M126 stage 1

This commit is contained in:
Alexander Frick 2024-07-15 14:14:42 -05:00
parent f21569d176
commit e42602af04
21 changed files with 149 additions and 106 deletions

View file

@ -41,7 +41,7 @@ if (current_cpu == "arm" || v8_current_cpu == "arm") {
# For lacros build, we use ARM v8 by default.
if (is_chromeos_lacros && arm_arch == "") {
# TODO(crbug.com/1467681) Enable i8mm and dotprod instructions for ffmpeg
# TODO(crbug.com/40276884) Enable i8mm and dotprod instructions for ffmpeg
# if ever we update to a version of arm that supports these instructions.
arm_version = 8
arm_arch = "armv8-a+crc"

View file

@ -41,7 +41,7 @@ if (current_cpu == "arm" || v8_current_cpu == "arm") {
# For lacros build, we use ARM v8 by default.
if (is_chromeos_lacros && arm_arch == "") {
# TODO(crbug.com/1467681) Enable i8mm and dotprod instructions for ffmpeg
# TODO(crbug.com/40276884) Enable i8mm and dotprod instructions for ffmpeg
# if ever we update to a version of arm that supports these instructions.
arm_version = 8
arm_arch = "armv8-a+crc"

View file

@ -43,7 +43,7 @@ if (current_cpu == "arm" || v8_current_cpu == "arm") {
# For lacros build, we use ARM v8 by default.
if (is_chromeos_lacros && arm_arch == "") {
# TODO(crbug.com/1467681) Enable i8mm and dotprod instructions for ffmpeg
# TODO(crbug.com/40276884) Enable i8mm and dotprod instructions for ffmpeg
# if ever we update to a version of arm that supports these instructions.
arm_version = 8
arm_arch = "armv8-a+crc"

View file

@ -41,7 +41,7 @@ if (current_cpu == "arm" || v8_current_cpu == "arm") {
# For lacros build, we use ARM v8 by default.
if (is_chromeos_lacros && arm_arch == "") {
# TODO(crbug.com/1467681) Enable i8mm and dotprod instructions for ffmpeg
# TODO(crbug.com/40276884) Enable i8mm and dotprod instructions for ffmpeg
# if ever we update to a version of arm that supports these instructions.
arm_version = 8
arm_arch = "armv8-a+crc"

View file

@ -31,7 +31,7 @@
<DT><A HREF="https://source.chromium.org/chromium/chromium/src/+/refs/tags/126.0.6478.181:chrome/browser/ui/browser_ui_prefs.cc;bpv=1" ADD_DATE="1661054752" ICON="data:image/png;base64,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">browser_ui_prefs.cc - Chromium Code Search</A>
<DT><A HREF="https://source.chromium.org/chromium/chromium/src/+/refs/tags/126.0.6478.181:chrome/browser/ui/startup/google_api_keys_infobar_delegate.cc;bpv=1" ADD_DATE="1661054752" ICON="data:image/png;base64,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">google_api_keys_infobar_delegate.cc - Chromium Code Search</A>
<DT><A HREF="https://source.chromium.org/chromium/chromium/src/+/refs/tags/126.0.6478.181:chrome/browser/ui/startup/infobar_utils.cc;bpv=1" ADD_DATE="1661054752" ICON="data:image/png;base64,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">infobar_utils.cc - Chromium Code Search</A>
<DT><A HREF="https://source.chromium.org/chromium/chromium/src/+/refs/tags/126.0.6478.181:chrome/browser/ui/startup/default_browser_prompt.cc;bpv=1" ADD_DATE="1661054752" ICON="data:image/png;base64,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">default_browser_prompt.cc - Chromium Code Search</A>
<DT><A HREF="https://source.chromium.org/chromium/chromium/src/+/refs/tags/126.0.6478.181:chrome/browser/ui/startup/default_browser_prompt/default_browser_prompt.cc;bpv=1" ADD_DATE="1661054752" ICON="data:image/png;base64,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">default_browser_prompt.cc - Chromium Code Search</A>
<DT><A HREF="https://source.chromium.org/chromium/chromium/src/+/refs/tags/126.0.6478.181:chrome/browser/ui/startup/bad_flags_prompt.cc;bpv=1" ADD_DATE="1674977639" ICON="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABAAAAAQCAYAAAAf8/9hAAADIUlEQVQ4jW1TXWwUZRQ955ufnZ3dlm4VpE2Q+lND1cSQYDBaKY2VEkUFa1d9K4laBROEIg+mDfvkg5Bu9MWoD/hkTJdqJBFCMRENEqONRkMbIiWGWn5SjWw7OzO7szPf9UFCCnrebu7JuTc55xA3QURYKkEtXw7+1gDm0mDWBtMm+GcAnb+P0VI+lw4fTIp7C6O7dU3nlKFyisxp0TmDRpMmmyDSCqLY96D1HUQIUsxrd9nfD3VrHDbDTi/ENi5V/TCdtmlQ0Y60dmwANNXT0HpodEx+2kNUb/4e45PSUhBR/1lcw6Gvf3fGf4gmJn6NBgGgUBBFAHj+vepdKSvp2r5m/pPu7juqA4fEOTcXvhaG2KAMVjOp5MjJ4eynBOTIz7Vnzs5Jcfoiej9+1TlHAHjyneArKrl/XcVtnQLcS/A/b23J9DzUBgQRcPo84JX90VOF7JCIGFsOBLMCTB/dl3lc9b+7uA1O+jHb4OuFAvVl+oOtLZmekc1JbUc36nt7pb6zK0mslL2n6+3wUZJJyuIuOm7Ps8Xyc8qP3Q+TMDj+2W73MABUatK5vg26vcVQf3navOqL+Ui7kay53dJeEG8AgPE33PEkDI6HSfZ9BRFAQJF/LSVYDSIQEBiKsE0lsRaGNSiTEl43X4SAQKWN8GUj427qG/XyAJB15IvTM+CJKW04FuoiEpd+1Grmj8BvzPIYAGwten2mm9mUsauDBIAnDvgnAHQMrHZX5/NMOguLBy07NXTPKhvVGnDhb0BH3pvfDjcelDExnpoNLormmS/3uT0KAFY0xDs2dhiLqXZsBoBThca9QK1z8mxlZPpCZZeq+2dMqi2AcGYtzOZG9dayrHoFACgiJCkTU9FAJZCtCxX7he3dvCFl60b8ta6lh2/T2Rdf2oam3gc4f2MXRLi7NOd0tq34iFS/aNFHIwBhJLGVSLRqZd3rWNYQfj+L5igOdb6YvoISNEC5LgBSDk9G6ynYScgVrbGgFMsQKSdiLIhIWSe6rGifzz/M8H/bCABjU2L781BeOCMrK5FcvfNeuexB8M1J7N+/MSEpS/n/AGH0clblBN69AAAAAElFTkSuQmCC">bad_flags_prompt.cc - Chromium Code Search</A>
<DT><A HREF="https://source.chromium.org/chromium/chromium/src/+/refs/tags/126.0.6478.181:chrome/installer/linux/;bpv=1" ADD_DATE="1661054752" ICON="data:image/png;base64,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">installer/linux - Chromium Code Search</A>
<DT><A HREF="https://source.chromium.org/chromium/chromium/src/+/refs/tags/126.0.6478.181:chrome/installer/mini_installer/chrome.release;bpv=1" ADD_DATE="1661054752" ICON="data:image/png;base64,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">chrome.release - Chromium Code Search</A>

