electron_browser_client.cc 67 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767
  1. // Copyright (c) 2013 GitHub, Inc.
  2. // Use of this source code is governed by the MIT license that can be
  3. // found in the LICENSE file.
  4. #include "shell/browser/electron_browser_client.h"
  5. #if BUILDFLAG(IS_WIN)
  6. #include <shlobj.h>
  7. #endif
  8. #include <memory>
  9. #include <string_view>
  10. #include <utility>
  11. #include "base/base_switches.h"
  12. #include "base/command_line.h"
  13. #include "base/debug/crash_logging.h"
  14. #include "base/environment.h"
  15. #include "base/files/file_path.h"
  16. #include "base/files/file_util.h"
  17. #include "base/no_destructor.h"
  18. #include "base/path_service.h"
  19. #include "base/process/process_metrics.h"
  20. #include "base/strings/escape.h"
  21. #include "base/strings/string_util.h"
  22. #include "chrome/browser/browser_process.h"
  23. #include "chrome/common/chrome_paths.h"
  24. #include "chrome/common/chrome_switches.h"
  25. #include "chrome/common/chrome_version.h"
  26. #include "components/embedder_support/user_agent_utils.h"
  27. #include "components/net_log/chrome_net_log.h"
  28. #include "components/network_hints/common/network_hints.mojom.h"
  29. #include "content/browser/keyboard_lock/keyboard_lock_service_impl.h" // nogncheck
  30. #include "content/public/browser/browser_main_runner.h"
  31. #include "content/public/browser/browser_task_traits.h"
  32. #include "content/public/browser/client_certificate_delegate.h"
  33. #include "content/public/browser/login_delegate.h"
  34. #include "content/public/browser/overlay_window.h"
  35. #include "content/public/browser/render_frame_host.h"
  36. #include "content/public/browser/render_process_host.h"
  37. #include "content/public/browser/render_view_host.h"
  38. #include "content/public/browser/service_worker_version_base_info.h"
  39. #include "content/public/browser/site_instance.h"
  40. #include "content/public/browser/tts_controller.h"
  41. #include "content/public/browser/tts_platform.h"
  42. #include "content/public/browser/url_loader_request_interceptor.h"
  43. #include "content/public/browser/weak_document_ptr.h"
  44. #include "content/public/common/content_descriptors.h"
  45. #include "content/public/common/content_paths.h"
  46. #include "content/public/common/content_switches.h"
  47. #include "content/public/common/url_constants.h"
  48. #include "crypto/crypto_buildflags.h"
  49. #include "electron/buildflags/buildflags.h"
  50. #include "electron/fuses.h"
  51. #include "extensions/browser/extension_navigation_ui_data.h"
  52. #include "extensions/common/extension_id.h"
  53. #include "mojo/public/cpp/bindings/binder_map.h"
  54. #include "mojo/public/cpp/bindings/self_owned_associated_receiver.h"
  55. #include "net/ssl/ssl_cert_request_info.h"
  56. #include "net/ssl/ssl_private_key.h"
  57. #include "printing/buildflags/buildflags.h"
  58. #include "services/device/public/cpp/geolocation/geolocation_system_permission_manager.h"
  59. #include "services/device/public/cpp/geolocation/location_provider.h"
  60. #include "services/network/public/cpp/features.h"
  61. #include "services/network/public/cpp/is_potentially_trustworthy.h"
  62. #include "services/network/public/cpp/network_switches.h"
  63. #include "services/network/public/cpp/resource_request_body.h"
  64. #include "services/network/public/cpp/self_deleting_url_loader_factory.h"
  65. #include "services/network/public/cpp/url_loader_factory_builder.h"
  66. #include "shell/app/electron_crash_reporter_client.h"
  67. #include "shell/browser/api/electron_api_app.h"
  68. #include "shell/browser/api/electron_api_crash_reporter.h"
  69. #include "shell/browser/api/electron_api_protocol.h"
  70. #include "shell/browser/api/electron_api_web_contents.h"
  71. #include "shell/browser/api/electron_api_web_request.h"
  72. #include "shell/browser/badging/badge_manager.h"
  73. #include "shell/browser/bluetooth/electron_bluetooth_delegate.h"
  74. #include "shell/browser/child_web_contents_tracker.h"
  75. #include "shell/browser/electron_api_ipc_handler_impl.h"
  76. #include "shell/browser/electron_autofill_driver_factory.h"
  77. #include "shell/browser/electron_browser_context.h"
  78. #include "shell/browser/electron_browser_main_parts.h"
  79. #include "shell/browser/electron_navigation_throttle.h"
  80. #include "shell/browser/electron_plugin_info_host_impl.h"
  81. #include "shell/browser/electron_speech_recognition_manager_delegate.h"
  82. #include "shell/browser/electron_web_contents_utility_handler_impl.h"
  83. #include "shell/browser/font_defaults.h"
  84. #include "shell/browser/hid/electron_hid_delegate.h"
  85. #include "shell/browser/javascript_environment.h"
  86. #include "shell/browser/login_handler.h"
  87. #include "shell/browser/media/media_capture_devices_dispatcher.h"
  88. #include "shell/browser/native_window.h"
  89. #include "shell/browser/net/network_context_service.h"
  90. #include "shell/browser/net/network_context_service_factory.h"
  91. #include "shell/browser/net/proxying_url_loader_factory.h"
  92. #include "shell/browser/net/proxying_websocket.h"
  93. #include "shell/browser/net/system_network_context_manager.h"
  94. #include "shell/browser/network_hints_handler_impl.h"
  95. #include "shell/browser/notifications/notification_presenter.h"
  96. #include "shell/browser/notifications/platform_notification_service.h"
  97. #include "shell/browser/protocol_registry.h"
  98. #include "shell/browser/serial/electron_serial_delegate.h"
  99. #include "shell/browser/session_preferences.h"
  100. #include "shell/browser/ui/devtools_manager_delegate.h"
  101. #include "shell/browser/usb/electron_usb_delegate.h"
  102. #include "shell/browser/web_contents_permission_helper.h"
  103. #include "shell/browser/web_contents_preferences.h"
  104. #include "shell/browser/webauthn/electron_authenticator_request_delegate.h"
  105. #include "shell/browser/window_list.h"
  106. #include "shell/common/api/api.mojom.h"
  107. #include "shell/common/application_info.h"
  108. #include "shell/common/electron_paths.h"
  109. #include "shell/common/logging.h"
  110. #include "shell/common/options_switches.h"
  111. #include "shell/common/platform_util.h"
  112. #include "shell/common/plugin.mojom.h"
  113. #include "shell/common/thread_restrictions.h"
  114. #include "shell/common/web_contents_utility.mojom.h"
  115. #include "third_party/blink/public/common/associated_interfaces/associated_interface_registry.h"
  116. #include "third_party/blink/public/common/loader/url_loader_throttle.h"
  117. #include "third_party/blink/public/common/renderer_preferences/renderer_preferences.h"
  118. #include "third_party/blink/public/common/tokens/tokens.h"
  119. #include "third_party/blink/public/common/web_preferences/web_preferences.h"
  120. #include "third_party/blink/public/mojom/badging/badging.mojom.h"
  121. #include "ui/base/resource/resource_bundle.h"
  122. #include "ui/native_theme/native_theme.h"
  123. #include "v8/include/v8.h"
  124. #if BUILDFLAG(USE_NSS_CERTS)
  125. #include "net/ssl/client_cert_store_nss.h"
  126. #include "shell/browser/electron_crypto_module_delegate_nss.h"
  127. #elif BUILDFLAG(IS_WIN)
  128. #include "net/ssl/client_cert_store_win.h"
  129. #elif BUILDFLAG(IS_MAC)
  130. #include "net/ssl/client_cert_store_mac.h"
  131. #elif defined(USE_OPENSSL)
  132. #include "net/ssl/client_cert_store.h"
  133. #endif
  134. #if BUILDFLAG(ENABLE_BUILTIN_SPELLCHECKER)
  135. #include "chrome/browser/spellchecker/spell_check_host_chrome_impl.h" // nogncheck
  136. #include "chrome/browser/spellchecker/spell_check_initialization_host_impl.h" // nogncheck
  137. #include "components/spellcheck/common/spellcheck.mojom.h" // nogncheck
  138. #endif
  139. #if BUILDFLAG(OVERRIDE_LOCATION_PROVIDER)
  140. #include "shell/browser/fake_location_provider.h"
  141. #endif // BUILDFLAG(OVERRIDE_LOCATION_PROVIDER)
  142. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  143. #include "base/functional/bind.h"
  144. #include "chrome/common/webui_url_constants.h"
  145. #include "components/guest_view/common/guest_view.mojom.h"
  146. #include "content/public/browser/child_process_security_policy.h"
  147. #include "content/public/browser/file_url_loader.h"
  148. #include "content/public/browser/web_ui_url_loader_factory.h"
  149. #include "extensions/browser/api/mime_handler_private/mime_handler_private.h"
  150. #include "extensions/browser/api/web_request/web_request_api.h"
  151. #include "extensions/browser/browser_context_keyed_api_factory.h"
  152. #include "extensions/browser/event_router.h"
  153. #include "extensions/browser/extension_host.h"
  154. #include "extensions/browser/extension_navigation_throttle.h"
  155. #include "extensions/browser/extension_prefs.h"
  156. #include "extensions/browser/extension_protocols.h"
  157. #include "extensions/browser/extension_registry.h"
  158. #include "extensions/browser/extensions_browser_client.h"
  159. #include "extensions/browser/guest_view/extensions_guest_view.h"
  160. #include "extensions/browser/guest_view/mime_handler_view/mime_handler_view_guest.h"
  161. #include "extensions/browser/process_manager.h"
  162. #include "extensions/browser/process_map.h"
  163. #include "extensions/browser/renderer_startup_helper.h"
  164. #include "extensions/browser/service_worker/service_worker_host.h"
  165. #include "extensions/browser/url_loader_factory_manager.h"
  166. #include "extensions/common/api/mime_handler.mojom.h"
  167. #include "extensions/common/constants.h"
  168. #include "extensions/common/extension.h"
  169. #include "extensions/common/mojom/event_router.mojom.h"
  170. #include "extensions/common/mojom/guest_view.mojom.h"
  171. #include "extensions/common/mojom/renderer_host.mojom.h"
  172. #include "extensions/common/switches.h"
  173. #include "shell/browser/extensions/electron_extension_system.h"
