123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767 |
- // Copyright (c) 2013 GitHub, Inc.
- // Use of this source code is governed by the MIT license that can be
- // found in the LICENSE file.
- #include "shell/browser/electron_browser_client.h"
- #if BUILDFLAG(IS_WIN)
- #include <shlobj.h>
- #endif
- #include <memory>
- #include <string_view>
- #include <utility>
- #include "base/base_switches.h"
- #include "base/command_line.h"
- #include "base/debug/crash_logging.h"
- #include "base/environment.h"
- #include "base/files/file_path.h"
- #include "base/files/file_util.h"
- #include "base/no_destructor.h"
- #include "base/path_service.h"
- #include "base/process/process_metrics.h"
- #include "base/strings/escape.h"
- #include "base/strings/string_util.h"
- #include "chrome/browser/browser_process.h"
- #include "chrome/common/chrome_paths.h"
- #include "chrome/common/chrome_switches.h"
- #include "chrome/common/chrome_version.h"
- #include "components/embedder_support/user_agent_utils.h"
- #include "components/net_log/chrome_net_log.h"
- #include "components/network_hints/common/network_hints.mojom.h"
- #include "content/browser/keyboard_lock/keyboard_lock_service_impl.h" // nogncheck
- #include "content/public/browser/browser_main_runner.h"
- #include "content/public/browser/browser_task_traits.h"
- #include "content/public/browser/client_certificate_delegate.h"
- #include "content/public/browser/login_delegate.h"
- #include "content/public/browser/overlay_window.h"
- #include "content/public/browser/render_frame_host.h"
- #include "content/public/browser/render_process_host.h"
- #include "content/public/browser/render_view_host.h"
- #include "content/public/browser/service_worker_version_base_info.h"
- #include "content/public/browser/site_instance.h"
- #include "content/public/browser/tts_controller.h"
- #include "content/public/browser/tts_platform.h"
- #include "content/public/browser/url_loader_request_interceptor.h"
- #include "content/public/browser/weak_document_ptr.h"
- #include "content/public/common/content_descriptors.h"
- #include "content/public/common/content_paths.h"
- #include "content/public/common/content_switches.h"
- #include "content/public/common/url_constants.h"
- #include "crypto/crypto_buildflags.h"
- #include "electron/buildflags/buildflags.h"
- #include "electron/fuses.h"
- #include "extensions/browser/extension_navigation_ui_data.h"
- #include "extensions/common/extension_id.h"
- #include "mojo/public/cpp/bindings/binder_map.h"
- #include "mojo/public/cpp/bindings/self_owned_associated_receiver.h"
- #include "net/ssl/ssl_cert_request_info.h"
- #include "net/ssl/ssl_private_key.h"
- #include "printing/buildflags/buildflags.h"
- #include "services/device/public/cpp/geolocation/geolocation_system_permission_manager.h"
- #include "services/device/public/cpp/geolocation/location_provider.h"
- #include "services/network/public/cpp/features.h"
- #include "services/network/public/cpp/is_potentially_trustworthy.h"
- #include "services/network/public/cpp/network_switches.h"
- #include "services/network/public/cpp/resource_request_body.h"
- #include "services/network/public/cpp/self_deleting_url_loader_factory.h"
- #include "services/network/public/cpp/url_loader_factory_builder.h"
- #include "shell/app/electron_crash_reporter_client.h"
- #include "shell/browser/api/electron_api_app.h"
- #include "shell/browser/api/electron_api_crash_reporter.h"
- #include "shell/browser/api/electron_api_protocol.h"
- #include "shell/browser/api/electron_api_web_contents.h"
- #include "shell/browser/api/electron_api_web_request.h"
- #include "shell/browser/badging/badge_manager.h"
- #include "shell/browser/bluetooth/electron_bluetooth_delegate.h"
- #include "shell/browser/child_web_contents_tracker.h"
- #include "shell/browser/electron_api_ipc_handler_impl.h"
- #include "shell/browser/electron_autofill_driver_factory.h"
- #include "shell/browser/electron_browser_context.h"
- #include "shell/browser/electron_browser_main_parts.h"
- #include "shell/browser/electron_navigation_throttle.h"
- #include "shell/browser/electron_plugin_info_host_impl.h"
- #include "shell/browser/electron_speech_recognition_manager_delegate.h"
- #include "shell/browser/electron_web_contents_utility_handler_impl.h"
- #include "shell/browser/font_defaults.h"
- #include "shell/browser/hid/electron_hid_delegate.h"
- #include "shell/browser/javascript_environment.h"
- #include "shell/browser/login_handler.h"
- #include "shell/browser/media/media_capture_devices_dispatcher.h"
- #include "shell/browser/native_window.h"
- #include "shell/browser/net/network_context_service.h"
- #include "shell/browser/net/network_context_service_factory.h"
- #include "shell/browser/net/proxying_url_loader_factory.h"
- #include "shell/browser/net/proxying_websocket.h"
- #include "shell/browser/net/system_network_context_manager.h"
- #include "shell/browser/network_hints_handler_impl.h"
- #include "shell/browser/notifications/notification_presenter.h"
- #include "shell/browser/notifications/platform_notification_service.h"
- #include "shell/browser/protocol_registry.h"
- #include "shell/browser/serial/electron_serial_delegate.h"
- #include "shell/browser/session_preferences.h"
- #include "shell/browser/ui/devtools_manager_delegate.h"
- #include "shell/browser/usb/electron_usb_delegate.h"
- #include "shell/browser/web_contents_permission_helper.h"
- #include "shell/browser/web_contents_preferences.h"
- #include "shell/browser/webauthn/electron_authenticator_request_delegate.h"
- #include "shell/browser/window_list.h"
- #include "shell/common/api/api.mojom.h"
- #include "shell/common/application_info.h"
- #include "shell/common/electron_paths.h"
- #include "shell/common/logging.h"
- #include "shell/common/options_switches.h"
- #include "shell/common/platform_util.h"
- #include "shell/common/plugin.mojom.h"
- #include "shell/common/thread_restrictions.h"
- #include "shell/common/web_contents_utility.mojom.h"
- #include "third_party/blink/public/common/associated_interfaces/associated_interface_registry.h"
- #include "third_party/blink/public/common/loader/url_loader_throttle.h"
- #include "third_party/blink/public/common/renderer_preferences/renderer_preferences.h"
- #include "third_party/blink/public/common/tokens/tokens.h"
- #include "third_party/blink/public/common/web_preferences/web_preferences.h"
- #include "third_party/blink/public/mojom/badging/badging.mojom.h"
- #include "ui/base/resource/resource_bundle.h"
- #include "ui/native_theme/native_theme.h"
- #include "v8/include/v8.h"
- #if BUILDFLAG(USE_NSS_CERTS)
- #include "net/ssl/client_cert_store_nss.h"
- #include "shell/browser/electron_crypto_module_delegate_nss.h"
- #elif BUILDFLAG(IS_WIN)
- #include "net/ssl/client_cert_store_win.h"
- #elif BUILDFLAG(IS_MAC)
- #include "net/ssl/client_cert_store_mac.h"
- #elif defined(USE_OPENSSL)
- #include "net/ssl/client_cert_store.h"
- #endif
- #if BUILDFLAG(ENABLE_BUILTIN_SPELLCHECKER)
- #include "chrome/browser/spellchecker/spell_check_host_chrome_impl.h" // nogncheck
- #include "chrome/browser/spellchecker/spell_check_initialization_host_impl.h" // nogncheck
- #include "components/spellcheck/common/spellcheck.mojom.h" // nogncheck
- #endif
- #if BUILDFLAG(OVERRIDE_LOCATION_PROVIDER)
- #include "shell/browser/fake_location_provider.h"
- #endif // BUILDFLAG(OVERRIDE_LOCATION_PROVIDER)
- #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
- #include "base/functional/bind.h"
- #include "chrome/common/webui_url_constants.h"
- #include "components/guest_view/common/guest_view.mojom.h"
- #include "content/public/browser/child_process_security_policy.h"
- #include "content/public/browser/file_url_loader.h"
- #include "content/public/browser/web_ui_url_loader_factory.h"
- #include "extensions/browser/api/mime_handler_private/mime_handler_private.h"
- #include "extensions/browser/api/web_request/web_request_api.h"
- #include "extensions/browser/browser_context_keyed_api_factory.h"
- #include "extensions/browser/event_router.h"
- #include "extensions/browser/extension_host.h"
- #include "extensions/browser/extension_navigation_throttle.h"
- #include "extensions/browser/extension_prefs.h"
