mirror of
https://github.com/electron/electron.git
synced 2026-02-19 03:14:51 -05:00
* chore: bump chromium in DEPS to 146.0.7652.0 * fix(patch-conflict): update mas_avoid_private_macos_api_usage context for constrainFrameRect method The upstream CL added a new constrainFrameRect:toScreen: method override to NativeWidgetMacNSWindow as part of headless mode window zoom implementation. The MAS patch's #endif for frameViewClassForStyleMask now correctly appears after that method, since constrainFrameRect is a public API override that doesn't need to be guarded. Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7487666 * fix(patch-conflict): update printing.patch for base::DictValue rename Updated printing.patch to use the new base::DictValue type name instead of base::Value::Dict following Chromium's type renaming change. This affects CompleteUpdatePrintSettings() signature and related code. Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7509820 * fix(patch-conflict): update accessibility_ui patch for base::DictValue/ListValue rename Updated adjust_accessibility_ui_for_electron.patch to use the new base::DictValue and base::ListValue type names instead of base::Value::Dict and base::Value::List following Chromium's type renaming change. Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7509820 * chore: update patches * 6625736: Rename DURABLE_STORAGE to PERSISTENT_STORAGE for consistency | https://chromium-review.googlesource.com/c/chromium/src/+/6625736 * chore: bump chromium in DEPS to 146.0.7653.0 * chore: update patches * 7000847: add type tag to v8::External for gin_helper function templates The upstream gin function templates now use v8::ExternalPointerTypeTag for type safety when using v8::External. Updated Electron's forked gin_helper function template to use the same kGinInternalCallbackHolderBaseTag that Chromium's gin uses. Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7000847 * fix(patch-update): extend V8 Object API deprecation patch for Node.js Extended the existing patch to cover additional files that use GetAlignedPointerFromInternalField and SetAlignedPointerInInternalField: - src/stream_base-inl.h - src/udp_wrap.cc - src/js_udp_wrap.cc - src/node_process_methods.cc - src/node_snapshotable.cc - src/base_object.cc These APIs now require an EmbedderDataTypeTag parameter. Ref: https://chromium-review.googlesource.com/c/v8/v8/+/7087956 * 7000847: add type tag to v8::External calls in shared_texture Updated v8::External::New and v8::External::Value calls to use the kExternalPointerTypeTagDefault tag as required by the V8 API change that deprecates the tagless versions. Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7000847 * 7508687: use ChildProcessId for file permission APIs The ChildProcessSecurityPolicy::CanReadFile and GrantReadFile APIs now require ChildProcessId instead of int. Updated to use GetID() instead of GetDeprecatedID() for these specific calls. Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7508687 * 7000847: add type tag to v8::External calls in callback and osr_converter The v8::External API now requires an EmbedderPointerTypeTag parameter for both New() and Value() methods to improve V8 sandbox type safety. Updated calls in: - callback.cc: TranslatorHolder constructor and CallTranslator - osr_converter.cc: OffscreenSharedTextureValue converter Ref: https://chromium-review.googlesource.com/c/v8/v8/+/7000847 * fixup! 7087956: [api] Promote deprecation of v8::Context and v8::Object API methods Extended the Node.js patch to cover histogram.cc which also uses SetAlignedPointerInInternalField and GetAlignedPointerFromInternalField APIs that now require the EmbedderDataTypeTag parameter. Ref: https://chromium-review.googlesource.com/c/v8/v8/+/7087956 * chore: bump chromium in DEPS to 146.0.7655.0 * chore: update patches * 7509043: update WebSpellingMarker type for API change The upstream Chromium API changed - WebSpellingMarker was moved from a nested type within WebTextCheckClient to a standalone type in the blink namespace. Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7509043 * 7498491: update process_id to use OriginatingProcess type The upstream Chromium API changed - URLLoaderFactoryParams::process_id was changed from an integer to a union type network::OriginatingProcess that distinguishes between browser and renderer processes. - For browser process requests, use OriginatingProcess::browser() - For renderer process lookups, check !is_browser() and use renderer_process().value() to get the child_id Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7498491 * 5710330: Add crash keys to debug NativeWidgetMacNSWindowBorderlessFrame exception | https://chromium-review.googlesource.com/c/chromium/src/+/5710330 5710330 added a new NSNextStepFrame interface extension and implementations for NativeWidgetMacNSWindowTitledFrame and NativeWidgetMacNSWindowBorderlessFrame. These use private macOS APIs that are not available in Mac App Store builds. * chore: update patches * chore: bump chromium in DEPS to 146.0.7661.0 * chore: bump chromium in DEPS to 146.0.7663.0 * fix(patch-conflict): update accessibility_ui for string_view API change Upstream removed redundant std::string(default_api_type) conversion as part of a string_view optimization cleanup. Updated patch context to match. Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7514107 * fix(patch-conflict): update service process launch options for sandbox API refactor Upstream removed content/common/sandbox_init_win.cc and content/public/common/sandbox_init_win.h, moving the functionality directly into ChildProcessLauncherHelper. Updated patch to call sandbox::policy::SandboxWin::StartSandboxedProcess directly with the LaunchOptions pointer instead of going through the removed helper. Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7528253 * fix(patch-conflict): update MAS safestorage for keychain API refactor Upstream refactored KeychainPassword::GetPassword() to use a new GetPasswordImpl() helper function with improved error tracking via base::expected<std::string, OSStatus>. Adapted patch to use the new GetPasswordImpl with the suffixed account name and handle migration from legacy accounts through the new API. Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7516438 * chore: update patches * chore: bump chromium in DEPS to 146.0.7663.0 * fix: base::Value::Dict -> base::DictValue https://chromium-review.googlesource.com/c/chromium/src/+/7513889 * fix: include new cookie exclusion reason https://chromium-review.googlesource.com/c/chromium/src/+/7486527 * fix: enable libc++ ABI flag for trivially copyable std::vector<bool> Required for changes introduced in the following CL https://chromium-review.googlesource.com/c/chromium/src/+/7513653 * fixup! fix: base::Value::Dict -> base::DictValue https://chromium-review.googlesource.com/c/chromium/src/+/7513889 * fix: spellcheck not working in tests https://chromium-review.googlesource.com/c/chromium/src/+/7452579 * fix: cookie test failing due to multiple rejection reasons https://chromium-review.googlesource.com/c/chromium/src/+/7506629 * fix: macos sizing unmaximized window incorrectly https://chromium-review.googlesource.com/c/chromium/src/+/7487666 Changes to headless mode caused the unmaximized window to subtract the height of the menubar. * fix: skip tests for incompatible BoringSSL ML-DSA crypto https://boringssl-review.googlesource.com/c/boringssl/+/84929 * test: fix pseudonymization registration in utility process on Linux Ref: 7486913: Pass pseudonymization salt via shared memory at process launch | https://chromium-review.googlesource.com/c/chromium/src/+/7486913 * fix: restore MAS patch-outs Restores some `#if !IS_MAS_BUILD()` gates dropped in773054ad59* fixup! 7508687: use ChildProcessId for file permission APIs * fixup! fix(patch-conflict): update MAS safestorage for keychain API refactor * chore: add note about parallel upstream change * fixup! Merge remote-tracking branch 'origin/main' into roller/chromium/main * Revert "fixup! 7508687: use ChildProcessId for file permission APIs" This reverts commit05c43e4e5d. The _impl version has the signature, but not the public interface. :oof: * fixup! fix(patch-conflict): update MAS safestorage for keychain API refactor --------- Co-authored-by: electron-roller[bot] <84116207+electron-roller[bot]@users.noreply.github.com> Co-authored-by: Keeley Hammond <khammond@slack-corp.com> Co-authored-by: Samuel Maddock <samuelmaddock@electronjs.org> Co-authored-by: clavin <clavin@electronjs.org>
429 lines
15 KiB
C++
429 lines
15 KiB
C++
// Copyright (c) 2022 Microsoft, Inc.
