mirror of
https://github.com/electron/electron.git
synced 2026-02-19 03:14:51 -05:00
* chore: bump chromium in DEPS to 146.0.7652.0 * fix(patch-conflict): update mas_avoid_private_macos_api_usage context for constrainFrameRect method The upstream CL added a new constrainFrameRect:toScreen: method override to NativeWidgetMacNSWindow as part of headless mode window zoom implementation. The MAS patch's #endif for frameViewClassForStyleMask now correctly appears after that method, since constrainFrameRect is a public API override that doesn't need to be guarded. Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7487666 * fix(patch-conflict): update printing.patch for base::DictValue rename Updated printing.patch to use the new base::DictValue type name instead of base::Value::Dict following Chromium's type renaming change. This affects CompleteUpdatePrintSettings() signature and related code. Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7509820 * fix(patch-conflict): update accessibility_ui patch for base::DictValue/ListValue rename Updated adjust_accessibility_ui_for_electron.patch to use the new base::DictValue and base::ListValue type names instead of base::Value::Dict and base::Value::List following Chromium's type renaming change. Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7509820 * chore: update patches * 6625736: Rename DURABLE_STORAGE to PERSISTENT_STORAGE for consistency | https://chromium-review.googlesource.com/c/chromium/src/+/6625736 * chore: bump chromium in DEPS to 146.0.7653.0 * chore: update patches * 7000847: add type tag to v8::External for gin_helper function templates The upstream gin function templates now use v8::ExternalPointerTypeTag for type safety when using v8::External. Updated Electron's forked gin_helper function template to use the same kGinInternalCallbackHolderBaseTag that Chromium's gin uses. Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7000847 * fix(patch-update): extend V8 Object API deprecation patch for Node.js Extended the existing patch to cover additional files that use GetAlignedPointerFromInternalField and SetAlignedPointerInInternalField: - src/stream_base-inl.h - src/udp_wrap.cc - src/js_udp_wrap.cc - src/node_process_methods.cc - src/node_snapshotable.cc - src/base_object.cc These APIs now require an EmbedderDataTypeTag parameter. Ref: https://chromium-review.googlesource.com/c/v8/v8/+/7087956 * 7000847: add type tag to v8::External calls in shared_texture Updated v8::External::New and v8::External::Value calls to use the kExternalPointerTypeTagDefault tag as required by the V8 API change that deprecates the tagless versions. Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7000847 * 7508687: use ChildProcessId for file permission APIs The ChildProcessSecurityPolicy::CanReadFile and GrantReadFile APIs now require ChildProcessId instead of int. Updated to use GetID() instead of GetDeprecatedID() for these specific calls. Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7508687 * 7000847: add type tag to v8::External calls in callback and osr_converter The v8::External API now requires an EmbedderPointerTypeTag parameter for both New() and Value() methods to improve V8 sandbox type safety. Updated calls in: - callback.cc: TranslatorHolder constructor and CallTranslator - osr_converter.cc: OffscreenSharedTextureValue converter Ref: https://chromium-review.googlesource.com/c/v8/v8/+/7000847 * fixup! 7087956: [api] Promote deprecation of v8::Context and v8::Object API methods Extended the Node.js patch to cover histogram.cc which also uses SetAlignedPointerInInternalField and GetAlignedPointerFromInternalField APIs that now require the EmbedderDataTypeTag parameter. Ref: https://chromium-review.googlesource.com/c/v8/v8/+/7087956 * chore: bump chromium in DEPS to 146.0.7655.0 * chore: update patches * 7509043: update WebSpellingMarker type for API change The upstream Chromium API changed - WebSpellingMarker was moved from a nested type within WebTextCheckClient to a standalone type in the blink namespace. Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7509043 * 7498491: update process_id to use OriginatingProcess type The upstream Chromium API changed - URLLoaderFactoryParams::process_id was changed from an integer to a union type network::OriginatingProcess that distinguishes between browser and renderer processes. - For browser process requests, use OriginatingProcess::browser() - For renderer process lookups, check !is_browser() and use renderer_process().value() to get the child_id Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7498491 * 5710330: Add crash keys to debug NativeWidgetMacNSWindowBorderlessFrame exception | https://chromium-review.googlesource.com/c/chromium/src/+/5710330 5710330 added a new NSNextStepFrame interface extension and implementations for NativeWidgetMacNSWindowTitledFrame and NativeWidgetMacNSWindowBorderlessFrame. These use private macOS APIs that are not available in Mac App Store builds. * chore: update patches * chore: bump chromium in DEPS to 146.0.7661.0 * chore: bump chromium in DEPS to 146.0.7663.0 * fix(patch-conflict): update accessibility_ui for string_view API change Upstream removed redundant std::string(default_api_type) conversion as part of a string_view optimization cleanup. Updated patch context to match. Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7514107 * fix(patch-conflict): update service process launch options for sandbox API refactor Upstream removed content/common/sandbox_init_win.cc and content/public/common/sandbox_init_win.h, moving the functionality directly into ChildProcessLauncherHelper. Updated patch to call sandbox::policy::SandboxWin::StartSandboxedProcess directly with the LaunchOptions pointer instead of going through the removed helper. Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7528253 * fix(patch-conflict): update MAS safestorage for keychain API refactor Upstream refactored KeychainPassword::GetPassword() to use a new GetPasswordImpl() helper function with improved error tracking via base::expected<std::string, OSStatus>. Adapted patch to use the new GetPasswordImpl with the suffixed account name and handle migration from legacy accounts through the new API. Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7516438 * chore: update patches * chore: bump chromium in DEPS to 146.0.7663.0 * fix: base::Value::Dict -> base::DictValue https://chromium-review.googlesource.com/c/chromium/src/+/7513889 * fix: include new cookie exclusion reason https://chromium-review.googlesource.com/c/chromium/src/+/7486527 * fix: enable libc++ ABI flag for trivially copyable std::vector<bool> Required for changes introduced in the following CL https://chromium-review.googlesource.com/c/chromium/src/+/7513653 * fixup! fix: base::Value::Dict -> base::DictValue https://chromium-review.googlesource.com/c/chromium/src/+/7513889 * fix: spellcheck not working in tests https://chromium-review.googlesource.com/c/chromium/src/+/7452579 * fix: cookie test failing due to multiple rejection reasons https://chromium-review.googlesource.com/c/chromium/src/+/7506629 * fix: macos sizing unmaximized window incorrectly https://chromium-review.googlesource.com/c/chromium/src/+/7487666 Changes to headless mode caused the unmaximized window to subtract the height of the menubar. * fix: skip tests for incompatible BoringSSL ML-DSA crypto https://boringssl-review.googlesource.com/c/boringssl/+/84929 * test: fix pseudonymization registration in utility process on Linux Ref: 7486913: Pass pseudonymization salt via shared memory at process launch | https://chromium-review.googlesource.com/c/chromium/src/+/7486913 * fix: restore MAS patch-outs Restores some `#if !IS_MAS_BUILD()` gates dropped in773054ad59* fixup! 7508687: use ChildProcessId for file permission APIs * fixup! fix(patch-conflict): update MAS safestorage for keychain API refactor * chore: add note about parallel upstream change * fixup! Merge remote-tracking branch 'origin/main' into roller/chromium/main * Revert "fixup! 7508687: use ChildProcessId for file permission APIs" This reverts commit05c43e4e5d. The _impl version has the signature, but not the public interface. :oof: * fixup! fix(patch-conflict): update MAS safestorage for keychain API refactor --------- Co-authored-by: electron-roller[bot] <84116207+electron-roller[bot]@users.noreply.github.com> Co-authored-by: Keeley Hammond <khammond@slack-corp.com> Co-authored-by: Samuel Maddock <samuelmaddock@electronjs.org> Co-authored-by: clavin <clavin@electronjs.org>
458 lines
16 KiB
C++
458 lines
16 KiB
C++
// Copyright (c) 2013 GitHub, Inc.
|
|
// Use of this source code is governed by the MIT license that can be
|
|
// found in the LICENSE file.
