Skip to content
This repository has been archived by the owner on Jan 4, 2019. It is now read-only.

Merge C68 into master #634

Merged
merged 75 commits into from
Aug 9, 2018
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
75 commits
Select commit Hold shift + click to select a range
7ee9ca3
Update patches to Chromium 68.0.3440.33
ltilve May 28, 2018
ca86fff
Removed BUILDFLAG(ENABLE_WEBRTC)
ltilve May 28, 2018
542de31
Remove mojo/common and all references to it
ltilve May 28, 2018
7b9cbc7
chromium_src: browser_shutdown.* moved to chrome/browser/lifetime/
hferreiro May 31, 2018
8904075
chromium_src: sth_distributor_provider.* was removed
hferreiro May 31, 2018
5c1c5f9
chromium_src: print_job_worker_owner.* was removed
hferreiro May 31, 2018
c27d44c
chromium_src: rename resource_coordinator_web_contents_observer.* => …
hferreiro May 31, 2018
fc66436
chromium_src: web_contents_closer.* was removed
hferreiro May 31, 2018
fcb0a1a
DispatchNonPersistentCloseEvent() parameters
hferreiro May 31, 2018
6994476
EnterFullscreenModeForTab() parameters
hferreiro May 31, 2018
d882a8b
TabStripModelObserver::TabDetachedAt() parameters
hferreiro May 31, 2018
04e3c03
Update ownership semantics for WebContents in serveral places
hferreiro May 31, 2018
1e7e370
Fully move PathService into the base namespace
hferreiro Jun 1, 2018
828b023
C68 updates to widevine_cdm_component_installer.cc
hferreiro Jun 1, 2018
a0fafd4
Move zygote code to service_manager
hferreiro Jun 1, 2018
84c6587
Move the CTLogList out of //net
hferreiro Jun 1, 2018
a38ed38
REVIEW: chromium_src: C68 updates to io_thread.cc
hferreiro Jun 1, 2018
158265c
Use PacFileFetcherImpl::Create instead of constructor
hferreiro Jun 1, 2018
7d0cef8
Use DefaultCTPolicyEnforcer instead of virtual CTPolicyEnforcer
hferreiro Jun 1, 2018
6e65b4a
Do not use deprecated MessageLoop::QuitWhenIdleClosure()
hferreiro Jun 1, 2018
59ed79a
Migrate origin trials from content to blink
hferreiro Jun 1, 2018
e6bc9a1
Mark many methods as `override` to omit warnings
hferreiro May 31, 2018
3e61d38
C68 updates to AutofillClient
hferreiro Jun 1, 2018
219d833
C68 changes to PasswordManagerClient
hferreiro Jun 1, 2018
4c30742
Implement missing BraveCredentialsFilter::ShouldSavePasswordHash()
hferreiro Jun 1, 2018
d79795e
Update RegisterInProcessServices() parameters
hferreiro Jun 1, 2018
79a285c
Update CreateLoginDelegate() parameters
hferreiro Jun 1, 2018
729cf64
C68 updates to browser_process_impl.cc
hferreiro Jun 4, 2018
bf35cba
TabStripModelDelegate::CreateNewStripWithContents() parameters
hferreiro Jun 4, 2018
38e2629
DROP fix Chromium compilation error
hferreiro Jun 4, 2018
e800238
RenderWidgetHost::WasResized() => SynchronizeVisualProperties()
hferreiro Jun 4, 2018
912fb38
Change blink::WebInputEvent timestamp from double to base::TimeTicks
hferreiro Jun 4, 2018
9e9d94e
base::SetFdLimit() => IncreaseFdLimitTo()
hferreiro Jun 4, 2018
b7c2964
Add FALLTHROUGH to avoid `-Wimplicit-fallthrough` warnings
hferreiro Jun 4, 2018
d4b7150
Update BraveConfigurator constructor parameters
hferreiro Jun 4, 2018
56bad5c
