|
@@ -8,6 +8,7 @@ Disable CrowdDeny feature
|
|
---
|
|
---
|
|
.../res/xml/google_services_preferences.xml | 10 ---
|
|
.../res/xml/google_services_preferences.xml | 10 ---
|
|
.../android/java/res/xml/main_preferences.xml | 5 --
|
|
.../android/java/res/xml/main_preferences.xml | 5 --
|
|
|
|
+ .../java/res/xml/manage_sync_preferences.xml | 12 ----
|
|
.../java/res/xml/privacy_preferences.xml | 9 ---
|
|
.../java/res/xml/privacy_preferences.xml | 9 ---
|
|
.../EnhancedProtectionPromoController.java | 8 ---
|
|
.../EnhancedProtectionPromoController.java | 8 ---
|
|
.../EnhancedProtectionPromoUtils.java | 3 +-
|
|
.../EnhancedProtectionPromoUtils.java | 3 +-
|
|
@@ -21,13 +22,13 @@ Disable CrowdDeny feature
|
|
chrome/browser/browser_process_impl.cc | 29 --------
|
|
chrome/browser/browser_process_impl.cc | 29 --------
|
|
chrome/browser/browser_process_impl.h | 4 --
|
|
chrome/browser/browser_process_impl.h | 4 --
|
|
.../chrome_browsing_data_remover_delegate.cc | 2 +
|
|
.../chrome_browsing_data_remover_delegate.cc | 2 +
|
|
- .../browser/chrome_content_browser_client.cc | 26 +++++--
|
|
|
|
|
|
+ .../browser/chrome_content_browser_client.cc | 28 ++++++--
|
|
.../browser/chrome_content_browser_client.h | 2 +
|
|
.../browser/chrome_content_browser_client.h | 2 +
|
|
...ontent_browser_client_receiver_bindings.cc | 2 +
|
|
...ontent_browser_client_receiver_bindings.cc | 2 +
|
|
.../file_type_policies_component_installer.cc | 16 +----
|
|
.../file_type_policies_component_installer.cc | 16 +----
|
|
.../browser/component_updater/registration.cc | 7 --
|
|
.../browser/component_updater/registration.cc | 7 --
|
|
- .../chrome_download_manager_delegate.cc | 41 ++++-------
|
|
|
|
- .../chrome_download_manager_delegate.h | 8 ++-
|
|
|
|
|
|
+ .../chrome_download_manager_delegate.cc | 39 ++++------
|
|
|
|
+ .../chrome_download_manager_delegate.h | 9 ++-
|
|
.../browser/download/download_item_model.cc | 15 +++-
|
|
.../browser/download/download_item_model.cc | 15 +++-
|
|
chrome/browser/download/download_item_model.h | 4 ++
|
|
chrome/browser/download/download_item_model.h | 4 ++
|
|
chrome/browser/download/download_prefs.cc | 17 ++---
|
|
chrome/browser/download/download_prefs.cc | 17 ++---
|
|
@@ -42,7 +43,7 @@ Disable CrowdDeny feature
|
|
.../extensions/api/downloads/downloads_api.h | 11 ---
|
|
.../extensions/api/downloads/downloads_api.h | 11 ---
|
|
.../webstore_private/webstore_private_api.cc | 18 +----
|
|
.../webstore_private/webstore_private_api.cc | 18 +----
|
|
...e_file_system_access_permission_context.cc | 6 ++
|
|
...e_file_system_access_permission_context.cc | 6 ++
|
|
- ...me_file_system_access_permission_context.h | 5 +-
|
|
|
|
|
|
+ ...me_file_system_access_permission_context.h | 1 +
|
|
.../lookalike_url_controller_client.cc | 4 --
|
|
.../lookalike_url_controller_client.cc | 4 --
|
|
.../metrics/chrome_metrics_service_client.cc | 3 -
|
|
.../metrics/chrome_metrics_service_client.cc | 3 -
|
|
...ial_comparison_cert_verifier_controller.cc | 3 -
|
|
...ial_comparison_cert_verifier_controller.cc | 3 -
|
|
@@ -60,6 +61,8 @@ Disable CrowdDeny feature
|
|
.../download_protection_service.h | 5 --
|
|
.../download_protection_service.h | 5 --
|
|
.../url_lookup_service_factory.cc | 4 ++
|
|
.../url_lookup_service_factory.cc | 4 ++
|
|
.../safety_check/SafetyCheckMediator.java | 13 ----
|
|
.../safety_check/SafetyCheckMediator.java | 13 ----
|
|
|
|
+ .../java/res/layout/fre_uma_dialog.xml | 11 ---
|
|
|
|