|
|
// Use of this source code is governed by the MIT license that can be
|
|
// found in the LICENSE file.
|
|
|
|
#include "shell/browser/usb/usb_chooser_context.h"
|
|
|
|
#include <string_view>
|
|
#include <utility>
|
|
#include <vector>
|
|
|
|
#include "base/command_line.h"
|
|
#include "base/functional/bind.h"
|
|
#include "base/task/sequenced_task_runner.h"
|
|
#include "base/values.h"
|
|
#include "chrome/browser/usb/usb_blocklist.h"
|
|
#include "components/content_settings/core/common/content_settings.h"
|
|
#include "content/public/browser/device_service.h"
|
|
#include "services/device/public/cpp/usb/usb_ids.h"
|
|
#include "services/device/public/mojom/usb_device.mojom.h"
|
|
#include "shell/browser/api/electron_api_session.h"
|
|
#include "shell/browser/electron_browser_context.h"
|
|
#include "shell/browser/electron_permission_manager.h"
|
|
#include "shell/browser/web_contents_permission_helper.h"
|
|
#include "shell/common/electron_constants.h"
|
|
#include "shell/common/gin_converters/usb_device_info_converter.h"
|
|
#include "shell/common/gin_helper/dictionary.h"
|
|
#include "ui/base/l10n/l10n_util.h"
|
|
|
|
namespace {
|
|
|
|
constexpr std::string_view kDeviceNameKey = "productName";
|
|
constexpr std::string_view kDeviceIdKey = "deviceId";
|
|
constexpr int kUsbClassMassStorage = 0x08;
|
|
|
|
bool CanStorePersistentEntry(const device::mojom::UsbDeviceInfo& device_info) {
|
|
return device_info.serial_number && !device_info.serial_number->empty();
|
|
}
|
|
|
|
bool IsMassStorageInterface(const device::mojom::UsbInterfaceInfo& interface) {
|
|
for (auto& alternate : interface.alternates) {
|
|
if (alternate->class_code == kUsbClassMassStorage)
|
|
return true;
|
|
}
|
|
return false;
|
|
}
|
|
|
|
bool ShouldExposeDevice(const device::mojom::UsbDeviceInfo& device_info) {
|
|
// blink::USBDevice::claimInterface() disallows claiming mass storage
|
|
// interfaces, but explicitly prevent access in the browser process as
|
|
// ChromeOS would allow these interfaces to be claimed.
|
|
for (auto& configuration : device_info.configurations) {
|
|
if (configuration->interfaces.size() == 0) {
|
|
return true;
|
|
}
|
|
for (auto& interface : configuration->interfaces) {
|
|
if (!IsMassStorageInterface(*interface))
|
|
return true;
|
|
}
|
|
}
|
|
return false;
|
|
}
|
|
|
|
} // namespace
|
|
|
|
namespace electron {
|
|
|
|
UsbChooserContext::UsbChooserContext(ElectronBrowserContext* context)
|
|
: browser_context_(context) {}
|
|
|
|
// static
|
|
base::Value UsbChooserContext::DeviceInfoToValue(
|
|
const device::mojom::UsbDeviceInfo& device_info) {
|
|
base::DictValue device_value;
|
|
device_value.Set(kDeviceNameKey, device_info.product_name
|
|
? *device_info.product_name
|
|
: std::u16string_view());
|
|
device_value.Set(kDeviceVendorIdKey, device_info.vendor_id);
|
|
device_value.Set(kDeviceProductIdKey, device_info.product_id);
|
|
|
|
if (device_info.manufacturer_name) {
|
|
device_value.Set("manufacturerName", *device_info.manufacturer_name);
|
|
}
|
|
|
|
// CanStorePersistentEntry checks if |device_info.serial_number| is not empty.
