e86d1cba75
* chore: bump chromium in DEPS to 104.0.5096.0 * 3651284: Use the entry settings object for window.open navigation https://chromium-review.googlesource.com/c/chromium/src/+/3651284 * 3644598: Make RenderFrameHost used for notification permission decision https://chromium-review.googlesource.com/c/chromium/src/+/3644598 * 3642842: Window Placement: Prototype Fullscreen Capability Delegation - Part 2 https://chromium-review.googlesource.com/c/chromium/src/+/3642842 * 3652785: [sandbox] Enable sandboxed pointers on sanitizer builds https://chromium-review.googlesource.com/c/v8/v8/+/3652785 * 3611967: webhid: Migrate HidDelegate to use BrowserContext and Origin https://chromium-review.googlesource.com/c/chromium/src/+/3611967 * 3665762: Remove RenderFrameHost::IsRenderFrameCreated from //content/. https://chromium-review.googlesource.com/c/chromium/src/+/3665762 * 3659375: Fold x509_util_ios and most of x509_util_mac into x509_util_apple https://chromium-review.googlesource.com/c/chromium/src/+/3659375 * 3656234: [CodeHealth] Remove uses of base::ListValue::Append() (Final, take 2) https://chromium-review.googlesource.com/c/chromium/src/+/3656234 * chore: update patch indices * chore: fix lint * 3644598: Make RenderFrameHost used for notification permission decision https://chromium-review.googlesource.com/c/chromium/src/+/3644598 * webhid: Migrate HidDelegate to use BrowserContext and Origin This is a temporary fix for https://chromium-review.googlesource.com/c/chromium/src/+/3611967 to get the build compiling, but we need to either patch around https://chromium-review.googlesource.com/c/chromium/src/+/3611967 or move our device permissioning to BrowserContext * chore: fix lint * build: run electron/script/gen-libc++-filenames.js fixes gn check * chore: bump chromium in DEPS to 104.0.5098.0 * chore: disable flaking tests * 3682394: Change pipes surrounding code references in comments to backticks https://chromium-review.googlesource.com/c/chromium/src/+/3682394 * 3652749: Delete GLRenderer and related classes https://chromium-review.googlesource.com/c/chromium/src/+/3652749 * chore: fixup patch indices * 3671199: Remove ContentMainDelegate::PostFieldTrialInitialization https://chromium-review.googlesource.com/c/chromium/src/+/3671199 * 3607963: hid: Do not exclude HID device with no collections https://chromium-review.googlesource.com/c/chromium/src/+/3607963 * refactor: use ElectronBrowserContext instead of WebContents to persist devices due to changes like https://chromium-review.googlesource.com/c/chromium/src/+/3611967, we can no longer use WebContents to store device permissions so this commit moves device permission storage to live in memory in ElectronBrowserContext instead. * 3557253: Deprecate some signature checks https://chromium-review.googlesource.com/c/v8/v8/+/3557253 * chore: bump chromium in DEPS to 104.0.5100.0 * 3680781: Add policy for Renderer App Container. https://chromium-review.googlesource.com/c/chromium/src/+/3680781 * chore: update patch indices * 3675465: Update NetLog network service API to use mojom::DictionaryValue. https://chromium-review.googlesource.com/c/chromium/src/+/3675465 * chore: bump chromium in DEPS to 104.0.5102.0 * chore: update patches * chore: bump chromium in DEPS to 104.0.5103.0 * chore: update patches * chore: bump chromium in DEPS to 104.0.5104.0 * chore: update patches * fix: add patch for DCHECK in fullscreen test * build: fix nan build * build: make the nan spec runner work on macOS * chore: bump chromium in DEPS to 104.0.5106.0 * chore: update patches * chore: bump chromium in DEPS to 104.0.5108.0 * chore: update patches * chore: bump chromium in DEPS to 104.0.5110.0 * chore: update patches * chore: bump chromium in DEPS to 104.0.5112.0 * chore: bump chromium in DEPS to 105.0.5113.0 * chore: bump chromium in DEPS to 105.0.5115.0 * chore: bump chromium in DEPS to 105.0.5117.0 * chore: update patches * chore: update libcpp patch * 3693745: Delete base::LowerCaseEqualsASCII() Ref: https://chromium-review.googlesource.com/c/chromium/src/+/3693745 * 3669226: Remove printing PostTask usage of IO thread Ref: https://chromium-review.googlesource.com/c/chromium/src/+/3669226 * 3687395: Remove DictionaryValue::HasKey(). Ref: https://chromium-review.googlesource.com/c/chromium/src/+/3687395 * 3691014: Prevent unsafe narrowing: ui/accessibility, part 2 Ref: https://chromium-review.googlesource.com/c/chromium/src/+/3691014 * 3560567: [MSC] Porting GenerateStreams clients to handle stream vectors. Ref: https://chromium-review.googlesource.com/c/chromium/src/+/3560567 * 3684873: [Bluetooth][Win/Linux] Add bluetooth pair confirmation prompt https://chromium-review.googlesource.com/c/chromium/src/+/3684873 * chore: bump chromium in DEPS to 105.0.5119.0 * chore: missing includes in desktop_notification_controller * chore: update patches * 3685951: Reland "Make sure screen object is created once in tests." https://chromium-review.googlesource.com/c/chromium/src/+/3685951 * fixup: Reland "Make sure screen object is created once in tests." * 3646014: [API] Deprecate LegacyOOMErrorCallback Ref: https://chromium-review.googlesource.com/c/v8/v8/+/3646014 * chore: bump chromium in DEPS to 105.0.5121.0 * chore: update patches * 3699085: [cleanup] update PrintBackend::EnumeratePrinters to use reference Ref: https://chromium-review.googlesource.com/c/chromium/src/+/3699085 * chore: bump chromium in DEPS to 105.0.5123.0 * chore: update patches * chore: bump chromium in DEPS to 105.0.5125.0 * chore: update patches * 3630082: [sandbox] Also enable the sandbox outside of Chromium builds Ref: https://chromium-review.googlesource.com/c/v8/v8/+/3630082 * chore: bump chromium in DEPS to 105.0.5127.0 * chore: update patches * chore: bump chromium in DEPS to 105.0.5129.0 * chore: update patches * 3703741: Remove WebContents::GetMainFrame. https://chromium-review.googlesource.com/c/chromium/src/+/3703741 * chore: update patches * fixup! 3703741: Remove WebContents::GetMainFrame. * fix lint * more lint * chore: document breaking change * 3687671: [v8] Freeze flags after initialization https://chromium-review.googlesource.com/c/chromium/src/+/3687671 * fixup! 3560567: [MSC] Porting GenerateStreams clients to handle stream vectors. * use the v8 allocator for node serdes * chore: update patches * remove faulty non-v8-sandbox-compatible code * make NodeArrayBufferAllocator use the v8 allocator under the hood * fixup! 3560567: [MSC] Porting GenerateStreams clients to handle stream vectors. * fix build on windows * 3691954: [Reland][Extensions Bindings] Validate arguments sent to API events https://chromium-review.googlesource.com/c/chromium/src/+/3691954 * chore: remove deprecated AccessorSignatures https://github.com/nodejs/nan/pull/941 * Update patches/chromium/notification_provenance.patch Co-authored-by: John Kleinschmidt <jkleinsc@electronjs.org> * remove chore_expose_v8_initialization_isolate_callbacks.patch * add link to nodejs/nan#941 * 52026: Do not allow md4 or md5 based signatures in X.509 certificates. https://boringssl-review.googlesource.com/c/boringssl/+/52026 * chore: update patches * disable nan buffer-test * disable sandboxed pointers for now * force sandboxed pointers off * improve node allocation patch * restore accidentally dropped node crypto test patch Co-authored-by: electron-roller[bot] <84116207+electron-roller[bot]@users.noreply.github.com> Co-authored-by: Shelley Vohr <shelley.vohr@gmail.com> Co-authored-by: John Kleinschmidt <jkleinsc@electronjs.org> Co-authored-by: Charles Kerr <charles@charleskerr.com> Co-authored-by: PatchUp <73610968+patchup[bot]@users.noreply.github.com> Co-authored-by: Samuel Attard <sattard@salesforce.com> Co-authored-by: Keeley Hammond <khammond@slack-corp.com> Co-authored-by: VerteDinde <keeleymhammond@gmail.com> Co-authored-by: VerteDinde <vertedinde@electronjs.org> Co-authored-by: Jeremy Rose <jeremya@chromium.org> Co-authored-by: Jeremy Rose <japthorp@slack-corp.com>
428 lines
13 KiB
C++
428 lines
13 KiB
C++
// Copyright (c) 2020 Samuel Maddock <sam@samuelmaddock.com>.
