d02c9f8bc6
* chore: bump chromium in DEPS to 111.0.5522.0 * chore: bump chromium in DEPS to 111.0.5524.0 * chore: bump chromium in DEPS to 111.0.5526.0 * chore: bump chromium in DEPS to 111.0.5528.0 * chore: update patches/chromium/mas_avoid_usage_of_private_macos_apis.patch Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4132807 Fix simple code shear * chore: update patches/chromium/unsandboxed_ppapi_processes_skip_zygote.patch Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4130675 Fix simple code shear * chore: update patches/chromium/hack_plugin_response_interceptor_to_point_to_electron.patch Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4144281 Fix simple code shear; applied cleanly w/patch-fuzz * chore: update patches/chromium/disable_unload_metrics.patch Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4126173 Fix simple code shear; applied cleanly w/patch-fuzz * chore: update patches/chromium/feat_add_data_parameter_to_processsingleton.patch Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4144281 Fix simple code shear; applied cleanly w/patch-fuzz * chore: update patches/chromium/preconnect_manager.patch https://chromium-review.googlesource.com/c/chromium/src/+/4144281 Fix simple code shear; applied cleanly w/patch-fuzz * chore: update patches/v8/force_cppheapcreateparams_to_be_noncopyable.patch https://chromium-review.googlesource.com/c/v8/v8/+/3533019 Fix simple code shear; applied cleanly w/patch-fuzz * chore: update patches * chore: update patches/chromium/add_maximized_parameter_to_linuxui_getwindowframeprovider.patch Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4128765 Upstream added a new call to HeaderContext(), whose signature we have patched * chore: bump chromium in DEPS to 111.0.5530.0 * chore: update patches * Move ChildProcessHost* from content/common to content/browser Xref: Move ChildProcessHost* from content/common to content/browser * Remove RenderViewHostChanged Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4134103 [upstream removal of RenderViewHostChanged] Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4092763 Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4093234 Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4133892 Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4134103 [examples of upstream code adjusting to the change] Upstream handles this change in roughly two approaches: 1. Move the code over to RenderFrameHostChanged(old_host, new_host) but test for new_host->IsInPrimaryMainFrame() before acting 2. Migrate to the PrimaryPageChanged(page) API and use page.GetMainDocument() to get the RenderFrameHost. I've chosen 1. because electron_api_web_contents needed that pointer to old_host to call RemoveInputEventListener(), but I may be missing some context & would appreciate review on this commit. * Make electron/shell/browser/relauncher_win.cc use <winternl.h> Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4129135 Many internal Windows types are now available in winternl.h so upstrem no longer defines the types themselves. * Move ChildProcessHost* from content/common to content/browser Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4134795 * fixup! Make electron/shell/browser/relauncher_win.cc use <winternl.h> winternl.h does not define the field we need, so clone the struct Chromium was using into unnamed namespace * fixup! Move ChildProcessHost* from content/common to content/browser chore: update #includes too * chore: bump chromium in DEPS to 111.0.5532.0 * chore: sync patches/chromium/pepper_plugin_support.patch Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4133323 manually reync patch; no code changes * chore: sync patches/chromium/mas_no_private_api.patch Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4143865 the content/common/pseudonymization_salt.cc patch is no longer needed * chore: sync patches/chromium/mas_disable_remote_accessibility.patch patch-fuzz update; no manual changes * chore: sync patches/chromium/build_do_not_depend_on_packed_resource_integrity.patch Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4111725 manually reync patch; no code changes * chore: sync patches/chromium/create_browser_v8_snapshot_file_name_fuse.patch Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4133323 manually reync patch; no code changes * chore: sync patches/v8/fix_build_deprecated_attribute_for_older_msvc_versions.patch Xref: https://chromium-review.googlesource.com/c/v8/v8/+/4127230 patch-fuzz update; no manual changes * chore: rebuild patches * fixup! Remove RenderViewHostChanged Use PrimaryPageChanged() * chore: remove unused method TabsUpdateFunction::OnExecuteCodeFinished() Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4133991 This private, already-unused function showed up as a FTBFS because it took a base::ListValue parameter and ListValue was removed upstream. * task posting v3: remove includes of runner handles and IWYU task runners Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4133323 * chore: lint * chore: more lint * fixup! task posting v3: remove includes of runner handles and IWYU task runners macOS, too * fixup! task posting v3: remove includes of runner handles and IWYU task runners * chore: bump chromium in DEPS to 111.0.5534.0 * chore: sync patches/chromium/allow_new_privileges_in_unsandboxed_child_processes.patch Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4141862 patch-fuzz update; no manual changes * chore: sync patches/chromium/logging_win32_only_create_a_console_if_logging_to_stderr.patch Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4153110 Sync to minor upstream changes. Add const correctness. * chore: sync electron/patches/chromium/feat_configure_launch_options_for_service_process.patch https://chromium-review.googlesource.com/c/chromium/src/+/4141862 patch-fuzz update; no manual changes * chore: patches/v8/fix_build_deprecated_attribute_for_older_msvc_versions.patch sync https://chromium-review.googlesource.com/c/v8/v8/+/4147787 patch-fuzz update; no manual changes * chore: update patches * chore: bump chromium in DEPS to 111.0.5536.0 * chore: sync patches/chromium/allow_new_privileges_in_unsandboxed_child_processes.patch Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4141863 Sync with upstream code changes. Minor code golf for readability. Note: upstream is laying groundwork for being able to work off of env vars instead of switches. Doesn't affect us yet but worth being aware of. > + // Environment variables could be supported in the future, but are not > + // currently supported when launching with the zygote. * chore: update patches/chromium/feat_expose_raw_response_headers_from_urlloader.patch Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4126836 patch-fuzz update; no manual changes * chore: sync electron/patches/chromium/feat_configure_launch_options_for_service_process.patch Xref: https://chromium-review.googlesource.com/c/chromium/src/+/4141863 manual sync * chore: sync electron/patches/v8/fix_build_deprecated_attribute_for_older_msvc_versions.patch https://chromium-review.googlesource.com/c/v8/v8/+/4147788 fuzz-patch * chore: rebuild patches * chore: bump chromium in DEPS to 111.0.5538.0 * chore: bump chromium in DEPS to 111.0.5540.0 * chore: update patches * Remove sdk_forward_declarations https://chromium-review.googlesource.com/c/chromium/src/+/4166680 * task posting v3: Remove task runner handles from codebase entirely Refs https://chromium-review.googlesource.com/c/chromium/src/+/4150928 * Cleanup child_process_launcher_helper* Refs https://chromium-review.googlesource.com/c/chromium/src/+/4141863 * fix: utilityprocess spec on macOS * fix: build on windows Refs https://chromium-review.googlesource.com/c/chromium/src/+/4141863 * chore: fix lint * chore: bump chromium 111.0.5544.3 * chore: gen filenames.libcxx.gni * Add check for Executable+Writable handles in renderer processes. Refs https://chromium-review.googlesource.com/c/chromium/src/+/3774416 * fixup! Add check for Executable+Writable handles in renderer processes. * 4143761: [110] Disable SwiftShader for WebGL on M1 Macs. https://chromium-review.googlesource.com/c/chromium/src/+/4143761 (cherry picked from commit 2f74db3c2139424c416f92d9169aeaa8a2f9c1ec) * chore: bump chromium to 111.0.5555.0 * 56085: Remove hmac.h include from ssl.h. https://boringssl-review.googlesource.com/c/boringssl/+/56085 * 4167020: Remove forwarding headers https://chromium-review.googlesource.com/c/chromium/src/+/4167020 * chore: bump chromium to 111.0.5559.0 * 4181044: Restrict WebCursor usage to RenderWidgetHostViewAura https://chromium-review.googlesource.com/c/chromium/src/+/4181044 * 4189437: views: rename ink_drop_host_view to ink_drop_host https://chromium-review.googlesource.com/c/chromium/src/+/4189437 * chore: bump chromium to 111.0.5560.0 * 4167016: win7dep: remove non aeroglass code https://chromium-review.googlesource.com/c/chromium/src/+/4167016 * fixup after rebase: Remove forwarding header s https://chromium-review.googlesource.com/c/chromium/src/+/4167020 * 4125755: Reland "Reject getDisplayMedia calls without user activation" https://chromium-review.googlesource.com/c/chromium/src/+/4125755 * test: add workaround * chore: update patches * fix: alter coreModuleRegExp to prevent arm crash * Revert "fix: alter coreModuleRegExp to prevent arm crash" This reverts commit 7e50630c98137831a711c5abdbc8809e60cf1d73. * 4218354: Disable the use of preserve_most on arm64 Windows https://chromium-review.googlesource.com/c/v8/v8/+/4218354 * chore: review changes --------- Co-authored-by: electron-roller[bot] <84116207+electron-roller[bot]@users.noreply.github.com> Co-authored-by: Charles Kerr <charles@charleskerr.com> Co-authored-by: PatchUp <73610968+patchup[bot]@users.noreply.github.com> Co-authored-by: deepak1556 <hop2deep@gmail.com> Co-authored-by: John Kleinschmidt <jkleinsc@electronjs.org> Co-authored-by: Shelley Vohr <shelley.vohr@gmail.com>
332 lines
11 KiB
C++
332 lines
11 KiB
C++
// Copyright 2019 The Chromium Authors. All rights reserved.
