mirror of
https://github.com/electron/electron.git
synced 2026-04-10 03:01:51 -04:00
* chore: bump chromium in DEPS to 104.0.5098.0 * chore: bump chromium in DEPS to 104.0.5100.0 * chore: bump chromium in DEPS to 104.0.5102.0 * chore: bump chromium in DEPS to 104.0.5103.0 * chore: bump chromium in DEPS to 104.0.5104.0 * chore: bump chromium in DEPS to 104.0.5106.0 * chore: bump chromium in DEPS to 104.0.5108.0 * chore: bump chromium in DEPS to 104.0.5110.0 * chore: bump chromium in DEPS to 104.0.5112.0 * chore: bump chromium in DEPS to 104.0.5112.4 * 3651284: Use the entry settings object for window.open navigation https://chromium-review.googlesource.com/c/chromium/src/+/3651284 (cherry picked from commit6ff37a08f7) * 3644598: Make RenderFrameHost used for notification permission decision https://chromium-review.googlesource.com/c/chromium/src/+/3644598 (cherry picked from commit46df809556) * 3642842: Window Placement: Prototype Fullscreen Capability Delegation - Part 2 https://chromium-review.googlesource.com/c/chromium/src/+/3642842 (cherry picked from commit2fe1bc3222) * 3652785: [sandbox] Enable sandboxed pointers on sanitizer builds https://chromium-review.googlesource.com/c/v8/v8/+/3652785 (cherry picked from commitca8a3852f4) * 3611967: webhid: Migrate HidDelegate to use BrowserContext and Origin https://chromium-review.googlesource.com/c/chromium/src/+/3611967 (cherry picked from commit18aac8e93e) * 3665762: Remove RenderFrameHost::IsRenderFrameCreated from //content/. https://chromium-review.googlesource.com/c/chromium/src/+/3665762 (cherry picked from commit070ea1700b) * 3659375: Fold x509_util_ios and most of x509_util_mac into x509_util_apple https://chromium-review.googlesource.com/c/chromium/src/+/3659375 (cherry picked from commit479647e0ac) * 3656234: [CodeHealth] Remove uses of base::ListValue::Append() (Final, take 2) https://chromium-review.googlesource.com/c/chromium/src/+/3656234 (cherry picked from commite15d6110ed) * chore: update patch indices (cherry picked from commit8d666da975) * chore: fix lint (cherry picked from commitf9a9aca456) * 3644598: Make RenderFrameHost used for notification permission decision https://chromium-review.googlesource.com/c/chromium/src/+/3644598 (cherry picked from commit014c4b9212) * webhid: Migrate HidDelegate to use BrowserContext and Origin This is a temporary fix for https://chromium-review.googlesource.com/c/chromium/src/+/3611967 to get the build compiling, but we need to either patch around https://chromium-review.googlesource.com/c/chromium/src/+/3611967 or move our device permissioning to BrowserContext (cherry picked from commit322e9686da) * chore: fix lint (cherry picked from commit12b886cc62) * build: run electron/script/gen-libc++-filenames.js fixes gn check (cherry picked from commit93cebfecb2) * chore: disable flaking tests (cherry picked from commitfd0bc08f44) * 3652749: Delete GLRenderer and related classes https://chromium-review.googlesource.com/c/chromium/src/+/3652749 (cherry picked from commit43024a74c2) * 3682394: Change pipes surrounding code references in comments to backticks https://chromium-review.googlesource.com/c/chromium/src/+/3682394 (cherry picked from commit41026ae4d0) * chore: fixup patch indices (cherry picked from commitfccfc1bb29) * 3671199: Remove ContentMainDelegate::PostFieldTrialInitialization https://chromium-review.googlesource.com/c/chromium/src/+/3671199 (cherry picked from commit6392cfb595) * 3607963: hid: Do not exclude HID device with no collections https://chromium-review.googlesource.com/c/chromium/src/+/3607963 (cherry picked from commit2d81975792) * refactor: use ElectronBrowserContext instead of WebContents to persist devices due to changes like https://chromium-review.googlesource.com/c/chromium/src/+/3611967, we can no longer use WebContents to store device permissions so this commit moves device permission storage to live in memory in ElectronBrowserContext