|
|
// Use of this source code is governed by the MIT license that can be
|
|
// found in the LICENSE file.
|
|
|
|
#include "shell/browser/api/electron_api_web_frame_main.h"
|
|
|
|
#include <string>
|
|
#include <unordered_map>
|
|
#include <utility>
|
|
#include <vector>
|
|
|
|
#include "base/logging.h"
|
|
#include "base/no_destructor.h"
|
|
#include "content/browser/renderer_host/frame_tree_node.h" // nogncheck
|
|
#include "content/public/browser/render_frame_host.h"
|
|
#include "electron/shell/common/api/api.mojom.h"
|
|
#include "gin/object_template_builder.h"
|
|
#include "services/service_manager/public/cpp/interface_provider.h"
|
|
#include "shell/browser/api/message_port.h"
|
|
#include "shell/browser/browser.h"
|
|
#include "shell/browser/javascript_environment.h"
|
|
#include "shell/common/gin_converters/blink_converter.h"
|
|
#include "shell/common/gin_converters/frame_converter.h"
|
|
#include "shell/common/gin_converters/gurl_converter.h"
|
|
#include "shell/common/gin_converters/value_converter.h"
|
|
#include "shell/common/gin_helper/dictionary.h"
|
|
#include "shell/common/gin_helper/error_thrower.h"
|
|
#include "shell/common/gin_helper/object_template_builder.h"
|
|
#include "shell/common/gin_helper/promise.h"
|
|
#include "shell/common/node_includes.h"
|
|
#include "shell/common/v8_value_serializer.h"
|
|
|
|
namespace gin {
|
|
|
|
template <>
|
|
struct Converter<blink::mojom::PageVisibilityState> {
|
|
static v8::Local<v8::Value> ToV8(v8::Isolate* isolate,
|
|
blink::mojom::PageVisibilityState val) {
|
|
std::string visibility;
|
|
switch (val) {
|
|
case blink::mojom::PageVisibilityState::kVisible:
|
|
visibility = "visible";
|
|
break;
|
|
case blink::mojom::PageVisibilityState::kHidden:
|
|
case blink::mojom::PageVisibilityState::kHiddenButPainting:
|
|
visibility = "hidden";
|
|
break;
|
|
}
|
|
return gin::ConvertToV8(isolate, visibility);
|
|
}
|
|
};
|
|
|
|
} // namespace gin
|
|
|
|
namespace electron {
|
|
|
|
namespace api {
|
|
|
|
typedef std::unordered_map<int, WebFrameMain*> WebFrameMainIdMap;
|
|
|
|
WebFrameMainIdMap& GetWebFrameMainMap() {
|
|
static base::NoDestructor<WebFrameMainIdMap> instance;
|
|
return *instance;
|
|
}
|
|
|
|
// static
|
|
WebFrameMain* WebFrameMain::FromFrameTreeNodeId(int frame_tree_node_id) {
|
|
WebFrameMainIdMap& frame_map = GetWebFrameMainMap();
|
|
auto iter = frame_map.find(frame_tree_node_id);
|
|
auto* web_frame = iter == frame_map.end() ? nullptr : iter->second;
