electron_browser_client.cc 66 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743
  1. // Copyright (c) 2013 GitHub, Inc.
  2. // Use of this source code is governed by the MIT license that can be
  3. // found in the LICENSE file.
  4. #include "shell/browser/electron_browser_client.h"
  5. #if BUILDFLAG(IS_WIN)
  6. #include <shlobj.h>
  7. #endif
  8. #include <memory>
  9. #include <utility>
  10. #include "base/base_switches.h"
  11. #include "base/command_line.h"
  12. #include "base/debug/crash_logging.h"
  13. #include "base/environment.h"
  14. #include "base/files/file_util.h"
  15. #include "base/json/json_reader.h"
  16. #include "base/lazy_instance.h"
  17. #include "base/no_destructor.h"
  18. #include "base/path_service.h"
  19. #include "base/stl_util.h"
  20. #include "base/strings/escape.h"
  21. #include "base/strings/strcat.h"
  22. #include "base/strings/string_number_conversions.h"
  23. #include "base/strings/string_util.h"
  24. #include "base/strings/utf_string_conversions.h"
  25. #include "chrome/browser/browser_process.h"
  26. #include "chrome/common/chrome_paths.h"
  27. #include "chrome/common/chrome_switches.h"
  28. #include "chrome/common/chrome_version.h"
  29. #include "components/embedder_support/user_agent_utils.h"
  30. #include "components/net_log/chrome_net_log.h"
  31. #include "components/network_hints/common/network_hints.mojom.h"
  32. #include "content/browser/keyboard_lock/keyboard_lock_service_impl.h" // nogncheck
  33. #include "content/browser/site_instance_impl.h" // nogncheck
  34. #include "content/public/browser/browser_main_runner.h"
  35. #include "content/public/browser/browser_ppapi_host.h"
  36. #include "content/public/browser/browser_task_traits.h"
  37. #include "content/public/browser/client_certificate_delegate.h"
  38. #include "content/public/browser/login_delegate.h"
  39. #include "content/public/browser/overlay_window.h"
  40. #include "content/public/browser/render_frame_host.h"
  41. #include "content/public/browser/render_process_host.h"
  42. #include "content/public/browser/render_view_host.h"
  43. #include "content/public/browser/service_worker_version_base_info.h"
  44. #include "content/public/browser/site_instance.h"
  45. #include "content/public/browser/tts_controller.h"
  46. #include "content/public/browser/tts_platform.h"
  47. #include "content/public/browser/url_loader_request_interceptor.h"
  48. #include "content/public/browser/weak_document_ptr.h"
  49. #include "content/public/common/content_descriptors.h"
  50. #include "content/public/common/content_paths.h"
  51. #include "content/public/common/content_switches.h"
  52. #include "content/public/common/url_constants.h"
  53. #include "crypto/crypto_buildflags.h"
  54. #include "electron/buildflags/buildflags.h"
  55. #include "electron/shell/common/api/api.mojom.h"
  56. #include "extensions/browser/extension_navigation_ui_data.h"
  57. #include "mojo/public/cpp/bindings/binder_map.h"
  58. #include "net/ssl/ssl_cert_request_info.h"
  59. #include "net/ssl/ssl_private_key.h"
  60. #include "ppapi/buildflags/buildflags.h"
  61. #include "ppapi/host/ppapi_host.h"
  62. #include "printing/buildflags/buildflags.h"
  63. #include "services/device/public/cpp/geolocation/geolocation_manager.h"
  64. #include "services/device/public/cpp/geolocation/location_provider.h"
  65. #include "services/network/public/cpp/features.h"
  66. #include "services/network/public/cpp/is_potentially_trustworthy.h"
  67. #include "services/network/public/cpp/network_switches.h"
  68. #include "services/network/public/cpp/resource_request_body.h"
  69. #include "services/network/public/cpp/self_deleting_url_loader_factory.h"
  70. #include "shell/app/electron_crash_reporter_client.h"
  71. #include "shell/browser/api/electron_api_app.h"
  72. #include "shell/browser/api/electron_api_crash_reporter.h"
  73. #include "shell/browser/api/electron_api_protocol.h"
  74. #include "shell/browser/api/electron_api_session.h"
  75. #include "shell/browser/api/electron_api_web_contents.h"
  76. #include "shell/browser/api/electron_api_web_request.h"
  77. #include "shell/browser/badging/badge_manager.h"
  78. #include "shell/browser/child_web_contents_tracker.h"
  79. #include "shell/browser/electron_api_ipc_handler_impl.h"
  80. #include "shell/browser/electron_autofill_driver_factory.h"
  81. #include "shell/browser/electron_browser_context.h"
  82. #include "shell/browser/electron_browser_main_parts.h"
  83. #include "shell/browser/electron_navigation_throttle.h"
  84. #include "shell/browser/electron_speech_recognition_manager_delegate.h"
  85. #include "shell/browser/electron_web_contents_utility_handler_impl.h"
  86. #include "shell/browser/font_defaults.h"
  87. #include "shell/browser/javascript_environment.h"
  88. #include "shell/browser/media/media_capture_devices_dispatcher.h"
  89. #include "shell/browser/native_window.h"
  90. #include "shell/browser/net/network_context_service.h"
  91. #include "shell/browser/net/network_context_service_factory.h"
  92. #include "shell/browser/net/proxying_url_loader_factory.h"
  93. #include "shell/browser/net/proxying_websocket.h"
  94. #include "shell/browser/net/system_network_context_manager.h"
  95. #include "shell/browser/network_hints_handler_impl.h"
  96. #include "shell/browser/notifications/notification_presenter.h"
  97. #include "shell/browser/notifications/platform_notification_service.h"
  98. #include "shell/browser/protocol_registry.h"
  99. #include "shell/browser/serial/electron_serial_delegate.h"
  100. #include "shell/browser/session_preferences.h"
  101. #include "shell/browser/ui/devtools_manager_delegate.h"
  102. #include "shell/browser/web_contents_permission_helper.h"
  103. #include "shell/browser/web_contents_preferences.h"
  104. #include "shell/browser/webauthn/electron_authenticator_request_delegate.h"
  105. #include "shell/browser/window_list.h"
  106. #include "shell/common/api/api.mojom.h"
  107. #include "shell/common/application_info.h"
  108. #include "shell/common/electron_paths.h"
  109. #include "shell/common/logging.h"
  110. #include "shell/common/options_switches.h"
  111. #include "shell/common/platform_util.h"
  112. #include "shell/common/thread_restrictions.h"
  113. #include "third_party/blink/public/common/associated_interfaces/associated_interface_registry.h"
  114. #include "third_party/blink/public/common/loader/url_loader_throttle.h"
  115. #include "third_party/blink/public/common/renderer_preferences/renderer_preferences.h"
  116. #include "third_party/blink/public/common/tokens/tokens.h"
  117. #include "third_party/blink/public/common/web_preferences/web_preferences.h"
  118. #include "third_party/blink/public/mojom/badging/badging.mojom.h"
  119. #include "ui/base/resource/resource_bundle.h"
  120. #include "ui/native_theme/native_theme.h"
  121. #include "v8/include/v8.h"
  122. #if BUILDFLAG(USE_NSS_CERTS)
  123. #include "net/ssl/client_cert_store_nss.h"
  124. #elif BUILDFLAG(IS_WIN)
  125. #include "net/ssl/client_cert_store_win.h"
  126. #elif BUILDFLAG(IS_MAC)
  127. #include "net/ssl/client_cert_store_mac.h"
  128. #elif defined(USE_OPENSSL)
  129. #include "net/ssl/client_cert_store.h"
  130. #endif
  131. #if BUILDFLAG(ENABLE_BUILTIN_SPELLCHECKER)
  132. #include "chrome/browser/spellchecker/spell_check_host_chrome_impl.h" // nogncheck
  133. #include "components/spellcheck/common/spellcheck.mojom.h" // nogncheck
  134. #endif
  135. #if BUILDFLAG(OVERRIDE_LOCATION_PROVIDER)
  136. #include "shell/browser/fake_location_provider.h"
  137. #endif // BUILDFLAG(OVERRIDE_LOCATION_PROVIDER)
  138. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  139. #include "base/functional/bind.h"
  140. #include "chrome/common/webui_url_constants.h"
  141. #include "components/guest_view/common/guest_view.mojom.h"
  142. #include "content/public/browser/child_process_security_policy.h"
  143. #include "content/public/browser/file_url_loader.h"
  144. #include "content/public/browser/web_ui_url_loader_factory.h"
  145. #include "extensions/browser/api/messaging/messaging_api_message_filter.h"
  146. #include "extensions/browser/api/mime_handler_private/mime_handler_private.h"
  147. #include "extensions/browser/api/web_request/web_request_api.h"
  148. #include "extensions/browser/browser_context_keyed_api_factory.h"
  149. #include "extensions/browser/event_router.h"
  150. #include "extensions/browser/extension_host.h"
  151. #include "extensions/browser/extension_message_filter.h"
  152. #include "extensions/browser/extension_navigation_throttle.h"
  153. #include "extensions/browser/extension_prefs.h"
  154. #include "extensions/browser/extension_protocols.h"
  155. #include "extensions/browser/extension_registry.h"
  156. #include "extensions/browser/extensions_browser_client.h"
  157. #include "extensions/browser/guest_view/extensions_guest_view.h"
  158. #include "extensions/browser/guest_view/mime_handler_view/mime_handler_view_guest.h"
  159. #include "extensions/browser/process_manager.h"
  160. #include "extensions/browser/process_map.h"
  161. #include "extensions/browser/renderer_startup_helper.h"
  162. #include "extensions/browser/service_worker/service_worker_host.h"
