Update to Chromium 124.0.6367.60

This commit is contained in:
Blaise
2024-04-11 09:48:20 -05:00
parent 8de384206e
commit d7fca419c6
61 changed files with 1227 additions and 1038 deletions

View File

@@ -1 +1 @@
123.0.6312.122
124.0.6367.60

View File

File diff suppressed because it is too large Load Diff

View File

@@ -1,6 +1,6 @@
--- a/chrome/browser/BUILD.gn
+++ b/chrome/browser/BUILD.gn
@@ -2367,7 +2367,6 @@ static_library("browser") {
@@ -2378,7 +2378,6 @@ static_library("browser") {
"//components/reporting/util:task_runner_context",
"//components/resources",
"//components/safe_browsing/content/browser",
@@ -8,7 +8,7 @@
"//components/safe_browsing/content/browser:safe_browsing_service",
"//components/safe_browsing/content/browser/password_protection",
"//components/safe_browsing/content/browser/web_ui",
@@ -3763,8 +3762,6 @@ static_library("browser") {
@@ -3771,8 +3770,6 @@ static_library("browser") {
"download/download_commands.h",
"download/download_crx_util.cc",
"download/download_crx_util.h",
@@ -123,7 +123,7 @@
subresource_filter_ruleset_service_;
--- a/chrome/browser/browsing_data/chrome_browsing_data_remover_delegate.cc
+++ b/chrome/browser/browsing_data/chrome_browsing_data_remover_delegate.cc
@@ -66,7 +66,6 @@
@@ -68,7 +68,6 @@
#include "chrome/browser/profiles/keep_alive/scoped_profile_keep_alive.h"
#include "chrome/browser/profiles/profile.h"
#include "chrome/browser/reading_list/reading_list_model_factory.h"
@@ -131,7 +131,7 @@
#include "chrome/browser/safe_browsing/verdict_cache_manager_factory.h"
#include "chrome/browser/search_engines/template_url_service_factory.h"
#include "chrome/browser/share/share_history.h"
@@ -637,10 +636,6 @@ void ChromeBrowsingDataRemoverDelegate::
@@ -639,10 +638,6 @@ void ChromeBrowsingDataRemoverDelegate::
base::RecordAction(UserMetricsAction("ClearBrowsingData_Cookies"));
network::mojom::NetworkContext* safe_browsing_context = nullptr;
@@ -144,7 +144,7 @@
browsing_data::RemoveFederatedSiteSettingsData(delete_begin_, delete_end_,
--- a/chrome/browser/chrome_content_browser_client.cc
+++ b/chrome/browser/chrome_content_browser_client.cc
@@ -5047,10 +5047,6 @@ ChromeContentBrowserClient::CreateThrott
@@ -5091,10 +5091,6 @@ ChromeContentBrowserClient::CreateThrott
throttles.push_back(std::make_unique<PolicyBlocklistNavigationThrottle>(
handle, handle->GetWebContents()->GetBrowserContext()));
@@ -155,7 +155,7 @@
throttles.push_back(std::make_unique<SSLErrorNavigationThrottle>(
handle,
base::BindOnce(&HandleSSLErrorWrapper), base::BindOnce(&IsInHostedApp),
@@ -5098,16 +5094,6 @@ ChromeContentBrowserClient::CreateThrott
@@ -5146,16 +5142,6 @@ ChromeContentBrowserClient::CreateThrott
&throttles);
#endif
@@ -172,7 +172,7 @@
if (base::FeatureList::IsEnabled(safe_browsing::kDelayedWarnings)) {
throttles.push_back(
std::make_unique<safe_browsing::DelayedWarningNavigationThrottle>(
@@ -5400,8 +5386,6 @@ bool ChromeContentBrowserClient::IsPlugi
@@ -5448,8 +5434,6 @@ bool ChromeContentBrowserClient::IsPlugi
void ChromeContentBrowserClient::InitOnUIThread() {
DCHECK_CURRENTLY_ON(BrowserThread::UI);
@@ -207,7 +207,7 @@
} // namespace
--- a/chrome/browser/download/chrome_download_manager_delegate.cc
+++ b/chrome/browser/download/chrome_download_manager_delegate.cc
@@ -499,13 +499,6 @@ void ChromeDownloadManagerDelegate::SetD
@@ -502,13 +502,6 @@ void ChromeDownloadManagerDelegate::SetD
download_manager_ = dm;
@@ -221,7 +221,7 @@
if (download_manager_) {
download_manager_->AddObserver(this);
}
@@ -911,17 +904,6 @@ void ChromeDownloadManagerDelegate::Choo
@@ -924,17 +917,6 @@ void ChromeDownloadManagerDelegate::Choo
void ChromeDownloadManagerDelegate::SanitizeSavePackageResourceName(
base::FilePath* filename,
const GURL& source_url) {
@@ -241,7 +241,7 @@
void ChromeDownloadManagerDelegate::SanitizeDownloadParameters(
--- a/chrome/browser/download/download_item_model.cc
+++ b/chrome/browser/download/download_item_model.cc
@@ -110,7 +110,7 @@ class DownloadItemModelData : public bas
@@ -114,7 +114,7 @@ class DownloadItemModelData : public bas
// Danger level of the file determined based on the file type and whether
// there was a user action associated with the download.
@@ -250,7 +250,7 @@
// Whether the download is currently being revived.
bool is_being_revived_ = false;
@@ -526,13 +526,13 @@ void DownloadItemModel::SetShouldPreferO
@@ -531,13 +531,13 @@ void DownloadItemModel::SetShouldPreferO
data->should_prefer_opening_in_browser_ = preference;
}
@@ -267,7 +267,7 @@
DownloadItemModelData* data = DownloadItemModelData::GetOrCreate(download_);
data->danger_level_ = danger_level;
}
@@ -709,9 +709,6 @@ bool DownloadItemModel::IsCommandEnabled
@@ -714,9 +714,6 @@ bool DownloadItemModel::IsCommandEnabled
// filename. Don't base an "Always open" decision based on it. Also
// exclude extensions.
return download_->CanOpenDownload() &&
@@ -279,7 +279,7 @@
return !download_->IsSavePackageDownload() &&
--- a/chrome/browser/download/download_prefs.cc
+++ b/chrome/browser/download/download_prefs.cc
@@ -262,14 +262,7 @@ DownloadPrefs::DownloadPrefs(Profile* pr
@@ -263,14 +263,7 @@ DownloadPrefs::DownloadPrefs(Profile* pr
base::FilePath::StringType(1, base::FilePath::kExtensionSeparator) +
extension);
@@ -295,7 +295,7 @@
}
}
@@ -447,10 +440,6 @@ bool DownloadPrefs::IsAutoOpenByPolicy(c
@@ -448,10 +441,6 @@ bool DownloadPrefs::IsAutoOpenByPolicy(c
bool DownloadPrefs::EnableAutoOpenByUserBasedOnExtension(
const base::FilePath& file_name) {
base::FilePath::StringType extension = file_name.Extension();
@@ -322,7 +322,7 @@
// If no mime type or explicitly specified a name, don't replace file
// extension.
if (sniffed_mime_type.empty() || !suggested_filename.empty())
@@ -1287,30 +1280,7 @@ DownloadFileType::DangerLevel DownloadTa
@@ -1291,30 +1284,7 @@ DownloadFileType::DangerLevel DownloadTa
download_->HasUserGesture())
return DownloadFileType::NOT_DANGEROUS;
@@ -364,7 +364,7 @@
#include "chrome/browser/download/download_file_icon_extractor.h"
#include "chrome/browser/download/download_open_prompt.h"
#include "chrome/browser/download/download_prefs.h"
@@ -1378,9 +1377,6 @@ DownloadsAcceptDangerFunction::Downloads
@@ -1380,9 +1379,6 @@ DownloadsAcceptDangerFunction::Downloads
DownloadsAcceptDangerFunction::~DownloadsAcceptDangerFunction() {}
@@ -374,7 +374,7 @@
ExtensionFunction::ResponseAction DownloadsAcceptDangerFunction::Run() {
std::optional<downloads::AcceptDanger::Params> params =
downloads::AcceptDanger::Params::Create(args());
@@ -1418,42 +1414,7 @@ void DownloadsAcceptDangerFunction::Prom
@@ -1420,42 +1416,7 @@ void DownloadsAcceptDangerFunction::Prom
return;
}
RecordApiFunctions(DOWNLOADS_FUNCTION_ACCEPT_DANGER);
@@ -500,7 +500,7 @@
referrer_entries)));
--- a/chrome/browser/extensions/api/webstore_private/webstore_private_api.cc
+++ b/chrome/browser/extensions/api/webstore_private/webstore_private_api.cc
@@ -704,18 +704,6 @@ void WebstorePrivateBeginInstallWithMani
@@ -731,18 +731,6 @@ void WebstorePrivateBeginInstallWithMani
void WebstorePrivateBeginInstallWithManifest3Function::
ReportFrictionAcceptedEvent() {
@@ -519,7 +519,7 @@
}
void WebstorePrivateBeginInstallWithManifest3Function::OnInstallPromptDone(
@@ -1219,54 +1207,9 @@ WebstorePrivateGetReferrerChainFunction:
@@ -1255,54 +1243,9 @@ WebstorePrivateGetReferrerChainFunction:
ExtensionFunction::ResponseAction
WebstorePrivateGetReferrerChainFunction::Run() {
@@ -655,7 +655,7 @@
#include "chrome/browser/sessions/exit_type_service.h"
#include "chrome/browser/sharing/sharing_service_factory.h"
#include "chrome/browser/signin/identity_manager_factory.h"
@@ -639,17 +638,6 @@ void ProfileImpl::LoadPrefsForNormalStar
@@ -643,17 +642,6 @@ void ProfileImpl::LoadPrefsForNormalStar
mojo::PendingRemote<prefs::mojom::TrackedPreferenceValidationDelegate>
pref_validation_delegate;
@@ -703,7 +703,7 @@
if (is_android) {
deps += [ "//chrome/browser/password_manager/android:utils" ]
@@ -501,6 +503,7 @@ static_library("advanced_protection") {
@@ -505,6 +507,7 @@ static_library("advanced_protection") {
}
source_set("metrics_collector") {
@@ -711,7 +711,7 @@
sources = [
"safe_browsing_metrics_collector_factory.cc",
"safe_browsing_metrics_collector_factory.h",
@@ -520,6 +523,7 @@ source_set("metrics_collector") {
@@ -524,6 +527,7 @@ source_set("metrics_collector") {
"//components/safe_browsing/core/common:safe_browsing_prefs",
"//content/public/browser",
]
@@ -721,10 +721,12 @@
source_set("test_support") {
--- a/chrome/browser/ssl/security_state_tab_helper.cc
+++ b/chrome/browser/ssl/security_state_tab_helper.cc
@@ -174,92 +174,6 @@ bool SecurityStateTabHelper::UsedPolicyI
@@ -174,93 +174,6 @@ bool SecurityStateTabHelper::UsedPolicyI
security_state::MaliciousContentStatus
SecurityStateTabHelper::GetMaliciousContentStatus() const {
- using enum safe_browsing::SBThreatType;
-
- content::NavigationEntry* entry =
- web_contents()->GetController().GetVisibleEntry();
- if (!entry)
@@ -738,20 +740,20 @@
- if (sb_ui_manager->IsUrlAllowlistedOrPendingForWebContents(
- entry->GetURL(), false, entry, web_contents(), false, &threat_type)) {
- switch (threat_type) {
- case safe_browsing::SB_THREAT_TYPE_UNUSED:
- case safe_browsing::SB_THREAT_TYPE_SAFE:
- case safe_browsing::SB_THREAT_TYPE_URL_PHISHING:
- case safe_browsing::SB_THREAT_TYPE_URL_CLIENT_SIDE_PHISHING:
- case SB_THREAT_TYPE_UNUSED:
- case SB_THREAT_TYPE_SAFE:
- case SB_THREAT_TYPE_URL_PHISHING:
- case SB_THREAT_TYPE_URL_CLIENT_SIDE_PHISHING:
- return security_state::MALICIOUS_CONTENT_STATUS_SOCIAL_ENGINEERING;
- case safe_browsing::SB_THREAT_TYPE_URL_MALWARE:
- case SB_THREAT_TYPE_URL_MALWARE:
- return security_state::MALICIOUS_CONTENT_STATUS_MALWARE;
- case safe_browsing::SB_THREAT_TYPE_URL_UNWANTED:
- case SB_THREAT_TYPE_URL_UNWANTED:
- return security_state::MALICIOUS_CONTENT_STATUS_UNWANTED_SOFTWARE;
- case safe_browsing::SB_THREAT_TYPE_SAVED_PASSWORD_REUSE:
- case SB_THREAT_TYPE_SAVED_PASSWORD_REUSE:
-#if BUILDFLAG(FULL_SAFE_BROWSING)
- return security_state::MALICIOUS_CONTENT_STATUS_SAVED_PASSWORD_REUSE;
-#endif
- case safe_browsing::SB_THREAT_TYPE_SIGNED_IN_SYNC_PASSWORD_REUSE:
- case SB_THREAT_TYPE_SIGNED_IN_SYNC_PASSWORD_REUSE:
-#if BUILDFLAG(FULL_SAFE_BROWSING)
- if (safe_browsing::ChromePasswordProtectionService::
- ShouldShowPasswordReusePageInfoBubble(
@@ -761,7 +763,7 @@
- }
-#endif
- [[fallthrough]];
- case safe_browsing::SB_THREAT_TYPE_SIGNED_IN_NON_SYNC_PASSWORD_REUSE:
- case SB_THREAT_TYPE_SIGNED_IN_NON_SYNC_PASSWORD_REUSE:
-#if BUILDFLAG(FULL_SAFE_BROWSING)
- if (safe_browsing::ChromePasswordProtectionService::
- ShouldShowPasswordReusePageInfoBubble(
@@ -771,7 +773,7 @@
- }
-#endif
- [[fallthrough]];
- case safe_browsing::SB_THREAT_TYPE_ENTERPRISE_PASSWORD_REUSE:
- case SB_THREAT_TYPE_ENTERPRISE_PASSWORD_REUSE:
-#if BUILDFLAG(FULL_SAFE_BROWSING)
- if (safe_browsing::ChromePasswordProtectionService::
- ShouldShowPasswordReusePageInfoBubble(
@@ -783,27 +785,26 @@
- // If user has already changed password or FULL_SAFE_BROWSING isn't
- // enabled, returns the regular social engineering content status.
- return security_state::MALICIOUS_CONTENT_STATUS_SOCIAL_ENGINEERING;
- case safe_browsing::SB_THREAT_TYPE_BILLING:
- case SB_THREAT_TYPE_BILLING:
- return security_state::MALICIOUS_CONTENT_STATUS_BILLING;
- case safe_browsing::SB_THREAT_TYPE_MANAGED_POLICY_BLOCK:
- case SB_THREAT_TYPE_MANAGED_POLICY_BLOCK:
- return security_state::MALICIOUS_CONTENT_STATUS_MANAGED_POLICY_BLOCK;
- case safe_browsing::SB_THREAT_TYPE_MANAGED_POLICY_WARN:
- case SB_THREAT_TYPE_MANAGED_POLICY_WARN:
- return security_state::MALICIOUS_CONTENT_STATUS_MANAGED_POLICY_WARN;
- case safe_browsing::
- DEPRECATED_SB_THREAT_TYPE_URL_PASSWORD_PROTECTION_PHISHING:
- case safe_browsing::DEPRECATED_SB_THREAT_TYPE_URL_CLIENT_SIDE_MALWARE:
- case safe_browsing::SB_THREAT_TYPE_URL_BINARY_MALWARE:
- case safe_browsing::SB_THREAT_TYPE_EXTENSION:
- case safe_browsing::SB_THREAT_TYPE_BLOCKLISTED_RESOURCE:
- case safe_browsing::SB_THREAT_TYPE_API_ABUSE:
- case safe_browsing::SB_THREAT_TYPE_SUBRESOURCE_FILTER:
- case safe_browsing::SB_THREAT_TYPE_CSD_ALLOWLIST:
- case safe_browsing::SB_THREAT_TYPE_AD_SAMPLE:
- case safe_browsing::SB_THREAT_TYPE_BLOCKED_AD_POPUP:
- case safe_browsing::SB_THREAT_TYPE_BLOCKED_AD_REDIRECT:
- case safe_browsing::SB_THREAT_TYPE_SUSPICIOUS_SITE:
- case safe_browsing::SB_THREAT_TYPE_APK_DOWNLOAD:
- case safe_browsing::SB_THREAT_TYPE_HIGH_CONFIDENCE_ALLOWLIST:
- case DEPRECATED_SB_THREAT_TYPE_URL_PASSWORD_PROTECTION_PHISHING:
- case DEPRECATED_SB_THREAT_TYPE_URL_CLIENT_SIDE_MALWARE:
- case SB_THREAT_TYPE_URL_BINARY_MALWARE:
- case SB_THREAT_TYPE_EXTENSION:
- case SB_THREAT_TYPE_BLOCKLISTED_RESOURCE:
- case SB_THREAT_TYPE_API_ABUSE:
- case SB_THREAT_TYPE_SUBRESOURCE_FILTER:
- case SB_THREAT_TYPE_CSD_ALLOWLIST:
- case SB_THREAT_TYPE_AD_SAMPLE:
- case SB_THREAT_TYPE_BLOCKED_AD_POPUP:
- case SB_THREAT_TYPE_BLOCKED_AD_REDIRECT:
- case SB_THREAT_TYPE_SUSPICIOUS_SITE:
- case SB_THREAT_TYPE_APK_DOWNLOAD:
- case SB_THREAT_TYPE_HIGH_CONFIDENCE_ALLOWLIST:
- // These threat types are not currently associated with
- // interstitials, and thus resources with these threat types are
- // not ever whitelisted or pending whitelisting.
@@ -816,7 +817,7 @@
--- a/chrome/browser/ui/BUILD.gn
+++ b/chrome/browser/ui/BUILD.gn
@@ -5195,7 +5195,6 @@ static_library("ui") {
@@ -5251,7 +5251,6 @@ static_library("ui") {
"views/download/bubble/download_dialog_view.h",
"views/download/bubble/download_toolbar_button_view.cc",
"views/download/bubble/download_toolbar_button_view.h",
@@ -859,7 +860,7 @@
#include "chrome/browser/download/download_history.h"
#include "chrome/browser/download/download_item_model.h"
#include "chrome/browser/download/download_item_warning_data.h"
@@ -280,13 +279,6 @@ void DownloadsDOMHandler::SaveDangerousR
@@ -287,13 +286,6 @@ void DownloadsDOMHandler::SaveDangerousR
}
CountDownloadsDOMEvents(DOWNLOADS_DOM_EVENT_SAVE_DANGEROUS);
@@ -873,7 +874,7 @@
}
// "Suspicious" in this context applies to insecure as well as dangerous
@@ -540,12 +532,6 @@ void DownloadsDOMHandler::RemoveDownload
@@ -558,12 +550,6 @@ void DownloadsDOMHandler::RemoveDownload
IdSet ids;
for (download::DownloadItem* download : to_remove) {
@@ -886,7 +887,7 @@
DownloadItemModel item_model(download);
if (!item_model.ShouldShowInShelf() ||
download->GetState() == download::DownloadItem::IN_PROGRESS) {
@@ -685,50 +671,6 @@ void DownloadsDOMHandler::FinalizeRemova
@@ -723,54 +709,6 @@ void DownloadsDOMHandler::FinalizeRemova
}
}
@@ -907,15 +908,19 @@
-void DownloadsDOMHandler::DangerPromptDone(
- int download_id,
- DownloadDangerPrompt::Action action) {
- if (action != DownloadDangerPrompt::ACCEPT)
- if (action != DownloadDangerPrompt::ACCEPT) {
- return;
- }
- download::DownloadItem* item = nullptr;
- if (GetMainNotifierManager())
- if (GetMainNotifierManager()) {
- item = GetMainNotifierManager()->GetDownload(download_id);
- if (!item && GetOriginalNotifierManager())
- }
- if (!item && GetOriginalNotifierManager()) {
- item = GetOriginalNotifierManager()->GetDownload(download_id);
- if (!item || item->IsDone())
- }
- if (!item || item->IsDone()) {
- return;
- }
- CountDownloadsDOMEvents(DOWNLOADS_DOM_EVENT_SAVE_DANGEROUS);
-
- // If a download is insecure, validate that first. Is most cases, insecure
@@ -936,7 +941,7 @@
-
bool DownloadsDOMHandler::IsDeletingHistoryAllowed() {
content::DownloadManager* manager = GetMainNotifierManager();
return manager &&
return manager && Profile::FromBrowserContext(manager->GetBrowserContext())
--- a/chrome/browser/ui/webui/downloads/downloads_dom_handler.h
+++ b/chrome/browser/ui/webui/downloads/downloads_dom_handler.h
@@ -12,7 +12,6 @@
@@ -947,7 +952,7 @@
#include "chrome/browser/ui/webui/downloads/downloads.mojom-forward.h"
#include "chrome/browser/ui/webui/downloads/downloads_list_tracker.h"
#include "content/public/browser/web_contents_observer.h"
@@ -102,18 +101,6 @@ class DownloadsDOMHandler : public conte
@@ -104,18 +103,6 @@ class DownloadsDOMHandler : public conte
// null-checking |original_notifier_|.
content::DownloadManager* GetOriginalNotifierManager() const;
@@ -1031,7 +1036,7 @@
- ui_manager->CreateBlockingPage(
- web_contents, main_frame_url, {resource},
- /*forward_extension_event=*/false,
- /*blocked_page_shown_timestamp=*/absl::nullopt));
- /*blocked_page_shown_timestamp=*/std::nullopt));
-}
-
std::unique_ptr<EnterpriseBlockPage> CreateEnterpriseBlockPage(
@@ -1167,7 +1172,7 @@
html = ui::ResourceBundle::GetSharedInstance().LoadDataResourceString(
--- a/chrome/renderer/chrome_content_renderer_client.cc
+++ b/chrome/renderer/chrome_content_renderer_client.cc
@@ -102,7 +102,6 @@
@@ -103,7 +103,6 @@
#include "components/pdf/common/constants.h"
#include "components/permissions/features.h"
#include "components/safe_browsing/buildflags.h"
@@ -1175,7 +1180,7 @@
#include "components/spellcheck/spellcheck_buildflags.h"
#include "components/subresource_filter/content/renderer/subresource_filter_agent.h"
#include "components/subresource_filter/content/renderer/unverified_ruleset_dealer.h"
@@ -458,12 +457,8 @@ void ChromeContentRendererClient::Render
@@ -467,12 +466,8 @@ void ChromeContentRendererClient::Render
subresource_filter_ruleset_dealer_ =
std::make_unique<subresource_filter::UnverifiedRulesetDealer>();

View File

@@ -1,6 +1,6 @@
--- a/net/dns/host_resolver_manager.cc
+++ b/net/dns/host_resolver_manager.cc
@@ -151,10 +151,10 @@ const size_t kMaxHostLength = 4096;
@@ -150,10 +150,10 @@ const size_t kMaxHostLength = 4096;
// cached.
const int kIPv6ProbePeriodMs = 1000;

View File

@@ -2,7 +2,7 @@
--- a/BUILD.gn
+++ b/BUILD.gn
@@ -460,14 +460,6 @@ group("gn_all") {
@@ -459,14 +459,6 @@ group("gn_all") {
deps += [ "//chromeos:chromeos_unittests" ]
}

View File

@@ -90,7 +90,7 @@ by default.
// once per machine.
--- a/chrome/browser/extensions/install_signer.cc
+++ b/chrome/browser/extensions/install_signer.cc
@@ -63,7 +63,7 @@ const int kSignatureFormatVersion = 2;
@@ -64,7 +64,7 @@ const int kSignatureFormatVersion = 2;
const size_t kSaltBytes = 32;
const char kBackendUrl[] =
@@ -378,9 +378,9 @@ by default.
const char kDefaultInsecureServerUrl[] =
"http://clientservices.googleapis.com/chrome-variations/seed";
--- a/content/browser/speech/speech_recognition_engine.cc
+++ b/content/browser/speech/speech_recognition_engine.cc
@@ -33,7 +33,7 @@ namespace content {
--- a/content/browser/speech/network_speech_recognition_engine_impl.cc
+++ b/content/browser/speech/network_speech_recognition_engine_impl.cc
@@ -34,7 +34,7 @@ namespace content {
namespace {
const char kWebServiceBaseUrl[] =
@@ -668,7 +668,7 @@ by default.
std::string MakeMCSEndpoint(const std::string& mcs_hostname, int port) {
--- a/remoting/protocol/jingle_messages.cc
+++ b/remoting/protocol/jingle_messages.cc
@@ -26,7 +26,7 @@ const char kJabberNamespace[] = "jabber:
@@ -28,7 +28,7 @@ const char kJabberNamespace[] = "jabber:
const char kJingleNamespace[] = "urn:xmpp:jingle:1";
// Namespace for transport messages when using standard ICE.

