is totally fine as the
|
|
// observer unsubscribes automatically in destructor and the other one won't
|
|
// be called.
|
|
//
|
|
// Also note that we should not call UnsetAndDestroy here, as the render
|
|
// frame is going to be destroyed.
|
|
delete this;
|
|
}
|
|
|
|
void WillReleaseScriptContext(v8::Local<v8::Context> context,
|
|
int world_id) final {
|
|
// Unset spell checker when the script context is going to be released, as
|
|
// the spell check implementation lives there.
|
|
UnsetAndDestroy();
|
|
}
|
|
|
|
private:
|
|
static std::set<SpellCheckerHolder*> instances_;
|
|
|
|
std::unique_ptr<SpellCheckClient> spell_check_client_;
|
|
};
|
|
|
|
class WebFrameRenderer final : public gin::Wrappable<WebFrameRenderer>,
|
|
private content::RenderFrameObserver {
|
|
public:
|
|
static gin::WrapperInfo kWrapperInfo;
|
|
|
|
static gin::Handle<WebFrameRenderer> Create(
|
|
v8::Isolate* isolate,
|
|
content::RenderFrame* render_frame) {
|
|
return gin::CreateHandle(isolate, new WebFrameRenderer(render_frame));
|
|
}
|
|
|
|
explicit WebFrameRenderer(content::RenderFrame* render_frame)
|
|
: content::RenderFrameObserver(render_frame) {
|
|
DCHECK(render_frame);
|
|
}
|
|
|
|
// gin::Wrappable:
|
|
gin::ObjectTemplateBuilder GetObjectTemplateBuilder(
|
|
v8::Isolate* isolate) override {
|
|
return gin::Wrappable<WebFrameRenderer>::GetObjectTemplateBuilder(isolate)
|
|
.SetMethod("getWebFrameId", &WebFrameRenderer::GetWebFrameId)
|
|
.SetMethod("setName", &WebFrameRenderer::SetName)
|
|
.SetMethod("setZoomLevel", &WebFrameRenderer::SetZoomLevel)
|
|
.SetMethod("getZoomLevel", &WebFrameRenderer::GetZoomLevel)
|
|
.SetMethod("setZoomFactor", &WebFrameRenderer::SetZoomFactor)
|
|
.SetMethod("getZoomFactor", &WebFrameRenderer::GetZoomFactor)
|
|
.SetMethod("getWebPreference", &WebFrameRenderer::GetWebPreference)
|
|
#if BUILDFLAG(ENABLE_BUILTIN_SPELLCHECKER)
|
|
.SetMethod("isWordMisspelled", &WebFrameRenderer::IsWordMisspelled)
|
|
.SetMethod("getWordSuggestions", &WebFrameRenderer::GetWordSuggestions)
|
|
#endif
|
|
.SetMethod("setVisualZoomLevelLimits",
|
|
&WebFrameRenderer::SetVisualZoomLevelLimits)
|
|
.SetMethod("allowGuestViewElementDefinition",
|
|
&RendererClientBase::AllowGuestViewElementDefinition)
|
|
.SetMethod("insertText", &WebFrameRenderer::InsertText)
|
|
.SetMethod("insertCSS", &WebFrameRenderer::InsertCSS)
|
|
.SetMethod("removeInsertedCSS", &WebFrameRenderer::RemoveInsertedCSS)
|
|
.SetMethod("_isEvalAllowed", &WebFrameRenderer::IsEvalAllowed)
|
|
.SetMethod("executeJavaScript", &WebFrameRenderer::ExecuteJavaScript)
|
|
.SetMethod("executeJavaScriptInIsolatedWorld",
|
|
&WebFrameRenderer::ExecuteJavaScriptInIsolatedWorld)
|
|
.SetMethod("setIsolatedWorldInfo",
|
|
&WebFrameRenderer::SetIsolatedWorldInfo)
|
|
.SetMethod("getResourceUsage", &WebFrameRenderer::GetResourceUsage)
|
|