View file

@ -41,7 +41,7 @@ if (current_cpu == "arm" || v8_current_cpu == "arm") {
# For lacros build, we use ARM v8 by default.
if (is_chromeos_lacros && arm_arch == "") {
# TODO(crbug.com/1467681) Enable i8mm and dotprod instructions for ffmpeg
# TODO(crbug.com/40276884) Enable i8mm and dotprod instructions for ffmpeg
# if ever we update to a version of arm that supports these instructions.
arm_version = 8
arm_arch = "armv8-a+crc"

View file

@ -427,7 +427,7 @@ void BackgroundModeManager::LaunchBackgroundApplication(
base::DoNothing());
#else
// background mode is not used in Chrome OS platform.
// TODO(crbug.com/1291803): Remove the background mode manager from Chrome OS
// TODO(crbug.com/40212901): Remove the background mode manager from Chrome OS
// build.
NOTIMPLEMENTED();
#endif

View file

@ -236,9 +236,9 @@ bool StubResolverConfigReader::ShouldDisableDohForManaged() {
if (android_has_owner_.value_or(false))
return true;
#elif BUILDFLAG(IS_WIN)
// TODO(crbug.com/1339062): What is the correct function to use here? (This
// TODO(crbug.com/40229843): What is the correct function to use here? (This
// may or may not obsolete the following TODO)
// TODO(crbug.com/1320766): For legacy compatibility, this uses
// TODO(crbug.com/40223626): For legacy compatibility, this uses
// IsEnterpriseDevice() which effectively equates to a domain join check.
// Consider whether this should use IsManagedDevice() instead.
if (base::win::IsEnrolledToDomain())
@ -401,7 +401,7 @@ void StubResolverConfigReader::OnAndroidOwnedStateCheckComplete(
std::optional<std::string>
StubResolverConfigReader::GetDohWithIdentifiersDisplayServers() {
ash::dns_over_https::TemplatesUriResolverImpl doh_template_uri_resolver;
doh_template_uri_resolver.UpdateFromPrefs(local_state_);
doh_template_uri_resolver.Update(local_state_);
if (doh_template_uri_resolver.GetDohWithIdentifiersActive())
return doh_template_uri_resolver.GetDisplayTemplates();