View File

@@ -56,7 +56,7 @@ the URL so we get notified if this happens again in the future).
IncidentReportingService::IncidentReportingService(
--- a/chrome/browser/safe_browsing/safe_browsing_service.cc
+++ b/chrome/browser/safe_browsing/safe_browsing_service.cc
@@ -322,7 +322,7 @@ SafeBrowsingUIManager* SafeBrowsingServi
@@ -333,7 +333,7 @@ SafeBrowsingUIManager* SafeBrowsingServi
}
void SafeBrowsingService::RegisterAllDelayedAnalysis() {

View File

@@ -28,7 +28,7 @@
// via the feature params.
--- a/chrome/browser/search/background/ntp_background_service.cc
+++ b/chrome/browser/search/background/ntp_background_service.cc
@@ -97,6 +97,7 @@ void NtpBackgroundService::Shutdown() {
@@ -99,6 +99,7 @@ void NtpBackgroundService::Shutdown() {
}
void NtpBackgroundService::FetchCollectionInfo() {

View File

@@ -60,7 +60,7 @@
return GURL(parts.scheme.is_valid() ? text : FixupPath(text));
--- a/content/browser/child_process_security_policy_impl.cc
+++ b/content/browser/child_process_security_policy_impl.cc
@@ -837,6 +837,7 @@ ChildProcessSecurityPolicyImpl::ChildPro
@@ -836,6 +836,7 @@ ChildProcessSecurityPolicyImpl::ChildPro
RegisterWebSafeScheme(url::kWssScheme);
#endif // BUILDFLAG(ENABLE_WEBSOCKETS)
RegisterWebSafeScheme(url::kDataScheme);
@@ -70,7 +70,7 @@
// other origins, so we should not treat them as web safe. Remove callers of
--- a/net/BUILD.gn
+++ b/net/BUILD.gn
@@ -981,6 +981,8 @@ component("net") {
@@ -988,6 +988,8 @@ component("net") {
"url_request/referrer_policy.h",
"url_request/static_http_user_agent_settings.cc",
"url_request/static_http_user_agent_settings.h",
@@ -204,15 +204,15 @@
const char kUuidInPackageScheme[] = "uuid-in-package";
--- a/url/url_constants.h
+++ b/url/url_constants.h
@@ -48,6 +48,8 @@ COMPONENT_EXPORT(URL) extern const char
COMPONENT_EXPORT(URL) extern const char16_t kMailToScheme16[];
COMPONENT_EXPORT(URL) extern const char kTelScheme[];
COMPONENT_EXPORT(URL) extern const char16_t kTelScheme16[];
+COMPONENT_EXPORT(URL) extern const char kTraceScheme[];
+COMPONENT_EXPORT(URL) extern const char16_t kTraceScheme16[];
COMPONENT_EXPORT(URL) extern const char kUrnScheme[];
COMPONENT_EXPORT(URL) extern const char16_t kUrnScheme16[];
COMPONENT_EXPORT(URL) extern const char kUuidInPackageScheme[];
@@ -45,6 +45,8 @@ inline constexpr char kMailToScheme[] =
inline constexpr char16_t kMailToScheme16[] = u"mailto";
inline constexpr char kTelScheme[] = "tel";
inline constexpr char16_t kTelScheme16[] = u"tel";
+inline constexpr char kTraceScheme[] = "trk";
+inline constexpr char16_t kTraceScheme16[] = u"trk";
inline constexpr char kUrnScheme[] = "urn";
inline constexpr char16_t kUrnScheme16[] = u"urn";
inline constexpr char kUuidInPackageScheme[] = "uuid-in-package";
--- a/url/url_util.cc
+++ b/url/url_util.cc
@@ -78,6 +78,7 @@ struct SchemeRegistry {

View File

@@ -2,7 +2,7 @@
--- a/chrome/browser/chrome_content_browser_client.cc
+++ b/chrome/browser/chrome_content_browser_client.cc
@@ -2501,24 +2501,6 @@ void ChromeContentBrowserClient::AppendE
@@ -2514,24 +2514,6 @@ void ChromeContentBrowserClient::AppendE
command_line->AppendSwitchASCII(switches::kMetricsClientID,
client_info->client_id);
}
@@ -29,7 +29,7 @@
if (logging::DialogsAreSuppressed())
--- a/components/crash/core/app/crashpad.cc
+++ b/components/crash/core/app/crashpad.cc
@@ -74,6 +74,12 @@ void InitializeDatabasePath(const base::
@@ -81,6 +81,12 @@ void InitializeDatabasePath(const base::
}
bool InitializeCrashpadImpl(bool initial_client,
@@ -44,7 +44,7 @@
const base::FilePath& exe_path,
--- a/components/gwp_asan/client/gwp_asan.cc
+++ b/components/gwp_asan/client/gwp_asan.cc
@@ -238,6 +238,11 @@ bool IsMutuallyExclusiveFeatureAllowed(c
@@ -239,6 +239,11 @@ bool IsMutuallyExclusiveFeatureAllowed(c
// Exported for testing.
GWP_ASAN_EXPORT std::optional<AllocatorSettings> GetAllocatorSettings(

View File

@@ -24,8 +24,8 @@
-
#if BUILDFLAG(ENABLE_BOUND_SESSION_CREDENTIALS)
#include "chrome/common/bound_session_request_throttled_handler.h"
#include "components/signin/public/base/signin_switches.h"
@@ -152,65 +148,6 @@ void GoogleURLLoaderThrottle::DetachFrom
#include "net/cookies/cookie_util.h"
@@ -148,66 +144,6 @@ void GoogleURLLoaderThrottle::DetachFrom
void GoogleURLLoaderThrottle::WillStartRequest(
network::ResourceRequest* request,
bool* defer) {
@@ -69,7 +69,8 @@
- is_main_frame_navigation_ =
- request->is_outermost_main_frame &&
- request->destination == network::mojom::RequestDestination::kDocument;
- if (switches::IsBoundSessionCredentialsEnabled() && request->SendsCookies()) {
- sends_cookies_ = request->SendsCookies();
- if (sends_cookies_) {
- RequestBoundSessionStatus status = GetRequestBoundSessionStatus(
- request->url, dynamic_params_->bound_session_throttler_params.get());
- if (IsCoveredRequestBoundSessionStatus(status)) {
@@ -91,7 +92,7 @@
}
void GoogleURLLoaderThrottle::WillRedirectRequest(
@@ -220,95 +157,12 @@ void GoogleURLLoaderThrottle::WillRedire
@@ -217,95 +153,12 @@ void GoogleURLLoaderThrottle::WillRedire
std::vector<std::string>* to_be_removed_headers,
net::HttpRequestHeaders* modified_headers,
net::HttpRequestHeaders* modified_cors_exempt_headers) {
@@ -127,7 +128,7 @@
- }
-#endif
-#if BUILDFLAG(ENABLE_BOUND_SESSION_CREDENTIALS)
- if (switches::IsBoundSessionCredentialsEnabled()) {
- if (sends_cookies_) {
- RequestBoundSessionStatus status = GetRequestBoundSessionStatus(
- redirect_info->new_url,
- dynamic_params_->bound_session_throttler_params.get());

View File

@@ -7,7 +7,7 @@
--- a/chrome/BUILD.gn
+++ b/chrome/BUILD.gn
@@ -364,7 +364,6 @@ if (!is_android && !is_mac) {
@@ -369,7 +369,6 @@ if (!is_android && !is_mac) {
}
data_deps += [
@@ -15,7 +15,7 @@
"//third_party/widevine/cdm",
]
if (invoker.collect_inputs_only) {
@@ -1210,7 +1209,6 @@ if (is_win) {
@@ -1215,7 +1214,6 @@ if (is_win) {
":optimization_guide_library",
":swiftshader_library",
":widevine_cdm_library",

View File

@@ -9,17 +9,6 @@
BASE_FEATURE(kAttributionReportingTriggerContextId,
"AttributionReportingTriggerContextId",
--- a/components/privacy_sandbox/privacy_sandbox_prefs.cc
+++ b/components/privacy_sandbox/privacy_sandbox_prefs.cc
@@ -12,7 +12,7 @@ namespace privacy_sandbox {
void RegisterProfilePrefs(PrefRegistrySimple* registry) {
registry->RegisterBooleanPref(
- prefs::kPrivacySandboxApisEnabled, true,
+ prefs::kPrivacySandboxApisEnabled, false,
user_prefs::PrefRegistrySyncable::SYNCABLE_PREF);
registry->RegisterBooleanPref(prefs::kPrivacySandboxM1ConsentDecisionMade,
false);
--- a/components/privacy_sandbox/privacy_sandbox_settings_impl.cc
+++ b/components/privacy_sandbox/privacy_sandbox_settings_impl.cc
@@ -123,7 +123,7 @@ std::set<browsing_topics::Topic> GetTopi

View File

@@ -116,7 +116,7 @@
--- a/chrome/browser/ui/browser_ui_prefs.cc
+++ b/chrome/browser/ui/browser_ui_prefs.cc
@@ -101,7 +101,7 @@ void RegisterBrowserUserPrefs(user_prefs
@@ -100,7 +100,7 @@ void RegisterBrowserUserPrefs(user_prefs
registry->RegisterStringPref(prefs::kWebRTCUDPPortRange, std::string());
registry->RegisterBooleanPref(prefs::kWebRtcEventLogCollectionAllowed, false);
registry->RegisterListPref(prefs::kWebRtcLocalIpsAllowedUrls);

View File

@@ -2,7 +2,7 @@
--- a/chrome/browser/extensions/chrome_content_browser_client_extensions_part.cc
+++ b/chrome/browser/extensions/chrome_content_browser_client_extensions_part.cc
@@ -725,12 +725,6 @@ std::vector<url::Origin> ChromeContentBr
@@ -707,12 +707,6 @@ std::vector<url::Origin> ChromeContentBr
GetOriginsRequiringDedicatedProcess() {
std::vector<url::Origin> list;
@@ -17,7 +17,7 @@
--- a/chrome/browser/extensions/chrome_content_verifier_delegate.cc
+++ b/chrome/browser/extensions/chrome_content_verifier_delegate.cc
@@ -285,17 +285,7 @@ bool ChromeContentVerifierDelegate::IsFr
@@ -303,17 +303,7 @@ bool ChromeContentVerifierDelegate::IsFr
// between which extensions are considered in-store.
// See https://crbug.com/766806 for details.
if (!InstallVerifier::IsFromStore(extension, context_)) {

View File

@@ -1,6 +1,6 @@
--- a/chrome/common/chrome_features.cc
+++ b/chrome/common/chrome_features.cc
@@ -382,12 +382,7 @@ BASE_FEATURE(kDisruptiveNotificationPerm
@@ -363,12 +363,7 @@ BASE_FEATURE(kDisruptiveNotificationPerm
// Enable DNS over HTTPS (DoH).
BASE_FEATURE(kDnsOverHttps,
"DnsOverHttps",

View File

@@ -3,7 +3,7 @@
--- a/chrome/BUILD.gn
+++ b/chrome/BUILD.gn
@@ -929,8 +929,6 @@ if (is_win) {
@@ -934,8 +934,6 @@ if (is_win) {
bundle_data("chrome_framework_resources") {
sources = [
@@ -14,7 +14,7 @@
# from disk image and Keystone promotion (if so enabled). It
--- a/chrome/browser/BUILD.gn
+++ b/chrome/browser/BUILD.gn
@@ -851,10 +851,6 @@ static_library("browser") {
@@ -847,10 +847,6 @@ static_library("browser") {
"navigation_predictor/navigation_predictor_metrics_document_data.h",
"navigation_predictor/navigation_predictor_preconnect_client.cc",
"navigation_predictor/navigation_predictor_preconnect_client.h",
@@ -25,7 +25,7 @@
"navigation_predictor/search_engine_preconnector.cc",
"navigation_predictor/search_engine_preconnector.h",
"net/chrome_mojo_proxy_resolver_factory.cc",
@@ -965,10 +961,6 @@ static_library("browser") {
@@ -963,10 +959,6 @@ static_library("browser") {
"optimization_guide/chrome_prediction_model_store.h",
"optimization_guide/model_execution/chrome_on_device_model_service_controller.cc",
"optimization_guide/model_execution/chrome_on_device_model_service_controller.h",
@@ -38,7 +38,7 @@
"optimization_guide/optimization_guide_keyed_service.cc",
--- a/chrome/browser/navigation_predictor/navigation_predictor.cc
+++ b/chrome/browser/navigation_predictor/navigation_predictor.cc
@@ -17,8 +17,6 @@
@@ -18,8 +18,6 @@
#include "base/time/default_tick_clock.h"
#include "chrome/browser/navigation_predictor/navigation_predictor_keyed_service.h"
#include "chrome/browser/navigation_predictor/navigation_predictor_keyed_service_factory.h"
@@ -47,7 +47,7 @@
#include "chrome/browser/preloading/prefetch/no_state_prefetch/no_state_prefetch_manager_factory.h"
#include "chrome/browser/preloading/preloading_prefs.h"
#include "chrome/browser/profiles/profile.h"
@@ -93,11 +91,6 @@ base::TimeDelta MLModelExecutionTimerSta
@@ -95,11 +93,6 @@ base::TimeDelta MLModelExecutionTimerSta
return base::Milliseconds(timer_start_delay);
}
@@ -57,9 +57,9 @@
- return base::Milliseconds(timer_interval);
-}
} // namespace
@@ -317,69 +310,6 @@ void NavigationPredictor::ProcessPointer
bool MaySendTraffic() {
// TODO(b/290223353): Due to concerns about the amount of traffic this feature
@@ -363,69 +356,6 @@ void NavigationPredictor::ProcessPointer
}
void NavigationPredictor::OnMLModelExecutionTimerFired() {
@@ -131,7 +131,7 @@
void NavigationPredictor::SetModelScoreCallbackForTesting(
--- a/chrome/browser/profiles/chrome_browser_main_extra_parts_profiles.cc
+++ b/chrome/browser/profiles/chrome_browser_main_extra_parts_profiles.cc
@@ -92,7 +92,6 @@
@@ -93,7 +93,6 @@
#include "chrome/browser/media_galleries/media_galleries_preferences_factory.h"
#include "chrome/browser/metrics/variations/google_groups_updater_service_factory.h"
#include "chrome/browser/navigation_predictor/navigation_predictor_keyed_service_factory.h"
@@ -139,7 +139,7 @@
#include "chrome/browser/net/dns_probe_service_factory.h"
#include "chrome/browser/net/profile_network_context_service_factory.h"
#include "chrome/browser/notifications/metrics/notification_metrics_logger_factory.h"
@@ -919,7 +918,6 @@ void ChromeBrowserMainExtraPartsProfiles
@@ -933,7 +932,6 @@ void ChromeBrowserMainExtraPartsProfiles
#endif
ModelTypeStoreServiceFactory::GetInstance();
NavigationPredictorKeyedServiceFactory::GetInstance();
@@ -147,7 +147,7 @@
#if BUILDFLAG(IS_CHROMEOS_ASH)
NearbySharingServiceFactory::GetInstance();
if (base::FeatureList::IsEnabled(ash::features::kNearbyPresence)) {
@@ -966,9 +964,6 @@ void ChromeBrowserMainExtraPartsProfiles
@@ -980,9 +978,6 @@ void ChromeBrowserMainExtraPartsProfiles
}
#endif
OpenerHeuristicServiceFactory::GetInstance();
@@ -167,7 +167,7 @@
#include "chrome/browser/permissions/adaptive_quiet_notification_permission_ui_enabler.h"
#include "chrome/browser/prefs/incognito_mode_prefs.h"
#include "chrome/browser/profiles/delete_profile_helper.h"
@@ -1550,9 +1549,6 @@ void ProfileManager::DoFinalInitForServi
@@ -1545,9 +1544,6 @@ void ProfileManager::DoFinalInitForServi
// Ensure NavigationPredictorKeyedService is started.
NavigationPredictorKeyedServiceFactory::GetForProfile(profile);
@@ -188,58 +188,6 @@
}
// </if>
--- a/chrome/browser/ui/webui/omnibox/omnibox_page_handler.cc
+++ b/chrome/browser/ui/webui/omnibox/omnibox_page_handler.cc
@@ -39,7 +39,6 @@
#include "components/omnibox/browser/autocomplete_match.h"
#include "components/omnibox/browser/autocomplete_provider.h"
#include "components/omnibox/browser/autocomplete_result.h"
-#include "components/omnibox/browser/autocomplete_scoring_model_service.h"
#include "components/omnibox/browser/omnibox_field_trial.h"
#include "components/search_engines/template_url.h"
#include "content/public/browser/web_ui.h"
@@ -498,31 +497,12 @@ void OmniboxPageHandler::StartOmniboxQue
}
void OmniboxPageHandler::GetMlModelVersion(GetMlModelVersionCallback callback) {
- if (auto* service = GetMlService()) {
- auto version = service->GetModelVersion();
- if (version == -1) {
- service->AddOnModelUpdatedCallback(
- base::BindOnce(&OmniboxPageHandler::GetMlModelVersion,
- weak_factory_.GetWeakPtr(), std::move(callback)));
- } else {
- std::move(callback).Run(version);
- }
- } else {
std::move(callback).Run(-1);
- }
}
void OmniboxPageHandler::StartMl(mojom::SignalsPtr mojom_signals,
StartMlCallback callback) {
- if (auto* service = GetMlService()) {
- AutocompleteMatch::ScoringSignals signals =
- mojo::ConvertTo<AutocompleteMatch::ScoringSignals>(mojom_signals);
- std::vector<AutocompleteScoringModelService::Result> result =
- service->BatchScoreAutocompleteUrlMatchesSync({&signals});
- std::move(callback).Run(result.size() ? result[0].value_or(-1) : -1);
- } else {
std::move(callback).Run(-1);
- }
}
std::unique_ptr<AutocompleteController> OmniboxPageHandler::CreateController(
@@ -547,8 +527,5 @@ OmniboxPageHandler::GetAutocompleteContr
}
AutocompleteScoringModelService* OmniboxPageHandler::GetMlService() {
- return OmniboxFieldTrial::IsMlUrlScoringEnabled()
- ? AutocompleteScoringModelServiceFactory::GetInstance()
- ->GetForProfile(profile_)
- : nullptr;
+ return nullptr;
}
--- a/chrome/browser/ui/webui/settings/accessibility_main_handler.cc
+++ b/chrome/browser/ui/webui/settings/accessibility_main_handler.cc
@@ -39,13 +39,6 @@ void AccessibilityMainHandler::RegisterM
@@ -370,7 +318,7 @@
#include "chrome/browser/ui/browser.h"
#include "chrome/browser/ui/browser_finder.h"
#include "chrome/browser/ui/views/side_panel/read_anything/read_anything_controller.h"
@@ -204,15 +202,6 @@ ReadAnythingUntrustedPageHandler::ReadAn
@@ -206,15 +204,6 @@ ReadAnythingUntrustedPageHandler::ReadAn
highlightGranularity);
}
@@ -386,25 +334,9 @@
OnActiveWebContentsChanged();
}
--- a/chrome/test/BUILD.gn
+++ b/chrome/test/BUILD.gn
@@ -3107,13 +3107,6 @@ if (!is_android) {
"//pdf/loader",
]
- # Add a data dependency for pdf_extension_accessibility_test.cc to notify
- # testing builders that this test needs this library, which will need to
- # be downloaded from CIPD as defined in //DEPS.
- if (is_linux || is_mac) {
- data_deps += [ "//third_party/screen-ai:screen_ai" ]
- }
-
if (enable_printing) {
sources += [ "../browser/pdf/pdf_extension_printing_test.cc" ]
--- a/chrome/test/chromedriver/BUILD.gn
+++ b/chrome/test/chromedriver/BUILD.gn
@@ -398,7 +398,7 @@ source_set("lib") {
@@ -407,7 +407,7 @@ source_set("lib") {
}
}
@@ -425,7 +357,7 @@
python_library("fixtures") {
--- a/components/omnibox/browser/autocomplete_classifier.cc
+++ b/components/omnibox/browser/autocomplete_classifier.cc
@@ -97,8 +97,6 @@ void AutocompleteClassifier::Classify(
@@ -99,8 +99,6 @@ void AutocompleteClassifier::Classify(
metrics::OmniboxEventProto::PageClassification page_classification,
AutocompleteMatch* match,
GURL* alternate_nav_url) {
@@ -434,34 +366,6 @@
DCHECK(!inside_classify_);
base::AutoReset<bool> reset(&inside_classify_, true);
AutocompleteInput input(text, page_classification, *scheme_classifier_);
--- a/components/omnibox/browser/autocomplete_controller.cc
+++ b/components/omnibox/browser/autocomplete_controller.cc
@@ -46,7 +46,6 @@
#include "components/omnibox/browser/autocomplete_match_type.h"
#include "components/omnibox/browser/autocomplete_provider.h"
#include "components/omnibox/browser/autocomplete_provider_client.h"
-#include "components/omnibox/browser/autocomplete_scoring_model_service.h"
#include "components/omnibox/browser/autocomplete_scoring_signals_annotator.h"
#include "components/omnibox/browser/bookmark_provider.h"
#include "components/omnibox/browser/bookmark_scoring_signals_annotator.h"
--- a/components/services/screen_ai/buildflags/features.gni
+++ b/components/services/screen_ai/buildflags/features.gni
@@ -8,12 +8,12 @@ import("//build/config/sanitizers/saniti
declare_args() {
# Screen AI service is only supported on desktop platforms.
- enable_screen_ai_service = is_linux || is_mac || is_chromeos || is_win
+ enable_screen_ai_service = false
# Screen AI library is not yet available for browser tests on Windows and
# ChromeOS.
- enable_screen_ai_browsertests = is_linux || is_mac
+ enable_screen_ai_browsertests = false
# Screen AI library is not available for MSAN and UBSAN.
- use_fake_screen_ai = is_msan || is_ubsan || is_ubsan_vptr || is_ubsan_security
+ use_fake_screen_ai = false
}
--- a/components/update_client/BUILD.gn
+++ b/components/update_client/BUILD.gn
@@ -312,8 +312,6 @@ source_set("unit_tests") {
@@ -475,7 +379,7 @@
fuzzer_test("update_client_protocol_serializer_fuzzer") {
--- a/content/shell/BUILD.gn
+++ b/content/shell/BUILD.gn
@@ -736,10 +736,6 @@ if (is_apple) {
@@ -773,10 +773,6 @@ if (is_apple) {
deps = [ "//third_party/icu:icudata" ]
}
@@ -486,9 +390,29 @@
if (v8_use_external_startup_data) {
public_deps += [ "//v8" ]
if (use_v8_context_snapshot) {
--- a/services/screen_ai/buildflags/features.gni
+++ b/services/screen_ai/buildflags/features.gni
@@ -7,14 +7,13 @@ import("//build/config/sanitizers/saniti
declare_args() {
# Screen AI service is only supported on desktop platforms.
- enable_screen_ai_service = is_linux || is_mac || is_chromeos || is_win
+ enable_screen_ai_service = false
# Screen AI library is not yet available for browser tests on ChromeOS.
# TODO(b/40267312): Expand this browser test for all supported targets.
enable_screen_ai_browsertests =
- is_linux || (is_mac && (target_cpu == "arm64" || target_cpu == "x64")) ||
- (is_win && (target_cpu == "x64" || target_cpu == "x86"))
+ false
# Screen AI library is not available for MSAN and UBSAN.
- use_fake_screen_ai = is_msan || is_ubsan || is_ubsan_vptr || is_ubsan_security
+ use_fake_screen_ai = false
}
--- a/third_party/devtools-frontend/src/BUILD.gn
+++ b/third_party/devtools-frontend/src/BUILD.gn
@@ -13,7 +13,6 @@ import("./third_party/blink/public/publi
@@ -14,7 +14,6 @@ import("./third_party/typescript/typescr
devtools_frontend_resources_deps = [
"front_end",
@@ -496,6 +420,16 @@
]
group("devtools_all_files") {
--- a/third_party/devtools-frontend/src/front_end/BUILD.gn
+++ b/third_party/devtools-frontend/src/front_end/BUILD.gn
@@ -185,7 +185,6 @@ group("unittests") {
"panels/sources/components:unittests",
"panels/timeline:unittests",
"panels/timeline/components:unittests",
- "panels/timeline/fixtures/traces",
"panels/timeline/track_appenders:unittests",
"panels/utils:unittests",
"panels/web_audio:unittests",
--- a/third_party/puffin/BUILD.gn
+++ b/third_party/puffin/BUILD.gn
@@ -115,7 +115,6 @@ executable("puffin_unittest") {