  174. #include "shell/browser/extensions/electron_extension_web_contents_observer.h"
  175. #endif
  176. #if BUILDFLAG(ENABLE_PLUGINS)
  177. #include "chrome/browser/plugins/plugin_response_interceptor_url_loader_throttle.h" // nogncheck
  178. #include "shell/browser/plugins/plugin_utils.h"
  179. #endif
  180. #if BUILDFLAG(IS_MAC)
  181. #include "content/browser/mac_helpers.h"
  182. #include "content/public/browser/child_process_host.h"
  183. #endif
  184. #if BUILDFLAG(IS_LINUX)
  185. #include "components/crash/core/app/crash_switches.h" // nogncheck
  186. #include "components/crash/core/app/crashpad.h" // nogncheck
  187. #endif
  188. #if BUILDFLAG(IS_WIN)
  189. #include "chrome/browser/ui/views/overlay/video_overlay_window_views.h"
  190. #include "shell/browser/browser.h"
  191. #include "ui/aura/window.h"
  192. #include "ui/aura/window_tree_host.h"
  193. #include "ui/base/win/shell.h"
  194. #include "ui/views/widget/widget.h"
  195. #endif
  196. #if BUILDFLAG(ENABLE_PRINTING)
  197. #include "shell/browser/printing/print_view_manager_electron.h"
  198. #endif
  199. #if BUILDFLAG(ENABLE_PDF_VIEWER)
  200. #include "chrome/browser/pdf/chrome_pdf_stream_delegate.h"
  201. #include "chrome/browser/plugins/pdf_iframe_navigation_throttle.h" // nogncheck
  202. #include "components/pdf/browser/pdf_document_helper.h" // nogncheck
  203. #include "components/pdf/browser/pdf_navigation_throttle.h"
  204. #include "components/pdf/browser/pdf_url_loader_request_interceptor.h"
  205. #include "components/pdf/common/constants.h" // nogncheck
  206. #include "shell/browser/electron_pdf_document_helper_client.h"
  207. #endif
  208. using content::BrowserThread;
  209. namespace electron {
  210. namespace {
  211. ElectronBrowserClient* g_browser_client = nullptr;
  212. base::NoDestructor<std::string> g_io_thread_application_locale;
  213. base::NoDestructor<std::string> g_application_locale;
  214. void SetApplicationLocaleOnIOThread(const std::string& locale) {
  215. DCHECK_CURRENTLY_ON(BrowserThread::IO);
  216. *g_io_thread_application_locale = locale;
  217. }
  218. void BindNetworkHintsHandler(
  219. content::RenderFrameHost* frame_host,
  220. mojo::PendingReceiver<network_hints::mojom::NetworkHintsHandler> receiver) {
  221. NetworkHintsHandlerImpl::Create(frame_host, std::move(receiver));
  222. }
  223. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  224. // Used by the GetPrivilegeRequiredByUrl() and GetProcessPrivilege() functions
  225. // below. Extension, and isolated apps require different privileges to be
  226. // granted to their RenderProcessHosts. This classification allows us to make
  227. // sure URLs are served by hosts with the right set of privileges.
  228. enum class RenderProcessHostPrivilege {
  229. kNormal,
  230. kHosted,
  231. kIsolated,
  232. kExtension,
  233. };
  234. // Copied from chrome/browser/extensions/extension_util.cc.
  235. bool AllowFileAccess(const std::string& extension_id,
  236. content::BrowserContext* context) {
  237. return base::CommandLine::ForCurrentProcess()->HasSwitch(
  238. extensions::switches::kDisableExtensionsFileAccessCheck) ||
  239. extensions::ExtensionPrefs::Get(context)->AllowFileAccess(
  240. extension_id);
  241. }
  242. RenderProcessHostPrivilege GetPrivilegeRequiredByUrl(const GURL& url) {
  243. // Default to a normal renderer cause it is lower privileged. This should only
  244. // occur if the URL on a site instance is either malformed, or uninitialized.
  245. // If it is malformed, then there is no need for better privileges anyways.
  246. // If it is uninitialized, but eventually settles on being an a scheme other
  247. // than normal webrenderer, the navigation logic will correct us out of band
  248. // anyways.
  249. if (!url.is_valid())
  250. return RenderProcessHostPrivilege::kNormal;
  251. if (!url.SchemeIs(extensions::kExtensionScheme))
  252. return RenderProcessHostPrivilege::kNormal;
  253. return RenderProcessHostPrivilege::kExtension;
  254. }
  255. RenderProcessHostPrivilege GetProcessPrivilege(
  256. content::RenderProcessHost* process_host,
  257. extensions::ProcessMap* process_map) {
  258. std::optional<extensions::ExtensionId> extension_id =
  259. process_map->GetExtensionIdForProcess(process_host->GetID());
  260. if (!extension_id.has_value())
  261. return RenderProcessHostPrivilege::kNormal;
  262. return RenderProcessHostPrivilege::kExtension;
  263. }
  264. const extensions::Extension* GetEnabledExtensionFromEffectiveURL(
  265. content::BrowserContext* context,
  266. const GURL& effective_url) {
  267. if (!effective_url.SchemeIs(extensions::kExtensionScheme))
  268. return nullptr;
  269. extensions::ExtensionRegistry* registry =
  270. extensions::ExtensionRegistry::Get(context);
  271. if (!registry)
  272. return nullptr;
  273. return registry->enabled_extensions().GetByID(effective_url.host());
  274. }
  275. #endif // BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  276. #if BUILDFLAG(IS_LINUX)
  277. int GetCrashSignalFD(const base::CommandLine& command_line) {
  278. int fd;
  279. return crash_reporter::GetHandlerSocket(&fd, nullptr) ? fd : -1;
  280. }
  281. #endif // BUILDFLAG(IS_LINUX)
  282. void MaybeAppendSecureOriginsAllowlistSwitch(base::CommandLine* cmdline) {
  283. // |allowlist| combines pref/policy + cmdline switch in the browser process.
  284. // For renderer and utility (e.g. NetworkService) processes the switch is the
  285. // only available source, so below the combined (pref/policy + cmdline)
  286. // allowlist of secure origins is injected into |cmdline| for these other
  287. // processes.
  288. std::vector<std::string> allowlist =
  289. network::SecureOriginAllowlist::GetInstance().GetCurrentAllowlist();
  290. if (!allowlist.empty()) {
  291. cmdline->AppendSwitchASCII(
  292. network::switches::kUnsafelyTreatInsecureOriginAsSecure,
  293. base::JoinString(allowlist, ","));
  294. }
  295. }
  296. } // namespace
  297. // static
  298. ElectronBrowserClient* ElectronBrowserClient::Get() {
  299. return g_browser_client;
  300. }
  301. // static
  302. void ElectronBrowserClient::SetApplicationLocale(const std::string& locale) {
  303. if (!BrowserThread::IsThreadInitialized(BrowserThread::IO) ||
  304. !content::GetIOThreadTaskRunner({})->PostTask(
  305. FROM_HERE, base::BindOnce(&SetApplicationLocaleOnIOThread, locale))) {
  306. *g_io_thread_application_locale = locale;
  307. }
  308. *g_application_locale = locale;
  309. }
  310. ElectronBrowserClient::ElectronBrowserClient() {
  311. DCHECK(!g_browser_client);
  312. g_browser_client = this;
  313. }
  314. ElectronBrowserClient::~ElectronBrowserClient() {
  315. DCHECK(g_browser_client);
  316. g_browser_client = nullptr;
  317. }
  318. content::WebContents* ElectronBrowserClient::GetWebContentsFromProcessID(
  319. int process_id) {
  320. // If the process is a pending process, we should use the web contents
  321. // for the frame host passed into RegisterPendingProcess.
  322. const auto iter = pending_processes_.find(process_id);
  323. if (iter != std::end(pending_processes_))
  324. return iter->second;
  325. // Certain render process will be created with no associated render view,
  326. // for example: ServiceWorker.
  327. return WebContentsPreferences::GetWebContentsFromProcessID(process_id);
  328. }
  329. content::SiteInstance* ElectronBrowserClient::GetSiteInstanceFromAffinity(
  330. content::BrowserContext* browser_context,
  331. const GURL& url,
  332. content::RenderFrameHost* rfh) const {
  333. return nullptr;
  334. }
  335. bool ElectronBrowserClient::IsRendererSubFrame(int process_id) const {
  336. return renderer_is_subframe_.contains(process_id);
  337. }
  338. void ElectronBrowserClient::RenderProcessWillLaunch(
  339. content::RenderProcessHost* host) {
  340. // Remove in case the host is reused after a crash, otherwise noop.
  341. host->RemoveObserver(this);
  342. // ensure the ProcessPreferences is removed later
  343. host->AddObserver(this);
  344. }
  345. content::SpeechRecognitionManagerDelegate*
  346. ElectronBrowserClient::CreateSpeechRecognitionManagerDelegate() {
  347. return new ElectronSpeechRecognitionManagerDelegate;
  348. }
  349. content::TtsPlatform* ElectronBrowserClient::GetTtsPlatform() {
  350. return nullptr;
  351. }
  352. void ElectronBrowserClient::OverrideWebkitPrefs(
  353. content::WebContents* web_contents,
  354. blink::web_pref::WebPreferences* prefs) {
  355. prefs->javascript_enabled = true;
  356. prefs->web_security_enabled = true;
  357. prefs->plugins_enabled = true;
  358. prefs->dom_paste_enabled = false;
  359. prefs->javascript_can_access_clipboard = false;
  360. prefs->allow_scripts_to_close_windows = true;
  361. prefs->local_storage_enabled = true;
  362. prefs->databases_enabled = true;
  363. prefs->allow_universal_access_from_file_urls =
  364. electron::fuses::IsGrantFileProtocolExtraPrivilegesEnabled();
  365. prefs->allow_file_access_from_file_urls =
  366. electron::fuses::IsGrantFileProtocolExtraPrivilegesEnabled();
  367. prefs->webgl1_enabled = true;
  368. prefs->webgl2_enabled = true;
  369. prefs->allow_running_insecure_content = false;
  370. prefs->default_minimum_page_scale_factor = 1.f;
  371. prefs->default_maximum_page_scale_factor = 1.f;
  372. blink::RendererPreferences* renderer_prefs =
  373. web_contents->GetMutableRendererPrefs();
  374. renderer_prefs->can_accept_load_drops = false;
  375. ui::NativeTheme* native_theme = ui::NativeTheme::GetInstanceForNativeUi();
  376. prefs->in_forced_colors = native_theme->InForcedColorsMode();
  377. prefs->preferred_color_scheme =
  378. native_theme->ShouldUseDarkColors()
  379. ? blink::mojom::PreferredColorScheme::kDark
  380. : blink::mojom::PreferredColorScheme::kLight;
  381. SetFontDefaults(prefs);
  382. // Custom preferences of guest page.
