5513e66982
* chore: bump chromium in DEPS to 94.0.4604.0 * build: 3-way merge of chromium patches * chore: bump chromium in DEPS to 94.0.4605.0 * build: 3-way merge of chromium patches * 3076040: Reland Remove delete_children RemoveAllChildViews arg Ref: https://chromium-review.googlesource.com/c/chromium/src/+/3076040 * 3069287: Remove the remaining uses and delete the deprecated API Ref: https://chromium-review.googlesource.com/c/chromium/src/+/3069287 * 2297212: Replace RemoveWithoutPathExpansion(.*, nullptr) with Value::RemoveKey() Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2297212 Also: https://chromium-review.googlesource.com/c/chromium/src/+/3060296 * 3082756: Change transport_security_persister_path param to be a path to a file. Refs: https://chromium-review.googlesource.com/c/chromium/src/+/3082756 > this CL intentionally changes the name of the parameter > in the network context parameters and the order of the constructor > parameters to ensure all callers update their code to pass a full > file path rather than a path to a directory. The 'path' in this diff is already an absolute path, coming from `CHECK(base::PathService::Get(chrome::DIR_USER_DATA, &path_));` at08ff1c2cbf/shell/browser/electron_browser_context.cc (L126)
* iwyu: network::mojom::HttpRawHeaderPair * fixup! 3076040: Reland Remove delete_children RemoveAllChildViews arg Missed one. * 2999884: CodeHealth: Remove DictionaryValue::GetStringWithoutPathExpansion Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2999884 (example of replacing GetStringWithoutPathExpansion() w/FindStringKey()) Also: https://chromium-review.googlesource.com/c/chromium/src/+/3060296 (removal of DictionaryValue::GetStringWithoutPathExpansion) * 3059260: Remove kSameSiteByDefaultCookies and kCookiesWithoutSameSiteMustBeSecure Refs: https://chromium-review.googlesource.com/c/chromium/src/+/3059260 We had both of these in a 'disable_features' list. Since these feature have been removed upstream, remove them from our disable list, too. IMPORTANT: this commit should not be backported to older branches that still have these features, because doing so would un-disable them. * 2920890: Load reroute_info from download in-progress and history db back into DownloadItem. Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2920890 * 3039323: [Clipboard API] Clipboard Custom Formats implementation Part 5. Refs: https://chromium-review.googlesource.com/c/chromium/src/+/3039323 * chore: bump chromium in DEPS to 94.0.4606.0 * 3084502: Add a new PrintRasterizePdfDpi policy. Refs: https://chromium-review.googlesource.com/c/chromium/src/+/3084502 * chore: update patches * chore: bump chromium in DEPS to 94.0.4606.3 * chore: bump chromium in DEPS to 95.0.4608.0 * chore: bump chromium in DEPS to 95.0.4609.0 * [DevTools] Remove report_raw_headers from network::ResourceRequest https://chromium-review.googlesource.com/c/chromium/src/+/2856099 * Remove content::WebContentsObserver::OnInterfaceRequestFromFrame https://chromium-review.googlesource.com/c/chromium/src/+/3092665 * Disable kDesktopCaptureMacV2 https://chromium-review.googlesource.com/c/chromium/src/+/3069272 * Add a new PrintRasterizePdfDpi policy. https://chromium-review.googlesource.com/c/chromium/src/+/3084502 * chore: update patches * chore: bump chromium in DEPS to 95.0.4609.3 * disable `use_lld` for macos * chore: update patches * Linux: use chrome_crashpad_handler instead of crashpad_handler https://chromium-review.googlesource.com/c/chromium/src/+/3054290 * chore: fix lint * Revert "[DevTools] Remove report_raw_headers from network::ResourceRequest" This reverts commit 28f4da1582d046e96cb58f3cbb590503e89dfd0d. * [DevTools] Remove report_raw_headers from