mirror of
https://github.com/electron/electron.git
synced 2026-04-10 03:01:51 -04:00
chore: bump chromium to 122.0.6261.6 (29-x-y) (#40959)
* chore: bump chromium in DEPS to 122.0.6240.1 * chore: bump chromium in DEPS to 122.0.6241.6 * chore: bump chromium in DEPS to 122.0.6245.1 * chore: bump chromium in DEPS to 122.0.6247.1 * chore: bump chromium in DEPS to 122.0.6249.1 * chore: bump chromium in DEPS to 122.0.6251.1 * chore: bump chromium in DEPS to 122.0.6253.1 * chore: bump chromium in DEPS to 122.0.6255.1 * chore: bump chromium in DEPS to 122.0.6257.1 * chore: bump chromium in DEPS to 122.0.6259.1 * chore: bump chromium in DEPS to 122.0.6259.3 * chore: bump chromium in DEPS to 122.0.6259.5 * chore: bump chromium in DEPS to 122.0.6260.0 * chore: bump chromium in DEPS to 122.0.6261.1 * chore: bump chromium in DEPS to 122.0.6261.6 * chore: update patches (cherry picked from commitdde66c3589) * refactor: extensions replaced StringPiece with string_view Ref: https://chromium-review.googlesource.com/c/chromium/src/+/5171926 (cherry picked from commitc7031d5c05) * chore: update patches (cherry picked from commit95b04b1fca) * 5192010: Rename {absl => std}::optional in //chrome/ https://chromium-review.googlesource.com/c/chromium/src/+/5192010 (cherry picked from commit55e5867614) * 5109767: CodeHealth: Fix leaked raw_ptr in Linux ProcessSingleton https://chromium-review.googlesource.com/c/chromium/src/+/5109767 (cherry picked from commit7b2efc7586) * 5105227: [media_preview] Show requested device in permission bubble https://chromium-review.googlesource.com/c/chromium/src/+/5105227 (cherry picked from commit10d61636c6) * chore: update patches (cherry picked from commitd04ebc7b07) * 5180720: Polish tiled browser window UI on Linux | https://chromium-review.googlesource.com/c/chromium/src/+/5180720 (cherry picked from commit3dbbb67dbc) * chore: update patches (cherry picked from commit18a5961e4e) * chore: update patches (cherry picked from commit69e0bfefcc) * 5186276: [autopip] Make "allow once" per navigation | https://chromium-review.googlesource.com/c/chromium/src/+/5186276 (cherry picked from commit412f70681a) * chore: update patches (cherry picked from commite4d2a2ded0) * 5190661: Automated T* -> raw_ptr<T> rewrite "refresh" | https://chromium-review.googlesource.com/c/chromium/src/+/5190661 (cherry picked from commit6b41b72130) * 5206106: Make sure RenderFrameHosts are active when printing | https://chromium-review.googlesource.com/c/chromium/src/+/5206106 (cherry picked from commit9a788c0c60) * 5202674: Reland "Automated T* -> raw_ptr<T> rewrite 'refresh'" https://chromium-review.googlesource.com/c/chromium/src/+/5202674 (cherry picked from commit55daca952d) * fixup CodeHealth: Fix leaked raw_ptr in Linux ProcessSingleton https://chromium-review.googlesource.com/c/chromium/src/+/5109767 (cherry picked from commit047898ba92) * fixup 5206106: Make sure RenderFrameHosts are active when printing (cherry picked from commit715c534cd8) * Make legacy ToV8() helpers private to ScriptPromiseResolver, their only user https://chromium-review.googlesource.com/c/chromium/src/+/5207474 (cherry picked from commit9a10062d8c) * fixup CodeHealth: Fix leaked raw_ptr in Linux ProcessSingleton (cherry picked from commita1f643b25e) * fixup 5186276: [autopip] Make "allow once" per navigation https://chromium-review.googlesource.com/c/chromium/src/+/5186276 (cherry picked from commite3c40ed923) * 5191363: Mark LOG(FATAL) [[noreturn]] https://chromium-review.googlesource.com/c/chromium/src/+/5191363 (cherry