mirror of
https://github.com/morgan9e/helium
synced 2026-04-14 00:14:20 +09:00
Update to Chromium 90.0.4430.72
This commit is contained in:
@@ -1 +1 @@
|
||||
89.0.4389.114
|
||||
90.0.4430.72
|
||||
|
||||
@@ -63,7 +63,6 @@ PRUNING_EXCLUDE_PATTERNS = [
|
||||
'third_party/icu/android_small/icudtl.dat',
|
||||
'third_party/icu/android_small/icudtl_extra.dat',
|
||||
'third_party/icu/common/icudtb.dat',
|
||||
'third_party/jetifier_standalone/lib/jetifier-standalone.jar',
|
||||
# Exclusions for safe file extensions
|
||||
'*.avif',
|
||||
'*.ttf',
|
||||
|
||||
File diff suppressed because it is too large
Load Diff
1
flags.gn
1
flags.gn
@@ -1,3 +1,4 @@
|
||||
build_with_tflite_lib=false
|
||||
chrome_pgo_phase=0
|
||||
clang_use_chrome_plugins=false
|
||||
enable_hangout_services_extension=false
|
||||
|
||||
@@ -10,7 +10,7 @@ Subject: Disable fetching of all field trials
|
||||
|
||||
--- a/chrome/browser/flags/android/java/src/org/chromium/chrome/browser/flags/ChromeFeatureList.java
|
||||
+++ b/chrome/browser/flags/android/java/src/org/chromium/chrome/browser/flags/ChromeFeatureList.java
|
||||
@@ -122,9 +122,7 @@ public abstract class ChromeFeatureList
|
||||
@@ -123,9 +123,7 @@ public abstract class ChromeFeatureList
|
||||
* the specified parameter does not exist.
|
||||
*/
|
||||
public static String getFieldTrialParamByFeature(String featureName, String paramName) {
|
||||
@@ -21,7 +21,7 @@ Subject: Disable fetching of all field trials
|
||||
}
|
||||
|
||||
/**
|
||||
@@ -141,10 +139,7 @@ public abstract class ChromeFeatureList
|
||||
@@ -142,10 +140,7 @@ public abstract class ChromeFeatureList
|
||||
*/
|
||||
public static int getFieldTrialParamByFeatureAsInt(
|
||||
String featureName, String paramName, int defaultValue) {
|
||||
@@ -33,7 +33,7 @@ Subject: Disable fetching of all field trials
|
||||
}
|
||||
|
||||
/**
|
||||
@@ -161,10 +156,7 @@ public abstract class ChromeFeatureList
|
||||
@@ -162,10 +157,7 @@ public abstract class ChromeFeatureList
|
||||
*/
|
||||
public static double getFieldTrialParamByFeatureAsDouble(
|
||||
String featureName, String paramName, double defaultValue) {
|
||||
@@ -45,7 +45,7 @@ Subject: Disable fetching of all field trials
|
||||
}
|
||||
|
||||
/**
|
||||
@@ -181,10 +173,7 @@ public abstract class ChromeFeatureList
|
||||
@@ -196,10 +188,7 @@ public abstract class ChromeFeatureList
|
||||
*/
|
||||
public static boolean getFieldTrialParamByFeatureAsBoolean(
|
||||
String featureName, String paramName, boolean defaultValue) {
|
||||
@@ -56,10 +56,10 @@ Subject: Disable fetching of all field trials
|
||||
+ return defaultValue;
|
||||
}
|
||||
|
||||
/** Alphabetical: */
|
||||
/* Alphabetical: */
|
||||
--- a/components/variations/service/variations_service.cc
|
||||
+++ b/components/variations/service/variations_service.cc
|
||||
@@ -239,17 +239,7 @@ bool GetInstanceManipulations(const net:
|
||||
@@ -240,17 +240,7 @@ bool GetInstanceManipulations(const net:
|
||||
// Variations seed fetching is only enabled in official Chrome builds, if a URL
|
||||
// is specified on the command line, and for testing.
|
||||
bool IsFetchingEnabled() {
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
--- a/chrome/browser/BUILD.gn
|
||||
+++ b/chrome/browser/BUILD.gn
|
||||
@@ -3539,8 +3539,6 @@ static_library("browser") {
|
||||
@@ -3540,8 +3540,6 @@ static_library("browser") {
|
||||
"download/download_commands.h",
|
||||
"download/download_crx_util.cc",
|
||||
"download/download_crx_util.h",
|
||||
@@ -22,7 +22,7 @@
|
||||
namespace subresource_filter {
|
||||
class RulesetService;
|
||||
}
|
||||
@@ -212,9 +208,6 @@ class BrowserProcess {
|
||||
@@ -209,9 +205,6 @@ class BrowserProcess {
|
||||
// on this platform (or this is a unit test).
|
||||
virtual StatusTray* status_tray() = 0;
|
||||
|
||||
@@ -42,7 +42,7 @@
|
||||
#include "chrome/browser/shell_integration.h"
|
||||
#include "chrome/browser/site_isolation/prefs_observer.h"
|
||||
#include "chrome/browser/ssl/secure_origin_prefs_observer.h"
|
||||
@@ -376,8 +375,6 @@ void BrowserProcessImpl::StartTearDown()
|
||||
@@ -367,8 +366,6 @@ void BrowserProcessImpl::StartTearDown()
|
||||
|
||||
metrics_services_manager_.reset();
|
||||
intranet_redirect_detector_.reset();
|
||||
@@ -51,7 +51,7 @@
|
||||
network_time_tracker_.reset();
|
||||
#if BUILDFLAG(ENABLE_PLUGINS)
|
||||
plugins_resource_service_.reset();
|
||||
@@ -983,14 +980,6 @@ StatusTray* BrowserProcessImpl::status_t
|
||||
@@ -968,14 +965,6 @@ StatusTray* BrowserProcessImpl::status_t
|
||||
return status_tray_.get();
|
||||
}
|
||||
|
||||
@@ -66,7 +66,7 @@
|
||||
subresource_filter::RulesetService*
|
||||
BrowserProcessImpl::subresource_filter_ruleset_service() {
|
||||
DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_);
|
||||
@@ -1229,26 +1218,6 @@ void BrowserProcessImpl::CreateBackgroun
|
||||
@@ -1225,26 +1214,6 @@ void BrowserProcessImpl::CreateBackgroun
|
||||
#endif
|
||||
}
|
||||
|
||||
@@ -95,15 +95,15 @@
|
||||
created_subresource_filter_ruleset_service_ = true;
|
||||
--- a/chrome/browser/browser_process_impl.h
|
||||
+++ b/chrome/browser/browser_process_impl.h
|
||||
@@ -170,7 +170,6 @@ class BrowserProcessImpl : public Browse
|
||||
void set_background_mode_manager_for_test(
|
||||
@@ -175,7 +175,6 @@ class BrowserProcessImpl : public Browse
|
||||
std::unique_ptr<BackgroundModeManager> manager) override;
|
||||
#endif
|
||||
StatusTray* status_tray() override;
|
||||
- safe_browsing::SafeBrowsingService* safe_browsing_service() override;
|
||||
subresource_filter::RulesetService* subresource_filter_ruleset_service()
|
||||
override;
|
||||
federated_learning::FlocSortingLshClustersService*
|
||||
@@ -318,9 +317,6 @@ class BrowserProcessImpl : public Browse
|
||||
@@ -323,9 +322,6 @@ class BrowserProcessImpl : public Browse
|
||||
std::unique_ptr<BackgroundModeManager> background_mode_manager_;
|
||||
#endif
|
||||
|
||||
@@ -115,7 +115,7 @@
|
||||
subresource_filter_ruleset_service_;
|
||||
--- a/chrome/browser/browsing_data/chrome_browsing_data_remover_delegate.cc
|
||||
+++ b/chrome/browser/browsing_data/chrome_browsing_data_remover_delegate.cc
|
||||
@@ -73,7 +73,6 @@
|
||||
@@ -72,7 +72,6 @@
|
||||
#include "chrome/browser/privacy_sandbox/privacy_sandbox_settings.h"
|
||||
#include "chrome/browser/privacy_sandbox/privacy_sandbox_settings_factory.h"
|
||||
#include "chrome/browser/profiles/profile.h"
|
||||
@@ -123,7 +123,7 @@
|
||||
#include "chrome/browser/search_engines/template_url_service_factory.h"
|
||||
#include "chrome/browser/spellchecker/spellcheck_factory.h"
|
||||
#include "chrome/browser/spellchecker/spellcheck_service.h"
|
||||
@@ -669,10 +668,6 @@ void ChromeBrowsingDataRemoverDelegate::
|
||||
@@ -668,10 +667,6 @@ void ChromeBrowsingDataRemoverDelegate::
|
||||
base::RecordAction(UserMetricsAction("ClearBrowsingData_Cookies"));
|
||||
|
||||
network::mojom::NetworkContext* safe_browsing_context = nullptr;
|
||||
@@ -136,7 +136,7 @@
|
||||
delete_begin, delete_end, filter_builder, host_content_settings_map_,
|
||||
--- a/chrome/browser/chrome_content_browser_client.cc
|
||||
+++ b/chrome/browser/chrome_content_browser_client.cc
|
||||
@@ -920,30 +920,6 @@ void SetApplicationLocaleOnIOThread(cons
|
||||
@@ -957,30 +957,6 @@ void SetApplicationLocaleOnIOThread(cons
|
||||
GetIOThreadApplicationLocale() = locale;
|
||||
}
|
||||
|
||||
@@ -167,7 +167,7 @@
|
||||
#if BUILDFLAG(ENABLE_EXTENSIONS)
|
||||
|
||||
AppLoadedInTabSource ClassifyAppLoadedInTabSource(
|
||||
@@ -1491,7 +1467,6 @@ void ChromeContentBrowserClient::PostAft
|
||||
@@ -1402,7 +1378,6 @@ void ChromeContentBrowserClient::PostAft
|
||||
InitNetworkContextsParentDirectory();
|
||||
|
||||
DCHECK_CURRENTLY_ON(BrowserThread::UI);
|
||||
@@ -175,7 +175,7 @@
|
||||
}
|
||||
|
||||
bool ChromeContentBrowserClient::IsBrowserStartupComplete() {
|
||||
@@ -4131,7 +4106,7 @@ ChromeContentBrowserClient::CreateThrott
|
||||
@@ -4109,7 +4084,7 @@ ChromeContentBrowserClient::CreateThrott
|
||||
base::BindRepeating(&MaybeTriggerSecurityInterstitialShownEvent));
|
||||
throttles.push_back(std::make_unique<SSLErrorNavigationThrottle>(
|
||||
handle,
|
||||
@@ -184,7 +184,7 @@
|
||||
base::BindOnce(&HandleSSLErrorWrapper), base::BindOnce(&IsInHostedApp),
|
||||
base::BindOnce(
|
||||
&TypedNavigationUpgradeThrottle::
|
||||
@@ -4153,9 +4128,6 @@ ChromeContentBrowserClient::CreateThrott
|
||||
@@ -4131,9 +4106,6 @@ ChromeContentBrowserClient::CreateThrott
|
||||
&throttles);
|
||||
#endif
|
||||
|
||||
@@ -219,7 +219,7 @@
|
||||
} // namespace
|
||||
--- a/chrome/browser/download/chrome_download_manager_delegate.cc
|
||||
+++ b/chrome/browser/download/chrome_download_manager_delegate.cc
|
||||
@@ -393,13 +393,6 @@ ChromeDownloadManagerDelegate::~ChromeDo
|
||||
@@ -394,13 +394,6 @@ ChromeDownloadManagerDelegate::~ChromeDo
|
||||
|
||||
void ChromeDownloadManagerDelegate::SetDownloadManager(DownloadManager* dm) {
|
||||
download_manager_ = dm;
|
||||
@@ -233,7 +233,7 @@
|
||||
}
|
||||
|
||||
#if defined(OS_ANDROID)
|
||||
@@ -740,16 +733,6 @@ void ChromeDownloadManagerDelegate::Choo
|
||||
@@ -741,16 +734,6 @@ void ChromeDownloadManagerDelegate::Choo
|
||||
|
||||
void ChromeDownloadManagerDelegate::SanitizeSavePackageResourceName(
|
||||
base::FilePath* filename) {
|
||||
@@ -332,7 +332,7 @@
|
||||
download_->GetURL(), download_->GetContentDisposition(), referrer_charset,
|
||||
suggested_filename, sniffed_mime_type, default_filename);
|
||||
|
||||
- // We don't replace the file extension if safe browsing consider the file
|
||||
- // We don't replace the file extension if sfafe browsing consider the file
|
||||
- // extension to be unsafe. Just let safe browsing scan the generated file.
|
||||
- if (safe_browsing::FileTypePolicies::GetInstance()->IsCheckedBinaryFile(
|
||||
- generated_filename)) {
|
||||
@@ -342,7 +342,7 @@
|
||||
// If no mime type or explicitly specified a name, don't replace file
|
||||
// extension.
|
||||
if (sniffed_mime_type.empty() || !suggested_filename.empty())
|
||||
@@ -1090,29 +1083,7 @@ DownloadFileType::DangerLevel DownloadTa
|
||||
@@ -1097,29 +1090,7 @@ DownloadFileType::DangerLevel DownloadTa
|
||||
download_->HasUserGesture())
|
||||
return DownloadFileType::NOT_DANGEROUS;
|
||||
|
||||
@@ -383,7 +383,7 @@
|
||||
#include "chrome/browser/download/download_file_icon_extractor.h"
|
||||
#include "chrome/browser/download/download_open_prompt.h"
|
||||
#include "chrome/browser/download/download_prefs.h"
|
||||
@@ -1312,9 +1311,6 @@ DownloadsAcceptDangerFunction::Downloads
|
||||
@@ -1307,9 +1306,6 @@ DownloadsAcceptDangerFunction::Downloads
|
||||
|
||||
DownloadsAcceptDangerFunction::~DownloadsAcceptDangerFunction() {}
|
||||
|
||||
@@ -393,7 +393,7 @@
|
||||
ExtensionFunction::ResponseAction DownloadsAcceptDangerFunction::Run() {
|
||||
std::unique_ptr<downloads::AcceptDanger::Params> params(
|
||||
downloads::AcceptDanger::Params::Create(*args_));
|
||||
@@ -1352,41 +1348,7 @@ void DownloadsAcceptDangerFunction::Prom
|
||||
@@ -1347,41 +1343,7 @@ void DownloadsAcceptDangerFunction::Prom
|
||||
return;
|
||||
}
|
||||
RecordApiFunctions(DOWNLOADS_FUNCTION_ACCEPT_DANGER);
|
||||
@@ -405,7 +405,7 @@
|
||||
- download_id));
|
||||
- // DownloadDangerPrompt deletes itself
|
||||
- if (on_prompt_created_ && !on_prompt_created_->is_null())
|
||||
- on_prompt_created_->Run(prompt);
|
||||
- std::move(*on_prompt_created_).Run(prompt);
|
||||
- // Function finishes in DangerPromptCallback().
|
||||
-}
|
||||
-
|
||||
@@ -446,11 +446,12 @@
|
||||
#include "chrome/common/extensions/api/downloads.h"
|
||||
#include "components/download/content/public/all_download_item_notifier.h"
|
||||
#include "components/download/public/common/download_path_reservation_tracker.h"
|
||||
@@ -187,25 +186,16 @@ class DownloadsRemoveFileFunction : publ
|
||||
@@ -187,26 +186,16 @@ class DownloadsRemoveFileFunction : publ
|
||||
|
||||
class DownloadsAcceptDangerFunction : public ExtensionFunction {
|
||||
public:
|
||||
- typedef base::Callback<void(DownloadDangerPrompt*)> OnPromptCreatedCallback;
|
||||
- using OnPromptCreatedCallback =
|
||||
- base::OnceCallback<void(DownloadDangerPrompt*)>;
|
||||
- static void OnPromptCreatedForTesting(
|
||||
- OnPromptCreatedCallback* callback) {
|
||||
- on_prompt_created_ = callback;
|
||||
@@ -649,7 +650,7 @@
|
||||
// SimpleURLLoader -> (owned loader, extension id).
|
||||
--- a/chrome/browser/metrics/chrome_metrics_service_client.cc
|
||||
+++ b/chrome/browser/metrics/chrome_metrics_service_client.cc
|
||||
@@ -780,9 +780,6 @@ void ChromeMetricsServiceClient::Registe
|
||||
@@ -796,9 +796,6 @@ void ChromeMetricsServiceClient::Registe
|
||||
metrics_service_->RegisterMetricsProvider(
|
||||
std::make_unique<HttpsEngagementMetricsProvider>());
|
||||
|
||||
@@ -673,9 +674,9 @@
|
||||
// static
|
||||
--- a/chrome/browser/profiles/chrome_browser_main_extra_parts_profiles.cc
|
||||
+++ b/chrome/browser/profiles/chrome_browser_main_extra_parts_profiles.cc
|
||||
@@ -264,7 +264,6 @@ void ChromeBrowserMainExtraPartsProfiles
|
||||
#if BUILDFLAG(ENABLE_CAPTIVE_PORTAL_DETECTION)
|
||||
CaptivePortalServiceFactory::GetInstance();
|
||||
@@ -272,7 +272,6 @@ void ChromeBrowserMainExtraPartsProfiles
|
||||
#if BUILDFLAG(IS_CHROMEOS_LACROS)
|
||||
CertDbInitializerFactory::GetInstance();
|
||||
#endif
|
||||
- CertificateReportingServiceFactory::GetInstance();
|
||||
#if !defined(OS_ANDROID)
|
||||
@@ -683,7 +684,7 @@
|
||||
#endif
|
||||
--- a/chrome/browser/profiles/profile_impl.cc
|
||||
+++ b/chrome/browser/profiles/profile_impl.cc
|
||||
@@ -94,7 +94,6 @@
|
||||
@@ -93,7 +93,6 @@
|
||||
#include "chrome/browser/profiles/profile_metrics.h"
|
||||
#include "chrome/browser/push_messaging/push_messaging_service_factory.h"
|
||||
#include "chrome/browser/push_messaging/push_messaging_service_impl.h"
|
||||
@@ -691,7 +692,7 @@
|
||||
#include "chrome/browser/sharing/sharing_service_factory.h"
|
||||
#include "chrome/browser/signin/identity_manager_factory.h"
|
||||
#include "chrome/browser/signin/signin_ui_util.h"
|
||||
@@ -639,17 +638,6 @@ void ProfileImpl::LoadPrefsForNormalStar
|
||||
@@ -629,17 +628,6 @@ void ProfileImpl::LoadPrefsForNormalStar
|
||||
|
||||
mojo::PendingRemote<prefs::mojom::TrackedPreferenceValidationDelegate>
|
||||
pref_validation_delegate;
|
||||
@@ -711,7 +712,7 @@
|
||||
CreatePrefService(pref_registry_, CreateExtensionPrefStore(this, false),
|
||||
--- a/chrome/browser/profiles/profiles_state.cc
|
||||
+++ b/chrome/browser/profiles/profiles_state.cc
|
||||
@@ -248,9 +248,6 @@ void RemoveBrowsingDataForProfile(const
|
||||
@@ -249,9 +249,6 @@ void RemoveBrowsingDataForProfile(const
|
||||
// The BrowsingDataRemover relies on many objects that aren't created in unit
|
||||
// tests. Previously this code would depend on content::ResourceDispatcherHost
|
||||
// but that's gone, so do a similar hack for now.
|
||||
@@ -731,9 +732,9 @@
|
||||
sources = [
|
||||
"chrome_controller_client.cc",
|
||||
"chrome_controller_client.h",
|
||||
@@ -68,6 +69,7 @@ static_library("safe_browsing") {
|
||||
}
|
||||
deps += [ "//extensions/browser" ]
|
||||
@@ -82,6 +83,7 @@ static_library("safe_browsing") {
|
||||
"//extensions/browser",
|
||||
]
|
||||
}
|
||||
+ }
|
||||
|
||||
@@ -741,7 +742,7 @@
|
||||
# "Safe Browsing Basic" files used for safe browsing in full mode
|
||||
--- a/chrome/browser/ssl/security_state_tab_helper.cc
|
||||
+++ b/chrome/browser/ssl/security_state_tab_helper.cc
|
||||
@@ -275,92 +275,6 @@ bool SecurityStateTabHelper::UsedPolicyI
|
||||
@@ -257,92 +257,6 @@ bool SecurityStateTabHelper::UsedPolicyI
|
||||
|
||||
security_state::MaliciousContentStatus
|
||||
SecurityStateTabHelper::GetMaliciousContentStatus() const {
|
||||
@@ -755,7 +756,7 @@
|
||||
- return security_state::MALICIOUS_CONTENT_STATUS_NONE;
|
||||
- scoped_refptr<SafeBrowsingUIManager> sb_ui_manager = sb_service->ui_manager();
|
||||
- safe_browsing::SBThreatType threat_type;
|
||||
- if (sb_ui_manager->IsUrlWhitelistedOrPendingForWebContents(
|
||||
- if (sb_ui_manager->IsUrlAllowlistedOrPendingForWebContents(
|
||||
- entry->GetURL(), false, entry, web_contents(), false, &threat_type)) {
|
||||
- switch (threat_type) {
|
||||
- case safe_browsing::SB_THREAT_TYPE_UNUSED:
|
||||
@@ -814,10 +815,10 @@
|
||||
- DEPRECATED_SB_THREAT_TYPE_URL_PASSWORD_PROTECTION_PHISHING:
|
||||
- case safe_browsing::SB_THREAT_TYPE_URL_BINARY_MALWARE:
|
||||
- case safe_browsing::SB_THREAT_TYPE_EXTENSION:
|
||||
- case safe_browsing::SB_THREAT_TYPE_BLACKLISTED_RESOURCE:
|
||||
- case safe_browsing::SB_THREAT_TYPE_BLOCKLISTED_RESOURCE:
|
||||
- case safe_browsing::SB_THREAT_TYPE_API_ABUSE:
|
||||
- case safe_browsing::SB_THREAT_TYPE_SUBRESOURCE_FILTER:
|
||||
- case safe_browsing::SB_THREAT_TYPE_CSD_WHITELIST:
|
||||
- case safe_browsing::SB_THREAT_TYPE_CSD_ALLOWLIST:
|
||||
- case safe_browsing::SB_THREAT_TYPE_AD_SAMPLE:
|
||||
- case safe_browsing::SB_THREAT_TYPE_BLOCKED_AD_POPUP:
|
||||
- case safe_browsing::SB_THREAT_TYPE_BLOCKED_AD_REDIRECT:
|
||||
@@ -836,7 +837,7 @@
|
||||
|
||||
--- a/chrome/browser/subresource_filter/chrome_subresource_filter_client.cc
|
||||
+++ b/chrome/browser/subresource_filter/chrome_subresource_filter_client.cc
|
||||
@@ -110,10 +110,7 @@ void ChromeSubresourceFilterClient::OnAd
|
||||
@@ -57,10 +57,7 @@ void ChromeSubresourceFilterClient::Show
|
||||
|
||||
const scoped_refptr<safe_browsing::SafeBrowsingDatabaseManager>
|
||||
ChromeSubresourceFilterClient::GetSafeBrowsingDatabaseManager() {
|
||||
@@ -850,7 +851,7 @@
|
||||
subresource_filter::ProfileInteractionManager*
|
||||
--- a/chrome/browser/ui/BUILD.gn
|
||||
+++ b/chrome/browser/ui/BUILD.gn
|
||||
@@ -3586,7 +3586,6 @@ static_library("ui") {
|
||||
@@ -3640,7 +3640,6 @@ static_library("ui") {
|
||||
"views/device_chooser_content_view.h",
|
||||
"views/devtools_process_observer.cc",
|
||||
"views/devtools_process_observer.h",
|
||||
@@ -860,7 +861,7 @@
|
||||
"views/download/download_item_view.cc",
|
||||
--- a/chrome/browser/ui/tab_helpers.cc
|
||||
+++ b/chrome/browser/ui/tab_helpers.cc
|
||||
@@ -314,11 +314,6 @@ void TabHelpers::AttachTabHelpers(WebCon
|
||||
@@ -317,11 +317,6 @@ void TabHelpers::AttachTabHelpers(WebCon
|
||||
resource_coordinator::ResourceCoordinatorTabHelper::CreateForWebContents(
|
||||
web_contents);
|
||||
ResourceLoadingHintsWebContentsObserver::CreateForWebContents(web_contents);
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
--- a/components/autofill/core/browser/autofill_download_manager.cc
|
||||
+++ b/components/autofill/core/browser/autofill_download_manager.cc
|
||||
@@ -826,87 +826,6 @@ AutofillDownloadManager::GetRequestURLAn
|
||||
@@ -831,87 +831,6 @@ AutofillDownloadManager::GetRequestURLAn
|
||||
}
|
||||
|
||||
bool AutofillDownloadManager::StartRequest(FormRequestData request_data) {
|
||||
|
||||
@@ -1,16 +1,16 @@
|
||||
--- a/chrome/browser/extensions/component_extensions_allowlist/allowlist.cc
|
||||
+++ b/chrome/browser/extensions/component_extensions_allowlist/allowlist.cc
|
||||
@@ -27,7 +27,6 @@ namespace extensions {
|
||||
|
||||
@@ -28,7 +28,6 @@ namespace extensions {
|
||||
bool IsComponentExtensionAllowlisted(const std::string& extension_id) {
|
||||
const char* const kAllowed[] = {
|
||||
- extension_misc::kInAppPaymentsSupportAppId,
|
||||
extension_misc::kCastExtensionIdRelease,
|
||||
- extension_misc::kInAppPaymentsSupportAppId,
|
||||
extension_misc::kPdfExtensionId,
|
||||
#if BUILDFLAG(IS_CHROMEOS_ASH)
|
||||
extension_misc::kAccessibilityCommonExtensionId,
|
||||
--- a/chrome/browser/extensions/component_loader.cc
|
||||
+++ b/chrome/browser/extensions/component_loader.cc
|
||||
@@ -350,11 +350,6 @@ void ComponentLoader::AddWebStoreApp() {
|
||||
@@ -352,11 +352,6 @@ void ComponentLoader::AddWebStoreApp() {
|
||||
if (!IsNormalSession())
|
||||
return;
|
||||
#endif
|
||||
@@ -22,7 +22,7 @@
|
||||
}
|
||||
|
||||
#if BUILDFLAG(IS_CHROMEOS_ASH)
|
||||
@@ -521,18 +516,6 @@ void ComponentLoader::AddDefaultComponen
|
||||
@@ -526,18 +521,6 @@ void ComponentLoader::AddDefaultComponen
|
||||
AddHangoutServicesExtension();
|
||||
#endif // BUILDFLAG(ENABLE_HANGOUT_SERVICES_EXTENSION)
|
||||
|
||||
@@ -39,11 +39,11 @@
|
||||
- }
|
||||
-
|
||||
#if BUILDFLAG(IS_CHROMEOS_ASH)
|
||||
AddChromeCameraApp();
|
||||
AddVideoPlayerExtension();
|
||||
if (command_line->HasSwitch(switches::kLoadGuestModeTestExtension)) {
|
||||
base::FilePath path = base::FilePath(command_line->GetSwitchValueASCII(
|
||||
--- a/chrome/browser/extensions/external_component_loader.cc
|
||||
+++ b/chrome/browser/extensions/external_component_loader.cc
|
||||
@@ -32,9 +32,6 @@ ExternalComponentLoader::~ExternalCompon
|
||||
@@ -31,9 +31,6 @@ ExternalComponentLoader::~ExternalCompon
|
||||
|
||||
void ExternalComponentLoader::StartLoading() {
|
||||
auto prefs = std::make_unique<base::DictionaryValue>();
|
||||
@@ -55,7 +55,7 @@
|
||||
{
|
||||
--- a/chrome/browser/extensions/webstore_installer.cc
|
||||
+++ b/chrome/browser/extensions/webstore_installer.cc
|
||||
@@ -552,20 +552,6 @@ void WebstoreInstaller::DownloadNextPend
|
||||
@@ -551,20 +551,6 @@ void WebstoreInstaller::DownloadNextPend
|
||||
void WebstoreInstaller::DownloadCrx(
|
||||
const std::string& extension_id,
|
||||
InstallSource source) {
|
||||
@@ -76,7 +76,7 @@
|
||||
}
|
||||
|
||||
// http://crbug.com/165634
|
||||
@@ -710,21 +696,6 @@ void WebstoreInstaller::UpdateDownloadPr
|
||||
@@ -709,21 +695,6 @@ void WebstoreInstaller::UpdateDownloadPr
|
||||
void WebstoreInstaller::StartCrxInstaller(const DownloadItem& download) {
|
||||
DCHECK_CURRENTLY_ON(BrowserThread::UI);
|
||||
DCHECK(!crx_installer_.get());
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
--- a/chrome/updater/configurator.cc
|
||||
+++ b/chrome/updater/configurator.cc
|
||||
@@ -67,7 +67,7 @@ int Configurator::UpdateDelay() const {
|
||||
@@ -74,7 +74,7 @@ int Configurator::UpdateDelay() const {
|
||||
}
|
||||
|
||||
std::vector<GURL> Configurator::UpdateUrl() const {
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
|
||||
--- a/BUILD.gn
|
||||
+++ b/BUILD.gn
|
||||
@@ -449,14 +449,6 @@ group("gn_all") {
|
||||
@@ -453,14 +453,6 @@ group("gn_all") {
|
||||
]
|
||||
}
|
||||
|
||||
|
||||
@@ -45,7 +45,6 @@ by default.
|
||||
.../core/browser/web_history_service.cc | 6 +++---
|
||||
components/metrics/url_constants.cc | 2 +-
|
||||
.../core/browser/password_store.cc | 8 ++++----
|
||||
components/rappor/rappor_service_impl.cc | 2 +-
|
||||
.../safe_search_url_checker_client.cc | 2 +-
|
||||
.../safe_search_api/stub_url_checker.cc | 2 +-
|
||||
.../core/browser/translate_url_fetcher.cc | 1 +
|
||||
@@ -91,7 +90,7 @@ by default.
|
||||
// creates and uses to publish OEM default apps to the extensions system.
|
||||
--- a/chrome/browser/chromeos/extensions/file_manager/private_api_drive.cc
|
||||
+++ b/chrome/browser/chromeos/extensions/file_manager/private_api_drive.cc
|
||||
@@ -860,7 +860,7 @@ void FileManagerPrivateInternalGetDownlo
|
||||
@@ -863,7 +863,7 @@ void FileManagerPrivateInternalGetDownlo
|
||||
const CoreAccountId& account_id =
|
||||
identity_manager->GetPrimaryAccountId(signin::ConsentLevel::kNotRequired);
|
||||
std::vector<std::string> scopes;
|
||||
@@ -102,7 +101,7 @@ by default.
|
||||
content::BrowserContext::GetDefaultStoragePartition(
|
||||
--- a/chrome/browser/chromeos/extensions/file_manager/private_api_misc.cc
|
||||
+++ b/chrome/browser/chromeos/extensions/file_manager/private_api_misc.cc
|
||||
@@ -82,7 +82,7 @@ namespace {
|
||||
@@ -81,7 +81,7 @@ namespace {
|
||||
|
||||
using api::file_manager_private::ProfileInfo;
|
||||
|
||||
@@ -276,7 +275,7 @@ by default.
|
||||
// The maximum number of ignored bubble we track in the NumLaterPerReinstall
|
||||
--- a/chrome/browser/ui/webui/ntp/ntp_resource_cache.cc
|
||||
+++ b/chrome/browser/ui/webui/ntp/ntp_resource_cache.cc
|
||||
@@ -81,22 +81,22 @@ namespace {
|
||||
@@ -71,22 +71,22 @@ namespace {
|
||||
// The URL for the the Learn More page shown on incognito new tab.
|
||||
const char kLearnMoreIncognitoUrl[] =
|
||||
#if BUILDFLAG(IS_CHROMEOS_ASH)
|
||||
@@ -345,12 +344,12 @@ by default.
|
||||
@@ -37,7 +37,7 @@ namespace installer {
|
||||
namespace {
|
||||
|
||||
constexpr base::StringPiece16 kUninstallSurveyUrl(
|
||||
constexpr base::WStringPiece kUninstallSurveyUrl(
|
||||
- L"https://support.google.com/chrome?p=chrome_uninstall_survey");
|
||||
+ L"trk:253:https://support.google.com/chrome?p=chrome_uninstall_survey");
|
||||
|
||||
bool NavigateToUrlWithEdge(const base::string16& url) {
|
||||
base::string16 protocol_url = L"microsoft-edge:" + url;
|
||||
bool NavigateToUrlWithEdge(const std::wstring& url) {
|
||||
std::wstring protocol_url = L"microsoft-edge:" + url;
|
||||
--- a/chromecast/browser/service/cast_service_simple.cc
|
||||
+++ b/chromecast/browser/service/cast_service_simple.cc
|
||||
@@ -27,7 +27,7 @@ GURL GetStartupURL() {
|
||||
@@ -419,7 +418,7 @@ by default.
|
||||
// Mime type to create a directory.
|
||||
--- a/components/feedback/feedback_uploader.cc
|
||||
+++ b/components/feedback/feedback_uploader.cc
|
||||
@@ -25,7 +25,7 @@ constexpr base::FilePath::CharType kFeed
|
||||
@@ -26,7 +26,7 @@ constexpr base::FilePath::CharType kFeed
|
||||
FILE_PATH_LITERAL("Feedback Reports");
|
||||
|
||||
constexpr char kFeedbackPostUrl[] =
|
||||
@@ -485,7 +484,7 @@ by default.
|
||||
"http://clientservices.googleapis.com/uma/v2";
|
||||
--- a/components/password_manager/core/browser/password_store.cc
|
||||
+++ b/components/password_manager/core/browser/password_store.cc
|
||||
@@ -298,10 +298,10 @@ void PasswordStore::GetLogins(const Form
|
||||
@@ -297,10 +297,10 @@ void PasswordStore::GetLogins(const Form
|
||||
// TODO(mdm): actually delete them at some point, say M24 or so.
|
||||
base::Time cutoff; // the null time
|
||||
if (form.scheme == PasswordForm::Scheme::kHtml &&
|
||||
@@ -500,17 +499,6 @@ by default.
|
||||
static const base::Time::Exploded exploded_cutoff = {
|
||||
2012, 1, 0, 1, 0, 0, 0, 0}; // 00:00 Jan 1 2012
|
||||
base::Time out_time;
|
||||
--- a/components/rappor/rappor_service_impl.cc
|
||||
+++ b/components/rappor/rappor_service_impl.cc
|
||||
@@ -32,7 +32,7 @@ const char kMimeType[] = "application/vn
|
||||
const char kRapporDailyEventHistogram[] = "Rappor.DailyEvent.IntervalType";
|
||||
|
||||
// The rappor server's URL.
|
||||
-const char kDefaultServerUrl[] = "https://clients4.google.com/rappor";
|
||||
+const char kDefaultServerUrl[] = "trk:266:https://clients4.google.com/rappor";
|
||||
|
||||
} // namespace
|
||||
|
||||
--- a/components/safe_browsing/content/browser/client_side_detection_service.cc
|
||||
+++ b/components/safe_browsing/content/browser/client_side_detection_service.cc
|
||||
@@ -53,7 +53,7 @@ const int ClientSideDetectionService::kN
|
||||
@@ -589,7 +577,7 @@ by default.
|
||||
|
||||
--- a/content/browser/webauth/authenticator_common.cc
|
||||
+++ b/content/browser/webauth/authenticator_common.cc
|
||||
@@ -167,9 +167,9 @@ base::Optional<std::string> ProcessAppId
|
||||
@@ -171,9 +171,9 @@ base::Optional<std::string> ProcessAppId
|
||||
// special-case AppIDs. Firefox also does this:
|
||||
// https://groups.google.com/forum/#!msg/mozilla.dev.platform/Uiu3fwnA2xw/201ynAiPAQAJ
|
||||
const GURL kGstatic1 =
|
||||
@@ -603,15 +591,15 @@ by default.
|
||||
if (origin.DomainIs("google.com") && !appid_url.has_ref() &&
|
||||
--- a/content/shell/browser/shell_browser_main_parts.cc
|
||||
+++ b/content/shell/browser/shell_browser_main_parts.cc
|
||||
@@ -88,7 +88,7 @@ GURL GetStartupURL() {
|
||||
@@ -89,7 +89,7 @@ GURL GetStartupURL() {
|
||||
#else
|
||||
const base::CommandLine::StringVector& args = command_line->GetArgs();
|
||||
if (args.empty())
|
||||
- return GURL("https://www.google.com/");
|
||||
+ return GURL("trk:183:https://www.google.com/");
|
||||
|
||||
GURL url(args[0]);
|
||||
if (url.is_valid() && url.has_scheme())
|
||||
#if defined(OS_WIN)
|
||||
GURL url(base::WideToUTF16(args[0]));
|
||||
--- a/extensions/common/extension_urls.cc
|
||||
+++ b/extensions/common/extension_urls.cc
|
||||
@@ -26,9 +26,9 @@ bool IsSourceFromAnExtension(const base:
|
||||
@@ -628,57 +616,155 @@ by default.
|
||||
extensions::ExtensionsClient* client = extensions::ExtensionsClient::Get();
|
||||
--- a/google_apis/gaia/gaia_constants.cc
|
||||
+++ b/google_apis/gaia/gaia_constants.cc
|
||||
@@ -25,23 +25,23 @@ const char kSyncService[] = "chromiumsyn
|
||||
@@ -25,117 +25,117 @@ const char kSyncService[] = "chromiumsyn
|
||||
const char kRemotingService[] = "chromoting";
|
||||
|
||||
// OAuth scopes.
|
||||
-const char kOAuth1LoginScope[] = "https://www.google.com/accounts/OAuthLogin";
|
||||
+const char kOAuth1LoginScope[] = "trk:181:https://www.google.com/accounts/OAuthLogin";
|
||||
const char kOAuthWrapBridgeUserInfoScope[] =
|
||||
- "https://www.googleapis.com/auth/userinfo.email";
|
||||
+ "trk:101:https://www.googleapis.com/auth/userinfo.email";
|
||||
+const char kOAuth1LoginScope[] = "trk:069:https://www.google.com/accounts/OAuthLogin";
|
||||
|
||||
// Service/scope names for device management (cloud-based policy) server.
|
||||
const char kDeviceManagementServiceOAuth[] =
|
||||
- "https://www.googleapis.com/auth/chromeosdevicemanagement";
|
||||
+ "trk:102:https://www.googleapis.com/auth/chromeosdevicemanagement";
|
||||
+ "trk:070:https://www.googleapis.com/auth/chromeosdevicemanagement";
|
||||
|
||||
// OAuth2 scope for access to all Google APIs.
|
||||
-const char kAnyApiOAuth2Scope[] = "https://www.googleapis.com/auth/any-api";
|
||||
+const char kAnyApiOAuth2Scope[] = "trk:103:https://www.googleapis.com/auth/any-api";
|
||||
+const char kAnyApiOAuth2Scope[] = "trk:071:https://www.googleapis.com/auth/any-api";
|
||||
|
||||
// OAuth2 scope for access to Chrome sync APIs
|
||||
const char kChromeSyncOAuth2Scope[] =
|
||||
- "https://www.googleapis.com/auth/chromesync";
|
||||
+ "trk:104:https://www.googleapis.com/auth/chromesync";
|
||||
+ "trk:072:https://www.googleapis.com/auth/chromesync";
|
||||
// OAuth2 scope for access to the Chrome Sync APIs for managed profiles.
|
||||
const char kChromeSyncSupervisedOAuth2Scope[] =
|
||||
- "https://www.googleapis.com/auth/chromesync_playpen";
|
||||
+ "trk:105:https://www.googleapis.com/auth/chromesync_playpen";
|
||||
+ "trk:073:https://www.googleapis.com/auth/chromesync_playpen";
|
||||
|
||||
// OAuth2 scope for access to Kid Management API.
|
||||
const char kKidManagementOAuth2Scope[] =
|
||||
@@ -53,16 +53,16 @@ const char kKidManagementPrivilegedOAuth
|
||||
- "https://www.googleapis.com/auth/kid.management";
|
||||
+ "trk:074:https://www.googleapis.com/auth/kid.management";
|
||||
|
||||
// OAuth2 scope for parental consent logging for secondary account addition.
|
||||
const char kKidManagementPrivilegedOAuth2Scope[] =
|
||||
- "https://www.googleapis.com/auth/kid.management.privileged";
|
||||
+ "trk:075:https://www.googleapis.com/auth/kid.management.privileged";
|
||||
|
||||
// OAuth2 scope for access to Google Family Link Supervision Setup.
|
||||
const char kKidsSupervisionSetupChildOAuth2Scope[] =
|
||||
- "https://www.googleapis.com/auth/kids.supervision.setup.child";
|
||||
+ "trk:262:https://www.googleapis.com/auth/kids.supervision.setup.child";
|
||||
+ "trk:076:https://www.googleapis.com/auth/kids.supervision.setup.child";
|
||||
|
||||
// OAuth2 scope for access to Google Talk APIs (XMPP).
|
||||
const char kGoogleTalkOAuth2Scope[] =
|
||||
- "https://www.googleapis.com/auth/googletalk";
|
||||
+ "trk:106:https://www.googleapis.com/auth/googletalk";
|
||||
+ "trk:077:https://www.googleapis.com/auth/googletalk";
|
||||
|
||||
// OAuth2 scope for access to Google account information.
|
||||
const char kGoogleUserInfoEmail[] =
|
||||
- "https://www.googleapis.com/auth/userinfo.email";
|
||||
+ "trk:107:https://www.googleapis.com/auth/userinfo.email";
|
||||
+ "trk:078:https://www.googleapis.com/auth/userinfo.email";
|
||||
const char kGoogleUserInfoProfile[] =
|
||||
- "https://www.googleapis.com/auth/userinfo.profile";
|
||||
+ "trk:260:https://www.googleapis.com/auth/userinfo.profile";
|
||||
+ "trk:079:https://www.googleapis.com/auth/userinfo.profile";
|
||||
|
||||
// OAuth scope for access to the people API (read-only).
|
||||
// OAuth2 scope for access to the people API (read-only).
|
||||
const char kPeopleApiReadOnlyOAuth2Scope[] =
|
||||
- "https://www.googleapis.com/auth/peopleapi.readonly";
|
||||
+ "trk:080:https://www.googleapis.com/auth/peopleapi.readonly";
|
||||
|
||||
// OAuth2 scope for access to the Reauth flow.
|
||||
const char kAccountsReauthOAuth2Scope[] =
|
||||
- "https://www.googleapis.com/auth/accounts.reauth";
|
||||
+ "trk:081:https://www.googleapis.com/auth/accounts.reauth";
|
||||
|
||||
// OAuth2 scope for access to audit recording (ARI).
|
||||
const char kAuditRecordingOAuth2Scope[] =
|
||||
- "https://www.googleapis.com/auth/auditrecording-pa";
|
||||
+ "trk:082:https://www.googleapis.com/auth/auditrecording-pa";
|
||||
|
||||
// OAuth2 scope for access to clear cut logs.
|
||||
-const char kClearCutOAuth2Scope[] = "https://www.googleapis.com/auth/cclog";
|
||||
+const char kClearCutOAuth2Scope[] = "trk:083:https://www.googleapis.com/auth/cclog";
|
||||
|
||||
// OAuth2 scope for FCM, the Firebase Cloud Messaging service.
|
||||
const char kFCMOAuthScope[] =
|
||||
- "https://www.googleapis.com/auth/firebase.messaging";
|
||||
+ "trk:084:https://www.googleapis.com/auth/firebase.messaging";
|
||||
|
||||
// OAuth2 scope for access to Tachyon api.
|
||||
-const char kTachyonOAuthScope[] = "https://www.googleapis.com/auth/tachyon";
|
||||
+const char kTachyonOAuthScope[] = "trk:085:https://www.googleapis.com/auth/tachyon";
|
||||
|
||||
// OAuth2 scope for access to the Photos API.
|
||||
-const char kPhotosOAuth2Scope[] = "https://www.googleapis.com/auth/photos";
|
||||
+const char kPhotosOAuth2Scope[] = "trk:086:https://www.googleapis.com/auth/photos";
|
||||
|
||||
// OAuth2 scope for access to Cast backdrop API.
|
||||
const char kCastBackdropOAuth2Scope[] =
|
||||
- "https://www.googleapis.com/auth/cast.backdrop";
|
||||
+ "trk:087:https://www.googleapis.com/auth/cast.backdrop";
|
||||
|
||||
// OAuth scope for access to Cloud Translation API.
|
||||
const char kCloudTranslationOAuth2Scope[] =
|
||||
- "https://www.googleapis.com/auth/cloud-translation";
|
||||
+ "trk:088:https://www.googleapis.com/auth/cloud-translation";
|
||||
|
||||
// OAuth2 scope for access to passwords leak checking API.
|
||||
const char kPasswordsLeakCheckOAuth2Scope[] =
|
||||
- "https://www.googleapis.com/auth/identity.passwords.leak.check";
|
||||
+ "trk:089:https://www.googleapis.com/auth/identity.passwords.leak.check";
|
||||
|
||||
// OAuth2 scope for access to Chrome safe browsing API.
|
||||
const char kChromeSafeBrowsingOAuth2Scope[] =
|
||||
- "https://www.googleapis.com/auth/chrome-safe-browsing";
|
||||
+ "trk:090:https://www.googleapis.com/auth/chrome-safe-browsing";
|
||||
|
||||
// OAuth2 scope for access to kid permissions by URL.
|
||||
const char kClassifyUrlKidPermissionOAuth2Scope[] =
|
||||
- "https://www.googleapis.com/auth/kid.permission";
|
||||
+ "trk:091:https://www.googleapis.com/auth/kid.permission";
|
||||
const char kKidFamilyReadonlyOAuth2Scope[] =
|
||||
- "https://www.googleapis.com/auth/kid.family.readonly";
|
||||
+ "trk:092https://www.googleapis.com/auth/kid.family.readonly";
|
||||
|
||||
// OAuth2 scope for access to payments.
|
||||
const char kPaymentsOAuth2Scope[] =
|
||||
- "https://www.googleapis.com/auth/wallet.chrome";
|
||||
+ "trk:093:https://www.googleapis.com/auth/wallet.chrome";
|
||||
|
||||
const char kCryptAuthOAuth2Scope[] =
|
||||
- "https://www.googleapis.com/auth/cryptauth";
|
||||
+ "trk:094:https://www.googleapis.com/auth/cryptauth";
|
||||
|
||||
// OAuth2 scope for access to Drive.
|
||||
const char kDriveOAuth2Scope[] = "https://www.googleapis.com/auth/drive";
|
||||
const char kDriveReadOnlyOAuth2Scope[] =
|
||||
- "https://www.googleapis.com/auth/drive.readonly";
|
||||
+ "trk:095:https://www.googleapis.com/auth/drive.readonly";
|
||||
|
||||
// OAuth2 scope for access to Assistant SDK.
|
||||
const char kAssistantOAuth2Scope[] =
|
||||
- "https://www.googleapis.com/auth/assistant-sdk-prototype";
|
||||
+ "trk:096:https://www.googleapis.com/auth/assistant-sdk-prototype";
|
||||
|
||||
// OAuth2 scope for access to nearby sharing.
|
||||
const char kNearbyShareOAuth2Scope[] =
|
||||
- "https://www.googleapis.com/auth/nearbysharing-pa";
|
||||
+ "trk:097:https://www.googleapis.com/auth/nearbysharing-pa";
|
||||
|
||||
// OAuth2 scope for access to GCM account tracker.
|
||||
-const char kGCMGroupServerOAuth2Scope[] = "https://www.googleapis.com/auth/gcm";
|
||||
+const char kGCMGroupServerOAuth2Scope[] = "trk:098:https://www.googleapis.com/auth/gcm";
|
||||
|
||||
// OAuth2 scope for access to readonly Chrome web store.
|
||||
const char kChromeWebstoreOAuth2Scope[] =
|
||||
- "https://www.googleapis.com/auth/chromewebstore.readonly";
|
||||
+ "trk:099:https://www.googleapis.com/auth/chromewebstore.readonly";
|
||||
|
||||
// Used to mint uber auth tokens when needed.
|
||||
const char kGaiaSid[] = "sid";
|
||||
--- a/google_apis/gaia/gaia_urls.cc
|
||||
+++ b/google_apis/gaia/gaia_urls.cc
|
||||
@@ -23,6 +23,7 @@
|
||||
|
||||
@@ -44,7 +44,7 @@ the URL so we get notified if this happens again in the future).
|
||||
IncidentReportingService::IncidentReportingService(
|
||||
--- a/chrome/browser/safe_browsing/safe_browsing_blocking_page.cc
|
||||
+++ b/chrome/browser/safe_browsing/safe_browsing_blocking_page.cc
|
||||
@@ -65,8 +65,7 @@ class SafeBrowsingBlockingPageFactoryImp
|
||||
@@ -91,8 +91,7 @@ class SafeBrowsingBlockingPageFactoryImp
|
||||
PrefService* prefs =
|
||||
Profile::FromBrowserContext(web_contents->GetBrowserContext())
|
||||
->GetPrefs();
|
||||
@@ -56,7 +56,7 @@ the URL so we get notified if this happens again in the future).
|
||||
|
||||
--- a/chrome/browser/safe_browsing/safe_browsing_service.cc
|
||||
+++ b/chrome/browser/safe_browsing/safe_browsing_service.cc
|
||||
@@ -260,7 +260,7 @@ SafeBrowsingUIManager* SafeBrowsingServi
|
||||
@@ -261,7 +261,7 @@ SafeBrowsingUIManager* SafeBrowsingServi
|
||||
}
|
||||
|
||||
void SafeBrowsingService::RegisterAllDelayedAnalysis() {
|
||||
|
||||
@@ -13,7 +13,7 @@ This prevents trk:148 (phishing) and trk:149 (malware).
|
||||
|
||||
--- a/components/safe_browsing/content/browser/client_side_detection_service.cc
|
||||
+++ b/components/safe_browsing/content/browser/client_side_detection_service.cc
|
||||
@@ -216,6 +216,10 @@ void ClientSideDetectionService::StartCl
|
||||
@@ -211,6 +211,10 @@ void ClientSideDetectionService::StartCl
|
||||
return;
|
||||
}
|
||||
|
||||
@@ -23,11 +23,11 @@ This prevents trk:148 (phishing) and trk:149 (malware).
|
||||
+#else
|
||||
// Fill in metadata about which model we used.
|
||||
request->set_model_filename(model_loader_->name());
|
||||
if (is_extended_reporting || is_enhanced_reporting) {
|
||||
@@ -293,6 +297,7 @@ void ClientSideDetectionService::StartCl
|
||||
*request->mutable_population() = delegate_->GetUserPopulation();
|
||||
@@ -275,6 +279,7 @@ void ClientSideDetectionService::StartCl
|
||||
|
||||
// Record that we made a request
|
||||
phishing_report_times_.push(base::Time::Now());
|
||||
AddPhishingReport(base::Time::Now());
|
||||
+#endif
|
||||
}
|
||||
|
||||
|
||||
@@ -15,7 +15,7 @@
|
||||
</script>
|
||||
--- a/chrome/browser/search/background/ntp_background_service.cc
|
||||
+++ b/chrome/browser/search/background/ntp_background_service.cc
|
||||
@@ -61,6 +61,7 @@ void NtpBackgroundService::Shutdown() {
|
||||
@@ -66,6 +66,7 @@ void NtpBackgroundService::Shutdown() {
|
||||
}
|
||||
|
||||
void NtpBackgroundService::FetchCollectionInfo() {
|
||||
|
||||
@@ -35,7 +35,7 @@
|
||||
GURL rewritten_tab_url = tab_url;
|
||||
--- a/components/omnibox/browser/autocomplete_input.cc
|
||||
+++ b/components/omnibox/browser/autocomplete_input.cc
|
||||
@@ -526,7 +526,8 @@ void AutocompleteInput::ParseForEmphasiz
|
||||
@@ -552,7 +552,8 @@ void AutocompleteInput::ParseForEmphasiz
|
||||
// For the view-source and blob schemes, we should emphasize the host of the
|
||||
// URL qualified by the view-source or blob prefix.
|
||||
if ((base::LowerCaseEqualsASCII(scheme_str, kViewSourceScheme) ||
|
||||
@@ -45,20 +45,25 @@
|
||||
(static_cast<int>(text.length()) > after_scheme_and_colon)) {
|
||||
// Obtain the URL prefixed by view-source or blob and parse it.
|
||||
base::string16 real_url(text.substr(after_scheme_and_colon));
|
||||
@@ -599,7 +600,9 @@ int AutocompleteInput::NumNonHostCompone
|
||||
@@ -623,11 +624,15 @@ int AutocompleteInput::NumNonHostCompone
|
||||
|
||||
// static
|
||||
bool AutocompleteInput::HasHTTPScheme(const base::string16& input) {
|
||||
std::string utf8_input(base::UTF16ToUTF8(input));
|
||||
url::Component scheme;
|
||||
- if (url::FindAndCompareScheme(utf8_input, kViewSourceScheme, &scheme)) {
|
||||
+ if (url::FindAndCompareScheme(utf8_input, url::kTraceScheme, &scheme)) {
|
||||
+ if (HasScheme(input, url::kTraceScheme))
|
||||
+ return false;
|
||||
+ } else if (url::FindAndCompareScheme(utf8_input, kViewSourceScheme, &scheme)) {
|
||||
utf8_input.erase(0, scheme.end() + 1);
|
||||
}
|
||||
return url::FindAndCompareScheme(utf8_input, url::kHttpScheme, nullptr);
|
||||
return HasScheme(input, url::kHttpScheme);
|
||||
}
|
||||
|
||||
// static
|
||||
bool AutocompleteInput::HasHTTPSScheme(const base::string16& input) {
|
||||
+ if (HasScheme(input, url::kTraceScheme))
|
||||
+ return false;
|
||||
return HasScheme(input, url::kHttpsScheme);
|
||||
}
|
||||
|
||||
--- a/components/url_formatter/url_fixer.cc
|
||||
+++ b/components/url_formatter/url_fixer.cc
|
||||
@@ -560,6 +560,10 @@ GURL FixupURL(const std::string& text, c
|
||||
@@ -562,6 +562,10 @@ GURL FixupURL(const std::string& text, c
|
||||
}
|
||||
}
|
||||
|
||||
@@ -71,7 +76,7 @@
|
||||
return GURL(parts.scheme.is_valid() ? text : FixupPath(text));
|
||||
--- a/content/browser/child_process_security_policy_impl.cc
|
||||
+++ b/content/browser/child_process_security_policy_impl.cc
|
||||
@@ -772,6 +772,7 @@ ChildProcessSecurityPolicyImpl::ChildPro
|
||||
@@ -793,6 +793,7 @@ ChildProcessSecurityPolicyImpl::ChildPro
|
||||
#endif // BUILDFLAG(ENABLE_WEBSOCKETS)
|
||||
RegisterWebSafeScheme(url::kFtpScheme);
|
||||
RegisterWebSafeScheme(url::kDataScheme);
|
||||
@@ -81,7 +86,7 @@
|
||||
// TODO(nick): https://crbug.com/651534 blob: and filesystem: schemes embed
|
||||
--- a/net/BUILD.gn
|
||||
+++ b/net/BUILD.gn
|
||||
@@ -1086,6 +1086,8 @@ component("net") {
|
||||
@@ -1075,6 +1075,8 @@ component("net") {
|
||||
"url_request/report_sender.h",
|
||||
"url_request/static_http_user_agent_settings.cc",
|
||||
"url_request/static_http_user_agent_settings.h",
|
||||
@@ -211,9 +216,9 @@
|
||||
const char kQuicTransportScheme[] = "quic-transport";
|
||||
const char kTelScheme[] = "tel";
|
||||
+const char kTraceScheme[] = "trk";
|
||||
const char kUrnScheme[] = "urn";
|
||||
const char kWsScheme[] = "ws";
|
||||
const char kWssScheme[] = "wss";
|
||||
|
||||
--- a/url/url_constants.h
|
||||
+++ b/url/url_constants.h
|
||||
@@ -32,6 +32,7 @@ COMPONENT_EXPORT(URL) extern const char
|
||||
@@ -221,9 +226,9 @@
|
||||
COMPONENT_EXPORT(URL) extern const char kQuicTransportScheme[];
|
||||
COMPONENT_EXPORT(URL) extern const char kTelScheme[];
|
||||
+COMPONENT_EXPORT(URL) extern const char kTraceScheme[];
|
||||
COMPONENT_EXPORT(URL) extern const char kUrnScheme[];
|
||||
COMPONENT_EXPORT(URL) extern const char kWsScheme[];
|
||||
COMPONENT_EXPORT(URL) extern const char kWssScheme[];
|
||||
|
||||
--- a/url/url_util.cc
|
||||
+++ b/url/url_util.cc
|
||||
@@ -62,7 +62,7 @@ struct SchemeRegistry {
|
||||
|
||||
@@ -31,13 +31,3 @@
|
||||
DCHECK_CURRENTLY_ON(content::BrowserThread::UI);
|
||||
DCHECK(!simple_url_loader_);
|
||||
|
||||
--- a/third_party/breakpad/breakpad/src/client/linux/sender/google_crash_report_sender.cc
|
||||
+++ b/third_party/breakpad/breakpad/src/client/linux/sender/google_crash_report_sender.cc
|
||||
@@ -85,6 +85,7 @@ bool CheckForRequiredFlagsOrDie() {
|
||||
}
|
||||
|
||||
int main(int argc, char* argv[]) {
|
||||
+ return 0;
|
||||
google::InitGoogleLogging(argv[0]);
|
||||
google::ParseCommandLineFlags(&argc, &argv, true);
|
||||
if (!CheckForRequiredFlagsOrDie()) {
|
||||
|
||||
@@ -1,5 +1,49 @@
|
||||
# Disables references to fonts.googleapis.com
|
||||
|
||||
--- a/chrome/browser/chromeos/child_accounts/time_limits/web_time_limit_error_page/resources/web_time_limit_error_page.html
|
||||
+++ b/chrome/browser/chromeos/child_accounts/time_limits/web_time_limit_error_page/resources/web_time_limit_error_page.html
|
||||
@@ -5,7 +5,7 @@
|
||||
<meta name="viewport"
|
||||
content="initial-scale=1, minimum-scale=1,width=device-width">
|
||||
<title>$i18n{blockPageTitle}</title>
|
||||
-<link href="https://fonts.googleapis.com/css?family=Google+Sans" rel="stylesheet">
|
||||
+<link href="chrome://resources/css/roboto.css" rel="stylesheet">
|
||||
<link rel="stylesheet" href="../../../../../../../components/security_interstitials/core/common/resources/interstitial_core.css">
|
||||
<link rel="stylesheet" href="../../../../../supervised_user/supervised_user_error_page/resources/supervised_user_block_interstitial.css">
|
||||
</head>
|
||||
--- a/chrome/browser/resources/chromeos/accessibility/chromevox/options/options.css
|
||||
+++ b/chrome/browser/resources/chromeos/accessibility/chromevox/options/options.css
|
||||
@@ -2,7 +2,7 @@
|
||||
* Use of this source code is governed by a BSD-style license that can be
|
||||
* found in the LICENSE file. */
|
||||
|
||||
-@import url(https://fonts.googleapis.com/css?family=Roboto);
|
||||
+@import url(chrome://resources/css/roboto.css);
|
||||
|
||||
body {
|
||||
margin: 0 0 20px 0;
|
||||
--- a/chrome/browser/resources/chromeos/accessibility/select_to_speak/options.css
|
||||
+++ b/chrome/browser/resources/chromeos/accessibility/select_to_speak/options.css
|
||||
@@ -2,7 +2,7 @@
|
||||
* Use of this source code is governed by a BSD-style license that can be
|
||||
* found in the LICENSE file. */
|
||||
|
||||
-@import url(https://fonts.googleapis.com/css?family=Roboto);
|
||||
+@import url(chrome://resources/css/roboto.css);
|
||||
|
||||
body {
|
||||
margin: 0 0 20px 0;
|
||||
--- a/chrome/browser/supervised_user/supervised_user_error_page/resources/supervised_user_block_interstitial.html
|
||||
+++ b/chrome/browser/supervised_user/supervised_user_error_page/resources/supervised_user_block_interstitial.html
|
||||
@@ -5,7 +5,7 @@
|
||||
<meta name="viewport"
|
||||
content="initial-scale=1, minimum-scale=1, width=device-width">
|
||||
<title>$i18n{blockPageTitle}</title>
|
||||
-<link href="https://fonts.googleapis.com/css?family=Google+Sans" rel="stylesheet">
|
||||
+<link href="chrome://resources/css/roboto.css" rel="stylesheet">
|
||||
<link rel="stylesheet" href="../../../../../components/security_interstitials/core/common/resources/interstitial_core.css">
|
||||
<link rel="stylesheet" href="supervised_user_block_interstitial.css">
|
||||
<script src="../../../../../ui/webui/resources/js/cr.js"></script>
|
||||
--- a/components/dom_distiller/content/browser/dom_distiller_viewer_source.cc
|
||||
+++ b/components/dom_distiller/content/browser/dom_distiller_viewer_source.cc
|
||||
@@ -295,7 +295,7 @@ bool DomDistillerViewerSource::ShouldSer
|
||||
@@ -33,25 +77,6 @@
|
||||
e.rel = 'stylesheet';
|
||||
e.type = 'text/css';
|
||||
document.head.appendChild(e);
|
||||
--- a/third_party/catapult/third_party/polymer/components/font-roboto/roboto.html
|
||||
+++ b/third_party/catapult/third_party/polymer/components/font-roboto/roboto.html
|
||||
@@ -7,4 +7,4 @@ The complete set of contributors may be
|
||||
Code distributed by Google as part of the polymer project is also
|
||||
subject to an additional IP rights grant found at http://polymer.github.io/PATENTS.txt
|
||||
-->
|
||||
-<link rel="stylesheet" type="text/css" href="https://fonts.googleapis.com/css?family=Roboto+Mono:400,700|Roboto:400,300,300italic,400italic,500,500italic,700,700italic" crossorigin="anonymous">
|
||||
+<link rel="stylesheet" href="chrome://resources/css/roboto.css">
|
||||
--- a/third_party/catapult/tracing/third_party/gl-matrix/jsdoc-template/static/default.css
|
||||
+++ b/third_party/catapult/tracing/third_party/gl-matrix/jsdoc-template/static/default.css
|
||||
@@ -168,7 +168,7 @@ ul.inheritsList
|
||||
|
||||
/* Copied from styles.css generated by Github Pages */
|
||||
|
||||
-@import url(https://fonts.googleapis.com/css?family=Lato:300italic,700italic,300,700);
|
||||
+@import url(chrome://resources/css/roboto.css);
|
||||
|
||||
body {
|
||||
padding:50px;
|
||||
--- a/third_party/crashpad/crashpad/doc/support/crashpad_doxygen.css
|
||||
+++ b/third_party/crashpad/crashpad/doc/support/crashpad_doxygen.css
|
||||
@@ -12,8 +12,7 @@
|
||||
@@ -64,17 +89,6 @@
|
||||
|
||||
body,
|
||||
table,
|
||||
--- a/third_party/flatbuffers/src/docs/header.html
|
||||
+++ b/third_party/flatbuffers/src/docs/header.html
|
||||
@@ -14,7 +14,7 @@ $treeview
|
||||
$search
|
||||
$mathjax
|
||||
<link href="$relpath^$stylesheet" rel="stylesheet" type="text/css" />
|
||||
-<link href="https://fonts.googleapis.com/css?family=Roboto:300,400,400italic,500,500italic,700,700italic|Roboto+Mono:400,700" rel="stylesheet">
|
||||
+<link href="chrome://resources/css/roboto.css" rel="stylesheet">
|
||||
$extrastylesheet
|
||||
</head>
|
||||
<body>
|
||||
--- a/tools/md_browser/base.css
|
||||
+++ b/tools/md_browser/base.css
|
||||
@@ -16,8 +16,7 @@
|
||||
|
||||
@@ -2,9 +2,9 @@
|
||||
|
||||
--- a/chrome/common/google_url_loader_throttle.cc
|
||||
+++ b/chrome/common/google_url_loader_throttle.cc
|
||||
@@ -14,10 +14,6 @@
|
||||
#include "services/network/public/mojom/url_response_head.mojom.h"
|
||||
#include "services/network/public/mojom/x_frame_options.mojom.h"
|
||||
@@ -18,10 +18,6 @@
|
||||
#include "ui/base/device_form_factor.h"
|
||||
#endif
|
||||
|
||||
-#if BUILDFLAG(ENABLE_EXTENSIONS)
|
||||
-#include "extensions/common/extension_urls.h"
|
||||
@@ -13,7 +13,7 @@
|
||||
namespace {
|
||||
|
||||
#if defined(OS_ANDROID)
|
||||
@@ -59,53 +55,6 @@ void GoogleURLLoaderThrottle::DetachFrom
|
||||
@@ -66,61 +62,6 @@ void GoogleURLLoaderThrottle::DetachFrom
|
||||
void GoogleURLLoaderThrottle::WillStartRequest(
|
||||
network::ResourceRequest* request,
|
||||
bool* defer) {
|
||||
@@ -62,12 +62,20 @@
|
||||
- }
|
||||
- base::UmaHistogramBoolean("Android.DarkTheme.DarkSearchRequested",
|
||||
- night_mode_enabled_);
|
||||
-
|
||||
- if (base::FeatureList::IsEnabled(features::kRequestDesktopSiteForTablets) &&
|
||||
- ui::GetDeviceFormFactor() == ui::DEVICE_FORM_FACTOR_TABLET) {
|
||||
- request->headers.SetHeader(kRequestDesktopDataHeader,
|
||||
- is_tab_large_enough_ ? "1" : "0");
|
||||
- base::UmaHistogramBoolean("Android.RequestDesktopSite.TabletEligible",
|
||||
- is_tab_large_enough_);
|
||||
- }
|
||||
- }
|
||||
-#endif
|
||||
}
|
||||
|
||||
void GoogleURLLoaderThrottle::WillRedirectRequest(
|
||||
@@ -115,37 +64,6 @@ void GoogleURLLoaderThrottle::WillRedire
|
||||
@@ -130,37 +71,6 @@ void GoogleURLLoaderThrottle::WillRedire
|
||||
std::vector<std::string>* to_be_removed_headers,
|
||||
net::HttpRequestHeaders* modified_headers,
|
||||
net::HttpRequestHeaders* modified_cors_exempt_headers) {
|
||||
@@ -105,7 +113,7 @@
|
||||
}
|
||||
|
||||
#if BUILDFLAG(ENABLE_EXTENSIONS)
|
||||
@@ -153,22 +71,5 @@ void GoogleURLLoaderThrottle::WillProces
|
||||
@@ -168,22 +78,5 @@ void GoogleURLLoaderThrottle::WillProces
|
||||
const GURL& response_url,
|
||||
network::mojom::URLResponseHead* response_head,
|
||||
bool* defer) {
|
||||
@@ -580,7 +588,7 @@
|
||||
} // namespace variations
|
||||
--- a/net/base/url_util.cc
|
||||
+++ b/net/base/url_util.cc
|
||||
@@ -430,27 +430,6 @@ bool HasGoogleHost(const GURL& url) {
|
||||
@@ -431,27 +431,6 @@ bool HasGoogleHost(const GURL& url) {
|
||||
}
|
||||
|
||||
bool IsGoogleHost(base::StringPiece host) {
|
||||
|
||||
@@ -7,7 +7,7 @@
|
||||
|
||||
--- a/chrome/BUILD.gn
|
||||
+++ b/chrome/BUILD.gn
|
||||
@@ -314,7 +314,6 @@ if (!is_android && !is_mac) {
|
||||
@@ -316,7 +316,6 @@ if (!is_android && !is_mac) {
|
||||
}
|
||||
|
||||
data_deps += [
|
||||
@@ -15,7 +15,7 @@
|
||||
"//third_party/widevine/cdm",
|
||||
]
|
||||
}
|
||||
@@ -1039,7 +1038,6 @@ if (is_win) {
|
||||
@@ -1045,7 +1044,6 @@ if (is_win) {
|
||||
":keystone_registration_framework",
|
||||
":swiftshader_library",
|
||||
":widevine_cdm_library",
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
|
||||
--- a/chrome/browser/ui/chrome_pages.cc
|
||||
+++ b/chrome/browser/ui/chrome_pages.cc
|
||||
@@ -493,32 +493,6 @@ GURL GetOSSettingsUrl(const std::string&
|
||||
@@ -494,32 +494,6 @@ GURL GetOSSettingsUrl(const std::string&
|
||||
void ShowBrowserSignin(Browser* browser,
|
||||
signin_metrics::AccessPoint access_point,
|
||||
signin::ConsentLevel consent_level) {
|
||||
@@ -18,7 +18,7 @@
|
||||
-
|
||||
- profiles::BubbleViewMode bubble_view_mode;
|
||||
- if (IdentityManagerFactory::GetForProfile(original_profile)
|
||||
- ->HasPrimaryAccount()) {
|
||||
- ->HasPrimaryAccount(signin::ConsentLevel::kSync)) {
|
||||
- bubble_view_mode = profiles::BUBBLE_VIEW_MODE_GAIA_REAUTH;
|
||||
- } else {
|
||||
- switch (consent_level) {
|
||||
|
||||
@@ -146,7 +146,7 @@
|
||||
} else {
|
||||
url_stats_.other_url_count++;
|
||||
}
|
||||
@@ -842,20 +820,6 @@ void ExtensionDownloader::HandleManifest
|
||||
@@ -844,20 +822,6 @@ void ExtensionDownloader::HandleManifest
|
||||
update->info);
|
||||
}
|
||||
|
||||
@@ -167,7 +167,7 @@
|
||||
NotifyExtensionsDownloadStageChanged(
|
||||
no_updates, ExtensionDownloaderDelegate::Stage::FINISHED);
|
||||
NotifyExtensionsDownloadFailed(
|
||||
@@ -1404,11 +1368,7 @@ bool ExtensionDownloader::IterateFetchCr
|
||||
@@ -1409,11 +1373,7 @@ bool ExtensionDownloader::IterateFetchCr
|
||||
// fetch.
|
||||
switch (fetch->credentials) {
|
||||
case ExtensionFetch::CREDENTIALS_NONE:
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
--- a/content/browser/BUILD.gn
|
||||
+++ b/content/browser/BUILD.gn
|
||||
@@ -1150,6 +1150,10 @@ source_set("browser") {
|
||||
@@ -1164,6 +1164,10 @@ source_set("browser") {
|
||||
"net/browser_online_state_observer.cc",
|
||||
"net/browser_online_state_observer.h",
|
||||
"net/cookie_store_factory.cc",
|
||||
@@ -11,7 +11,7 @@
|
||||
"net/network_errors_listing_ui.cc",
|
||||
"net/network_errors_listing_ui.h",
|
||||
"net/network_quality_observer_impl.cc",
|
||||
@@ -2796,10 +2800,6 @@ source_set("browser") {
|
||||
@@ -2829,10 +2833,6 @@ source_set("browser") {
|
||||
|
||||
if (enable_reporting) {
|
||||
sources += [
|
||||
@@ -32,7 +32,7 @@
|
||||
#include "services/data_decoder/public/mojom/resource_snapshot_for_web_bundle.mojom-blink.h"
|
||||
#include "services/network/public/cpp/features.h"
|
||||
#include "services/network/public/mojom/content_security_policy.mojom-blink.h"
|
||||
@@ -551,7 +552,9 @@ void LocalFrame::Trace(Visitor* visitor)
|
||||
@@ -545,7 +546,9 @@ void LocalFrame::Trace(Visitor* visitor)
|
||||
visitor->Trace(raw_system_clipboard_);
|
||||
visitor->Trace(virtual_keyboard_overlay_changed_observers_);
|
||||
visitor->Trace(pause_handle_receivers_);
|
||||
@@ -42,7 +42,7 @@
|
||||
#if defined(OS_MAC)
|
||||
visitor->Trace(text_input_host_);
|
||||
#endif
|
||||
@@ -2273,6 +2276,7 @@ const base::UnguessableToken& LocalFrame
|
||||
@@ -2261,6 +2264,7 @@ const base::UnguessableToken& LocalFrame
|
||||
return base::UnguessableToken::Null();
|
||||
}
|
||||
|
||||
@@ -50,7 +50,7 @@
|
||||
mojom::blink::ReportingServiceProxy* LocalFrame::GetReportingService() {
|
||||
if (!reporting_service_.is_bound()) {
|
||||
GetBrowserInterfaceBroker().GetInterface(
|
||||
@@ -2281,6 +2285,7 @@ mojom::blink::ReportingServiceProxy* Loc
|
||||
@@ -2269,6 +2273,7 @@ mojom::blink::ReportingServiceProxy* Loc
|
||||
}
|
||||
return reporting_service_.get();
|
||||
}
|
||||
@@ -65,10 +65,10 @@
|
||||
#include "mojo/public/cpp/bindings/pending_receiver.h"
|
||||
#include "mojo/public/cpp/bindings/unique_receiver_set.h"
|
||||
+#include "net/net_buildflags.h"
|
||||
#include "third_party/blink/public/common/frame/payment_request_token.h"
|
||||
#include "third_party/blink/public/common/frame/transient_allow_fullscreen.h"
|
||||
#include "third_party/blink/public/mojom/blob/blob_url_store.mojom-blink.h"
|
||||
#include "third_party/blink/public/mojom/frame/back_forward_cache_controller.mojom-blink.h"
|
||||
@@ -521,9 +522,9 @@ class CORE_EXPORT LocalFrame final
|
||||
@@ -527,9 +528,9 @@ class CORE_EXPORT LocalFrame final
|
||||
}
|
||||
|
||||
SmoothScrollSequencer& GetSmoothScrollSequencer();
|
||||
@@ -80,7 +80,7 @@
|
||||
// Returns the frame host ptr. The interface returned is backed by an
|
||||
// associated interface with the legacy Chrome IPC channel.
|
||||
mojom::blink::LocalFrameHost& GetLocalFrameHostRemote() const;
|
||||
@@ -903,9 +904,11 @@ class CORE_EXPORT LocalFrame final
|
||||
@@ -926,9 +927,11 @@ class CORE_EXPORT LocalFrame final
|
||||
// const methods.
|
||||
//
|
||||
// LocalFrame can be reused by multiple ExecutionContext.
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
|
||||
--- a/chrome/browser/ui/BUILD.gn
|
||||
+++ b/chrome/browser/ui/BUILD.gn
|
||||
@@ -4353,8 +4353,6 @@ static_library("ui") {
|
||||
@@ -4422,8 +4422,6 @@ static_library("ui") {
|
||||
"views/sync/dice_bubble_sync_promo_view.h",
|
||||
"views/sync/dice_signin_button_view.cc",
|
||||
"views/sync/dice_signin_button_view.h",
|
||||
@@ -25,7 +25,7 @@
|
||||
}
|
||||
--- a/chrome/browser/ui/webui/signin/inline_login_handler_impl.cc
|
||||
+++ b/chrome/browser/ui/webui/signin/inline_login_handler_impl.cc
|
||||
@@ -371,6 +371,7 @@ void InlineSigninHelper::OnClientOAuthSu
|
||||
@@ -375,6 +375,7 @@ void InlineSigninHelper::OnClientOAuthSu
|
||||
const ClientOAuthResult& result,
|
||||
Profile* /*profile*/,
|
||||
Profile::CreateStatus /*status*/) {
|
||||
@@ -33,7 +33,7 @@
|
||||
HandlerSigninReason reason = GetHandlerSigninReason(current_url_);
|
||||
if (reason == HandlerSigninReason::FETCH_LST_ONLY) {
|
||||
// Constants are only available on Windows for the Google Credential
|
||||
@@ -459,6 +460,7 @@ void InlineSigninHelper::OnClientOAuthSu
|
||||
@@ -465,6 +466,7 @@ void InlineSigninHelper::OnClientOAuthSu
|
||||
CreateSyncStarter(result.refresh_token);
|
||||
}
|
||||
base::ThreadTaskRunnerHandle::Get()->DeleteSoon(FROM_HERE, this);
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
|
||||
--- a/chrome/browser/chrome_content_browser_client.cc
|
||||
+++ b/chrome/browser/chrome_content_browser_client.cc
|
||||
@@ -4128,11 +4128,13 @@ ChromeContentBrowserClient::CreateThrott
|
||||
@@ -4106,11 +4106,13 @@ ChromeContentBrowserClient::CreateThrott
|
||||
&throttles);
|
||||
#endif
|
||||
|
||||
@@ -16,8 +16,8 @@
|
||||
|
||||
// TODO(crbug.com/1052397): Revisit the macro expression once build flag switch
|
||||
// of lacros-chrome is complete.
|
||||
@@ -5314,20 +5316,7 @@ ChromeContentBrowserClient::GetSafeBrows
|
||||
bool should_check_on_sb_disabled) {
|
||||
@@ -5309,26 +5311,7 @@ ChromeContentBrowserClient::GetSafeBrows
|
||||
const std::vector<std::string>& allowlist_domains) {
|
||||
DCHECK_CURRENTLY_ON(BrowserThread::IO);
|
||||
|
||||
- // Should not bypass safe browsing check if the check is for enterprise
|
||||
@@ -33,12 +33,18 @@
|
||||
- safe_browsing_service_->ui_manager());
|
||||
- }
|
||||
-
|
||||
- // Update allowlist domains.
|
||||
- if (safe_browsing_url_checker_delegate_) {
|
||||
- safe_browsing_url_checker_delegate_->SetPolicyAllowlistDomains(
|
||||
- allowlist_domains);
|
||||
- }
|
||||
-
|
||||
- return safe_browsing_url_checker_delegate_;
|
||||
+ return nullptr;
|
||||
}
|
||||
|
||||
safe_browsing::RealTimeUrlLookupServiceBase*
|
||||
@@ -5348,11 +5337,6 @@ ChromeContentBrowserClient::GetUrlLookup
|
||||
@@ -5349,11 +5332,6 @@ ChromeContentBrowserClient::GetUrlLookup
|
||||
GetForProfile(profile);
|
||||
}
|
||||
#endif
|
||||
@@ -50,9 +56,57 @@
|
||||
return nullptr;
|
||||
}
|
||||
|
||||
--- a/chrome/browser/chrome_content_browser_client_receiver_bindings.cc
|
||||
+++ b/chrome/browser/chrome_content_browser_client_receiver_bindings.cc
|
||||
@@ -87,45 +87,6 @@ void MaybeCreateSafeBrowsingForRenderer(
|
||||
const std::vector<std::string>& allowlist_domains)>
|
||||
get_checker_delegate,
|
||||
mojo::PendingReceiver<safe_browsing::mojom::SafeBrowsing> receiver) {
|
||||
- DCHECK_CURRENTLY_ON(content::BrowserThread::UI);
|
||||
-
|
||||
- content::RenderProcessHost* render_process_host =
|
||||
- content::RenderProcessHost::FromID(process_id);
|
||||
- if (!render_process_host)
|
||||
- return;
|
||||
-
|
||||
- PrefService* pref_service =
|
||||
- Profile::FromBrowserContext(render_process_host->GetBrowserContext())
|
||||
- ->GetPrefs();
|
||||
-
|
||||
- std::vector<std::string> allowlist_domains =
|
||||
- safe_browsing::GetURLAllowlistByPolicy(pref_service);
|
||||
-
|
||||
- // Log the size of the domains to make sure copying them is
|
||||
- // not too expensive.
|
||||
- if (allowlist_domains.size() > 0) {
|
||||
- int total_size = 0;
|
||||
- for (const auto& domains : allowlist_domains) {
|
||||
- total_size += domains.size();
|
||||
- }
|
||||
- base::UmaHistogramCounts10000(
|
||||
- "SafeBrowsing.Policy.AllowlistDomainsTotalSize", total_size);
|
||||
- }
|
||||
-
|
||||
- bool safe_browsing_enabled =
|
||||
- safe_browsing::IsSafeBrowsingEnabled(*pref_service);
|
||||
- content::GetIOThreadTaskRunner({})->PostTask(
|
||||
- FROM_HERE,
|
||||
- base::BindOnce(
|
||||
- &safe_browsing::MojoSafeBrowsingImpl::MaybeCreate, process_id,
|
||||
- resource_context,
|
||||
- base::BindRepeating(get_checker_delegate, safe_browsing_enabled,
|
||||
- // Navigation initiated from renderer should never
|
||||
- // check when safe browsing is disabled, because
|
||||
- // enterprise check only supports mainframe URL.
|
||||
- /*should_check_on_sb_disabled=*/false,
|
||||
- allowlist_domains),
|
||||
- std::move(receiver)));
|
||||
}
|
||||
|
||||
} // namespace
|
||||
--- a/chrome/browser/download/chrome_download_manager_delegate.cc
|
||||
+++ b/chrome/browser/download/chrome_download_manager_delegate.cc
|
||||
@@ -130,7 +130,6 @@ using content::DownloadManager;
|
||||
@@ -131,7 +131,6 @@ using content::DownloadManager;
|
||||
using download::DownloadItem;
|
||||
using download::DownloadPathReservationTracker;
|
||||
using download::PathValidationResult;
|
||||
@@ -60,7 +114,7 @@
|
||||
using safe_browsing::DownloadProtectionService;
|
||||
|
||||
namespace {
|
||||
@@ -1430,8 +1429,6 @@ void ChromeDownloadManagerDelegate::OnDo
|
||||
@@ -1431,8 +1430,6 @@ void ChromeDownloadManagerDelegate::OnDo
|
||||
if (item->GetOriginalMimeType() == "application/x-x509-user-cert")
|
||||
DownloadItemModel(item).SetShouldPreferOpeningInBrowser(true);
|
||||
#endif
|
||||
@@ -69,8 +123,8 @@
|
||||
}
|
||||
if (ShouldBlockFile(target_info->danger_type, item)) {
|
||||
MaybeReportDangerousDownloadBlocked(
|
||||
--- a/chrome/browser/enterprise/connectors/content_analysis_delegate.cc
|
||||
+++ b/chrome/browser/enterprise/connectors/content_analysis_delegate.cc
|
||||
--- a/chrome/browser/enterprise/connectors/analysis/content_analysis_delegate.cc
|
||||
+++ b/chrome/browser/enterprise/connectors/analysis/content_analysis_delegate.cc
|
||||
@@ -37,13 +37,11 @@
|
||||
#include "chrome/browser/safe_browsing/cloud_content_scanning/binary_upload_service_factory.h"
|
||||
#include "chrome/browser/safe_browsing/cloud_content_scanning/deep_scanning_utils.h"
|
||||
@@ -85,9 +139,83 @@
|
||||
#include "components/safe_browsing/core/features.h"
|
||||
#include "components/url_matcher/url_matcher.h"
|
||||
#include "content/public/browser/web_contents.h"
|
||||
--- a/chrome/browser/enterprise/connectors/connectors_service.cc
|
||||
+++ b/chrome/browser/enterprise/connectors/connectors_service.cc
|
||||
@@ -265,19 +265,6 @@ base::Optional<std::string> ConnectorsSe
|
||||
return base::nullopt;
|
||||
}
|
||||
|
||||
-safe_browsing::EnterpriseRealTimeUrlCheckMode
|
||||
-ConnectorsService::GetAppliedRealTimeUrlCheck() const {
|
||||
- if (!ConnectorsEnabled() ||
|
||||
- !GetDmToken(prefs::kSafeBrowsingEnterpriseRealTimeUrlCheckScope)
|
||||
- .has_value()) {
|
||||
- return safe_browsing::REAL_TIME_CHECK_DISABLED;
|
||||
- }
|
||||
-
|
||||
- return static_cast<safe_browsing::EnterpriseRealTimeUrlCheckMode>(
|
||||
- Profile::FromBrowserContext(context_)->GetPrefs()->GetInteger(
|
||||
- prefs::kSafeBrowsingEnterpriseRealTimeUrlCheckMode));
|
||||
-}
|
||||
-
|
||||
ConnectorsManager* ConnectorsService::ConnectorsManagerForTesting() {
|
||||
return connectors_manager_.get();
|
||||
}
|
||||
--- a/chrome/browser/enterprise/connectors/connectors_service.h
|
||||
+++ b/chrome/browser/enterprise/connectors/connectors_service.h
|
||||
@@ -13,7 +13,6 @@
|
||||
#include "components/keyed_service/content/browser_context_keyed_service_factory.h"
|
||||
#include "components/keyed_service/core/keyed_service.h"
|
||||
#include "components/policy/core/common/policy_types.h"
|
||||
-#include "components/safe_browsing/core/common/safe_browsing_prefs.h"
|
||||
#include "content/public/browser/browser_context.h"
|
||||
|
||||
namespace base {
|
||||
@@ -73,12 +72,6 @@ class ConnectorsService : public KeyedSe
|
||||
// is no token to use.
|
||||
base::Optional<std::string> GetDMTokenForRealTimeUrlCheck() const;
|
||||
|
||||
- // Returns the value to used by the enterprise real-time URL check Connector
|
||||
- // if it is set and if the scope it's set at has a valid browser-profile
|
||||
- // affiliation.
|
||||
- safe_browsing::EnterpriseRealTimeUrlCheckMode GetAppliedRealTimeUrlCheck()
|
||||
- const;
|
||||
-
|
||||
// Testing functions.
|
||||
ConnectorsManager* ConnectorsManagerForTesting();
|
||||
|
||||
--- a/chrome/browser/extensions/api/enterprise_reporting_private/context_info_fetcher.cc
|
||||
+++ b/chrome/browser/extensions/api/enterprise_reporting_private/context_info_fetcher.cc
|
||||
@@ -49,7 +49,6 @@ void ContextInfoFetcher::Fetch(ContextIn
|
||||
GetAnalysisConnectorProviders(enterprise_connectors::FILE_DOWNLOADED);
|
||||
info.on_bulk_data_entry_providers =
|
||||
GetAnalysisConnectorProviders(enterprise_connectors::BULK_DATA_ENTRY);
|
||||
- info.realtime_url_check_mode = GetRealtimeUrlCheckMode();
|
||||
info.on_security_event_providers = GetOnSecurityEventProviders();
|
||||
info.browser_version = version_info::GetVersionNumber();
|
||||
|
||||
@@ -91,18 +90,6 @@ std::vector<std::string> ContextInfoFetc
|
||||
return connectors_service_->GetAnalysisServiceProviderNames(connector);
|
||||
}
|
||||
|
||||
-api::enterprise_reporting_private::RealtimeUrlCheckMode
|
||||
-ContextInfoFetcher::GetRealtimeUrlCheckMode() {
|
||||
- switch (connectors_service_->GetAppliedRealTimeUrlCheck()) {
|
||||
- case safe_browsing::REAL_TIME_CHECK_DISABLED:
|
||||
- return api::enterprise_reporting_private::
|
||||
- REALTIME_URL_CHECK_MODE_DISABLED;
|
||||
- case safe_browsing::REAL_TIME_CHECK_FOR_MAINFRAME_ENABLED:
|
||||
- return api::enterprise_reporting_private::
|
||||
- REALTIME_URL_CHECK_MODE_ENABLED_MAIN_FRAME;
|
||||
- }
|
||||
-}
|
||||
-
|
||||
std::vector<std::string> ContextInfoFetcher::GetOnSecurityEventProviders() {
|
||||
return connectors_service_->GetReportingServiceProviderNames(
|
||||
enterprise_connectors::ReportingConnector::SECURITY_EVENT);
|
||||
--- a/chrome/browser/extensions/api/safe_browsing_private/safe_browsing_private_event_router.cc
|
||||
+++ b/chrome/browser/extensions/api/safe_browsing_private/safe_browsing_private_event_router.cc
|
||||
@@ -300,6 +300,7 @@ void SafeBrowsingPrivateEventRouter::OnD
|
||||
@@ -320,6 +320,7 @@ void SafeBrowsingPrivateEventRouter::OnD
|
||||
event_router_->BroadcastEvent(std::move(extension_event));
|
||||
}
|
||||
|
||||
@@ -95,15 +223,15 @@
|
||||
auto settings = GetReportingSettings();
|
||||
if (!settings.has_value() ||
|
||||
settings->enabled_event_names.count(kKeyDangerousDownloadEvent) == 0) {
|
||||
@@ -334,6 +335,7 @@ void SafeBrowsingPrivateEventRouter::OnD
|
||||
},
|
||||
@@ -356,6 +357,7 @@ void SafeBrowsingPrivateEventRouter::OnD
|
||||
params.url, params.file_name, params.download_digest_sha256,
|
||||
params.user_name, mime_type, content_size));
|
||||
params.user_name, mime_type, DangerTypeToThreatType(danger_type),
|
||||
content_size));
|
||||
+#endif // FULL_SAFE_BROWSING
|
||||
}
|
||||
|
||||
void SafeBrowsingPrivateEventRouter::OnSecurityInterstitialShown(
|
||||
@@ -361,6 +363,7 @@ void SafeBrowsingPrivateEventRouter::OnS
|
||||
@@ -383,6 +385,7 @@ void SafeBrowsingPrivateEventRouter::OnS
|
||||
event_router_->BroadcastEvent(std::move(extension_event));
|
||||
}
|
||||
|
||||
@@ -111,7 +239,7 @@
|
||||
auto settings = GetReportingSettings();
|
||||
if (!settings.has_value() ||
|
||||
settings->enabled_event_names.count(kKeyInterstitialEvent) == 0) {
|
||||
@@ -393,6 +396,7 @@ void SafeBrowsingPrivateEventRouter::OnS
|
||||
@@ -415,6 +418,7 @@ void SafeBrowsingPrivateEventRouter::OnS
|
||||
},
|
||||
params.url, params.reason, net_error_code, params.user_name,
|
||||
event_result));
|
||||
@@ -119,7 +247,7 @@
|
||||
}
|
||||
|
||||
void SafeBrowsingPrivateEventRouter::OnSecurityInterstitialProceeded(
|
||||
@@ -420,6 +424,7 @@ void SafeBrowsingPrivateEventRouter::OnS
|
||||
@@ -442,6 +446,7 @@ void SafeBrowsingPrivateEventRouter::OnS
|
||||
event_router_->BroadcastEvent(std::move(extension_event));
|
||||
}
|
||||
|
||||
@@ -127,7 +255,7 @@
|
||||
auto settings = GetReportingSettings();
|
||||
if (!settings.has_value() ||
|
||||
settings->enabled_event_names.count(kKeyInterstitialEvent) == 0) {
|
||||
@@ -444,6 +449,7 @@ void SafeBrowsingPrivateEventRouter::OnS
|
||||
@@ -466,6 +471,7 @@ void SafeBrowsingPrivateEventRouter::OnS
|
||||
return event;
|
||||
},
|
||||
params.url, params.reason, net_error_code, params.user_name));
|
||||
@@ -135,7 +263,7 @@
|
||||
}
|
||||
|
||||
void SafeBrowsingPrivateEventRouter::OnAnalysisConnectorResult(
|
||||
@@ -456,6 +462,7 @@ void SafeBrowsingPrivateEventRouter::OnA
|
||||
@@ -478,6 +484,7 @@ void SafeBrowsingPrivateEventRouter::OnA
|
||||
const enterprise_connectors::ContentAnalysisResponse::Result& result,
|
||||
const int64_t content_size,
|
||||
safe_browsing::EventResult event_result) {
|
||||
@@ -143,7 +271,7 @@
|
||||
if (result.tag() == "malware") {
|
||||
DCHECK_EQ(1, result.triggered_rules().size());
|
||||
OnDangerousDeepScanningResult(
|
||||
@@ -467,6 +474,7 @@ void SafeBrowsingPrivateEventRouter::OnA
|
||||
@@ -489,6 +496,7 @@ void SafeBrowsingPrivateEventRouter::OnA
|
||||
OnSensitiveDataEvent(url, file_name, download_digest_sha256, mime_type,
|
||||
trigger, result, content_size, event_result);
|
||||
}
|
||||
@@ -151,7 +279,7 @@
|
||||
}
|
||||
|
||||
void SafeBrowsingPrivateEventRouter::OnDangerousDeepScanningResult(
|
||||
@@ -481,6 +489,7 @@ void SafeBrowsingPrivateEventRouter::OnD
|
||||
@@ -503,6 +511,7 @@ void SafeBrowsingPrivateEventRouter::OnD
|
||||
const std::string& malware_family,
|
||||
const std::string& malware_category,
|
||||
const std::string& evidence_locker_filepath) {
|
||||
@@ -159,7 +287,7 @@
|
||||
auto settings = GetReportingSettings();
|
||||
if (!settings.has_value() ||
|
||||
settings->enabled_event_names.count(kKeyDangerousDownloadEvent) == 0) {
|
||||
@@ -533,6 +542,7 @@ void SafeBrowsingPrivateEventRouter::OnD
|
||||
@@ -555,6 +564,7 @@ void SafeBrowsingPrivateEventRouter::OnD
|
||||
url.spec(), file_name, download_digest_sha256, GetProfileUserName(),
|
||||
threat_type, mime_type, trigger, content_size, event_result,
|
||||
malware_family, malware_category, evidence_locker_filepath));
|
||||
@@ -167,7 +295,7 @@
|
||||
}
|
||||
|
||||
void SafeBrowsingPrivateEventRouter::OnSensitiveDataEvent(
|
||||
@@ -544,6 +554,7 @@ void SafeBrowsingPrivateEventRouter::OnS
|
||||
@@ -566,6 +576,7 @@ void SafeBrowsingPrivateEventRouter::OnS
|
||||
const enterprise_connectors::ContentAnalysisResponse::Result& result,
|
||||
const int64_t content_size,
|
||||
safe_browsing::EventResult event_result) {
|
||||
@@ -175,7 +303,7 @@
|
||||
auto settings = GetReportingSettings();
|
||||
if (!settings.has_value() ||
|
||||
settings->enabled_event_names.count(kKeySensitiveDataEvent) == 0) {
|
||||
@@ -592,6 +603,7 @@ void SafeBrowsingPrivateEventRouter::OnS
|
||||
@@ -614,6 +625,7 @@ void SafeBrowsingPrivateEventRouter::OnS
|
||||
result, url.spec(), file_name, download_digest_sha256,
|
||||
GetProfileUserName(), mime_type, trigger, content_size,
|
||||
event_result));
|
||||
@@ -183,7 +311,7 @@
|
||||
}
|
||||
|
||||
void SafeBrowsingPrivateEventRouter::OnAnalysisConnectorWarningBypassed(
|
||||
@@ -603,6 +615,7 @@ void SafeBrowsingPrivateEventRouter::OnA
|
||||
@@ -625,6 +637,7 @@ void SafeBrowsingPrivateEventRouter::OnA
|
||||
safe_browsing::DeepScanAccessPoint access_point,
|
||||
const enterprise_connectors::ContentAnalysisResponse::Result& result,
|
||||
const int64_t content_size) {
|
||||
@@ -191,7 +319,7 @@
|
||||
auto settings = GetReportingSettings();
|
||||
if (!settings.has_value() ||
|
||||
settings->enabled_event_names.count(kKeySensitiveDataEvent) == 0) {
|
||||
@@ -650,6 +663,7 @@ void SafeBrowsingPrivateEventRouter::OnA
|
||||
@@ -672,6 +685,7 @@ void SafeBrowsingPrivateEventRouter::OnA
|
||||
result, url.spec(), file_name, download_digest_sha256,
|
||||
GetProfileUserName(), mime_type, trigger, access_point,
|
||||
content_size));
|
||||
@@ -199,7 +327,7 @@
|
||||
}
|
||||
|
||||
void SafeBrowsingPrivateEventRouter::OnUnscannedFileEvent(
|
||||
@@ -662,6 +676,7 @@ void SafeBrowsingPrivateEventRouter::OnU
|
||||
@@ -684,6 +698,7 @@ void SafeBrowsingPrivateEventRouter::OnU
|
||||
const std::string& reason,
|
||||
const int64_t content_size,
|
||||
safe_browsing::EventResult event_result) {
|
||||
@@ -207,7 +335,7 @@
|
||||
auto settings = GetReportingSettings();
|
||||
if (!settings.has_value() ||
|
||||
settings->enabled_event_names.count(kKeyUnscannedFileEvent) == 0) {
|
||||
@@ -704,6 +719,7 @@ void SafeBrowsingPrivateEventRouter::OnU
|
||||
@@ -726,6 +741,7 @@ void SafeBrowsingPrivateEventRouter::OnU
|
||||
url.spec(), file_name, download_digest_sha256, GetProfileUserName(),
|
||||
mime_type, trigger, access_point, reason, content_size,
|
||||
event_result));
|
||||
@@ -215,7 +343,7 @@
|
||||
}
|
||||
|
||||
void SafeBrowsingPrivateEventRouter::OnDangerousDownloadEvent(
|
||||
@@ -714,6 +730,7 @@ void SafeBrowsingPrivateEventRouter::OnD
|
||||
@@ -749,6 +765,7 @@ void SafeBrowsingPrivateEventRouter::OnD
|
||||
const std::string& mime_type,
|
||||
const int64_t content_size,
|
||||
safe_browsing::EventResult event_result) {
|
||||
@@ -223,7 +351,7 @@
|
||||
auto settings = GetReportingSettings();
|
||||
if (!settings.has_value() ||
|
||||
settings->enabled_event_names.count(kKeyDangerousDownloadEvent) == 0) {
|
||||
@@ -751,6 +768,7 @@ void SafeBrowsingPrivateEventRouter::OnD
|
||||
@@ -786,6 +803,7 @@ void SafeBrowsingPrivateEventRouter::OnD
|
||||
},
|
||||
url.spec(), file_name, download_digest_sha256, GetProfileUserName(),
|
||||
threat_type, mime_type, content_size, event_result));
|
||||
@@ -231,7 +359,7 @@
|
||||
}
|
||||
|
||||
void SafeBrowsingPrivateEventRouter::OnDangerousDownloadWarningBypassed(
|
||||
@@ -760,6 +778,7 @@ void SafeBrowsingPrivateEventRouter::OnD
|
||||
@@ -807,6 +825,7 @@ void SafeBrowsingPrivateEventRouter::OnD
|
||||
const std::string& threat_type,
|
||||
const std::string& mime_type,
|
||||
const int64_t content_size) {
|
||||
@@ -239,7 +367,7 @@
|
||||
auto settings = GetReportingSettings();
|
||||
if (!settings.has_value() ||
|
||||
settings->enabled_event_names.count(kKeyDangerousDownloadEvent) == 0) {
|
||||
@@ -796,6 +815,7 @@ void SafeBrowsingPrivateEventRouter::OnD
|
||||
@@ -843,6 +862,7 @@ void SafeBrowsingPrivateEventRouter::OnD
|
||||
},
|
||||
url.spec(), file_name, download_digest_sha256, GetProfileUserName(),
|
||||
threat_type, mime_type, content_size));
|
||||
@@ -247,7 +375,7 @@
|
||||
}
|
||||
|
||||
// static
|
||||
@@ -1097,7 +1117,11 @@ void SafeBrowsingPrivateEventRouter::Rep
|
||||
@@ -1115,7 +1135,11 @@ void SafeBrowsingPrivateEventRouter::Rep
|
||||
}
|
||||
|
||||
std::string SafeBrowsingPrivateEventRouter::GetProfileUserName() const {
|
||||
@@ -261,7 +389,7 @@
|
||||
#if BUILDFLAG(IS_CHROMEOS_ASH)
|
||||
--- a/chrome/browser/file_system_access/chrome_file_system_access_permission_context.cc
|
||||
+++ b/chrome/browser/file_system_access/chrome_file_system_access_permission_context.cc
|
||||
@@ -20,7 +20,6 @@
|
||||
@@ -25,7 +25,6 @@
|
||||
#include "chrome/browser/file_system_access/file_system_access_permission_context_factory.h"
|
||||
#include "chrome/browser/file_system_access/file_system_access_permission_request_manager.h"
|
||||
#include "chrome/browser/profiles/profile.h"
|
||||
@@ -269,7 +397,7 @@
|
||||
#include "chrome/browser/ui/file_system_access_dialogs.h"
|
||||
#include "chrome/common/chrome_paths.h"
|
||||
#include "components/content_settings/core/browser/host_content_settings_map.h"
|
||||
@@ -232,79 +231,6 @@ BindResultCallbackToCurrentSequence(
|
||||
@@ -278,79 +277,6 @@ BindResultCallbackToCurrentSequence(
|
||||
base::SequencedTaskRunnerHandle::Get(), std::move(callback));
|
||||
}
|
||||
|
||||
@@ -346,10 +474,10 @@
|
||||
- return ChromeFileSystemAccessPermissionContext::AfterWriteCheckResult::kBlock;
|
||||
-}
|
||||
-
|
||||
} // namespace
|
||||
|
||||
ChromeFileSystemAccessPermissionContext::Grants::Grants() = default;
|
||||
@@ -380,28 +306,6 @@ void ChromeFileSystemAccessPermissionCon
|
||||
std::string GenerateLastPickedDirectoryKey(const std::string& id) {
|
||||
return id.empty() ? kDefaultLastPickedDirectoryKey
|
||||
: base::StrCat({kCustomLastPickedDirectoryKey, "-", id});
|
||||
@@ -825,28 +751,6 @@ void ChromeFileSystemAccessPermissionCon
|
||||
std::move(callback)));
|
||||
}
|
||||
|
||||
@@ -380,7 +508,7 @@
|
||||
const url::Origin& origin,
|
||||
--- a/chrome/browser/file_system_access/chrome_file_system_access_permission_context.h
|
||||
+++ b/chrome/browser/file_system_access/chrome_file_system_access_permission_context.h
|
||||
@@ -53,10 +53,6 @@ class ChromeFileSystemAccessPermissionCo
|
||||
@@ -63,10 +63,6 @@ class ChromeFileSystemAccessPermissionCo
|
||||
HandleType handle_type,
|
||||
content::GlobalFrameRoutingId frame_id,
|
||||
base::OnceCallback<void(SensitiveDirectoryResult)> callback) override;
|
||||
@@ -393,7 +521,7 @@
|
||||
|
||||
--- a/chrome/browser/media/webrtc/display_media_access_handler.cc
|
||||
+++ b/chrome/browser/media/webrtc/display_media_access_handler.cc
|
||||
@@ -109,6 +109,7 @@ void DisplayMediaAccessHandler::HandleRe
|
||||
@@ -107,6 +107,7 @@ void DisplayMediaAccessHandler::HandleRe
|
||||
return;
|
||||
}
|
||||
|
||||
@@ -401,7 +529,7 @@
|
||||
// SafeBrowsing Delayed Warnings experiment can delay some SafeBrowsing
|
||||
// warnings until user interaction. If the current page has a delayed warning,
|
||||
// it'll have a user interaction observer attached. Show the warning
|
||||
@@ -123,6 +124,7 @@ void DisplayMediaAccessHandler::HandleRe
|
||||
@@ -121,6 +122,7 @@ void DisplayMediaAccessHandler::HandleRe
|
||||
observer->OnDesktopCaptureRequest();
|
||||
return;
|
||||
}
|
||||
@@ -432,7 +560,7 @@
|
||||
|
||||
#if defined(OS_ANDROID)
|
||||
#include "base/feature_list.h"
|
||||
@@ -829,6 +828,7 @@ autofill::LanguageCode ChromePasswordMan
|
||||
@@ -793,6 +792,7 @@ autofill::LanguageCode ChromePasswordMan
|
||||
return autofill::LanguageCode();
|
||||
}
|
||||
|
||||
@@ -440,7 +568,7 @@
|
||||
safe_browsing::PasswordProtectionService*
|
||||
ChromePasswordManagerClient::GetPasswordProtectionService() const {
|
||||
return safe_browsing::ChromePasswordProtectionService::
|
||||
@@ -839,13 +839,6 @@ ChromePasswordManagerClient::GetPassword
|
||||
@@ -803,13 +803,6 @@ ChromePasswordManagerClient::GetPassword
|
||||
void ChromePasswordManagerClient::CheckSafeBrowsingReputation(
|
||||
const GURL& form_action,
|
||||
const GURL& frame_url) {
|
||||
@@ -454,7 +582,7 @@
|
||||
}
|
||||
#endif // defined(ON_FOCUS_PING_ENABLED)
|
||||
|
||||
@@ -855,22 +848,10 @@ void ChromePasswordManagerClient::CheckP
|
||||
@@ -819,22 +812,10 @@ void ChromePasswordManagerClient::CheckP
|
||||
const std::vector<password_manager::MatchingReusedCredential>&
|
||||
matching_reused_credentials,
|
||||
bool password_field_exists) {
|
||||
@@ -478,21 +606,20 @@
|
||||
}
|
||||
|
||||
ukm::SourceId ChromePasswordManagerClient::GetUkmSourceId() {
|
||||
@@ -1364,10 +1345,12 @@ void ChromePasswordManagerClient::OnPast
|
||||
|
||||
if (self) {
|
||||
was_on_paste_called_ = true;
|
||||
+#if defined(SYNC_PASSWORD_REUSE_WARNING_ENABLED)
|
||||
password_reuse_detection_manager_.OnPaste(std::move(text));
|
||||
+#endif // defined(SYNC_PASSWORD_REUSE_WARNING_ENABLED)
|
||||
@@ -1286,9 +1267,11 @@ void ChromePasswordManagerClient::OnPast
|
||||
}
|
||||
|
||||
was_on_paste_called_ = true;
|
||||
+#if defined(SYNC_PASSWORD_REUSE_WARNING_ENABLED)
|
||||
password_reuse_detection_manager_.OnPaste(std::move(text));
|
||||
+#endif // defined(SYNC_PASSWORD_REUSE_WARNING_ENABLED)
|
||||
}
|
||||
-#endif
|
||||
+#endif // !defined(OS_ANDROID)
|
||||
|
||||
void ChromePasswordManagerClient::RenderFrameCreated(
|
||||
content::RenderFrameHost* render_frame_host) {
|
||||
@@ -1424,7 +1407,9 @@ void ChromePasswordManagerClient::OnInpu
|
||||
@@ -1323,7 +1306,9 @@ void ChromePasswordManagerClient::OnInpu
|
||||
if (key_event.windows_key_code == (ui::VKEY_V & 0x1f)) {
|
||||
OnPaste();
|
||||
} else {
|
||||
@@ -502,7 +629,7 @@
|
||||
}
|
||||
#endif // defined(OS_ANDROID)
|
||||
}
|
||||
@@ -1463,6 +1448,7 @@ bool ChromePasswordManagerClient::IsPass
|
||||
@@ -1362,6 +1347,7 @@ bool ChromePasswordManagerClient::IsPass
|
||||
is_enabled = false;
|
||||
}
|
||||
|
||||
@@ -510,7 +637,7 @@
|
||||
// SafeBrowsing Delayed Warnings experiment can delay some SafeBrowsing
|
||||
// warnings until user interaction. If the current page has a delayed warning,
|
||||
// it'll have a user interaction observer attached. Disable password
|
||||
@@ -1473,6 +1459,7 @@ bool ChromePasswordManagerClient::IsPass
|
||||
@@ -1372,6 +1358,7 @@ bool ChromePasswordManagerClient::IsPass
|
||||
observer->OnPasswordSaveOrAutofillDenied();
|
||||
is_enabled = false;
|
||||
}
|
||||
@@ -520,7 +647,7 @@
|
||||
password_manager::BrowserSavePasswordProgressLogger logger(
|
||||
--- a/chrome/browser/password_manager/chrome_password_manager_client.h
|
||||
+++ b/chrome/browser/password_manager/chrome_password_manager_client.h
|
||||
@@ -190,13 +190,14 @@ class ChromePasswordManagerClient
|
||||
@@ -189,13 +189,14 @@ class ChromePasswordManagerClient
|
||||
void AnnotateNavigationEntry(bool has_password_field) override;
|
||||
autofill::LanguageCode GetPageLanguage() const override;
|
||||
|
||||
@@ -536,7 +663,7 @@
|
||||
|
||||
void CheckProtectedPasswordEntry(
|
||||
password_manager::metrics_util::PasswordType reused_password_type,
|
||||
@@ -204,6 +205,7 @@ class ChromePasswordManagerClient
|
||||
@@ -203,6 +204,7 @@ class ChromePasswordManagerClient
|
||||
const std::vector<password_manager::MatchingReusedCredential>&
|
||||
matching_reused_credentials,
|
||||
bool password_field_exists) override;
|
||||
@@ -546,7 +673,7 @@
|
||||
|
||||
--- a/chrome/browser/permissions/abusive_origin_permission_revocation_request.cc
|
||||
+++ b/chrome/browser/permissions/abusive_origin_permission_revocation_request.cc
|
||||
@@ -17,7 +17,6 @@
|
||||
@@ -16,7 +16,6 @@
|
||||
#include "components/permissions/permission_uma_util.h"
|
||||
#include "components/permissions/permissions_client.h"
|
||||
#include "components/prefs/pref_service.h"
|
||||
@@ -554,7 +681,7 @@
|
||||
#include "components/safe_browsing/core/db/database_manager.h"
|
||||
|
||||
namespace {
|
||||
@@ -113,6 +112,7 @@ void AbusiveOriginPermissionRevocationRe
|
||||
@@ -136,6 +135,7 @@ void AbusiveOriginPermissionRevocationRe
|
||||
DCHECK(profile_);
|
||||
DCHECK(callback_);
|
||||
|
||||
@@ -562,18 +689,18 @@
|
||||
if (!AbusiveOriginNotificationsPermissionRevocationConfig::IsEnabled() ||
|
||||
!safe_browsing::IsSafeBrowsingEnabled(*profile_->GetPrefs()) ||
|
||||
IsOriginExemptedFromFutureRevocations(profile_, origin_)) {
|
||||
@@ -145,6 +145,7 @@ void AbusiveOriginPermissionRevocationRe
|
||||
return;
|
||||
@@ -182,6 +182,7 @@ void AbusiveOriginPermissionRevocationRe
|
||||
}
|
||||
}
|
||||
NotifyCallback(Outcome::PERMISSION_NOT_REVOKED);
|
||||
+#endif // BUILDFLAG(FULL_SAFE_BROWSING)
|
||||
|
||||
std::move(callback_).Run(Outcome::PERMISSION_NOT_REVOKED);
|
||||
}
|
||||
|
||||
void AbusiveOriginPermissionRevocationRequest::OnSafeBrowsingVerdictReceived(
|
||||
--- a/chrome/browser/permissions/contextual_notification_permission_ui_selector.cc
|
||||
+++ b/chrome/browser/permissions/contextual_notification_permission_ui_selector.cc
|
||||
@@ -18,10 +18,8 @@
|
||||
#include "chrome/browser/permissions/crowd_deny_preload_data.h"
|
||||
@@ -17,10 +17,8 @@
|
||||
#include "chrome/browser/browser_process.h"
|
||||
#include "chrome/browser/permissions/quiet_notification_permission_ui_config.h"
|
||||
#include "chrome/browser/permissions/quiet_notification_permission_ui_state.h"
|
||||
-#include "chrome/browser/safe_browsing/safe_browsing_service.h"
|
||||
@@ -583,7 +710,7 @@
|
||||
|
||||
namespace {
|
||||
|
||||
@@ -151,9 +149,6 @@ void ContextualNotificationPermissionUiS
|
||||
@@ -150,9 +148,6 @@ void ContextualNotificationPermissionUiS
|
||||
}
|
||||
|
||||
void ContextualNotificationPermissionUiSelector::Cancel() {
|
||||
@@ -593,9 +720,9 @@
|
||||
}
|
||||
|
||||
ContextualNotificationPermissionUiSelector::
|
||||
@@ -164,24 +159,14 @@ void ContextualNotificationPermissionUiS
|
||||
base::Optional<Decision> decision = GetDecisionBasedOnSiteReputation(
|
||||
CrowdDenyPreloadData::GetInstance()->GetReputationDataForSite(origin));
|
||||
@@ -173,24 +168,14 @@ void ContextualNotificationPermissionUiS
|
||||
base::Optional<Decision> decision =
|
||||
GetDecisionBasedOnSiteReputation(reputation);
|
||||
|
||||
- // If the PreloadData suggests this is an unacceptable site, ping Safe
|
||||
- // Browsing to verify; but do not ping if it is not warranted.
|
||||
@@ -625,7 +752,7 @@
|
||||
void ContextualNotificationPermissionUiSelector::OnSafeBrowsingVerdictReceived(
|
||||
--- a/chrome/browser/permissions/prediction_based_permission_ui_selector.cc
|
||||
+++ b/chrome/browser/permissions/prediction_based_permission_ui_selector.cc
|
||||
@@ -18,7 +18,6 @@
|
||||
@@ -19,7 +19,6 @@
|
||||
#include "components/permissions/prediction_service/prediction_service.h"
|
||||
#include "components/permissions/prediction_service/prediction_service_messages.pb.h"
|
||||
#include "components/prefs/pref_service.h"
|
||||
@@ -633,14 +760,16 @@
|
||||
|
||||
namespace {
|
||||
|
||||
@@ -203,6 +202,5 @@ bool PredictionBasedPermissionUiSelector
|
||||
@@ -182,8 +181,7 @@ bool PredictionBasedPermissionUiSelector
|
||||
// We need to also check `kQuietNotificationPrompts` here since there is no
|
||||
// generic safeguard anywhere else in the stack.
|
||||
return base::FeatureList::IsEnabled(features::kQuietNotificationPrompts) &&
|
||||
- base::FeatureList::IsEnabled(features::kPermissionPredictions) &&
|
||||
- safe_browsing::IsEnhancedProtectionEnabled(*(profile_->GetPrefs()));
|
||||
- safe_browsing::IsSafeBrowsingEnabled(*(profile_->GetPrefs()));
|
||||
+ base::FeatureList::IsEnabled(features::kPermissionPredictions);
|
||||
}
|
||||
|
||||
// static
|
||||
--- a/chrome/browser/reputation/reputation_service.cc
|
||||
+++ b/chrome/browser/reputation/reputation_service.cc
|
||||
@@ -119,9 +119,7 @@ void ReputationService::GetReputationSta
|
||||
@@ -654,6 +783,47 @@
|
||||
|
||||
LookalikeUrlService* service = LookalikeUrlService::Get(profile_);
|
||||
if (service->EngagedSitesNeedUpdating()) {
|
||||
--- a/chrome/browser/safe_browsing/safe_browsing_metrics_collector.cc
|
||||
+++ b/chrome/browser/safe_browsing/safe_browsing_metrics_collector.cc
|
||||
@@ -11,10 +11,11 @@
|
||||
#include "base/util/values/values_util.h"
|
||||
#include "components/prefs/pref_service.h"
|
||||
#include "components/prefs/scoped_user_pref_update.h"
|
||||
-#include "components/safe_browsing/core/common/safe_browsing_prefs.h"
|
||||
+#include "components/safe_browsing/buildflags.h"
|
||||
|
||||
namespace {
|
||||
|
||||
+#if BUILDFLAG(FULL_SAFE_BROWSING)
|
||||
using EventType = safe_browsing::SafeBrowsingMetricsCollector::EventType;
|
||||
using UserState = safe_browsing::SafeBrowsingMetricsCollector::UserState;
|
||||
using SafeBrowsingState = safe_browsing::SafeBrowsingState;
|
||||
@@ -349,4 +350,5 @@ std::string SafeBrowsingMetricsCollector
|
||||
SafeBrowsingMetricsCollector::Event::Event(EventType type, base::Time timestamp)
|
||||
: type(type), timestamp(timestamp) {}
|
||||
|
||||
+#endif
|
||||
} // namespace safe_browsing
|
||||
--- a/chrome/browser/safe_browsing/safe_browsing_metrics_collector_factory.cc
|
||||
+++ b/chrome/browser/safe_browsing/safe_browsing_metrics_collector_factory.cc
|
||||
@@ -8,9 +8,11 @@
|
||||
#include "chrome/browser/profiles/profile.h"
|
||||
#include "chrome/browser/safe_browsing/safe_browsing_metrics_collector.h"
|
||||
#include "components/keyed_service/content/browser_context_dependency_manager.h"
|
||||
+#include "components/safe_browsing/buildflags.h"
|
||||
#include "content/public/browser/browser_context.h"
|
||||
|
||||
namespace safe_browsing {
|
||||
+#if BUILDFLAG(FULL_SAFE_BROWSING)
|
||||
|
||||
// static
|
||||
SafeBrowsingMetricsCollector*
|
||||
@@ -36,4 +38,5 @@ KeyedService* SafeBrowsingMetricsCollect
|
||||
return new SafeBrowsingMetricsCollector(profile->GetPrefs());
|
||||
}
|
||||
|
||||
+#endif // BUILDFLAG(FULL_SAFE_BROWSING)
|
||||
} // namespace safe_browsing
|
||||
--- a/chrome/browser/safe_browsing/url_lookup_service_factory.cc
|
||||
+++ b/chrome/browser/safe_browsing/url_lookup_service_factory.cc
|
||||
@@ -53,37 +53,7 @@ RealTimeUrlLookupServiceFactory::RealTim
|
||||
@@ -778,7 +948,7 @@
|
||||
}
|
||||
--- a/chrome/browser/ui/views/download/download_item_view.cc
|
||||
+++ b/chrome/browser/ui/views/download/download_item_view.cc
|
||||
@@ -770,9 +770,7 @@ void DownloadItemView::UpdateLabels() {
|
||||
@@ -774,9 +774,7 @@ void DownloadItemView::UpdateLabels() {
|
||||
|
||||
deep_scanning_label_->SetVisible(mode_ == Mode::kDeepScanning);
|
||||
if (deep_scanning_label_->GetVisible()) {
|
||||
@@ -789,7 +959,7 @@
|
||||
? IDS_PROMPT_DEEP_SCANNING_DOWNLOAD
|
||||
: IDS_PROMPT_DEEP_SCANNING_APP_DOWNLOAD;
|
||||
const base::string16 filename = ElidedFilename(*deep_scanning_label_);
|
||||
@@ -796,11 +794,15 @@ void DownloadItemView::UpdateButtons() {
|
||||
@@ -800,11 +798,15 @@ void DownloadItemView::UpdateButtons() {
|
||||
}
|
||||
|
||||
const bool allow_open_during_deep_scan =
|
||||
@@ -805,7 +975,7 @@
|
||||
open_button_->SetEnabled((mode_ == Mode::kNormal) || prompt_to_scan ||
|
||||
allow_open_during_deep_scan);
|
||||
|
||||
@@ -1224,7 +1226,9 @@ void DownloadItemView::ShowContextMenuIm
|
||||
@@ -1233,7 +1235,9 @@ void DownloadItemView::ShowContextMenuIm
|
||||
}
|
||||
|
||||
void DownloadItemView::OpenDownloadDuringAsyncScanning() {
|
||||
@@ -817,7 +987,7 @@
|
||||
|
||||
--- a/chrome/browser/ui/views/safe_browsing/password_reuse_modal_warning_dialog.cc
|
||||
+++ b/chrome/browser/ui/views/safe_browsing/password_reuse_modal_warning_dialog.cc
|
||||
@@ -172,10 +172,7 @@ PasswordReuseModalWarningDialog::Passwor
|
||||
@@ -174,10 +174,7 @@ PasswordReuseModalWarningDialog::Passwor
|
||||
placeholder_offsets);
|
||||
} else {
|
||||
views::Label* message_body_label = CreateMessageBodyLabel(
|
||||
@@ -831,7 +1001,7 @@
|
||||
modal_construction_start_time_ = base::TimeTicks::Now();
|
||||
--- a/chrome/browser/ui/webui/chrome_web_ui_controller_factory.cc
|
||||
+++ b/chrome/browser/ui/webui/chrome_web_ui_controller_factory.cc
|
||||
@@ -86,8 +86,6 @@
|
||||
@@ -76,8 +76,6 @@
|
||||
#include "components/prefs/pref_service.h"
|
||||
#include "components/reading_list/features/reading_list_switches.h"
|
||||
#include "components/safe_browsing/buildflags.h"
|
||||
@@ -840,7 +1010,7 @@
|
||||
#include "components/search/ntp_features.h"
|
||||
#include "components/security_interstitials/content/connection_help_ui.h"
|
||||
#include "components/security_interstitials/content/known_interception_disclosure_ui.h"
|
||||
@@ -557,8 +555,6 @@ WebUIFactoryFunction GetWebUIFactoryFunc
|
||||
@@ -570,8 +568,6 @@ WebUIFactoryFunction GetWebUIFactoryFunc
|
||||
return &NewWebUI<PredictorsUI>;
|
||||
if (url.host_piece() == chrome::kChromeUIQuotaInternalsHost)
|
||||
return &NewWebUI<QuotaInternalsUI>;
|
||||
@@ -861,7 +1031,7 @@
|
||||
|
||||
--- a/chrome/browser/ui/webui/management/management_ui_handler.cc
|
||||
+++ b/chrome/browser/ui/webui/management/management_ui_handler.cc
|
||||
@@ -814,14 +814,6 @@ base::Value ManagementUIHandler::GetThre
|
||||
@@ -798,14 +798,6 @@ base::Value ManagementUIHandler::GetThre
|
||||
|
||||
auto* on_page_visited_event =
|
||||
chrome_policies.GetValue(policy::key::kEnterpriseRealTimeUrlCheckMode);
|
||||
@@ -1020,9 +1190,45 @@
|
||||
|
||||
// The latest config we've committed. Starts out null.
|
||||
// Protected by lock_.
|
||||
--- a/content/browser/file_system_access/native_file_system_file_writer_impl.cc
|
||||
+++ b/content/browser/file_system_access/native_file_system_file_writer_impl.cc
|
||||
@@ -513,15 +513,8 @@ void NativeFileSystemFileWriterImpl::Clo
|
||||
--- a/components/safe_browsing/core/password_protection/password_protection_service_base.cc
|
||||
+++ b/components/safe_browsing/core/password_protection/password_protection_service_base.cc
|
||||
@@ -249,12 +249,6 @@ void PasswordProtectionServiceBase::Hist
|
||||
history_service_observation_.Reset();
|
||||
}
|
||||
|
||||
-bool PasswordProtectionServiceBase::IsWarningEnabled(
|
||||
- ReusedPasswordAccountType password_type) {
|
||||
- return GetPasswordProtectionWarningTriggerPref(password_type) ==
|
||||
- PHISHING_REUSE;
|
||||
-}
|
||||
-
|
||||
// static
|
||||
ReusedPasswordType
|
||||
PasswordProtectionServiceBase::GetPasswordProtectionReusedPasswordType(
|
||||
--- a/components/safe_browsing/core/password_protection/password_protection_service_base.h
|
||||
+++ b/components/safe_browsing/core/password_protection/password_protection_service_base.h
|
||||
@@ -22,7 +22,6 @@
|
||||
#include "components/password_manager/core/browser/password_reuse_detector.h"
|
||||
#include "components/safe_browsing/buildflags.h"
|
||||
#include "components/safe_browsing/core/browser/referrer_chain_provider.h"
|
||||
-#include "components/safe_browsing/core/common/safe_browsing_prefs.h"
|
||||
#include "components/safe_browsing/core/db/database_manager.h"
|
||||
#include "components/safe_browsing/core/db/v4_protocol_manager_util.h"
|
||||
#include "components/safe_browsing/core/password_protection/metrics_util.h"
|
||||
@@ -130,10 +129,6 @@ class PasswordProtectionServiceBase : pu
|
||||
// Returns if the warning UI is enabled.
|
||||
bool IsWarningEnabled(ReusedPasswordAccountType password_type);
|
||||
|
||||
- // Returns the pref value of password protection warning trigger.
|
||||
- virtual PasswordProtectionTrigger GetPasswordProtectionWarningTriggerPref(
|
||||
- ReusedPasswordAccountType password_type) const = 0;
|
||||
-
|
||||
// If |url| matches Safe Browsing allowlist domains, password protection
|
||||
// change password URL, or password protection login URLs in the enterprise
|
||||
// policy.
|
||||
--- a/content/browser/file_system_access/file_system_access_file_writer_impl.cc
|
||||
+++ b/content/browser/file_system_access/file_system_access_file_writer_impl.cc
|
||||
@@ -340,15 +340,8 @@ void FileSystemAccessFileWriterImpl::Clo
|
||||
|
||||
close_callback_ = std::move(callback);
|
||||
|
||||
@@ -1033,19 +1239,19 @@
|
||||
- }
|
||||
-
|
||||
- ComputeHashForSwapFile(
|
||||
- base::BindOnce(&NativeFileSystemFileWriterImpl::DoAfterWriteCheck,
|
||||
- base::BindOnce(&FileSystemAccessFileWriterImpl::DoAfterWriteCheck,
|
||||
- weak_factory_.GetWeakPtr()));
|
||||
+ DidAfterWriteCheck(
|
||||
+ FileSystemAccessPermissionContext::AfterWriteCheckResult::kAllow);
|
||||
}
|
||||
|
||||
void NativeFileSystemFileWriterImpl::AbortImpl(AbortCallback callback) {
|
||||
@@ -541,37 +534,6 @@ void NativeFileSystemFileWriterImpl::Abo
|
||||
void FileSystemAccessFileWriterImpl::AbortImpl(AbortCallback callback) {
|
||||
@@ -368,37 +361,6 @@ void FileSystemAccessFileWriterImpl::Abo
|
||||
manager()->RemoveFileWriter(this);
|
||||
}
|
||||
|
||||
-// static
|
||||
-void NativeFileSystemFileWriterImpl::DoAfterWriteCheck(
|
||||
-void FileSystemAccessFileWriterImpl::DoAfterWriteCheck(
|
||||
- base::File::Error hash_result,
|
||||
- const std::string& hash,
|
||||
- int64_t size) {
|
||||
@@ -1056,7 +1262,7 @@
|
||||
- // callback.
|
||||
- manager()->operation_runner().PostTaskWithThisObject(
|
||||
- FROM_HERE, base::BindOnce(&RemoveSwapFile, swap_url()));
|
||||
- CallCloseCallbackAndDeleteThis(native_file_system_error::FromStatus(
|
||||
- CallCloseCallbackAndDeleteThis(file_system_access_error::FromStatus(
|
||||
- FileSystemAccessStatus::kOperationAborted,
|
||||
- "Failed to perform Safe Browsing check."));
|
||||
- return;
|
||||
@@ -1071,16 +1277,16 @@
|
||||
- item->has_user_gesture = has_transient_user_activation_;
|
||||
- manager()->permission_context()->PerformAfterWriteChecks(
|
||||
- std::move(item), context().frame_id,
|
||||
- base::BindOnce(&NativeFileSystemFileWriterImpl::DidAfterWriteCheck,
|
||||
- base::BindOnce(&FileSystemAccessFileWriterImpl::DidAfterWriteCheck,
|
||||
- weak_factory_.GetWeakPtr()));
|
||||
-}
|
||||
-
|
||||
void NativeFileSystemFileWriterImpl::DidAfterWriteCheck(
|
||||
void FileSystemAccessFileWriterImpl::DidAfterWriteCheck(
|
||||
FileSystemAccessPermissionContext::AfterWriteCheckResult result) {
|
||||
DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_);
|
||||
--- a/content/browser/file_system_access/native_file_system_file_writer_impl.h
|
||||
+++ b/content/browser/file_system_access/native_file_system_file_writer_impl.h
|
||||
@@ -106,9 +106,6 @@ class CONTENT_EXPORT NativeFileSystemFil
|
||||
--- a/content/browser/file_system_access/file_system_access_file_writer_impl.h
|
||||
+++ b/content/browser/file_system_access/file_system_access_file_writer_impl.h
|
||||
@@ -100,9 +100,6 @@ class CONTENT_EXPORT FileSystemAccessFil
|
||||
void TruncateImpl(uint64_t length, TruncateCallback callback);
|
||||
void CloseImpl(CloseCallback callback);
|
||||
void AbortImpl(AbortCallback callback);
|
||||
|
||||
@@ -1,12 +0,0 @@
|
||||
--- a/build/config/compiler/BUILD.gn
|
||||
+++ b/build/config/compiler/BUILD.gn
|
||||
@@ -651,9 +651,6 @@ config("compiler") {
|
||||
"-Wl,--thinlto-cache-policy,$cache_policy",
|
||||
]
|
||||
|
||||
- # TODO(https://crbug.com/1127713): Investigate, remove.
|
||||
- ldflags += [ "-Wl,-mllvm,-enable-dse-memoryssa=false" ]
|
||||
-
|
||||
ldflags += [ "-Wl,--lto-O" + lto_opt_level ]
|
||||
if (thin_lto_enable_optimizations) {
|
||||
# TODO(gbiv): We ideally shouldn't need to specify this; ThinLTO
|
||||
File diff suppressed because it is too large
Load Diff
@@ -9,7 +9,7 @@
|
||||
- "favicon_url": "https://www.google.com/images/branding/product/ico/googleg_lodp.ico",
|
||||
- "search_url": "{google:baseURL}search?q={searchTerms}&{google:RLZ}{google:originalQueryForSuggestion}{google:assistedQueryStats}{google:searchFieldtrialParameter}{google:iOSSearchLanguage}{google:prefetchSource}{google:searchClient}{google:sourceId}{google:contextualSearchVersion}ie={inputEncoding}",
|
||||
- "suggest_url": "{google:baseSuggestURL}search?{google:searchFieldtrialParameter}client={google:suggestClient}&gs_ri={google:suggestRid}&xssi=t&q={searchTerms}&{google:inputType}{google:omniboxFocusType}{google:cursorPosition}{google:currentPageUrl}{google:pageClassification}{google:searchVersion}{google:sessionToken}{google:prefetchQuery}sugkey={google:suggestAPIKeyParameter}",
|
||||
- "image_url": "{google:baseURL}searchbyimage/upload",
|
||||
- "image_url": "{google:baseSearchByImageURL}upload",
|
||||
- "contextual_search_url": "{google:baseURL}_/contextualsearch?{google:contextualSearchVersion}{google:contextualSearchContextData}",
|
||||
- "image_url_post_params": "encoded_image={google:imageThumbnail},image_url={google:imageURL},sbisrc={google:imageSearchSource},original_width={google:imageOriginalWidth},original_height={google:imageOriginalHeight}",
|
||||
- "alternate_urls": [
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
# Disables translation and removes the "Translate to" context menu when --translate-script-url flag is not set
|
||||
--- a/chrome/browser/renderer_context_menu/render_view_context_menu.cc
|
||||
+++ b/chrome/browser/renderer_context_menu/render_view_context_menu.cc
|
||||
@@ -122,6 +122,7 @@
|
||||
@@ -123,6 +123,7 @@
|
||||
#include "components/spellcheck/common/spellcheck_common.h"
|
||||
#include "components/spellcheck/spellcheck_buildflags.h"
|
||||
#include "components/strings/grit/components_strings.h"
|
||||
@@ -9,7 +9,7 @@
|
||||
#include "components/translate/core/browser/translate_download_manager.h"
|
||||
#include "components/translate/core/browser/translate_manager.h"
|
||||
#include "components/translate/core/browser/translate_prefs.h"
|
||||
@@ -1553,6 +1554,8 @@ void RenderViewContextMenu::AppendPageIt
|
||||
@@ -1573,6 +1574,8 @@ void RenderViewContextMenu::AppendPageIt
|
||||
menu_model_.AddSeparator(ui::NORMAL_SEPARATOR);
|
||||
}
|
||||
|
||||
@@ -18,7 +18,7 @@
|
||||
ChromeTranslateClient* chrome_translate_client =
|
||||
ChromeTranslateClient::FromWebContents(embedder_web_contents_);
|
||||
const bool canTranslate =
|
||||
@@ -1574,6 +1577,7 @@ void RenderViewContextMenu::AppendPageIt
|
||||
@@ -1594,6 +1597,7 @@ void RenderViewContextMenu::AppendPageIt
|
||||
IDC_CONTENT_CONTEXT_TRANSLATE,
|
||||
l10n_util::GetStringFUTF16(IDS_CONTENT_CONTEXT_TRANSLATE, language));
|
||||
}
|
||||
@@ -56,7 +56,7 @@
|
||||
request_pending_ = true;
|
||||
--- a/components/translate/core/browser/translate_manager.cc
|
||||
+++ b/components/translate/core/browser/translate_manager.cc
|
||||
@@ -855,8 +855,9 @@ void TranslateManager::FilterIsTranslate
|
||||
@@ -889,8 +889,9 @@ void TranslateManager::FilterIsTranslate
|
||||
->LogAutofillAssistantDeferredTriggerDecision();
|
||||
}
|
||||
|
||||
|
||||
@@ -5,7 +5,7 @@
|
||||
|
||||
--- a/third_party/devtools-frontend/src/BUILD.gn
|
||||
+++ b/third_party/devtools-frontend/src/BUILD.gn
|
||||
@@ -212,7 +212,7 @@ devtools_applications = [
|
||||
@@ -230,7 +230,7 @@ devtools_applications = [
|
||||
devtools_frontend_resources_deps = [
|
||||
":build_release_devtools",
|
||||
"front_end",
|
||||
|
||||
@@ -9,7 +9,7 @@
|
||||
|
||||
--- a/chrome/browser/BUILD.gn
|
||||
+++ b/chrome/browser/BUILD.gn
|
||||
@@ -2352,6 +2352,7 @@ static_library("browser") {
|
||||
@@ -2362,6 +2362,7 @@ static_library("browser") {
|
||||
"//third_party/libyuv",
|
||||
"//third_party/metrics_proto",
|
||||
"//third_party/re2",
|
||||
@@ -19,7 +19,7 @@
|
||||
"//third_party/widevine/cdm:headers",
|
||||
--- a/chrome/browser/about_flags.cc
|
||||
+++ b/chrome/browser/about_flags.cc
|
||||
@@ -177,6 +177,7 @@
|
||||
@@ -179,6 +179,7 @@
|
||||
#include "third_party/blink/public/common/forcedark/forcedark_switches.h"
|
||||
#include "third_party/blink/public/common/switches.h"
|
||||
#include "third_party/leveldatabase/leveldb_features.h"
|
||||
@@ -44,7 +44,7 @@
|
||||
#endif // CHROME_BROWSER_BROMITE_FLAG_ENTRIES_H_
|
||||
--- a/content/browser/BUILD.gn
|
||||
+++ b/content/browser/BUILD.gn
|
||||
@@ -218,6 +218,7 @@ source_set("browser") {
|
||||
@@ -217,6 +217,7 @@ source_set("browser") {
|
||||
"//third_party/libyuv",
|
||||
"//third_party/re2",
|
||||
"//third_party/sqlite",
|
||||
@@ -54,7 +54,7 @@
|
||||
"//third_party/zlib",
|
||||
--- a/content/browser/renderer_host/render_process_host_impl.cc
|
||||
+++ b/content/browser/renderer_host/render_process_host_impl.cc
|
||||
@@ -214,6 +214,7 @@
|
||||
@@ -212,6 +212,7 @@
|
||||
#include "third_party/blink/public/common/user_agent/user_agent_metadata.h"
|
||||
#include "third_party/blink/public/mojom/disk_allocator.mojom.h"
|
||||
#include "third_party/blink/public/public_buildflags.h"
|
||||
@@ -62,7 +62,7 @@
|
||||
#include "third_party/skia/include/core/SkBitmap.h"
|
||||
#include "ui/accessibility/accessibility_switches.h"
|
||||
#include "ui/base/ui_base_switches.h"
|
||||
@@ -3235,6 +3236,8 @@ void RenderProcessHostImpl::PropagateBro
|
||||
@@ -3299,6 +3300,8 @@ void RenderProcessHostImpl::PropagateBro
|
||||
switches::kEnableWebGLDraftExtensions,
|
||||
switches::kEnableWebGLImageChromium,
|
||||
switches::kFileUrlPathAlias,
|
||||
@@ -73,7 +73,7 @@
|
||||
switches::kForceGpuMemAvailableMb,
|
||||
--- a/content/child/BUILD.gn
|
||||
+++ b/content/child/BUILD.gn
|
||||
@@ -103,6 +103,7 @@ target(link_target_type, "child") {
|
||||
@@ -104,6 +104,7 @@ target(link_target_type, "child") {
|
||||
"//third_party/blink/public/common",
|
||||
"//third_party/blink/public/strings",
|
||||
"//third_party/ced",
|
||||
@@ -91,10 +91,10 @@
|
||||
#include "ui/accessibility/accessibility_features.h"
|
||||
#include "ui/base/ui_base_features.h"
|
||||
#include "ui/events/blink/blink_features.h"
|
||||
@@ -455,6 +456,10 @@ void SetRuntimeFeaturesFromCommandLine(c
|
||||
switches::kEnableAccessibilityObjectModel, true},
|
||||
{wrf::EnableAllowSyncXHRInPageDismissal,
|
||||
switches::kAllowSyncXHRInPageDismissal, true},
|
||||
@@ -460,6 +461,10 @@ void SetRuntimeFeaturesFromCommandLine(c
|
||||
{wrf::EnableWebGPU, switches::kEnableUnsafeWebGPU, true},
|
||||
{wrf::ForceOverlayFullscreenVideo, switches::kForceOverlayFullscreenVideo,
|
||||
true},
|
||||
+ {wrf::EnableFingerprintingClientRectsNoise,
|
||||
+ switches::kFingerprintingClientRectsNoise, true},
|
||||
+ {wrf::EnableFingerprintingCanvasMeasureTextNoise,
|
||||
@@ -104,7 +104,7 @@
|
||||
if (command_line.HasSwitch(mapping.switch_name))
|
||||
--- a/third_party/blink/public/platform/web_runtime_features.h
|
||||
+++ b/third_party/blink/public/platform/web_runtime_features.h
|
||||
@@ -199,6 +199,8 @@ class WebRuntimeFeatures {
|
||||
@@ -209,6 +209,8 @@ class WebRuntimeFeatures {
|
||||
BLINK_PLATFORM_EXPORT static void EnableGetDisplayMedia(bool);
|
||||
BLINK_PLATFORM_EXPORT static void EnableGetCurrentBrowsingContextMedia(bool);
|
||||
BLINK_PLATFORM_EXPORT static void EnableAllowSyncXHRInPageDismissal(bool);
|
||||
@@ -115,7 +115,7 @@
|
||||
EnableSignedExchangePrefetchCacheForNavigations(bool);
|
||||
--- a/third_party/blink/renderer/core/dom/document.cc
|
||||
+++ b/third_party/blink/renderer/core/dom/document.cc
|
||||
@@ -42,6 +42,7 @@
|
||||
@@ -43,6 +43,7 @@
|
||||
#include "base/macros.h"
|
||||
#include "base/metrics/histogram_functions.h"
|
||||
#include "base/optional.h"
|
||||
@@ -123,7 +123,7 @@
|
||||
#include "base/time/time.h"
|
||||
#include "cc/input/overscroll_behavior.h"
|
||||
#include "cc/input/scroll_snap_data.h"
|
||||
@@ -924,6 +925,14 @@ Range* Document::CreateRangeAdjustedToTr
|
||||
@@ -864,6 +865,14 @@ Range* Document::CreateRangeAdjustedToTr
|
||||
Position::BeforeNode(*shadow_host));
|
||||
}
|
||||
|
||||
@@ -138,7 +138,7 @@
|
||||
SelectorQueryCache& Document::GetSelectorQueryCache() {
|
||||
if (!selector_query_cache_)
|
||||
selector_query_cache_ = std::make_unique<SelectorQueryCache>();
|
||||
@@ -2430,6 +2439,15 @@ void Document::UpdateStyleAndLayoutTree(
|
||||
@@ -2386,6 +2395,15 @@ void Document::UpdateStyleAndLayoutTreeF
|
||||
#if DCHECK_IS_ON()
|
||||
AssertLayoutTreeUpdated(*this);
|
||||
#endif
|
||||
@@ -156,7 +156,7 @@
|
||||
void Document::InvalidateStyleAndLayoutForFontUpdates() {
|
||||
--- a/third_party/blink/renderer/core/dom/document.h
|
||||
+++ b/third_party/blink/renderer/core/dom/document.h
|
||||
@@ -442,6 +442,10 @@ class CORE_EXPORT Document : public Cont
|
||||
@@ -444,6 +444,10 @@ class CORE_EXPORT Document : public Cont
|
||||
has_xml_declaration_ = has_xml_declaration ? 1 : 0;
|
||||
}
|
||||
|
||||
@@ -167,7 +167,7 @@
|
||||
AtomicString visibilityState() const;
|
||||
bool IsPageVisible() const;
|
||||
bool hidden() const;
|
||||
@@ -1967,6 +1971,9 @@ class CORE_EXPORT Document : public Cont
|
||||
@@ -1998,6 +2002,9 @@ class CORE_EXPORT Document : public Cont
|
||||
|
||||
base::ElapsedTimer start_time_;
|
||||
|
||||
@@ -179,7 +179,7 @@
|
||||
HeapVector<Member<ScriptElementBase>> current_script_stack_;
|
||||
--- a/third_party/blink/renderer/core/dom/element.cc
|
||||
+++ b/third_party/blink/renderer/core/dom/element.cc
|
||||
@@ -2057,6 +2057,11 @@ DOMRectList* Element::getClientRects() {
|
||||
@@ -2075,6 +2075,11 @@ DOMRectList* Element::getClientRects() {
|
||||
DCHECK(element_layout_object);
|
||||
GetDocument().AdjustFloatQuadsForScrollAndAbsoluteZoom(
|
||||
quads, *element_layout_object);
|
||||
@@ -191,14 +191,14 @@
|
||||
return MakeGarbageCollected<DOMRectList>(quads);
|
||||
}
|
||||
|
||||
@@ -2074,6 +2079,9 @@ DOMRect* Element::getBoundingClientRect(
|
||||
@@ -2092,6 +2097,9 @@ FloatRect Element::GetBoundingClientRect
|
||||
DCHECK(element_layout_object);
|
||||
GetDocument().AdjustFloatRectForScrollAndAbsoluteZoom(result,
|
||||
*element_layout_object);
|
||||
+ if (RuntimeEnabledFeatures::FingerprintingClientRectsNoiseEnabled()) {
|
||||
+ result.Scale(GetDocument().GetNoiseFactorX(), GetDocument().GetNoiseFactorY());
|
||||
+ }
|
||||
return DOMRect::FromFloatRect(result);
|
||||
return result;
|
||||
}
|
||||
|
||||
--- a/third_party/blink/renderer/core/dom/range.cc
|
||||
@@ -266,7 +266,7 @@
|
||||
const TextDirection&,
|
||||
--- a/third_party/blink/renderer/modules/canvas/canvas2d/canvas_rendering_context_2d.cc
|
||||
+++ b/third_party/blink/renderer/modules/canvas/canvas2d/canvas_rendering_context_2d.cc
|
||||
@@ -965,9 +965,15 @@ TextMetrics* CanvasRenderingContext2D::m
|
||||
@@ -964,9 +964,15 @@ TextMetrics* CanvasRenderingContext2D::m
|
||||
else
|
||||
direction = ToTextDirection(GetState().GetDirection(), canvas());
|
||||
|
||||
@@ -282,12 +282,12 @@
|
||||
+ return text_metrics;
|
||||
}
|
||||
|
||||
void CanvasRenderingContext2D::DrawTextInternal(
|
||||
void CanvasRenderingContext2D::fillFormattedText(
|
||||
--- a/third_party/blink/renderer/platform/BUILD.gn
|
||||
+++ b/third_party/blink/renderer/platform/BUILD.gn
|
||||
@@ -1640,6 +1640,7 @@ component("platform") {
|
||||
"//cc/mojo_embedder",
|
||||
@@ -1656,6 +1656,7 @@ component("platform") {
|
||||
"//components/paint_preview/common",
|
||||
"//components/power_scheduler",
|
||||
"//components/search_engines:search_engine_utils",
|
||||
+ "//components/ungoogled:ungoogled_switches",
|
||||
"//components/viz/client",
|
||||
@@ -295,7 +295,7 @@
|
||||
"//crypto",
|
||||
--- a/third_party/blink/renderer/platform/exported/web_runtime_features.cc
|
||||
+++ b/third_party/blink/renderer/platform/exported/web_runtime_features.cc
|
||||
@@ -643,4 +643,12 @@ void WebRuntimeFeatures::EnableCSSColorS
|
||||
@@ -671,4 +671,12 @@ void WebRuntimeFeatures::EnableCSSColorS
|
||||
RuntimeEnabledFeatures::SetCSSColorSchemeUARenderingEnabled(enable);
|
||||
}
|
||||
|
||||
@@ -310,7 +310,7 @@
|
||||
} // namespace blink
|
||||
--- a/third_party/blink/renderer/platform/runtime_enabled_features.json5
|
||||
+++ b/third_party/blink/renderer/platform/runtime_enabled_features.json5
|
||||
@@ -894,6 +894,12 @@
|
||||
@@ -951,6 +951,12 @@
|
||||
status: "experimental",
|
||||
},
|
||||
{
|
||||
@@ -320,6 +320,6 @@
|
||||
+ name: "FingerprintingCanvasMeasureTextNoise",
|
||||
+ },
|
||||
+ {
|
||||
name: "FlexAspectRatio",
|
||||
status: "stable",
|
||||
name: "FocuslessSpatialNavigation",
|
||||
settable_from_internals: true,
|
||||
},
|
||||
|
||||
@@ -34,7 +34,7 @@ approach to change color components.
|
||||
#endif // CHROME_BROWSER_BROMITE_FLAG_ENTRIES_H_
|
||||
--- a/content/browser/renderer_host/render_process_host_impl.cc
|
||||
+++ b/content/browser/renderer_host/render_process_host_impl.cc
|
||||
@@ -3238,6 +3238,7 @@ void RenderProcessHostImpl::PropagateBro
|
||||
@@ -3302,6 +3302,7 @@ void RenderProcessHostImpl::PropagateBro
|
||||
switches::kFileUrlPathAlias,
|
||||
switches::kFingerprintingClientRectsNoise,
|
||||
switches::kFingerprintingCanvasMeasureTextNoise,
|
||||
@@ -44,7 +44,7 @@ approach to change color components.
|
||||
switches::kForceGpuMemAvailableMb,
|
||||
--- a/content/child/runtime_features.cc
|
||||
+++ b/content/child/runtime_features.cc
|
||||
@@ -460,6 +460,8 @@ void SetRuntimeFeaturesFromCommandLine(c
|
||||
@@ -465,6 +465,8 @@ void SetRuntimeFeaturesFromCommandLine(c
|
||||
switches::kFingerprintingClientRectsNoise, true},
|
||||
{wrf::EnableFingerprintingCanvasMeasureTextNoise,
|
||||
switches::kFingerprintingCanvasMeasureTextNoise, true},
|
||||
@@ -55,7 +55,7 @@ approach to change color components.
|
||||
if (command_line.HasSwitch(mapping.switch_name))
|
||||
--- a/third_party/blink/public/platform/web_runtime_features.h
|
||||
+++ b/third_party/blink/public/platform/web_runtime_features.h
|
||||
@@ -201,6 +201,7 @@ class WebRuntimeFeatures {
|
||||
@@ -211,6 +211,7 @@ class WebRuntimeFeatures {
|
||||
BLINK_PLATFORM_EXPORT static void EnableAllowSyncXHRInPageDismissal(bool);
|
||||
BLINK_PLATFORM_EXPORT static void EnableFingerprintingClientRectsNoise(bool);
|
||||
BLINK_PLATFORM_EXPORT static void EnableFingerprintingCanvasMeasureTextNoise(bool);
|
||||
@@ -65,7 +65,7 @@ approach to change color components.
|
||||
EnableSignedExchangePrefetchCacheForNavigations(bool);
|
||||
--- a/third_party/blink/renderer/modules/canvas/canvas2d/base_rendering_context_2d.cc
|
||||
+++ b/third_party/blink/renderer/modules/canvas/canvas2d/base_rendering_context_2d.cc
|
||||
@@ -24,6 +24,7 @@
|
||||
@@ -20,6 +20,7 @@
|
||||
#include "third_party/blink/renderer/platform/geometry/float_quad.h"
|
||||
#include "third_party/blink/renderer/platform/graphics/bitmap_image.h"
|
||||
#include "third_party/blink/renderer/platform/graphics/skia/skia_utils.h"
|
||||
@@ -73,7 +73,7 @@ approach to change color components.
|
||||
#include "third_party/blink/renderer/platform/graphics/stroke_data.h"
|
||||
#include "third_party/blink/renderer/platform/heap/heap.h"
|
||||
|
||||
@@ -1772,6 +1773,11 @@ ImageData* BaseRenderingContext2D::getIm
|
||||
@@ -1978,6 +1979,11 @@ ImageData* BaseRenderingContext2D::getIm
|
||||
snapshot->PaintImageForCurrentFrame().GetSkImageInfo().bounds();
|
||||
DCHECK(!bounds.intersect(SkIRect::MakeXYWH(sx, sy, sw, sh)));
|
||||
}
|
||||
@@ -87,7 +87,7 @@ approach to change color components.
|
||||
// Wrap |contents| in an ImageData.
|
||||
--- a/third_party/blink/renderer/platform/BUILD.gn
|
||||
+++ b/third_party/blink/renderer/platform/BUILD.gn
|
||||
@@ -1602,7 +1602,9 @@ component("platform") {
|
||||
@@ -1615,7 +1615,9 @@ component("platform") {
|
||||
"//third_party/blink/renderer:non_test_config",
|
||||
]
|
||||
|
||||
@@ -100,7 +100,7 @@ approach to change color components.
|
||||
"//third_party/blink/renderer/platform/blob",
|
||||
--- a/third_party/blink/renderer/platform/exported/web_runtime_features.cc
|
||||
+++ b/third_party/blink/renderer/platform/exported/web_runtime_features.cc
|
||||
@@ -651,4 +651,8 @@ void WebRuntimeFeatures::EnableFingerpri
|
||||
@@ -679,4 +679,8 @@ void WebRuntimeFeatures::EnableFingerpri
|
||||
RuntimeEnabledFeatures::SetFingerprintingCanvasMeasureTextNoiseEnabled(enable);
|
||||
}
|
||||
|
||||
@@ -156,7 +156,7 @@ approach to change color components.
|
||||
#include "v8/include/v8.h"
|
||||
|
||||
namespace blink {
|
||||
@@ -79,4 +83,154 @@ void StaticBitmapImage::DrawHelper(
|
||||
@@ -81,4 +85,154 @@ void StaticBitmapImage::DrawHelper(
|
||||
WebCoreClampingModeToSkiaRectConstraint(clamp_mode));
|
||||
}
|
||||
|
||||
@@ -324,13 +324,13 @@ approach to change color components.
|
||||
// Methods overridden by all sub-classes
|
||||
--- a/third_party/blink/renderer/platform/runtime_enabled_features.json5
|
||||
+++ b/third_party/blink/renderer/platform/runtime_enabled_features.json5
|
||||
@@ -900,6 +900,9 @@
|
||||
@@ -957,6 +957,9 @@
|
||||
name: "FingerprintingCanvasMeasureTextNoise",
|
||||
},
|
||||
{
|
||||
+ name: "FingerprintingCanvasImageDataNoise",
|
||||
+ },
|
||||
+ {
|
||||
name: "FlexAspectRatio",
|
||||
status: "stable",
|
||||
name: "FocuslessSpatialNavigation",
|
||||
settable_from_internals: true,
|
||||
},
|
||||
|
||||
@@ -17,7 +17,7 @@ with limited CPU/memory resources and it is disabled by default.
|
||||
|
||||
--- a/chrome/browser/BUILD.gn
|
||||
+++ b/chrome/browser/BUILD.gn
|
||||
@@ -2130,6 +2130,7 @@ static_library("browser") {
|
||||
@@ -2132,6 +2132,7 @@ static_library("browser") {
|
||||
"//components/net_log",
|
||||
"//components/network_hints/common:mojo_bindings",
|
||||
"//components/network_session_configurator/browser",
|
||||
@@ -72,7 +72,7 @@ with limited CPU/memory resources and it is disabled by default.
|
||||
#include "components/network_time/network_time_tracker.h"
|
||||
#include "components/permissions/permissions_client.h"
|
||||
#include "components/policy/core/common/policy_service.h"
|
||||
@@ -131,6 +134,7 @@
|
||||
@@ -130,6 +133,7 @@
|
||||
#include "media/media_buildflags.h"
|
||||
#include "mojo/public/cpp/bindings/pending_receiver.h"
|
||||
#include "net/log/net_log.h"
|
||||
@@ -80,7 +80,7 @@ with limited CPU/memory resources and it is disabled by default.
|
||||
#include "ppapi/buildflags/buildflags.h"
|
||||
#include "printing/buildflags/buildflags.h"
|
||||
#include "services/network/public/cpp/features.h"
|
||||
@@ -326,6 +330,18 @@ void BrowserProcessImpl::Init() {
|
||||
@@ -317,6 +321,18 @@ void BrowserProcessImpl::Init() {
|
||||
base::BindRepeating(&ApplyMetricsReportingPolicy));
|
||||
#endif
|
||||
|
||||
@@ -101,7 +101,7 @@ with limited CPU/memory resources and it is disabled by default.
|
||||
|
||||
--- a/chrome/browser/flag_descriptions.cc
|
||||
+++ b/chrome/browser/flag_descriptions.cc
|
||||
@@ -1391,6 +1391,10 @@ const char kMediaHistoryDescription[] =
|
||||
@@ -1451,6 +1451,10 @@ const char kMediaHistoryDescription[] =
|
||||
"Enables Media History which records data around media playbacks on "
|
||||
"websites.";
|
||||
|
||||
@@ -114,7 +114,7 @@ with limited CPU/memory resources and it is disabled by default.
|
||||
const char kMediaRouterCastAllowAllIPsDescription[] =
|
||||
--- a/chrome/browser/flag_descriptions.h
|
||||
+++ b/chrome/browser/flag_descriptions.h
|
||||
@@ -823,6 +823,9 @@ extern const char kLogJsConsoleMessagesD
|
||||
@@ -859,6 +859,9 @@ extern const char kLogJsConsoleMessagesD
|
||||
extern const char kMediaHistoryName[];
|
||||
extern const char kMediaHistoryDescription[];
|
||||
|
||||
|
||||
@@ -3,7 +3,7 @@ author: Michael Gilbert <mgilbert@debian.org>
|
||||
|
||||
--- a/chrome/browser/ui/startup/startup_browser_creator_impl.cc
|
||||
+++ b/chrome/browser/ui/startup/startup_browser_creator_impl.cc
|
||||
@@ -596,9 +596,6 @@ void StartupBrowserCreatorImpl::AddInfoB
|
||||
@@ -598,9 +598,6 @@ void StartupBrowserCreatorImpl::AddInfoB
|
||||
}
|
||||
#endif
|
||||
|
||||
|
||||
@@ -4,7 +4,7 @@ bug-debian: http://bugs.debian.org/857767
|
||||
|
||||
--- a/chrome/browser/profiles/profile_manager.cc
|
||||
+++ b/chrome/browser/profiles/profile_manager.cc
|
||||
@@ -1189,7 +1189,7 @@ void ProfileManager::InitProfileUserPref
|
||||
@@ -1200,7 +1200,7 @@ void ProfileManager::InitProfileUserPref
|
||||
profile->GetPrefs()->SetString(prefs::kSupervisedUserId,
|
||||
supervised_user_id);
|
||||
}
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
|
||||
--- a/chrome/browser/background/background_mode_manager.cc
|
||||
+++ b/chrome/browser/background/background_mode_manager.cc
|
||||
@@ -360,7 +360,7 @@ void BackgroundModeManager::RegisterPref
|
||||
@@ -362,7 +362,7 @@ void BackgroundModeManager::RegisterPref
|
||||
registry->RegisterBooleanPref(prefs::kChromeCreatedLoginItem, false);
|
||||
registry->RegisterBooleanPref(prefs::kMigratedLoginItemPref, false);
|
||||
#endif
|
||||
@@ -12,7 +12,7 @@
|
||||
void BackgroundModeManager::RegisterProfile(Profile* profile) {
|
||||
--- a/chrome/browser/chrome_content_browser_client.cc
|
||||
+++ b/chrome/browser/chrome_content_browser_client.cc
|
||||
@@ -1338,7 +1338,7 @@ void ChromeContentBrowserClient::Registe
|
||||
@@ -1238,7 +1238,7 @@ void ChromeContentBrowserClient::Registe
|
||||
void ChromeContentBrowserClient::RegisterProfilePrefs(
|
||||
user_prefs::PrefRegistrySyncable* registry) {
|
||||
registry->RegisterBooleanPref(prefs::kDisable3DAPIs, false);
|
||||
@@ -56,7 +56,7 @@
|
||||
registry->RegisterBooleanPref(prefs::kGloballyScopeHTTPAuthCacheEnabled,
|
||||
--- a/chrome/browser/profiles/profile.cc
|
||||
+++ b/chrome/browser/profiles/profile.cc
|
||||
@@ -248,7 +248,7 @@ const char Profile::kProfileKey[] = "__P
|
||||
@@ -247,7 +247,7 @@ const char Profile::kProfileKey[] = "__P
|
||||
void Profile::RegisterProfilePrefs(user_prefs::PrefRegistrySyncable* registry) {
|
||||
registry->RegisterBooleanPref(
|
||||
prefs::kSearchSuggestEnabled,
|
||||
@@ -78,7 +78,7 @@
|
||||
</cr-dialog>
|
||||
--- a/chrome/browser/signin/account_consistency_mode_manager.cc
|
||||
+++ b/chrome/browser/signin/account_consistency_mode_manager.cc
|
||||
@@ -117,7 +117,7 @@ void AccountConsistencyModeManager::Regi
|
||||
@@ -116,7 +116,7 @@ void AccountConsistencyModeManager::Regi
|
||||
#if BUILDFLAG(ENABLE_DICE_SUPPORT)
|
||||
registry->RegisterBooleanPref(kDiceMigrationCompletePref, false);
|
||||
#endif
|
||||
@@ -140,7 +140,7 @@
|
||||
prefs::kAutofillProfileValidity, "",
|
||||
--- a/components/bookmarks/browser/bookmark_utils.cc
|
||||
+++ b/components/bookmarks/browser/bookmark_utils.cc
|
||||
@@ -442,12 +442,12 @@ bool DoesBookmarkContainWords(const base
|
||||
@@ -441,12 +441,12 @@ bool DoesBookmarkContainWords(const base
|
||||
void RegisterProfilePrefs(user_prefs::PrefRegistrySyncable* registry) {
|
||||
registry->RegisterBooleanPref(
|
||||
prefs::kShowBookmarkBar,
|
||||
@@ -154,7 +154,7 @@
|
||||
+ false,
|
||||
user_prefs::PrefRegistrySyncable::SYNCABLE_PREF);
|
||||
registry->RegisterBooleanPref(
|
||||
prefs::kShowManagedBookmarksInBookmarkBar,
|
||||
prefs::kShowReadingListInBookmarkBar, true,
|
||||
--- a/components/content_settings/core/browser/cookie_settings.cc
|
||||
+++ b/components/content_settings/core/browser/cookie_settings.cc
|
||||
@@ -62,7 +62,7 @@ void CookieSettings::RegisterProfilePref
|
||||
@@ -168,7 +168,7 @@
|
||||
|
||||
--- a/components/password_manager/core/browser/password_manager.cc
|
||||
+++ b/components/password_manager/core/browser/password_manager.cc
|
||||
@@ -207,10 +207,10 @@ FormData SimplifiedFormDataFromFormStruc
|
||||
@@ -208,10 +208,10 @@ FormData SimplifiedFormDataFromFormStruc
|
||||
void PasswordManager::RegisterProfilePrefs(
|
||||
user_prefs::PrefRegistrySyncable* registry) {
|
||||
registry->RegisterBooleanPref(
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
--- a/sandbox/linux/BUILD.gn
|
||||
+++ b/sandbox/linux/BUILD.gn
|
||||
@@ -323,6 +323,12 @@ if (is_linux || is_chromeos) {
|
||||
@@ -327,6 +327,12 @@ if (is_linux || is_chromeos) {
|
||||
# These files have a suspicious comparison.
|
||||
# TODO fix this and re-enable this warning.
|
||||
"-Wno-sign-compare",
|
||||
|
||||
@@ -79,7 +79,7 @@
|
||||
#include "base/feature_list.h"
|
||||
#include "base/i18n/break_iterator.h"
|
||||
#include "base/i18n/case_conversion.h"
|
||||
@@ -646,6 +647,9 @@ void SearchProvider::Run(bool query_is_p
|
||||
@@ -643,6 +644,9 @@ void SearchProvider::Run(bool query_is_p
|
||||
}
|
||||
|
||||
void SearchProvider::DoHistoryQuery(bool minimal_changes) {
|
||||
@@ -98,8 +98,8 @@
|
||||
+#include "base/command_line.h"
|
||||
#include "base/files/file_path.h"
|
||||
#include "base/files/file_util.h"
|
||||
#include "base/strings/string_number_conversions.h"
|
||||
@@ -605,6 +606,8 @@ GURL FixupURL(const std::string& text, c
|
||||
#include "base/ranges/algorithm.h"
|
||||
@@ -607,6 +608,8 @@ GURL FixupURL(const std::string& text, c
|
||||
|
||||
FixupHost(trimmed, parts.host, parts.scheme.is_valid(), desired_tld, &url);
|
||||
if (chrome_url && !parts.host.is_valid())
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
--- a/chrome/browser/chrome_content_browser_client.cc
|
||||
+++ b/chrome/browser/chrome_content_browser_client.cc
|
||||
@@ -5923,7 +5923,7 @@ bool ChromeContentBrowserClient::ShouldA
|
||||
@@ -5918,7 +5918,7 @@ bool ChromeContentBrowserClient::ShouldA
|
||||
const url::Origin& embedder_origin,
|
||||
const content::PepperPluginInfo& plugin_info) {
|
||||
#if BUILDFLAG(ENABLE_PDF)
|
||||
@@ -22,7 +22,7 @@
|
||||
}
|
||||
--- a/chrome/browser/plugins/pdf_iframe_navigation_throttle_unittest.cc
|
||||
+++ b/chrome/browser/plugins/pdf_iframe_navigation_throttle_unittest.cc
|
||||
@@ -66,7 +66,7 @@ class PDFIFrameNavigationThrottleTest :
|
||||
@@ -64,7 +64,7 @@ class PDFIFrameNavigationThrottleTest :
|
||||
// Register a fake PDF Viewer plugin into our plugin service.
|
||||
content::WebPluginInfo info;
|
||||
info.name =
|
||||
@@ -264,7 +264,7 @@
|
||||
if (enable_plugins) {
|
||||
--- a/chrome/common/chrome_content_client.cc
|
||||
+++ b/chrome/common/chrome_content_client.cc
|
||||
@@ -141,7 +141,7 @@ void ComputeBuiltInPlugins(std::vector<c
|
||||
@@ -142,7 +142,7 @@ void ComputeBuiltInPlugins(std::vector<c
|
||||
content::PepperPluginInfo pdf_info;
|
||||
pdf_info.is_internal = true;
|
||||
pdf_info.is_out_of_process = true;
|
||||
@@ -362,7 +362,7 @@
|
||||
FILE_PATH_LITERAL("internal-pdf-viewer");
|
||||
--- a/chrome/renderer/chrome_content_renderer_client.cc
|
||||
+++ b/chrome/renderer/chrome_content_renderer_client.cc
|
||||
@@ -952,7 +952,7 @@ WebPlugin* ChromeContentRendererClient::
|
||||
@@ -955,7 +955,7 @@ WebPlugin* ChromeContentRendererClient::
|
||||
}
|
||||
}
|
||||
} else if (info.name ==
|
||||
@@ -371,7 +371,7 @@
|
||||
// Report PDF load metrics. Since the PDF plugin is comprised of an
|
||||
// extension that loads a second plugin, avoid double counting by
|
||||
// ignoring the creation of the second plugin.
|
||||
@@ -988,7 +988,7 @@ WebPlugin* ChromeContentRendererClient::
|
||||
@@ -991,7 +991,7 @@ WebPlugin* ChromeContentRendererClient::
|
||||
PluginUMAReporter::GetInstance()->ReportPluginDisabled(orig_mime_type,
|
||||
url);
|
||||
if (info.name ==
|
||||
|
||||
@@ -52,7 +52,7 @@
|
||||
|
||||
--- a/chrome/renderer/chrome_render_frame_observer.h
|
||||
+++ b/chrome/renderer/chrome_render_frame_observer.h
|
||||
@@ -129,6 +129,7 @@ class ChromeRenderFrameObserver : public
|
||||
@@ -134,6 +134,7 @@ class ChromeRenderFrameObserver : public
|
||||
#if BUILDFLAG(SAFE_BROWSING_AVAILABLE)
|
||||
safe_browsing::PhishingClassifierDelegate* phishing_classifier_ = nullptr;
|
||||
#endif
|
||||
@@ -85,7 +85,7 @@
|
||||
// TemplateURLService::LessWithPrefix -----------------------------------------
|
||||
@@ -280,6 +287,7 @@ TemplateURLService::TemplateURLService(
|
||||
std::unique_ptr<TemplateURLServiceClient> client,
|
||||
const base::Closure& dsp_change_callback)
|
||||
const base::RepeatingClosure& dsp_change_callback)
|
||||
: prefs_(prefs),
|
||||
+ should_autocollect_(true),
|
||||
search_terms_data_(std::move(search_terms_data)),
|
||||
@@ -102,7 +102,7 @@
|
||||
}
|
||||
|
||||
bool TemplateURLService::IsPrepopulatedOrCreatedByPolicy(
|
||||
@@ -1446,6 +1454,8 @@ SyncDataMap TemplateURLService::CreateGU
|
||||
@@ -1449,6 +1457,8 @@ SyncDataMap TemplateURLService::CreateGU
|
||||
|
||||
void TemplateURLService::Init(const Initializer* initializers,
|
||||
int num_initializers) {
|
||||
@@ -111,7 +111,7 @@
|
||||
if (client_)
|
||||
client_->SetOwner(this);
|
||||
|
||||
@@ -1582,6 +1592,9 @@ void TemplateURLService::ChangeToLoadedS
|
||||
@@ -1585,6 +1595,9 @@ void TemplateURLService::ChangeToLoadedS
|
||||
|
||||
bool TemplateURLService::CanAddAutogeneratedKeywordForHost(
|
||||
const std::string& host) const {
|
||||
@@ -123,7 +123,7 @@
|
||||
return true;
|
||||
--- a/components/search_engines/template_url_service.h
|
||||
+++ b/components/search_engines/template_url_service.h
|
||||
@@ -685,6 +685,8 @@ class TemplateURLService : public WebDat
|
||||
@@ -686,6 +686,8 @@ class TemplateURLService : public WebDat
|
||||
// ---------- Browser state related members ---------------------------------
|
||||
PrefService* prefs_ = nullptr;
|
||||
|
||||
|
||||
@@ -8,7 +8,7 @@
|
||||
#include "base/containers/flat_map.h"
|
||||
#include "base/metrics/histogram_macros.h"
|
||||
#include "base/metrics/user_metrics.h"
|
||||
@@ -1748,6 +1749,10 @@ bool TabStripModel::InternalCloseTabs(
|
||||
@@ -1752,6 +1753,10 @@ bool TabStripModel::InternalCloseTabs(
|
||||
if (items.empty())
|
||||
return true;
|
||||
|
||||
|
||||
@@ -50,7 +50,7 @@
|
||||
bool IsExtensionDownload(const download::DownloadItem& download_item);
|
||||
--- a/chrome/browser/download/download_target_determiner.cc
|
||||
+++ b/chrome/browser/download/download_target_determiner.cc
|
||||
@@ -1034,10 +1034,12 @@ DownloadConfirmationReason DownloadTarge
|
||||
@@ -1041,10 +1041,12 @@ DownloadConfirmationReason DownloadTarge
|
||||
return DownloadConfirmationReason::SAVE_AS;
|
||||
|
||||
#if BUILDFLAG(ENABLE_EXTENSIONS)
|
||||
|
||||
@@ -13,7 +13,7 @@
|
||||
#endif // CHROME_BROWSER_UNGOOGLED_FLAG_ENTRIES_H_
|
||||
--- a/content/renderer/render_view_impl.cc
|
||||
+++ b/content/renderer/render_view_impl.cc
|
||||
@@ -86,6 +86,8 @@ WindowOpenDisposition RenderViewImpl::Na
|
||||
@@ -81,6 +81,8 @@ WindowOpenDisposition RenderViewImpl::Na
|
||||
case blink::kWebNavigationPolicyNewWindow:
|
||||
return WindowOpenDisposition::NEW_WINDOW;
|
||||
case blink::kWebNavigationPolicyNewPopup:
|
||||
|
||||
@@ -3,7 +3,7 @@
|
||||
|
||||
--- a/chrome/browser/ui/startup/startup_browser_creator_impl.cc
|
||||
+++ b/chrome/browser/ui/startup/startup_browser_creator_impl.cc
|
||||
@@ -551,7 +551,8 @@ void StartupBrowserCreatorImpl::AddInfoB
|
||||
@@ -553,7 +553,8 @@ void StartupBrowserCreatorImpl::AddInfoB
|
||||
if (command_line_.HasSwitch(switches::kKioskMode))
|
||||
return;
|
||||
|
||||
|
||||
@@ -8,8 +8,8 @@
|
||||
#include "base/metrics/user_metrics.h"
|
||||
#include "base/task/post_task.h"
|
||||
#include "base/task/thread_pool.h"
|
||||
@@ -101,6 +102,18 @@ int GetDropEffect(const ui::DropTargetEv
|
||||
return ui::DragDropTypes::DRAG_MOVE;
|
||||
@@ -105,6 +106,18 @@ DragOperation GetDropEffect(const ui::Dr
|
||||
return DragOperation::kMove;
|
||||
}
|
||||
|
||||
+bool ShouldScrollChangesTab() {
|
||||
@@ -27,7 +27,7 @@
|
||||
} // namespace
|
||||
|
||||
BrowserRootView::DropInfo::DropInfo() = default;
|
||||
@@ -115,7 +128,9 @@ const char BrowserRootView::kViewClassNa
|
||||
@@ -116,7 +129,9 @@ BrowserRootView::DropInfo::~DropInfo() {
|
||||
|
||||
BrowserRootView::BrowserRootView(BrowserView* browser_view,
|
||||
views::Widget* widget)
|
||||
@@ -38,7 +38,7 @@
|
||||
|
||||
BrowserRootView::~BrowserRootView() {
|
||||
// It's possible to destroy the browser while a drop is active. In this case,
|
||||
@@ -265,7 +280,7 @@ bool BrowserRootView::OnMouseWheel(const
|
||||
@@ -263,7 +278,7 @@ bool BrowserRootView::OnMouseWheel(const
|
||||
|
||||
// Scroll-event-changes-tab is incompatible with scrolling tabstrip, so
|
||||
// disable it if the latter feature is enabled.
|
||||
@@ -49,7 +49,7 @@
|
||||
// tabstrip, or the empty space beside the tabstrip.
|
||||
--- a/chrome/browser/ui/views/frame/browser_root_view.h
|
||||
+++ b/chrome/browser/ui/views/frame/browser_root_view.h
|
||||
@@ -129,6 +129,8 @@ class BrowserRootView : public views::in
|
||||
@@ -130,6 +130,8 @@ class BrowserRootView : public views::in
|
||||
int scroll_remainder_x_ = 0;
|
||||
int scroll_remainder_y_ = 0;
|
||||
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
--- a/chrome/browser/ui/views/toolbar/toolbar_view.cc
|
||||
+++ b/chrome/browser/ui/views/toolbar/toolbar_view.cc
|
||||
@@ -241,14 +241,30 @@ void ToolbarView::Init() {
|
||||
@@ -243,14 +243,30 @@ void ToolbarView::Init() {
|
||||
|
||||
std::unique_ptr<ToolbarAccountIconContainerView>
|
||||
toolbar_account_icon_container;
|
||||
|
||||
@@ -13,9 +13,9 @@
|
||||
#endif // CHROME_BROWSER_UNGOOGLED_FLAG_ENTRIES_H_
|
||||
--- a/net/base/features.cc
|
||||
+++ b/net/base/features.cc
|
||||
@@ -199,5 +199,7 @@ constexpr base::Feature kFirstPartySets{
|
||||
const base::FeatureParam<bool> kFirstPartySetsIsDogfooder{
|
||||
&kFirstPartySets, "FirstPartySetsIsDogfooder", false};
|
||||
@@ -205,5 +205,7 @@ const base::Feature kSameSiteCookiesBugf
|
||||
const base::Feature kNoCookieChangeNotificationOnLoad{
|
||||
"NoCookieChangeNotificationOnLoad", base::FEATURE_DISABLED_BY_DEFAULT};
|
||||
|
||||
+const base::Feature kSetIpv6ProbeFalse{"SetIpv6ProbeFalse", base::FEATURE_DISABLED_BY_DEFAULT};
|
||||
+
|
||||
@@ -23,9 +23,9 @@
|
||||
} // namespace net
|
||||
--- a/net/base/features.h
|
||||
+++ b/net/base/features.h
|
||||
@@ -294,6 +294,8 @@ NET_EXPORT extern const base::Feature kF
|
||||
// feature.
|
||||
NET_EXPORT extern const base::FeatureParam<bool> kFirstPartySetsIsDogfooder;
|
||||
@@ -308,6 +308,8 @@ NET_EXPORT extern const base::Feature kS
|
||||
// notifications are still dispatched as usual.
|
||||
NET_EXPORT extern const base::Feature kNoCookieChangeNotificationOnLoad;
|
||||
|
||||
+NET_EXPORT extern const base::Feature kSetIpv6ProbeFalse;
|
||||
+
|
||||
@@ -46,7 +46,7 @@
|
||||
enum DnsResolveStatus {
|
||||
RESOLVE_STATUS_DNS_SUCCESS = 0,
|
||||
RESOLVE_STATUS_PROC_SUCCESS,
|
||||
@@ -3370,7 +3365,7 @@ bool HostResolverManager::IsIPv6Reachabl
|
||||
@@ -3327,7 +3322,7 @@ bool HostResolverManager::IsIPv6Reachabl
|
||||
(tick_clock_->NowTicks() - last_ipv6_probe_time_).InMilliseconds() >
|
||||
kIPv6ProbePeriodMs) {
|
||||
SetLastIPv6ProbeResult(
|
||||
|
||||
@@ -417,7 +417,7 @@
|
||||
|
||||
--- a/components/search_engines/template_url_service.cc
|
||||
+++ b/components/search_engines/template_url_service.cc
|
||||
@@ -640,7 +640,8 @@ void TemplateURLService::IncrementUsageC
|
||||
@@ -643,7 +643,8 @@ void TemplateURLService::IncrementUsageC
|
||||
void TemplateURLService::ResetTemplateURL(TemplateURL* url,
|
||||
const base::string16& title,
|
||||
const base::string16& keyword,
|
||||
@@ -427,7 +427,7 @@
|
||||
DCHECK(!IsCreatedByExtension(url));
|
||||
DCHECK(!keyword.empty());
|
||||
DCHECK(!search_url.empty());
|
||||
@@ -654,6 +655,7 @@ void TemplateURLService::ResetTemplateUR
|
||||
@@ -657,6 +658,7 @@ void TemplateURLService::ResetTemplateUR
|
||||
}
|
||||
data.safe_for_autoreplace = false;
|
||||
data.last_modified = clock_->Now();
|
||||
@@ -437,7 +437,7 @@
|
||||
|
||||
--- a/components/search_engines/template_url_service.h
|
||||
+++ b/components/search_engines/template_url_service.h
|
||||
@@ -251,7 +251,8 @@ class TemplateURLService : public WebDat
|
||||
@@ -252,7 +252,8 @@ class TemplateURLService : public WebDat
|
||||
void ResetTemplateURL(TemplateURL* url,
|
||||
const base::string16& title,
|
||||
const base::string16& keyword,
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
--- a/chrome/browser/about_flags.cc
|
||||
+++ b/chrome/browser/about_flags.cc
|
||||
@@ -2570,7 +2570,13 @@ const FeatureEntry::FeatureVariation kPa
|
||||
@@ -2601,7 +2601,13 @@ constexpr char kWallpaperWebUIInternalNa
|
||||
// calculate and verify checksum.
|
||||
//
|
||||
// When adding a new choice, add it to the end of the list.
|
||||
|
||||
@@ -10,7 +10,7 @@
|
||||
#include "crypto/secure_hash.h"
|
||||
|
||||
#if defined(OS_WIN)
|
||||
@@ -533,130 +532,12 @@ DownloadInterruptReason BaseFile::Publis
|
||||
@@ -533,133 +532,12 @@ DownloadInterruptReason BaseFile::Publis
|
||||
}
|
||||
#endif // defined(OS_ANDROID)
|
||||
|
||||
@@ -75,6 +75,9 @@
|
||||
- // ftp:// has an authority.
|
||||
- if (source_url.SchemeIs(url::kFtpScheme))
|
||||
- return source_url;
|
||||
-
|
||||
- if (source_url.SchemeIs(url::kBlobScheme))
|
||||
- return url::Origin::Create(source_url).GetURL();
|
||||
- }
|
||||
-
|
||||
- if (referrer_url.is_valid() && referrer_url.SchemeIsHTTPOrHTTPS())
|
||||
@@ -141,7 +144,7 @@
|
||||
|
||||
void BaseFile::AnnotateWithSourceInformation(
|
||||
const std::string& client_guid,
|
||||
@@ -664,30 +545,8 @@ void BaseFile::AnnotateWithSourceInforma
|
||||
@@ -667,30 +545,8 @@ void BaseFile::AnnotateWithSourceInforma
|
||||
const GURL& referrer_url,
|
||||
mojo::PendingRemote<quarantine::mojom::Quarantine> remote_quarantine,
|
||||
OnAnnotationDoneCallback on_annotation_done_callback) {
|
||||
|
||||
@@ -3,7 +3,7 @@
|
||||
|
||||
--- a/third_party/blink/renderer/modules/webgl/webgl_rendering_context_base.cc
|
||||
+++ b/third_party/blink/renderer/modules/webgl/webgl_rendering_context_base.cc
|
||||
@@ -3691,8 +3691,7 @@ ScriptValue WebGLRenderingContextBase::g
|
||||
@@ -3552,8 +3552,7 @@ ScriptValue WebGLRenderingContextBase::g
|
||||
pname, IdentifiabilityBenignStringToken(
|
||||
String(ContextGL()->GetString(GL_RENDERER))));
|
||||
}
|
||||
@@ -13,7 +13,7 @@
|
||||
}
|
||||
SynthesizeGLError(
|
||||
GL_INVALID_ENUM, "getParameter",
|
||||
@@ -3706,8 +3705,7 @@ ScriptValue WebGLRenderingContextBase::g
|
||||
@@ -3567,8 +3566,7 @@ ScriptValue WebGLRenderingContextBase::g
|
||||
pname, IdentifiabilityBenignStringToken(
|
||||
String(ContextGL()->GetString(GL_VENDOR))));
|
||||
}
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
|
||||
--- a/third_party/blink/common/features.cc
|
||||
+++ b/third_party/blink/common/features.cc
|
||||
@@ -322,7 +322,7 @@ const base::Feature kFontAccessChooser{"
|
||||
@@ -334,7 +334,7 @@ const base::Feature kComputePressure{"Co
|
||||
// Prefetch request properties are updated to be privacy-preserving. See
|
||||
// crbug.com/988956.
|
||||
const base::Feature kPrefetchPrivacyChanges{"PrefetchPrivacyChanges",
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
|
||||
--- a/chrome/browser/ui/browser_commands.cc
|
||||
+++ b/chrome/browser/ui/browser_commands.cc
|
||||
@@ -407,11 +407,6 @@ int GetContentRestrictions(const Browser
|
||||
@@ -411,11 +411,6 @@ int GetContentRestrictions(const Browser
|
||||
CoreTabHelper* core_tab_helper =
|
||||
CoreTabHelper::FromWebContents(current_tab);
|
||||
content_restrictions = core_tab_helper->content_restrictions();
|
||||
@@ -14,7 +14,7 @@
|
||||
}
|
||||
return content_restrictions;
|
||||
}
|
||||
@@ -1202,8 +1197,7 @@ bool CanSavePage(const Browser* browser)
|
||||
@@ -1249,8 +1244,7 @@ bool CanSavePage(const Browser* browser)
|
||||
prefs::kAllowFileSelectionDialogs)) {
|
||||
return false;
|
||||
}
|
||||
|
||||
@@ -13,7 +13,7 @@
|
||||
AddChildView(std::make_unique<views::InkDropContainerView>());
|
||||
--- a/chrome/browser/ui/views/tabs/tab_strip.cc
|
||||
+++ b/chrome/browser/ui/views/tabs/tab_strip.cc
|
||||
@@ -2605,8 +2605,6 @@ void TabStrip::NewTabButtonPressed(const
|
||||
@@ -2660,8 +2660,6 @@ void TabStrip::NewTabButtonPressed(const
|
||||
|
||||
const ui::MouseEvent& mouse = static_cast<const ui::MouseEvent&>(event);
|
||||
if (mouse.IsOnlyMiddleMouseButton()) {
|
||||
@@ -22,7 +22,7 @@
|
||||
ui::Clipboard* clipboard = ui::Clipboard::GetForCurrentThread();
|
||||
CHECK(clipboard);
|
||||
base::string16 clipboard_text;
|
||||
@@ -2614,7 +2612,6 @@ void TabStrip::NewTabButtonPressed(const
|
||||
@@ -2669,7 +2667,6 @@ void TabStrip::NewTabButtonPressed(const
|
||||
/* data_dst = */ nullptr, &clipboard_text);
|
||||
if (!clipboard_text.empty())
|
||||
controller_->CreateNewTabWithLocation(clipboard_text);
|
||||
|
||||
@@ -67,20 +67,6 @@
|
||||
<template is="dom-if" if="[[showPage_(pageVisibility.privacy)]]"
|
||||
restamp>
|
||||
<settings-section page-title="$i18n{privacyPageTitle}"
|
||||
--- a/chrome/browser/resources/settings/languages_page/languages_page.html
|
||||
+++ b/chrome/browser/resources/settings/languages_page/languages_page.html
|
||||
@@ -219,11 +219,6 @@
|
||||
</a>
|
||||
</div>
|
||||
</div>
|
||||
- <settings-toggle-button id="offerTranslateOtherLanguages"
|
||||
- pref="{{prefs.translate.enabled}}"
|
||||
- label="$i18n{offerToEnableTranslate}"
|
||||
- on-settings-boolean-control-change="onTranslateToggleChange_">
|
||||
- </settings-toggle-button>
|
||||
</iron-collapse>
|
||||
<settings-toggle-button
|
||||
id="enableSpellcheckingToggle"
|
||||
--- a/chrome/browser/resources/settings/privacy_page/personalization_options.html
|
||||
+++ b/chrome/browser/resources/settings/privacy_page/personalization_options.html
|
||||
@@ -35,7 +35,7 @@
|
||||
@@ -135,7 +121,7 @@
|
||||
<iron-icon icon="cr:security"></iron-icon>
|
||||
--- a/chrome/browser/ui/views/profiles/profile_menu_view.cc
|
||||
+++ b/chrome/browser/ui/views/profiles/profile_menu_view.cc
|
||||
@@ -217,6 +217,7 @@ void ProfileMenuView::BuildMenu() {
|
||||
@@ -220,6 +220,7 @@ void ProfileMenuView::BuildMenu() {
|
||||
}
|
||||
|
||||
gfx::ImageSkia ProfileMenuView::GetSyncIcon() const {
|
||||
@@ -143,7 +129,7 @@
|
||||
Profile* profile = browser()->profile();
|
||||
|
||||
if (!profile->IsRegularProfile())
|
||||
@@ -514,8 +515,7 @@ void ProfileMenuView::BuildIdentity() {
|
||||
@@ -517,8 +518,7 @@ void ProfileMenuView::BuildIdentity() {
|
||||
menu_title_, menu_subtitle_);
|
||||
} else {
|
||||
menu_title_ = base::string16();
|
||||
@@ -153,7 +139,7 @@
|
||||
SetProfileIdentityInfo(
|
||||
profile_name, background_color, edit_button_params,
|
||||
ui::ImageModel::FromImage(
|
||||
@@ -586,6 +586,7 @@ void ProfileMenuView::BuildSyncInfo() {
|
||||
@@ -589,6 +589,7 @@ void ProfileMenuView::BuildSyncInfo() {
|
||||
return;
|
||||
}
|
||||
|
||||
|
||||
@@ -33,7 +33,6 @@ core/ungoogled-chromium/fix-building-without-safebrowsing.patch
|
||||
core/ungoogled-chromium/remove-unused-preferences-fields.patch
|
||||
core/ungoogled-chromium/fix-building-without-enabling-reporting.patch
|
||||
core/ungoogled-chromium/block-requests.patch
|
||||
core/ungoogled-chromium/remove-enable-dse-memoryssa-cflag.patch
|
||||
core/bromite/disable-fetching-field-trials.patch
|
||||
|
||||
extra/inox-patchset/0006-modify-default-prefs.patch
|
||||
|
||||
250
pruning.list
250
pruning.list
@@ -75,7 +75,7 @@ chrome/browser/resources/default_apps/youtube.crx
|
||||
chrome/browser/resources/media/mei_preload/preloaded_data.pb
|
||||
chrome/browser/ui/app_list/search/search_result_ranker/20190722_example_preprocessor_config.pb
|
||||
chrome/browser/ui/app_list/search/search_result_ranker/search_ranker_assets/20190923_example_preprocessor_config.pb
|
||||
chrome/build/pgo_profiles/chrome-linux-4389-1615484746-845f8166c73d01aac66fc676e3122d92508416a9.profdata
|
||||
chrome/build/pgo_profiles/chrome-linux-4430-1618246478-03950c14a967f79c90156be9dea8a8a0fc8d8ba9.profdata
|
||||
chrome/chrome_cleaner/parsers/shortcut_parser/target/data/lnk_parser_fuzzer/Network Share Test.lnk
|
||||
chrome/chrome_cleaner/parsers/shortcut_parser/target/data/lnk_parser_fuzzer/New folder - Shortcut.lnk
|
||||
chrome/chrome_cleaner/parsers/shortcut_parser/target/data/lnk_parser_fuzzer/long_name.lnk
|
||||
@@ -197,11 +197,13 @@ components/test/data/history/HistoryNoDuration
|
||||
components/test/data/history/HistoryNoSource
|
||||
components/test/data/history/History_with_starred
|
||||
components/test/data/omnibox/on_device_head_test_model_index.bin
|
||||
components/test/data/optimization_guide/simple_test.tflite
|
||||
components/test/data/paint_preview/PaintPreviewTestService/wikipedia/150869817BD7A616833436F122EF294C.skp
|
||||
components/test/data/paint_preview/PaintPreviewTestService/wikipedia/ABE3BC9BB03E9107A321304E21C0A644.skp
|
||||
components/test/data/paint_preview/PaintPreviewTestService/wikipedia/proto.pb
|
||||
components/test/data/printing/unsorted_custompapers.plist
|
||||
components/test/data/sessions/last_session
|
||||
components/test/data/translate/valid_model.tflite
|
||||
components/test/data/unzip_service/good_archive.zip
|
||||
components/test/data/update_client/ChromeRecovery.crx3
|
||||
components/test/data/update_client/binary_bsdiff_patch.bin
|
||||
@@ -4741,8 +4743,6 @@ third_party/afl/src/testcases/images/jxr/not_kitty.jxr
|
||||
third_party/afl/src/testcases/images/tiff/not_kitty.tiff
|
||||
third_party/afl/src/testcases/multimedia/h264/small_movie.mp4
|
||||
third_party/afl/src/testcases/others/pcap/small_capture.pcap
|
||||
third_party/android_deps/local_modifications/androidx_fragment_fragment/androidx_fragment_fragment_java.jar
|
||||
third_party/android_deps/local_modifications/androidx_preference_preference/androidx_preference_preference_java.jar
|
||||
third_party/angle/samples/multi_texture/basemap.tga
|
||||
third_party/angle/samples/multi_texture/lightmap.tga
|
||||
third_party/angle/samples/particle_system/smoke.tga
|
||||
@@ -9547,6 +9547,7 @@ third_party/boringssl/src/util/fipstools/acvp/acvptool/test/expected/ACVP-AES-EC
|
||||
third_party/boringssl/src/util/fipstools/acvp/acvptool/test/expected/ACVP-AES-GCM.bz2
|
||||
third_party/boringssl/src/util/fipstools/acvp/acvptool/test/expected/ACVP-AES-KW.bz2
|
||||
third_party/boringssl/src/util/fipstools/acvp/acvptool/test/expected/ACVP-AES-KWP.bz2
|
||||
third_party/boringssl/src/util/fipstools/acvp/acvptool/test/expected/ACVP-AES-XTS.bz2
|
||||
third_party/boringssl/src/util/fipstools/acvp/acvptool/test/expected/ACVP-TDES-CBC.bz2
|
||||
third_party/boringssl/src/util/fipstools/acvp/acvptool/test/expected/ACVP-TDES-ECB.bz2
|
||||
third_party/boringssl/src/util/fipstools/acvp/acvptool/test/expected/CMAC-AES.bz2
|
||||
@@ -9571,6 +9572,7 @@ third_party/boringssl/src/util/fipstools/acvp/acvptool/test/vectors/ACVP-AES-ECB
|
||||
third_party/boringssl/src/util/fipstools/acvp/acvptool/test/vectors/ACVP-AES-GCM.bz2
|
||||
third_party/boringssl/src/util/fipstools/acvp/acvptool/test/vectors/ACVP-AES-KW.bz2
|
||||
third_party/boringssl/src/util/fipstools/acvp/acvptool/test/vectors/ACVP-AES-KWP.bz2
|
||||
third_party/boringssl/src/util/fipstools/acvp/acvptool/test/vectors/ACVP-AES-XTS.bz2
|
||||
third_party/boringssl/src/util/fipstools/acvp/acvptool/test/vectors/ACVP-TDES-CBC.bz2
|
||||
third_party/boringssl/src/util/fipstools/acvp/acvptool/test/vectors/ACVP-TDES-ECB.bz2
|
||||
third_party/boringssl/src/util/fipstools/acvp/acvptool/test/vectors/CMAC-AES.bz2
|
||||
@@ -9581,7 +9583,7 @@ third_party/boringssl/src/util/fipstools/acvp/acvptool/test/vectors/HMAC-SHA2-25
|
||||
third_party/boringssl/src/util/fipstools/acvp/acvptool/test/vectors/HMAC-SHA2-384.bz2
|
||||
third_party/boringssl/src/util/fipstools/acvp/acvptool/test/vectors/HMAC-SHA2-512.bz2
|
||||
third_party/boringssl/src/util/fipstools/acvp/acvptool/test/vectors/KAS-ECC-SSC.bz2
|
||||
third_party/boringssl/src/util/fipstools/acvp/acvptool/test/vectors/KAS-FFC.bz2
|
||||
third_party/boringssl/src/util/fipstools/acvp/acvptool/test/vectors/KAS-FFC-SSC.bz2
|
||||
third_party/boringssl/src/util/fipstools/acvp/acvptool/test/vectors/KDF.bz2
|
||||
third_party/boringssl/src/util/fipstools/acvp/acvptool/test/vectors/RSA.bz2
|
||||
third_party/boringssl/src/util/fipstools/acvp/acvptool/test/vectors/SHA-1.bz2
|
||||
@@ -12796,6 +12798,7 @@ third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-shape-fuzzer-5769590820044800
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-shape-fuzzer-6306977171374080
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-4880059756969984
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-4901143794810880
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5067936541179904
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5077547978588160
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5121706490593280
|
||||
@@ -12806,6 +12809,7 @@ third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5169035432165376
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5181909018345472
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5206191479455744
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5345734743031808
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5359635656605696
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5521982557782016
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5542653037903872
|
||||
@@ -12867,7 +12871,6 @@ third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5735719311507456
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5738978499624960
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5739000398086144
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5741295280848896
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5741735372914688
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5743250149736448
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-5745268385906688
|
||||
@@ -12897,6 +12900,7 @@ third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6246465148813312
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6276691949518848
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6316256152780800
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6372147008241664
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6543700493598720
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-fuzzer-6651660668502016
|
||||
third_party/harfbuzz-ng/src/test/fuzzing/fonts/clusterfuzz-testcase-minimized-hb-subset-get-codepoints-fuzzer-5203067375976448
|
||||
@@ -13441,6 +13445,26 @@ third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos4/gpos4_multipl
|
||||
third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos4/gpos4_multiple_anchors_1.keep-layout.41,43.otf
|
||||
third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos4/gpos4_multiple_anchors_1.keep-layout.41.otf
|
||||
third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos4/gpos4_multiple_anchors_1.keep-layout.retain-all-codepoint.otf
|
||||
third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos5/gpos5_font1.keep-layout-retain-gids.41,42,43,44.otf
|
||||
third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos5/gpos5_font1.keep-layout-retain-gids.41,42,43,45.otf
|
||||
third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos5/gpos5_font1.keep-layout-retain-gids.41,42,43.otf
|
||||
third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos5/gpos5_font1.keep-layout-retain-gids.41,42,44.otf
|
||||
third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos5/gpos5_font1.keep-layout-retain-gids.41,42,45.otf
|
||||
third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos5/gpos5_font1.keep-layout-retain-gids.41,42.otf
|
||||
third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos5/gpos5_font1.keep-layout-retain-gids.41,43.otf
|
||||
third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos5/gpos5_font1.keep-layout-retain-gids.41.otf
|
||||
third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos5/gpos5_font1.keep-layout-retain-gids.42.otf
|
||||
third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos5/gpos5_font1.keep-layout-retain-gids.retain-all-codepoint.otf
|
||||
third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos5/gpos5_font1.keep-layout.41,42,43,44.otf
|
||||
third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos5/gpos5_font1.keep-layout.41,42,43,45.otf
|
||||
third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos5/gpos5_font1.keep-layout.41,42,43.otf
|
||||
third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos5/gpos5_font1.keep-layout.41,42,44.otf
|
||||
third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos5/gpos5_font1.keep-layout.41,42,45.otf
|
||||
third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos5/gpos5_font1.keep-layout.41,42.otf
|
||||
third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos5/gpos5_font1.keep-layout.41,43.otf
|
||||
third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos5/gpos5_font1.keep-layout.41.otf
|
||||
third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos5/gpos5_font1.keep-layout.42.otf
|
||||
third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos5/gpos5_font1.keep-layout.retain-all-codepoint.otf
|
||||
third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos6/gpos6_font1.keep-layout-retain-gids.41,42,43,44.otf
|
||||
third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos6/gpos6_font1.keep-layout-retain-gids.41,42,43,45.otf
|
||||
third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos6/gpos6_font1.keep-layout-retain-gids.41,42,43.otf
|
||||
@@ -13479,6 +13503,12 @@ third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos8/gpos_chaining
|
||||
third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos8/gpos_chaining3_simple_f1.keep-layout.30,31,32,33.otf
|
||||
third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos8/gpos_chaining3_simple_f1.keep-layout.41,42,43.otf
|
||||
third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos8/gpos_chaining3_simple_f1.keep-layout.retain-all-codepoint.otf
|
||||
third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos9/gpos9_font2.keep-layout-retain-gids.41,42.otf
|
||||
third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos9/gpos9_font2.keep-layout-retain-gids.41.otf
|
||||
third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos9/gpos9_font2.keep-layout-retain-gids.42.otf
|
||||
third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos9/gpos9_font2.keep-layout.41,42.otf
|
||||
third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos9/gpos9_font2.keep-layout.41.otf
|
||||
third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gpos9/gpos9_font2.keep-layout.42.otf
|
||||
third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gsub3/gsub_alternate_substitution.keep-layout-retain-gids.53A9,53F1.otf
|
||||
third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gsub3/gsub_alternate_substitution.keep-layout-retain-gids.53A9.otf
|
||||
third_party/harfbuzz-ng/src/test/subset/data/expected/layout.gsub3/gsub_alternate_substitution.keep-layout-retain-gids.53F1.otf
|
||||
@@ -13515,7 +13545,9 @@ third_party/harfbuzz-ng/src/test/subset/data/fonts/gpos2_1_font7.otf
|
||||
third_party/harfbuzz-ng/src/test/subset/data/fonts/gpos2_2_font5.otf
|
||||
third_party/harfbuzz-ng/src/test/subset/data/fonts/gpos3_font3.otf
|
||||
third_party/harfbuzz-ng/src/test/subset/data/fonts/gpos4_multiple_anchors_1.otf
|
||||
third_party/harfbuzz-ng/src/test/subset/data/fonts/gpos5_font1.otf
|
||||
third_party/harfbuzz-ng/src/test/subset/data/fonts/gpos6_font1.otf
|
||||
third_party/harfbuzz-ng/src/test/subset/data/fonts/gpos9_font2.otf
|
||||
third_party/harfbuzz-ng/src/test/subset/data/fonts/gpos_chaining1_multiple_subrules_f1.otf
|
||||
third_party/harfbuzz-ng/src/test/subset/data/fonts/gpos_chaining2_multiple_subrules_f1.otf
|
||||
third_party/harfbuzz-ng/src/test/subset/data/fonts/gpos_chaining3_simple_f1.otf
|
||||
@@ -15629,6 +15661,126 @@ third_party/libxml/fuzz/seed_corpus/da0113f5e076c5cc48013f0bb94a647225494fdb
|
||||
third_party/libxml/fuzz/seed_corpus/eb36d039e3d4684168e891f622ac594cc3fbaf42
|
||||
third_party/libxml/fuzz/seed_corpus/fbcdd7a1e0f5b2e115172130a7c514ac9a6dd62d
|
||||
third_party/libxml/fuzz/seed_corpus/fbd91b3106732ac8dbbb4e004059863e5f52c13c
|
||||
third_party/libxml/src/fuzz/seed/uri/full
|
||||
third_party/libzip/src/regress/bigstored.zh
|
||||
third_party/libzip/src/regress/bigzero-zip.zip
|
||||
third_party/libzip/src/regress/broken.zip
|
||||
third_party/libzip/src/regress/cm-default.zip
|
||||
third_party/libzip/src/regress/encrypt-aes128-noentropy.zip
|
||||
third_party/libzip/src/regress/encrypt-aes128.zip
|
||||
third_party/libzip/src/regress/encrypt-aes192-noentropy.zip
|
||||
third_party/libzip/src/regress/encrypt-aes192.zip
|
||||
third_party/libzip/src/regress/encrypt-aes256-noentropy.zip
|
||||
third_party/libzip/src/regress/encrypt-aes256.zip
|
||||
third_party/libzip/src/regress/encrypt-none.zip
|
||||
third_party/libzip/src/regress/encrypt-pkware-noentropy.zip
|
||||
third_party/libzip/src/regress/encrypt.zip
|
||||
third_party/libzip/src/regress/encrypt_plus_extra.zip
|
||||
third_party/libzip/src/regress/encrypt_plus_extra_modified_c.zip
|
||||
third_party/libzip/src/regress/encrypt_plus_extra_modified_l.zip
|
||||
third_party/libzip/src/regress/extra_field_align_1-0.zip
|
||||
third_party/libzip/src/regress/extra_field_align_1-ef_00.zip
|
||||
third_party/libzip/src/regress/extra_field_align_1-ef_ff.zip
|
||||
third_party/libzip/src/regress/extra_field_align_1-ff.zip
|
||||
third_party/libzip/src/regress/extra_field_align_2-0.zip
|
||||
third_party/libzip/src/regress/extra_field_align_2-ef_00.zip
|
||||
third_party/libzip/src/regress/extra_field_align_2-ef_ff.zip
|
||||
third_party/libzip/src/regress/extra_field_align_2-ff.zip
|
||||
third_party/libzip/src/regress/extra_field_align_3-0.zip
|
||||
third_party/libzip/src/regress/extra_field_align_3-ef_00.zip
|
||||
third_party/libzip/src/regress/extra_field_align_3-ef_ff.zip
|
||||
third_party/libzip/src/regress/extra_field_align_3-ff.zip
|
||||
third_party/libzip/src/regress/extra_field_align_4-ff.zip
|
||||
third_party/libzip/src/regress/filename_duplicate.zip
|
||||
third_party/libzip/src/regress/filename_duplicate_empty.zip
|
||||
third_party/libzip/src/regress/filename_empty.zip
|
||||
third_party/libzip/src/regress/fileorder.zip
|
||||
third_party/libzip/src/regress/firstsecond-split-deflated.zip
|
||||
third_party/libzip/src/regress/firstsecond-split-stored.zip
|
||||
third_party/libzip/src/regress/firstsecond.zip
|
||||
third_party/libzip/src/regress/foo-stored.zip
|
||||
third_party/libzip/src/regress/gap-add.zip
|
||||
third_party/libzip/src/regress/gap-delete.zip
|
||||
third_party/libzip/src/regress/gap-replace.zip
|
||||
third_party/libzip/src/regress/gap.zip
|
||||
third_party/libzip/src/regress/incons-archive-comment-longer.zip
|
||||
third_party/libzip/src/regress/incons-archive-comment-shorter.zip
|
||||
third_party/libzip/src/regress/incons-cdoffset.zip
|
||||
third_party/libzip/src/regress/incons-central-compression-method.zip
|
||||
third_party/libzip/src/regress/incons-central-compsize-larger-toolarge.zip
|
||||
third_party/libzip/src/regress/incons-central-compsize-larger.zip
|
||||
third_party/libzip/src/regress/incons-central-compsize-smaller.zip
|
||||
third_party/libzip/src/regress/incons-central-crc.zip
|
||||
third_party/libzip/src/regress/incons-central-date.zip
|
||||
third_party/libzip/src/regress/incons-central-file-comment-longer.zip
|
||||
third_party/libzip/src/regress/incons-central-file-comment-shorter.zip
|
||||
third_party/libzip/src/regress/incons-central-magic-bad.zip
|
||||
third_party/libzip/src/regress/incons-central-magic-bad2.zip
|
||||
third_party/libzip/src/regress/incons-central-size-larger.zip
|
||||
third_party/libzip/src/regress/incons-data.zip
|
||||
third_party/libzip/src/regress/incons-ef-central-size-wrong.zip
|
||||
third_party/libzip/src/regress/incons-ef-local-id-size.zip
|
||||
third_party/libzip/src/regress/incons-ef-local-id.zip
|
||||
third_party/libzip/src/regress/incons-ef-local-size.zip
|
||||
third_party/libzip/src/regress/incons-eocd-magic-bad.zip
|
||||
third_party/libzip/src/regress/incons-file-count-high.zip
|
||||
third_party/libzip/src/regress/incons-file-count-low.zip
|
||||
third_party/libzip/src/regress/incons-file-count-overflow.zip
|
||||
third_party/libzip/src/regress/incons-local-compression-method.zip
|
||||
third_party/libzip/src/regress/incons-local-compsize-larger.zip
|
||||
third_party/libzip/src/regress/incons-local-compsize-smaller.zip
|
||||
third_party/libzip/src/regress/incons-local-crc.zip
|
||||
third_party/libzip/src/regress/incons-local-filename-long.zip
|
||||
third_party/libzip/src/regress/incons-local-filename-missing.zip
|
||||
third_party/libzip/src/regress/incons-local-filename-short.zip
|
||||
third_party/libzip/src/regress/incons-local-filename.zip
|
||||
third_party/libzip/src/regress/incons-local-magic-bad.zip
|
||||
third_party/libzip/src/regress/incons-local-size-larger.zip
|
||||
third_party/libzip/src/regress/junk-at-end.zip
|
||||
third_party/libzip/src/regress/junk-at-start.zip
|
||||
third_party/libzip/src/regress/large-uncompressable
|
||||
third_party/libzip/src/regress/manyfiles-zip.zip
|
||||
third_party/libzip/src/regress/multidisk.zip
|
||||
third_party/libzip/src/regress/rename_ok.zip
|
||||
third_party/libzip/src/regress/stat_index_cp437_raw.test
|
||||
third_party/libzip/src/regress/streamed-zip64.zip
|
||||
third_party/libzip/src/regress/streamed.zip
|
||||
third_party/libzip/src/regress/test-cp437-comment-utf-8.zip
|
||||
third_party/libzip/src/regress/test-cp437-fc-utf-8-filename.zip
|
||||
third_party/libzip/src/regress/test-cp437-fc.zip
|
||||
third_party/libzip/src/regress/test-cp437.zip
|
||||
third_party/libzip/src/regress/test-utf8-unmarked.zip
|
||||
third_party/libzip/src/regress/test-utf8.zip
|
||||
third_party/libzip/src/regress/test.zip
|
||||
third_party/libzip/src/regress/test2.zip
|
||||
third_party/libzip/src/regress/testbuffer.zip
|
||||
third_party/libzip/src/regress/testbzip2.zip
|
||||
third_party/libzip/src/regress/testchanged.zip
|
||||
third_party/libzip/src/regress/testchangedlocal.zip
|
||||
third_party/libzip/src/regress/testcomment.zip
|
||||
third_party/libzip/src/regress/testcomment13.zip
|
||||
third_party/libzip/src/regress/testcommentremoved.zip
|
||||
third_party/libzip/src/regress/testdeflated.zip
|
||||
third_party/libzip/src/regress/testdeflated2.zip
|
||||
third_party/libzip/src/regress/testdir.zip
|
||||
third_party/libzip/src/regress/testempty.zip
|
||||
third_party/libzip/src/regress/testextrabytes.zip
|
||||
third_party/libzip/src/regress/testfile-UTF8.zip
|
||||
third_party/libzip/src/regress/testfile-cp437.zip
|
||||
third_party/libzip/src/regress/testfile-lzma.zip
|
||||
third_party/libzip/src/regress/testfile-plus-extra.zip
|
||||
third_party/libzip/src/regress/testfile-stored-dos.zip
|
||||
third_party/libzip/src/regress/testfile-xz.zip
|
||||
third_party/libzip/src/regress/testfile.zip
|
||||
third_party/libzip/src/regress/testfile0.zip
|
||||
third_party/libzip/src/regress/testfile2014.zip
|
||||
third_party/libzip/src/regress/teststdin.zip
|
||||
third_party/libzip/src/regress/teststored.zip
|
||||
third_party/libzip/src/regress/utf-8-standardization-input.zip
|
||||
third_party/libzip/src/regress/utf-8-standardization-output.zip
|
||||
third_party/libzip/src/regress/zip-in-archive-comment.zip
|
||||
third_party/libzip/src/regress/zip64-3mf.zip
|
||||
third_party/libzip/src/regress/zip64.zip
|
||||
third_party/llvm/clang-tools-extra/clangd/test/index-serialization/Inputs/sample.idx
|
||||
third_party/llvm/clang/test/CodeGen/Inputs/thinlto-distributed-backend-skip.bc
|
||||
third_party/llvm/clang/test/Driver/at_file.c.args.utf16le
|
||||
@@ -16030,6 +16182,8 @@ third_party/llvm/llvm/test/Object/Inputs/GNU.a
|
||||
third_party/llvm/llvm/test/Object/Inputs/IsNAN.o
|
||||
third_party/llvm/llvm/test/Object/Inputs/MacOSX.a
|
||||
third_party/llvm/llvm/test/Object/Inputs/SVR4.a
|
||||
third_party/llvm/llvm/test/Object/Inputs/WASM/bad-reloc-type.wasm
|
||||
third_party/llvm/llvm/test/Object/Inputs/WASM/bad-symbol-type.wasm
|
||||
third_party/llvm/llvm/test/Object/Inputs/WASM/invalid-section-order.wasm
|
||||
third_party/llvm/llvm/test/Object/Inputs/WASM/missing-version.wasm
|
||||
third_party/llvm/llvm/test/Object/Inputs/WASM/string-outside-section.wasm
|
||||
@@ -16278,6 +16432,8 @@ third_party/llvm/llvm/test/Other/Inputs/no-block-info.bc
|
||||
third_party/llvm/llvm/test/ThinLTO/X86/Inputs/autoupgrade.bc
|
||||
third_party/llvm/llvm/test/ThinLTO/X86/Inputs/drop-debug-info.bc
|
||||
third_party/llvm/llvm/test/Transforms/GlobalOpt/2007-04-05-Crash.ll
|
||||
third_party/llvm/llvm/test/Transforms/SampleProfile/Inputs/bad.extbinary.afdo
|
||||
third_party/llvm/llvm/test/Transforms/SampleProfile/Inputs/ctxsplit.extbinary.afdo
|
||||
third_party/llvm/llvm/test/Transforms/SampleProfile/Inputs/fnptr.binprof
|
||||
third_party/llvm/llvm/test/Transforms/SampleProfile/Inputs/function_metadata.compact.afdo
|
||||
third_party/llvm/llvm/test/Transforms/SampleProfile/Inputs/gcc-simple.afdo
|
||||
@@ -16371,6 +16527,10 @@ third_party/llvm/llvm/test/tools/dsymutil/Inputs/private/tmp/call_return_pc/call
|
||||
third_party/llvm/llvm/test/tools/dsymutil/Inputs/private/tmp/common/common.x86_64
|
||||
third_party/llvm/llvm/test/tools/dsymutil/Inputs/private/tmp/common/common1.o
|
||||
third_party/llvm/llvm/test/tools/dsymutil/Inputs/private/tmp/common/common2.o
|
||||
third_party/llvm/llvm/test/tools/dsymutil/Inputs/private/tmp/dwarf5/dwarf5.o
|
||||
third_party/llvm/llvm/test/tools/dsymutil/Inputs/private/tmp/dwarf5/dwarf5.out
|
||||
third_party/llvm/llvm/test/tools/dsymutil/Inputs/private/tmp/eh_frame/eh_frame.o
|
||||
third_party/llvm/llvm/test/tools/dsymutil/Inputs/private/tmp/eh_frame/eh_frame.out
|
||||
third_party/llvm/llvm/test/tools/dsymutil/Inputs/private/tmp/extern/extern.o
|
||||
third_party/llvm/llvm/test/tools/dsymutil/Inputs/private/tmp/extern/extern.out
|
||||
third_party/llvm/llvm/test/tools/dsymutil/Inputs/private/tmp/extern/main.o
|
||||
@@ -16727,6 +16887,7 @@ third_party/llvm/llvm/test/tools/llvm-objdump/MachO/Inputs/stub-nosyms.macho-x86
|
||||
third_party/llvm/llvm/test/tools/llvm-objdump/MachO/Inputs/stubbed.dylib.macho-x86_64
|
||||
third_party/llvm/llvm/test/tools/llvm-objdump/MachO/Inputs/thread.macho-i386
|
||||
third_party/llvm/llvm/test/tools/llvm-objdump/MachO/Inputs/truncated-section.dylib.macho-x86_64
|
||||
third_party/llvm/llvm/test/tools/llvm-objdump/MachO/Inputs/unwind-info-excess.macho-x86_64
|
||||
third_party/llvm/llvm/test/tools/llvm-objdump/MachO/Inputs/unwind-info-no-relocs.macho-x86_64
|
||||
third_party/llvm/llvm/test/tools/llvm-objdump/MachO/Inputs/unwind-info.macho-arm64
|
||||
third_party/llvm/llvm/test/tools/llvm-objdump/MachO/Inputs/unwind-info.macho-x86_64
|
||||
@@ -16774,7 +16935,11 @@ third_party/llvm/llvm/test/tools/llvm-profdata/Inputs/gcc-sample-profile.gcov
|
||||
third_party/llvm/llvm/test/tools/llvm-profdata/Inputs/weight-instr-bar.profdata
|
||||
third_party/llvm/llvm/test/tools/llvm-profdata/Inputs/weight-instr-foo.profdata
|
||||
third_party/llvm/llvm/test/tools/llvm-profgen/Inputs/inline-cs-noprobe.perfbin
|
||||
third_party/llvm/llvm/test/tools/llvm-profgen/Inputs/inline-cs-pseudoprobe.perfbin
|
||||
third_party/llvm/llvm/test/tools/llvm-profgen/Inputs/noinline-cs-noprobe.perfbin
|
||||
third_party/llvm/llvm/test/tools/llvm-profgen/Inputs/noinline-cs-pseudoprobe.perfbin
|
||||
third_party/llvm/llvm/test/tools/llvm-profgen/Inputs/recursion-compression-noprobe.perfbin
|
||||
third_party/llvm/llvm/test/tools/llvm-profgen/Inputs/recursion-compression-pseudoprobe.perfbin
|
||||
third_party/llvm/llvm/test/tools/llvm-readobj/COFF/Inputs/arm64-win1.obj
|
||||
third_party/llvm/llvm/test/tools/llvm-readobj/COFF/Inputs/arm64-win2.obj
|
||||
third_party/llvm/llvm/test/tools/llvm-readobj/COFF/Inputs/bad-relocs.obj.coff-i386
|
||||
@@ -17174,6 +17339,64 @@ third_party/openscreen/src/test/data/cast/receiver/channel/good_crl.pb
|
||||
third_party/openscreen/src/test/data/cast/receiver/channel/invalid_time_crl.pb
|
||||
third_party/openscreen/src/test/data/cast/receiver/channel/issuer_revoked_crl.pb
|
||||
third_party/openscreen/src/test/data/cast/receiver/channel/issuer_serial_revoked_crl.pb
|
||||
third_party/ots/src/tests/fonts/bad/00ac7a910785ea3a30655fe386d4cb02b39719aa.otf
|
||||
third_party/ots/src/tests/fonts/bad/078400f5718f84841fc43a04fd28d946ddad5e37.otf
|
||||
third_party/ots/src/tests/fonts/bad/0da956a1d4dad2962619a3f0a1d87daa677ffcf5.otf
|
||||
third_party/ots/src/tests/fonts/bad/0fce4352e04a156a1cb8d4bc344cd2be1dfe7177.otf
|
||||
third_party/ots/src/tests/fonts/bad/103ad354e517994c447b9c5c6914a290517cb5ed.otf
|
||||
third_party/ots/src/tests/fonts/bad/173c4c23291c983fead3d734afd8a4de504f508e.otf
|
||||
third_party/ots/src/tests/fonts/bad/251a4ffb5418b336217a9e7958941192b5a20137.otf
|
||||
third_party/ots/src/tests/fonts/bad/2f74c3cb404c60d9a46e883c88d6c10dc3562fad.otf
|
||||
third_party/ots/src/tests/fonts/bad/33df9c8b531928c90a3afebf6b15828dd0cad929.otf
|
||||
third_party/ots/src/tests/fonts/bad/3b9bcfd57f7f18dd4c45ba51e77b23b3895faa9f.ttc
|
||||
third_party/ots/src/tests/fonts/bad/3bfa96a443c19de63f28554b748bf84e57ee51c3.otf
|
||||
third_party/ots/src/tests/fonts/bad/410761bc1115173bad3f6b0d3d72103e1dc32f67.otf
|
||||
third_party/ots/src/tests/fonts/bad/41542b89c620cc3159dc2f29bd335d48136478da.otf
|
||||
third_party/ots/src/tests/fonts/bad/457227a3d4dbf6dd062d251b2ae0c8b31f14c9b8.otf
|
||||
third_party/ots/src/tests/fonts/bad/4c8e7bcd6b657941c4e846f6e48bb714fb3faf92.otf
|
||||
third_party/ots/src/tests/fonts/bad/56d013275a9626c7b10b677fba1d5d4752eec51f.otf
|
||||
third_party/ots/src/tests/fonts/bad/58c575a08b375e51c9776275c5f877396ddf552b.otf
|
||||
third_party/ots/src/tests/fonts/bad/5c67809a0d4b9a16d9eba881282f920153b761eb.otf
|
||||
third_party/ots/src/tests/fonts/bad/68bfc9f9233e34db2c5ecb5fb966bf205f92079a.otf
|
||||
third_party/ots/src/tests/fonts/bad/698e25666a75ea6121065b5fced5ccee62b65ca4.otf
|
||||
third_party/ots/src/tests/fonts/bad/7c8eefff708b374fffbce135ba28a4565766e560.otf
|
||||
third_party/ots/src/tests/fonts/bad/8edb1c6072ff63478456cc93601b77b0eb3432e7.otf
|
||||
third_party/ots/src/tests/fonts/bad/927b4dc365aab682749294bc85bd195e4b74e034.otf
|
||||
third_party/ots/src/tests/fonts/bad/975a2ba94ea4f520406e1dae2e99bd366b0b66c1.otf
|
||||
third_party/ots/src/tests/fonts/bad/b9ea4b9b671307bc0f9745dd684e1e4f6e48191d.otf
|
||||
third_party/ots/src/tests/fonts/bad/bd5ee794425c2809f262b4bc6e3c0b33008fca73.otf
|
||||
third_party/ots/src/tests/fonts/bad/c69c27b17d332fbf33dbc8f25baa0a0a461293a2.otf
|
||||
third_party/ots/src/tests/fonts/bad/c6c0f06e6819b04a2eacca8e20dc0882a21bc312.otf
|
||||
third_party/ots/src/tests/fonts/bad/ca0e0bca764d78f46d533b11bb66466f5b489220.otf
|
||||
third_party/ots/src/tests/fonts/bad/d052cc5e62def2facb5772d1b38112779539ef0a.otf
|
||||
third_party/ots/src/tests/fonts/bad/dcc4f3316f90bc8a4c05e0086d2b49fddd3a059b.otf
|
||||
third_party/ots/src/tests/fonts/bad/ea8c4b1d5178ae184ffd0346f12fd426850729cc.otf
|
||||
third_party/ots/src/tests/fonts/bad/eaeb6d903b14ee184f887aa8a0a81b917e252da9.otf
|
||||
third_party/ots/src/tests/fonts/bad/edaf09c932e0582b1473384f66d5571da752a4d2.otf
|
||||
third_party/ots/src/tests/fonts/fuzzing/10531f9105aa03bf6e0f9754ec8af33ed457ad5c.otf
|
||||
third_party/ots/src/tests/fonts/fuzzing/205edd09bd3d141cc9580f650109556cc28b22cb.otf
|
||||
third_party/ots/src/tests/fonts/fuzzing/2a12de12323bfd99b9c4bb33ed20b66b8ff0915f.otf
|
||||
third_party/ots/src/tests/fonts/fuzzing/43979b90b2dd929723cf4fe1715990bcb9c9a56b.otf
|
||||
third_party/ots/src/tests/fonts/fuzzing/4765a8901e377d1e767f67e1cc768ae3c9207bd1.ttc
|
||||
third_party/ots/src/tests/fonts/fuzzing/757ebd573617a24aa9dfbf0b885c54875c6fe06b.otf
|
||||
third_party/ots/src/tests/fonts/fuzzing/7e14e7883ed152baa158b80e207b66114c823a8b.otf
|
||||
third_party/ots/src/tests/fonts/fuzzing/8240789f6d12d4cfc4b5e8e6f246c3701bcf861f.otf
|
||||
third_party/ots/src/tests/fonts/fuzzing/8668cff491460e4c5cd03142b87e9710fd4b5588.otf
|
||||
third_party/ots/src/tests/fonts/fuzzing/94895e7495f726fa316ca3f2a03c98b86dc20560.ttc
|
||||
third_party/ots/src/tests/fonts/fuzzing/94bdbcb520c5301750167dc433803ac7933da028.otf
|
||||
third_party/ots/src/tests/fonts/fuzzing/b9e2aaa0d75fcef6971ec3a96d806ba4a6b31fe2.otf
|
||||
third_party/ots/src/tests/fonts/fuzzing/d69ecb7001e46df61c33e2ec74fdcdd32e018db3.ttc
|
||||
third_party/ots/src/tests/fonts/good/27f2cd91ff43713d977b2b253e82b8fcb781e674.otf
|
||||
third_party/ots/src/tests/fonts/good/2eba8164a0811c8422ecde8900bf476bb4a05ca3.otf
|
||||
third_party/ots/src/tests/fonts/good/4c471c403831e131c7887e9e0b9a547495749579.otf
|
||||
third_party/ots/src/tests/fonts/good/84df123947f7f5f9a5456e755f91bef963b1dd7c.otf
|
||||
third_party/ots/src/tests/fonts/good/89166e0ffdfdac0309d31012d1d5c1de8fe65a52.otf
|
||||
third_party/ots/src/tests/fonts/good/9780d8ca01f53d2f413b9d0403c0412b1f5bbd06.otf
|
||||
third_party/ots/src/tests/fonts/good/a64a622a50d6400592a9590c003afb02e9e4436d.otf
|
||||
third_party/ots/src/tests/fonts/good/a69c0298f6d3e29903a492ce1f175932dabf800e.otf
|
||||
third_party/ots/src/tests/fonts/good/c3886b3124a97b9b9212c426c50366773e9ef10c.otf
|
||||
third_party/ots/src/tests/fonts/good/c8af7209f1c5c9a2e541214c9bc31bb2bb676c0e.otf
|
||||
third_party/ots/src/tests/fonts/good/e1d157dc9799a686992e5f6c150949fcf3d20ce0.otf
|
||||
third_party/pdfium/testing/resources/bug_1469.jp2
|
||||
third_party/pdfium/testing/resources/bug_552046.in
|
||||
third_party/pdfium/testing/resources/bug_861842.in
|
||||
@@ -17239,6 +17462,7 @@ third_party/pyelftools/test/testfiles_for_unittests/simple_gcc.elf.arm
|
||||
third_party/pywebsocket3/src/test/cert/client_cert.p12
|
||||
third_party/quic_trace/src/examples/example.json.gz
|
||||
third_party/quic_trace/src/examples/example.qtr
|
||||
third_party/r8/custom_d8.jar
|
||||
third_party/skia/experimental/wasm-skp-debugger/debugger/anim.mskp
|
||||
third_party/skia/experimental/wasm-skp-debugger/debugger/sample.skp
|
||||
third_party/skia/modules/canvaskit/tests/assets/Roboto-Regular.otf
|
||||
@@ -17336,6 +17560,17 @@ third_party/swiftshader/tests/regres/llvm/10.0.0-darwin.sig
|
||||
third_party/swiftshader/tests/regres/llvm/10.0.0-ubuntu.sig
|
||||
third_party/swiftshader/tests/regres/llvm/10.0.0-win64.sig
|
||||
third_party/swiftshader/third_party/SPIRV-Tools/test/fuzzers/corpora/spv/simple.spv
|
||||
third_party/tensorflow-text/src/tensorflow_text/python/ops/test_data/segmenter_hub_module/saved_model.pb
|
||||
third_party/tensorflow-text/src/tensorflow_text/python/ops/test_data/segmenter_hub_module/tfhub_module.pb
|
||||
third_party/tensorflow-text/src/tensorflow_text/python/ops/test_data/segmenter_hub_module/variables/variables.data-00000-of-00001
|
||||
third_party/tensorflow-text/src/tensorflow_text/python/ops/test_data/segmenter_hub_module/variables/variables.index
|
||||
third_party/tensorflow-text/src/tensorflow_text/python/ops/test_data/test_oss_model.model
|
||||
third_party/tflite-support/src/tensorflow_lite_support/custom_ops/kernel/sentencepiece/testdata/sentencepiece.model
|
||||
third_party/tflite-support/src/tensorflow_lite_support/custom_ops/kernel/testdata/whitespace_tokenizer_flex_delegate.tflite
|
||||
third_party/tflite-support/src/tensorflow_lite_support/custom_ops/kernel/testdata/whitespace_tokenizer_to_ragged_1d_input.tflite
|
||||
third_party/tflite-support/src/tensorflow_lite_support/custom_ops/kernel/testdata/whitespace_tokenizer_to_ragged_2d_input.tflite
|
||||
third_party/tflite-support/src/tensorflow_lite_support/custom_ops/kernel/testdata/whitespace_tokenizer_to_tensor.tflite
|
||||
third_party/tflite-support/src/tensorflow_lite_support/custom_ops/testdata/sentencepiece_tokenizer_flex_op.tflite
|
||||
third_party/tflite/src/tensorflow/c/testdata/tf_record
|
||||
third_party/tflite/src/tensorflow/cc/saved_model/testdata/CyclicModule/debug/saved_model_debug_info.pb
|
||||
third_party/tflite/src/tensorflow/cc/saved_model/testdata/CyclicModule/saved_model.pb
|
||||
@@ -17852,7 +18087,6 @@ third_party/vulkan_memory_allocator/bin/VmaReplay_Release_vs2017.exe
|
||||
third_party/vulkan_memory_allocator/bin/VulkanSample_Release_vs2017.exe
|
||||
third_party/vulkan_memory_allocator/premake/premake5.exe
|
||||
third_party/wayland/src/cursor/cursor.pcf
|
||||
third_party/wds/src/datadumps/information-elements.pcapng
|
||||
third_party/webgl/src/conformance-suites/1.0.0/conformance/resources/red-green.mp4
|
||||
third_party/webgl/src/conformance-suites/1.0.0/conformance/resources/red-green.theora.ogv
|
||||
third_party/webgl/src/conformance-suites/1.0.0/conformance/resources/red-green.webmvp8.webm
|
||||
@@ -17906,6 +18140,10 @@ third_party/webgl/src/sdk/tests/resources/red-green.mp4
|
||||
third_party/webgl/src/sdk/tests/resources/red-green.theora.ogv
|
||||
third_party/webgl/src/sdk/tests/resources/red-green.webmvp8.webm
|
||||
third_party/webgl/src/sdk/tests/resources/transparent-2frames.webm
|
||||
third_party/webgl/src/sdk/tests/resources/video-rotation-0.mp4
|
||||
third_party/webgl/src/sdk/tests/resources/video-rotation-180.mp4
|
||||
third_party/webgl/src/sdk/tests/resources/video-rotation-270.mp4
|
||||
third_party/webgl/src/sdk/tests/resources/video-rotation-90.mp4
|
||||
third_party/webgpu-cts/src/deploy_key.enc
|
||||
third_party/webrtc/data/audio_processing/android/output_data_fixed.pb
|
||||
third_party/webrtc/data/audio_processing/android/output_data_float.pb
|
||||
|
||||
Reference in New Issue
Block a user