dc72f74020
* chore: bump chromium in DEPS to 5ce64b91b4d6a78c97480059f15ff6469fc0918e * chore: bump chromium in DEPS to e74c73d0000f81b3f40a513176c8d024bba57d28 * chore: bump chromium in DEPS to 501640e650d4657ba63db65fa257e4a899168de7 * chore: bump chromium in DEPS to 00db20e1bc3d77706723a87ada3c1c647a1c37b7 * chore: update patches * refactor: AddNewContents now takes a target_url Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2167732 * chore: SetHostCleanupFinalizationGroupCallback has been removed from V8 * refactor: use WebInputEvent::Namespace types directly Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2160523 * refactor: FollowRedirect takes in cors exempt headers now Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2129787 * refactor: printing::DuplexMode moved to mojo Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2162388 * refactor: use MessagePortDescriptor instead of raw mojo::MessagePipeHandles Refs: https://chromium-review.googlesource.com/c/chromium/src/+/1952124 * chore: update patches * chore: bump chromium in DEPS to f1537676d613f3567cfb43adf577b3847fba4bc3 * chore: update patches * refactor: service_manager::BinderMapWithContext merged into mojo::BinderMap Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2174654 * chore: unused argument removed from ReadAvailableTypes in ui::Clipboard Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2173666 * chore: bump chromium in DEPS to 949888433ab935dd6125c107226a4c9d6da9bf48 * chore: update patches * update patches * chore: update sysroots * chore: bump chromium in DEPS to eaac5b5035fe189b6706e1637122e37134206059 * chore: bump chromium in DEPS to 258b54b903d33dab963adf59016691e6537f8b70 * build: update patches * refactor: cursor.mojom and cursor_types.mojom moved to //ui/base/cursor/mojom Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2172874 * chore: DesktopWindowTreeHostLinux becomes DesktopWindowTreeHostPlatform Refs: * refactor: LogErrorEventDescription moved from ui to x11 Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2164245 * chore: update patches * chore: bump chromium in DEPS to bd06abcfe807d4461683479237cdd920dafa52ca * chore: bump chromium in DEPS to 1afb0891e56f1e79d204db43ca053a46d0974511 * chore: bump chromium in DEPS to 5cb0f794bf7f155bf8c0a241b94e01c9d90c2744 * chore: bump chromium in DEPS to 37327ba3303234e1a3cd3310ca11a68e81b95123 * update patches * remove ClientSideDetectionService from browser_process Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2175320 * refactor: shuttle cursor changed event to WebContentsObserver Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2172779 * chore: bump chromium in DEPS to 1d97904bb6936e106df13705208b73e47367c2b9 * avoid IPC crash introduced earlier in the roll Refs:b67334e781 (diff-607f4e8f7c5686aa09af98c783925babR128)
* remove WebContentsView::SizeContents Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2188931 * chore: bump chromium in DEPS to 87066d1db0546a9de33952ba964e1e42f76f1dae * update patches * adapt to //content creating NetworkContexts https://chromium-review.googlesource.com/c/chromium/src/+/2195196 * WIP temporarily ignore mojo-ified PrintHostMsg_PrintPreviewFailed Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2195343 * add checkout_pgo_profiles to DEPS * chore: bump chromium in DEPS to a095318bec1dedf580d676f408eaeefdbd9956b1 * add blink's execution_context to electron_lib deps Refs:b67334e781