  163. #include "extensions/browser/url_loader_factory_manager.h"
  164. #include "extensions/common/api/mime_handler.mojom.h"
  165. #include "extensions/common/constants.h"
  166. #include "extensions/common/extension.h"
  167. #include "extensions/common/mojom/event_router.mojom.h"
  168. #include "extensions/common/mojom/guest_view.mojom.h"
  169. #include "extensions/common/mojom/renderer_host.mojom.h"
  170. #include "extensions/common/switches.h"
  171. #include "shell/browser/extensions/electron_extension_message_filter.h"
  172. #include "shell/browser/extensions/electron_extension_system.h"
  173. #include "shell/browser/extensions/electron_extension_web_contents_observer.h"
  174. #endif
  175. #if BUILDFLAG(ENABLE_PLUGINS)
  176. #include "chrome/browser/plugins/plugin_response_interceptor_url_loader_throttle.h" // nogncheck
  177. #include "shell/browser/plugins/plugin_utils.h"
  178. #endif
  179. #if BUILDFLAG(IS_MAC)
  180. #include "content/browser/mac_helpers.h"
  181. #include "content/public/browser/child_process_host.h"
  182. #endif
  183. #if BUILDFLAG(IS_LINUX)
  184. #include "components/crash/core/app/crash_switches.h" // nogncheck
  185. #include "components/crash/core/app/crashpad.h" // nogncheck
  186. #endif
  187. #if BUILDFLAG(IS_WIN)
  188. #include "chrome/browser/ui/views/overlay/video_overlay_window_views.h"
  189. #include "shell/browser/browser.h"
  190. #include "ui/aura/window.h"
  191. #include "ui/aura/window_tree_host.h"
  192. #include "ui/base/win/shell.h"
  193. #include "ui/views/widget/widget.h"
  194. #endif
  195. #if BUILDFLAG(ENABLE_PRINTING)
  196. #include "shell/browser/printing/print_view_manager_electron.h"
  197. #endif
  198. #if BUILDFLAG(ENABLE_PDF_VIEWER)
  199. #include "chrome/browser/pdf/chrome_pdf_stream_delegate.h"
  200. #include "chrome/browser/plugins/pdf_iframe_navigation_throttle.h" // nogncheck
  201. #include "components/pdf/browser/pdf_document_helper.h" // nogncheck
  202. #include "components/pdf/browser/pdf_navigation_throttle.h"
  203. #include "components/pdf/browser/pdf_url_loader_request_interceptor.h"
  204. #include "components/pdf/common/internal_plugin_helpers.h"
  205. #include "shell/browser/electron_pdf_document_helper_client.h"
  206. #endif
  207. using content::BrowserThread;
  208. namespace electron {
  209. namespace {
  210. ElectronBrowserClient* g_browser_client = nullptr;
  211. base::LazyInstance<std::string>::DestructorAtExit
  212. g_io_thread_application_locale = LAZY_INSTANCE_INITIALIZER;
  213. base::NoDestructor<std::string> g_application_locale;
  214. void SetApplicationLocaleOnIOThread(const std::string& locale) {
  215. DCHECK_CURRENTLY_ON(BrowserThread::IO);
  216. g_io_thread_application_locale.Get() = locale;
  217. }
  218. void BindNetworkHintsHandler(
  219. content::RenderFrameHost* frame_host,
  220. mojo::PendingReceiver<network_hints::mojom::NetworkHintsHandler> receiver) {
  221. NetworkHintsHandlerImpl::Create(frame_host, std::move(receiver));
  222. }
  223. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  224. // Used by the GetPrivilegeRequiredByUrl() and GetProcessPrivilege() functions
  225. // below. Extension, and isolated apps require different privileges to be
  226. // granted to their RenderProcessHosts. This classification allows us to make
  227. // sure URLs are served by hosts with the right set of privileges.
  228. enum class RenderProcessHostPrivilege {
  229. kNormal,
  230. kHosted,
  231. kIsolated,
  232. kExtension,
  233. };
  234. // Copied from chrome/browser/extensions/extension_util.cc.
  235. bool AllowFileAccess(const std::string& extension_id,
  236. content::BrowserContext* context) {
  237. return base::CommandLine::ForCurrentProcess()->HasSwitch(
  238. extensions::switches::kDisableExtensionsFileAccessCheck) ||
  239. extensions::ExtensionPrefs::Get(context)->AllowFileAccess(
  240. extension_id);
  241. }
  242. RenderProcessHostPrivilege GetPrivilegeRequiredByUrl(
  243. const GURL& url,
  244. extensions::ExtensionRegistry* registry) {
  245. // Default to a normal renderer cause it is lower privileged. This should only
  246. // occur if the URL on a site instance is either malformed, or uninitialized.
  247. // If it is malformed, then there is no need for better privileges anyways.
  248. // If it is uninitialized, but eventually settles on being an a scheme other
  249. // than normal webrenderer, the navigation logic will correct us out of band
  250. // anyways.
  251. if (!url.is_valid())
  252. return RenderProcessHostPrivilege::kNormal;
  253. if (!url.SchemeIs(extensions::kExtensionScheme))
  254. return RenderProcessHostPrivilege::kNormal;
  255. return RenderProcessHostPrivilege::kExtension;
  256. }
  257. RenderProcessHostPrivilege GetProcessPrivilege(
  258. content::RenderProcessHost* process_host,
  259. extensions::ProcessMap* process_map,
  260. extensions::ExtensionRegistry* registry) {
  261. std::set<std::string> extension_ids =
  262. process_map->GetExtensionsInProcess(process_host->GetID());
  263. if (extension_ids.empty())
  264. return RenderProcessHostPrivilege::kNormal;
  265. return RenderProcessHostPrivilege::kExtension;
  266. }
  267. const extensions::Extension* GetEnabledExtensionFromEffectiveURL(
  268. content::BrowserContext* context,
  269. const GURL& effective_url) {
  270. if (!effective_url.SchemeIs(extensions::kExtensionScheme))
  271. return nullptr;
  272. extensions::ExtensionRegistry* registry =
  273. extensions::ExtensionRegistry::Get(context);
  274. if (!registry)
  275. return nullptr;
  276. return registry->enabled_extensions().GetByID(effective_url.host());
  277. }
  278. #endif // BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  279. #if BUILDFLAG(IS_LINUX)
  280. int GetCrashSignalFD(const base::CommandLine& command_line) {
  281. int fd;
  282. return crash_reporter::GetHandlerSocket(&fd, nullptr) ? fd : -1;
  283. }
  284. #endif // BUILDFLAG(IS_LINUX)
  285. void MaybeAppendSecureOriginsAllowlistSwitch(base::CommandLine* cmdline) {
  286. // |allowlist| combines pref/policy + cmdline switch in the browser process.
  287. // For renderer and utility (e.g. NetworkService) processes the switch is the
  288. // only available source, so below the combined (pref/policy + cmdline)
  289. // allowlist of secure origins is injected into |cmdline| for these other
  290. // processes.
  291. std::vector<std::string> allowlist =
  292. network::SecureOriginAllowlist::GetInstance().GetCurrentAllowlist();
  293. if (!allowlist.empty()) {
  294. cmdline->AppendSwitchASCII(
  295. network::switches::kUnsafelyTreatInsecureOriginAsSecure,
  296. base::JoinString(allowlist, ","));
  297. }
  298. }
  299. } // namespace
  300. // static
  301. ElectronBrowserClient* ElectronBrowserClient::Get() {
  302. return g_browser_client;
  303. }
  304. // static
  305. void ElectronBrowserClient::SetApplicationLocale(const std::string& locale) {
  306. if (!BrowserThread::IsThreadInitialized(BrowserThread::IO) ||
  307. !content::GetIOThreadTaskRunner({})->PostTask(
  308. FROM_HERE, base::BindOnce(&SetApplicationLocaleOnIOThread, locale))) {
  309. g_io_thread_application_locale.Get() = locale;
  310. }
  311. *g_application_locale = locale;
  312. }
  313. ElectronBrowserClient::ElectronBrowserClient() {
  314. DCHECK(!g_browser_client);
  315. g_browser_client = this;
  316. }
  317. ElectronBrowserClient::~ElectronBrowserClient() {
  318. DCHECK(g_browser_client);
  319. g_browser_client = nullptr;
  320. }
  321. content::WebContents* ElectronBrowserClient::GetWebContentsFromProcessID(
  322. int process_id) {
  323. // If the process is a pending process, we should use the web contents
  324. // for the frame host passed into RegisterPendingProcess.
  325. const auto iter = pending_processes_.find(process_id);
  326. if (iter != std::end(pending_processes_))
  327. return iter->second;
  328. // Certain render process will be created with no associated render view,
  329. // for example: ServiceWorker.
  330. return WebContentsPreferences::GetWebContentsFromProcessID(process_id);
  331. }
  332. content::SiteInstance* ElectronBrowserClient::GetSiteInstanceFromAffinity(
  333. content::BrowserContext* browser_context,
  334. const GURL& url,
  335. content::RenderFrameHost* rfh) const {
  336. return nullptr;
  337. }
  338. bool ElectronBrowserClient::IsRendererSubFrame(int process_id) const {
  339. return base::Contains(renderer_is_subframe_, process_id);
  340. }
  341. void ElectronBrowserClient::RenderProcessWillLaunch(
  342. content::RenderProcessHost* host) {
  343. // When a render process is crashed, it might be reused.
  344. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  345. int process_id = host->GetID();
  346. auto* browser_context = host->GetBrowserContext();
  347. host->AddFilter(
  348. new extensions::ExtensionMessageFilter(process_id, browser_context));
  349. host->AddFilter(
  350. new ElectronExtensionMessageFilter(process_id, browser_context));
  351. host->AddFilter(
  352. new extensions::MessagingAPIMessageFilter(process_id, browser_context));
  353. #endif
  354. // Remove in case the host is reused after a crash, otherwise noop.