+ .../ui/fre/FreUMADialogCoordinator.java | 3 -
|
|
.../ssl/sct_reporting_service_factory.cc | 11 +--
|
|
.../ssl/sct_reporting_service_factory.cc | 11 +--
|
|
.../browser/ssl/security_state_tab_helper.cc | 10 +--
|
|
.../browser/ssl/security_state_tab_helper.cc | 10 +--
|
|
...urce_filter_web_contents_helper_factory.cc | 4 ++
|
|
...urce_filter_web_contents_helper_factory.cc | 4 ++
|
|
@@ -78,12 +81,11 @@ Disable CrowdDeny feature
|
|
.../content/captive_portal_blocking_page.cc | 7 --
|
|
.../content/captive_portal_blocking_page.cc | 7 --
|
|
.../content/cert_report_helper.cc | 2 -
|
|
.../content/cert_report_helper.cc | 2 -
|
|
.../unified_consent_service.cc | 2 +-
|
|
.../unified_consent_service.cc | 2 +-
|
|
- .../file_system_access_file_writer_impl.cc | 1 -
|
|
|
|
- .../file_system_access_file_writer_impl.h | 16 +++--
|
|
|
|
- .../file_system_access_permission_context.h | 6 --
|
|
|
|
|
|
+ .../file_system_access_file_writer_impl.cc | 3 +-
|
|
|
|
+ .../file_system_access_file_writer_impl.h | 4 --
|
|
weblayer/BUILD.gn | 1 -
|
|
weblayer/BUILD.gn | 1 -
|
|
weblayer/test/BUILD.gn | 1 -
|
|
weblayer/test/BUILD.gn | 1 -
|
|
- 77 files changed, 182 insertions(+), 625 deletions(-)
|
|
|
|
|
|
+ 79 files changed, 175 insertions(+), 639 deletions(-)
|
|
|
|
|
|
diff --git a/chrome/android/java/res/xml/google_services_preferences.xml b/chrome/android/java/res/xml/google_services_preferences.xml
|
|
diff --git a/chrome/android/java/res/xml/google_services_preferences.xml b/chrome/android/java/res/xml/google_services_preferences.xml
|
|
--- a/chrome/android/java/res/xml/google_services_preferences.xml
|
|
--- a/chrome/android/java/res/xml/google_services_preferences.xml
|
|
@@ -120,6 +122,26 @@ diff --git a/chrome/android/java/res/xml/main_preferences.xml b/chrome/android/j
|
|
<Preference
|
|
<Preference
|
|
android:key="notifications"
|
|
android:key="notifications"
|
|
android:order="12"
|
|
android:order="12"
|
|
|
|
+diff --git a/chrome/android/java/res/xml/manage_sync_preferences.xml b/chrome/android/java/res/xml/manage_sync_preferences.xml
|
|
|
|
+--- a/chrome/android/java/res/xml/manage_sync_preferences.xml
|
|
|
|
++++ b/chrome/android/java/res/xml/manage_sync_preferences.xml
|
|
|
|
+@@ -80,16 +80,4 @@
|
|
|
|
+ android:key="sync_manage_data"
|
|
|
|
+ android:title="@string/sync_manage_data"/>
|
|
|
|
+
|
|
|
|
+- <!-- This category is only shown for advanced sync consent flow. -->
|
|
|
|
+- <PreferenceCategory
|
|
|
|
+- android:key="search_and_browse_category"
|
|
|
|
+- android:title="@string/search_and_browse_category"
|
|
|
|
+- app:isPreferenceVisible="false">
|
|
|
|
+-
|
|
|
|
+- <org.chromium.components.browser_ui.settings.ChromeSwitchPreference
|
|
|
|
+- android:key="url_keyed_anonymized_data"
|
|
|
|
+- android:title="@string/url_keyed_anonymized_data_title"
|
|
|
|
+- android:summary="@string/url_keyed_anonymized_data_summary"/>
|
|
|
|
+- </PreferenceCategory>
|
|
|
|
+-
|
|
|
|
+ </PreferenceScreen>
|
|
diff --git a/chrome/android/java/res/xml/privacy_preferences.xml b/chrome/android/java/res/xml/privacy_preferences.xml
|
|
diff --git a/chrome/android/java/res/xml/privacy_preferences.xml b/chrome/android/java/res/xml/privacy_preferences.xml
|
|
--- a/chrome/android/java/res/xml/privacy_preferences.xml
|
|
--- a/chrome/android/java/res/xml/privacy_preferences.xml
|
|
+++ b/chrome/android/java/res/xml/privacy_preferences.xml
|
|
+++ b/chrome/android/java/res/xml/privacy_preferences.xml
|
|
