d62097e067
* chore: bump chromium in DEPS to 130.0.6673.0 * chore: bump chromium in DEPS to 130.0.6675.0 * chore: bump chromium in DEPS to 130.0.6677.2 * chore: bump chromium in DEPS to 130.0.6679.1 * chore: bump chromium in DEPS to 130.0.6681.1 * chore: bump chromium in DEPS to 130.0.6683.2 * chore: bump chromium in DEPS to 130.0.6685.0 * chore: bump chromium in DEPS to 130.0.6687.0 * chore: bump chromium in DEPS to 130.0.6689.0 * chore: bump chromium in DEPS to 130.0.6691.1 * chore: bump chromium in DEPS to 130.0.6693.1 * chore: bump chromium in DEPS to 130.0.6695.1 * chore: bump chromium in DEPS to 130.0.6697.1 * chore: bump chromium in DEPS to 130.0.6699.1 * chore: bump chromium in DEPS to 130.0.6701.1 * chore: bump chromium in DEPS to 130.0.6703.1 * chore: bump chromium in DEPS to 130.0.6705.1 * chore: bump chromium in DEPS to 130.0.6707.1 * chore: bump chromium in DEPS to 130.0.6709.1 * chore: bump chromium in DEPS to 130.0.6711.1 * chore: bump chromium in DEPS to 130.0.6713.1 * chore: bump chromium in DEPS to 130.0.6715.2 * chore: bump chromium in DEPS to 130.0.6717.0 * chore: bump chromium in DEPS to 130.0.6719.1 * chore: bump chromium in DEPS to 130.0.6720.1 * chore: bump chromium in DEPS to 130.0.6723.1 * chore: bump chromium in DEPS to 130.0.6723.4 * chore: bump chromium in DEPS to 130.0.6723.6 * chore: bump chromium to 130.0.6695.0 (main) (#43454) * chore: bump chromium in DEPS to 130.0.6673.0 * chore: bump chromium in DEPS to 130.0.6675.0 * chore: bump chromium in DEPS to 130.0.6677.2 * chore: bump chromium in DEPS to 130.0.6679.0 * 5802981: [Partitioned Popins] UKM https://chromium-review.googlesource.com/c/chromium/src/+/5802981 * 5799275: ash: Create //chrome/browser/ui/ash/web_view https://chromium-review.googlesource.com/c/chromium/src/+/5799275 * 5791853: [PWA] Allow WebContentsImpl::CreateNewWindow() to use new web contents for loading url https://chromium-review.googlesource.com/c/chromium/src/+/5791853 * 5805208: Move third_party/jacoco to a cipd/ subdirectory. https://chromium-review.googlesource.com/c/chromium/src/+/5805208 * chore: fixup patch indices * 5771091: Introduce InputManager class for handling input in Viz. https://chromium-review.googlesource.com/c/chromium/src/+/5771091 * 5498921: [Permission] Remove SubscribeToPermissionStatusChange from PermissionManager https://chromium-review.googlesource.com/c/chromium/src/+/5498921 * 5791853: [PWA] Allow WebContentsImpl::CreateNewWindow() to use new web contents for loading url https://chromium-review.googlesource.com/c/chromium/src/+/5791853 * 5801311: Don't use int for bindings https://chromium-review.googlesource.com/c/chromium/src/+/5801311 * 5548827: [Web Install] Define the web-app-installation PermissionPolicy https://chromium-review.googlesource.com/c/chromium/src/+/5548827 * 5786325: Add Infrastructure for Hand tracking permission https://chromium-review.googlesource.com/c/chromium/src/+/5786325 * chore: fixup patch indices * chore: bump chromium in DEPS to 130.0.6681.0 * [Views AX] Move BrowserAccessibility* to //ui/accessibility/platform Xref: https://chromium-review.googlesource.com/c/chromium/src/+/5520052 * chore: e patches all * Don't have default arguments on virtual functions in