|
|
// Use of this source code is governed by a BSD-style license that can be
|
|
// found in the LICENSE file.
|
|
|
|
#include "shell/browser/hid/hid_chooser_context.h"
|
|
|
|
#include <utility>
|
|
|
|
#include "base/command_line.h"
|
|
#include "base/containers/contains.h"
|
|
#include "base/strings/string_number_conversions.h"
|
|
#include "base/strings/string_util.h"
|
|
#include "base/strings/stringprintf.h"
|
|
#include "base/strings/utf_string_conversions.h"
|
|
#include "base/values.h"
|
|
#include "chrome/grit/generated_resources.h"
|
|
#include "components/content_settings/core/common/content_settings_types.h"
|
|
#include "components/prefs/pref_service.h"
|
|
#include "content/public/browser/device_service.h"
|
|
#include "services/device/public/cpp/hid/hid_blocklist.h"
|
|
#include "services/device/public/cpp/hid/hid_switches.h"
|
|
#include "shell/browser/api/electron_api_session.h"
|
|
#include "shell/browser/electron_permission_manager.h"
|
|
#include "shell/browser/web_contents_permission_helper.h"
|
|
#include "shell/common/electron_constants.h"
|
|
#include "shell/common/gin_converters/content_converter.h"
|
|
#include "shell/common/gin_converters/frame_converter.h"
|
|
#include "shell/common/gin_converters/hid_device_info_converter.h"
|
|
#include "shell/common/gin_converters/value_converter.h"
|
|
#include "shell/common/gin_helper/dictionary.h"
|
|
#include "third_party/blink/public/common/permissions/permission_utils.h"
|
|
|
|
#include "ui/base/l10n/l10n_util.h"
|
|
|
|
namespace electron {
|
|
|
|
const char kHidDeviceNameKey[] = "name";
|
|
const char kHidGuidKey[] = "guid";
|
|
|
|
HidChooserContext::HidChooserContext(ElectronBrowserContext* context)
|
|
: browser_context_(context) {}
|
|
|
|
HidChooserContext::~HidChooserContext() {
|
|
// Notify observers that the chooser context is about to be destroyed.
|
|
// Observers must remove themselves from the observer lists.