picked from commit8037cef988) * fixup 5186276: [autopip] Make "allow once" per navigation https://chromium-review.googlesource.com/c/chromium/src/+/5186276 (cherry picked from commite60c31dd4f) * fixup Make legacy ToV8() helpers private to ScriptPromiseResolver https://chromium-review.googlesource.com/c/chromium/src/+/5207474 (cherry picked from commitb02108e0c0) * chore: update patches (cherry picked from commit96e8574115) * chore: update patches (cherry picked from commite0f51957be) * chore: restore patch that was mistakenly removed (cherry picked from commit4057b5439c) * 5181931: Improve LoginHandler (Part 9 / N) https://chromium-review.googlesource.com/c/chromium/src/+/5181931 (cherry picked from commit6ad8028fe8) * Dispatch SiteInstanceGotProcess() only when both process and site are set. https://chromium-review.googlesource.com/c/chromium/src/+/5142354 (cherry picked from commita871198a23) * 5171446: [AsyncSB] Pass navigation_id into CreateURLLoaderThrottles https://chromium-review.googlesource.com/c/chromium/src/+/5171446 (cherry picked from commitebf2efcedd) * 5213708: Move DownloadTargetInfo into components/download https://chromium-review.googlesource.com/c/chromium/src/+/5213708 (cherry picked from commitc361ded147) * extensions: Add a loader for Controlled Frame embedder scripts https://chromium-review.googlesource.com/c/chromium/src/+/5202765 (cherry picked from commit63d2773d15) * [CSC][Zoom] Add initial_zoom_level to DisplayMediaInformation https://chromium-review.googlesource.com/c/chromium/src/+/5168626 (cherry picked from commita4b5c9ce31) * fix: suppress clang -Wimplicit-const-int-float-conversion (cherry picked from commit979bde6683) * fixup 5191363: Mark LOG(FATAL) [[noreturn]] for Windows https://chromium-review.googlesource.com/c/chromium/src/+/5191363 (cherry picked from commit759f1740a8) * 5167921: Remove Widget::IsTranslucentWindowOpacitySupported https://chromium-review.googlesource.com/c/chromium/src/+/5167921 Also 5148392: PinnedState: Support pinned state in PlatformWindowState | https://chromium-review.googlesource.com/c/chromium/src/+/5148392 (cherry picked from commit53d9c82a57) * fixup: 5180720: Polish tiled browser window UI on Linux https://chromium-review.googlesource.com/c/chromium/src/+/5180720 (cherry picked from commite565db5095) * 5170669: clipboard: Migrate DOMException constructors to RejectWith- https://chromium-review.googlesource.com/c/chromium/src/+/5170669 (cherry picked from commit5409118134) * 5178824: [Fullscreen] Record UKM data https://chromium-review.googlesource.com/c/chromium/src/+/5178824 (cherry picked from commit3d53a6ec01) * chore: update patches after rebase (cherry picked from commit3a6a335a05) * chore: update patches after cherry picks * chore: update patches after rebase --------- Co-authored-by: electron-roller[bot] <84116207+electron-roller[bot]@users.noreply.github.com> Co-authored-by: Samuel Attard <samuel.r.attard@gmail.com> Co-authored-by: PatchUp <73610968+patchup[bot]@users.noreply.github.com> Co-authored-by: Shelley Vohr <shelley.vohr@gmail.com> Co-authored-by: VerteDinde <vertedinde@electronjs.org> Co-authored-by: John Kleinschmidt <jkleinsc@electronjs.org>
This commit is contained in:
committed by
GitHub
parent
738e0b9664
commit
9daf416097
@@ -707,7 +707,7 @@ void ElectronBrowserClient::GetAdditionalWebUISchemes(
|
||||
additional_schemes->push_back(content::kChromeDevToolsScheme);
|
||||
}
|
||||
|
||||
void ElectronBrowserClient::SiteInstanceGotProcess(
|
||||
void ElectronBrowserClient::SiteInstanceGotProcessAndSite(