  383. auto* web_preferences = WebContentsPreferences::From(web_contents);
  384. if (web_preferences) {
  385. web_preferences->OverrideWebkitPrefs(prefs, renderer_prefs);
  386. }
  387. }
  388. void ElectronBrowserClient::RegisterPendingSiteInstance(
  389. content::RenderFrameHost* rfh,
  390. content::SiteInstance* pending_site_instance) {
  391. // Remember the original web contents for the pending renderer process.
  392. auto* web_contents = content::WebContents::FromRenderFrameHost(rfh);
  393. auto* pending_process = pending_site_instance->GetProcess();
  394. pending_processes_[pending_process->GetID()] = web_contents;
  395. if (rfh->GetParent())
  396. renderer_is_subframe_.insert(pending_process->GetID());
  397. else
  398. renderer_is_subframe_.erase(pending_process->GetID());
  399. }
  400. void ElectronBrowserClient::AppendExtraCommandLineSwitches(
  401. base::CommandLine* command_line,
  402. int process_id) {
  403. // Make sure we're about to launch a known executable
  404. #if BUILDFLAG(IS_LINUX)
  405. // On Linux, do not perform this check for /proc/self/exe. It will always
  406. // point to the currently running executable so this check is not
  407. // necessary, and if the executable has been deleted it will return a fake
  408. // name that causes this check to fail.
  409. if (command_line->GetProgram() != base::FilePath(base::kProcSelfExe)) {
  410. #else
  411. {
  412. #endif
  413. ScopedAllowBlockingForElectron allow_blocking;
  414. base::FilePath child_path;
  415. base::FilePath program =
  416. base::MakeAbsoluteFilePath(command_line->GetProgram());
  417. #if BUILDFLAG(IS_MAC)
  418. auto renderer_child_path = content::ChildProcessHost::GetChildPath(
  419. content::ChildProcessHost::CHILD_RENDERER);
  420. auto gpu_child_path = content::ChildProcessHost::GetChildPath(
  421. content::ChildProcessHost::CHILD_GPU);
  422. auto plugin_child_path = content::ChildProcessHost::GetChildPath(
  423. content::ChildProcessHost::CHILD_PLUGIN);
  424. if (program != renderer_child_path && program != gpu_child_path &&
  425. program != plugin_child_path) {
  426. child_path = content::ChildProcessHost::GetChildPath(
  427. content::ChildProcessHost::CHILD_NORMAL);
  428. CHECK_EQ(program, child_path)
  429. << "Aborted from launching unexpected helper executable";
  430. }
  431. #else
  432. if (!base::PathService::Get(content::CHILD_PROCESS_EXE, &child_path)) {
  433. CHECK(false) << "Unable to get child process binary name.";
  434. }
  435. SCOPED_CRASH_KEY_STRING256("ChildProcess", "child_process_exe",
  436. child_path.AsUTF8Unsafe());
  437. SCOPED_CRASH_KEY_STRING256("ChildProcess", "program",
  438. program.AsUTF8Unsafe());
  439. CHECK_EQ(program, child_path);
  440. #endif
  441. }
  442. std::string process_type =
  443. command_line->GetSwitchValueASCII(::switches::kProcessType);
  444. #if BUILDFLAG(IS_LINUX)
  445. pid_t pid;
  446. if (crash_reporter::GetHandlerSocket(nullptr, &pid)) {
  447. command_line->AppendSwitchASCII(
  448. crash_reporter::switches::kCrashpadHandlerPid,
  449. base::NumberToString(pid));
  450. }
  451. // Zygote Process gets booted before any JS runs, accessing GetClientId
  452. // will end up touching DIR_USER_DATA path provider and this will
  453. // configure default value because app.name from browser_init has
  454. // not run yet.
  455. if (process_type != ::switches::kZygoteProcess) {
  456. std::string switch_value =
  457. api::crash_reporter::GetClientId() + ",no_channel";
  458. command_line->AppendSwitchASCII(::switches::kEnableCrashReporter,
  459. switch_value);
  460. }
  461. #endif
  462. // The zygote process is booted before JS runs, so DIR_USER_DATA isn't usable
  463. // at that time. It doesn't need --user-data-dir to be correct anyway, since
  464. // the zygote itself doesn't access anything in that directory.
  465. if (process_type != ::switches::kZygoteProcess) {
  466. base::FilePath user_data_dir;
  467. if (base::PathService::Get(chrome::DIR_USER_DATA, &user_data_dir))
  468. command_line->AppendSwitchPath(::switches::kUserDataDir, user_data_dir);
  469. }
  470. if (process_type == ::switches::kUtilityProcess ||
  471. process_type == ::switches::kRendererProcess) {
  472. // Copy following switches to child process.
  473. static const char* const kCommonSwitchNames[] = {
  474. switches::kStandardSchemes, switches::kEnableSandbox,
  475. switches::kSecureSchemes, switches::kBypassCSPSchemes,
  476. switches::kCORSSchemes, switches::kFetchSchemes,
  477. switches::kServiceWorkerSchemes, switches::kStreamingSchemes,
  478. switches::kCodeCacheSchemes};
  479. command_line->CopySwitchesFrom(*base::CommandLine::ForCurrentProcess(),
  480. kCommonSwitchNames);
  481. if (process_type == ::switches::kUtilityProcess ||
  482. content::RenderProcessHost::FromID(process_id)) {
  483. MaybeAppendSecureOriginsAllowlistSwitch(command_line);
  484. }
  485. }
  486. if (process_type == ::switches::kRendererProcess) {
  487. #if BUILDFLAG(IS_WIN)
  488. // Append --app-user-model-id.
  489. PWSTR current_app_id;
  490. if (SUCCEEDED(GetCurrentProcessExplicitAppUserModelID(&current_app_id))) {
  491. command_line->AppendSwitchNative(switches::kAppUserModelId,
  492. current_app_id);
  493. CoTaskMemFree(current_app_id);
  494. }
  495. #endif
  496. if (delegate_) {
  497. auto app_path = static_cast<api::App*>(delegate_)->GetAppPath();
  498. command_line->AppendSwitchPath(switches::kAppPath, app_path);
  499. }
  500. auto env = base::Environment::Create();
  501. if (env->HasVar("ELECTRON_PROFILE_INIT_SCRIPTS")) {
  502. command_line->AppendSwitch("profile-electron-init");
  503. }
  504. content::WebContents* web_contents =
  505. GetWebContentsFromProcessID(process_id);
  506. if (web_contents) {
  507. auto* web_preferences = WebContentsPreferences::From(web_contents);
  508. if (web_preferences)
  509. web_preferences->AppendCommandLineSwitches(
  510. command_line, IsRendererSubFrame(process_id));
  511. }
  512. }
  513. }
  514. // attempt to get api key from env
  515. std::string ElectronBrowserClient::GetGeolocationApiKey() {
  516. auto env = base::Environment::Create();
  517. std::string api_key;
  518. env->GetVar("GOOGLE_API_KEY", &api_key);
  519. return api_key;
  520. }
  521. content::GeneratedCodeCacheSettings
  522. ElectronBrowserClient::GetGeneratedCodeCacheSettings(
  523. content::BrowserContext* context) {
  524. // TODO(deepak1556): Use platform cache directory.
  525. base::FilePath cache_path = context->GetPath();
  526. // If we pass 0 for size, disk_cache will pick a default size using the
  527. // heuristics based on available disk size. These are implemented in
  528. // disk_cache::PreferredCacheSize in net/disk_cache/cache_util.cc.