@@ -603,15 +625,21 @@ diff --git a/chrome/browser/chrome_content_browser_client.cc b/chrome/browser/ch
|
|
|
|
|
|
CertificateReportingServiceCertReporter(
|
|
CertificateReportingServiceCertReporter(
|
|
const CertificateReportingServiceCertReporter&) = delete;
|
|
const CertificateReportingServiceCertReporter&) = delete;
|
|
-@@ -942,7 +942,6 @@ class CertificateReportingServiceCertReporter : public SSLCertReporter {
|
|
|
|
|
|
+@@ -942,11 +942,12 @@ class CertificateReportingServiceCertReporter : public SSLCertReporter {
|
|
// SSLCertReporter implementation
|
|
// SSLCertReporter implementation
|
|
void ReportInvalidCertificateChain(
|
|
void ReportInvalidCertificateChain(
|
|
const std::string& serialized_report) override {
|
|
const std::string& serialized_report) override {
|
|
- service_->Send(serialized_report);
|
|
- service_->Send(serialized_report);
|
|
}
|
|
}
|
|
|
|
|
|
|
|
++#if defined(FULL_SAFE_BROWSING)
|
|
private:
|
|
private:
|
|
-@@ -1423,7 +1422,9 @@ void ChromeContentBrowserClient::PostAfterStartupTask(
|
|
|
|
|
|
+ CertificateReportingService* service_;
|
|
|
|
++#endif
|
|
|
|
+ };
|
|
|
|
+
|
|
|
|
+ #if BUILDFLAG(ENABLE_EXTENSIONS)
|
|
|
|
+@@ -1423,7 +1424,9 @@ void ChromeContentBrowserClient::PostAfterStartupTask(
|
|
InitNetworkContextsParentDirectory();
|
|
InitNetworkContextsParentDirectory();
|
|
|
|
|
|
DCHECK_CURRENTLY_ON(BrowserThread::UI);
|
|
DCHECK_CURRENTLY_ON(BrowserThread::UI);
|
|
@@ -621,7 +649,7 @@ diff --git a/chrome/browser/chrome_content_browser_client.cc b/chrome/browser/ch
|
|
}
|
|
}
|
|
|
|
|
|
bool ChromeContentBrowserClient::IsBrowserStartupComplete() {
|
|
bool ChromeContentBrowserClient::IsBrowserStartupComplete() {
|
|
-@@ -2163,7 +2164,7 @@ void ChromeContentBrowserClient::AppendExtraCommandLineSwitches(
|
|
|
|
|
|
+@@ -2163,7 +2166,7 @@ void ChromeContentBrowserClient::AppendExtraCommandLineSwitches(
|
|
}
|
|
}
|
|
#elif defined(OS_POSIX)
|
|
#elif defined(OS_POSIX)
|
|
#if defined(OS_ANDROID)
|
|
#if defined(OS_ANDROID)
|
|
@@ -630,7 +658,7 @@ diff --git a/chrome/browser/chrome_content_browser_client.cc b/chrome/browser/ch
|
|
#else
|
|
#else
|
|
bool enable_crash_reporter = false;
|
|
bool enable_crash_reporter = false;
|
|
if (crash_reporter::IsCrashpadEnabled()) {
|
|
if (crash_reporter::IsCrashpadEnabled()) {
|
|
-@@ -2300,6 +2301,9 @@ void ChromeContentBrowserClient::AppendExtraCommandLineSwitches(
|
|
|
|
|
|
+@@ -2300,6 +2303,9 @@ void ChromeContentBrowserClient::AppendExtraCommandLineSwitches(
|
|
command_line->AppendSwitch(
|
|
command_line->AppendSwitch(
|
|
switches::kSharedArrayBufferUnrestrictedAccessAllowed);
|
|
switches::kSharedArrayBufferUnrestrictedAccessAllowed);
|
|
}
|
|
}
|
|
@@ -640,7 +668,7 @@ diff --git a/chrome/browser/chrome_content_browser_client.cc b/chrome/browser/ch
|
|
#endif
|
|
#endif
|
|
if (!prefs->GetBoolean(prefs::kSandboxExternalProtocolBlocked))
|
|
if (!prefs->GetBoolean(prefs::kSandboxExternalProtocolBlocked))
|
|
command_line->AppendSwitch(kDisableSandboxExternalProtocolSwitch);
|
|
command_line->AppendSwitch(kDisableSandboxExternalProtocolSwitch);
|
|
-@@ -4258,6 +4262,7 @@ ChromeContentBrowserClient::CreateThrottlesForNavigation(
|
|
|
|
|
|
+@@ -4258,6 +4264,7 @@ ChromeContentBrowserClient::CreateThrottlesForNavigation(
|
|
&throttles);
|
|
&throttles);
|
|
#endif
|
|
#endif
|
|
|
|
|
|
@@ -648,7 +676,7 @@ diff --git a/chrome/browser/chrome_content_browser_client.cc b/chrome/browser/ch
|
|
// g_browser_process->safe_browsing_service() may be null in unittests.