Use map instead of DictionaryValue at profile_import
ltilve Jun 4, 2018
c250a7b
Renamed websocket_handshake_throttle.h
ltilve Jun 4, 2018
ab3ad68
Removed SPOOFING_AND_CONTROL_CHARS
ltilve Jun 4, 2018
2faca55
Enabled by default feature api kEnableSingleClickAutofill
ltilve Jun 5, 2018
9c9deb8
TODO: Block/Resume request APIs where removed from content/public
hferreiro Jun 5, 2018
066a101
ManagermentAPIDelegate::DisableExtension() parameters
hferreiro Jun 5, 2018
b0fdbee
TODO: boringssl Revert "Remove legacy SSL_CTX_sess_set_get_cb overload."
hferreiro Jun 5, 2018
0e762f3
TabManager::SetTabAutoDiscardableState() was removed
hferreiro Jun 5, 2018
95b0470
RenderProcessHost::GetHandle() was removed
hferreiro Jun 5, 2018
2073593
ScopedNestableTaskAllower constructor
hferreiro Jun 5, 2018
2f5cf55
Add hostname pattern support to secure context whitelist
hferreiro Jun 5, 2018
7fb7b0f
Drop EVP_get_cipherbyname() patch
hferreiro Jun 6, 2018
f71240d
C68 linking issues
hferreiro Jun 6, 2018
b22530d
C68: Fix many -Wswitch warnings
hferreiro Jun 6, 2018
185143c
Add missing <memory> include to fix win build
ltilve Jun 6, 2018
2c94200
C68: fix debug build
hferreiro Jun 8, 2018
03a812d
Dedupe the sandbox related switches
hferreiro Jun 12, 2018
87dcb19
Fix TabMemoryMetricsReporter linking issues
ltilve Jun 15, 2018
462d5ce
Register safe_browsing prefs
hferreiro Jun 20, 2018
c777552
safe_browsing: Handle WHITELISTED_BY_POLICY downloads
hferreiro Jun 21, 2018
81b5c1f
release the unique_ptr when the tab strip gives it to us so it doesn'…
bridiver Jul 11, 2018
241c585
Update patches to Chromium 68.0.3440.59
hferreiro Jul 12, 2018
c10b47a
Bump v8.0.0+68.0.3440.59
bridiver Jul 12, 2018
525cd3d
fixup! EnterFullscreenModeForTab() parameters
hferreiro Jul 13, 2018
5089be6
fixup! C68 changes to PasswordManagerClient
hferreiro Jul 17, 2018
bcaeafc
Change mojo manifest interface syntax from foo::mojom::Bar to foo.moj…
darkdh Jul 18, 2018
fd125b8
Bump v8.0.1+68.0.3440.59
bridiver Jul 19, 2018
f2b60b8
bump chromedriver
bridiver Jul 20, 2018
93ab213
fixup! C68 changes to PasswordManagerClient
hferreiro Jul 17, 2018
62f9261
set_site_for_service_worker for isolated storage so that
darkdh Jul 25, 2018
ce65cd2
Bump v8.0.2+68.0.3440.75
bridiver Jul 25, 2018
a2f7fb4
Get native window reference manually if it's not found in user data (…
bsclifton Jul 30, 2018
3fd75f7
Bump v8.0.4+68.0.3440.84
bridiver Aug 1, 2018
f58697f
release new_contents in all cases so we can continue to manage its li…
bridiver Aug 2, 2018
8fe25b6
Bump v8.0.5+68.0.3440.84
bridiver Aug 2, 2018
05fc0fa
`brave` should be treated as a local scheme
bridiver Aug 3, 2018
aeeeec4
Bump v8.0.6+68.0.3440.84
bridiver Aug 3, 2018
9f580dd
do not allow any loading of brave:// urls from anywhere
bridiver Aug 3, 2018
8aee883
release unique_ptr to avoid double delete
bridiver Aug 8, 2018
2b7e67d
Bump v8.0.7+68.0.3440.84
bridiver Aug 8, 2018
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 2 additions & 1 deletion BUILD.gn
Original file line number Diff line number Diff line change
Expand Up @@ -261,6 +261,7 @@ mojom("mojo_bindings") {

