chore: bump chromium to 110.0.5415.0 (main) (#36186)
* chore: bump chromium in DEPS to 109.0.5386.0 * chore: bump chromium in DEPS to 109.0.5388.0 * chore: bump chromium in DEPS to 109.0.5390.0 * chore: bump chromium in DEPS to 109.0.5392.0 * chore: bump chromium in DEPS to 109.0.5394.0 * chore: bump chromium in DEPS to 109.0.5396.0 * chore: bump chromium in DEPS to 109.0.5398.0 * chore: bump chromium in DEPS to 109.0.5400.0 * chore: update galactus * chore: bump chromium in DEPS to 109.0.5402.0 * chore: bump chromium in DEPS to 109.0.5403.0 * chore: bump chromium in DEPS to 109.0.5406.0 * chore: update patches * 4004247: Delete unused DocumentWebContentsDelegate Ref:4004247
* chore: bump chromium in DEPS to 109.0.5408.1 * chore: update patches * 3949284: Support pkey debug mode without pkey 0 access Ref:3949284
* chore: bump chromium in DEPS to 109.0.5410.0 * chore: update patches * 4000944: [Extensions] Create an API directory in //chrome/renderer/extensions Ref:4000944
* 3988524: Remove DocumentOverlayWindowViews |3988524
Co-authored-by: George Xu <33054982+georgexu99@users.noreply.github.com> * chore: bump chromium in DEPS to 109.0.5412.0 * chore: update patches * 3984022: Add AddChildWindowToBrowser to DisplayClient mojo interface Ref:3984022
* 3957079: Delete the CryptoToken component extension and internal API Ref:3957079
* 4004421: Migreate ScopedAllowIO to ScopedAllowBlocking Ref:4004421
Co-authored-by: George Xu <georgexu99@users.noreply.github.com> * chore: bump chromium in DEPS to 109.0.5414.0 * chore: update patches * 4016180: Split PPAPI Mojo interfaces out of RenderFrameHostImpl. Ref:4016180
* 3970838: [MPArch] Convert HostZoomMap and ZoomController off of RenderViewHost ids Ref:3970838
* 3997795: Don't add Chromium as a login item Ref:3997795
* 3993482: Remove RefCountedString::TakeString Ref:3993482
* 3990749: Allow forward-declared sources in base::ScopedObservation<> Ref:3990749
* fixup! 3957079: Delete the CryptoToken component extension and internal API * chore: bump chromium in DEPS to 110.0.5415.0 * 3883790: Move devtools_frame_token to the RenderFrameHost, to preserve RFH identity across MPArch activations.3883790
* 4022205: Move license tooling into //tools/licenses4022205
* chore: fixup patch indices * fixup! 3957079: Delete the CryptoToken component extension and internal API * 4008687: Finish ScopedAllowIO migration4008687
* 3991548: Move WindowButtonOrderObserver and WindowFrameAction to LinuxUi3991548
* fixup! 3984022: Add AddChildWindowToBrowser to DisplayClient mojo interface * 4016595: Migrate non-default ScopedObservation<> instantiations to ScopedObservationTraits<> in chrome/browser/4016595
* 4000481: Rename :chromedriver to :chromedriver_server Ref:4000481
* 4008687: Finish ScopedAllowIO migration4008687
* 3988524: Remove DocumentOverlayWindowViews3988524
* fixup! 3997795: Don't add Chromium as a login item * chore: fixup patches * 3996872: Plumb input event task runner to EventFactoryEvdev3996872
* 4014994: Enable SiteIsolationForGuests by default.4014994
* chore: adopt new thread restrictions api for //electron (#36357) chore: add thread blocking api * fixup! 4014994: Enable SiteIsolationForGuests by default. * pull parent HWND for dialogs on ui thread * chore: set parent_window in MessageBoxSettings * chore: remove redundant patch * chore: revert accidental deletion * chore: update patches Co-authored-by: electron-roller[bot] <84116207+electron-roller[bot]@users.noreply.github.com> Co-authored-by: Samuel Attard <sattard@salesforce.com> Co-authored-by: Keeley Hammond <khammond@slack-corp.com> Co-authored-by: VerteDinde <vertedinde@electronjs.org> Co-authored-by: George Xu <33054982+georgexu99@users.noreply.github.com> Co-authored-by: George Xu <georgexu99@users.noreply.github.com> Co-authored-by: Shelley Vohr <shelley.vohr@gmail.com> Co-authored-by: Robo <hop2deep@gmail.com> Co-authored-by: Jeremy Rose <jeremya@chromium.org> Co-authored-by: PatchUp <73610968+patchup[bot]@users.noreply.github.com>
This commit is contained in:
parent
517225b99e
commit
87c183df6a
138 changed files with 818 additions and 1630 deletions
|
@ -36,7 +36,6 @@ group("extensions_features") {
|
|||
|
||||