|
||||
content::SiteInstance* site_instance) {
|
||||
#if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
|
||||
auto* browser_context =
|
||||
@@ -1641,6 +1641,7 @@ std::unique_ptr<content::LoginDelegate>
|
||||
ElectronBrowserClient::CreateLoginDelegate(
|
||||
const net::AuthChallengeInfo& auth_info,
|
||||
content::WebContents* web_contents,
|
||||
content::BrowserContext* browser_context,
|
||||
const content::GlobalRequestID& request_id,
|
||||
bool is_main_frame,
|
||||
const GURL& url,
|
||||
@@ -1658,7 +1659,8 @@ ElectronBrowserClient::CreateURLLoaderThrottles(
|
||||
content::BrowserContext* browser_context,
|
||||
const base::RepeatingCallback<content::WebContents*()>& wc_getter,
|
||||
content::NavigationUIData* navigation_ui_data,
|
||||
int frame_tree_node_id) {
|
||||
int frame_tree_node_id,
|
||||
absl::optional<int64_t> navigation_id) {
|
||||
DCHECK_CURRENTLY_ON(BrowserThread::UI);
|
||||
|
||||
std::vector<std::unique_ptr<blink::URLLoaderThrottle>> result;
|
||||
|
||||
@@ -270,20 +270,23 @@ class ElectronBrowserClient : public content::ContentBrowserClient,
|
||||
std::unique_ptr<content::LoginDelegate> CreateLoginDelegate(
|
||||
const net::AuthChallengeInfo& auth_info,
|
||||
content::WebContents* web_contents,
|
||||
content::BrowserContext* browser_context,
|
||||
const content::GlobalRequestID& request_id,
|
||||
bool is_main_frame,
|
||||
const GURL& url,
|
||||
scoped_refptr<net::HttpResponseHeaders> response_headers,
|
||||
bool first_auth_attempt,
|
||||
LoginAuthRequiredCallback auth_required_callback) override;
|
||||
void SiteInstanceGotProcess(content::SiteInstance* site_instance) override;
|
||||
void SiteInstanceGotProcessAndSite(
|
||||
content::SiteInstance* site_instance) override;
|
||||
std::vector<std::unique_ptr<blink::URLLoaderThrottle>>
|
||||
CreateURLLoaderThrottles(
|
||||
const network::ResourceRequest& request,
|
||||
content::BrowserContext* browser_context,
|
||||
const base::RepeatingCallback<content::WebContents*()>& wc_getter,
|
||||
content::NavigationUIData* navigation_ui_data,
|
||||
int frame_tree_node_id) override;
|
||||
int frame_tree_node_id,
|
||||
absl::optional<int64_t> navigation_id) override;
|
||||
base::flat_set<std::string> GetPluginMimeTypesWithExternalHandlers(
|
||||
content::BrowserContext* browser_context) override;
|
||||
bool IsSuitableHost(content::RenderProcessHost* process_host,
|
||||
|
||||
@@ -30,6 +30,7 @@
|
||||
#include "content/browser/blob_storage/chrome_blob_storage_context.h" // nogncheck
|
||||
#include "content/public/browser/browser_thread.h"
|
||||
#include "content/public/browser/cors_origin_pattern_setter.h"
|
||||
#include "content/public/browser/host_zoom_map.h"
|
||||
#include "content/public/browser/render_process_host.h"
|
||||
#include "content/public/browser/shared_cors_origin_access_list.h"
|
||||
#include "content/public/browser/storage_partition.h"
|
||||
@@ -57,6 +58,7 @@
|
||||
#include "shell/common/gin_helper/error_thrower.h"
|
||||
#include "shell/common/options_switches.h"
|
||||
#include "shell/common/thread_restrictions.h"
|
||||
#include "third_party/blink/public/common/page/page_zoom.h"
|
||||
#include "third_party/blink/public/mojom/media/capture_handle_config.mojom.h"
|
||||
#include "third_party/blink/public/mojom/mediastream/media_stream.mojom.h"
|
||||
|
||||
@@ -150,6 +152,29 @@ media::mojom::CaptureHandlePtr CreateCaptureHandle(
|
||||
return result;
|
||||
}
|
||||
|
||||
// Copied from chrome/browser/media/webrtc/desktop_capture_devices_util.cc.