network::ResourceRequest (Attempt #2) https://chromium-review.googlesource.com/c/chromium/src/+/2856099 * DCHECK that predictor always has a non-empty NetworkIsolationKey. https://chromium-review.googlesource.com/c/chromium/src/+/3067698 * Remove --no-untrusted-code-mitigations from //content and //gin https://chromium-review.googlesource.com/c/chromium/src/+/3096585 * fixup! Remove kSameSiteByDefaultCookies and kCookiesWithoutSameSiteMustBeSecure https://chromium-review.googlesource.com/c/chromium/src/+/3059260 * fixup! Remove kSameSiteByDefaultCookies and kCookiesWithoutSameSiteMustBeSecure * Convert PrintManager to RenderFrameHostReceiverSet. https://chromium-review.googlesource.com/c/chromium/src/+/3072019 * chore: bump chromium in DEPS to 95.0.4612.5 * chore: disable v8 oilpan * [Compiler] Remove untrusted code mitigations. https://chromium-review.googlesource.com/c/v8/v8/+/3045704 * Remove most FTP logic from services/network. https://chromium-review.googlesource.com/c/chromium/src/+/3076119 * Rename scale_factor.h -> resource_scale_factor.h https://chromium-review.googlesource.com/c/chromium/src/+/3057113 * [GURL -> SiteForCookies] extensions/ https://chromium-review.googlesource.com/c/chromium/src/+/3100825 * breadcrumbs: add desktop entry point https://chromium-review.googlesource.com/c/chromium/src/+/3021746 * Move args_ to private in ExtensionFunction https://chromium-review.googlesource.com/c/chromium/src/+/3076261 * chore: iwyu * fixup! Remove kSameSiteByDefaultCookies and kCookiesWithoutSameSiteMustBeSecure * Disable kDesktopCaptureMacV2 https://chromium-review.googlesource.com/c/chromium/src/+/3069272 * fixup! [Compiler] Remove untrusted code mitigations. * fixup! Disable kDesktopCaptureMacV2 * Revert "chore: disable v8 oilpan" This reverts commit 5d255cf1d8e8efbb906047937a713279e5f800d0. * Reland "chore: disable v8 oilpan" This reverts commit 1c252765b07a205560e7b5eed06de2605336e2d8. The previous revert was to test on which platforms did the heapsnapshot test actually fail. * [Clipboard API] Clipboard Custom Formats implementation Part 5. https://chromium-review.googlesource.com/c/chromium/src/+/3039323 * Convert ExtensionFrameHost to RenderFrameHostReceiverSet. https://chromium-review.googlesource.com/c/chromium/src/+/3063358 * Convert PDFWebContentsHelper to RenderFrameHostReceiverSet. https://chromium-review.googlesource.com/c/chromium/src/+/3049751 * [Underscore Migration] Migrate ui/legacy https://chromium-review.googlesource.com/c/devtools/devtools-frontend/+/3093160 * chore: remove unknown permission error * chore: fix lint * chore: ignore -Wunreachable-code-return for node deps/ * fixup! chore: ignore -Wunreachable-code-return for node deps/ * fix: windows build * fix: build dependency Dependency was missed incbeae20438
* 3108669: arm,dsp: Fix 8bpp Dct64_NEON(). https://chromium-review.googlesource.com/c/codecs/libgav1/+/3108669 * chore: revert libgav1 roll * Revert "3108669: arm,dsp: Fix 8bpp Dct64_NEON()." This reverts commit 7ed31323127aac8ba2eaff9cae6c9be9a4954f33. * Revert "chore: revert libgav1 roll" This reverts commit 084a490d298811267316c786762fe7aa91b6318d. * chore: revert clang roll * chore: Fix -Wunreachable-code-aggressive warnings in arm and arm64 code Co-authored-by: electron-roller[bot] <84116207+electron-roller[bot]@users.noreply.github.com> Co-authored-by: Charles Kerr <charles@charleskerr.com> Co-authored-by: deepak1556 <hop2deep@gmail.com> Co-authored-by: mlaurencin <mlaurencin@electronjs.org> Co-authored-by: John Kleinschmidt <jkleinsc@electronjs.org>
496 lines
16 KiB
C++
496 lines
16 KiB
C++
// Copyright (c) 2013 GitHub, Inc.
|
|
// Use of this source code is governed by the MIT license that can be
|
|
// found in the LICENSE file.