generated_json_strings("generated_api_json_strings") {
|
||||
sources = [
|
||||
"cryptotoken_private.idl",
|
||||
"extension.json",
|
||||
"resources_private.idl",
|
||||
"tabs.json",
|
||||
|
@ -54,7 +53,6 @@ generated_json_strings("generated_api_json_strings") {
|
|||
|
||||
generated_types("generated_api_types") {
|
||||
sources = [
|
||||
"cryptotoken_private.idl",
|
||||
"resources_private.idl",
|
||||
"tabs.json",
|
||||
]
|
||||
|
|
|
@ -37,9 +37,5 @@
|
|||
"matches": [
|
||||
"chrome://print/*"
|
||||
]
|
||||
}],
|
||||
"cryptotokenPrivate": {
|
||||
"dependencies": ["permission:cryptotokenPrivate"],
|
||||
"contexts": ["blessed_extension"]
|
||||
}
|
||||
}]
|
||||
}
|
||||
|
|
|
@ -11,13 +11,5 @@
|
|||
"extension_types": [
|
||||
"extension"
|
||||
]
|
||||
},
|
||||
"cryptotokenPrivate": {
|
||||
"channel": "stable",
|
||||
"extension_types": ["extension"],
|
||||
"location": "component",
|
||||
"allowlist": [
|
||||
"E24F1786D842E91E74C27929B0B3715A4689A473" // Cryptotoken
|
||||
]
|
||||
}
|
||||
}
|
|
@ -1,63 +0,0 @@
|
|||
// Copyright 2014 The Chromium Authors. All rights reserved.
|
||||
// Use of this source code is governed by a BSD-style license that can be
|
||||
// found in the LICENSE file.
|
||||
|
||||
// <code>chrome.cryptotokenPrivate</code> API that provides hooks to Chrome to
|
||||
// be used by cryptotoken component extension.
|
||||
// <p>In the context of this API, an AppId is roughly an origin and is formally
|
||||
// defined in
|
||||
// <a href="https://fidoalliance.org/specs/fido-u2f-v1.2-ps-20170411/fido-appid-and-facets-v1.2-ps-20170411.html">
|
||||
// the FIDO spec</a></p>
|
||||
namespace cryptotokenPrivate {
|
||||
|
||||
callback BooleanCallback = void(boolean result);
|
||||
callback VoidCallback = void();
|
||||
|
||||
dictionary CanAppIdGetAttestationOptions {
|
||||
// The AppId (see definition, above) that was used in the registration
|
||||
// request and which has been authenticated by |canOriginAssertAppId|.
|
||||
DOMString appId;
|
||||
// The origin of the caller.
|
||||
DOMString origin;
|
||||
// Identifies the tab in which the registration is occurring so that any
|
||||
// permissions prompt is correctly located.
|
||||
long tabId;
|
||||
};
|
||||
|
||||
interface Functions {
|
||||
// Checks whether the origin is allowed to assert the appId, according to
|
||||
// the same origin policy defined at
|
||||
// http://fidoalliance.org/specs/fido-u2f-v1.0-ps-20141009/
|
||||
// fido-appid-and-facets-ps-20141009.html
|
||||
// |securityOrigin| is the origin as seen by the extension, and |appIdUrl|
|
||||
// is the appId being asserted by the origin.
|
||||
static void canOriginAssertAppId(DOMString securityOrigin,
|
||||
DOMString appIdUrl,
|
||||
BooleanCallback callback);
|
||||
|
||||
// Checks whether the given appId is specified in the
|
||||
// SecurityKeyPermitAttestation policy. This causes a signal to be sent to
|
||||
// the token that informs it that an individually-identifying attestation
|
||||
// certificate may be used. Without that signal, the token is required to
|
||||
// use its batch attestation certificate.
|
||||
static void isAppIdHashInEnterpriseContext(ArrayBuffer appIdHash,
|
||||
BooleanCallback callback);
|
||||
|
||||
// Checks whether the given appId may receive attestation data that
|
||||
// identifies the token. If not, the attestation from the token must be
|
||||
// substituted with a randomly generated certificate since webauthn and U2F
|
||||
// require that some attestation be provided.
|
||||
static void canAppIdGetAttestation(CanAppIdGetAttestationOptions options,
|
||||
BooleanCallback callback);
|
||||
|
||||
// Increments the WebFeature::kU2FCryptotokenRegister UseCounter for the
|
||||
// main frame associated with |tabId|.
|
||||
static void recordRegisterRequest(long tabId, long frameId,
|
||||
optional VoidCallback callback);
|
||||
|
||||
// Increments the WebFeature::kU2FCryptotokenSign UseCounter for the
|
||||
// main frame associated with |tabId|.
|
||||
static void recordSignRequest(long tabId, long frameId,
|
||||
optional VoidCallback callback);
|
||||
};
|
||||
};
|
Loading…
Add table
Add a link
Reference in a new issue