mirror of
https://github.com/electron/electron.git
synced 2026-01-06 22:24:03 -05:00
* chore: bump chromium in DEPS to 145.0.7562.0 * fix(patch-conflict): update code cache patch for PersistentCache refactor Upstream refactored code cache to use PersistentCache with new class-based implementation (NoopCodeCacheHost, LocalCodeCacheHost, CodeCacheWithPersistentCacheHost). Updated patch to integrate custom scheme support into the new structure while preserving ProcessLockURLIsCodeCacheScheme checks for embedder-registered schemes. Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7044986 Co-Authored-By: Claude <svc-devxp-claude@slack-corp.com> * fix(patch-conflict): update dialog patch for RequestXdgDesktopPortal API Upstream changed from SetSystemdScopeUnitNameForXdgPortal to RequestXdgDesktopPortal API pattern. Updated OnServiceStarted signature and kept OnSystemdUnitStarted callback that calls Electron's file_dialog::StartPortalAvailabilityTestInBackground(). Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7204285 Co-Authored-By: Claude <svc-devxp-claude@slack-corp.com> * fix(patch-conflict): remove reference to deleted AbortByPlaceholderLayout flag Upstream removed the AbortByPlaceholderLayout runtime flag from runtime_enabled_features.json5. Updated patch to only add ElectronCSSCornerSmoothing without the removed flag reference. Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7226494 Co-Authored-By: Claude <svc-devxp-claude@slack-corp.com> * chore: update patch hunk headers Co-Authored-By: Claude <svc-devxp-claude@slack-corp.com> * fix(build): guard media_file_system_registry for ChromeOS only Upstream CL https://chromium-review.googlesource.com/c/chromium/src/+/7100719 moved media_file_system_registry to be ChromeOS-only since Media Galleries is a Chrome Apps API and Chrome Apps are only available on Chrome OS now. Co-Authored-By: Claude <svc-devxp-claude@slack-corp.com> * fix(build): update VideoPixelFormat API for SharedImageFormat Upstream CL https://chromium-review.googlesource.com/c/chromium/src/+/7207153 removed VideoPixelFormatToGfxBufferFormat as part of migration to SharedImageFormat. Update to use VideoPixelFormatToSharedImageFormat which directly returns the SharedImageFormat. Co-Authored-By: Claude <svc-devxp-claude@slack-corp.com> * fix(build): extend profile methods patch for ShouldEnableXfaForms The ShouldEnableXfaForms function uses Profile::FromBrowserContext() which is not available in Electron. Wrap the profile-dependent code in #if 0 to fall through to the feature flag default. Co-Authored-By: Claude <noreply@anthropic.com> * chore: bump chromium in DEPS to 145.0.7563.0 * chore: bump chromium in DEPS to 145.0.7565.0 * chore: bump chromium in DEPS to 145.0.7567.0 * chore: bump chromium in DEPS to 145.0.7568.0 * fix(patch-conflict): update content_main_delegate.h context for IsInitFeatureListEarly Upstream added a new IsInitFeatureListEarly() virtual method to ContentMainDelegate just before where our GetBrowserV8SnapshotFilename() method is added. Updated patch context to account for this new method. Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7092856 Co-Authored-By: Claude <svc-devxp-claude@slack-corp.com> * chore: update patch hunk headers Co-Authored-By: Claude <svc-devxp-claude@slack-corp.com> * fix(patch-update): include v8-cppgc.h for CppHeap complete type The std::unique_ptr<v8::CppHeap> default argument in node.h requires the complete CppHeap type definition for the destructor. Added the v8-cppgc.h include to provide the full type definition. Ref: Unable to locate CL - libc++ unique_ptr requires complete type for destructor Co-Authored-By: Claude <svc-devxp-claude@slack-corp.com> * chore: update patch hunk headers Co-Authored-By: Claude <svc-devxp-claude@slack-corp.com> * fix(build): move NativeAppWindowFrameViewMacClient before constructor The std::unique_ptr<NativeAppWindowFrameViewMacClient> member requires the complete type definition to be visible at the point of the constructor because the unique_ptr destructor may be instantiated during exception handling. Moved the class definition before the NativeWindowMac constructor. Ref: Unable to locate CL - libc++ unique_ptr requires complete type for destructor Co-Authored-By: Claude <svc-devxp-claude@slack-corp.com> * fix(patch-conflict): update create_browser_v8_snapshot_file_name_fuse context for IsInitFeatureListEarly The upstream added IsInitFeatureListEarly() virtual method declaration to ContentMainDelegate class. Updated the patch context to account for this new function being present before the GetBrowserV8SnapshotFilename() declaration we add. Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7092856 Co-Authored-By: Claude <noreply@anthropic.com> * chore: update patch hunk headers Co-Authored-By: Claude <noreply@anthropic.com> * fix(patch-update): remove reverted IsInitFeatureListEarly from v8 snapshot patch The upstream added IsInitFeatureListEarly() was reverted, so the patch should not include this declaration. Only GetBrowserV8SnapshotFilename() should be added by the create_browser_v8_snapshot_file_name_fuse patch. Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7230430 Co-Authored-By: Claude <noreply@anthropic.com> * 6171655: include single_thread_task_runner.h for complete type Added include for base/task/single_thread_task_runner.h in osr_converter.cc to resolve incomplete type error when using base::SingleThreadTaskRunner::GetCurrentDefault(). Ref: https://chromium-review.googlesource.com/c/chromium/src/+/6171655 Co-Authored-By: Claude <noreply@anthropic.com> * 7224136: use CHROMIUM_GIT_REVISION directly instead of removed function Upstream removed GetChromiumGitRevision() function from embedder_support. Updated to use CHROMIUM_GIT_REVISION macro directly via build/util/chromium_git_revision.h as recommended in the Chromium CL. Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7224136 Co-Authored-By: Claude <noreply@anthropic.com> * fixup! 7224136: use CHROMIUM_GIT_REVISION directly instead of removed function * fix(build): add missing include `components/dbus/xdg/systemd.h` for `void OnSystemdUnitStarted(dbus_xdg::SystemdUnitStatus)` in the same patch. * fix(build): adapt to string-view-ification change in windows jump_list.cc 7186922: Fix unsafe buffer usage in base/win/win_util.cc https://chromium-review.googlesource.com/c/chromium/src/+/7186922 * chore: update libc++ filenames * fixup! fix(build): add missing include * fixup! fix(build): extend profile methods patch for ShouldEnableXfaForms * fixup! fix(build): guard media_file_system_registry for ChromeOS only * fixup! fixup! fix(build): extend profile methods patch for ShouldEnableXfaForms --------- Co-authored-by: electron-roller[bot] <84116207+electron-roller[bot]@users.noreply.github.com> Co-authored-by: Keeley Hammond <khammond@slack-corp.com> Co-authored-by: Claude <svc-devxp-claude@slack-corp.com> Co-authored-by: Claude <noreply@anthropic.com> Co-authored-by: clavin <clavin@electronjs.org>
326 lines
14 KiB
Diff
326 lines
14 KiB
Diff
From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
|
|
From: Raymond Zhao <raymondzhao@microsoft.com>
|
|
Date: Tue, 7 Sep 2021 14:54:25 -0700
|
|
Subject: feat: Add data parameter to ProcessSingleton
|
|
|
|
This patch adds an additional_data parameter to the constructor of
|
|
ProcessSingleton, so that the second instance can send additional
|
|
data over to the first instance while requesting the ProcessSingleton
|
|
lock.
|
|
|
|
On the Electron side, we then expose an extra parameter to the
|
|
app.requestSingleInstanceLock API so that users can pass in a JSON
|
|
object for the second instance to send to the first instance.
|
|
|
|
diff --git a/chrome/browser/process_singleton.h b/chrome/browser/process_singleton.h
|
|
index 2748dd196fe1f56357348a204e24f0b8a28b97dd..5800dd00b47c657d9e6766f3fc5a30654cffffa6 100644
|
|
--- a/chrome/browser/process_singleton.h
|
|
+++ b/chrome/browser/process_singleton.h
|
|
@@ -18,7 +18,8 @@
|
|
#include "base/functional/callback.h"
|
|
#include "base/memory/scoped_refptr.h"
|
|
#include "base/process/process.h"
|
|
-
|
|
+#include "base/containers/span.h"
|
|
+#include "base/memory/raw_span.h"
|
|
#if BUILDFLAG(IS_POSIX) && !BUILDFLAG(IS_ANDROID)
|
|
#include "base/files/scoped_temp_dir.h"
|
|
#endif
|
|
@@ -99,21 +100,24 @@ class ProcessSingleton {
|
|
// should handle it (i.e., because the current process is shutting down).