|
|
return web_frame;
|
|
}
|
|
|
|
// static
|
|
WebFrameMain* WebFrameMain::FromRenderFrameHost(content::RenderFrameHost* rfh) {
|
|
return rfh ? FromFrameTreeNodeId(rfh->GetFrameTreeNodeId()) : nullptr;
|
|
}
|
|
|
|
gin::WrapperInfo WebFrameMain::kWrapperInfo = {gin::kEmbedderNativeGin};
|
|
|
|
WebFrameMain::WebFrameMain(content::RenderFrameHost* rfh)
|
|
: frame_tree_node_id_(rfh->GetFrameTreeNodeId()), render_frame_(rfh) {
|
|
GetWebFrameMainMap().emplace(frame_tree_node_id_, this);
|
|
}
|
|
|
|
WebFrameMain::~WebFrameMain() {
|
|
Destroyed();
|
|
}
|
|
|
|
void WebFrameMain::Destroyed() {
|
|
MarkRenderFrameDisposed();
|
|
GetWebFrameMainMap().erase(frame_tree_node_id_);
|
|
Unpin();
|
|
}
|
|
|
|
void WebFrameMain::MarkRenderFrameDisposed() {
|
|
render_frame_ = nullptr;
|
|
render_frame_disposed_ = true;
|
|
TeardownMojoConnection();
|
|
}
|
|
|
|
void WebFrameMain::UpdateRenderFrameHost(content::RenderFrameHost* rfh) {
|
|
// Should only be called when swapping frames.
|
|
render_frame_disposed_ = false;
|
|
render_frame_ = rfh;
|
|
TeardownMojoConnection();
|
|
MaybeSetupMojoConnection();
|
|
}
|
|
|
|
bool WebFrameMain::CheckRenderFrame() const {
|
|
if (render_frame_disposed_) {
|
|
v8::Isolate* isolate = JavascriptEnvironment::GetIsolate();
|
|
v8::HandleScope scope(isolate);
|
|
gin_helper::ErrorThrower(isolate).ThrowError(
|
|
"Render frame was disposed before WebFrameMain could be accessed");
|
|
return false;
|
|
}
|
|
return true;
|
|
}
|
|
|
|
v8::Local<v8::Promise> WebFrameMain::ExecuteJavaScript(
|
|
gin::Arguments* args,
|
|
const std::u16string& code) {
|
|
gin_helper::Promise<base::Value> promise(args->isolate());
|
|
v8::Local<v8::Promise> handle = promise.GetHandle();
|
|
|
|
// Optional userGesture parameter
|
|
bool user_gesture;
|
|
if (!args->PeekNext().IsEmpty()) {
|
|
if (args->PeekNext()->IsBoolean()) {
|
|
args->GetNext(&user_gesture);
|
|
} else {
|
|
args->ThrowTypeError("userGesture must be a boolean");
|
|
return handle;
|
|
}
|
|
} else {
|
|
user_gesture = false;
|
|
}
|
|
|
|
if (render_frame_disposed_) {
|
|
promise.RejectWithErrorMessage(
|
|
"Render frame was disposed before WebFrameMain could be accessed");
|
|
return handle;
|
|
}
|
|
|
|
if (user_gesture) {
|
|
auto* ftn = content::FrameTreeNode::From(render_frame_);
|
|
ftn->UpdateUserActivationState(
|
|
blink::mojom::UserActivationUpdateType::kNotifyActivation,
|
|
blink::mojom::UserActivationNotificationType::kTest);
|
|