View File

@@ -2,7 +2,7 @@
--- a/chrome/browser/BUILD.gn
+++ b/chrome/browser/BUILD.gn
@@ -631,8 +631,6 @@ static_library("browser") {
@@ -635,8 +635,6 @@ static_library("browser") {
"internal_auth.h",
"interstitials/chrome_settings_page_helper.cc",
"interstitials/chrome_settings_page_helper.h",
@@ -10,8 +10,8 @@
- "interstitials/enterprise_util.h",
"invalidation/profile_invalidation_provider_factory.cc",
"invalidation/profile_invalidation_provider_factory.h",
"ip_protection/ip_protection_config_http.cc",
@@ -3779,9 +3777,6 @@ static_library("browser") {
"k_anonymity_service/k_anonymity_service_client.cc",
@@ -3787,9 +3785,6 @@ static_library("browser") {
"enterprise/connectors/analysis/analysis_service_settings.h",
"enterprise/connectors/analysis/analysis_settings.cc",
"enterprise/connectors/analysis/analysis_settings.h",
@@ -21,7 +21,7 @@
"enterprise/connectors/analysis/content_analysis_dialog.cc",
"enterprise/connectors/analysis/content_analysis_dialog.h",
"enterprise/connectors/analysis/content_analysis_downloads_delegate.cc",
@@ -4088,10 +4083,6 @@ static_library("browser") {
@@ -4098,10 +4093,6 @@ static_library("browser") {
"new_tab_page/modules/recipes/recipes_service_factory.h",
"new_tab_page/modules/recipes/time_format_util.cc",
"new_tab_page/modules/recipes/time_format_util.h",
@@ -32,7 +32,7 @@
"new_tab_page/modules/v2/history_clusters/history_clusters_page_handler_v2.cc",
"new_tab_page/modules/v2/history_clusters/history_clusters_page_handler_v2.h",
"new_tab_page/modules/v2/tab_resumption/tab_resumption_page_handler.cc",
@@ -4569,7 +4560,6 @@ static_library("browser") {
@@ -4579,7 +4570,6 @@ static_library("browser") {
"//chrome/browser/new_tab_page/modules/history_clusters/discount:mojo_bindings",
"//chrome/browser/new_tab_page/modules/photos:mojo_bindings",
"//chrome/browser/new_tab_page/modules/recipes:mojo_bindings",
@@ -40,7 +40,7 @@
"//chrome/browser/new_tab_page/modules/v2/history_clusters:mojo_bindings",
"//chrome/browser/new_tab_page/modules/v2/tab_resumption:mojo_bindings",
"//chrome/browser/policy:path_parser",
@@ -6392,10 +6382,6 @@ static_library("browser") {
@@ -6421,10 +6411,6 @@ static_library("browser") {
sources += [
"enterprise/chrome_browser_main_extra_parts_enterprise.cc",
"enterprise/chrome_browser_main_extra_parts_enterprise.h",
@@ -51,7 +51,7 @@
"enterprise/connectors/device_trust/attestation/browser/attestation_switches.cc",
"enterprise/connectors/device_trust/attestation/browser/attestation_switches.h",
"enterprise/connectors/device_trust/attestation/browser/attester.h",
@@ -7948,9 +7934,14 @@ static_library("browser") {
@@ -7990,9 +7976,14 @@ static_library("browser") {
"//components/safe_browsing/content/browser:safe_browsing_blocking_page",
"//components/safe_browsing/content/browser/download:download_stats",
"//components/safe_browsing/content/common:file_type_policies",
@@ -69,7 +69,7 @@
sources += [
--- a/chrome/browser/chrome_content_browser_client.cc
+++ b/chrome/browser/chrome_content_browser_client.cc
@@ -5076,11 +5076,13 @@ ChromeContentBrowserClient::CreateThrott
@@ -5124,11 +5124,13 @@ ChromeContentBrowserClient::CreateThrott
&throttles);
#endif
@@ -83,9 +83,9 @@
#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX)
MaybeAddThrottle(browser_switcher::BrowserSwitcherNavigationThrottle::
@@ -6903,26 +6905,7 @@ ChromeContentBrowserClient::GetSafeBrows
? content::BrowserThread::UI
: content::BrowserThread::IO);
@@ -6957,26 +6959,7 @@ ChromeContentBrowserClient::GetSafeBrows
const std::vector<std::string>& allowlist_domains) {
DCHECK_CURRENTLY_ON(content::BrowserThread::UI);
- // Should not bypass safe browsing check if the check is for enterprise
- // lookup.
@@ -111,7 +111,7 @@
}
safe_browsing::RealTimeUrlLookupServiceBase*
@@ -6943,11 +6926,6 @@ ChromeContentBrowserClient::GetUrlLookup
@@ -6997,11 +6980,6 @@ ChromeContentBrowserClient::GetUrlLookup
GetForProfile(profile);
}
#endif
@@ -123,7 +123,7 @@
return nullptr;
}
@@ -6959,32 +6937,7 @@ ChromeContentBrowserClient::GetAsyncChec
@@ -7013,32 +6991,7 @@ ChromeContentBrowserClient::GetAsyncChec
safe_browsing::hash_realtime_utils::HashRealTimeSelection
hash_realtime_selection,
int frame_tree_node_id) {
@@ -198,7 +198,7 @@
RetryDownload(model.get(), command);
--- a/chrome/browser/download/chrome_download_manager_delegate.cc
+++ b/chrome/browser/download/chrome_download_manager_delegate.cc
@@ -148,7 +148,6 @@ using content::DownloadManager;
@@ -149,7 +149,6 @@ using content::DownloadManager;
using download::DownloadItem;
using download::DownloadPathReservationTracker;
using download::PathValidationResult;
@@ -206,7 +206,7 @@
using ConnectionType = net::NetworkChangeNotifier::ConnectionType;
#if BUILDFLAG(FULL_SAFE_BROWSING)
@@ -642,15 +641,6 @@ bool ChromeDownloadManagerDelegate::Shou
@@ -645,15 +644,6 @@ bool ChromeDownloadManagerDelegate::Shou
#endif
bool should_open = download_prefs_->IsAutoOpenEnabled(url, path);
@@ -222,7 +222,7 @@
return should_open;
}
@@ -1607,7 +1597,6 @@ void ChromeDownloadManagerDelegate::OnDo
@@ -1633,7 +1623,6 @@ void ChromeDownloadManagerDelegate::OnDo
DownloadItemModel model(item);
model.DetermineAndSetShouldPreferOpeningInBrowser(
target_info.target_path, target_info.is_filetype_handled_safely);
@@ -230,7 +230,7 @@
}
if (ShouldBlockFile(item, target_info.danger_type)) {
MaybeReportDangerousDownloadBlocked(
@@ -1688,59 +1677,6 @@ bool ChromeDownloadManagerDelegate::IsOp
@@ -1714,59 +1703,6 @@ bool ChromeDownloadManagerDelegate::IsOp
bool ChromeDownloadManagerDelegate::ShouldBlockFile(
download::DownloadItem* item,
download::DownloadDangerType danger_type) const {
@@ -290,7 +290,7 @@
return false;
}
@@ -1755,7 +1691,6 @@ void ChromeDownloadManagerDelegate::Mayb
@@ -1781,7 +1717,6 @@ void ChromeDownloadManagerDelegate::Mayb
service->MaybeSendDangerousDownloadOpenedReport(download,
show_download_in_folder);
}
@@ -298,7 +298,7 @@
if (!download->GetAutoOpened()) {
download::DownloadContent download_content =
download::DownloadContentFromMimeType(download->GetMimeType(), false);
@@ -1763,6 +1698,7 @@ void ChromeDownloadManagerDelegate::Mayb
@@ -1789,6 +1724,7 @@ void ChromeDownloadManagerDelegate::Mayb
download->GetDangerType(), download_content, base::Time::Now(),
download->GetEndTime(), show_download_in_folder);
}
@@ -306,7 +306,7 @@
}
void ChromeDownloadManagerDelegate::CheckDownloadAllowed(
@@ -1820,8 +1756,7 @@ void ChromeDownloadManagerDelegate::Chec
@@ -1846,8 +1782,7 @@ void ChromeDownloadManagerDelegate::Chec
DCHECK(download_item);
DCHECK(download_item->IsSavePackageDownload());
@@ -318,7 +318,7 @@
--- a/chrome/browser/download/download_item_model.cc
+++ b/chrome/browser/download/download_item_model.cc
@@ -903,30 +903,6 @@ void DownloadItemModel::ExecuteCommand(D
@@ -910,30 +910,6 @@ void DownloadItemModel::ExecuteCommand(D
}
TailoredWarningType DownloadItemModel::GetTailoredWarningType() const {
@@ -359,7 +359,7 @@
#include "components/safe_browsing/content/browser/download/download_stats.h"
void RecordDownloadSource(ChromeDownloadSource source) {
@@ -32,9 +33,6 @@ void MaybeRecordDangerousDownloadWarning
@@ -33,9 +34,6 @@ void MaybeRecordDangerousDownloadWarning
base::UmaHistogramEnumeration("SBClientDownload.TailoredWarningType",
model.GetTailoredWarningType());
#endif // BUILDFLAG(IS_ANDROID)
@@ -371,7 +371,7 @@
}
--- a/chrome/browser/download/download_target_determiner.cc
+++ b/chrome/browser/download/download_target_determiner.cc
@@ -999,12 +999,6 @@ void DownloadTargetDeterminer::CheckVisi
@@ -1003,12 +1003,6 @@ void DownloadTargetDeterminer::CheckVisi
bool visited_referrer_before) {
DCHECK_CURRENTLY_ON(BrowserThread::UI);
DCHECK_EQ(STATE_DETERMINE_INTERMEDIATE_PATH, next_state_);
@@ -384,7 +384,7 @@
danger_level_ = GetDangerLevel(
visited_referrer_before ? VISITED_REFERRER : NO_VISITS_TO_REFERRER);
if (danger_level_ != DownloadFileType::NOT_DANGEROUS &&
@@ -1285,14 +1279,7 @@ DownloadFileType::DangerLevel DownloadTa
@@ -1289,14 +1283,7 @@ DownloadFileType::DangerLevel DownloadTa
std::optional<base::Time>
DownloadTargetDeterminer::GetLastDownloadBypassTimestamp() const {
@@ -424,7 +424,7 @@
-#include "chrome/browser/safe_browsing/download_protection/check_client_download_request.h"
#include "chrome/grit/generated_resources.h"
#include "components/enterprise/buildflags/buildflags.h"
#include "components/enterprise/common/proto/connectors.pb.h"
#include "components/enterprise/common/files_scan_data.h"
--- a/chrome/browser/enterprise/connectors/analysis/content_analysis_downloads_delegate.cc
+++ b/chrome/browser/enterprise/connectors/analysis/content_analysis_downloads_delegate.cc
@@ -119,7 +119,7 @@ ContentAnalysisDownloadsDelegate::GetCus
@@ -522,7 +522,7 @@
void OnGotFileInfo(
--- a/chrome/browser/enterprise/connectors/connectors_service.cc
+++ b/chrome/browser/enterprise/connectors/connectors_service.cc
@@ -450,19 +450,6 @@ std::optional<std::string> ConnectorsSer
@@ -452,37 +452,8 @@ std::optional<std::string> ConnectorsSer
return std::nullopt;
}
@@ -539,9 +539,27 @@
- prefs::kSafeBrowsingEnterpriseRealTimeUrlCheckMode));
-}
-
ConnectorsManager* ConnectorsService::ConnectorsManagerForTesting() {
return connectors_manager_.get();
std::string ConnectorsService::GetRealTimeUrlCheckIdentifier() const {
- auto dm_token =
- GetDmToken(prefs::kSafeBrowsingEnterpriseRealTimeUrlCheckScope);
- if (!dm_token) {
return std::string();
- }
-
- Profile* profile = Profile::FromBrowserContext(context_);
- if (dm_token->scope == policy::POLICY_SCOPE_MACHINE) {
- return GetClientId(profile);
- }
-
- auto* identity_manager = IdentityManagerFactory::GetForProfile(profile);
- if (!identity_manager) {
- return std::string();
- }
-
- return safe_browsing::GetProfileEmail(identity_manager);
}
ConnectorsManager* ConnectorsService::ConnectorsManagerForTesting() {
--- a/chrome/browser/enterprise/connectors/connectors_service.h
+++ b/chrome/browser/enterprise/connectors/connectors_service.h
@@ -88,12 +88,6 @@ class ConnectorsService : public KeyedSe
@@ -554,9 +572,9 @@
- safe_browsing::EnterpriseRealTimeUrlCheckMode GetAppliedRealTimeUrlCheck()
- const;
-
// Returns the CBCM domain or profile domain that enables connector policies.
// If both set Connector policies, the CBCM domain is returned as it has
// precedence.
// Returns the profile email if real-time URL check is set for the profile,
// the device ID if it is set for the device, or an empty string if it is
// unset.
--- a/chrome/browser/enterprise/connectors/device_trust/key_management/core/network/BUILD.gn
+++ b/chrome/browser/enterprise/connectors/device_trust/key_management/core/network/BUILD.gn
@@ -35,7 +35,6 @@ source_set("network") {
@@ -614,7 +632,7 @@
signals.Set(device_signals::names::kBuiltInDnsClientEnabled,
--- a/chrome/browser/enterprise/connectors/reporting/realtime_reporting_client.cc
+++ b/chrome/browser/enterprise/connectors/reporting/realtime_reporting_client.cc
@@ -507,8 +507,7 @@ void RealtimeReportingClient::ReportEven
@@ -500,8 +500,7 @@ void RealtimeReportingClient::ReportEven
}
std::string RealtimeReportingClient::GetProfileUserName() const {
@@ -643,6 +661,61 @@
}
const base::Value::List* enabled_opt_in_events_value =
--- a/chrome/browser/enterprise/data_protection/data_protection_navigation_observer.cc
+++ b/chrome/browser/enterprise/data_protection/data_protection_navigation_observer.cc
@@ -49,20 +49,6 @@ void RunPendingNavigationCallback(
auto* user_data = GetUserData(web_contents);
DCHECK(user_data);
- // TODO: Move this logic out of this class and into DataProtectionPageUserData
- if (!user_data->watermark_text().empty() && user_data->rt_lookup_response() &&
- !user_data->rt_lookup_response()->threat_info().empty() &&
- user_data->rt_lookup_response()->threat_info(0).verdict_type() ==
- safe_browsing::RTLookupResponse::ThreatInfo::SAFE) {
- // For warn/block+watermark verdicts, a security event is reported as part
- // of the interstitial page appearing. For SAFE verdicts no interstitial is
- // shown, so the report indicating a watermark was shown to the user must be
- // done separately here.
- MaybeTriggerUrlFilteringInterstitialEvent(
- web_contents, web_contents->GetLastCommittedURL(),
- /*threat_type=*/"", *user_data->rt_lookup_response());
- }
-
std::move(callback).Run(user_data->watermark_text());
}
@@ -218,16 +204,6 @@ void DataProtectionNavigationObserver::C
std::move(callback).Run(std::string());
return;
}
-
- // GetForProfile() return nullptr if enterprise policies are not set.
- auto* lookup_service = safe_browsing::
- ChromeEnterpriseRealTimeUrlLookupServiceFactory::GetForProfile(profile);
- if (lookup_service) {
- enterprise_data_protection::DataProtectionNavigationObserver::
- CreateForNavigationHandle(*navigation_handle, lookup_service,
- navigation_handle->GetWebContents(),
- std::move(callback));
- }
}
// static
@@ -245,14 +221,7 @@ void DataProtectionNavigationObserver::G
return;
}
- auto* lookup_service = safe_browsing::
- ChromeEnterpriseRealTimeUrlLookupServiceFactory::GetForProfile(profile);
- if (lookup_service && web_contents->GetLastCommittedURL().is_valid()) {
- DoStringLookup(lookup_service, web_contents->GetLastCommittedURL(),
- GetIdentifier(profile), std::move(callback), web_contents);
- } else {
std::move(callback).Run(std::string());
- }
}
DataProtectionNavigationObserver::DataProtectionNavigationObserver(
--- a/chrome/browser/enterprise/signals/context_info_fetcher.cc
+++ b/chrome/browser/enterprise/signals/context_info_fetcher.cc
@@ -221,7 +221,6 @@ void ContextInfoFetcher::Fetch(ContextIn
@@ -751,7 +824,7 @@
} // namespace utils
--- a/chrome/browser/extensions/BUILD.gn
+++ b/chrome/browser/extensions/BUILD.gn
@@ -305,10 +305,6 @@ static_library("extensions") {
@@ -313,10 +313,6 @@ static_library("extensions") {
"api/runtime/chrome_runtime_api_delegate.h",
"api/safe_browsing_private/safe_browsing_private_api.cc",
"api/safe_browsing_private/safe_browsing_private_api.h",
@@ -762,7 +835,7 @@
"api/safe_browsing_private/safe_browsing_util.cc",
"api/safe_browsing_private/safe_browsing_util.h",
"api/search/search_api.cc",
@@ -647,8 +643,6 @@ static_library("extensions") {
@@ -655,8 +651,6 @@ static_library("extensions") {
"menu_manager_factory.h",
"navigation_extension_enabler.cc",
"navigation_extension_enabler.h",
@@ -773,7 +846,7 @@
"pending_extension_info.cc",
--- a/chrome/browser/extensions/api/api_browser_context_keyed_service_factories.cc
+++ b/chrome/browser/extensions/api/api_browser_context_keyed_service_factories.cc
@@ -122,7 +122,6 @@ void EnsureApiBrowserContextKeyedService
@@ -123,7 +123,6 @@ void EnsureApiBrowserContextKeyedService
#endif
extensions::ProcessesAPI::GetFactoryInstance();
extensions::ReadingListEventRouter::GetFactoryInstance();
@@ -849,7 +922,7 @@
info.enterprise_profile_id = signals.enterprise_profile_id;
--- a/chrome/browser/extensions/api/settings_private/prefs_util.cc
+++ b/chrome/browser/extensions/api/settings_private/prefs_util.cc
@@ -342,8 +342,6 @@ const PrefsUtil::TypedPrefMap& PrefsUtil
@@ -341,8 +341,6 @@ const PrefsUtil::TypedPrefMap& PrefsUtil
settings_api::PrefType::kBoolean;
(*s_allowlist)[::kGeneratedHttpsFirstModePref] =
settings_api::PrefType::kNumber;
@@ -892,7 +965,7 @@
} // namespace
--- a/chrome/browser/extensions/blocklist.cc
+++ b/chrome/browser/extensions/blocklist.cc
@@ -204,20 +204,8 @@ Blocklist* Blocklist::Get(content::Brows
@@ -185,20 +185,8 @@ Blocklist* Blocklist::Get(content::Brows
void Blocklist::GetBlocklistedIDs(const std::set<ExtensionId>& ids,
GetBlocklistedIDsCallback callback) {
DCHECK_CURRENTLY_ON(BrowserThread::UI);
@@ -915,7 +988,7 @@
void Blocklist::GetMalwareIDs(const std::set<ExtensionId>& ids,
--- a/chrome/browser/extensions/chrome_extensions_browser_client.cc
+++ b/chrome/browser/extensions/chrome_extensions_browser_client.cc
@@ -749,81 +749,23 @@ void ChromeExtensionsBrowserClient::Noti
@@ -794,81 +794,23 @@ void ChromeExtensionsBrowserClient::Noti
content::BrowserContext* context,
const ExtensionId& extension_id,
const std::string& code) const {
@@ -998,7 +1071,7 @@
}
// static
@@ -992,7 +934,6 @@ void ChromeExtensionsBrowserClient::GetW
@@ -1037,7 +979,6 @@ void ChromeExtensionsBrowserClient::GetW
void ChromeExtensionsBrowserClient::CreatePasswordReuseDetectionManager(
content::WebContents* web_contents) const {
@@ -1023,8 +1096,16 @@
- OnBlocklistStateAdded(extension_id);
}
void ExtensionService::GreylistExtensionForTest(
@@ -241,7 +239,6 @@ void ExtensionService::GreylistExtension
const BitMapBlocklistState& state) {
blocklist_prefs::SetSafeBrowsingExtensionBlocklistState(extension_id, state,
extension_prefs_);
- OnGreylistStateAdded(extension_id, state);
}
bool ExtensionService::OnExternalExtensionUpdateUrlFound(
@@ -401,9 +399,6 @@ ExtensionService::ExtensionService(
@@ -409,9 +406,6 @@ ExtensionService::ExtensionService(
safe_browsing_verdict_handler_(extension_prefs,
ExtensionRegistry::Get(profile),
this),
@@ -1034,7 +1115,7 @@
extension_telemetry_service_verdict_handler_(
extension_prefs,
ExtensionRegistry::Get(profile),
@@ -936,17 +931,6 @@ bool ExtensionService::IsExtensionEnable
@@ -944,17 +938,6 @@ bool ExtensionService::IsExtensionEnable
return extension_registrar_.IsExtensionEnabled(extension_id);
}
@@ -1052,7 +1133,7 @@
void ExtensionService::PerformActionBasedOnExtensionTelemetryServiceVerdicts(
const Blocklist::BlocklistStateMap& blocklist_state_map) {
DCHECK_CURRENTLY_ON(BrowserThread::UI);
@@ -956,89 +940,6 @@ void ExtensionService::PerformActionBase
@@ -964,89 +947,6 @@ void ExtensionService::PerformActionBase
error_controller_->ShowErrorIfNeeded();
}
@@ -1193,7 +1274,7 @@
// Performs action based on verdicts received from the Extension Telemetry
// server. Currently, these verdicts are limited to off-store extensions.
void PerformActionBasedOnExtensionTelemetryServiceVerdicts(
@@ -676,8 +646,6 @@ class ExtensionService : public Extensio
@@ -680,8 +650,6 @@ class ExtensionService : public Extensio
SafeBrowsingVerdictHandler safe_browsing_verdict_handler_;
@@ -1266,7 +1347,7 @@
}
--- a/chrome/browser/file_system_access/chrome_file_system_access_permission_context.cc
+++ b/chrome/browser/file_system_access/chrome_file_system_access_permission_context.cc
@@ -35,7 +35,6 @@
@@ -36,7 +36,6 @@
#include "chrome/browser/permissions/permission_decision_auto_blocker_factory.h"
#include "chrome/browser/profiles/profile.h"
#include "chrome/browser/profiles/profile_manager.h"
@@ -1274,7 +1355,7 @@
#include "chrome/browser/ui/file_system_access_dialogs.h"
#include "chrome/common/chrome_paths.h"
#include "chrome/common/pdf_util.h"
@@ -425,88 +424,6 @@ bool ShouldBlockAccessToPath(const base:
@@ -426,90 +425,6 @@ bool ShouldBlockAccessToPath(const base:
return true;
}
@@ -1340,6 +1421,7 @@
- case Result::BLOCKED_TOO_LARGE:
- case Result::BLOCKED_UNSUPPORTED_FILE_TYPE:
- case Result::DANGEROUS_ACCOUNT_COMPROMISE:
- case Result::BLOCKED_SCAN_FAILED:
- return ChromeFileSystemAccessPermissionContext::AfterWriteCheckResult::
- kBlock;
-
@@ -1352,6 +1434,7 @@
- case Result::PROMPT_FOR_SCANNING:
- case Result::PROMPT_FOR_LOCAL_PASSWORD_SCANNING:
- case Result::DEEP_SCANNED_FAILED:
- case Result::IMMEDIATE_DEEP_SCAN:
- NOTREACHED();
- return ChromeFileSystemAccessPermissionContext::AfterWriteCheckResult::
- kAllow;
@@ -1363,7 +1446,7 @@
std::string GenerateLastPickedDirectoryKey(const std::string& id) {
return id.empty() ? kDefaultLastPickedDirectoryKey
: base::StrCat({kCustomLastPickedDirectoryKey, "-", id});
@@ -526,13 +443,7 @@ std::string_view GetGrantKeyFromGrantTyp
@@ -529,13 +444,7 @@ std::string_view GetGrantKeyFromGrantTyp
bool FileHasDangerousExtension(const url::Origin& origin,
const base::FilePath& path,
Profile* profile) {
@@ -1378,7 +1461,7 @@
}
} // namespace
@@ -1591,29 +1502,6 @@ void ChromeFileSystemAccessPermissionCon
@@ -1693,29 +1602,6 @@ void ChromeFileSystemAccessPermissionCon
std::move(callback));
}
@@ -1410,7 +1493,7 @@
const base::FilePath& path,
--- a/chrome/browser/file_system_access/chrome_file_system_access_permission_context.h
+++ b/chrome/browser/file_system_access/chrome_file_system_access_permission_context.h
@@ -172,10 +172,6 @@ class ChromeFileSystemAccessPermissionCo
@@ -178,10 +178,6 @@ class ChromeFileSystemAccessPermissionCo
UserAction user_action,
content::GlobalRenderFrameHostId frame_id,
base::OnceCallback<void(SensitiveEntryResult)> callback) override;
@@ -1423,7 +1506,7 @@