render_frame_host.h https://chromium-review.googlesource.com/c/chromium/src/+/5809399 * test: log if loadURL fails in base url test * chore: bump chromium in DEPS to 130.0.6683.2 * chore: fix support_mixed_sandbox_with_zygote.patch content: restore old DisableJit behavior https://chromium-review.googlesource.com/c/chromium/src/+/5804255 * chore: update patch indices * chore: bump chromium in DEPS to 130.0.6685.0 * Parallel process launching Xref: https://chromium-review.googlesource.com/c/chromium/src/+/5015584 * chore: update feat_expose_documentloader_setdefersloading_on_webdocumentloader.patch No manual changes; patch applied with fuzz 1 * chore: e patches all * chore: bump chromium in DEPS to 130.0.6687.0 * chore: bump chromium in DEPS to 130.0.6689.0 * chore: bump chromium in DEPS to 130.0.6691.0 * chore: bump chromium in DEPS to 130.0.6693.0 * chore: update patches * chore: bump chromium in DEPS to 130.0.6695.0 * chore: free up macos disk space as soon as possible * 5824143: Use checked in source lists for third_party/boringssl https://chromium-review.googlesource.com/c/chromium/src/+/5824143 * chore: update patches * 5824122: Extensions: Add a new view type enum for developer tools contexts https://chromium-review.googlesource.com/c/chromium/src/+/5824122 * 5806109: Option for JavaScriptExecuteRequestForTests() to ignore content settings https://chromium-review.googlesource.com/c/chromium/src/+/5806109 * build: free up disk space on gn check too * 5799369: [Refactoring] Make allow_http1_for_streaming_upload flags false. https://chromium-review.googlesource.com/c/chromium/src/+/5799369 * fixup! 5015584: Parallel process launching | https://chromium-review.googlesource.com/c/chromium/src/+/5015584 * Disable failing test for short-term See: https://github.com/electron/electron/issues/43730 * oops --------- Co-authored-by: electron-roller[bot] <84116207+electron-roller[bot]@users.noreply.github.com> Co-authored-by: Shelley Vohr <shelley.vohr@gmail.com> Co-authored-by: Charles Kerr <charles@charleskerr.com> Co-authored-by: Keeley Hammond <khammond@slack-corp.com> Co-authored-by: John Kleinschmidt <jkleinsc@electronjs.org> Co-authored-by: clavin <clavin@electronjs.org> (cherry picked from commit4bcbc955dd
) * build: update appveyor image to latest version (#43772) Co-authored-by: electron-appveyor-updater[bot] <161660339+electron-appveyor-updater[bot]@users.noreply.github.com> (cherry picked from commit02fd8bbcc1
) * chore: fixup patches * chore: fixup patch * chore: bump chromium in DEPS to 130.0.6723.6 * chore: update filenames.libcxx.gni * test: re-enable disabled test * 5844369: controlledframe: Disable Web Bluetooth for <webview> & <controlledframe> https://chromium-review.googlesource.com/c/chromium/src/+/5844369 (cherry picked from commit 0ac4852763f0dce3468d30907620211f34c4104b) * (multiple CLs): Use an opaque type for FrameTreeNode IDs 5807683: Use an opaque type for FrameTreeNode IDs, part 1 | https://chromium-review.googlesource.com/c/chromium/src/+/5807683 5829746: Use an opaque type for FrameTreeNode IDs, part 2 | https://chromium-review.googlesource.com/c/chromium/src/+/5829746 5836903: Use an opaque type for FrameTreeNode IDs, part 7 | https://chromium-review.googlesource.com/c/chromium/src/+/5836903 