#, https://chromium-review.googlesource.com/c/chromium/src/+/1952124 * update patches * update patches * refactor: use newly mojo-ified PrintPreviewFailed Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2195343 Co-authored-by: Shelley Vohr <shelley.vohr@gmail.com> * chore: update patches * chore: remove NOTIFICATION_EXTENSIONS_READY_DEPRECATED Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2199874 * avoid a call to Profile::FromBrowserContext in printing Refs: https://chromium-review.googlesource.com/c/chromium/src/+/2195757 * chore: bump chromium in DEPS to 8f5c6a46861a991e12ffd80554b6bd41a11b0b65 * chore: bump chromium in DEPS to ab66134739ff3b6bdb8de53bbc58a97d1b7b5d8a * chore: bump chromium in DEPS to dd08df9f6c8d6198f0a7b931ca9e845e27dae033 * chore: update patches * [printing] Mojofy PrintHostMsg_PrintPreviewCancelled https://chromium-review.googlesource.com/c/chromium/src/+/2198331 * [printing] Mojofy PrintHostMsg_PrintPreviewInvalidPrinterSettings https://chromium-review.googlesource.com/c/chromium/src/+/2200556 * [printing] Mojofy PrintHostMsg_DidPrepareDocumentForPreview https://chromium-review.googlesource.com/c/chromium/src/+/2201496 * fix: inherit base network context params * fix: use message handle api specific to embedders * update patches * chore: update v8 headers * fixup! avoid a call to Profile::FromBrowserContext in printing * chore: bump chromium in DEPS to f198bc3276828d992b6202d75a9da6a8363164ea * chore: update patches * Remove cors_exempt_headers.h https://chromium-review.googlesource.com/c/chromium/src/+/2203759 * Supply speech recognition sandbox from service_sandbox_type.h https://chromium-review.googlesource.com/c/chromium/src/+/2206918 * [content] Remove unused methods from WebContents https://chromium-review.googlesource.com/c/chromium/src/+/2199113 * [XProto] Replace XAtom with x11::Atom https://chromium-review.googlesource.com/c/chromium/src/+/2202789 * chore: bump chromium in DEPS to 5df37fabaaed09f3ea511f4ef49203d8ebee7b68 * [UI] Support secondary labels in dropdown menus https://chromium-review.googlesource.com/c/chromium/src/+/2208976 * chore: update patches * refactor: GetSublabelAt => GetSecondaryLabelAt * Revert "[printing] Mojofy PrintHostMsg_DidPrepareDocumentForPreview" This reverts commit 44ed0892a0c81716229638f17253bbb2cf8f037d. https://chromium-review.googlesource.com/c/chromium/src/+/2208778 * Unnest CanonicalCookie::CookieInclusionStatus https://chromium-review.googlesource.com/c/chromium/src/+/2203171 * update print-to-pdf.html with latest html data https://bugs.chromium.org/p/chromium/issues/detail?id=1085667 * chore: bump chromium in DEPS to 5dfa8d5f706580fe983e138952553cd6af11ee8b * fix crash in x server when setting window icon * chore: update patches * Use a normal return value for WebContentsView::GetContainerBounds. https://chromium-review.googlesource.com/c/chromium/src/+/2212481 * fix build on windows * chore: bump chromium in DEPS to 9d15054f4cba060901e43deecf74002f11f47be3 * chore: update patches * [printing] Mojofy PrintHostMsg_CheckForCancel https://chromium-review.googlesource.com/c/chromium/src/+/2212181 Co-authored-by: Samuel Attard <samuel.r.attard@gmail.com> Co-authored-by: Electron Bot <anonymous@electronjs.org> Co-authored-by: Andy Locascio <andy@slack-corp.com> Co-authored-by: Shelley Vohr <shelley.vohr@gmail.com> Co-authored-by: deepak1556 <hop2deep@gmail.com>
375 lines
13 KiB
C++
375 lines
13 KiB
C++
// Copyright 2014 The Chromium Authors. All rights reserved.
|
|
// Use of this source code is governed by a BSD-style license that can be
|
|
// found in the LICENSE file.
