electron_browser_client.cc 68 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791
  1. // Copyright (c) 2013 GitHub, Inc.
  2. // Use of this source code is governed by the MIT license that can be
  3. // found in the LICENSE file.
  4. #include "shell/browser/electron_browser_client.h"
  5. #if BUILDFLAG(IS_WIN)
  6. #include <shlobj.h>
  7. #endif
  8. #include <memory>
  9. #include <string_view>
  10. #include <utility>
  11. #include "base/base_switches.h"
  12. #include "base/command_line.h"
  13. #include "base/debug/crash_logging.h"
  14. #include "base/environment.h"
  15. #include "base/files/file_path.h"
  16. #include "base/files/file_util.h"
  17. #include "base/no_destructor.h"
  18. #include "base/notreached.h"
  19. #include "base/path_service.h"
  20. #include "base/process/process_metrics.h"
  21. #include "base/strings/escape.h"
  22. #include "base/strings/string_util.h"
  23. #include "chrome/browser/browser_process.h"
  24. #include "chrome/common/chrome_paths.h"
  25. #include "chrome/common/chrome_switches.h"
  26. #include "chrome/common/chrome_version.h"
  27. #include "components/embedder_support/user_agent_utils.h"
  28. #include "components/net_log/chrome_net_log.h"
  29. #include "components/network_hints/common/network_hints.mojom.h"
  30. #include "content/browser/keyboard_lock/keyboard_lock_service_impl.h" // nogncheck
  31. #include "content/public/browser/browser_main_runner.h"
  32. #include "content/public/browser/browser_task_traits.h"
  33. #include "content/public/browser/client_certificate_delegate.h"
  34. #include "content/public/browser/login_delegate.h"
  35. #include "content/public/browser/overlay_window.h"
  36. #include "content/public/browser/render_frame_host.h"
  37. #include "content/public/browser/render_process_host.h"
  38. #include "content/public/browser/render_view_host.h"
  39. #include "content/public/browser/service_worker_version_base_info.h"
  40. #include "content/public/browser/site_instance.h"
  41. #include "content/public/browser/tts_controller.h"
  42. #include "content/public/browser/tts_platform.h"
  43. #include "content/public/browser/url_loader_request_interceptor.h"
  44. #include "content/public/browser/weak_document_ptr.h"
  45. #include "content/public/common/content_descriptors.h"
  46. #include "content/public/common/content_paths.h"
  47. #include "content/public/common/content_switches.h"
  48. #include "content/public/common/url_constants.h"
  49. #include "crypto/crypto_buildflags.h"
  50. #include "electron/buildflags/buildflags.h"
  51. #include "electron/fuses.h"
  52. #include "electron/shell/common/api/api.mojom.h"
  53. #include "extensions/browser/extension_navigation_ui_data.h"
  54. #include "extensions/common/extension_id.h"
  55. #include "mojo/public/cpp/bindings/binder_map.h"
  56. #include "mojo/public/cpp/bindings/self_owned_associated_receiver.h"
  57. #include "net/ssl/ssl_cert_request_info.h"
  58. #include "net/ssl/ssl_private_key.h"
  59. #include "printing/buildflags/buildflags.h"
  60. #include "services/device/public/cpp/geolocation/geolocation_system_permission_manager.h"
  61. #include "services/device/public/cpp/geolocation/location_provider.h"
  62. #include "services/network/public/cpp/features.h"
  63. #include "services/network/public/cpp/is_potentially_trustworthy.h"
  64. #include "services/network/public/cpp/network_switches.h"
  65. #include "services/network/public/cpp/resource_request_body.h"
  66. #include "services/network/public/cpp/self_deleting_url_loader_factory.h"
  67. #include "services/network/public/cpp/url_loader_factory_builder.h"
  68. #include "shell/app/electron_crash_reporter_client.h"
  69. #include "shell/browser/api/electron_api_app.h"
  70. #include "shell/browser/api/electron_api_crash_reporter.h"
  71. #include "shell/browser/api/electron_api_protocol.h"
  72. #include "shell/browser/api/electron_api_web_contents.h"
  73. #include "shell/browser/api/electron_api_web_request.h"
  74. #include "shell/browser/badging/badge_manager.h"
  75. #include "shell/browser/bluetooth/electron_bluetooth_delegate.h"
  76. #include "shell/browser/child_web_contents_tracker.h"
  77. #include "shell/browser/electron_api_ipc_handler_impl.h"
  78. #include "shell/browser/electron_api_sw_ipc_handler_impl.h"
  79. #include "shell/browser/electron_autofill_driver_factory.h"
  80. #include "shell/browser/electron_browser_context.h"
  81. #include "shell/browser/electron_browser_main_parts.h"
  82. #include "shell/browser/electron_navigation_throttle.h"
  83. #include "shell/browser/electron_plugin_info_host_impl.h"
  84. #include "shell/browser/electron_speech_recognition_manager_delegate.h"
  85. #include "shell/browser/electron_web_contents_utility_handler_impl.h"
  86. #include "shell/browser/font_defaults.h"
  87. #include "shell/browser/hid/electron_hid_delegate.h"
  88. #include "shell/browser/javascript_environment.h"
  89. #include "shell/browser/login_handler.h"
  90. #include "shell/browser/media/media_capture_devices_dispatcher.h"
  91. #include "shell/browser/native_window.h"
  92. #include "shell/browser/net/network_context_service.h"
  93. #include "shell/browser/net/network_context_service_factory.h"
  94. #include "shell/browser/net/proxying_url_loader_factory.h"
  95. #include "shell/browser/net/proxying_websocket.h"
  96. #include "shell/browser/net/system_network_context_manager.h"
  97. #include "shell/browser/network_hints_handler_impl.h"
  98. #include "shell/browser/notifications/notification_presenter.h"
  99. #include "shell/browser/notifications/platform_notification_service.h"
  100. #include "shell/browser/protocol_registry.h"
  101. #include "shell/browser/serial/electron_serial_delegate.h"
  102. #include "shell/browser/session_preferences.h"
  103. #include "shell/browser/ui/devtools_manager_delegate.h"
  104. #include "shell/browser/usb/electron_usb_delegate.h"
  105. #include "shell/browser/web_contents_permission_helper.h"
  106. #include "shell/browser/web_contents_preferences.h"
  107. #include "shell/browser/webauthn/electron_authenticator_request_delegate.h"
  108. #include "shell/browser/window_list.h"
  109. #include "shell/common/api/api.mojom.h"
  110. #include "shell/common/application_info.h"
  111. #include "shell/common/electron_paths.h"
  112. #include "shell/common/logging.h"
  113. #include "shell/common/options_switches.h"
  114. #include "shell/common/platform_util.h"
  115. #include "shell/common/plugin.mojom.h"
  116. #include "shell/common/thread_restrictions.h"
  117. #include "third_party/blink/public/common/associated_interfaces/associated_interface_registry.h"
  118. #include "third_party/blink/public/common/loader/url_loader_throttle.h"
  119. #include "third_party/blink/public/common/renderer_preferences/renderer_preferences.h"
  120. #include "third_party/blink/public/common/tokens/tokens.h"
  121. #include "third_party/blink/public/common/web_preferences/web_preferences.h"
  122. #include "third_party/blink/public/mojom/badging/badging.mojom.h"
  123. #include "ui/base/resource/resource_bundle.h"
  124. #include "ui/native_theme/native_theme.h"
  125. #include "v8/include/v8.h"
  126. #if BUILDFLAG(USE_NSS_CERTS)
  127. #include "net/ssl/client_cert_store_nss.h"
  128. #include "shell/browser/electron_crypto_module_delegate_nss.h"
  129. #elif BUILDFLAG(IS_WIN)
  130. #include "net/ssl/client_cert_store_win.h"
  131. #elif BUILDFLAG(IS_MAC)
  132. #include "net/ssl/client_cert_store_mac.h"
  133. #elif defined(USE_OPENSSL)
  134. #include "net/ssl/client_cert_store.h"
  135. #endif
  136. #if BUILDFLAG(ENABLE_BUILTIN_SPELLCHECKER)
  137. #include "chrome/browser/spellchecker/spell_check_host_chrome_impl.h" // nogncheck
  138. #include "chrome/browser/spellchecker/spell_check_initialization_host_impl.h" // nogncheck
  139. #include "components/spellcheck/common/spellcheck.mojom.h" // nogncheck
  140. #endif
  141. #if BUILDFLAG(OVERRIDE_LOCATION_PROVIDER)
  142. #include "shell/browser/fake_location_provider.h"
  143. #endif // BUILDFLAG(OVERRIDE_LOCATION_PROVIDER)
  144. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  145. #include "base/functional/bind.h"
  146. #include "chrome/common/webui_url_constants.h"
  147. #include "components/guest_view/common/guest_view.mojom.h"
  148. #include "content/public/browser/child_process_security_policy.h"
  149. #include "content/public/browser/file_url_loader.h"
  150. #include "content/public/browser/web_ui_url_loader_factory.h"
  151. #include "extensions/browser/api/mime_handler_private/mime_handler_private.h"
  152. #include "extensions/browser/api/web_request/web_request_api.h"
  153. #include "extensions/browser/browser_context_keyed_api_factory.h"
  154. #include "extensions/browser/event_router.h"
  155. #include "extensions/browser/extension_host.h"
  156. #include "extensions/browser/extension_navigation_throttle.h"
  157. #include "extensions/browser/extension_prefs.h"
  158. #include "extensions/browser/extension_protocols.h"
  159. #include "extensions/browser/extension_registry.h"
  160. #include "extensions/browser/extensions_browser_client.h"
  161. #include "extensions/browser/guest_view/extensions_guest_view.h"
  162. #include "extensions/browser/guest_view/mime_handler_view/mime_handler_view_guest.h"
  163. #include "extensions/browser/process_manager.h"
  164. #include "extensions/browser/process_map.h"
  165. #include "extensions/browser/renderer_startup_helper.h"
  166. #include "extensions/browser/service_worker/service_worker_host.h"
  167. #include "extensions/browser/url_loader_factory_manager.h"
  168. #include "extensions/common/api/mime_handler.mojom.h"
  169. #include "extensions/common/constants.h"
  170. #include "extensions/common/extension.h"
  171. #include "extensions/common/mojom/event_router.mojom.h"
  172. #include "extensions/common/mojom/guest_view.mojom.h"
  173. #include "extensions/common/mojom/renderer_host.mojom.h"
  174. #include "extensions/common/switches.h"
  175. #include "shell/browser/extensions/electron_extension_system.h"
