2020-06-25 04:34:12 +02:00
|
|
|
// Copyright 2020 The Chromium Embedded Framework Authors.
|
|
|
|
// Portions copyright 2012 The Chromium Authors. All rights reserved.
|
|
|
|
// Use of this source code is governed by a BSD-style license that can be
|
|
|
|
// found in the LICENSE file.
|
|
|
|
|
|
|
|
#include "libcef/browser/chrome/chrome_content_browser_client_cef.h"
|
|
|
|
|
2022-01-25 20:40:24 +01:00
|
|
|
#include <tuple>
|
|
|
|
|
2021-05-14 18:58:55 +02:00
|
|
|
#include "libcef/browser/browser_frame.h"
|
2020-09-25 03:40:47 +02:00
|
|
|
#include "libcef/browser/browser_info_manager.h"
|
2021-05-14 18:58:55 +02:00
|
|
|
#include "libcef/browser/browser_manager.h"
|
2022-08-09 21:43:00 +02:00
|
|
|
#include "libcef/browser/certificate_query.h"
|
2021-04-18 03:12:54 +02:00
|
|
|
#include "libcef/browser/chrome/chrome_browser_host_impl.h"
|
2020-06-25 04:34:12 +02:00
|
|
|
#include "libcef/browser/chrome/chrome_browser_main_extra_parts_cef.h"
|
2021-04-18 03:12:54 +02:00
|
|
|
#include "libcef/browser/context.h"
|
2021-02-16 00:24:28 +01:00
|
|
|
#include "libcef/browser/net/chrome_scheme_handler.h"
|
2020-09-25 03:40:47 +02:00
|
|
|
#include "libcef/browser/net/throttle_handler.h"
|
|
|
|
#include "libcef/browser/net_service/cookie_manager_impl.h"
|
|
|
|
#include "libcef/browser/net_service/login_delegate.h"
|
|
|
|
#include "libcef/browser/net_service/proxy_url_loader_factory.h"
|
|
|
|
#include "libcef/browser/net_service/resource_request_handler_wrapper.h"
|
2021-04-28 19:12:06 +02:00
|
|
|
#include "libcef/browser/prefs/browser_prefs.h"
|
2021-04-18 03:12:54 +02:00
|
|
|
#include "libcef/browser/prefs/renderer_prefs.h"
|
2020-09-25 03:40:47 +02:00
|
|
|
#include "libcef/common/app_manager.h"
|
2020-06-25 04:34:12 +02:00
|
|
|
#include "libcef/common/cef_switches.h"
|
2020-09-25 03:40:47 +02:00
|
|
|
#include "libcef/common/command_line_impl.h"
|
2020-06-25 04:34:12 +02:00
|
|
|
|
|
|
|
#include "base/command_line.h"
|
2020-07-06 20:14:57 +02:00
|
|
|
#include "base/path_service.h"
|
2020-06-25 04:34:12 +02:00
|
|
|
#include "chrome/browser/chrome_browser_main.h"
|
2021-10-19 00:17:16 +02:00
|
|
|
#include "chrome/browser/net/system_network_context_manager.h"
|
2023-02-27 19:52:38 +01:00
|
|
|
#include "chrome/browser/profiles/profile.h"
|
2020-07-06 20:14:57 +02:00
|
|
|
#include "chrome/common/chrome_paths.h"
|
|
|
|
#include "chrome/common/chrome_switches.h"
|
2020-09-25 03:40:47 +02:00
|
|
|
#include "content/public/browser/navigation_throttle.h"
|
|
|
|
#include "content/public/browser/render_process_host.h"
|
2021-04-18 03:12:54 +02:00
|
|
|
#include "content/public/browser/render_view_host.h"
|
|
|
|
#include "content/public/browser/render_widget_host.h"
|
|
|
|
#include "content/public/browser/render_widget_host_view.h"
|
2022-01-25 21:26:51 +01:00
|
|
|
#include "content/public/browser/weak_document_ptr.h"
|
2020-09-25 03:40:47 +02:00
|
|
|
#include "content/public/common/content_switches.h"
|
2021-04-18 03:12:54 +02:00
|
|
|
#include "third_party/blink/public/common/web_preferences/web_preferences.h"
|
2020-09-25 03:40:47 +02:00
|
|
|
#include "third_party/blink/public/mojom/loader/resource_load_info.mojom-shared.h"
|
|
|
|
|
|
|
|
namespace {
|
|
|
|
|
|
|
|
void HandleExternalProtocolHelper(
|
|
|
|
ChromeContentBrowserClientCef* self,
|
2021-07-23 18:40:13 +02:00
|
|
|
content::WebContents::Getter web_contents_getter,
|
2021-04-21 00:52:34 +02:00
|
|
|
int frame_tree_node_id,
|
2020-09-25 03:40:47 +02:00
|
|
|
content::NavigationUIData* navigation_data,
|
2022-03-26 02:12:30 +01:00
|
|
|
bool is_primary_main_frame,
|
|
|
|
bool is_in_fenced_frame_tree,
|
2021-10-19 00:17:16 +02:00
|
|
|
network::mojom::WebSandboxFlags sandbox_flags,
|
2022-01-25 21:26:51 +01:00
|
|
|
const network::ResourceRequest& resource_request,
|
|
|
|
const absl::optional<url::Origin>& initiating_origin,
|
|
|
|
content::WeakDocumentPtr initiator_document) {
|
|
|
|
// May return nullptr if frame has been deleted or a cross-document navigation
|
|
|
|
// has committed in the same RenderFrameHost.