  355. host->RemoveObserver(this);
  356. // ensure the ProcessPreferences is removed later
  357. host->AddObserver(this);
  358. }
  359. content::SpeechRecognitionManagerDelegate*
  360. ElectronBrowserClient::CreateSpeechRecognitionManagerDelegate() {
  361. return new ElectronSpeechRecognitionManagerDelegate;
  362. }
  363. content::TtsPlatform* ElectronBrowserClient::GetTtsPlatform() {
  364. return nullptr;
  365. }
  366. void ElectronBrowserClient::OverrideWebkitPrefs(
  367. content::WebContents* web_contents,
  368. blink::web_pref::WebPreferences* prefs) {
  369. prefs->javascript_enabled = true;
  370. prefs->web_security_enabled = true;
  371. prefs->plugins_enabled = true;
  372. prefs->dom_paste_enabled = true;
  373. prefs->allow_scripts_to_close_windows = true;
  374. prefs->javascript_can_access_clipboard = true;
  375. prefs->local_storage_enabled = true;
  376. prefs->databases_enabled = true;
  377. prefs->allow_universal_access_from_file_urls = true;
  378. prefs->allow_file_access_from_file_urls = true;
  379. prefs->webgl1_enabled = true;
  380. prefs->webgl2_enabled = true;
  381. prefs->allow_running_insecure_content = false;
  382. prefs->default_minimum_page_scale_factor = 1.f;
  383. prefs->default_maximum_page_scale_factor = 1.f;
  384. blink::RendererPreferences* renderer_prefs =
  385. web_contents->GetMutableRendererPrefs();
  386. renderer_prefs->can_accept_load_drops = false;
  387. ui::NativeTheme* native_theme = ui::NativeTheme::GetInstanceForNativeUi();
  388. prefs->preferred_color_scheme =
  389. native_theme->ShouldUseDarkColors()
  390. ? blink::mojom::PreferredColorScheme::kDark
  391. : blink::mojom::PreferredColorScheme::kLight;
  392. SetFontDefaults(prefs);
  393. // Custom preferences of guest page.
  394. auto* web_preferences = WebContentsPreferences::From(web_contents);
  395. if (web_preferences) {
  396. web_preferences->OverrideWebkitPrefs(prefs, renderer_prefs);
  397. }
  398. }
  399. void ElectronBrowserClient::RegisterPendingSiteInstance(
  400. content::RenderFrameHost* rfh,
  401. content::SiteInstance* pending_site_instance) {
  402. // Remember the original web contents for the pending renderer process.
  403. auto* web_contents = content::WebContents::FromRenderFrameHost(rfh);
  404. auto* pending_process = pending_site_instance->GetProcess();
  405. pending_processes_[pending_process->GetID()] = web_contents;
  406. if (rfh->GetParent())
  407. renderer_is_subframe_.insert(pending_process->GetID());
  408. else
  409. renderer_is_subframe_.erase(pending_process->GetID());
  410. }
  411. void ElectronBrowserClient::AppendExtraCommandLineSwitches(
  412. base::CommandLine* command_line,
  413. int process_id) {
  414. // Make sure we're about to launch a known executable
  415. {
  416. ScopedAllowBlockingForElectron allow_blocking;
  417. base::FilePath child_path;
  418. base::FilePath program =
  419. base::MakeAbsoluteFilePath(command_line->GetProgram());
  420. #if BUILDFLAG(IS_MAC)
  421. auto renderer_child_path = content::ChildProcessHost::GetChildPath(
  422. content::ChildProcessHost::CHILD_RENDERER);
  423. auto gpu_child_path = content::ChildProcessHost::GetChildPath(
  424. content::ChildProcessHost::CHILD_GPU);
  425. auto plugin_child_path = content::ChildProcessHost::GetChildPath(
  426. content::ChildProcessHost::CHILD_PLUGIN);
  427. if (program != renderer_child_path && program != gpu_child_path &&
  428. program != plugin_child_path) {
  429. child_path = content::ChildProcessHost::GetChildPath(
  430. content::ChildProcessHost::CHILD_NORMAL);
  431. CHECK_EQ(program, child_path)
  432. << "Aborted from launching unexpected helper executable";
  433. }
  434. #else
  435. if (!base::PathService::Get(content::CHILD_PROCESS_EXE, &child_path)) {
  436. CHECK(false) << "Unable to get child process binary name.";
  437. }
  438. SCOPED_CRASH_KEY_STRING256("ChildProcess", "child_process_exe",
  439. child_path.AsUTF8Unsafe());
  440. SCOPED_CRASH_KEY_STRING256("ChildProcess", "program",
  441. program.AsUTF8Unsafe());
  442. CHECK_EQ(program, child_path);
  443. #endif
  444. }
  445. std::string process_type =
  446. command_line->GetSwitchValueASCII(::switches::kProcessType);
  447. #if BUILDFLAG(IS_LINUX)
  448. pid_t pid;
  449. if (crash_reporter::GetHandlerSocket(nullptr, &pid)) {
  450. command_line->AppendSwitchASCII(
  451. crash_reporter::switches::kCrashpadHandlerPid,
  452. base::NumberToString(pid));
  453. }
  454. // Zygote Process gets booted before any JS runs, accessing GetClientId
  455. // will end up touching DIR_USER_DATA path provider and this will
  456. // configure default value because app.name from browser_init has
  457. // not run yet.
  458. if (process_type != ::switches::kZygoteProcess) {
  459. std::string switch_value =
  460. api::crash_reporter::GetClientId() + ",no_channel";
  461. command_line->AppendSwitchASCII(::switches::kEnableCrashReporter,
  462. switch_value);
  463. }
  464. #endif
  465. // The zygote process is booted before JS runs, so DIR_USER_DATA isn't usable
  466. // at that time. It doesn't need --user-data-dir to be correct anyway, since
  467. // the zygote itself doesn't access anything in that directory.
  468. if (process_type != ::switches::kZygoteProcess) {
  469. base::FilePath user_data_dir;
  470. if (base::PathService::Get(chrome::DIR_USER_DATA, &user_data_dir))
  471. command_line->AppendSwitchPath(::switches::kUserDataDir, user_data_dir);
  472. }
  473. if (process_type == ::switches::kUtilityProcess ||
  474. process_type == ::switches::kRendererProcess) {
  475. // Copy following switches to child process.
  476. static const char* const kCommonSwitchNames[] = {
  477. switches::kStandardSchemes, switches::kEnableSandbox,
  478. switches::kSecureSchemes, switches::kBypassCSPSchemes,
  479. switches::kCORSSchemes, switches::kFetchSchemes,
  480. switches::kServiceWorkerSchemes, switches::kStreamingSchemes};
  481. command_line->CopySwitchesFrom(*base::CommandLine::ForCurrentProcess(),
  482. kCommonSwitchNames);
  483. if (process_type == ::switches::kUtilityProcess ||
  484. content::RenderProcessHost::FromID(process_id)) {
  485. MaybeAppendSecureOriginsAllowlistSwitch(command_line);
  486. }
  487. }
  488. if (process_type == ::switches::kRendererProcess) {
  489. #if BUILDFLAG(IS_WIN)
  490. // Append --app-user-model-id.
  491. PWSTR current_app_id;
  492. if (SUCCEEDED(GetCurrentProcessExplicitAppUserModelID(&current_app_id))) {
  493. command_line->AppendSwitchNative(switches::kAppUserModelId,
  494. current_app_id);
  495. CoTaskMemFree(current_app_id);
  496. }
  497. #endif
  498. if (delegate_) {
  499. auto app_path = static_cast<api::App*>(delegate_)->GetAppPath();
  500. command_line->AppendSwitchPath(switches::kAppPath, app_path);
  501. }
  502. auto env = base::Environment::Create();
  503. if (env->HasVar("ELECTRON_PROFILE_INIT_SCRIPTS")) {
  504. command_line->AppendSwitch("profile-electron-init");
  505. }
  506. // Extension background pages don't have WebContentsPreferences, but they
  507. // support WebSQL by default.
  508. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  509. content::RenderProcessHost* process =
  510. content::RenderProcessHost::FromID(process_id);
  511. if (extensions::ProcessMap::Get(process->GetBrowserContext())
  512. ->Contains(process_id))
  513. command_line->AppendSwitch(switches::kEnableWebSQL);
  514. #endif
  515. content::WebContents* web_contents =
  516. GetWebContentsFromProcessID(process_id);
  517. if (web_contents) {
  518. auto* web_preferences = WebContentsPreferences::From(web_contents);
  519. if (web_preferences)
  520. web_preferences->AppendCommandLineSwitches(
  521. command_line, IsRendererSubFrame(process_id));
  522. }
  523. }
  524. }
  525. void ElectronBrowserClient::DidCreatePpapiPlugin(
  526. content::BrowserPpapiHost* host) {}
  527. // attempt to get api key from env
  528. std::string ElectronBrowserClient::GetGeolocationApiKey() {
  529. auto env = base::Environment::Create();
  530. std::string api_key;
  531. env->GetVar("GOOGLE_API_KEY", &api_key);
  532. return api_key;
  533. }
  534. content::GeneratedCodeCacheSettings
  535. ElectronBrowserClient::GetGeneratedCodeCacheSettings(
  536. content::BrowserContext* context) {
  537. // TODO(deepak1556): Use platform cache directory.
  538. base::FilePath cache_path = context->GetPath();
  539. // If we pass 0 for size, disk_cache will pick a default size using the
  540. // heuristics based on available disk size. These are implemented in
  541. // disk_cache::PreferredCacheSize in net/disk_cache/cache_util.cc.