instead. (cherry picked from commit2f95568bfd) * 3557253: Deprecate some signature checks https://chromium-review.googlesource.com/c/v8/v8/+/3557253 (cherry picked from commitda4f0dbd1b) * 3680781: Add policy for Renderer App Container. https://chromium-review.googlesource.com/c/chromium/src/+/3680781 (cherry picked from commitcb901ce489) * chore: update patch indices (cherry picked from commit40c6295a5b) * 3675465: Update NetLog network service API to use mojom::DictionaryValue. https://chromium-review.googlesource.com/c/chromium/src/+/3675465 (cherry picked from commit55a58418e6) * fix: add patch for DCHECK in fullscreen test (cherry picked from commitc65280306d) * build: fix nan build (cherry picked from commitc06ea18698) * build: make the nan spec runner work on macOS (cherry picked from commita22950b126) * chore: update patches (cherry picked from commit7375148f93) * chore: update patches * 3693745: Delete base::LowerCaseEqualsASCII() Ref: https://chromium-review.googlesource.com/c/chromium/src/+/3693745 (cherry picked from commited192f5c9b) * 3653285: Remove OS X 10.11 and macOS 10.12 code from chrome/ https://chromium-review.googlesource.com/c/chromium/src/+/3653285 * 3687395: Remove DictionaryValue::HasKey(). Ref: https://chromium-review.googlesource.com/c/chromium/src/+/3687395 (cherry picked from commit2a6804db60) * 3691014: Prevent unsafe narrowing: ui/accessibility, part 2 Ref: https://chromium-review.googlesource.com/c/chromium/src/+/3691014 (cherry picked from commitfca99a5cf9) * 3560567: [MSC] Porting GenerateStreams clients to handle stream vectors. https://chromium-review.googlesource.com/c/chromium/src/+/3560567 * 3684873: [Bluetooth][Win/Linux] Add bluetooth pair confirmation prompt https://chromium-review.googlesource.com/c/chromium/src/+/3684873 * chore: missing includes in desktop_notification_controller (cherry picked from commit574fb7933d) * 3685951: Reland "Make sure screen object is created once in tests." https://chromium-review.googlesource.com/c/chromium/src/+/3685951 * fixup: Reland "Make sure screen object is created once in tests." * chore: bump chromium in DEPS to 104.0.5110.0 * chore: update patches * Revert "3560567: [MSC] Porting GenerateStreams clients to handle stream vectors." This reverts commit c9c1c534056404be22a2d81ae6df4d184654fa35. * Revert "3691014: Prevent unsafe narrowing: ui/accessibility, part 2" This reverts commit 08f7a35765fde0467ef44d773e943cf5998619ae. * 3687671: [v8] Freeze flags after initialization https://chromium-review.googlesource.com/c/chromium/src/+/3687671 * fixup: 3687671: [v8] Freeze flags after initialization * chore: bump chromium in DEPS to 104.0.5112.14 * chore: update patches * 3691014: Prevent unsafe narrowing: ui/accessibility, part 2 Ref: https://chromium-review.googlesource.com/c/chromium/src/+/3691014 (cherry picked from commitfca99a5cf9) (cherry picked from commit 08f7a35765fde0467ef44d773e943cf5998619ae) * 3560567: [MSC] Porting GenerateStreams clients to handle stream vectors. https://chromium-review.googlesource.com/c/chromium/src/+/3560567 (cherry picked from commit c9c1c534056404be22a2d81ae6df4d184654fa35) * 3669226: Remove printing PostTask usage of IO thread https://chromium-review.googlesource.com/c/chromium/src/+/3669226 * chore: document breaking change (cherry picked from commitd0991597c2) * chore: update patches * chore: remove deprecated AccessorSignatures https://github.com/nodejs/nan/pull/941 * Revert "fixup: 3687671: [v8] Freeze flags after initialization" This reverts commit a473727f39267327c7a77ec5056edd36b7c5b403. * Revert "3687671: [v8] Freeze flags after initialization" This reverts commit 7a8404be3c9d48a2e7ce877d749362f4754a9f17. * 3687671: [v8] Freeze flags after initialization https://chromium-review.googlesource.com/c/chromium/src/+/3687671 (cherry picked from commitf4c53302ea) * 52026: Do not allow md4 or md5 based signatures in X.509 certificates. https://boringssl-review.googlesource.com/c/boringssl/+/52026 * chore: bump chromium in DEPS to 104.0.5112.20 * chore: update patches patches/chromium/chore_expose_v8_initialization_isolate_callbacks.patch is no longer needed because it was upstreamed via: 2527943: Allow static access to WasmCodeGeneration callback https://chromium-review.googlesource.com/c/chromium/src/+/2527943 * 3560567: [MSC] Porting GenerateStreams clients to handle stream vectors. Ref: https://chromium-review.googlesource.com/c/chromium/src/+/3560567 (cherry picked from commit797c3a1656) * fixup! 