|
|
|
|
#include "shell/browser/extensions/electron_extensions_browser_client.h"
|
|
|
|
#include <utility>
|
|
|
|
#include "base/bind.h"
|
|
#include "base/memory/ptr_util.h"
|
|
#include "base/path_service.h"
|
|
#include "base/task/post_task.h"
|
|
#include "build/build_config.h"
|
|
#include "chrome/browser/extensions/chrome_url_request_util.h"
|
|
#include "chrome/common/chrome_paths.h"
|
|
#include "chrome/common/extensions/chrome_manifest_url_handlers.h"
|
|
#include "components/version_info/version_info.h"
|
|
#include "content/public/browser/browser_context.h"
|
|
#include "content/public/browser/browser_task_traits.h"
|
|
#include "content/public/browser/browser_thread.h"
|
|
#include "content/public/browser/render_frame_host.h"
|
|
#include "content/public/common/user_agent.h"
|
|
#include "extensions/browser/api/extensions_api_client.h"
|
|
#include "extensions/browser/component_extension_resource_manager.h"
|
|
#include "extensions/browser/core_extensions_browser_api_provider.h"
|
|
#include "extensions/browser/event_router.h"
|
|
#include "extensions/browser/extension_protocols.h"
|
|
#include "extensions/browser/extensions_browser_interface_binders.h"
|
|
#include "extensions/browser/null_app_sorting.h"
|
|
#include "extensions/browser/updater/null_extension_cache.h"
|
|
#include "extensions/browser/url_request_util.h"
|
|
#include "extensions/common/features/feature_channel.h"
|
|
#include "extensions/common/file_util.h"
|
|
#include "extensions/common/manifest_constants.h"
|
|
#include "extensions/common/manifest_url_handlers.h"
|
|
#include "net/base/mime_util.h"
|
|
#include "services/network/public/mojom/url_loader.mojom.h"
|
|
#include "shell/browser/browser.h"
|
|
#include "shell/browser/electron_browser_client.h"
|
|
#include "shell/browser/electron_browser_context.h"
|
|
#include "shell/browser/extensions/api/runtime/electron_runtime_api_delegate.h"
|
|
#include "shell/browser/extensions/electron_component_extension_resource_manager.h"
|
|
#include "shell/browser/extensions/electron_extension_host_delegate.h"
|
|
#include "shell/browser/extensions/electron_extension_system_factory.h"
|
|
#include "shell/browser/extensions/electron_extension_web_contents_observer.h"
|
|
#include "shell/browser/extensions/electron_extensions_api_client.h"
|
|
#include "shell/browser/extensions/electron_extensions_browser_api_provider.h"
|
|
#include "shell/browser/extensions/electron_kiosk_delegate.h"
|
|
#include "shell/browser/extensions/electron_navigation_ui_data.h"
|
|
#include "shell/browser/extensions/electron_process_manager_delegate.h"
|
|
#include "ui/base/resource/resource_bundle.h"
|
|
|
|
using content::BrowserContext;
|
|
using content::BrowserThread;
|
|
using extensions::ExtensionsBrowserClient;
|
|
|
|
namespace electron {
|
|
|
|
ElectronExtensionsBrowserClient::ElectronExtensionsBrowserClient()
|
|
: api_client_(new extensions::ElectronExtensionsAPIClient),
|
|
process_manager_delegate_(new extensions::ElectronProcessManagerDelegate),
|
|
extension_cache_(new extensions::NullExtensionCache()) {
|
|
// Electron does not have a concept of channel, so leave UNKNOWN to
|
|
// enable all channel-dependent extension APIs.
|
|
extensions::SetCurrentChannel(version_info::Channel::UNKNOWN);
|
|
resource_manager_.reset(
|
|
new extensions::ElectronComponentExtensionResourceManager());
|
|
|
|
AddAPIProvider(
|
|
std::make_unique<extensions::CoreExtensionsBrowserAPIProvider>());
|
|
AddAPIProvider(
|
|
std::make_unique<extensions::ElectronExtensionsBrowserAPIProvider>());
|
|
}
|
|
|
|
ElectronExtensionsBrowserClient::~ElectronExtensionsBrowserClient() {}
|
|
|
|
bool ElectronExtensionsBrowserClient::IsShuttingDown() {
|
|
return electron::Browser::Get()->is_shutting_down();
|
|
}
|
|
|
|
bool ElectronExtensionsBrowserClient::AreExtensionsDisabled(
|
|
const base::CommandLine& command_line,
|
|
BrowserContext* context) {
|
|
return false;
|
|
}
|
|
|
|
bool ElectronExtensionsBrowserClient::IsValidContext(BrowserContext* context) {
|
|
auto context_map = ElectronBrowserContext::browser_context_map();
|
|
for (auto const& entry : context_map) {
|
|
if (entry.second && entry.second.get() == context)
|
|
return true;
|
|
}
|
|
return false;
|
|
}
|
|
|
|
bool ElectronExtensionsBrowserClient::IsSameContext(BrowserContext* first,
|
|
BrowserContext* second) {
|
|
return first == second;
|
|
}
|
|
|
|
bool ElectronExtensionsBrowserClient::HasOffTheRecordContext(
|
|
BrowserContext* context) {
|
|
return false;
|
|
}
|
|
|
|
BrowserContext* ElectronExtensionsBrowserClient::GetOffTheRecordContext(
|
|
BrowserContext* context) {
|
|
// app_shell only supports a single context.