void SetLastPickedDirectory(const url::Origin& origin,
--- a/chrome/browser/media/webrtc/display_media_access_handler.cc
+++ b/chrome/browser/media/webrtc/display_media_access_handler.cc
@@ -25,6 +25,7 @@
@@ -24,6 +24,7 @@
#include "chrome/browser/ui/url_identity.h"
#include "chrome/common/pref_names.h"
#include "components/prefs/pref_service.h"
@@ -1431,7 +1514,7 @@
#include "components/url_formatter/elide_url.h"
#include "content/public/browser/browser_thread.h"
#include "content/public/browser/desktop_media_id.h"
@@ -122,6 +123,7 @@ void DisplayMediaAccessHandler::HandleRe
@@ -121,6 +122,7 @@ void DisplayMediaAccessHandler::HandleRe
return;
}
@@ -1439,7 +1522,7 @@
// SafeBrowsing Delayed Warnings experiment can delay some SafeBrowsing
// warnings until user interaction. If the current page has a delayed warning,
// it'll have a user interaction observer attached. Show the warning
@@ -137,6 +139,7 @@ void DisplayMediaAccessHandler::HandleRe
@@ -136,6 +138,7 @@ void DisplayMediaAccessHandler::HandleRe
observer->OnDesktopCaptureRequest();
return;
}
@@ -1473,7 +1556,7 @@
#include "chrome/browser/safe_browsing/user_interaction_observer.h"
#include "chrome/browser/signin/identity_manager_factory.h"
#include "chrome/browser/sync/sync_service_factory.h"
@@ -878,6 +877,7 @@ autofill::LanguageCode ChromePasswordMan
@@ -898,6 +897,7 @@ autofill::LanguageCode ChromePasswordMan
return autofill::LanguageCode();
}
@@ -1481,7 +1564,7 @@
safe_browsing::PasswordProtectionService*
ChromePasswordManagerClient::GetPasswordProtectionService() const {
return safe_browsing::ChromePasswordProtectionService::
@@ -897,6 +897,7 @@ void ChromePasswordManagerClient::CheckS
@@ -917,6 +917,7 @@ void ChromePasswordManagerClient::CheckS
}
}
#endif // defined(ON_FOCUS_PING_ENABLED)
@@ -1489,7 +1572,7 @@
#if !BUILDFLAG(IS_ANDROID)
void ChromePasswordManagerClient::MaybeReportEnterpriseLoginEvent(
@@ -904,28 +905,10 @@ void ChromePasswordManagerClient::MaybeR
@@ -924,28 +925,10 @@ void ChromePasswordManagerClient::MaybeR
bool is_federated,
const url::Origin& federated_origin,
const std::u16string& login_user_name) const {
@@ -1518,7 +1601,7 @@
}
#endif
@@ -1538,6 +1521,7 @@ bool ChromePasswordManagerClient::IsPass
@@ -1565,6 +1548,7 @@ bool ChromePasswordManagerClient::IsPass
is_enabled = false;
}
@@ -1526,7 +1609,7 @@
// SafeBrowsing Delayed Warnings experiment can delay some SafeBrowsing
// warnings until user interaction. If the current page has a delayed warning,
// it'll have a user interaction observer attached. Disable password
@@ -1548,6 +1532,7 @@ bool ChromePasswordManagerClient::IsPass
@@ -1575,6 +1559,7 @@ bool ChromePasswordManagerClient::IsPass
observer->OnPasswordSaveOrAutofillDenied();
is_enabled = false;
}
@@ -1739,15 +1822,15 @@
}
--- a/chrome/browser/policy/configuration_policy_handler_list_factory.cc
+++ b/chrome/browser/policy/configuration_policy_handler_list_factory.cc
@@ -105,6 +105,7 @@
#include "components/policy/policy_constants.h"
@@ -108,6 +108,7 @@
#include "components/privacy_sandbox/privacy_sandbox_prefs.h"
#include "components/privacy_sandbox/tracking_protection_prefs.h"
#include "components/proxy_config/proxy_policy_handler.h"
+#include "components/safe_browsing/buildflags.h"
#include "components/safe_browsing/content/common/file_type_policies_prefs.h"
#include "components/safe_browsing/core/common/safe_browsing_policy_handler.h"
#include "components/safe_browsing/core/common/safe_browsing_prefs.h"
@@ -2204,8 +2205,6 @@ std::unique_ptr<ConfigurationPolicyHandl
@@ -2234,8 +2235,6 @@ std::unique_ptr<ConfigurationPolicyHandl
handlers->AddHandler(
std::make_unique<bookmarks::ManagedBookmarksPolicyHandler>(
chrome_schema));
@@ -1756,7 +1839,7 @@
handlers->AddHandler(std::make_unique<syncer::SyncPolicyHandler>());
handlers->AddHandler(
std::make_unique<URLBlocklistPolicyHandler>(key::kURLBlocklist));
@@ -2290,20 +2289,6 @@ std::unique_ptr<ConfigurationPolicyHandl
@@ -2332,20 +2331,6 @@ std::unique_ptr<ConfigurationPolicyHandl
prefs::kSafeBrowsingEnterpriseRealTimeUrlCheckMode,
prefs::kSafeBrowsingEnterpriseRealTimeUrlCheckScope, chrome_schema));
@@ -1787,7 +1870,7 @@
#include "chrome/browser/new_tab_page/modules/v2/tab_resumption/tab_resumption_page_handler.h"
#include "chrome/browser/new_tab_page/promos/promo_service.h"
#include "chrome/browser/policy/developer_tools_policy_handler.h"
@@ -1879,7 +1878,6 @@ void RegisterProfilePrefs(user_prefs::Pr
@@ -1908,7 +1907,6 @@ void RegisterProfilePrefs(user_prefs::Pr
media_router::RegisterProfilePrefs(registry);
NewTabPageHandler::RegisterProfilePrefs(registry);
NewTabPageUI::RegisterProfilePrefs(registry);
@@ -1797,7 +1880,7 @@
PinnedTabCodec::RegisterProfilePrefs(registry);
--- a/chrome/browser/profiles/chrome_browser_main_extra_parts_profiles.cc
+++ b/chrome/browser/profiles/chrome_browser_main_extra_parts_profiles.cc
@@ -770,9 +770,6 @@ void ChromeBrowserMainExtraPartsProfiles
@@ -784,9 +784,6 @@ void ChromeBrowserMainExtraPartsProfiles
enterprise_connectors::DeviceTrustConnectorServiceFactory::GetInstance();
enterprise_connectors::DeviceTrustServiceFactory::GetInstance();
#endif
@@ -1807,7 +1890,7 @@
#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX) || \
BUILDFLAG(IS_ANDROID)
enterprise_idle::IdleServiceFactory::GetInstance();
@@ -1084,23 +1081,6 @@ void ChromeBrowserMainExtraPartsProfiles
@@ -1101,23 +1098,6 @@ void ChromeBrowserMainExtraPartsProfiles
#if !BUILDFLAG(IS_ANDROID)
ResetReportUploaderFactory::GetInstance();
#endif
@@ -1985,7 +2068,7 @@
// Force this to be created during BrowserContext creation, since we can't
--- a/chrome/browser/ssl/ssl_error_controller_client.cc
+++ b/chrome/browser/ssl/ssl_error_controller_client.cc
@@ -91,8 +91,6 @@ void SSLErrorControllerClient::GoBack()
@@ -92,8 +92,6 @@ void SSLErrorControllerClient::GoBack()
}
void SSLErrorControllerClient::Proceed() {
@@ -2018,7 +2101,7 @@
} // namespace
--- a/chrome/browser/ui/BUILD.gn
+++ b/chrome/browser/ui/BUILD.gn
@@ -588,7 +588,6 @@ static_library("ui") {
@@ -598,7 +598,6 @@ static_library("ui") {
"//components/renderer_context_menu",
"//components/resources",
"//components/safe_browsing/content/browser",
@@ -2026,7 +2109,7 @@
"//components/safe_browsing/content/browser/password_protection",
"//components/safe_browsing/content/browser/web_ui",
"//components/safe_browsing/core/browser/db:database_manager",
@@ -4083,8 +4082,6 @@ static_library("ui") {
@@ -4127,8 +4126,6 @@ static_library("ui") {
"startup/web_app_startup_utils.h",
"tab_contents/chrome_web_contents_menu_helper.cc",
"tab_contents/chrome_web_contents_menu_helper.h",
@@ -2035,7 +2118,7 @@
"views/autofill/payments/virtual_card_selection_dialog_view.cc",
"views/autofill/payments/virtual_card_selection_dialog_view.h",
"views/autofill/payments/webauthn_dialog_view.cc",
@@ -5745,8 +5742,6 @@ static_library("ui") {
@@ -5798,8 +5795,6 @@ static_library("ui") {
"views/safe_browsing/prompt_for_scanning_modal_dialog.h",
"views/safe_browsing/tailored_security_desktop_dialog_manager.cc",
"views/safe_browsing/tailored_security_desktop_dialog_manager.h",
@@ -2082,10 +2165,10 @@
void JavaScriptTabModalDialogManagerDelegateDesktop::DidCloseDialog() {
--- a/chrome/browser/ui/tab_helpers.cc
+++ b/chrome/browser/ui/tab_helpers.cc
@@ -370,7 +370,6 @@ void TabHelpers::AttachTabHelpers(WebCon
chrome::ChainedBackNavigationTracker::CreateForWebContents(web_contents);
chrome_browser_net::NetErrorTabHelper::CreateForWebContents(web_contents);
ChromePasswordManagerClient::CreateForWebContents(web_contents);
@@ -373,7 +373,6 @@ void TabHelpers::AttachTabHelpers(WebCon
if (!autofill_client_provider.uses_platform_autofill()) {
ChromePasswordManagerClient::CreateForWebContents(web_contents);
}
- ChromePasswordReuseDetectionManagerClient::CreateForWebContents(web_contents);
CreateSubresourceFilterWebContentsHelper(web_contents);
#if BUILDFLAG(ENABLE_RLZ)
@@ -2100,15 +2183,15 @@
#include "chrome/browser/safe_browsing/safe_browsing_service.h"
#include "chrome/browser/ui/browser.h"
#include "chrome/browser/ui/browser_element_identifiers.h"
@@ -164,63 +163,16 @@ void DownloadBubbleContentsView::AddSecu
void DownloadBubbleContentsView::ProcessDeepScanPress(
@@ -165,63 +164,16 @@ void DownloadBubbleContentsView::Process
const ContentId& id,
DownloadItemWarningData::DeepScanTrigger trigger,
base::optional_ref<const std::string> password) {
- if (DownloadUIModel* model = GetDownloadModel(id); model) {
- LogDeepScanEvent(model->GetDownloadItem(),
- safe_browsing::DeepScanEvent::kPromptAccepted);
- safe_browsing::DownloadProtectionService::UploadForConsumerDeepScanning(
- model->GetDownloadItem(), password);
- model->GetDownloadItem(), trigger, password);
- }
}
@@ -2164,6 +2247,38 @@
}
bool DownloadBubbleContentsView::IsEncryptedArchive(const ContentId& id) {
--- a/chrome/browser/ui/views/download/bubble/download_toolbar_button_view.cc
+++ b/chrome/browser/ui/views/download/bubble/download_toolbar_button_view.cc
@@ -792,29 +792,6 @@ void DownloadToolbarButtonView::ShowIphP
return;
}
#endif
-
- // Notify users that we're removing the ESB deep scanning
- // prompt. Users should only see the prompt if:
- // - They're not incognito, since we don't want to imply deep scans
- // happen incognito
- // - They're ESB users, since this isn't relevant to SSB users
- // - They didn't opt-in with the friendlier settings strings, since
- // then they should know this is possible.
- // - chrome://settings/security currently shows the friendlier
- // settings strings, so that clicking "Settings" on the IPH would
- // show them strings saying this is possible.
- if (!profile->IsOffTheRecord() &&
- safe_browsing::IsEnhancedProtectionEnabled(*profile->GetPrefs()) &&
- !profile->GetPrefs()->GetBoolean(
- prefs::kSafeBrowsingEsbOptInWithFriendlierSettings) &&
- base::FeatureList::IsEnabled(
- safe_browsing::kFriendlierSafeBrowsingSettingsEnhancedProtection) &&
- browser_->window()->MaybeShowFeaturePromo(
- feature_engagement::kIPHDeepScanPromptRemovalFeature)) {
- profile->GetPrefs()->SetBoolean(
- prefs::kSafeBrowsingAutomaticDeepScanningIPHSeen, true);
- return;
- }
}
void DownloadToolbarButtonView::OnPartialViewClosed() {
--- a/chrome/browser/ui/views/download/download_item_view.cc
+++ b/chrome/browser/ui/views/download/download_item_view.cc
@@ -38,7 +38,6 @@
@@ -2201,7 +2316,7 @@
open_button_->SetEnabled((mode_ == download::DownloadItemMode::kNormal) ||
prompt_to_scan || allow_open_during_deep_scan);
@@ -1273,7 +1274,9 @@ void DownloadItemView::ShowContextMenuIm
@@ -1274,7 +1275,9 @@ void DownloadItemView::ShowContextMenuIm
}
void DownloadItemView::OpenDownloadDuringAsyncScanning() {
@@ -2257,18 +2372,19 @@
std::unique_ptr<RenderViewContextMenuBase>
--- a/chrome/browser/ui/webui/chrome_web_ui_controller_factory.cc
+++ b/chrome/browser/ui/webui/chrome_web_ui_controller_factory.cc
@@ -484,8 +484,6 @@ WebUIFactoryFunction GetWebUIFactoryFunc
@@ -485,9 +485,6 @@ WebUIFactoryFunction GetWebUIFactoryFunc
}
if (url.host_piece() == chrome::kChromeUIPredictorsHost)
return &NewWebUI<PredictorsUI>;
- if (url.host_piece() == safe_browsing::kChromeUISafeBrowsingHost)
- return &NewWebUI<safe_browsing::SafeBrowsingUI>;
- return &NewComponentUI<safe_browsing::SafeBrowsingUI,
- ChromeSafeBrowsingLocalStateDelegate>;
if (url.host_piece() == chrome::kChromeUISegmentationInternalsHost)
return &NewWebUI<SegmentationInternalsUI>;
if (url.host_piece() == chrome::kChromeUISignInInternalsHost)
--- a/chrome/browser/ui/webui/downloads/downloads_dom_handler.cc
+++ b/chrome/browser/ui/webui/downloads/downloads_dom_handler.cc
@@ -155,10 +155,6 @@ void MaybeReportBypassAction(download::D
@@ -156,10 +156,6 @@ void MaybeReportBypassAction(download::D
if (action != WarningAction::PROCEED && action != WarningAction::DISCARD) {
return;
}
@@ -2279,7 +2395,7 @@
}
// Triggers a Trust and Safety sentiment survey (if enabled). Should be called
@@ -167,21 +163,6 @@ void MaybeReportBypassAction(download::D
@@ -168,21 +164,6 @@ void MaybeReportBypassAction(download::D
void MaybeTriggerTrustSafetySurvey(download::DownloadItem* file,
WarningSurface surface,
WarningAction action) {
@@ -2301,7 +2417,7 @@
}
void RecordDownloadsPageValidatedHistogram(download::DownloadItem* item) {
@@ -285,100 +266,17 @@ void DownloadsDOMHandler::SaveDangerousR
@@ -292,100 +273,17 @@ void DownloadsDOMHandler::SaveDangerousR
// downloads of certain danger types.
void DownloadsDOMHandler::SaveSuspiciousRequiringGesture(
const std::string& id) {
@@ -2402,15 +2518,11 @@
}
void DownloadsDOMHandler::DiscardDangerous(const std::string& id) {
@@ -590,19 +488,6 @@ void DownloadsDOMHandler::DeepScan(const
@@ -609,15 +507,6 @@ void DownloadsDOMHandler::DeepScan(const
return;
}
- if ((base::FeatureList::IsEnabled(
- safe_browsing::kDeepScanningEncryptedArchives) ||
- base::FeatureList::IsEnabled(
- safe_browsing::kEncryptedArchivesMetadata)) &&
- DownloadItemWarningData::IsEncryptedArchive(download)) {
- if (DownloadItemWarningData::IsEncryptedArchive(download)) {
- // For encrypted archives, we need a password from the user. We will request
- // this in the download bubble.
- PromptForScanningInBubble(GetWebUIWebContents(), download);
@@ -2422,7 +2534,7 @@
DownloadItemModel model(download);
DownloadCommands commands(model.GetWeakPtr());
commands.ExecuteCommand(DownloadCommands::DEEP_SCAN);
@@ -625,10 +510,7 @@ void DownloadsDOMHandler::BypassDeepScan
@@ -640,10 +529,7 @@ void DownloadsDOMHandler::BypassDeepScan
// file" which does not imply opening the file. In the old behavior, the
// button says "Open anyway" so we should open the file.
commands.ExecuteCommand(
@@ -2434,7 +2546,7 @@
}
}
@@ -639,12 +521,6 @@ void DownloadsDOMHandler::ReviewDangerou
@@ -654,12 +540,6 @@ void DownloadsDOMHandler::ReviewDangerou
return;
}
@@ -2446,6 +2558,21 @@
- }
}
void DownloadsDOMHandler::OpenEsbSettings() {
@@ -674,14 +554,7 @@ void DownloadsDOMHandler::OpenEsbSetting
void DownloadsDOMHandler::IsEligibleForEsbPromo(
IsEligibleForEsbPromoCallback callback) {
- content::DownloadManager* manager = GetMainNotifierManager();
- if (manager) {
- std::move(callback).Run(
- safe_browsing::SafeBrowsingService::IsUserEligibleForESBPromo(
- Profile::FromBrowserContext(manager->GetBrowserContext())));
- } else {
std::move(callback).Run(false);
- }
}
// DownloadsDOMHandler, private: --------------------------------------------
--- a/chrome/browser/ui/webui/management/management_ui_handler.cc
+++ b/chrome/browser/ui/webui/management/management_ui_handler.cc
@@ -2587,7 +2714,7 @@
std::move(callback),
--- a/chrome/common/webui_url_constants.cc
+++ b/chrome/common/webui_url_constants.cc
@@ -725,7 +725,6 @@ const char* const kChromeHostURLs[] = {
@@ -729,7 +729,6 @@ const char* const kChromeHostURLs[] = {
kChromeUISuggestInternalsHost,
#endif
kChromeUINTPTilesInternalsHost,
@@ -2597,7 +2724,7 @@
kChromeUITabSearchHost,
--- a/chrome/test/BUILD.gn
+++ b/chrome/test/BUILD.gn
@@ -1884,8 +1884,6 @@ if (!is_android) {
@@ -1928,8 +1928,6 @@ if (!is_android) {
"//components/resources",
"//components/safe_browsing:buildflags",
"//components/safe_browsing/content/browser",
@@ -2606,7 +2733,7 @@
"//components/safe_browsing/content/browser:safe_browsing_service",
"//components/safe_browsing/content/browser/password_protection",
"//components/safe_browsing/content/browser/password_protection:test_support",
@@ -6873,8 +6871,6 @@ test("unit_tests") {
@@ -6956,8 +6954,6 @@ test("unit_tests") {
"//components/resources",
"//components/safe_browsing:buildflags",
"//components/safe_browsing/content/browser",
@@ -2617,7 +2744,7 @@
"//components/safe_browsing/content/browser/web_ui",
--- a/components/enterprise/buildflags/buildflags.gni
+++ b/components/enterprise/buildflags/buildflags.gni
@@ -13,17 +13,17 @@ declare_args() {
@@ -12,17 +12,17 @@ declare_args() {
# Indicates support for content analysis against a cloud agent for Enterprise
# Connector policies.
enterprise_cloud_content_analysis =
@@ -2639,7 +2766,7 @@
# The watermark is currently implemented using the views framework
enterprise_watermark =
@@ -36,7 +36,7 @@ declare_args() {
@@ -35,7 +35,7 @@ declare_args() {
# the fact that `enterprise_cloud_content_analysis` is a superset of
# `enterprise_local_content_analysis`.
enterprise_content_analysis =
@@ -2650,7 +2777,7 @@
# These two flags are equivalent, but `enable_print_content_analysis` still
--- a/components/password_manager/content/browser/content_password_manager_driver.cc
+++ b/components/password_manager/content/browser/content_password_manager_driver.cc
@@ -525,7 +525,7 @@ void ContentPasswordManagerDriver::Check
@@ -540,7 +540,7 @@ void ContentPasswordManagerDriver::Check
if (!password_manager::bad_message::CheckFrameNotPrerendering(
render_frame_host_))
return;
@@ -2661,7 +2788,7 @@
}
--- a/components/password_manager/core/browser/password_manager_client.h
+++ b/components/password_manager/core/browser/password_manager_client.h
@@ -396,11 +396,14 @@ class PasswordManagerClient {
@@ -397,11 +397,14 @@ class PasswordManagerClient {
// Returns the current best guess as to the page's display language.
virtual autofill::LanguageCode GetPageLanguage() const;
@@ -2696,8 +2823,8 @@
+# }
--- a/components/safe_browsing/content/common/safe_browsing.mojom
+++ b/components/safe_browsing/content/common/safe_browsing.mojom
@@ -158,7 +158,6 @@ interface PhishingDetector {
=> (PhishingDetectorResult result, string request_proto);
@@ -159,7 +159,6 @@ interface PhishingDetector {
mojo_base.mojom.ByteString request_proto);
};
-[EnableIf=full_safe_browsing]
@@ -2790,7 +2917,7 @@
void OhttpKeyService::Shutdown() {
--- a/components/safe_browsing/core/browser/realtime/url_lookup_service.cc
+++ b/components/safe_browsing/core/browser/realtime/url_lookup_service.cc
@@ -248,17 +248,6 @@ void RealTimeUrlLookupService::MaybeLogP
@@ -250,17 +250,6 @@ void RealTimeUrlLookupService::MaybeLogP
bool request_had_cookie,
bool was_first_request,
bool sent_with_token) {
@@ -3052,7 +3179,7 @@
(const url::Origin& origin),
--- a/content/public/browser/file_system_access_permission_context.h
+++ b/content/public/browser/file_system_access_permission_context.h
@@ -122,12 +122,6 @@ class FileSystemAccessPermissionContext
@@ -128,12 +128,6 @@ class FileSystemAccessPermissionContext
base::OnceCallback<void(SensitiveEntryResult)> callback) = 0;
enum class AfterWriteCheckResult { kAllow, kBlock };
@@ -3097,7 +3224,7 @@
--- a/extensions/browser/updater/update_service.cc
+++ b/extensions/browser/updater/update_service.cc
@@ -133,13 +133,6 @@ void UpdateService::OnCrxStateChange(Upd
@@ -134,13 +134,6 @@ void UpdateService::OnCrxStateChange(Upd
break;
}

View File

File diff suppressed because it is too large Load Diff

View File

@@ -1,7 +1,7 @@
# Disables translation and removes the "Translate to" context menu when --translate-script-url flag is not set
--- a/chrome/browser/renderer_context_menu/render_view_context_menu.cc
+++ b/chrome/browser/renderer_context_menu/render_view_context_menu.cc
@@ -168,6 +168,7 @@
@@ -167,6 +167,7 @@
#include "components/spellcheck/spellcheck_buildflags.h"
#include "components/strings/grit/components_strings.h"
#include "components/supervised_user/core/common/buildflags.h"
@@ -9,7 +9,7 @@
#include "components/translate/core/browser/translate_download_manager.h"
#include "components/translate/core/browser/translate_manager.h"
#include "components/translate/core/browser/translate_prefs.h"
@@ -2189,6 +2190,7 @@ void RenderViewContextMenu::AppendPageIt
@@ -2199,6 +2200,7 @@ void RenderViewContextMenu::AppendPageIt
menu_model_.AddSeparator(ui::NORMAL_SEPARATOR);
if (CanTranslate(/*menu_logging=*/true)) {
@@ -92,14 +92,14 @@
server_params.c_str());
GURL security_origin = translate::GetTranslateSecurityOrigin();
- base::StringAppendF(&data_, "var securityOrigin = '%s';",
- base::StringAppendF(&data_, "var securityOrigin = '%s';\n",
- security_origin.spec().c_str());
+ const base::CommandLine& command_line = *base::CommandLine::ForCurrentProcess();
+ if (command_line.HasSwitch(translate::switches::kTranslateScriptURL)) {
+ base::StringAppendF(&data_, "var securityOrigin = '%s';",
+ base::StringAppendF(&data_, "var securityOrigin = '%s';\n",
+ security_origin.spec().c_str());
+ } else {
+ base::StringAppendF(&data_, "var securityOrigin = '';");
+ base::StringAppendF(&data_, "var securityOrigin = '';\n");
+ }
// Load embedded translate.js.