}
|
|
|
|
render_frame_->ExecuteJavaScriptForTests(
|
|
code, base::BindOnce([](gin_helper::Promise<base::Value> promise,
|
|
base::Value value) { promise.Resolve(value); },
|
|
std::move(promise)));
|
|
|
|
return handle;
|
|
}
|
|
|
|
bool WebFrameMain::Reload() {
|
|
if (!CheckRenderFrame())
|
|
return false;
|
|
return render_frame_->Reload();
|
|
}
|
|
|
|
void WebFrameMain::Send(v8::Isolate* isolate,
|
|
bool internal,
|
|
const std::string& channel,
|
|
v8::Local<v8::Value> args) {
|
|
blink::CloneableMessage message;
|
|
if (!gin::ConvertFromV8(isolate, args, &message)) {
|
|
isolate->ThrowException(v8::Exception::Error(
|
|
gin::StringToV8(isolate, "Failed to serialize arguments")));
|
|
return;
|
|
}
|
|
|
|
if (!CheckRenderFrame())
|
|
return;
|
|
|
|
GetRendererApi()->Message(internal, channel, std::move(message),
|
|
0 /* sender_id */);
|
|
}
|
|
|
|
const mojo::Remote<mojom::ElectronRenderer>& WebFrameMain::GetRendererApi() {
|
|
MaybeSetupMojoConnection();
|
|
return renderer_api_;
|
|
}
|
|
|
|
void WebFrameMain::MaybeSetupMojoConnection() {
|
|
if (render_frame_disposed_) {
|
|
// RFH may not be set yet if called between when a new RFH is created and
|
|
// before it's been swapped with an old RFH.
|
|
LOG(INFO) << "Attempt to setup WebFrameMain connection while render frame "
|
|
"is disposed";
|
|
return;
|
|
}
|
|
|
|
if (!renderer_api_) {
|
|
pending_receiver_ = renderer_api_.BindNewPipeAndPassReceiver();
|
|
renderer_api_.set_disconnect_handler(base::BindOnce(
|
|
&WebFrameMain::OnRendererConnectionError, weak_factory_.GetWeakPtr()));
|
|
}
|
|
|
|
DCHECK(render_frame_);
|
|
|
|
// Wait for RenderFrame to be created in renderer before accessing remote.
|
|
if (pending_receiver_ && render_frame_ &&
|
|
render_frame_->IsRenderFrameLive()) {
|
|
render_frame_->GetRemoteInterfaces()->GetInterface(
|
|
std::move(pending_receiver_));
|
|
}
|
|
}
|
|
|
|
void WebFrameMain::TeardownMojoConnection() {
|
|
renderer_api_.reset();
|
|
pending_receiver_.reset();
|
|
}
|
|
|
|
void WebFrameMain::OnRendererConnectionError() {
|
|
TeardownMojoConnection();
|
|
}
|
|
|
|
void WebFrameMain::PostMessage(v8::Isolate* isolate,
|
|
const std::string& channel,
|
|
v8::Local<v8::Value> message_value,
|
|
absl::optional<v8::Local<v8::Value>> transfer) {
|
|
blink::TransferableMessage transferable_message;
|
|
if (!electron::SerializeV8Value(isolate, message_value,
|
|
&transferable_message)) {
|
|
// SerializeV8Value sets an exception.