|
|
|
|
auto initiator_rfh = initiator_document.AsRenderFrameHostIfValid();
|
2023-01-02 23:59:03 +01:00
|
|
|
if (!initiator_rfh) {
|
2022-01-25 21:26:51 +01:00
|
|
|
return;
|
2023-01-02 23:59:03 +01:00
|
|
|
}
|
2022-01-25 21:26:51 +01:00
|
|
|
|
2020-09-25 03:40:47 +02:00
|
|
|
// Match the logic of the original call in
|
|
|
|
// NavigationURLLoaderImpl::PrepareForNonInterceptedRequest.
|
|
|
|
self->HandleExternalProtocol(
|
2022-03-26 02:12:30 +01:00
|
|
|
resource_request.url, web_contents_getter, frame_tree_node_id,
|
|
|
|
navigation_data, is_primary_main_frame, is_in_fenced_frame_tree,
|
2021-10-19 00:17:16 +02:00
|
|
|
sandbox_flags,
|
2020-09-25 03:40:47 +02:00
|
|
|
static_cast<ui::PageTransition>(resource_request.transition_type),
|
2022-01-25 21:26:51 +01:00
|
|
|
resource_request.has_user_gesture, initiating_origin, initiator_rfh,
|
2020-09-25 03:40:47 +02:00
|
|
|
nullptr);
|
|
|
|
}
|
|
|
|
|
|
|
|
} // namespace
|
2020-06-25 04:34:12 +02:00
|
|
|
|
2020-12-02 23:31:49 +01:00
|
|
|
ChromeContentBrowserClientCef::ChromeContentBrowserClientCef() = default;
|
2020-06-25 04:34:12 +02:00
|
|
|
ChromeContentBrowserClientCef::~ChromeContentBrowserClientCef() = default;
|
|
|
|
|
|
|
|
std::unique_ptr<content::BrowserMainParts>
|
|
|
|
ChromeContentBrowserClientCef::CreateBrowserMainParts(
|
2022-05-19 12:28:44 +02:00
|
|
|
bool is_integration_test) {
|
2020-06-25 04:34:12 +02:00
|
|
|
auto main_parts =
|
2022-05-19 12:28:44 +02:00
|
|
|
ChromeContentBrowserClient::CreateBrowserMainParts(is_integration_test);
|
|
|
|
auto browser_main_parts = std::make_unique<ChromeBrowserMainExtraPartsCef>();
|
|
|
|
browser_main_parts_ = browser_main_parts.get();
|
2020-06-25 04:34:12 +02:00
|
|
|
static_cast<ChromeBrowserMainParts*>(main_parts.get())
|
2022-05-19 12:28:44 +02:00
|
|
|
->AddParts(std::move(browser_main_parts));
|
2020-06-25 04:34:12 +02:00
|
|
|
return main_parts;
|
|
|
|
}
|
|
|
|
|
|
|
|
void ChromeContentBrowserClientCef::AppendExtraCommandLineSwitches(
|
|
|
|
base::CommandLine* command_line,
|
|
|
|
int child_process_id) {
|
|
|
|
ChromeContentBrowserClient::AppendExtraCommandLineSwitches(command_line,
|
|
|
|
child_process_id);
|
|
|
|
|
|
|
|
// Necessary to launch sub-processes in the correct mode.