|
|
if (CanStorePersistentEntry(device_info)) {
|
|
device_value.Set(kDeviceSerialNumberKey, *device_info.serial_number);
|
|
}
|
|
|
|
device_value.Set(kDeviceIdKey, device_info.guid);
|
|
|
|
device_value.Set("usbVersionMajor", device_info.usb_version_major);
|
|
device_value.Set("usbVersionMinor", device_info.usb_version_minor);
|
|
device_value.Set("usbVersionSubminor", device_info.usb_version_subminor);
|
|
device_value.Set("deviceClass", device_info.class_code);
|
|
device_value.Set("deviceSubclass", device_info.subclass_code);
|
|
device_value.Set("deviceProtocol", device_info.protocol_code);
|
|
device_value.Set("deviceVersionMajor", device_info.device_version_major);
|
|
device_value.Set("deviceVersionMinor", device_info.device_version_minor);
|
|
device_value.Set("deviceVersionSubminor",
|
|
device_info.device_version_subminor);
|
|
|
|
bool has_active_configuration = false;
|
|
base::ListValue configuration_list;
|
|
for (const auto& configuration : device_info.configurations) {
|
|
base::DictValue configuration_value;
|
|
configuration_value.Set("configurationValue",
|
|
configuration->configuration_value);
|
|
configuration_value.Set("configurationName",
|
|
configuration->configuration_name
|
|
? *configuration->configuration_name
|
|
: std::u16string_view());
|
|
|
|
for (const auto& interface : configuration->interfaces) {
|
|
base::DictValue interface_value;
|
|
interface_value.Set("interfaceNumber", interface->interface_number);
|
|
|
|
base::ListValue alternate_list;
|
|
for (const auto& alternate : interface->alternates) {
|
|
base::DictValue alternate_value;
|
|
alternate_value.Set("alternateSetting", alternate->alternate_setting);
|
|
alternate_value.Set("interfaceClass", alternate->class_code);
|
|
alternate_value.Set("interfaceSubclass", alternate->subclass_code);
|
|
alternate_value.Set("interfaceProtocol", alternate->protocol_code);
|
|
alternate_value.Set("interfaceName", alternate->interface_name
|
|
? *alternate->interface_name
|
|
: std::u16string_view());
|
|
|
|
base::ListValue endpoint_list;
|
|
for (const auto& endpoint : alternate->endpoints) {
|
|
base::DictValue endpoint_value;
|
|
endpoint_value.Set("endpointNumber", endpoint->endpoint_number);
|
|
|
|
bool inbound = endpoint->direction ==
|
|
device::mojom::UsbTransferDirection::INBOUND;
|
|
endpoint_value.Set("direction", inbound ? "in" : "out");
|
|
|
|
std::string type;
|
|
switch (endpoint->type) {
|
|
case device::mojom::UsbTransferType::ISOCHRONOUS:
|
|
type = "isochronous";
|
|
break;
|
|
case device::mojom::UsbTransferType::BULK:
|
|
type = "bulk";
|
|
break;
|
|
case device::mojom::UsbTransferType::INTERRUPT:
|
|
type = "interrupt";
|
|
break;
|
|
default:
|
|
NOTREACHED() << "Unknown USB transfer type: "
|
|
<< static_cast<int>(endpoint->type);
|
|
}
|
|
endpoint_value.Set("type", type);
|
|
endpoint_value.Set("packetSize",
|
|
static_cast<int>(endpoint->packet_size));
|
|
endpoint_list.Append(std::move(endpoint_value));
|
|
}
|
|
|
|
alternate_value.Set("endpoints", base::Value(std::move(endpoint_list)));
|
|
|
|
if (alternate->alternate_setting == 0) {
|
|
auto active_alternate_value = alternate_value.Clone();
|
|
interface_value.Set("alternate", std::move(active_alternate_value));
|
|
}
|
|
|
|
alternate_list.Append(std::move(alternate_value));
|
|
}
|
|
|
|
interface_value.Set("alternates", std::move(alternate_list));
|
|
|
|
configuration_value.Set("interfaces",
|
|
base::Value(std::move(interface_value)));
|
|
}
|
|
|
|
if (device_info.active_configuration &&
|
|
device_info.active_configuration ==
|
|
configuration->configuration_value) {
|
|
auto active_configuration_value = configuration_value.Clone();
|
|
has_active_configuration = true;
|
|
configuration_value.Set("configuration",
|
|
std::move(active_configuration_value));
|
|
}
|
|
|
|
configuration_list.Append(std::move(configuration_value));
|
|
}
|
|
|
|
device_value.Set("configurations", std::move(configuration_list));
|
|
|
|
// Set value for "configuration" to null if no active configuration.
