Skip to content

Commit

Permalink
Update to Chromium 130.0.6723.58
Browse files Browse the repository at this point in the history
  • Loading branch information
Ahrotahn committed Oct 17, 2024
1 parent 71bfa42 commit 962eb12
Show file tree
Hide file tree
Showing 67 changed files with 1,231 additions and 880 deletions.
2 changes: 1 addition & 1 deletion chromium_version.txt
Original file line number Diff line number Diff line change
@@ -1 +1 @@
129.0.6668.100
130.0.6723.58
2 changes: 2 additions & 0 deletions devutils/update_lists.py
Original file line number Diff line number Diff line change
Expand Up @@ -58,6 +58,8 @@
'build/android/chromium-debug.keystore',
'third_party/icu/android/icudtl.dat',
'third_party/icu/common/icudtb.dat',
# Exclusion for rollup v4.0+
'third_party/node/node_modules/@rollup/wasm-node/dist/wasm-node/bindings_wasm_bg.wasm',
# Exclusion for performance tracing
'third_party/perfetto/src/trace_processor/importers/proto/atoms.descriptor',
# Exclusions for safe file extensions
Expand Down
513 changes: 364 additions & 149 deletions domain_substitution.list

Large diffs are not rendered by default.

2 changes: 1 addition & 1 deletion patches/core/bromite/disable-fetching-field-trials.patch
Original file line number Diff line number Diff line change
Expand Up @@ -51,7 +51,7 @@ Subject: Disable fetching of all field trials
/**
--- a/components/variations/service/variations_service.cc
+++ b/components/variations/service/variations_service.cc
@@ -226,17 +226,7 @@ bool GetInstanceManipulations(const net:
@@ -227,17 +227,7 @@ bool GetInstanceManipulations(const net:
// Variations seed fetching is only enabled in official Chrome builds, if a URL
// is specified on the command line, and for testing.
bool IsFetchingEnabled() {
Expand Down
Original file line number Diff line number Diff line change
@@ -1,14 +1,14 @@
--- a/chrome/browser/BUILD.gn
+++ b/chrome/browser/BUILD.gn
@@ -2241,7 +2241,6 @@ static_library("browser") {
@@ -2251,7 +2251,6 @@ static_library("browser") {
"//components/reporting/util:task_runner_context",
"//components/resources",
"//components/safe_browsing/content/browser",
- "//components/safe_browsing/content/browser:client_side_detection",
"//components/safe_browsing/content/browser:safe_browsing_service",
"//components/safe_browsing/content/browser/password_protection",
"//components/safe_browsing/content/browser/web_ui",
@@ -3613,8 +3612,6 @@ static_library("browser") {
@@ -3636,8 +3635,6 @@ static_library("browser") {
"download/download_commands.h",
"download/download_crx_util.cc",
"download/download_crx_util.h",
Expand Down Expand Up @@ -50,7 +50,7 @@
#include "chrome/browser/shell_integration.h"
#include "chrome/browser/site_isolation/prefs_observer.h"
#include "chrome/browser/ssl/secure_origin_prefs_observer.h"
@@ -452,8 +451,6 @@ void BrowserProcessImpl::StartTearDown()
@@ -478,8 +477,6 @@ void BrowserProcessImpl::StartTearDown()
#endif
metrics_services_manager_.reset();
intranet_redirect_detector_.reset();
Expand All @@ -59,7 +59,7 @@
network_time_tracker_.reset();

#if !BUILDFLAG(IS_ANDROID) && !BUILDFLAG(IS_CHROMEOS)
@@ -1136,14 +1133,6 @@ StatusTray* BrowserProcessImpl::status_t
@@ -1166,14 +1163,6 @@ StatusTray* BrowserProcessImpl::status_t
return status_tray_.get();
}

Expand All @@ -74,7 +74,7 @@
subresource_filter::RulesetService*
BrowserProcessImpl::subresource_filter_ruleset_service() {
DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_);
@@ -1444,26 +1433,6 @@ void BrowserProcessImpl::CreateBackgroun
@@ -1485,26 +1474,6 @@ void BrowserProcessImpl::CreateBackgroun
#endif
}

Expand Down Expand Up @@ -111,7 +111,7 @@
subresource_filter::RulesetService* subresource_filter_ruleset_service()
override;
subresource_filter::RulesetService*
@@ -366,9 +365,6 @@ class BrowserProcessImpl : public Browse
@@ -368,9 +367,6 @@ class BrowserProcessImpl : public Browse
std::unique_ptr<BackgroundModeManager> background_mode_manager_;
#endif

