mirror of
https://github.com/morgan9e/helium
synced 2026-04-14 00:14:20 +09:00
Update to Chromium 116.0.5845.82
This commit is contained in:
@@ -1 +1 @@
|
||||
115.0.5790.171
|
||||
116.0.5845.82
|
||||
|
||||
@@ -89,7 +89,6 @@ Chromium contains switches that do no have corresponding entries in `chrome://fl
|
||||
`--enable-low-end-device-mode` | Force low-end device mode when set.
|
||||
`--force-dark-mode` | Forces dark mode in UI for platforms that support it.
|
||||
`--no-pings` | Don't send hyperlink auditing pings.
|
||||
`--web-ui-dark-mode` | Whether to enable 'dark mode' enhancements for UIs implemented with web technologies.
|
||||
`--webrtc-ip-handling-policy` | Restrict which IP addresses and interfaces WebRTC uses.
|
||||
- ### Available only on desktop
|
||||
<code>Switch </code> | Description
|
||||
|
||||
File diff suppressed because it is too large
Load Diff
@@ -1,6 +1,6 @@
|
||||
--- a/chrome/browser/BUILD.gn
|
||||
+++ b/chrome/browser/BUILD.gn
|
||||
@@ -2247,7 +2247,6 @@ static_library("browser") {
|
||||
@@ -2262,7 +2262,6 @@ static_library("browser") {
|
||||
"//components/reporting/util:task_runner_context",
|
||||
"//components/resources",
|
||||
"//components/safe_browsing/content/browser",
|
||||
@@ -8,7 +8,7 @@
|
||||
"//components/safe_browsing/content/browser:safe_browsing_service",
|
||||
"//components/safe_browsing/content/browser/password_protection",
|
||||
"//components/safe_browsing/content/browser/web_ui",
|
||||
@@ -3625,8 +3624,6 @@ static_library("browser") {
|
||||
@@ -3617,8 +3616,6 @@ static_library("browser") {
|
||||
"download/download_commands.h",
|
||||
"download/download_crx_util.cc",
|
||||
"download/download_crx_util.h",
|
||||
@@ -19,7 +19,7 @@
|
||||
"download/download_dir_util.cc",
|
||||
--- a/chrome/browser/browser_process.h
|
||||
+++ b/chrome/browser/browser_process.h
|
||||
@@ -59,10 +59,6 @@ class NetworkQualityTracker;
|
||||
@@ -54,10 +54,6 @@ class NetworkQualityTracker;
|
||||
class SharedURLLoaderFactory;
|
||||
}
|
||||
|
||||
@@ -30,7 +30,7 @@
|
||||
namespace subresource_filter {
|
||||
class RulesetService;
|
||||
}
|
||||
@@ -226,9 +222,6 @@ class BrowserProcess {
|
||||
@@ -214,9 +210,6 @@ class BrowserProcess {
|
||||
// on this platform (or this is a unit test).
|
||||
virtual StatusTray* status_tray() = 0;
|
||||
|
||||
@@ -50,7 +50,7 @@
|
||||
#include "chrome/browser/screen_ai/screen_ai_downloader.h"
|
||||
#include "chrome/browser/shell_integration.h"
|
||||
#include "chrome/browser/site_isolation/prefs_observer.h"
|
||||
@@ -422,8 +421,6 @@ void BrowserProcessImpl::StartTearDown()
|
||||
@@ -420,8 +419,6 @@ void BrowserProcessImpl::StartTearDown()
|
||||
|
||||
metrics_services_manager_.reset();
|
||||
intranet_redirect_detector_.reset();
|
||||
@@ -59,7 +59,7 @@
|
||||
network_time_tracker_.reset();
|
||||
|
||||
#if !BUILDFLAG(IS_ANDROID) && !BUILDFLAG(IS_CHROMEOS_ASH)
|
||||
@@ -1079,14 +1076,6 @@ StatusTray* BrowserProcessImpl::status_t
|
||||
@@ -1057,14 +1054,6 @@ StatusTray* BrowserProcessImpl::status_t
|
||||
return status_tray_.get();
|
||||
}
|
||||
|
||||
@@ -74,7 +74,7 @@
|
||||
subresource_filter::RulesetService*
|
||||
BrowserProcessImpl::subresource_filter_ruleset_service() {
|
||||
DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_);
|
||||
@@ -1322,26 +1311,6 @@ void BrowserProcessImpl::CreateBackgroun
|
||||
@@ -1300,26 +1289,6 @@ void BrowserProcessImpl::CreateBackgroun
|
||||
#endif
|
||||
}
|
||||
|
||||
@@ -103,7 +103,7 @@
|
||||
created_subresource_filter_ruleset_service_ = true;
|
||||
--- a/chrome/browser/browser_process_impl.h
|
||||
+++ b/chrome/browser/browser_process_impl.h
|
||||
@@ -193,7 +193,6 @@ class BrowserProcessImpl : public Browse
|
||||
@@ -190,7 +190,6 @@ class BrowserProcessImpl : public Browse
|
||||
std::unique_ptr<BackgroundModeManager> manager) override;
|
||||
#endif
|
||||
StatusTray* status_tray() override;
|
||||
@@ -111,7 +111,7 @@
|
||||
subresource_filter::RulesetService* subresource_filter_ruleset_service()
|
||||
override;
|
||||
|
||||
@@ -345,9 +344,6 @@ class BrowserProcessImpl : public Browse
|
||||
@@ -341,9 +340,6 @@ class BrowserProcessImpl : public Browse
|
||||
std::unique_ptr<BackgroundModeManager> background_mode_manager_;
|
||||
#endif
|
||||
|
||||
@@ -131,7 +131,7 @@
|
||||
#include "chrome/browser/safe_browsing/verdict_cache_manager_factory.h"
|
||||
#include "chrome/browser/search_engines/template_url_service_factory.h"
|
||||
#include "chrome/browser/share/share_history.h"
|
||||
@@ -625,10 +624,6 @@ void ChromeBrowsingDataRemoverDelegate::
|
||||
@@ -612,10 +611,6 @@ void ChromeBrowsingDataRemoverDelegate::
|
||||
base::RecordAction(UserMetricsAction("ClearBrowsingData_Cookies"));
|
||||
|
||||
network::mojom::NetworkContext* safe_browsing_context = nullptr;
|
||||
@@ -144,7 +144,7 @@
|
||||
browsing_data::RemoveFederatedSiteSettingsData(delete_begin_, delete_end_,
|
||||
--- a/chrome/browser/chrome_content_browser_client.cc
|
||||
+++ b/chrome/browser/chrome_content_browser_client.cc
|
||||
@@ -1061,34 +1061,6 @@ void SetApplicationLocaleOnIOThread(cons
|
||||
@@ -1058,34 +1058,6 @@ void SetApplicationLocaleOnIOThread(cons
|
||||
GetIOThreadApplicationLocale() = locale;
|
||||
}
|
||||
|
||||
@@ -179,7 +179,7 @@
|
||||
#if BUILDFLAG(ENABLE_EXTENSIONS)
|
||||
|
||||
AppLoadedInTabSource ClassifyAppLoadedInTabSource(
|
||||
@@ -4969,14 +4941,9 @@ ChromeContentBrowserClient::CreateThrott
|
||||
@@ -5012,14 +4984,9 @@ ChromeContentBrowserClient::CreateThrott
|
||||
throttles.push_back(std::make_unique<PolicyBlocklistNavigationThrottle>(
|
||||
handle, handle->GetWebContents()->GetBrowserContext()));
|
||||
|
||||
@@ -195,7 +195,7 @@
|
||||
base::BindOnce(&HandleSSLErrorWrapper), base::BindOnce(&IsInHostedApp),
|
||||
base::BindOnce(
|
||||
&ShouldIgnoreSslInterstitialBecauseNavigationDefaultedToHttps)));
|
||||
@@ -5022,16 +4989,6 @@ ChromeContentBrowserClient::CreateThrott
|
||||
@@ -5065,16 +5032,6 @@ ChromeContentBrowserClient::CreateThrott
|
||||
&throttles);
|
||||
#endif
|
||||
|
||||
@@ -212,7 +212,7 @@
|
||||
if (base::FeatureList::IsEnabled(safe_browsing::kDelayedWarnings)) {
|
||||
throttles.push_back(
|
||||
std::make_unique<safe_browsing::DelayedWarningNavigationThrottle>(
|
||||
@@ -5315,8 +5272,6 @@ void ChromeContentBrowserClient::Overrid
|
||||
@@ -5358,8 +5315,6 @@ void ChromeContentBrowserClient::Overrid
|
||||
void ChromeContentBrowserClient::InitOnUIThread() {
|
||||
DCHECK_CURRENTLY_ON(BrowserThread::UI);
|
||||
|
||||
@@ -246,7 +246,7 @@
|
||||
} // namespace
|
||||
--- a/chrome/browser/download/chrome_download_manager_delegate.cc
|
||||
+++ b/chrome/browser/download/chrome_download_manager_delegate.cc
|
||||
@@ -466,13 +466,6 @@ void ChromeDownloadManagerDelegate::SetD
|
||||
@@ -470,13 +470,6 @@ void ChromeDownloadManagerDelegate::SetD
|
||||
|
||||
download_manager_ = dm;
|
||||
|
||||
@@ -260,7 +260,7 @@
|
||||
if (download_manager_) {
|
||||
download_manager_->AddObserver(this);
|
||||
}
|
||||
@@ -837,17 +830,6 @@ void ChromeDownloadManagerDelegate::Choo
|
||||
@@ -841,17 +834,6 @@ void ChromeDownloadManagerDelegate::Choo
|
||||
void ChromeDownloadManagerDelegate::SanitizeSavePackageResourceName(
|
||||
base::FilePath* filename,
|
||||
const GURL& source_url) {
|
||||
@@ -280,7 +280,7 @@
|
||||
void ChromeDownloadManagerDelegate::SanitizeDownloadParameters(
|
||||
--- a/chrome/browser/download/download_item_model.cc
|
||||
+++ b/chrome/browser/download/download_item_model.cc
|
||||
@@ -111,7 +111,7 @@ class DownloadItemModelData : public bas
|
||||
@@ -107,7 +107,7 @@ class DownloadItemModelData : public bas
|
||||
|
||||
// Danger level of the file determined based on the file type and whether
|
||||
// there was a user action associated with the download.
|
||||
@@ -289,7 +289,7 @@
|
||||
|
||||
// Whether the download is currently being revived.
|
||||
bool is_being_revived_;
|
||||
@@ -161,7 +161,7 @@ DownloadItemModelData* DownloadItemModel
|
||||
@@ -157,7 +157,7 @@ DownloadItemModelData* DownloadItemModel
|
||||
DownloadItemModelData::DownloadItemModelData()
|
||||
: should_show_in_shelf_(true),
|
||||
was_ui_notified_(false),
|
||||
@@ -298,7 +298,7 @@
|
||||
is_being_revived_(false) {}
|
||||
|
||||
#if BUILDFLAG(FULL_SAFE_BROWSING)
|
||||
@@ -544,13 +544,13 @@ void DownloadItemModel::SetShouldPreferO
|
||||
@@ -541,13 +541,13 @@ void DownloadItemModel::SetShouldPreferO
|
||||
data->should_prefer_opening_in_browser_ = preference;
|
||||
}
|
||||
|
||||
@@ -315,7 +315,7 @@
|
||||
DownloadItemModelData* data = DownloadItemModelData::GetOrCreate(download_);
|
||||
data->danger_level_ = danger_level;
|
||||
}
|
||||
@@ -729,9 +729,6 @@ bool DownloadItemModel::IsCommandEnabled
|
||||
@@ -726,9 +726,6 @@ bool DownloadItemModel::IsCommandEnabled
|
||||
// filename. Don't base an "Always open" decision based on it. Also
|
||||
// exclude extensions.
|
||||
return download_->CanOpenDownload() &&
|
||||
@@ -412,7 +412,7 @@
|
||||
#include "chrome/browser/download/download_file_icon_extractor.h"
|
||||
#include "chrome/browser/download/download_open_prompt.h"
|
||||
#include "chrome/browser/download/download_prefs.h"
|
||||
@@ -1361,9 +1360,6 @@ DownloadsAcceptDangerFunction::Downloads
|
||||
@@ -1363,9 +1362,6 @@ DownloadsAcceptDangerFunction::Downloads
|
||||
|
||||
DownloadsAcceptDangerFunction::~DownloadsAcceptDangerFunction() {}
|
||||
|
||||
@@ -422,7 +422,7 @@
|
||||
ExtensionFunction::ResponseAction DownloadsAcceptDangerFunction::Run() {
|
||||
absl::optional<downloads::AcceptDanger::Params> params =
|
||||
downloads::AcceptDanger::Params::Create(args());
|
||||
@@ -1401,42 +1397,7 @@ void DownloadsAcceptDangerFunction::Prom
|
||||
@@ -1403,42 +1399,7 @@ void DownloadsAcceptDangerFunction::Prom
|
||||
return;
|
||||
}
|
||||
RecordApiFunctions(DOWNLOADS_FUNCTION_ACCEPT_DANGER);
|
||||
@@ -548,7 +548,7 @@
|
||||
referrer_entries)));
|
||||
--- a/chrome/browser/extensions/api/webstore_private/webstore_private_api.cc
|
||||
+++ b/chrome/browser/extensions/api/webstore_private/webstore_private_api.cc
|
||||
@@ -720,18 +720,6 @@ void WebstorePrivateBeginInstallWithMani
|
||||
@@ -726,18 +726,6 @@ void WebstorePrivateBeginInstallWithMani
|
||||
|
||||
void WebstorePrivateBeginInstallWithManifest3Function::
|
||||
ReportFrictionAcceptedEvent() {
|
||||
@@ -567,7 +567,7 @@
|
||||
}
|
||||
|
||||
void WebstorePrivateBeginInstallWithManifest3Function::OnInstallPromptDone(
|
||||
@@ -1234,55 +1222,9 @@ WebstorePrivateGetReferrerChainFunction:
|
||||
@@ -1258,55 +1246,9 @@ WebstorePrivateGetReferrerChainFunction:
|
||||
|
||||
ExtensionFunction::ResponseAction
|
||||
WebstorePrivateGetReferrerChainFunction::Run() {
|
||||
@@ -756,7 +756,7 @@
|
||||
sources = [
|
||||
"chrome_controller_client.cc",
|
||||
"chrome_controller_client.h",
|
||||
@@ -96,6 +97,7 @@ static_library("safe_browsing") {
|
||||
@@ -100,6 +101,7 @@ static_library("safe_browsing") {
|
||||
"//extensions/browser",
|
||||
]
|
||||
}
|
||||
@@ -764,7 +764,7 @@
|
||||
|
||||
if (safe_browsing_mode != 0) {
|
||||
# "Safe Browsing Basic" files used for safe browsing in full mode
|
||||
@@ -509,6 +511,7 @@ static_library("advanced_protection") {
|
||||
@@ -515,6 +517,7 @@ static_library("advanced_protection") {
|
||||
}
|
||||
|
||||
source_set("metrics_collector") {
|
||||
@@ -772,7 +772,7 @@
|
||||
sources = [
|
||||
"safe_browsing_metrics_collector_factory.cc",
|
||||
"safe_browsing_metrics_collector_factory.h",
|
||||
@@ -528,6 +531,7 @@ source_set("metrics_collector") {
|
||||
@@ -534,6 +537,7 @@ source_set("metrics_collector") {
|
||||
"//components/safe_browsing/core/common:safe_browsing_prefs",
|
||||
"//content/public/browser",
|
||||
]
|
||||
@@ -877,7 +877,7 @@
|
||||
|
||||
--- a/chrome/browser/ui/BUILD.gn
|
||||
+++ b/chrome/browser/ui/BUILD.gn
|
||||
@@ -4736,7 +4736,6 @@ static_library("ui") {
|
||||
@@ -4774,7 +4774,6 @@ static_library("ui") {
|
||||
"views/download/bubble/download_dialog_view.h",
|
||||
"views/download/bubble/download_toolbar_button_view.cc",
|
||||
"views/download/bubble/download_toolbar_button_view.h",
|
||||
@@ -887,7 +887,7 @@
|
||||
"views/download/download_item_view.cc",
|
||||
--- a/chrome/browser/ui/tab_helpers.cc
|
||||
+++ b/chrome/browser/ui/tab_helpers.cc
|
||||
@@ -420,22 +420,6 @@ void TabHelpers::AttachTabHelpers(WebCon
|
||||
@@ -425,22 +425,6 @@ void TabHelpers::AttachTabHelpers(WebCon
|
||||
// See https://crbug.com/910288.
|
||||
resource_coordinator::ResourceCoordinatorTabHelper::CreateForWebContents(
|
||||
web_contents);
|
||||
|
||||
@@ -36,7 +36,7 @@
|
||||
{
|
||||
--- a/chrome/browser/extensions/webstore_installer.cc
|
||||
+++ b/chrome/browser/extensions/webstore_installer.cc
|
||||
@@ -536,20 +536,6 @@ void WebstoreInstaller::DownloadNextPend
|
||||
@@ -520,20 +520,6 @@ void WebstoreInstaller::DownloadNextPend
|
||||
void WebstoreInstaller::DownloadCrx(
|
||||
const std::string& extension_id,
|
||||
InstallSource source) {
|
||||
@@ -57,7 +57,7 @@
|
||||
}
|
||||
|
||||
// http://crbug.com/165634
|
||||
@@ -693,25 +679,6 @@ void WebstoreInstaller::UpdateDownloadPr
|
||||
@@ -677,25 +663,6 @@ void WebstoreInstaller::UpdateDownloadPr
|
||||
void WebstoreInstaller::StartCrxInstaller(const DownloadItem& download) {
|
||||
DCHECK_CURRENTLY_ON(BrowserThread::UI);
|
||||
DCHECK(!crx_installer_.get());
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
--- a/net/dns/host_resolver_manager.cc
|
||||
+++ b/net/dns/host_resolver_manager.cc
|
||||
@@ -157,10 +157,10 @@ const unsigned kMinimumTTLSeconds = kCac
|
||||
@@ -158,10 +158,10 @@ const unsigned kMinimumTTLSeconds = kCac
|
||||
// cached.
|
||||
const int kIPv6ProbePeriodMs = 1000;
|
||||
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
|
||||
--- a/BUILD.gn
|
||||
+++ b/BUILD.gn
|
||||
@@ -451,14 +451,6 @@ group("gn_all") {
|
||||
@@ -454,14 +454,6 @@ group("gn_all") {
|
||||
deps += [ "//chromeos:chromeos_unittests" ]
|
||||
}
|
||||
|
||||
|
||||
@@ -88,17 +88,6 @@ by default.
|
||||
|
||||
// A custom extensions::ExternalLoader that the ServicesCustomizationDocument
|
||||
// creates and uses to publish OEM default apps to the extensions system.
|
||||
--- a/chrome/browser/ash/extensions/file_manager/private_api_misc.cc
|
||||
+++ b/chrome/browser/ash/extensions/file_manager/private_api_misc.cc
|
||||
@@ -93,7 +93,7 @@ namespace {
|
||||
|
||||
using api::file_manager_private::ProfileInfo;
|
||||
|
||||
-const char kCWSScope[] = "https://www.googleapis.com/auth/chromewebstore";
|
||||
+const char kCWSScope[] = "trk:209:https://www.googleapis.com/auth/chromewebstore";
|
||||
|
||||
// Thresholds for mountCrostini() API.
|
||||
constexpr base::TimeDelta kMountCrostiniSlowOperationThreshold =
|
||||
--- a/chrome/browser/extensions/install_signer.cc
|
||||
+++ b/chrome/browser/extensions/install_signer.cc
|
||||
@@ -63,7 +63,7 @@ const int kSignatureFormatVersion = 2;
|
||||
@@ -123,7 +112,7 @@ by default.
|
||||
scoped_refptr<base::SequencedTaskRunner> task_runner)
|
||||
--- a/chrome/browser/media/webrtc/webrtc_log_uploader.cc
|
||||
+++ b/chrome/browser/media/webrtc/webrtc_log_uploader.cc
|
||||
@@ -498,7 +498,7 @@ void WebRtcLogUploader::UploadCompressed
|
||||
@@ -499,7 +499,7 @@ void WebRtcLogUploader::UploadCompressed
|
||||
}
|
||||
})");
|
||||
|
||||
@@ -465,7 +454,7 @@ by default.
|
||||
const char kExtensionsMenuUtmSource[] = "ext_extensions_menu";
|
||||
--- a/google_apis/gaia/gaia_constants.cc
|
||||
+++ b/google_apis/gaia/gaia_constants.cc
|
||||
@@ -14,153 +14,153 @@ const char kChromeSource[] = "ChromiumBr
|
||||
@@ -14,157 +14,157 @@ const char kChromeSource[] = "ChromiumBr
|
||||
const char kUnexpectedServiceResponse[] = "UnexpectedServiceResponse";
|
||||
|
||||
// OAuth scopes.
|
||||
@@ -606,6 +595,11 @@ by default.
|
||||
-const char kDriveOAuth2Scope[] = "https://www.googleapis.com/auth/drive";
|
||||
+const char kDriveOAuth2Scope[] = "trk:097:https://www.googleapis.com/auth/drive";
|
||||
|
||||
// OAuth2 scope for access for DriveFS to access flags.
|
||||
const char kExperimentsAndConfigsOAuth2Scope[] =
|
||||
- "https://www.googleapis.com/auth/experimentsandconfigs";
|
||||
+ "trk:209:https://www.googleapis.com/auth/experimentsandconfigs";
|
||||
|
||||
// The scope required for an access token in order to query ItemSuggest.
|
||||
const char kDriveReadOnlyOAuth2Scope[] =
|
||||
- "https://www.googleapis.com/auth/drive.readonly";
|
||||
|
||||
@@ -67,7 +67,7 @@ the URL so we get notified if this happens again in the future).
|
||||
}
|
||||
--- a/components/security_interstitials/core/safe_browsing_loud_error_ui.cc
|
||||
+++ b/components/security_interstitials/core/safe_browsing_loud_error_ui.cc
|
||||
@@ -25,11 +25,11 @@ namespace {
|
||||
@@ -26,11 +26,11 @@ namespace {
|
||||
// For malware interstitial pages, we link the problematic URL to Google's
|
||||
// diagnostic page.
|
||||
const char kSbDiagnosticUrl[] =
|
||||
|
||||
@@ -13,7 +13,7 @@ This prevents trk:148 (phishing) and trk:149 (malware).
|
||||
|
||||
--- a/components/safe_browsing/content/browser/client_side_detection_service.cc
|
||||
+++ b/components/safe_browsing/content/browser/client_side_detection_service.cc
|
||||
@@ -238,6 +238,10 @@ void ClientSideDetectionService::StartCl
|
||||
@@ -248,6 +248,10 @@ void ClientSideDetectionService::StartCl
|
||||
return;
|
||||
}
|
||||
|
||||
@@ -24,7 +24,7 @@ This prevents trk:148 (phishing) and trk:149 (malware).