|
|
// g_browser_process->safe_browsing_service() may be null in unittests.
|
|
safe_browsing::SafeBrowsingUIManager* ui_manager =
|
|
safe_browsing::SafeBrowsingUIManager* ui_manager =
|
|
g_browser_process->safe_browsing_service()
|
|
g_browser_process->safe_browsing_service()
|
|
-@@ -4272,6 +4277,7 @@ ChromeContentBrowserClient::CreateThrottlesForNavigation(
|
|
|
|
|
|
+@@ -4272,6 +4279,7 @@ ChromeContentBrowserClient::CreateThrottlesForNavigation(
|
|
std::make_unique<safe_browsing::DelayedWarningNavigationThrottle>(
|
|
std::make_unique<safe_browsing::DelayedWarningNavigationThrottle>(
|
|
handle));
|
|
handle));
|
|
}
|
|
}
|
|
@@ -656,7 +684,7 @@ diff --git a/chrome/browser/chrome_content_browser_client.cc b/chrome/browser/ch
|
|
|
|
|
|
// TODO(crbug.com/1052397): Revisit the macro expression once build flag switch
|
|
// TODO(crbug.com/1052397): Revisit the macro expression once build flag switch
|
|
// of lacros-chrome is complete.
|
|
// of lacros-chrome is complete.
|
|
-@@ -5670,6 +5676,7 @@ ChromeContentBrowserClient::GetSafeBrowsingUrlCheckerDelegate(
|
|
|
|
|
|
+@@ -5670,6 +5678,7 @@ ChromeContentBrowserClient::GetSafeBrowsingUrlCheckerDelegate(
|
|
const std::vector<std::string>& allowlist_domains) {
|
|
const std::vector<std::string>& allowlist_domains) {
|
|
DCHECK_CURRENTLY_ON(BrowserThread::IO);
|
|
DCHECK_CURRENTLY_ON(BrowserThread::IO);
|
|
|
|
|
|
@@ -664,7 +692,7 @@ diff --git a/chrome/browser/chrome_content_browser_client.cc b/chrome/browser/ch
|
|
// Should not bypass safe browsing check if the check is for enterprise
|
|
// Should not bypass safe browsing check if the check is for enterprise
|
|
// lookup.
|
|
// lookup.
|
|
if (!safe_browsing_enabled_for_profile && !should_check_on_sb_disabled)
|
|
if (!safe_browsing_enabled_for_profile && !should_check_on_sb_disabled)
|
|
-@@ -5690,6 +5697,9 @@ ChromeContentBrowserClient::GetSafeBrowsingUrlCheckerDelegate(
|
|
|
|
|
|
+@@ -5690,6 +5699,9 @@ ChromeContentBrowserClient::GetSafeBrowsingUrlCheckerDelegate(
|
|
}
|
|
}
|
|
|
|
|
|
return safe_browsing_url_checker_delegate_;
|
|
return safe_browsing_url_checker_delegate_;
|
|
@@ -674,7 +702,7 @@ diff --git a/chrome/browser/chrome_content_browser_client.cc b/chrome/browser/ch
|
|
}
|
|
}
|
|
|
|
|
|
safe_browsing::RealTimeUrlLookupServiceBase*
|
|
safe_browsing::RealTimeUrlLookupServiceBase*
|
|
-@@ -5697,24 +5707,28 @@ ChromeContentBrowserClient::GetUrlLookupService(
|
|
|
|
|
|
+@@ -5697,24 +5709,28 @@ ChromeContentBrowserClient::GetUrlLookupService(
|
|
content::BrowserContext* browser_context,
|
|
content::BrowserContext* browser_context,
|
|
bool is_enterprise_lookup_enabled,
|
|
bool is_enterprise_lookup_enabled,
|
|
bool is_consumer_lookup_enabled) {
|
|
bool is_consumer_lookup_enabled) {
|
|
@@ -955,7 +983,7 @@ diff --git a/chrome/browser/download/chrome_download_manager_delegate.cc b/chrom
|
|
|
|
|
|
base::FilePath target_path = target_info->target_path;
|
|
base::FilePath target_path = target_info->target_path;
|
|
|
|
|
|
-@@ -1687,13 +1678,9 @@ void ChromeDownloadManagerDelegate::MaybeSendDangerousDownloadOpenedReport(
|
|
|
|
|
|
+@@ -1687,7 +1678,6 @@ void ChromeDownloadManagerDelegate::MaybeSendDangerousDownloadOpenedReport(