View File

@@ -9,7 +9,7 @@
--- a/chrome/browser/BUILD.gn
+++ b/chrome/browser/BUILD.gn
@@ -2552,6 +2552,7 @@ static_library("browser") {
@@ -2562,6 +2562,7 @@ static_library("browser") {
"//third_party/libyuv",
"//third_party/metrics_proto",
"//third_party/re2",
@@ -19,7 +19,7 @@
"//third_party/widevine/cdm:headers",
--- a/chrome/browser/about_flags.cc
+++ b/chrome/browser/about_flags.cc
@@ -168,6 +168,7 @@
@@ -169,6 +169,7 @@
#include "components/translate/core/common/translate_util.h"
#include "components/trusted_vault/features.h"
#include "components/ui_devtools/switches.h"
@@ -51,7 +51,7 @@
+ "//components/ungoogled:ungoogled_switches",
"//third_party/webrtc_overrides:webrtc_component",
"//third_party/zlib",
"//third_party/zlib/google:zip",
"//tools/v8_context_snapshot:buildflags",
--- a/content/browser/renderer_host/render_process_host_impl.cc
+++ b/content/browser/renderer_host/render_process_host_impl.cc
@@ -77,6 +77,7 @@
@@ -62,7 +62,7 @@
#include "components/viz/common/switches.h"
#include "components/viz/host/gpu_client.h"
#include "content/browser/bad_message.h"
@@ -3441,6 +3442,8 @@ void RenderProcessHostImpl::PropagateBro
@@ -3440,6 +3441,8 @@ void RenderProcessHostImpl::PropagateBro
switches::kEnableWebGLImageChromium,
switches::kEnableWebGPUDeveloperFeatures,
switches::kFileUrlPathAlias,
@@ -83,7 +83,7 @@
"//ui/events/blink",
--- a/content/child/runtime_features.cc
+++ b/content/child/runtime_features.cc
@@ -40,6 +40,7 @@
@@ -39,6 +39,7 @@
#include "third_party/blink/public/common/loader/referrer_utils.h"
#include "third_party/blink/public/common/switches.h"
#include "third_party/blink/public/platform/web_runtime_features.h"
@@ -91,9 +91,9 @@
#include "ui/accessibility/accessibility_features.h"
#include "ui/base/ui_base_features.h"
#include "ui/events/blink/blink_features.h"
@@ -506,6 +507,10 @@ void SetRuntimeFeaturesFromCommandLine(c
true},
{wrf::EnableDirectSockets, switches::kEnableIsolatedWebAppsInRenderer,
@@ -508,6 +509,10 @@ void SetRuntimeFeaturesFromCommandLine(c
switches::kEnableWebGPUDeveloperFeatures, true},
{wrf::EnableWebGPUExperimentalFeatures, switches::kEnableUnsafeWebGPU,
true},
+ {wrf::EnableFingerprintingClientRectsNoise,
+ switches::kFingerprintingClientRectsNoise, true},
@@ -124,9 +124,9 @@
#include "base/ranges/algorithm.h"
#include "base/task/single_thread_task_runner.h"
#include "base/time/time.h"
@@ -929,6 +930,11 @@ Document::Document(const DocumentInit& i
: nullptr),
data_(MakeGarbageCollected<DocumentData>(GetExecutionContext())) {
@@ -934,6 +935,11 @@ Document::Document(const DocumentInit& i
TRACE_EVENT_WITH_FLOW0("blink", "Document::Document", TRACE_ID_LOCAL(this),
TRACE_EVENT_FLAG_FLOW_OUT);
DCHECK(agent_);
+ if (RuntimeEnabledFeatures::FingerprintingClientRectsNoiseEnabled()) {
+ // Precompute -0.0003% to 0.0003% noise factor for get*ClientRect*() fingerprinting
@@ -136,7 +136,7 @@
if (base::FeatureList::IsEnabled(features::kDelayAsyncScriptExecution) &&
features::kDelayAsyncScriptExecutionDelayByDefaultParam.Get()) {
script_runner_delayer_->Activate();
@@ -1041,6 +1047,14 @@ const Position Document::PositionAdjuste
@@ -1046,6 +1052,14 @@ const Position Document::PositionAdjuste
return Position::BeforeNode(*shadow_host);
}
@@ -153,7 +153,7 @@
selector_query_cache_ = std::make_unique<SelectorQueryCache>();
--- a/third_party/blink/renderer/core/dom/document.h
+++ b/third_party/blink/renderer/core/dom/document.h
@@ -531,6 +531,10 @@ class CORE_EXPORT Document : public Cont
@@ -532,6 +532,10 @@ class CORE_EXPORT Document : public Cont
has_xml_declaration_ = has_xml_declaration ? 1 : 0;
}
@@ -164,7 +164,7 @@
AtomicString visibilityState() const;
bool IsPageVisible() const;
bool hidden() const;
@@ -2507,6 +2511,9 @@ class CORE_EXPORT Document : public Cont
@@ -2533,6 +2537,9 @@ class CORE_EXPORT Document : public Cont
base::ElapsedTimer start_time_;
@@ -176,7 +176,7 @@
--- a/third_party/blink/renderer/core/dom/element.cc
+++ b/third_party/blink/renderer/core/dom/element.cc
@@ -2342,6 +2342,11 @@ DOMRectList* Element::getClientRects() {
@@ -2344,6 +2344,11 @@ DOMRectList* Element::getClientRects() {
DCHECK(element_layout_object);
GetDocument().AdjustQuadsForScrollAndAbsoluteZoom(quads,
*element_layout_object);
@@ -188,7 +188,7 @@
return MakeGarbageCollected<DOMRectList>(quads);
}
@@ -2369,6 +2374,9 @@ gfx::RectF Element::GetBoundingClientRec
@@ -2371,6 +2376,9 @@ gfx::RectF Element::GetBoundingClientRec
DCHECK(element_layout_object);
GetDocument().AdjustRectForScrollAndAbsoluteZoom(result,
*element_layout_object);
@@ -266,7 +266,7 @@
const TextDirection&,
--- a/third_party/blink/renderer/modules/canvas/canvas2d/base_rendering_context_2d.cc
+++ b/third_party/blink/renderer/modules/canvas/canvas2d/base_rendering_context_2d.cc
@@ -75,6 +75,9 @@
@@ -78,6 +78,9 @@
#include "ui/gfx/geometry/quad_f.h"
#include "ui/gfx/geometry/skia_conversions.h"
@@ -276,7 +276,7 @@
namespace blink {
BASE_FEATURE(kDisableCanvasOverdrawOptimization,
@@ -3163,8 +3166,22 @@ TextMetrics* BaseRenderingContext2D::mea
@@ -3166,8 +3169,22 @@ TextMetrics* BaseRenderingContext2D::mea
const CanvasRenderingContext2DState& state = GetState();
TextDirection direction = ToTextDirection(state.GetDirection(), canvas);
@@ -303,7 +303,7 @@
void BaseRenderingContext2D::SnapshotStateForFilter() {
--- a/third_party/blink/renderer/platform/BUILD.gn
+++ b/third_party/blink/renderer/platform/BUILD.gn
@@ -1708,6 +1708,7 @@ component("platform") {
@@ -1716,6 +1716,7 @@ component("platform") {
"//cc/mojo_embedder",
"//components/paint_preview/common",
"//components/search_engines:search_engine_utils",
@@ -328,7 +328,7 @@
} // namespace blink
--- a/third_party/blink/renderer/platform/runtime_enabled_features.json5
+++ b/third_party/blink/renderer/platform/runtime_enabled_features.json5
@@ -1753,6 +1753,12 @@
@@ -1789,6 +1789,12 @@
status: "experimental",
},
{

View File

@@ -34,7 +34,7 @@ approach to change color components.
#endif // CHROME_BROWSER_BROMITE_FLAG_ENTRIES_H_
--- a/content/browser/renderer_host/render_process_host_impl.cc
+++ b/content/browser/renderer_host/render_process_host_impl.cc
@@ -3444,6 +3444,7 @@ void RenderProcessHostImpl::PropagateBro
@@ -3443,6 +3443,7 @@ void RenderProcessHostImpl::PropagateBro
switches::kFileUrlPathAlias,
switches::kFingerprintingClientRectsNoise,
switches::kFingerprintingCanvasMeasureTextNoise,
@@ -44,7 +44,7 @@ approach to change color components.
switches::kForceGpuMemAvailableMb,
--- a/content/child/runtime_features.cc
+++ b/content/child/runtime_features.cc
@@ -511,6 +511,8 @@ void SetRuntimeFeaturesFromCommandLine(c
@@ -513,6 +513,8 @@ void SetRuntimeFeaturesFromCommandLine(c
switches::kFingerprintingClientRectsNoise, true},
{wrf::EnableFingerprintingCanvasMeasureTextNoise,
switches::kFingerprintingCanvasMeasureTextNoise, true},
@@ -65,7 +65,7 @@ approach to change color components.
};
--- a/third_party/blink/renderer/modules/canvas/canvas2d/base_rendering_context_2d.cc
+++ b/third_party/blink/renderer/modules/canvas/canvas2d/base_rendering_context_2d.cc
@@ -66,6 +66,7 @@
@@ -68,6 +68,7 @@
#include "third_party/blink/renderer/platform/graphics/image_data_buffer.h"
#include "third_party/blink/renderer/platform/graphics/memory_managed_paint_recorder.h"
#include "third_party/blink/renderer/platform/graphics/skia/skia_utils.h"
@@ -73,7 +73,7 @@ approach to change color components.
#include "third_party/blink/renderer/platform/graphics/stroke_data.h"
#include "third_party/blink/renderer/platform/graphics/video_frame_image_util.h"
#include "third_party/blink/renderer/platform/heap/garbage_collected.h"
@@ -2489,6 +2490,9 @@ ImageData* BaseRenderingContext2D::getIm
@@ -2492,6 +2493,9 @@ ImageData* BaseRenderingContext2D::getIm
snapshot->PaintImageForCurrentFrame().GetSkImageInfo().bounds();
DCHECK(!bounds.intersect(SkIRect::MakeXYWH(sx, sy, sw, sh)));
}
@@ -85,7 +85,7 @@ approach to change color components.
return image_data;
--- a/third_party/blink/renderer/platform/BUILD.gn
+++ b/third_party/blink/renderer/platform/BUILD.gn
@@ -1661,7 +1661,9 @@ component("platform") {
@@ -1669,7 +1669,9 @@ component("platform") {
"//third_party/blink/renderer:non_test_config",
]
@@ -322,7 +322,7 @@ approach to change color components.
// Methods overridden by all sub-classes
--- a/third_party/blink/renderer/platform/runtime_enabled_features.json5
+++ b/third_party/blink/renderer/platform/runtime_enabled_features.json5
@@ -1759,6 +1759,9 @@
@@ -1795,6 +1795,9 @@
name: "FingerprintingCanvasMeasureTextNoise",
},
{

View File

@@ -17,7 +17,7 @@ with limited CPU/memory resources and it is disabled by default.
--- a/chrome/browser/BUILD.gn
+++ b/chrome/browser/BUILD.gn
@@ -2269,6 +2269,7 @@ static_library("browser") {
@@ -2278,6 +2278,7 @@ static_library("browser") {
"//components/net_log",
"//components/network_hints/common:mojo_bindings",
"//components/network_session_configurator/browser",
@@ -100,7 +100,7 @@ with limited CPU/memory resources and it is disabled by default.
--- a/chrome/browser/flag_descriptions.cc
+++ b/chrome/browser/flag_descriptions.cc
@@ -2318,6 +2318,10 @@ const char kUndoAutofillDescription[] =
@@ -2333,6 +2333,10 @@ const char kUndoAutofillDescription[] =
"Allows reverting Autofill filling operations. Replaces Clear Form "
"functionality";
@@ -113,7 +113,7 @@ with limited CPU/memory resources and it is disabled by default.
const char kMediaRouterCastAllowAllIPsDescription[] =
--- a/chrome/browser/flag_descriptions.h
+++ b/chrome/browser/flag_descriptions.h
@@ -1312,6 +1312,9 @@ extern const char kLogJsConsoleMessagesD
@@ -1330,6 +1330,9 @@ extern const char kLogJsConsoleMessagesD
extern const char kUndoAutofillName[];
extern const char kUndoAutofillDescription[];

View File

@@ -3,12 +3,13 @@ author: Michael Gilbert <mgilbert@debian.org>
--- a/chrome/browser/ui/startup/infobar_utils.cc
+++ b/chrome/browser/ui/startup/infobar_utils.cc
@@ -146,9 +146,6 @@ void AddInfoBarsIfNecessary(Browser* bro
@@ -151,10 +151,6 @@ void AddInfoBarsIfNecessary(Browser* bro
infobars::ContentInfoBarManager* infobar_manager =
infobars::ContentInfoBarManager::FromWebContents(web_contents);
- if (!google_apis::HasAPIKeyConfigured())
- if (!google_apis::HasAPIKeyConfigured()) {
- GoogleApiKeysInfoBarDelegate::Create(infobar_manager);
- }
-
if (ObsoleteSystem::IsObsoleteNowOrSoon()) {
PrefService* local_state = g_browser_process->local_state();

View File

@@ -12,7 +12,7 @@
void BackgroundModeManager::RegisterProfile(Profile* profile) {
--- a/chrome/browser/chrome_content_browser_client.cc
+++ b/chrome/browser/chrome_content_browser_client.cc
@@ -1476,7 +1476,7 @@ void ChromeContentBrowserClient::Registe
@@ -1483,7 +1483,7 @@ void ChromeContentBrowserClient::Registe
void ChromeContentBrowserClient::RegisterProfilePrefs(
user_prefs::PrefRegistrySyncable* registry) {
registry->RegisterBooleanPref(prefs::kDisable3DAPIs, false);
@@ -23,7 +23,7 @@
// used for mapping the command-line flags).
--- a/chrome/browser/net/profile_network_context_service.cc
+++ b/chrome/browser/net/profile_network_context_service.cc
@@ -378,7 +378,7 @@ void ProfileNetworkContextService::Updat
@@ -381,7 +381,7 @@ void ProfileNetworkContextService::Updat
void ProfileNetworkContextService::RegisterProfilePrefs(
user_prefs::PrefRegistrySyncable* registry) {
registry->RegisterBooleanPref(embedder_support::kAlternateErrorPagesEnabled,
@@ -67,7 +67,7 @@
</cr-dialog>
--- a/chrome/browser/ui/browser_ui_prefs.cc
+++ b/chrome/browser/ui/browser_ui_prefs.cc
@@ -85,7 +85,7 @@ void RegisterBrowserUserPrefs(user_prefs
@@ -84,7 +84,7 @@ void RegisterBrowserUserPrefs(user_prefs
registry->RegisterBooleanPref(prefs::kWebAppCreateInAppsMenu, true);
registry->RegisterBooleanPref(prefs::kWebAppCreateInQuickLaunchBar, true);
registry->RegisterBooleanPref(
@@ -98,7 +98,7 @@
prefs::kAutofillPaymentCvcStorage, true,
--- a/components/bookmarks/browser/bookmark_utils.cc
+++ b/components/bookmarks/browser/bookmark_utils.cc
@@ -487,7 +487,7 @@ bool DoesBookmarkContainWords(const std:
@@ -490,7 +490,7 @@ bool DoesBookmarkContainWords(const std:
void RegisterProfilePrefs(user_prefs::PrefRegistrySyncable* registry) {
registry->RegisterBooleanPref(

View File

@@ -5,7 +5,7 @@ Subject: [PATCH 56/66] browser: disable profile auto-import on first run
--- a/chrome/browser/chrome_browser_main.cc
+++ b/chrome/browser/chrome_browser_main.cc
@@ -1643,11 +1643,6 @@ int ChromeBrowserMainParts::PreMainMessa
@@ -1651,11 +1651,6 @@ int ChromeBrowserMainParts::PreMainMessa
// and preferences have been registered since some of the import code depends
// on preferences.
if (first_run::IsChromeFirstRun()) {

View File

@@ -29,7 +29,7 @@ TLDR: Do not let files sneak onto the disk too easily.
--- a/chrome/browser/download/download_prefs.cc
+++ b/chrome/browser/download/download_prefs.cc
@@ -273,7 +273,7 @@ void DownloadPrefs::RegisterProfilePrefs
@@ -274,7 +274,7 @@ void DownloadPrefs::RegisterProfilePrefs
user_prefs::PrefRegistrySyncable* registry) {
registry->RegisterBooleanPref(
prefs::kPromptForDownload,

View File

@@ -8,17 +8,17 @@
#include "base/observer_list.h"
#include "build/build_config.h"
#include "build/chromeos_buildflags.h"
@@ -70,10 +71,12 @@ bool BookmarkTabHelper::ShouldShowBookma
!prefs->GetBoolean(bookmarks::prefs::kShowBookmarkBar))
return false;
@@ -81,9 +82,12 @@ bool BookmarkTabHelper::ShouldShowBookma
const bool has_saved_tab_groups =
stg_service && (stg_service->model()->Count() > 0);
+ const std::string flag_value =
+ base::CommandLine::ForCurrentProcess()->GetSwitchValueASCII("bookmark-bar-ntp");
// The bookmark bar is only shown on the NTP if the user
// has added something to it.
return IsNTP(web_contents()) && bookmark_model_ &&
- bookmark_model_->HasBookmarks();
+ bookmark_model_->HasBookmarks() && (flag_value != "never");
- return IsNTP(web_contents()) && (has_bookmarks || has_saved_tab_groups);
+ return IsNTP(web_contents()) && (has_bookmarks || has_saved_tab_groups) &&
+ (flag_value != "never");
}
void BookmarkTabHelper::AddObserver(BookmarkTabHelperObserver* observer) {

View File

@@ -33,7 +33,7 @@
unload_controller_.ResetTryToCloseWindow();
}
@@ -2945,6 +2950,62 @@ bool Browser::CanCloseWithInProgressDown
@@ -2951,6 +2956,62 @@ bool Browser::CanCloseWithInProgressDown
return false;
}
@@ -96,7 +96,7 @@
void Browser::InProgressDownloadResponse(bool cancel_downloads) {
if (cancel_downloads) {
cancel_download_confirmation_state_ = RESPONSE_RECEIVED;
@@ -2963,6 +3024,22 @@ void Browser::InProgressDownloadResponse
@@ -2969,6 +3030,22 @@ void Browser::InProgressDownloadResponse
std::move(warn_before_closing_callback_)
.Run(WarnBeforeClosingResult::kDoNotClose);
@@ -129,7 +129,7 @@
#include "chrome/browser/ui/signin/signin_view_controller.h"
#include "chrome/browser/ui/tabs/tab_strip_model_observer.h"
#include "chrome/browser/ui/unload_controller.h"
@@ -1131,12 +1132,17 @@ class Browser : public TabStripModelObse
@@ -1130,12 +1131,17 @@ class Browser : public TabStripModelObse
// Returns true if the window can close, false otherwise.
bool CanCloseWithInProgressDownloads();
@@ -147,7 +147,7 @@
// Called when all warnings have completed when attempting to close the
// browser directly (e.g. via hotkey, close button, terminate signal, etc.)
// Used as a WarnBeforeClosingCallback by HandleBeforeClose().
@@ -1306,6 +1312,8 @@ class Browser : public TabStripModelObse
@@ -1305,6 +1311,8 @@ class Browser : public TabStripModelObse
// when the browser is closed with in-progress downloads.
CancelDownloadConfirmationState cancel_download_confirmation_state_;

View File

@@ -1,6 +1,6 @@
--- a/chrome/browser/chrome_content_browser_client.cc
+++ b/chrome/browser/chrome_content_browser_client.cc
@@ -871,10 +871,14 @@ bool HandleNewTabPageLocationOverride(
@@ -880,10 +880,14 @@ bool HandleNewTabPageLocationOverride(
// Don't change the URL when incognito mode.
if (profile->IsOffTheRecord())

View File

@@ -11,7 +11,7 @@
#endif // CHROME_BROWSER_UNGOOGLED_FLAG_ENTRIES_H_
--- a/third_party/blink/common/features.cc
+++ b/third_party/blink/common/features.cc
@@ -179,6 +179,8 @@ BASE_FEATURE(kAutofillSendUnidentifiedKe
@@ -205,6 +205,8 @@ BASE_FEATURE(kAutofillSendUnidentifiedKe
"AutofillSendUnidentifiedKeyAfterFill",
base::FEATURE_DISABLED_BY_DEFAULT);

View File

@@ -41,7 +41,7 @@
#include "base/feature_list.h"
#include "base/format_macros.h"
#include "base/functional/bind.h"
@@ -392,6 +393,15 @@ AutocompleteController::AutocompleteCont
@@ -399,6 +400,15 @@ AutocompleteController::AutocompleteCont
steady_state_omnibox_position_(
metrics::OmniboxEventProto::UNKNOWN_POSITION) {
provider_types &= ~OmniboxFieldTrial::GetDisabledProviderTypes();

View File

@@ -27,7 +27,7 @@
return true;
--- a/chrome/browser/ui/views/location_bar/location_bar_view.cc
+++ b/chrome/browser/ui/views/location_bar/location_bar_view.cc
@@ -348,7 +348,8 @@ void LocationBarView::Init() {
@@ -358,7 +358,8 @@ void LocationBarView::Init() {
params.types_enabled.push_back(PageActionIconType::kSendTabToSelf);
params.types_enabled.push_back(PageActionIconType::kClickToCall);

View File

@@ -13,7 +13,7 @@
#endif // CHROME_BROWSER_UNGOOGLED_FLAG_ENTRIES_H_
--- a/chrome/renderer/chrome_render_frame_observer.cc
+++ b/chrome/renderer/chrome_render_frame_observer.cc
@@ -250,14 +250,16 @@ void ChromeRenderFrameObserver::DidFinis
@@ -257,14 +257,16 @@ void ChromeRenderFrameObserver::DidFinis
if (frame->Parent() || frame->IsInFencedFrameTree())
return;
@@ -80,7 +80,7 @@
}
bool TemplateURLService::IsPrepopulatedOrDefaultProviderByPolicy(
@@ -1910,6 +1918,8 @@ SyncDataMap TemplateURLService::CreateGU
@@ -1912,6 +1920,8 @@ SyncDataMap TemplateURLService::CreateGU
}
void TemplateURLService::Init() {
@@ -89,7 +89,7 @@
if (client_)
client_->SetOwner(this);
@@ -2084,6 +2094,9 @@ void TemplateURLService::ChangeToLoadedS
@@ -2087,6 +2097,9 @@ void TemplateURLService::ChangeToLoadedS
bool TemplateURLService::CanAddAutogeneratedKeywordForHost(
const std::string& host) const {