- #include "extensions/browser/extension_protocols.h"
- #include "extensions/browser/extension_registry.h"
- #include "extensions/browser/extensions_browser_client.h"
- #include "extensions/browser/guest_view/extensions_guest_view.h"
- #include "extensions/browser/guest_view/mime_handler_view/mime_handler_view_guest.h"
- #include "extensions/browser/process_manager.h"
- #include "extensions/browser/process_map.h"
- #include "extensions/browser/renderer_startup_helper.h"
- #include "extensions/browser/service_worker/service_worker_host.h"
- #include "extensions/browser/url_loader_factory_manager.h"
- #include "extensions/common/api/mime_handler.mojom.h"
- #include "extensions/common/constants.h"
- #include "extensions/common/extension.h"
- #include "extensions/common/mojom/event_router.mojom.h"
- #include "extensions/common/mojom/guest_view.mojom.h"
- #include "extensions/common/mojom/renderer_host.mojom.h"
- #include "extensions/common/switches.h"
- #include "shell/browser/extensions/electron_extension_system.h"
- #include "shell/browser/extensions/electron_extension_web_contents_observer.h"
- #endif
- #if BUILDFLAG(ENABLE_PLUGINS)
- #include "chrome/browser/plugins/plugin_response_interceptor_url_loader_throttle.h" // nogncheck
- #include "shell/browser/plugins/plugin_utils.h"
- #endif
- #if BUILDFLAG(IS_MAC)
- #include "content/browser/mac_helpers.h"
- #include "content/public/browser/child_process_host.h"
- #endif
- #if BUILDFLAG(IS_LINUX)
- #include "components/crash/core/app/crash_switches.h" // nogncheck
- #include "components/crash/core/app/crashpad.h" // nogncheck
- #endif
- #if BUILDFLAG(IS_WIN)
- #include "chrome/browser/ui/views/overlay/video_overlay_window_views.h"
- #include "shell/browser/browser.h"
- #include "ui/aura/window.h"
- #include "ui/aura/window_tree_host.h"
- #include "ui/base/win/shell.h"
- #include "ui/views/widget/widget.h"
- #endif
- #if BUILDFLAG(ENABLE_PRINTING)
- #include "shell/browser/printing/print_view_manager_electron.h"
- #endif
- #if BUILDFLAG(ENABLE_PDF_VIEWER)
- #include "chrome/browser/pdf/chrome_pdf_stream_delegate.h"
- #include "chrome/browser/plugins/pdf_iframe_navigation_throttle.h" // nogncheck
- #include "components/pdf/browser/pdf_document_helper.h" // nogncheck
- #include "components/pdf/browser/pdf_navigation_throttle.h"
- #include "components/pdf/browser/pdf_url_loader_request_interceptor.h"
- #include "components/pdf/common/constants.h" // nogncheck
- #include "shell/browser/electron_pdf_document_helper_client.h"
- #endif
- using content::BrowserThread;
- namespace electron {
- namespace {
- ElectronBrowserClient* g_browser_client = nullptr;
- base::NoDestructor<std::string> g_io_thread_application_locale;
- base::NoDestructor<std::string> g_application_locale;
- void SetApplicationLocaleOnIOThread(const std::string& locale) {
- DCHECK_CURRENTLY_ON(BrowserThread::IO);
- *g_io_thread_application_locale = locale;
- }
- void BindNetworkHintsHandler(
- content::RenderFrameHost* frame_host,
- mojo::PendingReceiver<network_hints::mojom::NetworkHintsHandler> receiver) {
- NetworkHintsHandlerImpl::Create(frame_host, std::move(receiver));
- }
- #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
- // Used by the GetPrivilegeRequiredByUrl() and GetProcessPrivilege() functions
- // below. Extension, and isolated apps require different privileges to be
- // granted to their RenderProcessHosts. This classification allows us to make
- // sure URLs are served by hosts with the right set of privileges.
- enum class RenderProcessHostPrivilege {
- kNormal,
- kHosted,
- kIsolated,
- kExtension,
- };
- // Copied from chrome/browser/extensions/extension_util.cc.
- bool AllowFileAccess(const std::string& extension_id,
- content::BrowserContext* context) {
- return base::CommandLine::ForCurrentProcess()->HasSwitch(
- extensions::switches::kDisableExtensionsFileAccessCheck) ||
- extensions::ExtensionPrefs::Get(context)->AllowFileAccess(
- extension_id);
- }
- RenderProcessHostPrivilege GetPrivilegeRequiredByUrl(const GURL& url) {
- // Default to a normal renderer cause it is lower privileged. This should only
- // occur if the URL on a site instance is either malformed, or uninitialized.
- // If it is malformed, then there is no need for better privileges anyways.
- // If it is uninitialized, but eventually settles on being an a scheme other
- // than normal webrenderer, the navigation logic will correct us out of band
- // anyways.
- if (!url.is_valid())
- return RenderProcessHostPrivilege::kNormal;
- if (!url.SchemeIs(extensions::kExtensionScheme))
- return RenderProcessHostPrivilege::kNormal;
- return RenderProcessHostPrivilege::kExtension;
- }
- RenderProcessHostPrivilege GetProcessPrivilege(
- content::RenderProcessHost* process_host,
- extensions::ProcessMap* process_map) {
- std::optional<extensions::ExtensionId> extension_id =
- process_map->GetExtensionIdForProcess(process_host->GetID());
- if (!extension_id.has_value())
- return RenderProcessHostPrivilege::kNormal;
- return RenderProcessHostPrivilege::kExtension;
- }
- const extensions::Extension* GetEnabledExtensionFromEffectiveURL(
- content::BrowserContext* context,
- const GURL& effective_url) {
- if (!effective_url.SchemeIs(extensions::kExtensionScheme))
- return nullptr;
- extensions::ExtensionRegistry* registry =
- extensions::ExtensionRegistry::Get(context);
- if (!registry)
- return nullptr;
- return registry->enabled_extensions().GetByID(effective_url.host());
- }
- #endif // BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
- #if BUILDFLAG(IS_LINUX)
- int GetCrashSignalFD(const base::CommandLine& command_line) {
- int fd;
- return crash_reporter::GetHandlerSocket(&fd, nullptr) ? fd : -1;
- }
- #endif // BUILDFLAG(IS_LINUX)
- void MaybeAppendSecureOriginsAllowlistSwitch(base::CommandLine* cmdline) {
- // |allowlist| combines pref/policy + cmdline switch in the browser process.
- // For renderer and utility (e.g. NetworkService) processes the switch is the
- // only available source, so below the combined (pref/policy + cmdline)
- // allowlist of secure origins is injected into |cmdline| for these other
- // processes.
- std::vector<std::string> allowlist =
- network::SecureOriginAllowlist::GetInstance().GetCurrentAllowlist();
- if (!allowlist.empty()) {
- cmdline->AppendSwitchASCII(
- network::switches::kUnsafelyTreatInsecureOriginAsSecure,
- base::JoinString(allowlist, ","));
- }
- }
- } // namespace
- // static
- ElectronBrowserClient* ElectronBrowserClient::Get() {
- return g_browser_client;
- }
- // static
- void ElectronBrowserClient::SetApplicationLocale(const std::string& locale) {
- if (!BrowserThread::IsThreadInitialized(BrowserThread::IO) ||
- !content::GetIOThreadTaskRunner({})->PostTask(
- FROM_HERE, base::BindOnce(&SetApplicationLocaleOnIOThread, locale))) {
- *g_io_thread_application_locale = locale;
- }
- *g_application_locale = locale;
- }
- ElectronBrowserClient::ElectronBrowserClient() {
- DCHECK(!g_browser_client);
- g_browser_client = this;
- }
- ElectronBrowserClient::~ElectronBrowserClient() {
- DCHECK(g_browser_client);
- g_browser_client = nullptr;
- }
- content::WebContents* ElectronBrowserClient::GetWebContentsFromProcessID(
- int process_id) {
- // If the process is a pending process, we should use the web contents
- // for the frame host passed into RegisterPendingProcess.
- const auto iter = pending_processes_.find(process_id);
- if (iter != std::end(pending_processes_))
- return iter->second;
- // Certain render process will be created with no associated render view,
- // for example: ServiceWorker.
- return WebContentsPreferences::GetWebContentsFromProcessID(process_id);
- }
- content::SiteInstance* ElectronBrowserClient::GetSiteInstanceFromAffinity(
- content::BrowserContext* browser_context,
- const GURL& url,
- content::RenderFrameHost* rfh) const {
- return nullptr;
- }
- bool ElectronBrowserClient::IsRendererSubFrame(int process_id) const {
- return renderer_is_subframe_.contains(process_id);
- }
- void ElectronBrowserClient::RenderProcessWillLaunch(
- content::RenderProcessHost* host) {
- // Remove in case the host is reused after a crash, otherwise noop.