|
|
|
|
#include "shell/app/electron_main_delegate.h"
|
|
|
|
#include <iostream>
|
|
#include <memory>
|
|
#include <string>
|
|
#include <string_view>
|
|
#include <utility>
|
|
|
|
#include "base/apple/bundle_locations.h"
|
|
#include "base/base_switches.h"
|
|
#include "base/command_line.h"
|
|
#include "base/debug/leak_annotations.h"
|
|
#include "base/debug/stack_trace.h"
|
|
#include "base/environment.h"
|
|
#include "base/files/file_util.h"
|
|
#include "base/logging.h"
|
|
#include "base/metrics/field_trial.h"
|
|
#include "base/path_service.h"
|
|
#include "base/strings/cstring_view.h"
|
|
#include "base/strings/string_number_conversions.cc"
|
|
#include "base/strings/string_util_internal.h"
|
|
#include "chrome/common/chrome_paths.h"
|
|
#include "chrome/common/chrome_switches.h"
|
|
#include "components/content_settings/core/common/content_settings_pattern.h"
|
|
#include "content/public/app/initialize_mojo_core.h"
|
|
#include "content/public/common/content_switches.h"
|
|
#include "crypto/hash.h"
|
|
#include "electron/buildflags/buildflags.h"
|
|
#include "electron/fuses.h"
|
|
#include "electron/mas.h"
|
|
#include "electron/snapshot_checksum.h"
|
|
#include "extensions/common/constants.h"
|
|
#include "gin/v8_initializer.h"
|
|
#include "sandbox/policy/switches.h"
|
|
#include "services/tracing/public/cpp/stack_sampling/tracing_sampler_profiler.h"
|
|
#include "shell/app/command_line_args.h"
|
|
#include "shell/app/electron_content_client.h"
|
|
#include "shell/browser/electron_browser_client.h"
|
|
#include "shell/browser/electron_gpu_client.h"
|
|
#include "shell/browser/feature_list.h"
|
|
#include "shell/browser/relauncher.h"
|
|
#include "shell/common/electron_paths.h"
|
|
#include "shell/common/logging.h"
|
|
#include "shell/common/options_switches.h"
|
|
#include "shell/common/process_util.h"
|
|
#include "shell/renderer/electron_renderer_client.h"
|
|
#include "shell/renderer/electron_sandboxed_renderer_client.h"
|
|
#include "shell/utility/electron_content_utility_client.h"
|
|
#include "third_party/abseil-cpp/absl/types/variant.h"
|
|
#include "ui/base/resource/resource_bundle.h"
|
|
#include "ui/base/ui_base_switches.h"
|
|
#include "v8/include/v8-snapshot.h"
|
|
|
|
#if BUILDFLAG(IS_MAC)
|
|
#include "shell/app/electron_main_delegate_mac.h"
|
|
#endif
|
|
|
|
#if BUILDFLAG(IS_WIN)
|
|
#include "base/win/win_util.h"
|
|
#include "chrome/child/v8_crashpad_support_win.h"
|
|
#endif
|
|
|
|
#if BUILDFLAG(IS_LINUX)
|
|
#include "base/nix/xdg_util.h"
|
|
#include "base/posix/global_descriptors.h"
|
|
#include "content/public/common/content_descriptors.h"
|
|
#include "v8/include/v8-wasm-trap-handler-posix.h"
|
|
#include "v8/include/v8.h"
|
|
#endif
|
|
|
|
#if !IS_MAS_BUILD()
|
|
#include "components/crash/core/app/crash_switches.h" // nogncheck
|
|
#include "components/crash/core/app/crashpad.h" // nogncheck
|
|
#include "components/crash/core/common/crash_key.h"
|
|
#include "components/crash/core/common/crash_keys.h"
|
|
#include "shell/app/electron_crash_reporter_client.h"
|
|
#include "shell/browser/api/electron_api_crash_reporter.h"
|
|
#include "shell/common/crash_keys.h"
|
|
#endif
|
|
|
|
namespace electron {
|
|
|
|
namespace {
|
|
|
|
constexpr std::string_view kRelauncherProcess = "relauncher";
|
|
|
|
constexpr base::cstring_view kElectronDisableSandbox{
|
|
"ELECTRON_DISABLE_SANDBOX"};
|
|
constexpr base::cstring_view kElectronEnableStackDumping{
|
|
"ELECTRON_ENABLE_STACK_DUMPING"};
|
|
|
|
// Returns true if this subprocess type needs the ResourceBundle initialized
|
|
// and resources loaded.