  529. return {true, 0, cache_path};
  530. }
  531. void ElectronBrowserClient::AllowCertificateError(
  532. content::WebContents* web_contents,
  533. int cert_error,
  534. const net::SSLInfo& ssl_info,
  535. const GURL& request_url,
  536. bool is_main_frame_request,
  537. bool strict_enforcement,
  538. base::OnceCallback<void(content::CertificateRequestResultType)> callback) {
  539. if (delegate_) {
  540. delegate_->AllowCertificateError(web_contents, cert_error, ssl_info,
  541. request_url, is_main_frame_request,
  542. strict_enforcement, std::move(callback));
  543. }
  544. }
  545. base::OnceClosure ElectronBrowserClient::SelectClientCertificate(
  546. content::BrowserContext* browser_context,
  547. int process_id,
  548. content::WebContents* web_contents,
  549. net::SSLCertRequestInfo* cert_request_info,
  550. net::ClientCertIdentityList client_certs,
  551. std::unique_ptr<content::ClientCertificateDelegate> delegate) {
  552. if (client_certs.empty()) {
  553. delegate->ContinueWithCertificate(nullptr, nullptr);
  554. } else if (delegate_) {
  555. delegate_->SelectClientCertificate(
  556. browser_context, process_id, web_contents, cert_request_info,
  557. std::move(client_certs), std::move(delegate));
  558. }
  559. return {};
  560. }
  561. bool ElectronBrowserClient::CanCreateWindow(
  562. content::RenderFrameHost* opener,
  563. const GURL& opener_url,
  564. const GURL& opener_top_level_frame_url,
  565. const url::Origin& source_origin,
  566. content::mojom::WindowContainerType container_type,
  567. const GURL& target_url,
  568. const content::Referrer& referrer,
  569. const std::string& frame_name,
  570. WindowOpenDisposition disposition,
  571. const blink::mojom::WindowFeatures& features,
  572. const std::string& raw_features,
  573. const scoped_refptr<network::ResourceRequestBody>& body,
  574. bool user_gesture,
  575. bool opener_suppressed,
  576. bool* no_javascript_access) {
  577. DCHECK_CURRENTLY_ON(BrowserThread::UI);
  578. content::WebContents* web_contents =
  579. content::WebContents::FromRenderFrameHost(opener);
  580. WebContentsPreferences* prefs = WebContentsPreferences::From(web_contents);
  581. if (prefs) {
  582. if (prefs->ShouldDisablePopups()) {
  583. // <webview> without allowpopups attribute should return
  584. // null from window.open calls
  585. return false;
  586. } else {
  587. *no_javascript_access = false;
  588. return true;
  589. }
  590. }
  591. if (delegate_) {
  592. return delegate_->CanCreateWindow(
  593. opener, opener_url, opener_top_level_frame_url, source_origin,
  594. container_type, target_url, referrer, frame_name, disposition, features,
  595. raw_features, body, user_gesture, opener_suppressed,
  596. no_javascript_access);
  597. }
  598. return false;
  599. }
  600. std::unique_ptr<content::VideoOverlayWindow>
  601. ElectronBrowserClient::CreateWindowForVideoPictureInPicture(
  602. content::VideoPictureInPictureWindowController* controller) {
  603. auto overlay_window = content::VideoOverlayWindow::Create(controller);
  604. #if BUILDFLAG(IS_WIN)
  605. std::wstring app_user_model_id = Browser::Get()->GetAppUserModelID();
  606. if (!app_user_model_id.empty()) {
  607. auto* overlay_window_view =
  608. static_cast<VideoOverlayWindowViews*>(overlay_window.get());
  609. ui::win::SetAppIdForWindow(app_user_model_id,
  610. overlay_window_view->GetNativeWindow()
  611. ->GetHost()
  612. ->GetAcceleratedWidget());
  613. }
  614. #endif
  615. return overlay_window;
  616. }
  617. void ElectronBrowserClient::GetAdditionalAllowedSchemesForFileSystem(
  618. std::vector<std::string>* additional_schemes) {
  619. const auto& schemes_list = api::GetStandardSchemes();
  620. if (!schemes_list.empty())
  621. additional_schemes->insert(additional_schemes->end(), schemes_list.begin(),
  622. schemes_list.end());
  623. additional_schemes->push_back(content::kChromeDevToolsScheme);
  624. additional_schemes->push_back(content::kChromeUIScheme);
  625. }
  626. void ElectronBrowserClient::GetAdditionalWebUISchemes(
  627. std::vector<std::string>* additional_schemes) {
  628. additional_schemes->push_back(content::kChromeDevToolsScheme);
  629. }
  630. void ElectronBrowserClient::SiteInstanceGotProcessAndSite(
  631. content::SiteInstance* site_instance) {
  632. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  633. auto* browser_context =
  634. static_cast<ElectronBrowserContext*>(site_instance->GetBrowserContext());
  635. if (!browser_context->IsOffTheRecord()) {
  636. extensions::ExtensionRegistry* registry =
  637. extensions::ExtensionRegistry::Get(browser_context);
  638. const extensions::Extension* extension =
  639. registry->enabled_extensions().GetExtensionOrAppByURL(
  640. site_instance->GetSiteURL());
  641. if (!extension)
  642. return;
  643. extensions::ProcessMap::Get(browser_context)
  644. ->Insert(extension->id(), site_instance->GetProcess()->GetID());
  645. }
  646. #endif // BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  647. }
  648. bool ElectronBrowserClient::IsSuitableHost(
  649. content::RenderProcessHost* process_host,
  650. const GURL& site_url) {
  651. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  652. auto* browser_context = process_host->GetBrowserContext();
  653. extensions::ProcessMap* process_map =
  654. extensions::ProcessMap::Get(browser_context);
  655. // Otherwise, just make sure the process privilege matches the privilege
  656. // required by the site.
  657. const auto privilege_required = GetPrivilegeRequiredByUrl(site_url);
  658. return GetProcessPrivilege(process_host, process_map) == privilege_required;
  659. #else
  660. return content::ContentBrowserClient::IsSuitableHost(process_host, site_url);
  661. #endif
  662. }
  663. bool ElectronBrowserClient::ShouldUseProcessPerSite(
  664. content::BrowserContext* browser_context,
  665. const GURL& effective_url) {
  666. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  667. const extensions::Extension* extension =
  668. GetEnabledExtensionFromEffectiveURL(browser_context, effective_url);
  669. return extension != nullptr;
  670. #else
  671. return content::ContentBrowserClient::ShouldUseProcessPerSite(browser_context,
  672. effective_url);
  673. #endif
  674. }
  675. void ElectronBrowserClient::GetMediaDeviceIDSalt(
  676. content::RenderFrameHost* rfh,
  677. const net::SiteForCookies& site_for_cookies,
  678. const blink::StorageKey& storage_key,
  679. base::OnceCallback<void(bool, const std::string&)> callback) {
  680. constexpr bool persistent_media_device_id_allowed = true;
  681. std::string persistent_media_device_id_salt =
  682. static_cast<ElectronBrowserContext*>(rfh->GetBrowserContext())
  683. ->GetMediaDeviceIDSalt();
  684. std::move(callback).Run(persistent_media_device_id_allowed,
  685. persistent_media_device_id_salt);
  686. }
  687. base::FilePath ElectronBrowserClient::GetLoggingFileName(
  688. const base::CommandLine& cmd_line) {
  689. return logging::GetLogFileName(cmd_line);
  690. }
  691. std::unique_ptr<net::ClientCertStore>
  692. ElectronBrowserClient::CreateClientCertStore(
  693. content::BrowserContext* browser_context) {
  694. #if BUILDFLAG(USE_NSS_CERTS)
  695. return std::make_unique<net::ClientCertStoreNSS>(
  696. base::BindRepeating([](const net::HostPortPair& server) {
  697. crypto::CryptoModuleBlockingPasswordDelegate* delegate =
  698. new ElectronNSSCryptoModuleDelegate(server);
  699. return delegate;
  700. }));
  701. #elif BUILDFLAG(IS_WIN)
  702. return std::make_unique<net::ClientCertStoreWin>();
  703. #elif BUILDFLAG(IS_MAC)
  704. return std::make_unique<net::ClientCertStoreMac>();
  705. #elif defined(USE_OPENSSL)
  706. return ();
  707. #endif
  708. }
  709. std::unique_ptr<device::LocationProvider>
  710. ElectronBrowserClient::OverrideSystemLocationProvider() {
  711. #if BUILDFLAG(OVERRIDE_LOCATION_PROVIDER)
  712. return std::make_unique<FakeLocationProvider>();
  713. #else
  714. return {};
  715. #endif
  716. }
  717. void ElectronBrowserClient::ConfigureNetworkContextParams(
  718. content::BrowserContext* browser_context,
  719. bool in_memory,
  720. const base::FilePath& relative_partition_path,
  721. network::mojom::NetworkContextParams* network_context_params,
  722. cert_verifier::mojom::CertVerifierCreationParams*
  723. cert_verifier_creation_params) {
  724. DCHECK(browser_context);
  725. return NetworkContextServiceFactory::GetForContext(browser_context)
  726. ->ConfigureNetworkContextParams(network_context_params,
  727. cert_verifier_creation_params);
  728. }
  729. network::mojom::NetworkContext*
  730. ElectronBrowserClient::GetSystemNetworkContext() {
  731. DCHECK_CURRENTLY_ON(BrowserThread::UI);
  732. DCHECK(g_browser_process->system_network_context_manager());
  733. return g_browser_process->system_network_context_manager()->GetContext();
  734. }
  735. std::unique_ptr<content::BrowserMainParts>
  736. ElectronBrowserClient::CreateBrowserMainParts(bool /* is_integration_test */) {
  737. return std::make_unique<ElectronBrowserMainParts>();
  738. }
  739. void ElectronBrowserClient::WebNotificationAllowed(
  740. content::RenderFrameHost* rfh,
  741. base::OnceCallback<void(bool, bool)> callback) {
  742. content::WebContents* web_contents =
  743. content::WebContents::FromRenderFrameHost(rfh);
  744. if (!web_contents) {
  745. std::move(callback).Run(false, false);
  746. return;
  747. }
  748. auto* permission_helper =
  749. WebContentsPermissionHelper::FromWebContents(web_contents);
  750. if (!permission_helper) {
  751. std::move(callback).Run(false, false);
  752. return;
  753. }
  754. permission_helper->RequestWebNotificationPermission(
  755. rfh, base::BindOnce(std::move(callback), web_contents->IsAudioMuted()));
  756. }
  757. void ElectronBrowserClient::RenderProcessHostDestroyed(
  758. content::RenderProcessHost* host) {
  759. int process_id = host->GetID();
  760. pending_processes_.erase(process_id);
  761. renderer_is_subframe_.erase(process_id);
  762. host->RemoveObserver(this);
  763. }
  764. void ElectronBrowserClient::RenderProcessReady(
  765. content::RenderProcessHost* host) {
  766. if (delegate_) {
  767. static_cast<api::App*>(delegate_)->RenderProcessReady(host);
  768. }
  769. }
  770. void ElectronBrowserClient::RenderProcessExited(
  771. content::RenderProcessHost* host,
  772. const content::ChildProcessTerminationInfo& info) {
  773. if (delegate_) {
  774. static_cast<api::App*>(delegate_)->RenderProcessExited(host);
  775. }
  776. }
  777. namespace {
  778. void OnOpenExternal(const GURL& escaped_url, bool allowed) {
  779. if (allowed) {
  780. platform_util::OpenExternal(
  781. escaped_url, platform_util::OpenExternalOptions(), base::DoNothing());
  782. }
  783. }
  784. void HandleExternalProtocolInUI(
  785. const GURL& url,
  786. content::WeakDocumentPtr document_ptr,
  787. content::WebContents::OnceGetter web_contents_getter,
  788. bool has_user_gesture) {
  789. content::WebContents* web_contents = std::move(web_contents_getter).Run();
  790. if (!web_contents)
  791. return;
  792. auto* permission_helper =
  793. WebContentsPermissionHelper::FromWebContents(web_contents);
  794. if (!permission_helper)
  795. return;
  796. content::RenderFrameHost* rfh = document_ptr.AsRenderFrameHostIfValid();
  797. if (!rfh) {
  798. // If the render frame host is not valid it means it was a top level
  799. // navigation and the frame has already been disposed of. In this case we
  800. // take the current main frame and declare it responsible for the
  801. // transition.
