Update to Chromium 116.0.5845.82

This commit is contained in:
Blaise
2023-08-03 10:16:34 -05:00
parent 0473aad2b5
commit 1951a830f7
65 changed files with 1375 additions and 726 deletions

View File

@@ -1 +1 @@
115.0.5790.171
116.0.5845.82

View File

@@ -89,7 +89,6 @@ Chromium contains switches that do no have corresponding entries in `chrome://fl
`--enable-low-end-device-mode` | Force low-end device mode when set.
`--force-dark-mode` | Forces dark mode in UI for platforms that support it.
`--no-pings` | Don't send hyperlink auditing pings.
`--web-ui-dark-mode` | Whether to enable 'dark mode' enhancements for UIs implemented with web technologies.
`--webrtc-ip-handling-policy` | Restrict which IP addresses and interfaces WebRTC uses.
- ### Available only on desktop
<code>Switch&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</code> | Description

File diff suppressed because it is too large Load Diff

View File

@@ -1,6 +1,6 @@
--- a/chrome/browser/BUILD.gn
+++ b/chrome/browser/BUILD.gn
@@ -2247,7 +2247,6 @@ static_library("browser") {
@@ -2262,7 +2262,6 @@ static_library("browser") {
"//components/reporting/util:task_runner_context",
"//components/resources",
"//components/safe_browsing/content/browser",
@@ -8,7 +8,7 @@
"//components/safe_browsing/content/browser:safe_browsing_service",
"//components/safe_browsing/content/browser/password_protection",
"//components/safe_browsing/content/browser/web_ui",
@@ -3625,8 +3624,6 @@ static_library("browser") {
@@ -3617,8 +3616,6 @@ static_library("browser") {
"download/download_commands.h",
"download/download_crx_util.cc",
"download/download_crx_util.h",
@@ -19,7 +19,7 @@
"download/download_dir_util.cc",
--- a/chrome/browser/browser_process.h
+++ b/chrome/browser/browser_process.h
@@ -59,10 +59,6 @@ class NetworkQualityTracker;
@@ -54,10 +54,6 @@ class NetworkQualityTracker;
class SharedURLLoaderFactory;
}
@@ -30,7 +30,7 @@
namespace subresource_filter {
class RulesetService;
}
@@ -226,9 +222,6 @@ class BrowserProcess {
@@ -214,9 +210,6 @@ class BrowserProcess {
// on this platform (or this is a unit test).
virtual StatusTray* status_tray() = 0;
@@ -50,7 +50,7 @@
#include "chrome/browser/screen_ai/screen_ai_downloader.h"
#include "chrome/browser/shell_integration.h"
#include "chrome/browser/site_isolation/prefs_observer.h"
@@ -422,8 +421,6 @@ void BrowserProcessImpl::StartTearDown()
@@ -420,8 +419,6 @@ void BrowserProcessImpl::StartTearDown()
metrics_services_manager_.reset();
intranet_redirect_detector_.reset();
@@ -59,7 +59,7 @@
network_time_tracker_.reset();
#if !BUILDFLAG(IS_ANDROID) && !BUILDFLAG(IS_CHROMEOS_ASH)
@@ -1079,14 +1076,6 @@ StatusTray* BrowserProcessImpl::status_t
@@ -1057,14 +1054,6 @@ StatusTray* BrowserProcessImpl::status_t
return status_tray_.get();
}
@@ -74,7 +74,7 @@
subresource_filter::RulesetService*
BrowserProcessImpl::subresource_filter_ruleset_service() {
DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_);
@@ -1322,26 +1311,6 @@ void BrowserProcessImpl::CreateBackgroun
@@ -1300,26 +1289,6 @@ void BrowserProcessImpl::CreateBackgroun
#endif
}
@@ -103,7 +103,7 @@
created_subresource_filter_ruleset_service_ = true;
--- a/chrome/browser/browser_process_impl.h
+++ b/chrome/browser/browser_process_impl.h
@@ -193,7 +193,6 @@ class BrowserProcessImpl : public Browse
@@ -190,7 +190,6 @@ class BrowserProcessImpl : public Browse
std::unique_ptr<BackgroundModeManager> manager) override;
#endif
StatusTray* status_tray() override;
@@ -111,7 +111,7 @@
subresource_filter::RulesetService* subresource_filter_ruleset_service()
override;
@@ -345,9 +344,6 @@ class BrowserProcessImpl : public Browse
@@ -341,9 +340,6 @@ class BrowserProcessImpl : public Browse
std::unique_ptr<BackgroundModeManager> background_mode_manager_;
#endif
@@ -131,7 +131,7 @@
#include "chrome/browser/safe_browsing/verdict_cache_manager_factory.h"
#include "chrome/browser/search_engines/template_url_service_factory.h"
#include "chrome/browser/share/share_history.h"
@@ -625,10 +624,6 @@ void ChromeBrowsingDataRemoverDelegate::
@@ -612,10 +611,6 @@ void ChromeBrowsingDataRemoverDelegate::
base::RecordAction(UserMetricsAction("ClearBrowsingData_Cookies"));
network::mojom::NetworkContext* safe_browsing_context = nullptr;
@@ -144,7 +144,7 @@
browsing_data::RemoveFederatedSiteSettingsData(delete_begin_, delete_end_,
--- a/chrome/browser/chrome_content_browser_client.cc
+++ b/chrome/browser/chrome_content_browser_client.cc
@@ -1061,34 +1061,6 @@ void SetApplicationLocaleOnIOThread(cons
@@ -1058,34 +1058,6 @@ void SetApplicationLocaleOnIOThread(cons
GetIOThreadApplicationLocale() = locale;
}
@@ -179,7 +179,7 @@
#if BUILDFLAG(ENABLE_EXTENSIONS)
AppLoadedInTabSource ClassifyAppLoadedInTabSource(
@@ -4969,14 +4941,9 @@ ChromeContentBrowserClient::CreateThrott
@@ -5012,14 +4984,9 @@ ChromeContentBrowserClient::CreateThrott
throttles.push_back(std::make_unique<PolicyBlocklistNavigationThrottle>(
handle, handle->GetWebContents()->GetBrowserContext()));
@@ -195,7 +195,7 @@
base::BindOnce(&HandleSSLErrorWrapper), base::BindOnce(&IsInHostedApp),
base::BindOnce(
&ShouldIgnoreSslInterstitialBecauseNavigationDefaultedToHttps)));
@@ -5022,16 +4989,6 @@ ChromeContentBrowserClient::CreateThrott
@@ -5065,16 +5032,6 @@ ChromeContentBrowserClient::CreateThrott
&throttles);
#endif
@@ -212,7 +212,7 @@
if (base::FeatureList::IsEnabled(safe_browsing::kDelayedWarnings)) {
throttles.push_back(
std::make_unique<safe_browsing::DelayedWarningNavigationThrottle>(
@@ -5315,8 +5272,6 @@ void ChromeContentBrowserClient::Overrid
@@ -5358,8 +5315,6 @@ void ChromeContentBrowserClient::Overrid
void ChromeContentBrowserClient::InitOnUIThread() {
DCHECK_CURRENTLY_ON(BrowserThread::UI);
@@ -246,7 +246,7 @@
} // namespace
--- a/chrome/browser/download/chrome_download_manager_delegate.cc
+++ b/chrome/browser/download/chrome_download_manager_delegate.cc
@@ -466,13 +466,6 @@ void ChromeDownloadManagerDelegate::SetD
@@ -470,13 +470,6 @@ void ChromeDownloadManagerDelegate::SetD
download_manager_ = dm;
@@ -260,7 +260,7 @@
if (download_manager_) {
download_manager_->AddObserver(this);
}
@@ -837,17 +830,6 @@ void ChromeDownloadManagerDelegate::Choo
@@ -841,17 +834,6 @@ void ChromeDownloadManagerDelegate::Choo
void ChromeDownloadManagerDelegate::SanitizeSavePackageResourceName(
base::FilePath* filename,
const GURL& source_url) {
@@ -280,7 +280,7 @@
void ChromeDownloadManagerDelegate::SanitizeDownloadParameters(
--- a/chrome/browser/download/download_item_model.cc
+++ b/chrome/browser/download/download_item_model.cc
@@ -111,7 +111,7 @@ class DownloadItemModelData : public bas
@@ -107,7 +107,7 @@ class DownloadItemModelData : public bas
// Danger level of the file determined based on the file type and whether
// there was a user action associated with the download.
@@ -289,7 +289,7 @@
// Whether the download is currently being revived.
bool is_being_revived_;
@@ -161,7 +161,7 @@ DownloadItemModelData* DownloadItemModel
@@ -157,7 +157,7 @@ DownloadItemModelData* DownloadItemModel
DownloadItemModelData::DownloadItemModelData()
: should_show_in_shelf_(true),
was_ui_notified_(false),
@@ -298,7 +298,7 @@
is_being_revived_(false) {}
#if BUILDFLAG(FULL_SAFE_BROWSING)
@@ -544,13 +544,13 @@ void DownloadItemModel::SetShouldPreferO
@@ -541,13 +541,13 @@ void DownloadItemModel::SetShouldPreferO
data->should_prefer_opening_in_browser_ = preference;
}
@@ -315,7 +315,7 @@
DownloadItemModelData* data = DownloadItemModelData::GetOrCreate(download_);
data->danger_level_ = danger_level;
}
@@ -729,9 +729,6 @@ bool DownloadItemModel::IsCommandEnabled
@@ -726,9 +726,6 @@ bool DownloadItemModel::IsCommandEnabled
// filename. Don't base an "Always open" decision based on it. Also
// exclude extensions.
return download_->CanOpenDownload() &&
@@ -412,7 +412,7 @@
#include "chrome/browser/download/download_file_icon_extractor.h"
#include "chrome/browser/download/download_open_prompt.h"
#include "chrome/browser/download/download_prefs.h"
@@ -1361,9 +1360,6 @@ DownloadsAcceptDangerFunction::Downloads
@@ -1363,9 +1362,6 @@ DownloadsAcceptDangerFunction::Downloads
DownloadsAcceptDangerFunction::~DownloadsAcceptDangerFunction() {}
@@ -422,7 +422,7 @@
ExtensionFunction::ResponseAction DownloadsAcceptDangerFunction::Run() {
absl::optional<downloads::AcceptDanger::Params> params =
downloads::AcceptDanger::Params::Create(args());
@@ -1401,42 +1397,7 @@ void DownloadsAcceptDangerFunction::Prom
@@ -1403,42 +1399,7 @@ void DownloadsAcceptDangerFunction::Prom
return;
}
RecordApiFunctions(DOWNLOADS_FUNCTION_ACCEPT_DANGER);
@@ -548,7 +548,7 @@
referrer_entries)));
--- a/chrome/browser/extensions/api/webstore_private/webstore_private_api.cc
+++ b/chrome/browser/extensions/api/webstore_private/webstore_private_api.cc
@@ -720,18 +720,6 @@ void WebstorePrivateBeginInstallWithMani
@@ -726,18 +726,6 @@ void WebstorePrivateBeginInstallWithMani
void WebstorePrivateBeginInstallWithManifest3Function::
ReportFrictionAcceptedEvent() {
@@ -567,7 +567,7 @@
}
void WebstorePrivateBeginInstallWithManifest3Function::OnInstallPromptDone(
@@ -1234,55 +1222,9 @@ WebstorePrivateGetReferrerChainFunction:
@@ -1258,55 +1246,9 @@ WebstorePrivateGetReferrerChainFunction:
ExtensionFunction::ResponseAction
WebstorePrivateGetReferrerChainFunction::Run() {
@@ -756,7 +756,7 @@
sources = [
"chrome_controller_client.cc",
"chrome_controller_client.h",
@@ -96,6 +97,7 @@ static_library("safe_browsing") {
@@ -100,6 +101,7 @@ static_library("safe_browsing") {
"//extensions/browser",
]
}
@@ -764,7 +764,7 @@
if (safe_browsing_mode != 0) {
# "Safe Browsing Basic" files used for safe browsing in full mode
@@ -509,6 +511,7 @@ static_library("advanced_protection") {
@@ -515,6 +517,7 @@ static_library("advanced_protection") {
}
source_set("metrics_collector") {
@@ -772,7 +772,7 @@
sources = [
"safe_browsing_metrics_collector_factory.cc",
"safe_browsing_metrics_collector_factory.h",
@@ -528,6 +531,7 @@ source_set("metrics_collector") {
@@ -534,6 +537,7 @@ source_set("metrics_collector") {
"//components/safe_browsing/core/common:safe_browsing_prefs",
"//content/public/browser",
]
@@ -877,7 +877,7 @@
--- a/chrome/browser/ui/BUILD.gn
+++ b/chrome/browser/ui/BUILD.gn
@@ -4736,7 +4736,6 @@ static_library("ui") {
@@ -4774,7 +4774,6 @@ static_library("ui") {
"views/download/bubble/download_dialog_view.h",
"views/download/bubble/download_toolbar_button_view.cc",
"views/download/bubble/download_toolbar_button_view.h",
@@ -887,7 +887,7 @@
"views/download/download_item_view.cc",
--- a/chrome/browser/ui/tab_helpers.cc
+++ b/chrome/browser/ui/tab_helpers.cc
@@ -420,22 +420,6 @@ void TabHelpers::AttachTabHelpers(WebCon
@@ -425,22 +425,6 @@ void TabHelpers::AttachTabHelpers(WebCon
// See https://crbug.com/910288.
resource_coordinator::ResourceCoordinatorTabHelper::CreateForWebContents(
web_contents);

View File

@@ -36,7 +36,7 @@
{
--- a/chrome/browser/extensions/webstore_installer.cc
+++ b/chrome/browser/extensions/webstore_installer.cc
@@ -536,20 +536,6 @@ void WebstoreInstaller::DownloadNextPend
@@ -520,20 +520,6 @@ void WebstoreInstaller::DownloadNextPend
void WebstoreInstaller::DownloadCrx(
const std::string& extension_id,
InstallSource source) {
@@ -57,7 +57,7 @@
}
// http://crbug.com/165634
@@ -693,25 +679,6 @@ void WebstoreInstaller::UpdateDownloadPr
@@ -677,25 +663,6 @@ void WebstoreInstaller::UpdateDownloadPr
void WebstoreInstaller::StartCrxInstaller(const DownloadItem& download) {
DCHECK_CURRENTLY_ON(BrowserThread::UI);
DCHECK(!crx_installer_.get());

View File

@@ -1,6 +1,6 @@
--- a/net/dns/host_resolver_manager.cc
+++ b/net/dns/host_resolver_manager.cc
@@ -157,10 +157,10 @@ const unsigned kMinimumTTLSeconds = kCac
@@ -158,10 +158,10 @@ const unsigned kMinimumTTLSeconds = kCac
// cached.
const int kIPv6ProbePeriodMs = 1000;

View File

@@ -2,7 +2,7 @@
--- a/BUILD.gn
+++ b/BUILD.gn
@@ -451,14 +451,6 @@ group("gn_all") {
@@ -454,14 +454,6 @@ group("gn_all") {
deps += [ "//chromeos:chromeos_unittests" ]
}

View File

@@ -88,17 +88,6 @@ by default.
// A custom extensions::ExternalLoader that the ServicesCustomizationDocument
// creates and uses to publish OEM default apps to the extensions system.
--- a/chrome/browser/ash/extensions/file_manager/private_api_misc.cc
+++ b/chrome/browser/ash/extensions/file_manager/private_api_misc.cc
@@ -93,7 +93,7 @@ namespace {
using api::file_manager_private::ProfileInfo;
-const char kCWSScope[] = "https://www.googleapis.com/auth/chromewebstore";
+const char kCWSScope[] = "trk:209:https://www.googleapis.com/auth/chromewebstore";
// Thresholds for mountCrostini() API.
constexpr base::TimeDelta kMountCrostiniSlowOperationThreshold =
--- a/chrome/browser/extensions/install_signer.cc
+++ b/chrome/browser/extensions/install_signer.cc
@@ -63,7 +63,7 @@ const int kSignatureFormatVersion = 2;
@@ -123,7 +112,7 @@ by default.
scoped_refptr<base::SequencedTaskRunner> task_runner)
--- a/chrome/browser/media/webrtc/webrtc_log_uploader.cc
+++ b/chrome/browser/media/webrtc/webrtc_log_uploader.cc
@@ -498,7 +498,7 @@ void WebRtcLogUploader::UploadCompressed
@@ -499,7 +499,7 @@ void WebRtcLogUploader::UploadCompressed
}
})");
@@ -465,7 +454,7 @@ by default.
const char kExtensionsMenuUtmSource[] = "ext_extensions_menu";
--- a/google_apis/gaia/gaia_constants.cc
+++ b/google_apis/gaia/gaia_constants.cc
@@ -14,153 +14,153 @@ const char kChromeSource[] = "ChromiumBr
@@ -14,157 +14,157 @@ const char kChromeSource[] = "ChromiumBr
const char kUnexpectedServiceResponse[] = "UnexpectedServiceResponse";
// OAuth scopes.
@@ -606,6 +595,11 @@ by default.
-const char kDriveOAuth2Scope[] = "https://www.googleapis.com/auth/drive";
+const char kDriveOAuth2Scope[] = "trk:097:https://www.googleapis.com/auth/drive";
// OAuth2 scope for access for DriveFS to access flags.
const char kExperimentsAndConfigsOAuth2Scope[] =
- "https://www.googleapis.com/auth/experimentsandconfigs";
+ "trk:209:https://www.googleapis.com/auth/experimentsandconfigs";
// The scope required for an access token in order to query ItemSuggest.
const char kDriveReadOnlyOAuth2Scope[] =
- "https://www.googleapis.com/auth/drive.readonly";

View File

@@ -67,7 +67,7 @@ the URL so we get notified if this happens again in the future).
}
--- a/components/security_interstitials/core/safe_browsing_loud_error_ui.cc
+++ b/components/security_interstitials/core/safe_browsing_loud_error_ui.cc
@@ -25,11 +25,11 @@ namespace {
@@ -26,11 +26,11 @@ namespace {
// For malware interstitial pages, we link the problematic URL to Google's
// diagnostic page.
const char kSbDiagnosticUrl[] =

View File

@@ -13,7 +13,7 @@ This prevents trk:148 (phishing) and trk:149 (malware).
--- a/components/safe_browsing/content/browser/client_side_detection_service.cc
+++ b/components/safe_browsing/content/browser/client_side_detection_service.cc
@@ -238,6 +238,10 @@ void ClientSideDetectionService::StartCl
@@ -248,6 +248,10 @@ void ClientSideDetectionService::StartCl
return;
}
@@ -24,7 +24,7 @@ This prevents trk:148 (phishing) and trk:149 (malware).
std::string request_data;
request->SerializeToString(&request_data);
@@ -324,6 +328,7 @@ void ClientSideDetectionService::StartCl
@@ -334,6 +338,7 @@ void ClientSideDetectionService::StartCl
base::BindOnce(&WebUIInfoSingleton::AddToClientPhishingRequestsSent,
base::Unretained(WebUIInfoSingleton::GetInstance()),
std::move(request), access_token));

