update v8, ffmpeg, chromium, crashpad, boringssl, and webrtc patches
This commit is contained in:
parent
d5e9b662f8
commit
6f2f761df3
90 changed files with 7411 additions and 7874 deletions
|
@ -1,9 +1,9 @@
|
|||
diff --git a/chrome/browser/ssl/security_state_tab_helper.cc b/chrome/browser/ssl/security_state_tab_helper.cc
|
||||
index a73442a5476c..6cd7ae78b814 100644
|
||||
index 7b12c9d2df52..e75171b86ef1 100644
|
||||
--- a/chrome/browser/ssl/security_state_tab_helper.cc
|
||||
+++ b/chrome/browser/ssl/security_state_tab_helper.cc
|
||||
@@ -10,15 +10,21 @@
|
||||
#include "base/metrics/histogram_macros.h"
|
||||
@@ -13,17 +13,23 @@
|
||||
#include "base/strings/string_util.h"
|
||||
#include "base/time/time.h"
|
||||
#include "build/build_config.h"
|
||||
+#if 0
|
||||
|
@ -12,19 +12,21 @@ index a73442a5476c..6cd7ae78b814 100644
|
|||
#include "chrome/browser/safe_browsing/safe_browsing_service.h"
|
||||
#include "chrome/browser/safe_browsing/ui_manager.h"
|
||||
+#endif
|
||||
#include "chrome/common/chrome_switches.h"
|
||||
#include "chrome/common/pref_names.h"
|
||||
#include "chrome/common/secure_origin_whitelist.h"
|
||||
#include "components/prefs/pref_service.h"
|
||||
+#if 0
|
||||
#include "components/safe_browsing/features.h"
|
||||
+#endif
|
||||
#include "components/security_state/content/content_utils.h"
|
||||
#include "components/ssl_config/ssl_config_prefs.h"
|
||||
+#if 0
|
||||
#include "components/toolbar/toolbar_field_trial.h"
|
||||
+#endif
|
||||
#include "content/public/browser/browser_context.h"
|
||||
#include "content/public/browser/navigation_entry.h"
|
||||
#include "content/public/browser/navigation_handle.h"
|
||||
@@ -37,7 +43,7 @@
|
||||
@@ -43,7 +49,7 @@
|
||||
#include "chrome/browser/chromeos/policy/policy_cert_service_factory.h"
|
||||
#endif // defined(OS_CHROMEOS)
|
||||
|
||||
|
@ -33,7 +35,7 @@ index a73442a5476c..6cd7ae78b814 100644
|
|||
#include "chrome/browser/safe_browsing/chrome_password_protection_service.h"
|
||||
#endif
|
||||
|
||||
@@ -59,7 +65,9 @@ void RecordSecurityLevel(const security_state::SecurityInfo& security_info) {
|
||||
@@ -81,7 +87,9 @@ bool IsOriginSecureWithWhitelist(
|
||||
|
||||
DEFINE_WEB_CONTENTS_USER_DATA_KEY(SecurityStateTabHelper);
|
||||
|
||||
|
@ -43,7 +45,7 @@ index a73442a5476c..6cd7ae78b814 100644
|
|||
|
||||
SecurityStateTabHelper::SecurityStateTabHelper(
|
||||
content::WebContents* web_contents)
|
||||
@@ -67,8 +75,11 @@ SecurityStateTabHelper::SecurityStateTabHelper(
|
||||
@@ -89,8 +97,11 @@ SecurityStateTabHelper::SecurityStateTabHelper(
|
||||
logged_http_warning_on_current_navigation_(false),
|
||||
is_incognito_(false) {
|
||||
content::BrowserContext* context = web_contents->GetBrowserContext();
|
||||
|
@ -57,7 +59,7 @@ index a73442a5476c..6cd7ae78b814 100644
|
|||
is_incognito_ = true;
|
||||
}
|
||||
}
|
||||
@@ -150,6 +161,7 @@ void SecurityStateTabHelper::DidFinishNavigation(
|
||||
@@ -175,6 +186,7 @@ void SecurityStateTabHelper::DidFinishNavigation(
|
||||
UMA_HISTOGRAM_BOOLEAN("interstitial.ssl.visited_site_after_warning", true);
|
||||
}
|
||||
|
||||
|
@ -65,7 +67,7 @@ index a73442a5476c..6cd7ae78b814 100644
|
|||
// Security indicator UI study (https://crbug.com/803501): Show a message in
|
||||
// the console to reduce developer confusion about the experimental UI
|
||||
// treatments for HTTPS pages with EV certificates.