- host->RemoveObserver(this);
- // ensure the ProcessPreferences is removed later
- host->AddObserver(this);
- }
- content::SpeechRecognitionManagerDelegate*
- ElectronBrowserClient::CreateSpeechRecognitionManagerDelegate() {
- return new ElectronSpeechRecognitionManagerDelegate;
- }
- content::TtsPlatform* ElectronBrowserClient::GetTtsPlatform() {
- return nullptr;
- }
- void ElectronBrowserClient::OverrideWebkitPrefs(
- content::WebContents* web_contents,
- blink::web_pref::WebPreferences* prefs) {
- prefs->javascript_enabled = true;
- prefs->web_security_enabled = true;
- prefs->plugins_enabled = true;
- prefs->dom_paste_enabled = false;
- prefs->javascript_can_access_clipboard = false;
- prefs->allow_scripts_to_close_windows = true;
- prefs->local_storage_enabled = true;
- prefs->databases_enabled = true;
- prefs->allow_universal_access_from_file_urls =
- electron::fuses::IsGrantFileProtocolExtraPrivilegesEnabled();
- prefs->allow_file_access_from_file_urls =
- electron::fuses::IsGrantFileProtocolExtraPrivilegesEnabled();
- prefs->webgl1_enabled = true;
- prefs->webgl2_enabled = true;
- prefs->allow_running_insecure_content = false;
- prefs->default_minimum_page_scale_factor = 1.f;
- prefs->default_maximum_page_scale_factor = 1.f;
- blink::RendererPreferences* renderer_prefs =
- web_contents->GetMutableRendererPrefs();
- renderer_prefs->can_accept_load_drops = false;
- ui::NativeTheme* native_theme = ui::NativeTheme::GetInstanceForNativeUi();
- prefs->in_forced_colors = native_theme->InForcedColorsMode();
- prefs->preferred_color_scheme =
- native_theme->ShouldUseDarkColors()
- ? blink::mojom::PreferredColorScheme::kDark
- : blink::mojom::PreferredColorScheme::kLight;
- SetFontDefaults(prefs);
- // Custom preferences of guest page.
- auto* web_preferences = WebContentsPreferences::From(web_contents);
- if (web_preferences) {
- web_preferences->OverrideWebkitPrefs(prefs, renderer_prefs);
- }
- }
- void ElectronBrowserClient::RegisterPendingSiteInstance(
- content::RenderFrameHost* rfh,
- content::SiteInstance* pending_site_instance) {
- // Remember the original web contents for the pending renderer process.
- auto* web_contents = content::WebContents::FromRenderFrameHost(rfh);
- auto* pending_process = pending_site_instance->GetProcess();
- pending_processes_[pending_process->GetID()] = web_contents;
- if (rfh->GetParent())
- renderer_is_subframe_.insert(pending_process->GetID());
- else
- renderer_is_subframe_.erase(pending_process->GetID());
- }
- void ElectronBrowserClient::AppendExtraCommandLineSwitches(
- base::CommandLine* command_line,
- int process_id) {
- // Make sure we're about to launch a known executable
- #if BUILDFLAG(IS_LINUX)
- // On Linux, do not perform this check for /proc/self/exe. It will always
- // point to the currently running executable so this check is not
- // necessary, and if the executable has been deleted it will return a fake
- // name that causes this check to fail.
- if (command_line->GetProgram() != base::FilePath(base::kProcSelfExe)) {
- #else
- {
- #endif
- ScopedAllowBlockingForElectron allow_blocking;
- base::FilePath child_path;
- base::FilePath program =
- base::MakeAbsoluteFilePath(command_line->GetProgram());
- #if BUILDFLAG(IS_MAC)
- auto renderer_child_path = content::ChildProcessHost::GetChildPath(
- content::ChildProcessHost::CHILD_RENDERER);
- auto gpu_child_path = content::ChildProcessHost::GetChildPath(
- content::ChildProcessHost::CHILD_GPU);
- auto plugin_child_path = content::ChildProcessHost::GetChildPath(
- content::ChildProcessHost::CHILD_PLUGIN);
- if (program != renderer_child_path && program != gpu_child_path &&
- program != plugin_child_path) {
- child_path = content::ChildProcessHost::GetChildPath(
- content::ChildProcessHost::CHILD_NORMAL);
- CHECK_EQ(program, child_path)
- << "Aborted from launching unexpected helper executable";
- }
- #else
- if (!base::PathService::Get(content::CHILD_PROCESS_EXE, &child_path)) {
- CHECK(false) << "Unable to get child process binary name.";
- }
- SCOPED_CRASH_KEY_STRING256("ChildProcess", "child_process_exe",
- child_path.AsUTF8Unsafe());
- SCOPED_CRASH_KEY_STRING256("ChildProcess", "program",
- program.AsUTF8Unsafe());
- CHECK_EQ(program, child_path);
- #endif
- }
- std::string process_type =
- command_line->GetSwitchValueASCII(::switches::kProcessType);
- #if BUILDFLAG(IS_LINUX)
- pid_t pid;
- if (crash_reporter::GetHandlerSocket(nullptr, &pid)) {
- command_line->AppendSwitchASCII(
- crash_reporter::switches::kCrashpadHandlerPid,
- base::NumberToString(pid));
- }
- // Zygote Process gets booted before any JS runs, accessing GetClientId
- // will end up touching DIR_USER_DATA path provider and this will
- // configure default value because app.name from browser_init has
- // not run yet.
- if (process_type != ::switches::kZygoteProcess) {
- std::string switch_value =
- api::crash_reporter::GetClientId() + ",no_channel";
- command_line->AppendSwitchASCII(::switches::kEnableCrashReporter,
- switch_value);
- }
- #endif
- // The zygote process is booted before JS runs, so DIR_USER_DATA isn't usable
- // at that time. It doesn't need --user-data-dir to be correct anyway, since
- // the zygote itself doesn't access anything in that directory.
- if (process_type != ::switches::kZygoteProcess) {
- base::FilePath user_data_dir;
- if (base::PathService::Get(chrome::DIR_USER_DATA, &user_data_dir))
- command_line->AppendSwitchPath(::switches::kUserDataDir, user_data_dir);
- }
- if (process_type == ::switches::kUtilityProcess ||
- process_type == ::switches::kRendererProcess) {
- // Copy following switches to child process.
- static const char* const kCommonSwitchNames[] = {
- switches::kStandardSchemes, switches::kEnableSandbox,
- switches::kSecureSchemes, switches::kBypassCSPSchemes,
- switches::kCORSSchemes, switches::kFetchSchemes,
- switches::kServiceWorkerSchemes, switches::kStreamingSchemes,
- switches::kCodeCacheSchemes};
- command_line->CopySwitchesFrom(*base::CommandLine::ForCurrentProcess(),
- kCommonSwitchNames);
- if (process_type == ::switches::kUtilityProcess ||
- content::RenderProcessHost::FromID(process_id)) {
- MaybeAppendSecureOriginsAllowlistSwitch(command_line);
- }
- }
- if (process_type == ::switches::kRendererProcess) {
- #if BUILDFLAG(IS_WIN)
- // Append --app-user-model-id.
- PWSTR current_app_id;
- if (SUCCEEDED(GetCurrentProcessExplicitAppUserModelID(¤t_app_id))) {
- command_line->AppendSwitchNative(switches::kAppUserModelId,
- current_app_id);
- CoTaskMemFree(current_app_id);
- }
- #endif
- if (delegate_) {
- auto app_path = static_cast<api::App*>(delegate_)->GetAppPath();
- command_line->AppendSwitchPath(switches::kAppPath, app_path);
- }
- auto env = base::Environment::Create();
- if (env->HasVar("ELECTRON_PROFILE_INIT_SCRIPTS")) {
- command_line->AppendSwitch("profile-electron-init");
- }
- content::WebContents* web_contents =
- GetWebContentsFromProcessID(process_id);
- if (web_contents) {
- auto* web_preferences = WebContentsPreferences::From(web_contents);
- if (web_preferences)
- web_preferences->AppendCommandLineSwitches(
- command_line, IsRendererSubFrame(process_id));
- }
- }
- }
- // attempt to get api key from env
- std::string ElectronBrowserClient::GetGeolocationApiKey() {
- auto env = base::Environment::Create();
- std::string api_key;
- env->GetVar("GOOGLE_API_KEY", &api_key);
- return api_key;
- }
- content::GeneratedCodeCacheSettings
- ElectronBrowserClient::GetGeneratedCodeCacheSettings(
- content::BrowserContext* context) {
- // TODO(deepak1556): Use platform cache directory.
- base::FilePath cache_path = context->GetPath();
- // If we pass 0 for size, disk_cache will pick a default size using the
- // heuristics based on available disk size. These are implemented in
- // disk_cache::PreferredCacheSize in net/disk_cache/cache_util.cc.