public_deps = [
"//mojo/public/mojom/base",
"//services/service_manager/public/mojom",
]
}

Expand Down Expand Up @@ -575,7 +576,7 @@ if (is_win) {
chromedriver = "$chromedriver.exe"
}

chromedriver_version = "2.37"
chromedriver_version = "2.38"

copy("electron_chromedriver_dist_resources") {
sources = [
Expand Down
7 changes: 4 additions & 3 deletions atom/app/atom_content_client.cc
Original file line number Diff line number Diff line change
Expand Up @@ -112,6 +112,7 @@ void AtomContentClient::AddAdditionalSchemes(Schemes* schemes) {
// TODO(kalman): See what happens with a service worker.
schemes->cors_enabled_schemes.push_back(extensions::kExtensionScheme);
#endif
schemes->local_schemes.push_back("brave");
}

bool AtomContentClient::AllowScriptExtensionForServiceWorker(
Expand All @@ -123,7 +124,7 @@ bool AtomContentClient::AllowScriptExtensionForServiceWorker(
#endif
}

content::OriginTrialPolicy* AtomContentClient::GetOriginTrialPolicy() {
blink::OriginTrialPolicy* AtomContentClient::GetOriginTrialPolicy() {
if (!origin_trial_policy_) {
origin_trial_policy_ = base::WrapUnique(new ChromeOriginTrialPolicy());
}
Expand Down Expand Up @@ -181,10 +182,10 @@ void AtomContentClient::AddContentDecryptionModules(
if (cdm_host_file_paths) {
#if defined(OS_WIN)
base::FilePath brave_exe_dir;
if (!PathService::Get(base::DIR_EXE, &brave_exe_dir))
if (!base::PathService::Get(base::DIR_EXE, &brave_exe_dir))
NOTREACHED();
base::FilePath file_path;
if (!PathService::Get(base::FILE_EXE, &file_path))
if (!base::PathService::Get(base::FILE_EXE, &file_path))
NOTREACHED();
cdm_host_file_paths->reserve(1);

Expand Down
4 changes: 2 additions & 2 deletions atom/app/atom_content_client.h
Original file line number Diff line number Diff line change
Expand Up @@ -25,12 +25,12 @@ class AtomContentClient : public brightray::ContentClient {
void SetActiveURL(const GURL& url, std::string top_origin) override;
std::string GetProduct() const override;
std::string GetUserAgent() const override;
void SetGpuInfo(const gpu::GPUInfo& gpu_info);
void SetGpuInfo(const gpu::GPUInfo& gpu_info) override;
void AddAdditionalSchemes(Schemes* schemes) override;
void AddPepperPlugins(
std::vector<content::PepperPluginInfo>* plugins) override;
bool AllowScriptExtensionForServiceWorker(const GURL& script_url) override;
content::OriginTrialPolicy* GetOriginTrialPolicy() override;
blink::OriginTrialPolicy* GetOriginTrialPolicy() override;

void AddContentDecryptionModules(
std::vector<content::CdmInfo>* cdms,
Expand Down
8 changes: 5 additions & 3 deletions atom/app/atom_main.cc
Original file line number Diff line number Diff line change
Expand Up @@ -22,6 +22,7 @@
#include "chrome/common/chrome_switches.h"
#include "content/public/app/content_main.h"
#include "content/public/common/content_switches.h"
#include "services/service_manager/sandbox/switches.h"

#if defined(OS_MACOSX)
#include "chrome/common/chrome_paths_internal.h"
Expand Down Expand Up @@ -133,7 +134,7 @@ int main(int argc, const char* argv[]) {
user_data_dir = command_line->GetSwitchValuePath(switches::kUserDataDir);
} else {
#if defined(OS_WIN) || defined(OS_MACOSX)
PathService::Get(base::DIR_APP_DATA, &user_data_dir);
base::PathService::Get(base::DIR_APP_DATA, &user_data_dir);
#else
user_data_dir = base::nix::GetXDGDirectory(environment.get(),
base::nix::kXdgConfigHomeEnvVar,
Expand All @@ -151,7 +152,7 @@ int main(int argc, const char* argv[]) {
#endif
}
}
PathService::Override(chrome::DIR_CRASH_DUMPS,
base::PathService::Override(chrome::DIR_CRASH_DUMPS,
user_data_dir.Append(FILE_PATH_LITERAL("CrashPad")));
environment->SetVar("CHROME_USER_DATA_DIR", user_data_dir.AsUTF8Unsafe());