  542. return content::GeneratedCodeCacheSettings(true, 0, cache_path);
  543. }
  544. void ElectronBrowserClient::AllowCertificateError(
  545. content::WebContents* web_contents,
  546. int cert_error,
  547. const net::SSLInfo& ssl_info,
  548. const GURL& request_url,
  549. bool is_main_frame_request,
  550. bool strict_enforcement,
  551. base::OnceCallback<void(content::CertificateRequestResultType)> callback) {
  552. if (delegate_) {
  553. delegate_->AllowCertificateError(web_contents, cert_error, ssl_info,
  554. request_url, is_main_frame_request,
  555. strict_enforcement, std::move(callback));
  556. }
  557. }
  558. base::OnceClosure ElectronBrowserClient::SelectClientCertificate(
  559. content::BrowserContext* browser_context,
  560. content::WebContents* web_contents,
  561. net::SSLCertRequestInfo* cert_request_info,
  562. net::ClientCertIdentityList client_certs,
  563. std::unique_ptr<content::ClientCertificateDelegate> delegate) {
  564. if (client_certs.empty()) {
  565. delegate->ContinueWithCertificate(nullptr, nullptr);
  566. } else if (delegate_) {
  567. delegate_->SelectClientCertificate(
  568. browser_context, web_contents, cert_request_info,
  569. std::move(client_certs), std::move(delegate));
  570. }
  571. return base::OnceClosure();
  572. }
  573. bool ElectronBrowserClient::CanCreateWindow(
  574. content::RenderFrameHost* opener,
  575. const GURL& opener_url,
  576. const GURL& opener_top_level_frame_url,
  577. const url::Origin& source_origin,
  578. content::mojom::WindowContainerType container_type,
  579. const GURL& target_url,
  580. const content::Referrer& referrer,
  581. const std::string& frame_name,
  582. WindowOpenDisposition disposition,
  583. const blink::mojom::WindowFeatures& features,
  584. const std::string& raw_features,
  585. const scoped_refptr<network::ResourceRequestBody>& body,
  586. bool user_gesture,
  587. bool opener_suppressed,
  588. bool* no_javascript_access) {
  589. DCHECK_CURRENTLY_ON(BrowserThread::UI);
  590. content::WebContents* web_contents =
  591. content::WebContents::FromRenderFrameHost(opener);
  592. WebContentsPreferences* prefs = WebContentsPreferences::From(web_contents);
  593. if (prefs) {
  594. if (prefs->ShouldDisablePopups()) {
  595. // <webview> without allowpopups attribute should return
  596. // null from window.open calls
  597. return false;
  598. } else {
  599. *no_javascript_access = false;
  600. return true;
  601. }
  602. }
  603. if (delegate_) {
  604. return delegate_->CanCreateWindow(
  605. opener, opener_url, opener_top_level_frame_url, source_origin,
  606. container_type, target_url, referrer, frame_name, disposition, features,
  607. raw_features, body, user_gesture, opener_suppressed,
  608. no_javascript_access);
  609. }
  610. return false;
  611. }
  612. std::unique_ptr<content::VideoOverlayWindow>
  613. ElectronBrowserClient::CreateWindowForVideoPictureInPicture(
  614. content::VideoPictureInPictureWindowController* controller) {
  615. auto overlay_window = content::VideoOverlayWindow::Create(controller);
  616. #if BUILDFLAG(IS_WIN)
  617. std::wstring app_user_model_id = Browser::Get()->GetAppUserModelID();
  618. if (!app_user_model_id.empty()) {
  619. auto* overlay_window_view =
  620. static_cast<VideoOverlayWindowViews*>(overlay_window.get());
  621. ui::win::SetAppIdForWindow(app_user_model_id,
  622. overlay_window_view->GetNativeWindow()
  623. ->GetHost()
  624. ->GetAcceleratedWidget());
  625. }
  626. #endif
  627. return overlay_window;
  628. }
  629. void ElectronBrowserClient::GetAdditionalAllowedSchemesForFileSystem(
  630. std::vector<std::string>* additional_schemes) {
  631. auto schemes_list = api::GetStandardSchemes();
  632. if (!schemes_list.empty())
  633. additional_schemes->insert(additional_schemes->end(), schemes_list.begin(),
  634. schemes_list.end());
  635. additional_schemes->push_back(content::kChromeDevToolsScheme);
  636. additional_schemes->push_back(content::kChromeUIScheme);
  637. }
  638. void ElectronBrowserClient::GetAdditionalWebUISchemes(
  639. std::vector<std::string>* additional_schemes) {
  640. additional_schemes->push_back(content::kChromeDevToolsScheme);
  641. }
  642. void ElectronBrowserClient::SiteInstanceGotProcess(
  643. content::SiteInstance* site_instance) {
  644. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  645. auto* browser_context =
  646. static_cast<ElectronBrowserContext*>(site_instance->GetBrowserContext());
  647. if (!browser_context->IsOffTheRecord()) {
  648. extensions::ExtensionRegistry* registry =
  649. extensions::ExtensionRegistry::Get(browser_context);
  650. const extensions::Extension* extension =
  651. registry->enabled_extensions().GetExtensionOrAppByURL(
  652. site_instance->GetSiteURL());
  653. if (!extension)
  654. return;
  655. extensions::ProcessMap::Get(browser_context)
  656. ->Insert(extension->id(), site_instance->GetProcess()->GetID());
  657. }
  658. #endif // BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  659. }
  660. bool ElectronBrowserClient::IsSuitableHost(
  661. content::RenderProcessHost* process_host,
  662. const GURL& site_url) {
  663. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  664. auto* browser_context = process_host->GetBrowserContext();
  665. extensions::ExtensionRegistry* registry =
  666. extensions::ExtensionRegistry::Get(browser_context);
  667. extensions::ProcessMap* process_map =
  668. extensions::ProcessMap::Get(browser_context);
  669. // Otherwise, just make sure the process privilege matches the privilege
  670. // required by the site.
  671. RenderProcessHostPrivilege privilege_required =
  672. GetPrivilegeRequiredByUrl(site_url, registry);
  673. return GetProcessPrivilege(process_host, process_map, registry) ==
  674. privilege_required;
  675. #else
  676. return content::ContentBrowserClient::IsSuitableHost(process_host, site_url);
  677. #endif
  678. }
  679. bool ElectronBrowserClient::ShouldUseProcessPerSite(
  680. content::BrowserContext* browser_context,
  681. const GURL& effective_url) {
  682. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  683. const extensions::Extension* extension =
  684. GetEnabledExtensionFromEffectiveURL(browser_context, effective_url);
  685. return extension != nullptr;
  686. #else
  687. return content::ContentBrowserClient::ShouldUseProcessPerSite(browser_context,
  688. effective_url);
  689. #endif
  690. }
  691. void ElectronBrowserClient::GetMediaDeviceIDSalt(
  692. content::RenderFrameHost* rfh,
  693. const net::SiteForCookies& site_for_cookies,
  694. const blink::StorageKey& storage_key,
  695. base::OnceCallback<void(bool, const std::string&)> callback) {
  696. constexpr bool persistent_media_device_id_allowed = true;
  697. std::string persistent_media_device_id_salt =
  698. static_cast<ElectronBrowserContext*>(rfh->GetBrowserContext())
  699. ->GetMediaDeviceIDSalt();
  700. std::move(callback).Run(persistent_media_device_id_allowed,
  701. persistent_media_device_id_salt);
  702. }
  703. base::FilePath ElectronBrowserClient::GetLoggingFileName(
  704. const base::CommandLine& cmd_line) {
  705. return logging::GetLogFileName(cmd_line);
  706. }
  707. std::unique_ptr<net::ClientCertStore>
  708. ElectronBrowserClient::CreateClientCertStore(
  709. content::BrowserContext* browser_context) {
  710. #if BUILDFLAG(USE_NSS_CERTS)
  711. return std::make_unique<net::ClientCertStoreNSS>(
  712. net::ClientCertStoreNSS::PasswordDelegateFactory());
  713. #elif BUILDFLAG(IS_WIN)
  714. return std::make_unique<net::ClientCertStoreWin>();
  715. #elif BUILDFLAG(IS_MAC)
  716. return std::make_unique<net::ClientCertStoreMac>();
  717. #elif defined(USE_OPENSSL)
  718. return std::unique_ptr<net::ClientCertStore>();
  719. #endif
  720. }
  721. std::unique_ptr<device::LocationProvider>
  722. ElectronBrowserClient::OverrideSystemLocationProvider() {
  723. #if BUILDFLAG(OVERRIDE_LOCATION_PROVIDER)
  724. return std::make_unique<FakeLocationProvider>();
  725. #else
  726. return nullptr;
  727. #endif
  728. }
  729. void ElectronBrowserClient::ConfigureNetworkContextParams(
  730. content::BrowserContext* browser_context,
  731. bool in_memory,
  732. const base::FilePath& relative_partition_path,
  733. network::mojom::NetworkContextParams* network_context_params,
  734. cert_verifier::mojom::CertVerifierCreationParams*
  735. cert_verifier_creation_params) {
  736. DCHECK(browser_context);
  737. return NetworkContextServiceFactory::GetForContext(browser_context)
  738. ->ConfigureNetworkContextParams(network_context_params,
  739. cert_verifier_creation_params);
  740. }
  741. network::mojom::NetworkContext*
  742. ElectronBrowserClient::GetSystemNetworkContext() {
  743. DCHECK_CURRENTLY_ON(BrowserThread::UI);
  744. DCHECK(g_browser_process->system_network_context_manager());
  745. return g_browser_process->system_network_context_manager()->GetContext();
  746. }
  747. std::unique_ptr<content::BrowserMainParts>
  748. ElectronBrowserClient::CreateBrowserMainParts(bool /* is_integration_test */) {
  749. auto browser_main_parts = std::make_unique<ElectronBrowserMainParts>();
  750. #if BUILDFLAG(IS_MAC)
  751. browser_main_parts_ = browser_main_parts.get();
  752. #endif
  753. return browser_main_parts;
  754. }
  755. void ElectronBrowserClient::WebNotificationAllowed(
  756. content::RenderFrameHost* rfh,
  757. base::OnceCallback<void(bool, bool)> callback) {
  758. content::WebContents* web_contents =
  759. content::WebContents::FromRenderFrameHost(rfh);
  760. if (!web_contents) {
  761. std::move(callback).Run(false, false);
  762. return;
  763. }
  764. auto* permission_helper =
  765. WebContentsPermissionHelper::FromWebContents(web_contents);
  766. if (!permission_helper) {
  767. std::move(callback).Run(false, false);
  768. return;
  769. }
  770. permission_helper->RequestWebNotificationPermission(
  771. rfh, base::BindOnce(std::move(callback), web_contents->IsAudioMuted()));
  772. }
  773. void ElectronBrowserClient::RenderProcessHostDestroyed(
  774. content::RenderProcessHost* host) {
  775. int process_id = host->GetID();
  776. pending_processes_.erase(process_id);
  777. renderer_is_subframe_.erase(process_id);
  778. host->RemoveObserver(this);
  779. }
  780. void ElectronBrowserClient::RenderProcessReady(
  781. content::RenderProcessHost* host) {
  782. if (delegate_) {
  783. static_cast<api::App*>(delegate_)->RenderProcessReady(host);
  784. }
  785. }
  786. void ElectronBrowserClient::RenderProcessExited(
  787. content::RenderProcessHost* host,
  788. const content::ChildProcessTerminationInfo& info) {
  789. if (delegate_) {
  790. static_cast<api::App*>(delegate_)->RenderProcessExited(host);
  791. }
  792. }
  793. void OnOpenExternal(const GURL& escaped_url, bool allowed) {
  794. if (allowed) {
  795. platform_util::OpenExternal(
  796. escaped_url, platform_util::OpenExternalOptions(), base::DoNothing());
  797. }
  798. }
  799. void HandleExternalProtocolInUI(
  800. const GURL& url,
  801. content::WeakDocumentPtr document_ptr,
  802. content::WebContents::OnceGetter web_contents_getter,
  803. bool has_user_gesture) {
  804. content::WebContents* web_contents = std::move(web_contents_getter).Run();
  805. if (!web_contents)
  806. return;
  807. auto* permission_helper =
  808. WebContentsPermissionHelper::FromWebContents(web_contents);
  809. if (!permission_helper)
  810. return;
  811. content::RenderFrameHost* rfh = document_ptr.AsRenderFrameHostIfValid();
  812. if (!rfh) {
  813. // If the render frame host is not valid it means it was a top level
  814. // navigation and the frame has already been disposed of. In this case we
  815. // take the current main frame and declare it responsible for the
  816. // transition.