|
||||
absl::optional<int> GetZoomLevel(content::WebContents* capturer,
|
||||
const url::Origin& capturer_origin,
|
||||
const content::DesktopMediaID& captured_id) {
|
||||
content::RenderFrameHost* const captured_rfh =
|
||||
content::RenderFrameHost::FromID(
|
||||
captured_id.web_contents_id.render_process_id,
|
||||
captured_id.web_contents_id.main_render_frame_id);
|
||||
if (!captured_rfh || !captured_rfh->IsActive()) {
|
||||
return absl::nullopt;
|
||||
}
|
||||
|
||||
content::WebContents* const captured_wc =
|
||||
content::WebContents::FromRenderFrameHost(captured_rfh);
|
||||
if (!captured_wc) {
|
||||
return absl::nullopt;
|
||||
}
|
||||
|
||||
double zoom_level = blink::PageZoomLevelToZoomFactor(
|
||||
content::HostZoomMap::GetZoomLevel(captured_wc));
|
||||
return std::round(100 * zoom_level);
|
||||
}
|
||||
|
||||
// Copied from chrome/browser/media/webrtc/desktop_capture_devices_util.cc.
|
||||
media::mojom::DisplayMediaInformationPtr
|
||||
DesktopMediaIDToDisplayMediaInformation(
|
||||
@@ -169,6 +194,7 @@ DesktopMediaIDToDisplayMediaInformation(
|
||||
#endif // defined(USE_AURA)
|
||||
|
||||
media::mojom::CaptureHandlePtr capture_handle;
|
||||
int zoom_level = 100;
|
||||
switch (media_id.type) {
|
||||
case content::DesktopMediaID::TYPE_SCREEN:
|
||||
display_surface = media::mojom::DisplayCaptureSurfaceType::MONITOR;
|
||||
@@ -184,13 +210,16 @@ DesktopMediaIDToDisplayMediaInformation(
|
||||
display_surface = media::mojom::DisplayCaptureSurfaceType::BROWSER;
|
||||
cursor = media::mojom::CursorCaptureType::MOTION;
|
||||
capture_handle = CreateCaptureHandle(capturer, capturer_origin, media_id);
|
||||
zoom_level =
|
||||
GetZoomLevel(capturer, capturer_origin, media_id).value_or(100);
|
||||
break;
|
||||
case content::DesktopMediaID::TYPE_NONE:
|
||||
break;
|
||||
}
|
||||
|
||||
return media::mojom::DisplayMediaInformation::New(
|
||||
display_surface, logical_surface, cursor, std::move(capture_handle));
|
||||
display_surface, logical_surface, cursor, std::move(capture_handle),
|
||||
zoom_level);
|
||||
}
|
||||
|
||||
// Convert string to lower case and escape it.
