chore: bump chromium to 110.0.5415.0 (main) (#36186)
* chore: bump chromium in DEPS to 109.0.5386.0 * chore: bump chromium in DEPS to 109.0.5388.0 * chore: bump chromium in DEPS to 109.0.5390.0 * chore: bump chromium in DEPS to 109.0.5392.0 * chore: bump chromium in DEPS to 109.0.5394.0 * chore: bump chromium in DEPS to 109.0.5396.0 * chore: bump chromium in DEPS to 109.0.5398.0 * chore: bump chromium in DEPS to 109.0.5400.0 * chore: update galactus * chore: bump chromium in DEPS to 109.0.5402.0 * chore: bump chromium in DEPS to 109.0.5403.0 * chore: bump chromium in DEPS to 109.0.5406.0 * chore: update patches * 4004247: Delete unused DocumentWebContentsDelegate Ref:4004247
* chore: bump chromium in DEPS to 109.0.5408.1 * chore: update patches * 3949284: Support pkey debug mode without pkey 0 access Ref:3949284
* chore: bump chromium in DEPS to 109.0.5410.0 * chore: update patches * 4000944: [Extensions] Create an API directory in //chrome/renderer/extensions Ref:4000944
* 3988524: Remove DocumentOverlayWindowViews |3988524
Co-authored-by: George Xu <33054982+georgexu99@users.noreply.github.com> * chore: bump chromium in DEPS to 109.0.5412.0 * chore: update patches * 3984022: Add AddChildWindowToBrowser to DisplayClient mojo interface Ref:3984022
* 3957079: Delete the CryptoToken component extension and internal API Ref:3957079
* 4004421: Migreate ScopedAllowIO to ScopedAllowBlocking Ref:4004421
Co-authored-by: George Xu <georgexu99@users.noreply.github.com> * chore: bump chromium in DEPS to 109.0.5414.0 * chore: update patches * 4016180: Split PPAPI Mojo interfaces out of RenderFrameHostImpl. Ref:4016180
* 3970838: [MPArch] Convert HostZoomMap and ZoomController off of RenderViewHost ids Ref:3970838
* 3997795: Don't add Chromium as a login item Ref:3997795
* 3993482: Remove RefCountedString::TakeString Ref:3993482
* 3990749: Allow forward-declared sources in base::ScopedObservation<> Ref:3990749
* fixup! 3957079: Delete the CryptoToken component extension and internal API * chore: bump chromium in DEPS to 110.0.5415.0 * 3883790: Move devtools_frame_token to the RenderFrameHost, to preserve RFH identity across MPArch activations.3883790
* 4022205: Move license tooling into //tools/licenses4022205
* chore: fixup patch indices * fixup! 3957079: Delete the CryptoToken component extension and internal API * 4008687: Finish ScopedAllowIO migration4008687
* 3991548: Move WindowButtonOrderObserver and WindowFrameAction to LinuxUi3991548
* fixup! 3984022: Add AddChildWindowToBrowser to DisplayClient mojo interface * 4016595: Migrate non-default ScopedObservation<> instantiations to ScopedObservationTraits<> in chrome/browser/4016595
* 4000481: Rename :chromedriver to :chromedriver_server Ref:4000481
* 4008687: Finish ScopedAllowIO migration4008687
* 3988524: Remove DocumentOverlayWindowViews3988524
* fixup! 3997795: Don't add Chromium as a login item * chore: fixup patches * 3996872: Plumb input event task runner to EventFactoryEvdev3996872