|
|
if (!has_active_configuration) {
|
|
device_value.Set("configuration", base::Value());
|
|
}
|
|
|
|
return base::Value(std::move(device_value));
|
|
}
|
|
|
|
void UsbChooserContext::InitDeviceList(
|
|
std::vector<device::mojom::UsbDeviceInfoPtr> devices) {
|
|
for (auto& device_info : devices) {
|
|
DCHECK(device_info);
|
|
if (ShouldExposeDevice(*device_info))
|
|
devices_.try_emplace(device_info->guid, std::move(device_info));
|
|
}
|
|
is_initialized_ = true;
|
|
|
|
while (!pending_get_devices_requests_.empty()) {
|
|
std::vector<device::mojom::UsbDeviceInfoPtr> device_list;
|
|
for (const auto& entry : devices_) {
|
|
device_list.push_back(entry.second->Clone());
|
|
}
|
|
std::move(pending_get_devices_requests_.front())
|
|
.Run(std::move(device_list));
|
|
pending_get_devices_requests_.pop();
|
|
}
|
|
}
|
|
|
|
void UsbChooserContext::EnsureConnectionWithDeviceManager() {
|
|
if (device_manager_)
|
|
return;
|
|
|
|
// Receive mojo::Remote<UsbDeviceManager> from DeviceService.
|
|
content::GetDeviceService().BindUsbDeviceManager(
|
|
device_manager_.BindNewPipeAndPassReceiver());
|
|
|
|
SetUpDeviceManagerConnection();
|
|
}
|
|
|
|
void UsbChooserContext::SetUpDeviceManagerConnection() {
|
|
DCHECK(device_manager_);
|
|
device_manager_.set_disconnect_handler(
|
|
base::BindOnce(&UsbChooserContext::OnDeviceManagerConnectionError,
|
|
base::Unretained(this)));
|
|
|
|
// Listen for added/removed device events.