|
||||
std::string request_data;
|
||||
request->SerializeToString(&request_data);
|
||||
|
||||
@@ -324,6 +328,7 @@ void ClientSideDetectionService::StartCl
|
||||
@@ -334,6 +338,7 @@ void ClientSideDetectionService::StartCl
|
||||
base::BindOnce(&WebUIInfoSingleton::AddToClientPhishingRequestsSent,
|
||||
base::Unretained(WebUIInfoSingleton::GetInstance()),
|
||||
std::move(request), access_token));
|
||||
|
||||
@@ -41,7 +41,7 @@
|
||||
</script>
|
||||
--- a/chrome/browser/search/background/ntp_background_service.cc
|
||||
+++ b/chrome/browser/search/background/ntp_background_service.cc
|
||||
@@ -91,6 +91,7 @@ void NtpBackgroundService::Shutdown() {
|
||||
@@ -93,6 +93,7 @@ void NtpBackgroundService::Shutdown() {
|
||||
}
|
||||
|
||||
void NtpBackgroundService::FetchCollectionInfo() {
|
||||
|
||||
@@ -23,7 +23,7 @@
|
||||
url.SchemeIs(dom_distiller::kDomDistillerScheme))
|
||||
--- a/chrome/browser/ui/singleton_tabs.cc
|
||||
+++ b/chrome/browser/ui/singleton_tabs.cc
|
||||
@@ -97,7 +97,8 @@ int GetIndexOfExistingTab(Browser* brows
|
||||
@@ -123,7 +123,8 @@ int GetIndexOfExistingTab(Browser* brows
|
||||
// RewriteURLIfNecessary removes the "view-source:" scheme which could lead
|
||||
// to incorrect matching, so ensure that the target and the candidate are
|
||||
// either both view-source:, or neither is.
|
||||
@@ -60,7 +60,7 @@
|
||||
return GURL(parts.scheme.is_valid() ? text : FixupPath(text));
|
||||
--- a/content/browser/child_process_security_policy_impl.cc
|
||||
+++ b/content/browser/child_process_security_policy_impl.cc
|
||||
@@ -781,6 +781,7 @@ ChildProcessSecurityPolicyImpl::ChildPro
|
||||
@@ -811,6 +811,7 @@ ChildProcessSecurityPolicyImpl::ChildPro
|
||||
RegisterWebSafeScheme(url::kWssScheme);
|
||||
#endif // BUILDFLAG(ENABLE_WEBSOCKETS)
|
||||
RegisterWebSafeScheme(url::kDataScheme);
|
||||
@@ -70,7 +70,7 @@
|
||||
// other origins, so we should not treat them as web safe. Remove callers of
|
||||
--- a/net/BUILD.gn
|
||||
+++ b/net/BUILD.gn
|
||||
@@ -1032,6 +1032,8 @@ component("net") {
|
||||
@@ -1031,6 +1031,8 @@ component("net") {
|
||||
"url_request/report_sender.h",
|
||||
"url_request/static_http_user_agent_settings.cc",
|
||||
"url_request/static_http_user_agent_settings.h",
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
|
||||
--- a/chrome/browser/chrome_content_browser_client.cc
|
||||
+++ b/chrome/browser/chrome_content_browser_client.cc
|
||||
@@ -2568,7 +2568,8 @@ void ChromeContentBrowserClient::AppendE
|
||||
@@ -2572,7 +2572,8 @@ void ChromeContentBrowserClient::AppendE
|
||||
command_line->AppendSwitchASCII(switches::kMetricsClientID,
|
||||
client_info->client_id);
|
||||
}
|
||||
|
||||
@@ -10,7 +10,7 @@
|
||||
std::vector<GURL> endpoints;
|
||||
endpoints.push_back(gservices_settings_.GetMCSMainEndpoint());
|
||||
GURL fallback_endpoint = gservices_settings_.GetMCSFallbackEndpoint();
|
||||
@@ -654,32 +655,6 @@ void GCMClientImpl::RemoveHeartbeatInter
|
||||
@@ -654,28 +655,6 @@ void GCMClientImpl::RemoveHeartbeatInter
|
||||
|
||||
void GCMClientImpl::StartCheckin() {
|
||||
DCHECK(io_task_runner_->RunsTasksInCurrentSequence());
|
||||
@@ -23,14 +23,10 @@
|
||||
- ToCheckinProtoVersion(chrome_build_info_, &chrome_build_proto);
|
||||
-
|
||||
- std::map<std::string, std::string> empty_account_tokens;
|
||||
- bool include_account_tokens = base::FeatureList::IsEnabled(
|
||||
- features::kGCMIncludeAccountTokensInCheckinRequest);
|
||||
-
|
||||
- CheckinRequest::RequestInfo request_info(
|
||||
- device_checkin_info_.android_id, device_checkin_info_.secret,
|
||||
- include_account_tokens ? device_checkin_info_.account_tokens
|
||||
- : empty_account_tokens,
|
||||
- gservices_settings_.digest(), chrome_build_proto);
|
||||
- empty_account_tokens, gservices_settings_.digest(), chrome_build_proto);
|
||||
- checkin_request_ = std::make_unique<CheckinRequest>(
|
||||
- gservices_settings_.GetCheckinURL(), request_info, GetGCMBackoffPolicy(),
|
||||
- base::BindOnce(&GCMClientImpl::OnCheckinCompleted,
|
||||
@@ -43,7 +39,7 @@
|
||||
}
|
||||
|
||||
void GCMClientImpl::OnCheckinCompleted(
|
||||
@@ -736,24 +711,6 @@ void GCMClientImpl::SetGServicesSettings
|
||||
@@ -732,24 +711,6 @@ void GCMClientImpl::SetGServicesSettings
|
||||
|
||||
void GCMClientImpl::SchedulePeriodicCheckin() {
|
||||
DCHECK(io_task_runner_->RunsTasksInCurrentSequence());
|
||||
|
||||
@@ -5,7 +5,7 @@
|
||||
|
||||
--- a/components/network_time/network_time_tracker.cc
|
||||
+++ b/components/network_time/network_time_tracker.cc
|
||||
@@ -292,7 +292,7 @@ void NetworkTimeTracker::UpdateNetworkTi
|
||||
@@ -289,7 +289,7 @@ void NetworkTimeTracker::UpdateNetworkTi
|
||||
}
|
||||
|
||||
bool NetworkTimeTracker::AreTimeFetchesEnabled() const {
|
||||
|
||||
@@ -11,7 +11,7 @@
|
||||
registry->RegisterBooleanPref(prefs::kPrivacySandboxM1ConsentDecisionMade,
|
||||
--- a/components/privacy_sandbox/privacy_sandbox_settings_impl.cc
|
||||
+++ b/components/privacy_sandbox/privacy_sandbox_settings_impl.cc
|
||||
@@ -70,7 +70,7 @@ base::Value::Dict CreateBlockedTopicEntr
|
||||
@@ -92,7 +92,7 @@ base::Value::Dict CreateBlockedTopicEntr
|
||||
|
||||
// static
|
||||
bool PrivacySandboxSettingsImpl::IsAllowed(Status status) {
|
||||
@@ -19,8 +19,8 @@
|
||||
+ return false;
|
||||
}
|
||||
|
||||
PrivacySandboxSettingsImpl::PrivacySandboxSettingsImpl(
|
||||
@@ -512,20 +512,7 @@ bool PrivacySandboxSettingsImpl::IsPriva
|
||||
// static
|
||||
@@ -596,20 +596,7 @@ bool PrivacySandboxSettingsImpl::IsPriva
|
||||
}
|
||||
|
||||
bool PrivacySandboxSettingsImpl::IsPrivacySandboxEnabled() const {
|
||||
@@ -42,7 +42,7 @@
|
||||
}
|
||||
|
||||
void PrivacySandboxSettingsImpl::SetAllPrivacySandboxAllowedForTesting() {
|
||||
@@ -550,11 +537,10 @@ void PrivacySandboxSettingsImpl::SetTopi
|
||||
@@ -634,11 +621,10 @@ void PrivacySandboxSettingsImpl::SetTopi
|
||||
}
|
||||
|
||||
void PrivacySandboxSettingsImpl::SetPrivacySandboxEnabled(bool enabled) {
|
||||
@@ -55,7 +55,7 @@
|
||||
}
|
||||
|
||||
bool PrivacySandboxSettingsImpl::IsPrivacySandboxCurrentlyUnrestricted() const {
|
||||
@@ -657,11 +643,7 @@ PrivacySandboxSettingsImpl::GetPrivacySa
|
||||
@@ -726,11 +712,7 @@ PrivacySandboxSettingsImpl::GetPrivacySa
|
||||
return Status::kIncognitoProfile;
|
||||
}
|
||||
|
||||
@@ -80,12 +80,12 @@
|
||||
kPrivacySandboxAggregationServiceTrustedServerUrlAwsParam{
|
||||
--- a/third_party/blink/common/features.cc
|
||||
+++ b/third_party/blink/common/features.cc
|
||||
@@ -137,7 +137,7 @@ BASE_FEATURE(kBlockingDownloadsInAdFrame
|
||||
@@ -521,7 +521,7 @@ BASE_FEATURE(kContentCaptureConstantStre
|
||||
// Controls whether the Conversion Measurement API infrastructure is enabled.
|
||||
BASE_FEATURE(kConversionMeasurement,
|
||||
"ConversionMeasurement",
|
||||
- base::FEATURE_ENABLED_BY_DEFAULT);
|
||||
+ base::FEATURE_DISABLED_BY_DEFAULT);
|
||||
|
||||
// Controls whether LCP calculations should exclude low-entropy images. If
|
||||
// enabled, then the associated parameter sets the cutoff, expressed as the
|
||||
BASE_FEATURE(kCorrectFloatExtensionTestForWebGL,
|
||||
"CorrectFloatExtensionTestForWebGL",
|
||||
|
||||
@@ -1,37 +0,0 @@
|
||||
# Disables browser sign-in
|
||||
|
||||
--- a/chrome/browser/ui/chrome_pages.cc
|
||||
+++ b/chrome/browser/ui/chrome_pages.cc
|
||||
@@ -621,32 +621,6 @@ void ShowShortcutCustomizationApp(Profil
|
||||
void ShowBrowserSignin(Browser* browser,
|
||||
signin_metrics::AccessPoint access_point,
|
||||
signin::ConsentLevel consent_level) {
|
||||
- Profile* original_profile = browser->profile()->GetOriginalProfile();
|
||||
- DCHECK(original_profile->GetPrefs()->GetBoolean(prefs::kSigninAllowed));
|
||||
-
|
||||
- // If the browser's profile is an incognito profile, make sure to use
|
||||
- // a browser window from the original profile. The user cannot sign in
|
||||
- // from an incognito window.
|
||||
- auto displayer =
|
||||
- std::make_unique<ScopedTabbedBrowserDisplayer>(original_profile);
|
||||
- browser = displayer->browser();
|
||||
-
|
||||
- profiles::BubbleViewMode bubble_view_mode;
|
||||
- if (IdentityManagerFactory::GetForProfile(original_profile)
|
||||
- ->HasPrimaryAccount(signin::ConsentLevel::kSync)) {
|
||||
- bubble_view_mode = profiles::BUBBLE_VIEW_MODE_GAIA_REAUTH;
|
||||
- } else {
|
||||
- switch (consent_level) {
|
||||
- case signin::ConsentLevel::kSync:
|
||||
- bubble_view_mode = profiles::BUBBLE_VIEW_MODE_GAIA_SIGNIN;
|
||||
- break;
|
||||
- case signin::ConsentLevel::kSignin:
|
||||
- bubble_view_mode = profiles::BUBBLE_VIEW_MODE_GAIA_ADD_ACCOUNT;
|
||||
- break;
|
||||
- }
|
||||
- }
|
||||
-
|
||||
- browser->signin_view_controller()->ShowSignin(bubble_view_mode, access_point);
|
||||
}
|
||||
|
||||
void ShowBrowserSigninOrSettings(Browser* browser,
|
||||
@@ -0,0 +1,168 @@
|
||||
--- a/chrome/android/chrome_test_java_sources.gni
|
||||
+++ b/chrome/android/chrome_test_java_sources.gni
|
||||
@@ -193,7 +193,6 @@ chrome_test_java_sources = [
|
||||
"javatests/src/org/chromium/chrome/browser/download/OMADownloadHandlerTest.java",
|
||||
"javatests/src/org/chromium/chrome/browser/download/ServicificationDownloadTest.java",
|
||||
"javatests/src/org/chromium/chrome/browser/download/dialogs/DownloadDialogIncognitoTest.java",
|
||||
- "javatests/src/org/chromium/chrome/browser/environment_integrity/EnvironmentIntegrityTest.java",
|
||||
"javatests/src/org/chromium/chrome/browser/externalnav/UrlOverridingTest.java",
|
||||
"javatests/src/org/chromium/chrome/browser/feature_engagement/ScreenshotTabObserverTest.java",
|
||||
"javatests/src/org/chromium/chrome/browser/feedback/ChromeFeedbackCollectorTest.java",
|
||||
--- a/content/browser/BUILD.gn
|
||||
+++ b/content/browser/BUILD.gn
|
||||
@@ -906,8 +906,6 @@ source_set("browser") {
|
||||
"download/save_package_serialization_handler.h",
|
||||
"download/save_types.cc",
|
||||
"download/save_types.h",
|
||||
- "environment_integrity/environment_integrity_service_impl.cc",
|
||||
- "environment_integrity/environment_integrity_service_impl.h",
|
||||
"eye_dropper_chooser_impl.cc",
|
||||
"eye_dropper_chooser_impl.h",
|
||||
"feature_observer.cc",
|
||||
--- a/content/browser/browser_interface_binders.cc
|
||||
+++ b/content/browser/browser_interface_binders.cc
|
||||
@@ -125,7 +125,6 @@
|
||||
#include "third_party/blink/public/mojom/cookie_store/cookie_store.mojom.h"
|
||||
#include "third_party/blink/public/mojom/credentialmanagement/credential_manager.mojom.h"
|
||||
#include "third_party/blink/public/mojom/device/device.mojom.h"
|
||||
-#include "third_party/blink/public/mojom/environment_integrity/environment_integrity_service.mojom.h"
|
||||
#include "third_party/blink/public/mojom/feature_observer/feature_observer.mojom.h"
|
||||
#include "third_party/blink/public/mojom/file/file_utilities.mojom.h"
|
||||
#include "third_party/blink/public/mojom/file_system_access/file_system_access_manager.mojom.h"
|
||||
@@ -181,7 +180,6 @@
|
||||
#if BUILDFLAG(IS_ANDROID)
|
||||
#include "content/browser/android/date_time_chooser_android.h"
|
||||
#include "content/browser/android/text_suggestion_host_android.h"
|
||||
-#include "content/browser/environment_integrity/environment_integrity_service_impl.h"
|
||||
#include "content/browser/renderer_host/render_widget_host_view_android.h"
|
||||
#include "services/device/public/mojom/nfc.mojom.h"
|
||||
#include "third_party/blink/public/mojom/hid/hid.mojom.h"
|
||||
@@ -1199,17 +1197,9 @@ void PopulateBinderMapWithContext(
|
||||
base::BindRepeating(&BindDateTimeChooserForFrame));
|
||||
map->Add<blink::mojom::TextSuggestionHost>(
|
||||
base::BindRepeating(&BindTextSuggestionHostForFrame));
|
||||
- if (base::FeatureList::IsEnabled(features::kWebEnvironmentIntegrity)) {
|
||||
- map->Add<blink::mojom::EnvironmentIntegrityService>(
|
||||
- base::BindRepeating(&EnvironmentIntegrityServiceImpl::Create));
|
||||
- }
|
||||
#else
|
||||
map->Add<blink::mojom::TextSuggestionHost>(base::BindRepeating(
|
||||
&EmptyBinderForFrame<blink::mojom::TextSuggestionHost>));
|
||||
- if (base::FeatureList::IsEnabled(features::kWebEnvironmentIntegrity)) {
|
||||
- map->Add<blink::mojom::EnvironmentIntegrityService>(base::BindRepeating(
|
||||
- &EmptyBinderForFrame<blink::mojom::EnvironmentIntegrityService>));
|
||||
- }
|
||||
#endif // BUILDFLAG(IS_ANDROID)
|
||||
|
||||
map->Add<blink::mojom::ClipboardHost>(
|
||||
--- a/content/browser/environment_integrity/environment_integrity_service_impl.cc
|
||||
+++ b/content/browser/environment_integrity/environment_integrity_service_impl.cc
|
||||
@@ -20,17 +20,10 @@ EnvironmentIntegrityServiceImpl::~Enviro
|
||||
void EnvironmentIntegrityServiceImpl::Create(
|
||||
content::RenderFrameHost* render_frame_host,
|
||||
mojo::PendingReceiver<blink::mojom::EnvironmentIntegrityService> receiver) {
|
||||
- CHECK(render_frame_host);
|
||||
-
|
||||
- // The object is bound to the lifetime of `render_frame_host` and the mojo
|
||||
- // connection. See DocumentService for details.
|
||||
- new EnvironmentIntegrityServiceImpl(*render_frame_host, std::move(receiver));
|
||||
}
|
||||
|
||||
void EnvironmentIntegrityServiceImpl::GetEnvironmentIntegrity(
|
||||
GetEnvironmentIntegrityCallback callback) {
|
||||
- // TODO(crbug.com/1439945) Get integrity token from PIA Crystal API.
|
||||
- std::move(callback).Run();
|
||||
}
|
||||
|
||||
} // namespace content
|
||||
--- a/content/child/runtime_features.cc
|
||||
+++ b/content/child/runtime_features.cc
|
||||
@@ -396,8 +396,6 @@ void SetRuntimeFeaturesFromChromiumFeatu
|
||||
{"WebAppTabStrip", raw_ref(features::kDesktopPWAsTabStrip)},
|
||||
{"WebAppTabStripCustomizations",
|
||||
raw_ref(blink::features::kDesktopPWAsTabStripCustomizations)},
|
||||
- {"WebEnvironmentIntegrity",
|
||||
- raw_ref(features::kWebEnvironmentIntegrity)},
|
||||
{"WebSerialBluetooth",
|
||||
raw_ref(features::kEnableBluetoothSerialPortProfileInSerialApi)},
|
||||
{"WGIGamepadTriggerRumble",
|
||||
--- a/content/public/common/content_features.cc
|
||||
+++ b/content/public/common/content_features.cc
|
||||
@@ -1433,10 +1433,6 @@ BASE_FEATURE(kWebBluetoothNewPermissions
|
||||
"WebBluetoothNewPermissionsBackend",
|
||||
base::FEATURE_DISABLED_BY_DEFAULT);
|
||||
|
||||
-// Enables the Web Environment Integrity API.
|
||||
-BASE_FEATURE(kWebEnvironmentIntegrity,
|
||||
- "WebEnvironmentIntegrity",
|
||||
- base::FEATURE_DISABLED_BY_DEFAULT);
|
||||
|
||||
// If WebGL Image Chromium is allowed, this feature controls whether it is
|
||||
// enabled.