Expand Down Expand Up @@ -183,7 +184,8 @@ int main(int argc, const char* argv[]) {
// Initialize the sandbox services.
sandbox::SandboxInterfaceInfo sandbox_info = {0};
const bool is_browser = process_type.empty();
const bool is_sandboxed = !command_line->HasSwitch(switches::kNoSandbox);
const bool is_sandboxed =
!command_line->HasSwitch(service_manager::switches::kNoSandbox);
if (is_browser || is_sandboxed) {
// For child processes that are running as --no-sandbox, don't initialize
// the sandbox info, otherwise they'll be treated as brokers (as if they
Expand Down
13 changes: 7 additions & 6 deletions atom/app/atom_main_delegate.cc
Original file line number Diff line number Diff line change
Expand Up @@ -37,6 +37,7 @@
#include "extensions/common/constants.h"
#include "muon/app/muon_crash_reporter_client.h"
#include "printing/buildflags/buildflags.h"
#include "services/service_manager/embedder/switches.h"
#include "services/service_manager/sandbox/switches.h"
#include "ui/base/l10n/l10n_util.h"
#include "ui/base/resource/resource_bundle.h"
Expand Down Expand Up @@ -171,7 +172,7 @@ base::FilePath InitializeUserDataDir() {

// Warn and fail early if the process fails to get a user data directory.
if (user_data_dir.empty() ||
!PathService::OverrideAndCreateIfNeeded(chrome::DIR_USER_DATA,
!base::PathService::OverrideAndCreateIfNeeded(chrome::DIR_USER_DATA,
user_data_dir, false, true)) {
std::string process_type =
command_line.GetSwitchValueASCII(switches::kProcessType);
Expand All @@ -187,7 +188,7 @@ base::FilePath InitializeUserDataDir() {
base::FilePath chrome_user_data_dir;
base::FilePath native_messaging_dir;
#if defined(OS_MACOSX)
PathService::Get(base::DIR_APP_DATA, &chrome_user_data_dir);
base::PathService::Get(base::DIR_APP_DATA, &chrome_user_data_dir);
chrome_user_data_dir = chrome_user_data_dir.Append("Google/Chrome");
native_messaging_dir = base::FilePath(FILE_PATH_LITERAL(
"/Library/Google/Chrome/NativeMessagingHosts"));
Expand All @@ -196,11 +197,11 @@ base::FilePath InitializeUserDataDir() {
native_messaging_dir = base::FilePath(FILE_PATH_LITERAL(
"/etc/opt/chrome/native-messaging-hosts"));
#endif // defined(OS_MACOSX)
PathService::OverrideAndCreateIfNeeded(
base::PathService::OverrideAndCreateIfNeeded(
chrome::DIR_USER_NATIVE_MESSAGING,
chrome_user_data_dir.Append(FILE_PATH_LITERAL("NativeMessagingHosts")),
false, true);
PathService::OverrideAndCreateIfNeeded(chrome::DIR_NATIVE_MESSAGING,
base::PathService::OverrideAndCreateIfNeeded(chrome::DIR_NATIVE_MESSAGING,
native_messaging_dir, false, true);
#endif // OS_POSIX
return user_data_dir;
Expand Down Expand Up @@ -296,7 +297,7 @@ void AtomMainDelegate::PreSandboxStartup() {
if (path.empty()) {
LOG(ERROR) << "Could not create user data dir";
} else {
PathService::OverrideAndCreateIfNeeded(
base::PathService::OverrideAndCreateIfNeeded(
component_updater::DIR_COMPONENT_USER,
path.Append(FILE_PATH_LITERAL("Extensions")), false, true);
}
Expand All @@ -306,7 +307,7 @@ void AtomMainDelegate::PreSandboxStartup() {