|
||||
|
||||
@@ -216,7 +216,7 @@ void ElectronDownloadManagerDelegate::GetItemSaveDialogOptions(
|
||||
|
||||
void ElectronDownloadManagerDelegate::OnDownloadPathGenerated(
|
||||
uint32_t download_id,
|
||||
content::DownloadTargetCallback callback,
|
||||
download::DownloadTargetCallback callback,
|
||||
const base::FilePath& default_path) {
|
||||
DCHECK_CURRENTLY_ON(content::BrowserThread::UI);
|
||||
ScopedAllowBlockingForElectron allow_blocking;
|
||||
@@ -271,17 +271,20 @@ void ElectronDownloadManagerDelegate::OnDownloadPathGenerated(
|
||||
std::ignore = dialog_promise.Then(std::move(dialog_callback));
|
||||
file_dialog::ShowSaveDialog(settings, std::move(dialog_promise));
|
||||
} else {
|
||||
std::move(callback).Run(
|
||||
path, download::DownloadItem::TARGET_DISPOSITION_PROMPT,
|
||||
download::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS,
|
||||
item->GetInsecureDownloadStatus(), path, base::FilePath(),
|
||||
std::string() /*mime_type*/, download::DOWNLOAD_INTERRUPT_REASON_NONE);
|
||||
download::DownloadTargetInfo target_info;
|
||||
target_info.target_path = path;
|
||||
target_info.intermediate_path = path;
|
||||
target_info.target_disposition =
|
||||
download::DownloadItem::TARGET_DISPOSITION_PROMPT;
|
||||
target_info.insecure_download_status = item->GetInsecureDownloadStatus();
|
||||
|
||||
std::move(callback).Run(std::move(target_info));
|
||||
}
|
||||
}
|
||||
|
||||
void ElectronDownloadManagerDelegate::OnDownloadSaveDialogDone(
|
||||
uint32_t download_id,
|
||||
content::DownloadTargetCallback download_callback,
|
||||
download::DownloadTargetCallback download_callback,
|
||||
gin_helper::Dictionary result) {
|
||||
DCHECK_CURRENTLY_ON(content::BrowserThread::UI);
|
||||
|
||||
@@ -311,11 +314,14 @@ void ElectronDownloadManagerDelegate::OnDownloadSaveDialogDone(
|
||||
const auto interrupt_reason =
|
||||
path.empty() ? download::DOWNLOAD_INTERRUPT_REASON_USER_CANCELED
|
||||
: download::DOWNLOAD_INTERRUPT_REASON_NONE;
|
||||
std::move(download_callback)
|
||||
.Run(path, download::DownloadItem::TARGET_DISPOSITION_PROMPT,
|
||||
download::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS,
|
||||
item->GetInsecureDownloadStatus(), path, base::FilePath(),
|
||||
std::string() /*mime_type*/, interrupt_reason);
|
||||
download::DownloadTargetInfo target_info;
|
||||
target_info.target_path = path;
|
||||
target_info.intermediate_path = path;
|
||||
target_info.target_disposition =
|
||||
download::DownloadItem::TARGET_DISPOSITION_PROMPT;
|
||||
target_info.insecure_download_status = item->GetInsecureDownloadStatus();
|
||||
target_info.interrupt_reason = interrupt_reason;
|
||||
std::move(download_callback).Run(std::move(target_info));
|
||||
}
|
||||
|
||||
void ElectronDownloadManagerDelegate::Shutdown() {
|
||||
@@ -325,17 +331,14 @@ void ElectronDownloadManagerDelegate::Shutdown() {
|
||||
|
||||
bool ElectronDownloadManagerDelegate::DetermineDownloadTarget(
|
||||
download::DownloadItem* download,
|
||||
content::DownloadTargetCallback* callback) {
|
||||
download::DownloadTargetCallback* callback) {
|
||||
DCHECK_CURRENTLY_ON(content::BrowserThread::UI);
|
||||
|
||||
if (!download->GetForcedFilePath().empty()) {
|
||||
std::move(*callback).Run(
|
||||
download->GetForcedFilePath(),