|
|
|
|
command_line->AppendSwitch(switches::kEnableChromeRuntime);
|
2020-07-06 20:14:57 +02:00
|
|
|
|
|
|
|
// Necessary to populate DIR_USER_DATA in sub-processes.
|
|
|
|
// See resource_util.cc GetUserDataPath.
|
|
|
|
base::FilePath user_data_dir;
|
|
|
|
if (base::PathService::Get(chrome::DIR_USER_DATA, &user_data_dir)) {
|
|
|
|
command_line->AppendSwitchPath(switches::kUserDataDir, user_data_dir);
|
|
|
|
}
|
2020-09-25 03:40:47 +02:00
|
|
|
|
|
|
|
const base::CommandLine* browser_cmd = base::CommandLine::ForCurrentProcess();
|
|
|
|
|
2021-04-27 18:39:09 +02:00
|
|
|
{
|
|
|
|
// Propagate the following switches to all command lines (along with any
|
|
|
|
// associated values) if present in the browser command line.
|
|
|
|
static const char* const kSwitchNames[] = {
|
|
|
|
switches::kUserAgentProductAndVersion,
|
|
|
|
};
|
2023-07-21 00:11:34 +02:00
|
|
|
command_line->CopySwitchesFrom(*browser_cmd, kSwitchNames);
|
2021-04-27 18:39:09 +02:00
|
|
|
}
|
|
|
|
|
2020-09-25 03:40:47 +02:00
|
|
|
const std::string& process_type =
|
|
|
|
command_line->GetSwitchValueASCII(switches::kProcessType);
|
|
|
|
if (process_type == switches::kRendererProcess) {
|
|
|
|
// Propagate the following switches to the renderer command line (along with
|
|
|
|
// any associated values) if present in the browser command line.
|
|
|
|
static const char* const kSwitchNames[] = {
|
|
|
|
switches::kUncaughtExceptionStackSize,
|
|
|
|
};
|
2023-07-21 00:11:34 +02:00
|
|
|
command_line->CopySwitchesFrom(*browser_cmd, kSwitchNames);
|
2020-09-25 03:40:47 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
CefRefPtr<CefApp> app = CefAppManager::Get()->GetApplication();
|
|
|
|
if (app.get()) {
|
|
|
|
CefRefPtr<CefBrowserProcessHandler> handler =
|
|
|
|
app->GetBrowserProcessHandler();
|
|
|
|
if (handler.get()) {
|
|
|
|
CefRefPtr<CefCommandLineImpl> commandLinePtr(
|
|
|
|
new CefCommandLineImpl(command_line, false, false));
|
|
|
|
handler->OnBeforeChildProcessLaunch(commandLinePtr.get());
|
2022-01-25 20:40:24 +01:00
|
|
|
std::ignore = commandLinePtr->Detach(nullptr);
|
2020-09-25 03:40:47 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void ChromeContentBrowserClientCef::RenderProcessWillLaunch(
|
|
|
|
content::RenderProcessHost* host) {
|
2021-01-28 00:13:12 +01:00
|
|
|
ChromeContentBrowserClient::RenderProcessWillLaunch(host);
|
|
|
|
|
2020-09-25 03:40:47 +02:00
|
|
|
// If the renderer process crashes then the host may already have
|
|
|
|
// CefBrowserInfoManager as an observer. Try to remove it first before adding
|
|
|
|
// to avoid DCHECKs.
|
|
|
|
host->RemoveObserver(CefBrowserInfoManager::GetInstance());
|
|
|
|
host->AddObserver(CefBrowserInfoManager::GetInstance());
|
|
|
|
}
|
|
|
|
|
2022-08-09 21:43:00 +02:00
|
|
|
void ChromeContentBrowserClientCef::AllowCertificateError(
|
|
|
|
content::WebContents* web_contents,
|
|
|
|
int cert_error,
|
|
|
|
const net::SSLInfo& ssl_info,
|
|
|
|
const GURL& request_url,
|
|
|
|
bool is_main_frame_request,
|
|
|
|
bool strict_enforcement,
|
|
|
|
base::OnceCallback<void(content::CertificateRequestResultType)> callback) {
|
|
|
|
auto returned_callback = certificate_query::AllowCertificateError(
|
|
|
|
web_contents, cert_error, ssl_info, request_url, is_main_frame_request,
|
|
|
|
strict_enforcement, std::move(callback), /*default_disallow=*/false);
|
|
|
|
if (returned_callback.is_null()) {
|
|
|
|
// The error was handled.