5837249: Use an opaque type for FrameTreeNode IDs, part 8 | https://chromium-review.googlesource.com/c/chromium/src/+/5837249 5836564: Use an opaque type for FrameTreeNode IDs, part 12 | https://chromium-review.googlesource.com/c/chromium/src/+/5836564 5837180: Use an opaque type for FrameTreeNode IDs, part 15 | https://chromium-review.googlesource.com/c/chromium/src/+/5837180 (cherry picked from commit 1dd67f5241a3a24ea5a20f11efefdd2afc520a26) * 5822889: [task] Make GetForegroundTaskRunner non-virtual https://chromium-review.googlesource.com/c/v8/v8/+/5822889 (cherry picked from commit ae1e7232a35260cce8c4303d5f9809aa166bf19b) * 5833297: Remove unused inner WebContents attach params https://chromium-review.googlesource.com/c/chromium/src/+/5833297 (cherry picked from commit 390bb42e39eba66cd86221461d2822bbd85012df) * 5806403: Shift PowerMonitor to non static https://chromium-review.googlesource.com/c/chromium/src/+/5806403 (cherry picked from commit 128e3826e13768e89c7f5117de451ebd2b3ec9a4) * 5666874: [3/N] Remove old OnPowerChange in PowerObserver https://chromium-review.googlesource.com/c/chromium/src/+/5666874 (cherry picked from commit 6ea6ea14ae23ced6465b94fd753f8c80ced4b13b) * 5829085: [v8] Differentiate between UserVisible and BestEffort task runners https://chromium-review.googlesource.com/c/chromium/src/+/5829085 (cherry picked from commit 1db28ee4a51fb2593e4c11bcaa538a6524abe48c) * 5791112: [webrtc] Use `c/b/permissions/system` for system permissions https://chromium-review.googlesource.com/c/chromium/src/+/5791112 (cherry picked from commit 50d4a71923ca99653bf5733145bdc6e21f783b2d) * fixup! (multiple CLs): Use an opaque type for FrameTreeNode IDs (cherry picked from commit 9271130e160d479b3d286d295045b9d4acd2005c) * fixup! 5791112: [webrtc] Use `c/b/permissions/system` for system permissions https://chromium-review.googlesource.com/c/chromium/src/+/5791112 (cherry picked from commit db2c8c69d0c7bdee881997847dfc3c8abf32197c) * 5825636: [Extensions] Create WebContentsObservers with ExtensionsBrowserClient https://chromium-review.googlesource.com/c/chromium/src/+/5825636 (cherry picked from commit f2c3d09ccd141dbe2f4b62957b72f98bf8a010ae) * 5854811: Use kNotAllowedError instead of kSecurityError for Web MIDI https://chromium-review.googlesource.com/c/chromium/src/+/5854811 * test: fix should support base url for data urls test Caused by https://chromium-review.googlesource.com/c/chromium/src/+/5802682 * test: fixup extensions can cancel http requests * chore: document custom protocol handling on Windows change due to Non-Special Scheme URLs shipping https://chromium-review.googlesource.com/c/chromium/src/+/5802682 --------- Co-authored-by: electron-roller[bot] <84116207+electron-roller[bot]@users.noreply.github.com> Co-authored-by: electron-appveyor-updater[bot] <161660339+electron-appveyor-updater[bot]@users.noreply.github.com> Co-authored-by: John Kleinschmidt <jkleinsc@electronjs.org> Co-authored-by: clavin <clavin@electronjs.org>
480 lines
15 KiB
C++
480 lines
15 KiB
C++
// Copyright (c) 2020 Samuel Maddock <sam@samuelmaddock.com>.
|
|
// Use of this source code is governed by the MIT license that can be
|
|
// found in the LICENSE file.