|
||||
download::DownloadItem::TARGET_DISPOSITION_OVERWRITE,
|
||||
download::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS,
|
||||
download::DownloadItem::InsecureDownloadStatus::UNKNOWN,
|
||||
download->GetForcedFilePath(), base::FilePath(),
|
||||
std::string() /*mime_type*/, download::DOWNLOAD_INTERRUPT_REASON_NONE);
|
||||
download::DownloadTargetInfo target_info;
|
||||
target_info.target_path = download->GetForcedFilePath();
|
||||
target_info.intermediate_path = download->GetForcedFilePath();
|
||||
std::move(*callback).Run(std::move(target_info));
|
||||
return true;
|
||||
}
|
||||
|
||||
@@ -343,12 +346,10 @@ bool ElectronDownloadManagerDelegate::DetermineDownloadTarget(
|
||||
base::FilePath save_path;
|
||||
GetItemSavePath(download, &save_path);
|
||||
if (!save_path.empty()) {
|
||||
std::move(*callback).Run(
|
||||
save_path, download::DownloadItem::TARGET_DISPOSITION_OVERWRITE,
|
||||
download::DOWNLOAD_DANGER_TYPE_NOT_DANGEROUS,
|
||||
download::DownloadItem::InsecureDownloadStatus::UNKNOWN, save_path,
|
||||
base::FilePath(), std::string() /*mime_type*/,
|
||||
download::DOWNLOAD_INTERRUPT_REASON_NONE);
|
||||
download::DownloadTargetInfo target_info;
|
||||
target_info.target_path = save_path;
|
||||
target_info.intermediate_path = save_path;
|
||||
std::move(*callback).Run(std::move(target_info));
|
||||
return true;
|
||||
}
|
||||
|
||||
|
||||
@@ -36,7 +36,7 @@ class ElectronDownloadManagerDelegate
|
||||
void Shutdown() override;
|
||||
bool DetermineDownloadTarget(
|
||||
download::DownloadItem* download,
|
||||
content::DownloadTargetCallback* callback) override;
|
||||
download::DownloadTargetCallback* callback) override;
|
||||
bool ShouldOpenDownload(
|
||||
download::DownloadItem* download,
|
||||
content::DownloadOpenDelayedCallback callback) override;
|
||||
@@ -49,12 +49,12 @@ class ElectronDownloadManagerDelegate
|
||||
file_dialog::DialogSettings* options);
|
||||
|
||||
void OnDownloadPathGenerated(uint32_t download_id,
|
||||
content::DownloadTargetCallback callback,
|
||||
download::DownloadTargetCallback callback,
|
||||
const base::FilePath& default_path);
|
||||
|
||||
void OnDownloadSaveDialogDone(
|
||||
uint32_t download_id,
|
||||
content::DownloadTargetCallback download_callback,
|
||||
download::DownloadTargetCallback download_callback,
|
||||
gin_helper::Dictionary result);
|
||||
|
||||
base::FilePath last_saved_directory_;
|
||||
|
||||
@@ -268,6 +268,13 @@ ElectronExtensionsBrowserClient::GetProcessManagerDelegate() const {
|
||||
return process_manager_delegate_.get();
|
||||
}
|
||||
|
||||
mojo::PendingRemote<network::mojom::URLLoaderFactory>
|
||||
ElectronExtensionsBrowserClient::GetControlledFrameEmbedderURLLoader(
|
||||
int frame_tree_node_id,
|
||||
content::BrowserContext* browser_context) {
|
||||
return mojo::PendingRemote<network::mojom::URLLoaderFactory>();
|
||||
}
|
||||
|
||||
std::unique_ptr<extensions::ExtensionHostDelegate>
|
||||
ElectronExtensionsBrowserClient::
|
||||
CreateExtensionHostDelegate() { // TODO(samuelmaddock):
|
||||
|
||||
@@ -102,6 +102,10 @@ class ElectronExtensionsBrowserClient
|
||||
const override;
|
||||
extensions::ProcessManagerDelegate* GetProcessManagerDelegate()
|
||||
const override;
|
||||