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Proceed with default handling.
|
|
|
|
ChromeContentBrowserClient::AllowCertificateError(
|
|
|
|
web_contents, cert_error, ssl_info, request_url, is_main_frame_request,
|
|
|
|
strict_enforcement, std::move(returned_callback));
|
|
|
|
}
|
|
|
|
|
2020-09-25 03:40:47 +02:00
|
|
|
bool ChromeContentBrowserClientCef::CanCreateWindow(
|
|
|
|
content::RenderFrameHost* opener,
|
|
|
|
const GURL& opener_url,
|
|
|
|
const GURL& opener_top_level_frame_url,
|
|
|
|
const url::Origin& source_origin,
|
|
|
|
content::mojom::WindowContainerType container_type,
|
|
|
|
const GURL& target_url,
|
|
|
|
const content::Referrer& referrer,
|
|
|
|
const std::string& frame_name,
|
|
|
|
WindowOpenDisposition disposition,
|
|
|
|
const blink::mojom::WindowFeatures& features,
|
|
|
|
bool user_gesture,
|
|
|
|
bool opener_suppressed,
|
|
|
|
bool* no_javascript_access) {
|
|
|
|
// The chrome layer has popup blocker, extensions, etc.
|
|
|
|
if (!ChromeContentBrowserClient::CanCreateWindow(
|
|
|
|
opener, opener_url, opener_top_level_frame_url, source_origin,
|
|
|
|
container_type, target_url, referrer, frame_name, disposition,
|
|
|
|
features, user_gesture, opener_suppressed, no_javascript_access)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return CefBrowserInfoManager::GetInstance()->CanCreateWindow(
|
|
|
|
opener, target_url, referrer, frame_name, disposition, features,
|
|
|
|
user_gesture, opener_suppressed, no_javascript_access);
|
|
|
|
}
|
|
|
|
|
2021-04-18 03:12:54 +02:00
|
|
|
void ChromeContentBrowserClientCef::OverrideWebkitPrefs(
|
|
|
|
content::WebContents* web_contents,
|
|
|
|
blink::web_pref::WebPreferences* prefs) {
|
|
|
|
renderer_prefs::SetDefaultPrefs(*prefs);
|
|
|
|
|
|
|
|
ChromeContentBrowserClient::OverrideWebkitPrefs(web_contents, prefs);
|
|
|
|
|
2021-07-23 18:40:13 +02:00
|
|
|
SkColor base_background_color;
|
2021-04-18 03:12:54 +02:00
|
|
|
auto browser = ChromeBrowserHostImpl::GetBrowserForContents(web_contents);
|
|
|
|
if (browser) {
|
|
|
|
renderer_prefs::SetCefPrefs(browser->settings(), *prefs);
|
|
|
|
|
|
|
|
// Set the background color for the WebView.
|
2021-07-23 18:40:13 +02:00
|
|
|
base_background_color = browser->GetBackgroundColor();
|
2021-04-18 03:12:54 +02:00
|
|
|
} else {
|
|
|
|
// We don't know for sure that the browser will be windowless but assume
|
|
|
|
// that the global windowless state is likely to be accurate.
|
2021-07-23 18:40:13 +02:00
|
|
|
base_background_color =
|
2021-04-18 03:12:54 +02:00
|
|
|
CefContext::Get()->GetBackgroundColor(nullptr, STATE_DEFAULT);
|
|
|
|
}
|
|
|
|
|
2021-07-23 18:40:13 +02:00
|
|
|
web_contents->SetPageBaseBackgroundColor(base_background_color);
|
2021-04-18 03:12:54 +02:00
|
|
|
}
|
|
|
|
|
2020-09-25 03:40:47 +02:00
|
|
|
bool ChromeContentBrowserClientCef::WillCreateURLLoaderFactory(
|
|
|
|
content::BrowserContext* browser_context,
|
|
|
|
content::RenderFrameHost* frame,
|
|
|
|
int render_process_id,
|
|
|
|
URLLoaderFactoryType type,
|
|
|
|
const url::Origin& request_initiator,
|
2021-06-04 03:34:56 +02:00
|
|
|
absl::optional<int64_t> navigation_id,
|
2020-12-02 23:31:49 +01:00
|
|
|
ukm::SourceIdObj ukm_source_id,
|
2020-09-25 03:40:47 +02:00
|
|
|
mojo::PendingReceiver<network::mojom::URLLoaderFactory>* factory_receiver,
|
|
|
|
mojo::PendingRemote<network::mojom::TrustedURLLoaderHeaderClient>*
|
|
|
|
header_client,
|
|
|
|
bool* bypass_redirect_checks,
|
|
|
|
bool* disable_secure_dns,
|
2023-06-26 12:13:38 +02:00
|
|
|
network::mojom::URLLoaderFactoryOverridePtr* factory_override,
|
|
|
|
scoped_refptr<base::SequencedTaskRunner> navigation_response_task_runner) {
|
2021-02-15 22:40:07 +01:00
|
|
|
// Don't intercept requests for Profiles that were not created by CEF.