View file

@ -29,7 +29,7 @@
namespace {
uint32_t GetHomeButtonAndHomePageIsNewTabPageFlags() {
uint32_t GetHomeAndForwardButtonAndHomePageIsNewTabPageFlags() {
#if BUILDFLAG(IS_ANDROID)
return PrefRegistry::NO_REGISTRATION_FLAGS;
#else
@ -69,15 +69,22 @@ void RegisterBrowserPrefs(PrefRegistrySimple* registry) {
registry->RegisterTimePref(prefs::kDefaultBrowserLastDeclinedTime,
base::Time());
registry->RegisterIntegerPref(prefs::kDefaultBrowserDeclinedCount, 0);
registry->RegisterTimePref(prefs::kDefaultBrowserFirstShownTime,
base::Time());
}
void RegisterBrowserUserPrefs(user_prefs::PrefRegistrySyncable* registry) {
registry->RegisterBooleanPref(prefs::kHomePageIsNewTabPage, true,
GetHomeButtonAndHomePageIsNewTabPageFlags());
registry->RegisterBooleanPref(prefs::kShowHomeButton, true,
GetHomeButtonAndHomePageIsNewTabPageFlags());
registry->RegisterBooleanPref(
prefs::kHomePageIsNewTabPage, true,
GetHomeAndForwardButtonAndHomePageIsNewTabPageFlags());
registry->RegisterBooleanPref(
prefs::kShowHomeButton, true,
GetHomeAndForwardButtonAndHomePageIsNewTabPageFlags());
registry->RegisterBooleanPref(
prefs::kShowForwardButton, true,
GetHomeAndForwardButtonAndHomePageIsNewTabPageFlags());
registry->RegisterInt64Pref(prefs::kDefaultBrowserLastDeclined, 0);
registry->RegisterBooleanPref(prefs::kWebAppCreateOnDesktop, true);

View file

@ -6,6 +6,7 @@
#include <algorithm>
#include <string>
#include <string_view>
#include "base/base_switches.h"
#include "base/command_line.h"
@ -28,6 +29,7 @@
#include "components/history_clusters/core/file_clustering_backend.h"
#include "components/infobars/content/content_infobar_manager.h"
#include "components/infobars/core/infobar_delegate.h"
#include "components/media_router/common/providers/cast/certificate/switches.h"
#include "components/network_session_configurator/common/network_switches.h"
#include "components/startup_metric_utils/browser/startup_metric_utils.h"
#include "components/translate/core/common/translate_switches.h"
@ -73,7 +75,7 @@ const char* const kBadFlags[] = {
// These flags disable sandbox-related security.
sandbox::policy::switches::kDisableGpuSandbox,
sandbox::policy::switches::kDisableSeccompFilterSandbox,
// sandbox::policy::switches::kDisableSetuidSandbox, (Disabled by Alex313031)
sandbox::policy::switches::kDisableSetuidSandbox,
sandbox::policy::switches::kNoSandbox,
#if BUILDFLAG(IS_WIN)
sandbox::policy::switches::kAllowThirdPartyModules,
@ -103,7 +105,7 @@ const char* const kBadFlags[] = {
extensions::switches::kExtensionsOnChromeURLs,
#endif
// TODO(crbug.com/1052397): Revisit the macro expression once build flag switch
// TODO(crbug.com/40118868): Revisit the macro expression once build flag switch
// of lacros-chrome is complete.
#if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_CHROMEOS_LACROS)
// Speech dispatcher is buggy, it can crash and it can make Chrome freeze.
@ -111,12 +113,6 @@ const char* const kBadFlags[] = {
switches::kEnableSpeechDispatcher,
#endif
#if BUILDFLAG(IS_MAC)
// This flag is only used for performance tests in mac, to ensure that
// calculated values are reliable. Should not be used elsewhere.
switches::kUseHighGPUThreadPriorityForPerfTests,
#endif
// These flags control Blink feature state, which is not supported and is
// intended only for use by Chromium developers.
// switches::kDisableBlinkFeatures, (Disabled by Alex313031)
@ -178,6 +174,10 @@ const char* const kBadFlags[] = {
// in tests and performance benchmarks. Using it could allow faking user
// interaction across origins.
cc::switches::kEnableGpuBenchmarking,
// This flag enables loading a developer-signed certificate for Cast
// streaming receivers and should only be used for testing purposes.
cast_certificate::switches::kCastDeveloperCertificatePath,
};
#endif // !BUILDFLAG(IS_ANDROID)
@ -199,12 +199,12 @@ static const base::Feature* kBadFeatureFlagsInAboutFlags[] = {
// This flag disables security for the Page Embedded Permission Control, for
// testing purposes. Can only be enabled via the command line.
&blink::features::kDisablePepcSecurityForTesting,
&blink::features::kBypassPepcSecurityForTesting,
};
void ShowBadFlagsInfoBarHelper(content::WebContents* web_contents,
int message_id,
base::StringPiece flag) {
std::string_view flag) {
// Animating the infobar also animates the content area size which can trigger
// a flood of page layout, compositing, texture reallocations, etc. Do not
// animate the infobar to reduce noise in perf benchmarks because they pass