.SetMethod("clearCache", &WebFrameRenderer::ClearCache)
|
|
.SetMethod("setSpellCheckProvider",
|
|
&WebFrameRenderer::SetSpellCheckProvider)
|
|
// Frame navigators
|
|
.SetMethod("findFrameByRoutingId",
|
|
&WebFrameRenderer::FindFrameByRoutingId)
|
|
.SetMethod("getFrameForSelector",
|
|
&WebFrameRenderer::GetFrameForSelector)
|
|
.SetMethod("findFrameByName", &WebFrameRenderer::FindFrameByName)
|
|
.SetProperty("opener", &WebFrameRenderer::GetOpener)
|
|
.SetProperty("parent", &WebFrameRenderer::GetFrameParent)
|
|
.SetProperty("top", &WebFrameRenderer::GetTop)
|
|
.SetProperty("firstChild", &WebFrameRenderer::GetFirstChild)
|
|
.SetProperty("nextSibling", &WebFrameRenderer::GetNextSibling)
|
|
.SetProperty("routingId", &WebFrameRenderer::GetRoutingId);
|
|
}
|
|
|
|
const char* GetTypeName() override { return "WebFrameRenderer"; }
|
|
|
|
void OnDestruct() override {}
|
|
|
|
private:
|
|
bool MaybeGetRenderFrame(v8::Isolate* isolate,
|
|
const std::string_view method_name,
|
|
content::RenderFrame** render_frame_ptr) {
|
|
std::string error_msg;
|
|
if (!MaybeGetRenderFrame(&error_msg, method_name, render_frame_ptr)) {
|
|
gin_helper::ErrorThrower(isolate).ThrowError(error_msg);
|
|
return false;
|
|
}
|
|
return true;
|
|
}
|
|
|
|
bool MaybeGetRenderFrame(std::string* error_msg,
|
|
const std::string_view method_name,
|
|
content::RenderFrame** render_frame_ptr) {
|
|
auto* frame = render_frame();
|
|
if (!frame) {
|
|
*error_msg = base::StrCat({"Render frame was torn down before webFrame.",
|
|
method_name, " could be executed"});
|
|
return false;
|
|
}
|
|
*render_frame_ptr = frame;
|
|
return true;
|
|
}
|
|
|
|
static v8::Local<v8::Value> CreateWebFrameRenderer(v8::Isolate* isolate,
|
|
blink::WebFrame* frame) {
|
|
if (frame && frame->IsWebLocalFrame()) {
|
|
auto* render_frame =
|
|
content::RenderFrame::FromWebFrame(frame->ToWebLocalFrame());
|
|
return WebFrameRenderer::Create(isolate, render_frame).ToV8();
|
|
} else {
|
|
return v8::Null(isolate);
|
|
}
|
|
}
|
|
|
|
void SetName(v8::Isolate* isolate, const std::string& name) {
|
|
content::RenderFrame* render_frame;
|
|
if (!MaybeGetRenderFrame(isolate, "setName", &render_frame))
|
|
return;
|
|
|
|
render_frame->GetWebFrame()->SetName(blink::WebString::FromUTF8(name));
|
|
}
|
|
|
|
void SetZoomLevel(v8::Isolate* isolate, double level) {
|
|
content::RenderFrame* render_frame;
|
|
if (!MaybeGetRenderFrame(isolate, "setZoomLevel", &render_frame))
|
|
return;
|
|
|
|
// Update the zoom controller.
|
|
mojo::AssociatedRemote<mojom::ElectronWebContentsUtility>
|
|
web_contents_utility_remote;
|
|
render_frame->GetRemoteAssociatedInterfaces()->GetInterface(
|
|
&web_contents_utility_remote);
|
|
web_contents_utility_remote->SetTemporaryZoomLevel(level);
|
|
|
|
// Update the local web frame for coherence with synchronous calls to
|
|
// |GetZoomLevel|.