|
||||
--- a/content/public/common/content_features.h
|
||||
+++ b/content/public/common/content_features.h
|
||||
@@ -318,7 +318,6 @@ CONTENT_EXPORT BASE_DECLARE_FEATURE(kWeb
|
||||
CONTENT_EXPORT BASE_DECLARE_FEATURE(kWebAuthnTouchToFillCredentialSelection);
|
||||
CONTENT_EXPORT BASE_DECLARE_FEATURE(kWebBluetooth);
|
||||
CONTENT_EXPORT BASE_DECLARE_FEATURE(kWebBluetoothNewPermissionsBackend);
|
||||
-CONTENT_EXPORT BASE_DECLARE_FEATURE(kWebEnvironmentIntegrity);
|
||||
CONTENT_EXPORT BASE_DECLARE_FEATURE(kWebGLImageChromium);
|
||||
CONTENT_EXPORT BASE_DECLARE_FEATURE(kWebMidi);
|
||||
CONTENT_EXPORT BASE_DECLARE_FEATURE(kWebOtpBackendAuto);
|
||||
--- a/third_party/blink/public/mojom/BUILD.gn
|
||||
+++ b/third_party/blink/public/mojom/BUILD.gn
|
||||
@@ -65,7 +65,6 @@ mojom("mojom_platform") {
|
||||
"dom_storage/session_storage_namespace.mojom",
|
||||
"dom_storage/storage_area.mojom",
|
||||
"drag/drag.mojom",
|
||||
- "environment_integrity/environment_integrity_service.mojom",
|
||||
"favicon/favicon_url.mojom",
|
||||
"feature_observer/feature_observer.mojom",
|
||||
"fenced_frame/fenced_frame_config.mojom",
|
||||
--- a/third_party/blink/renderer/bindings/generated_in_modules.gni
|
||||
+++ b/third_party/blink/renderer/bindings/generated_in_modules.gni
|
||||
@@ -1883,8 +1883,6 @@ generated_interface_sources_in_modules =
|
||||
"$root_gen_dir/third_party/blink/renderer/bindings/modules/v8/v8_encoded_audio_chunk.h",
|
||||
"$root_gen_dir/third_party/blink/renderer/bindings/modules/v8/v8_encoded_video_chunk.cc",
|
||||
"$root_gen_dir/third_party/blink/renderer/bindings/modules/v8/v8_encoded_video_chunk.h",
|
||||
- "$root_gen_dir/third_party/blink/renderer/bindings/modules/v8/v8_environment_integrity.cc",
|
||||
- "$root_gen_dir/third_party/blink/renderer/bindings/modules/v8/v8_environment_integrity.h",
|
||||
"$root_gen_dir/third_party/blink/renderer/bindings/modules/v8/v8_entry.cc",
|
||||
"$root_gen_dir/third_party/blink/renderer/bindings/modules/v8/v8_entry.h",
|
||||
"$root_gen_dir/third_party/blink/renderer/bindings/modules/v8/v8_entry_sync.cc",
|
||||
--- a/third_party/blink/renderer/bindings/idl_in_modules.gni
|
||||
+++ b/third_party/blink/renderer/bindings/idl_in_modules.gni
|
||||
@@ -242,8 +242,6 @@ static_idl_files_in_modules = get_path_i
|
||||
"//third_party/blink/renderer/modules/encryptedmedia/media_keys_get_status_for_policy.idl",
|
||||
"//third_party/blink/renderer/modules/encryptedmedia/media_keys_policy.idl",
|
||||
"//third_party/blink/renderer/modules/encryptedmedia/navigator_request_media_key_system_access.idl",
|
||||
- "//third_party/blink/renderer/modules/environment_integrity/environment_integrity.idl",
|
||||
- "//third_party/blink/renderer/modules/environment_integrity/navigator_environment_integrity.idl",
|
||||
"//third_party/blink/renderer/modules/eventsource/event_source.idl",
|
||||
"//third_party/blink/renderer/modules/eventsource/event_source_init.idl",
|
||||
"//third_party/blink/renderer/modules/eyedropper/color_selection_options.idl",
|
||||
--- a/third_party/blink/renderer/modules/BUILD.gn
|
||||
+++ b/third_party/blink/renderer/modules/BUILD.gn
|
||||
@@ -90,7 +90,6 @@ component("modules") {
|
||||
"//third_party/blink/renderer/modules/donottrack",
|
||||
"//third_party/blink/renderer/modules/encoding",
|
||||
"//third_party/blink/renderer/modules/encryptedmedia",
|
||||
- "//third_party/blink/renderer/modules/environment_integrity",
|
||||
"//third_party/blink/renderer/modules/eventsource",
|
||||
"//third_party/blink/renderer/modules/exported",
|
||||
"//third_party/blink/renderer/modules/eyedropper",
|
||||
--- a/third_party/blink/renderer/platform/runtime_enabled_features.json5
|
||||
+++ b/third_party/blink/renderer/platform/runtime_enabled_features.json5
|
||||
@@ -3918,12 +3918,6 @@
|
||||
base_feature: "none",
|
||||
},
|
||||
{
|
||||
- name: "WebEnvironmentIntegrity",
|
||||
- status: "experimental",
|
||||
- base_feature: "none",
|
||||
- origin_trial_feature_name: "WebEnvironmentIntegrity",
|
||||
- },
|
||||
- {
|
||||
name: "WebFontResizeLCP",
|
||||
status: "experimental",
|
||||
},
|
||||
@@ -2,7 +2,7 @@
|
||||
|
||||
--- a/chrome/browser/media/webrtc/webrtc_log_uploader.cc
|
||||
+++ b/chrome/browser/media/webrtc/webrtc_log_uploader.cc
|
||||
@@ -127,30 +127,13 @@ void WebRtcLogUploader::OnLoggingStopped
|
||||
@@ -128,30 +128,13 @@ void WebRtcLogUploader::OnLoggingStopped
|
||||
DCHECK(meta_data.get());
|
||||
DCHECK(!upload_done_data.paths.directory.empty());
|
||||
|
||||
@@ -34,7 +34,7 @@
|
||||
} else {
|
||||
main_task_runner_->PostTask(
|
||||
FROM_HERE,
|
||||
@@ -167,28 +150,7 @@ void WebRtcLogUploader::PrepareMultipart
|
||||
@@ -168,28 +151,7 @@ void WebRtcLogUploader::PrepareMultipart
|
||||
DCHECK(!compressed_log.empty());
|
||||
DCHECK(meta_data.get());
|
||||
|
||||
@@ -64,7 +64,7 @@
|
||||
}
|
||||
|
||||
void WebRtcLogUploader::UploadStoredLog(
|
||||
@@ -254,50 +216,6 @@ void WebRtcLogUploader::LoggingStoppedDo
|
||||
@@ -255,50 +217,6 @@ void WebRtcLogUploader::LoggingStoppedDo
|
||||
DCHECK(log_buffer.get());
|
||||
DCHECK(!log_paths.directory.empty());
|
||||
|
||||
@@ -117,7 +117,7 @@
|
||||
|
||||
--- a/chrome/browser/ui/browser_ui_prefs.cc
|
||||
+++ b/chrome/browser/ui/browser_ui_prefs.cc
|
||||
@@ -96,7 +96,7 @@ void RegisterBrowserUserPrefs(user_prefs
|
||||
@@ -98,7 +98,7 @@ void RegisterBrowserUserPrefs(user_prefs
|
||||
registry->RegisterBooleanPref(prefs::kWebRtcEventLogCollectionAllowed, false);
|
||||
registry->RegisterListPref(prefs::kWebRtcLocalIpsAllowedUrls);
|
||||
registry->RegisterBooleanPref(prefs::kWebRTCAllowLegacyTLSProtocols, false);
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
--- a/chrome/common/chrome_features.cc
|
||||
+++ b/chrome/common/chrome_features.cc
|
||||
@@ -352,12 +352,7 @@ BASE_FEATURE(kDisruptiveNotificationPerm
|
||||
@@ -348,12 +348,7 @@ BASE_FEATURE(kDisruptiveNotificationPerm
|
||||
// Enable DNS over HTTPS (DoH).
|
||||
BASE_FEATURE(kDnsOverHttps,
|
||||
"DnsOverHttps",
|
||||
@@ -50,7 +50,7 @@
|
||||
DohProviderIij, base::FEATURE_ENABLED_BY_DEFAULT),
|
||||
--- a/services/network/public/cpp/features.cc
|
||||
+++ b/services/network/public/cpp/features.cc
|
||||
@@ -88,12 +88,7 @@ BASE_FEATURE(kSplitAuthCacheByNetworkIso
|
||||
@@ -95,12 +95,7 @@ BASE_FEATURE(kSplitAuthCacheByNetworkIso
|
||||
// Enable usage of hardcoded DoH upgrade mapping for use in automatic mode.
|
||||
BASE_FEATURE(kDnsOverHttpsUpgrade,
|
||||
"DnsOverHttpsUpgrade",
|
||||
|
||||
@@ -25,7 +25,7 @@
|
||||
testonly = true
|
||||
--- a/content/shell/BUILD.gn
|
||||
+++ b/content/shell/BUILD.gn
|
||||
@@ -726,10 +726,6 @@ if (is_apple) {
|
||||
@@ -728,10 +728,6 @@ if (is_apple) {
|
||||
deps = [ "//third_party/icu:icudata" ]
|
||||
}
|
||||
|
||||
|
||||
@@ -11,7 +11,7 @@
|
||||
"component_updater/chrome_component_updater_configurator.cc",
|
||||
"component_updater/chrome_component_updater_configurator.h",
|
||||
"component_updater/chrome_origin_trials_component_installer.cc",
|
||||
@@ -619,8 +617,6 @@ static_library("browser") {
|
||||
@@ -627,8 +625,6 @@ static_library("browser") {
|
||||
"internal_auth.h",
|
||||
"interstitials/chrome_settings_page_helper.cc",
|
||||
"interstitials/chrome_settings_page_helper.h",
|
||||
@@ -19,8 +19,8 @@
|
||||
- "interstitials/enterprise_util.h",
|
||||
"invalidation/profile_invalidation_provider_factory.cc",
|
||||
"invalidation/profile_invalidation_provider_factory.h",
|
||||
"ip_protection/ip_protection_auth_token_getter.cc",
|
||||
@@ -3651,10 +3647,6 @@ static_library("browser") {
|
||||
"ip_protection/blind_sign_http_impl.cc",
|
||||
@@ -3643,10 +3639,6 @@ static_library("browser") {
|
||||
"enterprise/connectors/analysis/analysis_service_settings.h",
|
||||
"enterprise/connectors/analysis/analysis_settings.cc",
|
||||
"enterprise/connectors/analysis/analysis_settings.h",
|
||||
@@ -31,7 +31,7 @@
|
||||
"enterprise/connectors/analysis/content_analysis_dialog.cc",
|
||||
"enterprise/connectors/analysis/content_analysis_dialog.h",
|
||||
"enterprise/connectors/analysis/content_analysis_downloads_delegate.cc",
|
||||
@@ -3951,10 +3943,6 @@ static_library("browser") {
|
||||
@@ -3947,10 +3939,6 @@ static_library("browser") {
|
||||
"new_tab_page/modules/recipes/recipes_service_factory.h",
|
||||
"new_tab_page/modules/recipes/time_format_util.cc",
|
||||
"new_tab_page/modules/recipes/time_format_util.h",
|
||||
@@ -42,7 +42,7 @@
|
||||
"new_tab_page/new_tab_page_util.cc",
|
||||
"new_tab_page/new_tab_page_util.h",
|
||||
"new_tab_page/one_google_bar/one_google_bar_data.cc",
|
||||
@@ -4425,7 +4413,6 @@ static_library("browser") {
|
||||
@@ -4422,7 +4410,6 @@ static_library("browser") {
|
||||
"//chrome/browser/new_tab_page/modules/history_clusters/cart:mojo_bindings",
|
||||
"//chrome/browser/new_tab_page/modules/photos:mojo_bindings",
|
||||
"//chrome/browser/new_tab_page/modules/recipes:mojo_bindings",
|
||||
@@ -50,7 +50,7 @@
|
||||
"//chrome/browser/policy:path_parser",
|
||||
"//chrome/browser/profile_resetter:profile_reset_report_proto",
|
||||
"//chrome/browser/resource_coordinator:intervention_policy_database_proto",
|
||||
@@ -6184,10 +6171,6 @@ static_library("browser") {
|
||||
@@ -6191,10 +6178,6 @@ static_library("browser") {
|
||||
sources += [
|
||||
"enterprise/chrome_browser_main_extra_parts_enterprise.cc",
|
||||
"enterprise/chrome_browser_main_extra_parts_enterprise.h",
|
||||
@@ -61,7 +61,7 @@
|
||||
"enterprise/connectors/device_trust/attestation/browser/attestation_switches.cc",
|
||||
"enterprise/connectors/device_trust/attestation/browser/attestation_switches.h",
|
||||
"enterprise/connectors/device_trust/attestation/browser/attester.h",
|
||||
@@ -7704,9 +7687,14 @@ static_library("browser") {
|
||||
@@ -7726,9 +7709,14 @@ static_library("browser") {
|
||||
"//components/safe_browsing/content/browser:safe_browsing_blocking_page",
|
||||
"//components/safe_browsing/content/browser/download:download_stats",
|
||||
"//components/safe_browsing/content/common:file_type_policies",
|
||||
@@ -79,7 +79,7 @@
|
||||
sources += [
|
||||
--- a/chrome/browser/chrome_content_browser_client.cc
|
||||
+++ b/chrome/browser/chrome_content_browser_client.cc
|
||||
@@ -4990,11 +4990,13 @@ ChromeContentBrowserClient::CreateThrott
|
||||
@@ -5033,11 +5033,13 @@ ChromeContentBrowserClient::CreateThrott
|
||||
&throttles);
|
||||
#endif
|
||||
|
||||
@@ -93,7 +93,7 @@
|
||||
|
||||
#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX)
|
||||
MaybeAddThrottle(browser_switcher::BrowserSwitcherNavigationThrottle::
|
||||
@@ -6623,26 +6625,7 @@ ChromeContentBrowserClient::GetSafeBrows
|
||||
@@ -6755,26 +6757,7 @@ ChromeContentBrowserClient::GetSafeBrows
|
||||
? content::BrowserThread::UI
|
||||
: content::BrowserThread::IO);
|
||||
|
||||
@@ -121,7 +121,7 @@
|
||||
}
|
||||
|
||||
safe_browsing::RealTimeUrlLookupServiceBase*
|
||||
@@ -6663,11 +6646,6 @@ ChromeContentBrowserClient::GetUrlLookup
|
||||
@@ -6795,11 +6778,6 @@ ChromeContentBrowserClient::GetUrlLookup
|
||||
GetForProfile(profile);
|
||||
}
|
||||
#endif
|
||||
@@ -168,7 +168,7 @@
|
||||
|
||||
--- a/chrome/browser/component_updater/registration.cc
|
||||
+++ b/chrome/browser/component_updater/registration.cc
|
||||
@@ -214,13 +214,6 @@ void RegisterComponentsForUpdate() {
|
||||
@@ -211,13 +211,6 @@ void RegisterComponentsForUpdate() {
|
||||
|
||||
RegisterAutofillStatesComponent(cus, g_browser_process->local_state());
|
||||
|
||||
@@ -180,7 +180,7 @@
|
||||
- }
|
||||
-
|
||||
#if BUILDFLAG(ENABLE_SCREEN_AI_SERVICE) && !BUILDFLAG(IS_CHROMEOS)
|
||||
RegisterScreenAIComponent(cus, g_browser_process->local_state());
|
||||
ManageScreenAIComponentRegistration(cus, g_browser_process->local_state());
|
||||
#endif // BUILDFLAG(ENABLE_SCREEN_AI_SERVICE) && !BUILDFLAG(IS_CHROMEOS)
|
||||
--- a/chrome/browser/devtools/devtools_window.cc
|
||||
+++ b/chrome/browser/devtools/devtools_window.cc
|
||||
@@ -221,7 +221,7 @@
|
||||
using ConnectionType = net::NetworkChangeNotifier::ConnectionType;
|
||||
|
||||
#if BUILDFLAG(FULL_SAFE_BROWSING)
|
||||
@@ -1502,7 +1501,6 @@ void ChromeDownloadManagerDelegate::OnDo
|
||||
@@ -1507,7 +1506,6 @@ void ChromeDownloadManagerDelegate::OnDo
|
||||
DownloadItemModel model(item);
|
||||
model.DetermineAndSetShouldPreferOpeningInBrowser(
|
||||
target_info->target_path, target_info->is_filetype_handled_safely);
|
||||
@@ -229,7 +229,7 @@
|
||||
}
|
||||
if (ShouldBlockFile(item, target_info->danger_type)) {
|
||||
MaybeReportDangerousDownloadBlocked(
|
||||
@@ -1581,59 +1579,6 @@ bool ChromeDownloadManagerDelegate::IsOp
|
||||
@@ -1586,59 +1584,6 @@ bool ChromeDownloadManagerDelegate::IsOp
|
||||
bool ChromeDownloadManagerDelegate::ShouldBlockFile(
|
||||
download::DownloadItem* item,
|
||||
download::DownloadDangerType danger_type) const {
|
||||
@@ -289,7 +289,7 @@
|
||||
|
||||
return false;
|
||||
}
|
||||
@@ -1648,7 +1593,6 @@ void ChromeDownloadManagerDelegate::Mayb
|
||||
@@ -1653,7 +1598,6 @@ void ChromeDownloadManagerDelegate::Mayb
|
||||
service->MaybeSendDangerousDownloadOpenedReport(download,
|
||||
show_download_in_folder);
|
||||
}
|
||||
@@ -297,7 +297,7 @@
|
||||
if (!download->GetAutoOpened()) {
|
||||
download::DownloadContent download_content =
|
||||
download::DownloadContentFromMimeType(download->GetMimeType(), false);
|
||||
@@ -1656,6 +1600,7 @@ void ChromeDownloadManagerDelegate::Mayb
|
||||
@@ -1661,6 +1605,7 @@ void ChromeDownloadManagerDelegate::Mayb
|
||||
download->GetDangerType(), download_content, base::Time::Now(),
|
||||
download->GetEndTime(), show_download_in_folder);
|
||||
}
|
||||
@@ -305,7 +305,7 @@
|
||||
}
|
||||
|
||||
void ChromeDownloadManagerDelegate::CheckDownloadAllowed(
|
||||
@@ -1713,8 +1658,7 @@ void ChromeDownloadManagerDelegate::Chec
|
||||
@@ -1718,8 +1663,7 @@ void ChromeDownloadManagerDelegate::Chec
|
||||
DCHECK(download_item);
|
||||
DCHECK(download_item->IsSavePackageDownload());
|
||||
|
||||
@@ -317,7 +317,7 @@
|
||||
|
||||
--- a/chrome/browser/download/download_item_model.cc
|
||||
+++ b/chrome/browser/download/download_item_model.cc
|
||||
@@ -939,100 +939,10 @@ void DownloadItemModel::ExecuteCommand(D
|
||||
@@ -952,106 +952,10 @@ void DownloadItemModel::ExecuteCommand(D
|
||||
|
||||
DownloadItemModel::BubbleUIInfo
|
||||
DownloadItemModel::GetBubbleUIInfoForTailoredWarning() const {
|
||||
@@ -332,7 +332,9 @@
|
||||
- return DownloadUIModel::BubbleUIInfo()
|
||||
- .AddSubpageSummary(l10n_util::GetStringUTF16(
|
||||
- IDS_DOWNLOAD_BUBBLE_SUBPAGE_SUMMARY_SUSPICIOUS_ARCHIVE))
|
||||
- .AddIconAndColor(vector_icons::kNotSecureWarningIcon,
|
||||
- .AddIconAndColor(features::IsChromeRefresh2023()
|
||||
- ? vector_icons::kNotSecureWarningChromeRefreshIcon
|
||||
- : vector_icons::kNotSecureWarningIcon,
|
||||
- ui::kColorAlertMediumSeverityIcon)
|
||||
- .AddSecondaryTextColor(ui::kColorAlertMediumSeverityText)
|
||||
- .AddPrimaryButton(DownloadCommands::Command::DISCARD)
|
||||
@@ -366,7 +368,9 @@
|
||||
- .AddSubpageSummary(l10n_util::GetStringFUTF16(
|
||||
- IDS_DOWNLOAD_BUBBLE_SUBPAGE_SUMMARY_COOKIE_THEFT_AND_ACCOUNT,
|
||||
- base::ASCIIToUTF16(email)))
|
||||
- .AddIconAndColor(vector_icons::kDangerousIcon,
|
||||
- .AddIconAndColor(features::IsChromeRefresh2023()
|
||||
- ? vector_icons::kDangerousChromeRefreshIcon
|
||||
- : vector_icons::kDangerousIcon,
|
||||
- ui::kColorAlertHighSeverity)
|
||||
- .AddPrimaryButton(DownloadCommands::Command::DISCARD)
|
||||
- .AddPrimarySubpageButton(
|
||||
@@ -377,7 +381,9 @@
|
||||
- return DownloadUIModel::BubbleUIInfo()
|
||||
- .AddSubpageSummary(l10n_util::GetStringUTF16(
|
||||
- IDS_DOWNLOAD_BUBBLE_SUBPAGE_SUMMARY_COOKIE_THEFT))
|
||||
- .AddIconAndColor(vector_icons::kDangerousIcon,
|
||||
- .AddIconAndColor(features::IsChromeRefresh2023()
|
||||
- ? vector_icons::kDangerousChromeRefreshIcon
|
||||
- : vector_icons::kDangerousIcon,
|
||||
- ui::kColorAlertHighSeverity)
|
||||
- .AddPrimaryButton(DownloadCommands::Command::DISCARD)
|
||||
- .AddPrimarySubpageButton(
|
||||
@@ -499,7 +505,7 @@
|
||||
std::u16string ContentAnalysisDownloadsDelegate::GetBypassJustificationLabel()
|
||||
--- a/chrome/browser/enterprise/connectors/analysis/files_request_handler.cc
|
||||
+++ b/chrome/browser/enterprise/connectors/analysis/files_request_handler.cc
|
||||
@@ -161,49 +161,12 @@ void FilesRequestHandler::FileRequestCal
|
||||
@@ -165,52 +165,12 @@ void FilesRequestHandler::FileRequestCal
|
||||
}
|
||||
|
||||
bool FilesRequestHandler::UploadDataImpl() {
|
||||
@@ -515,8 +521,11 @@
|
||||
- for (size_t i = 0; i < paths_.size(); ++i)
|
||||
- tasks[i].request = PrepareFileRequest(i);
|
||||
-
|
||||
- file_opening_job_ =
|
||||
- std::make_unique<safe_browsing::FileOpeningJob>(std::move(tasks));
|
||||
- file_access::RequestFilesAccessForSystem(
|
||||
- paths_,
|
||||
- base::BindOnce(&FilesRequestHandler::CreateFileOpeningJob,
|
||||
- weak_ptr_factory_.GetWeakPtr(), std::move(tasks)));
|
||||
-
|
||||
- return true;
|
||||
- }
|
||||
-
|
||||
@@ -549,7 +558,7 @@
|
||||
void FilesRequestHandler::OnGotFileInfo(
|
||||
std::unique_ptr<safe_browsing::BinaryUploadService::Request> request,
|
||||
size_t index,
|
||||
@@ -239,14 +202,6 @@ void FilesRequestHandler::OnGotFileInfo(
|
||||
@@ -246,14 +206,6 @@ void FilesRequestHandler::OnGotFileInfo(
|
||||
void FilesRequestHandler::FinishRequestEarly(
|
||||
std::unique_ptr<safe_browsing::BinaryUploadService::Request> request,
|
||||
safe_browsing::BinaryUploadService::Result result) {
|
||||
@@ -566,7 +575,7 @@
|
||||
}
|
||||
--- a/chrome/browser/enterprise/connectors/analysis/files_request_handler.h
|
||||
+++ b/chrome/browser/enterprise/connectors/analysis/files_request_handler.h
|
||||
@@ -113,10 +113,6 @@ class FilesRequestHandler : public Reque
|
||||
@@ -116,10 +116,6 @@ class FilesRequestHandler : public Reque
|
||||
enterprise_connectors::ContentAnalysisResponse response);
|
||||
|
||||
private:
|
||||
@@ -579,7 +588,7 @@
|
||||
void OnGotFileInfo(
|
||||
--- a/chrome/browser/enterprise/connectors/connectors_service.cc
|
||||
+++ b/chrome/browser/enterprise/connectors/connectors_service.cc
|
||||
@@ -413,19 +413,6 @@ absl::optional<std::string> ConnectorsSe
|
||||