|
|
using NotificationCallback =
|
|
base::RepeatingCallback<bool(base::CommandLine command_line,
|
|
- const base::FilePath& current_directory)>;
|
|
+ const base::FilePath& current_directory,
|
|
+ const std::vector<uint8_t> additional_data)>;
|
|
|
|
#if BUILDFLAG(IS_WIN)
|
|
ProcessSingleton(const std::string& program_name,
|
|
const base::FilePath& user_data_dir,
|
|
+ const base::raw_span<const uint8_t> additional_data,
|
|
bool is_sandboxed,
|
|
const NotificationCallback& notification_callback);
|
|
#else
|
|
ProcessSingleton(const base::FilePath& user_data_dir,
|
|
+ const base::raw_span<const uint8_t> additional_data,
|
|
const NotificationCallback& notification_callback);
|
|
+#endif
|
|
|
|
ProcessSingleton(const ProcessSingleton&) = delete;
|
|
ProcessSingleton& operator=(const ProcessSingleton&) = delete;
|
|
|
|
-#endif
|
|
~ProcessSingleton();
|
|
|
|
// Notify another process, if available. Otherwise sets ourselves as the
|
|
@@ -177,7 +181,10 @@ class ProcessSingleton {
|
|
#endif
|
|
|
|
private:
|
|
+ // A callback to run when the first instance receives data from the second.
|
|
NotificationCallback notification_callback_; // Handler for notifications.
|
|
+ // Custom data to pass to the other instance during notify.
|
|
+ base::raw_span<const uint8_t> additional_data_;
|
|
|
|
#if BUILDFLAG(IS_WIN)
|
|
bool EscapeVirtualization(const base::FilePath& user_data_dir);
|
|
diff --git a/chrome/browser/process_singleton_posix.cc b/chrome/browser/process_singleton_posix.cc
|
|
index 73aa4cb9652870b0bff4684d7c72ae7dbd852db8..b55c942a8ccb326e4898172a7b4f6c0aa3183a0b 100644
|
|
--- a/chrome/browser/process_singleton_posix.cc
|
|
+++ b/chrome/browser/process_singleton_posix.cc
|
|
@@ -619,6 +619,7 @@ class ProcessSingleton::LinuxWatcher
|
|
// |reader| is for sending back ACK message.
|
|
void HandleMessage(const std::string& current_dir,
|
|
const std::vector<std::string>& argv,
|
|
+ const std::vector<uint8_t> additional_data,
|
|
SocketReader* reader);
|
|
|
|
// Called when the ProcessSingleton that owns this class is about to be
|
|
@@ -678,13 +679,17 @@ void ProcessSingleton::LinuxWatcher::StartListening(int socket) {
|
|
}
|
|
|
|
void ProcessSingleton::LinuxWatcher::HandleMessage(
|
|
- const std::string& current_dir, const std::vector<std::string>& argv,
|
|
+ const std::string& current_dir,
|
|
+ const std::vector<std::string>& argv,
|
|
+ const std::vector<uint8_t> additional_data,
|
|
SocketReader* reader) {
|
|
DCHECK(ui_task_runner_->BelongsToCurrentThread());
|
|
DCHECK(reader);
|
|
|
|
if (parent_ && parent_->notification_callback_.Run(
|
|
- base::CommandLine(argv), base::FilePath(current_dir))) {
|
|
+ base::CommandLine(argv),
|
|
+ base::FilePath(current_dir),
|
|
+ std::move(additional_data))) {
|
|
// Send back "ACK" message to prevent the client process from starting up.
|
|
reader->FinishWithACK(kACKToken);
|
|
} else {
|
|
@@ -714,7 +719,8 @@ void ProcessSingleton::LinuxWatcher::SocketReader::
|
|
bytes_read_ += ReadFromSocketWithTimeout(
|
|
fd_, base::span(buf_).subspan(bytes_read_), base::Seconds(0));
|
|
|
|
- // Validate the message. The shortest message is kStartToken\0x\0x
|
|
+ // Validate the message. The shortest message kStartToken\0\00
|
|
+ // The shortest message with additional data is kStartToken\0\00\00\0.