|
|
if (blink::WebFrameWidget* web_frame =
|
|
render_frame->GetWebFrame()->LocalRoot()->FrameWidget()) {
|
|
web_frame->SetZoomLevel(level);
|
|
}
|
|
}
|
|
|
|
double GetZoomLevel(v8::Isolate* isolate) {
|
|
content::RenderFrame* render_frame;
|
|
if (!MaybeGetRenderFrame(isolate, "getZoomLevel", &render_frame)) {
|
|
return 0.0f;
|
|
}
|
|
|
|
blink::WebFrameWidget* web_frame =
|
|
render_frame->GetWebFrame()->LocalRoot()->FrameWidget();
|
|
if (!web_frame) {
|
|
return 0.0f;
|
|
}
|
|
|
|
return web_frame->GetZoomLevel();
|
|
}
|
|
|
|
void SetZoomFactor(gin_helper::ErrorThrower thrower, double factor) {
|
|
if (factor < std::numeric_limits<double>::epsilon()) {
|
|
thrower.ThrowError("'zoomFactor' must be a double greater than 0.0");
|
|
return;
|
|
}
|
|
|
|
SetZoomLevel(thrower.isolate(), blink::ZoomFactorToZoomLevel(factor));
|
|
}
|
|
|
|
double GetZoomFactor(v8::Isolate* isolate) {
|
|
double zoom_level = GetZoomLevel(isolate);
|
|
return blink::ZoomLevelToZoomFactor(zoom_level);
|
|
}
|
|
|
|
v8::Local<v8::Value> GetWebPreference(v8::Isolate* isolate,
|
|
std::string pref_name) {
|
|
content::RenderFrame* render_frame;
|
|
if (!MaybeGetRenderFrame(isolate, "getWebPreference", &render_frame))
|
|
return v8::Undefined(isolate);
|
|
|
|
const auto& prefs = render_frame->GetBlinkPreferences();
|
|
|
|
if (pref_name == "isWebView") {
|
|
// FIXME(zcbenz): For child windows opened with window.open('') from
|
|
// webview, the WebPreferences is inherited from webview and the value
|
|
// of |is_webview| is wrong.
|
|
// Please check ElectronRenderFrameObserver::DidInstallConditionalFeatures
|
|
// for the background.
|
|
auto* web_frame = render_frame->GetWebFrame();
|
|
if (web_frame->Opener())
|
|
return gin::ConvertToV8(isolate, false);
|
|
return gin::ConvertToV8(isolate, prefs.is_webview);
|
|
} else if (pref_name == options::kHiddenPage) {
|
|
// NOTE: hiddenPage is internal-only.
|
|
return gin::ConvertToV8(isolate, prefs.hidden_page);
|
|
} else if (pref_name == options::kNodeIntegration) {
|
|
return gin::ConvertToV8(isolate, prefs.node_integration);
|
|
} else if (pref_name == options::kWebviewTag) {
|
|
return gin::ConvertToV8(isolate, prefs.webview_tag);
|
|
}
|
|
return v8::Null(isolate);
|
|
}
|
|
|
|
void SetVisualZoomLevelLimits(v8::Isolate* isolate,
|
|
double min_level,
|
|
double max_level) {
|
|
content::RenderFrame* render_frame;
|
|
if (!MaybeGetRenderFrame(isolate, "setVisualZoomLevelLimits",
|
|
&render_frame))
|
|
return;
|
|
|
|
blink::WebFrame* web_frame = render_frame->GetWebFrame();
|
|
web_frame->View()->SetDefaultPageScaleLimits(min_level, max_level);
|
|
}
|
|
|
|
static int GetWebFrameId(v8::Local<v8::Object> content_window) {
|
|
// Get the WebLocalFrame before (possibly) executing any user-space JS while
|
|
// getting the |params|. We track the status of the RenderFrame via an
|
|
// observer in case it is deleted during user code execution.
|
|
content::RenderFrame* render_frame = GetRenderFrame(content_window);
|
|
if (!render_frame)
|
|
return -1;
|
|
|
|
blink::WebLocalFrame* frame = render_frame->GetWebFrame();
|
|
// Parent must exist.
|
|
blink::WebFrame* parent_frame = frame->Parent();
|
|
DCHECK(parent_frame);
|
|
DCHECK(parent_frame->IsWebLocalFrame());
|
|
|
|
return render_frame->GetRoutingID();
|
|
}
|
|
|
|
void SetSpellCheckProvider(gin_helper::ErrorThrower thrower,
|
|
v8::Isolate* isolate,
|
|
const std::string& language,
|
|
v8::Local<v8::Object> provider) {
|
|
auto context = isolate->GetCurrentContext();
|
|
if (!provider->Has(context, gin::StringToV8(isolate, "spellCheck"))
|
|
.ToChecked()) {
|
|
thrower.ThrowError("\"spellCheck\" has to be defined");
|
|
return;
|
|
}
|
|
|
|
// Remove the old client.
|
|
content::RenderFrame* render_frame;
|
|
if (!MaybeGetRenderFrame(isolate, "setSpellCheckProvider", &render_frame))
|
|
return;
|
|
|
|
auto* existing = SpellCheckerHolder::FromRenderFrame(render_frame);
|
|
if (existing)
|
|
existing->UnsetAndDestroy();
|
|
|
|
// Set spellchecker for all live frames in the same process or
|
|
// in the sandbox mode for all live sub frames to this WebFrame.