  176. #include "shell/browser/extensions/electron_extension_web_contents_observer.h"
  177. #endif
  178. #if BUILDFLAG(ENABLE_PLUGINS)
  179. #include "chrome/browser/plugins/plugin_response_interceptor_url_loader_throttle.h" // nogncheck
  180. #include "shell/browser/plugins/plugin_utils.h"
  181. #endif
  182. #if BUILDFLAG(IS_MAC)
  183. #include "content/browser/mac_helpers.h"
  184. #include "content/public/browser/child_process_host.h"
  185. #endif
  186. #if BUILDFLAG(IS_LINUX)
  187. #include "components/crash/core/app/crash_switches.h" // nogncheck
  188. #include "components/crash/core/app/crashpad.h" // nogncheck
  189. #endif
  190. #if BUILDFLAG(IS_WIN)
  191. #include "chrome/browser/ui/views/overlay/video_overlay_window_views.h"
  192. #include "shell/browser/browser.h"
  193. #include "ui/aura/window.h"
  194. #include "ui/aura/window_tree_host.h"
  195. #include "ui/base/win/shell.h"
  196. #include "ui/views/widget/widget.h"
  197. #endif
  198. #if BUILDFLAG(ENABLE_PRINTING)
  199. #include "shell/browser/printing/print_view_manager_electron.h"
  200. #endif
  201. #if BUILDFLAG(ENABLE_PDF_VIEWER)
  202. #include "chrome/browser/pdf/chrome_pdf_stream_delegate.h"
  203. #include "chrome/browser/plugins/pdf_iframe_navigation_throttle.h" // nogncheck
  204. #include "components/pdf/browser/pdf_document_helper.h" // nogncheck
  205. #include "components/pdf/browser/pdf_navigation_throttle.h"
  206. #include "components/pdf/browser/pdf_url_loader_request_interceptor.h"
  207. #include "components/pdf/common/constants.h" // nogncheck
  208. #include "shell/browser/electron_pdf_document_helper_client.h"
  209. #endif
  210. using content::BrowserThread;
  211. namespace electron {
  212. namespace {
  213. ElectronBrowserClient* g_browser_client = nullptr;
  214. base::NoDestructor<std::string> g_io_thread_application_locale;
  215. base::NoDestructor<std::string> g_application_locale;
  216. void SetApplicationLocaleOnIOThread(const std::string& locale) {
  217. DCHECK_CURRENTLY_ON(BrowserThread::IO);
  218. *g_io_thread_application_locale = locale;
  219. }
  220. void BindNetworkHintsHandler(
  221. content::RenderFrameHost* frame_host,
  222. mojo::PendingReceiver<network_hints::mojom::NetworkHintsHandler> receiver) {
  223. NetworkHintsHandlerImpl::Create(frame_host, std::move(receiver));
  224. }
  225. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  226. // Used by the GetPrivilegeRequiredByUrl() and GetProcessPrivilege() functions
  227. // below. Extension, and isolated apps require different privileges to be
  228. // granted to their RenderProcessHosts. This classification allows us to make
  229. // sure URLs are served by hosts with the right set of privileges.
  230. enum class RenderProcessHostPrivilege {
  231. kNormal,
  232. kHosted,
  233. kIsolated,
  234. kExtension,
  235. };
  236. // Copied from chrome/browser/extensions/extension_util.cc.
  237. bool AllowFileAccess(const std::string& extension_id,
  238. content::BrowserContext* context) {
  239. return base::CommandLine::ForCurrentProcess()->HasSwitch(
  240. extensions::switches::kDisableExtensionsFileAccessCheck) ||
  241. extensions::ExtensionPrefs::Get(context)->AllowFileAccess(
  242. extension_id);
  243. }
  244. RenderProcessHostPrivilege GetPrivilegeRequiredByUrl(const GURL& url) {
  245. // Default to a normal renderer cause it is lower privileged. This should only
  246. // occur if the URL on a site instance is either malformed, or uninitialized.
  247. // If it is malformed, then there is no need for better privileges anyways.
  248. // If it is uninitialized, but eventually settles on being an a scheme other
  249. // than normal webrenderer, the navigation logic will correct us out of band
  250. // anyways.
  251. if (!url.is_valid())
  252. return RenderProcessHostPrivilege::kNormal;
  253. if (!url.SchemeIs(extensions::kExtensionScheme))
  254. return RenderProcessHostPrivilege::kNormal;
  255. return RenderProcessHostPrivilege::kExtension;
  256. }
  257. RenderProcessHostPrivilege GetProcessPrivilege(
  258. content::RenderProcessHost* process_host,
  259. extensions::ProcessMap* process_map) {
  260. std::optional<extensions::ExtensionId> extension_id =
  261. process_map->GetExtensionIdForProcess(process_host->GetDeprecatedID());
  262. if (!extension_id.has_value())
  263. return RenderProcessHostPrivilege::kNormal;
  264. return RenderProcessHostPrivilege::kExtension;
  265. }
  266. const extensions::Extension* GetEnabledExtensionFromEffectiveURL(
  267. content::BrowserContext* context,
  268. const GURL& effective_url) {
  269. if (!effective_url.SchemeIs(extensions::kExtensionScheme))
  270. return nullptr;
  271. extensions::ExtensionRegistry* registry =
  272. extensions::ExtensionRegistry::Get(context);
  273. if (!registry)
  274. return nullptr;
  275. return registry->enabled_extensions().GetByID(effective_url.host());
  276. }
  277. #endif // BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  278. #if BUILDFLAG(IS_LINUX)
  279. int GetCrashSignalFD(const base::CommandLine& command_line) {
  280. int fd;
  281. return crash_reporter::GetHandlerSocket(&fd, nullptr) ? fd : -1;
  282. }
  283. #endif // BUILDFLAG(IS_LINUX)
  284. void MaybeAppendSecureOriginsAllowlistSwitch(base::CommandLine* cmdline) {
  285. // |allowlist| combines pref/policy + cmdline switch in the browser process.
  286. // For renderer and utility (e.g. NetworkService) processes the switch is the
  287. // only available source, so below the combined (pref/policy + cmdline)
  288. // allowlist of secure origins is injected into |cmdline| for these other
  289. // processes.
  290. std::vector<std::string> allowlist =
  291. network::SecureOriginAllowlist::GetInstance().GetCurrentAllowlist();
  292. if (!allowlist.empty()) {
  293. cmdline->AppendSwitchASCII(
  294. network::switches::kUnsafelyTreatInsecureOriginAsSecure,
  295. base::JoinString(allowlist, ","));
  296. }
  297. }
  298. } // namespace
  299. // static
  300. ElectronBrowserClient* ElectronBrowserClient::Get() {
  301. return g_browser_client;
  302. }
  303. // static
  304. void ElectronBrowserClient::SetApplicationLocale(const std::string& locale) {
  305. if (!BrowserThread::IsThreadInitialized(BrowserThread::IO) ||
  306. !content::GetIOThreadTaskRunner({})->PostTask(
  307. FROM_HERE, base::BindOnce(&SetApplicationLocaleOnIOThread, locale))) {
  308. *g_io_thread_application_locale = locale;
  309. }
  310. *g_application_locale = locale;
  311. }
  312. ElectronBrowserClient::ElectronBrowserClient() {
  313. DCHECK(!g_browser_client);
  314. g_browser_client = this;
  315. }
  316. ElectronBrowserClient::~ElectronBrowserClient() {
  317. DCHECK(g_browser_client);
  318. g_browser_client = nullptr;
  319. }
  320. content::WebContents* ElectronBrowserClient::GetWebContentsFromProcessID(
  321. content::ChildProcessId process_id) {
  322. // If the process is a pending process, we should use the web contents
  323. // for the frame host passed into RegisterPendingProcess.
  324. const auto iter = pending_processes_.find(process_id);
  325. if (iter != std::end(pending_processes_))
  326. return iter->second;
  327. // Certain render process will be created with no associated render view,
  328. // for example: ServiceWorker.
  329. return WebContentsPreferences::GetWebContentsFromProcessID(process_id);
  330. }
  331. content::SiteInstance* ElectronBrowserClient::GetSiteInstanceFromAffinity(
  332. content::BrowserContext* browser_context,
  333. const GURL& url,
  334. content::RenderFrameHost* rfh) const {
  335. return nullptr;
  336. }
  337. bool ElectronBrowserClient::IsRendererSubFrame(
  338. content::ChildProcessId process_id) const {
  339. return base::Contains(renderer_is_subframe_, process_id);
  340. }
  341. void ElectronBrowserClient::RenderProcessWillLaunch(
  342. content::RenderProcessHost* host) {
  343. // Remove in case the host is reused after a crash, otherwise noop.
  344. host->RemoveObserver(this);
  345. // ensure the ProcessPreferences is removed later
  346. host->AddObserver(this);
  347. }
  348. content::SpeechRecognitionManagerDelegate*
  349. ElectronBrowserClient::CreateSpeechRecognitionManagerDelegate() {
  350. return new ElectronSpeechRecognitionManagerDelegate;
  351. }
  352. content::TtsPlatform* ElectronBrowserClient::GetTtsPlatform() {
  353. return nullptr;
  354. }
  355. void ElectronBrowserClient::OverrideWebPreferences(
  356. content::WebContents* web_contents,
  357. content::SiteInstance& main_frame_site,
  358. blink::web_pref::WebPreferences* prefs) {
  359. prefs->javascript_enabled = true;
  360. prefs->web_security_enabled = true;
  361. prefs->plugins_enabled = true;
  362. prefs->dom_paste_enabled = false;
  363. prefs->javascript_can_access_clipboard = false;
  364. prefs->allow_scripts_to_close_windows = true;
  365. prefs->local_storage_enabled = true;
  366. prefs->databases_enabled = true;
  367. prefs->allow_universal_access_from_file_urls =
  368. electron::fuses::IsGrantFileProtocolExtraPrivilegesEnabled();
  369. prefs->allow_file_access_from_file_urls =
  370. electron::fuses::IsGrantFileProtocolExtraPrivilegesEnabled();
  371. prefs->webgl1_enabled = true;
  372. prefs->webgl2_enabled = true;
  373. prefs->allow_running_insecure_content = false;
  374. prefs->default_minimum_page_scale_factor = 1.f;
  375. prefs->default_maximum_page_scale_factor = 1.f;
  376. blink::RendererPreferences* renderer_prefs =
  377. web_contents->GetMutableRendererPrefs();
  378. renderer_prefs->can_accept_load_drops = false;
  379. ui::NativeTheme* native_theme = ui::NativeTheme::GetInstanceForNativeUi();
  380. prefs->in_forced_colors = native_theme->InForcedColorsMode();
  381. prefs->preferred_color_scheme =
  382. native_theme->ShouldUseDarkColors()
  383. ? blink::mojom::PreferredColorScheme::kDark
  384. : blink::mojom::PreferredColorScheme::kLight;
  385. SetFontDefaults(prefs);
  386. // Custom preferences of guest page.