|
|
|
|
#include "shell/browser/api/electron_api_web_frame_main.h"
|
|
|
|
#include <string>
|
|
#include <unordered_map>
|
|
#include <utility>
|
|
#include <vector>
|
|
|
|
#include "base/logging.h"
|
|
#include "base/no_destructor.h"
|
|
#include "content/browser/renderer_host/render_frame_host_impl.h" // nogncheck
|
|
#include "content/public/browser/frame_tree_node_id.h"
|
|
#include "content/public/browser/render_frame_host.h"
|
|
#include "content/public/common/isolated_world_ids.h"
|
|
#include "electron/shell/common/api/api.mojom.h"
|
|
#include "gin/handle.h"
|
|
#include "gin/object_template_builder.h"
|
|
#include "services/service_manager/public/cpp/interface_provider.h"
|
|
#include "shell/browser/api/message_port.h"
|
|
#include "shell/browser/browser.h"
|
|
#include "shell/browser/javascript_environment.h"
|
|
#include "shell/common/gin_converters/blink_converter.h"
|
|
#include "shell/common/gin_converters/frame_converter.h"
|
|
#include "shell/common/gin_converters/gurl_converter.h"
|
|
#include "shell/common/gin_converters/value_converter.h"
|
|
#include "shell/common/gin_helper/dictionary.h"
|
|
#include "shell/common/gin_helper/error_thrower.h"
|
|
#include "shell/common/gin_helper/object_template_builder.h"
|
|
#include "shell/common/gin_helper/promise.h"
|
|
#include "shell/common/node_includes.h"
|
|
#include "shell/common/v8_value_serializer.h"
|
|
|
|
namespace gin {
|
|
|
|
template <>
|
|
struct Converter<blink::mojom::PageVisibilityState> {
|
|
static v8::Local<v8::Value> ToV8(v8::Isolate* isolate,
|
|
blink::mojom::PageVisibilityState val) {
|
|
std::string visibility;
|
|
switch (val) {
|
|
case blink::mojom::PageVisibilityState::kVisible:
|
|
visibility = "visible";
|
|
break;
|
|
case blink::mojom::PageVisibilityState::kHidden:
|
|
case blink::mojom::PageVisibilityState::kHiddenButPainting:
|
|
visibility = "hidden";
|
|
break;
|
|
}
|
|
return gin::ConvertToV8(isolate, visibility);
|
|
}
|
|
};
|
|
|
|
} // namespace gin
|
|
|
|
namespace electron::api {
|
|
|
|
typedef std::unordered_map<content::FrameTreeNodeId,
|
|
WebFrameMain*,
|
|
content::FrameTreeNodeId::Hasher>
|
|
WebFrameMainIdMap;
|
|
|
|
WebFrameMainIdMap& GetWebFrameMainMap() {
|
|
static base::NoDestructor<WebFrameMainIdMap> instance;
|
|
return *instance;
|
|
}
|
|
|
|
// static
|
|
WebFrameMain* WebFrameMain::FromFrameTreeNodeId(
|
|
content::FrameTreeNodeId frame_tree_node_id) {
|
|
WebFrameMainIdMap& frame_map = GetWebFrameMainMap();
|
|
auto iter = frame_map.find(frame_tree_node_id);
|
|
auto* web_frame = iter == frame_map.end() ? nullptr : iter->second;
|
|
return web_frame;
|
|
}
|
|
|
|
// static
|
|
WebFrameMain* WebFrameMain::FromRenderFrameHost(content::RenderFrameHost* rfh) {
|
|
if (!rfh)
|
|
return nullptr;
|
|
|
|
// TODO(codebytere): remove after refactoring away from FrameTreeNodeId as map
|
|
// key.
|
|
auto* ftn =
|
|
static_cast<content::RenderFrameHostImpl*>(rfh)->frame_tree_node();
|
|
if (!ftn)
|
|
return nullptr;
|
|
|
|
return FromFrameTreeNodeId(rfh->GetFrameTreeNodeId());
|
|
}
|
|
|
|
gin::WrapperInfo WebFrameMain::kWrapperInfo = {gin::kEmbedderNativeGin};
|
|
|
|
WebFrameMain::WebFrameMain(content::RenderFrameHost* rfh)
|
|
: frame_tree_node_id_(rfh->GetFrameTreeNodeId()), render_frame_(rfh) {
|
|
GetWebFrameMainMap().emplace(frame_tree_node_id_, this);
|
|
}
|
|
|
|
WebFrameMain::~WebFrameMain() {
|
|
Destroyed();
|
|
}
|
|
|
|
void WebFrameMain::Destroyed() {
|
|
MarkRenderFrameDisposed();
|
|
GetWebFrameMainMap().erase(frame_tree_node_id_);
|
|
Unpin();
|
|
}
|
|
|
|
void WebFrameMain::MarkRenderFrameDisposed() {
|
|
render_frame_ = nullptr;
|
|
render_frame_disposed_ = true;
|
|
TeardownMojoConnection();
|
|
}
|
|
|
|
void WebFrameMain::UpdateRenderFrameHost(content::RenderFrameHost* rfh) {
|
|
// Should only be called when swapping frames.