View file

@ -2,18 +2,15 @@
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "chrome/browser/ui/startup/default_browser_prompt.h"
#include "chrome/browser/ui/startup/default_browser_prompt/default_browser_prompt.h"
#include <limits>
#include <string>
#include "base/check_is_test.h"
#include "base/feature_list.h"
#include "base/functional/bind.h"
#include "base/functional/callback_helpers.h"
#include "base/location.h"
#include "base/memory/weak_ptr.h"
#include "base/metrics/field_trial.h"
#include "base/strings/string_number_conversions.h"
#include "base/task/single_thread_task_runner.h"
#include "base/time/time.h"
@ -25,8 +22,10 @@
#include "chrome/browser/ui/browser.h"
#include "chrome/browser/ui/browser_finder.h"
#include "chrome/browser/ui/browser_list.h"
#include "chrome/browser/ui/startup/default_browser_infobar_delegate.h"
#include "chrome/browser/ui/startup/default_browser_prompt_manager.h"
#include "chrome/browser/ui/startup/default_browser_prompt/default_browser_infobar_delegate.h"
#include "chrome/browser/ui/startup/default_browser_prompt/default_browser_prompt_manager.h"
#include "chrome/browser/ui/startup/default_browser_prompt/default_browser_prompt_prefs.h"
#include "chrome/browser/ui/startup/default_browser_prompt/default_browser_prompt_trial.h"
#include "chrome/browser/ui/tabs/tab_strip_model.h"
#include "chrome/browser/ui/ui_features.h"
#include "chrome/common/pref_names.h"
@ -36,21 +35,25 @@
#include "components/version_info/version_info.h"
#include "content/public/browser/visibility.h"
#include "content/public/browser/web_contents.h"
#include "ui/base/ui_base_features.h"
namespace {
void ResetCheckDefaultBrowserPref(const base::FilePath& profile_path) {
Profile* profile =
g_browser_process->profile_manager()->GetProfileByPath(profile_path);
if (profile)
ResetDefaultBrowserPrompt(profile);
}
void ShowPrompt() {
return;
}
// Do not show the prompt if "suppress_default_browser_prompt_for_version" in
// the initial preferences is set to the current version.
bool ShouldShowDefaultBrowserPromptForCurrentVersion() {
const std::string disable_version_string =
g_browser_process->local_state()->GetString(
prefs::kBrowserSuppressDefaultBrowserPrompt);
const base::Version disable_version(disable_version_string);
DCHECK(disable_version_string.empty() || disable_version.IsValid());
return !(disable_version.IsValid() &&
disable_version == version_info::GetVersion());
}
// Returns true if the default browser prompt should be shown if Chrome is not
// the user's default browser.
bool ShouldShowDefaultBrowserPrompt(Profile* profile) {
@ -58,27 +61,37 @@ bool ShouldShowDefaultBrowserPrompt(Profile* profile) {
}
void OnCheckIsDefaultBrowserFinished(
const base::FilePath& profile_path,
bool show_prompt,
Profile* profile,
shell_integration::DefaultWebClientState state) {
if (state == shell_integration::IS_DEFAULT) {
// Notify the user in the future if Chrome ceases to be the user's chosen
// default browser.
ResetCheckDefaultBrowserPref(profile_path);
} else if (show_prompt && state == shell_integration::NOT_DEFAULT &&
shell_integration::CanSetAsDefaultBrowser()) {
chrome::startup::default_prompt::ResetPromptPrefs(profile);
} else if (state == shell_integration::NOT_DEFAULT &&
shell_integration::CanSetAsDefaultBrowser() &&
ShouldShowDefaultBrowserPromptForCurrentVersion()) {
// If the user is in the control or an experiment arm, move them into the
// synthetic trial cohort.
DefaultBrowserPromptTrial::MaybeJoinDefaultBrowserPromptCohort();
chrome::startup::default_prompt::MaybeResetAppMenuPromptPrefs(profile);
// Only show the prompt if some other program is the user's default browser.
// In particular, don't show it if another install mode is default (e.g.,
// don't prompt for Chrome Beta if stable Chrome is the default).
if (base::FeatureList::IsEnabled(features::kDefaultBrowserPromptRefresh)) {
DefaultBrowserPromptManager::GetInstance()->MaybeShowPrompt();
} else if (ShouldShowDefaultBrowserPrompt(profile)) {
ShowPrompt();
}
}
}
} // namespace
void RegisterDefaultBrowserPromptPrefs(PrefRegistrySimple* registry) {
registry->RegisterStringPref(
prefs::kBrowserSuppressDefaultBrowserPrompt, std::string());
registry->RegisterStringPref(prefs::kBrowserSuppressDefaultBrowserPrompt,
std::string());
registry->RegisterStringPref(prefs::kDefaultBrowserPromptRefreshStudyGroup,
std::string());
}
@ -137,34 +150,9 @@ void ShowDefaultBrowserPrompt(Profile* profile) {
scoped_refptr<shell_integration::DefaultBrowserWorker>(
new shell_integration::DefaultBrowserWorker())
->StartCheckIsDefault(
base::BindOnce(&OnCheckIsDefaultBrowserFinished, profile->GetPath(),
ShouldShowDefaultBrowserPrompt(profile)));
}
void DefaultBrowserPromptDeclined(Profile* profile) {
base::Time now = base::Time::Now();
profile->GetPrefs()->SetInt64(prefs::kDefaultBrowserLastDeclined,
now.ToInternalValue());
PrefService* local_state = g_browser_process->local_state();
local_state->SetTime(prefs::kDefaultBrowserLastDeclinedTime, now);
local_state->SetInteger(
prefs::kDefaultBrowserDeclinedCount,
local_state->GetInteger(prefs::kDefaultBrowserDeclinedCount) + 1);
}
void ResetDefaultBrowserPrompt(Profile* profile) {
profile->GetPrefs()->ClearPref(prefs::kDefaultBrowserLastDeclined);
PrefService* local_state = g_browser_process->local_state();
local_state->ClearPref(prefs::kDefaultBrowserLastDeclinedTime);
local_state->ClearPref(prefs::kDefaultBrowserDeclinedCount);
base::BindOnce(&OnCheckIsDefaultBrowserFinished, profile));
}
void ShowPromptForTesting() {
ShowPrompt();
}
bool ShouldShowDefaultBrowserPromptForTesting(Profile* profile) {
return ShouldShowDefaultBrowserPrompt(profile);
}