  817. rfh = web_contents->GetPrimaryMainFrame();
  818. }
  819. GURL escaped_url(base::EscapeExternalHandlerValue(url.spec()));
  820. auto callback = base::BindOnce(&OnOpenExternal, escaped_url);
  821. permission_helper->RequestOpenExternalPermission(rfh, std::move(callback),
  822. has_user_gesture, url);
  823. }
  824. bool ElectronBrowserClient::HandleExternalProtocol(
  825. const GURL& url,
  826. content::WebContents::Getter web_contents_getter,
  827. int frame_tree_node_id,
  828. content::NavigationUIData* navigation_data,
  829. bool is_primary_main_frame,
  830. bool is_in_fenced_frame_tree,
  831. network::mojom::WebSandboxFlags sandbox_flags,
  832. ui::PageTransition page_transition,
  833. bool has_user_gesture,
  834. const absl::optional<url::Origin>& initiating_origin,
  835. content::RenderFrameHost* initiator_document,
  836. mojo::PendingRemote<network::mojom::URLLoaderFactory>* out_factory) {
  837. content::GetUIThreadTaskRunner({})->PostTask(
  838. FROM_HERE,
  839. base::BindOnce(&HandleExternalProtocolInUI, url,
  840. initiator_document
  841. ? initiator_document->GetWeakDocumentPtr()
  842. : content::WeakDocumentPtr(),
  843. std::move(web_contents_getter), has_user_gesture));
  844. return true;
  845. }
  846. std::vector<std::unique_ptr<content::NavigationThrottle>>
  847. ElectronBrowserClient::CreateThrottlesForNavigation(
  848. content::NavigationHandle* handle) {
  849. std::vector<std::unique_ptr<content::NavigationThrottle>> throttles;
  850. throttles.push_back(std::make_unique<ElectronNavigationThrottle>(handle));
  851. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  852. throttles.push_back(
  853. std::make_unique<extensions::ExtensionNavigationThrottle>(handle));
  854. #endif
  855. #if BUILDFLAG(ENABLE_PDF_VIEWER)
  856. std::unique_ptr<content::NavigationThrottle> pdf_iframe_throttle =
  857. PDFIFrameNavigationThrottle::MaybeCreateThrottleFor(handle);
  858. if (pdf_iframe_throttle)
  859. throttles.push_back(std::move(pdf_iframe_throttle));
  860. std::unique_ptr<content::NavigationThrottle> pdf_throttle =
  861. pdf::PdfNavigationThrottle::MaybeCreateThrottleFor(
  862. handle, std::make_unique<ChromePdfStreamDelegate>());
  863. if (pdf_throttle)
  864. throttles.push_back(std::move(pdf_throttle));
  865. #endif
  866. return throttles;
  867. }
  868. content::MediaObserver* ElectronBrowserClient::GetMediaObserver() {
  869. return MediaCaptureDevicesDispatcher::GetInstance();
  870. }
  871. std::unique_ptr<content::DevToolsManagerDelegate>
  872. ElectronBrowserClient::CreateDevToolsManagerDelegate() {
  873. return std::make_unique<DevToolsManagerDelegate>();
  874. }
  875. NotificationPresenter* ElectronBrowserClient::GetNotificationPresenter() {
  876. if (!notification_presenter_) {
  877. notification_presenter_.reset(NotificationPresenter::Create());
  878. }
  879. return notification_presenter_.get();
  880. }
  881. content::PlatformNotificationService*
  882. ElectronBrowserClient::GetPlatformNotificationService() {
  883. if (!notification_service_) {
  884. notification_service_ = std::make_unique<PlatformNotificationService>(this);
  885. }
  886. return notification_service_.get();
  887. }
  888. base::FilePath ElectronBrowserClient::GetDefaultDownloadDirectory() {
  889. base::FilePath download_path;
  890. if (base::PathService::Get(chrome::DIR_DEFAULT_DOWNLOADS, &download_path))
  891. return download_path;
  892. return base::FilePath();
  893. }
  894. scoped_refptr<network::SharedURLLoaderFactory>
  895. ElectronBrowserClient::GetSystemSharedURLLoaderFactory() {
  896. if (!g_browser_process)
  897. return nullptr;
  898. return g_browser_process->shared_url_loader_factory();
  899. }
  900. void ElectronBrowserClient::OnNetworkServiceCreated(
  901. network::mojom::NetworkService* network_service) {
  902. if (!g_browser_process)
  903. return;
  904. g_browser_process->system_network_context_manager()->OnNetworkServiceCreated(
  905. network_service);
  906. }
  907. std::vector<base::FilePath>
  908. ElectronBrowserClient::GetNetworkContextsParentDirectory() {
  909. base::FilePath session_data;
  910. base::PathService::Get(DIR_SESSION_DATA, &session_data);
  911. DCHECK(!session_data.empty());
  912. return {session_data};
  913. }
  914. std::string ElectronBrowserClient::GetProduct() {
  915. return "Chrome/" CHROME_VERSION_STRING;
  916. }
  917. std::string ElectronBrowserClient::GetUserAgent() {
  918. if (user_agent_override_.empty())
  919. return GetApplicationUserAgent();
  920. return user_agent_override_;
  921. }
  922. void ElectronBrowserClient::SetUserAgent(const std::string& user_agent) {
  923. user_agent_override_ = user_agent;
  924. }
  925. blink::UserAgentMetadata ElectronBrowserClient::GetUserAgentMetadata() {
  926. return embedder_support::GetUserAgentMetadata();
  927. }
  928. void ElectronBrowserClient::RegisterNonNetworkNavigationURLLoaderFactories(
  929. int frame_tree_node_id,
  930. ukm::SourceIdObj ukm_source_id,
  931. NonNetworkURLLoaderFactoryMap* factories) {
  932. content::WebContents* web_contents =
  933. content::WebContents::FromFrameTreeNodeId(frame_tree_node_id);
  934. content::BrowserContext* context = web_contents->GetBrowserContext();
  935. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  936. factories->emplace(
  937. extensions::kExtensionScheme,
  938. extensions::CreateExtensionNavigationURLLoaderFactory(
  939. context, ukm_source_id,
  940. false /* we don't support extensions::WebViewGuest */));
  941. #endif
  942. // Always allow navigating to file:// URLs.
  943. auto* protocol_registry = ProtocolRegistry::FromBrowserContext(context);
  944. protocol_registry->RegisterURLLoaderFactories(factories,
  945. true /* allow_file_access */);
  946. }
  947. void ElectronBrowserClient::
  948. RegisterNonNetworkWorkerMainResourceURLLoaderFactories(
  949. content::BrowserContext* browser_context,
  950. NonNetworkURLLoaderFactoryMap* factories) {
  951. auto* protocol_registry =
  952. ProtocolRegistry::FromBrowserContext(browser_context);
  953. // Workers are not allowed to request file:// URLs, there is no particular
  954. // reason for it, and we could consider supporting it in future.
  955. protocol_registry->RegisterURLLoaderFactories(factories,
  956. false /* allow_file_access */);
  957. }
  958. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  959. namespace {
  960. // The FileURLLoaderFactory provided to the extension background pages.
  961. // Checks with the ChildProcessSecurityPolicy to validate the file access.
  962. class FileURLLoaderFactory : public network::SelfDeletingURLLoaderFactory {
  963. public:
  964. static mojo::PendingRemote<network::mojom::URLLoaderFactory> Create(
  965. int child_id) {
  966. mojo::PendingRemote<network::mojom::URLLoaderFactory> pending_remote;
  967. // The FileURLLoaderFactory will delete itself when there are no more
  968. // receivers - see the SelfDeletingURLLoaderFactory::OnDisconnect method.
