mirror of
https://github.com/morgan9e/helium
synced 2026-04-14 00:14:20 +09:00
Update Chromium to 73.0.3683.86
This commit is contained in:
@@ -1 +1 @@
|
||||
72.0.3626.122
|
||||
73.0.3683.86
|
||||
|
||||
File diff suppressed because it is too large
Load Diff
@@ -10,7 +10,7 @@ Subject: Disable fetching of all field trials
|
||||
|
||||
--- a/chrome/android/java/src/org/chromium/chrome/browser/ChromeFeatureList.java
|
||||
+++ b/chrome/android/java/src/org/chromium/chrome/browser/ChromeFeatureList.java
|
||||
@@ -103,9 +103,7 @@ public abstract class ChromeFeatureList
|
||||
@@ -106,9 +106,7 @@ public abstract class ChromeFeatureList
|
||||
*/
|
||||
public static int getFieldTrialParamByFeatureAsInt(
|
||||
String featureName, String paramName, int defaultValue) {
|
||||
@@ -21,7 +21,7 @@ Subject: Disable fetching of all field trials
|
||||
}
|
||||
|
||||
/**
|
||||
@@ -122,9 +120,7 @@ public abstract class ChromeFeatureList
|
||||
@@ -125,9 +123,7 @@ public abstract class ChromeFeatureList
|
||||
*/
|
||||
public static double getFieldTrialParamByFeatureAsDouble(
|
||||
String featureName, String paramName, double defaultValue) {
|
||||
@@ -32,7 +32,7 @@ Subject: Disable fetching of all field trials
|
||||
}
|
||||
|
||||
/**
|
||||
@@ -141,9 +137,7 @@ public abstract class ChromeFeatureList
|
||||
@@ -144,9 +140,7 @@ public abstract class ChromeFeatureList
|
||||
*/
|
||||
public static boolean getFieldTrialParamByFeatureAsBoolean(
|
||||
String featureName, String paramName, boolean defaultValue) {
|
||||
|
||||
@@ -3,76 +3,12 @@ author: Michael Gilbert <mgilbert@debian.org>
|
||||
|
||||
--- a/BUILD.gn
|
||||
+++ b/BUILD.gn
|
||||
@@ -666,7 +666,7 @@ group("gn_all") {
|
||||
@@ -661,7 +661,7 @@ group("gn_all") {
|
||||
}
|
||||
}
|
||||
|
||||
- if (is_mac || is_linux || is_android) {
|
||||
- if (is_mac || is_linux || is_android || is_fuchsia) {
|
||||
+ if (false) {
|
||||
deps += [ "//third_party/perfetto:all" ]
|
||||
}
|
||||
|
||||
--- a/services/tracing/BUILD.gn
|
||||
+++ b/services/tracing/BUILD.gn
|
||||
@@ -27,7 +27,7 @@ source_set("lib") {
|
||||
"//services/tracing/public/cpp",
|
||||
]
|
||||
|
||||
- if (is_mac || is_linux || is_android || is_win) {
|
||||
+ if (false) {
|
||||
sources += [
|
||||
"perfetto/json_trace_exporter.cc",
|
||||
"perfetto/json_trace_exporter.h",
|
||||
@@ -64,7 +64,7 @@ source_set("tests") {
|
||||
"test_util.h",
|
||||
]
|
||||
|
||||
- if (is_mac || is_linux || is_android) {
|
||||
+ if (false) {
|
||||
sources += [
|
||||
"public/cpp/perfetto/trace_event_data_source_unittest.cc",
|
||||
"public/cpp/perfetto/traced_value_proto_writer_unittest.cc",
|
||||
@@ -88,7 +88,7 @@ source_set("tests") {
|
||||
"//testing/gtest",
|
||||
]
|
||||
|
||||
- if (is_mac || is_linux || is_android) {
|
||||
+ if (false) {
|
||||
sources += [
|
||||
"perfetto/json_trace_exporter_unittest.cc",
|
||||
"perfetto/perfetto_integration_unittest.cc",
|
||||
--- a/services/tracing/tracing_service.h
|
||||
+++ b/services/tracing/tracing_service.h
|
||||
@@ -19,8 +19,7 @@
|
||||
#include "services/tracing/agent_registry.h"
|
||||
#include "services/tracing/coordinator.h"
|
||||
|
||||
-#if defined(OS_ANDROID) || defined(OS_LINUX) || defined(OS_MACOSX) || \
|
||||
- defined(OS_WIN)
|
||||
+#if 0
|
||||
#define PERFETTO_SERVICE_AVAILABLE
|
||||
#endif
|
||||
|
||||
--- a/services/tracing/public/cpp/BUILD.gn
|
||||
+++ b/services/tracing/public/cpp/BUILD.gn
|
||||
@@ -24,7 +24,7 @@ component("cpp") {
|
||||
"//services/tracing/public/mojom",
|
||||
]
|
||||
|
||||
- if (is_mac || is_linux || is_android || is_win) {
|
||||
+ if (false) {
|
||||
sources += [
|
||||
"perfetto/heap_scattered_stream_delegate.cc",
|
||||
"perfetto/heap_scattered_stream_delegate.h",
|
||||
--- a/services/tracing/public/cpp/trace_event_agent.cc
|
||||
+++ b/services/tracing/public/cpp/trace_event_agent.cc
|
||||
@@ -22,8 +22,7 @@
|
||||
#include "services/tracing/public/cpp/tracing_features.h"
|
||||
#include "services/tracing/public/mojom/constants.mojom.h"
|
||||
|
||||
-#if defined(OS_ANDROID) || defined(OS_LINUX) || defined(OS_MACOSX) || \
|
||||
- defined(OS_WIN)
|
||||
+#if 0
|
||||
#define PERFETTO_AVAILABLE
|
||||
#include "services/tracing/public/cpp/perfetto/producer_client.h"
|
||||
#include "services/tracing/public/cpp/perfetto/trace_event_data_source.h"
|
||||
|
||||
@@ -4,7 +4,7 @@ bug: http://bugs.debian.org/914487
|
||||
|
||||
--- a/chrome/common/safe_browsing/BUILD.gn
|
||||
+++ b/chrome/common/safe_browsing/BUILD.gn
|
||||
@@ -56,40 +56,6 @@ if (safe_browsing_mode == 1) {
|
||||
@@ -64,41 +64,6 @@ if (safe_browsing_mode == 1) {
|
||||
]
|
||||
}
|
||||
|
||||
@@ -20,6 +20,7 @@ bug: http://bugs.debian.org/914487
|
||||
- ":file_type_policies",
|
||||
- "//base",
|
||||
- "//base:i18n",
|
||||
- "//components/safe_browsing:features",
|
||||
- "//third_party/unrar:unrar",
|
||||
- ]
|
||||
-
|
||||
@@ -45,9 +46,9 @@ bug: http://bugs.debian.org/914487
|
||||
source_set("disk_image_type_sniffer_mac") {
|
||||
sources = [
|
||||
"disk_image_type_sniffer_mac.cc",
|
||||
@@ -150,7 +116,6 @@ source_set("safe_browsing") {
|
||||
deps += [
|
||||
@@ -167,7 +132,6 @@ source_set("safe_browsing") {
|
||||
":archive_analyzer_results",
|
||||
":binary_feature_extractor",
|
||||
":download_type_util",
|
||||
- ":rar_analyzer",
|
||||
"//components/safe_browsing:features",
|
||||
@@ -63,23 +64,24 @@ bug: http://bugs.debian.org/914487
|
||||
#include "chrome/common/safe_browsing/zip_analyzer.h"
|
||||
#include "mojo/public/cpp/bindings/strong_binding.h"
|
||||
|
||||
@@ -49,7 +48,7 @@ void SafeArchiveAnalyzer::AnalyzeRarFile
|
||||
@@ -50,8 +49,7 @@ void SafeArchiveAnalyzer::AnalyzeRarFile
|
||||
AnalyzeRarFileCallback callback) {
|
||||
DCHECK(rar_file.IsValid());
|
||||
|
||||
+ LOG(FATAL) << "AnalyzeRarFile is disabled in this build";
|
||||
safe_browsing::ArchiveAnalyzerResults results;
|
||||
- safe_browsing::rar_analyzer::AnalyzeRarFile(std::move(rar_file), &results);
|
||||
- safe_browsing::rar_analyzer::AnalyzeRarFile(
|
||||
- std::move(rar_file), std::move(temporary_file), &results);
|
||||
std::move(callback).Run(results);
|
||||
}
|
||||
--- a/chrome/browser/safe_browsing/download_protection/file_analyzer.cc
|
||||
+++ b/chrome/browser/safe_browsing/download_protection/file_analyzer.cc
|
||||
@@ -95,7 +95,7 @@ void FileAnalyzer::Start(const base::Fil
|
||||
if (target_path_.MatchesExtension(FILE_PATH_LITERAL(".zip"))) {
|
||||
@@ -100,7 +100,7 @@ void FileAnalyzer::Start(const base::Fil
|
||||
if (inspection_type == DownloadFileType::ZIP) {
|
||||
StartExtractZipFeatures();
|
||||
} else if (target_path_.MatchesExtension(FILE_PATH_LITERAL(".rar"))) {
|
||||
} else if (inspection_type == DownloadFileType::RAR) {
|
||||
- StartExtractRarFeatures();
|
||||
+ LOG(WARNING) << "Safebrowser inspection of rar files is disabled in this build";
|
||||
#if defined(OS_MACOSX)
|
||||
} else if (target_path_.MatchesExtension(FILE_PATH_LITERAL(".dmg")) ||
|
||||
target_path_.MatchesExtension(FILE_PATH_LITERAL(".img")) ||
|
||||
} else if (inspection_type == DownloadFileType::DMG) {
|
||||
StartExtractDmgFeatures();
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
--- a/chrome/browser/chrome_content_browser_client.cc
|
||||
+++ b/chrome/browser/chrome_content_browser_client.cc
|
||||
@@ -833,30 +833,6 @@ void SetApplicationLocaleOnIOThread(cons
|
||||
@@ -853,30 +853,6 @@ void SetApplicationLocaleOnIOThread(cons
|
||||
GetIOThreadApplicationLocale() = locale;
|
||||
}
|
||||
|
||||
@@ -31,7 +31,7 @@
|
||||
#if defined(OS_ANDROID)
|
||||
float GetDeviceScaleAdjustment() {
|
||||
static const float kMinFSM = 1.05f;
|
||||
@@ -2007,7 +1983,7 @@ void ChromeContentBrowserClient::AppendE
|
||||
@@ -2052,7 +2028,7 @@ void ChromeContentBrowserClient::AppendE
|
||||
// Disable client-side phishing detection in the renderer if it is
|
||||
// disabled in the Profile preferences or the browser process.
|
||||
if (!prefs->GetBoolean(prefs::kSafeBrowsingEnabled) ||
|
||||
@@ -40,7 +40,7 @@
|
||||
command_line->AppendSwitch(
|
||||
switches::kDisableClientSidePhishingDetection);
|
||||
}
|
||||
@@ -2697,7 +2673,7 @@ void ChromeContentBrowserClient::AllowCe
|
||||
@@ -2747,7 +2723,7 @@ void ChromeContentBrowserClient::AllowCe
|
||||
SSLErrorHandler::HandleSSLError(
|
||||
web_contents, cert_error, ssl_info, request_url,
|
||||
expired_previous_decision,
|
||||
@@ -49,7 +49,7 @@
|
||||
callback, SSLErrorHandler::BlockingPageReadyCallback());
|
||||
}
|
||||
|
||||
@@ -2977,8 +2953,6 @@ bool ChromeContentBrowserClient::CanCrea
|
||||
@@ -3030,8 +3006,6 @@ bool ChromeContentBrowserClient::CanCrea
|
||||
void ChromeContentBrowserClient::ResourceDispatcherHostCreated() {
|
||||
DCHECK_CURRENTLY_ON(BrowserThread::UI);
|
||||
|
||||
@@ -58,7 +58,7 @@
|
||||
for (size_t i = 0; i < extra_parts_.size(); ++i)
|
||||
extra_parts_[i]->ResourceDispatcherHostCreated();
|
||||
|
||||
@@ -4201,7 +4175,7 @@ ChromeContentBrowserClient::CreateThrott
|
||||
@@ -4250,7 +4224,7 @@ ChromeContentBrowserClient::CreateThrott
|
||||
if (base::FeatureList::IsEnabled(features::kSSLCommittedInterstitials)) {
|
||||
throttles.push_back(std::make_unique<SSLErrorNavigationThrottle>(
|
||||
handle,
|
||||
@@ -67,9 +67,21 @@
|
||||
base::Bind(&SSLErrorHandler::HandleSSLError)));
|
||||
}
|
||||
|
||||
@@ -4282,11 +4256,6 @@ ChromeContentBrowserClient::CreateThrott
|
||||
PreviewsLitePageDecider::MaybeCreateThrottleFor(handle);
|
||||
if (previews_lite_page_throttle)
|
||||
throttles.push_back(std::move(previews_lite_page_throttle));
|
||||
- if (base::FeatureList::IsEnabled(safe_browsing::kCommittedSBInterstitials)) {
|
||||
- throttles.push_back(
|
||||
- std::make_unique<safe_browsing::SafeBrowsingNavigationThrottle>(
|
||||
- handle));
|
||||
- }
|
||||
|
||||
#if defined(OS_WIN) || defined(OS_MACOSX) || \
|
||||
(defined(OS_LINUX) && !defined(OS_CHROMEOS))
|
||||
--- a/chrome/browser/profiles/profile_impl.cc
|
||||
+++ b/chrome/browser/profiles/profile_impl.cc
|
||||
@@ -549,18 +549,6 @@ ProfileImpl::ProfileImpl(
|
||||
@@ -589,18 +589,6 @@ ProfileImpl::ProfileImpl(
|
||||
create_mode == CREATE_MODE_SYNCHRONOUS);
|
||||
#endif
|
||||
|
||||
@@ -88,7 +100,7 @@
|
||||
content::BrowserContext::Initialize(this, path_);
|
||||
|
||||
{
|
||||
@@ -569,7 +557,7 @@ ProfileImpl::ProfileImpl(
|
||||
@@ -609,7 +597,7 @@ ProfileImpl::ProfileImpl(
|
||||
->CreateDelegate();
|
||||
delegate->InitPrefRegistry(pref_registry_.get());
|
||||
prefs_ = chrome_prefs::CreateProfilePrefs(
|
||||
@@ -99,7 +111,7 @@
|
||||
GetIOTaskRunner(), std::move(delegate));
|
||||
--- a/chrome/browser/loader/chrome_resource_dispatcher_host_delegate.cc
|
||||
+++ b/chrome/browser/loader/chrome_resource_dispatcher_host_delegate.cc
|
||||
@@ -296,8 +296,7 @@ void NotifyUIThreadOfRequestComplete(
|
||||
@@ -290,8 +290,7 @@ void NotifyUIThreadOfRequestComplete(
|
||||
} // namespace
|
||||
|
||||
ChromeResourceDispatcherHostDelegate::ChromeResourceDispatcherHostDelegate()
|
||||
@@ -109,7 +121,7 @@
|
||||
|
||||
ChromeResourceDispatcherHostDelegate::~ChromeResourceDispatcherHostDelegate() {
|
||||
#if BUILDFLAG(ENABLE_EXTENSIONS)
|
||||
@@ -311,8 +310,6 @@ void ChromeResourceDispatcherHostDelegat
|
||||
@@ -305,8 +304,6 @@ void ChromeResourceDispatcherHostDelegat
|
||||
content::AppCacheService* appcache_service,
|
||||
ResourceType resource_type,
|
||||
std::vector<std::unique_ptr<content::ResourceThrottle>>* throttles) {
|
||||
@@ -118,7 +130,7 @@
|
||||
ProfileIOData* io_data = ProfileIOData::FromResourceContext(resource_context);
|
||||
|
||||
#if BUILDFLAG(ENABLE_OFFLINE_PAGES) || BUILDFLAG(ENABLE_NACL)
|
||||
@@ -431,7 +428,7 @@ void ChromeResourceDispatcherHostDelegat
|
||||
@@ -410,7 +407,7 @@ void ChromeResourceDispatcherHostDelegat
|
||||
content::ResourceThrottle* first_throttle = NULL;
|
||||
#if defined(OS_ANDROID)
|
||||
first_throttle = DataReductionProxyResourceThrottle::MaybeCreate(
|
||||
@@ -346,7 +358,7 @@
|
||||
// SimpleURLLoader -> (owned loader, extension id).
|
||||
--- a/chrome/browser/download/chrome_download_manager_delegate.cc
|
||||
+++ b/chrome/browser/download/chrome_download_manager_delegate.cc
|
||||
@@ -315,13 +315,6 @@ ChromeDownloadManagerDelegate::~ChromeDo
|
||||
@@ -322,13 +322,6 @@ ChromeDownloadManagerDelegate::~ChromeDo
|
||||
|
||||
void ChromeDownloadManagerDelegate::SetDownloadManager(DownloadManager* dm) {
|
||||
download_manager_ = dm;
|
||||
@@ -360,7 +372,7 @@
|
||||
}
|
||||
|
||||
#if defined(OS_ANDROID)
|
||||
@@ -616,16 +609,6 @@ void ChromeDownloadManagerDelegate::Choo
|
||||
@@ -636,16 +629,6 @@ void ChromeDownloadManagerDelegate::Choo
|
||||
|
||||
void ChromeDownloadManagerDelegate::SanitizeSavePackageResourceName(
|
||||
base::FilePath* filename) {
|
||||
@@ -387,7 +399,7 @@
|
||||
#include "chrome/browser/shell_integration.h"
|
||||
#include "chrome/browser/status_icons/status_tray.h"
|
||||
#include "chrome/browser/ui/browser_dialogs.h"
|
||||
@@ -371,8 +370,6 @@ void BrowserProcessImpl::StartTearDown()
|
||||
@@ -369,8 +368,6 @@ void BrowserProcessImpl::StartTearDown()
|
||||
// that URLFetcher operation before going away.)
|
||||
metrics_services_manager_.reset();
|
||||
intranet_redirect_detector_.reset();
|
||||
@@ -419,7 +431,7 @@
|
||||
subresource_filter::RulesetService*
|
||||
BrowserProcessImpl::subresource_filter_ruleset_service() {
|
||||
DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_);
|
||||
@@ -1298,16 +1279,6 @@ void BrowserProcessImpl::CreateBackgroun
|
||||
@@ -1292,16 +1273,6 @@ void BrowserProcessImpl::CreateBackgroun
|
||||
#endif
|
||||
}
|
||||
|
||||
@@ -448,7 +460,7 @@
|
||||
subresource_filter::RulesetService* subresource_filter_ruleset_service()
|
||||
override;
|
||||
optimization_guide::OptimizationGuideService* optimization_guide_service()
|
||||
@@ -326,9 +323,6 @@ class BrowserProcessImpl : public Browse
|
||||
@@ -320,9 +317,6 @@ class BrowserProcessImpl : public Browse
|
||||
std::unique_ptr<BackgroundModeManager> background_mode_manager_;
|
||||
#endif
|
||||
|
||||
@@ -497,17 +509,17 @@
|
||||
// Returns the service providing versioned storage for rules used by the Safe
|
||||
// Browsing subresource filter.
|
||||
virtual subresource_filter::RulesetService*
|
||||
--- a/chrome/browser/ui/webui/md_downloads/md_downloads_dom_handler.h
|
||||
+++ b/chrome/browser/ui/webui/md_downloads/md_downloads_dom_handler.h
|
||||
--- a/chrome/browser/ui/webui/downloads/downloads_dom_handler.h
|
||||
+++ b/chrome/browser/ui/webui/downloads/downloads_dom_handler.h
|
||||
@@ -12,7 +12,6 @@
|
||||
|
||||
#include "base/macros.h"
|
||||
#include "base/memory/weak_ptr.h"
|
||||
-#include "chrome/browser/download/download_danger_prompt.h"
|
||||
#include "chrome/browser/ui/webui/md_downloads/downloads_list_tracker.h"
|
||||
#include "chrome/browser/ui/webui/downloads/downloads_list_tracker.h"
|
||||
#include "chrome/browser/ui/webui/downloads/downloads.mojom.h"
|
||||
#include "content/public/browser/web_contents_observer.h"
|
||||
#include "content/public/browser/web_ui_message_handler.h"
|
||||
@@ -120,18 +119,6 @@ class MdDownloadsDOMHandler : public con
|
||||
@@ -85,18 +84,6 @@ class MdDownloadsDOMHandler : public con
|
||||
// null-checking |original_notifier_|.
|
||||
content::DownloadManager* GetOriginalNotifierManager() const;
|
||||
|
||||
@@ -526,8 +538,8 @@
|
||||
// Returns true if the records of any downloaded items are allowed (and able)
|
||||
// to be deleted.
|
||||
bool IsDeletingHistoryAllowed();
|
||||
--- a/chrome/browser/ui/webui/md_downloads/md_downloads_dom_handler.cc
|
||||
+++ b/chrome/browser/ui/webui/md_downloads/md_downloads_dom_handler.cc
|
||||
--- a/chrome/browser/ui/webui/downloads/downloads_dom_handler.cc
|
||||
+++ b/chrome/browser/ui/webui/downloads/downloads_dom_handler.cc
|
||||
@@ -21,7 +21,6 @@
|
||||
#include "base/threading/thread.h"
|
||||
#include "base/values.h"
|
||||
@@ -536,17 +548,17 @@
|
||||
#include "chrome/browser/download/download_history.h"
|
||||
#include "chrome/browser/download/download_item_model.h"
|
||||
#include "chrome/browser/download/download_prefs.h"
|
||||
@@ -204,9 +203,6 @@ void MdDownloadsDOMHandler::HandleDrag(c
|
||||
@@ -162,9 +161,6 @@ void MdDownloadsDOMHandler::SaveDangerou
|
||||
}
|
||||
|
||||
void MdDownloadsDOMHandler::HandleSaveDangerous(const base::ListValue* args) {
|
||||
CountDownloadsDOMEvents(DOWNLOADS_DOM_EVENT_SAVE_DANGEROUS);
|
||||
- download::DownloadItem* file = GetDownloadByValue(args);
|
||||
- download::DownloadItem* file = GetDownloadByStringId(id);
|
||||
- if (file)
|
||||
- ShowDangerPrompt(file);
|
||||
}
|
||||
|
||||
void MdDownloadsDOMHandler::HandleRetryDownload(const base::ListValue* args) {
|
||||
@@ -313,12 +309,6 @@ void MdDownloadsDOMHandler::RemoveDownlo
|
||||
void MdDownloadsDOMHandler::DiscardDangerous(const std::string& id) {
|
||||
@@ -307,12 +303,6 @@ void MdDownloadsDOMHandler::RemoveDownlo
|
||||
IdSet ids;
|
||||
|
||||
for (auto* download : to_remove) {
|
||||
@@ -559,7 +571,7 @@
|
||||
DownloadItemModel item_model(download);
|
||||
if (!item_model.ShouldShowInShelf() ||
|
||||
download->GetState() == download::DownloadItem::IN_PROGRESS) {
|
||||
@@ -371,33 +361,6 @@ void MdDownloadsDOMHandler::FinalizeRemo
|
||||
@@ -370,33 +360,6 @@ void MdDownloadsDOMHandler::FinalizeRemo
|
||||
}
|
||||
}
|
||||
|
||||
@@ -595,7 +607,7 @@
|
||||
return manager &&
|
||||
--- a/chrome/browser/extensions/api/downloads/downloads_api.cc
|
||||
+++ b/chrome/browser/extensions/api/downloads/downloads_api.cc
|
||||
@@ -39,7 +39,6 @@
|
||||
@@ -38,7 +38,6 @@
|
||||
#include "chrome/browser/browser_process.h"
|
||||
#include "chrome/browser/download/download_core_service.h"
|
||||
#include "chrome/browser/download/download_core_service_factory.h"
|
||||
@@ -603,7 +615,7 @@
|
||||
#include "chrome/browser/download/download_file_icon_extractor.h"
|
||||
#include "chrome/browser/download/download_open_prompt.h"
|
||||
#include "chrome/browser/download/download_prefs.h"
|
||||
@@ -1305,9 +1304,6 @@ DownloadsAcceptDangerFunction::Downloads
|
||||
@@ -1304,9 +1303,6 @@ DownloadsAcceptDangerFunction::Downloads
|
||||
|
||||
DownloadsAcceptDangerFunction::~DownloadsAcceptDangerFunction() {}
|
||||
|
||||
@@ -613,7 +625,7 @@
|
||||
bool DownloadsAcceptDangerFunction::RunAsync() {
|
||||
std::unique_ptr<downloads::AcceptDanger::Params> params(
|
||||
downloads::AcceptDanger::Params::Create(*args_));
|
||||
@@ -1345,40 +1341,7 @@ void DownloadsAcceptDangerFunction::Prom
|
||||
@@ -1344,40 +1340,7 @@ void DownloadsAcceptDangerFunction::Prom
|
||||
return;
|
||||
}
|
||||
RecordApiFunctions(DOWNLOADS_FUNCTION_ACCEPT_DANGER);
|
||||
@@ -693,7 +705,7 @@
|
||||
|
||||
--- a/chrome/browser/download/download_prefs.cc
|
||||
+++ b/chrome/browser/download/download_prefs.cc
|
||||
@@ -209,14 +209,7 @@ DownloadPrefs::DownloadPrefs(Profile* pr
|
||||
@@ -219,14 +219,7 @@ DownloadPrefs::DownloadPrefs(Profile* pr
|
||||
base::FilePath::StringType(1, base::FilePath::kExtensionSeparator) +
|
||||
extension);
|
||||
|
||||
@@ -709,7 +721,7 @@
|
||||
}
|
||||
}
|
||||
|
||||
@@ -371,10 +364,6 @@ bool DownloadPrefs::IsAutoOpenEnabledBas
|
||||
@@ -381,10 +374,6 @@ bool DownloadPrefs::IsAutoOpenEnabledBas
|
||||
bool DownloadPrefs::EnableAutoOpenBasedOnExtension(
|
||||
const base::FilePath& file_name) {
|
||||
base::FilePath::StringType extension = file_name.Extension();
|
||||
@@ -778,7 +790,7 @@
|
||||
void DownloadTargetDeterminer::OnDownloadDestroyed(
|
||||
--- a/chrome/browser/BUILD.gn
|
||||
+++ b/chrome/browser/BUILD.gn
|
||||
@@ -2649,8 +2649,6 @@ jumbo_split_static_library("browser") {
|
||||
@@ -2698,8 +2698,6 @@ jumbo_split_static_library("browser") {
|
||||
"download/download_commands.h",
|
||||
"download/download_crx_util.cc",
|
||||
"download/download_crx_util.h",
|
||||
@@ -789,7 +801,7 @@
|
||||
"download/download_dir_util.cc",
|
||||
--- a/chrome/browser/ui/BUILD.gn
|
||||
+++ b/chrome/browser/ui/BUILD.gn
|
||||
@@ -2420,7 +2420,6 @@ jumbo_split_static_library("ui") {
|
||||
@@ -2463,7 +2463,6 @@ jumbo_split_static_library("ui") {
|
||||
"views/cookie_info_view.h",
|
||||
"views/device_chooser_content_view.cc",
|
||||
"views/device_chooser_content_view.h",
|
||||
@@ -799,7 +811,7 @@
|
||||
"views/download/download_item_view.cc",
|
||||
--- a/chrome/browser/ssl/security_state_tab_helper.cc
|
||||
+++ b/chrome/browser/ssl/security_state_tab_helper.cc
|
||||
@@ -269,78 +269,6 @@ bool SecurityStateTabHelper::UsedPolicyI
|
||||
@@ -186,79 +186,6 @@ bool SecurityStateTabHelper::UsedPolicyI
|
||||
|
||||
security_state::MaliciousContentStatus
|
||||
SecurityStateTabHelper::GetMaliciousContentStatus() const {
|
||||
@@ -868,6 +880,7 @@
|
||||
- case safe_browsing::SB_THREAT_TYPE_CSD_WHITELIST:
|
||||
- case safe_browsing::SB_THREAT_TYPE_AD_SAMPLE:
|
||||
- case safe_browsing::SB_THREAT_TYPE_SUSPICIOUS_SITE:
|
||||
- case safe_browsing::SB_THREAT_TYPE_APK_DOWNLOAD:
|
||||
- // These threat types are not currently associated with
|
||||
- // interstitials, and thus resources with these threat types are
|
||||
- // not ever whitelisted or pending whitelisting.
|
||||
@@ -880,7 +893,7 @@
|
||||
|
||||
--- a/chrome/browser/browsing_data/chrome_browsing_data_remover_delegate.cc
|
||||
+++ b/chrome/browser/browsing_data/chrome_browsing_data_remover_delegate.cc
|
||||
@@ -617,35 +617,6 @@ void ChromeBrowsingDataRemoverDelegate::
|
||||
@@ -628,35 +628,6 @@ void ChromeBrowsingDataRemoverDelegate::
|
||||
CONTENT_SETTINGS_TYPE_CLIENT_HINTS, base::Time(), base::Time::Max(),
|
||||
website_settings_filter);
|
||||
|
||||
@@ -930,14 +943,14 @@
|
||||
std::make_unique<UpgradeMetricsProvider>());
|
||||
--- a/chrome/browser/profiles/chrome_browser_main_extra_parts_profiles.cc
|
||||
+++ b/chrome/browser/profiles/chrome_browser_main_extra_parts_profiles.cc
|
||||
@@ -233,7 +233,6 @@ void ChromeBrowserMainExtraPartsProfiles
|
||||
@@ -239,7 +239,6 @@ void ChromeBrowserMainExtraPartsProfiles
|
||||
#if BUILDFLAG(ENABLE_CAPTIVE_PORTAL_DETECTION)
|
||||
CaptivePortalServiceFactory::GetInstance();
|
||||
#endif
|
||||
- CertificateReportingServiceFactory::GetInstance();
|
||||
ChromeBrowsingDataRemoverDelegateFactory::GetInstance();
|
||||
#if defined(OS_CHROMEOS)
|
||||
chromeos::ChromeCryptAuthServiceFactory::GetInstance();
|
||||
chromeos::android_sms::AndroidSmsServiceFactory::GetInstance();
|
||||
--- a/chrome/browser/ssl/captive_portal_blocking_page.cc
|
||||
+++ b/chrome/browser/ssl/captive_portal_blocking_page.cc
|
||||
@@ -211,10 +211,7 @@ void CaptivePortalBlockingPage::Populate
|
||||
@@ -963,7 +976,7 @@
|
||||
captive_portal::CaptivePortalMetrics::LogCaptivePortalBlockingPageEvent(
|
||||
--- a/chrome/browser/ssl/cert_report_helper.cc
|
||||
+++ b/chrome/browser/ssl/cert_report_helper.cc
|
||||
@@ -178,8 +178,6 @@ void CertReportHelper::FinishCertCollect
|
||||
@@ -179,8 +179,6 @@ void CertReportHelper::FinishCertCollect
|
||||
LOG(ERROR) << "Failed to serialize certificate report.";
|
||||
return;
|
||||
}
|
||||
@@ -974,25 +987,25 @@
|
||||
bool CertReportHelper::ShouldShowCertificateReporterCheckbox() {
|
||||
--- a/chrome/browser/ui/tab_helpers.cc
|
||||
+++ b/chrome/browser/ui/tab_helpers.cc
|
||||
@@ -244,8 +244,6 @@ void TabHelpers::AttachTabHelpers(WebCon
|
||||
@@ -243,10 +243,6 @@ void TabHelpers::AttachTabHelpers(WebCon
|
||||
PreviewsUITabHelper::CreateForWebContents(web_contents);
|
||||
RecentlyAudibleHelper::CreateForWebContents(web_contents);
|
||||
ResourceLoadingHintsWebContentsObserver::CreateForWebContents(web_contents);
|
||||
- safe_browsing::SafeBrowsingNavigationObserver::MaybeCreateForWebContents(
|
||||
- web_contents);
|
||||
- safe_browsing::TriggerCreator::MaybeCreateTriggersForWebContents(
|
||||
- profile, web_contents);
|
||||
SearchEngineTabHelper::CreateForWebContents(web_contents);
|
||||
SecurityStateTabHelper::CreateForWebContents(web_contents);
|
||||
if (SiteEngagementService::IsEnabled())
|
||||
@@ -298,9 +296,6 @@ void TabHelpers::AttachTabHelpers(WebCon
|
||||
@@ -299,7 +295,6 @@ void TabHelpers::AttachTabHelpers(WebCon
|
||||
new ChromePDFWebContentsHelperClient()));
|
||||
PluginObserver::CreateForWebContents(web_contents);
|
||||
SadTabHelper::CreateForWebContents(web_contents);
|
||||
- safe_browsing::SafeBrowsingTabObserver::CreateForWebContents(web_contents);
|
||||
- safe_browsing::SafeBrowsingNavigationObserver::MaybeCreateForWebContents(
|
||||
- web_contents);
|
||||
SearchTabHelper::CreateForWebContents(web_contents);
|
||||
TabDialogs::CreateForWebContents(web_contents);
|
||||
ThumbnailTabHelper::CreateForWebContents(web_contents);
|
||||
web_modal::WebContentsModalDialogManager::CreateForWebContents(web_contents);
|
||||
--- a/chrome/browser/subresource_filter/chrome_subresource_filter_client.cc
|
||||
+++ b/chrome/browser/subresource_filter/chrome_subresource_filter_client.cc
|
||||
@@ -70,20 +70,6 @@ void ChromeSubresourceFilterClient::DidS
|
||||
@@ -1026,7 +1039,7 @@
|
||||
sources = [
|
||||
"safe_browsing_controller_client.cc",
|
||||
"safe_browsing_controller_client.h",
|
||||
@@ -75,6 +76,7 @@ static_library("safe_browsing") {
|
||||
@@ -100,6 +101,7 @@ static_library("safe_browsing") {
|
||||
} else {
|
||||
sources += [ "chrome_cleaner/chrome_cleaner_extension_util_win_noop.cc" ]
|
||||
}
|
||||
@@ -1036,14 +1049,14 @@
|
||||
# "Safe Browsing Basic" files used for safe browsing in full mode
|
||||
--- a/chrome/renderer/chrome_content_renderer_client.cc
|
||||
+++ b/chrome/renderer/chrome_content_renderer_client.cc
|
||||
@@ -80,7 +80,6 @@
|
||||
@@ -81,7 +81,6 @@
|
||||
#include "components/error_page/common/localized_error.h"
|
||||
#include "components/network_hints/renderer/prescient_networking_dispatcher.h"
|
||||
#include "components/pdf/renderer/pepper_pdf_host.h"
|
||||
-#include "components/safe_browsing/renderer/threat_dom_details.h"
|
||||
#include "components/services/heap_profiling/public/cpp/allocator_shim.h"
|
||||
#include "components/spellcheck/spellcheck_buildflags.h"
|
||||
#include "components/startup_metric_utils/common/startup_metric.mojom.h"
|
||||
#include "components/subresource_filter/content/renderer/subresource_filter_agent.h"
|
||||
--- a/chrome/browser/net/trial_comparison_cert_verifier.cc
|
||||
+++ b/chrome/browser/net/trial_comparison_cert_verifier.cc
|
||||
@@ -80,9 +80,6 @@ void SendTrialVerificationReport(void* p
|
||||
@@ -1157,21 +1170,21 @@
|
||||
return !download_->IsSavePackageDownload() &&
|
||||
--- a/components/safe_browsing/features.cc
|
||||
+++ b/components/safe_browsing/features.cc
|
||||
@@ -24,7 +24,7 @@ const base::Feature kAdSamplerTriggerFea
|
||||
|
||||
@@ -25,7 +25,7 @@ const base::Feature kAdSamplerTriggerFea
|
||||
// Controls the billing interstitial UI.
|
||||
// TODO(http://crbug.com/933807): remove this base::Feature after a full launch.
|
||||
const base::Feature kBillingInterstitial{"BillingInterstitial",
|
||||
- base::FEATURE_ENABLED_BY_DEFAULT};
|
||||
+ base::FEATURE_DISABLED_BY_DEFAULT};
|
||||
|
||||
// If enabled in pre-network-service world, SafeBrowsing URL checks are done by
|
||||
// applying SafeBrowsing's URLLoaderThrottle subclasses to ThrottlingURLLoader.
|
||||
@@ -40,7 +40,7 @@ const base::Feature kForceEnableResetPas
|
||||
@@ -44,7 +44,7 @@ const base::Feature kForceEnableResetPas
|
||||
"ForceEnableResetPasswordWebUI", base::FEATURE_DISABLED_BY_DEFAULT};
|
||||
|
||||
const base::Feature kSuspiciousSiteTriggerQuotaFeature{
|
||||
- "SafeBrowsingSuspiciousSiteTriggerQuota", base::FEATURE_ENABLED_BY_DEFAULT};
|
||||
+ "SafeBrowsingSuspiciousSiteTriggerQuota", base::FEATURE_DISABLED_BY_DEFAULT};
|
||||
|
||||
const base::Feature kThreatDomDetailsTagAndAttributeFeature{
|
||||
"ThreatDomDetailsTagAttributes", base::FEATURE_DISABLED_BY_DEFAULT};
|
||||
const base::Feature kTelemetryForApkDownloads{
|
||||
"SafeBrowsingTelemetryForApkDownloads", base::FEATURE_DISABLED_BY_DEFAULT};
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
--- a/components/autofill/core/browser/autofill_download_manager.cc
|
||||
+++ b/components/autofill/core/browser/autofill_download_manager.cc
|
||||
@@ -625,70 +625,6 @@ AutofillDownloadManager::GetRequestURLAn
|
||||
@@ -619,70 +619,6 @@ AutofillDownloadManager::GetRequestURLAn
|
||||
}
|
||||
|
||||
bool AutofillDownloadManager::StartRequest(FormRequestData request_data) {
|
||||
|
||||
@@ -40,7 +40,7 @@
|
||||
#if defined(OS_CHROMEOS)
|
||||
--- a/chrome/browser/extensions/external_component_loader.cc
|
||||
+++ b/chrome/browser/extensions/external_component_loader.cc
|
||||
@@ -31,9 +31,6 @@ ExternalComponentLoader::~ExternalCompon
|
||||
@@ -29,9 +29,6 @@ ExternalComponentLoader::~ExternalCompon
|
||||
|
||||
void ExternalComponentLoader::StartLoading() {
|
||||
auto prefs = std::make_unique<base::DictionaryValue>();
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
--- a/net/dns/host_resolver_impl.cc
|
||||
+++ b/net/dns/host_resolver_impl.cc
|
||||
@@ -118,10 +118,10 @@ const unsigned kMinimumTTLSeconds = kCac
|
||||
@@ -122,10 +122,10 @@ const unsigned kMinimumTTLSeconds = kCac
|
||||
// cached.
|
||||
const int kIPv6ProbePeriodMs = 1000;
|
||||
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
--- a/components/signin/core/browser/signin_manager.cc
|
||||
+++ b/components/signin/core/browser/signin_manager.cc
|
||||
@@ -329,7 +329,7 @@ void SigninManager::OnGoogleServicesUser
|
||||
@@ -319,7 +319,7 @@ void SigninManager::OnGoogleServicesUser
|
||||
}
|
||||
|
||||
bool SigninManager::IsSigninAllowed() const {
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
--- a/build/config/compiler/compiler.gni
|
||||
+++ b/build/config/compiler/compiler.gni
|
||||
@@ -69,19 +69,19 @@ declare_args() {
|
||||
@@ -74,19 +74,19 @@ declare_args() {
|
||||
# It's currently not possible to collect AFDO profiles on anything but
|
||||
# x86{,_64}.
|
||||
using_mismatched_sample_profile = current_cpu != "x64" && current_cpu != "x86"
|
||||
|
||||
@@ -115,9 +115,9 @@ by default.
|
||||
|
||||
// Obtains the current app window.
|
||||
AppWindow* GetCurrentAppWindow(UIThreadExtensionFunction* function) {
|
||||
--- a/chrome/browser/chromeos/extensions/file_manager/private_api_strings.cc
|
||||
+++ b/chrome/browser/chromeos/extensions/file_manager/private_api_strings.cc
|
||||
@@ -24,26 +24,26 @@ namespace {
|
||||
--- a/chrome/browser/chromeos/file_manager/file_manager_string_util.cc
|
||||
+++ b/chrome/browser/chromeos/file_manager/file_manager_string_util.cc
|
||||
@@ -18,21 +18,21 @@ namespace {
|
||||
|
||||
// Location of the page to buy more storage for Google Drive.
|
||||
const char kGoogleDriveBuyStorageUrl[] =
|
||||
@@ -129,12 +129,6 @@ by default.
|
||||
- "https://support.google.com/chromebook/?p=filemanager_drive";
|
||||
+ "trk:210:https://support.google.com/chromebook/?p=filemanager_drive";
|
||||
|
||||
// Location of Google drive redeem page.
|
||||
const char kGoogleDriveRedeemUrl[] =
|
||||
- "http://www.google.com/intl/en/chrome/devices/goodies.html"
|
||||
+ "trk:211:http://www.google.com/intl/en/chrome/devices/goodies.html"
|
||||
"?utm_source=filesapp&utm_medium=banner&utm_campaign=gsg";
|
||||
|
||||
// Location of Google Drive specific help.
|
||||
const char kGoogleDriveHelpUrl[] =
|
||||
- "https://support.google.com/chromebook/?p=filemanager_drivehelp";
|
||||
@@ -196,7 +190,7 @@ by default.
|
||||
ProfileAvatarDownloader::ProfileAvatarDownloader(
|
||||
--- a/chrome/browser/resources/chromeos/chromevox/chromevox/background/prefs.js
|
||||
+++ b/chrome/browser/resources/chromeos/chromevox/chromevox/background/prefs.js
|
||||
@@ -84,9 +84,9 @@ cvox.ChromeVoxPrefs.DEFAULT_PREFS = {
|
||||
@@ -85,9 +85,9 @@ cvox.ChromeVoxPrefs.DEFAULT_PREFS = {
|
||||
'position': '{}',
|
||||
'siteSpecificEnhancements': true,
|
||||
'siteSpecificScriptBase':
|
||||
@@ -278,7 +272,7 @@ by default.
|
||||
base::ToLowerASCII(bdict_file));
|
||||
--- a/chrome/browser/supervised_user/supervised_user_service.cc
|
||||
+++ b/chrome/browser/supervised_user/supervised_user_service.cc
|
||||
@@ -81,7 +81,7 @@ namespace {
|
||||
@@ -82,7 +82,7 @@ namespace {
|
||||
|
||||
// The URL from which to download a host blacklist if no local one exists yet.
|
||||
const char kBlacklistURL[] =
|
||||
@@ -335,7 +329,7 @@ by default.
|
||||
SkColor GetThemeColor(const ui::ThemeProvider& tp, int id) {
|
||||
--- a/chrome/common/extensions/chrome_extensions_client.cc
|
||||
+++ b/chrome/common/extensions/chrome_extensions_client.cc
|
||||
@@ -46,9 +46,9 @@ namespace {
|
||||
@@ -45,9 +45,9 @@ namespace {
|
||||
|
||||
// TODO(battre): Delete the HTTP URL once the blacklist is downloaded via HTTPS.
|
||||
const char kExtensionBlocklistUrlPrefix[] =
|
||||
@@ -349,7 +343,7 @@ by default.
|
||||
|
||||
--- a/chrome/common/url_constants.cc
|
||||
+++ b/chrome/common/url_constants.cc
|
||||
@@ -222,7 +222,7 @@ const char kSyncErrorsHelpURL[] =
|
||||
@@ -221,7 +221,7 @@ const char kSyncErrorsHelpURL[] =
|
||||
"https://support.google.com/chrome/?p=settings_sync_error";
|
||||
|
||||
const char kSyncGoogleDashboardURL[] =
|
||||
@@ -358,7 +352,7 @@ by default.
|
||||
|
||||
const char kSyncLearnMoreURL[] =
|
||||
"https://support.google.com/chrome/?p=settings_sign_in";
|
||||
@@ -311,7 +311,7 @@ const char kArcTermsURLPath[] = "arc/ter
|
||||
@@ -310,7 +310,7 @@ const char kArcTermsURLPath[] = "arc/ter
|
||||
const char kArcPrivacyPolicyURLPath[] = "arc/privacy_policy";
|
||||
|
||||
const char kOnlineEulaURLPath[] =
|
||||
@@ -568,7 +562,7 @@ by default.
|
||||
|
||||
--- a/components/policy/resources/policy_templates.json
|
||||
+++ b/components/policy/resources/policy_templates.json
|
||||
@@ -3071,7 +3071,7 @@
|
||||
@@ -3317,7 +3317,7 @@
|
||||
'dynamic_refresh': True,
|
||||
'per_profile': True,
|
||||
},
|
||||
@@ -577,7 +571,7 @@ by default.
|
||||
'id': 34,
|
||||
'caption': '''Configure the list of force-installed apps and extensions''',
|
||||
'tags': ['full-admin-access'],
|
||||
@@ -6717,7 +6717,7 @@
|
||||
@@ -7091,7 +7091,7 @@
|
||||
'features': {
|
||||
'dynamic_refresh': True,
|
||||
},
|
||||
@@ -599,7 +593,7 @@ by default.
|
||||
|
||||
--- a/components/search_engines/prepopulated_engines.json
|
||||
+++ b/components/search_engines/prepopulated_engines.json
|
||||
@@ -122,7 +122,7 @@
|
||||
@@ -108,7 +108,7 @@
|
||||
"google": {
|
||||
"name": "Google",
|
||||
"keyword": "google.com",
|
||||
@@ -628,7 +622,7 @@ by default.
|
||||
+const char kSecurityOrigin[] = "trk:220:https://translate.googleapis.com/";
|
||||
|
||||
void ToTranslateLanguageSynonym(std::string* language) {
|
||||
for (size_t i = 0; i < arraysize(kLanguageCodeSimilitudes); ++i) {
|
||||
for (size_t i = 0; i < base::size(kLanguageCodeSimilitudes); ++i) {
|
||||
--- a/components/variations/variations_url_constants.cc
|
||||
+++ b/components/variations/variations_url_constants.cc
|
||||
@@ -8,7 +8,7 @@ namespace variations {
|
||||
@@ -742,15 +736,15 @@ by default.
|
||||
std::string MakeMCSEndpoint(const std::string& mcs_hostname, int port) {
|
||||
--- a/jingle/notifier/base/gaia_token_pre_xmpp_auth.cc
|
||||
+++ b/jingle/notifier/base/gaia_token_pre_xmpp_auth.cc
|
||||
@@ -33,7 +33,7 @@ class GaiaCookieMechanism : public buzz:
|
||||
@@ -33,7 +33,7 @@ class GaiaCookieMechanism : public jingl
|
||||
// These attributes are necessary for working with non-gmail gaia
|
||||
// accounts.
|
||||
const std::string NS_GOOGLE_AUTH_PROTOCOL(
|
||||
- "http://www.google.com/talk/protocol/auth");
|
||||
+ "trk:179:http://www.google.com/talk/protocol/auth");
|
||||
const buzz::QName QN_GOOGLE_ALLOW_GENERATED_JID_XMPP_LOGIN(
|
||||
const jingle_xmpp::QName QN_GOOGLE_ALLOW_GENERATED_JID_XMPP_LOGIN(
|
||||
NS_GOOGLE_AUTH_PROTOCOL, "allow-generated-jid");
|
||||
const buzz::QName QN_GOOGLE_AUTH_CLIENT_USES_FULL_BIND_RESULT(
|
||||
const jingle_xmpp::QName QN_GOOGLE_AUTH_CLIENT_USES_FULL_BIND_RESULT(
|
||||
--- a/remoting/base/breakpad_mac.mm
|
||||
+++ b/remoting/base/breakpad_mac.mm
|
||||
@@ -56,7 +56,7 @@ void InitializeCrashReporting() {
|
||||
|
||||
@@ -22,7 +22,7 @@ References: https://github.com/iridium-browser/iridium-browser/issues/33
|
||||
|
||||
--- a/chrome/browser/signin/signin_promo.cc
|
||||
+++ b/chrome/browser/signin/signin_promo.cc
|
||||
@@ -130,6 +130,7 @@ const char kSigninPromoLandingURLSuccess
|
||||
@@ -86,6 +86,7 @@ const char kSigninPromoLandingURLSuccess
|
||||
|
||||
bool ShouldShowPromoAtStartup(Profile* profile, bool is_new_profile) {
|
||||
DCHECK(profile);
|
||||
|
||||
@@ -43,9 +43,9 @@ the URL so we get notified if this happens again in the future).
|
||||
--- a/chrome/browser/safe_browsing/safe_browsing_blocking_page.cc
|
||||
+++ b/chrome/browser/safe_browsing/safe_browsing_blocking_page.cc
|
||||
@@ -59,8 +59,7 @@ class SafeBrowsingBlockingPageFactoryImp
|
||||
Profile* profile =
|
||||
Profile::FromBrowserContext(web_contents->GetBrowserContext());
|
||||
PrefService* prefs = profile->GetPrefs();
|
||||
PrefService* prefs =
|
||||
Profile::FromBrowserContext(web_contents->GetBrowserContext())
|
||||
->GetPrefs();
|
||||
- bool is_extended_reporting_opt_in_allowed =
|
||||
- IsExtendedReportingOptInAllowed(*prefs);
|
||||
+ bool is_extended_reporting_opt_in_allowed = false;
|
||||
|
||||
@@ -36,7 +36,7 @@
|
||||
GURL rewritten_tab_url = tab_url;
|
||||
--- a/components/omnibox/browser/autocomplete_input.cc
|
||||
+++ b/components/omnibox/browser/autocomplete_input.cc
|
||||
@@ -491,7 +491,8 @@ void AutocompleteInput::ParseForEmphasiz
|
||||
@@ -479,7 +479,8 @@ void AutocompleteInput::ParseForEmphasiz
|
||||
int after_scheme_and_colon = parts.scheme.end() + 1;
|
||||
// For the view-source scheme, we should emphasize the scheme and host of the
|
||||
// URL qualified by the view-source prefix.
|
||||
@@ -46,7 +46,7 @@
|
||||
(static_cast<int>(text.length()) > after_scheme_and_colon)) {
|
||||
// Obtain the URL prefixed by view-source and parse it.
|
||||
base::string16 real_url(text.substr(after_scheme_and_colon));
|
||||
@@ -564,7 +565,9 @@ int AutocompleteInput::NumNonHostCompone
|
||||
@@ -552,7 +553,9 @@ int AutocompleteInput::NumNonHostCompone
|
||||
bool AutocompleteInput::HasHTTPScheme(const base::string16& input) {
|
||||
std::string utf8_input(base::UTF16ToUTF8(input));
|
||||
url::Component scheme;
|
||||
@@ -59,7 +59,7 @@
|
||||
return url::FindAndCompareScheme(utf8_input, url::kHttpScheme, nullptr);
|
||||
--- a/content/browser/child_process_security_policy_impl.cc
|
||||
+++ b/content/browser/child_process_security_policy_impl.cc
|
||||
@@ -386,6 +386,7 @@ ChildProcessSecurityPolicyImpl::ChildPro
|
||||
@@ -451,6 +451,7 @@ ChildProcessSecurityPolicyImpl::ChildPro
|
||||
RegisterWebSafeScheme(url::kHttpsScheme);
|
||||
RegisterWebSafeScheme(url::kFtpScheme);
|
||||
RegisterWebSafeScheme(url::kDataScheme);
|
||||
@@ -77,7 +77,7 @@
|
||||
#include "base/strings/utf_string_conversions.h"
|
||||
#include "base/synchronization/lock.h"
|
||||
#include "base/threading/thread_task_runner_handle.h"
|
||||
@@ -44,6 +45,7 @@
|
||||
@@ -43,6 +44,7 @@
|
||||
#include "net/url_request/url_request_redirect_job.h"
|
||||
#include "url/gurl.h"
|
||||
#include "url/origin.h"
|
||||
@@ -85,7 +85,7 @@
|
||||
|
||||
using base::Time;
|
||||
using std::string;
|
||||
@@ -602,6 +604,12 @@ URLRequest::URLRequest(const GURL& url,
|
||||
@@ -606,6 +608,12 @@ URLRequest::URLRequest(const GURL& url,
|
||||
// Sanity check out environment.
|
||||
DCHECK(base::ThreadTaskRunnerHandle::IsSet());
|
||||
|
||||
@@ -110,13 +110,13 @@
|
||||
|
||||
--- a/url/url_constants.h
|
||||
+++ b/url/url_constants.h
|
||||
@@ -30,6 +30,7 @@ URL_EXPORT extern const char kHttpScheme
|
||||
URL_EXPORT extern const char kHttpsScheme[];
|
||||
URL_EXPORT extern const char kJavaScriptScheme[];
|
||||
URL_EXPORT extern const char kMailToScheme[];
|
||||
+URL_EXPORT extern const char kTraceScheme[];
|
||||
URL_EXPORT extern const char kWsScheme[];
|
||||
URL_EXPORT extern const char kWssScheme[];
|
||||
@@ -30,6 +30,7 @@ COMPONENT_EXPORT(URL) extern const char
|
||||
COMPONENT_EXPORT(URL) extern const char kHttpsScheme[];
|
||||
COMPONENT_EXPORT(URL) extern const char kJavaScriptScheme[];
|
||||
COMPONENT_EXPORT(URL) extern const char kMailToScheme[];
|
||||
+COMPONENT_EXPORT(URL) extern const char kTraceScheme[];
|
||||
COMPONENT_EXPORT(URL) extern const char kWsScheme[];
|
||||
COMPONENT_EXPORT(URL) extern const char kWssScheme[];
|
||||
|
||||
--- a/components/url_formatter/url_fixer.cc
|
||||
+++ b/components/url_formatter/url_fixer.cc
|
||||
@@ -133,7 +133,7 @@
|
||||
return GURL(parts.scheme.is_valid() ? text : FixupPath(text));
|
||||
--- a/net/BUILD.gn
|
||||
+++ b/net/BUILD.gn
|
||||
@@ -1692,6 +1692,8 @@ component("net") {
|
||||
@@ -1731,6 +1731,8 @@ component("net") {
|
||||
"url_request/report_sender.h",
|
||||
"url_request/static_http_user_agent_settings.cc",
|
||||
"url_request/static_http_user_agent_settings.h",
|
||||
@@ -144,7 +144,7 @@
|
||||
"url_request/url_fetcher_core.cc",
|
||||
--- a/android_webview/browser/net/aw_url_request_context_getter.cc
|
||||
+++ b/android_webview/browser/net/aw_url_request_context_getter.cc
|
||||
@@ -62,6 +62,7 @@
|
||||
@@ -60,6 +60,7 @@
|
||||
#include "net/ssl/ssl_config_service.h"
|
||||
#include "net/url_request/data_protocol_handler.h"
|
||||
#include "net/url_request/file_protocol_handler.h"
|
||||
@@ -152,7 +152,7 @@
|
||||
#include "net/url_request/url_request_context.h"
|
||||
#include "net/url_request/url_request_context_builder.h"
|
||||
#include "net/url_request/url_request_intercepting_job_factory.h"
|
||||
@@ -137,6 +138,9 @@ std::unique_ptr<net::URLRequestJobFactor
|
||||
@@ -136,6 +137,9 @@ std::unique_ptr<net::URLRequestJobFactor
|
||||
url::kDataScheme, std::make_unique<net::DataProtocolHandler>());
|
||||
DCHECK(set_protocol);
|
||||
set_protocol = aw_job_factory->SetProtocolHandler(
|
||||
@@ -164,7 +164,7 @@
|
||||
DCHECK(set_protocol);
|
||||
--- a/chrome/browser/profiles/profile_io_data.cc
|
||||
+++ b/chrome/browser/profiles/profile_io_data.cc
|
||||
@@ -97,6 +97,7 @@
|
||||
@@ -96,6 +96,7 @@
|
||||
#include "net/url_request/data_protocol_handler.h"
|
||||
#include "net/url_request/file_protocol_handler.h"
|
||||
#include "net/url_request/ftp_protocol_handler.h"
|
||||
@@ -172,7 +172,7 @@
|
||||
#include "net/url_request/url_request.h"
|
||||
#include "net/url_request/url_request_context.h"
|
||||
#include "net/url_request/url_request_context_builder.h"
|
||||
@@ -1097,6 +1098,9 @@ ProfileIOData::SetUpJobFactoryDefaults(
|
||||
@@ -1060,6 +1061,9 @@ ProfileIOData::SetUpJobFactoryDefaults(
|
||||
set_protocol = job_factory->SetProtocolHandler(
|
||||
url::kDataScheme, std::make_unique<net::DataProtocolHandler>());
|
||||
DCHECK(set_protocol);
|
||||
@@ -269,7 +269,7 @@
|
||||
+#endif // NET_URL_REQUEST_TRK_PROTOCOL_HANDLER_H_
|
||||
--- a/net/url_request/url_request_context_builder.cc
|
||||
+++ b/net/url_request/url_request_context_builder.cc
|
||||
@@ -40,6 +40,7 @@
|
||||
@@ -38,6 +38,7 @@
|
||||
#include "net/ssl/ssl_config_service_defaults.h"
|
||||
#include "net/url_request/data_protocol_handler.h"
|
||||
#include "net/url_request/static_http_user_agent_settings.h"
|
||||
@@ -277,7 +277,7 @@
|
||||
#include "net/url_request/url_request_context.h"
|
||||
#include "net/url_request/url_request_context_storage.h"
|
||||
#include "net/url_request/url_request_intercepting_job_factory.h"
|
||||
@@ -653,6 +654,8 @@ std::unique_ptr<URLRequestContext> URLRe
|
||||
@@ -643,6 +644,8 @@ std::unique_ptr<URLRequestContext> URLRe
|
||||
if (data_enabled_)
|
||||
job_factory->SetProtocolHandler(url::kDataScheme,
|
||||
std::make_unique<DataProtocolHandler>());
|
||||
|
||||
@@ -554,7 +554,7 @@
|
||||
- config->collectors.push_back(
|
||||
- std::make_unique<GURL>(config->origin.ReplaceComponents(replacements)));
|
||||
- }
|
||||
- for (size_t i = 0; i < arraysize(kGoogleStandardCollectors); i++)
|
||||
- for (size_t i = 0; i < base::size(kGoogleStandardCollectors); i++)
|
||||
- config->collectors.push_back(
|
||||
- std::make_unique<GURL>(kGoogleStandardCollectors[i]));
|
||||
- config->success_sample_rate = 0.05;
|
||||
|
||||
@@ -3,7 +3,7 @@
|
||||
|
||||
--- a/google_apis/gaia/gaia_auth_fetcher.cc
|
||||
+++ b/google_apis/gaia/gaia_auth_fetcher.cc
|
||||
@@ -269,61 +269,6 @@ void GaiaAuthFetcher::CreateAndStartGaia
|
||||
@@ -259,61 +259,6 @@ void GaiaAuthFetcher::CreateAndStartGaia
|
||||
int load_flags,
|
||||
const net::NetworkTrafficAnnotationTag& traffic_annotation) {
|
||||
DCHECK(!fetch_pending_) << "Tried to fetch two things at once!";
|
||||
@@ -69,8 +69,8 @@
|
||||
+++ b/chrome/browser/resources/component_extension_resources.grd
|
||||
@@ -32,8 +32,6 @@
|
||||
|
||||
<!-- Material Design Bookmarks -->
|
||||
<include name="IDR_COMPONENT_MD_BOOKMARKS_BOOKMARKS_HTML" file="md_bookmarks/bookmarks.html" type="BINDATA" />
|
||||
<!-- Bookmarks -->
|
||||
<include name="IDR_COMPONENT_BOOKMARKS_BOOKMARKS_HTML" file="bookmarks/bookmarks.html" type="BINDATA" />
|
||||
- <!-- Gaia auth extension -->
|
||||
- <include name="IDR_GAIA_AUTH_SUCCESS" file="gaia_auth/success.html" allowexternalscript="true" type="BINDATA" />
|
||||
<!-- Hangout Services extension, included in Google Chrome builds only. -->
|
||||
@@ -120,7 +120,7 @@
|
||||
source->AddLocalizedString(
|
||||
--- a/chrome/browser/browser_resources.grd
|
||||
+++ b/chrome/browser/browser_resources.grd
|
||||
@@ -332,7 +332,6 @@
|
||||
@@ -384,7 +384,6 @@
|
||||
<include name="IDR_INLINE_LOGIN_HTML" file="resources\inline_login\inline_login.html" flattenhtml="true" allowexternalscript="true" type="BINDATA" />
|
||||
<include name="IDR_INLINE_LOGIN_CSS" file="resources\inline_login\inline_login.css" flattenhtml="true" type="BINDATA" />
|
||||
<include name="IDR_INLINE_LOGIN_JS" file="resources\inline_login\inline_login.js" flattenhtml="true" type="BINDATA" />
|
||||
@@ -128,7 +128,7 @@
|
||||
<include name="IDR_INSPECT_CSS" file="resources\inspect\inspect.css" flattenhtml="true" type="BINDATA" />
|
||||
<include name="IDR_INSPECT_HTML" file="resources\inspect\inspect.html" flattenhtml="true" allowexternalscript="true" type="BINDATA" />
|
||||
<include name="IDR_INSPECT_JS" file="resources\inspect\inspect.js" flattenhtml="true" type="BINDATA" />
|
||||
@@ -453,7 +452,6 @@
|
||||
@@ -487,7 +486,6 @@
|
||||
<include name="IDR_WEBRTC_LOGS_JS" file="resources\media\webrtc_logs.js" type="BINDATA" />
|
||||
<include name="IDR_WEBSTORE_MANIFEST" file="resources\webstore_app\manifest.json" type="BINDATA" />
|
||||
<include name="IDR_CRYPTOTOKEN_MANIFEST" file="resources\cryptotoken\manifest.json" type="BINDATA" />
|
||||
|
||||
@@ -151,7 +151,7 @@
|
||||
bool IsGoogleSearchResultUrl(const GURL& url) {
|
||||
--- a/components/search_engines/template_url.cc
|
||||
+++ b/components/search_engines/template_url.cc
|
||||
@@ -505,11 +505,7 @@ base::string16 TemplateURLRef::SearchTer
|
||||
@@ -504,11 +504,7 @@ base::string16 TemplateURLRef::SearchTer
|
||||
bool TemplateURLRef::HasGoogleBaseURLs(
|
||||
const SearchTermsData& search_terms_data) const {
|
||||
ParseIfNecessary(search_terms_data);
|
||||
@@ -565,7 +565,7 @@
|
||||
#endif
|
||||
--- a/chrome/renderer/chrome_content_renderer_client.cc
|
||||
+++ b/chrome/renderer/chrome_content_renderer_client.cc
|
||||
@@ -1610,7 +1610,7 @@ void ChromeContentRendererClient::WillDe
|
||||
@@ -1547,7 +1547,7 @@ void ChromeContentRendererClient::WillDe
|
||||
|
||||
bool ChromeContentRendererClient::IsExcludedHeaderForServiceWorkerFetchEvent(
|
||||
const std::string& header_name) {
|
||||
|
||||
@@ -7,7 +7,7 @@
|
||||
|
||||
--- a/chrome/BUILD.gn
|
||||
+++ b/chrome/BUILD.gn
|
||||
@@ -327,7 +327,6 @@ if (!is_android && !is_mac) {
|
||||
@@ -332,7 +332,6 @@ if (!is_android && !is_mac) {
|
||||
}
|
||||
|
||||
data_deps += [
|
||||
@@ -15,7 +15,7 @@
|
||||
"//third_party/widevine/cdm",
|
||||
]
|
||||
|
||||
@@ -1251,7 +1250,6 @@ if (is_win) {
|
||||
@@ -1258,7 +1257,6 @@ if (is_win) {
|
||||
":swiftshader_library",
|
||||
":widevine_cdm_library",
|
||||
"//chrome/app/nibs:chrome_xibs",
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
|
||||
--- a/components/signin/core/browser/signin_manager_base.cc
|
||||
+++ b/components/signin/core/browser/signin_manager_base.cc
|
||||
@@ -152,7 +152,7 @@ void SigninManagerBase::Initialize(PrefS
|
||||
@@ -158,7 +158,7 @@ void SigninManagerBase::FinalizeInitBefo
|
||||
bool SigninManagerBase::IsInitialized() const { return initialized_; }
|
||||
|
||||
bool SigninManagerBase::IsSigninAllowed() const {
|
||||
@@ -13,27 +13,12 @@
|
||||
AccountInfo SigninManagerBase::GetAuthenticatedAccountInfo() const {
|
||||
--- a/chrome/browser/ui/chrome_pages.cc
|
||||
+++ b/chrome/browser/ui/chrome_pages.cc
|
||||
@@ -72,12 +72,6 @@ void OpenBookmarkManagerForNode(Browser*
|
||||
ShowSingletonTabOverwritingNTP(browser, std::move(params));
|
||||
}
|
||||
|
||||
-void NavigateToSingletonTab(Browser* browser, const GURL& url) {
|
||||
- NavigateParams params(GetSingletonTabNavigateParams(browser, url));
|
||||
- params.path_behavior = NavigateParams::IGNORE_AND_NAVIGATE;
|
||||
- ShowSingletonTabOverwritingNTP(browser, std::move(params));
|
||||
-}
|
||||
-
|
||||
// Shows either the help app or the appropriate help page for |source|. If
|
||||
// |browser| is NULL and the help page is used (vs the app), the help page is
|
||||
// shown in the last active browser. If there is no such browser, a new browser
|
||||
@@ -383,57 +377,6 @@ void ShowSearchEngineSettings(Browser* b
|
||||
@@ -379,34 +379,6 @@ void ShowSearchEngineSettings(Browser* b
|
||||
#if !defined(OS_ANDROID)
|
||||
void ShowBrowserSignin(Browser* browser,
|
||||
signin_metrics::AccessPoint access_point) {
|
||||
- Profile* original_profile = browser->profile()->GetOriginalProfile();
|
||||
- SigninManagerBase* manager =
|
||||
- SigninManagerFactory::GetForProfile(original_profile);
|
||||
- DCHECK(manager->IsSigninAllowed());
|
||||
- DCHECK(original_profile->GetPrefs()->GetBoolean(prefs::kSigninAllowed));
|
||||
-
|
||||
- // If the browser's profile is an incognito profile, make sure to use
|
||||
- // a browser window from the original profile. The user cannot sign in
|
||||
@@ -44,43 +29,22 @@
|
||||
-
|
||||
-#if defined(OS_CHROMEOS)
|
||||
- // ChromeOS always loads the chrome://chrome-signin in a tab.
|
||||
- const bool show_full_tab_chrome_signin_page = true;
|
||||
- GURL url = signin::GetEmbeddedPromoURLForTab(
|
||||
- access_point, signin_metrics::Reason::REASON_SIGNIN_PRIMARY_ACCOUNT,
|
||||
- false);
|
||||
- NavigateParams params(GetSingletonTabNavigateParams(browser, url));
|
||||
- params.path_behavior = NavigateParams::IGNORE_AND_NAVIGATE;
|
||||
- ShowSingletonTabOverwritingNTP(browser, std::move(params));
|
||||
- DCHECK_GT(browser->tab_strip_model()->count(), 0);
|
||||
-#else
|
||||
- // When Desktop Identity Consistency (aka DICE) is not enabled, Chrome uses
|
||||
- // a modal sign-in dialog for signing in. This sign-in modal dialog is
|
||||
- // presented as a tab-modal dialog (which is automatically dismissed when
|
||||
- // the page navigates). Displaying the dialog on a new tab that loads any
|
||||
- // page will lead to it being dismissed as soon as the new tab is loaded.
|
||||
- // So the sign-in dialog must only be presented on top of an existing tab.
|
||||
- //
|
||||
- // If ScopedTabbedBrowserDisplayer had to create a (non-incognito) Browser*,
|
||||
- // it won't have any tabs yet. Fallback to the full-tab sign-in flow in this
|
||||
- // case.
|
||||
- const bool show_full_tab_chrome_signin_page =
|
||||
- !signin::DiceMethodGreaterOrEqual(
|
||||
- AccountConsistencyModeManager::GetMethodForProfile(
|
||||
- browser->profile()),
|
||||
- signin::AccountConsistencyMethod::kDiceMigration) &&
|
||||
- browser->tab_strip_model()->empty();
|
||||
-#endif // defined(OS_CHROMEOS)
|
||||
- if (show_full_tab_chrome_signin_page) {
|
||||
- NavigateToSingletonTab(
|
||||
- browser,
|
||||
- signin::GetPromoURLForTab(
|
||||
- access_point, signin_metrics::Reason::REASON_SIGNIN_PRIMARY_ACCOUNT,
|
||||
- false));
|
||||
- DCHECK_GT(browser->tab_strip_model()->count(), 0);
|
||||
- } else {
|
||||
-#if defined(OS_CHROMEOS)
|
||||
- NOTREACHED();
|
||||
-#else
|
||||
- profiles::BubbleViewMode bubble_view_mode =
|
||||
- manager->IsAuthenticated() ? profiles::BUBBLE_VIEW_MODE_GAIA_REAUTH
|
||||
- : profiles::BUBBLE_VIEW_MODE_GAIA_SIGNIN;
|
||||
- browser->signin_view_controller()->ShowSignin(bubble_view_mode, browser,
|
||||
- access_point);
|
||||
- profiles::BubbleViewMode bubble_view_mode =
|
||||
- IdentityManagerFactory::GetForProfile(original_profile)
|
||||
- ->HasPrimaryAccount()
|
||||
- ? profiles::BUBBLE_VIEW_MODE_GAIA_REAUTH
|
||||
- : profiles::BUBBLE_VIEW_MODE_GAIA_SIGNIN;
|
||||
- browser->signin_view_controller()->ShowSignin(bubble_view_mode, browser,
|
||||
- access_point);
|
||||
-#endif
|
||||
- }
|
||||
}
|
||||
|
||||
void ShowBrowserSigninOrSettings(Browser* browser,
|
||||
|
||||
@@ -2,9 +2,9 @@
|
||||
|
||||
--- a/components/translate/core/browser/translate_manager.cc
|
||||
+++ b/components/translate/core/browser/translate_manager.cc
|
||||
@@ -134,8 +134,7 @@ void TranslateManager::InitiateTranslati
|
||||
@@ -664,8 +664,7 @@ void TranslateManager::FilterIsTranslate
|
||||
if (net::NetworkChangeNotifier::IsOffline())
|
||||
return;
|
||||
decision->PreventAllTriggering();
|
||||
|
||||
- if (!ignore_missing_key_for_testing_ &&
|
||||
- !::google_apis::HasAPIKeyConfigured()) {
|
||||
@@ -14,7 +14,7 @@
|
||||
// that settings syncs and we don't want to turn off translate everywhere
|
||||
--- a/components/translate/content/renderer/translate_helper.cc
|
||||
+++ b/components/translate/content/renderer/translate_helper.cc
|
||||
@@ -75,8 +75,7 @@ TranslateHelper::TranslateHelper(content
|
||||
@@ -79,8 +79,7 @@ TranslateHelper::TranslateHelper(content
|
||||
extension_scheme_(extension_scheme),
|
||||
binding_(this),
|
||||
weak_method_factory_(this) {
|
||||
|
||||
@@ -82,7 +82,7 @@
|
||||
|
||||
--- a/rlz/lib/financial_ping.cc
|
||||
+++ b/rlz/lib/financial_ping.cc
|
||||
@@ -339,7 +339,7 @@ FinancialPing::PingResponse FinancialPin
|
||||
@@ -338,7 +338,7 @@ FinancialPing::PingResponse FinancialPin
|
||||
|
||||
// Open network connection.
|
||||
InternetHandle connection_handle = InternetConnectA(inet_handle,
|
||||
@@ -91,7 +91,7 @@
|
||||
INTERNET_FLAG_NO_CACHE_WRITE, 0);
|
||||
if (!connection_handle)
|
||||
return PING_FAILURE;
|
||||
@@ -383,7 +383,7 @@ FinancialPing::PingResponse FinancialPin
|
||||
@@ -382,7 +382,7 @@ FinancialPing::PingResponse FinancialPin
|
||||
return PING_SUCCESSFUL;
|
||||
#else
|
||||
std::string url =
|
||||
|
||||
@@ -2,12 +2,11 @@
|
||||
|
||||
--- a/chrome/browser/media/webrtc/webrtc_log_uploader.cc
|
||||
+++ b/chrome/browser/media/webrtc/webrtc_log_uploader.cc
|
||||
@@ -121,30 +121,11 @@ void WebRtcLogUploader::LoggingStoppedDo
|
||||
@@ -129,29 +129,11 @@ void WebRtcLogUploader::LoggingStoppedDo
|
||||
DCHECK(meta_data.get());
|
||||
DCHECK(!upload_done_data.log_path.empty());
|
||||
|
||||
- std::string compressed_log;
|
||||
- CompressLog(&compressed_log, log_buffer.get());
|
||||
- std::string compressed_log = CompressLog(log_buffer.get());
|
||||
-
|
||||
- std::string local_log_id;
|
||||
-
|
||||
@@ -30,11 +29,11 @@
|
||||
- upload_done_data_with_log_id.local_log_id = local_log_id;
|
||||
- PrepareMultipartPostData(compressed_log, std::move(meta_data),
|
||||
- upload_done_data_with_log_id);
|
||||
+ NotifyUploadDone(net::HTTP_OK, "", upload_done_data);
|
||||
+ NotifyUploadDoneAndLogStats(net::HTTP_OK, net::OK, "", upload_done_data);
|
||||
}
|
||||
|
||||
void WebRtcLogUploader::PrepareMultipartPostData(
|
||||
@@ -155,27 +136,7 @@ void WebRtcLogUploader::PrepareMultipart
|
||||
@@ -162,27 +144,7 @@ void WebRtcLogUploader::PrepareMultipart
|
||||
DCHECK(!compressed_log.empty());
|
||||
DCHECK(meta_data.get());
|
||||
|
||||
@@ -50,7 +49,7 @@
|
||||
- // implemented according to the test plan. http://crbug.com/257329.
|
||||
- if (post_data_) {
|
||||
- *post_data_ = *post_data;
|
||||
- NotifyUploadDone(net::HTTP_OK, "", upload_done_data);
|
||||
- NotifyUploadDoneAndLogStats(net::HTTP_OK, net::OK, "", upload_done_data);
|
||||
- return;
|
||||
- }
|
||||
-
|
||||
@@ -59,11 +58,11 @@
|
||||
- base::BindOnce(&WebRtcLogUploader::UploadCompressedLog,
|
||||
- base::Unretained(this), upload_done_data,
|
||||
- std::move(post_data)));
|
||||
+ NotifyUploadDone(net::HTTP_OK, "", upload_done_data);
|
||||
+ NotifyUploadDoneAndLogStats(net::HTTP_OK, net::OK, "", upload_done_data);
|
||||
}
|
||||
|
||||
void WebRtcLogUploader::UploadStoredLog(
|
||||
@@ -246,48 +207,6 @@ void WebRtcLogUploader::LoggingStoppedDo
|
||||
@@ -253,47 +215,6 @@ void WebRtcLogUploader::LoggingStoppedDo
|
||||
|
||||
webrtc_logging::DeleteOldWebRtcLogFiles(log_paths.log_path);
|
||||
|
||||
@@ -72,8 +71,7 @@
|
||||
- log_paths.log_path);
|
||||
-
|
||||
- // Store the native log with a ".gz" extension.
|
||||
- std::string compressed_log;
|
||||
- CompressLog(&compressed_log, log_buffer.get());
|
||||
- std::string compressed_log = CompressLog(log_buffer.get());
|
||||
- base::FilePath native_log_path =
|
||||
- log_paths.log_path.AppendASCII(log_id).AddExtension(
|
||||
- FILE_PATH_LITERAL(".gz"));
|
||||
|
||||
@@ -30,7 +30,7 @@
|
||||
|
||||
--- a/extensions/browser/updater/extension_downloader.cc
|
||||
+++ b/extensions/browser/updater/extension_downloader.cc
|
||||
@@ -90,27 +90,18 @@ const char kNotFromWebstoreInstallSource
|
||||
@@ -95,27 +95,18 @@ const char kNotFromWebstoreInstallSource
|
||||
const char kDefaultInstallSource[] = "";
|
||||
const char kReinstallInstallSource[] = "reinstall";
|
||||
|
||||
@@ -60,7 +60,7 @@
|
||||
|
||||
bool ShouldRetryRequest(const network::SimpleURLLoader* loader) {
|
||||
DCHECK(loader);
|
||||
@@ -292,12 +283,6 @@ void ExtensionDownloader::DoStartAllPend
|
||||
@@ -298,12 +289,6 @@ void ExtensionDownloader::DoStartAllPend
|
||||
ReportStats();
|
||||
url_stats_ = URLStats();
|
||||
|
||||
@@ -73,7 +73,7 @@
|
||||
fetches_preparing_.clear();
|
||||
}
|
||||
|
||||
@@ -331,23 +316,16 @@ bool ExtensionDownloader::AddExtensionDa
|
||||
@@ -335,23 +320,16 @@ bool ExtensionDownloader::AddExtensionDa
|
||||
return false;
|
||||
}
|
||||
|
||||
@@ -99,7 +99,7 @@
|
||||
} else {
|
||||
url_stats_.other_url_count++;
|
||||
}
|
||||
@@ -612,13 +590,9 @@ void ExtensionDownloader::OnManifestLoad
|
||||
@@ -616,13 +594,9 @@ void ExtensionDownloader::OnManifestLoad
|
||||
const int error =
|
||||
response_code == -1 ? loader->NetError() : response_code;
|
||||
const std::string uma_histogram_name =
|
||||
@@ -116,7 +116,7 @@
|
||||
const auto& extension_ids =
|
||||
manifests_queue_.active_request()->extension_ids();
|
||||
for (auto it = extension_ids.begin(); it != extension_ids.end(); ++it) {
|
||||
@@ -679,20 +653,6 @@ void ExtensionDownloader::HandleManifest
|
||||
@@ -683,20 +657,6 @@ void ExtensionDownloader::HandleManifest
|
||||
fetch_data->request_ids()));
|
||||
}
|
||||
|
||||
@@ -137,11 +137,11 @@
|
||||
NotifyExtensionsDownloadFailed(
|
||||
no_updates, fetch_data->request_ids(),
|
||||
ExtensionDownloaderDelegate::NO_UPDATE_AVAILABLE);
|
||||
@@ -1098,11 +1058,7 @@ bool ExtensionDownloader::IterateFetchCr
|
||||
@@ -1111,11 +1071,7 @@ bool ExtensionDownloader::IterateFetchCr
|
||||
// fetch.
|
||||
switch (fetch->credentials) {
|
||||
case ExtensionFetch::CREDENTIALS_NONE:
|
||||
- if (fetch->url.DomainIs(kGoogleDotCom) && token_service_) {
|
||||
- if (fetch->url.DomainIs(kGoogleDotCom) && identity_manager_) {
|
||||
- fetch->credentials = ExtensionFetch::CREDENTIALS_OAUTH2_TOKEN;
|
||||
- } else {
|
||||
- fetch->credentials = ExtensionFetch::CREDENTIALS_COOKIES;
|
||||
|
||||
@@ -1,26 +1,26 @@
|
||||
# Fix building without one click signin
|
||||
|
||||
--- a/chrome/browser/ui/sync/one_click_signin_sync_starter.cc
|
||||
+++ b/chrome/browser/ui/sync/one_click_signin_sync_starter.cc
|
||||
@@ -395,6 +395,7 @@ void OneClickSigninSyncStarter::CancelSi
|
||||
}
|
||||
|
||||
void OneClickSigninSyncStarter::ConfirmAndSignin() {
|
||||
--- a/chrome/browser/ui/webui/signin/inline_login_handler_impl.cc
|
||||
+++ b/chrome/browser/ui/webui/signin/inline_login_handler_impl.cc
|
||||
@@ -271,6 +271,7 @@ void InlineSigninHelper::OnClientOAuthSu
|
||||
const ClientOAuthResult& result,
|
||||
Profile* profile,
|
||||
Profile::CreateStatus status) {
|
||||
+#if BUILDFLAG(ENABLE_ONE_CLICK_SIGNIN)
|
||||
SigninManager* signin = SigninManagerFactory::GetForProfile(profile_);
|
||||
if (confirmation_required_ == CONFIRM_UNTRUSTED_SIGNIN) {
|
||||
browser_ = EnsureBrowser(browser_, profile_);
|
||||
@@ -409,6 +410,7 @@ void OneClickSigninSyncStarter::ConfirmA
|
||||
// No confirmation required - just sign in the user.
|
||||
signin->CompletePendingSignin();
|
||||
Browser* browser = nullptr;
|
||||
if (handler_)
|
||||
browser = handler_->GetDesktopBrowser();
|
||||
@@ -381,6 +382,7 @@ void InlineSigninHelper::OnClientOAuthSu
|
||||
OneClickSigninSyncStarter::CURRENT_PROFILE);
|
||||
base::ThreadTaskRunnerHandle::Get()->DeleteSoon(FROM_HERE, this);
|
||||
}
|
||||
+#endif
|
||||
}
|
||||
|
||||
void OneClickSigninSyncStarter::UntrustedSigninConfirmed(
|
||||
void InlineSigninHelper::UntrustedSigninConfirmed(
|
||||
--- a/chrome/browser/ui/sync/one_click_signin_links_delegate_impl.cc
|
||||
+++ b/chrome/browser/ui/sync/one_click_signin_links_delegate_impl.cc
|
||||
@@ -17,13 +17,7 @@ OneClickSigninLinksDelegateImpl::OneClic
|
||||
@@ -17,11 +17,6 @@ OneClickSigninLinksDelegateImpl::OneClic
|
||||
OneClickSigninLinksDelegateImpl::~OneClickSigninLinksDelegateImpl() {}
|
||||
|
||||
void OneClickSigninLinksDelegateImpl::OnLearnMoreLinkClicked(bool is_dialog) {
|
||||
@@ -32,11 +32,9 @@
|
||||
}
|
||||
|
||||
void OneClickSigninLinksDelegateImpl::OnAdvancedLinkClicked() {
|
||||
- chrome::ShowSettingsSubPage(browser_, chrome::kSyncSetupSubPage);
|
||||
}
|
||||
--- a/chrome/browser/ui/BUILD.gn
|
||||
+++ b/chrome/browser/ui/BUILD.gn
|
||||
@@ -2972,8 +2972,6 @@ jumbo_split_static_library("ui") {
|
||||
@@ -3023,8 +3023,6 @@ jumbo_split_static_library("ui") {
|
||||
"views/relaunch_notification/relaunch_required_dialog_view.cc",
|
||||
"views/relaunch_notification/relaunch_required_dialog_view.h",
|
||||
"views/screen_capture_notification_ui_views.cc",
|
||||
@@ -44,4 +42,4 @@
|
||||
- "views/sync/one_click_signin_dialog_view.h",
|
||||
"views/tabs/window_finder.cc",
|
||||
]
|
||||
}
|
||||
deps += [ "//ui/views/window/vector_icons" ]
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
|
||||
--- a/chrome/browser/chrome_content_browser_client.cc
|
||||
+++ b/chrome/browser/chrome_content_browser_client.cc
|
||||
@@ -5009,20 +5009,7 @@ safe_browsing::UrlCheckerDelegate*
|
||||
@@ -5124,20 +5124,7 @@ safe_browsing::UrlCheckerDelegate*
|
||||
ChromeContentBrowserClient::GetSafeBrowsingUrlCheckerDelegate(
|
||||
content::ResourceContext* resource_context) {
|
||||
DCHECK_CURRENTLY_ON(BrowserThread::IO);
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
--- a/components/search_engines/prepopulated_engines.json
|
||||
+++ b/components/search_engines/prepopulated_engines.json
|
||||
@@ -120,22 +120,11 @@
|
||||
@@ -106,22 +106,11 @@
|
||||
},
|
||||
|
||||
"google": {
|
||||
|
||||
@@ -5,7 +5,7 @@
|
||||
|
||||
--- a/third_party/blink/renderer/devtools/BUILD.gn
|
||||
+++ b/third_party/blink/renderer/devtools/BUILD.gn
|
||||
@@ -1161,10 +1161,8 @@ action("generate_devtools_grd") {
|
||||
@@ -1258,10 +1258,8 @@ action("generate_devtools_grd") {
|
||||
devtools_embedder_scripts +
|
||||
[ "$resources_out_dir/devtools_extension_api.js" ]
|
||||
|
||||
|
||||
@@ -9,7 +9,7 @@
|
||||
|
||||
--- a/chrome/browser/about_flags.cc
|
||||
+++ b/chrome/browser/about_flags.cc
|
||||
@@ -131,6 +131,7 @@
|
||||
@@ -132,6 +132,7 @@
|
||||
#include "third_party/blink/public/common/experiments/memory_ablation_experiment.h"
|
||||
#include "third_party/blink/public/common/features.h"
|
||||
#include "third_party/leveldatabase/leveldb_features.h"
|
||||
@@ -17,7 +17,7 @@
|
||||
#include "ui/accessibility/accessibility_switches.h"
|
||||
#include "ui/base/ui_base_features.h"
|
||||
#include "ui/base/ui_base_switches.h"
|
||||
@@ -1317,6 +1318,14 @@ const FeatureEntry kFeatureEntries[] = {
|
||||
@@ -1217,6 +1218,14 @@ const FeatureEntry kFeatureEntries[] = {
|
||||
"Force punycode hostnames",
|
||||
"Force punycode in hostnames instead of Unicode when displaying Internationalized Domain Names (IDNs).",
|
||||
kOsAll, SINGLE_VALUE_TYPE("force-punycode-hostnames")},
|
||||
@@ -42,9 +42,9 @@
|
||||
#include "ui/events/blink/blink_features.h"
|
||||
#include "ui/gfx/switches.h"
|
||||
#include "ui/gl/gl_switches.h"
|
||||
@@ -486,6 +487,11 @@ void SetRuntimeFeaturesDefaultsAndUpdate
|
||||
if (base::FeatureList::IsEnabled(blink::features::kWritableFilesAPI))
|
||||
WebRuntimeFeatures::EnableFeatureFromString("WritableFiles", true);
|
||||
@@ -477,6 +478,11 @@ void SetRuntimeFeaturesDefaultsAndUpdate
|
||||
WebRuntimeFeatures::EnableForbidSyncXHRInPageDismissal(true);
|
||||
}
|
||||
|
||||
+ WebRuntimeFeatures::EnableFingerprintingClientRectsNoise(
|
||||
+ command_line.HasSwitch(switches::kFingerprintingClientRectsNoise));
|
||||
@@ -56,15 +56,15 @@
|
||||
|
||||
--- a/third_party/blink/renderer/core/dom/document.cc
|
||||
+++ b/third_party/blink/renderer/core/dom/document.cc
|
||||
@@ -33,6 +33,7 @@
|
||||
|
||||
@@ -34,6 +34,7 @@
|
||||
#include "base/auto_reset.h"
|
||||
#include "base/macros.h"
|
||||
#include "base/optional.h"
|
||||
+#include "base/rand_util.h"
|
||||
#include "services/metrics/public/cpp/mojo_ukm_recorder.h"
|
||||
#include "services/metrics/public/cpp/ukm_builders.h"
|
||||
#include "services/metrics/public/cpp/ukm_source_id.h"
|
||||
@@ -758,6 +759,15 @@ Document::Document(const DocumentInit& i
|
||||
@@ -770,6 +771,15 @@ Document::Document(const DocumentInit& i
|
||||
#ifndef NDEBUG
|
||||
liveDocumentSet().insert(this);
|
||||
#endif
|
||||
@@ -80,7 +80,7 @@
|
||||
}
|
||||
|
||||
Document::~Document() {
|
||||
@@ -784,6 +794,14 @@ Range* Document::CreateRangeAdjustedToTr
|
||||
@@ -796,6 +806,14 @@ Range* Document::CreateRangeAdjustedToTr
|
||||
Position::BeforeNode(*shadow_host));
|
||||
}
|
||||
|
||||
@@ -97,7 +97,7 @@
|
||||
selector_query_cache_ = std::make_unique<SelectorQueryCache>();
|
||||
--- a/third_party/blink/renderer/core/dom/document.h
|
||||
+++ b/third_party/blink/renderer/core/dom/document.h
|
||||
@@ -418,6 +418,10 @@ class CORE_EXPORT Document : public Cont
|
||||
@@ -389,6 +389,10 @@ class CORE_EXPORT Document : public Cont
|
||||
has_xml_declaration_ = has_xml_declaration ? 1 : 0;
|
||||
}
|
||||
|
||||
@@ -106,9 +106,9 @@
|
||||
+ double GetNoiseFactorY();
|
||||
+
|
||||
String visibilityState() const;
|
||||
mojom::PageVisibilityState GetPageVisibilityState() const;
|
||||
bool IsPageVisible() const;
|
||||
bool hidden() const;
|
||||
@@ -1776,6 +1780,9 @@ class CORE_EXPORT Document : public Cont
|
||||
@@ -1798,6 +1802,9 @@ class CORE_EXPORT Document : public Cont
|
||||
|
||||
double start_time_;
|
||||
|
||||
@@ -169,8 +169,8 @@
|
||||
// TODO(editing-dev): We should make
|
||||
--- a/third_party/blink/renderer/platform/runtime_enabled_features.json5
|
||||
+++ b/third_party/blink/renderer/platform/runtime_enabled_features.json5
|
||||
@@ -507,6 +507,12 @@
|
||||
name: "FirstContentfulPaintPlusPlus",
|
||||
@@ -510,6 +510,12 @@
|
||||
settable_from_internals: true,
|
||||
},
|
||||
{
|
||||
+ name: "FingerprintingClientRectsNoise",
|
||||
@@ -184,8 +184,8 @@
|
||||
},
|
||||
--- a/third_party/blink/renderer/platform/exported/web_runtime_features.cc
|
||||
+++ b/third_party/blink/renderer/platform/exported/web_runtime_features.cc
|
||||
@@ -614,4 +614,12 @@ void WebRuntimeFeatures::EnableGetDispla
|
||||
RuntimeEnabledFeatures::SetGetDisplayMediaEnabled(enable);
|
||||
@@ -608,4 +608,12 @@ void WebRuntimeFeatures::EnableForbidSyn
|
||||
RuntimeEnabledFeatures::SetForbidSyncXHRInPageDismissalEnabled(enable);
|
||||
}
|
||||
|
||||
+void WebRuntimeFeatures::EnableFingerprintingClientRectsNoise(bool enable) {
|
||||
@@ -199,10 +199,10 @@
|
||||
} // namespace blink
|
||||
--- a/third_party/blink/public/platform/web_runtime_features.h
|
||||
+++ b/third_party/blink/public/platform/web_runtime_features.h
|
||||
@@ -221,6 +221,8 @@ class WebRuntimeFeatures {
|
||||
BLINK_PLATFORM_EXPORT static void EnableTranslateService(bool);
|
||||
@@ -219,6 +219,8 @@ class WebRuntimeFeatures {
|
||||
BLINK_PLATFORM_EXPORT static void EnableMergeBlockingNonBlockingPools(bool);
|
||||
BLINK_PLATFORM_EXPORT static void EnableGetDisplayMedia(bool);
|
||||
BLINK_PLATFORM_EXPORT static void EnableForbidSyncXHRInPageDismissal(bool);
|
||||
+ BLINK_PLATFORM_EXPORT static void EnableFingerprintingClientRectsNoise(bool);
|
||||
+ BLINK_PLATFORM_EXPORT static void EnableFingerprintingCanvasMeasureTextNoise(bool);
|
||||
|
||||
@@ -210,7 +210,7 @@
|
||||
WebRuntimeFeatures();
|
||||
--- a/chrome/browser/BUILD.gn
|
||||
+++ b/chrome/browser/BUILD.gn
|
||||
@@ -1973,6 +1973,7 @@ jumbo_split_static_library("browser") {
|
||||
@@ -1989,6 +1989,7 @@ jumbo_split_static_library("browser") {
|
||||
"//third_party/metrics_proto",
|
||||
"//third_party/re2",
|
||||
"//third_party/smhasher:cityhash",
|
||||
@@ -220,7 +220,7 @@
|
||||
"//third_party/widevine/cdm:buildflags",
|
||||
--- a/content/browser/BUILD.gn
|
||||
+++ b/content/browser/BUILD.gn
|
||||
@@ -188,6 +188,7 @@ jumbo_source_set("browser") {
|
||||
@@ -190,6 +190,7 @@ jumbo_source_set("browser") {
|
||||
"//third_party/libyuv",
|
||||
"//third_party/re2",
|
||||
"//third_party/sqlite",
|
||||
@@ -230,7 +230,7 @@
|
||||
"//third_party/zlib",
|
||||
--- a/content/browser/renderer_host/render_process_host_impl.cc
|
||||
+++ b/content/browser/renderer_host/render_process_host_impl.cc
|
||||
@@ -217,6 +217,7 @@
|
||||
@@ -216,6 +216,7 @@
|
||||
#include "storage/browser/fileapi/sandbox_file_system_backend.h"
|
||||
#include "third_party/blink/public/common/page/launching_process_state.h"
|
||||
#include "third_party/blink/public/public_buildflags.h"
|
||||
@@ -238,9 +238,9 @@
|
||||
#include "third_party/skia/include/core/SkBitmap.h"
|
||||
#include "ui/base/ui_base_features.h"
|
||||
#include "ui/base/ui_base_switches.h"
|
||||
@@ -3033,6 +3034,8 @@ void RenderProcessHostImpl::PropagateBro
|
||||
@@ -3135,6 +3136,8 @@ void RenderProcessHostImpl::PropagateBro
|
||||
switches::kEnableWebGLImageChromium,
|
||||
switches::kEnableWebVR,
|
||||
switches::kExplicitlyAllowedPorts,
|
||||
switches::kFileUrlPathAlias,
|
||||
+ switches::kFingerprintingClientRectsNoise,
|
||||
+ switches::kFingerprintingCanvasMeasureTextNoise,
|
||||
@@ -259,7 +259,7 @@
|
||||
"//ui/events/blink",
|
||||
--- a/third_party/blink/renderer/platform/BUILD.gn
|
||||
+++ b/third_party/blink/renderer/platform/BUILD.gn
|
||||
@@ -1459,6 +1459,7 @@ jumbo_component("platform") {
|
||||
@@ -1462,6 +1462,7 @@ jumbo_component("platform") {
|
||||
"//third_party/blink/public/common",
|
||||
"//third_party/ced",
|
||||
"//third_party/icu",
|
||||
@@ -269,7 +269,7 @@
|
||||
"//third_party/zlib/google:compression_utils",
|
||||
--- a/third_party/blink/renderer/modules/canvas/canvas2d/canvas_rendering_context_2d.cc
|
||||
+++ b/third_party/blink/renderer/modules/canvas/canvas2d/canvas_rendering_context_2d.cc
|
||||
@@ -783,8 +783,15 @@ TextMetrics* CanvasRenderingContext2D::m
|
||||
@@ -784,8 +784,15 @@ TextMetrics* CanvasRenderingContext2D::m
|
||||
else
|
||||
direction = ToTextDirection(GetState().GetDirection(), canvas());
|
||||
|
||||
@@ -290,7 +290,7 @@
|
||||
+++ b/third_party/blink/renderer/core/html/canvas/text_metrics.h
|
||||
@@ -71,6 +71,8 @@ class CORE_EXPORT TextMetrics final : pu
|
||||
|
||||
void Trace(blink::Visitor*) override;
|
||||
void Trace(Visitor*) override;
|
||||
|
||||
+ void Shuffle(const double factor);
|
||||
+
|
||||
@@ -299,7 +299,7 @@
|
||||
const TextDirection&,
|
||||
--- a/third_party/blink/renderer/core/html/canvas/text_metrics.cc
|
||||
+++ b/third_party/blink/renderer/core/html/canvas/text_metrics.cc
|
||||
@@ -45,6 +45,24 @@ void TextMetrics::Trace(blink::Visitor*
|
||||
@@ -45,6 +45,24 @@ void TextMetrics::Trace(Visitor* visitor
|
||||
|
||||
TextMetrics::TextMetrics() : baselines_(Baselines::Create()) {}
|
||||
|
||||
|
||||
@@ -70,7 +70,7 @@ approach to change color components.
|
||||
|
||||
namespace blink {
|
||||
|
||||
@@ -176,10 +180,165 @@ bool StaticBitmapImage::ConvertToArrayBu
|
||||
@@ -171,10 +175,165 @@ bool StaticBitmapImage::ConvertToArrayBu
|
||||
DCHECK(read_pixels_successful ||
|
||||
!sk_image->bounds().intersect(SkIRect::MakeXYWH(
|
||||
rect.X(), rect.Y(), info.width(), info.height())));
|
||||
@@ -249,7 +249,7 @@ approach to change color components.
|
||||
// Methods overridden by all sub-classes
|
||||
--- a/chrome/browser/about_flags.cc
|
||||
+++ b/chrome/browser/about_flags.cc
|
||||
@@ -1331,6 +1331,10 @@ const FeatureEntry kFeatureEntries[] = {
|
||||
@@ -1231,6 +1231,10 @@ const FeatureEntry kFeatureEntries[] = {
|
||||
"Enable Canvas::measureText() fingerprint deception",
|
||||
"Scale the output values of Canvas::measureText() with a randomly selected factor in the range -0.0003% to 0.0003%, which are recomputed on every document initialization.",
|
||||
kOsAll, SINGLE_VALUE_TYPE(switches::kFingerprintingCanvasMeasureTextNoise)},
|
||||
@@ -262,7 +262,7 @@ approach to change color components.
|
||||
SINGLE_VALUE_TYPE(switches::kIgnoreGpuBlacklist)},
|
||||
--- a/content/child/runtime_features.cc
|
||||
+++ b/content/child/runtime_features.cc
|
||||
@@ -491,6 +491,8 @@ void SetRuntimeFeaturesDefaultsAndUpdate
|
||||
@@ -482,6 +482,8 @@ void SetRuntimeFeaturesDefaultsAndUpdate
|
||||
command_line.HasSwitch(switches::kFingerprintingClientRectsNoise));
|
||||
WebRuntimeFeatures::EnableFingerprintingCanvasMeasureTextNoise(
|
||||
command_line.HasSwitch(switches::kFingerprintingCanvasMeasureTextNoise));
|
||||
@@ -273,7 +273,7 @@ approach to change color components.
|
||||
// Do not add individual features below this line.
|
||||
--- a/third_party/blink/renderer/platform/runtime_enabled_features.json5
|
||||
+++ b/third_party/blink/renderer/platform/runtime_enabled_features.json5
|
||||
@@ -513,6 +513,9 @@
|
||||
@@ -516,6 +516,9 @@
|
||||
name: "FingerprintingCanvasMeasureTextNoise",
|
||||
},
|
||||
{
|
||||
@@ -285,7 +285,7 @@ approach to change color components.
|
||||
},
|
||||
--- a/third_party/blink/renderer/platform/exported/web_runtime_features.cc
|
||||
+++ b/third_party/blink/renderer/platform/exported/web_runtime_features.cc
|
||||
@@ -622,4 +622,8 @@ void WebRuntimeFeatures::EnableFingerpri
|
||||
@@ -616,4 +616,8 @@ void WebRuntimeFeatures::EnableFingerpri
|
||||
RuntimeEnabledFeatures::SetFingerprintingCanvasMeasureTextNoiseEnabled(enable);
|
||||
}
|
||||
|
||||
@@ -296,8 +296,8 @@ approach to change color components.
|
||||
} // namespace blink
|
||||
--- a/third_party/blink/public/platform/web_runtime_features.h
|
||||
+++ b/third_party/blink/public/platform/web_runtime_features.h
|
||||
@@ -223,6 +223,7 @@ class WebRuntimeFeatures {
|
||||
BLINK_PLATFORM_EXPORT static void EnableGetDisplayMedia(bool);
|
||||
@@ -221,6 +221,7 @@ class WebRuntimeFeatures {
|
||||
BLINK_PLATFORM_EXPORT static void EnableForbidSyncXHRInPageDismissal(bool);
|
||||
BLINK_PLATFORM_EXPORT static void EnableFingerprintingClientRectsNoise(bool);
|
||||
BLINK_PLATFORM_EXPORT static void EnableFingerprintingCanvasMeasureTextNoise(bool);
|
||||
+ BLINK_PLATFORM_EXPORT static void EnableFingerprintingCanvasImageDataNoise(bool);
|
||||
@@ -306,7 +306,7 @@ approach to change color components.
|
||||
WebRuntimeFeatures();
|
||||
--- a/content/browser/renderer_host/render_process_host_impl.cc
|
||||
+++ b/content/browser/renderer_host/render_process_host_impl.cc
|
||||
@@ -3036,6 +3036,7 @@ void RenderProcessHostImpl::PropagateBro
|
||||
@@ -3138,6 +3138,7 @@ void RenderProcessHostImpl::PropagateBro
|
||||
switches::kFileUrlPathAlias,
|
||||
switches::kFingerprintingClientRectsNoise,
|
||||
switches::kFingerprintingCanvasMeasureTextNoise,
|
||||
@@ -316,7 +316,7 @@ approach to change color components.
|
||||
switches::kForceGpuMemAvailableMb,
|
||||
--- a/third_party/blink/renderer/platform/BUILD.gn
|
||||
+++ b/third_party/blink/renderer/platform/BUILD.gn
|
||||
@@ -1429,7 +1429,9 @@ jumbo_component("platform") {
|
||||
@@ -1432,7 +1432,9 @@ jumbo_component("platform") {
|
||||
"//third_party/blink/renderer:non_test_config",
|
||||
]
|
||||
|
||||
|
||||
@@ -17,7 +17,7 @@ with limited CPU/memory resources and it is disabled by default.
|
||||
|
||||
--- a/chrome/browser/about_flags.cc
|
||||
+++ b/chrome/browser/about_flags.cc
|
||||
@@ -928,6 +928,11 @@ const FeatureEntry::Choice kForceEffecti
|
||||
@@ -825,6 +825,11 @@ const FeatureEntry::Choice kForceEffecti
|
||||
net::kEffectiveConnectionType4G},
|
||||
};
|
||||
|
||||
@@ -29,7 +29,7 @@ with limited CPU/memory resources and it is disabled by default.
|
||||
// Ensure that all effective connection types returned by Network Quality
|
||||
// Estimator (NQE) are also exposed via flags.
|
||||
static_assert(net::EFFECTIVE_CONNECTION_TYPE_LAST + 2 ==
|
||||
@@ -2535,6 +2540,9 @@ const FeatureEntry kFeatureEntries[] = {
|
||||
@@ -2400,6 +2405,9 @@ const FeatureEntry kFeatureEntries[] = {
|
||||
flag_descriptions::kMaterialDesignIncognitoNTPName,
|
||||
flag_descriptions::kMaterialDesignIncognitoNTPDescription, kOsAndroid,
|
||||
FEATURE_VALUE_TYPE(features::kMaterialDesignIncognitoNTP)},
|
||||
@@ -41,7 +41,7 @@ with limited CPU/memory resources and it is disabled by default.
|
||||
flag_descriptions::kSafeSearchUrlReportingDescription, kOsAll,
|
||||
--- a/chrome/browser/flag_descriptions.cc
|
||||
+++ b/chrome/browser/flag_descriptions.cc
|
||||
@@ -1218,6 +1218,10 @@ const char kMaterialDesignIncognitoNTPDe
|
||||
@@ -1251,6 +1251,10 @@ const char kMaterialDesignIncognitoNTPDe
|
||||
"If enabled, the Incognito New Tab page uses the new material design with "
|
||||
"a better readable text.";
|
||||
|
||||
@@ -54,7 +54,7 @@ with limited CPU/memory resources and it is disabled by default.
|
||||
const char kMediaRouterCastAllowAllIPsDescription[] =
|
||||
--- a/chrome/browser/flag_descriptions.h
|
||||
+++ b/chrome/browser/flag_descriptions.h
|
||||
@@ -739,6 +739,9 @@ extern const char kMarkHttpAsWarningAndD
|
||||
@@ -757,6 +757,9 @@ extern const char kMarkHttpAsWarningAndD
|
||||
extern const char kMaterialDesignIncognitoNTPName[];
|
||||
extern const char kMaterialDesignIncognitoNTPDescription[];
|
||||
|
||||
@@ -91,7 +91,7 @@ with limited CPU/memory resources and it is disabled by default.
|
||||
NETWORK_SESSION_CONFIGURATOR_EXPORT extern const base::Feature kDnsOverHttps;
|
||||
--- a/components/network_session_configurator/common/network_switch_list.h
|
||||
+++ b/components/network_session_configurator/common/network_switch_list.h
|
||||
@@ -21,6 +21,10 @@ NETWORK_SWITCH(kEnableUserAlternateProto
|
||||
@@ -22,6 +22,10 @@ NETWORK_SWITCH(kEnableUserAlternateProto
|
||||
// Enables the QUIC protocol. This is a temporary testing flag.
|
||||
NETWORK_SWITCH(kEnableQuic, "enable-quic")
|
||||
|
||||
@@ -99,9 +99,9 @@ with limited CPU/memory resources and it is disabled by default.
|
||||
+// (15 instead of 6, mirroring the value Mozilla uses).
|
||||
+NETWORK_SWITCH(kMaxConnectionsPerHost, "max-connections-per-host")
|
||||
+
|
||||
// Enable use of experimental TCP sockets API for sending data in the
|
||||
// SYN packet.
|
||||
NETWORK_SWITCH(kEnableTcpFastOpen, "enable-tcp-fastopen")
|
||||
// Ignores certificate-related errors.
|
||||
NETWORK_SWITCH(kIgnoreCertificateErrors, "ignore-certificate-errors")
|
||||
|
||||
--- a/chrome/browser/browser_process_impl.cc
|
||||
+++ b/chrome/browser/browser_process_impl.cc
|
||||
@@ -18,12 +18,14 @@
|
||||
@@ -127,8 +127,8 @@ with limited CPU/memory resources and it is disabled by default.
|
||||
#include "components/network_time/network_time_tracker.h"
|
||||
#include "components/optimization_guide/optimization_guide_service.h"
|
||||
#include "components/policy/core/common/policy_service.h"
|
||||
@@ -312,6 +315,18 @@ void BrowserProcessImpl::Init() {
|
||||
base::Unretained(this)));
|
||||
@@ -310,6 +313,18 @@ void BrowserProcessImpl::Init() {
|
||||
base::Bind(&ApplyMetricsReportingPolicy));
|
||||
#endif
|
||||
|
||||
+ int max_connections_per_host = 0;
|
||||
@@ -148,7 +148,7 @@ with limited CPU/memory resources and it is disabled by default.
|
||||
net::HttpNetworkSession::NORMAL_SOCKET_POOL,
|
||||
--- a/chrome/browser/BUILD.gn
|
||||
+++ b/chrome/browser/BUILD.gn
|
||||
@@ -1820,6 +1820,7 @@ jumbo_split_static_library("browser") {
|
||||
@@ -1831,6 +1831,7 @@ jumbo_split_static_library("browser") {
|
||||
"//components/net_log",
|
||||
"//components/network_hints/common",
|
||||
"//components/network_session_configurator/browser",
|
||||
|
||||
@@ -10,10 +10,10 @@ author: Michael Gilbert <mgilbert@debian.org>
|
||||
-import("//chrome/android/channel.gni")
|
||||
|
||||
declare_args() {
|
||||
# TODO(733935): Enable for other Android architectures too. Currently we only
|
||||
enable_gvr_services = is_android && !is_chromecast &&
|
||||
--- a/BUILD.gn
|
||||
+++ b/BUILD.gn
|
||||
@@ -369,7 +369,7 @@ group("gn_all") {
|
||||
@@ -367,7 +367,7 @@ group("gn_all") {
|
||||
# seems currently broken for this platform at the moment, and the
|
||||
# corresponding code build and works on Linux unmodified.
|
||||
# See instructions in the corresponding BUILD.gn.
|
||||
|
||||
@@ -3,7 +3,7 @@ author: Michael Gilbert <mgilbert@debian.org>
|
||||
|
||||
--- a/BUILD.gn
|
||||
+++ b/BUILD.gn
|
||||
@@ -722,8 +722,7 @@ group("gn_all") {
|
||||
@@ -717,8 +717,7 @@ group("gn_all") {
|
||||
}
|
||||
}
|
||||
|
||||
@@ -15,7 +15,7 @@ author: Michael Gilbert <mgilbert@debian.org>
|
||||
"//third_party/icu/fuzzers",
|
||||
--- a/content/test/BUILD.gn
|
||||
+++ b/content/test/BUILD.gn
|
||||
@@ -2232,9 +2232,3 @@ test("content_perftests") {
|
||||
@@ -2270,9 +2270,3 @@ test("content_perftests") {
|
||||
deps += [ "//testing/android/native_test:native_test_native_code" ]
|
||||
}
|
||||
}
|
||||
|
||||
@@ -3,7 +3,7 @@ author: Michael Gilbert <mgilbert@debian.org>
|
||||
|
||||
--- a/chrome/browser/ui/startup/startup_browser_creator_impl.cc
|
||||
+++ b/chrome/browser/ui/startup/startup_browser_creator_impl.cc
|
||||
@@ -805,10 +805,6 @@ void StartupBrowserCreatorImpl::AddInfoB
|
||||
@@ -807,10 +807,6 @@ void StartupBrowserCreatorImpl::AddInfoB
|
||||
chrome::ShowBadFlagsPrompt(web_contents);
|
||||
InfoBarService* infobar_service =
|
||||
InfoBarService::FromWebContents(web_contents);
|
||||
|
||||
@@ -4,7 +4,7 @@ bug-debian: http://bugs.debian.org/857767
|
||||
|
||||
--- a/chrome/browser/profiles/profile_manager.cc
|
||||
+++ b/chrome/browser/profiles/profile_manager.cc
|
||||
@@ -1071,7 +1071,7 @@ void ProfileManager::InitProfileUserPref
|
||||
@@ -1075,7 +1075,7 @@ void ProfileManager::InitProfileUserPref
|
||||
profile->GetPrefs()->SetString(prefs::kSupervisedUserId,
|
||||
supervised_user_id);
|
||||
}
|
||||
|
||||
@@ -11,7 +11,7 @@ author: Michael Gilbert <mgilbert@debian.org>
|
||||
parser.add_option(
|
||||
'--skip-generate-buildfiles',
|
||||
action='store_true',
|
||||
@@ -78,8 +79,12 @@ def main(argv):
|
||||
@@ -118,8 +119,12 @@ def main(argv):
|
||||
|
||||
shutil.copy2(
|
||||
os.path.join(BOOTSTRAP_DIR, 'last_commit_position.h'), gn_build_dir)
|
||||
|
||||
@@ -9,7 +9,7 @@ author: Michael Gilbert <mgilbert@debian.org>
|
||||
|
||||
--- a/base/test/BUILD.gn
|
||||
+++ b/base/test/BUILD.gn
|
||||
@@ -206,7 +206,7 @@ static_library("test_support") {
|
||||
@@ -207,7 +207,7 @@ static_library("test_support") {
|
||||
deps += [ "//third_party/fuchsia-sdk/sdk:zx" ]
|
||||
}
|
||||
|
||||
@@ -18,7 +18,7 @@ author: Michael Gilbert <mgilbert@debian.org>
|
||||
public_deps += [ ":fontconfig_util_linux" ]
|
||||
data_deps = [
|
||||
"//third_party/test_fonts",
|
||||
@@ -362,7 +362,7 @@ if (is_linux) {
|
||||
@@ -381,7 +381,7 @@ if (is_linux) {
|
||||
]
|
||||
}
|
||||
|
||||
@@ -29,7 +29,7 @@ author: Michael Gilbert <mgilbert@debian.org>
|
||||
sources = [
|
||||
--- a/content/shell/test_runner/BUILD.gn
|
||||
+++ b/content/shell/test_runner/BUILD.gn
|
||||
@@ -178,7 +178,7 @@ group("resources") {
|
||||
@@ -175,7 +175,7 @@ group("resources") {
|
||||
if (is_mac) {
|
||||
deps += [ ":test_runner_bundle_data" ]
|
||||
data_deps += [ ":test_runner_bundle_data" ]
|
||||
|
||||
@@ -1,36 +0,0 @@
|
||||
description: fix undefined behavior, variables assigned twice in the same statement
|
||||
author: Michael Gilbert <mgilbert@debian.org>
|
||||
|
||||
--- a/headless/lib/browser/protocol/browser_handler.cc
|
||||
+++ b/headless/lib/browser/protocol/browser_handler.cc
|
||||
@@ -78,7 +78,7 @@ Response BrowserHandler::Close() {
|
||||
Response BrowserHandler::SetWindowBounds(
|
||||
int window_id,
|
||||
std::unique_ptr<Browser::Bounds> window_bounds) {
|
||||
- HeadlessWebContentsImpl* web_contents = web_contents =
|
||||
+ HeadlessWebContentsImpl* web_contents =
|
||||
browser()->GetWebContentsForWindowId(window_id);
|
||||
if (!web_contents)
|
||||
return Response::Error("Browser window not found");
|
||||
--- a/third_party/webrtc/modules/audio_processing/aec3/reverb_decay_estimator.cc
|
||||
+++ b/third_party/webrtc/modules/audio_processing/aec3/reverb_decay_estimator.cc
|
||||
@@ -287,7 +287,7 @@ void ReverbDecayEstimator::LateReverbLin
|
||||
// Arithmetic sum of $2 \sum_{i=0.5}^{(N-1)/2}i^2$ calculated directly.
|
||||
nn_ = SymmetricArithmetricSum(N);
|
||||
// The linear regression approach assumes symmetric index around 0.
|
||||
- count_ = N > 0 ? count_ = -N * 0.5f + 0.5f : 0.f;
|
||||
+ count_ = N > 0 ? -N * 0.5f + 0.5f : 0.f;
|
||||
N_ = N;
|
||||
n_ = 0;
|
||||
}
|
||||
--- a/chrome/browser/download/download_shelf_controller.cc
|
||||
+++ b/chrome/browser/download/download_shelf_controller.cc
|
||||
@@ -65,7 +65,7 @@ void DownloadShelfController::OnItemUpda
|
||||
|
||||
void DownloadShelfController::OnNewOfflineItemReady(
|
||||
DownloadUIModel::DownloadUIModelPtr model) {
|
||||
- Browser* browser = browser = chrome::FindLastActiveWithProfile(profile_);
|
||||
+ Browser* browser = chrome::FindLastActiveWithProfile(profile_);
|
||||
|
||||
if (browser && browser->window()) {
|
||||
// Add the offline item to DownloadShelf in the browser window.
|
||||
@@ -1,6 +1,6 @@
|
||||
--- a/chrome/browser/chrome_content_browser_client.cc
|
||||
+++ b/chrome/browser/chrome_content_browser_client.cc
|
||||
@@ -1034,7 +1034,7 @@ void ChromeContentBrowserClient::Registe
|
||||
@@ -1074,7 +1074,7 @@ void ChromeContentBrowserClient::Registe
|
||||
void ChromeContentBrowserClient::RegisterProfilePrefs(
|
||||
user_prefs::PrefRegistrySyncable* registry) {
|
||||
registry->RegisterBooleanPref(prefs::kDisable3DAPIs, false);
|
||||
@@ -82,7 +82,7 @@
|
||||
|
||||
--- a/components/autofill/core/common/autofill_prefs.cc
|
||||
+++ b/components/autofill/core/common/autofill_prefs.cc
|
||||
@@ -132,10 +132,10 @@ void RegisterProfilePrefs(user_prefs::Pr
|
||||
@@ -137,10 +137,10 @@ void RegisterProfilePrefs(user_prefs::Pr
|
||||
prefs::kAutofillBillingCustomerNumber, 0.0,
|
||||
user_prefs::PrefRegistrySyncable::SYNCABLE_PRIORITY_PREF);
|
||||
registry->RegisterBooleanPref(
|
||||
@@ -95,7 +95,7 @@
|
||||
user_prefs::PrefRegistrySyncable::SYNCABLE_PREF);
|
||||
registry->RegisterIntegerPref(
|
||||
prefs::kAutofillLastVersionDeduped, 0,
|
||||
@@ -148,7 +148,7 @@ void RegisterProfilePrefs(user_prefs::Pr
|
||||
@@ -153,7 +153,7 @@ void RegisterProfilePrefs(user_prefs::Pr
|
||||
prefs::kAutofillLastVersionDisusedAddressesDeleted, 0,
|
||||
user_prefs::PrefRegistrySyncable::SYNCABLE_PREF);
|
||||
registry->RegisterBooleanPref(
|
||||
@@ -106,7 +106,7 @@
|
||||
prefs::kAutofillProfileValidity, "",
|
||||
--- a/chrome/browser/resources/settings/reset_page/reset_profile_dialog.html
|
||||
+++ b/chrome/browser/resources/settings/reset_page/reset_profile_dialog.html
|
||||
@@ -45,7 +45,7 @@
|
||||
@@ -52,7 +52,7 @@
|
||||
</paper-button>
|
||||
</div>
|
||||
<div slot="footer">
|
||||
@@ -117,7 +117,7 @@
|
||||
</cr-dialog>
|
||||
--- a/chrome/browser/signin/signin_promo.cc
|
||||
+++ b/chrome/browser/signin/signin_promo.cc
|
||||
@@ -353,8 +353,8 @@ void ForceWebBasedSigninFlowForTesting(b
|
||||
@@ -291,8 +291,8 @@ void ForceWebBasedSigninFlowForTesting(b
|
||||
void RegisterProfilePrefs(
|
||||
user_prefs::PrefRegistrySyncable* registry) {
|
||||
registry->RegisterIntegerPref(prefs::kSignInPromoStartupCount, 0);
|
||||
@@ -130,7 +130,7 @@
|
||||
}
|
||||
--- a/components/bookmarks/browser/bookmark_utils.cc
|
||||
+++ b/components/bookmarks/browser/bookmark_utils.cc
|
||||
@@ -441,12 +441,12 @@ void GetBookmarksMatchingProperties(Book
|
||||
@@ -440,12 +440,12 @@ void GetBookmarksMatchingProperties(Book
|
||||
void RegisterProfilePrefs(user_prefs::PrefRegistrySyncable* registry) {
|
||||
registry->RegisterBooleanPref(
|
||||
prefs::kShowBookmarkBar,
|
||||
@@ -213,7 +213,7 @@
|
||||
false);
|
||||
--- a/components/password_manager/core/browser/password_manager.cc
|
||||
+++ b/components/password_manager/core/browser/password_manager.cc
|
||||
@@ -321,10 +321,10 @@ void RecordParsingOnSavingDifference(
|
||||
@@ -333,10 +333,10 @@ void RecordParsingOnSavingDifference(
|
||||
void PasswordManager::RegisterProfilePrefs(
|
||||
user_prefs::PrefRegistrySyncable* registry) {
|
||||
registry->RegisterBooleanPref(
|
||||
@@ -239,7 +239,7 @@
|
||||
|
||||
--- a/chrome/browser/signin/account_consistency_mode_manager.cc
|
||||
+++ b/chrome/browser/signin/account_consistency_mode_manager.cc
|
||||
@@ -175,7 +175,7 @@ void AccountConsistencyModeManager::Regi
|
||||
@@ -126,7 +126,7 @@ void AccountConsistencyModeManager::Regi
|
||||
registry->RegisterBooleanPref(prefs::kAccountConsistencyMirrorRequired,
|
||||
false);
|
||||
#endif
|
||||
|
||||
@@ -33,7 +33,7 @@
|
||||
const GURL url;
|
||||
--- a/components/ntp_snippets/features.cc
|
||||
+++ b/components/ntp_snippets/features.cc
|
||||
@@ -34,13 +34,13 @@ const base::Feature* const kAllFeatures[
|
||||
@@ -35,13 +35,13 @@ const base::Feature* const kAllFeatures[
|
||||
&kRemoteSuggestionsBackendFeature};
|
||||
|
||||
const base::Feature kArticleSuggestionsFeature{
|
||||
|
||||
File diff suppressed because it is too large
Load Diff
@@ -1,6 +1,6 @@
|
||||
--- a/chrome/browser/ui/startup/startup_tab_provider.cc
|
||||
+++ b/chrome/browser/ui/startup/startup_tab_provider.cc
|
||||
@@ -61,7 +61,7 @@ bool ProfileHasOtherTabbedBrowser(Profil
|
||||
@@ -62,7 +62,7 @@ bool ProfileHasOtherTabbedBrowser(Profil
|
||||
|
||||
StartupTabs StartupTabProviderImpl::GetOnboardingTabs(Profile* profile) const {
|
||||
// Onboarding content has not been launched on Chrome OS.
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
--- a/chrome/common/chrome_content_client.cc
|
||||
+++ b/chrome/common/chrome_content_client.cc
|
||||
@@ -99,7 +99,7 @@
|
||||
@@ -97,7 +97,7 @@
|
||||
// Registers Widevine CDM if Widevine is enabled, the Widevine CDM is
|
||||
// bundled and not a component. When the Widevine CDM is a component, it is
|
||||
// registered in widevine_cdm_component_installer.cc.
|
||||
|
||||
@@ -9,7 +9,7 @@ Subject: [PATCH 56/66] browser: disable profile auto-import on first run
|
||||
|
||||
--- a/chrome/browser/chrome_browser_main.cc
|
||||
+++ b/chrome/browser/chrome_browser_main.cc
|
||||
@@ -1572,8 +1572,6 @@ int ChromeBrowserMainParts::PreMainMessa
|
||||
@@ -1556,8 +1556,6 @@ int ChromeBrowserMainParts::PreMainMessa
|
||||
// and preferences have been registered since some of the import code depends
|
||||
// on preferences.
|
||||
if (first_run::IsChromeFirstRun()) {
|
||||
|
||||
@@ -11,7 +11,7 @@ very interesting in themselves. Force them to be stored.
|
||||
|
||||
--- a/third_party/blink/common/mime_util/mime_util.cc
|
||||
+++ b/third_party/blink/common/mime_util/mime_util.cc
|
||||
@@ -76,6 +76,7 @@ static const char* const kUnsupportedTex
|
||||
@@ -75,6 +75,7 @@ static const char* const kUnsupportedTex
|
||||
"text/x-csv",
|
||||
"text/x-vcf",
|
||||
"text/rtf",
|
||||
|
||||
@@ -29,7 +29,7 @@ TLDR: Do not let files sneak onto the disk too easily.
|
||||
|
||||
--- a/chrome/browser/download/download_prefs.cc
|
||||
+++ b/chrome/browser/download/download_prefs.cc
|
||||
@@ -220,7 +220,7 @@ void DownloadPrefs::RegisterProfilePrefs
|
||||
@@ -230,7 +230,7 @@ void DownloadPrefs::RegisterProfilePrefs
|
||||
user_prefs::PrefRegistrySyncable* registry) {
|
||||
registry->RegisterBooleanPref(
|
||||
prefs::kPromptForDownload,
|
||||
|
||||
@@ -10,7 +10,7 @@ Out with all those tracking cookies!
|
||||
|
||||
--- a/components/content_settings/core/browser/content_settings_registry.cc
|
||||
+++ b/components/content_settings/core/browser/content_settings_registry.cc
|
||||
@@ -118,7 +118,7 @@ void ContentSettingsRegistry::Init() {
|
||||
@@ -134,7 +134,7 @@ void ContentSettingsRegistry::Init() {
|
||||
// WARNING: The string names of the permissions passed in below are used to
|
||||
// generate preference names and should never be changed!
|
||||
|
||||
|
||||
@@ -16,7 +16,7 @@ the case anyway, since we are based off Chromium, not Chrome.
|
||||
|
||||
--- a/chrome/browser/app_controller_mac.mm
|
||||
+++ b/chrome/browser/app_controller_mac.mm
|
||||
@@ -665,7 +665,7 @@ static base::mac::ScopedObjCClassSwizzle
|
||||
@@ -663,7 +663,7 @@ static base::mac::ScopedObjCClassSwizzle
|
||||
CFStringRef checkInterval = CFSTR("checkInterval");
|
||||
CFPropertyListRef plist = CFPreferencesCopyAppValue(checkInterval, app);
|
||||
if (!plist) {
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
|
||||
--- a/chrome/browser/about_flags.cc
|
||||
+++ b/chrome/browser/about_flags.cc
|
||||
@@ -1296,6 +1296,10 @@ const FeatureEntry kFeatureEntries[] = {
|
||||
@@ -1196,6 +1196,10 @@ const FeatureEntry kFeatureEntries[] = {
|
||||
"Enable stacking in tab strip",
|
||||
"Forces tabs to be stacked in the tab strip. Otherwise, they follow default behavior.",
|
||||
kOsAll, SINGLE_VALUE_TYPE("enable-stacked-tab-strip")},
|
||||
@@ -15,7 +15,7 @@
|
||||
SINGLE_VALUE_TYPE(switches::kIgnoreGpuBlacklist)},
|
||||
--- a/chrome/renderer/chrome_render_frame_observer.cc
|
||||
+++ b/chrome/renderer/chrome_render_frame_observer.cc
|
||||
@@ -146,9 +146,10 @@ ChromeRenderFrameObserver::ChromeRenderF
|
||||
@@ -147,9 +147,10 @@ ChromeRenderFrameObserver::ChromeRenderF
|
||||
if (!render_frame->IsMainFrame())
|
||||
return;
|
||||
|
||||
@@ -27,7 +27,7 @@
|
||||
if (!command_line.HasSwitch(switches::kDisableClientSidePhishingDetection))
|
||||
SetClientSidePhishingDetection(true);
|
||||
#endif
|
||||
@@ -336,14 +337,16 @@ void ChromeRenderFrameObserver::DidFinis
|
||||
@@ -337,14 +338,16 @@ void ChromeRenderFrameObserver::DidFinis
|
||||
if (frame->Parent())
|
||||
return;
|
||||
|
||||
|
||||
@@ -3,7 +3,7 @@
|
||||
|
||||
--- a/chrome/browser/about_flags.cc
|
||||
+++ b/chrome/browser/about_flags.cc
|
||||
@@ -210,6 +210,16 @@ const unsigned kOsDesktop = kOsMac | kOs
|
||||
@@ -212,6 +212,16 @@ const unsigned kOsDesktop = kOsMac | kOs
|
||||
const unsigned kOsAura = kOsWin | kOsLinux | kOsCrOS;
|
||||
#endif // USE_AURA
|
||||
|
||||
@@ -20,7 +20,7 @@
|
||||
const FeatureEntry::Choice kTouchEventFeatureDetectionChoices[] = {
|
||||
{flags_ui::kGenericExperimentChoiceDisabled, "", ""},
|
||||
{flags_ui::kGenericExperimentChoiceEnabled,
|
||||
@@ -1278,6 +1288,10 @@ const FeatureEntry::FeatureVariation kOf
|
||||
@@ -1178,6 +1188,10 @@ const FeatureEntry::FeatureVariation kTa
|
||||
//
|
||||
// When adding a new choice, add it to the end of the list.
|
||||
const FeatureEntry kFeatureEntries[] = {
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
|
||||
--- a/chrome/browser/about_flags.cc
|
||||
+++ b/chrome/browser/about_flags.cc
|
||||
@@ -1300,6 +1300,10 @@ const FeatureEntry kFeatureEntries[] = {
|
||||
@@ -1200,6 +1200,10 @@ const FeatureEntry kFeatureEntries[] = {
|
||||
"Disable search engine collection",
|
||||
"Prevents search engines from being added automatically.",
|
||||
kOsAll, SINGLE_VALUE_TYPE("disable-search-engine-collection")},
|
||||
@@ -21,8 +21,8 @@
|
||||
|
||||
+#include "base/command_line.h"
|
||||
#include "base/lazy_instance.h"
|
||||
#include "base/macros.h"
|
||||
#include "base/numerics/safe_conversions.h"
|
||||
#include "base/stl_util.h"
|
||||
@@ -248,6 +249,13 @@ IDNConversionResult IDNToUnicodeWithAdju
|
||||
input16.reserve(host.length());
|
||||
input16.insert(input16.end(), host.begin(), host.end());
|
||||
|
||||
@@ -3,7 +3,7 @@
|
||||
|
||||
--- a/chrome/browser/ui/startup/startup_browser_creator_impl.cc
|
||||
+++ b/chrome/browser/ui/startup/startup_browser_creator_impl.cc
|
||||
@@ -782,7 +782,8 @@ void StartupBrowserCreatorImpl::AddInfoB
|
||||
@@ -784,7 +784,8 @@ void StartupBrowserCreatorImpl::AddInfoB
|
||||
if (!browser || !profile_ || browser->tab_strip_model()->count() == 0)
|
||||
return;
|
||||
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
--- a/chrome/browser/about_flags.cc
|
||||
+++ b/chrome/browser/about_flags.cc
|
||||
@@ -220,6 +220,19 @@ const FeatureEntry::Choice kExtensionHan
|
||||
@@ -222,6 +222,19 @@ const FeatureEntry::Choice kExtensionHan
|
||||
"always-prompt-for-install"},
|
||||
};
|
||||
|
||||
@@ -20,7 +20,7 @@
|
||||
const FeatureEntry::Choice kTouchEventFeatureDetectionChoices[] = {
|
||||
{flags_ui::kGenericExperimentChoiceDisabled, "", ""},
|
||||
{flags_ui::kGenericExperimentChoiceEnabled,
|
||||
@@ -4378,6 +4391,11 @@ const FeatureEntry kFeatureEntries[] = {
|
||||
@@ -4178,6 +4191,11 @@ const FeatureEntry kFeatureEntries[] = {
|
||||
FEATURE_VALUE_TYPE(arc::kEnableUnifiedAudioFocusFeature)},
|
||||
#endif // defined(OS_CHROMEOS)
|
||||
|
||||
@@ -29,12 +29,12 @@
|
||||
+ "Show avatar button in the browser toolbar", kOsDesktop,
|
||||
+ MULTI_VALUE_TYPE(kShowAvatarButtonChoices)},
|
||||
+
|
||||
// NOTE: Adding a new flag requires adding a corresponding entry to enum
|
||||
// "LoginCustomFlags" in tools/metrics/histograms/enums.xml. See "Flag
|
||||
// Histograms" in tools/metrics/histograms/README.md (run the
|
||||
#if defined(OS_WIN)
|
||||
{"use-angle", flag_descriptions::kUseAngleName,
|
||||
flag_descriptions::kUseAngleDescription, kOsWin,
|
||||
--- a/chrome/browser/ui/views/toolbar/toolbar_view.cc
|
||||
+++ b/chrome/browser/ui/views/toolbar/toolbar_view.cc
|
||||
@@ -214,12 +214,27 @@ void ToolbarView::Init() {
|
||||
@@ -230,12 +230,27 @@ void ToolbarView::Init() {
|
||||
cast_ = media_router::CastToolbarButton::Create(browser_).release();
|
||||
}
|
||||
|
||||
|
||||
@@ -22,7 +22,7 @@
|
||||
|
||||
--- a/chrome/browser/about_flags.cc
|
||||
+++ b/chrome/browser/about_flags.cc
|
||||
@@ -1278,6 +1278,10 @@ const FeatureEntry::FeatureVariation kOf
|
||||
@@ -1178,6 +1178,10 @@ const FeatureEntry::FeatureVariation kTa
|
||||
//
|
||||
// When adding a new choice, add it to the end of the list.
|
||||
const FeatureEntry kFeatureEntries[] = {
|
||||
|
||||
@@ -3,7 +3,7 @@
|
||||
|
||||
--- a/net/dns/host_resolver_impl.cc
|
||||
+++ b/net/dns/host_resolver_impl.cc
|
||||
@@ -29,6 +29,7 @@
|
||||
@@ -28,6 +28,7 @@
|
||||
#include "base/bind_helpers.h"
|
||||
#include "base/callback.h"
|
||||
#include "base/callback_helpers.h"
|
||||
@@ -11,7 +11,7 @@
|
||||
#include "base/compiler_specific.h"
|
||||
#include "base/containers/linked_list.h"
|
||||
#include "base/debug/debugger.h"
|
||||
@@ -118,11 +119,6 @@ const unsigned kMinimumTTLSeconds = kCac
|
||||
@@ -122,11 +123,6 @@ const unsigned kMinimumTTLSeconds = kCac
|
||||
// cached.
|
||||
const int kIPv6ProbePeriodMs = 1000;
|
||||
|
||||
@@ -23,7 +23,7 @@
|
||||
enum DnsResolveStatus {
|
||||
RESOLVE_STATUS_DNS_SUCCESS = 0,
|
||||
RESOLVE_STATUS_PROC_SUCCESS,
|
||||
@@ -2774,7 +2770,7 @@ bool HostResolverImpl::IsIPv6Reachable(c
|
||||
@@ -2875,7 +2871,7 @@ bool HostResolverImpl::IsIPv6Reachable(c
|
||||
if ((tick_clock_->NowTicks() - last_ipv6_probe_time_).InMilliseconds() >
|
||||
kIPv6ProbePeriodMs) {
|
||||
last_ipv6_probe_result_ =
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
|
||||
--- a/chrome/app/chrome_command_ids.h
|
||||
+++ b/chrome/app/chrome_command_ids.h
|
||||
@@ -148,6 +148,7 @@
|
||||
@@ -149,6 +149,7 @@
|
||||
#define IDC_MANAGE_EXTENSIONS 40022
|
||||
#define IDC_DEV_TOOLS_INSPECT 40023
|
||||
#define IDC_UPGRADE_DIALOG 40024
|
||||
@@ -12,7 +12,7 @@
|
||||
#define IDC_SHOW_SIGNIN 40030
|
||||
--- a/chrome/app/generated_resources.grd
|
||||
+++ b/chrome/app/generated_resources.grd
|
||||
@@ -1082,6 +1082,9 @@ are declared in tools/grit/grit_rule.gni
|
||||
@@ -1118,6 +1118,9 @@ are declared in tools/grit/grit_rule.gni
|
||||
<message name="IDS_CLEAR_BROWSING_DATA" desc="The text label for the menu item for clearing of browsing data">
|
||||
&Clear browsing data...
|
||||
</message>
|
||||
@@ -22,7 +22,7 @@
|
||||
<message name="IDS_SHOW_DOWNLOADS" desc="The show downloads menu in the app menu">
|
||||
&Downloads
|
||||
</message>
|
||||
@@ -1123,6 +1126,9 @@ are declared in tools/grit/grit_rule.gni
|
||||
@@ -1156,6 +1159,9 @@ are declared in tools/grit/grit_rule.gni
|
||||
<message name="IDS_CLEAR_BROWSING_DATA" desc="In Title Case: The text label for the menu item for clearing of browsing data">
|
||||
&Clear Browsing Data...
|
||||
</message>
|
||||
@@ -34,7 +34,7 @@
|
||||
</message>
|
||||
--- a/chrome/browser/ui/toolbar/app_menu_model.cc
|
||||
+++ b/chrome/browser/ui/toolbar/app_menu_model.cc
|
||||
@@ -211,6 +211,7 @@ void ToolsMenuModel::Build(Browser* brow
|
||||
@@ -213,6 +213,7 @@ void ToolsMenuModel::Build(Browser* brow
|
||||
|
||||
AddSeparator(ui::NORMAL_SEPARATOR);
|
||||
AddItemWithStringId(IDC_CLEAR_BROWSING_DATA, IDS_CLEAR_BROWSING_DATA);
|
||||
@@ -42,7 +42,7 @@
|
||||
AddItemWithStringId(IDC_MANAGE_EXTENSIONS, IDS_SHOW_EXTENSIONS);
|
||||
if (chrome::CanOpenTaskManager())
|
||||
AddItemWithStringId(IDC_TASK_MANAGER, IDS_TASK_MANAGER);
|
||||
@@ -474,6 +475,13 @@ void AppMenuModel::LogMenuMetrics(int co
|
||||
@@ -481,6 +482,13 @@ void AppMenuModel::LogMenuMetrics(int co
|
||||
}
|
||||
LogMenuAction(MENU_ACTION_CLEAR_BROWSING_DATA);
|
||||
break;
|
||||
@@ -88,7 +88,7 @@
|
||||
|
||||
#if defined(OS_MACOSX)
|
||||
#include "chrome/browser/ui/browser_commands_mac.h"
|
||||
@@ -642,6 +645,9 @@ bool BrowserCommandController::ExecuteCo
|
||||
@@ -645,6 +648,9 @@ bool BrowserCommandController::ExecuteCo
|
||||
case IDC_CLEAR_BROWSING_DATA:
|
||||
ShowClearBrowsingDataDialog(browser_);
|
||||
break;
|
||||
@@ -98,7 +98,7 @@
|
||||
case IDC_IMPORT_SETTINGS:
|
||||
ShowImportDialog(browser_);
|
||||
break;
|
||||
@@ -903,6 +909,7 @@ void BrowserCommandController::InitComma
|
||||
@@ -907,6 +913,7 @@ void BrowserCommandController::InitComma
|
||||
!profile()->IsOffTheRecord());
|
||||
command_updater_.UpdateCommandEnabled(IDC_CLEAR_BROWSING_DATA,
|
||||
!guest_session);
|
||||
@@ -108,7 +108,7 @@
|
||||
#else
|
||||
--- a/tools/metrics/histograms/histograms.xml
|
||||
+++ b/tools/metrics/histograms/histograms.xml
|
||||
@@ -140502,6 +140502,7 @@ uploading your change for review.
|
||||
@@ -144001,6 +144001,7 @@ uploading your change for review.
|
||||
<suffix name="Cast"/>
|
||||
<suffix name="ChromeOSRestart"/>
|
||||
<suffix name="ClearBrowsingData"/>
|
||||
@@ -142,7 +142,7 @@
|
||||
void ClearEntriesAddedSince(base::Time begin_time);
|
||||
--- a/tools/metrics/histograms/enums.xml
|
||||
+++ b/tools/metrics/histograms/enums.xml
|
||||
@@ -55212,6 +55212,7 @@ Full version information for the fingerp
|
||||
@@ -57117,6 +57117,7 @@ Full version information for the fingerp
|
||||
<int value="48" label="Open in Chrome"/>
|
||||
<int value="49" label="Site Settings"/>
|
||||
<int value="50" label="App Info"/>
|
||||
|
||||
@@ -22,7 +22,7 @@
|
||||
|
||||
--- a/components/omnibox/browser/autocomplete_input.cc
|
||||
+++ b/components/omnibox/browser/autocomplete_input.cc
|
||||
@@ -233,7 +233,7 @@ metrics::OmniboxInputType AutocompleteIn
|
||||
@@ -221,7 +221,7 @@ metrics::OmniboxInputType AutocompleteIn
|
||||
// We don't know about this scheme. It might be that the user typed a
|
||||
// URL of the form "username:password@foo.com".
|
||||
const base::string16 http_scheme_prefix =
|
||||
@@ -31,7 +31,7 @@
|
||||
url::kStandardSchemeSeparator);
|
||||
url::Parsed http_parts;
|
||||
base::string16 http_scheme;
|
||||
@@ -241,7 +241,7 @@ metrics::OmniboxInputType AutocompleteIn
|
||||
@@ -229,7 +229,7 @@ metrics::OmniboxInputType AutocompleteIn
|
||||
metrics::OmniboxInputType http_type =
|
||||
Parse(http_scheme_prefix + text, desired_tld, scheme_classifier,
|
||||
&http_parts, &http_scheme, &http_canonicalized_url);
|
||||
@@ -40,7 +40,7 @@
|
||||
base::UTF16ToUTF8(http_scheme));
|
||||
|
||||
if ((http_type == metrics::OmniboxInputType::URL) &&
|
||||
@@ -570,7 +570,7 @@ bool AutocompleteInput::HasHTTPScheme(co
|
||||
@@ -558,7 +558,7 @@ bool AutocompleteInput::HasHTTPScheme(co
|
||||
} else if (url::FindAndCompareScheme(utf8_input, kViewSourceScheme, &scheme)) {
|
||||
utf8_input.erase(0, scheme.end() + 1);
|
||||
}
|
||||
@@ -51,7 +51,7 @@
|
||||
void AutocompleteInput::UpdateText(const base::string16& text,
|
||||
--- a/components/omnibox/browser/autocomplete_provider.cc
|
||||
+++ b/components/omnibox/browser/autocomplete_provider.cc
|
||||
@@ -339,11 +339,11 @@ size_t AutocompleteProvider::TrimHttpPre
|
||||
@@ -349,11 +349,11 @@ size_t AutocompleteProvider::TrimHttpPre
|
||||
if (!AutocompleteInput::HasHTTPScheme(*url))
|
||||
return 0;
|
||||
size_t scheme_pos =
|
||||
@@ -65,9 +65,9 @@
|
||||
const size_t after_slashes = std::min(url->length(), prefix_end + 2);
|
||||
while ((prefix_end < after_slashes) && ((*url)[prefix_end] == '/'))
|
||||
++prefix_end;
|
||||
--- a/chrome/browser/resources/md_bookmarks/edit_dialog.js
|
||||
+++ b/chrome/browser/resources/md_bookmarks/edit_dialog.js
|
||||
@@ -93,7 +93,7 @@ Polymer({
|
||||
--- a/chrome/browser/resources/bookmarks/edit_dialog.js
|
||||
+++ b/chrome/browser/resources/bookmarks/edit_dialog.js
|
||||
@@ -95,7 +95,7 @@ Polymer({
|
||||
|
||||
/**
|
||||
* Validates the value of the URL field, returning true if it is a valid URL.
|
||||
@@ -76,12 +76,12 @@
|
||||
* @return {boolean}
|
||||
* @private
|
||||
*/
|
||||
@@ -104,7 +104,7 @@ Polymer({
|
||||
if (urlInput.validate())
|
||||
@@ -107,7 +107,7 @@ Polymer({
|
||||
return true;
|
||||
}
|
||||
|
||||
- this.urlValue_ = 'http://' + originalValue;
|
||||
+ this.urlValue_ = 'https://' + originalValue;
|
||||
|
||||
if (urlInput.validate())
|
||||
if (urlInput.validate()) {
|
||||
return true;
|
||||
|
||||
@@ -88,7 +88,7 @@
|
||||
-#endif // !WIN && !MAC && !LINUX
|
||||
--- a/content/browser/BUILD.gn
|
||||
+++ b/content/browser/BUILD.gn
|
||||
@@ -49,7 +49,6 @@ jumbo_source_set("browser") {
|
||||
@@ -50,7 +50,6 @@ jumbo_source_set("browser") {
|
||||
"//components/discardable_memory/service",
|
||||
"//components/download/database",
|
||||
"//components/download/public/common:public",
|
||||
|
||||
@@ -2,11 +2,10 @@
|
||||
|
||||
--- a/components/url_formatter/url_formatter.cc
|
||||
+++ b/components/url_formatter/url_formatter.cc
|
||||
@@ -409,14 +409,14 @@ IDNConversionStatus IDNToUnicodeOneCompo
|
||||
|
||||
@@ -410,14 +410,14 @@ IDNConversionStatus IDNToUnicodeOneCompo
|
||||
} // namespace
|
||||
|
||||
-const FormatUrlType kFormatUrlOmitNothing = 0;
|
||||
const FormatUrlType kFormatUrlOmitNothing = 0;
|
||||
-const FormatUrlType kFormatUrlOmitUsernamePassword = 1 << 0;
|
||||
-const FormatUrlType kFormatUrlOmitHTTP = 1 << 1;
|
||||
-const FormatUrlType kFormatUrlOmitTrailingSlashOnBareHostname = 1 << 2;
|
||||
@@ -14,7 +13,7 @@
|
||||
-const FormatUrlType kFormatUrlOmitTrivialSubdomains = 1 << 5;
|
||||
-const FormatUrlType kFormatUrlTrimAfterHost = 1 << 6;
|
||||
-const FormatUrlType kFormatUrlOmitFileScheme = 1 << 7;
|
||||
+const FormatUrlType kFormatUrlOmitNothing = 1;
|
||||
-const FormatUrlType kFormatUrlOmitMailToScheme = 1 << 8;
|
||||
+const FormatUrlType kFormatUrlOmitUsernamePassword = 0 << 0;
|
||||
+const FormatUrlType kFormatUrlOmitHTTP = 0 << 1;
|
||||
+const FormatUrlType kFormatUrlOmitTrailingSlashOnBareHostname = 0 << 2;
|
||||
@@ -22,6 +21,7 @@
|
||||
+const FormatUrlType kFormatUrlOmitTrivialSubdomains = 0 << 5;
|
||||
+const FormatUrlType kFormatUrlTrimAfterHost = 0 << 6;
|
||||
+const FormatUrlType kFormatUrlOmitFileScheme = 0 << 7;
|
||||
+const FormatUrlType kFormatUrlOmitMailToScheme = 0 << 8;
|
||||
|
||||
const FormatUrlType kFormatUrlOmitDefaults =
|
||||
kFormatUrlOmitUsernamePassword | kFormatUrlOmitHTTP |
|
||||
|
||||
@@ -3,7 +3,7 @@
|
||||
|
||||
--- a/third_party/blink/renderer/modules/webgl/webgl_rendering_context_base.cc
|
||||
+++ b/third_party/blink/renderer/modules/webgl/webgl_rendering_context_base.cc
|
||||
@@ -3282,16 +3282,14 @@ ScriptValue WebGLRenderingContextBase::g
|
||||
@@ -3298,16 +3298,14 @@ ScriptValue WebGLRenderingContextBase::g
|
||||
return ScriptValue::CreateNull(script_state);
|
||||
case WebGLDebugRendererInfo::kUnmaskedRendererWebgl:
|
||||
if (ExtensionEnabled(kWebGLDebugRendererInfoName))
|
||||
|
||||
@@ -17,7 +17,7 @@
|
||||
bool IsURLHandledByNetworkStack(const GURL& url) {
|
||||
--- a/chrome/browser/ui/browser_commands.cc
|
||||
+++ b/chrome/browser/ui/browser_commands.cc
|
||||
@@ -369,12 +369,6 @@ int GetContentRestrictions(const Browser
|
||||
@@ -378,12 +378,6 @@ int GetContentRestrictions(const Browser
|
||||
CoreTabHelper* core_tab_helper =
|
||||
CoreTabHelper::FromWebContents(current_tab);
|
||||
content_restrictions = core_tab_helper->content_restrictions();
|
||||
@@ -30,7 +30,7 @@
|
||||
if (current_tab->ShowingInterstitialPage())
|
||||
content_restrictions |= CONTENT_RESTRICTION_PRINT;
|
||||
}
|
||||
@@ -931,8 +925,7 @@ bool CanSavePage(const Browser* browser)
|
||||
@@ -949,8 +943,7 @@ bool CanSavePage(const Browser* browser)
|
||||
prefs::kAllowFileSelectionDialogs)) {
|
||||
return false;
|
||||
}
|
||||
@@ -39,7 +39,7 @@
|
||||
+ return true;
|
||||
}
|
||||
|
||||
void ShowFindBar(Browser* browser) {
|
||||
void SendToMyDevices(Browser* browser) {
|
||||
--- a/components/offline_pages/core/offline_page_model.cc
|
||||
+++ b/components/offline_pages/core/offline_page_model.cc
|
||||
@@ -37,7 +37,7 @@ OfflinePageModel::DeletedPageInfo::Delet
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
|
||||
--- a/content/renderer/render_view_impl.cc
|
||||
+++ b/content/renderer/render_view_impl.cc
|
||||
@@ -292,7 +292,7 @@ WindowOpenDisposition RenderViewImpl::Na
|
||||
@@ -289,7 +289,7 @@ WindowOpenDisposition RenderViewImpl::Na
|
||||
case blink::kWebNavigationPolicyNewWindow:
|
||||
return WindowOpenDisposition::NEW_WINDOW;
|
||||
case blink::kWebNavigationPolicyNewPopup:
|
||||
|
||||
File diff suppressed because it is too large
Load Diff
@@ -56,7 +56,6 @@ extra/debian_buster/disable/fuzzers.patch
|
||||
extra/debian_buster/disable/welcome-page.patch
|
||||
extra/debian_buster/disable/google-api-warning.patch
|
||||
extra/debian_buster/disable/device-notifications.patch
|
||||
extra/debian_buster/warnings/sequence-point.patch
|
||||
extra/debian_buster/warnings/initialization.patch
|
||||
extra/debian_buster/system/fontconfig.patch
|
||||
extra/iridium-browser/net-cert-increase-default-key-length-for-newly-gener.patch
|
||||
|
||||
947
pruning.list
947
pruning.list
File diff suppressed because it is too large
Load Diff
@@ -1 +1 @@
|
||||
4
|
||||
1
|
||||
|
||||
Reference in New Issue
Block a user