|
|
DCHECK(!client_receiver_.is_bound());
|
|
device_manager_->EnumerateDevicesAndSetClient(
|
|
client_receiver_.BindNewEndpointAndPassRemote(),
|
|
base::BindOnce(&UsbChooserContext::InitDeviceList,
|
|
weak_factory_.GetWeakPtr()));
|
|
}
|
|
|
|
UsbChooserContext::~UsbChooserContext() {
|
|
OnDeviceManagerConnectionError();
|
|
for (auto& observer : device_observer_list_) {
|
|
observer.OnBrowserContextShutdown();
|
|
DCHECK(!device_observer_list_.HasObserver(&observer));
|
|
}
|
|
}
|
|
|
|
void UsbChooserContext::RevokeDevicePermissionWebInitiated(
|
|
const url::Origin& origin,
|
|
const device::mojom::UsbDeviceInfo& device) {
|
|
DCHECK(devices_.contains(device.guid));
|
|
RevokeObjectPermissionInternal(origin, DeviceInfoToValue(device),
|
|
/*revoked_by_website=*/true);
|
|
}
|
|
|
|
void UsbChooserContext::RevokeObjectPermissionInternal(
|
|
const url::Origin& origin,
|
|
const base::Value& object,
|
|
bool revoked_by_website = false) {
|
|
const base::DictValue* object_dict = object.GetIfDict();
|
|
DCHECK(object_dict != nullptr);
|
|
|
|
if (object_dict->FindString(kDeviceSerialNumberKey) != nullptr) {
|
|
auto* permission_manager = static_cast<ElectronPermissionManager*>(
|
|
browser_context_->GetPermissionControllerDelegate());
|
|
permission_manager->RevokeDevicePermission(
|
|
blink::PermissionType::USB, origin, object, browser_context_);
|
|
} else {
|
|
const std::string* guid = object_dict->FindString(kDeviceIdKey);
|
|
auto it = ephemeral_devices_.find(origin);
|
|
if (it != ephemeral_devices_.end()) {
|
|
it->second.erase(*guid);
|
|
if (it->second.empty())
|
|
ephemeral_devices_.erase(it);
|
|
}
|
|
}
|
|
|
|
gin::WeakCell<api::Session>* session =
|
|
api::Session::FromBrowserContext(browser_context_);
|
|
if (session && session->Get()) {
|
|
v8::Isolate* isolate = JavascriptEnvironment::GetIsolate();
|
|
v8::HandleScope scope(isolate);
|
|
auto details = gin_helper::Dictionary::CreateEmpty(isolate);
|
|
details.Set("device", object);
|
|
details.Set("origin", origin.Serialize());
|
|
session->Get()->Emit("usb-device-revoked", details);
|
|
}
|
|
}
|
|
|
|
void UsbChooserContext::GrantDevicePermission(
|
|
const url::Origin& origin,
|
|
const device::mojom::UsbDeviceInfo& device_info) {
|
|
if (CanStorePersistentEntry(device_info)) {
|
|
auto* permission_manager = static_cast<ElectronPermissionManager*>(
|
|
browser_context_->GetPermissionControllerDelegate());
|
|
permission_manager->GrantDevicePermission(
|
|
blink::PermissionType::USB, origin, DeviceInfoToValue(device_info),
|
|
browser_context_);
|
|
} else {
|
|
ephemeral_devices_[origin].insert(device_info.guid);
|
|
}
|
|
}
|
|
|
|
bool UsbChooserContext::HasDevicePermission(
|
|
const url::Origin& origin,
|
|
const device::mojom::UsbDeviceInfo& device_info) {
|
|
bool blocklist_disabled =
|
|
base::CommandLine::ForCurrentProcess()->HasSwitch(kDisableUSBBlocklist);
|
|
if (!blocklist_disabled && UsbBlocklist::Get().IsExcluded(device_info)) {
|
|
return false;
|
|
}
|
|
|
|
auto it = ephemeral_devices_.find(origin);
|
|
if (it != ephemeral_devices_.end() && it->second.contains(device_info.guid)) {
|
|
return true;
|
|
}
|
|
|
|
auto* permission_manager = static_cast<ElectronPermissionManager*>(
|
|
browser_context_->GetPermissionControllerDelegate());
|
|
|
|
return permission_manager->CheckDevicePermission(
|
|
blink::PermissionType::USB, origin, DeviceInfoToValue(device_info),
|
|
