mirror of
https://github.com/electron/electron.git
synced 2026-02-19 03:14:51 -05:00
* chore: bump chromium in DEPS to 146.0.7652.0 * fix(patch-conflict): update mas_avoid_private_macos_api_usage context for constrainFrameRect method The upstream CL added a new constrainFrameRect:toScreen: method override to NativeWidgetMacNSWindow as part of headless mode window zoom implementation. The MAS patch's #endif for frameViewClassForStyleMask now correctly appears after that method, since constrainFrameRect is a public API override that doesn't need to be guarded. Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7487666 * fix(patch-conflict): update printing.patch for base::DictValue rename Updated printing.patch to use the new base::DictValue type name instead of base::Value::Dict following Chromium's type renaming change. This affects CompleteUpdatePrintSettings() signature and related code. Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7509820 * fix(patch-conflict): update accessibility_ui patch for base::DictValue/ListValue rename Updated adjust_accessibility_ui_for_electron.patch to use the new base::DictValue and base::ListValue type names instead of base::Value::Dict and base::Value::List following Chromium's type renaming change. Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7509820 * chore: update patches * 6625736: Rename DURABLE_STORAGE to PERSISTENT_STORAGE for consistency | https://chromium-review.googlesource.com/c/chromium/src/+/6625736 * chore: bump chromium in DEPS to 146.0.7653.0 * chore: update patches * 7000847: add type tag to v8::External for gin_helper function templates The upstream gin function templates now use v8::ExternalPointerTypeTag for type safety when using v8::External. Updated Electron's forked gin_helper function template to use the same kGinInternalCallbackHolderBaseTag that Chromium's gin uses. Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7000847 * fix(patch-update): extend V8 Object API deprecation patch for Node.js Extended the existing patch to cover additional files that use GetAlignedPointerFromInternalField and SetAlignedPointerInInternalField: - src/stream_base-inl.h - src/udp_wrap.cc - src/js_udp_wrap.cc - src/node_process_methods.cc - src/node_snapshotable.cc - src/base_object.cc These APIs now require an EmbedderDataTypeTag parameter. Ref: https://chromium-review.googlesource.com/c/v8/v8/+/7087956 * 7000847: add type tag to v8::External calls in shared_texture Updated v8::External::New and v8::External::Value calls to use the kExternalPointerTypeTagDefault tag as required by the V8 API change that deprecates the tagless versions. Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7000847 * 7508687: use ChildProcessId for file permission APIs The ChildProcessSecurityPolicy::CanReadFile and GrantReadFile APIs now require ChildProcessId instead of int. Updated to use GetID() instead of GetDeprecatedID() for these specific calls. Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7508687 * 7000847: add type tag to v8::External calls in callback and osr_converter The v8::External API now requires an EmbedderPointerTypeTag parameter for both New() and Value() methods to improve V8 sandbox type safety. Updated calls in: - callback.cc: TranslatorHolder constructor and CallTranslator - osr_converter.cc: OffscreenSharedTextureValue converter Ref: https://chromium-review.googlesource.com/c/v8/v8/+/7000847 * fixup! 7087956: [api] Promote deprecation of v8::Context and v8::Object API methods Extended the Node.js patch to cover histogram.cc which also uses SetAlignedPointerInInternalField and GetAlignedPointerFromInternalField APIs that now require the EmbedderDataTypeTag parameter. Ref: https://chromium-review.googlesource.com/c/v8/v8/+/7087956 * chore: bump chromium in DEPS to 146.0.7655.0 * chore: update patches * 7509043: update WebSpellingMarker type for API change The upstream Chromium API changed - WebSpellingMarker was moved from a nested type within WebTextCheckClient to a standalone type in the blink namespace. Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7509043 * 7498491: update process_id to use OriginatingProcess type The upstream Chromium API changed - URLLoaderFactoryParams::process_id was changed from an integer to a union type network::OriginatingProcess that distinguishes between browser and renderer processes. - For browser process requests, use OriginatingProcess::browser() - For renderer process lookups, check !is_browser() and use renderer_process().value() to get the child_id Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7498491 * 5710330: Add crash keys to debug NativeWidgetMacNSWindowBorderlessFrame exception | https://chromium-review.googlesource.com/c/chromium/src/+/5710330 5710330 added a new NSNextStepFrame interface extension and implementations for NativeWidgetMacNSWindowTitledFrame and NativeWidgetMacNSWindowBorderlessFrame. These use private macOS APIs that are not available in Mac App Store builds. * chore: update patches * chore: bump chromium in DEPS to 146.0.7661.0 * chore: bump chromium in DEPS to 146.0.7663.0 * fix(patch-conflict): update accessibility_ui for string_view API change Upstream removed redundant std::string(default_api_type) conversion as part of a string_view optimization cleanup. Updated patch context to match. Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7514107 * fix(patch-conflict): update service process launch options for sandbox API refactor Upstream removed content/common/sandbox_init_win.cc and content/public/common/sandbox_init_win.h, moving the functionality directly into ChildProcessLauncherHelper. Updated patch to call sandbox::policy::SandboxWin::StartSandboxedProcess directly with the LaunchOptions pointer instead of going through the removed helper. Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7528253 * fix(patch-conflict): update MAS safestorage for keychain API refactor Upstream refactored KeychainPassword::GetPassword() to use a new GetPasswordImpl() helper function with improved error tracking via base::expected<std::string, OSStatus>. Adapted patch to use the new GetPasswordImpl with the suffixed account name and handle migration from legacy accounts through the new API. Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7516438 * chore: update patches * chore: bump chromium in DEPS to 146.0.7663.0 * fix: base::Value::Dict -> base::DictValue https://chromium-review.googlesource.com/c/chromium/src/+/7513889 * fix: include new cookie exclusion reason https://chromium-review.googlesource.com/c/chromium/src/+/7486527 * fix: enable libc++ ABI flag for trivially copyable std::vector<bool> Required for changes introduced in the following CL https://chromium-review.googlesource.com/c/chromium/src/+/7513653 * fixup! fix: base::Value::Dict -> base::DictValue https://chromium-review.googlesource.com/c/chromium/src/+/7513889 * fix: spellcheck not working in tests https://chromium-review.googlesource.com/c/chromium/src/+/7452579 * fix: cookie test failing due to multiple rejection reasons https://chromium-review.googlesource.com/c/chromium/src/+/7506629 * fix: macos sizing unmaximized window incorrectly https://chromium-review.googlesource.com/c/chromium/src/+/7487666 Changes to headless mode caused the unmaximized window to subtract the height of the menubar. * fix: skip tests for incompatible BoringSSL ML-DSA crypto https://boringssl-review.googlesource.com/c/boringssl/+/84929 * test: fix pseudonymization registration in utility process on Linux Ref: 7486913: Pass pseudonymization salt via shared memory at process launch | https://chromium-review.googlesource.com/c/chromium/src/+/7486913 * fix: restore MAS patch-outs Restores some `#if !IS_MAS_BUILD()` gates dropped in773054ad59* fixup! 7508687: use ChildProcessId for file permission APIs * fixup! fix(patch-conflict): update MAS safestorage for keychain API refactor * chore: add note about parallel upstream change * fixup! Merge remote-tracking branch 'origin/main' into roller/chromium/main * Revert "fixup! 7508687: use ChildProcessId for file permission APIs" This reverts commit05c43e4e5d. The _impl version has the signature, but not the public interface. :oof: * fixup! fix(patch-conflict): update MAS safestorage for keychain API refactor --------- Co-authored-by: electron-roller[bot] <84116207+electron-roller[bot]@users.noreply.github.com> Co-authored-by: Keeley Hammond <khammond@slack-corp.com> Co-authored-by: Samuel Maddock <samuelmaddock@electronjs.org> Co-authored-by: clavin <clavin@electronjs.org>
407 lines
14 KiB
C++
407 lines
14 KiB
C++
// Copyright 2014 The Chromium Authors. All rights reserved.
|
|
// Use of this source code is governed by a BSD-style license that can be
|
|
// found in the LICENSE file.