|
|
bool SubprocessNeedsResourceBundle(const std::string& process_type) {
|
|
return
|
|
#if BUILDFLAG(IS_LINUX)
|
|
// The zygote process opens the resources for the renderers.
|
|
process_type == ::switches::kZygoteProcess ||
|
|
#endif
|
|
#if BUILDFLAG(IS_MAC)
|
|
// Mac needs them too for scrollbar related images and for sandbox
|
|
// profiles.
|
|
process_type == ::switches::kGpuProcess ||
|
|
#endif
|
|
process_type == ::switches::kRendererProcess ||
|
|
process_type == ::switches::kUtilityProcess;
|
|
}
|
|
|
|
#if BUILDFLAG(IS_WIN)
|
|
void InvalidParameterHandler(const wchar_t*,
|
|
const wchar_t*,
|
|
const wchar_t*,
|
|
unsigned int,
|
|
uintptr_t) {
|
|
// noop.
|
|
}
|
|
#endif
|
|
|
|
void ValidateV8Snapshot(v8::StartupData* data) {
|
|
if (data->data &&
|
|
electron::fuses::IsEmbeddedAsarIntegrityValidationEnabled()) {
|
|
CHECK_GT(data->raw_size, 0);
|
|
UNSAFE_BUFFERS({
|
|
base::span<const char> span_data(
|
|
data->data, static_cast<unsigned long>(data->raw_size));
|
|
CHECK(base::ToLowerASCII(base::HexEncode(
|
|
crypto::hash::Sha256(base::as_bytes(span_data)))) ==
|
|
electron::snapshot_checksum::kChecksum);
|
|
})
|
|
}
|
|
}
|
|
|
|
} // namespace
|
|
|
|
std::string LoadResourceBundle(const std::string& locale) {
|
|
const bool initialized = ui::ResourceBundle::HasSharedInstance();
|
|
DCHECK(!initialized);
|
|
|
|
// Load other resource files.
|
|
base::FilePath pak_dir;
|
|
#if BUILDFLAG(IS_MAC)
|
|
pak_dir =
|
|
base::apple::FrameworkBundlePath().Append(FILE_PATH_LITERAL("Resources"));
|
|
#else
|
|
base::PathService::Get(base::DIR_ASSETS, &pak_dir);
|
|
#endif
|
|
|
|
std::string loaded_locale = ui::ResourceBundle::InitSharedInstanceWithLocale(
|
|
locale, nullptr, ui::ResourceBundle::LOAD_COMMON_RESOURCES);
|
|
ui::ResourceBundle& bundle = ui::ResourceBundle::GetSharedInstance();
|
|
bundle.AddDataPackFromPath(pak_dir.Append(FILE_PATH_LITERAL("resources.pak")),
|
|
ui::kScaleFactorNone);
|
|
return loaded_locale;
|
|
}
|
|
|
|
ElectronMainDelegate::ElectronMainDelegate() {
|
|
gin::SetV8SnapshotValidator(base::BindRepeating(&ValidateV8Snapshot));
|
|
}
|
|
|
|
ElectronMainDelegate::~ElectronMainDelegate() = default;
|
|
|
|
const char* const ElectronMainDelegate::kNonWildcardDomainNonPortSchemes[] = {
|
|
extensions::kExtensionScheme};
|
|
const size_t ElectronMainDelegate::kNonWildcardDomainNonPortSchemesSize =
|
|
std::size(kNonWildcardDomainNonPortSchemes);
|
|
|
|
std::optional<int> ElectronMainDelegate::BasicStartupComplete() {
|
|
auto* command_line = base::CommandLine::ForCurrentProcess();
|
|
|
|
#if BUILDFLAG(IS_WIN)
|
|
v8_crashpad_support::SetUp();
|
|
|
|
// On Windows the terminal returns immediately, so we add a new line to
|
|
// prevent output in the same line as the prompt.
|
|
if (IsBrowserProcess())
|
|
std::wcout << std::endl;
|
|
#endif // !BUILDFLAG(IS_WIN)
|
|
|
|
auto env = base::Environment::Create();
|
|
|
|
// Enable convenient stack printing. This is enabled by default in
|
|
// non-official builds.