Expand All @@ -131,7 +131,7 @@
#include "chrome/browser/safe_browsing/verdict_cache_manager_factory.h"
#include "chrome/browser/search_engines/template_url_service_factory.h"
#include "chrome/browser/share/share_history.h"
@@ -662,10 +661,6 @@ void ChromeBrowsingDataRemoverDelegate::
@@ -645,10 +644,6 @@ void ChromeBrowsingDataRemoverDelegate::
base::RecordAction(UserMetricsAction("ClearBrowsingData_Cookies"));

network::mojom::NetworkContext* safe_browsing_context = nullptr;
Expand All @@ -144,7 +144,7 @@
browsing_data::RemoveFederatedSiteSettingsData(delete_begin_, delete_end_,
--- a/chrome/browser/chrome_content_browser_client.cc
+++ b/chrome/browser/chrome_content_browser_client.cc
@@ -5506,10 +5506,6 @@ ChromeContentBrowserClient::CreateThrott
@@ -5512,10 +5512,6 @@ ChromeContentBrowserClient::CreateThrott
throttles.push_back(std::make_unique<PolicyBlocklistNavigationThrottle>(
handle, handle->GetWebContents()->GetBrowserContext()));

Expand All @@ -155,7 +155,7 @@
throttles.push_back(std::make_unique<SSLErrorNavigationThrottle>(
handle,
base::BindOnce(&HandleSSLErrorWrapper), base::BindOnce(&IsInHostedApp),
@@ -5561,16 +5557,6 @@ ChromeContentBrowserClient::CreateThrott
@@ -5567,16 +5563,6 @@ ChromeContentBrowserClient::CreateThrott
&throttles);
#endif

Expand All @@ -172,7 +172,7 @@
if (base::FeatureList::IsEnabled(safe_browsing::kDelayedWarnings)) {
throttles.push_back(
std::make_unique<safe_browsing::DelayedWarningNavigationThrottle>(
@@ -5885,8 +5871,6 @@ bool ChromeContentBrowserClient::IsPlugi
@@ -5897,8 +5883,6 @@ bool ChromeContentBrowserClient::IsPlugi
void ChromeContentBrowserClient::InitOnUIThread() {
DCHECK_CURRENTLY_ON(BrowserThread::UI);

Expand Down Expand Up @@ -207,7 +207,7 @@
} // namespace
--- a/chrome/browser/download/chrome_download_manager_delegate.cc
+++ b/chrome/browser/download/chrome_download_manager_delegate.cc
@@ -532,13 +532,6 @@ void ChromeDownloadManagerDelegate::SetD
@@ -533,13 +533,6 @@ void ChromeDownloadManagerDelegate::SetD

download_manager_ = dm;

Expand All @@ -221,7 +221,7 @@
if (download_manager_) {
download_manager_->AddObserver(this);
}
@@ -973,17 +966,6 @@ void ChromeDownloadManagerDelegate::Choo
@@ -1007,17 +1000,6 @@ void ChromeDownloadManagerDelegate::Choo
void ChromeDownloadManagerDelegate::SanitizeSavePackageResourceName(
base::FilePath* filename,
const GURL& source_url) {
Expand Down Expand Up @@ -250,7 +250,7 @@

// Whether the download is currently being revived.
bool is_being_revived_ = false;
@@ -555,13 +555,13 @@ void DownloadItemModel::SetShouldPreferO
@@ -531,13 +531,13 @@ void DownloadItemModel::SetShouldPreferO
data->should_prefer_opening_in_browser_ = preference;
}

Expand All @@ -267,7 +267,7 @@
DownloadItemModelData* data = DownloadItemModelData::GetOrCreate(download_);
data->danger_level_ = danger_level;
}
@@ -764,9 +764,6 @@ bool DownloadItemModel::IsCommandEnabled
@@ -740,9 +740,6 @@ bool DownloadItemModel::IsCommandEnabled
// filename. Don't base an "Always open" decision based on it. Also
// exclude extensions.
return download_->CanOpenDownload() &&
Expand All @@ -279,7 +279,7 @@
return !download_->IsSavePackageDownload() &&
--- a/chrome/browser/download/download_prefs.cc
+++ b/chrome/browser/download/download_prefs.cc
@@ -261,14 +261,7 @@ DownloadPrefs::DownloadPrefs(Profile* pr
@@ -257,14 +257,7 @@ DownloadPrefs::DownloadPrefs(Profile* pr
base::FilePath::StringType(1, base::FilePath::kExtensionSeparator) +
extension);