|
|
for (auto& observer : device_observer_list_) {
|
|
observer.OnHidChooserContextShutdown();
|
|
DCHECK(!device_observer_list_.HasObserver(&observer));
|
|
}
|
|
}
|
|
|
|
// static
|
|
std::u16string HidChooserContext::DisplayNameFromDeviceInfo(
|
|
const device::mojom::HidDeviceInfo& device) {
|
|
if (device.product_name.empty()) {
|
|
auto device_id_string = base::ASCIIToUTF16(
|
|
base::StringPrintf("%04X:%04X", device.vendor_id, device.product_id));
|
|
return l10n_util::GetStringFUTF16(IDS_HID_CHOOSER_ITEM_WITHOUT_NAME,
|
|
device_id_string);
|
|
}
|
|
return base::UTF8ToUTF16(device.product_name);
|
|
}
|
|
|
|
// static
|
|
bool HidChooserContext::CanStorePersistentEntry(
|
|
const device::mojom::HidDeviceInfo& device) {
|
|
return !device.serial_number.empty() && !device.product_name.empty();
|
|
}
|
|
|
|
// static
|
|
base::Value HidChooserContext::DeviceInfoToValue(
|
|
const device::mojom::HidDeviceInfo& device) {
|
|
base::Value value(base::Value::Type::DICTIONARY);
|
|
value.SetStringKey(
|
|
kHidDeviceNameKey,
|
|
base::UTF16ToUTF8(HidChooserContext::DisplayNameFromDeviceInfo(device)));
|
|
value.SetIntKey(kDeviceVendorIdKey, device.vendor_id);
|
|
value.SetIntKey(kDeviceProductIdKey, device.product_id);
|
|
if (HidChooserContext::CanStorePersistentEntry(device)) {
|
|
// Use the USB serial number as a persistent identifier. If it is
|
|
// unavailable, only ephemeral permissions may be granted.
|
|
value.SetStringKey(kDeviceSerialNumberKey, device.serial_number);
|
|
} else {
|
|
// The GUID is a temporary ID created on connection that remains valid until
|
|
// the device is disconnected. Ephemeral permissions are keyed by this ID
|
|
// and must be granted again each time the device is connected.
|
|
value.SetStringKey(kHidGuidKey, device.guid);
|
|
}
|
|
return value;
|
|
}
|
|
|
|
void HidChooserContext::GrantDevicePermission(
|
|
const url::Origin& origin,
|
|
const device::mojom::HidDeviceInfo& device) {
|
|
DCHECK(base::Contains(devices_, device.guid));
|
|
if (CanStorePersistentEntry(device)) {
|
|
auto* permission_manager = static_cast<ElectronPermissionManager*>(
|
|
browser_context_->GetPermissionControllerDelegate());
|
|
|
|
permission_manager->GrantDevicePermission(
|
|
static_cast<blink::PermissionType>(
|
|
WebContentsPermissionHelper::PermissionType::HID),
|
|
origin, DeviceInfoToValue(device), browser_context_);
|
|
} else {
|
|
ephemeral_devices_[origin].insert(device.guid);
|
|
}
|
|
}
|
|
|
|
void HidChooserContext::RevokeDevicePermission(
|
|
const url::Origin& origin,
|
|
const device::mojom::HidDeviceInfo& device) {
|
|
DCHECK(base::Contains(devices_, device.guid));
|
|
if (CanStorePersistentEntry(device)) {
|
|
RevokePersistentDevicePermission(origin, device);
|
|
} else {
|
|
RevokeEphemeralDevicePermission(origin, device);
|
|
}
|
|
api::Session* session = api::Session::FromBrowserContext(browser_context_);
|
|
if (session) {
|
|
v8::Isolate* isolate = JavascriptEnvironment::GetIsolate();
|
|
v8::HandleScope scope(isolate);
|
|
gin_helper::Dictionary details =
|
|
gin_helper::Dictionary::CreateEmpty(isolate);
|
|
details.Set("device", device.Clone());
|
|
details.Set("origin", origin.Serialize());
|
|
session->Emit("hid-device-revoked", details);
|
|
}
|
|
}
|
|
|
|
void HidChooserContext::RevokePersistentDevicePermission(
|
|
const url::Origin& origin,
|
|
const device::mojom::HidDeviceInfo& device) {
|
|