View File

@@ -41,7 +41,7 @@
</script>
--- a/chrome/browser/search/background/ntp_background_service.cc
+++ b/chrome/browser/search/background/ntp_background_service.cc
@@ -91,6 +91,7 @@ void NtpBackgroundService::Shutdown() {
@@ -93,6 +93,7 @@ void NtpBackgroundService::Shutdown() {
}
void NtpBackgroundService::FetchCollectionInfo() {

View File

@@ -23,7 +23,7 @@
url.SchemeIs(dom_distiller::kDomDistillerScheme))
--- a/chrome/browser/ui/singleton_tabs.cc
+++ b/chrome/browser/ui/singleton_tabs.cc
@@ -97,7 +97,8 @@ int GetIndexOfExistingTab(Browser* brows
@@ -123,7 +123,8 @@ int GetIndexOfExistingTab(Browser* brows
// RewriteURLIfNecessary removes the "view-source:" scheme which could lead
// to incorrect matching, so ensure that the target and the candidate are
// either both view-source:, or neither is.
@@ -60,7 +60,7 @@
return GURL(parts.scheme.is_valid() ? text : FixupPath(text));
--- a/content/browser/child_process_security_policy_impl.cc
+++ b/content/browser/child_process_security_policy_impl.cc
@@ -781,6 +781,7 @@ ChildProcessSecurityPolicyImpl::ChildPro
@@ -811,6 +811,7 @@ ChildProcessSecurityPolicyImpl::ChildPro
RegisterWebSafeScheme(url::kWssScheme);
#endif // BUILDFLAG(ENABLE_WEBSOCKETS)
RegisterWebSafeScheme(url::kDataScheme);
@@ -70,7 +70,7 @@
// other origins, so we should not treat them as web safe. Remove callers of
--- a/net/BUILD.gn
+++ b/net/BUILD.gn
@@ -1032,6 +1032,8 @@ component("net") {
@@ -1031,6 +1031,8 @@ component("net") {
"url_request/report_sender.h",
"url_request/static_http_user_agent_settings.cc",
"url_request/static_http_user_agent_settings.h",

View File

@@ -2,7 +2,7 @@
--- a/chrome/browser/chrome_content_browser_client.cc
+++ b/chrome/browser/chrome_content_browser_client.cc
@@ -2568,7 +2568,8 @@ void ChromeContentBrowserClient::AppendE
@@ -2572,7 +2572,8 @@ void ChromeContentBrowserClient::AppendE
command_line->AppendSwitchASCII(switches::kMetricsClientID,
client_info->client_id);
}

View File

@@ -10,7 +10,7 @@
std::vector<GURL> endpoints;
endpoints.push_back(gservices_settings_.GetMCSMainEndpoint());
GURL fallback_endpoint = gservices_settings_.GetMCSFallbackEndpoint();
@@ -654,32 +655,6 @@ void GCMClientImpl::RemoveHeartbeatInter
@@ -654,28 +655,6 @@ void GCMClientImpl::RemoveHeartbeatInter
void GCMClientImpl::StartCheckin() {
DCHECK(io_task_runner_->RunsTasksInCurrentSequence());
@@ -23,14 +23,10 @@
- ToCheckinProtoVersion(chrome_build_info_, &chrome_build_proto);
-
- std::map<std::string, std::string> empty_account_tokens;
- bool include_account_tokens = base::FeatureList::IsEnabled(
- features::kGCMIncludeAccountTokensInCheckinRequest);
-
- CheckinRequest::RequestInfo request_info(
- device_checkin_info_.android_id, device_checkin_info_.secret,
- include_account_tokens ? device_checkin_info_.account_tokens
- : empty_account_tokens,
- gservices_settings_.digest(), chrome_build_proto);
- empty_account_tokens, gservices_settings_.digest(), chrome_build_proto);
- checkin_request_ = std::make_unique<CheckinRequest>(
- gservices_settings_.GetCheckinURL(), request_info, GetGCMBackoffPolicy(),
- base::BindOnce(&GCMClientImpl::OnCheckinCompleted,
@@ -43,7 +39,7 @@
}
void GCMClientImpl::OnCheckinCompleted(
@@ -736,24 +711,6 @@ void GCMClientImpl::SetGServicesSettings
@@ -732,24 +711,6 @@ void GCMClientImpl::SetGServicesSettings
void GCMClientImpl::SchedulePeriodicCheckin() {
DCHECK(io_task_runner_->RunsTasksInCurrentSequence());

View File

@@ -5,7 +5,7 @@
--- a/components/network_time/network_time_tracker.cc
+++ b/components/network_time/network_time_tracker.cc
@@ -292,7 +292,7 @@ void NetworkTimeTracker::UpdateNetworkTi
@@ -289,7 +289,7 @@ void NetworkTimeTracker::UpdateNetworkTi
}
bool NetworkTimeTracker::AreTimeFetchesEnabled() const {

View File

@@ -11,7 +11,7 @@
registry->RegisterBooleanPref(prefs::kPrivacySandboxM1ConsentDecisionMade,
--- a/components/privacy_sandbox/privacy_sandbox_settings_impl.cc
+++ b/components/privacy_sandbox/privacy_sandbox_settings_impl.cc
@@ -70,7 +70,7 @@ base::Value::Dict CreateBlockedTopicEntr
@@ -92,7 +92,7 @@ base::Value::Dict CreateBlockedTopicEntr
// static
bool PrivacySandboxSettingsImpl::IsAllowed(Status status) {
@@ -19,8 +19,8 @@
+ return false;
}
PrivacySandboxSettingsImpl::PrivacySandboxSettingsImpl(
@@ -512,20 +512,7 @@ bool PrivacySandboxSettingsImpl::IsPriva
// static
@@ -596,20 +596,7 @@ bool PrivacySandboxSettingsImpl::IsPriva
}
bool PrivacySandboxSettingsImpl::IsPrivacySandboxEnabled() const {
@@ -42,7 +42,7 @@
}
void PrivacySandboxSettingsImpl::SetAllPrivacySandboxAllowedForTesting() {
@@ -550,11 +537,10 @@ void PrivacySandboxSettingsImpl::SetTopi
@@ -634,11 +621,10 @@ void PrivacySandboxSettingsImpl::SetTopi
}
void PrivacySandboxSettingsImpl::SetPrivacySandboxEnabled(bool enabled) {
@@ -55,7 +55,7 @@
}
bool PrivacySandboxSettingsImpl::IsPrivacySandboxCurrentlyUnrestricted() const {
@@ -657,11 +643,7 @@ PrivacySandboxSettingsImpl::GetPrivacySa
@@ -726,11 +712,7 @@ PrivacySandboxSettingsImpl::GetPrivacySa
return Status::kIncognitoProfile;
}
@@ -80,12 +80,12 @@
kPrivacySandboxAggregationServiceTrustedServerUrlAwsParam{
--- a/third_party/blink/common/features.cc
+++ b/third_party/blink/common/features.cc
@@ -137,7 +137,7 @@ BASE_FEATURE(kBlockingDownloadsInAdFrame
@@ -521,7 +521,7 @@ BASE_FEATURE(kContentCaptureConstantStre
// Controls whether the Conversion Measurement API infrastructure is enabled.
BASE_FEATURE(kConversionMeasurement,
"ConversionMeasurement",
- base::FEATURE_ENABLED_BY_DEFAULT);
+ base::FEATURE_DISABLED_BY_DEFAULT);
// Controls whether LCP calculations should exclude low-entropy images. If
// enabled, then the associated parameter sets the cutoff, expressed as the
BASE_FEATURE(kCorrectFloatExtensionTestForWebGL,
"CorrectFloatExtensionTestForWebGL",

View File

@@ -1,37 +0,0 @@
# Disables browser sign-in
--- a/chrome/browser/ui/chrome_pages.cc
+++ b/chrome/browser/ui/chrome_pages.cc
@@ -621,32 +621,6 @@ void ShowShortcutCustomizationApp(Profil
void ShowBrowserSignin(Browser* browser,
signin_metrics::AccessPoint access_point,
signin::ConsentLevel consent_level) {
- Profile* original_profile = browser->profile()->GetOriginalProfile();
- DCHECK(original_profile->GetPrefs()->GetBoolean(prefs::kSigninAllowed));
-
- // If the browser's profile is an incognito profile, make sure to use
- // a browser window from the original profile. The user cannot sign in
- // from an incognito window.
- auto displayer =
- std::make_unique<ScopedTabbedBrowserDisplayer>(original_profile);
- browser = displayer->browser();
-
- profiles::BubbleViewMode bubble_view_mode;
- if (IdentityManagerFactory::GetForProfile(original_profile)
- ->HasPrimaryAccount(signin::ConsentLevel::kSync)) {
- bubble_view_mode = profiles::BUBBLE_VIEW_MODE_GAIA_REAUTH;
- } else {
- switch (consent_level) {
- case signin::ConsentLevel::kSync:
- bubble_view_mode = profiles::BUBBLE_VIEW_MODE_GAIA_SIGNIN;
- break;
- case signin::ConsentLevel::kSignin:
- bubble_view_mode = profiles::BUBBLE_VIEW_MODE_GAIA_ADD_ACCOUNT;
- break;
- }
- }
-
- browser->signin_view_controller()->ShowSignin(bubble_view_mode, access_point);
}
void ShowBrowserSigninOrSettings(Browser* browser,

View File

@@ -0,0 +1,168 @@
--- a/chrome/android/chrome_test_java_sources.gni
+++ b/chrome/android/chrome_test_java_sources.gni
@@ -193,7 +193,6 @@ chrome_test_java_sources = [
"javatests/src/org/chromium/chrome/browser/download/OMADownloadHandlerTest.java",
"javatests/src/org/chromium/chrome/browser/download/ServicificationDownloadTest.java",
"javatests/src/org/chromium/chrome/browser/download/dialogs/DownloadDialogIncognitoTest.java",
- "javatests/src/org/chromium/chrome/browser/environment_integrity/EnvironmentIntegrityTest.java",
"javatests/src/org/chromium/chrome/browser/externalnav/UrlOverridingTest.java",
"javatests/src/org/chromium/chrome/browser/feature_engagement/ScreenshotTabObserverTest.java",
"javatests/src/org/chromium/chrome/browser/feedback/ChromeFeedbackCollectorTest.java",
--- a/content/browser/BUILD.gn
+++ b/content/browser/BUILD.gn
@@ -906,8 +906,6 @@ source_set("browser") {
"download/save_package_serialization_handler.h",
"download/save_types.cc",
"download/save_types.h",
- "environment_integrity/environment_integrity_service_impl.cc",
- "environment_integrity/environment_integrity_service_impl.h",
"eye_dropper_chooser_impl.cc",
"eye_dropper_chooser_impl.h",
"feature_observer.cc",
--- a/content/browser/browser_interface_binders.cc
+++ b/content/browser/browser_interface_binders.cc
@@ -125,7 +125,6 @@
#include "third_party/blink/public/mojom/cookie_store/cookie_store.mojom.h"
#include "third_party/blink/public/mojom/credentialmanagement/credential_manager.mojom.h"
#include "third_party/blink/public/mojom/device/device.mojom.h"
-#include "third_party/blink/public/mojom/environment_integrity/environment_integrity_service.mojom.h"
#include "third_party/blink/public/mojom/feature_observer/feature_observer.mojom.h"
#include "third_party/blink/public/mojom/file/file_utilities.mojom.h"
#include "third_party/blink/public/mojom/file_system_access/file_system_access_manager.mojom.h"
@@ -181,7 +180,6 @@
#if BUILDFLAG(IS_ANDROID)
#include "content/browser/android/date_time_chooser_android.h"
#include "content/browser/android/text_suggestion_host_android.h"
-#include "content/browser/environment_integrity/environment_integrity_service_impl.h"
#include "content/browser/renderer_host/render_widget_host_view_android.h"
#include "services/device/public/mojom/nfc.mojom.h"
#include "third_party/blink/public/mojom/hid/hid.mojom.h"
@@ -1199,17 +1197,9 @@ void PopulateBinderMapWithContext(
base::BindRepeating(&BindDateTimeChooserForFrame));
map->Add<blink::mojom::TextSuggestionHost>(
base::BindRepeating(&BindTextSuggestionHostForFrame));
- if (base::FeatureList::IsEnabled(features::kWebEnvironmentIntegrity)) {
- map->Add<blink::mojom::EnvironmentIntegrityService>(
- base::BindRepeating(&EnvironmentIntegrityServiceImpl::Create));
- }
#else
map->Add<blink::mojom::TextSuggestionHost>(base::BindRepeating(
&EmptyBinderForFrame<blink::mojom::TextSuggestionHost>));
- if (base::FeatureList::IsEnabled(features::kWebEnvironmentIntegrity)) {
- map->Add<blink::mojom::EnvironmentIntegrityService>(base::BindRepeating(
- &EmptyBinderForFrame<blink::mojom::EnvironmentIntegrityService>));
- }
#endif // BUILDFLAG(IS_ANDROID)
map->Add<blink::mojom::ClipboardHost>(
--- a/content/browser/environment_integrity/environment_integrity_service_impl.cc
+++ b/content/browser/environment_integrity/environment_integrity_service_impl.cc
@@ -20,17 +20,10 @@ EnvironmentIntegrityServiceImpl::~Enviro
void EnvironmentIntegrityServiceImpl::Create(
content::RenderFrameHost* render_frame_host,
mojo::PendingReceiver<blink::mojom::EnvironmentIntegrityService> receiver) {
- CHECK(render_frame_host);
-
- // The object is bound to the lifetime of `render_frame_host` and the mojo
- // connection. See DocumentService for details.
- new EnvironmentIntegrityServiceImpl(*render_frame_host, std::move(receiver));
}
void EnvironmentIntegrityServiceImpl::GetEnvironmentIntegrity(
GetEnvironmentIntegrityCallback callback) {
- // TODO(crbug.com/1439945) Get integrity token from PIA Crystal API.
- std::move(callback).Run();
}
} // namespace content
--- a/content/child/runtime_features.cc
+++ b/content/child/runtime_features.cc
@@ -396,8 +396,6 @@ void SetRuntimeFeaturesFromChromiumFeatu
{"WebAppTabStrip", raw_ref(features::kDesktopPWAsTabStrip)},
{"WebAppTabStripCustomizations",
raw_ref(blink::features::kDesktopPWAsTabStripCustomizations)},
- {"WebEnvironmentIntegrity",
- raw_ref(features::kWebEnvironmentIntegrity)},
{"WebSerialBluetooth",
raw_ref(features::kEnableBluetoothSerialPortProfileInSerialApi)},
{"WGIGamepadTriggerRumble",
--- a/content/public/common/content_features.cc
+++ b/content/public/common/content_features.cc
@@ -1433,10 +1433,6 @@ BASE_FEATURE(kWebBluetoothNewPermissions
"WebBluetoothNewPermissionsBackend",
base::FEATURE_DISABLED_BY_DEFAULT);
-// Enables the Web Environment Integrity API.
-BASE_FEATURE(kWebEnvironmentIntegrity,
- "WebEnvironmentIntegrity",
- base::FEATURE_DISABLED_BY_DEFAULT);
// If WebGL Image Chromium is allowed, this feature controls whether it is
// enabled.
--- a/content/public/common/content_features.h
+++ b/content/public/common/content_features.h
@@ -318,7 +318,6 @@ CONTENT_EXPORT BASE_DECLARE_FEATURE(kWeb
CONTENT_EXPORT BASE_DECLARE_FEATURE(kWebAuthnTouchToFillCredentialSelection);
CONTENT_EXPORT BASE_DECLARE_FEATURE(kWebBluetooth);
CONTENT_EXPORT BASE_DECLARE_FEATURE(kWebBluetoothNewPermissionsBackend);
-CONTENT_EXPORT BASE_DECLARE_FEATURE(kWebEnvironmentIntegrity);
CONTENT_EXPORT BASE_DECLARE_FEATURE(kWebGLImageChromium);
CONTENT_EXPORT BASE_DECLARE_FEATURE(kWebMidi);
CONTENT_EXPORT BASE_DECLARE_FEATURE(kWebOtpBackendAuto);
--- a/third_party/blink/public/mojom/BUILD.gn
+++ b/third_party/blink/public/mojom/BUILD.gn
@@ -65,7 +65,6 @@ mojom("mojom_platform") {
"dom_storage/session_storage_namespace.mojom",
"dom_storage/storage_area.mojom",
"drag/drag.mojom",
- "environment_integrity/environment_integrity_service.mojom",
"favicon/favicon_url.mojom",
"feature_observer/feature_observer.mojom",
"fenced_frame/fenced_frame_config.mojom",
--- a/third_party/blink/renderer/bindings/generated_in_modules.gni
+++ b/third_party/blink/renderer/bindings/generated_in_modules.gni
@@ -1883,8 +1883,6 @@ generated_interface_sources_in_modules =
"$root_gen_dir/third_party/blink/renderer/bindings/modules/v8/v8_encoded_audio_chunk.h",
"$root_gen_dir/third_party/blink/renderer/bindings/modules/v8/v8_encoded_video_chunk.cc",
"$root_gen_dir/third_party/blink/renderer/bindings/modules/v8/v8_encoded_video_chunk.h",
- "$root_gen_dir/third_party/blink/renderer/bindings/modules/v8/v8_environment_integrity.cc",
- "$root_gen_dir/third_party/blink/renderer/bindings/modules/v8/v8_environment_integrity.h",
"$root_gen_dir/third_party/blink/renderer/bindings/modules/v8/v8_entry.cc",
"$root_gen_dir/third_party/blink/renderer/bindings/modules/v8/v8_entry.h",
"$root_gen_dir/third_party/blink/renderer/bindings/modules/v8/v8_entry_sync.cc",
--- a/third_party/blink/renderer/bindings/idl_in_modules.gni
+++ b/third_party/blink/renderer/bindings/idl_in_modules.gni
@@ -242,8 +242,6 @@ static_idl_files_in_modules = get_path_i
"//third_party/blink/renderer/modules/encryptedmedia/media_keys_get_status_for_policy.idl",
"//third_party/blink/renderer/modules/encryptedmedia/media_keys_policy.idl",
"//third_party/blink/renderer/modules/encryptedmedia/navigator_request_media_key_system_access.idl",
- "//third_party/blink/renderer/modules/environment_integrity/environment_integrity.idl",
- "//third_party/blink/renderer/modules/environment_integrity/navigator_environment_integrity.idl",
"//third_party/blink/renderer/modules/eventsource/event_source.idl",
"//third_party/blink/renderer/modules/eventsource/event_source_init.idl",
"//third_party/blink/renderer/modules/eyedropper/color_selection_options.idl",
--- a/third_party/blink/renderer/modules/BUILD.gn
+++ b/third_party/blink/renderer/modules/BUILD.gn
@@ -90,7 +90,6 @@ component("modules") {
"//third_party/blink/renderer/modules/donottrack",
"//third_party/blink/renderer/modules/encoding",
"//third_party/blink/renderer/modules/encryptedmedia",
- "//third_party/blink/renderer/modules/environment_integrity",
"//third_party/blink/renderer/modules/eventsource",
"//third_party/blink/renderer/modules/exported",
"//third_party/blink/renderer/modules/eyedropper",
--- a/third_party/blink/renderer/platform/runtime_enabled_features.json5
+++ b/third_party/blink/renderer/platform/runtime_enabled_features.json5
@@ -3918,12 +3918,6 @@
base_feature: "none",
},
{
- name: "WebEnvironmentIntegrity",
- status: "experimental",
- base_feature: "none",
- origin_trial_feature_name: "WebEnvironmentIntegrity",
- },
- {
name: "WebFontResizeLCP",
status: "experimental",
},