|
|
render_frame_disposed_ = false;
|
|
render_frame_ = rfh;
|
|
TeardownMojoConnection();
|
|
MaybeSetupMojoConnection();
|
|
}
|
|
|
|
bool WebFrameMain::CheckRenderFrame() const {
|
|
if (render_frame_disposed_) {
|
|
v8::Isolate* isolate = JavascriptEnvironment::GetIsolate();
|
|
v8::HandleScope scope(isolate);
|
|
gin_helper::ErrorThrower(isolate).ThrowError(
|
|
"Render frame was disposed before WebFrameMain could be accessed");
|
|
return false;
|
|
}
|
|
return true;
|
|
}
|
|
|
|
v8::Local<v8::Promise> WebFrameMain::ExecuteJavaScript(
|
|
gin::Arguments* args,
|
|
const std::u16string& code) {
|
|
gin_helper::Promise<base::Value> promise(args->isolate());
|
|
v8::Local<v8::Promise> handle = promise.GetHandle();
|
|
|
|
// Optional userGesture parameter
|
|
bool user_gesture;
|
|
if (!args->PeekNext().IsEmpty()) {
|
|
if (args->PeekNext()->IsBoolean()) {
|
|
args->GetNext(&user_gesture);
|
|
} else {
|
|
args->ThrowTypeError("userGesture must be a boolean");
|
|
return handle;
|
|
}
|
|
} else {
|
|
user_gesture = false;
|
|
}
|
|
|
|
if (render_frame_disposed_) {
|
|
promise.RejectWithErrorMessage(
|
|
"Render frame was disposed before WebFrameMain could be accessed");
|
|
return handle;
|
|
}
|
|
|
|
static_cast<content::RenderFrameHostImpl*>(render_frame_)
|
|
->ExecuteJavaScriptForTests(
|
|
code, user_gesture, true /* resolve_promises */,
|
|
/*honor_js_content_settings=*/true, content::ISOLATED_WORLD_ID_GLOBAL,
|
|
base::BindOnce(
|
|
[](gin_helper::Promise<base::Value> promise,
|
|
blink::mojom::JavaScriptExecutionResultType type,
|
|
base::Value value) {
|
|
if (type ==
|
|
blink::mojom::JavaScriptExecutionResultType::kSuccess) {
|
|
promise.Resolve(value);
|
|
} else {
|
|
v8::Isolate* isolate = JavascriptEnvironment::GetIsolate();
|
|
v8::HandleScope scope(isolate);
|
|
promise.Reject(gin::ConvertToV8(isolate, value));
|
|
}
|
|
},
|
|
std::move(promise)));
|
|
|
|
return handle;
|
|
}
|
|
|
|
bool WebFrameMain::Reload() {
|
|
if (!CheckRenderFrame())
|
|
return false;
|
|
return render_frame_->Reload();
|
|
}
|
|
|
|
void WebFrameMain::Send(v8::Isolate* isolate,
|
|
bool internal,
|
|
const std::string& channel,
|
|
v8::Local<v8::Value> args) {
|
|
blink::CloneableMessage message;
|
|
if (!gin::ConvertFromV8(isolate, args, &message)) {
|
|
isolate->ThrowException(v8::Exception::Error(
|
|
gin::StringToV8(isolate, "Failed to serialize arguments")));
|
|
return;
|
|
}
|
|
|
|
if (!CheckRenderFrame())
|
|
return;
|
|
|
|
GetRendererApi()->Message(internal, channel, std::move(message));
|
|
}
|
|
|
|
const mojo::Remote<mojom::ElectronRenderer>& WebFrameMain::GetRendererApi() {
|
|
MaybeSetupMojoConnection();
|
|
return renderer_api_;
|
|
}
|
|
|
|
void WebFrameMain::MaybeSetupMojoConnection() {
|
|
if (render_frame_disposed_) {
|
|
// RFH may not be set yet if called between when a new RFH is created and
|
|
// before it's been swapped with an old RFH.