View file

@ -16,7 +16,6 @@
#include "chrome/browser/ui/startup/automation_infobar_delegate.h"
#include "chrome/browser/ui/startup/bad_flags_prompt.h"
#include "chrome/browser/ui/startup/bidding_and_auction_consented_debugging_infobar_delegate.h"
#include "chrome/browser/ui/startup/default_browser_prompt.h"
#include "chrome/browser/ui/startup/google_api_keys_infobar_delegate.h"
#include "chrome/browser/ui/startup/obsolete_system_infobar_delegate.h"
#include "chrome/browser/ui/startup/startup_browser_creator.h"
@ -30,6 +29,10 @@
#include "google_apis/google_api_keys.h"
#include "services/network/public/cpp/network_switches.h"
#if !BUILDFLAG(IS_CHROMEOS) && !BUILDFLAG(IS_ANDROID)
#include "chrome/browser/ui/startup/default_browser_prompt/default_browser_prompt.h"
#endif
#if BUILDFLAG(CHROME_FOR_TESTING)
#include "chrome/browser/ui/startup/chrome_for_testing_infobar_delegate.h"
#endif
@ -151,7 +154,7 @@ void AddInfoBarsIfNecessary(Browser* browser,
//infobars::ContentInfoBarManager* infobar_manager =
// infobars::ContentInfoBarManager::FromWebContents(web_contents);
#if !BUILDFLAG(IS_CHROMEOS_ASH)
#if !BUILDFLAG(IS_CHROMEOS) && !BUILDFLAG(IS_ANDROID)
if (!is_web_app &&
!startup_command_line.HasSwitch(switches::kNoDefaultBrowserCheck)) {
// The default browser prompt should only be shown after the first run.

View file

@ -301,20 +301,28 @@ copy("theme_files") {
if (is_chrome_branded) {
sources += [
"$branding_dir/linux/product_logo_128_beta.png",
"$branding_dir/linux/product_logo_128_canary.png",
"$branding_dir/linux/product_logo_128_dev.png",
"$branding_dir/linux/product_logo_24_beta.png",
"$branding_dir/linux/product_logo_24_canary.png",
"$branding_dir/linux/product_logo_24_dev.png",
"$branding_dir/linux/product_logo_256_beta.png",
"$branding_dir/linux/product_logo_256_canary.png",
"$branding_dir/linux/product_logo_256_dev.png",
"$branding_dir/linux/product_logo_32_beta.xpm",
"$branding_dir/linux/product_logo_32_canary.xpm",
"$branding_dir/linux/product_logo_32_dev.xpm",
"$branding_dir/linux/product_logo_48_beta.png",
"$branding_dir/linux/product_logo_48_canary.png",
"$branding_dir/linux/product_logo_48_dev.png",
"$branding_dir/linux/product_logo_64_beta.png",
"$branding_dir/linux/product_logo_64_canary.png",
"$branding_dir/linux/product_logo_64_dev.png",
"$branding_dir_100/linux/product_logo_16_beta.png",
"$branding_dir_100/linux/product_logo_16_canary.png",
"$branding_dir_100/linux/product_logo_16_dev.png",
"$branding_dir_100/linux/product_logo_32_beta.png",
"$branding_dir_100/linux/product_logo_32_canary.png",
"$branding_dir_100/linux/product_logo_32_dev.png",
]
}