|
|
|
|
// For example, the User Manager profile created via
|
|
|
|
// profiles::CreateSystemProfileForUserManager.
|
|
|
|
auto profile = Profile::FromBrowserContext(browser_context);
|
2023-01-02 23:59:03 +01:00
|
|
|
if (!CefBrowserContext::FromProfile(profile)) {
|
2023-02-17 20:38:48 +01:00
|
|
|
return ChromeContentBrowserClient::WillCreateURLLoaderFactory(
|
|
|
|
browser_context, frame, render_process_id, type, request_initiator,
|
|
|
|
navigation_id, ukm_source_id, factory_receiver, header_client,
|
2023-06-26 12:13:38 +02:00
|
|
|
bypass_redirect_checks, disable_secure_dns, factory_override,
|
|
|
|
navigation_response_task_runner);
|
2023-02-17 20:38:48 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// Based on content/browser/devtools/devtools_instrumentation.cc
|
|
|
|
// WillCreateURLLoaderFactoryInternal.
|
|
|
|
network::mojom::URLLoaderFactoryOverridePtr cef_override(
|
|
|
|
network::mojom::URLLoaderFactoryOverride::New());
|
|
|
|
// If caller passed some existing overrides, use those.
|
|
|
|
// Otherwise, use our local var, then if handlers actually
|
|
|
|
// decide to intercept, move it to |factory_override|.
|
|
|
|
network::mojom::URLLoaderFactoryOverridePtr* handler_override =
|
|
|
|
factory_override && *factory_override ? factory_override : &cef_override;
|
|
|
|
network::mojom::URLLoaderFactoryOverride* intercepting_factory =
|
|
|
|
handler_override->get();
|
|
|
|
|
|
|
|
// If we're the first interceptor to install an override, make a
|
|
|
|
// remote/receiver pair, then handle this similarly to appending
|
|
|
|
// a proxy to existing override.
|
|
|
|
if (!intercepting_factory->overriding_factory) {
|
|
|
|
DCHECK(!intercepting_factory->overridden_factory_receiver);
|
|
|
|
intercepting_factory->overridden_factory_receiver =
|
|
|
|
intercepting_factory->overriding_factory
|
|
|
|
.InitWithNewPipeAndPassReceiver();
|
|
|
|
}
|
|
|
|
|
|
|
|
// TODO(chrome): Is it necessary to proxy |header_client| callbacks?
|
|
|
|
bool use_proxy = ChromeContentBrowserClient::WillCreateURLLoaderFactory(
|
|
|
|
browser_context, frame, render_process_id, type, request_initiator,
|
|
|
|
navigation_id, ukm_source_id,
|
|
|
|
&(intercepting_factory->overridden_factory_receiver),
|
|
|
|
/*header_client=*/nullptr, bypass_redirect_checks, disable_secure_dns,
|
2023-06-26 12:13:38 +02:00
|
|
|
handler_override, navigation_response_task_runner);
|
2023-02-17 20:38:48 +01:00
|
|
|
|
|
|
|
if (use_proxy) {
|
|
|
|
DCHECK(intercepting_factory->overriding_factory);
|
|
|
|
DCHECK(intercepting_factory->overridden_factory_receiver);
|
|
|
|
if (!factory_override) {
|
|
|
|
// Not a subresource navigation, so just override the target receiver.
|
|
|
|
mojo::FusePipes(std::move(*factory_receiver),
|
|
|
|
std::move(cef_override->overriding_factory));
|
|
|
|
*factory_receiver = std::move(cef_override->overridden_factory_receiver);
|
|
|
|
} else if (!*factory_override) {
|
|
|
|
// No other overrides, so just returns ours as is.