#if !defined(CHROME_MULTIPLE_DLL_BROWSER)
if (process_type == switches::kUtilityProcess ||
process_type == switches::kZygoteProcess) {
process_type == service_manager::switches::kZygoteProcess) {
AtomContentUtilityClient::PreSandboxStartup();
}
#endif
Expand Down
2 changes: 1 addition & 1 deletion atom/app/atom_main_delegate_mac.mm
Original file line number Diff line number Diff line change
Expand Up @@ -59,7 +59,7 @@
brightray::GetApplicationName());
if (!base::PathExists(helper_path))
LOG(FATAL) << "Unable to find helper app";
PathService::Override(content::CHILD_PROCESS_EXE, helper_path);
base::PathService::Override(content::CHILD_PROCESS_EXE, helper_path);
}

void AtomMainDelegate::SetUpBundleOverrides() {
Expand Down
1 change: 1 addition & 0 deletions atom/browser/BUILD.gn
Original file line number Diff line number Diff line change
Expand Up @@ -294,6 +294,7 @@ source_set("browser") {
"//electron/chromium_src:menu_bar",
"//chrome/browser/ui/libgtkui:libgtkui",
"//electron/build:gtk3",
"//ui/events/platform/x11",
]
}

Expand Down
9 changes: 5 additions & 4 deletions atom/browser/api/atom_api_app.cc
Original file line number Diff line number Diff line change
Expand Up @@ -676,7 +676,7 @@ base::FilePath App::GetPath(mate::Arguments* args, const std::string& name) {
base::FilePath path;
int key = GetPathConstant(name);
if (key >= 0)
succeed = PathService::Get(key, &path);
succeed = base::PathService::Get(key, &path);
if (!succeed)
args->ThrowError("Failed to get path");
return path;
Expand All @@ -693,7 +693,8 @@ void App::SetPath(mate::Arguments* args,
bool succeed = false;
int key = GetPathConstant(name);
if (key >= 0)
succeed = PathService::OverrideAndCreateIfNeeded(key, path, true, false);
succeed =
base::PathService::OverrideAndCreateIfNeeded(key, path, true, false);
if (!succeed)
args->ThrowError("Failed to set path");
}
Expand Down Expand Up @@ -728,7 +729,7 @@ bool App::MakeSingleInstance(
return false;

base::FilePath user_dir;
PathService::Get(chrome::DIR_USER_DATA, &user_dir);
base::PathService::Get(chrome::DIR_USER_DATA, &user_dir);
process_singleton_.reset(new ProcessSingleton(
user_dir, base::Bind(NotificationCallbackWrapper, callback)));

Expand Down Expand Up @@ -773,7 +774,7 @@ bool App::Relaunch(mate::Arguments* js_args) {

if (exec_path.empty()) {
base::FilePath current_exe_path;
PathService::Get(base::FILE_EXE, &current_exe_path);
base::PathService::Get(base::FILE_EXE, &current_exe_path);
argv.push_back(current_exe_path.value());
} else {
argv.push_back(exec_path.value());
Expand Down
2 changes: 1 addition & 1 deletion atom/browser/api/atom_api_dialog.cc
Original file line number Diff line number Diff line change
Expand Up @@ -152,7 +152,7 @@ void ShowDialog(const file_dialog::DialogSettings& settings,

base::FilePath default_path = settings.default_path;
if (default_path.empty()) {
if (!PathService::Get(chrome::DIR_DEFAULT_DOWNLOADS, &default_path)) {
if (!base::PathService::Get(chrome::DIR_DEFAULT_DOWNLOADS, &default_path)) {
NOTREACHED();
}
}
Expand Down
3 changes: 1 addition & 2 deletions atom/browser/api/atom_api_menu_mac.mm
Original file line number Diff line number Diff line change
Expand Up @@ -92,8 +92,7 @@

[popup_controllers_[window_id] setCloseCallback:close_callback];
// Make sure events can be pumped while the menu is up.
base::MessageLoop::ScopedNestableTaskAllower allow(
base::MessageLoop::current());
base::MessageLoopCurrent::ScopedNestableTaskAllower allow;

// One of the events that could be pumped is |window.close()|.
// User-initiated event-tracking loops protect against this by
Expand Down
Loading