View file

@ -192,7 +192,7 @@ stage_install_common() {
# V8 snapshot files; Necessary when the GN v8_use_external_startup_data flag
# is true.
# Use v8_context_snapshot.bin instead of snapshot_blob.bin if it is available.
# TODO(crbug.com/764576): Unship snapshot_blob.bin on ChromeOS and drop this branch
# TODO(crbug.com/40539769): Unship snapshot_blob.bin on ChromeOS and drop this branch
if [ -f "${OUTPUTDIR}/v8_context_snapshot.bin" ]; then
install -m 644 "${OUTPUTDIR}/v8_context_snapshot.bin" "${STAGEDIR}/${INSTALLDIR}/"
else
@ -214,7 +214,7 @@ stage_install_common() {
cp -a '{}' "${STAGEDIR}/${INSTALLDIR}/locales/" \;
find "${STAGEDIR}/${INSTALLDIR}/locales" -type f -exec chmod 644 '{}' \;
# TODO(https://crbug.com/1077934): The below conditions check for the
# TODO(crbug.com/40688962): The below conditions check for the
# existence of files to determine if they should be copied to the staging
# directory. However, these may be stale if the build config no longer
# builds these files. The build config should be obtained from gn rather than
@ -332,6 +332,8 @@ stage_install_common() {
icon_regex=".*product_logo_[0-9]\+_beta\."
elif [ "$CHANNEL" = "unstable" ]; then
icon_regex=".*product_logo_[0-9]\+_dev\."
elif [ "$CHANNEL" = "canary" ]; then
icon_regex=".*product_logo_[0-9]\+_canary\."
fi
fi
LOGO_RESOURCES_PNG=$(find "${OUTPUTDIR}/installer/theme/" \

View file

@ -145,7 +145,7 @@ usage() {
echo "usage: $(basename $0) [-a target_arch] -c channel -d branding"
echo " [-f] [-o 'dir'] -s 'dir' -t target_os"
echo "-a arch deb package architecture"
echo "-c channel the package channel (unstable, beta, stable)"
echo "-c channel the package channel (canary, unstable, beta, stable)"
echo "-d brand either chromium or google_chrome"
echo "-f indicates that this is an official build"
echo "-h this help message"
@ -169,6 +169,12 @@ verify_channel() {
CHANNEL=unstable
RELEASENOTES="https://chromereleases.googleblog.com/search/label/Dev%20updates"
;;
# Canary is released twice a day automatically, so no release notes
# attached.
canary )
CHANNEL=canary
RELEASENOTES="N/A"
;;
* )
echo
echo "ERROR: '$CHANNEL' is not a valid channel type."

View file

@ -132,7 +132,7 @@ usage() {
echo "usage: $(basename $0) [-a target_arch] -c channel -d branding"
echo " [-f] [-o 'dir'] -t target_os"
echo "-a arch rpm package architecture"
echo "-c channel the package channel (unstable, beta, stable)"
echo "-c channel the package channel (canary, unstable, beta, stable)"
echo "-d brand either chromium or google_chrome"
echo "-f indicates that this is an official build"
echo "-h this help message"

View file

@ -73,12 +73,6 @@ BASE_FEATURE(kDeleteOverwrittenDownloads,
BASE_FEATURE(kAllowFileBufferSizeControl,
"AllowFileBufferSizeControl",
base::FEATURE_ENABLED_BY_DEFAULT);
#if BUILDFLAG(IS_ANDROID)
BASE_FEATURE(kTransientPdfLinkDownload,
"TransientPdfLinkDownload",
base::FEATURE_DISABLED_BY_DEFAULT);
#endif // BUILDFLAG(IS_ANDROID)
} // namespace features
} // namespace download