View File

@@ -27,7 +27,7 @@
#include "base/compiler_specific.h"
#include "base/containers/adapters.h"
#include "base/containers/contains.h"
@@ -1762,6 +1763,8 @@ void TabStrip::OnMouseEventInTab(views::
@@ -1764,6 +1765,8 @@ void TabStrip::OnMouseEventInTab(views::
}
void TabStrip::UpdateHoverCard(Tab* tab, HoverCardUpdateType update_type) {

View File

@@ -8,7 +8,7 @@
#include "base/containers/adapters.h"
#include "base/containers/contains.h"
#include "base/containers/flat_map.h"
@@ -1964,6 +1965,10 @@ void TabStripModel::CloseTabs(base::span
@@ -1981,6 +1982,10 @@ void TabStripModel::CloseTabs(base::span
return;
}

View File

@@ -50,7 +50,7 @@
bool IsExtensionDownload(const download::DownloadItem& download_item);
--- a/chrome/browser/download/download_target_determiner.cc
+++ b/chrome/browser/download/download_target_determiner.cc
@@ -1188,10 +1188,12 @@ DownloadConfirmationReason DownloadTarge
@@ -1192,10 +1192,12 @@ DownloadConfirmationReason DownloadTarge
return DownloadConfirmationReason::SAVE_AS;
#if BUILDFLAG(ENABLE_EXTENSIONS)

View File

@@ -13,7 +13,7 @@
#endif // CHROME_BROWSER_UNGOOGLED_FLAG_ENTRIES_H_
--- a/content/renderer/render_frame_impl.cc
+++ b/content/renderer/render_frame_impl.cc
@@ -1256,6 +1256,8 @@ WindowOpenDisposition NavigationPolicyTo
@@ -1254,6 +1254,8 @@ WindowOpenDisposition NavigationPolicyTo
case blink::kWebNavigationPolicyNewWindow:
return WindowOpenDisposition::NEW_WINDOW;
case blink::kWebNavigationPolicyNewPopup:

View File

@@ -11,7 +11,7 @@
#endif // CHROME_BROWSER_UNGOOGLED_FLAG_ENTRIES_H_
--- a/net/socket/ssl_client_socket_impl.cc
+++ b/net/socket/ssl_client_socket_impl.cc
@@ -298,7 +298,8 @@ class SSLClientSocketImpl::SSLContext {
@@ -206,7 +206,8 @@ class SSLClientSocketImpl::SSLContext {
SSL_CTX_sess_set_new_cb(ssl_ctx_.get(), NewSessionCallback);
SSL_CTX_set_timeout(ssl_ctx_.get(), 1 * 60 * 60 /* one hour */);

View File

@@ -3,8 +3,8 @@
--- a/chrome/browser/ui/startup/infobar_utils.cc
+++ b/chrome/browser/ui/startup/infobar_utils.cc
@@ -117,7 +117,8 @@ void AddInfoBarsIfNecessary(Browser* bro
return;
@@ -120,7 +120,8 @@ void AddInfoBarsIfNecessary(Browser* bro
}
// Web apps should not display the session restore bubble (crbug.com/1264121)
- if (!is_web_app && HasPendingUncleanExit(browser->profile()))

View File

@@ -16,7 +16,7 @@
#include "chrome/common/pref_names.h"
#include "chrome/grit/generated_resources.h"
#include "components/feature_engagement/public/event_constants.h"
@@ -543,6 +545,17 @@ void ExtensionsToolbarContainer::AnchorA
@@ -533,6 +535,17 @@ void ExtensionsToolbarContainer::AnchorA
widget->widget_delegate()->AsBubbleDialogDelegate()->SetAnchorView(
anchor_view && anchor_view->GetVisible() ? anchor_view
: GetExtensionsButton());
@@ -34,7 +34,7 @@
widget->Show();
}
@@ -920,6 +933,9 @@ void ExtensionsToolbarContainer::UpdateC
@@ -941,6 +954,9 @@ void ExtensionsToolbarContainer::UpdateC
}
bool ExtensionsToolbarContainer::ShouldContainerBeVisible() const {

View File

@@ -1,6 +1,6 @@
--- a/chrome/browser/ui/views/frame/browser_view.cc
+++ b/chrome/browser/ui/views/frame/browser_view.cc
@@ -1938,6 +1938,10 @@ void BrowserView::UpdateExclusiveAccessE
@@ -1968,6 +1968,10 @@ void BrowserView::UpdateExclusiveAccessE
ExclusiveAccessBubbleHideCallback bubble_first_hide_callback,
bool notify_download,
bool force_update) {

View File

@@ -1,14 +1,14 @@
--- a/chrome/browser/ui/views/frame/browser_root_view.cc
+++ b/chrome/browser/ui/views/frame/browser_root_view.cc
@@ -9,6 +9,7 @@
#include <string>
#include <utility>
@@ -12,6 +12,7 @@
#include <vector>
#include "base/check_op.h"
+#include "base/command_line.h"
#include "base/containers/adapters.h"
#include "base/functional/bind.h"
#include "base/functional/callback_helpers.h"
#include "base/metrics/user_metrics.h"
@@ -113,6 +114,18 @@ DragOperation GetDropEffect(const ui::Dr
@@ -172,6 +173,18 @@ DragOperation GetDropEffect(const ui::Dr
return DragOperation::kMove;
}
@@ -27,7 +27,7 @@
} // namespace
BrowserRootView::DropInfo::DropInfo() = default;
@@ -124,7 +137,9 @@ BrowserRootView::DropInfo::~DropInfo() {
@@ -184,7 +197,9 @@ BrowserRootView::DropInfo::~DropInfo() {
BrowserRootView::BrowserRootView(BrowserView* browser_view,
views::Widget* widget)
@@ -38,7 +38,7 @@
BrowserRootView::~BrowserRootView() {
// It's possible to destroy the browser while a drop is active. In this case,
@@ -251,7 +266,7 @@ bool BrowserRootView::OnMouseWheel(const
@@ -328,7 +343,7 @@ bool BrowserRootView::OnMouseWheel(const
// Scroll-event-changes-tab is incompatible with scrolling tabstrip, so
// disable it if the latter feature is enabled.
@@ -49,7 +49,7 @@
// tabstrip, or the empty space beside the tabstrip.
--- a/chrome/browser/ui/views/frame/browser_root_view.h
+++ b/chrome/browser/ui/views/frame/browser_root_view.h
@@ -143,6 +143,8 @@ class BrowserRootView : public views::in
@@ -161,6 +161,8 @@ class BrowserRootView : public views::in
int scroll_remainder_x_ = 0;
int scroll_remainder_y_ = 0;
@@ -57,7 +57,7 @@
+
std::unique_ptr<DropInfo> drop_info_;
base::WeakPtrFactory<BrowserRootView> weak_ptr_factory_{this};
base::OnceClosure on_filtering_complete_closure_;
--- a/chrome/browser/ungoogled_flag_choices.h
+++ b/chrome/browser/ungoogled_flag_choices.h
@@ -25,4 +25,13 @@ const FeatureEntry::Choice kShowAvatarBu

View File

@@ -1,6 +1,6 @@
--- a/chrome/browser/about_flags.cc
+++ b/chrome/browser/about_flags.cc
@@ -3737,10 +3737,12 @@ const FeatureEntry::Choice kAccountBookm
@@ -3816,10 +3816,12 @@ const FeatureEntry::FeatureVariation kDe
#include "chrome/browser/ungoogled_flag_choices.h"
#include "chrome/browser/bromite_flag_choices.h"
#include "chrome/browser/ungoogled_platform_flag_choices.h"

View File

@@ -38,7 +38,7 @@
if (is_android || enable_library_cdms) {
--- a/chrome/common/chrome_features.cc
+++ b/chrome/common/chrome_features.cc
@@ -1054,6 +1054,14 @@ BASE_FEATURE(kNewFilesPolicyUX,
@@ -998,6 +998,14 @@ BASE_FEATURE(kNewFilesPolicyUX,
// referrers instead of their ordinary behavior.
BASE_FEATURE(kNoReferrers, "NoReferrers", base::FEATURE_DISABLED_BY_DEFAULT);
@@ -55,7 +55,7 @@
// on-screen until dismissed, they are instead shown for a very long time.
--- a/chrome/common/chrome_features.h
+++ b/chrome/common/chrome_features.h
@@ -621,6 +621,10 @@ BASE_DECLARE_FEATURE(kNewFilesPolicyUX);
@@ -592,6 +592,10 @@ BASE_DECLARE_FEATURE(kNewFilesPolicyUX);
COMPONENT_EXPORT(CHROME_FEATURES) BASE_DECLARE_FEATURE(kNoReferrers);
@@ -152,7 +152,7 @@
+#endif // CHROME_COMMON_REFERRER_SANITIZER_H_
--- a/chrome/test/chromedriver/BUILD.gn
+++ b/chrome/test/chromedriver/BUILD.gn
@@ -350,8 +350,7 @@ source_set("lib") {
@@ -359,8 +359,7 @@ source_set("lib") {
"//base/third_party/dynamic_annotations",
"//build:branding_buildflags",
"//build:chromeos_buildflags",
@@ -173,7 +173,7 @@
disallowed_extension_deps_ = [
# Components should largely not depend on //extensions. Since // extensions
# is not a component target and is linked with //chrome, depending on most
@@ -831,7 +831,7 @@ test("components_unittests") {
@@ -832,7 +832,7 @@ test("components_unittests") {
# On other platforms, no components should depend on Chrome.
# Since //chrome depends on //extensions, we also only assert_no_deps on
# extensions targets for non-lacros builds.
@@ -193,15 +193,15 @@
}
--- a/content/browser/renderer_host/navigation_request.cc
+++ b/content/browser/renderer_host/navigation_request.cc
@@ -43,6 +43,7 @@
@@ -42,6 +42,7 @@
#include "build/build_config.h"
#include "build/buildflag.h"
#include "build/chromeos_buildflags.h"
+#include "chrome/common/referrer_sanitizer.h"
#include "components/viz/host/host_frame_sink_manager.h"
#include "content/browser/blob_storage/chrome_blob_storage_context.h"
#include "content/browser/browsing_topics/header_util.h"
#include "content/browser/child_process_security_policy_impl.h"
@@ -396,10 +397,10 @@ void AddAdditionalRequestHeaders(
@@ -398,10 +399,10 @@ void AddAdditionalRequestHeaders(
net::HttpRequestHeaders::kUserAgent,
ComputeUserAgentValue(*headers, user_agent_override, browser_context));
@@ -226,7 +226,7 @@
#include "content/common/associated_interfaces.mojom.h"
#include "content/common/content_navigation_policy.h"
#include "content/common/content_switches_internal.h"
@@ -4524,10 +4525,13 @@ void RenderFrameImpl::WillSendRequestInt
@@ -4544,10 +4545,13 @@ void RenderFrameImpl::WillSendRequestInt
request.SetHasUserGesture(frame_->HasTransientUserActivation());
@@ -246,7 +246,7 @@
void RenderFrameImpl::DidLoadResourceFromMemoryCache(
--- a/content/shell/BUILD.gn
+++ b/content/shell/BUILD.gn
@@ -279,6 +279,7 @@ static_library("content_shell_lib") {
@@ -299,6 +299,7 @@ static_library("content_shell_lib") {
"//base/third_party/dynamic_annotations",
"//build:chromeos_buildflags",
"//cc/base",

View File

@@ -35,7 +35,7 @@
// https://vasilvv.github.io/httpbis-alps/draft-vvv-httpbis-alps.html.
--- a/net/dns/host_resolver_manager.cc
+++ b/net/dns/host_resolver_manager.cc
@@ -151,11 +151,6 @@ const size_t kMaxHostLength = 4096;
@@ -150,11 +150,6 @@ const size_t kMaxHostLength = 4096;
// cached.
const int kIPv6ProbePeriodMs = 1000;
@@ -47,7 +47,7 @@
// True if |hostname| ends with either ".local" or ".local.".
bool ResemblesMulticastDNSName(base::StringPiece hostname) {
return hostname.ends_with(".local") || hostname.ends_with(".local.");
@@ -1373,33 +1368,10 @@ int HostResolverManager::StartIPv6Reacha
@@ -1351,33 +1346,10 @@ int HostResolverManager::StartIPv6Reacha
return OK;
}

View File

@@ -1,6 +1,6 @@
--- a/chrome/browser/about_flags.cc
+++ b/chrome/browser/about_flags.cc
@@ -3733,7 +3733,13 @@ const FeatureEntry::Choice kAccountBookm
@@ -3812,7 +3812,13 @@ const FeatureEntry::FeatureVariation kDe
// calculate and verify checksum.
//
// When adding a new choice, add it to the end of the list.

View File

@@ -1,6 +1,6 @@
--- a/chrome/browser/ui/browser_ui_prefs.cc
+++ b/chrome/browser/ui/browser_ui_prefs.cc
@@ -97,7 +97,7 @@ void RegisterBrowserUserPrefs(user_prefs
@@ -96,7 +96,7 @@ void RegisterBrowserUserPrefs(user_prefs
false);
#endif
registry->RegisterStringPref(prefs::kWebRTCIPHandlingPolicy,

View File

@@ -1,10 +1,10 @@
--- a/chrome/browser/media/webrtc/capture_policy_utils.cc
+++ b/chrome/browser/media/webrtc/capture_policy_utils.cc
@@ -140,69 +140,12 @@ void RegisterProfilePrefs(PrefRegistrySi
@@ -141,69 +141,12 @@ void RegisterProfilePrefs(PrefRegistrySi
}
bool IsGetAllScreensMediaAllowedForAnySite(content::BrowserContext* context) {
-#if BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_LINUX)
-#if BUILDFLAG(IS_CHROMEOS)
- Profile* profile = Profile::FromBrowserContext(context);
- if (!profile) {
- return false;
@@ -39,7 +39,7 @@
bool IsGetAllScreensMediaAllowed(content::BrowserContext* context,
const GURL& url) {
-#if BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_LINUX)
-#if BUILDFLAG(IS_CHROMEOS)
- Profile* profile = Profile::FromBrowserContext(context);
- if (!profile) {
- return false;

View File

@@ -147,9 +147,9 @@
"//components/power_monitor",
"//components/services/filesystem:lib",
- "//components/services/quarantine:quarantine",
"//components/services/screen_ai/buildflags",
"//components/services/storage",
"//components/services/storage:filesystem_proxy_factory",
"//components/services/storage/dom_storage:local_storage_proto",
--- a/content/browser/file_system_access/file_system_access_safe_move_helper.cc
+++ b/content/browser/file_system_access/file_system_access_safe_move_helper.cc
@@ -14,7 +14,6 @@

View File

@@ -1,6 +1,6 @@
--- a/components/optimization_guide/core/optimization_guide_features.cc
+++ b/components/optimization_guide/core/optimization_guide_features.cc
@@ -133,7 +133,7 @@ BASE_FEATURE(kOptimizationHints,
@@ -53,7 +53,7 @@ BASE_FEATURE(kOptimizationHints,
// Enables fetching from a remote Optimization Guide Service.
BASE_FEATURE(kRemoteOptimizationGuideFetching,
"OptimizationHintsFetching",

View File

@@ -3,7 +3,7 @@
--- a/third_party/blink/renderer/modules/webgl/webgl_rendering_context_base.cc
+++ b/third_party/blink/renderer/modules/webgl/webgl_rendering_context_base.cc
@@ -3865,8 +3865,7 @@ ScriptValue WebGLRenderingContextBase::g
@@ -3868,8 +3868,7 @@ ScriptValue WebGLRenderingContextBase::g
pname, IdentifiabilityBenignStringToken(
String(ContextGL()->GetString(GL_RENDERER))));
}
@@ -13,7 +13,7 @@
}
SynthesizeGLError(
GL_INVALID_ENUM, "getParameter",
@@ -3880,8 +3879,7 @@ ScriptValue WebGLRenderingContextBase::g
@@ -3883,8 +3882,7 @@ ScriptValue WebGLRenderingContextBase::g
pname, IdentifiabilityBenignStringToken(
String(ContextGL()->GetString(GL_VENDOR))));
}

View File

@@ -2,7 +2,7 @@
--- a/third_party/blink/common/features.cc
+++ b/third_party/blink/common/features.cc
@@ -1667,7 +1667,7 @@ BASE_FEATURE(kPrefetchFontLookupTables,
@@ -1733,7 +1733,7 @@ BASE_FEATURE(kPrefetchFontLookupTables,
// crbug.com/988956.
BASE_FEATURE(kPrefetchPrivacyChanges,
"PrefetchPrivacyChanges",

View File

@@ -14,7 +14,7 @@
}
return content_restrictions;
}
@@ -1663,8 +1658,7 @@ bool CanSavePage(const Browser* browser)
@@ -1664,8 +1659,7 @@ bool CanSavePage(const Browser* browser)
DownloadPrefs::DownloadRestriction::ALL_FILES) {
return false;
}
@@ -62,7 +62,7 @@
// These lists are lazily initialized below and are leaked on shutdown to
--- a/content/public/common/url_utils.cc
+++ b/content/public/common/url_utils.cc
@@ -32,11 +32,7 @@ bool HasWebUIOrigin(const url::Origin& o
@@ -40,11 +40,7 @@ bool IsPdfInternalPluginAllowedOrigin(co
}
bool IsSavableURL(const GURL& url) {

View File

@@ -15,7 +15,7 @@
reserved_grab_handle_space_ =
--- a/chrome/browser/ui/views/tabs/tab_strip.cc
+++ b/chrome/browser/ui/views/tabs/tab_strip.cc
@@ -1998,8 +1998,6 @@ void TabStrip::NewTabButtonPressed(const
@@ -2001,8 +2001,6 @@ void TabStrip::NewTabButtonPressed(const
const ui::MouseEvent& mouse = static_cast<const ui::MouseEvent&>(event);
if (mouse.IsOnlyMiddleMouseButton()) {
@@ -24,7 +24,7 @@
ui::Clipboard* clipboard = ui::Clipboard::GetForCurrentThread();
CHECK(clipboard);
std::u16string clipboard_text;
@@ -2008,7 +2006,6 @@ void TabStrip::NewTabButtonPressed(const
@@ -2011,7 +2009,6 @@ void TabStrip::NewTabButtonPressed(const
if (!clipboard_text.empty()) {
controller_->CreateNewTabWithLocation(clipboard_text);
}

View File

@@ -1,6 +1,6 @@
--- a/chrome/browser/chrome_browser_main.cc
+++ b/chrome/browser/chrome_browser_main.cc
@@ -1070,6 +1070,7 @@ int ChromeBrowserMainParts::PreCreateThr
@@ -1086,6 +1086,7 @@ int ChromeBrowserMainParts::PreCreateThr
if (first_run::IsChromeFirstRun()) {
if (!base::CommandLine::ForCurrentProcess()->HasSwitch(switches::kApp) &&
!base::CommandLine::ForCurrentProcess()->HasSwitch(switches::kAppId)) {
@@ -10,7 +10,7 @@
--- a/chrome/browser/ui/webui/chrome_web_ui_controller_factory.cc
+++ b/chrome/browser/ui/webui/chrome_web_ui_controller_factory.cc
@@ -60,6 +60,7 @@
@@ -61,6 +61,7 @@
#include "chrome/browser/ui/webui/suggest_internals/suggest_internals_ui.h"
#include "chrome/browser/ui/webui/sync_internals/sync_internals_ui.h"
#include "chrome/browser/ui/webui/translate_internals/translate_internals_ui.h"
@@ -18,7 +18,7 @@
#include "chrome/browser/ui/webui/usb_internals/usb_internals_ui.h"
#include "chrome/browser/ui/webui/user_actions/user_actions_ui.h"
#include "chrome/browser/ui/webui/version/version_ui.h"
@@ -836,6 +837,8 @@ WebUIFactoryFunction GetWebUIFactoryFunc
@@ -837,6 +838,8 @@ WebUIFactoryFunction GetWebUIFactoryFunc
return &NewWebUI<privacy_sandbox_internals::PrivacySandboxInternalsUI>;
}
@@ -169,7 +169,7 @@
+#endif // CHROME_BROWSER_UI_WEBUI_UNGOOGLED_FIRST_RUN_H_
--- a/chrome/common/webui_url_constants.cc
+++ b/chrome/common/webui_url_constants.cc
@@ -669,6 +669,7 @@ const char kExtensionConfigureCommandsSu
@@ -673,6 +673,7 @@ const char kExtensionConfigureCommandsSu
// Add hosts here to be included in chrome://chrome-urls (about:about).
// These hosts will also be suggested by BuiltinProvider.
const char* const kChromeHostURLs[] = {

View File

@@ -1,9 +1,9 @@
## template_url_prepopulate_data.cc
# Adds DDG to the default search engines.
#
--- a/components/search_engines/template_url_prepopulate_data.cc
+++ b/components/search_engines/template_url_prepopulate_data.cc
@@ -66,6 +66,7 @@ constexpr EngineAndTier engines_default[
--- a/components/search_engines/search_engine_countries-inc.cc
+++ b/components/search_engines/search_engine_countries-inc.cc
@@ -36,6 +36,7 @@ constexpr EngineAndTier engines_default[
{SearchEngineTier::kTopEngines, &google},
{SearchEngineTier::kTopEngines, &bing},
{SearchEngineTier::kTopEngines, &yahoo},

View File

@@ -2,7 +2,7 @@
--- a/chrome/browser/ui/startup/bad_flags_prompt.cc
+++ b/chrome/browser/ui/startup/bad_flags_prompt.cc
@@ -72,7 +72,6 @@ const char* const kBadFlags[] = {
@@ -73,7 +73,6 @@ const char* const kBadFlags[] = {
// These flags disable sandbox-related security.
sandbox::policy::switches::kDisableGpuSandbox,
sandbox::policy::switches::kDisableSeccompFilterSandbox,

View File

@@ -112,7 +112,7 @@
- </a>
<!-- tabindex is needed below because <a> without href attribute is not
focusable in sequential keyboard navigation by default. -->
<a role="menuitem" id="toggle-history-clusters"
<a role="menuitem" id="clear-browsing-data"
--- a/chrome/browser/resources/new_tab_page_incognito_guest/incognito_tab.html
+++ b/chrome/browser/resources/new_tab_page_incognito_guest/incognito_tab.html
@@ -24,9 +24,6 @@ document.querySelector('#incognitothemec
@@ -162,7 +162,7 @@
hidden="[[!prefs.feedback_allowed.value]]"
--- a/chrome/browser/resources/settings/appearance_page/appearance_page.html
+++ b/chrome/browser/resources/settings/appearance_page/appearance_page.html
@@ -22,11 +22,11 @@
@@ -30,11 +30,11 @@
<settings-animated-pages id="pages" section="appearance"
focus-config="[[focusConfig_]]">
<div route-path="default">
@@ -205,7 +205,7 @@
/** @return Whether applied theme is set by policy. */
--- a/chrome/browser/resources/settings/autofill_page/payments_section.html
+++ b/chrome/browser/resources/settings/autofill_page/payments_section.html
@@ -95,11 +95,6 @@
@@ -94,11 +94,6 @@
</div>
</template>
@@ -295,9 +295,9 @@
start-icon="settings:visibility-off"
--- a/chrome/browser/resources/settings/privacy_page/security_page.html
+++ b/chrome/browser/resources/settings/privacy_page/security_page.html
@@ -175,10 +175,3 @@
on-click="onChromeCertificatesClick_"></cr-link-row>
</template>
@@ -173,10 +173,3 @@
sub-label="$i18n{chromeCertificatesDescription}"
on-click="onChromeCertificatesClick_"></cr-link-row>
- <cr-link-row id="advanced-protection-program-link"
- class="hr"
@@ -333,7 +333,7 @@
aria-description="$i18n{opensInNewTab}" on-click="onHelpClick_">
--- a/chrome/browser/ui/toolbar/app_menu_model.cc
+++ b/chrome/browser/ui/toolbar/app_menu_model.cc
@@ -730,19 +730,9 @@ void ExtensionsMenuModel::Build(Browser*
@@ -850,19 +850,9 @@ void ExtensionsMenuModel::Build(Browser*
SetElementIdentifierAt(
GetIndexOfCommandId(IDC_EXTENSIONS_SUBMENU_MANAGE_EXTENSIONS).value(),
kManageExtensionsMenuItem);
@@ -386,7 +386,7 @@
--- a/chrome/browser/ui/views/profiles/profile_menu_view.cc
+++ b/chrome/browser/ui/views/profiles/profile_menu_view.cc
@@ -176,6 +176,7 @@ void ProfileMenuView::BuildMenu() {
@@ -181,6 +181,7 @@ void ProfileMenuView::BuildMenu() {
}
gfx::ImageSkia ProfileMenuView::GetSyncIcon() const {
@@ -394,12 +394,14 @@
Profile* profile = browser()->profile();
if (profile->IsOffTheRecord() || profile->IsGuestSession())
return gfx::ImageSkia();
@@ -544,13 +545,7 @@ void ProfileMenuView::BuildIdentity() {
@@ -565,15 +566,7 @@ void ProfileMenuView::BuildIdentity() {
ui::ImageModel::FromImage(account_info.account_image),
badge_image_model, menu_title_, menu_subtitle_, management_label_);
} else {
- if (switches::IsExplicitBrowserSigninUIOnDesktopEnabled(
- switches::ExplicitBrowserSigninPhase::kExperimental) &&
- !switches::IsExplicitBrowserSigninUIOnDesktopEnabled(
- switches::ExplicitBrowserSigninPhase::kFull) &&
- account.IsEmpty()) {
- account_info =
- signin_ui_util::GetSingleAccountForPromos(identity_manager);
@@ -446,7 +448,7 @@
// Specify the maximum message and title width explicitly.
--- a/media/base/media_switches.cc
+++ b/media/base/media_switches.cc
@@ -943,7 +943,7 @@ const base::FeatureParam<std::string> kM
@@ -947,7 +947,7 @@ const base::FeatureParam<std::string> kM
#endif // BUILDFLAG(IS_WIN)
// Enables the Live Caption feature on supported devices.
@@ -457,7 +459,7 @@
// getDisplayMedia captures. Note: This flag does not control if the "Share this
--- a/ui/views/controls/menu/menu_item_view.cc
+++ b/ui/views/controls/menu/menu_item_view.cc
@@ -819,7 +819,7 @@ void MenuItemView::SetAlerted() {
@@ -823,7 +823,7 @@ void MenuItemView::SetAlerted() {
}
bool MenuItemView::ShouldShowNewBadge() const {