|
|
|
|
#include "shell/browser/extensions/electron_extensions_browser_client.h"
|
|
|
|
#include <algorithm>
|
|
#include <utility>
|
|
|
|
#include "base/functional/bind.h"
|
|
#include "base/memory/ptr_util.h"
|
|
#include "base/path_service.h"
|
|
#include "chrome/browser/extensions/chrome_url_request_util.h"
|
|
#include "chrome/common/chrome_paths.h"
|
|
#include "components/version_info/version_info.h"
|
|
#include "content/public/browser/browser_context.h"
|
|
#include "content/public/browser/browser_task_traits.h"
|
|
#include "content/public/browser/browser_thread.h"
|
|
#include "content/public/browser/frame_tree_node_id.h"
|
|
#include "content/public/browser/render_frame_host.h"
|
|
#include "extensions/browser/api/core_extensions_browser_api_provider.h"
|
|
#include "extensions/browser/api/extensions_api_client.h"
|
|
#include "extensions/browser/component_extension_resource_manager.h"
|
|
#include "extensions/browser/event_router.h"
|
|
#include "extensions/browser/extension_protocols.h"
|
|
#include "extensions/browser/extensions_browser_interface_binders.h"
|
|
#include "extensions/browser/null_app_sorting.h"
|
|
#include "extensions/browser/safe_browsing_delegate.h"
|
|
#include "extensions/browser/updater/null_extension_cache.h"
|
|
#include "extensions/browser/url_request_util.h"
|
|
#include "extensions/common/features/feature_channel.h"
|
|
#include "extensions/common/file_util.h"
|
|
#include "extensions/common/manifest_constants.h"
|
|
#include "extensions/common/manifest_handlers/chrome_url_overrides_handler.h"
|
|
#include "extensions/common/manifest_handlers/devtools_page_handler.h"
|
|
#include "extensions/common/manifest_url_handlers.h"
|
|
#include "services/network/public/mojom/url_loader.mojom.h"
|
|
#include "shell/browser/browser.h"
|
|
#include "shell/browser/electron_browser_client.h"
|
|
#include "shell/browser/electron_browser_context.h"
|
|
#include "shell/browser/extensions/api/runtime/electron_runtime_api_delegate.h"
|
|
#include "shell/browser/extensions/electron_component_extension_resource_manager.h"
|
|
#include "shell/browser/extensions/electron_extension_host_delegate.h"
|
|
#include "shell/browser/extensions/electron_extension_system_factory.h"
|
|
#include "shell/browser/extensions/electron_extension_web_contents_observer.h"
|
|
#include "shell/browser/extensions/electron_extensions_api_client.h"
|
|
#include "shell/browser/extensions/electron_extensions_browser_api_provider.h"
|
|
#include "shell/browser/extensions/electron_kiosk_delegate.h"
|
|
#include "shell/browser/extensions/electron_navigation_ui_data.h"
|
|
#include "shell/browser/extensions/electron_process_manager_delegate.h"
|
|
#include "ui/base/resource/resource_bundle.h"
|
|
|
|
using content::BrowserContext;
|
|
using content::BrowserThread;
|
|
using extensions::ExtensionsBrowserClient;
|
|
|
|
namespace electron {
|
|
|
|
ElectronExtensionsBrowserClient::ElectronExtensionsBrowserClient()
|
|
: extension_cache_(std::make_unique<extensions::NullExtensionCache>()),
|
|
safe_browsing_delegate_(
|
|
std::make_unique<extensions::SafeBrowsingDelegate>()) {
|
|
AddAPIProvider(
|
|
std::make_unique<extensions::CoreExtensionsBrowserAPIProvider>());
|
|
AddAPIProvider(
|
|
std::make_unique<extensions::ElectronExtensionsBrowserAPIProvider>());
|
|
|
|
// Electron does not have a concept of channel, so leave UNKNOWN to
|
|
// enable all channel-dependent extension APIs.
|
|
extensions::SetCurrentChannel(version_info::Channel::UNKNOWN);
|
|
}
|
|
|
|
ElectronExtensionsBrowserClient::~ElectronExtensionsBrowserClient() = default;
|
|
|
|
void ElectronExtensionsBrowserClient::Init() {
|
|
process_manager_delegate_ =
|
|
std::make_unique<extensions::ElectronProcessManagerDelegate>();
|
|
api_client_ = std::make_unique<extensions::ElectronExtensionsAPIClient>();
|
|
resource_manager_ =
|
|
std::make_unique<extensions::ElectronComponentExtensionResourceManager>();
|
|
}
|
|
|
|
bool ElectronExtensionsBrowserClient::IsShuttingDown() {
|
|
return electron::Browser::Get()->is_shutting_down();
|
|
}
|
|
|
|
bool ElectronExtensionsBrowserClient::AreExtensionsDisabled(
|
|
const base::CommandLine& command_line,
|
|
BrowserContext* context) {
|
|
return false;
|
|
}
|
|
|
|
bool ElectronExtensionsBrowserClient::IsValidContext(void* context) {
|
|
return ElectronBrowserContext::IsValidContext(context);
|
|
}
|
|
|
|
bool ElectronExtensionsBrowserClient::IsSameContext(BrowserContext* first,
|
|
BrowserContext* second) {
|
|
return first == second;
|
|
}
|
|
|
|
bool ElectronExtensionsBrowserClient::HasOffTheRecordContext(
|
|
BrowserContext* context) {
|
|
return false;
|
|
}
|
|
|
|
BrowserContext* ElectronExtensionsBrowserClient::GetOffTheRecordContext(
|
|
BrowserContext* context) {
|
|
// app_shell only supports a single context.