|
|
const size_t kMinMessageLength = kStartToken.length() + 4;
|
|
if (bytes_read_ < kMinMessageLength) {
|
|
buf_[bytes_read_] = 0;
|
|
@@ -745,10 +751,26 @@ void ProcessSingleton::LinuxWatcher::SocketReader::
|
|
tokens.erase(tokens.begin());
|
|
tokens.erase(tokens.begin());
|
|
|
|
+ size_t num_args;
|
|
+ base::StringToSizeT(tokens[0], &num_args);
|
|
+ std::vector<std::string> command_line(tokens.begin() + 1, tokens.begin() + 1 + num_args);
|
|
+
|
|
+ std::vector<uint8_t> additional_data;
|
|
+ if (tokens.size() >= 3 + num_args) {
|
|
+ size_t additional_data_size;
|
|
+ base::StringToSizeT(tokens[1 + num_args], &additional_data_size);
|
|
+ std::string remaining_args = base::JoinString(
|
|
+ base::span(tokens).subspan(2 + num_args),
|
|
+ std::string(1, kTokenDelimiter));
|
|
+ const auto adspan = base::as_byte_span(remaining_args).first(additional_data_size);
|
|
+ additional_data.assign(adspan.begin(), adspan.end());
|
|
+ }
|
|
+
|
|
// Return to the UI thread to handle opening a new browser tab.
|
|
ui_task_runner_->PostTask(
|
|
FROM_HERE, base::BindOnce(&ProcessSingleton::LinuxWatcher::HandleMessage,
|
|
- parent_, current_dir, tokens, this));
|
|
+ parent_, current_dir, command_line,
|
|
+ std::move(additional_data), this));
|
|
fd_watch_controller_.reset();
|
|
|
|
// LinuxWatcher::HandleMessage() is in charge of destroying this SocketReader
|
|
@@ -777,8 +799,10 @@ void ProcessSingleton::LinuxWatcher::SocketReader::FinishWithACK(
|
|
//
|
|
ProcessSingleton::ProcessSingleton(
|
|
const base::FilePath& user_data_dir,
|
|
+ const base::raw_span<const uint8_t> additional_data,
|
|
const NotificationCallback& notification_callback)
|
|
: notification_callback_(notification_callback),
|
|
+ additional_data_(additional_data),
|
|
current_pid_(base::GetCurrentProcId()) {
|
|
socket_path_ = user_data_dir.Append(chrome::kSingletonSocketFilename);
|
|
lock_path_ = user_data_dir.Append(chrome::kSingletonLockFilename);
|
|
@@ -899,7 +923,8 @@ ProcessSingleton::NotifyResult ProcessSingleton::NotifyOtherProcessWithTimeout(
|
|
sizeof(socket_timeout));
|
|
|
|
// Found another process, prepare our command line
|
|
- // format is "START\0<current dir>\0<argv[0]>\0...\0<argv[n]>".
|
|
+ // format is "START\0<current-dir>\0<n-args>\0<argv[0]>\0...\0<argv[n]>
|
|
+ // \0<additional-data-length>\0<additional-data>".
|
|
std::string to_send(kStartToken);
|
|
to_send.push_back(kTokenDelimiter);
|
|
|
|
@@ -909,11 +934,21 @@ ProcessSingleton::NotifyResult ProcessSingleton::NotifyOtherProcessWithTimeout(
|
|
to_send.append(current_dir.value());
|
|
|
|
const std::vector<std::string>& argv = cmd_line.argv();
|
|
+ to_send.push_back(kTokenDelimiter);
|
|
+ to_send.append(base::NumberToString(argv.size()));
|
|
for (auto it = argv.begin(); it != argv.end(); ++it) {
|
|
to_send.push_back(kTokenDelimiter);
|
|
to_send.append(*it);
|
|
}
|
|
|
|
+ size_t data_to_send_size = additional_data_.size_bytes();
|
|
+ if (data_to_send_size) {
|
|
+ to_send.push_back(kTokenDelimiter);
|
|
+ to_send.append(base::NumberToString(data_to_send_size));
|
|
+ to_send.push_back(kTokenDelimiter);
|
|
+ to_send.append(reinterpret_cast<const char*>(additional_data_.data()), data_to_send_size);
|
|
+ }
|
|
+
|
|
// Send the message
|
|
if (!WriteToSocket(socket.fd(), to_send)) {
|
|
// Try to kill the other process, because it might have been dead.