|
|
return nullptr;
|
|
}
|
|
|
|
BrowserContext* ElectronExtensionsBrowserClient::GetOriginalContext(
|
|
BrowserContext* context) {
|
|
DCHECK(context);
|
|
if (context->IsOffTheRecord()) {
|
|
return ElectronBrowserContext::From("", false).get();
|
|
} else {
|
|
return context;
|
|
}
|
|
}
|
|
|
|
bool ElectronExtensionsBrowserClient::IsGuestSession(
|
|
BrowserContext* context) const {
|
|
return false;
|
|
}
|
|
|
|
bool ElectronExtensionsBrowserClient::IsExtensionIncognitoEnabled(
|
|
const std::string& extension_id,
|
|
content::BrowserContext* context) const {
|
|
return false;
|
|
}
|
|
|
|
bool ElectronExtensionsBrowserClient::CanExtensionCrossIncognito(
|
|
const extensions::Extension* extension,
|
|
content::BrowserContext* context) const {
|
|
return false;
|
|
}
|
|
|
|
base::FilePath ElectronExtensionsBrowserClient::GetBundleResourcePath(
|
|
const network::ResourceRequest& request,
|
|
const base::FilePath& extension_resources_path,
|
|
int* resource_id) const {
|
|
*resource_id = 0;
|
|
base::FilePath chrome_resources_path;
|
|
if (!base::PathService::Get(chrome::DIR_RESOURCES, &chrome_resources_path))
|
|
return base::FilePath();
|
|
|
|
// Since component extension resources are included in
|
|
// component_extension_resources.pak file in |chrome_resources_path|,
|
|
// calculate the extension |request_relative_path| against
|
|
// |chrome_resources_path|.
|
|
if (!chrome_resources_path.IsParent(extension_resources_path))
|
|
return base::FilePath();
|
|
|
|
const base::FilePath request_relative_path =
|
|
extensions::file_util::ExtensionURLToRelativeFilePath(request.url);
|
|
if (!ExtensionsBrowserClient::Get()
|
|
->GetComponentExtensionResourceManager()
|
|
->IsComponentExtensionResource(extension_resources_path,
|
|
request_relative_path, resource_id)) {
|
|
return base::FilePath();
|
|
}
|
|
DCHECK_NE(0, *resource_id);
|
|
|
|
return request_relative_path;
|
|
}
|
|
|
|
void ElectronExtensionsBrowserClient::LoadResourceFromResourceBundle(
|
|
const network::ResourceRequest& request,
|
|
mojo::PendingReceiver<network::mojom::URLLoader> loader,
|
|
const base::FilePath& resource_relative_path,
|
|
int resource_id,
|
|
const std::string& content_security_policy,
|
|
mojo::PendingRemote<network::mojom::URLLoaderClient> client,
|
|
bool send_cors_header) {
|
|
extensions::chrome_url_request_util::LoadResourceFromResourceBundle(
|
|
request, std::move(loader), resource_relative_path, resource_id,
|
|
content_security_policy, std::move(client), send_cors_header);
|
|
}
|
|
|
|
namespace {
|
|
bool AllowCrossRendererResourceLoad(const GURL& url,
|
|
blink::mojom::ResourceType resource_type,
|
|
ui::PageTransition page_transition,
|
|
int child_id,
|
|
bool is_incognito,
|
|
const extensions::Extension* extension,
|
|
const extensions::ExtensionSet& extensions,
|
|
const extensions::ProcessMap& process_map,
|
|
bool* allowed) {
|
|
if (extensions::url_request_util::AllowCrossRendererResourceLoad(
|
|
url, resource_type, page_transition, child_id, is_incognito,
|
|
extension, extensions, process_map, allowed)) {
|
|
return true;
|
|
}
|
|
|
|
// If there aren't any explicitly marked web accessible resources, the
|
|
// load should be allowed only if it is by DevTools. A close approximation is
|
|
// checking if the extension contains a DevTools page.