|
|
return nullptr;
|
|
}
|
|
|
|
BrowserContext* ElectronExtensionsBrowserClient::GetOriginalContext(
|
|
BrowserContext* context) {
|
|
DCHECK(context);
|
|
if (context->IsOffTheRecord()) {
|
|
return ElectronBrowserContext::GetDefaultBrowserContext();
|
|
} else {
|
|
return context;
|
|
}
|
|
}
|
|
|
|
content::BrowserContext*
|
|
ElectronExtensionsBrowserClient::GetContextRedirectedToOriginal(
|
|
content::BrowserContext* context) {
|
|
return GetOriginalContext(context);
|
|
}
|
|
|
|
content::BrowserContext* ElectronExtensionsBrowserClient::GetContextOwnInstance(
|
|
content::BrowserContext* context) {
|
|
return context;
|
|
}
|
|
|
|
content::BrowserContext*
|
|
ElectronExtensionsBrowserClient::GetContextForOriginalOnly(
|
|
content::BrowserContext* context) {
|
|
return context->IsOffTheRecord() ? nullptr : context;
|
|
}
|
|
|
|
bool ElectronExtensionsBrowserClient::AreExtensionsDisabledForContext(
|
|
content::BrowserContext* context) {
|
|
return false;
|
|
}
|
|
|
|
bool ElectronExtensionsBrowserClient::IsGuestSession(
|
|
BrowserContext* context) const {
|
|
return false;
|
|
}
|
|
|
|
bool ElectronExtensionsBrowserClient::IsExtensionIncognitoEnabled(
|
|
const std::string& extension_id,
|
|
content::BrowserContext* context) const {
|
|
return false;
|
|
}
|
|
|
|
bool ElectronExtensionsBrowserClient::CanExtensionCrossIncognito(
|
|
const extensions::Extension* extension,
|
|
content::BrowserContext* context) const {
|
|
return false;
|
|
}
|
|
|
|
base::FilePath ElectronExtensionsBrowserClient::GetBundleResourcePath(
|
|
const network::ResourceRequest& request,
|
|
const base::FilePath& extension_resources_path,
|
|
int* resource_id) const {
|
|
*resource_id = 0;
|
|
base::FilePath chrome_resources_path;
|
|
if (!base::PathService::Get(chrome::DIR_RESOURCES, &chrome_resources_path))
|
|
return {};
|
|
|
|
// Since component extension resources are included in
|
|
// component_extension_resources.pak file in |chrome_resources_path|,
|
|
// calculate the extension |request_relative_path| against
|
|
// |chrome_resources_path|.
|
|
if (!chrome_resources_path.IsParent(extension_resources_path))
|
|
return {};
|
|
|
|
base::FilePath request_relative_path =
|
|
extensions::file_util::ExtensionURLToRelativeFilePath(request.url);
|
|
if (!ExtensionsBrowserClient::Get()
|
|
->GetComponentExtensionResourceManager()
|
|
->IsComponentExtensionResource(extension_resources_path,
|
|
request_relative_path, resource_id)) {
|
|
return {};
|
|
}
|
|
DCHECK_NE(0, *resource_id);
|
|
|
|
return request_relative_path;
|
|
}
|
|
|
|
void ElectronExtensionsBrowserClient::LoadResourceFromResourceBundle(
|
|
const network::ResourceRequest& request,
|
|
mojo::PendingReceiver<network::mojom::URLLoader> loader,
|
|
const base::FilePath& resource_relative_path,
|
|
int resource_id,
|
|
scoped_refptr<net::HttpResponseHeaders> headers,
|
|
mojo::PendingRemote<network::mojom::URLLoaderClient> client) {
|
|
extensions::chrome_url_request_util::LoadResourceFromResourceBundle(
|
|
request, std::move(loader), resource_relative_path, resource_id,
|
|
std::move(headers), std::move(client));
|
|
}
|
|
|
|
namespace {
|
|
bool AllowCrossRendererResourceLoad(
|
|
const network::ResourceRequest& request,
|
|
network::mojom::RequestDestination destination,
|
|
ui::PageTransition page_transition,
|
|
int child_id,
|
|
bool is_incognito,
|
|
const extensions::Extension* extension,
|
|
const extensions::ExtensionSet& extensions,
|
|
const extensions::ProcessMap& process_map,
|
|
const GURL& upstream_url,
|
|
bool* allowed) {
|
|
if (extensions::url_request_util::AllowCrossRendererResourceLoad(
|
|
request, destination, page_transition, child_id, is_incognito,
|
|
extension, extensions, process_map, upstream_url, allowed)) {
|
|
return true;
|
|
}
|
|
|
|
// If there aren't any explicitly marked web accessible resources, the
|
|
// load should be allowed only if it is by DevTools. A close approximation is
|
|
// checking if the extension contains a DevTools page.