  969. new FileURLLoaderFactory(child_id,
  970. pending_remote.InitWithNewPipeAndPassReceiver());
  971. return pending_remote;
  972. }
  973. // disable copy
  974. FileURLLoaderFactory(const FileURLLoaderFactory&) = delete;
  975. FileURLLoaderFactory& operator=(const FileURLLoaderFactory&) = delete;
  976. private:
  977. explicit FileURLLoaderFactory(
  978. int child_id,
  979. mojo::PendingReceiver<network::mojom::URLLoaderFactory> factory_receiver)
  980. : network::SelfDeletingURLLoaderFactory(std::move(factory_receiver)),
  981. child_id_(child_id) {}
  982. ~FileURLLoaderFactory() override = default;
  983. // network::mojom::URLLoaderFactory:
  984. void CreateLoaderAndStart(
  985. mojo::PendingReceiver<network::mojom::URLLoader> loader,
  986. int32_t request_id,
  987. uint32_t options,
  988. const network::ResourceRequest& request,
  989. mojo::PendingRemote<network::mojom::URLLoaderClient> client,
  990. const net::MutableNetworkTrafficAnnotationTag& traffic_annotation)
  991. override {
  992. if (!content::ChildProcessSecurityPolicy::GetInstance()->CanRequestURL(
  993. child_id_, request.url)) {
  994. mojo::Remote<network::mojom::URLLoaderClient>(std::move(client))
  995. ->OnComplete(
  996. network::URLLoaderCompletionStatus(net::ERR_ACCESS_DENIED));
  997. return;
  998. }
  999. content::CreateFileURLLoaderBypassingSecurityChecks(
  1000. request, std::move(loader), std::move(client),
  1001. /*observer=*/nullptr,
  1002. /* allow_directory_listing */ true);
  1003. }
  1004. int child_id_;
  1005. };
  1006. } // namespace
  1007. #endif // BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  1008. void ElectronBrowserClient::RegisterNonNetworkSubresourceURLLoaderFactories(
  1009. int render_process_id,
  1010. int render_frame_id,
  1011. const absl::optional<url::Origin>& request_initiator_origin,
  1012. NonNetworkURLLoaderFactoryMap* factories) {
  1013. auto* render_process_host =
  1014. content::RenderProcessHost::FromID(render_process_id);
  1015. DCHECK(render_process_host);
  1016. if (!render_process_host || !render_process_host->GetBrowserContext())
  1017. return;
  1018. content::RenderFrameHost* frame_host =
  1019. content::RenderFrameHost::FromID(render_process_id, render_frame_id);
  1020. content::WebContents* web_contents =
  1021. content::WebContents::FromRenderFrameHost(frame_host);
  1022. // Allow accessing file:// subresources from non-file protocols if web
  1023. // security is disabled.
  1024. bool allow_file_access = false;
  1025. if (web_contents) {
  1026. const auto& web_preferences = web_contents->GetOrCreateWebPreferences();
  1027. if (!web_preferences.web_security_enabled)
  1028. allow_file_access = true;
  1029. }
  1030. ProtocolRegistry::FromBrowserContext(render_process_host->GetBrowserContext())
  1031. ->RegisterURLLoaderFactories(factories, allow_file_access);
  1032. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  1033. auto factory = extensions::CreateExtensionURLLoaderFactory(render_process_id,
  1034. render_frame_id);
  1035. if (factory)
  1036. factories->emplace(extensions::kExtensionScheme, std::move(factory));
  1037. if (!web_contents)
  1038. return;
  1039. extensions::ElectronExtensionWebContentsObserver* web_observer =
  1040. extensions::ElectronExtensionWebContentsObserver::FromWebContents(
  1041. web_contents);
  1042. // There is nothing to do if no ElectronExtensionWebContentsObserver is
  1043. // attached to the |web_contents|.
  1044. if (!web_observer)
  1045. return;
  1046. const extensions::Extension* extension =
  1047. web_observer->GetExtensionFromFrame(frame_host, false);
  1048. if (!extension)
  1049. return;
  1050. // Support for chrome:// scheme if appropriate.
  1051. if (extension->is_extension() &&
  1052. extensions::Manifest::IsComponentLocation(extension->location())) {
  1053. // Components of chrome that are implemented as extensions or platform apps
  1054. // are allowed to use chrome://resources/ and chrome://theme/ URLs.
  1055. factories->emplace(content::kChromeUIScheme,
  1056. content::CreateWebUIURLLoaderFactory(
  1057. frame_host, content::kChromeUIScheme,
  1058. {content::kChromeUIResourcesHost}));
  1059. }
  1060. // Extensions with the necessary permissions get access to file:// URLs that
  1061. // gets approval from ChildProcessSecurityPolicy. Keep this logic in sync with
  1062. // ExtensionWebContentsObserver::RenderFrameCreated.
  1063. extensions::Manifest::Type type = extension->GetType();
  1064. if (type == extensions::Manifest::TYPE_EXTENSION &&
  1065. AllowFileAccess(extension->id(), web_contents->GetBrowserContext())) {
  1066. factories->emplace(url::kFileScheme,
  1067. FileURLLoaderFactory::Create(render_process_id));
  1068. }
  1069. #endif
  1070. }
  1071. void ElectronBrowserClient::
  1072. RegisterNonNetworkServiceWorkerUpdateURLLoaderFactories(
  1073. content::BrowserContext* browser_context,
  1074. NonNetworkURLLoaderFactoryMap* factories) {
  1075. DCHECK(browser_context);
  1076. DCHECK(factories);
  1077. auto* protocol_registry =
  1078. ProtocolRegistry::FromBrowserContext(browser_context);
  1079. protocol_registry->RegisterURLLoaderFactories(factories,
  1080. false /* allow_file_access */);
  1081. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  1082. factories->emplace(
  1083. extensions::kExtensionScheme,
  1084. extensions::CreateExtensionServiceWorkerScriptURLLoaderFactory(
  1085. browser_context));
  1086. #endif // BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  1087. }
  1088. bool ElectronBrowserClient::ShouldTreatURLSchemeAsFirstPartyWhenTopLevel(
  1089. base::StringPiece scheme,
  1090. bool is_embedded_origin_secure) {
  1091. if (is_embedded_origin_secure && scheme == content::kChromeUIScheme)
  1092. return true;
  1093. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  1094. return scheme == extensions::kExtensionScheme;
  1095. #else
  1096. return false;
  1097. #endif
  1098. }
  1099. bool ElectronBrowserClient::WillInterceptWebSocket(
  1100. content::RenderFrameHost* frame) {
  1101. if (!frame)
  1102. return false;
  1103. v8::Isolate* isolate = JavascriptEnvironment::GetIsolate();
  1104. v8::HandleScope scope(isolate);
  1105. auto* browser_context = frame->GetProcess()->GetBrowserContext();
  1106. auto web_request = api::WebRequest::FromOrCreate(isolate, browser_context);
  1107. // NOTE: Some unit test environments do not initialize
  1108. // BrowserContextKeyedAPI factories for e.g. WebRequest.
  1109. if (!web_request.get())
  1110. return false;
  1111. bool has_listener = web_request->HasListener();
  1112. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  1113. const auto* web_request_api =
  1114. extensions::BrowserContextKeyedAPIFactory<extensions::WebRequestAPI>::Get(
  1115. browser_context);
  1116. if (web_request_api)
  1117. has_listener |= web_request_api->MayHaveProxies();
  1118. #endif
  1119. return has_listener;
  1120. }
  1121. void ElectronBrowserClient::CreateWebSocket(
  1122. content::RenderFrameHost* frame,
  1123. WebSocketFactory factory,
  1124. const GURL& url,
  1125. const net::SiteForCookies& site_for_cookies,
  1126. const absl::optional<std::string>& user_agent,
  1127. mojo::PendingRemote<network::mojom::WebSocketHandshakeClient>
  1128. handshake_client) {
  1129. v8::Isolate* isolate = JavascriptEnvironment::GetIsolate();
  1130. v8::HandleScope scope(isolate);
  1131. auto* browser_context = frame->GetProcess()->GetBrowserContext();
  1132. auto web_request = api::WebRequest::FromOrCreate(isolate, browser_context);
  1133. DCHECK(web_request.get());
  1134. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  1135. if (!web_request->HasListener()) {
  1136. auto* web_request_api = extensions::BrowserContextKeyedAPIFactory<
  1137. extensions::WebRequestAPI>::Get(browser_context);
  1138. if (web_request_api && web_request_api->MayHaveProxies()) {
  1139. web_request_api->ProxyWebSocket(frame, std::move(factory), url,
  1140. site_for_cookies, user_agent,
  1141. std::move(handshake_client));
  1142. return;
  1143. }
  1144. }
  1145. #endif
  1146. ProxyingWebSocket::StartProxying(
  1147. web_request.get(), std::move(factory), url, site_for_cookies, user_agent,
  1148. std::move(handshake_client), true, frame->GetProcess()->GetID(),
  1149. frame->GetRoutingID(), frame->GetLastCommittedOrigin(), browser_context,
  1150. &next_id_);
  1151. }
  1152. bool ElectronBrowserClient::WillCreateURLLoaderFactory(
  1153. content::BrowserContext* browser_context,
  1154. content::RenderFrameHost* frame_host,
  1155. int render_process_id,
  1156. URLLoaderFactoryType type,
  1157. const url::Origin& request_initiator,
  1158. absl::optional<int64_t> navigation_id,
  1159. ukm::SourceIdObj ukm_source_id,
  1160. mojo::PendingReceiver<network::mojom::URLLoaderFactory>* factory_receiver,
  1161. mojo::PendingRemote<network::mojom::TrustedURLLoaderHeaderClient>*
  1162. header_client,
  1163. bool* bypass_redirect_checks,
  1164. bool* disable_secure_dns,
  1165. network::mojom::URLLoaderFactoryOverridePtr* factory_override,
  1166. scoped_refptr<base::SequencedTaskRunner> navigation_response_task_runner) {
  1167. v8::Isolate* isolate = JavascriptEnvironment::GetIsolate();
  1168. v8::HandleScope scope(isolate);
  1169. auto web_request = api::WebRequest::FromOrCreate(isolate, browser_context);
  1170. DCHECK(web_request.get());
  1171. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  1172. if (!web_request->HasListener()) {
  1173. auto* web_request_api = extensions::BrowserContextKeyedAPIFactory<
  1174. extensions::WebRequestAPI>::Get(browser_context);
  1175. DCHECK(web_request_api);
  1176. bool use_proxy_for_web_request =
  1177. web_request_api->MaybeProxyURLLoaderFactory(
  1178. browser_context, frame_host, render_process_id, type, navigation_id,
  1179. ukm_source_id, factory_receiver, header_client,
  1180. navigation_response_task_runner);
  1181. if (bypass_redirect_checks)
  1182. *bypass_redirect_checks = use_proxy_for_web_request;
  1183. if (use_proxy_for_web_request)
  1184. return true;
  1185. }
  1186. #endif
  1187. auto proxied_receiver = std::move(*factory_receiver);
  1188. mojo::PendingRemote<network::mojom::URLLoaderFactory> target_factory_remote;
  1189. *factory_receiver = target_factory_remote.InitWithNewPipeAndPassReceiver();
  1190. // Required by WebRequestInfoInitParams.