|
|
if (extension && !extensions::chrome_manifest_urls::GetDevToolsPage(extension)
|
|
.is_empty()) {
|
|
*allowed = true;
|
|
return true;
|
|
}
|
|
|
|
// Couldn't determine if the resource is allowed or not.
|
|
return false;
|
|
}
|
|
} // namespace
|
|
|
|
bool ElectronExtensionsBrowserClient::AllowCrossRendererResourceLoad(
|
|
const GURL& url,
|
|
blink::mojom::ResourceType resource_type,
|
|
ui::PageTransition page_transition,
|
|
int child_id,
|
|
bool is_incognito,
|
|
const extensions::Extension* extension,
|
|
const extensions::ExtensionSet& extensions,
|
|
const extensions::ProcessMap& process_map) {
|
|
bool allowed = false;
|
|
if (::electron::AllowCrossRendererResourceLoad(
|
|
url, resource_type, page_transition, child_id, is_incognito,
|
|
extension, extensions, process_map, &allowed)) {
|
|
return allowed;
|
|
}
|
|
|
|
// Couldn't determine if resource is allowed. Block the load.
|
|
return false;
|
|
}
|
|
|
|
PrefService* ElectronExtensionsBrowserClient::GetPrefServiceForContext(
|
|
BrowserContext* context) {
|
|
return static_cast<ElectronBrowserContext*>(context)->prefs();
|
|
}
|
|
|
|
void ElectronExtensionsBrowserClient::GetEarlyExtensionPrefsObservers(
|
|
content::BrowserContext* context,
|
|
std::vector<extensions::EarlyExtensionPrefsObserver*>* observers) const {}
|
|
|
|
extensions::ProcessManagerDelegate*
|
|
ElectronExtensionsBrowserClient::GetProcessManagerDelegate() const {
|
|
return process_manager_delegate_.get();
|
|
}
|
|
|
|
std::unique_ptr<extensions::ExtensionHostDelegate>
|
|
ElectronExtensionsBrowserClient::
|
|
CreateExtensionHostDelegate() { // TODO(samuelmaddock):
|
|
return base::WrapUnique(new extensions::ElectronExtensionHostDelegate);
|
|
}
|
|
|
|
bool ElectronExtensionsBrowserClient::DidVersionUpdate(
|
|
BrowserContext* context) {
|
|
// TODO(jamescook): We might want to tell extensions when app_shell updates.