View file

@ -3,6 +3,7 @@
// found in the LICENSE file.
#include "components/privacy_sandbox/privacy_sandbox_settings_impl.h"
#include <cstddef>
#include <vector>
@ -24,6 +25,7 @@
#include "components/content_settings/core/browser/cookie_settings.h"
#include "components/content_settings/core/browser/host_content_settings_map.h"
#include "components/content_settings/core/common/pref_names.h"
#include "components/prefs/pref_change_registrar.h"
#include "components/prefs/pref_service.h"
#include "components/prefs/scoped_user_pref_update.h"
#include "components/privacy_sandbox/canonical_topic.h"
@ -191,6 +193,17 @@ PrivacySandboxSettingsImpl::PrivacySandboxSettingsImpl(
PrivacySandboxSettingsImpl::~PrivacySandboxSettingsImpl() = default;
void PrivacySandboxSettingsImpl::Shutdown() {
observers_.Clear();
delegate_.reset();
host_content_settings_map_ = nullptr;
cookie_settings_.reset();
tracking_protection_settings_ = nullptr;
pref_service_ = nullptr;
pref_change_registrar_.Reset();
tracking_protection_settings_observation_.Reset();
}
PrivacySandboxSettingsImpl::Status
PrivacySandboxSettingsImpl::GetM1TopicAllowedStatus() const {
auto control_status = GetM1PrivacySandboxApiEnabledStatus(
@ -617,12 +630,15 @@ bool PrivacySandboxSettingsImpl::IsSharedStorageAllowed(
const url::Origin& top_frame_origin,
const url::Origin& accessing_origin,
std::string* out_debug_message,
content::RenderFrameHost* console_frame) const {
content::RenderFrameHost* console_frame,
bool* out_block_is_site_setting_specific) const {
// Check for attestation on the caller's site.
Status attestation_status =
PrivacySandboxAttestations::GetInstance()->IsSiteAttested(
net::SchemefulSite(accessing_origin),
PrivacySandboxAttestationsGatedAPI::kSharedStorage);
SetOutBlockIsSiteSettingSpecificFromStatus(
attestation_status, out_block_is_site_setting_specific);
if (!IsAllowed(attestation_status)) {
JoinHistogram(kIsSharedStorageAllowedHistogram, attestation_status);
std::string error_message =
@ -644,9 +660,13 @@ bool PrivacySandboxSettingsImpl::IsSharedStorageAllowed(
}
Status status = GetPrivacySandboxAllowedStatus();
SetOutBlockIsSiteSettingSpecificFromStatus(
status, out_block_is_site_setting_specific);
if (IsAllowed(status)) {
status =
GetSiteAccessAllowedStatus(top_frame_origin, accessing_origin.GetURL());
SetOutBlockIsSiteSettingSpecificFromStatus(
status, out_block_is_site_setting_specific);
if (out_debug_message) {
*out_debug_message = base::StrCat(
{"Site access settings returned status ",
@ -672,8 +692,11 @@ bool PrivacySandboxSettingsImpl::IsSharedStorageAllowed(
bool PrivacySandboxSettingsImpl::IsSharedStorageSelectURLAllowed(
const url::Origin& top_frame_origin,
const url::Origin& accessing_origin,
std::string* out_debug_message) const {
std::string* out_debug_message,
bool* out_block_is_site_setting_specific) const {
Status status = GetM1FledgeAllowedStatus(top_frame_origin, accessing_origin);
SetOutBlockIsSiteSettingSpecificFromStatus(
status, out_block_is_site_setting_specific);
JoinHistogram(kIsSharedStorageSelectURLAllowedHistogram, status);
if (out_debug_message) {
*out_debug_message = base::StrCat(
@ -690,12 +713,15 @@ bool PrivacySandboxSettingsImpl::IsSharedStorageSelectURLAllowed(
bool PrivacySandboxSettingsImpl::IsPrivateAggregationAllowed(
const url::Origin& top_frame_origin,
const url::Origin& reporting_origin) const {
const url::Origin& reporting_origin,
bool* out_block_is_site_setting_specific) const {
// Check for attestation on the worklet's site.
Status attestation_status =
PrivacySandboxAttestations::GetInstance()->IsSiteAttested(
net::SchemefulSite(reporting_origin),
PrivacySandboxAttestationsGatedAPI::kPrivateAggregation);
SetOutBlockIsSiteSettingSpecificFromStatus(
attestation_status, out_block_is_site_setting_specific);
if (!IsAllowed(attestation_status)) {
JoinHistogram(kIsPrivateAggregationAllowedHistogram, attestation_status);
return false;
@ -703,6 +729,8 @@ bool PrivacySandboxSettingsImpl::IsPrivateAggregationAllowed(
Status status =
GetM1AdMeasurementAllowedStatus(top_frame_origin, reporting_origin);
SetOutBlockIsSiteSettingSpecificFromStatus(
status, out_block_is_site_setting_specific);
JoinHistogram(kIsPrivateAggregationAllowedHistogram, status);
return IsAllowed(status);
}
@ -710,7 +738,9 @@ bool PrivacySandboxSettingsImpl::IsPrivateAggregationAllowed(
bool PrivacySandboxSettingsImpl::IsPrivateAggregationDebugModeAllowed(
const url::Origin& top_frame_origin,
const url::Origin& reporting_origin) const {
if (!IsPrivateAggregationAllowed(top_frame_origin, reporting_origin)) {
if (!IsPrivateAggregationAllowed(
top_frame_origin, reporting_origin,
/*out_block_is_site_setting_specific=*/nullptr)) {
return false;
}
@ -756,7 +786,7 @@ bool PrivacySandboxSettingsImpl::IsSubjectToM1NoticeRestricted() const {
}
bool PrivacySandboxSettingsImpl::IsRestrictedNoticeEnabled() const {
return privacy_sandbox::kPrivacySandboxSettings4RestrictedNotice.Get();
return delegate_->IsRestrictedNoticeEnabled();
}
void PrivacySandboxSettingsImpl::OnCookiesCleared() {
@ -889,4 +919,13 @@ bool PrivacySandboxSettingsImpl::AreRelatedWebsiteSetsEnabled() const {
prefs::kPrivacySandboxRelatedWebsiteSetsEnabled);
}
void PrivacySandboxSettingsImpl::SetOutBlockIsSiteSettingSpecificFromStatus(
Status status,
bool* out_block_is_site_setting_specific) const {
if (out_block_is_site_setting_specific != nullptr) {
*out_block_is_site_setting_specific =
status == Status::kSiteDataAccessBlocked;
}
}
} // namespace privacy_sandbox