3560567: [MSC] Porting GenerateStreams clients to handle stream vectors. (cherry picked from commit9741ab73cf) * fixup! 3560567: [MSC] Porting GenerateStreams clients to handle stream vectors. (cherry picked from commit558ed59d86) * chore: bump chromium in DEPS to 104.0.5112.29 * chore: update patches * chore: bump chromium in DEPS to 104.0.5112.39 * chore: update patches * chore: update patches * Trigger Build * 3695382: [ext-code-space] Fix CodeRange allocation logic https://chromium-review.googlesource.com/c/v8/v8/+/3695382 fixes https://bugs.chromium.org/p/v8/issues/detail?id=12942 * 3695382: [ext-code-space] Fix CodeRange allocation logic https://chromium-review.googlesource.com/c/v8/v8/+/3695382 * chore: update patches Co-authored-by: electron-roller[bot] <84116207+electron-roller[bot]@users.noreply.github.com> Co-authored-by: Shelley Vohr <shelley.vohr@gmail.com> Co-authored-by: John Kleinschmidt <jkleinsc@electronjs.org> Co-authored-by: Charles Kerr <charles@charleskerr.com> Co-authored-by: Samuel Attard <sattard@salesforce.com> Co-authored-by: Keeley Hammond <khammond@slack-corp.com> Co-authored-by: VerteDinde <keeleymhammond@gmail.com> Co-authored-by: Jeremy Rose <japthorp@slack-corp.com> Co-authored-by: PatchUp <73610968+patchup[bot]@users.noreply.github.com>
335 lines
12 KiB
C++
335 lines
12 KiB
C++
// Copyright 2019 The Chromium Authors. All rights reserved.
|
|
// Use of this source code is governed by a BSD-style license that can be
|
|
// found in the LICENSE file.
|
|
|
|
#include "shell/browser/hid/hid_chooser_context.h"
|
|
|
|
#include <utility>
|
|
|
|
#include "base/command_line.h"
|
|
#include "base/containers/contains.h"
|
|
#include "base/strings/string_number_conversions.h"
|
|
#include "base/strings/string_util.h"
|
|
#include "base/strings/stringprintf.h"
|
|
#include "base/strings/utf_string_conversions.h"
|
|
#include "base/values.h"
|
|
#include "chrome/grit/generated_resources.h"
|
|
#include "components/content_settings/core/common/content_settings_types.h"
|
|
#include "components/prefs/pref_service.h"
|
|
#include "content/public/browser/device_service.h"
|
|
#include "services/device/public/cpp/hid/hid_blocklist.h"
|
|
#include "services/device/public/cpp/hid/hid_switches.h"
|
|
#include "shell/browser/api/electron_api_session.h"
|
|
#include "shell/browser/electron_permission_manager.h"
|
|
#include "shell/browser/web_contents_permission_helper.h"
|
|
#include "shell/common/gin_converters/content_converter.h"
|
|
#include "shell/common/gin_converters/frame_converter.h"
|
|
#include "shell/common/gin_converters/hid_device_info_converter.h"
|
|
#include "shell/common/gin_converters/value_converter.h"
|
|
#include "shell/common/gin_helper/dictionary.h"
|
|
#include "third_party/blink/public/common/permissions/permission_utils.h"
|
|
|
|
#include "ui/base/l10n/l10n_util.h"
|
|
|
|
namespace electron {
|
|
|
|
const char kHidDeviceNameKey[] = "name";
|
|
const char kHidGuidKey[] = "guid";
|
|
const char kHidVendorIdKey[] = "vendorId";
|
|
const char kHidProductIdKey[] = "productId";
|
|
const char kHidSerialNumberKey[] = "serialNumber";
|
|
|
|
HidChooserContext::HidChooserContext(ElectronBrowserContext* context)
|
|
: browser_context_(context) {}
|
|
|
|
HidChooserContext::~HidChooserContext() {
|
|
// Notify observers that the chooser context is about to be destroyed.