View File

@@ -2,7 +2,7 @@
--- a/chrome/browser/media/webrtc/webrtc_log_uploader.cc
+++ b/chrome/browser/media/webrtc/webrtc_log_uploader.cc
@@ -127,30 +127,13 @@ void WebRtcLogUploader::OnLoggingStopped
@@ -128,30 +128,13 @@ void WebRtcLogUploader::OnLoggingStopped
DCHECK(meta_data.get());
DCHECK(!upload_done_data.paths.directory.empty());
@@ -34,7 +34,7 @@
} else {
main_task_runner_->PostTask(
FROM_HERE,
@@ -167,28 +150,7 @@ void WebRtcLogUploader::PrepareMultipart
@@ -168,28 +151,7 @@ void WebRtcLogUploader::PrepareMultipart
DCHECK(!compressed_log.empty());
DCHECK(meta_data.get());
@@ -64,7 +64,7 @@
}
void WebRtcLogUploader::UploadStoredLog(
@@ -254,50 +216,6 @@ void WebRtcLogUploader::LoggingStoppedDo
@@ -255,50 +217,6 @@ void WebRtcLogUploader::LoggingStoppedDo
DCHECK(log_buffer.get());
DCHECK(!log_paths.directory.empty());
@@ -117,7 +117,7 @@
--- a/chrome/browser/ui/browser_ui_prefs.cc
+++ b/chrome/browser/ui/browser_ui_prefs.cc
@@ -96,7 +96,7 @@ void RegisterBrowserUserPrefs(user_prefs
@@ -98,7 +98,7 @@ void RegisterBrowserUserPrefs(user_prefs
registry->RegisterBooleanPref(prefs::kWebRtcEventLogCollectionAllowed, false);
registry->RegisterListPref(prefs::kWebRtcLocalIpsAllowedUrls);
registry->RegisterBooleanPref(prefs::kWebRTCAllowLegacyTLSProtocols, false);

View File

@@ -1,6 +1,6 @@
--- a/chrome/common/chrome_features.cc
+++ b/chrome/common/chrome_features.cc
@@ -352,12 +352,7 @@ BASE_FEATURE(kDisruptiveNotificationPerm
@@ -348,12 +348,7 @@ BASE_FEATURE(kDisruptiveNotificationPerm
// Enable DNS over HTTPS (DoH).
BASE_FEATURE(kDnsOverHttps,
"DnsOverHttps",
@@ -50,7 +50,7 @@
DohProviderIij, base::FEATURE_ENABLED_BY_DEFAULT),
--- a/services/network/public/cpp/features.cc
+++ b/services/network/public/cpp/features.cc
@@ -88,12 +88,7 @@ BASE_FEATURE(kSplitAuthCacheByNetworkIso
@@ -95,12 +95,7 @@ BASE_FEATURE(kSplitAuthCacheByNetworkIso
// Enable usage of hardcoded DoH upgrade mapping for use in automatic mode.
BASE_FEATURE(kDnsOverHttpsUpgrade,
"DnsOverHttpsUpgrade",

View File

@@ -25,7 +25,7 @@
testonly = true
--- a/content/shell/BUILD.gn
+++ b/content/shell/BUILD.gn
@@ -726,10 +726,6 @@ if (is_apple) {
@@ -728,10 +728,6 @@ if (is_apple) {
deps = [ "//third_party/icu:icudata" ]
}