  387. if (auto* web_preferences = WebContentsPreferences::From(web_contents)) {
  388. web_preferences->OverrideWebkitPrefs(prefs, renderer_prefs);
  389. }
  390. }
  391. void ElectronBrowserClient::RegisterPendingSiteInstance(
  392. content::RenderFrameHost* rfh,
  393. content::SiteInstance* pending_site_instance) {
  394. // Remember the original web contents for the pending renderer process.
  395. auto* web_contents = content::WebContents::FromRenderFrameHost(rfh);
  396. auto* pending_process = pending_site_instance->GetProcess();
  397. pending_processes_[pending_process->GetID()] = web_contents;
  398. if (rfh->GetParent())
  399. renderer_is_subframe_.insert(pending_process->GetID());
  400. else
  401. renderer_is_subframe_.erase(pending_process->GetID());
  402. }
  403. void ElectronBrowserClient::AppendExtraCommandLineSwitches(
  404. base::CommandLine* command_line,
  405. int process_id) {
  406. // Make sure we're about to launch a known executable
  407. #if BUILDFLAG(IS_LINUX)
  408. // On Linux, do not perform this check for /proc/self/exe. It will always
  409. // point to the currently running executable so this check is not
  410. // necessary, and if the executable has been deleted it will return a fake
  411. // name that causes this check to fail.
  412. if (command_line->GetProgram() != base::FilePath(base::kProcSelfExe)) {
  413. #else
  414. {
  415. #endif
  416. ScopedAllowBlockingForElectron allow_blocking;
  417. base::FilePath child_path;
  418. base::FilePath program =
  419. base::MakeAbsoluteFilePath(command_line->GetProgram());
  420. #if BUILDFLAG(IS_MAC)
  421. auto renderer_child_path = content::ChildProcessHost::GetChildPath(
  422. content::ChildProcessHost::CHILD_RENDERER);
  423. auto gpu_child_path = content::ChildProcessHost::GetChildPath(
  424. content::ChildProcessHost::CHILD_GPU);
  425. auto plugin_child_path = content::ChildProcessHost::GetChildPath(
  426. content::ChildProcessHost::CHILD_PLUGIN);
  427. if (program != renderer_child_path && program != gpu_child_path &&
  428. program != plugin_child_path) {
  429. child_path = content::ChildProcessHost::GetChildPath(
  430. content::ChildProcessHost::CHILD_NORMAL);
  431. CHECK_EQ(program, child_path)
  432. << "Aborted from launching unexpected helper executable";
  433. }
  434. #else
  435. if (!base::PathService::Get(content::CHILD_PROCESS_EXE, &child_path)) {
  436. NOTREACHED() << "Unable to get child process binary name.";
  437. }
  438. SCOPED_CRASH_KEY_STRING256("ChildProcess", "child_process_exe",
  439. child_path.AsUTF8Unsafe());
  440. SCOPED_CRASH_KEY_STRING256("ChildProcess", "program",
  441. program.AsUTF8Unsafe());
  442. CHECK_EQ(program, child_path);
  443. #endif
  444. }
  445. std::string process_type =
  446. command_line->GetSwitchValueASCII(::switches::kProcessType);
  447. #if BUILDFLAG(IS_LINUX)
  448. pid_t pid;
  449. if (crash_reporter::GetHandlerSocket(nullptr, &pid)) {
  450. command_line->AppendSwitchASCII(
  451. crash_reporter::switches::kCrashpadHandlerPid,
  452. base::NumberToString(pid));
  453. }
  454. // Zygote Process gets booted before any JS runs, accessing GetClientId
  455. // will end up touching DIR_USER_DATA path provider and this will
  456. // configure default value because app.name from browser_init has
  457. // not run yet.
  458. if (process_type != ::switches::kZygoteProcess) {
  459. std::string switch_value =
  460. api::crash_reporter::GetClientId() + ",no_channel";
  461. command_line->AppendSwitchASCII(::switches::kEnableCrashReporter,
  462. switch_value);
  463. }
  464. #endif
  465. // The zygote process is booted before JS runs, so DIR_USER_DATA isn't usable
  466. // at that time. It doesn't need --user-data-dir to be correct anyway, since
  467. // the zygote itself doesn't access anything in that directory.
  468. if (process_type != ::switches::kZygoteProcess) {
  469. base::FilePath user_data_dir;
  470. if (base::PathService::Get(chrome::DIR_USER_DATA, &user_data_dir))
  471. command_line->AppendSwitchPath(::switches::kUserDataDir, user_data_dir);
  472. }
  473. if (process_type == ::switches::kUtilityProcess ||
  474. process_type == ::switches::kRendererProcess) {
  475. // Copy following switches to child process.
  476. static constexpr std::array<const char*, 9U> kCommonSwitchNames = {
  477. switches::kStandardSchemes.c_str(),
  478. switches::kEnableSandbox.c_str(),
  479. switches::kSecureSchemes.c_str(),
  480. switches::kBypassCSPSchemes.c_str(),
  481. switches::kCORSSchemes.c_str(),
  482. switches::kFetchSchemes.c_str(),
  483. switches::kServiceWorkerSchemes.c_str(),
  484. switches::kStreamingSchemes.c_str(),
  485. switches::kCodeCacheSchemes.c_str()};
  486. command_line->CopySwitchesFrom(*base::CommandLine::ForCurrentProcess(),
  487. kCommonSwitchNames);
  488. if (process_type == ::switches::kUtilityProcess ||
  489. content::RenderProcessHost::FromID(process_id)) {
  490. MaybeAppendSecureOriginsAllowlistSwitch(command_line);
  491. }
  492. }
  493. if (process_type == ::switches::kRendererProcess) {
  494. #if BUILDFLAG(IS_WIN)
  495. // Append --app-user-model-id.
  496. PWSTR current_app_id;
  497. if (SUCCEEDED(GetCurrentProcessExplicitAppUserModelID(&current_app_id))) {
  498. command_line->AppendSwitchNative(switches::kAppUserModelId,
  499. current_app_id);
  500. CoTaskMemFree(current_app_id);
  501. }
  502. #endif
  503. if (delegate_) {
  504. auto app_path = static_cast<api::App*>(delegate_)->GetAppPath();
  505. command_line->AppendSwitchPath(switches::kAppPath, app_path);
  506. }
  507. auto env = base::Environment::Create();
  508. if (env->HasVar("ELECTRON_PROFILE_INIT_SCRIPTS")) {
  509. command_line->AppendSwitch("profile-electron-init");
  510. }
  511. content::ChildProcessId unsafe_process_id =
  512. content::ChildProcessId::FromUnsafeValue(process_id);
  513. content::WebContents* web_contents =
  514. GetWebContentsFromProcessID(unsafe_process_id);
  515. if (web_contents) {
  516. auto* web_preferences = WebContentsPreferences::From(web_contents);
  517. if (web_preferences)
  518. web_preferences->AppendCommandLineSwitches(
  519. command_line, IsRendererSubFrame(unsafe_process_id));
  520. }
  521. // Service worker processes should only run preloads if one has been
  522. // registered prior to startup.
  523. auto* render_process_host = content::RenderProcessHost::FromID(process_id);
  524. if (render_process_host) {
  525. auto* browser_context = render_process_host->GetBrowserContext();
  526. auto* session_prefs =
  527. SessionPreferences::FromBrowserContext(browser_context);
  528. if (session_prefs->HasServiceWorkerPreloadScript()) {
  529. command_line->AppendSwitch(switches::kServiceWorkerPreload);
  530. }
  531. }
  532. }
  533. }
  534. // attempt to get api key from env
  535. std::string ElectronBrowserClient::GetGeolocationApiKey() {
  536. auto env = base::Environment::Create();
  537. std::string api_key;
  538. env->GetVar("GOOGLE_API_KEY", &api_key);
  539. return api_key;
  540. }
  541. content::GeneratedCodeCacheSettings
  542. ElectronBrowserClient::GetGeneratedCodeCacheSettings(
  543. content::BrowserContext* context) {
  544. // TODO(deepak1556): Use platform cache directory.
  545. base::FilePath cache_path = context->GetPath();
  546. // If we pass 0 for size, disk_cache will pick a default size using the
  547. // heuristics based on available disk size. These are implemented in
  548. // disk_cache::PreferredCacheSize in net/disk_cache/cache_util.cc.