|
|
diff --git a/chrome/browser/process_singleton_win.cc b/chrome/browser/process_singleton_win.cc
|
|
index ae659d84a5ae2f2e87ce288477506575f8d86839..d93c7e8487ab1a2bbb5f56f2ca44868f947e6bfc 100644
|
|
--- a/chrome/browser/process_singleton_win.cc
|
|
+++ b/chrome/browser/process_singleton_win.cc
|
|
@@ -81,10 +81,12 @@ BOOL CALLBACK BrowserWindowEnumeration(HWND window, LPARAM param) {
|
|
|
|
bool ParseCommandLine(const COPYDATASTRUCT* cds,
|
|
base::CommandLine* parsed_command_line,
|
|
- base::FilePath* current_directory) {
|
|
+ base::FilePath* current_directory,
|
|
+ std::vector<uint8_t>* parsed_additional_data) {
|
|
// We should have enough room for the shortest command (min_message_size)
|
|
// and also be a multiple of wchar_t bytes. The shortest command
|
|
- // possible is L"START\0\0" (empty current directory and command line).
|
|
+ // possible is L"START\0\0" (empty command line, current directory,
|
|
+ // and additional data).
|
|
static const int min_message_size = 7;
|
|
if (cds->cbData < min_message_size * sizeof(wchar_t) ||
|
|
cds->cbData % sizeof(wchar_t) != 0) {
|
|
@@ -134,6 +136,23 @@ bool ParseCommandLine(const COPYDATASTRUCT* cds,
|
|
const std::wstring cmd_line =
|
|
msg.substr(second_null + 1, third_null - second_null);
|
|
*parsed_command_line = base::CommandLine::FromString(cmd_line);
|
|
+
|
|
+ const std::wstring::size_type fourth_null =
|
|
+ msg.find_first_of(L'\0', third_null + 1);
|
|
+ if (fourth_null == std::wstring::npos ||
|
|
+ fourth_null == msg.length()) {
|
|
+ // No additional data was provided.
|
|
+ return true;
|
|
+ }
|
|
+
|
|
+ // Get the actual additional data.
|
|
+ const std::wstring additional_data =
|
|
+ msg.substr(third_null + 1, fourth_null - third_null);
|
|
+ base::span<const uint8_t> additional_data_bytes =
|
|
+ base::as_byte_span(additional_data);
|
|
+ *parsed_additional_data = std::vector<uint8_t>(
|
|
+ additional_data_bytes.begin(), additional_data_bytes.end());
|
|
+
|
|
return true;
|
|
}
|
|
return false;
|
|
@@ -155,13 +174,14 @@ bool ProcessLaunchNotification(
|
|
|
|
base::CommandLine parsed_command_line(base::CommandLine::NO_PROGRAM);
|
|
base::FilePath current_directory;
|
|
- if (!ParseCommandLine(cds, &parsed_command_line, ¤t_directory)) {
|
|
+ std::vector<uint8_t> additional_data;
|
|
+ if (!ParseCommandLine(cds, &parsed_command_line, ¤t_directory, &additional_data)) {
|
|
*result = TRUE;
|
|
return true;
|
|
}
|
|
|
|
- *result = notification_callback.Run(parsed_command_line, current_directory) ?