@@ -429,19 +429,6 @@ absl::optional<std::string> ConnectorsSe
|
||||
return absl::nullopt;
|
||||
}
|
||||
|
||||
@@ -661,7 +670,7 @@
|
||||
signals.Set(device_signals::names::kBuiltInDnsClientEnabled,
|
||||
--- a/chrome/browser/enterprise/connectors/reporting/realtime_reporting_client.cc
|
||||
+++ b/chrome/browser/enterprise/connectors/reporting/realtime_reporting_client.cc
|
||||
@@ -424,7 +424,7 @@ void RealtimeReportingClient::ReportEven
|
||||
@@ -433,7 +433,7 @@ void RealtimeReportingClient::ReportEven
|
||||
}
|
||||
|
||||
std::string RealtimeReportingClient::GetProfileUserName() const {
|
||||
@@ -672,7 +681,7 @@
|
||||
std::string RealtimeReportingClient::GetProfileIdentifier() const {
|
||||
--- a/chrome/browser/enterprise/connectors/reporting/reporting_service_settings.cc
|
||||
+++ b/chrome/browser/enterprise/connectors/reporting/reporting_service_settings.cc
|
||||
@@ -72,16 +72,6 @@ ReportingServiceSettings::ReportingServi
|
||||
@@ -68,16 +68,6 @@ ReportingServiceSettings::ReportingServi
|
||||
else
|
||||
DVLOG(1) << "Enabled event name list contains a non string value!";
|
||||
}
|
||||
@@ -819,7 +828,7 @@
|
||||
"pending_extension_info.cc",
|
||||
--- a/chrome/browser/extensions/api/api_browser_context_keyed_service_factories.cc
|
||||
+++ b/chrome/browser/extensions/api/api_browser_context_keyed_service_factories.cc
|
||||
@@ -97,7 +97,6 @@ void EnsureApiBrowserContextKeyedService
|
||||
@@ -101,7 +101,6 @@ void EnsureApiBrowserContextKeyedService
|
||||
#endif // BUILDFLAG(ENABLE_SCREEN_AI_SERVICE)
|
||||
extensions::PreferenceAPI::GetFactoryInstance();
|
||||
extensions::ProcessesAPI::GetFactoryInstance();
|
||||
@@ -924,7 +933,7 @@
|
||||
void Blocklist::GetMalwareIDs(const std::set<std::string>& ids,
|
||||
--- a/chrome/browser/extensions/chrome_extensions_browser_client.cc
|
||||
+++ b/chrome/browser/extensions/chrome_extensions_browser_client.cc
|
||||
@@ -731,76 +731,23 @@ void ChromeExtensionsBrowserClient::Noti
|
||||
@@ -730,76 +730,23 @@ void ChromeExtensionsBrowserClient::Noti
|
||||
content::BrowserContext* context,
|
||||
const ExtensionId& extension_id,
|
||||
const std::string& code) const {
|
||||
@@ -1002,7 +1011,7 @@
|
||||
}
|
||||
|
||||
// static
|
||||
@@ -979,7 +926,6 @@ ChromeExtensionsBrowserClient::GetWebVie
|
||||
@@ -968,7 +915,6 @@ void ChromeExtensionsBrowserClient::GetW
|
||||
|
||||
void ChromeExtensionsBrowserClient::CreatePasswordReuseDetectionManager(
|
||||
content::WebContents* web_contents) const {
|
||||
@@ -1020,7 +1029,7 @@
|
||||
#include "chrome/browser/extensions/pending_extension_manager.h"
|
||||
#include "chrome/browser/extensions/permissions_updater.h"
|
||||
#include "chrome/browser/extensions/profile_util.h"
|
||||
@@ -204,7 +203,6 @@ void ExtensionService::BlocklistExtensio
|
||||
@@ -221,7 +220,6 @@ void ExtensionService::BlocklistExtensio
|
||||
blocklist_prefs::SetSafeBrowsingExtensionBlocklistState(
|
||||
extension_id, BitMapBlocklistState::BLOCKLISTED_MALWARE,
|
||||
extension_prefs_);
|
||||
@@ -1028,7 +1037,7 @@
|
||||
}
|
||||
|
||||
bool ExtensionService::OnExternalExtensionUpdateUrlFound(
|
||||
@@ -372,9 +370,6 @@ ExtensionService::ExtensionService(
|
||||
@@ -389,9 +387,6 @@ ExtensionService::ExtensionService(
|
||||
safe_browsing_verdict_handler_(extension_prefs,
|
||||
ExtensionRegistry::Get(profile),
|
||||
this),
|
||||
@@ -1038,7 +1047,7 @@
|
||||
registry_(ExtensionRegistry::Get(profile)),
|
||||
pending_extension_manager_(profile),
|
||||
install_directory_(install_directory),
|
||||
@@ -878,100 +873,6 @@ bool ExtensionService::IsExtensionEnable
|
||||
@@ -915,100 +910,6 @@ bool ExtensionService::IsExtensionEnable
|
||||
return extension_registrar_.IsExtensionEnabled(extension_id);
|
||||
}
|
||||
|
||||
@@ -1442,7 +1451,7 @@
|
||||
NotificationHandler::Type::EXTENSION,
|
||||
--- a/chrome/browser/password_manager/chrome_password_manager_client.cc
|
||||
+++ b/chrome/browser/password_manager/chrome_password_manager_client.cc
|
||||
@@ -35,7 +35,6 @@
|
||||
@@ -36,7 +36,6 @@
|
||||
#include "chrome/browser/password_manager/password_reuse_manager_factory.h"
|
||||
#include "chrome/browser/password_manager/password_store_factory.h"
|
||||
#include "chrome/browser/profiles/profile.h"
|
||||
@@ -1450,7 +1459,7 @@
|
||||
#include "chrome/browser/safe_browsing/user_interaction_observer.h"
|
||||
#include "chrome/browser/signin/identity_manager_factory.h"
|
||||
#include "chrome/browser/sync/sync_service_factory.h"
|
||||
@@ -821,6 +820,7 @@ autofill::LanguageCode ChromePasswordMan
|
||||
@@ -847,6 +846,7 @@ autofill::LanguageCode ChromePasswordMan
|
||||
return autofill::LanguageCode();
|
||||
}
|
||||
|
||||
@@ -1458,7 +1467,7 @@
|
||||
safe_browsing::PasswordProtectionService*
|
||||
ChromePasswordManagerClient::GetPasswordProtectionService() const {
|
||||
return safe_browsing::ChromePasswordProtectionService::
|
||||
@@ -840,6 +840,7 @@ void ChromePasswordManagerClient::CheckS
|
||||
@@ -866,6 +866,7 @@ void ChromePasswordManagerClient::CheckS
|
||||
}
|
||||
}
|
||||
#endif // defined(ON_FOCUS_PING_ENABLED)
|
||||
@@ -1466,7 +1475,7 @@
|
||||
|
||||
#if !BUILDFLAG(IS_ANDROID)
|
||||
void ChromePasswordManagerClient::MaybeReportEnterpriseLoginEvent(
|
||||
@@ -847,28 +848,10 @@ void ChromePasswordManagerClient::MaybeR
|
||||
@@ -873,28 +874,10 @@ void ChromePasswordManagerClient::MaybeR
|
||||
bool is_federated,
|
||||
const url::Origin& federated_origin,
|
||||
const std::u16string& login_user_name) const {
|
||||
@@ -1495,7 +1504,7 @@
|
||||
}
|
||||
#endif
|
||||
|
||||
@@ -1384,6 +1367,7 @@ bool ChromePasswordManagerClient::IsPass
|
||||
@@ -1435,6 +1418,7 @@ bool ChromePasswordManagerClient::IsPass
|
||||
is_enabled = false;
|
||||
}
|
||||
|
||||
@@ -1503,7 +1512,7 @@
|
||||
// SafeBrowsing Delayed Warnings experiment can delay some SafeBrowsing
|
||||
// warnings until user interaction. If the current page has a delayed warning,
|
||||
// it'll have a user interaction observer attached. Disable password
|
||||
@@ -1394,6 +1378,7 @@ bool ChromePasswordManagerClient::IsPass
|
||||
@@ -1445,6 +1429,7 @@ bool ChromePasswordManagerClient::IsPass
|
||||
observer->OnPasswordSaveOrAutofillDenied();
|
||||
is_enabled = false;
|
||||
}
|
||||
@@ -1513,7 +1522,7 @@
|
||||
password_manager::BrowserSavePasswordProgressLogger logger(
|
||||
--- a/chrome/browser/password_manager/chrome_password_manager_client.h
|
||||
+++ b/chrome/browser/password_manager/chrome_password_manager_client.h
|
||||
@@ -224,6 +224,7 @@ class ChromePasswordManagerClient
|
||||
@@ -229,6 +229,7 @@ class ChromePasswordManagerClient
|
||||
void AnnotateNavigationEntry(bool has_password_field) override;
|
||||
autofill::LanguageCode GetPageLanguage() const override;
|
||||
|
||||
@@ -1521,7 +1530,7 @@
|
||||
safe_browsing::PasswordProtectionService* GetPasswordProtectionService()
|
||||
const override;
|
||||
|
||||
@@ -231,6 +232,7 @@ class ChromePasswordManagerClient
|
||||
@@ -236,6 +237,7 @@ class ChromePasswordManagerClient
|
||||
void CheckSafeBrowsingReputation(const GURL& form_action,
|
||||
const GURL& frame_url) override;
|
||||
#endif
|
||||
@@ -1645,7 +1654,7 @@
|
||||
|
||||
--- a/chrome/browser/permissions/prediction_based_permission_ui_selector.cc
|
||||
+++ b/chrome/browser/permissions/prediction_based_permission_ui_selector.cc
|
||||
@@ -341,52 +341,5 @@ bool PredictionBasedPermissionUiSelector
|
||||
@@ -332,52 +332,5 @@ bool PredictionBasedPermissionUiSelector
|
||||
|
||||
PredictionSource PredictionBasedPermissionUiSelector::GetPredictionTypeToUse(
|
||||
permissions::RequestType request_type) {
|
||||
@@ -1700,7 +1709,7 @@
|
||||
}
|
||||
--- a/chrome/browser/policy/configuration_policy_handler_list_factory.cc
|
||||
+++ b/chrome/browser/policy/configuration_policy_handler_list_factory.cc
|
||||
@@ -96,6 +96,7 @@
|
||||
@@ -97,6 +97,7 @@
|
||||
#include "components/policy/policy_constants.h"
|
||||
#include "components/privacy_sandbox/privacy_sandbox_prefs.h"
|
||||
#include "components/proxy_config/proxy_policy_handler.h"
|
||||
@@ -1708,7 +1717,7 @@
|
||||
#include "components/safe_browsing/content/common/file_type_policies_prefs.h"
|
||||
#include "components/safe_browsing/core/common/safe_browsing_policy_handler.h"
|
||||
#include "components/safe_browsing/core/common/safe_browsing_prefs.h"
|
||||
@@ -1970,8 +1971,6 @@ std::unique_ptr<ConfigurationPolicyHandl
|
||||
@@ -1994,8 +1995,6 @@ std::unique_ptr<ConfigurationPolicyHandl
|
||||
handlers->AddHandler(
|
||||
std::make_unique<bookmarks::ManagedBookmarksPolicyHandler>(
|
||||
chrome_schema));
|
||||
@@ -1717,7 +1726,7 @@
|
||||
handlers->AddHandler(std::make_unique<syncer::SyncPolicyHandler>());
|
||||
handlers->AddHandler(
|
||||
std::make_unique<URLBlocklistPolicyHandler>(key::kURLBlocklist));
|
||||
@@ -2045,13 +2044,6 @@ std::unique_ptr<ConfigurationPolicyHandl
|
||||
@@ -2078,13 +2077,6 @@ std::unique_ptr<ConfigurationPolicyHandl
|
||||
prefs::kSafeBrowsingEnterpriseRealTimeUrlCheckMode,
|
||||
prefs::kSafeBrowsingEnterpriseRealTimeUrlCheckScope, chrome_schema));
|
||||
|
||||
@@ -1733,7 +1742,7 @@
|
||||
|
||||
--- a/chrome/browser/prefs/browser_prefs.cc
|
||||
+++ b/chrome/browser/prefs/browser_prefs.cc
|
||||
@@ -266,7 +266,6 @@
|
||||
@@ -263,7 +263,6 @@
|
||||
#include "chrome/browser/new_tab_page/modules/drive/drive_service.h"
|
||||
#include "chrome/browser/new_tab_page/modules/photos/photos_service.h"
|
||||
#include "chrome/browser/new_tab_page/modules/recipes/recipes_service.h"
|
||||
@@ -1741,7 +1750,7 @@
|
||||
#include "chrome/browser/new_tab_page/promos/promo_service.h"
|
||||
#include "chrome/browser/policy/developer_tools_policy_handler.h"
|
||||
#include "chrome/browser/search/background/ntp_custom_background_service.h"
|
||||
@@ -1620,7 +1619,6 @@ void RegisterProfilePrefs(user_prefs::Pr
|
||||
@@ -1720,7 +1719,6 @@ void RegisterProfilePrefs(user_prefs::Pr
|
||||
NewTabPageHandler::RegisterProfilePrefs(registry);
|
||||
NewTabPageUI::RegisterProfilePrefs(registry);
|
||||
NewTabUI::RegisterProfilePrefs(registry);
|
||||
@@ -1751,7 +1760,7 @@
|
||||
PinnedTabCodec::RegisterProfilePrefs(registry);
|
||||
--- a/chrome/browser/profiles/chrome_browser_main_extra_parts_profiles.cc
|
||||
+++ b/chrome/browser/profiles/chrome_browser_main_extra_parts_profiles.cc
|
||||
@@ -626,9 +626,6 @@ void ChromeBrowserMainExtraPartsProfiles
|
||||
@@ -654,9 +654,6 @@ void ChromeBrowserMainExtraPartsProfiles
|
||||
enterprise_connectors::DeviceTrustServiceFactory::GetInstance();
|
||||
enterprise_connectors::DeviceTrustConnectorServiceFactory::GetInstance();
|
||||
#endif
|
||||
@@ -1761,7 +1770,7 @@
|
||||
#if BUILDFLAG(ENABLE_SESSION_SERVICE)
|
||||
ExitTypeServiceFactory::GetInstance();
|
||||
#endif
|
||||
@@ -909,7 +906,6 @@ void ChromeBrowserMainExtraPartsProfiles
|
||||
@@ -954,7 +951,6 @@ void ChromeBrowserMainExtraPartsProfiles
|
||||
safe_browsing::CloudBinaryUploadServiceFactory::GetInstance();
|
||||
safe_browsing::ExtensionTelemetryServiceFactory::GetInstance();
|
||||
safe_browsing::HashRealTimeServiceFactory::GetInstance();
|
||||
@@ -1769,7 +1778,7 @@
|
||||
safe_browsing::ChromePasswordProtectionServiceFactory::GetInstance();
|
||||
safe_browsing::ChromePingManagerFactory::GetInstance();
|
||||
safe_browsing::ClientSideDetectionServiceFactory::GetInstance();
|
||||
@@ -917,6 +913,7 @@ void ChromeBrowserMainExtraPartsProfiles
|
||||
@@ -962,6 +958,7 @@ void ChromeBrowserMainExtraPartsProfiles
|
||||
safe_browsing::SafeBrowsingMetricsCollectorFactory::GetInstance();
|
||||
safe_browsing::SafeBrowsingNavigationObserverManagerFactory::GetInstance();
|
||||
safe_browsing::VerdictCacheManagerFactory::GetInstance();
|
||||
@@ -1777,7 +1786,7 @@
|
||||
#if BUILDFLAG(ENABLE_SCREEN_AI_SERVICE)
|
||||
screen_ai::AXScreenAIAnnotatorFactory::EnsureFactoryBuilt();
|
||||
screen_ai::PdfOcrControllerFactory::GetInstance();
|
||||
@@ -970,7 +967,6 @@ void ChromeBrowserMainExtraPartsProfiles
|
||||
@@ -1020,7 +1017,6 @@ void ChromeBrowserMainExtraPartsProfiles
|
||||
}
|
||||
#endif
|
||||
TabRestoreServiceFactory::GetInstance();
|
||||
@@ -1787,7 +1796,7 @@
|
||||
#if !BUILDFLAG(IS_ANDROID)
|
||||
--- a/chrome/browser/resources/settings/lazy_load.ts
|
||||
+++ b/chrome/browser/resources/settings/lazy_load.ts
|
||||
@@ -192,7 +192,6 @@ export {SettingsPrivacyGuideDialogElemen
|
||||
@@ -193,7 +193,6 @@ export {SettingsPrivacyGuideDialogElemen
|
||||
export {PrivacyGuideHistorySyncFragmentElement} from './privacy_page/privacy_guide/privacy_guide_history_sync_fragment.js';
|
||||
export {PrivacyGuideMsbbFragmentElement} from './privacy_page/privacy_guide/privacy_guide_msbb_fragment.js';
|
||||
export {SettingsPrivacyGuidePageElement} from './privacy_page/privacy_guide/privacy_guide_page.js';
|
||||
@@ -1859,7 +1868,7 @@
|
||||
} // namespace safe_browsing
|
||||
--- a/chrome/browser/safe_browsing/url_lookup_service_factory.cc
|
||||
+++ b/chrome/browser/safe_browsing/url_lookup_service_factory.cc
|
||||
@@ -63,30 +63,7 @@ RealTimeUrlLookupServiceFactory::RealTim
|
||||
@@ -64,30 +64,7 @@ RealTimeUrlLookupServiceFactory::RealTim
|
||||
|
||||
KeyedService* RealTimeUrlLookupServiceFactory::BuildServiceInstanceFor(
|
||||
content::BrowserContext* context) const {
|
||||
@@ -1944,7 +1953,7 @@
|
||||
/*can_show_enhanced_protection_message=*/true, ssl_info,
|
||||
--- a/chrome/browser/ssl/sct_reporting_service_factory.cc
|
||||
+++ b/chrome/browser/ssl/sct_reporting_service_factory.cc
|
||||
@@ -36,15 +36,7 @@ SCTReportingServiceFactory::~SCTReportin
|
||||
@@ -37,15 +37,7 @@ SCTReportingServiceFactory::~SCTReportin
|
||||
|
||||
KeyedService* SCTReportingServiceFactory::BuildServiceInstanceFor(
|
||||
content::BrowserContext* profile) const {
|
||||
@@ -1996,7 +2005,7 @@
|
||||
} // namespace
|
||||
--- a/chrome/browser/ui/BUILD.gn
|
||||
+++ b/chrome/browser/ui/BUILD.gn
|
||||
@@ -663,7 +663,6 @@ static_library("ui") {
|
||||
@@ -665,7 +665,6 @@ static_library("ui") {
|
||||
"//components/renderer_context_menu",
|
||||
"//components/resources",
|
||||
"//components/safe_browsing/content/browser",
|
||||
@@ -2004,7 +2013,7 @@
|
||||
"//components/safe_browsing/content/browser/password_protection",
|
||||
"//components/safe_browsing/content/browser/web_ui",
|
||||
"//components/safe_browsing/core/browser/db:database_manager",
|
||||
@@ -3751,8 +3750,6 @@ static_library("ui") {
|
||||
@@ -3777,8 +3776,6 @@ static_library("ui") {
|
||||
"startup/web_app_startup_utils.h",
|
||||
"tab_contents/chrome_web_contents_menu_helper.cc",
|
||||
"tab_contents/chrome_web_contents_menu_helper.h",
|
||||
@@ -2013,7 +2022,7 @@
|
||||
"views/autofill/payments/virtual_card_selection_dialog_view.cc",
|
||||
"views/autofill/payments/virtual_card_selection_dialog_view.h",
|
||||
"views/autofill/payments/webauthn_dialog_view.cc",
|
||||
@@ -5228,8 +5225,6 @@ static_library("ui") {
|
||||
@@ -5268,8 +5265,6 @@ static_library("ui") {
|
||||
"views/safe_browsing/prompt_for_scanning_modal_dialog.h",
|
||||
"views/safe_browsing/tailored_security_desktop_dialog_manager.cc",
|
||||
"views/safe_browsing/tailored_security_desktop_dialog_manager.h",
|
||||
@@ -2050,7 +2059,7 @@
|
||||
void JavaScriptTabModalDialogManagerDelegateDesktop::DidCloseDialog() {
|
||||
--- a/chrome/browser/ui/tab_helpers.cc
|
||||
+++ b/chrome/browser/ui/tab_helpers.cc
|
||||
@@ -336,7 +336,6 @@ void TabHelpers::AttachTabHelpers(WebCon
|
||||
@@ -342,7 +342,6 @@ void TabHelpers::AttachTabHelpers(WebCon
|
||||
ChromePasswordManagerClient::CreateForWebContentsWithAutofillClient(
|
||||
web_contents,
|
||||
autofill::ContentAutofillClient::FromWebContents(web_contents));
|
||||
@@ -2095,7 +2104,7 @@
|
||||
open_button_->SetEnabled((mode_ == download::DownloadItemMode::kNormal) ||
|
||||
prompt_to_scan || allow_open_during_deep_scan);
|
||||
|
||||
@@ -1273,7 +1274,9 @@ void DownloadItemView::ShowContextMenuIm
|
||||
@@ -1274,7 +1275,9 @@ void DownloadItemView::ShowContextMenuIm
|
||||
}
|
||||
|
||||
void DownloadItemView::OpenDownloadDuringAsyncScanning() {
|
||||
@@ -2204,7 +2213,7 @@
|
||||
// DownloadsDOMHandler, private: --------------------------------------------
|
||||
--- a/chrome/browser/ui/webui/management/management_ui_handler.cc
|
||||
+++ b/chrome/browser/ui/webui/management/management_ui_handler.cc
|
||||
@@ -967,12 +967,6 @@ base::Value::Dict ManagementUIHandler::G
|
||||
@@ -1009,12 +1009,6 @@ base::Value::Dict ManagementUIHandler::G
|
||||
&info);
|
||||
}
|
||||
|
||||
@@ -2261,7 +2270,7 @@
|
||||
std::move(callback),
|
||||
--- a/chrome/test/BUILD.gn
|
||||
+++ b/chrome/test/BUILD.gn
|
||||
@@ -1585,7 +1585,6 @@ if (!is_android) {
|
||||
@@ -1544,7 +1544,6 @@ if (!is_android) {
|
||||
"//components/resources",
|
||||
"//components/safe_browsing:buildflags",
|
||||
"//components/safe_browsing/content/browser",
|
||||
@@ -2269,7 +2278,7 @@
|
||||
"//components/safe_browsing/content/browser:safe_browsing_service",
|
||||
"//components/safe_browsing/content/browser/password_protection",
|
||||
"//components/safe_browsing/content/browser/password_protection:test_support",
|
||||
@@ -6359,7 +6358,6 @@ test("unit_tests") {
|
||||
@@ -6367,7 +6366,6 @@ test("unit_tests") {
|
||||
"//components/resources",
|
||||
"//components/safe_browsing:buildflags",
|
||||
"//components/safe_browsing/content/browser",
|
||||
@@ -2279,7 +2288,7 @@
|
||||
"//components/safe_browsing/content/browser/web_ui",
|
||||
--- a/components/password_manager/content/browser/content_password_manager_driver.cc
|
||||
+++ b/components/password_manager/content/browser/content_password_manager_driver.cc
|
||||
@@ -479,7 +479,7 @@ void ContentPasswordManagerDriver::Check
|
||||
@@ -473,7 +473,7 @@ void ContentPasswordManagerDriver::Check
|
||||
if (!password_manager::bad_message::CheckFrameNotPrerendering(
|
||||
render_frame_host_))
|
||||
return;
|
||||
@@ -2290,7 +2299,7 @@
|
||||
}
|
||||
--- a/components/password_manager/core/browser/password_manager_client.h
|
||||
+++ b/components/password_manager/core/browser/password_manager_client.h
|
||||
@@ -388,11 +388,14 @@ class PasswordManagerClient {
|
||||
@@ -392,11 +392,14 @@ class PasswordManagerClient {
|
||||
// Returns the current best guess as to the page's display language.