View File

@@ -27,6 +27,32 @@ base/test/data/pe_image_reader/module_with_exports_x86.dll
base/test/data/pe_image_reader/signed.exe
base/test/data/pe_image_reader/signed_twice.exe
base/test/data/pe_image_reader/unsigned.exe
base/test/data/pma_corpus/02de1d6feb232c0d7e1ebe627d2ff87fd3c61f12
base/test/data/pma_corpus/089c8699e4f8e8dbac17634688abb4372a8265a4
base/test/data/pma_corpus/1438d72013cd411240e1e8491444c415f65ddf45
base/test/data/pma_corpus/16a30b4859bd46299c09252d1add64083237fab6
base/test/data/pma_corpus/19ec42cf9685c554272a2e3df160258bcebc0a9e
base/test/data/pma_corpus/2052e82ae86a69bc74846d3f5255d893a52a36db
base/test/data/pma_corpus/35f051f7443c2b47db7a61a55a12d4fa16994322
base/test/data/pma_corpus/461cae7adf10e934830306f6b188aeeeef6dc4eb
base/test/data/pma_corpus/554ac225771de25678234a123dd4db53c43b6247
base/test/data/pma_corpus/60dbc642a3faaa5d605c7f9d1b3c0e22f1909804
base/test/data/pma_corpus/635d1e199bbdef8bab3e0480517bc7845d24c7f2
base/test/data/pma_corpus/6dfc1e869a876457f8caa05847a298acf6fa4267
base/test/data/pma_corpus/779c9cca4b37080d4e53e8632490fcb0fa407452
base/test/data/pma_corpus/80383e92762ab4477251de4df76466683f089291
base/test/data/pma_corpus/9054dd54cd53232454680f58dd874966ed37df0d
base/test/data/pma_corpus/998dd89a571367a817a0821f813dc014ece41101
base/test/data/pma_corpus/aeeb34d5307ddc6174deb4b49c597417d8f2994d
base/test/data/pma_corpus/b10c5d07fc11e666829a4d2baa4144555b946840
base/test/data/pma_corpus/c2ea0b64f11ca77b163d4449a98a6439a6574ff3
base/test/data/pma_corpus/cc4dee8b568b1dd3f8300148f12bb39b73b9ca9d
base/test/data/pma_corpus/cf1451660b2f61ee24b0d9b7369daa711048de08
base/test/data/pma_corpus/e5f3d47daff12a06390faeecb42eb8c8c4cce6cb
base/test/data/pma_corpus/e85f9c5c6dd9c85c5b8cec5eb571d92aa52147a0
base/test/data/pma_corpus/f6794b314fe4686c98b38428cee982900b0ad693
base/test/data/pma_corpus/f6bd135700d1a16b147966f7615305123dccde43
base/test/data/pma_corpus/fe59520ddd1b0cc390aa6b3d2d932824871efff9
base/test/data/tzdata/icu/44/le/metaZones.res
base/test/data/tzdata/icu/44/le/timezoneTypes.res
base/test/data/tzdata/icu/44/le/zoneinfo64.res
@@ -41,8 +67,6 @@ chrome/app/etw_events/MSG00001.bin
chrome/app/etw_events/chrome_events_winTEMP.BIN
chrome/browser/ash/power/ml/smart_dim/20190521_example_preprocessor_config.pb
chrome/browser/navigation_predictor/test/preloading_heuristics.tflite
chrome/browser/resources/chromeos/accessibility/accessibility_common/third_party/mediapipe_task_vision/mediapipe_task_vision.tar.xz
chrome/browser/resources/chromeos/accessibility/accessibility_common/third_party/pumpkin/pumpkin-3.0.tar.xz
chrome/browser/resources/chromeos/accessibility/chromevox/earcons/alert_modal.ogg
chrome/browser/resources/chromeos/accessibility/chromevox/earcons/alert_nonmodal.ogg
chrome/browser/resources/chromeos/accessibility/chromevox/earcons/button.ogg
@@ -71,6 +95,8 @@ chrome/browser/resources/chromeos/accessibility/chromevox/earcons/selection_reve
chrome/browser/resources/chromeos/accessibility/chromevox/earcons/skip.ogg
chrome/browser/resources/chromeos/accessibility/chromevox/earcons/wrap.ogg
chrome/browser/resources/chromeos/accessibility/chromevox/earcons/wrap_edge.ogg
chrome/browser/resources/chromeos/accessibility/common/testing/fake_facegaze_assets_dlc.tar.xz
chrome/browser/resources/chromeos/accessibility/common/testing/fake_pumpkin_dlc.tar.xz
chrome/browser/resources/chromeos/accessibility/select_to_speak/earcons/null_selection.ogg
chrome/browser/resources/media/mei_preload/preloaded_data.pb
chrome/credential_provider/eventlog/gcp_eventlog_messages.mc
@@ -1271,6 +1297,7 @@ net/data/pac_file_fetcher_unittest/gzipped_pac
net/data/pac_file_fetcher_unittest/utf16be_pac
net/data/parse_certificate_unittest/v3_certificate_template.pk8
net/data/spdy_tests/examples_07.hpack
net/data/ssl/certificates/2_client_certs_1_key.p12
net/data/ssl/certificates/client-empty-password.p12
net/data/ssl/certificates/client-nokey.p12
net/data/ssl/certificates/client-null-password.p12
@@ -1939,6 +1966,7 @@ third_party/abseil-cpp/absl/time/internal/cctz/testdata/zoneinfo/Universal
third_party/abseil-cpp/absl/time/internal/cctz/testdata/zoneinfo/W-SU
third_party/abseil-cpp/absl/time/internal/cctz/testdata/zoneinfo/WET
third_party/abseil-cpp/absl/time/internal/cctz/testdata/zoneinfo/Zulu
third_party/accessibility_test_framework/src/gradle/wrapper/gradle-wrapper.jar
third_party/afl/src/testcases/archives/common/bzip2/small_archive.bz2
third_party/afl/src/testcases/archives/common/cab/small_archive.cab
third_party/afl/src/testcases/archives/common/compress/small_archive.Z
@@ -1978,9 +2006,6 @@ third_party/anonymous_tokens/src/anonymous_tokens/testdata/strong_rsa_modulus307
third_party/anonymous_tokens/src/anonymous_tokens/testdata/strong_rsa_modulus4096_example.binarypb
third_party/beto-core/src/nearby/connections/ukey2/ukey2_jni/java/gradle/wrapper/gradle-wrapper.jar
third_party/beto-core/src/nearby/presence/ldt_np_jni/java/LdtNpJni/gradle/wrapper/gradle-wrapper.jar
third_party/beto-core/src/nearby/presence/np_cpp_ffi/fuzz/corpus/V0AdvEmpty
third_party/beto-core/src/nearby/presence/np_cpp_ffi/fuzz/corpus/V0AdvSimple
third_party/beto-core/src/nearby/presence/np_cpp_ffi/fuzz/corpus/V1AdvSimple
third_party/blink/manual_tests/WebKitSite.webarchive
third_party/blink/manual_tests/accessibility/resources/AppletTest.class
third_party/blink/manual_tests/plugins/test.swf
@@ -1994,6 +2019,7 @@ third_party/blink/manual_tests/resources/helpCursor.tiff
third_party/blink/manual_tests/resources/orange.mov
third_party/blink/manual_tests/resources/plain-text-paste.dmg
third_party/blink/manual_tests/resources/spinbox.swf
third_party/blink/perf_tests/bindings/resources/wasm_webgl.wasm
third_party/blink/perf_tests/sun_spider/resources/TimeProfile20us.tracetemplate
third_party/blink/perf_tests/webcodecs/resources/720p.h264
third_party/blink/renderer/bindings/core/v8/serialization/fuzz_corpus/blink-0bb59816-x86
@@ -7243,7 +7269,10 @@ third_party/dawn/third_party/webgpu-cts/src/resources/cache/webgpu/shader/execut
third_party/dawn/third_party/webgpu-cts/src/resources/cache/webgpu/shader/execution/binary/af_division.bin
third_party/dawn/third_party/webgpu-cts/src/resources/cache/webgpu/shader/execution/binary/af_logical.bin
third_party/dawn/third_party/webgpu-cts/src/resources/cache/webgpu/shader/execution/binary/af_matrix_addition.bin
third_party/dawn/third_party/webgpu-cts/src/resources/cache/webgpu/shader/execution/binary/af_matrix_matrix_multiplication.bin
third_party/dawn/third_party/webgpu-cts/src/resources/cache/webgpu/shader/execution/binary/af_matrix_scalar_multiplication.bin
third_party/dawn/third_party/webgpu-cts/src/resources/cache/webgpu/shader/execution/binary/af_matrix_subtraction.bin
third_party/dawn/third_party/webgpu-cts/src/resources/cache/webgpu/shader/execution/binary/af_matrix_vector_multiplication.bin
third_party/dawn/third_party/webgpu-cts/src/resources/cache/webgpu/shader/execution/binary/af_multiplication.bin
third_party/dawn/third_party/webgpu-cts/src/resources/cache/webgpu/shader/execution/binary/af_remainder.bin
third_party/dawn/third_party/webgpu-cts/src/resources/cache/webgpu/shader/execution/binary/af_subtraction.bin
@@ -7329,9 +7358,7 @@ third_party/dawn/third_party/webgpu-cts/src/resources/cache/webgpu/shader/execut
third_party/dawn/third_party/webgpu-cts/src/resources/cache/webgpu/shader/execution/unary/f32_arithmetic.bin
third_party/dawn/third_party/webgpu-cts/src/resources/cache/webgpu/shader/execution/unary/f32_conversion.bin
third_party/dawn/third_party/webgpu-cts/src/resources/cache/webgpu/shader/execution/unary/i32_arithmetic.bin
third_party/dawn/third_party/webgpu-cts/src/resources/cache/webgpu/shader/execution/unary/i32_complement.bin
third_party/dawn/third_party/webgpu-cts/src/resources/cache/webgpu/shader/execution/unary/i32_conversion.bin
third_party/dawn/third_party/webgpu-cts/src/resources/cache/webgpu/shader/execution/unary/u32_complement.bin
third_party/dawn/third_party/webgpu-cts/src/resources/cache/webgpu/shader/execution/unary/u32_conversion.bin
third_party/dawn/third_party/webgpu-cts/src/resources/cache/webgpu/shader/execution/unpack2x16float.bin
third_party/dawn/third_party/webgpu-cts/src/resources/cache/webgpu/shader/execution/unpack2x16snorm.bin
@@ -7353,6 +7380,77 @@ third_party/dawn/third_party/webgpu-cts/src/resources/four-colors-vp9-bt601-vfli
third_party/dawn/third_party/webgpu-cts/src/resources/four-colors-vp9-bt601.mp4
third_party/dawn/third_party/webgpu-cts/src/resources/four-colors-vp9-bt601.webm
third_party/dawn/third_party/webgpu-cts/src/resources/four-colors-vp9-bt709.webm
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/about-blank-first.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/animation.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/basic-stack.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/basic.cpuprofile.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/basic.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/changing-priority.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/cls-cluster-max-duration.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/cls-cluster-max-timeout.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/cls-cluster-navigation.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/cls-last-cluster-max-duration.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/cls-multiple-frames.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/cls-single-frame.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/fenced-frame-fledge.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/forced-layouts-and-no-gpu.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/generic-about-tracing.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/idle-callback.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/idle-tasks.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/interactive-time.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/invalid-animation-events.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/invalidate-style-class-name-change.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/large-layout-small-recalc.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/large-profile.cpuprofile.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/large-recalc-style.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/lcp-images-rasterizer.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/lcp-images.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/lcp-web-font.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/load-simple.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/mainWasm_profile.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/many-requests.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/missing-process-data.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/missing-tracing-start.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/multiple-lcp-main-frame.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/multiple-navigations-render-blocking.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/multiple-navigations-same-id.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/multiple-navigations-with-iframes.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/multiple-navigations.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/multiple-top-level-renderers.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/nested-initiators.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/nested-interactions.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/node-fibonacci-website.cpuprofile.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/one-second-interaction.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/parser-blocking-after-paint.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/postmessage-initiators.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/react-hello-world.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/recursive-blocking-js.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/recursive-counting-js.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/redirects-subresource-multiple.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/redirects.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/reload-and-trace-page.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/reload-no-tti.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/render-blocking-in-iframe.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/request-with-query-param.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/set-timeout-long-task.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/simple-js-program.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/slow-interaction-button-click.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/slow-interaction-keydown.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/style-invalidation-change-attribute.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/style-invalidation-change-id.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/sync-like-timings.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/threejs-gpu.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/timer-initiators.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/timings-track.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/two-functions-recursion.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/two-workers.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/user-timings-complex.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/user-timings.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/web-dev-initial-url.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/web-dev-with-advanced-instrumentation.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/web-dev-with-commit.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/web-dev.json.gz
third_party/devtools-frontend/src/front_end/panels/timeline/fixtures/traces/web-sockets.json.gz
third_party/devtools-frontend/src/test/e2e/resources/media/corrupt.webm
third_party/devtools-frontend/src/test/e2e/resources/media/fisch.webm
third_party/devtools-frontend/src/test/e2e/resources/network/webbundle.wbn
@@ -7368,71 +7466,6 @@ third_party/devtools-frontend/src/test/e2e/resources/sources/wasm/syntax-highlig
third_party/devtools-frontend/src/test/e2e/resources/sources/wasm/unreachable.wasm
third_party/devtools-frontend/src/test/e2e/resources/sources/wasm/unreachable_with_dwarf.wasm
third_party/devtools-frontend/src/test/e2e/resources/sources/wasm/wasm-with-sourcemap.wasm
third_party/devtools-frontend/src/test/unittests/fixtures/traces/about-blank-first.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/animation.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/basic-stack.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/basic.cpuprofile.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/basic.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/changing-priority.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/cls-cluster-max-duration.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/cls-cluster-max-timeout.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/cls-cluster-navigation.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/cls-last-cluster-max-duration.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/cls-multiple-frames.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/cls-single-frame.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/fenced-frame-fledge.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/forced-layouts-and-no-gpu.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/generic-about-tracing.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/idle-callback.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/idle-tasks.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/interactive-time.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/invalid-animation-events.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/invalidate-style-class-name-change.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/large-layout-small-recalc.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/large-recalc-style.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/lcp-images.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/lcp-web-font.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/load-simple.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/mainWasm_profile.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/many-requests.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/missing-process-data.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/missing-tracing-start.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/multiple-lcp-main-frame.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/multiple-navigations-same-id.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/multiple-navigations-with-iframes.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/multiple-navigations.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/multiple-top-level-renderers.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/nested-initiators.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/nested-interactions.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/node-fibonacci-website.cpuprofile.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/one-second-interaction.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/react-hello-world.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/recursive-blocking-js.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/recursive-counting-js.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/redirects-subresource-multiple.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/redirects.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/reload-and-trace-page.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/reload-no-tti.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/request-with-query-param.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/set-timeout-long-task.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/simple-js-program.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/slow-interaction-button-click.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/slow-interaction-keydown.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/style-invalidation-change-attribute.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/style-invalidation-change-id.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/sync-like-timings.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/threejs-gpu.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/timer-initiators.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/timings-track.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/two-functions-recursion.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/two-workers.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/user-timings-complex.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/user-timings.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/web-dev-initial-url.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/web-dev-with-advanced-instrumentation.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/web-dev-with-commit.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/web-dev.json.gz
third_party/devtools-frontend/src/test/unittests/fixtures/traces/web-sockets.json.gz
third_party/devtools-frontend/src/third_party/image_diff/linux/image_diff
third_party/devtools-frontend/src/third_party/image_diff/linux/libbase.so
third_party/devtools-frontend/src/third_party/image_diff/linux/libboringssl.so
@@ -10955,221 +10988,7 @@ third_party/icu/source/test/testdata/uni-text.bin
third_party/icu/tzres/metaZones.res
third_party/icu/tzres/timezoneTypes.res
third_party/icu/tzres/zoneinfo64.res
third_party/jni_zero/samples/java/src/org/jni_zero/samples/JavapClass.class
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/av1-film_grain.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/av1-show_existing_frame.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/av1-svc-L2T2.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/blackwhite_yuv444p-frame.av1.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/bus_cif_20f_b1600.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/bus_cif_20f_b1600_bd10.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/bus_cif_20f_b3200.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/bus_cif_20f_b3200_bd10.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/bus_cif_20f_b800.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/bus_cif_20f_b800_bd10.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/chromoting_numbers_720p_10f_q0.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/chromoting_numbers_720p_10f_q0_bd10.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/chromoting_numbers_720p_10f_q16.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/chromoting_numbers_720p_10f_q16_bd10.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/chromoting_numbers_720p_10f_q16_coltile4.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/chromoting_numbers_720p_10f_q16_coltile4_bd10.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/chromoting_numbers_720p_10f_q32.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/chromoting_numbers_720p_10f_q32_bd10.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/chromoting_numbers_720p_10f_q32_coltile4.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/chromoting_numbers_720p_10f_q32_coltile4_bd10.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/chromoting_numbers_720p_10f_q48.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/chromoting_numbers_720p_10f_q48_bd10.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/chromoting_numbers_720p_10f_q48_coltile4.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/chromoting_numbers_720p_10f_q48_coltile4_bd10.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/crew_720p_10f_q0.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/crew_720p_10f_q0_bd10.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/crew_720p_10f_q16.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/crew_720p_10f_q16_bd10.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/crew_720p_10f_q16_coltile4.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/crew_720p_10f_q16_coltile4_bd10.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/crew_720p_10f_q32.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/crew_720p_10f_q32_bd10.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/crew_720p_10f_q32_coltile4.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/crew_720p_10f_q32_coltile4_bd10.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/crew_720p_10f_q48.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/crew_720p_10f_q48_bd10.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/crew_720p_10f_q48_coltile4.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/crew_720p_10f_q48_coltile4_bd10.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/handmade_streams/bus_cif.y4m_10f_q48_handmade_8.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/handmade_streams/bus_cif.y4m_10f_q48_handmade_9.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/handmade_streams/crew_720p.y4m_10f_q48_bd10_handmade_4.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/handmade_streams/crew_720p.y4m_10f_q48_bd10_handmade_5.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/handmade_streams/crew_720p.y4m_10f_q48_bd10_handmade_6.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/handmade_streams/crew_720p.y4m_10f_q48_handmade_1.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/handmade_streams/crew_720p.y4m_10f_q48_handmade_2.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/handmade_streams/crew_720p.y4m_10f_q48_handmade_3.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/handmade_streams/crew_720p.y4m_3f_q48_handmade_7.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/legacy_streams/bus_cif_20f_b1600.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/legacy_streams/bus_cif_20f_b1600_bd10.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/legacy_streams/bus_cif_20f_b3200.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/legacy_streams/bus_cif_20f_b3200_bd10.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/legacy_streams/bus_cif_20f_b800.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/legacy_streams/bus_cif_20f_b800_bd10.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/legacy_streams/chromoting_numbers_720p_10f_q0.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/legacy_streams/chromoting_numbers_720p_10f_q0_bd10.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/legacy_streams/chromoting_numbers_720p_10f_q16.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/legacy_streams/chromoting_numbers_720p_10f_q16_bd10.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/legacy_streams/chromoting_numbers_720p_10f_q16_coltile4.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/legacy_streams/chromoting_numbers_720p_10f_q16_coltile4_bd10.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/legacy_streams/chromoting_numbers_720p_10f_q32.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/legacy_streams/chromoting_numbers_720p_10f_q32_bd10.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/legacy_streams/chromoting_numbers_720p_10f_q32_coltile4.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/legacy_streams/chromoting_numbers_720p_10f_q32_coltile4_bd10.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/legacy_streams/chromoting_numbers_720p_10f_q48.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/legacy_streams/chromoting_numbers_720p_10f_q48_bd10.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/legacy_streams/chromoting_numbers_720p_10f_q48_coltile4.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/legacy_streams/chromoting_numbers_720p_10f_q48_coltile4_bd10.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/legacy_streams/crew_720p_10f_q0.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/legacy_streams/crew_720p_10f_q0_bd10.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/legacy_streams/crew_720p_10f_q16.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/legacy_streams/crew_720p_10f_q16_bd10.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/legacy_streams/crew_720p_10f_q16_coltile4.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/legacy_streams/crew_720p_10f_q16_coltile4_bd10.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/legacy_streams/crew_720p_10f_q32.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/legacy_streams/crew_720p_10f_q32_bd10.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/legacy_streams/crew_720p_10f_q32_coltile4.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/legacy_streams/crew_720p_10f_q32_coltile4_bd10.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/legacy_streams/crew_720p_10f_q48.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/legacy_streams/crew_720p_10f_q48_bd10.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/legacy_streams/crew_720p_10f_q48_coltile4.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/legacy_streams/crew_720p_10f_q48_coltile4_bd10.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/legacy_streams/soccer_cif_20f_q0.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/legacy_streams/soccer_cif_20f_q0_bd10.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/legacy_streams/soccer_cif_20f_q16.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/legacy_streams/soccer_cif_20f_q16_bd10.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/legacy_streams/soccer_cif_20f_q32.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/legacy_streams/soccer_cif_20f_q32_bd10.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/legacy_streams/soccer_cif_20f_q48.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/legacy_streams/soccer_cif_20f_q48_bd10.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/clusterfuzz-testcase-minimized-av1_dec_fuzzer-5691025878679552