View File

@@ -11,7 +11,7 @@
"component_updater/chrome_component_updater_configurator.cc",
"component_updater/chrome_component_updater_configurator.h",
"component_updater/chrome_origin_trials_component_installer.cc",
@@ -619,8 +617,6 @@ static_library("browser") {
@@ -627,8 +625,6 @@ static_library("browser") {
"internal_auth.h",
"interstitials/chrome_settings_page_helper.cc",
"interstitials/chrome_settings_page_helper.h",
@@ -19,8 +19,8 @@
- "interstitials/enterprise_util.h",
"invalidation/profile_invalidation_provider_factory.cc",
"invalidation/profile_invalidation_provider_factory.h",
"ip_protection/ip_protection_auth_token_getter.cc",
@@ -3651,10 +3647,6 @@ static_library("browser") {
"ip_protection/blind_sign_http_impl.cc",
@@ -3643,10 +3639,6 @@ static_library("browser") {
"enterprise/connectors/analysis/analysis_service_settings.h",
"enterprise/connectors/analysis/analysis_settings.cc",
"enterprise/connectors/analysis/analysis_settings.h",
@@ -31,7 +31,7 @@
"enterprise/connectors/analysis/content_analysis_dialog.cc",
"enterprise/connectors/analysis/content_analysis_dialog.h",
"enterprise/connectors/analysis/content_analysis_downloads_delegate.cc",
@@ -3951,10 +3943,6 @@ static_library("browser") {
@@ -3947,10 +3939,6 @@ static_library("browser") {
"new_tab_page/modules/recipes/recipes_service_factory.h",
"new_tab_page/modules/recipes/time_format_util.cc",
"new_tab_page/modules/recipes/time_format_util.h",
@@ -42,7 +42,7 @@
"new_tab_page/new_tab_page_util.cc",
"new_tab_page/new_tab_page_util.h",
"new_tab_page/one_google_bar/one_google_bar_data.cc",
@@ -4425,7 +4413,6 @@ static_library("browser") {
@@ -4422,7 +4410,6 @@ static_library("browser") {
"//chrome/browser/new_tab_page/modules/history_clusters/cart:mojo_bindings",
"//chrome/browser/new_tab_page/modules/photos:mojo_bindings",
"//chrome/browser/new_tab_page/modules/recipes:mojo_bindings",
@@ -50,7 +50,7 @@
"//chrome/browser/policy:path_parser",
"//chrome/browser/profile_resetter:profile_reset_report_proto",
"//chrome/browser/resource_coordinator:intervention_policy_database_proto",
@@ -6184,10 +6171,6 @@ static_library("browser") {
@@ -6191,10 +6178,6 @@ static_library("browser") {
sources += [
"enterprise/chrome_browser_main_extra_parts_enterprise.cc",
"enterprise/chrome_browser_main_extra_parts_enterprise.h",
@@ -61,7 +61,7 @@
"enterprise/connectors/device_trust/attestation/browser/attestation_switches.cc",
"enterprise/connectors/device_trust/attestation/browser/attestation_switches.h",
"enterprise/connectors/device_trust/attestation/browser/attester.h",
@@ -7704,9 +7687,14 @@ static_library("browser") {
@@ -7726,9 +7709,14 @@ static_library("browser") {
"//components/safe_browsing/content/browser:safe_browsing_blocking_page",
"//components/safe_browsing/content/browser/download:download_stats",
"//components/safe_browsing/content/common:file_type_policies",
@@ -79,7 +79,7 @@
sources += [
--- a/chrome/browser/chrome_content_browser_client.cc
+++ b/chrome/browser/chrome_content_browser_client.cc
@@ -4990,11 +4990,13 @@ ChromeContentBrowserClient::CreateThrott
@@ -5033,11 +5033,13 @@ ChromeContentBrowserClient::CreateThrott
&throttles);
#endif
@@ -93,7 +93,7 @@
#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX)
MaybeAddThrottle(browser_switcher::BrowserSwitcherNavigationThrottle::
@@ -6623,26 +6625,7 @@ ChromeContentBrowserClient::GetSafeBrows
@@ -6755,26 +6757,7 @@ ChromeContentBrowserClient::GetSafeBrows
? content::BrowserThread::UI
: content::BrowserThread::IO);
@@ -121,7 +121,7 @@
}
safe_browsing::RealTimeUrlLookupServiceBase*
@@ -6663,11 +6646,6 @@ ChromeContentBrowserClient::GetUrlLookup
@@ -6795,11 +6778,6 @@ ChromeContentBrowserClient::GetUrlLookup
GetForProfile(profile);
}
#endif
@@ -168,7 +168,7 @@
--- a/chrome/browser/component_updater/registration.cc
+++ b/chrome/browser/component_updater/registration.cc
@@ -214,13 +214,6 @@ void RegisterComponentsForUpdate() {
@@ -211,13 +211,6 @@ void RegisterComponentsForUpdate() {
RegisterAutofillStatesComponent(cus, g_browser_process->local_state());
@@ -180,7 +180,7 @@
- }
-
#if BUILDFLAG(ENABLE_SCREEN_AI_SERVICE) && !BUILDFLAG(IS_CHROMEOS)
RegisterScreenAIComponent(cus, g_browser_process->local_state());
ManageScreenAIComponentRegistration(cus, g_browser_process->local_state());
#endif // BUILDFLAG(ENABLE_SCREEN_AI_SERVICE) && !BUILDFLAG(IS_CHROMEOS)
--- a/chrome/browser/devtools/devtools_window.cc
+++ b/chrome/browser/devtools/devtools_window.cc
@@ -221,7 +221,7 @@
using ConnectionType = net::NetworkChangeNotifier::ConnectionType;
#if BUILDFLAG(FULL_SAFE_BROWSING)
@@ -1502,7 +1501,6 @@ void ChromeDownloadManagerDelegate::OnDo
@@ -1507,7 +1506,6 @@ void ChromeDownloadManagerDelegate::OnDo
DownloadItemModel model(item);
model.DetermineAndSetShouldPreferOpeningInBrowser(
target_info->target_path, target_info->is_filetype_handled_safely);
@@ -229,7 +229,7 @@
}
if (ShouldBlockFile(item, target_info->danger_type)) {
MaybeReportDangerousDownloadBlocked(
@@ -1581,59 +1579,6 @@ bool ChromeDownloadManagerDelegate::IsOp
@@ -1586,59 +1584,6 @@ bool ChromeDownloadManagerDelegate::IsOp
bool ChromeDownloadManagerDelegate::ShouldBlockFile(
download::DownloadItem* item,
download::DownloadDangerType danger_type) const {
@@ -289,7 +289,7 @@
return false;
}
@@ -1648,7 +1593,6 @@ void ChromeDownloadManagerDelegate::Mayb
@@ -1653,7 +1598,6 @@ void ChromeDownloadManagerDelegate::Mayb
service->MaybeSendDangerousDownloadOpenedReport(download,
show_download_in_folder);
}
@@ -297,7 +297,7 @@
if (!download->GetAutoOpened()) {
download::DownloadContent download_content =
download::DownloadContentFromMimeType(download->GetMimeType(), false);
@@ -1656,6 +1600,7 @@ void ChromeDownloadManagerDelegate::Mayb
@@ -1661,6 +1605,7 @@ void ChromeDownloadManagerDelegate::Mayb
download->GetDangerType(), download_content, base::Time::Now(),
download->GetEndTime(), show_download_in_folder);
}
@@ -305,7 +305,7 @@
}
void ChromeDownloadManagerDelegate::CheckDownloadAllowed(
@@ -1713,8 +1658,7 @@ void ChromeDownloadManagerDelegate::Chec
@@ -1718,8 +1663,7 @@ void ChromeDownloadManagerDelegate::Chec
DCHECK(download_item);
DCHECK(download_item->IsSavePackageDownload());
@@ -317,7 +317,7 @@
--- a/chrome/browser/download/download_item_model.cc
+++ b/chrome/browser/download/download_item_model.cc
@@ -939,100 +939,10 @@ void DownloadItemModel::ExecuteCommand(D
@@ -952,106 +952,10 @@ void DownloadItemModel::ExecuteCommand(D
DownloadItemModel::BubbleUIInfo
DownloadItemModel::GetBubbleUIInfoForTailoredWarning() const {
@@ -332,7 +332,9 @@
- return DownloadUIModel::BubbleUIInfo()
- .AddSubpageSummary(l10n_util::GetStringUTF16(
- IDS_DOWNLOAD_BUBBLE_SUBPAGE_SUMMARY_SUSPICIOUS_ARCHIVE))
- .AddIconAndColor(vector_icons::kNotSecureWarningIcon,
- .AddIconAndColor(features::IsChromeRefresh2023()
- ? vector_icons::kNotSecureWarningChromeRefreshIcon
- : vector_icons::kNotSecureWarningIcon,
- ui::kColorAlertMediumSeverityIcon)
- .AddSecondaryTextColor(ui::kColorAlertMediumSeverityText)
- .AddPrimaryButton(DownloadCommands::Command::DISCARD)
@@ -366,7 +368,9 @@
- .AddSubpageSummary(l10n_util::GetStringFUTF16(
- IDS_DOWNLOAD_BUBBLE_SUBPAGE_SUMMARY_COOKIE_THEFT_AND_ACCOUNT,
- base::ASCIIToUTF16(email)))
- .AddIconAndColor(vector_icons::kDangerousIcon,
- .AddIconAndColor(features::IsChromeRefresh2023()
- ? vector_icons::kDangerousChromeRefreshIcon
- : vector_icons::kDangerousIcon,
- ui::kColorAlertHighSeverity)
- .AddPrimaryButton(DownloadCommands::Command::DISCARD)
- .AddPrimarySubpageButton(
@@ -377,7 +381,9 @@
- return DownloadUIModel::BubbleUIInfo()
- .AddSubpageSummary(l10n_util::GetStringUTF16(
- IDS_DOWNLOAD_BUBBLE_SUBPAGE_SUMMARY_COOKIE_THEFT))
- .AddIconAndColor(vector_icons::kDangerousIcon,
- .AddIconAndColor(features::IsChromeRefresh2023()
- ? vector_icons::kDangerousChromeRefreshIcon
- : vector_icons::kDangerousIcon,
- ui::kColorAlertHighSeverity)
- .AddPrimaryButton(DownloadCommands::Command::DISCARD)
- .AddPrimarySubpageButton(
@@ -499,7 +505,7 @@
std::u16string ContentAnalysisDownloadsDelegate::GetBypassJustificationLabel()
--- a/chrome/browser/enterprise/connectors/analysis/files_request_handler.cc
+++ b/chrome/browser/enterprise/connectors/analysis/files_request_handler.cc
@@ -161,49 +161,12 @@ void FilesRequestHandler::FileRequestCal
@@ -165,52 +165,12 @@ void FilesRequestHandler::FileRequestCal
}
bool FilesRequestHandler::UploadDataImpl() {
@@ -515,8 +521,11 @@
- for (size_t i = 0; i < paths_.size(); ++i)
- tasks[i].request = PrepareFileRequest(i);
-
- file_opening_job_ =
- std::make_unique<safe_browsing::FileOpeningJob>(std::move(tasks));
- file_access::RequestFilesAccessForSystem(
- paths_,
- base::BindOnce(&FilesRequestHandler::CreateFileOpeningJob,
- weak_ptr_factory_.GetWeakPtr(), std::move(tasks)));
-
- return true;
- }
-
@@ -549,7 +558,7 @@
void FilesRequestHandler::OnGotFileInfo(
std::unique_ptr<safe_browsing::BinaryUploadService::Request> request,
size_t index,
@@ -239,14 +202,6 @@ void FilesRequestHandler::OnGotFileInfo(
@@ -246,14 +206,6 @@ void FilesRequestHandler::OnGotFileInfo(
void FilesRequestHandler::FinishRequestEarly(
std::unique_ptr<safe_browsing::BinaryUploadService::Request> request,
safe_browsing::BinaryUploadService::Result result) {
@@ -566,7 +575,7 @@
}
--- a/chrome/browser/enterprise/connectors/analysis/files_request_handler.h
+++ b/chrome/browser/enterprise/connectors/analysis/files_request_handler.h
@@ -113,10 +113,6 @@ class FilesRequestHandler : public Reque
@@ -116,10 +116,6 @@ class FilesRequestHandler : public Reque
enterprise_connectors::ContentAnalysisResponse response);
private:
@@ -579,7 +588,7 @@
void OnGotFileInfo(
--- a/chrome/browser/enterprise/connectors/connectors_service.cc
+++ b/chrome/browser/enterprise/connectors/connectors_service.cc
@@ -413,19 +413,6 @@ absl::optional<std::string> ConnectorsSe
@@ -429,19 +429,6 @@ absl::optional<std::string> ConnectorsSe
return absl::nullopt;
}
@@ -661,7 +670,7 @@
signals.Set(device_signals::names::kBuiltInDnsClientEnabled,
--- a/chrome/browser/enterprise/connectors/reporting/realtime_reporting_client.cc
+++ b/chrome/browser/enterprise/connectors/reporting/realtime_reporting_client.cc
@@ -424,7 +424,7 @@ void RealtimeReportingClient::ReportEven
@@ -433,7 +433,7 @@ void RealtimeReportingClient::ReportEven
}
std::string RealtimeReportingClient::GetProfileUserName() const {
@@ -672,7 +681,7 @@
std::string RealtimeReportingClient::GetProfileIdentifier() const {
--- a/chrome/browser/enterprise/connectors/reporting/reporting_service_settings.cc
+++ b/chrome/browser/enterprise/connectors/reporting/reporting_service_settings.cc
@@ -72,16 +72,6 @@ ReportingServiceSettings::ReportingServi
@@ -68,16 +68,6 @@ ReportingServiceSettings::ReportingServi
else
DVLOG(1) << "Enabled event name list contains a non string value!";
}
@@ -819,7 +828,7 @@
"pending_extension_info.cc",
--- a/chrome/browser/extensions/api/api_browser_context_keyed_service_factories.cc
+++ b/chrome/browser/extensions/api/api_browser_context_keyed_service_factories.cc
@@ -97,7 +97,6 @@ void EnsureApiBrowserContextKeyedService
@@ -101,7 +101,6 @@ void EnsureApiBrowserContextKeyedService
#endif // BUILDFLAG(ENABLE_SCREEN_AI_SERVICE)
extensions::PreferenceAPI::GetFactoryInstance();
extensions::ProcessesAPI::GetFactoryInstance();
@@ -924,7 +933,7 @@
void Blocklist::GetMalwareIDs(const std::set<std::string>& ids,
--- a/chrome/browser/extensions/chrome_extensions_browser_client.cc
+++ b/chrome/browser/extensions/chrome_extensions_browser_client.cc
@@ -731,76 +731,23 @@ void ChromeExtensionsBrowserClient::Noti
@@ -730,76 +730,23 @@ void ChromeExtensionsBrowserClient::Noti
content::BrowserContext* context,
const ExtensionId& extension_id,
const std::string& code) const {
@@ -1002,7 +1011,7 @@
}
// static
@@ -979,7 +926,6 @@ ChromeExtensionsBrowserClient::GetWebVie
@@ -968,7 +915,6 @@ void ChromeExtensionsBrowserClient::GetW
void ChromeExtensionsBrowserClient::CreatePasswordReuseDetectionManager(
content::WebContents* web_contents) const {
@@ -1020,7 +1029,7 @@
#include "chrome/browser/extensions/pending_extension_manager.h"
#include "chrome/browser/extensions/permissions_updater.h"
#include "chrome/browser/extensions/profile_util.h"
@@ -204,7 +203,6 @@ void ExtensionService::BlocklistExtensio
@@ -221,7 +220,6 @@ void ExtensionService::BlocklistExtensio
blocklist_prefs::SetSafeBrowsingExtensionBlocklistState(
extension_id, BitMapBlocklistState::BLOCKLISTED_MALWARE,
extension_prefs_);
@@ -1028,7 +1037,7 @@
}
bool ExtensionService::OnExternalExtensionUpdateUrlFound(
@@ -372,9 +370,6 @@ ExtensionService::ExtensionService(
@@ -389,9 +387,6 @@ ExtensionService::ExtensionService(
safe_browsing_verdict_handler_(extension_prefs,
ExtensionRegistry::Get(profile),
this),
@@ -1038,7 +1047,7 @@
registry_(ExtensionRegistry::Get(profile)),
pending_extension_manager_(profile),
install_directory_(install_directory),
@@ -878,100 +873,6 @@ bool ExtensionService::IsExtensionEnable
@@ -915,100 +910,6 @@ bool ExtensionService::IsExtensionEnable
return extension_registrar_.IsExtensionEnabled(extension_id);
}
@@ -1442,7 +1451,7 @@
NotificationHandler::Type::EXTENSION,
--- a/chrome/browser/password_manager/chrome_password_manager_client.cc
+++ b/chrome/browser/password_manager/chrome_password_manager_client.cc
@@ -35,7 +35,6 @@
@@ -36,7 +36,6 @@
#include "chrome/browser/password_manager/password_reuse_manager_factory.h"
#include "chrome/browser/password_manager/password_store_factory.h"
#include "chrome/browser/profiles/profile.h"
@@ -1450,7 +1459,7 @@
#include "chrome/browser/safe_browsing/user_interaction_observer.h"
#include "chrome/browser/signin/identity_manager_factory.h"
#include "chrome/browser/sync/sync_service_factory.h"
@@ -821,6 +820,7 @@ autofill::LanguageCode ChromePasswordMan
@@ -847,6 +846,7 @@ autofill::LanguageCode ChromePasswordMan
return autofill::LanguageCode();
}
@@ -1458,7 +1467,7 @@
safe_browsing::PasswordProtectionService*
ChromePasswordManagerClient::GetPasswordProtectionService() const {
return safe_browsing::ChromePasswordProtectionService::
@@ -840,6 +840,7 @@ void ChromePasswordManagerClient::CheckS
@@ -866,6 +866,7 @@ void ChromePasswordManagerClient::CheckS
}
}
#endif // defined(ON_FOCUS_PING_ENABLED)
@@ -1466,7 +1475,7 @@
#if !BUILDFLAG(IS_ANDROID)
void ChromePasswordManagerClient::MaybeReportEnterpriseLoginEvent(
@@ -847,28 +848,10 @@ void ChromePasswordManagerClient::MaybeR
@@ -873,28 +874,10 @@ void ChromePasswordManagerClient::MaybeR
bool is_federated,
const url::Origin& federated_origin,
const std::u16string& login_user_name) const {
@@ -1495,7 +1504,7 @@
}
#endif
@@ -1384,6 +1367,7 @@ bool ChromePasswordManagerClient::IsPass
@@ -1435,6 +1418,7 @@ bool ChromePasswordManagerClient::IsPass
is_enabled = false;
}
@@ -1503,7 +1512,7 @@
// SafeBrowsing Delayed Warnings experiment can delay some SafeBrowsing
// warnings until user interaction. If the current page has a delayed warning,
// it'll have a user interaction observer attached. Disable password
@@ -1394,6 +1378,7 @@ bool ChromePasswordManagerClient::IsPass
@@ -1445,6 +1429,7 @@ bool ChromePasswordManagerClient::IsPass
observer->OnPasswordSaveOrAutofillDenied();
is_enabled = false;
}
@@ -1513,7 +1522,7 @@
password_manager::BrowserSavePasswordProgressLogger logger(
--- a/chrome/browser/password_manager/chrome_password_manager_client.h
+++ b/chrome/browser/password_manager/chrome_password_manager_client.h
@@ -224,6 +224,7 @@ class ChromePasswordManagerClient
@@ -229,6 +229,7 @@ class ChromePasswordManagerClient
void AnnotateNavigationEntry(bool has_password_field) override;
autofill::LanguageCode GetPageLanguage() const override;
@@ -1521,7 +1530,7 @@
safe_browsing::PasswordProtectionService* GetPasswordProtectionService()
const override;
@@ -231,6 +232,7 @@ class ChromePasswordManagerClient
@@ -236,6 +237,7 @@ class ChromePasswordManagerClient
void CheckSafeBrowsingReputation(const GURL& form_action,
const GURL& frame_url) override;
#endif
@@ -1645,7 +1654,7 @@
--- a/chrome/browser/permissions/prediction_based_permission_ui_selector.cc
+++ b/chrome/browser/permissions/prediction_based_permission_ui_selector.cc
@@ -341,52 +341,5 @@ bool PredictionBasedPermissionUiSelector
@@ -332,52 +332,5 @@ bool PredictionBasedPermissionUiSelector
PredictionSource PredictionBasedPermissionUiSelector::GetPredictionTypeToUse(
permissions::RequestType request_type) {
@@ -1700,7 +1709,7 @@
}
--- a/chrome/browser/policy/configuration_policy_handler_list_factory.cc
+++ b/chrome/browser/policy/configuration_policy_handler_list_factory.cc
@@ -96,6 +96,7 @@
@@ -97,6 +97,7 @@
#include "components/policy/policy_constants.h"
#include "components/privacy_sandbox/privacy_sandbox_prefs.h"
#include "components/proxy_config/proxy_policy_handler.h"
@@ -1708,7 +1717,7 @@
#include "components/safe_browsing/content/common/file_type_policies_prefs.h"
#include "components/safe_browsing/core/common/safe_browsing_policy_handler.h"
#include "components/safe_browsing/core/common/safe_browsing_prefs.h"
@@ -1970,8 +1971,6 @@ std::unique_ptr<ConfigurationPolicyHandl
@@ -1994,8 +1995,6 @@ std::unique_ptr<ConfigurationPolicyHandl
handlers->AddHandler(
std::make_unique<bookmarks::ManagedBookmarksPolicyHandler>(
chrome_schema));
@@ -1717,7 +1726,7 @@
handlers->AddHandler(std::make_unique<syncer::SyncPolicyHandler>());
handlers->AddHandler(
std::make_unique<URLBlocklistPolicyHandler>(key::kURLBlocklist));
@@ -2045,13 +2044,6 @@ std::unique_ptr<ConfigurationPolicyHandl
@@ -2078,13 +2077,6 @@ std::unique_ptr<ConfigurationPolicyHandl
prefs::kSafeBrowsingEnterpriseRealTimeUrlCheckMode,
prefs::kSafeBrowsingEnterpriseRealTimeUrlCheckScope, chrome_schema));
@@ -1733,7 +1742,7 @@
--- a/chrome/browser/prefs/browser_prefs.cc
+++ b/chrome/browser/prefs/browser_prefs.cc
@@ -266,7 +266,6 @@
@@ -263,7 +263,6 @@
#include "chrome/browser/new_tab_page/modules/drive/drive_service.h"
#include "chrome/browser/new_tab_page/modules/photos/photos_service.h"
#include "chrome/browser/new_tab_page/modules/recipes/recipes_service.h"
@@ -1741,7 +1750,7 @@
#include "chrome/browser/new_tab_page/promos/promo_service.h"
#include "chrome/browser/policy/developer_tools_policy_handler.h"
#include "chrome/browser/search/background/ntp_custom_background_service.h"
@@ -1620,7 +1619,6 @@ void RegisterProfilePrefs(user_prefs::Pr
@@ -1720,7 +1719,6 @@ void RegisterProfilePrefs(user_prefs::Pr
NewTabPageHandler::RegisterProfilePrefs(registry);
NewTabPageUI::RegisterProfilePrefs(registry);
NewTabUI::RegisterProfilePrefs(registry);
@@ -1751,7 +1760,7 @@
PinnedTabCodec::RegisterProfilePrefs(registry);
--- a/chrome/browser/profiles/chrome_browser_main_extra_parts_profiles.cc
+++ b/chrome/browser/profiles/chrome_browser_main_extra_parts_profiles.cc
@@ -626,9 +626,6 @@ void ChromeBrowserMainExtraPartsProfiles
@@ -654,9 +654,6 @@ void ChromeBrowserMainExtraPartsProfiles
enterprise_connectors::DeviceTrustServiceFactory::GetInstance();
enterprise_connectors::DeviceTrustConnectorServiceFactory::GetInstance();
#endif
@@ -1761,7 +1770,7 @@
#if BUILDFLAG(ENABLE_SESSION_SERVICE)
ExitTypeServiceFactory::GetInstance();
#endif
@@ -909,7 +906,6 @@ void ChromeBrowserMainExtraPartsProfiles
@@ -954,7 +951,6 @@ void ChromeBrowserMainExtraPartsProfiles
safe_browsing::CloudBinaryUploadServiceFactory::GetInstance();
safe_browsing::ExtensionTelemetryServiceFactory::GetInstance();
safe_browsing::HashRealTimeServiceFactory::GetInstance();
@@ -1769,7 +1778,7 @@
safe_browsing::ChromePasswordProtectionServiceFactory::GetInstance();
safe_browsing::ChromePingManagerFactory::GetInstance();
safe_browsing::ClientSideDetectionServiceFactory::GetInstance();
@@ -917,6 +913,7 @@ void ChromeBrowserMainExtraPartsProfiles
@@ -962,6 +958,7 @@ void ChromeBrowserMainExtraPartsProfiles
safe_browsing::SafeBrowsingMetricsCollectorFactory::GetInstance();
safe_browsing::SafeBrowsingNavigationObserverManagerFactory::GetInstance();
safe_browsing::VerdictCacheManagerFactory::GetInstance();
@@ -1777,7 +1786,7 @@
#if BUILDFLAG(ENABLE_SCREEN_AI_SERVICE)
screen_ai::AXScreenAIAnnotatorFactory::EnsureFactoryBuilt();
screen_ai::PdfOcrControllerFactory::GetInstance();
@@ -970,7 +967,6 @@ void ChromeBrowserMainExtraPartsProfiles
@@ -1020,7 +1017,6 @@ void ChromeBrowserMainExtraPartsProfiles
}
#endif
TabRestoreServiceFactory::GetInstance();
@@ -1787,7 +1796,7 @@
#if !BUILDFLAG(IS_ANDROID)
--- a/chrome/browser/resources/settings/lazy_load.ts
+++ b/chrome/browser/resources/settings/lazy_load.ts
@@ -192,7 +192,6 @@ export {SettingsPrivacyGuideDialogElemen
@@ -193,7 +193,6 @@ export {SettingsPrivacyGuideDialogElemen
export {PrivacyGuideHistorySyncFragmentElement} from './privacy_page/privacy_guide/privacy_guide_history_sync_fragment.js';
export {PrivacyGuideMsbbFragmentElement} from './privacy_page/privacy_guide/privacy_guide_msbb_fragment.js';
export {SettingsPrivacyGuidePageElement} from './privacy_page/privacy_guide/privacy_guide_page.js';
@@ -1859,7 +1868,7 @@
} // namespace safe_browsing
--- a/chrome/browser/safe_browsing/url_lookup_service_factory.cc
+++ b/chrome/browser/safe_browsing/url_lookup_service_factory.cc
@@ -63,30 +63,7 @@ RealTimeUrlLookupServiceFactory::RealTim
@@ -64,30 +64,7 @@ RealTimeUrlLookupServiceFactory::RealTim
KeyedService* RealTimeUrlLookupServiceFactory::BuildServiceInstanceFor(
content::BrowserContext* context) const {
@@ -1944,7 +1953,7 @@
/*can_show_enhanced_protection_message=*/true, ssl_info,
--- a/chrome/browser/ssl/sct_reporting_service_factory.cc
+++ b/chrome/browser/ssl/sct_reporting_service_factory.cc
@@ -36,15 +36,7 @@ SCTReportingServiceFactory::~SCTReportin
@@ -37,15 +37,7 @@ SCTReportingServiceFactory::~SCTReportin
KeyedService* SCTReportingServiceFactory::BuildServiceInstanceFor(
content::BrowserContext* profile) const {
@@ -1996,7 +2005,7 @@
} // namespace
--- a/chrome/browser/ui/BUILD.gn
+++ b/chrome/browser/ui/BUILD.gn
@@ -663,7 +663,6 @@ static_library("ui") {
@@ -665,7 +665,6 @@ static_library("ui") {
"//components/renderer_context_menu",
"//components/resources",
"//components/safe_browsing/content/browser",
@@ -2004,7 +2013,7 @@
"//components/safe_browsing/content/browser/password_protection",
"//components/safe_browsing/content/browser/web_ui",
"//components/safe_browsing/core/browser/db:database_manager",
@@ -3751,8 +3750,6 @@ static_library("ui") {
@@ -3777,8 +3776,6 @@ static_library("ui") {
"startup/web_app_startup_utils.h",
"tab_contents/chrome_web_contents_menu_helper.cc",
"tab_contents/chrome_web_contents_menu_helper.h",
@@ -2013,7 +2022,7 @@
"views/autofill/payments/virtual_card_selection_dialog_view.cc",
"views/autofill/payments/virtual_card_selection_dialog_view.h",
"views/autofill/payments/webauthn_dialog_view.cc",
@@ -5228,8 +5225,6 @@ static_library("ui") {
@@ -5268,8 +5265,6 @@ static_library("ui") {
"views/safe_browsing/prompt_for_scanning_modal_dialog.h",
"views/safe_browsing/tailored_security_desktop_dialog_manager.cc",
"views/safe_browsing/tailored_security_desktop_dialog_manager.h",
@@ -2050,7 +2059,7 @@
void JavaScriptTabModalDialogManagerDelegateDesktop::DidCloseDialog() {
--- a/chrome/browser/ui/tab_helpers.cc
+++ b/chrome/browser/ui/tab_helpers.cc
@@ -336,7 +336,6 @@ void TabHelpers::AttachTabHelpers(WebCon
@@ -342,7 +342,6 @@ void TabHelpers::AttachTabHelpers(WebCon
ChromePasswordManagerClient::CreateForWebContentsWithAutofillClient(
web_contents,
autofill::ContentAutofillClient::FromWebContents(web_contents));
@@ -2095,7 +2104,7 @@
open_button_->SetEnabled((mode_ == download::DownloadItemMode::kNormal) ||
prompt_to_scan || allow_open_during_deep_scan);
@@ -1273,7 +1274,9 @@ void DownloadItemView::ShowContextMenuIm
@@ -1274,7 +1275,9 @@ void DownloadItemView::ShowContextMenuIm
}
void DownloadItemView::OpenDownloadDuringAsyncScanning() {
@@ -2204,7 +2213,7 @@
// DownloadsDOMHandler, private: --------------------------------------------
--- a/chrome/browser/ui/webui/management/management_ui_handler.cc
+++ b/chrome/browser/ui/webui/management/management_ui_handler.cc
@@ -967,12 +967,6 @@ base::Value::Dict ManagementUIHandler::G
@@ -1009,12 +1009,6 @@ base::Value::Dict ManagementUIHandler::G
&info);
}
@@ -2261,7 +2270,7 @@
std::move(callback),
--- a/chrome/test/BUILD.gn
+++ b/chrome/test/BUILD.gn
@@ -1585,7 +1585,6 @@ if (!is_android) {
@@ -1544,7 +1544,6 @@ if (!is_android) {
"//components/resources",
"//components/safe_browsing:buildflags",
"//components/safe_browsing/content/browser",
@@ -2269,7 +2278,7 @@
"//components/safe_browsing/content/browser:safe_browsing_service",
"//components/safe_browsing/content/browser/password_protection",
"//components/safe_browsing/content/browser/password_protection:test_support",
@@ -6359,7 +6358,6 @@ test("unit_tests") {
@@ -6367,7 +6366,6 @@ test("unit_tests") {
"//components/resources",
"//components/safe_browsing:buildflags",
"//components/safe_browsing/content/browser",
@@ -2279,7 +2288,7 @@
"//components/safe_browsing/content/browser/web_ui",
--- a/components/password_manager/content/browser/content_password_manager_driver.cc
+++ b/components/password_manager/content/browser/content_password_manager_driver.cc
@@ -479,7 +479,7 @@ void ContentPasswordManagerDriver::Check
@@ -473,7 +473,7 @@ void ContentPasswordManagerDriver::Check
if (!password_manager::bad_message::CheckFrameNotPrerendering(
render_frame_host_))
return;
@@ -2290,7 +2299,7 @@
}
--- a/components/password_manager/core/browser/password_manager_client.h
+++ b/components/password_manager/core/browser/password_manager_client.h
@@ -388,11 +388,14 @@ class PasswordManagerClient {
@@ -392,11 +392,14 @@ class PasswordManagerClient {
// Returns the current best guess as to the page's display language.
virtual autofill::LanguageCode GetPageLanguage() const;
@@ -2325,7 +2334,7 @@
+# }
--- a/components/safe_browsing/content/common/safe_browsing.mojom
+++ b/components/safe_browsing/content/common/safe_browsing.mojom
@@ -138,7 +138,6 @@ interface PhishingDetector {
@@ -133,7 +133,6 @@ interface PhishingDetector {
=> (PhishingDetectorResult result, string request_proto);
};
@@ -2366,49 +2375,35 @@
#include "base/memory/raw_ptr.h"
--- a/components/safe_browsing/core/browser/hashprefix_realtime/ohttp_key_service.cc
+++ b/components/safe_browsing/core/browser/hashprefix_realtime/ohttp_key_service.cc
@@ -10,7 +10,6 @@
#include "components/prefs/pref_service.h"
@@ -12,7 +12,6 @@
#include "components/safe_browsing/core/browser/hashprefix_realtime/hash_realtime_utils.h"
#include "components/safe_browsing/core/browser/utils/backoff_operator.h"
#include "components/safe_browsing/core/common/features.h"
-#include "components/safe_browsing/core/common/safe_browsing_prefs.h"
#include "components/safe_browsing/core/common/utils.h"
#include "google_apis/google_api_keys.h"
#include "net/base/net_errors.h"
#include "net/http/http_request_headers.h"
@@ -102,17 +101,7 @@ constexpr net::NetworkTrafficAnnotationT
@@ -111,18 +110,7 @@ constexpr net::NetworkTrafficAnnotationT
)");
bool IsEnabled(const PrefService& pref_service) {
bool IsEnabled(PrefService* pref_service) {
- safe_browsing::SafeBrowsingState state =
- safe_browsing::GetSafeBrowsingState(pref_service);
- return (state == safe_browsing::SafeBrowsingState::STANDARD_PROTECTION &&
- !base::FeatureList::IsEnabled(
- safe_browsing::kSafeBrowsingLookupMechanismExperiment)) ||
- // The service is enabled when enhanced protection and lookup mechanism
- // experiment are both enabled, because Chrome needs to send HPRT
- // requests to conduct the experiment.
- safe_browsing::GetSafeBrowsingState(*pref_service);
- return safe_browsing::hash_realtime_utils::DetermineHashRealTimeSelection(
- /*is_off_the_record=*/false, pref_service) ==
- safe_browsing::hash_realtime_utils::HashRealTimeSelection::
- kHashRealTimeService ||
- // The service is enabled when enhanced protection and
- // kHashRealTimeOverOhttp are both enabled, because when this is true,
- // Chrome needs to send HPRT requests over OHTTP when conducting the
- // lookup mechanism experiment.
- (state == safe_browsing::SafeBrowsingState::ENHANCED_PROTECTION &&
- base::FeatureList::IsEnabled(
- safe_browsing::kSafeBrowsingLookupMechanismExperiment));
- base::FeatureList::IsEnabled(safe_browsing::kHashRealTimeOverOhttp));
+ return false;
}
} // namespace
@@ -138,14 +127,6 @@ OhttpKeyService::OhttpKeyService(
PopulateKeyFromPref();
pref_change_registrar_.Init(pref_service_);
- pref_change_registrar_.Add(
- prefs::kSafeBrowsingEnabled,
- base::BindRepeating(&OhttpKeyService::OnSafeBrowsingStateChanged,
- weak_factory_.GetWeakPtr()));
- pref_change_registrar_.Add(
- prefs::kSafeBrowsingEnhanced,
- base::BindRepeating(&OhttpKeyService::OnSafeBrowsingStateChanged,
- weak_factory_.GetWeakPtr()));
SetEnabled(IsEnabled(*pref_service_));
}
@@ -346,26 +327,9 @@ void OhttpKeyService::MaybeStartServerTr
GURL GetKeyFetchingUrl() {
@@ -363,26 +351,9 @@ void OhttpKeyService::MaybeStartServerTr
}
void OhttpKeyService::PopulateKeyFromPref() {
@@ -2637,7 +2632,7 @@
declare_args() {
--- a/weblayer/BUILD.gn
+++ b/weblayer/BUILD.gn
@@ -472,7 +472,6 @@ source_set("weblayer_lib_base") {
@@ -473,7 +473,6 @@ source_set("weblayer_lib_base") {
"//components/profile_metrics",
"//components/reduce_accept_language/browser",
"//components/safe_browsing/content/browser",