  549. return {true, 0, cache_path};
  550. }
  551. void ElectronBrowserClient::AllowCertificateError(
  552. content::WebContents* web_contents,
  553. int cert_error,
  554. const net::SSLInfo& ssl_info,
  555. const GURL& request_url,
  556. bool is_main_frame_request,
  557. bool strict_enforcement,
  558. base::OnceCallback<void(content::CertificateRequestResultType)> callback) {
  559. if (delegate_) {
  560. delegate_->AllowCertificateError(web_contents, cert_error, ssl_info,
  561. request_url, is_main_frame_request,
  562. strict_enforcement, std::move(callback));
  563. }
  564. }
  565. base::OnceClosure ElectronBrowserClient::SelectClientCertificate(
  566. content::BrowserContext* browser_context,
  567. int process_id,
  568. content::WebContents* web_contents,
  569. net::SSLCertRequestInfo* cert_request_info,
  570. net::ClientCertIdentityList client_certs,
  571. std::unique_ptr<content::ClientCertificateDelegate> delegate) {
  572. if (client_certs.empty()) {
  573. delegate->ContinueWithCertificate(nullptr, nullptr);
  574. } else if (delegate_) {
  575. delegate_->SelectClientCertificate(
  576. browser_context, process_id, web_contents, cert_request_info,
  577. std::move(client_certs), std::move(delegate));
  578. }
  579. return {};
  580. }
  581. bool ElectronBrowserClient::CanCreateWindow(
  582. content::RenderFrameHost* opener,
  583. const GURL& opener_url,
  584. const GURL& opener_top_level_frame_url,
  585. const url::Origin& source_origin,
  586. content::mojom::WindowContainerType container_type,
  587. const GURL& target_url,
  588. const content::Referrer& referrer,
  589. const std::string& frame_name,
  590. WindowOpenDisposition disposition,
  591. const blink::mojom::WindowFeatures& features,
  592. const std::string& raw_features,
  593. const scoped_refptr<network::ResourceRequestBody>& body,
  594. bool user_gesture,
  595. bool opener_suppressed,
  596. bool* no_javascript_access) {
  597. DCHECK_CURRENTLY_ON(BrowserThread::UI);
  598. content::WebContents* web_contents =
  599. content::WebContents::FromRenderFrameHost(opener);
  600. WebContentsPreferences* prefs = WebContentsPreferences::From(web_contents);
  601. if (prefs) {
  602. if (prefs->ShouldDisablePopups()) {
  603. // <webview> without allowpopups attribute should return
  604. // null from window.open calls
  605. return false;
  606. } else {
  607. *no_javascript_access = false;
  608. return true;
  609. }
  610. }
  611. if (delegate_) {
  612. return delegate_->CanCreateWindow(
  613. opener, opener_url, opener_top_level_frame_url, source_origin,
  614. container_type, target_url, referrer, frame_name, disposition, features,
  615. raw_features, body, user_gesture, opener_suppressed,
  616. no_javascript_access);
  617. }
  618. return false;
  619. }
  620. std::unique_ptr<content::VideoOverlayWindow>
  621. ElectronBrowserClient::CreateWindowForVideoPictureInPicture(
  622. content::VideoPictureInPictureWindowController* controller) {
  623. auto overlay_window = content::VideoOverlayWindow::Create(controller);
  624. #if BUILDFLAG(IS_WIN)
  625. std::wstring app_user_model_id = Browser::Get()->GetAppUserModelID();
  626. if (!app_user_model_id.empty()) {
  627. auto* overlay_window_view =
  628. static_cast<VideoOverlayWindowViews*>(overlay_window.get());
  629. ui::win::SetAppIdForWindow(app_user_model_id,
  630. overlay_window_view->GetNativeWindow()
  631. ->GetHost()
  632. ->GetAcceleratedWidget());
  633. }
  634. #endif
  635. return overlay_window;
  636. }
  637. void ElectronBrowserClient::GetAdditionalAllowedSchemesForFileSystem(
  638. std::vector<std::string>* additional_schemes) {
  639. const auto& schemes_list = api::GetStandardSchemes();
  640. if (!schemes_list.empty())
  641. additional_schemes->insert(additional_schemes->end(), schemes_list.begin(),
  642. schemes_list.end());
  643. additional_schemes->push_back(content::kChromeDevToolsScheme);
  644. additional_schemes->push_back(content::kChromeUIScheme);
  645. }
  646. void ElectronBrowserClient::GetAdditionalWebUISchemes(
  647. std::vector<std::string>* additional_schemes) {
  648. additional_schemes->push_back(content::kChromeDevToolsScheme);
  649. }
  650. void ElectronBrowserClient::SiteInstanceGotProcessAndSite(
  651. content::SiteInstance* site_instance) {
  652. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  653. auto* browser_context =
  654. static_cast<ElectronBrowserContext*>(site_instance->GetBrowserContext());
  655. if (!browser_context->IsOffTheRecord()) {
  656. extensions::ExtensionRegistry* registry =
  657. extensions::ExtensionRegistry::Get(browser_context);
  658. const extensions::Extension* extension =
  659. registry->enabled_extensions().GetExtensionOrAppByURL(
  660. site_instance->GetSiteURL());
  661. if (!extension)
  662. return;
  663. extensions::ProcessMap::Get(browser_context)
  664. ->Insert(extension->id(),
  665. site_instance->GetProcess()->GetDeprecatedID());
  666. }
  667. #endif // BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  668. }
  669. bool ElectronBrowserClient::IsSuitableHost(
  670. content::RenderProcessHost* process_host,
  671. const GURL& site_url) {
  672. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  673. auto* browser_context = process_host->GetBrowserContext();
  674. extensions::ProcessMap* process_map =
  675. extensions::ProcessMap::Get(browser_context);
  676. // Otherwise, just make sure the process privilege matches the privilege
  677. // required by the site.
  678. const auto privilege_required = GetPrivilegeRequiredByUrl(site_url);
  679. return GetProcessPrivilege(process_host, process_map) == privilege_required;
  680. #else
  681. return content::ContentBrowserClient::IsSuitableHost(process_host, site_url);
  682. #endif
  683. }
  684. bool ElectronBrowserClient::ShouldUseProcessPerSite(
  685. content::BrowserContext* browser_context,
  686. const GURL& effective_url) {
  687. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  688. const extensions::Extension* extension =
  689. GetEnabledExtensionFromEffectiveURL(browser_context, effective_url);
  690. return extension != nullptr;
  691. #else
  692. return content::ContentBrowserClient::ShouldUseProcessPerSite(browser_context,
  693. effective_url);
  694. #endif
  695. }
  696. void ElectronBrowserClient::GetMediaDeviceIDSalt(
  697. content::RenderFrameHost* rfh,
  698. const net::SiteForCookies& site_for_cookies,
  699. const blink::StorageKey& storage_key,
  700. base::OnceCallback<void(bool, const std::string&)> callback) {
  701. constexpr bool persistent_media_device_id_allowed = true;
  702. std::string persistent_media_device_id_salt =
  703. static_cast<ElectronBrowserContext*>(rfh->GetBrowserContext())
  704. ->GetMediaDeviceIDSalt();
  705. std::move(callback).Run(persistent_media_device_id_allowed,
  706. persistent_media_device_id_salt);
  707. }
  708. base::FilePath ElectronBrowserClient::GetLoggingFileName(
  709. const base::CommandLine& cmd_line) {
  710. return logging::GetLogFileName(cmd_line);
  711. }
  712. std::unique_ptr<net::ClientCertStore>
  713. ElectronBrowserClient::CreateClientCertStore(
  714. content::BrowserContext* browser_context) {
  715. #if BUILDFLAG(USE_NSS_CERTS)
  716. return std::make_unique<net::ClientCertStoreNSS>(
  717. base::BindRepeating([](const net::HostPortPair& server) {
  718. crypto::CryptoModuleBlockingPasswordDelegate* delegate =
  719. new ElectronNSSCryptoModuleDelegate(server);
  720. return delegate;
  721. }));
  722. #elif BUILDFLAG(IS_WIN)
  723. return std::make_unique<net::ClientCertStoreWin>();
  724. #elif BUILDFLAG(IS_MAC)
  725. return std::make_unique<net::ClientCertStoreMac>();
  726. #elif defined(USE_OPENSSL)
  727. return ();
  728. #endif
  729. }
  730. std::unique_ptr<device::LocationProvider>
  731. ElectronBrowserClient::OverrideSystemLocationProvider() {
  732. #if BUILDFLAG(OVERRIDE_LOCATION_PROVIDER)
  733. return std::make_unique<FakeLocationProvider>();
  734. #else
  735. return {};
  736. #endif
  737. }
  738. void ElectronBrowserClient::ConfigureNetworkContextParams(
  739. content::BrowserContext* browser_context,
  740. bool in_memory,
  741. const base::FilePath& relative_partition_path,
  742. network::mojom::NetworkContextParams* network_context_params,
  743. cert_verifier::mojom::CertVerifierCreationParams*
  744. cert_verifier_creation_params) {
  745. DCHECK(browser_context);
  746. return NetworkContextServiceFactory::GetForContext(browser_context)
  747. ->ConfigureNetworkContextParams(network_context_params,
  748. cert_verifier_creation_params);
  749. }
  750. network::mojom::NetworkContext*
  751. ElectronBrowserClient::GetSystemNetworkContext() {
  752. DCHECK_CURRENTLY_ON(BrowserThread::UI);
  753. DCHECK(g_browser_process->system_network_context_manager());
  754. return g_browser_process->system_network_context_manager()->GetContext();
  755. }
  756. std::unique_ptr<content::BrowserMainParts>
  757. ElectronBrowserClient::CreateBrowserMainParts(bool /* is_integration_test */) {
  758. return std::make_unique<ElectronBrowserMainParts>();
  759. }
  760. void ElectronBrowserClient::WebNotificationAllowed(
  761. content::RenderFrameHost* rfh,
  762. base::OnceCallback<void(bool, bool)> callback) {
  763. content::WebContents* web_contents =
  764. content::WebContents::FromRenderFrameHost(rfh);
  765. if (!web_contents) {
  766. std::move(callback).Run(false, false);
  767. return;
  768. }
  769. auto* permission_helper =
  770. WebContentsPermissionHelper::FromWebContents(web_contents);
  771. if (!permission_helper) {
  772. std::move(callback).Run(false, false);
  773. return;
  774. }
  775. permission_helper->RequestWebNotificationPermission(
  776. rfh, base::BindOnce(std::move(callback), web_contents->IsAudioMuted()));
  777. }
  778. void ElectronBrowserClient::RenderProcessHostDestroyed(
  779. content::RenderProcessHost* host) {
  780. content::ChildProcessId process_id = host->GetID();
  781. pending_processes_.erase(process_id);
  782. renderer_is_subframe_.erase(process_id);
  783. host->RemoveObserver(this);
  784. }
  785. void ElectronBrowserClient::RenderProcessReady(
  786. content::RenderProcessHost* host) {
  787. if (delegate_) {
  788. static_cast<api::App*>(delegate_)->RenderProcessReady(host);
  789. }
  790. }
  791. void ElectronBrowserClient::RenderProcessExited(
  792. content::RenderProcessHost* host,
  793. const content::ChildProcessTerminationInfo& info) {
  794. if (delegate_) {
  795. static_cast<api::App*>(delegate_)->RenderProcessExited(host);
  796. }
  797. }
  798. namespace {
  799. void OnOpenExternal(const GURL& escaped_url, bool allowed) {
  800. if (allowed) {
  801. platform_util::OpenExternal(
  802. escaped_url, platform_util::OpenExternalOptions(), base::DoNothing());
  803. }
  804. }
  805. void HandleExternalProtocolInUI(
  806. const GURL& url,
  807. content::WeakDocumentPtr document_ptr,
  808. content::WebContents::OnceGetter web_contents_getter,
  809. bool has_user_gesture) {
  810. content::WebContents* web_contents = std::move(web_contents_getter).Run();
  811. if (!web_contents)
  812. return;
  813. auto* permission_helper =
  814. WebContentsPermissionHelper::FromWebContents(web_contents);
  815. if (!permission_helper)
  816. return;
  817. content::RenderFrameHost* rfh = document_ptr.AsRenderFrameHostIfValid();
  818. if (!rfh) {
  819. // If the render frame host is not valid it means it was a top level
  820. // navigation and the frame has already been disposed of. In this case we
  821. // take the current main frame and declare it responsible for the
  822. // transition.