auto* permission_manager = static_cast<ElectronPermissionManager*>(
|
|
browser_context_->GetPermissionControllerDelegate());
|
|
permission_manager->RevokeDevicePermission(
|
|
static_cast<blink::PermissionType>(
|
|
WebContentsPermissionHelper::PermissionType::HID),
|
|
origin, DeviceInfoToValue(device), browser_context_);
|
|
RevokeEphemeralDevicePermission(origin, device);
|
|
}
|
|
|
|
void HidChooserContext::RevokeEphemeralDevicePermission(
|
|
const url::Origin& origin,
|
|
const device::mojom::HidDeviceInfo& device) {
|
|
auto it = ephemeral_devices_.find(origin);
|
|
if (it != ephemeral_devices_.end()) {
|
|
std::set<std::string>& devices = it->second;
|
|
for (auto guid = devices.begin(); guid != devices.end();) {
|
|
DCHECK(base::Contains(devices_, *guid));
|
|
|
|
if (devices_[*guid]->physical_device_id != device.physical_device_id) {
|
|
++guid;
|
|
continue;
|
|
}
|
|
|
|
guid = devices.erase(guid);
|
|
if (devices.empty())
|
|
ephemeral_devices_.erase(it);
|
|
}
|
|
}
|
|
}
|
|
|
|
bool HidChooserContext::HasDevicePermission(
|
|
const url::Origin& origin,
|
|
const device::mojom::HidDeviceInfo& device) {
|
|
if (!base::CommandLine::ForCurrentProcess()->HasSwitch(
|
|
switches::kDisableHidBlocklist) &&
|
|
device.is_excluded_by_blocklist)
|
|
return false;
|
|
|
|
auto it = ephemeral_devices_.find(origin);
|
|
if (it != ephemeral_devices_.end() &&
|
|
base::Contains(it->second, device.guid)) {
|
|
return true;
|
|
}
|
|
|
|
auto* permission_manager = static_cast<ElectronPermissionManager*>(
|
|
browser_context_->GetPermissionControllerDelegate());
|
|
return permission_manager->CheckDevicePermission(
|
|
static_cast<blink::PermissionType>(
|
|
WebContentsPermissionHelper::PermissionType::HID),
|
|
origin, DeviceInfoToValue(device), browser_context_);
|
|
}
|
|
|
|
void HidChooserContext::AddDeviceObserver(DeviceObserver* observer) {
|
|
EnsureHidManagerConnection();
|
|
device_observer_list_.AddObserver(observer);
|
|
}
|
|
|
|
void HidChooserContext::RemoveDeviceObserver(DeviceObserver* observer) {
|
|
device_observer_list_.RemoveObserver(observer);
|
|
}
|
|
|
|
void HidChooserContext::GetDevices(
|
|
device::mojom::HidManager::GetDevicesCallback callback) {
|
|
if (!is_initialized_) {
|
|
EnsureHidManagerConnection();
|
|
pending_get_devices_requests_.push(std::move(callback));
|
|
return;
|
|
}
|
|
|
|
std::vector<device::mojom::HidDeviceInfoPtr> device_list;
|
|
device_list.reserve(devices_.size());
|
|
for (const auto& pair : devices_)
|
|
device_list.push_back(pair.second->Clone());
|
|
base::SequencedTaskRunner::GetCurrentDefault()->PostTask(
|
|
FROM_HERE, base::BindOnce(std::move(callback), std::move(device_list)));
|
|
}
|
|
|
|
const device::mojom::HidDeviceInfo* HidChooserContext::GetDeviceInfo(
|
|
const std::string& guid) {
|
|
DCHECK(is_initialized_);
|
|
auto it = devices_.find(guid);
|
|
return it == devices_.end() ? nullptr : it->second.get();
|
|
}
|
|
|
|
device::mojom::HidManager* HidChooserContext::GetHidManager() {
|
|
EnsureHidManagerConnection();
|
|
return hid_manager_.get();
|
|
}
|
|
|
|
base::WeakPtr<HidChooserContext> HidChooserContext::AsWeakPtr() {
|
|
return weak_factory_.GetWeakPtr();
|
|
}
|
|
|
|
void HidChooserContext::DeviceAdded(device::mojom::HidDeviceInfoPtr device) {
|
|
DCHECK(device);
|
|
|
|
// Update the device list.
|
|
if (!base::Contains(devices_, device->guid))
|
|
devices_.insert({device->guid, device->Clone()});
|
|
|
|
// Notify all observers.