|
|
|
|
#include "shell/app/electron_main_delegate.h"
|
|
|
|
#include <iostream>
|
|
#include <memory>
|
|
#include <string>
|
|
|
|
#include "base/base_switches.h"
|
|
#include "base/command_line.h"
|
|
#include "base/environment.h"
|
|
#include "base/files/file_util.h"
|
|
#include "base/logging.h"
|
|
#include "base/mac/bundle_locations.h"
|
|
#include "base/path_service.h"
|
|
#include "base/strings/string_split.h"
|
|
#include "chrome/common/chrome_paths.h"
|
|
#include "chrome/common/chrome_switches.h"
|
|
#include "components/content_settings/core/common/content_settings_pattern.h"
|
|
#include "content/public/common/content_switches.h"
|
|
#include "electron/buildflags/buildflags.h"
|
|
#include "extensions/common/constants.h"
|
|
#include "ipc/ipc_buildflags.h"
|
|
#include "sandbox/policy/switches.h"
|
|
#include "services/tracing/public/cpp/stack_sampling/tracing_sampler_profiler.h"
|
|
#include "shell/app/electron_content_client.h"
|
|
#include "shell/browser/electron_browser_client.h"
|
|
#include "shell/browser/electron_gpu_client.h"
|
|
#include "shell/browser/feature_list.h"
|
|
#include "shell/browser/relauncher.h"
|
|
#include "shell/common/application_info.h"
|
|
#include "shell/common/electron_paths.h"
|
|
#include "shell/common/logging.h"
|
|
#include "shell/common/options_switches.h"
|
|
#include "shell/common/platform_util.h"
|
|
#include "shell/renderer/electron_renderer_client.h"
|
|
#include "shell/renderer/electron_sandboxed_renderer_client.h"
|
|
#include "shell/utility/electron_content_utility_client.h"
|
|
#include "ui/base/resource/resource_bundle.h"
|
|
#include "ui/base/ui_base_switches.h"
|
|
|
|
#if defined(OS_MAC)
|
|
#include "shell/app/electron_main_delegate_mac.h"
|
|
#endif
|
|
|
|
#if defined(OS_WIN)
|
|
#include "base/win/win_util.h"
|
|
#include "chrome/child/v8_crashpad_support_win.h"
|
|
#endif
|
|
|
|
#if defined(OS_LINUX)
|
|
#include "base/nix/xdg_util.h"
|
|
#include "components/crash/core/app/breakpad_linux.h"
|
|
#include "v8/include/v8-wasm-trap-handler-posix.h"
|
|
#include "v8/include/v8.h"
|
|
#endif
|
|
|
|
#if !defined(MAS_BUILD)
|
|
#include "components/crash/core/app/crash_switches.h" // nogncheck
|
|
#include "components/crash/core/app/crashpad.h" // nogncheck
|
|
#include "components/crash/core/common/crash_key.h"
|
|
#include "components/crash/core/common/crash_keys.h"
|
|
#include "shell/app/electron_crash_reporter_client.h"
|
|
#include "shell/browser/api/electron_api_crash_reporter.h"
|
|
#include "shell/common/crash_keys.h"
|
|
#endif
|
|
|
|
namespace electron {
|
|
|
|
namespace {
|
|
|
|
const char kRelauncherProcess[] = "relauncher";
|
|
|
|
constexpr base::StringPiece kElectronDisableSandbox("ELECTRON_DISABLE_SANDBOX");
|
|
constexpr base::StringPiece kElectronEnableStackDumping(
|
|
"ELECTRON_ENABLE_STACK_DUMPING");
|
|
|
|
bool IsBrowserProcess(base::CommandLine* cmd) {
|
|
std::string process_type = cmd->GetSwitchValueASCII(::switches::kProcessType);
|
|
return process_type.empty();
|
|
}
|
|
|
|
bool IsSandboxEnabled(base::CommandLine* command_line) {
|
|
return command_line->HasSwitch(switches::kEnableSandbox) ||
|
|
!command_line->HasSwitch(sandbox::policy::switches::kNoSandbox);
|
|
}
|
|
|
|
// Returns true if this subprocess type needs the ResourceBundle initialized
|
|
// and resources loaded.
|
|
bool SubprocessNeedsResourceBundle(const std::string& process_type) {
|
|
return
|
|
#if defined(OS_LINUX)
|
|
// The zygote process opens the resources for the renderers.
|
|
process_type == ::switches::kZygoteProcess ||
|
|
#endif
|
|
#if defined(OS_MAC)
|
|
// Mac needs them too for scrollbar related images and for sandbox
|
|
// profiles.