  802. rfh = web_contents->GetPrimaryMainFrame();
  803. }
  804. GURL escaped_url(base::EscapeExternalHandlerValue(url.spec()));
  805. auto callback = base::BindOnce(&OnOpenExternal, escaped_url);
  806. permission_helper->RequestOpenExternalPermission(rfh, std::move(callback),
  807. has_user_gesture, url);
  808. }
  809. } // namespace
  810. bool ElectronBrowserClient::HandleExternalProtocol(
  811. const GURL& url,
  812. content::WebContents::Getter web_contents_getter,
  813. content::FrameTreeNodeId frame_tree_node_id,
  814. content::NavigationUIData* navigation_data,
  815. bool is_primary_main_frame,
  816. bool is_in_fenced_frame_tree,
  817. network::mojom::WebSandboxFlags sandbox_flags,
  818. ui::PageTransition page_transition,
  819. bool has_user_gesture,
  820. const std::optional<url::Origin>& initiating_origin,
  821. content::RenderFrameHost* initiator_document,
  822. const net::IsolationInfo& isolation_info,
  823. mojo::PendingRemote<network::mojom::URLLoaderFactory>* out_factory) {
  824. content::GetUIThreadTaskRunner({})->PostTask(
  825. FROM_HERE,
  826. base::BindOnce(&HandleExternalProtocolInUI, url,
  827. initiator_document
  828. ? initiator_document->GetWeakDocumentPtr()
  829. : content::WeakDocumentPtr(),
  830. std::move(web_contents_getter), has_user_gesture));
  831. return true;
  832. }
  833. std::vector<std::unique_ptr<content::NavigationThrottle>>
  834. ElectronBrowserClient::CreateThrottlesForNavigation(
  835. content::NavigationHandle* handle) {
  836. std::vector<std::unique_ptr<content::NavigationThrottle>> throttles;
  837. throttles.push_back(std::make_unique<ElectronNavigationThrottle>(handle));
  838. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  839. throttles.push_back(
  840. std::make_unique<extensions::ExtensionNavigationThrottle>(handle));
  841. #endif
  842. #if BUILDFLAG(ENABLE_PDF_VIEWER)
  843. throttles.push_back(std::make_unique<PDFIFrameNavigationThrottle>(handle));
  844. throttles.push_back(std::make_unique<pdf::PdfNavigationThrottle>(
  845. handle, std::make_unique<ChromePdfStreamDelegate>()));
  846. #endif
  847. return throttles;
  848. }
  849. content::MediaObserver* ElectronBrowserClient::GetMediaObserver() {
  850. return MediaCaptureDevicesDispatcher::GetInstance();
  851. }
  852. std::unique_ptr<content::DevToolsManagerDelegate>
  853. ElectronBrowserClient::CreateDevToolsManagerDelegate() {
  854. return std::make_unique<DevToolsManagerDelegate>();
  855. }
  856. NotificationPresenter* ElectronBrowserClient::GetNotificationPresenter() {
  857. if (!notification_presenter_)
  858. notification_presenter_ = NotificationPresenter::Create();
  859. return notification_presenter_.get();
  860. }
  861. content::PlatformNotificationService*
  862. ElectronBrowserClient::GetPlatformNotificationService() {
  863. if (!notification_service_) {
  864. notification_service_ = std::make_unique<PlatformNotificationService>(this);
  865. }
  866. return notification_service_.get();
  867. }
  868. base::FilePath ElectronBrowserClient::GetDefaultDownloadDirectory() {
  869. base::FilePath download_path;
  870. if (base::PathService::Get(chrome::DIR_DEFAULT_DOWNLOADS, &download_path))
  871. return download_path;
  872. return {};
  873. }
  874. scoped_refptr<network::SharedURLLoaderFactory>
  875. ElectronBrowserClient::GetSystemSharedURLLoaderFactory() {
  876. if (!g_browser_process)
  877. return nullptr;
  878. return g_browser_process->shared_url_loader_factory();
  879. }
  880. void ElectronBrowserClient::OnNetworkServiceCreated(
  881. network::mojom::NetworkService* network_service) {
  882. if (!g_browser_process)
  883. return;
  884. g_browser_process->system_network_context_manager()->OnNetworkServiceCreated(
  885. network_service);
  886. }
  887. std::vector<base::FilePath>
  888. ElectronBrowserClient::GetNetworkContextsParentDirectory() {
  889. base::FilePath session_data;
  890. base::PathService::Get(DIR_SESSION_DATA, &session_data);
  891. DCHECK(!session_data.empty());
  892. return {session_data};
  893. }
  894. std::string ElectronBrowserClient::GetProduct() {
  895. return "Chrome/" CHROME_VERSION_STRING;
  896. }
  897. std::string ElectronBrowserClient::GetUserAgent() {
  898. if (user_agent_override_.empty())
  899. return GetApplicationUserAgent();
  900. return user_agent_override_;
  901. }
  902. void ElectronBrowserClient::SetUserAgent(const std::string& user_agent) {
  903. user_agent_override_ = user_agent;
  904. }
  905. blink::UserAgentMetadata ElectronBrowserClient::GetUserAgentMetadata() {
  906. return embedder_support::GetUserAgentMetadata();
  907. }
  908. mojo::PendingRemote<network::mojom::URLLoaderFactory>
  909. ElectronBrowserClient::CreateNonNetworkNavigationURLLoaderFactory(
  910. const std::string& scheme,
  911. content::FrameTreeNodeId frame_tree_node_id) {
  912. content::WebContents* web_contents =
  913. content::WebContents::FromFrameTreeNodeId(frame_tree_node_id);
  914. content::BrowserContext* context = web_contents->GetBrowserContext();
  915. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  916. if (scheme == extensions::kExtensionScheme) {
  917. return extensions::CreateExtensionNavigationURLLoaderFactory(
  918. context, false /* we don't support extensions::WebViewGuest */);
  919. }
  920. #endif
  921. // Always allow navigating to file:// URLs.
  922. auto* protocol_registry = ProtocolRegistry::FromBrowserContext(context);
  923. return protocol_registry->CreateNonNetworkNavigationURLLoaderFactory(scheme);
  924. }
  925. void ElectronBrowserClient::
  926. RegisterNonNetworkWorkerMainResourceURLLoaderFactories(
  927. content::BrowserContext* browser_context,
  928. NonNetworkURLLoaderFactoryMap* factories) {
  929. auto* protocol_registry =
  930. ProtocolRegistry::FromBrowserContext(browser_context);
  931. // Workers are not allowed to request file:// URLs, there is no particular
  932. // reason for it, and we could consider supporting it in future.
  933. protocol_registry->RegisterURLLoaderFactories(factories,
  934. false /* allow_file_access */);
  935. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  936. factories->emplace(
  937. extensions::kExtensionScheme,
  938. extensions::CreateExtensionWorkerMainResourceURLLoaderFactory(
  939. browser_context));
  940. #endif
  941. }
  942. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  943. namespace {
  944. // The FileURLLoaderFactory provided to the extension background pages.
  945. // Checks with the ChildProcessSecurityPolicy to validate the file access.
  946. class FileURLLoaderFactory : public network::SelfDeletingURLLoaderFactory {
  947. public:
  948. static mojo::PendingRemote<network::mojom::URLLoaderFactory> Create(
  949. int child_id) {
  950. mojo::PendingRemote<network::mojom::URLLoaderFactory> pending_remote;
  951. // The FileURLLoaderFactory will delete itself when there are no more
  952. // receivers - see the SelfDeletingURLLoaderFactory::OnDisconnect method.
  953. new FileURLLoaderFactory(child_id,
  954. pending_remote.InitWithNewPipeAndPassReceiver());
  955. return pending_remote;
  956. }
  957. // disable copy
  958. FileURLLoaderFactory(const FileURLLoaderFactory&) = delete;
  959. FileURLLoaderFactory& operator=(const FileURLLoaderFactory&) = delete;
  960. private:
  961. explicit FileURLLoaderFactory(
  962. int child_id,
  963. mojo::PendingReceiver<network::mojom::URLLoaderFactory> factory_receiver)
  964. : network::SelfDeletingURLLoaderFactory(std::move(factory_receiver)),
  965. child_id_(child_id) {}
  966. ~FileURLLoaderFactory() override = default;
  967. // network::mojom::URLLoaderFactory:
  968. void CreateLoaderAndStart(
  969. mojo::PendingReceiver<network::mojom::URLLoader> loader,
  970. int32_t request_id,
  971. uint32_t options,
  972. const network::ResourceRequest& request,
  973. mojo::PendingRemote<network::mojom::URLLoaderClient> client,
  974. const net::MutableNetworkTrafficAnnotationTag& traffic_annotation)
  975. override {
  976. if (!content::ChildProcessSecurityPolicy::GetInstance()->CanRequestURL(
  977. child_id_, request.url)) {
  978. mojo::Remote<network::mojom::URLLoaderClient>(std::move(client))
  979. ->OnComplete(
  980. network::URLLoaderCompletionStatus(net::ERR_ACCESS_DENIED));
  981. return;
  982. }
  983. content::CreateFileURLLoaderBypassingSecurityChecks(
  984. request, std::move(loader), std::move(client),
  985. /*observer=*/nullptr,
  986. /* allow_directory_listing */ true);
  987. }
  988. int child_id_;
  989. };
  990. } // namespace
  991. #endif // BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  992. void ElectronBrowserClient::RegisterNonNetworkSubresourceURLLoaderFactories(
  993. int render_process_id,
  994. int render_frame_id,
  995. const std::optional<url::Origin>& request_initiator_origin,
  996. NonNetworkURLLoaderFactoryMap* factories) {
  997. auto* render_process_host =
  998. content::RenderProcessHost::FromID(render_process_id);
  999. DCHECK(render_process_host);
  1000. if (!render_process_host || !render_process_host->GetBrowserContext())
  1001. return;
  1002. content::RenderFrameHost* frame_host =
  1003. content::RenderFrameHost::FromID(render_process_id, render_frame_id);
  1004. content::WebContents* web_contents =
  1005. content::WebContents::FromRenderFrameHost(frame_host);
  1006. // Allow accessing file:// subresources from non-file protocols if web
  1007. // security is disabled.