browser_context_);
|
|
}
|
|
|
|
void UsbChooserContext::GetDevices(
|
|
device::mojom::UsbDeviceManager::GetDevicesCallback callback) {
|
|
if (!is_initialized_) {
|
|
EnsureConnectionWithDeviceManager();
|
|
pending_get_devices_requests_.push(std::move(callback));
|
|
return;
|
|
}
|
|
|
|
std::vector<device::mojom::UsbDeviceInfoPtr> device_list;
|
|
for (const auto& pair : devices_) {
|
|
device_list.push_back(pair.second->Clone());
|
|
}
|
|
base::SequencedTaskRunner::GetCurrentDefault()->PostTask(
|
|
FROM_HERE, base::BindOnce(std::move(callback), std::move(device_list)));
|
|
}
|
|
|
|
void UsbChooserContext::GetDevice(
|
|
const std::string& guid,
|
|
base::span<const uint8_t> blocked_interface_classes,
|
|
mojo::PendingReceiver<device::mojom::UsbDevice> device_receiver,
|
|
mojo::PendingRemote<device::mojom::UsbDeviceClient> device_client) {
|
|
EnsureConnectionWithDeviceManager();
|
|
device_manager_->GetDevice(
|
|
guid,
|
|
std::vector<uint8_t>(blocked_interface_classes.begin(),
|
|
blocked_interface_classes.end()),
|
|
std::move(device_receiver), std::move(device_client));
|
|
}
|
|
|
|
const device::mojom::UsbDeviceInfo* UsbChooserContext::GetDeviceInfo(
|
|
const std::string& guid) {
|
|
DCHECK(is_initialized_);
|
|
auto it = devices_.find(guid);
|
|
return it == devices_.end() ? nullptr : it->second.get();
|
|
}
|
|
|
|
void UsbChooserContext::AddObserver(DeviceObserver* observer) {
|
|
EnsureConnectionWithDeviceManager();
|
|
device_observer_list_.AddObserver(observer);
|
|
}
|
|
|
|
void UsbChooserContext::RemoveObserver(DeviceObserver* observer) {
|
|
device_observer_list_.RemoveObserver(observer);
|
|
}
|
|
|
|
base::WeakPtr<UsbChooserContext> UsbChooserContext::AsWeakPtr() {
|
|
return weak_factory_.GetWeakPtr();
|
|
}
|
|
|
|
void UsbChooserContext::OnDeviceAdded(
|
|
device::mojom::UsbDeviceInfoPtr device_info) {
|
|
DCHECK(device_info);
|
|
// Update the device list.
|
|
DCHECK(!devices_.contains(device_info->guid));
|
|
if (!ShouldExposeDevice(*device_info))
|
|
return;
|
|
devices_.try_emplace(device_info->guid, device_info->Clone());
|
|
|
|
// Notify all observers.
|
|
device_observer_list_.Notify(&DeviceObserver::OnDeviceAdded, *device_info);
|
|
}
|
|
|
|
void UsbChooserContext::OnDeviceRemoved(
|
|
device::mojom::UsbDeviceInfoPtr device_info) {
|
|
DCHECK(device_info);
|
|
|
|
if (!ShouldExposeDevice(*device_info)) {
|
|
DCHECK(!devices_.contains(device_info->guid));
|
|
return;
|
|
}
|
|
|
|
// Update the device list.
|
|
const size_t n_erased = devices_.erase(device_info->guid);
|
|
DCHECK_EQ(n_erased, 1U);
|
|
|
|
// Notify all device observers.
|
|
device_observer_list_.Notify(&DeviceObserver::OnDeviceRemoved, *device_info);
|
|
|
|
// If the device was persistent, return. Otherwise, notify all permission
|
|
// observers that its permissions were revoked.
|
|
if (device_info->serial_number &&
|
|
!device_info->serial_number.value().empty()) {
|
|
return;
|
|
}
|
|
for (auto& map_entry : ephemeral_devices_) {
|
|
map_entry.second.erase(device_info->guid);
|
|
}
|
|
}
|
|
|
|
void UsbChooserContext::OnDeviceManagerConnectionError() {
|
|
device_manager_.reset();
|
|
client_receiver_.reset();
|
|
devices_.clear();
|
|
is_initialized_ = false;
|
|
|
|
ephemeral_devices_.clear();
|
|
|
|
// Notify all device observers.
|
|
device_observer_list_.Notify(&DeviceObserver::OnDeviceManagerConnectionError);
|
|
}
|
|
|
|
} // namespace electron
|