|
|
service->MaybeSendDangerousDownloadOpenedReport(download,
|
|
service->MaybeSendDangerousDownloadOpenedReport(download,
|
|
show_download_in_folder);
|
|
show_download_in_folder);
|
|
}
|
|
}
|
|
@@ -963,12 +991,14 @@ diff --git a/chrome/browser/download/chrome_download_manager_delegate.cc b/chrom
|
|
if (!download->GetAutoOpened()) {
|
|
if (!download->GetAutoOpened()) {
|
|
download::DownloadContent download_content =
|
|
download::DownloadContent download_content =
|
|
download::DownloadContentFromMimeType(download->GetMimeType(), false);
|
|
download::DownloadContentFromMimeType(download->GetMimeType(), false);
|
|
-- safe_browsing::RecordDownloadOpened(
|
|
|
|
-- download->GetDangerType(), download_content, base::Time::Now(),
|
|
|
|
-- download->GetEndTime(), show_download_in_folder);
|
|
|
|
|
|
+@@ -1695,6 +1685,7 @@ void ChromeDownloadManagerDelegate::MaybeSendDangerousDownloadOpenedReport(
|
|
|
|
+ download->GetDangerType(), download_content, base::Time::Now(),
|
|
|
|
+ download->GetEndTime(), show_download_in_folder);
|
|
}
|
|
}
|
|
|
|
++#endif
|
|
}
|
|
}
|
|
|
|
|
|
|
|
+ void ChromeDownloadManagerDelegate::CheckDownloadAllowed(
|
|
diff --git a/chrome/browser/download/chrome_download_manager_delegate.h b/chrome/browser/download/chrome_download_manager_delegate.h
|
|
diff --git a/chrome/browser/download/chrome_download_manager_delegate.h b/chrome/browser/download/chrome_download_manager_delegate.h
|
|
--- a/chrome/browser/download/chrome_download_manager_delegate.h
|
|
--- a/chrome/browser/download/chrome_download_manager_delegate.h
|
|
+++ b/chrome/browser/download/chrome_download_manager_delegate.h
|
|
+++ b/chrome/browser/download/chrome_download_manager_delegate.h
|
|
@@ -992,7 +1022,7 @@ diff --git a/chrome/browser/download/chrome_download_manager_delegate.h b/chrome
|
|
// The state of a safebrowsing check.
|
|
// The state of a safebrowsing check.
|
|
class SafeBrowsingState : public DownloadCompletionBlocker {
|
|
class SafeBrowsingState : public DownloadCompletionBlocker {
|
|
public:
|
|
public:
|
|
-@@ -165,11 +167,11 @@ class ChromeDownloadManagerDelegate
|
|
|
|
|
|
+@@ -165,7 +167,6 @@ class ChromeDownloadManagerDelegate
|
|
// a download item.
|
|
// a download item.
|
|
static const char kSafeBrowsingUserDataKey[];
|
|
static const char kSafeBrowsingUserDataKey[];
|
|
};
|
|
};
|
|
@@ -1000,12 +1030,16 @@ diff --git a/chrome/browser/download/chrome_download_manager_delegate.h b/chrome
|
|
|
|
|
|
// Callback function after the DownloadProtectionService completes.
|
|
// Callback function after the DownloadProtectionService completes.
|
|
void CheckClientDownloadDone(uint32_t download_id,
|
|
void CheckClientDownloadDone(uint32_t download_id,
|
|
- safe_browsing::DownloadCheckResult result);
|
|
|
|
|
|
+@@ -175,6 +176,8 @@ class ChromeDownloadManagerDelegate
|
|
|
|
+ void CheckSavePackageScanningDone(uint32_t download_id,
|
|
|
|
+ safe_browsing::DownloadCheckResult result);
|
|
|
|
+
|
|
+#endif // FULL_SAFE_BROWSING
|
|
+#endif // FULL_SAFE_BROWSING
|
|
|
|
++
|
|
|
|
+ base::WeakPtr<ChromeDownloadManagerDelegate> GetWeakPtr();
|
|
|
|
|
|
- // Callback function after scanning completes for a save package.