  1191. //
  1192. // Note that in Electron we allow webRequest to capture requests sent from
  1193. // browser process, so creation of |navigation_ui_data| is different from
  1194. // Chromium which only does for renderer-initialized navigations.
  1195. std::unique_ptr<extensions::ExtensionNavigationUIData> navigation_ui_data;
  1196. if (navigation_id.has_value()) {
  1197. navigation_ui_data =
  1198. std::make_unique<extensions::ExtensionNavigationUIData>();
  1199. }
  1200. mojo::PendingReceiver<network::mojom::TrustedURLLoaderHeaderClient>
  1201. header_client_receiver;
  1202. if (header_client)
  1203. header_client_receiver = header_client->InitWithNewPipeAndPassReceiver();
  1204. auto* protocol_registry =
  1205. ProtocolRegistry::FromBrowserContext(browser_context);
  1206. new ProxyingURLLoaderFactory(
  1207. web_request.get(), protocol_registry->intercept_handlers(),
  1208. render_process_id,
  1209. frame_host ? frame_host->GetRoutingID() : MSG_ROUTING_NONE, &next_id_,
  1210. std::move(navigation_ui_data), std::move(navigation_id),
  1211. std::move(proxied_receiver), std::move(target_factory_remote),
  1212. std::move(header_client_receiver), type);
  1213. return true;
  1214. }
  1215. std::vector<std::unique_ptr<content::URLLoaderRequestInterceptor>>
  1216. ElectronBrowserClient::WillCreateURLLoaderRequestInterceptors(
  1217. content::NavigationUIData* navigation_ui_data,
  1218. int frame_tree_node_id,
  1219. int64_t navigation_id,
  1220. scoped_refptr<base::SequencedTaskRunner> navigation_response_task_runner) {
  1221. std::vector<std::unique_ptr<content::URLLoaderRequestInterceptor>>
  1222. interceptors;
  1223. #if BUILDFLAG(ENABLE_PDF_VIEWER)
  1224. {
  1225. std::unique_ptr<content::URLLoaderRequestInterceptor> pdf_interceptor =
  1226. pdf::PdfURLLoaderRequestInterceptor::MaybeCreateInterceptor(
  1227. frame_tree_node_id, std::make_unique<ChromePdfStreamDelegate>());
  1228. if (pdf_interceptor)
  1229. interceptors.push_back(std::move(pdf_interceptor));
  1230. }
  1231. #endif
  1232. return interceptors;
  1233. }
  1234. void ElectronBrowserClient::OverrideURLLoaderFactoryParams(
  1235. content::BrowserContext* browser_context,
  1236. const url::Origin& origin,
  1237. bool is_for_isolated_world,
  1238. network::mojom::URLLoaderFactoryParams* factory_params) {
  1239. if (factory_params->top_frame_id) {
  1240. // Bypass CORB and CORS when web security is disabled.
  1241. auto* rfh = content::RenderFrameHost::FromFrameToken(
  1242. factory_params->process_id,
  1243. blink::LocalFrameToken(factory_params->top_frame_id.value()));
  1244. auto* web_contents = content::WebContents::FromRenderFrameHost(rfh);
  1245. auto* prefs = WebContentsPreferences::From(web_contents);
  1246. if (prefs && !prefs->IsWebSecurityEnabled()) {
  1247. factory_params->is_corb_enabled = false;
  1248. factory_params->disable_web_security = true;
  1249. }
  1250. }
  1251. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  1252. extensions::URLLoaderFactoryManager::OverrideURLLoaderFactoryParams(
  1253. browser_context, origin, is_for_isolated_world, factory_params);
  1254. #endif
  1255. }
  1256. void ElectronBrowserClient::
  1257. RegisterAssociatedInterfaceBindersForRenderFrameHost(
  1258. content::RenderFrameHost&
  1259. render_frame_host, // NOLINT(runtime/references)
  1260. blink::AssociatedInterfaceRegistry&
  1261. associated_registry) { // NOLINT(runtime/references)
  1262. auto* contents =
  1263. content::WebContents::FromRenderFrameHost(&render_frame_host);
  1264. if (contents) {
  1265. auto* prefs = WebContentsPreferences::From(contents);
  1266. if (render_frame_host.GetFrameTreeNodeId() ==
  1267. contents->GetPrimaryMainFrame()->GetFrameTreeNodeId() ||
  1268. (prefs && prefs->AllowsNodeIntegrationInSubFrames())) {
  1269. associated_registry.AddInterface<mojom::ElectronApiIPC>(
  1270. base::BindRepeating(
  1271. [](content::RenderFrameHost* render_frame_host,
  1272. mojo::PendingAssociatedReceiver<mojom::ElectronApiIPC>
  1273. receiver) {
  1274. ElectronApiIPCHandlerImpl::Create(render_frame_host,
  1275. std::move(receiver));
  1276. },
  1277. &render_frame_host));
  1278. }
  1279. }
  1280. associated_registry.AddInterface<mojom::ElectronWebContentsUtility>(
  1281. base::BindRepeating(
  1282. [](content::RenderFrameHost* render_frame_host,
  1283. mojo::PendingAssociatedReceiver<mojom::ElectronWebContentsUtility>
  1284. receiver) {
  1285. ElectronWebContentsUtilityHandlerImpl::Create(render_frame_host,
  1286. std::move(receiver));
  1287. },
  1288. &render_frame_host));
  1289. associated_registry.AddInterface<mojom::ElectronAutofillDriver>(
  1290. base::BindRepeating(
  1291. [](content::RenderFrameHost* render_frame_host,
  1292. mojo::PendingAssociatedReceiver<mojom::ElectronAutofillDriver>
  1293. receiver) {
  1294. AutofillDriverFactory::BindAutofillDriver(std::move(receiver),
  1295. render_frame_host);
  1296. },
  1297. &render_frame_host));
  1298. #if BUILDFLAG(ENABLE_PRINTING)
  1299. associated_registry.AddInterface<printing::mojom::PrintManagerHost>(
  1300. base::BindRepeating(
  1301. [](content::RenderFrameHost* render_frame_host,
  1302. mojo::PendingAssociatedReceiver<printing::mojom::PrintManagerHost>
  1303. receiver) {
  1304. PrintViewManagerElectron::BindPrintManagerHost(std::move(receiver),
  1305. render_frame_host);
  1306. },
  1307. &render_frame_host));
  1308. #endif
  1309. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  1310. associated_registry.AddInterface<extensions::mojom::LocalFrameHost>(
  1311. base::BindRepeating(
  1312. [](content::RenderFrameHost* render_frame_host,
  1313. mojo::PendingAssociatedReceiver<extensions::mojom::LocalFrameHost>
  1314. receiver) {
  1315. extensions::ExtensionWebContentsObserver::BindLocalFrameHost(
  1316. std::move(receiver), render_frame_host);
  1317. },
  1318. &render_frame_host));
  1319. associated_registry.AddInterface<guest_view::mojom::GuestViewHost>(
  1320. base::BindRepeating(&extensions::ExtensionsGuestView::CreateForComponents,
  1321. render_frame_host.GetGlobalId()));
  1322. associated_registry.AddInterface<extensions::mojom::GuestView>(
  1323. base::BindRepeating(&extensions::ExtensionsGuestView::CreateForExtensions,
  1324. render_frame_host.GetGlobalId()));
  1325. #endif
  1326. #if BUILDFLAG(ENABLE_PDF_VIEWER)
  1327. associated_registry.AddInterface<pdf::mojom::PdfService>(base::BindRepeating(
  1328. [](content::RenderFrameHost* render_frame_host,
  1329. mojo::PendingAssociatedReceiver<pdf::mojom::PdfService> receiver) {
  1330. pdf::PDFDocumentHelper::BindPdfService(
  1331. std::move(receiver), render_frame_host,
  1332. std::make_unique<ElectronPDFDocumentHelperClient>());
  1333. },
  1334. &render_frame_host));
  1335. #endif
  1336. }
  1337. std::string ElectronBrowserClient::GetApplicationLocale() {
  1338. if (BrowserThread::CurrentlyOn(BrowserThread::IO))
  1339. return g_io_thread_application_locale.Get();
  1340. return *g_application_locale;
  1341. }
  1342. bool ElectronBrowserClient::ShouldEnableStrictSiteIsolation() {
  1343. // Enable site isolation. It is off by default in Chromium <= 69.