|
|
process_type == ::switches::kGpuProcess ||
|
|
#endif
|
|
process_type == ::switches::kPpapiPluginProcess ||
|
|
process_type == ::switches::kRendererProcess ||
|
|
process_type == ::switches::kUtilityProcess;
|
|
}
|
|
|
|
#if defined(OS_WIN)
|
|
void InvalidParameterHandler(const wchar_t*,
|
|
const wchar_t*,
|
|
const wchar_t*,
|
|
unsigned int,
|
|
uintptr_t) {
|
|
// noop.
|
|
}
|
|
#endif
|
|
|
|
// TODO(nornagon): move path provider overriding to its own file in
|
|
// shell/common
|
|
bool ElectronPathProvider(int key, base::FilePath* result) {
|
|
bool create_dir = false;
|
|
base::FilePath cur;
|
|
switch (key) {
|
|
case chrome::DIR_USER_DATA:
|
|
if (!base::PathService::Get(DIR_APP_DATA, &cur))
|
|
return false;
|
|
cur = cur.Append(base::FilePath::FromUTF8Unsafe(
|
|
GetPossiblyOverriddenApplicationName()));
|
|
create_dir = true;
|
|
break;
|
|
case DIR_CRASH_DUMPS:
|
|
if (!base::PathService::Get(chrome::DIR_USER_DATA, &cur))
|
|
return false;
|
|
#if defined(OS_MAC) || defined(OS_WIN)
|
|
cur = cur.Append(FILE_PATH_LITERAL("Crashpad"));
|
|
#else
|
|
cur = cur.Append(FILE_PATH_LITERAL("Crash Reports"));
|
|
#endif
|
|
create_dir = true;
|
|
break;
|
|
case chrome::DIR_APP_DICTIONARIES:
|
|
// TODO(nornagon): can we just default to using Chrome's logic here?
|
|
if (!base::PathService::Get(chrome::DIR_USER_DATA, &cur))
|
|
return false;
|
|
cur = cur.Append(base::FilePath::FromUTF8Unsafe("Dictionaries"));
|
|
create_dir = true;
|
|
break;
|
|
case DIR_USER_CACHE: {
|
|
#if defined(OS_POSIX)
|
|
int parent_key = base::DIR_CACHE;
|
|
#else
|
|
// On Windows, there's no OS-level centralized location for caches, so
|
|
// store the cache in the app data directory.
|
|
int parent_key = base::DIR_APP_DATA;
|
|
#endif
|
|
if (!base::PathService::Get(parent_key, &cur))
|
|
return false;
|
|
cur = cur.Append(base::FilePath::FromUTF8Unsafe(
|
|
GetPossiblyOverriddenApplicationName()));
|
|
create_dir = true;
|
|
break;
|
|
}
|
|
#if defined(OS_LINUX)
|
|
case DIR_APP_DATA: {
|
|
auto env = base::Environment::Create();
|
|
cur = base::nix::GetXDGDirectory(
|
|
env.get(), base::nix::kXdgConfigHomeEnvVar, base::nix::kDotConfigDir);
|
|
break;
|
|
}
|
|
#endif
|
|
#if defined(OS_WIN)
|
|
case DIR_RECENT:
|
|
if (!platform_util::GetFolderPath(DIR_RECENT, &cur))
|
|
return false;
|
|
create_dir = true;
|
|
break;
|
|
#endif
|
|
case DIR_APP_LOGS:
|
|
#if defined(OS_MAC)
|
|
if (!base::PathService::Get(base::DIR_HOME, &cur))
|
|
return false;
|
|
cur = cur.Append(FILE_PATH_LITERAL("Library"));
|
|
cur = cur.Append(FILE_PATH_LITERAL("Logs"));
|
|
cur = cur.Append(base::FilePath::FromUTF8Unsafe(
|
|
GetPossiblyOverriddenApplicationName()));
|
|
#else
|
|
if (!base::PathService::Get(chrome::DIR_USER_DATA, &cur))
|
|
return false;
|
|
cur = cur.Append(base::FilePath::FromUTF8Unsafe("logs"));
|
|
#endif
|
|
create_dir = true;
|
|
break;
|
|
default:
|
|
return false;
|
|
}
|
|
|
|
// TODO(bauerb): http://crbug.com/259796
|
|
base::ThreadRestrictions::ScopedAllowIO allow_io;
|
|
if (create_dir && !base::PathExists(cur) && !base::CreateDirectory(cur)) {
|
|
return false;
|
|
}
|
|
|
|
*result = cur;
|
|
|
|
return true;
|
|
}
|
|
|
|
void RegisterPathProvider() {
|
|
base::PathService::RegisterProvider(ElectronPathProvider, PATH_START,
|
|
PATH_END);
|
|
}
|
|
|
|
} // namespace
|
|
|
|
std::string LoadResourceBundle(const std::string& locale) {
|
|
const bool initialized = ui::ResourceBundle::HasSharedInstance();
|
|
DCHECK(!initialized);
|
|
|
|
// Load other resource files.