|
|
LOG(INFO) << "Attempt to setup WebFrameMain connection while render frame "
|
|
"is disposed";
|
|
return;
|
|
}
|
|
|
|
if (!renderer_api_) {
|
|
pending_receiver_ = renderer_api_.BindNewPipeAndPassReceiver();
|
|
renderer_api_.set_disconnect_handler(base::BindOnce(
|
|
&WebFrameMain::OnRendererConnectionError, weak_factory_.GetWeakPtr()));
|
|
}
|
|
|
|
DCHECK(render_frame_);
|
|
|
|
// Wait for RenderFrame to be created in renderer before accessing remote.
|
|
if (pending_receiver_ && render_frame_ &&
|
|
render_frame_->IsRenderFrameLive()) {
|
|
render_frame_->GetRemoteInterfaces()->GetInterface(
|
|
std::move(pending_receiver_));
|
|
}
|
|
}
|
|
|
|
void WebFrameMain::TeardownMojoConnection() {
|
|
renderer_api_.reset();
|
|
pending_receiver_.reset();
|
|
}
|
|
|
|
void WebFrameMain::OnRendererConnectionError() {
|
|
TeardownMojoConnection();
|
|
}
|
|
|
|
void WebFrameMain::PostMessage(v8::Isolate* isolate,
|
|
const std::string& channel,
|
|
v8::Local<v8::Value> message_value,
|
|
std::optional<v8::Local<v8::Value>> transfer) {
|
|
blink::TransferableMessage transferable_message;
|
|
if (!electron::SerializeV8Value(isolate, message_value,
|
|
&transferable_message)) {
|
|
// SerializeV8Value sets an exception.
|
|
return;
|
|
}
|
|
|
|
std::vector<gin::Handle<MessagePort>> wrapped_ports;
|
|
if (transfer && !transfer.value()->IsUndefined()) {
|
|
if (!gin::ConvertFromV8(isolate, *transfer, &wrapped_ports)) {
|
|
isolate->ThrowException(v8::Exception::Error(
|
|
gin::StringToV8(isolate, "Invalid value for transfer")));
|
|
return;
|
|
}
|
|
}
|
|
|
|
bool threw_exception = false;
|
|
transferable_message.ports =
|
|
MessagePort::DisentanglePorts(isolate, wrapped_ports, &threw_exception);
|
|
if (threw_exception)
|
|
return;
|
|
|
|
if (!CheckRenderFrame())
|
|
return;
|
|
|
|
GetRendererApi()->ReceivePostMessage(channel,
|
|
std::move(transferable_message));
|
|
}
|
|
|
|
int WebFrameMain::FrameTreeNodeIDAsInt() const {
|
|
return frame_tree_node_id_.value();
|
|
}
|
|
|
|
std::string WebFrameMain::Name() const {
|
|
if (!CheckRenderFrame())
|
|
return std::string();
|
|
return render_frame_->GetFrameName();
|
|
}
|
|
|
|
base::ProcessId WebFrameMain::OSProcessID() const {
|
|
if (!CheckRenderFrame())
|
|
return -1;
|
|
base::ProcessHandle process_handle =
|
|
render_frame_->GetProcess()->GetProcess().Handle();
|
|
return base::GetProcId(process_handle);
|
|
}
|
|
|
|
int WebFrameMain::ProcessID() const {
|
|
if (!CheckRenderFrame())
|
|
return -1;
|
|