|
|
- TRUE : FALSE;
|
|
+ *result = notification_callback.Run(parsed_command_line,
|
|
+ current_directory, std::move(additional_data)) ? TRUE : FALSE;
|
|
return true;
|
|
}
|
|
|
|
@@ -265,9 +285,11 @@ bool ProcessSingleton::EscapeVirtualization(
|
|
ProcessSingleton::ProcessSingleton(
|
|
const std::string& program_name,
|
|
const base::FilePath& user_data_dir,
|
|
+ const base::raw_span<const uint8_t> additional_data,
|
|
bool is_app_sandboxed,
|
|
const NotificationCallback& notification_callback)
|
|
: notification_callback_(notification_callback),
|
|
+ additional_data_(additional_data),
|
|
program_name_(program_name),
|
|
is_app_sandboxed_(is_app_sandboxed),
|
|
is_virtualized_(false),
|
|
@@ -294,7 +316,7 @@ ProcessSingleton::NotifyResult ProcessSingleton::NotifyOtherProcess() {
|
|
return PROCESS_NONE;
|
|
}
|
|
|
|
- switch (AttemptToNotifyRunningChrome(remote_window_)) {
|
|
+ switch (AttemptToNotifyRunningChrome(remote_window_, additional_data_)) {
|
|
case NotifyChromeResult::kSuccess:
|
|
return PROCESS_NOTIFIED;
|
|
case NotifyChromeResult::kFailed:
|
|
diff --git a/chrome/browser/win/chrome_process_finder.cc b/chrome/browser/win/chrome_process_finder.cc
|
|
index 594f3bc08a4385c177fb488123cef79448e94850..5a1dde19a4bc2bf728eba4c738f831c3e5b73942 100644
|
|
--- a/chrome/browser/win/chrome_process_finder.cc
|
|
+++ b/chrome/browser/win/chrome_process_finder.cc
|
|
@@ -39,7 +39,9 @@ HWND FindRunningChromeWindow(const base::FilePath& user_data_dir) {
|
|
return base::win::MessageWindow::FindWindow(user_data_dir.value());
|
|
}
|
|
|
|
-NotifyChromeResult AttemptToNotifyRunningChrome(HWND remote_window) {
|
|
+NotifyChromeResult AttemptToNotifyRunningChrome(
|
|
+ HWND remote_window,
|
|
+ const base::raw_span<const uint8_t> additional_data) {
|
|
TRACE_EVENT0("startup", "AttemptToNotifyRunningChrome");
|
|
|
|
DCHECK(remote_window);
|
|
@@ -70,12 +72,24 @@ NotifyChromeResult AttemptToNotifyRunningChrome(HWND remote_window) {
|
|
new_command_line.AppendSwitch(switches::kSourceAppId);
|
|
}
|
|
// Send the command line to the remote chrome window.
|
|
- // Format is "START\0<<<current directory>>>\0<<<commandline>>>".
|
|
+ // Format is
|
|
+ // "START\0<current-directory>\0<command-line>\0<additional-data>".
|
|
std::wstring to_send = base::StrCat(
|
|
{std::wstring_view{L"START\0", 6}, cur_dir.value(),
|
|
std::wstring_view{L"\0", 1}, new_command_line.GetCommandLineString(),
|
|
std::wstring_view{L"\0", 1}});
|
|
|
|
+ size_t additional_data_size = additional_data.size_bytes();
|
|
+ if (additional_data_size) {
|
|
+ size_t padded_size = additional_data_size / sizeof(wchar_t);
|
|
+ if (additional_data_size % sizeof(wchar_t) != 0) {
|
|
+ padded_size++;
|
|
+ }
|
|
+ to_send.append(reinterpret_cast<const wchar_t*>(additional_data.data()),
|
|
+ padded_size);
|
|
+ to_send.append(L"\0", 1); // Null separator.
|
|
+ }
|
|
+
|
|
// Allow the current running browser window to make itself the foreground
|
|
// window (otherwise it will just flash in the taskbar).
|
|
::AllowSetForegroundWindow(process_id);
|
|
diff --git a/chrome/browser/win/chrome_process_finder.h b/chrome/browser/win/chrome_process_finder.h
|
|
index 62e232f41189a557534e0b01d912469b2ca26148..3a4dfb027cdc690ee7561fc8b632f35cb6b8f4be 100644
|
|
--- a/chrome/browser/win/chrome_process_finder.h
|
|
+++ b/chrome/browser/win/chrome_process_finder.h
|
|
@@ -7,6 +7,7 @@
|
|
|
|
#include <windows.h>
|
|
|
|
+#include "base/memory/raw_span.h"
|
|
#include "base/time/time.h"
|
|
|
|
namespace base {
|
|
@@ -25,7 +26,9 @@ HWND FindRunningChromeWindow(const base::FilePath& user_data_dir);
|
|
// Attempts to send the current command line to an already running instance of
|
|
// Chrome via a WM_COPYDATA message.
|
|
// Returns true if a running Chrome is found and successfully notified.
|
|
-NotifyChromeResult AttemptToNotifyRunningChrome(HWND remote_window);
|
|
+NotifyChromeResult AttemptToNotifyRunningChrome(
|
|
+ HWND remote_window,
|
|
+ const base::raw_span<const uint8_t> additional_data);
|
|
|
|
// Changes the notification timeout to |new_timeout|, returns the old timeout.
|
|
base::TimeDelta SetNotificationTimeoutForTesting(base::TimeDelta new_timeout);
|