|
|
|
|
- void CheckSavePackageScanningDone(uint32_t download_id,
|
|
|
|
-@@ -186,8 +188,10 @@ class ChromeDownloadManagerDelegate
|
|
|
|
|
|
+ static void ConnectToQuarantineService(
|
|
|
|
+@@ -186,8 +189,10 @@ class ChromeDownloadManagerDelegate
|
|
download::DownloadItem* item) const;
|
|
download::DownloadItem* item) const;
|
|
|
|
|
|
protected:
|
|
protected:
|
|
@@ -1669,22 +1703,22 @@ diff --git a/chrome/browser/file_system_access/chrome_file_system_access_permiss
|
|
|
|
|
|
std::string GenerateLastPickedDirectoryKey(const std::string& id) {
|
|
std::string GenerateLastPickedDirectoryKey(const std::string& id) {
|
|
return id.empty() ? kDefaultLastPickedDirectoryKey
|
|
return id.empty() ? kDefaultLastPickedDirectoryKey
|
|
-@@ -1106,6 +1110,7 @@ void ChromeFileSystemAccessPermissionContext::ConfirmSensitiveDirectoryAccess(
|
|
|
|
- std::move(callback)));
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
-+#if defined(FULL_SAFE_BROWSING)
|
|
|
|
- void ChromeFileSystemAccessPermissionContext::PerformAfterWriteChecks(
|
|
|
|
|
|
+@@ -1110,6 +1114,7 @@ void ChromeFileSystemAccessPermissionContext::PerformAfterWriteChecks(
|
|
std::unique_ptr<content::FileSystemAccessWriteItem> item,
|
|
std::unique_ptr<content::FileSystemAccessWriteItem> item,
|
|
content::GlobalRenderFrameHostId frame_id,
|
|
content::GlobalRenderFrameHostId frame_id,
|
|
-@@ -1127,6 +1132,7 @@ void ChromeFileSystemAccessPermissionContext::PerformAfterWriteChecks(
|
|
|
|
|
|
+ base::OnceCallback<void(AfterWriteCheckResult)> callback) {
|
|
|
|
++#if defined(FULL_SAFE_BROWSING)
|
|
|
|
+ DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_);
|
|
|
|
+ content::GetUIThreadTaskRunner({})->PostTask(
|
|
|
|
+ FROM_HERE,
|
|
|
|
+@@ -1126,6 +1131,7 @@ void ChromeFileSystemAccessPermissionContext::PerformAfterWriteChecks(
|
|
|
|
+ InterpretSafeBrowsingResult(result)));
|
|
},
|
|
},
|
|
base::SequencedTaskRunnerHandle::Get(), std::move(callback))));
|
|
base::SequencedTaskRunnerHandle::Get(), std::move(callback))));
|
|
- }
|
|
|
|
+#endif
|
|
+#endif
|
|
|
|
+ }
|
|
|
|
|
|
void ChromeFileSystemAccessPermissionContext::
|
|
void ChromeFileSystemAccessPermissionContext::
|
|
- DidConfirmSensitiveDirectoryAccess(
|
|
|
|
diff --git a/chrome/browser/file_system_access/chrome_file_system_access_permission_context.h b/chrome/browser/file_system_access/chrome_file_system_access_permission_context.h
|
|
diff --git a/chrome/browser/file_system_access/chrome_file_system_access_permission_context.h b/chrome/browser/file_system_access/chrome_file_system_access_permission_context.h
|
|
--- a/chrome/browser/file_system_access/chrome_file_system_access_permission_context.h
|
|
--- a/chrome/browser/file_system_access/chrome_file_system_access_permission_context.h
|
|
+++ b/chrome/browser/file_system_access/chrome_file_system_access_permission_context.h
|
|
+++ b/chrome/browser/file_system_access/chrome_file_system_access_permission_context.h
|
|
@@ -1696,17 +1730,6 @@ diff --git a/chrome/browser/file_system_access/chrome_file_system_access_permiss
|
|
#include "content/public/browser/file_system_access_permission_context.h"
|
|
#include "content/public/browser/file_system_access_permission_context.h"
|
|
#include "third_party/blink/public/mojom/permissions/permission_status.mojom.h"
|
|
#include "third_party/blink/public/mojom/permissions/permission_status.mojom.h"
|
|
|
|
|
|
-@@ -85,10 +86,6 @@ class ChromeFileSystemAccessPermissionContext
|
|
|
|
- HandleType handle_type,
|
|
|
|
- content::GlobalRenderFrameHostId frame_id,
|
|
|
|
- base::OnceCallback<void(SensitiveDirectoryResult)> callback) override;
|
|
|
|
-- void PerformAfterWriteChecks(
|
|
|
|
-- std::unique_ptr<content::FileSystemAccessWriteItem> item,
|
|
|
|
-- content::GlobalRenderFrameHostId frame_id,
|
|
|
|
-- base::OnceCallback<void(AfterWriteCheckResult)> callback) override;
|
|
|
|
- bool CanObtainReadPermission(const url::Origin& origin) override;
|
|
|
|
- bool CanObtainWritePermission(const url::Origin& origin) override;
|
|
|
|
-
|
|
|
|
diff --git a/chrome/browser/lookalikes/lookalike_url_controller_client.cc b/chrome/browser/lookalikes/lookalike_url_controller_client.cc
|
|
diff --git a/chrome/browser/lookalikes/lookalike_url_controller_client.cc b/chrome/browser/lookalikes/lookalike_url_controller_client.cc
|
|
--- a/chrome/browser/lookalikes/lookalike_url_controller_client.cc
|
|
--- a/chrome/browser/lookalikes/lookalike_url_controller_client.cc
|
|
+++ b/chrome/browser/lookalikes/lookalike_url_controller_client.cc
|
|
+++ b/chrome/browser/lookalikes/lookalike_url_controller_client.cc
|
|
@@ -2210,6 +2233,40 @@ diff --git a/chrome/browser/safety_check/android/java/src/org/chromium/chrome/br
|
|
return true;
|
|
return true;
|
|
});
|
|
});
|
|
// Set the listener for clicking the passwords element.