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/clusterfuzz-testcase-minimized-av1_dec_fuzzer_threaded-5188188321087488
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/clusterfuzz-testcase-minimized-av1_dec_fuzzer_threaded-5745774098382848
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-01e9d336a58cde06dd3925e8f6bd194f9d0eeb63dcadd6f80cbe624ba7163513
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-02101c458b4865f54fb061201a08e507fcdbdcd61a576101364531ef4654c24a
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-0375d36882a4e4c648557651bcdacf9fd08862dcc7a809f75841035e6ddb4494
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-047ea4f1629cdcdc9c08a043b1d13862a00450402f73072dab46e739cce1808f
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-05157197db0ab08e5d2de4c20c585be066728dfd49dbd02d8f9f4e94f8a37c36
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-0736ca7384a18f799b44f3f439d53b4aa33879d4bcbc0bdce061e36473d08b5d
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-0b210c6f31c43c83280cb2d7cd7e5be93a16226bc60d8fcc2ba7d459daa6f039
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-0d577fd7673b4e3cc6064532c6333c08b0ebc27366b96eaff21b60f316d31131
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-0eb48bf0104abd7590ef3079b2dc50099097164d0811d22f140c595150c17d8e
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-0eba5c02ae41c348c7477380933b9f8e023a4e797d9977bb6dd28f9d179a0cc0
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-116ce919ca945a203cdd1793b256a98e36debb8da1a3be585a04049cd2b7dd20
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-1445082a5d6de54ea9ed4ad317f55c34d055d0c08d0f9e2d77d254ad071deed8
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-1b196a734f511862058a083546c96cf5b8d2de348cf8fc792ac9386d770bf643
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-1daac7c9dcf0d6171ac10493835b06edc44de17c18edae0f1fc6530950e88b7e
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-20fafc08d2558133f0bec26291f17331d6a518dbb773552528c193e510e49510
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-273717693c5ffec3b99c10174e9d2b2dcc16564446f35a0a67abf850c8c58e26
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-2a99151a172db59eb95c072a8286daa883575baa1f511a5f5476e3b46c12ee25
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-3053905db2816539b2eb7613ce57a294cda248eba54527d3f02fc00463eda012
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-34b41f4146be697e7539acb3dac0badadfcc4b5c45b23d6df7b5faa437d1043d
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-39e3c2f15c105770aa444b4510a2c485f88ac28748bc47e36f72a6b35b856222
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-3a9083585f6de8cb0360d1a5d6fef379ae60b69a4443b7d860d31aed090c287b
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-3c0d263bd3d7f6c5cd17b137106215749613900a0ce7a989f640ad2952c50713
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-3c20474900ae3408aeca119392154c7972fa15fff97a2e0dbc165382f4310fbd
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-3d83dfa72c1ffd7b4f47128d9254a846ec0861c65d8442b0bb0c0334bed62e91
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-4203de2093a94168edf6c4ec35f54724739d18fea56284e78179b5df8146d97b
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-4397653d80fac5c2d4da2b5befb84d48c6a92305648945609e247fc0ca6a617e
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-442b18c83f19d842a60a20df4da6e21ff01f90d06fd1d5fcaac88630bad9619d
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-448adaa7e1ff1fc85020bfc61072008f72dfcb32297676d1b995e6ffb2f5ab3b
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-4556c4f1d79e46187e371e5711dbcb65f08ee795084f1e574ae12827520ab1b9
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-45f8ab374eaa322fecdbe133eea88beb54cd1295ad494295086a7314f69157fa
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-463a23afef81696ef9b201d7d89601a1e19036d349bafee3c0d4c8bc62d1d851
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-46e1bbfa3cfc6df1747b136f1c4c0b7713b1a1b8f8f70c72a49f604b6d48dd32
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-471e27f25f33f9bfc42236b73e6fb755531c183baae00e5f74a42d6565c5e798
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-4a61b04f9848ffb11e18b03a30a0d4db6456bfd2fb0ada7647bf66b80cceb2f8
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-4cca5823343d9738c284b44f6b9c8a0e5c5c12cf4b97e1af0d725f9d50ca9d52
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-4d437655cc36120723043ed8955f69693c10382a2b3fd589ef9bbe7b673dcf25
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-4dd057f47aecac963efdbec706060d8b3786c0f0f33ea255cbef4d9ad014f1aa
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-4e2e41af9e2ff87bd13ff165cd65d95e7d2a8cacabb38967f224557792d9ab26
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-52322f7abfb1beebd5d6b0fcb3c9cfa7f372191865389a8de93257594a2475b9
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-52dbe36313bddd2ba1b275bef6f2a7a9e3795163ca212725a71f8abba088f6f1
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-555b7efb0c57df22441a3ade85f7a7d5836bb0f77938d4df2a30cee34eaa56f5
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-56c7804f1efb98762e133487fe255e25de14efac77b2e5c449c4d7f9fc882724
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-5819309788c97b5f4bf328732b41b739bc3694641dc4f8ebe7e4ac375da8ba5c
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-59fdffc522e562b391e9f2db792df444cebf23d1bcf944434cf0e8663b3917b2
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-5fe1ae08236912d27a651df89a9f9d6b190ed7f157402d938dd1e01e87410431
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-5fe1ae08236912d27a651df89a9f9d6b190ed7f157402d938dd1e01e87410431-180820165805198712
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-606b76157697d01c1e46003a74f1d5cbdeac75e6e6719c3b1a6bb933041435bc
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-69e28465207dd645690aa2179f3f91d0b2bb40621e073c5cf7de9620680f2e7e
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-6ad89777992d39221fea63ef61f7f4bbf9eaa0f7b8bce7696bac962fae0986a2
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-6c601b4692b36fd9c5d7a259ab40a4487cef078e33e170c915bca2a3866122c5
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-6d51416d4b20d1f26a6ced17e725d868651ba0d256e42c41cc22a6e0744be83f
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-75d870250e282ca0cbc3cdb6305dedff82a7a5f80f26f201dfe171bea7e091da
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-7604c264d179c35e53a4c3ae1d83c1c5ea24bb054f5796a8ebad942dfbe3b2ef
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-78210ecda17fd942b43bc0b0b5a935ee617e42a2e47a58df76ca21842106b2a6
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-7a7fd30c35945a24036442275f95588a8ff9e25f5aa2128cedc3c9fdfe265f92
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-7ec64f1fd27f63a3871ccdbba4aea83827be8288c2faccc023963abea4a49802
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-858aa4597b84bf901d743b2a88d4cf592cd58bb67003a1d0e01ae3a93420f1d9
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-864963c345bfd30e66eb1158807872b95850c70c69f3865f2c0145024b686b6e
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-8d2dfadd67103213c0e0513e276645671f332207a698029de1b8405a77ae8609
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-8d42c9d193d34ec6b5189e7a42e02b13bc590c0fdd59277369b98003b3e9d9be
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-8dea4165ef368ed87c51a6abeef7f5c4f588e2364deb93ac08c7ca28041922e2
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-93e603209018e2fca3a74daae083c8e4a48964ac7f81fd5b68a1872c6bd60b75
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-986d39e0be233b45ff8ef2b559f9ebd3a070cfcdf50d7a73ab80747a68aba3be
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-9a5be1f567b77193991ed183b22d61d755d34382798c9f1ed7f9726eeed97c30
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-9a6abdeaf5079e18c6148efd1cf87175e76a78b5a3fedfc3683ffe15dc683bad
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-9a8fc783e3dad8da2fedf376d8a288fb5f0408a566b665cef9c9068714351e10
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-9b525074e932f20e2851896da6d7153de5ab690d389f4bb6b17f9e2af42483f7
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-9c098c901269ecdbfa24e00dcb00b7f9389c089ad01a0c9ff9f46be3b6d52bf3
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-9dcdf43d146d58af08b55f2014190b623fb7662a54953c8d958e270156cfc3ba
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-a209ba95183c065f2cc919b8df1c7d1470a79d904d2622d66f4f4ea674dfca29
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-a3229c344e8b0e4d34d99708a8270ba40d54322293381c0998158e821bf48a95
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-a3568af97a0b07d50e7ca7d814ffa862a2c0151ce83419bd4556b812f073e7c0
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-a6d16b001388bc06d8ae759cacc249506a82349a98ae9c2ba1cd743651a6726a
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-ab80b2ac3ed08b834c811a986ed72f3ce042bf721de0665bf58ff23e48b89e51
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-ac33030ed8838f2d9f4fb9df10947aee95b3f171824acacb295f7574b775d6ce
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-ad337afd734af3695a102a8a182f5f7fdb9031aa2e6468e2898ed26aac53466c
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-ae2fa1b460049d221eb50018e23a7ec7e4d8b6c184fc4c611ee05a630058c230
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-b19b03c0afda7c4f71c338d7f9507ea9018fd4b3312e3f73a92c4f4dcef1cc0c
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-b4ad7b816450e9bbec09e6ecd352136c79e60e60ad9c586c1dcdf104f1c3d1b5
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-b5dd74aac6ef5c54cedfe187ffe76c6c10d5305e3e56a43e1f65e9a7a876c7e5
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-b75b48028cd5124968d6d6eb2d6cda3cd6e662655ac7efb813055f4cd755691b
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-b9066636781058ce548d2b9612eb87db86e0ae45b0cb9c8dea040f011cd8eb0a
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-b9cfbd8a2af6cd8ac3fff5f189af5a5056f1cc204b652f87c47f33f5e462d254
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-bb84067fa88e30927051e51d0a4b7b90262c08141024b17b80e70d93106f44d5
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-bc2b1d187bd34c9f8fca51badfd0f9d3cb75ced0620d1417e3af0f28d8029883
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-bc397920864a518f15fd81f50369abb04fa52b6fcde37d8869db303dc7f7dcd4
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-c0c7846d12783a96f88536844cfa59250fccda03b00a0beac9986411da509ea0
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-c15f37dcb6c195e23da4b5952a4e481d99c5cfcc8245a13bc7e339c5d8b5da10
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-c2bcb26136dcffed66cfc10f106ba390852c12aa65e578bd0c7ba1e0825df9cc
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-c3bdc0fc903f7ba36cd925990425aaac8f321aebe958c40ee0fa0a5eb9849ab0
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-c7a3354a9bd0261cd41223077d71b0da978ed1b5e3edaa02d779ef9e4f906ba7
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-cb34ddefebb7a59a5cd4f1f0b911b4a8cb4fab328e7480293c9fcd831f16a54a
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-cc9855475c5dc9435bfe52213541146ae21d357d3ab59664f8891f093d75ad9f
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-cca9870136095852a2c4772adc4abff3f743479165811531d16ff089a776c7e3
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-cca9870136095852a2c4772adc4abff3f743479165811531d16ff089a776c7e3-180726081622488046
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-d2df6f6644c1d3abe719f14d32c2eb52a4c171c8830a3b01857faf55a92e459d
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-d37adad5225836cba10d9fe0f7702a3f03d34de32e0bb00753c2a1813b88f815
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-d3e630a44c59731c4bdc5ea3b19329b873c5644b82a27824b9938bc66f17fada
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-d4ab69f151cca23768c073d2d7eafe16449017d44a0c5323f5904699311f3d42
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-d8bd9433acf2dfac0f99e5e980734baf46691211b7ad3b32ce7768a9d7c2fbbb
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-d9ed9144becf592d2e078c978c8767cfecf2ea98a69a91e555610d70c35f5051
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-db0e5e5a38e3271b0304d9aa9475c054496bca6418716016d1b39eeed1906acb
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-dbe3b0420896d7a13b3c7d52dcd097903e21b67ff325825bfe745ec41be0b7c3
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-dcf87edd6952a3469f94f1d394850fda523e6421274a0190e65cb365e98297cd
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-e63ef22a629c66bab27da362df140c47b8e3649a50abb97a8cfea9e03b4c2ea2
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-e927c6c6d488b6f14fb90388582adc8477fd6706aedf5531dbbae2fd769aa0db
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-e93df00ee75401d0341cd1f78b839a5431d9de6962898ac68e6414a381f9cbe1
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-ebe05265d8958228ed38f6c7c57c92d4a5bde6d26d904fca1a763b6825c788c7
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-ebef1187102c6635b2ea7c1ff554df2e317b5846220e137dd8ed3e0ba20f2ce7
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-f2fe4473b6f4d2322e56d507f6d3a2e4f910b529e65cdb93f28e3cf598c47be8
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-f4e31029abca558bd71cbb9388aa4529fab17cd68f80fab426d73610868b8976
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-f8b9a1f678e8d97866693587736f38ce2f5ce3c24ff253b5e18691de3100fe9e
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/poc/poc-fe5bfa5593ab037aa095e2099c2e1c4d94ccb28034bb57d598990ac870d395c1
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/soccer_cif_20f_q0.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/soccer_cif_20f_q0_bd10.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/soccer_cif_20f_q16.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/soccer_cif_20f_q16_bd10.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/soccer_cif_20f_q32.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/soccer_cif_20f_q32_bd10.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/soccer_cif_20f_q48.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/soccer_cif_20f_q48_bd10.ivf
third_party/libaom/fuzz/av1_dec_fuzzer_corpus/test-25fps.av1.ivf
third_party/jni_zero/test/java/src/org/jni_zero/JavapClass.class
third_party/libavif/src/android_jni/gradle/wrapper/gradle-wrapper.jar
third_party/libavif/src/tests/data/cosmos1650_yuv444_10bpc_p3pq.y4m
third_party/libavif/src/tests/data/kodim03_yuv420_8bpc.y4m
@@ -13816,23 +13635,23 @@ third_party/rust/chromium_crates_io/vendor/regex-1.10.3/tests/fuzz/testdata/slow
third_party/rust/chromium_crates_io/vendor/regex-1.10.3/tests/fuzz/testdata/slow-unit-93c73a43581f205f9aaffd9c17e52b34b17becd0
third_party/rust/chromium_crates_io/vendor/regex-1.10.3/tests/fuzz/testdata/slow-unit-9ca9cc9929fee1fcbb847a78384effb8b98ea18a
third_party/rust/chromium_crates_io/vendor/regex-1.10.3/tests/fuzz/testdata/slow-unit-b8a052f4254802edbe5f569b6ce6e9b6c927e9d6
third_party/rust/chromium_crates_io/vendor/regex-automata-0.4.5/tests/fuzz/testdata/deserialize_dense_crash-9486fb7c8a93b12c12a62166b43d31640c0208a9
third_party/rust/chromium_crates_io/vendor/regex-automata-0.4.5/tests/fuzz/testdata/deserialize_dense_minimized-from-9486fb7c8a93b12c12a62166b43d31640c0208a9
third_party/rust/chromium_crates_io/vendor/regex-automata-0.4.5/tests/fuzz/testdata/deserialize_sparse_crash-0da59c0434eaf35e5a6b470fa9244bb79c72b000
third_party/rust/chromium_crates_io/vendor/regex-automata-0.4.5/tests/fuzz/testdata/deserialize_sparse_crash-18cfc246f2ddfc3dfc92b0c7893178c7cf65efa9
third_party/rust/chromium_crates_io/vendor/regex-automata-0.4.5/tests/fuzz/testdata/deserialize_sparse_crash-61fd8e3003bf9d99f6c1e5a8488727eefd234b98
third_party/rust/chromium_crates_io/vendor/regex-automata-0.4.5/tests/fuzz/testdata/deserialize_sparse_crash-a1b839d899ced76d5d7d0f78f9edb7a421505838
third_party/rust/chromium_crates_io/vendor/regex-automata-0.4.5/tests/fuzz/testdata/deserialize_sparse_crash-c383ae07ec5e191422eadc492117439011816570
third_party/rust/chromium_crates_io/vendor/regex-automata-0.4.5/tests/fuzz/testdata/deserialize_sparse_crash-d07703ceb94b10dcd9e4acb809f2051420449e2b
third_party/rust/chromium_crates_io/vendor/regex-automata-0.4.5/tests/fuzz/testdata/deserialize_sparse_crash-dbb8172d3984e7e7d03f4b5f8bb86ecd1460eff9
third_party/rust/chromium_crates_io/vendor/regex-automata-0.4.5/tests/gen/dense/multi_pattern_v2_fwd.bigendian.dfa
third_party/rust/chromium_crates_io/vendor/regex-automata-0.4.5/tests/gen/dense/multi_pattern_v2_fwd.littleendian.dfa
third_party/rust/chromium_crates_io/vendor/regex-automata-0.4.5/tests/gen/dense/multi_pattern_v2_rev.bigendian.dfa
third_party/rust/chromium_crates_io/vendor/regex-automata-0.4.5/tests/gen/dense/multi_pattern_v2_rev.littleendian.dfa
third_party/rust/chromium_crates_io/vendor/regex-automata-0.4.5/tests/gen/sparse/multi_pattern_v2_fwd.bigendian.dfa
third_party/rust/chromium_crates_io/vendor/regex-automata-0.4.5/tests/gen/sparse/multi_pattern_v2_fwd.littleendian.dfa
third_party/rust/chromium_crates_io/vendor/regex-automata-0.4.5/tests/gen/sparse/multi_pattern_v2_rev.bigendian.dfa
third_party/rust/chromium_crates_io/vendor/regex-automata-0.4.5/tests/gen/sparse/multi_pattern_v2_rev.littleendian.dfa
third_party/rust/chromium_crates_io/vendor/regex-automata-0.4.6/tests/fuzz/testdata/deserialize_dense_crash-9486fb7c8a93b12c12a62166b43d31640c0208a9
third_party/rust/chromium_crates_io/vendor/regex-automata-0.4.6/tests/fuzz/testdata/deserialize_dense_minimized-from-9486fb7c8a93b12c12a62166b43d31640c0208a9
third_party/rust/chromium_crates_io/vendor/regex-automata-0.4.6/tests/fuzz/testdata/deserialize_sparse_crash-0da59c0434eaf35e5a6b470fa9244bb79c72b000
third_party/rust/chromium_crates_io/vendor/regex-automata-0.4.6/tests/fuzz/testdata/deserialize_sparse_crash-18cfc246f2ddfc3dfc92b0c7893178c7cf65efa9
third_party/rust/chromium_crates_io/vendor/regex-automata-0.4.6/tests/fuzz/testdata/deserialize_sparse_crash-61fd8e3003bf9d99f6c1e5a8488727eefd234b98
third_party/rust/chromium_crates_io/vendor/regex-automata-0.4.6/tests/fuzz/testdata/deserialize_sparse_crash-a1b839d899ced76d5d7d0f78f9edb7a421505838
third_party/rust/chromium_crates_io/vendor/regex-automata-0.4.6/tests/fuzz/testdata/deserialize_sparse_crash-c383ae07ec5e191422eadc492117439011816570
third_party/rust/chromium_crates_io/vendor/regex-automata-0.4.6/tests/fuzz/testdata/deserialize_sparse_crash-d07703ceb94b10dcd9e4acb809f2051420449e2b
third_party/rust/chromium_crates_io/vendor/regex-automata-0.4.6/tests/fuzz/testdata/deserialize_sparse_crash-dbb8172d3984e7e7d03f4b5f8bb86ecd1460eff9
third_party/rust/chromium_crates_io/vendor/regex-automata-0.4.6/tests/gen/dense/multi_pattern_v2_fwd.bigendian.dfa
third_party/rust/chromium_crates_io/vendor/regex-automata-0.4.6/tests/gen/dense/multi_pattern_v2_fwd.littleendian.dfa
third_party/rust/chromium_crates_io/vendor/regex-automata-0.4.6/tests/gen/dense/multi_pattern_v2_rev.bigendian.dfa
third_party/rust/chromium_crates_io/vendor/regex-automata-0.4.6/tests/gen/dense/multi_pattern_v2_rev.littleendian.dfa
third_party/rust/chromium_crates_io/vendor/regex-automata-0.4.6/tests/gen/sparse/multi_pattern_v2_fwd.bigendian.dfa
third_party/rust/chromium_crates_io/vendor/regex-automata-0.4.6/tests/gen/sparse/multi_pattern_v2_fwd.littleendian.dfa
third_party/rust/chromium_crates_io/vendor/regex-automata-0.4.6/tests/gen/sparse/multi_pattern_v2_rev.bigendian.dfa
third_party/rust/chromium_crates_io/vendor/regex-automata-0.4.6/tests/gen/sparse/multi_pattern_v2_rev.littleendian.dfa
third_party/rust/chromium_crates_io/vendor/unicode-ident-1.0.12/tests/fst/xid_continue.fst
third_party/rust/chromium_crates_io/vendor/unicode-ident-1.0.12/tests/fst/xid_start.fst
third_party/skia/demos.skia.org/demos/mesh2d/canvaskit.wasm
@@ -14853,7 +14672,10 @@ third_party/webgpu-cts/src/src/resources/cache/webgpu/shader/execution/binary/af
third_party/webgpu-cts/src/src/resources/cache/webgpu/shader/execution/binary/af_division.bin
third_party/webgpu-cts/src/src/resources/cache/webgpu/shader/execution/binary/af_logical.bin
third_party/webgpu-cts/src/src/resources/cache/webgpu/shader/execution/binary/af_matrix_addition.bin
third_party/webgpu-cts/src/src/resources/cache/webgpu/shader/execution/binary/af_matrix_matrix_multiplication.bin
third_party/webgpu-cts/src/src/resources/cache/webgpu/shader/execution/binary/af_matrix_scalar_multiplication.bin
third_party/webgpu-cts/src/src/resources/cache/webgpu/shader/execution/binary/af_matrix_subtraction.bin
third_party/webgpu-cts/src/src/resources/cache/webgpu/shader/execution/binary/af_matrix_vector_multiplication.bin
third_party/webgpu-cts/src/src/resources/cache/webgpu/shader/execution/binary/af_multiplication.bin
third_party/webgpu-cts/src/src/resources/cache/webgpu/shader/execution/binary/af_remainder.bin
third_party/webgpu-cts/src/src/resources/cache/webgpu/shader/execution/binary/af_subtraction.bin
@@ -14939,9 +14761,7 @@ third_party/webgpu-cts/src/src/resources/cache/webgpu/shader/execution/unary/f16
third_party/webgpu-cts/src/src/resources/cache/webgpu/shader/execution/unary/f32_arithmetic.bin
third_party/webgpu-cts/src/src/resources/cache/webgpu/shader/execution/unary/f32_conversion.bin
third_party/webgpu-cts/src/src/resources/cache/webgpu/shader/execution/unary/i32_arithmetic.bin
third_party/webgpu-cts/src/src/resources/cache/webgpu/shader/execution/unary/i32_complement.bin
third_party/webgpu-cts/src/src/resources/cache/webgpu/shader/execution/unary/i32_conversion.bin
third_party/webgpu-cts/src/src/resources/cache/webgpu/shader/execution/unary/u32_complement.bin
third_party/webgpu-cts/src/src/resources/cache/webgpu/shader/execution/unary/u32_conversion.bin
third_party/webgpu-cts/src/src/resources/cache/webgpu/shader/execution/unpack2x16float.bin
third_party/webgpu-cts/src/src/resources/cache/webgpu/shader/execution/unpack2x16snorm.bin

View File

@@ -65,11 +65,11 @@ def clone(args): # pylint: disable=too-many-branches, too-many-statements
# depth=2 since generating LASTCHANGE and gpu_lists_version.h require at least two commits
get_logger().info('Cloning chromium source: %s', chromium_version)
if (args.output / '.git').exists():
run(['git', 'clean', '-fdx'], cwd=args.output, check=True)
run(['git', 'fetch', 'origin', 'tag', chromium_version, '--depth=2'],
cwd=args.output,
check=True)
run(['git', 'reset', '--hard', 'FETCH_HEAD'], cwd=args.output, check=True)
run(['git', 'clean', '-ffdx', '-e', 'uc_staging'], cwd=args.output, check=True)
else:
run([
'git', 'clone', '-c', 'advice.detachedHead=false', '-b', chromium_version, '--depth=2',
@@ -83,9 +83,9 @@ def clone(args): # pylint: disable=too-many-branches, too-many-statements
get_logger().info('Cloning depot_tools')
if dtpath.exists():
run(['git', 'clean', '-fdx'], cwd=dtpath, check=True)
run(['git', 'fetch', '--depth=1'], cwd=dtpath, check=True)
run(['git', 'reset', '--hard', 'FETCH_HEAD'], cwd=dtpath, check=True)
run(['git', 'clean', '-ffdx'], cwd=dtpath, check=True)
else:
run([
'git', 'clone', '--depth=1',
@@ -106,9 +106,9 @@ def clone(args): # pylint: disable=too-many-branches, too-many-statements
# gn requires full history to be able to generate last_commit_position.h
get_logger().info('Cloning gn')
if gnpath.exists():
run(['git', 'clean', '-fdx'], cwd=gnpath, check=True)
run(['git', 'fetch'], cwd=gnpath, check=True)
run(['git', 'reset', '--hard', 'FETCH_HEAD'], cwd=gnpath, check=True)
run(['git', 'clean', '-ffdx'], cwd=gnpath, check=True)
else:
run(['git', 'clone', "https://gn.googlesource.com/gn", str(gnpath)], check=True)