Expand All @@ -295,7 +295,7 @@
}
}

@@ -446,10 +439,6 @@ bool DownloadPrefs::IsAutoOpenByPolicy(c
@@ -442,10 +435,6 @@ bool DownloadPrefs::IsAutoOpenByPolicy(c
bool DownloadPrefs::EnableAutoOpenByUserBasedOnExtension(
const base::FilePath& file_name) {
base::FilePath::StringType extension = file_name.Extension();
Expand All @@ -308,7 +308,7 @@
extension.erase(0, 1);
--- a/chrome/browser/download/download_target_determiner.cc
+++ b/chrome/browser/download/download_target_determiner.cc
@@ -333,13 +333,6 @@ base::FilePath DownloadTargetDeterminer:
@@ -324,13 +324,6 @@ base::FilePath DownloadTargetDeterminer:
download_->GetURL(), download_->GetContentDisposition(), referrer_charset,
suggested_filename, sniffed_mime_type, default_filename);

Expand All @@ -322,7 +322,7 @@
// If no mime type or explicitly specified a name, don't replace file
// extension.
if (sniffed_mime_type.empty() || !suggested_filename.empty())
@@ -1364,30 +1357,7 @@ DownloadFileType::DangerLevel DownloadTa
@@ -1316,30 +1309,7 @@ DownloadFileType::DangerLevel DownloadTa
download_->HasUserGesture())
return DownloadFileType::NOT_DANGEROUS;

Expand Down Expand Up @@ -364,7 +364,7 @@
#include "chrome/browser/download/download_file_icon_extractor.h"
#include "chrome/browser/download/download_open_prompt.h"
#include "chrome/browser/download/download_prefs.h"
@@ -1378,9 +1377,6 @@ DownloadsAcceptDangerFunction::Downloads
@@ -1379,9 +1378,6 @@ DownloadsAcceptDangerFunction::Downloads

DownloadsAcceptDangerFunction::~DownloadsAcceptDangerFunction() {}

Expand All @@ -374,7 +374,7 @@
ExtensionFunction::ResponseAction DownloadsAcceptDangerFunction::Run() {
std::optional<downloads::AcceptDanger::Params> params =
downloads::AcceptDanger::Params::Create(args());
@@ -1418,42 +1414,7 @@ void DownloadsAcceptDangerFunction::Prom
@@ -1419,42 +1415,7 @@ void DownloadsAcceptDangerFunction::Prom
return;
}
RecordApiFunctions(DOWNLOADS_FUNCTION_ACCEPT_DANGER);
Expand Down Expand Up @@ -656,7 +656,7 @@
#include "chrome/browser/sessions/exit_type_service.h"
#include "chrome/browser/sharing/sharing_service_factory.h"
#include "chrome/browser/signin/identity_manager_factory.h"
@@ -643,17 +642,6 @@ void ProfileImpl::LoadPrefsForNormalStar
@@ -646,17 +645,6 @@ void ProfileImpl::LoadPrefsForNormalStar

mojo::PendingRemote<prefs::mojom::TrackedPreferenceValidationDelegate>
pref_validation_delegate;
Expand Down Expand Up @@ -696,23 +696,23 @@
sources = [
"chrome_controller_client.cc",
"chrome_controller_client.h",
@@ -73,6 +74,7 @@ static_library("safe_browsing") {
@@ -74,6 +75,7 @@ static_library("safe_browsing") {
"//mojo/public/cpp/system",
"//services/preferences/public/cpp",
]
+ }

if (is_android) {
deps += [
@@ -520,6 +522,7 @@ static_library("advanced_protection") {
@@ -525,6 +527,7 @@ static_library("advanced_protection") {
}