* 4014994: Enable SiteIsolationForGuests by default.4014994
* chore: adopt new thread restrictions api for //electron (#36357) chore: add thread blocking api * fixup! 4014994: Enable SiteIsolationForGuests by default. * pull parent HWND for dialogs on ui thread * chore: set parent_window in MessageBoxSettings * chore: remove redundant patch * chore: revert accidental deletion * chore: update patches Co-authored-by: electron-roller[bot] <84116207+electron-roller[bot]@users.noreply.github.com> Co-authored-by: Samuel Attard <sattard@salesforce.com> Co-authored-by: Keeley Hammond <khammond@slack-corp.com> Co-authored-by: VerteDinde <vertedinde@electronjs.org> Co-authored-by: George Xu <33054982+georgexu99@users.noreply.github.com> Co-authored-by: George Xu <georgexu99@users.noreply.github.com> Co-authored-by: Shelley Vohr <shelley.vohr@gmail.com> Co-authored-by: Robo <hop2deep@gmail.com> Co-authored-by: Jeremy Rose <jeremya@chromium.org> Co-authored-by: PatchUp <73610968+patchup[bot]@users.noreply.github.com>
This commit is contained in:
parent
517225b99e
commit
87c183df6a
138 changed files with 818 additions and 1630 deletions
|
@ -14,7 +14,6 @@
|
|||
#include "base/strings/pattern.h"
|
||||
#include "base/strings/string_util.h"
|
||||
#include "base/strings/utf_string_conversions.h"
|
||||
#include "base/threading/thread_restrictions.h"
|
||||
#include "gin/arguments.h"
|
||||
#include "gin/object_template_builder.h"
|
||||
#include "gin/per_isolate_data.h"
|
||||
|
@ -30,6 +29,7 @@
|
|||
#include "shell/common/gin_helper/object_template_builder.h"
|
||||
#include "shell/common/node_includes.h"
|
||||
#include "shell/common/skia_util.h"
|
||||
#include "shell/common/thread_restrictions.h"
|
||||
#include "third_party/skia/include/core/SkBitmap.h"
|
||||
#include "third_party/skia/include/core/SkImageInfo.h"
|
||||
#include "third_party/skia/include/core/SkPixelRef.h"
|
||||
|
@ -66,7 +66,7 @@ base::FilePath NormalizePath(const base::FilePath& path) {
|
|||
return path;
|
||||
}
|
||||
|
||||
base::ThreadRestrictions::ScopedAllowIO allow_blocking;
|
||||
ScopedAllowBlockingForElectron allow_blocking;
|
||||
base::FilePath absolute_path = MakeAbsoluteFilePath(path);
|
||||
// MakeAbsoluteFilePath returns an empty path on failures so use original path
|
||||
if (absolute_path.empty()) {
|
||||
|
|
|
@ -15,9 +15,9 @@
|
|||
#include "shell/common/platform_util.h"
|
||||
|
||||
#if BUILDFLAG(IS_WIN)
|
||||
#include "base/threading/thread_restrictions.h"
|
||||
#include "base/win/scoped_com_initializer.h"
|
||||
#include "base/win/shortcut.h"
|
||||
#include "shell/common/thread_restrictions.h"
|
||||
|
||||
namespace gin {
|
||||
|
||||
|
@ -106,10 +106,6 @@ v8::Local<v8::Promise> TrashItem(v8::Isolate* isolate,
|
|||
}
|
||||
|
||||
#if BUILDFLAG(IS_WIN)
|
||||
// The use of the ForTesting flavors is a hack workaround to avoid having to
|
||||
// patch these as friends into the associated guard classes.
|
||||
class ShortcutAccessScopedAllowBlocking
|
||||
: public base::ScopedAllowBlockingForTesting {};
|
||||
|
||||
bool WriteShortcutLink(const base::FilePath& shortcut_path,
|
||||
gin_helper::Arguments* args) {
|
||||
|
@ -142,7 +138,7 @@ bool WriteShortcutLink(const base::FilePath& shortcut_path,
|
|||
if (options.Get("toastActivatorClsid", &toastActivatorClsid))
|
||||
properties.set_toast_activator_clsid(toastActivatorClsid);
|
||||
|
||||
ShortcutAccessScopedAllowBlocking allow_blocking;
|
||||
electron::ScopedAllowBlockingForElectron allow_blocking;
|
||||
base::win::ScopedCOMInitializer com_initializer;
|
||||
return base::win::CreateOrUpdateShortcutLink(shortcut_path, properties,
|
||||
operation);
|
||||
|
@ -152,7 +148,7 @@ v8::Local<v8::Value> ReadShortcutLink(gin_helper::ErrorThrower thrower,
|
|||
const base::FilePath& path) {
|
||||
using base::win::ShortcutProperties;
|
||||
gin::Dictionary options = gin::Dictionary::CreateEmpty(thrower.isolate());
|
||||
ShortcutAccessScopedAllowBlocking allow_blocking;
|
||||
electron::ScopedAllowBlockingForElectron allow_blocking;
|
||||
base::win::ScopedCOMInitializer com_initializer;
|
||||
base::win::ShortcutProperties properties;
|
||||
if (!base::win::ResolveShortcutProperties(
|
||||
|
|
|
@ -14,7 +14,6 @@
|
|||
#include "base/process/process_handle.h"
|
||||
#include "base/process/process_metrics_iocounters.h"
|
||||
#include "base/system/sys_info.h"
|
||||
#include "base/threading/thread_restrictions.h"
|
||||
#include "chrome/common/chrome_version.h"
|
||||
#include "electron/electron_version.h"
|
||||
#include "services/resource_coordinator/public/cpp/memory_instrumentation/global_memory_dump.h"
|
||||
|
@ -28,6 +27,7 @@
|
|||
#include "shell/common/gin_helper/promise.h"
|
||||
#include "shell/common/heap_snapshot.h"
|
||||
#include "shell/common/node_includes.h"
|
||||
#include "shell/common/thread_restrictions.h"
|
||||
#include "third_party/blink/renderer/platform/heap/process_heap.h" // nogncheck
|
||||
|
||||
namespace electron {
|
||||
|
@ -325,7 +325,7 @@ v8::Local<v8::Value> ElectronBindings::GetIOCounters(v8::Isolate* isolate) {
|
|||
// static
|
||||
bool ElectronBindings::TakeHeapSnapshot(v8::Isolate* isolate,
|
||||
const base::FilePath& file_path) {
|
||||
base::ThreadRestrictions::ScopedAllowIO allow_io;
|
||||
ScopedAllowBlockingForElectron allow_blocking;
|
||||
|
||||
base::File file(file_path,
|
||||
base::File::FLAG_CREATE_ALWAYS | base::File::FLAG_WRITE);
|
||||
|
|
|
@ -15,11 +15,11 @@
|
|||
#include "base/logging.h"
|
||||
#include "base/pickle.h"
|
||||
#include "base/strings/string_number_conversions.h"
|
||||
#include "base/threading/thread_restrictions.h"
|
||||
#include "base/values.h"
|
||||
#include "electron/fuses.h"
|
||||
#include "shell/common/asar/asar_util.h"
|
||||
#include "shell/common/asar/scoped_temporary_file.h"
|
||||
#include "shell/common/thread_restrictions.h"
|
||||
|
||||
#if BUILDFLAG(IS_WIN)
|
||||
#include <io.h>
|
||||
|
@ -167,7 +167,7 @@ Archive::FileInfo::~FileInfo() = default;
|
|||
|
||||
Archive::Archive(const base::FilePath& path)
|
||||
: initialized_(false), path_(path), file_(base::File::FILE_OK) {
|
||||
base::ThreadRestrictions::ScopedAllowIO allow_io;
|
||||
electron::ScopedAllowBlockingForElectron allow_blocking;
|
||||
file_.Initialize(path_, base::File::FLAG_OPEN | base::File::FLAG_READ);
|
||||
#if BUILDFLAG(IS_WIN)
|
||||
fd_ = _open_osfhandle(reinterpret_cast<intptr_t>(file_.GetPlatformFile()), 0);
|
||||
|
@ -184,7 +184,7 @@ Archive::~Archive() {
|
|||
file_.TakePlatformFile();
|
||||
}
|
||||
#endif
|
||||
base::ThreadRestrictions::ScopedAllowIO allow_io;
|
||||
electron::ScopedAllowBlockingForElectron allow_blocking;
|
||||
file_.Close();
|
||||
}
|
||||
|
||||
|
@ -206,7 +206,7 @@ bool Archive::Init() {
|
|||
|
||||
buf.resize(8);
|
||||
{
|
||||
base::ThreadRestrictions::ScopedAllowIO allow_io;
|
||||
electron::ScopedAllowBlockingForElectron allow_blocking;
|
||||
len = file_.ReadAtCurrentPos(buf.data(), buf.size());
|
||||
}
|
||||
if (len != static_cast<int>(buf.size())) {
|
||||
|
@ -223,7 +223,7 @@ bool Archive::Init() {
|
|||
|
||||
buf.resize(size);
|
||||
{
|
||||
base::ThreadRestrictions::ScopedAllowIO allow_io;
|
||||
electron::ScopedAllowBlockingForElectron allow_blocking;
|
||||
len = file_.ReadAtCurrentPos(buf.data(), buf.size());
|
||||
}
|
||||
if (len != static_cast<int>(buf.size())) {
|
||||
|
|
|
@ -18,10 +18,10 @@
|
|||
#include "base/strings/string_util.h"
|
||||
#include "base/synchronization/lock.h"
|
||||
#include "base/threading/thread_local.h"
|
||||
#include "base/threading/thread_restrictions.h"
|
||||
#include "crypto/secure_hash.h"
|
||||
#include "crypto/sha2.h"
|
||||
#include "shell/common/asar/archive.h"
|
||||
#include "shell/common/thread_restrictions.h"
|
||||
|
||||
namespace asar {
|
||||
|
||||
|
@ -43,7 +43,7 @@ bool IsDirectoryCached(const base::FilePath& path) {
|
|||
if (it != is_directory_cache.end()) {
|
||||
return it->second;
|
||||
}
|
||||
base::ThreadRestrictions::ScopedAllowIO allow_io;
|
||||
electron::ScopedAllowBlockingForElectron allow_blocking;
|
||||
return is_directory_cache[path] = base::DirectoryExists(path);
|
||||
}
|
||||
|
||||
|
|
|
@ -8,8 +8,8 @@
|
|||
|
||||
#include "base/files/file_util.h"
|
||||
#include "base/logging.h"
|
||||
#include "base/threading/thread_restrictions.h"
|
||||
#include "shell/common/asar/asar_util.h"
|
||||
#include "shell/common/thread_restrictions.h"
|
||||
|
||||
namespace asar {
|
||||
|
||||
|
@ -17,7 +17,7 @@ ScopedTemporaryFile::ScopedTemporaryFile() = default;
|
|||
|
||||
ScopedTemporaryFile::~ScopedTemporaryFile() {
|
||||
if (!path_.empty()) {
|
||||
base::ThreadRestrictions::ScopedAllowIO allow_io;
|
||||
electron::ScopedAllowBlockingForElectron allow_blocking;
|
||||
// On Windows it is very likely the file is already in use (because it is
|
||||
// mostly used for Node native modules), so deleting it now will halt the
|
||||
// program.
|
||||
|
@ -33,7 +33,7 @@ bool ScopedTemporaryFile::Init(const base::FilePath::StringType& ext) {
|
|||
if (!path_.empty())
|
||||
return true;
|
||||
|
||||
base::ThreadRestrictions::ScopedAllowIO allow_io;
|
||||
electron::ScopedAllowBlockingForElectron allow_blocking;
|
||||
if (!base::CreateTemporaryFile(&path_))
|
||||
return false;
|
||||
|
||||
|
@ -62,7 +62,7 @@ bool ScopedTemporaryFile::InitFromFile(
|
|||
if (!Init(ext))
|
||||
return false;
|
||||
|
||||
base::ThreadRestrictions::ScopedAllowIO allow_io;
|
||||
electron::ScopedAllowBlockingForElectron allow_blocking;
|
||||
std::vector<char> buf(size);
|
||||
int len = src->Read(offset, buf.data(), buf.size());
|
||||
if (len != static_cast<int>(size))
|
||||
|
|
|
@ -36,7 +36,6 @@ group("extensions_features") {
|
|||
|
||||
generated_json_strings("generated_api_json_strings") {
|
||||
sources = [
|
||||
"cryptotoken_private.idl",
|
||||
"extension.json",
|
||||
"resources_private.idl",
|
||||
"tabs.json",
|
||||
|
@ -54,7 +53,6 @@ generated_json_strings("generated_api_json_strings") {
|
|||
|
||||
generated_types("generated_api_types") {
|
||||
sources = [
|
||||
"cryptotoken_private.idl",
|
||||
"resources_private.idl",
|
||||
"tabs.json",
|
||||
]
|
||||
|
|
|
@ -37,9 +37,5 @@
|
|||
"matches": [
|
||||
"chrome://print/*"
|
||||
]
|
||||
}],
|
||||
"cryptotokenPrivate": {
|
||||
"dependencies": ["permission:cryptotokenPrivate"],
|
||||
"contexts": ["blessed_extension"]
|
||||
}
|
||||
}]
|
||||
}
|
||||
|
|
|
@ -11,13 +11,5 @@
|
|||
"extension_types": [
|
||||
"extension"
|
||||
]
|
||||
},
|
||||
"cryptotokenPrivate": {
|
||||
"channel": "stable",
|
||||
"extension_types": ["extension"],
|
||||
"location": "component",
|
||||
"allowlist": [
|
||||
"E24F1786D842E91E74C27929B0B3715A4689A473" // Cryptotoken
|
||||
]
|
||||
}
|
||||
}
|
|
@ -1,63 +0,0 @@
|
|||
// Copyright 2014 The Chromium Authors. All rights reserved.
|
||||
// Use of this source code is governed by a BSD-style license that can be
|
||||
// found in the LICENSE file.
|
||||
|
||||
// <code>chrome.cryptotokenPrivate</code> API that provides hooks to Chrome to
|
||||
// be used by cryptotoken component extension.
|
||||
// <p>In the context of this API, an AppId is roughly an origin and is formally
|
||||
// defined in
|
||||
// <a href="https://fidoalliance.org/specs/fido-u2f-v1.2-ps-20170411/fido-appid-and-facets-v1.2-ps-20170411.html">
|
||||
// the FIDO spec</a></p>
|
||||
namespace cryptotokenPrivate {
|
||||
|
||||
callback BooleanCallback = void(boolean result);
|
||||
callback VoidCallback = void();
|
||||
|
||||
dictionary CanAppIdGetAttestationOptions {
|
||||
// The AppId (see definition, above) that was used in the registration
|
||||
// request and which has been authenticated by |canOriginAssertAppId|.
|
||||
DOMString appId;
|
||||
// The origin of the caller.
|
||||
DOMString origin;
|
||||
// Identifies the tab in which the registration is occurring so that any
|
||||
// permissions prompt is correctly located.
|
||||
long tabId;
|
||||
};
|
||||
|
||||
interface Functions {
|
||||
// Checks whether the origin is allowed to assert the appId, according to
|
||||
// the same origin policy defined at
|
||||
// http://fidoalliance.org/specs/fido-u2f-v1.0-ps-20141009/
|
||||
// fido-appid-and-facets-ps-20141009.html
|
||||
// |securityOrigin| is the origin as seen by the extension, and |appIdUrl|
|
||||
// is the appId being asserted by the origin.
|
||||
static void canOriginAssertAppId(DOMString securityOrigin,
|
||||
DOMString appIdUrl,
|
||||
BooleanCallback callback);
|
||||
|
||||
// Checks whether the given appId is specified in the
|
||||
// SecurityKeyPermitAttestation policy. This causes a signal to be sent to
|
||||
// the token that informs it that an individually-identifying attestation
|
||||
// certificate may be used. Without that signal, the token is required to
|
||||
// use its batch attestation certificate.