- return {true, 0, cache_path};
- }
- void ElectronBrowserClient::AllowCertificateError(
- content::WebContents* web_contents,
- int cert_error,
- const net::SSLInfo& ssl_info,
- const GURL& request_url,
- bool is_main_frame_request,
- bool strict_enforcement,
- base::OnceCallback<void(content::CertificateRequestResultType)> callback) {
- if (delegate_) {
- delegate_->AllowCertificateError(web_contents, cert_error, ssl_info,
- request_url, is_main_frame_request,
- strict_enforcement, std::move(callback));
- }
- }
- base::OnceClosure ElectronBrowserClient::SelectClientCertificate(
- content::BrowserContext* browser_context,
- int process_id,
- content::WebContents* web_contents,
- net::SSLCertRequestInfo* cert_request_info,
- net::ClientCertIdentityList client_certs,
- std::unique_ptr<content::ClientCertificateDelegate> delegate) {
- if (client_certs.empty()) {
- delegate->ContinueWithCertificate(nullptr, nullptr);
- } else if (delegate_) {
- delegate_->SelectClientCertificate(
- browser_context, process_id, web_contents, cert_request_info,
- std::move(client_certs), std::move(delegate));
- }
- return {};
- }
- bool ElectronBrowserClient::CanCreateWindow(
- content::RenderFrameHost* opener,
- const GURL& opener_url,
- const GURL& opener_top_level_frame_url,
- const url::Origin& source_origin,
- content::mojom::WindowContainerType container_type,
- const GURL& target_url,
- const content::Referrer& referrer,
- const std::string& frame_name,
- WindowOpenDisposition disposition,
- const blink::mojom::WindowFeatures& features,
- const std::string& raw_features,
- const scoped_refptr<network::ResourceRequestBody>& body,
- bool user_gesture,
- bool opener_suppressed,
- bool* no_javascript_access) {
- DCHECK_CURRENTLY_ON(BrowserThread::UI);
- content::WebContents* web_contents =
- content::WebContents::FromRenderFrameHost(opener);
- WebContentsPreferences* prefs = WebContentsPreferences::From(web_contents);
- if (prefs) {
- if (prefs->ShouldDisablePopups()) {
- // <webview> without allowpopups attribute should return
- // null from window.open calls
- return false;
- } else {
- *no_javascript_access = false;
- return true;
- }
- }
- if (delegate_) {
- return delegate_->CanCreateWindow(
- opener, opener_url, opener_top_level_frame_url, source_origin,
- container_type, target_url, referrer, frame_name, disposition, features,
- raw_features, body, user_gesture, opener_suppressed,
- no_javascript_access);
- }
- return false;
- }
- std::unique_ptr<content::VideoOverlayWindow>
- ElectronBrowserClient::CreateWindowForVideoPictureInPicture(
- content::VideoPictureInPictureWindowController* controller) {
- auto overlay_window = content::VideoOverlayWindow::Create(controller);
- #if BUILDFLAG(IS_WIN)
- std::wstring app_user_model_id = Browser::Get()->GetAppUserModelID();
- if (!app_user_model_id.empty()) {
- auto* overlay_window_view =
- static_cast<VideoOverlayWindowViews*>(overlay_window.get());
- ui::win::SetAppIdForWindow(app_user_model_id,
- overlay_window_view->GetNativeWindow()
- ->GetHost()
- ->GetAcceleratedWidget());
- }
- #endif
- return overlay_window;
- }
- void ElectronBrowserClient::GetAdditionalAllowedSchemesForFileSystem(
- std::vector<std::string>* additional_schemes) {
- const auto& schemes_list = api::GetStandardSchemes();
- if (!schemes_list.empty())
- additional_schemes->insert(additional_schemes->end(), schemes_list.begin(),
- schemes_list.end());
- additional_schemes->push_back(content::kChromeDevToolsScheme);
- additional_schemes->push_back(content::kChromeUIScheme);
- }
- void ElectronBrowserClient::GetAdditionalWebUISchemes(
- std::vector<std::string>* additional_schemes) {
- additional_schemes->push_back(content::kChromeDevToolsScheme);
- }
- void ElectronBrowserClient::SiteInstanceGotProcessAndSite(
- content::SiteInstance* site_instance) {
- #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
- auto* browser_context =
- static_cast<ElectronBrowserContext*>(site_instance->GetBrowserContext());
- if (!browser_context->IsOffTheRecord()) {
- extensions::ExtensionRegistry* registry =
- extensions::ExtensionRegistry::Get(browser_context);
- const extensions::Extension* extension =
- registry->enabled_extensions().GetExtensionOrAppByURL(
- site_instance->GetSiteURL());
- if (!extension)
- return;
- extensions::ProcessMap::Get(browser_context)
- ->Insert(extension->id(), site_instance->GetProcess()->GetID());
- }
- #endif // BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
- }
- bool ElectronBrowserClient::IsSuitableHost(
- content::RenderProcessHost* process_host,
- const GURL& site_url) {
- #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
- auto* browser_context = process_host->GetBrowserContext();
- extensions::ProcessMap* process_map =
- extensions::ProcessMap::Get(browser_context);
- // Otherwise, just make sure the process privilege matches the privilege
- // required by the site.
- const auto privilege_required = GetPrivilegeRequiredByUrl(site_url);
- return GetProcessPrivilege(process_host, process_map) == privilege_required;
- #else
- return content::ContentBrowserClient::IsSuitableHost(process_host, site_url);
- #endif
- }
- bool ElectronBrowserClient::ShouldUseProcessPerSite(
- content::BrowserContext* browser_context,
- const GURL& effective_url) {
- #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
- const extensions::Extension* extension =
- GetEnabledExtensionFromEffectiveURL(browser_context, effective_url);
- return extension != nullptr;
- #else
- return content::ContentBrowserClient::ShouldUseProcessPerSite(browser_context,
- effective_url);
- #endif
- }
- void ElectronBrowserClient::GetMediaDeviceIDSalt(
- content::RenderFrameHost* rfh,
- const net::SiteForCookies& site_for_cookies,
- const blink::StorageKey& storage_key,
- base::OnceCallback<void(bool, const std::string&)> callback) {
- constexpr bool persistent_media_device_id_allowed = true;
- std::string persistent_media_device_id_salt =
- static_cast<ElectronBrowserContext*>(rfh->GetBrowserContext())
- ->GetMediaDeviceIDSalt();
- std::move(callback).Run(persistent_media_device_id_allowed,
- persistent_media_device_id_salt);
- }
- base::FilePath ElectronBrowserClient::GetLoggingFileName(
- const base::CommandLine& cmd_line) {
- return logging::GetLogFileName(cmd_line);
- }
- std::unique_ptr<net::ClientCertStore>
- ElectronBrowserClient::CreateClientCertStore(
- content::BrowserContext* browser_context) {
- #if BUILDFLAG(USE_NSS_CERTS)
- return std::make_unique<net::ClientCertStoreNSS>(
- base::BindRepeating([](const net::HostPortPair& server) {
- crypto::CryptoModuleBlockingPasswordDelegate* delegate =
- new ElectronNSSCryptoModuleDelegate(server);
- return delegate;
- }));
- #elif BUILDFLAG(IS_WIN)
- return std::make_unique<net::ClientCertStoreWin>();
- #elif BUILDFLAG(IS_MAC)
- return std::make_unique<net::ClientCertStoreMac>();
- #elif defined(USE_OPENSSL)
- return ();
- #endif
- }
- std::unique_ptr<device::LocationProvider>
- ElectronBrowserClient::OverrideSystemLocationProvider() {
- #if BUILDFLAG(OVERRIDE_LOCATION_PROVIDER)
- return std::make_unique<FakeLocationProvider>();
- #else
- return {};
- #endif
- }
- void ElectronBrowserClient::ConfigureNetworkContextParams(
- content::BrowserContext* browser_context,
- bool in_memory,
- const base::FilePath& relative_partition_path,
- network::mojom::NetworkContextParams* network_context_params,
- cert_verifier::mojom::CertVerifierCreationParams*
- cert_verifier_creation_params) {
- DCHECK(browser_context);
- return NetworkContextServiceFactory::GetForContext(browser_context)
- ->ConfigureNetworkContextParams(network_context_params,
- cert_verifier_creation_params);
- }
- network::mojom::NetworkContext*
- ElectronBrowserClient::GetSystemNetworkContext() {
- DCHECK_CURRENTLY_ON(BrowserThread::UI);
- DCHECK(g_browser_process->system_network_context_manager());
- return g_browser_process->system_network_context_manager()->GetContext();
- }
- std::unique_ptr<content::BrowserMainParts>
- ElectronBrowserClient::CreateBrowserMainParts(bool /* is_integration_test */) {
- return std::make_unique<ElectronBrowserMainParts>();
- }
- void ElectronBrowserClient::WebNotificationAllowed(
- content::RenderFrameHost* rfh,
- base::OnceCallback<void(bool, bool)> callback) {
- content::WebContents* web_contents =
- content::WebContents::FromRenderFrameHost(rfh);
- if (!web_contents) {
- std::move(callback).Run(false, false);
- return;
- }
- auto* permission_helper =
- WebContentsPermissionHelper::FromWebContents(web_contents);
- if (!permission_helper) {
- std::move(callback).Run(false, false);
- return;
- }
- permission_helper->RequestWebNotificationPermission(
- rfh, base::BindOnce(std::move(callback), web_contents->IsAudioMuted()));
- }
- void ElectronBrowserClient::RenderProcessHostDestroyed(
- content::RenderProcessHost* host) {
- int process_id = host->GetID();
- pending_processes_.erase(process_id);
- renderer_is_subframe_.erase(process_id);
- host->RemoveObserver(this);
- }
- void ElectronBrowserClient::RenderProcessReady(
- content::RenderProcessHost* host) {
- if (delegate_) {
- static_cast<api::App*>(delegate_)->RenderProcessReady(host);
- }
- }
- void ElectronBrowserClient::RenderProcessExited(
- content::RenderProcessHost* host,
- const content::ChildProcessTerminationInfo& info) {
- if (delegate_) {
- static_cast<api::App*>(delegate_)->RenderProcessExited(host);
- }
- }
- namespace {
- void OnOpenExternal(const GURL& escaped_url, bool allowed) {
- if (allowed) {
- platform_util::OpenExternal(
- escaped_url, platform_util::OpenExternalOptions(), base::DoNothing());
- }
- }
- void HandleExternalProtocolInUI(
- const GURL& url,
- content::WeakDocumentPtr document_ptr,
- content::WebContents::OnceGetter web_contents_getter,
- bool has_user_gesture) {
- content::WebContents* web_contents = std::move(web_contents_getter).Run();
- if (!web_contents)
- return;
- auto* permission_helper =
- WebContentsPermissionHelper::FromWebContents(web_contents);
- if (!permission_helper)
- return;
- content::RenderFrameHost* rfh = document_ptr.AsRenderFrameHostIfValid();
- if (!rfh) {
- // If the render frame host is not valid it means it was a top level
- // navigation and the frame has already been disposed of. In this case we
- // take the current main frame and declare it responsible for the
- // transition.