|
|
if (env->HasVar(kElectronEnableStackDumping))
|
|
base::debug::EnableInProcessStackDumping();
|
|
|
|
if (env->HasVar(kElectronDisableSandbox))
|
|
command_line->AppendSwitch(sandbox::policy::switches::kNoSandbox);
|
|
|
|
tracing_sampler_profiler_ =
|
|
tracing::TracingSamplerProfiler::CreateOnMainThread();
|
|
|
|
chrome::RegisterPathProvider();
|
|
electron::RegisterPathProvider();
|
|
|
|
#if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
|
|
ContentSettingsPattern::SetNonWildcardDomainNonPortSchemes(
|
|
kNonWildcardDomainNonPortSchemes, kNonWildcardDomainNonPortSchemesSize);
|
|
#endif
|
|
|
|
#if BUILDFLAG(IS_WIN)
|
|
// Ignore invalid parameter errors.
|
|
_set_invalid_parameter_handler(InvalidParameterHandler);
|
|
// Disable the ActiveVerifier, which is used by Chrome to track possible
|
|
// bugs, but no use in Electron.
|
|
base::win::DisableHandleVerifier();
|
|
|
|
if (IsBrowserProcess())
|
|
base::win::PinUser32();
|
|
#endif
|
|
|
|
#if BUILDFLAG(IS_LINUX)
|
|
// Check for --no-sandbox parameter when running as root.
|
|
if (getuid() == 0 && IsSandboxEnabled(command_line))
|
|
LOG(FATAL) << "Running as root without --"
|
|
<< sandbox::policy::switches::kNoSandbox
|
|
<< " is not supported. See https://crbug.com/638180.";
|
|
#endif
|
|
|
|
#if IS_MAS_BUILD()
|
|
// In MAS build we are using --disable-remote-core-animation.
|
|
//
|
|
// According to ccameron:
|
|
// If you're running with --disable-remote-core-animation, you may want to
|
|
// also run with --disable-gpu-memory-buffer-compositor-resources as well.
|
|
// That flag makes it so we use regular GL textures instead of IOSurfaces
|
|
// for compositor resources. IOSurfaces are very heavyweight to
|
|
// create/destroy, but they can be displayed directly by CoreAnimation (and
|
|
// --disable-remote-core-animation makes it so we don't use this property,
|
|
// so they're just heavyweight with no upside).
|
|
command_line->AppendSwitch(
|
|
::switches::kDisableGpuMemoryBufferCompositorResources);
|
|
#endif
|
|
|
|
return std::nullopt;
|
|
}
|
|
|
|
void ElectronMainDelegate::PreSandboxStartup() {
|
|
auto* command_line = base::CommandLine::ForCurrentProcess();
|
|
std::string process_type = GetProcessType();
|
|
|
|
#if BUILDFLAG(IS_LINUX)
|
|
// Register the pseudonymization salt descriptor in GlobalDescriptors.
|
|
// (see https://crbug.com/40850085) Only affects processes launched
|
|
// without the zygote (i.e. utility processes)
|
|
// TODO: Remove in favor of
|
|
// https://chromium-review.googlesource.com/c/chromium/src/+/7568382
|
|
if (!process_type.empty() && !IsZygoteProcess()) {
|
|
base::GlobalDescriptors::GetInstance()->Set(
|
|
kPseudonymizationSaltDescriptor,
|
|
kPseudonymizationSaltDescriptor +
|
|
base::GlobalDescriptors::kBaseDescriptor);
|
|
}
|
|
#endif
|
|
|
|
base::FilePath user_data_dir =
|
|
command_line->GetSwitchValuePath(::switches::kUserDataDir);
|
|
if (!user_data_dir.empty()) {
|
|
base::PathService::OverrideAndCreateIfNeeded(chrome::DIR_USER_DATA,
|
|
user_data_dir, false, true);
|
|
}
|
|
|
|
#if !BUILDFLAG(IS_WIN)
|
|
// For windows we call InitLogging later, after the sandbox is initialized.
|
|
//
|
|
// On Linux, we force a "preinit" in the zygote (i.e. never log to a default
|
|
// log file), because the zygote is booted prior to JS running, so it can't
|
|
// know the correct user-data directory. (And, further, accessing the
|
|
// application name on Linux can cause glib calls that end up spawning
|
|
// threads, which if done before the zygote is booted, causes a CHECK().)