View File

@@ -1,7 +1,7 @@
# Disables translation and removes the "Translate to" context menu when --translate-script-url flag is not set
--- a/chrome/browser/renderer_context_menu/render_view_context_menu.cc
+++ b/chrome/browser/renderer_context_menu/render_view_context_menu.cc
@@ -153,6 +153,7 @@
@@ -154,6 +154,7 @@
#include "components/spellcheck/spellcheck_buildflags.h"
#include "components/strings/grit/components_strings.h"
#include "components/supervised_user/core/common/buildflags.h"
@@ -9,7 +9,7 @@
#include "components/translate/core/browser/translate_download_manager.h"
#include "components/translate/core/browser/translate_manager.h"
#include "components/translate/core/browser/translate_prefs.h"
@@ -1955,6 +1956,7 @@ void RenderViewContextMenu::AppendPageIt
@@ -1990,6 +1991,7 @@ void RenderViewContextMenu::AppendPageIt
menu_model_.AddSeparator(ui::NORMAL_SEPARATOR);
if (CanTranslate(/*menu_logging=*/true)) {
@@ -27,7 +27,7 @@
#include "base/debug/dump_without_crashing.h"
#include "base/functional/bind.h"
#include "base/json/json_reader.h"
@@ -23,6 +24,7 @@
@@ -24,6 +25,7 @@
#include "components/translate/core/browser/translate_event_details.h"
#include "components/translate/core/browser/translate_url_fetcher.h"
#include "components/translate/core/browser/translate_url_util.h"
@@ -35,7 +35,7 @@
#include "components/translate/core/common/translate_util.h"
#include "net/base/url_util.h"
#include "third_party/abseil-cpp/absl/types/optional.h"
@@ -229,6 +231,9 @@ GURL TranslateLanguageList::TranslateLan
@@ -242,6 +244,9 @@ GURL TranslateLanguageList::TranslateLan
}
void TranslateLanguageList::RequestLanguageList() {

View File

@@ -9,7 +9,7 @@
--- a/chrome/browser/BUILD.gn
+++ b/chrome/browser/BUILD.gn
@@ -2433,6 +2433,7 @@ static_library("browser") {
@@ -2446,6 +2446,7 @@ static_library("browser") {
"//third_party/libyuv",
"//third_party/metrics_proto",
"//third_party/re2",
@@ -19,7 +19,7 @@
"//third_party/widevine/cdm:headers",
--- a/chrome/browser/about_flags.cc
+++ b/chrome/browser/about_flags.cc
@@ -158,6 +158,7 @@
@@ -160,6 +160,7 @@
#include "components/translate/core/browser/translate_ranker_impl.h"
#include "components/translate/core/common/translate_util.h"
#include "components/ui_devtools/switches.h"
@@ -44,7 +44,7 @@
#endif // CHROME_BROWSER_BROMITE_FLAG_ENTRIES_H_
--- a/content/browser/BUILD.gn
+++ b/content/browser/BUILD.gn
@@ -250,6 +250,7 @@ source_set("browser") {
@@ -249,6 +249,7 @@ source_set("browser") {
"//third_party/libyuv",
"//third_party/re2",
"//third_party/sqlite",
@@ -54,7 +54,7 @@
"//third_party/zlib/google:zip",
--- a/content/browser/renderer_host/render_process_host_impl.cc
+++ b/content/browser/renderer_host/render_process_host_impl.cc
@@ -76,6 +76,7 @@
@@ -77,6 +77,7 @@
#include "components/services/storage/public/cpp/quota_error_or.h"
#include "components/services/storage/public/mojom/cache_storage_control.mojom.h"
#include "components/tracing/common/tracing_switches.h"
@@ -62,7 +62,7 @@
#include "components/viz/common/switches.h"
#include "components/viz/host/gpu_client.h"
#include "content/browser/attribution_reporting/attribution_manager.h"
@@ -3491,6 +3492,8 @@ void RenderProcessHostImpl::PropagateBro
@@ -3585,6 +3586,8 @@ void RenderProcessHostImpl::PropagateBro
switches::kEnableWebGLImageChromium,
switches::kEnableWebGPUDeveloperFeatures,
switches::kFileUrlPathAlias,
@@ -73,7 +73,7 @@
switches::kForceGpuMemAvailableMb,
--- a/content/child/BUILD.gn
+++ b/content/child/BUILD.gn
@@ -103,6 +103,7 @@ target(link_target_type, "child") {
@@ -102,6 +102,7 @@ target(link_target_type, "child") {
"//third_party/blink/public/common",
"//third_party/blink/public/strings",
"//third_party/ced",
@@ -91,7 +91,7 @@
#include "ui/accessibility/accessibility_features.h"
#include "ui/base/ui_base_features.h"
#include "ui/events/blink/blink_features.h"
@@ -453,6 +454,10 @@ void SetRuntimeFeaturesFromCommandLine(c
@@ -471,6 +472,10 @@ void SetRuntimeFeaturesFromCommandLine(c
switches::kEnableWebGPUDeveloperFeatures, true},
{wrf::EnableDirectSockets, switches::kEnableIsolatedWebAppsInRenderer,
true},
@@ -124,7 +124,7 @@
#include "base/ranges/algorithm.h"
#include "base/task/single_thread_task_runner.h"
#include "base/time/time.h"
@@ -939,6 +940,14 @@ Range* Document::CreateRangeAdjustedToTr
@@ -941,6 +942,14 @@ Range* Document::CreateRangeAdjustedToTr
Position::BeforeNode(*shadow_host));
}
@@ -139,7 +139,7 @@
SelectorQueryCache& Document::GetSelectorQueryCache() {
if (!selector_query_cache_)
selector_query_cache_ = std::make_unique<SelectorQueryCache>();
@@ -2281,6 +2290,15 @@ void Document::UpdateStyleAndLayoutTreeF
@@ -2289,6 +2298,15 @@ void Document::UpdateStyleAndLayoutTreeF
#if DCHECK_IS_ON()
AssertLayoutTreeUpdated(*this, true /* allow_dirty_container_subtrees */);
#endif
@@ -157,7 +157,7 @@
void Document::InvalidateStyleAndLayoutForFontUpdates() {
--- a/third_party/blink/renderer/core/dom/document.h
+++ b/third_party/blink/renderer/core/dom/document.h
@@ -528,6 +528,10 @@ class CORE_EXPORT Document : public Cont
@@ -532,6 +532,10 @@ class CORE_EXPORT Document : public Cont
has_xml_declaration_ = has_xml_declaration ? 1 : 0;
}
@@ -168,7 +168,7 @@
AtomicString visibilityState() const;
bool IsPageVisible() const;
bool hidden() const;
@@ -2414,6 +2418,9 @@ class CORE_EXPORT Document : public Cont
@@ -2429,6 +2433,9 @@ class CORE_EXPORT Document : public Cont
base::ElapsedTimer start_time_;
@@ -180,7 +180,7 @@
--- a/third_party/blink/renderer/core/dom/element.cc
+++ b/third_party/blink/renderer/core/dom/element.cc
@@ -2096,6 +2096,11 @@ DOMRectList* Element::getClientRects() {
@@ -2116,6 +2116,11 @@ DOMRectList* Element::getClientRects() {
DCHECK(element_layout_object);
GetDocument().AdjustQuadsForScrollAndAbsoluteZoom(quads,
*element_layout_object);
@@ -192,7 +192,7 @@
return MakeGarbageCollected<DOMRectList>(quads);
}
@@ -2123,6 +2128,9 @@ gfx::RectF Element::GetBoundingClientRec
@@ -2143,6 +2148,9 @@ gfx::RectF Element::GetBoundingClientRec
DCHECK(element_layout_object);
GetDocument().AdjustRectForScrollAndAbsoluteZoom(result,
*element_layout_object);
@@ -286,9 +286,9 @@
void CanvasRenderingContext2D::drawFormattedText(
--- a/third_party/blink/renderer/platform/BUILD.gn
+++ b/third_party/blink/renderer/platform/BUILD.gn
@@ -1695,6 +1695,7 @@ component("platform") {
@@ -1700,6 +1700,7 @@ component("platform") {
"//cc/mojo_embedder",
"//components/paint_preview/common",
"//components/power_scheduler",
"//components/search_engines:search_engine_utils",
+ "//components/ungoogled:ungoogled_switches",
"//components/viz/client",
@@ -311,7 +311,7 @@
} // namespace blink
--- a/third_party/blink/renderer/platform/runtime_enabled_features.json5
+++ b/third_party/blink/renderer/platform/runtime_enabled_features.json5
@@ -1764,6 +1764,12 @@
@@ -1787,6 +1787,12 @@
origin_trial_feature_name: "Focusgroup",
},
{

View File

@@ -34,7 +34,7 @@ approach to change color components.
#endif // CHROME_BROWSER_BROMITE_FLAG_ENTRIES_H_
--- a/content/browser/renderer_host/render_process_host_impl.cc
+++ b/content/browser/renderer_host/render_process_host_impl.cc
@@ -3494,6 +3494,7 @@ void RenderProcessHostImpl::PropagateBro
@@ -3588,6 +3588,7 @@ void RenderProcessHostImpl::PropagateBro
switches::kFileUrlPathAlias,
switches::kFingerprintingClientRectsNoise,
switches::kFingerprintingCanvasMeasureTextNoise,
@@ -44,7 +44,7 @@ approach to change color components.
switches::kForceGpuMemAvailableMb,
--- a/content/child/runtime_features.cc
+++ b/content/child/runtime_features.cc
@@ -458,6 +458,8 @@ void SetRuntimeFeaturesFromCommandLine(c
@@ -476,6 +476,8 @@ void SetRuntimeFeaturesFromCommandLine(c
switches::kFingerprintingClientRectsNoise, true},
{wrf::EnableFingerprintingCanvasMeasureTextNoise,
switches::kFingerprintingCanvasMeasureTextNoise, true},
@@ -73,7 +73,7 @@ approach to change color components.
#include "third_party/blink/renderer/platform/graphics/stroke_data.h"
#include "third_party/blink/renderer/platform/graphics/video_frame_image_util.h"
#include "third_party/blink/renderer/platform/heap/garbage_collected.h"
@@ -2145,6 +2146,9 @@ ImageData* BaseRenderingContext2D::getIm
@@ -2184,6 +2185,9 @@ ImageData* BaseRenderingContext2D::getIm
snapshot->PaintImageForCurrentFrame().GetSkImageInfo().bounds();
DCHECK(!bounds.intersect(SkIRect::MakeXYWH(sx, sy, sw, sh)));
}
@@ -85,7 +85,7 @@ approach to change color components.
return image_data;
--- a/third_party/blink/renderer/platform/BUILD.gn
+++ b/third_party/blink/renderer/platform/BUILD.gn
@@ -1650,7 +1650,9 @@ component("platform") {
@@ -1656,7 +1656,9 @@ component("platform") {
"//third_party/blink/renderer:non_test_config",
]
@@ -322,7 +322,7 @@ approach to change color components.
// Methods overridden by all sub-classes
--- a/third_party/blink/renderer/platform/runtime_enabled_features.json5
+++ b/third_party/blink/renderer/platform/runtime_enabled_features.json5
@@ -1770,6 +1770,9 @@
@@ -1793,6 +1793,9 @@
name: "FingerprintingCanvasMeasureTextNoise",
},
{

View File

@@ -17,7 +17,7 @@ with limited CPU/memory resources and it is disabled by default.
--- a/chrome/browser/BUILD.gn
+++ b/chrome/browser/BUILD.gn
@@ -2161,6 +2161,7 @@ static_library("browser") {
@@ -2176,6 +2176,7 @@ static_library("browser") {
"//components/net_log",
"//components/network_hints/common:mojo_bindings",
"//components/network_session_configurator/browser",
@@ -78,8 +78,8 @@ with limited CPU/memory resources and it is disabled by default.
+#include "net/socket/client_socket_pool_manager.h"
#include "ppapi/buildflags/buildflags.h"
#include "printing/buildflags/buildflags.h"
#include "services/device/public/cpp/geolocation/geolocation_manager.h"
@@ -359,6 +363,18 @@ void BrowserProcessImpl::Init() {
#include "services/network/public/cpp/features.h"
@@ -357,6 +361,18 @@ void BrowserProcessImpl::Init() {
pref_change_registrar_.Add(metrics::prefs::kMetricsReportingEnabled,
base::BindRepeating(&ApplyMetricsReportingPolicy));
@@ -100,7 +100,7 @@ with limited CPU/memory resources and it is disabled by default.
--- a/chrome/browser/flag_descriptions.cc
+++ b/chrome/browser/flag_descriptions.cc
@@ -2017,6 +2017,10 @@ const char kUnthrottledNestedTimeoutDesc
@@ -2107,6 +2107,10 @@ const char kUnthrottledNestedTimeoutDesc
"websites abusing the API will still eventually have their setTimeouts "
"clamped.";
@@ -113,7 +113,7 @@ with limited CPU/memory resources and it is disabled by default.
const char kMediaRouterCastAllowAllIPsDescription[] =
--- a/chrome/browser/flag_descriptions.h
+++ b/chrome/browser/flag_descriptions.h
@@ -1128,6 +1128,9 @@ extern const char kLogJsConsoleMessagesD
@@ -1179,6 +1179,9 @@ extern const char kLogJsConsoleMessagesD
extern const char kUnthrottledNestedTimeoutName[];
extern const char kUnthrottledNestedTimeoutDescription[];

View File

@@ -1,7 +1,7 @@
--- a/chrome/browser/background/background_mode_manager.cc
+++ b/chrome/browser/background/background_mode_manager.cc
@@ -363,7 +363,7 @@ BackgroundModeManager::~BackgroundModeMa
@@ -359,7 +359,7 @@ BackgroundModeManager::~BackgroundModeMa
// static
void BackgroundModeManager::RegisterPrefs(PrefRegistrySimple* registry) {
@@ -12,7 +12,7 @@
void BackgroundModeManager::RegisterProfile(Profile* profile) {
--- a/chrome/browser/chrome_content_browser_client.cc
+++ b/chrome/browser/chrome_content_browser_client.cc
@@ -1564,7 +1564,7 @@ void ChromeContentBrowserClient::Registe
@@ -1561,7 +1561,7 @@ void ChromeContentBrowserClient::Registe
void ChromeContentBrowserClient::RegisterProfilePrefs(
user_prefs::PrefRegistrySyncable* registry) {
registry->RegisterBooleanPref(prefs::kDisable3DAPIs, false);
@@ -67,7 +67,7 @@
</cr-dialog>
--- a/chrome/browser/ui/browser_ui_prefs.cc
+++ b/chrome/browser/ui/browser_ui_prefs.cc
@@ -75,11 +75,11 @@ void RegisterBrowserUserPrefs(user_prefs
@@ -77,11 +77,11 @@ void RegisterBrowserUserPrefs(user_prefs
registry->RegisterBooleanPref(prefs::kWebAppCreateInAppsMenu, true);
registry->RegisterBooleanPref(prefs::kWebAppCreateInQuickLaunchBar, true);
registry->RegisterBooleanPref(
@@ -83,7 +83,7 @@
registry->RegisterDictionaryPref(prefs::kAppWindowPlacement);
--- a/components/autofill/core/common/autofill_prefs.cc
+++ b/components/autofill/core/common/autofill_prefs.cc
@@ -123,7 +123,7 @@ const char kAutofillPaymentMethodsMandat
@@ -129,7 +129,7 @@ const char kAutofillPaymentMethodsMandat
void RegisterProfilePrefs(user_prefs::PrefRegistrySyncable* registry) {
// Synced prefs. Used for cross-device choices, e.g., credit card Autofill.
registry->RegisterBooleanPref(
@@ -92,7 +92,7 @@
user_prefs::PrefRegistrySyncable::SYNCABLE_PREF);
registry->RegisterIntegerPref(
prefs::kAutofillLastVersionDeduped, 0,
@@ -135,7 +135,7 @@ void RegisterProfilePrefs(user_prefs::Pr
@@ -141,7 +141,7 @@ void RegisterProfilePrefs(user_prefs::Pr
prefs::kAutofillLastVersionDisusedAddressesDeleted, 0,
user_prefs::PrefRegistrySyncable::SYNCABLE_PREF);
registry->RegisterBooleanPref(
@@ -114,7 +114,7 @@
registry->RegisterBooleanPref(
--- a/components/content_settings/core/browser/cookie_settings.cc
+++ b/components/content_settings/core/browser/cookie_settings.cc
@@ -70,7 +70,7 @@ void CookieSettings::RegisterProfilePref
@@ -73,7 +73,7 @@ void CookieSettings::RegisterProfilePref
user_prefs::PrefRegistrySyncable* registry) {
registry->RegisterIntegerPref(
prefs::kCookieControlsMode,

View File

@@ -1,6 +1,6 @@
--- a/sandbox/linux/BUILD.gn
+++ b/sandbox/linux/BUILD.gn
@@ -305,6 +305,12 @@ if (is_linux || is_chromeos) {
@@ -304,6 +304,12 @@ if (is_linux || is_chromeos) {
# These files have a suspicious comparison.
# TODO fix this and re-enable this warning.
"-Wno-sign-compare",

View File

@@ -5,7 +5,7 @@ Subject: [PATCH 56/66] browser: disable profile auto-import on first run
--- a/chrome/browser/chrome_browser_main.cc
+++ b/chrome/browser/chrome_browser_main.cc
@@ -1657,11 +1657,6 @@ int ChromeBrowserMainParts::PreMainMessa
@@ -1693,11 +1693,6 @@ int ChromeBrowserMainParts::PreMainMessa
// and preferences have been registered since some of the import code depends
// on preferences.
if (first_run::IsChromeFirstRun()) {

View File

@@ -12,7 +12,7 @@ it as hidden as it was before?
--- a/net/cert/x509_util.cc
+++ b/net/cert/x509_util.cc
@@ -248,7 +248,7 @@ bool GetTLSServerEndPointChannelBinding(
@@ -254,7 +254,7 @@ bool GetTLSServerEndPointChannelBinding(
}
// RSA keys created by CreateKeyAndSelfSignedCert will be of this length.