  823. rfh = web_contents->GetPrimaryMainFrame();
  824. }
  825. GURL escaped_url(base::EscapeExternalHandlerValue(url.spec()));
  826. auto callback = base::BindOnce(&OnOpenExternal, escaped_url);
  827. permission_helper->RequestOpenExternalPermission(rfh, std::move(callback),
  828. has_user_gesture, url);
  829. }
  830. } // namespace
  831. bool ElectronBrowserClient::HandleExternalProtocol(
  832. const GURL& url,
  833. content::WebContents::Getter web_contents_getter,
  834. content::FrameTreeNodeId frame_tree_node_id,
  835. content::NavigationUIData* navigation_data,
  836. bool is_primary_main_frame,
  837. bool is_in_fenced_frame_tree,
  838. network::mojom::WebSandboxFlags sandbox_flags,
  839. ui::PageTransition page_transition,
  840. bool has_user_gesture,
  841. const std::optional<url::Origin>& initiating_origin,
  842. content::RenderFrameHost* initiator_document,
  843. const net::IsolationInfo& isolation_info,
  844. mojo::PendingRemote<network::mojom::URLLoaderFactory>* out_factory) {
  845. content::GetUIThreadTaskRunner({})->PostTask(
  846. FROM_HERE,
  847. base::BindOnce(&HandleExternalProtocolInUI, url,
  848. initiator_document
  849. ? initiator_document->GetWeakDocumentPtr()
  850. : content::WeakDocumentPtr(),
  851. std::move(web_contents_getter), has_user_gesture));
  852. return true;
  853. }
  854. std::vector<std::unique_ptr<content::NavigationThrottle>>
  855. ElectronBrowserClient::CreateThrottlesForNavigation(
  856. content::NavigationHandle* handle) {
  857. std::vector<std::unique_ptr<content::NavigationThrottle>> throttles;
  858. throttles.push_back(std::make_unique<ElectronNavigationThrottle>(handle));
  859. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  860. throttles.push_back(
  861. std::make_unique<extensions::ExtensionNavigationThrottle>(handle));
  862. #endif
  863. #if BUILDFLAG(ENABLE_PDF_VIEWER)
  864. throttles.push_back(std::make_unique<PDFIFrameNavigationThrottle>(handle));
  865. throttles.push_back(std::make_unique<pdf::PdfNavigationThrottle>(
  866. handle, std::make_unique<ChromePdfStreamDelegate>()));
  867. #endif
  868. return throttles;
  869. }
  870. content::MediaObserver* ElectronBrowserClient::GetMediaObserver() {
  871. return MediaCaptureDevicesDispatcher::GetInstance();
  872. }
  873. std::unique_ptr<content::DevToolsManagerDelegate>
  874. ElectronBrowserClient::CreateDevToolsManagerDelegate() {
  875. return std::make_unique<DevToolsManagerDelegate>();
  876. }
  877. NotificationPresenter* ElectronBrowserClient::GetNotificationPresenter() {
  878. if (!notification_presenter_)
  879. notification_presenter_ = NotificationPresenter::Create();
  880. return notification_presenter_.get();
  881. }
  882. content::PlatformNotificationService*
  883. ElectronBrowserClient::GetPlatformNotificationService() {
  884. if (!notification_service_) {
  885. notification_service_ = std::make_unique<PlatformNotificationService>(this);
  886. }
  887. return notification_service_.get();
  888. }
  889. base::FilePath ElectronBrowserClient::GetDefaultDownloadDirectory() {
  890. base::FilePath download_path;
  891. if (base::PathService::Get(chrome::DIR_DEFAULT_DOWNLOADS, &download_path))
  892. return download_path;
  893. return {};
  894. }
  895. scoped_refptr<network::SharedURLLoaderFactory>
  896. ElectronBrowserClient::GetSystemSharedURLLoaderFactory() {
  897. if (!g_browser_process)
  898. return nullptr;
  899. return g_browser_process->shared_url_loader_factory();
  900. }
  901. void ElectronBrowserClient::OnNetworkServiceCreated(
  902. network::mojom::NetworkService* network_service) {
  903. if (!g_browser_process)
  904. return;
  905. g_browser_process->system_network_context_manager()->OnNetworkServiceCreated(
  906. network_service);
  907. }
  908. std::vector<base::FilePath>
  909. ElectronBrowserClient::GetNetworkContextsParentDirectory() {
  910. base::FilePath session_data;
  911. base::PathService::Get(DIR_SESSION_DATA, &session_data);
  912. DCHECK(!session_data.empty());
  913. return {session_data};
  914. }
  915. std::string ElectronBrowserClient::GetProduct() {
  916. return "Chrome/" CHROME_VERSION_STRING;
  917. }
  918. std::string ElectronBrowserClient::GetUserAgent() {
  919. if (user_agent_override_.empty())
  920. return GetApplicationUserAgent();
  921. return user_agent_override_;
  922. }
  923. void ElectronBrowserClient::SetUserAgent(const std::string& user_agent) {
  924. user_agent_override_ = user_agent;
  925. }
  926. blink::UserAgentMetadata ElectronBrowserClient::GetUserAgentMetadata() {
  927. return embedder_support::GetUserAgentMetadata();
  928. }
  929. mojo::PendingRemote<network::mojom::URLLoaderFactory>
  930. ElectronBrowserClient::CreateNonNetworkNavigationURLLoaderFactory(
  931. const std::string& scheme,
  932. content::FrameTreeNodeId frame_tree_node_id) {
  933. content::WebContents* web_contents =
  934. content::WebContents::FromFrameTreeNodeId(frame_tree_node_id);
  935. content::BrowserContext* context = web_contents->GetBrowserContext();
  936. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  937. if (scheme == extensions::kExtensionScheme) {
  938. return extensions::CreateExtensionNavigationURLLoaderFactory(
  939. context, false /* we don't support extensions::WebViewGuest */);
  940. }
  941. #endif
  942. // Always allow navigating to file:// URLs.
  943. auto* protocol_registry = ProtocolRegistry::FromBrowserContext(context);
  944. return protocol_registry->CreateNonNetworkNavigationURLLoaderFactory(scheme);
  945. }
  946. void ElectronBrowserClient::
  947. RegisterNonNetworkWorkerMainResourceURLLoaderFactories(
  948. content::BrowserContext* browser_context,
  949. NonNetworkURLLoaderFactoryMap* factories) {
  950. auto* protocol_registry =
  951. ProtocolRegistry::FromBrowserContext(browser_context);
  952. // Workers are not allowed to request file:// URLs, there is no particular
  953. // reason for it, and we could consider supporting it in future.
  954. protocol_registry->RegisterURLLoaderFactories(factories,
  955. false /* allow_file_access */);
  956. }
  957. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  958. namespace {
  959. // The FileURLLoaderFactory provided to the extension background pages.
  960. // Checks with the ChildProcessSecurityPolicy to validate the file access.
  961. class FileURLLoaderFactory : public network::SelfDeletingURLLoaderFactory {
  962. public:
  963. static mojo::PendingRemote<network::mojom::URLLoaderFactory> Create(
  964. int child_id) {
  965. mojo::PendingRemote<network::mojom::URLLoaderFactory> pending_remote;
  966. // The FileURLLoaderFactory will delete itself when there are no more
  967. // receivers - see the SelfDeletingURLLoaderFactory::OnDisconnect method.
  968. new FileURLLoaderFactory(child_id,
  969. pending_remote.InitWithNewPipeAndPassReceiver());
  970. return pending_remote;
  971. }
  972. // disable copy
  973. FileURLLoaderFactory(const FileURLLoaderFactory&) = delete;
  974. FileURLLoaderFactory& operator=(const FileURLLoaderFactory&) = delete;
  975. private:
  976. explicit FileURLLoaderFactory(
  977. int child_id,
  978. mojo::PendingReceiver<network::mojom::URLLoaderFactory> factory_receiver)
  979. : network::SelfDeletingURLLoaderFactory(std::move(factory_receiver)),
  980. child_id_(child_id) {}
  981. ~FileURLLoaderFactory() override = default;
  982. // network::mojom::URLLoaderFactory:
  983. void CreateLoaderAndStart(
  984. mojo::PendingReceiver<network::mojom::URLLoader> loader,
  985. int32_t request_id,
  986. uint32_t options,
  987. const network::ResourceRequest& request,
  988. mojo::PendingRemote<network::mojom::URLLoaderClient> client,
  989. const net::MutableNetworkTrafficAnnotationTag& traffic_annotation)
  990. override {
  991. if (!content::ChildProcessSecurityPolicy::GetInstance()->CanRequestURL(
  992. child_id_, request.url)) {
  993. mojo::Remote<network::mojom::URLLoaderClient>(std::move(client))
  994. ->OnComplete(
  995. network::URLLoaderCompletionStatus(net::ERR_ACCESS_DENIED));
  996. return;
  997. }
  998. content::CreateFileURLLoaderBypassingSecurityChecks(
  999. request, std::move(loader), std::move(client),
  1000. /*observer=*/nullptr,
  1001. /* allow_directory_listing */ true);
  1002. }
  1003. int child_id_;
  1004. };
  1005. } // namespace
  1006. #endif // BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  1007. void ElectronBrowserClient::RegisterNonNetworkSubresourceURLLoaderFactories(
  1008. int render_process_id,
  1009. int render_frame_id,
  1010. const std::optional<url::Origin>& request_initiator_origin,
  1011. NonNetworkURLLoaderFactoryMap* factories) {
  1012. auto* render_process_host =
  1013. content::RenderProcessHost::FromID(render_process_id);
  1014. DCHECK(render_process_host);
  1015. if (!render_process_host || !render_process_host->GetBrowserContext())
  1016. return;
  1017. content::RenderFrameHost* frame_host =
  1018. content::RenderFrameHost::FromID(render_process_id, render_frame_id);
  1019. content::WebContents* web_contents =
  1020. content::WebContents::FromRenderFrameHost(frame_host);
  1021. // Allow accessing file:// subresources from non-file protocols if web
  1022. // security is disabled.