|
|
|
|
*factory_override = network::mojom::URLLoaderFactoryOverride::New(
|
|
|
|
std::move(cef_override->overriding_factory),
|
|
|
|
std::move(cef_override->overridden_factory_receiver), false);
|
|
|
|
}
|
|
|
|
// ... else things are already taken care of, as handler_override was
|
|
|
|
// pointing to factory override and we've done all magic in-place.
|
|
|
|
DCHECK(!cef_override->overriding_factory);
|
|
|
|
DCHECK(!cef_override->overridden_factory_receiver);
|
2023-01-02 23:59:03 +01:00
|
|
|
}
|
2021-02-15 22:40:07 +01:00
|
|
|
|
2020-09-25 03:40:47 +02:00
|
|
|
auto request_handler = net_service::CreateInterceptedRequestHandler(
|
|
|
|
browser_context, frame, render_process_id,
|
|
|
|
type == URLLoaderFactoryType::kNavigation,
|
|
|
|
type == URLLoaderFactoryType::kDownload, request_initiator);
|
|
|
|
|
|
|
|
net_service::ProxyURLLoaderFactory::CreateProxy(
|
|
|
|
browser_context, factory_receiver, header_client,
|
|
|
|
std::move(request_handler));
|
2023-02-17 20:38:48 +01:00
|
|
|
|
2020-09-25 03:40:47 +02:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool ChromeContentBrowserClientCef::HandleExternalProtocol(
|
|
|
|
const GURL& url,
|
2021-07-23 18:40:13 +02:00
|
|
|
content::WebContents::Getter web_contents_getter,
|
2021-04-21 00:52:34 +02:00
|
|
|
int frame_tree_node_id,
|
2020-09-25 03:40:47 +02:00
|
|
|
content::NavigationUIData* navigation_data,
|
2022-03-26 02:12:30 +01:00
|
|
|
bool is_primary_main_frame,
|
|
|
|
bool is_in_fenced_frame_tree,
|
2021-10-19 00:17:16 +02:00
|
|
|
network::mojom::WebSandboxFlags sandbox_flags,
|
2020-09-25 03:40:47 +02:00
|
|
|
ui::PageTransition page_transition,
|
|
|
|
bool has_user_gesture,
|
2021-06-04 03:34:56 +02:00
|
|
|
const absl::optional<url::Origin>& initiating_origin,
|
2022-01-25 21:26:51 +01:00
|
|
|
content::RenderFrameHost* initiator_document,
|
2020-09-25 03:40:47 +02:00
|
|
|
mojo::PendingRemote<network::mojom::URLLoaderFactory>* out_factory) {
|
|
|
|
// |out_factory| will be non-nullptr when this method is initially called
|
|
|
|
// from NavigationURLLoaderImpl::PrepareForNonInterceptedRequest.
|
|
|
|
if (out_factory) {
|
|
|
|
// Let the other HandleExternalProtocol variant handle the request.
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// The request was unhandled and we've recieved a callback from
|
|
|
|
// HandleExternalProtocolHelper. Forward to the chrome layer for default
|
|
|
|
// handling.
|
|
|
|
return ChromeContentBrowserClient::HandleExternalProtocol(
|
2022-03-26 02:12:30 +01:00
|
|
|
url, web_contents_getter, frame_tree_node_id, navigation_data,
|
|
|
|
is_primary_main_frame, is_in_fenced_frame_tree, sandbox_flags,
|
|
|
|
page_transition, has_user_gesture, initiating_origin, initiator_document,
|
|
|
|
nullptr);
|
2020-09-25 03:40:47 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
bool ChromeContentBrowserClientCef::HandleExternalProtocol(
|
|
|
|
content::WebContents::Getter web_contents_getter,
|
|
|
|
int frame_tree_node_id,
|
|
|
|
content::NavigationUIData* navigation_data,
|
2022-03-26 02:12:30 +01:00
|
|
|
bool is_primary_main_frame,
|
|
|
|
bool is_in_fenced_frame_tree,
|
2021-10-19 00:17:16 +02:00
|
|
|
network::mojom::WebSandboxFlags sandbox_flags,
|
2020-09-25 03:40:47 +02:00
|
|
|
const network::ResourceRequest& resource_request,
|
2022-01-25 21:26:51 +01:00
|
|
|
const absl::optional<url::Origin>& initiating_origin,
|
|
|
|
content::RenderFrameHost* initiator_document,
|
2020-09-25 03:40:47 +02:00
|
|
|
mojo::PendingRemote<network::mojom::URLLoaderFactory>* out_factory) {
|
|
|
|
mojo::PendingReceiver<network::mojom::URLLoaderFactory> receiver =
|
|
|
|
out_factory->InitWithNewPipeAndPassReceiver();
|
|
|
|
|
2022-01-25 21:26:51 +01:00
|
|
|
auto weak_initiator_document = initiator_document
|
|
|
|
? initiator_document->GetWeakDocumentPtr()
|
|
|
|
: content::WeakDocumentPtr();
|
|
|
|
|
2020-09-25 03:40:47 +02:00
|
|
|
// HandleExternalProtocolHelper may be called if nothing handles the request.