- rfh = web_contents->GetPrimaryMainFrame();
- }
- GURL escaped_url(base::EscapeExternalHandlerValue(url.spec()));
- auto callback = base::BindOnce(&OnOpenExternal, escaped_url);
- permission_helper->RequestOpenExternalPermission(rfh, std::move(callback),
- has_user_gesture, url);
- }
- } // namespace
- bool ElectronBrowserClient::HandleExternalProtocol(
- const GURL& url,
- content::WebContents::Getter web_contents_getter,
- content::FrameTreeNodeId frame_tree_node_id,
- content::NavigationUIData* navigation_data,
- bool is_primary_main_frame,
- bool is_in_fenced_frame_tree,
- network::mojom::WebSandboxFlags sandbox_flags,
- ui::PageTransition page_transition,
- bool has_user_gesture,
- const std::optional<url::Origin>& initiating_origin,
- content::RenderFrameHost* initiator_document,
- const net::IsolationInfo& isolation_info,
- mojo::PendingRemote<network::mojom::URLLoaderFactory>* out_factory) {
- content::GetUIThreadTaskRunner({})->PostTask(
- FROM_HERE,
- base::BindOnce(&HandleExternalProtocolInUI, url,
- initiator_document
- ? initiator_document->GetWeakDocumentPtr()
- : content::WeakDocumentPtr(),
- std::move(web_contents_getter), has_user_gesture));
- return true;
- }
- std::vector<std::unique_ptr<content::NavigationThrottle>>
- ElectronBrowserClient::CreateThrottlesForNavigation(
- content::NavigationHandle* handle) {
- std::vector<std::unique_ptr<content::NavigationThrottle>> throttles;
- throttles.push_back(std::make_unique<ElectronNavigationThrottle>(handle));
- #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
- throttles.push_back(
- std::make_unique<extensions::ExtensionNavigationThrottle>(handle));
- #endif
- #if BUILDFLAG(ENABLE_PDF_VIEWER)
- throttles.push_back(std::make_unique<PDFIFrameNavigationThrottle>(handle));
- throttles.push_back(std::make_unique<pdf::PdfNavigationThrottle>(
- handle, std::make_unique<ChromePdfStreamDelegate>()));
- #endif
- return throttles;
- }
- content::MediaObserver* ElectronBrowserClient::GetMediaObserver() {
- return MediaCaptureDevicesDispatcher::GetInstance();
- }
- std::unique_ptr<content::DevToolsManagerDelegate>
- ElectronBrowserClient::CreateDevToolsManagerDelegate() {
- return std::make_unique<DevToolsManagerDelegate>();
- }
- NotificationPresenter* ElectronBrowserClient::GetNotificationPresenter() {
- if (!notification_presenter_)
- notification_presenter_ = NotificationPresenter::Create();
- return notification_presenter_.get();
- }
- content::PlatformNotificationService*
- ElectronBrowserClient::GetPlatformNotificationService() {
- if (!notification_service_) {
- notification_service_ = std::make_unique<PlatformNotificationService>(this);
- }
- return notification_service_.get();
- }
- base::FilePath ElectronBrowserClient::GetDefaultDownloadDirectory() {
- base::FilePath download_path;
- if (base::PathService::Get(chrome::DIR_DEFAULT_DOWNLOADS, &download_path))
- return download_path;
- return {};
- }
- scoped_refptr<network::SharedURLLoaderFactory>
- ElectronBrowserClient::GetSystemSharedURLLoaderFactory() {
- if (!g_browser_process)
- return nullptr;
- return g_browser_process->shared_url_loader_factory();
- }
- void ElectronBrowserClient::OnNetworkServiceCreated(
- network::mojom::NetworkService* network_service) {
- if (!g_browser_process)
- return;
- g_browser_process->system_network_context_manager()->OnNetworkServiceCreated(
- network_service);
- }
- std::vector<base::FilePath>
- ElectronBrowserClient::GetNetworkContextsParentDirectory() {
- base::FilePath session_data;
- base::PathService::Get(DIR_SESSION_DATA, &session_data);
- DCHECK(!session_data.empty());
- return {session_data};
- }
- std::string ElectronBrowserClient::GetProduct() {
- return "Chrome/" CHROME_VERSION_STRING;
- }
- std::string ElectronBrowserClient::GetUserAgent() {
- if (user_agent_override_.empty())
- return GetApplicationUserAgent();
- return user_agent_override_;
- }
- void ElectronBrowserClient::SetUserAgent(const std::string& user_agent) {
- user_agent_override_ = user_agent;
- }
- blink::UserAgentMetadata ElectronBrowserClient::GetUserAgentMetadata() {
- return embedder_support::GetUserAgentMetadata();
- }
- mojo::PendingRemote<network::mojom::URLLoaderFactory>
- ElectronBrowserClient::CreateNonNetworkNavigationURLLoaderFactory(
- const std::string& scheme,
- content::FrameTreeNodeId frame_tree_node_id) {
- content::WebContents* web_contents =
- content::WebContents::FromFrameTreeNodeId(frame_tree_node_id);
- content::BrowserContext* context = web_contents->GetBrowserContext();
- #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
- if (scheme == extensions::kExtensionScheme) {
- return extensions::CreateExtensionNavigationURLLoaderFactory(
- context, false /* we don't support extensions::WebViewGuest */);
- }
- #endif
- // Always allow navigating to file:// URLs.
- auto* protocol_registry = ProtocolRegistry::FromBrowserContext(context);
- return protocol_registry->CreateNonNetworkNavigationURLLoaderFactory(scheme);
- }
- void ElectronBrowserClient::
- RegisterNonNetworkWorkerMainResourceURLLoaderFactories(
- content::BrowserContext* browser_context,
- NonNetworkURLLoaderFactoryMap* factories) {
- auto* protocol_registry =
- ProtocolRegistry::FromBrowserContext(browser_context);
- // Workers are not allowed to request file:// URLs, there is no particular
- // reason for it, and we could consider supporting it in future.
- protocol_registry->RegisterURLLoaderFactories(factories,
- false /* allow_file_access */);
- #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
- factories->emplace(
- extensions::kExtensionScheme,
- extensions::CreateExtensionWorkerMainResourceURLLoaderFactory(
- browser_context));
- #endif
- }
- #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
- namespace {
- // The FileURLLoaderFactory provided to the extension background pages.
- // Checks with the ChildProcessSecurityPolicy to validate the file access.
- class FileURLLoaderFactory : public network::SelfDeletingURLLoaderFactory {
- public:
- static mojo::PendingRemote<network::mojom::URLLoaderFactory> Create(
- int child_id) {
- mojo::PendingRemote<network::mojom::URLLoaderFactory> pending_remote;
- // The FileURLLoaderFactory will delete itself when there are no more
- // receivers - see the SelfDeletingURLLoaderFactory::OnDisconnect method.