|
|
for (auto& observer : device_observer_list_)
|
|
observer.OnDeviceAdded(*device);
|
|
}
|
|
|
|
void HidChooserContext::DeviceRemoved(device::mojom::HidDeviceInfoPtr device) {
|
|
DCHECK(device);
|
|
DCHECK(base::Contains(devices_, device->guid));
|
|
|
|
// Update the device list.
|
|
devices_.erase(device->guid);
|
|
|
|
// Notify all device observers.
|
|
for (auto& observer : device_observer_list_)
|
|
observer.OnDeviceRemoved(*device);
|
|
|
|
// Next we'll notify observers for revoked permissions. If the device does not
|
|
// support persistent permissions then device permissions are revoked on
|
|
// disconnect.
|
|
if (CanStorePersistentEntry(*device))
|
|
return;
|
|
|
|
std::vector<url::Origin> revoked_origins;
|
|
for (auto& map_entry : ephemeral_devices_) {
|
|
if (map_entry.second.erase(device->guid) > 0)
|
|
revoked_origins.push_back(map_entry.first);
|
|
}
|
|
if (revoked_origins.empty())
|
|
return;
|
|
}
|
|
|
|
void HidChooserContext::DeviceChanged(device::mojom::HidDeviceInfoPtr device) {
|
|
DCHECK(device);
|
|
DCHECK(base::Contains(devices_, device->guid));
|
|
|
|
// Update the device list.
|
|
devices_[device->guid] = device->Clone();
|
|
|
|
// Notify all observers.
|
|
for (auto& observer : device_observer_list_)
|
|
observer.OnDeviceChanged(*device);
|
|
}
|
|
|
|
void HidChooserContext::EnsureHidManagerConnection() {
|
|
if (hid_manager_)
|
|
return;
|
|
|
|
mojo::PendingRemote<device::mojom::HidManager> manager;
|
|
content::GetDeviceService().BindHidManager(
|
|
manager.InitWithNewPipeAndPassReceiver());
|
|
SetUpHidManagerConnection(std::move(manager));
|
|
}
|
|
|
|
void HidChooserContext::SetUpHidManagerConnection(
|
|
mojo::PendingRemote<device::mojom::HidManager> manager) {
|
|
hid_manager_.Bind(std::move(manager));
|
|
hid_manager_.set_disconnect_handler(base::BindOnce(
|
|
&HidChooserContext::OnHidManagerConnectionError, base::Unretained(this)));
|
|
|
|
hid_manager_->GetDevicesAndSetClient(
|
|
client_receiver_.BindNewEndpointAndPassRemote(),
|
|
base::BindOnce(&HidChooserContext::InitDeviceList,
|
|
weak_factory_.GetWeakPtr()));
|
|
}
|
|
|
|
void HidChooserContext::InitDeviceList(
|
|
std::vector<device::mojom::HidDeviceInfoPtr> devices) {
|
|
for (auto& device : devices)
|
|
devices_.insert({device->guid, std::move(device)});
|
|
|
|
is_initialized_ = true;
|
|
|
|
while (!pending_get_devices_requests_.empty()) {
|
|
std::vector<device::mojom::HidDeviceInfoPtr> device_list;
|
|
device_list.reserve(devices.size());
|
|
for (const auto& entry : devices_)
|
|
device_list.push_back(entry.second->Clone());
|
|
std::move(pending_get_devices_requests_.front())
|
|
.Run(std::move(device_list));
|
|
pending_get_devices_requests_.pop();
|
|
}
|
|
}
|
|
|
|
void HidChooserContext::OnHidManagerConnectionError() {
|
|
hid_manager_.reset();
|
|
client_receiver_.reset();
|
|
devices_.clear();
|
|
|
|
std::vector<url::Origin> revoked_origins;
|
|
revoked_origins.reserve(ephemeral_devices_.size());
|
|
for (const auto& map_entry : ephemeral_devices_)
|
|
revoked_origins.push_back(map_entry.first);
|
|
ephemeral_devices_.clear();
|
|
|
|
// Notify all device observers.
|
|
for (auto& observer : device_observer_list_)
|
|
observer.OnHidManagerConnectionError();
|
|
}
|
|
|
|
} // namespace electron
|