|
|
auto spell_check_client =
|
|
std::make_unique<SpellCheckClient>(language, isolate, provider);
|
|
FrameSetSpellChecker spell_checker(spell_check_client.get(), render_frame);
|
|
|
|
// Attach the spell checker to RenderFrame.
|
|
new SpellCheckerHolder(render_frame, std::move(spell_check_client));
|
|
}
|
|
|
|
void InsertText(v8::Isolate* isolate, const std::string& text) {
|
|
content::RenderFrame* render_frame;
|
|
if (!MaybeGetRenderFrame(isolate, "insertText", &render_frame))
|
|
return;
|
|
|
|
blink::WebFrame* web_frame = render_frame->GetWebFrame();
|
|
if (web_frame->IsWebLocalFrame()) {
|
|
web_frame->ToWebLocalFrame()
|
|
->FrameWidget()
|
|
->GetActiveWebInputMethodController()
|
|
->CommitText(blink::WebString::FromUTF8(text),
|
|
std::vector<ui::ImeTextSpan>(), blink::WebRange(), 0);
|
|
}
|
|
}
|
|
|
|
std::u16string InsertCSS(v8::Isolate* isolate,
|
|
const std::string& css,
|
|
gin::Arguments* args) {
|
|
blink::WebCssOrigin css_origin = blink::WebCssOrigin::kAuthor;
|
|
|
|
gin_helper::Dictionary options;
|
|
if (args->GetNext(&options))
|
|
options.Get("cssOrigin", &css_origin);
|
|
|
|
content::RenderFrame* render_frame;
|
|
if (!MaybeGetRenderFrame(isolate, "insertCSS", &render_frame))
|
|
return {};
|
|
|
|
blink::WebFrame* web_frame = render_frame->GetWebFrame();
|
|
if (web_frame->IsWebLocalFrame()) {
|
|
return web_frame->ToWebLocalFrame()
|
|
->GetDocument()
|
|
.InsertStyleSheet(blink::WebString::FromUTF8(css), nullptr,
|
|
css_origin)
|
|
.Utf16();
|
|
}
|
|
return {};
|
|
}
|
|
|
|
void RemoveInsertedCSS(v8::Isolate* isolate, const std::u16string& key) {
|
|
content::RenderFrame* render_frame;
|
|
if (!MaybeGetRenderFrame(isolate, "removeInsertedCSS", &render_frame))
|
|
return;
|
|
|
|
blink::WebFrame* web_frame = render_frame->GetWebFrame();
|
|
if (web_frame->IsWebLocalFrame()) {
|
|
web_frame->ToWebLocalFrame()->GetDocument().RemoveInsertedStyleSheet(
|
|
blink::WebString::FromUTF16(key));
|
|
}
|
|
}
|
|
|
|
bool IsEvalAllowed(v8::Isolate* isolate) {
|
|
content::RenderFrame* render_frame;
|
|
if (!MaybeGetRenderFrame(isolate, "isEvalAllowed", &render_frame))
|
|
return true;
|
|
|
|
auto* context = blink::ExecutionContext::From(
|
|
render_frame->GetWebFrame()->MainWorldScriptContext());
|
|
return !context->GetContentSecurityPolicy()->ShouldCheckEval();
|
|
}
|
|
|
|
v8::Local<v8::Promise> ExecuteJavaScript(gin::Arguments* gin_args,
|
|
const std::u16string& code) {
|
|
gin_helper::Arguments* args = static_cast<gin_helper::Arguments*>(gin_args);
|
|
|
|
v8::Isolate* isolate = args->isolate();
|
|
gin_helper::Promise<v8::Local<v8::Value>> promise(isolate);
|
|
v8::Local<v8::Promise> handle = promise.GetHandle();
|
|
|
|
content::RenderFrame* render_frame;
|
|
std::string error_msg;
|
|
if (!MaybeGetRenderFrame(&error_msg, "executeJavaScript", &render_frame)) {
|
|
promise.RejectWithErrorMessage(error_msg);
|
|
return handle;
|
|
}
|
|
|
|
const blink::WebScriptSource source{blink::WebString::FromUTF16(code)};
|
|
|
|
bool has_user_gesture = false;
|
|
args->GetNext(&has_user_gesture);