mojo::PendingRemote<network::mojom::URLLoaderFactory>
|
||||
GetControlledFrameEmbedderURLLoader(
|
||||
int frame_tree_node_id,
|
||||
content::BrowserContext* browser_context) override;
|
||||
std::unique_ptr<extensions::ExtensionHostDelegate>
|
||||
CreateExtensionHostDelegate() override;
|
||||
bool DidVersionUpdate(content::BrowserContext* context) override;
|
||||
|
||||
@@ -39,7 +39,6 @@ void AsarFileValidator::OnRead(base::span<char> buffer,
|
||||
if (current_block_ > max_block_) {
|
||||
LOG(FATAL)
|
||||
<< "Unexpected number of blocks while validating ASAR file stream";
|
||||
return;
|
||||
}
|
||||
|
||||
// Create a hash if we don't have one yet
|
||||
@@ -70,7 +69,6 @@ void AsarFileValidator::OnRead(base::span<char> buffer,
|
||||
if (current_hash_byte_count_ == block_size && !FinishBlock()) {
|
||||
LOG(FATAL) << "Failed to validate block while streaming ASAR file: "
|
||||
<< current_block_;
|
||||
return;
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -105,7 +103,6 @@ bool AsarFileValidator::FinishBlock() {
|
||||
std::vector<uint8_t> abandoned_buffer(bytes_needed);
|
||||
if (!file_.ReadAndCheck(offset, abandoned_buffer)) {
|
||||
LOG(FATAL) << "Failed to read required portion of streamed ASAR archive";
|
||||
return false;
|
||||
}
|
||||
|
||||
current_hash_->Update(&abandoned_buffer.front(), bytes_needed);
|
||||
|
||||
@@ -37,7 +37,7 @@ ElectronDesktopWindowTreeHostLinux::~ElectronDesktopWindowTreeHostLinux() =
|
||||
|
||||
bool ElectronDesktopWindowTreeHostLinux::SupportsClientFrameShadow() const {
|
||||
return platform_window()->CanSetDecorationInsets() &&
|
||||
platform_window()->IsTranslucentWindowOpacitySupported();
|
||||
views::Widget::IsWindowCompositingSupported();
|
||||
}
|
||||
|
||||
void ElectronDesktopWindowTreeHostLinux::OnWidgetInitDone() {
|
||||
@@ -97,6 +97,8 @@ void ElectronDesktopWindowTreeHostLinux::UpdateWindowState(
|
||||
case ui::PlatformWindowState::kSnappedPrimary:
|
||||
case ui::PlatformWindowState::kSnappedSecondary:
|
||||
case ui::PlatformWindowState::kFloated:
|
||||
case ui::PlatformWindowState::kPinnedFullscreen:
|
||||
case ui::PlatformWindowState::kTrustedPinnedFullscreen:
|
||||
break;
|
||||
}
|
||||
switch (new_state) {
|
||||
@@ -114,6 +116,8 @@ void ElectronDesktopWindowTreeHostLinux::UpdateWindowState(
|
||||
case ui::PlatformWindowState::kSnappedPrimary:
|
||||
case ui::PlatformWindowState::kSnappedSecondary:
|
||||
case ui::PlatformWindowState::kFloated:
|
||||
case ui::PlatformWindowState::kPinnedFullscreen:
|
||||
case ui::PlatformWindowState::kTrustedPinnedFullscreen:
|
||||
break;
|
||||
}
|
||||
window_state_ = new_state;
|
||||
@@ -146,7 +150,7 @@ void ElectronDesktopWindowTreeHostLinux::UpdateClientDecorationHints(
|
||||
bool showing_frame = !native_window_view_->IsFullscreen();
|
||||
float scale = device_scale_factor();
|
||||
|
||||
bool should_set_opaque_region = window->IsTranslucentWindowOpacitySupported();
|
||||
bool should_set_opaque_region = views::Widget::IsWindowCompositingSupported();
|
||||
|
||||
gfx::Insets insets;
|
||||
gfx::Insets input_insets;
|
||||
|
||||
@@ -132,9 +132,11 @@ void ClientFrameViewLinux::Init(NativeWindowViews* window,
|
||||
window->GetAcceleratedWidget()));
|
||||