  1008. bool allow_file_access = false;
  1009. if (web_contents) {
  1010. const auto& web_preferences = web_contents->GetOrCreateWebPreferences();
  1011. if (!web_preferences.web_security_enabled)
  1012. allow_file_access = true;
  1013. }
  1014. ProtocolRegistry::FromBrowserContext(render_process_host->GetBrowserContext())
  1015. ->RegisterURLLoaderFactories(factories, allow_file_access);
  1016. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  1017. auto factory = extensions::CreateExtensionURLLoaderFactory(render_process_id,
  1018. render_frame_id);
  1019. if (factory)
  1020. factories->emplace(extensions::kExtensionScheme, std::move(factory));
  1021. if (!web_contents)
  1022. return;
  1023. extensions::ElectronExtensionWebContentsObserver* web_observer =
  1024. extensions::ElectronExtensionWebContentsObserver::FromWebContents(
  1025. web_contents);
  1026. // There is nothing to do if no ElectronExtensionWebContentsObserver is
  1027. // attached to the |web_contents|.
  1028. if (!web_observer)
  1029. return;
  1030. const extensions::Extension* extension =
  1031. web_observer->GetExtensionFromFrame(frame_host, false);
  1032. if (!extension)
  1033. return;
  1034. // Support for chrome:// scheme if appropriate.
  1035. if (extension->is_extension() &&
  1036. extensions::Manifest::IsComponentLocation(extension->location())) {
  1037. // Components of chrome that are implemented as extensions or platform apps
  1038. // are allowed to use chrome://resources/ and chrome://theme/ URLs.
  1039. factories->emplace(content::kChromeUIScheme,
  1040. content::CreateWebUIURLLoaderFactory(
  1041. frame_host, content::kChromeUIScheme,
  1042. {content::kChromeUIResourcesHost}));
  1043. }
  1044. // Extensions with the necessary permissions get access to file:// URLs that
  1045. // gets approval from ChildProcessSecurityPolicy. Keep this logic in sync with
  1046. // ExtensionWebContentsObserver::RenderFrameCreated.
  1047. extensions::Manifest::Type type = extension->GetType();
  1048. if (type == extensions::Manifest::TYPE_EXTENSION &&
  1049. AllowFileAccess(extension->id(), web_contents->GetBrowserContext())) {
  1050. factories->emplace(url::kFileScheme,
  1051. FileURLLoaderFactory::Create(render_process_id));
  1052. }
  1053. #endif
  1054. }
  1055. void ElectronBrowserClient::
  1056. RegisterNonNetworkServiceWorkerUpdateURLLoaderFactories(
  1057. content::BrowserContext* browser_context,
  1058. NonNetworkURLLoaderFactoryMap* factories) {
  1059. DCHECK(browser_context);
  1060. DCHECK(factories);
  1061. auto* protocol_registry =
  1062. ProtocolRegistry::FromBrowserContext(browser_context);
  1063. protocol_registry->RegisterURLLoaderFactories(factories,
  1064. false /* allow_file_access */);
  1065. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  1066. factories->emplace(
  1067. extensions::kExtensionScheme,
  1068. extensions::CreateExtensionServiceWorkerScriptURLLoaderFactory(
  1069. browser_context));
  1070. #endif // BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  1071. }
  1072. bool ElectronBrowserClient::ShouldTreatURLSchemeAsFirstPartyWhenTopLevel(
  1073. std::string_view scheme,
  1074. bool is_embedded_origin_secure) {
  1075. if (is_embedded_origin_secure && scheme == content::kChromeUIScheme)
  1076. return true;
  1077. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  1078. return scheme == extensions::kExtensionScheme;
  1079. #else
  1080. return false;
  1081. #endif
  1082. }
  1083. bool ElectronBrowserClient::WillInterceptWebSocket(
  1084. content::RenderFrameHost* frame) {
  1085. if (!frame)
  1086. return false;
  1087. v8::Isolate* isolate = JavascriptEnvironment::GetIsolate();
  1088. v8::HandleScope scope(isolate);
  1089. auto* browser_context = frame->GetProcess()->GetBrowserContext();
  1090. auto web_request = api::WebRequest::FromOrCreate(isolate, browser_context);
  1091. // NOTE: Some unit test environments do not initialize
  1092. // BrowserContextKeyedAPI factories for e.g. WebRequest.
  1093. if (!web_request.get())
  1094. return false;
  1095. bool has_listener = web_request->HasListener();
  1096. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  1097. const auto* web_request_api =
  1098. extensions::BrowserContextKeyedAPIFactory<extensions::WebRequestAPI>::Get(
  1099. browser_context);
  1100. if (web_request_api)
  1101. has_listener |= web_request_api->MayHaveProxies();
  1102. #endif
  1103. return has_listener;
  1104. }
  1105. void ElectronBrowserClient::CreateWebSocket(
  1106. content::RenderFrameHost* frame,
  1107. WebSocketFactory factory,
  1108. const GURL& url,
  1109. const net::SiteForCookies& site_for_cookies,
  1110. const std::optional<std::string>& user_agent,
  1111. mojo::PendingRemote<network::mojom::WebSocketHandshakeClient>
  1112. handshake_client) {
  1113. v8::Isolate* isolate = JavascriptEnvironment::GetIsolate();
  1114. v8::HandleScope scope(isolate);
  1115. auto* browser_context = frame->GetProcess()->GetBrowserContext();
  1116. auto web_request = api::WebRequest::FromOrCreate(isolate, browser_context);
  1117. DCHECK(web_request.get());
  1118. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  1119. if (!web_request->HasListener()) {
  1120. auto* web_request_api = extensions::BrowserContextKeyedAPIFactory<
  1121. extensions::WebRequestAPI>::Get(browser_context);
  1122. if (web_request_api && web_request_api->MayHaveProxies()) {
  1123. web_request_api->ProxyWebSocket(frame, std::move(factory), url,
  1124. site_for_cookies, user_agent,
  1125. std::move(handshake_client));
  1126. return;
  1127. }
  1128. }
  1129. #endif
  1130. ProxyingWebSocket::StartProxying(
  1131. web_request.get(), std::move(factory), url, site_for_cookies, user_agent,
  1132. std::move(handshake_client), true, frame->GetProcess()->GetID(),
  1133. frame->GetRoutingID(), frame->GetLastCommittedOrigin(), browser_context,
  1134. &next_id_);
  1135. }
  1136. void ElectronBrowserClient::WillCreateURLLoaderFactory(
  1137. content::BrowserContext* browser_context,
  1138. content::RenderFrameHost* frame_host,
  1139. int render_process_id,
  1140. URLLoaderFactoryType type,
  1141. const url::Origin& request_initiator,
  1142. const net::IsolationInfo& isolation_info,
  1143. std::optional<int64_t> navigation_id,
  1144. ukm::SourceIdObj ukm_source_id,
  1145. network::URLLoaderFactoryBuilder& factory_builder,
  1146. mojo::PendingRemote<network::mojom::TrustedURLLoaderHeaderClient>*
  1147. header_client,
  1148. bool* bypass_redirect_checks,
  1149. bool* disable_secure_dns,
  1150. network::mojom::URLLoaderFactoryOverridePtr* factory_override,
  1151. scoped_refptr<base::SequencedTaskRunner> navigation_response_task_runner) {
  1152. v8::Isolate* isolate = JavascriptEnvironment::GetIsolate();
  1153. v8::HandleScope scope(isolate);
  1154. auto web_request = api::WebRequest::FromOrCreate(isolate, browser_context);
  1155. DCHECK(web_request.get());
  1156. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  1157. if (!web_request->HasListener()) {
  1158. auto* web_request_api = extensions::BrowserContextKeyedAPIFactory<
  1159. extensions::WebRequestAPI>::Get(browser_context);
  1160. DCHECK(web_request_api);
  1161. bool used_proxy_for_web_request =
  1162. web_request_api->MaybeProxyURLLoaderFactory(
  1163. browser_context, frame_host, render_process_id, type, navigation_id,
  1164. ukm_source_id, factory_builder, header_client,
  1165. navigation_response_task_runner);
  1166. if (bypass_redirect_checks)
  1167. *bypass_redirect_checks = used_proxy_for_web_request;
  1168. if (used_proxy_for_web_request)
  1169. return;
  1170. }
  1171. #endif
  1172. auto [proxied_receiver, target_factory_remote] = factory_builder.Append();
  1173. // Required by WebRequestInfoInitParams.
  1174. //
  1175. // Note that in Electron we allow webRequest to capture requests sent from
  1176. // browser process, so creation of |navigation_ui_data| is different from
  1177. // Chromium which only does for renderer-initialized navigations.