- new FileURLLoaderFactory(child_id,
- pending_remote.InitWithNewPipeAndPassReceiver());
- return pending_remote;
- }
- // disable copy
- FileURLLoaderFactory(const FileURLLoaderFactory&) = delete;
- FileURLLoaderFactory& operator=(const FileURLLoaderFactory&) = delete;
- private:
- explicit FileURLLoaderFactory(
- int child_id,
- mojo::PendingReceiver<network::mojom::URLLoaderFactory> factory_receiver)
- : network::SelfDeletingURLLoaderFactory(std::move(factory_receiver)),
- child_id_(child_id) {}
- ~FileURLLoaderFactory() override = default;
- // network::mojom::URLLoaderFactory:
- void CreateLoaderAndStart(
- mojo::PendingReceiver<network::mojom::URLLoader> loader,
- int32_t request_id,
- uint32_t options,
- const network::ResourceRequest& request,
- mojo::PendingRemote<network::mojom::URLLoaderClient> client,
- const net::MutableNetworkTrafficAnnotationTag& traffic_annotation)
- override {
- if (!content::ChildProcessSecurityPolicy::GetInstance()->CanRequestURL(
- child_id_, request.url)) {
- mojo::Remote<network::mojom::URLLoaderClient>(std::move(client))
- ->OnComplete(
- network::URLLoaderCompletionStatus(net::ERR_ACCESS_DENIED));
- return;
- }
- content::CreateFileURLLoaderBypassingSecurityChecks(
- request, std::move(loader), std::move(client),
- /*observer=*/nullptr,
- /* allow_directory_listing */ true);
- }
- int child_id_;
- };
- } // namespace
- #endif // BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
- void ElectronBrowserClient::RegisterNonNetworkSubresourceURLLoaderFactories(
- int render_process_id,
- int render_frame_id,
- const std::optional<url::Origin>& request_initiator_origin,
- NonNetworkURLLoaderFactoryMap* factories) {
- auto* render_process_host =
- content::RenderProcessHost::FromID(render_process_id);
- DCHECK(render_process_host);
- if (!render_process_host || !render_process_host->GetBrowserContext())
- return;
- content::RenderFrameHost* frame_host =
- content::RenderFrameHost::FromID(render_process_id, render_frame_id);
- content::WebContents* web_contents =
- content::WebContents::FromRenderFrameHost(frame_host);
- // Allow accessing file:// subresources from non-file protocols if web
- // security is disabled.
- bool allow_file_access = false;
- if (web_contents) {
- const auto& web_preferences = web_contents->GetOrCreateWebPreferences();
- if (!web_preferences.web_security_enabled)
- allow_file_access = true;
- }
- ProtocolRegistry::FromBrowserContext(render_process_host->GetBrowserContext())
- ->RegisterURLLoaderFactories(factories, allow_file_access);
- #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
- auto factory = extensions::CreateExtensionURLLoaderFactory(render_process_id,
- render_frame_id);
- if (factory)
- factories->emplace(extensions::kExtensionScheme, std::move(factory));
- if (!web_contents)
- return;
- extensions::ElectronExtensionWebContentsObserver* web_observer =
- extensions::ElectronExtensionWebContentsObserver::FromWebContents(
- web_contents);
- // There is nothing to do if no ElectronExtensionWebContentsObserver is
- // attached to the |web_contents|.
- if (!web_observer)
- return;
- const extensions::Extension* extension =
- web_observer->GetExtensionFromFrame(frame_host, false);
- if (!extension)
- return;
- // Support for chrome:// scheme if appropriate.
- if (extension->is_extension() &&
- extensions::Manifest::IsComponentLocation(extension->location())) {
- // Components of chrome that are implemented as extensions or platform apps
- // are allowed to use chrome://resources/ and chrome://theme/ URLs.
- factories->emplace(content::kChromeUIScheme,
- content::CreateWebUIURLLoaderFactory(
- frame_host, content::kChromeUIScheme,
- {content::kChromeUIResourcesHost}));
- }
- // Extensions with the necessary permissions get access to file:// URLs that
- // gets approval from ChildProcessSecurityPolicy. Keep this logic in sync with
- // ExtensionWebContentsObserver::RenderFrameCreated.
- extensions::Manifest::Type type = extension->GetType();
- if (type == extensions::Manifest::TYPE_EXTENSION &&
- AllowFileAccess(extension->id(), web_contents->GetBrowserContext())) {
- factories->emplace(url::kFileScheme,
- FileURLLoaderFactory::Create(render_process_id));
- }
- #endif
- }
- void ElectronBrowserClient::
- RegisterNonNetworkServiceWorkerUpdateURLLoaderFactories(
- content::BrowserContext* browser_context,
- NonNetworkURLLoaderFactoryMap* factories) {
- DCHECK(browser_context);
- DCHECK(factories);
- auto* protocol_registry =
- ProtocolRegistry::FromBrowserContext(browser_context);
- protocol_registry->RegisterURLLoaderFactories(factories,
- false /* allow_file_access */);
- #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
- factories->emplace(
- extensions::kExtensionScheme,
- extensions::CreateExtensionServiceWorkerScriptURLLoaderFactory(
- browser_context));
- #endif // BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
- }
- bool ElectronBrowserClient::ShouldTreatURLSchemeAsFirstPartyWhenTopLevel(
- std::string_view scheme,
- bool is_embedded_origin_secure) {
- if (is_embedded_origin_secure && scheme == content::kChromeUIScheme)
- return true;
- #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
- return scheme == extensions::kExtensionScheme;
- #else
- return false;
- #endif
- }
- bool ElectronBrowserClient::WillInterceptWebSocket(
- content::RenderFrameHost* frame) {
- if (!frame)
- return false;
- v8::Isolate* isolate = JavascriptEnvironment::GetIsolate();
- v8::HandleScope scope(isolate);
- auto* browser_context = frame->GetProcess()->GetBrowserContext();
- auto web_request = api::WebRequest::FromOrCreate(isolate, browser_context);
- // NOTE: Some unit test environments do not initialize
- // BrowserContextKeyedAPI factories for e.g. WebRequest.
- if (!web_request.get())
- return false;
- bool has_listener = web_request->HasListener();
- #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
- const auto* web_request_api =
- extensions::BrowserContextKeyedAPIFactory<extensions::WebRequestAPI>::Get(
- browser_context);
- if (web_request_api)
- has_listener |= web_request_api->MayHaveProxies();
- #endif
- return has_listener;
- }
- void ElectronBrowserClient::CreateWebSocket(
- content::RenderFrameHost* frame,
- WebSocketFactory factory,
- const GURL& url,
- const net::SiteForCookies& site_for_cookies,
- const std::optional<std::string>& user_agent,
- mojo::PendingRemote<network::mojom::WebSocketHandshakeClient>
- handshake_client) {
- v8::Isolate* isolate = JavascriptEnvironment::GetIsolate();
- v8::HandleScope scope(isolate);
- auto* browser_context = frame->GetProcess()->GetBrowserContext();
- auto web_request = api::WebRequest::FromOrCreate(isolate, browser_context);
- DCHECK(web_request.get());
- #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
- if (!web_request->HasListener()) {
- auto* web_request_api = extensions::BrowserContextKeyedAPIFactory<
- extensions::WebRequestAPI>::Get(browser_context);
- if (web_request_api && web_request_api->MayHaveProxies()) {
- web_request_api->ProxyWebSocket(frame, std::move(factory), url,
- site_for_cookies, user_agent,
- std::move(handshake_client));
- return;
- }
- }
- #endif
- ProxyingWebSocket::StartProxying(
- web_request.get(), std::move(factory), url, site_for_cookies, user_agent,
- std::move(handshake_client), true, frame->GetProcess()->GetID(),
- frame->GetRoutingID(), frame->GetLastCommittedOrigin(), browser_context,
- &next_id_);
- }
- void ElectronBrowserClient::WillCreateURLLoaderFactory(
- content::BrowserContext* browser_context,
- content::RenderFrameHost* frame_host,
- int render_process_id,
- URLLoaderFactoryType type,
- const url::Origin& request_initiator,
- const net::IsolationInfo& isolation_info,
- std::optional<int64_t> navigation_id,
- ukm::SourceIdObj ukm_source_id,
- network::URLLoaderFactoryBuilder& factory_builder,
- mojo::PendingRemote<network::mojom::TrustedURLLoaderHeaderClient>*
- header_client,
- bool* bypass_redirect_checks,
- bool* disable_secure_dns,
- network::mojom::URLLoaderFactoryOverridePtr* factory_override,
- scoped_refptr<base::SequencedTaskRunner> navigation_response_task_runner) {
- v8::Isolate* isolate = JavascriptEnvironment::GetIsolate();
- v8::HandleScope scope(isolate);
- auto web_request = api::WebRequest::FromOrCreate(isolate, browser_context);
- DCHECK(web_request.get());
- #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
- if (!web_request->HasListener()) {
- auto* web_request_api = extensions::BrowserContextKeyedAPIFactory<
- extensions::WebRequestAPI>::Get(browser_context);
- DCHECK(web_request_api);
- bool used_proxy_for_web_request =
- web_request_api->MaybeProxyURLLoaderFactory(
- browser_context, frame_host, render_process_id, type, navigation_id,
- ukm_source_id, factory_builder, header_client,
- navigation_response_task_runner);
- if (bypass_redirect_checks)
- *bypass_redirect_checks = used_proxy_for_web_request;
- if (used_proxy_for_web_request)
- return;
- }
- #endif
- auto [proxied_receiver, target_factory_remote] = factory_builder.Append();
- // Required by WebRequestInfoInitParams.
- //
- // Note that in Electron we allow webRequest to capture requests sent from
- // browser process, so creation of |navigation_ui_data| is different from
- // Chromium which only does for renderer-initialized navigations.