source_set("metrics_collector") {
+ if (false) {
sources = [
"safe_browsing_metrics_collector_factory.cc",
"safe_browsing_metrics_collector_factory.h",
@@ -539,6 +542,7 @@ source_set("metrics_collector") {
@@ -544,6 +547,7 @@ source_set("metrics_collector") {
"//components/safe_browsing/core/common:safe_browsing_prefs",
"//content/public/browser",
]
Expand Down Expand Up @@ -818,7 +818,7 @@
}
--- a/chrome/browser/ui/BUILD.gn
+++ b/chrome/browser/ui/BUILD.gn
@@ -4404,7 +4404,6 @@ static_library("ui") {
@@ -4294,7 +4294,6 @@ static_library("ui") {
"views/download/bubble/download_dialog_view.h",
"views/download/bubble/download_toolbar_button_view.cc",
"views/download/bubble/download_toolbar_button_view.h",
Expand All @@ -828,7 +828,7 @@
"views/download/download_item_view.cc",
--- a/chrome/browser/ui/tab_helpers.cc
+++ b/chrome/browser/ui/tab_helpers.cc
@@ -507,32 +507,6 @@ void TabHelpers::AttachTabHelpers(WebCon
@@ -512,37 +512,8 @@ void TabHelpers::AttachTabHelpers(WebCon
// See https://crbug.com/910288.
resource_coordinator::ResourceCoordinatorTabHelper::CreateForWebContents(
web_contents);
Expand All @@ -837,6 +837,9 @@
- safe_browsing::SafeBrowsingNavigationObserverManagerFactory::
- GetForBrowserContext(profile),
- profile->GetPrefs(), g_browser_process->safe_browsing_service());
site_protection::SiteProtectionMetricsObserver::CreateForWebContents(
web_contents);
-
- if (base::FeatureList::IsEnabled(
- safe_browsing::kTailoredSecurityIntegration)) {
- safe_browsing::TailoredSecurityUrlObserver::CreateForWebContents(
Expand All @@ -847,7 +850,9 @@
- safe_browsing::kSafeBrowsingAsyncRealTimeCheck) &&
- g_browser_process->safe_browsing_service()) {
- safe_browsing::AsyncCheckTracker::CreateForWebContents(
- web_contents, g_browser_process->safe_browsing_service()->ui_manager());
- web_contents, g_browser_process->safe_browsing_service()->ui_manager(),
- safe_browsing::AsyncCheckTracker::
- IsPlatformEligibleForSyncCheckerCheckAllowlist());
- }
- // SafeBrowsingTabObserver creates a ClientSideDetectionHost, which observes
- // events from PermissionRequestManager and AsyncCheckTracker in its
Expand Down Expand Up @@ -996,8 +1001,8 @@
-
#if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_WIN)
std::unique_ptr<SupervisedUserVerificationPage>
CreateSupervisedUserVerificationPage(content::WebContents* web_contents) {
@@ -411,61 +324,6 @@ CreateSupervisedUserVerificationPageForB
CreateSupervisedUserVerificationPage(content::WebContents* web_contents,
@@ -415,61 +328,6 @@ CreateSupervisedUserVerificationPageForB
}
#endif

Expand Down Expand Up @@ -1059,7 +1064,7 @@
#if BUILDFLAG(ENABLE_CAPTIVE_PORTAL_DETECTION)
std::unique_ptr<CaptivePortalBlockingPage> CreateCaptivePortalBlockingPage(
content::WebContents* web_contents) {
@@ -572,12 +430,8 @@ void InterstitialHTMLSource::StartDataRe
@@ -576,12 +434,8 @@ void InterstitialHTMLSource::StartDataRe
interstitial_delegate = CreateMITMSoftwareBlockingPage(web_contents);
} else if (path_without_query == "/blocked-interception") {
interstitial_delegate = CreateBlockedInterceptionBlockingPage(web_contents);
Expand All @@ -1072,7 +1077,7 @@
} else if (path_without_query == "/clock") {
interstitial_delegate = CreateBadClockBlockingPage(web_contents);
} else if (path_without_query == "/lookalike") {
@@ -599,12 +453,7 @@ void InterstitialHTMLSource::StartDataRe
@@ -611,12 +465,7 @@ void InterstitialHTMLSource::StartDataRe
#endif
}