|
||||
static void isAppIdHashInEnterpriseContext(ArrayBuffer appIdHash,
|
||||
BooleanCallback callback);
|
||||
|
||||
// Checks whether the given appId may receive attestation data that
|
||||
// identifies the token. If not, the attestation from the token must be
|
||||
// substituted with a randomly generated certificate since webauthn and U2F
|
||||
// require that some attestation be provided.
|
||||
static void canAppIdGetAttestation(CanAppIdGetAttestationOptions options,
|
||||
BooleanCallback callback);
|
||||
|
||||
// Increments the WebFeature::kU2FCryptotokenRegister UseCounter for the
|
||||
// main frame associated with |tabId|.
|
||||
static void recordRegisterRequest(long tabId, long frameId,
|
||||
optional VoidCallback callback);
|
||||
|
||||
// Increments the WebFeature::kU2FCryptotokenSign UseCounter for the
|
||||
// main frame associated with |tabId|.
|
||||
static void recordSignRequest(long tabId, long frameId,
|
||||
optional VoidCallback callback);
|
||||
};
|
||||
};
|
|
@ -35,7 +35,6 @@ constexpr APIPermissionInfo::InitInfo permissions_to_register[] = {
|
|||
{mojom::APIPermissionID::kResourcesPrivate, "resourcesPrivate",
|
||||
APIPermissionInfo::kFlagCannotBeOptional},
|
||||
{mojom::APIPermissionID::kManagement, "management"},
|
||||
{mojom::APIPermissionID::kCryptotokenPrivate, "cryptotokenPrivate"},
|
||||
};
|
||||
base::span<const APIPermissionInfo::InitInfo> GetPermissionInfos() {
|
||||
return base::make_span(permissions_to_register);
|
||||
|
|
|
@ -8,11 +8,11 @@
|
|||
#include "base/files/file_util.h"
|
||||
#include "base/strings/pattern.h"
|
||||
#include "base/strings/string_util.h"
|
||||
#include "base/threading/thread_restrictions.h"
|
||||
#include "net/base/data_url.h"
|
||||
#include "shell/common/asar/asar_util.h"
|
||||
#include "shell/common/node_includes.h"
|
||||
#include "shell/common/skia_util.h"
|
||||
#include "shell/common/thread_restrictions.h"
|
||||
#include "third_party/skia/include/core/SkBitmap.h"
|
||||
#include "third_party/skia/include/core/SkImageInfo.h"
|
||||
#include "third_party/skia/include/core/SkPixelRef.h"
|
||||
|
@ -123,7 +123,7 @@ bool AddImageSkiaRepFromPath(gfx::ImageSkia* image,
|
|||
double scale_factor) {
|
||||
std::string file_contents;
|
||||
{
|
||||
base::ThreadRestrictions::ScopedAllowIO allow_io;
|
||||
electron::ScopedAllowBlockingForElectron allow_blocking;
|
||||
if (!asar::ReadFileToString(path, &file_contents))
|
||||
return false;
|
||||
}
|
||||
|
|
16
shell/common/thread_restrictions.h
Normal file
16
shell/common/thread_restrictions.h
Normal file
|
@ -0,0 +1,16 @@
|
|||
// Copyright (c) 2022 GitHub, Inc.
|
||||
// Use of this source code is governed by the MIT license that can be
|
||||
// found in the LICENSE file.
|
||||
|
||||
#ifndef ELECTRON_SHELL_COMMON_THREAD_RESTRICTIONS_H_
|
||||
#define ELECTRON_SHELL_COMMON_THREAD_RESTRICTIONS_H_
|
||||
|
||||
#include "base/threading/thread_restrictions.h"
|
||||
|
||||
namespace electron {
|
||||
|
||||
class ScopedAllowBlockingForElectron : public base::ScopedAllowBlocking {};
|
||||
|
||||
} // namespace electron
|
||||
|
||||
#endif // ELECTRON_SHELL_COMMON_THREAD_RESTRICTIONS_H_
|
Loading…
Add table
Add a link
Reference in a new issue