  1344. return true;
  1345. }
  1346. void ElectronBrowserClient::BindHostReceiverForRenderer(
  1347. content::RenderProcessHost* render_process_host,
  1348. mojo::GenericPendingReceiver receiver) {
  1349. #if BUILDFLAG(ENABLE_BUILTIN_SPELLCHECKER)
  1350. if (auto host_receiver = receiver.As<spellcheck::mojom::SpellCheckHost>()) {
  1351. SpellCheckHostChromeImpl::Create(render_process_host->GetID(),
  1352. std::move(host_receiver));
  1353. return;
  1354. }
  1355. #endif
  1356. }
  1357. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  1358. void BindMimeHandlerService(
  1359. content::RenderFrameHost* frame_host,
  1360. mojo::PendingReceiver<extensions::mime_handler::MimeHandlerService>
  1361. receiver) {
  1362. content::WebContents* contents =
  1363. content::WebContents::FromRenderFrameHost(frame_host);
  1364. auto* guest_view =
  1365. extensions::MimeHandlerViewGuest::FromWebContents(contents);
  1366. if (!guest_view)
  1367. return;
  1368. extensions::MimeHandlerServiceImpl::Create(guest_view->GetStreamWeakPtr(),
  1369. std::move(receiver));
  1370. }
  1371. void BindBeforeUnloadControl(
  1372. content::RenderFrameHost* frame_host,
  1373. mojo::PendingReceiver<extensions::mime_handler::BeforeUnloadControl>
  1374. receiver) {
  1375. auto* web_contents = content::WebContents::FromRenderFrameHost(frame_host);
  1376. if (!web_contents)
  1377. return;
  1378. auto* guest_view =
  1379. extensions::MimeHandlerViewGuest::FromWebContents(web_contents);
  1380. if (!guest_view)
  1381. return;
  1382. guest_view->FuseBeforeUnloadControl(std::move(receiver));
  1383. }
  1384. #endif
  1385. void ElectronBrowserClient::ExposeInterfacesToRenderer(
  1386. service_manager::BinderRegistry* registry,
  1387. blink::AssociatedInterfaceRegistry* associated_registry,
  1388. content::RenderProcessHost* render_process_host) {
  1389. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  1390. associated_registry->AddInterface<extensions::mojom::EventRouter>(
  1391. base::BindRepeating(&extensions::EventRouter::BindForRenderer,
  1392. render_process_host->GetID()));
  1393. associated_registry->AddInterface<extensions::mojom::RendererHost>(
  1394. base::BindRepeating(&extensions::RendererStartupHelper::BindForRenderer,
  1395. render_process_host->GetID()));
  1396. associated_registry->AddInterface<extensions::mojom::ServiceWorkerHost>(
  1397. base::BindRepeating(&extensions::ServiceWorkerHost::BindReceiver,
  1398. render_process_host->GetID()));
  1399. #endif
  1400. }
  1401. void ElectronBrowserClient::RegisterBrowserInterfaceBindersForFrame(
  1402. content::RenderFrameHost* render_frame_host,
  1403. mojo::BinderMapWithContext<content::RenderFrameHost*>* map) {
  1404. map->Add<network_hints::mojom::NetworkHintsHandler>(
  1405. base::BindRepeating(&BindNetworkHintsHandler));
  1406. map->Add<blink::mojom::BadgeService>(
  1407. base::BindRepeating(&badging::BadgeManager::BindFrameReceiver));
  1408. map->Add<blink::mojom::KeyboardLockService>(base::BindRepeating(
  1409. &content::KeyboardLockServiceImpl::CreateMojoService));
  1410. #if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  1411. map->Add<extensions::mime_handler::MimeHandlerService>(
  1412. base::BindRepeating(&BindMimeHandlerService));
  1413. map->Add<extensions::mime_handler::BeforeUnloadControl>(
  1414. base::BindRepeating(&BindBeforeUnloadControl));
  1415. content::WebContents* web_contents =
  1416. content::WebContents::FromRenderFrameHost(render_frame_host);
  1417. if (!web_contents)
  1418. return;
  1419. const GURL& site = render_frame_host->GetSiteInstance()->GetSiteURL();
  1420. if (!site.SchemeIs(extensions::kExtensionScheme))
  1421. return;
  1422. content::BrowserContext* browser_context =
  1423. render_frame_host->GetProcess()->GetBrowserContext();
  1424. auto* extension = extensions::ExtensionRegistry::Get(browser_context)
  1425. ->enabled_extensions()
  1426. .GetByID(site.host());
  1427. if (!extension)
  1428. return;
  1429. extensions::ExtensionsBrowserClient::Get()
  1430. ->RegisterBrowserInterfaceBindersForFrame(map, render_frame_host,
  1431. extension);
  1432. #endif
  1433. }
  1434. #if BUILDFLAG(IS_LINUX)
  1435. void ElectronBrowserClient::GetAdditionalMappedFilesForChildProcess(
  1436. const base::CommandLine& command_line,
  1437. int child_process_id,
  1438. content::PosixFileDescriptorInfo* mappings) {
  1439. int crash_signal_fd = GetCrashSignalFD(command_line);
  1440. if (crash_signal_fd >= 0) {
  1441. mappings->Share(kCrashDumpSignal, crash_signal_fd);
  1442. }
  1443. }
  1444. #endif
  1445. std::unique_ptr<content::LoginDelegate>
  1446. ElectronBrowserClient::CreateLoginDelegate(
  1447. const net::AuthChallengeInfo& auth_info,
  1448. content::WebContents* web_contents,
  1449. const content::GlobalRequestID& request_id,
  1450. bool is_main_frame,
  1451. const GURL& url,
  1452. scoped_refptr<net::HttpResponseHeaders> response_headers,
  1453. bool first_auth_attempt,
  1454. LoginAuthRequiredCallback auth_required_callback) {
  1455. return std::make_unique<LoginHandler>(
  1456. auth_info, web_contents, is_main_frame, url, response_headers,
  1457. first_auth_attempt, std::move(auth_required_callback));
  1458. }
  1459. std::vector<std::unique_ptr<blink::URLLoaderThrottle>>
  1460. ElectronBrowserClient::CreateURLLoaderThrottles(
  1461. const network::ResourceRequest& request,
  1462. content::BrowserContext* browser_context,
  1463. const base::RepeatingCallback<content::WebContents*()>& wc_getter,
  1464. content::NavigationUIData* navigation_ui_data,
  1465. int frame_tree_node_id) {
  1466. DCHECK_CURRENTLY_ON(BrowserThread::UI);
  1467. std::vector<std::unique_ptr<blink::URLLoaderThrottle>> result;
  1468. #if BUILDFLAG(ENABLE_PLUGINS) && BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  1469. result.push_back(std::make_unique<PluginResponseInterceptorURLLoaderThrottle>(
  1470. request.destination, frame_tree_node_id));
  1471. #endif
  1472. return result;
  1473. }
  1474. base::flat_set<std::string>
  1475. ElectronBrowserClient::GetPluginMimeTypesWithExternalHandlers(
  1476. content::BrowserContext* browser_context) {
  1477. base::flat_set<std::string> mime_types;
  1478. #if BUILDFLAG(ENABLE_PLUGINS) && BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
  1479. auto map = PluginUtils::GetMimeTypeToExtensionIdMap(browser_context);
  1480. for (const auto& pair : map)
  1481. mime_types.insert(pair.first);
  1482. #endif
  1483. #if BUILDFLAG(ENABLE_PDF_VIEWER)
  1484. mime_types.insert(pdf::kInternalPluginMimeType);
  1485. #endif
  1486. return mime_types;
  1487. }
  1488. content::SerialDelegate* ElectronBrowserClient::GetSerialDelegate() {
  1489. if (!serial_delegate_)
  1490. serial_delegate_ = std::make_unique<ElectronSerialDelegate>();
  1491. return serial_delegate_.get();
  1492. }
  1493. content::BluetoothDelegate* ElectronBrowserClient::GetBluetoothDelegate() {
  1494. if (!bluetooth_delegate_)
  1495. bluetooth_delegate_ = std::make_unique<ElectronBluetoothDelegate>();
  1496. return bluetooth_delegate_.get();
  1497. }
  1498. content::UsbDelegate* ElectronBrowserClient::GetUsbDelegate() {
  1499. if (!usb_delegate_)
  1500. usb_delegate_ = std::make_unique<ElectronUsbDelegate>();
  1501. return usb_delegate_.get();
  1502. }
  1503. void BindBadgeServiceForServiceWorker(
  1504. const content::ServiceWorkerVersionBaseInfo& info,
  1505. mojo::PendingReceiver<blink::mojom::BadgeService> receiver) {
  1506. DCHECK_CURRENTLY_ON(content::BrowserThread::UI);
  1507. content::RenderProcessHost* render_process_host =
  1508. content::RenderProcessHost::FromID(info.process_id);
  1509. if (!render_process_host)
  1510. return;
  1511. badging::BadgeManager::BindServiceWorkerReceiver(
  1512. render_process_host, info.scope, std::move(receiver));
  1513. }
  1514. void ElectronBrowserClient::RegisterBrowserInterfaceBindersForServiceWorker(
  1515. content::BrowserContext* browser_context,
  1516. const content::ServiceWorkerVersionBaseInfo& service_worker_version_info,
  1517. mojo::BinderMapWithContext<const content::ServiceWorkerVersionBaseInfo&>*
  1518. map) {
  1519. map->Add<blink::mojom::BadgeService>(
  1520. base::BindRepeating(&BindBadgeServiceForServiceWorker));
  1521. }
  1522. #if BUILDFLAG(IS_MAC)
  1523. device::GeolocationManager* ElectronBrowserClient::GetGeolocationManager() {
  1524. return device::GeolocationManager::GetInstance();
  1525. }
  1526. #endif
  1527. content::HidDelegate* ElectronBrowserClient::GetHidDelegate() {
  1528. if (!hid_delegate_)
  1529. hid_delegate_ = std::make_unique<ElectronHidDelegate>();
  1530. return hid_delegate_.get();
  1531. }
  1532. content::WebAuthenticationDelegate*
  1533. ElectronBrowserClient::GetWebAuthenticationDelegate() {
  1534. if (!web_authentication_delegate_) {
  1535. web_authentication_delegate_ =
  1536. std::make_unique<ElectronWebAuthenticationDelegate>();
  1537. }
  1538. return web_authentication_delegate_.get();
  1539. }
  1540. } // namespace electron