|
|
logging::InitElectronLogging(
|
|
*command_line,
|
|
/* is_preinit = */ IsBrowserProcess() || IsZygoteProcess());
|
|
#endif
|
|
|
|
#if !IS_MAS_BUILD()
|
|
crash_reporter::InitializeCrashKeys();
|
|
#endif
|
|
|
|
// Initialize ResourceBundle which handles files loaded from external
|
|
// sources. The language should have been passed in to us from the
|
|
// browser process as a command line flag.
|
|
if (SubprocessNeedsResourceBundle(process_type)) {
|
|
std::string locale = command_line->GetSwitchValueASCII(::switches::kLang);
|
|
LoadResourceBundle(locale);
|
|
}
|
|
|
|
#if BUILDFLAG(IS_WIN) || (BUILDFLAG(IS_MAC) && !IS_MAS_BUILD())
|
|
// In the main process, we wait for JS to call crashReporter.start() before
|
|
// initializing crashpad. If we're in the renderer, we want to initialize it
|
|
// immediately at boot.
|
|
if (!IsBrowserProcess()) {
|
|
ElectronCrashReporterClient::Create();
|
|
crash_reporter::InitializeCrashpad(false, process_type);
|
|
}
|
|
#endif
|
|
|
|
#if BUILDFLAG(IS_LINUX)
|
|
// Zygote needs to call InitCrashReporter() in RunZygote().
|
|
if (!IsZygoteProcess() && !IsBrowserProcess()) {
|
|
ElectronCrashReporterClient::Create();
|
|
if (command_line->HasSwitch(
|
|
crash_reporter::switches::kCrashpadHandlerPid)) {
|
|
crash_reporter::InitializeCrashpad(false, process_type);
|
|
crash_reporter::SetFirstChanceExceptionHandler(
|
|
v8::TryHandleWebAssemblyTrapPosix);
|
|
}
|
|
}
|
|
#endif
|
|
|
|
#if !IS_MAS_BUILD()
|
|
crash_keys::SetCrashKeysFromCommandLine(*command_line);
|
|
crash_keys::SetPlatformCrashKey();
|
|
#endif
|
|
|
|
if (IsBrowserProcess()) {
|
|
// Only append arguments for browser process.
|
|
|
|
// Allow file:// URIs to read other file:// URIs by default.
|
|
command_line->AppendSwitch(::switches::kAllowFileAccessFromFiles);
|
|
|
|
#if BUILDFLAG(IS_MAC)
|
|
// Enable AVFoundation.
|
|
command_line->AppendSwitch("enable-avfoundation");
|
|
#endif
|
|
}
|
|
}
|
|
|
|
void ElectronMainDelegate::SandboxInitialized(const std::string& process_type) {
|
|
#if BUILDFLAG(IS_WIN)
|
|
logging::InitElectronLogging(*base::CommandLine::ForCurrentProcess(),
|
|
/* is_preinit = */ process_type.empty());
|
|
#endif
|
|
}
|
|
|
|
std::optional<int> ElectronMainDelegate::PreBrowserMain() {
|
|
// This is initialized early because the service manager reads some feature
|
|
// flags and we need to make sure the feature list is initialized before the
|
|
// service manager reads the features.
|
|
if (!base::FieldTrialList::GetInstance()) {
|
|
base::FieldTrialList* leaked_field_trial_list = new base::FieldTrialList();
|
|
ANNOTATE_LEAKING_OBJECT_PTR(leaked_field_trial_list);
|
|
std::ignore = leaked_field_trial_list;
|
|
}
|
|
InitializeFeatureList();
|
|
// Initialize mojo core as soon as we have a valid feature list
|
|
content::InitializeMojoCore();
|
|
#if BUILDFLAG(IS_MAC)
|
|
RegisterAtomCrApp();
|
|
#endif
|
|
#if BUILDFLAG(IS_LINUX)
|
|
// Set the global activation token sent as an environment variable.