return render_frame_->GetProcess()->GetID();
|
|
}
|
|
|
|
int WebFrameMain::RoutingID() const {
|
|
if (!CheckRenderFrame())
|
|
return -1;
|
|
return render_frame_->GetRoutingID();
|
|
}
|
|
|
|
GURL WebFrameMain::URL() const {
|
|
if (!CheckRenderFrame())
|
|
return GURL::EmptyGURL();
|
|
return render_frame_->GetLastCommittedURL();
|
|
}
|
|
|
|
std::string WebFrameMain::Origin() const {
|
|
if (!CheckRenderFrame())
|
|
return std::string();
|
|
return render_frame_->GetLastCommittedOrigin().Serialize();
|
|
}
|
|
|
|
blink::mojom::PageVisibilityState WebFrameMain::VisibilityState() const {
|
|
if (!CheckRenderFrame())
|
|
return blink::mojom::PageVisibilityState::kHidden;
|
|
return render_frame_->GetVisibilityState();
|
|
}
|
|
|
|
content::RenderFrameHost* WebFrameMain::Top() const {
|
|
if (!CheckRenderFrame())
|
|
return nullptr;
|
|
return render_frame_->GetMainFrame();
|
|
}
|
|
|
|
content::RenderFrameHost* WebFrameMain::Parent() const {
|
|
if (!CheckRenderFrame())
|
|
return nullptr;
|
|
return render_frame_->GetParent();
|
|
}
|
|
|
|
std::vector<content::RenderFrameHost*> WebFrameMain::Frames() const {
|
|
std::vector<content::RenderFrameHost*> frame_hosts;
|
|
if (!CheckRenderFrame())
|
|
return frame_hosts;
|
|
|
|
render_frame_->ForEachRenderFrameHost(
|
|
[&frame_hosts, this](content::RenderFrameHost* rfh) {
|
|
if (rfh->GetParent() == render_frame_)
|
|
frame_hosts.push_back(rfh);
|
|
});
|
|
|
|
return frame_hosts;
|
|
}
|
|
|
|
std::vector<content::RenderFrameHost*> WebFrameMain::FramesInSubtree() const {
|
|
std::vector<content::RenderFrameHost*> frame_hosts;
|
|
if (!CheckRenderFrame())
|
|
return frame_hosts;
|
|
|
|
render_frame_->ForEachRenderFrameHost(
|
|
[&frame_hosts](content::RenderFrameHost* rfh) {
|
|
frame_hosts.push_back(rfh);
|
|
});
|
|
|
|
return frame_hosts;
|
|
}
|
|
|
|
void WebFrameMain::DOMContentLoaded() {
|
|
Emit("dom-ready");
|
|
}
|
|
|
|
// static
|
|
gin::Handle<WebFrameMain> WebFrameMain::New(v8::Isolate* isolate) {
|
|
return gin::Handle<WebFrameMain>();
|
|
}
|
|
|
|
// static
|
|
gin::Handle<WebFrameMain> WebFrameMain::From(v8::Isolate* isolate,
|
|
content::RenderFrameHost* rfh) {
|
|
if (!rfh)
|
|
return gin::Handle<WebFrameMain>();
|
|
|
|
auto* web_frame = FromRenderFrameHost(rfh);
|
|
if (web_frame)
|
|
return gin::CreateHandle(isolate, web_frame);
|
|
|
|
auto handle = gin::CreateHandle(isolate, new WebFrameMain(rfh));
|
|
|
|
// Prevent garbage collection of frame until it has been deleted internally.