|
|
return false;
|
|
}
|
|
|
|
void ElectronExtensionsBrowserClient::PermitExternalProtocolHandler() {}
|
|
|
|
bool ElectronExtensionsBrowserClient::IsInDemoMode() {
|
|
return false;
|
|
}
|
|
|
|
bool ElectronExtensionsBrowserClient::IsScreensaverInDemoMode(
|
|
const std::string& app_id) {
|
|
return false;
|
|
}
|
|
|
|
bool ElectronExtensionsBrowserClient::IsRunningInForcedAppMode() {
|
|
return false;
|
|
}
|
|
|
|
bool ElectronExtensionsBrowserClient::IsAppModeForcedForApp(
|
|
const extensions::ExtensionId& extension_id) {
|
|
return false;
|
|
}
|
|
|
|
bool ElectronExtensionsBrowserClient::IsLoggedInAsPublicAccount() {
|
|
return false;
|
|
}
|
|
|
|
extensions::ExtensionSystemProvider*
|
|
ElectronExtensionsBrowserClient::GetExtensionSystemFactory() {
|
|
return extensions::ElectronExtensionSystemFactory::GetInstance();
|
|
}
|
|
|
|
std::unique_ptr<extensions::RuntimeAPIDelegate>
|
|
ElectronExtensionsBrowserClient::CreateRuntimeAPIDelegate(
|
|
content::BrowserContext* context) const {
|
|
return std::make_unique<extensions::ElectronRuntimeAPIDelegate>(context);
|
|
}
|
|
|
|
const extensions::ComponentExtensionResourceManager*
|
|
ElectronExtensionsBrowserClient::GetComponentExtensionResourceManager() {
|
|
return resource_manager_.get();
|
|
}
|
|
|
|
void ElectronExtensionsBrowserClient::BroadcastEventToRenderers(
|
|
extensions::events::HistogramValue histogram_value,
|
|
const std::string& event_name,
|
|
std::unique_ptr<base::ListValue> args,
|
|
bool dispatch_to_off_the_record_profiles) {
|
|
if (!BrowserThread::CurrentlyOn(BrowserThread::UI)) {
|
|
base::PostTask(
|
|
FROM_HERE, {BrowserThread::UI},
|
|
base::BindOnce(
|
|
&ElectronExtensionsBrowserClient::BroadcastEventToRenderers,
|
|
base::Unretained(this), histogram_value, event_name,
|
|
std::move(args), dispatch_to_off_the_record_profiles));
|
|
return;
|
|
}
|
|
|
|
std::unique_ptr<extensions::Event> event(
|
|
new extensions::Event(histogram_value, event_name, std::move(args)));
|
|
auto context_map = ElectronBrowserContext::browser_context_map();
|
|
for (auto const& entry : context_map) {
|
|
if (entry.second) {
|
|
extensions::EventRouter::Get(entry.second.get())
|
|
->BroadcastEvent(std::move(event));
|
|
}
|
|
}
|
|
}
|
|
|
|
extensions::ExtensionCache*
|
|
ElectronExtensionsBrowserClient::GetExtensionCache() {
|
|
return extension_cache_.get();
|
|
}
|
|
|
|
bool ElectronExtensionsBrowserClient::IsBackgroundUpdateAllowed() {
|
|
return true;
|
|
}
|
|
|
|
bool ElectronExtensionsBrowserClient::IsMinBrowserVersionSupported(
|
|
const std::string& min_version) {
|
|
return true;
|
|
}
|
|
|
|
void ElectronExtensionsBrowserClient::SetAPIClientForTest(
|
|
extensions::ExtensionsAPIClient* api_client) {
|
|
api_client_.reset(api_client);
|
|
}
|
|
|
|
extensions::ExtensionWebContentsObserver*
|
|
ElectronExtensionsBrowserClient::GetExtensionWebContentsObserver(
|
|
content::WebContents* web_contents) {
|
|
return extensions::ElectronExtensionWebContentsObserver::FromWebContents(
|
|
web_contents);
|
|
}
|
|
|
|
extensions::KioskDelegate* ElectronExtensionsBrowserClient::GetKioskDelegate() {
|
|
if (!kiosk_delegate_)
|
|
kiosk_delegate_.reset(new ElectronKioskDelegate());
|
|
return kiosk_delegate_.get();
|
|
}
|
|
|
|
bool ElectronExtensionsBrowserClient::IsLockScreenContext(
|
|
content::BrowserContext* context) {
|
|
return false;
|
|
}
|
|
|
|
std::string ElectronExtensionsBrowserClient::GetApplicationLocale() {
|
|
return ElectronBrowserClient::Get()->GetApplicationLocale();
|
|
}
|
|
|
|
std::string ElectronExtensionsBrowserClient::GetUserAgent() const {
|
|
return ElectronBrowserClient::Get()->GetUserAgent();
|
|
}
|
|
|
|
void ElectronExtensionsBrowserClient::RegisterBrowserInterfaceBindersForFrame(
|
|
mojo::BinderMapWithContext<content::RenderFrameHost*>* map,
|
|
content::RenderFrameHost* render_frame_host,
|
|
const extensions::Extension* extension) const {
|
|
PopulateExtensionFrameBinders(map, render_frame_host, extension);
|
|
}
|
|
|
|
} // namespace electron
|