  1023. bool allow_file_access = false;
  1024. if (web_contents) {
  1025. const auto& web_preferences = web_contents->GetOrCreateWebPreferences();
  1026. if (!web_preferences.web_security_enabled)
  1027. allow_file_access = true;
  1028. }
  1029. ProtocolRegistry::FromBrowserContext(render_process_host->GetBrowserContext())
  1030. ->RegisterURLLoaderFactories(factories, allow_file_access);
  1031. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  1032. auto factory = extensions::CreateExtensionURLLoaderFactory(render_process_id,
  1033. render_frame_id);
  1034. if (factory)
  1035. factories->emplace(extensions::kExtensionScheme, std::move(factory));
  1036. if (!web_contents)
  1037. return;
  1038. extensions::ElectronExtensionWebContentsObserver* web_observer =
  1039. extensions::ElectronExtensionWebContentsObserver::FromWebContents(
  1040. web_contents);
  1041. // There is nothing to do if no ElectronExtensionWebContentsObserver is
  1042. // attached to the |web_contents|.
  1043. if (!web_observer)
  1044. return;
  1045. const extensions::Extension* extension =
  1046. web_observer->GetExtensionFromFrame(frame_host, false);
  1047. if (!extension)
  1048. return;
  1049. // Support for chrome:// scheme if appropriate.
  1050. if (extension->is_extension() &&
  1051. extensions::Manifest::IsComponentLocation(extension->location())) {
  1052. // Components of chrome that are implemented as extensions or platform apps
  1053. // are allowed to use chrome://resources/ and chrome://theme/ URLs.
  1054. factories->emplace(content::kChromeUIScheme,
  1055. content::CreateWebUIURLLoaderFactory(
  1056. frame_host, content::kChromeUIScheme,
  1057. {content::kChromeUIResourcesHost}));
  1058. }
  1059. // Extensions with the necessary permissions get access to file:// URLs that
  1060. // gets approval from ChildProcessSecurityPolicy. Keep this logic in sync with
  1061. // ExtensionWebContentsObserver::RenderFrameCreated.
  1062. extensions::Manifest::Type type = extension->GetType();
  1063. if (type == extensions::Manifest::TYPE_EXTENSION &&
  1064. AllowFileAccess(extension->id(), web_contents->GetBrowserContext())) {
  1065. factories->emplace(url::kFileScheme,
  1066. FileURLLoaderFactory::Create(render_process_id));
  1067. }
  1068. #endif
  1069. }
  1070. void ElectronBrowserClient::
  1071. RegisterNonNetworkServiceWorkerUpdateURLLoaderFactories(
  1072. content::BrowserContext* browser_context,
  1073. NonNetworkURLLoaderFactoryMap* factories) {
  1074. DCHECK(browser_context);
  1075. DCHECK(factories);
  1076. auto* protocol_registry =
  1077. ProtocolRegistry::FromBrowserContext(browser_context);
  1078. protocol_registry->RegisterURLLoaderFactories(factories,
  1079. false /* allow_file_access */);
  1080. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  1081. factories->emplace(
  1082. extensions::kExtensionScheme,
  1083. extensions::CreateExtensionServiceWorkerScriptURLLoaderFactory(
  1084. browser_context));
  1085. #endif // BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  1086. }
  1087. bool ElectronBrowserClient::ShouldTreatURLSchemeAsFirstPartyWhenTopLevel(
  1088. std::string_view scheme,
  1089. bool is_embedded_origin_secure) {
  1090. if (is_embedded_origin_secure && scheme == content::kChromeUIScheme)
  1091. return true;
  1092. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  1093. return scheme == extensions::kExtensionScheme;
  1094. #else
  1095. return false;
  1096. #endif
  1097. }
  1098. bool ElectronBrowserClient::WillInterceptWebSocket(
  1099. content::RenderFrameHost* frame) {
  1100. if (!frame)
  1101. return false;
  1102. v8::Isolate* isolate = JavascriptEnvironment::GetIsolate();
  1103. v8::HandleScope scope(isolate);
  1104. auto* browser_context = frame->GetProcess()->GetBrowserContext();
  1105. auto web_request = api::WebRequest::FromOrCreate(isolate, browser_context);
  1106. // NOTE: Some unit test environments do not initialize
  1107. // BrowserContextKeyedAPI factories for e.g. WebRequest.
  1108. if (!web_request.get())
  1109. return false;
  1110. bool has_listener = web_request->HasListener();
  1111. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  1112. const auto* web_request_api =
  1113. extensions::BrowserContextKeyedAPIFactory<extensions::WebRequestAPI>::Get(
  1114. browser_context);
  1115. if (web_request_api)
  1116. has_listener |= web_request_api->MayHaveProxies();
  1117. #endif
  1118. return has_listener;
  1119. }
  1120. void ElectronBrowserClient::CreateWebSocket(
  1121. content::RenderFrameHost* frame,
  1122. WebSocketFactory factory,
  1123. const GURL& url,
  1124. const net::SiteForCookies& site_for_cookies,
  1125. const std::optional<std::string>& user_agent,
  1126. mojo::PendingRemote<network::mojom::WebSocketHandshakeClient>
  1127. handshake_client) {
  1128. v8::Isolate* isolate = JavascriptEnvironment::GetIsolate();
  1129. v8::HandleScope scope(isolate);
  1130. auto* browser_context = frame->GetProcess()->GetBrowserContext();
  1131. auto web_request = api::WebRequest::FromOrCreate(isolate, browser_context);
  1132. DCHECK(web_request.get());
  1133. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  1134. if (!web_request->HasListener()) {
  1135. auto* web_request_api = extensions::BrowserContextKeyedAPIFactory<
  1136. extensions::WebRequestAPI>::Get(browser_context);
  1137. if (web_request_api && web_request_api->MayHaveProxies()) {
  1138. web_request_api->ProxyWebSocket(frame, std::move(factory), url,
  1139. site_for_cookies, user_agent,
  1140. std::move(handshake_client));
  1141. return;
  1142. }
  1143. }
  1144. #endif
  1145. ProxyingWebSocket::StartProxying(
  1146. web_request.get(), std::move(factory), url, site_for_cookies, user_agent,
  1147. std::move(handshake_client), true, frame->GetProcess()->GetDeprecatedID(),
  1148. frame->GetRoutingID(), frame->GetLastCommittedOrigin(), browser_context,
  1149. &next_id_);
  1150. }
  1151. void ElectronBrowserClient::WillCreateURLLoaderFactory(
  1152. content::BrowserContext* browser_context,
  1153. content::RenderFrameHost* frame_host,
  1154. int render_process_id,
  1155. URLLoaderFactoryType type,
  1156. const url::Origin& request_initiator,
  1157. const net::IsolationInfo& isolation_info,
  1158. std::optional<int64_t> navigation_id,
  1159. ukm::SourceIdObj ukm_source_id,
  1160. network::URLLoaderFactoryBuilder& factory_builder,
  1161. mojo::PendingRemote<network::mojom::TrustedURLLoaderHeaderClient>*
  1162. header_client,
  1163. bool* bypass_redirect_checks,
  1164. bool* disable_secure_dns,
  1165. network::mojom::URLLoaderFactoryOverridePtr* factory_override,
  1166. scoped_refptr<base::SequencedTaskRunner> navigation_response_task_runner) {
  1167. v8::Isolate* isolate = JavascriptEnvironment::GetIsolate();
  1168. v8::HandleScope scope(isolate);
  1169. auto web_request = api::WebRequest::FromOrCreate(isolate, browser_context);
  1170. DCHECK(web_request.get());
  1171. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  1172. if (!web_request->HasListener()) {
  1173. auto* web_request_api = extensions::BrowserContextKeyedAPIFactory<
  1174. extensions::WebRequestAPI>::Get(browser_context);
  1175. DCHECK(web_request_api);
  1176. bool used_proxy_for_web_request =
  1177. web_request_api->MaybeProxyURLLoaderFactory(
  1178. browser_context, frame_host, render_process_id, type, navigation_id,
  1179. ukm_source_id, factory_builder, header_client,
  1180. navigation_response_task_runner);
  1181. if (bypass_redirect_checks)
  1182. *bypass_redirect_checks = used_proxy_for_web_request;
  1183. if (used_proxy_for_web_request)
  1184. return;
  1185. }
  1186. #endif
  1187. auto [proxied_receiver, target_factory_remote] = factory_builder.Append();
  1188. // Required by WebRequestInfoInitParams.
  1189. //
  1190. // Note that in Electron we allow webRequest to capture requests sent from
  1191. // browser process, so creation of |navigation_ui_data| is different from
  1192. // Chromium which only does for renderer-initialized navigations.