|
||||
@@ -177,6 +189,7 @@ void SecurityStateTabHelper::DidFinishNavigation(
|
||||
@@ -202,6 +214,7 @@ void SecurityStateTabHelper::DidFinishNavigation(
|
||||
"Validation is still valid.");
|
||||
}
|
||||
}
|
||||
|
@ -73,7 +75,7 @@ index a73442a5476c..6cd7ae78b814 100644
|
|||
}
|
||||
|
||||
void SecurityStateTabHelper::DidChangeVisibleSecurityState() {
|
||||
@@ -250,6 +263,7 @@ SecurityStateTabHelper::GetMaliciousContentStatus() const {
|
||||
@@ -275,6 +288,7 @@ SecurityStateTabHelper::GetMaliciousContentStatus() const {
|
||||
web_contents()->GetController().GetVisibleEntry();
|
||||
if (!entry)
|
||||
return security_state::MALICIOUS_CONTENT_STATUS_NONE;
|
||||
|
@ -81,7 +83,7 @@ index a73442a5476c..6cd7ae78b814 100644
|
|||
safe_browsing::SafeBrowsingService* sb_service =
|
||||
g_browser_process->safe_browsing_service();
|
||||
if (!sb_service)
|
||||
@@ -301,6 +315,7 @@ SecurityStateTabHelper::GetMaliciousContentStatus() const {
|
||||
@@ -323,6 +337,7 @@ SecurityStateTabHelper::GetMaliciousContentStatus() const {
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
@ -89,3 +91,47 @@ index a73442a5476c..6cd7ae78b814 100644
|
|||
return security_state::MALICIOUS_CONTENT_STATUS_NONE;
|
||||
}
|
||||
|
||||
@@ -343,15 +358,19 @@ std::vector<std::string> SecurityStateTabHelper::GetSecureOriginsAndPatterns()
|
||||
const {
|
||||
const base::CommandLine& command_line =
|
||||
*base::CommandLine::ForCurrentProcess();
|
||||
+#if 0
|
||||
Profile* profile =
|
||||
Profile::FromBrowserContext(web_contents()->GetBrowserContext());
|
||||
PrefService* prefs = profile->GetPrefs();
|
||||
+#endif
|
||||
std::string origins_str = "";
|
||||
if (command_line.HasSwitch(switches::kUnsafelyTreatInsecureOriginAsSecure)) {
|
||||
origins_str = command_line.GetSwitchValueASCII(
|
||||
switches::kUnsafelyTreatInsecureOriginAsSecure);
|
||||
+#if 0
|
||||
} else if (prefs->HasPrefPath(prefs::kUnsafelyTreatInsecureOriginAsSecure)) {
|
||||
origins_str = prefs->GetString(prefs::kUnsafelyTreatInsecureOriginAsSecure);
|
||||
+#endif
|
||||
}
|
||||
return secure_origin_whitelist::ParseWhitelist(origins_str);
|
||||
}
|
||||
diff --git a/chrome/common/secure_origin_whitelist.cc b/chrome/common/secure_origin_whitelist.cc
|
||||
index db9bb54ddbc1..cc7a22bdb920 100644
|
||||
--- a/chrome/common/secure_origin_whitelist.cc
|
||||
+++ b/chrome/common/secure_origin_whitelist.cc
|
||||
@@ -13,7 +13,9 @@
|
||||
#include "chrome/common/chrome_switches.h"
|
||||
#include "chrome/common/pref_names.h"
|
||||
#include "components/prefs/pref_registry_simple.h"
|
||||
+#if 0
|
||||
#include "extensions/common/constants.h"
|
||||
+#endif
|
||||
#include "net/base/registry_controlled_domains/registry_controlled_domain.h"
|
||||
#include "url/gurl.h"
|
||||
#include "url/origin.h"
|
||||
@@ -155,7 +157,9 @@ std::vector<std::string> GetWhitelist() {
|
||||
|
||||
std::set<std::string> GetSchemesBypassingSecureContextCheck() {
|
||||
std::set<std::string> schemes;
|
||||
+#if 0
|
||||
schemes.insert(extensions::kExtensionScheme);
|
||||
+#endif
|
||||
return schemes;
|
||||
}
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue