mirror of
https://github.com/morgan9e/helium
synced 2026-04-15 00:44:06 +09:00
Update to Chromium 112.0.5615.49
This commit is contained in:
@@ -1 +1 @@
|
||||
111.0.5563.147
|
||||
112.0.5615.49
|
||||
|
||||
@@ -41,10 +41,6 @@ PRUNING_INCLUDE_PATTERNS = [
|
||||
# pathlib.Path.match() paths to exclude from binary pruning
|
||||
PRUNING_EXCLUDE_PATTERNS = [
|
||||
'chrome/common/win/eventlog_messages.mc', # TODO: False positive textfile
|
||||
# TabRanker example preprocessor config
|
||||
# Details in chrome/browser/resource_coordinator/tab_ranker/README.md
|
||||
'chrome/browser/resource_coordinator/tab_ranker/example_preprocessor_config.pb',
|
||||
'chrome/browser/resource_coordinator/tab_ranker/pairwise_preprocessor_config.pb',
|
||||
# Exclusions for DOM distiller (contains model data only)
|
||||
'components/dom_distiller/core/data/distillable_page_model_new.bin',
|
||||
'components/dom_distiller/core/data/long_page_model.bin',
|
||||
@@ -367,7 +363,8 @@ def main(args_list=None):
|
||||
dest='error_unused',
|
||||
help='Do not treat unused patterns/prefixes as an error.')
|
||||
args = parser.parse_args(args_list)
|
||||
DOMAIN_EXCLUDE_PREFIXES.extend(args.domain_exclude_prefix)
|
||||
if args.domain_exclude_prefix is not None:
|
||||
DOMAIN_EXCLUDE_PREFIXES.extend(args.domain_exclude_prefix)
|
||||
if args.tree.exists() and not _dir_empty(args.tree):
|
||||
get_logger().info('Using existing source tree at %s', args.tree)
|
||||
else:
|
||||
|
||||
File diff suppressed because it is too large
Load Diff
1
flags.gn
1
flags.gn
@@ -3,7 +3,6 @@ chrome_pgo_phase=0
|
||||
clang_use_chrome_plugins=false
|
||||
disable_fieldtrial_testing_config=true
|
||||
enable_hangout_services_extension=false
|
||||
enable_js_type_check=false
|
||||
enable_mdns=false
|
||||
enable_mse_mpeg2ts_stream_parser=true
|
||||
enable_nacl=false
|
||||
|
||||
@@ -15,7 +15,7 @@ bug: http://bugs.debian.org/914487
|
||||
StartExtractDmgFeatures();
|
||||
--- a/chrome/common/safe_browsing/BUILD.gn
|
||||
+++ b/chrome/common/safe_browsing/BUILD.gn
|
||||
@@ -58,39 +58,6 @@ if (safe_browsing_mode == 1) {
|
||||
@@ -58,25 +58,6 @@ if (safe_browsing_mode == 1) {
|
||||
public_deps = [ "//components/safe_browsing/core/common/proto:csd_proto" ]
|
||||
}
|
||||
|
||||
@@ -35,27 +35,13 @@ bug: http://bugs.debian.org/914487
|
||||
- "//third_party/unrar:unrar",
|
||||
- ]
|
||||
-
|
||||
- defines = [
|
||||
- "_FILE_OFFSET_BITS=64",
|
||||
- "LARGEFILE_SOURCE",
|
||||
- "RAR_SMP",
|
||||
- "SILENT",
|
||||
-
|
||||
- # The following is set to disable certain macro definitions in the unrar
|
||||
- # source code.
|
||||
- "CHROMIUM_UNRAR",
|
||||
-
|
||||
- # Disables exceptions in unrar, replaces them with process termination.
|
||||
- "UNRAR_NO_EXCEPTIONS",
|
||||
- ]
|
||||
-
|
||||
- public_deps = [ "//components/safe_browsing/core/common/proto:csd_proto" ]
|
||||
- }
|
||||
-
|
||||
if (is_linux || is_win) {
|
||||
source_set("document_analyzer") {
|
||||
sources = [
|
||||
@@ -191,7 +158,6 @@ source_set("safe_browsing") {
|
||||
@@ -172,7 +153,6 @@ source_set("safe_browsing") {
|
||||
":archive_analyzer_results",
|
||||
":binary_feature_extractor",
|
||||
":download_type_util",
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
--- a/chrome/browser/BUILD.gn
|
||||
+++ b/chrome/browser/BUILD.gn
|
||||
@@ -2255,7 +2255,6 @@ static_library("browser") {
|
||||
@@ -2269,7 +2269,6 @@ static_library("browser") {
|
||||
"//components/reporting/util:task_runner_context",
|
||||
"//components/resources",
|
||||
"//components/safe_browsing/content/browser",
|
||||
@@ -8,7 +8,7 @@
|
||||
"//components/safe_browsing/content/browser:safe_browsing_service",
|
||||
"//components/safe_browsing/content/browser/password_protection",
|
||||
"//components/safe_browsing/content/browser/web_ui",
|
||||
@@ -3616,8 +3615,6 @@ static_library("browser") {
|
||||
@@ -3630,8 +3629,6 @@ static_library("browser") {
|
||||
"download/download_commands.h",
|
||||
"download/download_crx_util.cc",
|
||||
"download/download_crx_util.h",
|
||||
@@ -131,7 +131,7 @@
|
||||
#include "chrome/browser/safe_browsing/verdict_cache_manager_factory.h"
|
||||
#include "chrome/browser/search_engines/template_url_service_factory.h"
|
||||
#include "chrome/browser/share/share_history.h"
|
||||
@@ -633,10 +632,6 @@ void ChromeBrowsingDataRemoverDelegate::
|
||||
@@ -634,10 +633,6 @@ void ChromeBrowsingDataRemoverDelegate::
|
||||
base::RecordAction(UserMetricsAction("ClearBrowsingData_Cookies"));
|
||||
|
||||
network::mojom::NetworkContext* safe_browsing_context = nullptr;
|
||||
@@ -144,7 +144,7 @@
|
||||
browsing_data::RemoveFederatedSiteSettingsData(delete_begin_, delete_end_,
|
||||
--- a/chrome/browser/chrome_content_browser_client.cc
|
||||
+++ b/chrome/browser/chrome_content_browser_client.cc
|
||||
@@ -1046,34 +1046,6 @@ void SetApplicationLocaleOnIOThread(cons
|
||||
@@ -1058,34 +1058,6 @@ void SetApplicationLocaleOnIOThread(cons
|
||||
GetIOThreadApplicationLocale() = locale;
|
||||
}
|
||||
|
||||
@@ -179,7 +179,7 @@
|
||||
#if BUILDFLAG(ENABLE_EXTENSIONS)
|
||||
|
||||
AppLoadedInTabSource ClassifyAppLoadedInTabSource(
|
||||
@@ -4944,14 +4916,9 @@ ChromeContentBrowserClient::CreateThrott
|
||||
@@ -4977,14 +4949,9 @@ ChromeContentBrowserClient::CreateThrott
|
||||
throttles.push_back(std::make_unique<PolicyBlocklistNavigationThrottle>(
|
||||
handle, handle->GetWebContents()->GetBrowserContext()));
|
||||
|
||||
@@ -195,7 +195,7 @@
|
||||
base::BindOnce(&HandleSSLErrorWrapper), base::BindOnce(&IsInHostedApp),
|
||||
base::BindOnce(
|
||||
&ShouldIgnoreSslInterstitialBecauseNavigationDefaultedToHttps)));
|
||||
@@ -4994,16 +4961,6 @@ ChromeContentBrowserClient::CreateThrott
|
||||
@@ -5027,16 +4994,6 @@ ChromeContentBrowserClient::CreateThrott
|
||||
&throttles);
|
||||
#endif
|
||||
|
||||
@@ -212,7 +212,7 @@
|
||||
if (base::FeatureList::IsEnabled(safe_browsing::kDelayedWarnings)) {
|
||||
throttles.push_back(
|
||||
std::make_unique<safe_browsing::DelayedWarningNavigationThrottle>(
|
||||
@@ -5265,8 +5222,6 @@ void ChromeContentBrowserClient::Overrid
|
||||
@@ -5312,8 +5269,6 @@ void ChromeContentBrowserClient::Overrid
|
||||
void ChromeContentBrowserClient::InitOnUIThread() {
|
||||
DCHECK_CURRENTLY_ON(BrowserThread::UI);
|
||||
|
||||
@@ -246,7 +246,7 @@
|
||||
} // namespace
|
||||
--- a/chrome/browser/download/chrome_download_manager_delegate.cc
|
||||
+++ b/chrome/browser/download/chrome_download_manager_delegate.cc
|
||||
@@ -455,13 +455,6 @@ void ChromeDownloadManagerDelegate::SetD
|
||||
@@ -461,13 +461,6 @@ void ChromeDownloadManagerDelegate::SetD
|
||||
|
||||
download_manager_ = dm;
|
||||
|
||||
@@ -260,7 +260,7 @@
|
||||
if (download_manager_) {
|
||||
download_manager_->AddObserver(this);
|
||||
}
|
||||
@@ -826,17 +819,6 @@ void ChromeDownloadManagerDelegate::Choo
|
||||
@@ -832,17 +825,6 @@ void ChromeDownloadManagerDelegate::Choo
|
||||
void ChromeDownloadManagerDelegate::SanitizeSavePackageResourceName(
|
||||
base::FilePath* filename,
|
||||
const GURL& source_url) {
|
||||
@@ -280,7 +280,7 @@
|
||||
void ChromeDownloadManagerDelegate::SanitizeDownloadParameters(
|
||||
--- a/chrome/browser/download/download_item_model.cc
|
||||
+++ b/chrome/browser/download/download_item_model.cc
|
||||
@@ -106,7 +106,7 @@ class DownloadItemModelData : public bas
|
||||
@@ -110,7 +110,7 @@ class DownloadItemModelData : public bas
|
||||
|
||||
// Danger level of the file determined based on the file type and whether
|
||||
// there was a user action associated with the download.
|
||||
@@ -289,7 +289,7 @@
|
||||
|
||||
// Whether the download is currently being revived.
|
||||
bool is_being_revived_;
|
||||
@@ -154,7 +154,7 @@ DownloadItemModelData* DownloadItemModel
|
||||
@@ -160,7 +160,7 @@ DownloadItemModelData* DownloadItemModel
|
||||
DownloadItemModelData::DownloadItemModelData()
|
||||
: should_show_in_shelf_(true),
|
||||
was_ui_notified_(false),
|
||||
@@ -298,7 +298,7 @@
|
||||
is_being_revived_(false) {}
|
||||
|
||||
#if BUILDFLAG(FULL_SAFE_BROWSING)
|
||||
@@ -534,13 +534,13 @@ void DownloadItemModel::SetShouldPreferO
|
||||
@@ -543,13 +543,13 @@ void DownloadItemModel::SetShouldPreferO
|
||||
data->should_prefer_opening_in_browser_ = preference;
|
||||
}
|
||||
|
||||
@@ -315,7 +315,7 @@
|
||||
DownloadItemModelData* data = DownloadItemModelData::GetOrCreate(download_);
|
||||
data->danger_level_ = danger_level;
|
||||
}
|
||||
@@ -719,9 +719,6 @@ bool DownloadItemModel::IsCommandEnabled
|
||||
@@ -728,9 +728,6 @@ bool DownloadItemModel::IsCommandEnabled
|
||||
// filename. Don't base an "Always open" decision based on it. Also
|
||||
// exclude extensions.
|
||||
return download_->CanOpenDownload() &&
|
||||
@@ -327,7 +327,7 @@
|
||||
return !download_->IsSavePackageDownload() &&
|
||||
--- a/chrome/browser/download/download_prefs.cc
|
||||
+++ b/chrome/browser/download/download_prefs.cc
|
||||
@@ -263,14 +263,7 @@ DownloadPrefs::DownloadPrefs(Profile* pr
|
||||
@@ -268,14 +268,7 @@ DownloadPrefs::DownloadPrefs(Profile* pr
|
||||
base::FilePath::StringType(1, base::FilePath::kExtensionSeparator) +
|
||||
extension);
|
||||
|
||||
@@ -343,7 +343,7 @@
|
||||
}
|
||||
}
|
||||
|
||||
@@ -450,10 +443,6 @@ bool DownloadPrefs::IsAutoOpenByPolicy(c
|
||||
@@ -460,10 +453,6 @@ bool DownloadPrefs::IsAutoOpenByPolicy(c
|
||||
bool DownloadPrefs::EnableAutoOpenByUserBasedOnExtension(
|
||||
const base::FilePath& file_name) {
|
||||
base::FilePath::StringType extension = file_name.Extension();
|
||||
@@ -370,7 +370,7 @@
|
||||
// If no mime type or explicitly specified a name, don't replace file
|
||||
// extension.
|
||||
if (sniffed_mime_type.empty() || !suggested_filename.empty())
|
||||
@@ -1268,30 +1261,7 @@ DownloadFileType::DangerLevel DownloadTa
|
||||
@@ -1274,30 +1267,7 @@ DownloadFileType::DangerLevel DownloadTa
|
||||
download_->HasUserGesture())
|
||||
return DownloadFileType::NOT_DANGEROUS;
|
||||
|
||||
@@ -404,7 +404,7 @@
|
||||
absl::optional<base::Time>
|
||||
--- a/chrome/browser/extensions/api/downloads/downloads_api.cc
|
||||
+++ b/chrome/browser/extensions/api/downloads/downloads_api.cc
|
||||
@@ -36,7 +36,6 @@
|
||||
@@ -37,7 +37,6 @@
|
||||
#include "chrome/browser/download/bubble/download_bubble_prefs.h"
|
||||
#include "chrome/browser/download/download_core_service.h"
|
||||
#include "chrome/browser/download/download_core_service_factory.h"
|
||||
@@ -412,7 +412,7 @@
|
||||
#include "chrome/browser/download/download_file_icon_extractor.h"
|
||||
#include "chrome/browser/download/download_open_prompt.h"
|
||||
#include "chrome/browser/download/download_prefs.h"
|
||||
@@ -1360,9 +1359,6 @@ DownloadsAcceptDangerFunction::Downloads
|
||||
@@ -1361,9 +1360,6 @@ DownloadsAcceptDangerFunction::Downloads
|
||||
|
||||
DownloadsAcceptDangerFunction::~DownloadsAcceptDangerFunction() {}
|
||||
|
||||
@@ -422,7 +422,7 @@
|
||||
ExtensionFunction::ResponseAction DownloadsAcceptDangerFunction::Run() {
|
||||
std::unique_ptr<downloads::AcceptDanger::Params> params(
|
||||
downloads::AcceptDanger::Params::Create(args()));
|
||||
@@ -1400,42 +1396,7 @@ void DownloadsAcceptDangerFunction::Prom
|
||||
@@ -1401,42 +1397,7 @@ void DownloadsAcceptDangerFunction::Prom
|
||||
return;
|
||||
}
|
||||
RecordApiFunctions(DOWNLOADS_FUNCTION_ACCEPT_DANGER);
|
||||
@@ -548,7 +548,7 @@
|
||||
referrer_entries)));
|
||||
--- a/chrome/browser/extensions/api/webstore_private/webstore_private_api.cc
|
||||
+++ b/chrome/browser/extensions/api/webstore_private/webstore_private_api.cc
|
||||
@@ -720,18 +720,6 @@ void WebstorePrivateBeginInstallWithMani
|
||||
@@ -721,18 +721,6 @@ void WebstorePrivateBeginInstallWithMani
|
||||
|
||||
void WebstorePrivateBeginInstallWithManifest3Function::
|
||||
ReportFrictionAcceptedEvent() {
|
||||
@@ -567,7 +567,7 @@
|
||||
}
|
||||
|
||||
void WebstorePrivateBeginInstallWithManifest3Function::OnInstallPromptDone(
|
||||
@@ -1217,55 +1205,9 @@ WebstorePrivateGetReferrerChainFunction:
|
||||
@@ -1218,55 +1206,9 @@ WebstorePrivateGetReferrerChainFunction:
|
||||
|
||||
ExtensionFunction::ResponseAction
|
||||
WebstorePrivateGetReferrerChainFunction::Run() {
|
||||
@@ -694,21 +694,9 @@
|
||||
scoped_refptr<network::SharedURLLoaderFactory> url_loader_factory_;
|
||||
|
||||
// SimpleURLLoader -> (owned loader, extension id).
|
||||
--- a/chrome/browser/metrics/chrome_metrics_service_client.cc
|
||||
+++ b/chrome/browser/metrics/chrome_metrics_service_client.cc
|
||||
@@ -902,9 +902,6 @@ void ChromeMetricsServiceClient::Registe
|
||||
metrics_service_->RegisterMetricsProvider(
|
||||
std::make_unique<HttpsEngagementMetricsProvider>());
|
||||
|
||||
- metrics_service_->RegisterMetricsProvider(
|
||||
- std::make_unique<CertificateReportingMetricsProvider>());
|
||||
-
|
||||
#if !BUILDFLAG(IS_ANDROID) && !BUILDFLAG(IS_CHROMEOS_ASH)
|
||||
metrics_service_->RegisterMetricsProvider(
|
||||
std::make_unique<UpgradeMetricsProvider>());
|
||||
--- a/chrome/browser/net/trial_comparison_cert_verifier_controller.cc
|
||||
+++ b/chrome/browser/net/trial_comparison_cert_verifier_controller.cc
|
||||
@@ -132,9 +132,6 @@ void TrialComparisonCertVerifierControll
|
||||
@@ -137,9 +137,6 @@ void TrialComparisonCertVerifierControll
|
||||
std::string serialized_report;
|
||||
if (!report.Serialize(&serialized_report))
|
||||
return;
|
||||
@@ -728,7 +716,7 @@
|
||||
#include "chrome/browser/sessions/exit_type_service.h"
|
||||
#include "chrome/browser/sharing/sharing_service_factory.h"
|
||||
#include "chrome/browser/signin/identity_manager_factory.h"
|
||||
@@ -628,17 +627,6 @@ void ProfileImpl::LoadPrefsForNormalStar
|
||||
@@ -632,17 +631,6 @@ void ProfileImpl::LoadPrefsForNormalStar
|
||||
|
||||
mojo::PendingRemote<prefs::mojom::TrackedPreferenceValidationDelegate>
|
||||
pref_validation_delegate;
|
||||
@@ -768,7 +756,7 @@
|
||||
sources = [
|
||||
"chrome_controller_client.cc",
|
||||
"chrome_controller_client.h",
|
||||
@@ -94,6 +95,7 @@ static_library("safe_browsing") {
|
||||
@@ -96,6 +97,7 @@ static_library("safe_browsing") {
|
||||
"//extensions/browser",
|
||||
]
|
||||
}
|
||||
@@ -776,7 +764,7 @@
|
||||
|
||||
if (safe_browsing_mode != 0) {
|
||||
# "Safe Browsing Basic" files used for safe browsing in full mode
|
||||
@@ -484,6 +486,7 @@ static_library("advanced_protection") {
|
||||
@@ -489,6 +491,7 @@ static_library("advanced_protection") {
|
||||
}
|
||||
|
||||
source_set("metrics_collector") {
|
||||
@@ -784,7 +772,7 @@
|
||||
sources = [
|
||||
"safe_browsing_metrics_collector_factory.cc",
|
||||
"safe_browsing_metrics_collector_factory.h",
|
||||
@@ -501,6 +504,7 @@ source_set("metrics_collector") {
|
||||
@@ -508,6 +511,7 @@ source_set("metrics_collector") {
|
||||
"//components/safe_browsing/core/common:safe_browsing_prefs",
|
||||
"//content/public/browser",
|
||||
]
|
||||
@@ -794,7 +782,7 @@
|
||||
source_set("test_support") {
|
||||
--- a/chrome/browser/ssl/security_state_tab_helper.cc
|
||||
+++ b/chrome/browser/ssl/security_state_tab_helper.cc
|
||||
@@ -168,92 +168,6 @@ bool SecurityStateTabHelper::UsedPolicyI
|
||||
@@ -174,92 +174,6 @@ bool SecurityStateTabHelper::UsedPolicyI
|
||||
|
||||
security_state::MaliciousContentStatus
|
||||
SecurityStateTabHelper::GetMaliciousContentStatus() const {
|
||||
@@ -889,7 +877,7 @@
|
||||
|
||||
--- a/chrome/browser/ui/BUILD.gn
|
||||
+++ b/chrome/browser/ui/BUILD.gn
|
||||
@@ -4495,7 +4495,6 @@ static_library("ui") {
|
||||
@@ -4540,7 +4540,6 @@ static_library("ui") {
|
||||
"views/download/bubble/download_dialog_view.h",
|
||||
"views/download/bubble/download_toolbar_button_view.cc",
|
||||
"views/download/bubble/download_toolbar_button_view.h",
|
||||
@@ -1035,7 +1023,7 @@
|
||||
bool IsDeletingHistoryAllowed();
|
||||
--- a/chrome/browser/ui/webui/interstitials/interstitial_ui.cc
|
||||
+++ b/chrome/browser/ui/webui/interstitials/interstitial_ui.cc
|
||||
@@ -277,65 +277,6 @@ CreateHttpsOnlyModePage(content::WebCont
|
||||
@@ -278,65 +278,6 @@ CreateHttpsOnlyModePage(content::WebCont
|
||||
request_url));
|
||||
}
|
||||
|
||||
@@ -1101,7 +1089,7 @@
|
||||
std::unique_ptr<EnterpriseBlockPage> CreateEnterpriseBlockPage(
|
||||
content::WebContents* web_contents) {
|
||||
const GURL kRequestUrl("https://enterprise-block.example.net");
|
||||
@@ -345,88 +286,6 @@ std::unique_ptr<EnterpriseBlockPage> Cre
|
||||
@@ -346,88 +287,6 @@ std::unique_ptr<EnterpriseBlockPage> Cre
|
||||
kRequestUrl));
|
||||
}
|
||||
|
||||
@@ -1190,7 +1178,7 @@
|
||||
#if BUILDFLAG(ENABLE_CAPTIVE_PORTAL_DETECTION)
|
||||
std::unique_ptr<CaptivePortalBlockingPage> CreateCaptivePortalBlockingPage(
|
||||
content::WebContents* web_contents) {
|
||||
@@ -533,12 +392,8 @@ void InterstitialHTMLSource::StartDataRe
|
||||
@@ -534,12 +393,8 @@ void InterstitialHTMLSource::StartDataRe
|
||||
interstitial_delegate = CreateMITMSoftwareBlockingPage(web_contents);
|
||||
} else if (path_without_query == "/blocked-interception") {
|
||||
interstitial_delegate = CreateBlockedInterceptionBlockingPage(web_contents);
|
||||
@@ -1203,7 +1191,7 @@
|
||||
} else if (path_without_query == "/clock") {
|
||||
interstitial_delegate = CreateBadClockBlockingPage(web_contents);
|
||||
} else if (path_without_query == "/lookalike") {
|
||||
@@ -553,16 +408,12 @@ void InterstitialHTMLSource::StartDataRe
|
||||
@@ -554,16 +409,12 @@ void InterstitialHTMLSource::StartDataRe
|
||||
interstitial_delegate = CreateHttpsOnlyModePage(web_contents);
|
||||
}
|
||||
|
||||
@@ -1225,7 +1213,7 @@
|
||||
html = ui::ResourceBundle::GetSharedInstance().LoadDataResourceString(
|
||||
--- a/chrome/renderer/chrome_content_renderer_client.cc
|
||||
+++ b/chrome/renderer/chrome_content_renderer_client.cc
|
||||
@@ -98,7 +98,6 @@
|
||||
@@ -97,7 +97,6 @@
|
||||
#include "components/paint_preview/buildflags/buildflags.h"
|
||||
#include "components/password_manager/core/common/password_manager_features.h"
|
||||
#include "components/safe_browsing/buildflags.h"
|
||||
@@ -1233,7 +1221,7 @@
|
||||
#include "components/spellcheck/spellcheck_buildflags.h"
|
||||
#include "components/subresource_filter/content/renderer/subresource_filter_agent.h"
|
||||
#include "components/subresource_filter/content/renderer/unverified_ruleset_dealer.h"
|
||||
@@ -429,12 +428,8 @@ void ChromeContentRendererClient::Render
|
||||
@@ -433,12 +432,8 @@ void ChromeContentRendererClient::Render
|
||||
subresource_filter_ruleset_dealer_ =
|
||||
std::make_unique<subresource_filter::UnverifiedRulesetDealer>();
|
||||
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
--- a/components/autofill/core/browser/autofill_download_manager.cc
|
||||
+++ b/components/autofill/core/browser/autofill_download_manager.cc
|
||||
@@ -805,95 +805,6 @@ std::tuple<GURL, std::string> AutofillDo
|
||||
@@ -792,95 +792,6 @@ std::tuple<GURL, std::string> AutofillDo
|
||||
}
|
||||
|
||||
bool AutofillDownloadManager::StartRequest(FormRequestData request_data) {
|
||||
|
||||
@@ -10,7 +10,7 @@
|
||||
extension_misc::kAssessmentAssistantExtensionId,
|
||||
--- a/chrome/browser/extensions/component_loader.cc
|
||||
+++ b/chrome/browser/extensions/component_loader.cc
|
||||
@@ -361,11 +361,6 @@ void ComponentLoader::AddWebStoreApp() {
|
||||
@@ -376,11 +376,6 @@ void ComponentLoader::AddWebStoreApp() {
|
||||
if (!IsNormalSession())
|
||||
return;
|
||||
#endif
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
|
||||
--- a/BUILD.gn
|
||||
+++ b/BUILD.gn
|
||||
@@ -453,14 +453,6 @@ group("gn_all") {
|
||||
@@ -459,14 +459,6 @@ group("gn_all") {
|
||||
deps += [ "//chromeos:chromeos_unittests" ]
|
||||
}
|
||||
|
||||
|
||||
@@ -123,7 +123,7 @@ by default.
|
||||
scoped_refptr<base::SequencedTaskRunner> task_runner)
|
||||
--- a/chrome/browser/media/webrtc/webrtc_log_uploader.cc
|
||||
+++ b/chrome/browser/media/webrtc/webrtc_log_uploader.cc
|
||||
@@ -484,7 +484,7 @@ void WebRtcLogUploader::UploadCompressed
|
||||
@@ -485,7 +485,7 @@ void WebRtcLogUploader::UploadCompressed
|
||||
"Not implemented, it would be good to do so."
|
||||
})");
|
||||
|
||||
@@ -178,7 +178,7 @@ by default.
|
||||
DownloadFeedbackFactory* DownloadFeedback::factory_ = nullptr;
|
||||
--- a/chrome/browser/spellchecker/spellcheck_hunspell_dictionary.cc
|
||||
+++ b/chrome/browser/spellchecker/spellcheck_hunspell_dictionary.cc
|
||||
@@ -277,7 +277,7 @@ GURL SpellcheckHunspellDictionary::GetDi
|
||||
@@ -274,7 +274,7 @@ GURL SpellcheckHunspellDictionary::GetDi
|
||||
DCHECK(!bdict_file.empty());
|
||||
|
||||
static const char kDownloadServerUrl[] =
|
||||
@@ -189,14 +189,14 @@ by default.
|
||||
base::ToLowerASCII(bdict_file));
|
||||
--- a/chrome/browser/supervised_user/supervised_user_service.cc
|
||||
+++ b/chrome/browser/supervised_user/supervised_user_service.cc
|
||||
@@ -87,7 +87,7 @@ namespace {
|
||||
@@ -86,7 +86,7 @@ namespace {
|
||||
|
||||
// The URL from which to download a host denylist if no local one exists yet.
|
||||
const char kDenylistURL[] =
|
||||
- "https://www.gstatic.com/chrome/supervised_user/denylist-20141001-1k.bin";
|
||||
+ "trk:272:https://www.gstatic.com/chrome/supervised_user/denylist-20141001-1k.bin";
|
||||
// The filename under which we'll store the denylist (in the user data dir).
|
||||
const char kDenylistFilename[] = "su-denylist.bin";
|
||||
|
||||
const char kDenylistSourceHistogramName[] = "FamilyUser.DenylistSource";
|
||||
|
||||
--- a/chrome/browser/ui/dialogs/outdated_upgrade_bubble.cc
|
||||
+++ b/chrome/browser/ui/dialogs/outdated_upgrade_bubble.cc
|
||||
@@ -271,7 +271,7 @@ by default.
|
||||
|
||||
--- a/chrome/installer/setup/google_chrome_behaviors.cc
|
||||
+++ b/chrome/installer/setup/google_chrome_behaviors.cc
|
||||
@@ -37,7 +37,7 @@ namespace installer {
|
||||
@@ -36,7 +36,7 @@ namespace installer {
|
||||
namespace {
|
||||
|
||||
constexpr base::WStringPiece kUninstallSurveyUrl(
|
||||
@@ -370,7 +370,7 @@ by default.
|
||||
"http://clientservices.googleapis.com/uma/v2";
|
||||
--- a/components/safe_browsing/content/browser/client_side_detection_service.cc
|
||||
+++ b/components/safe_browsing/content/browser/client_side_detection_service.cc
|
||||
@@ -63,7 +63,7 @@ const int ClientSideDetectionService::kN
|
||||
@@ -71,7 +71,7 @@ const int ClientSideDetectionService::kN
|
||||
const int ClientSideDetectionService::kPositiveCacheIntervalMinutes = 30;
|
||||
|
||||
const char ClientSideDetectionService::kClientReportPhishingUrl[] =
|
||||
@@ -460,7 +460,7 @@ by default.
|
||||
WebAuthRequestSecurityChecker(const WebAuthRequestSecurityChecker&) = delete;
|
||||
--- a/content/shell/browser/shell_browser_main_parts.cc
|
||||
+++ b/content/shell/browser/shell_browser_main_parts.cc
|
||||
@@ -85,7 +85,7 @@ GURL GetStartupURL() {
|
||||
@@ -87,7 +87,7 @@ GURL GetStartupURL() {
|
||||
#else
|
||||
const base::CommandLine::StringVector& args = command_line->GetArgs();
|
||||
if (args.empty())
|
||||
|
||||
@@ -13,7 +13,7 @@ This prevents trk:148 (phishing) and trk:149 (malware).
|
||||
|
||||
--- a/components/safe_browsing/content/browser/client_side_detection_service.cc
|
||||
+++ b/components/safe_browsing/content/browser/client_side_detection_service.cc
|
||||
@@ -207,6 +207,10 @@ void ClientSideDetectionService::StartCl
|
||||
@@ -237,6 +237,10 @@ void ClientSideDetectionService::StartCl
|
||||
return;
|
||||
}
|
||||
|
||||
@@ -24,7 +24,7 @@ This prevents trk:148 (phishing) and trk:149 (malware).
|
||||
std::string request_data;
|
||||
request->SerializeToString(&request_data);
|
||||
|
||||
@@ -281,6 +285,7 @@ void ClientSideDetectionService::StartCl
|
||||
@@ -311,6 +315,7 @@ void ClientSideDetectionService::StartCl
|
||||
base::BindOnce(&WebUIInfoSingleton::AddToClientPhishingRequestsSent,
|
||||
base::Unretained(WebUIInfoSingleton::GetInstance()),
|
||||
std::move(request), access_token));
|
||||
|
||||
@@ -45,7 +45,7 @@
|
||||
collection_error_info_.ClearError();
|
||||
--- a/chrome/browser/spellchecker/spellcheck_hunspell_dictionary.cc
|
||||
+++ b/chrome/browser/spellchecker/spellcheck_hunspell_dictionary.cc
|
||||
@@ -284,6 +284,7 @@ GURL SpellcheckHunspellDictionary::GetDi
|
||||
@@ -281,6 +281,7 @@ GURL SpellcheckHunspellDictionary::GetDi
|
||||
}
|
||||
|
||||
void SpellcheckHunspellDictionary::DownloadDictionary(GURL url) {
|
||||
@@ -70,6 +70,6 @@
|
||||
const base::flat_map<std::string, std::string>& additional_attributes,
|
||||
UpdateCheckCallback update_check_callback) {
|
||||
+ return;
|
||||
DCHECK(thread_checker_.CalledOnValidThread());
|
||||
DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_);
|
||||
|
||||
update_check_callback_ = std::move(update_check_callback);
|
||||
|
||||
@@ -70,7 +70,7 @@
|
||||
// other origins, so we should not treat them as web safe. Remove callers of
|
||||
--- a/net/BUILD.gn
|
||||
+++ b/net/BUILD.gn
|
||||
@@ -1023,6 +1023,8 @@ component("net") {
|
||||
@@ -1026,6 +1026,8 @@ component("net") {
|
||||
"url_request/report_sender.h",
|
||||
"url_request/static_http_user_agent_settings.cc",
|
||||
"url_request/static_http_user_agent_settings.h",
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
|
||||
--- a/chrome/browser/chrome_content_browser_client.cc
|
||||
+++ b/chrome/browser/chrome_content_browser_client.cc
|
||||
@@ -2547,7 +2547,8 @@ void ChromeContentBrowserClient::AppendE
|
||||
@@ -2545,7 +2545,8 @@ void ChromeContentBrowserClient::AppendE
|
||||
command_line->AppendSwitchASCII(switches::kMetricsClientID,
|
||||
client_info->client_id);
|
||||
}
|
||||
|
||||
@@ -1,16 +1,5 @@
|
||||
# Disables references to fonts.googleapis.com
|
||||
|
||||
--- a/chrome/browser/resources/chromeos/accessibility/chromevox/options/options.css
|
||||
+++ b/chrome/browser/resources/chromeos/accessibility/chromevox/options/options.css
|
||||
@@ -2,7 +2,7 @@
|
||||
* Use of this source code is governed by a BSD-style license that can be
|
||||
* found in the LICENSE file. */
|
||||
|
||||
-@import url(https://fonts.googleapis.com/css?family=Roboto);
|
||||
+@import url(chrome://resources/css/roboto.css);
|
||||
|
||||
body {
|
||||
margin: 0 0 20px 0;
|
||||
--- a/chrome/browser/resources/chromeos/accessibility/select_to_speak/options.css
|
||||
+++ b/chrome/browser/resources/chromeos/accessibility/select_to_speak/options.css
|
||||
@@ -2,7 +2,7 @@
|
||||
|
||||
@@ -3,7 +3,7 @@
|
||||
|
||||
--- a/google_apis/gaia/gaia_auth_fetcher.cc
|
||||
+++ b/google_apis/gaia/gaia_auth_fetcher.cc
|
||||
@@ -261,59 +261,6 @@ void GaiaAuthFetcher::CreateAndStartGaia
|
||||
@@ -262,61 +262,6 @@ void GaiaAuthFetcher::CreateAndStartGaia
|
||||
network::mojom::CredentialsMode credentials_mode,
|
||||
const net::NetworkTrafficAnnotationTag& traffic_annotation) {
|
||||
DCHECK(!fetch_pending_) << "Tried to fetch two things at once!";
|
||||
@@ -12,7 +12,9 @@
|
||||
- resource_request->url = gaia_gurl;
|
||||
- original_url_ = gaia_gurl;
|
||||
-
|
||||
- if (credentials_mode != network::mojom::CredentialsMode::kOmit) {
|
||||
- if (credentials_mode != network::mojom::CredentialsMode::kOmit &&
|
||||
- credentials_mode !=
|
||||
- network::mojom::CredentialsMode::kOmitBug_775438_Workaround) {
|
||||
- CHECK(gaia::HasGaiaSchemeHostPort(gaia_gurl)) << gaia_gurl;
|
||||
-
|
||||
- url::Origin origin = GaiaUrls::GetInstance()->gaia_origin();
|
||||
|
||||
@@ -1,5 +1,17 @@
|
||||
# Disables various detections of Google hosts and functionality specific to them
|
||||
|
||||
--- a/chrome/browser/ui/webui/suggest_internals/suggest_internals_handler.cc
|
||||
+++ b/chrome/browser/ui/webui/suggest_internals/suggest_internals_handler.cc
|
||||
@@ -55,9 +55,6 @@ void SuggestInternalsHandler::OnSuggestR
|
||||
suggest_internals::mojom::Request::New();
|
||||
mojom_request->id = request_id;
|
||||
mojom_request->url = request->url;
|
||||
- std::string variations_header;
|
||||
- variations::GetVariationsHeader(*request, &variations_header);
|
||||
- mojom_request->data[variations::kClientDataHeader] = variations_header;
|
||||
mojom_request->data[request->method] = request->url.spec();
|
||||
mojom_request->status = suggest_internals::mojom::RequestStatus::kSent;
|
||||
mojom_request->start_time = base::Time::Now();
|
||||
--- a/chrome/common/google_url_loader_throttle.cc
|
||||
+++ b/chrome/common/google_url_loader_throttle.cc
|
||||
@@ -15,10 +15,6 @@
|
||||
@@ -470,7 +482,7 @@
|
||||
bool IsGoogleHostname(const GURL& url) {
|
||||
--- a/components/search_engines/template_url.cc
|
||||
+++ b/components/search_engines/template_url.cc
|
||||
@@ -536,11 +536,7 @@ std::u16string TemplateURLRef::SearchTer
|
||||
@@ -556,11 +556,7 @@ std::u16string TemplateURLRef::SearchTer
|
||||
bool TemplateURLRef::HasGoogleBaseURLs(
|
||||
const SearchTermsData& search_terms_data) const {
|
||||
ParseIfNecessary(search_terms_data);
|
||||
@@ -496,7 +508,24 @@
|
||||
namespace {
|
||||
|
||||
// The result of checking whether a request to a URL should have variations
|
||||
@@ -250,30 +246,7 @@ class VariationsHeaderHelper {
|
||||
@@ -114,16 +110,6 @@ URLValidationResult GetUrlValidationResu
|
||||
return URLValidationResult::kShouldAppend;
|
||||
}
|
||||
|
||||
-// Returns true if the request to |url| should include a variations header.
|
||||
-// Also, logs the result of validating |url| in histograms, one of which ends in
|
||||
-// |suffix|.
|
||||
-bool ShouldAppendVariationsHeader(const GURL& url, const std::string& suffix) {
|
||||
- URLValidationResult result = GetUrlValidationResult(url);
|
||||
- base::UmaHistogramEnumeration(
|
||||
- "Variations.Headers.URLValidationResult." + suffix, result);
|
||||
- return result == URLValidationResult::kShouldAppend;
|
||||
-}
|
||||
-
|
||||
// Returns true if the request is sent from a Google web property, i.e. from a
|
||||
// first-party context.
|
||||
//
|
||||
@@ -250,30 +236,7 @@ class VariationsHeaderHelper {
|
||||
VariationsHeaderHelper& operator=(const VariationsHeaderHelper&) = delete;
|
||||
|
||||
bool AppendHeaderIfNeeded(const GURL& url, InIncognito incognito) {
|
||||
@@ -528,7 +557,7 @@
|
||||
}
|
||||
|
||||
private:
|
||||
@@ -338,8 +311,6 @@ void RemoveVariationsHeaderIfNeeded(
|
||||
@@ -338,8 +301,6 @@ void RemoveVariationsHeaderIfNeeded(
|
||||
const net::RedirectInfo& redirect_info,
|
||||
const network::mojom::URLResponseHead& response_head,
|
||||
std::vector<std::string>* to_be_removed_headers) {
|
||||
@@ -537,18 +566,27 @@
|
||||
}
|
||||
|
||||
std::unique_ptr<network::SimpleURLLoader>
|
||||
@@ -369,9 +340,7 @@ CreateSimpleURLLoaderWithVariationsHeade
|
||||
@@ -375,29 +336,22 @@ CreateSimpleURLLoaderWithVariationsHeade
|
||||
}
|
||||
|
||||
bool HasVariationsHeader(const network::ResourceRequest& request) {
|
||||
- // Note: kOmniboxOnDeviceSuggestionsHeader is not listed because this function
|
||||
- // is only used for testing.
|
||||
- return request.cors_exempt_headers.HasHeader(kClientDataHeader);
|
||||
- std::string unused_header;
|
||||
- return GetVariationsHeader(request, &unused_header);
|
||||
+ return false;
|
||||
}
|
||||
|
||||
bool GetVariationsHeader(const network::ResourceRequest& request,
|
||||
std::string* out) {
|
||||
- return request.cors_exempt_headers.GetHeader(kClientDataHeader, out);
|
||||
+ return false;
|
||||
}
|
||||
|
||||
bool ShouldAppendVariationsHeaderForTesting(
|
||||
@@ -382,12 +351,6 @@ bool ShouldAppendVariationsHeaderForTest
|
||||
const GURL& url,
|
||||
const std::string& histogram_suffix) {
|
||||
- return ShouldAppendVariationsHeader(url, histogram_suffix);
|
||||
+ return false;
|
||||
}
|
||||
|
||||
void UpdateCorsExemptHeaderForVariations(
|
||||
network::mojom::NetworkContextParams* params) {
|
||||
|
||||
@@ -29,7 +29,7 @@
|
||||
} // namespace
|
||||
--- a/components/privacy_sandbox/privacy_sandbox_prefs.cc
|
||||
+++ b/components/privacy_sandbox/privacy_sandbox_prefs.cc
|
||||
@@ -98,7 +98,7 @@ namespace privacy_sandbox {
|
||||
@@ -101,7 +101,7 @@ namespace privacy_sandbox {
|
||||
|
||||
void RegisterProfilePrefs(PrefRegistrySimple* registry) {
|
||||
registry->RegisterBooleanPref(
|
||||
@@ -49,7 +49,7 @@
|
||||
}
|
||||
|
||||
PrivacySandboxSettingsImpl::PrivacySandboxSettingsImpl(
|
||||
@@ -470,20 +470,7 @@ bool PrivacySandboxSettingsImpl::IsPriva
|
||||
@@ -465,20 +465,7 @@ bool PrivacySandboxSettingsImpl::IsPriva
|
||||
}
|
||||
|
||||
bool PrivacySandboxSettingsImpl::IsPrivacySandboxEnabled() const {
|
||||
@@ -71,14 +71,14 @@
|
||||
}
|
||||
|
||||
void PrivacySandboxSettingsImpl::SetAllPrivacySandboxAllowedForTesting() {
|
||||
@@ -508,7 +495,6 @@ void PrivacySandboxSettingsImpl::SetTopi
|
||||
@@ -503,7 +490,6 @@ void PrivacySandboxSettingsImpl::SetTopi
|
||||
}
|
||||
|
||||
void PrivacySandboxSettingsImpl::SetPrivacySandboxEnabled(bool enabled) {
|
||||
- pref_service_->SetBoolean(prefs::kPrivacySandboxApisEnabledV2, enabled);
|
||||
}
|
||||
|
||||
bool PrivacySandboxSettingsImpl::IsTrustTokensAllowed() {
|
||||
bool PrivacySandboxSettingsImpl::IsPrivacySandboxRestricted() const {
|
||||
--- a/content/browser/aggregation_service/aggregation_service_features.cc
|
||||
+++ b/content/browser/aggregation_service/aggregation_service_features.cc
|
||||
@@ -9,7 +9,7 @@ namespace content {
|
||||
@@ -92,7 +92,7 @@
|
||||
kPrivacySandboxAggregationServiceTrustedServerUrlAwsParam{
|
||||
--- a/third_party/blink/common/features.cc
|
||||
+++ b/third_party/blink/common/features.cc
|
||||
@@ -122,7 +122,7 @@ BASE_FEATURE(kBlockingDownloadsInAdFrame
|
||||
@@ -129,7 +129,7 @@ BASE_FEATURE(kBlockingDownloadsInAdFrame
|
||||
// Controls whether the Conversion Measurement API infrastructure is enabled.
|
||||
BASE_FEATURE(kConversionMeasurement,
|
||||
"ConversionMeasurement",
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
|
||||
--- a/chrome/browser/ui/chrome_pages.cc
|
||||
+++ b/chrome/browser/ui/chrome_pages.cc
|
||||
@@ -600,32 +600,6 @@ void ShowShortcutCustomizationApp(Profil
|
||||
@@ -610,32 +610,6 @@ void ShowShortcutCustomizationApp(Profil
|
||||
void ShowBrowserSignin(Browser* browser,
|
||||
signin_metrics::AccessPoint access_point,
|
||||
signin::ConsentLevel consent_level) {
|
||||
|
||||
@@ -62,7 +62,7 @@
|
||||
}
|
||||
|
||||
void WebRtcLogUploader::UploadStoredLog(
|
||||
@@ -245,49 +207,6 @@ void WebRtcLogUploader::LoggingStoppedDo
|
||||
@@ -245,50 +207,6 @@ void WebRtcLogUploader::LoggingStoppedDo
|
||||
DCHECK(log_buffer.get());
|
||||
DCHECK(!log_paths.directory.empty());
|
||||
|
||||
@@ -105,8 +105,9 @@
|
||||
- base::FilePath meta_path =
|
||||
- log_paths.directory.AppendASCII(log_id).AddExtension(
|
||||
- FILE_PATH_LITERAL(".meta"));
|
||||
- base::WriteFile(meta_path, static_cast<const char*>(pickle.data()),
|
||||
- pickle.size());
|
||||
- base::WriteFile(meta_path,
|
||||
- base::make_span(static_cast<const uint8_t*>(pickle.data()),
|
||||
- pickle.size()));
|
||||
- }
|
||||
-
|
||||
main_task_runner_->PostTask(
|
||||
|
||||
@@ -78,7 +78,7 @@
|
||||
} // namespace extensions
|
||||
--- a/extensions/browser/updater/extension_downloader.cc
|
||||
+++ b/extensions/browser/updater/extension_downloader.cc
|
||||
@@ -92,27 +92,18 @@ const char kNotFromWebstoreInstallSource
|
||||
@@ -89,28 +89,19 @@ const char kNotFromWebstoreInstallSource
|
||||
const char kDefaultInstallSource[] = "";
|
||||
const char kReinstallInstallSource[] = "reinstall";
|
||||
|
||||
@@ -88,6 +88,7 @@
|
||||
- "https://www.googleapis.com/auth/chromewebstore.readonly";
|
||||
+ "trk:10:https://www.googleapis.com/auth/chromewebstore.readonly";
|
||||
|
||||
ExtensionDownloader::TestObserver* g_test_observer = nullptr;
|
||||
ExtensionDownloaderTestDelegate* g_test_delegate = nullptr;
|
||||
|
||||
#define RETRY_HISTOGRAM(name, retry_count, url) \
|
||||
@@ -108,7 +109,7 @@
|
||||
|
||||
bool ShouldRetryRequest(const network::SimpleURLLoader* loader) {
|
||||
DCHECK(loader);
|
||||
@@ -342,10 +333,6 @@ void ExtensionDownloader::DoStartAllPend
|
||||
@@ -334,10 +325,6 @@ void ExtensionDownloader::DoStartAllPend
|
||||
AddToFetches(fetches_preparing, std::move(task));
|
||||
pending_tasks_.clear();
|
||||
|
||||
@@ -119,7 +120,7 @@
|
||||
}
|
||||
|
||||
void ExtensionDownloader::SetIdentityManager(
|
||||
@@ -384,11 +371,6 @@ bool ExtensionDownloader::AddExtensionDa
|
||||
@@ -389,11 +376,6 @@ bool ExtensionDownloader::AddExtensionDa
|
||||
return false;
|
||||
}
|
||||
|
||||
@@ -131,7 +132,7 @@
|
||||
// Skip extensions with empty IDs.
|
||||
if (task.id.empty()) {
|
||||
DLOG(WARNING) << "Found extension with empty ID";
|
||||
@@ -398,7 +380,7 @@ bool ExtensionDownloader::AddExtensionDa
|
||||
@@ -403,7 +385,7 @@ bool ExtensionDownloader::AddExtensionDa
|
||||
|
||||
if (task.update_url.is_empty()) {
|
||||
// Fill in default update URL.
|
||||
@@ -140,7 +141,7 @@
|
||||
}
|
||||
|
||||
DCHECK(!task.update_url.is_empty());
|
||||
@@ -795,20 +777,6 @@ void ExtensionDownloader::HandleManifest
|
||||
@@ -808,20 +790,6 @@ void ExtensionDownloader::HandleManifest
|
||||
update.second->info);
|
||||
}
|
||||
|
||||
@@ -161,7 +162,7 @@
|
||||
ExtensionIdSet extension_ids_with_errors;
|
||||
for (const auto& failure : failures)
|
||||
extension_ids_with_errors.insert(failure.first.id);
|
||||
@@ -1392,11 +1360,7 @@ bool ExtensionDownloader::IterateFetchCr
|
||||
@@ -1396,11 +1364,7 @@ bool ExtensionDownloader::IterateFetchCr
|
||||
// fetch.
|
||||
switch (fetch->credentials) {
|
||||
case ExtensionFetch::CREDENTIALS_NONE:
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
|
||||
--- a/chrome/browser/BUILD.gn
|
||||
+++ b/chrome/browser/BUILD.gn
|
||||
@@ -606,8 +606,6 @@ static_library("browser") {
|
||||
@@ -611,8 +611,6 @@ static_library("browser") {
|
||||
"internal_auth.h",
|
||||
"interstitials/chrome_settings_page_helper.cc",
|
||||
"interstitials/chrome_settings_page_helper.h",
|
||||
@@ -11,7 +11,7 @@
|
||||
"invalidation/profile_invalidation_provider_factory.cc",
|
||||
"invalidation/profile_invalidation_provider_factory.h",
|
||||
"k_anonymity_service/k_anonymity_service_client.cc",
|
||||
@@ -3640,10 +3638,6 @@ static_library("browser") {
|
||||
@@ -3654,10 +3652,6 @@ static_library("browser") {
|
||||
"enterprise/connectors/analysis/analysis_service_settings.h",
|
||||
"enterprise/connectors/analysis/analysis_settings.cc",
|
||||
"enterprise/connectors/analysis/analysis_settings.h",
|
||||
@@ -22,7 +22,7 @@
|
||||
"enterprise/connectors/analysis/content_analysis_dialog.cc",
|
||||
"enterprise/connectors/analysis/content_analysis_dialog.h",
|
||||
"enterprise/connectors/analysis/content_analysis_downloads_delegate.cc",
|
||||
@@ -3912,10 +3906,6 @@ static_library("browser") {
|
||||
@@ -3932,10 +3926,6 @@ static_library("browser") {
|
||||
"new_tab_page/modules/recipes/recipes_service_factory.h",
|
||||
"new_tab_page/modules/recipes/time_format_util.cc",
|
||||
"new_tab_page/modules/recipes/time_format_util.h",
|
||||
@@ -33,15 +33,15 @@
|
||||
"new_tab_page/new_tab_page_util.cc",
|
||||
"new_tab_page/new_tab_page_util.h",
|
||||
"new_tab_page/one_google_bar/one_google_bar_data.cc",
|
||||
@@ -4361,7 +4351,6 @@ static_library("browser") {
|
||||
"//chrome/browser/new_tab_page/modules/feed:mojo_bindings",
|
||||
@@ -4383,7 +4373,6 @@ static_library("browser") {
|
||||
"//chrome/browser/new_tab_page/modules/history_clusters:mojo_bindings",
|
||||
"//chrome/browser/new_tab_page/modules/photos:mojo_bindings",
|
||||
"//chrome/browser/new_tab_page/modules/recipes:mojo_bindings",
|
||||
- "//chrome/browser/new_tab_page/modules/safe_browsing:mojo_bindings",
|
||||
"//chrome/browser/policy:path_parser",
|
||||
"//chrome/browser/profile_resetter:profile_reset_report_proto",
|
||||
"//chrome/browser/resource_coordinator:intervention_policy_database_proto",
|
||||
@@ -7563,9 +7552,14 @@ static_library("browser") {
|
||||
@@ -7581,9 +7570,14 @@ static_library("browser") {
|
||||
"//components/safe_browsing/content/browser:safe_browsing_blocking_page",
|
||||
"//components/safe_browsing/content/browser/download:download_stats",
|
||||
"//components/safe_browsing/content/common:file_type_policies",
|
||||
@@ -59,7 +59,7 @@
|
||||
sources += [
|
||||
--- a/chrome/browser/chrome_content_browser_client.cc
|
||||
+++ b/chrome/browser/chrome_content_browser_client.cc
|
||||
@@ -4962,11 +4962,13 @@ ChromeContentBrowserClient::CreateThrott
|
||||
@@ -4995,11 +4995,13 @@ ChromeContentBrowserClient::CreateThrott
|
||||
&throttles);
|
||||
#endif
|
||||
|
||||
@@ -73,7 +73,7 @@
|
||||
|
||||
#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX)
|
||||
MaybeAddThrottle(browser_switcher::BrowserSwitcherNavigationThrottle::
|
||||
@@ -6487,26 +6489,7 @@ ChromeContentBrowserClient::GetSafeBrows
|
||||
@@ -6541,26 +6543,7 @@ ChromeContentBrowserClient::GetSafeBrows
|
||||
const std::vector<std::string>& allowlist_domains) {
|
||||
DCHECK_CURRENTLY_ON(BrowserThread::IO);
|
||||
|
||||
@@ -101,7 +101,7 @@
|
||||
}
|
||||
|
||||
safe_browsing::RealTimeUrlLookupServiceBase*
|
||||
@@ -6527,11 +6510,6 @@ ChromeContentBrowserClient::GetUrlLookup
|
||||
@@ -6581,11 +6564,6 @@ ChromeContentBrowserClient::GetUrlLookup
|
||||
GetForProfile(profile);
|
||||
}
|
||||
#endif
|
||||
@@ -113,43 +113,6 @@
|
||||
return nullptr;
|
||||
}
|
||||
|
||||
--- a/chrome/browser/chrome_content_browser_client_receiver_bindings.cc
|
||||
+++ b/chrome/browser/chrome_content_browser_client_receiver_bindings.cc
|
||||
@@ -144,34 +144,6 @@ void MaybeCreateSafeBrowsingForRenderer(
|
||||
const std::vector<std::string>& allowlist_domains)>
|
||||
get_checker_delegate,
|
||||
mojo::PendingReceiver<safe_browsing::mojom::SafeBrowsing> receiver) {
|
||||
- DCHECK_CURRENTLY_ON(content::BrowserThread::UI);
|
||||
-
|
||||
- content::RenderProcessHost* render_process_host =
|
||||
- content::RenderProcessHost::FromID(process_id);
|
||||
- if (!render_process_host)
|
||||
- return;
|
||||
-
|
||||
- PrefService* pref_service =
|
||||
- Profile::FromBrowserContext(render_process_host->GetBrowserContext())
|
||||
- ->GetPrefs();
|
||||
-
|
||||
- std::vector<std::string> allowlist_domains =
|
||||
- safe_browsing::GetURLAllowlistByPolicy(pref_service);
|
||||
-
|
||||
- bool safe_browsing_enabled =
|
||||
- safe_browsing::IsSafeBrowsingEnabled(*pref_service);
|
||||
- content::GetIOThreadTaskRunner({})->PostTask(
|
||||
- FROM_HERE,
|
||||
- base::BindOnce(
|
||||
- &safe_browsing::MojoSafeBrowsingImpl::MaybeCreate, process_id,
|
||||
- resource_context,
|
||||
- base::BindRepeating(get_checker_delegate, safe_browsing_enabled,
|
||||
- // Navigation initiated from renderer should never
|
||||
- // check when safe browsing is disabled, because
|
||||
- // enterprise check only supports mainframe URL.
|
||||
- /*should_check_on_sb_disabled=*/false,
|
||||
- allowlist_domains),
|
||||
- std::move(receiver)));
|
||||
}
|
||||
#endif
|
||||
|
||||
--- a/chrome/browser/component_updater/chrome_client_side_phishing_component_installer.cc
|
||||
+++ b/chrome/browser/component_updater/chrome_client_side_phishing_component_installer.cc
|
||||
@@ -29,20 +29,6 @@ namespace {
|
||||
@@ -185,7 +148,7 @@
|
||||
|
||||
--- a/chrome/browser/devtools/devtools_window.cc
|
||||
+++ b/chrome/browser/devtools/devtools_window.cc
|
||||
@@ -73,6 +73,7 @@
|
||||
@@ -72,6 +72,7 @@
|
||||
#include "content/public/browser/web_contents.h"
|
||||
#include "content/public/common/content_client.h"
|
||||
#include "content/public/common/url_constants.h"
|
||||
@@ -195,7 +158,15 @@
|
||||
#include "third_party/blink/public/common/renderer_preferences/renderer_preferences.h"
|
||||
--- a/chrome/browser/download/bubble/download_bubble_controller.cc
|
||||
+++ b/chrome/browser/download/bubble/download_bubble_controller.cc
|
||||
@@ -400,8 +400,6 @@ void DownloadBubbleUIController::Process
|
||||
@@ -25,7 +25,6 @@
|
||||
#include "chrome/browser/download/offline_item_utils.h"
|
||||
#include "chrome/browser/offline_items_collection/offline_content_aggregator_factory.h"
|
||||
#include "chrome/browser/profiles/profile_key.h"
|
||||
-#include "chrome/browser/safe_browsing/download_protection/download_protection_service.h"
|
||||
#include "chrome/browser/safe_browsing/safe_browsing_service.h"
|
||||
#include "chrome/browser/ui/browser.h"
|
||||
#include "chrome/browser/ui/browser_finder.h"
|
||||
@@ -458,8 +457,6 @@ void DownloadBubbleUIController::Process
|
||||
commands.ExecuteCommand(command);
|
||||
break;
|
||||
case DownloadCommands::REVIEW:
|
||||
@@ -206,15 +177,15 @@
|
||||
RetryDownload(model, command);
|
||||
--- a/chrome/browser/download/chrome_download_manager_delegate.cc
|
||||
+++ b/chrome/browser/download/chrome_download_manager_delegate.cc
|
||||
@@ -133,7 +133,6 @@ using content::DownloadManager;
|
||||
@@ -136,7 +136,6 @@ using content::DownloadManager;
|
||||
using download::DownloadItem;
|
||||
using download::DownloadPathReservationTracker;
|
||||
using download::PathValidationResult;
|
||||
-using safe_browsing::DownloadFileType;
|
||||
using safe_browsing::DownloadProtectionService;
|
||||
using ConnectionType = net::NetworkChangeNotifier::ConnectionType;
|
||||
|
||||
@@ -1489,7 +1488,6 @@ void ChromeDownloadManagerDelegate::OnDo
|
||||
#if BUILDFLAG(FULL_SAFE_BROWSING)
|
||||
@@ -1496,7 +1495,6 @@ void ChromeDownloadManagerDelegate::OnDo
|
||||
DownloadItemModel model(item);
|
||||
model.DetermineAndSetShouldPreferOpeningInBrowser(
|
||||
target_info->target_path, target_info->is_filetype_handled_safely);
|
||||
@@ -222,7 +193,7 @@
|
||||
}
|
||||
if (ShouldBlockFile(item, target_info->danger_type)) {
|
||||
MaybeReportDangerousDownloadBlocked(
|
||||
@@ -1568,54 +1566,6 @@ bool ChromeDownloadManagerDelegate::IsOp
|
||||
@@ -1575,54 +1573,6 @@ bool ChromeDownloadManagerDelegate::IsOp
|
||||
bool ChromeDownloadManagerDelegate::ShouldBlockFile(
|
||||
download::DownloadItem* item,
|
||||
download::DownloadDangerType danger_type) const {
|
||||
@@ -277,7 +248,7 @@
|
||||
|
||||
return false;
|
||||
}
|
||||
@@ -1630,7 +1580,6 @@ void ChromeDownloadManagerDelegate::Mayb
|
||||
@@ -1637,7 +1587,6 @@ void ChromeDownloadManagerDelegate::Mayb
|
||||
service->MaybeSendDangerousDownloadOpenedReport(download,
|
||||
show_download_in_folder);
|
||||
}
|
||||
@@ -285,7 +256,7 @@
|
||||
if (!download->GetAutoOpened()) {
|
||||
download::DownloadContent download_content =
|
||||
download::DownloadContentFromMimeType(download->GetMimeType(), false);
|
||||
@@ -1638,6 +1587,7 @@ void ChromeDownloadManagerDelegate::Mayb
|
||||
@@ -1645,6 +1594,7 @@ void ChromeDownloadManagerDelegate::Mayb
|
||||
download->GetDangerType(), download_content, base::Time::Now(),
|
||||
download->GetEndTime(), show_download_in_folder);
|
||||
}
|
||||
@@ -293,7 +264,7 @@
|
||||
}
|
||||
|
||||
void ChromeDownloadManagerDelegate::CheckDownloadAllowed(
|
||||
@@ -1695,8 +1645,7 @@ void ChromeDownloadManagerDelegate::Chec
|
||||
@@ -1702,8 +1652,7 @@ void ChromeDownloadManagerDelegate::Chec
|
||||
DCHECK(download_item);
|
||||
DCHECK(download_item->IsSavePackageDownload());
|
||||
|
||||
@@ -305,7 +276,7 @@
|
||||
|
||||
--- a/chrome/browser/download/download_item_model.cc
|
||||
+++ b/chrome/browser/download/download_item_model.cc
|
||||
@@ -917,100 +917,10 @@ void DownloadItemModel::ExecuteCommand(D
|
||||
@@ -926,101 +926,10 @@ void DownloadItemModel::ExecuteCommand(D
|
||||
|
||||
DownloadItemModel::BubbleUIInfo
|
||||
DownloadItemModel::GetBubbleUIInfoForTailoredWarning() const {
|
||||
@@ -320,7 +291,8 @@
|
||||
- return DownloadUIModel::BubbleUIInfo(
|
||||
- l10n_util::GetStringUTF16(
|
||||
- IDS_DOWNLOAD_BUBBLE_SUBPAGE_SUMMARY_SUSPICIOUS_ARCHIVE))
|
||||
- .AddIconAndColor(views::kInfoIcon, ui::kColorAlertMediumSeverity)
|
||||
- .AddIconAndColor(vector_icons::kNotSecureWarningIcon,
|
||||
- ui::kColorAlertMediumSeverity)
|
||||
- .AddPrimaryButton(DownloadCommands::Command::DISCARD)
|
||||
- .AddSubpageButton(l10n_util::GetStringUTF16(IDS_DOWNLOAD_BUBBLE_DELETE),
|
||||
- DownloadCommands::Command::DISCARD,
|
||||
@@ -353,7 +325,7 @@
|
||||
- l10n_util::GetStringFUTF16(
|
||||
- IDS_DOWNLOAD_BUBBLE_SUBPAGE_SUMMARY_COOKIE_THEFT_AND_ACCOUNT,
|
||||
- base::ASCIIToUTF16(email)))
|
||||
- .AddIconAndColor(vector_icons::kNotSecureWarningIcon,
|
||||
- .AddIconAndColor(vector_icons::kDangerousIcon,
|
||||
- ui::kColorAlertHighSeverity)
|
||||
- .AddPrimaryButton(DownloadCommands::Command::DISCARD)
|
||||
- .AddSubpageButton(
|
||||
@@ -365,7 +337,7 @@
|
||||
- return DownloadUIModel::BubbleUIInfo(
|
||||
- l10n_util::GetStringUTF16(
|
||||
- IDS_DOWNLOAD_BUBBLE_SUBPAGE_SUMMARY_COOKIE_THEFT))
|
||||
- .AddIconAndColor(vector_icons::kNotSecureWarningIcon,
|
||||
- .AddIconAndColor(vector_icons::kDangerousIcon,
|
||||
- ui::kColorAlertHighSeverity)
|
||||
- .AddPrimaryButton(DownloadCommands::Command::DISCARD)
|
||||
- .AddSubpageButton(l10n_util::GetStringUTF16(IDS_DOWNLOAD_BUBBLE_DELETE),
|
||||
@@ -429,7 +401,7 @@
|
||||
void RecordOpenedDangerousConfirmDialog(
|
||||
--- a/chrome/browser/download/download_target_determiner.cc
|
||||
+++ b/chrome/browser/download/download_target_determiner.cc
|
||||
@@ -989,12 +989,14 @@ void DownloadTargetDeterminer::CheckVisi
|
||||
@@ -995,12 +995,14 @@ void DownloadTargetDeterminer::CheckVisi
|
||||
bool visited_referrer_before) {
|
||||
DCHECK_CURRENTLY_ON(BrowserThread::UI);
|
||||
DCHECK_EQ(STATE_DETERMINE_INTERMEDIATE_PATH, next_state_);
|
||||
@@ -444,7 +416,7 @@
|
||||
danger_level_ = GetDangerLevel(
|
||||
visited_referrer_before ? VISITED_REFERRER : NO_VISITS_TO_REFERRER);
|
||||
if (danger_level_ != DownloadFileType::NOT_DANGEROUS &&
|
||||
@@ -1266,6 +1268,7 @@ DownloadFileType::DangerLevel DownloadTa
|
||||
@@ -1272,6 +1274,7 @@ DownloadFileType::DangerLevel DownloadTa
|
||||
|
||||
absl::optional<base::Time>
|
||||
DownloadTargetDeterminer::GetLastDownloadBypassTimestamp() const {
|
||||
@@ -452,7 +424,7 @@
|
||||
safe_browsing::SafeBrowsingMetricsCollector* metrics_collector =
|
||||
safe_browsing::SafeBrowsingMetricsCollectorFactory::GetForProfile(
|
||||
GetProfile());
|
||||
@@ -1274,6 +1277,9 @@ DownloadTargetDeterminer::GetLastDownloa
|
||||
@@ -1280,6 +1283,9 @@ DownloadTargetDeterminer::GetLastDownloa
|
||||
safe_browsing::SafeBrowsingMetricsCollector::
|
||||
EventType::DANGEROUS_DOWNLOAD_BYPASS)
|
||||
: absl::nullopt;
|
||||
@@ -487,7 +459,57 @@
|
||||
std::u16string ContentAnalysisDownloadsDelegate::GetBypassJustificationLabel()
|
||||
--- a/chrome/browser/enterprise/connectors/analysis/files_request_handler.cc
|
||||
+++ b/chrome/browser/enterprise/connectors/analysis/files_request_handler.cc
|
||||
@@ -236,14 +236,6 @@ void FilesRequestHandler::OnGotFileInfo(
|
||||
@@ -158,49 +158,12 @@ void FilesRequestHandler::FileRequestCal
|
||||
}
|
||||
|
||||
bool FilesRequestHandler::UploadDataImpl() {
|
||||
- safe_browsing::IncrementCrashKey(
|
||||
- safe_browsing::ScanningCrashKey::PENDING_FILE_UPLOADS, paths_.size());
|
||||
-
|
||||
- if (!paths_.empty()) {
|
||||
- safe_browsing::IncrementCrashKey(
|
||||
- safe_browsing::ScanningCrashKey::TOTAL_FILE_UPLOADS, paths_.size());
|
||||
-
|
||||
- std::vector<safe_browsing::FileOpeningJob::FileOpeningTask> tasks(
|
||||
- paths_.size());
|
||||
- for (size_t i = 0; i < paths_.size(); ++i)
|
||||
- tasks[i].request = PrepareFileRequest(i);
|
||||
-
|
||||
- file_opening_job_ =
|
||||
- std::make_unique<safe_browsing::FileOpeningJob>(std::move(tasks));
|
||||
- return true;
|
||||
- }
|
||||
-
|
||||
// If zero files were passed to the FilesRequestHandler, we call the callback
|
||||
// directly.
|
||||
MaybeCompleteScanRequest();
|
||||
return false;
|
||||
}
|
||||
|
||||
-safe_browsing::FileAnalysisRequest* FilesRequestHandler::PrepareFileRequest(
|
||||
- size_t index) {
|
||||
- DCHECK_LT(index, paths_.size());
|
||||
- base::FilePath path = paths_[index];
|
||||
- auto request = std::make_unique<safe_browsing::FileAnalysisRequest>(
|
||||
- *analysis_settings_, path, path.BaseName(), /*mime_type*/ "",
|
||||
- /* delay_opening_file */ true,
|
||||
- base::BindOnce(&FilesRequestHandler::FileRequestCallback,
|
||||
- weak_ptr_factory_.GetWeakPtr(), index),
|
||||
- base::BindOnce(&FilesRequestHandler::FileRequestStartCallback,
|
||||
- weak_ptr_factory_.GetWeakPtr(), index));
|
||||
- safe_browsing::FileAnalysisRequest* request_raw = request.get();
|
||||
- PrepareRequest(AccessPointToEnterpriseConnector(access_point_), request_raw);
|
||||
- request_raw->GetRequestData(base::BindOnce(
|
||||
- &FilesRequestHandler::OnGotFileInfo, weak_ptr_factory_.GetWeakPtr(),
|
||||
- std::move(request), index));
|
||||
-
|
||||
- return request_raw;
|
||||
-}
|
||||
-
|
||||
void FilesRequestHandler::OnGotFileInfo(
|
||||
std::unique_ptr<safe_browsing::BinaryUploadService::Request> request,
|
||||
size_t index,
|
||||
@@ -236,14 +199,6 @@ void FilesRequestHandler::OnGotFileInfo(
|
||||
void FilesRequestHandler::FinishRequestEarly(
|
||||
std::unique_ptr<safe_browsing::BinaryUploadService::Request> request,
|
||||
safe_browsing::BinaryUploadService::Result result) {
|
||||
@@ -502,9 +524,22 @@
|
||||
request->FinishRequest(result,
|
||||
enterprise_connectors::ContentAnalysisResponse());
|
||||
}
|
||||
--- a/chrome/browser/enterprise/connectors/analysis/files_request_handler.h
|
||||
+++ b/chrome/browser/enterprise/connectors/analysis/files_request_handler.h
|
||||
@@ -110,10 +110,6 @@ class FilesRequestHandler : public Reque
|
||||
enterprise_connectors::ContentAnalysisResponse response);
|
||||
|
||||
private:
|
||||
- // Prepares an upload request for the file at `path`. If the file
|
||||
- // cannot be uploaded it will have a failure verdict added to `result_`.
|
||||
- safe_browsing::FileAnalysisRequest* PrepareFileRequest(size_t index);
|
||||
-
|
||||
// Called when the file info for `path` has been fetched. Also begins the
|
||||
// upload process.
|
||||
void OnGotFileInfo(
|
||||
--- a/chrome/browser/enterprise/connectors/connectors_service.cc
|
||||
+++ b/chrome/browser/enterprise/connectors/connectors_service.cc
|
||||
@@ -407,19 +407,6 @@ absl::optional<std::string> ConnectorsSe
|
||||
@@ -413,19 +413,6 @@ absl::optional<std::string> ConnectorsSe
|
||||
return absl::nullopt;
|
||||
}
|
||||
|
||||
@@ -586,7 +621,7 @@
|
||||
signals.Set(device_signals::names::kBuiltInDnsClientEnabled,
|
||||
--- a/chrome/browser/enterprise/connectors/reporting/realtime_reporting_client.cc
|
||||
+++ b/chrome/browser/enterprise/connectors/reporting/realtime_reporting_client.cc
|
||||
@@ -387,7 +387,7 @@ void RealtimeReportingClient::ReportReal
|
||||
@@ -406,7 +406,7 @@ void RealtimeReportingClient::ReportEven
|
||||
}
|
||||
|
||||
std::string RealtimeReportingClient::GetProfileUserName() const {
|
||||
@@ -744,8 +779,8 @@
|
||||
"pending_extension_info.cc",
|
||||
--- a/chrome/browser/extensions/api/api_browser_context_keyed_service_factories.cc
|
||||
+++ b/chrome/browser/extensions/api/api_browser_context_keyed_service_factories.cc
|
||||
@@ -87,7 +87,6 @@ void EnsureApiBrowserContextKeyedService
|
||||
extensions::PasswordsPrivateEventRouterFactory::GetInstance();
|
||||
@@ -95,7 +95,6 @@ void EnsureApiBrowserContextKeyedService
|
||||
#endif // BUILDFLAG(ENABLE_SCREEN_AI_SERVICE)
|
||||
extensions::PreferenceAPI::GetFactoryInstance();
|
||||
extensions::ProcessesAPI::GetFactoryInstance();
|
||||
- extensions::SafeBrowsingPrivateEventRouterFactory::GetInstance();
|
||||
@@ -776,7 +811,7 @@
|
||||
}
|
||||
|
||||
CookiesGetAllFunction::CookiesGetAllFunction() {
|
||||
@@ -383,26 +368,6 @@ void CookiesGetAllFunction::GetCookieLis
|
||||
@@ -377,26 +362,6 @@ void CookiesGetAllFunction::GetCookieLis
|
||||
}
|
||||
|
||||
void CookiesGetAllFunction::NotifyExtensionTelemetry() {
|
||||
@@ -825,7 +860,7 @@
|
||||
info.enterprise_profile_id = signals.enterprise_profile_id;
|
||||
--- a/chrome/browser/extensions/chrome_extensions_browser_client.cc
|
||||
+++ b/chrome/browser/extensions/chrome_extensions_browser_client.cc
|
||||
@@ -703,56 +703,17 @@ void ChromeExtensionsBrowserClient::Noti
|
||||
@@ -705,56 +705,17 @@ void ChromeExtensionsBrowserClient::Noti
|
||||
content::BrowserContext* context,
|
||||
const ExtensionId& extension_id,
|
||||
const std::string& code) const {
|
||||
@@ -892,8 +927,8 @@
|
||||
-#include "chrome/browser/extensions/omaha_attributes_handler.h"
|
||||
#include "chrome/browser/extensions/pending_extension_manager.h"
|
||||
#include "chrome/browser/extensions/permissions_updater.h"
|
||||
#include "chrome/browser/extensions/shared_module_service.h"
|
||||
@@ -192,7 +191,6 @@ void ExtensionService::BlocklistExtensio
|
||||
#include "chrome/browser/extensions/profile_util.h"
|
||||
@@ -194,7 +193,6 @@ void ExtensionService::BlocklistExtensio
|
||||
blocklist_prefs::SetSafeBrowsingExtensionBlocklistState(
|
||||
extension_id, BitMapBlocklistState::BLOCKLISTED_MALWARE,
|
||||
extension_prefs_);
|
||||
@@ -901,7 +936,7 @@
|
||||
}
|
||||
|
||||
bool ExtensionService::OnExternalExtensionUpdateUrlFound(
|
||||
@@ -358,9 +356,6 @@ ExtensionService::ExtensionService(Profi
|
||||
@@ -362,9 +360,6 @@ ExtensionService::ExtensionService(
|
||||
safe_browsing_verdict_handler_(extension_prefs,
|
||||
ExtensionRegistry::Get(profile),
|
||||
this),
|
||||
@@ -911,7 +946,7 @@
|
||||
registry_(ExtensionRegistry::Get(profile)),
|
||||
pending_extension_manager_(profile),
|
||||
install_directory_(install_directory),
|
||||
@@ -856,100 +851,6 @@ bool ExtensionService::IsExtensionEnable
|
||||
@@ -861,100 +856,6 @@ bool ExtensionService::IsExtensionEnable
|
||||
return extension_registrar_.IsExtensionEnabled(extension_id);
|
||||
}
|
||||
|
||||
@@ -1021,8 +1056,8 @@
|
||||
-#include "chrome/browser/extensions/omaha_attributes_handler.h"
|
||||
#include "chrome/browser/extensions/pending_extension_manager.h"
|
||||
#include "chrome/browser/extensions/safe_browsing_verdict_handler.h"
|
||||
#include "chrome/browser/profiles/profile_manager.h"
|
||||
@@ -278,40 +277,11 @@ class ExtensionService : public Extensio
|
||||
#include "chrome/browser/profiles/profile_manager_observer.h"
|
||||
@@ -279,40 +278,11 @@ class ExtensionService : public Extensio
|
||||
// nothing.
|
||||
void EnableExtension(const std::string& extension_id);
|
||||
|
||||
@@ -1063,7 +1098,7 @@
|
||||
// Disables the extension. If the extension is already disabled, just adds
|
||||
// the |disable_reasons| (a bitmask of disable_reason::DisableReason - there
|
||||
// can be multiple DisableReasons e.g. when an extension comes in disabled
|
||||
@@ -655,8 +625,6 @@ class ExtensionService : public Extensio
|
||||
@@ -661,8 +631,6 @@ class ExtensionService : public Extensio
|
||||
|
||||
SafeBrowsingVerdictHandler safe_browsing_verdict_handler_;
|
||||
|
||||
@@ -1074,7 +1109,7 @@
|
||||
|
||||
--- a/chrome/browser/extensions/extension_system_impl.cc
|
||||
+++ b/chrome/browser/extensions/extension_system_impl.cc
|
||||
@@ -464,8 +464,6 @@ void ExtensionSystemImpl::InstallUpdate(
|
||||
@@ -465,8 +465,6 @@ void ExtensionSystemImpl::InstallUpdate(
|
||||
void ExtensionSystemImpl::PerformActionBasedOnOmahaAttributes(
|
||||
const std::string& extension_id,
|
||||
const base::Value& attributes) {
|
||||
@@ -1119,16 +1154,15 @@
|
||||
}
|
||||
--- a/chrome/browser/file_system_access/chrome_file_system_access_permission_context.cc
|
||||
+++ b/chrome/browser/file_system_access/chrome_file_system_access_permission_context.cc
|
||||
@@ -32,8 +32,6 @@
|
||||
@@ -32,7 +32,6 @@
|
||||
#include "chrome/browser/download/download_prefs.h"
|
||||
#include "chrome/browser/file_system_access/file_system_access_permission_request_manager.h"
|
||||
#include "chrome/browser/profiles/profile.h"
|
||||
-#include "chrome/browser/safe_browsing/download_protection/download_protection_service.h"
|
||||
-#include "chrome/browser/safe_browsing/safe_browsing_service.h"
|
||||
-#include "chrome/browser/safe_browsing/download_protection/download_protection_util.h"
|
||||
#include "chrome/browser/ui/file_system_access_dialogs.h"
|
||||
#include "chrome/common/chrome_paths.h"
|
||||
#include "chrome/common/pdf_util.h"
|
||||
@@ -394,85 +392,6 @@ bool ShouldBlockAccessToPath(const base:
|
||||
@@ -398,85 +397,6 @@ bool ShouldBlockAccessToPath(const base:
|
||||
return true;
|
||||
}
|
||||
|
||||
@@ -1214,7 +1248,7 @@
|
||||
std::string GenerateLastPickedDirectoryKey(const std::string& id) {
|
||||
return id.empty() ? kDefaultLastPickedDirectoryKey
|
||||
: base::StrCat({kCustomLastPickedDirectoryKey, "-", id});
|
||||
@@ -492,13 +411,7 @@ base::StringPiece GetGrantKeyFromGrantTy
|
||||
@@ -496,13 +416,7 @@ base::StringPiece GetGrantKeyFromGrantTy
|
||||
bool FileHasDangerousExtension(const url::Origin& origin,
|
||||
const base::FilePath& path,
|
||||
Profile* profile) {
|
||||
@@ -1229,7 +1263,7 @@
|
||||
}
|
||||
|
||||
} // namespace
|
||||
@@ -1328,29 +1241,6 @@ void ChromeFileSystemAccessPermissionCon
|
||||
@@ -1334,29 +1248,6 @@ void ChromeFileSystemAccessPermissionCon
|
||||
std::move(callback));
|
||||
}
|
||||
|
||||
@@ -1274,15 +1308,15 @@
|
||||
|
||||
--- a/chrome/browser/media/webrtc/display_media_access_handler.cc
|
||||
+++ b/chrome/browser/media/webrtc/display_media_access_handler.cc
|
||||
@@ -24,6 +24,7 @@
|
||||
@@ -23,6 +23,7 @@
|
||||
#include "chrome/browser/safe_browsing/user_interaction_observer.h"
|
||||
#include "chrome/common/pref_names.h"
|
||||
#include "components/prefs/pref_service.h"
|
||||
+#include "components/safe_browsing/buildflags.h"
|
||||
#include "components/url_formatter/elide_url.h"
|
||||
#include "content/public/browser/browser_thread.h"
|
||||
#include "content/public/browser/desktop_capture.h"
|
||||
@@ -112,6 +113,7 @@ void DisplayMediaAccessHandler::HandleRe
|
||||
#include "content/public/browser/desktop_media_id.h"
|
||||
@@ -110,6 +111,7 @@ void DisplayMediaAccessHandler::HandleRe
|
||||
return;
|
||||
}
|
||||
|
||||
@@ -1290,7 +1324,7 @@
|
||||
// SafeBrowsing Delayed Warnings experiment can delay some SafeBrowsing
|
||||
// warnings until user interaction. If the current page has a delayed warning,
|
||||
// it'll have a user interaction observer attached. Show the warning
|
||||
@@ -127,6 +129,7 @@ void DisplayMediaAccessHandler::HandleRe
|
||||
@@ -125,6 +127,7 @@ void DisplayMediaAccessHandler::HandleRe
|
||||
observer->OnDesktopCaptureRequest();
|
||||
return;
|
||||
}
|
||||
@@ -1324,7 +1358,7 @@
|
||||
#include "chrome/browser/safe_browsing/extension_telemetry/extension_telemetry_service.h"
|
||||
#include "chrome/browser/safe_browsing/extension_telemetry/extension_telemetry_service_factory.h"
|
||||
#include "chrome/browser/safe_browsing/extension_telemetry/password_reuse_signal.h"
|
||||
@@ -901,6 +900,7 @@ autofill::LanguageCode ChromePasswordMan
|
||||
@@ -886,6 +885,7 @@ autofill::LanguageCode ChromePasswordMan
|
||||
return autofill::LanguageCode();
|
||||
}
|
||||
|
||||
@@ -1332,7 +1366,7 @@
|
||||
safe_browsing::PasswordProtectionService*
|
||||
ChromePasswordManagerClient::GetPasswordProtectionService() const {
|
||||
return safe_browsing::ChromePasswordProtectionService::
|
||||
@@ -974,13 +974,9 @@ void ChromePasswordManagerClient::CheckP
|
||||
@@ -959,13 +959,9 @@ void ChromePasswordManagerClient::CheckP
|
||||
telemetry_service->AddSignal(std::move(password_reuse_signal));
|
||||
#endif // !BUILDFLAG(IS_ANDROID)
|
||||
}
|
||||
@@ -1347,7 +1381,7 @@
|
||||
}
|
||||
|
||||
#if !BUILDFLAG(IS_ANDROID)
|
||||
@@ -989,36 +985,10 @@ void ChromePasswordManagerClient::MaybeR
|
||||
@@ -974,36 +970,10 @@ void ChromePasswordManagerClient::MaybeR
|
||||
bool is_federated,
|
||||
const url::Origin& federated_origin,
|
||||
const std::u16string& login_user_name) const {
|
||||
@@ -1384,7 +1418,7 @@
|
||||
}
|
||||
#endif
|
||||
|
||||
@@ -1526,7 +1496,9 @@ void ChromePasswordManagerClient::OnPast
|
||||
@@ -1511,7 +1481,9 @@ void ChromePasswordManagerClient::OnPast
|
||||
}
|
||||
|
||||
was_on_paste_called_ = true;
|
||||
@@ -1394,7 +1428,7 @@
|
||||
}
|
||||
|
||||
void ChromePasswordManagerClient::RenderFrameCreated(
|
||||
@@ -1562,7 +1534,9 @@ void ChromePasswordManagerClient::OnInpu
|
||||
@@ -1547,7 +1519,9 @@ void ChromePasswordManagerClient::OnInpu
|
||||
if (key_event.windows_key_code == (ui::VKEY_V & 0x1f)) {
|
||||
OnPaste();
|
||||
} else {
|
||||
@@ -1404,7 +1438,7 @@
|
||||
}
|
||||
#endif // BUILDFLAG(IS_ANDROID)
|
||||
}
|
||||
@@ -1593,6 +1567,7 @@ bool ChromePasswordManagerClient::IsPass
|
||||
@@ -1578,6 +1552,7 @@ bool ChromePasswordManagerClient::IsPass
|
||||
is_enabled = false;
|
||||
}
|
||||
|
||||
@@ -1412,7 +1446,7 @@
|
||||
// SafeBrowsing Delayed Warnings experiment can delay some SafeBrowsing
|
||||
// warnings until user interaction. If the current page has a delayed warning,
|
||||
// it'll have a user interaction observer attached. Disable password
|
||||
@@ -1603,6 +1578,7 @@ bool ChromePasswordManagerClient::IsPass
|
||||
@@ -1588,6 +1563,7 @@ bool ChromePasswordManagerClient::IsPass
|
||||
observer->OnPasswordSaveOrAutofillDenied();
|
||||
is_enabled = false;
|
||||
}
|
||||
@@ -1617,7 +1651,7 @@
|
||||
}
|
||||
--- a/chrome/browser/policy/configuration_policy_handler_list_factory.cc
|
||||
+++ b/chrome/browser/policy/configuration_policy_handler_list_factory.cc
|
||||
@@ -96,6 +96,7 @@
|
||||
@@ -94,6 +94,7 @@
|
||||
#include "components/policy/policy_constants.h"
|
||||
#include "components/privacy_sandbox/privacy_sandbox_prefs.h"
|
||||
#include "components/proxy_config/proxy_policy_handler.h"
|
||||
@@ -1625,7 +1659,7 @@
|
||||
#include "components/safe_browsing/content/common/file_type_policies_prefs.h"
|
||||
#include "components/safe_browsing/core/common/safe_browsing_policy_handler.h"
|
||||
#include "components/safe_browsing/core/common/safe_browsing_prefs.h"
|
||||
@@ -1904,8 +1905,6 @@ std::unique_ptr<ConfigurationPolicyHandl
|
||||
@@ -1930,8 +1931,6 @@ std::unique_ptr<ConfigurationPolicyHandl
|
||||
handlers->AddHandler(
|
||||
std::make_unique<bookmarks::ManagedBookmarksPolicyHandler>(
|
||||
chrome_schema));
|
||||
@@ -1634,7 +1668,7 @@
|
||||
handlers->AddHandler(std::make_unique<syncer::SyncPolicyHandler>());
|
||||
handlers->AddHandler(
|
||||
std::make_unique<URLBlocklistPolicyHandler>(key::kURLBlocklist));
|
||||
@@ -1963,13 +1962,6 @@ std::unique_ptr<ConfigurationPolicyHandl
|
||||
@@ -1990,13 +1989,6 @@ std::unique_ptr<ConfigurationPolicyHandl
|
||||
prefs::kSafeBrowsingEnterpriseRealTimeUrlCheckMode,
|
||||
prefs::kSafeBrowsingEnterpriseRealTimeUrlCheckScope, chrome_schema));
|
||||
|
||||
@@ -1650,7 +1684,7 @@
|
||||
|
||||
--- a/chrome/browser/prefs/browser_prefs.cc
|
||||
+++ b/chrome/browser/prefs/browser_prefs.cc
|
||||
@@ -265,7 +265,6 @@
|
||||
@@ -263,7 +263,6 @@
|
||||
#include "chrome/browser/new_tab_page/modules/drive/drive_service.h"
|
||||
#include "chrome/browser/new_tab_page/modules/photos/photos_service.h"
|
||||
#include "chrome/browser/new_tab_page/modules/recipes/recipes_service.h"
|
||||
@@ -1658,7 +1692,7 @@
|
||||
#include "chrome/browser/new_tab_page/promos/promo_service.h"
|
||||
#include "chrome/browser/policy/developer_tools_policy_handler.h"
|
||||
#include "chrome/browser/search/background/ntp_custom_background_service.h"
|
||||
@@ -1547,7 +1546,6 @@ void RegisterProfilePrefs(user_prefs::Pr
|
||||
@@ -1485,7 +1484,6 @@ void RegisterProfilePrefs(user_prefs::Pr
|
||||
NewTabPageHandler::RegisterProfilePrefs(registry);
|
||||
NewTabPageUI::RegisterProfilePrefs(registry);
|
||||
NewTabUI::RegisterProfilePrefs(registry);
|
||||
@@ -1668,7 +1702,22 @@
|
||||
PinnedTabCodec::RegisterProfilePrefs(registry);
|
||||
--- a/chrome/browser/profiles/chrome_browser_main_extra_parts_profiles.cc
|
||||
+++ b/chrome/browser/profiles/chrome_browser_main_extra_parts_profiles.cc
|
||||
@@ -602,7 +602,6 @@ void ChromeBrowserMainExtraPartsProfiles
|
||||
@@ -829,13 +829,13 @@ void ChromeBrowserMainExtraPartsProfiles
|
||||
safe_browsing::CloudBinaryUploadServiceFactory::GetInstance();
|
||||
safe_browsing::ExtensionTelemetryServiceFactory::GetInstance();
|
||||
safe_browsing::HashRealTimeServiceFactory::GetInstance();
|
||||
-#endif
|
||||
safe_browsing::ChromePasswordProtectionServiceFactory::GetInstance();
|
||||
safe_browsing::ClientSideDetectionServiceFactory::GetInstance();
|
||||
safe_browsing::RealTimeUrlLookupServiceFactory::GetInstance();
|
||||
safe_browsing::SafeBrowsingMetricsCollectorFactory::GetInstance();
|
||||
safe_browsing::SafeBrowsingNavigationObserverManagerFactory::GetInstance();
|
||||
safe_browsing::VerdictCacheManagerFactory::GetInstance();
|
||||
+#endif
|
||||
#if BUILDFLAG(IS_MAC)
|
||||
if (screentime::IsScreenTimeEnabled()) {
|
||||
screentime::HistoryBridgeFactory::GetInstance();
|
||||
@@ -884,7 +884,6 @@ void ChromeBrowserMainExtraPartsProfiles
|
||||
}
|
||||
#endif
|
||||
TabRestoreServiceFactory::GetInstance();
|
||||
@@ -1678,7 +1727,7 @@
|
||||
#if !BUILDFLAG(IS_ANDROID)
|
||||
--- a/chrome/browser/resources/settings/lazy_load.ts
|
||||
+++ b/chrome/browser/resources/settings/lazy_load.ts
|
||||
@@ -167,7 +167,6 @@ export {SettingsPrivacyGuideDialogElemen
|
||||
@@ -170,7 +170,6 @@ export {SettingsPrivacyGuideDialogElemen
|
||||
export {PrivacyGuideHistorySyncFragmentElement} from './privacy_page/privacy_guide/privacy_guide_history_sync_fragment.js';
|
||||
export {PrivacyGuideMsbbFragmentElement} from './privacy_page/privacy_guide/privacy_guide_msbb_fragment.js';
|
||||
export {SettingsPrivacyGuidePageElement} from './privacy_page/privacy_guide/privacy_guide_page.js';
|
||||
@@ -1696,6 +1745,40 @@
|
||||
import './privacy_guide_welcome_fragment.js';
|
||||
import './step_indicator.js';
|
||||
|
||||
--- a/chrome/browser/safe_browsing/cloud_content_scanning/file_opening_job.cc
|
||||
+++ b/chrome/browser/safe_browsing/cloud_content_scanning/file_opening_job.cc
|
||||
@@ -71,10 +71,6 @@ void FileOpeningJob::ProcessNextTask(bas
|
||||
if (tasks_[i].taken.exchange(true, std::memory_order_relaxed))
|
||||
continue;
|
||||
|
||||
- // Since we know we now have taken `tasks_[i]`, we can do the file opening
|
||||
- // work safely.
|
||||
- tasks_[i].request->OpenFile();
|
||||
-
|
||||
// Now that the file opening work is done, `num_unopened_files_` is
|
||||
// decremented atomically and we return to free the thread.
|
||||
num_unopened_files_.fetch_sub(1, std::memory_order_relaxed);
|
||||
--- a/chrome/browser/safe_browsing/cloud_content_scanning/file_opening_job.h
|
||||
+++ b/chrome/browser/safe_browsing/cloud_content_scanning/file_opening_job.h
|
||||
@@ -11,7 +11,6 @@
|
||||
#include "base/gtest_prod_util.h"
|
||||
#include "base/memory/raw_ptr.h"
|
||||
#include "base/task/post_job.h"
|
||||
-#include "chrome/browser/safe_browsing/cloud_content_scanning/file_analysis_request.h"
|
||||
|
||||
namespace safe_browsing {
|
||||
|
||||
@@ -24,10 +23,6 @@ class FileOpeningJob {
|
||||
FileOpeningTask();
|
||||
~FileOpeningTask();
|
||||
|
||||
- // Non-owning pointer to the request corresponding to the file to open.
|
||||
- raw_ptr<safe_browsing::FileAnalysisRequest, DanglingUntriaged> request =
|
||||
- nullptr;
|
||||
-
|
||||
// Indicates if this task has been taken and is owned by a thread.
|
||||
std::atomic_bool taken{false};
|
||||
};
|
||||
--- a/chrome/browser/safe_browsing/metrics/safe_browsing_metrics_provider.cc
|
||||
+++ b/chrome/browser/safe_browsing/metrics/safe_browsing_metrics_provider.cc
|
||||
@@ -17,15 +17,6 @@ SafeBrowsingMetricsProvider::~SafeBrowsi
|
||||
@@ -1851,7 +1934,7 @@
|
||||
} // namespace
|
||||
--- a/chrome/browser/ui/BUILD.gn
|
||||
+++ b/chrome/browser/ui/BUILD.gn
|
||||
@@ -555,7 +555,6 @@ static_library("ui") {
|
||||
@@ -558,7 +558,6 @@ static_library("ui") {
|
||||
"//components/renderer_context_menu",
|
||||
"//components/resources",
|
||||
"//components/safe_browsing/content/browser",
|
||||
@@ -1859,7 +1942,7 @@
|
||||
"//components/safe_browsing/content/browser/password_protection",
|
||||
"//components/safe_browsing/content/browser/web_ui",
|
||||
"//components/safe_browsing/core/browser/db:database_manager",
|
||||
@@ -3513,8 +3512,6 @@ static_library("ui") {
|
||||
@@ -3542,8 +3541,6 @@ static_library("ui") {
|
||||
"startup/web_app_startup_utils.h",
|
||||
"tab_contents/chrome_web_contents_menu_helper.cc",
|
||||
"tab_contents/chrome_web_contents_menu_helper.h",
|
||||
@@ -1868,7 +1951,7 @@
|
||||
"views/autofill/payments/virtual_card_selection_dialog_view.cc",
|
||||
"views/autofill/payments/virtual_card_selection_dialog_view.h",
|
||||
"views/autofill/payments/webauthn_dialog_view.cc",
|
||||
@@ -4970,8 +4967,6 @@ static_library("ui") {
|
||||
@@ -5018,8 +5015,6 @@ static_library("ui") {
|
||||
"views/safe_browsing/prompt_for_scanning_modal_dialog.h",
|
||||
"views/safe_browsing/tailored_security_desktop_dialog_manager.cc",
|
||||
"views/safe_browsing/tailored_security_desktop_dialog_manager.h",
|
||||
@@ -1905,7 +1988,15 @@
|
||||
void JavaScriptTabModalDialogManagerDelegateDesktop::DidCloseDialog() {
|
||||
--- a/chrome/browser/ui/views/download/download_item_view.cc
|
||||
+++ b/chrome/browser/ui/views/download/download_item_view.cc
|
||||
@@ -815,9 +815,7 @@ void DownloadItemView::UpdateLabels() {
|
||||
@@ -38,7 +38,6 @@
|
||||
#include "chrome/browser/icon_manager.h"
|
||||
#include "chrome/browser/safe_browsing/advanced_protection_status_manager.h"
|
||||
#include "chrome/browser/safe_browsing/advanced_protection_status_manager_factory.h"
|
||||
-#include "chrome/browser/safe_browsing/download_protection/download_protection_service.h"
|
||||
#include "chrome/browser/safe_browsing/safe_browsing_service.h"
|
||||
#include "chrome/browser/ui/browser.h"
|
||||
#include "chrome/browser/ui/color/chrome_color_id.h"
|
||||
@@ -815,9 +814,7 @@ void DownloadItemView::UpdateLabels() {
|
||||
deep_scanning_label_->SetVisible(mode_ ==
|
||||
download::DownloadItemMode::kDeepScanning);
|
||||
if (deep_scanning_label_->GetVisible()) {
|
||||
@@ -1916,7 +2007,7 @@
|
||||
? IDS_PROMPT_DEEP_SCANNING_DOWNLOAD
|
||||
: IDS_PROMPT_DEEP_SCANNING_APP_DOWNLOAD;
|
||||
const std::u16string filename = ElidedFilename(*deep_scanning_label_);
|
||||
@@ -843,11 +841,15 @@ void DownloadItemView::UpdateButtons() {
|
||||
@@ -843,11 +840,15 @@ void DownloadItemView::UpdateButtons() {
|
||||
}
|
||||
|
||||
const bool allow_open_during_deep_scan =
|
||||
@@ -1932,7 +2023,7 @@
|
||||
open_button_->SetEnabled((mode_ == download::DownloadItemMode::kNormal) ||
|
||||
prompt_to_scan || allow_open_during_deep_scan);
|
||||
|
||||
@@ -1270,7 +1272,9 @@ void DownloadItemView::ShowContextMenuIm
|
||||
@@ -1270,7 +1271,9 @@ void DownloadItemView::ShowContextMenuIm
|
||||
}
|
||||
|
||||
void DownloadItemView::OpenDownloadDuringAsyncScanning() {
|
||||
@@ -2076,7 +2167,7 @@
|
||||
std::move(callback),
|
||||
--- a/chrome/test/BUILD.gn
|
||||
+++ b/chrome/test/BUILD.gn
|
||||
@@ -1406,7 +1406,6 @@ if (!is_android) {
|
||||
@@ -1466,7 +1466,6 @@ if (!is_android) {
|
||||
"//components/resources",
|
||||
"//components/safe_browsing:buildflags",
|
||||
"//components/safe_browsing/content/browser",
|
||||
@@ -2084,7 +2175,7 @@
|
||||
"//components/safe_browsing/content/browser:safe_browsing_service",
|
||||
"//components/safe_browsing/content/browser/password_protection",
|
||||
"//components/safe_browsing/content/browser/password_protection:test_support",
|
||||
@@ -5988,7 +5987,6 @@ test("unit_tests") {
|
||||
@@ -6082,7 +6081,6 @@ test("unit_tests") {
|
||||
"//components/resources",
|
||||
"//components/safe_browsing:buildflags",
|
||||
"//components/safe_browsing/content/browser",
|
||||
@@ -2094,7 +2185,7 @@
|
||||
"//components/safe_browsing/content/browser/web_ui",
|
||||
--- a/components/password_manager/content/browser/content_password_manager_driver.cc
|
||||
+++ b/components/password_manager/content/browser/content_password_manager_driver.cc
|
||||
@@ -442,7 +442,7 @@ void ContentPasswordManagerDriver::Check
|
||||
@@ -452,7 +452,7 @@ void ContentPasswordManagerDriver::Check
|
||||
if (!password_manager::bad_message::CheckFrameNotPrerendering(
|
||||
render_frame_host_))
|
||||
return;
|
||||
@@ -2188,7 +2279,7 @@
|
||||
- "user_population.h",
|
||||
]
|
||||
|
||||
public_deps = [ "//google_apis:google_apis" ]
|
||||
configs += [ "//build/config/compiler:wexit_time_destructors" ]
|
||||
--- a/components/safe_browsing/core/browser/hashprefix_realtime/hash_realtime_service.h
|
||||
+++ b/components/safe_browsing/core/browser/hashprefix_realtime/hash_realtime_service.h
|
||||
@@ -5,6 +5,7 @@
|
||||
@@ -2311,17 +2402,17 @@
|
||||
// possible to request one. This is used to block file dialogs from being
|
||||
--- a/extensions/browser/updater/update_service.cc
|
||||
+++ b/extensions/browser/updater/update_service.cc
|
||||
@@ -125,14 +125,6 @@ void UpdateService::OnEvent(Events event
|
||||
@@ -131,14 +131,6 @@ void UpdateService::OnCrxStateChange(Upd
|
||||
break;
|
||||
}
|
||||
|
||||
- if (should_perform_action_on_omaha_attributes) {
|
||||
- base::Value::Dict attributes = GetExtensionOmahaAttributes(extension_id);
|
||||
- base::Value::Dict attributes = GetExtensionOmahaAttributes(item);
|
||||
- // Note that it's important to perform actions even if |attributes| is
|
||||
- // empty, missing values may default to false and have associated logic.
|
||||
- ExtensionSystem::Get(browser_context_)
|
||||
- ->PerformActionBasedOnOmahaAttributes(
|
||||
- extension_id, base::Value(std::move(attributes)));
|
||||
- item.id, base::Value(std::move(attributes)));
|
||||
- }
|
||||
}
|
||||
|
||||
@@ -2339,7 +2430,7 @@
|
||||
declare_args() {
|
||||
--- a/weblayer/BUILD.gn
|
||||
+++ b/weblayer/BUILD.gn
|
||||
@@ -468,7 +468,6 @@ source_set("weblayer_lib_base") {
|
||||
@@ -470,7 +470,6 @@ source_set("weblayer_lib_base") {
|
||||
"//components/profile_metrics",
|
||||
"//components/reduce_accept_language/browser",
|
||||
"//components/safe_browsing/content/browser",
|
||||
|
||||
File diff suppressed because it is too large
Load Diff
@@ -1,6 +1,6 @@
|
||||
--- a/components/search_engines/prepopulated_engines.json
|
||||
+++ b/components/search_engines/prepopulated_engines.json
|
||||
@@ -114,25 +114,11 @@
|
||||
@@ -114,27 +114,11 @@
|
||||
},
|
||||
|
||||
"google": {
|
||||
@@ -10,11 +10,13 @@
|
||||
- "search_url": "{google:baseURL}search?q={searchTerms}&{google:RLZ}{google:originalQueryForSuggestion}{google:assistedQueryStats}{google:searchFieldtrialParameter}{google:iOSSearchLanguage}{google:prefetchSource}{google:searchClient}{google:sourceId}{google:contextualSearchVersion}ie={inputEncoding}",
|
||||
- "suggest_url": "{google:baseSuggestURL}search?{google:searchFieldtrialParameter}client={google:suggestClient}&gs_ri={google:suggestRid}&xssi=t&q={searchTerms}&{google:inputType}{google:omniboxFocusType}{google:cursorPosition}{google:currentPageUrl}{google:pageClassification}{google:clientCacheTimeToLive}{google:searchVersion}{google:sessionToken}{google:prefetchQuery}sugkey={google:suggestAPIKeyParameter}",
|
||||
- "image_url": "{google:baseSearchByImageURL}upload",
|
||||
- "image_translate_url": "{google:baseSearchByImageURL}upload?filtertype=tr&{imageTranslateSourceLocale}{imageTranslateTargetLocale}",
|
||||
- "contextual_search_url": "{google:baseURL}_/contextualsearch?{google:contextualSearchVersion}{google:contextualSearchContextData}",
|
||||
- "image_url_post_params": "encoded_image={google:imageThumbnail},image_url={google:imageURL},sbisrc={google:imageSearchSource},original_width={google:imageOriginalWidth},original_height={google:imageOriginalHeight}",
|
||||
- "side_search_param": "sidesearch",
|
||||
- "image_translate_source_language_param_key": "sourcelang",
|
||||
- "image_translate_target_language_param_key": "targetlang",
|
||||
- "side_image_search_param": "sideimagesearch",
|
||||
- "image_search_branding_label": "Google Lens",
|
||||
- "search_intent_params": ["si", "gs_ssp"],
|
||||
- "alternate_urls": [
|
||||
- "{google:baseURL}#q={searchTerms}",
|
||||
|
||||
@@ -1,15 +1,15 @@
|
||||
# Disables translation and removes the "Translate to" context menu when --translate-script-url flag is not set
|
||||
--- a/chrome/browser/renderer_context_menu/render_view_context_menu.cc
|
||||
+++ b/chrome/browser/renderer_context_menu/render_view_context_menu.cc
|
||||
@@ -143,6 +143,7 @@
|
||||
#include "components/spellcheck/common/spellcheck_common.h"
|
||||
@@ -146,6 +146,7 @@
|
||||
#include "components/spellcheck/spellcheck_buildflags.h"
|
||||
#include "components/strings/grit/components_strings.h"
|
||||
#include "components/supervised_user/core/common/buildflags.h"
|
||||
+#include "components/translate/core/common/translate_switches.h"
|
||||
#include "components/translate/core/browser/translate_download_manager.h"
|
||||
#include "components/translate/core/browser/translate_manager.h"
|
||||
#include "components/translate/core/browser/translate_prefs.h"
|
||||
@@ -1837,6 +1838,7 @@ void RenderViewContextMenu::AppendPageIt
|
||||
@@ -1881,6 +1882,7 @@ void RenderViewContextMenu::AppendPageIt
|
||||
menu_model_.AddSeparator(ui::NORMAL_SEPARATOR);
|
||||
|
||||
if (CanTranslate(/*menu_logging=*/true)) {
|
||||
@@ -47,7 +47,7 @@
|
||||
request_pending_ = true;
|
||||
--- a/components/translate/core/browser/translate_manager.cc
|
||||
+++ b/components/translate/core/browser/translate_manager.cc
|
||||
@@ -865,8 +865,9 @@ void TranslateManager::FilterIsTranslate
|
||||
@@ -870,8 +870,9 @@ void TranslateManager::FilterIsTranslate
|
||||
TriggerDecision::kDisabledOffline);
|
||||
}
|
||||
|
||||
|
||||
@@ -9,7 +9,7 @@
|
||||
|
||||
--- a/chrome/browser/BUILD.gn
|
||||
+++ b/chrome/browser/BUILD.gn
|
||||
@@ -2442,6 +2442,7 @@ static_library("browser") {
|
||||
@@ -2457,6 +2457,7 @@ static_library("browser") {
|
||||
"//third_party/libyuv",
|
||||
"//third_party/metrics_proto",
|
||||
"//third_party/re2",
|
||||
@@ -19,7 +19,7 @@
|
||||
"//third_party/widevine/cdm:headers",
|
||||
--- a/chrome/browser/about_flags.cc
|
||||
+++ b/chrome/browser/about_flags.cc
|
||||
@@ -158,6 +158,7 @@
|
||||
@@ -155,6 +155,7 @@
|
||||
#include "components/translate/core/browser/translate_ranker_impl.h"
|
||||
#include "components/translate/core/common/translate_util.h"
|
||||
#include "components/ui_devtools/switches.h"
|
||||
@@ -62,7 +62,7 @@
|
||||
#include "components/viz/common/switches.h"
|
||||
#include "components/viz/host/gpu_client.h"
|
||||
#include "content/browser/attribution_reporting/attribution_manager.h"
|
||||
@@ -3379,6 +3380,8 @@ void RenderProcessHostImpl::PropagateBro
|
||||
@@ -3361,6 +3362,8 @@ void RenderProcessHostImpl::PropagateBro
|
||||
switches::kEnableWebGLImageChromium,
|
||||
switches::kEnableWebGPUDeveloperFeatures,
|
||||
switches::kFileUrlPathAlias,
|
||||
@@ -91,17 +91,17 @@
|
||||
#include "ui/accessibility/accessibility_features.h"
|
||||
#include "ui/base/ui_base_features.h"
|
||||
#include "ui/events/blink/blink_features.h"
|
||||
@@ -408,6 +409,10 @@ void SetRuntimeFeaturesFromCommandLine(c
|
||||
{wrf::EnableWebGPUDeveloperFeatures,
|
||||
@@ -432,6 +433,10 @@ void SetRuntimeFeaturesFromCommandLine(c
|
||||
switches::kEnableWebGPUDeveloperFeatures, true},
|
||||
{wrf::EnableDirectSockets, switches::kIsolatedAppOrigins, true},
|
||||
{wrf::EnableDirectSockets, switches::kEnableIsolatedWebAppsInRenderer,
|
||||
true},
|
||||
+ {wrf::EnableFingerprintingClientRectsNoise,
|
||||
+ switches::kFingerprintingClientRectsNoise, true},
|
||||
+ {wrf::EnableFingerprintingCanvasMeasureTextNoise,
|
||||
+ switches::kFingerprintingCanvasMeasureTextNoise, true},
|
||||
};
|
||||
|
||||
for (const auto& mapping : switchToFeatureMapping) {
|
||||
if (command_line.HasSwitch(mapping.switch_name)) {
|
||||
--- a/third_party/blink/public/platform/web_runtime_features.h
|
||||
+++ b/third_party/blink/public/platform/web_runtime_features.h
|
||||
@@ -68,6 +68,9 @@ class BLINK_PLATFORM_EXPORT WebRuntimeFe
|
||||
@@ -124,7 +124,7 @@
|
||||
#include "base/ranges/algorithm.h"
|
||||
#include "base/task/single_thread_task_runner.h"
|
||||
#include "base/time/time.h"
|
||||
@@ -927,6 +928,14 @@ Range* Document::CreateRangeAdjustedToTr
|
||||
@@ -925,6 +926,14 @@ Range* Document::CreateRangeAdjustedToTr
|
||||
Position::BeforeNode(*shadow_host));
|
||||
}
|
||||
|
||||
@@ -139,7 +139,7 @@
|
||||
SelectorQueryCache& Document::GetSelectorQueryCache() {
|
||||
if (!selector_query_cache_)
|
||||
selector_query_cache_ = std::make_unique<SelectorQueryCache>();
|
||||
@@ -2255,6 +2264,15 @@ void Document::UpdateStyleAndLayoutTreeF
|
||||
@@ -2261,6 +2270,15 @@ void Document::UpdateStyleAndLayoutTreeF
|
||||
#if DCHECK_IS_ON()
|
||||
AssertLayoutTreeUpdated(*this, true /* allow_dirty_container_subtrees */);
|
||||
#endif
|
||||
@@ -157,7 +157,7 @@
|
||||
void Document::InvalidateStyleAndLayoutForFontUpdates() {
|
||||
--- a/third_party/blink/renderer/core/dom/document.h
|
||||
+++ b/third_party/blink/renderer/core/dom/document.h
|
||||
@@ -514,6 +514,10 @@ class CORE_EXPORT Document : public Cont
|
||||
@@ -517,6 +517,10 @@ class CORE_EXPORT Document : public Cont
|
||||
has_xml_declaration_ = has_xml_declaration ? 1 : 0;
|
||||
}
|
||||
|
||||
@@ -168,7 +168,7 @@
|
||||
AtomicString visibilityState() const;
|
||||
bool IsPageVisible() const;
|
||||
bool hidden() const;
|
||||
@@ -2329,6 +2333,9 @@ class CORE_EXPORT Document : public Cont
|
||||
@@ -2359,6 +2363,9 @@ class CORE_EXPORT Document : public Cont
|
||||
|
||||
base::ElapsedTimer start_time_;
|
||||
|
||||
@@ -180,7 +180,7 @@
|
||||
|
||||
--- a/third_party/blink/renderer/core/dom/element.cc
|
||||
+++ b/third_party/blink/renderer/core/dom/element.cc
|
||||
@@ -2134,6 +2134,11 @@ DOMRectList* Element::getClientRects() {
|
||||
@@ -2126,6 +2126,11 @@ DOMRectList* Element::getClientRects() {
|
||||
DCHECK(element_layout_object);
|
||||
GetDocument().AdjustQuadsForScrollAndAbsoluteZoom(quads,
|
||||
*element_layout_object);
|
||||
@@ -192,7 +192,7 @@
|
||||
return MakeGarbageCollected<DOMRectList>(quads);
|
||||
}
|
||||
|
||||
@@ -2161,6 +2166,9 @@ gfx::RectF Element::GetBoundingClientRec
|
||||
@@ -2153,6 +2158,9 @@ gfx::RectF Element::GetBoundingClientRec
|
||||
DCHECK(element_layout_object);
|
||||
GetDocument().AdjustRectForScrollAndAbsoluteZoom(result,
|
||||
*element_layout_object);
|
||||
@@ -204,7 +204,7 @@
|
||||
|
||||
--- a/third_party/blink/renderer/core/dom/range.cc
|
||||
+++ b/third_party/blink/renderer/core/dom/range.cc
|
||||
@@ -1612,11 +1612,21 @@ DOMRectList* Range::getClientRects() con
|
||||
@@ -1607,11 +1607,21 @@ DOMRectList* Range::getClientRects() con
|
||||
Vector<gfx::QuadF> quads;
|
||||
GetBorderAndTextQuads(quads);
|
||||
|
||||
@@ -267,7 +267,7 @@
|
||||
const TextDirection&,
|
||||
--- a/third_party/blink/renderer/modules/canvas/canvas2d/canvas_rendering_context_2d.cc
|
||||
+++ b/third_party/blink/renderer/modules/canvas/canvas2d/canvas_rendering_context_2d.cc
|
||||
@@ -953,9 +953,15 @@ TextMetrics* CanvasRenderingContext2D::m
|
||||
@@ -948,9 +948,15 @@ TextMetrics* CanvasRenderingContext2D::m
|
||||
TextDirection direction =
|
||||
ToTextDirection(GetState().GetDirection(), canvas());
|
||||
|
||||
@@ -286,7 +286,7 @@
|
||||
void CanvasRenderingContext2D::drawFormattedText(
|
||||
--- a/third_party/blink/renderer/platform/BUILD.gn
|
||||
+++ b/third_party/blink/renderer/platform/BUILD.gn
|
||||
@@ -1690,6 +1690,7 @@ component("platform") {
|
||||
@@ -1695,6 +1695,7 @@ component("platform") {
|
||||
"//components/paint_preview/common",
|
||||
"//components/power_scheduler",
|
||||
"//components/search_engines:search_engine_utils",
|
||||
@@ -311,7 +311,7 @@
|
||||
} // namespace blink
|
||||
--- a/third_party/blink/renderer/platform/runtime_enabled_features.json5
|
||||
+++ b/third_party/blink/renderer/platform/runtime_enabled_features.json5
|
||||
@@ -1413,6 +1413,12 @@
|
||||
@@ -1600,6 +1600,12 @@
|
||||
origin_trial_feature_name: "Focusgroup",
|
||||
},
|
||||
{
|
||||
@@ -322,5 +322,5 @@
|
||||
+ },
|
||||
+ {
|
||||
name: "FocuslessSpatialNavigation",
|
||||
base_feature: "none",
|
||||
settable_from_internals: true,
|
||||
},
|
||||
|
||||
@@ -34,7 +34,7 @@ approach to change color components.
|
||||
#endif // CHROME_BROWSER_BROMITE_FLAG_ENTRIES_H_
|
||||
--- a/content/browser/renderer_host/render_process_host_impl.cc
|
||||
+++ b/content/browser/renderer_host/render_process_host_impl.cc
|
||||
@@ -3382,6 +3382,7 @@ void RenderProcessHostImpl::PropagateBro
|
||||
@@ -3364,6 +3364,7 @@ void RenderProcessHostImpl::PropagateBro
|
||||
switches::kFileUrlPathAlias,
|
||||
switches::kFingerprintingClientRectsNoise,
|
||||
switches::kFingerprintingCanvasMeasureTextNoise,
|
||||
@@ -44,15 +44,15 @@ approach to change color components.
|
||||
switches::kForceEnablePepperVideoDecoderDevAPI,
|
||||
--- a/content/child/runtime_features.cc
|
||||
+++ b/content/child/runtime_features.cc
|
||||
@@ -413,6 +413,8 @@ void SetRuntimeFeaturesFromCommandLine(c
|
||||
@@ -437,6 +437,8 @@ void SetRuntimeFeaturesFromCommandLine(c
|
||||
switches::kFingerprintingClientRectsNoise, true},
|
||||
{wrf::EnableFingerprintingCanvasMeasureTextNoise,
|
||||
switches::kFingerprintingCanvasMeasureTextNoise, true},
|
||||
+ {wrf::EnableFingerprintingCanvasImageDataNoise,
|
||||
+ switches::kFingerprintingCanvasImageDataNoise, true},
|
||||
};
|
||||
|
||||
for (const auto& mapping : switchToFeatureMapping) {
|
||||
if (command_line.HasSwitch(mapping.switch_name)) {
|
||||
--- a/third_party/blink/public/platform/web_runtime_features.h
|
||||
+++ b/third_party/blink/public/platform/web_runtime_features.h
|
||||
@@ -70,6 +70,7 @@ class BLINK_PLATFORM_EXPORT WebRuntimeFe
|
||||
@@ -73,7 +73,7 @@ approach to change color components.
|
||||
#include "third_party/blink/renderer/platform/graphics/stroke_data.h"
|
||||
#include "third_party/blink/renderer/platform/graphics/video_frame_image_util.h"
|
||||
#include "third_party/blink/renderer/platform/heap/garbage_collected.h"
|
||||
@@ -2113,6 +2114,9 @@ ImageData* BaseRenderingContext2D::getIm
|
||||
@@ -2089,6 +2090,9 @@ ImageData* BaseRenderingContext2D::getIm
|
||||
snapshot->PaintImageForCurrentFrame().GetSkImageInfo().bounds();
|
||||
DCHECK(!bounds.intersect(SkIRect::MakeXYWH(sx, sy, sw, sh)));
|
||||
}
|
||||
@@ -85,7 +85,7 @@ approach to change color components.
|
||||
return image_data;
|
||||
--- a/third_party/blink/renderer/platform/BUILD.gn
|
||||
+++ b/third_party/blink/renderer/platform/BUILD.gn
|
||||
@@ -1647,7 +1647,9 @@ component("platform") {
|
||||
@@ -1652,7 +1652,9 @@ component("platform") {
|
||||
"//third_party/blink/renderer:non_test_config",
|
||||
]
|
||||
|
||||
@@ -322,7 +322,7 @@ approach to change color components.
|
||||
// Methods overridden by all sub-classes
|
||||
--- a/third_party/blink/renderer/platform/runtime_enabled_features.json5
|
||||
+++ b/third_party/blink/renderer/platform/runtime_enabled_features.json5
|
||||
@@ -1419,6 +1419,9 @@
|
||||
@@ -1606,6 +1606,9 @@
|
||||
name: "FingerprintingCanvasMeasureTextNoise",
|
||||
},
|
||||
{
|
||||
@@ -330,5 +330,5 @@ approach to change color components.
|
||||
+ },
|
||||
+ {
|
||||
name: "FocuslessSpatialNavigation",
|
||||
base_feature: "none",
|
||||
settable_from_internals: true,
|
||||
},
|
||||
|
||||
@@ -17,7 +17,7 @@ with limited CPU/memory resources and it is disabled by default.
|
||||
|
||||
--- a/chrome/browser/BUILD.gn
|
||||
+++ b/chrome/browser/BUILD.gn
|
||||
@@ -2176,6 +2176,7 @@ static_library("browser") {
|
||||
@@ -2188,6 +2188,7 @@ static_library("browser") {
|
||||
"//components/net_log",
|
||||
"//components/network_hints/common:mojo_bindings",
|
||||
"//components/network_session_configurator/browser",
|
||||
@@ -100,7 +100,7 @@ with limited CPU/memory resources and it is disabled by default.
|
||||
|
||||
--- a/chrome/browser/flag_descriptions.cc
|
||||
+++ b/chrome/browser/flag_descriptions.cc
|
||||
@@ -1906,6 +1906,10 @@ const char kUnthrottledNestedTimeoutDesc
|
||||
@@ -1944,6 +1944,10 @@ const char kUnthrottledNestedTimeoutDesc
|
||||
"websites abusing the API will still eventually have their setTimeouts "
|
||||
"clamped.";
|
||||
|
||||
@@ -113,7 +113,7 @@ with limited CPU/memory resources and it is disabled by default.
|
||||
const char kMediaRouterCastAllowAllIPsDescription[] =
|
||||
--- a/chrome/browser/flag_descriptions.h
|
||||
+++ b/chrome/browser/flag_descriptions.h
|
||||
@@ -1071,6 +1071,9 @@ extern const char kLogJsConsoleMessagesD
|
||||
@@ -1085,6 +1085,9 @@ extern const char kLogJsConsoleMessagesD
|
||||
extern const char kUnthrottledNestedTimeoutName[];
|
||||
extern const char kUnthrottledNestedTimeoutDescription[];
|
||||
|
||||
|
||||
@@ -12,7 +12,7 @@
|
||||
void BackgroundModeManager::RegisterProfile(Profile* profile) {
|
||||
--- a/chrome/browser/chrome_content_browser_client.cc
|
||||
+++ b/chrome/browser/chrome_content_browser_client.cc
|
||||
@@ -1540,7 +1540,7 @@ void ChromeContentBrowserClient::Registe
|
||||
@@ -1552,7 +1552,7 @@ void ChromeContentBrowserClient::Registe
|
||||
void ChromeContentBrowserClient::RegisterProfilePrefs(
|
||||
user_prefs::PrefRegistrySyncable* registry) {
|
||||
registry->RegisterBooleanPref(prefs::kDisable3DAPIs, false);
|
||||
@@ -23,7 +23,7 @@
|
||||
// used for mapping the command-line flags).
|
||||
--- a/chrome/browser/net/profile_network_context_service.cc
|
||||
+++ b/chrome/browser/net/profile_network_context_service.cc
|
||||
@@ -376,7 +376,7 @@ void ProfileNetworkContextService::Updat
|
||||
@@ -391,7 +391,7 @@ void ProfileNetworkContextService::Updat
|
||||
void ProfileNetworkContextService::RegisterProfilePrefs(
|
||||
user_prefs::PrefRegistrySyncable* registry) {
|
||||
registry->RegisterBooleanPref(
|
||||
@@ -94,7 +94,7 @@
|
||||
registry->RegisterDictionaryPref(prefs::kAppWindowPlacement);
|
||||
--- a/components/autofill/core/common/autofill_prefs.cc
|
||||
+++ b/components/autofill/core/common/autofill_prefs.cc
|
||||
@@ -107,7 +107,7 @@ const char kAutocompleteLastVersionReten
|
||||
@@ -103,7 +103,7 @@ const char kAutocompleteLastVersionReten
|
||||
void RegisterProfilePrefs(user_prefs::PrefRegistrySyncable* registry) {
|
||||
// Synced prefs. Used for cross-device choices, e.g., credit card Autofill.
|
||||
registry->RegisterBooleanPref(
|
||||
@@ -103,7 +103,7 @@
|
||||
user_prefs::PrefRegistrySyncable::SYNCABLE_PREF);
|
||||
registry->RegisterIntegerPref(
|
||||
prefs::kAutofillLastVersionDeduped, 0,
|
||||
@@ -117,7 +117,7 @@ void RegisterProfilePrefs(user_prefs::Pr
|
||||
@@ -113,7 +113,7 @@ void RegisterProfilePrefs(user_prefs::Pr
|
||||
prefs::kAutofillLastVersionDisusedAddressesDeleted, 0,
|
||||
user_prefs::PrefRegistrySyncable::SYNCABLE_PREF);
|
||||
registry->RegisterBooleanPref(
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
--- a/chrome/browser/search/search.cc
|
||||
+++ b/chrome/browser/search/search.cc
|
||||
@@ -184,26 +184,7 @@ struct NewTabURLDetails {
|
||||
@@ -185,26 +185,7 @@ struct NewTabURLDetails {
|
||||
: chrome::kChromeUINewTabPageThirdPartyURL);
|
||||
#endif
|
||||
|
||||
|
||||
@@ -5,7 +5,7 @@ Subject: [PATCH 56/66] browser: disable profile auto-import on first run
|
||||
|
||||
--- a/chrome/browser/chrome_browser_main.cc
|
||||
+++ b/chrome/browser/chrome_browser_main.cc
|
||||
@@ -1610,11 +1610,6 @@ int ChromeBrowserMainParts::PreMainMessa
|
||||
@@ -1614,11 +1614,6 @@ int ChromeBrowserMainParts::PreMainMessa
|
||||
// and preferences have been registered since some of the import code depends
|
||||
// on preferences.
|
||||
if (first_run::IsChromeFirstRun()) {
|
||||
|
||||
@@ -29,7 +29,7 @@ TLDR: Do not let files sneak onto the disk too easily.
|
||||
|
||||
--- a/chrome/browser/download/download_prefs.cc
|
||||
+++ b/chrome/browser/download/download_prefs.cc
|
||||
@@ -274,7 +274,7 @@ void DownloadPrefs::RegisterProfilePrefs
|
||||
@@ -279,7 +279,7 @@ void DownloadPrefs::RegisterProfilePrefs
|
||||
user_prefs::PrefRegistrySyncable* registry) {
|
||||
registry->RegisterBooleanPref(
|
||||
prefs::kPromptForDownload,
|
||||
|
||||
@@ -16,7 +16,7 @@ the case anyway, since we are based off Chromium, not Chrome.
|
||||
|
||||
--- a/chrome/browser/app_controller_mac.mm
|
||||
+++ b/chrome/browser/app_controller_mac.mm
|
||||
@@ -835,7 +835,7 @@ class AppControllerNativeThemeObserver :
|
||||
@@ -815,7 +815,7 @@ class AppControllerNativeThemeObserver :
|
||||
CFStringRef checkInterval = CFSTR("checkInterval");
|
||||
CFPropertyListRef plist = CFPreferencesCopyAppValue(checkInterval, app);
|
||||
if (!plist) {
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
--- a/chrome/browser/ui/browser.cc
|
||||
+++ b/chrome/browser/ui/browser.cc
|
||||
@@ -138,6 +138,8 @@
|
||||
@@ -137,6 +137,8 @@
|
||||
#include "chrome/browser/ui/tabs/tab_strip_model.h"
|
||||
#include "chrome/browser/ui/tabs/tab_utils.h"
|
||||
#include "chrome/browser/ui/ui_features.h"
|
||||
@@ -9,7 +9,7 @@
|
||||
#include "chrome/browser/ui/web_applications/app_browser_controller.h"
|
||||
#include "chrome/browser/ui/web_applications/web_app_launch_utils.h"
|
||||
#include "chrome/browser/ui/webui/signin/login_ui_service.h"
|
||||
@@ -474,6 +476,7 @@ Browser::Browser(const CreateParams& par
|
||||
@@ -473,6 +475,7 @@ Browser::Browser(const CreateParams& par
|
||||
omit_from_session_restore_(params.omit_from_session_restore),
|
||||
should_trigger_session_restore_(params.should_trigger_session_restore),
|
||||
cancel_download_confirmation_state_(NOT_PROMPTED),
|
||||
@@ -17,7 +17,7 @@
|
||||
override_bounds_(params.initial_bounds),
|
||||
initial_show_state_(params.initial_show_state),
|
||||
initial_workspace_(params.initial_workspace),
|
||||
@@ -837,6 +840,7 @@ Browser::WarnBeforeClosingResult Browser
|
||||
@@ -836,6 +839,7 @@ Browser::WarnBeforeClosingResult Browser
|
||||
// true or there are no pending downloads we need to prompt about) then
|
||||
// there's no need to warn.
|
||||
if (force_skip_warning_user_on_close_ || CanCloseWithInProgressDownloads())
|
||||
@@ -25,7 +25,7 @@
|
||||
return WarnBeforeClosingResult::kOkToClose;
|
||||
|
||||
DCHECK(!warn_before_closing_callback_)
|
||||
@@ -871,6 +875,7 @@ bool Browser::TryToCloseWindow(
|
||||
@@ -870,6 +874,7 @@ bool Browser::TryToCloseWindow(
|
||||
|
||||
void Browser::ResetTryToCloseWindow() {
|
||||
cancel_download_confirmation_state_ = NOT_PROMPTED;
|
||||
@@ -33,7 +33,7 @@
|
||||
unload_controller_.ResetTryToCloseWindow();
|
||||
}
|
||||
|
||||
@@ -2805,6 +2810,62 @@ bool Browser::CanCloseWithInProgressDown
|
||||
@@ -2813,6 +2818,62 @@ bool Browser::CanCloseWithInProgressDown
|
||||
return false;
|
||||
}
|
||||
|
||||
@@ -96,7 +96,7 @@
|
||||
void Browser::InProgressDownloadResponse(bool cancel_downloads) {
|
||||
if (cancel_downloads) {
|
||||
cancel_download_confirmation_state_ = RESPONSE_RECEIVED;
|
||||
@@ -2823,6 +2884,22 @@ void Browser::InProgressDownloadResponse
|
||||
@@ -2831,6 +2892,22 @@ void Browser::InProgressDownloadResponse
|
||||
|
||||
std::move(warn_before_closing_callback_)
|
||||
.Run(WarnBeforeClosingResult::kDoNotClose);
|
||||
@@ -129,7 +129,7 @@
|
||||
#include "chrome/browser/ui/signin_view_controller.h"
|
||||
#include "chrome/browser/ui/tabs/tab_strip_model_observer.h"
|
||||
#include "chrome/browser/ui/unload_controller.h"
|
||||
@@ -1060,12 +1061,17 @@ class Browser : public TabStripModelObse
|
||||
@@ -1071,12 +1072,17 @@ class Browser : public TabStripModelObse
|
||||
// Returns true if the window can close, false otherwise.
|
||||
bool CanCloseWithInProgressDownloads();
|
||||
|
||||
@@ -147,7 +147,7 @@
|
||||
// Called when all warnings have completed when attempting to close the
|
||||
// browser directly (e.g. via hotkey, close button, terminate signal, etc.)
|
||||
// Used as a WarnBeforeClosingCallback by ShouldCloseWindow().
|
||||
@@ -1235,6 +1241,8 @@ class Browser : public TabStripModelObse
|
||||
@@ -1243,6 +1249,8 @@ class Browser : public TabStripModelObse
|
||||
// when the browser is closed with in-progress downloads.
|
||||
CancelDownloadConfirmationState cancel_download_confirmation_state_;
|
||||
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
--- a/chrome/browser/chrome_content_browser_client.cc
|
||||
+++ b/chrome/browser/chrome_content_browser_client.cc
|
||||
@@ -860,10 +860,14 @@ bool HandleNewTabPageLocationOverride(
|
||||
@@ -872,10 +872,14 @@ bool HandleNewTabPageLocationOverride(
|
||||
|
||||
// Don't change the URL when incognito mode.
|
||||
if (profile->IsOffTheRecord())
|
||||
|
||||
@@ -11,7 +11,7 @@
|
||||
#endif // CHROME_BROWSER_UNGOOGLED_FLAG_ENTRIES_H_
|
||||
--- a/third_party/blink/common/features.cc
|
||||
+++ b/third_party/blink/common/features.cc
|
||||
@@ -31,6 +31,8 @@ BASE_FEATURE(kAttributionReportingCrossA
|
||||
@@ -32,6 +32,8 @@ BASE_FEATURE(kAttributionReportingCrossA
|
||||
"AttributionReportingCrossAppWeb",
|
||||
base::FEATURE_DISABLED_BY_DEFAULT);
|
||||
|
||||
@@ -33,7 +33,7 @@
|
||||
BLINK_COMMON_EXPORT BASE_DECLARE_FEATURE(kAutomaticLazyFrameLoadingToAds);
|
||||
--- a/third_party/blink/renderer/core/editing/selection_controller.cc
|
||||
+++ b/third_party/blink/renderer/core/editing/selection_controller.cc
|
||||
@@ -1325,10 +1325,14 @@ FrameSelection& SelectionController::Sel
|
||||
@@ -1328,10 +1328,14 @@ FrameSelection& SelectionController::Sel
|
||||
}
|
||||
|
||||
bool IsSelectionOverLink(const MouseEventWithHitTestResults& event) {
|
||||
@@ -50,7 +50,7 @@
|
||||
Node* inner_node = event.InnerNode();
|
||||
--- a/third_party/blink/renderer/core/input/mouse_event_manager.cc
|
||||
+++ b/third_party/blink/renderer/core/input/mouse_event_manager.cc
|
||||
@@ -663,8 +663,14 @@ WebInputEventResult MouseEventManager::H
|
||||
@@ -651,8 +651,14 @@ WebInputEventResult MouseEventManager::H
|
||||
|
||||
bool single_click = event.Event().click_count <= 1;
|
||||
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
--- a/chrome/browser/ui/views/frame/browser_frame.cc
|
||||
+++ b/chrome/browser/ui/views/frame/browser_frame.cc
|
||||
@@ -441,5 +441,7 @@ bool BrowserFrame::RegenerateFrameOnThem
|
||||
@@ -460,5 +460,7 @@ bool BrowserFrame::RegenerateFrameOnThem
|
||||
}
|
||||
|
||||
bool BrowserFrame::ShouldUseDarkTheme() const {
|
||||
@@ -10,7 +10,7 @@
|
||||
}
|
||||
--- a/chrome/browser/ui/webui/ntp/ntp_resource_cache.cc
|
||||
+++ b/chrome/browser/ui/webui/ntp/ntp_resource_cache.cc
|
||||
@@ -432,7 +432,9 @@ void NTPResourceCache::CreateNewTabIncog
|
||||
@@ -426,7 +426,9 @@ void NTPResourceCache::CreateNewTabIncog
|
||||
profile_->GetPrefs()->GetString(prefs::kCurrentThemeID);
|
||||
|
||||
// Colors.
|
||||
|
||||
@@ -42,7 +42,7 @@
|
||||
#include "base/feature_list.h"
|
||||
#include "base/format_macros.h"
|
||||
#include "base/functional/bind.h"
|
||||
@@ -341,6 +343,15 @@ AutocompleteController::AutocompleteCont
|
||||
@@ -343,6 +345,15 @@ AutocompleteController::AutocompleteCont
|
||||
search_service_worker_signal_sent_(false),
|
||||
template_url_service_(provider_client_->GetTemplateURLService()) {
|
||||
provider_types &= ~OmniboxFieldTrial::GetDisabledProviderTypes();
|
||||
@@ -56,8 +56,8 @@
|
||||
+ provider_types &= ~AutocompleteProvider::TYPE_BUILTIN;
|
||||
+ }
|
||||
|
||||
if (OmniboxFieldTrial::kAutocompleteStabilityAsyncProvidersFirst.Get()) {
|
||||
// Providers run in the order they're added. Run these async providers 1st
|
||||
// Providers run in the order they're added. Async providers should run first
|
||||
// so their async requests can be kicked off before waiting a few milliseconds
|
||||
--- a/components/omnibox/browser/history_url_provider.cc
|
||||
+++ b/components/omnibox/browser/history_url_provider.cc
|
||||
@@ -474,6 +474,9 @@ void HistoryURLProvider::Start(const Aut
|
||||
@@ -80,7 +80,7 @@
|
||||
#include "base/feature_list.h"
|
||||
#include "base/functional/bind.h"
|
||||
#include "base/functional/callback.h"
|
||||
@@ -656,6 +657,9 @@ void SearchProvider::Run(bool query_is_p
|
||||
@@ -653,6 +654,9 @@ void SearchProvider::Run(bool query_is_p
|
||||
}
|
||||
|
||||
void SearchProvider::DoHistoryQuery(bool minimal_changes) {
|
||||
|
||||
@@ -27,7 +27,7 @@
|
||||
return true;
|
||||
--- a/chrome/browser/ui/views/location_bar/location_bar_view.cc
|
||||
+++ b/chrome/browser/ui/views/location_bar/location_bar_view.cc
|
||||
@@ -303,7 +303,8 @@ void LocationBarView::Init() {
|
||||
@@ -305,7 +305,8 @@ void LocationBarView::Init() {
|
||||
|
||||
params.types_enabled.push_back(PageActionIconType::kSendTabToSelf);
|
||||
params.types_enabled.push_back(PageActionIconType::kClickToCall);
|
||||
|
||||
@@ -80,7 +80,7 @@
|
||||
}
|
||||
|
||||
bool TemplateURLService::IsPrepopulatedOrCreatedByPolicy(
|
||||
@@ -1662,6 +1670,8 @@ SyncDataMap TemplateURLService::CreateGU
|
||||
@@ -1654,6 +1662,8 @@ SyncDataMap TemplateURLService::CreateGU
|
||||
|
||||
void TemplateURLService::Init(const Initializer* initializers,
|
||||
int num_initializers) {
|
||||
@@ -89,7 +89,7 @@
|
||||
if (client_)
|
||||
client_->SetOwner(this);
|
||||
|
||||
@@ -1800,6 +1810,9 @@ void TemplateURLService::ChangeToLoadedS
|
||||
@@ -1792,6 +1802,9 @@ void TemplateURLService::ChangeToLoadedS
|
||||
|
||||
bool TemplateURLService::CanAddAutogeneratedKeywordForHost(
|
||||
const std::string& host) const {
|
||||
@@ -101,7 +101,7 @@
|
||||
return true;
|
||||
--- a/components/search_engines/template_url_service.h
|
||||
+++ b/components/search_engines/template_url_service.h
|
||||
@@ -768,6 +768,8 @@ class TemplateURLService : public WebDat
|
||||
@@ -769,6 +769,8 @@ class TemplateURLService : public WebDat
|
||||
// ---------- Browser state related members ---------------------------------
|
||||
raw_ptr<PrefService> prefs_ = nullptr;
|
||||
|
||||
|
||||
@@ -27,7 +27,7 @@
|
||||
#include "base/compiler_specific.h"
|
||||
#include "base/containers/adapters.h"
|
||||
#include "base/containers/contains.h"
|
||||
@@ -1643,6 +1644,8 @@ void TabStrip::OnMouseEventInTab(views::
|
||||
@@ -1644,6 +1645,8 @@ void TabStrip::OnMouseEventInTab(views::
|
||||
}
|
||||
|
||||
void TabStrip::UpdateHoverCard(Tab* tab, HoverCardUpdateType update_type) {
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
--- a/chrome/browser/ui/browser_command_controller.cc
|
||||
+++ b/chrome/browser/ui/browser_command_controller.cc
|
||||
@@ -1221,7 +1221,8 @@ void BrowserCommandController::InitComma
|
||||
@@ -1224,7 +1224,8 @@ void BrowserCommandController::InitComma
|
||||
command_updater_.UpdateCommandEnabled(IDC_WINDOW_CLOSE_OTHER_TABS,
|
||||
normal_window);
|
||||
|
||||
|
||||
@@ -1,14 +1,14 @@
|
||||
--- a/chrome/browser/browsing_data/chrome_browsing_data_lifetime_manager.cc
|
||||
+++ b/chrome/browser/browsing_data/chrome_browsing_data_lifetime_manager.cc
|
||||
@@ -25,6 +25,7 @@
|
||||
@@ -24,6 +24,7 @@
|
||||
#include "chrome/browser/lifetime/browser_shutdown.h"
|
||||
#include "chrome/browser/profiles/profile.h"
|
||||
#include "chrome/browser/profiles/profile_manager.h"
|
||||
#include "chrome/browser/sync/sync_service_factory.h"
|
||||
+#include "components/browsing_data/core/features.h"
|
||||
#include "components/browsing_data/core/pref_names.h"
|
||||
#include "components/keep_alive_registry/keep_alive_types.h"
|
||||
#include "components/keep_alive_registry/scoped_keep_alive.h"
|
||||
@@ -157,6 +158,21 @@ class BrowsingDataRemoverObserver
|
||||
@@ -156,6 +157,21 @@ class BrowsingDataRemoverObserver
|
||||
#endif
|
||||
};
|
||||
|
||||
@@ -30,7 +30,7 @@
|
||||
uint64_t GetOriginTypeMask(const base::Value::List& data_types) {
|
||||
uint64_t result = 0;
|
||||
for (const auto& data_type : data_types) {
|
||||
@@ -305,7 +321,8 @@ void ChromeBrowsingDataLifetimeManager::
|
||||
@@ -304,7 +320,8 @@ void ChromeBrowsingDataLifetimeManager::
|
||||
bool keep_browser_alive) {
|
||||
const base::Value::List& data_types = profile_->GetPrefs()->GetList(
|
||||
browsing_data::prefs::kClearBrowsingDataOnExitList);
|
||||
@@ -40,7 +40,7 @@
|
||||
profile_->GetPrefs()->SetBoolean(
|
||||
browsing_data::prefs::kClearBrowsingDataOnExitDeletionPending, true);
|
||||
auto* remover = profile_->GetBrowsingDataRemover();
|
||||
@@ -316,8 +333,8 @@ void ChromeBrowsingDataLifetimeManager::
|
||||
@@ -315,8 +332,8 @@ void ChromeBrowsingDataLifetimeManager::
|
||||
DCHECK(keep_browser_alive);
|
||||
#endif
|
||||
remover->RemoveAndReply(base::Time(), base::Time::Max(),
|
||||
@@ -75,22 +75,22 @@
|
||||
#endif // CHROME_BROWSER_UNGOOGLED_FLAG_ENTRIES_H_
|
||||
--- a/components/browsing_data/core/features.cc
|
||||
+++ b/components/browsing_data/core/features.cc
|
||||
@@ -9,6 +9,8 @@
|
||||
namespace browsing_data {
|
||||
namespace features {
|
||||
@@ -7,6 +7,8 @@
|
||||
#include "build/build_config.h"
|
||||
|
||||
namespace browsing_data::features {
|
||||
+BASE_FEATURE(kClearDataOnExit, "ClearDataOnExit", base::FEATURE_DISABLED_BY_DEFAULT);
|
||||
+
|
||||
BASE_FEATURE(kEnableRemovingAllThirdPartyCookies,
|
||||
"EnableRemovingAllThirdPartyCookies",
|
||||
base::FEATURE_DISABLED_BY_DEFAULT);
|
||||
BASE_FEATURE(kEnableBrowsingDataLifetimeManager,
|
||||
"BrowsingDataLifetimeManager",
|
||||
base::FEATURE_ENABLED_BY_DEFAULT);
|
||||
--- a/components/browsing_data/core/features.h
|
||||
+++ b/components/browsing_data/core/features.h
|
||||
@@ -17,6 +17,7 @@ BASE_DECLARE_FEATURE(kEnableRemovingAllT
|
||||
// defined by the BrowsingDataLifetime policy.
|
||||
BASE_DECLARE_FEATURE(kEnableBrowsingDataLifetimeManager);
|
||||
@@ -8,6 +8,7 @@
|
||||
#include "base/feature_list.h"
|
||||
|
||||
namespace browsing_data::features {
|
||||
+BASE_DECLARE_FEATURE(kClearDataOnExit);
|
||||
} // namespace features
|
||||
} // namespace browsing_data
|
||||
|
||||
// Enable BrowsingDataLifetimeManager that periodically delete browsing data as
|
||||
// defined by the BrowsingDataLifetime policy.
|
||||
|
||||
@@ -8,7 +8,7 @@
|
||||
#include "base/containers/adapters.h"
|
||||
#include "base/containers/contains.h"
|
||||
#include "base/containers/flat_map.h"
|
||||
@@ -1828,6 +1829,10 @@ bool TabStripModel::CloseTabs(base::span
|
||||
@@ -1835,6 +1836,10 @@ bool TabStripModel::CloseTabs(base::span
|
||||
if (items.empty())
|
||||
return true;
|
||||
|
||||
|
||||
@@ -50,7 +50,7 @@
|
||||
bool IsExtensionDownload(const download::DownloadItem& download_item);
|
||||
--- a/chrome/browser/download/download_target_determiner.cc
|
||||
+++ b/chrome/browser/download/download_target_determiner.cc
|
||||
@@ -1186,10 +1186,12 @@ DownloadConfirmationReason DownloadTarge
|
||||
@@ -1192,10 +1192,12 @@ DownloadConfirmationReason DownloadTarge
|
||||
return DownloadConfirmationReason::SAVE_AS;
|
||||
|
||||
#if BUILDFLAG(ENABLE_EXTENSIONS)
|
||||
|
||||
@@ -13,7 +13,7 @@
|
||||
#endif // CHROME_BROWSER_UNGOOGLED_FLAG_ENTRIES_H_
|
||||
--- a/content/renderer/render_frame_impl.cc
|
||||
+++ b/content/renderer/render_frame_impl.cc
|
||||
@@ -1171,6 +1171,8 @@ WindowOpenDisposition NavigationPolicyTo
|
||||
@@ -1165,6 +1165,8 @@ WindowOpenDisposition NavigationPolicyTo
|
||||
case blink::kWebNavigationPolicyNewWindow:
|
||||
return WindowOpenDisposition::NEW_WINDOW;
|
||||
case blink::kWebNavigationPolicyNewPopup:
|
||||
|
||||
@@ -21,7 +21,7 @@
|
||||
#include "base/compiler_specific.h"
|
||||
#include "base/containers/flat_set.h"
|
||||
#include "base/feature_list.h"
|
||||
@@ -1164,7 +1165,8 @@ void HistoryBackend::InitImpl(
|
||||
@@ -1187,7 +1188,8 @@ void HistoryBackend::InitImpl(
|
||||
db_->GetStartDate(&first_recorded_time_);
|
||||
|
||||
// Start expiring old stuff.
|
||||
|
||||
@@ -16,7 +16,7 @@
|
||||
#include "extensions/common/extension_features.h"
|
||||
#include "ui/base/dragdrop/drag_drop_types.h"
|
||||
#include "ui/base/dragdrop/mojom/drag_drop_types.mojom-shared.h"
|
||||
@@ -347,6 +349,17 @@ void ExtensionsToolbarContainer::AnchorA
|
||||
@@ -348,6 +350,17 @@ void ExtensionsToolbarContainer::AnchorA
|
||||
widget->widget_delegate()->AsBubbleDialogDelegate()->SetAnchorView(
|
||||
anchor_view && anchor_view->GetVisible() ? anchor_view
|
||||
: GetExtensionsButton());
|
||||
@@ -34,7 +34,7 @@
|
||||
widget->Show();
|
||||
}
|
||||
|
||||
@@ -849,6 +862,9 @@ void ExtensionsToolbarContainer::UpdateC
|
||||
@@ -846,6 +859,9 @@ void ExtensionsToolbarContainer::UpdateC
|
||||
}
|
||||
|
||||
bool ExtensionsToolbarContainer::ShouldContainerBeVisible() const {
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
--- a/chrome/browser/ui/views/frame/browser_view.cc
|
||||
+++ b/chrome/browser/ui/views/frame/browser_view.cc
|
||||
@@ -1791,6 +1791,10 @@ void BrowserView::UpdateExclusiveAccessE
|
||||
@@ -1850,6 +1850,10 @@ void BrowserView::UpdateExclusiveAccessE
|
||||
ExclusiveAccessBubbleHideCallback bubble_first_hide_callback,
|
||||
bool notify_download,
|
||||
bool force_update) {
|
||||
|
||||
@@ -47,7 +47,7 @@
|
||||
// ICANN uses this localhost address to indicate a name collision.
|
||||
//
|
||||
// The policy in Chromium is to fail host resolving if it resolves to
|
||||
@@ -3768,7 +3763,7 @@ bool HostResolverManager::IsIPv6Reachabl
|
||||
@@ -3760,7 +3755,7 @@ bool HostResolverManager::IsIPv6Reachabl
|
||||
(tick_clock_->NowTicks() - last_ipv6_probe_time_).InMilliseconds() >
|
||||
kIPv6ProbePeriodMs) {
|
||||
SetLastIPv6ProbeResult(
|
||||
|
||||
@@ -447,7 +447,7 @@
|
||||
}
|
||||
--- a/components/search_engines/template_url_service.h
|
||||
+++ b/components/search_engines/template_url_service.h
|
||||
@@ -262,7 +262,8 @@ class TemplateURLService : public WebDat
|
||||
@@ -263,7 +263,8 @@ class TemplateURLService : public WebDat
|
||||
void ResetTemplateURL(TemplateURL* url,
|
||||
const std::u16string& title,
|
||||
const std::u16string& keyword,
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
--- a/chrome/browser/about_flags.cc
|
||||
+++ b/chrome/browser/about_flags.cc
|
||||
@@ -3209,7 +3209,13 @@ const FeatureEntry::FeatureVariation kPr
|
||||
@@ -3227,7 +3227,13 @@ const FeatureEntry::FeatureVariation kPr
|
||||
// calculate and verify checksum.
|
||||
//
|
||||
// When adding a new choice, add it to the end of the list.
|
||||
|
||||
@@ -147,7 +147,7 @@
|
||||
} // namespace download
|
||||
--- a/content/browser/BUILD.gn
|
||||
+++ b/content/browser/BUILD.gn
|
||||
@@ -101,7 +101,6 @@ source_set("browser") {
|
||||
@@ -100,7 +100,6 @@ source_set("browser") {
|
||||
"//components/power_monitor",
|
||||
"//components/power_scheduler",
|
||||
"//components/services/filesystem:lib",
|
||||
|
||||
@@ -3,7 +3,7 @@
|
||||
|
||||
--- a/chrome/browser/intranet_redirect_detector.cc
|
||||
+++ b/chrome/browser/intranet_redirect_detector.cc
|
||||
@@ -118,9 +118,7 @@ void IntranetRedirectDetector::FinishSle
|
||||
@@ -117,9 +117,7 @@ void IntranetRedirectDetector::FinishSle
|
||||
simple_loaders_.clear();
|
||||
resulting_origins_.clear();
|
||||
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
|
||||
--- a/third_party/blink/common/features.cc
|
||||
+++ b/third_party/blink/common/features.cc
|
||||
@@ -511,7 +511,7 @@ BASE_FEATURE(kAllowSyncXHRInPageDismissa
|
||||
@@ -515,7 +515,7 @@ BASE_FEATURE(kAllowSyncXHRInPageDismissa
|
||||
// crbug.com/988956.
|
||||
BASE_FEATURE(kPrefetchPrivacyChanges,
|
||||
"PrefetchPrivacyChanges",
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
|
||||
--- a/chrome/browser/ui/browser_commands.cc
|
||||
+++ b/chrome/browser/ui/browser_commands.cc
|
||||
@@ -475,10 +475,6 @@ int GetContentRestrictions(const Browser
|
||||
@@ -477,10 +477,6 @@ int GetContentRestrictions(const Browser
|
||||
CoreTabHelper* core_tab_helper =
|
||||
CoreTabHelper::FromWebContents(current_tab);
|
||||
content_restrictions = core_tab_helper->content_restrictions();
|
||||
@@ -13,7 +13,7 @@
|
||||
}
|
||||
return content_restrictions;
|
||||
}
|
||||
@@ -1403,8 +1399,7 @@ bool CanSavePage(const Browser* browser)
|
||||
@@ -1414,8 +1410,7 @@ bool CanSavePage(const Browser* browser)
|
||||
DownloadPrefs::DownloadRestriction::ALL_FILES) {
|
||||
return false;
|
||||
}
|
||||
|
||||
@@ -13,7 +13,7 @@
|
||||
AddChildView(std::make_unique<views::InkDropContainerView>());
|
||||
--- a/chrome/browser/ui/views/tabs/tab_strip.cc
|
||||
+++ b/chrome/browser/ui/views/tabs/tab_strip.cc
|
||||
@@ -1890,8 +1890,6 @@ void TabStrip::NewTabButtonPressed(const
|
||||
@@ -1891,8 +1891,6 @@ void TabStrip::NewTabButtonPressed(const
|
||||
|
||||
const ui::MouseEvent& mouse = static_cast<const ui::MouseEvent&>(event);
|
||||
if (mouse.IsOnlyMiddleMouseButton()) {
|
||||
@@ -22,7 +22,7 @@
|
||||
ui::Clipboard* clipboard = ui::Clipboard::GetForCurrentThread();
|
||||
CHECK(clipboard);
|
||||
std::u16string clipboard_text;
|
||||
@@ -1899,7 +1897,6 @@ void TabStrip::NewTabButtonPressed(const
|
||||
@@ -1900,7 +1898,6 @@ void TabStrip::NewTabButtonPressed(const
|
||||
/* data_dst = */ nullptr, &clipboard_text);
|
||||
if (!clipboard_text.empty())
|
||||
controller_->CreateNewTabWithLocation(clipboard_text);
|
||||
|
||||
@@ -224,7 +224,7 @@
|
||||
<!-- Signout is not supported yet on lacros, https://crbug.com/1217645 -->
|
||||
<settings-toggle-button id="signinAllowedToggle"
|
||||
class="hr"
|
||||
@@ -60,12 +60,6 @@
|
||||
@@ -52,12 +52,6 @@
|
||||
</settings-toggle-button>
|
||||
</if><!-- not chromeos -->
|
||||
</if><!-- _google_chrome -->
|
||||
@@ -257,7 +257,7 @@
|
||||
start-icon="settings:cookie"
|
||||
--- a/chrome/browser/resources/settings/privacy_page/security_page.html
|
||||
+++ b/chrome/browser/resources/settings/privacy_page/security_page.html
|
||||
@@ -145,11 +145,3 @@
|
||||
@@ -146,11 +146,3 @@
|
||||
</template>
|
||||
</if>
|
||||
|
||||
@@ -304,7 +304,7 @@
|
||||
Profile* profile = browser()->profile();
|
||||
if (profile->IsOffTheRecord() || profile->IsGuestSession())
|
||||
return gfx::ImageSkia();
|
||||
@@ -469,8 +470,7 @@ void ProfileMenuView::BuildIdentity() {
|
||||
@@ -470,8 +471,7 @@ void ProfileMenuView::BuildIdentity() {
|
||||
menu_subtitle_);
|
||||
} else {
|
||||
menu_title_ = std::u16string();
|
||||
|
||||
67
pruning.list
67
pruning.list
@@ -79,7 +79,7 @@ chrome/browser/resources/chromeos/accessibility/chromevox/earcons/wrap.ogg
|
||||
chrome/browser/resources/chromeos/accessibility/chromevox/earcons/wrap_edge.ogg
|
||||
chrome/browser/resources/chromeos/accessibility/select_to_speak/earcons/null_selection.ogg
|
||||
chrome/browser/resources/media/mei_preload/preloaded_data.pb
|
||||
chrome/build/pgo_profiles/chrome-linux-5563-1678290224-135410b8b753e595e58a37622c311fffbbc64016.profdata
|
||||
chrome/build/pgo_profiles/chrome-linux-5615-1679995307-0baae343d55c36a01b20eb4c600fca3ba7e0825e.profdata
|
||||
chrome/chrome_cleaner/parsers/shortcut_parser/target/data/lnk_parser_fuzzer/Network Share Test.lnk
|
||||
chrome/chrome_cleaner/parsers/shortcut_parser/target/data/lnk_parser_fuzzer/New folder - Shortcut.lnk
|
||||
chrome/chrome_cleaner/parsers/shortcut_parser/target/data/lnk_parser_fuzzer/long_name.lnk
|
||||
@@ -212,6 +212,9 @@ components/test/data/paint_preview/PaintPreviewTestService/wikipedia/150869817BD
|
||||
components/test/data/paint_preview/PaintPreviewTestService/wikipedia/ABE3BC9BB03E9107A321304E21C0A644.skp
|
||||
components/test/data/paint_preview/PaintPreviewTestService/wikipedia/proto.pb
|
||||
components/test/data/printing/unsorted_custompapers.plist
|
||||
components/test/data/safe_browsing/client_model.pb
|
||||
components/test/data/safe_browsing/visual_model_android.tflite
|
||||
components/test/data/safe_browsing/visual_model_desktop.tflite
|
||||
components/test/data/segmentation_platform/adder.tflite
|
||||
components/test/data/service_worker/created_by_origin_impl/Database/000003.log
|
||||
components/test/data/service_worker/created_by_origin_impl/Database/MANIFEST-000001
|
||||
@@ -3132,12 +3135,12 @@ third_party/angle/third_party/VK-GL-CTS/src/external/openglcts/data/spirv/spirv_
|
||||
third_party/angle/third_party/VK-GL-CTS/src/external/openglcts/data/spirv/spirv_validation_capabilities/binary_p1s3.nspv
|
||||
third_party/angle/third_party/VK-GL-CTS/src/external/openglcts/data/spirv/spirv_validation_capabilities/binary_p1s4.nspv
|
||||
third_party/angle/third_party/VK-GL-CTS/src/external/openglcts/data/spirv/spirv_validation_capabilities/binary_p2s0.nspv
|
||||
third_party/angle/third_party/VK-GL-CTS/src/external/vulkancts/data/vulkan/video/clip-a.mp4
|
||||
third_party/angle/third_party/VK-GL-CTS/src/external/vulkancts/data/vulkan/video/clip-b.mp4
|
||||
third_party/angle/third_party/VK-GL-CTS/src/external/vulkancts/data/vulkan/video/clip-c.mp4
|
||||
third_party/angle/third_party/VK-GL-CTS/src/external/vulkancts/data/vulkan/video/clip-d.mp4
|
||||
third_party/angle/third_party/VK-GL-CTS/src/external/vulkancts/data/vulkan/video/jellyfish-250-mbps-4k-uhd-GOB-IPB13.h264.mp4
|
||||
third_party/angle/third_party/VK-GL-CTS/src/external/vulkancts/data/vulkan/video/jellyfish-250-mbps-4k-uhd-GOB-IPB13.h265.mp4
|
||||
third_party/angle/third_party/VK-GL-CTS/src/external/vulkancts/data/vulkan/video/clip-a.h264
|
||||
third_party/angle/third_party/VK-GL-CTS/src/external/vulkancts/data/vulkan/video/clip-b.h264
|
||||
third_party/angle/third_party/VK-GL-CTS/src/external/vulkancts/data/vulkan/video/clip-c.h264
|
||||
third_party/angle/third_party/VK-GL-CTS/src/external/vulkancts/data/vulkan/video/clip-d.h265
|
||||
third_party/angle/third_party/VK-GL-CTS/src/external/vulkancts/data/vulkan/video/jellyfish-250-mbps-4k-uhd-GOB-IPB13.h264
|
||||
third_party/angle/third_party/VK-GL-CTS/src/external/vulkancts/data/vulkan/video/jellyfish-250-mbps-4k-uhd-GOB-IPB13.h265
|
||||
third_party/angle/third_party/glmark2/src/data/models/asteroid-high.3ds
|
||||
third_party/angle/third_party/glmark2/src/data/models/asteroid-low.3ds
|
||||
third_party/angle/third_party/glmark2/src/data/models/cat.3ds
|
||||
@@ -8563,6 +8566,7 @@ third_party/crashpad/crashpad/snapshot/elf/elf_image_reader_fuzzer_corpus/ret42
|
||||
third_party/crashpad/crashpad/snapshot/ios/testdata/crash-1fa088dda0adb41459d063078a0f384a0bb8eefa
|
||||
third_party/crashpad/crashpad/snapshot/ios/testdata/crash-5726011582644224
|
||||
third_party/crashpad/crashpad/snapshot/ios/testdata/crash-6605504629637120
|
||||
third_party/crashpad/crashpad/snapshot/ios/testdata/crash-c44acfcbccd8c7a8
|
||||
third_party/crashpad/crashpad/util/net/testdata/binary_http_body.dat
|
||||
third_party/dawn/third_party/ninja/ninja
|
||||
third_party/dawn/third_party/webgpu-cts/deploy_key.enc
|
||||
@@ -9628,9 +9632,6 @@ third_party/depot_tools/external_bin/gsutil/gsutil_4.68/gsutil/third_party/rsa/r
|
||||
third_party/depot_tools/external_bin/gsutil/gsutil_4.68/gsutil/third_party/rsa/rsa/__pycache__/randnum.cpython-38.pyc
|
||||
third_party/depot_tools/external_bin/gsutil/gsutil_4.68/gsutil/third_party/rsa/rsa/__pycache__/transform.cpython-38.pyc
|
||||
third_party/depot_tools/external_bin/gsutil/gsutil_4.68/gsutil/third_party/six/__pycache__/six.cpython-38.pyc
|
||||
third_party/depot_tools/ninja-linux64
|
||||
third_party/depot_tools/ninja-mac
|
||||
third_party/depot_tools/ninja.exe
|
||||
third_party/devtools-frontend/src/node_modules/tar-fs/test/fixtures/invalid.tar
|
||||
third_party/devtools-frontend/src/node_modules/terser/node_modules/source-map/lib/mappings.wasm
|
||||
third_party/devtools-frontend/src/test/e2e/resources/media/corrupt.webm
|
||||
@@ -9648,15 +9649,6 @@ third_party/devtools-frontend/src/test/e2e/resources/sources/wasm/syntax-highlig
|
||||
third_party/devtools-frontend/src/test/e2e/resources/sources/wasm/unreachable.wasm
|
||||
third_party/devtools-frontend/src/test/e2e/resources/sources/wasm/unreachable_with_dwarf.wasm
|
||||
third_party/devtools-frontend/src/test/e2e/resources/sources/wasm/wasm-with-sourcemap.wasm
|
||||
third_party/devtools-frontend/src/test/screenshots/image_diff/linux/image_diff
|
||||
third_party/devtools-frontend/src/test/screenshots/image_diff/linux/libbase.so
|
||||
third_party/devtools-frontend/src/test/screenshots/image_diff/linux/libboringssl.so
|
||||
third_party/devtools-frontend/src/test/screenshots/image_diff/linux/libc++.so
|
||||
third_party/devtools-frontend/src/test/screenshots/image_diff/linux/libchrome_zlib.so
|
||||
third_party/devtools-frontend/src/test/screenshots/image_diff/mac/image_diff
|
||||
third_party/devtools-frontend/src/test/screenshots/image_diff/mac/libbase.dylib
|
||||
third_party/devtools-frontend/src/test/screenshots/image_diff/mac/libc++.dylib
|
||||
third_party/devtools-frontend/src/test/screenshots/image_diff/mac/libchrome_zlib.dylib
|
||||
third_party/devtools-frontend/src/test/unittests/fixtures/traces/animation.json.gz
|
||||
third_party/devtools-frontend/src/test/unittests/fixtures/traces/basic.json.gz
|
||||
third_party/devtools-frontend/src/test/unittests/fixtures/traces/cls-cluster-max-duration.json.gz
|
||||
@@ -9666,7 +9658,9 @@ third_party/devtools-frontend/src/test/unittests/fixtures/traces/cls-last-cluste
|
||||
third_party/devtools-frontend/src/test/unittests/fixtures/traces/cls-multiple-frames.json.gz
|
||||
third_party/devtools-frontend/src/test/unittests/fixtures/traces/cls-single-frame.json.gz
|
||||
third_party/devtools-frontend/src/test/unittests/fixtures/traces/forced-layouts-and-no-gpu.json.gz
|
||||
third_party/devtools-frontend/src/test/unittests/fixtures/traces/generic-about-tracing-trace.json.gz
|
||||
third_party/devtools-frontend/src/test/unittests/fixtures/traces/interactive-time.json.gz
|
||||
third_party/devtools-frontend/src/test/unittests/fixtures/traces/invalidate-style-class-name-change.json.gz
|
||||
third_party/devtools-frontend/src/test/unittests/fixtures/traces/lcp-images.json.gz
|
||||
third_party/devtools-frontend/src/test/unittests/fixtures/traces/lcp-web-font.json.gz
|
||||
third_party/devtools-frontend/src/test/unittests/fixtures/traces/load-simple.json.gz
|
||||
@@ -9684,10 +9678,23 @@ third_party/devtools-frontend/src/test/unittests/fixtures/traces/reload-no-tti.j
|
||||
third_party/devtools-frontend/src/test/unittests/fixtures/traces/request-with-query-param.json.gz
|
||||
third_party/devtools-frontend/src/test/unittests/fixtures/traces/slow-interaction-button-click.json.gz
|
||||
third_party/devtools-frontend/src/test/unittests/fixtures/traces/slow-interaction-keydown.json.gz
|
||||
third_party/devtools-frontend/src/test/unittests/fixtures/traces/style-invalidation-change-attribute.json.gz
|
||||
third_party/devtools-frontend/src/test/unittests/fixtures/traces/style-invalidation-change-id.json.gz
|
||||
third_party/devtools-frontend/src/test/unittests/fixtures/traces/threejs-gpu.json.gz
|
||||
third_party/devtools-frontend/src/test/unittests/fixtures/traces/user-timings-complex.json.gz
|
||||
third_party/devtools-frontend/src/test/unittests/fixtures/traces/user-timings.json.gz
|
||||
third_party/devtools-frontend/src/test/unittests/fixtures/traces/web-dev.json.gz
|
||||
third_party/devtools-frontend/src/third_party/esbuild/esbuild
|
||||
third_party/devtools-frontend/src/third_party/image_diff/linux/image_diff
|
||||
third_party/devtools-frontend/src/third_party/image_diff/linux/libbase.so
|
||||
third_party/devtools-frontend/src/third_party/image_diff/linux/libboringssl.so
|
||||
third_party/devtools-frontend/src/third_party/image_diff/linux/libc++.so
|
||||
third_party/devtools-frontend/src/third_party/image_diff/linux/libchrome_zlib.so
|
||||
third_party/devtools-frontend/src/third_party/image_diff/mac/image_diff
|
||||
third_party/devtools-frontend/src/third_party/image_diff/mac/libbase.dylib
|
||||
third_party/devtools-frontend/src/third_party/image_diff/mac/libc++.dylib
|
||||
third_party/devtools-frontend/src/third_party/image_diff/mac/libchrome_zlib.dylib
|
||||
third_party/devtools-frontend/src/third_party/image_diff/win32/image_diff.exe
|
||||
third_party/ffmpeg/tests/reference.pnm
|
||||
third_party/flatbuffers/src/android/gradle/wrapper/gradle-wrapper.jar
|
||||
third_party/flatbuffers/src/dart/test/monsterdata_test.mon
|
||||
@@ -9722,7 +9729,6 @@ third_party/flatbuffers/src/tests/annotated_binary/tests/invalid_vtable_size_sho
|
||||
third_party/flatbuffers/src/tests/arrays_test.bfbs
|
||||
third_party/flatbuffers/src/tests/gold_flexbuffer_example.bin
|
||||
third_party/flatbuffers/src/tests/javatest.bin
|
||||
third_party/flatbuffers/src/tests/monster_test.afb
|
||||
third_party/flatbuffers/src/tests/monster_test.bfbs
|
||||
third_party/flatbuffers/src/tests/monsterdata_go_wire.mon.sp
|
||||
third_party/flatbuffers/src/tests/monsterdata_python_wire.mon
|
||||
@@ -13050,16 +13056,19 @@ third_party/hunspell/fuzz/bdict_corpus/en-US-7-1.bdic
|
||||
third_party/hunspell/fuzz/bdict_corpus/en-US-8-0.bdic
|
||||
third_party/hunspell/fuzz/bdict_corpus/f95048cdc0fc231dd712bad106578a9eeecd869b
|
||||
third_party/hunspell/fuzz/bdict_corpus/fda69541054125551c41ab3e591e0482405ca2dc
|
||||
third_party/hyphenation-patterns/hyb/hyph-af.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-as.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-be.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-bg.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-bn.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-cs.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-cu.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-cy.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-da.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-de-1901.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-de-1996.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-de-ch-1901.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-el.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-en-gb.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-en-us.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-es.hyb
|
||||
@@ -13067,25 +13076,37 @@ third_party/hyphenation-patterns/hyb/hyph-et.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-eu.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-fr.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-ga.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-gl.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-gu.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-hi.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-hr.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-hu.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-hy.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-it.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-ka.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-kn.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-la.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-lt.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-lv.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-ml.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-mn-cyrl.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-mr.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-mul-ethi.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-nb.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-nl.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-nn.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-or.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-pa.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-pt.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-ru.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-sk.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-sl.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-sq.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-sv.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-ta.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-te.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-tk.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-uk.hyb
|
||||
third_party/hyphenation-patterns/hyb/hyph-und-ethi.hyb
|
||||
third_party/icu/cast/icudtl.dat
|
||||
third_party/icu/chromeos/icudtl.dat
|
||||
@@ -16059,6 +16080,7 @@ third_party/llvm/llvm/test/Bitcode/visibility-styles.3.2.ll.bc
|
||||
third_party/llvm/llvm/test/Bitcode/weak-cmpxchg-upgrade.ll.bc
|
||||
third_party/llvm/llvm/test/Bitcode/weak-macho-3.5.ll.bc
|
||||
third_party/llvm/llvm/test/DebugInfo/Inputs/.build-id/ab/b50d82b6bdc861.debug
|
||||
third_party/llvm/llvm/test/DebugInfo/Inputs/accel-imported-declaration.macho-arm64.o
|
||||
third_party/llvm/llvm/test/DebugInfo/Inputs/arange-overlap.elf-x86_64
|
||||
third_party/llvm/llvm/test/DebugInfo/Inputs/arm-relocs.elf-arm
|
||||
third_party/llvm/llvm/test/DebugInfo/Inputs/cross-cu-inlining.x86_64-macho.o
|
||||
@@ -16401,6 +16423,8 @@ third_party/llvm/llvm/test/Transforms/SampleProfile/Inputs/uniqname.suffix.afdo
|
||||
third_party/llvm/llvm/test/Verifier/non-integer-gep-index.ll.bc
|
||||
third_party/llvm/llvm/test/tools/dsymutil/Inputs/absolute_sym.macho.i386
|
||||
third_party/llvm/llvm/test/tools/dsymutil/Inputs/absolute_sym.macho.i386.o
|
||||
third_party/llvm/llvm/test/tools/dsymutil/Inputs/accel-imported-declaration.macho-arm64
|
||||
third_party/llvm/llvm/test/tools/dsymutil/Inputs/accel-imported-declaration.macho-arm64.o
|
||||
third_party/llvm/llvm/test/tools/dsymutil/Inputs/alias/bar.o
|
||||
third_party/llvm/llvm/test/tools/dsymutil/Inputs/alias/foo.o
|
||||
third_party/llvm/llvm/test/tools/dsymutil/Inputs/alias/foobar
|
||||
@@ -16416,6 +16440,7 @@ third_party/llvm/llvm/test/tools/dsymutil/Inputs/basic1.macho.x86_64.o
|
||||
third_party/llvm/llvm/test/tools/dsymutil/Inputs/basic2-custom-linetable.macho.x86_64.o
|
||||
third_party/llvm/llvm/test/tools/dsymutil/Inputs/basic2.macho.x86_64.o
|
||||
third_party/llvm/llvm/test/tools/dsymutil/Inputs/basic3.macho.x86_64.o
|
||||
third_party/llvm/llvm/test/tools/dsymutil/Inputs/call-dwarf5.o
|
||||
third_party/llvm/llvm/test/tools/dsymutil/Inputs/common.macho.x86_64
|
||||
third_party/llvm/llvm/test/tools/dsymutil/Inputs/common.macho.x86_64.o
|
||||
third_party/llvm/llvm/test/tools/dsymutil/Inputs/dead-stripped/1.o
|
||||
@@ -17291,7 +17316,6 @@ third_party/nasm/travis/test/xcrypt.bin.t
|
||||
third_party/nasm/travis/test/zerobyte.bin.t
|
||||
third_party/ninja/ninja
|
||||
third_party/node/node_modules.tar.gz
|
||||
third_party/node/node_modules/terser/node_modules/source-map/lib/mappings.wasm
|
||||
third_party/openh264/src/autotest/performanceTest/ios/fruitstrap
|
||||
third_party/openh264/src/autotest/performanceTest/ios/iFileTransfer
|
||||
third_party/openh264/src/res/Adobe_PDF_sample_a_1024x768_50Frms.264
|
||||
@@ -17803,6 +17827,7 @@ third_party/tflite/src/tensorflow/cc/saved_model/testdata/x_plus_y_v2_debuginfo/
|
||||
third_party/tflite/src/tensorflow/cc/saved_model/testdata/x_plus_y_v2_debuginfo/variables/variables.index
|
||||
third_party/tflite/src/tensorflow/compiler/aot/codegen_test_o.golden
|
||||
third_party/tflite/src/tensorflow/compiler/jit/tests/opens2s_gnmt_mixed_precision.pbtxt.gz
|
||||
third_party/tflite/src/tensorflow/compiler/xla/mlir/tools/mlir_bisect/tests/snapshot.mlir.pb
|
||||
third_party/tflite/src/tensorflow/core/graph/regularization/testdata/bert1/saved_model.pb
|
||||
third_party/tflite/src/tensorflow/core/graph/regularization/testdata/bert2/saved_model.pb
|
||||
third_party/tflite/src/tensorflow/core/ir/importexport/tests/saved_model/savedmodel_v1/saved_model.pb
|
||||
|
||||
Reference in New Issue
Block a user