|
|
return;
|
|
}
|
|
|
|
std::vector<gin::Handle<MessagePort>> wrapped_ports;
|
|
if (transfer && !transfer.value()->IsUndefined()) {
|
|
if (!gin::ConvertFromV8(isolate, *transfer, &wrapped_ports)) {
|
|
isolate->ThrowException(v8::Exception::Error(
|
|
gin::StringToV8(isolate, "Invalid value for transfer")));
|
|
return;
|
|
}
|
|
}
|
|
|
|
bool threw_exception = false;
|
|
transferable_message.ports =
|
|
MessagePort::DisentanglePorts(isolate, wrapped_ports, &threw_exception);
|
|
if (threw_exception)
|
|
return;
|
|
|
|
if (!CheckRenderFrame())
|
|
return;
|
|
|
|
GetRendererApi()->ReceivePostMessage(channel,
|
|
std::move(transferable_message));
|
|
}
|
|
|
|
int WebFrameMain::FrameTreeNodeID() const {
|
|
return frame_tree_node_id_;
|
|
}
|
|
|
|
std::string WebFrameMain::Name() const {
|
|
if (!CheckRenderFrame())
|
|
return std::string();
|
|
return render_frame_->GetFrameName();
|
|
}
|
|
|
|
base::ProcessId WebFrameMain::OSProcessID() const {
|
|
if (!CheckRenderFrame())
|
|
return -1;
|
|
base::ProcessHandle process_handle =
|
|
render_frame_->GetProcess()->GetProcess().Handle();
|
|
return base::GetProcId(process_handle);
|
|
}
|
|
|
|
int WebFrameMain::ProcessID() const {
|
|
if (!CheckRenderFrame())
|
|
return -1;
|
|
return render_frame_->GetProcess()->GetID();
|
|
}
|
|
|
|
int WebFrameMain::RoutingID() const {
|
|
if (!CheckRenderFrame())
|
|
return -1;
|
|
return render_frame_->GetRoutingID();
|
|
}
|
|
|
|
GURL WebFrameMain::URL() const {
|
|
if (!CheckRenderFrame())
|
|
return GURL::EmptyGURL();
|
|
return render_frame_->GetLastCommittedURL();
|
|
}
|
|
|
|
blink::mojom::PageVisibilityState WebFrameMain::VisibilityState() const {
|
|
if (!CheckRenderFrame())
|
|
return blink::mojom::PageVisibilityState::kHidden;
|
|
return render_frame_->GetVisibilityState();
|
|
}
|
|
|
|
content::RenderFrameHost* WebFrameMain::Top() const {
|
|
if (!CheckRenderFrame())
|
|
return nullptr;
|
|
return render_frame_->GetMainFrame();
|
|
}
|
|
|
|
content::RenderFrameHost* WebFrameMain::Parent() const {
|
|
if (!CheckRenderFrame())
|
|
return nullptr;
|
|
return render_frame_->GetParent();
|
|
}
|
|
|
|
std::vector<content::RenderFrameHost*> WebFrameMain::Frames() const {
|
|
std::vector<content::RenderFrameHost*> frame_hosts;
|
|
if (!CheckRenderFrame())
|
|
return frame_hosts;
|
|
|
|
render_frame_->ForEachRenderFrameHost(base::BindRepeating(
|
|
[](std::vector<content::RenderFrameHost*>* frame_hosts,
|
|
content::RenderFrameHost* current_frame,
|
|
content::RenderFrameHost* rfh) {
|
|
if (rfh->GetParent() == current_frame)
|
|
frame_hosts->push_back(rfh);
|
|
},
|
|
&frame_hosts, render_frame_));
|
|
|
|
return frame_hosts;
|
|
}
|
|
|
|
std::vector<content::RenderFrameHost*> WebFrameMain::FramesInSubtree() const {
|
|
std::vector<content::RenderFrameHost*> frame_hosts;
|
|
if (!CheckRenderFrame())
|
|
return frame_hosts;
|
|
|
|
render_frame_->ForEachRenderFrameHost(base::BindRepeating(
|
|
[](std::vector<content::RenderFrameHost*>* frame_hosts,
|
|
content::RenderFrameHost* rfh) { frame_hosts->push_back(rfh); },
|
|
&frame_hosts));
|
|
|
|
return frame_hosts;
|
|
}
|
|
|
|
void WebFrameMain::DOMContentLoaded() {
|
|
Emit("dom-ready");
|
|
}
|
|
|
|
// static
|
|
gin::Handle<WebFrameMain> WebFrameMain::New(v8::Isolate* isolate) {
|
|
return gin::Handle<WebFrameMain>();
|
|
}
|
|
|
|
// static
|
|
gin::Handle<WebFrameMain> WebFrameMain::From(v8::Isolate* isolate,
|
|
content::RenderFrameHost* rfh) {
|
|
if (rfh == nullptr)
|
|
return gin::Handle<WebFrameMain>();
|
|
auto* web_frame = FromRenderFrameHost(rfh);
|
|
if (web_frame)
|
|
return gin::CreateHandle(isolate, web_frame);
|
|
|
|
auto handle = gin::CreateHandle(isolate, new WebFrameMain(rfh));
|
|
|
|
// Prevent garbage collection of frame until it has been deleted internally.