|
|
// Set the listener for clicking the passwords element.
|
|
|
|
+diff --git a/chrome/browser/signin/ui/android/java/res/layout/fre_uma_dialog.xml b/chrome/browser/signin/ui/android/java/res/layout/fre_uma_dialog.xml
|
|
|
|
+--- a/chrome/browser/signin/ui/android/java/res/layout/fre_uma_dialog.xml
|
|
|
|
++++ b/chrome/browser/signin/ui/android/java/res/layout/fre_uma_dialog.xml
|
|
|
|
+@@ -22,17 +22,6 @@
|
|
|
|
+ android:text="@string/signin_fre_uma_dialog_title"
|
|
|
|
+ style="@style/TextAppearance.Headline.Primary" />
|
|
|
|
+
|
|
|
|
+- <Switch
|
|
|
|
+- android:id="@+id/fre_uma_dialog_switch"
|
|
|
|
+- android:layout_width="match_parent"
|
|
|
|
+- android:layout_height="wrap_content"
|
|
|
|
+- android:layout_marginBottom="12dp"
|
|
|
|
+- android:text="@string/usage_and_crash_reports_title"
|
|
|
|
+- android:checked="true"
|
|
|
|
+- android:gravity="start|center"
|
|
|
|
+- android:lineSpacingMultiplier="1.2"
|
|
|
|
+- style="@style/TextAppearance.TextLarge.Primary" />
|
|
|
|
+-
|
|
|
|
+ <TextView
|
|
|
|
+ android:layout_width="match_parent"
|
|
|
|
+ android:layout_height="wrap_content"
|
|
|
|
+diff --git a/chrome/browser/signin/ui/android/java/src/org/chromium/chrome/browser/signin/ui/fre/FreUMADialogCoordinator.java b/chrome/browser/signin/ui/android/java/src/org/chromium/chrome/browser/signin/ui/fre/FreUMADialogCoordinator.java
|
|
|
|
+--- a/chrome/browser/signin/ui/android/java/src/org/chromium/chrome/browser/signin/ui/fre/FreUMADialogCoordinator.java
|
|
|
|
++++ b/chrome/browser/signin/ui/android/java/src/org/chromium/chrome/browser/signin/ui/fre/FreUMADialogCoordinator.java
|
|
|
|
+@@ -68,9 +68,6 @@ public class FreUMADialogCoordinator {
|
|
|
|
+ .setOnClickListener(v
|
|
|
|
+ -> mDialogManager.dismissDialog(
|
|
|
|
+ mModel, DialogDismissalCause.ACTION_ON_CONTENT));
|
|
|
|
+- Switch umaSwitch = view.findViewById(R.id.fre_uma_dialog_switch);
|
|
|
|
+- umaSwitch.setOnCheckedChangeListener(
|
|
|
|
+- (compoundButton, isChecked) -> listener.onAllowCrashUploadChecked(isChecked));
|
|
|
|
+ return view;
|
|
|
|
+ }
|
|
|
|
+
|
|
diff --git a/chrome/browser/ssl/sct_reporting_service_factory.cc b/chrome/browser/ssl/sct_reporting_service_factory.cc
|
|
diff --git a/chrome/browser/ssl/sct_reporting_service_factory.cc b/chrome/browser/ssl/sct_reporting_service_factory.cc
|
|
--- a/chrome/browser/ssl/sct_reporting_service_factory.cc
|
|
--- a/chrome/browser/ssl/sct_reporting_service_factory.cc
|
|
+++ b/chrome/browser/ssl/sct_reporting_service_factory.cc
|
|
+++ b/chrome/browser/ssl/sct_reporting_service_factory.cc
|
|
@@ -2646,6 +2703,15 @@ diff --git a/content/browser/file_system_access/file_system_access_file_writer_i
|
|
auto_close_(auto_close) {
|
|
auto_close_(auto_close) {
|
|
DCHECK_EQ(swap_url.type(), url.type());
|
|
DCHECK_EQ(swap_url.type(), url.type());
|
|
DCHECK_EQ(lock_->type(),
|
|
DCHECK_EQ(lock_->type(),
|
|
|
|
+@@ -252,7 +251,7 @@ void FileSystemAccessFileWriterImpl::CloseImpl(CloseCallback callback) {
|
|
|
|
+ /*dest_url=*/url(),
|
|
|
|
+ FileSystemOperation::OPTION_PRESERVE_DESTINATION_PERMISSIONS,
|
|
|
|
+ std::move(quarantine_connection_callback_),
|
|
|
|
+- has_transient_user_activation_);
|
|
|
|
++ /*has_transient_user_activation_*/false);
|
|
|
|
+ // Allows the unique pointer to be bound to the callback so the helper stays
|
|
|
|
+ // alive until the operation completes.