View file

@ -66,6 +66,7 @@ void RegisterProfilePrefs(PrefRegistrySimple* registry) {
registry->RegisterBooleanPref(
prefs::kBlockAll3pcToggleEnabled, false,
user_prefs::PrefRegistrySyncable::SYNCABLE_PREF);
registry->RegisterBooleanPref(prefs::kAllowAll3pcToggleEnabled, false);
registry->RegisterIntegerPref(
prefs::kTrackingProtectionLevel,
static_cast<int>(TrackingProtectionLevel::kStandard),
@ -80,17 +81,6 @@ void RegisterProfilePrefs(PrefRegistrySimple* registry) {
registry->RegisterBooleanPref(
prefs::kEnableDoNotTrack, true,
user_prefs::PrefRegistrySyncable::SYNCABLE_PREF);
// Sentiment Survey
registry->RegisterIntegerPref(
prefs::kTrackingProtectionSentimentSurveyGroup,
static_cast<int>(TrackingProtectionSentimentSurveyGroup::kNotSet));
registry->RegisterTimePref(prefs::kTrackingProtectionSentimentSurveyStartTime,
base::Time());
registry->RegisterTimePref(prefs::kTrackingProtectionSentimentSurveyEndTime,
base::Time());
}
} // namespace privacy_sandbox::tracking_protection

View file

@ -29,7 +29,7 @@
// existing data should get a new version. Otherwise, existing data may
// continue to be used and updates made here will not always appear.
// Also then run tools/search_engine_choice/generate_search_engine_icons.py.
"kCurrentDataVersion": 160
"kCurrentDataVersion": 163
},
// The following engines are included in country lists and are added to the
@ -128,7 +128,7 @@
"name": "Google",
"keyword": "google.com",
"favicon_url": "https://www.google.com/images/branding/product/ico/googleg_alldp.ico",
"search_url": "{google:baseURL}search?q={searchTerms}&{google:RLZ}{google:originalQueryForSuggestion}{google:assistedQueryStats}{google:searchFieldtrialParameter}{google:iOSSearchLanguage}{google:prefetchSource}{google:searchClient}{google:sourceId}{google:contextualSearchVersion}ie={inputEncoding}",
"search_url": "{google:baseURL}search?q={searchTerms}&{google:RLZ}{google:originalQueryForSuggestion}{google:assistedQueryStats}{google:searchFieldtrialParameter}{google:language}{google:prefetchSource}{google:searchClient}{google:sourceId}{google:contextualSearchVersion}ie={inputEncoding}",
"suggest_url": "{google:baseSuggestURL}search?{google:searchFieldtrialParameter}client={google:suggestClient}&gs_ri={google:suggestRid}&xssi=t&q={searchTerms}&{google:inputType}{google:omniboxFocusType}{google:cursorPosition}{google:currentPageUrl}{google:pageClassification}{google:clientCacheTimeToLive}{google:searchVersion}{google:sessionToken}{google:prefetchQuery}sugkey={google:suggestAPIKeyParameter}",
"image_url": "{google:baseSearchByImageURL}upload",
"image_translate_url": "{google:baseSearchByImageURL}upload?filtertype=tr&{imageTranslateSourceLocale}{imageTranslateTargetLocale}",
@ -348,7 +348,7 @@
},
"yahoo_au": {
"name": "Yahoo!7",
"name": "Yahoo! Australia",
"keyword": "au.yahoo.com",
"favicon_url": "https://au.search.yahoo.com/favicon.ico",
"search_url": "https://au.search.yahoo.com/search{google:pathWildcard}?ei={inputEncoding}&fr=crmas&p={searchTerms}",

View file

@ -1281,6 +1281,10 @@ const std::vector<EngineAndTier> GetPrepopulationSetFromCountryID(
// Countries using the "Spain" engine set.
UNHANDLED_COUNTRY(A, D) // Andorra
UNHANDLED_COUNTRY(E, A) // Ceuta & Melilla (not in ISO 3166-1 but included
// in some Chrome country code lists)
UNHANDLED_COUNTRY(I, C) // Canary Islands (not in ISO 3166-1 but included
// in some Chrome country code lists)
END_UNHANDLED_COUNTRIES(E, S)
// Countries using the "Finland" engine set.
@ -1290,6 +1294,7 @@ const std::vector<EngineAndTier> GetPrepopulationSetFromCountryID(
// Countries using the "France" engine set.
UNHANDLED_COUNTRY(B, F) // Burkina Faso
UNHANDLED_COUNTRY(B, J) // Benin
UNHANDLED_COUNTRY(B, L) // St. Barthélemy
UNHANDLED_COUNTRY(C, D) // Congo - Kinshasa
UNHANDLED_COUNTRY(C, F) // Central African Republic
UNHANDLED_COUNTRY(C, G) // Congo - Brazzaville
@ -1305,6 +1310,7 @@ const std::vector<EngineAndTier> GetPrepopulationSetFromCountryID(
UNHANDLED_COUNTRY(I, P) // Clipperton Island ('IP' is an WinXP-ism; ISO
// includes it with France)
#endif
UNHANDLED_COUNTRY(M, F) // Saint Martin
UNHANDLED_COUNTRY(M, L) // Mali
UNHANDLED_COUNTRY(M, Q) // Martinique
UNHANDLED_COUNTRY(N, C) // New Caledonia