|
|
|
|
ScriptExecutionCallback::CompletionCallback completion_callback;
|
|
args->GetNext(&completion_callback);
|
|
|
|
auto* self = new ScriptExecutionCallback(std::move(promise),
|
|
std::move(completion_callback));
|
|
|
|
render_frame->GetWebFrame()->RequestExecuteScript(
|
|
blink::DOMWrapperWorld::kMainWorldId, base::span_from_ref(source),
|
|
has_user_gesture ? blink::mojom::UserActivationOption::kActivate
|
|
: blink::mojom::UserActivationOption::kDoNotActivate,
|
|
blink::mojom::EvaluationTiming::kSynchronous,
|
|
blink::mojom::LoadEventBlockingOption::kDoNotBlock,
|
|
base::NullCallback(),
|
|
base::BindOnce(&ScriptExecutionCallback::Completed,
|
|
base::Unretained(self)),
|
|
blink::BackForwardCacheAware::kAllow,
|
|
blink::mojom::WantResultOption::kWantResult,
|
|
blink::mojom::PromiseResultOption::kDoNotWait);
|
|
|
|
return handle;
|
|
}
|
|
|
|
v8::Local<v8::Promise> ExecuteJavaScriptInIsolatedWorld(
|
|
gin::Arguments* gin_args,
|
|
int world_id,
|
|
const std::vector<gin_helper::Dictionary>& scripts) {
|
|
gin_helper::Arguments* args = static_cast<gin_helper::Arguments*>(gin_args);
|
|
|
|
v8::Isolate* isolate = args->isolate();
|
|
gin_helper::Promise<v8::Local<v8::Value>> promise(isolate);
|
|
v8::Local<v8::Promise> handle = promise.GetHandle();
|
|
|
|
content::RenderFrame* render_frame;
|
|
std::string error_msg;
|
|
if (!MaybeGetRenderFrame(&error_msg, "executeJavaScriptInIsolatedWorld",
|
|
&render_frame)) {
|
|
promise.RejectWithErrorMessage(error_msg);
|
|
return handle;
|
|
}
|
|
|
|
bool has_user_gesture = false;
|
|
args->GetNext(&has_user_gesture);
|
|
|
|
blink::mojom::EvaluationTiming script_execution_type =
|
|
blink::mojom::EvaluationTiming::kSynchronous;
|
|
blink::mojom::LoadEventBlockingOption load_blocking_option =
|
|
blink::mojom::LoadEventBlockingOption::kDoNotBlock;
|
|
std::string execution_type;
|
|
args->GetNext(&execution_type);
|
|
|
|
if (execution_type == "asynchronous") {
|
|
script_execution_type = blink::mojom::EvaluationTiming::kAsynchronous;
|
|
} else if (execution_type == "asynchronousBlockingOnload") {
|
|
script_execution_type = blink::mojom::EvaluationTiming::kAsynchronous;
|
|
load_blocking_option = blink::mojom::LoadEventBlockingOption::kBlock;
|
|
}
|
|
|
|
ScriptExecutionCallback::CompletionCallback completion_callback;
|
|
args->GetNext(&completion_callback);
|
|
|
|
std::vector<blink::WebScriptSource> sources;
|
|
sources.reserve(scripts.size());
|
|
|
|
for (const auto& script : scripts) {
|
|
std::u16string code;
|
|
std::u16string url;
|
|
script.Get("url", &url);
|
|
|
|
if (!script.Get("code", &code)) {
|
|
const char errmsg[] = "Invalid 'code'";
|
|
if (!completion_callback.is_null()) {
|
|
std::move(completion_callback)
|
|
.Run(v8::Undefined(isolate),
|
|
v8::Exception::Error(
|
|
v8::String::NewFromUtf8Literal(isolate, errmsg)));
|
|
}
|
|
promise.RejectWithErrorMessage(errmsg);
|
|
return handle;
|
|
}
|
|
|
|
sources.emplace_back(blink::WebString::FromUTF16(code),
|
|
blink::WebURL(GURL(url)));
|
|
}
|
|
|
|
// Deletes itself.