|
|
base::FilePath pak_dir;
|
|
#if defined(OS_MAC)
|
|
pak_dir =
|
|
base::mac::FrameworkBundlePath().Append(FILE_PATH_LITERAL("Resources"));
|
|
#else
|
|
base::PathService::Get(base::DIR_MODULE, &pak_dir);
|
|
#endif
|
|
|
|
std::string loaded_locale = ui::ResourceBundle::InitSharedInstanceWithLocale(
|
|
locale, nullptr, ui::ResourceBundle::LOAD_COMMON_RESOURCES);
|
|
ui::ResourceBundle& bundle = ui::ResourceBundle::GetSharedInstance();
|
|
bundle.AddDataPackFromPath(pak_dir.Append(FILE_PATH_LITERAL("resources.pak")),
|
|
ui::kScaleFactorNone);
|
|
return loaded_locale;
|
|
}
|
|
|
|
ElectronMainDelegate::ElectronMainDelegate() = default;
|
|
|
|
ElectronMainDelegate::~ElectronMainDelegate() = default;
|
|
|
|
const char* const ElectronMainDelegate::kNonWildcardDomainNonPortSchemes[] = {
|
|
extensions::kExtensionScheme};
|
|
const size_t ElectronMainDelegate::kNonWildcardDomainNonPortSchemesSize =
|
|
base::size(kNonWildcardDomainNonPortSchemes);
|
|
|
|
bool ElectronMainDelegate::BasicStartupComplete(int* exit_code) {
|
|
auto* command_line = base::CommandLine::ForCurrentProcess();
|
|
|
|
#if defined(OS_WIN)
|
|
v8_crashpad_support::SetUp();
|
|
|
|
// On Windows the terminal returns immediately, so we add a new line to
|
|
// prevent output in the same line as the prompt.
|
|
if (IsBrowserProcess(command_line))
|
|
std::wcout << std::endl;
|
|
#endif // !defined(OS_WIN)
|
|
|
|
auto env = base::Environment::Create();
|
|
|
|
// Enable convenient stack printing. This is enabled by default in
|
|
// non-official builds.
|
|
if (env->HasVar(kElectronEnableStackDumping))
|
|
base::debug::EnableInProcessStackDumping();
|
|
|
|
if (env->HasVar(kElectronDisableSandbox))
|
|
command_line->AppendSwitch(sandbox::policy::switches::kNoSandbox);
|
|
|
|
tracing_sampler_profiler_ =
|
|
tracing::TracingSamplerProfiler::CreateOnMainThread();
|
|
|
|
chrome::RegisterPathProvider();
|
|
electron::RegisterPathProvider();
|
|
|
|
#if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
|
|
ContentSettingsPattern::SetNonWildcardDomainNonPortSchemes(
|
|
kNonWildcardDomainNonPortSchemes, kNonWildcardDomainNonPortSchemesSize);
|
|
#endif
|
|
|
|
#if defined(OS_MAC)
|
|
OverrideChildProcessPath();
|
|
OverrideFrameworkBundlePath();
|
|
SetUpBundleOverrides();
|
|
#endif
|
|
|
|
#if defined(OS_WIN)
|
|
// Ignore invalid parameter errors.
|
|
_set_invalid_parameter_handler(InvalidParameterHandler);
|
|
// Disable the ActiveVerifier, which is used by Chrome to track possible
|
|
// bugs, but no use in Electron.
|
|
base::win::DisableHandleVerifier();
|
|
|
|
if (IsBrowserProcess(command_line))
|
|
base::win::PinUser32();
|
|
#endif
|
|
|
|
#if defined(OS_LINUX)
|
|
// Check for --no-sandbox parameter when running as root.
|
|
if (getuid() == 0 && IsSandboxEnabled(command_line))
|
|
LOG(FATAL) << "Running as root without --"
|
|
<< sandbox::policy::switches::kNoSandbox
|
|
<< " is not supported. See https://crbug.com/638180.";
|
|
#endif
|
|
|
|
#if defined(MAS_BUILD)
|
|
// In MAS build we are using --disable-remote-core-animation.