View File

@@ -16,12 +16,12 @@ the case anyway, since we are based off Chromium, not Chrome.
--- a/chrome/browser/app_controller_mac.mm
+++ b/chrome/browser/app_controller_mac.mm
@@ -849,7 +849,7 @@ class AppControllerNativeThemeObserver :
@@ -938,7 +938,7 @@ class AppControllerNativeThemeObserver :
CFStringRef checkInterval = CFSTR("checkInterval");
CFPropertyListRef plist = CFPreferencesCopyAppValue(checkInterval, app);
if (!plist) {
- const float fiveHoursInSeconds = 5.0 * 60.0 * 60.0;
+ const float fiveHoursInSeconds = 0.0;
NSNumber* value = [NSNumber numberWithFloat:fiveHoursInSeconds];
CFPreferencesSetAppValue(checkInterval, value, app);
CFPreferencesSetAppValue(
checkInterval, base::apple::NSToCFPtrCast(@(fiveHoursInSeconds)), app);
CFPreferencesAppSynchronize(app);

View File

@@ -17,7 +17,7 @@
override_bounds_(params.initial_bounds),
initial_show_state_(params.initial_show_state),
initial_workspace_(params.initial_workspace),
@@ -845,6 +848,7 @@ Browser::WarnBeforeClosingResult Browser
@@ -846,6 +849,7 @@ Browser::WarnBeforeClosingResult Browser
// true or there are no pending downloads we need to prompt about) then
// there's no need to warn.
if (force_skip_warning_user_on_close_ || CanCloseWithInProgressDownloads())
@@ -25,7 +25,7 @@
return WarnBeforeClosingResult::kOkToClose;
DCHECK(!warn_before_closing_callback_)
@@ -879,6 +883,7 @@ bool Browser::TryToCloseWindow(
@@ -880,6 +884,7 @@ bool Browser::TryToCloseWindow(
void Browser::ResetTryToCloseWindow() {
cancel_download_confirmation_state_ = NOT_PROMPTED;
@@ -33,7 +33,7 @@
unload_controller_.ResetTryToCloseWindow();
}
@@ -2824,6 +2829,62 @@ bool Browser::CanCloseWithInProgressDown
@@ -2834,6 +2839,62 @@ bool Browser::CanCloseWithInProgressDown
return false;
}
@@ -96,7 +96,7 @@
void Browser::InProgressDownloadResponse(bool cancel_downloads) {
if (cancel_downloads) {
cancel_download_confirmation_state_ = RESPONSE_RECEIVED;
@@ -2842,6 +2903,22 @@ void Browser::InProgressDownloadResponse
@@ -2852,6 +2913,22 @@ void Browser::InProgressDownloadResponse
std::move(warn_before_closing_callback_)
.Run(WarnBeforeClosingResult::kDoNotClose);
@@ -129,7 +129,7 @@
#include "chrome/browser/ui/signin_view_controller.h"
#include "chrome/browser/ui/tabs/tab_strip_model_observer.h"
#include "chrome/browser/ui/unload_controller.h"
@@ -1071,12 +1072,17 @@ class Browser : public TabStripModelObse
@@ -1073,12 +1074,17 @@ class Browser : public TabStripModelObse
// Returns true if the window can close, false otherwise.
bool CanCloseWithInProgressDownloads();
@@ -147,7 +147,7 @@
// Called when all warnings have completed when attempting to close the
// browser directly (e.g. via hotkey, close button, terminate signal, etc.)
// Used as a WarnBeforeClosingCallback by ShouldCloseWindow().
@@ -1251,6 +1257,8 @@ class Browser : public TabStripModelObse
@@ -1253,6 +1259,8 @@ class Browser : public TabStripModelObse
// when the browser is closed with in-progress downloads.
CancelDownloadConfirmationState cancel_download_confirmation_state_;

View File

@@ -1,6 +1,6 @@
--- a/chrome/browser/chrome_content_browser_client.cc
+++ b/chrome/browser/chrome_content_browser_client.cc
@@ -882,10 +882,14 @@ bool HandleNewTabPageLocationOverride(
@@ -879,10 +879,14 @@ bool HandleNewTabPageLocationOverride(
// Don't change the URL when incognito mode.
if (profile->IsOffTheRecord())

View File

@@ -11,7 +11,7 @@
#endif // CHROME_BROWSER_UNGOOGLED_FLAG_ENTRIES_H_
--- a/third_party/blink/common/features.cc
+++ b/third_party/blink/common/features.cc
@@ -40,6 +40,8 @@ BASE_FEATURE(kAutofillSendUnidentifiedKe
@@ -135,6 +135,8 @@ BASE_FEATURE(kAutofillSendUnidentifiedKe
"AutofillSendUnidentifiedKeyAfterFill",
base::FEATURE_DISABLED_BY_DEFAULT);
@@ -22,15 +22,15 @@
BASE_FEATURE(kAutomaticLazyFrameLoadingToAds,
--- a/third_party/blink/public/common/features.h
+++ b/third_party/blink/public/common/features.h
@@ -24,6 +24,8 @@ constexpr int kBrowsingTopicsConfigVersi
constexpr int kBrowsingTopicsTaxonomyVersionDefault = 1;
@@ -20,6 +20,8 @@
namespace blink {
namespace features {
+BLINK_COMMON_EXPORT BASE_DECLARE_FEATURE(kDisableLinkDrag);
+
BLINK_COMMON_EXPORT BASE_DECLARE_FEATURE(kAnonymousIframeOriginTrial);
BLINK_COMMON_EXPORT
BASE_DECLARE_FEATURE(kAutofillDetectRemovedFormControls);
// -----------------------------------------------------------------------------
// Feature declarations and associated constants (feature params, et cetera)
//
--- a/third_party/blink/renderer/core/editing/selection_controller.cc
+++ b/third_party/blink/renderer/core/editing/selection_controller.cc
@@ -1433,10 +1433,14 @@ FrameSelection& SelectionController::Sel

View File

@@ -1,6 +1,6 @@
--- a/chrome/browser/ui/views/frame/tab_strip_region_view.cc
+++ b/chrome/browser/ui/views/frame/tab_strip_region_view.cc
@@ -49,6 +49,7 @@ class FrameGrabHandle : public views::Vi
@@ -59,6 +59,7 @@ class FrameGrabHandle : public views::Vi
// Reserve some space for the frame to be grabbed by, even if the tabstrip
// is full.
// TODO(tbergquist): Define this relative to the NTB insets again.

View File

@@ -1,6 +1,6 @@
--- a/chrome/browser/ui/views/frame/browser_frame.cc
+++ b/chrome/browser/ui/views/frame/browser_frame.cc
@@ -540,5 +540,7 @@ bool BrowserFrame::RegenerateFrameOnThem
@@ -558,5 +558,7 @@ bool BrowserFrame::RegenerateFrameOnThem
}
bool BrowserFrame::IsIncognitoBrowser() const {

View File

@@ -27,7 +27,7 @@
return true;
--- a/chrome/browser/ui/views/location_bar/location_bar_view.cc
+++ b/chrome/browser/ui/views/location_bar/location_bar_view.cc
@@ -305,7 +305,8 @@ void LocationBarView::Init() {
@@ -315,7 +315,8 @@ void LocationBarView::Init() {
params.types_enabled.push_back(PageActionIconType::kSendTabToSelf);
params.types_enabled.push_back(PageActionIconType::kClickToCall);

View File

@@ -13,7 +13,7 @@
#endif // CHROME_BROWSER_UNGOOGLED_FLAG_ENTRIES_H_
--- a/chrome/renderer/chrome_render_frame_observer.cc
+++ b/chrome/renderer/chrome_render_frame_observer.cc
@@ -253,14 +253,16 @@ void ChromeRenderFrameObserver::DidFinis
@@ -258,14 +258,16 @@ void ChromeRenderFrameObserver::DidFinis
if (frame->Parent() || frame->IsInFencedFrameTree())
return;
@@ -48,7 +48,7 @@
#include "base/containers/contains.h"
#include "base/debug/crash_logging.h"
#include "base/format_macros.h"
@@ -204,6 +205,12 @@ bool IsCreatedByExtension(const Template
@@ -161,6 +162,12 @@ bool IsCreatedByExtension(const Template
template_url->type() == TemplateURL::OMNIBOX_API_EXTENSION;
}
@@ -61,7 +61,7 @@
} // namespace
// TemplateURLService::LessWithPrefix -----------------------------------------
@@ -289,6 +296,7 @@ TemplateURLService::TemplateURLService(
@@ -245,6 +252,7 @@ TemplateURLService::TemplateURLService(
std::unique_ptr<TemplateURLServiceClient> client,
const base::RepeatingClosure& dsp_change_callback)
: prefs_(prefs),
@@ -69,7 +69,7 @@
search_terms_data_(std::move(search_terms_data)),
web_data_service_(web_data_service),
client_(std::move(client)),
@@ -370,8 +378,8 @@ bool TemplateURLService::CanAddAutogener
@@ -319,8 +327,8 @@ bool TemplateURLService::CanAddAutogener
// that may interfere with search queries). An easy heuristic for this is
// whether the user has a TemplateURL that has been manually modified (e.g.,
// renamed) connected to the same host.
@@ -80,7 +80,7 @@
}
bool TemplateURLService::IsPrepopulatedOrCreatedByPolicy(
@@ -1654,6 +1662,8 @@ SyncDataMap TemplateURLService::CreateGU
@@ -1577,6 +1585,8 @@ SyncDataMap TemplateURLService::CreateGU
void TemplateURLService::Init(const Initializer* initializers,
int num_initializers) {
@@ -89,7 +89,7 @@
if (client_)
client_->SetOwner(this);
@@ -1792,6 +1802,9 @@ void TemplateURLService::ChangeToLoadedS
@@ -1712,6 +1722,9 @@ void TemplateURLService::ChangeToLoadedS
bool TemplateURLService::CanAddAutogeneratedKeywordForHost(
const std::string& host) const {
@@ -101,7 +101,7 @@
return true;
--- a/components/search_engines/template_url_service.h
+++ b/components/search_engines/template_url_service.h
@@ -772,6 +772,8 @@ class TemplateURLService : public WebDat
@@ -742,6 +742,8 @@ class TemplateURLService : public WebDat
// ---------- Browser state related members ---------------------------------
raw_ptr<PrefService> prefs_ = nullptr;

View File

@@ -8,7 +8,7 @@
#include "base/debug/alias.h"
#include "base/functional/bind.h"
#include "base/i18n/rtl.h"
@@ -643,6 +644,8 @@ void Tab::OnGestureEvent(ui::GestureEven
@@ -645,6 +646,8 @@ void Tab::OnGestureEvent(ui::GestureEven
}
std::u16string Tab::GetTooltipText(const gfx::Point& p) const {

View File

@@ -1,6 +1,6 @@
--- a/chrome/browser/ui/browser_command_controller.cc
+++ b/chrome/browser/ui/browser_command_controller.cc
@@ -1303,7 +1303,8 @@ void BrowserCommandController::InitComma
@@ -1361,7 +1361,8 @@ void BrowserCommandController::InitComma
command_updater_.UpdateCommandEnabled(IDC_WINDOW_CLOSE_OTHER_TABS,
normal_window);
@@ -40,14 +40,14 @@
#include "base/functional/bind.h"
#include "base/strings/utf_string_conversions.h"
#include "build/build_config.h"
@@ -143,7 +144,8 @@ TabStripRegionView::TabStripRegionView(s
return;
}
@@ -83,7 +84,8 @@ TabStripRegionView::TabStripRegionView(s
- if (browser->is_type_normal()) {
+ if (browser->is_type_normal() &&
// Add and configure the TabSearchButton.
std::unique_ptr<TabSearchButton> tab_search_button;
- if (browser && browser->is_type_normal()) {
+ if (browser && browser->is_type_normal() &&
+ !base::CommandLine::ForCurrentProcess()->HasSwitch("remove-tabsearch-button")) {
auto tab_search_button = std::make_unique<TabSearchButton>(tab_strip_);
tab_search_button = std::make_unique<TabSearchButton>(tab_strip_);
tab_search_button->SetTooltipText(
l10n_util::GetStringUTF16(IDS_TOOLTIP_TAB_SEARCH));
--- a/chrome/browser/ungoogled_flag_entries.h

View File

@@ -30,17 +30,20 @@
uint64_t GetOriginTypeMask(const base::Value::List& data_types) {
uint64_t result = 0;
for (const auto& data_type : data_types) {
@@ -328,7 +344,8 @@ void ChromeBrowsingDataLifetimeManager::
@@ -328,9 +344,10 @@ void ChromeBrowsingDataLifetimeManager::
const base::Value::List& data_types = profile_->GetPrefs()->GetList(
browsing_data::prefs::kClearBrowsingDataOnExitList);
- if (IsConditionSatisfiedForBrowsingDataRemoval(GetSyncTypesForPolicyPref(
- if (!data_types.empty() &&
+ bool cdoe = base::FeatureList::IsEnabled(browsing_data::features::kClearDataOnExit);
+ if (cdoe || IsConditionSatisfiedForBrowsingDataRemoval(GetSyncTypesForPolicyPref(
profile_, browsing_data::prefs::kClearBrowsingDataOnExitList))) {
+ if (!data_types.empty() && (cdoe ||
IsConditionSatisfiedForBrowsingDataRemoval(GetSyncTypesForPolicyPref(
- profile_, browsing_data::prefs::kClearBrowsingDataOnExitList))) {
+ profile_, browsing_data::prefs::kClearBrowsingDataOnExitList)))) {
profile_->GetPrefs()->SetBoolean(
browsing_data::prefs::kClearBrowsingDataOnExitDeletionPending, true);
@@ -340,8 +357,8 @@ void ChromeBrowsingDataLifetimeManager::
auto* remover = profile_->GetBrowsingDataRemover();
@@ -341,8 +358,8 @@ void ChromeBrowsingDataLifetimeManager::
DCHECK(keep_browser_alive);
#endif
remover->RemoveAndReply(base::Time(), base::Time::Max(),
@@ -53,7 +56,7 @@
keep_browser_alive));
--- a/chrome/browser/browsing_data/chrome_browsing_data_lifetime_manager_factory.cc
+++ b/chrome/browser/browsing_data/chrome_browsing_data_lifetime_manager_factory.cc
@@ -44,6 +44,8 @@ ChromeBrowsingDataLifetimeManagerFactory
@@ -45,6 +45,8 @@ ChromeBrowsingDataLifetimeManagerFactory
KeyedService* ChromeBrowsingDataLifetimeManagerFactory::BuildServiceInstanceFor(
content::BrowserContext* context) const {
if (!base::FeatureList::IsEnabled(

View File

@@ -13,7 +13,7 @@
#endif // CHROME_BROWSER_UNGOOGLED_FLAG_ENTRIES_H_
--- a/content/renderer/render_frame_impl.cc
+++ b/content/renderer/render_frame_impl.cc
@@ -1169,6 +1169,8 @@ WindowOpenDisposition NavigationPolicyTo
@@ -1173,6 +1173,8 @@ WindowOpenDisposition NavigationPolicyTo
case blink::kWebNavigationPolicyNewWindow:
return WindowOpenDisposition::NEW_WINDOW;
case blink::kWebNavigationPolicyNewPopup:

View File

@@ -21,7 +21,7 @@
#include "base/compiler_specific.h"
#include "base/containers/flat_set.h"
#include "base/feature_list.h"
@@ -1304,7 +1305,8 @@ void HistoryBackend::InitImpl(
@@ -1305,7 +1306,8 @@ void HistoryBackend::InitImpl(
db_->GetStartDate(&first_recorded_time_);
// Start expiring old stuff.