|
|
if (extension && !extensions::chrome_manifest_urls::GetDevToolsPage(extension)
|
|
.is_empty()) {
|
|
*allowed = true;
|
|
return true;
|
|
}
|
|
|
|
// Couldn't determine if the resource is allowed or not.
|
|
return false;
|
|
}
|
|
} // namespace
|
|
|
|
bool ElectronExtensionsBrowserClient::AllowCrossRendererResourceLoad(
|
|
const network::ResourceRequest& request,
|
|
network::mojom::RequestDestination destination,
|
|
ui::PageTransition page_transition,
|
|
int child_id,
|
|
bool is_incognito,
|
|
const extensions::Extension* extension,
|
|
const extensions::ExtensionSet& extensions,
|
|
const extensions::ProcessMap& process_map,
|
|
const GURL& upstream_url) {
|
|
bool allowed = false;
|
|
if (::electron::AllowCrossRendererResourceLoad(
|
|
request, destination, page_transition, child_id, is_incognito,
|
|
extension, extensions, process_map, upstream_url, &allowed)) {
|
|
return allowed;
|
|
}
|
|
|
|
// Couldn't determine if resource is allowed. Block the load.
|
|
return false;
|
|
}
|
|
|
|
PrefService* ElectronExtensionsBrowserClient::GetPrefServiceForContext(
|
|
BrowserContext* context) {
|
|
return static_cast<ElectronBrowserContext*>(context)->prefs();
|
|
}
|
|
|
|
void ElectronExtensionsBrowserClient::GetEarlyExtensionPrefsObservers(
|
|
content::BrowserContext* context,
|
|
std::vector<extensions::EarlyExtensionPrefsObserver*>* observers) const {}
|
|
|
|
extensions::ProcessManagerDelegate*
|
|
ElectronExtensionsBrowserClient::GetProcessManagerDelegate() const {
|
|
return process_manager_delegate_.get();
|
|
}
|
|
|
|
mojo::PendingRemote<network::mojom::URLLoaderFactory>
|
|
ElectronExtensionsBrowserClient::GetControlledFrameEmbedderURLLoader(
|
|
const url::Origin& app_origin,
|
|
content::FrameTreeNodeId frame_tree_node_id,
|
|
content::BrowserContext* browser_context) {
|
|
return mojo::PendingRemote<network::mojom::URLLoaderFactory>();
|
|
}
|
|
|
|
std::unique_ptr<extensions::ExtensionHostDelegate>
|
|
ElectronExtensionsBrowserClient::
|
|
CreateExtensionHostDelegate() { // TODO(samuelmaddock):
|
|
return std::make_unique<extensions::ElectronExtensionHostDelegate>();
|
|
}
|
|
|
|
bool ElectronExtensionsBrowserClient::DidVersionUpdate(
|
|
BrowserContext* context) {
|
|
// TODO(jamescook): We might want to tell extensions when app_shell updates.