host_supports_client_frame_shadow_ = tree_host->SupportsClientFrameShadow();
|
||||
|
||||
bool tiled = tiled_edges().top || tiled_edges().left ||
|
||||
tiled_edges().bottom || tiled_edges().right;
|
||||
frame_provider_ =
|
||||
ui::LinuxUiTheme::GetForProfile(nullptr)->GetWindowFrameProvider(
|
||||
!host_supports_client_frame_shadow_, frame_->IsMaximized());
|
||||
!host_supports_client_frame_shadow_, tiled, frame_->IsMaximized());
|
||||
|
||||
UpdateWindowTitle();
|
||||
|
||||
@@ -283,9 +285,11 @@ void ClientFrameViewLinux::Layout() {
|
||||
return;
|
||||
}
|
||||
|
||||
bool tiled = tiled_edges().top || tiled_edges().left ||
|
||||
tiled_edges().bottom || tiled_edges().right;
|
||||
frame_provider_ =
|
||||
ui::LinuxUiTheme::GetForProfile(nullptr)->GetWindowFrameProvider(
|
||||
!host_supports_client_frame_shadow_, frame_->IsMaximized());
|
||||
!host_supports_client_frame_shadow_, tiled, frame_->IsMaximized());
|
||||
|
||||
UpdateButtonImages();
|
||||
LayoutButtons();
|
||||
@@ -302,7 +306,7 @@ void ClientFrameViewLinux::OnPaint(gfx::Canvas* canvas) {
|
||||
if (!frame_->IsFullscreen()) {
|
||||
frame_provider_->PaintWindowFrame(canvas, GetLocalBounds(),
|
||||
GetTitlebarBounds().bottom(),
|
||||
ShouldPaintAsActive(), tiled_edges());
|
||||
ShouldPaintAsActive(), GetInputInsets());
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
@@ -27,7 +27,7 @@ void Log(int severity, std::string text) {
|
||||
break;
|
||||
case logging::LOGGING_FATAL:
|
||||
LOG(FATAL) << text;
|
||||
break;
|
||||
// break not needed here because LOG(FATAL) is [[noreturn]]
|
||||
default:
|
||||
LOG(ERROR) << "Unrecognized severity: " << severity;
|
||||
break;
|
||||
|
||||
@@ -146,7 +146,6 @@ bool FillFileInfoWithNode(Archive::FileInfo* info,
|
||||
|
||||
if (!info->integrity.has_value()) {
|
||||
LOG(FATAL) << "Failed to read integrity for file in ASAR archive";
|
||||
return false;
|
||||
}
|
||||
}
|
||||
#endif
|
||||
@@ -246,7 +245,6 @@ bool Archive::Init() {
|
||||
if (!integrity.has_value()) {
|
||||
LOG(FATAL) << "Failed to get integrity for validatable asar archive: "
|
||||
<< RelativePath().value();
|
||||
return false;
|
||||
}
|
||||
|
||||
// Currently we only support the sha256 algorithm, we can add support for
|
||||
|
||||
@@ -88,7 +88,7 @@ bool ElectronExtensionsAPIProvider::IsAPISchemaGenerated(
|
||||
return extensions::api::ElectronGeneratedSchemas::IsGenerated(name);
|
||||
}
|
||||
|
||||
base::StringPiece ElectronExtensionsAPIProvider::GetAPISchema(
|
||||
std::string_view ElectronExtensionsAPIProvider::GetAPISchema(
|
||||
const std::string& name) {
|
||||
return extensions::api::ElectronGeneratedSchemas::Get(name);
|
||||
}
|
||||
|
||||
@@ -29,7 +29,7 @@ class ElectronExtensionsAPIProvider : public extensions::ExtensionsAPIProvider {
|
||||
void AddAPIJSONSources(
|
||||
extensions::JSONFeatureProviderSource* json_source) override;
|
||||
bool IsAPISchemaGenerated(const std::string& name) override;
|
||||
base::StringPiece GetAPISchema(const std::string& name) override;
|
||||
std::string_view GetAPISchema(const std::string& name) override;
|
||||
void RegisterPermissions(
|
||||
extensions::PermissionsInfo* permissions_info) override;
|
||||
void RegisterManifestHandlers() override;
|
||||
|
||||
Reference in New Issue
Block a user