View File

@@ -34,7 +34,7 @@
widget->Show();
}
@@ -869,6 +882,9 @@ void ExtensionsToolbarContainer::UpdateC
@@ -867,6 +880,9 @@ void ExtensionsToolbarContainer::UpdateC
}
bool ExtensionsToolbarContainer::ShouldContainerBeVisible() const {

View File

@@ -1,6 +1,6 @@
--- a/chrome/browser/ui/views/frame/browser_view.cc
+++ b/chrome/browser/ui/views/frame/browser_view.cc
@@ -1754,6 +1754,10 @@ void BrowserView::UpdateExclusiveAccessE
@@ -1765,6 +1765,10 @@ void BrowserView::UpdateExclusiveAccessE
ExclusiveAccessBubbleHideCallback bubble_first_hide_callback,
bool notify_download,
bool force_update) {

View File

@@ -1,6 +1,6 @@
--- a/chrome/browser/ui/views/toolbar/toolbar_view.cc
+++ b/chrome/browser/ui/views/toolbar/toolbar_view.cc
@@ -317,7 +317,8 @@ void ToolbarView::Init() {
@@ -368,7 +368,8 @@ void ToolbarView::Init() {
std::unique_ptr<SidePanelToolbarButton> side_panel_button;
std::unique_ptr<SidePanelToolbarContainer> side_panel_toolbar_container;

View File

@@ -1,6 +1,6 @@
--- a/chrome/browser/ui/views/toolbar/toolbar_view.cc
+++ b/chrome/browser/ui/views/toolbar/toolbar_view.cc
@@ -397,6 +397,17 @@ void ToolbarView::Init() {
@@ -455,6 +455,17 @@ void ToolbarView::Init() {
#elif BUILDFLAG(IS_CHROMEOS_LACROS)
show_avatar_toolbar_button = !profiles::IsPublicSession();
#endif

View File

@@ -1,6 +1,6 @@
--- a/chrome/browser/about_flags.cc
+++ b/chrome/browser/about_flags.cc
@@ -3790,10 +3790,12 @@ const FeatureEntry::FeatureVariation kPa
@@ -3791,10 +3791,12 @@ const FeatureEntry::FeatureVariation kPa
#include "chrome/browser/ungoogled_flag_choices.h"
#include "chrome/browser/bromite_flag_choices.h"
#include "chrome/browser/ungoogled_platform_flag_choices.h"
@@ -39,7 +39,7 @@
+#endif // CHROME_BROWSER_EXISTING_SWITCH_FLAG_CHOICES_H_
--- /dev/null
+++ b/chrome/browser/existing_switch_flag_entries.h
@@ -0,0 +1,43 @@
@@ -0,0 +1,39 @@
+// Copyright (c) 2023 The ungoogled-chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
@@ -74,10 +74,6 @@
+ "Start Maximized",
+ "Starts the browser maximized, regardless of any previous settings. Chromium feature, ungoogled-chromium flag.",
+ kOsDesktop, SINGLE_VALUE_TYPE("start-maximized")},
+ {"web-ui-dark-mode",
+ "Web UI Dark Mode",
+ "Whether to enable 'dark mode' enhancements for UIs implemented with web technologies. Chromium feature, ungoogled-chromium flag.",
+ kOsAll, FEATURE_VALUE_TYPE(features::kWebUIDarkMode)},
+ {"webrtc-ip-handling-policy",
+ "WebRTC IP policy",
+ "Restrict which IP addresses and interfaces WebRTC uses. Chromium feature, ungoogled-chromium flag.",

View File

@@ -19,7 +19,7 @@
#endif // CHROME_BROWSER_UNGOOGLED_FLAG_ENTRIES_H_
--- a/chrome/common/BUILD.gn
+++ b/chrome/common/BUILD.gn
@@ -144,6 +144,8 @@ static_library("common_lib") {
@@ -152,6 +152,8 @@ static_library("common_lib") {
"pref_names_util.cc",
"pref_names_util.h",
"ref_counted_util.h",
@@ -28,7 +28,7 @@
"search/instant_mojom_traits.h",
"search/instant_types.cc",
"search/instant_types.h",
@@ -268,6 +270,7 @@ static_library("common_lib") {
@@ -276,6 +278,7 @@ static_library("common_lib") {
"//components/no_state_prefetch/common:mojo_bindings",
"//components/page_load_metrics/common:common",
"//components/password_manager/content/common",
@@ -38,7 +38,7 @@
if (enable_supervised_users) {
--- a/chrome/common/chrome_features.cc
+++ b/chrome/common/chrome_features.cc
@@ -877,6 +877,14 @@ BASE_FEATURE(kNewMacNotificationAPI,
@@ -869,6 +869,14 @@ BASE_FEATURE(kNewMacNotificationAPI,
// referrers instead of their ordinary behavior.
BASE_FEATURE(kNoReferrers, "NoReferrers", base::FEATURE_DISABLED_BY_DEFAULT);
@@ -55,7 +55,7 @@
// on-screen until dismissed, they are instead shown for a very long time.
--- a/chrome/common/chrome_features.h
+++ b/chrome/common/chrome_features.h
@@ -516,6 +516,10 @@ COMPONENT_EXPORT(CHROME_FEATURES) BASE_D
@@ -507,6 +507,10 @@ COMPONENT_EXPORT(CHROME_FEATURES) BASE_D
COMPONENT_EXPORT(CHROME_FEATURES) BASE_DECLARE_FEATURE(kNoReferrers);
@@ -164,7 +164,7 @@
"//components/embedder_support",
--- a/components/BUILD.gn
+++ b/components/BUILD.gn
@@ -51,7 +51,7 @@ if (is_ios) {
@@ -68,7 +68,7 @@ if (is_ios) {
# Omit Lacros because it allows //components to depend on //chrome, which in
# turn depends on //extensions.
@@ -173,7 +173,7 @@
disallowed_extension_deps_ = [
# Components should largely not depend on //extensions. Since // extensions
# is not a component target and is linked with //chrome, depending on most
@@ -710,7 +710,7 @@ test("components_unittests") {
@@ -730,7 +730,7 @@ test("components_unittests") {
# On other platforms, no components should depend on Chrome.
# Since //chrome depends on //extensions, we also only assert_no_deps on
# extensions targets for non-lacros builds.
@@ -182,7 +182,7 @@
assert_no_deps = [ "//chrome/*" ]
assert_no_deps += disallowed_extension_deps_
}
@@ -992,7 +992,7 @@ if (use_blink) {
@@ -1018,7 +1018,7 @@ if (use_blink) {
# dependency. On other platforms, no components should depend on Chrome.
# Since //chrome depends on //extensions, we also only assert_no_deps on
# extensions targets for non-lacros builds.
@@ -201,7 +201,7 @@
#include "content/browser/blob_storage/chrome_blob_storage_context.h"
#include "content/browser/browsing_topics/header_util.h"
#include "content/browser/child_process_security_policy_impl.h"
@@ -408,10 +409,10 @@ void AddAdditionalRequestHeaders(
@@ -385,10 +386,10 @@ void AddAdditionalRequestHeaders(
net::HttpRequestHeaders::kUserAgent,
ComputeUserAgentValue(*headers, user_agent_override, browser_context));
@@ -226,7 +226,7 @@
#include "content/common/associated_interfaces.mojom.h"
#include "content/common/content_navigation_policy.h"
#include "content/common/content_switches_internal.h"
@@ -4282,10 +4283,13 @@ void RenderFrameImpl::WillSendRequestInt
@@ -4304,10 +4305,13 @@ void RenderFrameImpl::WillSendRequestInt
request.SetHasUserGesture(frame_->HasTransientUserActivation());
@@ -333,7 +333,7 @@
#include "third_party/blink/public/platform/url_loader_throttle_provider.h"
#include "third_party/blink/public/platform/weak_wrapper_resource_load_info_notifier.h"
#include "third_party/blink/public/platform/web_code_cache_loader.h"
@@ -402,10 +404,13 @@ void DedicatedOrSharedWorkerFetchContext
@@ -401,10 +403,13 @@ void DedicatedOrSharedWorkerFetchContext
if (g_rewrite_url)
request.SetUrl(g_rewrite_url(request.Url().GetString().Utf8(), false));

View File

@@ -35,7 +35,7 @@
// https://vasilvv.github.io/httpbis-alps/draft-vvv-httpbis-alps.html.
--- a/net/dns/host_resolver_manager.cc
+++ b/net/dns/host_resolver_manager.cc
@@ -157,11 +157,6 @@ const unsigned kMinimumTTLSeconds = kCac
@@ -158,11 +158,6 @@ const unsigned kMinimumTTLSeconds = kCac
// cached.
const int kIPv6ProbePeriodMs = 1000;
@@ -47,7 +47,7 @@
// ICANN uses this localhost address to indicate a name collision.
//
// The policy in Chromium is to fail host resolving if it resolves to
@@ -3944,33 +3939,10 @@ int HostResolverManager::StartIPv6Reacha
@@ -3895,33 +3890,10 @@ int HostResolverManager::StartIPv6Reacha
return OK;
}
@@ -64,7 +64,7 @@
- kIPv6ProbePeriodMs) {
- probing_ipv6_ = true;
- rv = StartGloballyReachableCheck(
- IPAddress(kIPv6ProbeAddress), net_log,
- IPAddress(kIPv6ProbeAddress), net_log, client_socket_factory,
- base::BindOnce(&HostResolverManager::FinishIPv6ReachabilityCheck,
- weak_ptr_factory_.GetWeakPtr(), std::move(callback)));
- if (rv != ERR_IO_PENDING) {

View File

@@ -270,7 +270,7 @@
bool CanEdit(const TemplateURL* url) const;
--- a/chrome/browser/ui/search_engines/template_url_table_model.cc
+++ b/chrome/browser/ui/search_engines/template_url_table_model.cc
@@ -112,21 +112,25 @@ void TemplateURLTableModel::Remove(size_
@@ -105,21 +105,25 @@ void TemplateURLTableModel::Remove(size_
void TemplateURLTableModel::Add(size_t index,
const std::u16string& short_name,
const std::u16string& keyword,
@@ -301,7 +301,7 @@
DCHECK(index <= RowCount());
DCHECK(!url.empty());
TemplateURL* template_url = GetTemplateURL(index);
@@ -135,7 +139,8 @@ void TemplateURLTableModel::ModifyTempla
@@ -128,7 +132,8 @@ void TemplateURLTableModel::ModifyTempla
DCHECK(template_url_service_->GetDefaultSearchProvider() != template_url ||
template_url->SupportsReplacement(
template_url_service_->search_terms_data()));
@@ -427,7 +427,7 @@
--- a/components/search_engines/template_url_service.cc
+++ b/components/search_engines/template_url_service.cc
@@ -657,7 +657,8 @@ void TemplateURLService::IncrementUsageC
@@ -605,7 +605,8 @@ void TemplateURLService::IncrementUsageC
void TemplateURLService::ResetTemplateURL(TemplateURL* url,
const std::u16string& title,
const std::u16string& keyword,
@@ -437,7 +437,7 @@
DCHECK(!IsCreatedByExtension(url));
DCHECK(!keyword.empty());
DCHECK(!search_url.empty());
@@ -672,6 +673,7 @@ void TemplateURLService::ResetTemplateUR
@@ -620,6 +621,7 @@ void TemplateURLService::ResetTemplateUR
data.safe_for_autoreplace = false;
data.last_modified = clock_->Now();
data.is_active = TemplateURLData::ActiveStatus::kTrue;
@@ -447,7 +447,7 @@
}
--- a/components/search_engines/template_url_service.h
+++ b/components/search_engines/template_url_service.h
@@ -266,7 +266,8 @@ class TemplateURLService : public WebDat
@@ -240,7 +240,8 @@ class TemplateURLService : public WebDat
void ResetTemplateURL(TemplateURL* url,
const std::u16string& title,
const std::u16string& keyword,

View File

@@ -1,6 +1,6 @@
--- a/chrome/browser/about_flags.cc
+++ b/chrome/browser/about_flags.cc
@@ -3786,7 +3786,13 @@ const FeatureEntry::FeatureVariation kPa
@@ -3787,7 +3787,13 @@ const FeatureEntry::FeatureVariation kPa
// calculate and verify checksum.
//
// When adding a new choice, add it to the end of the list.

View File

@@ -1,6 +1,6 @@
--- a/chrome/browser/ui/browser_ui_prefs.cc
+++ b/chrome/browser/ui/browser_ui_prefs.cc
@@ -91,7 +91,7 @@ void RegisterBrowserUserPrefs(user_prefs
@@ -93,7 +93,7 @@ void RegisterBrowserUserPrefs(user_prefs
false);
#endif
registry->RegisterStringPref(prefs::kWebRTCIPHandlingPolicy,

View File

@@ -0,0 +1,72 @@
--- a/chrome/browser/media/webrtc/capture_policy_utils.cc
+++ b/chrome/browser/media/webrtc/capture_policy_utils.cc
@@ -139,69 +139,12 @@ void RegisterProfilePrefs(PrefRegistrySi
}
bool IsGetAllScreensMediaAllowedForAnySite(content::BrowserContext* context) {
-#if BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_LINUX)
- Profile* profile = Profile::FromBrowserContext(context);
- if (!profile) {
- return false;
- }
-
-#if BUILDFLAG(IS_CHROMEOS_LACROS)
- // To ensure that a user is informed at login time that capturing of all
- // screens can happen (for privacy reasons), this API is only available on
- // primary profiles.
- if (!profile->IsMainProfile()) {
- return false;
- }
-#endif // BUILDFLAG(IS_CHROMEOS_LACROS)
-
- HostContentSettingsMap* host_content_settings_map =
- HostContentSettingsMapFactory::GetForProfile(profile);
- if (!host_content_settings_map) {
- return false;
- }
- ContentSettingsForOneType content_settings;
- host_content_settings_map->GetSettingsForOneType(
- ContentSettingsType::ALL_SCREEN_CAPTURE, &content_settings);
- return base::ranges::any_of(content_settings,
- [](const ContentSettingPatternSource& source) {
- return source.GetContentSetting() ==
- ContentSetting::CONTENT_SETTING_ALLOW;
- });
-#else
return false;
-#endif
}
bool IsGetAllScreensMediaAllowed(content::BrowserContext* context,
const GURL& url) {
-#if BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_LINUX)
- Profile* profile = Profile::FromBrowserContext(context);
- if (!profile) {
- return false;
- }
-
-#if BUILDFLAG(IS_CHROMEOS_LACROS)
- // To ensure that a user is informed at login time that capturing of all
- // screens can happen (for privacy reasons), this API is only available on
- // primary profiles.
- if (!profile->IsMainProfile()) {
- return false;
- }
-#endif // BUILDFLAG(IS_CHROMEOS_LACROS)
-
- HostContentSettingsMap* host_content_settings_map =
- HostContentSettingsMapFactory::GetForProfile(profile);
- if (!host_content_settings_map) {
- return false;
- }
- ContentSetting auto_accept_enabled =
- host_content_settings_map->GetContentSetting(
- url, url, ContentSettingsType::ALL_SCREEN_CAPTURE);
- return auto_accept_enabled == ContentSetting::CONTENT_SETTING_ALLOW;
-#else
- // This API is currently only available on ChromeOS and Linux.
return false;
-#endif
}
#if !BUILDFLAG(IS_ANDROID)

View File

@@ -147,9 +147,9 @@
} // namespace download
--- a/content/browser/BUILD.gn
+++ b/content/browser/BUILD.gn
@@ -100,7 +100,6 @@ source_set("browser") {
@@ -98,7 +98,6 @@ source_set("browser") {
"//components/payments/mojom",
"//components/power_monitor",
"//components/power_scheduler",
"//components/services/filesystem:lib",
- "//components/services/quarantine:quarantine",
"//components/services/screen_ai/buildflags",

View File

@@ -3,7 +3,7 @@
--- a/third_party/blink/renderer/modules/webgl/webgl_rendering_context_base.cc
+++ b/third_party/blink/renderer/modules/webgl/webgl_rendering_context_base.cc
@@ -3759,8 +3759,7 @@ ScriptValue WebGLRenderingContextBase::g
@@ -3788,8 +3788,7 @@ ScriptValue WebGLRenderingContextBase::g
pname, IdentifiabilityBenignStringToken(
String(ContextGL()->GetString(GL_RENDERER))));
}
@@ -13,7 +13,7 @@
}
SynthesizeGLError(
GL_INVALID_ENUM, "getParameter",
@@ -3774,8 +3773,7 @@ ScriptValue WebGLRenderingContextBase::g
@@ -3803,8 +3802,7 @@ ScriptValue WebGLRenderingContextBase::g
pname, IdentifiabilityBenignStringToken(
String(ContextGL()->GetString(GL_VENDOR))));
}

View File

@@ -2,12 +2,12 @@
--- a/third_party/blink/common/features.cc
+++ b/third_party/blink/common/features.cc
@@ -510,7 +510,7 @@ BASE_FEATURE(kAllowSyncXHRInPageDismissa
@@ -1222,7 +1222,7 @@ BASE_FEATURE(kPrefetchFontLookupTables,
// crbug.com/988956.
BASE_FEATURE(kPrefetchPrivacyChanges,
"PrefetchPrivacyChanges",
- base::FEATURE_DISABLED_BY_DEFAULT);
+ base::FEATURE_ENABLED_BY_DEFAULT);
// Decodes jpeg 4:2:0 formatted images to YUV instead of RGBX and stores in this
// format in the image decode cache. See crbug.com/919627 for details on the
BASE_FEATURE(kPrerender2InNewTab,
"Prerender2InNewTab",

View File

@@ -2,7 +2,7 @@
--- a/chrome/browser/ui/browser_commands.cc
+++ b/chrome/browser/ui/browser_commands.cc
@@ -466,10 +466,6 @@ int GetContentRestrictions(const Browser
@@ -469,10 +469,6 @@ int GetContentRestrictions(const Browser
CoreTabHelper* core_tab_helper =
CoreTabHelper::FromWebContents(current_tab);
content_restrictions = core_tab_helper->content_restrictions();
@@ -13,7 +13,7 @@
}
return content_restrictions;
}
@@ -1504,8 +1500,7 @@ bool CanSavePage(const Browser* browser)
@@ -1537,8 +1533,7 @@ bool CanSavePage(const Browser* browser)
DownloadPrefs::DownloadRestriction::ALL_FILES) {
return false;
}

View File

@@ -13,7 +13,7 @@
foreground_frame_active_color_id_ =
--- a/chrome/browser/ui/views/tabs/tab_strip.cc
+++ b/chrome/browser/ui/views/tabs/tab_strip.cc
@@ -1891,8 +1891,6 @@ void TabStrip::NewTabButtonPressed(const
@@ -1887,8 +1887,6 @@ void TabStrip::NewTabButtonPressed(const
const ui::MouseEvent& mouse = static_cast<const ui::MouseEvent&>(event);
if (mouse.IsOnlyMiddleMouseButton()) {
@@ -22,7 +22,7 @@
ui::Clipboard* clipboard = ui::Clipboard::GetForCurrentThread();
CHECK(clipboard);
std::u16string clipboard_text;
@@ -1900,7 +1898,6 @@ void TabStrip::NewTabButtonPressed(const
@@ -1896,7 +1894,6 @@ void TabStrip::NewTabButtonPressed(const
/* data_dst = */ nullptr, &clipboard_text);
if (!clipboard_text.empty())
controller_->CreateNewTabWithLocation(clipboard_text);