|
|
auto env = base::Environment::Create();
|
|
base::nix::ExtractXdgActivationTokenFromEnv(*env);
|
|
#endif
|
|
return std::nullopt;
|
|
}
|
|
|
|
std::string_view ElectronMainDelegate::GetBrowserV8SnapshotFilename() {
|
|
bool load_browser_process_specific_v8_snapshot =
|
|
IsBrowserProcess() &&
|
|
electron::fuses::IsLoadBrowserProcessSpecificV8SnapshotEnabled();
|
|
if (load_browser_process_specific_v8_snapshot) {
|
|
return "browser_v8_context_snapshot.bin";
|
|
}
|
|
return ContentMainDelegate::GetBrowserV8SnapshotFilename();
|
|
}
|
|
|
|
content::ContentClient* ElectronMainDelegate::CreateContentClient() {
|
|
content_client_ = std::make_unique<ElectronContentClient>();
|
|
return content_client_.get();
|
|
}
|
|
|
|
content::ContentBrowserClient*
|
|
ElectronMainDelegate::CreateContentBrowserClient() {
|
|
browser_client_ = std::make_unique<ElectronBrowserClient>();
|
|
return browser_client_.get();
|
|
}
|
|
|
|
content::ContentGpuClient* ElectronMainDelegate::CreateContentGpuClient() {
|
|
gpu_client_ = std::make_unique<ElectronGpuClient>();
|
|
return gpu_client_.get();
|
|
}
|
|
|
|
content::ContentRendererClient*
|
|
ElectronMainDelegate::CreateContentRendererClient() {
|
|
auto* command_line = base::CommandLine::ForCurrentProcess();
|
|
|
|
if (IsSandboxEnabled(command_line)) {
|
|
renderer_client_ = std::make_unique<ElectronSandboxedRendererClient>();
|
|
} else {
|
|
renderer_client_ = std::make_unique<ElectronRendererClient>();
|
|
}
|
|
|
|
return renderer_client_.get();
|
|
}
|
|
|
|
content::ContentUtilityClient*
|
|
ElectronMainDelegate::CreateContentUtilityClient() {
|
|
utility_client_ = std::make_unique<ElectronContentUtilityClient>();
|
|
return utility_client_.get();
|
|
}
|
|
|
|
std::variant<int, content::MainFunctionParams> ElectronMainDelegate::RunProcess(
|
|
const std::string& process_type,
|
|
content::MainFunctionParams main_function_params) {
|
|
if (process_type == kRelauncherProcess)
|
|
return relauncher::RelauncherMain(main_function_params);
|
|
else
|
|
return std::move(main_function_params);
|
|
}
|
|
|
|
bool ElectronMainDelegate::ShouldCreateFeatureList(InvokedIn invoked_in) {
|
|
return std::holds_alternative<InvokedInChildProcess>(invoked_in);
|
|
}
|
|
|
|
bool ElectronMainDelegate::ShouldInitializeMojo(InvokedIn invoked_in) {
|
|
return ShouldCreateFeatureList(invoked_in);
|
|
}
|
|
|
|
bool ElectronMainDelegate::ShouldLoadV8Snapshot(
|
|
const std::string& process_type) {
|
|
// The gpu does not need v8
|
|
if (process_type == ::switches::kGpuProcess) {
|
|
return false;
|
|
}
|
|
return true;
|
|
}
|
|
|
|
bool ElectronMainDelegate::ShouldLockSchemeRegistry() {
|
|
return false;
|
|
}
|
|
|
|
#if BUILDFLAG(IS_LINUX)
|
|
void ElectronMainDelegate::ZygoteForked() {
|
|
// Needs to be called after we have DIR_USER_DATA. BrowserMain sets
|
|
// this up for the browser process in a different manner.
|
|
ElectronCrashReporterClient::Create();
|
|
const base::CommandLine* command_line =
|
|
base::CommandLine::ForCurrentProcess();
|
|
std::string process_type =
|
|
command_line->GetSwitchValueASCII(::switches::kProcessType);
|
|
if (command_line->HasSwitch(crash_reporter::switches::kCrashpadHandlerPid)) {
|
|
crash_reporter::InitializeCrashpad(false, process_type);
|
|
crash_reporter::SetFirstChanceExceptionHandler(
|
|
v8::TryHandleWebAssemblyTrapPosix);
|
|
}
|
|
|
|
// Reset the command line for the newly spawned process.
|
|
crash_keys::SetCrashKeysFromCommandLine(*command_line);
|
|
}
|
|
#endif // BUILDFLAG(IS_LINUX)
|
|
|
|
} // namespace electron
|