Expand All @@ -1088,15 +1093,15 @@
html = interstitial_delegate.get()->GetHTMLContents();
--- a/chrome/renderer/chrome_content_renderer_client.cc
+++ b/chrome/renderer/chrome_content_renderer_client.cc
@@ -107,7 +107,6 @@
@@ -109,7 +109,6 @@
#include "components/pdf/common/pdf_util.h"
#include "components/permissions/features.h"
#include "components/safe_browsing/buildflags.h"
-#include "components/safe_browsing/content/renderer/threat_dom_details.h"
#include "components/sampling_profiler/thread_profiler.h"
#include "components/security_interstitials/content/renderer/security_interstitial_page_controller_delegate_impl.h"
#include "components/spellcheck/spellcheck_buildflags.h"
#include "components/subresource_filter/content/renderer/subresource_filter_agent.h"
#include "components/subresource_filter/content/renderer/unverified_ruleset_dealer.h"
@@ -458,12 +457,8 @@ void ChromeContentRendererClient::Render
@@ -473,12 +472,8 @@ void ChromeContentRendererClient::Render
subresource_filter_ruleset_dealer_ =
std::make_unique<subresource_filter::UnverifiedRulesetDealer>();

Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
--- a/components/autofill/core/browser/crowdsourcing/autofill_crowdsourcing_manager.cc
+++ b/components/autofill/core/browser/crowdsourcing/autofill_crowdsourcing_manager.cc
@@ -828,93 +828,6 @@ std::tuple<GURL, std::string> AutofillCr
@@ -893,93 +893,6 @@ std::tuple<GURL, std::string> AutofillCr
}

bool AutofillCrowdsourcingManager::StartRequest(FormRequestData request_data) {
Expand Down
2 changes: 1 addition & 1 deletion patches/core/inox-patchset/0015-disable-update-pings.patch
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
--- a/chrome/updater/configurator.cc
+++ b/chrome/updater/configurator.cc
@@ -106,7 +106,7 @@ base::TimeDelta Configurator::UpdateDela
@@ -108,7 +108,7 @@ base::TimeDelta Configurator::UpdateDela

std::vector<GURL> Configurator::UpdateUrl() const {
DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_);
Expand Down
2 changes: 1 addition & 1 deletion patches/core/inox-patchset/0021-disable-rlz.patch
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

--- a/BUILD.gn
+++ b/BUILD.gn
@@ -460,14 +460,6 @@ group("gn_all") {
@@ -469,14 +469,6 @@ group("gn_all") {
deps += [ "//chromeos:chromeos_unittests" ]
}

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -595,9 +595,9 @@ by default.
+ "trk:099:https://www.googleapis.com/auth/assistant-sdk-prototype";

// OAuth2 scope for access to nearby devices (fast pair) APIs.
const char kCloudPlatformProjectsOAuth2Scope[] =
- "https://www.googleapis.com/auth/cloudplatformprojects";
+ "trk:100:https://www.googleapis.com/auth/cloudplatformprojects";
const char kNearbyDevicesOAuth2Scope[] =
- "https://www.googleapis.com/auth/nearbydevices-pa";
+ "trk:100:https://www.googleapis.com/auth/nearbydevices-pa";

// OAuth2 scope for access to nearby sharing.
const char kNearbyShareOAuth2Scope[] =
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -56,7 +56,7 @@ the URL so we get notified if this happens again in the future).
IncidentReportingService::IncidentReportingService(
--- a/chrome/browser/safe_browsing/safe_browsing_service.cc
+++ b/chrome/browser/safe_browsing/safe_browsing_service.cc
@@ -373,7 +373,7 @@ SafeBrowsingUIManager* SafeBrowsingServi
@@ -372,7 +372,7 @@ SafeBrowsingUIManager* SafeBrowsingServi
}

void SafeBrowsingService::RegisterAllDelayedAnalysis() {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ This prevents trk:148 (phishing) and trk:149 (malware).

--- a/components/safe_browsing/content/browser/client_side_detection_service.cc
+++ b/components/safe_browsing/content/browser/client_side_detection_service.cc
@@ -271,6 +271,10 @@ void ClientSideDetectionService::StartCl
@@ -277,6 +277,10 @@ void ClientSideDetectionService::StartCl
return;
}

Expand All @@ -24,7 +24,7 @@ This prevents trk:148 (phishing) and trk:149 (malware).
std::string request_data;
request->SerializeToString(&request_data);

@@ -350,6 +354,7 @@ void ClientSideDetectionService::StartCl
@@ -357,6 +361,7 @@ void ClientSideDetectionService::StartCl
base::BindOnce(&WebUIInfoSingleton::AddToClientPhishingRequestsSent,
base::Unretained(WebUIInfoSingleton::GetInstance()),
std::move(request), access_token));
Expand Down
Loading

0 comments on commit 962eb12

Please sign in to comment.