|
|
auto* self = new ScriptExecutionCallback(std::move(promise),
|
|
std::move(completion_callback));
|
|
|
|
render_frame->GetWebFrame()->RequestExecuteScript(
|
|
world_id, base::span(sources),
|
|
has_user_gesture ? blink::mojom::UserActivationOption::kActivate
|
|
: blink::mojom::UserActivationOption::kDoNotActivate,
|
|
script_execution_type, load_blocking_option, base::NullCallback(),
|
|
base::BindOnce(&ScriptExecutionCallback::Completed,
|
|
base::Unretained(self)),
|
|
blink::BackForwardCacheAware::kPossiblyDisallow,
|
|
blink::mojom::WantResultOption::kWantResult,
|
|
blink::mojom::PromiseResultOption::kDoNotWait);
|
|
|
|
return handle;
|
|
}
|
|
|
|
void SetIsolatedWorldInfo(v8::Isolate* isolate,
|
|
int world_id,
|
|
const gin_helper::Dictionary& options) {
|
|
content::RenderFrame* render_frame;
|
|
if (!MaybeGetRenderFrame(isolate, "setIsolatedWorldInfo", &render_frame))
|
|
return;
|
|
|
|
std::string origin_url, security_policy, name;
|
|
options.Get("securityOrigin", &origin_url);
|
|
options.Get("csp", &security_policy);
|
|
options.Get("name", &name);
|
|
|
|
if (!security_policy.empty() && origin_url.empty()) {
|
|
gin_helper::ErrorThrower(isolate).ThrowError(
|
|
"If csp is specified, securityOrigin should also be specified");
|
|
return;
|
|
}
|
|
|
|
blink::WebIsolatedWorldInfo info;
|
|
info.security_origin = blink::WebSecurityOrigin::CreateFromString(
|
|
blink::WebString::FromUTF8(origin_url));
|
|
info.content_security_policy = blink::WebString::FromUTF8(security_policy);
|
|
info.human_readable_name = blink::WebString::FromUTF8(name);
|
|
blink::SetIsolatedWorldInfo(world_id, info);
|
|
}
|
|
|
|
blink::WebCacheResourceTypeStats GetResourceUsage(v8::Isolate* isolate) {
|
|
blink::WebCacheResourceTypeStats stats;
|
|
blink::WebCache::GetResourceTypeStats(&stats);
|
|
return stats;
|
|
}
|
|
|
|
#if BUILDFLAG(ENABLE_BUILTIN_SPELLCHECKER)
|
|
bool IsWordMisspelled(v8::Isolate* isolate, const std::string& word) {
|
|
content::RenderFrame* render_frame;
|
|
if (!MaybeGetRenderFrame(isolate, "isWordMisspelled", &render_frame))
|
|
return false;
|
|
|
|
return !SpellCheckWord(render_frame, word, nullptr);
|
|
}
|
|
|
|
std::vector<std::u16string> GetWordSuggestions(v8::Isolate* isolate,
|
|
const std::string& word) {
|
|
content::RenderFrame* render_frame;
|
|
std::vector<std::u16string> suggestions;
|
|
if (!MaybeGetRenderFrame(isolate, "getWordSuggestions", &render_frame))
|
|
return suggestions;
|
|
|
|
SpellCheckWord(render_frame, word, &suggestions);
|
|
return suggestions;
|
|
}
|
|
#endif
|
|
|
|
void ClearCache(v8::Isolate* isolate) {
|
|
blink::WebCache::Clear();
|
|
base::MemoryPressureListener::NotifyMemoryPressure(
|
|
base::MemoryPressureListener::MEMORY_PRESSURE_LEVEL_CRITICAL);
|
|
}
|
|
|
|
v8::Local<v8::Value> FindFrameByRoutingId(v8::Isolate* isolate,
|
|
int routing_id) {
|
|
content::RenderFrame* render_frame =
|
|
content::RenderFrame::FromRoutingID(routing_id);
|
|
if (render_frame)
|
|
return WebFrameRenderer::Create(isolate, render_frame).ToV8();
|
|
else
|
|
return v8::Null(isolate);
|
|
}
|
|
|
|
v8::Local<v8::Value> GetOpener(v8::Isolate* isolate) {
|
|
content::RenderFrame* render_frame;
|
|
if (!MaybeGetRenderFrame(isolate, "opener", &render_frame))
|
|
return v8::Null(isolate);
|
|
|
|
blink::WebFrame* frame = render_frame->GetWebFrame()->Opener();
|
|
return CreateWebFrameRenderer(isolate, frame);
|
|
}
|
|
|
|
// Don't name it as GetParent, Windows has API with same name.