|
|
handle->Pin(isolate);
|
|
|
|
return handle;
|
|
}
|
|
|
|
// static
|
|
gin::Handle<WebFrameMain> WebFrameMain::FromOrNull(
|
|
v8::Isolate* isolate,
|
|
content::RenderFrameHost* rfh) {
|
|
if (!rfh)
|
|
return gin::Handle<WebFrameMain>();
|
|
|
|
auto* web_frame = FromRenderFrameHost(rfh);
|
|
if (!web_frame)
|
|
return gin::Handle<WebFrameMain>();
|
|
|
|
return gin::CreateHandle(isolate, web_frame);
|
|
}
|
|
|
|
// static
|
|
void WebFrameMain::FillObjectTemplate(v8::Isolate* isolate,
|
|
v8::Local<v8::ObjectTemplate> templ) {
|
|
gin_helper::ObjectTemplateBuilder(isolate, templ)
|
|
.SetMethod("executeJavaScript", &WebFrameMain::ExecuteJavaScript)
|
|
.SetMethod("reload", &WebFrameMain::Reload)
|
|
.SetMethod("_send", &WebFrameMain::Send)
|
|
.SetMethod("_postMessage", &WebFrameMain::PostMessage)
|
|
.SetProperty("frameTreeNodeId", &WebFrameMain::FrameTreeNodeIDAsInt)
|
|
.SetProperty("name", &WebFrameMain::Name)
|
|
.SetProperty("osProcessId", &WebFrameMain::OSProcessID)
|
|
.SetProperty("processId", &WebFrameMain::ProcessID)
|
|
.SetProperty("routingId", &WebFrameMain::RoutingID)
|
|
.SetProperty("url", &WebFrameMain::URL)
|
|
.SetProperty("origin", &WebFrameMain::Origin)
|
|
.SetProperty("visibilityState", &WebFrameMain::VisibilityState)
|
|
.SetProperty("top", &WebFrameMain::Top)
|
|
.SetProperty("parent", &WebFrameMain::Parent)
|
|
.SetProperty("frames", &WebFrameMain::Frames)
|
|
.SetProperty("framesInSubtree", &WebFrameMain::FramesInSubtree)
|
|
.Build();
|
|
}
|
|
|
|
const char* WebFrameMain::GetTypeName() {
|
|
return GetClassName();
|
|
}
|
|
|
|
} // namespace electron::api
|
|
|
|
namespace {
|
|
|
|
using electron::api::WebFrameMain;
|
|
|
|
v8::Local<v8::Value> FromID(gin_helper::ErrorThrower thrower,
|
|
int render_process_id,
|
|
int render_frame_id) {
|
|
if (!electron::Browser::Get()->is_ready()) {
|
|
thrower.ThrowError("WebFrameMain is available only after app ready");
|
|
return v8::Null(thrower.isolate());
|
|
}
|
|
|
|
auto* rfh =
|
|
content::RenderFrameHost::FromID(render_process_id, render_frame_id);
|
|
|
|
return WebFrameMain::From(thrower.isolate(), rfh).ToV8();
|
|
}
|
|
|
|
v8::Local<v8::Value> FromIDOrNull(gin_helper::ErrorThrower thrower,
|
|
int render_process_id,
|
|
int render_frame_id) {
|
|
if (!electron::Browser::Get()->is_ready()) {
|
|
thrower.ThrowError("WebFrameMain is available only after app ready");
|
|
return v8::Null(thrower.isolate());
|
|
}
|
|
|
|
auto* rfh =
|
|
content::RenderFrameHost::FromID(render_process_id, render_frame_id);
|
|
|
|
return WebFrameMain::FromOrNull(thrower.isolate(), rfh).ToV8();
|
|
}
|
|
|
|
void Initialize(v8::Local<v8::Object> exports,
|
|
v8::Local<v8::Value> unused,
|
|
v8::Local<v8::Context> context,
|
|
void* priv) {
|
|
v8::Isolate* isolate = context->GetIsolate();
|
|
gin_helper::Dictionary dict(isolate, exports);
|
|
dict.Set("WebFrameMain", WebFrameMain::GetConstructor(context));
|
|
dict.SetMethod("fromId", &FromID);
|
|
dict.SetMethod("fromIdOrNull", &FromIDOrNull);
|
|
}
|
|
|
|
} // namespace
|
|
|
|
NODE_LINKED_BINDING_CONTEXT_AWARE(electron_browser_web_frame_main, Initialize)
|