|
|
//
|
|
// According to ccameron:
|
|
// If you're running with --disable-remote-core-animation, you may want to
|
|
// also run with --disable-gpu-memory-buffer-compositor-resources as well.
|
|
// That flag makes it so we use regular GL textures instead of IOSurfaces
|
|
// for compositor resources. IOSurfaces are very heavyweight to
|
|
// create/destroy, but they can be displayed directly by CoreAnimation (and
|
|
// --disable-remote-core-animation makes it so we don't use this property,
|
|
// so they're just heavyweight with no upside).
|
|
command_line->AppendSwitch(
|
|
::switches::kDisableGpuMemoryBufferCompositorResources);
|
|
#endif
|
|
|
|
content_client_ = std::make_unique<ElectronContentClient>();
|
|
SetContentClient(content_client_.get());
|
|
|
|
return false;
|
|
}
|
|
|
|
void ElectronMainDelegate::PreSandboxStartup() {
|
|
auto* command_line = base::CommandLine::ForCurrentProcess();
|
|
|
|
std::string process_type =
|
|
command_line->GetSwitchValueASCII(::switches::kProcessType);
|
|
|
|
base::FilePath user_data_dir =
|
|
command_line->GetSwitchValuePath(::switches::kUserDataDir);
|
|
if (!user_data_dir.empty()) {
|
|
base::PathService::OverrideAndCreateIfNeeded(chrome::DIR_USER_DATA,
|
|
user_data_dir, false, true);
|
|
}
|
|
|
|
#if !defined(OS_WIN)
|
|
// For windows we call InitLogging later, after the sandbox is initialized.
|
|
//
|
|
// On Linux, we force a "preinit" in the zygote (i.e. never log to a default
|
|
// log file), because the zygote is booted prior to JS running, so it can't
|
|
// know the correct user-data directory. (And, further, accessing the
|
|
// application name on Linux can cause glib calls that end up spawning
|
|
// threads, which if done before the zygote is booted, causes a CHECK().)
|
|
logging::InitElectronLogging(*command_line,
|
|
/* is_preinit = */ process_type.empty() ||
|
|
process_type == ::switches::kZygoteProcess);
|
|
#endif
|
|
|
|
#if !defined(MAS_BUILD)
|
|
crash_reporter::InitializeCrashKeys();
|
|
#endif
|
|
|
|
// Initialize ResourceBundle which handles files loaded from external
|
|
// sources. The language should have been passed in to us from the
|
|
// browser process as a command line flag.
|
|
if (SubprocessNeedsResourceBundle(process_type)) {
|
|
std::string locale = command_line->GetSwitchValueASCII(::switches::kLang);
|
|
LoadResourceBundle(locale);
|
|
}
|
|
|
|
#if defined(OS_WIN) || (defined(OS_MAC) && !defined(MAS_BUILD))
|
|
// In the main process, we wait for JS to call crashReporter.start() before
|
|
// initializing crashpad. If we're in the renderer, we want to initialize it
|
|
// immediately at boot.
|
|
if (!process_type.empty()) {
|
|
ElectronCrashReporterClient::Create();
|
|
crash_reporter::InitializeCrashpad(false, process_type);
|
|
}
|
|
#endif
|
|
|
|
#if defined(OS_LINUX)
|
|
// Zygote needs to call InitCrashReporter() in RunZygote().
|
|
if (process_type != ::switches::kZygoteProcess && !process_type.empty()) {
|
|
ElectronCrashReporterClient::Create();
|
|
if (crash_reporter::IsCrashpadEnabled()) {
|
|
if (command_line->HasSwitch(
|
|
crash_reporter::switches::kCrashpadHandlerPid)) {
|
|
crash_reporter::InitializeCrashpad(false, process_type);
|
|
crash_reporter::SetFirstChanceExceptionHandler(
|
|
v8::TryHandleWebAssemblyTrapPosix);
|
|
}
|
|
} else {
|
|
breakpad::InitCrashReporter(process_type);
|
|
}
|
|
}
|
|
#endif
|
|
|
|
#if !defined(MAS_BUILD)
|
|
crash_keys::SetCrashKeysFromCommandLine(*command_line);
|
|
crash_keys::SetPlatformCrashKey();
|
|
#endif
|
|
|
|
if (IsBrowserProcess(command_line)) {
|
|
// Only append arguments for browser process.