  1193. std::unique_ptr<extensions::ExtensionNavigationUIData> navigation_ui_data;
  1194. if (navigation_id.has_value()) {
  1195. navigation_ui_data =
  1196. std::make_unique<extensions::ExtensionNavigationUIData>();
  1197. }
  1198. mojo::PendingReceiver<network::mojom::TrustedURLLoaderHeaderClient>
  1199. header_client_receiver;
  1200. if (header_client)
  1201. header_client_receiver = header_client->InitWithNewPipeAndPassReceiver();
  1202. auto* protocol_registry =
  1203. ProtocolRegistry::FromBrowserContext(browser_context);
  1204. new ProxyingURLLoaderFactory(
  1205. web_request.get(), protocol_registry->intercept_handlers(),
  1206. render_process_id,
  1207. frame_host ? frame_host->GetRoutingID() : MSG_ROUTING_NONE, &next_id_,
  1208. std::move(navigation_ui_data), std::move(navigation_id),
  1209. std::move(proxied_receiver), std::move(target_factory_remote),
  1210. std::move(header_client_receiver), type);
  1211. }
  1212. std::vector<std::unique_ptr<content::URLLoaderRequestInterceptor>>
  1213. ElectronBrowserClient::WillCreateURLLoaderRequestInterceptors(
  1214. content::NavigationUIData* navigation_ui_data,
  1215. content::FrameTreeNodeId frame_tree_node_id,
  1216. int64_t navigation_id,
  1217. bool force_no_https_upgrade,
  1218. scoped_refptr<base::SequencedTaskRunner> navigation_response_task_runner) {
  1219. std::vector<std::unique_ptr<content::URLLoaderRequestInterceptor>>
  1220. interceptors;
  1221. #if BUILDFLAG(ENABLE_PDF_VIEWER)
  1222. {
  1223. std::unique_ptr<content::URLLoaderRequestInterceptor> pdf_interceptor =
  1224. pdf::PdfURLLoaderRequestInterceptor::MaybeCreateInterceptor(
  1225. frame_tree_node_id, std::make_unique<ChromePdfStreamDelegate>());
  1226. if (pdf_interceptor)
  1227. interceptors.push_back(std::move(pdf_interceptor));
  1228. }
  1229. #endif
  1230. return interceptors;
  1231. }
  1232. void ElectronBrowserClient::OverrideURLLoaderFactoryParams(
  1233. content::BrowserContext* browser_context,
  1234. const url::Origin& origin,
  1235. bool is_for_isolated_world,
  1236. network::mojom::URLLoaderFactoryParams* factory_params) {
  1237. if (factory_params->top_frame_id) {
  1238. // Bypass CORB and CORS when web security is disabled.
  1239. auto* rfh = content::RenderFrameHost::FromFrameToken(
  1240. content::GlobalRenderFrameHostToken(
  1241. factory_params->process_id,
  1242. blink::LocalFrameToken(factory_params->top_frame_id.value())));
  1243. auto* web_contents = content::WebContents::FromRenderFrameHost(rfh);
  1244. auto* prefs = WebContentsPreferences::From(web_contents);
  1245. if (prefs && !prefs->IsWebSecurityEnabled()) {
  1246. factory_params->is_orb_enabled = false;
  1247. factory_params->disable_web_security = true;
  1248. }
  1249. }
  1250. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  1251. extensions::URLLoaderFactoryManager::OverrideURLLoaderFactoryParams(
  1252. browser_context, origin, is_for_isolated_world, factory_params);
  1253. #endif
  1254. }
  1255. void ElectronBrowserClient::RegisterAssociatedInterfaceBindersForServiceWorker(
  1256. const content::ServiceWorkerVersionBaseInfo& service_worker_version_info,
  1257. blink::AssociatedInterfaceRegistry& associated_registry) {
  1258. CHECK(service_worker_version_info.process_id !=
  1259. content::ChildProcessHost::kInvalidUniqueID);
  1260. associated_registry.AddInterface<mojom::ElectronApiIPC>(
  1261. base::BindRepeating(&ElectronApiSWIPCHandlerImpl::BindReceiver,
  1262. service_worker_version_info.process_id,
  1263. service_worker_version_info.version_id));
  1264. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  1265. associated_registry.AddInterface<extensions::mojom::RendererHost>(
  1266. base::BindRepeating(&extensions::RendererStartupHelper::BindForRenderer,
  1267. service_worker_version_info.process_id));
  1268. associated_registry.AddInterface<extensions::mojom::ServiceWorkerHost>(
  1269. base::BindRepeating(&extensions::ServiceWorkerHost::BindReceiver,
  1270. service_worker_version_info.process_id));
  1271. #endif
  1272. }
  1273. void ElectronBrowserClient::
  1274. RegisterAssociatedInterfaceBindersForRenderFrameHost(
  1275. content::RenderFrameHost&
  1276. render_frame_host, // NOLINT(runtime/references)
  1277. blink::AssociatedInterfaceRegistry&
  1278. associated_registry) { // NOLINT(runtime/references)
  1279. auto* contents =
  1280. content::WebContents::FromRenderFrameHost(&render_frame_host);
  1281. if (contents) {
  1282. auto* prefs = WebContentsPreferences::From(contents);
  1283. if (render_frame_host.GetFrameTreeNodeId() ==
  1284. contents->GetPrimaryMainFrame()->GetFrameTreeNodeId() ||
  1285. (prefs && prefs->AllowsNodeIntegrationInSubFrames())) {
  1286. associated_registry.AddInterface<mojom::ElectronApiIPC>(
  1287. base::BindRepeating(
  1288. [](content::RenderFrameHost* render_frame_host,
  1289. mojo::PendingAssociatedReceiver<mojom::ElectronApiIPC>
  1290. receiver) {
  1291. ElectronApiIPCHandlerImpl::Create(render_frame_host,
  1292. std::move(receiver));
  1293. },
  1294. &render_frame_host));
  1295. }
  1296. }
  1297. associated_registry.AddInterface<mojom::ElectronWebContentsUtility>(
  1298. base::BindRepeating(
  1299. [](content::RenderFrameHost* render_frame_host,
  1300. mojo::PendingAssociatedReceiver<mojom::ElectronWebContentsUtility>
  1301. receiver) {
  1302. ElectronWebContentsUtilityHandlerImpl::Create(render_frame_host,
  1303. std::move(receiver));
  1304. },
  1305. &render_frame_host));
  1306. associated_registry.AddInterface<mojom::ElectronAutofillDriver>(
  1307. base::BindRepeating(
  1308. [](content::RenderFrameHost* render_frame_host,
  1309. mojo::PendingAssociatedReceiver<mojom::ElectronAutofillDriver>
  1310. receiver) {
  1311. AutofillDriverFactory::BindAutofillDriver(std::move(receiver),
  1312. render_frame_host);
  1313. },
  1314. &render_frame_host));
  1315. #if BUILDFLAG(ENABLE_PLUGINS)
  1316. associated_registry.AddInterface<mojom::ElectronPluginInfoHost>(
  1317. base::BindRepeating(
  1318. [](content::RenderFrameHost* render_frame_host,
  1319. mojo::PendingAssociatedReceiver<mojom::ElectronPluginInfoHost>
  1320. receiver) {
  1321. mojo::MakeSelfOwnedAssociatedReceiver(
  1322. std::make_unique<ElectronPluginInfoHostImpl>(),
  1323. std::move(receiver));
  1324. },
  1325. &render_frame_host));
  1326. #endif
  1327. #if BUILDFLAG(ENABLE_PRINTING)
  1328. associated_registry.AddInterface<printing::mojom::PrintManagerHost>(
  1329. base::BindRepeating(
  1330. [](content::RenderFrameHost* render_frame_host,
  1331. mojo::PendingAssociatedReceiver<printing::mojom::PrintManagerHost>
  1332. receiver) {
  1333. PrintViewManagerElectron::BindPrintManagerHost(std::move(receiver),
  1334. render_frame_host);
  1335. },
  1336. &render_frame_host));
  1337. #endif
  1338. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  1339. int render_process_id = render_frame_host.GetProcess()->GetDeprecatedID();
  1340. associated_registry.AddInterface<extensions::mojom::EventRouter>(
  1341. base::BindRepeating(&extensions::EventRouter::BindForRenderer,
  1342. render_process_id));
  1343. associated_registry.AddInterface<extensions::mojom::RendererHost>(
  1344. base::BindRepeating(&extensions::RendererStartupHelper::BindForRenderer,
  1345. render_process_id));
  1346. associated_registry.AddInterface<extensions::mojom::LocalFrameHost>(
  1347. base::BindRepeating(
  1348. [](content::RenderFrameHost* render_frame_host,
  1349. mojo::PendingAssociatedReceiver<extensions::mojom::LocalFrameHost>
  1350. receiver) {
  1351. extensions::ExtensionWebContentsObserver::BindLocalFrameHost(
  1352. std::move(receiver), render_frame_host);
  1353. },
  1354. &render_frame_host));
  1355. associated_registry.AddInterface<guest_view::mojom::GuestViewHost>(
  1356. base::BindRepeating(&extensions::ExtensionsGuestView::CreateForComponents,
  1357. render_frame_host.GetGlobalId()));
  1358. associated_registry.AddInterface<extensions::mojom::GuestView>(
  1359. base::BindRepeating(&extensions::ExtensionsGuestView::CreateForExtensions,
  1360. render_frame_host.GetGlobalId()));
  1361. #endif
  1362. #if BUILDFLAG(ENABLE_PDF_VIEWER)
  1363. associated_registry.AddInterface<pdf::mojom::PdfHost>(base::BindRepeating(
  1364. [](content::RenderFrameHost* render_frame_host,
  1365. mojo::PendingAssociatedReceiver<pdf::mojom::PdfHost> receiver) {
  1366. pdf::PDFDocumentHelper::BindPdfHost(
  1367. std::move(receiver), render_frame_host,
  1368. std::make_unique<ElectronPDFDocumentHelperClient>());
  1369. },
  1370. &render_frame_host));
  1371. #endif
  1372. }
  1373. std::string ElectronBrowserClient::GetApplicationLocale() {
  1374. return BrowserThread::CurrentlyOn(BrowserThread::IO)
  1375. ? *g_io_thread_application_locale
  1376. : *g_application_locale;
  1377. }
  1378. bool ElectronBrowserClient::ShouldEnableStrictSiteIsolation() {
  1379. // Enable site isolation. It is off by default in Chromium <= 69.