|
|
|
|
auto request_handler = net_service::CreateInterceptedRequestHandler(
|
|
|
|
web_contents_getter, frame_tree_node_id, resource_request,
|
2021-06-04 03:34:56 +02:00
|
|
|
base::BindRepeating(HandleExternalProtocolHelper, base::Unretained(this),
|
|
|
|
web_contents_getter, frame_tree_node_id,
|
2022-03-26 02:12:30 +01:00
|
|
|
navigation_data, is_primary_main_frame,
|
|
|
|
is_in_fenced_frame_tree, sandbox_flags,
|
|
|
|
resource_request, initiating_origin,
|
2022-01-25 21:26:51 +01:00
|
|
|
std::move(weak_initiator_document)));
|
2020-09-25 03:40:47 +02:00
|
|
|
|
|
|
|
net_service::ProxyURLLoaderFactory::CreateProxy(
|
|
|
|
web_contents_getter, std::move(receiver), std::move(request_handler));
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
std::vector<std::unique_ptr<content::NavigationThrottle>>
|
|
|
|
ChromeContentBrowserClientCef::CreateThrottlesForNavigation(
|
|
|
|
content::NavigationHandle* navigation_handle) {
|
|
|
|
auto throttles = ChromeContentBrowserClient::CreateThrottlesForNavigation(
|
|
|
|
navigation_handle);
|
|
|
|
throttle::CreateThrottlesForNavigation(navigation_handle, throttles);
|
|
|
|
return throttles;
|
|
|
|
}
|
|
|
|
|
2021-10-19 00:17:16 +02:00
|
|
|
bool ChromeContentBrowserClientCef::ConfigureNetworkContextParams(
|
2020-09-25 03:40:47 +02:00
|
|
|
content::BrowserContext* context,
|
|
|
|
bool in_memory,
|
|
|
|
const base::FilePath& relative_partition_path,
|
|
|
|
network::mojom::NetworkContextParams* network_context_params,
|
2021-03-04 23:36:57 +01:00
|
|
|
cert_verifier::mojom::CertVerifierCreationParams*
|
|
|
|
cert_verifier_creation_params) {
|
2021-10-19 00:17:16 +02:00
|
|
|
// This method may be called during shutdown when using multi-threaded
|
|
|
|
// message loop mode. In that case exit early to avoid crashes.
|
|
|
|
if (!SystemNetworkContextManager::GetInstance()) {
|
|
|
|
// Cancel NetworkContext creation in
|
|
|
|
// StoragePartitionImpl::InitNetworkContext.
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2020-09-25 03:40:47 +02:00
|
|
|
ChromeContentBrowserClient::ConfigureNetworkContextParams(
|
|
|
|
context, in_memory, relative_partition_path, network_context_params,
|
|
|
|
cert_verifier_creation_params);
|
|
|
|
|
|
|
|
auto cef_context = CefBrowserContext::FromBrowserContext(context);
|
|
|
|
network_context_params->cookieable_schemes =
|
|
|
|
cef_context ? cef_context->GetCookieableSchemes()
|
2021-04-09 20:34:45 +02:00
|
|
|
: CefBrowserContext::GetGlobalCookieableSchemes();
|
2021-04-28 19:12:06 +02:00
|
|
|
|
2021-10-19 00:17:16 +02:00
|
|
|
return true;
|
2020-09-25 03:40:47 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
std::unique_ptr<content::LoginDelegate>
|
|
|
|
ChromeContentBrowserClientCef::CreateLoginDelegate(
|
|
|
|
const net::AuthChallengeInfo& auth_info,
|
|
|
|
content::WebContents* web_contents,
|
|
|
|
const content::GlobalRequestID& request_id,
|
|
|
|
bool is_request_for_main_frame,
|
|
|
|
const GURL& url,
|
|
|
|
scoped_refptr<net::HttpResponseHeaders> response_headers,
|
|
|
|
bool first_auth_attempt,
|
|
|
|
LoginAuthRequiredCallback auth_required_callback) {
|
|
|
|
// |web_contents| is nullptr for CefURLRequests without an associated frame.