|
|
|
|
+ SafeMoveHelper* raw_helper = safe_move_helper.get();
|
|
diff --git a/content/browser/file_system_access/file_system_access_file_writer_impl.h b/content/browser/file_system_access/file_system_access_file_writer_impl.h
|
|
diff --git a/content/browser/file_system_access/file_system_access_file_writer_impl.h b/content/browser/file_system_access/file_system_access_file_writer_impl.h
|
|
--- a/content/browser/file_system_access/file_system_access_file_writer_impl.h
|
|
--- a/content/browser/file_system_access/file_system_access_file_writer_impl.h
|
|
+++ b/content/browser/file_system_access/file_system_access_file_writer_impl.h
|
|
+++ b/content/browser/file_system_access/file_system_access_file_writer_impl.h
|
|
@@ -2660,45 +2726,6 @@ diff --git a/content/browser/file_system_access/file_system_access_file_writer_i
|
|
// Changes will be written to the target file even if the stream isn't
|
|
// Changes will be written to the target file even if the stream isn't
|
|
// explicitly closed.
|
|
// explicitly closed.
|
|
bool auto_close_ = false;
|
|
bool auto_close_ = false;
|
|
-@@ -128,10 +124,22 @@ class CONTENT_EXPORT FileSystemAccessFileWriterImpl
|
|
|
|
- // active swap file of a different writer.
|
|
|
|
- bool should_purge_swap_file_on_destruction_ = true;
|
|
|
|
-
|
|
|
|
-+<<<<<<< found
|
|
|
|
- base::WeakPtr<FileSystemAccessHandleBase> AsWeakPtr() override;
|
|
|
|
-
|
|
|
|
- base::WeakPtrFactory<FileSystemAccessFileWriterImpl> weak_factory_{this};
|
|
|
|
- };
|
|
|
|
-+||||||| expected
|
|
|
|
-+ // TOOD(crbug.com/1103076): Extend this check to non-native paths.
|
|
|
|
-+ bool RequireSecurityChecks() const {
|
|
|
|
-+ return url().type() != storage::kFileSystemTypeTemporary;
|
|
|
|
-+ }
|
|
|
|
-+=======
|
|
|
|
-+ // TOOD(crbug.com/1103076): Extend this check to non-native paths.
|
|
|
|
-+ bool RequireSecurityChecks() const {
|
|
|
|
-+ return false;
|
|
|
|
-+ }
|
|
|
|
-+>>>>>>> replacement
|
|
|
|
-
|
|
|
|
- } // namespace content
|
|
|
|
-
|
|
|
|
-diff --git a/content/public/browser/file_system_access_permission_context.h b/content/public/browser/file_system_access_permission_context.h
|
|
|
|
---- a/content/public/browser/file_system_access_permission_context.h
|
|
|
|
-+++ b/content/public/browser/file_system_access_permission_context.h
|
|
|
|
-@@ -107,12 +107,6 @@ class FileSystemAccessPermissionContext {
|
|
|
|
- base::OnceCallback<void(SensitiveDirectoryResult)> callback) = 0;
|
|
|
|
-
|
|
|
|
- enum class AfterWriteCheckResult { kAllow, kBlock };
|
|
|
|
-- // Runs a recently finished write operation through checks such as malware
|
|
|
|
-- // or other security checks to determine if the write should be allowed.
|
|
|
|
-- virtual void PerformAfterWriteChecks(
|
|
|
|
-- std::unique_ptr<FileSystemAccessWriteItem> item,
|
|
|
|
-- GlobalRenderFrameHostId frame_id,
|
|
|
|
-- base::OnceCallback<void(AfterWriteCheckResult)> callback) = 0;
|
|
|
|
-
|
|
|
|
- // Returns whether the give |origin| already allows read permission, or it is
|
|
|
|
- // possible to request one. This is used to block file dialogs from being
|
|
|
|
diff --git a/weblayer/BUILD.gn b/weblayer/BUILD.gn
|
|
diff --git a/weblayer/BUILD.gn b/weblayer/BUILD.gn
|
|
--- a/weblayer/BUILD.gn
|
|
--- a/weblayer/BUILD.gn
|
|
+++ b/weblayer/BUILD.gn
|
|
+++ b/weblayer/BUILD.gn
|