|
|
// Observers must remove themselves from the observer lists.
|
|
for (auto& observer : device_observer_list_) {
|
|
observer.OnHidChooserContextShutdown();
|
|
DCHECK(!device_observer_list_.HasObserver(&observer));
|
|
}
|
|
}
|
|
|
|
// static
|
|
std::u16string HidChooserContext::DisplayNameFromDeviceInfo(
|
|
const device::mojom::HidDeviceInfo& device) {
|
|
if (device.product_name.empty()) {
|
|
auto device_id_string = base::ASCIIToUTF16(
|
|
base::StringPrintf("%04X:%04X", device.vendor_id, device.product_id));
|
|
return l10n_util::GetStringFUTF16(IDS_HID_CHOOSER_ITEM_WITHOUT_NAME,
|
|
device_id_string);
|
|
}
|
|
return base::UTF8ToUTF16(device.product_name);
|
|
}
|
|
|
|
// static
|
|
bool HidChooserContext::CanStorePersistentEntry(
|
|
const device::mojom::HidDeviceInfo& device) {
|
|
return !device.serial_number.empty() && !device.product_name.empty();
|
|
}
|
|
|
|
// static
|
|
base::Value HidChooserContext::DeviceInfoToValue(
|
|
const device::mojom::HidDeviceInfo& device) {
|
|
base::Value value(base::Value::Type::DICTIONARY);
|
|
value.SetStringKey(
|
|
kHidDeviceNameKey,
|
|
base::UTF16ToUTF8(HidChooserContext::DisplayNameFromDeviceInfo(device)));
|
|
value.SetIntKey(kHidVendorIdKey, device.vendor_id);
|
|
value.SetIntKey(kHidProductIdKey, device.product_id);
|
|
if (HidChooserContext::CanStorePersistentEntry(device)) {
|
|
// Use the USB serial number as a persistent identifier. If it is
|
|
// unavailable, only ephemeral permissions may be granted.
|
|
value.SetStringKey(kHidSerialNumberKey, device.serial_number);
|
|
} else {
|
|
// The GUID is a temporary ID created on connection that remains valid until
|
|
// the device is disconnected. Ephemeral permissions are keyed by this ID
|
|
// and must be granted again each time the device is connected.
|
|
value.SetStringKey(kHidGuidKey, device.guid);
|
|
}
|
|
return value;
|
|
}
|
|
|
|
void HidChooserContext::GrantDevicePermission(
|
|
const url::Origin& origin,
|
|
const device::mojom::HidDeviceInfo& device) {
|
|
DCHECK(base::Contains(devices_, device.guid));
|
|
if (CanStorePersistentEntry(device)) {
|
|
auto* permission_manager = static_cast<ElectronPermissionManager*>(
|
|
browser_context_->GetPermissionControllerDelegate());
|
|
|
|
permission_manager->GrantDevicePermission(
|
|
static_cast<blink::PermissionType>(
|
|
WebContentsPermissionHelper::PermissionType::HID),
|
|
origin, DeviceInfoToValue(device), browser_context_);
|
|
} else {
|
|
ephemeral_devices_[origin].insert(device.guid);
|
|
}
|
|
}
|
|
|
|
void HidChooserContext::RevokeDevicePermission(
|
|
const url::Origin& origin,
|
|
const device::mojom::HidDeviceInfo& device) {
|
|
DCHECK(base::Contains(devices_, device.guid));
|
|
if (CanStorePersistentEntry(device)) {
|
|
RevokePersistentDevicePermission(origin, device);
|
|
} else {
|
|
RevokeEphemeralDevicePermission(origin, device);
|
|
}
|
|
api::Session* session = api::Session::FromBrowserContext(browser_context_);
|
|
if (session) {
|
|
v8::Isolate* isolate = JavascriptEnvironment::GetIsolate();
|
|
v8::HandleScope scope(isolate);
|
|
gin_helper::Dictionary details =
|
|
gin_helper::Dictionary::CreateEmpty(isolate);
|
|
details.Set("device", device.Clone());
|
|
details.Set("origin", origin.Serialize());
|
|
session->Emit("hid-device-revoked", details);
|
|
}
|
|
}
|
|
|
|
void HidChooserContext::RevokePersistentDevicePermission(
|
|