|
|
|
|
// Allow file:// URIs to read other file:// URIs by default.
|
|
command_line->AppendSwitch(::switches::kAllowFileAccessFromFiles);
|
|
|
|
#if defined(OS_MAC)
|
|
// Enable AVFoundation.
|
|
command_line->AppendSwitch("enable-avfoundation");
|
|
#endif
|
|
}
|
|
}
|
|
|
|
void ElectronMainDelegate::SandboxInitialized(const std::string& process_type) {
|
|
#if defined(OS_WIN)
|
|
logging::InitElectronLogging(*base::CommandLine::ForCurrentProcess(),
|
|
/* is_preinit = */ process_type.empty());
|
|
#endif
|
|
}
|
|
|
|
void ElectronMainDelegate::PreBrowserMain() {
|
|
// This is initialized early because the service manager reads some feature
|
|
// flags and we need to make sure the feature list is initialized before the
|
|
// service manager reads the features.
|
|
InitializeFeatureList();
|
|
#if defined(OS_MAC)
|
|
RegisterAtomCrApp();
|
|
#endif
|
|
}
|
|
|
|
content::ContentBrowserClient*
|
|
ElectronMainDelegate::CreateContentBrowserClient() {
|
|
browser_client_ = std::make_unique<ElectronBrowserClient>();
|
|
return browser_client_.get();
|
|
}
|
|
|
|
content::ContentGpuClient* ElectronMainDelegate::CreateContentGpuClient() {
|
|
gpu_client_ = std::make_unique<ElectronGpuClient>();
|
|
return gpu_client_.get();
|
|
}
|
|
|
|
content::ContentRendererClient*
|
|
ElectronMainDelegate::CreateContentRendererClient() {
|
|
auto* command_line = base::CommandLine::ForCurrentProcess();
|
|
|
|
if (IsSandboxEnabled(command_line)) {
|
|
renderer_client_ = std::make_unique<ElectronSandboxedRendererClient>();
|
|
} else {
|
|
renderer_client_ = std::make_unique<ElectronRendererClient>();
|
|
}
|
|
|
|
return renderer_client_.get();
|
|
}
|
|
|
|
content::ContentUtilityClient*
|
|
ElectronMainDelegate::CreateContentUtilityClient() {
|
|
utility_client_ = std::make_unique<ElectronContentUtilityClient>();
|
|
return utility_client_.get();
|
|
}
|
|
|
|
int ElectronMainDelegate::RunProcess(
|
|
const std::string& process_type,
|
|
const content::MainFunctionParams& main_function_params) {
|
|
if (process_type == kRelauncherProcess)
|
|
return relauncher::RelauncherMain(main_function_params);
|
|
else
|
|
return -1;
|
|
}
|
|
|
|
bool ElectronMainDelegate::ShouldCreateFeatureList() {
|
|
return false;
|
|
}
|
|
|
|
bool ElectronMainDelegate::ShouldLockSchemeRegistry() {
|
|
return false;
|
|
}
|
|
|
|
#if defined(OS_LINUX)
|
|
void ElectronMainDelegate::ZygoteForked() {
|
|
// Needs to be called after we have DIR_USER_DATA. BrowserMain sets
|
|
// this up for the browser process in a different manner.
|
|
ElectronCrashReporterClient::Create();
|
|
const base::CommandLine* command_line =
|
|
base::CommandLine::ForCurrentProcess();
|
|
std::string process_type =
|
|
command_line->GetSwitchValueASCII(::switches::kProcessType);
|
|
if (crash_reporter::IsCrashpadEnabled()) {
|
|
if (command_line->HasSwitch(
|
|
crash_reporter::switches::kCrashpadHandlerPid)) {
|
|
crash_reporter::InitializeCrashpad(false, process_type);
|
|
crash_reporter::SetFirstChanceExceptionHandler(
|
|
v8::TryHandleWebAssemblyTrapPosix);
|
|
}
|
|
} else {
|
|
breakpad::InitCrashReporter(process_type);
|
|
}
|
|
|
|
// Reset the command line for the newly spawned process.
|
|
crash_keys::SetCrashKeysFromCommandLine(*command_line);
|
|
}
|
|
#endif // defined(OS_LINUX)
|
|
|
|
} // namespace electron
|