- std::unique_ptr<extensions::ExtensionNavigationUIData> navigation_ui_data;
- if (navigation_id.has_value()) {
- navigation_ui_data =
- std::make_unique<extensions::ExtensionNavigationUIData>();
- }
- mojo::PendingReceiver<network::mojom::TrustedURLLoaderHeaderClient>
- header_client_receiver;
- if (header_client)
- header_client_receiver = header_client->InitWithNewPipeAndPassReceiver();
- auto* protocol_registry =
- ProtocolRegistry::FromBrowserContext(browser_context);
- new ProxyingURLLoaderFactory(
- web_request.get(), protocol_registry->intercept_handlers(),
- render_process_id,
- frame_host ? frame_host->GetRoutingID() : MSG_ROUTING_NONE, &next_id_,
- std::move(navigation_ui_data), std::move(navigation_id),
- std::move(proxied_receiver), std::move(target_factory_remote),
- std::move(header_client_receiver), type);
- }
- std::vector<std::unique_ptr<content::URLLoaderRequestInterceptor>>
- ElectronBrowserClient::WillCreateURLLoaderRequestInterceptors(
- content::NavigationUIData* navigation_ui_data,
- content::FrameTreeNodeId frame_tree_node_id,
- int64_t navigation_id,
- bool force_no_https_upgrade,
- scoped_refptr<base::SequencedTaskRunner> navigation_response_task_runner) {
- std::vector<std::unique_ptr<content::URLLoaderRequestInterceptor>>
- interceptors;
- #if BUILDFLAG(ENABLE_PDF_VIEWER)
- {
- std::unique_ptr<content::URLLoaderRequestInterceptor> pdf_interceptor =
- pdf::PdfURLLoaderRequestInterceptor::MaybeCreateInterceptor(
- frame_tree_node_id, std::make_unique<ChromePdfStreamDelegate>());
- if (pdf_interceptor)
- interceptors.push_back(std::move(pdf_interceptor));
- }
- #endif
- return interceptors;
- }
- void ElectronBrowserClient::OverrideURLLoaderFactoryParams(
- content::BrowserContext* browser_context,
- const url::Origin& origin,
- bool is_for_isolated_world,
- network::mojom::URLLoaderFactoryParams* factory_params) {
- if (factory_params->top_frame_id) {
- // Bypass CORB and CORS when web security is disabled.
- auto* rfh = content::RenderFrameHost::FromFrameToken(
- content::GlobalRenderFrameHostToken(
- factory_params->process_id,
- blink::LocalFrameToken(factory_params->top_frame_id.value())));
- auto* web_contents = content::WebContents::FromRenderFrameHost(rfh);
- auto* prefs = WebContentsPreferences::From(web_contents);
- if (prefs && !prefs->IsWebSecurityEnabled()) {
- factory_params->is_orb_enabled = false;
- factory_params->disable_web_security = true;
- }
- }
- #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
- extensions::URLLoaderFactoryManager::OverrideURLLoaderFactoryParams(
- browser_context, origin, is_for_isolated_world, factory_params);
- #endif
- }
- void ElectronBrowserClient::RegisterAssociatedInterfaceBindersForServiceWorker(
- const content::ServiceWorkerVersionBaseInfo& service_worker_version_info,
- blink::AssociatedInterfaceRegistry& associated_registry) {
- #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
- associated_registry.AddInterface<extensions::mojom::RendererHost>(
- base::BindRepeating(&extensions::RendererStartupHelper::BindForRenderer,
- service_worker_version_info.process_id));
- associated_registry.AddInterface<extensions::mojom::ServiceWorkerHost>(
- base::BindRepeating(&extensions::ServiceWorkerHost::BindReceiver,
- service_worker_version_info.process_id));
- #endif
- }
- void ElectronBrowserClient::
- RegisterAssociatedInterfaceBindersForRenderFrameHost(
- content::RenderFrameHost&
- render_frame_host, // NOLINT(runtime/references)
- blink::AssociatedInterfaceRegistry&
- associated_registry) { // NOLINT(runtime/references)
- auto* contents =
- content::WebContents::FromRenderFrameHost(&render_frame_host);
- if (contents) {
- auto* prefs = WebContentsPreferences::From(contents);
- if (render_frame_host.GetFrameTreeNodeId() ==
- contents->GetPrimaryMainFrame()->GetFrameTreeNodeId() ||
- (prefs && prefs->AllowsNodeIntegrationInSubFrames())) {
- associated_registry.AddInterface<mojom::ElectronApiIPC>(
- base::BindRepeating(
- [](content::RenderFrameHost* render_frame_host,
- mojo::PendingAssociatedReceiver<mojom::ElectronApiIPC>
- receiver) {
- ElectronApiIPCHandlerImpl::Create(render_frame_host,
- std::move(receiver));
- },
- &render_frame_host));
- }
- }
- associated_registry.AddInterface<mojom::ElectronWebContentsUtility>(
- base::BindRepeating(
- [](content::RenderFrameHost* render_frame_host,
- mojo::PendingAssociatedReceiver<mojom::ElectronWebContentsUtility>
- receiver) {
- ElectronWebContentsUtilityHandlerImpl::Create(render_frame_host,
- std::move(receiver));
- },
- &render_frame_host));
- associated_registry.AddInterface<mojom::ElectronAutofillDriver>(
- base::BindRepeating(
- [](content::RenderFrameHost* render_frame_host,
- mojo::PendingAssociatedReceiver<mojom::ElectronAutofillDriver>
- receiver) {
- AutofillDriverFactory::BindAutofillDriver(std::move(receiver),
- render_frame_host);
- },
- &render_frame_host));
- #if BUILDFLAG(ENABLE_PLUGINS)
- associated_registry.AddInterface<mojom::ElectronPluginInfoHost>(
- base::BindRepeating(
- [](content::RenderFrameHost* render_frame_host,
- mojo::PendingAssociatedReceiver<mojom::ElectronPluginInfoHost>
- receiver) {
- mojo::MakeSelfOwnedAssociatedReceiver(
- std::make_unique<ElectronPluginInfoHostImpl>(),
- std::move(receiver));
- },
- &render_frame_host));
- #endif
- #if BUILDFLAG(ENABLE_PRINTING)
- associated_registry.AddInterface<printing::mojom::PrintManagerHost>(
- base::BindRepeating(
- [](content::RenderFrameHost* render_frame_host,
- mojo::PendingAssociatedReceiver<printing::mojom::PrintManagerHost>
- receiver) {
- PrintViewManagerElectron::BindPrintManagerHost(std::move(receiver),
- render_frame_host);
- },
- &render_frame_host));
- #endif
- #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
- int render_process_id = render_frame_host.GetProcess()->GetID();
- associated_registry.AddInterface<extensions::mojom::EventRouter>(
- base::BindRepeating(&extensions::EventRouter::BindForRenderer,
- render_process_id));
- associated_registry.AddInterface<extensions::mojom::RendererHost>(
- base::BindRepeating(&extensions::RendererStartupHelper::BindForRenderer,
- render_process_id));
- associated_registry.AddInterface<extensions::mojom::LocalFrameHost>(
- base::BindRepeating(
- [](content::RenderFrameHost* render_frame_host,
- mojo::PendingAssociatedReceiver<extensions::mojom::LocalFrameHost>
- receiver) {
- extensions::ExtensionWebContentsObserver::BindLocalFrameHost(
- std::move(receiver), render_frame_host);
- },
- &render_frame_host));
- associated_registry.AddInterface<guest_view::mojom::GuestViewHost>(
- base::BindRepeating(&extensions::ExtensionsGuestView::CreateForComponents,
- render_frame_host.GetGlobalId()));
- associated_registry.AddInterface<extensions::mojom::GuestView>(
- base::BindRepeating(&extensions::ExtensionsGuestView::CreateForExtensions,
- render_frame_host.GetGlobalId()));
- #endif
- #if BUILDFLAG(ENABLE_PDF_VIEWER)
- associated_registry.AddInterface<pdf::mojom::PdfHost>(base::BindRepeating(
- [](content::RenderFrameHost* render_frame_host,
- mojo::PendingAssociatedReceiver<pdf::mojom::PdfHost> receiver) {
- pdf::PDFDocumentHelper::BindPdfHost(
- std::move(receiver), render_frame_host,
- std::make_unique<ElectronPDFDocumentHelperClient>());
- },
- &render_frame_host));
- #endif
- }
- std::string ElectronBrowserClient::GetApplicationLocale() {
- return BrowserThread::CurrentlyOn(BrowserThread::IO)
- ? *g_io_thread_application_locale
- : *g_application_locale;
- }
- bool ElectronBrowserClient::ShouldEnableStrictSiteIsolation() {
- // Enable site isolation. It is off by default in Chromium <= 69.