|
|
|
|
if (!web_contents || base::CommandLine::ForCurrentProcess()->HasSwitch(
|
|
|
|
switches::kDisableChromeLoginPrompt)) {
|
|
|
|
// Delegate auth callbacks to GetAuthCredentials.
|
|
|
|
return std::make_unique<net_service::LoginDelegate>(
|
|
|
|
auth_info, web_contents, request_id, url,
|
|
|
|
std::move(auth_required_callback));
|
|
|
|
}
|
|
|
|
|
|
|
|
return ChromeContentBrowserClient::CreateLoginDelegate(
|
|
|
|
auth_info, web_contents, request_id, is_request_for_main_frame, url,
|
|
|
|
response_headers, first_auth_attempt, std::move(auth_required_callback));
|
2020-06-25 04:34:12 +02:00
|
|
|
}
|
|
|
|
|
2021-02-16 00:24:28 +01:00
|
|
|
void ChromeContentBrowserClientCef::BrowserURLHandlerCreated(
|
|
|
|
content::BrowserURLHandler* handler) {
|
2021-02-27 20:25:46 +01:00
|
|
|
// Register the Chrome handlers first for proper URL rewriting.
|
2021-02-16 00:24:28 +01:00
|
|
|
ChromeContentBrowserClient::BrowserURLHandlerCreated(handler);
|
2021-02-27 20:25:46 +01:00
|
|
|
scheme::BrowserURLHandlerCreated(handler);
|
2021-02-16 00:24:28 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
bool ChromeContentBrowserClientCef::IsWebUIAllowedToMakeNetworkRequests(
|
|
|
|
const url::Origin& origin) {
|
|
|
|
return scheme::IsWebUIAllowedToMakeNetworkRequests(origin);
|
|
|
|
}
|
|
|
|
|
2021-05-14 18:58:55 +02:00
|
|
|
void ChromeContentBrowserClientCef::ExposeInterfacesToRenderer(
|
|
|
|
service_manager::BinderRegistry* registry,
|
|
|
|
blink::AssociatedInterfaceRegistry* associated_registry,
|
|
|
|
content::RenderProcessHost* host) {
|
|
|
|
ChromeContentBrowserClient::ExposeInterfacesToRenderer(
|
|
|
|
registry, associated_registry, host);
|
|
|
|
|
|
|
|
CefBrowserManager::ExposeInterfacesToRenderer(registry, associated_registry,
|
|
|
|
host);
|
|
|
|
}
|
|
|
|
|
|
|
|
void ChromeContentBrowserClientCef::RegisterBrowserInterfaceBindersForFrame(
|
|
|
|
content::RenderFrameHost* render_frame_host,
|
|
|
|
mojo::BinderMapWithContext<content::RenderFrameHost*>* map) {
|
|
|
|
ChromeContentBrowserClient::RegisterBrowserInterfaceBindersForFrame(
|
|
|
|
render_frame_host, map);
|
|
|
|
|
|
|
|
CefBrowserFrame::RegisterBrowserInterfaceBindersForFrame(render_frame_host,
|
|
|
|
map);
|
|
|
|
}
|
|
|
|
|
2020-07-04 04:51:17 +02:00
|
|
|
CefRefPtr<CefRequestContextImpl>
|
|
|
|
ChromeContentBrowserClientCef::request_context() const {
|
|
|
|
return browser_main_parts_->request_context();
|
|
|
|
}
|
|
|
|
|
2020-06-25 04:34:12 +02:00
|
|
|
scoped_refptr<base::SingleThreadTaskRunner>
|
|
|
|
ChromeContentBrowserClientCef::background_task_runner() const {
|
|
|
|
return browser_main_parts_->background_task_runner();
|
|
|
|
}
|
|
|
|
|
|
|
|
scoped_refptr<base::SingleThreadTaskRunner>
|
|
|
|
ChromeContentBrowserClientCef::user_visible_task_runner() const {
|
|
|
|
return browser_main_parts_->user_visible_task_runner();
|
|
|
|
}
|
|
|
|
|
|
|
|
scoped_refptr<base::SingleThreadTaskRunner>
|
|
|
|
ChromeContentBrowserClientCef::user_blocking_task_runner() const {
|
|
|
|
return browser_main_parts_->user_blocking_task_runner();
|
|
|
|
}
|