  1178. std::unique_ptr<extensions::ExtensionNavigationUIData> navigation_ui_data;
  1179. if (navigation_id.has_value()) {
  1180. navigation_ui_data =
  1181. std::make_unique<extensions::ExtensionNavigationUIData>();
  1182. }
  1183. mojo::PendingReceiver<network::mojom::TrustedURLLoaderHeaderClient>
  1184. header_client_receiver;
  1185. if (header_client)
  1186. header_client_receiver = header_client->InitWithNewPipeAndPassReceiver();
  1187. auto* protocol_registry =
  1188. ProtocolRegistry::FromBrowserContext(browser_context);
  1189. new ProxyingURLLoaderFactory(
  1190. web_request.get(), protocol_registry->intercept_handlers(),
  1191. render_process_id,
  1192. frame_host ? frame_host->GetRoutingID() : MSG_ROUTING_NONE, &next_id_,
  1193. std::move(navigation_ui_data), std::move(navigation_id),
  1194. std::move(proxied_receiver), std::move(target_factory_remote),
  1195. std::move(header_client_receiver), type);
  1196. }
  1197. std::vector<std::unique_ptr<content::URLLoaderRequestInterceptor>>
  1198. ElectronBrowserClient::WillCreateURLLoaderRequestInterceptors(
  1199. content::NavigationUIData* navigation_ui_data,
  1200. content::FrameTreeNodeId frame_tree_node_id,
  1201. int64_t navigation_id,
  1202. bool force_no_https_upgrade,
  1203. scoped_refptr<base::SequencedTaskRunner> navigation_response_task_runner) {
  1204. std::vector<std::unique_ptr<content::URLLoaderRequestInterceptor>>
  1205. interceptors;
  1206. #if BUILDFLAG(ENABLE_PDF_VIEWER)
  1207. {
  1208. std::unique_ptr<content::URLLoaderRequestInterceptor> pdf_interceptor =
  1209. pdf::PdfURLLoaderRequestInterceptor::MaybeCreateInterceptor(
  1210. frame_tree_node_id, std::make_unique<ChromePdfStreamDelegate>());
  1211. if (pdf_interceptor)
  1212. interceptors.push_back(std::move(pdf_interceptor));
  1213. }
  1214. #endif
  1215. return interceptors;
  1216. }
  1217. void ElectronBrowserClient::OverrideURLLoaderFactoryParams(
  1218. content::BrowserContext* browser_context,
  1219. const url::Origin& origin,
  1220. bool is_for_isolated_world,
  1221. network::mojom::URLLoaderFactoryParams* factory_params) {
  1222. if (factory_params->top_frame_id) {
  1223. // Bypass CORB and CORS when web security is disabled.
  1224. auto* rfh = content::RenderFrameHost::FromFrameToken(
  1225. content::GlobalRenderFrameHostToken(
  1226. factory_params->process_id,
  1227. blink::LocalFrameToken(factory_params->top_frame_id.value())));
  1228. auto* web_contents = content::WebContents::FromRenderFrameHost(rfh);
  1229. auto* prefs = WebContentsPreferences::From(web_contents);
  1230. if (prefs && !prefs->IsWebSecurityEnabled()) {
  1231. factory_params->is_orb_enabled = false;
  1232. factory_params->disable_web_security = true;
  1233. }
  1234. }
  1235. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  1236. extensions::URLLoaderFactoryManager::OverrideURLLoaderFactoryParams(
  1237. browser_context, origin, is_for_isolated_world, factory_params);
  1238. #endif
  1239. }
  1240. void ElectronBrowserClient::RegisterAssociatedInterfaceBindersForServiceWorker(
  1241. const content::ServiceWorkerVersionBaseInfo& service_worker_version_info,
  1242. blink::AssociatedInterfaceRegistry& associated_registry) {
  1243. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  1244. associated_registry.AddInterface<extensions::mojom::RendererHost>(
  1245. base::BindRepeating(&extensions::RendererStartupHelper::BindForRenderer,
  1246. service_worker_version_info.process_id));
  1247. associated_registry.AddInterface<extensions::mojom::ServiceWorkerHost>(
  1248. base::BindRepeating(&extensions::ServiceWorkerHost::BindReceiver,
  1249. service_worker_version_info.process_id));
  1250. #endif
  1251. }
  1252. void ElectronBrowserClient::
  1253. RegisterAssociatedInterfaceBindersForRenderFrameHost(
  1254. content::RenderFrameHost&
  1255. render_frame_host, // NOLINT(runtime/references)
  1256. blink::AssociatedInterfaceRegistry&
  1257. associated_registry) { // NOLINT(runtime/references)
  1258. auto* contents =
  1259. content::WebContents::FromRenderFrameHost(&render_frame_host);
  1260. if (contents) {
  1261. auto* prefs = WebContentsPreferences::From(contents);
  1262. if (render_frame_host.GetFrameTreeNodeId() ==
  1263. contents->GetPrimaryMainFrame()->GetFrameTreeNodeId() ||
  1264. (prefs && prefs->AllowsNodeIntegrationInSubFrames())) {
  1265. associated_registry.AddInterface<mojom::ElectronApiIPC>(
  1266. base::BindRepeating(
  1267. [](content::RenderFrameHost* render_frame_host,
  1268. mojo::PendingAssociatedReceiver<mojom::ElectronApiIPC>
  1269. receiver) {
  1270. ElectronApiIPCHandlerImpl::Create(render_frame_host,
  1271. std::move(receiver));
  1272. },
  1273. &render_frame_host));
  1274. }
  1275. }
  1276. associated_registry.AddInterface<mojom::ElectronWebContentsUtility>(
  1277. base::BindRepeating(
  1278. [](content::RenderFrameHost* render_frame_host,
  1279. mojo::PendingAssociatedReceiver<mojom::ElectronWebContentsUtility>
  1280. receiver) {
  1281. ElectronWebContentsUtilityHandlerImpl::Create(render_frame_host,
  1282. std::move(receiver));
  1283. },
  1284. &render_frame_host));
  1285. associated_registry.AddInterface<mojom::ElectronAutofillDriver>(
  1286. base::BindRepeating(
  1287. [](content::RenderFrameHost* render_frame_host,
  1288. mojo::PendingAssociatedReceiver<mojom::ElectronAutofillDriver>
  1289. receiver) {
  1290. AutofillDriverFactory::BindAutofillDriver(std::move(receiver),
  1291. render_frame_host);
  1292. },
  1293. &render_frame_host));
  1294. #if BUILDFLAG(ENABLE_PLUGINS)
  1295. associated_registry.AddInterface<mojom::ElectronPluginInfoHost>(
  1296. base::BindRepeating(
  1297. [](content::RenderFrameHost* render_frame_host,
  1298. mojo::PendingAssociatedReceiver<mojom::ElectronPluginInfoHost>
  1299. receiver) {
  1300. mojo::MakeSelfOwnedAssociatedReceiver(
  1301. std::make_unique<ElectronPluginInfoHostImpl>(),
  1302. std::move(receiver));
  1303. },
  1304. &render_frame_host));
  1305. #endif
  1306. #if BUILDFLAG(ENABLE_PRINTING)
  1307. associated_registry.AddInterface<printing::mojom::PrintManagerHost>(
  1308. base::BindRepeating(
  1309. [](content::RenderFrameHost* render_frame_host,
  1310. mojo::PendingAssociatedReceiver<printing::mojom::PrintManagerHost>
  1311. receiver) {
  1312. PrintViewManagerElectron::BindPrintManagerHost(std::move(receiver),
  1313. render_frame_host);
  1314. },
  1315. &render_frame_host));
  1316. #endif
  1317. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  1318. int render_process_id = render_frame_host.GetProcess()->GetID();
  1319. associated_registry.AddInterface<extensions::mojom::EventRouter>(
  1320. base::BindRepeating(&extensions::EventRouter::BindForRenderer,
  1321. render_process_id));
  1322. associated_registry.AddInterface<extensions::mojom::RendererHost>(
  1323. base::BindRepeating(&extensions::RendererStartupHelper::BindForRenderer,
  1324. render_process_id));
  1325. associated_registry.AddInterface<extensions::mojom::LocalFrameHost>(
  1326. base::BindRepeating(
  1327. [](content::RenderFrameHost* render_frame_host,
  1328. mojo::PendingAssociatedReceiver<extensions::mojom::LocalFrameHost>
  1329. receiver) {
  1330. extensions::ExtensionWebContentsObserver::BindLocalFrameHost(
  1331. std::move(receiver), render_frame_host);
  1332. },
  1333. &render_frame_host));
  1334. associated_registry.AddInterface<guest_view::mojom::GuestViewHost>(
  1335. base::BindRepeating(&extensions::ExtensionsGuestView::CreateForComponents,
  1336. render_frame_host.GetGlobalId()));
  1337. associated_registry.AddInterface<extensions::mojom::GuestView>(
  1338. base::BindRepeating(&extensions::ExtensionsGuestView::CreateForExtensions,
  1339. render_frame_host.GetGlobalId()));
  1340. #endif
  1341. #if BUILDFLAG(ENABLE_PDF_VIEWER)
  1342. associated_registry.AddInterface<pdf::mojom::PdfHost>(base::BindRepeating(
  1343. [](content::RenderFrameHost* render_frame_host,
  1344. mojo::PendingAssociatedReceiver<pdf::mojom::PdfHost> receiver) {
  1345. pdf::PDFDocumentHelper::BindPdfHost(
  1346. std::move(receiver), render_frame_host,
  1347. std::make_unique<ElectronPDFDocumentHelperClient>());
  1348. },
  1349. &render_frame_host));
  1350. #endif
  1351. }
  1352. std::string ElectronBrowserClient::GetApplicationLocale() {
  1353. return BrowserThread::CurrentlyOn(BrowserThread::IO)
  1354. ? *g_io_thread_application_locale
  1355. : *g_application_locale;
  1356. }
  1357. bool ElectronBrowserClient::ShouldEnableStrictSiteIsolation() {
  1358. // Enable site isolation. It is off by default in Chromium <= 69.