- return true;
- }
- void ElectronBrowserClient::BindHostReceiverForRenderer(
- content::RenderProcessHost* render_process_host,
- mojo::GenericPendingReceiver receiver) {
- #if BUILDFLAG(ENABLE_BUILTIN_SPELLCHECKER)
- if (auto host_receiver =
- receiver.As<spellcheck::mojom::SpellCheckInitializationHost>()) {
- SpellCheckInitializationHostImpl::Create(render_process_host->GetID(),
- std::move(host_receiver));
- return;
- }
- #endif
- }
- #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
- namespace {
- void BindMimeHandlerService(
- content::RenderFrameHost* frame_host,
- mojo::PendingReceiver<extensions::mime_handler::MimeHandlerService>
- receiver) {
- content::WebContents* contents =
- content::WebContents::FromRenderFrameHost(frame_host);
- auto* guest_view =
- extensions::MimeHandlerViewGuest::FromWebContents(contents);
- if (!guest_view)
- return;
- extensions::MimeHandlerServiceImpl::Create(guest_view->GetStreamWeakPtr(),
- std::move(receiver));
- }
- void BindBeforeUnloadControl(
- content::RenderFrameHost* frame_host,
- mojo::PendingReceiver<extensions::mime_handler::BeforeUnloadControl>
- receiver) {
- auto* web_contents = content::WebContents::FromRenderFrameHost(frame_host);
- if (!web_contents)
- return;
- auto* guest_view =
- extensions::MimeHandlerViewGuest::FromWebContents(web_contents);
- if (!guest_view)
- return;
- guest_view->FuseBeforeUnloadControl(std::move(receiver));
- }
- } // namespace
- #endif
- void ElectronBrowserClient::ExposeInterfacesToRenderer(
- service_manager::BinderRegistry* registry,
- blink::AssociatedInterfaceRegistry* associated_registry,
- content::RenderProcessHost* render_process_host) {
- #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
- associated_registry->AddInterface<extensions::mojom::RendererHost>(
- base::BindRepeating(&extensions::RendererStartupHelper::BindForRenderer,
- render_process_host->GetID()));
- #endif
- }
- void ElectronBrowserClient::RegisterBrowserInterfaceBindersForFrame(
- content::RenderFrameHost* render_frame_host,
- mojo::BinderMapWithContext<content::RenderFrameHost*>* map) {
- map->Add<network_hints::mojom::NetworkHintsHandler>(
- base::BindRepeating(&BindNetworkHintsHandler));
- map->Add<blink::mojom::BadgeService>(
- base::BindRepeating(&badging::BadgeManager::BindFrameReceiver));
- map->Add<blink::mojom::KeyboardLockService>(base::BindRepeating(
- &content::KeyboardLockServiceImpl::CreateMojoService));
- #if BUILDFLAG(ENABLE_BUILTIN_SPELLCHECKER)
- map->Add<spellcheck::mojom::SpellCheckHost>(base::BindRepeating(
- [](content::RenderFrameHost* frame_host,
- mojo::PendingReceiver<spellcheck::mojom::SpellCheckHost> receiver) {
- SpellCheckHostChromeImpl::Create(frame_host->GetProcess()->GetID(),
- std::move(receiver));
- }));
- #endif
- #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
- map->Add<extensions::mime_handler::MimeHandlerService>(
- base::BindRepeating(&BindMimeHandlerService));
- map->Add<extensions::mime_handler::BeforeUnloadControl>(
- base::BindRepeating(&BindBeforeUnloadControl));
- content::WebContents* web_contents =
- content::WebContents::FromRenderFrameHost(render_frame_host);
- if (!web_contents)
- return;
- const GURL& site = render_frame_host->GetSiteInstance()->GetSiteURL();
- if (!site.SchemeIs(extensions::kExtensionScheme))
- return;
- content::BrowserContext* browser_context =
- render_frame_host->GetProcess()->GetBrowserContext();
- auto* extension = extensions::ExtensionRegistry::Get(browser_context)
- ->enabled_extensions()
- .GetByID(site.host());
- if (!extension)
- return;
- extensions::ExtensionsBrowserClient::Get()
- ->RegisterBrowserInterfaceBindersForFrame(map, render_frame_host,
- extension);
- #endif
- }
- #if BUILDFLAG(IS_LINUX)
- void ElectronBrowserClient::GetAdditionalMappedFilesForChildProcess(
- const base::CommandLine& command_line,
- int child_process_id,
- content::PosixFileDescriptorInfo* mappings) {
- int crash_signal_fd = GetCrashSignalFD(command_line);
- if (crash_signal_fd >= 0) {
- mappings->Share(kCrashDumpSignal, crash_signal_fd);
- }
- }
- #endif
- std::unique_ptr<content::LoginDelegate>
- ElectronBrowserClient::CreateLoginDelegate(
- const net::AuthChallengeInfo& auth_info,
- content::WebContents* web_contents,
- content::BrowserContext* browser_context,
- const content::GlobalRequestID& request_id,
- bool is_request_for_primary_main_frame,
- bool is_request_for_navigation,
- const GURL& url,
- scoped_refptr<net::HttpResponseHeaders> response_headers,
- bool first_auth_attempt,
- LoginAuthRequiredCallback auth_required_callback) {
- return std::make_unique<LoginHandler>(
- auth_info, web_contents, is_request_for_primary_main_frame,
- is_request_for_navigation, base::kNullProcessId, url, response_headers,
- first_auth_attempt, std::move(auth_required_callback));
- }
- std::vector<std::unique_ptr<blink::URLLoaderThrottle>>
- ElectronBrowserClient::CreateURLLoaderThrottles(
- const network::ResourceRequest& request,
- content::BrowserContext* browser_context,
- const base::RepeatingCallback<content::WebContents*()>& wc_getter,
- content::NavigationUIData* navigation_ui_data,
- content::FrameTreeNodeId frame_tree_node_id,
- std::optional<int64_t> navigation_id) {
- DCHECK_CURRENTLY_ON(BrowserThread::UI);
- std::vector<std::unique_ptr<blink::URLLoaderThrottle>> result;
- #if BUILDFLAG(ENABLE_PLUGINS) && BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
- result.push_back(std::make_unique<PluginResponseInterceptorURLLoaderThrottle>(
- request.destination, frame_tree_node_id));
- #endif
- return result;
- }
- base::flat_set<std::string>
- ElectronBrowserClient::GetPluginMimeTypesWithExternalHandlers(
- content::BrowserContext* browser_context) {
- base::flat_set<std::string> mime_types;
- #if BUILDFLAG(ENABLE_PLUGINS) && BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
- auto map = PluginUtils::GetMimeTypeToExtensionIdMap(browser_context);
- for (const auto& pair : map)
- mime_types.insert(pair.first);
- #endif
- #if BUILDFLAG(ENABLE_PDF_VIEWER)
- mime_types.insert(pdf::kInternalPluginMimeType);
- #endif
- return mime_types;
- }
- content::SerialDelegate* ElectronBrowserClient::GetSerialDelegate() {
- if (!serial_delegate_)
- serial_delegate_ = std::make_unique<ElectronSerialDelegate>();
- return serial_delegate_.get();
- }
- content::BluetoothDelegate* ElectronBrowserClient::GetBluetoothDelegate() {
- if (!bluetooth_delegate_)
- bluetooth_delegate_ = std::make_unique<ElectronBluetoothDelegate>();
- return bluetooth_delegate_.get();
- }
- content::UsbDelegate* ElectronBrowserClient::GetUsbDelegate() {
- if (!usb_delegate_)
- usb_delegate_ = std::make_unique<ElectronUsbDelegate>();
- return usb_delegate_.get();
- }
- namespace {
- void BindBadgeServiceForServiceWorker(
- const content::ServiceWorkerVersionBaseInfo& info,
- mojo::PendingReceiver<blink::mojom::BadgeService> receiver) {
- DCHECK_CURRENTLY_ON(content::BrowserThread::UI);
- content::RenderProcessHost* render_process_host =
- content::RenderProcessHost::FromID(info.process_id);
- if (!render_process_host)
- return;
- badging::BadgeManager::BindServiceWorkerReceiver(
- render_process_host, info.scope, std::move(receiver));
- }
- } // namespace
- void ElectronBrowserClient::RegisterBrowserInterfaceBindersForServiceWorker(
- content::BrowserContext* browser_context,
- const content::ServiceWorkerVersionBaseInfo& service_worker_version_info,
- mojo::BinderMapWithContext<const content::ServiceWorkerVersionBaseInfo&>*
- map) {
- map->Add<blink::mojom::BadgeService>(
- base::BindRepeating(&BindBadgeServiceForServiceWorker));
- }
- #if BUILDFLAG(IS_MAC)
- device::GeolocationSystemPermissionManager*
- ElectronBrowserClient::GetGeolocationSystemPermissionManager() {
- return device::GeolocationSystemPermissionManager::GetInstance();
- }
- #endif
- content::HidDelegate* ElectronBrowserClient::GetHidDelegate() {
- if (!hid_delegate_)
- hid_delegate_ = std::make_unique<ElectronHidDelegate>();
- return hid_delegate_.get();
- }
- content::WebAuthenticationDelegate*
- ElectronBrowserClient::GetWebAuthenticationDelegate() {
- if (!web_authentication_delegate_) {
- web_authentication_delegate_ =
- std::make_unique<ElectronWebAuthenticationDelegate>();
- }
- return web_authentication_delegate_.get();
- }
- } // namespace electron
|