const url::Origin& origin,
|
|
const device::mojom::HidDeviceInfo& device) {
|
|
auto* permission_manager = static_cast<ElectronPermissionManager*>(
|
|
browser_context_->GetPermissionControllerDelegate());
|
|
permission_manager->RevokeDevicePermission(
|
|
static_cast<blink::PermissionType>(
|
|
WebContentsPermissionHelper::PermissionType::HID),
|
|
origin, DeviceInfoToValue(device), browser_context_);
|
|
RevokeEphemeralDevicePermission(origin, device);
|
|
}
|
|
|
|
void HidChooserContext::RevokeEphemeralDevicePermission(
|
|
const url::Origin& origin,
|
|
const device::mojom::HidDeviceInfo& device) {
|
|
auto it = ephemeral_devices_.find(origin);
|
|
if (it != ephemeral_devices_.end()) {
|
|
std::set<std::string>& devices = it->second;
|
|
for (auto guid = devices.begin(); guid != devices.end();) {
|
|
DCHECK(base::Contains(devices_, *guid));
|
|
|
|
if (devices_[*guid]->physical_device_id != device.physical_device_id) {
|
|
++guid;
|
|
continue;
|
|
}
|
|
|
|
guid = devices.erase(guid);
|
|
if (devices.empty())
|
|
ephemeral_devices_.erase(it);
|
|
}
|
|
}
|
|
}
|
|
|
|
bool HidChooserContext::HasDevicePermission(
|
|
const url::Origin& origin,
|
|
const device::mojom::HidDeviceInfo& device) {
|
|
if (!base::CommandLine::ForCurrentProcess()->HasSwitch(
|
|
switches::kDisableHidBlocklist) &&
|
|
device.is_excluded_by_blocklist)
|
|
return false;
|
|
|
|
auto it = ephemeral_devices_.find(origin);
|
|
if (it != ephemeral_devices_.end() &&
|
|
base::Contains(it->second, device.guid)) {
|
|
return true;
|
|
}
|
|
|
|
auto* permission_manager = static_cast<ElectronPermissionManager*>(
|
|
browser_context_->GetPermissionControllerDelegate());
|
|
return permission_manager->CheckDevicePermission(
|
|
static_cast<blink::PermissionType>(
|
|
WebContentsPermissionHelper::PermissionType::HID),
|
|
origin, DeviceInfoToValue(device), browser_context_);
|
|
}
|
|
|
|
void HidChooserContext::AddDeviceObserver(DeviceObserver* observer) {
|
|
EnsureHidManagerConnection();
|
|
device_observer_list_.AddObserver(observer);
|
|
}
|
|
|
|
void HidChooserContext::RemoveDeviceObserver(DeviceObserver* observer) {
|
|
device_observer_list_.RemoveObserver(observer);
|
|
}
|
|
|
|
void HidChooserContext::GetDevices(
|
|
device::mojom::HidManager::GetDevicesCallback callback) {
|
|
if (!is_initialized_) {
|
|
EnsureHidManagerConnection();
|
|
pending_get_devices_requests_.push(std::move(callback));
|
|
return;
|
|
}
|
|
|
|
std::vector<device::mojom::HidDeviceInfoPtr> device_list;
|
|
device_list.reserve(devices_.size());
|
|
for (const auto& pair : devices_)
|
|
device_list.push_back(pair.second->Clone());
|
|
base::SequencedTaskRunnerHandle::Get()->PostTask(
|
|
FROM_HERE, base::BindOnce(std::move(callback), std::move(device_list)));
|
|
}
|
|
|
|
const device::mojom::HidDeviceInfo* HidChooserContext::GetDeviceInfo(
|
|
const std::string& guid) {
|
|
DCHECK(is_initialized_);
|
|
auto it = devices_.find(guid);
|
|
return it == devices_.end() ? nullptr : it->second.get();
|
|
}
|
|
|
|
device::mojom::HidManager* HidChooserContext::GetHidManager() {
|
|
EnsureHidManagerConnection();
|
|
return hid_manager_.get();
|
|
}
|
|
|
|
base::WeakPtr<HidChooserContext> HidChooserContext::AsWeakPtr() {
|
|
return weak_factory_.GetWeakPtr();
|
|
}
|
|
|
|
void HidChooserContext::DeviceAdded(device::mojom::HidDeviceInfoPtr device) {
|
|
DCHECK(device);
|
|
|
|
// Update the device list.