|
||||
virtual autofill::LanguageCode GetPageLanguage() const;
|
||||
|
||||
@@ -2325,7 +2334,7 @@
|
||||
+# }
|
||||
--- a/components/safe_browsing/content/common/safe_browsing.mojom
|
||||
+++ b/components/safe_browsing/content/common/safe_browsing.mojom
|
||||
@@ -138,7 +138,6 @@ interface PhishingDetector {
|
||||
@@ -133,7 +133,6 @@ interface PhishingDetector {
|
||||
=> (PhishingDetectorResult result, string request_proto);
|
||||
};
|
||||
|
||||
@@ -2366,49 +2375,35 @@
|
||||
#include "base/memory/raw_ptr.h"
|
||||
--- a/components/safe_browsing/core/browser/hashprefix_realtime/ohttp_key_service.cc
|
||||
+++ b/components/safe_browsing/core/browser/hashprefix_realtime/ohttp_key_service.cc
|
||||
@@ -10,7 +10,6 @@
|
||||
#include "components/prefs/pref_service.h"
|
||||
@@ -12,7 +12,6 @@
|
||||
#include "components/safe_browsing/core/browser/hashprefix_realtime/hash_realtime_utils.h"
|
||||
#include "components/safe_browsing/core/browser/utils/backoff_operator.h"
|
||||
#include "components/safe_browsing/core/common/features.h"
|
||||
-#include "components/safe_browsing/core/common/safe_browsing_prefs.h"
|
||||
#include "components/safe_browsing/core/common/utils.h"
|
||||
#include "google_apis/google_api_keys.h"
|
||||
#include "net/base/net_errors.h"
|
||||
#include "net/http/http_request_headers.h"
|
||||
@@ -102,17 +101,7 @@ constexpr net::NetworkTrafficAnnotationT
|
||||
@@ -111,18 +110,7 @@ constexpr net::NetworkTrafficAnnotationT
|
||||
)");
|
||||
|
||||
bool IsEnabled(const PrefService& pref_service) {
|
||||
bool IsEnabled(PrefService* pref_service) {
|
||||
- safe_browsing::SafeBrowsingState state =
|
||||
- safe_browsing::GetSafeBrowsingState(pref_service);
|
||||
- return (state == safe_browsing::SafeBrowsingState::STANDARD_PROTECTION &&
|
||||
- !base::FeatureList::IsEnabled(
|
||||
- safe_browsing::kSafeBrowsingLookupMechanismExperiment)) ||
|
||||
- // The service is enabled when enhanced protection and lookup mechanism
|
||||
- // experiment are both enabled, because Chrome needs to send HPRT
|
||||
- // requests to conduct the experiment.
|
||||
- safe_browsing::GetSafeBrowsingState(*pref_service);
|
||||
- return safe_browsing::hash_realtime_utils::DetermineHashRealTimeSelection(
|
||||
- /*is_off_the_record=*/false, pref_service) ==
|
||||
- safe_browsing::hash_realtime_utils::HashRealTimeSelection::
|
||||
- kHashRealTimeService ||
|
||||
- // The service is enabled when enhanced protection and
|
||||
- // kHashRealTimeOverOhttp are both enabled, because when this is true,
|
||||
- // Chrome needs to send HPRT requests over OHTTP when conducting the
|
||||
- // lookup mechanism experiment.
|
||||
- (state == safe_browsing::SafeBrowsingState::ENHANCED_PROTECTION &&
|
||||
- base::FeatureList::IsEnabled(
|
||||
- safe_browsing::kSafeBrowsingLookupMechanismExperiment));
|
||||
- base::FeatureList::IsEnabled(safe_browsing::kHashRealTimeOverOhttp));
|
||||
+ return false;
|
||||
}
|
||||
|
||||
} // namespace
|
||||
@@ -138,14 +127,6 @@ OhttpKeyService::OhttpKeyService(
|
||||
PopulateKeyFromPref();
|
||||
|
||||
pref_change_registrar_.Init(pref_service_);
|
||||
- pref_change_registrar_.Add(
|
||||
- prefs::kSafeBrowsingEnabled,
|
||||
- base::BindRepeating(&OhttpKeyService::OnSafeBrowsingStateChanged,
|
||||
- weak_factory_.GetWeakPtr()));
|
||||
- pref_change_registrar_.Add(
|
||||
- prefs::kSafeBrowsingEnhanced,
|
||||
- base::BindRepeating(&OhttpKeyService::OnSafeBrowsingStateChanged,
|
||||
- weak_factory_.GetWeakPtr()));
|
||||
|
||||
SetEnabled(IsEnabled(*pref_service_));
|
||||
}
|
||||
@@ -346,26 +327,9 @@ void OhttpKeyService::MaybeStartServerTr
|
||||
GURL GetKeyFetchingUrl() {
|
||||
@@ -363,26 +351,9 @@ void OhttpKeyService::MaybeStartServerTr
|
||||
}
|
||||
|
||||
void OhttpKeyService::PopulateKeyFromPref() {
|
||||
@@ -2637,7 +2632,7 @@
|
||||
declare_args() {
|
||||
--- a/weblayer/BUILD.gn
|
||||
+++ b/weblayer/BUILD.gn
|
||||
@@ -472,7 +472,6 @@ source_set("weblayer_lib_base") {
|
||||
@@ -473,7 +473,6 @@ source_set("weblayer_lib_base") {
|
||||
"//components/profile_metrics",
|
||||
"//components/reduce_accept_language/browser",
|
||||
"//components/safe_browsing/content/browser",
|
||||
|
||||
File diff suppressed because it is too large
Load Diff
@@ -1,7 +1,7 @@
|
||||
# Disables translation and removes the "Translate to" context menu when --translate-script-url flag is not set
|
||||
--- a/chrome/browser/renderer_context_menu/render_view_context_menu.cc
|
||||
+++ b/chrome/browser/renderer_context_menu/render_view_context_menu.cc
|
||||
@@ -153,6 +153,7 @@
|
||||
@@ -154,6 +154,7 @@
|
||||
#include "components/spellcheck/spellcheck_buildflags.h"
|
||||
#include "components/strings/grit/components_strings.h"
|
||||
#include "components/supervised_user/core/common/buildflags.h"
|
||||
@@ -9,7 +9,7 @@
|
||||
#include "components/translate/core/browser/translate_download_manager.h"
|
||||
#include "components/translate/core/browser/translate_manager.h"
|
||||
#include "components/translate/core/browser/translate_prefs.h"
|
||||
@@ -1955,6 +1956,7 @@ void RenderViewContextMenu::AppendPageIt
|
||||
@@ -1990,6 +1991,7 @@ void RenderViewContextMenu::AppendPageIt
|
||||
menu_model_.AddSeparator(ui::NORMAL_SEPARATOR);
|
||||
|
||||
if (CanTranslate(/*menu_logging=*/true)) {
|
||||
@@ -27,7 +27,7 @@
|
||||
#include "base/debug/dump_without_crashing.h"
|
||||
#include "base/functional/bind.h"
|
||||
#include "base/json/json_reader.h"
|
||||
@@ -23,6 +24,7 @@
|
||||
@@ -24,6 +25,7 @@
|
||||
#include "components/translate/core/browser/translate_event_details.h"
|
||||
#include "components/translate/core/browser/translate_url_fetcher.h"
|
||||
#include "components/translate/core/browser/translate_url_util.h"
|
||||
@@ -35,7 +35,7 @@
|
||||
#include "components/translate/core/common/translate_util.h"
|
||||
#include "net/base/url_util.h"
|
||||
#include "third_party/abseil-cpp/absl/types/optional.h"
|
||||
@@ -229,6 +231,9 @@ GURL TranslateLanguageList::TranslateLan
|
||||
@@ -242,6 +244,9 @@ GURL TranslateLanguageList::TranslateLan
|
||||
}
|
||||
|
||||
void TranslateLanguageList::RequestLanguageList() {
|
||||
|
||||
@@ -9,7 +9,7 @@
|
||||
|
||||
--- a/chrome/browser/BUILD.gn
|
||||
+++ b/chrome/browser/BUILD.gn
|
||||
@@ -2433,6 +2433,7 @@ static_library("browser") {
|
||||
@@ -2446,6 +2446,7 @@ static_library("browser") {
|
||||
"//third_party/libyuv",
|
||||
"//third_party/metrics_proto",
|
||||
"//third_party/re2",
|
||||
@@ -19,7 +19,7 @@
|
||||
"//third_party/widevine/cdm:headers",
|
||||
--- a/chrome/browser/about_flags.cc
|
||||
+++ b/chrome/browser/about_flags.cc
|
||||
@@ -158,6 +158,7 @@
|
||||
@@ -160,6 +160,7 @@
|
||||
#include "components/translate/core/browser/translate_ranker_impl.h"
|
||||
#include "components/translate/core/common/translate_util.h"
|
||||
#include "components/ui_devtools/switches.h"
|
||||
@@ -44,7 +44,7 @@
|
||||
#endif // CHROME_BROWSER_BROMITE_FLAG_ENTRIES_H_
|
||||
--- a/content/browser/BUILD.gn
|
||||
+++ b/content/browser/BUILD.gn
|
||||
@@ -250,6 +250,7 @@ source_set("browser") {
|
||||
@@ -249,6 +249,7 @@ source_set("browser") {
|
||||
"//third_party/libyuv",
|
||||
"//third_party/re2",
|
||||
"//third_party/sqlite",
|
||||
@@ -54,7 +54,7 @@
|
||||
"//third_party/zlib/google:zip",
|
||||
--- a/content/browser/renderer_host/render_process_host_impl.cc
|
||||
+++ b/content/browser/renderer_host/render_process_host_impl.cc
|
||||
@@ -76,6 +76,7 @@
|
||||
@@ -77,6 +77,7 @@
|
||||
#include "components/services/storage/public/cpp/quota_error_or.h"
|
||||
#include "components/services/storage/public/mojom/cache_storage_control.mojom.h"
|
||||
#include "components/tracing/common/tracing_switches.h"
|
||||
@@ -62,7 +62,7 @@
|
||||
#include "components/viz/common/switches.h"
|
||||
#include "components/viz/host/gpu_client.h"
|
||||
#include "content/browser/attribution_reporting/attribution_manager.h"
|
||||
@@ -3491,6 +3492,8 @@ void RenderProcessHostImpl::PropagateBro
|
||||
@@ -3585,6 +3586,8 @@ void RenderProcessHostImpl::PropagateBro
|
||||
switches::kEnableWebGLImageChromium,
|
||||
switches::kEnableWebGPUDeveloperFeatures,
|
||||
switches::kFileUrlPathAlias,
|
||||
@@ -73,7 +73,7 @@
|
||||
switches::kForceGpuMemAvailableMb,
|
||||
--- a/content/child/BUILD.gn
|
||||
+++ b/content/child/BUILD.gn
|
||||
@@ -103,6 +103,7 @@ target(link_target_type, "child") {
|
||||
@@ -102,6 +102,7 @@ target(link_target_type, "child") {
|
||||
"//third_party/blink/public/common",
|
||||
"//third_party/blink/public/strings",
|
||||
"//third_party/ced",
|
||||
@@ -91,7 +91,7 @@
|
||||
#include "ui/accessibility/accessibility_features.h"
|
||||
#include "ui/base/ui_base_features.h"
|
||||
#include "ui/events/blink/blink_features.h"
|
||||
@@ -453,6 +454,10 @@ void SetRuntimeFeaturesFromCommandLine(c
|
||||
@@ -471,6 +472,10 @@ void SetRuntimeFeaturesFromCommandLine(c
|
||||
switches::kEnableWebGPUDeveloperFeatures, true},
|
||||
{wrf::EnableDirectSockets, switches::kEnableIsolatedWebAppsInRenderer,
|
||||
true},
|
||||
@@ -124,7 +124,7 @@
|
||||
#include "base/ranges/algorithm.h"
|
||||
#include "base/task/single_thread_task_runner.h"
|
||||
#include "base/time/time.h"
|
||||
@@ -939,6 +940,14 @@ Range* Document::CreateRangeAdjustedToTr
|
||||
@@ -941,6 +942,14 @@ Range* Document::CreateRangeAdjustedToTr
|
||||
Position::BeforeNode(*shadow_host));
|
||||
}
|
||||
|
||||
@@ -139,7 +139,7 @@
|
||||
SelectorQueryCache& Document::GetSelectorQueryCache() {
|
||||
if (!selector_query_cache_)
|
||||
selector_query_cache_ = std::make_unique<SelectorQueryCache>();
|
||||
@@ -2281,6 +2290,15 @@ void Document::UpdateStyleAndLayoutTreeF
|
||||
@@ -2289,6 +2298,15 @@ void Document::UpdateStyleAndLayoutTreeF
|
||||
#if DCHECK_IS_ON()
|
||||
AssertLayoutTreeUpdated(*this, true /* allow_dirty_container_subtrees */);
|
||||
#endif
|
||||
@@ -157,7 +157,7 @@
|
||||
void Document::InvalidateStyleAndLayoutForFontUpdates() {
|
||||
--- a/third_party/blink/renderer/core/dom/document.h
|
||||
+++ b/third_party/blink/renderer/core/dom/document.h
|
||||
@@ -528,6 +528,10 @@ class CORE_EXPORT Document : public Cont
|
||||
@@ -532,6 +532,10 @@ class CORE_EXPORT Document : public Cont
|
||||
has_xml_declaration_ = has_xml_declaration ? 1 : 0;
|
||||
}
|
||||
|
||||
@@ -168,7 +168,7 @@
|
||||
AtomicString visibilityState() const;
|
||||
bool IsPageVisible() const;
|
||||
bool hidden() const;
|
||||
@@ -2414,6 +2418,9 @@ class CORE_EXPORT Document : public Cont
|
||||
@@ -2429,6 +2433,9 @@ class CORE_EXPORT Document : public Cont
|
||||
|
||||
base::ElapsedTimer start_time_;
|
||||
|
||||
@@ -180,7 +180,7 @@
|
||||
|
||||
--- a/third_party/blink/renderer/core/dom/element.cc
|
||||
+++ b/third_party/blink/renderer/core/dom/element.cc
|
||||
@@ -2096,6 +2096,11 @@ DOMRectList* Element::getClientRects() {
|
||||
@@ -2116,6 +2116,11 @@ DOMRectList* Element::getClientRects() {
|
||||
DCHECK(element_layout_object);
|
||||
GetDocument().AdjustQuadsForScrollAndAbsoluteZoom(quads,
|
||||
*element_layout_object);
|
||||
@@ -192,7 +192,7 @@
|
||||
return MakeGarbageCollected<DOMRectList>(quads);
|
||||
}
|
||||
|
||||
@@ -2123,6 +2128,9 @@ gfx::RectF Element::GetBoundingClientRec
|
||||
@@ -2143,6 +2148,9 @@ gfx::RectF Element::GetBoundingClientRec
|
||||
DCHECK(element_layout_object);
|
||||
GetDocument().AdjustRectForScrollAndAbsoluteZoom(result,
|
||||
*element_layout_object);
|
||||
@@ -286,9 +286,9 @@
|
||||
void CanvasRenderingContext2D::drawFormattedText(
|
||||
--- a/third_party/blink/renderer/platform/BUILD.gn
|
||||
+++ b/third_party/blink/renderer/platform/BUILD.gn
|
||||
@@ -1695,6 +1695,7 @@ component("platform") {
|
||||
@@ -1700,6 +1700,7 @@ component("platform") {
|
||||
"//cc/mojo_embedder",
|
||||
"//components/paint_preview/common",
|
||||
"//components/power_scheduler",
|
||||
"//components/search_engines:search_engine_utils",
|
||||
+ "//components/ungoogled:ungoogled_switches",
|
||||
"//components/viz/client",
|
||||
@@ -311,7 +311,7 @@
|
||||
} // namespace blink
|
||||
--- a/third_party/blink/renderer/platform/runtime_enabled_features.json5
|
||||
+++ b/third_party/blink/renderer/platform/runtime_enabled_features.json5
|
||||
@@ -1764,6 +1764,12 @@
|
||||
@@ -1787,6 +1787,12 @@
|
||||
origin_trial_feature_name: "Focusgroup",
|
||||
},
|
||||
{
|
||||
|
||||
@@ -34,7 +34,7 @@ approach to change color components.
|
||||
#endif // CHROME_BROWSER_BROMITE_FLAG_ENTRIES_H_
|
||||
--- a/content/browser/renderer_host/render_process_host_impl.cc
|
||||
+++ b/content/browser/renderer_host/render_process_host_impl.cc
|
||||
@@ -3494,6 +3494,7 @@ void RenderProcessHostImpl::PropagateBro
|
||||
@@ -3588,6 +3588,7 @@ void RenderProcessHostImpl::PropagateBro
|
||||
switches::kFileUrlPathAlias,
|
||||
switches::kFingerprintingClientRectsNoise,
|
||||
switches::kFingerprintingCanvasMeasureTextNoise,
|
||||
@@ -44,7 +44,7 @@ approach to change color components.
|
||||
switches::kForceGpuMemAvailableMb,
|
||||
--- a/content/child/runtime_features.cc
|
||||
+++ b/content/child/runtime_features.cc
|
||||
@@ -458,6 +458,8 @@ void SetRuntimeFeaturesFromCommandLine(c
|
||||
@@ -476,6 +476,8 @@ void SetRuntimeFeaturesFromCommandLine(c
|
||||
switches::kFingerprintingClientRectsNoise, true},
|
||||
{wrf::EnableFingerprintingCanvasMeasureTextNoise,
|
||||
switches::kFingerprintingCanvasMeasureTextNoise, true},
|
||||
@@ -73,7 +73,7 @@ approach to change color components.
|
||||
#include "third_party/blink/renderer/platform/graphics/stroke_data.h"
|
||||
#include "third_party/blink/renderer/platform/graphics/video_frame_image_util.h"
|
||||
#include "third_party/blink/renderer/platform/heap/garbage_collected.h"
|
||||
@@ -2145,6 +2146,9 @@ ImageData* BaseRenderingContext2D::getIm
|
||||
@@ -2184,6 +2185,9 @@ ImageData* BaseRenderingContext2D::getIm
|
||||
snapshot->PaintImageForCurrentFrame().GetSkImageInfo().bounds();
|
||||
DCHECK(!bounds.intersect(SkIRect::MakeXYWH(sx, sy, sw, sh)));
|
||||
}
|
||||
@@ -85,7 +85,7 @@ approach to change color components.
|
||||
return image_data;
|
||||
--- a/third_party/blink/renderer/platform/BUILD.gn
|
||||
+++ b/third_party/blink/renderer/platform/BUILD.gn
|
||||
@@ -1650,7 +1650,9 @@ component("platform") {
|
||||
@@ -1656,7 +1656,9 @@ component("platform") {
|
||||
"//third_party/blink/renderer:non_test_config",
|
||||
]
|
||||
|
||||
@@ -322,7 +322,7 @@ approach to change color components.
|
||||
// Methods overridden by all sub-classes
|
||||
--- a/third_party/blink/renderer/platform/runtime_enabled_features.json5
|
||||
+++ b/third_party/blink/renderer/platform/runtime_enabled_features.json5
|
||||
@@ -1770,6 +1770,9 @@
|
||||
@@ -1793,6 +1793,9 @@
|
||||
name: "FingerprintingCanvasMeasureTextNoise",
|
||||
},
|
||||
{
|
||||
|
||||
@@ -17,7 +17,7 @@ with limited CPU/memory resources and it is disabled by default.
|
||||
|
||||
--- a/chrome/browser/BUILD.gn
|
||||
+++ b/chrome/browser/BUILD.gn
|
||||
@@ -2161,6 +2161,7 @@ static_library("browser") {
|
||||
@@ -2176,6 +2176,7 @@ static_library("browser") {
|
||||
"//components/net_log",
|
||||
"//components/network_hints/common:mojo_bindings",
|
||||
"//components/network_session_configurator/browser",
|
||||
@@ -78,8 +78,8 @@ with limited CPU/memory resources and it is disabled by default.
|
||||
+#include "net/socket/client_socket_pool_manager.h"
|
||||
#include "ppapi/buildflags/buildflags.h"
|
||||
#include "printing/buildflags/buildflags.h"
|
||||
#include "services/device/public/cpp/geolocation/geolocation_manager.h"
|
||||
@@ -359,6 +363,18 @@ void BrowserProcessImpl::Init() {
|
||||
#include "services/network/public/cpp/features.h"
|
||||
@@ -357,6 +361,18 @@ void BrowserProcessImpl::Init() {
|
||||
pref_change_registrar_.Add(metrics::prefs::kMetricsReportingEnabled,
|
||||
base::BindRepeating(&ApplyMetricsReportingPolicy));
|
||||
|
||||
@@ -100,7 +100,7 @@ with limited CPU/memory resources and it is disabled by default.
|
||||
|
||||
--- a/chrome/browser/flag_descriptions.cc
|
||||
+++ b/chrome/browser/flag_descriptions.cc
|
||||
@@ -2017,6 +2017,10 @@ const char kUnthrottledNestedTimeoutDesc
|
||||
@@ -2107,6 +2107,10 @@ const char kUnthrottledNestedTimeoutDesc
|
||||
"websites abusing the API will still eventually have their setTimeouts "
|
||||
"clamped.";
|
||||
|
||||
@@ -113,7 +113,7 @@ with limited CPU/memory resources and it is disabled by default.
|
||||
const char kMediaRouterCastAllowAllIPsDescription[] =
|
||||
--- a/chrome/browser/flag_descriptions.h
|
||||
+++ b/chrome/browser/flag_descriptions.h
|
||||
@@ -1128,6 +1128,9 @@ extern const char kLogJsConsoleMessagesD
|
||||
@@ -1179,6 +1179,9 @@ extern const char kLogJsConsoleMessagesD
|
||||
extern const char kUnthrottledNestedTimeoutName[];
|
||||
extern const char kUnthrottledNestedTimeoutDescription[];
|
||||
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
|
||||
--- a/chrome/browser/background/background_mode_manager.cc
|
||||
+++ b/chrome/browser/background/background_mode_manager.cc
|
||||
@@ -363,7 +363,7 @@ BackgroundModeManager::~BackgroundModeMa
|
||||
@@ -359,7 +359,7 @@ BackgroundModeManager::~BackgroundModeMa
|
||||
|
||||
// static
|
||||
void BackgroundModeManager::RegisterPrefs(PrefRegistrySimple* registry) {
|
||||
@@ -12,7 +12,7 @@
|
||||
void BackgroundModeManager::RegisterProfile(Profile* profile) {
|
||||
--- a/chrome/browser/chrome_content_browser_client.cc
|
||||
+++ b/chrome/browser/chrome_content_browser_client.cc
|
||||
@@ -1564,7 +1564,7 @@ void ChromeContentBrowserClient::Registe
|
||||
@@ -1561,7 +1561,7 @@ void ChromeContentBrowserClient::Registe
|
||||
void ChromeContentBrowserClient::RegisterProfilePrefs(
|
||||
user_prefs::PrefRegistrySyncable* registry) {
|
||||
registry->RegisterBooleanPref(prefs::kDisable3DAPIs, false);
|
||||
@@ -67,7 +67,7 @@
|
||||
</cr-dialog>
|
||||
--- a/chrome/browser/ui/browser_ui_prefs.cc
|
||||
+++ b/chrome/browser/ui/browser_ui_prefs.cc
|
||||
@@ -75,11 +75,11 @@ void RegisterBrowserUserPrefs(user_prefs
|
||||
@@ -77,11 +77,11 @@ void RegisterBrowserUserPrefs(user_prefs
|
||||
registry->RegisterBooleanPref(prefs::kWebAppCreateInAppsMenu, true);
|
||||
registry->RegisterBooleanPref(prefs::kWebAppCreateInQuickLaunchBar, true);
|
||||
registry->RegisterBooleanPref(
|
||||
@@ -83,7 +83,7 @@
|
||||
registry->RegisterDictionaryPref(prefs::kAppWindowPlacement);
|
||||
--- a/components/autofill/core/common/autofill_prefs.cc
|
||||
+++ b/components/autofill/core/common/autofill_prefs.cc
|
||||
@@ -123,7 +123,7 @@ const char kAutofillPaymentMethodsMandat
|
||||
@@ -129,7 +129,7 @@ const char kAutofillPaymentMethodsMandat
|
||||
void RegisterProfilePrefs(user_prefs::PrefRegistrySyncable* registry) {
|
||||
// Synced prefs. Used for cross-device choices, e.g., credit card Autofill.
|
||||
registry->RegisterBooleanPref(
|
||||
@@ -92,7 +92,7 @@
|
||||
user_prefs::PrefRegistrySyncable::SYNCABLE_PREF);
|
||||
registry->RegisterIntegerPref(
|
||||
prefs::kAutofillLastVersionDeduped, 0,
|
||||
@@ -135,7 +135,7 @@ void RegisterProfilePrefs(user_prefs::Pr
|
||||
@@ -141,7 +141,7 @@ void RegisterProfilePrefs(user_prefs::Pr
|
||||
prefs::kAutofillLastVersionDisusedAddressesDeleted, 0,
|
||||
user_prefs::PrefRegistrySyncable::SYNCABLE_PREF);
|
||||
registry->RegisterBooleanPref(
|
||||
@@ -114,7 +114,7 @@
|
||||
registry->RegisterBooleanPref(
|
||||
--- a/components/content_settings/core/browser/cookie_settings.cc
|
||||
+++ b/components/content_settings/core/browser/cookie_settings.cc
|
||||
@@ -70,7 +70,7 @@ void CookieSettings::RegisterProfilePref
|
||||
@@ -73,7 +73,7 @@ void CookieSettings::RegisterProfilePref
|
||||
user_prefs::PrefRegistrySyncable* registry) {
|
||||
registry->RegisterIntegerPref(
|
||||
prefs::kCookieControlsMode,
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
--- a/sandbox/linux/BUILD.gn
|
||||
+++ b/sandbox/linux/BUILD.gn
|
||||
@@ -305,6 +305,12 @@ if (is_linux || is_chromeos) {
|
||||
@@ -304,6 +304,12 @@ if (is_linux || is_chromeos) {
|
||||
# These files have a suspicious comparison.
|
||||
# TODO fix this and re-enable this warning.
|
||||
"-Wno-sign-compare",
|
||||
|
||||
@@ -5,7 +5,7 @@ Subject: [PATCH 56/66] browser: disable profile auto-import on first run
|
||||
|
||||
--- a/chrome/browser/chrome_browser_main.cc
|
||||
+++ b/chrome/browser/chrome_browser_main.cc
|
||||
@@ -1657,11 +1657,6 @@ int ChromeBrowserMainParts::PreMainMessa
|
||||
@@ -1693,11 +1693,6 @@ int ChromeBrowserMainParts::PreMainMessa
|
||||
// and preferences have been registered since some of the import code depends
|
||||
// on preferences.
|
||||
if (first_run::IsChromeFirstRun()) {
|
||||
|
||||
@@ -12,7 +12,7 @@ it as hidden as it was before?
|
||||
|
||||
--- a/net/cert/x509_util.cc
|
||||
+++ b/net/cert/x509_util.cc
|
||||
@@ -248,7 +248,7 @@ bool GetTLSServerEndPointChannelBinding(
|
||||
@@ -254,7 +254,7 @@ bool GetTLSServerEndPointChannelBinding(
|
||||
}
|
||||
|
||||
// RSA keys created by CreateKeyAndSelfSignedCert will be of this length.
|
||||
|
||||
@@ -16,12 +16,12 @@ the case anyway, since we are based off Chromium, not Chrome.
|
||||
|
||||
--- a/chrome/browser/app_controller_mac.mm
|
||||
+++ b/chrome/browser/app_controller_mac.mm
|
||||
@@ -849,7 +849,7 @@ class AppControllerNativeThemeObserver :
|
||||
@@ -938,7 +938,7 @@ class AppControllerNativeThemeObserver :
|
||||
CFStringRef checkInterval = CFSTR("checkInterval");
|
||||
CFPropertyListRef plist = CFPreferencesCopyAppValue(checkInterval, app);
|
||||
if (!plist) {
|
||||
- const float fiveHoursInSeconds = 5.0 * 60.0 * 60.0;
|
||||
+ const float fiveHoursInSeconds = 0.0;
|
||||
NSNumber* value = [NSNumber numberWithFloat:fiveHoursInSeconds];
|
||||
CFPreferencesSetAppValue(checkInterval, value, app);
|
||||
CFPreferencesSetAppValue(
|
||||
checkInterval, base::apple::NSToCFPtrCast(@(fiveHoursInSeconds)), app);
|
||||
CFPreferencesAppSynchronize(app);
|
||||
|
||||
@@ -17,7 +17,7 @@
|
||||
override_bounds_(params.initial_bounds),
|
||||
initial_show_state_(params.initial_show_state),
|
||||
initial_workspace_(params.initial_workspace),
|
||||
@@ -845,6 +848,7 @@ Browser::WarnBeforeClosingResult Browser
|
||||
@@ -846,6 +849,7 @@ Browser::WarnBeforeClosingResult Browser
|
||||
// true or there are no pending downloads we need to prompt about) then
|
||||
// there's no need to warn.
|
||||
if (force_skip_warning_user_on_close_ || CanCloseWithInProgressDownloads())
|
||||
@@ -25,7 +25,7 @@
|
||||
return WarnBeforeClosingResult::kOkToClose;
|
||||
|
||||
DCHECK(!warn_before_closing_callback_)
|
||||
@@ -879,6 +883,7 @@ bool Browser::TryToCloseWindow(
|
||||
@@ -880,6 +884,7 @@ bool Browser::TryToCloseWindow(
|
||||
|
||||
void Browser::ResetTryToCloseWindow() {
|
||||
cancel_download_confirmation_state_ = NOT_PROMPTED;
|
||||
@@ -33,7 +33,7 @@
|
||||
unload_controller_.ResetTryToCloseWindow();
|
||||
}
|
||||
|
||||
@@ -2824,6 +2829,62 @@ bool Browser::CanCloseWithInProgressDown
|
||||
@@ -2834,6 +2839,62 @@ bool Browser::CanCloseWithInProgressDown
|
||||
return false;
|
||||
}
|
||||
|
||||
@@ -96,7 +96,7 @@
|
||||
void Browser::InProgressDownloadResponse(bool cancel_downloads) {
|
||||
if (cancel_downloads) {
|
||||
cancel_download_confirmation_state_ = RESPONSE_RECEIVED;
|
||||
@@ -2842,6 +2903,22 @@ void Browser::InProgressDownloadResponse
|
||||
@@ -2852,6 +2913,22 @@ void Browser::InProgressDownloadResponse
|
||||
|
||||
std::move(warn_before_closing_callback_)
|
||||
.Run(WarnBeforeClosingResult::kDoNotClose);
|
||||
@@ -129,7 +129,7 @@
|
||||
#include "chrome/browser/ui/signin_view_controller.h"
|
||||
#include "chrome/browser/ui/tabs/tab_strip_model_observer.h"
|
||||
#include "chrome/browser/ui/unload_controller.h"
|
||||
@@ -1071,12 +1072,17 @@ class Browser : public TabStripModelObse
|
||||
@@ -1073,12 +1074,17 @@ class Browser : public TabStripModelObse
|
||||
// Returns true if the window can close, false otherwise.
|
||||
bool CanCloseWithInProgressDownloads();
|
||||
|
||||
@@ -147,7 +147,7 @@
|
||||
// Called when all warnings have completed when attempting to close the
|
||||
// browser directly (e.g. via hotkey, close button, terminate signal, etc.)
|
||||
// Used as a WarnBeforeClosingCallback by ShouldCloseWindow().
|
||||
@@ -1251,6 +1257,8 @@ class Browser : public TabStripModelObse
|
||||
@@ -1253,6 +1259,8 @@ class Browser : public TabStripModelObse
|
||||
// when the browser is closed with in-progress downloads.
|
||||
CancelDownloadConfirmationState cancel_download_confirmation_state_;
|
||||
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
--- a/chrome/browser/chrome_content_browser_client.cc
|
||||
+++ b/chrome/browser/chrome_content_browser_client.cc
|
||||
@@ -882,10 +882,14 @@ bool HandleNewTabPageLocationOverride(
|
||||
@@ -879,10 +879,14 @@ bool HandleNewTabPageLocationOverride(
|
||||
|
||||
// Don't change the URL when incognito mode.
|
||||
if (profile->IsOffTheRecord())
|
||||
|
||||
@@ -11,7 +11,7 @@
|
||||
#endif // CHROME_BROWSER_UNGOOGLED_FLAG_ENTRIES_H_
|
||||
--- a/third_party/blink/common/features.cc
|
||||
+++ b/third_party/blink/common/features.cc
|
||||
@@ -40,6 +40,8 @@ BASE_FEATURE(kAutofillSendUnidentifiedKe
|
||||
@@ -135,6 +135,8 @@ BASE_FEATURE(kAutofillSendUnidentifiedKe
|
||||
"AutofillSendUnidentifiedKeyAfterFill",
|
||||
base::FEATURE_DISABLED_BY_DEFAULT);
|
||||
|
||||
@@ -22,15 +22,15 @@
|
||||
BASE_FEATURE(kAutomaticLazyFrameLoadingToAds,
|
||||
--- a/third_party/blink/public/common/features.h
|
||||
+++ b/third_party/blink/public/common/features.h
|
||||
@@ -24,6 +24,8 @@ constexpr int kBrowsingTopicsConfigVersi
|
||||
|
||||
constexpr int kBrowsingTopicsTaxonomyVersionDefault = 1;
|
||||
@@ -20,6 +20,8 @@
|
||||
namespace blink {
|
||||
namespace features {
|
||||
|
||||
+BLINK_COMMON_EXPORT BASE_DECLARE_FEATURE(kDisableLinkDrag);
|
||||
+
|
||||
BLINK_COMMON_EXPORT BASE_DECLARE_FEATURE(kAnonymousIframeOriginTrial);
|
||||
BLINK_COMMON_EXPORT
|
||||
BASE_DECLARE_FEATURE(kAutofillDetectRemovedFormControls);
|
||||
// -----------------------------------------------------------------------------
|
||||
// Feature declarations and associated constants (feature params, et cetera)
|
||||
//
|
||||
--- a/third_party/blink/renderer/core/editing/selection_controller.cc
|
||||
+++ b/third_party/blink/renderer/core/editing/selection_controller.cc
|
||||
@@ -1433,10 +1433,14 @@ FrameSelection& SelectionController::Sel
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
--- a/chrome/browser/ui/views/frame/tab_strip_region_view.cc
|
||||
+++ b/chrome/browser/ui/views/frame/tab_strip_region_view.cc
|
||||
@@ -49,6 +49,7 @@ class FrameGrabHandle : public views::Vi
|
||||
@@ -59,6 +59,7 @@ class FrameGrabHandle : public views::Vi
|
||||
// Reserve some space for the frame to be grabbed by, even if the tabstrip
|
||||
// is full.
|
||||
// TODO(tbergquist): Define this relative to the NTB insets again.
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
--- a/chrome/browser/ui/views/frame/browser_frame.cc
|
||||
+++ b/chrome/browser/ui/views/frame/browser_frame.cc
|
||||
@@ -540,5 +540,7 @@ bool BrowserFrame::RegenerateFrameOnThem
|
||||
@@ -558,5 +558,7 @@ bool BrowserFrame::RegenerateFrameOnThem
|
||||
}
|
||||
|
||||
bool BrowserFrame::IsIncognitoBrowser() const {
|
||||
|
||||
@@ -27,7 +27,7 @@
|
||||
return true;
|
||||
--- a/chrome/browser/ui/views/location_bar/location_bar_view.cc
|
||||
+++ b/chrome/browser/ui/views/location_bar/location_bar_view.cc
|
||||
@@ -305,7 +305,8 @@ void LocationBarView::Init() {
|
||||
@@ -315,7 +315,8 @@ void LocationBarView::Init() {
|
||||
|
||||
params.types_enabled.push_back(PageActionIconType::kSendTabToSelf);
|
||||
params.types_enabled.push_back(PageActionIconType::kClickToCall);
|
||||
|
||||
@@ -13,7 +13,7 @@
|
||||
#endif // CHROME_BROWSER_UNGOOGLED_FLAG_ENTRIES_H_
|
||||
--- a/chrome/renderer/chrome_render_frame_observer.cc
|
||||
+++ b/chrome/renderer/chrome_render_frame_observer.cc
|
||||
@@ -253,14 +253,16 @@ void ChromeRenderFrameObserver::DidFinis
|
||||
@@ -258,14 +258,16 @@ void ChromeRenderFrameObserver::DidFinis
|
||||
if (frame->Parent() || frame->IsInFencedFrameTree())
|
||||
return;
|
||||
|
||||
@@ -48,7 +48,7 @@
|
||||
#include "base/containers/contains.h"
|
||||
#include "base/debug/crash_logging.h"
|
||||
#include "base/format_macros.h"
|
||||
@@ -204,6 +205,12 @@ bool IsCreatedByExtension(const Template
|
||||
@@ -161,6 +162,12 @@ bool IsCreatedByExtension(const Template
|
||||
template_url->type() == TemplateURL::OMNIBOX_API_EXTENSION;
|
||||
}
|
||||
|
||||
@@ -61,7 +61,7 @@
|
||||
} // namespace
|
||||
|
||||
// TemplateURLService::LessWithPrefix -----------------------------------------
|
||||
@@ -289,6 +296,7 @@ TemplateURLService::TemplateURLService(
|
||||
@@ -245,6 +252,7 @@ TemplateURLService::TemplateURLService(
|
||||
std::unique_ptr<TemplateURLServiceClient> client,
|
||||
const base::RepeatingClosure& dsp_change_callback)
|
||||
: prefs_(prefs),
|
||||
@@ -69,7 +69,7 @@
|
||||
search_terms_data_(std::move(search_terms_data)),
|
||||
web_data_service_(web_data_service),
|
||||
client_(std::move(client)),
|
||||
@@ -370,8 +378,8 @@ bool TemplateURLService::CanAddAutogener
|
||||
@@ -319,8 +327,8 @@ bool TemplateURLService::CanAddAutogener
|
||||
// that may interfere with search queries). An easy heuristic for this is
|
||||
// whether the user has a TemplateURL that has been manually modified (e.g.,
|
||||
// renamed) connected to the same host.
|
||||
@@ -80,7 +80,7 @@
|
||||
}
|
||||
|
||||
bool TemplateURLService::IsPrepopulatedOrCreatedByPolicy(
|
||||
@@ -1654,6 +1662,8 @@ SyncDataMap TemplateURLService::CreateGU
|
||||
@@ -1577,6 +1585,8 @@ SyncDataMap TemplateURLService::CreateGU
|
||||
|
||||
void TemplateURLService::Init(const Initializer* initializers,
|
||||
int num_initializers) {
|
||||
@@ -89,7 +89,7 @@
|
||||
if (client_)
|
||||
client_->SetOwner(this);
|
||||
|
||||
@@ -1792,6 +1802,9 @@ void TemplateURLService::ChangeToLoadedS
|
||||
@@ -1712,6 +1722,9 @@ void TemplateURLService::ChangeToLoadedS
|
||||
|
||||
bool TemplateURLService::CanAddAutogeneratedKeywordForHost(
|
||||
const std::string& host) const {
|
||||
@@ -101,7 +101,7 @@
|
||||
return true;
|
||||
--- a/components/search_engines/template_url_service.h
|
||||
+++ b/components/search_engines/template_url_service.h
|
||||
@@ -772,6 +772,8 @@ class TemplateURLService : public WebDat
|
||||
@@ -742,6 +742,8 @@ class TemplateURLService : public WebDat
|
||||
// ---------- Browser state related members ---------------------------------
|
||||
raw_ptr<PrefService> prefs_ = nullptr;
|
||||
|
||||
|
||||
@@ -8,7 +8,7 @@
|
||||
#include "base/debug/alias.h"
|
||||
#include "base/functional/bind.h"
|
||||
#include "base/i18n/rtl.h"
|
||||
@@ -643,6 +644,8 @@ void Tab::OnGestureEvent(ui::GestureEven
|
||||
@@ -645,6 +646,8 @@ void Tab::OnGestureEvent(ui::GestureEven
|
||||
}
|
||||
|
||||
std::u16string Tab::GetTooltipText(const gfx::Point& p) const {
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
--- a/chrome/browser/ui/browser_command_controller.cc
|
||||
+++ b/chrome/browser/ui/browser_command_controller.cc
|
||||
@@ -1303,7 +1303,8 @@ void BrowserCommandController::InitComma
|
||||
@@ -1361,7 +1361,8 @@ void BrowserCommandController::InitComma
|
||||
command_updater_.UpdateCommandEnabled(IDC_WINDOW_CLOSE_OTHER_TABS,
|
||||
normal_window);
|
||||
|
||||
@@ -40,14 +40,14 @@
|
||||
#include "base/functional/bind.h"
|
||||
#include "base/strings/utf_string_conversions.h"
|
||||
#include "build/build_config.h"
|
||||
@@ -143,7 +144,8 @@ TabStripRegionView::TabStripRegionView(s
|
||||
return;
|
||||
}
|
||||
@@ -83,7 +84,8 @@ TabStripRegionView::TabStripRegionView(s
|
||||
|
||||
- if (browser->is_type_normal()) {
|
||||
+ if (browser->is_type_normal() &&
|
||||
// Add and configure the TabSearchButton.
|
||||
std::unique_ptr<TabSearchButton> tab_search_button;
|
||||
- if (browser && browser->is_type_normal()) {
|
||||
+ if (browser && browser->is_type_normal() &&
|
||||
+ !base::CommandLine::ForCurrentProcess()->HasSwitch("remove-tabsearch-button")) {
|
||||
auto tab_search_button = std::make_unique<TabSearchButton>(tab_strip_);
|
||||
tab_search_button = std::make_unique<TabSearchButton>(tab_strip_);
|
||||
tab_search_button->SetTooltipText(
|
||||
l10n_util::GetStringUTF16(IDS_TOOLTIP_TAB_SEARCH));
|
||||
--- a/chrome/browser/ungoogled_flag_entries.h
|
||||
|
||||
@@ -30,17 +30,20 @@
|
||||
uint64_t GetOriginTypeMask(const base::Value::List& data_types) {
|
||||
uint64_t result = 0;
|
||||
for (const auto& data_type : data_types) {
|
||||
@@ -328,7 +344,8 @@ void ChromeBrowsingDataLifetimeManager::
|
||||
@@ -328,9 +344,10 @@ void ChromeBrowsingDataLifetimeManager::
|
||||
const base::Value::List& data_types = profile_->GetPrefs()->GetList(
|
||||
browsing_data::prefs::kClearBrowsingDataOnExitList);
|
||||
|
||||
- if (IsConditionSatisfiedForBrowsingDataRemoval(GetSyncTypesForPolicyPref(
|
||||
- if (!data_types.empty() &&
|
||||
+ bool cdoe = base::FeatureList::IsEnabled(browsing_data::features::kClearDataOnExit);
|
||||
+ if (cdoe || IsConditionSatisfiedForBrowsingDataRemoval(GetSyncTypesForPolicyPref(
|
||||
profile_, browsing_data::prefs::kClearBrowsingDataOnExitList))) {
|
||||
+ if (!data_types.empty() && (cdoe ||
|
||||
IsConditionSatisfiedForBrowsingDataRemoval(GetSyncTypesForPolicyPref(
|
||||
- profile_, browsing_data::prefs::kClearBrowsingDataOnExitList))) {
|
||||
+ profile_, browsing_data::prefs::kClearBrowsingDataOnExitList)))) {
|
||||
profile_->GetPrefs()->SetBoolean(
|
||||
browsing_data::prefs::kClearBrowsingDataOnExitDeletionPending, true);
|
||||
@@ -340,8 +357,8 @@ void ChromeBrowsingDataLifetimeManager::
|
||||
auto* remover = profile_->GetBrowsingDataRemover();
|
||||
@@ -341,8 +358,8 @@ void ChromeBrowsingDataLifetimeManager::
|
||||
DCHECK(keep_browser_alive);
|
||||
#endif
|
||||
remover->RemoveAndReply(base::Time(), base::Time::Max(),
|
||||
@@ -53,7 +56,7 @@
|
||||
keep_browser_alive));
|
||||
--- a/chrome/browser/browsing_data/chrome_browsing_data_lifetime_manager_factory.cc
|
||||
+++ b/chrome/browser/browsing_data/chrome_browsing_data_lifetime_manager_factory.cc
|
||||
@@ -44,6 +44,8 @@ ChromeBrowsingDataLifetimeManagerFactory
|
||||
@@ -45,6 +45,8 @@ ChromeBrowsingDataLifetimeManagerFactory
|
||||
KeyedService* ChromeBrowsingDataLifetimeManagerFactory::BuildServiceInstanceFor(
|
||||
content::BrowserContext* context) const {
|
||||
if (!base::FeatureList::IsEnabled(
|
||||
|
||||
@@ -13,7 +13,7 @@
|
||||
#endif // CHROME_BROWSER_UNGOOGLED_FLAG_ENTRIES_H_
|
||||
--- a/content/renderer/render_frame_impl.cc
|
||||
+++ b/content/renderer/render_frame_impl.cc
|
||||
@@ -1169,6 +1169,8 @@ WindowOpenDisposition NavigationPolicyTo
|
||||
@@ -1173,6 +1173,8 @@ WindowOpenDisposition NavigationPolicyTo
|
||||
case blink::kWebNavigationPolicyNewWindow:
|
||||
return WindowOpenDisposition::NEW_WINDOW;
|
||||
case blink::kWebNavigationPolicyNewPopup:
|
||||
|
||||
@@ -21,7 +21,7 @@
|
||||
#include "base/compiler_specific.h"
|
||||
#include "base/containers/flat_set.h"
|
||||
#include "base/feature_list.h"
|
||||
@@ -1304,7 +1305,8 @@ void HistoryBackend::InitImpl(
|
||||
@@ -1305,7 +1306,8 @@ void HistoryBackend::InitImpl(
|
||||
db_->GetStartDate(&first_recorded_time_);
|
||||
|
||||
// Start expiring old stuff.
|
||||
|
||||
@@ -34,7 +34,7 @@
|
||||
widget->Show();
|
||||
}
|
||||
|
||||
@@ -869,6 +882,9 @@ void ExtensionsToolbarContainer::UpdateC
|
||||
@@ -867,6 +880,9 @@ void ExtensionsToolbarContainer::UpdateC
|
||||
}
|
||||
|
||||
bool ExtensionsToolbarContainer::ShouldContainerBeVisible() const {
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
--- a/chrome/browser/ui/views/frame/browser_view.cc
|
||||
+++ b/chrome/browser/ui/views/frame/browser_view.cc
|
||||
@@ -1754,6 +1754,10 @@ void BrowserView::UpdateExclusiveAccessE
|
||||
@@ -1765,6 +1765,10 @@ void BrowserView::UpdateExclusiveAccessE
|
||||
ExclusiveAccessBubbleHideCallback bubble_first_hide_callback,
|
||||
bool notify_download,
|
||||
bool force_update) {
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
--- a/chrome/browser/ui/views/toolbar/toolbar_view.cc
|
||||
+++ b/chrome/browser/ui/views/toolbar/toolbar_view.cc
|
||||
@@ -317,7 +317,8 @@ void ToolbarView::Init() {
|
||||
@@ -368,7 +368,8 @@ void ToolbarView::Init() {
|
||||
|
||||
std::unique_ptr<SidePanelToolbarButton> side_panel_button;
|
||||
std::unique_ptr<SidePanelToolbarContainer> side_panel_toolbar_container;
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
--- a/chrome/browser/ui/views/toolbar/toolbar_view.cc
|
||||
+++ b/chrome/browser/ui/views/toolbar/toolbar_view.cc
|
||||
@@ -397,6 +397,17 @@ void ToolbarView::Init() {
|
||||
@@ -455,6 +455,17 @@ void ToolbarView::Init() {
|
||||
#elif BUILDFLAG(IS_CHROMEOS_LACROS)
|
||||
show_avatar_toolbar_button = !profiles::IsPublicSession();
|
||||
#endif
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
--- a/chrome/browser/about_flags.cc
|
||||
+++ b/chrome/browser/about_flags.cc
|
||||
@@ -3790,10 +3790,12 @@ const FeatureEntry::FeatureVariation kPa
|
||||
@@ -3791,10 +3791,12 @@ const FeatureEntry::FeatureVariation kPa
|
||||
#include "chrome/browser/ungoogled_flag_choices.h"
|
||||
#include "chrome/browser/bromite_flag_choices.h"
|
||||
#include "chrome/browser/ungoogled_platform_flag_choices.h"
|
||||
@@ -39,7 +39,7 @@
|
||||
+#endif // CHROME_BROWSER_EXISTING_SWITCH_FLAG_CHOICES_H_
|
||||
--- /dev/null
|
||||
+++ b/chrome/browser/existing_switch_flag_entries.h
|
||||
@@ -0,0 +1,43 @@
|
||||
@@ -0,0 +1,39 @@
|
||||
+// Copyright (c) 2023 The ungoogled-chromium Authors. All rights reserved.
|
||||
+// Use of this source code is governed by a BSD-style license that can be
|
||||
+// found in the LICENSE file.
|
||||
@@ -74,10 +74,6 @@
|
||||
+ "Start Maximized",
|
||||
+ "Starts the browser maximized, regardless of any previous settings. Chromium feature, ungoogled-chromium flag.",
|
||||
+ kOsDesktop, SINGLE_VALUE_TYPE("start-maximized")},
|
||||
+ {"web-ui-dark-mode",
|
||||
+ "Web UI Dark Mode",
|
||||
+ "Whether to enable 'dark mode' enhancements for UIs implemented with web technologies. Chromium feature, ungoogled-chromium flag.",
|
||||
+ kOsAll, FEATURE_VALUE_TYPE(features::kWebUIDarkMode)},
|
||||
+ {"webrtc-ip-handling-policy",
|
||||
+ "WebRTC IP policy",
|
||||
+ "Restrict which IP addresses and interfaces WebRTC uses. Chromium feature, ungoogled-chromium flag.",
|
||||
|
||||
@@ -19,7 +19,7 @@
|
||||
#endif // CHROME_BROWSER_UNGOOGLED_FLAG_ENTRIES_H_
|
||||
--- a/chrome/common/BUILD.gn
|
||||
+++ b/chrome/common/BUILD.gn
|
||||
@@ -144,6 +144,8 @@ static_library("common_lib") {
|
||||
@@ -152,6 +152,8 @@ static_library("common_lib") {
|
||||
"pref_names_util.cc",
|
||||
"pref_names_util.h",
|
||||
"ref_counted_util.h",
|
||||
@@ -28,7 +28,7 @@
|
||||
"search/instant_mojom_traits.h",
|
||||
"search/instant_types.cc",
|
||||
"search/instant_types.h",
|
||||
@@ -268,6 +270,7 @@ static_library("common_lib") {
|
||||
@@ -276,6 +278,7 @@ static_library("common_lib") {
|
||||
"//components/no_state_prefetch/common:mojo_bindings",
|
||||
"//components/page_load_metrics/common:common",
|
||||
"//components/password_manager/content/common",
|
||||
@@ -38,7 +38,7 @@
|
||||
if (enable_supervised_users) {
|
||||
--- a/chrome/common/chrome_features.cc
|
||||
+++ b/chrome/common/chrome_features.cc
|
||||
@@ -877,6 +877,14 @@ BASE_FEATURE(kNewMacNotificationAPI,
|
||||
@@ -869,6 +869,14 @@ BASE_FEATURE(kNewMacNotificationAPI,
|
||||
// referrers instead of their ordinary behavior.
|
||||
BASE_FEATURE(kNoReferrers, "NoReferrers", base::FEATURE_DISABLED_BY_DEFAULT);
|
||||
|
||||
@@ -55,7 +55,7 @@
|
||||
// on-screen until dismissed, they are instead shown for a very long time.
|
||||
--- a/chrome/common/chrome_features.h
|
||||
+++ b/chrome/common/chrome_features.h
|
||||
@@ -516,6 +516,10 @@ COMPONENT_EXPORT(CHROME_FEATURES) BASE_D
|
||||
@@ -507,6 +507,10 @@ COMPONENT_EXPORT(CHROME_FEATURES) BASE_D
|
||||
|
||||
COMPONENT_EXPORT(CHROME_FEATURES) BASE_DECLARE_FEATURE(kNoReferrers);
|
||||
|
||||
@@ -164,7 +164,7 @@
|
||||
"//components/embedder_support",
|
||||
--- a/components/BUILD.gn
|
||||
+++ b/components/BUILD.gn
|
||||
@@ -51,7 +51,7 @@ if (is_ios) {
|
||||
@@ -68,7 +68,7 @@ if (is_ios) {
|
||||
|
||||
# Omit Lacros because it allows //components to depend on //chrome, which in
|
||||
# turn depends on //extensions.
|
||||
@@ -173,7 +173,7 @@
|
||||
disallowed_extension_deps_ = [
|
||||
# Components should largely not depend on //extensions. Since // extensions
|
||||
# is not a component target and is linked with //chrome, depending on most
|
||||
@@ -710,7 +710,7 @@ test("components_unittests") {
|
||||
@@ -730,7 +730,7 @@ test("components_unittests") {
|
||||
# On other platforms, no components should depend on Chrome.
|
||||
# Since //chrome depends on //extensions, we also only assert_no_deps on
|
||||
# extensions targets for non-lacros builds.
|
||||
@@ -182,7 +182,7 @@
|
||||
assert_no_deps = [ "//chrome/*" ]
|
||||
assert_no_deps += disallowed_extension_deps_
|
||||
}
|
||||
@@ -992,7 +992,7 @@ if (use_blink) {
|
||||
@@ -1018,7 +1018,7 @@ if (use_blink) {
|
||||
# dependency. On other platforms, no components should depend on Chrome.
|
||||
# Since //chrome depends on //extensions, we also only assert_no_deps on
|
||||
# extensions targets for non-lacros builds.
|
||||
@@ -201,7 +201,7 @@
|
||||
#include "content/browser/blob_storage/chrome_blob_storage_context.h"
|
||||
#include "content/browser/browsing_topics/header_util.h"
|
||||
#include "content/browser/child_process_security_policy_impl.h"
|
||||
@@ -408,10 +409,10 @@ void AddAdditionalRequestHeaders(
|
||||
@@ -385,10 +386,10 @@ void AddAdditionalRequestHeaders(
|
||||
net::HttpRequestHeaders::kUserAgent,
|
||||
ComputeUserAgentValue(*headers, user_agent_override, browser_context));
|
||||
|
||||
@@ -226,7 +226,7 @@
|
||||
#include "content/common/associated_interfaces.mojom.h"
|
||||
#include "content/common/content_navigation_policy.h"
|
||||
#include "content/common/content_switches_internal.h"
|
||||
@@ -4282,10 +4283,13 @@ void RenderFrameImpl::WillSendRequestInt
|
||||
@@ -4304,10 +4305,13 @@ void RenderFrameImpl::WillSendRequestInt
|
||||
|
||||
request.SetHasUserGesture(frame_->HasTransientUserActivation());
|
||||
|
||||
@@ -333,7 +333,7 @@
|
||||
#include "third_party/blink/public/platform/url_loader_throttle_provider.h"
|
||||
#include "third_party/blink/public/platform/weak_wrapper_resource_load_info_notifier.h"
|
||||
#include "third_party/blink/public/platform/web_code_cache_loader.h"
|
||||
@@ -402,10 +404,13 @@ void DedicatedOrSharedWorkerFetchContext
|
||||
@@ -401,10 +403,13 @@ void DedicatedOrSharedWorkerFetchContext
|
||||
if (g_rewrite_url)
|
||||
request.SetUrl(g_rewrite_url(request.Url().GetString().Utf8(), false));
|
||||
|
||||
|
||||
@@ -35,7 +35,7 @@
|
||||
// https://vasilvv.github.io/httpbis-alps/draft-vvv-httpbis-alps.html.
|
||||
--- a/net/dns/host_resolver_manager.cc
|
||||
+++ b/net/dns/host_resolver_manager.cc
|
||||
@@ -157,11 +157,6 @@ const unsigned kMinimumTTLSeconds = kCac
|
||||
@@ -158,11 +158,6 @@ const unsigned kMinimumTTLSeconds = kCac
|
||||
// cached.
|
||||
const int kIPv6ProbePeriodMs = 1000;
|
||||
|
||||
@@ -47,7 +47,7 @@
|
||||
// ICANN uses this localhost address to indicate a name collision.
|
||||
//
|
||||
// The policy in Chromium is to fail host resolving if it resolves to
|
||||
@@ -3944,33 +3939,10 @@ int HostResolverManager::StartIPv6Reacha
|
||||
@@ -3895,33 +3890,10 @@ int HostResolverManager::StartIPv6Reacha
|
||||
return OK;
|
||||
}
|
||||
|
||||
@@ -64,7 +64,7 @@
|
||||
- kIPv6ProbePeriodMs) {
|
||||
- probing_ipv6_ = true;
|
||||
- rv = StartGloballyReachableCheck(
|
||||
- IPAddress(kIPv6ProbeAddress), net_log,
|
||||
- IPAddress(kIPv6ProbeAddress), net_log, client_socket_factory,
|
||||
- base::BindOnce(&HostResolverManager::FinishIPv6ReachabilityCheck,
|
||||
- weak_ptr_factory_.GetWeakPtr(), std::move(callback)));
|
||||
- if (rv != ERR_IO_PENDING) {
|
||||
|
||||
@@ -270,7 +270,7 @@
|
||||
bool CanEdit(const TemplateURL* url) const;
|
||||
--- a/chrome/browser/ui/search_engines/template_url_table_model.cc
|
||||
+++ b/chrome/browser/ui/search_engines/template_url_table_model.cc
|
||||
@@ -112,21 +112,25 @@ void TemplateURLTableModel::Remove(size_
|
||||
@@ -105,21 +105,25 @@ void TemplateURLTableModel::Remove(size_
|
||||
void TemplateURLTableModel::Add(size_t index,
|
||||
const std::u16string& short_name,
|
||||
const std::u16string& keyword,
|
||||
@@ -301,7 +301,7 @@
|
||||
DCHECK(index <= RowCount());
|
||||
DCHECK(!url.empty());
|
||||
TemplateURL* template_url = GetTemplateURL(index);
|
||||
@@ -135,7 +139,8 @@ void TemplateURLTableModel::ModifyTempla
|
||||
@@ -128,7 +132,8 @@ void TemplateURLTableModel::ModifyTempla
|
||||
DCHECK(template_url_service_->GetDefaultSearchProvider() != template_url ||
|
||||
template_url->SupportsReplacement(
|
||||
template_url_service_->search_terms_data()));
|
||||
@@ -427,7 +427,7 @@
|
||||
|
||||
--- a/components/search_engines/template_url_service.cc
|
||||
+++ b/components/search_engines/template_url_service.cc
|
||||
@@ -657,7 +657,8 @@ void TemplateURLService::IncrementUsageC
|
||||
@@ -605,7 +605,8 @@ void TemplateURLService::IncrementUsageC
|
||||
void TemplateURLService::ResetTemplateURL(TemplateURL* url,
|
||||
const std::u16string& title,
|
||||
const std::u16string& keyword,
|
||||
@@ -437,7 +437,7 @@
|
||||
DCHECK(!IsCreatedByExtension(url));
|
||||
DCHECK(!keyword.empty());
|
||||
DCHECK(!search_url.empty());
|
||||
@@ -672,6 +673,7 @@ void TemplateURLService::ResetTemplateUR
|
||||
@@ -620,6 +621,7 @@ void TemplateURLService::ResetTemplateUR
|
||||
data.safe_for_autoreplace = false;
|
||||
data.last_modified = clock_->Now();
|
||||
data.is_active = TemplateURLData::ActiveStatus::kTrue;
|
||||
@@ -447,7 +447,7 @@
|
||||
}
|
||||
--- a/components/search_engines/template_url_service.h
|
||||
+++ b/components/search_engines/template_url_service.h
|
||||
@@ -266,7 +266,8 @@ class TemplateURLService : public WebDat
|
||||
@@ -240,7 +240,8 @@ class TemplateURLService : public WebDat
|
||||
void ResetTemplateURL(TemplateURL* url,
|
||||
const std::u16string& title,
|
||||
const std::u16string& keyword,
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
--- a/chrome/browser/about_flags.cc
|
||||
+++ b/chrome/browser/about_flags.cc
|
||||
@@ -3786,7 +3786,13 @@ const FeatureEntry::FeatureVariation kPa
|
||||
@@ -3787,7 +3787,13 @@ const FeatureEntry::FeatureVariation kPa
|
||||
// calculate and verify checksum.
|
||||
//
|
||||
// When adding a new choice, add it to the end of the list.
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
--- a/chrome/browser/ui/browser_ui_prefs.cc
|
||||
+++ b/chrome/browser/ui/browser_ui_prefs.cc
|
||||
@@ -91,7 +91,7 @@ void RegisterBrowserUserPrefs(user_prefs
|
||||
@@ -93,7 +93,7 @@ void RegisterBrowserUserPrefs(user_prefs
|
||||
false);
|
||||
#endif
|
||||
registry->RegisterStringPref(prefs::kWebRTCIPHandlingPolicy,
|
||||
|
||||
@@ -0,0 +1,72 @@
|
||||
--- a/chrome/browser/media/webrtc/capture_policy_utils.cc
|
||||
+++ b/chrome/browser/media/webrtc/capture_policy_utils.cc
|
||||
@@ -139,69 +139,12 @@ void RegisterProfilePrefs(PrefRegistrySi
|
||||
}
|
||||
|
||||
bool IsGetAllScreensMediaAllowedForAnySite(content::BrowserContext* context) {
|
||||
-#if BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_LINUX)
|
||||
- Profile* profile = Profile::FromBrowserContext(context);
|
||||
- if (!profile) {
|
||||
- return false;
|
||||
- }
|
||||
-
|
||||
-#if BUILDFLAG(IS_CHROMEOS_LACROS)
|
||||
- // To ensure that a user is informed at login time that capturing of all
|
||||
- // screens can happen (for privacy reasons), this API is only available on
|
||||
- // primary profiles.
|
||||
- if (!profile->IsMainProfile()) {
|
||||
- return false;
|
||||
- }
|
||||
-#endif // BUILDFLAG(IS_CHROMEOS_LACROS)
|
||||
-
|
||||
- HostContentSettingsMap* host_content_settings_map =
|
||||
- HostContentSettingsMapFactory::GetForProfile(profile);
|
||||
- if (!host_content_settings_map) {
|
||||
- return false;
|
||||
- }
|
||||
- ContentSettingsForOneType content_settings;
|
||||
- host_content_settings_map->GetSettingsForOneType(
|
||||
- ContentSettingsType::ALL_SCREEN_CAPTURE, &content_settings);
|
||||
- return base::ranges::any_of(content_settings,
|
||||
- [](const ContentSettingPatternSource& source) {
|
||||
- return source.GetContentSetting() ==
|
||||
- ContentSetting::CONTENT_SETTING_ALLOW;
|
||||
- });
|
||||
-#else
|
||||
return false;
|
||||
-#endif
|
||||
}
|
||||
|
||||
bool IsGetAllScreensMediaAllowed(content::BrowserContext* context,
|
||||
const GURL& url) {
|
||||
-#if BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_LINUX)
|
||||
- Profile* profile = Profile::FromBrowserContext(context);
|
||||
- if (!profile) {
|
||||
- return false;
|
||||
- }
|
||||
-
|
||||
-#if BUILDFLAG(IS_CHROMEOS_LACROS)
|
||||
- // To ensure that a user is informed at login time that capturing of all
|
||||
- // screens can happen (for privacy reasons), this API is only available on
|
||||
- // primary profiles.
|
||||
- if (!profile->IsMainProfile()) {
|
||||
- return false;
|
||||
- }
|
||||
-#endif // BUILDFLAG(IS_CHROMEOS_LACROS)
|
||||
-
|
||||
- HostContentSettingsMap* host_content_settings_map =
|
||||
- HostContentSettingsMapFactory::GetForProfile(profile);
|
||||
- if (!host_content_settings_map) {
|
||||
- return false;
|
||||
- }
|
||||
- ContentSetting auto_accept_enabled =
|
||||
- host_content_settings_map->GetContentSetting(
|
||||
- url, url, ContentSettingsType::ALL_SCREEN_CAPTURE);
|
||||
- return auto_accept_enabled == ContentSetting::CONTENT_SETTING_ALLOW;
|
||||
-#else
|
||||
- // This API is currently only available on ChromeOS and Linux.
|
||||
return false;
|
||||
-#endif
|
||||
}
|
||||
|
||||
#if !BUILDFLAG(IS_ANDROID)
|
||||
@@ -147,9 +147,9 @@
|
||||
} // namespace download
|
||||
--- a/content/browser/BUILD.gn
|
||||
+++ b/content/browser/BUILD.gn
|
||||
@@ -100,7 +100,6 @@ source_set("browser") {
|
||||
@@ -98,7 +98,6 @@ source_set("browser") {
|
||||
"//components/payments/mojom",
|
||||
"//components/power_monitor",
|
||||
"//components/power_scheduler",
|
||||
"//components/services/filesystem:lib",
|
||||
- "//components/services/quarantine:quarantine",
|
||||
"//components/services/screen_ai/buildflags",
|
||||
|
||||
@@ -3,7 +3,7 @@
|
||||
|
||||
--- a/third_party/blink/renderer/modules/webgl/webgl_rendering_context_base.cc
|
||||
+++ b/third_party/blink/renderer/modules/webgl/webgl_rendering_context_base.cc
|
||||
@@ -3759,8 +3759,7 @@ ScriptValue WebGLRenderingContextBase::g
|
||||
@@ -3788,8 +3788,7 @@ ScriptValue WebGLRenderingContextBase::g
|
||||
pname, IdentifiabilityBenignStringToken(
|
||||
String(ContextGL()->GetString(GL_RENDERER))));
|
||||
}
|
||||
@@ -13,7 +13,7 @@
|
||||
}
|
||||
SynthesizeGLError(
|
||||
GL_INVALID_ENUM, "getParameter",
|
||||
@@ -3774,8 +3773,7 @@ ScriptValue WebGLRenderingContextBase::g
|
||||
@@ -3803,8 +3802,7 @@ ScriptValue WebGLRenderingContextBase::g
|
||||
pname, IdentifiabilityBenignStringToken(
|
||||
String(ContextGL()->GetString(GL_VENDOR))));
|
||||
}
|
||||
|
||||
@@ -2,12 +2,12 @@
|
||||
|
||||
--- a/third_party/blink/common/features.cc
|
||||
+++ b/third_party/blink/common/features.cc
|
||||
@@ -510,7 +510,7 @@ BASE_FEATURE(kAllowSyncXHRInPageDismissa
|
||||
@@ -1222,7 +1222,7 @@ BASE_FEATURE(kPrefetchFontLookupTables,
|
||||
// crbug.com/988956.
|
||||
BASE_FEATURE(kPrefetchPrivacyChanges,
|
||||
"PrefetchPrivacyChanges",
|
||||
- base::FEATURE_DISABLED_BY_DEFAULT);
|
||||
+ base::FEATURE_ENABLED_BY_DEFAULT);
|
||||
|
||||
// Decodes jpeg 4:2:0 formatted images to YUV instead of RGBX and stores in this
|
||||
// format in the image decode cache. See crbug.com/919627 for details on the
|
||||
BASE_FEATURE(kPrerender2InNewTab,
|
||||
"Prerender2InNewTab",
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
|
||||
--- a/chrome/browser/ui/browser_commands.cc
|
||||
+++ b/chrome/browser/ui/browser_commands.cc
|
||||
@@ -466,10 +466,6 @@ int GetContentRestrictions(const Browser
|
||||
@@ -469,10 +469,6 @@ int GetContentRestrictions(const Browser
|
||||
CoreTabHelper* core_tab_helper =
|
||||
CoreTabHelper::FromWebContents(current_tab);
|
||||
content_restrictions = core_tab_helper->content_restrictions();
|
||||
@@ -13,7 +13,7 @@
|
||||
}
|
||||
return content_restrictions;
|
||||
}
|
||||
@@ -1504,8 +1500,7 @@ bool CanSavePage(const Browser* browser)
|
||||
@@ -1537,8 +1533,7 @@ bool CanSavePage(const Browser* browser)
|
||||
DownloadPrefs::DownloadRestriction::ALL_FILES) {
|
||||
return false;
|
||||
}
|
||||
|
||||
@@ -13,7 +13,7 @@
|
||||
foreground_frame_active_color_id_ =
|
||||
--- a/chrome/browser/ui/views/tabs/tab_strip.cc
|
||||
+++ b/chrome/browser/ui/views/tabs/tab_strip.cc
|
||||
@@ -1891,8 +1891,6 @@ void TabStrip::NewTabButtonPressed(const
|
||||
@@ -1887,8 +1887,6 @@ void TabStrip::NewTabButtonPressed(const
|
||||
|
||||
const ui::MouseEvent& mouse = static_cast<const ui::MouseEvent&>(event);
|
||||
if (mouse.IsOnlyMiddleMouseButton()) {
|
||||
@@ -22,7 +22,7 @@
|
||||
ui::Clipboard* clipboard = ui::Clipboard::GetForCurrentThread();
|
||||
CHECK(clipboard);
|
||||
std::u16string clipboard_text;
|
||||
@@ -1900,7 +1898,6 @@ void TabStrip::NewTabButtonPressed(const
|
||||
@@ -1896,7 +1894,6 @@ void TabStrip::NewTabButtonPressed(const
|
||||
/* data_dst = */ nullptr, &clipboard_text);
|
||||
if (!clipboard_text.empty())
|
||||
controller_->CreateNewTabWithLocation(clipboard_text);
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
--- a/chrome/browser/chrome_browser_main.cc
|
||||
+++ b/chrome/browser/chrome_browser_main.cc
|
||||
@@ -1002,6 +1002,7 @@ int ChromeBrowserMainParts::PreCreateThr
|
||||
@@ -1025,6 +1025,7 @@ int ChromeBrowserMainParts::PreCreateThr
|
||||
if (first_run::IsChromeFirstRun()) {
|
||||
if (!base::CommandLine::ForCurrentProcess()->HasSwitch(switches::kApp) &&
|
||||
!base::CommandLine::ForCurrentProcess()->HasSwitch(switches::kAppId)) {
|
||||
@@ -10,7 +10,7 @@
|
||||
|
||||
--- a/chrome/browser/ui/webui/chrome_web_ui_controller_factory.cc
|
||||
+++ b/chrome/browser/ui/webui/chrome_web_ui_controller_factory.cc
|
||||
@@ -65,6 +65,7 @@
|
||||
@@ -66,6 +66,7 @@
|
||||
#include "chrome/browser/ui/webui/suggest_internals/suggest_internals_ui.h"
|
||||
#include "chrome/browser/ui/webui/sync_internals/sync_internals_ui.h"
|
||||
#include "chrome/browser/ui/webui/translate_internals/translate_internals_ui.h"
|
||||
@@ -18,7 +18,7 @@
|
||||
#include "chrome/browser/ui/webui/usb_internals/usb_internals_ui.h"
|
||||
#include "chrome/browser/ui/webui/user_actions/user_actions_ui.h"
|
||||
#include "chrome/browser/ui/webui/version/version_ui.h"
|
||||
@@ -866,6 +867,8 @@ WebUIFactoryFunction GetWebUIFactoryFunc
|
||||
@@ -885,6 +886,8 @@ WebUIFactoryFunction GetWebUIFactoryFunc
|
||||
}
|
||||
#endif
|
||||
|
||||
@@ -174,7 +174,7 @@
|
||||
+#endif // CHROME_BROWSER_UI_WEBUI_UNGOOGLED_FIRST_RUN_H_
|
||||
--- a/chrome/common/webui_url_constants.cc
|
||||
+++ b/chrome/common/webui_url_constants.cc
|
||||
@@ -668,6 +668,7 @@ const char kExtensionConfigureCommandsSu
|
||||
@@ -644,6 +644,7 @@ const char kExtensionConfigureCommandsSu
|
||||
// Add hosts here to be included in chrome://chrome-urls (about:about).
|
||||
// These hosts will also be suggested by BuiltinProvider.
|
||||
const char* const kChromeHostURLs[] = {
|
||||
|
||||
@@ -24,10 +24,10 @@
|
||||
|
||||
--- a/chrome/browser/resources/extensions/item_list.html
|
||||
+++ b/chrome/browser/resources/extensions/item_list.html
|
||||
@@ -80,13 +80,6 @@
|
||||
<div id="container">
|
||||
<managed-footnote hidden="[[filter]]"></managed-footnote>
|
||||
<div id="content-wrapper" style="--max-columns: [[maxColumns_]];">
|
||||
@@ -90,13 +90,6 @@
|
||||
</extensions-review-panel>
|
||||
</template>
|
||||
</div>
|
||||
- <div id="no-items" class="empty-list-message"
|
||||
- hidden$="[[!shouldShowEmptyItemsMessage_(
|
||||
- apps.length, extensions.length)]]">
|
||||
@@ -55,7 +55,7 @@
|
||||
-</div>
|
||||
--- a/chrome/browser/resources/history/side_bar.html
|
||||
+++ b/chrome/browser/resources/history/side_bar.html
|
||||
@@ -95,13 +95,6 @@
|
||||
@@ -87,13 +87,6 @@
|
||||
$i18n{historyMenuItem}
|
||||
<paper-ripple></paper-ripple>
|
||||
</a>
|
||||
@@ -136,7 +136,7 @@
|
||||
<div class="separator"></div>
|
||||
--- a/chrome/browser/resources/settings/appearance_page/appearance_page.ts
|
||||
+++ b/chrome/browser/resources/settings/appearance_page/appearance_page.ts
|
||||
@@ -353,8 +353,8 @@ export class SettingsAppearancePageEleme
|
||||
@@ -362,8 +362,8 @@ export class SettingsAppearancePageEleme
|
||||
return;
|
||||
}
|
||||
|
||||
@@ -146,7 +146,7 @@
|
||||
switch (this.systemTheme_) {
|
||||
case SystemTheme.GTK:
|
||||
i18nId = 'gtkTheme';
|
||||
@@ -366,11 +366,8 @@ export class SettingsAppearancePageEleme
|
||||
@@ -375,11 +375,8 @@ export class SettingsAppearancePageEleme
|
||||
i18nId = 'classicTheme';
|
||||
break;
|
||||
}
|
||||
@@ -294,7 +294,7 @@
|
||||
</cr-icon-button>
|
||||
--- a/chrome/browser/ui/views/profiles/profile_menu_view.cc
|
||||
+++ b/chrome/browser/ui/views/profiles/profile_menu_view.cc
|
||||
@@ -196,6 +196,7 @@ void ProfileMenuView::BuildMenu() {
|
||||
@@ -167,6 +167,7 @@ void ProfileMenuView::BuildMenu() {
|
||||
}
|
||||
|
||||
gfx::ImageSkia ProfileMenuView::GetSyncIcon() const {
|
||||
@@ -302,7 +302,7 @@
|
||||
Profile* profile = browser()->profile();
|
||||
if (profile->IsOffTheRecord() || profile->IsGuestSession())
|
||||
return gfx::ImageSkia();
|
||||
@@ -518,8 +519,7 @@ void ProfileMenuView::BuildIdentity() {
|
||||
@@ -504,8 +505,7 @@ void ProfileMenuView::BuildIdentity() {
|
||||
menu_subtitle_);
|
||||
} else {
|
||||
menu_title_ = std::u16string();
|
||||
@@ -334,7 +334,7 @@
|
||||
base::BindRepeating(&SadTabView::PerformAction,
|
||||
--- a/media/base/media_switches.cc
|
||||
+++ b/media/base/media_switches.cc
|
||||
@@ -844,7 +844,7 @@ const base::FeatureParam<std::string> kM
|
||||
@@ -869,7 +869,7 @@ const base::FeatureParam<std::string> kM
|
||||
#endif // BUILDFLAG(IS_WIN)
|
||||
|
||||
// Enables the Live Caption feature on supported devices.
|
||||
|
||||
@@ -1,5 +1,3 @@
|
||||
upstream/fix-print-content-analysis.patch
|
||||
|
||||
core/inox-patchset/0001-fix-building-without-safebrowsing.patch
|
||||
core/inox-patchset/0003-disable-autofill-download-manager.patch
|
||||
core/inox-patchset/0005-disable-default-extensions.patch
|
||||
@@ -12,7 +10,6 @@ core/iridium-browser/all-add-trk-prefixes-to-possibly-evil-connections.patch
|
||||
core/ungoogled-chromium/disable-crash-reporter.patch
|
||||
core/ungoogled-chromium/disable-google-host-detection.patch
|
||||
core/ungoogled-chromium/replace-google-search-engine-with-nosearch.patch
|
||||
core/ungoogled-chromium/disable-signin.patch
|
||||
core/ungoogled-chromium/toggle-translation-via-switch.patch
|
||||
core/ungoogled-chromium/disable-untraceable-urls.patch
|
||||
core/ungoogled-chromium/disable-profile-avatar-downloading.patch
|
||||
@@ -32,6 +29,7 @@ core/ungoogled-chromium/remove-unused-preferences-fields.patch
|
||||
core/ungoogled-chromium/block-requests.patch
|
||||
core/ungoogled-chromium/disable-privacy-sandbox.patch
|
||||
core/ungoogled-chromium/doh-changes.patch
|
||||
core/ungoogled-chromium/disable-web-environment-integrity.patch
|
||||
core/bromite/disable-fetching-field-trials.patch
|
||||
|
||||
extra/ungoogled-chromium/add-ungoogled-flag-headers.patch
|
||||
@@ -104,3 +102,4 @@ extra/ungoogled-chromium/add-flags-for-referrer-customization.patch
|
||||
extra/ungoogled-chromium/default-webrtc-ip-handling-policy.patch
|
||||
extra/ungoogled-chromium/add-flags-for-existing-switches.patch
|
||||
extra/ungoogled-chromium/first-run-page.patch
|
||||
extra/ungoogled-chromium/disable-capture-all-screens.patch
|
||||
|
||||
@@ -1,32 +0,0 @@
|
||||
--- a/chrome/browser/enterprise/connectors/analysis/print_content_analysis_utils.cc
|
||||
+++ b/chrome/browser/enterprise/connectors/analysis/print_content_analysis_utils.cc
|
||||
@@ -59,6 +59,7 @@ void PrintIfAllowedByPolicy(scoped_refpt
|
||||
base::OnceClosure hide_preview) {
|
||||
ContentAnalysisDelegate::Data scanning_data;
|
||||
|
||||
+#if BUILDFLAG(ENABLE_PRINT_CONTENT_ANALYSIS)
|
||||
if (ContentAnalysisDelegate::IsEnabled(
|
||||
Profile::FromBrowserContext(initiator->GetBrowserContext()),
|
||||
initiator->GetLastCommittedURL(), &scanning_data,
|
||||
@@ -78,6 +79,7 @@ void PrintIfAllowedByPolicy(scoped_refpt
|
||||
std::move(on_verdict));
|
||||
return;
|
||||
}
|
||||
+#endif // BUILDFLAG(ENABLE_PRINT_CONTENT_ANALYSIS)
|
||||
std::move(on_verdict).Run(/*allowed=*/true);
|
||||
}
|
||||
|
||||
@@ -92,11 +94,13 @@ absl::optional<ContentAnalysisDelegate::
|
||||
return absl::nullopt;
|
||||
}
|
||||
|
||||
+#if BUILDFLAG(ENABLE_PRINT_CONTENT_ANALYSIS)
|
||||
if ((base::FeatureList::IsEnabled(
|
||||
printing::features::kEnablePrintScanAfterPreview) &&
|
||||
scanning_data.settings.cloud_or_local_settings.is_local_analysis())) {
|
||||
return absl::nullopt;
|
||||
}
|
||||
+#endif // BUILDFLAG(ENABLE_PRINT_CONTENT_ANALYSIS)
|
||||
|
||||
return scanning_data;
|
||||
}
|
||||
33
pruning.list
33
pruning.list
@@ -206,6 +206,7 @@ components/test/data/paint_preview/PaintPreviewTestService/wikipedia/ABE3BC9BB03
|
||||
components/test/data/paint_preview/PaintPreviewTestService/wikipedia/proto.pb
|
||||
components/test/data/printing/unsorted_custompapers.plist
|
||||
components/test/data/safe_browsing/client_model.pb
|
||||
components/test/data/safe_browsing/image_embedding.tflite
|
||||
components/test/data/safe_browsing/visual_model_android.tflite
|
||||
components/test/data/safe_browsing/visual_model_desktop.tflite
|
||||
components/test/data/segmentation_platform/adder.tflite
|
||||
@@ -580,6 +581,7 @@ net/data/cache_tests/remove_tail3/index
|
||||
net/data/cache_tests/wrong_version/index
|
||||
net/data/cert_net_fetcher_impl_unittest/gzipped_crl
|
||||
net/data/filter_unittests/google.br
|
||||
net/data/filter_unittests/google.sbr
|
||||
net/data/fuzzer_data/crl_getcrlstatusforcert_fuzzer/bad_empty_extensions
|
||||
net/data/fuzzer_data/crl_getcrlstatusforcert_fuzzer/bad_empty_sequence
|
||||
net/data/fuzzer_data/crl_getcrlstatusforcert_fuzzer/good
|
||||
@@ -2529,6 +2531,7 @@ third_party/android_build_tools/lint/custom_lint.jar
|
||||
third_party/angle/samples/multi_texture/basemap.tga
|
||||
third_party/angle/samples/multi_texture/lightmap.tga
|
||||
third_party/angle/samples/particle_system/smoke.tga
|
||||
third_party/angle/src/tests/capture_tests/expected/CapturedTest_MultiFrame_ES3_Vulkan.angledata
|
||||
third_party/angle/third_party/glmark2/src/data/models/asteroid-high.3ds
|
||||
third_party/angle/third_party/glmark2/src/data/models/asteroid-low.3ds
|
||||
third_party/angle/third_party/glmark2/src/data/models/cat.3ds
|
||||
@@ -2536,6 +2539,7 @@ third_party/angle/third_party/glmark2/src/data/models/cube.3ds
|
||||
third_party/angle/third_party/glmark2/src/data/models/horse.3ds
|
||||
third_party/angle/third_party/r8/custom_d8.jar
|
||||
third_party/beto-core/src/nearby/connections/ukey2/ukey2_jni/java/gradle/wrapper/gradle-wrapper.jar
|
||||
third_party/beto-core/src/nearby/presence/ldt_np_jni/java/LdtNpJni/gradle/wrapper/gradle-wrapper.jar
|
||||
third_party/blink/manual_tests/WebKitSite.webarchive
|
||||
third_party/blink/manual_tests/accessibility/resources/AppletTest.class
|
||||
third_party/blink/manual_tests/plugins/test.swf
|
||||
@@ -7781,10 +7785,16 @@ third_party/catapult/third_party/gsutil/gslib/vendored/oauth2client/tests/data/k
|
||||
third_party/catapult/third_party/gsutil/gslib/vendored/oauth2client/tests/data/key.p12.enc
|
||||
third_party/catapult/third_party/gsutil/gslib/vendored/oauth2client/tests/data/privatekey.p12
|
||||
third_party/catapult/third_party/gsutil/gslib/vendored/oauth2client/tests/data/user-key.json.enc
|
||||
third_party/catapult/third_party/gsutil/third_party/chardet/tests/UTF-16/bom-utf-16-be.srt
|
||||
third_party/catapult/third_party/gsutil/third_party/chardet/tests/UTF-16/bom-utf-16-le.srt
|
||||
third_party/catapult/third_party/gsutil/third_party/chardet/tests/UTF-32/bom-utf-32-be.srt
|
||||
third_party/catapult/third_party/gsutil/third_party/chardet/tests/UTF-32/bom-utf-32-le.srt
|
||||
third_party/catapult/third_party/gsutil/third_party/crcmod_osx/crcmod/_crcfunext.so
|
||||
third_party/catapult/third_party/gsutil/third_party/google-auth-library-python/system_tests/secrets.tar.enc
|
||||
third_party/catapult/third_party/gsutil/third_party/google-auth-library-python/system_tests/system_tests_sync/secrets.tar.enc
|
||||
third_party/catapult/third_party/gsutil/third_party/google-auth-library-python/tests/data/old_oauth_credentials_py3.pickle
|
||||
third_party/catapult/third_party/gsutil/third_party/google-auth-library-python/tests/data/privatekey.p12
|
||||
third_party/catapult/third_party/gsutil/third_party/httplib2/ref/img1.old
|
||||
third_party/catapult/third_party/gsutil/third_party/httplib2/test/deflate/deflated-content
|
||||
third_party/catapult/third_party/gsutil/third_party/httplib2/test/deflate/deflated.asis
|
||||
third_party/catapult/third_party/html5lib-1.1/html5lib/tests/testdata/tree-construction/domjs-unsafe.dat
|
||||
third_party/catapult/third_party/html5lib-1.1/html5lib/tests/testdata/tree-construction/pending-spec-changes-plain-text-unsafe.dat
|
||||
third_party/catapult/third_party/html5lib-1.1/html5lib/tests/testdata/tree-construction/plain-text-unsafe.dat
|
||||
@@ -7981,6 +7991,7 @@ third_party/devtools-frontend/src/test/unittests/fixtures/traces/multiple-top-le
|
||||
third_party/devtools-frontend/src/test/unittests/fixtures/traces/nested-interactions.json.gz
|
||||
third_party/devtools-frontend/src/test/unittests/fixtures/traces/node-fibonacci-website.cpuprofile.gz
|
||||
third_party/devtools-frontend/src/test/unittests/fixtures/traces/one-second-interaction.json.gz
|
||||
third_party/devtools-frontend/src/test/unittests/fixtures/traces/react-hello-world.json.gz
|
||||
third_party/devtools-frontend/src/test/unittests/fixtures/traces/recursive-blocking-js.json.gz
|
||||
third_party/devtools-frontend/src/test/unittests/fixtures/traces/recursive-counting-js.json.gz
|
||||
third_party/devtools-frontend/src/test/unittests/fixtures/traces/redirects-subresource-multiple.json.gz
|
||||
@@ -10303,6 +10314,7 @@ third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-hb-subset-fu
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-hb-subset-fuzzer-5717414645334016
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-hb-subset-fuzzer-5756332481708032
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-hb-subset-fuzzer-5762137968869376
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-hb-subset-fuzzer-5979721620652032
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-4884742786777088
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-5255344882188288
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-5720051798769664
|
||||
@@ -10396,6 +10408,7 @@ third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-fuzzer-6595199411159040
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-fuzzer-6624904746106880
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-fuzzer-6723367514144768
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-repacker-fuzzer-4877513265119232
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-shape-fuzzer-4523349576908800
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-shape-fuzzer-5061207689134080
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-shape-fuzzer-5138182937772032
|
||||
@@ -10480,6 +10493,7 @@ third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-4877336988483584
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-4880059756969984
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-4901143794810880
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-4916785942757376
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-4961171477233664
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-4979711393005568
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5001604901240832
|
||||
@@ -10610,6 +10624,7 @@ third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5793182905663488
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5844352760152064
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5845846876356608
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5855710991482880.fuzz
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5858518134554624
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5887968763052032
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5923632099885056
|
||||
@@ -10624,6 +10639,7 @@ third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6246465148813312
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6254792024915968
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6276691949518848
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6292420615340032
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6315334756335616
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6316256152780800
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6362213417353216
|
||||
@@ -10631,11 +10647,14 @@ third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6372147008241664
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6382598554255360
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6421315436281856
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6442117271257088
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6521393809588224
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6525813890875392
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6543700493598720
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6608005089853440
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6616166961905664
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6651660668502016
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6681253479579648
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6742230974201856
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-get-codepoints-fuzzer-5203067375976448
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-get-codepoints-fuzzer-5630904853069824
|
||||
@@ -10672,6 +10691,7 @@ third_party/harfbuzz-ng/src/test/fuzzing/graphs/clusterfuzz-testcase-minimized-h
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/graphs/clusterfuzz-testcase-minimized-hb-repacker-fuzzer-5390364397928448
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/graphs/clusterfuzz-testcase-minimized-hb-repacker-fuzzer-5475787333828608
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/graphs/clusterfuzz-testcase-minimized-hb-repacker-fuzzer-6014493291577344
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/graphs/clusterfuzz-testcase-minimized-hb-repacker-fuzzer-6419865171525632
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/graphs/clusterfuzz-testcase-minimized-hb-repacker-fuzzer-6714085985353728
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/graphs/crash-3bf72494aa4c9f8cbbcbf887fdc2a2858c87feb4
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/graphs/crash-442bfac994a3d9929cf06262ae9fb00f6ee1f774
|
||||
@@ -14242,6 +14262,7 @@ third_party/pdfium/testing/resources/RGB-alpha.jp2
|
||||
third_party/pdfium/testing/resources/RGB.jp2
|
||||
third_party/pdfium/testing/resources/bigtable_mini.in
|
||||
third_party/pdfium/testing/resources/bug_1469.jp2
|
||||
third_party/pdfium/testing/resources/bug_2034.idat
|
||||
third_party/pdfium/testing/resources/bug_552046.in
|
||||
third_party/pdfium/testing/resources/bug_861842.in
|
||||
third_party/pdfium/testing/resources/gray-alpha.jp2
|
||||
@@ -14506,13 +14527,6 @@ third_party/swiftshader/third_party/SPIRV-Tools/test/fuzzers/corpora/spv/graphic
|
||||
third_party/swiftshader/third_party/SPIRV-Tools/test/fuzzers/corpora/spv/graphicsfuzz_085.spv
|
||||
third_party/swiftshader/third_party/SPIRV-Tools/test/fuzzers/corpora/spv/graphicsfuzz_086.spv
|
||||
third_party/swiftshader/third_party/SPIRV-Tools/test/fuzzers/corpora/spv/simple.spv
|
||||
third_party/tensorflow-text/src/docs/api_docs/python/text/api_report.pb
|
||||
third_party/tensorflow-text/src/tensorflow_text/python/ops/test_data/fast_wordpiece_tokenizer_model.fb
|
||||
third_party/tensorflow-text/src/tensorflow_text/python/ops/test_data/segmenter_hub_module/saved_model.pb
|
||||
third_party/tensorflow-text/src/tensorflow_text/python/ops/test_data/segmenter_hub_module/tfhub_module.pb
|
||||
third_party/tensorflow-text/src/tensorflow_text/python/ops/test_data/segmenter_hub_module/variables/variables.data-00000-of-00001
|
||||
third_party/tensorflow-text/src/tensorflow_text/python/ops/test_data/segmenter_hub_module/variables/variables.index
|
||||
third_party/tensorflow-text/src/tensorflow_text/python/ops/test_data/test_oss_model.model
|
||||
third_party/tflite/src/tensorflow/c/experimental/saved_model/internal/testdata/SimpleWhileLoop/saved_model.pb
|
||||
third_party/tflite/src/tensorflow/c/experimental/saved_model/internal/testdata/SimpleWhileLoop/variables/variables.data-00000-of-00001
|
||||
third_party/tflite/src/tensorflow/c/experimental/saved_model/internal/testdata/SimpleWhileLoop/variables/variables.index
|
||||
@@ -15159,7 +15173,6 @@ third_party/vulkan-deps/spirv-tools/src/test/fuzzers/corpora/spv/graphicsfuzz_08
|
||||
third_party/vulkan-deps/spirv-tools/src/test/fuzzers/corpora/spv/graphicsfuzz_085.spv
|
||||
third_party/vulkan-deps/spirv-tools/src/test/fuzzers/corpora/spv/graphicsfuzz_086.spv
|
||||
third_party/vulkan-deps/spirv-tools/src/test/fuzzers/corpora/spv/simple.spv
|
||||
third_party/vulkan-deps/vulkan-loader/src/loader/loader.aps
|
||||
third_party/vulkan-deps/vulkan-loader/src/tests/framework/data/binaries/dummy_library_elf_32.dll
|
||||
third_party/vulkan-deps/vulkan-loader/src/tests/framework/data/binaries/dummy_library_elf_64.dll
|
||||
third_party/vulkan-deps/vulkan-loader/src/tests/framework/data/binaries/dummy_library_pe_32.dll
|
||||
|
||||
Reference in New Issue
Block a user