  1380. return true;
  1381. }
  1382. void ElectronBrowserClient::BindHostReceiverForRenderer(
  1383. content::RenderProcessHost* render_process_host,
  1384. mojo::GenericPendingReceiver receiver) {
  1385. #if BUILDFLAG(ENABLE_BUILTIN_SPELLCHECKER)
  1386. if (auto host_receiver =
  1387. receiver.As<spellcheck::mojom::SpellCheckInitializationHost>()) {
  1388. SpellCheckInitializationHostImpl::Create(
  1389. render_process_host->GetDeprecatedID(), std::move(host_receiver));
  1390. return;
  1391. }
  1392. #endif
  1393. }
  1394. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  1395. namespace {
  1396. void BindMimeHandlerService(
  1397. content::RenderFrameHost* frame_host,
  1398. mojo::PendingReceiver<extensions::mime_handler::MimeHandlerService>
  1399. receiver) {
  1400. content::WebContents* contents =
  1401. content::WebContents::FromRenderFrameHost(frame_host);
  1402. auto* guest_view =
  1403. extensions::MimeHandlerViewGuest::FromWebContents(contents);
  1404. if (!guest_view)
  1405. return;
  1406. extensions::MimeHandlerServiceImpl::Create(guest_view->GetStreamWeakPtr(),
  1407. std::move(receiver));
  1408. }
  1409. void BindBeforeUnloadControl(
  1410. content::RenderFrameHost* frame_host,
  1411. mojo::PendingReceiver<extensions::mime_handler::BeforeUnloadControl>
  1412. receiver) {
  1413. auto* web_contents = content::WebContents::FromRenderFrameHost(frame_host);
  1414. if (!web_contents)
  1415. return;
  1416. auto* guest_view =
  1417. extensions::MimeHandlerViewGuest::FromWebContents(web_contents);
  1418. if (!guest_view)
  1419. return;
  1420. guest_view->FuseBeforeUnloadControl(std::move(receiver));
  1421. }
  1422. } // namespace
  1423. #endif
  1424. void ElectronBrowserClient::ExposeInterfacesToRenderer(
  1425. service_manager::BinderRegistry* registry,
  1426. blink::AssociatedInterfaceRegistry* associated_registry,
  1427. content::RenderProcessHost* render_process_host) {
  1428. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  1429. associated_registry->AddInterface<extensions::mojom::RendererHost>(
  1430. base::BindRepeating(&extensions::RendererStartupHelper::BindForRenderer,
  1431. render_process_host->GetDeprecatedID()));
  1432. #endif
  1433. }
  1434. void ElectronBrowserClient::RegisterBrowserInterfaceBindersForFrame(
  1435. content::RenderFrameHost* render_frame_host,
  1436. mojo::BinderMapWithContext<content::RenderFrameHost*>* map) {
  1437. map->Add<network_hints::mojom::NetworkHintsHandler>(
  1438. base::BindRepeating(&BindNetworkHintsHandler));
  1439. map->Add<blink::mojom::BadgeService>(
  1440. base::BindRepeating(&badging::BadgeManager::BindFrameReceiver));
  1441. map->Add<blink::mojom::KeyboardLockService>(base::BindRepeating(
  1442. &content::KeyboardLockServiceImpl::CreateMojoService));
  1443. #if BUILDFLAG(ENABLE_BUILTIN_SPELLCHECKER)
  1444. map->Add<spellcheck::mojom::SpellCheckHost>(base::BindRepeating(
  1445. [](content::RenderFrameHost* frame_host,
  1446. mojo::PendingReceiver<spellcheck::mojom::SpellCheckHost> receiver) {
  1447. SpellCheckHostChromeImpl::Create(
  1448. frame_host->GetProcess()->GetDeprecatedID(), std::move(receiver));
  1449. }));
  1450. #endif
  1451. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  1452. map->Add<extensions::mime_handler::MimeHandlerService>(
  1453. base::BindRepeating(&BindMimeHandlerService));
  1454. map->Add<extensions::mime_handler::BeforeUnloadControl>(
  1455. base::BindRepeating(&BindBeforeUnloadControl));
  1456. content::WebContents* web_contents =
  1457. content::WebContents::FromRenderFrameHost(render_frame_host);
  1458. if (!web_contents)
  1459. return;
  1460. const GURL& site = render_frame_host->GetSiteInstance()->GetSiteURL();
  1461. if (!site.SchemeIs(extensions::kExtensionScheme))
  1462. return;
  1463. content::BrowserContext* browser_context =
  1464. render_frame_host->GetProcess()->GetBrowserContext();
  1465. auto* extension = extensions::ExtensionRegistry::Get(browser_context)
  1466. ->enabled_extensions()
  1467. .GetByID(site.host());
  1468. if (!extension)
  1469. return;
  1470. extensions::ExtensionsBrowserClient::Get()
  1471. ->RegisterBrowserInterfaceBindersForFrame(map, render_frame_host,
  1472. extension);
  1473. #endif
  1474. }
  1475. #if BUILDFLAG(IS_LINUX)
  1476. void ElectronBrowserClient::GetAdditionalMappedFilesForChildProcess(
  1477. const base::CommandLine& command_line,
  1478. int child_process_id,
  1479. content::PosixFileDescriptorInfo* mappings) {
  1480. int crash_signal_fd = GetCrashSignalFD(command_line);
  1481. if (crash_signal_fd >= 0) {
  1482. mappings->Share(kCrashDumpSignal, crash_signal_fd);
  1483. }
  1484. }
  1485. #endif
  1486. std::unique_ptr<content::LoginDelegate>
  1487. ElectronBrowserClient::CreateLoginDelegate(
  1488. const net::AuthChallengeInfo& auth_info,
  1489. content::WebContents* web_contents,
  1490. content::BrowserContext* browser_context,
  1491. const content::GlobalRequestID& request_id,
  1492. bool is_request_for_primary_main_frame,
  1493. bool is_request_for_navigation,
  1494. const GURL& url,
  1495. scoped_refptr<net::HttpResponseHeaders> response_headers,
  1496. bool first_auth_attempt,
  1497. content::GuestPageHolder* guest_page_holder,
  1498. LoginAuthRequiredCallback auth_required_callback) {
  1499. return std::make_unique<LoginHandler>(
  1500. auth_info, web_contents, is_request_for_primary_main_frame,
  1501. is_request_for_navigation, base::kNullProcessId, url, response_headers,
  1502. first_auth_attempt, std::move(auth_required_callback));
  1503. }
  1504. std::vector<std::unique_ptr<blink::URLLoaderThrottle>>
  1505. ElectronBrowserClient::CreateURLLoaderThrottles(
  1506. const network::ResourceRequest& request,
  1507. content::BrowserContext* browser_context,
  1508. const base::RepeatingCallback<content::WebContents*()>& wc_getter,
  1509. content::NavigationUIData* navigation_ui_data,
  1510. content::FrameTreeNodeId frame_tree_node_id,
  1511. std::optional<int64_t> navigation_id) {
  1512. DCHECK_CURRENTLY_ON(BrowserThread::UI);
  1513. std::vector<std::unique_ptr<blink::URLLoaderThrottle>> result;
  1514. #if BUILDFLAG(ENABLE_PLUGINS) && BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  1515. result.push_back(std::make_unique<PluginResponseInterceptorURLLoaderThrottle>(
  1516. request.destination, frame_tree_node_id));
  1517. #endif
  1518. return result;
  1519. }
  1520. base::flat_set<std::string>
  1521. ElectronBrowserClient::GetPluginMimeTypesWithExternalHandlers(
  1522. content::BrowserContext* browser_context) {
  1523. base::flat_set<std::string> mime_types;
  1524. #if BUILDFLAG(ENABLE_PLUGINS) && BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  1525. auto map = PluginUtils::GetMimeTypeToExtensionIdMap(browser_context);
  1526. for (const auto& pair : map)
  1527. mime_types.insert(pair.first);
  1528. #endif
  1529. #if BUILDFLAG(ENABLE_PDF_VIEWER)
  1530. mime_types.insert(pdf::kInternalPluginMimeType);
  1531. #endif
  1532. return mime_types;
  1533. }
  1534. content::SerialDelegate* ElectronBrowserClient::GetSerialDelegate() {
  1535. if (!serial_delegate_)
  1536. serial_delegate_ = std::make_unique<ElectronSerialDelegate>();
  1537. return serial_delegate_.get();
  1538. }
  1539. content::BluetoothDelegate* ElectronBrowserClient::GetBluetoothDelegate() {
  1540. if (!bluetooth_delegate_)
  1541. bluetooth_delegate_ = std::make_unique<ElectronBluetoothDelegate>();
  1542. return bluetooth_delegate_.get();
  1543. }
  1544. content::UsbDelegate* ElectronBrowserClient::GetUsbDelegate() {
  1545. if (!usb_delegate_)
  1546. usb_delegate_ = std::make_unique<ElectronUsbDelegate>();
  1547. return usb_delegate_.get();
  1548. }
  1549. namespace {
  1550. void BindBadgeServiceForServiceWorker(
  1551. const content::ServiceWorkerVersionBaseInfo& info,
  1552. mojo::PendingReceiver<blink::mojom::BadgeService> receiver) {
  1553. DCHECK_CURRENTLY_ON(content::BrowserThread::UI);
  1554. content::RenderProcessHost* render_process_host =
  1555. content::RenderProcessHost::FromID(info.process_id);
  1556. if (!render_process_host)
  1557. return;
  1558. badging::BadgeManager::BindServiceWorkerReceiver(
  1559. render_process_host, info.scope, std::move(receiver));
  1560. }
  1561. } // namespace
  1562. void ElectronBrowserClient::RegisterBrowserInterfaceBindersForServiceWorker(
  1563. content::BrowserContext* browser_context,
  1564. const content::ServiceWorkerVersionBaseInfo& service_worker_version_info,
  1565. mojo::BinderMapWithContext<const content::ServiceWorkerVersionBaseInfo&>*
  1566. map) {
  1567. map->Add<blink::mojom::BadgeService>(
  1568. base::BindRepeating(&BindBadgeServiceForServiceWorker));
  1569. }
  1570. #if BUILDFLAG(IS_MAC)
  1571. device::GeolocationSystemPermissionManager*
  1572. ElectronBrowserClient::GetGeolocationSystemPermissionManager() {
  1573. return device::GeolocationSystemPermissionManager::GetInstance();
  1574. }
  1575. #endif
  1576. content::HidDelegate* ElectronBrowserClient::GetHidDelegate() {
  1577. if (!hid_delegate_)
  1578. hid_delegate_ = std::make_unique<ElectronHidDelegate>();
  1579. return hid_delegate_.get();
  1580. }
  1581. content::WebAuthenticationDelegate*
  1582. ElectronBrowserClient::GetWebAuthenticationDelegate() {
  1583. if (!web_authentication_delegate_) {
  1584. web_authentication_delegate_ =
  1585. std::make_unique<ElectronWebAuthenticationDelegate>();
  1586. }
  1587. return web_authentication_delegate_.get();
  1588. }
  1589. } // namespace electron