|
|
return false;
|
|
}
|
|
|
|
void ElectronExtensionsBrowserClient::PermitExternalProtocolHandler() {}
|
|
|
|
bool ElectronExtensionsBrowserClient::IsInDemoMode() {
|
|
return false;
|
|
}
|
|
|
|
bool ElectronExtensionsBrowserClient::IsScreensaverInDemoMode(
|
|
const std::string& app_id) {
|
|
return false;
|
|
}
|
|
|
|
bool ElectronExtensionsBrowserClient::IsRunningInForcedAppMode() {
|
|
return false;
|
|
}
|
|
|
|
bool ElectronExtensionsBrowserClient::IsAppModeForcedForApp(
|
|
const extensions::ExtensionId& extension_id) {
|
|
return false;
|
|
}
|
|
|
|
bool ElectronExtensionsBrowserClient::IsLoggedInAsPublicAccount() {
|
|
return false;
|
|
}
|
|
|
|
extensions::ExtensionSystemProvider*
|
|
ElectronExtensionsBrowserClient::GetExtensionSystemFactory() {
|
|
return extensions::ElectronExtensionSystemFactory::GetInstance();
|
|
}
|
|
|
|
std::unique_ptr<extensions::RuntimeAPIDelegate>
|
|
ElectronExtensionsBrowserClient::CreateRuntimeAPIDelegate(
|
|
content::BrowserContext* context) const {
|
|
return std::make_unique<extensions::ElectronRuntimeAPIDelegate>(context);
|
|
}
|
|
|
|
const extensions::ComponentExtensionResourceManager*
|
|
ElectronExtensionsBrowserClient::GetComponentExtensionResourceManager() {
|
|
return resource_manager_.get();
|
|
}
|
|
|
|
void ElectronExtensionsBrowserClient::BroadcastEventToRenderers(
|
|
extensions::events::HistogramValue histogram_value,
|
|
const std::string& event_name,
|
|
base::ListValue args,
|
|
bool dispatch_to_off_the_record_profiles) {
|
|
if (!BrowserThread::CurrentlyOn(BrowserThread::UI)) {
|
|
content::GetUIThreadTaskRunner({})->PostTask(
|
|
FROM_HERE,
|
|
base::BindOnce(
|
|
&ElectronExtensionsBrowserClient::BroadcastEventToRenderers,
|
|
base::Unretained(this), histogram_value, event_name,
|
|
std::move(args), dispatch_to_off_the_record_profiles));
|
|
return;
|
|
}
|
|
|
|
for (auto* browser_context : ElectronBrowserContext::BrowserContexts()) {
|
|
extensions::EventRouter::Get(browser_context)
|
|
->BroadcastEvent(std::make_unique<extensions::Event>(
|
|
histogram_value, event_name, args.Clone()));
|
|
}
|
|
}
|
|
|
|
extensions::ExtensionCache*
|
|
ElectronExtensionsBrowserClient::GetExtensionCache() {
|
|
return extension_cache_.get();
|
|
}
|
|
|
|
bool ElectronExtensionsBrowserClient::IsBackgroundUpdateAllowed() {
|
|
return true;
|
|
}
|
|
|
|
bool ElectronExtensionsBrowserClient::IsMinBrowserVersionSupported(
|
|
const std::string& min_version) {
|
|
return true;
|
|
}
|
|
|
|
void ElectronExtensionsBrowserClient::SetAPIClientForTest(
|
|
extensions::ExtensionsAPIClient* api_client) {
|
|
api_client_.reset(api_client);
|
|
}
|
|
|
|
void ElectronExtensionsBrowserClient::CreateExtensionWebContentsObserver(
|
|
content::WebContents* web_contents) {
|
|
extensions::ElectronExtensionWebContentsObserver::CreateForWebContents(
|
|
web_contents);
|
|
}
|
|
|
|
extensions::ExtensionWebContentsObserver*
|
|
ElectronExtensionsBrowserClient::GetExtensionWebContentsObserver(
|
|
content::WebContents* web_contents) {
|
|
return extensions::ElectronExtensionWebContentsObserver::FromWebContents(
|
|
web_contents);
|
|
}
|
|
|
|
extensions::KioskDelegate* ElectronExtensionsBrowserClient::GetKioskDelegate() {
|
|
if (!kiosk_delegate_)
|
|
kiosk_delegate_ = std::make_unique<ElectronKioskDelegate>();
|
|
return kiosk_delegate_.get();
|
|
}
|
|
|
|
extensions::SafeBrowsingDelegate*
|
|
ElectronExtensionsBrowserClient::GetSafeBrowsingDelegate() {
|
|
return safe_browsing_delegate_.get();
|
|
}
|
|
|
|
std::string ElectronExtensionsBrowserClient::GetApplicationLocale() {
|
|
return ElectronBrowserClient::Get()->GetApplicationLocale();
|
|
}
|
|
|
|
void ElectronExtensionsBrowserClient::RegisterBrowserInterfaceBindersForFrame(
|
|
mojo::BinderMapWithContext<content::RenderFrameHost*>* map,
|
|
content::RenderFrameHost* render_frame_host,
|
|
const extensions::Extension* extension) const {
|
|
PopulateExtensionFrameBinders(map, render_frame_host, extension);
|
|
}
|
|
|
|
} // namespace electron
|