|
|
handle->Pin(isolate);
|
|
|
|
return handle;
|
|
}
|
|
|
|
// static
|
|
v8::Local<v8::ObjectTemplate> WebFrameMain::FillObjectTemplate(
|
|
v8::Isolate* isolate,
|
|
v8::Local<v8::ObjectTemplate> templ) {
|
|
return gin_helper::ObjectTemplateBuilder(isolate, templ)
|
|
.SetMethod("executeJavaScript", &WebFrameMain::ExecuteJavaScript)
|
|
.SetMethod("reload", &WebFrameMain::Reload)
|
|
.SetMethod("_send", &WebFrameMain::Send)
|
|
.SetMethod("_postMessage", &WebFrameMain::PostMessage)
|
|
.SetProperty("frameTreeNodeId", &WebFrameMain::FrameTreeNodeID)
|
|
.SetProperty("name", &WebFrameMain::Name)
|
|
.SetProperty("osProcessId", &WebFrameMain::OSProcessID)
|
|
.SetProperty("processId", &WebFrameMain::ProcessID)
|
|
.SetProperty("routingId", &WebFrameMain::RoutingID)
|
|
.SetProperty("url", &WebFrameMain::URL)
|
|
.SetProperty("visibilityState", &WebFrameMain::VisibilityState)
|
|
.SetProperty("top", &WebFrameMain::Top)
|
|
.SetProperty("parent", &WebFrameMain::Parent)
|
|
.SetProperty("frames", &WebFrameMain::Frames)
|
|
.SetProperty("framesInSubtree", &WebFrameMain::FramesInSubtree)
|
|
.Build();
|
|
}
|
|
|
|
const char* WebFrameMain::GetTypeName() {
|
|
return "WebFrameMain";
|
|
}
|
|
|
|
} // namespace api
|
|
|
|
} // namespace electron
|
|
|
|
namespace {
|
|
|
|
using electron::api::WebFrameMain;
|
|
|
|
v8::Local<v8::Value> FromID(gin_helper::ErrorThrower thrower,
|
|
int render_process_id,
|
|
int render_frame_id) {
|
|
if (!electron::Browser::Get()->is_ready()) {
|
|
thrower.ThrowError("WebFrameMain is available only after app ready");
|
|
return v8::Null(thrower.isolate());
|
|
}
|
|
|
|
auto* rfh =
|
|
content::RenderFrameHost::FromID(render_process_id, render_frame_id);
|
|
|
|
return WebFrameMain::From(thrower.isolate(), rfh).ToV8();
|
|
}
|
|
|
|
void Initialize(v8::Local<v8::Object> exports,
|
|
v8::Local<v8::Value> unused,
|
|
v8::Local<v8::Context> context,
|
|
void* priv) {
|
|
v8::Isolate* isolate = context->GetIsolate();
|
|
gin_helper::Dictionary dict(isolate, exports);
|
|
dict.Set("WebFrameMain", WebFrameMain::GetConstructor(context));
|
|
dict.SetMethod("fromId", &FromID);
|
|
}
|
|
|
|
} // namespace
|
|
|
|
NODE_LINKED_MODULE_CONTEXT_AWARE(electron_browser_web_frame_main, Initialize)
|