View File

@@ -1,6 +1,6 @@
--- a/chrome/browser/chrome_browser_main.cc
+++ b/chrome/browser/chrome_browser_main.cc
@@ -1002,6 +1002,7 @@ int ChromeBrowserMainParts::PreCreateThr
@@ -1025,6 +1025,7 @@ int ChromeBrowserMainParts::PreCreateThr
if (first_run::IsChromeFirstRun()) {
if (!base::CommandLine::ForCurrentProcess()->HasSwitch(switches::kApp) &&
!base::CommandLine::ForCurrentProcess()->HasSwitch(switches::kAppId)) {
@@ -10,7 +10,7 @@
--- a/chrome/browser/ui/webui/chrome_web_ui_controller_factory.cc
+++ b/chrome/browser/ui/webui/chrome_web_ui_controller_factory.cc
@@ -65,6 +65,7 @@
@@ -66,6 +66,7 @@
#include "chrome/browser/ui/webui/suggest_internals/suggest_internals_ui.h"
#include "chrome/browser/ui/webui/sync_internals/sync_internals_ui.h"
#include "chrome/browser/ui/webui/translate_internals/translate_internals_ui.h"
@@ -18,7 +18,7 @@
#include "chrome/browser/ui/webui/usb_internals/usb_internals_ui.h"
#include "chrome/browser/ui/webui/user_actions/user_actions_ui.h"
#include "chrome/browser/ui/webui/version/version_ui.h"
@@ -866,6 +867,8 @@ WebUIFactoryFunction GetWebUIFactoryFunc
@@ -885,6 +886,8 @@ WebUIFactoryFunction GetWebUIFactoryFunc
}
#endif
@@ -174,7 +174,7 @@
+#endif // CHROME_BROWSER_UI_WEBUI_UNGOOGLED_FIRST_RUN_H_
--- a/chrome/common/webui_url_constants.cc
+++ b/chrome/common/webui_url_constants.cc
@@ -668,6 +668,7 @@ const char kExtensionConfigureCommandsSu
@@ -644,6 +644,7 @@ const char kExtensionConfigureCommandsSu
// Add hosts here to be included in chrome://chrome-urls (about:about).
// These hosts will also be suggested by BuiltinProvider.
const char* const kChromeHostURLs[] = {

View File

@@ -24,10 +24,10 @@
--- a/chrome/browser/resources/extensions/item_list.html
+++ b/chrome/browser/resources/extensions/item_list.html
@@ -80,13 +80,6 @@
<div id="container">
<managed-footnote hidden="[[filter]]"></managed-footnote>
<div id="content-wrapper" style="--max-columns: [[maxColumns_]];">
@@ -90,13 +90,6 @@
</extensions-review-panel>
</template>
</div>
- <div id="no-items" class="empty-list-message"
- hidden$="[[!shouldShowEmptyItemsMessage_(
- apps.length, extensions.length)]]">
@@ -55,7 +55,7 @@
-</div>
--- a/chrome/browser/resources/history/side_bar.html
+++ b/chrome/browser/resources/history/side_bar.html
@@ -95,13 +95,6 @@
@@ -87,13 +87,6 @@
$i18n{historyMenuItem}
<paper-ripple></paper-ripple>
</a>
@@ -136,7 +136,7 @@
<div class="separator"></div>
--- a/chrome/browser/resources/settings/appearance_page/appearance_page.ts
+++ b/chrome/browser/resources/settings/appearance_page/appearance_page.ts
@@ -353,8 +353,8 @@ export class SettingsAppearancePageEleme
@@ -362,8 +362,8 @@ export class SettingsAppearancePageEleme
return;
}
@@ -146,7 +146,7 @@
switch (this.systemTheme_) {
case SystemTheme.GTK:
i18nId = 'gtkTheme';
@@ -366,11 +366,8 @@ export class SettingsAppearancePageEleme
@@ -375,11 +375,8 @@ export class SettingsAppearancePageEleme
i18nId = 'classicTheme';
break;
}
@@ -294,7 +294,7 @@
</cr-icon-button>
--- a/chrome/browser/ui/views/profiles/profile_menu_view.cc
+++ b/chrome/browser/ui/views/profiles/profile_menu_view.cc
@@ -196,6 +196,7 @@ void ProfileMenuView::BuildMenu() {
@@ -167,6 +167,7 @@ void ProfileMenuView::BuildMenu() {
}
gfx::ImageSkia ProfileMenuView::GetSyncIcon() const {
@@ -302,7 +302,7 @@
Profile* profile = browser()->profile();
if (profile->IsOffTheRecord() || profile->IsGuestSession())
return gfx::ImageSkia();
@@ -518,8 +519,7 @@ void ProfileMenuView::BuildIdentity() {
@@ -504,8 +505,7 @@ void ProfileMenuView::BuildIdentity() {
menu_subtitle_);
} else {
menu_title_ = std::u16string();
@@ -334,7 +334,7 @@
base::BindRepeating(&SadTabView::PerformAction,
--- a/media/base/media_switches.cc
+++ b/media/base/media_switches.cc
@@ -844,7 +844,7 @@ const base::FeatureParam<std::string> kM
@@ -869,7 +869,7 @@ const base::FeatureParam<std::string> kM
#endif // BUILDFLAG(IS_WIN)
// Enables the Live Caption feature on supported devices.

View File

@@ -1,5 +1,3 @@
upstream/fix-print-content-analysis.patch
core/inox-patchset/0001-fix-building-without-safebrowsing.patch
core/inox-patchset/0003-disable-autofill-download-manager.patch
core/inox-patchset/0005-disable-default-extensions.patch
@@ -12,7 +10,6 @@ core/iridium-browser/all-add-trk-prefixes-to-possibly-evil-connections.patch
core/ungoogled-chromium/disable-crash-reporter.patch
core/ungoogled-chromium/disable-google-host-detection.patch
core/ungoogled-chromium/replace-google-search-engine-with-nosearch.patch
core/ungoogled-chromium/disable-signin.patch
core/ungoogled-chromium/toggle-translation-via-switch.patch
core/ungoogled-chromium/disable-untraceable-urls.patch
core/ungoogled-chromium/disable-profile-avatar-downloading.patch
@@ -32,6 +29,7 @@ core/ungoogled-chromium/remove-unused-preferences-fields.patch
core/ungoogled-chromium/block-requests.patch
core/ungoogled-chromium/disable-privacy-sandbox.patch
core/ungoogled-chromium/doh-changes.patch
core/ungoogled-chromium/disable-web-environment-integrity.patch
core/bromite/disable-fetching-field-trials.patch
extra/ungoogled-chromium/add-ungoogled-flag-headers.patch
@@ -104,3 +102,4 @@ extra/ungoogled-chromium/add-flags-for-referrer-customization.patch
extra/ungoogled-chromium/default-webrtc-ip-handling-policy.patch
extra/ungoogled-chromium/add-flags-for-existing-switches.patch
extra/ungoogled-chromium/first-run-page.patch
extra/ungoogled-chromium/disable-capture-all-screens.patch

View File

@@ -1,32 +0,0 @@
--- a/chrome/browser/enterprise/connectors/analysis/print_content_analysis_utils.cc
+++ b/chrome/browser/enterprise/connectors/analysis/print_content_analysis_utils.cc
@@ -59,6 +59,7 @@ void PrintIfAllowedByPolicy(scoped_refpt
base::OnceClosure hide_preview) {
ContentAnalysisDelegate::Data scanning_data;
+#if BUILDFLAG(ENABLE_PRINT_CONTENT_ANALYSIS)
if (ContentAnalysisDelegate::IsEnabled(
Profile::FromBrowserContext(initiator->GetBrowserContext()),
initiator->GetLastCommittedURL(), &scanning_data,
@@ -78,6 +79,7 @@ void PrintIfAllowedByPolicy(scoped_refpt
std::move(on_verdict));
return;
}
+#endif // BUILDFLAG(ENABLE_PRINT_CONTENT_ANALYSIS)
std::move(on_verdict).Run(/*allowed=*/true);
}
@@ -92,11 +94,13 @@ absl::optional<ContentAnalysisDelegate::
return absl::nullopt;
}
+#if BUILDFLAG(ENABLE_PRINT_CONTENT_ANALYSIS)
if ((base::FeatureList::IsEnabled(
printing::features::kEnablePrintScanAfterPreview) &&
scanning_data.settings.cloud_or_local_settings.is_local_analysis())) {
return absl::nullopt;
}
+#endif // BUILDFLAG(ENABLE_PRINT_CONTENT_ANALYSIS)
return scanning_data;
}

View File

@@ -206,6 +206,7 @@ components/test/data/paint_preview/PaintPreviewTestService/wikipedia/ABE3BC9BB03
components/test/data/paint_preview/PaintPreviewTestService/wikipedia/proto.pb
components/test/data/printing/unsorted_custompapers.plist
components/test/data/safe_browsing/client_model.pb
components/test/data/safe_browsing/image_embedding.tflite
components/test/data/safe_browsing/visual_model_android.tflite
components/test/data/safe_browsing/visual_model_desktop.tflite
components/test/data/segmentation_platform/adder.tflite
@@ -580,6 +581,7 @@ net/data/cache_tests/remove_tail3/index
net/data/cache_tests/wrong_version/index
net/data/cert_net_fetcher_impl_unittest/gzipped_crl
net/data/filter_unittests/google.br
net/data/filter_unittests/google.sbr
net/data/fuzzer_data/crl_getcrlstatusforcert_fuzzer/bad_empty_extensions
net/data/fuzzer_data/crl_getcrlstatusforcert_fuzzer/bad_empty_sequence
net/data/fuzzer_data/crl_getcrlstatusforcert_fuzzer/good
@@ -2529,6 +2531,7 @@ third_party/android_build_tools/lint/custom_lint.jar
third_party/angle/samples/multi_texture/basemap.tga
third_party/angle/samples/multi_texture/lightmap.tga
third_party/angle/samples/particle_system/smoke.tga
third_party/angle/src/tests/capture_tests/expected/CapturedTest_MultiFrame_ES3_Vulkan.angledata
third_party/angle/third_party/glmark2/src/data/models/asteroid-high.3ds
third_party/angle/third_party/glmark2/src/data/models/asteroid-low.3ds
third_party/angle/third_party/glmark2/src/data/models/cat.3ds
@@ -2536,6 +2539,7 @@ third_party/angle/third_party/glmark2/src/data/models/cube.3ds
third_party/angle/third_party/glmark2/src/data/models/horse.3ds
third_party/angle/third_party/r8/custom_d8.jar
third_party/beto-core/src/nearby/connections/ukey2/ukey2_jni/java/gradle/wrapper/gradle-wrapper.jar
third_party/beto-core/src/nearby/presence/ldt_np_jni/java/LdtNpJni/gradle/wrapper/gradle-wrapper.jar
third_party/blink/manual_tests/WebKitSite.webarchive
third_party/blink/manual_tests/accessibility/resources/AppletTest.class
third_party/blink/manual_tests/plugins/test.swf
@@ -7781,10 +7785,16 @@ third_party/catapult/third_party/gsutil/gslib/vendored/oauth2client/tests/data/k
third_party/catapult/third_party/gsutil/gslib/vendored/oauth2client/tests/data/key.p12.enc
third_party/catapult/third_party/gsutil/gslib/vendored/oauth2client/tests/data/privatekey.p12
third_party/catapult/third_party/gsutil/gslib/vendored/oauth2client/tests/data/user-key.json.enc
third_party/catapult/third_party/gsutil/third_party/chardet/tests/UTF-16/bom-utf-16-be.srt
third_party/catapult/third_party/gsutil/third_party/chardet/tests/UTF-16/bom-utf-16-le.srt
third_party/catapult/third_party/gsutil/third_party/chardet/tests/UTF-32/bom-utf-32-be.srt
third_party/catapult/third_party/gsutil/third_party/chardet/tests/UTF-32/bom-utf-32-le.srt
third_party/catapult/third_party/gsutil/third_party/crcmod_osx/crcmod/_crcfunext.so
third_party/catapult/third_party/gsutil/third_party/google-auth-library-python/system_tests/secrets.tar.enc
third_party/catapult/third_party/gsutil/third_party/google-auth-library-python/system_tests/system_tests_sync/secrets.tar.enc
third_party/catapult/third_party/gsutil/third_party/google-auth-library-python/tests/data/old_oauth_credentials_py3.pickle
third_party/catapult/third_party/gsutil/third_party/google-auth-library-python/tests/data/privatekey.p12
third_party/catapult/third_party/gsutil/third_party/httplib2/ref/img1.old
third_party/catapult/third_party/gsutil/third_party/httplib2/test/deflate/deflated-content
third_party/catapult/third_party/gsutil/third_party/httplib2/test/deflate/deflated.asis
third_party/catapult/third_party/html5lib-1.1/html5lib/tests/testdata/tree-construction/domjs-unsafe.dat
third_party/catapult/third_party/html5lib-1.1/html5lib/tests/testdata/tree-construction/pending-spec-changes-plain-text-unsafe.dat
third_party/catapult/third_party/html5lib-1.1/html5lib/tests/testdata/tree-construction/plain-text-unsafe.dat
@@ -7981,6 +7991,7 @@ third_party/devtools-frontend/src/test/unittests/fixtures/traces/multiple-top-le
third_party/devtools-frontend/src/test/unittests/fixtures/traces/nested-interactions.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/node-fibonacci-website.cpuprofile.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/one-second-interaction.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/react-hello-world.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/recursive-blocking-js.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/recursive-counting-js.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/redirects-subresource-multiple.json.gz
@@ -10303,6 +10314,7 @@ third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-hb-subset-fu
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-hb-subset-fuzzer-5717414645334016
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-hb-subset-fuzzer-5756332481708032
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-hb-subset-fuzzer-5762137968869376
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-hb-subset-fuzzer-5979721620652032
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-4884742786777088
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-5255344882188288
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-5720051798769664
@@ -10396,6 +10408,7 @@ third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-fuzzer-6595199411159040
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-fuzzer-6624904746106880
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-fuzzer-6723367514144768
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-repacker-fuzzer-4877513265119232
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-shape-fuzzer-4523349576908800
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-shape-fuzzer-5061207689134080
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-shape-fuzzer-5138182937772032
@@ -10480,6 +10493,7 @@ third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-4877336988483584
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-4880059756969984
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-4901143794810880
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-4916785942757376
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-4961171477233664
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-4979711393005568
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5001604901240832
@@ -10610,6 +10624,7 @@ third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5793182905663488
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5844352760152064
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5845846876356608
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5855710991482880.fuzz
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5858518134554624
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5887968763052032
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5923632099885056
@@ -10624,6 +10639,7 @@ third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6246465148813312
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6254792024915968
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6276691949518848
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6292420615340032
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6315334756335616
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6316256152780800
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6362213417353216
@@ -10631,11 +10647,14 @@ third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6372147008241664
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6382598554255360
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6421315436281856
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6442117271257088
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6521393809588224
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6525813890875392
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6543700493598720
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6608005089853440
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6616166961905664
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6651660668502016
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6681253479579648
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6742230974201856
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-get-codepoints-fuzzer-5203067375976448
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-get-codepoints-fuzzer-5630904853069824
@@ -10672,6 +10691,7 @@ third_party/harfbuzz-ng/src/test/fuzzing/graphs/clusterfuzz-testcase-minimized-h
third_party/harfbuzz-ng/src/test/fuzzing/graphs/clusterfuzz-testcase-minimized-hb-repacker-fuzzer-5390364397928448
third_party/harfbuzz-ng/src/test/fuzzing/graphs/clusterfuzz-testcase-minimized-hb-repacker-fuzzer-5475787333828608
third_party/harfbuzz-ng/src/test/fuzzing/graphs/clusterfuzz-testcase-minimized-hb-repacker-fuzzer-6014493291577344
third_party/harfbuzz-ng/src/test/fuzzing/graphs/clusterfuzz-testcase-minimized-hb-repacker-fuzzer-6419865171525632
third_party/harfbuzz-ng/src/test/fuzzing/graphs/clusterfuzz-testcase-minimized-hb-repacker-fuzzer-6714085985353728
third_party/harfbuzz-ng/src/test/fuzzing/graphs/crash-3bf72494aa4c9f8cbbcbf887fdc2a2858c87feb4
third_party/harfbuzz-ng/src/test/fuzzing/graphs/crash-442bfac994a3d9929cf06262ae9fb00f6ee1f774
@@ -14242,6 +14262,7 @@ third_party/pdfium/testing/resources/RGB-alpha.jp2
third_party/pdfium/testing/resources/RGB.jp2
third_party/pdfium/testing/resources/bigtable_mini.in
third_party/pdfium/testing/resources/bug_1469.jp2
third_party/pdfium/testing/resources/bug_2034.idat
third_party/pdfium/testing/resources/bug_552046.in
third_party/pdfium/testing/resources/bug_861842.in
third_party/pdfium/testing/resources/gray-alpha.jp2
@@ -14506,13 +14527,6 @@ third_party/swiftshader/third_party/SPIRV-Tools/test/fuzzers/corpora/spv/graphic
third_party/swiftshader/third_party/SPIRV-Tools/test/fuzzers/corpora/spv/graphicsfuzz_085.spv
third_party/swiftshader/third_party/SPIRV-Tools/test/fuzzers/corpora/spv/graphicsfuzz_086.spv
third_party/swiftshader/third_party/SPIRV-Tools/test/fuzzers/corpora/spv/simple.spv
third_party/tensorflow-text/src/docs/api_docs/python/text/api_report.pb
third_party/tensorflow-text/src/tensorflow_text/python/ops/test_data/fast_wordpiece_tokenizer_model.fb
third_party/tensorflow-text/src/tensorflow_text/python/ops/test_data/segmenter_hub_module/saved_model.pb
third_party/tensorflow-text/src/tensorflow_text/python/ops/test_data/segmenter_hub_module/tfhub_module.pb
third_party/tensorflow-text/src/tensorflow_text/python/ops/test_data/segmenter_hub_module/variables/variables.data-00000-of-00001
third_party/tensorflow-text/src/tensorflow_text/python/ops/test_data/segmenter_hub_module/variables/variables.index
third_party/tensorflow-text/src/tensorflow_text/python/ops/test_data/test_oss_model.model
third_party/tflite/src/tensorflow/c/experimental/saved_model/internal/testdata/SimpleWhileLoop/saved_model.pb
third_party/tflite/src/tensorflow/c/experimental/saved_model/internal/testdata/SimpleWhileLoop/variables/variables.data-00000-of-00001
third_party/tflite/src/tensorflow/c/experimental/saved_model/internal/testdata/SimpleWhileLoop/variables/variables.index
@@ -15159,7 +15173,6 @@ third_party/vulkan-deps/spirv-tools/src/test/fuzzers/corpora/spv/graphicsfuzz_08
third_party/vulkan-deps/spirv-tools/src/test/fuzzers/corpora/spv/graphicsfuzz_085.spv
third_party/vulkan-deps/spirv-tools/src/test/fuzzers/corpora/spv/graphicsfuzz_086.spv
third_party/vulkan-deps/spirv-tools/src/test/fuzzers/corpora/spv/simple.spv
third_party/vulkan-deps/vulkan-loader/src/loader/loader.aps
third_party/vulkan-deps/vulkan-loader/src/tests/framework/data/binaries/dummy_library_elf_32.dll
third_party/vulkan-deps/vulkan-loader/src/tests/framework/data/binaries/dummy_library_elf_64.dll
third_party/vulkan-deps/vulkan-loader/src/tests/framework/data/binaries/dummy_library_pe_32.dll