|
|
if (!base::Contains(devices_, device->guid))
|
|
devices_.insert({device->guid, device->Clone()});
|
|
|
|
// Notify all observers.
|
|
for (auto& observer : device_observer_list_)
|
|
observer.OnDeviceAdded(*device);
|
|
}
|
|
|
|
void HidChooserContext::DeviceRemoved(device::mojom::HidDeviceInfoPtr device) {
|
|
DCHECK(device);
|
|
DCHECK(base::Contains(devices_, device->guid));
|
|
|
|
// Update the device list.
|
|
devices_.erase(device->guid);
|
|
|
|
// Notify all device observers.
|
|
for (auto& observer : device_observer_list_)
|
|
observer.OnDeviceRemoved(*device);
|
|
|
|
// Next we'll notify observers for revoked permissions. If the device does not
|
|
// support persistent permissions then device permissions are revoked on
|
|
// disconnect.
|
|
if (CanStorePersistentEntry(*device))
|
|
return;
|
|
|
|
std::vector<url::Origin> revoked_origins;
|
|
for (auto& map_entry : ephemeral_devices_) {
|
|
if (map_entry.second.erase(device->guid) > 0)
|
|
revoked_origins.push_back(map_entry.first);
|
|
}
|
|
if (revoked_origins.empty())
|
|
return;
|
|
}
|
|
|
|
void HidChooserContext::DeviceChanged(device::mojom::HidDeviceInfoPtr device) {
|
|
DCHECK(device);
|
|
DCHECK(base::Contains(devices_, device->guid));
|
|
|
|
// Update the device list.
|
|
devices_[device->guid] = device->Clone();
|
|
|
|
// Notify all observers.
|
|
for (auto& observer : device_observer_list_)
|
|
observer.OnDeviceChanged(*device);
|
|
}
|
|
|
|
void HidChooserContext::EnsureHidManagerConnection() {
|
|
if (hid_manager_)
|
|
return;
|
|
|
|
mojo::PendingRemote<device::mojom::HidManager> manager;
|
|
content::GetDeviceService().BindHidManager(
|
|
manager.InitWithNewPipeAndPassReceiver());
|
|
SetUpHidManagerConnection(std::move(manager));
|
|
}
|
|
|
|
void HidChooserContext::SetUpHidManagerConnection(
|
|
mojo::PendingRemote<device::mojom::HidManager> manager) {
|
|
hid_manager_.Bind(std::move(manager));
|
|
hid_manager_.set_disconnect_handler(base::BindOnce(
|
|
&HidChooserContext::OnHidManagerConnectionError, base::Unretained(this)));
|
|
|
|
hid_manager_->GetDevicesAndSetClient(
|
|
client_receiver_.BindNewEndpointAndPassRemote(),
|
|
base::BindOnce(&HidChooserContext::InitDeviceList,
|
|
weak_factory_.GetWeakPtr()));
|
|
}
|
|
|
|
void HidChooserContext::InitDeviceList(
|
|
std::vector<device::mojom::HidDeviceInfoPtr> devices) {
|
|
for (auto& device : devices)
|
|
devices_.insert({device->guid, std::move(device)});
|
|
|
|
is_initialized_ = true;
|
|
|
|
while (!pending_get_devices_requests_.empty()) {
|
|
std::vector<device::mojom::HidDeviceInfoPtr> device_list;
|
|
device_list.reserve(devices.size());
|
|
for (const auto& entry : devices_)
|
|
device_list.push_back(entry.second->Clone());
|
|
std::move(pending_get_devices_requests_.front())
|
|
.Run(std::move(device_list));
|
|
pending_get_devices_requests_.pop();
|
|
}
|
|
}
|
|
|
|
void HidChooserContext::OnHidManagerConnectionError() {
|
|
hid_manager_.reset();
|
|
client_receiver_.reset();
|
|
devices_.clear();
|
|
|
|
std::vector<url::Origin> revoked_origins;
|
|
revoked_origins.reserve(ephemeral_devices_.size());
|
|
for (const auto& map_entry : ephemeral_devices_)
|
|
revoked_origins.push_back(map_entry.first);
|
|
ephemeral_devices_.clear();
|
|
|
|
// Notify all device observers.
|
|
for (auto& observer : device_observer_list_)
|
|
observer.OnHidManagerConnectionError();
|
|
}
|
|
|
|
} // namespace electron
|