  1359. return true;
  1360. }
  1361. void ElectronBrowserClient::BindHostReceiverForRenderer(
  1362. content::RenderProcessHost* render_process_host,
  1363. mojo::GenericPendingReceiver receiver) {
  1364. #if BUILDFLAG(ENABLE_BUILTIN_SPELLCHECKER)
  1365. if (auto host_receiver =
  1366. receiver.As<spellcheck::mojom::SpellCheckInitializationHost>()) {
  1367. SpellCheckInitializationHostImpl::Create(render_process_host->GetID(),
  1368. std::move(host_receiver));
  1369. return;
  1370. }
  1371. #endif
  1372. }
  1373. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  1374. namespace {
  1375. void BindMimeHandlerService(
  1376. content::RenderFrameHost* frame_host,
  1377. mojo::PendingReceiver<extensions::mime_handler::MimeHandlerService>
  1378. receiver) {
  1379. content::WebContents* contents =
  1380. content::WebContents::FromRenderFrameHost(frame_host);
  1381. auto* guest_view =
  1382. extensions::MimeHandlerViewGuest::FromWebContents(contents);
  1383. if (!guest_view)
  1384. return;
  1385. extensions::MimeHandlerServiceImpl::Create(guest_view->GetStreamWeakPtr(),
  1386. std::move(receiver));
  1387. }
  1388. void BindBeforeUnloadControl(
  1389. content::RenderFrameHost* frame_host,
  1390. mojo::PendingReceiver<extensions::mime_handler::BeforeUnloadControl>
  1391. receiver) {
  1392. auto* web_contents = content::WebContents::FromRenderFrameHost(frame_host);
  1393. if (!web_contents)
  1394. return;
  1395. auto* guest_view =
  1396. extensions::MimeHandlerViewGuest::FromWebContents(web_contents);
  1397. if (!guest_view)
  1398. return;
  1399. guest_view->FuseBeforeUnloadControl(std::move(receiver));
  1400. }
  1401. } // namespace
  1402. #endif
  1403. void ElectronBrowserClient::ExposeInterfacesToRenderer(
  1404. service_manager::BinderRegistry* registry,
  1405. blink::AssociatedInterfaceRegistry* associated_registry,
  1406. content::RenderProcessHost* render_process_host) {
  1407. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  1408. associated_registry->AddInterface<extensions::mojom::RendererHost>(
  1409. base::BindRepeating(&extensions::RendererStartupHelper::BindForRenderer,
  1410. render_process_host->GetID()));
  1411. #endif
  1412. }
  1413. void ElectronBrowserClient::RegisterBrowserInterfaceBindersForFrame(
  1414. content::RenderFrameHost* render_frame_host,
  1415. mojo::BinderMapWithContext<content::RenderFrameHost*>* map) {
  1416. map->Add<network_hints::mojom::NetworkHintsHandler>(
  1417. base::BindRepeating(&BindNetworkHintsHandler));
  1418. map->Add<blink::mojom::BadgeService>(
  1419. base::BindRepeating(&badging::BadgeManager::BindFrameReceiver));
  1420. map->Add<blink::mojom::KeyboardLockService>(base::BindRepeating(
  1421. &content::KeyboardLockServiceImpl::CreateMojoService));
  1422. #if BUILDFLAG(ENABLE_BUILTIN_SPELLCHECKER)
  1423. map->Add<spellcheck::mojom::SpellCheckHost>(base::BindRepeating(
  1424. [](content::RenderFrameHost* frame_host,
  1425. mojo::PendingReceiver<spellcheck::mojom::SpellCheckHost> receiver) {
  1426. SpellCheckHostChromeImpl::Create(frame_host->GetProcess()->GetID(),
  1427. std::move(receiver));
  1428. }));
  1429. #endif
  1430. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  1431. map->Add<extensions::mime_handler::MimeHandlerService>(
  1432. base::BindRepeating(&BindMimeHandlerService));
  1433. map->Add<extensions::mime_handler::BeforeUnloadControl>(
  1434. base::BindRepeating(&BindBeforeUnloadControl));
  1435. content::WebContents* web_contents =
  1436. content::WebContents::FromRenderFrameHost(render_frame_host);
  1437. if (!web_contents)
  1438. return;
  1439. const GURL& site = render_frame_host->GetSiteInstance()->GetSiteURL();
  1440. if (!site.SchemeIs(extensions::kExtensionScheme))
  1441. return;
  1442. content::BrowserContext* browser_context =
  1443. render_frame_host->GetProcess()->GetBrowserContext();
  1444. auto* extension = extensions::ExtensionRegistry::Get(browser_context)
  1445. ->enabled_extensions()
  1446. .GetByID(site.host());
  1447. if (!extension)
  1448. return;
  1449. extensions::ExtensionsBrowserClient::Get()
  1450. ->RegisterBrowserInterfaceBindersForFrame(map, render_frame_host,
  1451. extension);
  1452. #endif
  1453. }
  1454. #if BUILDFLAG(IS_LINUX)
  1455. void ElectronBrowserClient::GetAdditionalMappedFilesForChildProcess(
  1456. const base::CommandLine& command_line,
  1457. int child_process_id,
  1458. content::PosixFileDescriptorInfo* mappings) {
  1459. int crash_signal_fd = GetCrashSignalFD(command_line);
  1460. if (crash_signal_fd >= 0) {
  1461. mappings->Share(kCrashDumpSignal, crash_signal_fd);
  1462. }
  1463. }
  1464. #endif
  1465. std::unique_ptr<content::LoginDelegate>
  1466. ElectronBrowserClient::CreateLoginDelegate(
  1467. const net::AuthChallengeInfo& auth_info,
  1468. content::WebContents* web_contents,
  1469. content::BrowserContext* browser_context,
  1470. const content::GlobalRequestID& request_id,
  1471. bool is_request_for_primary_main_frame,
  1472. bool is_request_for_navigation,
  1473. const GURL& url,
  1474. scoped_refptr<net::HttpResponseHeaders> response_headers,
  1475. bool first_auth_attempt,
  1476. LoginAuthRequiredCallback auth_required_callback) {
  1477. return std::make_unique<LoginHandler>(
  1478. auth_info, web_contents, is_request_for_primary_main_frame,
  1479. is_request_for_navigation, base::kNullProcessId, url, response_headers,
  1480. first_auth_attempt, std::move(auth_required_callback));
  1481. }
  1482. std::vector<std::unique_ptr<blink::URLLoaderThrottle>>
  1483. ElectronBrowserClient::CreateURLLoaderThrottles(
  1484. const network::ResourceRequest& request,
  1485. content::BrowserContext* browser_context,
  1486. const base::RepeatingCallback<content::WebContents*()>& wc_getter,
  1487. content::NavigationUIData* navigation_ui_data,
  1488. content::FrameTreeNodeId frame_tree_node_id,
  1489. std::optional<int64_t> navigation_id) {
  1490. DCHECK_CURRENTLY_ON(BrowserThread::UI);
  1491. std::vector<std::unique_ptr<blink::URLLoaderThrottle>> result;
  1492. #if BUILDFLAG(ENABLE_PLUGINS) && BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  1493. result.push_back(std::make_unique<PluginResponseInterceptorURLLoaderThrottle>(
  1494. request.destination, frame_tree_node_id));
  1495. #endif
  1496. return result;
  1497. }
  1498. base::flat_set<std::string>
  1499. ElectronBrowserClient::GetPluginMimeTypesWithExternalHandlers(
  1500. content::BrowserContext* browser_context) {
  1501. base::flat_set<std::string> mime_types;
  1502. #if BUILDFLAG(ENABLE_PLUGINS) && BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  1503. auto map = PluginUtils::GetMimeTypeToExtensionIdMap(browser_context);
  1504. for (const auto& pair : map)
  1505. mime_types.insert(pair.first);
  1506. #endif
  1507. #if BUILDFLAG(ENABLE_PDF_VIEWER)
  1508. mime_types.insert(pdf::kInternalPluginMimeType);
  1509. #endif
  1510. return mime_types;
  1511. }
  1512. content::SerialDelegate* ElectronBrowserClient::GetSerialDelegate() {
  1513. if (!serial_delegate_)
  1514. serial_delegate_ = std::make_unique<ElectronSerialDelegate>();
  1515. return serial_delegate_.get();
  1516. }
  1517. content::BluetoothDelegate* ElectronBrowserClient::GetBluetoothDelegate() {
  1518. if (!bluetooth_delegate_)
  1519. bluetooth_delegate_ = std::make_unique<ElectronBluetoothDelegate>();
  1520. return bluetooth_delegate_.get();
  1521. }
  1522. content::UsbDelegate* ElectronBrowserClient::GetUsbDelegate() {
  1523. if (!usb_delegate_)
  1524. usb_delegate_ = std::make_unique<ElectronUsbDelegate>();
  1525. return usb_delegate_.get();
  1526. }
  1527. namespace {
  1528. void BindBadgeServiceForServiceWorker(
  1529. const content::ServiceWorkerVersionBaseInfo& info,
  1530. mojo::PendingReceiver<blink::mojom::BadgeService> receiver) {
  1531. DCHECK_CURRENTLY_ON(content::BrowserThread::UI);
  1532. content::RenderProcessHost* render_process_host =
  1533. content::RenderProcessHost::FromID(info.process_id);
  1534. if (!render_process_host)
  1535. return;
  1536. badging::BadgeManager::BindServiceWorkerReceiver(
  1537. render_process_host, info.scope, std::move(receiver));
  1538. }
  1539. } // namespace
  1540. void ElectronBrowserClient::RegisterBrowserInterfaceBindersForServiceWorker(
  1541. content::BrowserContext* browser_context,
  1542. const content::ServiceWorkerVersionBaseInfo& service_worker_version_info,
  1543. mojo::BinderMapWithContext<const content::ServiceWorkerVersionBaseInfo&>*
  1544. map) {
  1545. map->Add<blink::mojom::BadgeService>(
  1546. base::BindRepeating(&BindBadgeServiceForServiceWorker));
  1547. }
  1548. #if BUILDFLAG(IS_MAC)
  1549. device::GeolocationSystemPermissionManager*
  1550. ElectronBrowserClient::GetGeolocationSystemPermissionManager() {
  1551. return device::GeolocationSystemPermissionManager::GetInstance();
  1552. }
  1553. #endif
  1554. content::HidDelegate* ElectronBrowserClient::GetHidDelegate() {
  1555. if (!hid_delegate_)
  1556. hid_delegate_ = std::make_unique<ElectronHidDelegate>();
  1557. return hid_delegate_.get();
  1558. }
  1559. content::WebAuthenticationDelegate*
  1560. ElectronBrowserClient::GetWebAuthenticationDelegate() {
  1561. if (!web_authentication_delegate_) {
  1562. web_authentication_delegate_ =
  1563. std::make_unique<ElectronWebAuthenticationDelegate>();
  1564. }
  1565. return web_authentication_delegate_.get();
  1566. }
  1567. } // namespace electron