|
|
v8::Local<v8::Value> GetFrameParent(v8::Isolate* isolate) {
|
|
content::RenderFrame* render_frame;
|
|
if (!MaybeGetRenderFrame(isolate, "parent", &render_frame))
|
|
return v8::Null(isolate);
|
|
|
|
blink::WebFrame* frame = render_frame->GetWebFrame()->Parent();
|
|
return CreateWebFrameRenderer(isolate, frame);
|
|
}
|
|
|
|
v8::Local<v8::Value> GetTop(v8::Isolate* isolate) {
|
|
content::RenderFrame* render_frame;
|
|
if (!MaybeGetRenderFrame(isolate, "top", &render_frame))
|
|
return v8::Null(isolate);
|
|
|
|
blink::WebFrame* frame = render_frame->GetWebFrame()->Top();
|
|
return CreateWebFrameRenderer(isolate, frame);
|
|
}
|
|
|
|
v8::Local<v8::Value> GetFirstChild(v8::Isolate* isolate) {
|
|
content::RenderFrame* render_frame;
|
|
if (!MaybeGetRenderFrame(isolate, "firstChild", &render_frame))
|
|
return v8::Null(isolate);
|
|
|
|
blink::WebFrame* frame = render_frame->GetWebFrame()->FirstChild();
|
|
return CreateWebFrameRenderer(isolate, frame);
|
|
}
|
|
|
|
v8::Local<v8::Value> GetNextSibling(v8::Isolate* isolate) {
|
|
content::RenderFrame* render_frame;
|
|
if (!MaybeGetRenderFrame(isolate, "nextSibling", &render_frame))
|
|
return v8::Null(isolate);
|
|
|
|
blink::WebFrame* frame = render_frame->GetWebFrame()->NextSibling();
|
|
return CreateWebFrameRenderer(isolate, frame);
|
|
}
|
|
|
|
v8::Local<v8::Value> GetFrameForSelector(v8::Isolate* isolate,
|
|
const std::string& selector) {
|
|
content::RenderFrame* render_frame;
|
|
if (!MaybeGetRenderFrame(isolate, "getFrameForSelector", &render_frame))
|
|
return v8::Null(isolate);
|
|
|
|
blink::WebElement element =
|
|
render_frame->GetWebFrame()->GetDocument().QuerySelector(
|
|
blink::WebString::FromUTF8(selector));
|
|
if (element.IsNull()) // not found
|
|
return v8::Null(isolate);
|
|
|
|
blink::WebFrame* frame = blink::WebFrame::FromFrameOwnerElement(element);
|
|
return CreateWebFrameRenderer(isolate, frame);
|
|
}
|
|
|
|
v8::Local<v8::Value> FindFrameByName(v8::Isolate* isolate,
|
|
const std::string& name) {
|
|
content::RenderFrame* render_frame;
|
|
if (!MaybeGetRenderFrame(isolate, "findFrameByName", &render_frame))
|
|
return v8::Null(isolate);
|
|
|
|
blink::WebFrame* frame = render_frame->GetWebFrame()->FindFrameByName(
|
|
blink::WebString::FromUTF8(name));
|
|
return CreateWebFrameRenderer(isolate, frame);
|
|
}
|
|
|
|
int GetRoutingId(v8::Isolate* isolate) {
|
|
content::RenderFrame* render_frame;
|
|
if (!MaybeGetRenderFrame(isolate, "routingId", &render_frame))
|
|
return 0;
|
|
|
|
return render_frame->GetRoutingID();
|
|
}
|
|
};
|
|
} // namespace
|
|
|
|
gin::WrapperInfo WebFrameRenderer::kWrapperInfo = {gin::kEmbedderNativeGin};
|
|
|
|
// static
|
|
std::set<SpellCheckerHolder*> SpellCheckerHolder::instances_;
|
|
|
|
} // namespace api
|
|
|
|
} // namespace electron
|
|
|
|
namespace {
|
|
|
|
void Initialize(v8::Local<v8::Object> exports,
|
|
v8::Local<v8::Value> unused,
|
|
v8::Local<v8::Context> context,
|
|
void* priv) {
|
|
using namespace electron::api; // NOLINT(build/namespaces)
|
|
|
|
v8::Isolate* isolate = context->GetIsolate();
|
|
gin_helper::Dictionary dict(isolate, exports);
|
|
dict.Set("mainFrame", WebFrameRenderer::Create(
|
|
isolate, electron::GetRenderFrame(exports)));
|
|
}
|
|
|
|
} // namespace
|
|
|
|
NODE_LINKED_BINDING_CONTEXT_AWARE(electron_renderer_web_frame, Initialize)
|